Matching entries: 0
settings...
Mamadou Tourad Diallo, Moustafa H, Hossam Afifi and Marechal N (2013), "Context aware quality of experience for audio-visual service groups", IEEE communications society - multimedia communications technical committee e-letter., march, 2013. Vol. 8(2), pp. 9 - 11.
BibTeX:
@article{r-Diallo2013,
  author = {Mamadou Tourad Diallo and Hassnaa Moustafa and Hossam Afifi and Nicolas Marechal},
  title = {Context aware quality of experience for audio-visual service groups},
  journal = {IEEE communications society - multimedia communications technical committee e-letter},
  year = {2013},
  volume = {8},
  number = {2},
  pages = {9 -- 11}
}
Khalil Ur Rehman Laghari, Falk TH, Hyder M, Haun M, Noel Crespi and Karls E (2013), "An investigation into the relationship between perceived quality-of-experience and virtual acoustic environments : the case of 3D audio telephony", Journal of universal computer science (J.UCS).
BibTeX:
@article{r-Laghari2013,
  author = {Khalil Ur Rehman Laghari and Tiago H. Falk and Mansoor Hyder and Michael Haun and Noel Crespi and E. Karls},
  title = {An investigation into the relationship between perceived quality-of-experience and virtual acoustic environments : the case of 3D audio telephony},
  journal = {Journal of universal computer science (J.UCS)},
  year = {2013}
}
Meriem Zerkouk, Abdallah M'Hamed and Messabih B (2013), "A user profile based access control model and architecture", International journal of computer networks & communications (IJCNC)., january, 2013. Vol. 5(1), pp. 171 - 181.
BibTeX:
@article{r-Zerkouk2013,
  author = {Meriem Zerkouk and Abdallah M'Hamed and Belhadri Messabih},
  title = {A user profile based access control model and architecture},
  journal = {International journal of computer networks & communications (IJCNC)},
  year = {2013},
  volume = {5},
  number = {1},
  pages = {171 -- 181}
}
Qin Zou (2013), "Steady-state behavior of semiconductor laser diodes subject to arbitrary levels of external optical feedback", Optics and photonics journal (OPJ)., march, 2013. Vol. 3(1), pp. 128 - 134.
BibTeX:
@article{r-Zou2013,
  author = {Qin Zou},
  title = {Steady-state behavior of semiconductor laser diodes subject to arbitrary levels of external optical feedback},
  journal = {Optics and photonics journal (OPJ)},
  year = {2013},
  volume = {3},
  number = {1},
  pages = {128 -- 134}
}
Aymen Boudguiga and Maryline Laurent (2012), "On the use of ID-based cryptography for the definition of new EAP authentication methods", International journal for information security research (IJISR)., march, 2012. Vol. 2(1 \& 2), pp. 246 - 255.
BibTeX:
@article{r-Boudguiga2012,
  author = {Aymen Boudguiga and Maryline Laurent},
  title = {On the use of ID-based cryptography for the definition of new EAP authentication methods},
  journal = {International journal for information security research (IJISR)},
  year = {2012},
  volume = {2},
  number = {1 & 2},
  pages = {246 -- 255}
}
Bachir Chihani, Emmanuel Bertin, Suprapto IS, Noel Crespi and Zimmermann J (2012), "Enhancing existing communication services with context-awareness", Journal of computer networks and communications (JCNC). Vol. 2012
BibTeX:
@article{r-Chihani2012,
  author = {Bachir Chihani and Emmanuel Bertin and Irsalina Salsabila Suprapto and Noel Crespi and Julien Zimmermann},
  title = {Enhancing existing communication services with context-awareness},
  journal = {Journal of computer networks and communications (JCNC)},
  year = {2012},
  volume = {2012},
  note = {Article ID 493261}
}
Ethmane El Moustaine and Maryline Laurent (2012), "Systèmes et techniques RFID : risques et solutions de sécurité", Techniques de l'ingénieur. Sécurité des systèmes d'information., novembre, 2012. (H5325)
BibTeX:
@article{r-ElMoustaine2012,
  author = {Ethmane El Moustaine and Maryline Laurent},
  title = {Systèmes et techniques RFID : risques et solutions de sécurité},
  journal = {Techniques de l'ingénieur. Sécurité des systèmes d'information},
  year = {2012},
  number = {H5325}
}
Robert Farha, Kamal Ghoumid, Qin Zou and Badr-Eddine Benkelfat (2012), "Analysis of a novel photonic-crystal LOM structure engraved in a Ti:Er:LiNbO3 waveguide for 1.55 $m emission", Journal of optics., july, 2012. Vol. 14(7)
BibTeX:
@article{r-Farha2012,
  author = {Robert Farha and Kamal Ghoumid and Qin Zou and Badr-Eddine Benkelfat},
  title = {Analysis of a novel photonic-crystal LOM structure engraved in a Ti:Er:LiNbO3 waveguide for 1.55 $m emission},
  journal = {Journal of optics},
  year = {2012},
  volume = {14},
  number = {7}
}
Laurent Gomez, Maryline Laurent and Ethmane El Moustaine (2012), "Risk assessment along supply chain : a RFID and wireless sensor network integration approach", Sensors & transducers journal., march, 2012. Vol. 14(2), pp. 269 - 282.
BibTeX:
@article{r-Gomez2012,
  author = {Laurent Gomez and Maryline Laurent and Ethmane El Moustaine},
  title = {Risk assessment along supply chain : a RFID and wireless sensor network integration approach},
  journal = {Sensors & transducers journal},
  year = {2012},
  volume = {14},
  number = {2},
  pages = {269 -- 282},
  note = {Special Issue Physical and Chemical Sensors & Wireless Sensor Networks (SENSORCOMM)}
}
Gustavo Daniel Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem and Hervé Debar (2012), "An ontology-driven approach to model SIEM information and operations using the SWRL formalism", International journal of electronic security and digital forensics (IJESDF)., august, 2012. Vol. 4(2/3), pp. 104 - 123.
BibTeX:
@article{r-GonzalezGranadillo2012,
  author = {Gustavo Daniel Gonzalez Granadillo and Yosra Ben Mustapha and Nabil Hachem and Hervé Debar},
  title = {An ontology-driven approach to model SIEM information and operations using the SWRL formalism},
  journal = {International journal of electronic security and digital forensics (IJESDF)},
  year = {2012},
  volume = {4},
  number = {2/3},
  pages = {104 -- 123},
  note = {Special Issue on Global Security, Safety and Sustainability}
}
Raida Hentati, Aoudni Y, Bernadette Dorizzi and Mohamed Abid (2012), "HW/SW partitioning approach for embedded systems, case study : iris recognition algorithm", International journal of computer science issues (IJCSI)., may, 2012. Vol. 9(3)
BibTeX:
@article{r-Hentati2012,
  author = {Raida Hentati and Yassine Aoudni and Bernadette Dorizzi and Mohamed Abid},
  title = {HW/SW partitioning approach for embedded systems, case study : iris recognition algorithm},
  journal = {International journal of computer science issues (IJCSI)},
  year = {2012},
  volume = {9},
  number = {3}
}
Olivier Paul (2012), "Prévention des dénis de service dans les réseaux publics", Techniques de l'ingénieur., avril, 2012. (H5810)
BibTeX:
@article{r-Paul2012,
  author = {Olivier Paul},
  title = {Prévention des dénis de service dans les réseaux publics},
  journal = {Techniques de l'ingénieur},
  year = {2012},
  number = {H5810}
}
Nel Samama (2012), "Géolocalisation : où en sommes-nous ?", REE : revue de l'éléctricité et de l'électronique. (3/2012), pp. 55 - 56.
BibTeX:
@article{r-Samama2012a,
  author = {Nel Samama},
  title = {Géolocalisation : où en sommes-nous ?},
  journal = {REE : revue de l'éléctricité et de l'électronique},
  year = {2012},
  number = {3/2012},
  pages = {55 -- 56}
}
Nel Samama (2012), "Principales techniques et technologies de positionnement", REE : revue de l'éléctricité et de l'électronique. (3/2012), pp. 75 - 85.
BibTeX:
@article{r-Samama2012b,
  author = {Nel Samama},
  title = {Principales techniques et technologies de positionnement},
  journal = {REE : revue de l'éléctricité et de l'électronique},
  year = {2012},
  number = {3/2012},
  pages = {75 -- 85}
}
Songbo Song, Moustafa H and Hossam Afifi (2012), "IPTV services personalization using context-awareness", Informatica. Vol. 36(1), pp. 13 - 20.
BibTeX:
@article{r-Song2012,
  author = {Songbo Song and Hassnaa Moustafa and Hossam Afifi},
  title = {IPTV services personalization using context-awareness},
  journal = {Informatica},
  year = {2012},
  volume = {36},
  number = {1},
  pages = {13 -- 20}
}
Pierre Abi-Char, Hassan BE and Abdallah M'Hamed (2011), "An enhanced authenticated key agreement protocol with a neural network-based model for joining-phase in mobile environments", International journal of engineering and industries (IJEI)., june, 2011. Vol. 2(2), pp. 103 - 112.
BibTeX:
@article{r-Abi-Char2011,
  author = {Pierre Abi-Char and Bachar El Hassan and Abdallah M'Hamed},
  title = {An enhanced authenticated key agreement protocol with a neural network-based model for joining-phase in mobile environments},
  journal = {International journal of engineering and industries (IJEI)},
  year = {2011},
  volume = {2},
  number = {2},
  pages = {103 -- 112}
}
Emad Mohamed Abd Elrahman Abousabea, Mohammed Boutabia and Hossam Afifi (2011), "Hash chain links resynchronization methods in video streaming security : performance comparison", Journal of mobile multimedia., april, 2011. Vol. 7(1\&2), pp. 89 - 112.
BibTeX:
@article{r-Abousabea2011,
  author = {Emad Mohamed Abd Elrahman Abousabea and Mohammed Boutabia and Hossam Afifi},
  title = {Hash chain links resynchronization methods in video streaming security : performance comparison},
  journal = {Journal of mobile multimedia},
  year = {2011},
  volume = {7},
  number = {1&2},
  pages = {89 -- 112}
}
Leonardo Arraez, Zeynep Gurkas Aydin and Hakima Chaouchi (2011), "Performance evaluation and experiments for host identity protocol ", International journal of computer science issues (IJCSI)., march, 2011. Vol. 8(2), pp. 74 - 83.
BibTeX:
@article{r-Arraez2011,
  author = {Leonardo Arraez and Zeynep Gurkas Aydin and Hakima Chaouchi},
  title = {Performance evaluation and experiments for host identity protocol },
  journal = {International journal of computer science issues (IJCSI)},
  year = {2011},
  volume = {8},
  number = {2},
  pages = {74 -- 83}
}
Mohammed Boutabia and Hossam Afifi (2011), "Towards service continuity in IMS heterogeneous access networks", International journal of computer networks & communications (IJCNC)., may, 2011. Vol. 3(3), pp. 164 - 176.
BibTeX:
@article{r-Boutabia2011,
  author = {Mohammed Boutabia and Hossam Afifi},
  title = {Towards service continuity in IMS heterogeneous access networks},
  journal = {International journal of computer networks & communications (IJCNC)},
  year = {2011},
  volume = {3},
  number = {3},
  pages = {164 -- 176},
  note = {Special Issue on "Networks and Communications"}
}
Mohammed Boutabia, Cardenas LR and Hossam Afifi (2011), "SESSAMO : session mobility for video streaming applications", International journal of ubicomp., april, 2011. Vol. 2(2), pp. 41 - 56.
BibTeX:
@article{r-Boutabia2011a,
  author = {Mohammed Boutabia and Luis Rojas Cardenas and Hossam Afifi},
  title = {SESSAMO : session mobility for video streaming applications},
  journal = {International journal of ubicomp},
  year = {2011},
  volume = {2},
  number = {2},
  pages = {41 -- 56}
}
Bachir Chihani, Emmanuel Bertin, Jeanne F and Noel Crespi (2011), "HEP : context-aware communication system", International journal of new computer architectures and their applications (IJNCAA)., may, 2011. Vol. 1(1), pp. 15 - 24.
BibTeX:
@article{r-Chihani2011,
  author = {Bachir Chihani and Emmanuel Bertin and Fabrice Jeanne and Noel Crespi},
  title = {HEP : context-aware communication system},
  journal = {International journal of new computer architectures and their applications (IJNCAA)},
  year = {2011},
  volume = {1},
  number = {1},
  pages = {15 -- 24}
}
Anca Fluerasu, Jardak N, Alexandre Vervisch-Picois and Nel Samama (2011), "Status of the GNSS transmitter-based approach for indoor positioning", Coordinates Magazine., january, 2011. Vol. VII(1)
BibTeX:
@article{r-Fluerasu2011,
  author = {Anca Fluerasu and Nabil Jardak and Alexandre Vervisch-Picois and Nel Samama},
  title = {Status of the GNSS transmitter-based approach for indoor positioning},
  journal = {Coordinates Magazine},
  year = {2011},
  volume = {VII},
  number = {1}
}
Brahim Raouyane, Bellafkih M, Daniel Ranc and Errais M (2011), "WS-composite for management & monitoring IMS network", International journal of next-generation computing (IJNGC)., november, 2011. Vol. 2(3)
BibTeX:
@article{r-Raouyane2011,
  author = {Brahim Raouyane and Mostafa Bellafkih and Daniel Ranc and Mohammed Errais},
  title = {WS-composite for management & monitoring IMS network},
  journal = {International journal of next-generation computing (IJNGC)},
  year = {2011},
  volume = {2},
  number = {3}
}
Sivasothy Shanmugalingam, Noel Crespi and Labrogere P (2011), "Scalability and signaling architecture", International journal of research and reviews in next generation networks (IJRRNGN)., december, 2011. Vol. 1(2), pp. 44 - 50.
BibTeX:
@article{r-Shanmugalingam2011,
  author = {Sivasothy Shanmugalingam and Noel Crespi and Paul Labrogere},
  title = {Scalability and signaling architecture},
  journal = {International journal of research and reviews in next generation networks (IJRRNGN)},
  year = {2011},
  volume = {1},
  number = {2},
  pages = {44 -- 50}
}
Jacques Simonin, Emmanuel Bertin, Traon YL, Noel Crespi and Jezequel J-M (2011), "Analysis and improvement of the alignment between business and information system for telecom services", International journal on advances in software. Vol. 4(1 \& 2), pp. 117 - 128.
BibTeX:
@article{r-Simonin2011,
  author = {Jacques Simonin and Emmanuel Bertin and Yves Le Traon and Noel Crespi and Jean-Marc Jezequel},
  title = {Analysis and improvement of the alignment between business and information system for telecom services},
  journal = {International journal on advances in software},
  year = {2011},
  volume = {4},
  number = {1 & 2},
  pages = {117 -- 128}
}
Ebtisam Amar, Boumerdassi S and Eric Renault (2010), "Hierarchical location service with prediction in mobile ad-hoc networks", International journal of computer networks & communications (IJCNC)., march, 2010. Vol. 2(2), pp. 59 - 72.
BibTeX:
@article{r-Amar2010,
  author = {Ebtisam Amar and Selma Boumerdassi and Eric Renault},
  title = {Hierarchical location service with prediction in mobile ad-hoc networks},
  journal = {International journal of computer networks & communications (IJCNC)},
  year = {2010},
  volume = {2},
  number = {2},
  pages = {59 -- 72}
}
Aymen Boudguiga and Maryline Laurent (2010), "Sécurité dans les réseaux 802.11 ", Techniques de l'ingénieur, Sécurité des systèmes d'information., octobre, 2010. (TE7377)
BibTeX:
@article{r-Boudguiga2010,
  author = {Aymen Boudguiga and Maryline Laurent},
  title = {Sécurité dans les réseaux 802.11 },
  journal = {Techniques de l'ingénieur, Sécurité des systèmes d'information},
  year = {2010},
  number = {TE7377}
}
Gyu Myoung Lee, Bhandari SR and Noel Crespi (2010), "Content delivery for personalized IPTV services using peer to peer proxy", Journal of internet engineering., december, 2010. Vol. 4(1), pp. 241 - 250.
BibTeX:
@article{r-Lee2010,
  author = {Gyu Myoung Lee and Shiddhartha Raj Bhandari and Noel Crespi},
  title = {Content delivery for personalized IPTV services using peer to peer proxy},
  journal = {Journal of internet engineering},
  year = {2010},
  volume = {4},
  number = {1},
  pages = {241 -- 250}
}
Michel Marot and Vincent Gauthier (2010), "Reducing collision probability on a shared medium using a variational method", ACM SIGMETRICS performance evaluation review., september, 2010. Vol. 38(2), pp. 42 - 44.
BibTeX:
@article{r-Marot2010,
  author = {Michel Marot and Vincent Gauthier},
  title = {Reducing collision probability on a shared medium using a variational method},
  journal = {ACM SIGMETRICS performance evaluation review},
  year = {2010},
  volume = {38},
  number = {2},
  pages = {42 -- 44}
}
Ludovic Mé and Hervé Debar (2010), "New directions in intrusion detection and alert correlation", Information - interaction - intelligence journal (I3)., august, 2010. Vol. 10(1)
BibTeX:
@article{r-Me2010,
  author = {Ludovic Mé and Hervé Debar},
  title = {New directions in intrusion detection and alert correlation},
  journal = {Information - interaction - intelligence journal (I3)},
  year = {2010},
  volume = {10},
  number = {1}
}
Eric Renault, Ahmad Ahmad and Mohamed Abid (2010), "Access control to objects and their description in the future network of information", JIPS : Journal of Information Processing Systems., september, 2010. Vol. 6(3), pp. 359 - 374.
BibTeX:
@article{r-Renault2010,
  author = {Eric Renault and Ahmad Ahmad and Mohamed Abid},
  title = {Access control to objects and their description in the future network of information},
  journal = {JIPS : Journal of Information Processing Systems},
  year = {2010},
  volume = {6},
  number = {3},
  pages = {359 -- 374}
}
Ines Slama, Badii Jouaber and Djamal Zeghlache (2010), "Topology control and routing in large scale wireless sensor networks", Wireless Sensor Network., august, 2010. Vol. 2(8), pp. 584 - 598.
BibTeX:
@article{r-Slama2010,
  author = {Ines Slama and Badii Jouaber and Djamal Zeghlache},
  title = {Topology control and routing in large scale wireless sensor networks},
  journal = {Wireless Sensor Network},
  year = {2010},
  volume = {2},
  number = {8},
  pages = {584 -- 598}
}
Ines Slama, Badii Jouaber and Djamal Zeghlache (2010), "Priority-based hybrid MAC for energy efficiency in wireless sensor networks", Wireless Sensor Network., october, 2010. Vol. 2(6), pp. 755 - 767.
BibTeX:
@article{r-Slama2010a,
  author = {Ines Slama and Badii Jouaber and Djamal Zeghlache},
  title = {Priority-based hybrid MAC for energy efficiency in wireless sensor networks},
  journal = {Wireless Sensor Network},
  year = {2010},
  volume = {2},
  number = {6},
  pages = {755 -- 767}
}
Mohamed Abid and Hossam Afifi (2009), "Towards a secure E-passport protocol based on biometrics", Journal of information assurance and security (JIAS)., july, 2009. Vol. 4(4), pp. 338 - 345.
BibTeX:
@article{r-Abid2009,
  author = {Mohamed Abid and Hossam Afifi},
  title = {Towards a secure E-passport protocol based on biometrics},
  journal = {Journal of information assurance and security (JIAS)},
  year = {2009},
  volume = {4},
  number = {4},
  pages = {338 -- 345}
}
Mohamed Abid, Songbo Song, Moustafa H and Hossam Afifi (2009), "Integrating identity-based cryptography in IMS service authentication", International journal of network security & its applications (IJNSA)., october, 2009. Vol. 1(3)
BibTeX:
@article{r-Abid2009a,
  author = {Mohamed Abid and Songbo Song and Hassnaa Moustafa and Hossam Afifi},
  title = {Integrating identity-based cryptography in IMS service authentication},
  journal = {International journal of network security & its applications (IJNSA)},
  year = {2009},
  volume = {1},
  number = {3}
}
Maher Ben Jemaa, Abid N, Maryline Laurent and Hakima Chaouchi (2009), "Experimental measurements of host identity protocol for mobile nodes' networks", Journal of computer systems, networks, and communications. Vol. 2009(Article ID 383517), pp. 1 - 6.
BibTeX:
@article{r-BenJemaa2009,
  author = {Maher Ben Jemaa and Nahla Abid and Maryline Laurent and Hakima Chaouchi},
  title = {Experimental measurements of host identity protocol for mobile nodes' networks},
  journal = {Journal of computer systems, networks, and communications},
  year = {2009},
  volume = {2009},
  number = {Article ID 383517},
  pages = {1 -- 6}
}
Noel Crespi (2009), "Converging web 2.0 with telecommunications", eStrategies projects., june, 2009. Vol. 10, pp. 108 - 109.
BibTeX:
@article{r-Crespi2009,
  author = {Noel Crespi},
  title = {Converging web 2.0 with telecommunications},
  journal = {eStrategies projects},
  year = {2009},
  volume = {10},
  pages = {108 -- 109}
}
Khalil Ur Rehman Laghari, Benyaiha IG and Noel Crespi (2009), "Analysis of telecommunication management technologies", International journal of computer science & information technology (IJCSIT)., november, 2009. Vol. 1(2), pp. 152 - 166.
BibTeX:
@article{r-Laghari2009,
  author = {Khalil Ur Rehman Laghari and Imen Grida Benyaiha and Noel Crespi},
  title = {Analysis of telecommunication management technologies},
  journal = {International journal of computer science & information technology (IJCSIT)},
  year = {2009},
  volume = {1},
  number = {2},
  pages = {152 -- 166}
}
Hakima Chaouchi and Maryline Laurent (2008), "Sécurité des réseaux sans fil et mobiles : problématiques et enjeux technologiques", La lettre Techniques de l'Ingénieur, Sécurité des systèmes d'Information., avril, 2008. (14)
BibTeX:
@article{r-Chaouchi2008,
  author = {Hakima Chaouchi and Maryline Laurent},
  title = {Sécurité des réseaux sans fil et mobiles : problématiques et enjeux technologiques},
  journal = {La lettre Techniques de l'Ingénieur, Sécurité des systèmes d'Information},
  year = {2008},
  number = {14}
}
Noel Crespi (2008), "Making the most of mobile service architecture", eStrategies projects., december, 2008.
BibTeX:
@article{r-Crespi2008,
  author = {Noel Crespi},
  title = {Making the most of mobile service architecture},
  journal = {eStrategies projects},
  year = {2008}
}
Maryline Laurent (2008), "Projet DisPairSe : système P2P de sauvegarde distribuée sécurisé", La lettre techniques de l'ingénieur, sécurité des systèmes d'information., juillet, 2008. (17), pp. 2 - 3.
BibTeX:
@article{r-Laurent2008,
  author = {Maryline Laurent},
  title = {Projet DisPairSe : système P2P de sauvegarde distribuée sécurisé},
  journal = {La lettre techniques de l'ingénieur, sécurité des systèmes d'information},
  year = {2008},
  number = {17},
  pages = {2 -- 3}
}
Maryline Laurent (2008), "Sécurité des systèmes P2P de sauvegarde distribuée ", La lettre Techniques de l'Ingénieur, Sécurité des systèmes d'Information., juin, 2008. (16)
BibTeX:
@article{r-Laurent2008a,
  author = {Maryline Laurent},
  title = {Sécurité des systèmes P2P de sauvegarde distribuée },
  journal = {La lettre Techniques de l'Ingénieur, Sécurité des systèmes d'Information},
  year = {2008},
  number = {16}
}
Maryline Laurent and Hakima Chaouchi (2008), "Des réseaux ad hoc économiquement viables", La lettre Techniques de l'Ingénieur, Sécurité des systèmes d'Information., janvier, 2008. (11)
BibTeX:
@article{r-Laurent2008b,
  author = {Maryline Laurent and Hakima Chaouchi},
  title = {Des réseaux ad hoc économiquement viables},
  journal = {La lettre Techniques de l'Ingénieur, Sécurité des systèmes d'Information},
  year = {2008},
  number = {11}
}
Wajdi Louati, Houidi I, Kharrat M, Khosravi HM and Djamal Zeghlache (2008), "Dynamic service deployment in a distributed heterogeneous cluster based router (DHCR) ", Cluster computing., december, 2008. Vol. 11(4), pp. 355 - 372.
BibTeX:
@article{r-Louati2008,
  author = {Wajdi Louati and Ines Houidi and M. Kharrat and Hormuzd M. Khosravi and Djamal Zeghlache},
  title = {Dynamic service deployment in a distributed heterogeneous cluster based router (DHCR) },
  journal = {Cluster computing},
  year = {2008},
  volume = {11},
  number = {4},
  pages = {355 -- 372}
}
Yasser Toor, Muhlethaler P, Anis Laouiti and Fortelle ADL (2008), "Vehicle Ad Hoc Networks: Applications and Related Technical Issues", IEEE communications surveys and tutorials., september, 2008. Vol. 10(3), pp. 74 - 88.
BibTeX:
@article{r-Toor2008,
  author = {Yasser Toor and Paul Muhlethaler and Anis Laouiti and Arnaud De La Fortelle},
  title = {Vehicle Ad Hoc Networks: Applications and Related Technical Issues},
  journal = {IEEE communications surveys and tutorials},
  year = {2008},
  volume = {10},
  number = {3},
  pages = {74 -- 88}
}