Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

559 results
Image document

Tools for Performance Evaluation of Computer Systems: Historical Evolution and Perspectives

Giuliano Casale , Marco Gribaudo , Giuseppe Serazzi
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.24-37, ⟨10.1007/978-3-642-25575-5_3⟩
Conference papers hal-01586901v1
Image document

Do Voting Advice Applications Have an Effect on Electoral Participation and Voter Turnout? Evidence from the 2007 Swiss Federal Elections

Andreas Ladner , Joëlle Pianzola
Second IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.211-224, ⟨10.1007/978-3-642-15158-3_18⟩
Conference papers hal-01059097v1
Image document

Evaluating MDC with Incentives in P2PTV Systems

Alberto J. Gonzalez , Andre Rios , Guillermo Enero , Antoni Oller , Jesus Alcober
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.266-269, ⟨10.1007/978-3-642-13971-0_28⟩
Conference papers hal-01056487v1
Image document

An Access Control Model for Web Databases

Ahlem Bouchahda-Ben Tekaya , Nhan Thanh , Adel Bouhoula , Faten Labbene-Ayachi
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.287-294, ⟨10.1007/978-3-642-13739-6_19⟩
Conference papers hal-01056682v1
Image document

Dynamic Service Placement in Shared Service Hosting Infrastructures

Qi Zhang , Jin Xiao , Eren Gürses , Martin Karsten , Raouf Boutaba
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.251-264, ⟨10.1007/978-3-642-12963-6_20⟩
Conference papers hal-01056307v1
Image document

Toward a Formal Approach to Process Bundling in Public Administrations

Marlen Jurisch , Petra Wolf , Helmut Krcmar
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.412-423, ⟨10.1007/978-3-642-14799-9_35⟩
Conference papers hal-01056570v1
Image document

Designing and Evaluating Dashboards for Multi-agency Crisis Preparation: A Living Lab

Nitesh Bharosa , Marijn Janssen , Sebastiaan Meijer , Fritjof Brave
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.180-191, ⟨10.1007/978-3-642-14799-9_16⟩
Conference papers hal-01056587v1
Image document

A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)

Nicolas Racz , Edgar Weippl , Andreas Seufert
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers hal-01056386v1
Image document

NetPot: Easy Meal Enjoyment for Distant Diners

Zoltan Foley-Fisher , Vincent Tsao , Johnty Wang , Sid Fels
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.446-448, ⟨10.1007/978-3-642-15399-0_56⟩
Conference papers hal-01055606v1
Image document

An Energy-Efficient FPGA-Based Packet Processing Framework

Daniel Horvath , Imre Bertalan , Istvan Moldován , Tuan Anh Trinh
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.31-40, ⟨10.1007/978-3-642-13971-0_4⟩
Conference papers hal-01056561v1
Image document

SIP Proxies: New Reflectors in the Internet

Ge Zhang , Jordi Jaen Pallares , Yacine Rebahi , Simone Fischer-Hübner
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.142-153, ⟨10.1007/978-3-642-13241-4_14⟩
Conference papers hal-01056382v1

Networked Services and Applications - Engineering, Control and Management

Finn Arve Aagesen , Svein Johan Knapskog
Springer, LNCS-6164, 2010, Lecture Notes in Computer Science, 978-3-642-13970-3. ⟨10.1007/978-3-642-13971-0⟩
Books hal-01555392v1
Image document

Translation from UML to SPN Model: A Performance Modeling Framework

Razib Hayat Khan , Poul E. Heegaard
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.270-271, ⟨10.1007/978-3-642-13971-0_29⟩
Conference papers hal-01056486v1
Image document

Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services

Murat Gunestas , Murad Mehmet , Duminda Wijesekera
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers hal-01060614v1
Image document

An Open and Extensible Service Discovery for Ubiquitous Communication Systems

Nor Shahniza Kamal Bashah , Ivar Jørstad , Do Thanh
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.272-273, ⟨10.1007/978-3-642-13971-0_30⟩
Conference papers hal-01056484v1
Image document

Mining Likely Properties of Access Control Policies via Association Rule Mining

Jeehyun Hwang , Tao Xie , Vincent Hu , Mine Altunay
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers hal-01056688v1
Image document

Formal Software Verification: How Close Are We?

Gerard J. Holzmann
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.1, ⟨10.1007/978-3-642-13464-7_1⟩
Conference papers hal-01055211v1
Image document

Modelling Social-Aware Forwarding in Opportunistic Networks

Chiara Boldrini , Marco Conti , Andrea Passarella
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.141-152, ⟨10.1007/978-3-642-25575-5_12⟩
Conference papers hal-01586891v1
Image document

Toward a Science of Digital Forensic Evidence Examination

Fred Cohen
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.17-35, ⟨10.1007/978-3-642-15506-2_2⟩
Conference papers hal-01060607v1
Image document

A Biometrics-Based Solution to Combat SIM Swap Fraud

Louis Jordaan , Basie Von Solms
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩
Conference papers hal-01581328v1
Image document

Facing Complexity in Systems Management

Metin Feridun
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.1-1, ⟨10.1007/978-3-642-13986-4_1⟩
Conference papers hal-01056636v1

Middleware 2010

Indranil Gupta , Cecilia Mascolo
Springer, LNCS-6452, 2010, Lecture Notes in Computer Science, 978-3-642-16954-0. ⟨10.1007/978-3-642-16955-7⟩
Books hal-01555803v1

Coordination Models and Languages

Dave Clarke , Gul Agha
Springer, LNCS-6116, 2010, Lecture Notes in Computer Science, 978-3-642-13413-5. ⟨10.1007/978-3-642-13414-2⟩
Books hal-01555333v1
Image document

Formal Semantics and Analysis of Behavioral AADL Models in Real-Time Maude

Peter Csaba Ölveczky , Artur Boronat , José Meseguer
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.47-62, ⟨10.1007/978-3-642-13464-7_5⟩
Conference papers hal-01055147v1
Image document

Knowledge Sharing in eCollaboration

Neil Ireson , Gregoire Burel
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.351-362, ⟨10.1007/978-3-642-14799-9_30⟩
Conference papers hal-01059195v1
Image document

System and context - on a discernable source of emergent game play and the process-oriented method

Barbara Grüter , Mirima Oks , Andreas Lochwitz
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.240-247, ⟨10.1007/978-3-642-15399-0_23⟩
Conference papers hal-01059224v1
Image document

Desktop-to-Mobile Web Adaptation through Customizable Two-Dimensional Semantic Redesign

Fabio Paternò , Giuseppe Zichittella
Third IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.79-94, ⟨10.1007/978-3-642-16488-0_7⟩
Conference papers hal-01055195v1
Image document

On the Security of a Two-Factor Authentication Scheme

Luigi Catuogno , Clemente Galdi
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.245-252, ⟨10.1007/978-3-642-12368-9_19⟩
Conference papers hal-01056082v1
Image document

Combined Attacks and Countermeasures

Eric Vetillard , Anthony Ferrari
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.133-147, ⟨10.1007/978-3-642-12510-2_10⟩
Conference papers hal-01056108v1
Image document

Model-Driven Service Level Management

Anacleto Correia , Fernando Brito Abreu
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.85-88, ⟨10.1007/978-3-642-13986-4_10⟩
Conference papers hal-01056646v1