Filter your results
- 537
- 19
- 3
- 538
- 19
- 2
- 558
- 1
- 1
- 34
- 525
- 559
- 27
- 9
- 8
- 7
- 7
- 6
- 6
- 6
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
559 results
|
Tools for Performance Evaluation of Computer Systems: Historical Evolution and PerspectivesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.24-37, ⟨10.1007/978-3-642-25575-5_3⟩
Conference papers
hal-01586901v1
|
||
|
Do Voting Advice Applications Have an Effect on Electoral Participation and Voter Turnout? Evidence from the 2007 Swiss Federal ElectionsSecond IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.211-224, ⟨10.1007/978-3-642-15158-3_18⟩
Conference papers
hal-01059097v1
|
||
|
Evaluating MDC with Incentives in P2PTV Systems 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.266-269, ⟨10.1007/978-3-642-13971-0_28⟩
Conference papers
hal-01056487v1
|
||
|
An Access Control Model for Web Databases24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.287-294, ⟨10.1007/978-3-642-13739-6_19⟩
Conference papers
hal-01056682v1
|
||
|
Dynamic Service Placement in Shared Service Hosting Infrastructures9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.251-264, ⟨10.1007/978-3-642-12963-6_20⟩
Conference papers
hal-01056307v1
|
||
|
Toward a Formal Approach to Process Bundling in Public Administrations9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.412-423, ⟨10.1007/978-3-642-14799-9_35⟩
Conference papers
hal-01056570v1
|
||
|
Designing and Evaluating Dashboards for Multi-agency Crisis Preparation: A Living Lab9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.180-191, ⟨10.1007/978-3-642-14799-9_16⟩
Conference papers
hal-01056587v1
|
||
|
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers
hal-01056386v1
|
||
|
NetPot: Easy Meal Enjoyment for Distant Diners9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.446-448, ⟨10.1007/978-3-642-15399-0_56⟩
Conference papers
hal-01055606v1
|
||
|
An Energy-Efficient FPGA-Based Packet Processing Framework 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.31-40, ⟨10.1007/978-3-642-13971-0_4⟩
Conference papers
hal-01056561v1
|
||
|
SIP Proxies: New Reflectors in the Internet11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.142-153, ⟨10.1007/978-3-642-13241-4_14⟩
Conference papers
hal-01056382v1
|
||
|
Networked Services and Applications - Engineering, Control and ManagementSpringer, LNCS-6164, 2010, Lecture Notes in Computer Science, 978-3-642-13970-3. ⟨10.1007/978-3-642-13971-0⟩
Books
hal-01555392v1
|
||
|
Translation from UML to SPN Model: A Performance Modeling Framework 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.270-271, ⟨10.1007/978-3-642-13971-0_29⟩
Conference papers
hal-01056486v1
|
||
|
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers
hal-01060614v1
|
||
|
An Open and Extensible Service Discovery for Ubiquitous Communication Systems 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.272-273, ⟨10.1007/978-3-642-13971-0_30⟩
Conference papers
hal-01056484v1
|
||
|
Mining Likely Properties of Access Control Policies via Association Rule Mining24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers
hal-01056688v1
|
||
|
Formal Software Verification: How Close Are We?Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.1, ⟨10.1007/978-3-642-13464-7_1⟩
Conference papers
hal-01055211v1
|
||
|
Modelling Social-Aware Forwarding in Opportunistic NetworksPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.141-152, ⟨10.1007/978-3-642-25575-5_12⟩
Conference papers
hal-01586891v1
|
||
|
Toward a Science of Digital Forensic Evidence Examination6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.17-35, ⟨10.1007/978-3-642-15506-2_2⟩
Conference papers
hal-01060607v1
|
||
|
A Biometrics-Based Solution to Combat SIM Swap Fraud1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩
Conference papers
hal-01581328v1
|
||
|
Facing Complexity in Systems Management4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.1-1, ⟨10.1007/978-3-642-13986-4_1⟩
Conference papers
hal-01056636v1
|
||
|
Middleware 2010Springer, LNCS-6452, 2010, Lecture Notes in Computer Science, 978-3-642-16954-0. ⟨10.1007/978-3-642-16955-7⟩
Books
hal-01555803v1
|
||
|
Coordination Models and LanguagesSpringer, LNCS-6116, 2010, Lecture Notes in Computer Science, 978-3-642-13413-5. ⟨10.1007/978-3-642-13414-2⟩
Books
hal-01555333v1
|
||
|
Formal Semantics and Analysis of Behavioral AADL Models in Real-Time MaudeJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.47-62, ⟨10.1007/978-3-642-13464-7_5⟩
Conference papers
hal-01055147v1
|
||
|
Knowledge Sharing in eCollaboration9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.351-362, ⟨10.1007/978-3-642-14799-9_30⟩
Conference papers
hal-01059195v1
|
||
|
System and context - on a discernable source of emergent game play and the process-oriented method9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.240-247, ⟨10.1007/978-3-642-15399-0_23⟩
Conference papers
hal-01059224v1
|
||
|
Desktop-to-Mobile Web Adaptation through Customizable Two-Dimensional Semantic RedesignThird IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.79-94, ⟨10.1007/978-3-642-16488-0_7⟩
Conference papers
hal-01055195v1
|
||
|
On the Security of a Two-Factor Authentication Scheme4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.245-252, ⟨10.1007/978-3-642-12368-9_19⟩
Conference papers
hal-01056082v1
|
||
|
Combined Attacks and Countermeasures9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.133-147, ⟨10.1007/978-3-642-12510-2_10⟩
Conference papers
hal-01056108v1
|
||
|
Model-Driven Service Level Management4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.85-88, ⟨10.1007/978-3-642-13986-4_10⟩
Conference papers
hal-01056646v1
|