Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

9 results
Deposit type : Fulltext
labStructName_s : Computer Science Department
Image document

On the Design and Implementation of an Efficient DAA Scheme

Liqun Chen , Dan Page , Nigel P. Smart
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.223-237, ⟨10.1007/978-3-642-12510-2_16⟩
Conference papers hal-01056104v1
Image document

Anonygator: Privacy and Integrity Preserving Data Aggregation

Krishna P. N. Puttaswamy , Ranjita Bhagwan , Venkata N. Padmanabhan
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.85-106, ⟨10.1007/978-3-642-16955-7_5⟩
Conference papers hal-01055270v1
Image document

EMWF: A Middleware for Flexible Automation and Assistive Devices

Ting-Shuo Chou , Yu Chi Huang , Yung Chun Wang , Wai-Chi Chen , Chi-Sheng Shih , et al.
8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.191-203, ⟨10.1007/978-3-642-16256-5_19⟩
Conference papers hal-01055386v1
Image document

A Pareto Ant Colony Algorithm Applied to the Class Integration and Test Order Problem

Rafael Veiga Cabral , Aurora Pozo , Silvia Regina Vergilio
22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.16-29, ⟨10.1007/978-3-642-16573-3_3⟩
Conference papers hal-01055245v1
Image document

Towards Electrical, Integrated Implementations of SIMPL Systems

Ulrich Rührmair , Qingqing Chen , Martin Stutzmann , Paolo Lugli , Ulf Schlichtmann , et al.
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.277-292, ⟨10.1007/978-3-642-12368-9_22⟩
Conference papers hal-01056078v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

On the Combined Behavior of Autonomous Resource Management Agents

Siri Fagernes , Alva L. Couch
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.38-49, ⟨10.1007/978-3-642-13986-4_5⟩
Conference papers hal-01056625v1
Image document

LU Decomposition on Cell Broadband Engine: An Empirical Study to Exploit Heterogeneous Chip Multiprocessors

Feng Mao , Xipeng Shen
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.61-75, ⟨10.1007/978-3-642-15672-4_7⟩
Conference papers hal-01054956v1
Image document

Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

Ge Zhang , Simone Fischer-Hübner
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.130-141, ⟨10.1007/978-3-642-13241-4_13⟩
Conference papers hal-01056384v1