Filter your results
- 537
- 19
- 3
- 535
- 2
- 536
- 1
- 1
- 34
- 503
- 537
- 27
- 9
- 8
- 7
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
CCIndex: a Complemental Clustering Index on Distributed Ordered Tables for Multi-dimensional Range QueriesIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.247-261, ⟨10.1007/978-3-642-15672-4_22⟩
Conference papers
hal-01054987v1
|
||
|
Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.273-286, ⟨10.1007/978-3-642-13739-6_18⟩
Conference papers
hal-01056683v1
|
||
|
A Consistency Study of the Windows Registry6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.77-90, ⟨10.1007/978-3-642-15506-2_6⟩
Conference papers
hal-01060611v1
|
||
|
Understanding Privacy Risk of Publishing Decision Trees24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.33-48, ⟨10.1007/978-3-642-13739-6_3⟩
Conference papers
hal-01056670v1
|
||
|
An Efficient Simulation Algorithm for Cache of Random Replacement PolicyIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.144-154, ⟨10.1007/978-3-642-15672-4_13⟩
Conference papers
hal-01054982v1
|
||
|
Cost Bounds of Multicast Light-trees in WDM NetworksIFIP Networking conference, May 2010, Chennai, India. pp.339-350, ⟨10.1007/978-3-642-12963-6_27⟩
Conference papers
hal-00541058v2
|
||
|
Online Event Correlations Analysis in System Logs of Large-Scale Cluster SystemsIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.262-276, ⟨10.1007/978-3-642-15672-4_23⟩
Conference papers
hal-01054978v1
|
||
|
The Core Degree Based Tag Reduction on Chip Multiprocessor to Balance Energy Saving and Performance OverheadIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.358-372, ⟨10.1007/978-3-642-15672-4_30⟩
Conference papers
hal-01054972v1
|
||
|
The Design of Secure and Efficient P2PSIP Communication Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.253-260, ⟨10.1007/978-3-642-12368-9_20⟩
Conference papers
hal-01056080v1
|
||
|
FDTM: Block Level Data Migration Policy in Tiered Storage SystemIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.76-90, ⟨10.1007/978-3-642-15672-4_8⟩
Conference papers
hal-01054955v1
|
||
|
Building a Domain-Knowledge Guided System Software Environment to Achieve High-Performance of Multi-core ProcessorsIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.1-1, ⟨10.1007/978-3-642-15672-4_1⟩
Conference papers
hal-01054980v1
|
||
|
Evaluating and Optimizing I/O Virtualization in Kernel-based Virtual Machine (KVM)IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.220-231, ⟨10.1007/978-3-642-15672-4_20⟩
Conference papers
hal-01054988v1
|
||
|
Dynamic Service Placement in Shared Service Hosting Infrastructures9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.251-264, ⟨10.1007/978-3-642-12963-6_20⟩
Conference papers
hal-01056307v1
|
||
|
SIP Proxies: New Reflectors in the Internet11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.142-153, ⟨10.1007/978-3-642-13241-4_14⟩
Conference papers
hal-01056382v1
|
||
|
Improve Throughput of Storage Cluster Interconnected with a TCP/IP Network Using Intelligent Server GroupingIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.373-389, ⟨10.1007/978-3-642-15672-4_31⟩
Conference papers
hal-01054971v1
|
||
|
Storage Device Performance Prediction with Selective Bagging Classification and Regression TreeIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.121-133, ⟨10.1007/978-3-642-15672-4_11⟩
Conference papers
hal-01054984v1
|
||
|
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.130-141, ⟨10.1007/978-3-642-13241-4_13⟩
Conference papers
hal-01056384v1
|
||
|
A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging SchemeIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.402-411, ⟨10.1007/978-3-642-15672-4_33⟩
Conference papers
hal-01054969v1
|
||
|
Just-in-Time Compiler Assisted Object Reclamation and Space ReuseIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.18-34, ⟨10.1007/978-3-642-15672-4_4⟩
Conference papers
hal-01054959v1
|
||
|
Virtual Blowgun System for Breathing Movement Exercise9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.278-285, ⟨10.1007/978-3-642-15399-0_28⟩
Conference papers
hal-01055634v1
|
||
|
Online Scene Modeling for Interactive AR Applications9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.139-150, ⟨10.1007/978-3-642-15399-0_13⟩
Conference papers
hal-01055648v1
|
||
|
The Video Cube Puzzle: On Investigating Temporal Coordination9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.193-204, ⟨10.1007/978-3-642-15399-0_18⟩
Conference papers
hal-01055643v1
|
||
|
Evaluate the Performance and Scalability of Image Deployment in Virtual Data CenterIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.390-401, ⟨10.1007/978-3-642-15672-4_32⟩
Conference papers
hal-01054970v1
|
||
|
Predicting and Preventing Insider Threat in Relational Database Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.368-383, ⟨10.1007/978-3-642-12368-9_30⟩
Conference papers
hal-01056069v1
|
||
|
Forensic Analysis of Popular Chinese Internet Applications6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.285-295, ⟨10.1007/978-3-642-15506-2_20⟩
Conference papers
hal-01060625v1
|
||
|
Automated Composing System for Sub-melody Using HMM: A Support System for Composing Music9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.425-427, ⟨10.1007/978-3-642-15399-0_49⟩
Conference papers
hal-01055614v1
|
||
|
A Very Compact Hardware Implementation of the KASUMI Block Cipher4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.293-307, ⟨10.1007/978-3-642-12368-9_23⟩
Conference papers
hal-01056077v1
|
||
|
Penmanship Learning Support System: Feature Extraction for Online Handwritten Characters9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.496-498, ⟨10.1007/978-3-642-15399-0_71⟩
Conference papers
hal-01055589v1
|
||
|
Scale-Adaptable Recrawl Strategies for DHT-based Distributed Web Crawling SystemIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.91-105, ⟨10.1007/978-3-642-15672-4_9⟩
Conference papers
hal-01054954v1
|
||
|
Optimization of Triangular Matrix Functions in BLAS Library on Loongson2FIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.35-45, ⟨10.1007/978-3-642-15672-4_5⟩
Conference papers
hal-01054958v1
|