Filter your results
- 537
- 19
- 3
- 535
- 2
- 536
- 1
- 1
- 34
- 503
- 537
- 27
- 9
- 8
- 7
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
WISeMid: Middleware for Integrating Wireless Sensor Networks and the Internet10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.70-83, ⟨10.1007/978-3-642-13645-0_6⟩
Conference papers
hal-01061077v1
|
||
|
Wireless Handoff Optimization: A Comparison of IEEE 802.11r and HOKEY 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.118-131, ⟨10.1007/978-3-642-13971-0_12⟩
Conference papers
hal-01056504v1
|
||
|
Widening the Disciplinary Scope of eParticipation. Reflections after a Research on Tourism and Cultural HeritageSecond IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.140-150, ⟨10.1007/978-3-642-15158-3_12⟩
Conference papers
hal-01054842v1
|
||
|
When ABE Meets RSS24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.319-326, ⟨10.1007/978-3-642-13739-6_23⟩
Conference papers
hal-01056677v1
|
||
|
What is the Issue with Internet Acceptance among Elderly Citizens? Theory Development and Policy Recommendations for Inclusive e-Government9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.275-288, ⟨10.1007/978-3-642-14799-9_24⟩
Conference papers
hal-01059183v1
|
||
|
Website Credential Storage and Two-Factor Web Authentication with a Java SIM4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.229-236, ⟨10.1007/978-3-642-12368-9_17⟩
Conference papers
hal-01056084v1
|
||
|
Web Applications Usability Testing with Task Model SkeletonsThird IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.158-165, ⟨10.1007/978-3-642-16488-0_13⟩
Conference papers
hal-01055207v1
|
||
|
Wave Touch: Educational Game on Interactive Tabletop with Water Simulation9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.479-481, ⟨10.1007/978-3-642-15399-0_65⟩
Conference papers
hal-01055596v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Watermark Detection for Video Bookmarking Using Mobile Phone Camera11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.64-74, ⟨10.1007/978-3-642-13241-4_7⟩
Conference papers
hal-01056367v1
|
||
|
ViSE - A Virtual Smart Environment for Usability EvaluationThird IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.38-45, ⟨10.1007/978-3-642-16488-0_4⟩
Conference papers
hal-01055197v1
|
||
|
Virtual Team Performance Depends on Distributed Leadership9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.91-102, ⟨10.1007/978-3-642-15399-0_9⟩
Conference papers
hal-01055582v1
|
||
|
Virtual Expansion of Rainbow Tables6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.243-256, ⟨10.1007/978-3-642-15506-2_17⟩
Conference papers
hal-01060622v1
|
||
|
Virtual Blowgun System for Breathing Movement Exercise9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.278-285, ⟨10.1007/978-3-642-15399-0_28⟩
Conference papers
hal-01055634v1
|
||
|
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.250-265, ⟨10.1007/978-3-642-16573-3_18⟩
Conference papers
inria-00555069v2
|
||
|
Vegetation Interaction Game: Digital SUGOROKU of Vegetation Succession for Children9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.493-495, ⟨10.1007/978-3-642-15399-0_70⟩
Conference papers
hal-01055590v1
|
||
|
Vectorization for JavaIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.3-17, ⟨10.1007/978-3-642-15672-4_3⟩
Conference papers
hal-01054962v1
|
||
|
Validating Evolutionary Algorithms on Volunteer Computing Grids10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.29-41, ⟨10.1007/978-3-642-13645-0_3⟩
Conference papers
hal-01061080v1
|
||
|
Using Trust-Based Information Aggregation for Predicting Security Level of Systems24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers
hal-01056685v1
|
||
|
Using Torrent Inflation to Efficiently Serve the Long Tail in Peer-Assisted Content Delivery Systems9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.1-14, ⟨10.1007/978-3-642-12963-6_1⟩
Conference papers
hal-01056308v1
|
||
|
Using Gis Tools to Support E_Participation - A Systematic EvaluationSecond IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.197-210, ⟨10.1007/978-3-642-15158-3_17⟩
Conference papers
hal-01054839v1
|
||
|
Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.37-48, ⟨10.1007/978-3-642-15506-2_3⟩
Conference papers
hal-01060608v1
|
||
|
User-Centric Privacy Preservation in Data-Sharing ApplicationsIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.423-431, ⟨10.1007/978-3-642-15672-4_35⟩
Conference papers
hal-01054967v1
|
||
|
User Behavior Pattern Analysis and Prediction Based on Mobile Phone SensorsIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.177-189, ⟨10.1007/978-3-642-15672-4_16⟩
Conference papers
hal-01054992v1
|
||
|
Unnecessary Image Pair Detection for a Large Scale Reconstruction9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.151-159, ⟨10.1007/978-3-642-15399-0_14⟩
Conference papers
hal-01055647v1
|
||
|
Understanding Privacy Risk of Publishing Decision Trees24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.33-48, ⟨10.1007/978-3-642-13739-6_3⟩
Conference papers
hal-01056670v1
|
||
|
Understanding Formal Description of Pitch-Based InputThird IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.190-197, ⟨10.1007/978-3-642-16488-0_16⟩
Conference papers
hal-01055204v1
|
||
|
Uncertainty in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.171-184, ⟨10.1007/978-3-642-15506-2_12⟩
Conference papers
hal-01060617v1
|
||
|
Ubiquitous Verification of Ubiquitous Systems8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.47-58, ⟨10.1007/978-3-642-16256-5_7⟩
Conference papers
hal-01055377v1
|
||
|
Trust in Peer-to-Peer Content Distribution Protocols4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.76-89, ⟨10.1007/978-3-642-12368-9_6⟩
Conference papers
hal-01056065v1
|