Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

537 results
Deposit type : Fulltext
Image document

WISeMid: Middleware for Integrating Wireless Sensor Networks and the Internet

Jeisa P. O. Domingues , Antonio V. L. Damaso , Nelson S. Rosa
10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.70-83, ⟨10.1007/978-3-642-13645-0_6⟩
Conference papers hal-01061077v1
Image document

Wireless Handoff Optimization: A Comparison of IEEE 802.11r and HOKEY

Kashif Nizam Khan , Jinat Rehana
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.118-131, ⟨10.1007/978-3-642-13971-0_12⟩
Conference papers hal-01056504v1
Image document

Widening the Disciplinary Scope of eParticipation. Reflections after a Research on Tourism and Cultural Heritage

Francesca Ricciardi , Patrizia Lombardi
Second IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.140-150, ⟨10.1007/978-3-642-15158-3_12⟩
Conference papers hal-01054842v1
Image document

When ABE Meets RSS

Yu Chen , Hyun Sung Kim , Jianbin Hu , Zhong Chen
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.319-326, ⟨10.1007/978-3-642-13739-6_23⟩
Conference papers hal-01056677v1
Image document

What is the Issue with Internet Acceptance among Elderly Citizens? Theory Development and Policy Recommendations for Inclusive e-Government

Bjoern Niehaves , Ralf Plattfaut
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.275-288, ⟨10.1007/978-3-642-14799-9_24⟩
Conference papers hal-01059183v1
Image document

Website Credential Storage and Two-Factor Web Authentication with a Java SIM

Jonathan Hart , Konstantinos Markantonakis , Keith Mayes
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.229-236, ⟨10.1007/978-3-642-12368-9_17⟩
Conference papers hal-01056084v1
Image document

Web Applications Usability Testing with Task Model Skeletons

Ivo Maly , Zdenek Mikovec
Third IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.158-165, ⟨10.1007/978-3-642-16488-0_13⟩
Conference papers hal-01055207v1
Image document

Wave Touch: Educational Game on Interactive Tabletop with Water Simulation

Joongho Lee , Won Moon , Kiwon Yeom , Dongwook Yoon , Dong-Young Kim , et al.
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.479-481, ⟨10.1007/978-3-642-15399-0_65⟩
Conference papers hal-01055596v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

Watermark Detection for Video Bookmarking Using Mobile Phone Camera

Peter Meerwald , Andreas Uhl
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.64-74, ⟨10.1007/978-3-642-13241-4_7⟩
Conference papers hal-01056367v1
Image document

ViSE - A Virtual Smart Environment for Usability Evaluation

Stefan Propp , Peter Forbrig
Third IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.38-45, ⟨10.1007/978-3-642-16488-0_4⟩
Conference papers hal-01055197v1
Image document

Virtual Team Performance Depends on Distributed Leadership

Nico van Dijk , Joost Broekens
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.91-102, ⟨10.1007/978-3-642-15399-0_9⟩
Conference papers hal-01055582v1
Image document

Virtual Expansion of Rainbow Tables

Vrizlynn Thing
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.243-256, ⟨10.1007/978-3-642-15506-2_17⟩
Conference papers hal-01060622v1
Image document

Virtual Blowgun System for Breathing Movement Exercise

Peichao Yu , Kazuhito Shiratori , Jun'Ichi Hoshino
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.278-285, ⟨10.1007/978-3-642-15399-0_28⟩
Conference papers hal-01055634v1
Image document

Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases

Romain Delamare , Freddy Munoz , Benoit Baudry , Yves Traon
22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.250-265, ⟨10.1007/978-3-642-16573-3_18⟩
Conference papers inria-00555069v2
Image document

Vegetation Interaction Game: Digital SUGOROKU of Vegetation Succession for Children

Akiko Deguchi , Shigenori Inagaki , Fusako Kusunoki , Etsuji Yamaguchi , Yoshiaki Takeda , et al.
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.493-495, ⟨10.1007/978-3-642-15399-0_70⟩
Conference papers hal-01055590v1
Image document

Vectorization for Java

Jiutao Nie , Buqi Cheng , Shisheng Li , Ligang Wang , Xiao-Feng Li
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.3-17, ⟨10.1007/978-3-642-15672-4_3⟩
Conference papers hal-01054962v1
Image document

Validating Evolutionary Algorithms on Volunteer Computing Grids

Travis Desell , Malik Magdon-Ismail , Boleslaw Szymanski , Carlos A. Varela , Heidi Newberg , et al.
10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.29-41, ⟨10.1007/978-3-642-13645-0_3⟩
Conference papers hal-01061080v1
Image document

Using Trust-Based Information Aggregation for Predicting Security Level of Systems

Siv Hilde Houmb , Sudip Chakraborty , Indrakshi Ray , Indrajit Ray
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers hal-01056685v1
Image document

Using Torrent Inflation to Efficiently Serve the Long Tail in Peer-Assisted Content Delivery Systems

Niklas Carlsson , Derek L. Eager , Anirban Mahanti
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.1-14, ⟨10.1007/978-3-642-12963-6_1⟩
Conference papers hal-01056308v1
Image document

Using Gis Tools to Support E_Participation - A Systematic Evaluation

Euripidis Loukis , Alexander Xenakis , Rob Peters , Yannis Charalabidis
Second IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.197-210, ⟨10.1007/978-3-642-15158-3_17⟩
Conference papers hal-01054839v1
Image document

Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet

Kenny Wang
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.37-48, ⟨10.1007/978-3-642-15506-2_3⟩
Conference papers hal-01060608v1
Image document

User-Centric Privacy Preservation in Data-Sharing Applications

Feng Gao , Jingsha He , Shufen Peng
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.423-431, ⟨10.1007/978-3-642-15672-4_35⟩
Conference papers hal-01054967v1
Image document

User Behavior Pattern Analysis and Prediction Based on Mobile Phone Sensors

Jiqiang Song , Eugene Y. Tang , Leibo Liu
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.177-189, ⟨10.1007/978-3-642-15672-4_16⟩
Conference papers hal-01054992v1
Image document

Unnecessary Image Pair Detection for a Large Scale Reconstruction

Jaekwang Lee , Chang-Joon Park
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.151-159, ⟨10.1007/978-3-642-15399-0_14⟩
Conference papers hal-01055647v1
Image document

Understanding Privacy Risk of Publishing Decision Trees

Zutao Zhu , Wenliang Du
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.33-48, ⟨10.1007/978-3-642-13739-6_3⟩
Conference papers hal-01056670v1
Image document

Understanding Formal Description of Pitch-Based Input

Ondřej Poláček , Zdeněk Míkovec
Third IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.190-197, ⟨10.1007/978-3-642-16488-0_16⟩
Conference papers hal-01055204v1
Image document

Uncertainty in Live Forensics

Antonio Savoldi , Paolo Gubian , Isao Echizen
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.171-184, ⟨10.1007/978-3-642-15506-2_12⟩
Conference papers hal-01060617v1
Image document

Ubiquitous Verification of Ubiquitous Systems

Reinhard Wilhelm , Matteo Maffei
8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.47-58, ⟨10.1007/978-3-642-16256-5_7⟩
Conference papers hal-01055377v1
Image document

Trust in Peer-to-Peer Content Distribution Protocols

Nicolai Kuntze , Carsten Rudolph , Andreas Fuchs
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.76-89, ⟨10.1007/978-3-642-12368-9_6⟩
Conference papers hal-01056065v1