Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

540 results
Deposit type : Notice
Deposit type : Fulltext
Image document

Omni-Directional Display System for Group Activity on Life Review Therapy

Tomoyuki Honda , Kunio Sakamoto
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.452-455, ⟨10.1007/978-3-642-15399-0_58⟩
Conference papers hal-01055604v1
Image document

Tracking and Explaining E-Participation in India

Rajeev Gowda , Hemangini Gupta
Second IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.66-81, ⟨10.1007/978-3-642-15158-3_6⟩
Conference papers hal-01054835v1
Image document

Vectorization for Java

Jiutao Nie , Buqi Cheng , Shisheng Li , Ligang Wang , Xiao-Feng Li
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.3-17, ⟨10.1007/978-3-642-15672-4_3⟩
Conference papers hal-01054962v1
Image document

Narrative Entertainment System with Tabletop Interface

Takashi Mori , Katsutoki Hamana , Chencheng Feng , Jun'Ichi Hoshino
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.422-424, ⟨10.1007/978-3-642-15399-0_48⟩
Conference papers hal-01059011v1
Image document

AUTOSAR Appropriates Functional Safety and Multi-core Exploitation

Bert Böddeker
8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.2, ⟨10.1007/978-3-642-16256-5_2⟩
Conference papers hal-01061223v1
Image document

Attacks on Java Card 3.0 Combining Fault and Logical Attacks

Guillaume Barbu , Hugues Thiebeauld , Vincent Guerin
Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010, Apr 2010, Passau, Germany. pp.148-163, ⟨10.1007/978-3-642-12510-2_11⟩
Conference papers hal-00692165v1
Image document

Distributed and Secure Access Control in P2P Databases

Angela Bonifati , Ruilin Liu , Hui (wendy) Wang
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.113-129, ⟨10.1007/978-3-642-13739-6_8⟩
Conference papers hal-01056665v1
Image document

Fraud Detection for Voice over IP Services on Next-Generation Networks

Igor Ruiz-Agundez , Yoseba K. Penya , Pablo Garcia Bringas
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.199-212, ⟨10.1007/978-3-642-12368-9_14⟩
Conference papers hal-01056086v1
Image document

Forensic Tracking and Mobility Prediction in Vehicular Networks

Saif Al-Kuwari , Stephen Wolthusen
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.91-105, ⟨10.1007/978-3-642-15506-2_7⟩
Conference papers hal-01060612v1
Image document

When ABE Meets RSS

Yu Chen , Hyun Sung Kim , Jianbin Hu , Zhong Chen
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.319-326, ⟨10.1007/978-3-642-13739-6_23⟩
Conference papers hal-01056677v1
Image document

FloPSy - Search-Based Floating Point Constraint Solving for Symbolic Execution

Kiran Lakhotia , Nikolai Tillmann , Mark Harman , Jonathan Halleux
22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.142-157, ⟨10.1007/978-3-642-16573-3_11⟩
Conference papers hal-01055253v1
Image document

WISeMid: Middleware for Integrating Wireless Sensor Networks and the Internet

Jeisa P. O. Domingues , Antonio V. L. Damaso , Nelson S. Rosa
10th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS) / Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.70-83, ⟨10.1007/978-3-642-13645-0_6⟩
Conference papers hal-01061077v1
Image document

Security Analysis of Mobile Phones Used as OTP Generators

Håvard Raddum , Lars Hopland Nestås , Kjell Jørgen Hole
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.324-331, ⟨10.1007/978-3-642-12368-9_26⟩
Conference papers hal-01056074v1
Image document

Ten Years of eGovernment: The 'End of History' and New Beginning

Åke Grönlund
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.13-24, ⟨10.1007/978-3-642-14799-9_2⟩
Conference papers hal-01059154v1
Image document

Multiple Page Recognition and Tracking for Augmented Books

Kyusung Cho , Jaesang Yoo , Jinki Jung , Hyun S. Yang
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.127-138, ⟨10.1007/978-3-642-15399-0_12⟩
Conference papers hal-01055649v1
Image document

Storage Device Performance Prediction with Selective Bagging Classification and Regression Tree

Lei Zhang , Guiquan Liu , Xuechen Zhang , Song Jiang , Enhong Chen
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.121-133, ⟨10.1007/978-3-642-15672-4_11⟩
Conference papers hal-01054984v1
Image document

Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications

Qi Huang , Daniel A. Freedman , Ymir Vigfusson , Ken Birman , Bo Peng
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.148-168, ⟨10.1007/978-3-642-16955-7_8⟩
Conference papers hal-01055267v1
Image document

A Model-Based Design Methodology with Contracts to Enhance the Development Process of Safety-Critical Systems

Andreas Baumgart , Philipp Reinkemeier , Achim Rettberg , Ingo Stierand , Eike Thaden , et al.
8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.59-70, ⟨10.1007/978-3-642-16256-5_8⟩
Conference papers hal-01055376v1
Image document

Analyzing the Structure of the EGOV Conference Community

Nuša Erman , Ljupèo Todorovski
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.73-84, ⟨10.1007/978-3-642-14799-9_7⟩
Conference papers hal-01056565v1
Image document

Towards Flexible and Secure Distributed Aggregation

Kristján Valur Jónsson , Mads F. Dam
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.159-162, ⟨10.1007/978-3-642-13986-4_22⟩
Conference papers hal-01056633v1
Image document

A Worst Case Performance Model for TDM Virtual Circuit in NoCs

Zhipeng Chen , Axel Jantsch
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.452-461, ⟨10.1007/978-3-642-15672-4_38⟩
Conference papers hal-01054964v1
Image document

A Learning-based Approach to Unit Testing of Numerical Software

Karl Meinke , Fei Niu
22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.221-235, ⟨10.1007/978-3-642-16573-3_16⟩
Conference papers hal-01055250v1
Image document

Interactive Tabu Search vs. Interactive Genetic Algorithm

Tatsuya Hirokata , Masataka Tokumaru , Noriaki Muranaka
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.505-507, ⟨10.1007/978-3-642-15399-0_74⟩
Conference papers hal-01055586v1
Image document

Server Guaranteed Cap: An incentive mechanism for maximizing streaming quality in heterogeneous overlays

Ilias Chatzidrossos , György Dan , Viktoria Fodor
9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.315-326, ⟨10.1007/978-3-642-12963-6_25⟩
Conference papers hal-01059106v1
Image document

An Efficient Simulation Algorithm for Cache of Random Replacement Policy

Shuchang Zhou
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.144-154, ⟨10.1007/978-3-642-15672-4_13⟩
Conference papers hal-01054982v1
Image document

User Behavior Pattern Analysis and Prediction Based on Mobile Phone Sensors

Jiqiang Song , Eugene Y. Tang , Leibo Liu
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.177-189, ⟨10.1007/978-3-642-15672-4_16⟩
Conference papers hal-01054992v1
Image document

Scalable Service Performance Monitoring

Idilio Drago , Aiko Pras
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.175-178, ⟨10.1007/978-3-642-13986-4_26⟩
Conference papers hal-01056629v1
Image document

Forensic Analysis of Popular Chinese Internet Applications

Ying Yang , Kam-Pui Chow , Lucas Hui , Chunxiao Wang , Lijuan Chen , et al.
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.285-295, ⟨10.1007/978-3-642-15506-2_20⟩
Conference papers hal-01060625v1
Image document

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics

Frank Law , Patrick Chan , Siu-Ming Yiu , Benjamin Tang , Pierre Lai , et al.
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers hal-01060618v1
Image document

Statistical Detection of Malicious PE-Executables for Fast Offline Analysis

Ronny Merkel , Tobias Hoppe , Christian Kraetzer , Jana Dittmann
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.93-105, ⟨10.1007/978-3-642-13241-4_10⟩
Conference papers hal-01056387v1