Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

540 results
Deposit type : Notice
Deposit type : Fulltext
Image document

Designing and Evaluating Dashboards for Multi-agency Crisis Preparation: A Living Lab

Nitesh Bharosa , Marijn Janssen , Sebastiaan Meijer , Fritjof Brave
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.180-191, ⟨10.1007/978-3-642-14799-9_16⟩
Conference papers hal-01056587v1
Image document

A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)

Nicolas Racz , Edgar Weippl , Andreas Seufert
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers hal-01056386v1
Image document

NetPot: Easy Meal Enjoyment for Distant Diners

Zoltan Foley-Fisher , Vincent Tsao , Johnty Wang , Sid Fels
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.446-448, ⟨10.1007/978-3-642-15399-0_56⟩
Conference papers hal-01055606v1
Image document

An Energy-Efficient FPGA-Based Packet Processing Framework

Daniel Horvath , Imre Bertalan , Istvan Moldován , Tuan Anh Trinh
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.31-40, ⟨10.1007/978-3-642-13971-0_4⟩
Conference papers hal-01056561v1
Image document

SIP Proxies: New Reflectors in the Internet

Ge Zhang , Jordi Jaen Pallares , Yacine Rebahi , Simone Fischer-Hübner
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.142-153, ⟨10.1007/978-3-642-13241-4_14⟩
Conference papers hal-01056382v1
Image document

Translation from UML to SPN Model: A Performance Modeling Framework

Razib Hayat Khan , Poul E. Heegaard
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.270-271, ⟨10.1007/978-3-642-13971-0_29⟩
Conference papers hal-01056486v1
Image document

Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services

Murat Gunestas , Murad Mehmet , Duminda Wijesekera
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers hal-01060614v1
Image document

An Open and Extensible Service Discovery for Ubiquitous Communication Systems

Nor Shahniza Kamal Bashah , Ivar Jørstad , Do Thanh
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.272-273, ⟨10.1007/978-3-642-13971-0_30⟩
Conference papers hal-01056484v1
Image document

Mining Likely Properties of Access Control Policies via Association Rule Mining

Jeehyun Hwang , Tao Xie , Vincent Hu , Mine Altunay
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers hal-01056688v1
Image document

Formal Software Verification: How Close Are We?

Gerard J. Holzmann
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.1, ⟨10.1007/978-3-642-13464-7_1⟩
Conference papers hal-01055211v1
Image document

Modelling Social-Aware Forwarding in Opportunistic Networks

Chiara Boldrini , Marco Conti , Andrea Passarella
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.141-152, ⟨10.1007/978-3-642-25575-5_12⟩
Conference papers hal-01586891v1
Image document

Toward a Science of Digital Forensic Evidence Examination

Fred Cohen
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.17-35, ⟨10.1007/978-3-642-15506-2_2⟩
Conference papers hal-01060607v1
Image document

A Biometrics-Based Solution to Combat SIM Swap Fraud

Louis Jordaan , Basie Von Solms
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩
Conference papers hal-01581328v1
Image document

Facing Complexity in Systems Management

Metin Feridun
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.1-1, ⟨10.1007/978-3-642-13986-4_1⟩
Conference papers hal-01056636v1
Image document

Formal Semantics and Analysis of Behavioral AADL Models in Real-Time Maude

Peter Csaba Ölveczky , Artur Boronat , José Meseguer
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.47-62, ⟨10.1007/978-3-642-13464-7_5⟩
Conference papers hal-01055147v1
Image document

Knowledge Sharing in eCollaboration

Neil Ireson , Gregoire Burel
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.351-362, ⟨10.1007/978-3-642-14799-9_30⟩
Conference papers hal-01059195v1
Image document

System and context - on a discernable source of emergent game play and the process-oriented method

Barbara Grüter , Mirima Oks , Andreas Lochwitz
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.240-247, ⟨10.1007/978-3-642-15399-0_23⟩
Conference papers hal-01059224v1
Image document

Desktop-to-Mobile Web Adaptation through Customizable Two-Dimensional Semantic Redesign

Fabio Paternò , Giuseppe Zichittella
Third IFIP WG 13.2 International Conference on Human-Centred Software Engineering (HCSE), Oct 2010, Reykjavik, Iceland. pp.79-94, ⟨10.1007/978-3-642-16488-0_7⟩
Conference papers hal-01055195v1
Image document

On the Security of a Two-Factor Authentication Scheme

Luigi Catuogno , Clemente Galdi
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.245-252, ⟨10.1007/978-3-642-12368-9_19⟩
Conference papers hal-01056082v1
Image document

Combined Attacks and Countermeasures

Eric Vetillard , Anthony Ferrari
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.133-147, ⟨10.1007/978-3-642-12510-2_10⟩
Conference papers hal-01056108v1
Image document

Model-Driven Service Level Management

Anacleto Correia , Fernando Brito Abreu
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.85-88, ⟨10.1007/978-3-642-13986-4_10⟩
Conference papers hal-01056646v1
Image document

Secure Outsourcing of DNA Searching via Finite Automata

Marina Blanton , Mehrdad Aliasgari
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.49-64, ⟨10.1007/978-3-642-13739-6_4⟩
Conference papers hal-01056669v1
Image document

Evaluating the Risk of Adopting RBAC Roles

Alessandro Colantonio , Roberto Pietro , Alberto Ocello , Nino Vincenzo Verde
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.303-310, ⟨10.1007/978-3-642-13739-6_21⟩
Conference papers hal-01056679v1
Image document

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

Karl Kümmel , Claus Vielhauer , Tobias Scheidat , Dirk Franke , Jana Dittmann
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers hal-01056380v1
Image document

Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation

Jochen Kögel , Sebastian Scholz
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.177-187, ⟨10.1007/978-3-642-13971-0_17⟩
Conference papers hal-01056499v1
Image document

The 'Interactive' of Interactive Storytelling: Customizing the Gaming Experience

Barbaros Bostan , Tim Marsh
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.472-475, ⟨10.1007/978-3-642-15399-0_63⟩
Conference papers hal-01055598v1
Image document

Multipresence-Enabled Mobile Spatial Audio Interfaces

Michael Cohen , Owen Noel Newton Fernando , Adrian David Cheok
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.434-436, ⟨10.1007/978-3-642-15399-0_52⟩
Conference papers hal-01055610v1
Image document

Affective Interacting Art

Youngmi Kim , Jongsoo Choi
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.413-415, ⟨10.1007/978-3-642-15399-0_45⟩
Conference papers hal-01055617v1
Image document

Entertaining Education: User Friendly Cutting Interface for Digital Textbooks

Gahee Kim , Hyun-Roc Yang , Kyung-Kyu Kang , Dongho Kim
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.405-412, ⟨10.1007/978-3-642-15399-0_44⟩
Conference papers hal-01055618v1
Image document

Choshi Design System from 2D Images

Natsuki Takayama , Shubing Meng , Takahashi Hiroki
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.358-365, ⟨10.1007/978-3-642-15399-0_38⟩
Conference papers hal-01055624v1