Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : Laboratoire d'informatique de l'école normale supérieure
labStructName_s : Computer Science Department - Carnegie Mellon University
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point

Nicholas C. Valler , B. Aditya Prakash , Hanghang Tong , Michalis Faloutsos , Christos Faloutsos
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.266-280, ⟨10.1007/978-3-642-20757-0_21⟩
Conference papers hal-01583416v1
Image document

Mixer: Mixed-Initiative Data Retrieval and Integration by Example

Steven Gardiner , Anthony Tomasic , John Zimmerman , Rafae Aziz , Kathryn Rivard
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.426-443, ⟨10.1007/978-3-642-23774-4_36⟩
Conference papers hal-01590546v1