Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : Shenzhen Institutes of Advanced Technology
labStructName_s : Laboratoire d'informatique de l'école normale supérieure
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks

Jianrui Yuan , Jintao Meng
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.214-231, ⟨10.1007/978-3-642-24403-2_18⟩
Conference papers hal-01593033v1
Image document

Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features

Yingdong Ma , Xiankai Chen , George Chen
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.176-184, ⟨10.1007/978-3-642-24403-2_15⟩
Conference papers hal-01593010v1