Filter your results
- 814
- 27
- 814
- 814
- 104
- 15
- 12
- 787
- 814
- 9
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.231-243, ⟨10.1007/978-3-642-24212-0_18⟩
Conference papers
hal-01569550v1
|
||
|
Paving the Way for Future Research in ICT for Governance and Policy Modelling10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.50-61, ⟨10.1007/978-3-642-22878-0_5⟩
Conference papers
hal-01589071v1
|
||
|
Democratizing Transactional Programming12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.1-19, ⟨10.1007/978-3-642-25821-3_1⟩
Conference papers
hal-01597760v1
|
||
|
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.220-227, ⟨10.1007/978-3-642-23300-5_17⟩
Conference papers
hal-01590386v1
|
||
|
Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.135-148, ⟨10.1007/978-3-642-23300-5_11⟩
Conference papers
hal-01590406v1
|
||
|
Challenges for Dynamic Analysis of iOS ApplicationsInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.65-77, ⟨10.1007/978-3-642-27585-2_6⟩
Conference papers
hal-01481507v1
|
||
|
Structuring and Composition Mechanisms to Address Scalability Issues in Task Models13th International Conference on Human-Computer Interaction (INTERACT 2011), Sep 2011, Lisbon, Portugal. pp.589-609, ⟨10.1007/978-3-642-23765-2_40⟩
Conference papers
hal-01591816v1
|
||
|
A Tool Support for Web Applications Adaptation Using Navigation History13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.340-348, ⟨10.1007/978-3-642-23768-3_28⟩
Conference papers
hal-01596974v1
|
||
|
An Efficient Management of Correlation Sets with Broadcast13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.80-94, ⟨10.1007/978-3-642-21464-6_6⟩
Conference papers
hal-01582988v1
|
||
|
Traffic Engineering Approaches Using Multicriteria Optimization Techniques9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.104-115, ⟨10.1007/978-3-642-21560-5_9⟩
Conference papers
hal-01583655v1
|
||
|
Urban-X: A Self-organizing Cognitive Wireless Mesh Network for Dense City Environments9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.398-409, ⟨10.1007/978-3-642-21560-5_33⟩
Conference papers
hal-01583638v1
|
||
|
Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.72-84, ⟨10.1007/978-3-642-24712-5_6⟩
Conference papers
hal-01596199v1
|
||
|
Trust Agreement in Wireless Mesh Networks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers
hal-01573304v1
|
||
|
Architecturing Conflict Handling of Pervasive Computing Resources11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.92-105, ⟨10.1007/978-3-642-21387-8_8⟩
Conference papers
inria-00581604v1
|
||
|
An Accurate Type System for Information Flow in Presence of Arrays13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.153-167, ⟨10.1007/978-3-642-21461-5_10⟩
Conference papers
hal-01583316v1
|
||
|
An Implementation of Network Coding with Association Policies in Heterogeneous NetworksInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.110-118, ⟨10.1007/978-3-642-23041-7_11⟩
Conference papers
hal-01587852v1
|
||
|
A Process Calculus for Dynamic Networks13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik,, Iceland. pp.213-227, ⟨10.1007/978-3-642-21461-5_14⟩
Conference papers
hal-01583319v1
|
||
|
Modeling the Performance of Ring Based DHTs in the Presence of Network Address Translators11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.15-28, ⟨10.1007/978-3-642-21387-8_2⟩
Conference papers
hal-01583576v1
|
||
|
Usurp: Distributed NAT Traversal for Overlay Networks11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.29-42, ⟨10.1007/978-3-642-21387-8_3⟩
Conference papers
hal-01583583v1
|
||
|
An Index Structure for Private Data Outsourcing23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.247-254, ⟨10.1007/978-3-642-22348-8_20⟩
Conference papers
hal-01586578v1
|
||
|
Privacy-Preserving Data Mining: A Game-Theoretic Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.186-200, ⟨10.1007/978-3-642-22348-8_15⟩
Conference papers
hal-01586580v1
|
||
|
Rescuing Wireless Sensor Networks Security from Science FictionInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.192-206, ⟨10.1007/978-3-642-23041-7_19⟩
Conference papers
hal-01587848v1
|
||
|
Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained RoutingInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.207-218, ⟨10.1007/978-3-642-23041-7_20⟩
Conference papers
hal-01587851v1
|
||
|
Reference Framework for E-participation Projects3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.145-156, ⟨10.1007/978-3-642-23333-3_13⟩
Conference papers
hal-01589375v1
|
||
|
Combining Social and Government Open Data for Participatory Decision-Making3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.36-47, ⟨10.1007/978-3-642-23333-3_4⟩
Conference papers
hal-01589378v1
|
||
|
An Overview Assessment of ePetitioning Tools in the English Local Government3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.204-215, ⟨10.1007/978-3-642-23333-3_18⟩
Conference papers
hal-01589380v1
|
||
|
User Acceptance of SMS-Based eGovernment Services10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.75-87, ⟨10.1007/978-3-642-22878-0_7⟩
Conference papers
hal-01589086v1
|
||
|
Terminal–Side QoE Estimations for Cross–Layer Network Control9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.140-149, ⟨10.1007/978-3-642-21560-5_12⟩
Conference papers
hal-01583637v1
|
||
|
Link-Layer Based Anycast Routing for a Dynamic and Distributed Portal Selection in Wireless Mesh Networks9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.374-385, ⟨10.1007/978-3-642-21560-5_31⟩
Conference papers
hal-01583642v1
|
||
|
Analysis of Client Relay Network with Opportunistic Cooperation9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.247-258, ⟨10.1007/978-3-642-21560-5_21⟩
Conference papers
hal-01583660v1
|