Filter your results
- 815
- 27
- 815
- 814
- 104
- 15
- 12
- 788
- 815
- 9
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
WeLe-RAID: A SSD-Based RAID for System Endurance and Performance8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.248-262, ⟨10.1007/978-3-642-24403-2_20⟩
Conference papers
hal-01593031v1
|
||
|
Energy-Efficient Cryptographic Engineering ParadigmInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.78-88, ⟨10.1007/978-3-642-27585-2_7⟩
Conference papers
hal-01481508v1
|
||
|
Extracting Semantic Knowledge from Twitter3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.48-59, ⟨10.1007/978-3-642-23333-3_5⟩
Conference papers
hal-01589383v1
|
||
|
Learning Web Application Firewall - Benefits and Caveats1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.295-308, ⟨10.1007/978-3-642-23300-5_23⟩
Conference papers
hal-01590402v1
|
||
|
High Capacity FFT-Based Audio Watermarking12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.235-237, ⟨10.1007/978-3-642-24712-5_22⟩
Conference papers
hal-01596185v1
|
||
|
Predicting Selective Availability for Instant Messaging13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.503-520, ⟨10.1007/978-3-642-23765-2_35⟩
Conference papers
hal-01591801v1
|
||
|
Data-Centric Interactions on the Web13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.726-727, ⟨10.1007/978-3-642-23768-3_135⟩
Conference papers
hal-01596975v1
|
||
|
Evaluating Commonsense Knowledge with a Computer Game13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.348-355, ⟨10.1007/978-3-642-23774-4_28⟩
Conference papers
hal-01590550v1
|
||
|
N-Gram Based Secure Similar Document Detection23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers
hal-01586584v1
|
||
|
Health Care Reform and the Internet1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.82-88, ⟨10.1007/978-3-642-23300-5_7⟩
Conference papers
hal-01590392v1
|
||
|
Forensic Analysis of Plug Computers7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.275-287, ⟨10.1007/978-3-642-24212-0_21⟩
Conference papers
hal-01569554v1
|
||
|
Usability Evaluation in Software Development Practice13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.430-433, ⟨10.1007/978-3-642-23768-3_50⟩
Conference papers
hal-01596971v1
|
||
|
Collaboration between ISPs for Efficient Overlay Traffic Management10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.109-120, ⟨10.1007/978-3-642-20798-3_9⟩
Conference papers
hal-01597981v1
|
||
|
Encoding Context-Sensitivity in Reo into Non-Context-Sensitive Semantic Models13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.31-48, ⟨10.1007/978-3-642-21464-6_3⟩
Conference papers
hal-01582996v1
|
||
|
Development of a Methodology for Evaluating the Quality in Use of Web 2.0 Applications13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.382-385, ⟨10.1007/978-3-642-23768-3_38⟩
Conference papers
hal-01596931v1
|
||
|
The Difference Matters: Benchmarking Visual Performance of a Cognitive Pilot Model13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.240-247, ⟨10.1007/978-3-642-23768-3_20⟩
Conference papers
hal-01596923v1
|
||
|
An Investigative Framework for Incident Analysis7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.23-34, ⟨10.1007/978-3-642-24212-0_2⟩
Conference papers
hal-01569558v1
|
||
|
A Systematic Evaluation of Mobile Applications for Diabetes Management13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.466-469, ⟨10.1007/978-3-642-23768-3_59⟩
Conference papers
hal-01596981v1
|
||
|
Entropy of Selectively Encrypted Strings5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.234-243, ⟨10.1007/978-3-642-21040-2_16⟩
Conference papers
hal-01573290v1
|
||
|
Power and Participation in Digital Late Modernity: Towards a Network Logic3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.109-120, ⟨10.1007/978-3-642-23333-3_10⟩
Conference papers
hal-01589370v1
|
||
|
Efficient Distributed Signature Analysis5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.13-25, ⟨10.1007/978-3-642-21484-4_2⟩
Conference papers
hal-01585852v1
|
||
|
Cryptanalysis of a SIP Authentication Scheme12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers
hal-01596196v1
|
||
|
Do Teams Achieve Usability Goals? Evaluating Goal Achievement with Usability Goals Setting Tool13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.313-330, ⟨10.1007/978-3-642-23774-4_26⟩
Conference papers
hal-01590579v1
|
||
|
Using Availability Heuristics in Game Design to Introduce Children to Energy Sufficient Behaviours at Home13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.661-664, ⟨10.1007/978-3-642-23768-3_107⟩
Conference papers
hal-01597007v1
|
||
|
Mobility in Collaborative Alert Systems: Building Trust through ReputationInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.251-262, ⟨10.1007/978-3-642-23041-7_24⟩
Conference papers
hal-01587832v1
|
||
|
TROCAS: Communication Skills Development in Children with Autism Spectrum Disorders via ICT13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.644-647, ⟨10.1007/978-3-642-23768-3_103⟩
Conference papers
hal-01596916v1
|
||
|
Towards a Structured Online Consultation Tool3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.286-297, ⟨10.1007/978-3-642-23333-3_25⟩
Conference papers
hal-01589387v1
|
||
|
Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.111-122, ⟨10.1007/978-3-642-24403-2_9⟩
Conference papers
hal-01593006v1
|
||
|
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.116-127, ⟨10.1007/978-3-642-21040-2_8⟩
Conference papers
hal-01573301v1
|
||
|
Using Card Sorts for Understanding Website Information Architectures: Technological, Methodological and Cultural Issues13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.309-322, ⟨10.1007/978-3-642-23768-3_26⟩
Conference papers
hal-01596920v1
|