Filter your results
- 815
- 27
- 815
- 814
- 104
- 15
- 12
- 788
- 815
- 9
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
BotTrack: Tracking Botnets Using NetFlow and PageRank10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.1-14, ⟨10.1007/978-3-642-20757-0_1⟩
Conference papers
inria-00613597v1
|
||
|
Machine Learning Approach for IP-Flow Record Anomaly Detection10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.28-39, ⟨10.1007/978-3-642-20757-0_3⟩
Conference papers
inria-00613602v1
|
||
|
Barefooted Usability Evaluation: Addressing the Mindset, Resources and Competences13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.374-377, ⟨10.1007/978-3-642-23768-3_36⟩
Conference papers
hal-01596950v1
|
||
|
Cross-Entropy Optimized Cognitive Radio PoliciesInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.13-21, ⟨10.1007/978-3-642-23041-7_2⟩
Conference papers
hal-01587842v1
|
||
|
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.293-300, ⟨10.1007/978-3-642-22348-8_25⟩
Conference papers
hal-01586593v1
|
||
|
Remote Usability Testing Using Eyetracking13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.356-361, ⟨10.1007/978-3-642-23774-4_29⟩
Conference papers
hal-01590555v1
|
||
|
Energy-Aware Hardware Implementation of Network CodingInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.137-144, ⟨10.1007/978-3-642-23041-7_14⟩
Conference papers
hal-01587833v1
|
||
|
Evaluating Physical/Virtual Occlusion Management Techniques for Horizontal Displays13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.391-408, ⟨10.1007/978-3-642-23765-2_27⟩
Conference papers
hal-01591810v1
|
||
|
FAIDECS: Fair Decentralized Event Correlation12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.228-248, ⟨10.1007/978-3-642-25821-3_12⟩
Conference papers
hal-01597762v1
|
||
|
Redundancy and Collaboration in WikibooksProceedings of the 13th International Conference on Human-Computer Interaction, Sep 2011, Lisbon, Portugal. pp.215-232, ⟨10.1007/978-3-642-23774-4_20⟩
Conference papers
inria-00595516v2
|
||
|
EFD: An efficient low-overhead scheduler10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.150-163, ⟨10.1007/978-3-642-20798-3_12⟩
Conference papers
hal-00930973v1
|
||
|
Mobility Prediction Based Neighborhood Discovery in Mobile Ad Hoc Networks10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.241-253, ⟨10.1007/978-3-642-20757-0_19⟩
Conference papers
inria-00598976v1
|
||
|
Secure Negotiation for Manual Authentication Protocols12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.214-221, ⟨10.1007/978-3-642-24712-5_20⟩
Conference papers
hal-01596202v1
|
||
|
A Random Walk Approach to Modeling the Dynamics of the Blogosphere10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.294-306, ⟨10.1007/978-3-642-20757-0_23⟩
Conference papers
hal-01583405v1
|
||
|
Cognitive Ergonomics in Visualization8th Workshop on Human-Computer Interaction and Visualization (HCIV), Sep 2011, Lisbon, Portugal. pp.80-94, ⟨10.1007/978-3-642-54894-9_7⟩
Conference papers
hal-01414682v1
|
||
|
Decoding Algorithms for Random Linear Network CodesInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.129-136, ⟨10.1007/978-3-642-23041-7_13⟩
Conference papers
hal-01587835v1
|
||
|
Kodo: An Open and Research Oriented Network Coding LibraryInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.145-152, ⟨10.1007/978-3-642-23041-7_15⟩
Conference papers
hal-01587857v1
|
||
|
Don’t Look at Me, I’m Talking to You: Investigating Input and Output Modalities for In-Vehicle Systems13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.675-691, ⟨10.1007/978-3-642-23771-3_49⟩
Conference papers
hal-01590843v1
|
||
|
Towards a Context Oriented Approach to Ethical Evaluation of Interactive Technologies13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.628-631, ⟨10.1007/978-3-642-23768-3_99⟩
Conference papers
hal-01596939v1
|
||
|
Confidant: Protecting OSN Data without Locking It Up12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.61-80, ⟨10.1007/978-3-642-25821-3_4⟩
Conference papers
hal-01597763v1
|
||
|
A Novel Scalable IPv6 Lookup Scheme Using Compressed Pipelined Tries10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.406-419, ⟨10.1007/978-3-642-20757-0_32⟩
Conference papers
hal-01583419v1
|
||
|
Access Path Based Source Address Validation in Mobile IPv68th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.334-349, ⟨10.1007/978-3-642-24403-2_26⟩
Conference papers
hal-01593028v1
|
||
|
TRAWL – A Traffic Route Adapted Weighted Learning Algorithm9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.1-14, ⟨10.1007/978-3-642-21560-5_1⟩
Conference papers
hal-01583661v1
|
||
|
Learning-Based Testing for Reactive Systems Using Term Rewriting Technology23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.97-114, ⟨10.1007/978-3-642-24580-0_8⟩
Conference papers
hal-01583917v1
|
||
|
Modelling and Evaluation of CCN-Caching Trees10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.78-91, ⟨10.1007/978-3-642-20757-0_7⟩
Conference papers
hal-01583399v1
|
||
|
WeLe-RAID: A SSD-Based RAID for System Endurance and Performance8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.248-262, ⟨10.1007/978-3-642-24403-2_20⟩
Conference papers
hal-01593031v1
|
||
|
Energy-Efficient Cryptographic Engineering ParadigmInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.78-88, ⟨10.1007/978-3-642-27585-2_7⟩
Conference papers
hal-01481508v1
|
||
|
Extracting Semantic Knowledge from Twitter3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.48-59, ⟨10.1007/978-3-642-23333-3_5⟩
Conference papers
hal-01589383v1
|
||
|
Learning Web Application Firewall - Benefits and Caveats1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.295-308, ⟨10.1007/978-3-642-23300-5_23⟩
Conference papers
hal-01590402v1
|
||
|
High Capacity FFT-Based Audio Watermarking12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.235-237, ⟨10.1007/978-3-642-24712-5_22⟩
Conference papers
hal-01596185v1
|