Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

842 results
Deposit type : Fulltext
Deposit type : Annex
Image document

Low-Attention Forwarding for Mobile Network Covert Channels

Steffen Wendzel , Jörg Keller
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.122-133, ⟨10.1007/978-3-642-24712-5_10⟩
Conference papers hal-01596189v1
Image document

Efficient Prevention of Credit Card Leakage from Enterprise Networks

Matthew Hall , Reinoud Koornstra , Miranda Mowbray
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.238-240, ⟨10.1007/978-3-642-24712-5_23⟩
Conference papers hal-01596206v1
Image document

iLeger: A Web Based Application for Participative Elections

Artur Afonso Sousa , Pedro Agante , Luís Borges Gouveia
3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.228-239, ⟨10.1007/978-3-642-23333-3_20⟩
Conference papers hal-01589371v1
Image document

Direct Democracy Catalysed by Resident-to-Resident Online Deliberation

Rean van Der Merwe , Anthony Meehan
3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.169-179, ⟨10.1007/978-3-642-23333-3_15⟩
Conference papers hal-01589394v1
Image document

Tangoscope: A Tangible Audio Device for Tabletop Interaction

Jörg Edelmann , Yvonne Kammerer , Birgit Imhof , Peter Gerjets , Wolfgang Strasser
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.427-434, ⟨10.1007/978-3-642-23765-2_29⟩
Conference papers hal-01591804v1
Image document

Sharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours

Bernardo Reynolds , Jayant Venkatanathan , Jorge Gonçalves , Vassilis Kostakos
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.204-215, ⟨10.1007/978-3-642-23765-2_14⟩
Conference papers hal-01591807v1
Image document

Study on the Usability of a Haptic Menu for 3D Interaction

Giandomenico Caruso , Elia Gatti , Monica Bordegoni
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.186-193, ⟨10.1007/978-3-642-23771-3_15⟩
Conference papers hal-01590854v1
Image document

Towards User Centric Data Governance and Control in the Cloud

Stephan Gross , Alexander Schill
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.132-144, ⟨10.1007/978-3-642-27585-2_11⟩
Conference papers hal-01481500v1
Image document

The Centre for Internationalization and Usability: Enabling Culture-Centred Design for All

José Abdelnour-Nocera , Andy Smith , John Moore , Cecilia Oyugi , Souleymane Camara , et al.
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.683-684, ⟨10.1007/978-3-642-23768-3_114⟩
Conference papers hal-01596978v1
Image document

Cross-Entropy Optimized Cognitive Radio Policies

Boris Oklander , Moshe Sidi
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.13-21, ⟨10.1007/978-3-642-23041-7_2⟩
Conference papers hal-01587842v1
Image document

Exploring Serendipity’s Precipitating Conditions

Lori Mccay-Peet
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.398-401, ⟨10.1007/978-3-642-23768-3_42⟩
Conference papers hal-01596895v1

Availability, Reliability and Security for Business, Enterprise and Health Information Systems

A Min Tjoa , Gerald Quirchmayr , Ilsun You , Lida Xu
Springer, LNCS-6908, 2011, Lecture Notes in Computer Science, 978-3-642-23299-2. ⟨10.1007/978-3-642-23300-5⟩
Books hal-01590383v1
Image document

Redundancy and Collaboration in Wikibooks

Ilaria Liccardi , Olivier Chapuis , Ching-Man Au Yeung , Wendy Mackay
Proceedings of the 13th International Conference on Human-Computer Interaction, Sep 2011, Lisbon, Portugal. pp.215-232, ⟨10.1007/978-3-642-23774-4_20⟩
Conference papers inria-00595516v2
Image document

Digital Profiling: A Computer Forensics Approach

Clara Colombini , Antonio Colella
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.330-343, ⟨10.1007/978-3-642-23300-5_26⟩
Conference papers hal-01590393v1
Image document

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach

Valentina Ciriani , Sabrina De Capitani Di Vimercati , Sara Foresti , Giovanni Livraga , Pierangela Samarati
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.44-59, ⟨10.1007/978-3-642-22348-8_6⟩
Conference papers hal-01586589v1

NETWORKING2011: 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Part 1

Jordi Domingo-Pascual , Pietro Manzoni , Sergio Palazzo , Ana Pont , Caterina Scoglio
Springer, LNCS-6640, 2011, Lecture Notes in Computer Science, 978-3-642-20756-3. ⟨10.1007/978-3-642-20757-0⟩
Books hal-01583397v1
Image document

NeuroCast: Adaptive Multi-source P2P Video Streaming Application for Wireless Networks

Carlos Gañán , Juan Caubet , Sergi Reñé , Jorge Mata-Díaz , Juan J. Alins , et al.
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.272-284, ⟨10.1007/978-3-642-21560-5_23⟩
Conference papers hal-01583662v1
Image document

On the Uplink Performance of TCP in Multi-rate 802.11 WLANs

Naeem Khademi , Michael Welzl , Renato Lo Cigno
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.368-378, ⟨10.1007/978-3-642-20798-3_28⟩
Conference papers hal-01597975v1
Image document

Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems

Shahriar Bijani , David Robertson
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.177-180, ⟨10.1007/978-3-642-21484-4_22⟩
Conference papers hal-01585854v1
Image document

EFD: An efficient low-overhead scheduler

Jinbang Chen , Martin Heusse , Guillaume Urvoy-Keller
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.150-163, ⟨10.1007/978-3-642-20798-3_12⟩
Conference papers hal-00930973v1
Image document

How Technology Influences the Therapeutic Process: A Comparative Field Evaluation of Augmented Reality and In Vivo Exposure Therapy for Phobia of Small Animals

Maja Wrzesien , Jean-Marie Burkhardt , Mariano Alcañiz , Cristina Botella
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.523-540, ⟨10.1007/978-3-642-23774-4_43⟩
Conference papers hal-01590554v1
Image document

Mobile Identity Management

Jaap-Henk Hoepman
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.253-253, ⟨10.1007/978-3-642-24712-5_27⟩
Conference papers hal-01596192v1
Image document

Selective Modeling to Support Task Migratability of Interactive Artifacts

Anke Dittmar , Peter Forbrig
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.571-588, ⟨10.1007/978-3-642-23765-2_39⟩
Conference papers hal-01591828v1
Image document

Elaborating Analysis Models with Tool Support

Gregor Buchholz , Peter Forbrig
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.511-514, ⟨10.1007/978-3-642-23768-3_70⟩
Conference papers hal-01596992v1
Image document

Culture and Facial Expressions: A Case Study with a Speech Interface

Beant Dhillon , Rafal Kocielnik , Ioannis Politis , Marc Swerts , Dalila Szostak
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.392-404, ⟨10.1007/978-3-642-23771-3_29⟩
Conference papers hal-01590881v1
Image document

Strategyproof Mechanisms for Content Delivery via Layered Multicast

Ajay Gopinathan , Zongpeng Li
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.82-96, ⟨10.1007/978-3-642-20798-3_7⟩
Conference papers hal-01597964v1
Image document

UEF: Ubiquity Evaluation Framework

Bruno Sousa , Kostas Pentikousis , Marilia Curado
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.92-103, ⟨10.1007/978-3-642-21560-5_8⟩
Conference papers hal-01583644v1
Image document

Evoking Comprehensive Mental Models of Anonymous Credentials

Erik Wästlund , Julio Angulo , Simone Fischer-Hübner
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.1-14, ⟨10.1007/978-3-642-27585-2_1⟩
Conference papers hal-01481502v1
Image document

On the Dimensioning of an Aggregation Service for P2P Service Overlay Networks

Paulo Simões , Fernando Boavida , Adriano Fiorese
5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.136-147, ⟨10.1007/978-3-642-21484-4_16⟩
Conference papers hal-01585857v1
Image document

Voice Games: Investigation Into the Use of Non-speech Voice Input for Making Computer Games More Accessible

Susumu Harada , Jacob O. Wobbrock , James A. Landay
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.11-29, ⟨10.1007/978-3-642-23774-4_4⟩
Conference papers hal-01590572v1