Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

740 results
Image document

Gaming after Dark

Ivana Müller , Petra Sundström , Martin Murer , Manfred Tscheligi
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.16-29, ⟨10.1007/978-3-642-33542-6_2⟩
Conference papers hal-01556173v1
Image document

Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data

Robert Nix , Murat Kantarcioglu , Keesook J. Han
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.129-144, ⟨10.1007/978-3-642-31540-4_11⟩
Conference papers hal-01534761v1
Image document

Reconstruction in Database Forensics

Oluwasola Mary Fasan , Martin Olivier
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.273-287, ⟨10.1007/978-3-642-33962-2_19⟩
Conference papers hal-01523705v1
Image document

A Temporal Logic for Multi-threaded Programs

Salvatore La Torre , Margherita Napoli
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.225-239, ⟨10.1007/978-3-642-33475-7_16⟩
Conference papers hal-01556217v1
Image document

Compositional Abstraction Techniques for Probabilistic Automata

Falak Sher , Joost-Pieter Katoen
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.325-341, ⟨10.1007/978-3-642-33475-7_23⟩
Conference papers hal-01556222v1
Image document

Opportunistic Multipath Forwarding in Content-Based Publish/Subscribe Overlays

Reza Sherafat Kazemzadeh , Hans-Arno Jacobsen
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.249-270, ⟨10.1007/978-3-642-35170-9_13⟩
Conference papers hal-01555549v1
Image document

Dynamic Software Deployment from Clouds to Mobile Devices

Ioana Giurgiu , Oriana Riva , Gustavo Alonso
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.394-414, ⟨10.1007/978-3-642-35170-9_20⟩
Conference papers hal-01555562v1
Image document

Enhancing the OS against Security Threats in System Administration

Nuno Santos , Rodrigo Rodrigues , Bryan Ford
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.415-435, ⟨10.1007/978-3-642-35170-9_21⟩
Conference papers hal-01555541v1
Image document

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks

Ekawat Homsirikamol , Paweł Morawiecki , Marcin Rogawski , Marian Srebrny
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers hal-01551728v1
Image document

Hybrid Negative Selection Approach for Anomaly Detection

Andrzej Chmielewski , Sławomir T. Wierzchoń
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.242-253, ⟨10.1007/978-3-642-33260-9_21⟩
Conference papers hal-01551730v1
Image document

A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment

Zahra Tavakoli , Sebastian Meier , Alexander Vensmer
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.41-51, ⟨10.1007/978-3-642-32808-4_5⟩
Conference papers hal-01543146v1
Image document

OOXML File Analysis of the July 22nd Terrorist Manual

Hanno Langweg
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.195-197, ⟨10.1007/978-3-642-32805-3_17⟩
Conference papers hal-01540900v1
Image document

From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor

Robert Fischer , Tobias Kiertscher , Stefan Gruhn , Tobias Scheidat , Claus Vielhauer
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.207-210, ⟨10.1007/978-3-642-32805-3_21⟩
Conference papers hal-01540902v1
Image document

A Message Service for Opportunistic Computing in Disconnected MANETs

Abdulkader Benchi , Frédéric Guidec , Pascale Launay
12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.118-131, ⟨10.1007/978-3-642-30823-9_10⟩
Conference papers hal-00763325v1
Image document

Connecting your Mobile Shopping Cart to the Internet-of-Things

Nicolas Petitprez , Romain Rouvoy , Laurence Duchien
12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.236-243, ⟨10.1007/978-3-642-30823-9_21⟩
Conference papers hal-00684780v1
Image document

High-Performance Location-Aware Publish-Subscribe on GPUs

Gianpaolo Cugola , Alessandro Margara
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.312-331, ⟨10.1007/978-3-642-35170-9_16⟩
Conference papers hal-01555563v1
Image document

Outlier Removal in 2D Leap Frog Algorithm

Ryszard Kozera , Jacek Tchórzewski
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.146-157, ⟨10.1007/978-3-642-33260-9_12⟩
Conference papers hal-01551713v1
Image document

Emotional Interaction with Surfaces - Works of Design and Computing

Larissa Müller , Svenja Keune , Arne Bernin , Florian Vogt
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.457-460, ⟨10.1007/978-3-642-33542-6_52⟩
Conference papers hal-01556121v1
Image document

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing

Abbas Taheri Soodejani , Mohammad Ali Hadavi , Rasool Jalili
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers hal-01534772v1
Image document

Collecting Users Profiles for Web Applications

Amin Rasooli , Peter Forbrig , Fattaneh Tagivareh
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.275-282, ⟨10.1007/978-3-642-34347-6_18⟩
Conference papers hal-01556822v1
Image document

Probabilistic Inference and Monadic Second Order Logic

Hans L. Bodlaender
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.43-56, ⟨10.1007/978-3-642-33475-7_4⟩
Conference papers hal-01556214v1
Image document

Relationship between Correcting Code and Module Technique in Hiding Secret Data

Phan Trung Huy , Nguyen Hai Thanh , Cheonsick Kim
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.297-307, ⟨10.1007/978-3-642-35606-3_35⟩
Conference papers hal-01551381v1
Image document

Design and Deployment of Testbed for Experimental Sensor Network Research

Zeeshan Hameed Mir , Hyeon Park , Young Bag Moon , Nae Soo Kim , Cheol Sig Pyo
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.264-272, ⟨10.1007/978-3-642-35606-3_31⟩
Conference papers hal-01551347v1
Image document

Visualization of Complex Networks Dynamics: Case Study

Ivan Zelinka , Donald Davendra , Lenka Skanderova
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.145-150, ⟨10.1007/978-3-642-30039-4_19⟩
Conference papers hal-01533583v1
Image document

Method for Identification of Suitable Persons in Collaborators’ Networks

Pavla Dráždilová , Alisa Babskova , Jan Martinovič , Kateřina Slaninová , Štěpán Minks
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.101-110, ⟨10.1007/978-3-642-33260-9_8⟩
Conference papers hal-01551738v1

NETWORKING 2012

Robert Bestak , Lukas Kencl , Li Erran Li Erran , Joerg Widmer , Hao Yin
Springer, LNCS-7290, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30054-7⟩
Books hal-01531967v1

Coalgebraic Methods in Computer Science

Dirk Pattinson , Lutz Schröder
Springer, LNCS-7399, 2012, Coalgebraic Methods in Computer Science, ⟨10.1007/978-3-642-32784-1⟩
Books hal-01539886v1
Image document

Building Understanding of Smart City Initiatives

Suha Alawadhi , Armando Aldama-Nalda , Hafedh Chourabi , J. Ramon Gil-Garcia , Sofia Leung , et al.
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.40-53, ⟨10.1007/978-3-642-33489-4_4⟩
Conference papers hal-01543596v1
Image document

The Influence of Music on Player Performance in Exergames for Parkinson’s Patients

Damian Lilla , Marc Herrlich , Rainer Malaka , Dennis Krannich
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.433-436, ⟨10.1007/978-3-642-33542-6_46⟩
Conference papers hal-01556113v1
Image document

Transformation Systems with Incremental Negative Application Conditions

Andrea Corradini , Reiko Heckel , Frank Hermann , Susann Gottmann , Nico Nachtigall
21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.127-142, ⟨10.1007/978-3-642-37635-1_8⟩
Conference papers hal-01485982v1