Filter your results
- 714
- 26
- 714
- 26
- 738
- 98
- 2
- 1
- 11
- 16
- 713
- 740
- 13
- 12
- 9
- 8
- 7
- 7
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 8
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
740 results
|
Gaming after Dark11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.16-29, ⟨10.1007/978-3-642-33542-6_2⟩
Conference papers
hal-01556173v1
|
||
|
Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.129-144, ⟨10.1007/978-3-642-31540-4_11⟩
Conference papers
hal-01534761v1
|
||
|
Reconstruction in Database Forensics8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.273-287, ⟨10.1007/978-3-642-33962-2_19⟩
Conference papers
hal-01523705v1
|
||
|
A Temporal Logic for Multi-threaded Programs7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.225-239, ⟨10.1007/978-3-642-33475-7_16⟩
Conference papers
hal-01556217v1
|
||
|
Compositional Abstraction Techniques for Probabilistic Automata7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.325-341, ⟨10.1007/978-3-642-33475-7_23⟩
Conference papers
hal-01556222v1
|
||
|
Opportunistic Multipath Forwarding in Content-Based Publish/Subscribe Overlays13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.249-270, ⟨10.1007/978-3-642-35170-9_13⟩
Conference papers
hal-01555549v1
|
||
|
Dynamic Software Deployment from Clouds to Mobile Devices13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.394-414, ⟨10.1007/978-3-642-35170-9_20⟩
Conference papers
hal-01555562v1
|
||
|
Enhancing the OS against Security Threats in System Administration13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.415-435, ⟨10.1007/978-3-642-35170-9_21⟩
Conference papers
hal-01555541v1
|
||
|
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers
hal-01551728v1
|
||
|
Hybrid Negative Selection Approach for Anomaly Detection11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.242-253, ⟨10.1007/978-3-642-33260-9_21⟩
Conference papers
hal-01551730v1
|
||
|
A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.41-51, ⟨10.1007/978-3-642-32808-4_5⟩
Conference papers
hal-01543146v1
|
||
|
OOXML File Analysis of the July 22nd Terrorist Manual13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.195-197, ⟨10.1007/978-3-642-32805-3_17⟩
Conference papers
hal-01540900v1
|
||
|
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.207-210, ⟨10.1007/978-3-642-32805-3_21⟩
Conference papers
hal-01540902v1
|
||
|
A Message Service for Opportunistic Computing in Disconnected MANETs12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.118-131, ⟨10.1007/978-3-642-30823-9_10⟩
Conference papers
hal-00763325v1
|
||
|
Connecting your Mobile Shopping Cart to the Internet-of-Things12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.236-243, ⟨10.1007/978-3-642-30823-9_21⟩
Conference papers
hal-00684780v1
|
||
|
High-Performance Location-Aware Publish-Subscribe on GPUs13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.312-331, ⟨10.1007/978-3-642-35170-9_16⟩
Conference papers
hal-01555563v1
|
||
|
Outlier Removal in 2D Leap Frog Algorithm11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.146-157, ⟨10.1007/978-3-642-33260-9_12⟩
Conference papers
hal-01551713v1
|
||
|
Emotional Interaction with Surfaces - Works of Design and Computing11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.457-460, ⟨10.1007/978-3-642-33542-6_52⟩
Conference papers
hal-01556121v1
|
||
|
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers
hal-01534772v1
|
||
|
Collecting Users Profiles for Web Applications4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.275-282, ⟨10.1007/978-3-642-34347-6_18⟩
Conference papers
hal-01556822v1
|
||
|
Probabilistic Inference and Monadic Second Order Logic7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.43-56, ⟨10.1007/978-3-642-33475-7_4⟩
Conference papers
hal-01556214v1
|
||
|
Relationship between Correcting Code and Module Technique in Hiding Secret Data9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.297-307, ⟨10.1007/978-3-642-35606-3_35⟩
Conference papers
hal-01551381v1
|
||
|
Design and Deployment of Testbed for Experimental Sensor Network Research9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.264-272, ⟨10.1007/978-3-642-35606-3_31⟩
Conference papers
hal-01551347v1
|
||
|
Visualization of Complex Networks Dynamics: Case StudyNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.145-150, ⟨10.1007/978-3-642-30039-4_19⟩
Conference papers
hal-01533583v1
|
||
|
Method for Identification of Suitable Persons in Collaborators’ Networks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.101-110, ⟨10.1007/978-3-642-33260-9_8⟩
Conference papers
hal-01551738v1
|
||
|
NETWORKING 2012Springer, LNCS-7290, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30054-7⟩
Books
hal-01531967v1
|
||
|
Coalgebraic Methods in Computer ScienceSpringer, LNCS-7399, 2012, Coalgebraic Methods in Computer Science, ⟨10.1007/978-3-642-32784-1⟩
Books
hal-01539886v1
|
||
|
Building Understanding of Smart City Initiatives11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.40-53, ⟨10.1007/978-3-642-33489-4_4⟩
Conference papers
hal-01543596v1
|
||
|
The Influence of Music on Player Performance in Exergames for Parkinson’s Patients11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.433-436, ⟨10.1007/978-3-642-33542-6_46⟩
Conference papers
hal-01556113v1
|
||
|
Transformation Systems with Incremental Negative Application Conditions21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.127-142, ⟨10.1007/978-3-642-37635-1_8⟩
Conference papers
hal-01485982v1
|