Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

714 results
Deposit type : Fulltext
language_s : English
Document type : Conference papers
Image document

Using Behaviour Inference to Optimise Regression Test Sets

Ramsay Taylor , Mathew Hall , Kirill Bogdanov , John Derrick
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.184-199, ⟨10.1007/978-3-642-34691-0_14⟩
Conference papers hal-01482401v1
Image document

Towards a Logical Framework for Reasoning about Risk

Matteo Cristani , Erisa Karafili , Luca Viganò
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.609-623, ⟨10.1007/978-3-642-32498-7_46⟩
Conference papers hal-01542424v1
Image document

Similarity of Transactions for Customer Segmentation

Ke Lu , Tetsuya Furukawa
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.347-359, ⟨10.1007/978-3-642-32498-7_26⟩
Conference papers hal-01542433v1
Image document

Combining Relational and Semi-structured Databases for an Inquiry Application

Marius Ebel , Martin Hulin
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.73-84, ⟨10.1007/978-3-642-32498-7_6⟩
Conference papers hal-01542448v1
Image document

A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages

Anna Formica , Mauro Mazzei , Elaheh Pourabbas , Maurizio Rafanelli
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.302-316, ⟨10.1007/978-3-642-32498-7_23⟩
Conference papers hal-01542449v1
Image document

A Formal Equivalence Classes Based Method for Security Policy Conformance Checking

Eckehard Hermann , Udo Litschauer , Jürgen Fuss
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.146-160, ⟨10.1007/978-3-642-32498-7_12⟩
Conference papers hal-01542451v1
Image document

How to Forge a Digital Alibi on Mac OS X

Aniello Castiglione , Giuseppe Cattaneo , Roberto De Prisco , Alfredo De Santis , Kangbin Yim
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.430-444, ⟨10.1007/978-3-642-32498-7_32⟩
Conference papers hal-01542452v1
Image document

Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping

Munkhbaatar Doyoddorj , Kyung-Hyune Rhee
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.654-668, ⟨10.1007/978-3-642-32498-7_49⟩
Conference papers hal-01542471v1
Image document

The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services

Hyeog-In Kwon , Hi-Yeob Joo , Dae-Jin Kim , Jong-Seok Park
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.315-319, ⟨10.1007/978-3-642-35606-3_37⟩
Conference papers hal-01551329v1
Image document

Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

Muhammad Ahmed , Xu Huang , Dharmendra Sharma
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.94-100, ⟨10.1007/978-3-642-35606-3_11⟩
Conference papers hal-01551336v1
Image document

A Scoring System for Short Answers on the Test in a Large Group

Jae-Young Lee
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.42-47, ⟨10.1007/978-3-642-35606-3_5⟩
Conference papers hal-01551358v1
Image document

Heterogeneous Secure Multi-Party Computation

Mentari Djatmiko , Mathieu Cunche , Roksana Boreli , Aruna Seneviratne
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.198-210, ⟨10.1007/978-3-642-30054-7_16⟩
Conference papers hal-00747844v1
Image document

Designing Smart Cities: Security Issues

Young Im Cho
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.30-40, ⟨10.1007/978-3-642-33260-9_2⟩
Conference papers hal-01551737v1
Image document

Satisfiability Calculus: The Semantic Counterpart of a Proof Calculus in General Logics

Carlos Gustavo López Pombo , Pablo F. Castro , Nazareno M. Aguirre , Thomas E. Maibaum
21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.195-211, ⟨10.1007/978-3-642-37635-1_12⟩
Conference papers hal-01485970v1
Image document

UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept

Aneta Poniszewska-Maranda
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.131-145, ⟨10.1007/978-3-642-32498-7_11⟩
Conference papers hal-01542444v1
Image document

Forensic Tracking and Mobility Prediction in Vehicular Networks

Saif Al-Kuwari , Stephen Wolthusen
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.303-317, ⟨10.1007/978-3-642-33962-2_21⟩
Conference papers hal-01523712v1
Image document

Experiences with User-Centered Design and Agile Requirements Engineering in Fixed-Price Projects

Edna Kropp , Kolja Koischwitz
1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.47-61, ⟨10.1007/978-3-319-45916-5_4⟩
Conference papers hal-01631315v1
Image document

dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing

Xu Zhou , Kai Lu , Xicheng Lu , Xiaoping Wang , Baohua Fan
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.172-179, ⟨10.1007/978-3-642-35606-3_20⟩
Conference papers hal-01551348v1
Image document

Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary Arteries

Mirosław Trzupek , Marek R. Ogiela
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers hal-01542462v1
Image document

Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones

Andreas Holzinger , Peter Treitler , Wolfgang Slany
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.176-189, ⟨10.1007/978-3-642-32498-7_14⟩
Conference papers hal-01542428v1
Image document

Cross-Border Legal Identity Management

Bernd Zwattendorfer , Arne Tauber , Klaus Stranacher , Peter Reichstädter
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers hal-01543589v1
Image document

Finding Typical Internet User Behaviors

Péter Megyesi , Sándor Molnár
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.321-327, ⟨10.1007/978-3-642-32808-4_29⟩
Conference papers hal-01543170v1
Image document

Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center

Lei Xu , Wenzhi Chen , Zonghui Wang , Huafei Ni , Jiajie Wu
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.279-288, ⟨10.1007/978-3-642-35606-3_33⟩
Conference papers hal-01551364v1
Image document

Automated and Efficient Analysis of Role-Based Access Control with Attributes

Alessandro Armando , Silvio Ranise
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.25-40, ⟨10.1007/978-3-642-31540-4_3⟩
Conference papers hal-01534765v1
Image document

Towards a Statistical Characterization of the Interdomain Traffic Matrix

Jakub Mikians , Amogh Dhamdhere , Constantine Dovrolis , Pere Barlet-Ros , Josep Solé-Pareta
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.111-123, ⟨10.1007/978-3-642-30054-7_9⟩
Conference papers hal-01531968v1
Image document

Estimating Network Layer Subnet Characteristics via Statistical Sampling

M. Engin Tozal , Kamil Sarac
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.274-288, ⟨10.1007/978-3-642-30045-5_21⟩
Conference papers hal-01531114v1
Image document

Resilience in Computer Network Management

Marcelo F. Vasconcelos , Ronaldo M. Salles
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.109-120, ⟨10.1007/978-3-642-30045-5_9⟩
Conference papers hal-01531124v1
Image document

Distributed Content Backup and Sharing Using Social Information

Jin Jiang , Claudio E. Casetti
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.68-81, ⟨10.1007/978-3-642-30045-5_6⟩
Conference papers hal-01531125v1
Image document

A 2-Approximation Algorithm for Optimal Deployment of k Base Stations in WSNs

Hui Wu , Sabbir Mahmud
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.378-391, ⟨10.1007/978-3-642-30054-7_30⟩
Conference papers hal-01531960v1
Image document

Playing with the Weather

Sofia Reis , Nuno Correia
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.172-184, ⟨10.1007/978-3-642-33542-6_15⟩
Conference papers hal-01556119v1