Filter your results
- 98
- 98
- 98
- 712
- 2
- 1
- 98
- 98
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Similarity of Transactions for Customer SegmentationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.347-359, ⟨10.1007/978-3-642-32498-7_26⟩
Conference papers
hal-01542433v1
|
||
|
Combining Relational and Semi-structured Databases for an Inquiry ApplicationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.73-84, ⟨10.1007/978-3-642-32498-7_6⟩
Conference papers
hal-01542448v1
|
||
|
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query LanguagesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.302-316, ⟨10.1007/978-3-642-32498-7_23⟩
Conference papers
hal-01542449v1
|
||
|
A Formal Equivalence Classes Based Method for Security Policy Conformance CheckingInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.146-160, ⟨10.1007/978-3-642-32498-7_12⟩
Conference papers
hal-01542451v1
|
||
|
Design and Analysis of a Fragile Watermarking Scheme Based on Block-MappingInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.654-668, ⟨10.1007/978-3-642-32498-7_49⟩
Conference papers
hal-01542471v1
|
||
|
Designing Smart Cities: Security Issues11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.30-40, ⟨10.1007/978-3-642-33260-9_2⟩
Conference papers
hal-01551737v1
|
||
|
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary ArteriesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers
hal-01542462v1
|
||
|
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on SmartphonesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.176-189, ⟨10.1007/978-3-642-32498-7_14⟩
Conference papers
hal-01542428v1
|
||
|
Cross-Border Legal Identity Management11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers
hal-01543589v1
|
||
|
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers
hal-01551728v1
|
||
|
Hybrid Negative Selection Approach for Anomaly Detection11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.242-253, ⟨10.1007/978-3-642-33260-9_21⟩
Conference papers
hal-01551730v1
|
||
|
Outlier Removal in 2D Leap Frog Algorithm11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.146-157, ⟨10.1007/978-3-642-33260-9_12⟩
Conference papers
hal-01551713v1
|
||
|
Building Understanding of Smart City Initiatives11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.40-53, ⟨10.1007/978-3-642-33489-4_4⟩
Conference papers
hal-01543596v1
|
||
|
Public Policy Formulation through Non Moderated Crowdsourcing in Social Media4th International Conference on Electronic Participation (ePart), Sep 2012, Kristiansand, Norway. pp.156-169, ⟨10.1007/978-3-642-33250-0_14⟩
Conference papers
hal-01541473v1
|
||
|
Pay-As-You-Go Data Integration Using Functional DependenciesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.375-389, ⟨10.1007/978-3-642-32498-7_28⟩
Conference papers
hal-01542460v1
|
||
|
The Need to Adjust Lean to the Public Sector11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.54-65, ⟨10.1007/978-3-642-33489-4_5⟩
Conference papers
hal-01543577v1
|
||
|
Information Technology and the Efficiency of the Brazilian Judiciary System11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.126-136, ⟨10.1007/978-3-642-33489-4_11⟩
Conference papers
hal-01543575v1
|
||
|
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and AlternativesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.190-202, ⟨10.1007/978-3-642-32498-7_15⟩
Conference papers
hal-01542441v1
|
||
|
Distributed Sampling Storage for Statistical Analysis of Massive Sensor DataInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.233-243, ⟨10.1007/978-3-642-32498-7_18⟩
Conference papers
hal-01542469v1
|
||
|
Certificate-Based Encryption Scheme with General Access Structure11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.41-55, ⟨10.1007/978-3-642-33260-9_3⟩
Conference papers
hal-01551717v1
|
||
|
DTW and Voting-Based Lip Print Recognition System11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.191-202, ⟨10.1007/978-3-642-33260-9_16⟩
Conference papers
hal-01551722v1
|
||
|
Multi-constraints Face Detect-Track System11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.224-235, ⟨10.1007/978-3-642-33260-9_19⟩
Conference papers
hal-01551727v1
|
||
|
ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.351-360, ⟨10.1007/978-3-642-33260-9_30⟩
Conference papers
hal-01551733v1
|
||
|
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.80-91, ⟨10.1007/978-3-642-33260-9_6⟩
Conference papers
hal-01551746v1
|
||
|
Usage Control Model Specification in XACML Policy Language11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.68-79, ⟨10.1007/978-3-642-33260-9_5⟩
Conference papers
hal-01551723v1
|
||
|
Analysis of the Methodologies for Evaluation of E-Government Policies11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.234-245, ⟨10.1007/978-3-642-33489-4_20⟩
Conference papers
hal-01543590v1
|
||
|
Social Media and Counter-Democracy: The Contingences of Participation4th International Conference on Electronic Participation (ePart), Sep 2012, Kristiansand, Norway. pp.1-12, ⟨10.1007/978-3-642-33250-0_1⟩
Conference papers
hal-01541472v1
|
||
|
Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.361-373, ⟨10.1007/978-3-642-33260-9_31⟩
Conference papers
hal-01551721v1
|
||
|
Tool-Supported Risk Modeling and Analysis of Evolving Critical InfrastructuresInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.562-577, ⟨10.1007/978-3-642-32498-7_43⟩
Conference papers
hal-01542434v1
|
||
|
The Influence of External Institutional Pressures on Local E-Government Adoption and Implementation: A Coercive Perspective within an Indonesian Local E-Government Context11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.13-26, ⟨10.1007/978-3-642-33489-4_2⟩
Conference papers
hal-01543598v1
|