Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

714 results
Deposit type : Fulltext
Image document

A Taxonomy of Dirty Time-Oriented Data

Theresia Gschwandtner , Johannes Gärtner , Wolfgang Aigner , Silvia Miksch
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.58-72, ⟨10.1007/978-3-642-32498-7_5⟩
Conference papers hal-01542440v1
Image document

State Estimation and Property-Guided Exploration for Hybrid Systems Testing

Thao Dang , Noa Shalev
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.152-167, ⟨10.1007/978-3-642-34691-0_12⟩
Conference papers hal-01482399v1
Image document

Collaborative Forwarding and Caching in Content Centric Networks

Shuo Guo , Haiyong Xie , Guangyu Shi
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.41-55, ⟨10.1007/978-3-642-30045-5_4⟩
Conference papers hal-01531138v1
Image document

Efficient Algorithms for the max k -vertex cover Problem

Federico Della Croce , Vangelis Paschos
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.295-309, ⟨10.1007/978-3-642-33475-7_21⟩
Conference papers hal-01511883v1
Image document

Logics for Security and Privacy

Leendert van Der Torre
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.1-7, ⟨10.1007/978-3-642-31540-4_1⟩
Conference papers hal-01534776v1
Image document

A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC

Xin Jin , Ram Krishnan , Ravi Sandhu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.41-55, ⟨10.1007/978-3-642-31540-4_4⟩
Conference papers hal-01534757v1
Image document

Proofs as Executions

Emmanuel Beffara , Virgile Mogbil
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.280-294, ⟨10.1007/978-3-642-33475-7_20⟩
Conference papers hal-00586459v2
Image document

Input-Driven Stack Automata

Suna Bensch , Markus Holzer , Martin Kutrib , Andreas Malcher
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.28-42, ⟨10.1007/978-3-642-33475-7_3⟩
Conference papers hal-01556210v1
Image document

Visualizing Sensor Data: Towards an Experiment and Validation Platform

Claudia Rodriguez , Anne-Marie Déry-Pinna
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.352-359, ⟨10.1007/978-3-642-34347-6_27⟩
Conference papers hal-01556831v1
Image document

A Development Process for Usable Large Scale Interactive Critical Systems: Application to Satellite Ground Segments

Célia Martinie , Philippe Palanque , David Navarre , Eric Barboni
4th International Conference on Human-Centered Software Engineering (HCSE 2012), Oct 2012, Toulouse, France. pp.72-93, ⟨10.1007/978-3-642-34347-6_5⟩
Conference papers hal-01556835v1
Image document

On Measurement of Internal Variables of Complex Self-Organized Systems and Their Relation to Multifractal Spectra

Dalibor Štys , Petr Jizba , Štěpán Papáček , Tomáš Náhlík , Petr Císař
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.36-47, ⟨10.1007/978-3-642-28583-7_4⟩
Conference papers hal-01527539v1
Image document

Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks

Soumyabrata Saha , Rituparna Chaki
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.361-373, ⟨10.1007/978-3-642-33260-9_31⟩
Conference papers hal-01551721v1
Image document

Another Fallen Hash-Based RFID Authentication Protocol

Julio Cesar Hernandez-Castro , Pedro Peris-Lopez , Masoumeh Safkhani , Nasour Bagheri , Majid Naderi
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers hal-01534308v1
Image document

Ant-Based Systems for Wireless Networks: Retrospect and Prospects

Laurent Paquereau , Bjarne E. Helvik
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.13-23, ⟨10.1007/978-3-642-28583-7_2⟩
Conference papers hal-01527530v1
Image document

Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency

Guoqing Li , Guangling Sun , Xinpeng Zhang
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.616-624, ⟨10.1007/978-3-642-35606-3_73⟩
Conference papers hal-01551341v1
Image document

Private Quantum Coding for Quantum Relay Networks

Laszlo Gyongyosi , Sándor Imre
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.239-250, ⟨10.1007/978-3-642-32808-4_22⟩
Conference papers hal-01543144v1
Image document

Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures

Fredrik Seehusen , Bjørnar Solhaug
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.562-577, ⟨10.1007/978-3-642-32498-7_43⟩
Conference papers hal-01542434v1
Image document

Security SLAs – An Idea Whose Time Has Come?

Martin Gilje Jaatun , Karin Bernsmed , Astrid Undheim
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.123-130, ⟨10.1007/978-3-642-32498-7_10⟩
Conference papers hal-01542465v1
Image document

Message-Passing Concurrency for Scalable, Stateful, Reconfigurable Middleware

Cosmin Arad , Jim Dowling , Seif Haridi
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.208-228, ⟨10.1007/978-3-642-35170-9_11⟩
Conference papers hal-01555550v1
Image document

Characterizing Inter-domain Rerouting after Japan Earthquake

Yujing Liu , Xiapu Luo , Rocky Chang , Jinshu Su
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.124-135, ⟨10.1007/978-3-642-30054-7_10⟩
Conference papers hal-01531953v1
Image document

An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records

Jia Jianbin , Chen Yingwen , Xu Ming
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.256-263, ⟨10.1007/978-3-642-35606-3_30⟩
Conference papers hal-01551313v1
Image document

A Panoramic View of 3G Data/Control-Plane Traffic: Mobile Device Perspective

Xiuqiang He , Patrick Lee , Lujia Pan , Cheng He , John Lui
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.318-330, ⟨10.1007/978-3-642-30045-5_24⟩
Conference papers hal-01531132v1
Image document

Requirements-Driven Log Analysis (Extended Abstract)

Klaus Havelund
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.1-4, ⟨10.1007/978-3-642-34691-0_1⟩
Conference papers hal-01482407v1
Image document

The Empathy Machine

David Kadish , Nikolai Kummer , Aleksandra Dulic , Homayoun Najjaran
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.461-464, ⟨10.1007/978-3-642-33542-6_53⟩
Conference papers hal-01556158v1
Image document

Pictures at an Exhibition: Design of a Hybrid Puppetry Performance Piece

Ali Mazalek , Michael Nitsche , Claudia Rébola , Paul Clifton , Andy Wu , et al.
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.130-143, ⟨10.1007/978-3-642-33542-6_12⟩
Conference papers hal-01556115v1
Image document

Modeling Consumer Decision Making Process with Triangular Norms

Agnieszka Jastrzebska , Wladyslaw Homenda
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.382-394, ⟨10.1007/978-3-642-33260-9_33⟩
Conference papers hal-01551741v1
Image document

AtomicOrchid: A Mixed Reality Game to Investigate Coordination in Disaster Response

Joel E. Fischer , Wenchao Jiang , Stuart Moran
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.572-577, ⟨10.1007/978-3-642-33542-6_75⟩
Conference papers hal-01556118v1
Image document

Secure Multi-Execution through Static Program Transformation

Gilles Barthe , Juan Manuel Crespo , Dominique Devriese , Frank Piessens , Exequiel Rivas
14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.186-202, ⟨10.1007/978-3-642-30793-5_12⟩
Conference papers hal-01528736v1
Image document

Partial Connector Colouring

Dave Clarke , José Proença
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.59-73, ⟨10.1007/978-3-642-30829-1_5⟩
Conference papers hal-01529589v1
Image document

Managing Execution Environment Variability during Software Testing: An Industrial Experience

Aymeric Hervieu , Benoit Baudry , Arnaud Gotlieb
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.24-38, ⟨10.1007/978-3-642-34691-0_4⟩
Conference papers hal-01482409v1