Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

714 results
Deposit type : Fulltext
Image document

Minimization of Network Power Consumption with Redundancy Elimination

Frédéric Giroire , Joanna Moulierac , Truong Khoa Phan , Frédéric Roudaut
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.247-258, ⟨10.1007/978-3-642-30045-5_19⟩
Conference papers hal-00721855v1
Image document

Creativity Patterns Guide: Support for the Application of Creativity Techniques in Requirements Engineering

Elton R. Vieira , Carina Alves , Letícia Duboc
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.283-290, ⟨10.1007/978-3-642-34347-6_19⟩
Conference papers hal-01556814v1
Image document

DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph

Jintao Meng , Jianrui Yuan , Jiefeng Cheng , Yanjie Wei , Shengzhong Feng
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.14-21, ⟨10.1007/978-3-642-35606-3_2⟩
Conference papers hal-01551353v1
Image document

Challenge-Aware Traffic Protection in Wireless Mobile Backhaul Networks

Javier Martín-Hernández , Christian Doerr , Johannes Lessmann , Marcus Schöller
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.35-42, ⟨10.1007/978-3-642-30039-4_5⟩
Conference papers hal-01533578v1
Image document

Requirements Gathering and Domain Understanding for Assistive Technology to Support Low Vision and Sighted Students

Stephanie Ludi
1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.117-132, ⟨10.1007/978-3-319-45916-5_8⟩
Conference papers hal-01631317v1
Image document

P2P and Cloud: A Marriage of Convenience for Replica Management

Hanna Kavalionak , Alberto Montresor
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.60-71, ⟨10.1007/978-3-642-28583-7_6⟩
Conference papers hal-01527531v1
Image document

Worst- and Average-Case Privacy Breaches in Randomization Mechanisms

Michele Boreale , Michela Paolini
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.72-86, ⟨10.1007/978-3-642-33475-7_6⟩
Conference papers hal-01556211v1
Image document

Visualizing Sensor Data: Towards an Experiment and Validation Platform

Claudia Rodriguez , Anne-Marie Déry-Pinna
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.352-359, ⟨10.1007/978-3-642-34347-6_27⟩
Conference papers hal-01556831v1
Image document

A Development Process for Usable Large Scale Interactive Critical Systems: Application to Satellite Ground Segments

Célia Martinie , Philippe Palanque , David Navarre , Eric Barboni
4th International Conference on Human-Centered Software Engineering (HCSE 2012), Oct 2012, Toulouse, France. pp.72-93, ⟨10.1007/978-3-642-34347-6_5⟩
Conference papers hal-01556835v1
Image document

On Measurement of Internal Variables of Complex Self-Organized Systems and Their Relation to Multifractal Spectra

Dalibor Štys , Petr Jizba , Štěpán Papáček , Tomáš Náhlík , Petr Císař
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.36-47, ⟨10.1007/978-3-642-28583-7_4⟩
Conference papers hal-01527539v1
Image document

Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks

Soumyabrata Saha , Rituparna Chaki
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.361-373, ⟨10.1007/978-3-642-33260-9_31⟩
Conference papers hal-01551721v1
Image document

Another Fallen Hash-Based RFID Authentication Protocol

Julio Cesar Hernandez-Castro , Pedro Peris-Lopez , Masoumeh Safkhani , Nasour Bagheri , Majid Naderi
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers hal-01534308v1
Image document

Ant-Based Systems for Wireless Networks: Retrospect and Prospects

Laurent Paquereau , Bjarne E. Helvik
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.13-23, ⟨10.1007/978-3-642-28583-7_2⟩
Conference papers hal-01527530v1
Image document

Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency

Guoqing Li , Guangling Sun , Xinpeng Zhang
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.616-624, ⟨10.1007/978-3-642-35606-3_73⟩
Conference papers hal-01551341v1
Image document

Private Quantum Coding for Quantum Relay Networks

Laszlo Gyongyosi , Sándor Imre
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.239-250, ⟨10.1007/978-3-642-32808-4_22⟩
Conference papers hal-01543144v1
Image document

Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures

Fredrik Seehusen , Bjørnar Solhaug
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.562-577, ⟨10.1007/978-3-642-32498-7_43⟩
Conference papers hal-01542434v1
Image document

Security SLAs – An Idea Whose Time Has Come?

Martin Gilje Jaatun , Karin Bernsmed , Astrid Undheim
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.123-130, ⟨10.1007/978-3-642-32498-7_10⟩
Conference papers hal-01542465v1
Image document

Message-Passing Concurrency for Scalable, Stateful, Reconfigurable Middleware

Cosmin Arad , Jim Dowling , Seif Haridi
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.208-228, ⟨10.1007/978-3-642-35170-9_11⟩
Conference papers hal-01555550v1
Image document

Characterizing Inter-domain Rerouting after Japan Earthquake

Yujing Liu , Xiapu Luo , Rocky Chang , Jinshu Su
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.124-135, ⟨10.1007/978-3-642-30054-7_10⟩
Conference papers hal-01531953v1
Image document

An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records

Jia Jianbin , Chen Yingwen , Xu Ming
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.256-263, ⟨10.1007/978-3-642-35606-3_30⟩
Conference papers hal-01551313v1
Image document

A Panoramic View of 3G Data/Control-Plane Traffic: Mobile Device Perspective

Xiuqiang He , Patrick Lee , Lujia Pan , Cheng He , John Lui
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.318-330, ⟨10.1007/978-3-642-30045-5_24⟩
Conference papers hal-01531132v1
Image document

Requirements-Driven Log Analysis (Extended Abstract)

Klaus Havelund
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.1-4, ⟨10.1007/978-3-642-34691-0_1⟩
Conference papers hal-01482407v1
Image document

The Empathy Machine

David Kadish , Nikolai Kummer , Aleksandra Dulic , Homayoun Najjaran
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.461-464, ⟨10.1007/978-3-642-33542-6_53⟩
Conference papers hal-01556158v1
Image document

Pictures at an Exhibition: Design of a Hybrid Puppetry Performance Piece

Ali Mazalek , Michael Nitsche , Claudia Rébola , Paul Clifton , Andy Wu , et al.
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.130-143, ⟨10.1007/978-3-642-33542-6_12⟩
Conference papers hal-01556115v1
Image document

Modeling Consumer Decision Making Process with Triangular Norms

Agnieszka Jastrzebska , Wladyslaw Homenda
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.382-394, ⟨10.1007/978-3-642-33260-9_33⟩
Conference papers hal-01551741v1
Image document

AtomicOrchid: A Mixed Reality Game to Investigate Coordination in Disaster Response

Joel E. Fischer , Wenchao Jiang , Stuart Moran
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.572-577, ⟨10.1007/978-3-642-33542-6_75⟩
Conference papers hal-01556118v1
Image document

Secure Multi-Execution through Static Program Transformation

Gilles Barthe , Juan Manuel Crespo , Dominique Devriese , Frank Piessens , Exequiel Rivas
14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.186-202, ⟨10.1007/978-3-642-30793-5_12⟩
Conference papers hal-01528736v1
Image document

Partial Connector Colouring

Dave Clarke , José Proença
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.59-73, ⟨10.1007/978-3-642-30829-1_5⟩
Conference papers hal-01529589v1
Image document

Managing Execution Environment Variability during Software Testing: An Industrial Experience

Aymeric Hervieu , Benoit Baudry , Arnaud Gotlieb
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.24-38, ⟨10.1007/978-3-642-34691-0_4⟩
Conference papers hal-01482409v1
Image document

The Influence of External Institutional Pressures on Local E-Government Adoption and Implementation: A Coercive Perspective within an Indonesian Local E-Government Context

Nurdin Nurdin , Rosemary Stockdale , Helana Scheepers
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.13-26, ⟨10.1007/978-3-642-33489-4_2⟩
Conference papers hal-01543598v1