Filter your results
- 714
- 26
- 714
- 712
- 98
- 2
- 1
- 11
- 16
- 687
- 714
- 13
- 12
- 9
- 8
- 7
- 7
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 8
- 5
- 5
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
TinyStream SensorsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.218-232, ⟨10.1007/978-3-642-32498-7_17⟩
Conference papers
hal-01542439v1
|
||
|
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional OperationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.578-592, ⟨10.1007/978-3-642-32498-7_44⟩
Conference papers
hal-01542445v1
|
||
|
Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover VenuesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.360-374, ⟨10.1007/978-3-642-32498-7_27⟩
Conference papers
hal-01542456v1
|
||
|
Secure Client Puzzles Based on Random Beacons11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers
hal-01531977v1
|
||
|
Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.290-301, ⟨10.1007/978-3-642-33260-9_25⟩
Conference papers
hal-01551726v1
|
||
|
Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.168-179, ⟨10.1007/978-3-642-33260-9_14⟩
Conference papers
hal-01551736v1
|
||
|
MORENA: A Middleware for Programming NFC-Enabled Android Applications as Distributed Object-Oriented Programs13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.61-80, ⟨10.1007/978-3-642-35170-9_4⟩
Conference papers
hal-01555556v1
|
||
|
On the Practicality of Practical Byzantine Fault Tolerance13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.436-455, ⟨10.1007/978-3-642-35170-9_22⟩
Conference papers
hal-01555557v1
|
||
|
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.101-109, ⟨10.1007/978-3-642-35606-3_12⟩
Conference papers
hal-01551350v1
|
||
|
An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.119-128, ⟨10.1007/978-3-642-35606-3_14⟩
Conference papers
hal-01551351v1
|
||
|
A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.336-348, ⟨10.1007/978-3-642-35606-3_40⟩
Conference papers
hal-01551361v1
|
||
|
Evidence Collection in Peer-to-Peer Network Investigations8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.215-230, ⟨10.1007/978-3-642-33962-2_15⟩
Conference papers
hal-01523704v1
|
||
|
A Log File Digital Forensic Model8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.247-259, ⟨10.1007/978-3-642-33962-2_17⟩
Conference papers
hal-01523708v1
|
||
|
Isolating Instances in Cloud Forensics8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.187-200, ⟨10.1007/978-3-642-33962-2_13⟩
Conference papers
hal-01523713v1
|
||
|
Requirements Sensemaking Using Concept Maps4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.217-232, ⟨10.1007/978-3-642-34347-6_13⟩
Conference papers
hal-01556817v1
|
||
|
Similarity in Visual Designs: Effects on Workload and Performance in a Railed-Shooter Game11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.284-291, ⟨10.1007/978-3-642-33542-6_24⟩
Conference papers
hal-01556111v1
|
||
|
Gossip-Based Counting in Dynamic Networks11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.404-417, ⟨10.1007/978-3-642-30054-7_32⟩
Conference papers
hal-01531972v1
|
||
|
Reducing the History in Decentralized Interaction-Based Reputation Systems11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.238-251, ⟨10.1007/978-3-642-30054-7_19⟩
Conference papers
hal-01531975v1
|
||
|
A Fairness Model for Resource Allocation in Wireless NetworksNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.1-9, ⟨10.1007/978-3-642-30039-4_1⟩
Conference papers
hal-01533586v1
|
||
|
Investigation of Quality of Experience for 3D Video in Wireless Network Environment18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.340-349, ⟨10.1007/978-3-642-32808-4_31⟩
Conference papers
hal-01543154v1
|
||
|
Active Learning of Extended Finite State Machines24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.5-7, ⟨10.1007/978-3-642-34691-0_2⟩
Conference papers
hal-01482424v1
|
||
|
A Model to Assess Open Government Data in Public Agencies11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.210-221, ⟨10.1007/978-3-642-33489-4_18⟩
Conference papers
hal-01543587v1
|
||
|
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry PerspectiveInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.317-331, ⟨10.1007/978-3-642-32498-7_24⟩
Conference papers
hal-01542431v1
|
||
|
OWL-Based Node Capability Parameter Configuration18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.124-135, ⟨10.1007/978-3-642-32808-4_12⟩
Conference papers
hal-01543152v1
|
||
|
On Complexity Reduction of User Interfaces for Safety-Critical SystemsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.108-122, ⟨10.1007/978-3-642-32498-7_9⟩
Conference papers
hal-01542450v1
|
||
|
P Systems for Traffic Flow Simulation11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.405-415, ⟨10.1007/978-3-642-33260-9_35⟩
Conference papers
hal-01551745v1
|
||
|
On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.135-148, ⟨10.1007/978-3-642-30045-5_11⟩
Conference papers
hal-01531139v1
|
||
|
The Usage of Usability Techniques in Scrum Projects4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.331-341, ⟨10.1007/978-3-642-34347-6_25⟩
Conference papers
hal-01556824v1
|
||
|
User-Oriented Requirements Engineering1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.11-33, ⟨10.1007/978-3-319-45916-5_2⟩
Conference papers
hal-01631313v1
|
||
|
OverStar: An Open Approach to End-to-End Middleware Services in Systems of Systems13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.229-248, ⟨10.1007/978-3-642-35170-9_12⟩
Conference papers
hal-00991376v1
|