Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

714 results
Deposit type : Fulltext
Image document

TinyStream Sensors

Pedro Furtado
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.218-232, ⟨10.1007/978-3-642-32498-7_17⟩
Conference papers hal-01542439v1
Image document

A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation

Yi-Li Huang , Fang-Yie Leu , Cheng-Ru Dai
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.578-592, ⟨10.1007/978-3-642-32498-7_44⟩
Conference papers hal-01542445v1
Image document

Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues

Jakub Dzikowski , Monika Kaczmarek , Szymon Lazaruk , Witold Abramowicz
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.360-374, ⟨10.1007/978-3-642-32498-7_27⟩
Conference papers hal-01542456v1
Image document

Secure Client Puzzles Based on Random Beacons

Yves Igor Jerschow , Martin Mauve
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.184-197, ⟨10.1007/978-3-642-30054-7_15⟩
Conference papers hal-01531977v1
Image document

Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent

Bartłomiej Józef Dzieńkowski , Urszula Markowska-Kaczmar
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.290-301, ⟨10.1007/978-3-642-33260-9_25⟩
Conference papers hal-01551726v1
Image document

Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval

Andrea Albarelli , Filippo Bergamasco , Andrea Torsello
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.168-179, ⟨10.1007/978-3-642-33260-9_14⟩
Conference papers hal-01551736v1
Image document

MORENA: A Middleware for Programming NFC-Enabled Android Applications as Distributed Object-Oriented Programs

Andoni Lombide Carreton , Kevin Pinte , Wolfgang De Meuter
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.61-80, ⟨10.1007/978-3-642-35170-9_4⟩
Conference papers hal-01555556v1
Image document

On the Practicality of Practical Byzantine Fault Tolerance

Nikos Chondros , Konstantinos Kokordelis , Mema Roussopoulos
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.436-455, ⟨10.1007/978-3-642-35170-9_22⟩
Conference papers hal-01555557v1
Image document

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis

Bo-Chao Cheng , Guo-Tan Liao , Ching-Kai Lin , Shih-Chun Hsu , Ping-Hai Hsu , et al.
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.101-109, ⟨10.1007/978-3-642-35606-3_12⟩
Conference papers hal-01551350v1
Image document

An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs

Irfana Memon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.119-128, ⟨10.1007/978-3-642-35606-3_14⟩
Conference papers hal-01551351v1
Image document

A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System

Wen-Hsu Hsiao , Hui-Kai Su , Yu-Siang Wei , Wei-Sheng Ho , Kim-Joan Chen
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.336-348, ⟨10.1007/978-3-642-35606-3_40⟩
Conference papers hal-01551361v1
Image document

Evidence Collection in Peer-to-Peer Network Investigations

Teja Myneedu , Yong Guan
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.215-230, ⟨10.1007/978-3-642-33962-2_15⟩
Conference papers hal-01523704v1
Image document

A Log File Digital Forensic Model

Himal Lalla , Stephen Flowerday , Tendai Sanyamahwe , Paul Tarwireyi
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.247-259, ⟨10.1007/978-3-642-33962-2_17⟩
Conference papers hal-01523708v1
Image document

Isolating Instances in Cloud Forensics

Waldo Delport , Martin Olivier
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.187-200, ⟨10.1007/978-3-642-33962-2_13⟩
Conference papers hal-01523713v1
Image document

Requirements Sensemaking Using Concept Maps

Shamal Faily , John Lyle , André Paul , Andrea Atzeni , Dieter Blomme , et al.
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.217-232, ⟨10.1007/978-3-642-34347-6_13⟩
Conference papers hal-01556817v1
Image document

Similarity in Visual Designs: Effects on Workload and Performance in a Railed-Shooter Game

David Milam , Magy Seif El-Nasr , Lyn Bartram , Bardia Aghabeigi , Perry Tan
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.284-291, ⟨10.1007/978-3-642-33542-6_24⟩
Conference papers hal-01556111v1
Image document

Gossip-Based Counting in Dynamic Networks

Ruud van De Bovenkamp , Fernando Kuipers , Piet Van Mieghem
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.404-417, ⟨10.1007/978-3-642-30054-7_32⟩
Conference papers hal-01531972v1
Image document

Reducing the History in Decentralized Interaction-Based Reputation Systems

Dimitra Gkorou , Tamás Vinkó , Nitin Chiluka , Johan Pouwelse , Dick Epema
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.238-251, ⟨10.1007/978-3-642-30054-7_19⟩
Conference papers hal-01531975v1
Image document

A Fairness Model for Resource Allocation in Wireless Networks

Huaizhou Shi , R. Venkatesha Prasad , Vijay S. Rao , I. Niemegeers
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.1-9, ⟨10.1007/978-3-642-30039-4_1⟩
Conference papers hal-01533586v1
Image document

Investigation of Quality of Experience for 3D Video in Wireless Network Environment

Ivett Kulik , Tuan Anh Trinh
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.340-349, ⟨10.1007/978-3-642-32808-4_31⟩
Conference papers hal-01543154v1
Image document

Active Learning of Extended Finite State Machines

Frits Vaandrager
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.5-7, ⟨10.1007/978-3-642-34691-0_2⟩
Conference papers hal-01482424v1
Image document

A Model to Assess Open Government Data in Public Agencies

Mauricio Solar , Gastón Concha , Luis Meijueiro
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.210-221, ⟨10.1007/978-3-642-33489-4_18⟩
Conference papers hal-01543587v1
Image document

Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry Perspective

Åsmund Ahlmann Nyre , Martin Gilje Jaatun
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.317-331, ⟨10.1007/978-3-642-32498-7_24⟩
Conference papers hal-01542431v1
Image document

OWL-Based Node Capability Parameter Configuration

Patcharee Thongtra , Finn Arve Aagesen , Kornschnok Dittawit
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.124-135, ⟨10.1007/978-3-642-32808-4_12⟩
Conference papers hal-01543152v1
Image document

On Complexity Reduction of User Interfaces for Safety-Critical Systems

Andreas Holzinger , Evgenia Popova , Bernhard Peischl , Martina Ziefle
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.108-122, ⟨10.1007/978-3-642-32498-7_9⟩
Conference papers hal-01542450v1
Image document

P Systems for Traffic Flow Simulation

Jiří Dvorský , Zbyněk Janoška , Lukáš Vojáček
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.405-415, ⟨10.1007/978-3-642-33260-9_35⟩
Conference papers hal-01551745v1
Image document

On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

Udi Ben-Porat , Anat Bremler-Barr , Hanoch Levy , Bernhard Plattner
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.135-148, ⟨10.1007/978-3-642-30045-5_11⟩
Conference papers hal-01531139v1
Image document

The Usage of Usability Techniques in Scrum Projects

Yuan Jia , Marta Kristin Larusdottir , Åsa Cajander
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.331-341, ⟨10.1007/978-3-642-34347-6_25⟩
Conference papers hal-01556824v1
Image document

User-Oriented Requirements Engineering

Alistair Sutcliffe
1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.11-33, ⟨10.1007/978-3-319-45916-5_2⟩
Conference papers hal-01631313v1
Image document

OverStar: An Open Approach to End-to-End Middleware Services in Systems of Systems

Paul Grace , Yérom-David Bromberg , Laurent Réveillère , Gordon Blair
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.229-248, ⟨10.1007/978-3-642-35170-9_12⟩
Conference papers hal-00991376v1