Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

714 results
Deposit type : Fulltext
Image document

An Instance-Based Approach for the Quantitative Assessment of Key Value Network Dependencies

Patrick Zwickl , Peter Reichl
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.97-104, ⟨10.1007/978-3-642-30039-4_12⟩
Conference papers hal-01533584v1
Image document

Cross-Border Legal Identity Management

Bernd Zwattendorfer , Arne Tauber , Klaus Stranacher , Peter Reichstädter
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers hal-01543589v1
Image document

A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls

André Zúquete , Pedro Correia , Miguel Rocha
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.204-206, ⟨10.1007/978-3-642-32805-3_20⟩
Conference papers hal-01540897v1
Image document

Issues and Guiding Principles for Opening Governmental Judicial Research Data

Anneke Zuiderwijk , Marijn Janssen , Ronald Meijer , Sunil Choenni , Yannis Charalabidis , et al.
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.90-101, ⟨10.1007/978-3-642-33489-4_8⟩
Conference papers hal-01543591v1
Image document

Privacy Preserving Social Network Publication on Bipartite Graphs

Jian Zhou , Jiwu Jing , Ji Xiang , Lei Wang
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.58-70, ⟨10.1007/978-3-642-30955-7_7⟩
Conference papers hal-01534307v1
Image document

dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing

Xu Zhou , Kai Lu , Xicheng Lu , Xiaoping Wang , Baohua Fan
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.172-179, ⟨10.1007/978-3-642-35606-3_20⟩
Conference papers hal-01551348v1
Image document

OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science

Zhiming Zhao , Paola Grosso , Cees De Laat
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.437-444, ⟨10.1007/978-3-642-35606-3_52⟩
Conference papers hal-01551380v1
Image document

A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

Yong Zhao , Zhibin Zhang , Ting He , Alex X. Liu , Li Guo , et al.
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.71-83, ⟨10.1007/978-3-642-30054-7_6⟩
Conference papers hal-01531955v1
Image document

Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks

Longbo Zhang , Chen Yu , Hai Jin
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.69-76, ⟨10.1007/978-3-642-35606-3_8⟩
Conference papers hal-01551307v1
Image document

Visualization of Complex Networks Dynamics: Case Study

Ivan Zelinka , Donald Davendra , Lenka Skanderova
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.145-150, ⟨10.1007/978-3-642-30039-4_19⟩
Conference papers hal-01533583v1
Image document

Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts

Marek Zachara , Dariusz Pałka
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers hal-01542426v1
Image document

Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader

Eun-Jun Yoon
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.575-580, ⟨10.1007/978-3-642-35606-3_68⟩
Conference papers hal-01551322v1
Image document

Using PCI Pass-Through for GPU Virtualization with CUDA

Chao-Tung Yang , Hsien-Yi Wang , Yu-Tso Liu
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.445-452, ⟨10.1007/978-3-642-35606-3_53⟩
Conference papers hal-01551356v1
Image document

Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market

Zichao Yang , John Lui
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.172-183, ⟨10.1007/978-3-642-30054-7_14⟩
Conference papers hal-01531970v1
Image document

Querying Parametric Temporal Logic Properties on Embedded Systems

Hengyi Yang , Bardh Hoxha , Georgios Fainekos
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.136-151, ⟨10.1007/978-3-642-34691-0_11⟩
Conference papers hal-01482426v1
Image document

From MDM to DB2: A Case Study of Security Enforcement Migration

Nikolay Yakovets , Jarek Gryz , Stephanie Hazlewood , Paul Van Run
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers hal-01534771v1
Image document

QoE Analysis of Media Streaming in Wireless Data Networks

Yuedong Xu , Eitan Altman , Rachid El-Azouzi , Salah Eddine Elayoubi , Majed Haddad
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.343-354, ⟨10.1007/978-3-642-30054-7_27⟩
Conference papers hal-01531963v1
Image document

Experience Focused Requirements Gathering with Children and Young People - Balancing Player, Learner and User (PLU) Requirement Needs

Diana Yifan Xu , Janet C. Read
1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.62-76, ⟨10.1007/978-3-319-45916-5_5⟩
Conference papers hal-01631316v1
Image document

Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center

Lei Xu , Wenzhi Chen , Zonghui Wang , Huafei Ni , Jiajie Wu
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.279-288, ⟨10.1007/978-3-642-35606-3_33⟩
Conference papers hal-01551364v1
Image document

Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network

Lang Xie , Poul E. Heegaard , Yuming Jiang
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.227-238, ⟨10.1007/978-3-642-32808-4_21⟩
Conference papers hal-01543165v1
Image document

An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments

Jian Xiao , Yu Zhang , Shuwei Chen , Huashan Yu
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.1-13, ⟨10.1007/978-3-642-35606-3_1⟩
Conference papers hal-01551355v1
Image document

Dynamic Pricing Coalitional Game for Cognitive Radio Networks

Yong Xiao , Luiz A. Dasilva
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.19-26, ⟨10.1007/978-3-642-30039-4_3⟩
Conference papers hal-01533577v1
Image document

Sign What You Really Care about – Secure BGP AS Paths Efficiently

Yang Xiang , Zhiliang Wang , Jianping Wu , Xingang Shi , Xia Yin
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.259-273, ⟨10.1007/978-3-642-30045-5_20⟩
Conference papers hal-01531135v1
Image document

Model Based Critique of Policy Proposals

Adam Z. Wyner , Katie Atkinson , Trevor Bench-Capon
4th International Conference on Electronic Participation (ePart), Sep 2012, Kristiansand, Norway. pp.120-131, ⟨10.1007/978-3-642-33250-0_11⟩
Conference papers hal-01541479v1
Image document

A 2-Approximation Algorithm for Optimal Deployment of k Base Stations in WSNs

Hui Wu , Sabbir Mahmud
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.378-391, ⟨10.1007/978-3-642-30054-7_30⟩
Conference papers hal-01531960v1
Image document

Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem

M. Wong , Ka Lok Man
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.492-499, ⟨10.1007/978-3-642-35606-3_58⟩
Conference papers hal-01551382v1
Image document

Estimation of Expectable Network Quality in Wireless Mesh Networks

Till Wollenberg
Networking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.126-132, ⟨10.1007/978-3-642-30039-4_16⟩
Conference papers hal-01533593v1
Image document

Internal Models for Coalgebraic Modal Logics

Toby Wilkinson
11th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Mar 2012, Tallinn, Estonia. pp.238-258, ⟨10.1007/978-3-642-32784-1_13⟩
Conference papers hal-01539883v1
Image document

Computability and Non-computability Issues in Amorphous Computing

Jiří Wiedermann
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.1-9, ⟨10.1007/978-3-642-33475-7_1⟩
Conference papers hal-01556229v1
Image document

Efficient Multihop Broadcast with Distributed Protocol Evolution

Bernát Wiandt , Vilmos Simon , Endre Sándor Varga
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.309-320, ⟨10.1007/978-3-642-32808-4_28⟩
Conference papers hal-01543149v1