Filter your results
- 714
- 26
- 714
- 712
- 98
- 2
- 1
- 11
- 16
- 687
- 714
- 13
- 12
- 9
- 8
- 7
- 7
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 8
- 5
- 5
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
An Instance-Based Approach for the Quantitative Assessment of Key Value Network DependenciesNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.97-104, ⟨10.1007/978-3-642-30039-4_12⟩
Conference papers
hal-01533584v1
|
||
|
Cross-Border Legal Identity Management11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers
hal-01543589v1
|
||
|
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.204-206, ⟨10.1007/978-3-642-32805-3_20⟩
Conference papers
hal-01540897v1
|
||
|
Issues and Guiding Principles for Opening Governmental Judicial Research Data11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.90-101, ⟨10.1007/978-3-642-33489-4_8⟩
Conference papers
hal-01543591v1
|
||
|
Privacy Preserving Social Network Publication on Bipartite Graphs6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.58-70, ⟨10.1007/978-3-642-30955-7_7⟩
Conference papers
hal-01534307v1
|
||
|
dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.172-179, ⟨10.1007/978-3-642-35606-3_20⟩
Conference papers
hal-01551348v1
|
||
|
OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.437-444, ⟨10.1007/978-3-642-35606-3_52⟩
Conference papers
hal-01551380v1
|
||
|
A Task-Based Model for the Lifespan of Peer-to-Peer Swarms11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.71-83, ⟨10.1007/978-3-642-30054-7_6⟩
Conference papers
hal-01531955v1
|
||
|
Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.69-76, ⟨10.1007/978-3-642-35606-3_8⟩
Conference papers
hal-01551307v1
|
||
|
Visualization of Complex Networks Dynamics: Case StudyNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.145-150, ⟨10.1007/978-3-642-30039-4_19⟩
Conference papers
hal-01533583v1
|
||
|
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers
hal-01542426v1
|
||
|
Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.575-580, ⟨10.1007/978-3-642-35606-3_68⟩
Conference papers
hal-01551322v1
|
||
|
Using PCI Pass-Through for GPU Virtualization with CUDA9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.445-452, ⟨10.1007/978-3-642-35606-3_53⟩
Conference papers
hal-01551356v1
|
||
|
Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.172-183, ⟨10.1007/978-3-642-30054-7_14⟩
Conference papers
hal-01531970v1
|
||
|
Querying Parametric Temporal Logic Properties on Embedded Systems24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.136-151, ⟨10.1007/978-3-642-34691-0_11⟩
Conference papers
hal-01482426v1
|
||
|
From MDM to DB2: A Case Study of Security Enforcement Migration26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers
hal-01534771v1
|
||
|
QoE Analysis of Media Streaming in Wireless Data Networks11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.343-354, ⟨10.1007/978-3-642-30054-7_27⟩
Conference papers
hal-01531963v1
|
||
|
Experience Focused Requirements Gathering with Children and Young People - Balancing Player, Learner and User (PLU) Requirement Needs1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.62-76, ⟨10.1007/978-3-319-45916-5_5⟩
Conference papers
hal-01631316v1
|
||
|
Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.279-288, ⟨10.1007/978-3-642-35606-3_33⟩
Conference papers
hal-01551364v1
|
||
|
Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.227-238, ⟨10.1007/978-3-642-32808-4_21⟩
Conference papers
hal-01543165v1
|
||
|
An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.1-13, ⟨10.1007/978-3-642-35606-3_1⟩
Conference papers
hal-01551355v1
|
||
|
Dynamic Pricing Coalitional Game for Cognitive Radio NetworksNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.19-26, ⟨10.1007/978-3-642-30039-4_3⟩
Conference papers
hal-01533577v1
|
||
|
Sign What You Really Care about – Secure BGP AS Paths Efficiently11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.259-273, ⟨10.1007/978-3-642-30045-5_20⟩
Conference papers
hal-01531135v1
|
||
|
Model Based Critique of Policy Proposals4th International Conference on Electronic Participation (ePart), Sep 2012, Kristiansand, Norway. pp.120-131, ⟨10.1007/978-3-642-33250-0_11⟩
Conference papers
hal-01541479v1
|
||
|
A 2-Approximation Algorithm for Optimal Deployment of k Base Stations in WSNs11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.378-391, ⟨10.1007/978-3-642-30054-7_30⟩
Conference papers
hal-01531960v1
|
||
|
Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.492-499, ⟨10.1007/978-3-642-35606-3_58⟩
Conference papers
hal-01551382v1
|
||
|
Estimation of Expectable Network Quality in Wireless Mesh NetworksNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.126-132, ⟨10.1007/978-3-642-30039-4_16⟩
Conference papers
hal-01533593v1
|
||
|
Internal Models for Coalgebraic Modal Logics11th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Mar 2012, Tallinn, Estonia. pp.238-258, ⟨10.1007/978-3-642-32784-1_13⟩
Conference papers
hal-01539883v1
|
||
|
Computability and Non-computability Issues in Amorphous Computing7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.1-9, ⟨10.1007/978-3-642-33475-7_1⟩
Conference papers
hal-01556229v1
|
||
|
Efficient Multihop Broadcast with Distributed Protocol Evolution18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.309-320, ⟨10.1007/978-3-642-32808-4_28⟩
Conference papers
hal-01543149v1
|