Filter your results
- 714
- 26
- 714
- 26
- 738
- 98
- 2
- 1
- 11
- 16
- 713
- 740
- 13
- 12
- 9
- 8
- 7
- 7
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 8
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Using Behaviour Inference to Optimise Regression Test Sets24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.184-199, ⟨10.1007/978-3-642-34691-0_14⟩
Conference papers
hal-01482401v1
|
||
|
Towards a Logical Framework for Reasoning about RiskInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.609-623, ⟨10.1007/978-3-642-32498-7_46⟩
Conference papers
hal-01542424v1
|
||
|
Similarity of Transactions for Customer SegmentationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.347-359, ⟨10.1007/978-3-642-32498-7_26⟩
Conference papers
hal-01542433v1
|
||
|
Combining Relational and Semi-structured Databases for an Inquiry ApplicationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.73-84, ⟨10.1007/978-3-642-32498-7_6⟩
Conference papers
hal-01542448v1
|
||
|
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query LanguagesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.302-316, ⟨10.1007/978-3-642-32498-7_23⟩
Conference papers
hal-01542449v1
|
||
|
A Formal Equivalence Classes Based Method for Security Policy Conformance CheckingInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.146-160, ⟨10.1007/978-3-642-32498-7_12⟩
Conference papers
hal-01542451v1
|
||
|
How to Forge a Digital Alibi on Mac OS XInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.430-444, ⟨10.1007/978-3-642-32498-7_32⟩
Conference papers
hal-01542452v1
|
||
|
Design and Analysis of a Fragile Watermarking Scheme Based on Block-MappingInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.654-668, ⟨10.1007/978-3-642-32498-7_49⟩
Conference papers
hal-01542471v1
|
||
|
The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.315-319, ⟨10.1007/978-3-642-35606-3_37⟩
Conference papers
hal-01551329v1
|
||
|
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.94-100, ⟨10.1007/978-3-642-35606-3_11⟩
Conference papers
hal-01551336v1
|
||
|
A Scoring System for Short Answers on the Test in a Large Group9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.42-47, ⟨10.1007/978-3-642-35606-3_5⟩
Conference papers
hal-01551358v1
|
||
|
Heterogeneous Secure Multi-Party Computation11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.198-210, ⟨10.1007/978-3-642-30054-7_16⟩
Conference papers
hal-00747844v1
|
||
|
Designing Smart Cities: Security Issues11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.30-40, ⟨10.1007/978-3-642-33260-9_2⟩
Conference papers
hal-01551737v1
|
||
|
Satisfiability Calculus: The Semantic Counterpart of a Proof Calculus in General Logics21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.195-211, ⟨10.1007/978-3-642-37635-1_12⟩
Conference papers
hal-01485970v1
|
||
|
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control ConceptInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.131-145, ⟨10.1007/978-3-642-32498-7_11⟩
Conference papers
hal-01542444v1
|
||
|
Forensic Tracking and Mobility Prediction in Vehicular Networks8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.303-317, ⟨10.1007/978-3-642-33962-2_21⟩
Conference papers
hal-01523712v1
|
||
|
Experiences with User-Centered Design and Agile Requirements Engineering in Fixed-Price Projects1st and 2nd International Workshop on Usability- and Accessibility-Focused Requirements Engineering (UsARE 2012 / UsARE 2014), Jun 2012, Zurich, Switzerland. pp.47-61, ⟨10.1007/978-3-319-45916-5_4⟩
Conference papers
hal-01631315v1
|
||
|
dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.172-179, ⟨10.1007/978-3-642-35606-3_20⟩
Conference papers
hal-01551348v1
|
||
|
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary ArteriesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers
hal-01542462v1
|
||
|
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on SmartphonesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.176-189, ⟨10.1007/978-3-642-32498-7_14⟩
Conference papers
hal-01542428v1
|
||
|
Cross-Border Legal Identity Management11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers
hal-01543589v1
|
||
|
Finding Typical Internet User Behaviors18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.321-327, ⟨10.1007/978-3-642-32808-4_29⟩
Conference papers
hal-01543170v1
|
||
|
Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.279-288, ⟨10.1007/978-3-642-35606-3_33⟩
Conference papers
hal-01551364v1
|
||
|
Automated and Efficient Analysis of Role-Based Access Control with Attributes26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.25-40, ⟨10.1007/978-3-642-31540-4_3⟩
Conference papers
hal-01534765v1
|
||
|
Towards a Statistical Characterization of the Interdomain Traffic Matrix11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.111-123, ⟨10.1007/978-3-642-30054-7_9⟩
Conference papers
hal-01531968v1
|
||
|
Estimating Network Layer Subnet Characteristics via Statistical Sampling11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.274-288, ⟨10.1007/978-3-642-30045-5_21⟩
Conference papers
hal-01531114v1
|
||
|
Resilience in Computer Network Management11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.109-120, ⟨10.1007/978-3-642-30045-5_9⟩
Conference papers
hal-01531124v1
|
||
|
Distributed Content Backup and Sharing Using Social Information11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.68-81, ⟨10.1007/978-3-642-30045-5_6⟩
Conference papers
hal-01531125v1
|
||
|
A 2-Approximation Algorithm for Optimal Deployment of k Base Stations in WSNs11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.378-391, ⟨10.1007/978-3-642-30054-7_30⟩
Conference papers
hal-01531960v1
|
||
|
Playing with the Weather11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.172-184, ⟨10.1007/978-3-642-33542-6_15⟩
Conference papers
hal-01556119v1
|