Filter your results
- 745
- 24
- 15
- 744
- 1
- 744
- 185
- 1
- 1
- 20
- 725
- 745
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.11-20, ⟨10.1007/978-3-642-36818-9_2⟩
Conference papers
hal-01480235v1
|
||
|
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.113-122, ⟨10.1007/978-3-642-40779-6_9⟩
Conference papers
hal-01492837v1
|
||
|
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers
hal-01480224v1
|
||
|
The Impact of Encumbrance on Mobile Interactions14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.92-109, ⟨10.1007/978-3-642-40477-1_6⟩
Conference papers
hal-01504931v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
||
|
RelicPad: A Hands-On, Mobile Approach to Collaborative Exploration of Virtual Museum Artifacts14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.86-103, ⟨10.1007/978-3-642-40483-2_7⟩
Conference papers
hal-01497484v1
|
||
|
Territorial Governance, E-Government and Sustainable Development Policy: A System Dynamics Approach12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.14-25, ⟨10.1007/978-3-642-40358-3_2⟩
Conference papers
hal-01490918v1
|
||
|
Compiling Cooperative Task Management to Continuations5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.95-110, ⟨10.1007/978-3-642-40213-5_7⟩
Conference papers
hal-01514661v1
|
||
|
FlowFlex: Malleable Scheduling for Flows of MapReduce Jobs14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.103-122, ⟨10.1007/978-3-642-45065-5_6⟩
Conference papers
hal-01480794v1
|
||
|
12MAP: Cloud Disaster Recovery Based on Image-Instance Mapping14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.204-225, ⟨10.1007/978-3-642-45065-5_11⟩
Conference papers
hal-01480777v1
|
||
|
Early-Detection System for Cross-Language (Translated) Plagiarism1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.21-30, ⟨10.1007/978-3-642-36818-9_3⟩
Conference papers
hal-01480193v1
|
||
|
Ambient Timer – Unobtrusively Reminding Users of Upcoming Tasks with Ambient Light14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.211-228, ⟨10.1007/978-3-642-40483-2_15⟩
Conference papers
hal-01497437v1
|
||
|
Information Systems Strategic Planning for a Naval Hospital1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.202-213, ⟨10.1007/978-3-642-36818-9_21⟩
Conference papers
hal-01480176v1
|
||
|
Quantifying Windows File Slack Size and Stability9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.183-193, ⟨10.1007/978-3-642-41148-9_13⟩
Conference papers
hal-01460605v1
|
||
|
A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.301-312, ⟨10.1007/978-3-642-40925-7_28⟩
Conference papers
hal-01496076v1
|
||
|
Floffy: Designing an Outdoor Robot for Children14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.563-570, ⟨10.1007/978-3-642-40498-6_46⟩
Conference papers
hal-01510506v1
|
||
|
Designing for the Functionality South African Internet Banking Websites Should Provide to Address the Needs of Generation-Y Users14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.366-383, ⟨10.1007/978-3-642-40498-6_29⟩
Conference papers
hal-01510511v1
|
||
|
Self-management of Hybrid Networks – Hidden Costs Due to TCP Performance Problems19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.54-65, ⟨10.1007/978-3-642-40552-5_6⟩
Conference papers
hal-01497037v1
|
||
|
Considering Communities, Diversity and the Production of Locality in the Design of Networked Urban Screens14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.315-322, ⟨10.1007/978-3-642-40483-2_21⟩
Conference papers
hal-01497443v1
|
||
|
A Case Study in Formal Verification Using Multiple Explicit Heaps15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.20-34, ⟨10.1007/978-3-642-38592-6_3⟩
Conference papers
hal-01515237v1
|
||
|
A Forward Privacy Model for RFID Authentication Protocols7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers
hal-01485936v1
|
||
|
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance System1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.534-539, ⟨10.1007/978-3-642-36818-9_62⟩
Conference papers
hal-01480214v1
|
||
|
A Framework for Interoperability Testing in Pan-European Public Service Provision12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.188-199, ⟨10.1007/978-3-642-40358-3_16⟩
Conference papers
hal-01490906v1
|
||
|
Content Prototyping – An Approach for Engaging Non-technical Users in Participatory Design14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.788-795, ⟨10.1007/978-3-642-40483-2_56⟩
Conference papers
hal-01497480v1
|
||
|
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.272-288
Conference papers
hal-01506779v1
|
||
|
ByteSTM: Virtual Machine-Level Java Software Transactional Memory15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.166-180, ⟨10.1007/978-3-642-38493-6_12⟩
Conference papers
hal-01486025v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
Strategic Framework for Designing E-Government in Developing Countries12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.148-162, ⟨10.1007/978-3-642-40358-3_13⟩
Conference papers
hal-01490902v1
|
||
|
Overview Scrollbar: A Scrollbar Showing an Entire Document as an Overview14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.603-610, ⟨10.1007/978-3-642-40498-6_51⟩
Conference papers
hal-01510496v1
|
||
|
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers
hal-01480209v1
|