Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

745 results
Deposit type : Fulltext
Image document

Adding Vibrotactile Feedback to Large Interactive Surfaces

Julian Seifert , Markus Packeiser , Enrico Rukzio
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.507-514, ⟨10.1007/978-3-642-40498-6_39⟩
Conference papers hal-01510549v1
Image document

PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays

Julian Seifert , Andreas Bayer , Enrico Rukzio
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.18-35, ⟨10.1007/978-3-642-40477-1_2⟩
Conference papers hal-01504904v1
Image document

MoCoShoP: Supporting Mobile and Collaborative Shopping and Planning of Interiors

Julian Seifert , Dennis Schneider , Enrico Rukzio
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.756-763, ⟨10.1007/978-3-642-40480-1_53⟩
Conference papers hal-01501787v1
Image document

Representational Practices in Demands Driven Development of Public Sector

Johanna Sefyrin , Katarina L Gidlund , Karin Danielsson Öberg , Annelie Ekelin
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.200-211, ⟨10.1007/978-3-642-40358-3_17⟩
Conference papers hal-01490907v1
Image document

Towards Learning Normality for Anomaly Detection in Industrial Control Networks

Franka Schuster , Andreas Paul , Hartmut König
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.61-72, ⟨10.1007/978-3-642-38998-6_8⟩
Conference papers hal-01489971v1
Image document

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

Daniel Schreckling , Stephan Huber , Focke Höhne , Joachim Posegga
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers hal-01485933v1
Image document

Electronic Government Research: Topical Directions and Preferences

Hans J. Scholl
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.1-13, ⟨10.1007/978-3-642-40358-3_1⟩
Conference papers hal-01490910v1
Image document

Bandwidth Prediction in the Face of Asymmetry

Sven Schober , Stefan Brenner , Rüdiger Kapitza , Franz J. Hauck
13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.99-112, ⟨10.1007/978-3-642-38541-4_8⟩
Conference papers hal-01489468v1
Image document

Thumbs Up: 3D Gesture Input on Mobile Phones Using the Front Facing Camera

Paul Schmieder , John Hosking , Andrew Luxton-Reilly , Beryl Plimmer
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.318-336, ⟨10.1007/978-3-642-40480-1_20⟩
Conference papers hal-01501752v1
Image document

SplayNet: Distributed User-Space Topology Emulation

Valerio Schiavoni , Etienne Rivière , Pascal Felber
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.62-81, ⟨10.1007/978-3-642-45065-5_4⟩
Conference papers hal-01480792v1
Image document

A One-Handed Multi-touch Method for 3D Rotations

Douglas Scheurich , Wolfgang Stuerzlinger
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.56-69, ⟨10.1007/978-3-642-40483-2_4⟩
Conference papers hal-01497473v1
Image document

Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project

Thomas Schaberreiter , Sébastien Varrette , Pascal Bouvry , Juha Röning , Djamel Khadraoui
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.269-287
Conference papers hal-01506574v1
Image document

A Fully Reversible Data Transform Technique Enhancing Data Compression of SMILES Data

Shagufta Scanlon , Mick Ridley
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.54-68
Conference papers hal-01506777v1
Image document

Development of Novel eHealth Services for Citizen Use – Current System Engineering vs. Best Practice in HCI

Isabella Scandurra , Jesper Holgersson , Thomas Lind , Gunilla Myreteg
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.372-379, ⟨10.1007/978-3-642-40480-1_24⟩
Conference papers hal-01501755v1
Image document

Chaining Data and Visualization Web Services for Decision Making in Information Systems

Ahmet Sayar , Marlon E. Pierce
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-53
Conference papers hal-01506785v1
Image document

Index Data Structure for Fast Subset and Superset Queries

Iztok Savnik
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.134-148
Conference papers hal-01506780v1
Image document

When Paper Meets Multi-touch: A Study of Multi-modal Interactions in Air Traffic Control

Cheryl Savery , Christophe Hurter , Rémi Lesbordes , Maxime Cordeil , T. Nicholas Graham
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.196-213, ⟨10.1007/978-3-642-40477-1_12⟩
Conference papers hal-01504884v1
Image document

Detecting Counterfeit Currency and Identifying Its Source

Ankit Sarkar , Robin Verma , Gaurav Gupta
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.367-384, ⟨10.1007/978-3-642-41148-9_24⟩
Conference papers hal-01460616v1
Image document

Code Based KPD Scheme with Full Connectivity: Deterministic Merging

Pinaki Sarkar , Aritra Dhar
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.141-151, ⟨10.1007/978-3-642-36818-9_15⟩
Conference papers hal-01480168v1
Image document

Separating Obligations of Subjects and Handlers for More Flexible Event Type Verification

José Sánchez , Gary T. Leavens
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.65-80, ⟨10.1007/978-3-642-39614-4_5⟩
Conference papers hal-01492777v1
Image document

Towards Distributed Reactive Programming

Guido Salvaneschi , Joscha Drechsler , Mira Mezini
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers hal-01486029v1
Image document

Participatory Design with Blind Users: A Scenario-Based Approach

Nuzhah Gooda Sahib , Tony Stockman , Anastasios Tombros , Oussama Metatla
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.685-701, ⟨10.1007/978-3-642-40483-2_48⟩
Conference papers hal-01497471v1
Image document

Delta Modeling and Model Checking of Product Families

Hamideh Sabouri , Ramtin Khosravi
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.51-65, ⟨10.1007/978-3-642-40213-5_4⟩
Conference papers hal-01514656v1
Image document

Participatory Design for Cultural Representation: A Cultural Transparency Perspective

Amalia G. Sabiescu , Nemanja Memarovic
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.611-618, ⟨10.1007/978-3-642-40498-6_52⟩
Conference papers hal-01510547v1
Image document

How, Why and with Whom Do Local Politicians Engage on Facebook?

Eirik Rustad , Øystein Sæbø
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.69-79, ⟨10.1007/978-3-642-40346-0_7⟩
Conference papers hal-01491232v1
Image document

Exploring Twitter Interactions through Visualization Techniques: Users Impressions and New Possibilities

Guilherme Coletto Rotta , Vinícius De Lemos , Ana Da Cunha , Isabel Harb Manssour , Milene Selbach Silveira , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.700-707, ⟨10.1007/978-3-642-40477-1_48⟩
Conference papers hal-01504923v1
Image document

Unbounded Allocation in Bounded Heaps

Jurriaan Rot , Frank De Boer , Marcello Bonsangue
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.1-16, ⟨10.1007/978-3-642-40213-5_1⟩
Conference papers hal-01514664v1
Image document

Security Issues of IPv6 Network Autoconfiguration

Maciej Rostański , Taras Mushynskyy
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.218-228, ⟨10.1007/978-3-642-40925-7_21⟩
Conference papers hal-01496069v1
Image document

User Authentication for Mobile Devices

Marcin Rogowski , Khalid Saeed , Mariusz Rybnik , Marek Tabedzki , Marcin Adamski
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers hal-01496111v1
Image document

Homestead Creator: Using Card Sorting in Search for Culture-Aware Categorizations of Interface Objects

Kasper Rodil , Matthias Rehm , Heike Winschiers-Theophilus
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.437-444, ⟨10.1007/978-3-642-40483-2_30⟩
Conference papers hal-01497511v1