Filter your results
- 745
- 24
- 15
- 744
- 1
- 744
- 185
- 1
- 1
- 20
- 725
- 745
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.148-159, ⟨10.1007/978-3-642-38998-6_18⟩
Conference papers
hal-01489964v1
|
||
|
Authentication with Time Features for Keystroke Dynamics on Touchscreens14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.197-199, ⟨10.1007/978-3-642-40779-6_17⟩
Conference papers
hal-01492821v1
|
||
|
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.85-94, ⟨10.1007/978-3-642-40779-6_6⟩
Conference papers
hal-01492835v1
|
||
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers
hal-01506556v1
|
||
|
A Harmonized Process Model for Digital Forensic Investigation Readiness9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.67-82, ⟨10.1007/978-3-642-41148-9_5⟩
Conference papers
hal-01460621v1
|
||
|
KLM Form Analyzer: Automated Evaluation of Web Form Filling Tasks Using Human Performance Models14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.530-537, ⟨10.1007/978-3-642-40480-1_36⟩
Conference papers
hal-01501769v1
|
||
|
Vimprint: Exploring Alternative Learning through Low-End Mobiles14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.589-596, ⟨10.1007/978-3-642-40480-1_41⟩
Conference papers
hal-01501775v1
|
||
|
Metamodels Infrastructure and Heuristics for Metamodel-Driven Multi-touch Interaction14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.210-227, ⟨10.1007/978-3-642-40480-1_14⟩
Conference papers
hal-01501745v1
|
||
|
Accelerating Parallel Frequent Itemset Mining on Graphics Processors with Sorting10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.245-256, ⟨10.1007/978-3-642-40820-5_21⟩
Conference papers
hal-01513752v1
|
||
|
Modified Incomplete Cholesky Preconditioned Conjugate Gradient Algorithm on GPU for the 3D Parabolic Equation10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.298-307, ⟨10.1007/978-3-642-40820-5_25⟩
Conference papers
hal-01513768v1
|
||
|
HCI for City Farms: Design Challenges and Opportunities14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.109-116, ⟨10.1007/978-3-642-40498-6_7⟩
Conference papers
hal-01510521v1
|
||
|
From Persona to Techsona14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.342-349, ⟨10.1007/978-3-642-40498-6_26⟩
Conference papers
hal-01510531v1
|
||
|
“Roger that!” — The Value of Adding Social Feedback in Audio-Mediated Communications14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.471-488, ⟨10.1007/978-3-642-40498-6_37⟩
Conference papers
hal-01510536v1
|
||
|
Towards Engaged Consumption: New Sources of Inspiration for Eco-feedback Design14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.117-124, ⟨10.1007/978-3-642-40498-6_8⟩
Conference papers
hal-01510542v1
|
||
|
Automated Trading for Smart Grids: Can It Work?7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.1-13, ⟨10.1007/978-3-642-54140-7_1⟩
Conference papers
hal-01291487v1
|
||
|
Long-Term Experiences with an Iterative Design of a QR-Code-Based Payment System for Beverages14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.587-594, ⟨10.1007/978-3-642-40498-6_49⟩
Conference papers
hal-01510500v1
|
||
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Towards User-Oriented RBAC Model27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers
hal-01490719v1
|
||
|
Modified kNN Algorithm for Improved Recognition Accuracy of Biometrics System Based on Gait12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.59-66, ⟨10.1007/978-3-642-40925-7_6⟩
Conference papers
hal-01496099v1
|
||
|
Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers
hal-01231765v1
|
||
|
The Impact of Encumbrance on Mobile Interactions14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.92-109, ⟨10.1007/978-3-642-40477-1_6⟩
Conference papers
hal-01504931v1
|
||
|
A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.157-162, ⟨10.1007/978-3-642-54140-7_15⟩
Conference papers
hal-01291513v1
|
||
|
Sharing Experiences over Video: Watching Video Programs together at a Distance14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.73-90, ⟨10.1007/978-3-642-40498-6_5⟩
Conference papers
hal-01510557v1
|
||
|
Government Architecture: Concepts, Use and Impact12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.135-147, ⟨10.1007/978-3-642-40358-3_12⟩
Conference papers
hal-01490901v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
User Control in Adaptive User Interfaces for Accessibility14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.623-640, ⟨10.1007/978-3-642-40483-2_44⟩
Conference papers
hal-01497467v1
|
||
|
Cloud-Based Privacy Aware Preference Aggregation Service1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.208-223
Conference papers
hal-01506784v1
|
||
|
Designing Gesture-Based Control for Factory Automation14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.202-209, ⟨10.1007/978-3-642-40480-1_13⟩
Conference papers
hal-01501743v1
|
||
|
Flow-Based Detection of DNS Tunnels7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers
hal-01489962v1
|
||
|
Navigating, Discovering and Exploring the Web: Strategies Used by People with Print Disabilities on Interactive Websites14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.667-684, ⟨10.1007/978-3-642-40483-2_47⟩
Conference papers
hal-01497470v1
|