Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

745 results
Deposit type : Fulltext
Image document

Biomedical Distributed Signal Processing and Analysis

Marek Penhaker , Vladimir Kasik , Vaclav Snasel
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.88-95, ⟨10.1007/978-3-642-40925-7_9⟩
Conference papers hal-01496102v1
Image document

Extending Mobile Interfaces with External Screens

Julian Seifert , Dennis Schneider , Enrico Rukzio
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.722-729, ⟨10.1007/978-3-642-40480-1_50⟩
Conference papers hal-01501784v1
Image document

VMAR: Optimizing I/O Performance and Resource Utilization in the Cloud

Zhiming Shen , Zhe Zhang , Andrzej Kochut , Alexei Karve , Han Chen , et al.
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.183-203, ⟨10.1007/978-3-642-45065-5_10⟩
Conference papers hal-01480776v1
Image document

A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards

Michael Lackner , Reinhard Berlach , Wolfgang Raschke , Reinhold Weiss , Christian Steger
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.82-97, ⟨10.1007/978-3-642-38530-8_6⟩
Conference papers hal-01485935v1
Image document

Bengali Printed Character Recognition – A New Approach

Soharab Hossain Shaikh , Marek Tabedzki , Nabendu Chaki , Khalid Saeed
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.129-140, ⟨10.1007/978-3-642-40925-7_13⟩
Conference papers hal-01496058v1
Image document

Considering Communities, Diversity and the Production of Locality in the Design of Networked Urban Screens

Wallis Motta , Ava Gen Schieck , Holger Schnädelbach , Efstathia Kostopoulou , Moritz Behrens , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.315-322, ⟨10.1007/978-3-642-40483-2_21⟩
Conference papers hal-01497443v1
Image document

A Fine-Grained Pipelined Implementation of LU Decomposition on SIMD Processors

Kai Zhang , Shuming Chen , Wei Liu , Xi Ning
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.39-48, ⟨10.1007/978-3-642-40820-5_4⟩
Conference papers hal-01513757v1
Image document

Efficiency of Flexible Rerouting Scheme for Maximizing Logical Arrays

Guiyuan Jiang , Jigang Wu , Jizhou Sun
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.194-206, ⟨10.1007/978-3-642-40820-5_17⟩
Conference papers hal-01513763v1
Image document

You Can’t Touch This: Potential Perils of Patient Interaction with Clinical Medical Devices

Paul Noble , Ann Blandford
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.395-402, ⟨10.1007/978-3-642-40480-1_26⟩
Conference papers hal-01501758v1
Image document

SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences

Chien-Ning Chen , Jheng-Hong Tu , Sung-Ming Yen
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.222-235
Conference papers hal-01506557v1
Image document

Ambient Timer – Unobtrusively Reminding Users of Upcoming Tasks with Ambient Light

Heiko Müller , Anastasia Kazakova , Martin Pielot , Wilko Heuten , Susanne Boll
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.211-228, ⟨10.1007/978-3-642-40483-2_15⟩
Conference papers hal-01497437v1
Image document

Circular Dimensional-Permutations and Reliable Broadcasting for Hypercubes and Möbius Cubes

Baolei Cheng , Jianxi Fan , Jiwen Yang , Xi Wang
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.232-244, ⟨10.1007/978-3-642-40820-5_20⟩
Conference papers hal-01513766v1
Image document

Chaining Data and Visualization Web Services for Decision Making in Information Systems

Ahmet Sayar , Marlon E. Pierce
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-53
Conference papers hal-01506785v1
Image document

Compiling Cooperative Task Management to Continuations

Keiko Nakata , Andri Saar
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.95-110, ⟨10.1007/978-3-642-40213-5_7⟩
Conference papers hal-01514661v1
Image document

Poster Abstract: Performance Evaluation of Machine-to-Machine Communication on Future Mobile Networks in Disaster Scenarios

Thomas Pötsch , Safdar Khan Marwat , Yasir Zaki , Carmelita Görg
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.270-273, ⟨10.1007/978-3-642-40552-5_24⟩
Conference papers hal-01497050v1
Image document

What Do You See in the Cloud? Understanding the Cloud-Based User Experience through Practices

John C. Tang , Jed R. Brubaker , Catherine C. Marshall
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.678-695, ⟨10.1007/978-3-642-40480-1_47⟩
Conference papers hal-01501781v1
Image document

Social Network Users’ Religiosity and the Design of Post Mortem Aspects

Cristiano Maciel , Vinicius Carvalho Pereira
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.640-657, ⟨10.1007/978-3-642-40477-1_43⟩
Conference papers hal-01504918v1
Image document

Synthetic Social Network Based on Competency-Based Description of Human Resources

Štěpán Kuchař , Jan Martinovič , Pavla Dráždilová , Kateřina Slaninová
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.313-324, ⟨10.1007/978-3-642-40925-7_29⟩
Conference papers hal-01496077v1
Image document

Code-Based Public-Key Encryption Resistant to Key Leakage

Edoardo Persichetti
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-54
Conference papers hal-01506563v1
Image document

A One-Handed Multi-touch Method for 3D Rotations

Douglas Scheurich , Wolfgang Stuerzlinger
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.56-69, ⟨10.1007/978-3-642-40483-2_4⟩
Conference papers hal-01497473v1
Image document

Asymmetry-Aware Scheduling in Heterogeneous Multi-core Architectures

Tao Zhang , Xiaohui Pan , Wei Shu , Min-You Wu
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.257-268, ⟨10.1007/978-3-642-40820-5_22⟩
Conference papers hal-01513772v1
Image document

Validating SCTP Simultaneous Open Procedure

Somsak Vanit-Anunchai
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.233-249, ⟨10.1007/978-3-642-40213-5_15⟩
Conference papers hal-01514670v1
Image document

User-Defined Gestures for Augmented Reality

Thammathip Piumsomboon , Adrian Clark , Mark Billinghurst , Andy Cockburn
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.282-299, ⟨10.1007/978-3-642-40480-1_18⟩
Conference papers hal-01501749v1
Image document

Flow Specification Patterns of End-User Programmers: Lessons Learnt from a Health Mobile Application Authoring Environment Design

Filipe Fernandes , Luís Duarte , Luís Carriço
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.748-755, ⟨10.1007/978-3-642-40480-1_52⟩
Conference papers hal-01501786v1
Image document

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

Wolfgang Boehmer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers hal-01506570v1
Image document

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness

Arcangelo Castiglione , Ciriaco D’ambrosio , Alfredo De Santis , Francesco Palmieri
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.414-429
Conference papers hal-01506692v1
Image document

Index Data Structure for Fast Subset and Superset Queries

Iztok Savnik
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.134-148
Conference papers hal-01506780v1
Image document

Proxy Service for Multi-tenant Database Access

Haitham Yaish , Madhu Goyal , George Feuerlicht
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.100-117
Conference papers hal-01506783v1
Image document

Linetic: Technical, Usability and Aesthetic Implications of a Ferrofluid-Based Organic User Interface

Jeffrey Valino Koh , Kasun Karunanayaka , Ryohei Nakatsu
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.180-195, ⟨10.1007/978-3-642-40477-1_11⟩
Conference papers hal-01504883v1
Image document

On-Line Sketch Recognition Using Direction Feature

Wei Deng , Lingda Wu , Ronghuan Yu , Jiazhe Lai
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.259-266, ⟨10.1007/978-3-642-40477-1_16⟩
Conference papers hal-01504888v1