Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

745 results
Deposit type : Fulltext
Image document

Simplifying Remote Collaboration through Spatial Mirroring

Fabian Hennecke , Simon Voelker , Maximilian Schenk , Hauke Schaper , Jan Borchers , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.624-631, ⟨10.1007/978-3-642-40477-1_41⟩
Conference papers hal-01504916v1
Image document

Mobile Movie Recommendations with Linked Data

Vito Claudio Ostuni , Giosia Gentile , Tommaso Di Noia , Roberto Mirizzi , Davide Romito , et al.
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.400-415
Conference papers hal-01506768v1
Image document

Inference of Global Progress Properties for Dynamically Interleaved Multiparty Sessions

Mario Coppo , Mariangiola Dezani-Ciancaglini , Luca Padovani , Nobuko Yoshida
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.45-59, ⟨10.1007/978-3-642-38493-6_4⟩
Conference papers hal-01486034v1
Image document

Investigating Pointing Tasks across Angularly Coupled Display Areas

Fabian Hennecke , Alexander De Luca , Ngo Huong Nguyen , Sebastian Boring , Andreas Butz
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.720-727, ⟨10.1007/978-3-642-40483-2_50⟩
Conference papers hal-01497474v1
Image document

Model Assisted Creativity Sessions for the Design of Mixed Interactive Systems: a Protocol Analysis

Christophe Bortolaso , Emmanuel Dubois
14th International Conference on Human-Computer Interaction (INTERACT 2013), Sep 2013, Cap Town, South Africa. pp.126-143, ⟨10.1007/978-3-642-40477-1_8⟩
Conference papers hal-01264520v1
Image document

Storytelling in Visual Analytics Tools for Business Intelligence

Micheline Elias , Marie-Aude Aufaure , Anastasia Bezerianos
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.280-297, ⟨10.1007/978-3-642-40477-1_18⟩
Conference papers hal-00817732v2
Image document

User Authentication for Mobile Devices

Marcin Rogowski , Khalid Saeed , Mariusz Rybnik , Marek Tabedzki , Marcin Adamski
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers hal-01496111v1
Image document

A Comprehensive Study of the Usability of Multiple Graphical Passwords

Soumyadeb Chowdhury , Ron Poet , Lewis Mackenzie
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.424-441, ⟨10.1007/978-3-642-40477-1_26⟩
Conference papers hal-01504899v1
Image document

Supporting Improved Maternity Care by Midwives: Design Opportunities and Lessons Learned

Abdullah Al Mahmud , David V. Keyson
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.635-642, ⟨10.1007/978-3-642-40498-6_55⟩
Conference papers hal-01510507v1
Image document

Participatory Data Gathering for Public Sector Reuse: Lessons Learned from Traditional Initiatives

Nathalie Stembert , Peter Conradie , Ingrid Mulder , Sunil Choenni
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.87-98, ⟨10.1007/978-3-642-40358-3_8⟩
Conference papers hal-01490924v1
Image document

Precise pointing techniques for handheld Augmented Reality

Thomas Vincent , Laurence Nigay , Takeshi Kurata
14th International Conference on Human-Computer Interaction (INTERACT), 2013, Cape Town, South Africa. pp.122-139, ⟨10.1007/978-3-642-40483-2_9⟩
Conference papers hal-00953357v1
Image document

Understanding Hand Degrees of Freedom and Natural Gestures for 3D Interaction on Tabletop

Rémi Brouet , Renaud Blanch , Marie-Paule Cani
14th International Conference on Human-Computer Interaction (INTERACT), IFIP, Sep 2013, Cape Town, South Africa. pp.297-314, ⟨10.1007/978-3-642-40483-2_20⟩
Conference papers hal-00814014v2
Image document

Fair Private Set Intersection with a Semi-trusted Arbiter

Changyu Dong , Liqun Chen , Jan Camenisch , Giovanni Russello
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers hal-01490721v1
Image document

Adding Vibrotactile Feedback to Large Interactive Surfaces

Julian Seifert , Markus Packeiser , Enrico Rukzio
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.507-514, ⟨10.1007/978-3-642-40498-6_39⟩
Conference papers hal-01510549v1
Image document

TicQR: Flexible, Lightweight Linking of Paper and Digital Content Using Mobile Phones

Jennifer Pearson , Simon Robinson , George Buchanan , Matt Jones
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.220-228, ⟨10.1007/978-3-642-40498-6_16⟩
Conference papers hal-01510518v1
Image document

Audvert: Using Spatial Audio to Gain a Sense of Place

Liam Betsworth , Nitendra Rajput , Saurabh Srivastava , Matt Jones
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.455-462, ⟨10.1007/978-3-642-40498-6_35⟩
Conference papers hal-01510524v1
Image document

Webpage Designs for Diverse Cultures: An Exploratory Study of User Preferences in China

Yin Su , David Liu , Xiaomeng Yuan , Justin Ting , Jingguo Jiang , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.339-346, ⟨10.1007/978-3-642-40483-2_24⟩
Conference papers hal-01497446v1
Image document

Evaluating Direct Manipulation Operations for Constraint-Based Layout

Clemens Zeidler , Christof Lutteroth , Wolfgang Stuerzlinger , Gerald Weber
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.513-529, ⟨10.1007/978-3-642-40480-1_35⟩
Conference papers hal-01501768v1
Image document

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors

Yuchao She , Hui Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers hal-01480185v1
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1
Image document

On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing

Ruxandra F. Olimid
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers hal-01480199v1
Image document

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions

Asato Kubai , Junji Shikata , Yohei Watanabe
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.16-28
Conference papers hal-01506569v1
Image document

Monitoring Networks through Multiparty Session Types

Laura Bocchi , Tzu-Chun Chen , Romain Demangeon , Nobuko Yoshida , Kohei Honda
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.50-65, ⟨10.1007/978-3-642-38592-6_5⟩
Conference papers hal-01213683v1
Image document

Access Control and Query Verification for Untrusted Databases

Rohit Jain , Sunil Prabhakar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers hal-01490706v1
Image document

Solving the Discrete Logarithm Problem for Packing Candidate Preferences

James Heather , Chris Culnane , Steve Schneider , Sriramkrishnan Srinivasan , Zhe Xia
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.209-221
Conference papers hal-01506684v1
Image document

Funneling and Saltation Effects for Tactile Interaction with “Detached” Out of the Body Virtual Objects

Jaedong Lee , Sangyong Lee , Gerard J. Kim
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.104-121, ⟨10.1007/978-3-642-40483-2_8⟩
Conference papers hal-01497485v1
Image document

Sprinkler — Reliable Broadcast for Geographically Dispersed Datacenters

Haoyan Geng , Robbert Van Renesse
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.247-266, ⟨10.1007/978-3-642-45065-5_13⟩
Conference papers hal-01480779v1
Image document

A Generic Bayesian Belief Model for Similar Cyber Crimes

Hayson Tse , Kam-Pui Chow , Michael Kwan
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.243-255, ⟨10.1007/978-3-642-41148-9_17⟩
Conference papers hal-01460609v1
Image document

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion

Huajian Liu , Yiyao Li , Martin Steinebach
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.95-104, ⟨10.1007/978-3-642-40779-6_7⟩
Conference papers hal-01492836v1
Image document

Web Accessibility in Africa: A Study of Three African Domains

Daniel Costa , Nádia Fernandes , Sofia Neves , Carlos Duarte , Raquel Hijón-Neira , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.331-338, ⟨10.1007/978-3-642-40483-2_23⟩
Conference papers hal-01497445v1