Filter your results
- 745
- 24
- 15
- 744
- 1
- 744
- 185
- 1
- 1
- 20
- 725
- 745
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.192-201, ⟨10.1007/978-3-642-36818-9_20⟩
Conference papers
hal-01480175v1
|
||
|
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System Technique1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.214-222, ⟨10.1007/978-3-642-36818-9_22⟩
Conference papers
hal-01480177v1
|
||
|
Image Watermarking Using Psychovisual Threshold over the Edge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.519-527, ⟨10.1007/978-3-642-36818-9_60⟩
Conference papers
hal-01480213v1
|
||
|
Semantic-Aware Obfuscation for Location Privacy at Database Level1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.111-120, ⟨10.1007/978-3-642-36818-9_12⟩
Conference papers
hal-01480225v1
|
||
|
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.324-330, ⟨10.1007/978-3-642-36818-9_35⟩
Conference papers
hal-01480238v1
|
||
|
Managing User Experience – Managing Change14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.660-677, ⟨10.1007/978-3-642-40480-1_46⟩
Conference papers
hal-01501780v1
|
||
|
Understanding the Impact of Network Infrastructure Changes Using Large-Scale Measurement Platforms7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.41-44, ⟨10.1007/978-3-642-38998-6_5⟩
Conference papers
hal-01489968v1
|
||
|
Using Video Prototypes for Evaluating Design Concepts with Users: A Comparison to Usability Testing14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.774-781, ⟨10.1007/978-3-642-40480-1_55⟩
Conference papers
hal-01501788v1
|
||
|
Parameterized Verification of Track Topology Aggregation Protocols15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.35-49, ⟨10.1007/978-3-642-38592-6_4⟩
Conference papers
hal-01515244v1
|
||
|
Improving Evaluation Honesty and User Experience in E-learning by Increasing Evaluation Cost and Social Presence14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.597-615, ⟨10.1007/978-3-642-40480-1_42⟩
Conference papers
hal-01501776v1
|
||
|
Emerging Technologies and the Contextual and Contingent Experiences of Ageing Well14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.582-589, ⟨10.1007/978-3-642-40477-1_37⟩
Conference papers
hal-01504911v1
|
||
|
Usability Specialists as Boundary Spanners – An Appraisal of Usability Specialists’ Work in Multiparty Distributed Open Source Software Development Effort14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.571-588, ⟨10.1007/978-3-642-40480-1_40⟩
Conference papers
hal-01501774v1
|
||
|
A Tabletop System Using Infrared Image Recognition for Multi-user Identification14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.55-62, ⟨10.1007/978-3-642-40480-1_4⟩
Conference papers
hal-01501783v1
|
||
|
Making Sense of Open Data Statistics with Information from Wikipedia1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.329-344
Conference papers
hal-01506767v1
|
||
|
Cognitive Approaches for Digital Forensic Readiness Planning9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.53-66, ⟨10.1007/978-3-642-41148-9_4⟩
Conference papers
hal-01460620v1
|
||
|
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers
hal-01480209v1
|
||
|
Walking in the Wild – Using an Always-On Smartphone Application to Increase Physical Activity14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.19-36, ⟨10.1007/978-3-642-40498-6_2⟩
Conference papers
hal-01510527v1
|
||
|
Analyzing the Centralised Use of Multiple Social Media by Government from Innovations Diffusion Theory Perspective5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.95-108, ⟨10.1007/978-3-642-40346-0_9⟩
Conference papers
hal-01491260v1
|
||
|
Typing Progress in Communication-Centred Systems15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.236-250, ⟨10.1007/978-3-642-38493-6_17⟩
Conference papers
hal-01486030v1
|
||
|
Comparison of User Performance in Mixed 2D-3D Multi-Display Environments14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.260-277, ⟨10.1007/978-3-642-40483-2_18⟩
Conference papers
hal-01497440v1
|
||
|
Lessons Learned from Crowd Accessibility Services14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.587-604, ⟨10.1007/978-3-642-40483-2_42⟩
Conference papers
hal-01497465v1
|
||
|
On the Efficiency of Information-Assisted Search for Parking Space: A Game-Theoretic Approach7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.54-65, ⟨10.1007/978-3-642-54140-7_5⟩
Conference papers
hal-01291494v1
|
||
|
On the Local Approximations of Node Centrality in Internet Router-Level Topologies7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.115-126, ⟨10.1007/978-3-642-54140-7_10⟩
Conference papers
hal-01291505v1
|
||
|
Unifying Sensor Fault Detection with Energy Conservation7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.176-181, ⟨10.1007/978-3-642-54140-7_18⟩
Conference papers
hal-01291517v1
|
||
|
Security Issues of IPv6 Network Autoconfiguration12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.218-228, ⟨10.1007/978-3-642-40925-7_21⟩
Conference papers
hal-01496069v1
|
||
|
Using Backward Induction Techniques in (Timed) Security Protocols Verification12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.265-276, ⟨10.1007/978-3-642-40925-7_25⟩
Conference papers
hal-01496073v1
|
||
|
User Relevance for Item-Based Collaborative Filtering12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.337-347, ⟨10.1007/978-3-642-40925-7_31⟩
Conference papers
hal-01496080v1
|
||
|
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.502-506, ⟨10.1007/978-3-642-36818-9_57⟩
Conference papers
hal-01480257v1
|
||
|
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.200-203, ⟨10.1007/978-3-642-40779-6_18⟩
Conference papers
hal-01492822v1
|
||
|
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg, Germany. pp.105-112, ⟨10.1007/978-3-642-40779-6_8⟩
Conference papers
lirmm-01379592v1
|