Filter your results
- 745
- 24
- 15
- 744
- 1
- 744
- 185
- 1
- 1
- 20
- 725
- 745
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Formal Analysis of a Distributed Algorithm for Tracking Progress15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.5-19, ⟨10.1007/978-3-642-38592-6_2⟩
Conference papers
hal-01515239v1
|
||
|
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers
hal-01480202v1
|
||
|
Verification of Directed Acyclic Ad Hoc Networks15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.193-208, ⟨10.1007/978-3-642-38592-6_14⟩
Conference papers
hal-01515235v1
|
||
|
Push-Down Automata with Gap-Order Constraints5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.199-216, ⟨10.1007/978-3-642-40213-5_13⟩
Conference papers
hal-01514667v1
|
||
|
Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.148-159, ⟨10.1007/978-3-642-38998-6_18⟩
Conference papers
hal-01489964v1
|
||
|
Image Watermarking Using Psychovisual Threshold over the Edge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.519-527, ⟨10.1007/978-3-642-36818-9_60⟩
Conference papers
hal-01480213v1
|
||
|
Vimprint: Exploring Alternative Learning through Low-End Mobiles14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.589-596, ⟨10.1007/978-3-642-40480-1_41⟩
Conference papers
hal-01501775v1
|
||
|
Visual Conversational Interfaces to Empower Low-Literacy Users14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.729-736, ⟨10.1007/978-3-642-40498-6_67⟩
Conference papers
hal-01510535v1
|
||
|
Transactional Failure Recovery for a Distributed Key-Value Store14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.267-286, ⟨10.1007/978-3-642-45065-5_14⟩
Conference papers
hal-01480780v1
|
||
|
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.305-328, ⟨10.1007/978-3-642-41148-9_21⟩
Conference papers
hal-01460630v1
|
||
|
Probabilistic QoS Analysis of Web Services10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.393-404, ⟨10.1007/978-3-642-40820-5_33⟩
Conference papers
hal-01513761v1
|
||
|
Towards a Pervasive Access Control within Video Surveillance Systems1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.289-303, ⟨10.1007/978-3-642-40511-2_20⟩
Conference papers
hal-01217394v1
|
||
|
Video Navigation with a Personal Viewing History14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.352-369, ⟨10.1007/978-3-642-40477-1_22⟩
Conference papers
hal-01504895v1
|
||
|
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.441-446, ⟨10.1007/978-3-642-36818-9_48⟩
Conference papers
hal-01480201v1
|
||
|
A transversal alignment between measurements and enterprise architecture for early verification of telecom service design19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.245-256, ⟨10.1007/978-3-642-40552-5_22⟩
Conference papers
hal-00859979v1
|
||
|
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.321-336
Conference papers
hal-01506554v1
|
||
|
Transducer-Based Algorithmic Verification of Retransmission Protocols over Noisy Channels15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.209-224, ⟨10.1007/978-3-642-38592-6_15⟩
Conference papers
hal-01515246v1
|
||
|
AnonyLikes: Anonymous Quantitative Feedback on Social Networks14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.466-484, ⟨10.1007/978-3-642-45065-5_24⟩
Conference papers
hal-01480788v1
|
||
|
Adoption and Appropriation: A Design Process from HCI Research at a Brazilian Neurological Hospital14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.356-363, ⟨10.1007/978-3-642-40480-1_22⟩
Conference papers
hal-01501754v1
|
||
|
Trust-Based Scenarios – Predicting Future Agent Behavior in Open Self-organizing Systems7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.90-102, ⟨10.1007/978-3-642-54140-7_8⟩
Conference papers
hal-01291502v1
|
||
|
Evaluation of PhonAge: An Adapted Smartphone Interface for Elderly People14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.547-554, ⟨10.1007/978-3-642-40498-6_44⟩
Conference papers
hal-01510540v1
|
||
|
Data Recovery from Proprietary Formatted Cctv Hard Disks9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.213-223, ⟨10.1007/978-3-642-41148-9_15⟩
Conference papers
hal-01460629v1
|
||
|
Trustworthy Opportunistic Access to the Internet of Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.469-478, ⟨10.1007/978-3-642-36818-9_52⟩
Conference papers
hal-01480255v1
|
||
|
Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.233-242, ⟨10.1007/978-3-642-36818-9_24⟩
Conference papers
hal-01480178v1
|
||
|
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg, Germany. pp.105-112, ⟨10.1007/978-3-642-40779-6_8⟩
Conference papers
lirmm-01379592v1
|
||
|
Crisis, Innovation and e-Participation: Towards a Framework for Comparative Research5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.26-36, ⟨10.1007/978-3-642-40346-0_3⟩
Conference papers
hal-01491229v1
|
||
|
An Abstract Framework for Deadlock Prevention in BIP15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.161-177, ⟨10.1007/978-3-642-38592-6_12⟩
Conference papers
hal-00878752v1
|
||
|
File Fragment Analysis Using Normalized Compression Distance9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.171-182, ⟨10.1007/978-3-642-41148-9_12⟩
Conference papers
hal-01460604v1
|
||
|
Stakeholder Salience Changes in an e-Government Implementation Project12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.237-249, ⟨10.1007/978-3-642-40358-3_20⟩
Conference papers
hal-01490970v1
|
||
|
The Development and Evaluation of an Interactive System for Age Related Musculoskeletal Rehabilitation in the Home14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.1-18, ⟨10.1007/978-3-642-40498-6_1⟩
Conference papers
hal-01510558v1
|