Filter your results
- 745
- 24
- 15
- 744
- 1
- 744
- 185
- 1
- 1
- 20
- 725
- 745
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Using Video Prototypes for Evaluating Design Concepts with Users: A Comparison to Usability Testing14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.774-781, ⟨10.1007/978-3-642-40480-1_55⟩
Conference papers
hal-01501788v1
|
||
|
Graph-Theoretic Roots of Value Network Quantification19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.282-286, ⟨10.1007/978-3-642-40552-5_26⟩
Conference papers
hal-01497023v1
|
||
|
Communication Choices to Engage Participation of Rural Indonesian Craftspeople in Development Projects14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.780-787, ⟨10.1007/978-3-642-40483-2_55⟩
Conference papers
hal-01497479v1
|
||
|
A Coordination Theory Perspective to Improve the Use of Open Data in Policy-Making12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.38-49, ⟨10.1007/978-3-642-40358-3_4⟩
Conference papers
hal-01490921v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|
||
|
ITC-LM: A Smart Iteration-Termination Criterion Based Live Virtual Machine Migration10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.118-129, ⟨10.1007/978-3-642-40820-5_11⟩
Conference papers
hal-01513783v1
|
||
|
Emulation on the Internet Prefix Hijacking Attack Impaction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers
hal-01480207v1
|
||
|
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers
hal-01480208v1
|
||
|
O2SM: Enabling Efficient Offline Access to Online Social Media and Social Networks14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.445-465, ⟨10.1007/978-3-642-45065-5_23⟩
Conference papers
hal-01480787v1
|
||
|
A Scheduling Method for Multiple Virtual Machines Migration in Cloud10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.130-142, ⟨10.1007/978-3-642-40820-5_12⟩
Conference papers
hal-01513781v1
|
||
|
A Fine-Grained Pipelined Implementation of LU Decomposition on SIMD Processors10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.39-48, ⟨10.1007/978-3-642-40820-5_4⟩
Conference papers
hal-01513757v1
|
||
|
Asymmetry-Aware Scheduling in Heterogeneous Multi-core Architectures10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.257-268, ⟨10.1007/978-3-642-40820-5_22⟩
Conference papers
hal-01513772v1
|
||
|
Provably Secure and Subliminal-Free Variant of Schnorr Signature1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers
hal-01480197v1
|
||
|
Public Information System Interface Design Research14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.247-259, ⟨10.1007/978-3-642-40483-2_17⟩
Conference papers
hal-01497439v1
|
||
|
Software/Hardware Hybrid Network-on-Chip Simulation on FPGA10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.167-178, ⟨10.1007/978-3-642-40820-5_15⟩
Conference papers
hal-01513775v1
|
||
|
Personalized Web Search Using Emotional Features1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.69-83
Conference papers
hal-01506794v1
|
||
|
Modelling Critical Node Attacks in MANETs7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.127-138, ⟨10.1007/978-3-642-54140-7_11⟩
Conference papers
hal-01291506v1
|
||
|
Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.460-467, ⟨10.1007/978-3-642-40477-1_28⟩
Conference papers
hal-01504901v1
|
||
|
DOMINO – An Efficient Algorithm for Policy Definition and Processing in Distributed Environments Based on Atomic Data Structures19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.257-269, ⟨10.1007/978-3-642-40552-5_23⟩
Conference papers
hal-01497021v1
|
||
|
An Evaluation of Stacking and Tiling Features within the Traditional Desktop Metaphor14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.702-719, ⟨10.1007/978-3-642-40483-2_49⟩
Conference papers
hal-01497472v1
|
||
|
Evaluating Direct Manipulation Operations for Constraint-Based Layout14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.513-529, ⟨10.1007/978-3-642-40480-1_35⟩
Conference papers
hal-01501768v1
|
||
|
Did We Miss Something? Correspondence Analysis of Usability Data14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.272-279, ⟨10.1007/978-3-642-40498-6_20⟩
Conference papers
hal-01510508v1
|
||
|
Value Proposition in Mobile Government12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.175-187, ⟨10.1007/978-3-642-40358-3_15⟩
Conference papers
hal-01490905v1
|
||
|
On the Prediction of Clusters for Adverse Reactions and Allergies on Antibiotics for Children to Improve Biomedical Decision Making1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.431-445
Conference papers
hal-01506778v1
|
||
|
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.179-194, ⟨10.1007/978-3-642-39256-6_12⟩
Conference papers
hal-01490704v1
|
||
|
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.55-74
Conference papers
hal-01506566v1
|
||
|
An Effective Approach for Vocal Melody Extraction from Polyphonic Music on GPU10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.284-297, ⟨10.1007/978-3-642-40820-5_24⟩
Conference papers
hal-01513779v1
|
||
|
A Network-Aware Virtual Machine Allocation in Cloud Datacenter10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.71-82, ⟨10.1007/978-3-642-40820-5_7⟩
Conference papers
hal-01513773v1
|
||
|
Energy Efficient Task Scheduling in Mobile Cloud Computing10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.344-355, ⟨10.1007/978-3-642-40820-5_29⟩
Conference papers
hal-01513756v1
|
||
|
Automating Video File Carving and Content Identification9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.195-212, ⟨10.1007/978-3-642-41148-9_14⟩
Conference papers
hal-01460607v1
|