Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

745 results
Deposit type : Fulltext
Image document

Using Video Prototypes for Evaluating Design Concepts with Users: A Comparison to Usability Testing

Matthijs Zwinderman , Rinze Leenheer , Azadeh Shirzad , Nikolay Chupriyanov , Glenn Veugen , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.774-781, ⟨10.1007/978-3-642-40480-1_55⟩
Conference papers hal-01501788v1
Image document

Graph-Theoretic Roots of Value Network Quantification

Patrick Zwickl , Peter Reichl
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.282-286, ⟨10.1007/978-3-642-40552-5_26⟩
Conference papers hal-01497023v1
Image document

Communication Choices to Engage Participation of Rural Indonesian Craftspeople in Development Projects

Ellya Zulaikha , Margot Brereton
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.780-787, ⟨10.1007/978-3-642-40483-2_55⟩
Conference papers hal-01497479v1
Image document

A Coordination Theory Perspective to Improve the Use of Open Data in Policy-Making

Anneke Zuiderwijk , Marijn Janssen
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.38-49, ⟨10.1007/978-3-642-40358-3_4⟩
Conference papers hal-01490921v1
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1
Image document

ITC-LM: A Smart Iteration-Termination Criterion Based Live Virtual Machine Migration

Liangwei Zhu , Jianhai Chen , Qinming He , Dawei Huang , Shuang Wu
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.118-129, ⟨10.1007/978-3-642-40820-5_11⟩
Conference papers hal-01513783v1
Image document

Emulation on the Internet Prefix Hijacking Attack Impaction

Jinjing Zhao , Yan Wen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers hal-01480207v1
Image document

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction

Lu Zhao , Ho-Seok Kang , Sung-Ryul Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers hal-01480208v1
Image document

O2SM: Enabling Efficient Offline Access to Online Social Media and Social Networks

Ye Zhao , Ngoc Do , Shu-Ting Wang , Cheng-Hsin Hsu , Nalini Venkatasubramanian
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.445-465, ⟨10.1007/978-3-642-45065-5_23⟩
Conference papers hal-01480787v1
Image document

A Scheduling Method for Multiple Virtual Machines Migration in Cloud

Zhenzhong Zhang , Limin Xiao , Xianchu Chen , Junjie Peng
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.130-142, ⟨10.1007/978-3-642-40820-5_12⟩
Conference papers hal-01513781v1
Image document

A Fine-Grained Pipelined Implementation of LU Decomposition on SIMD Processors

Kai Zhang , Shuming Chen , Wei Liu , Xi Ning
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.39-48, ⟨10.1007/978-3-642-40820-5_4⟩
Conference papers hal-01513757v1
Image document

Asymmetry-Aware Scheduling in Heterogeneous Multi-core Architectures

Tao Zhang , Xiaohui Pan , Wei Shu , Min-You Wu
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.257-268, ⟨10.1007/978-3-642-40820-5_22⟩
Conference papers hal-01513772v1
Image document

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Yinghui Zhang , Hui Li , Xiaoqing Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers hal-01480197v1
Image document

Public Information System Interface Design Research

Ning Zhang , Junliang Chen , Zhengjie Liu , Jun Zhang
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.247-259, ⟨10.1007/978-3-642-40483-2_17⟩
Conference papers hal-01497439v1
Image document

Software/Hardware Hybrid Network-on-Chip Simulation on FPGA

Youhui Zhang , Peng Qu , Ziqiang Qian , Hongwei Wang , Weimin Zheng
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.167-178, ⟨10.1007/978-3-642-40820-5_15⟩
Conference papers hal-01513775v1
Image document

Personalized Web Search Using Emotional Features

Jianwei Zhang , Katsutoshi Minami , Yukiko Kawai , Yuhki Shiraishi , Tadahiko Kumamoto
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.69-83
Conference papers hal-01506794v1
Image document

Modelling Critical Node Attacks in MANETs

Dongsheng Zhang , James G. Sterbenz
7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.127-138, ⟨10.1007/978-3-642-54140-7_11⟩
Conference papers hal-01291506v1
Image document

Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition

Emanuel Von Zezschwitz , Alexander De Luca , Heinrich Hussmann
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.460-467, ⟨10.1007/978-3-642-40477-1_28⟩
Conference papers hal-01504901v1
Image document

DOMINO – An Efficient Algorithm for Policy Definition and Processing in Distributed Environments Based on Atomic Data Structures

Joachim Zeiss , Peter Reichl , Jean-Marie Bonnin , Jürgen Dorn
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.257-269, ⟨10.1007/978-3-642-40552-5_23⟩
Conference papers hal-01497021v1
Image document

An Evaluation of Stacking and Tiling Features within the Traditional Desktop Metaphor

Clemens Zeidler , Christof Lutteroth , Gerald Weber
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.702-719, ⟨10.1007/978-3-642-40483-2_49⟩
Conference papers hal-01497472v1
Image document

Evaluating Direct Manipulation Operations for Constraint-Based Layout

Clemens Zeidler , Christof Lutteroth , Wolfgang Stuerzlinger , Gerald Weber
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.513-529, ⟨10.1007/978-3-642-40480-1_35⟩
Conference papers hal-01501768v1
Image document

Did We Miss Something? Correspondence Analysis of Usability Data

Stanislaw Zabramski , Wolfgang Stuerzlinger
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.272-279, ⟨10.1007/978-3-642-40498-6_20⟩
Conference papers hal-01510508v1
Image document

Value Proposition in Mobile Government

Chien-Chih Yu
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.175-187, ⟨10.1007/978-3-642-40358-3_15⟩
Conference papers hal-01490905v1
Image document

On the Prediction of Clusters for Adverse Reactions and Allergies on Antibiotics for Children to Improve Biomedical Decision Making

Pinar Yildirim , Ljiljana Majnarić , Ozgur Ilyas Ekmekci , Andreas Holzinger
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.431-445
Conference papers hal-01506778v1
Image document

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases

Attila A. Yavuz
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.179-194, ⟨10.1007/978-3-642-39256-6_12⟩
Conference papers hal-01490704v1
Image document

Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics

Masaya Yasuda , Takeshi Shimoyama , Jun Kogure , Kazuhiro Yokoyama , Takeshi Koshiba
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.55-74
Conference papers hal-01506566v1
Image document

An Effective Approach for Vocal Melody Extraction from Polyphonic Music on GPU

Guangchao Yao , Yao Zheng , Limin Xiao , Li Ruan , Zhen Lin , et al.
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.284-297, ⟨10.1007/978-3-642-40820-5_24⟩
Conference papers hal-01513779v1
Image document

A Network-Aware Virtual Machine Allocation in Cloud Datacenter

Yan Yao , Jian Cao , Minglu Li
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.71-82, ⟨10.1007/978-3-642-40820-5_7⟩
Conference papers hal-01513773v1
Image document

Energy Efficient Task Scheduling in Mobile Cloud Computing

Dezhong Yao , Chen Yu , Hai Jin , Jiehan Zhou
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.344-355, ⟨10.1007/978-3-642-40820-5_29⟩
Conference papers hal-01513756v1
Image document

Automating Video File Carving and Content Identification

York Yannikos , Nadeem Ashraf , Martin Steinebach , Christian Winter
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.195-212, ⟨10.1007/978-3-642-41148-9_14⟩
Conference papers hal-01460607v1