Filter your results
- 745
- 24
- 15
- 744
- 1
- 744
- 185
- 1
- 1
- 20
- 725
- 745
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Designing with Dementia: Guidelines for Participatory Design together with Persons with Dementia14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.649-666, ⟨10.1007/978-3-642-40483-2_46⟩
Conference papers
hal-01497469v1
|
||
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers
hal-01506705v1
|
||
|
Sustainability at Home: An Exploratory Study on Monitoring Needs and Energy Management Actions of Solar Power Producers14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.125-132, ⟨10.1007/978-3-642-40498-6_9⟩
Conference papers
hal-01510501v1
|
||
|
The Bigger Picture: The Use of Mobile Photos in Shopping14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.764-771, ⟨10.1007/978-3-642-40498-6_71⟩
Conference papers
hal-01510529v1
|
||
|
On Users’ Preference on Localized vs. Latin-Based CAPTCHA Challenges14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.358-365, ⟨10.1007/978-3-642-40498-6_28⟩
Conference papers
hal-01510537v1
|
||
|
Model Checking Distributed Systems against Temporal-Epistemic Specifications15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.130-145, ⟨10.1007/978-3-642-38592-6_10⟩
Conference papers
hal-01515241v1
|
||
|
Lintent: Towards Security Type-Checking of Android Applications15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.289-304, ⟨10.1007/978-3-642-38592-6_20⟩
Conference papers
hal-01515252v1
|
||
|
Statistical Model Checking of a Clock Synchronization Protocol for Sensor Networks5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.168-182, ⟨10.1007/978-3-642-40213-5_11⟩
Conference papers
hal-01514659v1
|
||
|
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers
hal-01480196v1
|
||
|
Provably Secure and Subliminal-Free Variant of Schnorr Signature1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers
hal-01480197v1
|
||
|
A Virtual Network Embedding Algorithm Based on Graph Theory10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.1-12, ⟨10.1007/978-3-642-40820-5_1⟩
Conference papers
hal-01513758v1
|
||
|
Computer-Supported Work in Partially Distributed and Co-located Teams: The Influence of Mood Feedback14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.445-460, ⟨10.1007/978-3-642-40480-1_30⟩
Conference papers
hal-01501763v1
|
||
|
MetaExtractor: A System for Metadata Extraction from Structured Data Sources1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.84-99
Conference papers
hal-01506797v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Identification of Persons by Virtue of Hand Geometry12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers
hal-01496097v1
|
||
|
Bounded Model Checking of Graph Transformation Systems via SMT Solving15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.178-192, ⟨10.1007/978-3-642-38592-6_13⟩
Conference papers
hal-01515236v1
|
||
|
Truly Useful 3D Drawing System for Professional Designer by “Life-Sized and Operable” Feature and New Interaction14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.37-55, ⟨10.1007/978-3-642-40483-2_3⟩
Conference papers
hal-01497462v1
|
||
|
GPRS Security for Smart Meters1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.195-207
Conference papers
hal-01506796v1
|
||
|
Online Political Debate: Motivating Factors and Impact on Political Engagement5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.122-133, ⟨10.1007/978-3-642-40346-0_11⟩
Conference papers
hal-01491249v1
|
||
|
Dynamic Resource Operation and Power Model for IP-over-WSON Networks19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.1-12, ⟨10.1007/978-3-642-40552-5_1⟩
Conference papers
hal-01497018v1
|
||
|
Atmosphere: A Universal Cross-Cloud Communication Infrastructure14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.163-182, ⟨10.1007/978-3-642-45065-5_9⟩
Conference papers
hal-01480796v1
|
||
|
Application of Combined Classifiers to Data Stream Classification12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.13-23, ⟨10.1007/978-3-642-40925-7_2⟩
Conference papers
hal-01496078v1
|
||
|
Artificial Neural Networks as Tools for Controlling Production Systems and Ensuring Their Stability12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.487-498, ⟨10.1007/978-3-642-40925-7_45⟩
Conference papers
hal-01496094v1
|
||
|
Activity Theory as a Tool for Identifying Design Patterns in Cross-Modal Collaborative Interaction14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.232-240, ⟨10.1007/978-3-642-40477-1_14⟩
Conference papers
hal-01504886v1
|
||
|
One-to-One Disjoint Path Covers in DCell10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.61-70, ⟨10.1007/978-3-642-40820-5_6⟩
Conference papers
hal-01513760v1
|
||
|
On the Effects of Omitting Information Exchange between Autonomous Resource Management Agents7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.112-123, ⟨10.1007/978-3-642-38998-6_15⟩
Conference papers
hal-01489961v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
||
|
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.11-20, ⟨10.1007/978-3-642-36818-9_2⟩
Conference papers
hal-01480235v1
|
||
|
Scalable-Grain Pipeline Parallelization Method for Multi-core Systems10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.269-283, ⟨10.1007/978-3-642-40820-5_23⟩
Conference papers
hal-01513778v1
|
||
|
Shifting Primes on OpenRISC Processors with Hardware Multiplier1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.540-549, ⟨10.1007/978-3-642-36818-9_63⟩
Conference papers
hal-01480261v1
|