Filter your results
- 745
- 24
- 15
- 744
- 1
- 744
- 185
- 1
- 1
- 20
- 725
- 745
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
“Nobody Other Than Me Knows What I Want”: Customizing a Sports Watch14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.384-402, ⟨10.1007/978-3-642-40498-6_30⟩
Conference papers
hal-01510562v1
|
||
|
“Roger that!” — The Value of Adding Social Feedback in Audio-Mediated Communications14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.471-488, ⟨10.1007/978-3-642-40498-6_37⟩
Conference papers
hal-01510536v1
|
||
|
12MAP: Cloud Disaster Recovery Based on Image-Instance Mapping14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.204-225, ⟨10.1007/978-3-642-45065-5_11⟩
Conference papers
hal-01480777v1
|
||
|
3D Visualization and Multimodal Interaction with Temporal Information Using Timelines14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.214-231, ⟨10.1007/978-3-642-40477-1_13⟩
Conference papers
hal-01504885v1
|
||
|
A Block Cipher Mode of Operation with Two Keys1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.392-398, ⟨10.1007/978-3-642-36818-9_43⟩
Conference papers
hal-01480198v1
|
||
|
A Case Study in Formal Verification Using Multiple Explicit Heaps15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.20-34, ⟨10.1007/978-3-642-38592-6_3⟩
Conference papers
hal-01515237v1
|
||
|
A Cloud Resource Allocation Mechanism Based on Mean-Variance Optimization and Double Multi-Attribution Auction10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.106-117, ⟨10.1007/978-3-642-40820-5_10⟩
Conference papers
hal-01513771v1
|
||
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers
hal-01506556v1
|
||
|
A Comparison of List vs. Hierarchical UIs on Mobile Phones for Non-literate Users14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.497-504, ⟨10.1007/978-3-642-40480-1_33⟩
Conference papers
hal-01501766v1
|
||
|
A Comprehensive Study of the Usability of Multiple Graphical Passwords14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.424-441, ⟨10.1007/978-3-642-40477-1_26⟩
Conference papers
hal-01504899v1
|
||
|
A Coordination Theory Perspective to Improve the Use of Open Data in Policy-Making12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.38-49, ⟨10.1007/978-3-642-40358-3_4⟩
Conference papers
hal-01490921v1
|
||
|
A Data Structure for Efficient Biometric Identification1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.528-533, ⟨10.1007/978-3-642-36818-9_61⟩
Conference papers
hal-01480259v1
|
||
|
A Data-Driven Approach toward Building Dynamic Ontology1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.223-232, ⟨10.1007/978-3-642-36818-9_23⟩
Conference papers
hal-01480229v1
|
||
|
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.82-97, ⟨10.1007/978-3-642-38530-8_6⟩
Conference papers
hal-01485935v1
|
||
|
A Denial of Service Attack to GSM Networks via Attach Procedure1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.361-376
Conference papers
hal-01506555v1
|
||
|
A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.511-522, ⟨10.1007/978-3-642-40925-7_47⟩
Conference papers
hal-01496096v1
|
||
|
A Dog Tail for Utility Robots: Exploring Affective Properties of Tail Movement14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.403-419, ⟨10.1007/978-3-642-40480-1_27⟩
Conference papers
hal-01501759v1
|
||
|
A Field Trial on Mobile Crowdsourcing of News Content Factors Influencing Participation14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.54-73, ⟨10.1007/978-3-642-40477-1_4⟩
Conference papers
hal-01504925v1
|
||
|
A Fine-Grained Pipelined Implementation of LU Decomposition on SIMD Processors10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.39-48, ⟨10.1007/978-3-642-40820-5_4⟩
Conference papers
hal-01513757v1
|
||
|
A Forward Privacy Model for RFID Authentication Protocols7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers
hal-01485936v1
|
||
|
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.272-288
Conference papers
hal-01506779v1
|
||
|
A Framework for Interoperability Testing in Pan-European Public Service Provision12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.188-199, ⟨10.1007/978-3-642-40358-3_16⟩
Conference papers
hal-01490906v1
|
||
|
A Framework for Robust Traffic Engineering Using Evolutionary Computation7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.1-12, ⟨10.1007/978-3-642-38998-6_1⟩
Conference papers
hal-01489965v1
|
||
|
A Fully Reversible Data Transform Technique Enhancing Data Compression of SMILES Data1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.54-68
Conference papers
hal-01506777v1
|
||
|
A Generic Bayesian Belief Model for Similar Cyber Crimes9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.243-255, ⟨10.1007/978-3-642-41148-9_17⟩
Conference papers
hal-01460609v1
|
||
|
A Generic Multi-layer Network Optimization Model with Demand Uncertainty19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.13-24, ⟨10.1007/978-3-642-40552-5_2⟩
Conference papers
hal-01497029v1
|
||
|
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers
hal-01480228v1
|
||
|
A Guide to Implement Open Data in Public Agencies12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.75-86, ⟨10.1007/978-3-642-40358-3_7⟩
Conference papers
hal-01490938v1
|
||
|
A Harmonized Process Model for Digital Forensic Investigation Readiness9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.67-82, ⟨10.1007/978-3-642-41148-9_5⟩
Conference papers
hal-01460621v1
|
||
|
A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.157-162, ⟨10.1007/978-3-642-54140-7_15⟩
Conference papers
hal-01291513v1
|