Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

745 results
Deposit type : Fulltext
Image document

“Nobody Other Than Me Knows What I Want”: Customizing a Sports Watch

Piia Nurkka
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.384-402, ⟨10.1007/978-3-642-40498-6_30⟩
Conference papers hal-01510562v1
Image document

“Roger that!” — The Value of Adding Social Feedback in Audio-Mediated Communications

Rahul Rajan , Joey Hsiao , Deven Lahoti , Ted Selker
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.471-488, ⟨10.1007/978-3-642-40498-6_37⟩
Conference papers hal-01510536v1
Image document

12MAP: Cloud Disaster Recovery Based on Image-Instance Mapping

Shripad Nadgowda , Praveen Jayachandran , Akshat Verma
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.204-225, ⟨10.1007/978-3-642-45065-5_11⟩
Conference papers hal-01480777v1
Image document

3D Visualization and Multimodal Interaction with Temporal Information Using Timelines

Giannis Drossis , Dimitris Grammenos , Ilia Adami , Constantine Stephanidis
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.214-231, ⟨10.1007/978-3-642-40477-1_13⟩
Conference papers hal-01504885v1
Image document

A Block Cipher Mode of Operation with Two Keys

Yi-Li Huang , Fang-Yie Leu , Jung-Chun Liu , Jing-Hao Yang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.392-398, ⟨10.1007/978-3-642-36818-9_43⟩
Conference papers hal-01480198v1
Image document

A Case Study in Formal Verification Using Multiple Explicit Heaps

Wojciech Mostowski
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.20-34, ⟨10.1007/978-3-642-38592-6_3⟩
Conference papers hal-01515237v1
Image document

A Cloud Resource Allocation Mechanism Based on Mean-Variance Optimization and Double Multi-Attribution Auction

Chengxi Gao , Xingwei Wang , Min Huang
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.106-117, ⟨10.1007/978-3-642-40820-5_10⟩
Conference papers hal-01513771v1
Image document

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

Abdel Alim Kamal , Roger Zahno , Amr M. Youssef
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers hal-01506556v1
Image document

A Comparison of List vs. Hierarchical UIs on Mobile Phones for Non-literate Users

Indrani Medhi , Kentaro Toyama , Anirudha Joshi , Uday Athavankar , Edward Cutrell
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.497-504, ⟨10.1007/978-3-642-40480-1_33⟩
Conference papers hal-01501766v1
Image document

A Comprehensive Study of the Usability of Multiple Graphical Passwords

Soumyadeb Chowdhury , Ron Poet , Lewis Mackenzie
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.424-441, ⟨10.1007/978-3-642-40477-1_26⟩
Conference papers hal-01504899v1
Image document

A Coordination Theory Perspective to Improve the Use of Open Data in Policy-Making

Anneke Zuiderwijk , Marijn Janssen
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.38-49, ⟨10.1007/978-3-642-40358-3_4⟩
Conference papers hal-01490921v1
Image document

A Data Structure for Efficient Biometric Identification

Kensuke Baba , Serina Egawa
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.528-533, ⟨10.1007/978-3-642-36818-9_61⟩
Conference papers hal-01480259v1
Image document

A Data-Driven Approach toward Building Dynamic Ontology

Dhomas Hatta Fudholi , Wenny Rahayu , Eric Pardede , . Hendrik
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.223-232, ⟨10.1007/978-3-642-36818-9_23⟩
Conference papers hal-01480229v1
Image document

A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards

Michael Lackner , Reinhard Berlach , Wolfgang Raschke , Reinhold Weiss , Christian Steger
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.82-97, ⟨10.1007/978-3-642-38530-8_6⟩
Conference papers hal-01485935v1
Image document

A Denial of Service Attack to GSM Networks via Attach Procedure

Nicola Gobbo , Alessio Merlo , Mauro Migliardi
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.361-376
Conference papers hal-01506555v1
Image document

A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability

Sanjoy Kumar Paul , Ruhul Sarker , Daryl Essam
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.511-522, ⟨10.1007/978-3-642-40925-7_47⟩
Conference papers hal-01496096v1
Image document

A Dog Tail for Utility Robots: Exploring Affective Properties of Tail Movement

Ashish Singh , James E. Young
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.403-419, ⟨10.1007/978-3-642-40480-1_27⟩
Conference papers hal-01501759v1
Image document

A Field Trial on Mobile Crowdsourcing of News Content Factors Influencing Participation

Heli Väätäjä , Esa Sirkkunen , Mari Ahvenainen
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.54-73, ⟨10.1007/978-3-642-40477-1_4⟩
Conference papers hal-01504925v1
Image document

A Fine-Grained Pipelined Implementation of LU Decomposition on SIMD Processors

Kai Zhang , Shuming Chen , Wei Liu , Xi Ning
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.39-48, ⟨10.1007/978-3-642-40820-5_4⟩
Conference papers hal-01513757v1
Image document

A Forward Privacy Model for RFID Authentication Protocols

Daisuke Moriyama , Miyako Ohkubo , Shin’ichiro Matsuo
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.98-111, ⟨10.1007/978-3-642-38530-8_7⟩
Conference papers hal-01485936v1
Image document

A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering

Nazila Gol Mohammadi , Azadeh Alebrahim , Thorsten Weyer , Maritta Heisel , Klaus Pohl
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.272-288
Conference papers hal-01506779v1
Image document

A Framework for Interoperability Testing in Pan-European Public Service Provision

Ansgar Mondorf , Maria A. Wimmer , Daniel Reiser
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.188-199, ⟨10.1007/978-3-642-40358-3_16⟩
Conference papers hal-01490906v1
Image document

A Framework for Robust Traffic Engineering Using Evolutionary Computation

Vitor Pereira , Miguel Rocha , Paulo Cortez , Miguel Rio , Pedro Sousa
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.1-12, ⟨10.1007/978-3-642-38998-6_1⟩
Conference papers hal-01489965v1
Image document

A Fully Reversible Data Transform Technique Enhancing Data Compression of SMILES Data

Shagufta Scanlon , Mick Ridley
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.54-68
Conference papers hal-01506777v1
Image document

A Generic Bayesian Belief Model for Similar Cyber Crimes

Hayson Tse , Kam-Pui Chow , Michael Kwan
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.243-255, ⟨10.1007/978-3-642-41148-9_17⟩
Conference papers hal-01460609v1
Image document

A Generic Multi-layer Network Optimization Model with Demand Uncertainty

Uwe Steglich , Thomas Bauschert , Christina Büsing , Manuel Kutschka
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.13-24, ⟨10.1007/978-3-642-40552-5_2⟩
Conference papers hal-01497029v1
Image document

A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud

Nguyen Quang-Hung , Pham Dac Nien , Nguyen Hoai Nam , Nguyen Huynh Tuong , Nam Thoai
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers hal-01480228v1
Image document

A Guide to Implement Open Data in Public Agencies

Mauricio Solar , Luis Meijueiro , Fernando Daniels
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.75-86, ⟨10.1007/978-3-642-40358-3_7⟩
Conference papers hal-01490938v1
Image document

A Harmonized Process Model for Digital Forensic Investigation Readiness

Aleksandar Valjarevic , Hein Venter
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.67-82, ⟨10.1007/978-3-642-41148-9_5⟩
Conference papers hal-01460621v1
Image document

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks

Mohammed Bahria , Alexis Olivereau , Aymen Boudguiga
7th International Workshop on Self-Organizing Systems (IWSOS), May 2013, Palma de Mallorca, Spain. pp.157-162, ⟨10.1007/978-3-642-54140-7_15⟩
Conference papers hal-01291513v1