Filter your results
- 745
- 15
- 24
- 759
- 1
- 759
- 185
- 1
- 1
- 20
- 740
- 760
- 16
- 10
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers
hal-01480181v1
|
||
|
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.261-270, ⟨10.1007/978-3-642-36818-9_27⟩
Conference papers
hal-01480233v1
|
||
|
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.34-49, ⟨10.1007/978-3-642-38530-8_3⟩
Conference papers
hal-01485932v1
|
||
|
Reusable Components for Lightweight Mechanisation of Programming Languages12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.1-16, ⟨10.1007/978-3-642-39614-4_1⟩
Conference papers
hal-01492773v1
|
||
|
Compositional Development of BPMN12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.97-112, ⟨10.1007/978-3-642-39614-4_7⟩
Conference papers
hal-01492779v1
|
||
|
E-Learning of IT Security Threats: A Game Prototype for Children14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.162-172, ⟨10.1007/978-3-642-40779-6_14⟩
Conference papers
hal-01492818v1
|
||
|
Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.113-122, ⟨10.1007/978-3-642-40779-6_9⟩
Conference papers
hal-01492837v1
|
||
|
GSR and Blink Features for Cognitive Load Classification14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.159-166, ⟨10.1007/978-3-642-40483-2_11⟩
Conference papers
hal-01497433v1
|
||
|
WATTSBurning: Design and Evaluation of an Innovative Eco-Feedback System14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.453-470, ⟨10.1007/978-3-642-40483-2_32⟩
Conference papers
hal-01497454v1
|
||
|
Vibro-Tactile Enrichment Improves Blind User Interaction with Mobile Touchscreens14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.641-648, ⟨10.1007/978-3-642-40483-2_45⟩
Conference papers
hal-01497468v1
|
||
|
Communication Choices to Engage Participation of Rural Indonesian Craftspeople in Development Projects14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.780-787, ⟨10.1007/978-3-642-40483-2_55⟩
Conference papers
hal-01497479v1
|
||
|
The Design and Usability Testing of DACADE – A Tool Supporting Systematic Data Collection and Analysis for Design Students14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.487-494, ⟨10.1007/978-3-642-40483-2_35⟩
Conference papers
hal-01497457v1
|
||
|
Accessibility of Public Web Services: A Distant Dream?14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.566-578, ⟨10.1007/978-3-642-40483-2_40⟩
Conference papers
hal-01497463v1
|
||
|
A Cloud Resource Allocation Mechanism Based on Mean-Variance Optimization and Double Multi-Attribution Auction10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.106-117, ⟨10.1007/978-3-642-40820-5_10⟩
Conference papers
hal-01513771v1
|
||
|
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.83-98, ⟨10.1007/978-3-642-41148-9_6⟩
Conference papers
hal-01460622v1
|
||
|
Towards Learning Normality for Anomaly Detection in Industrial Control Networks7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.61-72, ⟨10.1007/978-3-642-38998-6_8⟩
Conference papers
hal-01489971v1
|
||
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|
||
|
Using a Goal-Driven Approach in the Investigation of a Questioned Contract9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.153-167, ⟨10.1007/978-3-642-41148-9_11⟩
Conference papers
hal-01460603v1
|
||
|
Evaluation of Video Quality Monitoring Based on Pre-computed Frame Distortions19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.100-111, ⟨10.1007/978-3-642-40552-5_10⟩
Conference papers
hal-01497007v1
|
||
|
The Effect of Physicality on Low Fidelity Interactive Prototyping for Design Practice14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.495-510, ⟨10.1007/978-3-642-40483-2_36⟩
Conference papers
hal-01497458v1
|
||
|
A Recovery Approach for SQLite History Recorders from YAFFS21st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.295-299, ⟨10.1007/978-3-642-36818-9_30⟩
Conference papers
hal-01480183v1
|
||
|
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers
hal-01485933v1
|
||
|
Analysis of Elephant Users in Broadband Network Traffic19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.37-45, ⟨10.1007/978-3-642-40552-5_4⟩
Conference papers
hal-01497035v1
|
||
|
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers
hal-01480228v1
|
||
|
A Performance Review of Number Entry Interfaces14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.365-382, ⟨10.1007/978-3-642-40483-2_26⟩
Conference papers
hal-01497448v1
|
||
|
EpiDOL: Epidemic Density Adaptive Data Dissemination Exploiting Opposite Lane in VANETs19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.221-232, ⟨10.1007/978-3-642-40552-5_20⟩
Conference papers
hal-01497019v1
|
||
|
Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.158-167, ⟨10.1007/978-3-642-40925-7_16⟩
Conference papers
hal-01496062v1
|
||
|
Weighted Approach to Projective Clustering12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.367-378, ⟨10.1007/978-3-642-40925-7_34⟩
Conference papers
hal-01496083v1
|
||
|
Code Based KPD Scheme with Full Connectivity: Deterministic Merging1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.141-151, ⟨10.1007/978-3-642-36818-9_15⟩
Conference papers
hal-01480168v1
|
||
|
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.173-184, ⟨10.1007/978-3-642-40779-6_15⟩
Conference papers
hal-01492819v1
|