Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

760 results
Deposit type : Notice
Deposit type : Fulltext
Image document

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation

Huabiao Lu , Baokang Zhao , Xiaofeng Wang , Jinshu Su
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers hal-01480181v1
Image document

On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)

Bogdan Ksiezopolski , Damian Rusinek , Adam Wierzbicki
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.261-270, ⟨10.1007/978-3-642-36818-9_27⟩
Conference papers hal-01480233v1
Image document

Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks

Panagiotis Ilia , George Oikonomou , Theo Tryfonas
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.34-49, ⟨10.1007/978-3-642-38530-8_3⟩
Conference papers hal-01485932v1
Image document

Reusable Components for Lightweight Mechanisation of Programming Languages

Seyed (hossein) Haeri , Sibylle Schupp
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.1-16, ⟨10.1007/978-3-642-39614-4_1⟩
Conference papers hal-01492773v1
Image document

Compositional Development of BPMN

Peter H. Wong
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.97-112, ⟨10.1007/978-3-642-39614-4_7⟩
Conference papers hal-01492779v1
Image document

E-Learning of IT Security Threats: A Game Prototype for Children

Jana Fruth , Carsten Schulze , Marleen Rohde , Jana Dittmann
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.162-172, ⟨10.1007/978-3-642-40779-6_14⟩
Conference papers hal-01492818v1
Image document

Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine

Hieu Cuong Nguyen , Stefan Katzenbeisser
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.113-122, ⟨10.1007/978-3-642-40779-6_9⟩
Conference papers hal-01492837v1
Image document

GSR and Blink Features for Cognitive Load Classification

Nargess Nourbakhsh , Yang Wang , Fang Chen
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.159-166, ⟨10.1007/978-3-642-40483-2_11⟩
Conference papers hal-01497433v1
Image document

WATTSBurning: Design and Evaluation of an Innovative Eco-Feedback System

Filipe Quintal , Lucas Pereira , Nuno Nunes , Valentina Nisi , Mary Barreto
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.453-470, ⟨10.1007/978-3-642-40483-2_32⟩
Conference papers hal-01497454v1
Image document

Vibro-Tactile Enrichment Improves Blind User Interaction with Mobile Touchscreens

Maria Claudia Buzzi , Marina Buzzi , Barbara Leporini , Maria Teresa Paratore
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.641-648, ⟨10.1007/978-3-642-40483-2_45⟩
Conference papers hal-01497468v1
Image document

Communication Choices to Engage Participation of Rural Indonesian Craftspeople in Development Projects

Ellya Zulaikha , Margot Brereton
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.780-787, ⟨10.1007/978-3-642-40483-2_55⟩
Conference papers hal-01497479v1
Image document

The Design and Usability Testing of DACADE – A Tool Supporting Systematic Data Collection and Analysis for Design Students

Madihah Sheikh Abdul Aziz , Gitte Lindgaard , T. Allan Whitfield
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.487-494, ⟨10.1007/978-3-642-40483-2_35⟩
Conference papers hal-01497457v1
Image document

Accessibility of Public Web Services: A Distant Dream?

Kristiina Nurmela , Antti Pirhonen , Airi Salminen
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.566-578, ⟨10.1007/978-3-642-40483-2_40⟩
Conference papers hal-01497463v1
Image document

A Cloud Resource Allocation Mechanism Based on Mean-Variance Optimization and Double Multi-Attribution Auction

Chengxi Gao , Xingwei Wang , Min Huang
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.106-117, ⟨10.1007/978-3-642-40820-5_10⟩
Conference papers hal-01513771v1
Image document

Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model

Gary Cantrell , David Dampier
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.83-98, ⟨10.1007/978-3-642-41148-9_6⟩
Conference papers hal-01460622v1
Image document

Towards Learning Normality for Anomaly Detection in Industrial Control Networks

Franka Schuster , Andreas Paul , Hartmut König
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.61-72, ⟨10.1007/978-3-642-38998-6_8⟩
Conference papers hal-01489971v1
Image document

Robust Hash Algorithms for Text

Martin Steinebach , Peter Klöckner , Nils Reimers , Dominik Wienand , Patrick Wolf
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers hal-01492815v1
Image document

Using a Goal-Driven Approach in the Investigation of a Questioned Contract

Clive Blackwell , Shareeful Islam , Benjamin Aziz
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.153-167, ⟨10.1007/978-3-642-41148-9_11⟩
Conference papers hal-01460603v1
Image document

Evaluation of Video Quality Monitoring Based on Pre-computed Frame Distortions

Dominik Klein , Thomas Zinner , Kathrin Borchert , Stanislav Lange , Vlad Singeorzan , et al.
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.100-111, ⟨10.1007/978-3-642-40552-5_10⟩
Conference papers hal-01497007v1
Image document

The Effect of Physicality on Low Fidelity Interactive Prototyping for Design Practice

Joanna Hare , Steve Gill , Gareth Loudon , Alan Lewis
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.495-510, ⟨10.1007/978-3-642-40483-2_36⟩
Conference papers hal-01497458v1
Image document

A Recovery Approach for SQLite History Recorders from YAFFS2

Beibei Wu , Ming Xu , Haiping Zhang , Jian Xu , Yizhi Ren , et al.
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.295-299, ⟨10.1007/978-3-642-36818-9_30⟩
Conference papers hal-01480183v1
Image document

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

Daniel Schreckling , Stephan Huber , Focke Höhne , Joachim Posegga
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.50-65, ⟨10.1007/978-3-642-38530-8_4⟩
Conference papers hal-01485933v1
Image document

Analysis of Elephant Users in Broadband Network Traffic

Péter Megyesi , Sándor Molnár
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.37-45, ⟨10.1007/978-3-642-40552-5_4⟩
Conference papers hal-01497035v1
Image document

A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud

Nguyen Quang-Hung , Pham Dac Nien , Nguyen Hoai Nam , Nguyen Huynh Tuong , Nam Thoai
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers hal-01480228v1
Image document

A Performance Review of Number Entry Interfaces

Patrick Oladimeji , Harold Thimbleby , Anna L. Cox
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.365-382, ⟨10.1007/978-3-642-40483-2_26⟩
Conference papers hal-01497448v1
Image document

EpiDOL: Epidemic Density Adaptive Data Dissemination Exploiting Opposite Lane in VANETs

Irem Nizamoglu , Sinem Coleri Ergen , Oznur Ozkasap
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.221-232, ⟨10.1007/978-3-642-40552-5_20⟩
Conference papers hal-01497019v1
Image document

Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing

Krzysztof Misztal , Jacek Tabor
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.158-167, ⟨10.1007/978-3-642-40925-7_16⟩
Conference papers hal-01496062v1
Image document

Weighted Approach to Projective Clustering

Przemysław Spurek , Jacek Tabor , Krzysztof Misztal
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.367-378, ⟨10.1007/978-3-642-40925-7_34⟩
Conference papers hal-01496083v1
Image document

Code Based KPD Scheme with Full Connectivity: Deterministic Merging

Pinaki Sarkar , Aritra Dhar
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.141-151, ⟨10.1007/978-3-642-36818-9_15⟩
Conference papers hal-01480168v1
Image document

Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation

Gábor György Gulyás , Sándor Imre
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.173-184, ⟨10.1007/978-3-642-40779-6_15⟩
Conference papers hal-01492819v1