Search - IFIP - Lecture Notes in Computer Science

Filter your results

745 results
Deposit type : Fulltext
Image document

Supporting Improved Maternity Care by Midwives: Design Opportunities and Lessons Learned

Abdullah Al Mahmud , David V. Keyson
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.635-642, ⟨10.1007/978-3-642-40498-6_55⟩
Conference papers hal-01510507v1
Image document

Dynamic Tangible User Interface Palettes

Martin Spindler , Victor Cheung , Raimund Dachselt
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.159-176, ⟨10.1007/978-3-642-40498-6_12⟩
Conference papers hal-01510532v1
Image document

Traveller: An Interactive Cultural Training System Controlled by User-Defined Body Gestures

Felix Kistler , Elisabeth André , Samuel Mascarenhas , André Silva , Ana Paiva , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.697-704, ⟨10.1007/978-3-642-40498-6_63⟩
Conference papers hal-01510550v1
Image document

Analysis and Visualization of Interactions with Mobile Web Applications

Paolo Burzacca , Fabio Paternò
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.515-522, ⟨10.1007/978-3-642-40498-6_40⟩
Conference papers hal-01510563v1
Image document

Cultural Congruence and Rating Scale Biases in Homepages

Gitte Lindgaard , Cathy Dudek , Gerry Chan
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.531-538, ⟨10.1007/978-3-642-40498-6_42⟩
Conference papers hal-01510545v1
Image document

Web Design for Science Museum towards Engaging User Experience

Mohd Yamin , Eswati Azni Jaafar
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.745-754, ⟨10.1007/978-3-642-40498-6_69⟩
Conference papers hal-01510548v1
Image document

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness

Arcangelo Castiglione , Ciriaco D’ambrosio , Alfredo De Santis , Francesco Palmieri
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.414-429
Conference papers hal-01506692v1
Image document

Index Data Structure for Fast Subset and Superset Queries

Iztok Savnik
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.134-148
Conference papers hal-01506780v1
Image document

Mobile Movie Recommendations with Linked Data

Vito Claudio Ostuni , Giosia Gentile , Tommaso Di Noia , Roberto Mirizzi , Davide Romito , et al.
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.400-415
Conference papers hal-01506768v1
Image document

Code-Based Public-Key Encryption Resistant to Key Leakage

Edoardo Persichetti
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-54
Conference papers hal-01506563v1
Image document

A Study on the Influence of Semantics on the Analysis of Micro-blog Tags in the Medical Domain

Carlos Vicient , Antonio Moreno
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.446-459
Conference papers hal-01506763v1
Image document

Proxy Service for Multi-tenant Database Access

Haitham Yaish , Madhu Goyal , George Feuerlicht
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.100-117
Conference papers hal-01506783v1
Image document

Chaining Data and Visualization Web Services for Decision Making in Information Systems

Ahmet Sayar , Marlon E. Pierce
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-53
Conference papers hal-01506785v1
Image document

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

Wolfgang Boehmer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers hal-01506570v1
Image document

Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice

Fatih Gey , Stefan Walraven , Dimitri Van Landuyt , Wouter Joosen
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers hal-01492780v1
Image document

Pit Stop for an Audio Steganography Algorithm

Andreas Westfeld , Jürgen Wurzer , Christian Fabian , Ernst Piller
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.123-134, ⟨10.1007/978-3-642-40779-6_10⟩
Conference papers hal-01492814v1
Image document

Face Recognition from Degraded Images – Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries

Sabah A. Jassim
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.217-232, ⟨10.1007/978-3-642-40779-6_22⟩
Conference papers hal-01492827v1
Image document

Cache Management Strategy for CCN based on Content Popularity

César Bernardini , Thomas Silverston , Olivier Festor
7th International Conference on Autonomous Infrastructure (AIMS), IFIP, Jun 2013, Barcelonne, Spain. pp.92-95, ⟨10.1007/978-3-642-38998-6_12⟩
Conference papers hal-00929736v1
Image document

Bengali Printed Character Recognition – A New Approach

Soharab Hossain Shaikh , Marek Tabedzki , Nabendu Chaki , Khalid Saeed
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.129-140, ⟨10.1007/978-3-642-40925-7_13⟩
Conference papers hal-01496058v1
Image document

Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network

Ayan Kumar Das , Rituparna Chaki , Atreyee Biswas
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.289-300, ⟨10.1007/978-3-642-40925-7_27⟩
Conference papers hal-01496075v1
Image document

Synthetic Social Network Based on Competency-Based Description of Human Resources

Štěpán Kuchař , Jan Martinovič , Pavla Dráždilová , Kateřina Slaninová
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.313-324, ⟨10.1007/978-3-642-40925-7_29⟩
Conference papers hal-01496077v1
Image document

Displaying Genealogy with Adoptions and Multiple Remarriages Using the WHIteBasE

Seiji Sugiyama , Atsushi Ikuta , Daisuke Yokozawa , Miyuki Shibata , Tohru Matsuura
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.325-336, ⟨10.1007/978-3-642-40925-7_30⟩
Conference papers hal-01496079v1
Image document

Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxes

Anna Bartkowiak , Radoslaw Zimroz
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.24-35, ⟨10.1007/978-3-642-40925-7_3⟩
Conference papers hal-01496088v1
Image document

What is the Value of Information - Search Engine’s Point of View

Mieczysław A. Kłopotek
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.1-12, ⟨10.1007/978-3-642-40925-7_1⟩
Conference papers hal-01496067v1
Image document

User Authentication for Mobile Devices

Marcin Rogowski , Khalid Saeed , Mariusz Rybnik , Marek Tabedzki , Marcin Adamski
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers hal-01496111v1
Image document

Considering Communities, Diversity and the Production of Locality in the Design of Networked Urban Screens

Wallis Motta , Ava Gen Schieck , Holger Schnädelbach , Efstathia Kostopoulou , Moritz Behrens , et al.
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.315-322, ⟨10.1007/978-3-642-40483-2_21⟩
Conference papers hal-01497443v1
Image document

A Testbed Evaluation of the Scalability of IEEE 802.11s Light Sleep Mode

Marco Porsch , Thomas Bauschert
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.292-297, ⟨10.1007/978-3-642-40552-5_28⟩
Conference papers hal-01497027v1
Image document

Poster Abstract: Performance Evaluation of Machine-to-Machine Communication on Future Mobile Networks in Disaster Scenarios

Thomas Pötsch , Safdar Khan Marwat , Yasir Zaki , Carmelita Görg
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.270-273, ⟨10.1007/978-3-642-40552-5_24⟩
Conference papers hal-01497050v1
Image document

QoE Management Framework for Internet Services in SDN Enabled Mobile Networks

Marcus Eckert , Thomas Martin Knoll
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.112-123, ⟨10.1007/978-3-642-40552-5_11⟩
Conference papers hal-01497008v1
Image document

IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices

Florent Fourcot , Laurent Toutain , Stefan Köpsell , Frédéric Cuppens , Nora Cuppens-Boulahia
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.148-160, ⟨10.1007/978-3-642-40552-5_14⟩
Conference papers hal-01497012v1