Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

548 results
Deposit type : Fulltext
Document type : Conference papers
Image document

Implementing Virtual Clients in Quake III Arena

Stig Magnus Halvorsen , Kjetil Raaen
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.232-234, ⟨10.1007/978-3-662-45212-7_32⟩
Conference papers hal-01408559v1
Image document

Enhancing Privacy with Quantum Networks

Paulo Mateus , Nikola Paunković , João Rodrigues , André Souto
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.147-153, ⟨10.1007/978-3-662-44885-4_14⟩
Conference papers hal-01404206v1
Image document

Towards Testing Self-organizing, Adaptive Systems

Benedikt Eberhardinger , Hella Seebach , Alexander Knapp , Wolfgang Reif
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.180-185, ⟨10.1007/978-3-662-44857-1_13⟩
Conference papers hal-01405285v1
Image document

Creating and Using Personas in Software Development: Experiences from Practice

Jane Billestrup , Jan Stage , Anders Bruun , Lene Nielsen , Kira S. Nielsen
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.251-258, ⟨10.1007/978-3-662-44811-3_16⟩
Conference papers hal-01405082v1
Image document

Improving Rule Selection from Robot Soccer Strategy with Substrategies

Václav Svatoň , Jan Martinovič , Kateřina Slaninová , Václav Snášel
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.77-88, ⟨10.1007/978-3-662-45237-0_9⟩
Conference papers hal-01405561v1
Image document

mpCache: Accelerating MapReduce with Hybrid Storage System on Many-Core Clusters

Bo Wang , Jinlei Jiang , Guangwen Yang
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.220-233, ⟨10.1007/978-3-662-44917-2_19⟩
Conference papers hal-01403087v1
Image document

A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring

Anna Pięta , Michał Lupa , Monika Chuchro , Adam Piórkowski , Andrzej Leśniak
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.514-525, ⟨10.1007/978-3-662-45237-0_47⟩
Conference papers hal-01405634v1
Image document

HiNetSim: A Parallel Simulator for Large-Scale Hierarchical Direct Networks

Zhiguo Fan , Zheng Cao , Yong Su , Xiaoli Liu , Zhan Wang , et al.
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.120-131, ⟨10.1007/978-3-662-44917-2_11⟩
Conference papers hal-01403072v1
Image document

A Semantic-Based Malware Detection System Design Based on Channels

Peige Ren , Xiaofeng Wang , Chunqing Wu , Baokang Zhao , Hao Sun
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.653-662, ⟨10.1007/978-3-642-55032-4_67⟩
Conference papers hal-01397283v1
Image document

Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter

Chien-Wen Shen , Chin-Jin Kuo
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.526-534, ⟨10.1007/978-3-662-45237-0_48⟩
Conference papers hal-01405635v1
Image document

Model-Based Development of Adaptive UIs for Multi-channel Self-service Systems

Enes Yigitbas , Holger Fischer , Thomas Kern , Volker Paelke
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.267-274, ⟨10.1007/978-3-662-44811-3_18⟩
Conference papers hal-01405084v1
Image document

Cellular Automata Model of Urbanization in Camiguin, Philippines

Maria Isabel Beltran , Guido David
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.29-35, ⟨10.1007/978-3-642-55032-4_3⟩
Conference papers hal-01397141v1
Image document

Evolutionary Algorithm for Decision Tree Induction

Dariusz Jankowski , Konrad Jackowski
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.23-32, ⟨10.1007/978-3-662-45237-0_4⟩
Conference papers hal-01405549v1
Image document

A Novel Resource Provisioning Model for DHT-Based Cloud Storage Systems

Jingya Zhou , Wen He
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.257-268, ⟨10.1007/978-3-662-44917-2_22⟩
Conference papers hal-01403091v1
Image document

Information Technology in eParticipation Research: A Word Frequency Analysis

Samuel Bohman
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.78-89, ⟨10.1007/978-3-662-44914-1_7⟩
Conference papers hal-01396956v1
Image document

Algebraic–Coalgebraic Recursion Theory of History-Dependent Dynamical System Models

Baltasar Trancón y Widemann , Michael Hauhs
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.225-244, ⟨10.1007/978-3-662-44124-4_13⟩
Conference papers hal-01408762v1
Image document

Starting a Conversation: The Place of Managers in Opening Discussions in Communities of Practice

Azi Lev-On , Nili Steinfeld
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.38-51, ⟨10.1007/978-3-662-44914-1_4⟩
Conference papers hal-01396950v1
Image document

Canonical Nondeterministic Automata

Robert R. Myers , Jiří Adámek , Stefan Milius , Henning Urbat
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.189-210, ⟨10.1007/978-3-662-44124-4_11⟩
Conference papers hal-01408760v1
Image document

How to Kill Epsilons with a Dagger

Filippo Bonchi , Stefan Milius , Alexandra Silva , Fabio Zanasi
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.53-74, ⟨10.1007/978-3-662-44124-4_4⟩
Conference papers hal-01408752v1
Image document

Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus

Carolina Zarate , Simson Garfinkel , Aubin Heffernan , Scott Horras , Kyle Gorak
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.117-132, ⟨10.1007/978-3-662-44952-3_9⟩
Conference papers hal-01393766v1
Image document

Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)

Antonio J. Jara
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.155-165, ⟨10.1007/978-3-319-10975-6_11⟩
Conference papers hal-01403992v1
Image document

Using Fraud Trees to Analyze Internet Credit Card Fraud

Clive Blackwell
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.17-29, ⟨10.1007/978-3-662-44952-3_2⟩
Conference papers hal-01393755v1
Image document

Search-Based Testing for Embedded Telecom Software with Complex Input Structures

Kivanc Doganay , Sigrid Eldh , Wasif Afzal , Markus Bohlin
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.205-210, ⟨10.1007/978-3-662-44857-1_17⟩
Conference papers hal-01405289v1
Image document

Property Specification Made Easy: Harnessing the Power of Model Checking in UML Designs

Daniela Remenska , Tim C. Willemse , Jeff Templon , Kees Verstoep , Henri Bal
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.17-32, ⟨10.1007/978-3-662-43613-4_2⟩
Conference papers hal-01398006v1
Image document

Hunting the Unknown

Elisa Costante , Jerry Den Hartog , Milan Petković , Sandro Etalle , Mykola Pechenizkiy
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers hal-01284860v1
Image document

A Full Privacy-Preserving Scheme for Location-Based Services

Fei Shao , Rong Cheng , Fangguo Zhang
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers hal-01397275v1
Image document

Outsourcing Mobile Security in the Cloud

Gaëtan Hurel , Rémi Badonnel , Abdelkader Lahmadi , Olivier Festor
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Conference papers hal-01092239v1
Image document

Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus

Patrick Baillot , Erika de Benedetti , Simona Ronchi Della Rocca
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.151-163, ⟨10.1007/978-3-662-44602-7_13⟩
Conference papers hal-01015171v2
Image document

An Online Transparency for Accountability Maturity Model

Rui Pedro Lourenço , Leila Serra
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.35-46, ⟨10.1007/978-3-662-44426-9_3⟩
Conference papers hal-01401723v1
Image document

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud

Tapalina Bhattasali , Khalid Saeed , Nabendu Chaki , Rituparna Chaki
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.112-121, ⟨10.1007/978-3-662-45237-0_12⟩
Conference papers hal-01405569v1