Filter your results
- 548
- 548
- 1
- 548
- 177
- 548
- 548
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Implementing Virtual Clients in Quake III Arena13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.232-234, ⟨10.1007/978-3-662-45212-7_32⟩
Conference papers
hal-01408559v1
|
||
|
Enhancing Privacy with Quantum Networks15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.147-153, ⟨10.1007/978-3-662-44885-4_14⟩
Conference papers
hal-01404206v1
|
||
|
Towards Testing Self-organizing, Adaptive Systems26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.180-185, ⟨10.1007/978-3-662-44857-1_13⟩
Conference papers
hal-01405285v1
|
||
|
Creating and Using Personas in Software Development: Experiences from Practice5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.251-258, ⟨10.1007/978-3-662-44811-3_16⟩
Conference papers
hal-01405082v1
|
||
|
Improving Rule Selection from Robot Soccer Strategy with Substrategies13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.77-88, ⟨10.1007/978-3-662-45237-0_9⟩
Conference papers
hal-01405561v1
|
||
|
mpCache: Accelerating MapReduce with Hybrid Storage System on Many-Core Clusters11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.220-233, ⟨10.1007/978-3-662-44917-2_19⟩
Conference papers
hal-01403087v1
|
||
|
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.514-525, ⟨10.1007/978-3-662-45237-0_47⟩
Conference papers
hal-01405634v1
|
||
|
HiNetSim: A Parallel Simulator for Large-Scale Hierarchical Direct Networks11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.120-131, ⟨10.1007/978-3-662-44917-2_11⟩
Conference papers
hal-01403072v1
|
||
|
A Semantic-Based Malware Detection System Design Based on Channels2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.653-662, ⟨10.1007/978-3-642-55032-4_67⟩
Conference papers
hal-01397283v1
|
||
|
Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.526-534, ⟨10.1007/978-3-662-45237-0_48⟩
Conference papers
hal-01405635v1
|
||
|
Model-Based Development of Adaptive UIs for Multi-channel Self-service Systems5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.267-274, ⟨10.1007/978-3-662-44811-3_18⟩
Conference papers
hal-01405084v1
|
||
|
Cellular Automata Model of Urbanization in Camiguin, Philippines2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.29-35, ⟨10.1007/978-3-642-55032-4_3⟩
Conference papers
hal-01397141v1
|
||
|
Evolutionary Algorithm for Decision Tree Induction13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.23-32, ⟨10.1007/978-3-662-45237-0_4⟩
Conference papers
hal-01405549v1
|
||
|
A Novel Resource Provisioning Model for DHT-Based Cloud Storage Systems11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.257-268, ⟨10.1007/978-3-662-44917-2_22⟩
Conference papers
hal-01403091v1
|
||
|
Information Technology in eParticipation Research: A Word Frequency Analysis6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.78-89, ⟨10.1007/978-3-662-44914-1_7⟩
Conference papers
hal-01396956v1
|
||
|
Algebraic–Coalgebraic Recursion Theory of History-Dependent Dynamical System Models12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.225-244, ⟨10.1007/978-3-662-44124-4_13⟩
Conference papers
hal-01408762v1
|
||
|
Starting a Conversation: The Place of Managers in Opening Discussions in Communities of Practice6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.38-51, ⟨10.1007/978-3-662-44914-1_4⟩
Conference papers
hal-01396950v1
|
||
|
Canonical Nondeterministic Automata12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.189-210, ⟨10.1007/978-3-662-44124-4_11⟩
Conference papers
hal-01408760v1
|
||
|
How to Kill Epsilons with a Dagger12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.53-74, ⟨10.1007/978-3-662-44124-4_4⟩
Conference papers
hal-01408752v1
|
||
|
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.117-132, ⟨10.1007/978-3-662-44952-3_9⟩
Conference papers
hal-01393766v1
|
||
|
Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.155-165, ⟨10.1007/978-3-319-10975-6_11⟩
Conference papers
hal-01403992v1
|
||
|
Using Fraud Trees to Analyze Internet Credit Card Fraud10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.17-29, ⟨10.1007/978-3-662-44952-3_2⟩
Conference papers
hal-01393755v1
|
||
|
Search-Based Testing for Embedded Telecom Software with Complex Input Structures26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.205-210, ⟨10.1007/978-3-662-44857-1_17⟩
Conference papers
hal-01405289v1
|
||
|
Property Specification Made Easy: Harnessing the Power of Model Checking in UML Designs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.17-32, ⟨10.1007/978-3-662-43613-4_2⟩
Conference papers
hal-01398006v1
|
||
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
A Full Privacy-Preserving Scheme for Location-Based Services2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers
hal-01397275v1
|
||
|
Outsourcing Mobile Security in the Cloud8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Conference papers
hal-01092239v1
|
||
|
Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.151-163, ⟨10.1007/978-3-662-44602-7_13⟩
Conference papers
hal-01015171v2
|
||
|
An Online Transparency for Accountability Maturity Model13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.35-46, ⟨10.1007/978-3-662-44426-9_3⟩
Conference papers
hal-01401723v1
|
||
|
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.112-121, ⟨10.1007/978-3-662-45237-0_12⟩
Conference papers
hal-01405569v1
|