Filter your results
- 549
- 23
- 548
- 1
- 549
- 177
- 549
- 549
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.375-386, ⟨10.1007/978-3-662-45237-0_35⟩
Conference papers
hal-01405607v1
|
||
|
Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts — Case Study on Low Cost Smart Solution13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.479-488, ⟨10.1007/978-3-662-45237-0_44⟩
Conference papers
hal-01405631v1
|
||
|
Implicit and Explicit Certificates-Based Encryption Scheme13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.651-666, ⟨10.1007/978-3-662-45237-0_59⟩
Conference papers
hal-01405660v1
|
||
|
Risk Reduction OverviewInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.239-249, ⟨10.1007/978-3-319-10975-6_18⟩
Conference papers
hal-01403999v1
|
||
|
Weaving Aspects and Business Processes through Model Transformation3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.47-61, ⟨10.1007/978-3-662-44879-3_4⟩
Conference papers
hal-01318272v1
|
||
|
SOA-Readiness of REST3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.81-92, ⟨10.1007/978-3-662-44879-3_6⟩
Conference papers
hal-01318274v1
|
||
|
Towards Systematic Construction of Temporal Logics for Dynamical Systems via Coalgebra12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.211-224, ⟨10.1007/978-3-662-44124-4_12⟩
Conference papers
hal-01408761v1
|
||
|
Assessing the Kinect’s Capabilities to Perform a Time-Based Clinical Test for Fall Risk Assessment in Older People13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.100-107, ⟨10.1007/978-3-662-45212-7_13⟩
Conference papers
hal-01408510v1
|
||
|
Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.128-132, ⟨10.1007/978-3-662-43862-6_16⟩
Conference papers
hal-01401299v1
|
||
|
Quality of Service Enhancement by Using an Integer Bloom Filter Based Data Deduplication Mechanism in the Cloud Storage Environment11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.587-590, ⟨10.1007/978-3-662-44917-2_59⟩
Conference papers
hal-01403155v1
|
||
|
A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.159-169, ⟨10.1007/978-3-642-55032-4_16⟩
Conference papers
hal-01397181v1
|
||
|
Enhancing Network Security: Host Trustworthiness Estimation8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.63-68, ⟨10.1007/978-3-662-43862-6_8⟩
Conference papers
hal-01401291v1
|
||
|
Transformation of Digital Ecosystems: The Case of Digital Payments2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.46-55, ⟨10.1007/978-3-642-55032-4_5⟩
Conference papers
hal-01397143v1
|
||
|
Software Defined Networking to Improve Mobility Management Performance8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.118-122, ⟨10.1007/978-3-662-43862-6_14⟩
Conference papers
hal-01401296v1
|
||
|
Efficient Variant of Rainbow without Triangular Matrix Representation2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.532-541, ⟨10.1007/978-3-642-55032-4_55⟩
Conference papers
hal-01397267v1
|
||
|
On the Step Branching Time Closure of Free-Choice Petri Nets34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.232-248, ⟨10.1007/978-3-662-43613-4_15⟩
Conference papers
hal-01398018v1
|
||
|
Coinductive Definition of Distances between Processes: Beyond Bisimulation Distances34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.249-265, ⟨10.1007/978-3-662-43613-4_16⟩
Conference papers
hal-01398019v1
|
||
|
Motivation-Based Risk Analysis Process for IT Systems2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.446-455, ⟨10.1007/978-3-642-55032-4_45⟩
Conference papers
hal-01397337v1
|
||
|
Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.139-149, ⟨10.1007/978-3-642-55032-4_14⟩
Conference papers
hal-01397165v1
|
||
|
State Machine Abstraction Layer2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.213-227, ⟨10.1007/978-3-642-55032-4_21⟩
Conference papers
hal-01397199v1
|
||
|
An Improved Ant Colony Matching by Using Discrete Curve Evolution2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.248-256, ⟨10.1007/978-3-642-55032-4_24⟩
Conference papers
hal-01397203v1
|
||
|
A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid Polyhedral2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.257-266, ⟨10.1007/978-3-642-55032-4_25⟩
Conference papers
hal-01397204v1
|
||
|
Preserving Dates and Timestamps for Incident Handling in Android Smartphones10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.209-225, ⟨10.1007/978-3-662-44952-3_14⟩
Conference papers
hal-01393772v1
|
||
|
Adaptive and Scalable High Availability for Infrastructure Clouds4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.16-30, ⟨10.1007/978-3-662-43352-2_2⟩
Conference papers
hal-01286221v1
|
||
|
Towards Fully Automated Digital Alibis with Social Interaction10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.297-307, ⟨10.1007/978-3-662-44952-3_20⟩
Conference papers
hal-01393786v1
|
||
|
Towards Semantic Mashup Tools for Big Data Analysis2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.129-138, ⟨10.1007/978-3-642-55032-4_13⟩
Conference papers
hal-01397164v1
|
||
|
A Distributed Generic Data Structure for Urban Level Building Data Monitoring2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.86-95, ⟨10.1007/978-3-642-55032-4_9⟩
Conference papers
hal-01397148v1
|
||
|
A Flexible Agent-Based Framework for Infectious Disease Modeling2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.36-45, ⟨10.1007/978-3-642-55032-4_4⟩
Conference papers
hal-01397142v1
|
||
|
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.29-41, ⟨10.1007/978-3-662-43862-6_3⟩
Conference papers
hal-01401284v1
|
||
|
The Rise of Panopticons: Examining Region-Specific Third-Party Web Tracking6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.104-114, ⟨10.1007/978-3-642-54999-1_9⟩
Conference papers
hal-01396476v1
|