Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

A Semantic-Based Malware Detection System Design Based on Channels

Peige Ren , Xiaofeng Wang , Chunqing Wu , Baokang Zhao , Hao Sun
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.653-662, ⟨10.1007/978-3-642-55032-4_67⟩
Conference papers hal-01397283v1
Image document

Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter

Chien-Wen Shen , Chin-Jin Kuo
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.526-534, ⟨10.1007/978-3-662-45237-0_48⟩
Conference papers hal-01405635v1
Image document

Model-Based Development of Adaptive UIs for Multi-channel Self-service Systems

Enes Yigitbas , Holger Fischer , Thomas Kern , Volker Paelke
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.267-274, ⟨10.1007/978-3-662-44811-3_18⟩
Conference papers hal-01405084v1
Image document

Cellular Automata Model of Urbanization in Camiguin, Philippines

Maria Isabel Beltran , Guido David
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.29-35, ⟨10.1007/978-3-642-55032-4_3⟩
Conference papers hal-01397141v1
Image document

Evolutionary Algorithm for Decision Tree Induction

Dariusz Jankowski , Konrad Jackowski
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.23-32, ⟨10.1007/978-3-662-45237-0_4⟩
Conference papers hal-01405549v1
Image document

A Novel Resource Provisioning Model for DHT-Based Cloud Storage Systems

Jingya Zhou , Wen He
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.257-268, ⟨10.1007/978-3-662-44917-2_22⟩
Conference papers hal-01403091v1
Image document

Information Technology in eParticipation Research: A Word Frequency Analysis

Samuel Bohman
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.78-89, ⟨10.1007/978-3-662-44914-1_7⟩
Conference papers hal-01396956v1
Image document

Algebraic–Coalgebraic Recursion Theory of History-Dependent Dynamical System Models

Baltasar Trancón y Widemann , Michael Hauhs
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.225-244, ⟨10.1007/978-3-662-44124-4_13⟩
Conference papers hal-01408762v1
Image document

Starting a Conversation: The Place of Managers in Opening Discussions in Communities of Practice

Azi Lev-On , Nili Steinfeld
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.38-51, ⟨10.1007/978-3-662-44914-1_4⟩
Conference papers hal-01396950v1
Image document

Canonical Nondeterministic Automata

Robert R. Myers , Jiří Adámek , Stefan Milius , Henning Urbat
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.189-210, ⟨10.1007/978-3-662-44124-4_11⟩
Conference papers hal-01408760v1
Image document

How to Kill Epsilons with a Dagger

Filippo Bonchi , Stefan Milius , Alexandra Silva , Fabio Zanasi
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.53-74, ⟨10.1007/978-3-662-44124-4_4⟩
Conference papers hal-01408752v1
Image document

Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus

Carolina Zarate , Simson Garfinkel , Aubin Heffernan , Scott Horras , Kyle Gorak
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.117-132, ⟨10.1007/978-3-662-44952-3_9⟩
Conference papers hal-01393766v1
Image document

Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)

Antonio J. Jara
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.155-165, ⟨10.1007/978-3-319-10975-6_11⟩
Conference papers hal-01403992v1
Image document

Using Fraud Trees to Analyze Internet Credit Card Fraud

Clive Blackwell
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.17-29, ⟨10.1007/978-3-662-44952-3_2⟩
Conference papers hal-01393755v1
Image document

Search-Based Testing for Embedded Telecom Software with Complex Input Structures

Kivanc Doganay , Sigrid Eldh , Wasif Afzal , Markus Bohlin
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.205-210, ⟨10.1007/978-3-662-44857-1_17⟩
Conference papers hal-01405289v1
Image document

Property Specification Made Easy: Harnessing the Power of Model Checking in UML Designs

Daniela Remenska , Tim C. Willemse , Jeff Templon , Kees Verstoep , Henri Bal
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.17-32, ⟨10.1007/978-3-662-43613-4_2⟩
Conference papers hal-01398006v1
Image document

Hunting the Unknown

Elisa Costante , Jerry Den Hartog , Milan Petković , Sandro Etalle , Mykola Pechenizkiy
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers hal-01284860v1
Image document

A Full Privacy-Preserving Scheme for Location-Based Services

Fei Shao , Rong Cheng , Fangguo Zhang
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.596-601, ⟨10.1007/978-3-642-55032-4_61⟩
Conference papers hal-01397275v1
Image document

Outsourcing Mobile Security in the Cloud

Gaëtan Hurel , Rémi Badonnel , Abdelkader Lahmadi , Olivier Festor
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.69-73, ⟨10.1007/978-3-662-43862-6_9⟩
Conference papers hal-01092239v1
Image document

Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus

Patrick Baillot , Erika de Benedetti , Simona Ronchi Della Rocca
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.151-163, ⟨10.1007/978-3-662-44602-7_13⟩
Conference papers hal-01015171v2
Image document

An Online Transparency for Accountability Maturity Model

Rui Pedro Lourenço , Leila Serra
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.35-46, ⟨10.1007/978-3-662-44426-9_3⟩
Conference papers hal-01401723v1
Image document

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud

Tapalina Bhattasali , Khalid Saeed , Nabendu Chaki , Rituparna Chaki
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.112-121, ⟨10.1007/978-3-662-45237-0_12⟩
Conference papers hal-01405569v1
Image document

Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem

Ripon Kumar Chakrabortty , Ruhul Amin Sarker , Daryl L. Essam
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.375-386, ⟨10.1007/978-3-662-45237-0_35⟩
Conference papers hal-01405607v1
Image document

Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts — Case Study on Low Cost Smart Solution

Jan Dvorak , Ondrej Berger , Ondrej Krejcar
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.479-488, ⟨10.1007/978-3-662-45237-0_44⟩
Conference papers hal-01405631v1
Image document

Implicit and Explicit Certificates-Based Encryption Scheme

Tomasz Hyla , Witold Maćków , Jerzy Pejaś
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.651-666, ⟨10.1007/978-3-662-45237-0_59⟩
Conference papers hal-01405660v1
Image document

Risk Reduction Overview

Hellen Janine Havinga , Olivier Theobald Sessink
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.239-249, ⟨10.1007/978-3-319-10975-6_18⟩
Conference papers hal-01403999v1
Image document

Weaving Aspects and Business Processes through Model Transformation

Heiko Witteborg , Anis Charfi , Daniel Colomer Collell , Mira Mezini
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.47-61, ⟨10.1007/978-3-662-44879-3_4⟩
Conference papers hal-01318272v1
Image document

SOA-Readiness of REST

Peter Leo Gorski , Luigi Lo Iacono , Hoai Viet Nguyen , Daniel Behnam Torkian
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.81-92, ⟨10.1007/978-3-662-44879-3_6⟩
Conference papers hal-01318274v1
Image document

Towards Systematic Construction of Temporal Logics for Dynamical Systems via Coalgebra

Baltasar Trancón y Widemann
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.211-224, ⟨10.1007/978-3-662-44124-4_12⟩
Conference papers hal-01408761v1
Image document

Assessing the Kinect’s Capabilities to Perform a Time-Based Clinical Test for Fall Risk Assessment in Older People

Jaime A. Garcia , Yusuf Pisan , Chek Tien Tan , Karla Felix Navarro
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.100-107, ⟨10.1007/978-3-662-45212-7_13⟩
Conference papers hal-01408510v1