Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment

Khaled El-Fakih , Tariq Salameh , Nina Yevtushenko
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.198-204, ⟨10.1007/978-3-662-44857-1_16⟩
Conference papers hal-01405288v1
Image document

LiLoLe—A Framework for Lifelong Learning from Sensor Data Streams for Predictive User Modelling

Mirko Fetter , Tom Gross
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.126-143, ⟨10.1007/978-3-662-44811-3_8⟩
Conference papers hal-01405070v1
Image document

Improving UX Work in Scrum Development: A Three-Year Follow-Up Study in a Company

Kati Kuusinen
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.259-266, ⟨10.1007/978-3-662-44811-3_17⟩
Conference papers hal-01405083v1
Image document

Coalgebraic Multigames

Marina Lenisa
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.33-49, ⟨10.1007/978-3-662-44124-4_3⟩
Conference papers hal-01408751v1
Image document

The Fundamental Principle of Breach Prevention

Rui Melo Biscaia
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.154-156, ⟨10.1007/978-3-662-44885-4_15⟩
Conference papers hal-01404207v1
Image document

Adaptive User-Centered Security

Sven Wohlgemuth
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers hal-01403988v1
Image document

Subshifts, MSO Logic, and Collapsing Hierarchies

Ilkka Törmä
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.111-122, ⟨10.1007/978-3-662-44602-7_10⟩
Conference papers hal-01402035v1
Image document

Semantic Set Analysis for Malware Detection

Nguyen Van Nhuong , Vo Yen Nhi , Nguyen Tan Cam , Mai Xuan Phu , Cao Dang Tan
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.688-700, ⟨10.1007/978-3-662-45237-0_62⟩
Conference papers hal-01405667v1
Image document

A GENTL Approach for Cloud Application Topologies

Vasilios Andrikopoulos , Anja Reuter , Santiago Gómez Sáez , Frank Leymann
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.148-159, ⟨10.1007/978-3-662-44879-3_11⟩
Conference papers hal-01318283v1
Image document

Verifying Security Policies Using Host Attributes

Cornelius Diekmann , Stephan-A. Posselt , Heiko Niedermayer , Holger Kinkelin , Oliver Hanka , et al.
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers hal-01398013v1
Image document

Efficient Management of Virtualized Information-Centric Networks

Maxim Claeys , Steven Latré , Filip De Turck
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.42-46, ⟨10.1007/978-3-662-43862-6_4⟩
Conference papers hal-01401285v1
Image document

LINC: A Compact Yet Powerful Coordination Environment

Maxime Louvel , François Pacull
Coordination Models and Languages : 16th IFIP WG 6.1 International Conference, COORDINATION 2014, Held as Part of the 9th International Federated Conferences on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014, Proceedings, Jun 2014, Berlin, Germany. pp.83-98, ⟨10.1007/978-3-662-43376-8_6⟩
Conference papers hal-01274824v1
Image document

Efficient Live Migration of Virtual Machines with a Novel Data Filter

Yonghui Ruan , Zhongsheng Cao , Yuanzhen Wang
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.369-382, ⟨10.1007/978-3-662-44917-2_31⟩
Conference papers hal-01403107v1
Image document

Who, When, and Where? Location Proof Assertion for Mobile Devices

Rasib Khan , Shams Zawoad , Md Munirul Haque , Ragib Hasan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.146-162, ⟨10.1007/978-3-662-43936-4_10⟩
Conference papers hal-01285030v1
Image document

A Goal Matching Service for Facilitating Public Collaboration Using Linked Open Data

Shun Shiramatsu , Teemu Tossavainen , Tadachika Ozono , Toramatsu Shintani
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.114-127, ⟨10.1007/978-3-662-44914-1_10⟩
Conference papers hal-01396965v1
Image document

Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions

Dariusz Rafal Augustyn
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.151-164, ⟨10.1007/978-3-662-45237-0_16⟩
Conference papers hal-01405574v1
Image document

On If-Then Multi Soft Sets-Based Decision Making

R. Fajriya Hakim , Eka Novita Sari , Tutut Herawan
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.306-315, ⟨10.1007/978-3-642-55032-4_30⟩
Conference papers hal-01397227v1
Image document

Event Pattern Discovery for Cross-Layer Adaptation of Multi-cloud Applications

Chrysostomos Zeginis , Kyriakos Kritikos , Dimitris Plexousakis
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.138-147, ⟨10.1007/978-3-662-44879-3_10⟩
Conference papers hal-01318281v1
Image document

On Coalgebras with Internal Moves

Tomasz Brengos
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.75-97, ⟨10.1007/978-3-662-44124-4_5⟩
Conference papers hal-01408753v1
Image document

What Characterizes a Good Software Tester? – A Survey in Four Norwegian Companies

Anca Deak
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.161-172, ⟨10.1007/978-3-662-44857-1_11⟩
Conference papers hal-01405283v1
Image document

Educating the Next Generation of Cyberforensic Professionals

Mark Pollitt , Philip Craiger
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.327-335, ⟨10.1007/978-3-662-44952-3_22⟩
Conference papers hal-01393788v1
Image document

Formal Specification and Verification of CRDTs

Peter Zeller , Annette Bieniusa , Arnd Poetzsch-Heffter
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43613-4_3⟩
Conference papers hal-01398007v1
Image document

Affine Sessions

Dimitris Mostrous , Vasco Thudichum Vasconcelos
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.115-130, ⟨10.1007/978-3-662-43376-8_8⟩
Conference papers hal-01290071v1
Image document

Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study

Charnsak Srisawatsakul , Gerald Quirchmayr , Borworn Papasratorn
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.56-65, ⟨10.1007/978-3-642-55032-4_6⟩
Conference papers hal-01397144v1
Image document

Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior

Haruna Chiroma , Sameem Abdulkareem , Adamu I. Abubakar , Eka Novita Sari , Tutut Herawan , et al.
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.238-247, ⟨10.1007/978-3-642-55032-4_23⟩
Conference papers hal-01397202v1
Image document

Document Tracking Technology to Support Indonesian Local E-Governments

Wikan Sunindyo , Bayu Hendradjaya , G. Putri Saptawati , Tricya E. Widagdo
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.338-347, ⟨10.1007/978-3-642-55032-4_33⟩
Conference papers hal-01397230v1
Image document

A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian Rice

James W. Baurley , Bens Pardamean , Anzaludin S. Perbangsa , Dwinita Utami , Habib Rijzaani , et al.
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.356-364, ⟨10.1007/978-3-642-55032-4_35⟩
Conference papers hal-01397232v1
Image document

The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy

Juneman Abraham , Murty Magda Pane
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.492-499, ⟨10.1007/978-3-642-55032-4_50⟩
Conference papers hal-01397263v1
Image document

Similarity Hashing Based on Levenshtein Distances

Frank Breitinger , Georg Ziroff , Steffen Lange , Harald Baier
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.133-147, ⟨10.1007/978-3-662-44952-3_10⟩
Conference papers hal-01393767v1
Image document

The Inhabitation Problem for Non-idempotent Intersection Types

Antonio Bucciarelli , Delia Kesner , Simona Ronchi Della Rocca
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.341-354, ⟨10.1007/978-3-662-44602-7_26⟩
Conference papers hal-01402082v1