Filter your results
- 549
- 23
- 548
- 1
- 549
- 177
- 549
- 549
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.198-204, ⟨10.1007/978-3-662-44857-1_16⟩
Conference papers
hal-01405288v1
|
||
|
LiLoLe—A Framework for Lifelong Learning from Sensor Data Streams for Predictive User Modelling5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.126-143, ⟨10.1007/978-3-662-44811-3_8⟩
Conference papers
hal-01405070v1
|
||
|
Improving UX Work in Scrum Development: A Three-Year Follow-Up Study in a Company5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.259-266, ⟨10.1007/978-3-662-44811-3_17⟩
Conference papers
hal-01405083v1
|
||
|
Coalgebraic Multigames12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.33-49, ⟨10.1007/978-3-662-44124-4_3⟩
Conference papers
hal-01408751v1
|
||
|
The Fundamental Principle of Breach Prevention15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.154-156, ⟨10.1007/978-3-662-44885-4_15⟩
Conference papers
hal-01404207v1
|
||
|
Adaptive User-Centered SecurityInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers
hal-01403988v1
|
||
|
Subshifts, MSO Logic, and Collapsing Hierarchies8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.111-122, ⟨10.1007/978-3-662-44602-7_10⟩
Conference papers
hal-01402035v1
|
||
|
Semantic Set Analysis for Malware Detection13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.688-700, ⟨10.1007/978-3-662-45237-0_62⟩
Conference papers
hal-01405667v1
|
||
|
A GENTL Approach for Cloud Application Topologies3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.148-159, ⟨10.1007/978-3-662-44879-3_11⟩
Conference papers
hal-01318283v1
|
||
|
Verifying Security Policies Using Host Attributes34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers
hal-01398013v1
|
||
|
Efficient Management of Virtualized Information-Centric Networks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.42-46, ⟨10.1007/978-3-662-43862-6_4⟩
Conference papers
hal-01401285v1
|
||
|
LINC: A Compact Yet Powerful Coordination EnvironmentCoordination Models and Languages : 16th IFIP WG 6.1 International Conference, COORDINATION 2014, Held as Part of the 9th International Federated Conferences on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014, Proceedings, Jun 2014, Berlin, Germany. pp.83-98, ⟨10.1007/978-3-662-43376-8_6⟩
Conference papers
hal-01274824v1
|
||
|
Efficient Live Migration of Virtual Machines with a Novel Data Filter11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.369-382, ⟨10.1007/978-3-662-44917-2_31⟩
Conference papers
hal-01403107v1
|
||
|
Who, When, and Where? Location Proof Assertion for Mobile Devices28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.146-162, ⟨10.1007/978-3-662-43936-4_10⟩
Conference papers
hal-01285030v1
|
||
|
A Goal Matching Service for Facilitating Public Collaboration Using Linked Open Data6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.114-127, ⟨10.1007/978-3-662-44914-1_10⟩
Conference papers
hal-01396965v1
|
||
|
Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.151-164, ⟨10.1007/978-3-662-45237-0_16⟩
Conference papers
hal-01405574v1
|
||
|
On If-Then Multi Soft Sets-Based Decision Making2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.306-315, ⟨10.1007/978-3-642-55032-4_30⟩
Conference papers
hal-01397227v1
|
||
|
Event Pattern Discovery for Cross-Layer Adaptation of Multi-cloud Applications3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.138-147, ⟨10.1007/978-3-662-44879-3_10⟩
Conference papers
hal-01318281v1
|
||
|
On Coalgebras with Internal Moves12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.75-97, ⟨10.1007/978-3-662-44124-4_5⟩
Conference papers
hal-01408753v1
|
||
|
What Characterizes a Good Software Tester? – A Survey in Four Norwegian Companies26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.161-172, ⟨10.1007/978-3-662-44857-1_11⟩
Conference papers
hal-01405283v1
|
||
|
Educating the Next Generation of Cyberforensic Professionals10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.327-335, ⟨10.1007/978-3-662-44952-3_22⟩
Conference papers
hal-01393788v1
|
||
|
Formal Specification and Verification of CRDTs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43613-4_3⟩
Conference papers
hal-01398007v1
|
||
|
Affine Sessions16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.115-130, ⟨10.1007/978-3-662-43376-8_8⟩
Conference papers
hal-01290071v1
|
||
|
Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.56-65, ⟨10.1007/978-3-642-55032-4_6⟩
Conference papers
hal-01397144v1
|
||
|
Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.238-247, ⟨10.1007/978-3-642-55032-4_23⟩
Conference papers
hal-01397202v1
|
||
|
Document Tracking Technology to Support Indonesian Local E-Governments2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.338-347, ⟨10.1007/978-3-642-55032-4_33⟩
Conference papers
hal-01397230v1
|
||
|
A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian Rice2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.356-364, ⟨10.1007/978-3-642-55032-4_35⟩
Conference papers
hal-01397232v1
|
||
|
The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.492-499, ⟨10.1007/978-3-642-55032-4_50⟩
Conference papers
hal-01397263v1
|
||
|
Similarity Hashing Based on Levenshtein Distances10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.133-147, ⟨10.1007/978-3-662-44952-3_10⟩
Conference papers
hal-01393767v1
|
||
|
The Inhabitation Problem for Non-idempotent Intersection Types8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.341-354, ⟨10.1007/978-3-662-44602-7_26⟩
Conference papers
hal-01402082v1
|