Filter your results
- 549
- 23
- 548
- 1
- 549
- 177
- 549
- 549
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.591-594, ⟨10.1007/978-3-662-44917-2_60⟩
Conference papers
hal-01403156v1
|
||
|
DLBer: A Dynamic Load Balancing Algorithm for the Event-Driven Clusters11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.608-611, ⟨10.1007/978-3-662-44917-2_64⟩
Conference papers
hal-01403163v1
|
||
|
Aspects of Human-Centred Design in HCI with Older Adults: Experiences from the Field5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.235-242, ⟨10.1007/978-3-662-44811-3_14⟩
Conference papers
hal-01405079v1
|
||
|
User Centered Inclusive Design for People with Dyslexia: Experiences from a Project on Accessibility5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.307-314, ⟨10.1007/978-3-662-44811-3_23⟩
Conference papers
hal-01405091v1
|
||
|
Expert Knowledge Based Design and Verification of Secure Systems with Embedded DevicesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.194-210, ⟨10.1007/978-3-319-10975-6_15⟩
Conference papers
hal-01403995v1
|
||
|
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring FunctionsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.211-225, ⟨10.1007/978-3-319-10975-6_16⟩
Conference papers
hal-01403997v1
|
||
|
Developing Emergent Play in Collaborative Online Experiences13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.117-124, ⟨10.1007/978-3-662-45212-7_15⟩
Conference papers
hal-01408512v1
|
||
|
ARENA - Dynamic Run-Time Map Generation for Multiplayer Shooters13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.149-158, ⟨10.1007/978-3-662-45212-7_19⟩
Conference papers
hal-01408516v1
|
||
|
Analyzing Stakeholders in Complex E-Government Projects: Towards a Stakeholder Interaction Model13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.194-205, ⟨10.1007/978-3-662-44426-9_16⟩
Conference papers
hal-01401741v1
|
||
|
TOSCA in a Nutshell: Promises and Perspectives3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.171-186, ⟨10.1007/978-3-662-44879-3_13⟩
Conference papers
hal-01318292v1
|
||
|
A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven EngineeringInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.79-93, ⟨10.1007/978-3-319-10975-6_6⟩
Conference papers
hal-01403987v1
|
||
|
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.592-601, ⟨10.1007/978-3-662-45237-0_54⟩
Conference papers
hal-01405654v1
|
||
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
Tropical Two-Way Automata8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.195-206, ⟨10.1007/978-3-662-44602-7_16⟩
Conference papers
hal-01069637v1
|
||
|
Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.397-408, ⟨10.1007/978-3-662-45237-0_37⟩
Conference papers
hal-01405612v1
|
||
|
LDFGB Algorithm for Anomaly Intrusion Detection2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.396-404, ⟨10.1007/978-3-642-55032-4_39⟩
Conference papers
hal-01397240v1
|
||
|
Assets Dependencies Model in Information Security Risk Management2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers
hal-01397241v1
|
||
|
Security Assessment of Computer Networks Based on Attack Graphs and Security Events2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.462-471, ⟨10.1007/978-3-642-55032-4_47⟩
Conference papers
hal-01397255v1
|
||
|
Inline Data Integrity Signals for Passive Measurement6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.15-25, ⟨10.1007/978-3-642-54999-1_2⟩
Conference papers
hal-01396468v1
|
||
|
Knowledge Management: Organization Culture in Healthcare Indonesia2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.108-118, ⟨10.1007/978-3-642-55032-4_11⟩
Conference papers
hal-01397152v1
|
||
|
Effectiveness for Input Output Conformance Simulation iocos̱34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.100-116, ⟨10.1007/978-3-662-43613-4_7⟩
Conference papers
hal-01398009v1
|
||
|
A Framework for Genetic Test-Case Generation for WS-BPEL Compositions26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.1-16, ⟨10.1007/978-3-662-44857-1_1⟩
Conference papers
hal-01405261v1
|
||
|
Metrics for Differential Privacy in Concurrent Systems34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers
hal-00879140v2
|
||
|
Progress as Compositional Lock-Freedom16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.49-64, ⟨10.1007/978-3-662-43376-8_4⟩
Conference papers
hal-01290067v1
|
||
|
Designing a Second Generation of Open Data Platforms: Integrating Open Data and Social Media13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.230-241, ⟨10.1007/978-3-662-44426-9_19⟩
Conference papers
hal-01401747v1
|
||
|
Source and Channel Choices in Business-to-Government Service Interactions: A Vignette Study13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.120-132, ⟨10.1007/978-3-662-44426-9_10⟩
Conference papers
hal-01401732v1
|
||
|
Using Drones for Virtual Tourism13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.238-240, ⟨10.1007/978-3-662-45212-7_34⟩
Conference papers
hal-01408561v1
|
||
|
Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.104-118, ⟨10.1007/978-3-662-43352-2_9⟩
Conference papers
hal-01287735v1
|
||
|
Multi-agent Systems Design and Prototyping with Bigraphical Reactive Systems4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.201-208, ⟨10.1007/978-3-662-43352-2_16⟩
Conference papers
hal-01287744v1
|
||
|
On the Modelling of the Computer Security Impact on the Reputation Systems2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.526-531, ⟨10.1007/978-3-642-55032-4_54⟩
Conference papers
hal-01397344v1
|