Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid

Minhwan Ok
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.591-594, ⟨10.1007/978-3-662-44917-2_60⟩
Conference papers hal-01403156v1
Image document

DLBer: A Dynamic Load Balancing Algorithm for the Event-Driven Clusters

Mingming Sun , Changlong Li , Xuehai Zhou , Kun Lu , Hang Zhuang
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.608-611, ⟨10.1007/978-3-662-44917-2_64⟩
Conference papers hal-01403163v1
Image document

Aspects of Human-Centred Design in HCI with Older Adults: Experiences from the Field

Ana De Barros , Sílvia Rêgo , João Antunes
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.235-242, ⟨10.1007/978-3-662-44811-3_14⟩
Conference papers hal-01405079v1
Image document

User Centered Inclusive Design for People with Dyslexia: Experiences from a Project on Accessibility

Dominik Rupprecht , Rainer Blum , Birgit Bomsdorf
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.307-314, ⟨10.1007/978-3-662-44811-3_23⟩
Conference papers hal-01405091v1
Image document

Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices

Vasily Desnitsky , Igor Kotenko
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.194-210, ⟨10.1007/978-3-319-10975-6_15⟩
Conference papers hal-01403995v1
Image document

PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions

Shinsaku Kiyomoto , Yutaka Miyake
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.211-225, ⟨10.1007/978-3-319-10975-6_16⟩
Conference papers hal-01403997v1
Image document

Developing Emergent Play in Collaborative Online Experiences

Damian Hills
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.117-124, ⟨10.1007/978-3-662-45212-7_15⟩
Conference papers hal-01408512v1
Image document

ARENA - Dynamic Run-Time Map Generation for Multiplayer Shooters

Anand Bhojan , Hong Wei Wong
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.149-158, ⟨10.1007/978-3-662-45212-7_19⟩
Conference papers hal-01408516v1
Image document

Analyzing Stakeholders in Complex E-Government Projects: Towards a Stakeholder Interaction Model

Vanessa Greger , Dian Balta , Petra Wolf , Helmut Krcmar
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.194-205, ⟨10.1007/978-3-662-44426-9_16⟩
Conference papers hal-01401741v1
Image document

TOSCA in a Nutshell: Promises and Perspectives

Antonio Brogi , Jacopo Soldani , Pengwei Wang
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.171-186, ⟨10.1007/978-3-662-44879-3_13⟩
Conference papers hal-01318292v1
Image document

A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering

Denisse Muñante , Vanea Chiprianov , Laurent Gallon , Philippe Aniorte
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.79-93, ⟨10.1007/978-3-319-10975-6_6⟩
Conference papers hal-01403987v1
Image document

An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature

Puchong Subpratatsavee , Pramote Kuacharoen
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.592-601, ⟨10.1007/978-3-662-45237-0_54⟩
Conference papers hal-01405654v1
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1
Image document

Tropical Two-Way Automata

Vincent Carnino , Sylvain Lombardy
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.195-206, ⟨10.1007/978-3-662-44602-7_16⟩
Conference papers hal-01069637v1
Image document

Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling

Wladyslaw Homenda , Agnieszka Jastrzebska , Witold Pedrycz
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.397-408, ⟨10.1007/978-3-662-45237-0_37⟩
Conference papers hal-01405612v1
Image document

LDFGB Algorithm for Anomaly Intrusion Detection

Shang-Nan Yin , Zhi-Guo Chen , Sung-Ryul Kim
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.396-404, ⟨10.1007/978-3-642-55032-4_39⟩
Conference papers hal-01397240v1
Image document

Assets Dependencies Model in Information Security Risk Management

Jakub Breier , Frank Schindler
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers hal-01397241v1
Image document

Security Assessment of Computer Networks Based on Attack Graphs and Security Events

Igor Kotenko , Elena Doynikova
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.462-471, ⟨10.1007/978-3-642-55032-4_47⟩
Conference papers hal-01397255v1
Image document

Inline Data Integrity Signals for Passive Measurement

Brian Trammell , David Gugelmann , Nevil Brownlee
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.15-25, ⟨10.1007/978-3-642-54999-1_2⟩
Conference papers hal-01396468v1
Image document

Knowledge Management: Organization Culture in Healthcare Indonesia

Dana Indra Sensuse , Yudho Giri Sucahyo , Siti Rohajawati , Haya Rizqi , Pinkie Anggia
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.108-118, ⟨10.1007/978-3-642-55032-4_11⟩
Conference papers hal-01397152v1
Image document

Effectiveness for Input Output Conformance Simulation iocos̱

Carlos Gregorio-Rodríguez , Luis Llana , Rafael Martínez-Torres
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.100-116, ⟨10.1007/978-3-662-43613-4_7⟩
Conference papers hal-01398009v1
Image document

A Framework for Genetic Test-Case Generation for WS-BPEL Compositions

Antonia Estero-Botaro , Antonio García-Domínguez , Juan José Domínguez-Jiménez , Francisco Palomo-Lozano , Inmaculada Medina-Bulo
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.1-16, ⟨10.1007/978-3-662-44857-1_1⟩
Conference papers hal-01405261v1
Image document

Metrics for Differential Privacy in Concurrent Systems

Lili Xu , Konstantinos Chatzikokolakis , Huimin Lin
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers hal-00879140v2
Image document

Progress as Compositional Lock-Freedom

Marco Carbone , Ornela Dardha , Fabrizio Montesi
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.49-64, ⟨10.1007/978-3-662-43376-8_4⟩
Conference papers hal-01290067v1
Image document

Designing a Second Generation of Open Data Platforms: Integrating Open Data and Social Media

Charalampos Alexopoulos , Anneke Zuiderwijk , Yannis Charapabidis , Euripidis Loukis , Marijn Janssen
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.230-241, ⟨10.1007/978-3-662-44426-9_19⟩
Conference papers hal-01401747v1
Image document

Source and Channel Choices in Business-to-Government Service Interactions: A Vignette Study

Yvon van Den Boer , Willem Pieterson , Rex Arendsen , Manon De Groot
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.120-132, ⟨10.1007/978-3-662-44426-9_10⟩
Conference papers hal-01401732v1
Image document

Using Drones for Virtual Tourism

David Mirk , Helmut Hlavacs
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.238-240, ⟨10.1007/978-3-662-45212-7_34⟩
Conference papers hal-01408561v1
Image document

Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

Kent Fagerland Simonsen , Lars Michael Kristensen
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.104-118, ⟨10.1007/978-3-662-43352-2_9⟩
Conference papers hal-01287735v1
Image document

Multi-agent Systems Design and Prototyping with Bigraphical Reactive Systems

Alessio Mansutti , Marino Miculan , Marco Peressotti
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.201-208, ⟨10.1007/978-3-662-43352-2_16⟩
Conference papers hal-01287744v1
Image document

On the Modelling of the Computer Security Impact on the Reputation Systems

Bogdan Ksiezopolski , Adam Wierzbicki , Damian Rusinek
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.526-531, ⟨10.1007/978-3-642-55032-4_54⟩
Conference papers hal-01397344v1