Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

Control Protocol and Self-adaptive Mechanism for Live Virtual Machine Migration over XIA

Dalu Zhang , Xiang Jin , Dejiang Zhou , Jianpeng Wang , Jiaqi Zhu
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.357-368, ⟨10.1007/978-3-662-44917-2_30⟩
Conference papers hal-01403105v1
Image document

Towards an Evaluation Model for Open Government: A Preliminary Proposal

Rodrigo Sandoval-Almazan , J. Ramon Gil-Garcia
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.47-58, ⟨10.1007/978-3-662-44426-9_4⟩
Conference papers hal-01401724v1
Image document

Gamicards - An Alternative Method for Paper-Prototyping the Design of Gamified Systems

Lauren S. Ferro , Steffen P. Walz , Stefan Greuter
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.11-18, ⟨10.1007/978-3-662-45212-7_2⟩
Conference papers hal-01408499v1
Image document

Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem

Akihiro Yamamura
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.554-563, ⟨10.1007/978-3-642-55032-4_57⟩
Conference papers hal-01397269v1
Image document

Capturing Bisimulation-Invariant Complexity Classes with Higher-Order Modal Fixpoint Logic

Martin Lange , Etienne Lozes
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.90-103, ⟨10.1007/978-3-662-44602-7_8⟩
Conference papers hal-01402031v1
Image document

Attribute-Aware Relationship-Based Access Control for Online Social Networks

Yuan Cheng , Jaehong Park , Ravi Sandhu
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.292-306, ⟨10.1007/978-3-662-43936-4_19⟩
Conference papers hal-01284863v1
Image document

Adaptive Decision Making in Microsimulations of Urban Traffic in Virtual Environments

Fabian Krueger , Sven Seele , Rainer Herpers , Peter Becker , Christian Bauckhage
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.220-222, ⟨10.1007/978-3-662-45212-7_28⟩
Conference papers hal-01408552v1
Image document

LPM: Layered Policy Management for Software-Defined Networks

Wonkyu Han , Hongxin Hu , Gail-Joon Ahn
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.356-363, ⟨10.1007/978-3-662-43936-4_23⟩
Conference papers hal-01284871v1
Image document

Cooperation across Multiple Healthcare Clinics on the Cloud

Neil Donnelly , Kate Irving , Mark Roantree
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.82-88, ⟨10.1007/978-3-662-43352-2_7⟩
Conference papers hal-01287734v1
Image document

Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider

André Zúquete , Hélder Gomes , Cláudio Teixeira
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.160-169, ⟨10.1007/978-3-662-43826-8_12⟩
Conference papers hal-01400938v1
Image document

Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials

David Derler , Christian Hanser , Daniel Slamanig
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers hal-01284842v1
Image document

Message Passing Algorithm for the Generalized Assignment Problem

Mindi Yuan , Chong Jiang , Shen Li , Wei Shen , Yannis Pavlidis , et al.
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.423-434, ⟨10.1007/978-3-662-44917-2_35⟩
Conference papers hal-01403111v1
Image document

Toward a Data-Driven Performance-Guided Urban Decision-Support Environment

Neda Ghiassi , Stefan Glawischnig , Ulrich Pont , Ardeshir Mahdavi
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.96-107, ⟨10.1007/978-3-642-55032-4_10⟩
Conference papers hal-01397149v1
Image document

A Calculus of Self-stabilising Computational Fields

Mirko Viroli , Ferruccio Damiani
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.163-178, ⟨10.1007/978-3-662-43376-8_11⟩
Conference papers hal-01290075v1
Image document

A Tool for Evaluating, Adapting and Extending Game Progression Planning for Diverse Game Genres

Katharine Neil , Denise De Vries , Stéphane Natkin
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.60-65, ⟨10.1007/978-3-662-45212-7_8⟩
Conference papers hal-01408505v1
Image document

LDFGB Algorithm for Anomaly Intrusion Detection

Shang-Nan Yin , Zhi-Guo Chen , Sung-Ryul Kim
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.396-404, ⟨10.1007/978-3-642-55032-4_39⟩
Conference papers hal-01397240v1
Image document

Assets Dependencies Model in Information Security Risk Management

Jakub Breier , Frank Schindler
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers hal-01397241v1
Image document

Security Assessment of Computer Networks Based on Attack Graphs and Security Events

Igor Kotenko , Elena Doynikova
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.462-471, ⟨10.1007/978-3-642-55032-4_47⟩
Conference papers hal-01397255v1
Image document

Inline Data Integrity Signals for Passive Measurement

Brian Trammell , David Gugelmann , Nevil Brownlee
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.15-25, ⟨10.1007/978-3-642-54999-1_2⟩
Conference papers hal-01396468v1
Image document

Knowledge Management: Organization Culture in Healthcare Indonesia

Dana Indra Sensuse , Yudho Giri Sucahyo , Siti Rohajawati , Haya Rizqi , Pinkie Anggia
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.108-118, ⟨10.1007/978-3-642-55032-4_11⟩
Conference papers hal-01397152v1
Image document

Effectiveness for Input Output Conformance Simulation iocos̱

Carlos Gregorio-Rodríguez , Luis Llana , Rafael Martínez-Torres
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.100-116, ⟨10.1007/978-3-662-43613-4_7⟩
Conference papers hal-01398009v1
Image document

A Framework for Genetic Test-Case Generation for WS-BPEL Compositions

Antonia Estero-Botaro , Antonio García-Domínguez , Juan José Domínguez-Jiménez , Francisco Palomo-Lozano , Inmaculada Medina-Bulo
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.1-16, ⟨10.1007/978-3-662-44857-1_1⟩
Conference papers hal-01405261v1
Image document

Randomly Partitioned Encryption for Cloud Databases

Tahmineh Sanamrad , Lucas Braun , Donald Kossmann , Ramarathnam Venkatesan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.307-323, ⟨10.1007/978-3-662-43936-4_20⟩
Conference papers hal-01284865v1
Image document

On Minimizing the Size of Encrypted Databases

Giovanni Di Crescenzo , David Shallcross
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.364-372, ⟨10.1007/978-3-662-43936-4_24⟩
Conference papers hal-01284872v1
Image document

Encoding Synchronous Interactions Using Labelled Petri Nets

Paolo Baldan , Filippo Bonchi , Fabio Gadducci , Giacoma V. Monreale
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.1-16, ⟨10.1007/978-3-662-43376-8_1⟩
Conference papers hal-01290063v1
Image document

The Stochastic Quality Calculus

Kebin Zeng , Flemming Nielson , Hanne Riis Nielson
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.179-193, ⟨10.1007/978-3-662-43376-8_12⟩
Conference papers hal-01290076v1
Image document

Change Detection System for the Maintenance of Automated Testing

Miroslav Bures
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.192-197, ⟨10.1007/978-3-662-44857-1_15⟩
Conference papers hal-01405287v1
Image document

Threshold Based Auto Scaling of Virtual Machines in Cloud Environment

M. K. Mohan Murthy , H. A. Sanjay , Jumnal Anand
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.247-256, ⟨10.1007/978-3-662-44917-2_21⟩
Conference papers hal-01403090v1
Image document

Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid

Minhwan Ok
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.591-594, ⟨10.1007/978-3-662-44917-2_60⟩
Conference papers hal-01403156v1
Image document

DLBer: A Dynamic Load Balancing Algorithm for the Event-Driven Clusters

Mingming Sun , Changlong Li , Xuehai Zhou , Kun Lu , Hang Zhuang
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.608-611, ⟨10.1007/978-3-662-44917-2_64⟩
Conference papers hal-01403163v1