Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

How People Really (Like To) Work

Wil van Der Aalst
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.317-321, ⟨10.1007/978-3-662-44811-3_25⟩
Conference papers hal-01405093v1
Image document

Resource Prediction for Inter-cloud Broker

Mohammad Aazam , Eui-Nam Huh
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.559-562, ⟨10.1007/978-3-662-44917-2_52⟩
Conference papers hal-01403142v1
Image document

AUTSEG: Automatic Test Set Generator for Embedded Reactive Systems

Mariem Abdelmoula , Daniel Gaffé , Michel Auguin
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.97-112, ⟨10.1007/978-3-662-44857-1_7⟩
Conference papers hal-01069101v1
Image document

The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy

Juneman Abraham , Murty Magda Pane
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.492-499, ⟨10.1007/978-3-642-55032-4_50⟩
Conference papers hal-01397263v1
Image document

Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol

Rima Addas , Ning Zhang
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.500-510, ⟨10.1007/978-3-642-55032-4_51⟩
Conference papers hal-01397342v1
Image document

Schema Reconstruction in Database Forensics

Oluwasola Mary Adedayo , Martin Olivier
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.101-116, ⟨10.1007/978-3-662-44952-3_8⟩
Conference papers hal-01393764v1
Image document

End-to-End Secure and Privacy Preserving Mobile Chat Application

Raja Naeem Akram , Ryan L. Ko
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.124-139, ⟨10.1007/978-3-662-43826-8_9⟩
Conference papers hal-01400931v1
Image document

Malicious MPLS Policy Engine Reconnaissance

Abdulrahman Al-Mutairi , Stephen Wolthusen
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.3-18, ⟨10.1007/978-3-662-44885-4_1⟩
Conference papers hal-01404180v1
Image document

Trees of Tales: A Playful Reading Application for Arabic Children

Fatma Alaamri , Stefan Greuter , Steffen P. Walz
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.3-10, ⟨10.1007/978-3-662-45212-7_1⟩
Conference papers hal-01408498v1
Image document

Identifying a Public Sector Information Systems (PSIS) for E-service: A Case of Land Records E-service in Bangladesh

Muhammad Shahanoor Alam , Laurence Brooks
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.106-119, ⟨10.1007/978-3-662-44426-9_9⟩
Conference papers hal-01401731v1
Image document

Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

Suaad Alarifi , Stephen Wolthusen
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.73-85, ⟨10.1007/978-3-662-44885-4_6⟩
Conference papers hal-01404188v1
Image document

Open Government Data: Facilitating and Motivating Factors for Coping with Potential Barriers in the Brazilian Context

Claudio Sonaglio Albano , Nicolau Reinhard
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.181-193, ⟨10.1007/978-3-662-44426-9_15⟩
Conference papers hal-01401740v1
Image document

Actor- and Task-Selection Strategies for Pruning Redundant State-Exploration in Testing

Elvira Albert , Puri Arenas , Miguel Gómez-Zamalloa
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.49-65, ⟨10.1007/978-3-662-43613-4_4⟩
Conference papers hal-01398008v1
Image document

Towards Developing Secure Software Using Problem-Oriented Security Patterns

Azadeh Alebrahim , Maritta Heisel
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.45-62, ⟨10.1007/978-3-319-10975-6_4⟩
Conference papers hal-01403985v1
Image document

Designing a Second Generation of Open Data Platforms: Integrating Open Data and Social Media

Charalampos Alexopoulos , Anneke Zuiderwijk , Yannis Charapabidis , Euripidis Loukis , Marijn Janssen
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.230-241, ⟨10.1007/978-3-662-44426-9_19⟩
Conference papers hal-01401747v1
Image document

Interdomain Traffic Engineering Techniques to Overcome Undesirable Connectivity Incidents

Amer Alghadhban , Ashraf Mahmoud , Marwan Abu-Amara , Farag Azzedin , Mohammed H. Sqalli
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.618-622, ⟨10.1007/978-3-662-44917-2_66⟩
Conference papers hal-01403165v1
Image document

Evaluating Normalization Functions with Search Algorithms for Solving OCL Constraints

Shaukat Ali , Tao Yue
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.17-31, ⟨10.1007/978-3-662-44857-1_2⟩
Conference papers hal-01405272v1
Image document

Scalable and Accurate Causality Tracking for Eventually Consistent Stores

Paulo Sérgio Almeida , Carlos Baquero , Ricardo Gonçalves , Nuno Preguiça , Victor Fonte
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.67-81, ⟨10.1007/978-3-662-43352-2_6⟩
Conference papers hal-01287733v1
Image document

Dynamic Interaction Plugins Deployment in Ambient Spaces

Bashar Altakrouri , Andreas Schrader
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.73-89, ⟨10.1007/978-3-662-44811-3_5⟩
Conference papers hal-01405066v1
Image document

A Focused Review and Initial Conceptual Design for Merging Exergame and Activity Monitoring Technologies

Reem Altamimi , Geoff Skinner , Keith Nesbitt
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.77-83, ⟨10.1007/978-3-662-45212-7_10⟩
Conference papers hal-01408507v1
Image document

CloudDSF – The Cloud Decision Support Framework for Application Migration

Vasilios Andrikopoulos , Alexander Darsow , Dimka Karastoyanova , Frank Leymann
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.1-16, ⟨10.1007/978-3-662-44879-3_1⟩
Conference papers hal-01318236v1
Image document

A GENTL Approach for Cloud Application Topologies

Vasilios Andrikopoulos , Anja Reuter , Santiago Gómez Sáez , Frank Leymann
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.148-159, ⟨10.1007/978-3-662-44879-3_11⟩
Conference papers hal-01318283v1
Image document

Smartphone Message Sentiment Analysis

Panagiotis Andriotis , Atsuhiro Takasu , Theo Tryfonas
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.253-265, ⟨10.1007/978-3-662-44952-3_17⟩
Conference papers hal-01393775v1
Image document

Scalable High Resolution Traffic Heatmaps: Coherent Queue Visualization for Datacenters

Andreea Anghel , Robert Birke , Mitch Gusat
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.26-37, ⟨10.1007/978-3-642-54999-1_3⟩
Conference papers hal-01396469v1
Image document

Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems

Muhammad Waseem Anwar , Farooque Azam
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.351-362, ⟨10.1007/978-3-662-45237-0_33⟩
Conference papers hal-01405605v1
Image document

Categorization of Brazilian Internet Users and Its Impacts on the Use of Electronic Government Services

Marcelo De Araujo , Nicolau Reinhard
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.242-252, ⟨10.1007/978-3-662-44426-9_20⟩
Conference papers hal-01401748v1
Image document

A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters

Vikas G. Ashok , Ravi Mukkamala
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.382-389, ⟨10.1007/978-3-662-43936-4_26⟩
Conference papers hal-01284874v1
Image document

Semantic Versioning of In-Process Scientific Document

Imran Asif , M. Shuaib Karim
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.119-128, ⟨10.1007/978-3-642-55032-4_12⟩
Conference papers hal-01397155v1
Image document

Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions

Dariusz Rafal Augustyn
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.151-164, ⟨10.1007/978-3-662-45237-0_16⟩
Conference papers hal-01405574v1
Image document

GreenBrowsing: Towards Energy Efficiency in Browsing Experience

Gonçalo Avelar , Luís Veiga
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.119-125, ⟨10.1007/978-3-662-43352-2_10⟩
Conference papers hal-01287736v1