Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

AUTSEG: Automatic Test Set Generator for Embedded Reactive Systems

Mariem Abdelmoula , Daniel Gaffé , Michel Auguin
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.97-112, ⟨10.1007/978-3-662-44857-1_7⟩
Conference papers hal-01069101v1
Image document

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Aude Plateaux , Patrick Lacharme , Christophe Rosenberger , Audun Jøsang
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.179-193, ⟨10.1007/978-3-319-10975-6_14⟩
Conference papers hal-01076676v1
Image document

Looking at Separation Algebras with Boolean BI-eyes

Dominique Larchey-Wendling , Didier Galmiche
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp. 326-340, ⟨10.1007/978-3-662-44602-7_25⟩
Conference papers hal-01256804v1
Image document

Behave: Behavioral Cache for Web Content

Davide Frey , Mathieu Goessens , Anne-Marie Kermarrec
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.89-103, ⟨10.1007/978-3-662-43352-2_8⟩
Conference papers hal-01079976v1
Image document

Characterizing Bufferbloat and its Impact at End-hosts

Stephane Wustner , Renata Teixeira , Jaideep Chandrashekar
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.51-64, ⟨10.1007/978-3-642-54999-1_5⟩
Conference papers hal-01097476v1
Image document

Efficient and Generalized Decentralized Monitoring of Regular Languages

Yliès Falcone , Tom Cornebize , Jean-Claude Fernandez
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.66-83, ⟨10.1007/978-3-662-43613-4_5⟩
Conference papers hal-00972559v1
Image document

Using Drones for Virtual Tourism

David Mirk , Helmut Hlavacs
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.238-240, ⟨10.1007/978-3-662-45212-7_34⟩
Conference papers hal-01408561v1
Image document

Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

Kent Fagerland Simonsen , Lars Michael Kristensen
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.104-118, ⟨10.1007/978-3-662-43352-2_9⟩
Conference papers hal-01287735v1
Image document

Multi-agent Systems Design and Prototyping with Bigraphical Reactive Systems

Alessio Mansutti , Marino Miculan , Marco Peressotti
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.201-208, ⟨10.1007/978-3-662-43352-2_16⟩
Conference papers hal-01287744v1
Image document

On the Modelling of the Computer Security Impact on the Reputation Systems

Bogdan Ksiezopolski , Adam Wierzbicki , Damian Rusinek
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.526-531, ⟨10.1007/978-3-642-55032-4_54⟩
Conference papers hal-01397344v1
Image document

Schema Reconstruction in Database Forensics

Oluwasola Mary Adedayo , Martin Olivier
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.101-116, ⟨10.1007/978-3-662-44952-3_8⟩
Conference papers hal-01393764v1
Image document

Smartphone Message Sentiment Analysis

Panagiotis Andriotis , Atsuhiro Takasu , Theo Tryfonas
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.253-265, ⟨10.1007/978-3-662-44952-3_17⟩
Conference papers hal-01393775v1
Image document

Conceptualising Trust in E-Participation Contexts

Sabrina Scherer , Maria A. Wimmer
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.64-77, ⟨10.1007/978-3-662-44914-1_6⟩
Conference papers hal-01396954v1
Image document

New Ways of Deliberating Online: An Empirical Comparison of Network and Threaded Interfaces for Online Discussion

Anna De Liddo , Simon Buckingham Shum
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.90-101, ⟨10.1007/978-3-662-44914-1_8⟩
Conference papers hal-01396957v1
Image document

Engaging Citizens in Policy Issues: Multidimensional Approach, Evidence and Lessons Learned

Elena Sánchez-Nielsen , Deirdre Lee , Eleni Panopoulou , Simon Delakorda , Gyula Takács
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.102-113, ⟨10.1007/978-3-662-44914-1_9⟩
Conference papers hal-01396964v1
Image document

Formalizing Information Flow Control in a Model-Driven Approach

Kurt Stenzel , Kuzman Katkalov , Marian Borek , Wolfgang Reif
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.456-461, ⟨10.1007/978-3-642-55032-4_46⟩
Conference papers hal-01397341v1
Image document

Enhancing the Use of Digital Model with Team-Based Learning Approach in Science Teaching

Bens Pardamean , Teddy Suparyanto , . Suyanta , Eryadi Masli , Jerome Donovan
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.267-276, ⟨10.1007/978-3-642-55032-4_26⟩
Conference papers hal-01397217v1
Image document

Aggregation of Network Protocol Data Near Its Source

Marcel Fourné , Kevin Stegemann , Dominique Petersen , Norbert Pohlmann
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.482-491, ⟨10.1007/978-3-642-55032-4_49⟩
Conference papers hal-01397258v1
Image document

High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods

Cheng-Hsing Yang , Kuan-Liang Liu , Chun-Hao Chang , Yi-Jhong Jhang
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.622-632, ⟨10.1007/978-3-642-55032-4_64⟩
Conference papers hal-01397279v1
Image document

Generic Partition Refinement Algorithms for Coalgebras and an Instantiation to Weighted Automata

Barbara König , Sebastian Küpper
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.311-325, ⟨10.1007/978-3-662-44602-7_24⟩
Conference papers hal-01402080v1
Image document

Group Participation Game Strategy for Resource Allocation in Cloud Computing

Weifeng Sun , Danchuang Zhang , Ning Zhang , Qingqing Zhang , Tie Qiu
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.294-305, ⟨10.1007/978-3-662-44917-2_25⟩
Conference papers hal-01403096v1
Image document

Generic Weakest Precondition Semantics from Monads Enriched with Order

Ichiro Hasuo
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS 2014), Apr 2014, Grenoble, France. pp.10-32, ⟨10.1007/978-3-662-44124-4_2⟩
Conference papers hal-01408750v1
Image document

Sensitivity, Block Sensitivity, and Certificate Complexity of Unate Functions and Read-Once Functions

Hiroki Morizumi
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.104-110, ⟨10.1007/978-3-662-44602-7_9⟩
Conference papers hal-01402033v1
Image document

Lookahead-Based Approaches for Minimizing Adaptive Distinguishing Sequences

Uraz Cengiz Türker , Tonguç Ünlüyurt , Hüsnü Yenigün
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.32-47, ⟨10.1007/978-3-662-44857-1_3⟩
Conference papers hal-01405273v1
Image document

Performance Prediction Model and Analysis for Compute-Intensive Tasks on GPUs

Khondker S. Hasan , Amlan Chatterjee , Sridhar Radhakrishnan , John K. Antonio
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.612-617, ⟨10.1007/978-3-662-44917-2_65⟩
Conference papers hal-01403164v1
Image document

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption

Bernd Zwattendorfer , Daniel Slamanig , Klaus Stranacher , Felix Hörandner
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.92-103, ⟨10.1007/978-3-662-44885-4_8⟩
Conference papers hal-01404190v1
Image document

Using Model Driven Security Approaches in Web Application Development

Christoph Hochreiner , Zhendong Ma , Peter Kieseberg , Sebastian Schrittwieser , Edgar Weippl
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers hal-01397248v1
Image document

Spheres and Lenses: Activity-Based Scenario / Narrative Approach for Design and Evaluation of Entertainment through Engagement

Tim Marsh , Bonnie Nardi
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.42-51, ⟨10.1007/978-3-662-45212-7_6⟩
Conference papers hal-01408503v1
Image document

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu , Lingyu Wang
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers hal-01284854v1
Image document

Policy, Process, People and Public Data

Ann-Sofie Hellberg
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.265-276, ⟨10.1007/978-3-662-44426-9_22⟩
Conference papers hal-01401750v1