Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

Zero-Suppressed Binary Decision Diagrams Resilient to Index Faults

Anna Bernasconi , Valentina Ciriani
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.1-12, ⟨10.1007/978-3-662-44602-7_1⟩
Conference papers hal-01402013v1
Image document

Workflow Patterns as a Means to Model Task Succession in Games: A Preliminary Case Study

Simone Kriglstein , Ross Brown , Günter Wallner
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.36-41, ⟨10.1007/978-3-662-45212-7_5⟩
Conference papers hal-01408502v1
Image document

Wire Length of Midimew-Connected Mesh Network

Md Rabiul Awal , M. Hafizur Rahman , Rizal Mohd Nor , Tengku Tengku Sembok , Yasuyuki Miura , et al.
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.132-143, ⟨10.1007/978-3-662-44917-2_12⟩
Conference papers hal-01403074v1
Image document

Windows Event Forensic Process

Quang Do , Ben Martini , Jonathan Looi , Yu Wang , Kim-Kwang Choo
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.87-100, ⟨10.1007/978-3-662-44952-3_7⟩
Conference papers hal-01393763v1
Image document

Windows Azure: Resource Organization Performance Analysis

Marjan Gusev , Sasko Ristov , Bojana Koteska , Goran Velkoski
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.17-31, ⟨10.1007/978-3-662-44879-3_2⟩
Conference papers hal-01318269v1
Image document

Who, When, and Where? Location Proof Assertion for Mobile Devices

Rasib Khan , Shams Zawoad , Md Munirul Haque , Ragib Hasan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.146-162, ⟨10.1007/978-3-662-43936-4_10⟩
Conference papers hal-01285030v1
Image document

What Characterizes a Good Software Tester? – A Survey in Four Norwegian Companies

Anca Deak
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.161-172, ⟨10.1007/978-3-662-44857-1_11⟩
Conference papers hal-01405283v1
Image document

Well-Defined Coverage Metrics for the Glass Box Test

Rainer Schmidberger
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.113-128, ⟨10.1007/978-3-662-44857-1_8⟩
Conference papers hal-01405278v1
Image document

Web User Profiling Based on Browsing Behavior Analysis

Xiao-Xi Fan , Kam-Pui Chow , Fei Xu
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.57-71, ⟨10.1007/978-3-662-44952-3_5⟩
Conference papers hal-01393760v1
Image document

Weaving Aspects and Business Processes through Model Transformation

Heiko Witteborg , Anis Charfi , Daniel Colomer Collell , Mira Mezini
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.47-61, ⟨10.1007/978-3-662-44879-3_4⟩
Conference papers hal-01318272v1
Image document

Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services

Evgenia Novikova , Igor Kotenko
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.63-78, ⟨10.1007/978-3-319-10975-6_5⟩
Conference papers hal-01403986v1
Image document

Vietnamese Sentence Similarity Based on Concepts

Hien T. Nguyen , Phuc H. Duong , Vinh T. Vo
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.243-253, ⟨10.1007/978-3-662-45237-0_24⟩
Conference papers hal-01405592v1
Image document

viaRODOS: Monitoring and Visualisation of Current Traffic Situation on Highways

Dušan Fedorčák , Tomáš Kocyan , Martin Hájek , Daniela Szturcová , Jan Martinovič
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.290-300, ⟨10.1007/978-3-662-45237-0_28⟩
Conference papers hal-01405599v1
Image document

Verifying Security Policies Using Host Attributes

Cornelius Diekmann , Stephan-A. Posselt , Heiko Niedermayer , Holger Kinkelin , Oliver Hanka , et al.
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers hal-01398013v1
Image document

Verifiable Decisions in Autonomous Concurrent Systems

Lenz Belzner
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.17-32, ⟨10.1007/978-3-662-43376-8_2⟩
Conference papers hal-01290065v1
Image document

Validation Rules for Enhanced Foxy P2P Network Investigations

Ricci Ieong , Kam-Pui Chow
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73-83, ⟨10.1007/978-3-662-44952-3_6⟩
Conference papers hal-01393761v1
Image document

Using Model Driven Security Approaches in Web Application Development

Christoph Hochreiner , Zhendong Ma , Peter Kieseberg , Sebastian Schrittwieser , Edgar Weippl
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, ⟨10.1007/978-3-642-55032-4_42⟩
Conference papers hal-01397248v1
Image document

Using Fraud Trees to Analyze Internet Credit Card Fraud

Clive Blackwell
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.17-29, ⟨10.1007/978-3-662-44952-3_2⟩
Conference papers hal-01393755v1
Image document

Using Drones for Virtual Tourism

David Mirk , Helmut Hlavacs
13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.238-240, ⟨10.1007/978-3-662-45212-7_34⟩
Conference papers hal-01408561v1
Image document

Using Approximate Matching to Reduce the Volume of Digital Data

Frank Breitinger , Christian Winter , York Yannikos , Tobias Fink , Michael Seefried
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers hal-01393769v1
Image document

User Centered Inclusive Design for People with Dyslexia: Experiences from a Project on Accessibility

Dominik Rupprecht , Rainer Blum , Birgit Bomsdorf
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.307-314, ⟨10.1007/978-3-662-44811-3_23⟩
Conference papers hal-01405091v1
Image document

USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizations

André Pereira , Manuel Correia , Pedro Brandão
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.19-32, ⟨10.1007/978-3-662-44885-4_2⟩
Conference papers hal-01404182v1
Image document

Usage-Based Automatic Detection of Usability Smells

Patrick Harms , Jens Grabowski
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.217-234, ⟨10.1007/978-3-662-44811-3_13⟩
Conference papers hal-01405078v1
Image document

Usable Privacy for Mobile Sensing Applications

Delphine Christin , Franziska Engelmann , Matthias Hollick
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.92-107, ⟨10.1007/978-3-662-43826-8_7⟩
Conference papers hal-01400922v1
Image document

Usability of Single- and Multi-factor Authentication Methods on Tabletops: A Comparative Study

Anders Bruun , Kenneth Jensen , Dianna Kristensen
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.299-306, ⟨10.1007/978-3-662-44811-3_22⟩
Conference papers hal-01405090v1
Image document

Usability Engineering in the Wild: How Do Practitioners Integrate Usability Engineering in Software Development?

Nis Bornoe , Jan Stage
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.199-216, ⟨10.1007/978-3-662-44811-3_12⟩
Conference papers hal-01405077v1
Image document

Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts — Case Study on Low Cost Smart Solution

Jan Dvorak , Ondrej Berger , Ondrej Krejcar
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.479-488, ⟨10.1007/978-3-662-45237-0_44⟩
Conference papers hal-01405631v1
Image document

Uniform Protection for Multi-exposed Targets

Roberto Vigo , Flemming Nielson , Hanne Riis Nielson
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.182-198, ⟨10.1007/978-3-662-43613-4_12⟩
Conference papers hal-01398016v1
Image document

Understanding eParticipation Services in Indonesian Local Government

Fathul Wahid , Øystein Sæbø
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.328-337, ⟨10.1007/978-3-642-55032-4_32⟩
Conference papers hal-01397229v1
Image document

Understanding End-User Development of Context-Dependent Applications in Smartphones

Gabriella Lucci , Fabio Paternò
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.182-198, ⟨10.1007/978-3-662-44811-3_11⟩
Conference papers hal-01405076v1