Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

549 results
Deposit type : Fulltext
Image document

Ball Distance Estimation and Tracking System of Humanoid Soccer Robot

Widodo Budiharto , Bayu Kanigoro , Viska Noviantri
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.170-178, ⟨10.1007/978-3-642-55032-4_17⟩
Conference papers hal-01397187v1
Image document

Self-generating Programs – Cascade of the Blocks

Josef Kufner , Radek Mařík
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.199-212, ⟨10.1007/978-3-642-55032-4_20⟩
Conference papers hal-01397196v1
Image document

Concern Based SaaS Application Architectural Design

Aldo Suwandi , Inggriani Liem , Saiful Akbar
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.228-237, ⟨10.1007/978-3-642-55032-4_22⟩
Conference papers hal-01397200v1
Image document

Social Media vs. Traditional Internet Use for Community Involvement: Toward Broadening Participation

Andrea Kavanaugh , John C. Tedesco , Kumbirai Madondo
6th International Conference on Electronic Participation (ePart), Sep 2014, Dublin, Ireland. pp.1-12, ⟨10.1007/978-3-662-44914-1_1⟩
Conference papers hal-01396909v1
Image document

Cross-Layer Optimization with Real-Time Adaptive Dynamic Spectrum Management for Fourth Generation Broadband Access Networks

Jeremy van Den Eynde , Chris Blondia
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.184-188, ⟨10.1007/978-3-662-43862-6_22⟩
Conference papers hal-01401306v1
Image document

Treewidth Computation and Kernelization in the Parallel External Memory Model

Riko Jacob , Tobias Lieber , Matthias Mnich
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.78-89, ⟨10.1007/978-3-662-44602-7_7⟩
Conference papers hal-01402030v1
Image document

Not All Multi-Valued Partial CFL Functions Are Refined by Single-Valued Functions (Extended Abstract)

Tomoyuki Yamakami
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.136-150, ⟨10.1007/978-3-662-44602-7_12⟩
Conference papers hal-01402038v1
Image document

Well-Defined Coverage Metrics for the Glass Box Test

Rainer Schmidberger
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.113-128, ⟨10.1007/978-3-662-44857-1_8⟩
Conference papers hal-01405278v1
Image document

GreenBrowsing: Towards Energy Efficiency in Browsing Experience

Gonçalo Avelar , Luís Veiga
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.119-125, ⟨10.1007/978-3-662-43352-2_10⟩
Conference papers hal-01287736v1
Image document

Malicious MPLS Policy Engine Reconnaissance

Abdulrahman Al-Mutairi , Stephen Wolthusen
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.3-18, ⟨10.1007/978-3-662-44885-4_1⟩
Conference papers hal-01404180v1
Image document

A Pipeline Optimization Model for QKD Post-processing System

Jianyi Zhou , Bo Liu , Baokang Zhao , Bo Liu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.472-481, ⟨10.1007/978-3-642-55032-4_48⟩
Conference papers hal-01397256v1
Image document

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures

Zhiquan Lai , Baokang Zhao , Jinshu Su
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.674-679, ⟨10.1007/978-3-642-55032-4_69⟩
Conference papers hal-01397285v1
Image document

A High-Speed Network Content Filtering System

Guohong Zhao , Shuhui Chen , Baokang Zhao , Ilsun You , Jinshu Su , et al.
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers hal-01404003v1
Image document

Plan It! Automated Security Testing Based on Planning

Franz Wotawa , Josip Bozic
26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.48-62, ⟨10.1007/978-3-662-44857-1_4⟩
Conference papers hal-01405274v1
Image document

DP: Dynamic Prepage in Postcopy Migration for Fixed-Size Data Load

Shuang Wu , Ce Yang , Jianhai Chen , Qinming He , Bei Wang
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.530-533, ⟨10.1007/978-3-662-44917-2_45⟩
Conference papers hal-01403132v1
Image document

Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol

Rima Addas , Ning Zhang
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.500-510, ⟨10.1007/978-3-642-55032-4_51⟩
Conference papers hal-01397342v1
Image document

Flow Management at Multi-Gbps: Tradeoffs and Lessons Learned

Georges Nassopulos , Dario Rossi , Francesco Gringoli , Lorenzo Nava , Maurizio Dusi , et al.
6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.1-14, ⟨10.1007/978-3-642-54999-1_1⟩
Conference papers hal-01396466v1
Image document

Contributions to Efficient Resource Management in Virtual Networks

Rashid Mijumbi , Juan-Luis Gorricho , Joan Serrat
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.47-51, ⟨10.1007/978-3-662-43862-6_5⟩
Conference papers hal-01401288v1
Image document

LAN House Implementation and Sustainability in Brazil: An Actor-Network Theory Perspective

Carla Monteiro Soares , Luiz Antonio Joia
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.206-217, ⟨10.1007/978-3-662-44426-9_17⟩
Conference papers hal-01401742v1
Image document

A Decision Model for Data Sharing

Silja M. Eckartz , Wout J. Hofman , Anne Van Veenstra
13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.253-264, ⟨10.1007/978-3-662-44426-9_21⟩
Conference papers hal-01401749v1
Image document

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud

Samira Barouti , Feras Aljumah , Dima Alhadidi , Mourad Debbabi
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.82-97, ⟨10.1007/978-3-662-43936-4_6⟩
Conference papers hal-01284843v1
Image document

Mining Attribute-Based Access Control Policies from Logs

Zhongyuan Xu , Scott D. Stoller
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers hal-01284862v1
Image document

Towards Secure Cloud Database with Fine-Grained Access Control

Michael G. Solomon , Vaidy Sunderam , Li Xiong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.324-338, ⟨10.1007/978-3-662-43936-4_21⟩
Conference papers hal-01284867v1
Image document

Scaling HDFS with a Strongly Consistent Relational Model for Metadata

Kamal Hakimzadeh , Hooman Peiro Sajjad , Jim Dowling
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.38-51, ⟨10.1007/978-3-662-43352-2_4⟩
Conference papers hal-01287731v1
Image document

Speedup Critical Stage of Machine Learning with Batch Scheduling in GPU

Yuan Gao , Rui Wang , Ning An , Yanjiang Wei , Depei Qian
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.522-525, ⟨10.1007/978-3-662-44917-2_43⟩
Conference papers hal-01403124v1
Image document

The New Territory of Lightweight Security in a Cloud Computing Environment

Shu-Ching Wang , Shih-Chi Tseng , Hsin-Met Chuan , Kuo-Qin Yan , Szu-Hao Tsai
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.526-529, ⟨10.1007/978-3-662-44917-2_44⟩
Conference papers hal-01403130v1
Image document

Free Typed Text Using Keystroke Dynamics for Continuous Authentication

Paulo Pinto , Bernardo Patrão , Henrique Santos
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.33-45, ⟨10.1007/978-3-662-44885-4_3⟩
Conference papers hal-01404183v1
Image document

Coalgebraic Simulations and Congruences

H. Peter Gumm , Mehdi Zarrad
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.118-134, ⟨10.1007/978-3-662-44124-4_7⟩
Conference papers hal-01408755v1
Image document

An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse

Paramita Sarkar , Ditipriya Sinha
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.327-338, ⟨10.1007/978-3-662-45237-0_31⟩
Conference papers hal-01405603v1
Image document

Agent-Based Context Management for Service-Oriented Environments

Adrija Bhattacharya , Avirup Das , Sankhayan Choudhury , Nabendu Chaki
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.363-374, ⟨10.1007/978-3-662-45237-0_34⟩
Conference papers hal-01405606v1