Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

773 results
Deposit type : Fulltext
Image document

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

Johann Schlamp , Josef Gustafsson , Matthias Wählisch , Thomas C. Schmidt , Georg Carle
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.188-201, ⟨10.1007/978-3-319-17172-2_13⟩
Conference papers hal-01411194v1
Image document

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks

Johann Schlamp , Ralph Holz , Oliver Gasser , Andreas Korsten , Quentin Jacquemart , et al.
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.173-187, ⟨10.1007/978-3-319-17172-2_12⟩
Conference papers hal-01411193v1
Image document

Design-Based Learning in Classrooms Using Playful Digital Toolkits

K. J. Scheltenaar , J. Poel , M. M. Bekker
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.126-139, ⟨10.1007/978-3-319-24589-8_10⟩
Conference papers hal-01758429v1
Image document

A Physically Universal Quantum Cellular Automaton

Luke Schaeffer
21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.46-58, ⟨10.1007/978-3-662-47221-7_4⟩
Conference papers hal-01442481v1
Image document

Inference Leakage Detection for Authorization Policies over RDF Data

Tarek Sayah , Emmanuel Coquery , Romuald Thion , Mohand-Said Hacid
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers hal-01745813v1
Image document

Comparing Concurrent and Retrospective Verbal Protocols for Blind and Sighted Users

Andreas Savva , Helen Petrie , Christopher Power
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-71, ⟨10.1007/978-3-319-22701-6_5⟩
Conference papers hal-01599628v1
Image document

Comprehensive Performance Evaluation of Various Feature Extraction Methods for OCR Purposes

Dawid Sas , Khalid Saeed
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.411-422, ⟨10.1007/978-3-319-24369-6_34⟩
Conference papers hal-01444484v1
Image document

Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment

Martin Sarnovský , Peter Butka , Peter Bednár , František Babič , Ján Paralič
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.310-319, ⟨10.1007/978-3-319-24315-3_32⟩
Conference papers hal-01466232v1
Image document

A MapReduce Based Distributed Framework for Similarity Search in Healthcare Big Data Environment

Hiren K.D. Sarma , Yogesh K. Dwivedi , Nripendra P. Rana , Emma L. Slade
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.173-182, ⟨10.1007/978-3-319-25013-7_14⟩
Conference papers hal-01448037v1
Image document

Private Minutia-Based Fingerprint Matching

Neyire Deniz Sarier
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.52-67, ⟨10.1007/978-3-319-24018-3_4⟩
Conference papers hal-01442553v1
Image document

Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios

Daniel Santos , Silvio Ranise , Luca Compagna , Serena E. Ponta
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.85-100, ⟨10.1007/978-3-319-20810-7_6⟩
Conference papers hal-01745831v1
Image document

Personalized Composition of Trustful Reputation Systems

Johannes Sänger , Christian Richthammer , André Kremser , Günther Pernul
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.207-214, ⟨10.1007/978-3-319-20810-7_13⟩
Conference papers hal-01745829v1
Image document

Group-Walking Automata

Ville Salo , Ilkka Törmä
21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.224-237, ⟨10.1007/978-3-662-47221-7_17⟩
Conference papers hal-01442475v1
Image document

Groups and Monoids of Cellular Automata

Ville Salo
21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.17-45, ⟨10.1007/978-3-662-47221-7_3⟩
Conference papers hal-01442480v1
Image document

Extending Testing Automata to All LTL

Ala Salem
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.196-210, ⟨10.1007/978-3-319-19195-9_13⟩
Conference papers hal-01767338v1
Image document

Designing of Hierarchical Structures for Binary Comparators on FPGA/SoC

Valery Salauyou , Marek Gruszewski
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.386-396, ⟨10.1007/978-3-319-24369-6_32⟩
Conference papers hal-01444482v1
Image document

A Hybrid Model to Improve Filtering Systems

Kharroubi Sahraoui , Dahmani Youcef , Nouali Omar
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.303-314, ⟨10.1007/978-3-319-19578-0_25⟩
Conference papers hal-01789930v1
Image document

Supporting the Collaboration between Programmers and Designers Building Game AI

Ismael Sagredo-Olivenza , Marco Antonio Gómez-Martín , Pedro A. González-Calero
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.496-501, ⟨10.1007/978-3-319-24589-8_46⟩
Conference papers hal-01758411v1
Image document

On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps

Samy Sadi , Belabbas Yagoubi
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.599-610, ⟨10.1007/978-3-319-19578-0_49⟩
Conference papers hal-01789964v1
Image document

Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers

Ahmad Sabouri
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.119-132, ⟨10.1007/978-3-319-25013-7_10⟩
Conference papers hal-01448032v1
Image document

Highly Customizable Service Composition and Orchestration

Luca Sabatucci , Carmelo Lodato , Salvatore Lopes , Massimo Cossentino
4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.156-170, ⟨10.1007/978-3-319-24072-5_11⟩
Conference papers hal-01757567v1
Image document

AQoPA: Automated Quality of Protection Analysis Framework for Complex Systems

Damian Rusinek , Bogdan Ksiezopolski , Adam Wierzbicki
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.475-486, ⟨10.1007/978-3-319-24369-6_39⟩
Conference papers hal-01444489v1
Image document

Tags You Don’t Forget: Gamified Tagging of Personal Images

Nina Runge , Dirk Wenig , Danny Zitzmann , Rainer Malaka
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.301-314, ⟨10.1007/978-3-319-24589-8_23⟩
Conference papers hal-01758423v1
Image document

Glass+Skin: An Empirical Evaluation of the Added Value of Finger Identification to Basic Single-Touch Interaction on Touch Screens

Quentin Roy , Yves Guiard , Gilles Bailly , Éric Lecolinet , Olivier Rioul , et al.
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-71, ⟨10.1007/978-3-319-22723-8_5⟩
Conference papers hal-01202852v1
Image document

Gestu-Wan - An Intelligible Mid-Air Gesture Guidance System for Walk-up-and-Use Displays

Gustavo Rovelo , Donald Degraen , Davy Vanacken , Kris Luyten , Karin Coninx
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.368-386, ⟨10.1007/978-3-319-22668-2_28⟩
Conference papers hal-01599876v1
Image document

Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks

Mehdi Rouan Serik , Mejdi Kaddour
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.454-464, ⟨10.1007/978-3-319-19578-0_37⟩
Conference papers hal-01789949v1
Image document

Conceptualising and Exploring User Activities in Social Media

Marcel Rosenberger , Tobias Lehmkuhl , Reinhard Jung
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.107-118, ⟨10.1007/978-3-319-25013-7_9⟩
Conference papers hal-01448073v1
Image document

Social Customer Relationship Management: An Architectural Exploration of the Components

Marcel Rosenberger
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.372-385, ⟨10.1007/978-3-319-25013-7_30⟩
Conference papers hal-01448055v1
Image document

Deterministic Algorithm for 1-Median 1-Center Two-Objective Optimization Problem

Vahid Roostapour , Iman Kiarazm , Mansoor Davoodi
1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.164-178, ⟨10.1007/978-3-319-28678-5_12⟩
Conference papers hal-01446259v1
Image document

Should I Stay or Should I Go? Selecting Between Touch and Mid-Air Gestures for Large-Display Interaction

Mikkel Rønne Jakobsen , Yvonne Jansen , Sebastian Boring , Kasper Hornbæk
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.455-473, ⟨10.1007/978-3-319-22698-9_31⟩
Conference papers hal-01399088v1