Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

773 results
Deposit type : Fulltext
Image document

Device-Specific Traffic Characterization for Root Cause Analysis in Cellular Networks

Peter Romirer-Maierhofer , Mirko Schiavone , Alessandro D’alconzo
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.64-78, ⟨10.1007/978-3-319-17172-2_5⟩
Conference papers hal-01411181v1
Image document

Understanding Touch and Motion Gestures for Blind People on Mobile Devices

Marco Romano , Andrea Bellucci , Ignacio Aedo
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.38-46, ⟨10.1007/978-3-319-22701-6_3⟩
Conference papers hal-01599659v1
Image document

Informing Costumers via Interactive Shelves

Peter Rogelj
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.559-562, ⟨10.1007/978-3-319-22723-8_61⟩
Conference papers hal-01610801v1
Image document

A Real Time Lighting Technique for Procedurally Generated 2D Isometric Game Terrains

Érick O. Rodrigues , Esteban Clua
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.32-44, ⟨10.1007/978-3-319-24589-8_3⟩
Conference papers hal-01758435v1
Image document

Mini-Orb: A Personal Indoor Climate Preference Feedback Interface

Markus Rittenbruch , Jared Donovan , Yasuhiro Santo
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.134-149, ⟨10.1007/978-3-319-22668-2_12⟩
Conference papers hal-01599863v1
Image document

In-Situ Occlusion Resolution for Hybrid Tabletop Environments

Jan Riemann , Mohammadreza Khalilbeigi , Max Mühlhäuser
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.278-295, ⟨10.1007/978-3-319-22698-9_18⟩
Conference papers hal-01609416v1
Image document

Intrusion Detection in the Smart Grid Based on an Analogue Technique

Hartmut Richthammer , Sebastian Reif
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.56-67, ⟨10.1007/978-3-319-39028-4_5⟩
Conference papers hal-01445793v1
Image document

Designing Viable Multi-sided Data Platforms: The Case of Context-Aware Mobile Travel Applications

Mark De Reuver , Timber Haaker , Fatemeh Nikayin , Ruud Kosman
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.354-365, ⟨10.1007/978-3-319-25013-7_28⟩
Conference papers hal-01448052v1
Image document

Fluidify: Decentralized Overlay Deployment in a Multi-cloud World

Ariyattu C. Resmi , François Taïani
15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.1-15, ⟨10.1007/978-3-319-19129-4_1⟩
Conference papers hal-01775032v1
Image document

Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks

N. Renugadevi , C. Mala
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.161-172, ⟨10.1007/978-3-319-24315-3_16⟩
Conference papers hal-01466215v1
Image document

An Efficient Unsavory Data Detection Method for Internet Big Data

Peige Ren , Xiaofeng Wang , Hao Sun , Fen Xu , Baokang Zhao , et al.
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.213-220, ⟨10.1007/978-3-319-24315-3_21⟩
Conference papers hal-01466222v1
Image document

Bridging Tangible and Virtual Interaction: Rapid Prototyping of a Gaming Idea

Thov Reime , Heikki Sjöman , Achim Gerstenberg , Pekka Abrahamsson , Martin Steinert
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.523-528, ⟨10.1007/978-3-319-24589-8_50⟩
Conference papers hal-01758412v1
Image document

Towards Smart City Learning: Contextualizing Geometry Learning with a Van Hiele Inspired Location-Aware Game

Matthias Rehm , Catalin Stan , Niels Peter Wøldike , Dimitra Vasilarou
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.399-406, ⟨10.1007/978-3-319-24589-8_32⟩
Conference papers hal-01758470v1
Image document

Working with Child Participants in Interaction Design

Janet C. Read
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.655-656, ⟨10.1007/978-3-319-22723-8_87⟩
Conference papers hal-01610860v1
Image document

Stream Processing with Secure Information Flow Constraints

Indrakshi Ray , Raman Adaikkalavan , Xing Xie , Rose Gamble
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.311-329, ⟨10.1007/978-3-319-20810-7_22⟩
Conference papers hal-01745816v1
Image document

Exercises for German-Speaking Children with Dyslexia

Maria Rauschenberger , Silke Füchsel , Luz Rello , Clara Bayarri , Jörg Thomaschewski
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.445-452, ⟨10.1007/978-3-319-22701-6_33⟩
Conference papers hal-01599629v1
Image document

Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System

Annanda Thavymony Rath , Jean-Noël Colin
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.233-241, ⟨10.1007/978-3-319-20810-7_16⟩
Conference papers hal-01745825v1
Image document

How Current Android Malware Seeks to Evade Automated Code Analysis

Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers hal-01442542v1
Image document

Comparison of ASIM Traffic Profile Detectors and Floating Car Data During Traffic Incidents

Lukáš Rapant , Kateřina Slaninová , Jan Martinovič , Marek Ščerba , Martin Hájek
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.120-131, ⟨10.1007/978-3-319-24369-6_10⟩
Conference papers hal-01444459v1
Image document

Secure and Authenticated Access to LLN Resources Through Policy Constraints

Konstantinos Rantos , Konstantinos Fysarakis , Othonas Soultatos , Ioannis Askoxylakis
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers hal-01442549v1
Image document

An Ontology of eGovernment

Arkalgud Ramaprasad , Aurora Sánchez-Ortiz , Thant Syn
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.258-269, ⟨10.1007/978-3-319-22479-4_20⟩
Conference papers hal-01412276v1
Image document

Integrating Attributes into Role-Based Access Control

Qasim Mahmood Rajpoot , Christian Damsgaard Jensen , Ram Krishnan
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers hal-01745833v1
Image document

Non-response, Social Exclusion, and False Acceptance: Gatekeeping Tactics and Usability Work in Free-Libre Open Source Software Development

Mikko Rajanen , Netta Iivari , Arto Lanamäki
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.9-26, ⟨10.1007/978-3-319-22698-9_2⟩
Conference papers hal-01609413v1
Image document

An Openflow-Based Approach to Failure Detection and Protection for a Multicasting Tree

Vignesh Renganathan Raja , Abhishek Pandey , Chung-Horng Lung
13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.211-224, ⟨10.1007/978-3-319-22572-2_15⟩
Conference papers hal-01728813v1
Image document

Life in the Fast Lane: Effect of Language and Calibration Accuracy on the Speed of Text Entry by Gaze

Kari-Jouko Räihä
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.402-417, ⟨10.1007/978-3-319-22701-6_30⟩
Conference papers hal-01599665v1
Image document

How Dangerous Is Internet Scanning?

Elias Raftopoulos , Eduard Glatz , Xenofontas Dimitropoulos , Alberto Dainotti
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.158-172, ⟨10.1007/978-3-319-17172-2_11⟩
Conference papers hal-01411192v1
Image document

The Comparison of Performance, Efficiency, and Task Solution Strategies in Real, Virtual and Dual Reality Environments

Frederic Raber , Antonio Krüger , Gerrit Kahl
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.390-408, ⟨10.1007/978-3-319-22723-8_31⟩
Conference papers hal-01610846v1
Image document

Measuring Latency in Virtual Reality Systems

Kjetil Raaen , Ivar Kjellmo
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.457-462, ⟨10.1007/978-3-319-24589-8_40⟩
Conference papers hal-01758473v1
Image document

Exploring Deep Content in Physical Rehabilitation Games

Niels Quinten , Steven Malliet , Karin Coninx
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.433-438, ⟨10.1007/978-3-319-24589-8_36⟩
Conference papers hal-01758451v1
Image document

Swimming the Channels: An Analysis of Online Archival Reference Enquiries

Joseph Pugh , Christopher Power
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.99-115, ⟨10.1007/978-3-319-22698-9_8⟩
Conference papers hal-01609418v1