Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

773 results
Deposit type : Fulltext
Image document

A Survey on Wireless Sensors Networks Security Based on a Layered Approach

Raul A. Fuentes-Samaniego , Ana Rosa Cavalli , Juan A. Nolazco-Flores , Javier Baliosian
13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.77-93, ⟨10.1007/978-3-319-22572-2_6⟩
Conference papers hal-01728805v1
Image document

A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments

Paul Brous , Marijn Janssen
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.81-94, ⟨10.1007/978-3-319-25013-7_7⟩
Conference papers hal-01448071v1
Image document

A TALE OF TWO TRACES – DIPLOMATICS AND FORENSICS

Fred Cohen
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.3-27, ⟨10.1007/978-3-319-24123-4_1⟩
Conference papers hal-01449067v1
Image document

A Theory of Integrating Tamper Evidence with Stabilization

Reza Hajisheykhi , Ali Ebnenasir , Sandeep S. Kulkarni
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.84-99, ⟨10.1007/978-3-319-24644-4_6⟩
Conference papers hal-01446612v1
Image document

A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS

Shariq Murtuza , Robin Verma , Jayaprakash Govindaraj , Gaurav Gupta
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.305-320, ⟨10.1007/978-3-319-24123-4_18⟩
Conference papers hal-01449065v1
Image document

A Tool to Estimate Roaming Behavior in Wireless Architectures

Rute Sofia
13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.247-258, ⟨10.1007/978-3-319-22572-2_18⟩
Conference papers hal-01728804v1
Image document

A Topology Based Flow Model for Computing Domain Reputation

Igor Mishsky , Nurit Gal-Oz , Ehud Gudes
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.277-292, ⟨10.1007/978-3-319-20810-7_20⟩
Conference papers hal-01745814v1
Image document

A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT

Shams Zawoad , Ragib Hasan
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.271-285, ⟨10.1007/978-3-319-24123-4_16⟩
Conference papers hal-01449063v1
Image document

A version of LEACH Adapted to the Lognormal Shadowing Model

Chifaa Tabet Hellel , Mohamed Lehsaini , Hervé Guyennet
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.465-475, ⟨10.1007/978-3-319-19578-0_38⟩
Conference papers hal-01789956v1
Image document

A Visual Uptake on the Digital Divide

Farooq Mubarak , Reima Suomi
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.398-415, ⟨10.1007/978-3-319-25013-7_32⟩
Conference papers hal-01448057v1
Image document

Acceleration of Blender Cycles Path-Tracing Engine Using Intel Many Integrated Core Architecture

Milan Jaroš , Lubomír Říha , Petr Strakoš , Tomáš Karásek , Alena Vašatová , et al.
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.86-97, ⟨10.1007/978-3-319-24369-6_7⟩
Conference papers hal-01444507v1
Image document

Actuated Shear: Enabling Haptic Feedback on Rich Touch Interfaces

Bernhard Maurer , Roland Buchner , Martin Murer , Manfred Tscheligi
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.140-147, ⟨10.1007/978-3-319-22723-8_11⟩
Conference papers hal-01610834v1
Image document

Adaptation to TV Delays Based on the User Behaviour towards a Cheating-Free Second Screen Entertainment

Rui Neves Madeira , Pedro Centieiro , Nuno Correia
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.424-432, ⟨10.1007/978-3-319-24589-8_35⟩
Conference papers hal-01758439v1
Image document

Adaptive Automated Storytelling Based on Audience Response

Augusto Baffa , Marcus Poggi , Bruno Feijó
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.45-58, ⟨10.1007/978-3-319-24589-8_4⟩
Conference papers hal-01758442v1
Image document

Adaptive Beaconless Opportunistic Routing for Multimedia Distribution

Larissa Pimentel , Denis Rosário , Marcos Seruffo , Zhongliang Zhao , Torsten Braun
13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.122-135, ⟨10.1007/978-3-319-22572-2_9⟩
Conference papers hal-01728792v1
Image document

Adaptive Normative Modelling: A Case Study in the Public-Transport Domain

Rob Christiaanse , Paul Griffioen , Joris Hulstijn
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.423-434, ⟨10.1007/978-3-319-25013-7_34⟩
Conference papers hal-01448059v1
Image document

ADITHO – A Serious Game for Training and Evaluating Medical Ethics Skills

Cristian Lorenzini , Claudia Faita , Michele Barsotti , Marcello Carrozzino , Franco Tecchia , et al.
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.59-71, ⟨10.1007/978-3-319-24589-8_5⟩
Conference papers hal-01758457v1
Image document

Adoption of Mobile Banking in Jordan: Exploring Demographic Differences on Customers’ Perceptions

Ali Abdallah Alalwan , Nripendra P. Rana , Yogesh K. Dwivedi , Banita Lal , Michael D. Williams
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.13-23, ⟨10.1007/978-3-319-25013-7_2⟩
Conference papers hal-01448054v1
Image document

Advanced Dynamic Scripting for Fighting Game AI

Kevin Majchrzak , Jan Quadflieg , Günter Rudolph
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.86-99, ⟨10.1007/978-3-319-24589-8_7⟩
Conference papers hal-01758421v1
Image document

Advancing e-Government Using the Internet of Things: A Systematic Review of Benefits

Paul Brous , Marijn Janssen
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.156-169, ⟨10.1007/978-3-319-22479-4_12⟩
Conference papers hal-01412248v1
Image document

Affordances and Effects of Promoting eParticipation Through Social Media

Fathul Wahid , Øystein Sæbø
7th International Conference on Electronic Participation (ePart), Aug 2015, Thessaloniki, Greece. pp.3-14, ⟨10.1007/978-3-319-22500-5_1⟩
Conference papers hal-01587628v1
Image document

AirDisplay: Experimenting with Air Flow as a Communication Medium

Omar Mowafi , Mohamed Khamis , Wael Abouelsaadat
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.316-323, ⟨10.1007/978-3-319-22701-6_23⟩
Conference papers hal-01599651v1
Image document

An Administrative Model for Relationship-Based Access Control

Scott D. Stoller
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.53-68, ⟨10.1007/978-3-319-20810-7_4⟩
Conference papers hal-01745824v1
Image document

An Approach for Evaluating Softgoals Using Weight

Shuichiro Yamamoto
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.203-212, ⟨10.1007/978-3-319-24315-3_20⟩
Conference papers hal-01466221v1
Image document

An Approach to Integrating Aspects in Agile Development

Tadjer Houda , Meslati Djamel
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.584-595, ⟨10.1007/978-3-319-19578-0_48⟩
Conference papers hal-01789972v1
Image document

An Artifact Ecology in a Nutshell: A Distributed Cognition Perspective for Collaboration and Coordination

Christina Vasiliou , Andri Ioannou , Panayiotis Zaphiris
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-72, ⟨10.1007/978-3-319-22668-2_5⟩
Conference papers hal-01599899v1
Image document

An Efficient Unsavory Data Detection Method for Internet Big Data

Peige Ren , Xiaofeng Wang , Hao Sun , Fen Xu , Baokang Zhao , et al.
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.213-220, ⟨10.1007/978-3-319-24315-3_21⟩
Conference papers hal-01466222v1
Image document

An Empirical Investigation of Gaze Selection in Mid-Air Gestural 3D Manipulation

Eduardo Velloso , Jayson Turner , Jason Alexander , Andreas Bulling , Hans Gellersen
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.315-330, ⟨10.1007/978-3-319-22668-2_25⟩
Conference papers hal-01599875v1
Image document

An Empirical Investigation of the Practices and Challenges Specific to International User Studies

Sabine Madsen , Lene Nielsen , Heidi Hautopp , Iben Jensen
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.132-148, ⟨10.1007/978-3-319-22698-9_10⟩
Conference papers hal-01609381v1
Image document

An Empirical Study of the Effects of Three Think-Aloud Protocols on Identification of Usability Problems

Anders Bruun , Jan Stage
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.159-176, ⟨10.1007/978-3-319-22668-2_14⟩
Conference papers hal-01599881v1