Filter your results
- 3
- 3
- 3
- 3
- 3
- 2
- 1
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.254-265, ⟨10.1007/978-3-319-19578-0_21⟩
Conference papers
hal-01789961v1
|
||
|
Requirement Analysis in Data Warehouses to Support External Information5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.243-253, ⟨10.1007/978-3-319-19578-0_20⟩
Conference papers
hal-01789941v1
|
||
|
FPGuard: Detection and Prevention of Browser Fingerprinting29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.293-308, ⟨10.1007/978-3-319-20810-7_21⟩
Conference papers
hal-01745817v1
|