Filter your results
- 3
- 3
- 3
- 3
- 3
- 2
- 1
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.254-265, ⟨10.1007/978-3-319-19578-0_21⟩
Conference papers
hal-01789961v1
|
||
|
Requirement Analysis in Data Warehouses to Support External Information5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.243-253, ⟨10.1007/978-3-319-19578-0_20⟩
Conference papers
hal-01789941v1
|
||
|
Practical and Privacy-Preserving TEE Migration9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
Conference papers
hal-01183508v1
|