Filter your results
- 10
- 1
- 10
- 10
- 1
- 1
- 10
- 10
- 5
- 5
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
10 results
|
|
sorted by
|
|
Towards Real-Time Co-authoring of Linked-Data on the WebCIIA'2015 - 5th International Conference on Computer Science and Its Applications, May 2015, Saida, Algeria. pp.538-548, ⟨10.1007/978-3-319-19578-0_44⟩
Conference papers
hal-01789931v1
|
||
|
A CRDT Supporting Selective Undo for Collaborative Text Editing15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.193-206, ⟨10.1007/978-3-319-19129-4_16⟩
Conference papers
hal-01246212v1
|
||
|
A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.381-393, ⟨10.1007/978-3-319-19578-0_31⟩
Conference papers
hal-01789978v1
|
||
|
A Survey on Wireless Sensors Networks Security Based on a Layered Approach13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.77-93, ⟨10.1007/978-3-319-22572-2_6⟩
Conference papers
hal-01728805v1
|
||
|
Heuristics for deriving adaptive homing and distinguishing sequences for nondeterministic finite state machines27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah And Dubai, United Arab Emirates. pp.243-248, ⟨10.1007/978-3-319-25945-1_15⟩
Conference papers
hal-01262740v1
|
||
|
Exploring IoT Protocols Through the Information-Centric Networking's Lens9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.56-60, ⟨10.1007/978-3-319-20034-7_6⟩
Conference papers
hal-01251165v1
|
||
|
Remarks on the Cellular Automaton Global Synchronisation Problem21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jarkko Kari, Jun 2015, Turku, Finland. pp.113-126, ⟨10.1007/978-3-662-47221-7_9⟩
Conference papers
hal-01255925v1
|
||
|
Guiding testers' hands in monitoring tools : application of testing approaches on SIP27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.105-123, ⟨10.1007/978-3-319-25945-1_7⟩
Conference papers
hal-01263247v1
|
||
|
Tooled Process for Early Validation of SysML Models using Modelica Simulation6th Fundamentals of Software Engineering (FSEN), 2015, Tehran, Iran. pp.230-237, ⟨10.1007/978-3-319-24644-4_16⟩
Conference papers
hal-01246025v1
|
||
|
Privacy in digital identity systems: models, assessment and user adoption14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.273-290, ⟨10.1007/978-3-319-22479-4_21⟩
Conference papers
hal-01283997v1
|