Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

773 results
Deposit type : Fulltext
level0_domain_s : Computer Science [cs]
Image document

Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers

Ahmad Sabouri
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.119-132, ⟨10.1007/978-3-319-25013-7_10⟩
Conference papers hal-01448032v1
Image document

3D-HUDD – Developing a Prototyping Tool for 3D Head-Up Displays

Nora Broy , Matthias Nefzger , Florian Alt , Mariam Hassib , Albrecht Schmidt
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.300-318, ⟨10.1007/978-3-319-22723-8_24⟩
Conference papers hal-01610823v1
Image document

Zen and the Art of Network Troubleshooting: A Hands on Experimental Study

François Espinet , Diana Joumblatt , Dario Rossi
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.31-45, ⟨10.1007/978-3-319-17172-2_3⟩
Conference papers hal-01411178v1
Image document

Modeling On-demand Transit Transportation System Using an Agent-Based Approach

Olfa Chebbi , Jouhaina Chaouachi
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.316-326, ⟨10.1007/978-3-319-24369-6_26⟩
Conference papers hal-01444475v1
Image document

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid

Hu Chun , Kui Ren , Wei Jiang
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.119-134, ⟨10.1007/978-3-319-20810-7_8⟩
Conference papers hal-01745836v1
Image document

Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

Bernd Meijerink , Geert Heijenk
13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.341-354, ⟨10.1007/978-3-319-22572-2_25⟩
Conference papers hal-01728811v1
Image document

Open Innovation Contests for Improving Healthcare – An Explorative Case Study Focusing on Challenges in a Testbed Initiative

Siri Wassrin , Ida Lindgren , Ulf Melin
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.91-104, ⟨10.1007/978-3-319-22479-4_7⟩
Conference papers hal-01412239v1
Image document

Estimating Production Time of Touchless Hand Drawing Gestures

Orlando Erazo , José A. Pino , Pedro Antunes
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.552-569, ⟨10.1007/978-3-319-22698-9_38⟩
Conference papers hal-01609401v1
Image document

An Efficient Unsavory Data Detection Method for Internet Big Data

Peige Ren , Xiaofeng Wang , Hao Sun , Fen Xu , Baokang Zhao , et al.
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.213-220, ⟨10.1007/978-3-319-24315-3_21⟩
Conference papers hal-01466222v1
Image document

A Model for an Aggression Discovery Through Person Online Behavior

Germanas Budnikas
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.305-315, ⟨10.1007/978-3-319-24369-6_25⟩
Conference papers hal-01444474v1
Image document

Citizen-to-Citizen vs. Citizen-to-Government eParticipation in Uganda: Implications for Research and Practice

Wairagala Wakabi , Åke Grönlund
7th International Conference on Electronic Participation (ePart), Aug 2015, Thessaloniki, Greece. pp.95-107, ⟨10.1007/978-3-319-22500-5_8⟩
Conference papers hal-01587638v1
Image document

Privacy Preserving Record Matching Using Automated Semi-trusted Broker

Ibrahim Lazrig , Tarik Moataz , Indrajit Ray , Indrakshi Ray , Toan Ong , et al.
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers hal-01745819v1
Image document

Restricted Density Classification in One Dimension

Siamak Taati
21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.238-250, ⟨10.1007/978-3-662-47221-7_18⟩
Conference papers hal-01442476v1
Image document

Formal Verification of Service Level Agreements Through Distributed Monitoring

Behrooz Nobakht , Stijn De Gouw , Frank Boer
4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.125-140, ⟨10.1007/978-3-319-24072-5_9⟩
Conference papers hal-01757576v1
Image document

A Negative Input Space Complexity Metric as Selection Criterion for Fuzz Testing

Martin A. Schneider , Marc-Florian Wendland , Andreas Hoffmann
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.257-262, ⟨10.1007/978-3-319-25945-1_17⟩
Conference papers hal-01470152v1
Image document

Preference Elicitation and Negotiation in a Group Recommender System

Jesús Omar Álvarez Márquez , Jurgen Ziegler
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.20-37, ⟨10.1007/978-3-319-22668-2_2⟩
Conference papers hal-01599849v1
Image document

What Users Prefer and Why: A User Study on Effective Presentation Styles of Opinion Summarization

Xiaojun Yuan , Ning Sa , Grace Begany , Huahai Yang
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.249-264, ⟨10.1007/978-3-319-22668-2_20⟩
Conference papers hal-01599891v1
Image document

A Pre-congruence Format for XY-simulation

Harsh Beohar , Mohammad Reza Mousavi
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.215-229, ⟨10.1007/978-3-319-24644-4_15⟩
Conference papers hal-01446602v1
Image document

Technology Experience Research: A Framework for Experience Oriented Technology Development

Manfred Tscheligi , Sebastian Egger , Peter Fröhlich , Cristina Olaverri-Monreal , Georg Regal
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.626-627, ⟨10.1007/978-3-319-22723-8_77⟩
Conference papers hal-01610856v1
Image document

Simple Games – Complex Emotions: Automated Affect Detection Using Physiological Signals

Thomas Friedrichs , Carolin Zschippig , Marc Herrlich , Benjamin Walther-Franks , Rainer Malaka , et al.
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.375-382, ⟨10.1007/978-3-319-24589-8_29⟩
Conference papers hal-01758436v1
Image document

How Current Android Malware Seeks to Evade Automated Code Analysis

Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers hal-01442542v1
Image document

Investigating Representation Alternatives for Communicating Uncertainty to Non-experts

Miriam Greis , Thorsten Ohler , Niels Henze , Albrecht Schmidt
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.256-263, ⟨10.1007/978-3-319-22723-8_21⟩
Conference papers hal-01610771v1
Image document

The Landscape of UX Requirements Practices

Gregorio Convertino , Nancy Frishberg , Jettie Hoonhout , Rosa Lanzilotti , Marta Kristín Larusdottir , et al.
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.673-674, ⟨10.1007/978-3-319-22723-8_96⟩
Conference papers hal-01610780v1
Image document

Opinion Mining and Sentiment Analysis in Policy Formulation Initiatives: The EU-Community Approach

Yannis Charalabidis , Manolis Maragoudakis , Euripides Loukis
7th International Conference on Electronic Participation (ePart), Aug 2015, Thessaloniki, Greece. pp.147-160, ⟨10.1007/978-3-319-22500-5_12⟩
Conference papers hal-01587635v1
Image document

A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation

Thi Thao Nguyen , Dinh Thanh Nguyen , Tran Khanh Dang
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.77-88, ⟨10.1007/978-3-319-24315-3_8⟩
Conference papers hal-01466413v1
Image document

How Asymmetric Is the Internet?

Wouter De Vries , José Jair Santanna , Anna Sperotto , Aiko Pras
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.113-125, ⟨10.1007/978-3-319-20034-7_12⟩
Conference papers hal-01410157v1
Image document

Secure Resource Sharing for Embedded Protected Module Architectures

Jo Van Bulck , Job Noorman , Jan Tobias Mühlberg , Frank Piessens
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers hal-01442554v1
Image document

Tangible Voting: A Technique for Interacting with Group Choices on a Tangible Tabletop

Valérie Maquil , Eric Tobias , Thibaud Latour
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.79-86, ⟨10.1007/978-3-319-22723-8_7⟩
Conference papers hal-01610847v1
Image document

Type Checking Privacy Policies in the π-calculus

Dimitrios Kouzapas , Anna Philippou
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers hal-01767337v1
Image document

Using Photo Diaries to Elicit User Requirements from Older Adults: A Case Study on Mobility Barriers

David Swallow , Helen Petrie , Christopher Power , Alistair Edwards
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.147-164, ⟨10.1007/978-3-319-22701-6_11⟩
Conference papers hal-01599626v1