Filter your results
- 773
- 23
- 773
- 773
- 119
- 2
- 2
- 1
- 20
- 753
- 773
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
A Model for an Aggression Discovery Through Person Online Behavior14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.305-315, ⟨10.1007/978-3-319-24369-6_25⟩
Conference papers
hal-01444474v1
|
||
|
Citizen-to-Citizen vs. Citizen-to-Government eParticipation in Uganda: Implications for Research and Practice7th International Conference on Electronic Participation (ePart), Aug 2015, Thessaloniki, Greece. pp.95-107, ⟨10.1007/978-3-319-22500-5_8⟩
Conference papers
hal-01587638v1
|
||
|
Privacy Preserving Record Matching Using Automated Semi-trusted Broker29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.103-118, ⟨10.1007/978-3-319-20810-7_7⟩
Conference papers
hal-01745819v1
|
||
|
Restricted Density Classification in One Dimension21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.238-250, ⟨10.1007/978-3-662-47221-7_18⟩
Conference papers
hal-01442476v1
|
||
|
Formal Verification of Service Level Agreements Through Distributed Monitoring4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.125-140, ⟨10.1007/978-3-319-24072-5_9⟩
Conference papers
hal-01757576v1
|
||
|
A Negative Input Space Complexity Metric as Selection Criterion for Fuzz Testing27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.257-262, ⟨10.1007/978-3-319-25945-1_17⟩
Conference papers
hal-01470152v1
|
||
|
Preference Elicitation and Negotiation in a Group Recommender System15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.20-37, ⟨10.1007/978-3-319-22668-2_2⟩
Conference papers
hal-01599849v1
|
||
|
What Users Prefer and Why: A User Study on Effective Presentation Styles of Opinion Summarization15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.249-264, ⟨10.1007/978-3-319-22668-2_20⟩
Conference papers
hal-01599891v1
|
||
|
A Pre-congruence Format for XY-simulation6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.215-229, ⟨10.1007/978-3-319-24644-4_15⟩
Conference papers
hal-01446602v1
|
||
|
Technology Experience Research: A Framework for Experience Oriented Technology Development15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.626-627, ⟨10.1007/978-3-319-22723-8_77⟩
Conference papers
hal-01610856v1
|
||
|
Simple Games – Complex Emotions: Automated Affect Detection Using Physiological Signals14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.375-382, ⟨10.1007/978-3-319-24589-8_29⟩
Conference papers
hal-01758436v1
|
||
|
How Current Android Malware Seeks to Evade Automated Code Analysis9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers
hal-01442542v1
|
||
|
Investigating Representation Alternatives for Communicating Uncertainty to Non-experts15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.256-263, ⟨10.1007/978-3-319-22723-8_21⟩
Conference papers
hal-01610771v1
|
||
|
The Landscape of UX Requirements Practices15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.673-674, ⟨10.1007/978-3-319-22723-8_96⟩
Conference papers
hal-01610780v1
|
||
|
Opinion Mining and Sentiment Analysis in Policy Formulation Initiatives: The EU-Community Approach7th International Conference on Electronic Participation (ePart), Aug 2015, Thessaloniki, Greece. pp.147-160, ⟨10.1007/978-3-319-22500-5_12⟩
Conference papers
hal-01587635v1
|
||
|
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.77-88, ⟨10.1007/978-3-319-24315-3_8⟩
Conference papers
hal-01466413v1
|
||
|
How Asymmetric Is the Internet?9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.113-125, ⟨10.1007/978-3-319-20034-7_12⟩
Conference papers
hal-01410157v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Tangible Voting: A Technique for Interacting with Group Choices on a Tangible Tabletop15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.79-86, ⟨10.1007/978-3-319-22723-8_7⟩
Conference papers
hal-01610847v1
|
||
|
Type Checking Privacy Policies in the π-calculus35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers
hal-01767337v1
|
||
|
A Network-Driven Multi-Access-Point Load-Balancing Algorithm for Large-Scale Public Hotspots9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.30-42, ⟨10.1007/978-3-319-20034-7_3⟩
Conference papers
hal-01410140v1
|
||
|
Incorporating Big Data Analytics into Enterprise Information Systems3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.300-309, ⟨10.1007/978-3-319-24315-3_31⟩
Conference papers
hal-01466248v1
|
||
|
An Empirical Investigation of the Practices and Challenges Specific to International User Studies15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.132-148, ⟨10.1007/978-3-319-22698-9_10⟩
Conference papers
hal-01609381v1
|
||
|
Towards Smart City Learning: Contextualizing Geometry Learning with a Van Hiele Inspired Location-Aware Game14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.399-406, ⟨10.1007/978-3-319-24589-8_32⟩
Conference papers
hal-01758470v1
|
||
|
MovemenTable: The Design of Moving Interactive Tabletops15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.296-314, ⟨10.1007/978-3-319-22698-9_19⟩
Conference papers
hal-01609419v1
|
||
|
Measuring Latency in Virtual Reality Systems14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.457-462, ⟨10.1007/978-3-319-24589-8_40⟩
Conference papers
hal-01758473v1
|
||
|
What Is This Thing Called e-Service? Interoperability Challenges in e-Service Modelling14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.197-208, ⟨10.1007/978-3-319-22479-4_15⟩
Conference papers
hal-01412255v1
|
||
|
Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.73-86, ⟨10.1007/978-3-319-20034-7_9⟩
Conference papers
hal-01410151v1
|
||
|
Evaluation of the Employment of Machine Learning Approaches and Strategies for Service Recommendation4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.95-109, ⟨10.1007/978-3-319-24072-5_7⟩
Conference papers
hal-01757568v1
|
||
|
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.310-319, ⟨10.1007/978-3-319-24315-3_32⟩
Conference papers
hal-01466232v1
|