Filter your results
- 753
- 23
- 753
- 753
- 119
- 2
- 2
- 1
- 753
- 20
- 753
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Driving Innovation Using Big Open Linked Data (BOLD) Panel14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.3-9, ⟨10.1007/978-3-319-25013-7_1⟩
Conference papers
hal-01448043v1
|
||
|
Designing Viable Multi-sided Data Platforms: The Case of Context-Aware Mobile Travel Applications14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.354-365, ⟨10.1007/978-3-319-25013-7_28⟩
Conference papers
hal-01448052v1
|
||
|
Transparency Dimensions of Big and Open Linked Data14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.236-246, ⟨10.1007/978-3-319-25013-7_19⟩
Conference papers
hal-01448042v1
|
||
|
A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.381-393, ⟨10.1007/978-3-319-19578-0_31⟩
Conference papers
hal-01789978v1
|
||
|
A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.411-424
Conference papers
hal-01728801v1
|
||
|
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.85-100, ⟨10.1007/978-3-319-20810-7_6⟩
Conference papers
hal-01745831v1
|
||
|
A Survey on Wireless Sensors Networks Security Based on a Layered Approach13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.77-93, ⟨10.1007/978-3-319-22572-2_6⟩
Conference papers
hal-01728805v1
|
||
|
Using IMUs to Identify Supervisors on Touch Devices15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.565-583, ⟨10.1007/978-3-319-22668-2_44⟩
Conference papers
hal-01599873v1
|
||
|
A Decentralized Approach to Network-Aware Service Composition4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.34-48, ⟨10.1007/978-3-319-24072-5_3⟩
Conference papers
hal-01757563v1
|
||
|
A Network-Driven Multi-Access-Point Load-Balancing Algorithm for Large-Scale Public Hotspots9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.30-42, ⟨10.1007/978-3-319-20034-7_3⟩
Conference papers
hal-01410140v1
|
||
|
Incorporating Big Data Analytics into Enterprise Information Systems3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.300-309, ⟨10.1007/978-3-319-24315-3_31⟩
Conference papers
hal-01466248v1
|
||
|
An Empirical Investigation of the Practices and Challenges Specific to International User Studies15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.132-148, ⟨10.1007/978-3-319-22698-9_10⟩
Conference papers
hal-01609381v1
|
||
|
Towards Smart City Learning: Contextualizing Geometry Learning with a Van Hiele Inspired Location-Aware Game14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.399-406, ⟨10.1007/978-3-319-24589-8_32⟩
Conference papers
hal-01758470v1
|
||
|
MovemenTable: The Design of Moving Interactive Tabletops15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.296-314, ⟨10.1007/978-3-319-22698-9_19⟩
Conference papers
hal-01609419v1
|
||
|
Measuring Latency in Virtual Reality Systems14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.457-462, ⟨10.1007/978-3-319-24589-8_40⟩
Conference papers
hal-01758473v1
|
||
|
What Is This Thing Called e-Service? Interoperability Challenges in e-Service Modelling14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.197-208, ⟨10.1007/978-3-319-22479-4_15⟩
Conference papers
hal-01412255v1
|
||
|
Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.73-86, ⟨10.1007/978-3-319-20034-7_9⟩
Conference papers
hal-01410151v1
|
||
|
Evaluation of the Employment of Machine Learning Approaches and Strategies for Service Recommendation4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.95-109, ⟨10.1007/978-3-319-24072-5_7⟩
Conference papers
hal-01757568v1
|
||
|
Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.310-319, ⟨10.1007/978-3-319-24315-3_32⟩
Conference papers
hal-01466232v1
|
||
|
Embedding and Implementation of Quantum Computational Concepts in Digital Narratives14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.140-154, ⟨10.1007/978-3-319-24589-8_11⟩
Conference papers
hal-01758430v1
|
||
|
Dynamic Message Processing and Transactional Memory in the Actor Model15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.94-107, ⟨10.1007/978-3-319-19129-4_8⟩
Conference papers
hal-01775027v1
|
||
|
A Mobile Game Controller Adapted to the Gameplay and User’s Behavior Using Machine Learning14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.3-16, ⟨10.1007/978-3-319-24589-8_1⟩
Conference papers
hal-01758427v1
|
||
|
Replica-Based High-Performance Tuple Space Computing17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.3-18, ⟨10.1007/978-3-319-19282-6_1⟩
Conference papers
hal-01774936v1
|
||
|
Mobile System for Optical Music Recognition and Music Sound Generation14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.571-582, ⟨10.1007/978-3-319-24369-6_48⟩
Conference papers
hal-01444498v1
|
||
|
Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.193-202, ⟨10.1007/978-3-319-24315-3_19⟩
Conference papers
hal-01466219v1
|
||
|
Serious Games: Is Your User Playing or Hunting?14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.475-481, ⟨10.1007/978-3-319-24589-8_43⟩
Conference papers
hal-01758419v1
|
||
|
Klaim-DB: A Modeling Language for Distributed Database Applications17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.197-212, ⟨10.1007/978-3-319-19282-6_13⟩
Conference papers
hal-01774934v1
|
||
|
Learning Lessons from Controlled Studies to Investigate Users’ Resilience Strategies15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.578-581, ⟨10.1007/978-3-319-22723-8_65⟩
Conference papers
hal-01610786v1
|
||
|
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.333-342, ⟨10.1007/978-3-319-24315-3_34⟩
Conference papers
hal-01466234v1
|
||
|
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.30-39, ⟨10.1007/978-3-319-24315-3_4⟩
Conference papers
hal-01466237v1
|