Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

773 results
Deposit type : Fulltext
Image document

X-Ray: Monitoring and Analysis of Distributed Database Queries

Pedro Guimarães , José Pereira
15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.80-93, ⟨10.1007/978-3-319-19129-4_7⟩
Conference papers hal-01775031v1
Image document

Social Validation of Solutions in the Context of Online Communities

Lydia Nahla Driff , Lamia Berkani , Ahmed Guessoum , Abdellah Bendjahel
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.93-104, ⟨10.1007/978-3-319-19578-0_8⟩
Conference papers hal-01789983v1
Image document

Analyzing Mutable Checkpointing via Invariants

Deepanker Aggarwal , Astrid Kiehn
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.176-190, ⟨10.1007/978-3-319-24644-4_12⟩
Conference papers hal-01446599v1
Image document

Efficient Architecture-Level Configuration of Large-Scale Embedded Software Systems

Razieh Behjati , Shiva Nejati
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.110-126, ⟨10.1007/978-3-319-24644-4_8⟩
Conference papers hal-01446633v1
Image document

Merging Cellular Automata Rules to Optimise a Solution to the Modulo-n Problem

Claudio M. Martins , Pedro De Oliveira
21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.196-209, ⟨10.1007/978-3-662-47221-7_15⟩
Conference papers hal-01442473v1
Image document

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Qiao Hu , Lavinia Mihaela Dinca , Gerhard Hancke
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.219-234, ⟨10.1007/978-3-319-24018-3_14⟩
Conference papers hal-01442545v1
Image document

Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

Tassos Dimitriou , Ioannis Krontiris
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.20-35, ⟨10.1007/978-3-319-24018-3_2⟩
Conference papers hal-01442551v1
Image document

NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS

Segen Tewelde , Stefan Gruner , Martin Olivier
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.29-43, ⟨10.1007/978-3-319-24123-4_2⟩
Conference papers hal-01449069v1
Image document

Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches

Waffa Setra , Rachid Chalal , Mohamed Lamine Chouder
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.254-265, ⟨10.1007/978-3-319-19578-0_21⟩
Conference papers hal-01789961v1
Image document

Comparing Concurrent and Retrospective Verbal Protocols for Blind and Sighted Users

Andreas Savva , Helen Petrie , Christopher Power
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-71, ⟨10.1007/978-3-319-22701-6_5⟩
Conference papers hal-01599628v1
Image document

EmbodiNet: Enriching Distributed Musical Collaboration Through Embodied Interactions

Dalia El-Shimy , Jeremy R. Cooperstock
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.1-19, ⟨10.1007/978-3-319-22668-2_1⟩
Conference papers hal-01599860v1
Image document

Comparing Local e-Government Websites in Canada and the UK

Laurence Brooks , Alexander Persaud
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.291-304, ⟨10.1007/978-3-319-22479-4_22⟩
Conference papers hal-01412281v1
Image document

Continuous Mental Effort Evaluation during 3D Object Manipulation Tasks based on Brain and Physiological Signals

Dennis Wobrock , Jérémy Frey , Delphine Graeff , Jean-Baptiste de La Rivière , Julien Castet , et al.
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.472-487, ⟨10.1007/978-3-319-22668-2_35⟩
Conference papers hal-01157896v1
Image document

WSACd - A Usable Access Control Framework for Smart Home Devices

Konstantinos Fysarakis , Charalampos Konstantourakis , Konstantinos Rantos , Charalampos Manifavas , Ioannis Papaefstathiou
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.120-133, ⟨10.1007/978-3-319-24018-3_8⟩
Conference papers hal-01442557v1
Image document

A MapReduce Based Distributed Framework for Similarity Search in Healthcare Big Data Environment

Hiren K.D. Sarma , Yogesh K. Dwivedi , Nripendra P. Rana , Emma L. Slade
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.173-182, ⟨10.1007/978-3-319-25013-7_14⟩
Conference papers hal-01448037v1
Image document

Benchmarks for Parity Games

Jeroen A. Keiren
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.127-142, ⟨10.1007/978-3-319-24644-4_9⟩
Conference papers hal-01446614v1
Image document

A Battle of Wit: Applying Computational Humour to Game Design

Dormann Claire
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.72-85, ⟨10.1007/978-3-319-24589-8_6⟩
Conference papers hal-01758416v1
Image document

Sliced Path Prefixes: An Effective Method to Enable Refinement Selection

Dirk Beyer , Stefan Löwe , Philipp Wendler
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.228-243, ⟨10.1007/978-3-319-19195-9_15⟩
Conference papers hal-01767324v1
Image document

Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols

Alejandro Calleja , Pedro Peris-Lopez , Juan E. Tapiador
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.36-51, ⟨10.1007/978-3-319-24018-3_3⟩
Conference papers hal-01442552v1
Image document

Text Touching Effects in Active Reading: The Impact of the Use of a Touch-Based Tablet Device

Hirohito Shibata , Kentaro Takano , Shun’ichi Tano
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.559-576, ⟨10.1007/978-3-319-22701-6_41⟩
Conference papers hal-01599623v1
Image document

FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS

Yanbin Tang , Zheng Tan , Kam-Pui Chow , Siu-Ming Yiu , Junbin Fang , et al.
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers hal-01449060v1
Image document

A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM

Panagiotis Andriotis , Theo Tryfonas , George Oikonomou , Irwin King
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.251-267, ⟨10.1007/978-3-319-24123-4_15⟩
Conference papers hal-01449062v1
Image document

Tutorial: Service-Oriented Architecture (SOA) Development for Serious Games

Maira B. Carvalho , Jun Hu , Francesco Bellotti , Alessandro De Gloria , Matthias Rauterberg
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.578-580, ⟨10.1007/978-3-319-24589-8_61⟩
Conference papers hal-01758448v1
Image document

Service Repository for Cloud Service Consumer Life Cycle Management

Hong Thai Tran , George Feuerlicht
4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.171-180, ⟨10.1007/978-3-319-24072-5_12⟩
Conference papers hal-01757573v1
Image document

Schengen Routing: A Compliance Analysis

Daniel Dönni , Guilherme Sperb Machado , Christos Tsiaras , Burkhard Stiller
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.100-112, ⟨10.1007/978-3-319-20034-7_11⟩
Conference papers hal-01410156v1
Image document

Towards an Adaptive and Effective IDS Using OpenFlow

Sebastian Seeber , Gabi Dreo Rodosek
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.134-139, ⟨10.1007/978-3-319-20034-7_14⟩
Conference papers hal-01410161v1
Image document

Investigation of DDoS Attacks by Hybrid Simulation

Yana Bekeneva , Konstantin Borisenko , Andrey Shorov , Igor Kotenko
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.179-189, ⟨10.1007/978-3-319-24315-3_18⟩
Conference papers hal-01466218v1
Image document

Corporate Social Responsibility in Social Media Environment

Antonín Pavlíček , Petr Doucek
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.323-332, ⟨10.1007/978-3-319-24315-3_33⟩
Conference papers hal-01466233v1
Image document

Test-Data Generation for Testing Parallel Real-Time Systems

Muhammad Waqar Aziz , Syed Baqi Shah
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.211-223, ⟨10.1007/978-3-319-25945-1_13⟩
Conference papers hal-01470169v1
Image document

Loop Freedom in AODVv2

Kedar S. Namjoshi , Richard J. Trefler
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.98-112, ⟨10.1007/978-3-319-19195-9_7⟩
Conference papers hal-01767329v1