Filter your results
- 773
- 23
- 773
- 23
- 796
- 119
- 2
- 2
- 1
- 20
- 776
- 796
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 8
- 7
- 7
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Scrutinizing Open Government Data to Understand Patterns in eGovernment Uptake14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.144-155, ⟨10.1007/978-3-319-22479-4_11⟩
Conference papers
hal-01412246v1
|
||
|
Methods for Undertaking Research on Technology with Older and Disabled People15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.669-670, ⟨10.1007/978-3-319-22723-8_94⟩
Conference papers
hal-01610779v1
|
||
|
Relative Timed Model for Coordinated Multi Agent Systems5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.15-27, ⟨10.1007/978-3-319-19578-0_2⟩
Conference papers
hal-01789948v1
|
||
|
Estimating Visual Comfort in Stereoscopic Displays Using Electroencephalography: A Proof-of-Concept15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.354-362, ⟨10.1007/978-3-319-22723-8_28⟩
Conference papers
hal-01157890v1
|
||
|
U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.219-230, ⟨10.1007/978-3-319-24369-6_18⟩
Conference papers
hal-01444467v1
|
||
|
Telerobotic Surgery: Fuzzy Path Planning Control for a Telerobotic Assistant Surgery14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.297-304, ⟨10.1007/978-3-319-24369-6_24⟩
Conference papers
hal-01444473v1
|
||
|
A Novel Phase-Based Approach to Tear Film Surface Quality Assessment Using Lateral Shearing Interferometry14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.435-447, ⟨10.1007/978-3-319-24369-6_36⟩
Conference papers
hal-01444485v1
|
||
|
Inference Leakage Detection for Authorization Policies over RDF Data29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers
hal-01745813v1
|
||
|
The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT ReplicationInternational Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.112-125, ⟨10.1007/978-3-319-39028-4_9⟩
Conference papers
hal-01445797v1
|
||
|
Improved Iterative Methods for Verifying Markov Decision Processes6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.207-214, ⟨10.1007/978-3-319-24644-4_14⟩
Conference papers
hal-01446601v1
|
||
|
A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.305-320, ⟨10.1007/978-3-319-24123-4_18⟩
Conference papers
hal-01449065v1
|
||
|
Eyes and Keys: An Evaluation of Click Alternatives Combining Gaze and Keyboard15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.367-383, ⟨10.1007/978-3-319-22701-6_28⟩
Conference papers
hal-01599653v1
|
||
|
An Empirical Study of the Effects of Three Think-Aloud Protocols on Identification of Usability Problems15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.159-176, ⟨10.1007/978-3-319-22668-2_14⟩
Conference papers
hal-01599881v1
|
||
|
Tutorial: Modern Regression Techniques for HCI Researchers15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.651-654, ⟨10.1007/978-3-319-22723-8_86⟩
Conference papers
hal-01610866v1
|
||
|
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.129-133, ⟨10.1007/978-3-319-20034-7_13⟩
Conference papers
hal-01410159v1
|
||
|
On Symmetric and Choiceless Computation1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.23-29, ⟨10.1007/978-3-319-28678-5_2⟩
Conference papers
hal-01446261v1
|
||
|
The Impact of the TPM Weights Distribution on Network Synchronization Time14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.451-460, ⟨10.1007/978-3-319-24369-6_37⟩
Conference papers
hal-01444486v1
|
||
|
Eye Strain from Switching Focus in Optical See-Through Displays15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.550-554, ⟨10.1007/978-3-319-22723-8_59⟩
Conference papers
hal-01610863v1
|
||
|
Conceptualising the Digital Public in Government Crowdsourcing: Social Media and the Imagined Audience14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.19-30, ⟨10.1007/978-3-319-22479-4_2⟩
Conference papers
hal-01412232v1
|
||
|
Information Security Theory and PracticeRaja Naeem Akram; Sushil Jajodia. Springer, LNCS-9311, 2015, Information Security Theory and Practice, 978-3-319-24017-6. ⟨10.1007/978-3-319-24018-3⟩
Books
hal-01442559v1
|
||
|
The LuminUs: Providing Musicians with Visual Feedback on the Gaze and Body Motion of Their Co-performers15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.47-54, ⟨10.1007/978-3-319-22668-2_4⟩
Conference papers
hal-01599872v1
|
||
|
Personalized Composition of Trustful Reputation Systems29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.207-214, ⟨10.1007/978-3-319-20810-7_13⟩
Conference papers
hal-01745829v1
|
||
|
Novel Insights on Cross Project Fault Prediction Applied to Automotive Software27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.141-157, ⟨10.1007/978-3-319-25945-1_9⟩
Conference papers
hal-01470161v1
|
||
|
Game Mechanics Supporting Pervasive Learning and Experience in Games, Serious Games, and Interactive & Social Media14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.560-565, ⟨10.1007/978-3-319-24589-8_57⟩
Conference papers
hal-01758461v1
|
||
|
Leader Election Using NewSQL Database Systems15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.158-172, ⟨10.1007/978-3-319-19129-4_13⟩
Conference papers
hal-01775025v1
|
||
|
Working with Child Participants in Interaction Design15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.655-656, ⟨10.1007/978-3-319-22723-8_87⟩
Conference papers
hal-01610860v1
|
||
|
Information and Communication TechnologySpringer, LNCS-9357, 2015, Lecture Notes in Computer Science, 978-3-319-24314-6. ⟨10.1007/978-3-319-24315-3⟩
Books
hal-01466414v1
|
||
|
Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.124-140, ⟨10.1007/978-3-319-25945-1_8⟩
Conference papers
hal-01470160v1
|
||
|
Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.282-285, ⟨10.1007/978-3-319-24315-3_29⟩
Conference papers
hal-01466229v1
|
||
|
Comprehensive Performance Evaluation of Various Feature Extraction Methods for OCR Purposes14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.411-422, ⟨10.1007/978-3-319-24369-6_34⟩
Conference papers
hal-01444484v1
|