Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

796 results
Deposit type : Fulltext
Deposit type : Annex
Image document

Scrutinizing Open Government Data to Understand Patterns in eGovernment Uptake

Helle Zinner Henriksen
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.144-155, ⟨10.1007/978-3-319-22479-4_11⟩
Conference papers hal-01412246v1
Image document

Methods for Undertaking Research on Technology with Older and Disabled People

Helen Petrie , Blaithin Gallagher , Jenny Darzentas
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.669-670, ⟨10.1007/978-3-319-22723-8_94⟩
Conference papers hal-01610779v1
Image document

Relative Timed Model for Coordinated Multi Agent Systems

Said Layadi , Jean-Michel Ilie , Ilham Kitouni , Djamel-Eddine Saidouni
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.15-27, ⟨10.1007/978-3-319-19578-0_2⟩
Conference papers hal-01789948v1
Image document

Estimating Visual Comfort in Stereoscopic Displays Using Electroencephalography: A Proof-of-Concept

Jérémy Frey , Aurélien Appriou , Fabien Lotte , Martin Hachet
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.354-362, ⟨10.1007/978-3-319-22723-8_28⟩
Conference papers hal-01157890v1
Image document

U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device

Tapalina Bhattasali , Nabendu Chaki , Khalid Saeed , Rituparna Chaki
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.219-230, ⟨10.1007/978-3-319-24369-6_18⟩
Conference papers hal-01444467v1
Image document

Telerobotic Surgery: Fuzzy Path Planning Control for a Telerobotic Assistant Surgery

Rahma Boucetta
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.297-304, ⟨10.1007/978-3-319-24369-6_24⟩
Conference papers hal-01444473v1
Image document

A Novel Phase-Based Approach to Tear Film Surface Quality Assessment Using Lateral Shearing Interferometry

Piotr Szyperski , D. Robert Iskander
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.435-447, ⟨10.1007/978-3-319-24369-6_36⟩
Conference papers hal-01444485v1
Image document

Inference Leakage Detection for Authorization Policies over RDF Data

Tarek Sayah , Emmanuel Coquery , Romuald Thion , Mohand-Said Hacid
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers hal-01745813v1
Image document

The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication

Marko Vukolić
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.112-125, ⟨10.1007/978-3-319-39028-4_9⟩
Conference papers hal-01445797v1
Image document

Improved Iterative Methods for Verifying Markov Decision Processes

Jaber Karimpour , Ayaz Isazadeh , Mohammadsadegh Mohagheghi , Khayyam Salehi
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.207-214, ⟨10.1007/978-3-319-24644-4_14⟩
Conference papers hal-01446601v1
Image document

A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS

Shariq Murtuza , Robin Verma , Jayaprakash Govindaraj , Gaurav Gupta
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.305-320, ⟨10.1007/978-3-319-24123-4_18⟩
Conference papers hal-01449065v1
Image document

Eyes and Keys: An Evaluation of Click Alternatives Combining Gaze and Keyboard

Ken Neth Yeoh , Christof Lutteroth , Gerald Weber
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.367-383, ⟨10.1007/978-3-319-22701-6_28⟩
Conference papers hal-01599653v1
Image document

An Empirical Study of the Effects of Three Think-Aloud Protocols on Identification of Usability Problems

Anders Bruun , Jan Stage
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.159-176, ⟨10.1007/978-3-319-22668-2_14⟩
Conference papers hal-01599881v1
Image document

Tutorial: Modern Regression Techniques for HCI Researchers

Martin Schmettow
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.651-654, ⟨10.1007/978-3-319-22723-8_86⟩
Conference papers hal-01610866v1
Image document

Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking

Mattijs Jonker , Anna Sperotto
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.129-133, ⟨10.1007/978-3-319-20034-7_13⟩
Conference papers hal-01410159v1
Image document

On Symmetric and Choiceless Computation

Anuj Dawar
1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.23-29, ⟨10.1007/978-3-319-28678-5_2⟩
Conference papers hal-01446261v1
Image document

The Impact of the TPM Weights Distribution on Network Synchronization Time

Michał Dolecki , Ryszard Kozera
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.451-460, ⟨10.1007/978-3-319-24369-6_37⟩
Conference papers hal-01444486v1
Image document

Eye Strain from Switching Focus in Optical See-Through Displays

Jaeun Yu , Gerard J. Kim
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.550-554, ⟨10.1007/978-3-319-22723-8_59⟩
Conference papers hal-01610863v1
Image document

Conceptualising the Digital Public in Government Crowdsourcing: Social Media and the Imagined Audience

Panos Panagiotopoulos , Frances Bowen
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.19-30, ⟨10.1007/978-3-319-22479-4_2⟩
Conference papers hal-01412232v1

Information Security Theory and Practice

Raja Naeem Akram , Sushil Jajodia
Raja Naeem Akram; Sushil Jajodia. Springer, LNCS-9311, 2015, Information Security Theory and Practice, 978-3-319-24017-6. ⟨10.1007/978-3-319-24018-3⟩
Books hal-01442559v1
Image document

The LuminUs: Providing Musicians with Visual Feedback on the Gaze and Body Motion of Their Co-performers

Evan Morgan , Hatice Gunes , Nick Bryan-Kinns
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.47-54, ⟨10.1007/978-3-319-22668-2_4⟩
Conference papers hal-01599872v1
Image document

Personalized Composition of Trustful Reputation Systems

Johannes Sänger , Christian Richthammer , André Kremser , Günther Pernul
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.207-214, ⟨10.1007/978-3-319-20810-7_13⟩
Conference papers hal-01745829v1
Image document

Novel Insights on Cross Project Fault Prediction Applied to Automotive Software

Harald Altinger , Steffen Herbold , Jens Grabowski , Franz Wotawa
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.141-157, ⟨10.1007/978-3-319-25945-1_9⟩
Conference papers hal-01470161v1
Image document

Game Mechanics Supporting Pervasive Learning and Experience in Games, Serious Games, and Interactive & Social Media

J. Hauge , T. Lim , S. Louchart , I. A. Stanescu , M. Ma , et al.
14th International Conference on Entertainment Computing (ICEC), Sep 2015, Trondheim, Norway. pp.560-565, ⟨10.1007/978-3-319-24589-8_57⟩
Conference papers hal-01758461v1
Image document

Leader Election Using NewSQL Database Systems

Mahmoud Ismail , Gautier Berthou , Jim Dowling , Salman Niazi
15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.158-172, ⟨10.1007/978-3-319-19129-4_13⟩
Conference papers hal-01775025v1
Image document

Working with Child Participants in Interaction Design

Janet C. Read
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.655-656, ⟨10.1007/978-3-319-22723-8_87⟩
Conference papers hal-01610860v1

Information and Communication Technology

Ismail Khalil , Erich Neuhold , a Min Tjoa , Li da Xu , Ilsun You
Springer, LNCS-9357, 2015, Lecture Notes in Computer Science, 978-3-319-24314-6. ⟨10.1007/978-3-319-24315-3⟩
Books hal-01466414v1
Image document

Testing for Distinguishing Repair Candidates in Spreadsheets – the Mussco Approach

Rui Abreu , Simon Ausserlechner , Birgit Hofer , Franz Wotawa
27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. pp.124-140, ⟨10.1007/978-3-319-25945-1_8⟩
Conference papers hal-01470160v1
Image document

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution

Bo Liu , Baokang Zhao , Chunqing Wu , Wanrong Yu , Ilsun You
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.282-285, ⟨10.1007/978-3-319-24315-3_29⟩
Conference papers hal-01466229v1
Image document

Comprehensive Performance Evaluation of Various Feature Extraction Methods for OCR Purposes

Dawid Sas , Khalid Saeed
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.411-422, ⟨10.1007/978-3-319-24369-6_34⟩
Conference papers hal-01444484v1