Filter your results
- 533
- 533
- 532
- 119
- 1
- 37
- 40
- 493
- 533
- 5
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.52-60, ⟨10.1007/978-3-319-41483-6_4⟩
Conference papers
hal-01633688v1
|
||
|
Towards a QoS-Oriented Migration Management Approach for Virtualized Networks10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.57-61, ⟨10.1007/978-3-319-39814-3_6⟩
Conference papers
hal-01632733v1
|
||
|
An NFC Relay Attack with Off-the-shelf Hardware and Software10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.71-83, ⟨10.1007/978-3-319-39814-3_8⟩
Conference papers
hal-01632735v1
|
||
|
Counteracting Active Attacks in Social Network Graphs30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers
hal-01633668v1
|
||
|
Descriptional Complexity of Bounded Regular Languages18th International Workshop on Descriptional Complexity of Formal Systems (DCFS), Jul 2016, Bucharest, Romania. pp.138-152, ⟨10.1007/978-3-319-41114-9_11⟩
Conference papers
hal-01633949v1
|
||
|
Operations on Weakly Recognizing Morphisms18th International Workshop on Descriptional Complexity of Formal Systems (DCFS), Jul 2016, Bucharest, Romania. pp.126-137, ⟨10.1007/978-3-319-41114-9_10⟩
Conference papers
hal-01633955v1
|
||
|
Do You Own a Volkswagen? Values as Non-Functional Requirements6th International Conference on Human-Centred Software Engineering (HCSE) / 8th International Conference on Human Error, Safety, and System Development (HESSD), Aug 2016, Stockholm, Sweden. pp.151-162, ⟨10.1007/978-3-319-44902-9_10⟩
Conference papers
hal-01647711v1
|
||
|
Framework for Relative Web Usability Evaluation on Usability Features in MDD6th International Conference on Human-Centred Software Engineering (HCSE) / 8th International Conference on Human Error, Safety, and System Development (HESSD), Aug 2016, Stockholm, Sweden. pp.73-85, ⟨10.1007/978-3-319-44902-9_6⟩
Conference papers
hal-01647714v1
|
||
|
Keep the Beat: Audio Guidance for Runner Training6th International Conference on Human-Centred Software Engineering (HCSE) / 8th International Conference on Human Error, Safety, and System Development (HESSD), Aug 2016, Stockholm, Sweden. pp.246-257, ⟨10.1007/978-3-319-44902-9_16⟩
Conference papers
hal-01647721v1
|
||
|
Relational Lattices via Duality13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.195-215, ⟨10.1007/978-3-319-40370-0_12⟩
Conference papers
hal-01446027v1
|
||
|
Enrichment of Story Reading with Digital Media15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.281-285, ⟨10.1007/978-3-319-46100-7_30⟩
Conference papers
hal-01640298v1
|
||
|
Effective Capacity in Broadcast Channels with Arbitrary Inputs14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.323-334, ⟨10.1007/978-3-319-33936-8_25⟩
Conference papers
hal-01434862v1
|
||
|
Influence of Backoff Period in Slotted CSMA/CA of IEEE 802.15.414th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.40-51, ⟨10.1007/978-3-319-33936-8_4⟩
Conference papers
hal-01434866v1
|
||
|
Towards Creating Believable Decoy Project Folders for Detecting Data Theft30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.161-169, ⟨10.1007/978-3-319-41483-6_12⟩
Conference papers
hal-01633683v1
|
||
|
Social Customer Relationship Management as Predictor of Customer Relationship Performance: An Empirical Study of B2B and B2C Companies15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.173-182, ⟨10.1007/978-3-319-45234-0_16⟩
Conference papers
hal-01702188v1
|
||
|
Strategy Reformation? Materialization of Social Media in Telecom Industry15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.31-41, ⟨10.1007/978-3-319-45234-0_3⟩
Conference papers
hal-01702154v1
|
||
|
Password Generators: Old Ideas and New10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.245-253, ⟨10.1007/978-3-319-45931-8_16⟩
Conference papers
hal-01639616v1
|
||
|
Accelerating the Physical Experience of Immersive and Penetrating Music Using Vibration-Motor Array in a Wearable Belt Set15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.173-186, ⟨10.1007/978-3-319-46100-7_15⟩
Conference papers
hal-01640270v1
|
||
|
Skull Stripping for MRI Images Using Morphological Operators15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.172-182, ⟨10.1007/978-3-319-45378-1_16⟩
Conference papers
hal-01637463v1
|
||
|
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical AnalysisInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.236-250, ⟨10.1007/978-3-319-45507-5_16⟩
Conference papers
hal-01635009v1
|
||
|
Modeling Cyber Systemic Risk for the Business Continuity Plan of a BankInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.158-174, ⟨10.1007/978-3-319-45507-5_11⟩
Conference papers
hal-01635016v1
|
||
|
Construction of Enterprise Architecture in Discourses Within the Public Sector5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.287-298, ⟨10.1007/978-3-319-44421-5_23⟩
Conference papers
hal-01636469v1
|
||
|
Open Data Innovation Capabilities: Towards a Framework of How to Innovate with Open Data5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.47-60, ⟨10.1007/978-3-319-44421-5_4⟩
Conference papers
hal-01636444v1
|
||
|
Enforcing Availability in Failure-Aware Communicating Systems36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.195-211, ⟨10.1007/978-3-319-39570-8_13⟩
Conference papers
hal-01432918v1
|
||
|
Using Facebook to Find Missing Persons: A Crowd-Sourcing Perspective15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.685-694, ⟨10.1007/978-3-319-45234-0_61⟩
Conference papers
hal-01702184v1
|
||
|
Information Density Based Image Binarization for Text Document Containing Graphics15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.105-115, ⟨10.1007/978-3-319-45378-1_10⟩
Conference papers
hal-01637461v1
|
||
|
Privacy-Preserving Data Allocation in Decentralized Online Social Networks16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.47-60, ⟨10.1007/978-3-319-39577-7_4⟩
Conference papers
hal-01434799v1
|
||
|
A Revisit of the Measurements on Engagement in Videogames: A New Scale Development15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.247-252, ⟨10.1007/978-3-319-46100-7_25⟩
Conference papers
hal-01640282v1
|
||
|
Towards Automatic Risk Analysis and Mitigation of Software Applications10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.120-135, ⟨10.1007/978-3-319-45931-8_8⟩
Conference papers
hal-01639603v1
|
||
|
Controllability Through Nondeterminism in Distributed Testing28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.89-105, ⟨10.1007/978-3-319-47443-4_6⟩
Conference papers
hal-01643709v1
|