Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

533 results
Deposit type : Fulltext
Image document

Probability Functions in the Context of Signed Involutive Meadows (Extended Abstract)

Jan A. Bergstra , Alban Ponse
23th International Workshop on Algebraic Development Techniques (WADT), Sep 2016, Gregynog, United Kingdom. pp.73-87, ⟨10.1007/978-3-319-72044-9_6⟩
Conference papers hal-01767464v1
Image document

The Complexity of Languages Resulting from the Concatenation Operation

Galina Jirásková , Alexander Szabari , Juraj Šebej
18th International Workshop on Descriptional Complexity of Formal Systems (DCFS), Jul 2016, Bucharest, Romania. pp.153-167, ⟨10.1007/978-3-319-41114-9_12⟩
Conference papers hal-01633946v1
Image document

A Configurable CEGAR Framework with Interpolation-Based Refinements

Ákos Hajdu , Tamás Tóth , András Vörös , István Majzik
36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.158-174, ⟨10.1007/978-3-319-39570-8_11⟩
Conference papers hal-01432916v1
Image document

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

Jason Crampton , James Sellwood
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers hal-01633675v1
Image document

An Efficient Construction of a Compression Function for Cryptographic Hash

Rashed Mazumder , Atsuko Miyaji , Chunhua Su
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.124-140, ⟨10.1007/978-3-319-45507-5_9⟩
Conference papers hal-01635014v1
Image document

Predicting People’s Intention Towards Sharing Political Contents in Social Media: The Moderating Effect of Collective Opinion

Mohammad Alamgir Hossain , Caroline Chan , Yogesh Dwivedi
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.646-657, ⟨10.1007/978-3-319-45234-0_58⟩
Conference papers hal-01702193v1
Image document

Endev: Declarative Prototyping with Data

Filip Kis , Cristian Bogdan
6th International Conference on Human-Centred Software Engineering (HCSE) / 8th International Conference on Human Error, Safety, and System Development (HESSD), Aug 2016, Stockholm, Sweden. pp.359-365, ⟨10.1007/978-3-319-44902-9_23⟩
Conference papers hal-01647720v1
Image document

Cross-Context Linking Concepts Discovery in E-Government Literature

Bojan Cestnik , Alenka Kern
5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.19-30, ⟨10.1007/978-3-319-44421-5_2⟩
Conference papers hal-01636448v1
Image document

Are Software Developers Just Users of Development Tools? Assessing Developer Experience of a Graphical User Interface Designer

Kati Kuusinen
6th International Conference on Human-Centred Software Engineering (HCSE) / 8th International Conference on Human Error, Safety, and System Development (HESSD), Aug 2016, Stockholm, Sweden. pp.215-233, ⟨10.1007/978-3-319-44902-9_14⟩
Conference papers hal-01647699v1
Image document

Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning

Eina Hashimoto , Masatsugu Ichino , Tetsuji Kuboyama , Isao Echizen , Hiroshi Yoshiura
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.455-470, ⟨10.1007/978-3-319-45234-0_41⟩
Conference papers hal-01702149v1
Image document

Consumer Intentions on Social Media: A fsQCA Analysis of Motivations

Patrick Mikalef , Ilias O. Pappas , Michail Giannakos
15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.371-386, ⟨10.1007/978-3-319-45234-0_34⟩
Conference papers hal-01702203v1
Image document

Assessment of Flood Vulnerability Using Fuzzy Logic and Geographical Information Systems

Valentina Nikolova , Plamena Zlateva
1st International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Nov 2016, Sofia, Bulgaria. pp.254-265, ⟨10.1007/978-3-319-68486-4_20⟩
Conference papers hal-03213127v1
Image document

A Study on Fuzzy Cognitive Map Optimization Using Metaheuristics

Aleksander Cisłak , Władysław Homenda , Agnieszka Jastrzębska
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.577-588, ⟨10.1007/978-3-319-45378-1_51⟩
Conference papers hal-01637479v1
Image document

Attribute Grammars for Controlling House Layout Customization

Władysław Homenda , Krystian Kwieciński
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.707-719, ⟨10.1007/978-3-319-45378-1_61⟩
Conference papers hal-01637489v1
Image document

How Playstyles Evolve: Progression Analysis and Profiling in Just Cause 2

Johanna Pirker , Simone Griesmayr , Anders Drachen , Rafet Sifa
15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.90-101, ⟨10.1007/978-3-319-46100-7_8⟩
Conference papers hal-01640296v1
Image document

A Short Survey on Using Software Error Localization for Service Compositions

Julia Krämer , Heike Wehrheim
5th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2016, Vienna, Austria. pp.248-262, ⟨10.1007/978-3-319-44482-6_16⟩
Conference papers hal-01638583v1
Image document

Combining Third Party Components Securely in Automotive Systems

Madeline Cheah , Siraj A. Shaikh , Jeremy Bryans , Hoang Nga Nguyen
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.262-269, ⟨10.1007/978-3-319-45931-8_18⟩
Conference papers hal-01639623v1
Image document

Scalability and Information Exchange Among Autonomous Resource Management Agents

Siri Fagernes , Alva L. Couch
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.160-164, ⟨10.1007/978-3-319-39814-3_18⟩
Conference papers hal-01632749v1
Image document

Integrating Digital Migrants: Solutions for Cross-Border Identification from E-Residency to eIDAS. A Case Study from Estonia

Gerli Aavik , Robert Krimmer
5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.151-163, ⟨10.1007/978-3-319-44421-5_12⟩
Conference papers hal-01636451v1
Image document

Providing CUDA Acceleration to KVM Virtual Machines in InfiniBand Clusters with rCUDA

Ferran Pérez , Carlos Reaño , Federico Silla
16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.82-95, ⟨10.1007/978-3-319-39577-7_7⟩
Conference papers hal-01434802v1
Image document

Provable Network Activity for Protecting Users Against False Accusation

Panagiotis Papadopoulos , Elias Athanasopoulos , Eleni Kosta , George Siganos , Angelos D. Keromytis , et al.
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.254-261, ⟨10.1007/978-3-319-45931-8_17⟩
Conference papers hal-01639610v1
Image document

On Determination of Balance Ratio for Some Tree Structures

Daxin Zhu , Tinran Wang , Xiaodong Wang
13th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2016, Xi'an, China. pp.205-212, ⟨10.1007/978-3-319-47099-3_17⟩
Conference papers hal-01647999v1
Image document

Unary Self-verifying Symmetric Difference Automata

Laurette Marais , Lynette Van Zijl
18th International Workshop on Descriptional Complexity of Formal Systems (DCFS), Jul 2016, Bucharest, Romania. pp.180-191, ⟨10.1007/978-3-319-41114-9_14⟩
Conference papers hal-01633957v1
Image document

A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models

Prosunjit Biswas , Ravi Sandhu , Ram Krishnan
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.122-129, ⟨10.1007/978-3-319-41483-6_9⟩
Conference papers hal-01633664v1
Image document

Data Aware Communication for Energy Harvesting Sensor Networks

Mohamed S. Hefeida , Fahad Saeed
14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.121-132, ⟨10.1007/978-3-319-33936-8_10⟩
Conference papers hal-01434847v1
Image document

On the Logic of Generalised Metric Spaces

Octavian Babus , Alexander Kurz
13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.136-155, ⟨10.1007/978-3-319-40370-0_9⟩
Conference papers hal-01446037v1
Image document

A Forensic Methodology for Analyzing Nintendo 3DS Devices

Huw Read , Elizabeth Thomas , Iain Sutherland , Konstantinos Xynos , Mikhaila Burgess
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.127-143, ⟨10.1007/978-3-319-46279-0_7⟩
Conference papers hal-01758689v1
Image document

The Goals Approach: Enterprise Model-Driven Agile Human-Centered Software Engineering

Pedro Valente , Thiago Rocha Silva , Marco Winckler , Nuno Jardim Nunes
6th International Conference on Human-Centred Software Engineering (HCSE 2016), Aug 2016, Stockholm, Sweden. pp.261-280, ⟨10.1007/978-3-319-44902-9_17⟩
Conference papers hal-01647713v1
Image document

Complex Adaptive Systems and Interactive Granular Computing

Andrzej Skowron
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.17-22, ⟨10.1007/978-3-319-45378-1_2⟩
Conference papers hal-01637517v1
Image document

Formal Methods for Safe Design of Autonomous Systems Dedicated to Risk Management

Sophie Coudert , Tullio Tanzi
1st International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Nov 2016, Sofia, Bulgaria. pp.61-76, ⟨10.1007/978-3-319-68486-4_6⟩
Conference papers hal-03213130v1