Filter your results
- 533
- 24
- 533
- 532
- 119
- 1
- 37
- 40
- 493
- 533
- 5
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Fuzzy Random Forest with C–Fuzzy Decision Trees15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.481-492, ⟨10.1007/978-3-319-45378-1_43⟩
Conference papers
hal-01637493v1
|
||
|
Hardware Supported Rough Sets Based Rules Generation for Big Datasets15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.91-102, ⟨10.1007/978-3-319-45378-1_9⟩
Conference papers
hal-01637509v1
|
||
|
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.285-294, ⟨10.1007/978-3-319-41483-6_20⟩
Conference papers
hal-01633669v1
|
||
|
Sharing-Habits Based Privacy Control in Social Networks30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.217-232, ⟨10.1007/978-3-319-41483-6_16⟩
Conference papers
hal-01633684v1
|
||
|
Shrinking and Expanding Cellular Automata22th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2016, Zurich, Switzerland. pp.159-169, ⟨10.1007/978-3-319-39300-1_13⟩
Conference papers
hal-01435026v1
|
||
|
Delegating Biometric Authentication with the Sumcheck Protocol10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.236-244, ⟨10.1007/978-3-319-45931-8_15⟩
Conference papers
hal-01639622v1
|
||
|
On Sessions and Infinite Data18th International Conference on Coordination Languages and Models (COORDINATION), Jun 2016, Heraklion, Greece. pp.245-261, ⟨10.1007/978-3-319-39519-7_15⟩
Conference papers
hal-01631727v1
|
||
|
Attacking and Defending Dynamic Analysis System-Calls Based IDS10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.103-119, ⟨10.1007/978-3-319-45931-8_7⟩
Conference papers
hal-01639619v1
|
||
|
Metry Mouse Missions: An Interactive, Geometric Obstacle Course of Daredevil Proportions15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.201-204, ⟨10.1007/978-3-319-46100-7_17⟩
Conference papers
hal-01640277v1
|
||
|
Practical Differentially Private Modeling of Human Movement Data30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.170-178, ⟨10.1007/978-3-319-41483-6_13⟩
Conference papers
hal-01633671v1
|
||
|
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers
hal-01633672v1
|
||
|
In Whom Do We Trust - Sharing Security Events10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, ⟨10.1007/978-3-319-39814-3_11⟩
Conference papers
hal-01632748v1
|
||
|
How to Achieve Early Botnet Detection at the Provider Level?10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.142-146, ⟨10.1007/978-3-319-39814-3_15⟩
Conference papers
hal-01632750v1
|
||
|
In Search of ICT in Smart Cities – Policy Documents as Idea Carriers in Urban Development5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.215-227, ⟨10.1007/978-3-319-44421-5_17⟩
Conference papers
hal-01636470v1
|
||
|
Exploring the Requirements and Design of Persuasive Intervention Technology to Combat Digital Addiction6th International Conference on Human-Centred Software Engineering (HCSE) / 8th International Conference on Human Error, Safety, and System Development (HESSD), Aug 2016, Stockholm, Sweden. pp.130-150, ⟨10.1007/978-3-319-44902-9_9⟩
Conference papers
hal-01647706v1
|
||
|
Norm of Reciprocity – Antecedent of Trustworthiness in Social Media15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.411-418, ⟨10.1007/978-3-319-45234-0_37⟩
Conference papers
hal-01702138v1
|
||
|
Differentiating Cyber Risk of Insurance Customers: The Insurance Company PerspectiveInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.175-190, ⟨10.1007/978-3-319-45507-5_12⟩
Conference papers
hal-01635023v1
|
||
|
Success in eVoting – Success in eDemocracy? The Estonian Paradox8th International Conference on Electronic Participation (ePart), Sep 2016, Guimarães, Portugal. pp.55-66, ⟨10.1007/978-3-319-45074-2_5⟩
Conference papers
hal-01637228v1
|
||
|
Parallelizing Heuristics for Generating Synchronizing Sequences28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.106-122, ⟨10.1007/978-3-319-47443-4_7⟩
Conference papers
hal-01643717v1
|
||
|
Innovation and Big Data15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.23-30, ⟨10.1007/978-3-319-45378-1_3⟩
Conference papers
hal-01637511v1
|
||
|
A Variable-Length Network Encoding Protocol for Big Genomic Data14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.212-224, ⟨10.1007/978-3-319-33936-8_17⟩
Conference papers
hal-01434853v1
|
||
|
A Collaborative Video Download Application Based on Wi-Fi Direct14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.147-158, ⟨10.1007/978-3-319-33936-8_12⟩
Conference papers
hal-01434849v1
|
||
|
A Tool for Volatile Memory Acquisition from Android Devices12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.365-378, ⟨10.1007/978-3-319-46279-0_19⟩
Conference papers
hal-01758679v1
|
||
|
Performance Evaluation of Probabilistic Time-Dependent Travel Time Computation15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.377-388, ⟨10.1007/978-3-319-45378-1_34⟩
Conference papers
hal-01637471v1
|
||
|
Optimization of Combining of Self Organizing Maps and Growing Neural Gas15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.277-286, ⟨10.1007/978-3-319-45378-1_25⟩
Conference papers
hal-01637519v1
|
||
|
Multipath Load Balancing in SDN/OSPF Hybrid Network13th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2016, Xi'an, China. pp.93-100, ⟨10.1007/978-3-319-47099-3_8⟩
Conference papers
hal-01647998v1
|
||
|
Ensemble of Classifiers with Modification of Confidence Values15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.473-480, ⟨10.1007/978-3-319-45378-1_42⟩
Conference papers
hal-01637486v1
|
||
|
Enhanced Energy Efficiency with the Actor Model on Heterogeneous Architectures16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.1-15, ⟨10.1007/978-3-319-39577-7_1⟩
Conference papers
hal-01434796v1
|
||
|
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.35-50, ⟨10.1007/978-3-319-45931-8_3⟩
Conference papers
hal-01639601v1
|
||
|
Cultural Visualisation of a Cultural Photographic Collection in 3D Environments – Development of ‘PAV 3D’ (Photographic Archive Visualisation)15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.272-277, ⟨10.1007/978-3-319-46100-7_29⟩
Conference papers
hal-01640276v1
|