Filter your results
- 66
- 6
- 1
- 67
- 6
- 73
- 9
- 5
- 3
- 6
- 1
- 2
- 1
- 9
- 5
- 7
- 14
- 14
- 6
- 73
- 12
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
73 results
|
Learning HCI and InfoVis in the Open8th Workshop on Human-Computer Interaction and Visualization (HCIV), Sep 2011, Lisbon, Portugal. pp.8-16, ⟨10.1007/978-3-642-54894-9_2⟩
Conference papers
hal-01414648v1
|
||
|
Comparative Feedback in the Street: Exposing Residential Energy Consumption on House Façades13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.470-488, ⟨10.1007/978-3-642-23774-4_39⟩
Conference papers
hal-01590574v1
|
||
|
Recent Developments in Low-Level Software Security6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.1-16, ⟨10.1007/978-3-642-30955-7_1⟩
Conference papers
hal-01534300v1
|
||
|
A Fuzzy Multi-criteria Decision Making Approach for Analyzing the Risks and Benefits of Opening Data17th Conference on e-Business, e-Services and e-Society (I3E), Oct 2018, Kuwait City, Kuwait. pp.397-412, ⟨10.1007/978-3-030-02131-3_36⟩
Conference papers
hal-02274163v1
|
||
|
Coordination Models and LanguagesSpringer, LNCS-6116, 2010, Lecture Notes in Computer Science, 978-3-642-13413-5. ⟨10.1007/978-3-642-13414-2⟩
Books
hal-01555333v1
|
||
|
New Wine in Old Bottles: Chatbots in Government11th International Conference on Electronic Participation (ePart), Sep 2019, San Benedetto Del Tronto, Italy. pp.49-59, ⟨10.1007/978-3-030-27397-2_5⟩
Conference papers
hal-02446018v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-8735, 2014, Lecture Notes in Computer Science, 978-3-662-44884-7. ⟨10.1007/978-3-662-44885-4⟩
Books
hal-01404210v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7394, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32805-3⟩
Books
hal-01540895v1
|
||
|
Benefits and Trade-Offs of Different Model Representations in Decision Support Systems for Non-expert Users17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.576-597, ⟨10.1007/978-3-030-29384-0_35⟩
Conference papers
hal-02544619v1
|
||
|
Explore Data, Enjoy Yourself - KUbism, A Playful Approach to Data Exploration18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.43-64, ⟨10.1007/978-3-030-85613-7_4⟩
Conference papers
hal-04292377v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Stress Out: Translating Real-World Stressors into Audio-Visual Stress Cues in VR for Police Training18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.551-561, ⟨10.1007/978-3-030-85616-8_32⟩
Conference papers
hal-04196885v1
|
||
|
Dedicated Hardware for Attribute-Based Credential Verification14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.50-65, ⟨10.1007/978-3-642-40779-6_4⟩
Conference papers
hal-01492833v1
|