Filter your results
- 5
- 5
- 5
- 1
- 5
- 5
- 3
- 3
- 3
- 2
- 6
- 8
- 1
- 5
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Access Annotation for Safe Program Parallelization10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.13-26, ⟨10.1007/978-3-642-40820-5_2⟩
Conference papers
hal-01513782v1
|
||
|
Do Usability Professionals Think about User Experience in the Same Way as Users and Developers Do?14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.461-478, ⟨10.1007/978-3-642-40480-1_31⟩
Conference papers
hal-01501764v1
|
||
|
Social Influence from Personalized Recommendations to Trusting Beliefs of Websites: Intermediate Role of Social Presence14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.632-639, ⟨10.1007/978-3-642-40477-1_42⟩
Conference papers
hal-01504917v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
Totoro: A Scalable and Fault-Tolerant Data Center Network by Using Backup Port10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.94-105, ⟨10.1007/978-3-642-40820-5_9⟩
Conference papers
hal-01513881v1
|