Filter your results
- 21
- 4
- 20
- 1
- 21
- 2
- 1
- 5
- 4
- 9
- 21
- 14
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Human-Computer Interaction – INTERACT 2021Springer International Publishing, Lecture Notes in Computer Science (LNCS-12932), 2021, Lecture Notes in Computer Science
Books
hal-04332257v1
|
||
|
A Multi-planar Approach to Encoding Story Worlds for Dynamic Narrative Generation18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.355-358, ⟨10.1007/978-3-030-85607-6_36⟩
Conference papers
hal-04291220v1
|
||
|
Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.414-430, ⟨10.1007/978-3-030-45778-5_29⟩
Conference papers
hal-03266459v1
|
||
|
Ensemble Learning for Large Scale Virtual Screening on Apache Spark6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.244-256, ⟨10.1007/978-3-319-89743-1_22⟩
Conference papers
hal-01913905v1
|
||
|
Understanding User’s Intention in Semantic Based Image Retrieval: Combining Positive and Negative Examples6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.66-77, ⟨10.1007/978-3-319-89743-1_7⟩
Conference papers
hal-01913900v1
|
||
|
Enhancing Content Based Filtering Using Web of Data6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.609-621, ⟨10.1007/978-3-319-89743-1_52⟩
Conference papers
hal-01913892v1
|
||
|
Effective Streaming Evolutionary Feature Selection Using Dynamic Optimization6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.329-340, ⟨10.1007/978-3-319-89743-1_29⟩
Conference papers
hal-01913889v1
|
||
|
Drug-Target Interaction Prediction in Drug Repositioning Based on Deep Semi-Supervised Learning6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.302-313, ⟨10.1007/978-3-319-89743-1_27⟩
Conference papers
hal-01913886v1
|
||
|
Usability Guidelines for Mobile Devices: Length of Hyperlinks14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.705-712, ⟨10.1007/978-3-642-40498-6_64⟩
Conference papers
hal-01510530v1
|
||
|
Walking in the Wild – Using an Always-On Smartphone Application to Increase Physical Activity14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.19-36, ⟨10.1007/978-3-642-40498-6_2⟩
Conference papers
hal-01510527v1
|
||
|
The Evolution of Number Entry: A Case Study of the Telephone14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.538-545, ⟨10.1007/978-3-642-40480-1_37⟩
Conference papers
hal-01501770v1
|
||
|
Poster Abstract: Performance Evaluation of Machine-to-Machine Communication on Future Mobile Networks in Disaster Scenarios19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.270-273, ⟨10.1007/978-3-642-40552-5_24⟩
Conference papers
hal-01497050v1
|
||
|
On the Combined Behavior of Autonomous Resource Management Agents4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.38-49, ⟨10.1007/978-3-642-13986-4_5⟩
Conference papers
hal-01056625v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.130-141, ⟨10.1007/978-3-642-13241-4_13⟩
Conference papers
hal-01056384v1
|
||
|
On the Design and Implementation of an Efficient DAA Scheme9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.223-237, ⟨10.1007/978-3-642-12510-2_16⟩
Conference papers
hal-01056104v1
|
||
|
Towards Electrical, Integrated Implementations of SIMPL Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.277-292, ⟨10.1007/978-3-642-12368-9_22⟩
Conference papers
hal-01056078v1
|
||
|
EMWF: A Middleware for Flexible Automation and Assistive Devices8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.191-203, ⟨10.1007/978-3-642-16256-5_19⟩
Conference papers
hal-01055386v1
|
||
|
Anonygator: Privacy and Integrity Preserving Data AggregationACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.85-106, ⟨10.1007/978-3-642-16955-7_5⟩
Conference papers
hal-01055270v1
|
||
|
A Pareto Ant Colony Algorithm Applied to the Class Integration and Test Order Problem22nd IFIP WG 6.1 International Conference on Testing Software and Systems (ICTSS), Nov 2010, Natal, Brazil. pp.16-29, ⟨10.1007/978-3-642-16573-3_3⟩
Conference papers
hal-01055245v1
|
||
|
LU Decomposition on Cell Broadband Engine: An Empirical Study to Exploit Heterogeneous Chip MultiprocessorsIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.61-75, ⟨10.1007/978-3-642-15672-4_7⟩
Conference papers
hal-01054956v1
|