Filter your results
- 10
- 2
- 10
- 2
- 12
- 1
- 1
- 2
- 1
- 1
- 2
- 1
- 3
- 12
- 7
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
12 results
|
|
sorted by
|
|
NETWORKING 2010Springer, LNCS-6091, 2010, Lecture Notes in Computer Science, 978-3-642-12962-9. ⟨10.1007/978-3-642-12963-6⟩
Books
hal-01555313v1
|
||
|
A NAT Based Seamless Handover for Software Defined Enterprise WLANs17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.78-90, ⟨10.1007/978-3-030-30523-9_7⟩
Conference papers
hal-02881741v1
|
||
|
The AUGMENT Project: Co-constructive Mapping and Support of Accessibility and ParticipationSecond IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.95-103, ⟨10.1007/978-3-642-15158-3_8⟩
Conference papers
hal-01054833v1
|
||
|
Algorithm Selection and Model Evaluation in Application Design Using Machine Learning2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.175-195, ⟨10.1007/978-3-030-45778-5_12⟩
Conference papers
hal-03266461v1
|
||
|
Cycle Based Clustering Using Reversible Cellular Automata26th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Aug 2020, Stockholm, Sweden. pp.29-42, ⟨10.1007/978-3-030-61588-8_3⟩
Conference papers
hal-03659463v1
|
||
|
Time Is Perception Is Money – Web Response Times in Mobile Networks with Application to Quality of ExperiencePerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.179-190, ⟨10.1007/978-3-642-25575-5_15⟩
Conference papers
hal-01586896v1
|
||
|
Path Attestation Scheme to Avert DDoS Flood Attacks9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.397-408, ⟨10.1007/978-3-642-12963-6_32⟩
Conference papers
hal-01059127v1
|
||
|
Enabling the Deployment of ABAC Policies in RBAC Systems32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.51-68, ⟨10.1007/978-3-319-95729-6_4⟩
Conference papers
hal-01954419v1
|
||
|
Pixel Based Adversarial Attacks on Convolutional Neural Network Models4th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2021, Chennai, India. pp.141-155, ⟨10.1007/978-3-030-92600-7_14⟩
Conference papers
hal-03772929v1
|
||
|
Optimal Parameters for Efficient Two-Party Computation Protocols6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.128-143, ⟨10.1007/978-3-642-30955-7_12⟩
Conference papers
hal-01534312v1
|
||
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
Accident Detection System Using Deep Learning5th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2022, Virtual, India. pp.301-310, ⟨10.1007/978-3-031-16364-7_23⟩
Conference papers
hal-04381284v1
|