Filter your results
- 9
- 1
- 9
- 1
- 10
- 1
- 2
- 2
- 4
- 1
- 10
- 10
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
10 results
|
|
sorted by
|
|
Storytelling in Visual Analytics Tools for Business Intelligence14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.280-297, ⟨10.1007/978-3-642-40477-1_18⟩
Conference papers
hal-00817732v2
|
||
|
A Framework for Verifying Data-Centric Protocols13th Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 31th International Conference on FORmal TEchniques for Networked and Distributed Systems (FORTE), Jun 2011, Reykjavik, Iceland. pp.106-120, ⟨10.1007/978-3-642-21461-5_7⟩
Conference papers
hal-00647802v1
|
||
|
AmbiStream: A Middleware for Multimedia Streaming on Heterogeneous Mobile Devices12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.249-268, ⟨10.1007/978-3-642-25821-3_13⟩
Conference papers
hal-00639633v1
|
||
|
EZ: Towards Efficient Asynchronous Protocol Gateway Construction13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.169-174, ⟨10.1007/978-3-642-38541-4_13⟩
Conference papers
hal-00991335v1
|
||
|
The Role of Ontologies in Emergent Middleware: Supporting Interoperability in Complex Distributed Systems12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.410-430, ⟨10.1007/978-3-642-25821-3_21⟩
Conference papers
inria-00629059v1
|
||
|
Bridging the Gap between Legacy Services and Web ServicesMiddleware 2010 - ACM/IFIP/USENIX 11th International Middleware Conference, Nov 2010, Bangalore, India. pp.273-292, ⟨10.1007/978-3-642-16955-7_14⟩
Conference papers
hal-01055279v1
|
||
|
Information Security Theory and Practice: Securing the Internet of ThingsDavid Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books
hal-01098408v1
|
||
|
MERCi-MIsS: Should I Turn off My Servers?15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.16-29, ⟨10.1007/978-3-319-19129-4_2⟩
Conference papers
hal-01775024v1
|
||
|
Characterizing Bufferbloat and its Impact at End-hosts6th International Workshop on Traffic Monitoring and Analysis (TMA), Apr 2014, London, United Kingdom. pp.51-64, ⟨10.1007/978-3-642-54999-1_5⟩
Conference papers
hal-01097476v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|