Filter your results
- 44
- 1
- 1
- 45
- 1
- 46
- 2
- 2
- 4
- 4
- 2
- 2
- 5
- 1
- 4
- 9
- 8
- 3
- 46
- 18
- 11
- 9
- 8
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
46 results
|
|
sorted by
|
|
Using SensLAB as a First Class Scientific Tool for Large Scale Wireless Sensor Network Experiments10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.147-159, ⟨10.1007/978-3-642-20757-0_12⟩
Conference papers
hal-01583404v1
|
||
|
Analysis of Privacy Policies to Enhance Informed ConsentDBSEC 2019 - 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Jul 2019, Charleston, SC, United States. pp.177-198, ⟨10.1007/978-3-030-22479-0_10⟩
Conference papers
hal-02384593v1
|
||
|
Towards Decentralised Workflow Scheduling via a Rule-Driven Shared Space13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.187-192, ⟨10.1007/978-3-642-38541-4_16⟩
Conference papers
hal-01489457v1
|
||
|
Quantitative Modal Transition Systems21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.50-58, ⟨10.1007/978-3-642-37635-1_3⟩
Conference papers
hal-01485977v1
|
||
|
Practical and Privacy-Preserving TEE Migration9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
Conference papers
hal-01183508v1
|
||
|
An Approach to Derive Usage Models Variants for Model-Based Testing26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.80-96, ⟨10.1007/978-3-662-44857-1_6⟩
Conference papers
hal-01025124v2
|
||
|
UNADA: Unsupervised Network Anomaly Detection Using Sub-space Outliers Ranking10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.40-51, ⟨10.1007/978-3-642-20757-0_4⟩
Conference papers
hal-01583411v1
|
||
|
Dynamic Modeling of Location Privacy Protection MechanismsDAIS 2018 - DisCoTec 2018 - 18th IFIP International Conference on Distributed Applications and Interoperable Systems - Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, Jun 2018, Madrid, Spain. pp.26-39, ⟨10.1007/978-3-319-93767-0_3⟩
Conference papers
hal-01824641v1
|
||
|
Energy-Efficient Cryptographic Engineering ParadigmInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.78-88, ⟨10.1007/978-3-642-27585-2_7⟩
Conference papers
hal-01481508v1
|
||
|
TransDPOR: A Novel Dynamic Partial-Order Reduction Technique for Testing Actor Programs14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.219-234, ⟨10.1007/978-3-642-30793-5_14⟩
Conference papers
hal-01528727v1
|
||
|
Bringing Complex Event Processing into Multitree Modelling of Sensors16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.196-210, ⟨10.1007/978-3-319-39577-7_16⟩
Conference papers
hal-01434795v1
|
||
|
Statistical Abstraction and Model-Checking of Large Heterogeneous SystemsJoint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.32-46, ⟨10.1007/978-3-642-13464-7_4⟩
Conference papers
inria-00554321v2
|
||
|
Managing Execution Environment Variability during Software Testing: An Industrial Experience24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.24-38, ⟨10.1007/978-3-642-34691-0_4⟩
Conference papers
hal-01482409v1
|
||
|
Q-routing: from the algorithm to the routing protocolSecond IFIP International Conference on Machine Learning for Networking, Dec 2019, Paris, France. ⟨10.1007/978-3-030-45778-5_5⟩
Conference papers
hal-02521783v1
|
||
|
Effect of Attention Saturating and Cognitive Load on Tactile Texture Recognition for Mobile Surface18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.557-579, ⟨10.1007/978-3-030-85610-6_31⟩
Conference papers
hal-03379590v1
|
||
|
The Effect of Rhythm in Mid-air Gestures on the User Experience in Virtual Reality18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.182-191, ⟨10.1007/978-3-030-85613-7_13⟩
Conference papers
hal-03338088v1
|
||
|
Leveraging Web Intelligence for Information Cascade Detection in Social Streams6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.56-65, ⟨10.1007/978-3-319-89743-1_6⟩
Conference papers
hal-01913877v1
|
||
|
On the Computational Complexity of the Freezing Non-strict Majority Automata23th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2017, Milan, Italy. pp.109-119, ⟨10.1007/978-3-319-58631-1_9⟩
Conference papers
hal-01656355v1
|
||
|
Distributed Applications and Interoperable SystemsSpringer International Publishing, LNCS-9038, 2015, Lecture Notes in Computer Science, 978-3-319-19128-7. ⟨10.1007/978-3-319-19129-4⟩
Books
hal-01775023v1
|
||
|
Are 128 Bits Long Keys Possible in Watermarking?13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Conference papers
hal-01540890v1
|
||
|
Dynamics in Delegation and Revocation Schemes: A Logical Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, United States. pp.90-105, ⟨10.1007/978-3-642-22348-8_9⟩
Conference papers
inria-00593654v2
|
||
|
Verification of Smart Contract Business Logic8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.228-243, ⟨10.1007/978-3-030-31517-7_16⟩
Conference papers
hal-03769118v1
|
||
|
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation34th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (also known as DBSEC), Jun 2020, Conférence online, Germany. pp.347-366, ⟨10.1007/978-3-030-49669-2_20⟩
Conference papers
hal-02544920v1
|
||
|
The Gossple Anonymous Social NetworkACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.191-211, ⟨10.1007/978-3-642-16955-7_10⟩
Conference papers
inria-00515693v2
|
||
|
Horizontal vs. Vertical: How the Orientation of a Large Interactive Surface Impacts Collaboration in Multi-Surface Environments16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.202-222, ⟨10.1007/978-3-319-67687-6_14⟩
Conference papers
hal-01597913v1
|
||
|
Automating the Verification of Realtime Observers using Probes and the Modal mu-calculus1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Teheran, Iran. pp.90-104, ⟨10.1007/978-3-319-28678-5_7⟩
Conference papers
hal-01202799v1
|
||
|
A Study on Self-adaptation in the Evolutionary Strategy Algorithm6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.150-160, ⟨10.1007/978-3-319-89743-1_14⟩
Conference papers
hal-01913901v1
|
||
|
Trace Based System in TEL Systems: Theory and Practice6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.257-266, ⟨10.1007/978-3-319-89743-1_23⟩
Conference papers
hal-01913897v1
|
||
|
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienne, Austria. pp.102-117, ⟨10.1007/978-3-642-23300-5_9⟩
Conference papers
hal-01240094v1
|
||
|
First Step in Cross-Layers Measurement in Wireless Networks How to Adapt to Resource Constraints for Optimizing End-to-End Services?9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.150-161, ⟨10.1007/978-3-642-21560-5_13⟩
Conference papers
hal-01583648v1
|
- 1
- 2