Filter your results
- 18
- 2
- 18
- 2
- 20
- 1
- 1
- 1
- 5
- 2
- 1
- 3
- 2
- 3
- 2
- 20
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 3
- 3
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
20 results
|
|
sorted by
|
|
Taking Garbage Collection Overheads Off the Critical Path in SSDs13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.164-186, ⟨10.1007/978-3-642-35170-9_9⟩
Conference papers
hal-01555558v1
|
||
|
Does Panel Type Matter for LCD Monitors? A Study Examining the Effects of S-IPS, S-PVA, and TN Panels in Video Gaming and Movie Viewing13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.281-288, ⟨10.1007/978-3-642-23771-3_21⟩
Conference papers
hal-01590837v1
|
||
|
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.335-342, ⟨10.1007/978-3-642-13739-6_25⟩
Conference papers
hal-01056675v1
|
||
|
Crystallizing Local Political Knowledge for Informed Public Participation9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.53-64, ⟨10.1007/978-3-319-64322-9_5⟩
Conference papers
hal-01703335v1
|
||
|
Toward Software Diversity in Heterogeneous Networked Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.114-129, ⟨10.1007/978-3-662-43936-4_8⟩
Conference papers
hal-01284848v1
|
||
|
Network and Parallel ComputingSpringer International Publishing, LNCS-10578, 2017, Lecture Notes in Computer Science, 978-3-319-68209-9. ⟨10.1007/978-3-319-68210-5⟩
Books
hal-01705443v1
|
||
|
Data and Applications Security and Privacy XXXISpringer International Publishing, LNCS-10359, 2017, Lecture Notes in Computer Science, 978-3-319-61175-4. ⟨10.1007/978-3-319-61176-1⟩
Books
hal-01684365v1
|
||
|
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.349-361, ⟨10.1007/978-3-319-61176-1_20⟩
Conference papers
hal-01684364v1
|
||
|
Interacting with Augmented Reality: How Does Location-Based AR Enhance Learning?14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.616-623, ⟨10.1007/978-3-642-40480-1_43⟩
Conference papers
hal-01501777v1
|
||
|
Who Would Pay for Facebook? Self Esteem as a Predictor of User Behavior, Identity Construction and Valuation of Virtual Possessions14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.726-743, ⟨10.1007/978-3-642-40477-1_50⟩
Conference papers
hal-01504926v1
|
||
|
Communicating in a Ubicomp World: Interaction Rules for Guiding Design of Mobile Interfaces14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.730-747, ⟨10.1007/978-3-642-40480-1_51⟩
Conference papers
hal-01501785v1
|
||
|
Calls for Interaction: The More the Better? User Experience of 3D Carousel and Additional Interaction Techniques13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.487-490, ⟨10.1007/978-3-642-23768-3_64⟩
Conference papers
hal-01597000v1
|
||
|
Towards Actionable Mission Impact Assessment in the Context of Cloud Computing31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.259-274, ⟨10.1007/978-3-319-61176-1_14⟩
Conference papers
hal-01684363v1
|
||
|
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.330-348, ⟨10.1007/978-3-319-95729-6_21⟩
Conference papers
hal-01954421v1
|
||
|
Deep Learning for Detecting Network Attacks: An End-to-End Approach35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.221-234, ⟨10.1007/978-3-030-81242-3_13⟩
Conference papers
hal-03677041v1
|
||
|
Making Decisions About Digital Legacy with Google’s Inactive Account Manager15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.201-209, ⟨10.1007/978-3-319-22701-6_14⟩
Conference papers
hal-01599624v1
|
||
|
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.223-238, ⟨10.1007/978-3-642-31540-4_17⟩
Conference papers
hal-01534769v1
|
||
|
Children’s Interactions in an Asynchronous Video Mediated Communication Environment13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.199-206, ⟨10.1007/978-3-642-23774-4_18⟩
Conference papers
hal-01590580v1
|
||
|
Middleware for a Re-configurable Distributed Archival Store Based on Secret SharingACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.107-127, ⟨10.1007/978-3-642-16955-7_6⟩
Conference papers
hal-01055269v1
|
||
|
Towards Collaborative Query Planning in Multi-party Database Networks29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.19-34, ⟨10.1007/978-3-319-20810-7_2⟩
Conference papers
hal-01745823v1
|