Filter your results
- 17
- 17
- 17
- 1
- 3
- 1
- 4
- 2
- 6
- 17
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
17 results
|
|
sorted by
|
|
A Type Theory for Robust Failure Handling in Distributed Systems36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.96-113, ⟨10.1007/978-3-319-39570-8_7⟩
Conference papers
hal-01432930v1
|
||
|
Assured Cloud-Based Data Analysis with ClusterBFT14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.82-102, ⟨10.1007/978-3-642-45065-5_5⟩
Conference papers
hal-01480793v1
|
||
|
dFault: Fault Localization in Large-Scale Peer-to-Peer SystemsACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.252-272, ⟨10.1007/978-3-642-16955-7_13⟩
Conference papers
hal-01055280v1
|
||
|
Scalable Efficient Composite Event Detection12th International Conference on Coordination Models and Languages (COORDINATION) Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.168-182, ⟨10.1007/978-3-642-13414-2_12⟩
Conference papers
hal-01054628v1
|
||
|
Access Control and Query Verification for Untrusted Databases27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers
hal-01490706v1
|
||
|
Efficient Session Type Guided Distributed Interaction12th International Conference on Coordination Models and Languages (COORDINATION) Held as part of International Federated Conference on Distributed Computing Techniques (DisCoTec), Jun 2010, Amsterdam, Netherlands. pp.152-167, ⟨10.1007/978-3-642-13414-2_11⟩
Conference papers
hal-01054629v1
|
||
|
Evaluating Physical/Virtual Occlusion Management Techniques for Horizontal Displays13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.391-408, ⟨10.1007/978-3-642-23765-2_27⟩
Conference papers
hal-01591810v1
|
||
|
FAIDECS: Fair Decentralized Event Correlation12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.228-248, ⟨10.1007/978-3-642-25821-3_12⟩
Conference papers
hal-01597762v1
|
||
|
A Targeted Data Extraction System for Mobile Devices15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.73-100, ⟨10.1007/978-3-030-28752-8_5⟩
Conference papers
hal-02534613v1
|
||
|
A Confucian Look at Internet Censorship in China16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.377-398, ⟨10.1007/978-3-319-67744-6_25⟩
Conference papers
hal-01676171v1
|
||
|
Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.123-141, ⟨10.1007/978-3-319-61176-1_7⟩
Conference papers
hal-01684357v1
|
||
|
A Dynamic Data Middleware Cache for Rapidly-Growing Scientific RepositoriesACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.64-84, ⟨10.1007/978-3-642-16955-7_4⟩
Conference papers
hal-01055271v1
|
||
|
Parametric Subscriptions for Content-Based Publish/Subscribe NetworksACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.128-147, ⟨10.1007/978-3-642-16955-7_7⟩
Conference papers
hal-01055268v1
|
||
|
Analyzing the Parameters of Prey-Predator Models for Simulation Games9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.216-223, ⟨10.1007/978-3-642-15399-0_20⟩
Conference papers
hal-01055640v1
|
||
|
Atmosphere: A Universal Cross-Cloud Communication Infrastructure14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.163-182, ⟨10.1007/978-3-642-45065-5_9⟩
Conference papers
hal-01480796v1
|
||
|
Using Safety Constraint for Transactional Dataset Anonymization27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.164-178, ⟨10.1007/978-3-642-39256-6_11⟩
Conference papers
hal-01490703v1
|
||
|
Exploring Offline Context and Consciousness in Everyday Social Media Use16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.126-135, ⟨10.1007/978-3-319-68059-0_8⟩
Conference papers
hal-01679779v1
|