Filter your results
- 41
- 2
- 1
- 42
- 1
- 1
- 44
- 1
- 1
- 1
- 2
- 6
- 5
- 10
- 10
- 3
- 6
- 44
- 30
- 18
- 12
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 8
- 7
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
44 results
|
|
sorted by
|
|
The Gossple Anonymous Social NetworkACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.191-211, ⟨10.1007/978-3-642-16955-7_10⟩
Conference papers
inria-00515693v2
|
||
|
MPSoC Architecture-Aware Automatic NoC Topology DesignIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.470-480, ⟨10.1007/978-3-642-15672-4_40⟩
Conference papers
hal-01054961v1
|
||
|
fQuery: SPARQL Query Rewriting to Enforce Data ConfidentialityDBSEC 2010 : 24th annual IFIP WG 11.3 working conference on data and applications security and privacy XXIV, Jun 2010, Roma, Italy. pp.146-161, ⟨10.1007/978-3-642-13739-6_10⟩
Conference papers
hal-01056741v1
|
||
|
Cost Bounds of Multicast Light-trees in WDM NetworksIFIP Networking conference, May 2010, Chennai, India. pp.339-350, ⟨10.1007/978-3-642-12963-6_27⟩
Conference papers
hal-00541058v2
|
||
Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposalCMC 2010 : 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, May 2010, Linz, Austria. pp.154 - 165
Conference papers
hal-00565730v1
|
|||
|
LiFTinG: Lightweight Freerider-Tracking Protocol in Gossip11th ACM/IFIP/USENIX International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. ⟨10.1007/978-3-642-16955-7_16⟩
Conference papers
inria-00505268v1
|
||
|
Disappointments and Delights, Fears and Hopes induced by a few decades in Performance EvaluationPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.1-9, ⟨10.1007/978-3-642-25575-5_1⟩
Conference papers
hal-00789638v1
|
||
|
Geographical Location and Load Based Gateway Selection for Optimal Traffic Offload in Mobile Networks10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.331-342, ⟨10.1007/978-3-642-20757-0_26⟩
Conference papers
hal-00789640v1
|
||
|
Decision Engine for SIP Based Dynamic Call Routing5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.86-99, ⟨10.1007/978-3-642-21484-4_12⟩
Conference papers
hal-01585858v1
|
||
|
Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.100-111, ⟨10.1007/978-3-642-32808-4_10⟩
Conference papers
hal-00739604v1
|
||
|
Synchronous Interface Theories and Time Triggered Scheduling14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.203-218, ⟨10.1007/978-3-642-30793-5_13⟩
Conference papers
hal-01087992v1
|
||
|
On the problem of revenue sharing in multi-domain federations11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.252-264, ⟨10.1007/978-3-642-30054-7_20⟩
Conference papers
hal-00725646v1
|
||
|
Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.87-102, ⟨10.1007/978-3-642-34691-0_8⟩
Conference papers
hal-01482413v1
|
||
|
Competition between wireless service providers sharing a radio resource11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.355-365, ⟨10.1007/978-3-642-30054-7_28⟩
Conference papers
hal-00725181v1
|
||
|
Data and Applications Security and Privacy XXVISpringer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩
Books
hal-01164720v1
|
||
|
A Message Service for Opportunistic Computing in Disconnected MANETs12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.118-131, ⟨10.1007/978-3-642-30823-9_10⟩
Conference papers
hal-00763325v1
|
||
|
Dissemination of reconfiguration policies on mesh networks12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.16-30, ⟨10.1007/978-3-642-30823-9_2⟩
Conference papers
hal-00688707v1
|
||
|
Reconstruction attack through classifier analysis26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.274-281, ⟨10.1007/978-3-642-31540-4_21⟩
Conference papers
hal-00736945v1
|
||
|
Techno-economic comparison of next-generation access networks for the French market18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.136-147, ⟨10.1007/978-3-642-32808-4_13⟩
Conference papers
hal-00737172v1
|
||
|
DOMINO – An Efficient Algorithm for Policy Definition and Processing in Distributed Environments Based on Atomic Data Structures19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.257-269, ⟨10.1007/978-3-642-40552-5_23⟩
Conference papers
hal-01497021v1
|
||
|
Graph-Theoretic Roots of Value Network Quantification19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.282-286, ⟨10.1007/978-3-642-40552-5_26⟩
Conference papers
hal-01497023v1
|
||
|
Failure Analysis and Modeling in Large Multi-site Infrastructures13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.127-140, ⟨10.1007/978-3-642-38541-4_10⟩
Conference papers
hal-01489451v1
|
||
|
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers
hal-01159831v1
|
||
|
A transversal alignment between measurements and enterprise architecture for early verification of telecom service design19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.245-256, ⟨10.1007/978-3-642-40552-5_22⟩
Conference papers
hal-00859979v1
|
||
|
Towards Decentralised Workflow Scheduling via a Rule-Driven Shared Space13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.187-192, ⟨10.1007/978-3-642-38541-4_16⟩
Conference papers
hal-01489457v1
|
||
|
Quantitative Modal Transition Systems21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.50-58, ⟨10.1007/978-3-642-37635-1_3⟩
Conference papers
hal-01485977v1
|
||
|
User and System Cross-Learning of Gesture Commands on Pen-Based Devices14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.337-355, ⟨10.1007/978-3-642-40480-1_21⟩
Conference papers
hal-00881020v2
|
||
|
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.426-440, ⟨10.1007/978-3-642-36818-9_47⟩
Conference papers
hal-01213982v1
|
||
|
DynaSoRe: Efficient In-Memory Store for Social Applications14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.425-444, ⟨10.1007/978-3-642-45065-5_22⟩
Conference papers
hal-00932468v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
- 1
- 2