Filter your results
- 34
- 34
- 34
- 9
- 1
- 2
- 2
- 2
- 3
- 2
- 5
- 1
- 2
- 2
- 4
- 8
- 34
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
34 results
|
|
sorted by
|
|
Distributed Stream Processing with DUPIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.232-246, ⟨10.1007/978-3-642-15672-4_21⟩
Conference papers
hal-01054979v1
|
||
|
Towards Electrical, Integrated Implementations of SIMPL Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.277-292, ⟨10.1007/978-3-642-12368-9_22⟩
Conference papers
hal-01056078v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network Downtime 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.198-208, ⟨10.1007/978-3-642-13971-0_19⟩
Conference papers
hal-01056497v1
|
||
|
Distributed Resource Reservation for Beacon Based MAC Protocols 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.217-225, ⟨10.1007/978-3-642-13971-0_21⟩
Conference papers
hal-01056494v1
|
||
|
Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.256-258, ⟨10.1007/978-3-642-13971-0_25⟩
Conference papers
hal-01056490v1
|
||
|
Process and Data-Oriented Approach for Bundling Corporate Reporting Duties to Public Authorities - A Case Study on the Example of Waste Management Reporting9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.400-411, ⟨10.1007/978-3-642-14799-9_34⟩
Conference papers
hal-01056571v1
|
||
|
Toward a Formal Approach to Process Bundling in Public Administrations9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.412-423, ⟨10.1007/978-3-642-14799-9_35⟩
Conference papers
hal-01056570v1
|
||
|
Verifying Security Policies Using Host Attributes34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers
hal-01398013v1
|
||
|
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.173-187, ⟨10.1007/978-3-319-17172-2_12⟩
Conference papers
hal-01411193v1
|
||
|
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.188-201, ⟨10.1007/978-3-319-17172-2_13⟩
Conference papers
hal-01411194v1
|
||
|
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩
Conference papers
hal-01411196v1
|
||
|
Why Realization Mismatches Expectations of e-Government Project Benefits? Towards Benefit Realization Planning14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.233-245, ⟨10.1007/978-3-319-22479-4_18⟩
Conference papers
hal-01412274v1
|
||
|
Statistical Model Checking for Composite Actor Systems21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.143-160, ⟨10.1007/978-3-642-37635-1_9⟩
Conference papers
hal-01485983v1
|
||
|
Immersive Interactive Information Mining with Application to Earth Observation Data Retrieval1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.376-386
Conference papers
hal-01506787v1
|
||
|
Efficient and Secure Decentralized Network Size Estimation11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.304-317, ⟨10.1007/978-3-642-30045-5_23⟩
Conference papers
hal-01531109v1
|
||
|
Requirements Sensemaking Using Concept Maps4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.217-232, ⟨10.1007/978-3-642-34347-6_13⟩
Conference papers
hal-01556817v1
|
||
|
SMA—The Smyle Modeling Approach3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.103-117, ⟨10.1007/978-3-642-22386-0_8⟩
Conference papers
hal-01572543v1
|
||
|
Experimental Evaluation of a Robust MAC Protocol for Network Coded Two-Way RelayingInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.101-109, ⟨10.1007/978-3-642-23041-7_10⟩
Conference papers
hal-01587845v1
|
||
|
An Implementation of Network Coding with Association Policies in Heterogeneous NetworksInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.110-118, ⟨10.1007/978-3-642-23041-7_11⟩
Conference papers
hal-01587852v1
|
||
|
Components of Trust Influencing eGovernment Adoption in Germany10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.88-99, ⟨10.1007/978-3-642-22878-0_8⟩
Conference papers
hal-01589102v1
|
||
|
Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication Networks10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.3-15, ⟨10.1007/978-3-319-39814-3_1⟩
Conference papers
hal-01632746v1
|
||
|
From Simulation Data to Test Cases for Fully Automated Driving and ADAS28th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2016, Graz, Austria. pp.191-206, ⟨10.1007/978-3-319-47443-4_12⟩
Conference papers
hal-01643731v1
|
||
|
Privacy Assessment Using Static Taint Analysis (Tool Paper)37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.225-235, ⟨10.1007/978-3-319-60225-7_16⟩
Conference papers
hal-01658424v1
|
||
|
Predicting the Outcome of Appeal Decisions in Germany’s Tax Law9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.89-99, ⟨10.1007/978-3-319-64322-9_8⟩
Conference papers
hal-01703326v1
|
||
|
Automated Translation of End User Policies for Usage Control Enforcement29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.250-258, ⟨10.1007/978-3-319-20810-7_18⟩
Conference papers
hal-01745828v1
|
||
|
Achieving Reproducible Network Environments with INSALATA11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.30-44, ⟨10.1007/978-3-319-60774-0_3⟩
Conference papers
hal-01806059v1
|
||
|
Managing Standardization in eGovernment: A Coordination Theory based Analysis Framework17th International Conference on Electronic Government (EGOV), Sep 2018, Krems, Austria. pp.60-72, ⟨10.1007/978-3-319-98690-6_6⟩
Conference papers
hal-01961534v1
|
||
|
Towards the Implementation of the EU-Wide “Once-Only Principle”: Perceptions of Citizens in the DACH-Region17th International Conference on Electronic Government (EGOV), Sep 2018, Krems, Austria. pp.155-166, ⟨10.1007/978-3-319-98690-6_14⟩
Conference papers
hal-01961531v1
|
||
|
Towards Verified Blockchain Architectures: A Case Study on Interactive Architecture Verification39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.204-223, ⟨10.1007/978-3-030-21759-4_12⟩
Conference papers
hal-02313742v1
|
- 1
- 2