Filter your results
- 29
- 7
- 29
- 7
- 36
- 7
- 1
- 1
- 5
- 5
- 4
- 3
- 2
- 4
- 5
- 2
- 2
- 2
- 36
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 7
- 4
- 4
- 4
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
36 results
|
|
sorted by
|
|
Pushdown Automata and Constant Height: Decidability and Bounds21th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2019, Košice, Slovakia. pp.260-271, ⟨10.1007/978-3-030-23247-4_20⟩
Conference papers
hal-02387302v1
|
||
|
Descriptional Complexity of Formal SystemsSpringer International Publishing, LNCS-10316, 2017, Lecture Notes in Computer Science, 978-3-319-60251-6. ⟨10.1007/978-3-319-60252-3⟩
Books
hal-01656999v1
|
||
|
Descriptional Complexity of Iterated Uniform Finite-State Transducers21th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2019, Košice, Slovakia. pp.223-234, ⟨10.1007/978-3-030-23247-4_17⟩
Conference papers
hal-02387284v1
|
||
|
Regular Expression Learning with Evolutionary Testing and Repair31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.22-40, ⟨10.1007/978-3-030-31280-0_2⟩
Conference papers
hal-02526352v1
|
||
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers
hal-01506705v1
|
||
|
Data and Applications Security and Privacy XXXISpringer International Publishing, LNCS-10359, 2017, Lecture Notes in Computer Science, 978-3-319-61175-4. ⟨10.1007/978-3-319-61176-1⟩
Books
hal-01684365v1
|
||
|
Limited Automata: Properties, Complexity and Variants21th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2019, Košice, Slovakia. pp.57-73, ⟨10.1007/978-3-030-23247-4_4⟩
Conference papers
hal-02387288v1
|
||
|
User Experiences and Wellbeing at Work17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.754-758, ⟨10.1007/978-3-030-29390-1_75⟩
Conference papers
hal-02878656v1
|
||
|
Socio-technical Design of an App for Migrants Rescue Operations16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.140-147, ⟨10.1007/978-3-319-92081-8_14⟩
Conference papers
hal-01821417v1
|
||
|
Human Work Interaction Design Meets International Development16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.531-532
Conference papers
hal-01680386v1
|
||
|
Experimenting LiquidFeedback for Online Deliberation in Civic Contexts5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.147-158, ⟨10.1007/978-3-642-40346-0_13⟩
Conference papers
hal-01491226v1
|
||
|
Amplification DDoS Attacks: Emerging Threats and Defense StrategiesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.298-310, ⟨10.1007/978-3-319-10975-6_24⟩
Conference papers
hal-01404010v1
|
||
|
Zero-Suppressed Binary Decision Diagrams Resilient to Index Faults8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.1-12, ⟨10.1007/978-3-662-44602-7_1⟩
Conference papers
hal-01402013v1
|
||
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-9895, 2016, Lecture Notes in Computer Science, 978-3-319-45930-1. ⟨10.1007/978-3-319-45931-8⟩
Books
hal-01639612v1
|
||
|
On the Impact of a Road-Side Infrastructure for a DTN Deployed on a Public Transportation System11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.265-276, ⟨10.1007/978-3-642-30054-7_21⟩
Conference papers
hal-01531965v1
|
||
|
Information Security Theory and PracticeSpringer International Publishing, LNCS-10741, 2018, Lecture Notes in Computer Science, 978-3-319-93523-2. ⟨10.1007/978-3-319-93524-9⟩
Books
hal-01875516v1
|
||
|
Data and Applications Security and Privacy XXIXSpringer International Publishing, LNCS-9149, 2015, Lecture Notes in Computer Science, 978-3-319-20809-1. ⟨10.1007/978-3-319-20810-7⟩
Books
hal-01745818v1
|
||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|
||
|
Resilient Distributed Collection Through Information Speed Thresholds22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.211-229, ⟨10.1007/978-3-030-50029-0_14⟩
Conference papers
hal-03273987v1
|
||
|
A Local Limit Property for Pattern Statistics in Bicomponent Stochastic Models20th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2018, Halifax, NS, Canada. pp.114-125, ⟨10.1007/978-3-319-94631-3_10⟩
Conference papers
hal-01905636v1
|
||
|
Distributed Query Evaluation over Encrypted Data35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.96-114, ⟨10.1007/978-3-030-81242-3_6⟩
Conference papers
hal-03677027v1
|
||
|
Network Profiling: Content Analysis of Users Behavior in Digital Communication ChannelInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.416-429, ⟨10.1007/978-3-642-32498-7_31⟩
Conference papers
hal-01542442v1
|
||
|
Digital Profiling: A Computer Forensics Approach1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.330-343, ⟨10.1007/978-3-642-23300-5_26⟩
Conference papers
hal-01590393v1
|
||
|
Linear-Time Limited Automata20th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2018, Halifax, NS, Canada. pp.126-138, ⟨10.1007/978-3-319-94631-3_11⟩
Conference papers
hal-01905632v1
|
||
|
Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.44-59, ⟨10.1007/978-3-642-22348-8_6⟩
Conference papers
hal-01586589v1
|
||
|
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.447-452, ⟨10.1007/978-3-642-36818-9_49⟩
Conference papers
hal-01480202v1
|
||
|
Data and Applications Security and Privacy XXIVSpringer, LNCS-6166, 2010, Lecture Notes in Computer Science, 978-3-642-13738-9. ⟨10.1007/978-3-642-13739-6⟩
Books
hal-01555409v1
|
||
|
Counter Machines and Distributed Automata24th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2018, Ghent, Belgium. pp.13-28, ⟨10.1007/978-3-319-92675-9_2⟩
Conference papers
hal-01824873v1
|
||
|
Minimal and Reduced Reversible Automata18th International Workshop on Descriptional Complexity of Formal Systems (DCFS), Jul 2016, Bucharest, Romania. pp.168-179, ⟨10.1007/978-3-319-41114-9_13⟩
Conference papers
hal-01633945v1
|
||
|
Shared Services: Maverick or Originator?13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.159-170, ⟨10.1007/978-3-662-44426-9_13⟩
Conference papers
hal-01401737v1
|
- 1
- 2