Filter your results
- 26
- 1
- 26
- 1
- 27
- 1
- 1
- 3
- 2
- 3
- 5
- 4
- 3
- 2
- 2
- 1
- 27
- 14
- 9
- 5
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
27 results
|
|
sorted by
|
|
Using SensLAB as a First Class Scientific Tool for Large Scale Wireless Sensor Network Experiments10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.147-159, ⟨10.1007/978-3-642-20757-0_12⟩
Conference papers
hal-01583404v1
|
||
|
Analysis of Privacy Policies to Enhance Informed ConsentDBSEC 2019 - 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Jul 2019, Charleston, SC, United States. pp.177-198, ⟨10.1007/978-3-030-22479-0_10⟩
Conference papers
hal-02384593v1
|
||
|
Duality of Equations and Coequations via Contravariant Adjunctions13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.73-93, ⟨10.1007/978-3-319-40370-0_6⟩
Conference papers
hal-01446034v1
|
||
|
Trace Based System in TEL Systems: Theory and Practice6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.257-266, ⟨10.1007/978-3-319-89743-1_23⟩
Conference papers
hal-01913897v1
|
||
|
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienne, Austria. pp.102-117, ⟨10.1007/978-3-642-23300-5_9⟩
Conference papers
hal-01240094v1
|
||
|
Bisimilarity of Open Terms in Stream GSOS7th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2017, Teheran, Iran. pp.35-50, ⟨10.1007/978-3-319-68972-2_3⟩
Conference papers
hal-01760851v1
|
||
|
A Flow Scheduler Architecture9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.122-134, ⟨10.1007/978-3-642-12963-6_10⟩
Conference papers
hal-01056318v1
|
||
|
Encoding Synchronous Interactions Using Labelled Petri Nets16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.1-16, ⟨10.1007/978-3-662-43376-8_1⟩
Conference papers
hal-01290063v1
|
||
|
A Behavioural Theory for a π-calculus with Preorders6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.143-158, ⟨10.1007/978-3-319-24644-4_10⟩
Conference papers
hal-01246094v2
|
||
|
Dynamic Modeling of Location Privacy Protection MechanismsDAIS 2018 - DisCoTec 2018 - 18th IFIP International Conference on Distributed Applications and Interoperable Systems - Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, Jun 2018, Madrid, Spain. pp.26-39, ⟨10.1007/978-3-319-93767-0_3⟩
Conference papers
hal-01824641v1
|
||
|
Verification of concurrent design patterns with dataCOORDINATION 2019 - 21st International Conference on Coordination Models and Languages, Jun 2019, Kongens Lyngby, Denmark. pp.161-181, ⟨10.1007/978-3-030-22397-7_10⟩
Conference papers
hal-02143782v1
|
||
|
Distributed Applications and Interoperable SystemsSpringer International Publishing, LNCS-9038, 2015, Lecture Notes in Computer Science, 978-3-319-19128-7. ⟨10.1007/978-3-319-19129-4⟩
Books
hal-01775023v1
|
||
|
Verification of Smart Contract Business Logic8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.228-243, ⟨10.1007/978-3-030-31517-7_16⟩
Conference papers
hal-03769118v1
|
||
|
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers
hal-01633672v1
|
||
|
Horizontal vs. Vertical: How the Orientation of a Large Interactive Surface Impacts Collaboration in Multi-Surface Environments16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Mumbai, India. pp.202-222, ⟨10.1007/978-3-319-67687-6_14⟩
Conference papers
hal-01597913v1
|
||
|
Promise Plus: Flexible Synchronization for Parallel Computations on ArraysFSEN 2021 - 9th IPM International Conference on Fundamentals of Software Engineering, May 2021, Tehran, Iran. pp.1-7, ⟨10.1007/978-3-030-89247-0_13⟩
Conference papers
hal-03143269v1
|
||
|
TailX: Scheduling Heterogeneous Multiget Queries to Improve Tail Latencies in Key-Value Stores20th International Conference on Distributed Applications and Interoperable Systems, Jun 2020, Valletta, Malta. pp.73-92, ⟨10.1007/978-3-030-50323-9_5⟩
Conference papers
hal-02917566v1
|
||
|
Lawvere Categories as Composed PROPs13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.11-32, ⟨10.1007/978-3-319-40370-0_3⟩
Conference papers
hal-01446031v1
|
||
|
Inference Leakage Detection for Authorization Policies over RDF Data29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers
hal-01745813v1
|
||
|
A Model Theoretic Proof of Completeness of an Axiomatization of Monadic Second-Order Logic on Streams7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.310-324, ⟨10.1007/978-3-642-33475-7_22⟩
Conference papers
hal-00692153v1
|
||
|
A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks13th International Conference on Wired/Wireless Internet Communication (WWIC), May 2015, Malaga, Spain. pp.411-424
Conference papers
hal-01728801v1
|
||
|
BFT-Bench: Towards a Practical Evaluation of Robustness and Effectiveness of BFT Protocols16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Crete, Greece. pp.115-128, ⟨10.1007/978-3-319-39577-7_10⟩
Conference papers
hal-01372682v1
|
||
|
Energy-Efficient Cryptographic Engineering ParadigmInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.78-88, ⟨10.1007/978-3-642-27585-2_7⟩
Conference papers
hal-01481508v1
|
||
|
How to Kill Epsilons with a Dagger12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.53-74, ⟨10.1007/978-3-662-44124-4_4⟩
Conference papers
hal-01408752v1
|
||
|
Sensing as a Complexity Measure19th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2017, Milano, Italy. pp.3-15, ⟨10.1007/978-3-319-60252-3_1⟩
Conference papers
hal-01657019v1
|
||
|
The Group of Reversible Turing Machines22th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2016, Zurich, Switzerland. pp.49-62, ⟨10.1007/978-3-319-39300-1_5⟩
Conference papers
hal-01435034v1
|
||
|
Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.151-163, ⟨10.1007/978-3-662-44602-7_13⟩
Conference papers
hal-01015171v2
|