Filter your results
- 39
- 39
- 39
- 13
- 2
- 5
- 3
- 1
- 1
- 3
- 5
- 6
- 1
- 8
- 4
- 39
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
An e-Government Implementation Framework: A Developing Country Case Study19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.15-27, ⟨10.1007/978-3-030-45002-1_2⟩
Conference papers
hal-03774200v1
|
||
|
A Smart Card Implementation of the McEliece PKC4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers
hal-01056067v1
|
||
|
Pilot Implementation: Testing Human-Work Interaction Designs18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.570-574, ⟨10.1007/978-3-030-85607-6_79⟩
Conference papers
hal-04291193v1
|
||
|
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers
hal-01573313v1
|
||
|
High Performance Computing Applications Using Parallel Data Processing Units6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.191-206, ⟨10.1007/978-3-319-24644-4_13⟩
Conference papers
hal-01446600v1
|
||
|
How Do Users Perceive a Design-in-Use Approach to Implementation? A Healthcare Case17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.410-430, ⟨10.1007/978-3-030-29387-1_23⟩
Conference papers
hal-02553878v1
|
||
|
E-government Systems Design and Implementation in Developed and Developing Countries: Results from a Qualitative Analysis14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.44-58, ⟨10.1007/978-3-319-22479-4_4⟩
Conference papers
hal-01412235v1
|
||
|
Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.81-100, ⟨10.1007/978-3-642-25821-3_5⟩
Conference papers
hal-01597754v1
|
||
|
Stakeholder Salience Changes in an e-Government Implementation Project12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.237-249, ⟨10.1007/978-3-642-40358-3_20⟩
Conference papers
hal-01490970v1
|
||
|
Energy-Aware Hardware Implementation of Network CodingInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.137-144, ⟨10.1007/978-3-642-23041-7_14⟩
Conference papers
hal-01587833v1
|
||
|
Decoding Algorithms for Random Linear Network CodesInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.129-136, ⟨10.1007/978-3-642-23041-7_13⟩
Conference papers
hal-01587835v1
|
||
|
Kodo: An Open and Research Oriented Network Coding LibraryInternational IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.145-152, ⟨10.1007/978-3-642-23041-7_15⟩
Conference papers
hal-01587857v1
|
||
|
Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.333-342, ⟨10.1007/978-3-319-24315-3_34⟩
Conference papers
hal-01466234v1
|
||
|
Assimilation of Business Intelligence Systems: The Mediating Role of Organizational Knowledge Culture17th Conference on e-Business, e-Services and e-Society (I3E), Oct 2018, Kuwait City, Kuwait. pp.480-491, ⟨10.1007/978-3-030-02131-3_43⟩
Conference papers
hal-02274198v1
|
||
|
A Knowledge Asset Management Implementation Framework for Information Systems Outsourcing Projects19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.274-286, ⟨10.1007/978-3-030-45002-1_23⟩
Conference papers
hal-03774181v1
|
||
|
Exploring XBRL-Based Reporting System: A Conceptual Framework for System Adoption and Implementation15th Conference on e-Business, e-Services and e-Society (I3E), Sep 2016, Swansea, United Kingdom. pp.305-316, ⟨10.1007/978-3-319-45234-0_28⟩
Conference papers
hal-01702161v1
|
||
|
Code-Based Identification and Signature Schemes in Software1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers
hal-00864936v1
|
||
|
A Process Model of Artificial Intelligence Implementation Leading to Proper Decision Making20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.40-46, ⟨10.1007/978-3-030-85447-8_4⟩
Conference papers
hal-03648155v1
|
||
|
Contextual Factors Influencing Health Information Systems Implementation in Public Sector – Investigating the Explanatory Power of Critical Success Factors13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.59-71, ⟨10.1007/978-3-662-44426-9_5⟩
Conference papers
hal-01401725v1
|
||
|
Interoperability Description of Web Services Based Application Servers18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.328-339, ⟨10.1007/978-3-642-32808-4_30⟩
Conference papers
hal-01543174v1
|
||
|
Ready to Go? Schools’ Preparedness for Teaching and Learning Within a One-to-One Program19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.569-580, ⟨10.1007/978-3-030-44999-5_47⟩
Conference papers
hal-03222858v1
|
||
|
Ambiguities in the Early Stages of Public Sector Enterprise Architecture Implementation: Outlining Complexities of Interoperability10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.367-377, ⟨10.1007/978-3-642-22878-0_31⟩
Conference papers
hal-01589100v1
|
||
|
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.103-119, ⟨10.1007/978-3-030-41702-4_7⟩
Conference papers
hal-03173904v1
|
||
|
Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.266-277, ⟨10.1007/978-3-662-45237-0_26⟩
Conference papers
hal-01405596v1
|
||
|
Hardware Approach for Generating b-detectors by Immune-Based Algorithms13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.615-623, ⟨10.1007/978-3-662-45237-0_56⟩
Conference papers
hal-01405656v1
|
||
|
Rituals in E-Government Implementation: An Analysis of Failure9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.226-237, ⟨10.1007/978-3-642-14799-9_20⟩
Conference papers
hal-01056583v1
|
||
|
A Very Compact Hardware Implementation of the KASUMI Block Cipher4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.293-307, ⟨10.1007/978-3-642-12368-9_23⟩
Conference papers
hal-01056077v1
|
||
|
Neverlang 2 – Componentised Language Development for the JVM12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.17-32, ⟨10.1007/978-3-642-39614-4_2⟩
Conference papers
hal-01492774v1
|
||
|
A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.182-198, ⟨10.1007/978-3-642-27257-8_12⟩
Conference papers
hal-01596303v1
|
||
|
Analysis of QUIC session establishment and its implementations13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩
Conference papers
hal-02468596v1
|
- 1
- 2