Search - IFIP Open Digital Library Access content directly

Filter your results

1 738 results
level0_domain_s : Computer Science [cs]
publicationDateY_i : 2012
Image document

Privacy-Preserving Scheduling Mechanism for eHealth Systems

Milica Milutinovic , Vincent Naessens , Bart De Decker
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers hal-01540885v1
Image document

Designing Privacy-Enhancing Mobile Applications

Koen Decroix , Bart De Decker , Vincent Naessens
7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.157-170, ⟨10.1007/978-3-642-31668-5_12⟩
Conference papers hal-01517593v1
Image document

Improving Support for Visual Task Modelling

Fabio Paternò , Carmen Santoro , Lucio Davide Spano
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.299-306, ⟨10.1007/978-3-642-34347-6_21⟩
Conference papers hal-01556813v1
Image document

A Compositional Model for Gesture Definition

Lucio Davide Spano , Antonio Cisternino , Fabio Paternò
4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.34-52, ⟨10.1007/978-3-642-34347-6_3⟩
Conference papers hal-01556826v1
Image document

Value-Based Design for Gamifying Daily Activities

Mizuki Sakamoto , Tatsuo Nakajima , Todorka Alexandrova
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.421-424, ⟨10.1007/978-3-642-33542-6_43⟩
Conference papers hal-01556130v1
Image document

Intrusion Tolerance of Stealth DoS Attacks to Web Services

Massimo Ficco , Massimiliano Rak
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.579-584, ⟨10.1007/978-3-642-30436-1_52⟩
Conference papers hal-01518217v1
Image document

A Response Strategy Model for Intrusion Response Systems

Nor Badrul Anuar , Maria Papadaki , Steven Furnell , Nathan L. Clarke
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.573-578, ⟨10.1007/978-3-642-30436-1_51⟩
Conference papers hal-01518222v1
Image document

Optimizing Network Patching Policy Decisions

Yolanta Beres , Jonathan Griffin
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.424-442, ⟨10.1007/978-3-642-30436-1_35⟩
Conference papers hal-01518224v1
Image document

Enhanced Dictionary Based Rainbow Table

Vrizlynn Thing , Hwei-Ming Ying
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.513-524, ⟨10.1007/978-3-642-30436-1_42⟩
Conference papers hal-01518235v1
Image document

A Framework for Threat Assessment in Access Control Systems

Hemanth Khambhammettu , Sofiene Boulares , Kamel Adi , Luigi Logrippo
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.187-198, ⟨10.1007/978-3-642-30436-1_16⟩
Conference papers hal-01518243v1
Image document

A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation

Giuseppe D’acquisto , Marta Flamini , Maurizio Naldi
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.412-423, ⟨10.1007/978-3-642-30436-1_34⟩
Conference papers hal-01518258v1
Image document

Unifying Thread-Level Speculation and Transactional Memory

João Barreto , Aleksandar Dragojevic , Paulo Ferreira , Ricardo Filipe , Rachid Guerraoui
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.187-207, ⟨10.1007/978-3-642-35170-9_10⟩
Conference papers hal-01555545v1
Image document

The Difference Analysis between Demographic Variables and Personal Attributes – The Case of Internal Auditors in Taiwan

Li-Jia Chiu , Neng-Tang Norman Huang
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.394-400, ⟨10.1007/978-3-642-35606-3_46⟩
Conference papers hal-01551317v1
Image document

Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness

Shiang-Lan Kuo
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.409-413, ⟨10.1007/978-3-642-35606-3_48⟩
Conference papers hal-01551373v1
Image document

Perception of Motion and Architectural Form: Computational Relationships between Optical Flow and Perspective

Arash Sangari , Hasti Mirkia , Amir H. Assadi
3rd Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Feb 2012, Costa de Caparica, Portugal. pp.219-228, ⟨10.1007/978-3-642-28255-3_24⟩
Conference papers hal-01365588v1
Image document

PolderCast: Fast, Robust, and Scalable Architecture for P2P Topic-Based Pub/Sub

Vinay Setty , Maarten Van Steen , Roman Vitenberg , Spyros Voulgaris
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.271-291, ⟨10.1007/978-3-642-35170-9_14⟩
Conference papers hal-01555561v1
Image document

Online Communities Support Policy-Making: The Need for Data Analysis

Roman Klinger , Philipp Senger , Sumit Madan , Michal Jacovi
4th International Conference on Electronic Participation (ePart), Sep 2012, Kristiansand, Norway. pp.132-143, ⟨10.1007/978-3-642-33250-0_12⟩
Conference papers hal-01541476v1
Image document

The Application of Classical Least Square Algorithm in the Quantitative Analysis of Lime in Wheat Flour by ATR-MIR Spectroscopy

Dong Wang , Donghai Han , Zhihong Ma , Ligang Pan , Liu Zhao , et al.
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.8-16, ⟨10.1007/978-3-642-27278-3_2⟩
Conference papers hal-01360958v1
Image document

Determination of Corn Nutrient Status under N&K Stressed Condition Using Hyperspectral Analysis

Haihua Wang , Minzan Li , Yane Zhang
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.302-313, ⟨10.1007/978-3-642-27278-3_32⟩
Conference papers hal-01360996v1
Image document

Large-Scale Microwave Remote Sensing of Retrieving Surface Multi-parameters Using Active and Passive Satellite Data: In the Tibetan Plateau Region of Maqu

Ruofei Zhong , Jianxi Huang , Jiangxia Wei , Qin Li , Jiao Guo , et al.
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.415-426, ⟨10.1007/978-3-642-27278-3_44⟩
Conference papers hal-01361009v1
Image document

Discriminant Analysis of Red Wines from Different Aging Ways by Information Fusion of NIR and MIR Spectra

Sijia Tao , Jingming Li , Junhui Li , Jianbo Tang , Jinrui Mi , et al.
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.478-483, ⟨10.1007/978-3-642-27278-3_49⟩
Conference papers hal-01361017v1
Image document

Qualitative Analysis of Age and Brand of Unblended Brandy by Electronic Nose

Yang Yang , Yu Zhao , Shuming Zhang , Yuanying Ni , Jicheng Zhan
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.619-628, ⟨10.1007/978-3-642-27278-3_64⟩
Conference papers hal-01361042v1

Computer and Computing Technologies in Agriculture V (Part II)

Daoliang Li , Yingyi Chen
Springer, AICT-369 (Part II), 2012, IFIP Advances in Information and Communication Technology, 978-3-642-27277-6. ⟨10.1007/978-3-642-27278-3⟩
Books hal-01361065v1
Image document

Optimization Strategy on Cash Transportation Routing of Banks

Longjia Xiao , Xin Wang
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.28-42, ⟨10.1007/978-3-642-27275-2_4⟩
Conference papers hal-01361116v1
Image document

The Impact of IPv6 on Penetration Testing

Christiaan Ottow , Frank Van Vliet , Pieter-Tjerk De Boer , Aiko Pras
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.88-99, ⟨10.1007/978-3-642-32808-4_9⟩
Conference papers hal-01543169v1
Image document

Multi-classify Hybrid Multilayered Perceptron (HMLP) Network for Pattern Recognition Applications

Fakroul Ridzuan Bin Hashim , John J. Soraghan , Lykourgos Petropoulakis
8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.19-27, ⟨10.1007/978-3-642-33409-2_3⟩
Conference papers hal-01521433v1
Image document

Research on the Simulation Model of Above-Ground Organs Morphogenesis of Flue-Cured Tobacco

Shuping Xiong , Lei Xi , Jucai Wang , Guanghui Xu , Xinming Ma
5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.217-229, ⟨10.1007/978-3-642-27275-2_24⟩
Conference papers hal-01361141v1
Image document

PLMXQuery: Towards a Standard PLM Querying Approach

Mohamed-Foued Sriti , Philippe Boutinaud
9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.379-388, ⟨10.1007/978-3-642-35758-9_34⟩
Conference papers hal-01526163v1
Image document

Using an Atlas-Based Approach in the Analysis of Gene Expression Maps Obtained by Voxelation

Evangelia I. Zacharaki , Angeliki Skoura , Li An , Desmond J. Smith , Vasileios Megalooikonomou
8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.566-575, ⟨10.1007/978-3-642-33412-2_58⟩
Conference papers hal-01523042v1
Image document

Open Bisimulation for Quantum Processes

Yuxin Deng , Yuan Feng
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.119-133, ⟨10.1007/978-3-642-33475-7_9⟩
Conference papers hal-01556225v1