Filter your results
- 2958
- 75
- 7
- 2872
- 104
- 64
- 3040
- 444
- 20
- 2
- 2
- 2
- 1
- 1
- 1
- 64
- 61
- 52
- 49
- 35
- 34
- 33
- 28
- 26
- 26
- 26
- 26
- 25
- 24
- 23
- 23
- 22
- 21
- 21
- 20
- 20
- 1491
- 1549
- 17
- 391
- 1426
- 1745
- 1201
- 1468
- 1555
- 1735
- 2096
- 1738
- 1962
- 1581
- 2
- 1
- 1
- 3040
- 15
- 13
- 12
- 12
- 11
- 11
- 11
- 8
- 8
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 21
- 14
- 11
- 10
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
3 040 results
|
Not just User Control in the General Data Protection RegulationAnja Lehmann; Diane Whitehouse; Simone Fischer-Hübner; Lothar Fritsch; Charles Raab. Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, AICT-498, Springer International Publishing, pp.140-163, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0_11⟩
Book sections
hal-01629151v1
|
||
|
Approximate Riesz Representatives of Shape Gradients27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.399-409, ⟨10.1007/978-3-319-55795-3_38⟩
Conference papers
hal-01626913v1
|
||
|
A Criterion for Robust Stability with Respect to Parametric Uncertainties Modeled by Multiplicative White Noise with Unknown Intensity, with Applications to Stability of Neural Networks27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.250-260, ⟨10.1007/978-3-319-55795-3_23⟩
Conference papers
hal-01626925v1
|
||
|
Data-Driven Modelling: Towards Interpreting and Understanding Process Evolution of In-Service Engineering Projects12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.291-300, ⟨10.1007/978-3-319-33111-9_27⟩
Conference papers
hal-01377453v1
|
||
|
Modelling the Evolution of Computer Aided Design Models: Investigating the Potential for Supporting Engineering Project Management12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.344-354, ⟨10.1007/978-3-319-33111-9_32⟩
Conference papers
hal-01377458v1
|
||
|
Innovation and Governance: The Role of Sharing Economy6th IFIP World Information Technology Forum (WITFOR), Sep 2016, San José, Costa Rica. pp.195-204, ⟨10.1007/978-3-319-44447-5_18⟩
Conference papers
hal-01429747v1
|
||
|
System Design and Analysis of UAV-Assisted BLE Wireless Sensor Systems14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.284-296, ⟨10.1007/978-3-319-33936-8_22⟩
Conference papers
hal-01434877v1
|
||
|
Automatic Generation and Qualification of Assertions on Control Signals: A Time Window-Based Approach23th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2015, Daejeon, South Korea. pp.193-221, ⟨10.1007/978-3-319-46097-0_10⟩
Conference papers
hal-01578610v1
|
||
|
Ransomware Steals Your Phone. Formal Methods Rescue It36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.212-221, ⟨10.1007/978-3-319-39570-8_14⟩
Conference papers
hal-01432919v1
|
||
|
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi DiagramsInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.141-157, ⟨10.1007/978-3-319-45507-5_10⟩
Conference papers
hal-01635003v1
|
||
|
A Threat to Friendship Privacy in FacebookInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.96-105, ⟨10.1007/978-3-319-45507-5_7⟩
Conference papers
hal-01635021v1
|
||
|
Mindtraining: Playful Interaction Techniques for People with Dementia15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.223-228, ⟨10.1007/978-3-319-46100-7_21⟩
Conference papers
hal-01640286v1
|
||
|
Multipath TCP Proxy: Unshackling Network Nodes from Today’s End-to-End Connection Principle14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.55-65, ⟨10.1007/978-3-319-33936-8_5⟩
Conference papers
hal-01434867v1
|
||
|
Towards a Research Framework of Computer-Supported Organizational Participation8th International Conference on Electronic Participation (ePart), Sep 2016, Guimarães, Portugal. pp.17-28, ⟨10.1007/978-3-319-45074-2_2⟩
Conference papers
hal-01637230v1
|
||
|
Guaranteeing Correctness of Bulk Operations in Outsourced Databases30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.37-51, ⟨10.1007/978-3-319-41483-6_3⟩
Conference papers
hal-01633666v1
|
||
|
MONET – Monash University’s Campus LAN in the 1980s – A Bridge to Better NetworkingIFIP International Conference on the History of Computing (HC), May 2016, Brooklyn, NY, United States. pp.23-48, ⟨10.1007/978-3-319-49463-0_2⟩
Conference papers
hal-01620140v1
|
||
|
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.91-104, ⟨10.1007/978-3-319-33630-5_7⟩
Conference papers
hal-01369545v1
|
||
|
Enhancing Image Forgery Detection Using 2-D Cross Products12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.297-310, ⟨10.1007/978-3-319-46279-0_15⟩
Conference papers
hal-01758681v1
|
||
|
Reconstructing Tabbed Browser Sessions Using Metadata Associations12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.165-188, ⟨10.1007/978-3-319-46279-0_9⟩
Conference papers
hal-01758688v1
|
||
|
The Growth Analysis in the Wheat Filling Process of the Two Hybrids and Their Parents Based on Richards Equation9th International Conference on Computer and Computing Technologies in Agriculture (CCTA), Sep 2015, Beijing, China. pp.1-7, ⟨10.1007/978-3-319-48357-3_1⟩
Conference papers
hal-01557808v1
|
||
|
A Web-Based Cooperation and Retrieval Model of Character Images for Ancient Chinese Character Research9th International Conference on Computer and Computing Technologies in Agriculture (CCTA), Sep 2015, Beijing, China. pp.27-44, ⟨10.1007/978-3-319-48357-3_4⟩
Conference papers
hal-01557816v1
|
||
|
Research and Experiment on Precision Seeding Control System of Maize Planter9th International Conference on Computer and Computing Technologies in Agriculture (CCTA), Sep 2015, Beijing, China. pp.528-535, ⟨1010.1007/978-3-319-48357-3_49⟩
Conference papers
hal-01557839v1
|
||
|
The Role of Local Open Source Communities in the Development of Open Source Projects12th IFIP International Conference on Open Source Systems (OSS), May 2016, Gothenburg, Sweden. pp.3-15, ⟨10.1007/978-3-319-39225-7_1⟩
Conference papers
hal-01369047v1
|
||
|
Using an Information Management Model as a Roadmap for Information Systems Implementation in Supply Networks17th Working Conference on Virtual Enterprises (PRO-VE), Oct 2016, Porto, Portugal. pp.73-83, ⟨10.1007/978-3-319-45390-3_7⟩
Conference papers
hal-01614625v1
|
||
|
Application and Algorithm: Maximal Motif Discovery for Biological Data in a Sliding Window16th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2020, Neos Marmaras, Greece. pp.213-224, ⟨10.1007/978-3-030-49190-1_19⟩
Conference papers
hal-03677615v1
|
||
|
Intelligent Orchestration of End-to-End Network Slices for the Allocation of Mission Critical Services over NFV Architectures16th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2020, Neos Marmaras, Greece. pp.74-83, ⟨10.1007/978-3-030-49190-1_7⟩
Conference papers
hal-03677634v1
|
||
|
On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.126-141, ⟨10.1007/978-3-030-42504-3_9⟩
Conference papers
hal-03378969v1
|
||
|
Barriers for User Acceptance of Mobile Health Applications for Diabetic Patients: Applying the UTAUT Model19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.61-72, ⟨10.1007/978-3-030-45002-1_6⟩
Conference papers
hal-03774176v1
|
||
|
How Can Critical Thinking Be Used to Assess the Credibility of Online Information?19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.199-210, ⟨10.1007/978-3-030-45002-1_17⟩
Conference papers
hal-03774178v1
|
||
|
A Systematic Review on Fake News Themes Reported in Literature19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.223-234, ⟨10.1007/978-3-030-45002-1_19⟩
Conference papers
hal-03774193v1
|