Filter your results
- 1982
- 5
- 1977
- 5
- 4
- 1
- 1987
- 1985
- 1
- 58
- 54
- 35
- 32
- 31
- 31
- 29
- 29
- 26
- 26
- 24
- 24
- 22
- 21
- 20
- 20
- 20
- 20
- 59
- 218
- 128
- 162
- 154
- 220
- 160
- 290
- 275
- 139
- 182
- 1987
- 10
- 9
- 8
- 7
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 24
- 15
- 14
- 14
- 14
- 14
- 13
- 13
- 12
- 12
- 11
- 11
- 11
- 11
- 10
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
|
Looking for a Fit for Purpose: Business Process Maturity Models from a User’s Perspective6th Conference on Research and Practical Issues in Enterprise Information Systems (CONFENIS), Sep 2012, Ghent, Belgium. pp.182-189, ⟨10.1007/978-3-642-36611-6_15⟩
Conference papers
hal-01484678v1
|
||
|
Evaluating and Improving the Visualisation of CHOOSE, an Enterprise Architecture Approach for SMEs7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.87-102, ⟨10.1007/978-3-662-45501-2_7⟩
Conference papers
hal-01281991v1
|
||
|
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers
hal-01506705v1
|
||
|
Incorporating Big Data Analytics into Enterprise Information Systems3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.300-309, ⟨10.1007/978-3-319-24315-3_31⟩
Conference papers
hal-01466248v1
|
||
|
Pragmatic Software InnovationTransfer and Diffusion of IT (TDIT), Jun 2014, Aalborg, Denmark. pp.133-149, ⟨10.1007/978-3-662-43459-8_9⟩
Conference papers
hal-01381184v1
|
||
|
An Artifact-Based Framework for Business-IT Misalignment Symptom Detection9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.148-163, ⟨10.1007/978-3-319-48393-1_11⟩
Conference papers
hal-01653528v1
|
||
|
Process-Based Analysis of Digitally Transforming Skills11th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2017, Shanghai, China. pp.104-115, ⟨10.1007/978-3-319-94845-4_10⟩
Conference papers
hal-01888635v1
|
||
|
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers
hal-01480196v1
|
||
|
Provably Secure and Subliminal-Free Variant of Schnorr Signature1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers
hal-01480197v1
|
||
|
An Experimental Study on the Design and Modeling of Security Concepts in Business Processes6th The Practice of Entrprise Modeling (PoEM), Nov 2013, Riga, Latvia. pp.236-250, ⟨10.1007/978-3-642-41641-5_17⟩
Conference papers
hal-01474750v1
|
||
|
Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations10th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Dec 2016, Vienna, Austria. pp.127-141, ⟨10.1007/978-3-319-49944-4_10⟩
Conference papers
hal-01630544v1
|
||
|
Improving Rule Selection from Robot Soccer Strategy with Substrategies13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.77-88, ⟨10.1007/978-3-662-45237-0_9⟩
Conference papers
hal-01405561v1
|
||
|
Neural Network Classification of SDR Signal Modulation15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.160-171, ⟨10.1007/978-3-319-45378-1_15⟩
Conference papers
hal-01637483v1
|
||
|
Process of Point Clouds Merging for Mapping of a Robot’s Working Environment15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.251-264, ⟨10.1007/978-3-319-45378-1_23⟩
Conference papers
hal-01637492v1
|
||
|
The Radio Direction Finding with Advantage of the Software Defined Radio15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.720-728, ⟨10.1007/978-3-319-45378-1_62⟩
Conference papers
hal-01637506v1
|
||
|
Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.672-684, ⟨10.1007/978-3-319-59105-6_58⟩
Conference papers
hal-01656215v1
|
||
|
Sustaining Data Quality – Creating and Sustaining Data Quality within Diverse Enterprise Resource Planning and Information SystemsGovernance and Sustainability in Information Systems: Managing the Transfer and Diffusion of IT (Working conference), Sep 2011, Hamburg, Germany. pp.317-324, ⟨10.1007/978-3-642-24148-2_25⟩
Conference papers
hal-01571741v1
|
||
|
Towards a Semiotic-Based Approach to the Design of Therapeutic Digital Games18th International Conference on Informatics and Semiotics in Organisations (ICISO), Jul 2018, Reading, United Kingdom. pp.53-62, ⟨10.1007/978-3-319-94541-5_6⟩
Conference papers
hal-01920718v1
|
||
|
What Is This Thing Called e-Service? Interoperability Challenges in e-Service Modelling14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.197-208, ⟨10.1007/978-3-319-22479-4_15⟩
Conference papers
hal-01412255v1
|
||
|
Activities to Address Challenges in Digital Innovation5th Working Conference on Information Systems and Organizations (ISO), Dec 2014, Auckland, New Zealand. pp.115-131, ⟨10.1007/978-3-662-45708-5_8⟩
Conference papers
hal-01331820v1
|
||
|
Sustainability Qualifiers of Health Management Information Systems Implementation: Case Study of DHIS2 in IndiaIFIP Joint Working Conference on the Future of Digital Work: The Challenge of Inequality (IFIPJWC), Dec 2020, Hyderabad, India. pp.194-206, ⟨10.1007/978-3-030-64697-4_15⟩
Conference papers
hal-03450692v1
|
||
|
The Role of Social Capital in Mediating ICT-Enabled Peace Building Efforts: A Case Study from KenyaIFIP Joint Working Conference on the Future of Digital Work: The Challenge of Inequality (IFIPJWC), Dec 2020, Hyderabad, India. pp.326-340, ⟨10.1007/978-3-030-64697-4_24⟩
Conference papers
hal-03450708v1
|
||
|
Exploring the Role of Social Media in Chronic Care Management5th Working Conference on Information Systems and Organizations (ISO), Dec 2014, Auckland, New Zealand. pp.163-185, ⟨10.1007/978-3-662-45708-5_11⟩
Conference papers
hal-01331823v1
|
||
|
MetaExtractor: A System for Metadata Extraction from Structured Data Sources1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.84-99
Conference papers
hal-01506797v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.514-525, ⟨10.1007/978-3-662-45237-0_47⟩
Conference papers
hal-01405634v1
|
||
|
Identification of Persons by Virtue of Hand Geometry12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers
hal-01496097v1
|
||
|
Towards a Code of Ethics for Gamification at Enterprise7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.235-245, ⟨10.1007/978-3-662-45501-2_17⟩
Conference papers
hal-01282003v1
|
||
|
Subverting Network Intrusion Detection: Crafting Adversarial Examples Accounting for Domain-Specific Constraints4th International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2020, Dublin, Ireland. pp.301-320, ⟨10.1007/978-3-030-57321-8_17⟩
Conference papers
hal-03414751v1
|
||
|
Balancing Potential and Risk: The Living Lab Approach in Mobile Participation Research9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.12-23, ⟨10.1007/978-3-319-64322-9_2⟩
Conference papers
hal-01703323v1
|