Search - IFIP Open Digital Library Access content directly

Filter your results

1 987 results
Sub-domain level 1 : shs.info
Image document

Cross-Border Legal Identity Management

Bernd Zwattendorfer , Arne Tauber , Klaus Stranacher , Peter Reichstädter
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers hal-01543589v1
Image document

Outcome Evaluation of StartBiz

Kristina Zumbusch , Philippe Zimmermann , Emamdeen Fohim
16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.399-410, ⟨10.1007/978-3-319-64677-0_33⟩
Conference papers hal-01702974v1
Image document

Issues and Guiding Principles for Opening Governmental Judicial Research Data

Anneke Zuiderwijk , Marijn Janssen , Ronald Meijer , Sunil Choenni , Yannis Charalabidis , et al.
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.90-101, ⟨10.1007/978-3-642-33489-4_8⟩
Conference papers hal-01543591v1
Image document

A Coordination Theory Perspective to Improve the Use of Open Data in Policy-Making

Anneke Zuiderwijk , Marijn Janssen
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.38-49, ⟨10.1007/978-3-642-40358-3_4⟩
Conference papers hal-01490921v1
Image document

Methodology for the Development of Accessible User Interfaces Based on Meta-Model Transformations: The Case of Blind Users

Lamia Zouhaier , Yousra Bendaly Hlaoui , Leila Ayed
16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.73-84, ⟨10.1007/978-3-319-59105-6_7⟩
Conference papers hal-01656208v1
Image document

Implementing the Unifying Meta-model for Enterprise Modeling and Model-Driven Development: An Experience Report

Iyad Zikra
5th Working Conference on the Practice of Enterprise Modeling (PoEM), Nov 2012, Rostock, Germany. pp.172-187, ⟨10.1007/978-3-642-34549-4_13⟩
Conference papers hal-01484381v1
Image document

Bringing Enterprise Modeling Closer to Model-Driven Development

Iyad Zikra , Janis Stirna , Jelena Zdravkovic
4th Practice of Enterprise Modeling (PoEM), Nov 2011, Oslo, Norway. pp.268-282, ⟨10.1007/978-3-642-24849-8_20⟩
Conference papers hal-01572398v1
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1
Image document

A Pipeline Optimization Model for QKD Post-processing System

Jianyi Zhou , Bo Liu , Baokang Zhao , Bo Liu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.472-481, ⟨10.1007/978-3-642-55032-4_48⟩
Conference papers hal-01397256v1
Image document

An Evolution Method of Service View Products Supported Dynamic Integration of Information Resources

Shu Zhen , Luo Aimin , Luo Xueshan
16th International Conference on Informatics and Semiotics in Organisations (ICISO), Mar 2015, Toulouse, France. pp.102-111, ⟨10.1007/978-3-319-16274-4_11⟩
Conference papers hal-01324968v1
Image document

Detecting and Ranking API Usage Pattern in Large Source Code Repository: A LFM Based Approach

Jitong Zhao , Yan Liu
1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.41-56, ⟨10.1007/978-3-319-66808-6_4⟩
Conference papers hal-01677142v1
Image document

Emulation on the Internet Prefix Hijacking Attack Impaction

Jinjing Zhao , Yan Wen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers hal-01480207v1
Image document

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction

Lu Zhao , Ho-Seok Kang , Sung-Ryul Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers hal-01480208v1
Image document

Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network

Wei Zhao , Goo-Rak Kwon , Sang-Woong Lee
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.228-242, ⟨10.1007/978-3-642-23300-5_18⟩
Conference papers hal-01590396v1
Image document

A High-Speed Network Content Filtering System

Guohong Zhao , Shuhui Chen , Baokang Zhao , Ilsun You , Jinshu Su , et al.
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers hal-01404003v1
Image document

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Yinghui Zhang , Hui Li , Xiaoqing Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers hal-01480197v1
Image document

System Structure Risk Metric Method Based on Information Flow

Mengmeng Zhang , Junxian Liu , Aimin Luo , Xueshan Luo
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.253-262, ⟨10.1007/978-3-642-55355-4_26⟩
Conference papers hal-01350931v1
Image document

Assisting an Elderly with Early Dementia Using Wireless Sensors Data in Smarter Safer Home

Qing Zhang , Ying Su , Ping Yu
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.398-404, ⟨10.1007/978-3-642-55355-4_41⟩
Conference papers hal-01350948v1
Image document

Pipeline and Data Parallel Hybrid Indexing Algorithm for Multi-core Platform

Suqing Zhang , Jirui Li
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.272-280, ⟨10.1007/978-3-642-55355-4_28⟩
Conference papers hal-01350933v1
Image document

A Research on Interaction and Merging between Modern Manufacturing and Producer Services

Jiemei Zhang
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.176-186, ⟨10.1007/978-3-642-55355-4_18⟩
Conference papers hal-01350923v1
Image document

An Effective Cloud-Based Active Defense System against Malicious Codes

Zhenyu Zhang , Wujun Zhang , Jianfeng Wang , Xiaofeng Chen
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.690-695, ⟨10.1007/978-3-642-55032-4_71⟩
Conference papers hal-01397288v1
Image document

Method of Operational Activities and Processes Optimization Design in Architecture

Xiaoxue Zhang , Aimin Luo , Gang Liu , Junxian Liu
18th International Conference on Informatics and Semiotics in Organisations (ICISO), Jul 2018, Reading, United Kingdom. pp.259-267, ⟨10.1007/978-3-319-94541-5_26⟩
Conference papers hal-01920713v1
Image document

Potentials of Living Labs for the Diffusion of Information Technology: A Conceptual Analysis

Dorothée Zerwas , Harald Kortzfleisch
Governance and Sustainability in Information Systems: Managing the Transfer and Diffusion of IT (Working conference), Sep 2011, Hamburg, Germany. pp.330-339, ⟨10.1007/978-3-642-24148-2_27⟩
Conference papers hal-01571739v1
Image document

An Evolutionary Approach to Cyclic Real World Scheduling

Dominik Żelazny
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.366-373, ⟨10.1007/978-3-319-45378-1_33⟩
Conference papers hal-01637490v1
Image document

Requirements Engineering for Capability Driven Development

Jelena Zdravkovic , Janis Stirna , Jan-Christian Kuhr , Hasan Koç
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.193-207, ⟨10.1007/978-3-662-45501-2_14⟩
Conference papers hal-01281999v1
Image document

An MDA Method for Service Modeling by Formalizing REA and Open-edi Business Frameworks with SBVR

Jelena Zdravkovic , Iyad Zikra , Tharaka Ilayperuma
4th Working Conference on Method Engineering (ME), Apr 2011, Lisbon, Portugal. pp.219-224, ⟨10.1007/978-3-642-19997-4_20⟩
Conference papers hal-01562882v1
Image document

A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysis

Katerina Zamani , Angelos Charalambidis , Stasinos Konstantopoulos , Maria Dagioglou , Vangelis Karkaletsis
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.236-250, ⟨10.1007/978-3-319-45507-5_16⟩
Conference papers hal-01635009v1
Image document

Information Communication Technology (ICT) for Disabled Persons in Bangladesh: Preliminary Study of Impact/Outcome

Md. Alam Zahid , Md. Mahfuz Ashraf , Bushra Tahseen Malik , Md. Rakibul Hoque
InternationalWorking Conference on Transfer and Diffusion of IT (TDIT), Jun 2013, Bangalore, India. pp.652-657, ⟨10.1007/978-3-642-38862-0_48⟩
Conference papers hal-01468147v1
Image document

Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts

Marek Zachara , Dariusz Pałka
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers hal-01542426v1
Image document

Sub-process Discovery: Opportunities for Process Diagnostics

Raykenler Yzquierdo-Herrera , Rogelio Silverio-Castro , Manuel Lazo-Cortés
6th Conference on Research and Practical Issues in Enterprise Information Systems (CONFENIS), Sep 2012, Ghent, Belgium. pp.48-57, ⟨10.1007/978-3-642-36611-6_4⟩
Conference papers hal-01483891v1