Filter your results
- 1982
- 5
- 1977
- 5
- 4
- 1
- 1987
- 1985
- 1
- 58
- 54
- 35
- 32
- 31
- 31
- 29
- 29
- 26
- 26
- 24
- 24
- 22
- 21
- 20
- 20
- 20
- 20
- 59
- 218
- 128
- 162
- 154
- 220
- 160
- 290
- 275
- 139
- 182
- 1987
- 10
- 9
- 8
- 7
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 24
- 15
- 14
- 14
- 14
- 14
- 13
- 13
- 12
- 12
- 11
- 11
- 11
- 11
- 10
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
|
Cross-Border Legal Identity Management11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers
hal-01543589v1
|
||
|
Outcome Evaluation of StartBiz16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.399-410, ⟨10.1007/978-3-319-64677-0_33⟩
Conference papers
hal-01702974v1
|
||
|
Issues and Guiding Principles for Opening Governmental Judicial Research Data11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.90-101, ⟨10.1007/978-3-642-33489-4_8⟩
Conference papers
hal-01543591v1
|
||
|
A Coordination Theory Perspective to Improve the Use of Open Data in Policy-Making12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.38-49, ⟨10.1007/978-3-642-40358-3_4⟩
Conference papers
hal-01490921v1
|
||
|
Methodology for the Development of Accessible User Interfaces Based on Meta-Model Transformations: The Case of Blind Users16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.73-84, ⟨10.1007/978-3-319-59105-6_7⟩
Conference papers
hal-01656208v1
|
||
|
Implementing the Unifying Meta-model for Enterprise Modeling and Model-Driven Development: An Experience Report5th Working Conference on the Practice of Enterprise Modeling (PoEM), Nov 2012, Rostock, Germany. pp.172-187, ⟨10.1007/978-3-642-34549-4_13⟩
Conference papers
hal-01484381v1
|
||
|
Bringing Enterprise Modeling Closer to Model-Driven Development4th Practice of Enterprise Modeling (PoEM), Nov 2011, Oslo, Norway. pp.268-282, ⟨10.1007/978-3-642-24849-8_20⟩
Conference papers
hal-01572398v1
|
||
|
CSP-Based General Detection Model of Network Covert Storage Channels1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers
hal-01480205v1
|
||
|
A Pipeline Optimization Model for QKD Post-processing System2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.472-481, ⟨10.1007/978-3-642-55032-4_48⟩
Conference papers
hal-01397256v1
|
||
|
An Evolution Method of Service View Products Supported Dynamic Integration of Information Resources16th International Conference on Informatics and Semiotics in Organisations (ICISO), Mar 2015, Toulouse, France. pp.102-111, ⟨10.1007/978-3-319-16274-4_11⟩
Conference papers
hal-01324968v1
|
||
|
Detecting and Ranking API Usage Pattern in Large Source Code Repository: A LFM Based Approach1st International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2017, Reggio, Italy. pp.41-56, ⟨10.1007/978-3-319-66808-6_4⟩
Conference papers
hal-01677142v1
|
||
|
Emulation on the Internet Prefix Hijacking Attack Impaction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers
hal-01480207v1
|
||
|
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers
hal-01480208v1
|
||
|
Pose and Expression Recognition Using Limited Feature Points Based on a Dynamic Bayesian Network1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.228-242, ⟨10.1007/978-3-642-23300-5_18⟩
Conference papers
hal-01590396v1
|
||
|
A High-Speed Network Content Filtering SystemInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers
hal-01404003v1
|
||
|
Provably Secure and Subliminal-Free Variant of Schnorr Signature1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers
hal-01480197v1
|
||
|
System Structure Risk Metric Method Based on Information Flow15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.253-262, ⟨10.1007/978-3-642-55355-4_26⟩
Conference papers
hal-01350931v1
|
||
|
Assisting an Elderly with Early Dementia Using Wireless Sensors Data in Smarter Safer Home15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.398-404, ⟨10.1007/978-3-642-55355-4_41⟩
Conference papers
hal-01350948v1
|
||
|
Pipeline and Data Parallel Hybrid Indexing Algorithm for Multi-core Platform15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.272-280, ⟨10.1007/978-3-642-55355-4_28⟩
Conference papers
hal-01350933v1
|
||
|
A Research on Interaction and Merging between Modern Manufacturing and Producer Services15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.176-186, ⟨10.1007/978-3-642-55355-4_18⟩
Conference papers
hal-01350923v1
|
||
|
An Effective Cloud-Based Active Defense System against Malicious Codes2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.690-695, ⟨10.1007/978-3-642-55032-4_71⟩
Conference papers
hal-01397288v1
|
||
|
Method of Operational Activities and Processes Optimization Design in Architecture18th International Conference on Informatics and Semiotics in Organisations (ICISO), Jul 2018, Reading, United Kingdom. pp.259-267, ⟨10.1007/978-3-319-94541-5_26⟩
Conference papers
hal-01920713v1
|
||
|
Potentials of Living Labs for the Diffusion of Information Technology: A Conceptual AnalysisGovernance and Sustainability in Information Systems: Managing the Transfer and Diffusion of IT (Working conference), Sep 2011, Hamburg, Germany. pp.330-339, ⟨10.1007/978-3-642-24148-2_27⟩
Conference papers
hal-01571739v1
|
||
|
An Evolutionary Approach to Cyclic Real World Scheduling15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.366-373, ⟨10.1007/978-3-319-45378-1_33⟩
Conference papers
hal-01637490v1
|
||
|
Requirements Engineering for Capability Driven Development7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.193-207, ⟨10.1007/978-3-662-45501-2_14⟩
Conference papers
hal-01281999v1
|
||
|
An MDA Method for Service Modeling by Formalizing REA and Open-edi Business Frameworks with SBVR4th Working Conference on Method Engineering (ME), Apr 2011, Lisbon, Portugal. pp.219-224, ⟨10.1007/978-3-642-19997-4_20⟩
Conference papers
hal-01562882v1
|
||
|
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical AnalysisInternational Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.236-250, ⟨10.1007/978-3-319-45507-5_16⟩
Conference papers
hal-01635009v1
|
||
|
Information Communication Technology (ICT) for Disabled Persons in Bangladesh: Preliminary Study of Impact/OutcomeInternationalWorking Conference on Transfer and Diffusion of IT (TDIT), Jun 2013, Bangalore, India. pp.652-657, ⟨10.1007/978-3-642-38862-0_48⟩
Conference papers
hal-01468147v1
|
||
|
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers
hal-01542426v1
|
||
|
Sub-process Discovery: Opportunities for Process Diagnostics6th Conference on Research and Practical Issues in Enterprise Information Systems (CONFENIS), Sep 2012, Ghent, Belgium. pp.48-57, ⟨10.1007/978-3-642-36611-6_4⟩
Conference papers
hal-01483891v1
|