Search - IFIP Open Digital Library Access content directly

Filter your results

79 results
Structure: Internal structure identifier : 132871
Image document

Combining Software and Hardware LCS for Lightweight On-Chip Learning

Andreas Bernauer , Johannes Zeppenfeld , Oliver Bringmann , Andreas Herkersdorf , Wolfgang Rosenstiel
7th IFIP TC 10 Working Conference on Distributed, Parallel and Biologically Inspired Systems (DIPES) / 3rd IFIP TC 10 International Conference on Biologically-Inspired Collaborative Computing (BICC) / Held as Part of World Computer Congress (WCC) , Sep 2010, Brisbane, Australia. pp.278-289, ⟨10.1007/978-3-642-15234-4_27⟩
Conference papers hal-01054492v1
Image document

Distributed Stream Processing with DUP

Kai Christian Bader , Tilo Eissler , Nathan Evans , Chris Gauthierdickey , Christian Grothoff , et al.
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.232-246, ⟨10.1007/978-3-642-15672-4_21⟩
Conference papers hal-01054979v1
Image document

Towards Electrical, Integrated Implementations of SIMPL Systems

Ulrich Rührmair , Qingqing Chen , Martin Stutzmann , Paolo Lugli , Ulf Schlichtmann , et al.
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.277-292, ⟨10.1007/978-3-642-12368-9_22⟩
Conference papers hal-01056078v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network Downtime

Christian Merkle
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.198-208, ⟨10.1007/978-3-642-13971-0_19⟩
Conference papers hal-01056497v1
Image document

Distributed Resource Reservation for Beacon Based MAC Protocols

Frank Leipold , Jörg Eberspächer
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.217-225, ⟨10.1007/978-3-642-13971-0_21⟩
Conference papers hal-01056494v1
Image document

Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network

Quirin Hofstätter
16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.256-258, ⟨10.1007/978-3-642-13971-0_25⟩
Conference papers hal-01056490v1
Image document

Process and Data-Oriented Approach for Bundling Corporate Reporting Duties to Public Authorities - A Case Study on the Example of Waste Management Reporting

Armin Sharafi , Petra Wolf , Helmut Krcmar
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.400-411, ⟨10.1007/978-3-642-14799-9_34⟩
Conference papers hal-01056571v1
Image document

Toward a Formal Approach to Process Bundling in Public Administrations

Marlen Jurisch , Petra Wolf , Helmut Krcmar
9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.412-423, ⟨10.1007/978-3-642-14799-9_35⟩
Conference papers hal-01056570v1
Image document

Simulation of Acoustic Wave Propagation in Anisotropic Media Using Dynamic Programming Technique

Nikolai Botkin , Varvara Turova
26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.36-51, ⟨10.1007/978-3-662-45504-3_5⟩
Conference papers hal-01286451v1
Image document

SHRIFT System-Wide HybRid Information Flow Tracking

Enrico Lovat , Alexander Fromm , Martin Mohr , Alexander Pretschner
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.371-385, ⟨10.1007/978-3-319-18467-8_25⟩
Conference papers hal-01345128v1
Image document

Computation of Value Functions in Nonlinear Differential Games with State Constraints

Nikolai Botkin , Karl-Heinz Hoffmann , Natalie Mayer , Varvara Turova
25th System Modeling and Optimization (CSMO), Sep 2011, Berlin, Germany. pp.235-244, ⟨10.1007/978-3-642-36062-6_24⟩
Conference papers hal-01347543v1
Image document

Model-Based Detection of CSRF

Marco Rocchetto , Martín Ochoa , Mohammad Torabi Dashti
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.30-43, ⟨10.1007/978-3-642-55415-5_3⟩
Conference papers hal-01370351v1
Image document

Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures

Daniela Pöhn , Stefan Metzger , Wolfgang Hommel
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.307-320, ⟨10.1007/978-3-642-55415-5_25⟩
Conference papers hal-01370377v1
Image document

From Selling Products to Providing User Oriented Product-Service Systems – Exploring Service Orientation in the German Machine and Plant Manufacturing Industry

Konstantin Kernschmidt , Stephanie Preissner , Christina Raasch , Birgit Vogel-Heuser
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.280-290, ⟨10.1007/978-3-319-33111-9_26⟩
Conference papers hal-01377452v1
Image document

Augmented Reality Simulation of CAM Spatial Tool Paths in Prismatic Milling Sequences

Saša Ćuković , Goran Devedžić , Frieder Pankratz , Khalifa Baizid , Ionut Ghionea , et al.
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.516-525, ⟨10.1007/978-3-319-33111-9_47⟩
Conference papers hal-01377478v1
Image document

Verifying Security Policies Using Host Attributes

Cornelius Diekmann , Stephan-A. Posselt , Heiko Niedermayer , Holger Kinkelin , Oliver Hanka , et al.
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers hal-01398013v1
Image document

Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks

Johann Schlamp , Ralph Holz , Oliver Gasser , Andreas Korsten , Quentin Jacquemart , et al.
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.173-187, ⟨10.1007/978-3-319-17172-2_12⟩
Conference papers hal-01411193v1
Image document

The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

Johann Schlamp , Josef Gustafsson , Matthias Wählisch , Thomas C. Schmidt , Georg Carle
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.188-201, ⟨10.1007/978-3-319-17172-2_13⟩
Conference papers hal-01411194v1
Image document

DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks

Timm Böttger , Lothar Braun , Oliver Gasser , Felix Von Eye , Helmut Reiser , et al.
7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩
Conference papers hal-01411196v1
Image document

Why Realization Mismatches Expectations of e-Government Project Benefits? Towards Benefit Realization Planning

Dian Balta , Vanessa Greger , Petra Wolf , Helmut Krcmar
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.233-245, ⟨10.1007/978-3-319-22479-4_18⟩
Conference papers hal-01412274v1
Image document

Factors for Effective Learning in Production Networks to Improve Environmental Performance

Alexander Schurig , Mélanie Despeisse , Eric Unterberger , Steve Evans , Gunther Reinhart
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2015, Tokyo, Japan. pp.697-704, ⟨10.1007/978-3-319-22756-6_85⟩
Conference papers hal-01417636v1
Image document

Security Challenges of Additive Manufacturing with Metals and Alloys

Mark Yampolskiy , Lena Schutzle , Uday Vaidya , Alec Yasinsac
9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.169-183, ⟨10.1007/978-3-319-26567-4_11⟩
Conference papers hal-01431001v1
Image document

Analyzing Attack Strategies Through Anti-goal Refinement

Tong Li , Jennifer Horkoffi , Elda Pajai , Kristian Beckers , John Mylopoulos
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.75-90, ⟨10.1007/978-3-319-25897-3_6⟩
Conference papers hal-01442299v1
Image document

Cycle Oriented Quality Management at the Interface of Product Development and Production Planning

Jonas Koch , Josef Greitemann , Christian Plehn , Gunther Reinhart
10th Product Lifecycle Management for Society (PLM), Jul 2013, Nantes, France. pp.491-499, ⟨10.1007/978-3-642-41501-2_49⟩
Conference papers hal-01461896v1
Image document

Statistical Model Checking for Composite Actor Systems

Jonas Eckhardt , Tobias Mühlbauer , José Meseguer , Martin Wirsing
21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.143-160, ⟨10.1007/978-3-642-37635-1_9⟩
Conference papers hal-01485983v1
Image document

Immersive Interactive Information Mining with Application to Earth Observation Data Retrieval

Mohammadreza Babaee , Gerhard Rigoll , Mihai Datcu
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.376-386
Conference papers hal-01506787v1
Image document

Lifecycle Oriented Planning of Mechatronic Products and Corresponding Services

Konstantin Kernschmidt , Clemens Hepperle , Markus Mörtl , Birgit Vogel-Heuser
9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.349-358, ⟨10.1007/978-3-642-35758-9_31⟩
Conference papers hal-01526120v1
Image document

Life-Cycle Oriented Requirement Formalization and Traceability

Robert Orawski , Clemens Hepperle , Sebastian Schenkl , Markus Mörtl , Udo Lindemann
9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.124-133, ⟨10.1007/978-3-642-35758-9_11⟩
Conference papers hal-01526146v1
Image document

Efficient and Secure Decentralized Network Size Estimation

Nathan Evans , Bartlomiej Polot , Christian Grothoff
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.304-317, ⟨10.1007/978-3-642-30045-5_23⟩
Conference papers hal-01531109v1