Filter your results
- 79
- 79
- 77
- 13
- 2
- 1
- 4
- 5
- 10
- 7
- 6
- 11
- 9
- 4
- 4
- 4
- 5
- 9
- 79
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 7
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Combining Software and Hardware LCS for Lightweight On-Chip Learning7th IFIP TC 10 Working Conference on Distributed, Parallel and Biologically Inspired Systems (DIPES) / 3rd IFIP TC 10 International Conference on Biologically-Inspired Collaborative Computing (BICC) / Held as Part of World Computer Congress (WCC) , Sep 2010, Brisbane, Australia. pp.278-289, ⟨10.1007/978-3-642-15234-4_27⟩
Conference papers
hal-01054492v1
|
||
|
Distributed Stream Processing with DUPIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.232-246, ⟨10.1007/978-3-642-15672-4_21⟩
Conference papers
hal-01054979v1
|
||
|
Towards Electrical, Integrated Implementations of SIMPL Systems4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.277-292, ⟨10.1007/978-3-642-12368-9_22⟩
Conference papers
hal-01056078v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network Downtime 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.198-208, ⟨10.1007/978-3-642-13971-0_19⟩
Conference papers
hal-01056497v1
|
||
|
Distributed Resource Reservation for Beacon Based MAC Protocols 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.217-225, ⟨10.1007/978-3-642-13971-0_21⟩
Conference papers
hal-01056494v1
|
||
|
Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications - Engineering, Control and Management (EUNICE), Jun 2010, Trondheim, Norway. pp.256-258, ⟨10.1007/978-3-642-13971-0_25⟩
Conference papers
hal-01056490v1
|
||
|
Process and Data-Oriented Approach for Bundling Corporate Reporting Duties to Public Authorities - A Case Study on the Example of Waste Management Reporting9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.400-411, ⟨10.1007/978-3-642-14799-9_34⟩
Conference papers
hal-01056571v1
|
||
|
Toward a Formal Approach to Process Bundling in Public Administrations9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.412-423, ⟨10.1007/978-3-642-14799-9_35⟩
Conference papers
hal-01056570v1
|
||
|
Simulation of Acoustic Wave Propagation in Anisotropic Media Using Dynamic Programming Technique26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.36-51, ⟨10.1007/978-3-662-45504-3_5⟩
Conference papers
hal-01286451v1
|
||
|
SHRIFT System-Wide HybRid Information Flow Tracking30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.371-385, ⟨10.1007/978-3-319-18467-8_25⟩
Conference papers
hal-01345128v1
|
||
|
Computation of Value Functions in Nonlinear Differential Games with State Constraints25th System Modeling and Optimization (CSMO), Sep 2011, Berlin, Germany. pp.235-244, ⟨10.1007/978-3-642-36062-6_24⟩
Conference papers
hal-01347543v1
|
||
|
Model-Based Detection of CSRF29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.30-43, ⟨10.1007/978-3-642-55415-5_3⟩
Conference papers
hal-01370351v1
|
||
|
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.307-320, ⟨10.1007/978-3-642-55415-5_25⟩
Conference papers
hal-01370377v1
|
||
|
From Selling Products to Providing User Oriented Product-Service Systems – Exploring Service Orientation in the German Machine and Plant Manufacturing Industry12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.280-290, ⟨10.1007/978-3-319-33111-9_26⟩
Conference papers
hal-01377452v1
|
||
|
Augmented Reality Simulation of CAM Spatial Tool Paths in Prismatic Milling Sequences12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.516-525, ⟨10.1007/978-3-319-33111-9_47⟩
Conference papers
hal-01377478v1
|
||
|
Verifying Security Policies Using Host Attributes34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩
Conference papers
hal-01398013v1
|
||
|
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.173-187, ⟨10.1007/978-3-319-17172-2_12⟩
Conference papers
hal-01411193v1
|
||
|
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.188-201, ⟨10.1007/978-3-319-17172-2_13⟩
Conference papers
hal-01411194v1
|
||
|
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.205-218, ⟨10.1007/978-3-319-17172-2_14⟩
Conference papers
hal-01411196v1
|
||
|
Why Realization Mismatches Expectations of e-Government Project Benefits? Towards Benefit Realization Planning14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.233-245, ⟨10.1007/978-3-319-22479-4_18⟩
Conference papers
hal-01412274v1
|
||
|
Factors for Effective Learning in Production Networks to Improve Environmental PerformanceIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2015, Tokyo, Japan. pp.697-704, ⟨10.1007/978-3-319-22756-6_85⟩
Conference papers
hal-01417636v1
|
||
|
Security Challenges of Additive Manufacturing with Metals and Alloys9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.169-183, ⟨10.1007/978-3-319-26567-4_11⟩
Conference papers
hal-01431001v1
|
||
|
Analyzing Attack Strategies Through Anti-goal Refinement8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.75-90, ⟨10.1007/978-3-319-25897-3_6⟩
Conference papers
hal-01442299v1
|
||
|
Cycle Oriented Quality Management at the Interface of Product Development and Production Planning10th Product Lifecycle Management for Society (PLM), Jul 2013, Nantes, France. pp.491-499, ⟨10.1007/978-3-642-41501-2_49⟩
Conference papers
hal-01461896v1
|
||
|
Statistical Model Checking for Composite Actor Systems21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.143-160, ⟨10.1007/978-3-642-37635-1_9⟩
Conference papers
hal-01485983v1
|
||
|
Immersive Interactive Information Mining with Application to Earth Observation Data Retrieval1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.376-386
Conference papers
hal-01506787v1
|
||
|
Lifecycle Oriented Planning of Mechatronic Products and Corresponding Services9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.349-358, ⟨10.1007/978-3-642-35758-9_31⟩
Conference papers
hal-01526120v1
|
||
|
Life-Cycle Oriented Requirement Formalization and Traceability9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.124-133, ⟨10.1007/978-3-642-35758-9_11⟩
Conference papers
hal-01526146v1
|
||
|
Efficient and Secure Decentralized Network Size Estimation11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.304-317, ⟨10.1007/978-3-642-30045-5_23⟩
Conference papers
hal-01531109v1
|