Filter your results
- 4
- 4
- 4
- 4
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Throwing a MonkeyWrench into Web Attackers Plans11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.28-39, ⟨10.1007/978-3-642-13241-4_4⟩
Conference papers
hal-01056370v1
|
||
|
On Symbolic Representations of Maximum Matchings and (Un)directed Graphs6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.286-300, ⟨10.1007/978-3-642-15240-5_21⟩
Conference papers
hal-01054452v1
|
||
|
Defining Tolerances in Assembly Process with the Aid of Simulation5th IFIP WG 5.5 International Precision Assembly Seminar (IPAS), Feb 2010, Chamonix, France. pp.33-40, ⟨10.1007/978-3-642-11598-1_4⟩
Conference papers
hal-01055665v1
|
||
|
Efficient Inference Control for Open Relational Queries24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.162-176, ⟨10.1007/978-3-642-13739-6_11⟩
Conference papers
hal-01056690v1
|