Filter your results
- 103
- 20
- 103
- 20
- 123
- 21
- 11
- 6
- 7
- 12
- 12
- 13
- 10
- 17
- 9
- 10
- 9
- 7
- 123
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 17
- 8
- 6
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Error Detection Rate of MC/DC for a Case Study from the Automotive Domain8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.131-142, ⟨10.1007/978-3-642-16256-5_14⟩
Conference papers
hal-01055391v1
|
||
|
Time-Predictable Computing8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.23-34, ⟨10.1007/978-3-642-16256-5_5⟩
Conference papers
hal-01055379v1
|
||
|
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers
hal-01056386v1
|
||
|
Tor HTTP Usage and Information Leakage11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.245-255, ⟨10.1007/978-3-642-13241-4_22⟩
Conference papers
hal-01056375v1
|
||
|
Knowledge-Based Geo-Risk Assessment for an Intelligent Measurement SystemThird IFIP TC12 International Conference on Artificial Intelligence (AI) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.215-224, ⟨10.1007/978-3-642-15286-3_21⟩
Conference papers
hal-01058358v1
|
||
|
Component-Based Design of Embedded Systems8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.1, ⟨10.1007/978-3-642-16256-5_1⟩
Conference papers
hal-01061218v1
|
||
|
Coordination Models and LanguagesSpringer, LNCS-8459, 2014, Lecture Notes in Computer Science, 978-3-662-43375-1. ⟨10.1007/978-3-662-43376-8⟩
Books
hal-01290085v1
|
||
|
QUELLE – A Framework for Accelerating the Development of Elastic Systems3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.93-107, ⟨10.1007/978-3-662-44879-3_7⟩
Conference papers
hal-01318277v1
|
||
|
Cloud Resources-Events-Agents Model: Towards TOSCA-Based Applications3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.160-170, ⟨10.1007/978-3-662-44879-3_12⟩
Conference papers
hal-01318290v1
|
||
|
Combined Feedforward/Model Predictive Tracking Control Design for Nonlinear Diffusion-Convection-Reaction-Systems25th System Modeling and Optimization (CSMO), Sep 2011, Berlin, Germany. pp.296-305, ⟨10.1007/978-3-642-36062-6_30⟩
Conference papers
hal-01347550v1
|
||
|
How to Assess Confidentiality Requirements of Corporate Assets?29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.234-241, ⟨10.1007/978-3-642-55415-5_19⟩
Conference papers
hal-01370369v1
|
||
|
Automated Analysis of Underground Marketplaces10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.31-42, ⟨10.1007/978-3-662-44952-3_3⟩
Conference papers
hal-01393757v1
|
||
|
Towards Fully Automated Digital Alibis with Social Interaction10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.297-307, ⟨10.1007/978-3-662-44952-3_20⟩
Conference papers
hal-01393786v1
|
||
|
Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected Persons2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.21-28, ⟨10.1007/978-3-642-55032-4_2⟩
Conference papers
hal-01397140v1
|
||
|
A Flexible Agent-Based Framework for Infectious Disease Modeling2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.36-45, ⟨10.1007/978-3-642-55032-4_4⟩
Conference papers
hal-01397142v1
|
||
|
Empirical and Computational Issues of Microclimate Simulation2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.78-85, ⟨10.1007/978-3-642-55032-4_8⟩
Conference papers
hal-01397147v1
|
||
|
A Distributed Generic Data Structure for Urban Level Building Data Monitoring2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.86-95, ⟨10.1007/978-3-642-55032-4_9⟩
Conference papers
hal-01397148v1
|
||
|
Toward a Data-Driven Performance-Guided Urban Decision-Support Environment2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.96-107, ⟨10.1007/978-3-642-55032-4_10⟩
Conference papers
hal-01397149v1
|
||
|
Towards Semantic Mashup Tools for Big Data Analysis2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.129-138, ⟨10.1007/978-3-642-55032-4_13⟩
Conference papers
hal-01397164v1
|
||
|
Information and Communication TechnologySpringer, LNCS-8407, 2014, Information and Communication Technology, 978-3-642-55031-7. ⟨10.1007/978-3-642-55032-4⟩
Books
hal-01397345v1
|
||
|
Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFEInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.138-154, ⟨10.1007/978-3-319-10975-6_10⟩
Conference papers
hal-01403991v1
|
||
|
Availability, Reliability, and Security in Information SystemsStephanie Teufel; Tjoa A Min; IlsunYou; EdgarWeippl. Springer, LNCS-8708, 2014, Lecture Notes in Computer Science, 978-3-319-10974-9. ⟨10.1007/978-3-319-10975-6⟩
Books
hal-01404011v1
|
||
|
Workflow Patterns as a Means to Model Task Succession in Games: A Preliminary Case Study13th International Conference Entertainment Computing (ICEC), Oct 2014, Sydney, Australia. pp.36-41, ⟨10.1007/978-3-662-45212-7_5⟩
Conference papers
hal-01408502v1
|
||
|
How to Investigate Interaction with Information Visualisation: An Overview of Methodologies8th Workshop on Human-Computer Interaction and Visualization (HCIV), Sep 2011, Lisbon, Portugal. pp.17-29, ⟨10.1007/978-3-642-54894-9_3⟩
Conference papers
hal-01414649v1
|
||
|
The Role of ICT to Achieve the UN Sustainable Development Goals (SDG)6th IFIP World Information Technology Forum (WITFOR), Sep 2016, San José, Costa Rica. pp.3-13, ⟨10.1007/978-3-319-44447-5_1⟩
Conference papers
hal-01429749v1
|
||
|
Consistently Formalizing a Business Process and its Properties for Verification: A Case Study8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.126-140, ⟨10.1007/978-3-319-25897-3_9⟩
Conference papers
hal-01442302v1
|
||
|
Efficient Computation of Generalized Ising Polynomials on Graphs with Fixed Clique-Width1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.135-146, ⟨10.1007/978-3-319-28678-5_10⟩
Conference papers
hal-01446257v1
|
||
|
Quantifying Windows File Slack Size and Stability9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.183-193, ⟨10.1007/978-3-642-41148-9_13⟩
Conference papers
hal-01460605v1
|
||
|
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.286-299, ⟨10.1007/978-3-642-39218-4_22⟩
Conference papers
hal-01463833v1
|
||
|
Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.111-124, ⟨10.1007/978-3-642-39218-4_9⟩
Conference papers
hal-01463849v1
|