Search - IFIP Open Digital Library Access content directly

Filter your results

101 results
Structure: Internal structure identifier : 239582
Image document

Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks

Liwei Chen , Mengyu Ma , Wenhao Zhang , Gang Shi , Dan Meng
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.568-584, ⟨10.1007/978-3-319-58469-0_38⟩
Conference papers hal-01649002v1
Image document

A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks

Jianrui Yuan , Jintao Meng
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.214-231, ⟨10.1007/978-3-642-24403-2_18⟩
Conference papers hal-01593033v1
Image document

Interactive Pruning Simulation of Apple Tree

Lili Yang , Jiafeng Chen , Jing Hua , Mengzhen Kang , Qiaoxue Dong
9th International Conference on Computer and Computing Technologies in Agriculture (CCTA), Sep 2015, Beijing, China. pp.604-611, ⟨10.1007/978-3-319-48357-3_58⟩
Conference papers hal-01557794v1
Image document

Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features

Yingdong Ma , Xiankai Chen , George Chen
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.176-184, ⟨10.1007/978-3-642-24403-2_15⟩
Conference papers hal-01593010v1
Image document

Modeling Social Engineering Botnet Dynamics across Multiple Social Networks

Shuhao Li , Xiaochun Yun , Zhiyu Hao , Yongzheng Zhang , Xiang Cui , et al.
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.261-272, ⟨10.1007/978-3-642-30436-1_22⟩
Conference papers hal-01518260v1
Image document

Do Usability Professionals Think about User Experience in the Same Way as Users and Developers Do?

Torkil Clemmensen , Morten Hertzum , Jiaoyan Yang , Yanan Chen
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.461-478, ⟨10.1007/978-3-642-40480-1_31⟩
Conference papers hal-01501764v1
Image document

A Way of Key Management in Cloud Storage Based on Trusted Computing

Xin Yang , Qingni Shen , Yahui Yang , Sihan Qing
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.135-145, ⟨10.1007/978-3-642-24403-2_11⟩
Conference papers hal-01593018v1
Image document

Social Influence from Personalized Recommendations to Trusting Beliefs of Websites: Intermediate Role of Social Presence

Yanan Li , Yong Wang
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.632-639, ⟨10.1007/978-3-642-40477-1_42⟩
Conference papers hal-01504917v1
Image document

Discovering Trip Patterns from Incomplete Passenger Trajectories for Inter-zonal Bus Line Planning

Zhaoyang Wang , Beihong Jin , Fusang Zhang , Ruiyang Yang , Qiang Ji
13th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2016, Xi'an, China. pp.160-171, ⟨10.1007/978-3-319-47099-3_13⟩
Conference papers hal-01647997v1
Image document

Reducing the Time of Live Container Migration in a Workflow

Zhanyuan Di , En Shao , Mujun He
17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.263-275, ⟨10.1007/978-3-030-79478-1_23⟩
Conference papers hal-03768738v1
Image document

Access Annotation for Safe Program Parallelization

Chen Ding , Lei Liu
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.13-26, ⟨10.1007/978-3-642-40820-5_2⟩
Conference papers hal-01513782v1