Filter your results
- 97
- 4
- 97
- 4
- 101
- 1
- 6
- 5
- 6
- 7
- 11
- 2
- 8
- 8
- 20
- 10
- 18
- 101
- 23
- 18
- 9
- 6
- 5
- 5
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 15
- 8
- 6
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.568-584, ⟨10.1007/978-3-319-58469-0_38⟩
Conference papers
hal-01649002v1
|
||
|
A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.214-231, ⟨10.1007/978-3-642-24403-2_18⟩
Conference papers
hal-01593033v1
|
||
|
Interactive Pruning Simulation of Apple Tree9th International Conference on Computer and Computing Technologies in Agriculture (CCTA), Sep 2015, Beijing, China. pp.604-611, ⟨10.1007/978-3-319-48357-3_58⟩
Conference papers
hal-01557794v1
|
||
|
Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.176-184, ⟨10.1007/978-3-642-24403-2_15⟩
Conference papers
hal-01593010v1
|
||
|
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.261-272, ⟨10.1007/978-3-642-30436-1_22⟩
Conference papers
hal-01518260v1
|
||
|
Do Usability Professionals Think about User Experience in the Same Way as Users and Developers Do?14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.461-478, ⟨10.1007/978-3-642-40480-1_31⟩
Conference papers
hal-01501764v1
|
||
|
A Way of Key Management in Cloud Storage Based on Trusted Computing8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.135-145, ⟨10.1007/978-3-642-24403-2_11⟩
Conference papers
hal-01593018v1
|
||
|
Social Influence from Personalized Recommendations to Trusting Beliefs of Websites: Intermediate Role of Social Presence14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.632-639, ⟨10.1007/978-3-642-40477-1_42⟩
Conference papers
hal-01504917v1
|
||
|
Discovering Trip Patterns from Incomplete Passenger Trajectories for Inter-zonal Bus Line Planning13th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2016, Xi'an, China. pp.160-171, ⟨10.1007/978-3-319-47099-3_13⟩
Conference papers
hal-01647997v1
|
||
|
Reducing the Time of Live Container Migration in a Workflow17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.263-275, ⟨10.1007/978-3-030-79478-1_23⟩
Conference papers
hal-03768738v1
|
||
|
Access Annotation for Safe Program Parallelization10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.13-26, ⟨10.1007/978-3-642-40820-5_2⟩
Conference papers
hal-01513782v1
|