Filter your results
- 12
- 12
- 12
- 10
- 1
- 1
- 6
- 4
- 12
- 5
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Novel Ranking Methods Applied to Complex Membership Determination Problems13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.89-99, ⟨10.1007/978-3-662-45237-0_10⟩
Conference papers
hal-01405566v1
|
||
|
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.77-88, ⟨10.1007/978-3-319-24315-3_8⟩
Conference papers
hal-01466413v1
|
||
|
Multi–criteria Route Planning in Bus Network13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.535-546, ⟨10.1007/978-3-662-45237-0_49⟩
Conference papers
hal-01405639v1
|
||
|
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.101-110, ⟨10.1007/978-3-642-36818-9_11⟩
Conference papers
hal-01480224v1
|
||
|
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.11-20, ⟨10.1007/978-3-642-36818-9_2⟩
Conference papers
hal-01480235v1
|
||
|
A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.159-169, ⟨10.1007/978-3-642-55032-4_16⟩
Conference papers
hal-01397181v1
|
||
|
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.121-130, ⟨10.1007/978-3-642-36818-9_13⟩
Conference papers
hal-01480226v1
|
||
|
Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.365-374, ⟨10.1007/978-3-642-55032-4_36⟩
Conference papers
hal-01397235v1
|
||
|
A New Method for Mining High Average Utility Itemsets13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.33-42, ⟨10.1007/978-3-662-45237-0_5⟩
Conference papers
hal-01405552v1
|
||
|
Am I Moving Along a Curve? A Study on Bicycle Traveling-In-Place Techniques in Virtual Environments17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.345-363, ⟨10.1007/978-3-030-29390-1_19⟩
Conference papers
hal-02877673v1
|
||
|
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.183-191, ⟨10.1007/978-3-642-36818-9_19⟩
Conference papers
hal-01480228v1
|
||
|
An Approach for Integrating Multidimensional Database into Context-Aware Recommender System13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.231-242, ⟨10.1007/978-3-662-45237-0_23⟩
Conference papers
hal-01405590v1
|