Filter your results
- 110
- 8
- 1
- 104
- 8
- 7
- 119
- 19
- 1
- 13
- 6
- 8
- 3
- 6
- 5
- 13
- 10
- 10
- 22
- 15
- 7
- 119
- 16
- 7
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 13
- 10
- 9
- 8
- 7
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Recent Developments in Low-Level Software Security6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.1-16, ⟨10.1007/978-3-642-30955-7_1⟩
Conference papers
hal-01534300v1
|
||
|
“I Really Don’t Know What ‘Thumbs Up’ Means”: Algorithmic Experience in Movie Recommender Algorithms17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.521-541, ⟨10.1007/978-3-030-29387-1_30⟩
Conference papers
hal-02553857v1
|
||
|
Flexub: Dynamic Subscriptions for Publish/Subscribe Systems in MANETs12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.132-139, ⟨10.1007/978-3-642-30823-9_11⟩
Conference papers
hal-01527643v1
|
||
|
Secure Multi-Execution through Static Program Transformation14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.186-202, ⟨10.1007/978-3-642-30793-5_12⟩
Conference papers
hal-01528736v1
|
||
|
Lightweight Practical Private One-Way Anonymous Messaging9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.76-91, ⟨10.1007/978-3-319-18491-3_6⟩
Conference papers
hal-01416208v1
|
||
|
‘Fake Lean’; On Deviating from an Ambiguous Essence7th European Lean Educator Conference (ELEC), Oct 2021, Trondheim, Norway. pp.227-234, ⟨10.1007/978-3-030-92934-3_23⟩
Conference papers
hal-03771937v1
|
||
|
Data-Minimizing Authentication Goes Mobile13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers
hal-01540904v1
|
||
|
AlgorithmicsAdvancing Research in Information and Communication Technology, AICT-600, pp.59-98, 2021, ⟨10.1007/978-3-030-81701-5_3⟩
Book sections
hal-03325977v1
|
||
|
Learning from Errors: Error-based Exercises in Domain Modelling Pedagogy11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.321-334, ⟨10.1007/978-3-030-02302-7_20⟩
Conference papers
hal-02156467v1
|
||
|
Domain Modelling in Bloom: Deciphering How We Teach It10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.3-17, ⟨10.1007/978-3-319-70241-4_1⟩
Conference papers
hal-01765258v1
|
||
|
A Generic Solution for Agile Run-Time Inspection Middleware12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.451-470, ⟨10.1007/978-3-642-25821-3_23⟩
Conference papers
hal-01597758v1
|
||
|
Improving the Debate: Interface Elements that Enhance Civility and Relevance in Online News Comments18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.433-450, ⟨10.1007/978-3-030-85610-6_25⟩
Conference papers
hal-04215483v1
|
||
|
Using a Smartphone to Access Personalized Web Services on a Workstation7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.144-156, ⟨10.1007/978-3-642-31668-5_11⟩
Conference papers
hal-01517605v1
|
||
|
Secure Storage on Android with Context-Aware Access Control15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.46-59, ⟨10.1007/978-3-662-44885-4_4⟩
Conference papers
hal-01404184v1
|
||
|
Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.2-13, ⟨10.1007/978-3-642-30633-4_2⟩
Conference papers
hal-01529786v1
|
||
|
Secure Resource Sharing for Embedded Protected Module Architectures9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers
hal-01442554v1
|
||
|
Explore Data, Enjoy Yourself - KUbism, A Playful Approach to Data Exploration18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.43-64, ⟨10.1007/978-3-030-85613-7_4⟩
Conference papers
hal-04292377v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders (Part 2)14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.386-397, ⟨10.1007/978-3-319-25013-7_31⟩
Conference papers
hal-01448056v1
|
||
|
Removing the Blinkers: What a Process View Learns About G2G Information Systems in Flanders14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.209-221, ⟨10.1007/978-3-319-22479-4_16⟩
Conference papers
hal-01412272v1
|
||
|
PA Meets IS Research: Analysing Failure of Intergovernmental Information Systems via IS Adoption and Success Models13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.72-83, ⟨10.1007/978-3-662-44426-9_6⟩
Conference papers
hal-01401726v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7394, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32805-3⟩
Books
hal-01540895v1
|
||
|
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.323-336, ⟨10.1007/978-3-319-33630-5_22⟩
Conference papers
hal-01369566v1
|
||
|
A Study on Advanced Persistent Threats15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.63-72, ⟨10.1007/978-3-662-44885-4_5⟩
Conference papers
hal-01404186v1
|
||
|
Machine Learning-Based, Networking and Computing Infrastructure Resource Management17th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2021, Hersonissos, Crete, Greece. pp.85-94, ⟨10.1007/978-3-030-79157-5_8⟩
Conference papers
hal-03789008v1
|
||
|
Partial Connector Colouring14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.59-73, ⟨10.1007/978-3-642-30829-1_5⟩
Conference papers
hal-01529589v1
|
||
|
Coordination Models and LanguagesSpringer, LNCS-6116, 2010, Lecture Notes in Computer Science, 978-3-642-13413-5. ⟨10.1007/978-3-642-13414-2⟩
Books
hal-01555333v1
|
||
|
MeViTa: Interactive Visualizations to Help Older Adults with Their Medication Intake Using a Camera-Projector System16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.132-152, ⟨10.1007/978-3-319-67744-6_9⟩
Conference papers
hal-01676181v1
|
||
|
Towards a Framework for Open Data Publishers: A Comparison Study Between Sweden and Belgium19th International Conference on Electronic Government (EGOV), Aug 2020, Linköping, Sweden. pp.262-274, ⟨10.1007/978-3-030-57599-1_20⟩
Conference papers
hal-03282788v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7025, 2011, Lecture Notes in Computer Science, 978-3-642-24711-8. ⟨10.1007/978-3-642-24712-5⟩
Books
hal-01596212v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-8735, 2014, Lecture Notes in Computer Science, 978-3-662-44884-7. ⟨10.1007/978-3-662-44885-4⟩
Books
hal-01404210v1
|