Search - IFIP Open Digital Library Access content directly

Filter your results

94 results
Structure: Internal structure identifier : 300723
Image document

Energy Implications in the Single-Vendor Single-Buyer Integrated Production Inventory Model

Simone Zanoni , Laura Bettoni , Christoph H. Glock
19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.57-64, ⟨10.1007/978-3-642-40352-1_8⟩
Conference papers hal-01472312v1
Image document

Comparison of cyber attacks on services in the clearnet and darknet

York Yannikos , Quang Anh Dang , Martin Steinebach
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers hal-03764381v1
Image document

Adaptive User-Centered Security

Sven Wohlgemuth
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers hal-01403988v1
Image document

Weaving Aspects and Business Processes through Model Transformation

Heiko Witteborg , Anis Charfi , Daniel Colomer Collell , Mira Mezini
3rd Service-Oriented and Cloud Computing (ESOCC), Sep 2014, Manchester, United Kingdom. pp.47-61, ⟨10.1007/978-3-662-44879-3_4⟩
Conference papers hal-01318272v1
Image document

Towards a Mobility-Supporting Incentive Scheme for Peer-to-Peer Content Distribution

Matthias Wichtlhuber , David Hausheer
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.88-91, ⟨10.1007/978-3-642-38998-6_11⟩
Conference papers hal-01489957v1
Image document

Modeling Non-deterministic C Code with Active Objects

Nathan Wasser , Asmae Heydari Tabar , Reiner Hahnle
8th International Conference on Fundamentals of Software Engineering (FSEN), May 2019, Tehran, Iran. pp.213-227, ⟨10.1007/978-3-030-31517-7_15⟩
Conference papers hal-03769132v1
Image document

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn

Melanie Volkamer , Karen Renaud , Benjamin Reinheimer
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.161-175, ⟨10.1007/978-3-319-33630-5_12⟩
Conference papers hal-01369551v1
Image document

Towards a Framework for Benchmarking Privacy-ABC Technologies

Fatbardh Veseli , Tsvetoslava Vateva-Gurova , Ioannis Krontiris , Kai Rannenberg , Neeraj Suri
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.197-204, ⟨10.1007/978-3-642-55415-5_16⟩
Conference papers hal-01370365v1
Image document

Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Emmanouil Vasilomanolakis , Sheikh Mahbub Habib , Pavlos Milaszewicz , Rabee Sohail Malik , Max Mühlhäuser
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.94-109, ⟨10.1007/978-3-319-59171-1_8⟩
Conference papers hal-01651159v1
Image document

Incentivise Me: Smartphone-Based Mobility Detection for Pervasive Games

Thomas Tregel , Felix Leber , Stefan Göbel
1st Joint International Conference on Entertainment Computing and Serious Games (ICEC-JCSG), Nov 2019, Arequipa, Peru. pp.470-476, ⟨10.1007/978-3-030-34644-7_48⟩
Conference papers hal-03652020v1
Image document

A Smart Card Implementation of the McEliece PKC

Falko Strenzke
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.47-59, ⟨10.1007/978-3-642-12368-9_4⟩
Conference papers hal-01056067v1
Image document

Teaching Phishing-Security: Which Way is Best?

Simon Stockhardt , Benjamin Reinheimer , Melanie Volkamer , Peter Mayer , Alexandra Kunz , et al.
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.135-149, ⟨10.1007/978-3-319-33630-5_10⟩
Conference papers hal-01369549v1
Image document

Robust Hash Algorithms for Text

Martin Steinebach , Peter Klöckner , Nils Reimers , Dominik Wienand , Patrick Wolf
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers hal-01492815v1

Entertainment Computing and Serious Games

Erik Spek , Stefan Göbel , Ellen Yi-Luen Do , Esteban Clua , Jannicke Baalsrud Hauge
Springer International Publishing, LNCS-11863, 2019, Lecture Notes in Computer Science, 978-3-030-34643-0. ⟨10.1007/978-3-030-34644-7⟩
Books hal-03652053v1
Image document

Testing Conformance in Multi-component Enterprise Application Management

Jacopo Soldani , Lars Luthmann , Malte Lochau , Antonio Brogi
8th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2020, Heraklion, Crete, Greece. pp.3-18, ⟨10.1007/978-3-030-44769-4_1⟩
Conference papers hal-03203225v1
Image document

Secure Concept for Online Trading of Technology Data in Global Manufacturing Market

Ghaidaa Shaabany , Simon Frisch , Reiner Anderl
14th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2017, Seville, Spain. pp.690-700, ⟨10.1007/978-3-319-72905-3_61⟩
Conference papers hal-01764165v1
Image document

Psychological Evaluation of Human Choice Behavior in Socio-Technical Systems: A Rational Process Model Approach

Tim Schürmann
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.226-228
Conference papers hal-01651187v1
Image document

Real Time Mental Stress Detection Through Breath Analysis

Paulo Santos , Peter Roth , Jorge M. Fernandes , Viktor Fetter , Valentina Vassilenko
11th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Jul 2020, Costa de Caparica, Portugal. pp.403-410, ⟨10.1007/978-3-030-45124-0_39⟩
Conference papers hal-03741556v1
Image document

Towards Distributed Reactive Programming

Guido Salvaneschi , Joscha Drechsler , Mira Mezini
15th International Conference on Coordination Models and Languages (COORDINATION), Jun 2013, Florence, Italy. pp.226-235, ⟨10.1007/978-3-642-38493-6_16⟩
Conference papers hal-01486029v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

Quality Adaptation in P2P Video Streaming Based on Objective QoE Metrics

Julius Rückert , Osama Abboud , Thomas Zinner , Ralf Steinmetz , David Hausheer
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.1-14, ⟨10.1007/978-3-642-30054-7_1⟩
Conference papers hal-01531951v1
Image document

Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions

Julius Rückert , David Hausheer
6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.38-41, ⟨10.1007/978-3-642-30633-4_5⟩
Conference papers hal-01529798v1
Image document

A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts

Bruno Rodrigues , Thomas Bocek , Andri Lareida , David Hausheer , Sina Rafati , et al.
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers hal-01806063v1
Image document

A Review, Focused on Data Transfer Standards, of the Uncertainty Representation in the Digital Twin Context

José Ríos , Georg Staudter , Moritz Weber , Reiner Anderl
16th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2019, Moscow, Russia. pp.24-33, ⟨10.1007/978-3-030-42250-9_3⟩
Conference papers hal-04444734v1
Image document

In-Situ Occlusion Resolution for Hybrid Tabletop Environments

Jan Riemann , Mohammadreza Khalilbeigi , Max Mühlhäuser
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.278-295, ⟨10.1007/978-3-319-22698-9_18⟩
Conference papers hal-01609416v1
Image document

Hybrid Learning Factories for Lean Education: Approach and Morphology for Competency-Oriented Design of Suitable Virtual Reality Learning Environments

Thomas Riemann , Antonio Kreß , Liane Klassen , Joachim Metternich
7th European Lean Educator Conference (ELEC), Oct 2021, Trondheim, Norway. pp.60-67, ⟨10.1007/978-3-030-92934-3_7⟩
Conference papers hal-03771939v1
Image document

Towards an Adaptive Publish/Subscribe Approach Supporting Transitions

Björn Richerzhagen , Ralf Steinmetz
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.84-87, ⟨10.1007/978-3-642-38998-6_10⟩
Conference papers hal-01489956v1
Image document

A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds

Björn Richerzhagen , Alexander Wagener , Nils Richerzhagen , Rhaban Hark , Ralf Steinmetz
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.16-29, ⟨10.1007/978-3-319-39814-3_2⟩
Conference papers hal-01632731v1
Image document

VLSI-SoC: An Enduring Tradition

Ricardo Reis , Manfred Glesner
25th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2017, Abu Dhabi, United Arab Emirates. pp.240-255, ⟨10.1007/978-3-030-15663-3_12⟩
Conference papers hal-02319785v1
Image document

How Current Android Malware Seeks to Evade Automated Code Analysis

Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers hal-01442542v1