Filter your results
- 32
- 1
- 31
- 2
- 33
- 3
- 3
- 2
- 1
- 1
- 1
- 3
- 3
- 1
- 4
- 1
- 5
- 1
- 7
- 33
- 5
- 3
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Initial Segment Complexities of Randomness Notions6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.259-270, ⟨10.1007/978-3-642-15240-5_19⟩
Conference papers
hal-01054455v1
|
||
|
Supporting Productive Integration of Web 2.0-Mediated CollaborationIFIP TC 3 International Conference on Key Competencies in the Knowledge Society (KCKS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.401-411, ⟨10.1007/978-3-642-15378-5_39⟩
Conference papers
hal-01054681v1
|
||
|
Investigating Sociability and Affective Responses of Elderly Users through Digitally-Mediated Exercises: A Case of the Nintendo WiiSecond IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.152-162, ⟨10.1007/978-3-642-15231-3_16⟩
Conference papers
hal-01055485v1
|
||
|
EPISOSE: An Epistemology-Based Social Search Framework for Exploratory Information SeekingSecond IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.211-222, ⟨10.1007/978-3-642-15231-3_21⟩
Conference papers
hal-01055480v1
|
||
|
Exploring the Influence of Cultural Diversity in Collaborative Design Teams: Preliminary FindingsSecond IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.246-254, ⟨10.1007/978-3-642-15231-3_24⟩
Conference papers
hal-01055477v1
|
||
|
From Microsoft Word 2003 to Microsoft Word 2007: Design Heuristics, Design Flaws and Lessons LearntSecond IFIP TC 13 Symposium on Human-Computer Interaction (HCIS)/ Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.289-292, ⟨10.1007/978-3-642-15231-3_32⟩
Conference papers
hal-01055470v1
|
||
|
Real-Time Caustics in Dynamic Scenes with Multiple Directional Lights9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.308-316, ⟨10.1007/978-3-642-15399-0_32⟩
Conference papers
hal-01055629v1
|
||
|
On Robustness of Trust Systems8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.44-60, ⟨10.1007/978-3-662-43813-8_4⟩
Conference papers
hal-01381678v1
|
||
|
Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.77-92, ⟨10.1007/978-3-662-43813-8_6⟩
Conference papers
hal-01381680v1
|
||
|
Assets Dependencies Model in Information Security Risk Management2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.405-412, ⟨10.1007/978-3-642-55032-4_40⟩
Conference papers
hal-01397241v1
|
||
|
From Display Calculi to Deep Nested Sequent Calculi: Formalised for Full Intuitionistic Linear Logic8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.250-264, ⟨10.1007/978-3-662-44602-7_20⟩
Conference papers
hal-01402048v1
|
||
|
How to Use Information Theory to Mitigate Unfair Rating Attacks10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.17-32, ⟨10.1007/978-3-319-41354-9_2⟩
Conference papers
hal-01438346v1
|
||
|
Limitations on Robust Ratings and Predictions10th IFIP International Conference on Trust Management (TM), Jul 2016, Darmstadt, Germany. pp.113-126, ⟨10.1007/978-3-319-41354-9_8⟩
Conference papers
hal-01438352v1
|
||
|
Early Warning Systems for Cyber DefenceInternational Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.29-42, ⟨10.1007/978-3-319-39028-4_3⟩
Conference papers
hal-01445791v1
|
||
|
Differential Fault Attack on LEA3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.265-274, ⟨10.1007/978-3-319-24315-3_27⟩
Conference papers
hal-01466228v1
|
||
|
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.222-235
Conference papers
hal-01506557v1
|
||
|
A 1-V CMOS Ultralow-Power Receiver Front End for the IEEE 802.15.4 Standard Using Tuned Passive Mixer Output Pole18th International Conference on Very Large Scale Integration (VLSISOC), Sep 2010, Madrid, Spain. pp.1-21, ⟨10.1007/978-3-642-28566-0_1⟩
Conference papers
hal-01515991v1
|
||
|
A 1.8-V 3.6-mW 2.4-GHz Fully Integrated CMOS Frequency Synthesizer for the IEEE 802.15.418th International Conference on Very Large Scale Integration (VLSISOC), Sep 2010, Madrid, Spain. pp.69-99, ⟨10.1007/978-3-642-28566-0_4⟩
Conference papers
hal-01516000v1
|
||
|
Robustness of Trust Models and Combinations for Handling Unfair Ratings6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.36-51, ⟨10.1007/978-3-642-29852-3_3⟩
Conference papers
hal-01517650v1
|
||
|
An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.209-216, ⟨10.1007/978-3-642-29852-3_15⟩
Conference papers
hal-01517662v1
|
||
|
AES Variants Secure against Related-Key Differential and Boomerang Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers
hal-01573307v1
|
||
|
Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.216-231, ⟨10.1007/978-3-642-13446-3_15⟩
Conference papers
hal-01061329v1
|
||
|
An Analysis of Accountability Concepts for Open Development14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.793-802, ⟨10.1007/978-3-319-59111-7_64⟩
Conference papers
hal-01650096v1
|
||
|
A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.21-37, ⟨10.1007/978-3-319-59171-1_3⟩
Conference papers
hal-01651154v1
|
||
|
Learning-Based Compositional Parameter Synthesis for Event-Recording Automata37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.17-32, ⟨10.1007/978-3-319-60225-7_2⟩
Conference papers
hal-01658415v1
|
||
|
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.216-230, ⟨10.1007/978-3-319-99828-2_16⟩
Conference papers
hal-02023723v1
|
||
|
ReRAM Based In-Memory Computation of Single Bit Error Correcting BCH Code26th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2018, Verona, Italy. pp.128-146, ⟨10.1007/978-3-030-23425-6_7⟩
Conference papers
hal-02321764v1
|
||
|
Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.1-14, ⟨10.1007/978-3-030-45778-5_1⟩
Conference papers
hal-03266470v1
|
||
|
Recurrent Self-evolving Takagi–Sugeno–Kan Fuzzy Neural Network (RST-FNN) Based Type-2 Diabetic Modeling4th International Conference on Intelligence Science (ICIS), Feb 2021, Durgapur, India. pp.125-136, ⟨10.1007/978-3-030-74826-5_11⟩
Conference papers
hal-03741726v1
|
||
|
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.83-99, ⟨10.1007/978-3-030-78120-0_6⟩
Conference papers
hal-03746053v1
|
- 1
- 2