Filter your results
- 44
- 42
- 1
- 1
- 44
- 7
- 2
- 5
- 5
- 5
- 2
- 3
- 3
- 3
- 1
- 5
- 4
- 4
- 2
- 44
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Incorporating Interdependency of Trust Values in Existing Trust Models for Trust Dynamics4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.263-276, ⟨10.1007/978-3-642-13446-3_18⟩
Conference papers
hal-01061332v1
|
||
|
Conceptualising Inventory Prepositioning in the Humanitarian Sector11th IFIP WG 5.5 Working Conference on Virtual Enterprises (PRO-VE), Oct 2010, Saint-Etienne, France. pp.149-156, ⟨10.1007/978-3-642-15961-9_17⟩
Conference papers
hal-01055999v1
|
||
|
Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.35-50, ⟨10.1007/978-3-642-22200-9_6⟩
Conference papers
hal-01568674v1
|
||
|
Event Handoff Unobservability in WSN1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers
hal-01581330v1
|
||
|
Simulation-Based Performance Analysis of Channel-Based Coordination Models13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.187-201, ⟨10.1007/978-3-642-21464-6_13⟩
Conference papers
hal-01582989v1
|
||
|
Cooperative Repair of Wireless Broadcasts11th Distributed Applications and Interoperable Systems (DAIS), Jun 2011, Reykjavik, Iceland. pp.243-248, ⟨10.1007/978-3-642-21387-8_19⟩
Conference papers
hal-01583571v1
|
||
|
Challenges in Service Value Network Composition5th Working Conference on the Practice of Enterprise Modeling (PoEM), Nov 2012, Rostock, Germany. pp.91-100, ⟨10.1007/978-3-642-34549-4_7⟩
Conference papers
hal-01484390v1
|
||
|
Automated Evaluation of Annotators for Museum Collections Using Subjective Logic6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.232-239, ⟨10.1007/978-3-642-29852-3_18⟩
Conference papers
hal-01517642v1
|
||
|
Governance, Risk and Compliance: A Strategic Alignment Perspective Applied to Two Case Studies10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.202-212, ⟨10.1007/978-3-642-33332-3_19⟩
Conference papers
hal-01525120v1
|
||
|
Cognitive Processes Involved in Video Game Identification11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.75-84, ⟨10.1007/978-3-642-33542-6_7⟩
Conference papers
hal-01556143v1
|
||
|
Strategies for Generating and Evaluating Large-Scale Powerlaw-Distributed P2P Overlays13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.71-84, ⟨10.1007/978-3-642-38541-4_6⟩
Conference papers
hal-01489466v1
|
||
|
Robots That Stimulate Autonomy9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.195-204, ⟨10.1007/978-3-642-41142-7_20⟩
Conference papers
hal-01459612v1
|
||
|
Model Checking MANETs with Arbitrary Mobility5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.217-232, ⟨10.1007/978-3-642-40213-5_14⟩
Conference papers
hal-01514658v1
|
||
|
Towards Decentralised Workflow Scheduling via a Rule-Driven Shared Space13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.187-192, ⟨10.1007/978-3-642-38541-4_16⟩
Conference papers
hal-01489457v1
|
||
|
VICINITY: A Pinch of Randomness Brings out the Structure14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.21-40, ⟨10.1007/978-3-642-45065-5_2⟩
Conference papers
hal-01480790v1
|
||
|
Property Specification Made Easy: Harnessing the Power of Model Checking in UML Designs34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.17-32, ⟨10.1007/978-3-662-43613-4_2⟩
Conference papers
hal-01398006v1
|
||
|
Benchmarks for Parity Games6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.127-142, ⟨10.1007/978-3-319-24644-4_9⟩
Conference papers
hal-01446614v1
|
||
|
Using Value Models for Business Risk Analysis in e-Service Networks8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.239-253, ⟨10.1007/978-3-319-25897-3_16⟩
Conference papers
hal-01442255v1
|
||
|
Predicting Quality of Crowdsourced Annotations Using Graph Kernels9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.134-148, ⟨10.1007/978-3-319-18491-3_10⟩
Conference papers
hal-01416219v1
|
||
|
A Textual Description Based Approach to Process Matching9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.194-208, ⟨10.1007/978-3-319-48393-1_14⟩
Conference papers
hal-01653532v1
|
||
|
Provable Network Activity for Protecting Users Against False Accusation10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.254-261, ⟨10.1007/978-3-319-45931-8_17⟩
Conference papers
hal-01639610v1
|
||
|
Value-Driven Risk Analysis of Coordination Models9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.102-116, ⟨10.1007/978-3-319-48393-1_8⟩
Conference papers
hal-01653518v1
|
||
|
NEXT: Generating Tailored ERP Applications from Ontological Enterprise Models10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.283-298, ⟨10.1007/978-3-319-70241-4_19⟩
Conference papers
hal-01765268v1
|
||
|
Social Network Analysis for Trust Prediction11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.49-56, ⟨10.1007/978-3-319-59171-1_5⟩
Conference papers
hal-01651167v1
|
||
|
Creating Büchi Automata for Multi-valued Model Checking37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.210-224, ⟨10.1007/978-3-319-60225-7_15⟩
Conference papers
hal-01658422v1
|
||
|
A Temporal-Causal Network Model for the Internal Processes of a Person with a Borderline Personality Disorder14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2018, Rhodes, Greece. pp.362-373, ⟨10.1007/978-3-319-92007-8_31⟩
Conference papers
hal-01821027v1
|
||
|
Hotspots and Blind SpotsWorking Conference on Information Systems and Organizations (IS&O), Dec 2018, San Francisco, CA, United States. pp.96-109, ⟨10.1007/978-3-030-04091-8_8⟩
Conference papers
hal-02083594v1
|
||
|
The Practice of Enterprise ModelingSpringer International Publishing, LNBIP-369, 2019, Lecture Notes in Business Information Processing, 978-3-030-35150-2. ⟨10.1007/978-3-030-35151-9⟩
Books
hal-03231350v1
|
||
|
Digital Development: Elements of a Critical ICT4D Theory and Praxis15th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2019, Dar es Salaam, Tanzania. pp.26-38, ⟨10.1007/978-3-030-19115-3_3⟩
Conference papers
hal-02281305v1
|
||
|
Community-Centered, Project-Based ICT4D Education in the Field15th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2019, Dar es Salaam, Tanzania. pp.386-397, ⟨10.1007/978-3-030-19115-3_32⟩
Conference papers
hal-02281326v1
|
- 1
- 2