Search - IFIP Open Digital Library Access content directly

Filter your results

1 680 results
Deposit type : Fulltext
Image document

X-Ray: Monitoring and Analysis of Distributed Database Queries

Pedro Guimarães , José Pereira
15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.80-93, ⟨10.1007/978-3-319-19129-4_7⟩
Conference papers hal-01775031v1
Image document

Towards a New Model Exploring the Effect of the Human Factor in Lean Management

Barbara Resta , Paolo Gaiardelli , Stefano Dotti , Roberto Pinto
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2015, Tokyo, Japan. pp.316-323, ⟨10.1007/978-3-319-22759-7_37⟩
Conference papers hal-01431111v1
Image document

Guidelines for Designing Human-Friendly User Interfaces for Factory Floor Manufacturing Operators

Eeva Järvenpää , Minna Lanz
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2015, Tokyo, Japan. pp.531-538, ⟨10.1007/978-3-319-22759-7_61⟩
Conference papers hal-01431142v1
Image document

Increasing Employee Involvement in Socially Sustainable Manufacturing: Two Methods for Capturing Employees’ Tacit Knowledge to Improve Manufacturing Processes

Miia-Johanna Kopra , Nillo Halonen , Eeva Järvenpää , Minna Lanz
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2015, Tokyo, Japan. pp.539-546, ⟨10.1007/978-3-319-22759-7_62⟩
Conference papers hal-01431143v1
Image document

Situational Awareness Using Distributed Data Fusion with Evidence Discounting

Antonio Di Pietro , Stefano Panzieri , Andrea Gasparri
9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.281-296, ⟨10.1007/978-3-319-26567-4_17⟩
Conference papers hal-01431007v1
Image document

Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks

Seungoh Choi , Yeop Chang , Jeong-Han Yun , Woonyon Kim
9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.87-102, ⟨10.1007/978-3-319-26567-4_6⟩
Conference papers hal-01431015v1
Image document

On Experience of Using Distance Learning Technologies for Teaching Cryptology

Sergey Zapechnikov , Natalia Miloslavskaya , Vladimir Budzko
9th IFIP World Conference on Information Security Education (WISE), May 2015, Hamburg, Germany. pp.111-121, ⟨10.1007/978-3-319-18500-2_10⟩
Conference papers hal-01334295v1
Image document

Early Prototyping in the Digital Industry: A Management Framework

Julius Golovatchev , Steven Schepurek
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.335-343, ⟨10.1007/978-3-319-33111-9_31⟩
Conference papers hal-01377457v1
Image document

Identification of Factors During the Introduction and Implementation of PLM Methods and Systems in an Industrial Context

Vahid Salehi , Chris Mcmahon
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.376-383, ⟨10.1007/978-3-319-33111-9_35⟩
Conference papers hal-01377463v1
Image document

Case Study on Engineering Change Management and Digital Manufacturing

Simo-Pekka Leino , Lauri Jokinen , Juha-Pekka Anttila , Antti Pulkkinen
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.591-600, ⟨10.1007/978-3-319-33111-9_53⟩
Conference papers hal-01377486v1
Image document

Improving Enterprise Wide Search in Large Engineering Multinationals: A Linguistic Comparison of the Structures of Internet-Search and Enterprise-Search Queries

David Edward Jones , Yifan Xie , Chris Mcmahon , Marting Dotter , Nicolas Chanchevrier , et al.
12th IFIP International Conference on Product Lifecycle Management (PLM), Oct 2015, Doha, Qatar. pp.216-226, ⟨10.1007/978-3-319-33111-9_20⟩
Conference papers hal-01377445v1
Image document

Social Validation of Solutions in the Context of Online Communities

Lydia Nahla Driff , Lamia Berkani , Ahmed Guessoum , Abdellah Bendjahel
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.93-104, ⟨10.1007/978-3-319-19578-0_8⟩
Conference papers hal-01789983v1
Image document

Forwarding Accountability: A Challenging Necessity of the Future Data Plane

Christos Pappas , Raphael M. Reischuk , Adrian Perrig
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.3-10, ⟨10.1007/978-3-319-39028-4_1⟩
Conference papers hal-01445789v1
Image document

Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems

Konstantinos Maraslis , Theodoros Spyridopoulos , George Oikonomou , Theo Tryfonas , Mo Haghighi
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.601-615, ⟨10.1007/978-3-319-18467-8_40⟩
Conference papers hal-01345151v1
Image document

Analyzing Mutable Checkpointing via Invariants

Deepanker Aggarwal , Astrid Kiehn
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.176-190, ⟨10.1007/978-3-319-24644-4_12⟩
Conference papers hal-01446599v1
Image document

Efficient Architecture-Level Configuration of Large-Scale Embedded Software Systems

Razieh Behjati , Shiva Nejati
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.110-126, ⟨10.1007/978-3-319-24644-4_8⟩
Conference papers hal-01446633v1
Image document

Merging Cellular Automata Rules to Optimise a Solution to the Modulo-n Problem

Claudio M. Martins , Pedro De Oliveira
21st Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Jun 2015, Turku, Finland. pp.196-209, ⟨10.1007/978-3-662-47221-7_15⟩
Conference papers hal-01442473v1
Image document

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Qiao Hu , Lavinia Mihaela Dinca , Gerhard Hancke
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.219-234, ⟨10.1007/978-3-319-24018-3_14⟩
Conference papers hal-01442545v1
Image document

Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing

Tassos Dimitriou , Ioannis Krontiris
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.20-35, ⟨10.1007/978-3-319-24018-3_2⟩
Conference papers hal-01442551v1
Image document

NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS

Segen Tewelde , Stefan Gruner , Martin Olivier
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.29-43, ⟨10.1007/978-3-319-24123-4_2⟩
Conference papers hal-01449069v1
Image document

Trust-Based Access Control in Storage Middleware Grids: A Reference Framework Proposal to Deploy in the Financial Sector

Francisco Nunes , Henrique O’neill
6th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Apr 2015, Costa de Caparica, Portugal. pp.54-61, ⟨10.1007/978-3-319-16766-4_6⟩
Conference papers hal-01343465v1
Image document

Context Classifier for Service Robots

Tiago Ferreira , Fábio Miranda , Pedro Sousa , José Barata , João Pimentão
6th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Apr 2015, Costa de Caparica, Portugal. pp.196-203, ⟨10.1007/978-3-319-16766-4_21⟩
Conference papers hal-01343483v1
Image document

Continuous Speech Classification Systems for Voice Pathologies Identification

Hugo Cordeiro , Carlos Meneses , José Fonseca
6th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Apr 2015, Costa de Caparica, Portugal. pp.217-224, ⟨10.1007/978-3-319-16766-4_23⟩
Conference papers hal-01343485v1
Image document

Disc Motor with Rotor Made of Aluminium or Polycrystalline High Temperature Superconductor

David Inácio , João Murta Pina , Mário Ventim Neves , Alfredo Álvarez
6th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Apr 2015, Costa de Caparica, Portugal. pp.451-458, ⟨10.1007/978-3-319-16766-4_48⟩
Conference papers hal-01343515v1
Image document

Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches

Waffa Setra , Rachid Chalal , Mohamed Lamine Chouder
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.254-265, ⟨10.1007/978-3-319-19578-0_21⟩
Conference papers hal-01789961v1
Image document

Comparing Concurrent and Retrospective Verbal Protocols for Blind and Sighted Users

Andreas Savva , Helen Petrie , Christopher Power
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.55-71, ⟨10.1007/978-3-319-22701-6_5⟩
Conference papers hal-01599628v1
Image document

EmbodiNet: Enriching Distributed Musical Collaboration Through Embodied Interactions

Dalia El-Shimy , Jeremy R. Cooperstock
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.1-19, ⟨10.1007/978-3-319-22668-2_1⟩
Conference papers hal-01599860v1
Image document

Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation

Alexandru Butoi , Mircea Moca , Nicolae Tomai
9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.177-184, ⟨10.1007/978-3-319-18491-3_13⟩
Conference papers hal-01416224v1
Image document

The Role of SLAs in Building a Trusted Cloud for Europe

Ana Juan Ferrer , Enric Pages I Montanera
9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.262-275, ⟨10.1007/978-3-319-18491-3_22⟩
Conference papers hal-01416234v1
Image document

Comparing Local e-Government Websites in Canada and the UK

Laurence Brooks , Alexander Persaud
14th International Conference on Electronic Government (EGOV), Aug 2015, Thessaloniki, Greece. pp.291-304, ⟨10.1007/978-3-319-22479-4_22⟩
Conference papers hal-01412281v1