Filter your results
- 38
- 37
- 1
- 37
- 1
- 1
- 2
- 7
- 5
- 8
- 9
- 3
- 4
- 38
- 38
- 25
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings9th IFIP WG 11.11 International Conference, IFIPTM 2015, May 2015, Hambourg, Germany. pp.92-108, ⟨10.1007/978-3-319-18491-3_7⟩
Conference papers
hal-01131975v2
|
||
|
Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.100-111, ⟨10.1007/978-3-642-32808-4_10⟩
Conference papers
hal-00739604v1
|
||
|
Improving Mozilla's In-App Payment PlatformOSS 2014 : 10th IFIP WG 2.13 International Conference on Open Source Systems : Open Source Software: Mobile Open Source Technologies, May 2014, San Jose, Costa Rica. pp.103 - 106, ⟨10.1007/978-3-642-55128-4_13⟩
Conference papers
hal-01162737v1
|
||
|
Specification and Deployment of Integrated Security Policies for Outsourced Data28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers
hal-01087467v1
|
||
|
Mignon: A Fast Decentralized Content Consumption Estimation in Large-Scale Distributed Systems16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2016, Heraklion, Greece. pp.32-46, ⟨10.1007/978-3-319-39577-7_3⟩
Conference papers
hal-01301230v1
|
||
|
Translation Validation for Synchronous Data-Flow Specification in the SIGNAL Compiler35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.66-80, ⟨10.1007/978-3-319-19195-9_5⟩
Conference papers
hal-01767328v1
|
||
|
The Gossple Anonymous Social NetworkACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.191-211, ⟨10.1007/978-3-642-16955-7_10⟩
Conference papers
inria-00515693v2
|
||
|
Disappointments and Delights, Fears and Hopes induced by a few decades in Performance EvaluationPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.1-9, ⟨10.1007/978-3-642-25575-5_1⟩
Conference papers
hal-00789638v1
|
||
|
Heterogeneous Resource Selection for Arbitrary HPC Applications in the Cloud15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.108-123, ⟨10.1007/978-3-319-19129-4_9⟩
Conference papers
hal-01159024v1
|
||
|
Behave: Behavioral Cache for Web Content4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.89-103, ⟨10.1007/978-3-662-43352-2_8⟩
Conference papers
hal-01079976v1
|
||
|
Synchronous Interface Theories and Time Triggered Scheduling14th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 32nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2012, Stockholm, Sweden. pp.203-218, ⟨10.1007/978-3-642-30793-5_13⟩
Conference papers
hal-01087992v1
|
||
|
On the problem of revenue sharing in multi-domain federations11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.252-264, ⟨10.1007/978-3-642-30054-7_20⟩
Conference papers
hal-00725646v1
|
||
|
Extending Signatures of ReputationHansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
Book sections
hal-00997133v1
|
||
|
Dissemination of reconfiguration policies on mesh networks12th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2012, Stockholm, Sweden. pp.16-30, ⟨10.1007/978-3-642-30823-9_2⟩
Conference papers
hal-00688707v1
|
||
|
Cheap and Cheerful: Trading Speed and Quality for Scalable Social Recommenders15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), IFIP, Jun 2015, Grenoble, France. pp.138-151, ⟨10.1007/978-3-319-19129-4_11⟩
Conference papers
hal-01170757v1
|
||
|
Similitude: Decentralised Adaptation in Large-Scale P2P Recommenders15th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2015, Grenoble, France. pp.51-65, ⟨10.1007/978-3-319-19129-4_5⟩
Conference papers
hal-01138365v2
|
||
|
Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.87-102, ⟨10.1007/978-3-642-34691-0_8⟩
Conference papers
hal-01482413v1
|
||
|
Failure Analysis and Modeling in Large Multi-site Infrastructures13th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2013, Florence, Italy. pp.127-140, ⟨10.1007/978-3-642-38541-4_10⟩
Conference papers
hal-01489451v1
|
||
|
Detecting illegal system calls using a data-oriented detection model26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.305-316, ⟨10.1007/978-3-642-21424-0_25⟩
Conference papers
hal-00657971v1
|
||
|
An Approach to Derive Usage Models Variants for Model-Based Testing26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.80-96, ⟨10.1007/978-3-662-44857-1_6⟩
Conference papers
hal-01025124v2
|
||
|
Towards Trust-Aware and Self-adaptive Systems7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.255-262, ⟨10.1007/978-3-642-38323-6_20⟩
Conference papers
hal-01468178v1
|
||
|
LiFTinG: Lightweight Freerider-Tracking Protocol in Gossip11th ACM/IFIP/USENIX International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. ⟨10.1007/978-3-642-16955-7_16⟩
Conference papers
inria-00505268v1
|
||
|
A transversal alignment between measurements and enterprise architecture for early verification of telecom service design19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.245-256, ⟨10.1007/978-3-642-40552-5_22⟩
Conference papers
hal-00859979v1
|
||
|
Cost Bounds of Multicast Light-trees in WDM NetworksIFIP Networking conference, May 2010, Chennai, India. pp.339-350, ⟨10.1007/978-3-642-12963-6_27⟩
Conference papers
hal-00541058v2
|
||
|
Techno-economic comparison of next-generation access networks for the French market18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.136-147, ⟨10.1007/978-3-642-32808-4_13⟩
Conference papers
hal-00737172v1
|
||
|
Geographical Location and Load Based Gateway Selection for Optimal Traffic Offload in Mobile Networks10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.331-342, ⟨10.1007/978-3-642-20757-0_26⟩
Conference papers
hal-00789640v1
|
||
|
Competition between wireless service providers sharing a radio resource11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.355-365, ⟨10.1007/978-3-642-30054-7_28⟩
Conference papers
hal-00725181v1
|
||
|
Reconstruction attack through classifier analysis26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.274-281, ⟨10.1007/978-3-642-31540-4_21⟩
Conference papers
hal-00736945v1
|
||
|
DynaSoRe: Efficient In-Memory Store for Social Applications14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.425-444, ⟨10.1007/978-3-642-45065-5_22⟩
Conference papers
hal-00932468v1
|
||
|
Runtime Code Polymorphism as a Protection Against Side Channel Attacks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.136-152, ⟨10.1007/978-3-319-45931-8_9⟩
Conference papers
emse-01372223v1
|
- 1
- 2