Filter your results
- 9
- 9
- 9
- 3
- 4
- 2
- 9
- 9
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Memory-Side Acceleration for XML Parsing8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.277-292, ⟨10.1007/978-3-642-24403-2_22⟩
Conference papers
hal-01593022v1
|
||
|
Using IMUs to Identify Supervisors on Touch Devices15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.565-583, ⟨10.1007/978-3-319-22668-2_44⟩
Conference papers
hal-01599873v1
|
||
|
Dynamic Spatial Positioning: Physical Collaboration around Interactive Table by Children in India14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.141-158, ⟨10.1007/978-3-642-40498-6_11⟩
Conference papers
hal-01510543v1
|
||
|
Wireless Smartphone Mirroring in Video Calls15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.410-417, ⟨10.1007/978-3-319-22698-9_28⟩
Conference papers
hal-01609408v1
|
||
|
Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.97-111, ⟨10.1007/978-3-319-18467-8_7⟩
Conference papers
hal-01345099v1
|
||
|
Reading together as a Leisure Activity: Implications for E-reading14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.19-36, ⟨10.1007/978-3-642-40480-1_2⟩
Conference papers
hal-01501762v1
|
||
|
F-Formations in Cooking Together: A Digital Ethnography Using YouTube14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.37-54, ⟨10.1007/978-3-642-40498-6_3⟩
Conference papers
hal-01510514v1
|
||
|
DynaSoRe: Efficient In-Memory Store for Social Applications14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.425-444, ⟨10.1007/978-3-642-45065-5_22⟩
Conference papers
hal-00932468v1
|
||
|
Analysis of Revocation Strategies for Anonymous Idemix Credentials12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers
hal-01596188v1
|