Search - IFIP Open Digital Library Access content directly

Filter your results

22 results
Structure: Internal structure identifier : 160209
Image document

The Comparison of Selected Risk Management Methods for Project Management

Vladěna Obrová , Lenka Smolíková
10th International Symposium on Environmental Software Systems (ISESS), Oct 2013, Neusiedl am See, Austria. pp.517-524, ⟨10.1007/978-3-642-41151-9_48⟩
Conference papers hal-01457483v1
Image document

Using the HOS Method for Evaluating the Efficiency of Environmental Information Systems

Zuzana Chvátalová , Miloš Koch
10th International Symposium on Environmental Software Systems (ISESS), Oct 2013, Neusiedl am See, Austria. pp.451-463, ⟨10.1007/978-3-642-41151-9_42⟩
Conference papers hal-01457475v1
Image document

Information System Efficiency as an Attribute in Environmental Information Systems

Miloš Koch , Zuzana Chvátalová
10th International Symposium on Environmental Software Systems (ISESS), Oct 2013, Neusiedl am See, Austria. pp.31-43, ⟨10.1007/978-3-642-41151-9_4⟩
Conference papers hal-01457485v1
Image document

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Irina Krivtsova , Ilya Lebedev , Mikhail Sukhoparov , Nurzhan Bazhayev , Igor Zikratov , et al.
14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.297-308, ⟨10.1007/978-3-319-33936-8_23⟩
Conference papers hal-01434859v1
Image document

PROMETHEE-GAIA Method as a Support of the Decision-Making Process in Evaluating Technical Facilities

Alena Kocmanová , Marie Dočekalová , Jiří Luňáček
10th International Symposium on Environmental Software Systems (ISESS), Oct 2013, Neusiedl am See, Austria. pp.44-53, ⟨10.1007/978-3-642-41151-9_5⟩
Conference papers hal-01457494v1
Image document

Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards

Jan Camenisch , Manu Drijvers , Petr Dzurenda , Jan Hajny
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.286-298, ⟨10.1007/978-3-030-22312-0_20⟩
Conference papers hal-03744308v1
Image document

Detecting IP Spoofing by Modelling History of IP Address Entry Points

Michal Kováčik , Michal Kajan , Martin Žádník
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.73-83, ⟨10.1007/978-3-642-38998-6_9⟩
Conference papers hal-01489972v1

Advances in Software Engineering Techniques

David Hutchison , Takeo Kanade , Josef Kittler , Jon M. Kleinberg , Friedemann Mattern , et al.
Springer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books hal-01527391v1
Image document

On Practical Aspects of PCFG Password Cracking

Radek Hranický , Filip Lištiak , Dávid Mikuš , Ondřej Ryšavý
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.43-60, ⟨10.1007/978-3-030-22479-0_3⟩
Conference papers hal-02384606v1
Image document

Benchmarking Systems and Methods for Environmental Performance Models

Zuzana Chvátalová , Jiří Hřebíček , Oldřich Trenz
11th International Symposium on Environmental Software Systems (ISESS), Mar 2015, Melbourne, Australia. pp.531-541, ⟨10.1007/978-3-319-15994-2_54⟩
Conference papers hal-01328604v1
Image document

Automated Functional Verification of Application Specific Instruction-set Processors

Marcela Šimková , Zdeněk Přikryl , Zdeněk Kotásek , Tomáš Hruška
4th International Embedded Systems Symposium (IESS), Jun 2013, Paderborn, Germany. pp.128-138, ⟨10.1007/978-3-642-38853-8_12⟩
Conference papers hal-01466668v1
Image document

Practical Revocable Anonymous Credentials

Jan Hajny , Lukas Malina
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.211-213, ⟨10.1007/978-3-642-32805-3_22⟩
Conference papers hal-01540883v1
Image document

Corporate Sustainability Reporting and Measuring Corporate Performance

Zuzana Chvátalová , Alena Kocmanová , Marie Dočekalová
9th International Symposium on Environmental Software Systems (ISESS), Jun 2011, Brno, Czech Republic. pp.245-254, ⟨10.1007/978-3-642-22285-6_27⟩
Conference papers hal-01569213v1
Image document

Service-Based Realization of Business Processes Driven by Control-Flow Patterns

Petr Weiss
3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.91-102, ⟨10.1007/978-3-642-22386-0_7⟩
Conference papers hal-01572549v1
Image document

Artificial Intelligence Application for Crude Distillation Unit: An Overview

Václav Miklas , Michal Touš , Vítězslav Máša , Sin Yong Teng
IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KMES), Aug 2021, Montreal, QC, Canada. pp.156-168, ⟨10.1007/978-3-030-96592-1_12⟩
Conference papers hal-04120814v1
Image document

Evaluating Reputation of Internet Entities

Václav Bartoš , Jan Kořenek
10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.132-136, ⟨10.1007/978-3-319-39814-3_13⟩
Conference papers hal-01632738v1

Software Engineering Techniques

Zbigniew Huzar , Radek Koci , Bertrand Meyer , Bartosz Walter , Jaroslav Zendulka
Springer, LNCS-4980, 2011, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-22386-0⟩
Books hal-01572533v1
Image document

Measuring and Benchmarking Corporate Environmental Performance

Marie Pavláková Dočekalová , Alena Kocmanová , Jana Hornungová
11th International Symposium on Environmental Software Systems (ISESS), Mar 2015, Melbourne, Australia. pp.503-511, ⟨10.1007/978-3-319-15994-2_51⟩
Conference papers hal-01328598v1
Image document

Use of Flight Simulators in Analyzing Pilot Behavior

Jan Boril , Miroslav Jirgl , Rudolf Jalovecky
12th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2016, Thessaloniki, Greece. pp.255-263, ⟨10.1007/978-3-319-44944-9_22⟩
Conference papers hal-01557635v1
Image document

Using Application-Aware Flow Monitoring for SIP Fraud Detection

Tomas Cejka , Vaclav Bartos , Lukas Truxa , Hana Kubatova
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.87-99, ⟨10.1007/978-3-319-20034-7_10⟩
Conference papers hal-01410154v1
Image document

Traffic Classification and Application Identification in Network Forensics

Jan Pluskal , Ondrej Lichtner , Ondrej Rysavy
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.161-181, ⟨10.1007/978-3-319-99277-8_10⟩
Conference papers hal-01988838v1
Image document

Inverse Reliability Task: Artificial Neural Networks and Reliability-Based Optimization Approaches

David Lehký , Ondřej Slowik , Drahomír Novák
10th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2014, Rhodes, Greece. pp.344-353, ⟨10.1007/978-3-662-44654-6_34⟩
Conference papers hal-01391333v1