Filter your results
- 31
- 1
- 31
- 1
- 32
- 5
- 1
- 6
- 2
- 1
- 8
- 4
- 2
- 3
- 32
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Enhancing Dependability and Security of Cyber-Physical Production Systems8th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), May 2017, Costa de Caparica, Portugal. pp.135-143, ⟨10.1007/978-3-319-56077-9_12⟩
Conference papers
hal-01629572v1
|
||
|
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers
hal-01540894v1
|
||
|
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.59-71, ⟨10.1007/978-3-642-24712-5_5⟩
Conference papers
hal-01596193v1
|
||
|
Click or Strike: Realistic versus Standard Game Controls in Violent Video Games and Their Effects on Aggression9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.171-182, ⟨10.1007/978-3-642-15399-0_16⟩
Conference papers
hal-01055645v1
|
||
|
Dynamic Tangible User Interface Palettes14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.159-176, ⟨10.1007/978-3-642-40498-6_12⟩
Conference papers
hal-01510532v1
|
||
|
Descriptional Complexity and Operations – Two Non-classical Cases19th International Conference on Descriptional Complexity of Formal Systems (DCFS), Jul 2017, Milano, Italy. pp.33-44, ⟨10.1007/978-3-319-60252-3_3⟩
Conference papers
hal-01657004v1
|
||
|
Authentication with Time Features for Keystroke Dynamics on Touchscreens14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.197-199, ⟨10.1007/978-3-642-40779-6_17⟩
Conference papers
hal-01492821v1
|
||
|
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.85-94, ⟨10.1007/978-3-642-40779-6_6⟩
Conference papers
hal-01492835v1
|
||
|
Framework for Resilient Production SystemsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2014, Ajaccio, France. pp.200-207, ⟨10.1007/978-3-662-44733-8_25⟩
Conference papers
hal-01387181v1
|
||
|
Evaluation of Complex Manufacturing Systems in the Context of Aggregated Operating CurvesIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.127-135, ⟨10.1007/978-3-030-85914-5_14⟩
Conference papers
hal-03897893v1
|
||
|
Security Warnings for Children’s Smart Phones: A First Design Approach12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.241-243, ⟨10.1007/978-3-642-24712-5_24⟩
Conference papers
hal-01596186v1
|
||
|
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers
hal-01056380v1
|
||
|
Improvement of Multidisciplinary Integration in Design of Complex Systems by Implementing Knowledge-Based Engineering13th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2016, Columbia, SC, United States. pp.89-98, ⟨10.1007/978-3-319-54660-5_9⟩
Conference papers
hal-01699697v1
|
||
|
Design of a Li-Fi Transceiver for Distributed Factory Planning ApplicationsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.188-197, ⟨10.1007/978-3-030-85874-2_20⟩
Conference papers
hal-04030345v1
|
||
|
Stop Ordering Machine Learning Algorithms by Their Explainability! An Empirical Investigation of the Tradeoff Between Performance and Explainability20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.245-258, ⟨10.1007/978-3-030-85447-8_22⟩
Conference papers
hal-03648118v1
|
||
|
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.89-98, ⟨10.1007/978-3-642-32805-3_7⟩
Conference papers
hal-01540887v1
|
||
|
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.200-203, ⟨10.1007/978-3-642-40779-6_18⟩
Conference papers
hal-01492822v1
|
||
|
The Distributed Ontology, Model and Specification Language – DOL23th International Workshop on Algebraic Development Techniques (WADT), Sep 2016, Gregynog, United Kingdom. pp.5-10, ⟨10.1007/978-3-319-72044-9_2⟩
Conference papers
hal-01767463v1
|
||
|
Assessment of Structural Qualities of Production SystemsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2016, Iguassu Falls, Brazil. pp.317-324, ⟨10.1007/978-3-319-51133-7_38⟩
Conference papers
hal-01615766v1
|
||
|
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.93-105, ⟨10.1007/978-3-642-13241-4_10⟩
Conference papers
hal-01056387v1
|
||
|
Canonical Selection of Colimits23th International Workshop on Algebraic Development Techniques (WADT), Sep 2016, Gregynog, United Kingdom. pp.170-188, ⟨10.1007/978-3-319-72044-9_12⟩
Conference papers
hal-01767466v1
|
||
|
Approach for the Evaluation of Production StructuresIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2017, Hamburg, Germany. pp.176-183, ⟨10.1007/978-3-319-66926-7_21⟩
Conference papers
hal-01707297v1
|
||
|
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.107-116, ⟨10.1007/978-3-642-32805-3_9⟩
Conference papers
hal-01540884v1
|
||
|
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.204-206, ⟨10.1007/978-3-642-40779-6_19⟩
Conference papers
hal-01492823v1
|
||
|
Institutions for SQL Database Schemas and Datasets24th International Workshop on Algebraic Development Techniques (WADT), Jul 2018, Egham, United Kingdom. pp.67-86, ⟨10.1007/978-3-030-23220-7_4⟩
Conference papers
hal-02364575v1
|
||
|
Knowledge Management in Set Based Lean Product Development Process19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.368-375, ⟨10.1007/978-3-642-40352-1_46⟩
Conference papers
hal-01472264v1
|
||
|
Digging into the Eclipse Marketplace13th IFIP International Conference on Open Source Systems (OSS), May 2017, Buenos Aires, Argentina. pp.60-65, ⟨10.1007/978-3-319-57735-7_7⟩
Conference papers
hal-01776316v1
|
||
|
E-Learning of IT Security Threats: A Game Prototype for Children14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.162-172, ⟨10.1007/978-3-642-40779-6_14⟩
Conference papers
hal-01492818v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-8099, 2013, Lecture Notes in Computer Science, 978-3-642-40778-9. ⟨10.1007/978-3-642-40779-6⟩
Books
hal-01492838v1
|
||
|
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.207-210, ⟨10.1007/978-3-642-32805-3_21⟩
Conference papers
hal-01540902v1
|
- 1
- 2