Filter your results
- 12
- 12
- 12
- 1
- 1
- 1
- 5
- 1
- 3
- 12
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Adaptive Underwater Acoustic Communications4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.98-101, ⟨10.1007/978-3-642-13986-4_13⟩
Conference papers
hal-01056643v1
|
||
|
Understanding the Impact of Network Infrastructure Changes Using Large-Scale Measurement Platforms7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.41-44, ⟨10.1007/978-3-642-38998-6_5⟩
Conference papers
hal-01489968v1
|
||
|
Exploring Interdependency Effects of Production Orders as Central Impact Factors of Logistics Performance in Manufacturing SystemsIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.180-187, ⟨10.1007/978-3-030-85874-2_19⟩
Conference papers
hal-04030373v1
|
||
|
Implementation of a Stream-Based IP Flow Record Query Language4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.147-158, ⟨10.1007/978-3-642-13986-4_21⟩
Conference papers
hal-01056634v1
|
||
|
Human-Spreadsheet Interaction14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.571-578, ⟨10.1007/978-3-642-40498-6_47⟩
Conference papers
hal-01510523v1
|
||
|
A Study of RPL DODAG Version Attacks8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.92-104, ⟨10.1007/978-3-662-43862-6_12⟩
Conference papers
hal-01090993v1
|
||
|
Traveller: An Interactive Cultural Training System Controlled by User-Defined Body Gestures14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.697-704, ⟨10.1007/978-3-642-40498-6_63⟩
Conference papers
hal-01510550v1
|
||
|
Evaluation of the Resource Requirements of SNMP Agents on Constrained Devices5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.100-111, ⟨10.1007/978-3-642-21484-4_13⟩
Conference papers
hal-01585867v1
|
||
|
Canonical Selection of Colimits23th International Workshop on Algebraic Development Techniques (WADT), Sep 2016, Gregynog, United Kingdom. pp.170-188, ⟨10.1007/978-3-319-72044-9_12⟩
Conference papers
hal-01767466v1
|
||
|
Cybermetrics: User Identification through Network Flow Analysis4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.167-170, ⟨10.1007/978-3-642-13986-4_24⟩
Conference papers
hal-01056631v1
|
||
|
Full Semantic Transparency: Overcoming Boundaries of Applications14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.406-423, ⟨10.1007/978-3-642-40477-1_25⟩
Conference papers
hal-01504898v1
|
||
|
Compiling Logics21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.111-126, ⟨10.1007/978-3-642-37635-1_7⟩
Conference papers
hal-01485981v1
|