Filter your results
- 66
- 5
- 63
- 6
- 2
- 71
- 9
- 5
- 9
- 13
- 5
- 1
- 4
- 9
- 11
- 6
- 4
- 4
- 71
- 5
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 8
- 6
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.161-172, ⟨10.1007/978-3-642-15257-3_15⟩
Conference papers
hal-01054520v1
|
||
|
Defensive Forecast for Conformal Bounded Regression9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.384-393, ⟨10.1007/978-3-642-41142-7_39⟩
Conference papers
hal-01459633v1
|
||
|
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.102-110, ⟨10.1007/978-3-642-39218-4_8⟩
Conference papers
hal-01463848v1
|
||
|
A Comparison of Venn Machine with Platt’s Method in Probabilistic Outputs12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.483-490, ⟨10.1007/978-3-642-23960-1_56⟩
Conference papers
hal-01571489v1
|
||
|
Applying Conformal Prediction to the Bovine TB Diagnosing12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.449-454, ⟨10.1007/978-3-642-23960-1_52⟩
Conference papers
hal-01571484v1
|
||
|
Unimagined Futures – ICT Opportunities and ChallengesSpringer International Publishing, AICT-555, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-64245-7. ⟨10.1007/978-3-030-64246-4⟩
Books
hal-03192994v1
|
||
|
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.3-16, ⟨10.1007/978-3-030-58201-2_1⟩
Conference papers
hal-03440832v1
|
||
|
Power, Technology and EmpowermentIFIP Joint Working Conference on the Future of Digital Work: The Challenge of Inequality (IFIPJWC), Dec 2020, Hyderabad, India. pp.165-179, ⟨10.1007/978-3-030-64697-4_13⟩
Conference papers
hal-03450689v1
|
||
|
Chatbots at Work: A Taxonomy of the Use of Chatbots in the Workplace20th Conference on e-Business, e-Services and e-Society (I3E), Sep 2021, Galway, Ireland. pp.29-39, ⟨10.1007/978-3-030-85447-8_3⟩
Conference papers
hal-03648121v1
|
||
|
Conformal Prediction for Indoor Localisation with Fingerprinting Method8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.214-223, ⟨10.1007/978-3-642-33412-2_22⟩
Conference papers
hal-01523074v1
|
||
|
Smart Working, Living and OrganisingSpringer International Publishing, AICT-533, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-04314-8. ⟨10.1007/978-3-030-04315-5⟩
Books
hal-02068948v1
|
||
|
A Secure and Trusted Channel Protocol for UAVs Fleets11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.3-24, ⟨10.1007/978-3-319-93524-9_1⟩
Conference papers
hal-01875525v1
|
||
|
Why We Trust Dynamic Consent to Deliver on Privacy13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.28-38, ⟨10.1007/978-3-030-33716-2_3⟩
Conference papers
hal-03182615v1
|
||
|
Anomaly Detection of Trajectories with Kernel Density Estimation by Conformal Prediction10th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2014, Rhodes, Greece. pp.271-280, ⟨10.1007/978-3-662-44722-2_29⟩
Conference papers
hal-01391054v1
|
||
|
Unpacking Empowerment in ICT4D Research15th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2019, Dar es Salaam, Tanzania. pp.83-94, ⟨10.1007/978-3-030-19115-3_8⟩
Conference papers
hal-02281310v1
|
||
|
A Spatial Perspective of Innovation and Development: Innovation Hubs in Zambia and the UK14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.171-181, ⟨10.1007/978-3-319-59111-7_15⟩
Conference papers
hal-01650083v1
|
||
|
A Framework for Understanding the Empowerment Effects of Telecentres on Rural Communities in Developing Countries15th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2019, Dar es Salaam, Tanzania. pp.104-115, ⟨10.1007/978-3-030-18400-1_9⟩
Conference papers
hal-02285298v1
|
||
|
A Timed Component Algebra for Services15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.242-257, ⟨10.1007/978-3-642-38592-6_17⟩
Conference papers
hal-01515250v1
|
||
|
Counter-Mapping as Assemblage5th Working Conference on Information Systems and Organizations (ISO), Dec 2014, Auckland, New Zealand. pp.79-94, ⟨10.1007/978-3-662-45708-5_6⟩
Conference papers
hal-01331818v1
|
||
|
Conformal Prediction under Probabilistic Input10th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2014, Rhodes, Greece. pp.291-300, ⟨10.1007/978-3-662-44722-2_31⟩
Conference papers
hal-01391056v1
|
||
|
A Long-Range Self-similarity Approach to Segmenting DJ Mixed Music Streams9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.235-244, ⟨10.1007/978-3-642-41142-7_24⟩
Conference papers
hal-01459615v1
|
||
|
Tracing Success in the Voluntary Use of Open Technology in Organisational SettingInternationalWorking Conference on Transfer and Diffusion of IT (TDIT), Jun 2013, Bangalore, India. pp.89-104, ⟨10.1007/978-3-642-38862-0_6⟩
Conference papers
hal-01467816v1
|
||
|
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers
hal-01633675v1
|
||
|
Making a Difference in ICT Research: Feminist Theorization of Sociomateriality and the Diffraction MethodologyWorking Conference on Information Systems and Organizations (IS&O), Dec 2018, San Francisco, CA, United States. pp.140-155, ⟨10.1007/978-3-030-04091-8_11⟩
Conference papers
hal-02083585v1
|
||
|
Linear Depth Integer-Wise Homomorphic Division12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.91-106, ⟨10.1007/978-3-030-20074-9_8⟩
Conference papers
hal-02294597v1
|
||
|
A Framework for Cloud ERP System Implementation in Developing Countries: Learning from Lower Local Governments in UgandaInternational Working Conference on Transfer and Diffusion of IT (TDIT), Jun 2019, Accra, Ghana. pp.274-292, ⟨10.1007/978-3-030-20671-0_19⟩
Conference papers
hal-02294686v1
|
||
|
Feature Selection by Conformal Predictor12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.439-448, ⟨10.1007/978-3-642-23960-1_51⟩
Conference papers
hal-01571493v1
|
||
|
Cybersecurity Readiness of E-tail Organisations: A Technical Perspective19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers
hal-03222876v1
|
||
|
Conformance-Based Doping Detection for Cyber-Physical Systems40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.59-77, ⟨10.1007/978-3-030-50086-3_4⟩
Conference papers
hal-03283236v1
|
||
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart DevicesSpringer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books
hal-01550529v1
|