Filter your results
- 13
- 13
- 13
- 1
- 2
- 1
- 2
- 1
- 2
- 2
- 2
- 1
- 13
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Endless Bad Projects or Evidence-Based Practice? An Agenda for ActionInternationalWorking Conference on Transfer and Diffusion of IT (TDIT), Jun 2013, Bangalore, India. pp.619-624, ⟨10.1007/978-3-642-38862-0_43⟩
Conference papers
hal-01467808v1
|
||
|
A Method for Reducing the Risk of Errors in Digital Forensic Investigations13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.99-106, ⟨10.1007/978-3-642-32805-3_8⟩
Conference papers
hal-01540896v1
|
||
|
Learner Differences in the Online Context: Introducing a New MethodIFIP Conference on Information Technology in Educational Management (ITEM) and IFIP Conference on Key Competencies for Educating ICT Professionals (KCICTP), Jul 2014, Potsdam, Germany. pp.306-317, ⟨10.1007/978-3-662-45770-2_26⟩
Conference papers
hal-01342714v1
|
||
|
The Evolution of Trust5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.13-16, ⟨10.1007/978-3-642-22200-9_3⟩
Conference papers
hal-01568688v1
|
||
|
A Phylogenetic Classification of the Video-Game Industry’s Business Model Ecosystem15th Working Conference on Virtual Enterprises (PROVE), Oct 2014, Amsterdam, Netherlands. pp.285-294, ⟨10.1007/978-3-662-44745-1_28⟩
Conference papers
hal-01392126v1
|
||
|
An Initial Generic Assessment Framework for the Consideration of Risk in the Implementation of Autonomous Systems5th IFIP Working Conference on Human Work Interaction Design (HWID), Aug 2018, Espoo, Finland. pp.186-199, ⟨10.1007/978-3-030-05297-3_13⟩
Conference papers
hal-02264622v1
|
||
|
Technology, Theatre and Co-design: Impact and Design Considerations17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.387-396, ⟨10.1007/978-3-030-29381-9_24⟩
Conference papers
hal-02544570v1
|
||
|
Using IMUs to Identify Supervisors on Touch Devices15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.565-583, ⟨10.1007/978-3-319-22668-2_44⟩
Conference papers
hal-01599873v1
|
||
|
Bringing about Innovative Change: The Case of a Patient Flow Management System in an NHS TrustInternationalWorking Conference on Transfer and Diffusion of IT (TDIT), Jun 2013, Bangalore, India. pp.164-183, ⟨10.1007/978-3-642-38862-0_11⟩
Conference papers
hal-01467821v1
|
||
|
Local Differentially Private Matrix Factorization with MoG for Recommendations34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.208-220, ⟨10.1007/978-3-030-49669-2_12⟩
Conference papers
hal-03243637v1
|
||
|
Cyber Security Games: A New Line of Risk11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.600-603, ⟨10.1007/978-3-642-33542-6_80⟩
Conference papers
hal-01556162v1
|
||
|
IntraVox: A Personalized Human Voice to Support Users with Complex Needs in Smart Homes18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.223-244
Conference papers
hal-04345201v1
|
||
|
Exploring the Acceptability of Graphical Passwords for People with Dyslexia18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.213-222, ⟨10.1007/978-3-030-85623-6_14⟩
Conference papers
hal-04330962v1
|