Filter your results
- 40
- 5
- 40
- 5
- 45
- 10
- 2
- 1
- 2
- 3
- 7
- 7
- 6
- 5
- 2
- 4
- 3
- 3
- 45
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Electronic ParticipationSpringer International Publishing, LNCS-9821, 2016, Lecture Notes in Computer Science, 978-3-319-45073-5. ⟨10.1007/978-3-319-45074-2⟩
Books
hal-01637227v1
|
||
|
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers
hal-01284854v1
|
||
|
Computing and Information Technology Challenges for 21st Century Financial Market Regulators10th Electronic Government (EGOV), Aug 2011, Delft, Netherlands. pp.198-209, ⟨10.1007/978-3-642-22878-0_17⟩
Conference papers
hal-01589093v1
|
||
|
Auto Regressive Dynamic Bayesian Network and Its Application in Stock Market Inference12th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2016, Thessaloniki, Greece. pp.419-428, ⟨10.1007/978-3-319-44944-9_36⟩
Conference papers
hal-01557633v1
|
||
|
Network and Parallel ComputingSpringer International Publishing, LNCS-9966, 2016, Lecture Notes in Computer Science, 978-3-319-47098-6. ⟨10.1007/978-3-319-47099-3⟩
Books
hal-01648008v1
|
||
|
Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.307-327, ⟨10.1007/978-3-642-45065-5_16⟩
Conference papers
hal-01480782v1
|
||
|
Research on the k-Coverage Local Wireless Network and Its Communication Coordination Mechanism Design5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.390-401, ⟨10.1007/978-3-642-27281-3_45⟩
Conference papers
hal-01351838v1
|
||
|
Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency9th IFIP WG 8.5 International Conference on Electronic Government (EGOV), Aug 2010, Lausanne, Switzerland. pp.50-60, ⟨10.1007/978-3-642-14799-9_5⟩
Conference papers
hal-01056566v1
|
||
|
Exploring on the Role of Open Government Data in Emergency Management16th International Conference on Electronic Government (EGOV), Sep 2017, St. Petersburg, Russia. pp.303-313, ⟨10.1007/978-3-319-64677-0_25⟩
Conference papers
hal-01702976v1
|
||
|
Open Innovation and Co-creation in the Public Sector: Understanding the Role of Intermediaries9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.140-148, ⟨10.1007/978-3-319-64322-9_12⟩
Conference papers
hal-01703331v1
|
||
|
Information Flow Containment: A Practical Basis for Malware Defense23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers
hal-01586591v1
|
||
|
Values in Design - Building Bridges between RE, HCI and Ethics13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.746-747, ⟨10.1007/978-3-642-23768-3_145⟩
Conference papers
hal-01596979v1
|
||
|
What Users Prefer and Why: A User Study on Effective Presentation Styles of Opinion Summarization15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.249-264, ⟨10.1007/978-3-319-22668-2_20⟩
Conference papers
hal-01599891v1
|
||
|
Understanding the Factors that Affect Smart City and Community Initiatives: Lessons from Local Governments in the United States20th International Conference on Electronic Government (EGOV), Sep 2021, Granada, Spain. pp.205-216, ⟨10.1007/978-3-030-84789-0_15⟩
Conference papers
hal-04175092v1
|
||
|
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.119-134, ⟨10.1007/978-3-319-20810-7_8⟩
Conference papers
hal-01745836v1
|
||
|
The Industrial Ontologies Foundry Proof-of-Concept ProjectIFIP International Conference on Advances in Production Management Systems (APMS), Aug 2018, Seoul, South Korea. pp.402-409, ⟨10.1007/978-3-319-99707-0_50⟩
Conference papers
hal-02177875v1
|
||
|
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.382-389, ⟨10.1007/978-3-662-43936-4_26⟩
Conference papers
hal-01284874v1
|
||
|
Exploring Personal Computing Devices Ownership Among University Students in Indonesia14th International Conference on Social Implications of Computers in Developing Countries (ICT4D), May 2017, Yogyakarta, Indonesia. pp.835-841, ⟨10.1007/978-3-319-59111-7_70⟩
Conference papers
hal-01650121v1
|
||
|
Towards an Evaluation Model for Open Government: A Preliminary Proposal13th International Conference on Electronic Government (EGOV), Sep 2014, Dublin, Ireland. pp.47-58, ⟨10.1007/978-3-662-44426-9_4⟩
Conference papers
hal-01401724v1
|
||
|
Heuristics for Social Games with a Purpose11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.445-448, ⟨10.1007/978-3-642-33542-6_49⟩
Conference papers
hal-01556110v1
|
||
|
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.42-63, ⟨10.1007/978-3-030-49669-2_3⟩
Conference papers
hal-03243641v1
|
||
|
Game-Based Multi-MD with QoS Computation Offloading for Mobile Edge Computing of Limited Computation Capacity16th IFIP International Conference on Network and Parallel Computing (NPC), Aug 2019, Hohhot, China. pp.16-27, ⟨10.1007/978-3-030-30709-7_2⟩
Conference papers
hal-03770553v1
|
||
|
Uncertainty Quantification for Turbulent Mixing Flows: Rayleigh-Taylor Instability10th Working Conference on Uncertainty Quantification in Scientific Computing (WoCoUQ), Aug 2011, Boulder, CO, United States. pp.212-225, ⟨10.1007/978-3-642-32677-6_14⟩
Conference papers
hal-01518667v1
|
||
|
Algorithm Diversity for Resilient Systems33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.359-378, ⟨10.1007/978-3-030-22479-0_19⟩
Conference papers
hal-02384586v1
|
||
|
Open Government Data Ecosystems: Linking Transparency for Innovation with Transparency for Participation and Accountability5th International Conference on Electronic Government and the Information Systems Perspective (EGOV), Sep 2016, Porto, Portugal. pp.74-86, ⟨10.1007/978-3-319-44421-5_6⟩
Conference papers
hal-01636461v1
|
||
|
Cost Bounds of Multicast Light-trees in WDM NetworksIFIP Networking conference, May 2010, Chennai, India. pp.339-350, ⟨10.1007/978-3-642-12963-6_27⟩
Conference papers
hal-00541058v2
|
||
|
Dynamic Workflow Adjustment with Security Constraints28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers
hal-01284857v1
|
||
|
A Systematic Literature Review of the Relationships Between Policy Analysis and Information Technologies: Understanding and Integrating Multiple Conceptualizations9th International Conference on Electronic Participation (ePart), Sep 2017, St. Petersburg, Russia. pp.112-124, ⟨10.1007/978-3-319-64322-9_10⟩
Conference papers
hal-01703332v1
|
||
|
Mining Hierarchical Temporal Roles with Multiple Metrics30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.79-95, ⟨10.1007/978-3-319-41483-6_6⟩
Conference papers
hal-01633674v1
|
||
|
When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon’s and Naver’s Celebrity Recognition APIs33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.355-369, ⟨10.1007/978-3-319-99828-2_25⟩
Conference papers
hal-02023746v1
|
- 1
- 2