Filter your results
- 18
- 2
- 17
- 2
- 1
- 20
- 5
- 1
- 2
- 7
- 1
- 1
- 3
- 1
- 4
- 20
- 8
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Occupant Adoption of IoT Based Environment Service in Office Spaces: An Empirical InvestigationInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.685-693, ⟨10.1007/978-3-030-64849-7_60⟩
Conference papers
hal-03701809v1
|
||
|
Shelter Location-Allocation Problem with Vulnerabilities of Network and Disruption of Shelter During the Response Phase of DisasterIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.705-713, ⟨10.1007/978-3-030-85910-7_74⟩
Conference papers
hal-03806535v1
|
||
|
NETWORKING 2010Springer, LNCS-6091, 2010, Lecture Notes in Computer Science, 978-3-642-12962-9. ⟨10.1007/978-3-642-12963-6⟩
Books
hal-01555313v1
|
||
|
A NAT Based Seamless Handover for Software Defined Enterprise WLANs17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.78-90, ⟨10.1007/978-3-030-30523-9_7⟩
Conference papers
hal-02881741v1
|
||
|
The AUGMENT Project: Co-constructive Mapping and Support of Accessibility and ParticipationSecond IFIP WG 8.5 International Conference on Electronic Participation (EPART), Aug 2010, Lausanne, Italy. pp.95-103, ⟨10.1007/978-3-642-15158-3_8⟩
Conference papers
hal-01054833v1
|
||
|
IoT Based Climate Control Systems Diffusion in Intelligent Buildings - A System Dynamics ModelInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.673-684, ⟨10.1007/978-3-030-64849-7_59⟩
Conference papers
hal-03701778v1
|
||
|
Algorithm Selection and Model Evaluation in Application Design Using Machine Learning2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.175-195, ⟨10.1007/978-3-030-45778-5_12⟩
Conference papers
hal-03266461v1
|
||
|
Cycle Based Clustering Using Reversible Cellular Automata26th International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA), Aug 2020, Stockholm, Sweden. pp.29-42, ⟨10.1007/978-3-030-61588-8_3⟩
Conference papers
hal-03659463v1
|
||
|
Are Video Resumes Preferred by Job Applicants? Information Technology in RecruitmentInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.138-149, ⟨10.1007/978-3-030-64861-9_13⟩
Conference papers
hal-03744779v1
|
||
|
Information Diffusion for Real Time Resource Planning During Crisis Leveraging Emerging Digital TechnologiesInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.33-44, ⟨10.1007/978-3-030-64861-9_4⟩
Conference papers
hal-03744785v1
|
||
|
Enabling the Deployment of ABAC Policies in RBAC Systems32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.51-68, ⟨10.1007/978-3-319-95729-6_4⟩
Conference papers
hal-01954419v1
|
||
|
Pixel Based Adversarial Attacks on Convolutional Neural Network Models4th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2021, Chennai, India. pp.141-155, ⟨10.1007/978-3-030-92600-7_14⟩
Conference papers
hal-03772929v1
|
||
|
Optimal Parameters for Efficient Two-Party Computation Protocols6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.128-143, ⟨10.1007/978-3-642-30955-7_12⟩
Conference papers
hal-01534312v1
|
||
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
Accident Detection System Using Deep Learning5th International Conference on Computational Intelligence in Data Science (ICCIDS), Mar 2022, Virtual, India. pp.301-310, ⟨10.1007/978-3-031-16364-7_23⟩
Conference papers
hal-04381284v1
|
||
|
Communications: Wireless in Developing Countries and Networks of the FutureAICT-327, Springer, 2010, IFIP Advances in Information and Communication Technology, 978-3-642-15475-1. ⟨10.1007/978-3-642-15476-8⟩
Proceedings
hal-01556785v1
|
||
|
transCryptFS: A Trusted and Secure File System6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.263-263, ⟨10.1007/978-3-642-29852-3_22⟩
Conference papers
hal-01517661v1
|
||
|
Time Is Perception Is Money – Web Response Times in Mobile Networks with Application to Quality of ExperiencePerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.179-190, ⟨10.1007/978-3-642-25575-5_15⟩
Conference papers
hal-01586896v1
|
||
|
Is Cash Still the Enemy? The Dampening of Demonetization’s Ripple Effect on Mobile PaymentsInternational Working Conference on Transfer and Diffusion of IT (TDIT), Dec 2020, Tiruchirappalli, India. pp.529-540, ⟨10.1007/978-3-030-64849-7_47⟩
Conference papers
hal-03701805v1
|
||
|
Path Attestation Scheme to Avert DDoS Flood Attacks9th International IFIP TC 6 Networking Conference (NETWORKING), May 2010, Chennai, India. pp.397-408, ⟨10.1007/978-3-642-12963-6_32⟩
Conference papers
hal-01059127v1
|