Search - IFIP Open Digital Library Access content directly

Filter your results

18 results
Structure: Internal structure identifier : 469153
Image document

A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems

Ahmed Kheldoun , Kamel Barkaoui , Jiafeng Zhang , Malika Ioualalen
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.551-562, ⟨10.1007/978-3-319-19578-0_45⟩
Conference papers hal-01789937v1
Image document

Adaptive Mechanism Based on Shared Learning in Multi-agent System

Qingshan Li , Hua Chu , Liang Diao , Lu Wang
8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China. pp.113-121, ⟨10.1007/978-3-662-44980-6_13⟩
Conference papers hal-01383324v1

Network and Parallel Computing

Guang R. Gao , Depei Qian , Xinbo Gao , Barbara Chapman , Wenguang Chen
Springer International Publishing, LNCS-9966, 2016, Lecture Notes in Computer Science, 978-3-319-47098-6. ⟨10.1007/978-3-319-47099-3⟩
Books hal-01648008v1
Image document

Non-Functional Requirements Elicitation and Incorporation into Class Diagrams

Xiaoyu Song , Zhenhua Duan , Cong Tian
6th IFIP TC 12 International Conference on Intelligent Information Processing (IIP), Oct 2010, Manchester, United Kingdom. pp.72-81, ⟨10.1007/978-3-642-16327-2_12⟩
Conference papers hal-01055075v1
Image document

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

Xingxing Xie , Hua Ma , Jin Li , Xiaofeng Chen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers hal-01480196v1
Image document

Provably Secure and Subliminal-Free Variant of Schnorr Signature

Yinghui Zhang , Hui Li , Xiaoqing Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.383-391, ⟨10.1007/978-3-642-36818-9_42⟩
Conference papers hal-01480197v1
Image document

The Representation of Indiscernibility Relation Using ZBDDs

Qianjin Wei , Tianlong Gu , Fengying Li , Guoyong Cai
7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.216-225, ⟨10.1007/978-3-642-32891-6_28⟩
Conference papers hal-01524971v1
Image document

BAAP: A Behavioral Animation Authoring Platform for Emotion Driven 3D Virtual Characters

Ling Li , Gengdai Liu , Mingmin Zhang , Zhigeng Pan , Edwin Song
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.350-357, ⟨10.1007/978-3-642-15399-0_37⟩
Conference papers hal-01055625v1
Image document

IMShell-Dec: Pay More Attention to External Links in PowerShell

Ruidong Han , Chao Yang , Jianfeng Ma , Siqi Ma , Yunbo Wang , et al.
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.189-202, ⟨10.1007/978-3-030-58201-2_13⟩
Conference papers hal-03440834v1
Image document

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors

Yuchao She , Hui Li , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.300-305, ⟨10.1007/978-3-642-36818-9_31⟩
Conference papers hal-01480185v1
Image document

CSP-Based General Detection Model of Network Covert Storage Channels

Hui Zhu , Tingting Liu , Guanghui Wei , Beishui Liu , Hui Li
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.459-468, ⟨10.1007/978-3-642-36818-9_51⟩
Conference papers hal-01480205v1
Image document

Attribute-Based Fine-Grained Access Control with User Revocation

Jun Ye , Wujun Zhang , Shu-Lin Wu , Yuan-Yuan Gao , Jia-Tao Qiu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.586-595, ⟨10.1007/978-3-642-55032-4_60⟩
Conference papers hal-01397274v1
Image document

An Effective Cloud-Based Active Defense System against Malicious Codes

Zhenyu Zhang , Wujun Zhang , Jianfeng Wang , Xiaofeng Chen
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.690-695, ⟨10.1007/978-3-642-55032-4_71⟩
Conference papers hal-01397288v1
Image document

A Modeling Framework for Resource Service Sharing in a Cloud Manufacturing System

Yongkui Liu , Xun Xu , Lin Zhang , Fei Tao
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2015, Tokyo, Japan. pp.412-419, ⟨10.1007/978-3-319-22759-7_48⟩
Conference papers hal-01431124v1
Image document

Reasoning about Assembly Sequences Based on Description Logic and Rule

Yu Meng , Tianlong Gu , Liang Chang
7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.131-136, ⟨10.1007/978-3-642-32891-6_18⟩
Conference papers hal-01524945v1
Image document

Continuous Context-Aware Device Comfort Evaluation Method

Jingjing Guo , Christian Damsgaard Jensen , Jianfeng Ma
9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. pp.203-211, ⟨10.1007/978-3-319-18491-3_16⟩
Conference papers hal-01416227v1
Image document

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet

Tao Jiang , Xiaofeng Chen , Jin Li , Jianfeng Ma
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.612-621, ⟨10.1007/978-3-642-55032-4_63⟩
Conference papers hal-01397277v1
Image document

Secure and Verifiable Outsourcing of Sequence Comparisons

Yansheng Feng , Hua Ma , Xiaofeng Chen , Hui Zhu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.243-252, ⟨10.1007/978-3-642-36818-9_25⟩
Conference papers hal-01480179v1