Filter your results
- 71
- 2
- 67
- 4
- 2
- 73
- 12
- 1
- 2
- 7
- 9
- 8
- 4
- 7
- 4
- 7
- 8
- 3
- 8
- 6
- 73
- 10
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 10
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Performance Comparison of Two Search-Based Testing Strategies for ADAS System Validation31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.140-156, ⟨10.1007/978-3-030-31280-0_9⟩
Conference papers
hal-02526346v1
|
||
|
AI for Localizing Faults in Spreadsheets29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.71-87, ⟨10.1007/978-3-319-67549-7_5⟩
Conference papers
hal-01678961v1
|
||
|
Recommender Systems for IoT Enabled m-Health Applications14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2018, Rhodes, Greece. pp.227-237, ⟨10.1007/978-3-319-92016-0_21⟩
Conference papers
hal-01821320v1
|
||
|
Plan It! Automated Security Testing Based on Planning26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.48-62, ⟨10.1007/978-3-662-44857-1_4⟩
Conference papers
hal-01405274v1
|
||
|
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on SmartphonesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.176-189, ⟨10.1007/978-3-642-32498-7_14⟩
Conference papers
hal-01542428v1
|
||
|
Cross-Border Legal Identity Management11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers
hal-01543589v1
|
||
|
Explainable AI: the new 42?2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.295-303, ⟨10.1007/978-3-319-99740-7_21⟩
Conference papers
hal-01934928v1
|
||
|
Using Behavioral Indicators to Assess Competences in a Sustainable Manufacturing Learning Scenario19th Advances in Production Management Systems (APMS), Sep 2012, Rhodes, Greece. pp.582-589, ⟨10.1007/978-3-642-40352-1_73⟩
Conference papers
hal-01472296v1
|
||
|
Getting granular on Twitter: Tweets from a conference and their limited usefulness for non-participantsIFIP TC 3 International Conference on Key Competencies in the Knowledge Society (KCKS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.102-113, ⟨10.1007/978-3-642-15378-5_10⟩
Conference papers
hal-01054707v1
|
||
|
Combining FOSS and Kanban: An Action Research12th IFIP International Conference on Open Source Systems (OSS), May 2016, Gothenburg, Sweden. pp.71-84, ⟨10.1007/978-3-319-39225-7_6⟩
Conference papers
hal-01369052v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Qualified Mobile Server Signature25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.103-111, ⟨10.1007/978-3-642-15257-3_10⟩
Conference papers
hal-01054524v1
|
||
|
Code Between the Lines: Semantic Analysis of Android Applications35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.171-186, ⟨10.1007/978-3-030-58201-2_12⟩
Conference papers
hal-03440841v1
|
||
|
Trigger Alarm: A Smart NFC Sniffer for High-Precision Measurements32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.186-200, ⟨10.1007/978-3-030-64881-7_12⟩
Conference papers
hal-03239810v1
|
||
|
Property-Based Testing for Parameter Learning of Probabilistic Graphical Models4th International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2020, Dublin, Ireland. pp.499-515, ⟨10.1007/978-3-030-57321-8_28⟩
Conference papers
hal-03414744v1
|
||
|
Extracting Semantic Knowledge from Twitter3rd Electronic Participation (ePart), Aug 2011, Delft, Netherlands. pp.48-59, ⟨10.1007/978-3-642-23333-3_5⟩
Conference papers
hal-01589383v1
|
||
|
Value-Based Core Areas of Trustworthiness in Online Services13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.81-97, ⟨10.1007/978-3-030-33716-2_7⟩
Conference papers
hal-03182614v1
|
||
|
Opportunities and Challenges of CREDENTIALAnja Lehmann; Diane Whitehouse; Simone Fischer-Hübner; Lothar Fritsch; Charles Raab. Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, AICT-498, Springer International Publishing, pp.76-91, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0_7⟩
Book sections
hal-01629170v1
|
||
|
A “Strength of Decision Tree Equivalence”-Taxonomy and Its Impact on Test Suite Reduction29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.197-212, ⟨10.1007/978-3-319-67549-7_12⟩
Conference papers
hal-01678986v1
|
||
|
Anonymous Client Authentication for Transport Layer Security11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.268-280, ⟨10.1007/978-3-642-13241-4_24⟩
Conference papers
hal-01056373v1
|
||
|
A Security Analysis of FirstCoin33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.127-140, ⟨10.1007/978-3-319-99828-2_10⟩
Conference papers
hal-02023720v1
|
||
|
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.300-314, ⟨10.1007/978-3-642-39218-4_23⟩
Conference papers
hal-01463834v1
|
||
|
Testing TLS Using Combinatorial Methods and Execution Framework29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.162-177, ⟨10.1007/978-3-319-67549-7_10⟩
Conference papers
hal-01678990v1
|
||
|
Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning31th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2019, Paris, France. pp.3-21, ⟨10.1007/978-3-030-31280-0_1⟩
Conference papers
hal-02526358v1
|
||
|
How Playstyles Evolve: Progression Analysis and Profiling in Just Cause 215th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.90-101, ⟨10.1007/978-3-319-46100-7_8⟩
Conference papers
hal-01640296v1
|
||
|
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers
hal-01284842v1
|
||
|
Modular Architecture for Adaptable Signature-Creation Tools12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Conference papers
hal-01490913v1
|
||
|
Usability Reporting with UsabML4th International Conference on Human-Centered Software Engineering (HCSE), Oct 2012, Toulouse, France. pp.342-351, ⟨10.1007/978-3-642-34347-6_26⟩
Conference papers
hal-01556829v1
|
||
|
Towards Authenticity and Privacy Preserving Accountable WorkflowsDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.170-186, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_12⟩
Book sections
hal-01619735v1
|
||
|
A New Agile Hybridization Approach and a Set of Related Guidelines for Mechatronic Product Development17th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2020, Rapperswil, Switzerland. pp.618-633, ⟨10.1007/978-3-030-62807-9_49⟩
Conference papers
hal-03753137v1
|