Search - IFIP Open Digital Library Access content directly

Filter your results

1 743 results
Deposit type : Fulltext
Image document

FlowFlex: Malleable Scheduling for Flows of MapReduce Jobs

Viswanath Nagarajan , Joel Wolf , Andrey Balmin , Kirsten Hildrum
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.103-122, ⟨10.1007/978-3-642-45065-5_6⟩
Conference papers hal-01480794v1
Image document

Improving Time Bounded Reachability Computations in Interactive Markov Chains

Hassan Hatefi , Holger Hermanns
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.250-266, ⟨10.1007/978-3-642-40213-5_16⟩
Conference papers hal-01514669v1
Image document

A New Representation of Two-Dimensional Patterns and Applications to Interactive Programming

I.T. Banu-Demergian , C.I. Paduraru , G. Stefanescu
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.183-198, ⟨10.1007/978-3-642-40213-5_12⟩
Conference papers hal-01514660v1
Image document

Modeling Enterprise Interoperability: Taming the Information Explosion

Richard Mark Soley
5th International Working Conference on Enterprise Interoperability (IWEI), Mar 2013, Enschede, Netherlands. pp.1-3, ⟨10.1007/978-3-642-36796-0_1⟩
Conference papers hal-01474225v1
Image document

End-to-End Delay Performance for VoIP on LTE System in Access Network

Ng Liang Shen , Noraniah Abdul Aziz , Tutut Herawan
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.162-172, ⟨10.1007/978-3-642-36818-9_17⟩
Conference papers hal-01480171v1
Image document

A Test Case Generation Technique for VMM Fuzzing

Xiaoxia Sun , Hua Chen , Jinjing Zhao , Minhuan Huang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.318-323, ⟨10.1007/978-3-642-36818-9_34⟩
Conference papers hal-01480188v1
Image document

Software Development Methods in the Internet of Things

Selo Sulistyo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.50-59, ⟨10.1007/978-3-642-36818-9_6⟩
Conference papers hal-01480264v1
Image document

Knowledge Retrieval in Complex Information Landscapes Related to Products and Production

Marcus Schichtel
6th Programming Languages for Manufacturing (PROLAMAT), Oct 2013, Dresden, Germany. pp.273-285, ⟨10.1007/978-3-642-41329-2_27⟩
Conference papers hal-01485821v1
Image document

As-Is Analysis and Efficient 3D Layout Planning during the Conversion of Old and Design of New Production Facilities by Means of 3D-CAD

Björn Schuster
6th Programming Languages for Manufacturing (PROLAMAT), Oct 2013, Dresden, Germany. pp.423-425, ⟨10.1007/978-3-642-41329-2_41⟩
Conference papers hal-01485838v1
Image document

Challenges for Digital Product and Process Design Systems at BMW

Dietmar Trippner , Stefan Rude , Andreas Schreiber
6th Programming Languages for Manufacturing (PROLAMAT), Oct 2013, Dresden, Germany. pp.31-35, ⟨10.1007/978-3-642-41329-2_4⟩
Conference papers hal-01485845v1
Image document

Two Semi-Lagrangian Fast Methods for Hamilton-Jacobi-Bellman Equations

Simone Cacace , Emiliano Cristiani , Maurizio Falcone
26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.74-84, ⟨10.1007/978-3-662-45504-3_7⟩
Conference papers hal-01286401v1
Image document

Why Not Let IT Fail? The IT Project Success Paradox

Paul J. Ambrose , David Munro
InternationalWorking Conference on Transfer and Diffusion of IT (TDIT), Jun 2013, Bangalore, India. pp.579-582, ⟨10.1007/978-3-642-38862-0_37⟩
Conference papers hal-01467803v1
Image document

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication

Jan Camenisch , Maria Dubovitskaya , Anja Lehmann , Gregory Neven , Christian Paquin , et al.
3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.34-52, ⟨10.1007/978-3-642-37282-7_4⟩
Conference papers hal-01470502v1
Image document

An Integrative Model Linking Risk, Risk Management and Project Performance: Support from Indian Software Projects

Sam Thomas , Bhasi Marath
InternationalWorking Conference on Transfer and Diffusion of IT (TDIT), Jun 2013, Bangalore, India. pp.326-342, ⟨10.1007/978-3-642-38862-0_20⟩
Conference papers hal-01467788v1
Image document

Regularization of Linear-Quadratic Control Problems with L 1 -Control Cost

Christopher Schneider , Walter Alt
26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.296-305, ⟨10.1007/978-3-662-45504-3_29⟩
Conference papers hal-01286438v1
Image document

Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case

Robert Lagerström , Carliss Baldwin , Alan Maccormack , David Dreyfus
6th The Practice of Entrprise Modeling (PoEM), Nov 2013, Riga, Latvia. pp.9-23, ⟨10.1007/978-3-642-41641-5_2⟩
Conference papers hal-01474793v1
Image document

Conformity-Based Transfer AdaBoost Algorithm

Shuang Zhou , Evgueni N. Smirnov , Haitham Bou Ammar , Ralf Peeters
9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.401-410, ⟨10.1007/978-3-642-41142-7_41⟩
Conference papers hal-01459635v1
Image document

Product Lifecycle Management in an Open Industry Framework

Shuichi Fukuda
10th Product Lifecycle Management for Society (PLM), Jul 2013, Nantes, France. pp.1-9, ⟨10.1007/978-3-642-41501-2_1⟩
Conference papers hal-01461842v1
Image document

Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice

Fatih Gey , Stefan Walraven , Dimitri Van Landuyt , Wouter Joosen
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.113-127, ⟨10.1007/978-3-642-39614-4_8⟩
Conference papers hal-01492780v1
Image document

Privacy-Friendly Checking of Remote Token Blacklists

Roel Peeters , Andreas Pashalidis
3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.18-33, ⟨10.1007/978-3-642-37282-7_3⟩
Conference papers hal-01470501v1
Image document

Capp Model for Prismatic Parts in Digital Manufacturing

Vidosav D. Majstorović , Tatjana V. Šibalija , Bojan M. Erčević , Marko M. Erčević
6th Programming Languages for Manufacturing (PROLAMAT), Oct 2013, Dresden, Germany. pp.190-204, ⟨10.1007/978-3-642-41329-2_21⟩
Conference papers hal-01485815v1
Image document

What is the Value of Information - Search Engine’s Point of View

Mieczysław A. Kłopotek
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.1-12, ⟨10.1007/978-3-642-40925-7_1⟩
Conference papers hal-01496067v1
Image document

Representation and Analysis of Piecewise Linear Functions in Abs-Normal Form

Tom Streubel , Andreas Griewank , Manuel Radons , Jens-Uwe Bernt
26th Conference on System Modeling and Optimization (CSMO), Sep 2013, Klagenfurt, Austria. pp.327-336, ⟨10.1007/978-3-662-45504-3_32⟩
Conference papers hal-01286443v1
Image document

Co-working for knowledge management in cultural heritage: towards a PLM for museum

Benjamin Hervy , Florent Laroche , Alain Bernard , Jean-Louis Kerouanton
10th Product Lifecycle Management for Society (PLM), Jul 2013, Nantes, France. pp.317-325, ⟨10.1007/978-3-642-41501-2_32⟩
Conference papers hal-00866044v1
Image document

An Evaluation of Stacking and Tiling Features within the Traditional Desktop Metaphor

Clemens Zeidler , Christof Lutteroth , Gerald Weber
14th International Conference on Human-Computer Interaction (INTERACT), Sep 2013, Cape Town, South Africa. pp.702-719, ⟨10.1007/978-3-642-40483-2_49⟩
Conference papers hal-01497472v1
Image document

A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System

Ezzat Alqurashi , Gary Wills , Lester Gilbert
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.245-256, ⟨10.1007/978-3-642-39218-4_19⟩
Conference papers hal-01463830v1
Image document

Particle Swarm Optimization Approach for Fuzzy Cognitive Maps Applied to Autism Classification

Panagiotis Oikonomou , Elpiniki I. Papageorgiou
9th Artificial Intelligence Applications and Innovations (AIAI), Sep 2013, Paphos, Greece. pp.516-526, ⟨10.1007/978-3-642-41142-7_52⟩
Conference papers hal-01459643v1
Image document

Translating the Idea of the eGovernment One-Stop-Shop in Indonesia

Fathul Wahid
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.1-10, ⟨10.1007/978-3-642-36818-9_1⟩
Conference papers hal-01480174v1
Image document

SplayNet: Distributed User-Space Topology Emulation

Valerio Schiavoni , Etienne Rivière , Pascal Felber
14th International Middleware Conference (Middleware), Dec 2013, Beijing, China. pp.62-81, ⟨10.1007/978-3-642-45065-5_4⟩
Conference papers hal-01480792v1
Image document

Using Safety Constraint for Transactional Dataset Anonymization

Bechara Al Bouna , Chris Clifton , Qutaibah Malluhi
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.164-178, ⟨10.1007/978-3-642-39256-6_11⟩
Conference papers hal-01490703v1