| Paper Id |
Title |
First Name |
Surname |
| 32 |
Taking Lessons from Cognitive Psychologists to Design our Content Browsing Tools? |
Francis |
ROUSSEAUX |
| 44 |
Business Process Verification using a Pi-Calculus Virtual Machine |
Marcos Vanine |
Nader |
| 49 |
From OLAP Query Algebra to Graphical OLAP Query Language |
Ronan |
TOURNIER |
| 53 |
Expressing variability for patterns re-use |
Nicolas |
Arnaud |
| 54 |
Days of Responsibility per Network Failure |
Ning |
Chang |
| 57 |
New Transform for Improving Compression Performance in Natural Language Text |
Ashutosh |
Gupta |
| 62 |
On the Representation of Ideas |
Ron |
Summers |
| 68 |
Remote Control based on Multi Agents Systems |
Hicham |
MEDROMI |
| 78 |
Economic Approaches to Information Security Management: Current Practice and Future Challenges |
Xiaomeng |
Su |
| 103 |
An information system upon information systems for managing and coordinating information system development process |
Thang |
Le Dinh |
| 110 |
Comparing the Trust and Security Models of Four Mobile Agent Platforms |
Michail |
Fragkakis |