Paper Id |
Title |
First Name |
Surname |
32 |
Taking Lessons from Cognitive Psychologists to Design our Content Browsing Tools? |
Francis |
ROUSSEAUX |
44 |
Business Process Verification using a Pi-Calculus Virtual Machine |
Marcos Vanine |
Nader |
49 |
From OLAP Query Algebra to Graphical OLAP Query Language |
Ronan |
TOURNIER |
53 |
Expressing variability for patterns re-use |
Nicolas |
Arnaud |
54 |
Days of Responsibility per Network Failure |
Ning |
Chang |
57 |
New Transform for Improving Compression Performance in Natural Language Text |
Ashutosh |
Gupta |
62 |
On the Representation of Ideas |
Ron |
Summers |
68 |
Remote Control based on Multi Agents Systems |
Hicham |
MEDROMI |
78 |
Economic Approaches to Information Security Management: Current Practice and Future Challenges |
Xiaomeng |
Su |
103 |
An information system upon information systems for managing and coordinating information system development process |
Thang |
Le Dinh |
110 |
Comparing the Trust and Security Models of Four Mobile Agent Platforms |
Michail |
Fragkakis |