Skip to main content Skip to main navigation

Publications

 

Due to maintenance work, it is currently not possible to search for publications by author.

Displaying results 51 to 60 of 504.
  1. Noemi Toth; László Gulyás; Richard O. Legendi; Paul Duijn; Peter M. A. Sloot; George Kampis

    The importance of centralities in dark network value chains

    In: The European Physical Journal - Special Topics (EPJ ST), Vol. 222, No. 6, Pages 1413-1439, Springer, Berlin Heidelberg, 2013.

  2. G. Spina; F. Roberts; Jens Weppner; Paul Lukowicz; O. Amft

    CRNTC+: A smartphone-based sensor processing framework for prototyping personal healthcare applications

    In: Pervasive Computing Technologies for Healthcare. International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive …

  3. Thomas Burkhart

    Flexible Prozessunterstützung durch Empfehlungssysteme. Referenzmodell und prototypische Implementierung

    Wirtschaftsinformatik - Theorie und Anwendung, Vol. 28, ISBN 978-3-8325-3363-2, Logos Verlag Berlin, Berlin, 2013.

  4. Towards Future Web-based Aerospace Enterprises (Dagstuhl Seminar 13252)

    In: Andreas Harth; Craig A. Knoblock; Kai-Uwe Sattler; Rudi Studer (Hrsg.). Dagstuhl Reports, Vol. 3, No. 6, Pages 118-120, Schloss …

  5. Thomas Röfer; Tim Laue; Judith Müller; Michel Bartsch; Malte Jonas Batram; Arne Böckmann; Martin Böschen; Martin Kroker; Florian Maaß; Thomas Münder; Marcel Steinbeck; Andreas Stolpmann; Simon Taddiken; Alexis Tsogias; Felix Wenk

    B-Human Team Report and Code Release 2013

    2013.

  6. Lucas Davi; Alexandra Dmitrienko; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

    In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM Symposium on Information, Computer and …

  7. Sören Bleikertz; Sven Bugiel; Hugo Ideler; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Client-controlled Cryptography-as-a-Service in the Cloud

    In: Proceedings of the 11th International Conference on Applied Cryptography and Network Security 2013. International Conference on Applied …

  8. Matthias Kreil; Kristof Van Laerhoven; Paul Lukowicz

    Allowing early inspection of activity data from a highly distributed bodynet with a hierarchical-clustering-of-segments approach

    In: Body Sensor Networks (BSN), 2013 IEEE International Conference on. IEEE International Conference on Body Sensor Networks (BSN-2013), May 6-9, …