Skip to main content Skip to main navigation

Publikationen

 

Aufgrund von Wartungsarbeiten ist die Suche von Publikationen nach Autor:innen derzeit nicht möglich.

Zeige Ergebnisse 71 bis 80 von 504
  1. Sandor Soos; George Kampis; László Gulyás

    Large-scale temporal analysis of computer and information science

    In: The European Physical Journal - Special Topics (EPJ ST), Vol. 222, No. 6, Pages 1441-1465, Springer, Berlin Heidelberg, 2013.

  2. Noemi Toth; László Gulyás; Richard O. Legendi; Paul Duijn; Peter M. A. Sloot; George Kampis

    The importance of centralities in dark network value chains

    In: The European Physical Journal - Special Topics (EPJ ST), Vol. 222, No. 6, Pages 1413-1439, Springer, Berlin Heidelberg, 2013.

  3. G. Spina; F. Roberts; Jens Weppner; Paul Lukowicz; O. Amft

    CRNTC+: A smartphone-based sensor processing framework for prototyping personal healthcare applications

    In: Pervasive Computing Technologies for Healthcare. International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive …

  4. Till Mossakowski; Markus Roggenbach; Lutz Schröder

    Specification, Transformation, Navigation. Special Issue dedicated to Bernd Krieg-Brückner on the Occasion of his 60th Birthday

    In: Till Mossakowski; Markus Roggenbach; Lutz Schröder (Hrsg.). Electronic Communications of the EASST, Vol. 62, Pages 1-999, EASST, online, hosted by …

  5. Lassaad Cheikhrouhou; Werner Stephan; Markus Ullmann

    A New Approach to the Inductive Verification of Cryptographic Protocols Based on Message Algebras

    MACIS 2013, Nanning, China, December 11-13, Vol. Proceedings of the Fifth International Conference on Mathematical Aspects of Computer and …

  6. Christoph Igel; Martin Haag

    Innovative e-Learning Technologies in Medicine and Healthcare.

    In: M. Fischer; N Graf (Hrsg.). GMS Medical Informatics, Biometry and Epidemiology (MIBE), 2013.

  7. Lucas Davi; Alexandra Dmitrienko; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

    In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM Symposium on Information, Computer and …

  8. Sören Bleikertz; Sven Bugiel; Hugo Ideler; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Client-controlled Cryptography-as-a-Service in the Cloud

    In: Proceedings of the 11th International Conference on Applied Cryptography and Network Security 2013. International Conference on Applied …

  9. Evgeny Bogdanov; Carsten Ullrich; Erik Isaksson; Matthias Palmér; Denis Gillet

    Towards PLEs through Widget Spaces in Moodle

    In: Computer Science and Information Systems Journal, Vol. 11, No. 1, Pages 443-460, ComSIS Consortium, 2013.

  10. Technische Gestaltungsoptionen für autonom agierende Komponenten und Systeme

    In: 1. Würzburger Tagung zu Technikrecht. Würzburger Tagung zu Technikrecht, November 15-16, Würzburg, Germany, 11/2013.