Skip to main content Skip to main navigation

Publikationen

Zeige Ergebnisse 131 bis 140 von 599.
  1. Xiaotong Cui; Samah Mohamed Saeed; Alwin Zulehner; Robert Wille; Kaijie Wu; Rolf Drechsler; Ramesh Karri

    On the Difficulty of Inserting Trojans in Reversible Computing Architectures

    In: IEEE Transactions on Emerging Topics in Computing, Vol. 8, No. 4, Pages 960-972, IEEE, 2020.

  2. Leadership im Kontext von Digitalisierung und Künstlicher Intelligenz

    In: Jens Nachtwei; Antonia Sureth. Sonderband: Zukunft der Arbeit. Chapter 4, Führung & Verantwortung, Pages 350-353, Vol. 539 pages, ISBN 2196-0232, HR Consulting Review, Online, 11/2020.

  3. K-mer Neural Embedding Performance Analysis Using Amino Acid Codons

    In: 2020 International Joint Conference onNeural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN-2020), July 19-24, Glasgow, United Kingdom, Pages 1-8, ISBN 978-1-7281-6927-9, IEEE, 2020.

  4. Neslihan Iskender; Tim Polzehl; Sebastian Möller

    Best Practices for Crowd-based Evaluation of German Summarization: Comparing Crowd, Expert and Automatic Evaluation

    In: Proceedings of the First Workshop on Evaluation and Comparison of NLP Systems. ACL Workshop on Evaluation and Comparison of NLP Systems (Eval4NLP-2020), located at co-located with EMNLP 2020, November 12, Punta Cana, Dominican Republic, Pages 164-175, EMNLP | Eval4NLP, Association for Computational Linguistics (ACL), 2020.

  5. Michael Gundall; Christopher Huber; Sergiy Melnyk

    Integration of IEEE 802.1AS-based Time Synchronization in IEEE 802.11 as an Enabler for Novel Industrial Use Cases

    In: 2020 1st Workshop on Next Generation Networks and Applications (NGNA). Workshop on Next Generation Networks and Applications (NGNA-2020), December 14-18, Kaiserslautern, Germany, ArXive, 12/2020.

  6. Christoph Lipps; Sachinkumar Bavikatti Malikarjun; Mathias Strufe; Christopher Heinz; Christoph Grimm; Hans Dieter Schotten

    Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles

    In: Proceedings of the 3rd International Conference on Data Intelligence and Security. International Conference on Data Intelligence and Security (ISDIS-2020), November 10-12, South Padre Island, Texas, USA, Pages 93-100, ISBN 978-1-7281-9379-3/20, IEEEXplore, 11/2020.

  7. Susanne Boll; Klemens Budde; Michael Jochem; Jochen Bauer; Elsa Andrea Kirchner; u.v.m.

    GAIA-X: A Pitch Towards Europe Statusbericht zu Anwenderökosystemen und -anforderungen

    Bundesministerium für Wirtschaft und Energie (BMWi), PRpetuum GmbH, München, 6/2020.

  8. Alexander Beuther; Peter Fettke; Vanessa Just; Andreas Riedl

    KI-Einsatz für Effizienzgewinne bei Benchmarkstudien im Bereich Transfer Pricing

    In: Mathias Hildebrandt; Christian Kaeser (Hrsg.). beck.digitax (beck.digitax), Vol. 5, Pages 316-323, C.H.Beck, 12/2020.

  9. Explainable Process Predictions (xPP): A Holistic Framework and Applications

    In: Claudio Di Ciccio; Benoît Depaire; Jochen De Weerdt; Chiara Di Francescomarino; Jorge Munoz-Gama (Hrsg.). ICPM 2020. International Conference on Process Mining (ICPM-2020), 2nd, October 4-9, Padua, Italy, Pages 17-18, Vol. 2703, CEUR, 2020.

  10. Adrian Rebmann; Peter Fettke; Jana-Rebecca Rehse; Mira Pinter; Marius Schnaubelt; Kevin Daun

    IoT-Based Activity Recognition for Process Assistance in Human-Robot Disaster Response

    In: Dirk Fahland; Chiara Ghidini; Jörg Becker; Marlon Dumas (Hrsg.). International Conference on Business Process Management. Business Process Management (BPM-2020), 18th International Conference on Business Process Management, September 13-18, Seville, Spain, Pages 71-87, Vol. 392, ISBN 978-3-030-58637-9 (Print); 978-3-030-58638-6 (Online), Springer, 9/2020.