Browse by Subject 000 Informatik, Informationswissenschaft, allgemeine Werke

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

 
Showing results 191 to 210 of 363
PreviewIssue DateTitleAuthor(s)Editor(s)
schulz-zander_julius.pdf.jpg2016Realizing software-defined wireless networksSchulz-Zander, Julius-
Cloud_IKM_10.pdf.jpg22-Nov-2013Rechtliche Rahmenbedingungen von Cloud ComputingLabes, StineZarnekow, Rüdiger
widmer_christian.pdf.jpg17-Mar-2015Regularization based multitask learning with applications in computational biologyWidmer, Christian-
rajput_muhammad.pdf.jpg2018A regularized fusion based 3D reconstruction frameworkRajput, Muhammad Asif Ali-
alexandrov_alexander.pdf.jpg2019Representations and optimizations for embedded parallel dataflow languagesAlexandrov, Alexander-
bertelsen_etal_2015.pdf.jpg2015Residents’ democratic engagement in public housing and urban areas – structures, formalities and technologiesBertelsen, Olav W.; Korsgaard, Henrik; Kuhn, Ingrid; Schröder, Carolin; Sundblad, Yngve; Tollmar, Kondrad-
busse-etal_2019.pdf.jpg1-Jul-2019A Response to the United Nations CITES Blockchain Challenge: Incremental and Integrative PoA-based Permit ExchangeBusse, Anselm; Eberhardt, Jacob; Frost, Sebastian; Kim, Dong-Ha; Weilbier, Thore; Renner, Lukas; Roth, Matthias; Tai, Stefan-
2019A Response to the United Nations CITES Blockchain Challenge: Incremental and Integrative PoA-based Permit Exchange - Demo VideoBusse, Anselm; Eberhardt, Jacob; Frost, Sebastian; Kim, Dong-Ha; Weilbier, Thore; Renner, Lukas; Roth, Matthias; Tai, Stefan-
Giese_et_al-2021-Nature_Communications.pdf.jpg28-May-2021Retention time prediction using neural networks increases identifications in crosslinking mass spectrometryGiese, Sven H.; Sinn, Ludwig R.; Wegner, Fritz; Rappsilber, Juri-
eppner_clemens.pdf.jpg2019Robot grasping by exploiting compliance and environmental constraintsEppner, Clemens-
shukla_etal_2019.pdf.jpg23-Aug-2019Runtime Verification of P4 Switches with Reinforcement LearningShukla, Apoorv; Hudemann, Kevin Nico; Hecker, Artur; Schmid, Stefan-
eberhardt_jacob.pdf.jpg2021Scalable and privacy-preserving off-chain computationsEberhardt, Jacob-
schelter_sebastian.pdf.jpg2016Scaling data mining in massively parallel dataflow systemsSchelter, Sebastian-
goendoer_sebastian.pdf.jpg2018Seamless interoperability and data portability in the social web for facilitating an open and heterogeneous online social network federationGöndör, Sebastian Jürg-
entropy-20-00340.pdf.jpg3-May-2018Secure and Reliable Key Agreement with Physical Unclonable FunctionsGünlü, Onur; Kernetzky, Tasnad; İşcan, Onurcan; Sidorenko, Vladimir; Kramer, Gerhard; Schaefer, Rafael-
peters_daniel.pdf.jpg2017A secure system architecture for measuring instruments under legal controlPeters, Daniel-
fellmuth_joachim.pdf.jpg2021Securing real-time cyber-physical systems using artificial software diversityFellmuth, Joachim-
hetzelt_felicitas.pdf.jpg2022Security analysis of hardware-OS interfaces in LinuxHetzelt, Felicitas-
ermakova_tatiana.pdf.jpg10-Sep-2015Security and acceptance of cloud computing in healthcareErmakova, Tatiana-
willner_alexander.pdf.jpg2016Semantic-based management of federated infrastructures for future internet experimentationWillner, Alexander-