Details

Displaying results 1 to 20 out of 10090

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
Nutzerbeteiligung
Andrea Abel and Christian M. Meyer
In: Annette Klosa: Handbuch Internetlexikografie, chap. 8, p. (to appear), Berlin: Akademie, 2016.

PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Habib Saissi, Peter Bokor, Neeraj Suri
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015, Oktober 2015.

Topology Control with Application Constraints
Michael Stein, Géza Kulcsár, Immanuel Schweizer, Gergely Varró, Andy Schürr, Max Mühlhäuser
In: Proceedings of the Local Computer Networks Conference, Oktober 2015.

a-kTC: Integrating Topology Control into the Stack
Immanuel Schweizer, Ralf Zimmermann, Michael Stein, Max Mühlhäuser
In: In Proceedings of the Local Computer Networks Conference (LCN), Oktober 2015.

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Christopher Liebchen, Marco Negro, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Stephen Crane, Mohaned Qunaibit, Michael Franz, Mauro Conti
In: 22nd ACM Conference on Computer and Communications Security (CCS), Oktober 2015.

It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz
In: 22nd ACM Conference on Computer and Communications Security (CCS), Oktober 2015.

Lattice Basis Reduction Attack against Physically Unclonable Functions
Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015) , Oktober 2015.
www.sigsac.org/ccs/CCS2015/.

Personality Profiling of Fictional Characters using Sense-Level Links between Lexical Resources
Lucie Flekova and Iryna Gurevych
In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP), p. to appear, Association for Computational Linguistics, September 2015.

Open-Source German Distant Speech Recognition: Corpus and Acoustic Model
Stephan Radeck-Arneth, Benjamin Milde, Arvid Lange, Evandro Gouvea, Stefan Radomski, Max Mühlhäuser, Chris Biemann
In: Text, Speech and Dialogue. Proceedings of the 18th International Conference TSD2015, Plzen, Czech Republic, to appear, Springer, September 2015.

Extending Helios Towards Private Eligibility Verifiability
Oksana Kulyk, Vanessa Teague, Melanie Volkamer
In: 5th International Conference on E-voting and Identity (VoteID), September 2015.

Always the Best: Executing Transitions between Search Overlays
Alexander Frömmgen, Stefan Haas, Michael Stein, Robert Rehner, Alejandro Buchmann, Max Mühlhäuser
In: Proceedings of the Workshop on Architecting Self-Managing Distributed Systems, p. 1-4, September 2015.

PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Daniel Germanus, Hatem Ismail and Neeraj Suri
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, September 2015.

On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Thorsten Piper, Stefan Winter, Neeraj Suri and Thomas E. Fuhrman
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, September 2015.

Factors Impacting the Effort Required to Fix Security Vulnerabilities
Lotfi ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, and Philip Miseldine
In: Proc. of the 18th Information Security Conference (ISC 2015), September 2015.

The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
Jiska Classen, Joe Chen, Daniel Steinmetzer, Matthias Hollick, Edward Knightly
In: 2nd ACM Workshop on Visible Light Communication Systems, p. 6, September 2015.
peng.cse.ohio-state.edu/VLCS-2015/.

Practical Covert Channels for WiFi Systems
Jiska Classen, Matthias Schulz, Matthias Hollick
In: IEEE Conference on Communications and Network Security (CNS), p. 8, September 2015.
cns2015.ieee-cns.org/.

A reinforcement learning approach for adaptive single- and multi-document summarization
Sebastian Henß and Margot Mieskes and Iryna Gurevych
In: International Conference of the German Society for Computational Linguistics and Language Technology (GSCL-2015), p. (to appear), September 2015.

Constructive feedback, thinking process and cooperation: assessing the quality of classroom interaction
Tahir Sousa and Lucie Flekova and Margot Mieskes and Iryna Gurevych
In: Interspeech 2015 – Towards a better understanding of the most important biosignal, p. (to appear), September 2015.

Labels - Quantified Self App for Human Activity Sensing
Christian Meurisch, Benedikt Schmidt, Michael Scholz, Immanuel Schweizer, Max Mühlhäuser
In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, to appear, ACM, September 2015.

Fitness Tracker or Digital Personal Coach: How to Personalize Training
Benedikt Schmidt, Sebastian Benchea, Rüdiger Eichin, Christian Meurisch
In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, to appear, ACM, September 2015.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang