Displaying results 1 to 20 out of 10036

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
Andrea Abel and Christian M. Meyer
In: Annette Klosa: Handbuch Internetlexikografie, chap. 8, p. (to appear), Berlin: Akademie, 2016.

PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Habib Saissi, Peter Bokor, Neeraj Suri
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015, Oktober 2015.

Open-Source German Distant Speech Recognition: Corpus and Acoustic Model
Stephan Radeck-Arneth, Benjamin Milde, Arvid Lange, Evandro Gouvea, Stefan Radomski, Max Mühlhäuser, Chris Biemann
In: Text, Speech and Dialogue. Proceedings of the 18th International Conference TSD2015, Plzen, Czech Republic, to appear, Springer, September 2015.

Extending Helios Towards Private Eligibility Verifiability
Oksana Kulyk, Vanessa Teague, Melanie Volkamer
In: 5th International Conference on E-voting and Identity (VoteID), September 2015.

Always the Best: Executing Transitions between Search Overlays
Alexander Frömmgen, Stefan Haas, Michael Stein, Robert Rehner, Alejandro Buchmann, Max Mühlhäuser
In: Proceedings of the Workshop on Architecting Self-Managing Distributed Systems, p. 1-4, September 2015.

PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Daniel Germanus, Hatem Ismail and Neeraj Suri
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, September 2015.

On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Thorsten Piper, Stefan Winter, Neeraj Suri and Thomas E. Fuhrman
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, September 2015.

A Survey of Technologies for the Internet of Things
Vangelis Gazis, Manuel Görtz, Marco Huber, Alessandro Leonardi, Kostas Mathioudakis, Alexander Wiesmaier, Florian Zeiger, Emmanouil Vasilomanolakis
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, IEEE, August 2015.

In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services
Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C, August 2015.

PALPAS - PAsswordLess PAssword Synchronization
Moritz Horsch, Andreas Hülsing, Johannes Buchmann
In: International Conference on Availability, Reliability and Security (ARES), August 2015.

Return to Where? You Can't Exploit What You Can't Find
Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: Blackhat USA, August 2015.

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
In: 10th International Conference on Availability, Reliability and Security (ARES 2015), August 2015.

How Current Android Malware Seeks to Evade Automated Code Analysis
Siegfried Rasthofer, Irfan Asrar, Stephan Huber and Eric Bodden
In: 9th International Conference on Information Security Theory and Practice (WISTP'2015), August 2015.

A Distributed Reputation System for Certification Authority Trust Management
Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick, Johannes Buchmann, Max Mühlhäuser
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), August 2015.

Literature Review of the Challenges of Developing Secure Software Using the Agile Approach
Hela Oueslati, Mohammad Masudur Rahman, Lotfi Ben Othmane
In: Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), August 2015.

A Study on Proximity-based Hand Input for One-handed Mobile Interaction
Florian Müller, Mohammadreza Khalilbeigi, Niloofar Dezfuli, Alireza Sahami Shirazi, Sebastian Günther, Max Mühlhäuser
In: SUI '15 Proceedings of the 3rd ACM symposium on Spatial user interaction, ACM, August 2015. ISBN 978-1-4503-3703.

Palm-based Interaction with Head-Mounted Displays
Florian Müller, Martin Schmitz, Niloofar Dezfuli, Mohammadreza Khalilbeigi, Max Mühlhäuser
In: Adjunct Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, ACM , August 2015. ISBN 978-1-4503-3653-6.

DroidSearch: A Powerful Search Engine for Android Applications
Siegfried Rasthofer, Steven Arzt, Max Kolhagen, Brian Pfretzschner, Stephan Huber, Eric Bodden, Philipp Richter
In: 2015 Science and Information Conference (SAI), Juli 2015.

Smart Traffic Flow
Werner Schmidt, Stephan Borgert, Albert Fleischmann, Lutz Heuser, Christian Müller, Immanuel Schweizer
In: HMD - Praxis der Wirtschaftsinformatik, p. to appear, Juli 2015.

Automatic Disambiguation of English Puns
Tristan Miller and Iryna Gurevych
In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (ACL-IJCNLP 2015), Juli 2015.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang