Details

Displaying results 1 to 20 out of 9997

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
Open-Source German Distant Speech Recognition: Corpus and Acoustic Model
Stephan Radeck-Arneth, Benjamin Milde, Arvid Lange, Evandro Gouvea, Stefan Radomski, Max Mühlhäuser, Chris Biemann
In: Text, Speech and Dialogue. Proceedings of the 18th International Conference TSD2015, Plzen, Czech Republic, to appear, Springer, September 2015.

A Survey of Technologies for the Internet of Things
Vangelis Gazis, Manuel Görtz, Marco Huber, Alessandro Leonardi, Kostas Mathioudakis, Alexander Wiesmaier, Florian Zeiger, Emmanouil Vasilomanolakis
In: International Wireless Communications and Mobile Computing Conference (IWCMC), Machine - to - Machine Communications (M2M) & Internet of Things (IoT) Workshop, IEEE, August 2015.

DroidSearch: A Powerful Search Engine for Android Applications
Siegfried Rasthofer, Steven Arzt, Max Kolhagen, Brian Pfretzschner, Stephan Huber, Eric Bodden, Philipp Richter
In: 2015 Science and Information Conference (SAI), Juli 2015.

Smart Traffic Flow
Werner Schmidt, Stephan Borgert, Albert Fleischmann, Lutz Heuser, Christian Müller, Immanuel Schweizer
In: HMD - Praxis der Wirtschaftsinformatik, p. to appear, Juli 2015.

Automatic Disambiguation of English Puns
Tristan Miller and Iryna Gurevych
In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (ACL-IJCNLP 2015), Juli 2015.

TyTAN: Tiny Trust Anchor for Tiny Devices
Ferdinand Brasser, Patrick Koeberl, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann
In: 52nd Design Automation Conference (DAC) 2015, Juni 2015.

HAFIX: Hardware-Assisted Flow Integrity Extension
Orlando Arias, Lucas Davi, Matthias Hanreich, Yier Jin, Patrick Koeberl, Debayan Paul, Ahmad-Reza Sadeghi, Dean Sullivan
In: 52nd Design Automation Conference (DAC), Juni 2015.

Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis
Ebrahim Songhori, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 52nd Design Automation Conference (DAC), Juni 2015.

A View on Privacy & Trust in IoT
Jörg Daubert, Alexander Wiesmaier, Panayotis Kikiras
In: IEEE: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), p. to be presented, IEEE, Juni 2015.

Incorporating Attacker Capabilities in Risk Estimation and Mitigation
Lotfi ben Othmane, Rohit Ranchal, Ruchith Fernando, Bharat Bhargava, Eric Bodden
In: Computers & Security, vol. 51, p. 41–61, Juni 2015.
http://www.sciencedirect.com/science/article/pii/S01674048150003345000334.

Linking the Thoughts: Analysis of Argumentation Structures in Scientific Publications
Christian Kirschner and Judith Eckle-Kohler and Iryna Gurevych
In: Proceedings of the 2nd Workshop on Argumentation Mining held in conjunction with the 2015 Conference of the North American Chapter of the Association for Computational Linguistics – Human Language Technologies (NAACL HLT 2015), p. (to appear), Juni 2015.

Intelligente Datenauswertung mit Linked Open Data
Heiko Paulheim, Axel Schulz, Frederik Janssen, Petar Ristoski, Immanuel Schweizer
In: Börteçin Ege, Bernhard Humm, Anatol Reibold , Corporate Semantic Web, chap. 13, p. 186 - 200, Springer Vieweg, Juni 2015. ISBN 3642548857. ISSN 1439-3107.

Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief
D. Steinmetzer, M. Schulz, and M. Hollick
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), Juni 2015. ISBN 978-1-4503-3623-9/15/06.

Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot
T. Hasan, Panayotis Kikiras, Alessandro Leonardi, Holger Ziekow, Jörg Daubert
In: ACM: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), p. 1-10, ACM, Juni 2015.

Multimodal Dialogmanagement in a Smart Home Context with SCXML
Dirk Schnelle-Walka, Stephan Radeck-Arneth and Jürgen Striebinger
In: Proceedings of the 2nd Workshop on Engineering Interactive Systems with SCXML, to appear, Juni 2015.

How to Exchange Security Events? Overview and Evaluation of Formats and Protocols
Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier and Aiko Pras
p. 9, Mai 2015.

No PAIN, No Gain? The utility of PArallel fault INjections
Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
In: International Conference on Software Engineering (ICSE), 2015, Mai 2015.
http://2015.icse-conferences.org/.

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

Readactor: Practical Code Randomization Resilient to Memory Disclosure
Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

Taxonomy and Survey of Collaborative Intrusion Detection
Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer
In: ACM Computing Surveys, vol. 47, no. 55, p. 33, Mai 2015. ISSN 0360-0300.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt |
zum Seitenanfangzum Seitenanfang