Details

Displaying results 1 to 20 out of 10374

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
Turbulent Stability of Emergent Roles: The Dualistic Nature of Self-Organizing Knowledge Co-Production
Ofer Arazy and Johannes Daxenberger and Hila Lifshitz-Assaf and Oded Nov and Iryna Gurevych
In: Information Systems Research, p. to appear, Januar 2017.

Collaborative Web-based Tools for Multi-layer Text Annotation
Chris Biemann and Kalina Bontcheva and Richard Eckart de Castilho and Iryna Gurevych and Seid Muhie Yimam
In: Nancy Ide and James Pustejovsky: Text, Speech, and Technology book series, The Handbook of Linguistic Annotation, Springer Netherlands, 2017. ISBN 978-94-024-0879-9.
http://www.springer.com/de/book/9789402408799.

Community standards
Nancy Ide and Nicoletta Calzolari and Judith Eckle-Kohler and Dafydd Gibbon and Sebastian Hellman and Kiyong Lee and Joachim Nivre and Laurent Romary
In: Nancy Ide and James Pustejovsky: Text, Speech, and Technology book series, The Handbook of Linguistic Annotation, Springer Netherlands, 2017. ISBN 978-94-024-0879-9.
http://www.springer.com/de/book/9789402408799.

Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough?
Michael Stein, Tobias Petry, Immanuel Schweizer, Martina Brachmann, Max Mühlhäuser
In: Proceedings of the IEEE Conference on Local Computer Networks (LCN), p. 1-9, November 2016.
http://www.ieeelcn.org/index.html.

On Probe-Response Attacks in Collaborative Intrusion Detection Systems
Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser
In: IEEE Conference on Communications and Network Security, IEEE, Oktober 2016.
http://cns2016.ieee-cns.org/.

Unsupervised Anomaly Detection in Noisy Business Process Event Logs Using Denoising Autoencoders
Timo Nolle, Alexander Seeliger, Max Mühlhäuser
In: Proceedings of the 19th Conference on Discovery Science (DS-2016), Oktober 2016.

C-FLAT: Control-Flow Attestation for Embedded Systems Software
Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
In: 23rd ACM Conference on Computer and Communications Security (CCS), Oktober 2016.

Smarticipation2016: First Workshop on Intelligent Personal Guidance of Human Behavior Utilizing Anticipatory Models
Christian Meurisch, Usman Naeem, Muhammad Awais Azam, Frederik Janssen, Benedikt Schmidt, Max Mühlhäuser
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'16): Adjunct Publication (to appear), ACM, September 2016.
https://smarticipation.wordpress.com.

Introducing Proxy Voting to Helios
Oksana Kulyk, Karola Marky, Stephan Neumann and Melanie Volkamer
In: Availability, Reliability and Security (ARES), 2016 11th International Conference on, September 2016.

Towards effective security assurance for incremental software development - the case of zen cart application,
Azmzt Ali and Lotfi ben Othmane
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), September 2016.

MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Rachid El Bansarkhani, Mohamed Saied Emam Mohamed and Albrecht Petzoldt
In: ISC 2016 - The 19th Information Security Conference , vol. To appear, Springer llncs, September 2016.
http://manoa.hawaii.edu/isc2016/program.html.

Intelligent Personal Guidance of Human Behavior Utilizing Anticipatory Models
Christian Meurisch
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'16): Adjunct Publication (to appear), ACM, September 2016.

SecDevOps: Is It a Marketing Buzzword?
Vaishnavi Mohan and Lotfi ben Othmane
In: Proc. of the 11th International Conference on Availability, Reliability and Security (ARES), September 2016.

Towards SUPERCLOUD Computing: User-Centric Security and Dependability in Cloud of Clouds
Marc Lacoste, Markus Miettinen, Nuno Neves, Fernando M.V. Ramos, Marko Vukolic, Fabien Charmet, Reda Yaich, Krzysztof Oborzynski, Gitesh Vernekar and Paulo Sousa (accepted)
In: IEEE Cloud Computing Special issue on Cloud Security, September 2016.

Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, September 2016.
www.ics.forth.gr/esorics2016/.

Nutzerbeteiligung
Andrea Abel and Christian M. Meyer
In: Annette Klosa and Carolin Müller-Spitzer: Internetlexikografie. Ein Kompendium, chap. 7, p. (to appear), Berlin: De Gruyter, August 2016. ISBN 978-3-05-009561-5.
https://www.degruyter.com/view/product/214813.

3rd Workshop on Argument Mining

In: Chris Reed and Kevin Ashley and Claire Cardie and Nancy Green and Iryna Gurevych and Diane Litman and Georgios Petasis and Noam Slonim and Vern Walker, Association for Computational Linguistics, August 2016.
http://argmining2016.arg.tech/.

Which argument is more convincing? Analyzing and predicting convincingness of Web arguments using bidirectional LSTM
Ivan Habernal and Iryna Gurevych
In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL 2016), vol. Volume 1: Long Papers, p. (to appear), Association for Computational Linguistics, August 2016.

Verbs Taking Clausal and Non-Finite Arguments as Signals of Modality – Revisiting the Issue of Meaning Grounded in Syntax
Judith Eckle-Kohler
In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL 2016), vol. Volume 1: Long Papers, p. (to appear), Association for Computational Linguistics, August 2016.

Optimizing an Approximation of ROUGE - a Problem-Reduction Approach to Extractive Multi-Document Summarization
Maxime Peyrard and Judith Eckle-Kohler
In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL 2016), vol. Volume 1: Long Papers, p. (to appear), Association for Computational Linguistics, August 2016.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

Dekanat

TU Darmstadt
S2|02 Piloty-Gebäude, Raum D103
Hochschulstraße 10
64289 Darmstadt

dekanat@informatik.tu-darmstadt.de

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang