History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 63 total

Wie hoch ist der (Beweis-) Wert digitaler Dokumente? (English)
Datenschutz und Datensicherheit 39, N0. 10, 687-691(2015)
WorldCat.org
1
Controlling light environments using segmented light sources and mobile devices. (English)
Marcus, Aaron (ed.), Design, user experience, and usability. User experience design for diverse interaction platforms and environments. Third international conference, DUXU 2014, held as part of HCI International 2014, Heraklion, Crete, Greece, June 22‒27, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-319-07625-6/pbk). Lecture Notes in Computer Science 8518, 533-540 (2014).
WorldCat.org
2
Mobile Assessment Tools. (English)
iJES 2, N0. 3, 9-14(2014)
WorldCat.org
3
Metalogue: A Multiperspective Multimodal Dialogue System with Metacognitive Abilities for Highly Adaptive and Flexible Dialogue Management. (English)
Intelligent Environments, 365-368(2014)
WorldCat.org
4
Affective metacognitive scaffolding and enriched user modelling for experiential training simulators: A follow-up study. (English)
Hernández-Leo, Davinia (ed.) et al., Scaling up learning for sustained impact. 8th European conference, on technology enhanced learning, EC-TEL 2013, Paphos, Cyprus, September 17‒21, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40813-7/pbk). Lecture Notes in Computer Science 8095, 396-409 (2013).
WorldCat.org
5
A hijacker’s guide to communication interfaces of the trusted platform module. (English)
Comput. Math. Appl. 65, No. 5, 748-761 (2013).
WorldCat.org
6
Anonymous ticketing for NFC-enabled mobile phones. (English)
Chen, Liqun (ed.) et al., Trusted systems. Third international conference, INTRUST 2011, Beijing, China, November 27‒29, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-32297-6/pbk). Lecture Notes in Computer Science 7222, 66-83 (2012).
WorldCat.org
7
Secure embedded platform with advanced process isolation and anonymity capabilities. (English)
Fischer-Hübner, Simone (ed.) et al., Trust, privacy and security in digital business. 9th international conference, TrustBus 2012, Vienna, Austria, September 3‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32286-0/pbk). Lecture Notes in Computer Science 7449, 238-239 (2012).
WorldCat.org
8
An initial evaluation of metacognitive scaffolding for experiential training simulators. (English)
Ravenscroft, Andrew (ed.) et al., 21st century learning for 21st century skills. 7th European conference of technology enhanced learning, EC-TEL 2012, Saarbrücken, Germany, September 18‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33262-3/pbk). Lecture Notes in Computer Science 7563, 23-36 (2012).
WorldCat.org
9
A hijacker’s guide to the LPC bus. (English)
Petkova-Nikova, Svetla (ed.) et al., Public key infrastructures, services and applications. 8th European workshop, EuroPKI 2011, Leuven, Belgium, September 15‒16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-29803-5/pbk). Lecture Notes in Computer Science 7163, 176-193 (2012).
WorldCat.org
10
PDB Ligand Conformational Energies Calculated Quantum-Mechanically. (English)
Journal of Chemical Information and Modeling 52, N0. 3, 739-756(2012)
WorldCat.org
11
Structuring Modular Safety Software Certification by Using Common Criteria Concepts. (English)
EUROMICRO-SEAA, 47-50(2012)
WorldCat.org
12
Multitouch-Gestensteuerung für das neuartige Suchinterface DelViz. (English)
Mensch & Computer Workshopband, 477-480(2012)
WorldCat.org
13
A distributed agent-based approach for simulation-based optimization. (English)
Advanced Engineering Informatics 26, N0. 4, 814-832(2012)
WorldCat.org
14
Assessing interactions in the brain with exact low-resolution electromagnetic tomography. (English)
Philos. Trans. R. Soc. Lond., Ser. A, Math. Phys. Eng. Sci. 369, No. 1952, 3768-3784 (2011).
WorldCat.org
15
Seamless integration of trusted computing into standard cryptographic frameworks. (English)
Chen, Liqun (ed.) et al., Trusted systems. Second international conference, INTRUST 2010, Beijing, China, December 13‒15, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-25282-2/pbk). Lecture Notes in Computer Science 6802, 1-25 (2011).
WorldCat.org
16
Implementation aspects of anonymous credential systems for mobile trusted platforms. (English)
De Decker, Bart (ed.) et al., Communications and multimedia security. 12th IFIP TC 6/TC 11 international conference, CMS 2011, Ghent, Belgium, October 19‒21, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24711-8/pbk). Lecture Notes in Computer Science 7025, 45-58 (2011).
WorldCat.org
17
Towards a trustworthy, lightweight cloud computing framework for embedded systems. (English)
McCune, Jonathan M. (ed.) et al., Trust and trustworthy computing. 4th international conference, TRUST 2011, Pittsburgh, PA, USA, June 22‒24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21598-8/pbk). Lecture Notes in Computer Science 6740, 16-32 (2011).
WorldCat.org
18
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices. (English)
Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25‒28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 84-98 (2011).
WorldCat.org
19
Tracking of Extended Objects and Group Targets Using Random Matrices. (English)
IEEE Transactions on Signal Processing 59, N0. 4, 1409-1420(2011)
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 63 total

Valid XHTML 1.0 Transitional Valid CSS!