Universität Koblenz
- 0261/287-0
Hellmann, Claudia; Worischka, Susanne; Mehler, Eva et al.
The trophic function of Dikerogammarus villosus (Sowinsky, 1894) in invaded rivers: a case study in the Elbe and RhineAquatic Invasions. Bd. 10. H. 4. Helsinki: Regional Euro-Asian Biological Invasions Centre 2015 S. 385 - 397
Westphal, Kristin
Theater als Ort der Selbstermächtigung: Am Beispiel der Gruppe Gob Squad: Before Your Very EyesWolf-Andreas Liebert; Kristin Westphal (Hrsg). Performances der Selbstermächtigung. Oberhausen: Athena 2015 S. 163 - 184
Westphal, Kristin
Theatre as a Place of Self-Empowerment - The Example of Gob Squad: Before Your Very EyesScenario. Bd. 9. H. 1. Cork: UCC, College of Arts, Celtic Studies and Social Sciences 2015 S. 131 - 143
Gergs, René; Koester, Meike; Grabow, Karsten et al.
Theodoxus fluviatilis’ re-establishment in the River Rhine: a native relict or a cryptic invader?Conservation Genetics. Bd. 16. H. 1. Dordrecht: Springer 2015 S. 247 - 251
Boger, Mai-Anh
Theorie der trilemmatischen InklusionIrmtraud Schnell (Hrsg). Herausforderung Inklusion: Theoriebildung und Praxis. Bad Heilbrunn: Klinkhardt 2015 S. 51 - 62
Haraké, Laura; Bełtkiewicz, Dorota; Lochmann, Gerrit
Tongue S(t)imulator - A Comprehensive Parametrized Pose Model for Speech TherapyDavid Bommes;Tobias Ritschel;Thomas Schultz (Hrsg). Proceedings of the 20th International Symposium on Vision, Modeling and Visualization VMV 2015: Aachen, Germany; October 7.-10., 2015. Goslar: Eurographics Association 2015 S. 119 - 126
da Silva, Anderson Santos; Wickboldt, Juliano Araujo; Schaeffer-Filho, Alberto E. et al.
Tool support for the evaluation of anomaly traffic classification for network resilienceMahmoud Daneshmand;Josephina Antoniou;Nicos Komninos (Hrsg). Proceedings of the 20th IEEE Symposium on Computers and Communication ISCC 2015: Larnaca, Cyprus; July 6-9, 2015. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2015 S. 514 - 519
Schulz, Volker H.; Siebenborn, Martin; Welker, Kathrin
Towards a Lagrange–Newton Approach for PDE Constrained Shape OptimizationAldo Pratelli; Günter Leugering (Hrsg). New Trends in Shape Optimization. Cham: Birkhäuser 2015 S. 229 - 249
Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.
Towards Maintaining Long-Living Information Systems by Incorporating Security KnowledgeUwe Aßmann; Birgit Demuth; Thorsten Spitta; Georg Püschel; Ronny Kaiser (Hrsg). Software Engineering & Management 2015 - Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März - 20. März 2015 in Dresden. Bonn: Gesellschaft für Informatik 2015 S. 83 - 84
Jürjens, Jan
Towards Security of Adaptable Information Systems - Current Views and Future Perspectives: Invited Panel ParticipationFifth International Symposium on Business Modeling and Software Design (BMSD 2015). 2015 S. 1 - 3