Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-0
Publikationen
Ergebnisse pro Seite:  10

Troitzsch, Klaus G.

Communication and Interpretation as Means Of Interaction in Human Social Systems

Katalin Martinás;Dario Matika;Armano Srbljinovi¢ (Hrsg). Complex Societal Dynamics: Security Challenges and Opportunities. Amsterdam: IOS Press 2010 S. 53 - 64


Beckers, Kristian; Hirsch, Martin; Jürjens, Jan

Compliance in Clouds: A cloud computing security perspective

GI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26


Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk

International Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37



Rybalchenko, Andrey; Sofronie-Stokkermans, Viorica

Constraint solving for interpolation

Journal of Symbolic Computation. Bd. 45. H. 11. Amsterdam: Elsevier 2010 S. 1212 - 1233


Juchem-Grundmann, Constanze; Krennmayr, Tina

Corpus-informed integration of metaphor in materials for the business English classroom

Sabine De Knop; Frank Boers; Antoon De Rycker (Hrsg). Fostering Language Teaching Efficiency through Cognitive Linguistics. Berlin: De Gruyter Mouton 2010 S. 317 - 336


Janowitz, Susann A.; Fischer, Klaus

Costing reproduction: effects of mating opportunity on mating success in male Bicyclus anynana butterflies

Behavioural Ecology and Sociobiology. Bd. 64. H. 12. Berlin: Springer 2010 S. 1999 - 2006


Graf, Felix; Grzegorzek, Marcin; Paulus, Dietrich

Counting Lymphocytes in Histopathology Images Using Connected Components

Devrim Ünay; Zehra Çataltepe; Selim Aksoy (Hrsg). Recognizing Patterns in Signals, Speech, Images and Videos: ICPR 2010 Contests, Istanbul, Turkey, August 23-26, 2010, Contest Reports. Berlin: Springer 2010 S. 263 - 269


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentation

Computer Security Foundations Symposium (CSF). 2010


Karl, Isabell; Hoffmann, Klaus H.; Fischer, Klaus

Cuticular melanisation and immune response in a butterfly: local adaptation and lack of correlation

Ecological Entomology. Bd. 35. H. 4. Oxford: Wiley-Blackwell 2010 S. 523 - 528