Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

FB 4: Informatik

Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287-2501
  • 0261/287-2502
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Bohlouli, Mahdi; Merges, Fabian; Fathi, Madjid

Knowledge integration of distributed enterprises using cloud based big data analytics.

EIT. 2014 S. 612 - 617


Loepp, Benedikt; Ziegler, Jürgen

Komplexe Präferenzprofile für intermodale Navigation

Michael Koch; Andreas Butz; Johann Schlichter (Hrsg). Mensch und Computer 2014 – Workshopband: 14. Fachübergreifende Konferenz für Interaktive und Kooperative Medien – Interaktiv unterwegs - Freiräume gestalten; 31. August bis 3. September 2014 in München. Berlin: De Gruyter Oldenbourg 2014 S. 191 - 198


Bertram, Matthias; Schaarschmidt, Mario; von Kortzfleisch, Harald

Kundengetriebene Interaktionen in Software-Customizing Projekten: Erkenntnisse einer multi-methodischen Fallstudie

Dennis Kundisch; Leena Suhl; Lars Beckmann (Hrsg). MKWI 2014: Multikonferenz Wirtschaftsinformatik; 26. - 28. Februar 2014 in Paderborn, Tagungsband. Paderborn: Universität Paderborn 2014 S. 443 - 454


Liebert, Wolf-Andreas; Neuhaus, Stefan; Paulus, Dietrich et al.

Künstliche Menschen: Transgressionen zwischen Körper, Kultur und Technik

Würzburg: Königshausen & Neumann 2014 (Film – Medium – Diskurs. Bd. 59)


Lawonn, Kai; Krone, Michael; Ertl, Thomas et al.

Line Integral Convolution for Real-Time Illustration of Molecular Surface Shape and Salient Regions

Computer Graphics Forum. Bd. 33. H. 3. Oxford: Wiley-Blackwell 2014 S. 181 - 190


Gottron, Thomas; Staab, Steffen

Linked Open Data

Alhajj Reda; Jon Rokne (Hrsg). Encyclopedia of Social Network Analysis and Mining. New York: Springer 2014 S. 811 - 813


Horbach, Matthias; Sofronie-Stokkermans, Viorica

Locality Transfer: From Constrained Axiomatizations to Reachability Predicates

Stéphane Demri; Deepak Kapur; Christoph Weidenbach (Hrsg). Automated Reasoning: 7th International Joint Conference, IJCAR 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 19-22, 2014. Proceedings. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 192 - 207


Gärtner, Stefan; Ruhroth, Thomas; Bürger, Jens et al.

Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge

Tony Gorschek; Robyn Lutz (Hrsg). Proceeding of the 2014 IEEE 22nd International Requirements Engineering Conference RE: August 25-29, 2014; Karlskrona, Sweden. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 103 - 112


Filho, Alberto E. Schaeffer; Smith, Paul; Mauthe, Andreas et al.

Management Patterns for Network Resilience: Design and Verification of Policy Configurations

Clive Blackwell;Hong Zhu (Hrsg). Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Gorgan: Gorgan University of Agricultural Sciences and Natural Resources 2014 S. 85 - 95


Smith, Paul; Filho, Alberto E. Schaeffer; Hutchison, David et al.

Management patterns: SDN-enabled network resilience management

Janusz Filipiak;Doug Zuckerman;Andrzej Pach;Rafal Stankiewicz;Myung-Sup Kim (Hrsg). Proceedings of the IEEE/IFIP Network Operations and Management Symposium NOMS 2014 - Management in a Software defined World: Krakow, Poland, May 5-9, 2014. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2014 S. 1 - 9