Suche
37826 Treffer
×
Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau
×
Universität Koblenz
×
Hochschule für Wirtschaft und Gesellschaft Ludwigshafen
- Pavesic, Nikola; Niemann, Heinrich; Paulus, Dietrich et al.
- 3-D Scene Acquisition, Modeling and Understanding: Proceedings of the Second German-Slovenian Workshop; 9. June 1994; Ljubljana, Slovenia
- Ljubljana: IEEE Slovenia Section 1994
- Wechselberger, Ulrich
- The Eduventure II. An Approach to Educational Game Design
- Tosiyasu Laurence Kunii;Zhigeng Pan;Xiaoyi Jiang;Daniel Thalmann (Hrsg). Proceedings of the 2008 International Conference on Cyberworlds: Hangzhou, China, October 22-24, 2008. Los Alamitos, CA: IEEE Computer Society 2008 S. 397 - 404
- Bahr, Matthias; Dregelyi, Anja
- Reli 7/8 Arbeitshilfen (= Reli. Unterrichtswerk für katholischen Religionsunterricht in der Sekundarstufe I, hg. v. Georg Hilger, Elisabeth Reil; bearb. v. Matthias Bahr, Mirjam Schambeck)
- München: (Kösel) 2003
- Von Kortzfleisch, Harald F. O.
- Wissen schaffen: E-Branding
- BID Betriebs-Informations-Dienst. H. 2. München: BUS Betreuungsverbund für Unternehmer + Selbständige e.V. 2001 S. 10 - 11
- Wimmer, Maria A.; Traunmülller, Roland
- Perspectives e-Government 2020: Results and Conclusions from the EC Roadmap 2020 Project
- B. Solaiman;S. Rifai (Hrsg). Proceeding of the 3rd International Conference on Information & Communication Technologies: from Theory to Applications ICTTA 2008; 7. - 11- April, 2008; Damascus, Syria. Piscataway, NJ: IEEE Computer Society 2008 S. 1 - 10
- Merz, Torsten; Paulus, Dietrich; Niemann, Heinrich
- Feature extraction from interferograms for phase distribution analysis
- Malgorzata Kujawinska;Gordon Brown;Mitsuo Takeda (Hrsg). Laser Interferometry IX: Techniques and Analysis. Bellingham, WA: International Society for Optical Engineering 1998 S. 181 - 191
- Jürjens, Jan
- Model-based Run-time Checking of Security Permissions using Guarded Objects
- Martin Leucker (Hrsg). Runtime Verification: 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers. Berlin: Springer 2008 S. 36 - 50 (Lecture Notes in Computer Science)
- Jürjens, Jan
- Model-Based Run-Time Checking of Security Permissions Using Guarded Objects.
- RV. 2008 S. 36 - 50
- Wilkins, Peter; Byrne, Daragh; Jones, Gareth J. F. et al.
- K-Space at TRECVID 2008
- Paul Over;George Awad;R. Travis Rose;Jonathan G. Fiscus;Wessel Kraaij;Alan F. Smeaton (Hrsg). Proceedings of TREC Video Retrieval Evaluation TRECVID 2008 - workshop participants notebook papers: 17-18 November 2008; Gaithersburg, MD, USA. Gaithersburg, MD: NIST National Institute of Standards and Technology 2008 S. 260 - 269
- Dietze, C.; Hampe, J. F.; Lu, N. et al.
- Knowledge generation and dissemination in virtual teams by using heterogeneous media
- Proceedings of the 5th International Conference on Business Information Systems (BIS-2002). Poznan, Poland. 2002