Christoph Meinel
#97,566
Most Influential Person Now
Historian
Christoph Meinel's AcademicInfluence.com Rankings
Download Badge
History
Why Is Christoph Meinel Influential?
(Suggest an Edit or Addition)Christoph Meinel's Published Works
Published Works
- Deep Learning for Medical Image Analysis (2017) (1294)
- Digital Communication (2014) (558)
- Design Thinking: Understand - Improve - Apply (2010) (318)
- Intrusion Detection in the Cloud (2009) (264)
- Infrastructure as a service security: Challenges and solutions (2010) (243)
- Transforming Constructivist Learning into Action: Design Thinking in Education. (2012) (233)
- Image Captioning with Deep Bidirectional LSTMs (2016) (225)
- Web Search Personalization Via Social Bookmarking and Tagging (2007) (213)
- A Survey on Essential Components of a Self-Sovereign Identity (2018) (196)
- Content Based Lecture Video Retrieval Using Speech and Video Text Information (2014) (188)
- Design Thinking Research (2021) (173)
- Algorithms and Data Structures in VLSI Design: OBDD - Foundations and Applications (2012) (153)
- Model-driven business process security requirement specification (2009) (151)
- Design Thinking: A Fruitful Concept for IT Development? (2011) (146)
- Designing MOOCs for the Support of Multiple Learning Styles (2013) (145)
- Design Thinking: An Educational Model towards Creative Confidence (2010) (139)
- Efficient Boolean Manipulation With OBDD's can be Extended to FBDD's (1994) (124)
- Security Requirements Specification in Service-Oriented Business Process Management (2009) (116)
- A New Alert Correlation Algorithm Based on Attack Graph (2011) (107)
- Structure and Importance of Logspace-MOD-Classes (1991) (99)
- A Conditional Adversarial Network for Semantic Segmentation of Brain Tumor (2017) (93)
- Advanced persistent threats: Behind the scenes (2016) (92)
- Image Captioning with Deep Bidirectional LSTMs and Multi-Task Learning (2018) (91)
- Telling experts from spammers: expertise ranking in folksonomies (2009) (86)
- Towards practical programming exercises and automated assessment in Massive Open Online Courses (2015) (85)
- Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations (2012) (83)
- Early Seventeenth-Century Atomism: Theory, Epistemology, and the Insufficiency of Experiment (1988) (82)
- Punctuation Prediction for Unsegmented Transcript Based on Word Vector (2016) (77)
- Evolving discourses on design thinking: how design cognition inspires meta-disciplinary creative collaboration (2010) (75)
- Structure and importance of logspace-MOD class (1992) (74)
- Modelling Security Goals in Business Processes (2008) (73)
- Towards a Paradigm Shift in Education Practice: Developing Twenty-First Century Skills with Design Thinking (2012) (71)
- Modified Branching Programs and Their Computational Power (1989) (71)
- Elastic VM for Cloud Resources Provisioning Optimization (2011) (69)
- Segmentation and quantification of brain tumor (2004) (67)
- An Extensible and Virtualization-Compatible IDS Management Architecture (2009) (67)
- tele-TASK: teleteaching anywhere solution kit (2002) (66)
- Language Identification Using Deep Convolutional Recurrent Neural Networks (2017) (65)
- Browsing within Lecture Videos Based on the Chain Index of Speech Transcription (2008) (64)
- GRAYSCALE IMAGE MATTING AND COLORIZATION (2004) (63)
- MeliusNet: Can Binary Neural Networks Achieve MobileNet-level Accuracy? (2020) (63)
- STN-OCR: A single Neural Network for Text Detection and Text Recognition (2017) (63)
- Design Thinking: Innovation lernen - Ideenwelten öffnen (2009) (61)
- The Metadata Triumvirate: Social Annotations, Anchor Texts and Search Queries (2008) (59)
- Elastic Virtual Machine for Fine-Grained Cloud Resource Provisioning (2011) (59)
- Improving the Peer Assessment Experience on MOOC Platforms (2016) (58)
- Exploring social annotations for web document classification (2008) (58)
- Speeding up variable reordering of OBDDs (1997) (57)
- Empathy via Design Thinking: Creation of Sense and Knowledge (2015) (55)
- BMXNet: An Open-Source Binary Neural Network Implementation Based on MXNet (2017) (54)
- Tele-Board: Enabling efficient collaboration in digital design spaces (2011) (54)
- Authors vs. readers: a comparative study of document metadata and content in the www (2007) (53)
- SEE: Towards Semi-Supervised End-to-End Scene Text Recognition (2017) (51)
- Linear Sifting Of Decision Diagrams (1997) (50)
- Design Thinking Research: Making Design Thinking Foundational (2015) (49)
- Theory or practice? The eighteenth-century debate on the scientific status of chemistry. (1983) (49)
- Verification of Business Process Entailment Constraints Using SPIN (2009) (49)
- Distributed Trust Management for Validating SLA Choreographies (2010) (48)
- Efficient OBDD-Based Boolean Manipulation in CAD Beyond Current Limits (1995) (47)
- Separating the Eraser Turing Machine Classes L_e, NL_e, co-NL_e and P_e (1991) (47)
- CodeOcean - A versatile platform for practical programming excercises in online environments (2016) (46)
- A deep semantic framework for multimodal representation learning (2016) (46)
- Linear sifting of decision diagrams and its application insynthesis (2000) (46)
- Deep Semantic Mapping for Cross-Modal Retrieval (2015) (46)
- Supporting creative collaboration in globally distributed companies (2013) (45)
- Frontiers of Feasible and Probabilistic Feasible Boolean Manipulation with Branching Programs (1993) (45)
- Back to Simplicity: How to Train Accurate BNNs from Scratch? (2019) (45)
- Separating the Eraser Turing Machine Classes Le, NLe, co-NLe and Pe (1988) (44)
- An approach to capture authorisation requirements in business processes (2010) (44)
- Online assessment for hands-on cyber security training in a virtual lab (2012) (44)
- How Design Thinking Tools Help To Solve Wicked Problems (2014) (43)
- Recurrent generative adversarial network for learning imbalanced medical image semantic segmentation (2019) (43)
- Deriving XACML Policies from Business Process Models (2007) (42)
- Automatic Lecture Video Indexing Using Video OCR Technology (2011) (42)
- Detect Me If You Can: Spam Bot Detection Using Inductive Representation Learning (2019) (41)
- Lecture Video Indexing and Analysis Using Video OCR Technology (2011) (41)
- A Security Meta-model for Service-Oriented Architectures (2009) (41)
- Realistic Simulation of V2X Communication Scenarios (2008) (41)
- SecureSOA Modelling Security Requirements for Service-Oriented Architectures (2010) (41)
- Lecture video segmentation by automatically analyzing the synchronized slides (2013) (40)
- Implement role based access control with attribute certificates (2004) (40)
- Semantic indexing for recorded educational lecture videos (2006) (40)
- Mod-2-OBDDs—A data structure that generalizes EXOR-sum-of-products and ordered binary decision diagrams (1996) (40)
- openHPI: Evolution of a MOOC Platform from LMS to SOA (2013) (39)
- Design Thinking Research: Building Innovation Eco-Systems (2013) (39)
- Design Thinking Research: Building Innovators (2014) (38)
- 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer (2013) (37)
- On the Perception, Adoption and Implementation of Design Thinking in the IT Industry (2012) (37)
- Interrelations between Motivation, Creativity and Emotions in Design Thinking Processes – An Empirical Study Based on Regulatory Focus Theory (2011) (36)
- Task-based entailment constraints for basic workflow patterns (2008) (35)
- Signature Embedding: Writer Independent Offline Signature Verification with Deep Metric Learning (2016) (35)
- Ordered binary decision diagrams (2001) (35)
- Dropout-GAN: Learning from a Dynamic Ensemble of Discriminators (2018) (35)
- Trust Requirements in Identity Federation Topologies (2009) (35)
- Accurate Mutlicore Processor Power Models for Power-Aware Resource Management (2011) (35)
- The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud (2010) (35)
- Tele-lab IT security: an architecture for interactive lessons for security education (2004) (34)
- Sample Method for Minimization of OBDDs (1998) (34)
- Local Encoding Transformations for Optimizing OBDD-Representations of Finite State Machines (1996) (34)
- The Faith-Factor in Design Thinking: Creative Confidence Through Education at the Design Thinking Schools Potsdam and Stanford? (2012) (33)
- Energy efficient scheduling of HPC-jobs on virtualize clusters using host and VM dynamic configuration (2012) (33)
- A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures (2010) (33)
- On the Complexity of Constructing Optimal Ordered Binary Decision Diagrams (1994) (32)
- A Flexible and Efficient Alert Correlation Platform for Distributed IDS (2010) (32)
- A design thinking approach to effective vaccine safety communication. (2015) (32)
- Training Competitive Binary Neural Networks from Scratch (2018) (31)
- BinaryDenseNet: Developing an Architecture for Binary Neural Networks (2019) (31)
- openHPI - A case-study on the emergence of two learning communities (2013) (31)
- Enabling Usage Control through Reputation Objects: A Discussion on e-Commerce and the Internet of Services Environments (2010) (31)
- Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab (2008) (31)
- Molecules and Croquet Balls (2004) (31)
- Student's Perception of a Semantic Search Engine (2005) (30)
- SSAS: A simple secure addressing scheme for IPv6 autoconfiguration (2013) (30)
- "Artibus academicis inserenda" - Chemistry's place in eighteenth and early nineteenth-century universities (1988) (30)
- Theoretical Foundations of Design Thinking (2018) (29)
- Hierarchical object log format for normalisation of security events (2013) (29)
- Contract-based cloud architecture (2010) (29)
- The gamification of a MOOC platform (2017) (29)
- Integrating Continuous Security Assessments in Microservices and Cloud Native Applications (2017) (29)
- Towards Unifying Vulnerability Information for Attack Graph Construction (2009) (29)
- Communication-Aware and Energy-Efficient Scheduling for Parallel Applications in Virtualized Data Centers (2013) (29)
- Measuring the Impact of Design Thinking (2016) (29)
- WinSEND: Windows SEcure Neighbor Discovery (2011) (29)
- T-Cube: A Multimedia Authoring System for eLearning (2003) (28)
- Design Thinking Research: Measuring Performance in Context (2012) (28)
- COLLABORATIVE LEARNING IN A MOOC ENVIRONMENT (2015) (28)
- IMPROVING THE ONBOARDING USER EXPERIENCE IN MOOCS (2014) (27)
- A Tutoring System for IT Security (2003) (26)
- Whole Heart and Great Vessel Segmentation with Context-aware of Generative Adversarial Networks (2018) (26)
- Deep Neural Network with l2-Norm Unit for Brain Lesions Detection (2017) (25)
- A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems (2013) (25)
- Boolean manipulation with free BDD's. First experimental results (1994) (25)
- An Attempt at MOOC Localization for Chinese-Speaking Users (2016) (25)
- openSAP: Evaluating xMOOC Usage and Challenges for Scalable and Open Enterprise Education (2016) (25)
- Using A/B testing in MOOC environments (2016) (24)
- Mapping the Blogosphere--Towards a Universal and Scalable Blog-Crawler (2011) (24)
- On Measuring Expertise in Collaborative Tagging Systems (2009) (24)
- Towards to an automatic semantic annotation for multimedia learning objects (2007) (24)
- Design Thinking in Higher Education: How Students become Dedicated Creative Problem Solvers (2017) (24)
- Does CLIP Benefit Visual Question Answering in the Medical Domain as Much as it Does in the General Domain? (2021) (24)
- A Virtual Laboratory for IT Security Education (2004) (24)
- Some heuristics for generating tree-like FBDD types (1994) (24)
- SPEAR: SPAMMING‐RESISTANT EXPERTISE ANALYSIS AND RANKING IN COLLABORATIVE TAGGING SYSTEMS (2011) (23)
- Stopping time condition for practical IPv6 Cryptographically Generated Addresses (2012) (23)
- MOTIVATING THE MASSES - GAMIFIED MASSIVE OPEN ONLINE COURSES ON OPENHPI (2014) (23)
- Efficient traffic simulator coupling in a distributed V2X simulation environment (2010) (23)
- Enabling reputation interoperability through semantic technologies (2010) (23)
- Tele-Lab "IT-Security" on CD: portable, reliable and safe IT security training (2004) (23)
- Using quantified trust levels to describe authentication requirements in federated identity management (2008) (22)
- How Prototyping Helps to Solve Wicked Problems (2014) (22)
- Collaboration and Teamwork on a MOOC Platform: A Toolset (2017) (22)
- SIMPA: A SIP-Based Mobile Payment Architecture (2008) (22)
- The Power of Polynomial Size Omega-Branching Programs (1988) (22)
- Identifying the top-dogs of the blogosphere (2012) (21)
- p-Projection Reducibility and the Complexity Classes L(nonuniform) and NL(nonuniform) (1996) (21)
- Knowing People: The Empathetic Designer (2012) (21)
- A distributed virtual laboratory architecture for cybersecurity training (2011) (21)
- Segmentation and Annotation of Audiovisual Recordings Based on Automated Speech Recognition (2007) (21)
- Elastic VM for rapid and optimum virtualized resources' allocation (2011) (21)
- Getting More from Reputation Systems: A Context–Aware Reputation Framework Based on Trust Centers and Agent Lists (2008) (21)
- A Security and High-Availability Layer for Cloud Storage (2010) (20)
- Separating complexity classes related to certain input oblivious logarithmic space-bounded Turing machines (1989) (20)
- microbatchGAN: Stimulating Diversity with Multi-Adversarial Discrimination (2020) (20)
- Multicore-based auto-scaling SEcure Neighbor Discovery for Windows operating systems (2012) (20)
- Global rebuilding of OBDDs Avoiding Memory Requirement Maxima (1995) (20)
- A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control (2009) (20)
- Current State of ICT in Healthcare Delivery in Developing Countries (2019) (20)
- Compression of Medical Images (1999) (19)
- The Electronic Colloquium on Computational Complexity (ECCC): A Digital Library in Use (1997) (19)
- Identifying Suspicious User Behavior with Neural Networks (2017) (19)
- Implementation of a secure and reliable storage above the untrusted clouds (2013) (19)
- Conditional Generative Refinement Adversarial Networks for Unbalanced Medical Image Semantic Segmentation (2018) (19)
- The Co-evolution of Theory and Practice in Design Thinking – or – “Mind the Oddness Trap!” (2011) (19)
- Constructing a Context-Aware Service-Oriented Reputation Model Using Attention Allocation Points (2009) (19)
- Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems (2013) (19)
- On relations between counting communication complexity classes (2004) (18)
- Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches (2012) (18)
- Polynomial Size Omega-Branching Programs and Their Computational Power (1990) (18)
- Conditional Generative Adversarial Refinement Networks for Unbalanced Medical Image Semantic Segmentation (2019) (18)
- Message capturing as a paradigm for asynchronous digital whiteboard interaction (2010) (18)
- Instance Tumor Segmentation using Multitask Convolutional Neural Network (2018) (18)
- Ensuring patients' privacy in a cryptographic-based-electronic health records using bio-cryptography (2017) (18)
- Introducing hands-on experience to a Massive Open Online Course on openHPI (2013) (18)
- Processing Over Encrypted Data: Between Theory and Practice (2016) (17)
- MeliusNet: An Improved Network Architecture for Binary Neural Networks (2021) (17)
- Sentence Boundary Detection Based on Parallel Lexical and Acoustic Models (2016) (17)
- Looking Further: Design Thinking Beyond Solution-Fixation (2018) (17)
- CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure (2020) (17)
- High-quality attack graph-based IDS correlation (2013) (17)
- Implementation and Evaluation of Digital E-Lecture Annotation in Learning Groups to Foster Active Learning (2015) (17)
- IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability (2012) (17)
- Reine und angewandte Chemie Die Entstehung einer neuen Wissenschaftskonzeption in der Chemie der Aufklärung (1985) (17)
- Manifesto: Design Thinking Becomes Foundational (2016) (17)
- Virtual machine management for Tele-Lab "IT-security" server (2005) (17)
- Semantic Composition of Lecture Subparts for a Personalized e-Learning (2007) (17)
- Teleteaching anywhere solution kit (Tele-TASK) goes mobile (2007) (17)
- Resolving Ambiguities in the Semantic Interpretation of Natural Language Questions (2006) (17)
- A simple solution for an intelligent librarian system (2005) (16)
- Mapping the Blogosphere with RSS-Feeds (2010) (16)
- Using vulnerability information and attack graphs for intrusion detection (2010) (16)
- voxel-GAN: Adversarial Framework for Learning Imbalanced Brain Tumor Segmentation (2018) (16)
- Why HTTPS Is Not Enough -- A Signature-Based Architecture for Trusted Content on the Social Web (2007) (16)
- Exploring multimodal video representation for action recognition (2016) (16)
- Automatic Vulnerability Classification Using Machine Learning (2017) (16)
- Multiple Virtual Machines Live Migration Performance Modelling -- VMware vMotion Based Study (2016) (16)
- Studying co-creation in practice (2012) (16)
- Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science (2007) (16)
- MalRank: a measure of maliciousness in SIEM-based knowledge graphs (2019) (16)
- Towards a system for complex analysis of security events in large-scale networks (2017) (16)
- Robust Virtual Machine Consolidation for Efficient Energy and Performance in Virtualized Data Centers (2014) (16)
- Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining (2004) (16)
- August Wilhelm Hofmann – „Regierender Oberchemiker”︁ (1992) (16)
- Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds (2013) (16)
- Proposal for a combination of compression and encryption (2000) (16)
- Secure access control for multi-cloud resources (2015) (16)
- KISS: Keeping It Simple for Scene Text Recognition (2019) (16)
- Live Migration Impact on Virtual Datacenter Performance: Vmware vMotion Based Study (2014) (15)
- Die Alchemie in der europäischen Kultur- und Wissenschaftsgeschichte (1986) (15)
- Analysis and Manipulation of Boolean Functions in Terms of Decision Graphs (1992) (15)
- Multi-step Attack Pattern Detection on Normalized Event Logs (2015) (15)
- Applying Erasure Codes for Fault Tolerance in Cloud-RAID (2013) (15)
- A Comparative Analysis of Trust Requirements in Decentralized Identity Management (2019) (15)
- A Quantifiable Trust Model for Blockchain-Based Identity Management (2018) (15)
- Team and Task Based RBAC Access Control Model (2007) (15)
- Towards Semantic Event-Driven Systems (2009) (14)
- DICOM-image compression (1999) (14)
- If You Want to Know Who You Are, Tell Me Where You Are: The Importance of Places (2012) (14)
- Course management in the twinkle of an eye - LCMS: a professional course management system (2002) (14)
- Automatic Online Lecture Highlighting Based on Multimedia Analysis (2018) (14)
- HPISecure: Towards Data Confidentiality in Cloud Applications (2013) (14)
- MOOC TO GO (2014) (14)
- SUPPORTING SOCIAL INTERACTION AND COLLABORATION ON AN XMOOC PLATFORM (2014) (14)
- A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration (2013) (14)
- The virtual tele-tASK professor: semantic search in recorded lectures (2007) (14)
- Design Thinking Research. Understanding Innovation (2014) (14)
- Streamlined orchestration: An orchestration workbench framework for effective teaching (2016) (14)
- Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications (2017) (14)
- Access Control for Cross-Organisational Web Service Composition (2008) (13)
- Graded Team Assignments in MOOCs: Effects of Team Composition and Further Factors on Team Dropout Rates and Performance (2019) (13)
- Analysis of Publicly Leaked Credentials and the Long Story of Password ( Re-) use (2016) (13)
- Lecture Video Browsing Using Multimodal Information Resources (2013) (13)
- Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds (2013) (13)
- Gathering and Analyzing Identity Leaks for Security Awareness (2014) (13)
- Real-time clustering of massive geodata for online maps to improve visual analysis (2015) (13)
- An Automated Analysis and Indexing Framework for Lecture Video Portal (2012) (13)
- Enabling Schema Agnostic Learning Analytics in a Service-Oriented MOOC Platform (2016) (13)
- An Advanced IDS Management Architecture (2009) (13)
- Measuring Expertise in Online Communities (2011) (13)
- Next Generation Tele-Teaching: Latest Recording Technology, User Engagement and Automatic Metadata Retrieval (2013) (13)
- Blockchain: Hype oder Innovation (2020) (13)
- An Integration Architecture to Enable Service Providers for Self-sovereign Identity (2019) (13)
- August Wilhelm Hofmann—“Reigning Chemist-in-Chief”† (1992) (13)
- Taking Trust Management to the Next Level (2010) (13)
- Teaching with information and communication technologies: preliminary results of a large scale survey (2009) (12)
- Question answering from lecture videos based on an automatic semantic annotation (2008) (12)
- Globalized Design Thinking: Bridging the Gap Between Analog and Digital for Browser-Based Remote Collaboration (2016) (12)
- Team based assignments in MOOCs: results and observations (2018) (12)
- Identifying Audience Attributes: Predicting Age, Gender and Personality for Enhanced Article Writing (2017) (12)
- Generative synthetic adversarial network for internal bias correction and handling class imbalance problem in medical image diagnosis (2020) (12)
- German Speech Recognition: A Solution for the Analysis and Processing of Lecture Recordings (2011) (12)
- openHPI: Soziales und Praktisches Lernen im Kontext eines MOOC (2013) (12)
- A message meta model for federated authentication in service-oriented architectures (2009) (12)
- WWW - Kommunikation, Internetworking, Web-Technologien (2003) (12)
- Tele-Board: Follow the Traces of Your Design Process History (2012) (12)
- Tele-lab IT security: a means to build security laboratories on the Web (2004) (12)
- Full-body WebRTC video conferencing in a web-based real-time collaboration system (2016) (12)
- Continuous auditing and threat detection in multi-cloud infrastructure (2020) (12)
- Scaling youth development training in IT using an xMOOC platform (2015) (12)
- Encouraging Participation in Virtual Communities: The "IT-summit-blog" Case (2007) (12)
- Zur Sozialgeschichte des chemischen Hochschulfaches im 18. Jahrhundert (1987) (12)
- Increasing Spot Instances Reliability Using Dynamic Scalability (2012) (12)
- Patterns to explore cognitive preferences and potential collective intelligence empathy for processing knowledge in virtual settings (2015) (12)
- Countering Three Denial-of-Sleep Attacks on ContikiMAC (2017) (12)
- Lightweight ad hoc assessment of practical programming skills at scale (2014) (12)
- On the Acceptance and Usefulness of Personalized Learning Objectives in MOOCs (2019) (12)
- Pushing the Limits of Cyber Threat Intelligence: Extending STIX to Support Complex Patterns (2016) (12)
- Attack Scenario Prediction Methodology (2013) (12)
- Algebraic and topological properties of finite partially ordered sets (1988) (12)
- Segmentation of Lecture Videos Based on Spontaneous Speech Recognition (2008) (11)
- Branching Programs - An Efficient Data Structure for Computer-Aided Circuit Design (1992) (11)
- CS-CGA: Compact and more Secure CGA (2011) (11)
- Enhance learning in a video lecture archive with annotations (2018) (11)
- Towards a Better Understanding of Mobile Learning in MOOCs (2018) (11)
- Learning to Train a Binary Neural Network (2018) (11)
- Enzyklopädie der Welt und Verzettelung des Wissens: Aporien der Empirie bei Joachim Jungius (1995) (11)
- Better results in mathematics lessons with a virtual personal teacher (2006) (11)
- Normalizing Security Events with a Hierarchical Knowledge Base (2015) (11)
- Ordered Binary Decision Diagrams and their Significance in Computer-Aided Design of VLSI Circuits (1999) (11)
- TOWARDS SOCIAL GAMIFICATION - IMPLEMENTING A SOCIAL GRAPH IN AN XMOOC PLATFORM (2014) (11)
- Semantic Interpretation of Natural Language User Input to Improve Search in Multimedia Knowledge Base (Semantische Interpretation einer Benutzer-Eingabe in natürlicher Sprache für eine verbesserte Suche in einer multimedialen Wissensdatenbank) (2007) (11)
- A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes (2012) (11)
- Handling Reboots and Mobility in 802.15.4 Security (2015) (11)
- A Journey of Bounty Hunters: Analyzing the Influence of Reward Systems on StackOverflow Question Response Times (2016) (11)
- Towards cross-platform collaboration - Transferring real-time groupware to the browser (2013) (11)
- STACS 99 (2002) (11)
- Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids (2015) (11)
- Can Software Developers Use Linked Data Vocabulary? (2009) (11)
- A pattern-driven security advisor for service-oriented architectures (2009) (11)
- Towards Secure Mobile Payment Based on SIP (2008) (11)
- Blogosphere and its Exploration (2015) (10)
- Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims (2009) (10)
- Implementation of a WebDAV-based collaborative distance learning environment (2000) (10)
- IPv6 Deployment and Spam Challenges (2012) (10)
- Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids (2015) (10)
- Analysis and Simulation of HPC Applications in Virtualized Data Centers (2012) (10)
- Internet-orientated medical information system for DICOM-data transfer, visualization and revision (2000) (10)
- Personality Exploration System for Online Social Networks: Facebook Brands As a Use Case (2018) (10)
- One Model to Reconstruct Them All: A Novel Way to Use the Stochastic Noise in StyleGAN (2020) (10)
- A Virtual Social Learner Community—Constitutive Element of MOOCs (2016) (10)
- Enhancing a virtual security lab with a private cloud framework (2013) (10)
- Role-based access control in online authoring and publishing systems vs. document hierarchy (1999) (10)
- Implementing IDS Management on Lock-Keeper (2009) (10)
- Improving V2X simulation performance with optimistic synchronization (2009) (10)
- Tele-Board: Enabling Efficient Collaboration In Digital Design Spaces Across Time and Distance (2011) (10)
- Separating Counting Communication Complexity Classes (1992) (10)
- Internetworking - Technological Foundations and Applications (2013) (10)
- Automatic Lecture Subtitle Generation and How It Helps (2017) (10)
- Design Pattern for Object Triple Mapping (2009) (10)
- User Centricity in Healthcare Infrastructures (2007) (10)
- The Smart Data Server: A New Kind of Middle-Tier (1999) (10)
- Generative multi-adversarial network for striking the right balance in abdominal image segmentation (2020) (10)
- A Container-Based Virtual Laboratory for Internet Security e-Learning (2016) (10)
- Towards Personalized Learning Objectives in MOOCs (2018) (10)
- Speeding up symbolic model checking by accelerating dynamic variable reordering (2000) (10)
- Automated Extraction of Lecture Outlines from Lecture Videos - A Hybrid Solution for Lecture Video Indexing (2012) (10)
- Branching Programs Provide Lower Bounds on the Areas of Multilective Deterministic and Nondeterministic VLSI-Circuits (1992) (10)
- Dynamic scalability and contention prediction in public infrastructure using Internet application profiling (2012) (10)
- Digitale Kommunikation - Vernetzen, Multimedia, Sicherheit (2009) (10)
- On the Complexity of Analysis and Manipulation of Boolean Functions in Terms of Decision Graphs (1994) (9)
- Automated parsing and interpretation of identity leaks (2016) (9)
- A Smart Micro-Grid Architecture for Resource Constrained Environments (2017) (9)
- Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour (2015) (9)
- Collaborative Learning in MOOCs Approaches and Experiments (2018) (9)
- Can MOOCs Support Secondary Education in Computer Science (2016) (9)
- Why rating is not enough: A study on online reputation systems (2011) (9)
- SEcure Neighbor Discovery: A Cryptographic Solution for Securing IPv6 Local Link Operations (2013) (9)
- Automated k-Anonymization and l-Diversity for Shared Data Privacy (2016) (9)
- Generative Adversarial Framework for Learning Multiple Clinical Tasks (2018) (9)
- Privacy and security in IPv6 networks: challenges and possible solutions (2013) (9)
- Speeding Up Image Computation by Using RTL Information (2000) (9)
- Building a Scalable Collaborative Web Filter with Free and Open Source Software (2008) (9)
- An Approach to Distributed Functionality - The Smart Data Server (1999) (9)
- Multi-Task Generative Adversarial Network for Handling Imbalanced Clinical Data (2018) (9)
- Introducing digital game-based learning in MOOCs: What do the learners want and need? (2017) (9)
- “… to make Chemistry more Applicable and Generally Beneficial”—The Transition in Scientific Perspective in Eighteenth Century Chemistry (1984) (9)
- Visualizing Blog Archives to Explore Content- and Context-Related Interdependencies (2010) (9)
- EXPLORING THE SYNTHESIS OF INFORMATION IN DESIGN PROCESSES – OPENING THE BLACK-BOX (2011) (9)
- Web Page Classification: An Exploratory Study of the Usage of Internet Content Rating Systems (2005) (9)
- An Attribute Assurance Framework to Define and Match Trust in Identity Attributes (2011) (9)
- Segmenting of Recorded Lecture Videos - The Algorithm VoiceSeg (2016) (9)
- openHPI – Das MOOC-Angebot des Hasso-Plattner-Instituts (2017) (9)
- Key Management for Secure Demand Data Communication in Constrained Micro-Grids (2016) (9)
- SignedQuery: Protecting users data in multi-tenant SaaS environments (2013) (9)
- Awareness Creation mit Tele-Lab IT-Security: Praktisches Sicherheitstraining im virtuellen Labor am Beispiel Trojanischer Pferde (2008) (9)
- Application of quantitative security metrics in cloud computing (2015) (9)
- Efficient Analysis and Manipulation of OBDDs can be Extended to Read-once-only Branching Programs (1992) (9)
- A Hybrid Machine Learning Method for Intrusion Detection (2016) (9)
- Reward-based Intermittent Reinforcement in Gamification for E-learning (2015) (9)
- Parts without a whole (2015) (9)
- Karl Friedrich Zöllner und die Wissenschaftskultur der Gründerzeit: eine Fallstudie zur Genese konservativer Zivilisationskritik (1991) (8)
- On the Relevance of Blockchain in Identity Management (2018) (8)
- Information Security in Diverse Computing Environments (2014) (8)
- Efficient Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems (2011) (8)
- Spurring Design Thinking through Educational Weblogging (2009) (8)
- Mod-p decision diagrams: a data structure for multiple-valued functions (2000) (8)
- Towards Context-Aware Service-Oriented Semantic Reputation Framework (2011) (8)
- From Reputation Models and Systems to Reputation Ontologies (2011) (8)
- Automatic Treatment Session Summaries in Psychotherapy - A Step towards Therapist-Patient Cooperation (2015) (8)
- Implementing a Culture of Participation as Means for Collaboration in Tele-Teaching Using the Example of Cooperative Video Annotation (2012) (8)
- Team-Based Assignments in MOOCs - User Feedback (2018) (8)
- Separating Completely Complexity Classes Related to Polynomial Size Omega-Decision Trees (1989) (8)
- Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts (2016) (8)
- Digital Collaboration with a Whiteboard in Virtual Reality (2018) (8)
- K-terminal Network Reliability Evaluation Using Binary Decision Diagram (2008) (8)
- SecPlace: A Security-Aware Placement Model for Multi-tenant SaaS Environments (2014) (8)
- Design Thinking: Zur Entwicklung eines exporativen Forschungsansatzes zu einem überprofessioinellen Modell (2009) (8)
- Tele-Board in Use: Applying a Digital Whiteboard System in Different Situations and Setups (2012) (8)
- Density and Intensity-Based Spatiotemporal Clustering with Fixed Distance and Time Radius (2017) (8)
- Scalable Inclusion Dependency Discovery (2015) (8)
- Embedding Memoization to the Semantic Tree Search for Deciding QBFs (2004) (8)
- Can VoIP Live up to the QoS Standards of Traditional Wireline Telephony? (2008) (8)
- BoolNet: Minimizing The Energy Consumption of Binary Neural Networks (2021) (8)
- Mobile Web Usability Evaluation - Combining the Modified Think Aloud Method with the Testing of Emotional, Cognitive and Conative Aspects of the Usage of a Web Application (2010) (8)
- A Short Theory of Failure (2017) (8)
- An Integrated Network Scanning Tool for Attack Graph Construction (2011) (8)
- Remodeling Vulnerability Information (2009) (8)
- Design Thinking: An Educational Model (2010) (8)
- Putting Design Thinking to Work: How Large Organizations Can Embrace Messy Institutions to Tackle Wicked Problems (2019) (8)
- Binary Decision Diagrams and the Multiple Variable Order Problem (1998) (8)
- The Automated Generation and Further Application of Tree-Structure Outline for Lecture Videos with Synchronized Slides (2014) (8)
- Algorithmen und Datenstrukturen im VLSI-Design: OBDD - Grundlagen und Anwendungen (1998) (8)
- Transformation and Aggregation of Web Service Security Requirements (2010) (8)
- Supporting Object-Oriented Programming of Semantic-Web Software (2012) (8)
- Unified Cloud Access Control Model for Cloud Storage Broker (2019) (7)
- Towards a repository for open auto-gradable programming exercises (2017) (7)
- On the Influence of the State Encoding on OBDD-Representations of Finite State Machines (1997) (7)
- Empirical Support for the Corpuscular Theory in the Seventeenth Century (1988) (7)
- ATIB: Design and Evaluation of an Architecture for Brokered Self-Sovereign Identity Integration and Trust-Enhancing Attribute Aggregation for Service Provider (2021) (7)
- PACS for teleradiology (1999) (7)
- Design Thinking At Scale: A Report on Best Practices of Online Courses (2016) (7)
- Function decomposition and synthesis using linear sifting (1998) (7)
- Hot spot detection — An interactive cluster heat map for sentiment analysis (2015) (7)
- FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication (2020) (7)
- Electronic colloquia: idea and practice (1998) (7)
- Asynchronous understanding of creative sessions using archived collaboration artifacts (2014) (7)
- Implementation of an enterprise-level groupware system based on J2EE platform and WebDAV protocol (2000) (7)
- OVERCOMING TECHNICAL FRUSTATIONS IN DISTANCE EDUCATION: TELE-TASK* (2003) (7)
- Analyzing distributed whiteboard interactions (2011) (7)
- Construction of Agent-Based Trust in Cloud Infrastructure (2014) (7)
- IPv 6 Stateless Address Autoconfiguration : Balancing between Security , Privacy and Usability Conference (2012) (7)
- OpenWHO: Integrating Online Knowledge Transfer into Health Emergency Response (2018) (7)
- The “log rank” conjecture for modular communication complexity (1996) (7)
- Detecting Maximum Inclusion Dependencies without Candidate Generation (2016) (7)
- A Semi-Random Prediction Scenario for User Requests (1999) (7)
- Towards Cloud-Aware Vulnerability Assessments (2015) (7)
- Tele-Board MED: Supporting Twenty-First Century Medicine for Mutual Benefit (2015) (7)
- Semantic Web Admission Free - Obtaining RDF and OWL Data from Application Source Code (2008) (7)
- Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL) (2019) (7)
- Unified logging system for monitoring multiple cloud storage providers in cloud storage broker (2018) (7)
- Theoretical Foundations of Design Thinking Part I: John E. Arnold’s Creative Thinking Theories (2018) (7)
- A Unifying Theoretical Background for Some Bdd-based Data Structures (1997) (7)
- Evaluation of in‐memory storage engine for machine learning analysis of security events (2017) (7)
- Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage (2017) (7)
- An Improved System For Real-Time Scene Text Recognition (2015) (7)
- Das letzte Blatt im Buch der Natur . Die Wirklichkeit der Atome und die Antinomie der Anschauung in den Korpuskulartheorien der frühen Neuzeit (1988) (7)
- A framework for supporting distributed access control policies (2005) (7)
- Automatic vulnerability detection for weakness visualization and advisory creation (2015) (7)
- Machine Learning Approach for Live Migration Cost Prediction in VMware Environments (2019) (7)
- Hierarchical image computation with dynamic conjunction scheduling (2001) (7)
- Applied Mobile-Assisted Seamless Learning Techniques in MOOCs (2019) (7)
- A new partitioning scheme for improvement of image computation (2001) (7)
- Mod-2-OBDD's: A Generalization of OBDD's and EXOR-Sum-of-Products (1993) (6)
- Thisisdesignthinking.net: A Storytelling-Project (2016) (6)
- A flexible framework for detecting IPv6 vulnerabilities (2013) (6)
- E-Prescription in Nigeria: A Survey (2019) (6)
- Patient-Provider Teamwork via Cooperative Note Taking on Tele-Board MED (2016) (6)
- Brain Abnormality Detection by Deep Convolutional Neural Network (2017) (6)
- An alert correlation platform for memory‐supported techniques (2012) (6)
- Realistic Simulation of V 2 X Communication Scenarios (2011) (6)
- CGA integration into IPsec/IKEv2 authentication (2013) (6)
- Mark-Evaluate: Assessing Language Generation using Population Estimation Methods (2020) (6)
- Managing Distributed Personal Firewalls with Smart Data Servers (2001) (6)
- A simple application of description logics for a semantic search engine (2005) (6)
- A security laboratory for CTF scenarios and teaching IDS (2010) (6)
- Accelerate the detection of trends by using sentiment analysis within the blogosphere (2014) (6)
- Blog, Forum or Newspaper? Web Genre Detection Using SVMs (2015) (6)
- Secure Communication Using Identity Based Encryption (2010) (6)
- A Framework for Migrating Traditional Web Applications Into Multi-Tenant SaaS (2012) (6)
- What Can Design Thinking Learn from Behavior Group Therapy (2012) (6)
- Handwriting recognition for a digital whiteboard collaboration platform (2012) (6)
- Holistic Strategy-Based Threat Model for Organizations (2019) (6)
- High-Speed Security Analytics Powered by In-Memory Machine Learning Engine (2015) (6)
- Identify Emergent Trends Based on the Blogosphere (2013) (6)
- Bessere Schulnoten mit MatES, dem e-Bibliothekardienst für den Mathematikunterricht (2007) (6)
- Cellular Automata as basis for programming exercises in a MOOC on Test Driven Development (2016) (6)
- Smart Documentation with Tele-Board MED (2016) (6)
- Utilizing Web Analytics in the Context of Learning Analytics for Large-Scale Online Learning (2019) (6)
- Introduction – Design Thinking Is Mainly About Building Innovators (2015) (6)
- Visualization and analysis of public social geodata to provide situational awareness (2016) (6)
- SOA Security - Secure Cross-Organizational Service Composition (2011) (6)
- Plattform zur Bereitstellung sicherer und hochverfügbarer Speicherressourcen in der Cloud (2011) (6)
- Applications of description logics to improve multimedia information retrieval for efficient educational tools (2008) (6)
- SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems (2019) (6)
- Securing Cloud Storage Brokerage Systems Through Threat Models (2018) (6)
- Incremental Discovery of Inclusion Dependencies (2017) (6)
- Global rebuilding of OBDD's avoiding memory requirement maxima (1996) (6)
- Moving Sensitive Data Against Live Memory Dumping, Spectre and Meltdown Attacks (2018) (6)
- Design and Anatomy of a Social Web Filtering Service (2008) (6)
- Detecting the Changes ofWeb Students' Learning Interest (2007) (6)
- ADVANCES IN TECHNOLOGY-BASED EDUCATION: TOWARDS A KNOWLEDGE BASED SOCIETY (2003) (6)
- Teaching in the Cyber-Age: Technologies, Experiments, and Realizations (2005) (6)
- TeamS at VQA-Med 2021: BBN-Orchestra for Long-tailed Medical Visual Question Answering (2021) (6)
- Supporting talk-based mental health interventions with digital whiteboards (2014) (6)
- Establishing an Expandable Architecture for a Tele-teaching Portal (2010) (6)
- Switching Graphs and Their Complexity (1989) (6)
- Beware of SMOMBIES: Verification of Users Based on Activities While Walking (2018) (6)
- Security Event Correlation Supported by Multi-Core Architecture (2013) (6)
- MOOCs in Secondary Education - Experiments and Observations from German Classrooms (2019) (6)
- Recommendations for Medical Treatment Processes: The PIGS Approach (2014) (6)
- Security Chaos Engineering for Cloud Services: Work In Progress (2019) (6)
- E-Librarian Service - User-Friendly Semantic Search in Digital Libraries (2011) (6)
- Guilt-by-Association: Detecting Malicious Entities via Graph Mining (2017) (6)
- Lernortkooperation in der IT-Ausbildung - Kompetenzentwicklung in Projekten (2007) (6)
- A Proposal for Trust Model: Independent Trust Intermediary Service (ITIS) (2002) (6)
- OPTIMIZING THE VIDEO EXPERIENCE IN MOOCS (2015) (6)
- Simulation user behavior on a security testbed using user behavior states graph (2015) (6)
- AN APPLICATION OF SEMANTICS FOR AN EDUCATIONAL TOOL (2004) (6)
- The DT MOOC Prototype: Towards Teaching Design Thinking at Scale (2018) (6)
- CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era (2018) (6)
- Adaptive E-Lecture Video Outline Extraction Based on Slides Analysis (2015) (6)
- Securing E-Prescription from Medical Identity Theft Using Steganography and Antiphishing Techniques (2017) (6)
- Who Reads and Writes the Social Web? A Security Architecture for Web 2.0 Applications (2008) (6)
- Analysis of data from the Twitter account of the Berlin Police for public safety awareness (2017) (5)
- Improved e-learning experience with embedded LED system (2016) (5)
- Parallel and distributed normalization of security events for instant attack analysis (2015) (5)
- Chemische Laboratorien: Funktion und Disposition (2000) (5)
- Analysis of the Value of Public Geotagged Data from Twitter from the Perspective of Providing Situational Awareness (2016) (5)
- Linking Tele-TASK Video Portal to the Semantic Web (2009) (5)
- Improving XOR-Node Placement for (+)-OBDDs (2001) (5)
- Design Thinking (2016) (5)
- Automatic Extraction of Semantic Descriptions from the Lecturer's Speech (2009) (5)
- Reviving the Innovative Process of Design Thinking (2011) (5)
- Best Student Forcing: A Simple Training Mechanism in Adversarial Language Generation (2020) (5)
- Malicious Behaviour Identification in Online Social Networks (2018) (5)
- A proposed framework for proactive vulnerability assessments in cloud deployments (2015) (5)
- Hybrid Framework for Medical Image Segmentation (2005) (5)
- An e-Librarian Service – Natural Language Interface for an Efficient Semantic Search within Multimedia Resources (2006) (5)
- From MOOCs to Micro Learning Activities (2019) (5)
- Introduction: The HPI-Stanford Design Thinking Research Program (2016) (5)
- International Edition in English (2003) (5)
- The Future of Teleteaching in MOOC Times (2014) (5)
- Action Recognition in Surveillance Video Using ConvNets and Motion History Image (2016) (5)
- How To Simplify Building Semantic Web Applications (2009) (5)
- Design Thinking: Expectations from a Management Perspective (2014) (5)
- CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems (2018) (5)
- Concept for a security investigation framework (2015) (5)
- Algorithmen und Datenstrukturen im VLSI-Design (1998) (5)
- New Ways of Data Entry in Doctor-Patient Encounters (2018) (5)
- Mining the Students' Learning Interest in Browsing Web-Streaming Lectures (2007) (5)
- Towards Automatic Personality Prediction Using Facebook Likes Metadata (2019) (5)
- Students' Achievement of Personalized Learning Objectives in MOOCs (2020) (5)
- SceneTextReg: A Real-Time Video OCR System (2016) (5)
- Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance (2019) (5)
- Towards the Aggregation of Security Requirements in Cross-Organisational Service Compositions (2008) (5)
- A variant of genetic algorithm for non-homogeneous population (2017) (5)
- De praestantia et utilitate Chemiae: Selbstdarstellung einer jungen Disziplin im Spiegel ihres programmatischen Schrifttums (1981) (5)
- Xor-OBDDs - a BDD Structure for Probabilistic Verification (1998) (5)
- Modeling of time and document aging for request prediction—one step further (2000) (5)
- Lock-Keeper: A New Implementation of Physical Separation Technology (2006) (5)
- Automatic multi-step signature derivation from taint graphs (2016) (5)
- Mathematische Grundlagen der Informatik (2002) (5)
- Traversal-Free Word Vector Evaluation in Analogy Space (2017) (5)
- Upper and Lower Bounds for Certain Graph Accessibility Problems on Bounded Alternating omega-Branching Programs (1993) (5)
- Introduction: Reflections on Working Together—Through and Beyond Design Thinking (2018) (5)
- Separating the eraser Turing machine classes I+, NIL,, co-N!+_ and P, (1991) (5)
- A Framework for Cross-Institutional Authentication and Authorisation (2005) (5)
- Handling re-grading of automatically graded assignments in MOOCs (2014) (5)
- POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames (2016) (5)
- Reliable Approach to Sell the Spare Capacity in the Cloud (2012) (5)
- Application driven variable reordering and an example implementation in reachability analysis (1999) (5)
- Security in Tele-Lab — Protecting an online virtual lab for security training (2009) (5)
- Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization (2019) (4)
- Authorship Verification on Short Text Samples Using Stylometric Embeddings (2018) (4)
- Improving access to online lecture videos (2018) (4)
- On the Acceptance and Effects of Recapping Self-Test Questions in MOOCs (2020) (4)
- -obdds -a Bdd Structure for Probabilistic Veriication (1998) (4)
- The Power of Nondeterminism in Polynominal-size Bounded-width Branching Programs (1987) (4)
- Semantic Layer Architecture for an Educational Expert System in Computer History (4)
- Ordered Binary Decision Diagrams in Electronic Design Automation (2002) (4)
- Pedagogical Evaluation of the Design Thinking MOOCs (2015) (4)
- The Power of Nondeterminism in Polynomial-Size Bounded-Width Branching Programs (1988) (4)
- Improving learner experience and participation in MOOCs: A design thinking approach (2019) (4)
- A verification mechanism for cloud brokerage system (2015) (4)
- A concept to analyze user navigation behavior inside a recorded lecture (to identify difficult spots) (2014) (4)
- Clustering Heuristics for Efficient t-closeness Anonymisation (2017) (4)
- DNS Update Extension to IPv6 Secure Addressing (2013) (4)
- A robust optimization for proactive energy management in virtualized data centers (2013) (4)
- Logging and signing document-transfers on the WWW-a trusted third party gateway (2000) (4)
- Question Answering from Lecture Videos Based on Automatically-Generated Learning Objects (2008) (4)
- Coordinating VMs' Memory Demand Heterogeneity and Memory DVFS for Energy-Efficient VMs Consolidation (2014) (4)
- Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes (2015) (4)
- Event attribute tainting: A new approach for attack tracing and event correlation (2016) (4)
- Mining the Boundaries of Social Networks: Crawling Facebook and Twitter for BlogIntelligence (2013) (4)
- Automatic detection of vulnerabilities for advanced security analytics (2015) (4)
- Deployment of Virtual Machines in Lock-Keeper (2006) (4)
- The flood-gate principle - a hybrid approach to a high security solution (1998) (4)
- Tracing the Provenance of Object-Oriented Computations on RDF Data (2010) (4)
- Supporting the synthesis of information in design teams (2014) (4)
- IMPROVING COLLABORATIVE LEARNING WITH VIDEO LECTURES (2016) (4)
- Natural Language Processing (2011) (4)
- Team Placement in Crowd-Resourcing Virtual Laboratory for IT Security e-Learning (2017) (4)
- Assessing Image and Text Generation with Topological Analysis and Fuzzy Logic (2021) (4)
- Implementing a Corporate Weblog for SAP (2008) (4)
- CROWDSOURCING VIRTUAL LABORATORY ARCHITECTURE ON HYBRID CLOUD (2016) (4)
- A transformation approach for security enhanced business processes (2008) (4)
- Offline-enabled web-based E-leaming for improved user experience in Africa (2017) (4)
- Techniques for Securing Networks Against Criminal Attacks (2000) (4)
- Evaluating an instant messaging protocol for digital whiteboard applications (2011) (4)
- Embedded smart home — remote lab MOOC with optional real hardware experience for over 4000 students (2018) (4)
- Incrementally updating unary inclusion dependencies in dynamic data (2018) (4)
- Sentence-Level Automatic Lecture Highlighting Based on Acoustic Analysis (2016) (4)
- State Encodings and OBDD-Sizes (1996) (4)
- Implementation of Data Security Requirements in a Web-based Application for Interactive Medical Documentation (2015) (4)
- The Importance of Plane Labyrinths (1982) (4)
- OPTIMIZING REQUESTS FOR THE SMART DATA SERVER (2000) (4)
- Transferring traditional design work to the digital world - does it work? (2012) (4)
- Early Detection of Acute Kidney Injury with Bayesian Networks (2016) (4)
- Tele-Board Prototyper - Distributed 3D Modeling in a Web-Based Real-Time Collaboration System (2016) (4)
- Challenges and Solutions for DNS Security in IPv6 (2014) (4)
- Supporting Multi-Device E-Learning Patterns with Second Screen Mobile Applications (2017) (4)
- Discovering Characteristic Individual Accessing Behaviors in Web Environment (2005) (4)
- Real-Time Action Recognition in Surveillance Videos Using ConvNets (2016) (4)
- Scrutinizing the State of Cloud Storage with Cloud-RAID: A Secure and Reliable Storage Above the Clouds (2013) (4)
- Secure self-seeding with power-up SRAM states (2017) (4)
- e-Government and Security Evaluation Tools Comparison for Indonesian e-Government System (2016) (4)
- What Do Hyperlink-Proposals and Request-Prediction Have in Common? (2000) (4)
- Automatic Interpretation of Natural Language for a Multimedia E-learning Tool (2004) (4)
- Cross-platform personality exploration system for online social networks: Facebook vs. Twitter (2020) (4)
- Facial-Based Personality Prediction Models for Estimating Individuals Private Traits (2019) (4)
- Improving the Efficiency of Inclusion Dependency Detection (2018) (4)
- Control for Cross-Organisational Web Service Composition (2007) (4)
- Enhance embedded system E-leaming experience with sensors (2016) (4)
- Event Driven Network Topology Discovery and Inventory Listing Using REAMS (2017) (4)
- Privacy Violations in Constrained Micro-Grids: Adversarial Cases (2016) (4)
- The Foundation of the Internet: TCP/IP Reference Model (2013) (4)
- Designing a Video Game to Measure Creativity (2020) (4)
- Towards Vulnerability Assessment as a Service in OpenStack Clouds (2016) (4)
- Training Accurate Binary Neural Networks from Scratch (2019) (4)
- RSS-Crawler Enhancement for Blogosphere-Mapping (2010) (4)
- Identifying Domain Experts in the Blogosphere -- Ranking Blogs Based on Topic Consistency (2013) (4)
- Realization of an Expandable Search Function for an E-Learning Web Portal (2010) (4)
- Restricted Branching Programs and Their Computational Power (1990) (4)
- Advanced Studies on Link Proposals and Knowledge Retrieval of Hypertexts with CBR (2000) (4)
- "In physicis futurum saeculum respicio. Joachim Jungius und die Naturwissenschaftliche Revolution des 17. Jahrhunderts", Christoph Meinel, Göttingen 1984 : [recenzja] / Andrzej Bednarczyk. (1984) (4)
- Die Cloud für Schulen in Deutschland (2017) (4)
- Automatische Erzeugung Semantischer Annotationen für Vorlesungsvideos (2008) (4)
- Mathematische Grundlagen der Informatik - Mathematisches Denken und Beweisen: eine Einführung, 5. Auflage (2000) (4)
- „… die Chymie anwendbarer und gemeinnütziger zu machen” – Wissenschaftlicher Orientierungswandel in der Chemie des 18. Jahrhunderts† (1984) (4)
- Towards Identifying De-anonymisation Risks in Distributed Health Data Silos (2019) (3)
- Parity-OBDDs - a BDD structure for Probabilistic Verification (1998) (3)
- Tracking Visitor Engagement in the Blogosphere for Leveraging Rankings (2013) (3)
- Took a MOOC. Got a Certificate. What now? (2019) (3)
- Tree-structure outline generation for lecture videos with synchronized slides (2013) (3)
- Logic VS. Complexity Theoretic Properties of the Graph Accessibility Problem for Directed Graphs of Bounded Degree (1990) (3)
- A Ubiquitous Learning Analytics Architecture for a Service-Oriented MOOC Platform (2019) (3)
- An Iterative Approach to Online Course Design: Improving a Design Research MOOC (2018) (3)
- Student Perception of a Learner Dashboard in MOOCs to Encourage Self-Regulated Learning (2019) (3)
- Practical IT Security Education with Tele-Lab (2011) (3)
- One step further: extending electronic submission into the reviewing process (1999) (3)
- Indicators for the spatial analysis of settlement and open land trends in urban areas - studies on base of five European cities over a 50-year period (2001) (3)
- Neurodesign Live (2021) (3)
- Extracting Image Context from Pinterest for Image Recommendation (2015) (3)
- CoK: A Survey of Privacy Challenges in Relation to Data Meshes (2022) (3)
- The “Bachelor Project”: Project Based Computer Science Education (2019) (3)
- Structural Changes in International Scientific Communication: The Case of Chemistry (1993) (3)
- Internetworking - Technische Grundlagen und Anwendungen (2012) (3)
- Evaluation of the Technology Acceptance of a Collaborative Documentation System for Addiction Therapists and Clients (2018) (3)
- On the Descriptional Complexity of k-Uniformly-Limited Lindenmayer Systems. (1982) (3)
- Simulating Additional Area on Tele-Board's Large Shared Display (2011) (3)
- The DualGate Lock-Keeper: A Highly Efficient, Flexible and Applicable Network Security Solution (2003) (3)
- Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages (2017) (3)
- Separating Oblivious Linear Length MODp-Branching Program Classes (1994) (3)
- The Nonuniform Complexity Classes NC, L and NL (1987) (3)
- Enhance Lecture Archive Search with OCR Slide Detection and In-Memory Database Technology (2015) (3)
- Visualizing the Blogosphere with BlogConnect (2011) (3)
- Label-Based Access Control Policy Enforcement and Management (2006) (3)
- Optimizing the Retrieval of Pertinent Answers for NL Questions with the E-Librarian Service (2007) (3)
- Big Data in Forschung und Lehre am HPI (2014) (3)
- Learning Behavior of Men and Women in MOOC Discussion Forums – A Case Study (2020) (3)
- Physikalische Chemie vor 'der' Physikalischen Chemie: Heinrich Buff, 1805-1878 (2005) (3)
- VisBDD - A Web-based Visualization Framework for OBDD Algorithms (2001) (3)
- Learning from Success and Failure in Healthcare Innovation: The Story of Tele-Board MED (2018) (3)
- Virtual Machine Integrity Verification in Crowd-Resourcing Virtual Laboratory (2018) (3)
- Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity (2021) (3)
- Improving the Quality of Information-Flow with the Smart Data Server (2000) (3)
- Enhance Teleteaching Videos with Semantic Technologies (2015) (3)
- Distribution to multiple platforms based on one video lecture archive (2009) (3)
- Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members (2021) (3)
- DAPHNE--A Tool for Distributed Web Authoring and Publishing. (1999) (3)
- Function-Based Authorization Constraints Specification and Enforcement (2007) (3)
- Improving the Evaluation of Generative Models with Fuzzy Logic (2020) (3)
- Printed Copies: Printed Copies: Eecient Obdd-based Boolean Manipulation in Cad beyond Current Limits Eecient Obdd-based Boolean Manipulation in Cad beyond Current Limits (1995) (3)
- Energy and Performance Efficient Consolidation of Independent VMs in Virtualized Data Center by Exploiting VMs' Memory Demand Heterogeneity (2013) (3)
- OBDD-based Verification of Communication Protocols - Methods for the Verification of Data Link Protocols (1997) (3)
- The STACS Electronic Submission Service (1998) (3)
- Geordnete binäre Entscheidungsgraphen und ihre Bedeutung im rechnergestützten Entwurf hochintegrierter Schaltkreise (1997) (3)
- Lecture Butler: Teaching Reasonable Lectures from a Lecture Video Archive (2015) (3)
- Der Begriff des chemischen Elementes bei Joachim Jungius (1982) (3)
- Not All Knowledge Is Created Equal (2021) (3)
- Parallel network data processing in client side JavaScript applications (2015) (3)
- p -projection reducibility and the complexity classes (1986) (3)
- A Secure Web Services Providing Framework Based on Lock-Keeper (2007) (3)
- K-metamodes: frequency-and ensemble-based distributed k-modes clustering for security analytics (2019) (3)
- Enriching E-Learning meta data with user generated playlists (2010) (3)
- Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution (2019) (3)
- Dynamic configuration of virtual machine for power-proportional resource provisioning (2011) (3)
- Live Migration Timing Optimization for VMware Environments using Machine Learning Techniques (2020) (3)
- Social Physics of the Blogosphere - Capturing, Analyzing and Presenting Interdependencies within a Single Framework (2010) (3)
- An XACML Extension for Business Process-Centric Access Control Policies (2009) (3)
- Exploring emotions over time within the blogosphere (2014) (3)
- Does Design Thinking Mediate Critical Innovation Skills? An Interview Approach to Synthesize Five Competencies Taught at the D.School (2011) (3)
- Concept for Increased Security for Internet/Intranet - Based Administration of Patient Data (2000) (3)
- Verteiltes Design Thinking mit teleBoard (2009) (3)
- Cooperative Note-Taking in Psychotherapy Sessions: An Evaluation of the Therapist’s User Experience with Tele-Board MED (2018) (3)
- Modular Partitioning and Dynamic Conjunction Scheduling in Image Computation (2002) (3)
- CHESt - An Educational Tool that Understands Students' Questions (2004) (3)
- Community Rating in the Tele-Lecturing Context (2010) (3)
- Link Proposals with Case-Based Reasoning Techniques (2000) (3)
- openSAP: Learner Behavior and Activity in Self-Paced Enterprise MOOCs (2020) (3)
- Boolean Manipulation with Free BDDs: An Application in Combinational Logic Verification (1994) (3)
- Le veraging Social Web Functionalities in Tele-Teaching Platforms (2011) (3)
- A Repository Mobile Immunization Reminder System (RMIRS) For Nursing Mothers (2015) (2)
- Building innovation eco-systems (2014) (2)
- Flächen- und Volumenmessung lokaler Objekte in DICOM-Bildern und -Bildfolgen (1999) (2)
- Storified Programming MOOCs: A Case Study on Learner Engagement and Perception (2022) (2)
- Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold (2019) (2)
- New Media for Teaching Applied Cryptography and Network Security (2006) (2)
- Teaching the history of medicine, science and technology in the Federal Republic of Germany and in West Berlin (1979) (2)
- Beat your mom at solitaire — A review of reverse engineering techniques and countermeasures (2015) (2)
- Redesigning Medical Encounters with Tele-Board MED (2016) (2)
- LoANs: Weakly Supervised Object Detection with Localizer Assessor Networks (2018) (2)
- Improving search in tele-lecturing: using folksonomies as trigger to query semantic datasets to extract additional metadata (2011) (2)
- openHPI's Coding Tool Family: CodeOcean, CodeHarbor, CodePilot (2017) (2)
- Estimator Socialization in Design Thinking: The Dynamic Process of Learning How to Judge Creative Work (2019) (2)
- E- Learning Experiences from the Arab World (2019) (2)
- Reputation objects for interoperable reputation exchange: Implementation and design decisions (2012) (2)
- Design and First Insights of a Case Study on Storified Programming MOOCs (2019) (2)
- Authorization Constraints Specification and Enforcement (2008) (2)
- Towards More Human-Centered openHPI Collab Spaces (2019) (2)
- Proceedings of the 16th annual conference on Theoretical aspects of computer science (1999) (2)
- Motivation of the students in game development projects (2008) (2)
- Pre-Course Key Segment Analysis of Online Lecture Videos (2016) (2)
- Design and Implementation of a PHP-based Web Server for the Tele-Lab IT Security (2003) (2)
- Catch the Spike: On the Locality of Individual BGP Update Bursts (2013) (2)
- Learning imbalanced semantic segmentation through cross-domain relations of multi-agent generative adversarial networks (2019) (2)
- The Möbius Function, Variations Ranks, and Theta(n)-Bounds on the Modular Communication Complexity of the Undirected Graph Connectivity Problem (1994) (2)
- Cellular Automata as an Example for Advanced Beginners' Level Coding Exercises in a MOOC on Test Driven Development (2017) (2)
- Separating Complexity Classes Related to Omega-Decision Trees (1992) (2)
- Performance of Men and Women in Graded Team Assignments in MOOCs (2019) (2)
- Explorative Learning of Wireless Network Security with Tele-Lab IT-Security (2008) (2)
- Peer Tutoring Orchestration - Streamlined Technology-driven Orchestration for Peer Tutoring (2017) (2)
- Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers (2019) (2)
- Ad Hoc vs. Organised Orchestration: A Comparative Analysis of Technology-Driven Orchestration Approaches (2016) (2)
- Analyzing Boundary Device Logs on the In-memory Platform (2015) (2)
- Improving the Scalability of MOOC Platforms with Automated, Dialogue-based Systems (2020) (2)
- A multimedia-editor for making findings in radiology (2000) (2)
- Fast Automated Processing and Evaluation of Identity Leaks (2018) (2)
- Visual-Textual Late Semantic Fusion Using Deep Neural Network for Document Categorization (2015) (2)
- Information Propagation Speed and Patterns in Social Networks: A Case Study Analysis of German Tweets (2018) (2)
- Synthesis in Style: Semantic Segmentation of Historical Documents using Synthetic Data (2021) (2)
- Routing based workflow for construction of distributed applications (2004) (2)
- The Genesis of a Comprehensive Design Thinking Solution (2009) (2)
- Full Lecture Recording Watching Behavior, or Why Students Watch 90-Min Lectures in 5 Min (2018) (2)
- Vagrant Virtual Machines for Hands-On Exercises in Massive Open Online Courses (2016) (2)
- Efficient Event Detection for the Blogosphere (2014) (2)
- Exploring the Potential of Game-Based Learning in Massive Open Online Courses (2017) (2)
- Dialog der Kulturen (1992) (2)
- Exploring possibilities to partially transform simulation exercises into interactive games on OpenWHO.org digitizing live role-playing game exercises online for epidemics and health emergency work (2018) (2)
- Dynamic Browsing of Audiovisual Lecture Recordings Based on Automated Speech Recognition (2008) (2)
- Creative Collaboration in Real World Settings (2014) (2)
- Automated Security Service Orchestration for the Identity Management in Web Service Based Systems (2011) (2)
- A threat modeling approach for cloud storage brokerage and file sharing systems (2018) (2)
- Razors for Arctic VIP Travelers: Using Warm-Up Games in MOOCs (2021) (2)
- Die Chemie an der Universität Marburg seit Beginn des 19. Jahrhunderts: Ein Beitrag zu ihrer Entwicklung als Hochschulfach (1978) (2)
- BMXNet 2: An Open Source Framework for Low-bit Networks - Reproducing, Understanding, Designing and Showcasing (2020) (2)
- Case Study: Manipulating -obdds by Means of Signatures (1997) (2)
- On the Potential of Automated Downloads for MOOC Content on Mobile Devices (2020) (2)
- Enabling Video-Blogging without Relying on External Service-Providers (2009) (2)
- An authentication and authorization system for virtual organizations (2005) (2)
- Advanced Techniques for Analyzing Web Server Logs (2000) (2)
- Smart Micro-Grid Systems Security and Privacy (2018) (2)
- PVD: Passive vulnerability detection (2017) (2)
- Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive (2018) (2)
- Towards Culturally Inclusive MOOCs: A Design-based Approach (2019) (2)
- A Closer Look at Novel Class Discovery from the Labeled Set (2022) (2)
- A Quantitative Study on the Effects of Learning with Mobile Devices in MOOCs (2019) (2)
- Enabling Co-owned Image Privacy on Social Media via Agent Negotiation (2021) (2)
- Virtual machines pre-copy live migration cost modeling and prediction: a survey (2021) (2)
- Digital Communication: Communication, Multimedia, Security (2014) (2)
- Live Migration Timing Optimization Integration with VMware Environments (2021) (2)
- Multimedia Data and Its Encoding (2014) (2)
- A Taxonomy of Trust Models for Attribute Assurance in Identity Management (2020) (2)
- Cluster Labeling for the Blogosphere (2014) (2)
- How Can Creative Self-Efficacy by Fostered in Design Education? (2012) (2)
- Security Requirements Specification in Process-aware Information Systems (2009) (2)
- Tagging User Research Data: How to Support the Synthesis of Information in Design Teams (2015) (2)
- Couch Learning Mode: Multiple-Video Lecture Playlist Selection out of a Lecture Video Archive for E-learning Students (2016) (2)
- Constructing a secure HIPACS with structured reporting (2000) (2)
- Leadership, Design Thinking and Messy Institutions (2019) (2)
- Die wissenschaftliche Fachzeitschrift: Struktur- und Funktionswandel eines Kommunikationsmediums (1997) (2)
- Lower Bounds for the Modular Communication Complexity of Various Graph Accessibility Problems (1995) (2)
- Smart MOOC - Social Computing for Learning and Knowledge Sharing (2018) (2)
- Have Your Tickets Ready! Impede Free Riding in Large Scale Team Assignments (2020) (2)
- Teaching the Masses on Twitch: An Initial Exploration of Educational Live-Streaming (2021) (2)
- Whom to Trust? Generating WS-Security Policies Based on Assurance Information (2011) (2)
- Database based Navigation Assistant (1999) (2)
- Understanding asynchronous design work - segmentation of digital whiteboard sessions (2012) (2)
- Students’ Satisfaction of a Design Thinking MOOC with Personalized Learning Objectives (2020) (2)
- Representation and Evaluation of QBFs in Prenex-NNF (2004) (2)
- Engaging with Tweets: The Missing Dataset On Social Media (2020) (1)
- Increasing efficiency of symbolic model checking by accelerating dynamic variable reordering (1999) (1)
- Block-Restricted Reordering - Extended Experiments (1997) (1)
- Combinational Logic Verification with FBDDs (1993) (1)
- A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments (2018) (1)
- Technical Basics for a Better Understanding of Blockchain Technology (2020) (1)
- “Mind the Oddness Trap!” - Theory and Practice in Design Thinking (2010) (1)
- Impact of Contextual Tips for Auto-Gradable Programming Exercises in MOOCs (2021) (1)
- Engaging Digital Engineering Students in Design Thinking (2020) (1)
- Separating complexity classes related to bounded alternating ω-branching programs (2005) (1)
- Security in Telemedicine – Certificates and Digital Identity Cards (1)
- Unsupervised matching of object models and ontologies using canonical vocabulary (2010) (1)
- An Investigation of Fine-tuning Pre-trained Model for MR-to-Text Generation (2020) (1)
- Design of the Natural Language Processing Module (2011) (1)
- More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization (2017) (1)
- SELF-TEST INTEGRATION IN LECTURE VIDEO ARCHIVES (2015) (1)
- TAMING THE UNCERTAINTY OF PUBLIC CLOUDS (2013) (1)
- Integration der Schleusentechnologie "Lock-Keeper" in moderne Sicherheitsarchitekturen * (2000) (1)
- FZQSAT: A QSAT Solver for QBFs in Prenex NNF (A Useful Tool for Circuit Verification) (2004) (1)
- Privacy and Security in IPv 6 Networks : Challenges and Possible Solutions (2013) (1)
- Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme (2019) (1)
- Secure Deduplication on Public Cloud Storage (2019) (1)
- Concept-Based Multimodal Learning for Topic Generation (2015) (1)
- Geographic focus detection using multiple location taggers (2014) (1)
- TransPipe : A Pipeline for Automated Transcription and Translation of Videos (2021) (1)
- Foundations, Applications and Innovations (2002) (1)
- Representation of Multiple-Valued Functions with Mod-p Decision Diagrams (2000) (1)
- Trevor H. Levere (Ed.): Editing Texts in the History of Science and Medicine: Papers given at the seventeenth annual Conference on Editorial Problems, University of Toronto, 6‐7 November 1981. New York/London: Garland Publishing 1982. 190 S., Ln. $ 17,‐. (1984) (1)
- RELACS - a Recursive Layout Computing System (1987) (1)
- Enhance Opensst Protocol's Security with Smart Card (2003) (1)
- Part-of-Speech Taggers and Parsers (2011) (1)
- Web Site Design Using a Web-Based Authoring and Publishing System (2000) (1)
- An e-Librarian Service that Understands Natural Language Questions from Students (2006) (1)
- Quantified Trust Levels for Authentication (2008) (1)
- Masked Hard Coverage Mechanism on Pointer-generator Network for Natural Language Generation (2021) (1)
- Environment and Automata II (1982) (1)
- A Heuristic for (+)-OBDD Minimization (2001) (1)
- Effiziente Algorithmen - Entwurf und Analyse (1991) (1)
- A Flexible Middleware Platform with Piped Workflow (2003) (1)
- Breaking the Ice? How to Foster the Sense of Community in MOOCs (2022) (1)
- Design science and neuroscience: A systematic review of the emergent field of Design Neurocognition (2023) (1)
- Utilizing Warm-Up Games in MOOC Discussion Forums (2019) (1)
- BlogSphere-A Topical Map of the Blogosphere (2014) (1)
- The CollaboUse Test for Automated Creativity Measurement in Individuals and Teams: A Construct Validation Study (2023) (1)
- From Domain-Based Identity Management Systems to Open Identity Management Models (2012) (1)
- A XML format secure protocol - OpenSST (2005) (1)
- A Brokerage Approach for Secure Multi-Cloud Storage Resource Management (2020) (1)
- Enforcing Information Flow Constraints in RBAC Environments (2008) (1)
- Strengthening Semantic-tree Method in evaluating QBFs (2004) (1)
- Synthetic Data for the Analysis of Archival Documents: Handwriting Determination (2020) (1)
- Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System (2019) (1)
- Remote Resource Mapping of Solar System Bodies (1990) (1)
- Design Thinking for the Twenty-First Century Organization (2016) (1)
- On the Structure of Endomorphism Monoids and Automorphism Groups of Group Labyrinths in the Category code (1982) (1)
- BDDs, Horn Clauses and Resolution (2003) (1)
- Passive Network Monitoring using REAMS (2015) (1)
- Modeling cognitive style patterns to explore individuals' capabilities for processing knowledge in virtual settings (2014) (1)
- How Much Middle-Tier Do You Need? (2001) (1)
- Rough Logs: A Data Reduction Approach for Log Files (2019) (1)
- Securing the Flow - Data Flow Analysis with Operational Node Structures (2018) (1)
- A Simple, Smart and Extensible Framework for Network Security Measurement (2007) (1)
- The importance of empathy in it projects: A case study on the development of the German electronic identity card (2011) (1)
- Digitale Kompetenzen und Schulbildung (2020) (1)
- Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic (2016) (1)
- A SECURE CLOUD-BASED PICTURE ARCHIVING ANDCOMMUNICATION SYSTEM FOR DEVELOPINGCOUNTRIES (2019) (1)
- Communication Fundamentals in Computer Networks (2014) (1)
- On the Complexity of Constructing Optimal OBDD's (1994) (1)
- Improvement to the Smart Data Server with SOAP (2002) (1)
- Okkulte und exakte Wissenschaften (1992) (1)
- Multiperiod robust optimization for proactive resource provisioning in virtualized data centers (2014) (1)
- Geschichte der Naturwissenschaft, der Technik und der Medizin in Deutschland = History of science, technology, and medicine in Germany (2005) (1)
- A Simple Secure Addressing Scheme for IPv6 AutoConfiguration (SSAS) (2014) (1)
- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm (2019) (1)
- MUTUAL DISTILLATION OF CONFIDENT KNOWLEDGE (2022) (1)
- Cognitive adaptability to optimize online behavior personalizing digital workspaces with virtual reality (2017) (1)
- Wissenschaft und Stadt (1995) (1)
- Identity Assurance in Open Networks (2012) (1)
- Tele-Lecturing - Quo vadis Vorlesungsaufzeichnungen (2009) (1)
- Signed URL for an Isolated Web Server in a Virtual Laboratory (2017) (1)
- Embedded smart home — remote lab grading in a MOOC with over 6000 participants (2017) (1)
- An e-Librarian Service that Yields Pertinent Resources from a Multimedia Knowledge Base (2006) (1)
- Tele-Board MED: Supporting Creative Problem Solving in Behaviour Psychotherapy (2016) (1)
- A Semantic Search Engine for a Multimedia e-Learning Tool (2004) (1)
- Webbasierte Suche in Vorlesungsvideos auf Basis der Transkripte eines Spracherkenners (2008) (1)
- Vier Jahre Docu-blogging im IT-Gipfel-Prozess der Bundesregierung (2011) (1)
- SignCol: Open-Source Software for Collecting Sign Language Gestures (2018) (1)
- Chemical Collections (2009) (1)
- Algorithmic Considerations for +-OBDD Reordering (1999) (1)
- Extraction and Analysis of Web Interviews (2015) (1)
- Vom Handwerk des Chemiehistorikers (1984) (1)
- Sarton, Science, and the End of History (1985) (1)
- SehMIC: Semi-hierarchical Multi-label ICD Code Classification (2020) (1)
- Environments and Automata I (1982) (1)
- Virtual Machine Integration & Fault Recovery in Crowd-Resourcing Virtual Laboratory (2019) (1)
- Datenverbindung zwischen zwei Rechnern und Verfahren zur Datenübertragung zwischen zwei Rechnern (1998) (1)
- Video Consumption with Mobile Applications in a Global Enterprise MOOC Context (2021) (1)
- Router Advertisement based privacy extension in IPv6 autoconfiguration (2014) (1)
- NATUR ALS MORALISCHE ANSTALT DIE METEOROLOGIA PHILOSOPHICO-POLITICA DES FRANZ REINZER, S.J., EIN NATURWISSENSCHAFTLICHES EMBLEMBUCH AUS DEM JAHRE 1698 (1987) (1)
- Ranking Blogs based on Topic Consistency (2012) (1)
- Reformation(en) und Wissenschaft(en). Einführung in das Tagungsthema (2003) (1)
- The first 10 years of the ECCC digital library (2006) (1)
- What’s Creative About Sentences? A Computational Approach to Assessing Creativity in a Sentence Generation Task (2022) (1)
- Towards a Blockchain-based Identity Provider (2018) (1)
- A NOVEL APPROACH TO E-LEARNING CONTENT CREATION (2003) (1)
- Enhanced Cost Analysis of Multiple Virtual Machines Live Migration in VMware Environments (2018) (1)
- Institut für Telematik (Trier) – angewandte Forschung nach Fraunhofer Ideal (1998) (1)
- openSAP: Why Are Enterprise MOOCs Working? (2019) (1)
- A Policy Language for Integrating Heterogeneous Authorization Policies (2007) (1)
- SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management (2021) (1)
- Die Bibliothek des Joachim Jungius: ein Beitrag zur Historia litteraria der frühen Neuzeit (1992) (1)
- A reducibility concept for problems defined in terms of ordered binary decision diagrams (1997) (1)
- Towards Personalized, Dialogue-Based System Supported Learning for MOOCs (2021) (1)
- Solving Security and Availability Challenges in Public Clouds (2014) (1)
- Buchbesprechung: Lorenz Oken (1779–1851). Ein politischer Naturphilosoph Herausgegeben von Olaf Breidbach, Hans-Joachim Fliedner und Klaus Ries (2003) (1)
- Consuming Security: Evaluating Podcasts to Promote Online Learning Integrated with Everyday Life (2021) (1)
- Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments (2018) (1)
- The Neuroscience of Empathy: Research-Overview and Implications for Human-Centred Design (2021) (1)
- A model-based software development process for Supply Chain Monitoring applications (2010) (1)
- Datenschutzkonforme Learning Analytics bei Einbindung externer Materialen in Lernportale im schulischen Umfeld (Data-protection-compliant Learning Analytics for the Use of External Resources in Learning Portals in Schools) (2018) (1)
- Strong Authentication over Lock-Keeper (2008) (1)
- Automatic Categorization of Lecture Videos: Using Statistical Log File Analysis To Enhance Tele-Teaching Metadata (2012) (1)
- "A World out of Chaos": Anschauung, Modellbildung und chemische Synthese bei August Wilhelm Hofmann (1995) (1)
- Measuring the effects of course modularizations in online courses for life-long learners (2022) (1)
- Der handschriftliche Nachlaß von Joachim Jungius in der Staats - und Universitätsbibliothek Hamburg: Katalog (1984) (1)
- WWW — das universelle Kommunikationsmedium (2004) (1)
- Adaptive compression of DICOM image data (1998) (1)
- Laboratoriumspraxis, Quantitäten und die Produktion von Erkenntnis (2003) (1)
- NLP-based Entity Behavior Analytics for Malware Detection (2021) (1)
- The Internal Workflow of the Smart-Data-Server (2002) (1)
- E-Librarian Service (2013) (1)
- Efficient Manipulation of FBDDs by Means of a Modified OBDD-Package (1993) (1)
- User-centered development of social collaboration software (2011) (1)
- Nationalismus und Internationalismus in der Chemie des 19. Jahrhunderts (1983) (1)
- Privacy Risks in Resource Constrained Smart Micro-Grids (2018) (1)
- A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification (2009) (1)
- Towards Automatic Personality Prediction Using Facebook Like Categories (2018) (1)
- Theoretical Foundations of Design Thinking. Part III: Robert H. McKim’s Visual Thinking Theories (2021) (1)
- IMPROVING MOBILE AND WORLDWIDE PERFORMANCE THROUGH IMAGE OPTIMIZATION AND DISTRIBUTED CONTENT DELIVERY (2018) (1)
- Text Generation in Discrete Space (2020) (1)
- Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies (2022) (1)
- LZW-JPEG Kompression radiologischer Bilder (1999) (1)
- Web Mining Accelerated with In-Memory and Column Store Technology (2013) (1)
- Alchemie und Musik (1986) (1)
- Network Access Layer (2): Wireless Mobile LAN Technologies (2013) (1)
- Adaptive compression of image data (1998) (1)
- Praelectiones physicae : historisch-kritische Edition (1982) (1)
- Digitale Videos im Unterricht - Die "YouTube-Generation" lernt Judo mit E-Videos (2010) (1)
- How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect (2019) (1)
- Optimizing the Variable Order (1998) (1)
- 33. Workshop "Komplexitätstheorie, Datenstrukturen und Effiziente Algorithmen" (1997) (1)
- The nonuniform complexity classes NC 1 , LN (1987) (1)
- When Do Learners Rewatch Videos in MOOCs? (2020) (1)
- Interface for Navigation and Database - Querying via WWW (1998) (1)
- Aggregating Vulnerability Information for Proactive Cloud Vulnerability Assessment (2016) (1)
- Post Recommendation in Social Web Site (2009) (1)
- Overcoming Ordering Restrictions for Synthesizing Binary Decision Diagrams (2007) (1)
- Zustelldienst im Web — HTTP: Hypertext Transfer Protocol (2004) (1)
- Designing a Synthesis MOOC: Lessons from Frameworks, Experiments and Learner Paths (2019) (1)
- Evaluating Post-Training Compression in GANs using Locality-Sensitive Hashing (2021) (1)
- Global Rebuilding of OBDD's - Tunneling Memory Requirement Maxima (1995) (1)
- Handwriting Classification for the Analysis of Art-Historical Documents (2020) (1)
- Juggling Doctor and Patient Needs in Mental Health Record Design (2017) (1)
- A dynamic, secure and multi-solutions supported middleware system (2005) (1)
- Establishing Therapeutic Alliance in Mental Health Care via Cooperative Documentation (2017) (1)
- Network Access Layer (1): Wired LAN Technologies (2013) (1)
- Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform (2018) (1)
- Improving community rating in the tele-lecturing context (2010) (1)
- Database based History Browse Assistant (1999) (1)
- Separating Complexity Classes Related to Bounded Alternating omega-Branching Programs (1993) (1)
- Vom ersten nationalen IT-Gipfel der Bundesregierung (2007) (0)
- Die Bildungscloud – smarte Bildung für ein smartes Deutschland (2020) (0)
- Vom Handwerk des Chemiehistorikers (II): Die Entwicklung der Chemie als Hochschulfach (1984) (0)
- Digitale Arbeitsblätter mit interaktiven Programmieraufgaben im Informatik-Unterricht (2020) (0)
- Recursive design of communication schemes for parallel computation with RELACS (1988) (0)
- Wie weiß Google, was wo steht? (2021) (0)
- Wie sich Rechner unterhalten — Grundkonzepte der Rechnervernetzung (2004) (0)
- Wenn Chemiker feiern ... (2017) (0)
- Eine kurze Geschichte des Internets (2021) (0)
- Das Maß aller Dinge : Das Meter, die Revolution und die Wissenschaft (1999) (0)
- Grundbegriffe der Kryptografie (2014) (0)
- Automatisierte Online-Aufsicht im Kontext der Wertigkeit von Zertifikaten einer MOOC Plattform (2016) (0)
- Ertragsmanagement im Wandel – Potentiale der In-Memory Technologie (2017) (0)
- Technische Grundlagen des Internet (18) - Sicherheit im Internet (2005) (0)
- Die erste Sprache des Web — HTML: Hypertext Markup Language (2004) (0)
- Vier Millionen Likes pro Minute (2021) (0)
- Richtiger Einsatz verspricht den Erfolg (2020) (0)
- Ist das Web ein Cookie-Monster? (2021) (0)
- WAN – Nervensystem des Internets (2021) (0)
- Technische Grundlagen des Internet (08) - Grundlagen der Rechnervernetzung (2005) (0)
- Does Personality Evolve? A Ten-Years Longitudinal Study from Social Media Platforms (2020) (0)
- Wozu das Internet alles gut ist — Dienste und Anwendungen im Internet (2004) (0)
- LAN – Grundbaustein des Internets (2021) (0)
- Für jeden Zweck das passende Design — CSS: Cascading Stylesheets (2004) (0)
- Hans‐Werner Schütt: Eilhard Mitscherlich. Baumeister am Fundament der Chemie. (Deutsches Museum, Abhandlungen und Berichte, N.F. Bd 8). München: R. Oldenbourg (in Kommission) 1992. 198 SS., 21 Abb., 1 Taf. ISBN 3‐486‐26273‐4. DM 24 (1993) (0)
- TCP – Wer garantiert, dass das Datenpaket angekommen ist? (2021) (0)
- Technische Grundlagen des Internet (15) - Transportprotokolle (2005) (0)
- Technische Grundlagen des Internet (19) - Sicherheit im Internet (Teil 2) (2005) (0)
- Neues Itm Gewinnt Mit Innovativer Anwendung Internationalen Ideenwettbewerb Zu Ipv6 (0)
- Besser Mathematik begreifen mit MatES - Autonomes Lernen mit Videosequenzen im Unterricht (2010) (0)
- Technische Grundlagen des Internet (03) - Kurze Geschichte der Kommunikationsmedien (2005) (0)
- Sicherheit und Vertrauen im Internet - Eine technische Perspektive (2014) (0)
- Proctoring und digitale Prüfungen - Durchführungsbeispiele und Gestaltungselemente für die digitale Lehre (2021) (0)
- Vertraulichkeit und Verschlüsselung (2014) (0)
- Wie verhindert man einen Stau auf der Datenautobahn? (2021) (0)
- Improving the Scalability and Security of Execution Environments for Auto-Graders in the Context of MOOCs (2021) (0)
- Finding Classification Zone Violations with Anonymized Message Flow Analysis (2019) (0)
- Wie kommen unsere Medien in den Computer? (2021) (0)
- [Not Available]. (2000) (0)
- Der Ursprung der modernen Wissenschaften: Studien zur Entstehung wissenschaftlicher Disziplinen. Martin Guntau , Hubert Laitko (1989) (0)
- TCP/IP-Protokoll Betriebssystem des Internets (2021) (0)
- Wissen im Wandel: Die Gelehrtenbibliothek des Joachim Jungius (1587-1657) (1993) (0)
- Datentransfer ins Nachbarbüro — LAN-Technologien (2004) (0)
- Die Chemie an den Universitäten des 18. Jahrhunderts. Institutionalisierungsstufen und konzeptioneller Wandel (1986) (0)
- Technische Grundlagen des Internet (11) - Wide Area Networks (2005) (0)
- Weiterbildung aus dem Netz (2015) (0)
- Book Review:Neu-eroffnete chymische Artzney- und Werck-Schul Christoph Glaser, Hans-Joachim Poeckern (1991) (0)
- Die HPI Schul-Cloud: Eine zukunftssichere IT-Infrastruktur für das deutsche Bildungswesen (2020) (0)
- Chemiegeschichte: Recent Developments in the History of Chemistry. Hrsg. von C. A. Russell. The Royal Society of Chemistry, London 1985. X + 333 S., £27.50. ISBN 0-85186-917-3 (1987) (0)
- Technische Grundlagen des Internet (20) - Uniform Resource Identifier und Hypertext Transfer Protocol (2005) (0)
- tele-TASK - Teleteaching praxistauglich für den Universitätsalltag (2003) (0)
- Prominent positioniert. August Wilhelm von Hofmann zum 200. Geburtstag: ein fast vergessenes Stück deutscher Gedenkkultur (2018) (0)
- Kommunikationsmedien im Wandel — von der Höhlenmalerei zum WWW (2004) (0)
- IPv6 – Die Zukunft des Internets (der Dinge) (2021) (0)
- Zum Differenzierungsprozeß frühneuzeitlicher Naturwissenschaft (1989) (0)
- Die Entwicklung der Informatik braucht Theorie und Praxis. Ein Fallbeispiel aus dem CAD-Schaltkreisentwurf (1995) (0)
- Ein Mann und seine Reaktion (2012) (0)
- Zehn Jahre Updates für den Kopf (2022) (0)
- Sicherheitsziele und Bedrohungen im Internet (2014) (0)
- Die Rolle der Chemiegeschichte in der Wissenschaftskommunikation (2017) (0)
- Entwurfserfahrungen mit dem rekursiven Layoutentwurfssystem RELACS; II (1990) (0)
- Alles ist möglich — XML: Extensible Markup Language (2004) (0)
- Big Data in Forschung und Lehre am HPI (2014) (0)
- Technische Grundlagen des Internet (14) - Mobile IP (2005) (0)
- Grundlagen der Kommunikation in Rechnernetzen (2009) (0)
- Anton-Vilsmeier-Vorlesung an der Universität Regensburg: Lebenslinien eines Chemikers (2012) (0)
- Geschlechterverhältnisse in Medizin, Naturwissenschaft und Technik (1996) (0)
- DNS – Telefonbuch des Internets (2021) (0)
- Handshakes und Ports – Die TCP Datenverbindung (2021) (0)
- Entwurfserfahrungen mit dem rekursiven Layoutentwurfssystem RELACS; I (1990) (0)
- HTTP, HTML, CSS – Aufbauhelfer im Web (2021) (0)
- Wissenschaftsgeschichte auf den Versammlungen der Gesellschaft Deutsche Naturforscher und Ärzte, 1822–1972. Bibliographie der Vorträge und allgemeine Übersicht. Von D. von Engelhardt. Wissenschaftliche Verlagsgesellschaft, Stuttgart 1987. 206 S., 26 Abb., kart. DM 48,–. ISBN 3‐8047‐0850‐1 (1988) (0)
- Optimierung der Variablenordnung (1998) (0)
- Was weiß das Internet über mich? (2021) (0)
- Multimediale Daten und ihre Kodierung (2009) (0)
- Die Grundlage des Internets: TCP/IP-Referenzmodell (2012) (0)
- Atti del I° Convegno di Storia della Chimia. Hrsg. von Paola Antoniotti und Luigi Cerruti. Torino: Univercittà, 1985 [1986]. VI und 210 Seiten kartoniert (1986) (0)
- Medizinische Bildverarbeitung - eine Übersicht (2004) (0)
- Des wunderlichen Wünsch seltsame Reduktion (1996) (0)
- Inferring Private User Behaviour Based on Information Leakage (2018) (0)
- Was verbirgt sich hinter dem Begriff Blockchain? (2020) (0)
- Justus von Liebig und Hermann Kolbe in ihren Briefen, 1846-1873. Justus von Liebig , Hermann Kolbe , Alan J. Rocke , Emil Heuser (1996) (0)
- Wie die technischen Normen des Internets entstehen (2021) (0)
- Case Study: Manipulating xor-OBDDs by Means of Signatures (1997) (0)
- OBDDs — Ordered Binary Decision Diagrams (1998) (0)
- Recurrent generative adversarial network for learning imbalanced medical image semantic segmentation (2019) (0)
- Einfluß der Variablenordnung auf die Komplexität von OBDDs (1998) (0)
- Boosting Bert Subnets with Neural Grafting (2023) (0)
- Data Structures for Boolean Functions (2001) (0)
- Printed Copies: Printed Copies: Local Encoding Transformations for Optimizing Obdd-representations of Finite State Machines Local Encoding Transformations for Optimizing Obdd-representations of Finite State Machines (1996) (0)
- Integration of a public key infrastructure in a virtual university (2000) (0)
- Prototyper: A Virtual Remote Prototyping Space (2019) (0)
- On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service (2021) (0)
- Hunting, Gathering and Taking It Home: Bringing New Perspectives and Perceptions into Organisations (2019) (0)
- STACS 99: 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6, 1999 Proceedings (1999) (0)
- Application for Repairing and Presenting DICOM Objects (2002) (0)
- SURVEY FINDINGS ON THE SPREAD OF DESIGN THINKING IN ARAB COUNTRIES: THE EDUCATIONAL SECTOR AS A DRIVING FORCE, AND ITS CURRENT CHALLENGES (2022) (0)
- Suggestion for an alternative to watermarking and digital signatures (2001) (0)
- Towards leveraging conversational agents for instructors and learners to find and access learning resources (2021) (0)
- Facilitating User Control in Distributed Collaborative Applications (2008) (0)
- Weakly Supervised Scene Text Detection using Deep Reinforcement Learning (2022) (0)
- Lock-Keeper Technology - A New Network Security Solution (2003) (0)
- Network Access Layer (3): WAN Technologies (2013) (0)
- Counting Issues: Theory and Application (Dagstuhl Seminar 9349) (2021) (0)
- Prototyping a Cognitive-Centered Model to improve knowledge creation in geographically distributed teams (2016) (0)
- IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security (2011) (0)
- Laboratoriumsdiskurs, Kommunikation und Wissensproduktion: der Briefwechsel zwischen Liebig und Wöhler (1991) (0)
- Computer Aided Design and Test Decision Diagrams - Concepts and Applications (Dagstuhl Seminar 9705) (2021) (0)
- Omega-Branching Programs of Bounded Width (1990) (0)
- The parallelization index of synchronous systems (1987) (0)
- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media (2022) (0)
- Characterising Proxy Usage in the Bitcoin Peer-to-Peer Network (2020) (0)
- Identifying the top-dogs of the blogosphere (2011) (0)
- Jedes Ding braucht einen Namen — URL: Universal Resource Identifier (2004) (0)
- A Parallel Quasi-identifier Discovery Scheme for Dependable Data Anonymisation (2021) (0)
- How does the Corona Pandemic Influences Women’s Participation in Massive Open Online Courses in STEM? (2021) (0)
- Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry (2020) (0)
- Wie das Internet funktioniert — Internetworking (2004) (0)
- Necessary Standard for Providing Privacy and Security in IPv6 Networks (2019) (0)
- Design Thinking (2016) (0)
- VuWaDB (2018) (0)
- Building Content Clusters Based on Modelling Page Pairs (2006) (0)
- Symbolisches Model Checking (1998) (0)
- WWW.BDD-Portal.ORG: An Experimentation Platform for Binary Decision Diagram Algorithms (2000) (0)
- Application Layer and Internet Applications (2013) (0)
- SOLUTION PREDICTION FOR VULNERABILITIES USING TEXTUAL DATA (2016) (0)
- Event Driven Network Topology Discovery and Inventory Listing Using REAMS (2015) (0)
- { AKTUELLES SCHLAGWORT* / MOOCSAM BEISPIEL OPENHPI (2015) (0)
- Session 12: E-society: E-learning, e-commerce, e-business and e-government (2010) (0)
- STACS 98: 15th Annual Symposium on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings (1998) (0)
- Towards Privacy Awareness in Future Internet Technologies (2019) (0)
- Application Driven Variable Reordering and an Example in Reachability Analysis (1998) (0)
- A Systematic Quantitative and Qualitative Analysis of Participants’ Opinions on Peer Assessment in Surveys and Course Forum Discussions of MOOCs (2020) (0)
- Theories and Intricacies of Information Security Problems (2013) (0)
- The framework for spatiotemporal sequential rule mining: Crime data case study (2017) (0)
- [Not Available]. (1985) (0)
- Brown Tag Set (2011) (0)
- A Review of Scaling Genome Sequencing Data Anonymisation (2021) (0)
- Using the YouTube Video Style in a MOOC: (Re-)Testing the Effect of Visual Experience in a Field-Experiment (2022) (0)
- A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems (2021) (0)
- Matching cognitively sympathetic individual styles to develop collective intelligence in digital communities (2017) (0)
- “TO MAKE CHEMISTRY USEFUL AND BENEFICIAL” - CHANGE OF SCIENTIFIC ORIENTATION IN CHEMISTRY OF THE 18TH CENTURY (1984) (0)
- Evaluating the Digital Manuscript Functionality - User Testing for Lecture Video Annotation Features (2013) (0)
- Role-based Web Authoring and Web-Site Management for Commercial Sites (2000) (0)
- Re-Humanizing a Sleeping Beauty (2020) (0)
- Introduction to E-Librarian Services (2011) (0)
- The Importance of Link-Transformation and Link-Proposals for Hyperlink-Management Systems (1999) (0)
- Vom Daumenkino zum Videostreaming (2021) (0)
- A Hyperlink Focused Browse Assistant for the World Wide Web (2000) (0)
- The Möbius Function, Variations Rank, and . . . (1994) (0)
- A deep semantic framework for multimodal representation learning (2016) (0)
- A Fuzzy, Incremental, Hierachical Approach of Clustering Huge Collections of Web Documents (2013) (0)
- Integrating Podcasts into MOOCs: Comparing Effects of Audio- and Video-Based Education for Secondary Content (2022) (0)
- A Study about Future Prospects of JupyterHub in MOOCs (2022) (0)
- Detection using Multiple Location Taggers (2014) (0)
- Measuring performance in context (2012) (0)
- Geschichte der chemischen Industrie: Naturwissenschaften und Chemische Industrie in Deutschland: Voraussetzungen und Mechanismen ihres Aufstiegs im 19. Jahrhundert. Von Walter Wetzel (Frankfurter Historische Abhandlungen, Bd. 32). F. Steiner Verlag, Stuttgart, 1991. 338 S., kart. DM 128,-ISBN 3-515- (1993) (0)
- Cryptography in Electronic Mail (2013) (0)
- Printed Copies: Combinational Logic Veriication with Fbdds Combinational Logic Veriication with Fbdds (1993) (0)
- A Search-Engine-Topologie to Improve Document Retrieval on the Web (2000) (0)
- Where Does the Hype End, and Where Does the Innovation of Blockchain Technology Begin? (2020) (0)
- Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration (2000) (0)
- Lower bounds for the majority communication complexity of various graph accessibility problems (1995) (0)
- BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes (2011) (0)
- Projection Complete Graph Problems Corresponding to a Branching-Program-Based Characterization of the Complexity Classes NC1 ,Land NL (1987) (0)
- Finding Demand for Products in the Social Web (2015) (0)
- A method for compressing a digital image having a plurality of bit planes (1999) (0)
- Nonlinear Sifting of De ision DiagramsChristoph Meinel and Rustam MubarakzjanovDept (2007) (0)
- Exploring Collaboration and Assessment of Digital Remote Teams in Online Training Environments (2020) (0)
- Join the High Accuracy Club on ImageNet with A Binary Neural Network Ticket (2022) (0)
- Embedding of the Poset of Turing Degrees in the Poset [µ, <=] (1982) (0)
- TeamandTaskBasedRBACAccess Control Model (2007) (0)
- Netzzugangsschicht (2): Kabellose mobile LAN-Technologien (2012) (0)
- Interdisciplinarity and cooperation with industry in teaching and research (2009) (0)
- Incrementally updating unary inclusion dependencies in dynamic data (2018) (0)
- The WWW meets EDA: Usability evaluation of OBDD-heuristics via the Internet (1998) (0)
- Machine Learning and Human Cognition Combined to Enhance Knowledge Discovery Fidelity (2019) (0)
- Function Decomposition and Synthesis (1998) (0)
- Revision 01 of a Reducibility Concept for Problems Deened in Terms of Ordered Binary Decision Diagrams (1996) (0)
- Finding Learning and Teaching Content inside HPI School Cloud (Schul-Cloud) (2019) (0)
- 3 Representation and Algorithm 3 . 1 Representation of a CNF Formula in a ZDD (2004) (0)
- Analyse und Quantifizierung in chemischen Forschungsprogrammen des 18 (0)
- Leveraging Video Games to Improve IT-Solutions for Remote Work (2021) (0)
- HPI Future SOC Lab (2017) (0)
- Designing Culturally Inclusive MOOCs (2019) (0)
- How Do Mixed Teaching Teams Influence Learning in IT MOOCs? (2020) (0)
- microGAN: Promoting Variety through Microbatch Discrimination (2018) (0)
- Recursive design of communication schemes for parallel computation with R E L A C S (1988) (0)
- MOOCs – am Beispiel openHPI (2015) (0)
- Entwerfen, Prüfen, Testen (Dagstuhl Seminar 9108) (2021) (0)
- Influence of the Variable Order on the Complexity of OBDDs (1998) (0)
- Symbolic Model Checking (1998) (0)
- The Formtion of the German Chemical Community (1720–1795). Von K. Hufbauer. University of California Press, Berkeley 1982. VIII, 312 S., Paperback, $ 19.45 (1984) (0)
- Denoising AutoEncoder Based Delete and Generate Approach for Text Style Transfer (2021) (0)
- Computer Aided Design and Test (Dagstuhl Seminar 9307) (2021) (0)
- Mit reitendem Boten (1985) (0)
- Continent of Edu-Blogs Use Case: InternetWorking Blog and openHPI (2015) (0)
- Algorithms and Heuristics in VLSI Design (2000) (0)
- Probabilistic IR Model (2011) (0)
- DocLangID: Improving Few-Shot Training to Identify the Language of Historical Documents (2023) (0)
- Adaptive Post Recognition (2014) (0)
- Judging Consistency and Expertise of Blogs (2015) (0)
- Not All Knowledge Is Created Equal: Mutual Distillation of Confident Knowledge (2021) (0)
- UDP oder wenn es besonders schnell gehen muss (2021) (0)
- A CORBA-Based Dynamic Reconfigurable Middleware (2005) (0)
- A Comprehensive Review of Anomaly Detection in Web Logs (2022) (0)
- MOOCS IN THE CONTEXT OF UBIQUITIOS LEARNING 2 . 1 Comparison of Mobile Device Support on Major MOOC Platforms (2014) (0)
- HPI Future SOC Lab – Proceedings 2017 (2020) (0)
- Medical Image Segmentation Using a Combined Approach (2005) (0)
- Enhanced Security for Information Flow in VANET using Signcryption and Trust level (2020) (0)
- Advanced Reliability for Internet Transactions by Signed Bills (2000) (0)
- Dynamic Global Rebuilding (2007) (0)
- Computer Aided Design and Test - BDDs versus SAT (Dagstuhl Seminar 01051) (2021) (0)
- Ruptur eines Aneurysma verum der A. profunda femoris (2011) (0)
- SECURITY IN HEALTH CARE : AN OVERVIEW (2000) (0)
- RELACS - A RECURSIVE LAYOUT COMPUTINO SYSTEM (1987) (0)
- Semantic Web and Ontologies (2011) (0)
- P2AM: An Anti-Profiling Framework for Online Healthcare Applications (2018) (0)
- The BLOGINTELLIGENCE Portal (2015) (0)
- Symbolic Simulation of Synchronous Parallel Systems (1986) (0)
- Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords (2021) (0)
- Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems (2021) (0)
- Getting Hands-on with Tele-Board MED: Experiencing Computer-Supported Teamwork in Therapist-Patient Sessions (2019) (0)
- Integration Of TLS In An Internet/Intranet-based Application (2001) (0)
- Technology based motivation of students to collaborate by digital annotations during real lecture and learning sessions (2010) (0)
- Creating Social Spaces for Exploration (2019) (0)
- Does Multilevel Semantic Representation Improve Text Categorization? (2015) (0)
- Modeling Alerts for IDS Correlation (2011) (0)
- PubMedCLIP: How Much Does CLIP Benefit Visual Question Answering in the Medical Domain? (2023) (0)
- Technische Grundlagen des Internet (10) - Local Area Networks (Teil 2) (2005) (0)
- Innovation, Wicked Problems and Design Thinking (2019) (0)
- Analyse sequentieller Systeme (1998) (0)
- Public Key Infrastrukturen und Zertifikate (2014) (0)
- An Adequate Reducibility Concept for Problems Defined in Terms of Ordered Binary Decision Diagrams (1996) (0)
- Skill Confidence Ratings in a MOOC: Examining the Link between Skill Confidence and Learner Development (2019) (0)
- Measuring trust in e-commerceapplications: an approach based on semantic concepts (2013) (0)
- Wenn die Uni nicht warten kann: Das HPI auf neuen Pfaden zum IT-Nachwuchs (2012) (0)
- 2014 International Conference on Collaboration Technologies and Systems, CTS 2014, Minneapolis, MN, USA, May 19-23, 2014 (2014) (0)
- Proceedings of the Second HPI Cloud Symposium “Operating the Cloud” 2014 (2015) (0)
- Adaptive Post Recognition: Combine Feeds and HTML Paths to Identify and Parse Posts (2014) (0)
- Multi-core Supported High Performance Security Analytics (2013) (0)
- Visualizing Content Exploration Traces of MOOC Students (2019) (0)
- Empirical Evaluation of Post-Training Quantization Methods for Language Tasks (2022) (0)
- Probabilistic Methods in Verification (Dagstuhl Seminar 00181) (2021) (0)
- Towards an Exploration Machine for the Blogosphere (2015) (0)
- Enabling Reputation Interoperability through Semantic Technologies Rehab (2011) (0)
- Implementation of a document management system based on WebDAV protocol (2000) (0)
- Practical approach to store DICOM-conform presentations of radiological images (2002) (0)
- Collaboratecom Special Issue Analyzing Distributed Whiteboard Interactions (2012) (0)
- Data connection between two computers and method for transferring data between two machines (1998) (0)
- Operating Secure Mobile Healthcare Services over Constrained Resource Networks (2017) (0)
- Clumsy Solutions, Messy Institutions and Cultural Change (2019) (0)
- Electronic publishing, science portals and virtual universities - the scientific community is well-established in the World Wide Web (2001) (0)
- GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data (2021) (0)
- Successful Knowledge Transfer - A Boost for Regional Innovation (2021) (0)
- Efficient Implementation of OBDDs (1998) (0)
- Balancing Specializations and Teamwork in Creative Organizations – How the Game Industry organizes proactive Perspective-Taking (2011) (0)
- Designing the Multimedia Information Retrieval Module (2011) (0)
- The mysterious adventures of Detective Duke: How storified programming MOOCs support learners in achieving their learning goals (2023) (0)
- Blockchain: Hype or Innovation (2021) (0)
- Table Detection from Slide Images (2015) (0)
- From Project Plans and Backlogs to Strategic Roadmaps: The Evolution Toward Value-Oriented Thinking in Requirements Engineering (2022) (0)
- Proprietary versus Interoperable User Certificates in E-Commerce via Internet (2000) (0)
- A Hyperlink-Proposal Mechanism to Exemplify Cognitive Algorithms for Web-Applications (2002) (0)
- Design of Lock-Keeper federated authentication gateway (2009) (0)
- Wie Töne in den Computer kommen (2021) (0)
- Projects and Application Areas of Blockchain Technology (2020) (0)
- Recovering Individual Accessing Behaviour from Web Logs (2005) (0)
- Introduction: The Blogosphere (2015) (0)
- 300 Jaar Chemie te Leuven, 13.–15. November 1985 (1986) (0)
- Continent of Docu-Blogs Use Case: The IT-Gipfelblog (2015) (0)
- Detecting Interaction Activities While Walking Using Smartphone Sensors (2021) (0)
- Don't Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses (2019) (0)
- Introducing Adversarial Dropout in Generative Multi-Adversarial Networks (2018) (0)
- Continuity and Change in the European University in the Age of the Liberal Revolution, 1760-1830. Magdalen College, Oxford, 27.-29. März 1987. (1987) (0)
- The Right Use Leads to Success (2020) (0)
- Prison Break: From Proprietary Data Sources to SSI Verifiable Credentials (2023) (0)
- VuWaDB: A Vulnerability Workaround Database (2018) (0)
- The Impact of Mobile Learning on Students' Self-Test Behavior in MOOCs (2021) (0)
- DoorCollect: Towards a Smart Door Handle for User Identification based on a Data Collection System for unsupervised Long-Term Experiments (2021) (0)
- Vision of the Blogosphere and Its Exploration (2015) (0)
- Description Logics and Reasoning (2011) (0)
- A Note on Möbius Functions and the Communication Complexity of the Graph-Accessability-Problem (1992) (0)
- Netzzugangsschicht (3):WAN-Technologien (2012) (0)
- Printed Copies: Printed Copies: Block-restricted Reordering { Extended Experiments { Block-restricted Reordering { Extended Experiments { (1997) (0)
- Reviews (2001) (0)
- Continent of Corporate-Blogs: Use Case – SAP Blog (2015) (0)
- SUCCESS-FAILURE ANALYSIS: A TOOL FOR ADVANCING DOMAIN KNOWLEDGE, DESIGN THINKING STYLE (2017) (0)
- CGA-TSIG/e: Algorithms for Secure DNS Authentication and Optional DNS Confidentiality (2015) (0)
- IDDS: An Interactive Decentallzed Documentation System (2001) (0)
- Mapping Design Thinking in the Arab World (2021) (0)
- A second chapter that I found quite engaging was Steven Shapin’s “Who Is an Industrial Scientist?” Shapin juxtaposes the mid-twentieth-century culture and practice of industrial science as portrayed by academic sociol- (2006) (0)
- MalRank (2019) (0)
- Secure Cross-Organizational Service Composition (2007) (0)
- Transformation Techniques for Optimization (1998) (0)
- Quo Vadis, Web Authentication? - An Empirical Analysis of Login Methods on the Internet (2023) (0)
- A Specialized Tool for Simulating Lock-Keeper Data Transfer (2010) (0)
- The Challenge of Exploring the Blogosphere (2015) (0)
- Signed Preservation Of Online References (2000) (0)
- Prize for young scholars (2005) (2003) (0)
- Web-based frameworks to enable CAD R&D (abstract) (2000) (0)
- Friendship based storage allocation for online social networks cloud computing (2015) (0)
- Separating Complexity Classes Related to Restricted Logarithmic Space-Bounded Turing Machines (1989) (0)
- XML Schema Primitive Datatypes (2011) (0)
- Understanding Innovation Towards More Human-Centered openHPI Collab Spaces (2020) (0)
- Stay at Home and Learn: Did the COVID-19 Pandemic Influence Mobile Learning in MOOCs? (2022) (0)
- Interface ID lifetime Algorithms (2013) (0)
- Wie verständigen sich Maschinen im Internet? (2021) (0)
- Enhanced Sinkhole System: Collecting System Details to Support Investigations (2017) (0)
- Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC (2019) (0)
- Effiziente Implementierung von OBDDs (1998) (0)
- Probabilistic Symbolic Simulation and Verification with ⊕-OBDDs (1999) (0)
- Die neue digitale Welt verstehen (2021) (0)
- A Fuzzy Rule-Based Model for Remote Monitoring of Preterm in the Intensive Care Unit of Hospitals (2019) (0)
- Design Thinking and Cognitive Science: An Exploratory Approach to Create Intellectual Capital with Decentralised Organisations (2017) (0)
- Melanchthons semiologische Astrologie (2018) (0)
- Multiperiod robust optimization for proactive resource provisioning in virtualized data centers (2014) (0)
- Modular Partitioning for Improvement of Image Computation (2001) (0)
- Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines (2014) (0)
- Do We Really Need Common Variable Orders for Synthesizing OBDDs? (1998) (0)
- Transformationstechniken zur Optimierung (1998) (0)
- IDDS: an interactive decentralized documentation system (2001) (0)
- Smart Cards - the Personal Safe in an E-Commerce World (2000) (0)
- ASEDS: Towards Automatic Social Emotion Detection System Using Facebook Reactions (2018) (0)
- A Functional Description of Synchronous Systems (1985) (0)
- Book Review: The Formation of the German Chemical Community (1720—1795). By K. Hufbauer (1984) (0)
- Delivering Digital Justice: Liminal Innovation & Permanence in Courts (2021) (0)
- August Wilhelm Hofmann ‐ “Reigning Chemist‐in‐Chief”. (1993) (0)
- Editors foreword - Selected papers from STACS 1998 (1999) (0)
- Analyzing and Forecasting Trends (2015) (0)
- Obdd Heuristics Online Evaluation of Obdd-heuristics via the Internet (1999) (0)
- Predicting User Engagements using Graph Neural Networks on Online Social Networks (2022) (0)
- Von E-Mails zum Streaming (2021) (0)
- Accelerating OBDD-Minimization by Means of Structural and Semantical Properties (1998) (0)
- Challenges for Novice MOOC Designers (2022) (0)
- Analysis of the Applicability of General Scaling Laws on Course Size, Completion Rates, and Forum Activity in MOOCs (2022) (0)
- Printed Copies: Eecient Boolean Manipulation with Obdd's Can Be Extended to Fbdd's Eecient Boolean Manipulation with Obdd's Can Be Extended to Fbdd's Universitt at Trier D{54286 Trier Revised Version (1993) (0)
- One Step Further: Integrating Electronic Submission and the Reviewing Process (1999) (0)
- A Division in Chemistry: Science versus Practice. (1986) (0)
- Printed Copies: Speeding up Variable Reordering of Obdds Speeding up Variable Reordering of Obdds (1997) (0)
- Erratum: Design Thinking Research (2016) (0)
- Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids (2016) (0)
- Printed Copies: Printed Copies: Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols Obdd-based Veriication of Communication Protocols { Methods for the Veriication of Data Link Protocols (2007) (0)
- Continent of Ego-Blogs: Use Case – svenblogt.de (2015) (0)
- Recursive VLSI design theory and application (1989) (0)
- The More The Merrier: Reconstruction of Twitter Firehose (2023) (0)
- Printed Copies: Printed Copies: Global Rebuilding of Obdd's { Tunnelling Memory Requirement Maxima Global Rebuilding of Obdd's { Tunnelling Memory Requirement Maxima (2007) (0)
- An Operator for Removal of Subsumed Clauses (2008) (0)
- Analyzing and comparing the security of self-sovereign identity management systems through threat modeling (2023) (0)
- Mobile IPv6: Mobility Management and Security Aspects (2014) (0)
- Overview of the Continents of the Blogosphere (2015) (0)
- On the Structure and Assessment of Trust Models in Attribute Assurance (2021) (0)
- A document-centric method for combined synchronous and asynchronous applications (2013) (0)
- Fast Automated Processing and Evaluation of Identity Leaks (2016) (0)
- News Itm Researcher Win International Ipv6 Application Idea Contest (0)
- Power Systems: A Matter of Security and Privacy (2018) (0)
- Iterative Course Design in MOOCs: Evaluating a ProtoMOOC (2019) (0)
- A Social Aware Approach for Online Social Networks Data Allocation and Replication (2017) (0)
- Requirements on Data Structures in Formal Circuit Verification (1998) (0)
- What Is Hidden Behind the Term “Blockchain”? (2020) (0)
- Computer Aided Design and Test (Dagstuhl Seminar 9507) (2021) (0)
- Matching cognitively sympathetic individual styles to develop collective intelligence in digital communities (2017) (0)
- Social Media Story Telling (2015) (0)
- Variants and Extensions of OBDDs (1998) (0)
- Practical Network Security Teaching in an Online Virtual Laboratory (2011) (0)
- Boole'sche Algebra (2011) (0)
- Quellentexte Chemie. Von U. Dämmgen, R. Demuth und F. Kober. Verlag Diesterweg – Sauerländer, Frankfurt 1983. VI, 169 S., brosch. DM 19,80 (1984) (0)
- Analysis of Sequential Systems (1998) (0)
- Wie aus lokalen Netzwerken ein globales Ganzes wird (2021) (0)
- Jost Weyer: Graf Wolfgang II. von Hohenlohe und die Alchemie. Alchemistische Studien in Schloß Weikersheim, 1587-1610. (Forschungen aus Württembergisch Franken, Bd 39) Sigmaringen: J. Thorbecke Verlag 1992. 516 SS., 73 Abb. auf 60 Taf. ISBN 3-7995-7639-8. DM 88 (1994) (0)
- Wo endet der Hype, wo beginnt die Innovation der Blockchain-Technologie? (2020) (0)
- Vorwort: Alltagstauglichkeit von Anwendungssystemen und Infrastrukturen (2008) (0)
- X-Tracking the Changes of Web Navigation Patterns (2009) (0)
- Willkommen im Netz der Netze (2021) (0)
- Rühmkorff, Röntgen, Regensburg: Historische Experimente zur Gasentladung, hrsg. v. Christoph Meinel (1997) (0)
- Netzzugangsschicht (1): Kabelgebundene LAN-Technologien (2012) (0)
- Der elektronische Personalausweis? - Elektronische Signaturen und staatliche Verantwortung (2002) (0)
- WLAN – Netzwerk im Äther (2021) (0)
- Digitale Signaturen in der Verwaltung (2003) (0)
- XVII. Internationaler Kongreß für Geschichte der Naturwissenschaft in Berkeley, Kalifornien, 31. 7.‐8. 8. 1985. (1987) (0)
- Die Vision des intelligenten Webs (2021) (0)
- Design Thinking and Messy Practices (2019) (0)
- Einblicke in die Interaktion zwischen Lernenden am Beispiel eines Massive Open Online Courses – eine empirische Analyse (2016) (0)
- About the by Codings of Environments Induced Posets [az, <=] and [Lz, <=] (1981) (0)
- Liebig und die Agrikulturchemie: „Justus von Liebig: Boden, Ernährung, Leben: Texte aus vier Jahrzehnten.” Hrsg. von W. Lewicki und G. E. Siebeneicher. Edition Siebeneicher; Paul Pietsch Verlag, Stuttgart 1989. 222 S., Abb., Tab., DM 39,—. ISBN 3-922201-06-7 (1990) (0)
- Varianten und Erweiterungen von OBDDs (1998) (0)
- Unter vier Augen — Sicherheit im Internet (2004) (0)
- Glossar sicherheitstechnischer Begriffe (2014) (0)
- Der Cache, das Kurzzeitgedächtnis des Internets (2021) (0)
- Projekte und Einsatzbereiche der Blockchain-Technologie (2020) (0)
- Datentransfer bis ans andere Ende der Welt — WAN-Technologien (2004) (0)
- Wenn das Internet zu schnell vergisst (2020) (0)
- Aufgaben für die Chemiegeschichte (2017) (0)
- Das sollten Sie wissen, um die Blockchain-Technologie zu verstehen (2020) (0)
- Schöne neue (Digital-) Welt (2021) (0)
- Weiterbildung aus dem Netz (2015) (0)
- Wie funktioniert ein Computernetzwerk? (2021) (0)
- Systemweite Datenanalyse für Learning Analytics und datengetriebene Entscheidungen in Lernumgebungen (2019) (0)
- Wer regiert das Internet? (2021) (0)
- Augen-Blicke fixiert (2008) (0)
- Über die durch Kodierungen induzierte Hierarchie von Umwelten und Labyrinthen (1982) (0)
- Graphen und Bäume (2015) (0)
- Schulrechner wandern in die Cloud - Was bedeutet das für die unterschiedlichen Stakeholder? (2017) (0)
- Die Luftpumpe, das Vakuum und die Anfänge der Physik in Regensburg, 2. Aufl. (2004) (0)
- Wie das Internet zur größten Mediathek der Welt wurde (2021) (0)
- Das Web wird lebendig — Skriptsprachen und CGI-Programmierung (2004) (0)
- Technische Grundlagen des Internet (22) - XML (Extensible Markup Language) (2005) (0)
- Adaptive post recognition: combine feeds and linked html pages to generate blog templates (2014) (0)
- tele-TASK - Ein praktikables, Standardkomponenten-basiertes, mobil einsetzbares Teleteaching-System (2005) (0)
- Wie die E-Mail zur kommunikativen Allzweckwaffe wurde (2021) (0)
- Liebigs Experimentalvorlesung – Vorlesungsbuch und Kekulés Mitschrift. Hrsg. von o. p. Krätz und c. Priesner. Verlag Chemie, Weinheim – Deerfield Beach, Florida – Basel 1983. XII, 498 S., DM 160, – (1984) (0)
- Neues Maschinenzeitalter – und was es möglich macht (2021) (0)
- MOOCs – am Beispiel openHPI (2015) (0)
- Pixelcodes – BMP, JPEG, PNG und Co. (2021) (0)
- Anwendungsschicht und Internetanwendungen (2012) (0)
- TI-jPACS - eine frei verfügbare leistungsfähige Plattform zur medizinischen Bildverarbeitung und -visualisierung (2004) (0)
- Symposium “Wissenschaftsgeschichte und Wissenschaftskultur in Europa” in Florenz (13.‐14.12.1991) (1992) (0)
- Als offenes Netzwerk bietet das Internet Angreifern leichte Beute (2014) (0)
- Physikalische Trennung als Ultima Ratio im Hochsicherheitsbereich (2007) (0)
- OBDDs — Geordnete binäre Entscheidungsgraphen (1998) (0)
- 10 Jahre ECCC - Eine Digitale Bibliothek in weltweiter Benutzung (2004) (0)
- IPv6 – Wie das Internet die Dinge findet (2021) (0)
- Anforderungen an Datenstrukturen für die formale Schaltkreisverifikation (1998) (0)
- Mengen und Mengenoperationen (2015) (0)
- Vorgeschichte und Gründung des Kaiser‐Wilhelm‐Instituts für Kohlenforschung in Mülheim a. d. Ruhr (Zeitschrift des Geschichtsvereins Mülheim a. d. Ruhr, Heft 60). Von M. Rasch. v. d. Linnepe Verlagsgesellschaft, Hagen 1987. 214 S., kartoniert, DM 26.00. – ISBN 3‐921297‐77‐X/ISSN 0343‐9452 (1988) (0)
- Technische Grundlagen des Internet (21) - HTML und CSS (2005) (0)
- Abbildungen und Funktionen (2015) (0)
- Gamification - nur Brokkoli mit Schokoladenüberzug oder doch mehr? (2022) (0)
- Vorrichtung zur übertragung von live-veranstaltungen über ein computernetzwerk (2010) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Christoph Meinel?
Christoph Meinel is affiliated with the following schools: