User: Guest  Login
Sort by:
and:
More ...

Bernd Bruegge;Asa MacWilliams;Thomas Reicher
Study on Software Architectures for Augmented Reality Systems
2004
81

More ...

Ulrich Rueckert;Lothar Richter;Stefan Kramer
Quantitative Associaton Rules Based on Half-Spaces: An Optimization Approach
2004
17

More ...

Stefan Wagner
Efficiency Analysis of Defect-Detection Techniques
2004
24

More ...

Stefan Wagner;María Victoria Cengarle;Peter Graubmann
Modelling System Families with Message Sequence Charts: A Case Study
2004
50

More ...

Prof. Gudrun Klinker;Ph.D. Martin Wagner (eds.)
2nd Joint Advanced Summer School 2004 Course3: Ubiquitous Tracking for Augmented Reality
2004
108

More ...

Robin Sommer;Vern Paxson
Exploiting Independent State For Network Intrusion Detection
2004
26

More ...

Jan Juerjens;Thomas A. Kuhn
Practical Security Analysis of C Programs Using Automated Theorem Proving
2004
26

More ...

Jan Juerjens;Thomas A. Kuhn
Automated Theorem Proving for Cryptographic Protocols with Automatic Attack Generation
2004
21

More ...

Sven Kosub
Local Density
2004
31

More ...

Frank Kammer;Hanjo Täubig
Graph Connectivity
2004
47