Springer, 0-387

Central database

Publisher

  1. 2014
  2. Published

    Symmetry Reduction in Infinite Games with Finite Branching. / Markey, Nicolas; Vester, Steen.

    Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA 2014). ed. / Franck Cassez; Jean-François Raskin. Springer, 2014. p. 281-296 (Lecture Notes in Computer Science; No. 8837).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  3. Published

    Security and Privacy in Video Surveillance: Requirements and Challenges. / Mahmood Rajpoot, Qasim; Jensen, Christian D.

    ICT Systems Security and Privacy Protection: Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC) 2014. ed. / Nora Cuppens-Boulahia; Sushil Jajodia; Anas Abou El Kalam; Thierry Sans. Springer, 2014. p. 169-184 (IFIP AICT - Advances in Information and Communication technology, Vol. 428).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  4. Published

    Concentrated Hitting Times of Randomized Search Heuristics with Variable Drift. / Lehre, Per Kristian; Witt, Carsten.

    Proceedings of the 25th International Symposium on Algorithms and Computation, ISAAC 2014. ed. / Hee-Kap Ahn; Chan-Su Shin. Springer, 2014. p. 686-697 (Lecture Notes in Computer Science; No. 8889).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  5. Published

    N3 Bias Field Correction Explained as a Bayesian Modeling Method. / Larsen, Christian Thode; Iglesias, Juan Eugenio; Van Leemput, Koen.

    Bayesian and Graphical Models for Biomedical Imaging: Revised Selected Papers of the first International Workshop on Bayesian and Grahical Models for Biomedical Imaging, BAMBI 2014. Springer, 2014. p. 1-12 (Lecture Notes in Computer Science; No. 8677).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  6. Published

    Sublinear Space Algorithms for the Longest Common Substring Problem. / Kociumaka, Tomasz; Starikovskaya, Tatiana; Vildhøj, Hjalte Wedel.

    Algorithms - ESA 2014: Proceedings of the 22th Annual European Symposium 2014. ed. / Andreas S. Schulz; Dorothea Wagner. Springer, 2014. p. 605-617 (Lecture Notes in Computer Science, Vol. 8737).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  7. Evaluation of Mesoscale Model Profiles Against Consecutive Radiosounding Data During the Sofia 2003 Experiment. / Kirova, H.; Batchvarova, Ekaterina; Nikolov, Valeri .

    Air Pollution Modeling and its Application XXIII. ed. / Douw Steyn; Rohit Mathur. Springer, 2014. p. 531-534 (Springer Proceedings in Complexity).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  8. Published

    The role of simulation in designing for universal access. / Keates, Simeon; Looms, Peter.

    Universal Access in Human-Computer Interaction. Design and Development Methods for Universal Access: 8th International Conference, UAHCI 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part I. ed. / Stephanidis Constantine ; Antona Margherita . Vol. 8513 Springer, 2014. p. 54-63 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  9. Published

    The AORTA Architecture: Integrating Organizational Reasoning in Jason. / Jensen, Andreas Schmidt; Dignum, Virginia; Villadsen, Jørgen.

    Engineering Multi-Agent Systems. Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers. ed. / Fabiano Dalpiaz; Jürgen Dix; M. Birna van Riemsdijk. Springer, 2014. p. 127-145 (Lecture Notes in Computer Science, Vol. 8758).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  10. Published

    Remote Biometrics for Robust Persistent Authentication. / Ingwar, Mads Ingerslew; Jensen, Christian D.

    Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013. Revised Selected Papers. ed. / Joaquin Garcia-Alfaro; Georgios Lioudakis; Nora Cuppens-Boulahia; Simon Foley; William M. Fitzgerald. Springer, 2014. p. 250-267 (Lecture Notes in Computer Science; No. 8247).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  11. Published

    The Use of Modelling Methods for Product Configuration in Industrial Applications. / Hvam, Lars; Bonev, Martin; Haug, Anders ; Mortensen, Niels Henrik.

    Proceedings of the 7th World Conference on Mass Customization, Personalization, and Co-Creation (MCPC 2014). ed. / T.D. Brunoe. Springer, 2014. p. 529-539 (Lecture Notes in Production Engineering).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

Previous 1 2 3 4 5 6 7 8 ...94 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word