From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Environment and Automata II., и . Elektronische Informationsverarbeitung und Kybernetik, 18 (3): 115-139 (1982)Tele-Lab IT-Security - IT Sicherheitstraining im Internet, , и . D-A-C-H Security 2005, syssec Verlag, (2005)Why HTTPS Is Not Enough – Signature-Based Architecture for Trusted Content on the WWW, , и . n Proc. of the 2007 IEEE / WIC /ACM Int. Conf. on Web Intelligence (WI 2007), (2007)location=Silicon Valley, date=2007.Segmenting of Recorded Lecture Videos - The Algorithm VoiceSeg., и . SIGMAP, стр. 317-322. INSTICC Press, (2006)A Unifying Theoretical Background for Some BDD-based Data Structures, и . Universität Trier, Mathematik/Informatik, Forschungsbericht, (1994)Nutzerfreundliche Internet-Sicherheit durch tagbasierte Zugriffskontrolle, , и . Good Tags and Bad Tags, Workshop on Social Tagging in der Wissensorganisation, стр. 211--221. Waxmann, (2008)Medizinische Bildverarbeitung - eine Übersicht, и . Universität Trier, Mathematik/Informatik, Forschungsbericht, (2004)A Note on Möbius Functions and the Communication Complexity of the Graph-Accessability-Problem. Universität Trier, Mathematik/Informatik, Forschungsbericht, (1992)On the Complexity of Constructing Optimal OBDD's, и . Universität Trier, Mathematik/Informatik, Forschungsbericht, (1994)Normalisation of Log Messages for Intrusion Detection, , , , , и . Journal of Information Assurance and Security, 9 (3): 167-176 (сентября 2014)