Author of the publication

Großrechner-Anschluß an Kommunikationsvorrechner.

, , and . Prax. Inf.verarb. Kommun., 16 (2): 70-77 (1993)10.1515/piko.1993.16.2.62.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive verification of communication software on the basis of CIL., and . Comput. Commun. Rev., 14 (2): 92-99 (1984)A small-scale model house evaluation platform for building automation systems., , and . ETFA, page 1-8. IEEE, (2016)Telekommunikation und Datenhaltung., , and . Hanser, (1993)Großrechner-Anschluß an Kommunikationsvorrechner., , and . Prax. Inf.verarb. Kommun., 16 (2): 70-77 (1993)10.1515/piko.1993.16.2.62.Telemonitoring and Medical Care of Heart Failure Patients Supported by Left Ventricular Assist Devices - The Medolution Project., , , , , , , , , and 3 other author(s). eHealth, volume 236 of Studies in Health Technology and Informatics, page 267-274. IOS Press, (2017)Policy-gesteuertes Management adaptiver und gütegesicherter Dienstesysteme im Projekt OSAMI., , , , , , and . GI Jahrestagung, volume P-154 of LNI, page 970-983. GI, (2009)Formale Modellierung und Analyse protokollbasierter Angriffe in TCP/IP Netzwerken am Beispiel von ARP und RIP., and . Sicherheit, volume P-62 of LNI, page 77-88. GI, (2005)Enhancing Long-Term Motivation of Cardiac Patients by Applying Exergaming in Rehabilitation Training., , , , , , , , , and 7 other author(s). pHealth, volume 237 of Studies in Health Technology and Informatics, page 183-187. IOS Press, (2017)Scalable model-based configuration management of security services in complex enterprise networks., , , and . Softw. Pract. Exp., 41 (3): 307-338 (2011)Improving the Configuration Management of Large Network Security Systems., , , and . DSOM, volume 3775 of Lecture Notes in Computer Science, page 36-47. Springer, (2005)