|
201 |
Lightweight intrusion detection in wireless sensor networks Riecker, Michael, 2015
|
|
|
202 |
Management and scheduling of accelerators for heterogeneous high-performance computing Beisel, Tobias. - Berlin : Logos Verlag Berlin GmbH, 2015
|
|
|
203 |
Mixed workload management in-memory databases Wust, Johannes, 2015
|
|
|
204 |
Model and proof theory of constructive ALC Scheele, Stephan M.. - Bamberg : Univ. of Bamberg Press, 2015
|
|
|
205 |
Model-based runtime adaption of resource constrained devices Saller, Karsten, 2015
|
|
|
206 |
Model-integrating software components Derakhshanmanesh, Mahdi. - Wiesbaden : Springer Vieweg, 2015
|
|
|
207 |
Model-supported process adoption and assessment in the context of multiple practice repositories Jeners, Simona C.. - Aachen : Shaker, 2015
|
|
|
208 |
Modifizierte cross-parity codes zur schnellen Mehrbit-Fehlerkorrektur Hosp, Sven, 2015
|
|
|
209 |
Novel attack patterns and protection measures for computing in high security environments Hanspach, Michael, 2015
|
|
|
210 |
On formalizing UML and OCL features and their employment to runtime verification Hamann, Lars, 2015
|
|