Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
IEEE pervasive computing, 2015-01, Vol.14 (1), p.34-43
2015

IEEE network, 2010-01, Vol.24 (1), p.26-31
2010

2013 IEEE 14th International Conference on Mobile Data Management, 2013, Vol.2, p.51-56
2013




Proceedings of the Ninth Symposium on Usable Privacy and Security, 2013, p.1-14
2013
Link zum Volltext

Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces, 2014, p.149-158
2014
Link zum Volltext

Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, 2013, p.83-86
2013
Link zum Volltext

Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014, p.499-510
2014
Link zum Volltext

Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014, p.20-29
2014
Link zum Volltext

Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, 2014, p.133-142
2014
Link zum Volltext

Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, 2013, p.75-78
2013
Link zum Volltext


Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, 2013, p.325-334
2013
Link zum Volltext

Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, 2013, p.223-226
2013
Link zum Volltext

Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012, p.752-757
2012
Link zum Volltext

2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, 2011, p.104-108
2011

2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 2012, p.407-410
2012

Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012, p.1-4
2012
Link zum Volltext

2009 IEEE 34th Conference on Local Computer Networks, 2009, p.14-21
2009

2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011, p.935-941
2011

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, p.474-481
2012

2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013, p.364-367
2013