Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Privacy Technologies and Policy, p.135-152
Link zum Volltext

2013 IEEE Security and Privacy Workshops, 2013, p.13-17
2013
Link zum Volltext

ICT Systems Security and Privacy Protection, p.351-358
Link zum Volltext

2012 7th International Conference on Computing and Convergence Technology (ICCCT), 2012, p.610-615
2012

2011 4th IFIP International Conference on New Technologies, Mobility and Security, 2011, p.1-4
2011

IEEE International Conference Mechatronics and Automation, 2005, 2005, Vol.3, p.1300-1305 Vol. 3
2005


International Conference on Software Engineering: Proceedings of the 2006 international workshop on Mining software repositories; 22-23 May 2006, 2006, p.65-71
2006
Link zum Volltext

2010 IEEE Virtual Reality Conference (VR), 2010, p.235-242
2010

Copy and paste redeemed
2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2015, p.630-640
2015
Link zum Volltext

2008 IEEE Virtual Reality Conference, 2008, p.189-192
2008


ACM Symposium on Solid and Physical Modeling: Proceedings of the fourth ACM symposium on Solid modeling and applications; 14-16 May 1997, 1997, p.181-194
1997
Link zum Volltext

ACM Symposium on Solid and Physical Modeling: Proceedings of the fourth ACM symposium on Solid modeling and applications; 14-16 May 1997, 1997, p.168-180
1997
Link zum Volltext

Design, User Experience, and Usability: Theory and Practice, p.608-627
Link zum Volltext

Proceedings of the 22nd European Conference on pattern languages of programs, 2017, p.1-11
2017
Link zum Volltext

2018 IEEE/ACM 5th International Workshop on Crowd Sourcing in Software Engineering (CSI-SE), 2018, p.1-8
2018

2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2015, p.819-823
2015
Link zum Volltext

2010 IEEE International Geoscience and Remote Sensing Symposium, 2010, p.4745-4748
2010



Proceedings of the 25th Conference on l'interaction homme-machine, 2013, p.115-124
2013
Link zum Volltext