Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Open Access
Improving the Generalized Feistel
Fast Software Encryption, p.19-39
Link zum Volltext

Nestlé Nutrition workshop series. Pediatric programme, 2010, Vol.66, p.1-17
2010
Link zum Volltext

Lecture notes in computer science, 2006, p.141-158
2006
Link zum Volltext



Proceedings of the 2009 ACM workshop on scalable trusted computing, 2009, p.55-60
2009
Link zum Volltext

Proceedings of the 2nd International Workshop on software configuration management, 1989, p.15-22
1989
Link zum Volltext


CHI '13 Extended Abstracts on Human Factors in Computing Systems, 2013, p.1969-1978
2013
Link zum Volltext

2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA), 2015, p.1-13
2015

Proceedings of the 1988 ACM SIGPLAN and SIGOPS workshop on parallel and distributed debugging, 1988, p.163-173
1988
Link zum Volltext

Computer Forensics and Culture
Intelligence and Security Informatics, Vol.5075, p.288-297
Link zum Volltext

International Conference on Software Engineering: Proceedings of the 2005 conference on Specification and verification of component-based systems; 05-06 Sept. 2005, 2005, p.9-es
2005
Link zum Volltext

EAI endorsed transactions on industrial networks and intelligent systems, 2016, Vol.3 (8)
2016
Link zum Volltext

Proceedings of the Companion Publication of the 2015 Annual Conference on genetic and evolutionary computation, 2015, p.263-292
2015
Link zum Volltext

International Conference on Software Engineering, 1992, p.246-259
1992

2012 7th ACM/IEEE International Conference on Human-Robot Interaction (HRI), 2012, p.97-104
2012

Proceedings of the 2011 conference on information technology education, 2011, p.3-8
2011
Link zum Volltext

11th International Symposium on Operations Research and its Applications in Engineering, Technology and Management 2013 (ISORA 2013), 2013, p.65-72
2013
Link zum Volltext

2014 International Conference on Information and Communications Technologies (ICT 2014), 2014, p.2.064
2014
Link zum Volltext

International Symposium on Memory Management: Proceedings of the 5th international symposium on Memory management; 10-11 June 2006, 2006, p.40-51
2006
Link zum Volltext

XCS with eligibility traces
Genetic And Evolutionary Computation Conference: Proceedings of the 2005 conference on Genetic and evolutionary computation; 25-29 June 2005, 2005, p.1851-1858
2005
Link zum Volltext

A data structure for gridless routing
17th Design Automation Conference, 1980, p.603-609
1980

Proceedings of Winter Simulation Conference, 1994, p.731-738
1994

International Conference on Management of Data: Proceedings of the 1979 ACM SIGMOD international conference on Management of data; 30 May-01 June 1979, 1979, p.179-190
1979
Link zum Volltext