WIKINDX

TZI Literaturverzeichnis

List Resources

Displaying 2501 - 2525 of 3135 (Bibliography: WIKINDX Master Bibliography)
 
Parameters:
Category:  
J. Smeddinck, M. Krause and K. Lubitz, "Mobile Game User Research: The World as Your Lab?" in Proceedings of the CHI Game User Research Workshop, 2013, Added by: Digitale Medien  v    Pop. 13.72%
J. Smeddinck, S. Siegel and M. Herrlich, "Adaptive Difficulty in Exergames for Parkinson’s disease Patients} abstract = Parkinson’s disease ({PD) patients can benefit from regular physical exercises which may ease their symptoms and can slow down the progression of the disease. Motion-based vid" in Proceedings of Graphics Interface 2013, 2013, Added by: Digitale Medien  v    Pop. 13.24%
J. Smeddinck, K. M. Gerling and S. Tiemkeo, "Visual complexity, player experience, performance and physical exertion in motion-based games for older adults" in Proceedings of the 15th International ACM SIGACCESS Conference on Computers and Accessibility, ser. ASSETS '13, New York, NY, USA, 2013, p. 25. Added by: Digitale Medien  v    Pop. 14.86%
J. D. Smeddinck, J. Voges, M. Herrlich and R. Malaka, "Comparing modalities for kinesiatric exercise instruction" in CHI'14 Extended Abstracts on Human Factors in Computing Systems, 2014, pp. 2377–2382. Added by: Digitale Medien  v    Pop. 9.44%
J. D. Smeddinck, M. Herrlich, M. Roll and R. Malaka, "Motivational Effects of a Gamified Training Analysis Interface", Mensch \& Computer 2014-Workshopband, 2014. Added by: Digitale Medien  v    Pop. 8.97%
J. D. Smeddinck, K. M. Gerling and R. Malaka, "Anpassbare Computerspiele für Senioren", Informatik-Spektrum, vol. 37, iss. 6, pp. 575–579, Dec. 2014. Added by: Digitale Medien  v    Pop. 9.4%
J. D. Smeddinck, J. Hey, N. Runge, M. Herrlich, C. Jacobsen, J. Wolters and R. Malaka, "MoviTouch: Mobile Movement Capability Configurations" in Proceedings of the 17th International ACM SIGACCESS Conference on Computers Accessibility, ser. ASSETS '15, Lisbon, Portugal, 2015, pp. 389–390. Last edited by: Digitale Medien  v    Pop. 4.56%
J. D. Smeddinck, M. Herrlich and R. Malaka, "Exergames for Physiotherapy and Rehabilitation: A Medium-term Situated Study of Motivational Aspects and Impact on Functional Reach" in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ser. CHI '15, Seoul, Republic of Korea, 2015, pp. 4143–4146. Last edited by: Digitale Medien  v    Pop. 4.94%
B. Sniezynski, W. Wójcik, J. D. Gehrke and J. Wojtusiak, "Combining Rule Induction and Reinforcement Learning: An Agent-based Vehicle Routing Example" in Ninth International Conference on Machine Learning and Applications, Washington, DC, USA, Dec. 12-14, 2010, pp. 851–856. Last edited by: Jan D. Gehrke  v    Pop. 21.59%
M. Soeken, R. Wille, M. Kuhlmann, M. Gogolla and R. Drechsler, "Verifying UML/OCL Models Using Boolean Satisfiability" in Proc. Design, Automation and Test in Europe~(DATE'2010), W. Müller, Ed., 2010, Added by: Mirco Kuhlmann  v    Pop. 17.23%
K. Sohr, "Nicht verifizierter Code: Eine neue Sicherheitslücke in Java" in Java-Informations-Tage, Düsseldorf, Germany, 1999, pp. 171–181. Last edited by: Karsten Sohr  v    Pop. 34.93%
K. Sohr, "Sandkastenspiele", c't, no. 11, pp. 226–232, 2000. Last edited by: Jan Harder  v    Pop. 22.64%
K. Sohr, "Die Sicherheitsaspekte von mobilem Code", PhD thesis, Philipps-Universität Marburg, 2001. Last edited by: Karsten Sohr  v    Pop. 26.15%
K. Sohr, G.-J. Ahn, M. Gogolla and L. Migge, "Specification and Validation of Authorization Constraints using UML and OCL" in Proc. 10th European Symp. Research in Computer Security~(ESORICS'2005), S. DeCapitani, P. F. Syverson and D. Gollmann, Eds., 2005, p. 64–79. Added by: Deleted user  v    Pop. 44.47%
K. Sohr, G.-J. Ahn, M. Gogolla and L. Migge, "Specification and Validation of Authorisation Constraints Using UML and OCL" in 10th European Symposium on Research in Computer Security, 2005, pp. 64–79. Last edited by: Karsten Sohr  v    Pop. 35.36%
K. Sohr, M. Drouineaud and G.-J. Ahn, "Formal specification of role-based security policies for clinical information systems" in ACM Symposium on Applied Computing (SAC), Santa Fe, AZ, USA, 2005, pp. 332–339. Last edited by: Karsten Sohr  v    Pop. 39.72%
K. Sohr, G.-J. Ahn and L. Migge, "Articulating and enforcing authorisation policies with UML and OCL", ACM SIGSOFT Software Engineering Notes, vol. 30, iss. 4, pp. 1–7, 2005. Added by: Karsten Sohr  v    Pop. 35.88%
K. Sohr, M. Drouineaud, G.-J. Ahn and M. Gogolla, "Analyzing and Managing Role-Based Access Control Policies", IEEE Trans. Knowl. Data Eng. vol. 20, iss. 7, pp. 924–939, 2008. Added by: Karsten Sohr  v    Pop. 39.53%
K. Sohr, T. Mustafa, X. Bao and G.-J. Ahn, "Enforcing Role-Based Access Control Policies in Web Services with UML and OCL" in 24th Annual Computer Security Applications Conference, Anaheim, CA, USA, 2008, Last edited by: Karsten Sohr  v    Pop. 42.34%
K. Sohr, M. Drouineaud, G.-J. Ahn and M. Gogolla, "Analysing and Managing Role-Based Access Control Policies", IEEE Transactions on Knowledge and Data Engineering, 2008. Added by: Mirco Kuhlmann  v    Pop. 32.99%
K. Sohr and B. Berger, "Towards Architecture-Centric Security Analysis of Software" in 2nd International Symposium on Engineering Secure Software and Systems, Pisa, Italy, 2010, Added by: Jan Harder  v    Pop. 27.05%
K. Sohr, T. Mustafa and A. Nowak, "Software Security Aspects of Java-Based Mobile Phones" in 26th ACM Symposium on Applied Computing, Taichung, Taiwan, 2011, Last edited by: Karsten Sohr  v    Pop. 20.93%
K. Sohr, M. Kuhlmann, M. Gogolla, H. Hu and G.-J. Ahn, "Comprehensive Two-Level Analysis of Role-Based Delegation and Revocation Policies with UML and OCL", Information and Software Technology, vol. 54, iss. 12, p. 1396–1417, 2012. Added by: Angela Schramm  v    Pop. 15.85%
C. Sommer, A. Schmidt, Y. Chen, R. German, W. Koch and F. Dressler, "On the Feasibility of UMTS-based Traffic Information Systems", Elsevier Ad Hoc Networks, Special Issue on Vehicular Networks, vol. 8 (5), pp. 506–517, July 2010. Added by: Martina Kammann  v    Pop. 14.38%
V. Son, B.-L. Wenning, A. Timm-Giel and C. Görg, "A model of wireless sensor networks using context-awareness in logistic applications" in 9th international conference on ITS telecommunications, Lille, France, Oct. 20-22, 2009, pp. 2–7. Last edited by: Martina Kammann  v    Pop. 21.03%

Start   |   2401 - 2425   |   2426 - 2450   |   2451 - 2475   |   2476 - 2500   |   2501 - 2525   |   2526 - 2550   |   2551 - 2575   |   2576 - 2600   |   2601 - 2625   |   End
wikindx      |     Total Resources:  3135     |     Database queries:  111     |     Script execution:  0.87527 secs