170 results on '"Huth, Michael"'
Search Results
2. Status Quo of Supply Chain Risk Management: Results of an Empirical Study in Germany
3. Complex-Shaped 3D Nanoarchitectures for Magnetism and Superconductivity
4. Inductive Approach: Potential, Limitations, and Pragmatics
5. Inductive Proofs
6. Propositions and Sets
7. Relations and Functions
8. Inductive Definitions
9. Introduction
10. Risk Engineering and Blockchain: Anticipating and Mitigating Risks
11. Vergasung fester und flüssiger Brennstoffe
12. Risk Management of Critical Logistical Infrastructures: Securing the Basis for Effective and Efficient Supply Chains
13. Static Analysis for Proactive Security
14. The Merits of Compositional Abstraction: A Case Study in Propositional Logic
15. Making Sense of Cybersecurity in Emerging Technology Areas
16. Besonderheiten des Logistik-Risikomanagements in der verarbeitenden Industrie
17. Besonderheiten des Logistik-Risikomanagements bei Logistikdienstleistern
18. Aufbau- und ablauforganisatorische Einbindung des Risikomanagements in der Logistik
19. Struktur des Risikomanagements in der Logistik
20. Grundlagen des Risikomanagements in der Logistik
21. Einleitung
22. Secure Multi-party Computation: Information Flow of Outputs and Game Theory
23. Centrally Governed Blockchains: Optimizing Security, Cost, and Availability
24. Static Analysis of Parity Games: Alternating Reachability Under Parity
25. Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks
26. PEALT: An Automated Reasoning Tool for Numerical Aggregation of Trust Evidence
27. On Designing Usable Policy Languages for Declarative Trust Aggregation
28. Der Risikobegriff im Zusammenhang mit der Gefahrgutbeförderung
29. Risikoanalysen für die Gefahrgutbeförderung
30. Logistische Systeme für die Beförderung von Gefahrgütern
31. Geografisches Entscheidungsunterstützungssystem für das Risikomanagement der Gefahrgutbeförderung
32. Lösungsansätze für ausgewählte Aufgabenstellungen des Risikomanagements der Gefahrgutbeförderung
33. Zusammenfassung
34. Einleitung
35. Towards Usable Generation and Enforcement of Trust Evidence from Programmers’ Intent
36. Fatal Attractors in Parity Games
37. On the Modeling and Verification of Security-Aware and Process-Aware Information Systems
38. Concurrent Small Progress Measures
39. A Framework for the Modular Specification and Orchestration of Authorization Policies
40. Towards an Access-Control Framework for Countering Insider Threats
41. Vergasung fester und flüssiger Brennstoffe
42. An Authorization Framework Resilient to Policy Evaluation Failures
43. Three-Valued Abstractions of Markov Chains: Completeness for a Sizeable Fragment of PCTL
44. Complexity of Decision Problems for Mixed and Modal Specifications
45. Model Checking for Action Abstraction
46. Hector: Software Model Checking with Cooperating Analysis Plugins : (Tool Paper)
47. More Precise Partition Abstractions
48. Ranked Predicate Abstraction for Branching Time: Complete, Incremental, and Precise
49. An Abstraction Framework for Mixed Non-deterministic and Probabilistic Systems
50. Kohle- und Teervergasung
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.