Search

Your search keyword '"Hartenstein, A."' showing total 290 results

Search Constraints

Start Over You searched for: Author "Hartenstein, A." Remove constraint Author: "Hartenstein, A." Publisher ieee Remove constraint Publisher: ieee
290 results on '"Hartenstein, A."'

Search Results

1. Decentralized Review and Attestation of Software Attribute Claims

3. Analysis of the Matrix Event Graph Replicated Data Type

7. On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues

12. Coupling Smart Contracts: A Comparative Case Study

14. Trap-Assisted Dopant Compensation Prevents Shunting in poly-Si Passivating Interdigitated Back Contact Silicon Solar Cells

16. Effect of Dopant Compensation on the Conductivity of the Intrinsic poly-Si Isolation Region in Passivated IBC Silicon Solar Cells

17. Submicron Thickness Characterization of poly-Si thin films on Textured Surfaces by X-ray Diffraction for Minimizing Parasitic Absorption in Poly-Si/SiO2 Passivating Contact Cells

18. Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools

19. Trap-Assisted Dopant Compensation Prevents Shunting in poly-Si Passivating Interdigitated Back Contact Silicon Solar Cells

20. Submicron Thickness Characterization of poly-Si thin films on Textured Surfaces by X-ray Diffraction for Minimizing Parasitic Absorption in Poly-Si/SiO2 Passivating Contact Cells

23. Understanding and Mitigating the Contamination of Intrinsic poly-Si Gaps in Passivated IBC Solar Cells

26. Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network

27. On the Resource Consumption of Secure Data Sharing

28. A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe

29. A simulation model for analysis of attacks on the Bitcoin peer-to-peer network

30. Automatic denoising parameter estimation using gradient histograms

32. Appropriate selection of urban vehicle-to-vehicle radio propagation models

33. Self-optimization of DHT lookups through run-time performance analysis

34. Understanding differences in MAC performance

37. Verification and evaluation of fail-safe Virtual Traffic Light applications

38. In-depth analysis and evaluation of Self-organizing TDMA

39. GRABEX: A Graph-Based Method for Web Site Block Classification and Its Application on Mining Breadcrumb Trails

40. The tunnel vision syndrome: Massively delaying progress

41. Balancing the requirements for a zero false positive/negative Forward Collision Warning

42. Can V2X communication help electric vehicles save energy?

43. Characterization and modeling of dissemination delays in inter-vehicle communication networks

44. FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services

45. Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies

46. Design methodology and evaluation of rate adaptation based congestion control for Vehicle Safety Communications

47. 5.9GHz IEEE 802.11p inter-vehicle communication: Non-Line-of-Sight reception under competition

48. A validated 5.9 GHz Non-Line-of-Sight path-loss and fading model for inter-vehicle communication

49. Towards a Basic DHT Service: Analyzing Network Characteristics of a Widely Deployed DHT

50. GPU-Based Architectures and Their Benefit for Accurate and Efficient Wireless Network Simulations

Catalog

Books, media, physical & digital resources