81 results on '"Roschke A"'
Search Results
2. Multimedia Test set System - MuTeSys
3. Lightweight Social Organization and Coordination System for Non-Profit Associations
4. Adaptation of a Research-based Teaching-Learning Format with Approaches of Online Learning in the STEM Field
5. Multimedia Test set System - MuTeSys
6. Lightweight Social Organization and Coordination System for Non-Profit Associations
7. You can’t drive my car - a method to fingerprint individual driving styles in a sim-racing setting
8. Data set for long term driving recording using immersive motion simulation in virtual racing - IMSRace
9. You can’t drive my car - a method to fingerprint individual driving styles in a sim-racing setting
10. Data set for long term driving recording using immersive motion simulation in virtual racing - IMSRace
11. Blockchain Based Social Commitment -Secure & Reliable Web Services
12. Blockchain Based Social Commitment -Secure & Reliable Web Services
13. A Framework for an IT-based risk management for the third-party funding process in universities (TRINITY)
14. A Framework for an IT-based risk management for the third-party funding process in universities (TRINITY)
15. Source Attribution of Online News Images by Compression Analysis
16. A Framework for a Co-Creation Driven Research & Transfer Portal (CCDTP-Framework)
17. An Iterative Data Cleansing and Migration Framework for Research Information Systems
18. Source Attribution of Online News Images by Compression Analysis
19. A Framework for a Co-Creation Driven Research & Transfer Portal (CCDTP-Framework)
20. An Iterative Data Cleansing and Migration Framework for Research Information Systems
21. Exploratory Study of Established Strategy Games in the Context of Knowledge Transfer Based on Selected Learning Objects from the Economic Field
22. Game-Based Learning Using the Example of Finanzmars
23. Game-Based Learning Using the Example of Finanzmars
24. Exploratory Study of Established Strategy Games in the Context of Knowledge Transfer Based on Selected Learning Objects from the Economic Field
25. Real-Time Activity Detection of Human Movement in Videos via Smartphone Based on Synthetic Training Data
26. A Scalable System Architecture for Activity Detection with Simple Heuristics
27. Real-Time Activity Detection of Human Movement in Videos via Smartphone Based on Synthetic Training Data
28. Decision Making Model for Choosing Voice-Operated Intelligent Speakers for Graduate Students
29. A Scalable System Architecture for Activity Detection with Simple Heuristics
30. Decision Making Model for Choosing Voice-Operated Intelligent Speakers for Graduate Students
31. BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes
32. IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security
33. A Flexible and Efficient Alert Correlation Platform for Distributed IDS
34. Using vulnerability information and attack graphs for intrusion detection
35. A security laboratory for CTF scenarios and teaching IDS
36. A Specialized Tool for Simulating Lock-Keeper Data Transfer
37. Intrusion Detection in the Cloud
38. A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification
39. An Extensible and Virtualization-Compatible IDS Management Architecture
40. Parallel Processing of Data, Metadata, and Aggregates within an Archival Storage System User Interface (Toward Archiving a Million Files and a Million Megabytes per Minute)
41. Simulation of robust control for uncertain structural systems against earthquakes
42. HPSS at Los Alamos: Experiences and analysis
43. Fuzzy modeling of a magnetorheological damper using ANFIS
44. Neuro-fuzzy control of structures using magnetorheological dampers
45. Robust control for structural systems with parametric and unstructured uncertainties
46. Robust control for structural systems with structured uncertainties
47. Linearization of magnetorheological behaviour using a neural network
48. BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes
49. A Flexible and Efficient Alert Correlation Platform for Distributed IDS
50. Using vulnerability information and attack graphs for intrusion detection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.