Search

Your search keyword '"Hartenstein, A."' showing total 320 results

Search Constraints

Start Over You searched for: Author "Hartenstein, A." Remove constraint Author: "Hartenstein, A." Topic computer science Remove constraint Topic: computer science
320 results on '"Hartenstein, A."'

Search Results

1. Coupling Smart Contracts: A Comparative Case Study

2. A visual pathway for skylight polarization processing in Drosophila

3. A visual pathway for skylight polarization processing inDrosophila

4. Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools

5. The Data Promise

6. Fundamental Properties of the Layer Below a Payment Channel Network

7. Matrix Decomposition – Analysis of an Access Control Approach on Transaction-based DAGs without Finality

8. Practical Trade-Offs in Integrity Protection for Binaries via Ethereum

9. A Glimpse of the Matrix – Scalability issues of a new message-oriented data synchronization middleware

10. Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin

11. Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin

12. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin

13. TEE-based distributed watchtowers for fraud protection in the Lightning Network

14. Designing fail-safe and traffic efficient 802.11p-based rear-end collision avoidance

15. Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption

16. Spatio-Temporal Traffic Flow Forecasting on a City-Wide Sensor Network

17. Inter-vehicle communication: Quo vadis

18. Special Section on Vehicular Networks and Communication Systems: From Laboratory into Reality

19. Could Network Information Facilitate Address Clustering in Bitcoin?

20. Data Privacy Management, Cryptocurrencies and Blockchain Technology

21. Using Oblivious RAM in Genomic Studies

22. Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network

23. Decentralized Secure Data Sharing with Attribute-Based Encryption

24. Contextual Communications Congestion Control for Cooperative Vehicular Networks

25. A tutorial survey on vehicular ad hoc networks

26. Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime

27. Foreword

28. On the Resource Consumption of Secure Data Sharing

29. A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe

30. Model-Based Concurrency Analysis of Network Simulations

31. A simulation model for analysis of attacks on the Bitcoin peer-to-peer network

33. Prototyping time- and space-efficient computations of algebraic operations over dynamically reconfigurable systems modeled by rewriting-logic

34. Geographic routing in city scenarios

35. Stochastic Properties of the Random Waypoint Mobility Model

36. Contention-based forwarding for mobile ad hoc networks

37. A performance comparison of Mobile IPv6, Hierarchical Mobile IPv6, fast handovers for Mobile IPv6 and their combination

38. Configware and morphware going mainstream

39. Especificación, exploración y simulación arquitectónicas a través de la lógica de reescritura

40. A simulation study on the performance of Mobile IPv6 in a WLAN-based cellular network

41. Positionsbasiertes Routing für die Kommunikation zwischen Fahrzeugen (Position-Based Routing for Inter-Vehicle Communication)

42. Appropriate selection of urban vehicle-to-vehicle radio propagation models

43. Self-optimization of DHT lookups through run-time performance analysis

44. Understanding differences in MAC performance

45. A survey on position-based routing in mobile ad hoc networks

46. Application-Based Congestion Control Policy for the Communication Channel in VANETs

47. Spoilt for choice

48. From implicit to explicit knowledge

49. Parallelism Potentials in Distributed Simulations of Kademlia-Based Peer-to-Peer Networks

50. Inter-Vehicular Communication -- Quo Vadis (Dagstuhl Seminar 13392)

Catalog

Books, media, physical & digital resources