„Cryptology.“
Suchergebnisse
1.000+ Treffer
-
Kontrolle und Überwachung von Beschäftigten
-
UML4ALL: Gemeinsam in Diversity Teams Software modellieren – Für Menschen mit und ohne Seheinschränkung
-
An overview of recommender systems in the healthy food domain
-
Commutative cryptanalysis as a generalization of differential cryptanalysis
-
Nachruf: Spiros Simitis
-
Umfassende Sicherheit – Safety und Security im Kontext autonomer Systeme
-
Multimedia tool as a predictor for social media advertising- a YouTube way
-
Human computation for constraint-based recommenders
-
Targeting customers for an optimized energy procurement – A Cost Segmentation Based on Smart Meter Load Profiles
-
Recommending multimedia visiting paths in cultural heritage applications
-
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination
-
Infant head and brain segmentation from magnetic resonance images using fusion-based deep learning strategies
-
Prozess-Familien-Punkte
-
Die automatisierte Messung von Cloud-Verarbeitungsstandorten – Datenquellen für eine Standortmetrik
-
Approximation Schemes for Minimizing the Maximum Lateness on a Single Machine with Release Times Under Non-availability or Deadline Constraints
-
Efficient facial expression recognition using histogram of oriented gradients in wavelet domain
-
Using word embeddings in Twitter election classification
-
Short Sequences of Improvement Moves Lead to Approximate Equilibria in Constraint Satisfaction Games
-
Die Zertifizierung nach der DSGVO – Innovatives, aber hochkomplexes Instrument
-
A polar model for fast object tracking in 360-degree camera images