default search action
Information Technology, Volume 58
Volume 58, Number 1, February 2016
- Sebastian Lehnhoff, Astrid Nieße:
Energy Informatics. 1-2 - Denis Bytschkow:
Towards composition principles and fractal architectures in the context of smart grids. 3-14 - Fabian Kern:
Load flexibility in an industrial setting: Energy-aware test rig scheduling in the automotive industry. 15-21 - Jennifer Schoch:
Modeling of battery life optimal charging strategies based on empirical mobility data. 22-28 - Marie Antoinette van Amelsvoort:
SG-rating - Putting values on smart grid architectures. 29-36 - Oleg Valgaev, Friederich Kupzog:
Building power demand forecasting. 37-43 - Judith Michael:
Using cognitive models for behavioral assistance of humans. 44-48 - Tudor B. Ionescu, Walter Scheuermann:
Architecting safety-critical decision-support systems for nuclear emergency management. 49-60
Volume 58, Number 2, March 2016
- Manfred Thaller:
Computer science in humanities. 61-62 - Desmond Allan Schmidt:
Using standoff properties for marking-up historical documents in the humanities. 63-69 - Alexander Mehler, Rüdiger Gleim, Tim vor der Brück, Wahed Hemati, Tolga Uslu, Steffen Eger:
Wikidition: Automatic lexiconization and linkification of text corpora. 70-79 - Lambert Schomaker:
Design considerations for a large-scale image-based text search engine in historical manuscript collections. 80-88 - Hubert Mara:
Made in the humanities: Dual integral invariants for efficient edge detection. 89-96 - Guy De Tré, Jeroen Deploige:
Time modelling in digital humanities. Challenges posed by the development of a database of medieval charters. 97-103 - Juan A. Barceló:
The role of computers to understand the past. The case of archaeological research. 104-111 - Kalman Graffi:
Decentralized communication against surveillance and privacy violation. 112-116
Volume 58, Number 3, June 2016
- Ivo Grosse, Katrin Hoffmann:
Bioinformatics challenges of next generation sequencing. 117-118 - Steve Hoffmann, Peter F. Stadler:
Read mapping. 119-125 - Eugene W. Myers:
A history of DNA sequence assembly. 126-132 - Dongwan D. Kang, Edward M. Rubin, Zhong Wang:
Reconstructing single genomes from complex microbial communities. 133-139 - Peter M. Krawitz:
Challenges ahead for matchmaking. 140-144 - Elmar Jürgens:
Software maintenance research that is empirically valid and useful in practice. 145-149 - Wojciech Samek:
On robust spatial filtering of EEG in nonstationary environments. 150-154
Volume 58, Number 4, August 2016
- Erhard Rahm:
Big Data Analytics. 155-156 - Tilmann Rabl, Jonas Traub, Asterios Katsifodimos, Volker Markl:
Apache Flink in current research. 157-165 - André Petermann, Martin Junghanns:
Scalable business intelligence with graph collections. 166-175 - Martin Hahmann, Claudio Hartmann, Lars Kegel, Dirk Habich, Wolfgang Lehner:
Big by blocks: modular analytics. 176-185 - Wolfram Wingerath, Felix Gessert, Steffen Friedrich, Norbert Ritter:
Real-time stream processing for Big Data. 186-194 - Stefan Hagedorn, Philipp Götze, Omran Saleh, Kai-Uwe Sattler:
Stream processing platforms for analyzing big dynamic data. 195-205 - Marwan Hassani, Thomas Seidl:
Clustering Big Data streams: recent challenges and contributions. 206-213
Volume 58, Number 5, October 2016
- Alexander De Luca, Emanuel von Zezschwitz:
Usable privacy and security. 215-216 - Martin Ortlieb, Ryan Garner:
Sensitivity of personal data items in different online contexts. 217-228 - Florian Schaub, Travis D. Breaux, Norman M. Sadeh:
Crowdsourcing privacy policy analysis: Potential, challenges and best practices. 229-236 - Sauvik Das:
Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. 237-245 - Daniel Buschek:
There is more to biometrics than user identification: Making mobile interactions personal, secure and representative. 247-253 - Andrea Bianchi, Ian Oakley:
Wearable authentication: Trends and opportunities. 255-262
Volume 58, Number 6, December 2016
- Jürgen Teich:
Invasive computing. 263-265 - Stefan Wildermann, Michael Bader, Lars Bauer, Marvin Damschen, Dirk Gabriel, Michael Gerndt, Michael Glaß, Jörg Henkel, Johny Paul, Alexander Pöppl, Sascha Roloff, Tobias Schwarzer, Gregor Snelting, Walter Stechele, Jürgen Teich, Andreas Weichslgartner, Andreas Zwinkau:
Invasive computing for timing-predictable stream processing on MPSoCs. 267-280 - Gabor Drescher, Christoph Erhardt, Felix C. Freiling, Johannes Götzfried, Daniel Lohmann, Pieter Maene, Tilo Müller, Ingrid Verbauwhede, Andreas Weichslgartner, Stefan Wildermann:
Providing security on demand using invasive computing. 281-295 - Santiago Pagani, Lars Bauer, Qingqing Chen, Elisabeth Glocker, Frank Hannig, Andreas Herkersdorf, Heba Khdr, Anuj Pathania, Ulf Schlichtmann, Doris Schmitt-Landsiedel, Mark Sagi, Éricles Sousa, Philipp Wagner, Volker Wenzel, Thomas Wild, Jörg Henkel:
Dark silicon management: an integrated and coordinated cross-layer approach. 297-307 - Vahid Lari, Andreas Weichslgartner, Alexandru Tanase, Michael Witterauf, Faramarz Khosravi, Jürgen Teich, Jan Heißwolf, Stephanie Friederich, Jürgen Becker:
Providing fault tolerance through invasive computing. 309-328 - Georgiana Copil, Daniel Moldovan, Hong Linh Truong, Schahram Dustdar:
Continuous elasticity: Design and operation of elastic systems. 329-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.