default search action
Information Technology, Volume 61
Volume 61, Number 1, February 2019
- Ilia Polian:
Hardware-oriented security. 1-2 - Viktor Fischer, Florent Bernard, Nathalie Bochard:
Modern random number generator design - Case study on a secured PLL-based TRNG. 3-13 - Florian Bache, Christina Plump, Jonas Wloka, Tim Güneysu, Rolf Drechsler:
Evaluation of (power) side-channels in cryptographic implementations. 15-28 - Johanna Sepúlveda, Felix Wilgerodt, Michael Pehl:
Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions. 29-43 - Mehran Goli, Muhammad Hassan, Daniel Große, Rolf Drechsler:
Security validation of VP-based SoCs using dynamic information flow tracking. 45-58 - Hanna Schneider:
Designing for empowerment - An investigation and critical reflection. 59-65 - Simon Nestler:
Safety-critical human computer interaction. 67-70
Volume 61, Numbers 2-3, April 2019
- Klemens Böhm, Dominik Werle:
Energy status data. 71-72 - Bent Richter, Philipp Staudt:
Perspectives on data availability and market approaches to congestion management. 73-85 - Benedikt Kirpes, Esther Mengelkamp, Georg Schaal, Christof Weinhardt:
Design of a microgrid local energy market on a blockchain-based information system. 87-99 - Esther Mengelkamp, Julius Diesing, Christof Weinhardt:
Tracing local energy markets: A literature review. 101-110 - Holger Trittenbach, Jakob Bach, Klemens Böhm:
Understanding the effects of temporal energy-data aggregation on clustering quality. 111-123 - Hasan Ümitcan Yilmaz, Edouard Fouché, Thomas Dengiz, Lucas Krauß, Dogan Keles, Wolf Fichtner:
Reducing energy time series for energy system models via self-organizing maps. 125-133 - Ämin Baumeler:
Causal loops: Logically consistent correlations, time travel, and computation. 135-141 - Justus Thies:
Face2Face: Real-time facial reenactment. 143-146 - Davide Bove, Anatoli Kalysch:
In pursuit of a secure UI: The cycle of breaking and fixing Android's UI. 147-156
Volume 61, Number 4, August 2019
- Rolf Wanka:
Swarm intelligence. 157-158 - Mary Katherine Heinrich, Mohammad Divband Soorati, Tanja Katharina Kaiser, Mostafa Wahby, Heiko Hamann:
Swarm robotics: Robustness, scalability, and self-X features in industrial applications. 159-167 - Bernd Bassimir, Alexander Raß, Manuel Schmitt:
Theory of particle swarm optimization: A survey of the power of the swarm's potential. 169-176 - Moritz Mühlenthaler, Alexander Raß:
Runtime analysis of discrete particle swarm optimization algorithms: A survey. 177-185 - Alexander Steen:
Higher-order theorem proving and its applications. 187-191 - Andreas Vogelsang:
Explainable software systems. 193-196 - Thomas Weißgerber, Michael Granitzer:
Mapping platforms into a new open science model for machine learning. 197-208
Volume 61, Numbers 5-6, October 2019
- Hannes Schlieter, Ali Sunyaev, Rüdiger Breitschwerdt, Martin Sedlmayr:
Editorial. 209-210 - Kurt Becker, Myriam Lipprandt, Rainer Röhrig, Thomas Neumuth:
Digital health - Software as a medical device in focus of the medical device regulation (MDR). 211-218 - Veronika Strotbaum, Monika Pobiruchin, Björn Schreiweis, Martin Wiesner, Brigitte Strahwald:
Your data is gold - Data donation for better healthcare? 219-229 - Caterina Joelle Neumann, Tereza Kolak, Carolin Auschra:
Strategies to digitalize inert health practices: The gamification of glucose monitoring. 231-241 - Lars Stegemann, Martin Gersch:
Interoperability - Technical or economic challenge? 243-252 - Tobias Kowatsch, Lena Otto, Samira Harperink, Amanda Cotti, Hannes Schlieter:
A design and evaluation framework for digital health interventions. 253-263 - Vadym Mozgovoy, Tobias Mettler:
Internal development as access strategy to information and communication technology in electronic human resource management for sustaining employee well-being. 265-272 - Patrick Philipp, Nicole Merkle, Kai Gand, Carola Gißke:
Continuous support for rehabilitation using machine learning. 273-284 - Kai Dührkop:
Computational methods for small molecule identification. 285-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.