Home

Pedicab Zurückspulen Bulk ioannis stylios dblp Vorherige Seite Trennwand Notwendigkeiten

PDF) Redefining Information Systems Security: Viable Information Systems.
PDF) Redefining Information Systems Security: Viable Information Systems.

PDF) A Critical Approach to Privacy Research in Ubiquitous Environments –  Issues and Underlying Assumptions
PDF) A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions

PDF) A Hybrid Approach for Artifact Detection in EEG Data
PDF) A Hybrid Approach for Artifact Detection in EEG Data

Measurement of hard double-parton interactions in $W(\to l\nu)$+ 2 jet  events at $\sqrt{s}$=7 TeV with the ATLAS detector - CERN Document Server
Measurement of hard double-parton interactions in $W(\to l\nu)$+ 2 jet events at $\sqrt{s}$=7 TeV with the ATLAS detector - CERN Document Server

PDF) Using the Lens of Circuits of Power in Information Systems Security  Management
PDF) Using the Lens of Circuits of Power in Information Systems Security Management

PDF) Employees' privacy vs. employers' security: Can they be balanced?
PDF) Employees' privacy vs. employers' security: Can they be balanced?

PDF) Information systems security from a knowledge management perspective
PDF) Information systems security from a knowledge management perspective

PDF) A cross media platform for personalized leisure & entertainment: The  POLYMNIA approach
PDF) A cross media platform for personalized leisure & entertainment: The POLYMNIA approach

PDF) Privacy and fair information practices in ubiquitous environments:  Research challenges and future directions
PDF) Privacy and fair information practices in ubiquitous environments: Research challenges and future directions

PDF) Brain tumor characterization using the soft computing technique of  fuzzy cognitive maps
PDF) Brain tumor characterization using the soft computing technique of fuzzy cognitive maps

PDF) Elaborating Quantitative Approaches for IT Security Evaluation
PDF) Elaborating Quantitative Approaches for IT Security Evaluation

PDF) Walk the Walk: Attacking Gait Biometrics by Imitation
PDF) Walk the Walk: Attacking Gait Biometrics by Imitation

PDF) Knowledge Representation Requirements for Intelligent Tutoring Systems
PDF) Knowledge Representation Requirements for Intelligent Tutoring Systems

PDF) “Trust Engineering:” From Requirements to System Design and  Maintenance – A Working National Lottery System Experience
PDF) “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience

PDF) Employing Ontologies for the Development of Security Critical  Applications
PDF) Employing Ontologies for the Development of Security Critical Applications

Ioannis Paparrizos's research works | École Polytechnique Fédérale de  Lausanne, Lausanne (EPFL) and other places
Ioannis Paparrizos's research works | École Polytechnique Fédérale de Lausanne, Lausanne (EPFL) and other places

PDF) Neuro-Symbolic Approaches for Knowledge Representation in Expert  Systems
PDF) Neuro-Symbolic Approaches for Knowledge Representation in Expert Systems

dblp.yaml/cbm.yaml at master · davidar/dblp.yaml · GitHub
dblp.yaml/cbm.yaml at master · davidar/dblp.yaml · GitHub

Measurement of hard double-parton interactions in $W(\to l\nu)$+ 2 jet  events at $\sqrt{s}$=7 TeV with the ATLAS detector - CERN Document Server
Measurement of hard double-parton interactions in $W(\to l\nu)$+ 2 jet events at $\sqrt{s}$=7 TeV with the ATLAS detector - CERN Document Server

PDF) Algebraic Methods for Counting Euclidean Embeddings of Rigid Graphs
PDF) Algebraic Methods for Counting Euclidean Embeddings of Rigid Graphs

Yoshua Bengio - Mila
Yoshua Bengio - Mila

PDF) SenGuard: Passive user identification on smartphones using multiple  sensors
PDF) SenGuard: Passive user identification on smartphones using multiple sensors