Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 151 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
85
click to vote
GIL
2010
115
views
Security Privacy
»
more
GIL 2010
»
30 Jahre GIL aus der Sicht der Pflanzenproduktion
15 years 1 months ago
Download
subs.emis.de
: Thirty years ago, 1980, the scientific society "Gesellschaft f
Ludwig Reiner, Harald Amon
claim paper
Read More »
130
click to vote
OOPSLA
2010
Springer
120
views
Security Privacy
»
more
OOPSLA 2010
»
What can the GC compute efficiently?: a language for heap assertions at GC time
15 years 1 months ago
Download
www.eecs.tufts.edu
Christoph Reichenbach, Neil Immerman, Yannis Smara...
claim paper
Read More »
143
click to vote
SICHERHEIT
2010
247
views
Security Privacy
»
more
SICHERHEIT 2010
»
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
15 years 1 months ago
Download
www.softscheck.com
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
claim paper
Read More »
130
click to vote
WISA
2010
Springer
130
views
Security Privacy
»
more
WISA 2010
»
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
15 years 1 months ago
Download
eprint.iacr.org
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...
claim paper
Read More »
113
click to vote
GIL
2009
78
views
Security Privacy
»
more
GIL 2009
»
Vom Internet der Dinge zum objektorientierten Web (Web-OO)
15 years 1 months ago
Download
subs.emis.de
Abstract: Inkonsistente und veraltete Datenbest
Michael Clasen
claim paper
Read More »
« Prev
« First
page 151 / 1024
Last »
Next »