Export 360 results:
Mayrhofer, R., Sommer A., & Saral S. (2010).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. Proc. {iiWAS2010}: 12th International Conference on Information Integration and Web-based Applications & Services. 181–189.
König, F., & Paramythis A. (2010).  Closing the Circle: IMS LD Extensions for Advanced Adaptive Collaboration Support. Proceedings of the 2nd Int. Workshop on Adaptive Systems for Collaborative Learning in the context of the Int. Conference on Intelligent Networking and Collaborative Systems (INCoS 2010).
König, F., & Paramythis A. (2010).  Collaboration Contexts, Services, Events and Actions: Four Steps Closer to Adaptive Collaboration Support in IMS LD. Proceedings of the International Conference on Intelligent Networking and Collaborative Systems (INCoS 2010), Thessaloniki, Greece.
Hörmanseder, R. (2010).  Computernetzwerke - Grundlagen.
Sonntag, M. (2010).  Computerprogramme: Investition für geschützte Datenbanken?. in: Erich Schweighofer, Anton Geist, Ines Staufer (Eds.): Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik.
Sonntag, M. (2010).  Der Schutz technischer Sicherheitsmaßnahmen im UrhG.. in: Sonja Gögele, Kaja Unger (Eds.): IT-Sicherheit aus rechtlicher, wirtschaftlicher und technologischer Perspektive.
Sonntag, M. (2010).  Einführung in das Internetrecht. Rechtsgrundlagen für Informatiker.
Sonntag, M. (2010).  Group-Adaptive Personal Learning History. in: Petr Doucek, Gerhard Gerhard Chroust, Vaclav Oskrdal (Eds.): IDIMT-2010. 18th Interdisciplinary Information Management Talks.
Mayrhofer, R., & Ion I. (2010).  OpenUAT: The Open Source Ubiquitous Authentication Toolkit.
Sonntag, M. (2010).  Securing Webpages - An Overview. in: Charles A. Shoniregun, Galyna A. Akmayeva (Eds.): International Conference on Information Society (i-Society 2010).
König, F., & Paramythis A. (2010).  Towards Improved Support for Adaptive Collaboration Scripting in IMS LD. in: M. Wolpers et al. (Eds.): European Conference on Technology Enhanced Learning 2010 (EC-TEL), LNCS 6383.
Kumar, V., Fensel A., Tomic S., Mayrhofer R., & Pellegrini T. (2010).  User Created Machine-readable Policies for Energy Efficiency in Smart Homes. Proc. {UCSE} 2010, co-located with Ubicomp 2010.
Hörmanseder, R. (2010).  Zur Praxis in Computernetzwerken: Von den Grundlagen bis zum Netzwerklabor mit Experimenten für die OSI-Schichten 2 bis 4.
Paramythis, A. (2009).  Adaptive Systems: Development, Evaluation and Evolution.
van Velsen, L., König F., & Paramythis A. (2009).  Assessing the Effectiveness and Usability of Personalized Internet Search through a Longitudinal Evaluation. in: S. Weibelzahl, J. Masthoff, A. Alexandros Paramythis, and L. Lex van Velsen (Eds.) Proceedings of the Sixth Workshop on User-Centred Design and Evaluation of Adaptive Systems; in conjunction with UMAP 2009.
Mühlbacher, J. R. (2009).  Betriebssysteme - Grundlagen.
Sonntag, M. (2009).  Boundaries of Openness in the IT area. in: Gerhard Gerhard Chroust, Petr Doucek, Vaclav Oskrdal (Eds.): IDIMT-2009. 17th Interdisciplinary Information Management Talks.
Sonntag, M. (2009).  Die Beurteilung der urheberrechtlichen Schutzfähigkeit von Computerprogrammen. JusIT 4.
Praher, C., & Mühlbacher J. R. (2009).  DS RBAC - Dynamic Sessions in Role Based Access Control. Journal of Universal Computer Science.
Sonntag, M. (2009).  Exercise generation by group models for autonomous web-based learning. 35th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA).
Paramythis, A., König F., & van Velsen L. (2009).  Finding My Needle in the Haystack: Effective Personalized Re-ranking of Search Results in Prospector. in: Tommaso Di Noia and Francesco Buccafurri (Eds.): E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Proceedings.
Sonntag, M. (2009).  Generating Cases for E-Learning. in: Guido Governatori (Eds.): Legal Knowledge and Information Systems; Jurix 2009: The Twenty-Second Annual Conference.
Habib, M.A., & Praher C. (2009).  Object based dynamic separation of duty in RBAC. in: Internet Technology and Secured Transactions, ICITST 2009, London UK.
Mayrhofer, R., & Gellersen H. (2009).  Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Transactions on Mobile Computing. 8, 792–806.
[Anonymous] (2009).  Special Issue: Secure Spontaneous Interaction. (Mayrhofer, R., Nyberg K., & Kindberg T., Ed.).International Journal on Security and Networks.