Export 346 results:
van Velsen, L., König F., & Paramythis A. (2009).  Assessing the Effectiveness and Usability of Personalized Internet Search through a Longitudinal Evaluation. in: S. Weibelzahl, J. Masthoff, A. Alexandros Paramythis, and L. Lex van Velsen (Eds.) Proceedings of the Sixth Workshop on User-Centred Design and Evaluation of Adaptive Systems; in conjunction with UMAP 2009.
Mühlbacher, J. R. (2009).  Betriebssysteme - Grundlagen.
Sonntag, M. (2009).  Boundaries of Openness in the IT area. in: Gerhard Gerhard Chroust, Petr Doucek, Vaclav Oskrdal (Eds.): IDIMT-2009. 17th Interdisciplinary Information Management Talks.
Sonntag, M. (2009).  Die Beurteilung der urheberrechtlichen Schutzfähigkeit von Computerprogrammen. JusIT 4.
Praher, C., & Mühlbacher J. R. (2009).  DS RBAC - Dynamic Sessions in Role Based Access Control. Journal of Universal Computer Science.
Sonntag, M. (2009).  Exercise generation by group models for autonomous web-based learning. 35th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA).
Paramythis, A., König F., & van Velsen L. (2009).  Finding My Needle in the Haystack: Effective Personalized Re-ranking of Search Results in Prospector. in: Tommaso Di Noia and Francesco Buccafurri (Eds.): E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Proceedings.
Sonntag, M. (2009).  Generating Cases for E-Learning. in: Guido Governatori (Eds.): Legal Knowledge and Information Systems; Jurix 2009: The Twenty-Second Annual Conference.
Habib, M.A., & Praher C. (2009).  Object based dynamic separation of duty in RBAC. in: Internet Technology and Secured Transactions, ICITST 2009, London UK.
Mayrhofer, R., & Gellersen H. (2009).  Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Transactions on Mobile Computing. 8, 792–806.
[Anonymous] (2009).  Special Issue: Secure Spontaneous Interaction. (Mayrhofer, R., Nyberg K., & Kindberg T., Ed.).International Journal on Security and Networks.
Mayrhofer, R., Winkler S., Hlavacs H., Affenzeller M., & Schneider S. (2009).  On Structural Identification of 2D Regression Functions for In-door Bluetooth Localization. Proc. {EUROCAST} 2009. 5717, 801–808.
Sonntag, M., & Paramythis A. (2008).  Adaptive Feedback for Legal E-Learning. in: Proceedings of the special track "Computer-based Knowledge & Skill Assessment and Feedback in Learning Settings" at the International Conference on Comupter-Aided Learning, Villach.
Sonntag, M. (2008).  Adaptive Legal Case Generator for Self Study. Joseph Luca, Edgar R. Weippl (Eds.): Proceedings of ED-MEDIA 2008. World Conference on Educational Multimedia, Hypermedia & Telecommunications.
Putzinger, A. (2008).  Asynchronitätsuntersuchungen in adaptiven Hypermedia Systemen.
Sonntag, M. (2008).  Automatische Generierung von Übungsfällen. in: Erich Schweighofer, Anton Geist, Gisela Heindl (Eds.): Komplexitätsgrenzen der Rechtsinformatik; Tagungsband des 11. Internationalen Rechtsinformatik Symposions IRIS 2008.
Ferscha, A., Hechinger M., Rocha M. dos Santos, Mayrhofer R., Zeidler A., Riener A., et al. (2008).  Building Flexible Manufacturing Systems Based on Peer-Its. {EURASIP} Journal on Embedded Systems. 2008,
Kupzog, F., Sonntag M., & Malik N. Saqib (2008).  Domain-based Security for Mobile Agents. INDIN 2008.
Ferscha, A., Hechinger M., Riener A., Rocha M. dos Santos, Zeidler A., Franz M., et al. (2008).  Peer-it: Stick-on solutions for networks of things. Pervasive and Mobile Computing. 448-479.
Praher, C. (2008).  Security and Privacy in an Enterprise Search Infrastructure for Mobile Devices. Gerhard Gerhard Chroust, Petr Doucek, Jan Klas (Eds.): IDIMT-2008. 16th Interdisciplinary Information management Talks.
Mayrhofer, R., & Gellersen H. (2008).  Spontaneous Mobile Device Authentication based on Sensor Data. Information Security Technical Report. 13, 136–150.
Radi, H., & Mayrhofer R. (2008).  Towards Alternative User Interfaces for Capturing and Managing Tasks with Mobile Devices. Proc. {MoMM} 2008: 6th International Conference on Advances in Mobile Computing and Multimedia. 272–275.
Paramythis, A., & Mühlbacher J. R. (2008).  Towards New Approaches in Adaptive Support for Collaborative E-Learning. in: Proceedings of the The Eleventh IASTED International Conference on Computers and Advanced Technology in Education (CATE 2008), September 29 – October 1, 2008, Crete, Greece.
Sonntag, M. (2008).  Towards un-personal security. Gerhard Gerhard Chroust, Petr Doucek, Jan Klas (Eds.): IDIMT-2008. 16th Interdisciplinary Information management Talks.
Mayrhofer, R. (2008).  Ubiquitous Computing Security: Authenticating Spontaneous Interactions.