Zobrazeno 1 - 10
of 151
pro vyhledávání: '"Eisenbach, S."'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Lakhmanskaya, O.Y., Best, T., Kumar, S.S., Endres, E.S., Hauser, D., Otto, R., Eisenbach, S., von Zastrow, A., Wester, R.
Publikováno v:
In International Journal of Mass Spectrometry 15 May 2014 365-366:281-286
Publikováno v:
Journal of Applied Meteorology and Climatology, 2012 Aug 01. 51(8), 1575-1576.
Externí odkaz:
https://www.jstor.org/stable/26175225
Autor:
Drossopoulou, S, Eisenbach, S
Amidst rocketing numbers of enthusiastic Java programmers and internet applet users, there is growing concern about the security of executing Java code produced by external, unknown sources. Rather than waiting to find out empirically what damage Jav
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aab995644d63a2bed8cfcb62f36ce3e7
Autor:
Steinacker, R., Whiteman, C. D., Dorninger, M., Pospichal, B., Eisenbach, S., Holzer, A. M., Weihs, P., Mursch-Radlgruber, E., Baumann, K.
Publikováno v:
Bulletin of the American Meteorological Society, 2007 May 01. 88(5), 701-716.
Externí odkaz:
https://www.jstor.org/stable/26217285
Publikováno v:
Journal of Applied Meteorology (1988-2005), 2004 Aug 01. 43(8), 1224-1236.
Externí odkaz:
https://www.jstor.org/stable/26185988
Publikováno v:
In Electronic Notes in Theoretical Computer Science 3 March 2006 135(3):37-47
Publikováno v:
International Conference on Functional Programming
Type family applications in Haskell must be fully saturated. This means that all type-level functions haveto be first-order, leading to code that is both messy and longwinded. In this paper we detail an extension toGHC that removes this restriction.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1032::10d6248c1d956ce935bf0cbfe8e661d0
http://hdl.handle.net/10044/1/72117
http://hdl.handle.net/10044/1/72117
The Ethereum blockchain platform supports the execution of decentralised applications or smart contracts. These typically hold and transfer digital currency to other parties on the platform; however, they have been subject to numerous attacks due to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1032::4bec354aeac7cec41611afb7686fcc86
http://hdl.handle.net/10044/1/74713
http://hdl.handle.net/10044/1/74713