Zobrazeno 1 - 10
of 441
pro vyhledávání: '"W Probst"'
Autor:
Raúl Pardo, Willard Rafnsson, Gregor Steinhorn, Denis Lavrov, Thomas Lumley, Christian W. Probst, Ilze Ziedins, Andrzej Wąsowski
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031257339
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::690961b8f35958bf220b4852217200c3
https://doi.org/10.1007/978-3-031-25734-6_7
https://doi.org/10.1007/978-3-031-25734-6_7
Autor:
J Fielitz, K Lorenz, C Blankenburg, C Roth, E Klein, F Schischke, A Weinhold, O Jannasch, D Lehmann, A Huster, R Stets, K Schultz, F Steinert, G Henke, C Marschall, T Steinmüller, K P Kröll, B Dudesek, M Brauckhoff, M Liese, G Tonndorf, K Holzner, L Albrecht, C L Weiss, T J Musholt, N Kizilirmak, T Weber, M Sahm, J Feller, K Cupisti, H Bittscheidt, S Smutny, J Weitz, J Lautermann, N Müller, D Grothe, R Köberle-Wührer, J Schabram, F Watzka, K Holzer, A Trupka, C Vorländer, H Meier, R Kube, C Geffcken, K Rendel, D Kaltofen, T Bräuer, Z Lorenc, I Elmrich, C Sonsnowska, D Sinn, W Rampf, O Thomusch, K Janson, L Axt, P B Musholt, I Müller, J Obermeier, J Zaage, E Kidess, R J A Cámara, W Probst, C Guhr, H Dralle, E Bareck, C Sekulla, D Simon, J I Staubitz, T Schwörig, C Orlitsch
Publikováno v:
BJS Open
Background The impact of intraoperative frozen section (iFS) analysis on the frequency of completion thyroidectomy for the management of thyroid carcinoma is controversial. Although specialized endocrine centres have published their respective result
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c70468221f5dfe6939304cb33aaad410
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85104304679
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85104304679
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884277
ESORICS (2)
ESORICS (2)
Disclosure of data analytics results has important scientific and commercial justifications. However, no data shall be disclosed without a diligent investigation of risks for privacy of subjects. Privug is a tool-supported method to explore informati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c280cd3881fc9ff8ac37ba8d69c704b5
https://doi.org/10.1007/978-3-030-88428-4_21
https://doi.org/10.1007/978-3-030-88428-4_21
Autor:
O Thomusch, C Sekulla, F Billmann, G Seifert, H Dralle, K Lorenz, C Vorländer, M Freitag, J Jähne, T Steinmüller, A Trupka, F Steinert, J Schabram, B Heinzmann, H Lang, J Cotte, T F Hoffmann, K Dette, K Gellert, D Henne-Bruns, J Boese-Landgraf, D Simon Evangelisches, R Kube, E P M Lorenz, M Pross, M Hartel, D Thomschke, G Pistorius, U T Hopt, C Franke, U Rose, W Steuer, W Schwenk, K-H Ebert, C Kelm, H Witzigmann, W Rampf, K Ridwelski, W T Knoefel, W O Bechstein, D Grothe, M Anthuber, L Mirow, W Probst, A Thews, U Fleck, W Kärgel, H Schimmelpenning, J Fielitz, T Schöffauer, W Asperger, J Zaage, H-U Dorn, J Weitz, M Neubauer, E Klar, J Lautermann, M Senkal, H Lippert, R Lück, M Ziesche, K-P Kröll, J Skrobisz, Z Lorenc, B Dudesek, S Smutny, M Brauckhoff, F Längle, E Wenzl
Publikováno v:
British Journal of Surgery. 105:677-685
Background Surgical approaches to autoimmune thyroid disease are currently hampered by concerns over postoperative complications. Risk profiles and incidences of postoperative complications have not been investigated systematically, and studies with
Autor:
Heiko Mantel, Christian W. Probst
Publikováno v:
CSF
Attack trees are a popular notation for describing threats to systems, both in academia and industry. Originally, attack trees lacked a formal semantics, but formal semantics for different variants of attack trees were proposed later. These semantics
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030365363
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecbe988c274423917b0a485072ae83d1
https://doi.org/10.1007/978-3-030-36537-0
https://doi.org/10.1007/978-3-030-36537-0
Autor:
W. Probst
Publikováno v:
Lärmbekämpfung. 15:1-1
Publikováno v:
Agile and Lean Concepts for Teaching and Learning ISBN: 9789811327506
Software architecture plays a vital role in the analysis, design, evaluation and evolution of large-scale projects. Successful adoption of an agile methodology in large-scale projects requires not only tailoring of the software architecture analysis,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c55b8f75b092ec45a5af5b4989889549
https://doi.org/10.1007/978-981-13-2751-3_16
https://doi.org/10.1007/978-981-13-2751-3_16
Publikováno v:
ICMU
Hansen, R R & Probst, C W 2018, Modelling and Analysing Overlay Networks by Ambients with Wormholes . in 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018 ., 8653596, IEEE Signal Processing Society, 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, Auckland, New Zealand, 05/10/2018 . https://doi.org/10.23919/ICMU.2018.8653596
Hansen, R R & Probst, C W 2018, Modelling and Analysing Overlay Networks by Ambients with Wormholes . in 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018 ., 8653596, IEEE Signal Processing Society, 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, Auckland, New Zealand, 05/10/2018 . https://doi.org/10.23919/ICMU.2018.8653596
Process calculi are a powerful mechanism to formally model distributed systems, and are especially useful for assessing trust, security, and privacy issues in mobile and ubiquitous computing and networking. However, they often only support a single m