Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Information-Based Complexity“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Information-Based Complexity" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Information-Based Complexity"
Wozniakowski, H. „Information-Based Complexity“. Annual Review of Computer Science 1, Nr. 1 (Juni 1986): 319–80. http://dx.doi.org/10.1146/annurev.cs.01.060186.001535.
Der volle Inhalt der QuellePackel, Edward W., und J. F. Traub. „Information-based complexity“. Nature 328, Nr. 6125 (Juli 1987): 29–33. http://dx.doi.org/10.1038/328029a0.
Der volle Inhalt der QuelleHeinrich, Stefan, und Jörg-Detlef Kern. „Parallel information-based complexity“. Journal of Complexity 7, Nr. 4 (Dezember 1991): 339–70. http://dx.doi.org/10.1016/0885-064x(91)90024-r.
Der volle Inhalt der QuelleKon, Mark A. „Book Review: Information-based complexity“. Bulletin of the American Mathematical Society 21, Nr. 2 (01.10.1989): 332–40. http://dx.doi.org/10.1090/s0273-0979-1989-15851-5.
Der volle Inhalt der QuelleTraub, J. F., und H. Wo\'zniakowski. „Perspectives on Information-Based Complexity“. Bulletin of the American Mathematical Society 26, Nr. 1 (01.04.1992): 29–53. http://dx.doi.org/10.1090/s0273-0979-1992-00240-9.
Der volle Inhalt der QuelleLui, Leong Ting, Germán Terrazas, Hector Zenil, Cameron Alexander und Natalio Krasnogor. „Complexity Measurement Based on Information Theory and Kolmogorov Complexity“. Artificial Life 21, Nr. 2 (Mai 2015): 205–24. http://dx.doi.org/10.1162/artl_a_00157.
Der volle Inhalt der QuelleParlett, Beresford N. „Some basic information\\ on information-based complexity theory“. Bulletin of the American Mathematical Society 26, Nr. 1 (01.01.1992): 3–29. http://dx.doi.org/10.1090/s0273-0979-1992-00239-2.
Der volle Inhalt der QuelleOrme, Anthony Mark, Haining Yao und Letha H. Etzkorn. „Complexity metrics for ontology based information“. International Journal of Technology Management 47, Nr. 1/2/3 (2009): 161. http://dx.doi.org/10.1504/ijtm.2009.024120.
Der volle Inhalt der QuellePackel, Edward W., und Henryk Woźniakowski. „Recent developments in information-based complexity“. Bulletin of the American Mathematical Society 17, Nr. 1 (01.07.1987): 9–37. http://dx.doi.org/10.1090/s0273-0979-1987-15511-x.
Der volle Inhalt der QuelleGalas, David J., Matti Nykter, Gregory W. Carter, Nathan D. Price und Ilya Shmulevich. „Biological Information as Set-Based Complexity“. IEEE Transactions on Information Theory 56, Nr. 2 (Februar 2010): 667–77. http://dx.doi.org/10.1109/tit.2009.2037046.
Der volle Inhalt der QuelleDissertationen zum Thema "Information-Based Complexity"
Schmitt, Wagner. „A new 3D shape descriptor based on depth complexity and thickness information“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2015. http://hdl.handle.net/10183/127030.
Der volle Inhalt der QuelleGeometric models play a vital role in several fields, from the entertainment industry to scientific applications. To reduce the high cost of model creation, reusing existing models is the solution of choice. Model reuse is supported by content-based shape retrieval (CBR) techniques that help finding the desired models in massive repositories, many publicly available on the Internet. Key to efficient and effective CBR techniques are shape descriptors that accurately capture the characteristics of a shape and are able to discriminate between different shapes. We present a descriptor based on the distribution of two global features measured on a 3D shape, depth complexity and thickness, which respectively capture aspects of the geometry and topology of 3D shapes. The final descriptor, called DCT (depth complexity and thickness histogram), is a 2D histogram that is invariant to the translation, rotation and scale of geometric shapes. We efficiently implement the DCT on the GPU, allowing its use in real-time queries of large model databases. We validate the DCT with the Princeton and Toyohashi Shape Benchmarks, containing 1815 and 10000 models respectively. Results show that DCT can discriminate meaningful classes of these benchmarks, and is fast to compute and robust against shape transformations and different levels of subdivision and smoothness.
Alamoudi, Rami Hussain. „Interaction Based Measure of Manufacturing Systems Complexity and Supply Chain Systems Vulnerability Using Information Entropy“. Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_dissertations/76.
Der volle Inhalt der QuelleThost, Veronika. „Using Ontology-Based Data Access to Enable Context Recognition in the Presence of Incomplete Information“. Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-227633.
Der volle Inhalt der QuelleDash, Santanu Kumar. „Adaptive constraint solving for information flow analysis“. Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16354.
Der volle Inhalt der QuelleEugénio, António Luís Beja. „The information systems and technology innovation process: a study using an agent-based approach“. Master's thesis, Instituto Superior de Economia e Gestão, 2007. http://hdl.handle.net/10400.5/636.
Der volle Inhalt der QuelleUm modelo abstracto baseado em agentes é utilizado para estudar a inovação em Sistemas de Informação e em Tecnologia de Informação, no plano organizacional, utilizando uma aproximação sócio-cognitiva. A conclusão do estudo indica que o poder dos profissionais conhecedores de tecnologias de informação na decisão de adopção de uma determinada inovação varia com o nível de concordância de ideias entre eles e os decisores, ao mesmo tempo que depende da taxa de depreciação das transacções, conduzindo a uma forte flutuação de poder quando o ambiente é instável.
An abstract Agent Based Model is used to study Information Systems and Information Technology innovation on an organizational realm, using a socio-cognitive approach. Conclusion is drawn that the power of the knowledge workers in the decision to adopt an IS/IT innovation within an organization varies with the matching level of ideas between them and the top management, while being dependant of the transactions’ depreciation rate, leading to a strong fluctuation of power when the environment is unstable.
Syed, Tamseel Mahmood. „Precoder Design Based on Mutual Information for Non-orthogonal Amplify and Forward Wireless Relay Networks“. University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1392043776.
Der volle Inhalt der QuelleClément, François. „An Optimization Perspective on the Construction of Low-Discrepancy Point Sets“. Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS138.
Der volle Inhalt der QuelleDiscrepancy measures are metrics designed to quantify how well spread a point set is in a given space. Among these, the L∞ star discrepancy is arguably one of the most popular. Indeed, by the Koksma-Hlawka inequality~cite{Hlawka,Koksma}, when replacing an integral by the average of function evaluations in specific points, the error made is bounded by a product of two terms, one depending only on the function and the other on the L∞ star discrepancy of the points. This leads to a variety of applications, from computer vision to financial mathematics and to design of experiments where well-spread points covering a space are essential.Low-discrepancy sets used in such applications usually correspond to number theoretic designs, with a wide variety of possible constructions. Despite the high demand in practice, the design of these point sets remains largely the work of mathematicians, often more interested in finding asymptotic bounds than in adapting the point sets to the desired applications. This results in point sets that, while theoretically excellent, sometimes leave a lot to be desired for applications, in particular high-dimensional ones. Indeed, the constructions are not tailored to the many different settings found in applications and are thus suboptimal. Furthermore, not only do we not know how low the discrepancy of point sets of a given size in a fixed dimension can go, but often we do not even know the discrepancy of existing constructions. This leaves essential questions unanswered in the design of low-discrepancy sets and sequences. In this thesis, we tackle the problem of constructing low-discrepancy sets from a computational perspective. With optimization approaches applied in isolation or on top of existing sets and sequences, we provide a diverse set of methods to generate excellent low-discrepancy sets, largely outperforming the discrepancy of known constructions in a wide variety of contexts. In particular, we describe a number of examples such as provably optimal sets for very few points in dimension 2, or improved sets of hundreds of points in moderate dimensions via subset selection. Finally, we extend recent work on greedy one-dimensional sequence construction to show that greedy L2 construction of point sets provides excellent empirical results with respect to the L∞ star discrepancy
Domercant, Jean Charles. „ARC-VM: an architecture real options complexity-based valuation methodology for military systems-of-systems acquisitions“. Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42928.
Der volle Inhalt der QuelleМельничук, Андрій Богданович, und Andrii Melnychuk. „Методи захисту інформації в рамках предметно-орієнтованого проєктування інформаційних систем“. Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36742.
Der volle Inhalt der QuelleПредметно-орієнтоване проектування — це підхід до проектування програмного забезпечення. Метод проєктування визначає у собі практики як спілкуватись із спеціалістами, самої, предметної області та набір правил проектування де кінцевий код буде відображати у собі всі поняття самого домену. У деяких випадках розділення проблем, передбачених предметно орієнтованим підходом, важко досягти, а саме, коли розглядається функціональність, яка не залежить від домену, але є тісно пов’язаною з функціональністю, пов’язаною з предметною областю. Дані проблеми стосуються блоку програми яка б відповідала за безпеку. На жаль, засновник досліджуваного підходу не визначив як саме можна поєднати таку логіку, тому було досліджено різні методи забезпечення захисту даних та аналіз найкращих варіантів реалізації, які можна застосовувати у реальних проектах.
Domain Driven Design — is an approach to software design. The approach method defines the practices of how to communicate with specialists, of the subject area and a set of design rules where the final code will reflect all the concepts of the domain itself. In some cases, the separation covered by a subject-oriented approach is difficult to achieve, namely when considering functionality that is independent of the domain but is closely related to functionality related to the subject area. These issues are related to the security unit. Unfortunately, the founder of the researched approach did not define exactly how such logic can be combined. That is why were researched the different methods of data protection and analysis of the best implementation options that can be used in real projects.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ…8 ВСТУП… 9 РОЗДІЛ 1. АНАЛІЗ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ ТА ПРОБЛЕМИ БЕЗПЕКИ У НЬОМУ…13 1.1. Предметно-орієнтоване проєктування…13 1.2 Архітектура та структура проекту при DDD проєктуванні… 16 1.3 Аспектно-орієнтоване програмування…18 1.4 Вимірювання складності реалізації методу… 20 1.5 Проблема захисту даних при проектуванні…22 РОЗДІЛ 2. ЗАХИСТ ІНФОРМАЦІЇ В РАМКАХ ПРЕДМЕТНО-ОРІЄНТОВАНОГО ПРОЄКТУВАННЯ…24 2.1 Предмет дослідження проблеми захисту інформації… 24 2.2 Критерії оцінки варіантів реалізації безпеки в рамках предметно-орієнтованому проектуванні… 26 2.3 Аналіз методу захисту інформації, яка вбудована у шар предметної області… 28 2.3.1 Опис підходу та його плюси…28 2.3.2 Недоліки підходу… 30 2.3.3 Висновок по підрозділу…30 2.4 Аналіз методу захисту інформації, яка винесена в окремий контекст… 31 2.4.1 Опис підходу та його плюси…31 2.4.2 Недоліки підходу… 32 2.4.3 Висновок по підрозділу…34 2.5 Аналіз методу захисту інформації, з використанням фасаду предметної області… 34 2.5.1 Опис підходу та його плюси…35 2.5.2 Недоліки підходу… 36 2.5.3 Висновок по підрозділу…36 2.6 Аналіз методу захисту інформації, з використанням аспектно-орієнтованого підходу…37 2.6.1 Опис підходу та його плюси…37 2.6.2 Недоліки підходу… 38 2.6.3 Висновок по підрозділу…39 РОЗДІЛ 3. РЕАЛІЗАЦІЯ МЕТОДІВ ЗАХИСТУ ТА ПОРІВНЯННЯ СКЛАДНОСТІ…40 3.1 Реалізація базової структури проекту…40 3.1.1 Вибір середовища та технологія для створення інформаційної системи… 40 3.1.2 Розробка головного ядра інформаційної системи… 40 3.1.3 Розробка відокремленого контексту безпеки… 42 3.1.4 Розробка інтерфейсу користувача… 43 3.2 Аналіз складності у реалізацій та підтримки кожного із методів…44 3.2.1 Визначення значення залежностей у інформаційній системі…44 3.2.2 Вимірювання цикломатичної складності… 44 3.3 Підсумки отриманих результатів…45 РОЗДІЛ 4. ОХОРОНА ПРАЦІ ТА БЕЗПЕКА У НАДЗВИЧАЙНИХ СИТУАЦІЯХ…47 4.1 Охорона праці…47 4.2 Підвищення стійкості роботи підприємств будівельної галузі у воєнний час…49 ВИСНОВКИ… 54 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ… 56 ДОДАТКИ…59
Kuhn, John. „A THEORY OF COMPLEX ADAPTIVE INQUIRING ORGANIZATIONS: APPLICATION TO CONTINUOUS ASSURANCE OF CORPORATE FINANCIAL INFORMATION“. Doctoral diss., University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2432.
Der volle Inhalt der QuellePh.D.
Department of Management Information Systems
Business Administration
Business Administration PhD
Bücher zum Thema "Information-Based Complexity"
W, Wasilkowski G., und Woźniakowski H, Hrsg. Information-based complexity. Boston: Academic Press, 1988.
Den vollen Inhalt der Quelle findenPetras, Iasonas. Contributions to Information-Based Complexity and to Quantum Computing. [New York, N.Y.?]: [publisher not identified], 2013.
Den vollen Inhalt der Quelle findenCvetkov, Viktor. Basics of complexity theory. ru: INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110856.
Der volle Inhalt der QuelleZu, Qiaohong. Pervasive Computing and the Networked World: Joint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Den vollen Inhalt der Quelle findenBaryshev, Ruslan. Proactive library in the information and educational environment of the University. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1123649.
Der volle Inhalt der QuelleKaliski, Burton S. Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13 15, 2002 Revised Papers. Berlin: Springer-Verlag Berlin Heidelberg, 2003.
Den vollen Inhalt der Quelle findenChristof, Paar, und SpringerLink (Online service), Hrsg. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Den vollen Inhalt der Quelle findenJianying, Zhou, Li Hui und SpringerLink (Online service), Hrsg. Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Den vollen Inhalt der Quelle findenStanescu, Liana. Creating New Medical Ontologies for Image Annotation: A Case Study. New York, NY: Springer Science+Business Media, LLC, 2012.
Den vollen Inhalt der Quelle finden1969-, Sarkar Palash, und SpringerLink (Online service), Hrsg. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Information-Based Complexity"
Traub, J. F. „Introduction to Information-Based Complexity“. In Complexity in Information Theory, 63–76. New York, NY: Springer New York, 1998. http://dx.doi.org/10.1007/978-1-4612-3774-7_3.
Der volle Inhalt der QuelleStandish, Russell K. „Information-Based Complexity of Networks“. In Advances in Network Complexity, 209–27. Weinheim, Germany: Wiley-VCH Verlag GmbH & Co. KGaA, 2013. http://dx.doi.org/10.1002/9783527670468.ch09.
Der volle Inhalt der QuellePolkowski, Lech. „Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems“. In Computational Complexity, 1464–87. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1800-9_94.
Der volle Inhalt der QuelleLin, Grace Y., Richard Breitwieser, Feng Cheng, John T. Eagen und Markus Ettl. „Product Hardware Complexity and Its Impact on Inventory and Customer On-Time Delivery“. In Information-Based Manufacturing, 61–79. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1599-9_4.
Der volle Inhalt der QuelleZhao, Weidong, Haitao Liu und Xi Liu. „Role Identification Based on the Information Dependency Complexity“. In Advanced Data Mining and Applications, 276–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53917-6_25.
Der volle Inhalt der QuelleTraub, Joseph F. „Information-based complexity: Recent results and open problems“. In Fundamentals of Computation Theory, 86–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-54458-5_52.
Der volle Inhalt der QuelleMockus, Jonas, William Eddy, Audris Mockus, Linas Mockus und Gintaras Reklaitis. „Information-Based Complexity (IBC) and the Bayesian Heuristic Approach“. In Nonconvex Optimization and Its Applications, 31–46. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4757-2627-5_2.
Der volle Inhalt der QuellePolkowski, Lech. „Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems“. In Encyclopedia of Complexity and Systems Science, 4411–35. New York, NY: Springer New York, 2009. http://dx.doi.org/10.1007/978-0-387-30440-3_262.
Der volle Inhalt der QuellePolkowski, Lech. „Granulation of Knowledge: Similarity Based Approach in Information and Decision Systems“. In Encyclopedia of Complexity and Systems Science, 1–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-642-27737-5_262-2.
Der volle Inhalt der QuelleEguchi, Takao, Tsuyoshi Koga und Kazuhiro Aoyama. „MANAGEMENT OF RELATIONSHIPS BETWEEN PRODUCT INFORMATION ON MODEL BASED DESIGN PROCESS“. In Gain competitive advantage by managing complexity, 211–24. München: Carl Hanser Verlag GmbH & Co. KG, 2012. http://dx.doi.org/10.3139/9783446434127.017.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Information-Based Complexity"
Wasilkowski, G. W. „Information-Based Complexity; An Overview“. In 1990 American Control Conference. IEEE, 1990. http://dx.doi.org/10.23919/acc.1990.4790762.
Der volle Inhalt der QuelleKipp, Teresa A. „Fusion by the information-based complexity approach“. In Optical Engineering and Photonics in Aerospace Sensing, herausgegeben von Lynn E. Garn und Lynda L. Graceffo. SPIE, 1993. http://dx.doi.org/10.1117/12.161456.
Der volle Inhalt der QuelleMoore, Philip. „The Complexity of Context in Mobile Information Systems“. In 2009 International Conference on Network-Based Information Systems (NBIS). IEEE, 2009. http://dx.doi.org/10.1109/nbis.2009.10.
Der volle Inhalt der QuelleFoucart, Simon. „Complexity of multivariate problems based on binary information“. In 2017 International Conference on Sampling Theory and Applications (SampTA). IEEE, 2017. http://dx.doi.org/10.1109/sampta.2017.8024351.
Der volle Inhalt der QuelleFuhrer, Julian, Alejandro Blenkmann, Tor Endestad, Anne-Kristin Solbakk und Kyrre Glette. „Complexity-based Encoded Information Quantification in Neurophysiological Recordings“. In 2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). IEEE, 2022. http://dx.doi.org/10.1109/embc48229.2022.9871501.
Der volle Inhalt der QuellePizzolante, Raffaele, Arcangelo Castiglione, Bruno Carpentieri und Alfredo De Santis. „Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images“. In 2014 17th International Conference on Network-Based Information Systems (NBiS). IEEE, 2014. http://dx.doi.org/10.1109/nbis.2014.107.
Der volle Inhalt der QuelleRavari, Alireza Norouzzadeh, und Hamid D. Taghirad. „Transformation invariant 3D object recognition based on information complexity“. In 2014 Second RSI/ISM International Conference on Robotics and Mechatronics (ICRoM). IEEE, 2014. http://dx.doi.org/10.1109/icrom.2014.6991019.
Der volle Inhalt der QuelleAimin, Luo, Huang Li und Luo Xueshan. „Entropy-Based Complexity Analysis for Architecture of Information System“. In 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC). IEEE, 2008. http://dx.doi.org/10.1109/icnsc.2008.4525503.
Der volle Inhalt der QuelleLee, Gil-beom, Youn-chul Shin, Joo-heon Park und Myeong-jin Lee. „Low-complexity camera tamper detection based on edge information“. In 2014 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW). IEEE, 2014. http://dx.doi.org/10.1109/icce-tw.2014.6904034.
Der volle Inhalt der QuelleSun Yanming, Zhang Kaisheng, Zhang Xiaohua und Zheng Shixiong. „Modeling of manufacturing information system based on complexity science“. In International Technology and Innovation Conference 2006 (ITIC 2006). IEE, 2006. http://dx.doi.org/10.1049/cp:20060765.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Information-Based Complexity"
Parlett, Beresford. Some Basic Information on Information-Based Complexity Theory. Fort Belvoir, VA: Defense Technical Information Center, Juli 1989. http://dx.doi.org/10.21236/ada256585.
Der volle Inhalt der QuelleSanders, David M., und William B. Carlton. Information Overload at the Tactical Level (an Application of Agent Based Modeling and Complexity Theory in Combat Modeling). Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada405459.
Der volle Inhalt der QuelleMascagni, Giulia, Roel Dom und Fabrizio Santoro. The VAT in Practice: Equity, Enforcement and Complexity. Institute of Development Studies (IDS), Januar 2021. http://dx.doi.org/10.19088/ictd.2021.002.
Der volle Inhalt der QuellePilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk und Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, April 2021. http://dx.doi.org/10.31812/123456789/4374.
Der volle Inhalt der QuelleBaader, Franz, Stefan Borgwardt und Marcel Lippmann. Temporal Conjunctive Queries in Expressive DLs with Non-simple Roles. Technische Universität Dresden, 2015. http://dx.doi.org/10.25368/2022.222.
Der volle Inhalt der QuelleBorgwardt, Stefan, und Walter Forkel. Closed-World Semantics for Conjunctive Queries with Negation over ELH⊥ Ontologies. Technische Universität Dresden, 2019. http://dx.doi.org/10.25368/2023.222.
Der volle Inhalt der QuelleKud, A. A. Figures and Tables. Reprinted from “Comprehensive сlassification of virtual assets”, A. A. Kud, 2021, International Journal of Education and Science, 4(1), 52–75. KRPOCH, 2021. http://dx.doi.org/10.26697/reprint.ijes.2021.1.6.a.kud.
Der volle Inhalt der QuelleLutz, Carsten, und Frank Wolter. Modal Logics of Topological Relations. Technische Universität Dresden, 2004. http://dx.doi.org/10.25368/2022.142.
Der volle Inhalt der QuelleKoopmann, Patrick. Ontology-Mediated Query Answering for Probabilistic Temporal Data with EL Ontologies (Extended Version). Technische Universität Dresden, 2018. http://dx.doi.org/10.25368/2022.242.
Der volle Inhalt der QuelleLutz, Carsten, Carlos Areces, Ian Horrocks und Ulrike Sattler. Keys, Nominals, and Concrete Domains. Technische Universität Dresden, 2002. http://dx.doi.org/10.25368/2022.122.
Der volle Inhalt der Quelle