


default search action
it - Information Technology, Volume 56
Volume 56, Number 1, February 2014
- Norbert Ritter:
Engineering adaptive software systems. 1-3 - Kai Herrmann, Hannes Voigt, Wolfgang Lehner:
Online horizontal partitioning of heterogeneous data. 4-12 - Stephan Baumann, Kai-Uwe Sattler:
Autonomic physical database design - from indexing to multidimensional clustering. 13-21 - Mingyi Zhang, Patrick Martin, Wendy Powley, Paul Bird, David Kalmuk:
A framework for autonomic workload management in DBMSs. 22-32 - Kurt Geihs
, Stefan Niemczyk, Alexander Roßnagel, Andreas Witsch:
On the socially aware development of self-adaptive ubiquitous computing applications. 33-41
Volume 56, Number 2, April 2014
- Ina Koch
, Wolfgang Reisig, Falk Schreiber:
Petri Nets in the Biosciences. 43-45 - Annegret Wagler:
Automatic network reconstruction from experimental time-series data: A survey. 46-54 - Sabrina Proß
, Bernhard Bachmann
:
An object-oriented Petri net simulation tool for hybrid biological processes. 55-66 - Guangxu Jin, Stephen T. C. Wong:
Enhanced Petri Net: elucidating the pathway-level mechanism of targeted-therapy drugs. 67-75 - Ming Chen
, Ralf Hofestädt:
Open problems in Petri net modeling and simulation of biological systems. 76-81 - Andreas Lochbihler
:
Analysing Java's safety guarantees under concurrency. 82-86
Volume 56, Number 3, June 2014
- René Peinl
:
Architecture of web applications. 87-89 - Jacek Kopecký
, Paul Fremantle, Rich Boakes:
A history and future of Web APIs. 90-97 - Erik Wilde:
Managing a RESTful SOA: Providing guidance for service designers and orientation for service consumers. 98-105 - Tobias Binz, Uwe Breitenbücher, Oliver Kopp
, Frank Leymann:
Migration of enterprise applications to the cloud. 106-111 - Stefan Wild, Martin Gaedke
:
Utilizing architecture models for secure distributed web applications and services. 112-118 - Benjamin Erb
, Frank Kargl, Jörg Domaschka:
Concurrent programming in web applications. 119-126 - Andreas Göbel:
H2 Proxy - Dynamic load balancing for multi-tenant database systems. 127-133 - Detlef Hühnlein, Tobias Wich, Johannes Schmölz, Hans-Martin Haase:
The evolution of identity management using the example of web-based applications. 134-140 - Jens Kober
:
Learning motor skills: from algorithms to robot experiments. 141-146
Volume 56, Number 4, August 2014
- Paul Molitor
:
Preface. 147 - Rolf Drechsler
:
Testing integrated circuits. 148-149 - Sudhakar M. Reddy, Zhuo Zhang:
On achieving minimal size test sets for scan designs. 150-156 - Stephan Eggersglüß, Rolf Drechsler
:
An effective fault ordering heuristic for SAT-based dynamic test compaction techniques. 157-164 - Sybille Hellebrand, Hans-Joachim Wunderlich:
SAT-based ATPG beyond stuck-at fault testing. 165-172 - Jean-Marc Gallière, Florence Azaïs, Mariane Comte, Michel Renovell:
Testing for gate oxide short defects using the detectability interval paradigm. 173-181 - Te-Hsuan Chen, Armin Alaghi, John P. Hayes:
Behavior of stochastic circuits under severe error conditions. 182-191 - Ilia Polian:
Hardware security and test: Friends or enemies? 192-202
Volume 56, Number 5, October 2014
- Katrin Weller, Markus Strohmaier:
Social media in academia: How the Social Web is changing academic practice and becoming a new source for research data. 203-206 - Stefanie Haustein
, Vincent Larivière, Mike Thelwall
, Didier Amyot, Isabella Peters:
Tweets vs. Mendeley readers: How do these two social media metrics differ? 207-215 - Carolyn Hank, Cassidy R. Sugimoto
, Andrew Tsou, Jeffrey Pomerantz
:
Faculty and student interactions via Facebook: Policies, preferences, and practices. 216-223 - Klaus Tochtermann:
How Science 2.0 will impact on scientific libraries. 224-229 - Panagiotis Takis Metaxas, Eni Mustafaraj:
Sifting the sand on the river bank: Social media as a source for research data. 230-239 - Axel Bruns
, Stefan Stieglitz:
Twitter data: What do they represent? 240-245 - Taha Yasseri
, Jonathan Bright:
Can electoral popularity be predicted using socially generated big data? 246-253 - Peter Liggesmeyer, Burkhard Monien:
Preface to the self-portrayals of the GI Junior Fellows. 254 - Katharina Anna Zweig:
Network analysis literacy, data analysis literacy, and socioinformatics. 255-258 - Agnes Koschmider:
Developing sociotechnical systems with special focus on quality. 259-262 - Albert Endres:
Heinz Zemanek zum Gedenken. 263-264
Volume 56, Number 6, December 2014
- Heiko Mantel:
Reliably secure software systems. 265-266 - Tobias Nipkow, Andrei Popescu:
Making security type systems less ad hoc. 267-272 - Bernd Finkbeiner, Markus N. Rabe:
The linear-hyper-branching spectrum of temporal logics. 273-279 - Gregor Snelting, Dennis Giffhorn, Jürgen Graf, Christian Hammer, Martin Hecker, Martin Mohr, Daniel Wasserrab:
Checking probabilistic noninterference using JOANA. 280-287 - Sarah Ereth, Steffen Lortz, Matthias Perner:
Confidentiality for Android apps: Specification and verification. 288-293 - Thomas Bauereiß, Dieter Hutter:
Information flow control for workflow management systems. 294-299 - Ralf Küsters, Tomasz Truderung:
Security in e-voting. 300-306 - Björn Scheuermann:
Designing networks for challenging applications. 307-309 - Wim Martens:
Theory for processing data on the Web. 310-312 - Juraj Somorovsky:
On the insecurity of XML Security. 313-317

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.