Search

Your search keyword '"Thomas Bauer"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Thomas Bauer" Remove constraint Author: "Thomas Bauer" Publisher ieee Remove constraint Publisher: ieee
27 results on '"Thomas Bauer"'

Search Results

1. In-Plane Driving of Anapole Resonances in Silicon Disks at Telecom Wavelengths

2. Towards Architecting Digital Twin-Pervaded Systems

3. Prototyping Automotive Smart Ecosystems

4. Notice of Removal: Systematic synthesis methodology for the design of acoustic wave stand-alone ladder filters, duplexers and multiplexers

5. Relation between electromagnetic coupling effects and network synthesis for AW ladder type filters

6. Relation between electromagnetic coupling effects and network synthesis for acoustic wave ladder type filters

8. Context-Based Assignment and Execution of Human-centric Mobile Services

9. Measurement and applications of transverse spin angular momentum in structured light

10. Multi-variant execution to protect unpatched software

11. Measuring the fully vectorial nature of light at the nanoscale

13. Optimizing Quality Assurance Strategies through an Integrated Quality Assurance Approach -- Guiding Quality Assurance with Assumptions and Selection Rules

14. Expressing best practices in (risk) analysis and testing of safety-critical systems using patterns

15. Welcome message from the PADE chairs

16. Automated Risk-Based Testing by Integrating Safety Analysis Information into System Behavior Models

17. From Assumptions to Context-Specific Knowledge in the Area of Combined Static and Dynamic Quality Assurance

18. A robotics-based flat-panel ultrasound device for continuous intraoperative transcutaneous imaging

19. Practical Defenses for Evil Twin Attacks in 802.11

20. BitStalker: Accurately and efficiently monitoring bittorrent traffic

21. Predicting Tor path compromise by exit port

22. The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can

23. Guaranteeing Soundness of Configurable Process Variants in Provop

24. Mitigating Evil Twin Attacks in 802.11

25. From Requirements to Statistical Testing of Embedded Systems

26. Requirements for the Visualization of System-Spanning Business Processes

27. Topological Protection of Light Propagation in Photonic Crystals

Catalog

Books, media, physical & digital resources