Rieck, Christian
27  Ergebnisse:
Personensuche X
?
1

Guarding Polyominoes Under k-Hop Visibility:

, In: Lecture Notes in Computer Science; LATIN 2024: Theoretical Informatics,
Filtser, Omrit ; Krohn, Erik ; Nilsson, Bengt J... - p. 288-302 , 2024
 
?
2

Connected Reconfiguration of Polyominoes Amid Obstacles usi..:

, In: 2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS),
Garcia, Javier ; Yannuzzi, Michael ; Kramer, Peter.. - p. 6554-6560 , 2022
 
?
3

Particle-Based Assembly Using Precise Global Control:

, In: Lecture Notes in Computer Science; Algorithms and Data Structures,
 
?
4

Targeted Drug Delivery: Algorithmic Methods for Collecting ..:

, In: 2020 IEEE International Conference on Robotics and Automation (ICRA),
Becker, Aaron T. ; Fekete, Sandor P. ; Huang, Li... - p. 2508-2514 , 2020
 
?
5

Verhandlungen:

, In: Handbuch Modellbildung und Simulation in den Sozialwissenschaften,
Rieck, Christian - p. 1025-1048 , 2014
 
?
6

Region ohne Richtung: Lateinamerikanische Sicherheitspoliti..:

, In: Zwischen Moskau, Peking und Washington: Lateinamerika in der Großmachtkonkurrenz,
Rieck, Christian E. - p. 121-130 , 2023
 
?
7

Fiber Optic Time Transfer from UTC(k) to a VLBI Antenna in ..:

, In: 2022 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS),
 
?
8

New Optimization Guidance for Dynamic Dial-a-Ride Problems:

, In: Operations Research Proceedings 2021; Lecture Notes in Operations Research,
Ackermann, Christian ; Rieck, Julia - p. 283-288 , 2022
 
?
9

TagVet : Vetting Malware Tags using Explainable Machine ..:

, In: Proceedings of the 14th European Workshop on Systems Security,
 
?
10

LaserShark: Establishing Fast, Bidirectional Communication ..:

, In: Annual Computer Security Applications Conference,
 
?
11

What's all that noise : analysis and detection of propag..:

, In: Proceedings of the 13th European workshop on Systems Security,
 
?
12

Evaluating Explanation Methods for Deep Learning in Securit:

, In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
13

A Wasserstein Subsequence Kernel for Time Series:

, In: 2019 IEEE International Conference on Data Mining (ICDM),
 
?
14

Thieves in the Browser : Web-based Cryptojacking in the ..:

, In: Proceedings of the 14th International Conference on Availability, Reliability and Security,
 
?
15

TypeMiner: Recovering Types in Binary Programs Using Machin..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
1-15