Journal: it - Information Technology

Volume 58, Issue 6

263 -- 265Jürgen Teich. Invasive computing
267 -- 280Stefan Wildermann, Michael Bader, Lars Bauer, Marvin Damschen, Dirk Gabriel, Michael Gerndt, Michael Glaß, Jörg Henkel, Johny Paul, Alexander Pöppl, Sascha Roloff, Tobias Schwarzer, Gregor Snelting, Walter Stechele, Jürgen Teich, Andreas Weichslgartner, Andreas Zwinkau. Invasive computing for timing-predictable stream processing on MPSoCs
281 -- 295Gabor Drescher, Christoph Erhardt, Felix C. Freiling, Johannes Götzfried, Daniel Lohmann, Pieter Maene, Tilo Müller, Ingrid Verbauwhede, Andreas Weichslgartner, Stefan Wildermann. Providing security on demand using invasive computing
297 -- 307Santiago Pagani, Lars Bauer, Qingqing Chen, Elisabeth Glocker, Frank Hannig, Andreas Herkersdorf, Heba Khdr, Anuj Pathania, Ulf Schlichtmann, Doris Schmitt-Landsiedel, Mark Sagi, Ericles Rodrigues Sousa, Philipp Wagner 0001, Volker Wenzel, Thomas Wild, Jörg Henkel. Dark silicon management: an integrated and coordinated cross-layer approach
309 -- 328Vahid Lari, Andreas Weichslgartner, Alexandru Tanase, Michael Witterauf, Faramarz Khosravi, Jürgen Teich, Jan Heißwolf, Stephanie Friederich, Jürgen Becker. Providing fault tolerance through invasive computing
329 -- 348Georgiana Copil, Daniel Moldovan, Hong Linh Truong, Schahram Dustdar. Continuous elasticity: Design and operation of elastic systems

Volume 58, Issue 5

215 -- 216Alexander De Luca, Emanuel von Zezschwitz. Usable privacy and security
217 -- 228Martin Ortlieb, Ryan Garner. Sensitivity of personal data items in different online contexts
229 -- 236Florian Schaub, Travis D. Breaux, Norman M. Sadeh. Crowdsourcing privacy policy analysis: Potential, challenges and best practices
237 -- 245Sauvik Das. Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity
247 -- 253Daniel Buschek. There is more to biometrics than user identification: Making mobile interactions personal, secure and representative
255 -- 262Andrea Bianchi, Ian Oakley. Wearable authentication: Trends and opportunities

Volume 58, Issue 4

155 -- 156Erhard Rahm. Big Data Analytics
157 -- 165Tilmann Rabl, Jonas Traub, Asterios Katsifodimos, Volker Markl. Apache Flink in current research
166 -- 175André Petermann, Martin Junghanns. Scalable business intelligence with graph collections
176 -- 185Martin Hahmann, Claudio Hartmann, Lars Kegel, Dirk Habich, Wolfgang Lehner. Big by blocks: modular analytics
186 -- 194Wolfram Wingerath, Felix Gessert, Steffen Friedrich, Norbert Ritter. Real-time stream processing for Big Data
195 -- 205Stefan Hagedorn, Philipp Götze, Omran Saleh, Kai-Uwe Sattler. Stream processing platforms for analyzing big dynamic data
206 -- 213Marwan Hassani, Thomas Seidl 0001. Clustering Big Data streams: recent challenges and contributions

Volume 58, Issue 3

117 -- 118Ivo Grosse, Katrin Hoffmann. Bioinformatics challenges of next generation sequencing
119 -- 125Steve Hoffmann, Peter F. Stadler. Read mapping
126 -- 132Eugene W. Myers. A history of DNA sequence assembly
133 -- 139Dongwan D. Kang, Edward M. Rubin, Zhong Wang. Reconstructing single genomes from complex microbial communities
140 -- 144Peter M. Krawitz. Challenges ahead for matchmaking
145 -- 149Elmar Jürgens. Software maintenance research that is empirically valid and useful in practice
150 -- 154Wojciech Samek. On robust spatial filtering of EEG in nonstationary environments

Volume 58, Issue 2

61 -- 62Manfred Thaller. Computer science in humanities
63 -- 69Desmond Allan Schmidt. Using standoff properties for marking-up historical documents in the humanities
70 -- 79Alexander Mehler, Rüdiger Gleim, Tim vor der Brück, Wahed Hemati, Tolga Uslu, Steffen Eger. Wikidition: Automatic lexiconization and linkification of text corpora
80 -- 88Lambert Schomaker. Design considerations for a large-scale image-based text search engine in historical manuscript collections
89 -- 96Hubert Mara. Made in the humanities: Dual integral invariants for efficient edge detection
97 -- 103Guy De Tré, Jeroen Deploige. Time modelling in digital humanities. Challenges posed by the development of a database of medieval charters
104 -- 111Juan A. Barceló. The role of computers to understand the past. The case of archaeological research
112 -- 116Kalman Graffi. Decentralized communication against surveillance and privacy violation

Volume 58, Issue 1

1 -- 2Sebastian Lehnhoff, Astrid Nieße. Energy Informatics
3 -- 14Denis Bytschkow. Towards composition principles and fractal architectures in the context of smart grids
15 -- 21Fabian Kern. Load flexibility in an industrial setting: Energy-aware test rig scheduling in the automotive industry
22 -- 28Jennifer Schoch. Modeling of battery life optimal charging strategies based on empirical mobility data
29 -- 36Marie Antoinette van Amelsvoort. SG-rating - Putting values on smart grid architectures
37 -- 43Oleg Valgaev, Friederich Kupzog. Building power demand forecasting
44 -- 48Judith Michael. Using cognitive models for behavioral assistance of humans
49 -- 60Tudor B. Ionescu, Walter Scheuermann. Architecting safety-critical decision-support systems for nuclear emergency management