default search action
BibTeX records: Gerhard Kitzler
@article{DBLP:journals/siamsc/KitzlerS19, author = {Gerhard Kitzler and Joachim Sch{\"{o}}berl}, title = {A Polynomial Spectral Method for the Spatially Homogeneous Boltzmann Equation}, journal = {{SIAM} J. Sci. Comput.}, volume = {41}, number = {1}, pages = {B27--B49}, year = {2019}, url = {https://doi.org/10.1137/17M1160240}, doi = {10.1137/17M1160240}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamsc/KitzlerS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-01904, author = {Gerhard Kitzler and Joachim Sch{\"{o}}berl}, title = {A spatial discontinuous Galerkin method with rescaled velocities for the Boltzmann equation}, journal = {CoRR}, volume = {abs/1903.01904}, year = {2019}, url = {http://arxiv.org/abs/1903.01904}, eprinttype = {arXiv}, eprint = {1903.01904}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-01904.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/KitzlerS15, author = {Gerhard Kitzler and Joachim Sch{\"{o}}berl}, title = {A high order space-momentum discontinuous Galerkin method for the Boltzmann equation}, journal = {Comput. Math. Appl.}, volume = {70}, number = {7}, pages = {1539--1554}, year = {2015}, url = {https://doi.org/10.1016/j.camwa.2015.06.011}, doi = {10.1016/J.CAMWA.2015.06.011}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/KitzlerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/HuberMWKG11, author = {Markus Huber and Martin Mulazzani and Edgar R. Weippl and Gerhard Kitzler and Sigrun Goluch}, title = {Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam}, journal = {{IEEE} Internet Comput.}, volume = {15}, number = {3}, pages = {28--34}, year = {2011}, url = {https://doi.org/10.1109/MIC.2011.24}, doi = {10.1109/MIC.2011.24}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/HuberMWKG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/TjoaJGKGQ11, author = {Simon Tjoa and Stefan Jakoubi and Gernot Goluch and Gerhard Kitzler and Sigrun Goluch and Gerald Quirchmayr}, title = {A Formal Approach Enabling Risk-Aware Business Process Modeling and Simulation}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {4}, number = {2}, pages = {153--166}, year = {2011}, url = {https://doi.org/10.1109/TSC.2010.17}, doi = {10.1109/TSC.2010.17}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/TjoaJGKGQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JakoubiTGK10, author = {Stefan Jakoubi and Simon Tjoa and Sigrun Goluch and Gerhard Kitzler}, title = {A Formal Approach Towards Risk-Aware Service Level Analysis and Planning}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {180--187}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.86}, doi = {10.1109/ARES.2010.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/JakoubiTGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TjoaJGK10, author = {Simon Tjoa and Stefan Jakoubi and Sigrun Goluch and Gerhard Kitzler}, title = {Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {268--274}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.79}, doi = {10.1109/ARES.2010.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TjoaJGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuberMWKG10, author = {Markus Huber and Martin Mulazzani and Edgar R. Weippl and Gerhard Kitzler and Sigrun Goluch}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Exploiting social networking sites for spam}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {693--695}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866400}, doi = {10.1145/1866307.1866400}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuberMWKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.