Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 

Jörg Keller
FernUniversität in Hagen , Germany

B. Rederlechner, J. Keller:
A Note on Correctness Proofs for Overflow Detection Logic in Adders for d-th Complement Numbers
/jucs_3_10/a_note_on_correctness
page 1121 - 1125
Vol.3 / Issue 10
R. Kozik, M. Choras, J. Keller:
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
/jucs_25_1/balanced_efficient_lifelong_learning
page 2 - 15
Vol.25 / Issue 1
K. Simon, C. Moucha, J. Keller:
Contactless Vulnerability Analysis using Google and Shodan
/jucs_23_4/contactless_vulnerability_analysis_using
page 404 - 430
Vol.23 / Issue 4
J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec:
Cyberattack Detection and Response
/jucs_25_11/cyberattack_detection_and_response
page 1394 - 1395
Vol.25 / Issue 11
K. Echtle, J. Keller:
J.UCS Special Issue on Dependability Evaluation and Validation
/jucs_5_10/dependability_evaluation_and_validation
page 632 - 632
Vol.5 / Issue 10
J. Keller, T. Ungerer:
J.UCS Special Issue on Multithreaded Processors and Chip-Multiprocessors
/jucs_6_10/j_ucs_special_issue
page 906 - 907
Vol.6 / Issue 10
J. Keller, C.W. Kessler, R. Hultén:
Optimized On-Chip-Pipelining for Memory-Intensive Computations on Multi-Core Processors with Explicit Memory Hierarchy
/jucs_18_14/optimized_on_chip_pipelining
page 1987 - 2023
Vol.18 / Issue 14
M. Choraś, S. D'Antonio, J. Keller, R. Kozik:
Practical Applications of Data Analysis, Classification and Anomaly Detection
/jucs_26_4/practical_applications_of_data
page 432 - 433
Vol.26 / Issue 4
J. Keller, M. Grana, R. Kozik, T. Andrysiak, M. Choraś:
Recent Advances, Emerging Methods and Applications of Pattern Recognition
/jucs_25_6/recent_advances_emerging_methods
page 569 - 570
Vol.25 / Issue 6
S. Wendzel, J. Keller:
Security, Privacy and Reliability of Smart Buildings
/jucs_22_9/security_privacy_and_reliability
page 1201 - 1202
Vol.22 / Issue 9
J. Keller, I. Bernik, W. Mazurczyk:
Technical and Social Aspects of Critical Infrastructure Security
/jucs_24_5/technical_and_social_aspects
page 554 - 555
Vol.24 / Issue 5