Philipp Amann, Gerald Quirchmayr Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing.. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2003, pp:119-131 [Conf]
Thomas F. Gordon, Gerald Quirchmayr Der Einsatz der Modellierungssprache OBLOG zum Entwurf von Juristischen Expertensystemen im Wege des Prototyping am Beispiel eines Modells des Verfahrens der Eidesstattlichen Versicherung. [Citation Graph (0, 0)][DBLP] EMISA, 1987, pp:137-154 [Conf]
Gerald Quirchmayr, Manfred Weihermüller Konzeptionelle Vorschläge für eine umfassende IT-Unterstützung von Richtern und Staatsanwälten sowie Ansätze zu ihrer Realisierung auf der Grundlage vernetzbarer PCs des Industriestandards. [Citation Graph (0, 0)][DBLP] GI Jahrestagung, 1987, pp:713-728 [Conf]
Gerald Quirchmayr An International Security Perspective. [Citation Graph (0, 0)][DBLP] International Information Security Workshops, 2004, pp:159-164 [Conf]
Gerald Quirchmayr, Jill Slay Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science. [Citation Graph (0, 0)][DBLP] TelE-Learning, 2002, pp:177-184 [Conf]
Jill Slay, Gerald Quirchmayr The Role Of Culture In the Development of Global E-Commerce Systems. [Citation Graph (0, 0)][DBLP] Information Systems: The e-Business Challenge, 2002, pp:103-115 [Conf]
Peter Starzacher, Gerald Quirchmayr, Roland Wagner Comparison and Analysis of Selected CIM-Laboratory Concepts and their Importance for the Improvement of Staff Training. [Citation Graph (0, 0)][DBLP] Information Management in Computer Integrated Manufacturing, 1995, pp:613-637 [Conf]
Blended Learning Technology in Information Security Management Courses. [Citation Graph (, )][DBLP]
A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. [Citation Graph (, )][DBLP]
Enhancing Business Impact Analysis and Risk Assessment Applying a Risk-Aware Business Process Modeling and Simulation Methodology. [Citation Graph (, )][DBLP]
A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results. [Citation Graph (, )][DBLP]
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services. [Citation Graph (, )][DBLP]
The motivation and proposition of a privacy-enhancing architecture for operational databases. [Citation Graph (, )][DBLP]
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support. [Citation Graph (, )][DBLP]
Some Thoughts on the Legal Background of the Continuously Increasing Privacy Risk in Information Systems and on How to Deal with It. [Citation Graph (, )][DBLP]
Einige aktuelle Gründe für eine integrierte Betrachtung von Rechtsinformatik und Informationsrecht. [Citation Graph (, )][DBLP]
A platform for the development of location-based mobile applications with privacy protection. [Citation Graph (, )][DBLP]
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management. [Citation Graph (, )][DBLP]
A middleware for location-based mobile applications with privacy protection. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP