Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 55 matches
- 2007
- Werner Arnold:
Freie Software und Schule. LOG IN 27(144): 10-14 (2007) - John Bardeen:
Geschichte Konkurrenz zur Rundfunkröhre Aus dem Leben des Physikers. LOG IN 27(148): 100 (2007) - Rüdeger Baumann:
Authentisierung ohne Wissenspreisgabe - Kryptografische Protokolle im Informatikunterricht. LOG IN 27(145): 35-43 (2007) - Rüdeger Baumann:
Informatisches Problemlösen. LOG IN 27(146/147): 45-52 (2007) - Rüdeger Baumann:
Modellierung von Zuständen, Objekten und Suchbäumen Mit Unterrichtsbeispielen in JAVA. LOG IN 27(148): 73-80 (2007) - Hendrik Büdding:
PDAs im schulischen Einsatz - Mit dem PDA das Programmieren lernen. LOG IN 27(145): 28-34 (2007) - Hendrik Büdding, Michael Homann:
NXT-Roboter und mobile Endgeräte im Informatikunterricht. LOG IN 27(145): 44-51 (2007) - Ralph Carrie, Ludger Humbert:
Mobiltelefone in der Oberstufe - Informatikunterricht im normalen Klassenraum - dank Mobiltelefon und PYTHON! LOG IN 27(145): 19-22 (2007) - Tommy Durda:
Evaluierungsmöglichkeiten von Bildungsstandards. LOG IN 27(146/147): 23-26 (2007) - Michael Fothe, Wolfgang Moldenhauer, Otto Thiele:
Von der Komplexität eines Zentralabiturs - Thüringer Erfahrungen im Grund- und Leistungsfach Informatik. LOG IN 27(148): 24-31 (2007) - Rita Freudenberg, Mirek Hancl, Esther Mietzsch:
Es quiekt im Unterricht - Unterrichtstipps für den Einsatz von SQUEAK. LOG IN 27(144): 30-38 (2007) - Werner Gieseke:
Das Zentralabitur Informatik in Niedersachsen. LOG IN 27(148): 32-35 (2007) - Matthias Heming, Ludger Humbert, Gerhard Röhner:
Vorbereitung aufs Abitur Abituranforderungen transparent gestalten mit Operatoren. LOG IN 27(148): 63-68 (2007) - Gerrit Kalkbrenner:
Technologie und Evolution der Mobilkommunikation - State of the Art. LOG IN 27(145): 10-14 (2007) - Gerrit Kalkbrenner:
Neue Inhalte für den Informatikunterricht - Gibt es einen mobilkommunikationszentrierten Ansatz für die Schulinformatik? LOG IN 27(145): 15-18 (2007) - Lutz Kohl, Michael Fothe:
Algorithmen aus einer anderen Perspektive - Ein Vorschlag für ein Kompetenzmodell zum Inhaltsbereich "Algorithmen" der "Bildungsstandards Informatik". LOG IN 27(146/147): 20-22 (2007) - Lutz Kohl, Gabor Meißner, Harald Schmidt:
PUCK - ein Sommernachtstraum - Ein Open-Source-Projekt für die Sekundarstufe I. LOG IN 27(144): 39-47 (2007) - Jürgen Müller:
Werkstatt - Experimente & Modelle: Das Gibbs'sche Phänomen. LOG IN 27(144): 48-51 (2007) - Steven Müller:
Grid Computing - Teil 1: Die Idee. LOG IN 27(144): 52-55 (2007) - Jürgen Müller:
Werkstatt - Experimente & Modelle: Mobilkommunikation im Experiment. LOG IN 27(145): 52-55 (2007) - Steven Müller:
Grid Computing - Teil 2: Die serviceorientierte Architektur. LOG IN 27(145): 56-60 (2007) - Jürgen Müller:
Werkstatt - Experimente & Modelle: Kanalfehler. LOG IN 27(146/147): 60-64 (2007) - Steven Müller:
Grid Computing - Teil 3 und Schluss: Von der Vision zur Realität. LOG IN 27(146/147): 65-70 (2007) - Jürgen Müller:
Werkstatt Experimente & Modelle: Fehlererkennung und Fehlerkorrektur. LOG IN 27(148): 90-95 (2007) - Heiko Neupert, Holger Rohland:
Modellierung der Datenbasis von Datenbanken - Modellierungsaspekte bei der Behandlung von Datenbanksystemen in der Sekundarstufe I. LOG IN 27(146/147): 27-35 (2007) - Rolf Niedermeier, Jörg Vogel, Michael Fothe, Mirko König:
Das Knotenüberdeckungsproblem - Eine Fallstudie zur Didaktik NP-schwerer Probleme (Teil 1). LOG IN 27(146/147): 53-59 (2007) - Rolf Niedermeier, Jörg Vogel, Michael Fothe, Mirko König:
Das Knotenüberdeckungsproblem Eine Fallstudie zur Didaktik NP-schwerer Probleme (Teil 2). LOG IN 27(148): 81-89 (2007) - Hermann Puhlmann, Steffen Friedrich:
Die Standards - und wie weiter? Zur Beurteilung von Aufgaben für Unterricht und Test. LOG IN 27(146/147): 16-19 (2007) - Herbert Reckmann:
Potenziale Freier Software - Ein Plädoyer für GNU/Linux in Schule und Elternhaus. LOG IN 27(144): 15-21 (2007) - Gerhard Röhner:
Das Landesabitur Informatik in Hessen. LOG IN 27(148): 36-41 (2007)
skipping 25 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 09:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint