callback( { "result":{ "query":":facetid:toc:\"db/journals/pik/pik12.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"74.35" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"36", "@dc":"36", "@oc":"36", "@id":"43465842", "text":":facetid:toc:db/journals/pik/pik12.bht" } }, "hits":{ "@total":"36", "@computed":"36", "@sent":"36", "@first":"0", "hit":[{ "@score":"1", "@id":"6963569", "info":{"authors":{"author":{"@pid":"138/7451","text":"W. Acconci"}},"title":"Der COBOL85-Standard in der Praxis.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"210-212","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Acconci89","doi":"10.1515/PIKO.1989.12.4.206","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-4/piko.1989.12.4.206/piko.1989.12.4.206.xml","url":"https://dblp.org/rec/journals/pik/Acconci89"}, "url":"URL#6963569" }, { "@score":"1", "@id":"6963570", "info":{"authors":{"author":{"@pid":"14/6153","text":"Wolfgang Bez"}},"title":"Parallelverarbeitung im Rechnerverbund.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"91-95","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Bez89","doi":"10.1515/PIKO.1989.12.2.91","ee":"https://doi.org/10.1515/piko.1989.12.2.91","url":"https://dblp.org/rec/journals/pik/Bez89"}, "url":"URL#6963570" }, { "@score":"1", "@id":"6963571", "info":{"authors":{"author":{"@pid":"138/7379","text":"Rudolf Bodo"}},"title":"Informationssysteme, eine Strategische Waffe?","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"128","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Bodo89","doi":"10.1515/PIKO.1989.12.3.128","ee":"https://doi.org/10.1515/piko.1989.12.3.128","url":"https://dblp.org/rec/journals/pik/Bodo89"}, "url":"URL#6963571" }, { "@score":"1", "@id":"6963572", "info":{"authors":{"author":{"@pid":"138/7431","text":"Karl-Heinz Certa"}},"title":"Rechner-Netz-Potentiale und Vernetzungspraxis am Fachbereich Wirtschaft der FH-Wiesbaden.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"30-38","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Certa89","doi":"10.1515/PIKO.1989.12.1.30","ee":"https://doi.org/10.1515/piko.1989.12.1.30","url":"https://dblp.org/rec/journals/pik/Certa89"}, "url":"URL#6963572" }, { "@score":"1", "@id":"6963573", "info":{"authors":{"author":{"@pid":"53/5065","text":"Werner Dirlewanger"}},"title":"Das betriebliche Rechenzentrum im Umbruch.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"111-112","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Dirlewanger89","doi":"10.1515/PIKO.1989.12.2.111","ee":"https://doi.org/10.1515/piko.1989.12.2.111","url":"https://dblp.org/rec/journals/pik/Dirlewanger89"}, "url":"URL#6963573" }, { "@score":"1", "@id":"6963574", "info":{"authors":{"author":{"@pid":"53/5065","text":"Werner Dirlewanger"}},"title":"Massenspeicherung von Daten im operateurlosen Bandarchiv.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"182-184","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Dirlewanger89a","doi":"10.1515/PIKO.1989.12.3.182","ee":"https://doi.org/10.1515/piko.1989.12.3.182","url":"https://dblp.org/rec/journals/pik/Dirlewanger89a"}, "url":"URL#6963574" }, { "@score":"1", "@id":"6963575", "info":{"authors":{"author":{"@pid":"53/5065","text":"Werner Dirlewanger"}},"title":"Controlling durch das RZ? (Und wer kontrolliert das RZ?).","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"239-241","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Dirlewanger89b","doi":"10.1515/PIKO.1989.12.4.239","ee":"https://doi.org/10.1515/piko.1989.12.4.239","url":"https://dblp.org/rec/journals/pik/Dirlewanger89b"}, "url":"URL#6963575" }, { "@score":"1", "@id":"6963576", "info":{"authors":{"author":{"@pid":"05/1114","text":"Matthias R. Engelhardt"}},"title":"Grundmechanismen im PCS.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"225-228","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Engelhardt89","doi":"10.1515/PIKO.1989.12.4.225","ee":"https://doi.org/10.1515/piko.1989.12.4.225","url":"https://dblp.org/rec/journals/pik/Engelhardt89"}, "url":"URL#6963576" }, { "@score":"1", "@id":"6963577", "info":{"authors":{"author":{"@pid":"138/7383","text":"Manfred Eyßell"}},"title":"PC-Kompatibilität.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"23-29","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Eyssell89","doi":"10.1515/PIKO.1989.12.1.23","ee":"https://doi.org/10.1515/piko.1989.12.1.23","url":"https://dblp.org/rec/journals/pik/Eyssell89"}, "url":"URL#6963577" }, { "@score":"1", "@id":"6963578", "info":{"authors":{"author":{"@pid":"138/7383","text":"Manfred Eyßell"}},"title":"AT-Kompatibilität.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"82-90","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Eyssell89a","doi":"10.1515/PIKO.1989.12.2.82","ee":"https://doi.org/10.1515/piko.1989.12.2.82","url":"https://dblp.org/rec/journals/pik/Eyssell89a"}, "url":"URL#6963578" }, { "@score":"1", "@id":"6963579", "info":{"authors":{"author":{"@pid":"138/7352","text":"Gerda Figge"}},"title":"ISDN - Eine reale Chance.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"64","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Figge89","doi":"10.1515/PIKO.1989.12.2.64","ee":"https://doi.org/10.1515/piko.1989.12.2.64","url":"https://dblp.org/rec/journals/pik/Figge89"}, "url":"URL#6963579" }, { "@score":"1", "@id":"6963580", "info":{"authors":{"author":[{"@pid":"81/871","text":"Harald Geist"},{"@pid":"116/7901","text":"Rainer Glaschick"}]},"title":"Strategieüberlegungen für ein heterogenes Netz existierender Rechner.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"66-71","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/GeistG89","doi":"10.1515/PIKO.1989.12.2.66","ee":"https://doi.org/10.1515/piko.1989.12.2.66","url":"https://dblp.org/rec/journals/pik/GeistG89"}, "url":"URL#6963580" }, { "@score":"1", "@id":"6963581", "info":{"authors":{"author":{"@pid":"56/307","text":"Wolfgang Gentzsch"}},"title":"Parallelverarbeitung auf den Rechnern von CRAY, IBM, ALLIANT und CONVEX.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"132-137","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Gentzsch89","doi":"10.1515/PIKO.1989.12.3.132","ee":"https://doi.org/10.1515/piko.1989.12.3.132","url":"https://dblp.org/rec/journals/pik/Gentzsch89"}, "url":"URL#6963581" }, { "@score":"1", "@id":"6963582", "info":{"authors":{"author":[{"@pid":"14/1974","text":"Werner Heinzel"},{"@pid":"138/7354","text":"Ralf Krieg"}]},"title":"Realisation und Einsatz eines Expertensystems zur Diagnose von Schilddrüsenerkrankungen.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"138-143","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/HeinzelK89","doi":"10.1515/PIKO.1989.12.3.138","ee":"https://doi.org/10.1515/piko.1989.12.3.138","url":"https://dblp.org/rec/journals/pik/HeinzelK89"}, "url":"URL#6963582" }, { "@score":"1", "@id":"6963583", "info":{"authors":{"author":[{"@pid":"24/3267","text":"Gerhard Heyer"},{"@pid":"42/114","text":"Ralf Kese"}]},"title":"Intelligente Textverarbeitung.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"213-216","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/HeyerK89","doi":"10.1515/PIKO.1989.12.4.213","ee":"https://doi.org/10.1515/piko.1989.12.4.213","url":"https://dblp.org/rec/journals/pik/HeyerK89"}, "url":"URL#6963583" }, { "@score":"1", "@id":"6963584", "info":{"authors":{"author":{"@pid":"21/2479","text":"Dietmar Hoffmann"}},"title":"Von SINIX zu DISOSS/370: DIA.X und DCA.X.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"106-110","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Hoffmann89","doi":"10.1515/PIKO.1989.12.2.106","ee":"https://doi.org/10.1515/piko.1989.12.2.106","url":"https://dblp.org/rec/journals/pik/Hoffmann89"}, "url":"URL#6963584" }, { "@score":"1", "@id":"6963585", "info":{"authors":{"author":[{"@pid":"18/4594","text":"Yeung-Cho Ip"},{"@pid":"e/ErnstWBiersack","text":"Ernst W. Biersack"}]},"title":"Netzkopplungen - Stand der Technik.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"72-76","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/IpB89","doi":"10.1515/PIKO.1989.12.2.66","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-2/piko.1989.12.2.66/piko.1989.12.2.66.xml","url":"https://dblp.org/rec/journals/pik/IpB89"}, "url":"URL#6963585" }, { "@score":"1", "@id":"6963586", "info":{"authors":{"author":{"@pid":"55/1355","text":"Günther Krönert"}},"title":"ODA/ODIF-Basisnorm und funktionelle Normen für Dokument-Austauschformate.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"144-149","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Kronert89","doi":"10.1515/PIKO.1989.12.3.144","ee":"https://doi.org/10.1515/piko.1989.12.3.144","url":"https://dblp.org/rec/journals/pik/Kronert89"}, "url":"URL#6963586" }, { "@score":"1", "@id":"6963587", "info":{"authors":{"author":{"@pid":"138/7422","text":"Dietrich Kruse"}},"title":"Sicherheit in Kommunikationssystemen - Anwendung von Chipkarte und Kryptographie.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"77-81","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Kruse89","doi":"10.1515/PIKO.1989.12.2.66","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-2/piko.1989.12.2.66/piko.1989.12.2.66.xml","url":"https://dblp.org/rec/journals/pik/Kruse89"}, "url":"URL#6963587" }, { "@score":"1", "@id":"6963588", "info":{"authors":{"author":{"@pid":"l/FranzLehner","text":"Franz Lehner 0001"}},"title":"Organisation und methodische Unterstützung der Softwarewartung.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"160-173","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Lehner89","doi":"10.1515/PIKO.1989.12.3.160","ee":"https://doi.org/10.1515/piko.1989.12.3.160","url":"https://dblp.org/rec/journals/pik/Lehner89"}, "url":"URL#6963588" }, { "@score":"1", "@id":"6963589", "info":{"authors":{"author":{"@pid":"07/6591","text":"Theodor Meis"}},"title":"Vergangenheit und Zukunft prozedualer Sprachen.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"206-209","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Meis89","doi":"10.1515/PIKO.1989.12.4.206","ee":"https://doi.org/10.1515/piko.1989.12.4.206","url":"https://dblp.org/rec/journals/pik/Meis89"}, "url":"URL#6963589" }, { "@score":"1", "@id":"6963590", "info":{"authors":{"author":{"@pid":"59/2610","text":"Reginald Muchsel"}},"title":"Transparenz durch SW-Monitore.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"39-43","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Muchsel89","doi":"10.1515/PIKO.1989.12.1.39","ee":"https://doi.org/10.1515/piko.1989.12.1.39","url":"https://dblp.org/rec/journals/pik/Muchsel89"}, "url":"URL#6963590" }, { "@score":"1", "@id":"6963591", "info":{"authors":{"author":{"@pid":"59/2610","text":"Reginald Muchsel"}},"title":"Auf dem Weg zur RZ-Automation.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"229-232","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Muchsel89a","doi":"10.1515/PIKO.1989.12.4.229","ee":"https://doi.org/10.1515/piko.1989.12.4.229","url":"https://dblp.org/rec/journals/pik/Muchsel89a"}, "url":"URL#6963591" }, { "@score":"1", "@id":"6963592", "info":{"authors":{"author":{"@pid":"138/7347","text":"Erich Richthammer"}},"title":"Qualitätssicherung mit MOSES.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"101-105","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Richthammer89","doi":"10.1515/PIKO.1989.12.2.101","ee":"https://doi.org/10.1515/piko.1989.12.2.101","url":"https://dblp.org/rec/journals/pik/Richthammer89"}, "url":"URL#6963592" }, { "@score":"1", "@id":"6963593", "info":{"authors":{"author":{"@pid":"138/7437","text":"Heinrich Ritter"}},"title":"Einsatz von PC-Graphik in Statistik und Sozialforschung.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"217-224","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Ritter89","doi":"10.1515/PIKO.1989.12.4.213","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-4/piko.1989.12.4.213/piko.1989.12.4.213.xml","url":"https://dblp.org/rec/journals/pik/Ritter89"}, "url":"URL#6963593" }, { "@score":"1", "@id":"6963594", "info":{"authors":{"author":{"@pid":"41/1246","text":"Reinhard Röpling-Lenhart"}},"title":"Mini-Maxi-Supercomputer.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"2","pages":"96-100","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Ropling-Lenhart89","doi":"10.1515/PIKO.1989.12.2.91","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-2/piko.1989.12.2.91/piko.1989.12.2.91.xml","url":"https://dblp.org/rec/journals/pik/Ropling-Lenhart89"}, "url":"URL#6963594" }, { "@score":"1", "@id":"6963595", "info":{"authors":{"author":{"@pid":"138/7335","text":"Ortwin Rose"}},"title":"Ein Überblick über die ISO/OSI-Management-Architektur.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"150-159","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Rose89","doi":"10.1515/PIKO.1989.12.3.144","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-3/piko.1989.12.3.144/piko.1989.12.3.144.xml","url":"https://dblp.org/rec/journals/pik/Rose89"}, "url":"URL#6963595" }, { "@score":"1", "@id":"6963596", "info":{"authors":{"author":{"@pid":"11/1318","text":"Helmuth Sagawe"}},"title":"Ist ein sinnvoller Datenschutz durch das Password gewährleistet?","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"174-181","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Sagawe89","doi":"10.1515/PIKO.1989.12.3.160","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-3/piko.1989.12.3.160/piko.1989.12.3.160.xml","url":"https://dblp.org/rec/journals/pik/Sagawe89"}, "url":"URL#6963596" }, { "@score":"1", "@id":"6963597", "info":{"authors":{"author":[{"@pid":"17/5669","text":"Peter Sandner"},{"@pid":"15/395","text":"Hans Werner Meuer"}]},"title":"Universitätsrechenzentren - Gegenwart und Zukunft.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"4-5","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/SandnerM89","doi":"10.1515/PIKO.1989.12.1.4","ee":"https://doi.org/10.1515/piko.1989.12.1.4","url":"https://dblp.org/rec/journals/pik/SandnerM89"}, "url":"URL#6963597" }, { "@score":"1", "@id":"6963598", "info":{"authors":{"author":{"@pid":"96/6210","text":"Werner Schneider"}},"title":"Mensch-Maschine-Schnittstelle.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"3","pages":"129-131","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Schneider89","doi":"10.1515/PIKO.1989.12.3.129","ee":"https://doi.org/10.1515/piko.1989.12.3.129","url":"https://dblp.org/rec/journals/pik/Schneider89"}, "url":"URL#6963598" }, { "@score":"1", "@id":"6963599", "info":{"authors":{"author":{"@pid":"93/923","text":"Peter Schnupp"}},"title":"Was hat die Informatik für die Datenverarbeitung getan?","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"6-10","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Schnupp89","doi":"10.1515/PIKO.1989.12.1.6","ee":"https://doi.org/10.1515/piko.1989.12.1.6","url":"https://dblp.org/rec/journals/pik/Schnupp89"}, "url":"URL#6963599" }, { "@score":"1", "@id":"6963600", "info":{"authors":{"author":{"@pid":"16/1833","text":"Harry M. Sneed"}},"title":"Software Engineering - Überblick.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"11-18","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Sneed89","doi":"10.1515/PIKO.1989.12.1.11","ee":"https://doi.org/10.1515/piko.1989.12.1.11","url":"https://dblp.org/rec/journals/pik/Sneed89"}, "url":"URL#6963600" }, { "@score":"1", "@id":"6963601", "info":{"authors":{"author":{"@pid":"57/2828","text":"Hartwig U. Steusloff"}},"title":"Braucht Denkarbeit Werkzeuge?","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"204-205","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Steusloff89","doi":"10.1515/PIKO.1989.12.4.204","ee":"https://doi.org/10.1515/piko.1989.12.4.204","url":"https://dblp.org/rec/journals/pik/Steusloff89"}, "url":"URL#6963601" }, { "@score":"1", "@id":"6963602", "info":{"authors":{"author":{"@pid":"73/1984","text":"Elmar Stöcker"}},"title":"IT-Sicherheitskriterien - Bewertungsmaßstab für Systeme der Informationstechnik.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"4","pages":"233-238","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Stocker89","doi":"10.1515/PIKO.1989.12.4.229","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-4/piko.1989.12.4.229/piko.1989.12.4.229.xml","url":"https://dblp.org/rec/journals/pik/Stocker89"}, "url":"URL#6963602" }, { "@score":"1", "@id":"6963603", "info":{"authors":{"author":{"@pid":"26/4866","text":"Hans-Martin Wacker"}},"title":"Das skalierte Gesetz von Amdahl.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"44-48","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/Wacker89","doi":"10.1515/PIKO.1989.12.1.44","ee":"https://doi.org/10.1515/piko.1989.12.1.44","url":"https://dblp.org/rec/journals/pik/Wacker89"}, "url":"URL#6963603" }, { "@score":"1", "@id":"6963604", "info":{"authors":{"author":[{"@pid":"57/2595","text":"Rainer Worst"},{"@pid":"40/6193","text":"Jost Bernasch"}]},"title":"COMMA: Ein Werkzeugverbung zum Anpassen von Projektrichtlinien.","venue":"Prax. Inf.verarb. Kommun.","volume":"12","number":"1","pages":"19-22","year":"1989","type":"Journal Articles","access":"closed","key":"journals/pik/WorstB89","doi":"10.1515/PIKO.1989.12.1.11","ee":"http://www.degruyter.com/view/j/piko.1989.12.issue-1/piko.1989.12.1.11/piko.1989.12.1.11.xml","url":"https://dblp.org/rec/journals/pik/WorstB89"}, "url":"URL#6963604" } ] } } } )