Skip to main content Skip to main navigation

Publications

Displaying results 41 to 50 of 183.
  1. Mathias Stäger; Paul Lukowicz; Gerhard Tröster

    Power and accuracy trade-offs in sound-based context recognition systems

    In: Pervasive and Mobile Computing, Vol. 3, No. 3, Pages 300-327, Elsevier Science Publishers B. V. Amsterdam, The Netherlands, The Netherlands, 2007.

  2. Enriching input in Statistical Machine Translation

    Mastersthesis, School of Informatics, University of Edinburgh, 8/2007.

  3. Modelling Personality in Voices of Talking Products Through Prosodic Parameters

    In: Proceedings of the 10th International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-07), …

  4. Boris Brandherm; Helmut Prendinger; Mitsuru Ishizuka

    Interest estimation based on dynamic bayesian networks for visual attentive presentation agents

    In: Proceedings of the 9th international conference on Multimodal interfaces. International Conference on Multimodal Interfaces (ICMI-07), November …

  5. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International …

  6. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  7. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at …

  8. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …

  9. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. …

  10. Christian Husodo Schulz

    Well-formed Default Unification in Multiple Inheritance Hierarchies

    Mastersthesis, DFKI, 2007.