Skip to main content Skip to main navigation

Publications

 

Due to maintenance work, it is currently not possible to search for publications by author.

Displaying results 71 to 80 of 370.
  1. Thomas Kleinbauer; Stephanie Becker; Tilman Becker

    Combining Multiple Information Layers for the Automatic Generation of Indicative Meeting Abstracts

    In: Proceedings of 11th European Workshop on Natural Language Generation. European Workshop on Natural Language Generation (ENLG-07), 11th, June …

  2. Torsten Bierz; Achim Ebert; Jörg Meyer (Hrsg.)

    Echtzeiterkennung von Gesten zur Interaktion mittels Consumer-Hardware

    Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung, 6. June 14-15, Paderborn, Germany, HNI Verlagsschriftenreihe, 2007.

  3. Sebastian Thelen; Torsten Bierz; Britta Müller; Hans Hagen; Achim Ebert; Eckard Friauf; Jörg Meyer

    A Framework for the Visualization of Brain Structures

    In: H. Hagen; M. Hering-Bertram; C. Garth. GI Lecture Notes in informatiacs, Visualization of Large and Unstructured Data Sets. Pages 54-63, GI …

  4. Torsten Bierz; Jörg Meyer; Achim Ebert

    GPU Accelerated Markerless Interaction

    In: H. Hagen; M. Hering-Bertram; C. Garth. Visualization of Large and Unstructured Data Sets. Pages 64-75, GI Lecture Notes in Informatics, 2007.

  5. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  6. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at …

  7. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …

  8. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. …

  9. Christian Husodo Schulz

    Well-formed Default Unification in Multiple Inheritance Hierarchies

    Mastersthesis, DFKI, 2007.

  10. Classifying Speakers According to Age and Gender

    In: Christian Müller (Hrsg.). Speaker Classification II. Pages 1-9, Lecture Notes in Computer Science / Artificial Intelligence (LNCS/LNAI), Vol. …