Skip to main content Skip to main navigation

Publications

Displaying results 61 to 70 of 370.
  1. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International …

  2. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  3. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at …

  4. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …

  5. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. …

  6. Christian Husodo Schulz

    Well-formed Default Unification in Multiple Inheritance Hierarchies

    Mastersthesis, DFKI, 2007.

  7. Classifying Speakers According to Age and Gender

    In: Christian Müller (Hrsg.). Speaker Classification II. Pages 1-9, Lecture Notes in Computer Science / Artificial Intelligence (LNCS/LNAI), Vol. …

  8. Speaker Classification II - Selected Projects

    Lecture Notes on Artificial Intelligence (LNAI), Vol. 4441, Springer, New York - Berlin, 2007.

  9. Florian Metze; Jitendra Ajmera; Roman Englert; Udo Bub; Felix Burkhardt; Joachim Stegmann; Christian Müller; Richard Huber; Bernt Andrassy; Josef G. Bauer; Bernhard Littel

    Comparison of Four Approaches to Age and Gender Recognition for Telephone Applications

    In: Proceedings of the 32nd International Conference on Acoustics, Speech, and Signal Processing. International Conference on Acoustics, Speech and …

  10. Miaosen Shen; Stefan Hodek; Pang Z. Peng (Hrsg.)

    Control of the Z-Source Inverter for FCHEV with the Battery Connected to the Motor Neutral Point

    Power Electronics Specialists Conference (PESC-2007), June 17-21, Orlando, Floriada, USA, IEEE, 2007.