Skip to main content Skip to main navigation

Publications

 

Due to maintenance work, it is currently not possible to search for publications by author.

Displaying results 81 to 90 of 370.
  1. Y Huang; O. Vinyals; G. Friedland; Christian Müller; N. Mirghafori; C. Wooters

    A Fast-Match Approach for Robust, faster than Real-Time Speaker Diarization

    In: Proceedings of the tenth biannual IEEE workshop on Automatic Speech Recognition and Understanding. IEEE Automatic Speech Recognition and …

  2. Stefan Münzer; Hubert Zimmer; Maximilian Schwalm; Jörg Baus; Ilhan Alsan

    Computer Assisted Navigation and the Acquisition of Route and Survey Knowledge

    In: Journal of Environmental PhSychology, Vol. 26, Pages 200-208, Elsevier, 2007.

  3. Jörg Baus; Rainer Wasinger; Ilhan Aslan; Antonio Krüger; Andreas Maier; Tim Schwartz

    Auditory Perceptible Landmarks in Mobile Navigation

    In: Proceedings of the 2007 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces …

  4. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International …

  5. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  6. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at …

  7. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …

  8. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. …

  9. Christian Husodo Schulz

    Well-formed Default Unification in Multiple Inheritance Hierarchies

    Mastersthesis, DFKI, 2007.

  10. Younis Hijazi; Thomas Breuel

    Computing Arrangements using Subdivision and Interval Arithmetic

    In: Proceedings of the Sixth International Conference on Curves and Surfaces. International Conference on Curves and Surfaces, 6th, June 29 - July 5, …