Skip to main content Skip to main navigation

Publications

 

Due to maintenance work, it is currently not possible to search for publications by author.

Displaying results 81 to 90 of 578.
  1. Attila Reiss; Gustaf Hendeby; Didier Stricker

    A novel confidence-based multiclass boosting algorithm for mobile physical activity monitoring

    In: Gail R. Casper; Anna M. McDaniel; Daniel Gatica-Perez; Daniel Roggen; Masaaki Fukumoto. Personal and Ubiquitous Computing. Pages 105-121, ISBN …

  2. Klaus-Dieter Thoben; Marius Veigt; Dennis Lappe; Marco Franke; Mirko Kück; Dennis Kolberg; Isabel Fahl; Roland Zimmerling; Jochen Schlick; Peter Stephan; Philipp Guth

    Towards Networking Logistics Resources to enable a Demand-Driven Material Supply for Lean Production Systems - Basic Concept and Potential of a Cyber-Physical Logistics System

    In: 7. International Scientific Symposium on Logistics. International Scientific Symposium on Logistics (ISSl-07), June 4-5, Köln, Germany, Pages …

  3. Andreas Dengel; Kristin Stamm

    Mapping Multichannel Documents to Attentive Tasks: Ensuring Information Gain and Detecting Failures

    In: F. Ana F. Joaquim. Agents and Artificial Intelligence. Pages 360-ff, Communications in Compute, Vol. 449, Springer, 2014.

  4. Navigation in Extreme Environments - Exploration of Jupiter's Moon Europa with Autonomous Underwater Vehicles

    In: Luft- und Raumfahrt - Antrieb zu neuen Horizonten. Deutscher Luft- und Raumfahrtkongress (DLRK-2014), September 16-18, Augsburg, Germany, DGLR, …

  5. Faisal Shafait

    Printer Identification using Supervised Learning for Document Forgery Detection

    In: Document Analysis Systems (DAS), 2014 11th IAPR International Workshop on . IAPR International Workshop on Document Analysis Systems (DAS-14),  …

  6. Pascal Lessel; Frederic Kerber; Dominic Gottwalles; Nico Herbig; André Zenner; Antonio Krüger

    Crowd-generated Outdoor Fitness Exercises

    CHI Workshop: HCI and Sports, 2014.

  7. Ansgar Bernardi; Wolfgang Schneider

    Die Schnittstellen müssen offen sein

    In: Deutsche Landwirtschafts-Gesellschaft (Hrsg.). DLG Mitteilungen, Vol. 2014, No. 6, Pages 24-25, DLG, 6/2014.

  8. Michael Backes; Stefan Nürnberger

    Oxymoron - Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing

    In: Proceedings of the 23rd USENIX Security Symposium. USENIX Security Symposium (USENIX-2014), August 20-22, San Diego, CA, USA, ISBN …

  9. Michael Backes; Thorsten Holz; Benjamin Kollenda; Philipp Koppe; Stefan Nürnberger; Jannik Pewny

    You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

    In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM Conference on Computer and Communications Security …

  10. Matthias Kreil; Bernhard Sick; Paul Lukowicz

    Dealing with human variability in motion based, wearable activity recognition

    In: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on . IEEE International Conference on …