Skip to main content Skip to main navigation

Publications

 

Due to maintenance work, it is currently not possible to search for publications by author.

Displaying results 81 to 90 of 370.
  1. Programming and Simulation of Quantum Search Agents

    In: Proceedings of the 2007 International Conference on Autonomous Agents and Multiagent Systems. International Conference on Autonomous Agents and …

  2. Josenildo Costa da Silva; Matthias Klusch

    Privacy-Preserving Discovery of Frequent Patterns in Time Series

    In: Petra Perner (Hrsg.). Advances in Data Mining. Theoretical Aspects and Applications. Industrial Conference on Data Mining (ICDM-2007), 7th, July …

  3. Matthias Klusch; K. Hindriks; L. Sterling; M. Papazoglou (Hrsg.)

    Cooperative Information Agents XI. Proceedings of the Eleventh Intenational Workshop

    International Workshop on Cooperative Information Agents (CIA-2007), September 19-21, Delft, Netherlands, Lecture Notes in Artificial Intelligence …

  4. Thomas Breuel

    The hOCR Microformat for OCR Workflow and Results

    In: Proceedings of the Ninth International Conference on Document Analysis and Recognition. International Conference on Document Analysis and …

  5. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International …

  6. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  7. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at …

  8. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …

  9. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. …

  10. Christian Husodo Schulz

    Well-formed Default Unification in Multiple Inheritance Hierarchies

    Mastersthesis, DFKI, 2007.