Skip to main content Skip to main navigation

Publications

 

Due to maintenance work, it is currently not possible to search for publications by author.

Displaying results 61 to 70 of 183.
  1. Torsten Bierz; Achim Ebert; Jörg Meyer (Hrsg.)

    Echtzeiterkennung von Gesten zur Interaktion mittels Consumer-Hardware

    Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung, 6. June 14-15, Paderborn, Germany, HNI Verlagsschriftenreihe, 2007.

  2. Sebastian Thelen; Torsten Bierz; Britta Müller; Hans Hagen; Achim Ebert; Eckard Friauf; Jörg Meyer

    A Framework for the Visualization of Brain Structures

    In: H. Hagen; M. Hering-Bertram; C. Garth. GI Lecture Notes in informatiacs, Visualization of Large and Unstructured Data Sets. Pages 54-63, GI …

  3. Torsten Bierz; Jörg Meyer; Achim Ebert

    GPU Accelerated Markerless Interaction

    In: H. Hagen; M. Hering-Bertram; C. Garth. Visualization of Large and Unstructured Data Sets. Pages 64-75, GI Lecture Notes in Informatics, 2007.

  4. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International …

  5. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  6. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at …

  7. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …

  8. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. …

  9. Christian Husodo Schulz

    Well-formed Default Unification in Multiple Inheritance Hierarchies

    Mastersthesis, DFKI, 2007.

  10. Classifying Speakers According to Age and Gender

    In: Christian Müller (Hrsg.). Speaker Classification II. Pages 1-9, Lecture Notes in Computer Science / Artificial Intelligence (LNCS/LNAI), Vol. …