Skip to main content Skip to main navigation

Publikationen

 

Aufgrund von Wartungsarbeiten ist die Suche von Publikationen nach Autor:innen derzeit nicht möglich.

Zeige Ergebnisse 81 bis 90 von 504
  1. Noemi Toth; László Gulyás; Richard O. Legendi; Paul Duijn; Peter M. A. Sloot; George Kampis

    The importance of centralities in dark network value chains

    In: The European Physical Journal - Special Topics (EPJ ST), Vol. 222, No. 6, Pages 1413-1439, Springer, Berlin Heidelberg, 2013.

  2. G. Spina; F. Roberts; Jens Weppner; Paul Lukowicz; O. Amft

    CRNTC+: A smartphone-based sensor processing framework for prototyping personal healthcare applications

    In: Pervasive Computing Technologies for Healthcare. International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive …

  3. Ralf Biedert

    Gaze Based Human-Text Interaction Text 2.0

    PhD-Thesis, DFKI, 2013.

  4. Eve Mitleton-Kelly; Paul Lukowicz

    Introduction: The SOCIONICAL FP7 Project and an Outline of the Volume

    In: Eve Mitleton-Kelly (Hrsg.). Co-Evolution of Intelligent Socio-Technical Systems: Modelling and Applications in Large Scale Emergency and Transport …

  5. Daniel Roggen; Paul Lukowicz; Lois Ferscha; José del R. Millán; Gerhard Tröster; Ricardo Chavarriaga

    Opportunistic human activity and context recognition

    In: IEEE Computer, Vol. 46, No. 2, Pages 36-45, IEEE, 2013.

  6. Gerald Bauer; Ulf Blanke; Paul Lukowicz; Bernt Schiele

    User independent, multi-modal spotting of subtle arm actions with minimal training data

    In: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on . IEEE International Conference on …

  7. Miguel Sousa; Axel Techmer; Axel Steinhage; Christl Lauterbach; Paul Lukowicz

    Human tracking and identification using a sensitive floor and wearable accelerometers

    In: Pervasive Computing and Communications (PerCom), 2013 IEEE International Conference on. IEEE International Conference on Pervasive Computing and …

  8. Lassaad Cheikhrouhou; Werner Stephan; Markus Ullmann

    A New Approach to the Inductive Verification of Cryptographic Protocols Based on Message Algebras

    MACIS 2013, Nanning, China, December 11-13, Vol. Proceedings of the Fifth International Conference on Mathematical Aspects of Computer and …