Skip to main content Skip to main navigation

Publications

Displaying results 41 to 50 of 370.
  1. A. Morrison; Sirko Straube; H.E. Plesser; M. Diesmann

    Exact subthreshold integration with continuous spike times in discrete time neural network simulations

    In: Neural Computation, Vol. 19, Pages 47-79, MIT Press, 2007.

  2. Torsten Bierz; Achim Ebert; Jörg Meyer (Hrsg.)

    Echtzeiterkennung von Gesten zur Interaktion mittels Consumer-Hardware

    Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung, 6. June 14-15, Paderborn, Germany, HNI Verlagsschriftenreihe, 2007.

  3. Sebastian Thelen; Torsten Bierz; Britta Müller; Hans Hagen; Achim Ebert; Eckard Friauf; Jörg Meyer

    A Framework for the Visualization of Brain Structures

    In: H. Hagen; M. Hering-Bertram; C. Garth. GI Lecture Notes in informatiacs, Visualization of Large and Unstructured Data Sets. Pages 54-63, GI Lecture Notes in Informatics, 2007.

  4. Torsten Bierz; Jörg Meyer; Achim Ebert

    GPU Accelerated Markerless Interaction

    In: H. Hagen; M. Hering-Bertram; C. Garth. Visualization of Large and Unstructured Data Sets. Pages 64-75, GI Lecture Notes in Informatics, 2007.

  5. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International Workshop on Modular Ontologies (WoMO-07), located at Fourth International Conference on Knowledge Capture (K-CAP-07), October 28, Whistler, BC, Canada, CEUR Workshop Proceedings, Vol. 315, CEUR-WS, 2007.

  6. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova Science Publishers, Inc. 2007.

  7. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at Associated with CAV 2006, August 21, Seattle, WA, USA, Pages 117-130, Vol. 174, No. 4, Electronic Notes in Theoretical Computer Science, 2007.

  8. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security (ESORICS-07), September 24 - August 26, Dresden, Germany, Lectures Notes in Computer Science (LNCS), Springer-Verlag, 2007.

  9. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. 2005, Springer, Düsseldorf, 2007.

  10. Oliver Thomas; Michael Fellmann

    Semantic EPC: Enhancing Process Modeling Using Ontology Languages

    In: M. Hepp; Knut Hinkelmann; D. Karagiannis; R. Klein; N. Stojanovic (Hrsg.). Proceedings of the Workshop on Semantic Business Process and Product Lifecycle Management (SBPM 2007). Workshop on Semantic Business Process and Product Lifecycle Management (SBPM-2007), located at 4th European Semantic Web Conference (ESWC 2007), June 7, Innsbruck, Austria, RWTH Aachen, Aachen, 2007.