Skip to main content Skip to main navigation

Publications

Displaying results 61 to 70 of 370.
  1. Christian Müller; Felix Burkhardt

    Combining Short-term Cepstral and Long-term Prosodic Features for Automatic Recognition of Speaker Age

    In: Proceedings of the Interspeech 2007. Conference in the Annual Series of Interspeech Events (INTERSPEECH-07), August 27-31, Antwerp, Belgium, ISCA, 2007.

  2. Christian Hahn; Cristián Madrigal Mora; Klaus Fischer

    Interoperability through a Platform-Independent Model for Agents

    In: Ricardo J. Gonçalves; Jörg P. Müller; Kai Mertins; Martin Zelm. Enterprise Interoperability II: New Challenges and Approaches. Pages 195-206, ISBN 978-1-84628-857-9, Springer London, 2007.

  3. Klaus Fischer; Christian Hahn; Cristián Madrigal Mora

    Agent-oriented software engineering: a model-driven approach

    In: International Journal of Agent-Oriented Software Engineering (IJAOSE), Vol. 1, No. 3/4, Pages 334-369, Inderscience, 2007.

  4. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International Workshop on Modular Ontologies (WoMO-07), located at Fourth International Conference on Knowledge Capture (K-CAP-07), October 28, Whistler, BC, Canada, CEUR Workshop Proceedings, Vol. 315, CEUR-WS, 2007.

  5. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova Science Publishers, Inc. 2007.

  6. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at Associated with CAV 2006, August 21, Seattle, WA, USA, Pages 117-130, Vol. 174, No. 4, Electronic Notes in Theoretical Computer Science, 2007.

  7. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security (ESORICS-07), September 24 - August 26, Dresden, Germany, Lectures Notes in Computer Science (LNCS), Springer-Verlag, 2007.

  8. Kopplung von Zutrittskontrolle und Raumautomation - Eine Basis für die Interaktion mit einer intelligenten Umgebung

    In: VDI-Gesellschaft (Hrsg.). 8. Fachtagung Gebäudesicherheit und Gebäudeautomation - Koexistenz oder Integration?. Pages 37-48, VDI Berichte, Vol. 2005, Springer, Düsseldorf, 2007.

  9. Christian Husodo Schulz

    Well-formed Default Unification in Multiple Inheritance Hierarchies

    Mastersthesis, DFKI, 2007.

  10. Thomas Kleinbauer; Stephanie Becker; Tilman Becker

    Indicative Abstractive Summaries of Meetings

    In: Proceedings of 4th Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms. Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI-07), 4th, June 28-30, Brno, Czech Republic, Springer, 2007.