Skip to main content Skip to main navigation

Publikationen

Zeige Ergebnisse 51 bis 60 von 504
  1. Christoph Igel; Martin Haag

    Innovative e-Learning Technologies in Medicine and Healthcare.

    In: M. Fischer; N Graf (Hrsg.). GMS Medical Informatics, Biometry and Epidemiology (MIBE), 2013.

  2. MMIR Framework: Multimodal Mobile Interaction and Rendering

    In: Matthias Horbach (Hrsg.). INFORMATIK 2013: Informatik angepasst an Mensch, Organisation und Umwelt. Workshop Modellbasierte Entwicklung von …

  3. Aaron Ruß; Michael Kaisser

    Exploratory Search on Social Media

    In: Pavel Serdyukov; Pavel Braslavski; Sergei O. Kuznetsov; Jaap Kamps; Stefan Rüger; Eugene Agichtein; Ilya Segalovich; Emine Yilmaz (Hrsg.). …

  4. Frederik Wiehr; Vidya Setlur; Alark Joshi

    DriveSense: Contextual handling of large-scale route map data for the automobile

    In: IEEE Conference Publications. IEEE International Conference on Big Data (IEEE BigData-2013), October 6-9, Santa Clara, CA, USA, Pages 87-94, IEEE, …

  5. Christian Stahl

    Distortion-free 3D reconstruction and discrepancy check using an PGBD camera.

    Mastersthesis, Technical University of Kaiserslautern, 2013.

  6. Christopher Schölzel

    Dynamic Model Switching for Body Tracking Based on Motion Pattern Classification

    Mastersthesis, Technical University of Kaiserslautern, 2013.

  7. Oliver Wasenmüller

    Enhancing Dense 3D Models by Multi-View Triangulation and Subsequent Illumination Estimation

    Mastersthesis, Technical University of Kaiserslautern, 2013.

  8. Lucas Davi; Alexandra Dmitrienko; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

    In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM Symposium on Information, Computer and …

  9. Sören Bleikertz; Sven Bugiel; Hugo Ideler; Stefan Nürnberger; Ahmad-Reza Sadeghi

    Client-controlled Cryptography-as-a-Service in the Cloud

    In: Proceedings of the 11th International Conference on Applied Cryptography and Network Security 2013. International Conference on Applied …