Skip to main content Skip to main navigation

Publikationen

Zeige Ergebnisse 41 bis 50 von 370.
  1. A. Morrison; Sirko Straube; H.E. Plesser; M. Diesmann

    Exact subthreshold integration with continuous spike times in discrete time neural network simulations

    In: Neural Computation, Vol. 19, Pages 47-79, MIT Press, 2007.

  2. Kai Kunze; Paul Lukowicz

    Using acceleration signatures from everyday activities for on-body device location

    In: Proceedings of the 2007 11th IEEE International Symposium on Wearable Computers. IEEE International Symposium on Wearable Computers (ISWC-2007), 11th, October 11-13, Boston, MA, USA, Pages 1-2, ISBN 978-1-4244-1452-9, IEEE Computer Society, 2007.

  3. Kai Kunze; Paul Lukowicz

    Symbolic object localization through active sampling of acceleration and sound signatures

    In: Proceedings of the 9th international conference on Ubiquitous computing. International Conference on Ubiquitous Computing (Ubicomp-07), 9th, September 16-19, Innsbruck, Austria, Pages 163-180, Lecture Notes in Computer Science (LNCS), Vol. 4717, ISBN 978-3-540-74852-6, Springer-Verlag, 2007.

  4. Paul Lukowicz; Andreas Timm-Giel; Michael Lawo; Otthein Herzog

    WearIT@work: Toward Real-World Industrial Wearable Computing

    In: IEEE Pervasive Computing, Vol. 6, No. 4, Pages 8-13, IEEE Educational Activities Department, Piscataway, NJ, USA, 2007.

  5. Mathias Stäger; Paul Lukowicz; Gerhard Tröster

    Power and accuracy trade-offs in sound-based context recognition systems

    In: Pervasive and Mobile Computing, Vol. 3, No. 3, Pages 300-327, Elsevier Science Publishers B. V. Amsterdam, The Netherlands, The Netherlands, 2007.

  6. Torsten Bierz; Jörg Meyer; Achim Ebert

    GPU Accelerated Markerless Interaction

    In: H. Hagen; M. Hering-Bertram; C. Garth. Visualization of Large and Unstructured Data Sets. Pages 64-75, GI Lecture Notes in Informatics, 2007.

  7. Oliver Kutz; Till Mossakowski

    Modules in Transition - Conservativity, Composition, and Colimits

    In: Bernardo Cuenca-Grau; Vasant Honavar; Anne Schlicht; Frank Wolter (Hrsg.). Second International Workshop on Modular Ontologies. International Workshop on Modular Ontologies (WoMO-07), located at Fourth International Conference on Knowledge Capture (K-CAP-07), October 28, Whistler, BC, Canada, CEUR Workshop Proceedings, Vol. 315, CEUR-WS, 2007.

  8. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova Science Publishers, Inc. 2007.

  9. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at Associated with CAV 2006, August 21, Seattle, WA, USA, Pages 117-130, Vol. 174, No. 4, Electronic Notes in Theoretical Computer Science, 2007.