Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of interactive applications for mobile devices., , , and . Mobile HCI, page 365-366. ACM, (2005)Activity recognition for indoor movement and estimation of travelled path., , , and . nDS, page 1-5. IEEE, (2017)International Symposium on Ubiquitous Virtual Reality 2009., , , , , and . IEEE Pervasive Comput., 9 (2): 78-80 (2010)Konzeption eines generischen Geschäftsprozessmodells für Medizinische Versorgungszentren., , , and . MKWI, page 143-154. Universitätsverlag Göttingen, (2010)Handheld AR for Collaborative Edutainment., , and . ICAT, volume 4282 of Lecture Notes in Computer Science, page 85-96. Springer, (2006)Mobile augmented reality - Tracking, mapping and rendering., , , , and . ISMAR, page 383. IEEE Computer Society, (2014)Optimization of Target Objects for Natural Feature Tracking., , , , and . ICPR, page 3607-3610. IEEE Computer Society, (2010)BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2022)Learning to Detect Patterns of Crime., , , and . ECML/PKDD (3), volume 8190 of Lecture Notes in Computer Science, page 515-530. Springer, (2013)United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale., , , , , , and . CCS, page 970-987. ACM, (2021)