Publications
Export 360 results:
On Structural Identification of 2D Regression Functions for In-door Bluetooth Localization.
Proc. {EUROCAST} 2009. 5717, 801–808.
(2009). Adaptive Feedback for Legal E-Learning.
in: Proceedings of the special track "Computer-based Knowledge & Skill Assessment and Feedback in Learning Settings" at the International Conference on Comupter-Aided Learning, Villach.
(2008). Adaptive Legal Case Generator for Self Study.
Joseph Luca, Edgar R. Weippl (Eds.): Proceedings of ED-MEDIA 2008. World Conference on Educational Multimedia, Hypermedia & Telecommunications.
(2008).
(2008). Automatische Generierung von Übungsfällen.
in: Erich Schweighofer, Anton Geist, Gisela Heindl (Eds.): Komplexitätsgrenzen der Rechtsinformatik; Tagungsband des 11. Internationalen Rechtsinformatik Symposions IRIS 2008.
(2008). Building Flexible Manufacturing Systems Based on Peer-Its.
{EURASIP} Journal on Embedded Systems. 2008,
(2008). Domain-based Security for Mobile Agents.
INDIN 2008.
(2008). Peer-it: Stick-on solutions for networks of things.
Pervasive and Mobile Computing. 448-479.
(2008). Security and Privacy in an Enterprise Search Infrastructure for Mobile Devices.
Gerhard Gerhard Chroust, Petr Doucek, Jan Klas (Eds.): IDIMT-2008. 16th Interdisciplinary Information management Talks.
(2008). Spontaneous Mobile Device Authentication based on Sensor Data.
Information Security Technical Report. 13, 136–150.
(2008). Towards Alternative User Interfaces for Capturing and Managing Tasks with Mobile Devices.
Proc. {MoMM} 2008: 6th International Conference on Advances in Mobile Computing and Multimedia. 272–275.
(2008). Towards New Approaches in Adaptive Support for Collaborative E-Learning.
in: Proceedings of the The Eleventh IASTED International Conference on Computers and Advanced Technology in Education (CATE 2008), September 29 October 1, 2008, Crete, Greece.
(2008). Towards un-personal security.
Gerhard Gerhard Chroust, Petr Doucek, Jan Klas (Eds.): IDIMT-2008. 16th Interdisciplinary Information management Talks.
(2008).
(2008). Using thematic ontologies for user- and group- based adaptive personalization in web searching.
in: Proceedings of the 6th International Workshop on Adaptive Multimedia Retrieval (AMR'2008), 26-27 June 2008, Berlin, Germany.
(2008). The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams.
Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks. 4572, 1–15.
(2007). Entwicklungsgeschichtliche Analogien zwischen Programmiersprachen und Lernplattformen.
Bernad Batinic, Alfons Koller, Hermann Sikora (Eds.): E-Learning, digitale Medien und lebenslanges Lernen.
(2007). Extending the Growing Neural Gas Classifier for Context Recognition.
Proc. {EUROCAST} 2007: 11th International Conference on Computer Aided Systems Theory. 4739, 920–927.
(2007). A Human-Verifiable Authentication Protocol Using Visible Laser Light.
Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security. 1143–1147.
(2007). Interactivity in Legal Web Courses through Direct Response Systems.
33nd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 2007.
(2007). IS/ICT security and privacy.
Christoph Hoyer, Gerhard Gerhard Chroust (Eds.): IDIMT-2007. 15th Interdisciplinary Information management Talks.
(2007). Juristische Übungen mit direktem Feedback.
Erich Schweighofer, Anton Geist, Gisela Heindl (Eds.): 10 Jahre IRIS: Bilanz und Ausblick; Tagungsband des 10. Internationalen Rechtsinformatik Symposions IRIS 2007.
(2007).
(2007).
(2007).
(2007).