Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications chronologically - back to overwiew...

A. Steininger: The ECS group's hardware related research activities
Firma Freescale, München
bib details

W. Herzner, B. Huber, C. György, A. Balogh: The DECOS Tool-Chain: Model-Based Development of Distributed Embedded Safety-Critical Real-Time Systems
ERCIM NEWS, 67 (2006), p. 22 - 24
bib details

R. Obermaisser, P. Peti, B. Huber, C. El Salloum: DECOS: An Integrated Time-Triggered Architecture
Journal e&i: Elektrotechnik und Informationstechnik, 3 (2006), p. 83 - 95
bib details

M. Ngo Van: Evaluierung von Texteingabemethoden für Game Controller: ABC vs. Multi-Tap Selection Keyboard (Master's Thesis)
reviewers: T. Grechenig, T. Költringer; 183/1, 2006
bib details

M. Dittenbach, H. Berger, D. Merkl, F. Eckkrammer: ConceptWorld: Uncovering the Pragmatic Depth of Semantic Concepts Using the WWW
1st Asian Semantic Web Conference, Beijing, China; in: Proc. Asian Semantic Web Conf. 2006, Jilin University Press, 2006, ISBN: 7-5601-3528-5, p. 301 - 312
bib details

H. Berger, D. Merkl, M. Dittenbach: Experiments in Multi-Class e-Mail Categorization
International Baltic Conference on Databases and Information Systems, Vilnius; in: Proc. Seventh Intern. Baltic Conf. on Databases and Information Systems 2006, 2006, ISBN: 9955-28-013-1, p. 79 - 90
bib details

H. Berger, M. Dittenbach, D. Merkl: Towards a Community-Driven 3D e-Tourism Environment
IADIS International Conference E-Society, Dublin; in: Proc. IADIS International Conf. E-Society 2006, 2006, ISBN: 972-8924-16-x, p. 168 - 172
bib details

J. Widder, G. Gridling, B. Weiss, J. Blanquart (invited): Synchronous Consensus with Mortal Byzantines
Dagstuhl Seminar 06371. From Security to Dependability, Dagstuhl
bib details pdf

H. Berger, D. Merkl, M. Dittenbach: Exploiting Partial Decision Trees for Feature Subset Selection in e-Mail Categorization
ACM Symposium on Applied Computing, Dijon, France; in: Proc. Applied Computing 2006, ACM Press, 2006, ISBN: 1-59593-108-2, p. 1105 - 1109
bib details

G. Schildt: Impulstechnik
LyK Informationstechnik, Brunn am Gebirge, 2006, ISBN: 978-3-200-00791-8; 260 pages
bib details

U. Schmid (invited): Wissenschaftliche Forschung - Quo vadis?
IKT in Österreich 2006, Wien
bib details pdf

S. V. Krywult: Real-Time Communication Systems for Small Autonomous Robots (Master's Thesis)
reviewers: D. Dietrich, S. Mahlknecht, W. Elmenreich; Institut für Computertechnik, 2006
bib details

C. Paukovits: Applying Model-Integrated Computing on Time-Triggered Application Development (Master's Thesis)
reviewers: H. Kopetz, W. Elmenreich; Institut für Technische Informatik, 2006
bib details

A. Schörgendorfer: Extended Confidence-Weighted Averaging in Sensor Fusion (Master's Thesis)
reviewers: H. Kopetz, W. Elmenreich; Institut für Technische Informatik, 2006
bib details

Ch. Krügel: Malicious Code Analysis
TU Wien / Fakultät für Informatik, 2006
bib details

K. Kappel, M. Tomitsch, T. Költringer, T. Grechenig: Developing User Interface Guidelines for DVD Menus
ACM Conference on Human Factors in Computing Systems - CHI, Quebec, Canada; in: Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2006, ACM Press, 2006, ISBN: 1-59593-298-4, p. 177 - 182
bib details

M. Tomitsch, T. Grechenig, K. Kappel, T. Költringer: Experiences from Designing a Tangible Musical Toy
International Conference for Interaction Design and Children (IDC), Tampere, Finland; in: Proceedings of the 5th International Conference for Interaction Design and Children - IDC 2006, ACM Press, 2006, p. 169 - 170
bib details

T. Költringer, M. Tomitsch, K. Kappel, T. Grechenig: Guidelines for Designing Usable DVD Menus
British HCI conference (HCI), London, UK; in: Proceedings of the 20th British HCI conference - HCI 2006, Vol. 2, ACM Press, 2006, p. 74 - 78
bib details

Ch. Krügel: Malicious Code Analysis
Habilitationskolloquium, Vienna, Austria
bib details

Ch. Krügel (invited): Vulnerabilities in Web Applications
TERENA Networking Conference, Italy
bib details

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 >   >>