Search the dblp DataBase
Thomas Engel :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ernst Georg Haffner , Uwe Roth , Andreas Heuer 0002 , Thomas Engel , Christoph Meinel What Do Hyperlink-Proposals and Request-Prediction Have in Common? [Citation Graph (0, 0)][DBLP ] ADVIS, 2000, pp:285-293 [Conf ] Sergei Hludov , Christoph Meinel , Thomas Engel Flächen- und Volumenmessung lokaler Objekte in DICOM-Bildern und -Bildfolgen. [Citation Graph (0, 0)][DBLP ] Bildverarbeitung für die Medizin, 1999, pp:292-296 [Conf ] Serge Linckels , Christoph Meinel , Thomas Engel Teaching in the Cyber-Age: Technologies, Experiments, and Realizations. [Citation Graph (0, 0)][DBLP ] DeLFI, 2005, pp:225-236 [Conf ] B. Lapken , Frank Losemann , Thomas Engel , Christoph Meinel Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration. [Citation Graph (0, 0)][DBLP ] ECIS, 2000, pp:- [Conf ] Ernst Georg Haffner , Andreas Heuer 0002 , Uwe Roth , Thomas Engel , Christoph Meinel Advanced Studies on Link Proposals and Knowledge Retrieval of Hypertexts with CBR. [Citation Graph (0, 0)][DBLP ] EC-Web, 2000, pp:369-378 [Conf ] Changtao Qu , Thomas Engel , Christoph Meinel Implementation of an Enterprise-Level Groupware System Based on J2EE Platform and WebDAV Protocol. [Citation Graph (0, 0)][DBLP ] EDOC, 2000, pp:160-169 [Conf ] Sergei Hludov , Thomas Engel , Christoph Meinel Adaptive compression of DICOM-image data. [Citation Graph (0, 0)][DBLP ] Electronic Imaging, 1998, pp:260-266 [Conf ] Monique Reichert , Serge Linckels , Christoph Meinel , Thomas Engel Student's Perception of a Semantic Search Engine. [Citation Graph (0, 0)][DBLP ] CELDA, 2005, pp:139-147 [Conf ] Bernd Dusemund , Thomas Engel , Christoph Meinel Smart Cards - the Personal Safe in an E-Commerce World. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:343-346 [Conf ] Ernst Georg Haffner , Thomas Engel , Christoph Meinel Techniques for Securing Networks Against Criminal Attacks. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:365-370 [Conf ] Ernst Georg Haffner , Uwe Roth , Andreas Heuer 0002 , Thomas Engel , Christoph Meinel Advanced Techniques for Analyzing Web Server Logs. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:71-78 [Conf ] Frank Losemann , Thomas Engel , Christoph Meinel Proprietary versus Interoperable User Certificates in E-Commerce via Internet. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:337-342 [Conf ] Uwe Roth , Thomas Engel , Christoph Meinel Improving the Quality of Information-Flow with the Smart Data Server. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:353-358 [Conf ] Zhongdong Zhang , Uwe Roth , Thomas Engel , Christoph Meinel Web Site Design Using a Web-Based Authoring and Publishing System. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:113-118 [Conf ] Ernst Georg Haffner , Thomas Engel , Christoph Meinel The flood-gate principle - a hybrid approach to a high security solution. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:147-160 [Conf ] Uwe Roth , Ernst Georg Haffner , Thomas Engel , Christoph Meinel The Smart Data Server: A New Kind of Middle-Tier. [Citation Graph (0, 0)][DBLP ] IMSA, 1999, pp:361-365 [Conf ] Andreas Heuer 0002 , K. Siemonsen , Thomas Engel , Christoph Meinel Interface for Navigation and Database - Querying via WWW. [Citation Graph (0, 0)][DBLP ] ISI, 1998, pp:273-282 [Conf ] Stefan Winter , Thomas Engel Location-Based Services for Scientists in NRENs. [Citation Graph (0, 0)][DBLP ] LoCA, 2005, pp:341-349 [Conf ] Ernst Georg Haffner , Uwe Roth , Thomas Engel , Christoph Meinel Modeling of Time and Document Aging for Request Prediction - One Step Further. [Citation Graph (0, 0)][DBLP ] SAC (2), 2000, pp:984-990 [Conf ] Zhongdong Zhang , Ernst Georg Haffner , Andreas Heuer 0002 , Thomas Engel , Christoph Meinel Role-based access control in online authoring and publishing systems vs. document hierarchy. [Citation Graph (0, 0)][DBLP ] SIGDOC, 1999, pp:193-198 [Conf ] Changtao Qu , Christoph Meinel , Thomas Engel Implementation of a WebDAV-based Collaborative Distance Learning Environment. [Citation Graph (0, 0)][DBLP ] SIGUCCS, 2000, pp:258-265 [Conf ] Lutz Vorwerk , Thomas Engel , Christoph Meinel Proposal for a combination of compression and encryption. [Citation Graph (0, 0)][DBLP ] VCIP, 2000, pp:694-703 [Conf ] Ernst Georg Haffner , Andreas Heuer 0002 , Uwe Roth , Thomas Engel , Christoph Meinel Link Proposals with Case-Based Reasoning Techniques. [Citation Graph (0, 0)][DBLP ] WebNet, 2000, pp:233-239 [Conf ] Ernst Georg Haffner , Andreas Heuer 0002 , Uwe Roth , Thomas Engel , Christoph Meinel The Importance of Link-Transformation and Link-Proposals for Hyperlink-Management Systems. [Citation Graph (0, 0)][DBLP ] WebNet, 1999, pp:1538-1539 [Conf ] Ernst Georg Haffner , Uwe Roth , Andreas Heuer 0002 , Thomas Engel , Christoph Meinel Managing Distributed Personal Firewalls with Smart Data Servers. [Citation Graph (0, 0)][DBLP ] WebNet, 2001, pp:466-471 [Conf ] Uwe Roth , Ernst Georg Haffner , Thomas Engel , Christoph Meinel An Approach to Distributed Functionality - The Smart Data Server. [Citation Graph (0, 0)][DBLP ] WebNet, 1999, pp:931-936 [Conf ] Petros Sampatakos , Lila Dimopoulou , Eugenia G. Nikolouzou , Iakovos S. Venieris , Thomas Engel , Martin Winter BGRP: Quiet Grafting Mechanisms for Providing a Scalable End-to-End QoS solution. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:5, pp:423-433 [Journal ] Christoph Meinel , Thomas Engel Institut für Telematik (Trier) - angewandte Forschung nach Fraunhofer Ideal. [Citation Graph (0, 0)][DBLP ] Inform., Forsch. Entwickl., 1998, v:13, n:2, pp:97-101 [Journal ] Serge Linckels , Christoph Meinel , Thomas Engel An e-Librarian Service that Understands Natural Language Questions from Students. [Citation Graph (0, 0)][DBLP ] CAiSE Forum, 2006, pp:- [Conf ] Combining Cognitive with Computational Trust Reasoning. [Citation Graph (, )][DBLP ] Security and Consistency of IT and Business Models at Credit Suisse Realized by Graph Constraints, Transformation and Integration Using Algebraic Graph Theory. [Citation Graph (, )][DBLP ] Collusion Detection for Grid Computing. [Citation Graph (, )][DBLP ] Towards Trust-Based Acquisition of Unverifiable Information. [Citation Graph (, )][DBLP ] Trust-Aided Acquisition Of Unverifiable Information. [Citation Graph (, )][DBLP ] Threat-model-driven runtime adaptation and evaluation of intrusion detection system. [Citation Graph (, )][DBLP ] Security Extensions for Space-Link Communication. [Citation Graph (, )][DBLP ] Defensive configuration with game theory. [Citation Graph (, )][DBLP ] Law-Aware Access Control: About Modeling Context and Transforming Legislation. [Citation Graph (, )][DBLP ] Design of New Aggregation Techniques for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Diskussionsvorschlag einer Lösungsskizze zur Behandlung von operationellen IT-Sicherheitsrisken nach Basel II auf der Grundlage von Anforderungen der Credit Suisse. [Citation Graph (, )][DBLP ] Law-aware access control for international financial environments. [Citation Graph (, )][DBLP ] Bandwidth overhead in WiFi mesh networks for providing fair Internet access. [Citation Graph (, )][DBLP ] Formalizing Excusableness of Failures in Multi-Agent Systems. [Citation Graph (, )][DBLP ] Unlinkable Communication. [Citation Graph (, )][DBLP ] Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Self Adaptive High Interaction Honeypots Driven by Game Theory. [Citation Graph (, )][DBLP ] An Autonomic Testing Framework for IPv6 Configuration Protocols. [Citation Graph (, )][DBLP ] Mining NetFlow Records for Critical Network Activities. [Citation Graph (, )][DBLP ] FlowRank: ranking NetFlow records. [Citation Graph (, )][DBLP ] Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics. [Citation Graph (, )][DBLP ] Tuning Evidence-Based Trust Models. [Citation Graph (, )][DBLP ] MeBIT - an Interdisciplinary Project on "Information" Metaphors and their Impact on the Idea of Man. [Citation Graph (, )][DBLP ] Tree Based Flooding Protocol for Multi-hop Wireless Networks. [Citation Graph (, )][DBLP ] An ad-hoc Wireless Sensor Networks with Application to Air Pollution Detection. [Citation Graph (, )][DBLP ] Law-Aware Access Control and its Information Model [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.305secs