The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas Engel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002, Thomas Engel, Christoph Meinel
    What Do Hyperlink-Proposals and Request-Prediction Have in Common? [Citation Graph (0, 0)][DBLP]
    ADVIS, 2000, pp:285-293 [Conf]
  2. Sergei Hludov, Christoph Meinel, Thomas Engel
    Flächen- und Volumenmessung lokaler Objekte in DICOM-Bildern und -Bildfolgen. [Citation Graph (0, 0)][DBLP]
    Bildverarbeitung für die Medizin, 1999, pp:292-296 [Conf]
  3. Serge Linckels, Christoph Meinel, Thomas Engel
    Teaching in the Cyber-Age: Technologies, Experiments, and Realizations. [Citation Graph (0, 0)][DBLP]
    DeLFI, 2005, pp:225-236 [Conf]
  4. B. Lapken, Frank Losemann, Thomas Engel, Christoph Meinel
    Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration. [Citation Graph (0, 0)][DBLP]
    ECIS, 2000, pp:- [Conf]
  5. Ernst Georg Haffner, Andreas Heuer 0002, Uwe Roth, Thomas Engel, Christoph Meinel
    Advanced Studies on Link Proposals and Knowledge Retrieval of Hypertexts with CBR. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:369-378 [Conf]
  6. Changtao Qu, Thomas Engel, Christoph Meinel
    Implementation of an Enterprise-Level Groupware System Based on J2EE Platform and WebDAV Protocol. [Citation Graph (0, 0)][DBLP]
    EDOC, 2000, pp:160-169 [Conf]
  7. Sergei Hludov, Thomas Engel, Christoph Meinel
    Adaptive compression of DICOM-image data. [Citation Graph (0, 0)][DBLP]
    Electronic Imaging, 1998, pp:260-266 [Conf]
  8. Monique Reichert, Serge Linckels, Christoph Meinel, Thomas Engel
    Student's Perception of a Semantic Search Engine. [Citation Graph (0, 0)][DBLP]
    CELDA, 2005, pp:139-147 [Conf]
  9. Bernd Dusemund, Thomas Engel, Christoph Meinel
    Smart Cards - the Personal Safe in an E-Commerce World. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:343-346 [Conf]
  10. Ernst Georg Haffner, Thomas Engel, Christoph Meinel
    Techniques for Securing Networks Against Criminal Attacks. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:365-370 [Conf]
  11. Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002, Thomas Engel, Christoph Meinel
    Advanced Techniques for Analyzing Web Server Logs. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:71-78 [Conf]
  12. Frank Losemann, Thomas Engel, Christoph Meinel
    Proprietary versus Interoperable User Certificates in E-Commerce via Internet. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:337-342 [Conf]
  13. Uwe Roth, Thomas Engel, Christoph Meinel
    Improving the Quality of Information-Flow with the Smart Data Server. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:353-358 [Conf]
  14. Zhongdong Zhang, Uwe Roth, Thomas Engel, Christoph Meinel
    Web Site Design Using a Web-Based Authoring and Publishing System. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:113-118 [Conf]
  15. Ernst Georg Haffner, Thomas Engel, Christoph Meinel
    The flood-gate principle - a hybrid approach to a high security solution. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:147-160 [Conf]
  16. Uwe Roth, Ernst Georg Haffner, Thomas Engel, Christoph Meinel
    The Smart Data Server: A New Kind of Middle-Tier. [Citation Graph (0, 0)][DBLP]
    IMSA, 1999, pp:361-365 [Conf]
  17. Andreas Heuer 0002, K. Siemonsen, Thomas Engel, Christoph Meinel
    Interface for Navigation and Database - Querying via WWW. [Citation Graph (0, 0)][DBLP]
    ISI, 1998, pp:273-282 [Conf]
  18. Stefan Winter, Thomas Engel
    Location-Based Services for Scientists in NRENs. [Citation Graph (0, 0)][DBLP]
    LoCA, 2005, pp:341-349 [Conf]
  19. Ernst Georg Haffner, Uwe Roth, Thomas Engel, Christoph Meinel
    Modeling of Time and Document Aging for Request Prediction - One Step Further. [Citation Graph (0, 0)][DBLP]
    SAC (2), 2000, pp:984-990 [Conf]
  20. Zhongdong Zhang, Ernst Georg Haffner, Andreas Heuer 0002, Thomas Engel, Christoph Meinel
    Role-based access control in online authoring and publishing systems vs. document hierarchy. [Citation Graph (0, 0)][DBLP]
    SIGDOC, 1999, pp:193-198 [Conf]
  21. Changtao Qu, Christoph Meinel, Thomas Engel
    Implementation of a WebDAV-based Collaborative Distance Learning Environment. [Citation Graph (0, 0)][DBLP]
    SIGUCCS, 2000, pp:258-265 [Conf]
  22. Lutz Vorwerk, Thomas Engel, Christoph Meinel
    Proposal for a combination of compression and encryption. [Citation Graph (0, 0)][DBLP]
    VCIP, 2000, pp:694-703 [Conf]
  23. Ernst Georg Haffner, Andreas Heuer 0002, Uwe Roth, Thomas Engel, Christoph Meinel
    Link Proposals with Case-Based Reasoning Techniques. [Citation Graph (0, 0)][DBLP]
    WebNet, 2000, pp:233-239 [Conf]
  24. Ernst Georg Haffner, Andreas Heuer 0002, Uwe Roth, Thomas Engel, Christoph Meinel
    The Importance of Link-Transformation and Link-Proposals for Hyperlink-Management Systems. [Citation Graph (0, 0)][DBLP]
    WebNet, 1999, pp:1538-1539 [Conf]
  25. Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002, Thomas Engel, Christoph Meinel
    Managing Distributed Personal Firewalls with Smart Data Servers. [Citation Graph (0, 0)][DBLP]
    WebNet, 2001, pp:466-471 [Conf]
  26. Uwe Roth, Ernst Georg Haffner, Thomas Engel, Christoph Meinel
    An Approach to Distributed Functionality - The Smart Data Server. [Citation Graph (0, 0)][DBLP]
    WebNet, 1999, pp:931-936 [Conf]
  27. Petros Sampatakos, Lila Dimopoulou, Eugenia G. Nikolouzou, Iakovos S. Venieris, Thomas Engel, Martin Winter
    BGRP: Quiet Grafting Mechanisms for Providing a Scalable End-to-End QoS solution. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:5, pp:423-433 [Journal]
  28. Christoph Meinel, Thomas Engel
    Institut für Telematik (Trier) - angewandte Forschung nach Fraunhofer Ideal. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1998, v:13, n:2, pp:97-101 [Journal]
  29. Serge Linckels, Christoph Meinel, Thomas Engel
    An e-Librarian Service that Understands Natural Language Questions from Students. [Citation Graph (0, 0)][DBLP]
    CAiSE Forum, 2006, pp:- [Conf]

  30. Combining Cognitive with Computational Trust Reasoning. [Citation Graph (, )][DBLP]


  31. Security and Consistency of IT and Business Models at Credit Suisse Realized by Graph Constraints, Transformation and Integration Using Algebraic Graph Theory. [Citation Graph (, )][DBLP]


  32. Collusion Detection for Grid Computing. [Citation Graph (, )][DBLP]


  33. Towards Trust-Based Acquisition of Unverifiable Information. [Citation Graph (, )][DBLP]


  34. Trust-Aided Acquisition Of Unverifiable Information. [Citation Graph (, )][DBLP]


  35. Threat-model-driven runtime adaptation and evaluation of intrusion detection system. [Citation Graph (, )][DBLP]


  36. Security Extensions for Space-Link Communication. [Citation Graph (, )][DBLP]


  37. Defensive configuration with game theory. [Citation Graph (, )][DBLP]


  38. Law-Aware Access Control: About Modeling Context and Transforming Legislation. [Citation Graph (, )][DBLP]


  39. Design of New Aggregation Techniques for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  40. Diskussionsvorschlag einer Lösungsskizze zur Behandlung von operationellen IT-Sicherheitsrisken nach Basel II auf der Grundlage von Anforderungen der Credit Suisse. [Citation Graph (, )][DBLP]


  41. Law-aware access control for international financial environments. [Citation Graph (, )][DBLP]


  42. Bandwidth overhead in WiFi mesh networks for providing fair Internet access. [Citation Graph (, )][DBLP]


  43. Formalizing Excusableness of Failures in Multi-Agent Systems. [Citation Graph (, )][DBLP]


  44. Unlinkable Communication. [Citation Graph (, )][DBLP]


  45. Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  46. Self Adaptive High Interaction Honeypots Driven by Game Theory. [Citation Graph (, )][DBLP]


  47. An Autonomic Testing Framework for IPv6 Configuration Protocols. [Citation Graph (, )][DBLP]


  48. Mining NetFlow Records for Critical Network Activities. [Citation Graph (, )][DBLP]


  49. FlowRank: ranking NetFlow records. [Citation Graph (, )][DBLP]


  50. Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics. [Citation Graph (, )][DBLP]


  51. Tuning Evidence-Based Trust Models. [Citation Graph (, )][DBLP]


  52. MeBIT - an Interdisciplinary Project on "Information" Metaphors and their Impact on the Idea of Man. [Citation Graph (, )][DBLP]


  53. Tree Based Flooding Protocol for Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]


  54. An ad-hoc Wireless Sensor Networks with Application to Air Pollution Detection. [Citation Graph (, )][DBLP]


  55. Law-Aware Access Control and its Information Model [Citation Graph (, )][DBLP]


Search in 0.259secs, Finished in 0.261secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002