Search the dblp DataBase
Volker Roth :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Volker Roth , Vania Conan Encrypting Java Archives and Its Application to Mobile Agent Security. [Citation Graph (0, 0)][DBLP ] AgentLink, 2001, pp:229-239 [Conf ] Volker Roth , Volker Steinhage , Stefan Schröder , Armin B. Cremers , Dieter Wittmann Pattern Recognition Combining De-noising and Linear Discriminant Analysis within a Real World Application. [Citation Graph (0, 0)][DBLP ] CAIP, 1999, pp:251-258 [Conf ] Volker Roth , Kai Richter , Rene Freidinger A PIN-entry method resilient against shoulder surfing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:236-245 [Conf ] Volker Roth , Koji Tsuda Pairwise Coupling for Machine Recognition of Hand-Printed Japanese Characters. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2001, pp:1120-1125 [Conf ] Volker Roth Probabilistic Discriminative Kernel Classifiers for Multi-class Problems. [Citation Graph (0, 0)][DBLP ] DAGM-Symposium, 2001, pp:246-253 [Conf ] Volker Roth , Tilman Lange Adaptive Feature Selection in Image Segmentation. [Citation Graph (0, 0)][DBLP ] DAGM-Symposium, 2004, pp:9-17 [Conf ] Volker Roth , Björn Ommer Exploiting Low-Level Image Segmentation for Object Recognition. [Citation Graph (0, 0)][DBLP ] DAGM-Symposium, 2006, pp:11-20 [Conf ] Volker Roth , Artur Pogoda , Volker Steinhage , Stefan Schröder Pattern Recognition Combining Feature- and Pixel-Based Classification Within a Real World Application. [Citation Graph (0, 0)][DBLP ] DAGM-Symposium, 1999, pp:120-129 [Conf ] Ulrich Pinsdorf , Volker Roth Mobile Agent Interoperability Patterns and Practice. [Citation Graph (0, 0)][DBLP ] ECBS, 2002, pp:238-244 [Conf ] Volker Roth , Peter Braun II , Wilhelm Rossak Conference Session and Workshop on Performance, Interoperability, and Applications of Mobile Agent Systems. [Citation Graph (0, 0)][DBLP ] ECBS, 2002, pp:226-0 [Conf ] Volker Roth Secure Recording of Itineraries through Co-operating Agents. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:297-298 [Conf ] Volker Roth Mutual Protection of Co-operating Agents. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:275-285 [Conf ] Volker Roth Sparse Kernel Regressors. [Citation Graph (0, 0)][DBLP ] ICANN, 2001, pp:339-346 [Conf ] Volker Roth , Mikio L. Braun , Tilman Lange , Joachim M. Buhmann Stability-Based Model Order Selection in Clustering with Applications to Gene Expression Data. [Citation Graph (0, 0)][DBLP ] ICANN, 2002, pp:607-612 [Conf ] Michelangelo Giansiracusa , Selwyn Russell , Andrew Clark , Volker Roth Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:343-357 [Conf ] Volker Roth , Mehrdad Jalali-Sohi Concepts and Architecture of a Security-Centric Mobile Agent Server. [Citation Graph (0, 0)][DBLP ] ISADS, 2001, pp:435-0 [Conf ] Bernd Fischer , Jonas Grossmann , Volker Roth , Wilhelm Gruissem , Sacha Baginsky , Joachim M. Buhmann Semi-supervised LC/MS alignment for differential proteomics. [Citation Graph (0, 0)][DBLP ] ISMB (Supplement of Bioinformatics), 2006, pp:132-140 [Conf ] Volker Roth On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 2001, pp:1-14 [Conf ] Volker Roth Empowering Mobile Software Agents. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 2002, pp:47-63 [Conf ] Volker Roth Panel: Content-Based Image Indexing and Retrieval with Mobile Agents. [Citation Graph (0, 0)][DBLP ] ASA/MA, 1999, pp:260-261 [Conf ] Volker Roth , Jan Peters A Scalable and Secure Global Tracking Service for Mobile Agents. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 2001, pp:169-181 [Conf ] Volker Roth Obstacles to the Adoption of Mobile Agents. [Citation Graph (0, 0)][DBLP ] Mobile Data Management, 2004, pp:296-297 [Conf ] Bernd Fischer , Volker Roth , Joachim M. Buhmann Clustering with the Connectivity Kernel. [Citation Graph (0, 0)][DBLP ] NIPS, 2003, pp:- [Conf ] Bernd Fischer , Volker Roth , Joachim M. Buhmann , Jonas Grossmann , Sacha Baginsky , Wilhelm Gruissem , Franz Roos , Peter Widmayer A Hidden Markov Model for de Novo Peptide Sequencing. [Citation Graph (0, 0)][DBLP ] NIPS, 2004, pp:- [Conf ] Tilman Lange , Mikio L. Braun , Volker Roth , Joachim M. Buhmann Stability-Based Model Selection. [Citation Graph (0, 0)][DBLP ] NIPS, 2002, pp:617-624 [Conf ] Volker Roth Outlier Detection with One-class Kernel Fisher Discriminants. [Citation Graph (0, 0)][DBLP ] NIPS, 2004, pp:- [Conf ] Volker Roth , Tilman Lange Feature Selection in Clustering Problems. [Citation Graph (0, 0)][DBLP ] NIPS, 2003, pp:- [Conf ] Volker Roth , Julian Laub , Joachim M. Buhmann , Klaus-Robert Müller Going Metric: Denoising Pairwise Data. [Citation Graph (0, 0)][DBLP ] NIPS, 2002, pp:817-824 [Conf ] Volker Roth , Volker Steinhage Nonlinear Discriminant Analysis Using Kernel Functions. [Citation Graph (0, 0)][DBLP ] NIPS, 1999, pp:568-574 [Conf ] Lakshminarayanan Subramanian , Volker Roth , Ion Stoica , Scott Shenker , Randy H. Katz Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP ] NSDI, 2004, pp:127-140 [Conf ] Lakshminarayanan Subramanian , Randy H. Katz , Volker Roth , Scott Shenker , Ion Stoica Reliable broadcast in unknown fixed-identity networks. [Citation Graph (0, 0)][DBLP ] PODC, 2005, pp:342-351 [Conf ] Walter Binder , Volker Roth Secure mobile agent systems using Java: where are we heading?. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:115-119 [Conf ] Volker Roth , Ulrich Pinsdorf , Jan Peters A distributed content-based search engine based on mobile code. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:66-73 [Conf ] Volker Roth , Mehrdad Jalali-Sohi Access control and key management for mobile agents. [Citation Graph (0, 0)][DBLP ] Computers & Graphics, 1998, v:22, n:4, pp:457-461 [Journal ] Volker Roth Programming Satan's Agents. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:63, n:, pp:- [Journal ] Volker Roth , Tobias Straub , Kai Richter Security and usability engineering with particular attention to electronic mail. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:51-73 [Journal ] Volker Roth Content-based retrieval from digital video. [Citation Graph (0, 0)][DBLP ] Image Vision Comput., 1999, v:17, n:7, pp:531-540 [Journal ] Volker Roth , Artur Pogoda , Volker Steinhage , Stefan Schröder Automatisierte Artenbestimmung von Insekten durch Bildanalyse. [Citation Graph (0, 0)][DBLP ] KI, 2000, v:14, n:1, pp:48-49 [Journal ] Tilman Lange , Volker Roth , Mikio L. Braun , Joachim M. Buhmann Stability-Based Validation of Clustering Solutions. [Citation Graph (0, 0)][DBLP ] Neural Computation, 2004, v:16, n:6, pp:1299-1323 [Journal ] Volker Roth Kernel Fisher Discriminants for Outlier Detection. [Citation Graph (0, 0)][DBLP ] Neural Computation, 2006, v:18, n:4, pp:942-960 [Journal ] Julian Laub , Volker Roth , Joachim M. Buhmann , Klaus-Robert Müller On the information and representation of non-Euclidean pairwise data. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2006, v:39, n:10, pp:1815-1826 [Journal ] Volker Roth , Bernd Fischer The kernelHMM : Learning Kernel Combinations in Structured Output Domains. [Citation Graph (0, 0)][DBLP ] DAGM-Symposium, 2007, pp:436-445 [Conf ] Bernd Fischer , Volker Roth , Joachim M. Buhmann Time-Series Alignment by Non-negative Multiple Generalized Canonical Correlation Analysis. [Citation Graph (0, 0)][DBLP ] WILF, 2007, pp:505-511 [Conf ] Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices. [Citation Graph (, )][DBLP ] Sparse Bayesian Regression for Grouped Variables in Generalized Linear Models. [Citation Graph (, )][DBLP ] Computational TMA Analysis and Cell Nucleus Classification of Renal Cell Carcinoma. [Citation Graph (, )][DBLP ] The Group-Lasso: l 1, INFINITY Regularization versus l 1, 2 Regularization. [Citation Graph (, )][DBLP ] The Group-Lasso for generalized linear models: uniqueness of solutions and efficient algorithms. [Citation Graph (, )][DBLP ] The Bayesian group-Lasso for analyzing contingency tables. [Citation Graph (, )][DBLP ] The Translation-invariant Wishart-Dirichlet Process for Clustering Distance Data. [Citation Graph (, )][DBLP ] Deep Sequencing of a Genetically Heterogeneous Sample: Local Haplotype Reconstruction and Read Error Correction. [Citation Graph (, )][DBLP ] General Certificateless Encryption and Timed-Release Encryption. [Citation Graph (, )][DBLP ] Simple and effective defense against evil twin access points. [Citation Graph (, )][DBLP ] Adaptive bandwidth selection for biomarker discovery in mass spectrometry. [Citation Graph (, )][DBLP ] Improved functional prediction of proteins by learning kernel combinations in multilabel settings. [Citation Graph (, )][DBLP ] Time-series alignment by non-negative multiple generalized canonical correlation analysis. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.309secs