The SCEAS System
Navigation Menu

Search the dblp DataBase


Volker Roth: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Volker Roth, Vania Conan
    Encrypting Java Archives and Its Application to Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    AgentLink, 2001, pp:229-239 [Conf]
  2. Volker Roth, Volker Steinhage, Stefan Schröder, Armin B. Cremers, Dieter Wittmann
    Pattern Recognition Combining De-noising and Linear Discriminant Analysis within a Real World Application. [Citation Graph (0, 0)][DBLP]
    CAIP, 1999, pp:251-258 [Conf]
  3. Volker Roth, Kai Richter, Rene Freidinger
    A PIN-entry method resilient against shoulder surfing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:236-245 [Conf]
  4. Volker Roth, Koji Tsuda
    Pairwise Coupling for Machine Recognition of Hand-Printed Japanese Characters. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2001, pp:1120-1125 [Conf]
  5. Volker Roth
    Probabilistic Discriminative Kernel Classifiers for Multi-class Problems. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 2001, pp:246-253 [Conf]
  6. Volker Roth, Tilman Lange
    Adaptive Feature Selection in Image Segmentation. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 2004, pp:9-17 [Conf]
  7. Volker Roth, Björn Ommer
    Exploiting Low-Level Image Segmentation for Object Recognition. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 2006, pp:11-20 [Conf]
  8. Volker Roth, Artur Pogoda, Volker Steinhage, Stefan Schröder
    Pattern Recognition Combining Feature- and Pixel-Based Classification Within a Real World Application. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 1999, pp:120-129 [Conf]
  9. Ulrich Pinsdorf, Volker Roth
    Mobile Agent Interoperability Patterns and Practice. [Citation Graph (0, 0)][DBLP]
    ECBS, 2002, pp:238-244 [Conf]
  10. Volker Roth, Peter Braun II, Wilhelm Rossak
    Conference Session and Workshop on Performance, Interoperability, and Applications of Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    ECBS, 2002, pp:226-0 [Conf]
  11. Volker Roth
    Secure Recording of Itineraries through Co-operating Agents. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:297-298 [Conf]
  12. Volker Roth
    Mutual Protection of Co-operating Agents. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:275-285 [Conf]
  13. Volker Roth
    Sparse Kernel Regressors. [Citation Graph (0, 0)][DBLP]
    ICANN, 2001, pp:339-346 [Conf]
  14. Volker Roth, Mikio L. Braun, Tilman Lange, Joachim M. Buhmann
    Stability-Based Model Order Selection in Clustering with Applications to Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    ICANN, 2002, pp:607-612 [Conf]
  15. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
    Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:343-357 [Conf]
  16. Volker Roth, Mehrdad Jalali-Sohi
    Concepts and Architecture of a Security-Centric Mobile Agent Server. [Citation Graph (0, 0)][DBLP]
    ISADS, 2001, pp:435-0 [Conf]
  17. Bernd Fischer, Jonas Grossmann, Volker Roth, Wilhelm Gruissem, Sacha Baginsky, Joachim M. Buhmann
    Semi-supervised LC/MS alignment for differential proteomics. [Citation Graph (0, 0)][DBLP]
    ISMB (Supplement of Bioinformatics), 2006, pp:132-140 [Conf]
  18. Volker Roth
    On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 2001, pp:1-14 [Conf]
  19. Volker Roth
    Empowering Mobile Software Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 2002, pp:47-63 [Conf]
  20. Volker Roth
    Panel: Content-Based Image Indexing and Retrieval with Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ASA/MA, 1999, pp:260-261 [Conf]
  21. Volker Roth, Jan Peters
    A Scalable and Secure Global Tracking Service for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 2001, pp:169-181 [Conf]
  22. Volker Roth
    Obstacles to the Adoption of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2004, pp:296-297 [Conf]
  23. Bernd Fischer, Volker Roth, Joachim M. Buhmann
    Clustering with the Connectivity Kernel. [Citation Graph (0, 0)][DBLP]
    NIPS, 2003, pp:- [Conf]
  24. Bernd Fischer, Volker Roth, Joachim M. Buhmann, Jonas Grossmann, Sacha Baginsky, Wilhelm Gruissem, Franz Roos, Peter Widmayer
    A Hidden Markov Model for de Novo Peptide Sequencing. [Citation Graph (0, 0)][DBLP]
    NIPS, 2004, pp:- [Conf]
  25. Tilman Lange, Mikio L. Braun, Volker Roth, Joachim M. Buhmann
    Stability-Based Model Selection. [Citation Graph (0, 0)][DBLP]
    NIPS, 2002, pp:617-624 [Conf]
  26. Volker Roth
    Outlier Detection with One-class Kernel Fisher Discriminants. [Citation Graph (0, 0)][DBLP]
    NIPS, 2004, pp:- [Conf]
  27. Volker Roth, Tilman Lange
    Feature Selection in Clustering Problems. [Citation Graph (0, 0)][DBLP]
    NIPS, 2003, pp:- [Conf]
  28. Volker Roth, Julian Laub, Joachim M. Buhmann, Klaus-Robert Müller
    Going Metric: Denoising Pairwise Data. [Citation Graph (0, 0)][DBLP]
    NIPS, 2002, pp:817-824 [Conf]
  29. Volker Roth, Volker Steinhage
    Nonlinear Discriminant Analysis Using Kernel Functions. [Citation Graph (0, 0)][DBLP]
    NIPS, 1999, pp:568-574 [Conf]
  30. Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker, Randy H. Katz
    Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!). [Citation Graph (0, 0)][DBLP]
    NSDI, 2004, pp:127-140 [Conf]
  31. Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, Ion Stoica
    Reliable broadcast in unknown fixed-identity networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:342-351 [Conf]
  32. Walter Binder, Volker Roth
    Secure mobile agent systems using Java: where are we heading?. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:115-119 [Conf]
  33. Volker Roth, Ulrich Pinsdorf, Jan Peters
    A distributed content-based search engine based on mobile code. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:66-73 [Conf]
  34. Volker Roth, Mehrdad Jalali-Sohi
    Access control and key management for mobile agents. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1998, v:22, n:4, pp:457-461 [Journal]
  35. Volker Roth
    Programming Satan's Agents. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:63, n:, pp:- [Journal]
  36. Volker Roth, Tobias Straub, Kai Richter
    Security and usability engineering with particular attention to electronic mail. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:51-73 [Journal]
  37. Volker Roth
    Content-based retrieval from digital video. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 1999, v:17, n:7, pp:531-540 [Journal]
  38. Volker Roth, Artur Pogoda, Volker Steinhage, Stefan Schröder
    Automatisierte Artenbestimmung von Insekten durch Bildanalyse. [Citation Graph (0, 0)][DBLP]
    KI, 2000, v:14, n:1, pp:48-49 [Journal]
  39. Tilman Lange, Volker Roth, Mikio L. Braun, Joachim M. Buhmann
    Stability-Based Validation of Clustering Solutions. [Citation Graph (0, 0)][DBLP]
    Neural Computation, 2004, v:16, n:6, pp:1299-1323 [Journal]
  40. Volker Roth
    Kernel Fisher Discriminants for Outlier Detection. [Citation Graph (0, 0)][DBLP]
    Neural Computation, 2006, v:18, n:4, pp:942-960 [Journal]
  41. Julian Laub, Volker Roth, Joachim M. Buhmann, Klaus-Robert Müller
    On the information and representation of non-Euclidean pairwise data. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2006, v:39, n:10, pp:1815-1826 [Journal]
  42. Volker Roth, Bernd Fischer
    The kernelHMM : Learning Kernel Combinations in Structured Output Domains. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 2007, pp:436-445 [Conf]
  43. Bernd Fischer, Volker Roth, Joachim M. Buhmann
    Time-Series Alignment by Non-negative Multiple Generalized Canonical Correlation Analysis. [Citation Graph (0, 0)][DBLP]
    WILF, 2007, pp:505-511 [Conf]

  44. Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices. [Citation Graph (, )][DBLP]

  45. Sparse Bayesian Regression for Grouped Variables in Generalized Linear Models. [Citation Graph (, )][DBLP]

  46. Computational TMA Analysis and Cell Nucleus Classification of Renal Cell Carcinoma. [Citation Graph (, )][DBLP]

  47. The Group-Lasso: l1, INFINITY Regularization versus l1, 2 Regularization. [Citation Graph (, )][DBLP]

  48. The Group-Lasso for generalized linear models: uniqueness of solutions and efficient algorithms. [Citation Graph (, )][DBLP]

  49. The Bayesian group-Lasso for analyzing contingency tables. [Citation Graph (, )][DBLP]

  50. The Translation-invariant Wishart-Dirichlet Process for Clustering Distance Data. [Citation Graph (, )][DBLP]

  51. Deep Sequencing of a Genetically Heterogeneous Sample: Local Haplotype Reconstruction and Read Error Correction. [Citation Graph (, )][DBLP]

  52. General Certificateless Encryption and Timed-Release Encryption. [Citation Graph (, )][DBLP]

  53. Simple and effective defense against evil twin access points. [Citation Graph (, )][DBLP]

  54. Adaptive bandwidth selection for biomarker discovery in mass spectrometry. [Citation Graph (, )][DBLP]

  55. Improved functional prediction of proteins by learning kernel combinations in multilabel settings. [Citation Graph (, )][DBLP]

  56. Time-series alignment by non-negative multiple generalized canonical correlation analysis. [Citation Graph (, )][DBLP]

Search in 0.007secs, Finished in 0.011secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002