The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas Walter: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chie Noda, Thomas Walter
    Smart Devices for Next Generation Mobile Services. [Citation Graph (0, 0)][DBLP]
    CASSIS, 2004, pp:192-209 [Conf]
  2. Markus Schwehm, Thomas Walter
    Mapping and Scheduling by Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    CONPAR, 1994, pp:832-841 [Conf]
  3. Gina Kounga, Thomas Walter
    Identification in Infrastructureless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:58-69 [Conf]
  4. Thomas Walter
    Classification of Specification and Validation Methods for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    FBT, 1998, pp:3-13 [Conf]
  5. Thomas Walter, Jens Grabowski
    Test Case Specification with Real-time TTCN. [Citation Graph (0, 0)][DBLP]
    FBT, 1997, pp:231-240 [Conf]
  6. Marcel Hoffmann, Kai-Uwe Loser, Thomas Walter, Thomas Herrmann
    A design process for embedding knowledge management in everyday work. [Citation Graph (0, 0)][DBLP]
    GROUP, 1999, pp:296-305 [Conf]
  7. Thomas Walter, Lukas Ruf, Bernhard Plattner
    Easy Teach & Learn: A Web-Based Adaptive Middleware for Creating Virtual Classrooms. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 2000, pp:531-534 [Conf]
  8. Lukas Ruf, Thomas Walter, Bernhard Plattner
    An Interaction Control Architecture for Large Chairperson-Controlled Conferences over the Internet. [Citation Graph (0, 0)][DBLP]
    IDMS, 2000, pp:89-103 [Conf]
  9. Thomas Walter, Jean-Claude Klein
    Segmentation of Color Fundus Images of the Human Retina: Detection of the Optic Disc and the Vascular Tree Using Morphological Techniques. [Citation Graph (0, 0)][DBLP]
    ISMDA, 2001, pp:282-287 [Conf]
  10. Thomas Walter, Jean-Claude Klein
    Automatic Detection of Microaneurysms in Color Fundus Images of the Human Retina by Means of the Bounding Box Closing. [Citation Graph (0, 0)][DBLP]
    ISMDA, 2002, pp:210-220 [Conf]
  11. Philip Robinson, Christian Schaefer, Thomas Walter
    POSSET - Policy-Driven Secure Session Transfer. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:13-24 [Conf]
  12. Simon Znaty, Thomas Walter, Marcus Brunner, Jean-Pierre Hubaux, Bernhard Plattner
    Multimedia Multipoint Teleteaching over the European ATM Pilot. [Citation Graph (0, 0)][DBLP]
    International Zurich Seminar on Digital Communications, 1996, pp:225-238 [Conf]
  13. Thomas Walter, Jens Grabowski
    A Proposal for a Real-Time Extension of TTCN. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1997, pp:182-196 [Conf]
  14. Frank Eyermann, Peter Racz, Burkhard Stiller, Christian Schaefer, Thomas Walter
    Service-oriented Accounting Configuration Management based on Diameter. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:621-623 [Conf]
  15. Thomas Walter, Jan Ellsberger, Finn Kristoffersen, Paul van den Merkhof
    A Common Semantics Representation for SDL and TTCN. [Citation Graph (0, 0)][DBLP]
    PSTV, 1992, pp:335-346 [Conf]
  16. Thomas Walter, Bernhard Plattner
    An Operational Semantics for Concurrent TTCN. [Citation Graph (0, 0)][DBLP]
    Protocol Test Systems, 1992, pp:131-143 [Conf]
  17. Thomas Walter, Ina Schieferdecker, Jens Grabowski
    Test Architectures for Distributed Systems: State of the Art and Beyond. [Citation Graph (0, 0)][DBLP]
    IWTCS, 1998, pp:149-174 [Conf]
  18. Thomas Walter, Laurent Bussard, Philip Robinson, Yves Roudier
    Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:696-701 [Conf]
  19. Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr
    Framework and Architecture for Secure Mobile Business Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:413-416 [Conf]
  20. Frank Eyermann, Peter Racz, Burkhard Stiller, Christian Schaefer, Thomas Walter
    Generic accounting configuration management for heterogeneous mobile networks. [Citation Graph (0, 0)][DBLP]
    WMASH, 2005, pp:46-55 [Conf]
  21. Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
    Usage Control Requirements in Mobile and Ubiquitous Computing Applications. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:27- [Conf]
  22. Finn Kristoffersen, Thomas Walter
    TTCN: Towards a Formal Semantics and Validation of Test Suites. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1996, v:29, n:1, pp:15-47 [Journal]
  23. Thomas Walter, Jens Grabowski
    A framework for the specification of test cases for real-time distributed systems. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1999, v:41, n:11-12, pp:781-798 [Journal]
  24. Thomas Walter, Jean-Claude Klein, Pascale Massin, Ali Erginay
    A Contribution of Image Processing to the Diagnosis of Diabetic Retinopathy - Detection of Exudates in Color Fundus Images of the Human Retina. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Med. Imaging, 2002, v:21, n:10, pp:1236-1243 [Journal]
  25. Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter
    A Policy Language for Distributed Usage Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:531-546 [Conf]
  26. Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
    DUKE - Distributed Usage Control Enforcement. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:275- [Conf]
  27. Srisakul Thakolsri, Christian Schaefer, Thomas Walter, Wolfgang Kellerer
    Accounting management for session mobility in an ubiquitous environment. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:311-316 [Conf]

  28. Negotiation of Usage Control Policies - Simply the Best? [Citation Graph (, )][DBLP]


  29. Formal Analyses of Usage Control Policies. [Citation Graph (, )][DBLP]


  30. Mechanisms for usage control. [Citation Graph (, )][DBLP]


  31. Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP]


  32. Evidence Gathering for Remuneration of Shared Connections. [Citation Graph (, )][DBLP]


  33. A genome wide RNAI screen by time lapse microscopy in order to identify mitotic genes - computational aspects and challenges. [Citation Graph (, )][DBLP]


  34. Breaking the memory secrecy assumption. [Citation Graph (, )][DBLP]


  35. Runtime monitoring for next generation Java ME platform. [Citation Graph (, )][DBLP]


  36. What the heck is this application doing? - A security-by-contract architecture for pervasive services. [Citation Graph (, )][DBLP]


  37. Policy Evolution in Distributed Usage Control. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002