Search the dblp DataBase
Thomas Walter :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chie Noda , Thomas Walter Smart Devices for Next Generation Mobile Services. [Citation Graph (0, 0)][DBLP ] CASSIS, 2004, pp:192-209 [Conf ] Markus Schwehm , Thomas Walter Mapping and Scheduling by Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] CONPAR, 1994, pp:832-841 [Conf ] Gina Kounga , Thomas Walter Identification in Infrastructureless Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:58-69 [Conf ] Thomas Walter Classification of Specification and Validation Methods for Distributed Systems. [Citation Graph (0, 0)][DBLP ] FBT, 1998, pp:3-13 [Conf ] Thomas Walter , Jens Grabowski Test Case Specification with Real-time TTCN. [Citation Graph (0, 0)][DBLP ] FBT, 1997, pp:231-240 [Conf ] Marcel Hoffmann , Kai-Uwe Loser , Thomas Walter , Thomas Herrmann A design process for embedding knowledge management in everyday work. [Citation Graph (0, 0)][DBLP ] GROUP, 1999, pp:296-305 [Conf ] Thomas Walter , Lukas Ruf , Bernhard Plattner Easy Teach & Learn: A Web-Based Adaptive Middleware for Creating Virtual Classrooms. [Citation Graph (0, 0)][DBLP ] HPCN Europe, 2000, pp:531-534 [Conf ] Lukas Ruf , Thomas Walter , Bernhard Plattner An Interaction Control Architecture for Large Chairperson-Controlled Conferences over the Internet. [Citation Graph (0, 0)][DBLP ] IDMS, 2000, pp:89-103 [Conf ] Thomas Walter , Jean-Claude Klein Segmentation of Color Fundus Images of the Human Retina: Detection of the Optic Disc and the Vascular Tree Using Morphological Techniques. [Citation Graph (0, 0)][DBLP ] ISMDA, 2001, pp:282-287 [Conf ] Thomas Walter , Jean-Claude Klein Automatic Detection of Microaneurysms in Color Fundus Images of the Human Retina by Means of the Bounding Box Closing. [Citation Graph (0, 0)][DBLP ] ISMDA, 2002, pp:210-220 [Conf ] Philip Robinson , Christian Schaefer , Thomas Walter POSSET - Policy-Driven Secure Session Transfer. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:13-24 [Conf ] Simon Znaty , Thomas Walter , Marcus Brunner , Jean-Pierre Hubaux , Bernhard Plattner Multimedia Multipoint Teleteaching over the European ATM Pilot. [Citation Graph (0, 0)][DBLP ] International Zurich Seminar on Digital Communications, 1996, pp:225-238 [Conf ] Thomas Walter , Jens Grabowski A Proposal for a Real-Time Extension of TTCN. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1997, pp:182-196 [Conf ] Frank Eyermann , Peter Racz , Burkhard Stiller , Christian Schaefer , Thomas Walter Service-oriented Accounting Configuration Management based on Diameter. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:621-623 [Conf ] Thomas Walter , Jan Ellsberger , Finn Kristoffersen , Paul van den Merkhof A Common Semantics Representation for SDL and TTCN. [Citation Graph (0, 0)][DBLP ] PSTV, 1992, pp:335-346 [Conf ] Thomas Walter , Bernhard Plattner An Operational Semantics for Concurrent TTCN. [Citation Graph (0, 0)][DBLP ] Protocol Test Systems, 1992, pp:131-143 [Conf ] Thomas Walter , Ina Schieferdecker , Jens Grabowski Test Architectures for Distributed Systems: State of the Art and Beyond. [Citation Graph (0, 0)][DBLP ] IWTCS, 1998, pp:149-174 [Conf ] Thomas Walter , Laurent Bussard , Philip Robinson , Yves Roudier Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. [Citation Graph (0, 0)][DBLP ] SAINT Workshops, 2004, pp:696-701 [Conf ] Jochen Haller , Philip Robinson , Thomas Walter , Roger Kilian-Kehr Framework and Architecture for Secure Mobile Business Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:413-416 [Conf ] Frank Eyermann , Peter Racz , Burkhard Stiller , Christian Schaefer , Thomas Walter Generic accounting configuration management for heterogeneous mobile networks. [Citation Graph (0, 0)][DBLP ] WMASH, 2005, pp:46-55 [Conf ] Manuel Hilty , Alexander Pretschner , Christian Schaefer , Thomas Walter Usage Control Requirements in Mobile and Ubiquitous Computing Applications. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:27- [Conf ] Finn Kristoffersen , Thomas Walter TTCN: Towards a Formal Semantics and Validation of Test Suites. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1996, v:29, n:1, pp:15-47 [Journal ] Thomas Walter , Jens Grabowski A framework for the specification of test cases for real-time distributed systems. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 1999, v:41, n:11-12, pp:781-798 [Journal ] Thomas Walter , Jean-Claude Klein , Pascale Massin , Ali Erginay A Contribution of Image Processing to the Diagnosis of Diabetic Retinopathy - Detection of Exudates in Color Fundus Images of the Human Retina. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Med. Imaging, 2002, v:21, n:10, pp:1236-1243 [Journal ] Manuel Hilty , Alexander Pretschner , David A. Basin , Christian Schaefer , Thomas Walter A Policy Language for Distributed Usage Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:531-546 [Conf ] Manuel Hilty , Alexander Pretschner , Christian Schaefer , Thomas Walter DUKE - Distributed Usage Control Enforcement. [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:275- [Conf ] Srisakul Thakolsri , Christian Schaefer , Thomas Walter , Wolfgang Kellerer Accounting management for session mobility in an ubiquitous environment. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:311-316 [Conf ] Negotiation of Usage Control Policies - Simply the Best? [Citation Graph (, )][DBLP ] Formal Analyses of Usage Control Policies. [Citation Graph (, )][DBLP ] Mechanisms for usage control. [Citation Graph (, )][DBLP ] Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP ] Evidence Gathering for Remuneration of Shared Connections. [Citation Graph (, )][DBLP ] A genome wide RNAI screen by time lapse microscopy in order to identify mitotic genes - computational aspects and challenges. [Citation Graph (, )][DBLP ] Breaking the memory secrecy assumption. [Citation Graph (, )][DBLP ] Runtime monitoring for next generation Java ME platform. [Citation Graph (, )][DBLP ] What the heck is this application doing? - A security-by-contract architecture for pervasive services. [Citation Graph (, )][DBLP ] Policy Evolution in Distributed Usage Control. [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.008secs