Faculty of Computer Science and Biomedical Engineering (7000)

  • 8010

    Inffeldgasse 10 Graz

    Austria

Research Output 1970 2020

Filter
Conference contribution
Conference contribution

Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware

Wenger, E., Korak, T. & Kirschbaum, M., 2013, RFID Security - RFIDSec 2013, 9th Workshop, Graz, Austria, July 9-11, 2013, Proceedings. Berlin, Heidelberg: Springer, p. 128-144 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Analyzing the Design Space for Visualizing Neural Attention in Text Classification

Parra, D., Valdivieso, H., Carvallo, A., Rada, G., Verbert, K. & Schreck, T., Aug 2019, Proc. IEEE VIS Workshop on Vis X AI: 2nd Workshop on Visualization for AI Explainability (VISxAI).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag

Plos, T. & Feldhofer, M., 2011, Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Proceedings. Berlin / Heidelberg: Springer, p. 426-435 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecomm. (LNICST)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analyzing the Reduction of Test Suite Redundancy

Pill, I. H., Jehan, S., Wotawa, F. & Nica, M., 2015, The 26th International Symposium on Software Reliability Engineering Workshops. ., p. 65-65

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures

Peßl, P., 11 Dec 2016, Progress in Cryptology – INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Springer, p. 153-170 18 p. (Lecture Notes in Computer Science; vol. 10095).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Analyzing User Click Paths in a Wikipedia Navigation Game

Helic, D., 2012, Proceedings of MIPRO 2007, International Convention on Information and Communication Technology, Electronics, and Microelectronics. ., p. 374-379

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Analysis of Application of Business Process Management Technology in E-Learning Systems

Helic, D., Hrastnik, J. & Maurer, H., 2005, E-Learn - World Conference on E-Learning in Corporate, Government, Healthcare, & Higher Education. ., p. 2937-2942

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Analysis of the Hermes8 Stream Ciphers

Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007. Springer, Vol. 4586. p. 1-10 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Application of RFID Tags using Secure Symmetric Authentication

Feldhofer, M., Aigner, M. J. & Dominikus, S., 2005, Proceedings of IEEE Security, Privacy and Trust in Pervasive and Ubiquitous Computing. ., p. 43-49

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An apporoach for a medical ontology based on UMLS to improve information retrieval in German language clinicial text documents

Gütl, C., Petritsch, G., Spat, S. & Beck, P., 2010, MEDINFO 2010 - Proceedings of the 13th World congress on Medical Informatics. Amsterdam, The Netherlands: IOS Press, Vol. 160. p. 1494-1494 (Studies in Health Technology and Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An approach for the patient adjusted optimization of the dialysis therapy

Hutten, H., Bachhiesl, P. & Scharfetter, H., 1998, Proc. of the 2nd International Workshop Applied Informatics in Biomedicine and Medical Engineering. ., p. 16-17

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Approach for Training Decision Making Competences in a Multi-Modal Online Environment

Nussbaumer, A., Steiner, C., McCarthy, N., Dwane, S., Neville, K., O'Riordan, S. & Albert, D., 2015, Proceedings of the 23rd International Conference on Computers in Education. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Approach to Automatically Extract Predictive Properties from Nominal Attributes in Relational Databases

Kassarnig, V. & Wotawa, F., 22 Jan 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers, p. 4932-4939 8 p. 8622359. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Data mining

An Approach to Test Classification in Big Android Applications

Hirsch, T., Schindler, C., Müller, M., Schranz, T. & Slany, W., 2019, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE Computer Society Conference Publishing Services, p. 300-308 9 p. 1

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Testing

An architecture for automated group formation within remote laboratories

Gütl, C., 2011, International Conference on Remote Engineering and Virtual Instrumentation. ., p. 91-100

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An ASIC implementation of the AES-MixColumn operation

Wolkerstorfer, J., 2001, Proceedings of Austrochip 2001. Wien: ., p. 129-132

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Anatomical landmark detection in medical applications driven by synthetic data

Riegler, G., Urschler, M., Rüther, M., Bischof, H. & Stern, D., 2015, IEEE International Conference on Computer Vision Workshop (ICCVW): TASK-CV: Transferring and Adapting Source Knowledge in Computer Vision. Institute of Electrical and Electronics Engineers, p. 85-89

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Authentication Protocol in a Security Layer for RFID Smart Tags

Feldhofer, M., 2004, Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference - MELECON 2004 / Vol. 2. IEEE Computer Society, p. 759-762

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Authoring Tool for Mobile Phone AR Environments

Langlotz, T., Wang, Y., Billinghurst, M. & Bell, T., 2009, (Accepted/In press) Proceedings of the New Zealand Computer Science Research Student Conference '09 (NZCSRSC '09). .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Automated (F) LTL Test Oracle for Testing with Requirements

Pill, I. & Wotawa, F., 2016, 2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW. Institute of Electrical and Electronics Engineers, p. 197-204 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Automatic Hybrid Segmentation Approach for Aligned Face Portrait Images

Hirzer, M., Urschler, M., Bischof, H. & Birchbauer, J. A., 2009, Proceedings of the Workshop of the Austrian Association for Pattern Recognition (OAGM/AAPR). Österreichische Computergesellschaft, p. 49-60

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Civil aviation
Adaptive boosting
Expert systems
Classifiers
Color

An Automatic Hypothesis of Electrical Lines from Range Scans and Photographs

Krispel, U., Evers, H. L., Tamke, M. & Ullrich, T., Jul 2016, Proceedings of the 16th International Conference on Computing in Civil and Building Engineering. Yabuki, N. & Makanae, K. (eds.). Osaka, Japan, p. 815-822 8 p. 089

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Semantics
Photogrammetry
Electric wiring
Ducts
Data structures

An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response

Hein, D. & Tögl, R., 2009, Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers. Springer Berlin - Heidelberg, Vol. 17. p. 46-57 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Autonomous Forklift for Battery Change in Electrical Vehicles

Kaltner, S., Gugler, J., Wonisch, M. & Steinbauer, G., 2015, (Accepted/In press) Austrian Robotics Workshop. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

​An Autonomous Vehicle for Parcel Delivery in Urban Areas

Buchegger, A., Lassnig, K., Loigge, S., Mühlbacher, C. & Steinbauer, G., 2018, 21st IEEE International Conference on Intelligent Transportation Systems. IEEE Xplore, p. 2961-2967

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Navigation Tool for Adaptive Guidance and Orientation in Open Responsive Learning Environments

Nussbaumer, A., Fruhmann, K. & Albert, D., 2010, Proceedings of the International Conference on Interactive Computer-aided Learning (ICL 2010). Kassel: Kassel University Press GmBH, p. 1-9

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Android Encryption Systems

Teufl, P., Fitzek, A. G., Hein, D., Marsalek, A., Oprisnik, A. & Zefferer, T., 2014, International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android Market Analysis with Activation Patterns

Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 1-12 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Chemical activation
Metadata
Screening
Semantics

Android - On-Device Detection of SMS Catchers and Sniffers

Teufl, P., Zefferer, T., Wörgötter, C., Oprisnik, A. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android Security Permissions - Can we trust them?

Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 40-51 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

And Yet Another Variant of Reiter's Complete On-the-fly Hitting Set Algorithm

Pill, I. H. & Quaritsch, T., 2013, International Workshop on Principles of Diagnosis. ., p. 210-215

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An ECDSA Processor for RFID Authentication

Hutter, M., Feldhofer, M. & Plos, T., 2010, Workshop on RFID Security - RFIDsec 2010, 6th Workshop, Istanbul, Turkey, June 7-9, 2010, Proceedings. Heidelberg: Springer, Vol. 6370. p. 189-202 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Edgel-Based Two Step Approach for Simultaneous Matching of Image Sequences

Klaus, A., Bauer, J. & Karner, K., 2003, Proceedings of the 27th Workshop of the Austrian Association for Pattern Recognition. ., p. 51-57

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Educational guide to planet earth: Adaptation and personalization in immersive educational Games

Kickmeier-Rust, M., Mattheiss, E. & Albert, D., 2009, Proceedings of the 2nd International Workshop on Story-Telling and Educational Games (STEG'09) RWTH Aachen University, Aachen, Germany, August 21, 2009 in conjunction with the 8th International Conference. ., p. 36-45

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

An Effective Dynamic Scheduling Runtime and Tuning System for Heterogeneous Multi and Many-Core Desktop Platforms

Binotto, A., Kuijper, A., Stork, A. & Fellner, W-D., 2011, Proceedings 2011 IEEE International Conference on High Performance Computing and Communications. Los Alamitos: Institute of Electrical and Electronics Engineers, p. 78-85

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Efficient AES Implementation for Re-configurable Devices

Pramstaller, N. & Wolkerstorfer, J., 2003, Proceedings of Austrochip 2003. Linz: ., p. 5-8

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Efficient Masking Scheme for AES Software Implementations

Oswald, M. E. & Schramm, K., 2006, WISA 2005. Springer, Vol. 3786. p. 292-305 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Efficient Minimal Solution for Multi-Camera Motion

Lepetit, V., Arth, C. & Ventura, J. D., 2015, International Conference on Computer Vision. ., p. 1-8

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2017, CT-RSA. Springer, Vol. 10159. p. 95-112 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

An Electronic-signature Based Circular Resolution Database System

Zefferer, T. & Knall, T., 2010, Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010. ., p. 1840-1845

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

An Empirical Comparison of the Distinctive Features and Key Success Factors of Doing Business Electronically

Scharl, A. & Danzinger, C., 2000, 1st Austrian-Italian Workshop on Informatiion Systems - AIWIS 2000. Wien: Wirtschaftsuniv., p. 33-34

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources

Chapuis, B., Omolola, O., Humbert, M., Cherubini, M. & Huguenin, K., 11 Jan 2019, (Accepted/In press) The Web Conference.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

An Empirical Study on Consumer Behavior in the Interaction with Knowledge-based Recommender Applications

Felfernig, A. & Gula, B., 2006, IEEE International Conference on E-Commerce Technology. Piscataway, NJ: Institute of Electrical and Electronics Engineers, p. 288-296

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Empirical Study on Consumer Behavior in the Interaction with Knowledge-based Recommender Applications

Felfernig, A. & Gula, B., 2006, Proceedings of the ECAI 2006 Workshop on Recommender Systems. ., p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Energy Efficient Implementation of Differential Synchronization on Mobile Devices

Simon, J. P., Schmidt, P. & Pammer-Schindler, V., 2014, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. Brussels, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) ICST, p. 382-383

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Enhanced Approach for Peer-Assessment Activities

Alsmadi, M. A. M., Gütl, C. & Kappe, F., 2010, IEEE International Conference on Advanced Learning Technologies. ., p. 637-641

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An enhanced distributed Repository for working with 3D Assets in Cultural Heritage

Pan, X., Schiffer, T., Schröttner, M., Berndt, R., Hecher, M., Havemann, S. & Fellner, W-D., 2012, Progress in Cultural Heritage Preservation. Springer, Vol. LNCS. p. 349-358

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Environment and Language for Industrial Use of Model-based Diagnosis

Wotawa, F., Fleischanderl, G., Schreiner, H. & Stumptner, M., 2000, European Conference on Artificial Intelligence. ., p. ?-?

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Error Bound for Decoupled Visibility with Application to Relighting

Schwenk, K., Behr, J. & Fellner, W-D., 2011, Eurographics 2011. Short Papers. ., p. 25-28

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Network Architecutre for Remote Rendering

Hesina, G. & Schmalstieg, D., 1998, (Submitted) Proceedings of 2nd International Workshop on Distributed Interactive Simulation and Reals Time Applications. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review