Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Daniel Weiskopf University of Stuttgart

Dataset for "How Deep Is Your Gaze? Leveraging Distance in Image-Based Gaze Analysis", , , and . Dataset, (2024)Related to: Maurice Koch, Nelusa Pathmanathan, Daniel Weiskopf, and Kuno Kurzhals.2024. How Deep Is Your Gaze? Leveraging Distance in Image-Based GazeAnalysis. In 2024 Symposium on Eye Tracking Research and Applications(ETRA ’24), June 04–07, 2024, Glasgow, United Kingdom. ACM, New York,NY, USA, 7 pages. doi: 10.1145/3649902.3653349.
 

Other publications of authors with the same name

Model clone detection for rule-based model transformation languages., , and . Software and Systems Modeling, 18 (2): 995-1016 (2019)VMTL: a language for end-user model transformation., , and . Software and Systems Modeling, 17 (4): 1139-1167 (2018)Maintaining Security in Software Evolution., , , , , , , , , and 4 other author(s). Managed Software Evolution, Springer, (2019)Supporting privacy impact assessment by model-based privacy analysis., , , and . SAC, page 1467-1474. ACM, (2018)Towards a Distributed Modeling Process Based on Composite Models., , , and . FASE, volume 7793 of Lecture Notes in Computer Science, page 6-20. Springer, (2013)Sustaining and improving graduated graph consistency: A static analysis of graph transformations., , , and . Sci. Comput. Program., (2022)Gamma in motion: Pattern reversal elicits stronger gamma-band responses than motion., , , , , , , and . NeuroImage, 55 (2): 808-817 (2011)An Adaptable Tool Environment for High-level Differencing of Textual Models., , , , and . OCL@MoDELS, volume 1512 of CEUR Workshop Proceedings, page 62-72. CEUR-WS.org, (2015)Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements., , and . SAC, page 1142-1149. ACM, (2018)Privacy-enhanced system design modeling based on privacy features., , and . SAC, page 1492-1499. ACM, (2019)