Author of the publication

Local Authentication with Bluetooth enabled Mobile Devices.

, , and . ICAS/ICNS, page 72. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Achim Menges University of Stuttgart

ABxM.MultiStorey.Columns: Agent-based Column Arrangement for Multi-Storey Structures, , and . Software, (2024)
ABxM.MultiStorey.Columns: Agent-based Column Arrangement for Multi-Storey Structures, , and . Software, (2024)Timber Column Slab Solver, , , , and . Software, (2024)Related to: Udaykumar, K., Orozco, L., Krtschil, A., Menges, A., & Knippers, J. (2023). Interactive gradient-decent optimization method for timber column-slab structures. In Proceedings of IASS Annual Symposia, IASS 2023 Melbourne Symposium: Optimisation methods and applications. International Association for Shell and Spatial Structures (IASS). url: https://www.ingentaconnect.com/contentone/iass/piass/2023/00002023/00000008/art00010.Reinforcement Arrangement Data, , , , and . Dataset, (2024)Related to: Orozco, L., Krtschil, A., Skoury, L., Knippers, J., & Menges, A. (2022). Arrangement of reinforcement in variable density timber slab systems for multi-story construction. International Journal of Architectural Computing, vol. 20, no. 4, pp. 707-727. doi: 10.1177/14780771221135003.
 

Other publications of authors with the same name

Triage-based automated analysis of evidence in court cases of copyright infringement., , , and . ICC, page 6668-6672. IEEE, (2012)Local Authentication with Bluetooth enabled Mobile Devices., , and . ICAS/ICNS, page 72. IEEE Computer Society, (2005)Forensic disk image indexing and search in an HPC environment., , , , , , and . HPCS, page 558-565. IEEE, (2014)M-Government to Narrow the Digital Divide.. ICWI, page 681-684. IADIS, (2002)Vertical Semantic Discovery: The SICH Approach on NPS., , , , and . INCoS, page 119-124. IEEE, (2014)Internal forensic acquisition for mobile equipments., and . IPDPS, page 1-7. IEEE, (2008)Investigation Strategy for the Small Pedophiles World.. Encyclopedia of Information Ethics and Security, IGI Global, (2007)Fast User Classifying to Establish Forensic Analysis Priorities., , , and . IMF, page 69-77. IEEE Computer Society, (2009)A Secure Mobile Local Payment Application Framework.. Security and Management, page 85-92. CSREA Press, (2003)A Survey of PDA Forensic Investigation., and . International Conference on Wireless Networks, page 583-590. CSREA Press, (2003)