Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Daniel Weiskopf University of Stuttgart

Dataset for NMF-based Analysis of Mobile Eye-Tracking Data, , , and . Dataset, (2024)Related to: Daniel Klötzl, Tim Krake, Frank Heyen, Michael Becher, Maurice Koch, Daniel Weiskopf, and Kuno Kurzhals. 2024. NMF-Based Analysis of Mobile Eye-Tracking Data. In 2024 Symposium on Eye Tracking Research and Applications (ETRA ’24), June 4-7, 2024, Glasgow, United Kingdom. ACM, New York, NY, USA, 9 pages. doi: 10.1145/3649902.3653518.
Dataset for NMF-based Analysis of Mobile Eye-Tracking Data, , , and . Dataset, (2024)Related to: Daniel Klötzl, Tim Krake, Frank Heyen, Michael Becher, Maurice Koch, Daniel Weiskopf, and Kuno Kurzhals. 2024. NMF-Based Analysis of Mobile Eye-Tracking Data. In 2024 Symposium on Eye Tracking Research and Applications (ETRA ’24), June 4-7, 2024, Glasgow, United Kingdom. ACM, New York, NY, USA, 9 pages. doi: 10.1145/3649902.3653518.Visual Analysis System to Explore the Visual Quality of Multidimensional Time Series Projections, and . Software, (2024)Related to: T. Munz-Körner, D. Weiskopf, Exploring visual quality of multidimensional time series projections, Visual Informatics (2024). doi: 10.1016/j.visinf.2024.04.004.Supplemental Materials for STEP: Sequence of Time-Aligned Edge Plots, , , , , and . Software, (2024)Related to: Manuscript still under review.
 

Other publications of authors with the same name

Rat Grooming Behavior Detection with Two-stream Convolutional Networks., , and . IPTA, page 1-5. IEEE, (2019)Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs., , , and . TrustCom, page 795-802. IEEE Computer Society, (2014)Adaptive Contour Features in oriented granular space for human detection and segmentation., , and . CVPR, page 1786-1793. IEEE Computer Society, (2009)Performance enhancement of a WCDMA/HSDPA+ receiver via minimizing error vector magnitude., and . ITC, page 1-7. IEEE Computer Society, (2013)On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks., , , and . IEEE Trans. Mob. Comput., 12 (1): 151-165 (2013)To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks., , , and . IEEE Trans. Dependable Sec. Comput., 10 (3): 168-182 (2013)On Generic Construction for Private Designated Verifier Signatures., , and . CIS, page 497-499. IEEE Computer Society, (2012)Double Polarization SAR Image Classification based on Object-Oriented Technology., , , and . J. Geographic Information System, 2 (2): 113-119 (2010)Robust high dynamic range color image watermarking method based on feature map extraction., , , , and . Signal Processing, (2019)Effectively modeling piecewise planar urban scenes based on structure priors and CNN., , and . SCIENCE CHINA Information Sciences, 62 (2): 29102:1-29102:3 (2019)