Autor der Publikation

Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones.

, , , , , und . IEEE Internet of Things Journal, 5 (6): 4351-4364 (2018)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

Univ. -Prof. Dr. Daniel Weiskopf University of Stuttgart

Dataset for NMF-based Analysis of Mobile Eye-Tracking Data, , , und . Dataset, (2024)Related to: Daniel Klötzl, Tim Krake, Frank Heyen, Michael Becher, Maurice Koch, Daniel Weiskopf, and Kuno Kurzhals. 2024. NMF-Based Analysis of Mobile Eye-Tracking Data. In 2024 Symposium on Eye Tracking Research and Applications (ETRA ’24), June 4-7, 2024, Glasgow, United Kingdom. ACM, New York, NY, USA, 9 pages. doi: 10.1145/3649902.3653518.
Dataset for NMF-based Analysis of Mobile Eye-Tracking Data, , , und . Dataset, (2024)Related to: Daniel Klötzl, Tim Krake, Frank Heyen, Michael Becher, Maurice Koch, Daniel Weiskopf, and Kuno Kurzhals. 2024. NMF-Based Analysis of Mobile Eye-Tracking Data. In 2024 Symposium on Eye Tracking Research and Applications (ETRA ’24), June 4-7, 2024, Glasgow, United Kingdom. ACM, New York, NY, USA, 9 pages. doi: 10.1145/3649902.3653518.Visual Analysis System to Explore the Visual Quality of Multidimensional Time Series Projections, und . Software, (2024)Related to: T. Munz-Körner, D. Weiskopf, Exploring visual quality of multidimensional time series projections, Visual Informatics (2024). doi: 10.1016/j.visinf.2024.04.004.Supplemental Materials for STEP: Sequence of Time-Aligned Edge Plots, , , , , und . Software, (2024)Related to: Manuscript still under review.
 

Weitere Publikationen von Autoren mit dem selben Namen

MASSIVE: A Multidisciplinary Applications-Oriented Simulation and Visualization Environment., , , , , und . IEEE SCC, Seite 583-587. IEEE Computer Society, (2004)Minimizing Nested Interrupts of Secondary Users in Multi-Priority Cognitive Radio Networks., , , und . IDCS, Volume 8223 von Lecture Notes in Computer Science, Seite 16-29. Springer, (2013)Detecting stepping stones by abnormal causality probability., , , , , und . Security and Communication Networks, 8 (10): 1831-1844 (2015)Research and Design of Multimedia NSS for E-Commerce., und . I3E (1), Volume 251 von IFIP Advances in Information and Communication Technology, Seite 126-133. Springer, (2007)Identity-Based Conditional Proxy Re-Encryption., , , und . ICC, Seite 1-5. IEEE, (2011)SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks., , , , , und . Concurrency and Computation: Practice and Experience, 27 (10): 2668-2680 (2015)A mobile cache model with semantic locality., , und . IJIIDS, 1 (2): 216-227 (2007)A Dependable Cluster Based Topology in P2P Networks., , , und . JCM, 5 (1): 57-62 (2010)Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption., , , , , , und . NSS, Volume 11928 von Lecture Notes in Computer Science, Seite 552-566. Springer, (2019)Optimal Spectrum Leasing with the Constraints of User Admission Rate and Quality of Service., , , und . MASS, Seite 429-430. IEEE Computer Society, (2013)