Author of the publication

Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottoms.

, , , , and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 86650F. SPIE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. Robert Löw University of Stuttgart

Replication Data for: Highly efficient real-time spatially resolved sensing of ultraviolet light, , , , , , , and . Dataset, (2025)Related to: Yannick Schellander, Fabian Munkes, Alexander Trachtmann, Patrick Schalberger, Robert Löw, Harald Kübler, Tilman Pfau, Norbert Fruehauf, "Highly efficient real-time spatially resolved sensing of ultraviolet light," Proc. SPIE 13109, Metamaterials, Metadevices, and Metasystems 2024, 1310906 (2024). doi: 10.1117/12.3028038.
Replication Data for: Highly efficient real-time spatially resolved sensing of ultraviolet light, , , , , , , and . Dataset, (2025)Related to: Yannick Schellander, Fabian Munkes, Alexander Trachtmann, Patrick Schalberger, Robert Löw, Harald Kübler, Tilman Pfau, Norbert Fruehauf, "Highly efficient real-time spatially resolved sensing of ultraviolet light," Proc. SPIE 13109, Metamaterials, Metadevices, and Metasystems 2024, 1310906 (2024). doi: 10.1117/12.3028038.Replication Data for: Ultraviolet Photodetectors and their Readout Realization for Future Active-Matrix Sensing, , , , , , , and . Dataset, (2025)Related to: Y. Schellander, M. Schamber, F. Munkes, R. Loew, P. Schalberger, H. Kübler, T. Pfau, and N. Fruehauf, “Ultraviolet photodetectors and their readout realization for future active-matrix sensing”, Proceedings of the International Display Workshops,30 (2023), 151-154. doi: 10.36463/idw.2023.0151.
 

Other publications of authors with the same name

Non-invasive, optical latent fingerprint acquisition from cartridge casings: A first feasibility study using a laser-scanning confocal microscope., and . DSP, page 1-6. IEEE, (2013)Towards automated firearm identification based on high resolution 3D data: rotation-invariant features for multiple line-profile-measurement of firing pin shapes., and . Three-Dimensional Image Processing, Measurement (3DIPM), and Applications, volume 9393 of SPIE Proceedings, page 93930Q. SPIE, (2015)A Gait Analysis Approach to Track Parkinson's Disease Evolution Using Principal Component Analysis., , , , and . CBMS, page 48-53. IEEE Computer Society, (2016)Design and Execution of make-like, distributed Analyses based on Spotify's Pipelining Package Luigi., , , and . CoRR, (2017)Cardiac Magnetic Field Map Topology Quantified by Kullback-Leibler Entropy Identifies Patients with Hypertrophic Cardiomyopathy., , , , , , , , and . BIOSIGNALS (2), page 445-452. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2008)978-989-8111-18-0.ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties., , , and . IH&MMSec, page 91-96. ACM, (2015)A Game-Based Approach to Monitor Parkinson's Disease: The Bradykinesia Symptom Classification., , , , and . CBMS, page 337-342. IEEE Computer Society, (2016)Bildschirmtextangebote der unteren staatlichen Verwaltungsbehörden in Baden-Württemberg.. Neue Informationstechnologien und Verwaltung, volume 80 of Informatik-Fachberichte, page 275-283. Springer, (1983)From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor., , , , and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 207-210. Springer, (2012)Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans., , , , , and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 89-98. Springer, (2012)