Author of the publication

Acht Achsen für Fünf-Achs-Bearbeitung: Redundante Roboterkinematik mit acht Achsen ermöglicht flexible und produktive Fünf-Achs-Bearbeitung

, and . Robotik in der industriellen Fertigung - Sonderausgabe zur MOTEK 2016, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.


Other publications of authors with the same name

Library based macro-modeling methodology for Through Silicon Via (TSV) arbitrary arrays., , , and . Microelectronics Journal, 46 (12): 1291-1303 (2015)FlowBoost - Appearance learning from sparsely annotated video., , and . CVPR, page 1433-1440. IEEE Computer Society, (2011)Productivity Increase through Joint Space Path Planning for Robot Machining, , , , , and . Modelling Symposium (EMS), 2014 European, page 257-262. (October 2014)Confidence-Rated Multiple Instance Boosting for Object Detection., and . CVPR, page 2433-2440. IEEE Computer Society, (2014)Drive Based Damping for Robots with Secondary Encoders, , and . (2015)Kompensation des Umkehrspiels bei Zahnstange-Ritzel-Antrieben, , and . Antriebstechnik, (April 2017)CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs., , , , and . ECOOP, volume 109 of LIPIcs, page 10:1-10:27. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2018)Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java., , , and . ECOOP, volume 56 of LIPIcs, page 22:1-22:26. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2016)What do developers know about machine learning: a study of ML discussions on StackOverflow., , , , , and . MSR, page 260-264. IEEE / ACM, (2019)Detecting Security Vulnerabilities in Object-Oriented PHP Programs., , and . SCAM, page 159-164. IEEE Computer Society, (2017)