Author of the publication

The Relation on Prefix Hijacking and the Internet Hierarchy.

, , , , and . IMIS, page 415-420. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Daniel Weiskopf University of Stuttgart

Dataset for NMF-based Analysis of Mobile Eye-Tracking Data, , , and . Dataset, (2024)Related to: Daniel Klötzl, Tim Krake, Frank Heyen, Michael Becher, Maurice Koch, Daniel Weiskopf, and Kuno Kurzhals. 2024. NMF-Based Analysis of Mobile Eye-Tracking Data. In 2024 Symposium on Eye Tracking Research and Applications (ETRA ’24), June 4-7, 2024, Glasgow, United Kingdom. ACM, New York, NY, USA, 9 pages. doi: 10.1145/3649902.3653518.
Dataset for NMF-based Analysis of Mobile Eye-Tracking Data, , , and . Dataset, (2024)Related to: Daniel Klötzl, Tim Krake, Frank Heyen, Michael Becher, Maurice Koch, Daniel Weiskopf, and Kuno Kurzhals. 2024. NMF-Based Analysis of Mobile Eye-Tracking Data. In 2024 Symposium on Eye Tracking Research and Applications (ETRA ’24), June 4-7, 2024, Glasgow, United Kingdom. ACM, New York, NY, USA, 9 pages. doi: 10.1145/3649902.3653518.Visual Analysis System to Explore the Visual Quality of Multidimensional Time Series Projections, and . Software, (2024)Related to: T. Munz-Körner, D. Weiskopf, Exploring visual quality of multidimensional time series projections, Visual Informatics (2024). doi: 10.1016/j.visinf.2024.04.004.Supplemental Material for "Exploring Visual Quality of Multidimensional Time Series Projections", and . Dataset, (2024)Related to: T. Munz-Körner, D. Weiskopf, Exploring visual quality of multidimensional time series projections, Visual Informatics (2024). doi: 10.1016/j.visinf.2024.04.004.
 

Other publications of authors with the same name

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties., , , , and . INFOCOM, page 136-144. IEEE, (2014)The Relation on Prefix Hijacking and the Internet Hierarchy., , , , and . IMIS, page 415-420. IEEE Computer Society, (2012)Routing Algorithm Based on Ant Colony Optimization for DTN Congestion Control., , , , and . NBiS, page 715-720. IEEE Computer Society, (2012)Finding Hotspots in Document Collection., , , and . ICTAI (1), page 313-320. IEEE Computer Society, (2007)Algebraic connectivity optimization of the air transportation network., , and . ACC, page 1702-1707. IEEE, (2012)Improved adaptive sparse channel estimation based on the least mean square algorithm., , and . WCNC, page 3105-3109. IEEE, (2013)Decision Making with Uncertainty., and . AIAI, volume 187 of IFIP, page 313-314. Springer, (2005)Smartphone strategic sampling in defending enterprise network security., , , and . ICC, page 2155-2159. IEEE, (2013)A highway vehicle detection method based on the improved visual background extractor., , , , and . FSKD, page 1519-1524. IEEE, (2015)An Approach to Optimize Intra-ECU Communication Based on Mapping of AUTOSAR Runnable Entities., , , , and . ICESS, page 138-143. IEEE Computer Society, (2009)