X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
ec grant agreement nr.: fp7/2007-2013 (106) 106
ec grant agreement nr.: fp7/318003 (56) 56
hmi-hf: human factors (25) 25
computer science (17) 17
engineering, electrical & electronic (17) 17
computer science, artificial intelligence (16) 16
ec grant agreement nr.: fp7/288235 (16) 16
ec grant agreement nr.: fp7/318490 (16) 16
scs-cybersecurity (13) 13
analysis (12) 12
algorithms (11) 11
ec grant agreement nr.: fp7/611153 (11) 11
computer science, software engineering (10) 10
attack trees (9) 9
computer science, theory & methods (9) 9
usage (9) 9
hmi-mi: multimodal interactions (8) 8
index medicus (8) 8
mathematical models (8) 8
models (8) 8
computer simulation (7) 7
ec grant agreement nr.: fp7/235873 (7) 7
ec grant agreement nr.: fp7/287767 (7) 7
humans (7) 7
research (7) 7
security (7) 7
computational modeling (6) 6
ec grant agreement nr.: fp7/258405 (6) 6
ec grant agreement nr.: fp7/295261 (6) 6
hidden markov models (6) 6
probabilistic methods (6) 6
recognition (6) 6
visualization (6) 6
artificial intelligence (5) 5
behavior (5) 5
ec grant agreement nr.: fp7/211486 (5) 5
formal methods (5) 5
hydrophobic surfaces (5) 5
markov automata (5) 5
markov processes (5) 5
model checking (5) 5
pattern recognition, automated - methods (5) 5
probability theory (5) 5
speech (5) 5
bubbles (4) 4
chemistry, physical (4) 4
classification (4) 4
computer science, information systems (4) 4
ec grant agreement nr.: erc-2007-stg-203143 (4) 4
ec grant agreement nr.: fp7/205294 (4) 4
face alignment (4) 4
face recognition (4) 4
internet (4) 4
principal component analysis (4) 4
principal components analysis (4) 4
quantitative analysis (4) 4
robustness (4) 4
safety and security measures (4) 4
sicherheitsanalyse (4) 4
systemsicherheit (4) 4
technology (4) 4
training (4) 4
[ info ] computer science [cs] (3) 3
active appearance model (3) 3
active appearance models (3) 3
adsorption (3) 3
artificial intelligence & image processing (3) 3
attack tree (3) 3
attack-defense trees (3) 3
case studies (3) 3
component analysis (3) 3
computation (3) 3
computer information security (3) 3
computer science, cybernetics (3) 3
computer science, hardware & architecture (3) 3
computer security (3) 3
computer vision (3) 3
computer-generated environments (3) 3
conferences (3) 3
correlation (3) 3
ec grant agreement nr.: fp7/231287 (3) 3
ec grant agreement nr.: fp7/261696 (3) 3
face (3) 3
face - anatomy & histology (3) 3
facial expression (3) 3
feature extraction (3) 3
gaseous states (3) 3
gaussian processes (3) 3
gold (3) 3
image processing (3) 3
insider threats (3) 3
interactive markov chains (3) 3
interface (3) 3
learning (3) 3
methods (3) 3
nanobubbles (3) 3
neural networks (3) 3
optics (3) 3
optimization (3) 3
probabilistic logic (3) 3
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2013 IEEE International Conference on Computer Vision, ISSN 1550-5499, 12/2013, pp. 593 - 600
Conference Proceeding
Journal Article
Computers in Human Behavior, ISSN 0747-5632, 01/2017, Volume 66, pp. 75 - 87
Journal Article
13th International Conference on Quantitative Evaluation of Systems, QEST 2016, ISSN 1611-3349, 08/2016, Volume 9826, pp. 159 - 162
In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool... 
EWI-27273 | EC Grant Agreement nr.: FP7/318003 | IR-101599 | METIS-318541 | EC Grant Agreement nr.: FP7/2007-2013
Conference Proceeding
IEEE transactions on electromagnetic compatibility, ISSN 0018-9375, 04/2015, Volume 57, Issue 99, pp. 180 - 187
In electromagnetic interference prediction, dc motors are usually modeled as a source and a series impedance. Previous researches only include the impedance of... 
EC Grant Agreement nr.: FP7/2007-2013 | METIS-309912 | EWI-25760 | IR-94346 | EC Grant Agreement nr.: FP7/205294
Journal Article
IEEE Transactions on Control of Network Systems, ISSN 2325-5870, 03/2015, Volume 2, Issue 1, pp. 78 - 87
Algorithms and dynamics over networks often involve randomization and randomization can induce oscillating dynamics that fail to converge in a deterministic... 
Heuristic algorithms | Power system dynamics | Control systems | Vectors | Random variables | Convergence | Clocks | Networks | EC Grant Agreement nr.: FP7/2007-2013 | Randomized algorithms | opinion dynamics | PageRank problem | METIS-315585 | IR-99347 | EWI-26787 | Page Rank problem | networks
Journal Article
Social Robotics, ISSN 1611-3349, 10/2015, Volume 9388, pp. 317 - 326
In this paper we present a user evaluation study on location at the Royal Alcázar in Seville, Spain, with the fully autonomous tour guide robot FROG. In this... 
Robot guideInteraction design Real world evaluation User study | IR-98692 | EC Grant Agreement nr.: FP7/2007-2013 | EWI-26509 | METIS-315061 | User study | Robot guide | EC Grant Agreement nr.: FP7/288235 | Interaction Design | Real world evaluation | Interaction design
Conference Proceeding
Stochastic Model Checking. Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems, ISSN 1611-3349, 06/2014, Volume 8453, pp. 26 - 66
Interactive Markov chains (IMCs) constitute a powerful sto- chastic model that extends both continuous-time Markov chains and labelled transition systems. IMCs... 
Model Checking | METIS-309682 | Interactive Markov chains | EC Grant Agreement nr.: FP7/2007-2013 | EWI-25350 | stochastic | EC Grant Agreement nr.: FP7/318003 | logic | Abstraction | IR-93332
Conference Proceeding
Science of Computer Programming, ISSN 0167-6423, 12/2014, Volume 95, Issue Part 3, pp. 376 - 388
Graphics Processing Units (GPUs) are increasingly used for general-purpose applications because of their low price, energy efficiency and enormous computing... 
Permissions | Separation logic | GPU programming | Formal verification | EC Grant Agreement nr.: FP7/258405 | EC Grant Agreement nr.: FP7/2007-2013 | Separation Logic | EWI-25485 | IR-93984 | EC Grant Agreement nr.: FP7/287767 | METIS-309764 | COMPUTER SCIENCE, SOFTWARE ENGINEERING | LOCKS
Journal Article
Journal Article
Journal of ambient intelligence and humanized computing, ISSN 1868-5137, 06/2016, Volume 6, Issue 3, pp. 361 - 373
In the development process of a secure system is essential to detect as early as possible the system’s vulnerable points, the so called attack surfaces, and to... 
METIS-318571 | EC Grant Agreement nr.: FP7/2007-2013 | EWI-27347 | EC Grant Agreement nr.: FP7/318003 | IR-101832
Journal Article
IEEE transactions on image processing, ISSN 1057-7149, 01/2015, Volume 24, Issue 1, pp. 189 - 204
Images of facial expressions are often captured from various views as a result of either head movements or variable camera position. Existing methods for... 
EWI-25804 | HMI-HF: Human Factors | Facial expression recognition | multi-view learning | View-invariant | EC Grant Agreement nr.: FP7/2007-2013 | Gaussian processes | IR-98117 | METIS-314908 | EC Grant Agreement nr.: FP7/611153
Journal Article
2013 IEEE International Conference on Computer Vision, ISSN 1550-5499, 12/2013, pp. 2840 - 2847
Conference Proceeding
British journal of criminology, ISSN 0007-0955, 03/2015, Volume 55, Issue 2, pp. 1 - 18
Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from... 
cybercrime | Actor-Network Theory | agency | EC Grant Agreement nr.: FP7/2007-2013 | Botnets | METIS-312526 | EC Grant Agreement nr.: FP7/318003 | technical mediation | cyborg crime | EWI-25874 | IR-95269
Journal Article
Journal of experimental criminology, ISSN 1573-3750, 03/2015, Volume 11, Issue 1, pp. 97 - 115
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.