default search action
Stefan Berger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j12]Stefan Berger, Stefan Lang, Lena Pernkopf:
Modellierung und Darstellung der Anpassungsfähigkeit an die Folgen des Klimawandels in der historischen Tourismusregion Salzkammergut, ÖsterreichSpatial Modelling of Climate Change Adaptability - A Case Study in the Tourism Region Salzkammergut, Austria. AGIT Journal Angew. Geoinformatik 4: 248-258 (2018) - 2016
- [j11]Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios E. Pendarakis, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin:
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility. IBM J. Res. Dev. 60(4): 10 (2016) - [j10]Stefan Berger, Shelly Garion, Yosef Moatti, Dalit Naor, Dimitrios E. Pendarakis, Alexandra Shulman-Peleg, Josyula R. Rao, Enriquillo Valdez, Yaron Weinsberg:
Security intelligence for cloud management infrastructures. IBM J. Res. Dev. 60(4): 11 (2016) - 2015
- [j9]Stefan Berger, Kenneth A. Goldman, Dimitrios E. Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar:
Scalable Attestation: A Step toward Secure and Trusted Clouds. IEEE Cloud Comput. 2(5): 10-18 (2015) - [j8]Mathias Goller, Stefan Berger:
Handling measurement function changes with Slowly Changing Measures. Inf. Syst. 53: 107-123 (2015) - [c30]Stefan Berger, Kenneth A. Goldman, Dimitrios E. Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar:
Scalable Attestation: A Step Toward Secure and Trusted Clouds. IC2E 2015: 185-194 - [c29]Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang, Stefan Berger, Dimitrios E. Pendarakis:
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. RAID 2015: 588-614 - 2013
- [c28]Mathias Goller, Stefan Berger:
Slowly changing measures. DOLAP 2013: 47-54 - 2012
- [c27]Thomas Schreck, Stefan Berger, Jan Göbel:
BISSAM: Automatic Vulnerability Identification of Office Documents. DIMVA 2012: 204-213 - [c26]Stefan Berger, Michael Schrefl:
FedDW global schema architect: UML-based design tool for the integration of data mart schemas. DOLAP 2012: 33-40 - 2010
- [j7]Stefan Berger, Armin Wittneben:
Comparison of Channel Estimation Protocols for Coherent AF Relaying Networks in the Presence of Additive Noise and LO Phase Noise. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c25]Kyung Dong Ryu, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Stefan Berger, Dilma M. Da Silva, Jim Doran, Frank Franco, Alexei A. Karve, Herb Lee, James A. Lindeman, Ajay Mohindra, Bob Oesterlin, Giovanni Pacifici, Dimitrios E. Pendarakis, Darrell Reimer, Mariusz Sabath:
RC2 - A Living Lab for Cloud Computing. LISA 2010 - [c24]Stefan Berger, Georg Grossmann, Markus Stumptner, Michael Schrefl:
Metamodel-Based Information Integration at Industrial Scale. MoDELS (2) 2010: 153-167 - [c23]Stefan Berger, Armin Wittneben:
Impact of Local-Oscillator Imperfections on Nonregenerative TDD and FDD Relaying. VTC Spring 2010: 1-5 - [p1]Stefan Berger, Michael Schrefl:
Federated Data Warehouses. Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development 2010: 82-107
2000 – 2009
- 2009
- [j6]Stefan Berger, Marc Kuhn, Armin Wittneben, Timo Unger, Anja Klein:
Recent advances in amplify-and-forward two-hop relaying. IEEE Commun. Mag. 47(7): 50-56 (2009) - [j5]Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Dimitrios E. Pendarakis, Ronald Perez, Josyula R. Rao, Eran Rom, Reiner Sailer, Wayne Schildhauer, Deepa Srinivasan, Sivan Tal, Enriquillo Valdez:
Security for the cloud infrastructure: Trusted virtual data center implementation. IBM J. Res. Dev. 53(4): 6 (2009) - [c22]Stefan Berger, Michael Schrefl:
FedDW: A Tool for Querying Federations of Data Warehouses - Architecture, Use Case and Implementation. ICEIS (1) 2009: 113-122 - 2008
- [j4]Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan:
TVDc: managing security in the trusted virtual datacenter. ACM SIGOPS Oper. Syst. Rev. 42(1): 40-47 (2008) - [c21]Stefan Berger, Michael Schrefl:
From Federated Databases to a Federated Data Warehouse System. HICSS 2008: 394 - [c20]Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang:
Trustworthy and personalized computing on public kiosks. MobiSys 2008: 199-210 - [c19]Stefan Berger, Armin Wittneben:
A coherent amplify-and-forward relaying demonstrator without global phase reference. PIMRC 2008: 1-5 - 2007
- [c18]Stefan Berger, Armin Wittneben:
Impact of Noisy Carrier Phase Synchronization on Linear Amplify-and-Forward Relaying. GLOBECOM 2007: 795-800 - [c17]Celal Esli, Stefan Berger, Armin Wittneben:
Optimizing Zero-Forcing Based Gain Allocation for Wireless Multiuser Networks. ICC 2007: 5825-5830 - [c16]Scott Garriss, Romó Sailer, Stefan Berger, Reiner Sailer, Leendert van Doorn, Xiaolan Zhang:
Towards Trustworthy Kiosk Computing. HotMobile 2007: 41-45 - [r2]Hans Lehmann, Stefan Berger, Ulrich Remus:
A Mobile Portal for Academe. Encyclopedia of Portal Technologies and Applications 2007: 577-582 - [r1]Hans Lehmann, Ulrich Remus, Stefan Berger:
Mobile Portals for Knowledge Management. Encyclopedia of Portal Technologies and Applications 2007: 599-605 - 2006
- [j3]Marc Kuhn, Stefan Berger, Ingmar Hammerström, Armin Wittneben:
Power line enhanced cooperative wireless communications. IEEE J. Sel. Areas Commun. 24(7): 1401-1410 (2006) - [c15]Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer:
Shamon: A System for Distributed Mandatory Access Control. ACSAC 2006: 23-32 - [c14]Stefan Berger, Michael Schrefl:
Analysing Multi-dimensional Data Across Autonomous Data Warehouses. DaWaK 2006: 120-133 - [c13]Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn:
vTPM: Virtualizing the Trusted Platform Module. USENIX Security Symposium 2006 - 2005
- [c12]Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn:
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. ACSAC 2005: 276-285 - [c11]Hans Lehmann, Stefan Berger, Ulrich Remus, Franz Lehner:
Towards a Functional Architecture for Mobile Knowledge Management - The Example of a University Portal. AMCIS 2005: 333 - [c10]Stefan Berger, Hans Lehmann, Ulrich Remus:
U-KNOW - An Example of a Mobile Portal for Knowledge Management. MCTA 2005: 101-115 - [c9]Stefan Berger, Rick Kjeldsen, Chandrasekhar Narayanaswami, Claudio S. Pinhanez, Mark Podlaseck, Mandayam T. Raghunath:
Using Symbiotic Displays to View Sensitive Information in Public. PerCom 2005: 139-148 - [c8]Arup Acharya, Stefan Berger, Chandrasekhar Narayanaswami:
Unleashing the Power of Wearable Devices in a SIP Infrastructure. PerCom 2005: 159-168 - 2004
- [c7]Stefan Berger, Scott McFaddin, Carl Binding, Christian Hörtnagl, Anand Ranganathan:
Towards Pluggable Discovery Frameworks for Mobile and Pervasive Applications. Mobile Data Management 2004: 308-319 - 2003
- [j2]Henning Schulzrinne, Xiaotao Wu, Stylianos Sidiroglou, Stefan Berger:
Ubiquitous computing in home networks. IEEE Commun. Mag. 41(11): 128-135 (2003) - [c6]Stefan Berger, Jens Ingo Mehlau:
Einsatz eines Sicherheitsmusters zur Absicherung einer mobilen Wissensmanagementlösung. DFN-Arbeitstagung über Kommunikationsnetze 2003: 195-215 - [c5]Stefan Berger, Henning Schulzrinne, Stylianos Sidiroglou, Xiaotao Wu:
Ubiquitous computing using SIP. NOSSDAV 2003: 82-89 - [c4]Stefan Berger, Rainer Mohr, Holger Nösekabel, Klaus J. Schäfer:
Mobile Collaboration Tool for University Education. WETICE 2003: 77- - [c3]Stefan Berger, Scott McFaddin, Chandrasekhar Narayanaswami, Mandayam T. Raghunath:
Web Services on Mobile Devices - Implementation and Experience. WMCSA 2003: 100-109 - 2002
- [j1]Stefan Berger, Hans Lehmann, Franz Lehner:
Location-Based Services in the Tourist Industry. J. Inf. Technol. Tour. 5(4): 243-256 (2002) - [c2]Stefan Berger, Franz Lehner:
U-Know - Ubiquitäres Wissensmanagement an der Universität Regensburg. ISI 2002: 107-122 - [c1]Stefan Berger, Franz Lehner:
Mobile B2B-Anwendungen. Mobile and Collaborative Business 2002: 85-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint