default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2023
- Stefan Winkler, Jochen Günther, Roland Pfennig:
Nachhaltige Digitalisierung oder Nachhaltigkeit durch Digitalisierung? HMD Prax. Wirtsch. 60(4): 815-836 (2023) - 2020
- Niklas Förster, Juan A. Cabrera, Elke Franz, Stefan Pfennig, Frank H. P. Fitzek:
Efficient Confidentiality for Network Coded Distributed Storage. GLOBECOM 2020: 1-6 - 2019
- Stefan Pfennig:
Sichere und effiziente Netzwerkcodierung. Dresden University of Technology, Germany, 2019, pp. 1-158 - 2018
- Pouyan Fotouhi Tehrani, Hannes Restel, Michael Jendreck, Stefan Pfennigschmidt, Markus Hardt, Ulrich Meissen:
Toward Privacy by Design in Spatial Crowdsourcing in Emergency and Disaster Response. ICT-DM 2018: 1-9 - Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson:
Malicious IoT Implants: Tampering with Serial Communication over the Internet. RAID 2018: 535-555 - Ulrich Meissen, Stefan Pfennigschmidt, Markus Hardt, Daniel Faust:
KATWARN - A Microservice-Based Architecture for Distributed, Flexible and Robust Warning Systems. Advances and New Trends in Environmental Informatics 2018: 213-225 - 2017
- Stefan Pfennig, Elke Franz:
Security aspects of confidential network coding. ICC 2017: 1-6 - Pouyan Fotouhi Tehrani, Stefan Pfennigschmidt, E. Ulrich Kriegel, Andreas Billig, Frank Fuchs-Kittowski, Ulrich Meissen:
Multidimensional report analysis in urban incident management. ICT-DM 2017: 1-8 - Bho Matthiesen, Stefan Pfennig, Mario Bielert, Thomas Ilsche, Andrew Lonnstrom, Tao Li, Juan A. Cabrera, Christian Scheunert, Elke Franz, Silvia Santini, Thorsten Strufe, Eduard A. Jorswieck, Wolfgang E. Nagel, Giang T. Nguyen, Frank H. P. Fitzek:
Secure and energy-efficient interconnects for board-to-board communication. ICUWB 2017: 1-7 - Ulrich Meissen, Frank Fuchs-Kittowski, Michael Jendreck, Stefan Pfennigschmidt, Markus Hardt, Agnès Voisard:
A general system architecture and design for the coordination of volunteers for agile disaster response. ISCRAM 2017 - Simon Burkard, Frank Fuchs-Kittowski, Sebastian Himberger, Fabian Fischer, Stefan Pfennigschmidt:
Mobile Location-Based Augmented Reality Framework. ISESS 2017: 470-483 - Frank Fuchs-Kittowski, Michael Jendreck, Ulrich Meissen, Michel Rösler, Eridy Lukau, Stefan Pfennigschmidt, Markus Hardt:
ENSURE - Integration of Volunteers in Disaster Management. ISESS 2017: 247-262 - 2016
- Stefan Pfennig, Elke Franz:
eSPOC: Enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency. GLOBECOM Workshops 2016: 1-6 - Stefan Pfennig, Kim Feldhoff, Florina M. Ciorba, Elke Franz, Tobias Reiher, Mario Bielert, Thomas Ilsche, Wolfgang E. Nagel:
Simulation models verification for resilient communication on a highly adaptive energy-efficient computer. SpringSim (HPS) 2016: 6 - 2015
- Elke Franz, Stefan Pfennig, Bho Matthiesen, Christian Scheunert, Eduard A. Jorswieck:
Energy Models for Communication of Future Computing Platforms. ICUWB 2015: 1-5 - Stefan Pfennig, Elke Franz, Johannes Richter, Christian Scheunert, Eduard A. Jorswieck:
Confidential Network Coding: Physical Layer vs. Network Layer. ICUWB 2015: 1-5 - 2014
- Florina M. Ciorba, Thomas Ilsche, Elke Franz, Stefan Pfennig, Christian Scheunert, Ulf Markwardt, Joseph Schuchart, Daniel Hackenberg, Robert Schöne, Andreas Knüpfer, Wolfgang E. Nagel, Eduard A. Jorswieck, Matthias S. Müller:
Analysis of Parallel Applications on a High Performance-Low Energy Computer. Euro-Par Workshops (2) 2014: 474-485 - Stefan Pfennig, Elke Franz, Florina M. Ciorba, Thomas Ilsche, Wolfgang E. Nagel:
Modeling communication delays for network coding and routing for error-prone transmission. FGCT 2014: 19-24 - Stefan Pfennig, Elke Franz:
Adjustable redundancy for secure network coding in a unicast scenario. NetCod 2014: 1-6 - 2013
- Stefan Pfennig, Elke Franz:
Comparison of different secure network coding paradigms concerning transmission efficiency. CAMAD 2013: 18-22 - Johannes Richter, Elke Franz, Sabrina Engelmann, Stefan Pfennig, Eduard A. Jorswieck:
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel? CAMAD 2013: 164-168 - Stefan Edlich, Sonam Singh, Ingo Pfennigstorf:
Future mobile access for open-data platforms and the BBC-DaaS system. Multimedia Content and Mobile Devices 2013: 866710 - Stefan Pfennig, Elke Franz:
Secure network coding: Dependency of efficiency on network topology. ICC 2013: 2100-2105 - E. Ulrich Kriegel, Stefan Pfennigschmidt, Hans Georg Ziegler:
Practical aspects of the use of a Knowledge Fusion Toolkit in safety applications. ISADS 2013: 1-4 - 2012
- Elke Franz, Stefan Pfennig, André Fischer:
Efficiency of Secure Network Coding Schemes. Communications and Multimedia Security 2012: 145-159 - E. Ulrich Kriegel, Ulrich Meissen, Stefan Pfennigschmidt, Agnès Voisard:
A Knowledge Fusion Toolkit for Decision Making. EST 2012: 90-93 - Stefan Pfennig, Matthias Kirchner:
Spectral methods to determine the exact scaling factor of resampled digital images. ISCCSP 2012: 1-6 - Thomas Gloe, Stefan Pfennig, Matthias Kirchner:
Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study. MM&Sec 2012: 109-114 - 2011
- John Liagouris, Spiros Athanasiou, Alexandros Efentakis, Stefan Pfennigschmidt, Dieter Pfoser, Eleni Tsigka, Agnès Voisard:
Mobile Task Computing: Beyond Location-Based Services and EBooks. W2GIS 2011: 124-141 - 2009
- Stefan Pfennigschmidt, Agnès Voisard:
Handling Temporal Granularity in Mobile Services. WiMob 2009: 295-300
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-06 07:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint