Search

Your search keyword '"Mühlhäuser, Max"' showing total 1,118 results

Search Constraints

Start Over You searched for: Author "Mühlhäuser, Max" Remove constraint Author: "Mühlhäuser, Max"
1,118 results on '"Mühlhäuser, Max"'

Search Results

1. LiOn-XA: Unsupervised Domain Adaptation via LiDAR-Only Cross-Modal Adversarial Training

2. A Tale of Two Scales: Reconciling Horizontal and Vertical Scaling for Inference Serving Systems

3. NetNN: Neural Intrusion Detection System in Programmable Networks

4. Sponge: Inference Serving with Dynamic SLOs Using In-Place Vertical Scaling

5. The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants

6. Mitigating Intersection Attacks in Anonymous Microblogging

7. Reconciling High Accuracy, Cost-Efficiency, and Low Latency of Inference Serving Systems

8. Understanding Stationary and Moving Direct Skin Vibrotactile Stimulation on the Palm

9. Unsupervised Driving Event Discovery Based on Vehicle CAN-data

10. Unsupervised 4D LiDAR Moving Object Segmentation in Stationary Settings with Multivariate Occupancy Time Series

11. Towards Democratic Computing

13. Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups

14. Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons

15. 2PPS -- Publish/Subscribe with Provable Privacy

16. Chameleons on Cloudlets: Elastic Edge Computing Through Microservice Variants

17. User-Level Label Leakage from Gradients in Federated Learning

18. Enhancing Privacy via Hierarchical Federated Learning

20. DeepAlign: Alignment-based Process Anomaly Correction using Recurrent Neural Networks

21. TRIDEnT: Building Decentralized Incentives for Collaborative Security

22. On generating network traffic datasets with synthetic attacks for intrusion detection

23. BINet: Multi-perspective Business Process Anomaly Classification

24. On the Effectiveness of Intersection Attacks in Anonymous Microblogging

25. Inferring a Multi-perspective Likelihood Graph from Black-Box Next Event Predictors

26. The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media

27. A Systematic Approach to Constructing Families of Incremental Topology Control Algorithms Using Graph Transformation

28. A Systematic Approach to Constructing Incremental Topology Control Algorithms Using Graph Transformation

29. Analyzing Business Process Anomalies Using Autoencoders

30. PABO: Mitigating Congestion via Packet Bounce in Data Center Networks

31. M-STAR: A Modular, Evidence-based Software Trustworthiness Framework

32. I Trust my Zombies: A Trust-enabled Botnet

34. Beyond the Hype: On Using Blockchains in Trust Management for Authentication

36. Learning of Process Representations Using Recurrent Neural Networks

44. Accessible Multimodal Tool Support for Brainstorming Meetings

45. Pointing Gesture Based User Interaction of Tool Supported Brainstorming Meetings

46. Accessibility of Non-verbal Communication: Making Spatial Information Accessible to People with Disabilities : Introduction to the Special Thematic Session

47. On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources

48. DeepAlign: Alignment-Based Process Anomaly Correction Using Recurrent Neural Networks

49. How to Assess the Usability Metrics of E-Voting Schemes

Catalog

Books, media, physical & digital resources