Abstract: Stroke is the second most common cause of death and major cause of disability worldwide. Approx. 20% of cerebral strokes are caused by hemorrhages due to rupture of cereb...
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Abstract: Towed low frequency active sonar systems (LFAS) are used in Anti-Submarine Warfare (ASW) to detect submarines. LFAS systems are hampered by reverberation in shallow water...
: Product customization has become a commonplace topic in the last few years. Cars can be equipped with numerous gadgets, cell phones come in different colours and so on. In all th...
Christoph Wiesen, Thorsten Wunderlich, Robert Mert...