Stefan Berger

According to our database1, Stefan Berger authored at least 44 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Modellierung und Darstellung der Anpassungsfähigkeit an die Folgen des Klimawandels in der historischen Tourismusregion Salzkammergut, ÖsterreichSpatial Modelling of Climate Change Adaptability - A Case Study in the Tourism Region Salzkammergut, Austria.
AGIT Journal Angew. Geoinformatik, 2018

2016
Security intelligence for cloud management infrastructures.
IBM J. Res. Dev., 2016

Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016

2015
Handling measurement function changes with Slowly Changing Measures.
Inf. Syst., 2015

Scalable Attestation: A Step toward Secure and Trusted Clouds.
IEEE Cloud Comput., 2015

Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

2013
Slowly changing measures.
Proceedings of the sixteenth international workshop on Data warehousing and OLAP, 2013

2012
FedDW global schema architect: UML-based design tool for the integration of data mart schemas.
Proceedings of the DOLAP 2012, 2012

BISSAM: Automatic Vulnerability Identification of Office Documents.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2010
Comparison of Channel Estimation Protocols for Coherent AF Relaying Networks in the Presence of Additive Noise and LO Phase Noise.
EURASIP J. Wirel. Commun. Netw., 2010

Impact of Local-Oscillator Imperfections on Nonregenerative TDD and FDD Relaying.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

Metamodel-Based Information Integration at Industrial Scale.
Proceedings of the Model Driven Engineering Languages and Systems, 2010

RC2 - A Living Lab for Cloud Computing.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

Federated Data Warehouses.
Proceedings of the Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development, 2010

2009
Security for the cloud infrastructure: Trusted virtual data center implementation.
IBM J. Res. Dev., 2009

Recent advances in amplify-and-forward two-hop relaying.
IEEE Commun. Mag., 2009

FedDW: A Tool for Querying Federations of Data Warehouses - Architecture, Use Case and Implementation.
Proceedings of the ICEIS 2009, 2009

2008
TVDc: managing security in the trusted virtual datacenter.
ACM SIGOPS Oper. Syst. Rev., 2008

A coherent amplify-and-forward relaying demonstrator without global phase reference.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Trustworthy and personalized computing on public kiosks.
Proceedings of the 6th International Conference on Mobile Systems, 2008

From Federated Databases to a Federated Data Warehouse System.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Mobile Portals for Knowledge Management.
Proceedings of the Encyclopedia of Portal Technologies and Applications (2 Volumes), 2007

A Mobile Portal for Academe.
Proceedings of the Encyclopedia of Portal Technologies and Applications (2 Volumes), 2007

Towards Trustworthy Kiosk Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Optimizing Zero-Forcing Based Gain Allocation for Wireless Multiuser Networks.
Proceedings of IEEE International Conference on Communications, 2007

Impact of Noisy Carrier Phase Synchronization on Linear Amplify-and-Forward Relaying.
Proceedings of the Global Communications Conference, 2007

2006
Power line enhanced cooperative wireless communications.
IEEE J. Sel. Areas Commun., 2006

vTPM: Virtualizing the Trusted Platform Module.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Analysing Multi-dimensional Data Across Autonomous Data Warehouses.
Proceedings of the Data Warehousing and Knowledge Discovery, 8th International Conference, 2006

Shamon: A System for Distributed Mandatory Access Control.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Using Symbiotic Displays to View Sensitive Information in Public.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Unleashing the Power of Wearable Devices in a SIP Infrastructure.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

U-KNOW - An Example of a Mobile Portal for Knowledge Management.
Proceedings of the Mobile Business - Processes, Platforms, Payment, 2005

Towards a Functional Architecture for Mobile Knowledge Management - The Example of a University Portal.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Towards Pluggable Discovery Frameworks for Mobile and Pervasive Applications.
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004

2003
Ubiquitous computing in home networks.
IEEE Commun. Mag., 2003

Web Services on Mobile Devices - Implementation and Experience.
Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2003), 2003

Mobile Collaboration Tool for University Education.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Ubiquitous computing using SIP.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2003

Einsatz eines Sicherheitsmusters zur Absicherung einer mobilen Wissensmanagementlösung.
Proceedings of the Security, 2003

2002
Location-Based Services in the Tourist Industry.
J. Inf. Technol. Tour., 2002

Mobile B2B-Anwendungen.
Proceedings of the Mobile and Collaborative Business 2002, 2002

U-Know - Ubiquitäres Wissensmanagement an der Universität Regensburg.
Proceedings of the Information und Mobilität, 2002


  Loading...