2007 |
11 | | Sergei O. Kuznetsov,
Stefan Schmidt:
Formal Concept Analysis, 5th International Conference, ICFCA 2007, Clermont-Ferrand, France, February 12-16, 2007, Proceedings
Springer 2007 |
10 | | Stefan Schmidt,
Tharam S. Dillon,
Robert Steele,
Elizabeth Chang:
Trust and Reputation Ontologies for Electronic Business.
ICEIS (3) 2007: 308-315 |
9 | EE | Stefan Schmidt,
Jörg H. Kappes,
Martin Bergtholdt,
Vladimir Pekar,
Sebastian P. M. Dries,
Daniel Bystrov,
Christoph Schnörr:
Spine Detection and Labeling Using a Parts-Based Graphical Model.
IPMI 2007: 122-133 |
8 | EE | Vladimir Pekar,
Daniel Bystrov,
Harald S. Heese,
Sebastian P. M. Dries,
Stefan Schmidt,
Rüdiger Grewer,
Chiel J. den Harder,
René C. Bergmans,
Arjan W. Simonetti,
Arianne van Muiswinkel:
Automated Planning of Scan Geometries in Spine MRI Scans.
MICCAI (1) 2007: 601-608 |
7 | EE | Stefan Schmidt,
Robert Steele,
Tharam S. Dillon:
Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets.
TrustBus 2007: 237-247 |
6 | EE | Stefan Schmidt,
Robert Steele,
Tharam S. Dillon,
Elizabeth Chang:
Fuzzy trust evaluation and credibility development in multi-agent systems.
Appl. Soft Comput. 7(2): 492-505 (2007) |
2005 |
5 | EE | Stefan Schmidt,
Robert Steele,
Tharam S. Dillon,
Elizabeth Chang:
Applying a Fuzzy Trust Model to E-Commerce Systems.
Australian Conference on Artificial Intelligence 2005: 318-329 |
4 | | Jan Peters,
Bastian Emig,
Marten Jung,
Stefan Schmidt:
Prediction of Delays in Public Transportation using Neural Networks.
CIMCA/IAWTIC 2005: 92-97 |
3 | EE | Stefan Schmidt,
Robert Steele,
Tharam S. Dillon,
Elizabeth Chang:
Building a Fuzzy Trust Network in Unsupervised Multi-agent Environments.
OTM Workshops 2005: 816-825 |
2004 |
2 | EE | Stefan Schmidt,
Holger Krahn,
Stefan Fischer,
Dietmar Wätjen:
A Security Architecture for Mobile Wireless Sensor Networks.
ESAS 2004: 166-177 |
1984 |
1 | | Stefan Schmidt:
Der Einsatz von Methoden und Werkzeugen zur Software-Produktion - empirische Untersuchung bei Softwareherstellern.
Fachtagung Prozessrechner 1984: 266-276 |