2008 |
6 | EE | Jens Bruhn,
Christian Niklaus,
Thomas Vogel,
Guido Wirtz:
Comprehensive support for management of enterprise applications.
AICCSA 2008: 755-762 |
5 | | Thomas Vogel,
Jens Bruhn,
Guido Wirtz:
Autonomous Reconfiguration Procedures for EJB-based Enterprise Applications.
SEKE 2008: 48-53 |
2006 |
4 | EE | Christian Krätzer,
Jana Dittmann,
Thomas Vogel,
Reyk Hillert:
Design and evaluation of steganography for voice-over-IP.
ISCAS 2006 |
3 | | Thomas Vogel,
Jana Dittmann,
Reyk Hillert,
Christian Krätzer:
Design und Evaluierung von Steganographie für Voice-over-IP.
Sicherheit 2006: 131-142 |
2005 |
2 | | Thomas Vogel,
Jana Dittmann:
Illustration watermarking: an object-based approach for digital images.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 578-589 |
2004 |
1 | EE | Stefan Thiemert,
Thomas Vogel,
Jana Dittmann,
Martin Steinebach:
A High-Capacity Block Based Video Watermark.
EUROMICRO 2004: 457-460 |