Hans Georg Schaathun

According to our database1, Hans Georg Schaathun authored at least 59 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GluPredKit: Development and User Evaluation of a Standardization Software for Blood Glucose Prediction.
CoRR, 2024

Intraoperative identification of patient-specific elastic modulus of the meniscus during arthroscopy.
Comput. Methods Programs Biomed., 2024

Mobile Software Development Kit for Real Time Multivariate Blood Glucose Prediction.
IEEE Access, 2024

2023
Simulation Of Gravitational Lensing In The Roulette Formalism.
Proceedings of the 37th ECMS International Conference on Modelling and Simulation, 2023

2022
Toward a Digital Twin for Arthroscopic Knee Surgery: A Systematic Review.
IEEE Access, 2022

2019
Den tause kunnskapen i IT-studia.
Proceedings of the 32nd Norsk Informatikkonferanse, 2019

2018
Model-driven engineering in RDF - a way to version control.
Proceedings of the 31st Norsk Informatikkonferanse, 2018

Quiz for diskusjon og samarbeid i store klasser.
Proceedings of the 31st Norsk Informatikkonferanse, 2018

2017
Obfuscation in digital fingerprinting.
Int. J. Inf. Coding Theory, 2017

Data and knowledge manangement in field studies A case for semantic technologies.
Proceedings of the 30th Norsk Informatikkonferanse, 2017

2016
Intelligent Computer-Automated Crane Design Using An Online Crane Prototyping Tool.
Proceedings of the 30th European Conference on Modelling and Simulation, 2016

A Software Framework For Intelligent Computer-Automated Product Design.
Proceedings of the 30th European Conference on Modelling and Simulation, 2016

2015
Evaluation of splittable pseudo-random generators.
J. Funct. Program., 2015

Dypevaluering avå studentenes læring - - Er fokusgrupper svaret?
Proceedings of the 28th Norsk Informatikkonferanse, 2015

Matematikk er eit pratefag og andre røynsler frå eit omvendt klasserom.
Proceedings of the 28th Norsk Informatikkonferanse, 2015

Forord til NIK 2015.
Proceedings of the 28th Norsk Informatikkonferanse, 2015

A Simulation Study of Evaluation Heuristics for Tug Fleet Optimisation Algorithms.
Proceedings of the Operations Research and Enterprise Systems, 2015

Evaluation Heuristics for Tug Fleet Optimisation Algorithms - A Computational Simulation Study of a Receding Horizon Genetic Algorithm.
Proceedings of the ICORES 2015, 2015

Image fingerprinting system based on collusion secure code and watermarking method.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Model-driven Software Engineering in Practice: A Content Analysis Software for Health Reform Agreements.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

2014
Attacks on Kuribayashi's Fingerprinting Scheme.
IEEE Trans. Inf. Forensics Secur., 2014

Electronic Tracking of Users with Cognitive Impairment (Contrasting a Literature Review with Local Experience).
Proceedings of the 2nd European Workshop on Practical Aspects of Health Informatics, 2014

Parallell Slump.
Proceedings of the 27th Norsk Informatikkonferanse, 2014

An Improved Receding Horizon Genetic Algorithm For The Tug Fleet Optimisation Problem.
Proceedings of the 28th European Conference on Modelling and Simulation, 2014

2013
A universal control architecture for maritime cranes and robots using genetic algorithms as a possible mapping approach.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Hierarchical Task Analysis, Situation-Awareness And Support Software.
Proceedings of the 27th European Conference on Modelling and Simulation, 2013

2011
Tardos Fingerprinting Codes in the Combined Digit Model.
IEEE Trans. Inf. Forensics Secur., 2011

2010
An Improved Decoding Algorithm for the Davey-MacKay Construction.
Proceedings of IEEE International Conference on Communications, 2010

2009
On Higher Weights and Code Existence.
Proceedings of the Cryptography and Coding, 2009

Has F5 really been broken?
Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, 2009

2008
On the Assumption of Equal Contributions in Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2008

On error-correcting fingerprinting codes for use with watermarking.
Multim. Syst., 2008

Novel Attacks on Spread-Spectrum Fingerprinting.
EURASIP J. Inf. Secur., 2008

A key-recovery attack on authentication watermarking by li and yuan.
Proceedings of the 10th workshop on Multimedia & Security, 2008

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

2007
Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

2006
The Boneh-Shaw fingerprinting scheme is better than we thought.
IEEE Trans. Inf. Forensics Secur., 2006

Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

On Watermarking/Fingerprinting for Copyright Protection.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Nested Codes for Constrained Memory and for Dirty Paper.
Proceedings of the Applied Algebra, 2006

2005
The second support weight distribution of the Kasami codes.
IEEE Trans. Inf. Theory, 2005

Boneh-Shaw fingerprinting and soft decision decoding.
Proceedings of the IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, 2005

A Trellis-Based Bound on (2, 1)-Separating Codes.
Proceedings of the Cryptography and Coding, 2005

2004
Duality and support weight distributions.
IEEE Trans. Inf. Theory, 2004

On the (2, 1)-separating weight of the Kerdock code.
IEEE Trans. Inf. Theory, 2004

Upper Bounds on Separating Codes.
IEEE Trans. Inf. Theory, 2004

A Lower Bound on the Greedy Weights of Product Codes.
Des. Codes Cryptogr., 2004

Separating Codes: Constructions and Bounds.
Proceedings of the LATIN 2004: Theoretical Informatics, 2004

Fighting three pirates with scattering codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
A Lower Bound on the Weight Hierarchies of Product Codes.
Discret. Appl. Math., 2003

Erratum to "Intersecting codes and separating codes": [Discrete Applied Mathematics 128 (2003) 75-83].
Discret. Appl. Math., 2003

Intersecting Codes and Separating Codes.
Discret. Appl. Math., 2003

Separating and Intersecting Properties of BCH and Kasami Codes.
Proceedings of the Cryptography and Coding, 2003

Fighting Two Pirates.
Proceedings of the Applied Algebra, 2003

2002
More on (2,2)-separating systems.
IEEE Trans. Inf. Theory, 2002

2001
On Weight Hierarchies of Product Codes The Wei-Yang Conjecture and more.
Electron. Notes Discret. Math., 2001

Upper bounds on weight hierarchies of extremal non-chain codes.
Discret. Math., 2001

Duality and Greedy Weights of Linear Codes and Projective Multisets.
Proceedings of the Applied Algebra, 2001

2000
The weight hierarchy of product codes.
IEEE Trans. Inf. Theory, 2000


  Loading...