default search action
Marko Esche
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Levin Chee Xian Ho, Marko Esche, Martin Nischwitz, Sabine Glesner:
Performance Analysis of Model-Based Functional Identification on Modified Measuring Instruments. I2MTC 2024: 1-6 - 2023
- [c22]Marko Esche, Levin Ho, Martin Nischwitz, Reinhard Meyer:
Risk-Based Continuous Quality Control for Software in Legal Metrology. FedCSIS 2023: 451-461 - [c21]Levin Chee Xian Ho, Marko Esche, Martin Nischwitz, Reinhard Meyer, Sabine Glesner:
A Proposal for Functional Software Identification Using Risk-Based Continuous Quality Control. KKIO@FedCSIS 2023: 3-34 - 2022
- [c20]Marko Esche, Martin Nischwitz, Federico Grasso Toro:
Investigation into the Applicability of Software Requirements from Legal Metrology to Sensor Networks. I2MTC 2022: 1-6 - [c19]Martin Nischwitz, Marko Esche, Florian Tschorsch:
Raising the AWAREness of BFT Protocols for Soaring Network Delays. LCN 2022: 387-390 - 2021
- [j3]Marko Esche, Reinhard Meyer, Martin Nischwitz:
Conformity assessment of measuring instruments with artificial intelligence. Datenschutz und Datensicherheit 45(3): 184-189 (2021) - [c18]Martin Nischwitz, Marko Esche, Florian Tschorsch:
Bernoulli Meets PBFT: Modeling BFT Protocols in the Presence of Dynamic Failures. FedCSIS 2021: 291-300 - 2020
- [c17]Marko Esche, Federico Grasso Toro:
Developing Defense Strategies from Attack Probability Trees in Software Risk Assessment. FedCSIS 2020: 527-536 - [i1]Martin Nischwitz, Marko Esche, Florian Tschorsch:
Bernoulli Meets PBFT: Modeling BFT Performance in the Presence of Dynamic Failures. CoRR abs/2007.13460 (2020)
2010 – 2019
- 2019
- [c16]Marko Esche, Felix Salwiczek, Federico Grasso Toro:
Formalization of Software Risk Assessment Results in Legal Metrology Based on ISO/IEC 18045 Vulnerability Analysis. FedCSIS 2019: 443-447 - 2018
- [c15]Federico Grasso Toro, Martin Koval, Marko Esche:
Proposal for simplified implementation of risk assessment method for measuring instruments. FedCSIS (Position Papers) 2018: 43-47 - [c14]Alexander Oppermann, Marko Esche, Florian Thiel, Jean-Pierre Seifert:
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology. FedCSIS 2018: 593-602 - 2017
- [c13]Marko Esche, Federico Grasso Toro, Florian Thiel:
Representation of Attacker Motivation in Software Risk Assessment Using Attack Probability Trees. FedCSIS 2017: 763-771 - [c12]Alexander Oppermann, Artem Yurchenko, Marko Esche, Jean-Pierre Seifert:
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology. ISDDC 2017: 35-54 - 2015
- [c11]Marko Esche, Florian Thiel:
Software risk assessment for measuring instruments in legal metrology. FedCSIS 2015: 1113-1123 - 2014
- [c10]Marko Esche, Michael Tok, Thomas Sikora:
Theoretical Considerations Concerning Pixelwise Temporal Filtering. DCC 2014: 73-82 - 2013
- [c9]Michael Tok, Marko Esche, Alexander Glantz, Andreas Krutz, Thomas Sikora:
A Parametric Merge Candidate for High Efficiency Video Coding. DCC 2013: 33-42 - [c8]Marko Esche, Michael Tok, Alexander Glantz, Andreas Krutz, Thomas Sikora:
Efficient Quadtree Compression for Temporal Trajectory Filtering. DCC 2013: 488 - [c7]Marko Esche, Michael Tok, Thomas Sikora:
Adpative dense vector field interpolation for temporal filtering. ICIP 2013: 1918-1922 - [c6]Michael Tok, Marko Esche, Thomas Sikora:
A dynamic model buffer for parametric motion vector prediction in random-access coding scenarios. ICIP 2013: 1923-1927 - 2012
- [j2]Marko Esche, Alexander Glantz, Andreas Krutz, Thomas Sikora:
Adaptive Temporal Trajectory Filtering for Video Compression. IEEE Trans. Circuits Syst. Video Technol. 22(5): 659-670 (2012) - [j1]Andreas Krutz, Alexander Glantz, Michael Tok, Marko Esche, Thomas Sikora:
Adaptive Global Motion Temporal Filtering for High Efficiency Video Coding. IEEE Trans. Circuits Syst. Video Technol. 22(12): 1802-1812 (2012) - [c5]Marko Esche, Alexander Glantz, Andreas Krutz, Michael Tok, Thomas Sikora:
Quadtree-based temporal trajectory filtering. ICIP 2012: 1553-1556 - [c4]Marko Esche, Alexander Glantz, Andreas Krutz, Michael Tok, Thomas Sikora:
Weighted temporal long trajectory filtering for video compression. PCS 2012: 409-412 - 2011
- [c3]Marko Esche, Andreas Krutz, Alexander Glantz, Thomas Sikora:
Temporal trajectory filtering for bi-directional predicted frames. ICIP 2011: 1633-1636 - 2010
- [c2]Marko Esche, Andreas Krutz, Alexander Glantz, Thomas Sikora:
A novel inloop filter for video-compression based on temporal pixel trajectories. PCS 2010: 514-517 - [c1]Marko Esche, Mustafa Karaman, Thomas Sikora:
Semi-automatic object tracking in video sequences by extension of the MRSST algorithm. WIAMIS 2010: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint