default search action
Hans Georg Schaathun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Miriam Kopperstad Wolff
, Hans Georg Schaathun, Anders Lyngvi Fougner
, Martin Steinert
, Rune Volden
:
Mobile Software Development Kit for Real Time Multivariate Blood Glucose Prediction. IEEE Access 12: 5910-5919 (2024) - [j23]Bismi Rasheed
, Øystein Bjelland
, Andreas Fagerhaug Dalen
, Ute Schaarschmidt, Hans Georg Schaathun, Morten Dinhoff Pedersen
, Martin Steinert, Robin T. Bye
:
Intraoperative identification of patient-specific elastic modulus of the meniscus during arthroscopy. Comput. Methods Programs Biomed. 254: 108269 (2024) - [i2]Miriam Kopperstad Wolff, Sam Royston, Anders Lyngvi Fougner, Hans Georg Schaathun, Martin Steinert, Rune Volden:
GluPredKit: Development and User Evaluation of a Standardization Software for Blood Glucose Prediction. CoRR abs/2406.08915 (2024) - 2023
- [c35]Hans Georg Schaathun, Ben David Normann, Einar Leite Austnes, Simon Ingebrigtsen, Sondre Westbo Remoy, Simon Nedreberg Runde:
Simulation Of Gravitational Lensing In The Roulette Formalism. ECMS 2023: 141-147 - 2022
- [j22]Øystein Bjelland
, Bismi Rasheed
, Hans Georg Schaathun, Morten Dinhoff Pedersen, Martin Steinert
, Alf Inge Hellevik, Robin T. Bye:
Toward a Digital Twin for Arthroscopic Knee Surgery: A Systematic Review. IEEE Access 10: 45029-45052 (2022)
2010 – 2019
- 2019
- [c34]Hans Georg Schaathun:
Den tause kunnskapen i IT-studia. NIK 2019 - 2018
- [c33]Hans Georg Schaathun, Sebastian Gundersen:
Quiz for diskusjon og samarbeid i store klasser. NIK 2018 - [c32]Hans Georg Schaathun, Adrian Rutle:
Model-driven engineering in RDF - a way to version control. NIK 2018 - 2017
- [j21]Hans Georg Schaathun, Minoru Kuribayashi:
Obfuscation in digital fingerprinting. Int. J. Inf. Coding Theory 4(2/3): 185-200 (2017) - [c31]Hans Georg Schaathun, Que Tran, Mikael Tollefsen, Etienne Gernez:
Data and knowledge manangement in field studies A case for semantic technologies. NIK 2017 - 2016
- [c30]Robin T. Bye, Ottar L. Osen, Birger Skogeng Pedersen, Ibrahim A. Hameed, Hans Georg Schaathun:
A Software Framework For Intelligent Computer-Automated Product Design. ECMS 2016: 534-543 - [c29]Ibrahim A. Hameed, Robin T. Bye, Ottar L. Osen, Birger Skogeng Pedersen, Hans Georg Schaathun:
Intelligent Computer-Automated Crane Design Using An Online Crane Prototyping Tool. ECMS 2016: 564-573 - 2015
- [j20]Hans Georg Schaathun:
Evaluation of splittable pseudo-random generators. J. Funct. Program. 25 (2015) - [c28]Adrian Rutle, Kent Inge Fagerland Simonsen, Hans Georg Schaathun, Ralf Kirchhoff
:
Model-driven Software Engineering in Practice: A Content Analysis Software for Health Reform Agreements. EUSPN/ICTH 2015: 545-552 - [c27]Minoru Kuribayashi
, Hans Georg Schaathun:
Image fingerprinting system based on collusion secure code and watermarking method. ICIP 2015: 2120-2124 - [c26]Robin T. Bye
, Hans Georg Schaathun:
A Simulation Study of Evaluation Heuristics for Tug Fleet Optimisation Algorithms. ICORES (Selected Papers) 2015: 165-190 - [c25]Robin T. Bye, Hans Georg Schaathun:
Evaluation Heuristics for Tug Fleet Optimisation Algorithms - A Computational Simulation Study of a Receding Horizon Genetic Algorithm. ICORES 2015: 270-282 - [c24]Hans Georg Schaathun:
Forord til NIK 2015. NIK 2015 - [c23]Hans Georg Schaathun:
Matematikk er eit pratefag og andre røynsler frå eit omvendt klasserom. NIK 2015 - [c22]Welie Annett Schaathun, Hans Georg Schaathun:
Dypevaluering avå studentenes læring - - Er fokusgrupper svaret? NIK 2015 - 2014
- [j19]Hans Georg Schaathun:
Attacks on Kuribayashi's Fingerprinting Scheme. IEEE Trans. Inf. Forensics Secur. 9(4): 607-609 (2014) - [c21]Robin T. Bye, Hans Georg Schaathun:
An Improved Receding Horizon Genetic Algorithm For The Tug Fleet Optimisation Problem. ECMS 2014: 682-690 - [c20]Hans Georg Schaathun:
Parallell Slump. NIK 2014 - [c19]Hans Georg Schaathun, Sven Inge Molnes, Helen Berg, Rigmor Einang Alnes:
Electronic Tracking of Users with Cognitive Impairment (Contrasting a Literature Review with Local Experience). PAHI 2014: 73-90 - 2013
- [c18]Hans Georg Schaathun, Magne Aarset, Runar Ostnes, Robert Rylander:
Hierarchical Task Analysis, Situation-Awareness And Support Software. ECMS 2013: 184-190 - [c17]Filippo Sanfilippo, Lars I. Hatledal, Hans Georg Schaathun, Kristin Ytterstad Pettersen
, Houxiang Zhang:
A universal control architecture for maritime cranes and robots using genetic algorithms as a possible mapping approach. ROBIO 2013: 322-327 - 2011
- [j18]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik
:
Tardos Fingerprinting Codes in the Combined Digit Model. IEEE Trans. Inf. Forensics Secur. 6(3-2): 906-919 (2011) - 2010
- [c16]Johann A. Briffa
, Hans Georg Schaathun, Stephan Wesemeyer
:
An Improved Decoding Algorithm for the Davey-MacKay Construction. ICC 2010: 1-5
2000 – 2009
- 2009
- [c15]Johann A. Briffa
, Hans Georg Schaathun, Ainuddin Wahid Abdul Wahab
:
Has F5 really been broken? ICDP 2009: 1-5 - [c14]Hans Georg Schaathun:
On Higher Weights and Code Existence. IMACC 2009: 56-64 - [c13]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik
:
Tardos fingerprinting codes in the combined digit model. WIFS 2009: 41-45 - [i1]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2009: 244 (2009) - 2008
- [j17]Hans Georg Schaathun:
Novel Attacks on Spread-Spectrum Fingerprinting. EURASIP J. Inf. Secur. 2008 (2008) - [j16]Hans Georg Schaathun:
On error-correcting fingerprinting codes for use with watermarking. Multim. Syst. 13(5-6): 331-344 (2008) - [j15]Hans Georg Schaathun:
On the Assumption of Equal Contributions in Fingerprinting. IEEE Trans. Inf. Forensics Secur. 3(3): 569-572 (2008) - [c12]Ainuddin Wahid Abdul Wahab
, Johann A. Briffa
, Hans Georg Schaathun:
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography. IWDW 2008: 342-349 - [c11]Hans Georg Schaathun:
A key-recovery attack on authentication watermarking by li and yuan. MM&Sec 2008: 221-226 - 2007
- [c10]Hans Georg Schaathun:
Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme. IWDW 2007: 45-59 - 2006
- [j14]Hans Georg Schaathun, Marcel Fernandez:
Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(10): 2603-2608 (2006) - [j13]Hans Georg Schaathun:
The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Trans. Inf. Forensics Secur. 1(2): 248-255 (2006) - [c9]Hans Georg Schaathun, Gérard D. Cohen:
Nested Codes for Constrained Memory and for Dirty Paper. AAECC 2006: 307-316 - [c8]Hans Georg Schaathun:
On Watermarking/Fingerprinting for Copyright Protection. ICICIC (3) 2006: 50-53 - 2005
- [j12]Hans Georg Schaathun, Tor Helleseth:
The second support weight distribution of the Kasami codes. IEEE Trans. Inf. Theory 51(8): 2892-2894 (2005) - [c7]Hans Georg Schaathun, Gérard D. Cohen:
A Trellis-Based Bound on (2, 1)-Separating Codes. IMACC 2005: 59-67 - [c6]Hans Georg Schaathun, Marcel Fernandez-Muñoz:
Boneh-Shaw fingerprinting and soft decision decoding. ITW 2005: 183-186 - 2004
- [j11]Hans Georg Schaathun:
A Lower Bound on the Greedy Weights of Product Codes. Des. Codes Cryptogr. 31(1): 27-42 (2004) - [j10]Hans Georg Schaathun:
Duality and support weight distributions. IEEE Trans. Inf. Theory 50(5): 862-867 (2004) - [j9]Gérard D. Cohen, Hans Georg Schaathun:
Upper Bounds on Separating Codes. IEEE Trans. Inf. Theory 50(6): 1291-1295 (2004) - [j8]Tor Helleseth, Hans Georg Schaathun:
On the (2, 1)-separating weight of the Kerdock code. IEEE Trans. Inf. Theory 50(12): 3312-3315 (2004) - [c5]Hans Georg Schaathun:
Fighting three pirates with scattering codes. ISIT 2004: 202 - [c4]Gérard D. Cohen, Hans Georg Schaathun:
Separating Codes: Constructions and Bounds. LATIN 2004: 322-328 - 2003
- [j7]Gérard D. Cohen, Sylvia B. Encheva, Simon Litsyn, Hans Georg Schaathun:
Intersecting Codes and Separating Codes. Discret. Appl. Math. 128(1): 75-83 (2003) - [j6]Hans Georg Schaathun, Wolfgang Willems:
A Lower Bound on the Weight Hierarchies of Product Codes. Discret. Appl. Math. 128(1): 251-261 (2003) - [j5]Gérard D. Cohen, Sylvia B. Encheva, Simon Litsyn, Hans Georg Schaathun:
Erratum to "Intersecting codes and separating codes": [Discrete Applied Mathematics 128 (2003) 75-83]. Discret. Appl. Math. 131(3): 689-690 (2003) - [c3]Hans Georg Schaathun:
Fighting Two Pirates. AAECC 2003: 71-78 - [c2]Hans Georg Schaathun, Tor Helleseth:
Separating and Intersecting Properties of BCH and Kasami Codes. IMACC 2003: 52-65 - 2002
- [j4]Gérard D. Cohen, Sylvia B. Encheva, Hans Georg Schaathun:
More on (2,2)-separating systems. IEEE Trans. Inf. Theory 48(9): 2606-2609 (2002) - 2001
- [j3]Hans Georg Schaathun:
Upper bounds on weight hierarchies of extremal non-chain codes. Discret. Math. 241(1-3): 449-469 (2001) - [j2]Conchita Martínez-Pérez, Hans Georg Schaathun, Wolfgang Willems:
On Weight Hierarchies of Product Codes The Wei-Yang Conjecture and more. Electron. Notes Discret. Math. 6: 65-71 (2001) - [c1]Hans Georg Schaathun:
Duality and Greedy Weights of Linear Codes and Projective Multisets. AAECC 2001: 92-101 - 2000
- [j1]Hans Georg Schaathun:
The weight hierarchy of product codes. IEEE Trans. Inf. Theory 46(7): 2648-2651 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint