Computer generated copper plates W Leister Computer Graphics Forum 13 (1), 69-77, 1994 | 71 | 1994 |
Security Analysis of A Patient Monitoring System for the Internet of Things in e-Health K Habib, A Torjusen, W Leister proceedings of eTelemed, 73-78, 2015 | 57 | 2015 |
Ideas for a Trust Indicator in the Internet of Things W Leister, T Schulz The First International Conference on Smart Systems, Devices and Technologies, 2012 | 54 | 2012 |
Context-aware authentication for the internet of things K Habib, W Leister Elev. Int. Conf. Auton. Auton. Syst. fined, 134-139, 2015 | 52 | 2015 |
Ray tracing algorithms—theory and practice A Schmitt, H Müller, W Leister Theoretical Foundations of Computer Graphics and CAD, 997-1030, 1988 | 52 | 1988 |
Design and verification of systems with exogenous coordination using Vereofy C Baier, T Blechmann, J Klein, S Klüppelholz, W Leister Leveraging Applications of Formal Methods, Verification, and Validation: 4th …, 2010 | 44 | 2010 |
A novel authentication framework based on biometric and radio fingerprinting for the IoT in eHealth K Habib, A Torjusen, W Leister Proceedings of international conference on smart systems, devices and …, 2014 | 41 | 2014 |
Using the engagement profile to design an engaging robotic teaching assistant for students M Cooney, W Leister Robotics 8 (1), 21, 2019 | 36 | 2019 |
Fotorealistische Computeranimation W Leister, H Müller, A Stößer Springer-Verlag, 1991 | 31* | 1991 |
An evaluation framework for adaptive security for the IoT in eHealth W Leister, M Hamdi, H Abie, S Poslad International Journal on Advances, 2014 | 30 | 2014 |
Communication of medical images, text, and messages in inter-enterprise systems: a case study in Norway I Balasingham, H Ihlen, W Leister, P Roe, E Samset IEEE Transactions on Information Technology in Biomedicine 11 (1), 7-13, 2007 | 28 | 2007 |
Threats identification for the smart internet of things in ehealth and adaptive security countermeasures K Habib, W Leister 2015 7th International Conference on New Technologies, Mobility and Security …, 2015 | 27 | 2015 |
Assessing Visitor Engagement in Science Centres and Museums W Leister, I Tjøstheim, T Schulz, G Joryd, A Larssen, M de Brisis International Journal on Advances in Life Sciences 8 (1&2), 50-64, 2016 | 24 | 2016 |
Threat assessment of wireless patient monitoring systems W Leister, H Abie, AK Groven, T Fretland, I Balasingham 2008 3rd International Conference on Information and Communication …, 2008 | 23 | 2008 |
An evaluation-driven design process for exhibitions W Leister, I Tjøstheim, G Joryd, M De Brisis, S Lauritzsen, S Reisæter Multimodal technologies and interaction 1 (4), 25, 2017 | 20 | 2017 |
Towards Knowledge Driven Decision Support for Personalized Home-based Self-management of Chronic Disease J Qi, L Chen, W Leister, S Yang Proceedings of The 2015 Smart World Congress, 1724-1729, 2015 | 17 | 2015 |
An architecture for adaptive multimedia streaming to mobile nodes W Leister, T Sutinen, S Boudko, I Marsh, C Griwodz, P Halvorsen Proceedings of the 6th International Conference on Advances in Mobile …, 2008 | 17 | 2008 |
Guest EditorialSpecial Issue on Situation, Activity, and Goal Awareness in Cyber-Physical Human–Machine Systems L CHEN, DJ COOK, BIN GUO, L CHEN, W LEISTER IEEE Transactions on Human-Machine Systems 47 (3), 305-309, 2017 | 16 | 2017 |
A survey of SIP Peering L Strand, W Leister NATO ASI-Architects of secure Networks (ASIGE10), 2010 | 16 | 2010 |
Credo methodology: Modeling and analyzing a peer-to-peer system in credo I Grabe, MM Jaghoori, B Aichernig, C Baier, T Blechmann, F de Boer, ... Electronic Notes in Theoretical Computer Science 266, 33-48, 2010 | 14* | 2010 |