Computer generated copper plates W Leister Computer Graphics Forum 13 (1), 69-77, 1994 | 72 | 1994 |
Security analysis of a patient monitoring system for the Internet of Things in eHealth K Habib, A Torjusen, W Leister The Seventh International Conference on eHealth, Telemedicine, and Social …, 2015 | 53 | 2015 |
Ideas for a Trust Indicator in the Internet of Things W Leister, T Schulz The First International Conference on Smart Systems, Devices and Technologies, 2012 | 52 | 2012 |
Ray tracing algorithms—theory and practice A Schmitt, H Müller, W Leister Theoretical Foundations of Computer Graphics and CAD, 997-1030, 1988 | 48 | 1988 |
Context-aware authentication for the internet of things K Habib, W Leister Elev. Int. Conf. Auton. Auton. Syst. fined, 134-139, 2015 | 47 | 2015 |
Design and verification of systems with exogenous coordination using Vereofy C Baier, T Blechmann, J Klein, S Klüppelholz, W Leister Leveraging Applications of Formal Methods, Verification, and Validation: 4th …, 2010 | 42 | 2010 |
A novel authentication framework based on biometric and radio fingerprinting for the IoT in eHealth K Habib, A Torjusen, W Leister Proceedings of international conference on smart systems, devices and …, 2014 | 36 | 2014 |
An evaluation framework for adaptive security for the IoT in eHealth W Leister, M Hamdi, H Abie, S Poslad International Journal on Advances, 2014 | 31 | 2014 |
Fotorealistische Computeranimation W Leister, H Müller, A Stößer Springer-Verlag, 1991 | 31* | 1991 |
Threats identification for the smart internet of things in ehealth and adaptive security countermeasures K Habib, W Leister 2015 7th International Conference on New Technologies, Mobility and Security …, 2015 | 27 | 2015 |
Using the engagement profile to design an engaging robotic teaching assistant for students M Cooney, W Leister Robotics 8 (1), 21, 2019 | 26 | 2019 |
Communication of medical images, text, and messages in inter-enterprise systems: a case study in Norway I Balasingham, H Ihlen, W Leister, P Roe, E Samset IEEE Transactions on Information Technology in Biomedicine 11 (1), 7-13, 2007 | 26 | 2007 |
Threat assessment of wireless patient monitoring systems W Leister, H Abie, AK Groven, T Fretland, I Balasingham 2008 3rd International Conference on Information and Communication …, 2008 | 22 | 2008 |
Assessing Visitor Engagement in Science Centres and Museums W Leister, I Tjøstheim, T Schulz, G Joryd, A Larssen, M de Brisis International Journal on Advances in Life Sciences 8 (1&2), 50-64, 2016 | 20 | 2016 |
Credo methodology: modeling and analyzing a peer-to-peer system in credo I Grabe, MM Jaghoori, B Aichernig, C Baier, T Blechmann, F de Boer, ... Electronic Notes in Theoretical Computer Science 266, 33-48, 2010 | 17* | 2010 |
A survey of SIP Peering L Strand, W Leister NATO ASI-Architects of secure Networks (ASIGE10), 2010 | 16 | 2010 |
An architecture for adaptive multimedia streaming to mobile nodes W Leister, T Sutinen, S Boudko, I Marsh, C Griwodz, P Halvorsen Proceedings of the 6th International Conference on Advances in Mobile …, 2008 | 16 | 2008 |
Guest EditorialSpecial Issue on Situation, Activity, and Goal Awareness in Cyber-Physical Human–Machine Systems L CHEN, DJ COOK, BIN GUO, L CHEN, W LEISTER IEEE Transactions on Human-Machine Systems 47 (3), 305-309, 2017 | 15 | 2017 |
“Occursus Cum Novo”–Computer Animation by Ray Tracing W Leister, T Maus, H Müller, B Neidecker, A Stösser New Trends in Computer Graphics: Proceedings of CG International’88, 83, 1988 | 15 | 1988 |
Towards Knowledge Driven Decision Support for Personalized Home-based Self-management of Chronic Disease J Qi, L Chen, W Leister, S Yang Proceedings of The 2015 Smart World Congress, 1724-1729, 2015 | 13 | 2015 |