default search action
Michael Decker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Martina Perani, Stefano Baraldo, Michael Decker, Ambra Vandone, Anna Valente, Beatrice Paoli:
Track geometry prediction for Laser Metal Deposition based on on-line artificial vision and deep neural networks. Robotics Comput. Integr. Manuf. 79: 102445 (2023)
2010 – 2019
- 2018
- [c25]Davide Tanasi, Michael Decker, Kaitlyn Kingsland, Rebekah McLaughlin:
The virtualization project of John Ringling's Ca'D'Zan at the Ringling Museum of Art (Sarasota, Florida). DigitalHERITAGE/VSMM 2018: 1-8 - 2017
- [j13]Michael Decker, Martin Fischer, Ingrid Ott:
Service Robotics and Human Labor: A first technology assessment of substitution and cooperation. Robotics Auton. Syst. 87: 348-354 (2017) - [j12]Michael Decker:
The next generation of robots for the next generation of humans? Robotics Auton. Syst. 88: 154-156 (2017) - 2012
- [j11]Michael Decker, Torsten Fleischer:
Participation in 'big style': first observations at the German citizens' dialogue on future technologies. Poiesis Prax. 9(1-2): 81-99 (2012) - [j10]Michael Decker, Ulrike Henckel:
Service robots on their way? First steps of an interdisciplinary technology assessment. Poiesis Prax. 9(3-4): 177-180 (2012) - [j9]Michael Decker:
Service robots in the mirror of reflective research. Poiesis Prax. 9(3-4): 181-200 (2012) - 2011
- [b1]Michael Decker:
Modellierung ortsabhängiger Zugriffskontrolle für mobile Geschäftsprozesse. Karlsruhe Institute of Technology, 2011, ISBN 978-3-86644-732-5, pp. 1-374 - [j8]Michael Decker, Rüdiger Dillmann, Thomas Dreier, Martin Fischer, Mathias Gutmann, Ingrid Ott, Indra Spiecker genannt Döhmann:
Service robotics: do you know your new companion? Framing an interdisciplinary technology assessment. Poiesis Prax. 8(1): 25-44 (2011) - [c24]Michael Decker:
Modellierung von Ortseinschränkungen für mobile Geschäftsprozesse mit höheren Petri-Netzen. MMS 2011: 105-118 - 2010
- [j7]Michael Decker, Torsten Fleischer:
When should there be which kind of technology assessment? A plea for a strictly problem-oriented approach from the very outset. Poiesis Prax. 7(1-2): 117-133 (2010) - [c23]Michael Decker, Andreas Oberweis, Peter Stürzel:
Ortsabhängiger Dokumentenzugriff mit Discretionary Access Control. MMS 2010: 153-166
2000 – 2009
- 2009
- [j6]Michael Decker:
A Location-Aware Access Control Model for Mobile Workflow Systems. Int. J. Inf. Technol. Web Eng. 4(1): 50-66 (2009) - [c22]Michael Decker:
Mandatory and Location-Aware Access Control for Relational Databases. EuropeComm 2009: 217-228 - [c21]Michael Decker:
Prevention of Location-Spoofing - A Survey on Different Methods to Prevent the Manipulation of Locating-technologies. ICE-B 2009: 109-114 - [c20]Michael Decker:
Ein Überblick über Ansätze zur Vermeidung der Manipulation von Ortungsverfahren. MMS 2009: 53-66 - [c19]Michael Decker:
An UML profile for the modelling of mobile business processes and workflows. MobiMedia 2009 - [c18]Michael Decker, Peter Stürzel, Stefan Klink, Andreas Oberweis:
Location Constraints for Mobile Workflows. TAMoCo 2009: 93-102 - 2008
- [j5]Michael Decker:
Caregiving robots and ethical reflection: the perspective of interdisciplinary technology assessment. AI Soc. 22(3): 315-330 (2008) - [c17]Michael Decker:
An Access-Control Model for Mobile Computing with Spatial Constraints - Location-aware Role-based Access Control with a Method for Consistency Checks. ICE-B 2008: 185-190 - [c16]Gunther Schiefer, Michael Decker:
Taxonomy for Mobile Terminals - A Selective Classification Scheme. ICE-B 2008: 255-258 - [c15]Michael Decker:
Requirements for a location-based access control model. MoMM 2008: 346-349 - 2007
- [c14]Michael Decker, Rebecca Bulander:
A Platform for Mobile Service Provisioning Based on SOA-Integration. ICETE (Selected Papers) 2007: 72-84 - [c13]Michael Decker, Rebecca Bulander:
A Middleware Infrastructure for Mobile Services Based on an Enterprise Service BUS - Mobile Service Provisioning as SOA-Integration Problem. ICE-B 2007: 122-129 - 2006
- [c12]Michael Decker, Gunther Schiefer, Rebecca Bulander:
KMU-spezifische Herausforderungen bei der Entwicklung und dem Betrieb mobiler Dienste. GI Jahrestagung (1) 2006: 195-201 - [c11]Michael Decker, Rebecca Bulander:
Notification Services for Mobile and Wireless Terminals - A Class of Services Appropriate for Mobile Scenarios. ICE-B 2006: 151-156 - [c10]Michael Decker, Gunther Schiefer, Rebecca Bulander:
Specific Challenges for Small and Medium-Sized Enterprises (SME) in m-Business - a SME-Suitable Framework for Mobile Services. ICE-B 2006: 169-174 - [c9]Michael Decker, Gunther Schiefer, Rebecca Bulander:
A SME-friendly framework for the provision of mobile services. ICMB 2006: 9 - [c8]Lisa M. Spiro, Marie Wise, Geneva L. Henry, Chuck Bearden, Sidney Byrd, Eva Garza, Michael Decker:
Enabling exploration: travelers in the middle east archive. JCDL 2006: 163-164 - [c7]Michael Decker, Rebecca Bulander, Tamara Högler, Gunther Schiefer:
m-Advertising: Werbung mit mobilen Endgeräten - ein Überblick. MMS 2006: 103-114 - 2005
- [c6]Rebecca Bulander, Michael Decker, Gunther Schiefer, Bernhard Kölmel:
Advertising Via Mobile Terminals - Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy. ICETE (Selected Papers) 2005: 15-25 - [c5]Rebecca Bulander, Michael Decker, Gunther Schiefer:
Advertising via mobile terminals delivering context sensitive and personalized advertising while guaranteeing privacy. ICETE 2005: 49-56 - [c4]Rebecca Bulander, Gunther Schiefer, Michael Decker:
Anonymity by Design - Eine Architektur zur Gewährleistung von Kundenschutz im mobilen Marketing. MCTA 2005: 87-100 - [c3]Michael Decker, Rebecca Bulander, Gunther Schiefer, Bernhard Kölmel:
A System for Mobile and Wireless Advertising - Personalized information as incentive for receiving advertisement on mobile terminals. MOBIS 2005: 287-301 - 2004
- [j4]Wija Oortwijn, Rob Reuzel, Michael Decker:
Introduction. Poiesis Prax. 2(2-3): 97-101 (2004) - [j3]Michael Decker:
The role of ethics in interdisciplinary technology assessment. Poiesis Prax. 2(2-3): 139-156 (2004) - [j2]Rob Reuzel, Wija Oortwijn, Michael Decker, Christian Clausen, Pedro Gallo de Puelles, John Grin, Armin Grunwald, Leo Hennen, Gert Jan van der Wilt, Yutaka Yoshinaka:
Ethics and HTA: some lessons and challenges for the future. Poiesis Prax. 2(2-3): 247-256 (2004) - [c2]John J. Salerno, Zhongfei Zhang, Ronny Lewin, Michael Decker:
Discovering social groups without having relational data. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2004: 33-40 - 2003
- [j1]Michael Decker:
Armin Grunwald: Technik für die Gesellschaft von morgen. Möglichkeiten und Grenzen gesellschaftlicher Technikgestaltung. Poiesis Prax. 1(3): 231-238 (2003) - 2002
- [c1]Jürgen Branke, Michael Decker, Daniel Merkle, Hartmut Schmeck:
Coevolutionary Ant Algorithms Playing Games. Ant Algorithms 2002: 298-299
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint