Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...

Sensors (Basel, Switzerland), 2012-05, Vol.12 (5), p.6695-6711
2012
Link zum Volltext



2021 30th IEEE International Conference on Robot & Human Interactive Communication (RO-MAN), 2021, p.482-487
2021


2019 International Conference on Robotics and Automation (ICRA), 2019, p.2953-2959
2019

2017 IEEE International Conference on Robotics and Automation (ICRA), 2017, p.3664-3671
2017
Link zum Volltext

2013 IEEE International Conference on Image Processing, 2013, p.1381-1385
2013

2022 IEEE/SICE International Symposium on System Integration (SII), 2022, p.602-607
2022

2024 IEEE/SICE International Symposium on System Integration (SII), 2024, p.1486-1491
2024

2015 Sixth International Conference on Emerging Security Technologies (EST), 2015, p.69-73
2015
Link zum Volltext

2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2008, p.3838-3844
2008

2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2019, p.1022-1028
2019

2018 World Automation Congress (WAC), 2018, p.1-5
2018

2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016, p.004435-004439
2016
Link zum Volltext

2014 Fifth International Conference on Emerging Security Technologies, 2014, p.34-39
2014
Link zum Volltext


2013 IEEE International Conference on Robotics and Biomimetics (ROBIO), 2013, p.538-545
2013
Link zum Volltext

2015 IEEE International Conference on Advanced Intelligent Mechatronics (AIM), 2015, p.1766-1771
2015

2010 International Conference on Emerging Security Technologies, 2010, p.30-35
2010

2014 Fifth International Conference on Emerging Security Technologies, 2014, p.113-117
2014
Link zum Volltext

18th International Conference on Pattern Recognition (ICPR'06), 2006, Vol.2, p.1233-1237
2006

Proceedings - IEEE International Conference on Robotics and Automation, 2000, Vol.2, p.1856-1861 vol.2
2000

2012 Third International Conference on Emerging Security Technologies, 2012, p.43-48
2012