Publications
The Research Portal (FIS) of TU Dresden provides a detailed search for publications in the School of Engineering Sciences.
19905 Entries
2013
-
Artificial general intelligence: 6th International Conference, AGI 2013, Beijing, China, July 31 -- August 3, 2013, Proceedings , 2013, Heidelberg: SpringerElectronic (full-text) versionResearch output: Book/Report/Anthology > Conference proceeding
-
Artificial zero-gravity in wet metal foam by means of electromagnetic fields , 2013Research output: Contribution to conferences > Paper
-
A Shape-Oriented Approach for Creating Novel Tangible Interfaces , 2013Research output: Contribution to conferences > Paper
-
A simulation-based monitoring of a composite plate made using an integrated vibration measurement system , 2013, In: Key Engineering Materials. 569-570, p. 64-71, 8 p.Electronic (full-text) versionResearch output: Contribution to journal > Conference article
-
Assessing Green Strategies in Peer-to-Peer Opportunistic Grids , 2013, In: Journal of grid computing. 11, p. 129-148Electronic (full-text) versionResearch output: Contribution to journal > Research article
-
Assessment of Binaural-Proprioceptive Interaction in Human-Machine Interfaces , 2013, The Technology of Binaural Listening. p. 449-475, 27 p.Research output: Contribution to book/conference proceedings/anthology/report > Chapter in book/Anthology/Report
-
Auditory-Tactile Music Perception , 2013Electronic (full-text) versionResearch output: Contribution to conferences > Paper
-
Auswirkungen der Modifizierung der Polymermatrix auf den Haftverbund bei hochbeanspruchten Aramidfaser-Elastomer-Verbundwerkstoffen , 2013, In: Kautschuk, Gummi, Kunststoffe : KGK. 5, p. 34-42, 9 p.Research output: Contribution to journal > Research article
-
Automated data analysis based on signal processing for two dimensional NDI data of the composite structures , 2013, In: Przetwórstwo Tworzyw. 19, 1, p. 4-8, 5 p.Research output: Contribution to journal > Conference article
-
Automatically Tolerating Arbitrary Faults in Non-malicious Settings , 2013, p. 114-123, 10 p.Electronic (full-text) versionResearch output: Contribution to conferences > Paper