default search action
Michael Arnold
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Andrea Matteazzi, Pascal Colling, Michael Arnold, Dietmar Tutsch:
A Preprocessing and Postprocessing Voxel-based Method for LiDAR Semantic Segmentation Improvement in Long Distance. CoRR abs/2405.10046 (2024) - 2023
- [c22]Tobias Riedlinger, Marius Schubert, Sarina Penquitt, Jan-Marcel Kezmann, Pascal Colling, Karsten Kahl, Lutz Roese-Koerner, Michael Arnold, Urs Zimmermann, Matthias Rottmann:
LMD: Light-Weight Prediction Quality Estimation for Object Detection in Lidar Point Clouds. DAGM 2023: 85-99 - [i3]Tobias Riedlinger, Marius Schubert, Sarina Penquitt, Jan-Marcel Kezmann, Pascal Colling, Karsten Kahl, Lutz Roese-Koerner, Michael Arnold, Urs Zimmermann, Matthias Rottmann:
LMD: Light-weight Prediction Quality Estimation for Object Detection in Lidar Point Clouds. CoRR abs/2306.07835 (2023) - 2020
- [j3]Michael Arnold, Lan Zhang:
Competition with an information clearinghouse and asymmetric firms: Why more than two firms compete (or not) for shoppers. Games Econ. Behav. 122: 55-82 (2020) - [c21]Jordan Haggit, Rod Ford, Ryan E. Meyer, Dan Roseman, Marc Gacy, Terence Andre, Anna Grome, Peter Simon, Michael Arnold, Elijah Lofgren:
Development of a Game-Based Learning Platform for U.S. Navy Netted Force Concepts. AHFE (11) 2020: 245-251
2010 – 2019
- 2019
- [i2]Christer Holmberg, Michael Arnold:
Push Notification with the Session Initiation Protocol (SIP). RFC 8599: 1-40 (2019) - 2017
- [i1]Michael Arnold:
Predictive networking and optimization for flow-based networks. CoRR abs/1707.06729 (2017) - 2014
- [j2]Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Ulrich Gries, Gwenaël J. Doërr:
A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation. IEEE Trans. Inf. Forensics Secur. 9(3): 411-425 (2014) - 2012
- [c20]Michael Arnold, Peter G. Baum, Manuel Alonso, Ulrich Gries, Gwenaël J. Doërr:
Simulating large scale acoustic path benchmarking. Media Watermarking, Security, and Forensics 2012: 83030T - [c19]Xiao-Ming Chen, Michael Arnold, Peter G. Baum, Gwenaël J. Doërr:
AC-3 bit stream watermarking. WIFS 2012: 181-186 - 2011
- [j1]Michael Arnold, Enno Ohlebusch:
Linear Time Algorithms for Generalizations of the Longest Common Substring Problem. Algorithmica 60(4): 806-818 (2011) - [c18]Xiao-Ming Chen, Gwenaël J. Doërr, Michael Arnold, Peter G. Baum:
Efficient coherent phase quantization for audio watermarking. ICASSP 2011: 1844-1847 - [c17]Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël J. Doërr:
Improving Tonality Measures for Audio Watermarking. Information Hiding 2011: 223-237 - 2010
- [c16]Michael Arnold, Damodar Shenviwagle, Levent Yilmaz:
SciBrowser: a computational ethnography tool to explore open source science communities. ACM Southeast Regional Conference 2010: 26 - [c15]Michael Arnold, Séverine Baudry, Peter G. Baum, Xiao-Ming Chen, Bertrand Chupeau, Olivier Courtay, Gwenaël J. Doërr, Ulrich Gries, Frédéric Lefèbvre, Michel Morvan, Antoine Robert, Charles Salmon-Legagneur, Christophe Vincent, Mario de Vito:
Multimedia security technologies for movie protection. ACM Multimedia 2010: 1515-1516 - [c14]Michael Arnold, Peter G. Baum, Xiao-Ming Chen:
Robust detection of audio watermarks after acoustic path transmission. MM&Sec 2010: 117-126
2000 – 2009
- 2009
- [c13]Michael Arnold, Peter G. Baum, Walter Voeßing:
A Phase Modulation Audio Watermarking Technique. Information Hiding 2009: 102-116 - 2006
- [c12]Jan Meseth, Gero Müller, Reinhard Klein, Florian Röder, Michael Arnold:
Verification of rendering quality from measured BTFs. APGV 2006: 127-134 - 2004
- [b2]Michael Arnold:
Digital audio watermarking. Darmstadt University of Technology, 2004, ISBN 3-8325-0582-2, pp. 1-221 - [c11]Michal Haindl, Jirí Filip, Michael Arnold:
BTF Image Space Utmost Compression and Modelling Method. ICPR (3) 2004: 194-197 - [c10]Michael Arnold, Zongwei Huang:
Fast audio watermarking: concepts and realizations. Security, Steganography, and Watermarking of Multimedia Contents 2004: 105-115 - 2003
- [b1]Michael Arnold, Martin Schmucker, Stephen D. Wolthusen:
Techniques and Applications of Digital Watermarking and Content Protection. Artech House computer security series, Artech House 2003, ISBN 978-1-58053-111-5, pp. I-XV, 1-274 - [c9]Michael Arnold, Henning Daum, Christoph Busch:
Comparative Study on Fingerprint Recognition Systems - Project BioFinger. BIOSIG 2003: 33-38 - [c8]Michael Arnold, Christoph Busch, Martin Schmucker:
Szenario-basierte Testverfahren zur Zertifizierung von Wasserzeichen. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 215-226 - [c7]Michael Arnold:
Attacks on digital audio watermarks and countermeasures. WEDELMUSIC 2003: 55-62 - 2002
- [c6]Michael Arnold, Kai Schilz:
Quality evaluation of watermarked audio tracks. Security and Watermarking of Multimedia Contents 2002: 91-101 - [c5]Volker Roth, Michael Arnold:
Improved key management for digital watermark monitoring. Security and Watermarking of Multimedia Contents 2002: 652-658 - [c4]Michael Arnold, Oliver Lobisch:
Real-Time Concepts for Block-Based Watermarking Schemes. WEDELMUSIC 2002: 156-160 - [c3]Michael Arnold:
Subjective and Objective Quality Evaluation of Watermarked Audio Tracks. WEDELMUSIC 2002: 161-167 - [e1]Christoph Busch, Michael Arnold, Paolo Nesi, Martin Schmucker:
Second International Conference on WEB Delivering of Music, WEDELMUSIC '02, Darmstadt, Germany, December 09-11, 2002. IEEE Computer Society 2002, ISBN 0-7695-1623-8 [contents] - 2000
- [c2]Michael Arnold:
Audio Watermarking: Features, Applications, and Algorithms. IEEE International Conference on Multimedia and Expo (II) 2000: 1013-1016
1990 – 1999
- 1999
- [c1]Laurent Piron, Michael Arnold, Martin Kutter, Wolfgang Funk, Jean M. Boucqueau, Fiona Craven:
OCTALIS benchmarking: comparison of four watermarking techniques. Security and Watermarking of Multimedia Contents 1999: 240-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-13 20:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint