Abstract is missing.
- Conference Overview and Papers Program1-4 [doi]
- Introduction to WLAN-Based Indoor Positioning of Mobile DevicesDavid Akopian, Ali Khalajmehrabadi, Nikolaos Gatsis. 5-14 [doi]
- Android Door/Window Image-based Measurements ApplicationKhader Mohammad, Ahmad S. Alsadeh, Amer Qarabsa, Shatha Khalil, Mona Dirieh. 15-21 [doi]
- Blackmagic Production Camera Raw Color Investigation by Spectral Analysis of Macbeth Color ChartsEberhard Hasche, Thomas Schrader, Reiner Creutzburg. 22-33 [doi]
- Liquid Crystal lens characterization for integrated depth sensing and all in focus imaging applicationSimon Emberger, Laurent Alacoque, Antoine Dupret, Capucine Lecat-Mathieu de Boissac, Jean-Louis de Bougrenet de la Tocnaye, Nicolas Fraval. 34-39 [doi]
- A Billion Words to RememberGeorge Nagy. 40-43 [doi]
- Demographic Prediction based on Mobile User DataL. Podoynitsina, A. Romanenko, K. Kryzhanovskiy, A. Moiseenko. 44-47 [doi]
- Optimizing Video Transmission for Mobile DevicesChulhee Lee, Sangwook Baek, Guiwon Seo, J. Ryu, K. Kang. 48-53 [doi]
- Comparative visualization of the geometry of a hollow box girder using 3D-LiDAR - Part 2: Reconstruction of 3D Geometric ModelStefan Maack, Jenny Knackmuß, Reiner Creutzburg. 54-64 [doi]
- Investigation of security relevant aspects of Android eHealthApps: permissions, storage properties and data transmissionJenny Knackmuß, Eric Clausing, Reiner Creutzburg. 65-75 [doi]
- Privacy Issues in Mobile Health Applications - Assessment of Current Android Health AppsAnett Hoppe, Jenny Knackmuß, Maik Morgenstern, Reiner Creutzburg. 76-83 [doi]
- A Forensic Mobile Application Designed for both Steganalysis and Steganography in Digital ImagesEnping Li, Jun Yu. 84-89 [doi]
- Computation of equidistant curve for the image with blurred contoursEvgeny A. Semenishchev, Igor Shraifel, Viacheslav V. Voronin, Ekaterina Epishina. 90-96 [doi]
- Prune the Convolutional Neural Networks with Sparse ShrinkXin Li, Changsong Liu. 97-101 [doi]
- Automated segmentation of ophthalmological OCT imagesFriedrich Müller, Reiner Creutzburg. 102-111 [doi]
- Concept for software-based configuration of the organizational and technical security of a company of arbitrary sizeThomas Möller, Knut Bellin, Reiner Creutzburg. 112-119 [doi]
- A study of IoT MQTT control packet behavior and its effect on communication delaysBrian Bendele, David Akopian. 120-129 [doi]
- Semi-automatic generation of multilingual lecture notes - Wikipedia books on different subjects in various languages for blended learning applicationsReiner Creutzburg. 130-138 [doi]
- The strange world of keyloggers - an overview, Part IReiner Creutzburg. 139-148 [doi]
- The Study of Algorithms Reducing the Level of out-of-band radiation and Inter carrier Interference of the OFDM signalV. P. Fedosov, Viacheslav V. Voronin, A. A. Legin, A. V. Lomakina, D. G. Kovtun. 149-154 [doi]
- Two-Tier State-Machine Programming for Messaging ApplicationsJafet Morales, Rodrigo Escobar, Sahak Kaghyan, Girish Vaidyanathan Natarajan, David Akopian, Patricia Chalela, Amelie G. Ramirez, Alfred Mcalister. 155-163 [doi]