default search action
Christoph Pohl
Person information
Other persons with a similar name
- Christopher Pöhlker
- Henrich Christopher Pöhls (aka: Henrich C. Pöhls) — University of Passau, Germany
- Christopher Pohl
- Christopher A. Pohl
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Ömer Sen, Christoph Pohl, Immanuel Hacker, Markus Stroot, Andreas Ulbig:
AI-Based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation Environments. CSR 2024: 68-75 - [i7]Christoph Pohl, Fabian Reister, Fabian Peller-Konrad, Tamim Asfour:
Memory-centered and Affordance-based Framework for Mobile Manipulation. CoRR abs/2401.16899 (2024) - [i6]Timo Birr, Christoph Pohl, Abdelrahman Younes, Tamim Asfour:
AutoGPT+P: Affordance-based Task Planning with Large Language Models. CoRR abs/2402.10778 (2024) - [i5]Yichen Cai, Jianfeng Gao, Christoph Pohl, Tamim Asfour:
Visual Imitation Learning of Task-Oriented Object Grasping and Rearrangement. CoRR abs/2403.14000 (2024) - 2022
- [j3]Christoph Pohl, Patrick Hegemann, Byungchul An, Markus Grotz, Tamim Asfour:
Humanoid robotic system for grasping and manipulation in decontamination tasks. Autom. 70(10): 850-858 (2022) - [j2]Christoph Pohl, Tamim Asfour:
Probabilistic Spatio-Temporal Fusion of Affordances for Grasping and Manipulation. IEEE Robotics Autom. Lett. 7(2): 3226-3233 (2022) - [c17]Woo-Jeong Baek, Christoph Pohl, Philipp Pelcz, Torsten Kröger, Tamim Asfour:
Improving Humanoid Grasp Success Rate based on Uncertainty-aware Metrics and Sensitivity Optimization. Humanoids 2022: 786-793 - [c16]Timo Birr, Christoph Pohl, Tamim Asfour:
Oriented Surface Reachability Maps for Robot Placement. ICRA 2022: 3357-3363 - 2020
- [c15]Christoph Pohl, Kevin Hitzler, Raphael Grimm, Antonio Zea, Uwe D. Hanebeck, Tamim Asfour:
Affordance-Based Grasping and Manipulation in Real World Applications. IROS 2020: 9569-9576
2010 – 2019
- 2015
- [c14]Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof:
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. SEC 2015: 267-280 - [i4]Christoph Pohl, Kathrin Schlierkamp, Hans-Joachim Hof:
BREW: A Breakable Web Application for IT-Security Classroom Use. CoRR abs/1506.03325 (2015) - [i3]Christoph Pohl, Hans-Joachim Hof:
The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications. CoRR abs/1506.07055 (2015) - [i2]Christoph Pohl, Hans-Joachim Hof:
Secure Scrum: Development of Secure Software with Scrum. CoRR abs/1507.02992 (2015) - [i1]Christoph Pohl, Michael Meier, Hans-Joachim Hof:
Apate - A Linux Kernel Module for High Interaction Honeypots. CoRR abs/1507.03117 (2015) - 2014
- [c13]Yvonne Thoß, Christoph Pohl, Madlain Hoffmann, Josef Spillner, Alexander Schill:
User-Friendly Visualization of Cloud Quality. IEEE CLOUD 2014: 890-897
2000 – 2009
- 2008
- [c12]Vander Alves, Christa Schwanninger, Luciano Barbosa, Awais Rashid, Peter Sawyer, Paul Rayson, Christoph Pohl, Andreas Rummler:
An Exploratory Study of Information Retrieval Techniques in Domain Analysis. SPLC 2008: 67-76 - 2007
- [j1]Hermann Härtig, Steffen Zschaler, Martin Pohlack, Ronald Aigner, Steffen Göbel, Christoph Pohl, Simone Röttger:
Enforceable component-based realtime contracts. Real Time Syst. 35(1): 1-31 (2007) - 2006
- [c11]Steffen Göbel, Falk Hartmann, Kay Kadner, Christoph Pohl:
A Device-Independent Multimodal Mark-up Language. GI Jahrestagung (2) 2006: 170-177 - [c10]Rodger Burmeister, Christoph Pohl, Siegfried Bublitz, Pascale Hugues:
SNOW - A Multimodal Approach for Mobile Maintenance Applications. WETICE 2006: 131-136 - 2005
- [b1]Christoph Pohl:
Adaptive caching of distributed components. Dresden University of Technology, Germany, 2005, pp. 1-185 - [c9]Christoph Pohl, Boon Chong Tan, Alexander Schill:
Semantic Caching of Code Archives. KiVS 2005: 53-64 - 2004
- [c8]Steffen Göbel, Christoph Pohl, Simone Röttger, Steffen Zschaler:
The COMQUAD component model: enabling dynamic selection of implementations by weaving non-functional aspects. AOSD 2004: 74-82 - [c7]Jean-Michel Bruel, Geri Georg, Heinrich Hußmann, Ileana Ober, Christoph Pohl, Jon Whittle, Steffen Zschaler:
Models for Non-functional Aspects of Component-Based Software (NfC'04). UML Satellite Activities 2004: 62-66 - [c6]Steffen Göbel, Christoph Pohl, Ronald Aigner, Martin Pohlack, Simone Röttger, Steffen Zschaler:
The COMQUAD Component Container Architecture. WICSA 2004: 315-320 - 2003
- [c5]Christoph Pohl, Alexander Schill:
Client-Side Component Caching: A Flexible Mechanism for Optimized Component Attribute Caching. DAIS 2003: 141-152 - [c4]Christoph Pohl, Steffen Göbel:
Integrating Orthogonal Middleware Functionality in Components Using Interceptors. KiVS 2003: 345-356 - 2002
- [c3]Christoph Pohl, Alexander Schill:
Middleware Support for Transparent Client-Side Caching. SC@ETAPS 2002: 34-44 - 2001
- [c2]Alexander Schill, Olaf Neumann, Christoph Pohl, Thomas Müller:
Architectural Design and Performance Aspects of Developing Applications Based on Middleware. DAIS 2001: 127-132
1990 – 1999
- 1999
- [c1]Olaf Neumann, Christoph Pohl, Katrin Franze:
Caching in Stubs und Events mit Enterprise Java Beans bei Einsatz einer objektorientierten Datenbank. Java-Informations-Tage 1999: 17-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint