
Thomas Martin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j7]Chenyang Zhao
, Thomas Martin, Xingfeng Shao, Jeffry R. Alger, Vinay Duddalwar
, Danny J. J. Wang
:
Low Dose CT Perfusion With K-Space Weighted Image Average (KWIA). IEEE Trans. Medical Imaging 39(12): 3879-3890 (2020)
2010 – 2019
- 2016
- [j6]Ulrich Gengenbach, Christoph Beck, Helmut Guth, Liane Koker
, Markus Krug, Thomas Martin, Jörg Nagel, Ingo Sieber
, Peter Stiller, Oliver Stachs, Rudolf F. Guthoff:
Konzept und Realisierung eines optischen Mikrosystems zur Wiederherstellung der Akkommodation. Autom. 64(10): 839-849 (2016) - [j5]Bushra AlBelooshi, Ernesto Damiani, Khaled Salah, Thomas Martin:
Securing Cryptographic Keys in the Cloud: A Survey. IEEE Cloud Comput. 3(4): 42-56 (2016) - [j4]Ingo Sieber
, Thomas Martin, Ulrich Gengenbach:
Robust Design of an Optical Micromachine for an Ophthalmic Application. Micromachines 7(5): 85 (2016) - [c23]Khawla Alghafli
, Thomas Martin:
Identification and recovery of video fragments for forensics file carving. ICITST 2016: 267-272 - 2015
- [c22]Bushra AlBelooshi, Khaled Salah, Thomas Martin, Ernesto Damiani
:
Experimental Proof: Data Remanence in Cloud VMs. CLOUD 2015: 1017-1020 - [c21]Bushra AlBelooshi, Khaled Salah
, Thomas Martin, Ernesto Damiani
:
Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds. AICCSA 2015: 1-4 - [c20]Kristen Hines, Wallace Santos Lages
, Namitha Somasundaram, Thomas Martin:
Protecting workers with smart e-vest. UbiComp/ISWC Adjunct 2015: 101-104 - [c19]Khalfan AlMarashda, Ali Dawood, Thomas Martin, Mohammed E. Al-Mualla
, Harish Bhaskar
:
An Optimized Selective Encryption for Video Confidentiality. ICIAR 2015: 109-118 - [c18]Bushra AlBelooshi, Khaled Salah
, Thomas Martin, Ernesto Damiani
:
Securing Cryptographic Keys in the IaaS Cloud Model. UCC 2015: 397-401 - 2014
- [c17]Michael Glass, Jung Hee Kim, Kelvin S. Bryant, Melissa A. Desjarlais, Micayla Goodrum, Thomas Martin:
Toward Measurement of Conversational Interactivity in COMPS Computer Mediated Problem-Solving Dialogues. MAICS 2014: 31-38 - 2012
- [c16]Fabiola Fernández-Gutiérrez, Andreas Melzer, Avril Barclay, Graeme Houston, Thomas Martin:
Workflow simulation applied to image-guided procedures: understanding the present and looking to the future. Winter Simulation Conference 2012: 372:1-372:2 - 2011
- [c15]Khalfan AlMarashda, Yousuf Alsalami, Khaled Salah, Thomas Martin:
On the security of inclusion or omission of MixColumns in AES cipher. ICITST 2011: 34-39 - 2010
- [j3]Zahi Nakad, Mark T. Jones, Thomas Martin, Wissam Fawaz
:
Networking in E-textiles. Comput. Commun. 33(6): 655-666 (2010) - [c14]Ivica Bukvic, Thomas Martin, Eric Standley, Michael Matthews:
Introducing L2Ork: Linux Laptop Orchestra. NIME 2010: 170-173
2000 – 2009
- 2009
- [j2]Thomas Martin, Keith M. Martin, Peter R. Wild:
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. Des. Codes Cryptogr. 51(3): 315-334 (2009) - 2008
- [c13]Thomas Martin:
The role of design in wearable computing. ISWC 2008: 128 - 2007
- [j1]Zahi Nakad, Mark T. Jones, Thomas Martin, Ravi Shenoy:
Using electronic textiles to implement an acoustic beamforming array: A case study. Pervasive Mob. Comput. 3(5): 581-606 (2007) - [c12]Thomas Martin, Alain Boucher, Jean-Marc Ogier, Mathias Rossignol, Eric Castelli:
Multimedia Scenario Extraction and Content Indexing for E-Learning. CBMI 2007: 204-211 - [c11]David Graumann, Giuseppe Raffa, Meghan Quirk, Braden Sawyer, Justin Chong, Mark T. Jones, Thomas Martin:
Large Surface Area Electronic Textiles for Ubiquitous Computing: A System Approach. MobiQuitous 2007: 1-8 - 2006
- [c10]Joshua Nathaniel Edmison, David I. Lehn, Mark T. Jones, Thomas Martin:
E-Textile Based Automatic Activity Diary for Medical Annotation and Analysis. BSN 2006: 131-134 - 2005
- [c9]Christopher Einsmann, Meghan Quirk, Ben Muzal, Bharath Venkatramani, Thomas Martin, Mark T. Jones:
Modeling a Wearable Full-body Motion Capture System. ISWC 2005: 144-151 - [c8]Joshua Nathaniel Edmison, David I. Lehn, Mark T. Jones, Thomas Martin:
User's Perceptions of an Automatic Activity Diary for Medical Annotation and Analysis. ISWC 2005: 192-193 - [c7]Thomas Martin, Alain Boucher, Jean-Marc Ogier:
Multimodal analysis of recorded video for e-learning. ACM Multimedia 2005: 1043-1044 - 2004
- [c6]Ying Lu, Atish P. Sinha, Huimin Zhao, Thomas Martin:
An Empirical Study of Cost-sensitive Classification in Campaign Management. AMCIS 2004: 231 - [c5]Zahi Nakad, Mark T. Jones, Thomas Martin:
Fault-Tolerant Networks for Electronic Textiles. Communications in Computing 2004: 100-106 - [c4]Thomas Martin, Mark T. Jones, Joshua Nathaniel Edmison, Tanwir Sheikh, Zahi Nakad:
Modeling and simulating electronic textile applications. LCTES 2004: 10-19 - 2003
- [c3]Zahi Nakad, Mark T. Jones, Thomas Martin:
Communications in Electronic Textile Systems. Communications in Computing 2003: 37-46 - [c2]Thomas Martin, Mark T. Jones, Joshua Nathaniel Edmison, Ravi Shenoy:
Towards a design framework for wearable electronic textiles. ISWC 2003: 190-199 - 2002
- [c1]Joshua Nathaniel Edmison, Mark T. Jones, Zahi Nakad, Thomas Martin:
Using Piezoelectric Materials for Wearable Electronic Textile. ISWC 2002: 41-48
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-11 00:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint