Erich J. Neuhold

Erich J. Neuhold
University of Vienna | UniWien · Fakultät für Informatik

Dr-Ing, Dipl.Ing.

About

347
Publications
15,057
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,496
Citations
Additional affiliations
April 2005 - October 2015
University of Vienna
Position
  • Professor

Publications

Publications (347)
Article
Summaries of article “50 & 25 Years Ago.”
Article
Summaries of article “50 & 25 Years Ago.”
Article
Summary form only: Summaries of articles presented in this issue of the publication.
Article
Summary form only: Summaries of articles presented in this issue of the publication.
Article
Summary form only: Summaries of articles presented in this issue of the publication.
Article
Summary form only: Summaries of articles presented in this issue of the publication.
Article
Public, institutional, governmental, and military concern over the impact of improper, inadequate controls and safeguards for this increasingly concentrated, inexpensive, and pervasive information processing power is rightfully increasing.
Article
Summary form only: Summaries of articles presented in this issue of the publication.
Article
Summary form only: Summaries of articles presented in this issue of the publication.
Article
Summary form only: Summaries of articles presented in this issue of the publication.
Article
Summary form only: Abstracts of previous articles presented in this series.
Article
Presents a survey of this issue of the publication.
Article
Keynote Speech COMPCON 73: Computing Networks: A Powerful National Force; Ruth M. Davis (p. 14) “Computer networks are essential for all those real time geographically dispersed control activities vital to our individual and national well-being. … Computer networks are the only practical means available for the sharing of expensive information reso...
Article
On the Passing of MOBIDIC-B; M.D. Abrams and R. Rosenthal (p. 10) “The history, design, hardware configuration, instruction set and operating system of the MOBIDIC-B used in the National Bureau of Standards (NBS) computer research facility is described. … Two fundamental objectives were established early in the design phase: 1. extremely high relia...
Article
www.computer.org/csdl/mags/co/1973/01/index.html
Article
In the early years, Computer was published bimonthly. Therefore, we will have to skip our “interesting and/or informative” extractions for October. The next set will appear in the January 2023 issue of Computer, and we hope you will eagerly wait for our next publication of this column.
Article
Application of Digital Computers to Air Traffic Control in the United States; Howard J. Kirshner (p. 14): “Radar-oriented tracking and alphanumeric display systems using digital computers are just now emerging as the key data processing tool in air traffic control, although the Great Falls Center, using air defense computer and display facilities,...
Article
In the early years, Computer was published only bimonthly. Therefore, we will have to skip our “interesting and/or informative” extractions for the October issue. The next one will appear in the November 2022 issue of Computer, and we hope you will eagerly await our next publication of this column. In some cases these needs are real, but often they...
Article
Performance Evaluation; Richard R. Shively (p. 12) “Economics is, of course, a primary incentive for performance analysis. Growth in computing service cost as a percentage of the total budget has prompted many corporations and universities to focus attention on this subject.” (p. 14) “The growing flexibility of options and configurations in compute...
Article
In the early years, Computer was only published bimonthly. Therefore, we will have to skip our interesting and/or informative extractions for August. The next one will appear in the September 2022 issue of Computer, and we hope you will eagerly wait for our next publication of this column.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Full-text available
Information retrieval IR is the process of finding information (generally documents) that matches the needs of the user. One way to improve the search effectiveness, as well as the quality of text categorization is to build an effective stemmer that helps to match users’ queries with relevant documents in IR and reduce the space of textual represen...
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
www.computer.org/csdl/mags/co/1972/01/index.html
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Book
For 60 years the International Federation for Information Processing (IFIP) has been advancing research in Information and Communication Technology (ICT). This book looks into both past experiences and future perspectives using the core of IFIP's competence, its Technical Committees (TCs) and Working Groups (WGs). Soon after IFIP was founded, it es...
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Chapter
Full-text available
Today Deep learning approach DL becomes the new tendency of machine learning approach ML which is used since it gives much more sophisticated pattern recognition and image classification than classic machine learning approach. Among the most used methods in DL, CNNs are for a special interest. In this work, we have developed an automatic classifier...
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
e are various details that have yet to be worked out with our developers. We'll let her know as soon as we can.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
Presents a summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago, July 1968 and 1993.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Article
A summary of articles published in Computer 50 and 25 years ago.
Book
Full-text available
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 28 revised full papers and 7 short papers presented were carefully reviewed and selected from 128 submissions. The accepted papers were grouped into the follow...
Conference Paper
The resource allocation is an essential aspect of Data Center performance. The strategy between dynamic and dedicated resource allocation have objectives in performance and reliability. The performance consists of workload, usage, and processing performance. The study works in workload performance test in dynamic resource allocation. The research p...
Article
Sending and receiving data is an important requirement of all computing infrastructures with components that need to interact. This interoperability requirement has been the focus of research since the beginning of the computer age. In this paper we will illustrate that in order to achieve interoperability, computer hardware and software have to be...
Book
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 27 revised full papers and 2 short papers presented were carefully reviewed and selected from 115 submissions. They have been organized in the following topical...
Book
This book constitutes the refereed proceedings of the 5th IFIP TC 5 International Conference on Computer Science and Its Applications, CIIA 2015, held in Saida, Algeria, in May 2015. The 56 revised papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in the following four research tracks: computationa...
Book
This book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho Chi Minh City, Vietnam, in November 2015. The 20 revised full papers and 3 short papers presented were carefully reviewed and selected from 88 submissions. They have been organized in the following top...
Article
Full-text available
The VLDB 2014 PhD Workshop is an one-day event to be held in Hangzhou, China on September 1st, 2014, in conjunction with VLDB 2014. The aim of this workshop is to provide helpful feedback, useful information and networking opportunities that can benefit the students' dissertation work as well as their long-term career. The selection process and the...
Book
Full-text available
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were caref...
Book
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data anal...
Conference Paper
Interoperability is a qualitative property of computing infrastructures that denotes the ability of the sending and receiving systems to exchange and properly interpret information objects across system boundaries. Since this property is not given by default, the interoperability problem and the representation of semantics have been an active resea...
Conference Paper
Full-text available
Interoperability is a qualitative property of computing infrastructures that denotes the ability of sending and receiving systems to exchange and properly interpret information objects across system boundaries. Since this property is not given by default, the interoperability problem and the representation of semantics have been an active research...
Article
We introduce several rules of thumb for constructing nearly optimal binary search trees and survey results about the average search time of the trees yielded. Then we introduce a new point of view: worst case behavior. We show that the trees produced by the rules of thumb exhibit good worst case behavior by proving upper and lower bounds for the ti...
Article
Offshore outsourcing of work to support software development and services is seen primarily as a transfer of labor to another shore. But intellectual property is transferred as well. Such transfers have significant long term effects on the balance of intellectual property (IP) generation and consumption. Software is such an intangible good, and the...
Article
A common trend that can be currently observed in information management is a movement towards less central control and more flexibility and self-organization. This is true on the level of the infrastructure technologies as well as in information management and services, where personalized and community-based solutions such as Flickr or collaborativ...
Conference Paper
Full-text available
There is a growing discussion of risks when software development is outsourced. In order to assess the extent of those risks, one needs to know the value of that concerned software. Software is an intangible good, and the value of intangibles is based on the income they are expected to generate in the future. This paper presents a model for softwar...
Conference Paper
Welcome to the Fifth International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE 2006). This year’s ODBASE conference was held in Montpellier, France from October 29 to November 3, 2006. The ODBASE conferences provide a forum for exchanging the latest research results on ontologies, data semantics, and other areas of c...
Article
Full-text available
We introduce a novel view on how to deal with the problems of semantic interoperability in distributed systems. This view is based on the concept of emergent semantics, which sees both the representation of semantics and the discovery of the proper interpretation of symbols as the result of a self-organizing process performed by distributed agents...
Book
This volume contains the proceedings of the Fourth International Conference on Advances in Information Systems (ADVIS) held in Izmir, Turkey, October, 18-20, 2006. This is the fourth conference dedicated to the memory of Professor Esen Ozkarahan, who was one of the pioneers of database machine research and a founder of database systems in Turkey. T...

Network

Cited By