Alexander Schaub

Learn More
To explore the integration of functional neuronal interactions in human higher cortical functions, we applied multivariate mathematical techniques to regional cerebral blood flow (rCBF) increases induced by mental activity. rCBF was measured using the intravenous xenon-133 clearance technique with 32 bihemispheric detectors in 84 normal volunteers at rest(More)
This paper presents a novel approach for reactive obstacle avoidance for static and dynamic objects using monocular image sequences. A sparse motion field is calculated by tracking point features using the Kanade-Lucas-Tomasi method. The rotational component of this sparse optical flow due to ego motion of the camera is compensated using motion parameters(More)
Reputation systems are crucial for distributed applications in which users have to be made accountable for their actions, such as e-commerce websites. However, existing systems often disclose the identity of the raters, which might deter honest users from posting reviews, out of fear of retaliation from the ratees. While many privacy-preserving reputation(More)
Intravenous Immunoglobulin (IVIG) has been proposed as a potential therapeutic for Alzheimer's disease (AD) and its efficacy is currently being tested in mild-to-moderate AD. Earlier studies reported the presence of anti-amyloid beta (Aβ) antibodies in IVIG. These observations led to clinical studies investigating the potential role of IVIG as a therapeutic(More)
The BitMessage protocol offers privacy to its anonymous users. It is a completely decentralized messaging system, enabling users to exchange messages preventing accidental eavesdropping - a nice features in the Post-Snowden Internet Era. Not only messages are sent to every node on the network (making it impossible to understand the intended recipient), but(More)
Web applications are subject to several types of attacks. In particular, side-channel attacks consist in performing a statistical analysis of the web traffic to gain sensitive information about a client. In this paper, we investigate how side-channel leaks can be used on search engines such as Google or Bing to retrieve the client's search query. In(More)
This paper introduces a new vision based controller that uses the entries of a homography matrix to control a highly maneuverable mobile robot. It aims to reduce the sensitivity of the control to calibration errors through connection of the perception and control in the data space of the sensor. The control law is formulated in a way that it is only(More)
—Reputation systems are a major feature of every modern e-commerce website, helping buyers carefully choose their service providers and products. However, most websites use centralized reputation systems, where the security of the system rests entirely upon a single Trusted Third Party. Moreover, they often disclose the identities of the raters, which may(More)
This paper introduces a vision-based controller for automatic vehicle following, also known as 2-vehicle platooning. A direct homography controller is applied to calculate the motion demand for an autonomous vehicle from only the data of a monocular camera. The direct control without an intermediate step to a Cartesian representation increases the(More)