Felix Kuhr

  • Citations Per Year
Learn More
OBJECTIVE To evaluate a new method of measuring the real deviation (trueness) of full arch impressions intraorally and to investigate the trueness of digital full arch impressions in comparison to a conventional impression procedure in clinical use. METHODS Four metal spheres were fixed with composite using a metal application aid to the lower teeth of 50(More)
In data-communication networks, network reliability is of great concern to both network operators and customers. Therefore, network operators want to determine what services could be affected by software vulnerabilities being exploited that are present within their data-communication network. To determine what services could be affected by a software(More)
With the help of frontal cuts through casts of skulls of Pongids we demonstrated the postnatal development of the form of the hard palate. The form of the hard palate is similar to a semicircle in the frontal cut. In the Chimpanzee the palatal form in the frontal cut ist not as semicircular as in the other great apes and is similar to the palatal form of(More)
With the growing deployment of host and network intrusion detection systems in increasingly large and complex communication networks, managing low-level events from these systems becomes critically important. A network has multiple tasks, which consist of multiple network services aiding the execution of a task. An emerging track of security research has(More)
We introduce the unsupervised text annotation model UTA, which iteratively populates a document-specific database containing the related symbolic content description. The model identifies the most related documents using the text of documents and the symbolic content description. UTA extends the database of one document with data from related documents(More)
Seven community hospitals have worked cooperatively for 18 months to develop an initial hospital pharmacy quality assurance program. Auditing criteria were developed for nine service areas corresponding to the model program developed by the American Society of Hospital Pharmacists. Current plans are to implement and modify this program as required at each(More)
With the growing deployment of host-based and network-based intrusion detection systems in increasingly large and complex communication networks, managing low-level alerts from these systems becomes critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or intrusion prevention systems (IPSs) are collected(More)
  • 1