Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
2nd ESMO Consensus Conference in Lung Cancer: locally advanced stage III non-small-cell lung cancer.
- W. Eberhardt, D. de Ruysscher, +7 authors S. Peters
- Medicine
- Annals of oncology : official journal of the…
- 1 August 2015
To complement the existing treatment guidelines for all tumour types, ESMO organises consensus conferences to focus on specific issues in each type of tumour. The 2nd ESMO Consensus Conference on… Expand
Understanding the Formation of Trust in IT Artifacts
- M. Söllner, A. Hoffmann, H. Hoffmann, Arno Wacker, J. Leimeister
- Psychology, Computer Science
- ICIS
- 16 December 2012
IT artifacts often take the role of a trustee in a trust relationship between users and IT artifacts. The goal of this paper is to increase the understanding of the formation of trust in such trust… Expand
Mining coherent subgraphs in multi-layer graphs with edge labels
- B. Boden, Stephan Günnemann, H. Hoffmann, T. Seidl
- Mathematics, Computer Science
- KDD
- 12 August 2012
Mining dense subgraphs such as cliques or quasi-cliques is an important graph mining problem and closely related to the notion of graph clustering. In various applications, graphs are enriched by… Expand
Mining coherent subgraphs in multi-layer graphs with edge labels
- B. Boden, Stephan Günnemann, H. Hoffmann, T. Seidl
- Mathematics, Computer Science
- KDD
- 12 August 2012
Mining dense subgraphs such as cliques or quasi-cliques is an important graph mining problem and closely related to the notion of graph clustering. In various applications, graphs are enriched by… Expand
Understanding the Formation of Trust
- M. Söllner, A. Hoffmann, H. Hoffmann, Arno Wacker, J. Leimeister
- Computer Science
- Socio-technical Design of Ubiquitous Computing…
- 2014
Ubiquitous computing systems often take the role of a trustee in a trust relationship between users and ubiquitous computing systems. The goal of this chapter is to increase the understanding of the… Expand
Incorporating behavioral trust theory into system development for ubiquitous applications
- H. Hoffmann, M. Söllner
- Computer Science
- Personal and Ubiquitous Computing
- 2012
Trust has been shown to be a key factor for technology adoption by users, that is, users prefer to use applications they trust. While existing literature on trust originating in computer science… Expand
Success Factors for Requirement Patterns Approaches Exploring Requirements Analysts’ Opinions and Whishes
- A. Hoffmann, A. Janzen, H. Hoffmann, J. Leimeister
- Computer Science, Engineering
- GI-Jahrestagung
- 30 July 2014
Research in requirement patterns has led to different approaches, fostering elicitation efficiency and requirements quality by reusing known solutions. However, such pattern-based approaches are not… Expand
How Customers Trust Mobile Marketing Applications
- A. Janson, A. Hoffmann, H. Hoffmann, J. Leimeister
- Business, Computer Science
- ICIS
- 30 July 2014
Smartphone applications for marketing purposes like free advertising games or mobile loyalty programs are becoming increasingly prevalent. Unfortunately, due to recurring news about the excessive use… Expand
Repeatability of facial electromyography (EMG) activity over corrugator supercilii and zygomaticus major on differentiating various emotions
- J. Tan, Steffen Walter, +4 authors H. Traue
- Computer Science
- J. Ambient Intell. Humaniz. Comput.
- 1 March 2012
Recent affective computing findings indicated that effectively identifying users’ emotional responses is an important issue to improve the quality of ambient intelligence. In the current study, two… Expand
Towards the Use of Software Requirement Patterns for Legal Requirements
- A. Hoffmann, T. Schulz, +4 authors Jan Marco Leimeister
- Engineering
- 19 March 2012
Laws and regulations play an increasingly important role for requirements engineering and system development. The challenge of interpreting the law to elicit legal requirements for a novel… Expand