@inproceedings{19891,
  author       = {{Klein, Jan and Zachmann, Gabriel}},
  booktitle    = {{Computer Graphics Forum (Proceedings of EUROGRAPHICS 2004)}},
  pages        = {{567--576}},
  title        = {{{Point Cloud Collision Detection}}},
  year         = {{2004}},
}

@inproceedings{2415,
  abstract     = {{In this paper we introduce to virtualization of hardware on reconfigurable devices. We identify three main approaches denoted with temporal partitioning, virtualized execution, and virtual machine. For each virtualization approach, we discuss the application models, the required execution architectures, the design tools and the run-time systems. Then, we survey a selection of important projects in the field. }},
  author       = {{Plessl, Christian and Platzner, Marco}},
  booktitle    = {{Proc. Int. Conf. on Engineering of Reconfigurable Systems and Algorithms (ERSA)}},
  keywords     = {{hardware virtualization}},
  pages        = {{63--69}},
  publisher    = {{CSREA Press}},
  title        = {{{Virtualization of Hardware – Introduction and Survey}}},
  year         = {{2004}},
}

@inproceedings{2416,
  author       = {{Groppe, Sven and Böttcher, Stefan and Birkenheuer, Georg}},
  booktitle    = {{Proc. Int. Conf. on Enterprise Information Systems (ICEIS)}},
  pages        = {{241--250}},
  title        = {{{Efficient Querying of Transformed XML Documents}}},
  year         = {{2004}},
}

@inproceedings{2417,
  author       = {{Groppe, Sven and Böttcher, Stefan and Heckel, Reiko and Birkenheuer, Georg}},
  booktitle    = {{Proc. East-European Conf. on Advances in Databases and Information Systems (ADBIS)}},
  title        = {{{Using XSLT Stylesheets to Transform XPath Queries}}},
  year         = {{2004}},
}

@inproceedings{26411,
  author       = {{Volbert, Klaus}},
  booktitle    = {{Proceedings of the 2004 joint workshop on Foundations of mobile computing  - DIALM-POMC '04}},
  title        = {{{Experimental analysis of adjustable sectorized topologies for static ad hoc networks}}},
  doi          = {{10.1145/1022630.1022646}},
  year         = {{2004}},
}

@inproceedings{3233,
  author       = {{Wehrheim, Heike}},
  booktitle    = {{Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers}},
  editor       = {{H. Reussner, Ralf and A. Stafford, Judith and A. Szyperski, Clemens}},
  pages        = {{84----102}},
  title        = {{{Refinement and Consistency in Component Models with Multiple Views}}},
  doi          = {{10.1007/11786160_5}},
  year         = {{2004}},
}

@inproceedings{3234,
  author       = {{Möller, Michael and Olderog, Ernst-Rüdiger and Rasch, Holger and Wehrheim, Heike}},
  booktitle    = {{Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings}},
  editor       = {{A. Boiten, Eerke and Derrick, John and Smith, Graeme}},
  pages        = {{267----286}},
  title        = {{{Linking {CSP-OZ} with {UML} and Java: {A} Case Study}}},
  doi          = {{10.1007/978-3-540-24756-2_15}},
  year         = {{2004}},
}

@inproceedings{3235,
  author       = {{Wehrheim, Heike}},
  booktitle    = {{Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004}},
  editor       = {{B{\'{e}}zivin, Jean and Heckel, Reiko}},
  title        = {{{Refinement and Consistency in Multiview Models}}},
  year         = {{2004}},
}

@inbook{3011,
  author       = {{Blömer, Johannes and Guajardo, Jorge and Krummel, Volker}},
  booktitle    = {{Selected Areas in Cryptography}},
  isbn         = {{9783540243274}},
  issn         = {{0302-9743}},
  pages        = {{69--83}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Provably Secure Masking of AES}}},
  doi          = {{10.1007/978-3-540-30564-4_5}},
  year         = {{2004}},
}

@inbook{3012,
  author       = {{Blömer, Johannes and May, Alexander}},
  booktitle    = {{Public Key Cryptography – PKC 2004}},
  isbn         = {{9783540210184}},
  issn         = {{0302-9743}},
  pages        = {{1--13}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{A Generalized Wiener Attack on RSA}}},
  doi          = {{10.1007/978-3-540-24632-9_1}},
  year         = {{2004}},
}

@inbook{3014,
  author       = {{May, Alexander}},
  booktitle    = {{Public Key Cryptography – PKC 2004}},
  isbn         = {{9783540210184}},
  issn         = {{0302-9743}},
  pages        = {{218--230}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q}}},
  doi          = {{10.1007/978-3-540-24632-9_16}},
  year         = {{2004}},
}

@inbook{3015,
  author       = {{May, Alexander}},
  booktitle    = {{Advances in Cryptology – CRYPTO 2004}},
  isbn         = {{9783540226680}},
  issn         = {{0302-9743}},
  pages        = {{213--219}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring}}},
  doi          = {{10.1007/978-3-540-28628-8_13}},
  year         = {{2004}},
}

@inproceedings{3017,
  author       = {{Blömer, Johannes and Otto, Martin and Seifert, Jean-Pierre}},
  booktitle    = {{Proceedings of the 10th ACM conference on Computer and communication security  - CCS '03}},
  isbn         = {{1581137389}},
  publisher    = {{ACM Press}},
  title        = {{{A new CRT-RSA algorithm secure against bellcore attacks}}},
  doi          = {{10.1145/948109.948151}},
  year         = {{2004}},
}

@techreport{26992,
  author       = {{Rührup, Stefan and Schindelhauer, Christian}},
  title        = {{{Traffic and Hop Efficient Position-based Routing using a Cell Structure}}},
  year         = {{2004}},
}

@techreport{20933,
  abstract     = {{Today, in software intensive projects a huge amount of the budget flows into the analysis of the already existing system. The reason for the high costs results mainly from the fact that analyses are often made manually or with automatic tool support, which is inappropriate for analyzing large systems. Semi-automatic analysis approaches usually use a notion of fuzziness to overcome this limitation, but inherit the problem of selecting appropriate initial values. In this paper we present an approach to adapt the initial values of our semi-automatic reverse engineering process. We provide the reverse engineer with accuracy information for results produced by a rule-based inference algorithm. Based on the changes of the results done by the reverse engineer we automatically adapt a credibility value of each rule, which previously has been used to compute the accuracy of the result. The adaption fits seamlessly into our overall analysis process. First tests show that it is suitable for the calibration of our fuzzyfied rule-based pattern recognition approach.}},
  author       = {{Niere, Jörrg and Meyer, Matthias and Wendehals, Lothar}},
  title        = {{{User-driven adaption in rule-based pattern recognition}}},
  year         = {{2004}},
}

@article{2119,
  author       = {{Kolman, Petr and Scheideler, Christian}},
  journal      = {{Algorithmica}},
  number       = {{3}},
  pages        = {{209----233}},
  title        = {{{Simple On-Line Algorithms for the Maximum Disjoint Paths Problem}}},
  doi          = {{10.1007/s00453-004-1086-1}},
  year         = {{2004}},
}

@inproceedings{2120,
  author       = {{Awerbuch, Baruch and Scheideler, Christian}},
  booktitle    = {{ICALP}},
  pages        = {{183----195}},
  title        = {{{Group Spreading: A Protocol for Provably Secure Distributed Name Service}}},
  volume       = {{3142}},
  year         = {{2004}},
}

@inproceedings{2121,
  author       = {{Riley, Chris and Scheideler, Christian}},
  booktitle    = {{IPDPS}},
  title        = {{{A Distributed Hash Table for Computational Grids}}},
  year         = {{2004}},
}

@inproceedings{2122,
  author       = {{Awerbuch, Baruch and Scheideler, Christian}},
  booktitle    = {{IPTPS}},
  pages        = {{237----249}},
  title        = {{{Robust Distributed Name Service}}},
  volume       = {{3279}},
  year         = {{2004}},
}

@inproceedings{2123,
  author       = {{Ateniese, Giuseppe and Riley, Chris and Scheideler, Christian}},
  booktitle    = {{IWIA}},
  pages        = {{33----47}},
  title        = {{{Survivable Monitoring in Dynamic Networks}}},
  year         = {{2004}},
}

