@inproceedings{26081,
  author       = {{Mauerer, Wolfgang and Hillier, Gernot and Sawallisch, Jan and Hönick, Stefan and Oberthür, Simon}},
  booktitle    = {{Proceedings of Embedded World Conference}},
  title        = {{{Real-Time Android: Deterministic Ease of use}}},
  year         = {{2012}},
}

@inproceedings{26086,
  abstract     = {{In this paper, an image segmentation approach for object detection on the miniature robot BeBot - a deeply embedded system - is presented. In order to enable the robot to detect and identify objects in its environment by means of its camera, an efficient image segmentation approach was developed. The fundamental algorithm bases on the region growing and region merging concept and identifies homogeneous regions consisting of adjacent pixels with similar color. By internally representing a contiguous block of pixels in terms of run-lengths, the computational effort of both the region growing and the region merging operation is minimized. Finally, for subsequent object detection processes, a region is efficiently translated into a statistically feature representation based on discretized moments.
}},
  author       = {{Jungmann, Alexander and Schierbaum, Thomas and Kleinjohann, Bernd}},
  booktitle    = {{Proceedings of the Seventh International Conference on Computer Vision Theory and Applications (VISAPP)}},
  pages        = {{441--444}},
  publisher    = {{ INSTICC PRESS}},
  title        = {{{Image Segmentation For Object Detection on a Deeply Embedded Miniature Robot}}},
  year         = {{2012}},
}

@inproceedings{26089,
  author       = {{Bin Tariq, Fahad}},
  booktitle    = {{Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems}},
  title        = {{{Deterministic Runtime Adaptation for Hard Real-time Embedded Systems with Processing Constraints}}},
  year         = {{2012}},
}

@inproceedings{26090,
  author       = {{Mathews, Emi and Frey, Hannes}},
  booktitle    = {{13th International Conference On Distributed Computing And Networking (ICDCN)}},
  publisher    = {{Springer}},
  title        = {{{A Localized Link Removal and Addition based Planarization Algorithm}}},
  year         = {{2012}},
}

@article{26091,
  author       = {{Mathews, Emi and Mathew, Ciby}},
  journal      = {{International Journal of Computer Networks and Communications 4(1)}},
  pages        = {{175--192}},
  title        = {{{Deployment of mobile routers ensuring coverage and connectivity}}},
  year         = {{2012}},
}

@inproceedings{26092,
  author       = {{Müller, Wolfgang and Becker, Markus and Zabel, Henning and Elfeky, Ahmed and DiPasquale, Anthony}},
  booktitle    = {{In Proceedings of 17th Asia and South Pacific Design Automation Conference (ASP-DAC 2012}},
  title        = {{{Virtual Prototyping of Cyber-Physical Systems}}},
  year         = {{2012}},
}

@inbook{26093,
  author       = {{Khaluf, Yara and Mathews, Emi and Rammig, Franz-Josef}},
  booktitle    = {{Self-Organization in Embedded Real-Time Systems}},
  editor       = {{Higuera-Toledano, M. Theresa and Brinkschulte, Uwe and Rettberg, Achim}},
  pages        = {{75--92}},
  publisher    = {{Springer}},
  title        = {{{Swarm Robotic Time Synchronization for Object Tracking}}},
  year         = {{2012}},
}

@inbook{26094,
  author       = {{Rammig, Franz-Josef}},
  booktitle    = {{Schemata und Praktiken}},
  editor       = {{Conradi, Tobias and Ecker, Gisela and Eke, Norbert Otto and Muhle, Florian}},
  pages        = {{141--160}},
  publisher    = {{Wilhelm Fink Verlag}},
  title        = {{{Biologically Inspired Information Technology: Towards a Cyber Biosphere}}},
  year         = {{2012}},
}

@inbook{26102,
  author       = {{Bin Tariq, Fahad and Korrapati, Sandeep}},
  booktitle    = {{Kapitel: F-DRARE: A Framework for Deterministic Runtime Adaptation of Cyber Physical Systems}},
  pages        = {{263--276}},
  publisher    = {{ IGI Global}},
  title        = {{{Adaptive Web Services for Modular and Reusable Software Development}}},
  year         = {{2012}},
}

@inproceedings{26181,
  abstract     = {{The paradigm shift from purchasing monolithic software solutions to a dynamic composition of individual solutions entails many new possibilities yet great challenges, too. In order to satisfy user requirements, complex services have to be automatically composed of elementary services. Multiple possibilities of composing a complex service inevitably emerge. The problem of selecting the most appropriate services has to be solved by comparing the different service candidates with respect to their quality in terms of inherent non-functional properties while simultaneously taking the user requirements into account.We are aiming for an integrated service rating and ranking methodology in order to support the automation of the underlying decision-making process. The main contribution of this paper is a first decomposition of the quality-based service selection process, while emphasizing major issues and challenges, which we are addressing in the On-The-Fly Computing project.}},
  author       = {{Jungmann, Alexander and Kleinjohann, Bernd}},
  booktitle    = {{Proceedings of the Fourth International Conferences on Advanced Service Computing (SERVICE COMPUTATION)}},
  pages        = {{43--47}},
  publisher    = {{Xpert Publishing Services}},
  title        = {{{Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition}}},
  year         = {{2012}},
}

@inproceedings{26190,
  abstract     = {{A major goal of the On-The-Fly Computing project is the automated composition of individual services based on services that are available in dynamic markets. Dependent on the granularity of a market, different alternatives that satisfy the requested functional requirements may emerge. In order to select the best solution, services are usually selected with respect to their quality in terms of inherent non-functional properties. In this paper, we describe our idea of how to model this service selection process as a Markov Decision Process, which we in turn intend to solve by means of Reinforcement Learning techniques in order to control the underlying service composition process. In addition, some initial issues with respect to our approach are addressed.}},
  author       = {{Jungmann, Alexander and Kleinjohann, Bernd}},
  booktitle    = {{Proceedings of the 9th IEEE International Conference on Services Computing (SCC)}},
  publisher    = {{IEEE}},
  title        = {{{Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition}}},
  year         = {{2012}},
}

@inproceedings{26212,
  author       = {{Khaluf, Yara and Weiss, Fabian and Micus, Sebastian}},
  booktitle    = {{The 10th IEEE International Symposium on Parallel and Distributed Processing with Applications}},
  title        = {{{Master Election for Time Synchronization in Swarm Robotic Systems}}},
  year         = {{2012}},
}

@inproceedings{26264,
  author       = {{Mathews, Emi and Mathew, Ciby}},
  booktitle    = {{Third International Conference on Networks & Communications, LNICST}},
  publisher    = {{Springer}},
  title        = {{{Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks}}},
  year         = {{2012}},
}

@inproceedings{3812,
  author       = {{Wachsmuth, Henning and Stein, Benno}},
  booktitle    = {{Proceedings of COLING 2012: Posters}},
  pages        = {{1281--1290}},
  title        = {{{Optimal Scheduling of Information Extraction Algorithms}}},
  year         = {{2012}},
}

@inbook{2918,
  author       = {{Kakvi, Saqib and Kiltz, Eike and May, Alexander}},
  booktitle    = {{Advances in Cryptology – ASIACRYPT 2012}},
  isbn         = {{9783642349607}},
  issn         = {{0302-9743}},
  pages        = {{404--414}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Certifying RSA}}},
  doi          = {{10.1007/978-3-642-34961-4_25}},
  year         = {{2012}},
}

@inbook{2919,
  author       = {{Kakvi, Saqib and Kiltz, Eike}},
  booktitle    = {{Advances in Cryptology – EUROCRYPT 2012}},
  isbn         = {{9783642290107}},
  issn         = {{0302-9743}},
  pages        = {{537--553}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Optimal Security Proofs for Full Domain Hash, Revisited}}},
  doi          = {{10.1007/978-3-642-29011-4_32}},
  year         = {{2012}},
}

@inproceedings{2982,
  author       = {{Ackermann, Marcel Rudolf and Märtens, Marcus and Raupach, Christoph and Swierkot, Kamil and Lammersen, Christiane and Sohler, Christian}},
  publisher    = {{ACM}},
  title        = {{{StreamKM++: A clustering algorithm for data streams}}},
  doi          = {{10.1145/2133803.2184450}},
  volume       = {{17}},
  year         = {{2012}},
}

@article{2984,
  abstract     = {{Ich beschreibe die deutsche Enigma-VerschlÃ¼sselungsmaschine und skizziere, wie sie von den Codebrechern von Bletchely Park um Alan Turing gebrochen wurde. Besonderes Augenmerk lege ich auf die BeitrÃ¤ge Alan Turings und die Bedeutung seiner Leistung fÃ¼r die Entwicklung moderner Kryptografie. }},
  author       = {{Blömer, Johannes}},
  issn         = {{1432-122X}},
  journal      = {{Informatik-Spektrum}},
  number       = {{4}},
  title        = {{{Turing und Kryptografie}}},
  doi          = {{10.1007/s00287-012-0622-7}},
  volume       = {{35}},
  year         = {{2012}},
}

@phdthesis{3132,
  author       = {{Jager, Tibor}},
  isbn         = {{978-3-8348-1989-5}},
  publisher    = {{Ruhr University Bochum}},
  title        = {{{On black-box models of computation in cryptology}}},
  year         = {{2012}},
}

@inproceedings{3133,
  author       = {{Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}},
  booktitle    = {{Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}},
  pages        = {{273----293}},
  title        = {{{On the Security of TLS-DHE in the Standard Model}}},
  doi          = {{10.1007/978-3-642-32009-5_17}},
  year         = {{2012}},
}

