@inproceedings{15674, author = {{Kalbitz, Manuela and Voss, Hendrik and Schulte, Carsten}}, booktitle = {{INFOS}}, pages = {{137--146}}, publisher = {{GI}}, title = {{{Informatik begreifen - Zur Nutzung von Veranschaulichungen im Informatikunterricht}}}, volume = {{P-189}}, year = {{2011}}, } @inproceedings{15675, author = {{Schulte, Carsten}}, booktitle = {{INFOS}}, pages = {{47--56}}, publisher = {{GI}}, title = {{{Das Schülerlabor als Ort der Informatiklehrerbildung}}}, volume = {{P-189}}, year = {{2011}}, } @inproceedings{15762, author = {{Dembczynski, K. and Waegeman, W. and Hüllermeier, Eyke}}, booktitle = {{In Proceedings ECML Workshop on Collective inference and Learning on Structured Data, Athens, Greece}}, title = {{{Joint mode estimation in multi-label classification by chaining}}}, year = {{2011}}, } @inproceedings{15764, author = {{Mernberger, M. and Moog, D. and Stork, S. and Zauner, S. and Maier, U. and Hüllermeier, Eyke}}, booktitle = {{In Proceedings GCB-2011 German Conference on Bioinformatics Munich, Germany}}, title = {{{Prediction of protein localization for specialized compartments using time series kernels}}}, year = {{2011}}, } @inproceedings{15885, author = {{Somorovsky, Juraj and Heiderich, Mario and Jensen, Meiko and Schwenk, Jörg and Gruschka, Nils and Lo Iacono, Luigi}}, booktitle = {{Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11}}, isbn = {{9781450310048}}, title = {{{All your clouds are belong to us: security analysis of cloud management interfaces}}}, doi = {{10.1145/2046660.2046664}}, year = {{2011}}, } @inproceedings{15887, author = {{Jensen, Meiko and Meyer, Christopher and Somorovsky, Juraj and Schwenk, Jörg}}, booktitle = {{2011 1st International Workshop on Securing Services on the Cloud (IWSSC)}}, isbn = {{9781457711855}}, title = {{{On the effectiveness of XML Schema validation for countering XML Signature Wrapping attacks}}}, doi = {{10.1109/iwsscloud.2011.6049019}}, year = {{2011}}, } @inproceedings{15915, author = {{Jager, Tibor and Somorovsky, Juraj}}, booktitle = {{Proceedings of the 18th ACM conference on Computer and communications security - CCS '11}}, isbn = {{9781450309486}}, title = {{{How to break XML encryption}}}, doi = {{10.1145/2046707.2046756}}, year = {{2011}}, } @inproceedings{15916, author = {{Meyer, Christopher and Somorovsky, Juraj and Driessen, Benedikt and Schwenk, Jörg and Tran, Thang and Wietfeld, Christian}}, title = {{{Sec2: Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage}}}, year = {{2011}}, } @inproceedings{15046, author = {{Arens, Stephan and Domik, Gitta}}, booktitle = {{INFORMATIK 2011 – 41. Jahrestagung der Gesellschaft für Informatik.}}, isbn = {{978-88579-286-4}}, number = {{324}}, pages = {{347--352}}, publisher = {{Gesellschaft für Informatik e.V.}}, title = {{{Volume Studio: Flexible Multi-Volume Ray Casting Pipeline mit nahtlos integriertem Rapid Prototyping von Shadern.}}}, year = {{2011}}, } @inproceedings{15097, author = {{Benter, Markus and Böttcher, Stefan and Hartel, Rita}}, booktitle = {{East European Conference on Advances in Databases and Information Systems}}, isbn = {{9783642237362}}, issn = {{0302-9743}}, pages = {{27--41}}, publisher = {{Springer}}, title = {{{Mixing Bottom-Up and Top-Down XPath Query Evaluation}}}, doi = {{10.1007/978-3-642-23737-9_3}}, year = {{2011}}, }