Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

13161 Publications


2015 | Conference Paper | LibreCat-ID: 16262
Wang Z, Zinn C, Tröster T. Intrinsische Herstellung hybrider Strukturkomponenten in einem modifizierten RTM-Prozess. In: ; 2015.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 16058
Waegeman W, Dembczynski K, Jachnik A, Cheng W, Hüllermeier E. On the Bayes-optimality of F-measure maximizers. Journal of Machine Learning Research. 2015;15:3313-3368.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 16104
Bartley T, Walmsley IA. Directly comparing entanglement-enhancing non-Gaussian operations. New Journal of Physics. 2015. doi:10.1088/1367-2630/17/2/023038
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 16135
Frantz M, Lauter C, Wang Z, Tröster T. Bestimmung und Optimierung von Eigenspannungen in hybriden Werkstoffsystemen aus Metall und Faserverbundkunststoff (FVK). In: Verlag Stahleisen GmbH; 2015:139-144.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 15858
Tse YC, Chan CKP, Luk MH, et al. A population-competition model for analyzing transverse optical patterns including optical control and structural anisotropy. New Journal of Physics. 2015. doi:10.1088/1367-2630/17/8/083054
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 15860
Denis J-C, Schumacher S, Hedley GJ, et al. Subpicosecond Exciton Dynamics in Polyfluorene Films from Experiment and Microscopic Theory. The Journal of Physical Chemistry C. 2015:9734-9744. doi:10.1021/acs.jpcc.5b00680
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15911
Kupser D, Mainka C, Schwenk J, Somorovsky J. How to Break XML Encryption -- Automatically. In: 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15). Washington, D.C.: {USENIX} Association; 2015.
LibreCat | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 1772
Torresen J, Plessl C, Yao X. Self-Aware and Self-Expressive Systems – Guest Editor’s Introduction. IEEE Computer. 2015;48(7):18-20. doi:10.1109/MC.2015.205
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 2042
Krimphove D, Barth S. The PRIPPS Agreement and its economic-institutional impact on EU-Member-States. Rivista di studi politici Internazionali. 2015;Vol. 82(Nr. 2):217 – 227.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 2047
Krimphove D. Banken- und Wirtschaftskrisen als „Motor“ der Entwicklung des Bank- und Kapitalmarktrechts“. Zeitschrift für das gesamte Kreditwesen, . 2015;(Heft 22):1115 – 1123.
LibreCat
 

2015 | Conference (Editor) | LibreCat-ID: 1854
Scheideler C, ed. Structural Information and Communication Complexity - 22nd International Colloquium, SIROCCO 2015, Montserrat, Spain, July 14-16, 2015, Post-Proceedings.; 2015. doi:10.1007/978-3-319-25258-2
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 16642
Ober-Blöbaum S, Padberg-Gehle K. Multiobjective optimal control of fluid mixing. PAMM. 2015:639-640. doi:10.1002/pamm.201510309
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 228
Fahr R, Mir Djawadi B. “…and they are really lying”: Clean Evidence on the Pervasiveness of Cheating in Professional Contexts from a Field Experiment. Journal of Economic Psychology. 2015:48-59. doi:10.1016/j.joep.2015.03.002
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 230
John T, Kundisch D. Why Fit Leads to Surprise: An Extension of Cognitive Fit Theory to Creative Problems. In: Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, USA. ; 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 235
Strotmeyer S. Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung. Universität Paderborn; 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 242
Koutsopoulos A, Scheideler C, Strothmann TF. Towards a Universal Approach for the Finite Departure Problem in Overlay Networks. In: Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS). Lecture Notes in Computer Science. ; 2015:201-216. doi:10.1007/978-3-319-21741-3_14
LibreCat | Files available | DOI
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter P. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. ; 2015:407--425. doi:10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3165
Wehrheim H, Travkin O. {TSO} to {SC} via Symbolic Execution. In: Piterman N, ed. Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings. Lecture Notes in Computer Science. ; 2015:104--119. doi:10.1007/978-3-319-26287-1_7
LibreCat | DOI
 

2015 | Dissertation | LibreCat-ID: 317
Jähn C. Bewertung von Renderingalgorithmen für komplexe 3-D-Szenen. Universität Paderborn; 2015.
LibreCat | Files available
 

Filters and Search Terms

status=public

Search

Filter Publications

Display / Sort

Sorted by: Publishing Year
Citation Style: AMA

Export / Embed