Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

13552 Publications


2013 | Conference Paper | LibreCat-ID: 15665
Bennedsen, J., & Schulte, C. (2013). Object Interaction Competence Model v. 2.0. In LaTiCE (pp. 9–16). IEEE Computer Society.
LibreCat
 

2013 | Journal Article | LibreCat-ID: 1705
Ruth, M., Zentgraf, T., & Meier, C. (2013). Blue-green emitting microdisks using low-temperature-grown ZnO on patterned silicon substrates. Optics Express, 21(21). https://doi.org/10.1364/oe.21.025517
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 1786
Kasap, S., & Redif, S. (2013). FPGA Implementation of a Second-Order Convolutive Blind Signal Separation Algorithm. In Proc. IEEE Signal Processing and Communications Conf. (SUI). IEEE. https://doi.org/10.1109/SIU.2013.6531530
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 1793
Meister, D., Brinkmann, A., & Süß, T. (2013). File Recipe Compression in Data Deduplication Systems. In Proc. USENIX Conference on File and Storage Technologies (FAST) (pp. 175–182). USENIX Association.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2032
Krimphove, D. (2013). Kartellrecht der Versicherungswirtschaft (Syst. VI) . In J. Busche & A. Röhling (Eds.), Kölner Kommentar zum Kartellrecht Bd. 4 (pp. 1165 – 1218). Köln: Carl Heymanns Verlag KG.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2037
Krimphove, D. (2013). AT 7 der MaComp: Das Verhältnis §§ 33 WpHG ff. zu § 25a KWG . In D. Krimphove & O. Kruse (Eds.), Kommentar: MaComp  Mindestanforderungen an die Compliance-Funktion und die weiteren Verhaltens-, Organisations- und Transparenzpflichten nach §§ 31 ff. WpHG für Wertpapierdienstleistungsunternehmen (pp. 76 – 88). München: C.H. Beck.
LibreCat
 

2013 | Conference (Editor) | LibreCat-ID: 16834
Domik-Kienegger, G., & Owen, S. (Eds.). (2013). Animatronics Workshop: A Theater + Engineering Collaboration at a High School (Vol. 33, pp. 9–13). https://doi.org/10.1109/MCG.2013.86
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 1798
Keller, M., Robbert, C., & Peuster, M. (2013). An evaluation testbed for adaptive, topology-aware deployment of elastic applications. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM .
LibreCat | Download (ext.)
 

2013 | Journal Article | LibreCat-ID: 1868
W. Richa, A., Scheideler, C., Schmid, S., & Zhang, J. (2013). Competitive throughput in multi-hop wireless networks despite adaptive jamming. Distributed Computing, (3), 159--171. https://doi.org/10.1007/s00446-012-0180-x
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 1870
Mohd Nor, R., Nesterenko, M., & Scheideler, C. (2013). Corona:  A stabilizing deterministic message-passing skip list. Theor. Comput. Sci., 119--129. https://doi.org/10.1016/j.tcs.2012.08.029
LibreCat | DOI
 

2013 | Working Paper | LibreCat-ID: 2739
Dimant, E., Krieger, T., & Redlin, M. (2013). A crook is a crook ... but is he still a crook abroad? On the effect of immigration on destination-country corruption (Vol. 2013–03). Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg.
LibreCat | Download (ext.)
 

2013 | Conference Paper | LibreCat-ID: 2753
Mutter, T. (2013). Do Non-Monetary Incentive Systems Matter? Evidence From the Restructuring of a Non-Monetary Incentive System in an Online Community. In Proceedings of the 21st European Conference on Information Systems (ECIS). Utrecht, Netherlands.
LibreCat
 

2013 | Report | LibreCat-ID: 2917
Juhnke, J., Lefmann, H., & Strehl, V. (2013). An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI.
LibreCat
 

2013 | Journal Article | LibreCat-ID: 2962
Schmitz, H., & Stroka, M. A. (2013). Health and the double burden of full-time work and informal care provision—Evidence from administrative data. Labour Economics, 305--322.
LibreCat
 

2013 | Journal Article | LibreCat-ID: 3129
Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat
 

2013 | Conference Paper | LibreCat-ID: 3179
Ziegert, S., & Wehrheim, H. (2013). Temporal Reconfiguration Plans for Self-Adaptive Systems. In S. Kowalewski & B. Rumpe (Eds.), Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen (pp. 271--284).
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer, J., Günther, P., & Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In Constructive Side-Channel Analysis and Secure Design (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40026-1_10
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 4103
Dogan, M., Kemper, R. M., & Lindner, J. (2013). Dewetting and Redistribution of an Au Catalyst on Nanopatterned 3C-SiC/Si (001) Surfaces. Presented at the MRS Fall Meeting 2013, Boston.
LibreCat
 

2013 | Conference Paper | LibreCat-ID: 4110
Riedl, T., & Lindner, J. (2013). Self-organized Fabrication of Periodic Nanocolumn Arrays on GaAs Surfaces. Presented at the MRS Fall Meeting 2013, Boston (USA).
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed