Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9804 Publications


2016 | Conference Paper | LibreCat-ID: 3801
Al-Khatib, K., Wachsmuth, H., Hagen, M., Köhler, J., & Stein, B. (2016). Cross-Domain Mining of Argumentative Text through Distant Supervision. In Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (pp. 1395–1404). https://doi.org/10.18653/v1/N16-1165
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 3816
Wachsmuth, H., Al Khatib, K., & Stein, B. (2016). Using Argument Mining to Assess the Argumentation Quality of Essays. In Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers (pp. 1680–1691).
LibreCat | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 3834
Konoshonkin, A., Borovoi, A., Kustova, N., Okamoto, H., Ishimoto, H., Grynko, Y., & Förstner, J. (2016). Light scattering by ice crystals of cirrus clouds: From exact numerical methods to physical-optics approximation. Journal of Quantitative Spectroscopy and Radiative Transfer, 195, 132–140. https://doi.org/10.1016/j.jqsrt.2016.12.024
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3840
Konoshonkin, A. V., Kustova, N. V., Borovoi, A. G., Okamoto, H., Sato, K., Ishimoto, H., … Förstner, J. (2016). Comparison between the physical-optics approximation and exact methods solving the problem of light scattering by ice crystals of cirrus clouds. In G. G. Matvienko & O. A. Romanovskii (Eds.), 22nd International Symposium on Atmospheric and Ocean Optics: Atmospheric Physics. SPIE. https://doi.org/10.1117/12.2248409
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3841 | OA
Quiring, W., Jonas, B., Förstner, J., Rai, A. K., Reuter, D., Wieck, A. D., & Zrenner, A. (2016). Phase sensitive properties and coherent manipulation of a photonic crystal microcavity. Optics Express, 24(18), 20672–20684. https://doi.org/10.1364/oe.24.020672
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3843
Grynko, Y., Shkuratov, Y., & Förstner, J. (2016). Light scattering by irregular particles much larger than the wavelength with wavelength-scale surface roughness. Optics Letters, 41(15), 3491–3493. https://doi.org/10.1364/ol.41.003491
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3849
Konoshonkin, A. V., Kustova, N. V., Borovoi, A. G., Grynko, Y., & Förstner, J. (2016). Light scattering by ice crystals of cirrus clouds: comparison of the physical optics methods. Journal of Quantitative Spectroscopy and Radiative Transfer, 182, 12–23. https://doi.org/10.1016/j.jqsrt.2016.05.006
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3880
Wachsmuth, H. (2016). Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse. In Ausgezeichnete Informatikdissertationen 2015 (pp. 329–338).
LibreCat | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 3884 | OA
Kou, Y., & Förstner, J. (2016). Discrete plasmonic solitons in graphene-coated nanowire arrays. Optics Express, 24(5), 4714. https://doi.org/10.1364/oe.24.004714
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 3886
Alberti, J., Linnenbank, H., Linden, S., Grynko, Y., & Förstner, J. (2016). The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials. Applied Physics B, 122(2), 45–50. https://doi.org/10.1007/s00340-015-6311-x
LibreCat | Files available | DOI
 

2016 | Mastersthesis | LibreCat-ID: 2898
Weis, E. (2016). Searchable Encryption.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer, J., & Günther, P. (2016). Singular Curve Point Decompression Attack. In 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE. https://doi.org/10.1109/fdtc.2015.17
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer and Information Sciences (pp. 151–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32859-1_13
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering (pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
Blömer, J., Brauer, S., & Bujna, K. (2016). Hard-Clustering with Gaussian Mixture Models. Computing Research Repository.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
Blömer, J., & Günther, P. (2016). Effizienz und Sicherheit paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops.
LibreCat
 

2016 | Journal Article | LibreCat-ID: 3112
Hofheinz, D., & Jager, T. (2016). Tightly secure signatures and public-key encryption. Des. Codes Cryptography, (1), 29--61. https://doi.org/10.1007/s10623-015-0062-x
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3113
Heuer, F., Jager, T., Schäge, S., & Kiltz, E. (2016). Selective opening security of practical public-key encryption schemes. IET Information Security, (6), 304--318. https://doi.org/10.1049/iet-ifs.2015.0507
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3114
Jager, T., & Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. PoPETs, (3), 62--82.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., & Zhandry, M. (2016). How to Generate and Use Universal Samplers. In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (pp. 715--744). https://doi.org/10.1007/978-3-662-53890-6_24
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Horst, M., Grothe, M., Jager, T., & Schwenk, J. (2016). Breaking PPTP VPNs via RADIUS Encryption. In Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (pp. 159--175). https://doi.org/10.1007/978-3-319-48965-0_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3117
Bader, C., Jager, T., Li, Y., & Schäge, S. (2016). On the Impossibility of Tight Cryptographic Reductions. In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (pp. 273--304). https://doi.org/10.1007/978-3-662-49896-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz, D., Jager, T., & Rupp, A. (2016). Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II (pp. 146--168). https://doi.org/10.1007/978-3-662-53644-5_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz, D., & Jager, T. (2016). Verifiable Random Functions from Standard Assumptions. In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (pp. 336--362). https://doi.org/10.1007/978-3-662-49096-9_14
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3157
Beringer, S., & Wehrheim, H. (2016). Verification of AUTOSAR Software Architectures with Timed Automata. In M. H. ter Beek, S. Gnesi, & A. Knapp (Eds.), Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings (pp. 189--204). https://doi.org/10.1007/978-3-319-45943-1_13
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3158
Travkin, O., & Wehrheim, H. (2016). Verification of Concurrent Programs on Weak Memory Models. In A. Sampaio & F. Wang (Eds.), Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings (pp. 3--24). https://doi.org/10.1007/978-3-319-46750-4_1
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3159
Schellhorn, G., Travkin, O., & Wehrheim, H. (2016). Towards a Thread-Local Proof Technique for Starvation Freedom. In M. Huisman (Ed.), Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings (pp. 193--209). https://doi.org/10.1007/978-3-319-33693-0_13
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3160
Doherty, S., Dongol, B., Derrick, J., Schellhorn, G., & Wehrheim, H. (2016). Proving Opacity of a Pessimistic {STM}. In P. Fatourou, E. Jim{\’{e}}nez, & F. Pedone (Eds.), 20th International Conference on Principles of Distributed Systems, {OPODIS} 2016, December 13-16, 2016, Madrid, Spain (pp. 35:1--35:17). https://doi.org/10.4230/LIPIcs.OPODIS.2016.35
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3161
Isenberg, T., Jakobs, M.-}Christine, Pauck, F., & Wehrheim, H. (2016). Deriving approximation tolerance constraints from verification runs. CoRR.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 210
Leder, L. (2016). Congestion Games with Mixed Objectives. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim, L. (2016). Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann, K. S. (2016). Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 215
Drees, M., Gmyr, R., & Scheideler, C. (2016). Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration. In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (pp. 417--427). https://doi.org/10.1145/2935764.2935783
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 175
Walther, S., & Wehrheim, H. (2016). On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs. Science of Computer Programming, 2--23. https://doi.org/10.1016/j.scico.2016.04.002
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 17655
Polevoy, G., de Weerdt, M. M., & Jonker, C. M. (2016). The Game of Reciprocation Habits. In Proceedings of the 2016 European Conference on Artificial Intelligence (Vol. Volume 285: ECAI 2016, pp. 417–425). https://doi.org/10.3233/978-1-61499-672-9-417
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 17656
Polevoy, G., de Weerdt, M., & Jonker, C. (2016). The Convergence of Reciprocation. In Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems (pp. 1431–1432). Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 177
Abu-Khzam, F. N., Li, S., Markarian, C., Meyer auf der Heide, F., & Podlipyan, P. (2016). On the Parameterized Parallel Complexity and the Vertex Cover Problem. In Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA) (pp. 477–488). https://doi.org/10.1007/978-3-319-48749-6_35
LibreCat | Files available | DOI
 

2016 | Special Issue | LibreCat-ID: 187
Meyer auf der Heide, F. (Ed.). (2016). Introduction to the Special Issue on SPAA 2014. Transactions on Parallel Computing (TOPC). https://doi.org/10.1145/2936716
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 19
Lass, M., Leibenger, D., & Sorge, C. (2016). Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In Proc. 41st Conference on Local Computer Networks (LCN). IEEE. https://doi.org/10.1109/lcn.2016.11
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 190
Platenius, M. C., Shaker, A., Becker, M., Hüllermeier, E., & Schäfer, W. (2016). Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic. IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017, (8), 739–759. https://doi.org/10.1109/TSE.2016.2632115
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer, J., Brauer, S., & Bujna, K. (2016). A Theoretical Analysis of the Fuzzy K-Means Problem. In 2016 IEEE 16th International Conference on Data Mining (ICDM) (pp. 805–810). Barcelona, Spain: IEEE. https://doi.org/10.1109/icdm.2016.0094
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20556
Bodden, E., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Information Flow Analysis for Go. Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 431–445. https://doi.org/10.1007/978-3-319-47166-2_30
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 207
Mäcker, A., Malatyali, M., Meyer auf der Heide, F., & Riechers, S. (2016). Cost-efficient Scheduling on Machines from the Cloud. In Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA) (pp. 578--592). https://doi.org/10.1007/978-3-319-48749-6_42
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 20716
Bodden, E., Eichberg, M., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. Nordic Workshop on Programming Theory (NWPT’16).
LibreCat | Download (ext.)
 

2016 | Report | LibreCat-ID: 20717
Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., & Murphy-Hill, E. (2016). Just-in-Time Static Analysis. http://dx.doi.org/10.7939/DVN/10859
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20718
Rasthofer, S., Arzt, S., Bodden, E., & Miltenberger, M. (2016). Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. Datenschutz Und Datensicherheit, 718–722. https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20720
Follner, A., Bartel, A., Peng, H., Chang, Y.-C., Ispoglou, K., Payer, M., & Bodden, E. (2016). PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. International Workshop on Security and Trust Management (STM), 212–228.
LibreCat | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20721
Nguyen Quang Do, L., Eichberg, M., & Bodden, E. (2016). Toward an Automated Benchmark Management System. Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 13–17.
LibreCat | Download (ext.)
 

Filters and Search Terms

department=34

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed