Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9941 Publications


2017 | Conference Paper | LibreCat-ID: 3155
Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses. In: Duan Z, Ong L, eds. Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi’an, China, November 13-17, 2017, Proceedings. Lecture Notes in Computer Science. ; 2017:362--378. doi:10.1007/978-3-319-68690-5_22
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3156
König J, Wehrheim H. Value-Based or Conflict-Based? Opacity Definitions for STMs. In: Van Hung D, Kapur D, eds. Theoretical Aspects of Computing - {ICTAC} 2017 - 14th International Colloquium, Hanoi, Vietnam, October 23-27, 2017, Proceedings. Lecture Notes in Computer Science. ; 2017:118--135. doi:10.1007/978-3-319-67729-3_8
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2741
Ali Ashraf S, Wang Y-PE, Eldessoki S, et al. From Radio Design to System Evaluations for Ultra-Reliable and Low-Latency Communication . In: Dresden: Proceedings of 23th European Wireless Conference 2017, 17- 19.05.2017; 2017.
LibreCat | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 112
Feldotto M, Leder L, Skopalik A. Congestion Games with Complementarities. In: Proceedings of the 10th International Conference on Algorithms and Complexity (CIAC). LNCS. ; 2017:222--233. doi:10.1007/978-3-319-57586-5_19
LibreCat | Files available | DOI | arXiv
 

2017 | Conference Paper | LibreCat-ID: 113
Feldotto M, Gairing M, Kotsialou G, Skopalik A. Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games. In: Proceedings of the 13th International Conference on Web and Internet Economics (WINE). ; 2017. doi:10.1007/978-3-319-71924-5_14
LibreCat | Files available | DOI | arXiv
 

2017 | Conference Paper | LibreCat-ID: 114
Jakobs M-C, Wehrheim H. Compact Proof Witnesses. In: Barrett C, Davies M, Kahsai T, eds. NASA Formal Methods: 9th International Symposium. Lecture Notes in Computer Science. ; 2017:389-403. doi:10.1007/978-3-319-57288-8_28
LibreCat | Files available | DOI
 

2017 | Conference Paper | LibreCat-ID: 115
Jakobs M-C, Krämer J, van Straaten D, Lettmann T. Certification Matters for Service Markets. In: Marcelo De Barros, Janusz Klink,Tadeus Uhl TP, ed. The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION). ; 2017:7-12.
LibreCat | Files available
 

2017 | Mastersthesis | LibreCat-ID: 1157
Witschen LM. A Framework for the Synthesis of Approximate Circuits. Universität Paderborn; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 1158
Seemann N, Merten M-L, Geierhos M, Tophinke D, Hüllermeier E. Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German. In: Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature. Stroudsburg, PA, USA: Association for Computational Linguistics (ACL); 2017:40-45. doi:10.18653/v1/W17-2206
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 116
Liske G. CCA-Security for Predicate Encryption Schemes. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-220
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 17652
Polevoy G, Trajanovski S, Grosso P, de Laat C. Filtering Undesirable Flows in Networks. In: Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-71150-8_1
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 17653
Polevoy G, de Weerdt MM. Reciprocation Effort Games. In: Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 17654
Polevoy G, de Weerdt MM. Competition between Cooperative Projects. In: Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 1767
Mavronicolas M, Monien B. Conditional Value-at-Risk: Structure and Complexity of Equilibria. In: Proceedings of the 10th International Symposium on Algorithmic Game Theory (SAGT 2017). Vol 10504. LNCS. ; 2017:131--143. doi:10.1007/978-3-319-66700-3_11
LibreCat | Files available | DOI
 

2017 | Preprint | LibreCat-ID: 17811
Fischer M, Jung D, Meyer auf der Heide F. Gathering Anonymous, Oblivious Robots on a Grid. arXiv:170203400. 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken N. Searchable Encryption with Access Control. In: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press; 2017. doi:10.1145/3098954.3098987
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. Lecture Notes in Computer Science. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:10.1007/978-3-319-57586-5_11
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 20552
Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW, Engels G, Steffen E, eds. Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten. Springer Berlin Heidelberg; 2017:1-24. doi:10.1007/978-3-662-52903-4_8-1
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 20553
Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Data Science and Engineering. 2017;2(2):107-124. doi:https://doi.org/10.1007/s41019-016-0019-8
LibreCat | Files available | DOI
 

Filters and Search Terms

department=34

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed