Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

10484 Publications


2017 | Conference Paper | LibreCat-ID: 113
Feldotto M, Gairing M, Kotsialou G, Skopalik A. Computing Approximate Pure Nash Equilibria in Shapley Value Weighted Congestion Games. In: Proceedings of the 13th International Conference on Web and Internet Economics (WINE). ; 2017. doi:10.1007/978-3-319-71924-5_14
LibreCat | Files available | DOI | arXiv
 

2017 | Conference Paper | LibreCat-ID: 114
Jakobs M-C, Wehrheim H. Compact Proof Witnesses. In: Barrett C, Davies M, Kahsai T, eds. NASA Formal Methods: 9th International Symposium. Lecture Notes in Computer Science. ; 2017:389-403. doi:10.1007/978-3-319-57288-8_28
LibreCat | Files available | DOI
 

2017 | Conference Paper | LibreCat-ID: 115
Jakobs M-C, Krämer J, van Straaten D, Lettmann T. Certification Matters for Service Markets. In: Marcelo De Barros, Janusz Klink,Tadeus Uhl TP, ed. The Ninth International Conferences on Advanced Service Computing (SERVICE COMPUTATION). ; 2017:7-12.
LibreCat | Files available
 

2017 | Mastersthesis | LibreCat-ID: 1157
Witschen LM. A Framework for the Synthesis of Approximate Circuits. Universität Paderborn; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 1158
Seemann N, Merten M-L, Geierhos M, Tophinke D, Hüllermeier E. Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German. In: Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature. Stroudsburg, PA, USA: Association for Computational Linguistics (ACL); 2017:40-45. doi:10.18653/v1/W17-2206
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 116
Liske G. CCA-Security for Predicate Encryption Schemes. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-220
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 17652
Polevoy G, Trajanovski S, Grosso P, de Laat C. Filtering Undesirable Flows in Networks. In: Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-71150-8_1
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 17653
Polevoy G, de Weerdt MM. Reciprocation Effort Games. In: Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 17654
Polevoy G, de Weerdt MM. Competition between Cooperative Projects. In: Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 1767
Mavronicolas M, Monien B. Conditional Value-at-Risk: Structure and Complexity of Equilibria. In: Proceedings of the 10th International Symposium on Algorithmic Game Theory (SAGT 2017). Vol 10504. LNCS. ; 2017:131--143. doi:10.1007/978-3-319-66700-3_11
LibreCat | Files available | DOI
 

2017 | Preprint | LibreCat-ID: 17811
Fischer M, Jung D, Meyer auf der Heide F. Gathering Anonymous, Oblivious Robots on a Grid. arXiv:170203400. 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken N. Searchable Encryption with Access Control. In: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press; 2017. doi:10.1145/3098954.3098987
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. Lecture Notes in Computer Science. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:10.1007/978-3-319-57586-5_11
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 20552
Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW, Engels G, Steffen E, eds. Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten. Springer Berlin Heidelberg; 2017:1-24. doi:10.1007/978-3-662-52903-4_8-1
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 20553
Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Data Science and Engineering. 2017;2(2):107-124. doi:https://doi.org/10.1007/s41019-016-0019-8
LibreCat | Files available | DOI
 

2017 | Report | LibreCat-ID: 20554
Bodden E. Self-Adaptive Static Analysis.; 2017.
LibreCat | Download (ext.)
 

2017 | Report | LibreCat-ID: 20555
Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: Validating Correct Usage of Cryptographic APIs.; 2017.
LibreCat | Download (ext.)
 

2017 | Journal Article | LibreCat-ID: 20557
Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. IEEE Transactions on Software Engineering. 2017;PP(99):1-1. doi:10.1109/TSE.2017.2756048
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20558
Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using Cryptography. In: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track. ; 2017.
LibreCat | Download (ext.)
 

Filters and Search Terms

department=34

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed