Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9931 Publications


2016 | Conference Paper | LibreCat-ID: 3160
Doherty, S., Dongol, B., Derrick, J., Schellhorn, G., & Wehrheim, H. (2016). Proving Opacity of a Pessimistic {STM}. In P. Fatourou, E. Jim{\’{e}}nez, & F. Pedone (Eds.), 20th International Conference on Principles of Distributed Systems, {OPODIS} 2016, December 13-16, 2016, Madrid, Spain (pp. 35:1--35:17). https://doi.org/10.4230/LIPIcs.OPODIS.2016.35
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3161
Isenberg, T., Jakobs, M.-}Christine, Pauck, F., & Wehrheim, H. (2016). Deriving approximation tolerance constraints from verification runs. CoRR.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 210
Leder, L. (2016). Congestion Games with Mixed Objectives. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim, L. (2016). Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann, K. S. (2016). Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 215
Drees, M., Gmyr, R., & Scheideler, C. (2016). Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration. In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (pp. 417--427). https://doi.org/10.1145/2935764.2935783
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 175
Walther, S., & Wehrheim, H. (2016). On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs. Science of Computer Programming, 2--23. https://doi.org/10.1016/j.scico.2016.04.002
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 17655
Polevoy, G., de Weerdt, M. M., & Jonker, C. M. (2016). The Game of Reciprocation Habits. In Proceedings of the 2016 European Conference on Artificial Intelligence (Vol. Volume 285: ECAI 2016, pp. 417–425). https://doi.org/10.3233/978-1-61499-672-9-417
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 17656
Polevoy, G., de Weerdt, M., & Jonker, C. (2016). The Convergence of Reciprocation. In Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems (pp. 1431–1432). Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 177
Abu-Khzam, F. N., Li, S., Markarian, C., Meyer auf der Heide, F., & Podlipyan, P. (2016). On the Parameterized Parallel Complexity and the Vertex Cover Problem. In Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA) (pp. 477–488). https://doi.org/10.1007/978-3-319-48749-6_35
LibreCat | Files available | DOI
 

2016 | Special Issue | LibreCat-ID: 187
Meyer auf der Heide, F. (Ed.). (2016). Introduction to the Special Issue on SPAA 2014. Transactions on Parallel Computing (TOPC). https://doi.org/10.1145/2936716
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 19
Lass, M., Leibenger, D., & Sorge, C. (2016). Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In Proc. 41st Conference on Local Computer Networks (LCN). IEEE. https://doi.org/10.1109/lcn.2016.11
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 190
Platenius, M. C., Shaker, A., Becker, M., Hüllermeier, E., & Schäfer, W. (2016). Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic. IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017, (8), 739–759. https://doi.org/10.1109/TSE.2016.2632115
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer, J., Brauer, S., & Bujna, K. (2016). A Theoretical Analysis of the Fuzzy K-Means Problem. In 2016 IEEE 16th International Conference on Data Mining (ICDM) (pp. 805–810). Barcelona, Spain: IEEE. https://doi.org/10.1109/icdm.2016.0094
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20556
Bodden, E., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Information Flow Analysis for Go. Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 431–445. https://doi.org/10.1007/978-3-319-47166-2_30
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 207
Mäcker, A., Malatyali, M., Meyer auf der Heide, F., & Riechers, S. (2016). Cost-efficient Scheduling on Machines from the Cloud. In Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA) (pp. 578--592). https://doi.org/10.1007/978-3-319-48749-6_42
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 20716
Bodden, E., Eichberg, M., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. Nordic Workshop on Programming Theory (NWPT’16).
LibreCat | Download (ext.)
 

2016 | Report | LibreCat-ID: 20717
Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., & Murphy-Hill, E. (2016). Just-in-Time Static Analysis. http://dx.doi.org/10.7939/DVN/10859
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20718
Rasthofer, S., Arzt, S., Bodden, E., & Miltenberger, M. (2016). Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. Datenschutz Und Datensicherheit, 718–722. https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20719
Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361
LibreCat | DOI
 

Filters and Search Terms

department=34

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed