Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5711 Publications


2009 | Bachelorsthesis | LibreCat-ID: 2896 | OA
Liske, G. (2009). Analyse und Evaluation eines identitätsbasierten Signcryption-Verfahrens.
LibreCat | Files available
 

2009 | Mastersthesis | LibreCat-ID: 2904
Scholz, C. (2009). Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen.
LibreCat | Files available
 

2009 | Dissertation | LibreCat-ID: 2911
Ackermann, M. R. (2009). Algorithms for the Bregman k-Median Problem. Universität Paderborn.
LibreCat | Download (ext.)
 

2009 | Book Chapter | LibreCat-ID: 2920
Kakvi, S. (2009). Reinforcement Learning for Blackjack. In Lecture Notes in Computer Science (pp. 300–301). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2995
Ackermann, M. R., & Blömer, J. (2009). Coresets and Approximate Clustering for Bregman Divergences. In Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 1088–1097). Philadelphia, PA: Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9781611973068.118
LibreCat | DOI
 

2009 | Journal Article | LibreCat-ID: 2999
Blömer, J., & Naewe, S. (2009). Sampling methods for shortest vectors, closest vectors and successive minima. Theoretical Computer Science, (18), 1648–1665. https://doi.org/10.1016/j.tcs.2008.12.045
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 3000
Schrieb, J., Wehrheim, H., & Wonisch, D. (2009). Three-Valued Spotlight Abstractions. In FM 2009: Formal Methods (pp. 106–122). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-05089-3_8
LibreCat | DOI
 

2009 | Conference Paper | LibreCat-ID: 3142
Jager, T., & Schwenk, J. (2009). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. In Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings (pp. 399--416). https://doi.org/10.1007/978-3-642-10366-7_24
LibreCat | DOI
 

2009 | Dissertation | LibreCat-ID: 20937
Meyer, M. (2009). Musterbasiertes Re-Engineering von Softwaresystemen. Universitaetsbibliothek Paderborn.
LibreCat | Download (ext.)
 

2009 | Journal Article | LibreCat-ID: 17453
Meyer auf der Heide, F., & Rammig, F.-J. (2009). Self-Organisation and Self-Optimization. Public Service Review: Science and Technology, 04.
LibreCat
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed