Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5786 Publications


2017 | Conference Paper | LibreCat-ID: 17652
Polevoy G, Trajanovski S, Grosso P, de Laat C. Filtering Undesirable Flows in Networks. In: Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-71150-8_1
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 17653
Polevoy G, de Weerdt MM. Reciprocation Effort Games. In: Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 17654
Polevoy G, de Weerdt MM. Competition between Cooperative Projects. In: Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 1767
Mavronicolas M, Monien B. Conditional Value-at-Risk: Structure and Complexity of Equilibria. In: Proceedings of the 10th International Symposium on Algorithmic Game Theory (SAGT 2017). Vol 10504. LNCS. ; 2017:131--143. doi:10.1007/978-3-319-66700-3_11
LibreCat | Files available | DOI
 

2017 | Preprint | LibreCat-ID: 17811
Fischer M, Jung D, Meyer auf der Heide F. Gathering Anonymous, Oblivious Robots on a Grid. arXiv:170203400. 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken N. Searchable Encryption with Access Control. In: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press; 2017. doi:10.1145/3098954.3098987
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. Lecture Notes in Computer Science. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:10.1007/978-3-319-57586-5_11
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 20552
Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW, Engels G, Steffen E, eds. Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten. Springer Berlin Heidelberg; 2017:1-24. doi:10.1007/978-3-662-52903-4_8-1
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 20553
Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Data Science and Engineering. 2017;2(2):107-124. doi:https://doi.org/10.1007/s41019-016-0019-8
LibreCat | Files available | DOI
 

2017 | Report | LibreCat-ID: 20554
Bodden E. Self-Adaptive Static Analysis.; 2017.
LibreCat | Download (ext.)
 

2017 | Report | LibreCat-ID: 20555
Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: Validating Correct Usage of Cryptographic APIs.; 2017.
LibreCat | Download (ext.)
 

2017 | Journal Article | LibreCat-ID: 20557
Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. IEEE Transactions on Software Engineering. 2017;PP(99):1-1. doi:10.1109/TSE.2017.2756048
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20558
Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using Cryptography. In: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track. ; 2017.
LibreCat | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20559
Do LNQ, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-time Static Analysis. In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA 2017. ACM; 2017:307-317. doi:10.1145/3092703.3092705
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20715
Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah: Just-in-Time Taint Analysis for Android Apps. In: International Conference for Software Engineering (ICSE), Tool Demonstrations Track. ; 2017.
LibreCat | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20792
Schivo S, Yildiz. BM, Ruijters E, et al. How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In: Larsen KG, Sokolsky O, Wang J, eds. Dependable Software Engineering, 3rd International Symposium (SETTA 2017). Lecture Notes in Computer Science. Springer; 2017:319-336. doi:10.1007/978-3-319-69483-2_19
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 20794
Dziwok S. Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems. Paderborn University; 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 20797
Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities. In: Guerra E, van den Brand M, eds. Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017). Lecture Notes in Computer Science. Springer; 2017:19-34.
LibreCat | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20804
Geismann J, Pohlmann U, Schmelter D. Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. In: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development. ; 2017.
LibreCat
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed