Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5947 Publications


2017 | Mastersthesis | LibreCat-ID: 1157
Witschen, Linus Matthias. A Framework for the Synthesis of Approximate Circuits. Universität Paderborn, 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 1158
Seemann, Nina, Marie-Luis Merten, Michaela Geierhos, Doris Tophinke, and Eyke Hüllermeier. “Annotation Challenges for Reconstructing the Structural Elaboration of Middle Low German.” In Proceedings of the Joint SIGHUM Workshop on Computational Linguistics for Cultural Heritage, Social Sciences, Humanities and Literature, 40–45. Stroudsburg, PA, USA: Association for Computational Linguistics (ACL), 2017. https://doi.org/10.18653/v1/W17-2206.
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 116
Liske, Gennadij. CCA-Security for Predicate Encryption Schemes. Universität Paderborn, 2017. https://doi.org/10.17619/UNIPB/1-220.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 17652
Polevoy, Gleb, Stojan Trajanovski, Paola Grosso, and Cees de Laat. “Filtering Undesirable Flows in Networks.” In Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I, 3–17. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-71150-8_1.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 17653
Polevoy, Gleb, and M.M. de Weerdt. “Reciprocation Effort Games.” In Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer, 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 17654
Polevoy, Gleb, and M.M. de Weerdt. “Competition between Cooperative Projects.” In Proceedings of the 29th Benelux Conference on Artificial Intelligence. CCIS. Springer, 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 1767
Mavronicolas, Marios, and Burkhard Monien. “Conditional Value-at-Risk: Structure and Complexity of Equilibria.” In Proceedings of the 10th International Symposium on Algorithmic Game Theory (SAGT 2017), 10504:131--143. LNCS, 2017. https://doi.org/10.1007/978-3-319-66700-3_11.
LibreCat | Files available | DOI
 

2017 | Preprint | LibreCat-ID: 17811
Fischer, Matthias, Daniel Jung, and Friedhelm Meyer auf der Heide. “Gathering Anonymous, Oblivious Robots on a Grid.” ArXiv:1702.03400, 2017.
LibreCat
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken, Nils. “Searchable Encryption with Access Control.” In Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press, 2017. https://doi.org/10.1145/3098954.3098987.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In Foundations and Practice of Security, 3–17. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-75650-9_1.
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In Lecture Notes in Computer Science, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-57586-5_11.
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 20552
Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security by Design.” In Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. https://doi.org/10.1007/978-3-662-52903-4_8-1.
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 20553
Ben Othmane, Lotfi, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and Achim D. Brucker. “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.” Data Science and Engineering 2, no. 2 (2017): 107–24. https://doi.org/10.1007/s41019-016-0019-8.
LibreCat | Files available | DOI
 

2017 | Report | LibreCat-ID: 20554
Bodden, Eric. Self-Adaptive Static Analysis, 2017.
LibreCat | Download (ext.)
 

2017 | Report | LibreCat-ID: 20555
Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. CrySL: Validating Correct Usage of Cryptographic APIs, 2017.
LibreCat | Download (ext.)
 

2017 | Journal Article | LibreCat-ID: 20557
Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time Configuration Options.” IEEE Transactions on Software Engineering PP, no. 99 (2017): 1–1. https://doi.org/10.1109/TSE.2017.2756048.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20558
Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” In International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017.
LibreCat | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20559
Do, Lisa Nguyen Quang, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Just-in-Time Static Analysis.” In Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, 307–17. ISSTA 2017. New York, NY, USA: ACM, 2017. https://doi.org/10.1145/3092703.3092705.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20715
Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” In International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.
LibreCat | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 20792
Schivo, Stefano, Bugra M. Yildiz., Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In Dependable Software Engineering, 3rd International Symposium (SETTA 2017), edited by Kim G. Larsen, Oleg Sokolsky, and Ji Wang, 319–36. Lecture Notes in Computer Science. Changsha: Springer, 2017. https://doi.org/10.1007/978-3-319-69483-2_19.
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed