Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5720 Publications


2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 146--168, 2016. https://doi.org/10.1007/978-3-662-53644-5_6.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 336--362, 2016. https://doi.org/10.1007/978-3-662-49096-9_14.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3157
Beringer, Steffen, and Heike Wehrheim. “Verification of AUTOSAR Software Architectures with Timed Automata.” In Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings, edited by Maurice H. ter Beek, Stefania Gnesi, and Alexander Knapp, 189--204. Lecture Notes in Computer Science, 2016. https://doi.org/10.1007/978-3-319-45943-1_13.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 3158
Travkin, Oleg, and Heike Wehrheim. “Verification of Concurrent Programs on Weak Memory Models.” In Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings, edited by Augusto Sampaio and Farn Wang, 3--24. Lecture Notes in Computer Science, 2016. https://doi.org/10.1007/978-3-319-46750-4_1.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3159
Schellhorn, Gerhard, Oleg Travkin, and Heike Wehrheim. “Towards a Thread-Local Proof Technique for Starvation Freedom.” In Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings, edited by Marieke Huisman, 193--209. Lecture Notes in Computer Science, 2016. https://doi.org/10.1007/978-3-319-33693-0_13.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3160
Doherty, Simon, Brijesh Dongol, John Derrick, Gerhard Schellhorn, and Heike Wehrheim. “Proving Opacity of a Pessimistic {STM}.” In 20th International Conference on Principles of Distributed Systems, {OPODIS} 2016, December 13-16, 2016, Madrid, Spain, edited by Panagiota Fatourou, Ernesto Jim{\’{e}}nez, and Fernando Pedone, 35:1--35:17. LIPIcs, 2016. https://doi.org/10.4230/LIPIcs.OPODIS.2016.35.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3161
Isenberg, Tobias, Marie{-}Christine Jakobs, Felix Pauck, and Heike Wehrheim. “Deriving Approximation Tolerance Constraints from Verification Runs.” CoRR, 2016.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 210
Leder, Lennart. Congestion Games with Mixed Objectives. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim, Laurens. Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann, Kai Sören. Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 215
Drees, Maximilian, Robert Gmyr, and Christian Scheideler. “Churn- and DoS-Resistant Overlay Networks Based on Network Reconfiguration.” In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 417--427, 2016. https://doi.org/10.1145/2935764.2935783.
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 175
Walther, Sven, and Heike Wehrheim. “On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs.” Science of Computer Programming, 2016, 2--23. https://doi.org/10.1016/j.scico.2016.04.002.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 17655
Polevoy, Gleb, M.M. de Weerdt, and C.M. Jonker. “The Game of Reciprocation Habits.” In Proceedings of the 2016 European Conference on Artificial Intelligence, Volume 285: ECAI 2016:417–25. Frontiers in Artificial Intelligence and Applications, 2016. https://doi.org/10.3233/978-1-61499-672-9-417.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 17656
Polevoy, Gleb, Mathijs de Weerdt, and Catholijn Jonker. “The Convergence of Reciprocation.” In Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, 1431–32. AAMAS ’16. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 177
Abu-Khzam, Faisal N., Shouwei Li, Christine Markarian, Friedhelm Meyer auf der Heide, and Pavel Podlipyan. “On the Parameterized Parallel Complexity and the Vertex Cover Problem.” In Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA), 477–88. LNCS, 2016. https://doi.org/10.1007/978-3-319-48749-6_35.
LibreCat | Files available | DOI
 

2016 | Special Issue | LibreCat-ID: 187
Meyer auf der Heide, Friedhelm, ed. Introduction to the Special Issue on SPAA 2014. Transactions on Parallel Computing (TOPC), 2016. https://doi.org/10.1145/2936716.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 19
Lass, Michael, Dominik Leibenger, and Christoph Sorge. “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.” In Proc. 41st Conference on Local Computer Networks (LCN). IEEE, 2016. https://doi.org/10.1109/lcn.2016.11.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 190
Platenius, Marie Christin, Ammar Shaker, Matthias Becker, Eyke Hüllermeier, and Wilhelm Schäfer. “Imprecise Matching of Requirements Specifications for Software Services Using Fuzzy Logic.” IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017, no. 8 (2016): 739–59. https://doi.org/10.1109/TSE.2016.2632115.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “A Theoretical Analysis of the Fuzzy K-Means Problem.” In 2016 IEEE 16th International Conference on Data Mining (ICDM), 805–10. IEEE, 2016. https://doi.org/10.1109/icdm.2016.0094.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20556
Bodden, Eric, Ka I Pun, Martin Steffen, Volker Stolz, and Anna-Katharina Wickert. “Information Flow Analysis for Go.” In Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 431–45, 2016. https://doi.org/10.1007/978-3-319-47166-2_30.
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed