Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
5786 Publications
2016 | Conference Paper | LibreCat-ID: 3801
K. Al-Khatib, H. Wachsmuth, M. Hagen, J. Köhler, and B. Stein, “Cross-Domain Mining of Argumentative Text through Distant Supervision,” in Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2016, pp. 1395–1404.
LibreCat
| DOI
| Download (ext.)
2016 | Conference Paper | LibreCat-ID: 3816
H. Wachsmuth, K. Al Khatib, and B. Stein, “Using Argument Mining to Assess the Argumentation Quality of Essays,” in Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers, 2016, pp. 1680–1691.
LibreCat
| Download (ext.)
2016 | Conference Paper | LibreCat-ID: 3880
H. Wachsmuth, “Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse,” in Ausgezeichnete Informatikdissertationen 2015, 2016, pp. 329–338.
LibreCat
| Download (ext.)
2016 | Preprint | LibreCat-ID: 2969 |
![Open access file OA](https://ris.uni-paderborn.de/images/access_open.png)
J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.
LibreCat
| Download (ext.)
2016 | Report | LibreCat-ID: 2971
J. Blömer and P. Günther, Effizienz und Sicherheit paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
2016 | Journal Article | LibreCat-ID: 3114
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” PoPETs, no. 3, pp. 62--82, 2016.
LibreCat
2016 | Conference Paper | LibreCat-ID: 3115
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 3117
C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 3118
D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 3157
S. Beringer and H. Wehrheim, “Verification of AUTOSAR Software Architectures with Timed Automata,” in Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings, 2016, pp. 189--204.
LibreCat
| Files available
| DOI
2016 | Conference Paper | LibreCat-ID: 3158
O. Travkin and H. Wehrheim, “Verification of Concurrent Programs on Weak Memory Models,” in Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings, 2016, pp. 3--24.
LibreCat
| DOI