Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5774 Publications


2016 | Journal Article | LibreCat-ID: 3161
T. Isenberg, M.-}Christine Jakobs, F. Pauck, and H. Wehrheim, “Deriving approximation tolerance constraints from verification runs,” CoRR, 2016.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 210
L. Leder, Congestion Games with Mixed Objectives. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
L. Porzenheim, Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
K. S. Bemmann, Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 215
M. Drees, R. Gmyr, and C. Scheideler, “Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration,” in Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427.
LibreCat | Files available | DOI
 

2016 | Journal Article | LibreCat-ID: 175
S. Walther and H. Wehrheim, “On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs,” Science of Computer Programming, pp. 2--23, 2016.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 17655
G. Polevoy, M. M. de Weerdt, and C. M. Jonker, “The Game of Reciprocation Habits,” in Proceedings of the 2016 European Conference on Artificial Intelligence, 2016, vol. Volume 285: ECAI 2016, pp. 417–425.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 17656
G. Polevoy, M. de Weerdt, and C. Jonker, “The Convergence of Reciprocation,” in Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, 2016, pp. 1431–1432.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 177
F. N. Abu-Khzam, S. Li, C. Markarian, F. Meyer auf der Heide, and P. Podlipyan, “On the Parameterized Parallel Complexity and the Vertex Cover Problem,” in Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 477–488.
LibreCat | Files available | DOI
 

2016 | Special Issue | LibreCat-ID: 187
F. Meyer auf der Heide, Ed., Introduction to the Special Issue on SPAA 2014, no. 1. 2016.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 19
M. Lass, D. Leibenger, and C. Sorge, “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension,” in Proc. 41st Conference on Local Computer Networks (LCN), 2016.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 190
M. C. Platenius, A. Shaker, M. Becker, E. Hüllermeier, and W. Schäfer, “Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic,” IEEE Transactions on Software Engineering (TSE), presented at ICSE 2017, no. 8, pp. 739–759, 2016.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 2367
J. Blömer, S. Brauer, and K. Bujna, “A Theoretical Analysis of the Fuzzy K-Means Problem,” in 2016 IEEE 16th International Conference on Data Mining (ICDM), Barcelona, Spain, 2016, pp. 805–810.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20556
E. Bodden, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert, “Information Flow Analysis for Go,” in Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 2016, pp. 431–445, doi: 10.1007/978-3-319-47166-2_30.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 207
A. Mäcker, M. Malatyali, F. Meyer auf der Heide, and S. Riechers, “Cost-efficient Scheduling on Machines from the Cloud,” in Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 578--592.
LibreCat | Files available | DOI
 

2016 | Conference Paper | LibreCat-ID: 20716
E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert, “Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go,” 2016.
LibreCat | Download (ext.)
 

2016 | Report | LibreCat-ID: 20717
L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, Just-in-Time Static Analysis. 2016.
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 20718
S. Rasthofer, S. Arzt, E. Bodden, and M. Miltenberger, “Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen,” Datenschutz und Datensicherheit, pp. 718–722, 2016, doi: https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536.
LibreCat | DOI | Download (ext.)
 

2016 | Conference Paper | LibreCat-ID: 20719
P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790, doi: http://doi.acm.org/10.1145/2976749.2978361.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20720
A. Follner et al., “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution,” in International Workshop on Security and Trust Management (STM), 2016, pp. 212–228.
LibreCat | Download (ext.)
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed