Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5786 Publications


2015 | Conference Paper | LibreCat-ID: 266
Markarian, C., & Meyer auf der Heide, F. (2015). Online Resource Leasing. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC) (pp. 343–344). https://doi.org/10.1145/2767386.2767454
LibreCat | Files available | DOI
 

2015 | Dissertation | LibreCat-ID: 267
Markarian, C. (2015). Online Resource Leasing. Universität Paderborn.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 269
Wiersema, T., Wu, S., & Platzner, M. (2015). On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach. In Proceedings of the International Symposium in Reconfigurable Computing (ARC) (pp. 365--372). https://doi.org/10.1007/978-3-319-16214-0_32
LibreCat | Files available | DOI
 

2015 | Journal Article | LibreCat-ID: 320
Caragiannis, I., Fanelli, A., Gravin, N., & Skopalik, A. (2015). Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure. Transactions on Economics and Computation, 3(1). https://doi.org/10.1145/2614687
LibreCat | Files available | DOI
 

2015 | Mastersthesis | LibreCat-ID: 321
Eidens, F. (2015). Anonymous credential system based on q-Strong Diffie-Hellman Assumption. Universität Paderborn.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer, J., Juhnke, J., & Kolb, C. (2015). Anonymous and Publicly Linkable Reputation Systems. In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC) (pp. 478--488). https://doi.org/10.1007/978-3-662-47854-7_29
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 323
Jungmann, A., & Mohr, F. (2015). An approach towards adaptive service composition in markets of composed services. Journal of Internet Services and Applications, (1), 1–18. https://doi.org/10.1186/s13174-015-0022-8
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 324
Mohr, F. (2015). A Metric for Functional Reusability of Services. In Proceedings of the 14th International Conference on Software Reuse (ICSR) (pp. 298--313). https://doi.org/10.1007/978-3-319-14130-5_21
LibreCat | Files available | DOI
 

2015 | Mastersthesis | LibreCat-ID: 325
Löken, N. (2015). A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff, F. (2015). A group signature scheme based on the LSRW assumption. Universität Paderborn.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 327
Kniesburges, S., Koutsopoulos, A., & Scheideler, C. (2015). A deterministic worst-case message complexity optimal solution for resource discovery. Theoretical Computer Science, 67–79. https://doi.org/10.1016/j.tcs.2014.11.027
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 3364
Knorr, C. (2015). Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten. Universität Paderborn.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 3815
Wachsmuth, H., Kiesel, J., & Stein, B. (2015). Sentiment Flow - A General Model of Web Review Argumentation. In J. Tsujii & J. Hajic (Eds.), Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (pp. 601–611). https://doi.org/10.18653/v1/D15-1072
LibreCat | DOI | Download (ext.)
 

2015 | Book | LibreCat-ID: 3879
Wachsmuth, H. (2015). Text Analysis Pipelines - Towards Ad-hoc Large-scale Text Mining. http://dx.doi.org/10.1007/978-3-319-25741-9
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 290
Besova, G., Steenken, D., & Wehrheim, H. (2015). Grammar-based model transformations: Definition, execution, and quality properties. Computer Languages, Systems & Structures, 116–138. https://doi.org/10.1016/j.cl.2015.05.003
LibreCat | Files available | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, M. (2015). Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, B. (2015). Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, J. (2015). Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, C. (2015). Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn.
LibreCat
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed