Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
5786 Publications
2015 | Conference Paper | LibreCat-ID: 266
Online Resource Leasing
C. Markarian, F. Meyer auf der Heide, in: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 2015, pp. 343–344.
LibreCat
| Files available
| DOI
C. Markarian, F. Meyer auf der Heide, in: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 2015, pp. 343–344.
2015 | Dissertation | LibreCat-ID: 267
Online Resource Leasing
C. Markarian, Online Resource Leasing, Universität Paderborn, 2015.
LibreCat
| Files available
C. Markarian, Online Resource Leasing, Universität Paderborn, 2015.
2015 | Conference Paper | LibreCat-ID: 269
On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach
T. Wiersema, S. Wu, M. Platzner, in: Proceedings of the International Symposium in Reconfigurable Computing (ARC), 2015, pp. 365--372.
LibreCat
| Files available
| DOI
T. Wiersema, S. Wu, M. Platzner, in: Proceedings of the International Symposium in Reconfigurable Computing (ARC), 2015, pp. 365--372.
2015 | Journal Article | LibreCat-ID: 320
Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure
I. Caragiannis, A. Fanelli, N. Gravin, A. Skopalik, Transactions on Economics and Computation 3 (2015).
LibreCat
| Files available
| DOI
I. Caragiannis, A. Fanelli, N. Gravin, A. Skopalik, Transactions on Economics and Computation 3 (2015).
2015 | Mastersthesis | LibreCat-ID: 321
Anonymous credential system based on q-Strong Diffie-Hellman Assumption
F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.
LibreCat
| Files available
F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.
2015 | Conference Paper | LibreCat-ID: 322 |
![Open access file OA](https://ris.uni-paderborn.de/images/access_open.png)
Anonymous and Publicly Linkable Reputation Systems
J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat
| Files available
| DOI
| Download (ext.)
J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
2015 | Journal Article | LibreCat-ID: 323
An approach towards adaptive service composition in markets of composed services
A. Jungmann, F. Mohr, Journal of Internet Services and Applications (2015) 1–18.
LibreCat
| Files available
| DOI
A. Jungmann, F. Mohr, Journal of Internet Services and Applications (2015) 1–18.
2015 | Conference Paper | LibreCat-ID: 324
A Metric for Functional Reusability of Services
F. Mohr, in: Proceedings of the 14th International Conference on Software Reuse (ICSR), 2015, pp. 298--313.
LibreCat
| Files available
| DOI
F. Mohr, in: Proceedings of the 14th International Conference on Software Reuse (ICSR), 2015, pp. 298--313.
2015 | Mastersthesis | LibreCat-ID: 325
A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.
LibreCat
| Files available
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.
2015 | Bachelorsthesis | LibreCat-ID: 326
A group signature scheme based on the LSRW assumption
F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.
LibreCat
F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.
2015 | Journal Article | LibreCat-ID: 327
A deterministic worst-case message complexity optimal solution for resource discovery
S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theoretical Computer Science (2015) 67–79.
LibreCat
| Files available
| DOI
S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theoretical Computer Science (2015) 67–79.
2015 | Bachelorsthesis | LibreCat-ID: 3364
Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten
C. Knorr, Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten, Universität Paderborn, 2015.
LibreCat
C. Knorr, Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten, Universität Paderborn, 2015.
2015 | Conference Paper | LibreCat-ID: 3815
Sentiment Flow - A General Model of Web Review Argumentation
H. Wachsmuth, J. Kiesel, B. Stein, in: J. Tsujii, J. Hajic (Eds.), Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015, pp. 601–611.
LibreCat
| DOI
| Download (ext.)
H. Wachsmuth, J. Kiesel, B. Stein, in: J. Tsujii, J. Hajic (Eds.), Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015, pp. 601–611.
2015 | Book | LibreCat-ID: 3879
Text Analysis Pipelines - Towards Ad-hoc Large-scale Text Mining
H. Wachsmuth, Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining, 2015.
LibreCat
| DOI
H. Wachsmuth, Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining, 2015.
2015 | Journal Article | LibreCat-ID: 290
Grammar-based model transformations: Definition, execution, and quality properties
G. Besova, D. Steenken, H. Wehrheim, Computer Languages, Systems & Structures (2015) 116–138.
LibreCat
| Files available
| DOI
G. Besova, D. Steenken, H. Wehrheim, Computer Languages, Systems & Structures (2015) 116–138.
2015 | Book Chapter | LibreCat-ID: 2921 |
![Open access file OA](https://ris.uni-paderborn.de/images/access_open.png)
Tightly-Secure Signatures from Chameleon Hash Functions
O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.
LibreCat
| DOI
| Download (ext.)
O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.
2015 | Mastersthesis | LibreCat-ID: 297
Evaluation of Pairing Optimization for Embedded Platforms
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms, Universität Paderborn, 2015.
LibreCat
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 299
Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie, Universität Paderborn, 2015.
LibreCat
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 301 |
![Open access file OA](https://ris.uni-paderborn.de/images/access_open.png)
Efficient Verifier-Local Revocation for Anonymous Credentials
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.
LibreCat
| Files available
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 302
Efficient Attributes for Pairing-Based Anonymous Credentials
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.
LibreCat
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.