Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
5943 Publications
2015 | Dissertation | LibreCat-ID: 26534
Klompmaker, Florian. Development of a Structured Process of Interaction Design for {\ “U} r Nat {\” U} Local User Interfaces. Universit {\ "a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science: Universitaetsbibliothek Paderborn, 2015.
LibreCat
2015 | Conference Paper | LibreCat-ID: 26536
Schild, Christian, and Vanessa Petrausch. “Empirical Validation of Design Patterns.” In Human and Computer 2015 - Proceedings, 173–82. Berlin: De Gruyter Oldenbourg, 2015.
LibreCat
2015 | Conference Paper | LibreCat-ID: 266
Markarian, Christine, and Friedhelm Meyer auf der Heide. “Online Resource Leasing.” In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 343–44, 2015. https://doi.org/10.1145/2767386.2767454.
LibreCat
| Files available
| DOI
2015 | Dissertation | LibreCat-ID: 267
Markarian, Christine. Online Resource Leasing. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 269
Wiersema, Tobias, Sen Wu, and Marco Platzner. “On-The-Fly Verification of Reconfigurable Image Processing Modules Based on a Proof-Carrying Hardware Approach.” In Proceedings of the International Symposium in Reconfigurable Computing (ARC), 365--372. LNCS, 2015. https://doi.org/10.1007/978-3-319-16214-0_32.
LibreCat
| Files available
| DOI
2015 | Journal Article | LibreCat-ID: 320
Caragiannis, Ioannis, Angelo Fanelli, Nick Gravin, and Alexander Skopalik. “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure.” Transactions on Economics and Computation 3, no. 1 (2015). https://doi.org/10.1145/2614687.
LibreCat
| Files available
| DOI
2015 | Mastersthesis | LibreCat-ID: 321
Eidens, Fabian. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 322 |

Blömer, Johannes, Jakob Juhnke, and Christina Kolb. “Anonymous and Publicly Linkable Reputation Systems.” In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 478--488. LNCS, 2015. https://doi.org/10.1007/978-3-662-47854-7_29.
LibreCat
| Files available
| DOI
| Download (ext.)
2015 | Journal Article | LibreCat-ID: 323
Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” Journal of Internet Services and Applications, no. 1 (2015): 1–18. https://doi.org/10.1186/s13174-015-0022-8.
LibreCat
| Files available
| DOI
2015 | Conference Paper | LibreCat-ID: 324
Mohr, Felix. “A Metric for Functional Reusability of Services.” In Proceedings of the 14th International Conference on Software Reuse (ICSR), 298--313. LNCS, 2015. https://doi.org/10.1007/978-3-319-14130-5_21.
LibreCat
| Files available
| DOI
2015 | Mastersthesis | LibreCat-ID: 325
Löken, Nils. A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff, Frederic. A Group Signature Scheme Based on the LSRW Assumption. Universität Paderborn, 2015.
LibreCat
2015 | Journal Article | LibreCat-ID: 327
Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” Theoretical Computer Science, 2015, 67–79. https://doi.org/10.1016/j.tcs.2014.11.027.
LibreCat
| Files available
| DOI
2015 | Bachelorsthesis | LibreCat-ID: 3364
Knorr, Christoph. Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten. Universität Paderborn, 2015.
LibreCat
2015 | Conference Paper | LibreCat-ID: 3815
Wachsmuth, Henning, Johannes Kiesel, and Benno Stein. “Sentiment Flow - A General Model of Web Review Argumentation.” In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, edited by Junichi Tsujii and Jan Hajic, 601–11. Lecture Notes in Computer Science, 2015. https://doi.org/10.18653/v1/D15-1072.
LibreCat
| DOI
| Download (ext.)
2015 | Book | LibreCat-ID: 3879
Wachsmuth, Henning. Text Analysis Pipelines - Towards Ad-Hoc Large-Scale Text Mining. Lecture Notes in Computer Science, 2015. http://dx.doi.org/10.1007/978-3-319-25741-9.
LibreCat
| DOI
2015 | Journal Article | LibreCat-ID: 290
Besova, Galina, Dominik Steenken, and Heike Wehrheim. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, 2015, 116–38. https://doi.org/10.1016/j.cl.2015.05.003.
LibreCat
| Files available
| DOI
2015 | Book Chapter | LibreCat-ID: 2921 |

Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In Lecture Notes in Computer Science, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. https://doi.org/10.1007/978-3-662-46447-2_12.
LibreCat
| DOI
| Download (ext.)
2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, Martin. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 299
Gerken, Britta. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat