Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
6035 Publications
2013 | Conference Paper | LibreCat-ID: 20160
Hamann H. A Reductionist Approach to Hypothesis-Catching for the Analysis of Self-Organizing Decision-Making Systems. In: 7th IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2013). IEEE Press; 2013:227-236. doi:10.1109/SASO.2013.10
LibreCat
| DOI
2013 | Conference Paper | LibreCat-ID: 20161
Hamann H, Lio P, Miglino O, Nicosia G, Nolfi S, Pavone M. Speciation Dynamics: Generating Selective Pressure Towards Diversity. In: 12th European Conference on Artificial Life (ECAL 2013). MIT Press; 2013.
LibreCat
2013 | Journal Article | LibreCat-ID: 20162
Hamann H. Towards Swarm Calculus: Urn Models of Collective Decisions and Universal Properties of Swarm Performance. Swarm Intelligence. 2013;7(3):145-172. doi:10.1007/s11721-013-0080-0
LibreCat
| DOI
2013 | Bachelorsthesis | LibreCat-ID: 2868
Laudemann S. Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten.; 2013.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 2869
Leder L. Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken.; 2013.
LibreCat
2013 | Journal Article | LibreCat-ID: 25740
He D, Müller W. A heuristic energy-aware approach for hard real-time systems on multi-core platforms. Microprocessors and Microsystems - Embedded Hardware Design 37(6-7). Published online 2013:845-857.
LibreCat
2013 | Book (Editor) | LibreCat-ID: 25741
Schirner G, Götz M, Rettberg A, Zanella MC, Rammig F-J, eds. Embedded Systems: Design, Analysis and Verification. Proceedings of the 4th IFIP TC10 International Embedded Systems Symposium, IESS 2013, Paderborn, Germany, June 2013. Springer; 2013.
LibreCat
2013 | Conference Paper | LibreCat-ID: 25742
Khaluf L, Rammig F-J. Organic Programming of Real-Time Operating Systems. In: The Ninth International Conference on Autonomic and Autonomous Systems. ; 2013.
LibreCat
2013 | Book Chapter | LibreCat-ID: 25743
Anacker H, Dellnitz M, Flaßkamp K, et al. Methods for the Design and Development. In: Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future. Springer-Verlag; 2013:187-356.
LibreCat
2013 | Conference Paper | LibreCat-ID: 3813
Wachsmuth H, Stein B, Engels G. Learning Efficient Information Extraction on Heterogeneous Texts. In: Gelbukh A, ed. Proceedings of the Sixth International Joint Conference on Natural Language Processing. Lecture Notes in Computer Science. ; 2013:534-542.
LibreCat
| Download (ext.)
2013 | Conference Paper | LibreCat-ID: 3814
Wachsmuth H, Stein B, Engels G. Information Extraction as a Filtering Task. In: Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management. ; 2013:2049-2058.
LibreCat
| Download (ext.)
2013 | Conference Paper | LibreCat-ID: 3876
Wachsmuth H, Rose M, Engels G. Automatic Pipeline Construction for Real-Time Annotation. In: Gelbukh A, ed. 14th International Conference on Intelligent Text Processing and Computational Linguistics. Lecture Notes in Computer Science. ; 2013:38-49.
LibreCat
| Download (ext.)
2013 | Dissertation | LibreCat-ID: 2909
Kuntze D. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn; 2013.
LibreCat
| Download (ext.)
2013 | Report | LibreCat-ID: 2917
Juhnke J, Lefmann H, Strehl V. An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI; 2013.
LibreCat
2013 | Book Chapter | LibreCat-ID: 2979
Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: Constructive Side-Channel Analysis and Secure Design. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:10.1007/978-3-642-40026-1_10
LibreCat
| DOI
2013 | Journal Article | LibreCat-ID: 3129
Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y
LibreCat
| DOI
2013 | Conference Paper | LibreCat-ID: 3130
Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. ; 2013:461--485. doi:10.1007/978-3-642-38348-9_28
LibreCat
| DOI
2013 | Conference Paper | LibreCat-ID: 3131
Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. ; 2013.
LibreCat
2013 | Conference Paper | LibreCat-ID: 3176
Isenberg T, Steenken D, Wehrheim H. Bounded Model Checking of Graph Transformation Systems via {SMT} Solving. In: Beyer D, Boreale M, eds. Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings. Lecture Notes in Computer Science. ; 2013:178--192. doi:10.1007/978-3-642-38592-6_13
LibreCat
| DOI
2013 | Conference Paper | LibreCat-ID: 3177
Travkin O, Mütze A, Wehrheim H. {SPIN} as a Linearizability Checker under Weak Memory Models. In: Bertacco V, Legay A, eds. Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings. Lecture Notes in Computer Science. ; 2013:311--326. doi:10.1007/978-3-319-03077-7_21
LibreCat
| DOI