Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5937 Publications


2007 | Conference (Editor) | LibreCat-ID: 2027
P. B. Gibbons and C. Scheideler, Eds., SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallelism in Algorithms and Architectures, San Diego, California, USA, June 9-11, 2007. ACM, 2007.
LibreCat
 

2007 | Book Chapter | LibreCat-ID: 2028
A. W. Richa and C. Scheideler, “Overlay Networks for Peer-to-Peer Networks,” in Handbook of Approximation Algorithms and Metaheuristics., 2007.
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 24276
M. Bienkowski and J. Kutyłowski, “The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces,” 2007, doi: 10.1007/978-3-540-73951-7_30.
LibreCat | DOI
 

2007 | Book | LibreCat-ID: 24366
P. Mahlmann and C. Schindelhauer, Peer-to-Peer-Netzwerke. Berlin: Springer, 2007.
LibreCat | DOI
 

2007 | Journal Article | LibreCat-ID: 3211
J. Derrick and H. Wehrheim, “On using data abstractions for model checking refinements,” Acta Inf., no. 1, pp. 41--71, 2007.
LibreCat | DOI
 

2007 | Journal Article | LibreCat-ID: 3212
B. Metzler and H. Wehrheim, “Extending a Component Specification Language with Time,” Electr. Notes Theor. Comput. Sci., no. 2, pp. 47--67, 2007.
LibreCat | DOI
 

2007 | Journal Article | LibreCat-ID: 3213
H. .-}Christian Estler, T. Ruhroth, and H. Wehrheim, “Modelchecking Correctness of Refactorings - Some Experiments,” Electr. Notes Theor. Comput. Sci., pp. 3--17, 2007.
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3214
G. Engels, B. Güldali, C. Soltenborn, and H. Wehrheim, “Assuring Consistency of Business Process Models and Web Services Using Visual Contracts,” in Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers, 2007, pp. 17--31.
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3215
G. Engels, C. Soltenborn, and H. Wehrheim, “Analysis of {UML} Activities Using Dynamic Meta Modeling,” in Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 76--90.
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3216
T. Ruhroth and H. Wehrheim, “Refactoring Object-Oriented Specifications with Data and Processes,” in Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, 2007, pp. 236--251.
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3221
W. Schäfer and H. Wehrheim, “The Challenges of Building Advanced Mechatronic Systems,” in International Conference on Software Engineering, {ISCE} 2007, Workshop on the Future of Software Engineering, {FOSE} 2007, May 23-25, 2007, Minneapolis, MN, {USA}, 2007, pp. 72--84.
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3222
J. Derrick, G. Schellhorn, and H. Wehrheim, “Proving Linearizability Via Non-atomic Refinement,” in Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings, 2007, pp. 195--214.
LibreCat | DOI
 

2007 | Dissertation | LibreCat-ID: 2912
V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn, 2007.
LibreCat | Download (ext.)
 

2007 | Book Chapter | LibreCat-ID: 3002 | OA
J. Blömer and V. Krummel, “Analysis of Countermeasures Against Access Driven Cache Attacks on AES,” in Selected Areas in Cryptography, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 96–109.
LibreCat | DOI | Download (ext.)
 

2007 | Book Chapter | LibreCat-ID: 3019
A. May, “Cryptanalysis of Unbalanced RSA with Small CRT-Exponent,” in Advances in Cryptology — CRYPTO 2002, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 242–256.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3020
J. Blömer and A. May, “Low Secret Exponent RSA Revisited,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 4–19.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3021
J. Blömer and A. May, “Key Revocation with Interval Cover Families,” in Selected Areas in Cryptography, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 325–341.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3022
A. May and J. H. Silverman, “Dimension Reduction Methods for Convolution Modular Lattices,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 110–125.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3026
J. Blömer, “A Probabilistic Zero-Test for Expressions Involving Roots of Rational Numbers,” in Algorithms — ESA’ 98, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 151–162.
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 20949
A. Delic, Z. Avdagic, W. Schäfer, D. Boskovic, and M. Meyer, “Program evaluation using fuzzy logic with bad smells as inputs,” 2007.
LibreCat
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed