Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5786 Publications


2004 | Conference Paper | LibreCat-ID: 19800
A. Brinkmann, K. Salzwedel, and M. Vodisek, “A case for virtualized arrays of RAID,” in Proceedings of the international workshop on Storage network architecture and parallel I/Os - SNAPI ’04, 2004, pp. 9–16.
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 19807
C. Schindelhauer, S. Böttcher, and F. Rammig, “The design of PaMaNet the Paderborn mobile ad-hoc network,” in Proceedings of the second international workshop on Mobility management & wireless access protocols, 2004.
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 19851
P. Bleckmann, G. Schomaker, and A. Slowik, “Virtualization with prefetching abilities based on iSCSI,” in Proceeding of International Workshop on Storage Network Architecture and Parallel I/O, 2004, no. 2, pp. 40–47, doi: 10.1145/1162628.1162634.
LibreCat | DOI
 

2004 | Journal Article | LibreCat-ID: 19879
J. Klein and G. Zachmann, “Point Cloud Surfaces using Geometric Proximity Graphs,” Computers and Graphics, vol. 28, no. 6, pp. 839–850, 2004.
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 19883
J. Klein and G. Zachmann, “Proximity Graphs for Defining Surfaces over Point Clouds,” in Eurographics Symposium on Point-Based Grahics (SPBG’04), 2004, pp. 131–138.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 19889
J. Klein and G. Zachmann, “Nice and Fast Implicit Surfaces over Noisy Point Clouds,” in SIGGRAPH 2004, Sketches, 2004.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 19891
J. Klein and G. Zachmann, “Point Cloud Collision Detection,” in Computer Graphics Forum (Proceedings of EUROGRAPHICS 2004), 2004, pp. 567–576.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 2415
C. Plessl and M. Platzner, “Virtualization of Hardware – Introduction and Survey,” in Proc. Int. Conf. on Engineering of Reconfigurable Systems and Algorithms (ERSA), 2004, pp. 63–69.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 2416
S. Groppe, S. Böttcher, and G. Birkenheuer, “Efficient Querying of Transformed XML Documents,” in Proc. Int. Conf. on Enterprise Information Systems (ICEIS), 2004, pp. 241–250.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 2417
S. Groppe, S. Böttcher, R. Heckel, and G. Birkenheuer, “Using XSLT Stylesheets to Transform XPath Queries,” in Proc. East-European Conf. on Advances in Databases and Information Systems (ADBIS), 2004.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 26411
K. Volbert, “Experimental analysis of adjustable sectorized topologies for static ad hoc networks,” 2004, doi: 10.1145/1022630.1022646.
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3233
H. Wehrheim, “Refinement and Consistency in Component Models with Multiple Views,” in Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers, 2004, pp. 84--102.
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3234
M. Möller, E.-R. Olderog, H. Rasch, and H. Wehrheim, “Linking {CSP-OZ} with {UML} and Java: {A} Case Study,” in Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings, 2004, pp. 267--286.
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3235
H. Wehrheim, “Refinement and Consistency in Multiview Models,” in Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004, 2004.
LibreCat
 

2004 | Book Chapter | LibreCat-ID: 3011
J. Blömer, J. Guajardo, and V. Krummel, “Provably Secure Masking of AES,” in Selected Areas in Cryptography, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 69–83.
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3012
J. Blömer and A. May, “A Generalized Wiener Attack on RSA,” in Public Key Cryptography – PKC 2004, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 1–13.
LibreCat | Files available | DOI
 

2004 | Book Chapter | LibreCat-ID: 3014
A. May, “Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q,” in Public Key Cryptography – PKC 2004, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 218–230.
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3015
A. May, “Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring,” in Advances in Cryptology – CRYPTO 2004, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 213–219.
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3017
J. Blömer, M. Otto, and J.-P. Seifert, “A new CRT-RSA algorithm secure against bellcore attacks,” in Proceedings of the 10th ACM conference on Computer and communication security  - CCS ’03, 2004.
LibreCat | DOI
 

2004 | Report | LibreCat-ID: 26992
S. Rührup and C. Schindelhauer, Traffic and Hop Efficient Position-based Routing using a Cell Structure. Heinz Nixdorf Institut, Universität Paderborn, 2004.
LibreCat | Files available
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed