Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5792 Publications


2004 | Conference Paper | LibreCat-ID: 19883
Klein, J., & Zachmann, G. (2004). Proximity Graphs for Defining Surfaces over Point Clouds. In Eurographics Symposium on Point-Based Grahics (SPBG’04) (pp. 131–138).
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 19889
Klein, J., & Zachmann, G. (2004). Nice and Fast Implicit Surfaces over Noisy Point Clouds. In SIGGRAPH 2004, Sketches.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 19891
Klein, J., & Zachmann, G. (2004). Point Cloud Collision Detection. In Computer Graphics Forum (Proceedings of EUROGRAPHICS 2004) (pp. 567–576).
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 2415
Plessl, C., & Platzner, M. (2004). Virtualization of Hardware – Introduction and Survey. In Proc. Int. Conf. on Engineering of Reconfigurable Systems and Algorithms (ERSA) (pp. 63–69). CSREA Press.
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 2416
Groppe, S., Böttcher, S., & Birkenheuer, G. (2004). Efficient Querying of Transformed XML Documents. In Proc. Int. Conf. on Enterprise Information Systems (ICEIS) (pp. 241–250).
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 2417
Groppe, S., Böttcher, S., Heckel, R., & Birkenheuer, G. (2004). Using XSLT Stylesheets to Transform XPath Queries. In Proc. East-European Conf. on Advances in Databases and Information Systems (ADBIS).
LibreCat
 

2004 | Conference Paper | LibreCat-ID: 26411
Volbert, K. (2004). Experimental analysis of adjustable sectorized topologies for static ad hoc networks. Proceedings of the 2004 Joint Workshop on Foundations of Mobile Computing  - DIALM-POMC ’04. https://doi.org/10.1145/1022630.1022646
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3233
Wehrheim, H. (2004). Refinement and Consistency in Component Models with Multiple Views. In R. H. Reussner, J. A. Stafford, & C. A. Szyperski (Eds.), Architecting Systems with Trustworthy Components, International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers (pp. 84--102). https://doi.org/10.1007/11786160_5
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3234
Möller, M., Olderog, E.-R., Rasch, H., & Wehrheim, H. (2004). Linking {CSP-OZ} with {UML} and Java: {A} Case Study. In E. A. Boiten, J. Derrick, & G. Smith (Eds.), Integrated Formal Methods, 4th International Conference, {IFM} 2004, Canterbury, UK, April 4-7, 2004, Proceedings (pp. 267--286). https://doi.org/10.1007/978-3-540-24756-2_15
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3235
Wehrheim, H. (2004). Refinement and Consistency in Multiview Models. In J. B{\’{e}}zivin & R. Heckel (Eds.), Language Engineering for Model-Driven Software Development, 29. February - 5. March 2004.
LibreCat
 

2004 | Book Chapter | LibreCat-ID: 3011
Blömer, J., Guajardo, J., & Krummel, V. (2004). Provably Secure Masking of AES. In Selected Areas in Cryptography (pp. 69–83). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-30564-4_5
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3012
Blömer, J., & May, A. (2004). A Generalized Wiener Attack on RSA. In Public Key Cryptography – PKC 2004 (pp. 1–13). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-24632-9_1
LibreCat | Files available | DOI
 

2004 | Book Chapter | LibreCat-ID: 3014
May, A. (2004). Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In Public Key Cryptography – PKC 2004 (pp. 218–230). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-24632-9_16
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3015
May, A. (2004). Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In Advances in Cryptology – CRYPTO 2004 (pp. 213–219). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-28628-8_13
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 3017
Blömer, J., Otto, M., & Seifert, J.-P. (2004). A new CRT-RSA algorithm secure against bellcore attacks. In Proceedings of the 10th ACM conference on Computer and communication security  - CCS ’03. ACM Press. https://doi.org/10.1145/948109.948151
LibreCat | DOI
 

2004 | Report | LibreCat-ID: 26992
Rührup, S., & Schindelhauer, C. (2004). Traffic and Hop Efficient Position-based Routing using a Cell Structure.
LibreCat | Files available
 

2004 | Report | LibreCat-ID: 20933
Niere, J., Meyer, M., & Wendehals, L. (2004). User-driven adaption in rule-based pattern recognition.
LibreCat
 

2004 | Journal Article | LibreCat-ID: 2119
Kolman, P., & Scheideler, C. (2004). Simple On-Line Algorithms for the Maximum Disjoint Paths Problem. Algorithmica, (3), 209--233. https://doi.org/10.1007/s00453-004-1086-1
LibreCat | DOI
 

2004 | Conference Paper | LibreCat-ID: 2120 | OA
Awerbuch, B., & Scheideler, C. (2004). Group Spreading: A Protocol for Provably Secure Distributed Name Service. In ICALP (Vol. 3142, pp. 183--195).
LibreCat | Files available
 

2004 | Conference Paper | LibreCat-ID: 2121 | OA
Riley, C., & Scheideler, C. (2004). A Distributed Hash Table for Computational Grids. In IPDPS.
LibreCat | Files available
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed