Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
11566 Publications
2016 | Journal Article | LibreCat-ID: 3841 |
![Open access file OA](https://ris.uni-paderborn.de/images/access_open.png)
W. Quiring et al., “Phase sensitive properties and coherent manipulation of a photonic crystal microcavity,” Optics Express, vol. 24, no. 18, pp. 20672–20684, 2016.
LibreCat
| Files available
| DOI
2016 | Conference Paper | LibreCat-ID: 3880
H. Wachsmuth, “Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse,” in Ausgezeichnete Informatikdissertationen 2015, 2016, pp. 329–338.
LibreCat
| Download (ext.)
2016 | Book Chapter | LibreCat-ID: 28995
B. Eickelmann, J. Gerick, K. Drossel, and W. Bos, “Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven,” in ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen, B. Eickelmann, J. Gerick, K. Drossel, and W. Bos, Eds. Münster: Waxmann, 2016.
LibreCat
2016 | Preprint | LibreCat-ID: 2969 |
![Open access file OA](https://ris.uni-paderborn.de/images/access_open.png)
J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.
LibreCat
| Download (ext.)
2016 | Report | LibreCat-ID: 2971
J. Blömer and P. Günther, Effizienz und Sicherheit paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
2016 | Journal Article | LibreCat-ID: 3114
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” PoPETs, no. 3, pp. 62--82, 2016.
LibreCat
2016 | Conference Paper | LibreCat-ID: 3115
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 3117
C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 3118
D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 3157
S. Beringer and H. Wehrheim, “Verification of AUTOSAR Software Architectures with Timed Automata,” in Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings, 2016, pp. 189--204.
LibreCat
| Files available
| DOI
2016 | Conference Paper | LibreCat-ID: 3158
O. Travkin and H. Wehrheim, “Verification of Concurrent Programs on Weak Memory Models,” in Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings, 2016, pp. 3--24.
LibreCat
| DOI