Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9877 Publications


2007 | Book Chapter | LibreCat-ID: 2028
W. Richa A, Scheideler C. Overlay Networks for Peer-to-Peer Networks. In: Handbook of Approximation Algorithms and Metaheuristics. ; 2007. doi:10.1201/9781420010749.ch72
LibreCat | DOI
 

2007 | Book Review | LibreCat-ID: 28782
Müller M. Review of “studio d A1” and “Lagune 1” from a pronunciation perspective. Electronic Journal of Foreign Language Teaching. 2007;4(2):267-273.
LibreCat
 

2007 | Conference Paper | LibreCat-ID: 24276
Bienkowski M, Kutyłowski J. The k-Resource Problem on Uniform and on Uniformly Decomposable Metric Spaces. In: Lecture Notes in Computer Science. ; 2007. doi:10.1007/978-3-540-73951-7_30
LibreCat | DOI
 

2007 | Book | LibreCat-ID: 24366
Mahlmann P, Schindelhauer C. Peer-to-Peer-Netzwerke. Springer; 2007. doi:10.1007/978-3-540-33992-2
LibreCat | DOI
 

2007 | Journal Article | LibreCat-ID: 3211
Derrick J, Wehrheim H. On using data abstractions for model checking refinements. Acta Inf. 2007;(1):41--71. doi:10.1007/s00236-007-0042-3
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3214
Engels G, Güldali B, Soltenborn C, Wehrheim H. Assuring Consistency of Business Process Models and Web Services Using Visual Contracts. In: Sch{\"{u}}rr A, Nagl M, Z{\"{u}}ndorf A, eds. Applications of Graph Transformations with Industrial Relevance, Third International Symposium, {AGTIVE} 2007, Kassel, Germany, October 10-12, 2007, Revised Selected and Invited Papers. Lecture Notes in Computer Science. ; 2007:17--31. doi:10.1007/978-3-540-89020-1_2
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3215
Engels G, Soltenborn C, Wehrheim H. Analysis of {UML} Activities Using Dynamic Meta Modeling. In: M. Bonsangue M, Broch Johnsen E, eds. Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings. Lecture Notes in Computer Science. ; 2007:76--90. doi:10.1007/978-3-540-72952-5_5
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3216
Ruhroth T, Wehrheim H. Refactoring Object-Oriented Specifications with Data and Processes. In: M. Bonsangue M, Broch Johnsen E, eds. Formal Methods for Open Object-Based Distributed Systems, 9th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings. Lecture Notes in Computer Science. ; 2007:236--251. doi:10.1007/978-3-540-72952-5_15
LibreCat | DOI
 

2007 | Conference Paper | LibreCat-ID: 3222
Derrick J, Schellhorn G, Wehrheim H. Proving Linearizability Via Non-atomic Refinement. In: Davies J, Gibbons J, eds. Integrated Formal Methods, 6th International Conference, {IFM} 2007, Oxford, UK, July 2-5, 2007, Proceedings. Lecture Notes in Computer Science. ; 2007:195--214. doi:10.1007/978-3-540-73210-5_11
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3293
Gries T. Global Shift – The European Union, the United States, and the Emergence of China. In: Tilly R, Welfens PJJ, Heise M, eds. 50 Years of EU Economic Dynamics. Springer; 2007:25-45.
LibreCat
 

2007 | Book Chapter | LibreCat-ID: 3002 | OA
Blömer J, Krummel V. Analysis of Countermeasures Against Access Driven Cache Attacks on AES. In: Selected Areas in Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:96-109. doi:10.1007/978-3-540-77360-3_7
LibreCat | DOI | Download (ext.)
 

2007 | Book Chapter | LibreCat-ID: 3019
May A. Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. In: Advances in Cryptology — CRYPTO 2002. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:242-256. doi:10.1007/3-540-45708-9_16
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3020
Blömer J, May A. Low Secret Exponent RSA Revisited. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:4-19. doi:10.1007/3-540-44670-2_2
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3021
Blömer J, May A. Key Revocation with Interval Cover Families. In: Selected Areas in Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:325-341. doi:10.1007/3-540-45537-x_26
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3022
May A, Silverman JH. Dimension Reduction Methods for Convolution Modular Lattices. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:110-125. doi:10.1007/3-540-44670-2_10
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3026
Blömer J. A Probabilistic Zero-Test for Expressions Involving Roots of Rational Numbers. In: Algorithms — ESA’ 98. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007:151-162. doi:10.1007/3-540-68530-8_13
LibreCat | DOI
 

2007 | Journal Article | LibreCat-ID: 27138
Libuda L, Alexy U, Sichert-Hellert W, et al. Pattern of beverage consumption and long-term association with body-weight status in German adolescents – results from the DONALD study. British Journal of Nutrition. Published online 2007:1370-1379. doi:10.1017/s0007114507862362
LibreCat | DOI
 

2007 | Book | LibreCat-ID: 1106 | OA
Geierhos M. Grammatik der Menschenbezeichner in biographischen Kontexten. Vol 2. 1st ed. München: Ludwig-Maximilians-Universität; 2007.
LibreCat | Download (ext.)
 

2007 | Conference Paper | LibreCat-ID: 1107
Bsiri S, Geierhos M. Informationsextraktion aus Stellenanzeigen im Internet. In: Hinneburg A, ed. LWA 2007: Lernen - Wissen - Adaption, Halle, September 2007, Workshop Proceedings. Halle-Wittenberg, Germany: Martin-Luther-University; 2007:229-236.
LibreCat
 

2007 | Book Chapter | LibreCat-ID: 17846
Mindt I. The valency of experiential and evaluative adjectives. In: Herbst T, Götz-Votteler K, eds. Valency. Theoretical, Descriptive and Cognitive  Issues. Berlin: Mouton de Gruyter; 2007:101-115.
LibreCat
 

Filters and Search Terms

isbn%3D978-1-939133-24-3

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed