Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

7879 Publications


2015 | Book Chapter | LibreCat-ID: 293
M. Geierhos, F. S. Bäumer, S. Schulze, and V. Stuß, “Filtering Reviews by Random Individual Error,” in Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015), vol. 9101, M. Ali, Y. S. Kwon, C.-H. Lee, J. Kim, and Y. Kim, Eds. Cham, Switzerland: Springer, 2015, pp. 305–315.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 300
C. Neumann, Ein Framework für Fuzzy Service Matching basierend auf Fuzzy Sets. Universität Paderborn, 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 310
M. Bruns, Design of an Evaluation Strategy for Fuzzy Service Matching. Universität Paderborn, 2015.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 3122
T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security of Practical Public-Key Encryption Schemes,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated Key Exchange,” in Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 313
P. Börding, M. Bruns, and M. C. Platenius, “Comprehensive Service Matching with MatchBox,” in 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 315
A. Jungmann, J. Jatzkowski, and B. Kleinjohann, “Combining Service-oriented Computing with Embedded Systems - A Robotics Case Study,” in Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3162
S. Ziegert and H. Wehrheim, “Temporal plans for software architecture reconfiguration,” Computer Science - R & D, no. 3–4, pp. 303--320, 2015.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
R. Meyer and H. Wehrheim, “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog,” in Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, and H. Wehrheim, “Verifying Opacity of a Transactional Mutex Lock,” in {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3165
H. Wehrheim and O. Travkin, “{TSO} to {SC} via Symbolic Execution,” in Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, 2015, pp. 104--119.
LibreCat | DOI
 

2015 | Conference (Editor) | LibreCat-ID: 3166
R. Meyer, A. Platzer, and H. Wehrheim, Eds., Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. 2015.
LibreCat | DOI
 

2015 | Dissertation | LibreCat-ID: 317
C. Jähn, Bewertung von Renderingalgorithmen für komplexe 3-D-Szenen. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 318
Z. Huma, Automatic Service Discovery and Composition for heterogeneous service partners. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 319
F. Mohr, A. Jungmann, and H. Kleine Büning, “Automated Online Service Composition,” in Proceedings of the 12th IEEE International Conference on Services Computing (SCC), 2015, pp. 57--64.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 271
M. Drees, M. Feldotto, S. Riechers, and A. Skopalik, “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games,” in Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT), 2015, pp. 178–189.
LibreCat | Files available | DOI | arXiv
 

2015 | Book | LibreCat-ID: 27120
I. Steinhardt, Lehre stärkt Forschung: Studiengangentwicklung durch ProfessorInnen im Handlungssystem Universität. 2015.
LibreCat
 

Filters and Search Terms

isbn%3D978-3-89336-912-6

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed