Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

143 Publications


2013 | Book Chapter | LibreCat-ID: 6276
Klompmaker, F., Paelke, V., & Fischer, H. G. (2013). A Taxonomy-Based Approach towards NUI Interaction Design. In Distributed, Ambient, and Pervasive Interactions (Vol. 8028, pp. 32–41). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-39351-8_4
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 15093
Böttcher, S., Hartel, R., & Jacobs, T. (2013). Fast Multi-update Operations on Compressed XML Data. In Big Data - 29th British National Conference on Databases, BNCOD 2013, (pp. 149–164). Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-39467-6_15
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 16407
Petring, R., Eikel, B., Jähn, C., Fischer, M., & Meyer auf der Heide, F. (2013). Real-Time 3D Rendering of Heterogeneous Scenes. In Advances in Visual Computing. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41914-0_44
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 16448
Kempkes, B., & Meyer auf der Heide, F. (2012). Local, Self-organizing Strategies for Robotic Formation Problems. In Algorithms for Sensor Systems. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28209-6_2
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi, S., Kiltz, E., & May, A. (2012). Certifying RSA. In Advances in Cryptology – ASIACRYPT 2012 (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi, S., & Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In Advances in Cryptology – EUROCRYPT 2012 (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

2012 | Book Chapter | LibreCat-ID: 16445
Kempkes, B., & Meyer auf der Heide, F. (2012). Continuous Local Strategies for Robotic Formation Problems. In Experimental Algorithms. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30850-5_2
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 15891
Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security – ESORICS 2012. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_43
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 16408
Süß, T., Koch, C., Jähn, C., Fischer, M., & Meyer auf der Heide, F. (2012). Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes. In Advances in Visual Computing. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33179-4_48
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 16516
Baier, R., & Molo, M. H. (2012). Newton’s Method and Secant Method for Set-Valued Mappings. In Large-Scale Scientific Computing. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29843-1_9
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed