Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

264 Publications


2016 | Book Chapter | LibreCat-ID: 6257
Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed. Human-Centered and Error-Resilient Systems Development. Vol 9856. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41. doi:10.1007/978-3-319-44902-9_3
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2978
Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15897
Altmeier C, Mainka C, Somorovsky J, Schwenk J. AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Lecture Notes in Computer Science 9481. Cham; 2015. doi:10.1007/978-3-319-29883-2_5
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 15899
Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security -- ESORICS 2015. Cham; 2015. doi:10.1007/978-3-319-24174-6_21
LibreCat | DOI | Download (ext.)
 

2015 | Conference Paper | LibreCat-ID: 15088
Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line Tree Grammars. In: Data Science - 30th British International Conference on Databases, BICOD 2015. Springer; 2015:186-198. doi:10.1007/978-3-319-20424-6_18
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 25338
Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: Modeling and Using Context. ; 2015. doi:10.1007/978-3-319-25591-0_12
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 25337
Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: Modeling and Using Context. ; 2015. doi:10.1007/978-3-319-25591-0_12
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 20008
Hamann H, Valentini G. Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014). Cham; 2014. doi:10.1007/978-3-319-09952-1_15
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 20982
Koch T, Holtmann J, DeAntoni J. Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In: Software Architecture. Cham; 2014. doi:10.1007/978-3-319-09970-5_14
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed