Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

264 Publications


2016 | Book Chapter | LibreCat-ID: 6257
Fischer, H. G., & Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-44902-9_3
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2978
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 15899
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI | Download (ext.)
 

2015 | Conference Paper | LibreCat-ID: 15088
Böttcher, S., Hartel, R., Jacobs, T., & Jeromin, M. (2015). ECST – Extended Context-Free Straight-Line Tree Grammars. In Data Science - 30th British International Conference on Databases, BICOD 2015 (pp. 186–198). Springer. https://doi.org/10.1007/978-3-319-20424-6_18
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 25338
Geierhos, M., Bäumer, F. S., Schulze, S., & Klotz, C. (2015). Understanding the Patient 2.0. In Modeling and Using Context. https://doi.org/10.1007/978-3-319-25591-0_12
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 25337
Geierhos, M., Bäumer, F. S., Schulze, S., & Klotz, C. (2015). Understanding the Patient 2.0. In Modeling and Using Context. https://doi.org/10.1007/978-3-319-25591-0_12
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 20008
Hamann, H., & Valentini, G. (2014). Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In Ninth Int. Conf. on Swarm Intelligence (ANTS 2014). Cham. https://doi.org/10.1007/978-3-319-09952-1_15
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 20982
Koch, T., Holtmann, J., & DeAntoni, J. (2014). Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In Software Architecture. Cham. https://doi.org/10.1007/978-3-319-09970-5_14
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed