Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

209 Publications


2018 | Conference Paper | LibreCat-ID: 3362
A. Lösch, A. Wiens, and M. Platzner, “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes,” in Proceedings of the International Conference on Architecture of Computing Systems (ARCS), 2018, vol. 10793, pp. 73–84.
LibreCat | Files available | DOI
 

2018 | Conference Paper | LibreCat-ID: 5774
M. Töws and H. Wehrheim, “Information Flow Certificates,” in Theoretical Aspects of Computing – ICTAC 2018, 2018, pp. 435–454.
LibreCat | Files available | DOI
 

2018 | Book Chapter | LibreCat-ID: 6253
B. Senft, H. G. Fischer, S. Oberthür, and N. Patkar, “Assist Users to Straightaway Suggest and Describe Experienced Problems,” in Design, User Experience, and Usability: Theory and Practice, vol. 10918, Cham: Springer International Publishing, 2018, pp. 758–770.
LibreCat | DOI
 

2018 | Book Chapter | LibreCat-ID: 6254
H. G. Fischer, B. Senft, F. Rittmeier, and S. Sauer, “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems,” in Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), vol. 10918, A. Marcus and W. Wang, Eds. Cham: Springer International Publishing, 2018, pp. 711–724.
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 14857
M. Beckschäfer, S. Malberg, K. Tierney, and C. Weskamp, “Simulating Storage Policies for an Automated Grid-Based Warehouse System,” in Lecture Notes in Computer Science, Cham, 2017.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967
J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 2017, vol. 10693, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 5769
M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), 2017, pp. 362–378.
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 6255
H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0,” in Design, User Experience, and Usability: Theory, Methodology, and Management, vol. 10288, Cham: Springer International Publishing, 2017, pp. 570–583.
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 16461
P. Bemmann et al., “Monitoring of Domain-Related Problems in Distributed Data Streams,” in Structural Information and Communication Complexity, Cham, 2017.
LibreCat | DOI | arXiv
 

2017 | Book Chapter | LibreCat-ID: 2381
S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in Lecture Notes in Computer Science, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2344
J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in Foundations and Practice of Security, 2017, pp. 3–17.
LibreCat | Files available | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in Mathematical Aspects of Computer and Information Sciences, Cham: Springer International Publishing, 2016, pp. 151–165.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in Algorithm Engineering, Cham: Springer International Publishing, 2016, pp. 81–116.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2970
J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 6257
H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows,” in Human-Centered and Error-Resilient Systems Development, vol. 9856, C. Bogdan, Ed. Cham: Springer International Publishing, 2016, pp. 30–41.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 5825
D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration of Android Apps,” in Service-Oriented Computing, 2016, pp. 171–185.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20004
G. Valentini, D. Brambilla, H. Hamann, and M. Dorigo, “Collective Perception of Environmental Features in a Robot Swarm,” in 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20000
H. Hamann, G. Valentini, and M. Dorigo, “Population Coding: A New Design Paradigm for Embodied Distributed Systems,” in 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15088
S. Böttcher, R. Hartel, T. Jacobs, and M. Jeromin, “ECST – Extended Context-Free Straight-Line Tree Grammars,” in Data Science - 30th British International Conference on Databases, BICOD 2015, 2015, pp. 186–198.
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 15899
T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security -- ESORICS 2015, Cham, 2015.
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921
O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15897
C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services,” in Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 20982
T. Koch, J. Holtmann, and J. DeAntoni, “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications,” in Software Architecture, Cham, 2014.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 15092
S. Böttcher, R. Hartel, and J. Rabe, “Efficient XML Keyword Search Based on DAG-Compression,” in Database and Expert Systems Applications - 25th International Conference, DEXA 2014, 2014, pp. 122–137.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 20008
H. Hamann and G. Valentini, “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins,” in Ninth Int. Conf. on Swarm Intelligence (ANTS 2014), 2014.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 16394
T. Lukovszki and F. Meyer auf der Heide, “Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots,” in Lecture Notes in Computer Science, Cham, 2014.
LibreCat | DOI
 

2014 | Book (Editor) | LibreCat-ID: 16870
P. Flocchini, J. Gao, E. Kranakis, and F. Meyer auf der Heide, Eds., Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, vol. 8243. Berlin, Heidelberg: Springer, 2014.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 6741
D. Bokermann, C. Gerth, and G. Engels, “Use Your Best Device! Enabling Device Changes at Runtime,” in 12th International Conference on Business Process Management (BPM 2014), 2014, vol. 8659, pp. 357–365.
LibreCat | DOI
 

2014 | Book Chapter | LibreCat-ID: 16395
S. Abshoff and F. Meyer auf der Heide, “Continuous Aggregation in Dynamic Ad-Hoc Networks,” in Structural Information and Communication Complexity, Cham, 2014.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 2979
J. Blömer, P. Günther, and G. Liske, “Improved Side Channel Attacks on Pairing Based Cryptography,” in Constructive Side-Channel Analysis and Secure Design, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 154–168.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6279
H. G. Fischer, B. Strenge, and K. Nebe, “Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design,” in Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, vol. 8012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 252–261.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 6732
T. Place, L. van Rooijen, and M. Zeitoun, “Separating Regular Languages by Piecewise Testable and Unambiguous Languages,” in Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013, 2013, pp. 729–740.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6276
F. Klompmaker, V. Paelke, and H. G. Fischer, “A Taxonomy-Based Approach towards NUI Interaction Design,” in Distributed, Ambient, and Pervasive Interactions, vol. 8028, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 32–41.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 16406
C. Jähn, B. Eikel, M. Fischer, R. Petring, and F. Meyer auf der Heide, “Evaluation of Rendering Algorithms Using Position-Dependent Scene Properties,” in Advances in Visual Computing, Berlin, Heidelberg, 2013.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 15093
S. Böttcher, R. Hartel, and T. Jacobs, “Fast Multi-update Operations on Compressed XML Data,” in Big Data - 29th British National Conference on Databases, BNCOD 2013, 2013, pp. 149–164.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 16407
R. Petring, B. Eikel, C. Jähn, M. Fischer, and F. Meyer auf der Heide, “Real-Time 3D Rendering of Heterogeneous Scenes,” in Advances in Visual Computing, Berlin, Heidelberg, 2013.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2918
S. Kakvi, E. Kiltz, and A. May, “Certifying RSA,” in Advances in Cryptology – ASIACRYPT 2012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 404–414.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 16448
B. Kempkes and F. Meyer auf der Heide, “Local, Self-organizing Strategies for Robotic Formation Problems,” in Algorithms for Sensor Systems, Berlin, Heidelberg, 2012.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” in Advances in Cryptology – EUROCRYPT 2012, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–553.
LibreCat | DOI | Download (ext.)
 

2012 | Book Chapter | LibreCat-ID: 16445
B. Kempkes and F. Meyer auf der Heide, “Continuous Local Strategies for Robotic Formation Problems,” in Experimental Algorithms, Berlin, Heidelberg, 2012.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 15891
T. Jager, S. Schinzel, and J. Somorovsky, “Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption,” in Computer Security – ESORICS 2012, Berlin, Heidelberg, 2012.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 20179
H. Hamann et al., “Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions,” in Swarm Intelligence: 8th International Conference, ANTS 2012, 2012, vol. 7461, pp. 168–179.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 16516
R. Baier and M. H. Molo, “Newton’s Method and Secant Method for Set-Valued Mappings,” in Large-Scale Scientific Computing, Berlin, Heidelberg, 2012.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 16408
T. Süß, C. Koch, C. Jähn, M. Fischer, and F. Meyer auf der Heide, “Asynchronous Occlusion Culling on Heterogeneous PC Clusters for Distributed 3D Scenes,” in Advances in Visual Computing, 2012, vol. 7431, pp. 502–512.
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 16459
P. Brandes, B. Degener, B. Kempkes, and F. Meyer auf der Heide, “Energy-Efficient Strategies for Building Short Chains of Mobile Robots Locally,” in Structural Information and Communication Complexity, Berlin, Heidelberg, 2011.
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 6293
K. Nebe, F. Klompmaker, H. Jung, and H. G. Fischer, “Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction,” in Human-Computer Interaction. Interaction Techniques and Environments., vol. 6762, J. A. Jacko, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 100–109.
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 16409
A. Cord-Landwehr et al., “A New Approach for Analyzing Convergence Algorithms for Mobile Robots,” in Automata, Languages and Programming, Berlin, Heidelberg, 2011.
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 20183
H. Hamann, T. Schmickl, and K. Crailsheim, “Evolving for Creativity: Maximizing Complexity in a Self-organized Multi-particle System,” in 10th European Conference on Artificial Life (ECAL’09), 2011, vol. 5777, pp. 442--449.
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 20710
A. Cord-Landwehr et al., “A New Approach for Analyzing Convergence Algorithms for Mobile Robots,” in Automata, Languages and Programming, Berlin, Heidelberg, 2011.
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 20709
A. Cord-Landwehr et al., “Collisionless Gathering of Robots with an Extent,” in SOFSEM 2011: Theory and Practice of Computer Science, Berlin, Heidelberg, 2011.
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed