Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
300 Publications
2017 | Conference Paper | LibreCat-ID: 2344 |
Blömer, J., Günther, P., Krummel, V., & Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In Foundations and Practice of Security (pp. 3–17). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-75650-9_1
LibreCat
| Files available
| DOI
2017 | Book Chapter | LibreCat-ID: 2381
Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, & V. T. Paschos (Eds.), Lecture Notes in Computer Science (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-57586-5_11
LibreCat
| DOI
2017 | Conference Paper | LibreCat-ID: 5769
Töws, M., & Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017) (pp. 362–378). Springer International Publishing. https://doi.org/10.1007/978-3-319-68690-5_22
LibreCat
| Files available
| DOI
2017 | Book Chapter | LibreCat-ID: 6255
Fischer, H. G., Engler, M., & Sauer, S. (2017). A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In Design, User Experience, and Usability: Theory, Methodology, and Management (Vol. 10288, pp. 570–583). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-58634-2_42
LibreCat
| DOI
2017 | Book Chapter | LibreCat-ID: 16461
Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr, S., Kothe, N., Mäcker, A., Malatyali, M., Meyer auf der Heide, F., Riechers, S., Schaefer, J. S., & Sundermeier, J. (2017). Monitoring of Domain-Related Problems in Distributed Data Streams. In Structural Information and Communication Complexity. https://doi.org/10.1007/978-3-319-72050-0_13
LibreCat
| DOI
| arXiv
2017 | Book Chapter | LibreCat-ID: 14857
Beckschäfer, M., Malberg, S., Tierney, K., & Weskamp, C. (2017). Simulating Storage Policies for an Automated Grid-Based Warehouse System. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-319-68496-3_31
LibreCat
| DOI
2017 | Book Chapter | LibreCat-ID: 23396
Gerking, C., Schubert, D., & Budde, I. (2017). Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In Theory and Practice of Model Transformation. https://doi.org/10.1007/978-3-319-61473-1_2
LibreCat
| DOI
2017 | Book Chapter | LibreCat-ID: 60902
Senk, J., Yegenoglu, A., Amblet, O., Brukau, Y., Davison, A., Lester, D. R., Lührs, A., Quaglio, P., Rostami, V., Rowley, A., Schuller, B., Stokes, A. B., van Albada, S. J., Zielasko, D., Diesmann, M., Weyers, B., Denker, M., & Grün, S. (2017). A Collaborative Simulation-Analysis Workflow for Computational Neuroscience Using HPC. In Lecture Notes in Computer Science. Springer International Publishing. https://doi.org/10.1007/978-3-319-53862-4_21
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 20000
Hamann, H., Valentini, G., & Dorigo, M. (2016). Population Coding: A New Design Paradigm for Embodied Distributed Systems. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham. https://doi.org/10.1007/978-3-319-44427-7_15
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 20004
Valentini, G., Brambilla, D., Hamann, H., & Dorigo, M. (2016). Collective Perception of Environmental Features in a Robot Swarm. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. https://doi.org/10.1007/978-3-319-44427-7_6
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 2948
Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer and Information Sciences (pp. 151–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32859-1_13
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 2968
Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering (pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 2970
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 5825
Wolters, D., Kirchhoff, J., Gerth, C., & Engels, G. (2016). Cross-Device Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, & S. Bhiri (Eds.), Service-Oriented Computing (pp. 171–185). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-46295-0_11
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 6257
Fischer, H. G., & Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-44902-9_3
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 2978
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat
| DOI
2016 | Book Chapter | LibreCat-ID: 60904
Yegenoglu, A., Quaglio, P., Torre, E., Grün, S., & Endres, D. (2016). Exploring the Usefulness of Formal Concept Analysis for Robust Detection of Spatio-temporal Spike Patterns in Massively Parallel Spike Trains. In Lecture Notes in Computer Science. Springer International Publishing. https://doi.org/10.1007/978-3-319-40985-6_1
LibreCat
| DOI
2015 | Book Chapter | LibreCat-ID: 2921 |
Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12
LibreCat
| DOI
| Download (ext.)
2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5
LibreCat
| DOI
2015 | Book Chapter | LibreCat-ID: 15899
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat
| DOI
| Download (ext.)