Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

203 Publications


2018 | Book Chapter | LibreCat-ID: 6253
Senft, B., Fischer, H. G., Oberthür, S., & Patkar, N. (2018). Assist Users to Straightaway Suggest and Describe Experienced Problems. In Design, User Experience, and Usability: Theory and Practice (Vol. 10918, pp. 758–770). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-91797-9_52
LibreCat | DOI
 

2018 | Book Chapter | LibreCat-ID: 6254
Fischer, H. G., Senft, B., Rittmeier, F., & Sauer, S. (2018). A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In A. Marcus & W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018) (Vol. 10918, pp. 711–724). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-91797-9_49
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 14857
Beckschäfer, M., Malberg, S., Tierney, K., & Weskamp, C. (2017). Simulating Storage Policies for an Automated Grid-Based Warehouse System. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-319-68496-3_31
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967
Blömer, J., & Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS) (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-72453-9_35
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 5769
Töws, M., & Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017) (pp. 362–378). Springer International Publishing. https://doi.org/10.1007/978-3-319-68690-5_22
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 6255
Fischer, H. G., Engler, M., & Sauer, S. (2017). A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In Design, User Experience, and Usability: Theory, Methodology, and Management (Vol. 10288, pp. 570–583). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-58634-2_42
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 16461
Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr, S., … Sundermeier, J. (2017). Monitoring of Domain-Related Problems in Distributed Data Streams. In Structural Information and Communication Complexity. Cham. https://doi.org/10.1007/978-3-319-72050-0_13
LibreCat | DOI | arXiv
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, & V. T. Paschos (Eds.), Lecture Notes in Computer Science (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-57586-5_11
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2344
Blömer, J., Günther, P., Krummel, V., & Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In Foundations and Practice of Security (pp. 3–17). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer and Information Sciences (pp. 151–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32859-1_13
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering (pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 6257
Fischer, H. G., & Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-44902-9_3
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 5825
Wolters, D., Kirchhoff, J., Gerth, C., & Engels, G. (2016). Cross-Device Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, & S. Bhiri (Eds.), Service-Oriented Computing (pp. 171–185). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-46295-0_11
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20004
Valentini, G., Brambilla, D., Hamann, H., & Dorigo, M. (2016). Collective Perception of Environmental Features in a Robot Swarm. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. https://doi.org/10.1007/978-3-319-44427-7_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 20000
Hamann, H., Valentini, G., & Dorigo, M. (2016). Population Coding: A New Design Paradigm for Embodied Distributed Systems. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham. https://doi.org/10.1007/978-3-319-44427-7_15
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 15088
Böttcher, S., Hartel, R., Jacobs, T., & Jeromin, M. (2015). ECST – Extended Context-Free Straight-Line Tree Grammars. In Data Science - 30th British International Conference on Databases, BICOD 2015 (pp. 186–198). Springer. https://doi.org/10.1007/978-3-319-20424-6_18
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 15899
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921
Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 15897
Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed