Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1763 Publications


2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. “Tightly-Secure Authenticated Key Exchange.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 629--658, 2015. https://doi.org/10.1007/978-3-662-46494-6_26.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 313
Börding, Paul, Melanie Bruns, and Marie Christin Platenius. “Comprehensive Service Matching with MatchBox.” In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 974--977, 2015. https://doi.org/10.1145/2786805.2803181.
LibreCat | Files available | DOI
 

2015 | Report | LibreCat-ID: 314
Brangewitz, Sonja, and Jochen Manegold. Competition and Product Innovation of Intermediaries in a Differentiated Duopoly. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 315
Jungmann, Alexander, Jan Jatzkowski, and Bernd Kleinjohann. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” In Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 316
Pautz, Jannis. Budget Games with Priced Strategies. Universität Paderborn, 2015.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 3162
Ziegert, Steffen, and Heike Wehrheim. “Temporal Plans for Software Architecture Reconfiguration.” Computer Science - R & D, no. 3–4 (2015): 303--320. https://doi.org/10.1007/s00450-014-0259-7.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
Meyer, Roland, and Heike Wehrheim. “From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog.” In Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, edited by Roland Meyer, Andr{\’{e}} Platzer, and Heike Wehrheim, 3--4. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-23506-6_1.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
Derrick, John, Brijesh Dongol, Gerhard Schellhorn, Oleg Travkin, and Heike Wehrheim. “Verifying Opacity of a Transactional Mutex Lock.” In {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, edited by Nikolaj Bj{\o}rner and Frank S. de Boer, 161--177. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-19249-9_11.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3165
Wehrheim, Heike, and Oleg Travkin. “{TSO} to {SC} via Symbolic Execution.” In Hardware and Software: Verification and Testing - 11th International Haifa Verification Conference, {HVC} 2015, Haifa, Israel, November 17-19, 2015, Proceedings, edited by Nir Piterman, 104--119. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-26287-1_7.
LibreCat | DOI
 

2015 | Conference (Editor) | LibreCat-ID: 3166
Meyer, Roland, Andr{\’{e}} Platzer, and Heike Wehrheim, eds. Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. Lecture Notes in Computer Science, 2015. https://doi.org/10.1007/978-3-319-23506-6.
LibreCat | DOI
 

Filters and Search Terms

year=2015

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed