Items where Subject is "Research Areas > NRA5 Empirical and Behavioral Security"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | P | Q | R | S | T | V | W | Y | Z
Number of items at this level: 352.

A

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2017) Comparing the Usability of Cryptographic APIs.
In: 38th IEEE Symposium on Security and Privacy (S&P '17).
Conference: S&P - IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016) You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: S&P - IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian
(2017) How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Security & Privacy.

Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle
(2016) You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.
In: IEEE SecDev 2016.
Conference: None | Not Set

Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle and Fahl, Sascha
(2017) Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
UNSPECIFIED.

Akoglu, Leman and Müller, Emmanuel and Vreeken, Jilles
(2013) Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD).
ACM Press, New York, NY, USA, pp. 1-57. ISBN 978-1-4503-2335-2

Akoglu, Leman and Tong, Hanghang and Vreeken, Jilles and Faloutsos, Christos
(2012) Fast and Reliable Anomaly Detection in Categoric Data.
In: Proceedings of ACM Conference on Information and Knowledge Mining (CIKM).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horn and Tatti, Nikolaj and Faloutsos, Christos
(2013) Mining Connection Pathways for Marked Nodes in Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horng and Faloutsos, Christos
(2012) Mining and Visualizing Connection Pathways in Large Information Networks.
In: Proceedings of the Workshop on Information in Networks (WIN).
Conference: None | Not Set

Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013) Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Alvarez, V. and Richter, Stefan and Chen, X. and Dittrich, Jens
(2015) A comparison of adaptive radix trees and hash tables.
In: 2015 IEEE 31st International Conference on Data Engineering.
Conference: ICDE - International Conference on Data Engineering

Alvarez, Victor and Schuhknecht, Felix Martin and Dittrich, Jens and Richter, Stefan
(2014) Main Memory Adaptive Indexing for Multi-core Systems.
In: Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN).
Conference: None | Not Set

Athukorala, Kumaripaba and Glowacka, Dorata and Jacucci, Giulio and Oulasvirta, Antti and Vreeken, Jilles
(2016) Is Exploratory Search Different? A Comparison of Information Search Behavior for Exploratory and Lookup Tasks.
Journal of the Association for Information Science and Technology, 67 (11). pp. 2635-2651.

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Interaction Model to Predict Subjective-Specificity of Search Results.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).
Conference: None | Not Set

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Supporting Exploratory Search Through User Modelling.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).
Conference: None | Not Set

Atukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Narrow or Broad? Estimating Subjective Specificity in Exploratory Search.
In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) Harmony and dissonance: organizing the people's voices on political controversies.
In: Proc. of the 5th ACM International Conference on Web Search and Data Mining (WSDM'12).
Conference: WSDM - ACM International Conference on Web Search and Data Mining

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions.
In: Proc. of the 12th IEEE International Conference on Data Mining (ICDM'12).
Conference: ICDM - IEEE International Conference on Data Mining

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) PolariCQ: polarity classification of political quotations.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

B

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015) Quantifying Information Overload in Social Media and its Impact on Social Contagions.
In: ICWSM '15: Proceedings of the 9th International AAAI Conference on Weblogs and Social Media.
Conference: None | Not Set

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gummadi, Krishna P. and Gomez-Rodriguez, Manuel
(2016) On the Efficiency of the Information Networks in Social Media.
In: Proceedings of the 9th ACM International Conference on Web Search and Data Mining.
Conference: WSDM - ACM International Conference on Web Search and Data Mining

Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016) On Profile Linkability despite Anonymity in Social Media Systems.
In: Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES).
Conference: None | Not Set

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) Securing social networks.
In: Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Rieck, Konrad and Skoruppa, Malte and Stock, Ben and Yamaguchi, Fabian
(2017) Efficient and Flexible Discovery of PHP Application Vulnerabilities.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Banerjee, Abhijeet and Chattopadhyay, Sudipta and Roychoudhury, Abhik
(2016) On Testing Embedded Software.
In: UNSPECIFIED Advances in Computers, 101 . Elsevier, pp. 121-153. ISBN 978-0-12-805158-0

Benz, Florian and Hildebrandt, Andreas and Hack, Sebastian
(2012) A dynamic program analysis to find floating-point accuracy problems.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, Beijing, China - June 11 - 16, 2012.
Conference: PLDI - ACM-SIGPLAN Conference on Programming Language Design and Implementation

Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2017) Efficiently Discovering Unexpected Pattern Co-Occurrences.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2016) Keeping it Short and Simple: Summarising Complex Event Sequences with Multivariate Patterns.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin and Premraj, Rahul and Zimmermann, Thomas
(2007) Quality of Bug Reports in Eclipse.
In: Proceedings of the 2007 OOPSLA Workshop on Eclipse Technology eXchange.

Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin and Premraj, Rahul and Zimmermann, Thomas
(2008) What makes a good bug report?
In: Foundations of Software Engineering.

Bhattacharya, Parantapa and Ghosh, Saptarshi and Kulshrestha, Juhi and Mondal, Mainack and Zafar, Muhammad Bilal and Ganguly, Niloy and Gummadi, Krishna P.
(2014) Deep Twitter diving: exploring topical groups in microblogs at scale.
In: Proc. of the Computer Supported Cooperative Work (CSCW '14).
Conference: CSCW - ACM Conference on Computer Supported Cooperative Work

Bhattacharya, Parantapa and Zafar, Muhammad Bilal and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2014) Inferring user interests in the Twitter social network.
In: Proc. of the 8th ACM Conference on Recommender Systems (RecSys '14).
Conference: None | Not Set

Bhattacharyya, Apratim and Vreeken, Jilles
(2017) Efficiently Summarising Event Sequences with Rich Interleaving Patterns.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Bichhawat, Abhishek
(2014) Exception Handling for Dynamic Information Flow Control.
In: Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition).

Biega, Joanna Asia and Mele, Ida and Weikum, Gerhard
(2014) Probabilistic Prediction of Privacy Risks in User Search Histories.
In: Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14).
Conference: None | Not Set

Bird, Christian and Ranganath, Venkatesh-Prasad and Zimmermann, Thomas and Nagappan, Nachiappan and Zeller, Andreas
(2014) Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines.
In: Companion Proceedings of the 36th International Conference on Software Engineering.
Conference: ICSE - International Conference on Software Engineering

Blond, Stevens Le and Gilbert, Cedric and Upadhyay, Utkarsh and Gomez-Rodriguez, Manuel and Choffnes, David
(2017) A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Bodden, Eric and Schneider, Markus and Kreutzer, Michael and Mezini, Mira and Hammer, Christian and Zeller, Andreas and Achenbach, Dirk and Huber, Matthias and Kraschewski, Daniel
(2013) Entwicklung sicherer Software durch Security by Design.
In: Entwicklung sicherer Software durch Security by Design : Trend- und Strategiebericht. Fraunhofer SIT.

Boley, Mario and Goldsmit, Brian R. and Ghiringhelli, Luca M. and Vreeken, Jilles
(2017) Identifying Consistent Statements about Numerical Data with Dispersion-Corrected Subgroup Discovery.
Data Mining and Knowledge Discovery, 31 (5). pp. 1391-1418.

Brasser, Franz Ferdinand and Bugiel, Sven and Filyanov, Atanas and Sadeghi, Ahmad-Reza and Schulz, Steffen
(2012) Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: Financial Cryptography and Data Security (FC).
Conference: None | Not Set

Brodowski, Dominik and Marnau, Ninja
(2017) Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB).
Neue Zeitschrift für Strafrecht (NStZ), 07/201.

Budhathoki, Kailash and Vreeken, Jilles
(2016) Causal Inference by Compression.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2017) Correlation by Compression.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2015) The Difference and the Norm — Characterising Similarities and Differences between Databases.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Budhathoki, Kailash and Vreeken, Jilles
(2017) MDL for Causal Inference on Discrete Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2017) Origo: Causal Inference by Compression.
Knowledge and Information Systems.

Bursztein, Elie and Martin, Matthieu and Mitchell, John C.
(2011) Text-based CAPTCHA Strengths and Weaknesses.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS - ACM Conference on Computer and Communications Security

Böhm, Alexander and Dittrich, Jens and Mukherjee, Niloy and Pandis, Ippokrantis and Sen, Rajkumar
(2016) Operational Analytics Data Management Systems.
PVLDB, 9 (13). pp. 1601-1604.

Böhm, Christoph and de, Gerard Melo and Naumann, Felix and Weikum, Gerhard
(2012) LINDA: distributed web-of-data-scale entity matching.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Böhme, Marcel and Soremekun, Ezekiel O. and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017) How Developers Debug Software- The DBGBENCH Dataset.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
Conference: ICSE - International Conference on Software Engineering

Böhme, Marcel and Soremekun, Ezekiel O. and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017) Where is the Bug and How is It Fixed? An Experiment with Practitioners.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering.
Conference: ESEC/FSE - European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (duplicate was listed as ESEC, removed from DB)

Böhme, Marcel and Soremekun, Ezekiel O. and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018) Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.
In: Software Engineering (SE) 2018.
Conference: None | Not Set

Böhmer, Matthias and Krüger, Antonio
(2014) A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers.
International Journal of Mobile Human Computer Interaction (IJMHCI), 6 (2). pp. 32-45.

Böhmer, Matthias and Krüger, Antonio
(2013) A study on icon arrangement by smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI - International Conference on Human Factors in Computing Systems

Böhmer, Matthias and Lander, Christian and Gehring, Sven and Burmby, Duncon P and Krüger, Antonio
(2014) Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI - International Conference on Human Factors in Computing Systems

Böhmer, Matthias and Lander, Christian and Krüger, Antonio
(2013) What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness.
In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland.
Conference: UbiComp - ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

C

Carzaniga, Antonio and Gorla, Alessandra and Mattavelli, Andrea and Perino, Nicolò
(2012) A self-healing technique for Java applications.
In: 34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland.

Chakraborty, Abhijnan and Ghosh, Saptarshi and Ganguly, Niloy and Gummadi, Krishna P.
(2016) Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News.
In: Proceedings of the 10th International Conference on Web and Social Media.
Conference: None | Not Set

Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012) Interactively and Visually Exploring Tours of Marked Nodes in Large Graphs.
In: Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
Conference: None | Not Set

Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012) \textsc TourViz : Interactive Visualization of Connection Pathways in Large Graphs.
In: Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Chau, Duen Horng and Vreeken, Jilles and Matthijs, van Leeuwen and Faloutsos, Christos
(2014) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-130.

Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Faloutsos, Christos
(2013) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
ACM Press, New York, NY, USA, pp. 1-104. ISBN 978-1-4503-2329-1

Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2015) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-72.

Correa, Denzil and Silva, Leandro Araújo and Mondal, Mainack and Benevenuto, Fabrício and Gummadi, Krishna P.
(2015) The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.
Conference: None | Not Set

D

Daiber, Florian and Speicher, Marco and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2014) Interacting with 3D Content on Stereoscopic Displays.
In: Proceedings of the International Symposium on Pervasive Displays (PerDis).
Conference: None | Not Set

Dallmeier, Valentin and Burger, Martin and Orth, Tobias and Zeller, Andreas
(2013) WebMate: Generating Test Cases for Web 2.0.
In: Proc. Software Quality Days 2013.
Conference: None | Not Set

Dallmeier, Valentin and Knopp, Nikolai and Mallon, Christoph and Fraser, Gordon and Hack, Sebastian and Zeller, Andreas
(2012) Automatically Generating Test Cases for Specification Mining.
IEEE Transactions on Software Engineering, 38 (2). pp. 243-257.

Dallmeier, Valentin and Pohl, Bernd and Burger, Martin and Mirold, Michael and Zeller, Andreas
(2014) WebMate: Web Application Test Generation in the Real World.
In: Proc. of the Seventh International IEEE Conference on Software Testing, Verification and Validation Workshops(ICSTW 2014).
Conference: None | Not Set

De, Abir and Valera, Isabel and Ganguly, Niloy and Bhattacharya, Sourangshu and Gomez-Rodriguez, Manuel
(2016) Learning and Forecasting Opinion Dynamics in Social Networks.
In: NIPS '16: Advances in Neural Information Processing Systems.
Conference: NIPS - Advances in Neural Information Processing Systems

Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael
(2017) Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS - ACM Conference on Computer and Communications Security

Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018) Investigating System Operators' Perspective on Security Misconfigurations.
In: 25th ACM Conference on Computer and Communications Security.
Conference: CCS - ACM Conference on Computer and Communications Security

Dittrich, Jens
(2015) The Case for Small Data Management.
In: Datenbanksysteme für Business, Technologie und Web (BTW), 16. Fachtagung des GI-Fachbereichs "Datenbanken und Informationssysteme" (DBIS), 4.-6.3.2015 in Hamburg, Germany. Proceedings.
Conference: None | Not Set

Dittrich, Jens
(2016) Patterns in Data Management.
Jens Dittrich.

Dittrich, Jens and Bender, Patrick
(2015) Janiform intra-document analytics for reproducible research.
Proceedings of the VLDB Endowment - Proceedings of the 41st International Conference on Very Large Data Bases, Kohala Coast, 8 (12). pp. 1972-1975.

Dittrich, Jens and Jindal, Alekh
(2011) Towards a One Size Fits All Database Architecture.
In: Proceedings of the 4th Biennial Conference on Innovative Data Systems Research (CIDR).
Conference: CIDR - Conference on Innovative Data Systems Research

Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo
(2012) Efficient Big Data Processing in Hadoop MapReduce.
The Proceedings of the VLDB Endowment (PVLDB), 5 (12). pp. 2014-2015.

Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo and Richter, Stefan and Schuh, Stefan and Jindal, Alekh and Schad, Jorg
(2012) Only Aggressive Elephants are Fast Elephants.
The Proceedings of the VLDB Endowment (PVLDB), 5 (11). pp. 1591-1602.

Dittrich, Jens and Richter, Stefan and Schuh, Stefan and Quiané-Ruiz, Jorge-Arnulfo
(2013) Efficient OR Hadoop: Why not both?
IEEE Data Eng. Bull., 36 (1). pp. 15-23.

Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2012) A data-centric approach to synchronization.
ACM Trans. Program. Lang. Syst., 34 (1). 4:1-4:48.

Du, Nan and Liang, Yingyu and Balcan, Maria-Florina and Gomez-Rodriguez, Manuel and Zha, Hongyuan and Song, Le
(2016) Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm.
Journal of Machine Learning Research (JMLR).

E

Ernst, Patrick and Meng, Cynthia and Siu, Amy and Weikum, Gerhard
(2014) KnowLife: a Knowledge Graph for Health and Life Sciences.
In: Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14).
Conference: ICDE - International Conference on Data Engineering

F

Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew
(2013) Hey, You, Get Off of My Clipboard.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 144-161. ISBN 978-3-642-39884-1
(Unpublished)

Farajtabar, M. and Wang, Y and Gomez-Rodriguez, Manuel and Li, S and Zha, H and Song, Le
(2015) COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
In: NIPS '15: Advances in Neural Information Processing Systems.
Conference: NIPS - Advances in Neural Information Processing Systems

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: None | Not Set

Fisher, Andrea K. and Vreeken, Jilles and Klakow, Dietrich
(2017) Beyond Pairwise Similarity: Quantifying and Characterizing Linguistic Similarity between Groups of Languages by MDL.
Computacion y Sistemas.

Frasconi, Paolo and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles
(2016) Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence (9851). Springer.

Fraser, Gordon and Zeller, Andreas
(2012) Mutation-Driven Generation of Unit Tests and Oracles.
IEEE Transactions on Software Engineering, 38 (2). pp. 278-292.

G

Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018) Practical Test Dependency Detection.
In: Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification.
Conference: ICST - International Conference on Software Testing, Verification and Validation

Gambi, Alessio and Gorla, Alessandra and Zeller, Andreas
(2017) O!Snap: Cost-Efficient Testing in the Cloud.
In: 2017 IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, Tokyo, Japan, March 13-17, 2017.
Conference: ICST - International Conference on Software Testing, Verification and Validation

Gambi, Alessio and Kappler, Sebastian and Lampel, Johannes and Zeller, Andreas
(2017) CUT: automatic unit testing in the cloud.
In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017.
Conference: ISSTA - International Symposium on Software Testing and Analysis

Gambi, Alessio and Mayr-Dorn, Christoph and Zeller, Andreas
(2017) Model-based testing of end-user collaboration intensive systems.
In: Proceedings of the Symposium on Applied Computing, SAC 2017, Marrakech, Morocco, April 3-7, 2017.
Conference: None | Not Set

Gembalczyk, David and Schuhknecht, Felix Martin and Dittrich, Jens
(2017) An Experimental Analysis of Different Key-Value Stores and Relational Databases.
Datenbanksysteme für Business, Technologie und Web (BTW 2017).

Gerling, Sebastian and Gerling, Rainer W.
(2013) Wie realistisch ist ein "Recht auf Vergessenwerden"?
Datenschutz und Datensicherheit, 37 (7). pp. 445-446.

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security - Usenix Security Symposium

Ghosh, Saptarshi and Viswanath, Bimal and Kooti, Farshad and Sharma, Naveen Kumar and Korlam, Gautam and Benevenuto, Fabrício and Ganguly, Niloy and Gummadi, Krishna P.
(2012) Understanding and combating link farming in the twitter social network.
In: Proc. of the 21st International Conference on World Wide Web (WWW 2012).
Conference: WWW - International World Wide Web Conference

Ghosh, Saptarshi and Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Sharma, Naveen Kumar and Ganguly, Niloy and Gummadi, Krishna P.
(2013) On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011) MIME: A Framework for Interactive Visual Pattern Mining.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011) MIME: A Framework for Interactive Visual Pattern Mining.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Goga, Oana and Loiseau, Patrick and Sommer, Robin and Teixeira, Renata and Gummadi, Krishna P.
(2015) On the Reliability of Profile Matching Across Large Online Social Networks.
In: Proc. of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'15).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Goga, Oana and Venkatadri, Giridhari and Gummadi, Krishna P.
(2015) The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC - Internet Measurement Conference

Goldsmith, Brian and Boley, Mario and Vreeken, Jilles and Scheffler, Matthias and Ghiringhelli, Luca M.
(2017) Uncovering Structure-Property Relationships of Materials by Subgroup Discovery.
New Journal of Physics, 17.

Gomez-Rodriguez, Manuel and Gummadi, Krishna P. and Schölkopf, Bernhard
(2014) Quantifying Information Overload in Social Media and Its Impact on Social Contagions.
In: Proceedings of the Eighth International Conference on Weblogs and Social Media, ICWSM 2014, Ann Arbor, Michigan, USA, June 1-4, 2014..
Conference: None | Not Set

Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2016) Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media.
In: Proceedings of the 10th International Conference on Web and Social Media.
Conference: None | Not Set

Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2015) Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests.
In: Proc. of the 24th International Conference on World Wide Web (WWW 2015).
Conference: WWW - International World Wide Web Conference

Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012) EXSYST: Search-based GUI testing.
In: Proc. of the 34th International Conference on Software Engineering (ICSE 2012).
Conference: ICSE - International Conference on Software Engineering

Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012) Search-based system testing: high coverage, no false alarms.
In: Proc. International Symposium on Software Testing and Analysis (ISSTA 2012).
Conference: ISSTA - International Symposium on Software Testing and Analysis

Grosse, Kathrin and Vreeken, Jilles
(2017) Summarising Event Sequences using Serial Episodes and an Ontology.
In: Proceedings of the 4th Workshop on Interactions between Data Mining and Natural Language Processing (DMNLP).
Conference: None | Not Set

Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2015) Multiprocessor real-time scheduling with arbitrary processor affinities: from practice to theory.
Real-Time Systems, 51 (4). pp. 440-483.

Gujarati, Arpan and Elnikety, Sameh and He, Yuxiong and McKinley, Kathryn S. and Brandenburg, Björn B.
(2017) Swayam: distributed autoscaling to meet SLAs of machine learning inference services with resource efficiency.
In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11 - 15, 2017.
Conference: Middleware - ACM/IFIP/USENIX International Middleware Conference

Gujarati, Arpan and Nasri, Mitra and Brandenburg, Björn B.
(2017) Quantifying the Resiliency of Replicated Networked Control Systems to Transient Faults.
In: Proceedings of the Work-in-Progress Session of the 29th Euromicro Conference on Real-Time Systems (ECRTS 2017).
Conference: ECRTS - Euromicro Conference on Real-Time Systems

H

Hammacher, Clemens and Streit, Kevin and Zeller, Andreas and Hack, Sebastian
(2016) Thread-level Speculation with Kernel Support.
In: Proceedings of the 25th International Conference on Compiler Construction.
Conference: CC - International Conference on Compiler Construction

Hammer, Christian
(2013) Efficient Algorithms for Control Closures.
In: 1st International Workshop on Interference and Dependence.
Conference: None | Not Set

Havrikov, Nikolas
(2017) Efficient fuzz testing leveraging input, code, and execution.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).

Havrikov, Nikolas and Gambi, Alessio and Zeller, Andreas and Arcuri, Andrea and Galeotti, Juan Pablo
(2017) Generating Unit Tests with Structured System Interactions.
In: 12th IEEE/ACM International Workshop on Automation of Software Testing, AST@ICSE 2017, Buenos Aires, Argentina, May 20-21, 2017.
Conference: None | Not Set

Havrikov, Nikolas and Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014) XMLMate: Evolutionary XML Test Generation.
In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.
Conference: ESEC/FSE - European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (duplicate was listed as ESEC, removed from DB)

Heikinheimo, Hannes and Vreeken, Jilles and Siebes, Arno and Mannila, Heikki
(2009) Low-Entropy Set Selection.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).

Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013) Classifying code changes and predicting defects using changegenealogies.
Saarland University.

Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013) Predicting defects using change genealogies.
In: Proc. of the 24th International IEEE Symposium on Software Reliability Engineering (ISSRE 2013).
Conference: ISSRE - International Symposium on Software Reliability Engineering

Herzig, Kim and Just, Sascha and Zeller, Andreas
(2016) The Impact of Tangled Code Changes on Defect Prediction Models.
Empirical Softw. Engg., 21 (2). pp. 303-336. ISSN 1382-3256

Herzig, Kim and Just, Sascha and Zeller, Andreas
(2013) It's not a bug, it's a feature: how misclassification impacts bug prediction.
In: Proc. of the 35th International Conference on Software Engineering (ICSE 2013).
Conference: ICSE - International Conference on Software Engineering

Herzig, Kim and Zeller, Andreas
(2014) Mining Bug Data: A Practitioner’s Guide.
In: Recommendation Systems in Software Engineering. Springer Berlin Heidelberg, pp. 131-171. ISBN 978-3-642-45134-8

Herzig, Kim and Zeller, Andreas
(2013) The impact of tangled code changes.
In: Proc. of the 10th Working Conference on Mining Software Repositories (MSR 2013).
Conference: MSR - IEEE International Working Conference on Mining Software Repositories

Hessel, Stefan
(2015) Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS".
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Hessel, Stefan
(2017) "My friend Cayla" - eine nach § 90 TKG verbotene Sendeanlage?
JurPC (13).

Hessel, Stefan
(2016) Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -.
JurPC (137).

Hinrichs, Frauke and Vreeken, Jilles
(2017) Characterising the Difference and the Norm between Sequence Databases.
In: Proceedings of the 4th Workshop on Interactions between Data Mining and Natural Language Processing (DMNLP).
Conference: None | Not Set

Hoffart, Johannes and Altun, Yasemin and Weikum, Gerhard
(2014) Discovering Emerging Entities with Ambiguous Names.
In: Proc. of the 23rd International Conference on World Wide Web (WWW 2014).
Conference: WWW - International World Wide Web Conference

Hoffart, Johannes and Seufert, Stephan and Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2012) KORE: keyphrase overlap relatedness for entity disambiguation.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Holler, Christian and Herzig, Kim and Zeller, Andreas
(2012) Fuzzing with Code Fragments.
In: Proc. of the 21st Usenix Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014) Test Generation Across Multiple Layers.
In: Proceedings of the 7th International Workshop on Search-Based Software Testing.
Conference: None | Not Set

Höschele, Matthias and Kampmann, Alexander and Zeller, Andreas
(2017) Active Learning of Input Grammars.
CoRR, abs/17.

Höschele, Matthias and Zeller, Andreas
(2017) Mining input grammars with AUTOGRAM.
In: Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017 - Companion Volume.
Conference: ICSE - International Conference on Software Engineering

J

Jamrozik, Konrad and Fraser, Gordon and Tillmann, Nikolai and Halleux, Jonathan De
(2013) Generating Test Suites with Augmented Dynamic Symbolic Execution.
In: Proc. of the 7th International Conference on Tests and Proofs (TAP 2013).

Jamrozik, Konrad and Styp-Rekowsky, Philipp von and Zeller, Andreas
(2016) Mining Sandboxes.
In: Proceedings of the 38th International Conference on Software Engineering.
Conference: ICSE - International Conference on Software Engineering

Jankowiak, Martin and Gomez-Rodriguez, Manuel
(2017) Uncovering the Spatiotemporal Patterns of Collective Social Activity.
In: 2017 SIAM International Conference on Data Mining.
Conference: SDM - SIAM International Conference on Data Mining

Jindal, Alekh and Dittrich, Jens
(2011) Relax and Let the Database Do the Partitioning Online.
In: Enabling Real-Time Business Intelligence (BIRTE).
Conference: None | Not Set

Jindal, Alekh and Palatinus, Endre and Pavlov, Vladimir and Dittrich, Jens
(2013) A Comparison of Knives for Bread Slicing.
The Proceedings of the VLDB Endowment (PVLDB), 6 (6). pp. 361-372.

Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2011) Trojan data layouts: right shoes for a running elephant.
In: Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC).
Conference: None | Not Set

Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) WWHow! Freeing Data Storage from Cages.
In: Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR).
Conference: CIDR - Conference on Innovative Data Systems Research

Jindal, Alekh and Schuhknecht, Felix Martin and Dittrich, Jens and Khachatryan, Karen and Bunte, Alexander
(2013) How Achaeans Would Construct Columns in Troy.
In: CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings.

Johns, Martin and Lekies, Sebastian and Stock, Ben
(2013) Eradicating DNS Rebinding with the Extended Same-Origin Policy.
In: 22nd USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Jungmann, Alexander and Brangewitz, Sonja and Petrlic, Ronald and Platenius, Marie Christin
(2014) Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.
International Journal On Advances in Intelligent Systems, 7 (4).

Just, Sascha and Herzig, Kim
(2016) Gotchas from mining bug reports.
In: Perspectives on Data Science for Software Engineering. Morgan Kaufmann, pp. 261-265.

Just, Sascha and Herzig, Kim and Czerwonka, Jacek and Murphy, Brendan
(2016) Switching to Git: The Good, the Bad, and the Ugly.
In: International Symposium on Software Reliability Engineering (ISSRE).

Just, Sascha and Premraj, Rahul and Zimmermann, Thomas
(2008) Towards the next generation of bug tracking systems.
In: In VL/HCC '08: Proceedings of the 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.

Just, Seth and Cleary, Alan and Shirley, Brandon and Hammer, Christian
(2011) Information flow analysis for JavaScript.
In: Proceedings of the 1st ACM SIGPLAN international workshop on Programming language and systems technologies for internet clients.
Conference: None | Not Set

K

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2017) Efficiently Discovering Locally Exceptional yet Globally Representative Subgroups.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Kampmann, Alexander and Galeotti, Juan Pablo and Zeller, Andreas
(2014) JTACO: Test Execution for Faster Bounded Verification.
In: Proc. of the 8th International Conference on Tests and Proofs (TAP 2014).
Conference: None | Not Set

Kappes, Jörg H and Andres, Bjoern and Hamprecht, Fred A. and Schnörr, Christoph and Nowozin, Sebastian and Batra, Dhruv and Kim, Sungwoong and Kausler, Bernhard X and Lellmann, Jan and Komodakis, Nikos and Rother, Carsten
(2013) A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problem.
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

Karaev, Sanjar and Miettinen, Pauli and Vreeken, Jilles
(2015) Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Kerber, Frederic and Krüger, Antonio and Löchtefeld, Markus
(2014) Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task.
In: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI).
Conference: None | Not Set

Kerber, Frederic and Löchtefeld, Markus and Krüger, Antonio and McIntosh, Jess and McNeill, Charlie and Fraser, Mike
(2016) Understanding Same-Side Interactions with Wrist-Worn Devices.
In: Proceedings of the 9th Nordic Conference on Human-Computer Interaction. Nordic Conference on Human-Computer Interaction (NordiCHI-16), October 23-27, Gothenburg, Sweden.
Conference: None | Not Set

Kim, Dongsun and Tao, Yida and Kim, Sunghun and Zeller, Andreas
(2013) Where Should We Fix This Bug? A Two-Phase Recommendation Model.
IEEE Transactions on Software Engineering, 39 (11). pp. 1597-1610.

Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De, Tijl
(2011) Maximum Entropy Modelling for Assessing Results on Real-Valued Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De Bie, Tijl
(2013) Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Kooti, Farshad and Mason, Winter A and Gummadi, Krishna P. and Cha, Meeyoung
(2012) Predicting emerging social conventions in online social networks.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2015) Summarizing and Understanding Large Graphs.
Statistical Analysis and Data Mining, 8 (3). pp. 183-202.

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2014) VoG: Summarizing and Understanding Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Krüger, Frederik and Vogelgesang, Stephanie
(2017) Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?
In: Trends und Communities der Rechtsinformatik: Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 / Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.
Conference: None | Not Set

Krüger, Jochen
(2016) Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht, 19 (11). pp. 728-731.

Krüger, Jochen and Möllers, Frederik
(2016) Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht. ISSN 1434-596X

Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2016) Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik Spektrum, 39. pp. 427-435. ISSN 0170-6012

Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2017) Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?
In: Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Krüger, Jochen and Vogelgesang, Stephanie
(2015) Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht.
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Krüger, Jochen and Vogelgesang, Stephanie
(2016) Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik Spektrum, 39. pp. 427-435.

Krüger, Jochen and Vogelgesang, Stephanie and Weller, Michael
(2017) Datenschutz für Minderjährige nach der Europäischen Datenschutz-Grundverordnung (DSGVO) vom 27. April 2016.
In: Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Kulshrestha, Juhi and Zafar, Muhammad Bilal and Noboa, Lisette Espin and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Characterizing Information Diets of Social Media Users.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.
Conference: None | Not Set

Kuzey, Erdal and Vreeken, Jilles and Weikum, Gerhard
(2014) A Fresh Look on Knowledge Bases: Distilling Named Events from News.
In: Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

L

Leeuwen, M. van and Vreeken, Jilles and Siebes, A.
(2006) Compression Picks Item Sets That Matter.
In: KDD06.

Leffer, Lena and Mayer, Hendrik
(2016) EU-Datenschutz nach „Safe Harbor“.
Wirtschaftsführer für junge Juristen (2). pp. 58-60.

Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014) Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 269-270. ISSN 0170-7256

Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014) Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 269-270.

Lekies, Sebastian and Stock, Ben and Johns, Martin
(2013) 25 Million Flows Later - Large-scale Detection of DOM-based XSS.
In: 20th ACM Conference on Computer and Communications Security Berlin 4.11.2013.
Conference: CCS - ACM Conference on Computer and Communications Security

Lekies, Sebastian and Stock, Ben and Wentzel, Martin and Johns, Martin
(2015) The Unexpected Dangers of Dynamic JavaScript.
In: 24th USENIX Security Symposium (USENIX Security 15).
Conference: USENIX-Security - Usenix Security Symposium

Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2017) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-85.

Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2016) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-137.

Liu, Yabing and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2011) Analyzing facebook privacy settings: user expectations vs. reality.
In: Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011).
Conference: IMC - Internet Measurement Conference

M

Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles
(2011) Tell Me What I Need to Know: Succinctly Summarizing Data with Itemsets.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Mampaey, Michael and Vreeken, Jilles
(2010) Summarising Data by Clustering Items.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).

Mampaey, Michael and Vreeken, Jilles
(2013) Summarizing Categorical Data by Clustering Attributes.
Data Mining and Knowledge Discovery, 26 (1). pp. 130-173.

Mampaey, Michael and Vreeken, Jilles and Tatti, Nikolaj
(2012) Summarizing Data Succinctly with the Most Informative Itemsets.
Transactions on Knowledge Discovery from Data. pp. 1-44.

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2017) Discovering Reliable Approximate Functional Dependencies.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Mannan, Mohammad and Kim, Boem Heyn and Ganjali, Afshar and Lie, David
(2011) Unicorn: Two-Factor Attestation for Data Security.
In: Proceedings of the 18th ACM conference on Computer and communications security.
Conference: CCS - ACM Conference on Computer and Communications Security

Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2013) Detecting Deadlock in Programs with Data-Centric Synchronization.
In: ICSE '13: Proceedings of the 35th International Conference on Software Engineering.
Conference: ICSE - International Conference on Software Engineering

Marnau, Ninja
(2016) Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit (DuD), 05/201.

Marnau, Ninja
(2017) Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung.
In: INFORMATIK 2017, Workshop Recht und Technik.
Conference: None | Not Set

Marx, Alexander and Vreeken, Jilles
(2017) Telling Cause from Effect by MDL-based Local and Global Regression.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Mathis, Björn
(2017) Dynamic Tainting for Automatic Test Case Generation.
In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis.

Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel O. and Böhme, Marcel and Zeller, Andreas
(2017) Detecting Information Flow by Mutating Input Data.
In: Proceedings of the 32Nd IEEE/ACM International Conference on Automated Software Engineering.
Conference: ASE - Automated Software Engineering Conference

Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel O. and Böhme, Marcel and Zeller, Andreas
(2018) Detecting Information Flow by Mutating Input data.
In: Software Engineering (SE) 2018.
Conference: None | Not Set

Miettinen, Pauli and Vreeken, Jilles
(2014) MDL4BMF : Minimum Description Length for Boolean Matrix Factorization.
Transactions on Knowledge Discovery from Data, 8 (4). pp. 1-31.

Miettinen, Pauli and Vreeken, Jilles
(2011) Model Order Selection for Boolean Matrix Factorization.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Mondal, Mainack and Liu, Yabing and Viswanath, Bimal and Gummadi, Krishna P. and Mislove, Alan
(2014) Understanding and Specifying Social Access Control Lists.
In: Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014).
Conference: None | Not Set

Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Defending Against Large-scale Crawls in Online Social Networks.
In: Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012.
Conference: CoNEXT - ACM International Conference on Emerging Networking Experiments and Technologies

Mukherjee, Subhabrata and Weikum, Gerhard and Danescu-Niculescu-Mizil, Cristian
(2014) People on Drugs: Credibility of User Statements in Health Communities.
In: Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Möllers, Frederik and Hessel, Stefan
(2016) Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände.
In: Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12). p. 81.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12). p. 81. ISSN 0949-2356

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit - DuD, 40 (8). pp. 497-502.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit – DuD, 40 (8). pp. 497-502. ISSN 1614-0702

Möllers, Frederik and Vogelgesang, Stephanie and Hessel, Stefan and Leffer, Lena
(2017) Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG.
In: Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

Möllers, Frederik and Vogelgesang, Stephanie and Hessel, Stefan and Leffer, Lena
(2017) Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG.
In: Trends und Communities der Rechtsinformatik: Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 / Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017.

N

Nakashole, Ndapandula and Tylenda, Tomasz and Weikum, Gerhard
(2013) Fine-grained Semantic Typing of Emerging Entities.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL - Association of Computational Linguistics

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012) Discovering and Exploring Relations on the Web.
Proc. of the Very Large Database Endowment (PVLDB), 5 (12). pp. 1982-1985.

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2013) Discovering semantic relations from the web and organizing them with PATTY.
ACM SIGMOD Record, 42 (2). pp. 29-34.

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012) PATTY: A Taxonomy of Relational Patterns with Semantic Types.
In: Proc. Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL 2012).
Conference: EMNLP - Empirical Methods in Natural Language Processing

Nasri, Mitra and Brandenburg, Björn B.
(2017) An Exact and Sustainable Analysis of Non-preemptive Scheduling.
In: 2017 IEEE Real-Time Systems Symposium, RTSS 2017, Paris, France, December 5-8, 2017.
Conference: RTSS - Real Time Systems Symposium

Nasri, Mitra and Brandenburg, Björn B.
(2017) An Exact and Sustainable Analysis of Non-preemptive Scheduling.
In: 2017 IEEE Real-Time Systems Symposium (RTSS).
Conference: RTSS - Real Time Systems Symposium

Nasri, Mitra and Brandenburg, Björn B.
(2017) Offline Equivalence: A Non-preemptive Scheduling Technique for Resource-Constrained Embedded Real-Time Systems.
In: 2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).
Conference: RTAS - IEEE Real-Time and Embedded Technology and Applications Symposium

Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2016) J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features.
Transactions of the Association for Computational Linguistics (TACL), 4. pp. 215-229.

Nguyen, Hoang-Vu and Mandros, Panagiotis and Vreeken, Jilles
(2016) Universal Dependency Analysis.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Böhm, Klemens
(2014) Multivariate Maximal Correlation Analysis.
In: Proceedings of the International Conference on Machine Learning (ICML).
Conference: ICML - International Conference on Machine Learning

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Keller, Fabian and Böhm, Klemens
(2013) CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Klemens, Böhm
(2014) Unsupervised Interaction-Preserving Discretization of Multivariate Data.
Data Mining and Knowledge Discovery, 28 (5). pp. 1366-1397.

Nguyen, Hoang-Vu and Vreeken, Jilles
(2016) Flexibly Mining Better Subgroups.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Nguyen, Hoang-Vu and Vreeken, Jilles
(2016) Linear-Time Detection of Non-Linear Changes in Massively High Dimensional Time Series.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Nguyen, Hoang-Vu and Vreeken, Jilles
(2015) Non-Parametric Jensen-Shannon Divergence.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

P

Palatinus, Endre and Dittrich, Jens
(2016) Runtime Fragility in Main Memory.
In: Data Management on New Hardware. Springer, pp. 150-165.

Pang, Jun and Zhang, Yang
(2017) Quantifying Location Sociality.
UNSPECIFIED.

Patel, P. and Vanga, Manohar and Brandenburg, Björn B.
(2017) TimerShield: Protecting High-Priority Tasks from Low-Priority Timer Interference.
In: 2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).
Conference: RTAS - IEEE Real-Time and Embedded Technology and Applications Symposium

Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj
(2015) In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security - Usenix Security Symposium

Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian
(2015) jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Pienta, Robert and Kahng, Minsuk and Lin, Zhang and Vreeken, Jilles and Talukdar, Partha and Abello, James and Parameswaran, Ganesh and Chau, Duen Horng
(2017) FACETS : Adaptive Local Exploration of Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Pienta, Robert and Lin, Zhang and Kahng, M. and Vreeken, Jilles and Talukdar, Partha and Abello, J. and Parameswaran, G. and Chau, D.H.
(2015) AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs.
In: Proceedings of the IEEE Conference on Visualization (VIS).
Conference: None | Not Set

Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016) Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).

Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016) Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).

Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2014) Efficiently Spotting the Starting Points of an Epidemic in a Large Graph.
Knowledge and Information Systems, 38 (1). pp. 35-59.

Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2012) Spotting Culprits in Epidemics: How many and Which ones?
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Q

Qu, Lizhen and Gemulla, Rainer and Weikum, Gerhard
(2012) A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts.
In: Proc. of the Joint Conference on Empirical Methods for Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'12).
Conference: CoNLL - Conference on Natural Language Learning

Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011) RAFT at work: speeding-up mapreduce applications under task and node failures.
In: Proceedings of the ACM SIGMOD International Conference on Management of data.
Conference: SIGMOD - ACM Special Interest Group on Management of Data Conference

Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011) RAFTing MapReduce: Fast recovery on the RAFT.
In: Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE).
Conference: ICDE - International Conference on Data Engineering

R

Ramon, Jan and Miettinen, Pauli and Vreeken, Jilles
(2013) Detecting Bicliques in GF[q].
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Rau, Andreas
(2017) Topic-driven testing.
In: Software Engineering Companion (ICSE-C), 2017 IEEE/ACM 39th International Conference on, Buenos Aires, Argentina.
Conference: ICSE - International Conference on Software Engineering

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Efficient GUI Test Generation by Learning from Tests of Other Apps.
In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings.
Conference: ICSE - International Conference on Software Engineering

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Transferring Tests Across Web Applications.
In: ICWE - International Conference for Web Engineering.
Conference: None | Not Set

Rau, Andreas and Reinert, Maximilian and Zeller, Andreas
(2016) Automatic Test Transfer across Applications.
Technical Report. Chair of Software Engineering, Saarland University, Saarbrücken, Germany.

Reischuk, Raphael M. and Schröder, Florian and Gehrke, Johannes
(2013) DEMO: Secure and Customizable Web Development in the SAFE Activation Framework.
In: CCS~'13: Proceedings of the 20th ACM Conference on Computer and Communications Security.
Conference: CCS - ACM Conference on Computer and Communications Security

Remmerie, Noor and Vijlder, Thomas De and Valkenborg, Dirk and Laukens, Kris and Smets, Koen and Vreeken, Jilles and Mertens, Inge and Carpentier, Sebastien and Panis, Bart and de Jaeger, Geert and Prinsen, Els and Witters, Erwin
(2011) Unraveling tobacco BY-2 protein complexes with BN PAGE/LC-MS/MS and clustering methods.
Journal of Proteomics, 74 (8). pp. 1201-1217.

Richards, Gregor and Hammer, Christian and Burg, Brian and Vitek, Jan
(2011) The Eval that Men Do -- A Large-scale Study of the Use of Eval in JavaScript Applications.
In: ECOOP'11: Proceedings of the 25th European Conference on Object-Oriented Programming.
Conference: ECOOP - European Conference on Object-Oriented Programming

Richards, Gregor and Hammer, Christian and Nardelli, Francesco Zappa and Jagannathan, Suresh and Vitek, Jan
(2013) Flexible Access Control for JavaScript.
In: Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages and applications.
Conference: OOPSLA - ACM Conference on Object Oriented Programming Systems Languages and Applications

Richter, Stefan and Alvarez, Victor and Dittrich, Jens
(2015) A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing.
PVLDB, 9 (3). pp. 96-107.

Richter, Stefan and Dittrich, Jens and Schuh, Stefan and Frey, Tobias
(2013) Mosquito: Another One Bites the Data Upload STream.
The Proceedings of the VLDB Endowment (PVLDB), 6 (12). pp. 1274-1277.

Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2013) Towards Zero-Overhead Static and Adaptive Indexing in Hadoop.
VLDB Journal, 23 (3). pp. 469-494.

Rozenshtein, Polina and Gionis, Aristides and Prakash, B. Aditya and Vreeken, Jilles
(2016) Reconstructing an Epidemic over Time.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Rößler, Jeremias and Fraser, Gordon and Zeller, Andreas and Orso, Alessandro
(2012) Isolating failure causes through test case generation.
In: Proc. of the 2012 International Symposium on Software Testing and Analysis (ISSTA 2012).
Conference: ISSTA - International Symposium on Software Testing and Analysis

Rößler, Jeremias and Zeller, Andreas and Fraser, Gordon and Zamfir, Cristian and Candea, George
(2013) Reconstructing Core Dumps.
In: Proc. of the Sixth International IEEE Conference on Software Testing, Verification and Validation (ICST 2013).
Conference: ICST - International Conference on Software Testing, Verification and Validation

S

Salvesen, Kevin and Galeotti, Juan Pablo and Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2015) Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing.
In: Proceedings of the Eighth International Workshop on Search-Based Software Testing.
Conference: None | Not Set

Schad, Jorg and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets.
In: Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD).
Conference: None | Not Set

Scheffler, Tatjana and Schirru, Rafael and Lehmann, Paul
(2012) Matching Points of Interest from Different Social Networking Sites.
In: UNSPECIFIED Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence, LNAI, 7526 . Springer, pp. 245-248.

Schuh, Stefan and Chen, Xiao and Dittrich, Jens
(2016) An experimental comparison of thirteen relational equi-joins in main memory.
In: Proceedings of the 2016 International Conference on Management of Data.

Schuhknecht, Felix Martin and Dittrich, Jens and Sharma, Ankur
(2016) RUMA has it: rewired user-space memory access is possible!
Proceedings of the VLDB Endowment, 9 (10). pp. 768-779.

Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2013) The Uncracked Pieces in Database Cracking.
The Proceedings of the VLDB Endowment (PVLDB), 7 (2). pp. 97-108.

Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2016) An experimental evaluation and analysis of database cracking.
VLDB J., 25 (1). pp. 27-52.

Schuhknecht, Felix Martin and Khanchandani, Pankaj and Dittrich, Jens
(2015) On the Surprising Difficulty of Simple Things: The Case of Radix Partitioning.
Proc. VLDB Endow., 8 (9). pp. 934-937.

Schuler, David and Zeller, Andreas
(2013) Checked coverage: an indicator for oracle quality.
Software Testing, Verification and Reliability (STVR), 23 (7). pp. 531-551.

Schuler, David and Zeller, Andreas
(2013) Covering and Uncovering Equivalent Mutants.
Software Testing, Verification and Reliability (STVR), 23 (5). pp. 353-374.

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2013) Mining behavior models from enterprise web applications.
In: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13.
Conference: ESEC/FSE - European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (duplicate was listed as ESEC, removed from DB)

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2014) ProCrawl: Mining Test Models from Multi-user Web Applications.
In: Proc. International Symposium on Software Testing and Analysis (ISSTA 2014).
Conference: ISSTA - International Symposium on Software Testing and Analysis

Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016) An Empirical Study of Textual Key-Fingerprint Representations.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Seufert, Stephan and Berberich, Klaus and Bedathur, Srikanta J. and Kondreddi, Sarath Kumar and Ernst, Patrick and Weikum, Gerhard
(2016) ESPRESSO: Explaining Relationships between Entity Sets.
In: Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2017) Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting.
CoRR, abs/17.

Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2018) The Case for Automatic Database Administration using Deep Reinforcement Learning.
ArXiv e-prints.

Siebes, A. and Vreeken, Jilles and Leeuwen, M. van
(2006) Item Sets that Compress.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).

Siebes, Arno and van Leeuwen, Matthijs and Vreeken, Jilles
(2007) MDL for Pattern Mining.
In: Proceedings of the International Conference on Statistics for Data Mining, Learning and Knowledge Extraction Models (IASC).

Simeonovski, Milivoj
(2014) Poster: Quasi-ID: In fact, I am a human.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
In: 13th International Conference on Applied Cryptography and Network Security (ACNS).
Conference: None | Not Set

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015. p. 592.

Smets, Koen and Vreeken, Jilles
(2011) The Odd One Out: Identifying and Characterising Anomalies.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Smets, Koen and Vreeken, Jilles
(2012) \textsc Slim : Directly Mining Descriptive Patterns.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Snelting, Gregor and Giffhorn, Dennis and Graf, Jürgen and Hammer, Christian and Hecker, Martin and Mohr, Martin and Wasserrab, Daniel
(2014) Checking probabilistic noninterference using JOANA.
it - Information Technology, 56 (6). pp. 280-287.

Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019) Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
In: NDSS Symposium 2019.
Conference: NDSS - Network and Distributed System Security Symposium

Stock, Ben
(2013) Implementing low-level browser-based security functionality.
Masters thesis, UNSPECIFIED.

Stock, Ben
(2009) P2P-Botnetz-Analyse--Waledac.
Bachelors thesis, UNSPECIFIED.

Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009) Walowdac-analysis of a peer-to-peer botnet.
In: Computer Network Defense (EC2ND), 2009 European Conference on.
Conference: None | Not Set

Stock, Ben and Johns, Martin
(2014) Protecting Users Against XSS-based Password Manager Abuse.
In: Proceedings of the 9th ACM symposium on Information, computer and communications security.
Conference: CCS - ACM Conference on Computer and Communications Security

Stock, Ben and Johns, Martin and Steffens, Marius and Backes, Michael
(2017) How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
In: Proceedings of the 26th USENIX Security Symposium (USENIX Security '17).
Conference: USENIX-Security - Usenix Security Symposium

Stock, Ben and Kaiser, Bernd and Pfistner, Stephan and Lekies, Sebastian and Johns, Martin
(2015) From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting.
In: Proceedings of the 22nd ACM Conference on Computer and Communications Security.
Conference: CCS - ACM Conference on Computer and Communications Security

Stock, Ben and Lekies, Sebastian and Johns, Martin
(2014) DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land.
In: Sicherheit.
Conference: None | Not Set

Stock, Ben and Lekies, Sebastian and Mueller, Tobias and Spiegel, Patrick and Johns, Martin
(2014) Precise Client-side Protection against DOM-based Cross-Site Scripting.
In: 23rd USENIX Security Symposium (USENIX Security 14).
Conference: USENIX-Security - Usenix Security Symposium

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS - Network and Distributed System Security Symposium

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Redmiles, Elissa M. and Kim, Doowon and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle and Fahl, Sascha
(2017) Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Usenix Association.

Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2012) Sambamba: A Runtime System for Online Adaptive Parallelization.
In: Proc. of the 21st International Conference Compiler Construction (CC 2012).
Conference: CC - International Conference on Compiler Construction

Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2013) Sambamba: Runtime Adaptive Parallel Execution.
In: Proceedings of the 3rd International Workshop on Adaptive Self-Tuning Computing Systems.
Conference: None | Not Set

Suchanek, Fabian M and Gross-Amblard, David
(2012) Adding fake facts to ontologies.
In: Proc. of the 21st International Conference on World Wide Web (WWW 2012).

Sumner, William N and Hammer, Christian and Dolby, Julian
(2012) Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.
In: Runtime Verification. Springer, pp. 161-176.

Sundareisan, Shashi and Vreeken, Jilles and Prakash, B. Aditya
(2015) Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

T

Taneva, Bilyana and Weikum, Gerhard
(2013) Gem-based Entity-Knowledge Maintenance.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Tatti, Nikolaj and Vreeken, Jilles
(2011) Comparing Apples and Oranges: Measuring Differences between Data Mining Results.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Tatti, Nikolaj and Vreeken, Jilles
(2008) Finding Good Itemsets by Packing Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Tatti, Nikolaj and Vreeken, Jilles
(2012) Comparing Apples and Oranges : Measuring Differences between Exploratory Data Mining Results.
Data Mining and Knowledge Discovery, 25 (2). pp. 173-207.

Tatti, Nikolaj and Vreeken, Jilles
(2012) Discovering Descriptive Tile Trees by Fast Mining of Optimal Geometric Subtiles.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Tatti, Nikolaj and Vreeken, Jilles
(2012) The Long and the Short of It: Summarising Event Sequences with Serial Episodes.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Thome, Julian and Gorla, Alessandra and Zeller, Andreas
(2014) Search-based Security Testing of Web Applications.
In: Proceedings of the 7th International Workshop on Search-Based Software Testing.
Conference: None | Not Set

Tramèr, Floran and Atlidakis, Vaggelis and Geambasu, Roxana and Hsu, Daniel and Hubaux, Jean-Pierre and Humbert, Mathias and Juels, Ari and Lin, Huang
(2017) FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
In: UNSPECIFIED.

V

van Leeuwen, Matthijs and Vreeken, Jilles and Siebes, Arno
(2009) Identifying the Components.
Data Mining and Knowledge Discovery, 19 (2). pp. 173-292.

Vanga, Manohar and Bastoni, Andrea and Theiling, Henrik and Brandenburg, Björn B.
(2017) Supporting low-latency, low-criticality tasks in a certified mixed-criticality OS.
In: Proceedings of the 25th International Conference on Real-Time Networks and Systems, RTNS 2017, Grenoble, France, October 04 - 06, 2017.
Conference: None | Not Set

Viswanath, Bimal and Bashir, Ahmad M and Crovella, Mark and Guha, Saikat and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2014) Towards Detecting Anomalous User Behavior in Online Social Networks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security - Usenix Security Symposium

Viswanath, Bimal and Mondal, Mainack and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Exploring the design space of social network-based Sybil defense.
In: Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012).
Conference: None | Not Set

Vivanti, Mattia and Mis, Andre and Gorla, Alessandra and Fraser, Gordon
(2013) Search-based data-flow test generation.
In: IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013.

Vogelgesang, Stephanie
(2017) Datensicherheit und IT-Sicherheit in der Justiz.
juris – Die Monatszeitschrift.

Vogelgesang, Stephanie
(2016) Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?
juris – Die Monatszeitschrift, 3 (1). pp. 2-8. ISSN 2197-5345

Vogelgesang, Stephanie and Hessel, Stefan
(2017) Spionagegeräte im Kinderzimmer? – Zur Problematik des § 90 TKG bei Smart Toys.
ZD - Zeitschrift für den Datenschutz, 7 (6). pp. 269-273. ISSN 2192-5593

Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016) Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11). pp. 729-734.

Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016) Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11). pp. 729-734. ISSN 1614-0702

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 233-235.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 233-235. ISSN 0170-7256

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift, 3 (10). pp. 381-387.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift. ISSN 2197-5345

Vogelgesang, Stephanie and Möllers, Frederik and Hessel, Stefan and Potel, Karin
(2017) Auf der Jagd nach Schwachstellen – Eine strafrechtliche Bewertung von Portscans.
Datenschutz und Datensicherheit - DuD, 41 (8). pp. 501-506.

Vogelgesang, Stephanie and Möllers, Frederik and Hessel, Stefan and Potel, Karin
(2017) Auf der Jagd nach Schwachstellen – Eine strafrechtliche Bewertung von Portscans.
Datenschutz und Datensicherheit - DuD, 41 (8). pp. 501-506.

Vogelgesang, Stephanie and Möllers, Frederik and Potel, Karin
(2017) Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots.
MultiMedia und Recht, 20 (5). pp. 291-295. ISSN 1434-596X

Vogelgesang, Stephanie and Möllers, Frederik and Potel, Karin
(2017) Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots.
MultiMedia und Recht, 20 (5). pp. 291-295.

Vreeken, Jilles
(2015) Causal Inference by Direction of Information.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Vreeken, Jilles
(2010) Making Pattern Mining Useful.
SIGKDD Explorations, 12 (1). pp. 75-76.

Vreeken, Jilles
(2009) Making Pattern Mining Useful.
Doctoral thesis, Universiteit Utrecht.

Vreeken, Jilles and Leeuwen, M. van and Siebes, A.
(2007) Characterising the Difference.
In: KDD07.

Vreeken, Jilles and Leeuwen, M. van and Siebes, A.
(2007) Preserving Privacy through Data Generation.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).

Vreeken, Jilles and Ling, Charles X. and Siebes, Arno and Zaki, Mohammed J. and Xu Yu, Jeffrey and Goethals, Bart and Webb, Geoffrey I. and Wu, Xindong
(2012) Proceedings of the 12th IEEE International Conference on Data Mining Workshops (ICDMW), IEEE, 2012.
IEEE.

Vreeken, Jilles and Siebes, A.
(2008) Filling in the Blanks - Krimp Minimisation for Missing Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).

Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010) UP '10: Proceedings of the ACM SIGKDD Workshop on Useful Patterns.
ACM Press, New York, NY, USA.

Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010) Useful Patterns (UP’10) ACM SIGKDD Workshop Report.
SIGKDD Explorations, 12 (2). pp. 56-58.

Vreeken, Jilles and Tatti, Nikolaj
(2012) Summarising Event Sequences with Serial Episodes.
In: Proceedings of the fifth Workshop on Information Theoretic Methods in Science and Engineering (WITMSE).
Conference: None | Not Set

Vreeken, Jilles and Zimek, Arthur
(2011) When Pattern met Subspace Cluster, a Relationship Story.
In: Proceedings of the 2nd Workshop on Discovering, Summarizing and Using Multiple Clusterings (MultiClust).
Conference: None | Not Set

Vreeken, Jilles and van Leeuwen, Matthijs and Nijssen, Siegfried and Tatti, Nikolaj and Dries, Anton and Goethals, Bart
(2012) Proceedings of the ECML PKDD Workshop on Instant Interactive Data Mining (IID).
UNSPECIFIED.

Vreeken, Jilles and van Leeuwen, Matthijs and Siebes, Arno
(2011) Krimp: Mining Itemsets that Compress.
Data Minining and Knowledge Discovery, 23 (1). pp. 169-214.

W

Webb, Geoffrey and Vreeken, Jilles
(2013) Efficient Discovery of the Most Interesting Associations.
Transactions on Knowledge Discovery from Data, 8 (3). pp. 1-31.

Weikum, Gerhard and Hoffart, Johannes and Nakashole, Ndapandula and Spaniol, Marc and Suchanek, Fabian M and Yosef, Mohamed Amir
(2012) Big Data Methods for Computational Linguistics.
IEEE Data Engineering Bulletin, 35 (3). pp. 46-64.

Weikum, Gerhard and Hoffart, Johannes and Suchanek, Fabian M
(2016) Ten Years of Knowledge Harvesting: Lessons and Challenges.
IEEE Data Engineering Bulletin, 39 (3). pp. 41-50.

Weller, Michael and Vogelgesang, Stephanie
(2016) Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16.
jurisPR-ITR (19).

Wiering, Marco and Van Veenen, Jelle and Vreeken, Jilles and Koopman, Arne
(2004) Simulation and Optimization of Traffic in a City.
In: Proceedings of the IEEE Intelligent Vehicles Symposium (IV).

Winkler, Christian and Löchtefeld, Markus and Dobbelstein, David and Krüger, Antonio and Rukzio, Enrico
(2014) SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction.
In: Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario.
Conference: CHI - International Conference on Human Factors in Computing Systems

Wu, Hao and Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles and Hossain, M.Shariar and Ramakrishnan, Naren
(2012) Where Do I Start? Algorithmic Strategies to Guide Intelligence Analysts.
In: Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD).
Conference: None | Not Set

Wu, Hao and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2014) Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas.
Data Mining and Knowledge Discovery, 28 (5). pp. 1398-1428.

Y

Yosef, Mohamed Amir and Bauer, Sandro and Hoffart, Johannes and Spaniol, Marc and Weikum, Gerhard
(2013) HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL - Association of Computational Linguistics

Z

Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2016) On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs.
In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW'16).
Conference: CSCW - ACM Conference on Computer Supported Cooperative Work

Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream.
TWEB, 9 (3). 12:1-12:33.

Zafar, Muhammad Bilal and Gummadi, Krishna P. and Danescu-Niculescu-Mizil, Cristian
(2016) Message Impartiality in Social Media Discussions.
In: Proceedings of the 10th International Conference on Web and Social Media.
Conference: None | Not Set

Zarezade, Ali and Upadhyay, U. and Rabiee, H. and Gomez-Rodriguez, Manuel
(2017) RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks.
In: WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining.
Conference: WSDM - ACM International Conference on Web Search and Data Mining

Zeller, Andreas
(2016) Automatisches Sicherheitstesten.
Datenschutz und Datensicherheit (DuD), 40 (8). pp. 519-522.

Zeller, Andreas
(2012) Mining Models.
In: Proc. of the 19th International Workshop on Model Checking Software (SPIN 2012).
Conference: None | Not Set

Zeller, Andreas
(2012) Proving programs continuous: technical perspective.
Communications of the ACM, 55 (8). p. 106.

Zeller, Andreas
(2016) Software verstehen, zerstören, schützen mit automatischen Software-Modellen.
In: 46. Jahrestagung der Gesellschaft fuer Informatik (Informatik 2016).
Conference: None | Not Set

Zeller, Andreas
(2015) Test Complement Exclusion: Guarantees from Dynamic Analysis.
In: Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension.
Conference: None | Not Set

Zeller, Andreas and Hammacher, Clemens and Doerfert, Johannes and Streit, Kevin and Hack, Sebastian
(2015) Generalized Task Parallelism.
ACM Transactions on Architecture and Code Optimization (TACO), 12 (1). p. 8.

Zeller, Andreas and Herzig, Kim and Just, Sascha
(2015) It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction.
In: Software-Engineering & Management, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI).
Conference: None | Not Set

Zeller, Andreas and Wei, Yi and Meyer, Bertrand and Nordio, Martin and Furia, Carlo A. and Pei, Yu
(2014) Automated Fixing of Programs with Contracts.
IEEE Transactions on Software Engineering, 40 (5). pp. 427-449. ISSN 0098-5589

Zheng, Nan and Paloski, Aaron and Wang, Haining
(2011) An Efficient User Verification System via Mouse Movements.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS - ACM Conference on Computer and Communications Security

Zimek, Arthur and Assent, Ira and Vreeken, Jilles
(2014) Frequent Pattern Mining.
Springer.

Zimek, Arthur and Vreeken, Jilles
(2015) The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives.
Machine Learning, 98 (1). pp. 121-155.

Zimmermann, Thomas and Premraj, Rahul and Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin
(2010) What Makes a Good Bug Report?
IEEE Transactions on Software Engineering, 36 (5). pp. 618-643.

This list was generated on Sun Nov 18 00:02:29 2018 CET.