Items where Year is 2005

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 48.

Conference or Workshop Item (A Paper)

Aslan, Ilhan and Xu, Feiyu and Steffen, Jörg and Uszkoreit, Hans and Krüger, Antonio
(2005) COMPASS2008: The Smart Dining Service.
In: Intelligent Technologies for Interactive Entertainment, First International Conference, INTETAIN 2005, Madonna di Campiglio, Italy, November 30 - December 2, 2005, Proceedings.

Aslan, Ilhan and Xu, Feiyu and Uszkoreit, Hans and Krüger, Antonio and Steffen, Jörg
(2005) COMPASS2008: Multimodal, Multilingual and Crosslingual Interaction for Mobile Tourist Guide Applications.
In: Intelligent Technologies for Interactive Entertainment, First International Conference, INTETAIN 2005, Madonna di Campiglio, Italy, November 30 - December 2, 2005, Proceedings.

Backes, Michael
(2005) Quantifying Probabilistic Information Flow in Computational Reactive Systems.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Cachin, Christian
(2005) Public-Key Steganography with Active Attacks.
In: Proceedings of 2nd Theory of Cryptography Conference (TCC).

Backes, Michael and Cachin, Christian and Oprea, Alina
(2005) Lazy Revocation in Cryptographic File Systems.
In: Proceedings of 3rd International IEEE Security in Storage Workshop (SISW).

Backes, Michael and Camenisch, Jan and Sommer, Dieter
(2005) Anonymous yet accountable access control.
In: Proceedings of 4th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2005) Compositional Analysis of Contract Signing Protocols.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Dürmuth, Markus
(2005) A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Groß, Thomas
(2005) Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
In: Proceedings of 2005 ACM Secure Web Services Workshop (SWS).

Backes, Michael and Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2005) On Fairness in Simulatability-based Cryptographic Systems.
In: 3rd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code.

Backes, Michael and Pfitzmann, Birgit
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
In: Proceedings of 26th IEEE Symposium on Security and Privacy.

Baus, Jörg and Krüger, Antonio and Kuflik, Tsvi
(2005) Seamless Combination of Shared and Personalized Information Presentation to Groups of Visitors in Active Museums - Research Agenda.
In: Lernen, Wissensentdeckung und Adaptivität (LWA) 2005, GI Workshops, Saarbrücken, October 10th-12th, 2005.

Butz, Andreas and Schmitz, Michael and Krüger, Antonio and Hullmann, Harald
(2005) Tangible UIs for media control: probes into the design space.
In: Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005.

Hein, Matthias and Audibert, Jean-Yves
(2005) Intrinsic dimensionality estimation of submanifolds in Rd.
In: Machine Learning, Proceedings of the Twenty-Second International Conference (ICML 2005), Bonn, Germany, August 7-11, 2005.

Hein, Matthias and Audibert, Jean-Yves and von Luxburg, Ulrike
(2005) From Graphs to Manifolds - Weak and Strong Pointwise Consistency of Graph Laplacians.
In: Learning Theory, 18th Annual Conference on Learning Theory, COLT 2005, Bertinoro, Italy, June 27-30, 2005, Proceedings.

Hein, Matthias and Bousquet, Olivier
(2005) Hilbertian Metrics and Positive Definite Kernels on Probability Measures.
In: Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, AISTATS 2005, Bridgetown, Barbados, January 6-8, 2005.

Hoffmann, Jörg and Brafman, Ronen I.
(2005) Contingent Planning via Heuristic Forward Search witn Implicit Belief States.
In: Proceedings of the Fifteenth International Conference on Automated Planning and Scheduling (ICAPS 2005), June 5-10 2005, Monterey, California, USA.

Hoffmann, Jörg and Kupferschmid, Sebastian
(2005) A Covering Problem for Hypercubes.
In: IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30 - August 5, 2005.

Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2005) Polynomial Runtime in Simulatability Definitions.
In: 18th IEEE Computer Security Foundations Workshop, Proceedings of CSFW 2005.

Hofheinz, Dennis and Unruh, Dominique
(2005) Comparing Two Notions of Simulatability.
In: Theory of Cryptography, Proceedings of TCC 2005.

Hofheinz, Dennis and Unruh, Dominique
(2005) On the Notion of Statistical Security in Simulatability Definitions.
In: Information Security, Proceedings of ISC'05.

Kray, Christian and Butz, Andreas and Krüger, Antonio and Schmidt, Albrecht and Prendinger, Helmut
(2005) Multi-user and ubiquitous user interfaces: (MU3I 2005).
In: Proceedings of the 10th International Conference on Intelligent User Interfaces, IUI 2005, San Diego, California, USA, January 10-13, 2005.

Kray, Christian and Kortuem, Gerd and Krüger, Antonio
(2005) Adaptive navigation support with public displays.
In: Proceedings of the 10th International Conference on Intelligent User Interfaces, IUI 2005, San Diego, California, USA, January 10-13, 2005.

Kruppa, Michael and Krüger, Antonio
(2005) Performing Physical Object References with Migrating Virtual Characters.
In: Intelligent Technologies for Interactive Entertainment, First International Conference, INTETAIN 2005, Madonna di Campiglio, Italy, November 30 - December 2, 2005, Proceedings.

Krüger, Antonio
(2005) Seamless Information Presentation in Instrumented Environments through Object Associated Displays.
In: INFORMATIK 2005 - Informatik LIVE! Band 2, Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Bonn, 19. bis 22. September 2005.

Rolli, Daniel and Conrad, Michael and Neumann, Dirk and Sorge, Christoph
(2005) An asynchronous and secure ascending peer-to-peer auction.
In: P2PECON rq05: Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems.

Rukzio, Enrico and Schmidt, Albrecht and Krüger, Antonio
(2005) The rotating compass: a novel interaction technique for mobile navigation.
In: Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005.

Sorge, Christoph
(2005) Conclusion of contracts by electronic agents.
In: The Tenth International Conference on Artificial Intelligence and Law (ICAIL 05): proceedings of the conference.

Spassova, Lübomira and Wasinger, Rainer and Baus, Jörg and Krüger, Antonio
(2005) Product Associated Displays in a Shopping Scenario.
In: Fourth IEEE / ACM International Symposium on Mixed and Augmented Reality (ISMAR 2005), 5-8 October 2005, Vienna, Austria.

Wasinger, Rainer and Krüger, Antonio and Jacobs, Oliver
(2005) Integrating Intra and Extra Gestures into a Mobile and Multimodal Shopping Assistant.
In: Pervasive Computing, Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings.

Article

Backes, Michael
(2005) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
Journal of Logic and Algebraic Programming (JLAP), 2. pp. 157-188.

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2 (2). pp. 109-123.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4). pp. 242-252.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3). pp. 135-154.

Bergfelder, Martin and Nitschke, Tanja and Sorge, Christoph
(2005) Signaturen durch elektronische Agenten.
Informatik Spektrum, 28 (3). pp. 210-219.

Hein, Matthias and Bousquet, Olivier and Schölkopf, Bernhard
(2005) Maximal margin classification for metric spaces.
J. Comput. Syst. Sci., 71 (3). 333–359.

Hoffmann, Jörg
(2005) Where 'Ignoring Delete Lists' Works: Local Search Topology in Planning Benchmarks.
J. Artif. Intell. Res., 24. 685–758.

Hoffmann, Jörg and Edelkamp, Stefan
(2005) The Deterministic Part of IPC-4: An Overview.
J. Artif. Intell. Res., 24. 519–579.

Jameson, Anthony and Krüger, Antonio
(2005) Preface to the Special Issue on User Modeling in Ubiquitous Computing.
User Model. User-Adapt. Interact., 15 (3-4). 193–195.

Kruppa, Michael and Heckmann, Dominik and Krüger, Antonio
(2005) Adaptive multimodal presentation of multimedia content in museum scenarios.
KI, 19 (1). p. 56.

Thiébaux, Sylvie and Hoffmann, Jörg and Nebel, Bernhard
(2005) In defense of PDDL axioms.
Artif. Intell., 168 (1-2). 38–69.

Thesis

Hein, Matthias
(2005) Geometrical aspects of statistical learning theory.
Doctoral thesis, Darmstadt University of Technology, Germany.

Book

UNSPECIFIED, ed.
(2005) Proceedings of the First Internaltional Workshop on Personalized Context Modeling and Management for UbiComp Applications, ubiPCMM 2005, Tokyo, Japan, September 11, 2005.
CEUR Workshop Proceedings, 149 . CEUR-WS.org.

UNSPECIFIED, ed.
(2005) Smart Graphics, 5th International Symposium, SG 2005, Frauenwörth Cloister, Germany, August 22-24, 2005, Proceedings.
Lecture Notes in Computer Science, 3638 . Springer.

Backes, Michael and Scedrov, Andre
(2005) Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.
ENTCS.

Other

Müller-Quade, Jörn and Röhrich, Stefan and Unruh, Dominique
(2005) Oblivious Transfer is Incomplete for Deniable Protocols.
UNSPECIFIED
.

Unruh, Dominique
(2005) Relations among Statistical Security Notions - or - Why Exponential Adversaries are Unlimited.
UNSPECIFIED
.

This list was generated on Wed Apr 24 23:43:19 2024 CEST.