Up a level |
(2007) A Calculus of Challenges and Responses.
(2007) Causality-based Abstraction of Multiplicity in Security Protocols.
(2007) On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
(2007) Information Flow in the Peer-Reviewing Process (extended abstract).
(2007) On the Necessity of Rewinding in Secure Multiparty Computation.
(2007) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
(2007) Auditory perceptible landmarks in mobile navigation.
(2007) Integrating Discovery and Automated Composition: from Semantic Requirements to Executable Code.
(2007) Quality of Bug Reports in Eclipse.
(2007) An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
(2007) From Sampling to Model Counting.
(2007) Sampling and Soundness: Can We Have Both?
(2007) Short XORs for Model Counting: From Theory to Practice.
(2007) Manifold Denoising as Preprocessing for Finding Natural Representations of Data.
(2007) Flexible Abstraction Heuristics for Optimal Sequential Planning.
(2007) Web Service Composition as Planning, Revisited: In Between Background Theories and Initial State Uncertainty.
(2007) SAT Encodings of State-Space Reachability Problems in Numeric Domains.
(2007) Polynomial-Time Reasoning for Semantic Web Service Composition.
(2007) Analysing Movement and Behavioural Patterns of Laboratory Mice in a Semi Natural Environment Based on Data collected via RFID-Technology.
(2007) Adaptive Mobile Guides.
(2007) Improving Human Computer Interaction Through Embedded Vision Technology.
(2007) Uppaal/DMC- Abstraction-Based Heuristics for Directed Model Checking.
(2007) Cluster Identification in Nearest-Neighbor Graphs.
(2007) Learning Topologies of Situated Public Displays by Observing Implicit User Interactions.
(2007) Visual Navigation within Conceptual Spaces.
(2007) Competing for your Attention: Negative Externalities in Digital Signage Advertising.
(2007) Maximizing the Utility of Situated Public Displays.
(2007) Situated Public News and Reminder Displays.
(2007) Long-term Security and Universal Composability.
(2007) Map navigation with mobile devices: virtual versus physical movement with and without visual context.
(2007) Designing intelligent user interface for ubiquitous computing environments.
(2007) A laboratory evaluation framework for pedestrian navigation devices.
(2007) Modelling personality in voices of talking products through prosodic parameters.
(2007) Heuristics for Constructing Bayesian Network Based Geospatial Ontologies.
(2007) MDL for Pattern Mining.
(2007) Scalable Web Service Composition with Partial Matches.
(2007) A Chord-based Recommender System.
(2007) Rechtliche Einordnung Peer-to-Peer-basierter Dienste.
(2007) A Caching Mechanism for Semantic Web Service Discovery.
(2007) Random Oracles and Auxiliary Input.
(2007) Characterising the Difference.
(2007) Preserving Privacy through Data Generation.
(2007) Towards a Methodology for Semantic Business Process Modeling and Configuration.
(2007) The Reactive Simulatability Framework for Asynchronous Systems.
(2007) Bekämpfung der Computerkriminalität - Zum Entwurf eines Strafrechtsänderungsgesetzes zur Bekämpfung der Computerkriminalität.
(2007) Probabilistic Planning via Heuristic Forward Search and Weighted Model Counting.
(2007) Graph Laplacians and their Convergence on Random Neighborhood Graphs.
(2007) Structure and Problem Hardness: Goal Asymmetry and DPLL Proofs in SAT-Based Planning.
(2007) Universally Composable Zero-Knowledge Arguments and Commitments from Signature Cards.
(2007) A GIS Framework for Spatio-temporal Analysis and Visualization of Laboratory Mice Tracking Data.
(2007) Datenschutz in P2P-basierten Systemen: Peer-to-Peer-Netze jenseits des Filesharing.
(2007) Adaptive, intelligent presentation of information for the museum visitor in PEACH.
(2007) Quantum Programs with Classical Output Streams.
(2007) On Key-dependent Encryption.
(2007) Multiparty Computation in an Asynchronous Network.
(2007) Cryptographic Soundness of Simpler Symbolic Signatures and Authentications.
(2007) LAN Crypt Gateway and Secure Browser Access.
(2007) Trust Model for eVoting.
(2007) Implementing Fuzzy Identity-Based Encryption.
(2007) Design und Implementierung eines Sync-ML Clients für das c`man-Framework für Symbian Gerät.
(2007) Mechanized verification of Security Protocols Using Causality-based Abstractions.
(2007) Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with SmartMIPS Architecture.
(2007) Protokollkomposition und Komplexität.
(2007) Enterprise Privacy Policies and Languages.
(2007) Enterprise Privacy Policies and Languages.
(2007) Integration of Mobile and Stationary Presentation Devices.
(2007) Intelligent Interfaces for Groups in a Museum.
(2007) Protokollkomposition und Komplexität.
(2007) Smart Graphics, 7th International Symposium, SG 2007, Kyoto, Japan, June 25-27, 2007, Proceedings.
(2007) Causality-based Abstraction of Multiplicity in Security Protocol Analysis.
(2007) Vorgetäuscht / Böse Textdokumente -- Postscript gone wild.
(2007) On the Security of Protocols with Logarithmic Communication Complexity.