Number of items: 55.
A
Andrei, Mihai and Berre, Arne-Jørgen and Costa, Luis and Duchesne, Philippe and Fitzner, Daniel and Grcar, Miha and Hoffmann, Jörg and Klien, Eva and Langlois, Joel and Limyr, Andreas and Maué, Patrick and Schade, Sven and Steinmetz, Nathalie and Tertre, Francois and Vasiliu, Laurentiu and Zaharia, Raluca and Zastavni, Nicolas
(2008)
SWING: An Integrated Environment for Geospatial Semantic Web Services.
B
Backes, Michael and Berg, Matthias and Unruh, Dominique
(2008)
A Formal Language for Cryptographic Pseudocode.
Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2008)
Conditional Reactive Simulatability.
International Journal of Information Security, 7 (2).
pp. 155-169.
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008)
Compromising Reflections or How to Read LCD Monitors Around the Corner.
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008)
Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten.
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008)
OAEP is Secure Under Key-dependent Messages.
Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2008)
Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2008)
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus.
Backes, Michael and Köpf, Boris
(2008)
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2008)
CASPA: Causality-based Abstraction for Security Protocol Analysis.
Backes, Michael and Maffei, Matteo and Hriţcu, Cătălin
(2008)
Type-checking zero-knowledge.
Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2008)
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Backes, Michael and Pfitzmann, Birgit
(2008)
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
International Journal of Information Security, 7 (1).
pp. 33-54.
Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2008)
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Journal of Computer Security (JCS).
Backes, Michael and Unruh, Dominique
(2008)
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
Backes, Michael and Unruh, Dominique
(2008)
Limits of Constructive Security Proofs.
Baumann, Christoph
(2008)
Formal Specification of the x87 Floating-Point Instruction Set.
Diploma thesis, UNSPECIFIED.
Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin and Premraj, Rahul and Zimmermann, Thomas
(2008)
What makes a good bug report?
Bohli, Jens-Matthias and Sorge, Christoph
(2008)
Key-Substitution-Angriffe und das Signaturgesetz.
Datenschutz und Datensicherheit, 32 (6).
pp. 388-392.
Born, Matthias and Hoffmann, Jörg and Kaczmarek, Tomasz and Kowalkiewicz, Marek and Markovic, Ivan and Scicluna, James and Weber, Ingo and Zhou, Xuan
(2008)
Semantic Annotation and Composition of Business Processes with Maestro.
Bornträger, Holger
(2008)
MD5 Collisions on Multimedia Files.
Bachelors thesis, UNSPECIFIED.
C
Cheverst, Keith and Schöning, Johannes and Krüger, Antonio and Rohs, Michael
(2008)
Photomap: Snap, Grab and Walk away with a "You Are Here" Map.
Ciobataru, Oana
(2008)
Efficient Long-term Secure Universally Composable Commitments.
Masters thesis, Saarland University.
D
Didyk, Piotr and Mantiuk, Rafal and Hein, Matthias and Seidel, Hans-Peter
(2008)
Enhancement of Bright Video Features for HDR Displays.
Comput. Graph. Forum, 27 (4).
1265–1274.
G
Giffhorn, Dennis and Hammer, Christian
(2008)
Precise Analysis of Java Programs using JOANA (Tool Demonstration).
Gliet, Jana and Krüger, Antonio and Klemm, Otto and Schöning, Johannes
(2008)
Image geo-mashups: the example of an augmented reality weather camera.
Governatori, Guido and Hoffmann, Jörg and Sadiq, Shazia Wasim and Weber, Ingo
(2008)
Detecting Regulatory Compliance for Business Process Models through Semantic Annotations.
H
Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank
(2008)
Dynamic detection of atomic-set-serializability violations.
Hammer, Christian and Schaade, Rüdiger and Snelting, Gregor
(2008)
Static path conditions for Java.
Hammer, Christian and Snelting, Gregor
(2008)
Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
Technical Report.
UNSPECIFIED.
(Unpublished)
Helmert, Malte and Haslum, Patrik and Hoffmann, Jörg
(2008)
Explicit-State Abstraction: A New Method for Generating Heuristic Functions.
Hoffmann, Jörg
(2008)
Towards Efficient Belief Update for Planning-Based Web Service Composition.
Hoffmann, Jörg and Weber, Ingo and Scicluna, James and Kaczmarek, Tomasz and Ankolekar, Anupriya
(2008)
Combining Scalability and Expressivity in the Automatic Composition of Semantic Web Services.
Hofheinz, Dennis and Unruh, Dominique
(2008)
Towards Key-Dependent Message Security in the Standard Model.
J
Just, Sascha and Premraj, Rahul and Zimmermann, Thomas
(2008)
Towards the next generation of bug tracking systems.
K
Kritzler, Mareike and Jabs, Stephanie and Kegel, Philipp and Krüger, Antonio
(2008)
Indoor tracking of laboratory mice via an rfid-tracking framework.
Kuflik, Tsvi and Berkovsky, Shlomo and Heckmann, Dominik and Krüger, Antonio
(2008)
UbiqUM 2008: theories and applications of ubiquitous user modeling.
Kupferschmid, Sebastian and Hoffmann, Jörg and Larsen, Kim Guldstrand
(2008)
Fast Directed Model Checking Via Russian Doll Abstraction.
M
Maier, Markus and von Luxburg, Ulrike and Hein, Matthias
(2008)
Influence of graph construction on graph-based clustering measures.
Müller, Jörg and Jentsch, Marc and Kray, Christian and Krüger, Antonio
(2008)
Exploring factors that influence the combined use of mobile devices and public displays for pedestrian navigation.
N
Nesbigall, Stefan
(2008)
Quantenbasierte Koordination von Multiagentensystemen.
Masters thesis, Saarland University.
S
Schöning, Johannes and Hecht, Brent J. and Raubal, Martin and Krüger, Antonio and Marsh, Meredith and Rohs, Michael
(2008)
Improving interaction with virtual globes through spatial thinking: helping users ask "why?".
Schöning, Johannes and Rohs, Michael and Krüger, Antonio
(2008)
Mobile Interaction with the real world.
Schöning, Johannes and Rohs, Michael and Krüger, Antonio and Stasch, Christoph
(2008)
Improving the Communication of Spatial Information in Crisis Response by Combining Paper Maps and Mobile Devices.
Sirbu, Adina and Hoffmann, Jörg
(2008)
Towards Scalable Web Service Composition with Partial Matches.
Smaus, Jan-Georg and Hoffmann, Jörg
(2008)
Relaxation Refinement: A New Method to Generate Heuristic Functions.
Sorge, Christoph and Westhoff, Dirk
(2008)
eIDs und Identitätsmanagement.
Datenschutz und Datensicherheit, 32 (5).
pp. 337-341.
Steinicke, Frank and Mensmann, Jörg and Hinrichs, Klaus H. and de Buhr, Jan and Rothaus, Kai and Krüger, Antonio
(2008)
Augmenting 3D City Models with Visualization of Real-Time Meteorological Phenomena.
Steinicke, Frank and Mensmann, Jörg and Rothaus, Kai and de Buhr, Jan and Krüger, Antonio and Hinrichs, Klaus H.
(2008)
Integrating Current Weather Effects into Urban Visualization.
Steinke, Florian and Hein, Matthias
(2008)
Non-parametric Regression Between Manifolds.
Steinke, Florian and Hein, Matthias and Peters, Jan and Schölkopf, Bernhard
(2008)
Manifold-valued Thin-Plate Splines with Applications in Computer Graphics.
Comput. Graph. Forum, 27 (2).
437–448.
T
Tatti, Nikolaj and Vreeken, Jilles
(2008)
Finding Good Itemsets by Packing Data.
Tippenhauer, Nils Ole and \vCapku, Srdjan
(2008)
UWB-based Secure Ranging and Localization.
Technical Report.
UNSPECIFIED.
V
Vreeken, Jilles and Siebes, A.
(2008)
Filling in the Blanks - Krimp Minimisation for Missing Data.
W
Weber, Ingo and Hoffmann, Jörg and Mendling, Jan
(2008)
Beyond Soundness: On the Semantic Consistency of Executable Process Models.
This list was generated on Wed Nov 20 17:00:24 2024 CET.