Number of items: 70.
A
Asghar, Muhammad Rizwan
(2009)
DRM Convergence: Interoperability between DRM Systems.
Masters thesis, Eindhoven University of Technology (TU/e).
B
Babitski, Grigori and Bergweiler, Simon and Hoffmann, Jörg and Schön, Daniel and Stasch, Christoph and Walkowski, Alexander C.
(2009)
Ontology-Based Integration of Sensor Web Services in Disaster Management.
Babitski, Grigori and Probst, Florian and Hoffmann, Jörg and Oberle, Daniel
(2009)
Ontology Design for Information Integration in Disaster Management.
Backes, Michael and Chen, Tongbo and Dürmuth, Markus and Lensch, Hendrik and Welk, Martin
(2009)
Tempest in a Teapot: Compromising Reflections Revisited.
Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009)
CSAR: A practical and provable technique to make randomized systems accountable.
Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009)
Achieving Security Despite Compromise Using Zero-knowledge.
Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009)
Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009)
Anonymity and Censorship Resistance in Unstructured Overlay Networks.
Backes, Michael and Hofheinz, Dennis and Unruh, Dominique
(2009)
CoSP: a general framework for computational soundness proofs.
Backes, Michael and Köpf, Boris and Rybalchenko, Andrey
(2009)
Automatic Discovery and Quantification of Information Leaks.
Backes, Michael and Maffei, Matteo
(2009)
Design and Verification of Anonymous Trust Protocols.
Bohli, Jens-Matthias and Sorge, Christoph and Westhoff, Dirk
(2009)
Initial Observations on Economics, Pricing, and Penetration of the Internet of Things Market.
ACM Computer Communication Review, 39 (2).
pp. 50-55.
Born, Matthias and Hoffmann, Jörg and Kaczmarek, Tomasz and Kowalkiewicz, Marek and Markovic, Ivan and Scicluna, James and Weber, Ingo and Zhou, Xuan
(2009)
Supporting Execution-Level Business Process Modeling with Semantic Technologies.
Busenius, Alex
(2009)
Expi2Java - En Extensible Code Generator for Security Protocols.
Bachelors thesis, Saarland University.
Bühler, Thomas and Hein, Matthias
(2009)
Spectral clustering based on the graph \emphp-Laplacian.
C
Cai, Dunbo and Hoffmann, Jörg and Helmert, Malte
(2009)
Enhancing the Context-Enhanced Additive Heuristic with Precedence Constraints.
D
Daiber, Florian and Schöning, Johannes and Krüger, Antonio
(2009)
Whole Body Interaction with Geospatial Data.
Domshlak, Carmel and Hoffmann, Jörg and Sabharwal, Ashish
(2009)
Friends or Foes? On Planning as Satisfiability and Abstract CNF Encodings.
J. Artif. Intell. Res., 36.
415–469.
Döring, Tanja and Krüger, Antonio and Schmidt, Albrecht and Schöning, Johannes
(2009)
Tangible, Embedded, and Reality-Based Interaction (Begreifbare, eingebettete und realitätsbasierte Interaktion).
it - Information Technology, 51 (6).
319–324.
E
Ekberg, Jan-Erik and Bugiel, Sven
(2009)
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
G
Gerling, Sebastian
(2009)
Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.
Giffhorn, Dennis and Hammer, Christian
(2009)
Precise Slicing of Concurrent Programs -- An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
Journal of Automated Software Engineering, 16 (2).
pp. 197-234.
Grochulla, Martin
(2009)
Security Despite Compromise with Zero-Knowledge Proofs.
Masters thesis, Saarland University.
H
Hamerlik, Lech Marek
(2009)
Anonymity and Censorship Resistance in Sematic Overlay Networtks.
Masters thesis, Saarland University.
Hammer, Christian
(2009)
Information Flow Control for Java - A Comprehensive Approach based on Path Conditions in Dependence Graphs.
Doctoral thesis, Universit.
Hammer, Christian and Snelting, Gregor
(2009)
Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
International Journal of Information Security, 8 (6).
pp. 399-422.
Heikinheimo, Hannes and Vreeken, Jilles and Siebes, Arno and Mannila, Heikki
(2009)
Low-Entropy Set Selection.
Hein, Matthias
(2009)
Robust Nonparametric Regression with Metric-Space Valued Output.
Heine, Dirk
(2009)
Sicherheitskonzept an einem Rechenzentrum.
Bachelors thesis, Saarland University.
Hoffmann, Jörg and Bertoli, Piergiorgio and Helmert, Malte and Pistore, Marco
(2009)
Message-Based Web Service Composition, Integrity Constraints, and Planning under Uncertainty: A New Connection.
J. Artif. Intell. Res., 35.
49–117.
Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2009)
Polynomial Runtime in Simulatability Definitions.
Journal of Computer Security, 17 (5).
pp. 703-735.
K
Keller, Andreas and Ludwig, Nicole and Heisel, Sabrina and Leidinger, Petra and Andres, Claudia and Steudel, Wolf-Ingo and Huwer, Hanno and Burgeth, Bernhard and Hein, Matthias and Weickert, Joachim and Meese, Eckart and Lenhof, Hans-Peter
(2009)
Large-scale antibody profiling of human blood sera: The future of molecular diagnosis.
Informatik Spektrum, 32 (4).
332–338.
Kim, Kwang In and Steinke, Florian and Hein, Matthias
(2009)
Semi-supervised Regression using Hessian energy with an application to semi-supervised dimensionality reduction.
Krohmer, Anton
(2009)
Rational File Sharing.
Bachelors thesis, Saarland University.
Krüger, Antonio and Butz, Andreas
(2009)
Smart Graphics.
it - Information Technology, 51 (3).
129–130.
Künnemann, Robert
(2009)
Hiding Malicious Postscript Code and How to Define Undetectabilit.
Bachelors thesis, UNSPECIFIED.
L
Lorenz, Stefan
(2009)
Caspa - Mechanized Verification of Security Protocols using Causality-based Abstractions.
Bachelors thesis, Saarland University.
Löchtefeld, Markus and Schöning, Johannes and Rohs, Michael and Krüger, Antonio
(2009)
Marauders light: replacing the wand with a mobile camera projector unit.
M
Maier, Markus and Hein, Matthias and von Luxburg, Ulrike
(2009)
Optimal construction of k-nearest-neighbor graphs for identifying noisy clusters.
Theor. Comput. Sci., 410 (19).
1749–1764.
Mohammadi, Esfandiar
(2009)
Computational Soundness of Symbolic Zero-Knowledge Proofs against Active Attackers under Relaxed Assumptions.
Masters thesis, Saarland University.
Müller, Jörg and Cheverst, Keith and Fitton, Dan and Taylor, Nick and Paczkowski, Oliver and Krüger, Antonio
(2009)
Experiences of Supporting Local and Remote Mobile Phone Interaction in Situated Public Display Deployments.
IJMHCI, 1 (2).
1–21.
Müller, Jörg and Exeler, Juliane and Buzeck, Markus and Krüger, Antonio
(2009)
ReflectiveSigns: Digital Signs That Adapt to Audience Attention.
Müller, Jörg and Krüger, Antonio
(2009)
MobiDiC: Context Adaptive Digital Signage with Coupons.
Müller, Jörg and Wilmsmann, Dennis and Exeler, Juliane and Buzeck, Markus and Schmidt, Albrecht and Jay, Tim and Krüger, Antonio
(2009)
Display Blindness: The Effect of Expectations on Attention towards Digital Signage.
P
Proß, Benjamin and Schöning, Johannes and Krüger, Antonio
(2009)
iPiccer: automatically retrieving and inferring tagged location information from web repositories.
R
Rohs, Michael and Essl, Georg and Schöning, Johannes and Naumann, Anja and Schleicher, Robert and Krüger, Antonio
(2009)
Impact of item density on magic lens interactions.
Rohs, Michael and Schleicher, Robert and Schöning, Johannes and Essl, Georg and Naumann, Anja and Krüger, Antonio
(2009)
Impact of item density on the utility of visual context in magic lens interactions.
Personal and Ubiquitous Computing, 13 (8).
633–646.
S
Schnuck, Christian
(2009)
Computing Information-theoretic Bounds for Unknown Message Side-Channel Attacks.
Bachelors thesis, Saarland University.
Schöning, Johannes and Bartindale, Tom and Olivier, Patrick and Jackson, Daniel and Krüger, Antonio and Kitson, Jim
(2009)
iBookmark: locative texts and place-based authoring.
Schöning, Johannes and Daiber, Florian and Krüger, Antonio and Rohs, Michael
(2009)
Using hands and feet to navigate and manipulate spatial data.
Schöning, Johannes and Krüger, Antonio and Cheverst, Keith and Rohs, Michael and Löchtefeld, Markus and Taher, Faisal
(2009)
PhotoMap: using spontaneously taken images of public maps for pedestrian navigation tasks on mobile devices.
Schöning, Johannes and Rohs, Michael and Kratz, Sven G. and Löchtefeld, Markus and Krüger, Antonio
(2009)
Map torchlight: a mobile augmented reality camera projector unit.
Schöning, Johannes and Steinicke, Frank and Krüger, Antonio and Hinrichs, Klaus H.
(2009)
Poster: Interscopic multi-touch surfaces: Using bimanual interaction for intuitive manipulation of spatial data.
Schöning, Johannes and Steinicke, Frank and Krüger, Antonio and Hinrichs, Klaus H. and Valkov, Dimitar
(2009)
Bimanual Interaction with Interscopic Multi-Touch Surfaces.
Sorge, Christoph and Girao, Joao and Sarma, Amardeo
(2009)
Privacy-enabled identity management in the Future Internet.
Sorge, Christoph and Seedorf, Jan
(2009)
A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms.
Stock, Ben
(2009)
P2P-Botnetz-Analyse--Waledac.
Bachelors thesis, UNSPECIFIED.
Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009)
Walowdac-analysis of a peer-to-peer botnet.
Strickland, Stephen T. and Felleisen, Matthias
(2009)
Contracts for First-Class Modules.
T
Tarrach, Thorsten
(2009)
SPI2F - A Prototype Code Generator for Security Protocols.
Bachelors thesis, Saarland University.
Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009)
Security of Robust Audio Hashes.
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Pöpper, Christina and Capkun, Srdjan and Capkun, Srdjan and Capkun, Srdjan
(2009)
iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems.
Technical Report.
UNSPECIFIED.
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Pöpper, Christina and \vCapku, Srdjan
(2009)
Attacks on Public WLAN-based Positioning.
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2009)
Secure Ranging With Message Temporal Integrity.
Tippenhauer, Nils Ole and \vCapku, Srdjan
(2009)
ID-based Secure Distance Bounding and Localization.
V
van Leeuwen, Matthijs and Vreeken, Jilles and Siebes, Arno
(2009)
Identifying the Components.
Data Mining and Knowledge Discovery, 19 (2).
pp. 173-292.
Vreeken, Jilles
(2009)
Making Pattern Mining Useful.
Doctoral thesis, Universiteit Utrecht.
W
Wachenfeld, Steffen and Broelemann, Klaus and Jiang, Xiaoyi and Krüger, Antonio
(2009)
Graph-Based Registration of Partial Images of City Maps Using Geometric Hashing.
Weber, Ingo and Barros, Alistair P. and May, Norman and Hoffmann, Jörg and Kaczmarek, Tomasz
(2009)
Composing Services for Third-party Service Delivery.
Winter, Stephan and Kuhn, Werner and Krüger, Antonio
(2009)
Guest Editorial: Does Place Have a Place in Geographic Information Science?
Spatial Cognition & Computation, 9 (3).
171–173.
This list was generated on Sat Dec 21 05:35:20 2024 CET.