Items where Year is 2009

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: A | B | C | D | E | G | H | K | L | M | P | R | S | T | V | W
Number of items: 70.

A

Asghar, Muhammad Rizwan
(2009) DRM Convergence: Interoperability between DRM Systems.
Masters thesis, Eindhoven University of Technology (TU/e).

B

Babitski, Grigori and Bergweiler, Simon and Hoffmann, Jörg and Schön, Daniel and Stasch, Christoph and Walkowski, Alexander C.
(2009) Ontology-Based Integration of Sensor Web Services in Disaster Management.
In: GeoSpatial Semantics, Third International Conference, GeoS 2009, Mexico City, Mexico, December 3-4, 2009. Proceedings.

Babitski, Grigori and Probst, Florian and Hoffmann, Jörg and Oberle, Daniel
(2009) Ontology Design for Information Integration in Disaster Management.
In: Informatik 2009: Im Focus das Leben, Beitrage der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 28.9.-2.10.2009, Lübeck, Deutschland, Proceedings.

Backes, Michael and Chen, Tongbo and Dürmuth, Markus and Lensch, Hendrik and Welk, Martin
(2009) Tempest in a Teapot: Compromising Reflections Revisited.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009) Achieving Security Despite Compromise Using Zero-knowledge.
In: Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
In: Proceedings of OTM Conferences.

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.

Backes, Michael and Hofheinz, Dennis and Unruh, Dominique
(2009) CoSP: a general framework for computational soundness proofs.
In: Proceedings of the 16th ACM conference on Computer and communications security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Köpf, Boris and Rybalchenko, Andrey
(2009) Automatic Discovery and Quantification of Information Leaks.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Maffei, Matteo
(2009) Design and Verification of Anonymous Trust Protocols.
In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers.

Bohli, Jens-Matthias and Sorge, Christoph and Westhoff, Dirk
(2009) Initial Observations on Economics, Pricing, and Penetration of the Internet of Things Market.
ACM Computer Communication Review, 39 (2). pp. 50-55.

Born, Matthias and Hoffmann, Jörg and Kaczmarek, Tomasz and Kowalkiewicz, Marek and Markovic, Ivan and Scicluna, James and Weber, Ingo and Zhou, Xuan
(2009) Supporting Execution-Level Business Process Modeling with Semantic Technologies.
In: Database Systems for Advanced Applications, 14th International Conference, DASFAA 2009, Brisbane, Australia, April 21-23, 2009. Proceedings.

Busenius, Alex
(2009) Expi2Java - En Extensible Code Generator for Security Protocols.
Bachelors thesis, Saarland University.

Bühler, Thomas and Hein, Matthias
(2009) Spectral clustering based on the graph \emphp-Laplacian.
In: Proceedings of the 26th Annual International Conference on Machine Learning, ICML 2009, Montreal, Quebec, Canada, June 14-18, 2009.

C

Cai, Dunbo and Hoffmann, Jörg and Helmert, Malte
(2009) Enhancing the Context-Enhanced Additive Heuristic with Precedence Constraints.
In: Proceedings of the 19th International Conference on Automated Planning and Scheduling, ICAPS 2009, Thessaloniki, Greece, September 19-23, 2009.

D

Daiber, Florian and Schöning, Johannes and Krüger, Antonio
(2009) Whole Body Interaction with Geospatial Data.
In: Smart Graphics, 9th International Symposium, SG 2009, Salamanca, Spain, May 28-30, 2009. Proceedings.

Domshlak, Carmel and Hoffmann, Jörg and Sabharwal, Ashish
(2009) Friends or Foes? On Planning as Satisfiability and Abstract CNF Encodings.
J. Artif. Intell. Res., 36. 415–469.

Döring, Tanja and Krüger, Antonio and Schmidt, Albrecht and Schöning, Johannes
(2009) Tangible, Embedded, and Reality-Based Interaction (Begreifbare, eingebettete und realitätsbasierte Interaktion).
it - Information Technology, 51 (6). 319–324.

E

Ekberg, Jan-Erik and Bugiel, Sven
(2009) Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC'09).

G

Gerling, Sebastian
(2009) Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.

Giffhorn, Dennis and Hammer, Christian
(2009) Precise Slicing of Concurrent Programs -- An Evaluation of Precise Slicing Algorithms for Concurrent Programs.
Journal of Automated Software Engineering, 16 (2). pp. 197-234.

Grochulla, Martin
(2009) Security Despite Compromise with Zero-Knowledge Proofs.
Masters thesis, Saarland University.

H

Hamerlik, Lech Marek
(2009) Anonymity and Censorship Resistance in Sematic Overlay Networtks.
Masters thesis, Saarland University.

Hammer, Christian
(2009) Information Flow Control for Java - A Comprehensive Approach based on Path Conditions in Dependence Graphs.
Doctoral thesis, Universit.

Hammer, Christian and Snelting, Gregor
(2009) Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
International Journal of Information Security, 8 (6). pp. 399-422.

Heikinheimo, Hannes and Vreeken, Jilles and Siebes, Arno and Mannila, Heikki
(2009) Low-Entropy Set Selection.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).

Hein, Matthias
(2009) Robust Nonparametric Regression with Metric-Space Valued Output.
In: Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, Vancouver, British Columbia, Canada..

Heine, Dirk
(2009) Sicherheitskonzept an einem Rechenzentrum.
Bachelors thesis, Saarland University.

Hoffmann, Jörg and Bertoli, Piergiorgio and Helmert, Malte and Pistore, Marco
(2009) Message-Based Web Service Composition, Integrity Constraints, and Planning under Uncertainty: A New Connection.
J. Artif. Intell. Res., 35. 49–117.

Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2009) Polynomial Runtime in Simulatability Definitions.
Journal of Computer Security, 17 (5). pp. 703-735.

K

Keller, Andreas and Ludwig, Nicole and Heisel, Sabrina and Leidinger, Petra and Andres, Claudia and Steudel, Wolf-Ingo and Huwer, Hanno and Burgeth, Bernhard and Hein, Matthias and Weickert, Joachim and Meese, Eckart and Lenhof, Hans-Peter
(2009) Large-scale antibody profiling of human blood sera: The future of molecular diagnosis.
Informatik Spektrum, 32 (4). 332–338.

Kim, Kwang In and Steinke, Florian and Hein, Matthias
(2009) Semi-supervised Regression using Hessian energy with an application to semi-supervised dimensionality reduction.
In: Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, Vancouver, British Columbia, Canada..

Krohmer, Anton
(2009) Rational File Sharing.
Bachelors thesis, Saarland University.

Krüger, Antonio and Butz, Andreas
(2009) Smart Graphics.
it - Information Technology, 51 (3). 129–130.

Künnemann, Robert
(2009) Hiding Malicious Postscript Code and How to Define Undetectabilit.
Bachelors thesis, UNSPECIFIED.

L

Lorenz, Stefan
(2009) Caspa - Mechanized Verification of Security Protocols using Causality-based Abstractions.
Bachelors thesis, Saarland University.

Löchtefeld, Markus and Schöning, Johannes and Rohs, Michael and Krüger, Antonio
(2009) Marauders light: replacing the wand with a mobile camera projector unit.
In: Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, MUM 2009, Cambridge, United Kingdom, November 22-25, 2009.

M

Maier, Markus and Hein, Matthias and von Luxburg, Ulrike
(2009) Optimal construction of k-nearest-neighbor graphs for identifying noisy clusters.
Theor. Comput. Sci., 410 (19). 1749–1764.

Mohammadi, Esfandiar
(2009) Computational Soundness of Symbolic Zero-Knowledge Proofs against Active Attackers under Relaxed Assumptions.
Masters thesis, Saarland University.

Müller, Jörg and Cheverst, Keith and Fitton, Dan and Taylor, Nick and Paczkowski, Oliver and Krüger, Antonio
(2009) Experiences of Supporting Local and Remote Mobile Phone Interaction in Situated Public Display Deployments.
IJMHCI, 1 (2). 1–21.

Müller, Jörg and Exeler, Juliane and Buzeck, Markus and Krüger, Antonio
(2009) ReflectiveSigns: Digital Signs That Adapt to Audience Attention.
In: Pervasive Computing, 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009. Proceedings.

Müller, Jörg and Krüger, Antonio
(2009) MobiDiC: Context Adaptive Digital Signage with Coupons.
In: Ambient Intelligence, European Conference, AmI 2009, Salzburg, Austria, November 18-21, 2009. Proceedings.

Müller, Jörg and Wilmsmann, Dennis and Exeler, Juliane and Buzeck, Markus and Schmidt, Albrecht and Jay, Tim and Krüger, Antonio
(2009) Display Blindness: The Effect of Expectations on Attention towards Digital Signage.
In: Pervasive Computing, 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009. Proceedings.

P

Proß, Benjamin and Schöning, Johannes and Krüger, Antonio
(2009) iPiccer: automatically retrieving and inferring tagged location information from web repositories.
In: Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2009, Bonn, Germany, September 15-18, 2009.

R

Rohs, Michael and Essl, Georg and Schöning, Johannes and Naumann, Anja and Schleicher, Robert and Krüger, Antonio
(2009) Impact of item density on magic lens interactions.
In: Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2009, Bonn, Germany, September 15-18, 2009.

Rohs, Michael and Schleicher, Robert and Schöning, Johannes and Essl, Georg and Naumann, Anja and Krüger, Antonio
(2009) Impact of item density on the utility of visual context in magic lens interactions.
Personal and Ubiquitous Computing, 13 (8). 633–646.

S

Schnuck, Christian
(2009) Computing Information-theoretic Bounds for Unknown Message Side-Channel Attacks.
Bachelors thesis, Saarland University.

Schöning, Johannes and Bartindale, Tom and Olivier, Patrick and Jackson, Daniel and Krüger, Antonio and Kitson, Jim
(2009) iBookmark: locative texts and place-based authoring.
In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009.

Schöning, Johannes and Daiber, Florian and Krüger, Antonio and Rohs, Michael
(2009) Using hands and feet to navigate and manipulate spatial data.
In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009.

Schöning, Johannes and Krüger, Antonio and Cheverst, Keith and Rohs, Michael and Löchtefeld, Markus and Taher, Faisal
(2009) PhotoMap: using spontaneously taken images of public maps for pedestrian navigation tasks on mobile devices.
In: Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2009, Bonn, Germany, September 15-18, 2009.

Schöning, Johannes and Rohs, Michael and Kratz, Sven G. and Löchtefeld, Markus and Krüger, Antonio
(2009) Map torchlight: a mobile augmented reality camera projector unit.
In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009.

Schöning, Johannes and Steinicke, Frank and Krüger, Antonio and Hinrichs, Klaus H.
(2009) Poster: Interscopic multi-touch surfaces: Using bimanual interaction for intuitive manipulation of spatial data.
In: IEEE Symposium on 3D User Interfaces, 3DUI 2009, Lafayette, LA, USA, 14-15 March, 2009.

Schöning, Johannes and Steinicke, Frank and Krüger, Antonio and Hinrichs, Klaus H. and Valkov, Dimitar
(2009) Bimanual Interaction with Interscopic Multi-Touch Surfaces.
In: Human-Computer Interaction - INTERACT 2009, 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedings, Part II.

Sorge, Christoph and Girao, Joao and Sarma, Amardeo
(2009) Privacy-enabled identity management in the Future Internet.
In: Towards the Future Internet - A European Research Perspective.

Sorge, Christoph and Seedorf, Jan
(2009) A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms.
In: Proceedings of the IEEE International Conference on Communications (ICC 2009).

Stock, Ben
(2009) P2P-Botnetz-Analyse--Waledac.
Bachelors thesis, UNSPECIFIED.

Stock, Ben and Goebel, Jan and Engelberth, Markus and Freiling, Felix C. and Holz, Thorsten
(2009) Walowdac-analysis of a peer-to-peer botnet.
In: Computer Network Defense (EC2ND), 2009 European Conference on.

Strickland, Stephen T. and Felleisen, Matthias
(2009) Contracts for First-Class Modules.
In: DLS'09.

T

Tarrach, Thorsten
(2009) SPI2F - A Prototype Code Generator for Security Protocols.
Bachelors thesis, Saarland University.

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).

Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Pöpper, Christina and Capkun, Srdjan and Capkun, Srdjan and Capkun, Srdjan
(2009) iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems.
Technical Report. UNSPECIFIED.

Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Pöpper, Christina and \vCapku, Srdjan
(2009) Attacks on Public WLAN-based Positioning.
In: Proceedings of the ACM Conference on Mobile Systems, Applications and Services (MobiSys).

Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2009) Secure Ranging With Message Temporal Integrity.
In: Cryptology ePrint Archive: Report 2009/602.

Tippenhauer, Nils Ole and \vCapku, Srdjan
(2009) ID-based Secure Distance Bounding and Localization.
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS).

V

van Leeuwen, Matthijs and Vreeken, Jilles and Siebes, Arno
(2009) Identifying the Components.
Data Mining and Knowledge Discovery, 19 (2). pp. 173-292.

Vreeken, Jilles
(2009) Making Pattern Mining Useful.
Doctoral thesis, Universiteit Utrecht.

W

Wachenfeld, Steffen and Broelemann, Klaus and Jiang, Xiaoyi and Krüger, Antonio
(2009) Graph-Based Registration of Partial Images of City Maps Using Geometric Hashing.
In: Graph-Based Representations in Pattern Recognition, 7th IAPR-TC-15 International Workshop, GbRPR 2009, Venice, Italy, May 26-28, 2009. Proceedings.

Weber, Ingo and Barros, Alistair P. and May, Norman and Hoffmann, Jörg and Kaczmarek, Tomasz
(2009) Composing Services for Third-party Service Delivery.
In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009.

Winter, Stephan and Kuhn, Werner and Krüger, Antonio
(2009) Guest Editorial: Does Place Have a Place in Geographic Information Science?
Spatial Cognition & Computation, 9 (3). 171–173.

This list was generated on Thu Oct 10 07:31:24 2024 CEST.