Number of items: 216.
A
Acs, Gergely and Castelluccia, Claude
(2011)
I have a DREAM! (DIffeRentially PrivatE smartMetering).
Agarwal, Pankaj K. and Mehlhorn, Kurt and Teillaud, Monique
(2011)
Computational Geometry (Dagstuhl Seminar 11111).
Dagstuhl Reports, 1 (3).
19–41.
Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2011)
Verification of Certifying Computations.
Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine and Schweitzer, Pascal
(2011)
An Introduction to Certifying Algorithms.
it - Information Technology, 53 (6).
287–293.
An, Jisun and Cha, Meeyoung and Gummadi, Krishna P. and Crowcroft, Jon
(2011)
Media Landscape in Twitter: A World of New Conventions and Political Diversity.
Arapinis, Myrto and Ritter, Eike and Ryan, Mark D.
(2011)
StatVerif: Verification of Stateful Processes.
Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2011)
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno
(2011)
Poster: ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC.
and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling
(2011)
Efficient Reductions for Non-signaling Cryptographic Primitives.
and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling
(2011)
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
B
Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011)
X-pire! - A digital expiration date for images in social networks.
Technical Report.
UNSPECIFIED.
Backes, Michael and Berg, Matthias and Köpf, Boris
(2011)
Non-Uniform Distributions in Quantitative Information-Flow.
Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011)
Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2).
pp. 107-134.
Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011)
A Local Cross-Site Scripting Attack against Android Phones.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011)
Union and Intersection Types for Secure Protocol Implementations.
Backes, Michael and Hriţcu, Cătălin and Tarrach, Thorsten
(2011)
Automatically Verifying Typing Constraints for a Data Processing Language.
Backes, Michael and Kate, Aniket and Patra, Arpita
(2011)
Computational Verifiable Secret Sharing Revisited.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011)
Securing social networks.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011)
A Security API for Distributed Social Networks.
Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011)
G2C: Cryptographic Protocols from Goal-Driven Specifications.
Baecher, Paul and Fischlin, Marc and Schröder, Dominique
(2011)
Expedient Non-malleability Notions for Hash Functions.
Balzer, Jan
(2011)
Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.
Barthe, Gilles and Köpf, Boris
(2011)
Information-theoretic Bounds for Differentially Private Mechanisms.
Basin, David and Burri, Samuel J and Karjoth, Günter
(2011)
Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
Bastoni, Andrea and Brandenburg, Björn B. and Anderson, James H.
(2011)
Is Semi-Partitioned Scheduling Practical?
Blocki, Jeremiah and Christin, Nicolas and Datta, Anupam and Sinha, Arunesh
(2011)
Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection.
Bornträger, Holger
(2011)
Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.
Brandenburg, Björn B. and Anderson, James H.
(2011)
Real-time resource-sharing under clustered scheduling: mutex, reader-writer, and k-exclusion locks.
Brandenburg, Björn B. and Leontyev, Hennadiy and Anderson, James H.
(2011)
An overview of interrupt accounting techniques for multiprocessor real-time systems.
Journal of Systems Architecture - Embedded Systems Design, 57 (6).
638–654.
Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava
(2011)
Practical and Lightweight Domain Isolation on Android.
Bugiel, Sven and Davi, Lucas and Schulz, Steffen
(2011)
Scalable Trust Establishment with Software Reputation.
Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011)
Twin Clouds: Secure Cloud Computing with Low Latency.
Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011)
AmazonIA: When Elasticity Snaps Back.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2011)
Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols.
Bui, Dai N and Lee, Edward A. and Liu, Isaac and Patel, Hiren D. and Reineke, Jan
(2011)
Temporal isolation on multiprocessing architectures.
Burger, Martin and Zeller, Andreas
(2011)
Minimizing reproduction of software failures.
Bursztein, Elie and Martin, Matthieu and Mitchell, John C.
(2011)
Text-based CAPTCHA Strengths and Weaknesses.
Busenius, Alex
(2011)
Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java.
Masters thesis, Saarland University.
Böhmer, Matthias and Bauer, Gernot and Krüger, Antonio
(2011)
Context tags: exploiting user-given contextual cues for disambiguation.
Böhmer, Matthias and Hecht, Brent J. and Schöning, Johannes and Krüger, Antonio and Bauer, Gernot
(2011)
Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage.
C
Cauchard, Jessica R. and Löchtefeld, Markus and Irani, Pourang and Schöning, Johannes and Krüger, Antonio and Fraser, Mike and Subramanian, Sriram
(2011)
Visual separation in mobile multi-display environments.
Cerny, Pavol and Chatterjee, Krishnendu and Henzinger, Thomas A
(2011)
The Complexity of Quantitative Information Flow Problems.
Chatterjee, Krishnendu and Majumdar, Rupak
(2011)
Minimum Attention Controller Synthesis for Omega-regular Objectives.
Chen, Ruichuan and Shaikh, Aman and Wang, Jia and Francis, Paul
(2011)
Address-based route reflection.
Cheney, James
(2011)
A Formal Framework for Provenance Security.
Chothia, Tom and Guha, Apratim
(2011)
A Statistical Test for Information Leaks Using Continuous Mutual Information.
Christodoulou, Giorgos and Mehlhorn, Kurt and Pyrga, Evangelia
(2011)
Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms.
Ciolacu, Ines Lucia
(2011)
Universally Composable Relativistic Commitments.
Masters thesis, Saarland University.
Cortier, Véronique and Smyth, Ben
(2011)
Attacking and fixing Helios: An analysis of ballot secrecy.
D
Daiber, Florian and Schöning, Johannes and Krüger, Antonio
(2011)
Towards a Framework for Whole Body Interaction with Geospatial Data.
In:
Whole Body Interaction.
Human-Computer Interaction Series
.
Springer, 197–207.
Damm, Werner and Finkbeiner, Bernd
(2011)
Does It Pay to Extend the Perimeter of a World Model?
Danezis, George and Kohlweiss, Markulf and Rial, Alfredo
(2011)
Differentially Private Billing with Rebates.
Technical Report.
UNSPECIFIED.
Datta, Anupam and Blocki, Jeremiah and Christin, Nicolas and DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Sinha, Arunesh
(2011)
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Datta, Anupam and Garg, Deepak and Jia, Limin
(2011)
Policy auditing over incomplete logs: theory, implementation and applications.
Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Jia, Limin and Franklin, Jason
(2011)
On Adversary Models and Compositional Security.
IEEE Security & Privacy, 9 (3).
pp. 26-32.
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).
Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011)
Poster: Control-flow Integrity for Smartphones.
Delaune, Stephanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham
(2011)
Formal analysis of protocols based on TPM state registers.
Dietrich, Christian J. and Rossow, Christian and Freiling, Felix C. and Bos, Herbert and van Steen, Maarten and Pohlmann, Norbert
(2011)
On Botnets That Use DNS for Command and Control.
Dittrich, Jens and Blunschi, Lukas and Salles, Marcos Antonio Vaz
(2011)
MOVIES: indexing moving objects by shooting index images.
GeoInformatica, 15 (4).
pp. 727-767.
Dittrich, Jens and Färber, Franz and Graefe, Goetz and Loeser, Henrik and Reimann, Wilfried and Schöning, Harald
(2011)
"One Size Fits All": An Idea Whose Time Has Come and Gone?
Dittrich, Jens and Jindal, Alekh
(2011)
Towards a One Size Fits All Database Architecture.
Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2011)
A data-centric approach to synchronization.
Technical Report.
UNSPECIFIED.
(Unpublished)
Dupressoir, Francois and Gordon, Andrew D. and Jurjens, Jan and Naumann, David A.
(2011)
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011)
Efficient Reductions for Non-signaling Cryptographic Primitives.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011)
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
E
Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2011)
Pick Your Neighborhood - Improving Labels and Neighborhood Structure for Label Propagation.
Ehlers, Rüdiger and Finkbeiner, Bernd
(2011)
Reactive Safety.
Eigenwillig, Arno and Mehlhorn, Kurt
(2011)
Multiplication of Long Integers - Faster than Long Multiplication.
In:
Algorithms Unplugged.
Springer, 101–109.
F
Finkbeiner, Bernd and Kuhtz, Lars
(2011)
Weak Kripke Structures and LTL.
Fitzner, Daniel and Hoffmann, Jörg and Klien, Eva
(2011)
Functional description of geoprocessing services as conjunctive datalog queries.
GeoInformatica, 15 (1).
191–221.
Fraser, Gordon and Zeller, Andreas
(2011)
Exploiting Common Object Usage in Test Case Generation.
Fraser, Gordon and Zeller, Andreas
(2011)
Generating parameterized unit tests.
Frau, Simone and Dashti, Mohammad Torabi
(2011)
Integrated Specification and Verification of Security Protocols and Policies.
G
Garg, Deepak and Jia, Limin and Datta, Anupam
(2011)
A Logical Method for Policy Enforcement over Evolving Audit Logs.
CoRR, abs/11.
Genovese, Valerio and Garg, Deepak
(2011)
New Modalities for Access Control Logics: Permission, Control and Ratification.
Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011)
MIME: A Framework for Interactive Visual Pattern Mining.
Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011)
MIME: A Framework for Interactive Visual Pattern Mining.
Gomez-Rodriguez, Manuel and Balduzzi, David and Schölkopf, Bernhard
(2011)
Uncovering the Temporal Dynamics of Diffusion Networks.
Groß, Thomas and Mödersheim, Sebastian
(2011)
Vertical Protocol Composition.
Grund, Daniel and Reineke, Jan and Gebhard, Gernot
(2011)
Branch target buffers: WCET analysis framework and timing predictability.
Journal of Systems Architecture - Embedded Systems Design, 57 (6).
pp. 625-637.
Grund, Daniel and Reineke, Jan and Wilhelm, Reinhard
(2011)
A Template for Predictability Definitions with Supporting Evidence.
Guha, Saikat and Cheng, Bin and Francis, Paul
(2011)
Privad: Practical Privacy in Online Advertising.
H
Halperin, Dan and Mehlhorn, Kurt
(2011)
Guest Editorial: Selected Papers from European Symposium on Algorithms.
Algorithmica, 60 (1).
1–2.
Hansen, Marit and Marnau, Ninja and Schlehahn, Eva and Husmann, Elmar
(2011)
Auf dem Weg zur sicheren und datenschutzkonformen Cloud.
kes Magazine, 2011 (Specia).
pp. 14-16.
Hein, Matthias and Lugosi, Gábor and Rosasco, Lorenzo and Smale, Steve
(2011)
Mathematical and Computational Foundations of Learning Theory (Dagstuhl Seminar 11291).
Dagstuhl Reports, 1 (7).
53–69.
Hein, Matthias and Setzer, Simon
(2011)
Beyond Spectral Clustering - Tight Relaxations of Balanced Graph Cuts.
Henzinger, Thomas A and Jobstmann, Barbara and Wolf, Verena
(2011)
Formalisms for Specifying Markovian Population Models.
International Journal of Foundations of Computer Science, 22 (4).
pp. 823-841.
Herter, Jörg and Backes, Peter and Haupenthal, Florian and Reineke, Jan
(2011)
CAMA: A Predictable Cache-Aware Memory Allocator.
Herzig, Kim and Zeller, Andreas
(2011)
Mining Cause-Effect-Chains from Version Histories.
Hoffmann, Jörg
(2011)
Everything You Always Wanted to Know about Planning - (But Were Afraid to Ask).
Hoffmann, Jörg
(2011)
Where Ignoring Delete Lists Works, Part II: Causal Graphs.
Hriţcu, Cătălin
(2011)
Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.
Hur, Chung-Kil and Dreyer, Derek
(2011)
A kripke logical relation between ML and assembly.
Hur, Chung-Kil and Dreyer, Derek and Vafeiadis, Viktor
(2011)
Separation Logic in the Presence of Garbage Collection.
J
Jacobs, Swen and Kuncak, Viktor
(2011)
Towards Complete Reasoning about Axiomatic Specifications.
Jagadeesan, Radha and Pitcher, Corin and Rathke, Julian and Riely, James
(2011)
Local Memory via Layout Randomization.
Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011)
A category-level 3-D object dataset: Putting the Kinect to work.
Jhala, Ranjit and Majumdar, Rupak and Rybalchenko, Andrey
(2011)
HMC: Verifying Functional Programs Using Abstract Interpreters.
Jiang, Xiaoyi and Broelemann, Klaus and Wachenfeld, Steffen and Krüger, Antonio
(2011)
Graph-based markerless registration of city maps using geometric hashing.
Computer Vision and Image Understanding, 115 (7).
1032–1043.
Jindal, Alekh and Dittrich, Jens
(2011)
Relax and Let the Database Do the Partitioning Online.
Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2011)
Trojan data layouts: right shoes for a running elephant.
Jose, Manu and Majumdar, Rupak
(2011)
Bug-Assist: Assisting Fault Localization in ANSI-C Programs.
Jose, Manu and Majumdar, Rupak
(2011)
Cause Clue Clauses: Error Localization Using Maximum Satisfiability.
Just, Seth and Cleary, Alan and Shirley, Brandon and Hammer, Christian
(2011)
Information flow analysis for JavaScript.
K
Kahl, Gerrit and Spassova, Lübomira and Schöning, Johannes and Gehring, Sven and Krüger, Antonio
(2011)
IRL SmartCart - a user-adaptive context-aware interface for shopping assistance.
Kalnikaité, Vaiva and Rogers, Yvonne and Bird, Jon and Villar, Nicolas and Bachour, Khaled and Payne, Stephen J. and Todd, Peter M. and Schöning, Johannes and Krüger, Antonio and Kreitmayer, Stefan
(2011)
How to nudge in Situ: designing lambent devices to deliver salient information in supermarkets.
Karayev, Sergey and Fritz, Mario and Fidler, Sanja and Darrell, Trevor
(2011)
A probabilistic model for recursive factorized image features.
Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady
(2011)
Impossibility of Blind Signatures from One-Way Permutations.
Kavitha, Telikepalli and Mehlhorn, Kurt and Michail, Dimitrios
(2011)
New Approximation Algorithms for Minimum Cycle Bases of Graphs.
Algorithmica, 59 (4).
471–488.
Kehuan, Zhang and Xiaoyong, Zhou and Yangyi, Chen and XiaoFeng, Wang and Yaoping, Ruan
(2011)
Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds.
Kenna, Christopher J. and Herman, Jonathan L. and Brandenburg, Björn B. and Mills, Alex F. and Anderson, James H.
(2011)
Soft Real-Time on Multiprocessors: Are Analysis-Based Schedulers Really Worth It?
Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De, Tijl
(2011)
Maximum Entropy Modelling for Assessing Results on Real-Valued Data.
Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011)
Security for Key Management Interfaces.
Krüger, Antonio
(2011)
Die Zukunft des Fachbereichs "Künstliche Intelligenz".
KI, 25 (4).
333–334.
Krüger, Antonio and Schöning, Johannes and Olivier, Patrick
(2011)
How Computing Will Change the Face of Retail.
IEEE Computer, 44 (4).
84–87.
Künnemann, Robert
(2011)
Game-Theoretic Notions of Incoercibility.
Masters thesis, UNSPECIFIED.
L
Lapin, Maksim and Mikeev, Linar and Wolf, Verena
(2011)
SHAVE: stochastic hybrid analysis of markov population models.
Leibenger, Dominik
(2011)
Vertrauliche Versionsverwaltung mit Subversion.
Masters thesis, Universität Paderborn.
Li, Qi and Xu, Mingwei and Wu, Jianping and Zhang, Xinwen and Lee, Patrick P. C. and Xu, Ke
(2011)
Enhancing the Trust of Internet Routing with Lightweight Route Attestation.
Liu, Yabing and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2011)
Analyzing facebook privacy settings: user expectations vs. reality.
Lorenz, Stefan
(2011)
Anonymous Webs of Trust.
Masters thesis, Saarland University.
Löchtefeld, Markus and Gehring, Sven and Jung, Ralf and Krüger, Antonio
(2011)
Using Mobile Projection to Support Guitar Learning.
Löchtefeld, Markus and Gehring, Sven and Jung, Ralf and Krüger, Antonio
(2011)
guitAR: supporting guitar learning through mobile projection.
Löchtefeld, Markus and Gehring, Sven and Krüger, Antonio
(2011)
Distributed User Interfaces for Projector Phones.
In:
Distributed User Interfaces - Designing Interfaces for the Distributed Ecosystem.
Human-Computer Interaction Series
.
Springer, 113–123.
Löchtefeld, Markus and Krüger, Antonio and Rohs, Michael
(2011)
Mobile Projection Interfaces for Augmented Reality Applications.
In:
Handbook of Augmented Reality.
Springer, 177–197.
M
Maffei, Matteo and Pecina, Kim
(2011)
Privacy-aware proof-carrying authorization.
Majumdar, Rupak and Render, Elaine and Tabuada, Paulo
(2011)
Robust Discrete Synthesis Against Unspecified Disturbances.
Majumdar, Rupak and Saha, Indranil and Zamani, Majid
(2011)
Performance-aware Scheduler Synthesis for Control Systems.
Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles
(2011)
Tell Me What I Need to Know: Succinctly Summarizing Data with Itemsets.
Manjunath, Madhusudan and Mehlhorn, Kurt and Panagiotou, Konstantinos and Sun, He
(2011)
Approximate Counting of Cycles in Streams.
Mannan, Mohammad and Kim, Boem Heyn and Ganjali, Afshar and Lie, David
(2011)
Unicorn: Two-Factor Attestation for Data Security.
Mantel, Heiko and Sands, David and Sudbrock, Henning
(2011)
Assumptions and Guarantees for Compositional Noninterference.
Marcon, Massimiliano and Dischinger, Marcel and Gummadi, Krishna P. and Vahdat, Amin
(2011)
The local and global effects of traffic shaping in the internet.
Marcon, Massimiliano and Viswanath, Bimal and Cha, Meeyoung and Gummadi, Krishna P.
(2011)
Sharing social content from home: a measurement-driven feasibility study.
Mardziel, Piotr and Magill, Stephen and Hicks, Michael and Srivatsa, Mudhakar
(2011)
Dynamic Enforcement of Knowledge-based Security Policies.
Marnau, Ninja and Schirmer, Norbert and Schlehahn, Eva and Schunter, Matthias
(2011)
Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud.
Datenschutz und Datensicherheit (DuD), 5.
pp. 333-337.
Marnau, Ninja and Schlehahn, Eva
(2011)
Cloud Computing und Safe Harbor.
Datenschutz und Datensicherheit (DuD), 5.
Marnau, Ninja and Schlehahn, Eva
(2011)
Cloud Computing: Legal Analysis.
Technical Report.
UNSPECIFIED.
(Unpublished)
McConnell, Ross M and Mehlhorn, Kurt and Näher, Stefan and Schweitzer, Pascal
(2011)
Survey: Certifying Algorithms.
Computer Science Review, 5 (2).
pp. 119-161.
ISSN 1574-0137
McConnell, Ross M. and Mehlhorn, Kurt and Näher, Stefan and Schweitzer, Pascal
(2011)
Certifying algorithms.
Computer Science Review, 5 (2).
119–161.
Megow, Nicole and Mehlhorn, Kurt and Schweitzer, Pascal
(2011)
Online Graph Exploration: New Results on Old and New Algorithms.
Mehlhorn, Kurt
(2011)
The Physarum Computer.
Mehlhorn, Kurt and Osbild, Ralf and Sagraloff, Michael
(2011)
A general approach to the analysis of controlled perturbation algorithms.
Computational Geometry, 44 (9).
507–528.
Mehlhorn, Kurt and Sagraloff, Michael
(2011)
A deterministic algorithm for isolating real roots of a real polynomial.
Journal of Symbolic Computation, 46 (1).
70–90.
Meiser, Sebastian
(2011)
Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Masters thesis, Saarland University.
Meiser, Sebastian
(2011)
Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Metzger, Steffen and Elbassuoni, Shady and Hose, Katja and Schenkel, Ralf
(2011)
S3K: seeking statement-supporting top-K witnesses.
Miettinen, Pauli and Vreeken, Jilles
(2011)
Model Order Selection for Boolean Matrix Factorization.
Mikeev, Linar and Sandmann, Werner and Wolf, Verena
(2011)
Efficient calculation of rare event probabilities in Markovian queueing networks.
Mileva, Yana Momchilova and Wasylkowski, Andrzej and Zeller, Andreas
(2011)
Mining Evolution of Object Usage.
Mileva, Yana Momchilova and Zeller, Andreas
(2011)
Assessing modularity via usage changes.
Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011)
Parametrized shape models for clothing.
Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2011)
Limiting large-scale crawls of social networking sites.
Moore, Scott and Chong, Stephen
(2011)
Static analysis for efficient hybrid information-flow control.
Morgenstern, Jamie and Garg, Deepak and Pfenning, Frank
(2011)
A Proof-Carrying File System with Revocable and Use-Once Certificates.
Müller, Christian A. and Paul, Wolfgang J.
(2011)
Complete Formal Hardware Verification of Interfaces for a FlexRay-Like Bus.
N
Nam, Jaechang and Schuler, David and Zeller, Andreas
(2011)
Calibrated Mutation Testing.
Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2011)
Verification of Information Flow and Access Control Policies with Dependent Types.
Narayanaswami, Chandra and Krüger, Antonio and Marmasse, Natalia
(2011)
Guest Editors' Introduction.
IEEE Pervasive Computing, 10 (2).
16–18.
Neis, Georg and Dreyer, Derek and Rossberg, Andreas
(2011)
Non-parametric parametricity.
J. Funct. Program., 21 (4-5).
497–562.
Ngo, Long and Boyd, Colin and Nieto, Juan Gonzalez
(2011)
Automated proofs for Diffie-Hellman-based key exchanges.
Nissim, Raz and Hoffmann, Jörg and Helmert, Malte
(2011)
Computing Perfect Heuristics in Polynomial Time: On Bisimulation and Merge-and-Shrink Abstraction in Optimal Planning.
P
Petrlic, Ronald
(2011)
Integrity Protection for Automated Teller Machines.
Petrlic, Ronald and Sorge, Christoph
(2011)
A Mutual Authentication Scheme for ATMs.
Technical Report.
UNSPECIFIED.
Post, Ansley and Navarro, Juan and Kuznetsov, Petr and Druschel, Peter
(2011)
Autonomous Storage Management for Personal Devices with PodBase.
Pöpper, Christina and Tippenhauer, Nils Ole and Danev, Boris and \vCapku, Srdjan
(2011)
Investigation of Signal and Message Manipulations on the Wireless Channel.
Q
Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011)
RAFT at work: speeding-up mapreduce applications under task and node failures.
Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011)
RAFTing MapReduce: Fast recovery on the RAFT.
R
Reineke, Jan and Liu, Isaac and Patel, Hiren D. and Kim, Sungjun and Lee, Edward A.
(2011)
PRET DRAM controller: bank privatization for predictability and temporal isolation.
Remmerie, Noor and Vijlder, Thomas De and Valkenborg, Dirk and Laukens, Kris and Smets, Koen and Vreeken, Jilles and Mertens, Inge and Carpentier, Sebastien and Panis, Bart and de Jaeger, Geert and Prinsen, Els and Witters, Erwin
(2011)
Unraveling tobacco BY-2 protein complexes with BN PAGE/LC-MS/MS and clustering methods.
Journal of Proteomics, 74 (8).
pp. 1201-1217.
Reznichenko, Alexey and Guha, Saikat and Francis, Paul
(2011)
Auctions in do-not-track compliant internet advertising.
Richards, Gregor and Hammer, Christian and Burg, Brian and Vitek, Jan
(2011)
The Eval that Men Do -- A Large-scale Study of the Use of Eval in JavaScript Applications.
Rodrigues, Tiago and Benevenuto, Fabrício and Cha, Meeyoung and Gummadi, Krishna P. and Almeida, Virgílio A. F.
(2011)
On word-of-mouth based discovery of the web.
Roy, Pritam and Tabuada, Paulo and Majumdar, Rupak
(2011)
Pessoa 2.0: A Controller Synthesis Tool for Cyber-physical Systems.
Rößler, Jeremias and Orso, Alessandro and Zeller, Andreas
(2011)
When Does My Program Fail?
S
Saenko, Kate and Karayev, Sergey and Jia, Yangqing and Shyr, Alex and Janoch, Allison and Long, Jonathan and Fritz, Mario and Darrell, Trevor
(2011)
Practical 3-D object detection using category and instance-level appearance models.
Schlesinger, Cole and Pattabiraman, Karthik and Swamy, Nikhil and Walker, David and Zorn, Benjamin
(2011)
Modular Protections Against Non-control Data Attacks.
Schröder, Dominique
(2011)
How to Aggregate the CL Signature Scheme.
Schröder, Dominique and Unruh, Dominique
(2011)
Round Optimal Blind Signatures.
Schröder, Dominique and Unruh, Dominique and Garg, Sanjam and Rao, Vanishree and Sahai, Amit
(2011)
Round Optimal Blind Signatures.
Schuler, David and Zeller, Andreas
(2011)
Assessing Oracle Quality with Checked Coverage.
Schwarz, Birgit and Schuler, David and Zeller, Andreas
(2011)
Breeding High-Impact Mutations.
Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2011)
Relaxed-memory concurrency and verified compilation.
Shervashidze, Nino and Schweitzer, Pascal and van Leeuwen, Erik Jan and Mehlhorn, Kurt and Borgwardt, Karsten M.
(2011)
Weisfeiler-Lehman Graph Kernels.
Journal of Machine Learning Research, 12.
2539–2561.
Slawski, Martin and Hein, Matthias
(2011)
Sparse recovery by thresholded non-negative least squares.
Smets, Koen and Vreeken, Jilles
(2011)
The Odd One Out: Identifying and Characterising Anomalies.
Song, Hyun Oh and Fritz, Mario and Gu, Chunhui and Darrell, Trevor
(2011)
Visual grasp affordances from appearance-based cues.
Sorge, Christoph
(2011)
Zum Stand der Technik in der WLAN-Sicherheit.
Computer und Recht, 27 (4).
pp. 273-276.
Stikic, Maja and Larlus, Diane and Ebert, Sandra and Schiele, Bernt
(2011)
Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors.
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 33 (12).
pp. 2521-2537.
Stollberg, Michael and Hoffmann, Jörg and Fensel, Dieter
(2011)
A Caching Technique for Optimizing Automated Service Discovery.
Int. J. Semantic Computing, 5 (1).
1–31.
Stuijk, Sander and Basten, Twan and Akesson, Benny and Geilen, Marc and Moreira, Orlando and Reineke, Jan
(2011)
Designing next-generation real-time streaming systems.
Suchanek, Fabian M and Gross-Amblard, David and Abiteboul, Serge
(2011)
Watermarking for Ontologies.
T
Tatti, Nikolaj and Vreeken, Jilles
(2011)
Comparing Apples and Oranges: Measuring Differences between Data Mining Results.
Tippenhauer, Nils Ole and Pöpper, Christina and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2011)
On the Requirements for Successful GPS Spoofing Attacks.
Tombers, Stefan
(2011)
Low-Cost Byzantine Fault Tolerant Replication for a Cloud Environment.
Bachelors thesis, Saarland University.
Treiblmayr, Martin and H., Karen and Krüger, Antonio
(2011)
Interfacing business processes and spatial processes.
Tsankov, Petar and Basin, David and Dashti, Mohammad Torabi
(2011)
Constructing Mid-Points for Two-Party Asynchronous Protocols.
Tuytelaars, Tinne and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011)
The NBNN kernel.
U
Unruh, Dominique
(2011)
Composition in Quantum Cryptography.
(Unpublished)
Unruh, Dominique
(2011)
Concurrent composition in the bounded quantum storage model.
Unruh, Dominique
(2011)
Termination-Insensitive Computational Indistinguishability (and applications to computational soundness).
Uzmi, Zartash Afzal and Nebel, Markus E. and Tariq, Ahsan and Jawad, Sana and Chen, Ruichuan and Shaikh, Aman and Wang, Jia and Francis, Paul
(2011)
SMALTA: practical and near-optimal FIB aggregation.
V
Varodayan, David and Khisti, Ashish
(2011)
Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage.
Vreeken, Jilles and Zimek, Arthur
(2011)
When Pattern met Subspace Cluster, a Relationship Story.
Vreeken, Jilles and van Leeuwen, Matthijs and Siebes, Arno
(2011)
Krimp: Mining Itemsets that Compress.
Data Minining and Knowledge Discovery, 23 (1).
pp. 169-214.
Völker, Lars and Noe, Marcel and Waldhorst, Oliver P and Sorge, Christoph
(2011)
Can Internet users protect themselves? Challenges and Techniques of Automated Protection of HTTP Communication.
Computer Communications, 34 (3).
pp. 457-467.
W
Wang, Ping Chuan and Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011)
Perception for the manipulation of socks.
Wasylkowski, Andrzej and Zeller, Andreas
(2011)
Mining temporal specifications from object usage.
Autom. Softw. Eng., 18 (3-4).
263–292.
Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011)
I spy with my little eye: Learning optimal filters for cross-modal stereo under projected patterns.
Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011)
Improving the Kinect by Cross-Modal Stereo.
Weisgerber, Sebastian
(2011)
Design einer mobilen Anwendung zur verschlüsselten Sprachkommunikation auf Basis des Android Betriebssystems.
Masters thesis, HTW des Saarlandes.
Z
Zamani, Majid and Majumdar, Rupak
(2011)
A Lyapunov approach in incremental stability.
Zheng, Nan and Paloski, Aaron and Wang, Haining
(2011)
An Efficient User Verification System via Mouse Movements.
Zmudzinski, Sascha and Steinebach, Martin
(2011)
Re-synchronizing Audio Watermarking after Non-linear Time Stretching.
This list was generated on Sat Dec 21 03:44:08 2024 CET.