Items where Year is 2011

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 224.

Conference or Workshop Item (A Paper)

Acs, Gergely and Castelluccia, Claude
(2011) I have a DREAM! (DIffeRentially PrivatE smartMetering).
In: Proceedings of the 13th Information Hiding Conference, May 2011, Prague.

Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2011) Verification of Certifying Computations.
In: Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011).
Conference: CAV Computer Aided Verification

An, Jisun and Cha, Meeyoung and Gummadi, Krishna P. and Crowcroft, Jon
(2011) Media Landscape in Twitter: A World of New Conventions and Political Diversity.
In: Proceedings of the Fifth International Conference on Weblogs and Social Media, Barcelona, Catalonia, Spain, July 17-21, 2011.

Arapinis, Myrto and Ritter, Eike and Ryan, Mark D.
(2011) StatVerif: Verification of Stateful Processes.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2011) ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
In: The Sixth International Conference on Availability, Reliability and Security.

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno
(2011) Poster: ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC.
In: Proceedings of the 18th ACM conference on Computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berg, Matthias and Köpf, Boris
(2011) Non-Uniform Distributions in Quantitative Information-Flow.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011) Union and Intersection Types for Secure Protocol Implementations.
In: Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers.

Backes, Michael and Hriţcu, Cătălin and Tarrach, Thorsten
(2011) Automatically Verifying Typing Constraints for a Data Processing Language.
In: Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011).

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) Securing social networks.
In: Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) A Security API for Distributed Social Networks.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS '11).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011) G2C: Cryptographic Protocols from Goal-Driven Specifications.
In: TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011.

Baecher, Paul and Fischlin, Marc and Schröder, Dominique
(2011) Expedient Non-malleability Notions for Hash Functions.
In: Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings.

Barthe, Gilles and Köpf, Boris
(2011) Information-theoretic Bounds for Differentially Private Mechanisms.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Basin, David and Burri, Samuel J and Karjoth, Günter
(2011) Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Bastoni, Andrea and Brandenburg, Björn B. and Anderson, James H.
(2011) Is Semi-Partitioned Scheduling Practical?
In: 23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Blocki, Jeremiah and Christin, Nicolas and Datta, Anupam and Sinha, Arunesh
(2011) Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Brandenburg, Björn B. and Anderson, James H.
(2011) Real-time resource-sharing under clustered scheduling: mutex, reader-writer, and k-exclusion locks.
In: 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT).
Conference: EMSOFT ACM Conference on Embedded Software

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava
(2011) Practical and Lightweight Domain Isolation on Android.
In: 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM'11).

Bugiel, Sven and Davi, Lucas and Schulz, Steffen
(2011) Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC'11).

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: An Architecture for Secure Cloud Computing.
In: Workshop on Cryptography and Security in Clouds (CSC).

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: Secure Cloud Computing with Low Latency.
In: Communications and Multimedia Security Conference (CMS'11).

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) AmazonIA: When Elasticity Snaps Back.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2011) Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Bui, Dai N and Lee, Edward A. and Liu, Isaac and Patel, Hiren D. and Reineke, Jan
(2011) Temporal isolation on multiprocessing architectures.
In: Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, California, USA, June 5-10, 2011.
Conference: DAC Design Automation Conf

Burger, Martin and Zeller, Andreas
(2011) Minimizing reproduction of software failures.
In: Proceedings of the 20th International Symposium on Software Testing and Analysis, ISSTA 2011, Toronto, ON, Canada, July 17-21, 2011.
Conference: ISSTA International Symposium on Software Testing and Analysis

Bursztein, Elie and Martin, Matthieu and Mitchell, John C.
(2011) Text-based CAPTCHA Strengths and Weaknesses.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Böhmer, Matthias and Bauer, Gernot and Krüger, Antonio
(2011) Context tags: exploiting user-given contextual cues for disambiguation.
In: Proceedings of the 13th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2011, Stockholm, Sweden, August 30 - September 2, 2011.

Böhmer, Matthias and Hecht, Brent J. and Schöning, Johannes and Krüger, Antonio and Bauer, Gernot
(2011) Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage.
In: Proceedings of the 13th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2011, Stockholm, Sweden, August 30 - September 2, 2011.

Cauchard, Jessica R. and Löchtefeld, Markus and Irani, Pourang and Schöning, Johannes and Krüger, Antonio and Fraser, Mike and Subramanian, Sriram
(2011) Visual separation in mobile multi-display environments.
In: Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, Santa Barbara, CA, USA, October 16-19, 2011.
Conference: UIST ACM Symposium on User Interface Software and Technology

Cerny, Pavol and Chatterjee, Krishnendu and Henzinger, Thomas A
(2011) The Complexity of Quantitative Information Flow Problems.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Chatterjee, Krishnendu and Majumdar, Rupak
(2011) Minimum Attention Controller Synthesis for Omega-regular Objectives.
In: Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11).

Chen, Ruichuan and Shaikh, Aman and Wang, Jia and Francis, Paul
(2011) Address-based route reflection.
In: Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, Co-NEXT '11, Tokyo, Japan, December 6-9, 2011.

Cheney, James
(2011) A Formal Framework for Provenance Security.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Chothia, Tom and Guha, Apratim
(2011) A Statistical Test for Information Leaks Using Continuous Mutual Information.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Christodoulou, Giorgos and Mehlhorn, Kurt and Pyrga, Evangelia
(2011) Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms.
In: ESA.
Conference: ESA European Symposium on Algorithms

Cortier, Véronique and Smyth, Ben
(2011) Attacking and fixing Helios: An analysis of ballot secrecy.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Damm, Werner and Finkbeiner, Bernd
(2011) Does It Pay to Extend the Perimeter of a World Model?
In: Proceedings of the 17th International Symposium on Formal Methods (FM'11).

Datta, Anupam and Blocki, Jeremiah and Christin, Nicolas and DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Sinha, Arunesh
(2011) Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
In: Proc. of the 7th International Conference Information Systems Security (ICISS 2011).

Datta, Anupam and Garg, Deepak and Jia, Limin
(2011) Policy auditing over incomplete logs: theory, implementation and applications.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) Poster: Control-flow Integrity for Smartphones.
In: 18th ACM conference on Computer and communications security (ACM CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

Delaune, Stephanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham
(2011) Formal analysis of protocols based on TPM state registers.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Dietrich, Christian J. and Rossow, Christian and Freiling, Felix C. and Bos, Herbert and van Steen, Maarten and Pohlmann, Norbert
(2011) On Botnets That Use DNS for Command and Control.
In: Seventh European Conference on Computer Network Defense, EC2ND 2011, Gothenburg, Sweden, September 6-7, 2011.

Dittrich, Jens and Färber, Franz and Graefe, Goetz and Loeser, Henrik and Reimann, Wilfried and Schöning, Harald
(2011) "One Size Fits All": An Idea Whose Time Has Come and Gone?
In: Datenbanksysteme für Business, Technologie und Web (BTW), 14. Fachtagung des GI-Fachbereichs "Datenbanken und Informationssysteme" (DBIS), 2.-4.3.2011 in Kaiserslautern, Germany.

Dittrich, Jens and Jindal, Alekh
(2011) Towards a One Size Fits All Database Architecture.
In: Proceedings of the 4th Biennial Conference on Innovative Data Systems Research (CIDR).
Conference: CIDR Conference on Innovative Data Systems Research

Dupressoir, Francois and Gordon, Andrew D. and Jurjens, Jan and Naumann, David A.
(2011) Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011) Efficient Reductions for Non-signaling Cryptographic Primitives.
In: ICITS.

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011) Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2011) Pick Your Neighborhood - Improving Labels and Neighborhood Structure for Label Propagation.
In: Pattern Recognition - 33rd DAGM Symposium, Frankfurt/Main, Germany, August 31 - September 2, 2011. Proceedings.

Ehlers, Rüdiger and Finkbeiner, Bernd
(2011) Reactive Safety.
In: Proceedings of Second International Symposium on Games, Automata3Logics and Formal Verification (GandALF 2011).

Finkbeiner, Bernd and Kuhtz, Lars
(2011) Weak Kripke Structures and LTL.
In: Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11).
Conference: CONCUR International Conference on Concurrency Theory

Fraser, Gordon and Zeller, Andreas
(2011) Exploiting Common Object Usage in Test Case Generation.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2011, Berlin, Germany, March 21-25, 2011, Berlin, Germany.
Conference: ICST International Conference on Software Testing, Verification and Validation

Fraser, Gordon and Zeller, Andreas
(2011) Generating parameterized unit tests.
In: Proceedings of the 20th International Symposium on Software Testing and Analysis, ISSTA 2011, Toronto, ON, Canada, July 17-21, 2011.
Conference: ISSTA International Symposium on Software Testing and Analysis

Frau, Simone and Dashti, Mohammad Torabi
(2011) Integrated Specification and Verification of Security Protocols and Policies.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Genovese, Valerio and Garg, Deepak
(2011) New Modalities for Access Control Logics: Permission, Control and Ratification.
In: Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers.

Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011) MIME: A Framework for Interactive Visual Pattern Mining.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Goethals, Bart and Moens, Sandy and Vreeken, Jilles
(2011) MIME: A Framework for Interactive Visual Pattern Mining.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Gomez-Rodriguez, Manuel and Balduzzi, David and Schölkopf, Bernhard
(2011) Uncovering the Temporal Dynamics of Diffusion Networks.
In: Proceedings of the 28th International Conference on Machine Learning, ICML 2011, Bellevue, Washington, USA, June 28 - July 2, 2011.

Groß, Thomas and Mödersheim, Sebastian
(2011) Vertical Protocol Composition.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Grund, Daniel and Reineke, Jan and Wilhelm, Reinhard
(2011) A Template for Predictability Definitions with Supporting Evidence.
In: Bringing Theory to Practice: Predictability and Performance in Embedded Systems, DATE Workshop PPES 2011, March 18, 2011, Grenoble, France..

Guha, Saikat and Cheng, Bin and Francis, Paul
(2011) Privad: Practical Privacy in Online Advertising.
In: Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2011, Boston, MA, USA, March 30 - April 1, 2011.

Hein, Matthias and Setzer, Simon
(2011) Beyond Spectral Clustering - Tight Relaxations of Balanced Graph Cuts.
In: Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, Granada, Spain..
Conference: NeurIPS Conference on Neural Information Processing Systems

Herter, Jörg and Backes, Peter and Haupenthal, Florian and Reineke, Jan
(2011) CAMA: A Predictable Cache-Aware Memory Allocator.
In: 23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Herzig, Kim and Zeller, Andreas
(2011) Mining Cause-Effect-Chains from Version Histories.
In: IEEE 22nd International Symposium on Software Reliability Engineering, ISSRE 2011, Hiroshima, Japan, November 29 - December 2, 2011.
Conference: ISSRE International Symposium on Software Reliability Engineering

Hoffmann, Jörg
(2011) Everything You Always Wanted to Know about Planning - (But Were Afraid to Ask).
In: KI 2011: Advances in Artificial Intelligence, 34th Annual German Conference on AI, Berlin, Germany, October 4-7,2011. Proceedings.

Hoffmann, Jörg
(2011) Where Ignoring Delete Lists Works, Part II: Causal Graphs.
In: Proceedings of the 21st International Conference on Automated Planning and Scheduling, ICAPS 2011, Freiburg, Germany June 11-16, 2011.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Hur, Chung-Kil and Dreyer, Derek
(2011) A kripke logical relation between ML and assembly.
In: Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011, Austin, TX, USA, January 26-28, 2011.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Hur, Chung-Kil and Dreyer, Derek and Vafeiadis, Viktor
(2011) Separation Logic in the Presence of Garbage Collection.
In: Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science, LICS 2011, June 21-24, 2011, Toronto, Ontario, Canada.
Conference: LICS IEEE Symposium on Logic in Computer Science

Jacobs, Swen and Kuncak, Viktor
(2011) Towards Complete Reasoning about Axiomatic Specifications.
In: Verification, Model Checking, and Abstract Interpretation - 12th International Conference, VMCAI 2011, Austin, TX, USA, January 23-25, 2011. Proceedings.

Jagadeesan, Radha and Pitcher, Corin and Rathke, Julian and Riely, James
(2011) Local Memory via Layout Randomization.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) A category-level 3-D object dataset: Putting the Kinect to work.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Jhala, Ranjit and Majumdar, Rupak and Rybalchenko, Andrey
(2011) HMC: Verifying Functional Programs Using Abstract Interpreters.
In: Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011).
Conference: CAV Computer Aided Verification

Jindal, Alekh and Dittrich, Jens
(2011) Relax and Let the Database Do the Partitioning Online.
In: Enabling Real-Time Business Intelligence (BIRTE).

Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2011) Trojan data layouts: right shoes for a running elephant.
In: Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC).

Jose, Manu and Majumdar, Rupak
(2011) Bug-Assist: Assisting Fault Localization in ANSI-C Programs.
In: Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011).
Conference: CAV Computer Aided Verification

Jose, Manu and Majumdar, Rupak
(2011) Cause Clue Clauses: Error Localization Using Maximum Satisfiability.
In: Proc. of the 32rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Just, Seth and Cleary, Alan and Shirley, Brandon and Hammer, Christian
(2011) Information flow analysis for JavaScript.
In: Proceedings of the 1st ACM SIGPLAN international workshop on Programming language and systems technologies for internet clients.

Kahl, Gerrit and Spassova, Lübomira and Schöning, Johannes and Gehring, Sven and Krüger, Antonio
(2011) IRL SmartCart - a user-adaptive context-aware interface for shopping assistance.
In: Proceedings of the 16th International Conference on Intelligent User Interfaces, IUI 2011, Palo Alto, CA, USA, February 13-16, 2011.
Conference: IUI International Conference on Intelligent User Interfaces

Kalnikaité, Vaiva and Rogers, Yvonne and Bird, Jon and Villar, Nicolas and Bachour, Khaled and Payne, Stephen J. and Todd, Peter M. and Schöning, Johannes and Krüger, Antonio and Kreitmayer, Stefan
(2011) How to nudge in Situ: designing lambent devices to deliver salient information in supermarkets.
In: UbiComp 2011: Ubiquitous Computing, 13th International Conference, UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Karayev, Sergey and Fritz, Mario and Fidler, Sanja and Darrell, Trevor
(2011) A probabilistic model for recursive factorized image features.
In: The 24th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2011, Colorado Springs, CO, USA, 20-25 June 2011.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady
(2011) Impossibility of Blind Signatures from One-Way Permutations.
In: Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings.
Conference: TCC Theory of Cryptography Conference

Kehuan, Zhang and Xiaoyong, Zhou and Yangyi, Chen and XiaoFeng, Wang and Yaoping, Ruan
(2011) Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Kenna, Christopher J. and Herman, Jonathan L. and Brandenburg, Björn B. and Mills, Alex F. and Anderson, James H.
(2011) Soft Real-Time on Multiprocessors: Are Analysis-Based Schedulers Really Worth It?
In: Proceedings of the 32nd IEEE Real-Time Systems Symposium, RTSS 2011, Vienna, Austria, November 29 - December 2, 2011.
Conference: RTSS Real Time Systems Symposium

Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De, Tijl
(2011) Maximum Entropy Modelling for Assessing Results on Real-Valued Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011) Security for Key Management Interfaces.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Lapin, Maksim and Mikeev, Linar and Wolf, Verena
(2011) SHAVE: stochastic hybrid analysis of markov population models.
In: Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2011, Chicago, IL, USA, April 12-14, 2011.

Li, Qi and Xu, Mingwei and Wu, Jianping and Zhang, Xinwen and Lee, Patrick P. C. and Xu, Ke
(2011) Enhancing the Trust of Internet Routing with Lightweight Route Attestation.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).

Liu, Yabing and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2011) Analyzing facebook privacy settings: user expectations vs. reality.
In: Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011).
Conference: IMC Internet Measurement Conference

Löchtefeld, Markus and Gehring, Sven and Jung, Ralf and Krüger, Antonio
(2011) Using Mobile Projection to Support Guitar Learning.
In: Smart Graphics - 11th International Symposium, SG 2011, Bremen, Germany, July 18-20, 2011. Proceedings.

Löchtefeld, Markus and Gehring, Sven and Jung, Ralf and Krüger, Antonio
(2011) guitAR: supporting guitar learning through mobile projection.
In: Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011, Extended Abstracts Volume, Vancouver, BC, Canada, May 7-12, 2011.
Conference: CHI International Conference on Human Factors in Computing Systems

Maffei, Matteo and Pecina, Kim
(2011) Privacy-aware proof-carrying authorization.
In: Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, PLAS 2011, San Jose, CA, USA, 5 June, 2011.

Majumdar, Rupak and Render, Elaine and Tabuada, Paulo
(2011) Robust Discrete Synthesis Against Unspecified Disturbances.
In: Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011).

Majumdar, Rupak and Saha, Indranil and Zamani, Majid
(2011) Performance-aware Scheduler Synthesis for Control Systems.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2011).
Conference: EMSOFT ACM Conference on Embedded Software

Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles
(2011) Tell Me What I Need to Know: Succinctly Summarizing Data with Itemsets.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Manjunath, Madhusudan and Mehlhorn, Kurt and Panagiotou, Konstantinos and Sun, He
(2011) Approximate Counting of Cycles in Streams.
In: ESA '11 - European Symposium on Algorithms.
Conference: ESA European Symposium on Algorithms

Mannan, Mohammad and Kim, Boem Heyn and Ganjali, Afshar and Lie, David
(2011) Unicorn: Two-Factor Attestation for Data Security.
In: Proceedings of the 18th ACM conference on Computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Mantel, Heiko and Sands, David and Sudbrock, Henning
(2011) Assumptions and Guarantees for Compositional Noninterference.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Marcon, Massimiliano and Dischinger, Marcel and Gummadi, Krishna P. and Vahdat, Amin
(2011) The local and global effects of traffic shaping in the internet.
In: Third International Conference on Communication Systems and Networks, COMSNETS 2011, Bangalore, India, January 4-8, 2011.

Marcon, Massimiliano and Viswanath, Bimal and Cha, Meeyoung and Gummadi, Krishna P.
(2011) Sharing social content from home: a measurement-driven feasibility study.
In: Network and Operating System Support for Digital Audio and Video, 21st International Workshop, NOSSDAV 2011, Vancouver, BC, Canada, June 1-3, 2011, Proceedings.
Conference: NOSSDAV Network and Operating System Support for Digital Audio and Video

Mardziel, Piotr and Magill, Stephen and Hicks, Michael and Srivatsa, Mudhakar
(2011) Dynamic Enforcement of Knowledge-based Security Policies.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Megow, Nicole and Mehlhorn, Kurt and Schweitzer, Pascal
(2011) Online Graph Exploration: New Results on Old and New Algorithms.
In: ICALP '11 - International Colloquium on Automata Languages and Programming.
Conference: ICALP International Colloquium on Automata Languages and Programming

Mehlhorn, Kurt
(2011) The Physarum Computer.
In: WALCOM 2014 : Fifth International Workshop on Algorithms and Computation.

Meiser, Sebastian
(2011) Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
In: Seventh Workshop on Formal and Computational Cryptography (FCC 2011).

Metzger, Steffen and Elbassuoni, Shady and Hose, Katja and Schenkel, Ralf
(2011) S3K: seeking statement-supporting top-K witnesses.
In: Proc. of the 20th ACM International Conference on Information and Knowledge Management (CIKM'11).

Miettinen, Pauli and Vreeken, Jilles
(2011) Model Order Selection for Boolean Matrix Factorization.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Mikeev, Linar and Sandmann, Werner and Wolf, Verena
(2011) Efficient calculation of rare event probabilities in Markovian queueing networks.
In: 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, VALUETOOLS '11, Paris, France, May 16-20, 2011.

Mileva, Yana Momchilova and Wasylkowski, Andrzej and Zeller, Andreas
(2011) Mining Evolution of Object Usage.
In: ECOOP 2011 - Object-Oriented Programming - 25th European Conference, Lancaster, UK, July 25-29, 2011 Proceedings.
Conference: ECOOP European Conference on Object-Oriented Programming

Mileva, Yana Momchilova and Zeller, Andreas
(2011) Assessing modularity via usage changes.
In: Proceedings of the 10th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools, PASTE'11, Szeged, Hungary, September 5-9, 2011.

Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Parametrized shape models for clothing.
In: IEEE International Conference on Robotics and Automation, ICRA 2011, Shanghai, China, 9-13 May 2011.

Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2011) Limiting large-scale crawls of social networking sites.
In: Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Moore, Scott and Chong, Stephen
(2011) Static analysis for efficient hybrid information-flow control.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Morgenstern, Jamie and Garg, Deepak and Pfenning, Frank
(2011) A Proof-Carrying File System with Revocable and Use-Once Certificates.
In: Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers.

Müller, Christian A. and Paul, Wolfgang J.
(2011) Complete Formal Hardware Verification of Interfaces for a FlexRay-Like Bus.
In: Computer Aided Verification - 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings.
Conference: CAV Computer Aided Verification

Nam, Jaechang and Schuler, David and Zeller, Andreas
(2011) Calibrated Mutation Testing.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Berlin, Germany, 21-25 March, 2011, Workshop Proceedings.
Conference: ICST International Conference on Software Testing, Verification and Validation

Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2011) Verification of Information Flow and Access Control Policies with Dependent Types.
In: Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11).
Conference: SP IEEE Symposium on Security and Privacy

Ngo, Long and Boyd, Colin and Nieto, Juan Gonzalez
(2011) Automated proofs for Diffie-Hellman-based key exchanges.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Nissim, Raz and Hoffmann, Jörg and Helmert, Malte
(2011) Computing Perfect Heuristics in Polynomial Time: On Bisimulation and Merge-and-Shrink Abstraction in Optimal Planning.
In: IJCAI 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22, 2011.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Petrlic, Ronald
(2011) Integrity Protection for Automated Teller Machines.
In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11).

Post, Ansley and Navarro, Juan and Kuznetsov, Petr and Druschel, Peter
(2011) Autonomous Storage Management for Personal Devices with PodBase.
In: 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 15-17, 2011.
Conference: USENIX-Security Usenix Security Symposium

Pöpper, Christina and Tippenhauer, Nils Ole and Danev, Boris and \vCapku, Srdjan
(2011) Investigation of Signal and Message Manipulations on the Wireless Channel.
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS).

Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011) RAFT at work: speeding-up mapreduce applications under task and node failures.
In: Proceedings of the ACM SIGMOD International Conference on Management of data.
Conference: SIGMOD ACM Special Interest Group on Management of Data Conference

Quiané-Ruiz, Jorge-Arnulfo and Pinkel, Christoph and Schad, Jorg and Dittrich, Jens
(2011) RAFTing MapReduce: Fast recovery on the RAFT.
In: Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE).
Conference: ICDE International Conference on Data Engineering

Reineke, Jan and Liu, Isaac and Patel, Hiren D. and Kim, Sungjun and Lee, Edward A.
(2011) PRET DRAM controller: bank privatization for predictability and temporal isolation.
In: Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201.

Reznichenko, Alexey and Guha, Saikat and Francis, Paul
(2011) Auctions in do-not-track compliant internet advertising.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Richards, Gregor and Hammer, Christian and Burg, Brian and Vitek, Jan
(2011) The Eval that Men Do -- A Large-scale Study of the Use of Eval in JavaScript Applications.
In: ECOOP'11: Proceedings of the 25th European Conference on Object-Oriented Programming.
Conference: ECOOP European Conference on Object-Oriented Programming

Rodrigues, Tiago and Benevenuto, Fabrício and Cha, Meeyoung and Gummadi, Krishna P. and Almeida, Virgílio A. F.
(2011) On word-of-mouth based discovery of the web.
In: Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, IMC '11, Berlin, Germany, November 2-, 2011.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Roy, Pritam and Tabuada, Paulo and Majumdar, Rupak
(2011) Pessoa 2.0: A Controller Synthesis Tool for Cyber-physical Systems.
In: Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011).

Rößler, Jeremias and Orso, Alessandro and Zeller, Andreas
(2011) When Does My Program Fail?
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Berlin, Germany, 21-25 March, 2011, Workshop Proceedings.
Conference: ICST International Conference on Software Testing, Verification and Validation

Saenko, Kate and Karayev, Sergey and Jia, Yangqing and Shyr, Alex and Janoch, Allison and Long, Jonathan and Fritz, Mario and Darrell, Trevor
(2011) Practical 3-D object detection using category and instance-level appearance models.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS IEEE/RSJ International Conference on Intelligent Robots and Systems

Schlesinger, Cole and Pattabiraman, Karthik and Swamy, Nikhil and Walker, David and Zorn, Benjamin
(2011) Modular Protections Against Non-control Data Attacks.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Schröder, Dominique
(2011) How to Aggregate the CL Signature Scheme.
In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings.
Conference: ESORICS European Symposium On Research In Computer Security

Schröder, Dominique and Unruh, Dominique and Garg, Sanjam and Rao, Vanishree and Sahai, Amit
(2011) Round Optimal Blind Signatures.
In: Crypto 2011.
Conference: CRYPTO Advances in Cryptology

Schuler, David and Zeller, Andreas
(2011) Assessing Oracle Quality with Checked Coverage.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2011, Berlin, Germany, March 21-25, 2011.
Conference: ICST International Conference on Software Testing, Verification and Validation

Schwarz, Birgit and Schuler, David and Zeller, Andreas
(2011) Breeding High-Impact Mutations.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Berlin, Germany, 21-25 March, 2011, Workshop Proceedings.
Conference: ICST International Conference on Software Testing, Verification and Validation

Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2011) Relaxed-memory concurrency and verified compilation.
In: Proceedings of the 38th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'11).
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Slawski, Martin and Hein, Matthias
(2011) Sparse recovery by thresholded non-negative least squares.
In: Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, Granada, Spain..
Conference: NeurIPS Conference on Neural Information Processing Systems

Smets, Koen and Vreeken, Jilles
(2011) The Odd One Out: Identifying and Characterising Anomalies.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Song, Hyun Oh and Fritz, Mario and Gu, Chunhui and Darrell, Trevor
(2011) Visual grasp affordances from appearance-based cues.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Stuijk, Sander and Basten, Twan and Akesson, Benny and Geilen, Marc and Moreira, Orlando and Reineke, Jan
(2011) Designing next-generation real-time streaming systems.
In: Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201.

Suchanek, Fabian M and Gross-Amblard, David and Abiteboul, Serge
(2011) Watermarking for Ontologies.
In: Proc. 10th International Semantic Web Conference (ISWC 2011).

Tatti, Nikolaj and Vreeken, Jilles
(2011) Comparing Apples and Oranges: Measuring Differences between Data Mining Results.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Tippenhauer, Nils Ole and Pöpper, Christina and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2011) On the Requirements for Successful GPS Spoofing Attacks.
In: Proceedings of the ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Treiblmayr, Martin and H., Karen and Krüger, Antonio
(2011) Interfacing business processes and spatial processes.
In: IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, ICSDM 2011, Fuzhou, China, June 29 - July 1, 2011.

Tsankov, Petar and Basin, David and Dashti, Mohammad Torabi
(2011) Constructing Mid-Points for Two-Party Asynchronous Protocols.
In: Proc. 15th International Conference On Principles Of Distributed Systems (OPODIS).

Tuytelaars, Tinne and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2011) The NBNN kernel.
In: IEEE International Conference on Computer Vision, ICCV 2011, Barcelona, Spain, November 6-13, 2011.
Conference: ICCV IEEE International Conference on Computer Vision

Unruh, Dominique
(2011) Concurrent composition in the bounded quantum storage model.
In: Eurocrypt 2011.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Unruh, Dominique
(2011) Termination-Insensitive Computational Indistinguishability (and applications to computational soundness).
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Uzmi, Zartash Afzal and Nebel, Markus E. and Tariq, Ahsan and Jawad, Sana and Chen, Ruichuan and Shaikh, Aman and Wang, Jia and Francis, Paul
(2011) SMALTA: practical and near-optimal FIB aggregation.
In: Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, Co-NEXT '11, Tokyo, Japan, December 6-9, 2011.

Varodayan, David and Khisti, Ashish
(2011) Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage.
In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011, Prague, Czech Republic, May 2011..

Vreeken, Jilles and Zimek, Arthur
(2011) When Pattern met Subspace Cluster, a Relationship Story.
In: Proceedings of the 2nd Workshop on Discovering, Summarizing and Using Multiple Clusterings (MultiClust).

Wang, Ping Chuan and Miller, Stephen and Fritz, Mario and Darrell, Trevor and Abbeel, Pieter
(2011) Perception for the manipulation of socks.
In: 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011.
Conference: IROS IEEE/RSJ International Conference on Intelligent Robots and Systems

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) I spy with my little eye: Learning optimal filters for cross-modal stereo under projected patterns.
In: IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011.

Wei-Chen, Walon and Blanke, Ulf and Fritz, Mario
(2011) Improving the Kinect by Cross-Modal Stereo.
In: British Machine Vision Conference, BMVC 2011, Dundee, UK, August 29 - September 2, 2011. Proceedings.

Zamani, Majid and Majumdar, Rupak
(2011) A Lyapunov approach in incremental stability.
In: 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011).
Conference: CDC IEEE Conference on Decision and Control

Zheng, Nan and Paloski, Aaron and Wang, Haining
(2011) An Efficient User Verification System via Mouse Movements.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Zmudzinski, Sascha and Steinebach, Martin
(2011) Re-synchronizing Audio Watermarking after Non-linear Time Stretching.
In: Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII.

and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling
(2011) Efficient Reductions for Non-signaling Cryptographic Primitives.
In: ICITS.

and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling
(2011) Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
In: TCC.

Article

Agarwal, Pankaj K. and Mehlhorn, Kurt and Teillaud, Monique
(2011) Computational Geometry (Dagstuhl Seminar 11111).
Dagstuhl Reports, 1 (3). 19–41.

Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine and Schweitzer, Pascal
(2011) An Introduction to Certifying Algorithms.
it - Information Technology, 53 (6). 287–293.

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011) Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2). pp. 107-134.

Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011) A Local Cross-Site Scripting Attack against Android Phones.

Brandenburg, Björn B. and Leontyev, Hennadiy and Anderson, James H.
(2011) An overview of interrupt accounting techniques for multiprocessor real-time systems.
Journal of Systems Architecture - Embedded Systems Design, 57 (6). 638–654.

Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Jia, Limin and Franklin, Jason
(2011) On Adversary Models and Compositional Security.
IEEE Security & Privacy, 9 (3). pp. 26-32.

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).

Dittrich, Jens and Blunschi, Lukas and Salles, Marcos Antonio Vaz
(2011) MOVIES: indexing moving objects by shooting index images.
GeoInformatica, 15 (4). pp. 727-767.

Fitzner, Daniel and Hoffmann, Jörg and Klien, Eva
(2011) Functional description of geoprocessing services as conjunctive datalog queries.
GeoInformatica, 15 (1). 191–221.

Garg, Deepak and Jia, Limin and Datta, Anupam
(2011) A Logical Method for Policy Enforcement over Evolving Audit Logs.
CoRR, abs/11.

Grund, Daniel and Reineke, Jan and Gebhard, Gernot
(2011) Branch target buffers: WCET analysis framework and timing predictability.
Journal of Systems Architecture - Embedded Systems Design, 57 (6). pp. 625-637.

Halperin, Dan and Mehlhorn, Kurt
(2011) Guest Editorial: Selected Papers from European Symposium on Algorithms.
Algorithmica, 60 (1). 1–2.

Hansen, Marit and Marnau, Ninja and Schlehahn, Eva and Husmann, Elmar
(2011) Auf dem Weg zur sicheren und datenschutzkonformen Cloud.
kes Magazine, 2011 (Specia). pp. 14-16.

Hein, Matthias and Lugosi, Gábor and Rosasco, Lorenzo and Smale, Steve
(2011) Mathematical and Computational Foundations of Learning Theory (Dagstuhl Seminar 11291).
Dagstuhl Reports, 1 (7). 53–69.

Henzinger, Thomas A and Jobstmann, Barbara and Wolf, Verena
(2011) Formalisms for Specifying Markovian Population Models.
International Journal of Foundations of Computer Science, 22 (4). pp. 823-841.

Jiang, Xiaoyi and Broelemann, Klaus and Wachenfeld, Steffen and Krüger, Antonio
(2011) Graph-based markerless registration of city maps using geometric hashing.
Computer Vision and Image Understanding, 115 (7). 1032–1043.

Kavitha, Telikepalli and Mehlhorn, Kurt and Michail, Dimitrios
(2011) New Approximation Algorithms for Minimum Cycle Bases of Graphs.
Algorithmica, 59 (4). 471–488.

Krüger, Antonio
(2011) Die Zukunft des Fachbereichs "Künstliche Intelligenz".
KI, 25 (4). 333–334.

Krüger, Antonio and Schöning, Johannes and Olivier, Patrick
(2011) How Computing Will Change the Face of Retail.
IEEE Computer, 44 (4). 84–87.

Marnau, Ninja and Schirmer, Norbert and Schlehahn, Eva and Schunter, Matthias
(2011) Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud.
Datenschutz und Datensicherheit (DuD), 5. pp. 333-337.

Marnau, Ninja and Schlehahn, Eva
(2011) Cloud Computing und Safe Harbor.
Datenschutz und Datensicherheit (DuD), 5.

McConnell, Ross M and Mehlhorn, Kurt and Näher, Stefan and Schweitzer, Pascal
(2011) Survey: Certifying Algorithms.
Computer Science Review, 5 (2). pp. 119-161. ISSN 1574-0137

McConnell, Ross M. and Mehlhorn, Kurt and Näher, Stefan and Schweitzer, Pascal
(2011) Certifying algorithms.
Computer Science Review, 5 (2). 119–161.

Mehlhorn, Kurt and Osbild, Ralf and Sagraloff, Michael
(2011) A general approach to the analysis of controlled perturbation algorithms.
Computational Geometry, 44 (9). 507–528.

Mehlhorn, Kurt and Sagraloff, Michael
(2011) A deterministic algorithm for isolating real roots of a real polynomial.
Journal of Symbolic Computation, 46 (1). 70–90.

Narayanaswami, Chandra and Krüger, Antonio and Marmasse, Natalia
(2011) Guest Editors' Introduction.
IEEE Pervasive Computing, 10 (2). 16–18.

Neis, Georg and Dreyer, Derek and Rossberg, Andreas
(2011) Non-parametric parametricity.
J. Funct. Program., 21 (4-5). 497–562.

Remmerie, Noor and Vijlder, Thomas De and Valkenborg, Dirk and Laukens, Kris and Smets, Koen and Vreeken, Jilles and Mertens, Inge and Carpentier, Sebastien and Panis, Bart and de Jaeger, Geert and Prinsen, Els and Witters, Erwin
(2011) Unraveling tobacco BY-2 protein complexes with BN PAGE/LC-MS/MS and clustering methods.
Journal of Proteomics, 74 (8). pp. 1201-1217.

Shervashidze, Nino and Schweitzer, Pascal and van Leeuwen, Erik Jan and Mehlhorn, Kurt and Borgwardt, Karsten M.
(2011) Weisfeiler-Lehman Graph Kernels.
Journal of Machine Learning Research, 12. 2539–2561.

Sorge, Christoph
(2011) Zum Stand der Technik in der WLAN-Sicherheit.
Computer und Recht, 27 (4). pp. 273-276.

Stikic, Maja and Larlus, Diane and Ebert, Sandra and Schiele, Bernt
(2011) Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors.
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 33 (12). pp. 2521-2537.

Stollberg, Michael and Hoffmann, Jörg and Fensel, Dieter
(2011) A Caching Technique for Optimizing Automated Service Discovery.
Int. J. Semantic Computing, 5 (1). 1–31.

Vreeken, Jilles and van Leeuwen, Matthijs and Siebes, Arno
(2011) Krimp: Mining Itemsets that Compress.
Data Minining and Knowledge Discovery, 23 (1). pp. 169-214.

Völker, Lars and Noe, Marcel and Waldhorst, Oliver P and Sorge, Christoph
(2011) Can Internet users protect themselves? Challenges and Techniques of Automated Protection of HTTP Communication.
Computer Communications, 34 (3). pp. 457-467.

Wasylkowski, Andrzej and Zeller, Andreas
(2011) Mining temporal specifications from object usage.
Autom. Softw. Eng., 18 (3-4). 263–292.

Thesis

Balzer, Jan
(2011) Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.

Bornträger, Holger
(2011) Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.

Busenius, Alex
(2011) Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java.
Masters thesis, Saarland University.

Ciolacu, Ines Lucia
(2011) Universally Composable Relativistic Commitments.
Masters thesis, Saarland University.

Hriţcu, Cătălin
(2011) Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.

Künnemann, Robert
(2011) Game-Theoretic Notions of Incoercibility.
Masters thesis, UNSPECIFIED.

Leibenger, Dominik
(2011) Vertrauliche Versionsverwaltung mit Subversion.
Masters thesis, Universität Paderborn.

Lorenz, Stefan
(2011) Anonymous Webs of Trust.
Masters thesis, Saarland University.

Meiser, Sebastian
(2011) Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Masters thesis, Saarland University.

Tombers, Stefan
(2011) Low-Cost Byzantine Fault Tolerant Replication for a Cloud Environment.
Bachelors thesis, Saarland University.

Weisgerber, Sebastian
(2011) Design einer mobilen Anwendung zur verschlüsselten Sprachkommunikation auf Basis des Android Betriebssystems.
Masters thesis, HTW des Saarlandes.

Book Section

Daiber, Florian and Schöning, Johannes and Krüger, Antonio
(2011) Towards a Framework for Whole Body Interaction with Geospatial Data.
In: Whole Body Interaction. Human-Computer Interaction Series . Springer, 197–207.

Eigenwillig, Arno and Mehlhorn, Kurt
(2011) Multiplication of Long Integers - Faster than Long Multiplication.
In: Algorithms Unplugged. Springer, 101–109.

Löchtefeld, Markus and Gehring, Sven and Krüger, Antonio
(2011) Distributed User Interfaces for Projector Phones.
In: Distributed User Interfaces - Designing Interfaces for the Distributed Ecosystem. Human-Computer Interaction Series . Springer, 113–123.

Löchtefeld, Markus and Krüger, Antonio and Rohs, Michael
(2011) Mobile Projection Interfaces for Augmented Reality Applications.
In: Handbook of Augmented Reality. Springer, 177–197.

Book

UNSPECIFIED, ed.
(2011) Hardware and Software: Verification and Testing - 5th International Haifa Verification Conference, HVC 2009, Haifa, Israel, October 19-22, 2009, Revised Selected Papers.
Lecture Notes in Computer Science, 6405 . Springer.

UNSPECIFIED, ed.
(2011) Proceedings International Workshop on Interactions, Games and Protocols, iWIGP 2011, Saarbrücken, Germany, 27th March 2011.
EPTCS, 50 . UNSPECIFIED.

UNSPECIFIED, ed.
(2011) Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011, Prague, Czech Republic, May 2011.
UNSPECIFIED.

UNSPECIFIED, ed.
(2011) Proceedings of the 13th Information Hiding Conference, May 2011, Prague.
UNSPECIFIED.

UNSPECIFIED, ed.
(2011) Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS).
ACM, Chicago, Illinois.

UNSPECIFIED, ed.
(2011) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).
ACM, Hong Kong.

UNSPECIFIED, ed.
(2011) SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), Szeged, Hungary, September 5-9, 2011.
ACM.

UNSPECIFIED, ed.
(2011) Smart Graphics - 11th International Symposium, SG 2011, Bremen, Germany, July 18-20, 2011. Proceedings.
Lecture Notes in Computer Science, 6815 . Springer.

Monograph

Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011) X-pire! - A digital expiration date for images in social networks.
Technical Report. UNSPECIFIED.

Danezis, George and Kohlweiss, Markulf and Rial, Alfredo
(2011) Differentially Private Billing with Rebates.
Technical Report. UNSPECIFIED.

Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2011) A data-centric approach to synchronization.
Technical Report. UNSPECIFIED.
(Unpublished)

Marnau, Ninja and Schlehahn, Eva
(2011) Cloud Computing: Legal Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Petrlic, Ronald and Sorge, Christoph
(2011) A Mutual Authentication Scheme for ATMs.
Technical Report. UNSPECIFIED.

Other

Schröder, Dominique and Unruh, Dominique
(2011) Round Optimal Blind Signatures.
UNSPECIFIED
.

Unruh, Dominique
(2011) Composition in Quantum Cryptography.
UNSPECIFIED
.
(Unpublished)

This list was generated on Wed Nov 20 19:28:56 2024 CET.