Items where Year is 2012

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 229.

UNSPECIFIED, ed.
(2012) Automata, Languages, and Programming - 39th International Colloquium, ICALP 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part I.
Lecture Notes in Computer Science, 7391 . Springer.

UNSPECIFIED, ed.
(2012) Automata, Languages, and Programming - 39th International Colloquium, ICALP 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part II.
Lecture Notes in Computer Science, 7392 . Springer.

UNSPECIFIED, ed.
(2012) KI 2012: Advances in Artificial Intelligence - 35th Annual German Conference on AI, Saarbrücken, Germany, September 24-27, 2012. Proceedings.
Lecture Notes in Computer Science, 7526 . Springer.

UNSPECIFIED, ed.
(2012) Pervasive Computing - 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings.
Lecture Notes in Computer Science, 7319 . Springer.

UNSPECIFIED, ed.
(2012) Proceedings Second International Workshop on Interactions, Games and Protocols, IWIGP 2012, Tallinn, Estonia, 25th March 2012.
EPTCS, 78 . UNSPECIFIED.

UNSPECIFIED, ed.
(2012) Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada.
AAAI Press.

UNSPECIFIED
(2012) Proceedings of the Workshop on JavaScript Tools.
In: Proceedings of the Workshop on JavaScript Tools.

UNSPECIFIED, ed.
(2012) Ubiquitous Display Environments.
Cognitive Technologies . Springer.

Aditya, Paarijaat and Zhao, Mingchen and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill
(2012) Reliable Client Accounting for P2P-infrastructure Hybrids.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).

Afshani, Peyman and Agrawal, Manindra and Doerr, Benjamin and Winzen, Carola and Larsen, Kasper Green and Mehlhorn, Kurt
(2012) The Deterministic and Randomized Query Complexity of a Simple Guessing Game.
Electronic Colloquium on Computational Complexity (ECCC), 19. p. 87.

Akkus, Istemi Ekin and Chen, Ruichuan and Hardt, Michaela and Francis, Paul and Gehrke, Johannes
(2012) Non-tracking Web Analytics.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS ACM Conference on Computer and Communications Security

Akoglu, Leman and Tong, Hanghang and Vreeken, Jilles and Faloutsos, Christos
(2012) Fast and Reliable Anomaly Detection in Categoric Data.
In: Proceedings of ACM Conference on Information and Knowledge Mining (CIKM).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horng and Faloutsos, Christos
(2012) Mining and Visualizing Connection Pathways in Large Information Networks.
In: Proceedings of the Workshop on Information in Networks (WIN).

Alkassar, Eyad and Cohen, Ernie and Kovalev, Mikhail and Paul, Wolfgang J.
(2012) Verification of TLB Virtualization Implemented in C.
In: Proc. 4th International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE 2012).

Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2012) Securing Data Provenance in the Cloud.
In: UNSPECIFIED Lecture Notes in Computer Science, 7039 . Springer Berlin Heidelberg, pp. 145-160. ISBN 978-3-642-27584-5

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY).

Asghar, Muhammad Rizwan and Russello, Giovanni
(2012) Flexible and Dynamic Consent-Capturing.
In: UNSPECIFIED Lecture Notes in Computer Science, 7039 . Springer Berlin Heidelberg, pp. 119-131. ISBN 978-3-642-27584-5

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) Harmony and dissonance: organizing the people's voices on political controversies.
In: Proc. of the 5th ACM International Conference on Web Search and Data Mining (WSDM'12).
Conference: WSDM ACM International Conference on Web Search and Data Mining

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions.
In: Proc. of the 12th IEEE International Conference on Data Mining (ICDM'12).
Conference: ICDM IEEE International Conference on Data Mining

Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012) PolariCQ: polarity classification of political quotations.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Backes, Michael and Barthe, Gilles and Berg, Matthias and Grégoire, Benjamin and Kunz, César and Skoruppa, Malte and Béguelin, Santiago Zanella
(2012) Verified Security of Merkle-Damgård.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012) Brief announcement: distributed cryptography using trinc.
In: ACM Symposium on Principles of Distributed Computing 2012.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Eight Workshop on Formal and Computational Cryptography (FCC 2012).
(Unpublished)

Backes, Michael and Busenius, Alex and Hriţcu, Cătălin
(2012) On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols.
In: Proc. 4th NASA Formal Methods Symposium (NFM 2012).

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2012) AppGuard - Real-time Policy Enforcement for Third-Party Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012) ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
In: Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012) Ace: An Efficient Key-Exchange Protocol for Onion Routing.
In: Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2012) Automated Synthesis of Secure Distributed Applications.
In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Malik, Ankit and Unruh, Dominique
(2012) Computational Soundness without Protocol Restrictions.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS ACM Conference on Computer and Communications Security

Basin, David and Cremers, Cas and Meier, Simon
(2012) Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
In: Proc. 1st Conference on Principles of Security and Trust (POST).

Basin, David and Jugé, Vincent and Klaedtke, Felix and Zvalinescu, Eugen
(2012) Enforceable Security Policies Revisited.
In: Proc. 1st Conference on Principles of Security and Trust (POST).

Basin, David and Klaedtke, Felix and Marinovic, Srdjan and Zălinescu, Eugen
(2012) Monitoring compliance policies over incomplete and disagreeing logs.
In: Proceedings of the 3rd International Conference on Runtime Verification (RV'2012).

Benz, Florian and Hildebrandt, Andreas and Hack, Sebastian
(2012) A dynamic program analysis to find floating-point accuracy problems.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, Beijing, China - June 11 - 16, 2012.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Berrang, Pascal and Bogdoll, Jonathan and Hahn, Ernst Moritz and Hartmanns, Arnd and Hermanns, Holger
(2012) Dependability Results for Power Grids with Decentralized Stabilization Strategies.
AVACS Technical Report (83). ISSN 1860-9821

Bessani, Alysson and Abbadi, Imad and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marco and Schirmer, Norbert
(2012) TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: UNSPECIFIED Cambridge Scholars Publishing.
(Unpublished)

Bonifaci, Vincenzo and Mehlhorn, Kurt and Varma, Girish
(2012) Physarum can compute shortest paths.
In: SODA 2012 - ACM/SIAM Symposium on Discrete Algorithms.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms

Brasser, Franz Ferdinand and Bugiel, Sven and Filyanov, Atanas and Sadeghi, Ahmad-Reza and Schulz, Steffen
(2012) Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: Financial Cryptography and Data Security (FC).

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava
(2012) Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS'12).
Conference: NDSS Network and Distributed System Security Symposium

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2012) Affine Refinement Types for Authentication and Authorization.
In: Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2012).

Böhm, Christoph and de, Gerard Melo and Naumann, Felix and Weikum, Gerhard
(2012) LINDA: distributed web-of-data-scale entity matching.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Carreira, João Carlos Menezes and Rodrigues, Rodrigo and Candea, George and Majumdar, Rupak
(2012) Scalable Testing of File System Checkers.
In: Proc. of the 7th ACM European Conference on Computer Systems (EuroSys 2012).
Conference: EuroSys Eurosys Conference

Carzaniga, Antonio and Gorla, Alessandra and Mattavelli, Andrea and Perino, Nicolò
(2012) A self-healing technique for Java applications.
In: 34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland.

Cauchard, Jessica R. and Löchtefeld, Markus and Fraser, Mike and Krüger, Antonio and Subramanian, Sriram
(2012) m+pSpaces: virtual workspaces in the spatially-aware mobile environment.
In: Mobile HCI '12, Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services, San Francsico, CA, USA, September 21-24, 2012.

Cha, Meeyoung and Benevenuto, Fabrício and Haddadi, Hamed and Gummadi, Krishna P.
(2012) The World of Connections and Information Flow in Twitter.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 42 (4). 991–998.

Chatterjee, Krishnendu and Chmelik, Martin and Majumdar, Rupak
(2012) Equivalence of Games with Probabilistic Uncertainty and Partial-Observation Games.
In: Proc. of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA 2012).
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012) Interactively and Visually Exploring Tours of Marked Nodes in Large Graphs.
In: Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

Chau, Duen Horng and Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Faloutsos, Christos
(2012) \textsc TourViz : Interactive Visualization of Connection Pathways in Large Graphs.
In: Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Cheikhrouhou, Lassaad and Stephan, Werner and Fischlin, Marc and Ullmann, Markus
(2012) Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
In: Sicherheit 2012 -- Beiträge der 6-ten Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. V..

Chen, Ruichuan and Reznichenko, Alexey and Francis, Paul and Gehrke, Johannes
(2012) Towards Statistical Queries over Distributed Private User Data.
In: Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012).

Ciobotaru, Oana
(2012) On the (Non-)Equivalence of UC Security Notions.
In: Proc. 6th International Conference on Provable Security (ProvSec 2012).

Ciobotaru, Oana
(2012) Rational Cryptography.
Doctoral thesis, Saarland University.

Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012) On the (limited) power of non-equivocation.
In: Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012).

Cloud, Arbeitsgruppe "Rechtsrahmen Cloud Computing" Kompetenzzentrum Tr
(2012) Cloud Computing: solutions in the field of data protection law - Cloud Computing Legal Framework Working Group.
Technical Report. UNSPECIFIED.

Cloud, Arbeitsgruppe "Rechtsrahmen Cloud Computing" Kompetenzzentrum Tr
(2012) Thesenpapier – Datenschutzrechtliche Lösungen für Cloud Computing.
Technical Report. UNSPECIFIED.

Daiber, Florian and Falk, Eric and Krüger, Antonio
(2012) Balloon selection revisited: multi-touch selection techniques for stereoscopic data.
In: International Working Conference on Advanced Visual Interfaces, AVI 2012, Capri Island, Naples, Italy, May 22-25, 2012, Proceedings.

Daiber, Florian and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2012) TouchPosing: multi-modal interaction with geospatial data.
In: 11th International Conference on Mobile and Ubiquitous Multimedia, MUM '12, Ulm, Germany, December 4-6, 2012.

Daiber, Florian and Krüger, Antonio and Schöning, Johannes and Müller, Jörg
(2012) Context-Sensitive Display Environments.
In: Ubiquitous Display Environments. Cognitive Technologies . Springer, 31–51.

Daiber, Florian and Li, Lianchao and Krüger, Antonio
(2012) Designing gestures for mobile 3D gaming.
In: 11th International Conference on Mobile and Ubiquitous Multimedia, MUM '12, Ulm, Germany, December 4-6, 2012.

Dallmeier, Valentin and Knopp, Nikolai and Mallon, Christoph and Fraser, Gordon and Hack, Sebastian and Zeller, Andreas
(2012) Automatically Generating Test Cases for Specification Mining.
IEEE Transactions on Software Engineering, 38 (2). pp. 243-257.

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12).
Conference: NDSS Network and Distributed System Security Symposium

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3).

Dimitrova, Rayna and Finkbeiner, Bernd
(2012) Counterexample-Guided Synthesis of Observation Predicates.
In: Proceedings of the 10th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'12).

Dimitrova, Rayna and Finkbeiner, Bernd and Kovács, Máté and Rabe, Markus N. and Seidl, Helmut
(2012) Model Checking Information Flow in Reactive Systems.
In: Proc. 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI).

Dimitrova, Rayna and Finkbeiner, Bernd and Rabe, Markus N.
(2012) Monitoring Temporal Information Flow.
In: Proc. 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA).

Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo
(2012) Efficient Big Data Processing in Hadoop MapReduce.
The Proceedings of the VLDB Endowment (PVLDB), 5 (12). pp. 2014-2015.

Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo and Richter, Stefan and Schuh, Stefan and Jindal, Alekh and Schad, Jorg
(2012) Only Aggressive Elephants are Fast Elephants.
The Proceedings of the VLDB Endowment (PVLDB), 5 (11). pp. 1591-1602.

Dolby, Julian and Hammer, Christian and Marino, Daniel and Tip, Frank and Vaziri, Mandana and Vitek, Jan
(2012) A data-centric approach to synchronization.
ACM Trans. Program. Lang. Syst., 34 (1). 4:1-4:48.

Doychev, Goran
(2012) Analysis and Mitigation of Information Leaks in Web Browsing Traffic.
Masters thesis, Saarland University.

Dreyer, Derek and Neis, Georg and Birkedal, Lars
(2012) The impact of higher-order state and control effects on local relational reasoning.
J. Funct. Program., 22 (4-5). 477–528.

Druschel, Peter
(2012) Accountability and Trust in Cooperative Information Systems.
In: Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12).
Conference: ICDE International Conference on Data Engineering

Döttling, Nico and Dowsley, Rafael and Müller-Quade, Jörn and Nascimento, Anderson C. A.
(2012) A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Information Theory, 58 (10). pp. 6672-6680.

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2012) Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
In: ICITS.

Döttling, Nico and Nascimento, Anderson C. A. and Müller-Quade, Jörn
(2012) IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
In: ASIACRYPT.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Active Metric Learning for Object Recognition.
In: Pattern Recognition - Joint 34th DAGM and 36th OAGM Symposium, Graz, Austria, August 28-31, 2012. Proceedings.

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) RALF: A reinforced active learning formulation for object class recognition.
In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Ebert, Sandra and Fritz, Mario and Schiele, Bernt
(2012) Semi-Supervised Learning on a Budget: Scaling Up to Large Datasets.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.

Ehlers, Rüdiger and Finkbeiner, Bernd
(2012) Monitoring Realizability.
In: Proceedings of the Second International Conference on Runtime Verification (RV'11).

Elmasry, Amr and Mehlhorn, Kurt and Schmidt, Jens M.
(2012) An O(n+m) Certifying Triconnnectivity Algorithm for Hamiltonian Graphs.
Algorithmica, 62 (3-4). pp. 754-766.

Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2012) A Perfect Model for Bounded Verification.
In: Proc. of the 27th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS 2012).
Conference: LICS IEEE Symposium on Logic in Computer Science

Fahl, Sascha and Harbach, Marian and Muders, Thomas and Baumgärtner, Lars and Freisleben, Bernd and Smith, Matthew
(2012) Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security.
In: Proceedings of the 2012 ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Fehringer, Benedict and Bulling, Andreas and Krüger, Antonio
(2012) Analysing the potential of adapting head-mounted eye tracker calibration to a new user.
In: Proceedings of the 2012 Symposium on Eye-Tracking Research and Applications, ETRA 2012, Santa Barbara, CA, USA, March 28-30, 2012.

Finkbeiner, Bernd and Jacobs, Swen
(2012) Lazy Synthesis.
In: Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'12).

Finkbeiner, Bernd and Peter, Hans-Jörg
(2012) Template-Based Controller Synthesis for Timed Systems.
In: Proc. 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 12).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Fiore, Dario and Schröder, Dominique
(2012) Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations.
In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
Conference: TCC Theory of Cryptography Conference

Fischer, Jeffrey and Majumdar, Rupak and Esmaeilsabzali, Shahram
(2012) Engage: A Deployment Management System.
In: Proc. of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Fischlin, Marc and Lehmann, Anja and Schröder, Dominique
(2012) History-Free Sequential Aggregate Signatures.
In: Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012).

Fischlin, Marc and Schröder, Dominique
(2012) Security of blind signatures under aborts and applications to adaptive oblivious transfer.
Journal of Mathematical Cryptology, 5 (2). 169–204.

Fraser, Gordon and Zeller, Andreas
(2012) Mutation-Driven Generation of Unit Tests and Oracles.
IEEE Transactions on Software Engineering, 38 (2). pp. 278-292.

Ganty, Pierre and Majumdar, Rupak
(2012) Algorithmic Verification of Asynchronous Programs.
ACM Transactions on Programming Languages and Systems, 34 (1). 6:1-6:48.

Garg, Deepak and Genovese, Valerio and Negri, Sara
(2012) Countermodels from Sequent Calculi in Multi-Modal Logics.
In: Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012).
Conference: LICS IEEE Symposium on Logic in Computer Science

Garg, Deepak and Pfenning, Frank
(2012) Stateful authorization logic - Proof theory and a case study.
Journal of Computer Security, 20 (4). pp. 353-391.

Gehring, Sven and Krüger, Antonio
(2012) Façade map: continuous interaction with media façades using cartographic map projections.
In: The 2012 ACM Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh, PA, USA, September 5-8, 2012.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Gehring, Sven and Krüger, Antonio
(2012) Using media façades to engage social interaction.
In: The 2012 ACM Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh, PA, USA, September 5-8, 2012.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Gehring, Sven and Löchtefeld, Markus and Daiber, Florian and Böhmer, Matthias and Krüger, Antonio
(2012) Using intelligent natural user interfaces to support sales conversations.
In: 17th International Conference on Intelligent User Interfaces, IUI 2012, Lisbon, Portugal, February 14-17, 2012.
Conference: IUI International Conference on Intelligent User Interfaces

Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012) Labeled Goal-Directed Search in Access Control Logic.
In: Proc. of the 8th International Workshop on Security and Trust Management (STM 2012).

Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012) Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Gerke, Michael and Ehlers, Rüdiger and Finkbeiner, Bernd and Peter, Hans-Jörg
(2012) FlexRay for Avionics: Automatic Verification with Parametric Physical Layers.
In: Infotech@Aerospace 2012, Garden Grove, California, USA, June 19-21, 2012.

Ghosh, Saptarshi and Sharma, Naveen Kumar and Benevenuto, Fabrício and Ganguly, Niloy and Gummadi, Krishna P.
(2012) Cognos: crowdsourcing search for topic experts in microblogs.
In: The 35th International ACM SIGIR conference on research and development in Information Retrieval, SIGIR '12, Portland, OR, USA, August 12-16, 2012.
Conference: SIGIR ACM International Conference on Research and Development in Information Retrieval

Ghosh, Saptarshi and Viswanath, Bimal and Kooti, Farshad and Sharma, Naveen Kumar and Korlam, Gautam and Benevenuto, Fabrício and Ganguly, Niloy and Gummadi, Krishna P.
(2012) Understanding and combating link farming in the twitter social network.
In: Proc. of the 21st International Conference on World Wide Web (WWW 2012).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Giustiniano, Domenico and Tippenhauer, Nils Ole and Mangold, Stefan
(2012) Low-complexity Visible Light Networking with LED-to-LED communication.
In: Proceedings of IFIP Wireless Days.

Gomez-Rodriguez, Manuel and Leskovec, Jure and Krause, Andreas
(2012) Inferring Networks of Diffusion and Influence.
TKDD, 5 (4). 21:1–21:37.

Gomez-Rodriguez, Manuel and Leskovec, Jure and Schölkopf, Bernhard
(2012) Structure and Dynamics of Information Pathways in Online Media.
CoRR, abs/12.

Gomez-Rodriguez, Manuel and Rogati, Monica
(2012) Bridging offline and online social graph dynamics.
In: 21st ACM International Conference on Information and Knowledge Management, CIKM'12, Maui, HI, USA, October 29 - November 02, 2012.
Conference: CIKM ACM International Conference on Information and Knowledge Management

Gomez-Rodriguez, Manuel and Schölkopf, Bernhard
(2012) Influence Maximization in Continuous Time Diffusion Networks.
CoRR, abs/12.

Gomez-Rodriguez, Manuel and Schölkopf, Bernhard
(2012) Submodular Inference of Diffusion Networks from Multiple Trees.
In: Proceedings of the 29th International Conference on Machine Learning, ICML 2012, Edinburgh, Scotland, UK, June 26 - July 1, 2012.
Conference: ICML International Conference on Machine Learning

Grier, Chris and Ballard, Lucas and Caballero, Juan and Chachra, Neha and Dietrich, Christian J. and Levchenko, Kirill and Mavrommatis, Panayiotis and McCoy, Damon and Nappa, Antonio and Pitsillidis, Andreas and Provos, Niels and Rafique, M. Zubair and Rajab, Moheeb Abu and Rossow, Christian and Thomas, Kurt and Paxson, Vern and Savage, Stefan and Voelker, Geoffrey M.
(2012) Manufacturing compromise: the emergence of exploit-as-a-service.
In: the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012.
Conference: CCS ACM Conference on Computer and Communications Security

Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012) EXSYST: Search-based GUI testing.
In: Proc. of the 34th International Conference on Software Engineering (ICSE 2012).
Conference: ICSE International Conference on Software Engineering

Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2012) Search-based system testing: high coverage, no false alarms.
In: Proc. International Symposium on Software Testing and Analysis (ISSTA 2012).
Conference: ISSTA International Symposium on Software Testing and Analysis

Grosse, Kathrin and Chesñevar, Carlos Iván and Maguitman, Ana Gabriela
(2012) An Argument-based Approach to Mining Opinions from Twitter.
In: AT.

Grosse, Kathrin and Chesñevar, Carlos Iván and Maguitman, Ana Gabriela and Estevez, Elsa
(2012) Empowering an E-Government Platform Through Twitter-Based Arguments.
Inteligencia Artificial, Revista Iberoamericana de Inteligencia Artificial, 15 (50). pp. 46-56.

Gummadi, Krishna P.
(2012) Extracting Relevant and Trustworthy Information from Microblogs.
In: Twentieth Italian Symposium on Advanced Database Systems, SEBD 2012, Venice, Italy, June 24-27, 2012, Proceedings.

Hartmanns, Arnd and Hermanns, Holger and Berrang, Pascal
(2012) A comparative analysis of decentralized power grid stabilization strategies.
In: Proceedings of the Winter Simulation Conference.

Heymans, Stijn and Hoffmann, Jörg and Marconi, Annapaola and Phillips, Joshua and Weber, Ingo
(2012) Semantic Web Services Fundamentals.
In: Handbook of Service Description - USDL and Its Methods. Springer, 135–158.

Hofbauer, Stefan and Beckers, Kristian and Quirchmayr, Gerald and Sorge, Christoph
(2012) A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example.
In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012.
Conference: TrustCom International Conference on Trust, Security and Privacy in Computing and Communications

Hoffart, Johannes and Seufert, Stephan and Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2012) KORE: keyphrase overlap relatedness for entity disambiguation.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Hoffmann, Jörg and Weber, Ingo and Governatori, Guido
(2012) On compliance checking for clausal constraints in annotated process models.
Information Systems Frontiers, 14 (2). 155–177.

Hoffmann, Jörg and Weber, Ingo and Kraft, Frank Michael
(2012) SAP Speaks PDDL: Exploiting a Software-Engineering Model for Planning in Business Process Management.
J. Artif. Intell. Res., 44. 587–632.

Hofheinz, Dennis and Unruh, Dominique and Müller-Quade, Jörn
(2012) Polynomial Runtime and Composability.
Journal of Cryptology.

Holler, Christian and Herzig, Kim and Zeller, Andreas
(2012) Fuzzing with Code Fragments.
In: Proc. of the 21st Usenix Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Hur, Chung-Kil and Dreyer, Derek and Neis, Georg and Vafeiadis, Viktor
(2012) The marriage of bisimulations and Kripke logical relations.
In: Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Jacobs, Swen and Bloem, Roderick
(2012) Parameterized Synthesis.
In: Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proce.

Kane, Daniel M. and Mehlhorn, Kurt and Sauerwald, Thomas and Sun, He
(2012) Counting Arbitrary Subgraphs in Data Streams.
In: ICALP '12 - International Colloquium on Automata Languages and Programming.
Conference: ICALP International Colloquium on Automata Languages and Programming

Karayev, Sergey and Baumgartner, Tobias and Fritz, Mario and Darrell, Trevor
(2012) Timely Object Recognition.
In: Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012, Lake Tahoe, Nevada, United States..
Conference: NeurIPS Conference on Neural Information Processing Systems

Kate, Aniket and Huang, Yizhou and Goldberg, Ian
(2012) Distributed Key Generation in the Wild.
IACR Cryptology ePrint Archive, 2012. p. 377.

Katoen, Joost-Pieter and Klink, Daniel and Leucker, Martin and Wolf, Verena
(2012) Three-valued abstraction for probabilistic systems.
Journal of Logic and Algebraic Programming, 81 (4). pp. 356-389.

Katz, Michael and Hoffmann, Jörg and Helmert, Malte
(2012) How to Relax a Bisimulation?
In: Proceedings of the Twenty-Second International Conference on Automated Planning and Scheduling, ICAPS 2012, Atibaia, São Paulo, Brazil, June 25-19, 2012.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Keefe, Daniel F. and Krüger, Antonio and Steinicke, Frank and de la Rivière, Jean-Baptiste
(2012) Touching the 3rd Dimension (Dagstuhl Seminar 12151).
Dagstuhl Reports, 2 (4). 1–20.

Kerber, Frederic and Lessel, Pascal and Daiber, Florian and Krüger, Antonio
(2012) Shift 'n' touch: combining Wii Balance Board and Cubtile.
In: Nordic Conference on Human-Computer Interaction, NordiCHI '12, Copenhagen, Denmark, October 14-17, 2012.

Keyder, Emil Ragip and Hoffmann, Jörg and Haslum, Patrik
(2012) Semi-Relaxed Plan Heuristics.
In: Proceedings of the Twenty-Second International Conference on Automated Planning and Scheduling, ICAPS 2012, Atibaia, São Paulo, Brazil, June 25-19, 2012.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Keyder, Emil Ragip and Hoffmann, Jörg and Haslum, Patrik
(2012) Semi-Relaxed Plan Heuristics.
In: Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada..
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Knuth, Karsten
(2012) Security Analysis of Browser Extension Concepts.
Bachelors thesis, Saarland University.

Kooti, Farshad and Mason, Winter A and Gummadi, Krishna P. and Cha, Meeyoung
(2012) Predicting emerging social conventions in online social networks.
In: Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Kooti, Farshad and Yang, Haeryun and Cha, Meeyoung and Gummadi, Krishna P. and Mason, Winter A.
(2012) The Emergence of Conventions in Online Social Networks.
In: Proceedings of the Sixth International Conference on Weblogs and Social Media, Dublin, Ireland, June 4-7, 2012.

Krishnaswami, Neelakantan R. and Turon, Aaron and Dreyer, Derek and Garg, Deepak
(2012) Superficially substructural types.
In: ACM SIGPLAN International Conference on Functional Programming (ICFP 2012).
Conference: ICFP International Conference on Functional Programming

Kuhtz, Lars and Finkbeiner, Bernd
(2012) Efficient Parallel Path Checking for Linear-Time Temporal Logic With Past and Bounds.
In: Logical Methods in Computer Science (LMCS'12).

Kulshrestha, Juhi and Kooti, Farshad and Nikravesh, Ashkan and Gummadi, Krishna P.
(2012) Geographic Dissection of the Twitter Network.
In: Proceedings of the Sixth International Conference on Weblogs and Social Media, Dublin, Ireland, June 4-7, 2012.

Künnemann, Robert and Steel, Graham
(2012) YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM.
In: Workshop on Security and Trust Management.

Lee, Jonathan K. and Palsberg, Jens and Majumdar, Rupak and Hong, Hong
(2012) Efficient May Happen in Parallel Analysis for Async-finish Parallelism.
In: Proc. of the 19th International Symposium on Static Analysis (SAS 2012).
Conference: SAS Static Analysis Symposium

Leiva, Luis A. and Böhmer, Matthias and Gehring, Sven and Krüger, Antonio
(2012) Back to the app: the costs of mobile application interruptions.
In: Mobile HCI '12, Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services, San Francsico, CA, USA, September 21-24, 2012.

Lessel, Pascal and Böhmer, Matthias and Kröner, Alexander and Krüger, Antonio
(2012) User requirements and design guidelines for digital restaurant menus.
In: Nordic Conference on Human-Computer Interaction, NordiCHI '12, Copenhagen, Denmark, October 14-17, 2012.

Li, Wenbin and Fritz, Mario
(2012) Recognizing Materials from Virtual Examples.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part IV.
Conference: ECCV European Conference on Computer Vision

Liu, Yabing and Viswanath, Bimal and Mondal, Mainack and Gummadi, Krishna P. and Mislove, Alan
(2012) Simplifying friendlist management.
In: Proceedings of the 21st World Wide Web Conference, WWW 2012, Lyon, France, April 16-20, 2012 (Companion Volume).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Long, Zhenyue and Calin, Georgel and Majumdar, Rupak and Meyer, Roland
(2012) Language-Theoretic Abstraction Refinement.
In: Proc. of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012).

Lutz, Joachim
(2012) Model-based Monitoring for Sensitive SCADA Systems.
Bachelors thesis, Saarland University.

Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012) Diffusion-Based Image Compression in Steganography.
In: Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012.

Majumdar, Rupak and Saha, Indranil and Shashidhar, K C and Wang, Zilong
(2012) CLSE: Closed-Loop Symbolic Execution.
In: Proc. of the 4th International Symposium on NASA Formal Methods (NFM 2012).

Majumdar, Rupak and Saha, Indranil and Zamani, Majid
(2012) Synthesis of minimal-error control software.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2012).
Conference: EMSOFT ACM Conference on Embedded Software

Majumdar, Rupak and Zamani, Majid
(2012) Approximately Bisimilar Symbolic Models for Digital Control Systems.
In: Proc. of the 24th International Conference on Computer Aided Verification (CAV 2012).
Conference: CAV Computer Aided Verification

Maksoud, Mohamed Abdel and Reineke, Jan
(2012) An Empirical Evaluation of the Influence of the Load-Store Unit on WCET Analysis.
In: 12th International Workshop on Worst-Case Execution Time Analysis, WCET 2012, July 10, 2012, Pisa, Italy.

Mampaey, Michael and Vreeken, Jilles and Tatti, Nikolaj
(2012) Summarizing Data Succinctly with the Most Informative Itemsets.
Transactions on Knowledge Discovery from Data. pp. 1-44.

Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2012) Detecting Deadlock in Programs with Data-Centric Synchronization.
Technical Report. UNSPECIFIED.
(Unpublished)

Marmol, Felix Gomez and Sorge, Christoph and Ugus, Osman and Perez, Gregorio Martinez
(2012) Do not Snoop my Habits: Preserving Privacy in the Smart Grid.
IEEE Communications Magazine, Special Issue on Communication Protocols and Algorithms for the Smart Grid, 50 (5). pp. 166-172.

Marnau, Ninja and Schlehahn, Eva and Jensen, Meiko and Ferrer, Ricardo Morte
(2012) Cloud Computing: Solutions and Enablers.
Technical Report. UNSPECIFIED.
(Unpublished)

Megow, Nicole and Mehlhorn, Kurt and Schweitzer, Pascal
(2012) Online graph exploration: New results on old and new algorithms.
Theoretical Computer Science, 463. 62–72.

Mehlhorn, Kurt and Sack, Jörg-Rüdiger
(2012) CGTA-Awards 2011.
Computational Geometry, 45 (4). p. 139.

Mehlhorn, Kurt and Vardi, Moshe Y. and Herbstritt, Marc
(2012) Publication Culture in Computing Research (Dagstuhl Perspectives Workshop 12452).
Dagstuhl Reports, 2 (11). 20–44.

Meyer, Sebastian
(2012) Privacy Presserving Surveillance and Face Recognition.
Bachelors thesis, Saarland University.

Miller, Stephen and van den Berg, Jur and Fritz, Mario and Darrell, Trevor and Goldberg, Kenneth Y. and Abbeel, Pieter
(2012) A geometric approach to robotic laundry folding.
I. J. Robotics Res., 31 (2). pp. 249-267.

Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Defending Against Large-scale Crawls in Online Social Networks.
In: Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012.
Conference: CoNEXT ACM International Conference on Emerging Networking Experiments and Technologies

Möllers, Frederik
(2012) An Analysis of Traceability of Electronic Identification Documents.
Masters thesis, Universität Paderborn.

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012) Discovering and Exploring Relations on the Web.
Proc. of the Very Large Database Endowment (PVLDB), 5 (12). pp. 1982-1985.

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012) PATTY: A Taxonomy of Relational Patterns with Semantic Types.
In: Proc. Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL 2012).
Conference: EMNLP Empirical Methods in Natural Language Processing

Nakhost, Hootan and Hoffmann, Jörg and Müller, Martin
(2012) Resource-Constrained Planning: A Monte Carlo Random Walk Approach.
In: Proceedings of the Twenty-Second International Conference on Automated Planning and Scheduling, ICAPS 2012, Atibaia, São Paulo, Brazil, June 25-19, 2012.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Obser, Sven
(2012) User-controlled Internet Connections in Android.
Masters thesis, Saarland University.

Paul, Wolfgang J.
(2012) Cyber War, Formal Verification and Certified Infrastructure.
In: Verified Software: Theories, Tools, Experiments - 4th International Conference, VSTTE 2012, Philadelphia, PA, USA, January 28-29, 2012. Proceedings.

Paul, Wolfgang J. and Schmaltz, Sabine and Shadrin, Andrey
(2012) Completing the Automated Verification of a Small Hypervisor - Assembler Code Verification.
In: Proc. 10th International Conference on Software Engineering and Formal Methods (SEFM 2012).

Peter, Hans-Jörg and Finkbeiner, Bernd
(2012) The Complexity of Bounded Synthesis for Timed Control with Partial Observability.
In: Proceedings of the 10th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'12).

Peter, Philip
(2012) Autonomous UAV.
Bachelors thesis, Saarland University.

Petrlic, Ronald
(2012) Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.
In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12).

Petrlic, Ronald
(2012) Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.
In: Cyberspace Safety and Security.

Petrlic, Ronald and Sorge, Christoph
(2012) Privacy-Preserving DRM for Cloud Computing.
In: Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops.

Pishchulin, Leonid and Jain, Arjun and Andriluka, Mykhaylo and Thormählen, Thorsten and Schiele, Bernt
(2012) Articulated People Detection and Pose Estimation: Reshaping the Future.
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2012) Spotting Culprits in Epidemics: How many and Which ones?
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Qu, Lizhen and Gemulla, Rainer and Weikum, Gerhard
(2012) A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts.
In: Proc. of the Joint Conference on Empirical Methods for Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'12).
Conference: CoNLL Conference on Computational Natural Language Learning

Ranganathan, Aanjhan and Tippenhauer, Nils Ole and Skoric, Boris and Singelé, Dave and \vCapkun, Srdjan
(2012) Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS).

Rangapuram, Syama Sundar and Hein, Matthias
(2012) Constrained 1-Spectral Clustering.
In: Proceedings of the Fifteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2012, La Palma, Canary Islands, April 21-23, 2012.
Conference: AISTATS International Conference on Artificial Intelligence and Statistics

Reinert, Manuel
(2012) A Framework for Security-Oriented Distributed Programming.
Masters thesis, Saarland University.

Reischuk, Raphael M. and Backes, Michael and Gehrke, Johannes
(2012) SAFE Extensibility of Data-Driven Web Applications.
In: WWW~'12: Proceedings of the 21st International World Wide Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Rematas, Konstantinos and Fritz, Mario and Tuytelaars, Tinne
(2012) The Pooled NBNN Kernel: Beyond Image-to-Class and Image-to-Image.
In: Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I.

Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2012) Towards Zero-Overhead Adaptive Indexing in Hadoop.
CoRR, abs/12.

Rossow, Christian and Dietrich, Christian J. and Grier, Chris and Kreibich, Christian and Paxson, Vern and Pohlmann, Norbert and Bos, Herbert and van Steen, Maarten
(2012) Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
In: IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA.
Conference: SP IEEE Symposium on Security and Privacy

Ruffing, Tim
(2012) Computational Soundness of Interactive Primitives.
Bachelors thesis, Saarland University.

Rößler, Jeremias and Fraser, Gordon and Zeller, Andreas and Orso, Alessandro
(2012) Isolating failure causes through test case generation.
In: Proc. of the 2012 International Symposium on Software Testing and Analysis (ISSTA 2012).
Conference: ISSTA International Symposium on Software Testing and Analysis

Saha, Indranil and Majumdar, Rupak
(2012) Trigger memoization in self-triggered control.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2012).
Conference: EMSOFT ACM Conference on Embedded Software

Santos, Nuno and Rodrigues, Rodrigo and Gummadi, Krishna P. and Saroiu, Stefan
(2012) Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
In: Proceedings of the 21st Usenix Security Symposium (USENIX '12).
Conference: USENIX-Security Usenix Security Symposium

Sarraute, Carlos and Buffet, Olivier and Hoffmann, Jörg
(2012) POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing.
In: Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada..
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Scheffler, Tatjana and Schirru, Rafael and Lehmann, Paul
(2012) Matching Points of Interest from Different Social Networking Sites.
In: UNSPECIFIED Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence, LNAI, 7526 . Springer, pp. 245-248.

Schmaltz, Sabine and Shadrin, Andrey
(2012) Integrated Semantics of Intermediate-Language C and Macro-Assembler for Pervasive Formal Verification of Operating Systems and Hypervisors from VerisoftXT.
In: Proc. 4th International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE 2012).

Schmidt, Jens M
(2012) Certifying 3-Connectivity in Linear Time.
In: Proc. 39th International Colloquium on Automata, Languages and Programming (ICALP 2012).

Schröder, Dominique and Schröder, Heike
(2012) Verifiable data streaming.
In: Proc. of the 19th ACM Conference on Computer and Communication Security (CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

Schröder, Dominique and Unruh, Dominique
(2012) Security of Blind Signatures Revisited.
In: PKC 2012.

Schöning, Johannes and Rogers, Yvonne and Krüger, Antonio
(2012) Digitally Enhanced Food.
IEEE Pervasive Computing, 11 (3). 4–6.

Sharma, Naveen Kumar and Ghosh, Saptarshi and Benevenuto, Fabrício and Ganguly, Niloy and Gummadi, Krishna P.
(2012) Inferring who-is-who in the Twitter social network.
In: Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, WOSN 2012, Helsinki, Finland, August 17, 2012.

Skoruppa, Malte
(2012) Verifiable Security of Prefix-free Merkle-Damgård.
Masters thesis, Saarland University.

Slawski, Martin and Hussong, Rene and Tholey, Andreas and Jakoby, Thomas and Gregorius, Barbara and Hildebrandt, Andreas and Hein, Matthias
(2012) Isotope pattern deconvolution for peptide mass spectrometry by non-negative least squares/least absolute deviation template matching.
BMC Bioinformatics, 13. p. 291.

Smets, Koen and Vreeken, Jilles
(2012) \textsc Slim : Directly Mining Descriptive Patterns.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Song, Hyun Oh and Zickler, Stefan and Althoff, Tim and Girshick, Ross B. and Fritz, Mario and Geyer, Christopher and Felzenszwalb, Pedro F. and Darrell, Trevor
(2012) Sparselet Models for Efficient Multiclass Object Detection.
In: Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part II.
Conference: ECCV European Conference on Computer Vision

Sorge, Christoph and Krohn-Grimberghe, Artus
(2012) Bitcoin: Eine erste Einordnung.
Datenschutz und Datensicherheit, 36 (7). pp. 479-484.

Steinicke, Frank and Benko, Hrvoje and Krüger, Antonio and Keefe, Daniel F. and de la Rivière, Jean-Baptiste and Anderson, Kenneth T. and Häkkilä, Jonna and Arhippainen, Leena and Pakanen, Minna
(2012) The 3rd dimension of CHI (3DCHI): touching and designing 3D user interfaces.
In: CHI Conference on Human Factors in Computing Systems, CHI '12, Extended Abstracts Volume, Austin, TX, USA, May 5-10, 2012.
Conference: CHI International Conference on Human Factors in Computing Systems

Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2012) Sambamba: A Runtime System for Online Adaptive Parallelization.
In: Proc. of the 21st International Conference Compiler Construction (CC 2012).
Conference: CC International Conference on Compiler Construction

Suchanek, Fabian M and Gross-Amblard, David
(2012) Adding fake facts to ontologies.
In: Proc. of the 21st International Conference on World Wide Web (WWW 2012).

Sumner, William N and Hammer, Christian and Dolby, Julian
(2012) Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.
In: Runtime Verification. Springer, pp. 161-176.

Tabuada, Paulo and Balkan, Ayca and Caliskan, Sina Yamac and Shoukry, Yasser and Majumdar, Rupak
(2012) Input-Output stability for discrete systems.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2012).
Conference: EMSOFT ACM Conference on Embedded Software

Tatti, Nikolaj and Vreeken, Jilles
(2012) Comparing Apples and Oranges : Measuring Differences between Exploratory Data Mining Results.
Data Mining and Knowledge Discovery, 25 (2). pp. 173-207.

Tatti, Nikolaj and Vreeken, Jilles
(2012) Discovering Descriptive Tile Trees by Fast Mining of Optimal Geometric Subtiles.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Tatti, Nikolaj and Vreeken, Jilles
(2012) The Long and the Short of It: Summarising Event Sequences with Serial Episodes.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Teris, Liviu
(2012) Securing User-data in Android - A conceptual approach for consumer and enterprise usage.
Masters thesis, Saarland University.

Tippenhauer, Nils Ole
(2012) Physical-Layer Security Aspects of Wireless Localization.
PhD thesis, ETH Zurich, Switzerland.

Tippenhauer, Nils Ole and Giustiniano, Domenico and Mangold, Stefan
(2012) Toys communicating with LEDs: Enabling toy cars interaction.
In: Proceedings of Consumer Communications and Networking Conference (CCNC).

Treiblmayr, Martin and Scheider, Simon and Krüger, Antonio and von der Linden, Marc
(2012) Integrating GI with non-GI services - showcasing interoperability in a heterogeneous service-oriented architecture.
GeoInformatica, 16 (1). 207–220.

Unruh, Dominique
(2012) Everlasting Quantum Security.
UNSPECIFIED
.

Unruh, Dominique
(2012) Programmable encryption and key-dependent messages.
UNSPECIFIED
.

Unruh, Dominique
(2012) Quantum Proofs of Knowledge.
In: Eurocrypt 2012.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Vahldiek, Anjo and Elnikety, Eslam and Post, Ansley and Druschel, Peter and Garg, Deepak and Gehrke, Johannes and Rodrigues, Rodrigo
(2012) Trusted Storage.
In: Presented at USENIX FAST'12 WiP.
Conference: FAST Conference on File and Storage Technologies

Vetter, Benjamin and Ugus, Osman and Westhoff, Dirk and Sorge, Christoph
(2012) Homomorphic Primitives for a Privacy-Friendly Smart Metering Architecture.
In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2012).

Viswanath, Bimal and Mondal, Mainack and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Exploring the design space of social network-based Sybil defense.
In: Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012).

Viswanath, Bimal and Mondal, Mainack and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012) Canal: scaling social network-based Sybil tolerance schemes.
In: European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13, 2012.
Conference: EuroSys Eurosys Conference

Vreeken, Jilles and Ling, Charles X. and Siebes, Arno and Zaki, Mohammed J. and Xu Yu, Jeffrey and Goethals, Bart and Webb, Geoffrey I. and Wu, Xindong
(2012) Proceedings of the 12th IEEE International Conference on Data Mining Workshops (ICDMW), IEEE, 2012.
IEEE.

Vreeken, Jilles and Tatti, Nikolaj
(2012) Summarising Event Sequences with Serial Episodes.
In: Proceedings of the fifth Workshop on Information Theoretic Methods in Science and Engineering (WITMSE).

Vreeken, Jilles and van Leeuwen, Matthijs and Nijssen, Siegfried and Tatti, Nikolaj and Dries, Anton and Goethals, Bart
(2012) Proceedings of the ECML PKDD Workshop on Instant Interactive Data Mining (IID).
UNSPECIFIED.

Weikum, Gerhard and Hoffart, Johannes and Nakashole, Ndapandula and Spaniol, Marc and Suchanek, Fabian M and Yosef, Mohamed Amir
(2012) Big Data Methods for Computational Linguistics.
IEEE Data Engineering Bulletin, 35 (3). pp. 46-64.

Wu, Hao and Mampaey, Michael and Tatti, Nikolaj and Vreeken, Jilles and Hossain, M.Shariar and Ramakrishnan, Naren
(2012) Where Do I Start? Algorithmic Strategies to Guide Intelligence Analysts.
In: Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD).

Zeller, Andreas
(2012) Mining Models.
In: Proc. of the 19th International Workshop on Model Checking Software (SPIN 2012).

Zeller, Andreas
(2012) Proving programs continuous: technical perspective.
Communications of the ACM, 55 (8). p. 106.

and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling
(2012) Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
In: ICITS.

and J\"rn M\"ller-Quade, Nico D\"ttling and Nascimento, Anderson C. A.
(2012) IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
In: ASIACRYPT.

and Rafael Dowsley and J\"rn M\"ller-Quade, Nico D\"ttling and Nascimento, Anderson C. A.
(2012) A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Information Theory, 58 (10). pp. 6672-6680.

This list was generated on Wed Mar 27 22:26:59 2024 CET.