Number of items: 232.
UNSPECIFIED, ed.
(2013)
Pattern Recognition - 35th German Conference, GCPR 2013, Saarbrücken, Germany, September 3-6, 2013. Proceedings.
Lecture Notes in Computer Science, 8142
.
Springer.
Abel, Andreas and Reineke, Jan
(2013)
Measurement-based modeling of the cache replacement policy.
Afshani, Peyman and Agrawal, Manindra and Doerr, Benjamin and Doerr, Carola and Larsen, Kasper Green and Mehlhorn, Kurt
(2013)
The Query Complexity of Finding a Hidden Permutation.
Akoglu, Leman and Müller, Emmanuel and Vreeken, Jilles
(2013)
Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD).
ACM Press, New York, NY, USA, pp. 1-57.
ISBN 978-1-4503-2335-2
Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horn and Tatti, Nikolaj and Faloutsos, Christos
(2013)
Mining Connection Pathways for Marked Nodes in Large Graphs.
Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013)
Cartification: A Neighborhood Preserving Transformation for Mining High Dimensional Data.
Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013)
Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods.
Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2013)
A Framework for the Verification of Certifying Computations.
Journal of Automated Reasoning.
pp. 1-33.
Aminof, Benjamin and Jacobs, Swen and Khalimov, Ayrat and Rubin, Sasha
(2013)
Parameterized Model Checking of Token-Passing Systems.
CoRR, abs/13.
An, Jisun and Quercia, Daniele and Cha, Meeyoung and Gummadi, Krishna P. and Crowcroft, Jon
(2013)
Traditional media seen from social media.
Andalam, Sidharta and Girault, Alain and Sinha, Roopak and Roop, Partha S. and Reineke, Jan
(2013)
Precise timing analysis for direct-mapped caches.
Andriesse, Dennis and Rossow, Christian and Stone-Gross, Brett and Plohmann, Daniel and Bos, Herbert
(2013)
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus.
Angius, Alessio and Horváth, András and Wolf, Verena
(2013)
Approximate Transient Analysis of Queuing Networks by Quasi Product Forms.
Asghar, Muhammad Rizwan
(2013)
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
Doctoral thesis, University of Trento.
Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2013)
ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments.
Computers and Security, 35.
pp. 2-24.
ISSN 0167-4048
Asghar, Muhammad Rizwan and Miorandi, Daniele
(2013)
A Holistic View of Security and Privacy Issues in Smart Grids.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 7823
.
Springer Berlin Heidelberg, pp. 58-71.
ISBN 978-3-642-38029-7
Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno and Ion, Mihaela
(2013)
Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases.
Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2013)
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification.
Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013)
Introducing Accountability to Anonymity Networks.
CoRR, abs/13.
Backes, Michael and Datta, Amit and Kate, Aniket
(2013)
Asynchronous Computational VSS with Reduced Communication Complexity.
Backes, Michael and Doychev, Goran and Köpf, Boris
(2013)
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013)
Privacy-Preserving Accountable Computation.
Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013)
Verifiable Delegation of Computation on Outsourced Data.
Backes, Michael and Gagné, Martin and Skoruppa, Malte
(2013)
Using Mobile Device Communication to Strengthen e-Voting Protocols.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard - Enforcing User Requirements on Android Apps.
In:
Tools and Algorithms for the Construction and Analysis of Systems.
Springer, pp. 545-550.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report.
UNSPECIFIED.
(Unpublished)
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2013)
Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations.
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo.
Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013)
AnoA: A Framework For Analyzing Anonymous Communication Protocols.
Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013)
AnoA: A Framework for Analyzing Anonymous Communication Protocols.
Backes, Michael and Meiser, Sebastian
(2013)
Differentially Private Smart Metering with Battery Recharging.
Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2013)
Highly Controlled, Fine-grained Delegation of Signing Capabilities.
IACR Cryptology ePrint Archive, 2013.
p. 408.
Baruah, Sanjoy and Brandenburg, Björn B.
(2013)
Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities.
Becchetti, Luca and Bonifaci, Vincenzo and Dirnberger, Michael and Karrenbauer, Andreas and Mehlhorn, Kurt
(2013)
Physarum Can Compute Shortest Paths: Convergence Proofs and Complexity Bounds.
Berg, Matthias
(2013)
Formal Verification of Cryptographic Security Proofs.
Doctoral thesis, Saarland University.
Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013)
Towards Efficient Traffic-analysis Resistant Anonymity Networks.
Bodden, Eric and Schneider, Markus and Kreutzer, Michael and Mezini, Mira and Hammer, Christian and Zeller, Andreas and Achenbach, Dirk and Huber, Matthias and Kraschewski, Daniel
(2013)
Entwicklung sicherer Software durch Security by Design.
In:
Entwicklung sicherer Software durch Security by Design : Trend- und Strategiebericht.
Fraunhofer SIT.
Bohli, Jens-Matthias and Gruschka, Nils and Jensen, Meiko and Iacono, Luigi Lo and Marnau, Ninja
(2013)
Security and Privacy Enhancing Multi-Cloud Architectures.
IEEE Transactions on Dependable and Secure Computing (TDSC), 10 (4).
Boonk, Martin and Petrlic, Ronald and Sorge, Christoph
(2013)
POSTER: Save Our Passwords.
Brandenburg, Björn B.
(2013)
A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications.
Brandenburg, Björn B.
(2013)
Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling.
Brandenburg, Björn B.
(2013)
An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2).
p. 19.
Brandenburg, Björn B. and Anderson, James H.
(2013)
The OMLP family of optimal multiprocessor real-time locking protocols.
Design Automation for Embedded Systems, 17 (2).
pp. 277-342.
Bresson, Emmanuel and Catalano, Dario and Raimondo, Mario and Fiore, Dario and Gennaro, Rosario
(2013)
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
International Journal of Information Security, 12 (6).
pp. 439-465.
Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2013)
Advances in Mobile Security.
Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza
(2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2013)
Logical Foundations of Secure Resource Management.
Böhmer, Matthias and Ganev, Lyubomir and Krüger, Antonio
(2013)
AppFunnel: a framework for usage-centric evaluation of recommender systems that suggest mobile applications.
Böhmer, Matthias and Gehring, Sven and Hempel, Jonas and Krüger, Antonio
(2013)
Revisiting phone call UIs for multipurpose mobile phones.
Böhmer, Matthias and Krüger, Antonio
(2013)
A study on icon arrangement by smartphone users.
Böhmer, Matthias and Lander, Christian and Krüger, Antonio
(2013)
What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness.
Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013)
Constrained fractional set programs and their application in local clustering and community detection.
Calin, Georgel and Derevenetc, Egor and Majumdar, Rupak and Meyer, Roland
(2013)
A Theory of Partitioned Global Address Spaces.
Carzaniga, Antonio and Gorla, Alessandra and Mattavelli, Andrea and Perino, Nicolò and Pezzè, Mauro
(2013)
Automatic recovery from runtime failures.
Catalano, Dario and Fiore, Dario
(2013)
Practical Homomorphic MACs for Arithmetic Circuits.
Catalano, Dario and Fiore, Dario
(2013)
Vector Commitments and Their Applications.
Catalano, Dario and Fiore, Dario and Gennaro, Rosario and Vamvourellis, Konstantinos
(2013)
Algebraic (Trapdoor) One-Way Functions and Their Applications.
Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Faloutsos, Christos
(2013)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
ACM Press, New York, NY, USA, pp. 1-104.
ISBN 978-1-4503-2329-1
Chen, Binbin and Kalbarczyk, Zbigniew and Nicol, David M. and Sanders, William H. and Tan, Rui and Temple, William G. and Tippenhauer, Nils Ole and Vu, An Hoa and Yau, David K.Y.
(2013)
Go with the Flow: Toward Workflow-Oriented Security Assessment.
Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013)
SplitX: high-performance private analytics.
Cheong, Otfried and Mehlhorn, Kurt and Teillaud, Monique
(2013)
Computational Geometry (Dagstuhl Seminar 13101).
Dagstuhl Reports, 3 (3).
1–23.
Chesñevar, Carlos Iván and González, María Paula and Grosse, Kathrin and Maguitman, Ana Gabriela
(2013)
A First Approach to Mining Opinions as Multisets through Argumentation.
Chistikov, Dmitry and Majumdar, Rupak
(2013)
A Uniformization Theorem for Nested Word to Word Transductions.
Chowdhury, Soudip Roy and Imran, Muhammad and Asghar, Muhammad Rizwan and Amer-Yahia, Sihem and Castillo, Carlos
(2013)
Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages.
Cohen, Ernie and Paul, Wolfgang J. and Schmaltz, Sabine
(2013)
Theory of Multi Core Hypervisor Verification.
Colley, Ashley and Häkkilä, Jonna and Schöning, Johannes and Daiber, Florian and Steinicke, Frank and Krüger, Antonio
(2013)
Touch the 3rd Dimension! Understanding Stereoscopic 3D Touchscreen Interaction.
Cong, Gao and Dittrich, Jens
(2013)
Front Matter.
PVLDB, 7 (2).
i–ix.
Daiber, Florian and Kosmalla, Felix and Krüger, Antonio
(2013)
BouldAR: using augmented reality to support collaborative boulder training.
Dallmeier, Valentin and Burger, Martin and Orth, Tobias and Zeller, Andreas
(2013)
WebMate: Generating Test Cases for Web 2.0.
Darulova, Eva and Kuncak, Viktor and Majumdar, Rupak and Saha, Indranil
(2013)
Synthesis of fixed-point programs.
Davi, Lucas Vincenzo and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013)
Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM.
Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013)
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis.
Computer Networks, 57 (2).
475–486.
Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013)
Exploiting visual appearance to cluster and detect rogue software.
Dimitrova, Rayna and Finkbeiner, Bernd
(2013)
Lossy Channel Games under Incomplete Information.
Dittrich, Jens
(2013)
Say No! No! and No!
Dittrich, Jens and Richter, Stefan and Schuh, Stefan and Quiané-Ruiz, Jorge-Arnulfo
(2013)
Efficient OR Hadoop: Why not both?
IEEE Data Eng. Bull., 36 (1).
pp. 15-23.
Doychev, Goran and Feld, Dominik and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2013)
CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
Du, Nan and Song, Le and Gomez-Rodriguez, Manuel and Zha, Hongyuan
(2013)
Scalable Influence Estimation in Continuous-Time Diffusion Networks.
Duan, Ran and Mehlhorn, Kurt
(2013)
A Combinatorial Polynomial Algorithm for the Linear Arrow-Debreu Market.
Döttling, Nico and Müller-Quade, Jörn
(2013)
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Döttling, Nico and Nilges, Tobias and Mie, Thilo and Müller-Quade, Jörn
(2013)
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Ebert, Sandra and Schiele, Bernt
(2013)
Where Next in Object Recognition and how much Supervision Do We Need?
In:
Advances in Computer Vision and Pattern Recognition.
Springer, pp. 35-64.
Eigner, Fabienne and Maffei, Matteo
(2013)
Differential Privacy by Typing in Security Protocols.
Eigner, Fabienne and Maffei, Matteo
(2013)
Differential Privacy by Typing in Security Protocols.
Elbassioni, Khaled M. and Makino, Kazuhisa and Mehlhorn, Kurt and Ramezani, Fahimeh
(2013)
On Randomized Fictitious Play for Approximating Saddle Points over Convex Sets.
Elmasry, Amr and Schmidt, Jens M. and Mehlhorn, Kurt
(2013)
Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge.
Journal of Graph Theory, 72 (1).
pp. 112-121.
Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2013)
Parameterized verification of asynchronous shared-memory systems.
Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew
(2013)
Hey, You, Get Off of My Clipboard.
In:
UNSPECIFIED
Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 144-161.
ISBN 978-3-642-39884-1
(Unpublished)
Finkbeiner, Bernd
(2013)
Transforming Undecidable Synthesis Problems into Decidable Problems.
Finkbeiner, Bernd and Rabe, Markus N. and Sánchez, César
(2013)
A Temporal Logic for Hyperproperties.
CoRR, abs/13.
Finkbeiner, Bernd and Schewe, Sven
(2013)
Bounded synthesis.
Finkbeiner, Bernd and Seidl, Helmut and Kovács, Máté
(2013)
Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties.
Fischlin, Marc and Fleischhacker, Nils
(2013)
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Fischlin, Marc and Fleischhacker, Nils
(2013)
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Fleischhacker, Nils and Günther, Felix and Kiefer, Franziskus and Manulis, Mark and Poettering, Bertram
(2013)
Pseudorandom signatures.
Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2013)
Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited.
IACR Cryptology ePrint Archive, 2013.
p. 418.
Gagné, Martin and Lafourcade, Pascal and Lakhnech, Yassine
(2013)
Automated Security Proofs for Almost-Universal Hash for MAC Verification.
Gehring, Sven and Hartz, Elias and Löchtefeld, Markus and Krüger, Antonio
(2013)
The media façade toolkit: prototyping and simulating interaction with media façades.
Gerling, Sebastian and Gerling, Rainer W.
(2013)
Wie realistisch ist ein "Recht auf Vergessenwerden"?
Datenschutz und Datensicherheit, 37 (7).
pp. 445-446.
Ghosh, Saptarshi and Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Sharma, Naveen Kumar and Ganguly, Niloy and Gummadi, Krishna P.
(2013)
On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream.
Gligoric, Milos and Majumdar, Rupak
(2013)
Model Checking Database Applications.
Gomez-Rodriguez, Manuel and Leskovec, Jure and Schölkopf, Bernhard
(2013)
Modeling Information Propagation with Survival Theory.
Gonthier, Georges and Ziliani, Beta and Nanevski, Aleksandar and Dreyer, Derek
(2013)
How to make ad hoc proof automation less ad hoc.
J. Funct. Program., 23 (4).
pp. 357-401.
Grimm, Niklas
(2013)
Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.
Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2013)
Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities.
Gummadi, Krishna P.
(2013)
Addressing the privacy management crisis in online social networks.
Hammer, Christian
(2013)
Efficient Algorithms for Control Closures.
Hein, Matthias and Setzer, Simon and Jost, Leonardo and Rangapuram, Syama Sundar
(2013)
The Total Variation on Hypergraphs - Learning on Hypergraphs Revisited.
Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013)
Classifying code changes and predicting defects using changegenealogies.
Saarland University.
Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013)
Predicting defects using change genealogies.
Herzig, Kim and Just, Sascha and Zeller, Andreas
(2013)
It's not a bug, it's a feature: how misclassification impacts bug prediction.
Herzig, Kim and Zeller, Andreas
(2013)
The impact of tangled code changes.
Huang, Chien-Chung and Kavitha, Telikepalli and Mehlhorn, Kurt and Michail, Dimitrios
(2013)
Fair Matchings and Related Problems.
Hur, Chung-Kil and Neis, Georg and Dreyer, Derek and Vafeiadis, Viktor
(2013)
The power of parameterization in coinductive proof.
Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2013)
A Theory of Name Boundedness.
Jacobs, Swen and Kuncak, Viktor and Suter, Philippe
(2013)
Reductions for Synthesis Procedures.
Jamrozik, Konrad and Fraser, Gordon and Tillmann, Nikolai and Halleux, Jonathan De
(2013)
Generating Test Suites with Augmented Dynamic Symbolic Execution.
Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2013)
A Category-Level 3D Object Dataset: Putting the Kinect to Work.
In:
Consumer Depth Cameras for Computer Vision, Research Topics and Applications.
UNSPECIFIED, pp. 141-165.
Jindal, Alekh and Palatinus, Endre and Pavlov, Vladimir and Dittrich, Jens
(2013)
A Comparison of Knives for Bread Slicing.
The Proceedings of the VLDB Endowment (PVLDB), 6 (6).
pp. 361-372.
Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013)
WWHow! Freeing Data Storage from Cages.
Jindal, Alekh and Schuhknecht, Felix Martin and Dittrich, Jens and Khachatryan, Karen and Bunte, Alexander
(2013)
How Achaeans Would Construct Columns in Troy.
Johns, Martin and Lekies, Sebastian and Stock, Ben
(2013)
Eradicating DNS Rebinding with the Extended Same-Origin Policy.
Joshi, Nakul and Petrlic, Ronald
(2013)
Towards practical privacy-preserving Digital Rights Management for Cloud Computing.
Jurkiewicz, Tomasz and Mehlhorn, Kurt
(2013)
The cost of address translation.
Kahl, Gerrit and Paradowski, Denise
(2013)
A Privacy-aware Shopping Scenario.
Kappes, Jörg H and Andres, Bjoern and Hamprecht, Fred A. and Schnörr, Christoph and Nowozin, Sebastian and Batra, Dhruv and Kim, Sungwoong and Kausler, Bernhard X and Lellmann, Jan and Komodakis, Nikos and Rother, Carsten
(2013)
A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problem.
Katz, Michael and Hoffmann, Jörg
(2013)
Red-Black Relaxed Plan Heuristics Reloaded.
Katz, Michael and Hoffmann, Jörg and Domshlak, Carmel
(2013)
Red-Black Relaxed Plan Heuristics.
Katz, Michael and Hoffmann, Jörg and Domshlak, Carmel
(2013)
Who Said We Need to Relax All Variables?
Kerber, Frederic and Lessel, Pascal and Mauderer, Michael and Daiber, Florian and Oulasvirta, Antti and Krüger, Antonio
(2013)
Is autostereoscopy useful for handheld AR?
Khalimov, Ayrat and Jacobs, Swen and Bloem, Roderick
(2013)
PARTY Parameterized Synthesis of Token Rings.
Khalimov, Ayrat and Jacobs, Swen and Bloem, Roderick
(2013)
Towards Efficient Parameterized Synthesis.
Kim, Dongsun and Tao, Yida and Kim, Sunghun and Zeller, Andreas
(2013)
Where Should We Fix This Bug? A Two-Phase Recommendation Model.
IEEE Transactions on Software Engineering, 39 (11).
pp. 1597-1610.
Kissmann, Peter and Hoffmann, Jörg
(2013)
What's in It for My BDD? On Causal Graphs and Variable Orders in Planning.
Kloos, Johannes and Majumdar, Rupak
(2013)
Supervisor Synthesis for Controller Upgrades.
Kloos, Johannes and Majumdar, Rupak and Niksic, Filip and Piskac, Ruzica
(2013)
Incremental Inductive Coverability.
Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De Bie, Tijl
(2013)
Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data.
Kovács, Máté and Seidl, Helmut and Finkbeiner, Bernd
(2013)
Relational abstract interpretation for the verification of 2-hypersafety properties.
Kremer, Steve and Künnemann, Robert and Steel, Graham
(2013)
Universally Composable Key-Management.
Krishnaswami, Neelakantan R. and Dreyer, Derek
(2013)
Internalizing Relational Parametricity in the Extensional Calculus of Constructions.
Krohn-Grimberghe, Artus and Sorge, Christoph
(2013)
Practical Aspects of the Bitcoin System.
Kupriyanov, Andrey and Finkbeiner, Bernd
(2013)
Causality-Based Verification of Multi-threaded Programs.
Leibenger, Dominik and Sorge, Christoph
(2013)
A Storage-Efficient Cryptography-Based Access Control Solution for Subversion.
Lekies, Sebastian and Stock, Ben and Johns, Martin
(2013)
25 Million Flows Later - Large-scale Detection of DOM-based XSS.
Levinkov, Evgeny and Fritz, Mario
(2013)
Sequential Bayesian Model Update under Structured Scene Prior for Semantic Road Scenes Labeling.
Löchtefeld, Markus and Hirtz, Christoph and Gehring, Sven
(2013)
Evaluation of hybrid front- and back-of-device interaction on mobile devices.
Löchtefeld, Markus and Krüger, Antonio
(2013)
Evaluation Of An In-Call Interaction Technique For Projector Phones.
Löchtefeld, Markus and Nurmi, Petteri and Michahelles, Florian and Magerkurth, Carsten and Floréen, Patrik and Krüger, Antonio
(2013)
PeTRE: workshop on pervasive technologies in retail environments.
Maffei, Matteo and Pecina, Kim and Reinert, Manuel
(2013)
Security and Privacy by Declarative Design.
Majumdar, Rupak and Meyer, Roland and Wang, Zilong
(2013)
Static Provenance Verification for Message Passing Programs.
Majumdar, Rupak and Saha, Indranil and Ueda, Koichi and Yazarel, Hakan
(2013)
Compositional Equivalence Checking for Models and Code of Control Systems.
Majumdar, Rupak and Wang, Zilong
(2013)
Expand, Enlarge, and Check for Branching Vector Addition Systems.
Malinowski, Mateusz and Fritz, Mario
(2013)
Learnable Pooling Regions for Image Classification.
CoRR, abs/13.
Malinowski, Mateusz and Fritz, Mario
(2013)
Learning Smooth Pooling Regions for Visual Recognition.
Mampaey, Michael and Vreeken, Jilles
(2013)
Summarizing Categorical Data by Clustering Attributes.
Data Mining and Knowledge Discovery, 26 (1).
pp. 130-173.
Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2013)
Detecting Deadlock in Programs with Data-Centric Synchronization.
Marmol, Felix Gomez and Sorge, Christoph and Petrlic, Ronald and Ugus, Osman and Westhoff, Dirk and Perez, Gregorio Martinez
(2013)
Privacy Enhanced Architecture for Smart Metering.
International Journal of Information Security, 12 (2).
pp. 67-82.
Marmol, Felix Gomez and Sorge, Christoph and Ugus, Osman and Perez, Gregorio Martinez
(2013)
WSANRep, WSAN Reputation-Based Selection in Open Environments.
Wireless Personal Communications, 68 (3).
pp. 921-937.
Marmol, Felix Gomez and Sorge, Christoph and Ugus, Osman and Perez, Gregorio Martinez and Hessler, Alban
(2013)
Smart Grid and Method for Operating a Smart Grid.
Marnau, Ninja and Jensen, Meiko and Schlehahn, Eva and Ferrer, Ricardo Morte and Hansen, Marit
(2013)
Cloud Computing – Data Protection Impact Assessment.
Technical Report.
UNSPECIFIED.
(Unpublished)
Mehlhorn, Kurt
(2013)
Physarum Computations.
Mehlhorn, Kurt and Neumann, Adrian and Schmidt, Jens M.
(2013)
Certifying 3-Edge-Connectivity.
Algorithmica, 8165.
358–369.
Mehlhorn, Kurt and Sagraloff, Michael and Wang, Pengming
(2013)
From approximate factorization to root isolation.
Mikeev, Linar and Neuhäußer, Martin R. and Spieler, David and Wolf, Verena
(2013)
On-the-fly verification and optimization of DTA-properties for large Markov chains.
Formal Methods in System Design, 43 (2).
pp. 313-337.
Nakashole, Ndapandula and Tylenda, Tomasz and Weikum, Gerhard
(2013)
Fine-grained Semantic Typing of Emerging Entities.
Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2013)
Discovering semantic relations from the web and organizing them with PATTY.
ACM SIGMOD Record, 42 (2).
pp. 29-34.
Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2013)
Dependent Type Theory for Verification of Information Flow and Access Control Policies.
ACM Transactions on Programming Languages and Systems, 35 (2).
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Keller, Fabian and Böhm, Klemens
(2013)
CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection.
Petrlic, Ronald and Sekula, Stephan
(2013)
Unlinkable content playbacks in a multiparty DRM system.
Petrlic, Ronald and Sekula, Stephan and Sorge, Christoph
(2013)
A privacy-friendly Architecture for future Cloud Computing.
International Journal of Grid and Utility Computing (IJGUC), 4 (4).
pp. 265-277.
Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013)
Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
Ramon, Jan and Miettinen, Pauli and Vreeken, Jilles
(2013)
Detecting Bicliques in GF[q].
Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013)
Towards realistic team formation in social networks based on densest subgraphs.
Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013)
Towards realistic team formation in social networks based on densest subgraphs.
Rauber, Thorsten and Kissmann, Peter and Hoffmann, Jörg
(2013)
Translating Single-Player GDL into PDDL.
Reischuk, Raphael M. and Schröder, Florian and Gehrke, Johannes
(2013)
DEMO: Secure and Customizable Web Development in the SAFE Activation Framework.
Richards, Gregor and Hammer, Christian and Nardelli, Francesco Zappa and Jagannathan, Suresh and Vitek, Jan
(2013)
Flexible Access Control for JavaScript.
Richter, Stefan and Dittrich, Jens and Schuh, Stefan and Frey, Tobias
(2013)
Mosquito: Another One Bites the Data Upload STream.
The Proceedings of the VLDB Endowment (PVLDB), 6 (12).
pp. 1274-1277.
Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2013)
Towards Zero-Overhead Static and Adaptive Indexing in Hadoop.
VLDB Journal, 23 (3).
pp. 469-494.
Riebler, Heinrich and Kenter, Tobias and Sorge, Christoph and Plessl, Christian
(2013)
FPGA-accelerated Key Search for Cold-Boot Attacks against AES.
Rigby, Michael and Krüger, Antonio and Winter, Stephan
(2013)
An opportunistic client user interface to support centralized ride share planning.
Rossberg, Andreas and Dreyer, Derek
(2013)
Mixin' Up the ML Module System.
ACM Trans. Program. Lang. Syst., 35 (1).
2:1–2:84.
Rossberg, Andreas and Dreyer, Derek
(2013)
Mixin' Up the ML Module System.
ACM Trans. Program. Lang. Syst., 35 (1).
2:1–2:84.
Rossow, Christian and Andriesse, Dennis and Werner, Tillmann and Stone-Gross, Brett and Plohmann, Daniel and Dietrich, Christian J. and Bos, Herbert
(2013)
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Identity-Based Steganography and Its Applications to Censorship Resistance.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
Rößler, Jeremias and Zeller, Andreas and Fraser, Gordon and Zamfir, Cristian and Candea, George
(2013)
Reconstructing Core Dumps.
Rückert, Markus and Schröder, Dominique
(2013)
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
IACR Cryptology ePrint Archive, 2013.
p. 20.
Schad, Jorg and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013)
Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets.
Schmidt, Jens M
(2013)
Contractions, Removals and How to Certify 3-Connectivity in Linear Time.
Schranz, Oliver
(2013)
A Developer-Centric Approach to Dynamic Permission System.
Bachelors thesis, Saarland University.
Schröder, Florian
(2013)
Generic Access Control for Extensible Web Applications within the SAFE Activation.
Masters thesis, Saarland University.
Schröder, Florian and Gehrke, Johannes and Reischuk, Raphael M.
(2013)
DEMO: Secure and Customizable Web Development in the SAFE Activation Framework.
Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2013)
The Uncracked Pieces in Database Cracking.
The Proceedings of the VLDB Endowment (PVLDB), 7 (2).
pp. 97-108.
Schuler, David and Zeller, Andreas
(2013)
Checked coverage: an indicator for oracle quality.
Software Testing, Verification and Reliability (STVR), 23 (7).
pp. 531-551.
Schuler, David and Zeller, Andreas
(2013)
Covering and Uncovering Equivalent Mutants.
Software Testing, Verification and Reliability (STVR), 23 (5).
pp. 353-374.
Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2013)
Mining behavior models from enterprise web applications.
Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2013)
CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency.
Journal of the ACM, 60 (3).
p. 22.
Slawski, Martin and Hein, Matthias and Lutsik, Pavlo
(2013)
Matrix factorization with binary components.
Sorge, Christoph
(2013)
Empirische Forschung im technischen Datenschutz: ein juristisches Problem?
Sorge, Christoph and Gruschka, Nils and Iacono, Luigi Lo
(2013)
Sicherheit in Kommunikationsnetzen.
Oldenbourg Verlag.
Sorge, Christoph and Krohn-Grimberghe, Artus
(2013)
Bitcoin - Das Zahlungsmittel der Zukunft?
Wirtschaftsdienst, 93 (10).
pp. 720-722.
Sorge, Christoph and Krohn-Grimberghe, Artus
(2013)
Die Zukunft des Bezahlens.
Zeitschrift für das gesamte Kreditwesen, 66 (14).
pp. 741-743.
Steinicke, Frank and Keefe, Daniel F. and Krüger, Antonio and de la Rivière, Jean-Baptiste and Benko, Hrvoje
(2013)
Foreword to the special section on touching the 3rd dimension.
Computers & Graphics, 37 (3).
A1–A2.
Stock, Ben
(2013)
Implementing low-level browser-based security functionality.
Masters thesis, UNSPECIFIED.
Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2013)
Sambamba: Runtime Adaptive Parallel Execution.
Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013)
Callee-site Rewriting of Sealed System Libraries.
In:
Engineering Secure Software and Systems.
Springer, pp. 33-41.
Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013)
Idea: Callee-Site Rewriting of Sealed System Libraries.
Taneva, Bilyana and Weikum, Gerhard
(2013)
Gem-based Entity-Knowledge Maintenance.
Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013)
Learning People Detectors for Tracking in Crowded Scenes.
Temple, William G. and Chen, Binbin and Tippenhauer, Nils Ole
(2013)
Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack.
Tetali, Sai Deep and Lesani, Mohsen and Majumdar, Rupak and Millstein, Todd
(2013)
MrCrypt: Static Analysis for Secure Cloud Computations.
Tippenhauer, Nils Ole and Malisa, Luka and Ranganathan, Aanjhan and Capkun, Srdjan
(2013)
On Limitations of Friendly Jamming for Confidentiality.
Turon, Aaron and Dreyer, Derek and Birkedal, Lars
(2013)
Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency.
Turon, Aaron and Thamsborg, Jacob and Ahmed, Amal and Birkedal, Lars and Dreyer, Derek
(2013)
Logical relations for fine-grained concurrency.
Vivanti, Mattia and Mis, Andre and Gorla, Alessandra and Fraser, Gordon
(2013)
Search-based data-flow test generation.
Wasinger, Rainer and Wallbank, James and Pizzato, Luiz Augusto Sangoi and Kay, Judy and Kummerfeld, Bob and Böhmer, Matthias and Krüger, Antonio
(2013)
Scrutable User Models and Personalised Item Recommendation in Mobile Lifestyle Applications.
Webb, Geoffrey and Vreeken, Jilles
(2013)
Efficient Discovery of the Most Interesting Associations.
Transactions on Knowledge Discovery from Data, 8 (3).
pp. 1-31.
Wei-Chen, Walon and Fritz, Mario
(2013)
Multi-class Video Co-segmentation with a Generative Multi-video Model.
Wieder, Alexander and Brandenburg, Björn B.
(2013)
Efficient partitioning of sporadic real-time tasks with shared resources and spin locks.
Wieder, Alexander and Brandenburg, Björn B.
(2013)
On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks.
Yan, Junjie and Zhang, Xucong and Lei, Zhen and Li, Stan Z
(2013)
Real-time High Performance Deformable Models for Face Detection in the Wild.
Yan, Junjie and Zhang, Xucong and Lei, Zhen and Liao, ShengCai and Li, Stan Z
(2013)
Robust Multi-resolution Pedestrian Detection in Traffic Scenes.
Yosef, Mohamed Amir and Bauer, Sandro and Hoffart, Johannes and Spaniol, Marc and Weikum, Gerhard
(2013)
HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text.
Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013)
Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1).
pp. 190-203.
Zamani, Majid and Esfahani, Peyman Mohajerin and Majumdar, Rupak and Abate, Alessandro and Lygeros, John
(2013)
Bisimilar finite abstractions of stochastic control systems.
Zengin, Mustafa and Vafeiadis, Viktor
(2013)
A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism.
Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013)
Peer-assisted Content Distribution in Akamai Netsession.
Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2013)
Mtac: a monad for typed tactic programming in Coq.
and J\"rn M\"ller-Quade, Nico D\"ttling
(2013)
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
and Thilo Mie and J\"rn M\"ller-Quade, Nico D\"ttling and Nilges, Tobias
(2013)
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
This list was generated on Tue Nov 12 18:35:41 2024 CET.