Items where Year is 2013

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 232.

UNSPECIFIED, ed.
(2013) Pattern Recognition - 35th German Conference, GCPR 2013, Saarbrücken, Germany, September 3-6, 2013. Proceedings.
Lecture Notes in Computer Science, 8142 . Springer.

Abel, Andreas and Reineke, Jan
(2013) Measurement-based modeling of the cache replacement policy.
In: 19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013.
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Afshani, Peyman and Agrawal, Manindra and Doerr, Benjamin and Doerr, Carola and Larsen, Kasper Green and Mehlhorn, Kurt
(2013) The Query Complexity of Finding a Hidden Permutation.
In: Space-Efficient Data Structures, Streams, and Algorithms.

Akoglu, Leman and Müller, Emmanuel and Vreeken, Jilles
(2013) Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD).
ACM Press, New York, NY, USA, pp. 1-57. ISBN 978-1-4503-2335-2

Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horn and Tatti, Nikolaj and Faloutsos, Christos
(2013) Mining Connection Pathways for Marked Nodes in Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013) Cartification: A Neighborhood Preserving Transformation for Mining High Dimensional Data.
In: 2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, December 7-10, 2013.
Conference: ICDM IEEE International Conference on Data Mining

Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013) Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2013) A Framework for the Verification of Certifying Computations.
Journal of Automated Reasoning. pp. 1-33.

Aminof, Benjamin and Jacobs, Swen and Khalimov, Ayrat and Rubin, Sasha
(2013) Parameterized Model Checking of Token-Passing Systems.
CoRR, abs/13.

An, Jisun and Quercia, Daniele and Cha, Meeyoung and Gummadi, Krishna P. and Crowcroft, Jon
(2013) Traditional media seen from social media.
In: Web Science 2013 (co-located with ECRC), WebSci '13, Paris, France, May 2-4, 2013.

Andalam, Sidharta and Girault, Alain and Sinha, Roopak and Roop, Partha S. and Reineke, Jan
(2013) Precise timing analysis for direct-mapped caches.
In: The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013.
Conference: DAC Design Automation Conf

Andriesse, Dennis and Rossow, Christian and Stone-Gross, Brett and Plohmann, Daniel and Bos, Herbert
(2013) Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus.
In: 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013.

Angius, Alessio and Horváth, András and Wolf, Verena
(2013) Approximate Transient Analysis of Queuing Networks by Quasi Product Forms.
In: Analytical and Stochastic Modelling Techniques and Applications - 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013. Proceedings.

Asghar, Muhammad Rizwan
(2013) Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
Doctoral thesis, University of Trento.

Asghar, Muhammad Rizwan and Ion, Mihaela and Russello, Giovanni and Crispo, Bruno
(2013) ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments.
Computers and Security, 35. pp. 2-24. ISSN 0167-4048

Asghar, Muhammad Rizwan and Miorandi, Daniele
(2013) A Holistic View of Security and Privacy Issues in Smart Grids.
In: UNSPECIFIED Lecture Notes in Computer Science, 7823 . Springer Berlin Heidelberg, pp. 58-71. ISBN 978-3-642-38029-7

Asghar, Muhammad Rizwan and Russello, Giovanni and Crispo, Bruno and Ion, Mihaela
(2013) Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases.
In: Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop.

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2013) Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Principles of Security and Trust 2013.

Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013) Introducing Accountability to Anonymity Networks.
CoRR, abs/13.

Backes, Michael and Datta, Amit and Kate, Aniket
(2013) Asynchronous Computational VSS with Reduced Communication Complexity.
In: Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013).

Backes, Michael and Doychev, Goran and Köpf, Boris
(2013) Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013) Privacy-Preserving Accountable Computation.
In: Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013) Verifiable Delegation of Computation on Outsourced Data.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Gagné, Martin and Skoruppa, Malte
(2013) Using Mobile Device Communication to Strengthen e-Voting Protocols.
In: Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013.

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Enforcing User Requirements on Android Apps.
In: Tools and Algorithms for the Construction and Analysis of Systems. Springer, pp. 545-550.

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
In: 8th International Workshop on Data Privacy Management (DPM'13).

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2013) Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations.
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo.

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework For Analyzing Anonymous Communication Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework for Analyzing Anonymous Communication Protocols.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).

Backes, Michael and Meiser, Sebastian
(2013) Differentially Private Smart Metering with Battery Recharging.
In: Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013).

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2013) Highly Controlled, Fine-grained Delegation of Signing Capabilities.
IACR Cryptology ePrint Archive, 2013. p. 408.

Baruah, Sanjoy and Brandenburg, Björn B.
(2013) Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities.
In: Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
Conference: RTSS Real Time Systems Symposium

Becchetti, Luca and Bonifaci, Vincenzo and Dirnberger, Michael and Karrenbauer, Andreas and Mehlhorn, Kurt
(2013) Physarum Can Compute Shortest Paths: Convergence Proofs and Complexity Bounds.
In: ICALP '13 - International Colloquium on Automata Languages and Programming.
Conference: ICALP International Colloquium on Automata Languages and Programming

Berg, Matthias
(2013) Formal Verification of Cryptographic Security Proofs.
Doctoral thesis, Saarland University.

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS'13).

Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013) Towards Efficient Traffic-analysis Resistant Anonymity Networks.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Bodden, Eric and Schneider, Markus and Kreutzer, Michael and Mezini, Mira and Hammer, Christian and Zeller, Andreas and Achenbach, Dirk and Huber, Matthias and Kraschewski, Daniel
(2013) Entwicklung sicherer Software durch Security by Design.
In: Entwicklung sicherer Software durch Security by Design : Trend- und Strategiebericht. Fraunhofer SIT.

Bohli, Jens-Matthias and Gruschka, Nils and Jensen, Meiko and Iacono, Luigi Lo and Marnau, Ninja
(2013) Security and Privacy Enhancing Multi-Cloud Architectures.
IEEE Transactions on Dependable and Secure Computing (TDSC), 10 (4).

Boonk, Martin and Petrlic, Ronald and Sorge, Christoph
(2013) POSTER: Save Our Passwords.
In: IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Brandenburg, Björn B.
(2013) A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications.
In: 25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Brandenburg, Björn B.
(2013) Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling.
In: 19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013.
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Brandenburg, Björn B.
(2013) An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2). p. 19.

Brandenburg, Björn B. and Anderson, James H.
(2013) The OMLP family of optimal multiprocessor real-time locking protocols.
Design Automation for Embedded Systems, 17 (2). pp. 277-342.

Bresson, Emmanuel and Catalano, Dario and Raimondo, Mario and Fiore, Dario and Gennaro, Rosario
(2013) Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
International Journal of Information Security, 12 (6). pp. 439-465.

Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2013) Advances in Mobile Security.
In: 8th Future Security - Security Research Conference.

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza
(2013) Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13).
Conference: USENIX-Security Usenix Security Symposium

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2013) Logical Foundations of Secure Resource Management.
In: Proc. of the 2nd Conference on Principles of Security and Trust (POST 2013).

Böhmer, Matthias and Ganev, Lyubomir and Krüger, Antonio
(2013) AppFunnel: a framework for usage-centric evaluation of recommender systems that suggest mobile applications.
In: 18th International Conference on Intelligent User Interfaces, IUI 2013, Santa Monica, CA, USA, March 19-22, 2013.
Conference: IUI International Conference on Intelligent User Interfaces

Böhmer, Matthias and Gehring, Sven and Hempel, Jonas and Krüger, Antonio
(2013) Revisiting phone call UIs for multipurpose mobile phones.
In: 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI '13, Munich, Germany, August 27 - 30, 2013.

Böhmer, Matthias and Krüger, Antonio
(2013) A study on icon arrangement by smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI International Conference on Human Factors in Computing Systems

Böhmer, Matthias and Lander, Christian and Krüger, Antonio
(2013) What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness.
In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013) Constrained fractional set programs and their application in local clustering and community detection.
In: Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013.
Conference: ICML International Conference on Machine Learning

Calin, Georgel and Derevenetc, Egor and Majumdar, Rupak and Meyer, Roland
(2013) A Theory of Partitioned Global Address Spaces.
In: Proc. of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013).

Carzaniga, Antonio and Gorla, Alessandra and Mattavelli, Andrea and Perino, Nicolò and Pezzè, Mauro
(2013) Automatic recovery from runtime failures.
In: 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013.

Catalano, Dario and Fiore, Dario
(2013) Practical Homomorphic MACs for Arithmetic Circuits.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Catalano, Dario and Fiore, Dario
(2013) Vector Commitments and Their Applications.
In: Proc. of the 16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013).

Catalano, Dario and Fiore, Dario and Gennaro, Rosario and Vamvourellis, Konstantinos
(2013) Algebraic (Trapdoor) One-Way Functions and Their Applications.
In: Proc. of the 10th Theory of Cryptography Conference (TCC 2013).

Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Faloutsos, Christos
(2013) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
ACM Press, New York, NY, USA, pp. 1-104. ISBN 978-1-4503-2329-1

Chen, Binbin and Kalbarczyk, Zbigniew and Nicol, David M. and Sanders, William H. and Tan, Rui and Temple, William G. and Tippenhauer, Nils Ole and Vu, An Hoa and Yau, David K.Y.
(2013) Go with the Flow: Toward Workflow-Oriented Security Assessment.
In: Proceedings of New Security Paradigm Workshop (NSPW).

Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013) SplitX: high-performance private analytics.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Cheong, Otfried and Mehlhorn, Kurt and Teillaud, Monique
(2013) Computational Geometry (Dagstuhl Seminar 13101).
Dagstuhl Reports, 3 (3). 1–23.

Chesñevar, Carlos Iván and González, María Paula and Grosse, Kathrin and Maguitman, Ana Gabriela
(2013) A First Approach to Mining Opinions as Multisets through Argumentation.
In: AT.

Chistikov, Dmitry and Majumdar, Rupak
(2013) A Uniformization Theorem for Nested Word to Word Transductions.
In: Proc. of the 18th International Conference on Implementation and Application of Automata (CIAA 2013).

Chowdhury, Soudip Roy and Imran, Muhammad and Asghar, Muhammad Rizwan and Amer-Yahia, Sihem and Castillo, Carlos
(2013) Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages.
In: The 10th International Conference on Information Systems for Crisis Response and Management (ISCRAM).

Cohen, Ernie and Paul, Wolfgang J. and Schmaltz, Sabine
(2013) Theory of Multi Core Hypervisor Verification.
In: Proc. 39th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2013).

Colley, Ashley and Häkkilä, Jonna and Schöning, Johannes and Daiber, Florian and Steinicke, Frank and Krüger, Antonio
(2013) Touch the 3rd Dimension! Understanding Stereoscopic 3D Touchscreen Interaction.
In: Computer-Human Interaction. Cognitive Effects of Spatial Interaction, Learning, and Ability - 25th Australian Computer-Human Interaction Conference, OzCHI 2013, Adelaide, SA, Australia, November 25-29, 2013. Revised and Extended Papers.

Cong, Gao and Dittrich, Jens
(2013) Front Matter.
PVLDB, 7 (2). i–ix.

Daiber, Florian and Kosmalla, Felix and Krüger, Antonio
(2013) BouldAR: using augmented reality to support collaborative boulder training.
In: 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, CHI '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts.
Conference: CHI International Conference on Human Factors in Computing Systems

Dallmeier, Valentin and Burger, Martin and Orth, Tobias and Zeller, Andreas
(2013) WebMate: Generating Test Cases for Web 2.0.
In: Proc. Software Quality Days 2013.

Darulova, Eva and Kuncak, Viktor and Majumdar, Rupak and Saha, Indranil
(2013) Synthesis of fixed-point programs.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2013).
Conference: EMSOFT ACM Conference on Embedded Software

Davi, Lucas Vincenzo and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2013) Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013).

Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013) CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis.
Computer Networks, 57 (2). 475–486.

Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013) Exploiting visual appearance to cluster and detect rogue software.
In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18-22, 2013.

Dimitrova, Rayna and Finkbeiner, Bernd
(2013) Lossy Channel Games under Incomplete Information.
In: Proceedings 1st International Workshop on Strategic Reasoning (SR'13).

Dittrich, Jens
(2013) Say No! No! and No!
In: CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings.
Conference: CIDR Conference on Innovative Data Systems Research

Dittrich, Jens and Richter, Stefan and Schuh, Stefan and Quiané-Ruiz, Jorge-Arnulfo
(2013) Efficient OR Hadoop: Why not both?
IEEE Data Eng. Bull., 36 (1). pp. 15-23.

Doychev, Goran and Feld, Dominik and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2013) CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
In: Proceedings of the 22nd USENIX Security Symposium (USENIX '13).
Conference: USENIX-Security Usenix Security Symposium

Du, Nan and Song, Le and Gomez-Rodriguez, Manuel and Zha, Hongyuan
(2013) Scalable Influence Estimation in Continuous-Time Diffusion Networks.
In: Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States..
Conference: NeurIPS Conference on Neural Information Processing Systems

Duan, Ran and Mehlhorn, Kurt
(2013) A Combinatorial Polynomial Algorithm for the Linear Arrow-Debreu Market.
In: International Colloquium on Automata, Languages and Programming (ICALP'13).
Conference: ICALP International Colloquium on Automata Languages and Programming

Döttling, Nico and Müller-Quade, Jörn
(2013) Lossy Codes and a New Variant of the Learning-With-Errors Problem.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Döttling, Nico and Nilges, Tobias and Mie, Thilo and Müller-Quade, Jörn
(2013) Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Ebert, Sandra and Schiele, Bernt
(2013) Where Next in Object Recognition and how much Supervision Do We Need?
In: Advances in Computer Vision and Pattern Recognition. Springer, pp. 35-64.

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proc. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013).

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Elbassioni, Khaled M. and Makino, Kazuhisa and Mehlhorn, Kurt and Ramezani, Fahimeh
(2013) On Randomized Fictitious Play for Approximating Saddle Points over Convex Sets.
In: COCOON.
Conference: COCOON International Conference on Computing and Combinatorics

Elmasry, Amr and Schmidt, Jens M. and Mehlhorn, Kurt
(2013) Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge.
Journal of Graph Theory, 72 (1). pp. 112-121.

Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2013) Parameterized verification of asynchronous shared-memory systems.
In: Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013).
Conference: CAV Computer Aided Verification

Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew
(2013) Hey, You, Get Off of My Clipboard.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 144-161. ISBN 978-3-642-39884-1
(Unpublished)

Finkbeiner, Bernd
(2013) Transforming Undecidable Synthesis Problems into Decidable Problems.
In: First International Workshop on Verification and Program Transformation, VPT 2013, Saint Petersburg, Russia, July 12-13, 2013.

Finkbeiner, Bernd and Rabe, Markus N. and Sánchez, César
(2013) A Temporal Logic for Hyperproperties.
CoRR, abs/13.

Finkbeiner, Bernd and Schewe, Sven
(2013) Bounded synthesis.
In: International Journal on Software Tools for Technology Transfer (STTT'13).

Finkbeiner, Bernd and Seidl, Helmut and Kovács, Máté
(2013) Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13).
Conference: CCS ACM Conference on Computer and Communications Security

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13).
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Fleischhacker, Nils and Günther, Felix and Kiefer, Franziskus and Manulis, Mark and Poettering, Bertram
(2013) Pseudorandom signatures.
In: Proc. of the 8th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2013).

Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2013) Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited.
IACR Cryptology ePrint Archive, 2013. p. 418.

Gagné, Martin and Lafourcade, Pascal and Lakhnech, Yassine
(2013) Automated Security Proofs for Almost-Universal Hash for MAC Verification.
In: Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013).

Gehring, Sven and Hartz, Elias and Löchtefeld, Markus and Krüger, Antonio
(2013) The media façade toolkit: prototyping and simulating interaction with media façades.
In: The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Gerling, Sebastian and Gerling, Rainer W.
(2013) Wie realistisch ist ein "Recht auf Vergessenwerden"?
Datenschutz und Datensicherheit, 37 (7). pp. 445-446.

Ghosh, Saptarshi and Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Sharma, Naveen Kumar and Ganguly, Niloy and Gummadi, Krishna P.
(2013) On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Gligoric, Milos and Majumdar, Rupak
(2013) Model Checking Database Applications.
In: Proc. of the 20th International Symposium on Static Analysis (SAS 2013).
Conference: SAS Static Analysis Symposium

Gomez-Rodriguez, Manuel and Leskovec, Jure and Schölkopf, Bernhard
(2013) Modeling Information Propagation with Survival Theory.
In: Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013.
Conference: ICML International Conference on Machine Learning

Gonthier, Georges and Ziliani, Beta and Nanevski, Aleksandar and Dreyer, Derek
(2013) How to make ad hoc proof automation less ad hoc.
J. Funct. Program., 23 (4). pp. 357-401.

Grimm, Niklas
(2013) Lime: A Framework for Data Lineage in the Malicious Environment.
Bachelors thesis, Saarland University.

Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2013) Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities.
In: 25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Gummadi, Krishna P.
(2013) Addressing the privacy management crisis in online social networks.
In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Hammer, Christian
(2013) Efficient Algorithms for Control Closures.
In: 1st International Workshop on Interference and Dependence.

Hein, Matthias and Setzer, Simon and Jost, Leonardo and Rangapuram, Syama Sundar
(2013) The Total Variation on Hypergraphs - Learning on Hypergraphs Revisited.
In: Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States..
Conference: NeurIPS Conference on Neural Information Processing Systems

Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013) Classifying code changes and predicting defects using changegenealogies.
Saarland University.

Herzig, Kim and Just, Sascha and Rau, Andreas and Zeller, Andreas
(2013) Predicting defects using change genealogies.
In: Proc. of the 24th International IEEE Symposium on Software Reliability Engineering (ISSRE 2013).
Conference: ISSRE International Symposium on Software Reliability Engineering

Herzig, Kim and Just, Sascha and Zeller, Andreas
(2013) It's not a bug, it's a feature: how misclassification impacts bug prediction.
In: Proc. of the 35th International Conference on Software Engineering (ICSE 2013).
Conference: ICSE International Conference on Software Engineering

Herzig, Kim and Zeller, Andreas
(2013) The impact of tangled code changes.
In: Proc. of the 10th Working Conference on Mining Software Repositories (MSR 2013).
Conference: MSR IEEE International Working Conference on Mining Software Repositories

Huang, Chien-Chung and Kavitha, Telikepalli and Mehlhorn, Kurt and Michail, Dimitrios
(2013) Fair Matchings and Related Problems.
In: FSTTCS'13 Conference on Foundations of Software Technology and Theoretical Computer Science.

Hur, Chung-Kil and Neis, Georg and Dreyer, Derek and Vafeiadis, Viktor
(2013) The power of parameterization in coinductive proof.
In: The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '13, Rome, Italy - January 23 - 25, 2013.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2013) A Theory of Name Boundedness.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR International Conference on Concurrency Theory

Jacobs, Swen and Kuncak, Viktor and Suter, Philippe
(2013) Reductions for Synthesis Procedures.
In: Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013, Rome, Italy, January 20-22, 2013. Proceedings.

Jamrozik, Konrad and Fraser, Gordon and Tillmann, Nikolai and Halleux, Jonathan De
(2013) Generating Test Suites with Augmented Dynamic Symbolic Execution.
In: Proc. of the 7th International Conference on Tests and Proofs (TAP 2013).

Janoch, Allison and Karayev, Sergey and Jia, Yangqing and Barron, Jonathan T. and Fritz, Mario and Saenko, Kate and Darrell, Trevor
(2013) A Category-Level 3D Object Dataset: Putting the Kinect to Work.
In: Consumer Depth Cameras for Computer Vision, Research Topics and Applications. UNSPECIFIED, pp. 141-165.

Jindal, Alekh and Palatinus, Endre and Pavlov, Vladimir and Dittrich, Jens
(2013) A Comparison of Knives for Bread Slicing.
The Proceedings of the VLDB Endowment (PVLDB), 6 (6). pp. 361-372.

Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) WWHow! Freeing Data Storage from Cages.
In: Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR).
Conference: CIDR Conference on Innovative Data Systems Research

Jindal, Alekh and Schuhknecht, Felix Martin and Dittrich, Jens and Khachatryan, Karen and Bunte, Alexander
(2013) How Achaeans Would Construct Columns in Troy.
In: CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings.

Johns, Martin and Lekies, Sebastian and Stock, Ben
(2013) Eradicating DNS Rebinding with the Extended Same-Origin Policy.
In: 22nd USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Joshi, Nakul and Petrlic, Ronald
(2013) Towards practical privacy-preserving Digital Rights Management for Cloud Computing.
In: Proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC 2013).

Jurkiewicz, Tomasz and Mehlhorn, Kurt
(2013) The cost of address translation.
In: ALENEX'13- Workshop on Algorithm Engineering and Experiments.
Conference: ALENEX Workshop on Algorithm Engineering and Experiments

Kahl, Gerrit and Paradowski, Denise
(2013) A Privacy-aware Shopping Scenario.
In: Proceedings of the Companion Publication of the 2013 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-13), March 19-22, Santa Monic.

Kappes, Jörg H and Andres, Bjoern and Hamprecht, Fred A. and Schnörr, Christoph and Nowozin, Sebastian and Batra, Dhruv and Kim, Sungwoong and Kausler, Bernhard X and Lellmann, Jan and Komodakis, Nikos and Rother, Carsten
(2013) A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problem.
In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

Katz, Michael and Hoffmann, Jörg
(2013) Red-Black Relaxed Plan Heuristics Reloaded.
In: Proceedings of the Sixth Annual Symposium on Combinatorial Search, SOCS 2013, Leavenworth, Washington, USA, July 11-13, 2013..

Katz, Michael and Hoffmann, Jörg and Domshlak, Carmel
(2013) Red-Black Relaxed Plan Heuristics.
In: Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, July 14-18, 2013, Bellevue, Washington, USA..
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Katz, Michael and Hoffmann, Jörg and Domshlak, Carmel
(2013) Who Said We Need to Relax All Variables?
In: Proceedings of the Twenty-Third International Conference on Automated Planning and Scheduling, ICAPS 2013, Rome, Italy, June 10-14, 2013.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Kerber, Frederic and Lessel, Pascal and Mauderer, Michael and Daiber, Florian and Oulasvirta, Antti and Krüger, Antonio
(2013) Is autostereoscopy useful for handheld AR?
In: 12th International Conference on Mobile and Ubiquitous Multimedia, MUM '13, Luleå, Sweden - December 02 - 05, 2013.

Khalimov, Ayrat and Jacobs, Swen and Bloem, Roderick
(2013) PARTY Parameterized Synthesis of Token Rings.
In: Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings.
Conference: CAV Computer Aided Verification

Khalimov, Ayrat and Jacobs, Swen and Bloem, Roderick
(2013) Towards Efficient Parameterized Synthesis.
In: Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013, Rome, Italy, January 20-22, 2013. Proceedings.

Kim, Dongsun and Tao, Yida and Kim, Sunghun and Zeller, Andreas
(2013) Where Should We Fix This Bug? A Two-Phase Recommendation Model.
IEEE Transactions on Software Engineering, 39 (11). pp. 1597-1610.

Kissmann, Peter and Hoffmann, Jörg
(2013) What's in It for My BDD? On Causal Graphs and Variable Orders in Planning.
In: Proceedings of the Twenty-Third International Conference on Automated Planning and Scheduling, ICAPS 2013, Rome, Italy, June 10-14, 2013.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Kloos, Johannes and Majumdar, Rupak
(2013) Supervisor Synthesis for Controller Upgrades.
In: Proc. of the Conference on Design, Automation and Test in Europe (DATE 2013).

Kloos, Johannes and Majumdar, Rupak and Niksic, Filip and Piskac, Ruzica
(2013) Incremental Inductive Coverability.
In: Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013).
Conference: CAV Computer Aided Verification

Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De Bie, Tijl
(2013) Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Kovács, Máté and Seidl, Helmut and Finkbeiner, Bernd
(2013) Relational abstract interpretation for the verification of 2-hypersafety properties.
In: Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2013).
Conference: CCS ACM Conference on Computer and Communications Security

Kremer, Steve and Künnemann, Robert and Steel, Graham
(2013) Universally Composable Key-Management.
In: European Symposium on Research in Computer Security.

Krishnaswami, Neelakantan R. and Dreyer, Derek
(2013) Internalizing Relational Parametricity in the Extensional Calculus of Constructions.
In: Computer Science Logic 2013 (CSL 2013), CSL 2013, September 2-5, 2013, Torino, Italy.

Krohn-Grimberghe, Artus and Sorge, Christoph
(2013) Practical Aspects of the Bitcoin System.
UNSPECIFIED
.

Kupriyanov, Andrey and Finkbeiner, Bernd
(2013) Causality-Based Verification of Multi-threaded Programs.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR International Conference on Concurrency Theory

Leibenger, Dominik and Sorge, Christoph
(2013) A Storage-Efficient Cryptography-Based Access Control Solution for Subversion.
In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT '13.

Lekies, Sebastian and Stock, Ben and Johns, Martin
(2013) 25 Million Flows Later - Large-scale Detection of DOM-based XSS.
In: 20th ACM Conference on Computer and Communications Security Berlin 4.11.2013.
Conference: CCS ACM Conference on Computer and Communications Security

Levinkov, Evgeny and Fritz, Mario
(2013) Sequential Bayesian Model Update under Structured Scene Prior for Semantic Road Scenes Labeling.
In: IEEE International Conference on Computer Vision, ICCV 2013, Sydney, Australia, December 1-8, 2013.
Conference: ICCV IEEE International Conference on Computer Vision

Löchtefeld, Markus and Hirtz, Christoph and Gehring, Sven
(2013) Evaluation of hybrid front- and back-of-device interaction on mobile devices.
In: MUM '13, 02 Dec - 05 Dec 2013, Luleå, Sweden.

Löchtefeld, Markus and Krüger, Antonio
(2013) Evaluation Of An In-Call Interaction Technique For Projector Phones.
In: 21st European Conference on Information Systems, ECIS 2013, Utrecht, The Netherlands, June 5-8, 2013.
Conference: ECIS European Conference on Information Systems

Löchtefeld, Markus and Nurmi, Petteri and Michahelles, Florian and Magerkurth, Carsten and Floréen, Patrik and Krüger, Antonio
(2013) PeTRE: workshop on pervasive technologies in retail environments.
In: The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013 - Adjunct Publication.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Maffei, Matteo and Pecina, Kim and Reinert, Manuel
(2013) Security and Privacy by Declarative Design.
In: Proceedings of the IEEE 26th Computer Security Foundations Symposium (CSF '16).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Majumdar, Rupak and Meyer, Roland and Wang, Zilong
(2013) Static Provenance Verification for Message Passing Programs.
In: Proc. of the 20th International Symposium on Static Analysis (SAS 2013).
Conference: SAS Static Analysis Symposium

Majumdar, Rupak and Saha, Indranil and Ueda, Koichi and Yazarel, Hakan
(2013) Compositional Equivalence Checking for Models and Code of Control Systems.
In: Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013).
Conference: CDC IEEE Conference on Decision and Control

Majumdar, Rupak and Wang, Zilong
(2013) Expand, Enlarge, and Check for Branching Vector Addition Systems.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR International Conference on Concurrency Theory

Malinowski, Mateusz and Fritz, Mario
(2013) Learnable Pooling Regions for Image Classification.
CoRR, abs/13.

Malinowski, Mateusz and Fritz, Mario
(2013) Learning Smooth Pooling Regions for Visual Recognition.
In: British Machine Vision Conference, BMVC 2013, Bristol, UK, September 9-13, 2013.

Mampaey, Michael and Vreeken, Jilles
(2013) Summarizing Categorical Data by Clustering Attributes.
Data Mining and Knowledge Discovery, 26 (1). pp. 130-173.

Marino, Daniel and Hammer, Christian and Dolby, Julian and Vaziri, Mandana and Tip, Frank and Vitek, Jan
(2013) Detecting Deadlock in Programs with Data-Centric Synchronization.
In: ICSE '13: Proceedings of the 35th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Marmol, Felix Gomez and Sorge, Christoph and Petrlic, Ronald and Ugus, Osman and Westhoff, Dirk and Perez, Gregorio Martinez
(2013) Privacy Enhanced Architecture for Smart Metering.
International Journal of Information Security, 12 (2). pp. 67-82.

Marmol, Felix Gomez and Sorge, Christoph and Ugus, Osman and Perez, Gregorio Martinez
(2013) WSANRep, WSAN Reputation-Based Selection in Open Environments.
Wireless Personal Communications, 68 (3). pp. 921-937.

Marmol, Felix Gomez and Sorge, Christoph and Ugus, Osman and Perez, Gregorio Martinez and Hessler, Alban
(2013) Smart Grid and Method for Operating a Smart Grid.
UNSPECIFIED
.

Marnau, Ninja and Jensen, Meiko and Schlehahn, Eva and Ferrer, Ricardo Morte and Hansen, Marit
(2013) Cloud Computing – Data Protection Impact Assessment.
Technical Report. UNSPECIFIED.
(Unpublished)

Mehlhorn, Kurt
(2013) Physarum Computations.
In: STACS.
Conference: STACS International Symposium on Theoretical Aspects of Computer Science

Mehlhorn, Kurt and Neumann, Adrian and Schmidt, Jens M.
(2013) Certifying 3-Edge-Connectivity.
Algorithmica, 8165. 358–369.

Mehlhorn, Kurt and Sagraloff, Michael and Wang, Pengming
(2013) From approximate factorization to root isolation.
In: ISSAC.
Conference: ISSAC International Symposium on Symbolic and Algebraic Computation

Mikeev, Linar and Neuhäußer, Martin R. and Spieler, David and Wolf, Verena
(2013) On-the-fly verification and optimization of DTA-properties for large Markov chains.
Formal Methods in System Design, 43 (2). pp. 313-337.

Nakashole, Ndapandula and Tylenda, Tomasz and Weikum, Gerhard
(2013) Fine-grained Semantic Typing of Emerging Entities.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL Association of Computational Linguistics

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2013) Discovering semantic relations from the web and organizing them with PATTY.
ACM SIGMOD Record, 42 (2). pp. 29-34.

Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2013) Dependent Type Theory for Verification of Information Flow and Access Control Policies.
ACM Transactions on Programming Languages and Systems, 35 (2).

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Keller, Fabian and Böhm, Klemens
(2013) CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Petrlic, Ronald and Sekula, Stephan
(2013) Unlinkable content playbacks in a multiparty DRM system.
In: Data and Applications Security and Privacy XXVII.

Petrlic, Ronald and Sekula, Stephan and Sorge, Christoph
(2013) A privacy-friendly Architecture for future Cloud Computing.
International Journal of Grid and Utility Computing (IJGUC), 4 (4). pp. 265-277.

Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013) Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Ramon, Jan and Miettinen, Pauli and Vreeken, Jilles
(2013) Detecting Bicliques in GF[q].
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013) Towards realistic team formation in social networks based on densest subgraphs.
In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013) Towards realistic team formation in social networks based on densest subgraphs.
In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Rauber, Thorsten and Kissmann, Peter and Hoffmann, Jörg
(2013) Translating Single-Player GDL into PDDL.
In: KI 2013: Advances in Artificial Intelligence - 36th Annual German Conference on AI, Koblenz, Germany, September 16-20, 2013. Proceedings.

Reischuk, Raphael M. and Schröder, Florian and Gehrke, Johannes
(2013) DEMO: Secure and Customizable Web Development in the SAFE Activation Framework.
In: CCS~'13: Proceedings of the 20th ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Richards, Gregor and Hammer, Christian and Nardelli, Francesco Zappa and Jagannathan, Suresh and Vitek, Jan
(2013) Flexible Access Control for JavaScript.
In: Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages and applications.
Conference: OOPSLA ACM Conference on Object Oriented Programming Systems Languages and Applications

Richter, Stefan and Dittrich, Jens and Schuh, Stefan and Frey, Tobias
(2013) Mosquito: Another One Bites the Data Upload STream.
The Proceedings of the VLDB Endowment (PVLDB), 6 (12). pp. 1274-1277.

Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2013) Towards Zero-Overhead Static and Adaptive Indexing in Hadoop.
VLDB Journal, 23 (3). pp. 469-494.

Riebler, Heinrich and Kenter, Tobias and Sorge, Christoph and Plessl, Christian
(2013) FPGA-accelerated Key Search for Cold-Boot Attacks against AES.
In: Proceedings of the 2013 International Conference on Field-Programmable Technology, FPT 2013, Kyoto, Japan, December 9-11, 2013.

Rigby, Michael and Krüger, Antonio and Winter, Stephan
(2013) An opportunistic client user interface to support centralized ride share planning.
In: 21st SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2013, Orlando, FL, USA, November 5-8, 2013.
Conference: SIGSPATIAL ACM International Conference on Advances in Geographic Information Systems

Rossberg, Andreas and Dreyer, Derek
(2013) Mixin' Up the ML Module System.
ACM Trans. Program. Lang. Syst., 35 (1). 2:1–2:84.

Rossberg, Andreas and Dreyer, Derek
(2013) Mixin' Up the ML Module System.
ACM Trans. Program. Lang. Syst., 35 (1). 2:1–2:84.

Rossow, Christian and Andriesse, Dennis and Werner, Tillmann and Stone-Gross, Brett and Plohmann, Daniel and Dietrich, Christian J. and Bos, Herbert
(2013) SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013.
Conference: SP IEEE Symposium on Security and Privacy

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Identity-Based Steganography and Its Applications to Censorship Resistance.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013).

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
In: Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13).
Conference: CCS ACM Conference on Computer and Communications Security

Rößler, Jeremias and Zeller, Andreas and Fraser, Gordon and Zamfir, Cristian and Candea, George
(2013) Reconstructing Core Dumps.
In: Proc. of the Sixth International IEEE Conference on Software Testing, Verification and Validation (ICST 2013).
Conference: ICST International Conference on Software Testing, Verification and Validation

Rückert, Markus and Schröder, Dominique
(2013) Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
IACR Cryptology ePrint Archive, 2013. p. 20.

Schad, Jorg and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets.
In: Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD).

Schmidt, Jens M
(2013) Contractions, Removals and How to Certify 3-Connectivity in Linear Time.
In: SIAM Journal on Computing.

Schranz, Oliver
(2013) A Developer-Centric Approach to Dynamic Permission System.
Bachelors thesis, Saarland University.

Schröder, Florian
(2013) Generic Access Control for Extensible Web Applications within the SAFE Activation.
Masters thesis, Saarland University.

Schröder, Florian and Gehrke, Johannes and Reischuk, Raphael M.
(2013) DEMO: Secure and Customizable Web Development in the SAFE Activation Framework.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13).
Conference: CCS ACM Conference on Computer and Communications Security

Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2013) The Uncracked Pieces in Database Cracking.
The Proceedings of the VLDB Endowment (PVLDB), 7 (2). pp. 97-108.

Schuler, David and Zeller, Andreas
(2013) Checked coverage: an indicator for oracle quality.
Software Testing, Verification and Reliability (STVR), 23 (7). pp. 531-551.

Schuler, David and Zeller, Andreas
(2013) Covering and Uncovering Equivalent Mutants.
Software Testing, Verification and Reliability (STVR), 23 (5). pp. 353-374.

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2013) Mining behavior models from enterprise web applications.
In: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2013) CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency.
Journal of the ACM, 60 (3). p. 22.

Slawski, Martin and Hein, Matthias and Lutsik, Pavlo
(2013) Matrix factorization with binary components.
In: Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States..
Conference: NeurIPS Conference on Neural Information Processing Systems

Sorge, Christoph
(2013) Empirische Forschung im technischen Datenschutz: ein juristisches Problem?
In: Abstraktion und Applikation: Tagungsband des 16. Internationalen Rechtsinformatik Symposions / Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium.

Sorge, Christoph and Gruschka, Nils and Iacono, Luigi Lo
(2013) Sicherheit in Kommunikationsnetzen.
Oldenbourg Verlag.

Sorge, Christoph and Krohn-Grimberghe, Artus
(2013) Bitcoin - Das Zahlungsmittel der Zukunft?
Wirtschaftsdienst, 93 (10). pp. 720-722.

Sorge, Christoph and Krohn-Grimberghe, Artus
(2013) Die Zukunft des Bezahlens.
Zeitschrift für das gesamte Kreditwesen, 66 (14). pp. 741-743.

Steinicke, Frank and Keefe, Daniel F. and Krüger, Antonio and de la Rivière, Jean-Baptiste and Benko, Hrvoje
(2013) Foreword to the special section on touching the 3rd dimension.
Computers & Graphics, 37 (3). A1–A2.

Stock, Ben
(2013) Implementing low-level browser-based security functionality.
Masters thesis, UNSPECIFIED.

Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2013) Sambamba: Runtime Adaptive Parallel Execution.
In: Proceedings of the 3rd International Workshop on Adaptive Self-Tuning Computing Systems.

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Callee-site Rewriting of Sealed System Libraries.
In: Engineering Secure Software and Systems. Springer, pp. 33-41.

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Idea: Callee-Site Rewriting of Sealed System Libraries.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'13).

Taneva, Bilyana and Weikum, Gerhard
(2013) Gem-based Entity-Knowledge Maintenance.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013) Learning People Detectors for Tracking in Crowded Scenes.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Temple, William G. and Chen, Binbin and Tippenhauer, Nils Ole
(2013) Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack.
In: Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm).

Tetali, Sai Deep and Lesani, Mohsen and Majumdar, Rupak and Millstein, Todd
(2013) MrCrypt: Static Analysis for Secure Cloud Computations.
In: Proc. of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2013).
Conference: OOPSLA ACM Conference on Object Oriented Programming Systems Languages and Applications

Tippenhauer, Nils Ole and Malisa, Luka and Ranganathan, Aanjhan and Capkun, Srdjan
(2013) On Limitations of Friendly Jamming for Confidentiality.
In: Proceedings of the IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Turon, Aaron and Dreyer, Derek and Birkedal, Lars
(2013) Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency.
In: ACM SIGPLAN International Conference on Functional Programming, ICFP'13, Boston, MA, USA - September 25 - 27, 2013.
Conference: ICFP International Conference on Functional Programming

Turon, Aaron and Thamsborg, Jacob and Ahmed, Amal and Birkedal, Lars and Dreyer, Derek
(2013) Logical relations for fine-grained concurrency.
In: The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '13, Rome, Italy - January 23 - 25, 2013.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Vivanti, Mattia and Mis, Andre and Gorla, Alessandra and Fraser, Gordon
(2013) Search-based data-flow test generation.
In: IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013.

Wasinger, Rainer and Wallbank, James and Pizzato, Luiz Augusto Sangoi and Kay, Judy and Kummerfeld, Bob and Böhmer, Matthias and Krüger, Antonio
(2013) Scrutable User Models and Personalised Item Recommendation in Mobile Lifestyle Applications.
In: User Modeling, Adaptation, and Personalization - 21th International Conference, UMAP 2013, Rome, Italy, June 10-14, 2013, Proceedings.

Webb, Geoffrey and Vreeken, Jilles
(2013) Efficient Discovery of the Most Interesting Associations.
Transactions on Knowledge Discovery from Data, 8 (3). pp. 1-31.

Wei-Chen, Walon and Fritz, Mario
(2013) Multi-class Video Co-segmentation with a Generative Multi-video Model.
In: 2013 IEEE Conference on Computer Vision and Pattern Recognition, Portland, OR, USA, June 23-28, 2013.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wieder, Alexander and Brandenburg, Björn B.
(2013) Efficient partitioning of sporadic real-time tasks with shared resources and spin locks.
In: 8th IEEE International Symposium on Industrial Embedded Systems, SIES 2013, Porto, Portugal, June 19-21, 2013.

Wieder, Alexander and Brandenburg, Björn B.
(2013) On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks.
In: Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
Conference: RTSS Real Time Systems Symposium

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Li, Stan Z
(2013) Real-time High Performance Deformable Models for Face Detection in the Wild.
In: Proceedings of the IAPR International Conference on Biometrics (ICB).

Yan, Junjie and Zhang, Xucong and Lei, Zhen and Liao, ShengCai and Li, Stan Z
(2013) Robust Multi-resolution Pedestrian Detection in Traffic Scenes.
In: IEEE Conference Computer Vision and Pattern Recognition (CVPR).

Yosef, Mohamed Amir and Bauer, Sandro and Hoffart, Johannes and Spaniol, Marc and Weikum, Gerhard
(2013) HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL Association of Computational Linguistics

Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013) Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1). pp. 190-203.

Zamani, Majid and Esfahani, Peyman Mohajerin and Majumdar, Rupak and Abate, Alessandro and Lygeros, John
(2013) Bisimilar finite abstractions of stochastic control systems.
In: Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013).
Conference: CDC IEEE Conference on Decision and Control

Zengin, Mustafa and Vafeiadis, Viktor
(2013) A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism.
In: Seventh International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, 1-3 July 2013, Birmingham, UK.

Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013) Peer-assisted Content Distribution in Akamai Netsession.
In: Proc. of the 2013 Internet Measurement Conference (IMC'13).
Conference: IMC Internet Measurement Conference

Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2013) Mtac: a monad for typed tactic programming in Coq.
In: Proc of the 18th ACM SIGPLAN International Conference on Functional Programming (ICFP '13).
Conference: ICFP International Conference on Functional Programming

and J\"rn M\"ller-Quade, Nico D\"ttling
(2013) Lossy Codes and a New Variant of the Learning-With-Errors Problem.
In: EUROCRYPT.

and Thilo Mie and J\"rn M\"ller-Quade, Nico D\"ttling and Nilges, Tobias
(2013) Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
In: TCC.

This list was generated on Tue Nov 12 18:35:41 2024 CET.