Items where Year is 2014

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 285.

UNSPECIFIED, ed.
(2014) Proceedings Second Workshop on Synthesis, SYNT 2013, Saint Petersburg, Russia, July 13th and July 14th, 2013.
EPTCS, 142 . UNSPECIFIED.

UNSPECIFIED, ed.
(2014) Proceedings of the 2nd International Workshop on Eye Tracking for Spatial Research co-located with the 8th International Conference on Geographic Information Science, ET4S@GIScience 2014, Vienna, Austria, September 23, 2014.
CEUR Workshop Proceedings, 1241 . CEUR-WS.org.

UNSPECIFIED, ed.
(2014) Trustworthy Global Computing - 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers.
Lecture Notes in Computer Science, 8902 . Springer.

Abel, Andreas and Reineke, Jan
(2014) Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation.
In: 2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014.

Abel, Andreas and Reineke, Jan
(2014) Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation.
In: 2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3). pp. 49-54.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave new world: privacy risks for mobile users.
In: Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014.

Aditya, Paarijaat and Erdelyi, Viktor and Lentz, Matthew and Shi, Elaine and Bhattacharjee, Bobby and Druschel, Peter
(2014) EnCore: Private, Context-based Communication for Mobile Social Apps.
In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services.

Alvarez, Victor and Schuhknecht, Felix Martin and Dittrich, Jens and Richter, Stefan
(2014) Main Memory Adaptive Indexing for Multi-core Systems.
In: Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN).

Alvin, Chris and Gulwani, Sumit and Majumdar, Rupak and Mukhopadhyay, Supratik
(2014) Synthesis of Geometry Proof Problems.
In: Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, July 27 -31, 2014, Québec City, Québec, Canada..
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Alvin, Christopher and Gulwani, Sumit and Mukhopadhyay, Supratik and Majumdar, Rupak
(2014) Synthesis of Geometry Proof Problems.
In: Proc. of the 28th Conference of Artificial Intelligence (AAAI 2014).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Aminof, Benjamin and Jacobs, Swen and Khalimov, Ayrat and Rubin, Sasha
(2014) Parameterized Model Checking of Token-Passing Systems.
In: Verification, Model Checking, and Abstract Interpretation - 15th International Conference, VMCAI 2014, San Diego, CA, USA, January 19-21, 2014, Proceedings.

Andriluka, Mykhaylo and Pishchulin, Leonid and Gehler, Peter and Schiele, Bernt
(2014) 2D Human Pose Estimation: New Benchmark and State of the Art Analysis.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2014).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014) Optimizing Planning Domains by Automatic Action Schema Splitting.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014) PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security.

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Interaction Model to Predict Subjective-Specificity of Search Results.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Supporting Exploratory Search Through User Modelling.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).

Atukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Narrow or Broad? Estimating Subjective Specificity in Exploratory Search.
In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Axer, Philip and Ernst, Rolf and Falk, Heiko and Girault, Alain and Grund, Daniel and Guan, Nan and Jonsson, Bengt and Marwedel, Peter and Reineke, Jan and Rochange, Christine and Sebastian, Maurice and Hanxleden, Reinhard von and Wilhelm, Reinhard and Yi, Wang
(2014) Building timing predictable embedded systems.
ACM Transactions on Embedded Computing Systems, 13 (4). p. 82.

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014) Scippa: System-Centric IPC Provenance on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014) Android Security Framework: Extensible Multi-Layered Access Control on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.

Backes, Michael and Dagdelen, Özgür and Fischlin, Marc and Gajek, Sebastian and Meiser, Sebastian and Schröder, Dominique
(2014) Operational Signature Schemes.
IACR Cryptology ePrint Archive, 2014. p. 820.

Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014) WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014).

Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014) X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
In: 29th ACM Symposium on Applied Computing (SAC 2014).

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014) Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2). pp. 301-353.

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Manoharan, Praveen and Mohammadi, Esfandiar
(2014) TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
In: Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2014) Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
In: Proceedings of the 3rd Conference on Principles of Security and Trust (POST).

Backes, Michael and Nürnberger, Stefan
(2014) Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Baumer, Eric P. S. and Ahn, June and Bie, Mei and Bonsignore, Elizabeth M. and Börütecene, Ahmet and Buruk, Oguz Turan and Clegg, Tamara L. and Druin, Allison and Echtler, Florian and Gruen, Dan and Guha, Mona Leigh and Hordatt, Chelsea and Krüger, Antonio and Maidenbaum, Shachar and Malu, Meethu and McNally, Brenna and Muller, Michael and Norooz, Leyla and Norton, Juliet and Özcan, Oguzhan and Patterson, Donald J. and Riener, Andreas and Ross, Steven I. and Rust, Karen and Schöning, Johannes and Silberman, M. Six and Tomlinson, Bill and Yip, Jason C.
(2014) CHI 2039: speculative research visions.
In: CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014, Extended Abstracts.
Conference: CHI International Conference on Human Factors in Computing Systems

Belagiannis, Vasileios and Amin, Sikandar and Andriluka, Mykhaylo and Schiele, Bernt and Navab, Nassir and Ilic, Slobodan
(2014) 3D Pictorial Structures for Multiple Human Pose Estimation.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2014).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharya, Parantapa and Ghosh, Saptarshi and Kulshrestha, Juhi and Mondal, Mainack and Zafar, Muhammad Bilal and Ganguly, Niloy and Gummadi, Krishna P.
(2014) Deep Twitter diving: exploring topical groups in microblogs at scale.
In: Proc. of the Computer Supported Cooperative Work (CSCW '14).
Conference: CSCW ACM Conference on Computer Supported Cooperative Work

Bhattacharya, Parantapa and Zafar, Muhammad Bilal and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2014) Inferring user interests in the Twitter social network.
In: Proc. of the 8th ACM Conference on Recommender Systems (RecSys '14).

Bhattacharya, Sayan and Chalermsook, Parinya and Mehlhorn, Kurt and Neumann, Adrian
(2014) New Approximability Results for the Robust k-Median Problem.
In: 14th Scandinavian Symposium and Workshops, SWAT 2014.

Bichhawat, Abhishek
(2014) Exception Handling for Dynamic Information Flow Control.
In: Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition).

Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014) Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.
In: Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security.

Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014) Information Flow Control in WebKit's JavaScript Bytecode.
In: Principles of Security and Trust. Springer.

Biega, Joanna Asia and Mele, Ida and Weikum, Gerhard
(2014) Probabilistic Prediction of Privacy Risks in User Search Histories.
In: Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14).

Bird, Christian and Ranganath, Venkatesh-Prasad and Zimmermann, Thomas and Nagappan, Nachiappan and Zeller, Andreas
(2014) Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines.
In: Companion Proceedings of the 36th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Bloem, Roderick and Ehlers, Rüdiger and Jacobs, Swen and Könighofer, Robert
(2014) How to Handle Assumptions in Synthesis.
In: Proceedings 3rd Workshop on Synthesis, SYNT 2014, Vienna, Austria, July 23-24, 2014..

Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat
(2014) Parameterized Synthesis Case Study: AMBA AHB.
In: Proceedings 3rd Workshop on Synthesis, SYNT 2014, Vienna, Austria, July 23-24, 2014..

Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat
(2014) Parameterized Synthesis Case Study: AMBA AHB.
CoRR, abs/14.

Blond, Stevens Le and Uritesc, Adina and Gilbert, Cedric and Chua, Zheng Leong and Saxena, Prateek and Kirda, Engin
(2014) A Look at Targeted Attacks Through the Lense of an NGO.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Borges, Georg
(2014) Cloud Computing und Datenschutz.
Datenschutz und Datensicherheit, 38 (3). 165–169.

Brachmann, Niklas
(2014) Evaluating the Effectiveness of In-app DRM Systems for Android.
Bachelors thesis, Saarland University.

Brandenburg, Björn B.
(2014) Blocking Optimality in Distributed Real-Time Locking Protocols.
LITES, 1 (2). 01: 1-01: 22.

Brandenburg, Björn B.
(2014) The FMLP+: An Asymptotically Optimal Real-Time Locking Protocol for Suspension-Aware Analysis.
In: 26th Euromicro Conference on Real-Time Systems, ECRTS 2014, Madrid, Spain, July 8-11, 2014.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Brandenburg, Björn B.
(2014) A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-Criticality Systems.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Brangewitz, Sonja and Jungmann, Alexander and Petrlic, Ronald and Platenius, Marie Christin
(2014) Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.
In: Proceedings of The Sixth International Conferences on Advanced Service Computing.

Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014) A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3). pp. 1-33.

Butz, Andreas and Krüger, Antonio
(2014) Mensch-Maschine-Interaktion.
Oldenbourg.

Böhmer, Matthias and Krüger, Antonio
(2014) A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers.
International Journal of Mobile Human Computer Interaction (IJMHCI), 6 (2). pp. 32-45.

Böhmer, Matthias and Lander, Christian and Gehring, Sven and Burmby, Duncon P and Krüger, Antonio
(2014) Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI International Conference on Human Factors in Computing Systems

Carzaniga, Antonio and Goffi, Alberto and Gorla, Alessandra and Mattavelli, Andrea and Pezzè, Mauro
(2014) Cross-checking oracles from intrinsic software redundancy.
In: 36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014.

Cerqueira, Felipe and Gujarati, Arpan and Brandenburg, Björn B.
(2014) Linux's Processor Affinity API, Refined: Shifting Real-Time Tasks Towards Higher Schedulability.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Cerqueira, Felipe and Vanga, Manohar and Brandenburg, Björn B.
(2014) Scaling global scheduling with message passing.
In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2014).
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Chatterjee, Krishnendu and Ibsen-Jensen, Rasmus and Majumdar, Rupak
(2014) Edit Distance for Timed Automata.
In: Proc. of the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014).

Chau, Duen Horng and Vreeken, Jilles and Matthijs, van Leeuwen and Faloutsos, Christos
(2014) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-130.

Chistikov, Dmitry and Majumdar, Rupak
(2014) Unary Pushdown Automata and Straight-Line Programs.
In: Proc. of the 41st International Colloquium on Automata, Languages and Programming (ICALP 2014).
Conference: ICALP International Colloquium on Automata Languages and Programming

Choi, Seung Geol and Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady and Zhou, Hong-Sheng
(2014) (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
Conference: TCC Theory of Cryptography Conference

Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proc. 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Christodoulou, Giorgos and Mehlhorn, Kurt and Pyrga, Evangelia
(2014) Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms.
Algorithmica, 69 (3). 619–640.

Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, Kristopher K. and Rabe, Markus N. and Sanchez, Cesar
(2014) Temporal Logics for Hyperproperties.
In: Proc. of the 3rd Conference on Principles of Security and Trust (POST 2014).

Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, Kristopher K. and Rabe, Markus N. and Sánchez, César
(2014) Temporal Logics for Hyperproperties.
CoRR, abs/14.

Corro, Luciano Del and Gemulla, Rainer and Weikum, Gerhard
(2014) Werdy: Recognition and Disambiguation of Verbs and Verb Phrases with Syntactic and Semantic Pruning.
In: Proc. of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP 2014).
Conference: EMNLP Empirical Methods in Natural Language Processing

Dachman-Soled, Dana and Fleischhacker, Nils and Katz, Jonathan and Lysyanskaya, Anna and Schröder, Dominique
(2014) Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
In: Proceedings of the 34th International Cryptology Conference (Crypto '14).
Conference: CRYPTO Advances in Cryptology

Daiber, Florian and Speicher, Marco and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2014) Interacting with 3D Content on Stereoscopic Displays.
In: Proceedings of the International Symposium on Pervasive Displays (PerDis).

Dallmeier, Valentin and Pohl, Bernd and Burger, Martin and Mirold, Michael and Zeller, Andreas
(2014) WebMate: Web Application Test Generation in the Real World.
In: Proc. of the Seventh International IEEE Conference on Software Testing, Verification and Validation Workshops(ICSTW 2014).

Damm, Werner and Finkbeiner, Bernd
(2014) Automatic Compositional Synthesis of Distributed Systems.
In: Proceedings of the 19th International Symposium on Formal Methods (FM'14).

Danilewski, Piotr and Köster, Marcel and Leißa, Roland and Membarth, Richard and Slusallek, Philipp
(2014) Specialization through dynamic staging.
In: GPCE 2014 Proceedings of the 2014 International Conference on Generative Programming: Concepts and Experiences, Vasteras, Sweden, September 15-16, 2014.

Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Davidovic, Tomás and Krivánek, Jaroslav and Hasan, Milos and Slusallek, Philipp
(2014) Progressive Light Transport Simulation on the GPU: Survey and Improvements.
ACM Trans. Graph., 33 (3). 29:1–29:19.

Derr, Erik
(2014) Verifying the Internet Access of Android Applications.
Masters thesis, Saarland University.

Dietrich, Aljoscha
(2014) Rechtliche und technische Aspekte des Datenschutzes bei intelligenten Messsystemen (Smart Metern).
Masters thesis, UNSPECIFIED.

Dietzfelbinger, Martin and Mehlhorn, Kurt and Sanders, Peter
(2014) Algorithmen und Datenstrukturen - die Grundwerkzeuge.
eXamen.press . Springer.

Dimitrova, Rayna and Majumdar, Rupak
(2014) Deductive control synthesis for alternating-time logics.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2014).
Conference: EMSOFT ACM Conference on Embedded Software

Dittrich, Jens
(2014) Die Umgedrehte Vorlesung - Chancen für die Informatiklehre.
Datenbank-Spektrum, 14 (1). 69–76.

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014) On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
In: 30th Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptology ePrint Archive, 2014. p. 482.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
In: Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS.

Endner-Dühr, Frederic
(2014) Application-level Firewall in Stock Android.
Bachelors thesis, Saarland University.

Ernst, Patrick and Meng, Cynthia and Siu, Amy and Weikum, Gerhard
(2014) KnowLife: a Knowledge Graph for Health and Life Sciences.
In: Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14).
Conference: ICDE International Conference on Data Engineering

Esmaeilsabzali, Shahram and Majumdar, Rupak and Wies, Thomas and Zufferey, Damien
(2014) Dynamic package interfaces.
In: Proc. of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014).

Esparza, Javier and Ledesma-Garza, Ruslán and Majumdar, Rupak and Meyer, Philipp J. and Niksic, Filip
(2014) An SMT-Based Approach to Coverability Analysis.
In: Computer Aided Verification - 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 18-22, 2014. Proceedings.
Conference: CAV Computer Aided Verification

Esparza, Javier and Ledesma-Garza, Ruslán and Majumdar, Rupak and Meyer, Philipp J. and Niksic, Filip
(2014) An SMT-based Approach to Coverability Analysis.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew
(2014) Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014.

Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew
(2014) Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014.

Farajtabar, Mehrdad and Du, Nan and Gomez-Rodriguez, Manuel and Valera, Isabel and Zha, Hongyuan and Song, Le
(2014) Shaping Social Activity by Incentivizing Users.
In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014) Improved Features for Runtime Prediction of Domain-Independent Planners.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Faymonville, Peter and Finkbeiner, Bernd and Peled, Doron
(2014) Monitoring Parametric Temporal Logic.
In: Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'14).

Figueiredo, Flavio and Almeida, Jussara M. and Benevenuto, Fabricio and Gummadi, Krishna P.
(2014) Does content determine information popularity in social media?: a case study of youtube videos' content and their popularity.
In: CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014.
Conference: CHI International Conference on Human Factors in Computing Systems

Finkbeiner, Bernd and Olderog, Ernst-Rüdiger
(2014) Petri Games: Synthesis of Distributed Systems with Causal Memory.
In: Proceedings of Fifth International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2014).

Finkbeiner, Bernd and Rabe, Markus N.
(2014) The linear-hyper-branching spectrum of temporal logics.
it - Information Technology, 56 (6). 273–279.

Finkbeiner, Bernd and Tentrup, Leander
(2014) Detecting Unrealizable Specifications of Distributed Systems.
In: Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Finkbeiner, Bernd and Tentrup, Leander
(2014) Fast DQBF refutation.
In: Theory and Applications of Satisfiability Testing (SAT 2014).
Conference: SAT International Conference on Theory and Applications of Satisfiability Testing

Finkbeiner, Bernd and Torfah, Hazem
(2014) Counting Models of Linear-Time Temporal Logic.
In: 8th International Conference on Language and Automata Theory and Applications (LATA 2014).

Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2014) On Tight Security Proofs for Schnorr Signatures.
In: Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Fleischhacker, Nils and Manulis, Mark and Azodi, Amir
(2014) A Modular Framework for Multi-Factor Authentication and Key Exchange.
In: Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings.

Fonseca, Pedro and Rodrigues, Rodrigo and Brandenburg, Björn B.
(2014) SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration.
In: Proc. of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14).
Conference: OSDI Usenix Symposium on Operating Systems Design and Implementation

Frey, Tobias
(2014) System Centric IPC Call Chains for Android.
Bachelors thesis, Saarland University.

Freymann, Hans-Peter and Vogelgesang, Stephanie
(2014) Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte.
Zeitschrift für Schadensrecht. pp. 544-555.

Galasso, Fabio and Keuper, Margret and Brox, Thomas and Schiele, Bernt
(2014) Spectral Graph Reduction for Efficient Image and Streaming Video Segmentation.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2014).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Galeotti, Juan P. and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014) Automating Full Functional Verification of Programs with Loops.
CoRR - Computing Research Repository, abs/14.

Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014) DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification.
In: Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings.

Giustiniano, Domenico and Mangold, Stefan and Tippenhauer, Nils Ole
(2014) Visible light communication with flickering prevention.
UNSPECIFIED
.

Gligoric, Milos and Majumdar, Rupak and Sharma, Rohan and Eloussi, Lamyaa and Marinov, Darko
(2014) Regression Test Selection for Distributed Software Histories.
In: Computer Aided Verification - 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 18-22, 2014. Proceedings.
Conference: CAV Computer Aided Verification

Gligoric, Milos and Majumdar, Rupak and Sharma, Rohan and Eloussi, Lamyaa and Marinov, Darko
(2014) Regression Test Selection for Distributed Software Histories.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Gomez-Rodriguez, Manuel and Gummadi, Krishna P. and Schölkopf, Bernhard
(2014) Quantifying Information Overload in Social Media and Its Impact on Social Contagions.
In: Proceedings of the Eighth International Conference on Weblogs and Social Media, ICWSM 2014, Ann Arbor, Michigan, USA, June 1-4, 2014..

Gomez-Rodriguez, Manuel and Leskovec, Jure
(2014) Visualizing information networks: the 2011 Fukushima earthquake.
AI Matters, 1 (1). 23–24.

Gomez-Rodriguez, Manuel and Song, Le and Schölkopf, Bernhard
(2014) Open Problem: Finding Good Cascade Sampling Processes for the Network Inference Problem.
In: Proceedings of The 27th Conference on Learning Theory, COLT 2014, Barcelona, Spain, June 13-15, 2014.
Conference: COLT Annual Conference on Computational Learning Theory

Gong, Nan-Wei and Steimle, Jürgen and Olberding, Simon and Hodges, Steve and Gillian, Nicholas Edward and Kawahara, Yoshihiro and Paradiso, Joseph A.
(2014) PrintSense: a versatile sensing technique to support multimodal flexible surface interaction.
In: CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014.
Conference: CHI International Conference on Human Factors in Computing Systems

Gorla, Alessandra and Tavecchia, Ilaria and Gross, Florian and Zeller, Andreas
(2014) Checking App Behavior Against App Descriptions.
In: Proc. of the 36th International Conference on Software Engineering (ICSE 2014).
Conference: ICSE International Conference on Software Engineering

Grishchenko, Ilya
(2014) Static Analysis of Android Applications.
Masters thesis, Saarland University.

Gruschka, Nils and Iacono, Luigi Lo and Sorge, Christoph
(2014) Analysis of the Current State in Website Certificate Validation.
Security and Communication Networks, 7 (5). pp. 865-877.

Grycner, Adam and Weikum, Gerhard
(2014) HARPY: Hypernyms and Alignment of Relational Paraphrases.
In: COLING 2014, 25th International Conference on Computational Linguistics, Proceedings of the Conference: Technical Papers, August 23-29, 2014, Dublin, Ireland.
Conference: COLING International Conference on Computational Linguistics

Harbach, Marian and Fahl, Sascha and Smith, Matthew
(2014) Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Havrikov, Nikolas and Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014) XMLMate: Evolutionary XML Test Generation.
In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Helmert, Malte and Haslum, Patrik and Hoffmann, Jörg and Nissim, Raz
(2014) Merge-and-Shrink Abstraction: A Method for Generating Lower Bounds in Factored State Spaces.
J. ACM, 61 (3). 16:1–16:63.

Herzig, Kim and Zeller, Andreas
(2014) Mining Bug Data: A Practitioner’s Guide.
In: Recommendation Systems in Software Engineering. Springer Berlin Heidelberg, pp. 131-171. ISBN 978-3-642-45134-8

Hessel, Stefan and Klose, Carsten
(2014) Blut und Boden: Die NS-Agrarideologie und die Extreme Rechte heute.
Forum Recht (1). pp. 21-22.

Hoffart, Johannes and Altun, Yasemin and Weikum, Gerhard
(2014) Discovering Emerging Entities with Ambiguous Names.
In: Proc. of the 23rd International Conference on World Wide Web (WWW 2014).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2014) AESTHETICS: Analytics with Strings, Things, and Cats.
In: Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2014) STICS: searching with strings, things, and cats.
In: The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '14, Gold Coast , QLD, Australia - July 06 - 11, 2014.
Conference: SIGIR ACM International Conference on Research and Development in Information Retrieval

Hoffmann, Jörg and Kissmann, Peter and Torralba, Àlvaro
(2014) "Distance"? Who Cares? Tailoring Merge-and-Shrink Heuristics to Detect Unsolvability.
In: ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic - Including Prestigious Applications of Intelligent Systems (PAIS 2014).
Conference: ECAI European Conference on Artificial Intelligence

Hoffmann, Jörg and Weber, Ingo
(2014) Web Service Composition.
In: Encyclopedia of Social Network Analysis and Mining. UNSPECIFIED, 2389–2399.

Hosang, Jan and Benenson, Rodrigo and Schiele, Bernt
(2014) How Good are Detection Proposals, really?
In: Proceedings of the British Machine Vision Conference (BMVC 2014).

Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014) Test Generation Across Multiple Layers.
In: Proceedings of the 7th International Workshop on Search-Based Software Testing.

Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2014) Bounds on Mobility.
In: CONCUR 2014 - Concurrency Theory - 25th International Conference, CONCUR 2014, Rome, Italy, September 2-5, 2014. Proceedings.
Conference: CONCUR International Conference on Concurrency Theory

Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2014) Bounds on mobility.
In: Proc. of the 25th International Conference on Concurrency Theory (CONCUR 2014).
Conference: CONCUR International Conference on Concurrency Theory

Ibrahim, Yusra and Yosef, Mohamed Amir and Weikum, Gerhard
(2014) AIDA-Social: Entity Linking on the Social Stream.
In: Proc. of the 7th International Workshop on Exploiting Semantic Annotations in Information Retrieval (ESAIR 2014).

Jacobs, Swen
(2014) Extended AIGER Format for Synthesis.
CoRR, abs/14.

Jacobs, Swen and Bloem, Roderick
(2014) Parameterized Synthesis.
Logical Methods in Computer Science, 10 (1).

Jungmann, Alexander and Brangewitz, Sonja and Petrlic, Ronald and Platenius, Marie Christin
(2014) Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.
International Journal On Advances in Intelligent Systems, 7 (4).

Jurkiewicz, Tomasz and Mehlhorn, Kurt
(2014) On a Model of Virtual Address Translation.
ACM Journal of Experimental Algorithmics, 19 (1).

Kampmann, Alexander and Galeotti, Juan Pablo and Zeller, Andreas
(2014) JTACO: Test Execution for Faster Bounded Verification.
In: Proc. of the 8th International Conference on Tests and Proofs (TAP 2014).

Karayev, Sergey and Fritz, Mario and Darrell, Trevor
(2014) Anytime Recognition of Objects and Scenes.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014) On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
In: Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014).

Kawahara, Yoshihiro and Hodges, Steve and Gong, Nan-Wei and Olberding, Simon and Steimle, Jürgen
(2014) Building Functional Prototypes Using Conductive Inkjet Printing.
IEEE Pervasive Computing, 13 (3). 30–38.

Kerber, Frederic and Krüger, Antonio and Löchtefeld, Markus
(2014) Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task.
In: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI).

Kerber, Frederic and Lessel, Pascal and Altmeyer, Maximilian and Kaltenhauser, Annika and Neurohr, Christian and Krüger, Antonio
(2014) Towards a novel digital household account book.
In: CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014, Extended Abstracts.
Conference: CHI International Conference on Human Factors in Computing Systems

Keyder, Emil Ragip and Hoffmann, Jörg and Haslum, Patrik
(2014) Improving Delete Relaxation Heuristics Through Explicitly Represented Conjunctions.
J. Artif. Intell. Res., 50. 487–533.

Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2014) Learning Must-Link Constraints for Video Segmentation Based on Spectral Clustering.
In: Pattern Recognition - 36th German Conference, GCPR 2014, Münster, Germany, September 2-5, 2014, Proceedings.

Kilpatrick, Scott and Dreyer, Derek and Jones, Simon L. Peyton and Marlow, Simon
(2014) Backpack: retrofitting Haskell with interfaces.
In: The 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '14, San Diego, CA, USA, January 20-21, 2014.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Kissmann, Peter and Hoffmann, Jörg
(2014) BDD Ordering Heuristics for Classical Planning.
J. Artif. Intell. Res., 51. 779–804.

Klein, Felix and Spieldenner, Torsten and Sons, Kristian and Slusallek, Philipp
(2014) Configurable instances of 3D models for declarative 3D in the web.
In: The 19th International Conference on Web3D Technology, Web3D '14, Vancouver, BC, Canada, August 8-10, 2014.

Kondreddi, Sarath Kumar and Triantafillou, Peter and Weikum, Gerhard
(2014) Combining information extraction and human computing for crowdsourced knowledge acquisition.
In: IEEE 30th International Conference on Data Engineering, Chicago, ICDE 2014, IL, USA, March 31 - April 4, 2014.
Conference: ICDE International Conference on Data Engineering

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2014) VoG: Summarizing and Understanding Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Kovalev, Mikhail and Müller, Silvia M. and Paul, Wolfgang J.
(2014) A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof.
UNSPECIFIED.

Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014) Learning Pruning Rules for Heuristic Search Planning.
In: Proc. of the 21st European Conference on Artificial Intelligence (ECAI 2014).
Conference: ECAI European Conference on Artificial Intelligence

Kremer, Steve and Künnemann, Robert
(2014) Automated Analysis of Security Protocols with Global State.
In: Proc. 35th IEEE Symposium on Security and Privacy (S&P'14).

Krupp, Johannes and Schröder, Dominique and Simkin, Mark
(2014) DEMO: Enhancing Security and Privacy with Google Glass.
In: Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Krüger, Antonio
(2014) Räumliche Benutzerschnittstellen.
Informatik Spektrum, 37 (5). 423–427.

Kupriyanov, Andrey and Finkbeiner, Bernd
(2014) Causal Termination of Multi-threaded Programs.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Kuzey, Erdal and Vreeken, Jilles and Weikum, Gerhard
(2014) A Fresh Look on Knowledge Bases: Distilling Named Events from News.
In: Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Kuzey, Erdal and Weikum, Gerhard
(2014) EVIN: building a knowledge base of events.
In: 23rd International World Wide Web Conference, WWW '14, Seoul, Republic of Korea, April 7-11, 2014, Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Kyriakopoulos, Charalampos and Wolf, Verena
(2014) Optimal Observation Time Points in Stochastic Chemical Kinetics.
In: Hybrid Systems Biology - Second International Workshop, HSB 2013, Taormina, Italy, September 2, 2013 and Third International Workshop, HSB 2014, Vienna, Austria, July 23-24, 2014, Revised Selected Papers.

Köster, Marcel and Leißa, Roland and Hack, Sebastian and Membarth, Richard and Slusallek, Philipp
(2014) Code Refinement of Stencil Codes.
Parallel Processing Letters, 24 (3).

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
In: Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14).

Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014) Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses.

Kütük, Merih Erdem and Sorge, Christoph
(2014) Bitcoin im deutschen Vollstreckungsrecht.
Multimedia und Recht, 17 (10). pp. 643-646.

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014) Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53. pp. 95-108.

Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014) Scalable Multitask Representation Learning for Scene Classification.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014) Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 269-270. ISSN 0170-7256

Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014) Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 269-270.

Leibenger, Dominik and Sorge, Christoph
(2014) Automatismen in einem verteilten System: Das Beispiel Bitcoin.
In: UNSPECIFIED Schriftenreihe des Graduiertenkollegs . Wilhelm Fink, pp. 161-174.

Leißa, Roland and Haffner, Immanuel and Hack, Sebastian
(2014) Sierra: a SIMD extension for C++.
In: Proceedings of the 2014 Workshop on Programming models for SIMD/Vector processing, WPMVP 2014, Orlando, Florida, USA, February 16, 2014.

Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby
(2014) SDDR: Light-Weight, Secure Mobile Encounters.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Li, Cheng and Leitão, João and Clement, Allen and Preguiça, Nuno M. and Rodrigues, Rodrigo and Vafeiadis, Viktor
(2014) Automating the Choice of Consistency Levels in Replicated Systems.
In: 2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014..

Li, Wenbin and Fritz, Mario
(2014) Learning Multi-Scale Representations for Material Classification.
CoRR, abs/14.

Lissermann, Roman and Huber, Jochen and Schmitz, Martin and Steimle, Jürgen and Mühlhäuser, Max
(2014) Permulin: mixed-focus collaboration on multi-view tabletops.
In: CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014.
Conference: CHI International Conference on Human Factors in Computing Systems

Löchtefeld, Markus and Lautemann, Nadine and Gehring, Sven and Krüger, Antonio
(2014) ambiPad: enriching mobile digital media with ambient feedback.
In: Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, MobileHCI 2014, Toronto, ON, Canada, September 23-26, 2014.

Maffei, Matteo
(2014) Security & privacy column.
SIGLOG News, 1 (1). p. 6.

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2014) Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting.
In: Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Maiya, Pallavi and Kanade, Aditya and Majumdar, Rupak
(2014) Race Detection for Android Applications.
In: Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Majumdar, Rupak and Tetali, Sai Deep and Wang, Zilong
(2014) Kuai: A model checker for software-defined networks.
In: Proc. of Formal Methods in Computer-Aided Design (FMCAD 2014).

Maksoud, Mohamed Abdel and Reineke, Jan
(2014) A Compiler Optimization to Increase the Efficiency of WCET Analysis.
In: 22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014.

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Malinowski, Mateusz and Fritz, Mario
(2014) A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation.
CoRR, abs/14.

Malinowski, Mateusz and Fritz, Mario
(2014) Towards a Visual Turing Challenge.
CoRR, abs/14.

Megiddo, Nimrod and Mehlhorn, Kurt and Savani, Rahul and Vazirani, Vijay V.
(2014) Equilibrium Computation (Dagstuhl Seminar 14342).
Dagstuhl Reports, 4 (8). 73–88.

Mehlhorn, Kurt
(2014) Algorithms for Equilibrium Prices in Linear Market Models.
In: WALCOM 2014 : Eighth International Workshop on Algorithms and Computation, February 13-15, 2014, IIT Madras, Chennai, India.

Membarth, Richard and Slusallek, Philipp and Köster, Marcel and Leißa, Roland and Hack, Sebastian
(2014) Target-specific refinement of multigrid codes.
In: Proceedings of the Fourth International Workshop on Domain-Specific Languages and High-Level Frameworks for High Performance Computing, WOLFHPC '14, New Orleans, Louisiana, USA, November 16-21, 2014.

Miettinen, Pauli and Vreeken, Jilles
(2014) MDL4BMF : Minimum Description Length for Boolean Matrix Factorization.
Transactions on Knowledge Discovery from Data, 8 (4). pp. 1-31.

Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014) Beyond Access Control: Managing Online Privacy via Exposure.
In: Proceedings of the Workshop on Useable Security (USEC'14).

Mondal, Mainack and Liu, Yabing and Viswanath, Bimal and Gummadi, Krishna P. and Mislove, Alan
(2014) Understanding and Specifying Social Access Control Lists.
In: Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014).

Mukherjee, Subhabrata and Weikum, Gerhard and Danescu-Niculescu-Mizil, Cristian
(2014) People on Drugs: Credibility of User Statements in Health Communities.
In: Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Möllers, Frederik and Seitz, Sebastian and Hellmann, Andreas and Sorge, Christoph
(2014) Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication.
In: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2014).

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Böhm, Klemens
(2014) Multivariate Maximal Correlation Analysis.
In: Proceedings of the International Conference on Machine Learning (ICML).
Conference: ICML International Conference on Machine Learning

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Klemens, Böhm
(2014) Unsupervised Interaction-Preserving Discretization of Multivariate Data.
Data Mining and Knowledge Discovery, 28 (5). pp. 1366-1397.

Noschinski, Lars and Rizkallah, Christine and Mehlhorn, Kurt
(2014) Verification of Certifying Computations through AutoCorres and Simpl.
In: Proc. 6th NASA Formal Methods Symposium (NFM 2014).

Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014) Privacy-preserving audit for broker-based health information exchange.
In: Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14).

Olberding, Simon and Wessely, Michael and Steimle, Jürgen
(2014) PrintScreen: fabricating highly customizable thin-film touch-displays.
In: The 27th Annual ACM Symposium on User Interface Software and Technology, UIST '14, Honolulu, HI, USA, October 5-8, 2014.
Conference: UIST ACM Symposium on User Interface Software and Technology

Ou, Jifei and Yao, Lining and Tauber, Daniel and Steimle, Jürgen and Niiyama, Ryuma and Ishii, Hiroshi
(2014) jamSheets: thin interfaces with tunable stiffness enabled by layer jamming.
In: Eighth International Conference on Tangible, Embedded, and Embodied Interaction, TEI'14, Munich, Germany, February 16-19, 2014.
Conference: TEI Tangible, Embedded, and Embodied Interaction

Pecina, Kim and Mohammadi, Esfandiar and Pöpper, Christina
(2014) Zero-Communication Seed Establishment for Anti-Jamming Techniques.
In: Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT).
Conference: NDSS Network and Distributed System Security Symposium

Pepik, Bojan and Stark, Michael and Gehler, Peter and Schiele, Bernt
(2014) Multi-view Priors for Learning Detectors from Sparse Viewpoint Data.
In: International Conference on Learning Representations 2014 (ICLR 2014).

Perl, Henning and Fahl, Sascha and Smith, Matthew
(2014) You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores.
In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers.

Perlov, Artem
(2014) Identifying the Optimal Permission Set of Android Applications.
Bachelors thesis, Saarland University.

Petrlic, Ronald
(2014) Privacy-Preserving Multiparty Digital Rights Management.
Doctoral thesis, University of Paderborn.

Petrlic, Ronald and Jungmann, Alexander and Platenius, Marie Christin and Schäfer, Wilhelm and Sorge, Christoph
(2014) Security and Privacy Challenges in On-The-Fly Computing.
In: Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014).

Petrlic, Ronald and Lutters, Sascha and Sorge, Christoph
(2014) Privacy-Preserving Reputation Management.
In: Procceedings of the 29th Symposium On Applied Computing.

Petrlic, Ronald and Sorge, Christoph
(2014) Establishing user trust in Automated Teller Machine Integrity.
IET Information Security, 8 (2). pp. 132-139.

Petrlic, Ronald and Sorge, Christoph
(2014) Privacy-Preserving Digital Rights Management based on Attribute-based Encryption.
In: Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security.

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Pishchulin, Leonid and Andriluka, Mykhaylo and Schiele, Bernt
(2014) Fine-grained Activity Recognition with Holistic and Pose Based Features.
In: Pattern Recognition (GCPR 2014).

Platenius, Marie Christin and Arifulina, Svetlana and Petrlic, Ronald and Schäfer, Wilhelm
(2014) Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.
In: Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet.

Podosinnikova, Anastasia and Setzer, Simon and Hein, Matthias
(2014) Robust PCA: Optimization of the Robust Reconstruction Error Over the Stiefel Manifold.
In: Pattern Recognition - 36th German Conference, GCPR 2014, Münster, Germany, September 2-5, 2014, Proceedings.

Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2014) Efficiently Spotting the Starting Points of an Epidemic in a Large Graph.
Knowledge and Information Systems, 38 (1). pp. 35-59.

Pryvalov, Ivan and Kate, Aniket
(2014) Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2014. p. 247.

Qu, Lizhen and Zhang, Yi and Wang, Rui and Jiang, Lili and Gemulla, Rainer and Weikum, Gerhard
(2014) Senti-LSSVM: Sentiment-Oriented Multi-Relation Extraction with Latent Structural SVM.
TACL, 2. 155–168.

Rangapuram, Syama Sundar and Mudrakarta, Pramod Kaushik and Hein, Matthias
(2014) Tight Continuous Relaxation of the Balanced k-Cut Problem.
In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Reineke, Jan
(2014) Randomized Caches Considered Harmful in Hard Real-Time Systems.
LITES, 1 (1). 03:1–03:13.

Reineke, Jan and Altmeyer, Sebastian and Grund, Daniel and Hahn, Sebastian and Maiza, Claire
(2014) Selfish-LRU: Preemption-aware caching for predictability and performance.
In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2014, Berlin, Germany, April 15-17, 2014.
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Reineke, Jan and Doerfert, Johannes
(2014) Architecture-parametric timing analysis.
In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2014, Berlin, Germany, April 15-17, 2014.
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Reineke, Jan and Doerfert, Johannes
(2014) Architecture-parametric timing analysis.
In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2014, Berlin, Germany, April 15-17, 2014.

Reineke, Jan and Maksoud, Mohamed Abdel
(2014) A Compiler Optimization to Increase the Efficiency of WCET Analysis.
In: 22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014.

Reineke, Jan and Tripakis, Stavros
(2014) Basic Problems in Multi-View Modeling.
In: Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Reineke, Jan and Wilhelm, Reinhard
(2014) Impact of resource sharing on performance and performance prediction.
In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014.

Reischuk, Raphael M.
(2014) Declarative Design and Enforcement for Secure Cloud Applications.
Doctoral thesis, Saarland University.

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2014) Image-Based Synthesis and Re-synthesis of Viewpoints Guided by 3D Models.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Reznichenko, Alexey and Francis, Paul
(2014) Private-by-Design Advertising Meets the Real World.
In: Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014).
Conference: CCS ACM Conference on Computer and Communications Security

Riebler, Heinrich and Kenter, Tobias and Plessl, Christian and Sorge, Christoph
(2014) Reconstructing AES Key Schedules from Decayed Memory with FPGAs.
In: Proceedings of the 22nd IEEE International Symposium on Field-Programmable Custom Computing Machines May 11-13, Boston, Massachusetts.
Conference: FCCM IEEE Symposium on Field Programmable Custom Computing Machines

Rohrbach, Anna and Rohrbach, Marcus and Qiu, Wei and Friedrich, Annemarie and Pinkal, Manfred and Schiele, Bernt
(2014) Coherent Multi-sentence Video Description with Variable Level of Detail.
In: Pattern Recognition (GCPR 2014).

Rossberg, Andreas and Russo, Claudio V and Dreyer, Derek
(2014) F-ing modules.
J. Funct. Program., 24 (5). pp. 529-607.

Rossow, Christian
(2014) Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
In: Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14).
Conference: NDSS Network and Distributed System Security Symposium

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
In: Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014).

Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).

Schaub, Thomas and Moll, Simon and Karrenberg, Ralf and Hack, Sebastian
(2014) The Impact of the SIMD Width on Control-Flow and Memory Divergence.
TACO, 11 (4). 54:1–54:25.

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2014) ProCrawl: Mining Test Models from Multi-user Web Applications.
In: Proc. International Symposium on Software Testing and Analysis (ISSTA 2014).
Conference: ISSTA International Symposium on Software Testing and Analysis

Schweig, Marc
(2014) Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.

Simeonovski, Milivoj
(2014) Poster: Quasi-ID: In fact, I am a human.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014) Bridging the Gap Between Digital Cryptography and the Physical World.
In: European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014) Ubic: Bridging the Gap between Digital Cryptography and the Physical World.
In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I.
Conference: ESORICS European Symposium On Research In Computer Security

Snelting, Gregor and Giffhorn, Dennis and Graf, Jürgen and Hammer, Christian and Hecker, Martin and Mohr, Martin and Wasserrab, Daniel
(2014) Checking probabilistic noninterference using JOANA.
it - Information Technology, 56 (6). pp. 280-287.

Sons, Kristian and Klein, Felix and Sutter, Jan and Slusallek, Philipp
(2014) shade.js: Adaptive Material Descriptions.
Comput. Graph. Forum, 33 (7). 51–60.

Sorge, Christoph
(2014) The German electronic identity card: Lessons learned.
In: UNSPECIFIED IGI Global.

Sorge, Christoph
(2014) The Legal Classification of Identity-Based Signatures.
Computer Law and Security Review, 30 (2). pp. 126-136.

Sorge, Christoph and Petrlic, Ronald
(2014) Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen.
In: Tagungsband des 17. Internationalen Rechtsinformatik Symposions.

Spliet, Roy and Vanga, Manohar and Brandenburg, Björn B. and Dziadek, Sven
(2014) Fast on Average, Predictable in the Worst Case: Exploring Real-Time Futexes in LITMUSRT.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Steimle, Jürgen and Hornecker, Eva and Schmidt, Albrecht
(2014) Interaction Beyond the Desktop.
Informatik Spektrum, 37 (5). p. 385.

Steimle, Jürgen and Olberding, Simon
(2014) Verformbaren Mobilgeräten gehört die Zukunft - Wie gedruckte Elektronik und deformierbare Bildschirme die Interaktion mit mobilen Anwendungen verändern werden.
Informatik Spektrum, 37 (5). 402–406.

Steimle, Jürgen and Olberding, Simon and Wessely, Michael
(2014) Digitale Fabrikation von flexiblen Displays und Touch-Oberflächen.
In: Mensch & Computer 2014 - Workshopband, 14. Fachübergreifende Konferenz für Interaktive und Kooperative Medien - Interaktiv unterwegs - Freiräume gestalten, 31. August - 3. September 2014, München, Germany.

Stock, Ben and Johns, Martin
(2014) Protecting Users Against XSS-based Password Manager Abuse.
In: Proceedings of the 9th ACM symposium on Information, computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Stock, Ben and Lekies, Sebastian and Johns, Martin
(2014) DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land.
In: Sicherheit.

Stock, Ben and Lekies, Sebastian and Mueller, Tobias and Spiegel, Patrick and Johns, Martin
(2014) Precise Client-side Protection against DOM-based Cross-Site Scripting.
In: 23rd USENIX Security Symposium (USENIX Security 14).
Conference: USENIX-Security Usenix Security Symposium

Suchanek, Fabian M and Weikum, Gerhard
(2014) Knowledge Bases in the Age of Big Data Analytics.
PVLDB, 7 (13). pp. 1713-1714.

Sutter, Jan and Sons, Kristian and Slusallek, Philipp
(2014) Blast: a binary large structured transmission format for the web.
In: The 19th International Conference on Web3D Technology, Web3D '14, Vancouver, BC, Canada, August 8-10, 2014.

Tabuada, Paulo and Caliskan, Sina Yamac and Rungger, Matthias and Majumdar, Rupak
(2014) Towards Robustness for Cyber-Physical Systems.
IEEE Trans. Automat. Contr., 59 (12). 3151–3163.

Tandon, Niket and de, Gerard Melo and Suchanek, Fabian M and Weikum, Gerhard
(2014) WebChild: harvesting and organizing commonsense knowledge from the web.
In: Proc. of the 7th ACM International Conference on Web Search and Data Mining (WSDM'14).
Conference: WSDM ACM International Conference on Web Search and Data Mining

Tandon, Niket and de Melo, Gerard and Weikum, Gerhard
(2014) Acquiring Comparative Commonsense Knowledge from the Web.
In: Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, July 27 -31, 2014, Québec City, Québec, Canada..
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014) Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1). pp. 58-69.

Telaar, Daniel and Krüger, Antonio and Schöning, Johannes
(2014) A Large-Scale Quantitative Survey of the German Geocaching Community in 2007.
Adv. Human-Computer Interaction, 2014. 257815:1–257815:11.

Thome, Julian and Gorla, Alessandra and Zeller, Andreas
(2014) Search-based Security Testing of Web Applications.
In: Proceedings of the 7th International Workshop on Search-Based Software Testing.

Tippenhauer, Nils Ole and Temple, William G. and Vu, An Hoa and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew and Sanders, William
(2014) Automatic Generation of Security Argument Graphs.
In: Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC).

Turon, Aaron and Vafeiadis, Viktor and Dreyer, Derek
(2014) GPS: navigating weak memory with ghosts, protocols, and separation.
In: Proc. of the 2014 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2014).
Conference: OOPSLA ACM Conference on Object Oriented Programming Systems Languages and Applications

Valera, Isabel and Gomez-Rodriguez, Manuel and Gummadi, Krishna P.
(2014) Modeling Diffusion of Competing Products and Conventions in Social Media.
CoRR, abs/14.

Verbeek, Freek and Tverdyshev, Sergey and Havle, Oto and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Nemouchi, Yakoub and Feliachi, Abderrahmane and Wolff, Burkhart and Schmaltz, Julien
(2014) Formal Specification of a Generic Separation Kernel.
Archive of Formal Proofs, 2014.

Viswanath, Bimal and Bashir, Ahmad M and Crovella, Mark and Guha, Saikat and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2014) Towards Detecting Anomalous User Behavior in Online Social Networks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Vu, An Hoa and Tippenhauer, Nils Ole and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew
(2014) CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
In: Proceedings of the Conference on Quantitative Evaluation of SysTems (QEST).

Wei-Chen, Walon and Johnson, Gregory and McCulley, Daniel and Grau, Oliver and Fritz, Mario
(2014) Object Disambiguation for Augmented Reality Applications.
In: British Machine Vision Conference, BMVC 2014, Nottingham, UK, September 1-5, 2014.

Weier, Martin and Maiero, Jens and Roth, Thorsten and Hinkenjann, André and Slusallek, Philipp
(2014) Lazy details for large high-resolution displays.
In: SIGGRAPH Asia 2014 Posters, Shenzhen, China, December 3-6, 2014.
Conference: SIGGRAPH ACM SIG International Conference on Computer Graphics and Interactive Techniques

Weigel, Martin and Mehta, Vikram and Steimle, Jürgen
(2014) More than touch: understanding how people use skin as an input surface for mobile computing.
In: CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014.
Conference: CHI International Conference on Human Factors in Computing Systems

Weikum, Gerhard
(2014) Big Text: von Sprache zu Wissen.
In: 44. Jahrestagung der Gesellschaft für Informatik, Informatik 2014, Big Data - Komplexität meistern, 22.-26. September 2014 in Stuttgart, Deutschland.

Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014) On Measuring the Impact of DDoS Botnets.
In: Proceedings of the Seventh European Workshop on System Security (EuroSec '14).

Wieder, Alexander and Brandenburg, Björn B.
(2014) On the Complexity of Worst-Case Blocking Analysis of Nested Critical Sections.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Winkler, Christian and Löchtefeld, Markus and Dobbelstein, David and Krüger, Antonio and Rukzio, Enrico
(2014) SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction.
In: Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario.
Conference: CHI International Conference on Human Factors in Computing Systems

Woll, Robin and Birkenstock, Matthias and Mohr, Daniel and Berrang, Pascal and Steffens, Tino and Loviscach, Jörn
(2014) Hundert Jahre Quizze-und nichts dazugelernt?(Visionen & Konzepte).
Proceedings of GMW 2014. pp. 200-206.

Woll, Robin and Buschbeck, Sven and Steffens, Tino and Berrang, Pascal and Loviscach, Jörn
(2014) A Platform that Integrates Quizzes into Videos.
Proceedings of the European MOOC Stakeholder Summit 2014. p. 155.

Wu, Hao and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2014) Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas.
Data Mining and Knowledge Discovery, 28 (5). pp. 1398-1428.

Wuhrer, Stefanie and Pishchulin, Leonid and Brunton, Alan and Shu, Chang and Lang, Jochen
(2014) Estimation of Human Body Shape and Posture Under Clothing.
Computer Vision and Image Understanding, 127. pp. 31-42.

Yosef, Mohamed Amir and Spaniol, Marc and Weikum, Gerhard
(2014) AIDArabic A Named-Entity Disambiguation Framework for Arabic Text.
In: Proceedings of the EMNLP 2014 Workshop on Arabic Natural Language Processing, ANLP@EMNLP 20104, Doha, Qatar, October 25, 2014.

Zamani, Majid and Esfahani, Peyman Mohajerin and Majumdar, Rupak and Abate, Alessandro and Lygeros, John
(2014) Symbolic Control of Stochastic Systems via Approximately Bisimilar Finite Abstractions.
IEEE Trans. Automat. Contr., 59 (12). 3135–3150.

Zeller, Andreas and Wei, Yi and Meyer, Bertrand and Nordio, Martin and Furia, Carlo A. and Pei, Yu
(2014) Automated Fixing of Programs with Contracts.
IEEE Transactions on Software Engineering, 40 (5). pp. 427-449. ISSN 0098-5589

Zimek, Arthur and Assent, Ira and Vreeken, Jilles
(2014) Frequent Pattern Mining.
Springer.

Zinnikus, Ingo and Byelozyorov, Sergiy and Cao, Xiaoqi and Klusch, Matthias and Krauss, Christopher and Nonnengart, Andreas and Spieldenner, Torsten and Warwas, Stefan and Slusallek, Philipp
(2014) A Collaborative VirtualWorkspace for Factory Configuration and Evaluation.
EAI Endorsed Trans. Collaborative Computing, 1 (1). e5.

de Melo, Gerard and Weikum, Gerhard
(2014) Taxonomic data integration from multilingual Wikipedia editions.
Knowl. Inf. Syst., 39 (1). 1–39.

von Luxburg, Ulrike and Radl, Agnes and Hein, Matthias
(2014) Hitting and commute times in large random neighborhood graphs.
Journal of Machine Learning Research, 15 (1). 1751–1798.

This list was generated on Fri Apr 19 19:11:47 2024 CEST.