Number of items: 285.
Conference or Workshop Item (A Paper)
Abel, Andreas and Reineke, Jan
(2014)
Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation.
Abel, Andreas and Reineke, Jan
(2014)
Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation.
Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014)
Brave new world: privacy risks for mobile users.
Aditya, Paarijaat and Erdelyi, Viktor and Lentz, Matthew and Shi, Elaine and Bhattacharjee, Bobby and Druschel, Peter
(2014)
EnCore: Private, Context-based Communication for Mobile Social Apps.
Alvarez, Victor and Schuhknecht, Felix Martin and Dittrich, Jens and Richter, Stefan
(2014)
Main Memory Adaptive Indexing for Multi-core Systems.
Alvin, Chris and Gulwani, Sumit and Majumdar, Rupak and Mukhopadhyay, Supratik
(2014)
Synthesis of Geometry Proof Problems.
Alvin, Christopher and Gulwani, Sumit and Mukhopadhyay, Supratik and Majumdar, Rupak
(2014)
Synthesis of Geometry Proof Problems.
Aminof, Benjamin and Jacobs, Swen and Khalimov, Ayrat and Rubin, Sasha
(2014)
Parameterized Model Checking of Token-Passing Systems.
Andriluka, Mykhaylo and Pishchulin, Leonid and Gehler, Peter and Schiele, Bernt
(2014)
2D Human Pose Estimation: New Benchmark and State of the Art Analysis.
Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014)
Optimizing Planning Domains by Automatic Action Schema Splitting.
Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014)
PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Interaction Model to Predict Subjective-Specificity of Search Results.
Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Supporting Exploratory Search Through User Modelling.
Atukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Narrow or Broad? Estimating Subjective Specificity in Exploratory Search.
Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014)
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014)
Scippa: System-Centric IPC Provenance on Android.
Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014)
Android Security Framework: Extensible Multi-Layered Access Control on Android.
Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014)
BackRef: Accountability in Anonymous Communication Networks.
Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014)
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014)
X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014)
Lime: Data Lineage in the Malicious Environment.
Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014)
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014)
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
Backes, Michael and Manoharan, Praveen and Mohammadi, Esfandiar
(2014)
TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2014)
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
Backes, Michael and Nürnberger, Stefan
(2014)
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
Baumer, Eric P. S. and Ahn, June and Bie, Mei and Bonsignore, Elizabeth M. and Börütecene, Ahmet and Buruk, Oguz Turan and Clegg, Tamara L. and Druin, Allison and Echtler, Florian and Gruen, Dan and Guha, Mona Leigh and Hordatt, Chelsea and Krüger, Antonio and Maidenbaum, Shachar and Malu, Meethu and McNally, Brenna and Muller, Michael and Norooz, Leyla and Norton, Juliet and Özcan, Oguzhan and Patterson, Donald J. and Riener, Andreas and Ross, Steven I. and Rust, Karen and Schöning, Johannes and Silberman, M. Six and Tomlinson, Bill and Yip, Jason C.
(2014)
CHI 2039: speculative research visions.
Belagiannis, Vasileios and Amin, Sikandar and Andriluka, Mykhaylo and Schiele, Bernt and Navab, Nassir and Ilic, Slobodan
(2014)
3D Pictorial Structures for Multiple Human Pose Estimation.
Bhattacharya, Parantapa and Ghosh, Saptarshi and Kulshrestha, Juhi and Mondal, Mainack and Zafar, Muhammad Bilal and Ganguly, Niloy and Gummadi, Krishna P.
(2014)
Deep Twitter diving: exploring topical groups in microblogs at scale.
Bhattacharya, Parantapa and Zafar, Muhammad Bilal and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2014)
Inferring user interests in the Twitter social network.
Bhattacharya, Sayan and Chalermsook, Parinya and Mehlhorn, Kurt and Neumann, Adrian
(2014)
New Approximability Results for the Robust k-Median Problem.
Bichhawat, Abhishek
(2014)
Exception Handling for Dynamic Information Flow Control.
Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014)
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.
Biega, Joanna Asia and Mele, Ida and Weikum, Gerhard
(2014)
Probabilistic Prediction of Privacy Risks in User Search Histories.
Bird, Christian and Ranganath, Venkatesh-Prasad and Zimmermann, Thomas and Nagappan, Nachiappan and Zeller, Andreas
(2014)
Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines.
Bloem, Roderick and Ehlers, Rüdiger and Jacobs, Swen and Könighofer, Robert
(2014)
How to Handle Assumptions in Synthesis.
Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat
(2014)
Parameterized Synthesis Case Study: AMBA AHB.
Blond, Stevens Le and Uritesc, Adina and Gilbert, Cedric and Chua, Zheng Leong and Saxena, Prateek and Kirda, Engin
(2014)
A Look at Targeted Attacks Through the Lense of an NGO.
Brandenburg, Björn B.
(2014)
The FMLP+: An Asymptotically Optimal Real-Time Locking Protocol for Suspension-Aware Analysis.
Brandenburg, Björn B.
(2014)
A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-Criticality Systems.
Brangewitz, Sonja and Jungmann, Alexander and Petrlic, Ronald and Platenius, Marie Christin
(2014)
Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.
Böhmer, Matthias and Lander, Christian and Gehring, Sven and Burmby, Duncon P and Krüger, Antonio
(2014)
Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users.
Carzaniga, Antonio and Goffi, Alberto and Gorla, Alessandra and Mattavelli, Andrea and Pezzè, Mauro
(2014)
Cross-checking oracles from intrinsic software redundancy.
Cerqueira, Felipe and Gujarati, Arpan and Brandenburg, Björn B.
(2014)
Linux's Processor Affinity API, Refined: Shifting Real-Time Tasks Towards Higher Schedulability.
Cerqueira, Felipe and Vanga, Manohar and Brandenburg, Björn B.
(2014)
Scaling global scheduling with message passing.
Chatterjee, Krishnendu and Ibsen-Jensen, Rasmus and Majumdar, Rupak
(2014)
Edit Distance for Timed Automata.
Chistikov, Dmitry and Majumdar, Rupak
(2014)
Unary Pushdown Automata and Straight-Line Programs.
Choi, Seung Geol and Katz, Jonathan and Schröder, Dominique and Yerukhimovich, Arkady and Zhou, Hong-Sheng
(2014)
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, Kristopher K. and Rabe, Markus N. and Sanchez, Cesar
(2014)
Temporal Logics for Hyperproperties.
Corro, Luciano Del and Gemulla, Rainer and Weikum, Gerhard
(2014)
Werdy: Recognition and Disambiguation of Verbs and Verb Phrases with Syntactic and Semantic Pruning.
Dachman-Soled, Dana and Fleischhacker, Nils and Katz, Jonathan and Lysyanskaya, Anna and Schröder, Dominique
(2014)
Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
Daiber, Florian and Speicher, Marco and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2014)
Interacting with 3D Content on Stereoscopic Displays.
Dallmeier, Valentin and Pohl, Bernd and Burger, Martin and Mirold, Michael and Zeller, Andreas
(2014)
WebMate: Web Application Test Generation in the Real World.
Damm, Werner and Finkbeiner, Bernd
(2014)
Automatic Compositional Synthesis of Distributed Systems.
Danilewski, Piotr and Köster, Marcel and Leißa, Roland and Membarth, Richard and Slusallek, Philipp
(2014)
Specialization through dynamic staging.
Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Dimitrova, Rayna and Majumdar, Rupak
(2014)
Deductive control synthesis for alternating-time logics.
Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014)
On the (In)Security of Mobile Two-Factor Authentication.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Differentially Private Data Aggregation with Optimal Utility.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
Ernst, Patrick and Meng, Cynthia and Siu, Amy and Weikum, Gerhard
(2014)
KnowLife: a Knowledge Graph for Health and Life Sciences.
Esmaeilsabzali, Shahram and Majumdar, Rupak and Wies, Thomas and Zufferey, Damien
(2014)
Dynamic package interfaces.
Esparza, Javier and Ledesma-Garza, Ruslán and Majumdar, Rupak and Meyer, Philipp J. and Niksic, Filip
(2014)
An SMT-Based Approach to Coverability Analysis.
Esparza, Javier and Ledesma-Garza, Ruslán and Majumdar, Rupak and Meyer, Philipp J. and Niksic, Filip
(2014)
An SMT-based Approach to Coverability Analysis.
Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew
(2014)
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew
(2014)
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
Farajtabar, Mehrdad and Du, Nan and Gomez-Rodriguez, Manuel and Valera, Isabel and Zha, Hongyuan and Song, Le
(2014)
Shaping Social Activity by Incentivizing Users.
Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014)
Improved Features for Runtime Prediction of Domain-Independent Planners.
Faymonville, Peter and Finkbeiner, Bernd and Peled, Doron
(2014)
Monitoring Parametric Temporal Logic.
Figueiredo, Flavio and Almeida, Jussara M. and Benevenuto, Fabricio and Gummadi, Krishna P.
(2014)
Does content determine information popularity in social media?: a case study of youtube videos' content and their popularity.
Finkbeiner, Bernd and Olderog, Ernst-Rüdiger
(2014)
Petri Games: Synthesis of Distributed Systems with Causal Memory.
Finkbeiner, Bernd and Tentrup, Leander
(2014)
Detecting Unrealizable Specifications of Distributed Systems.
Finkbeiner, Bernd and Tentrup, Leander
(2014)
Fast DQBF refutation.
Finkbeiner, Bernd and Torfah, Hazem
(2014)
Counting Models of Linear-Time Temporal Logic.
Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique
(2014)
On Tight Security Proofs for Schnorr Signatures.
Fleischhacker, Nils and Manulis, Mark and Azodi, Amir
(2014)
A Modular Framework for Multi-Factor Authentication and Key Exchange.
Fonseca, Pedro and Rodrigues, Rodrigo and Brandenburg, Björn B.
(2014)
SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration.
Galasso, Fabio and Keuper, Margret and Brox, Thomas and Schiele, Bernt
(2014)
Spectral Graph Reduction for Efficient Image and Streaming Video Segmentation.
Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014)
DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification.
Gligoric, Milos and Majumdar, Rupak and Sharma, Rohan and Eloussi, Lamyaa and Marinov, Darko
(2014)
Regression Test Selection for Distributed Software Histories.
Gligoric, Milos and Majumdar, Rupak and Sharma, Rohan and Eloussi, Lamyaa and Marinov, Darko
(2014)
Regression Test Selection for Distributed Software Histories.
Gomez-Rodriguez, Manuel and Gummadi, Krishna P. and Schölkopf, Bernhard
(2014)
Quantifying Information Overload in Social Media and Its Impact on Social Contagions.
Gomez-Rodriguez, Manuel and Song, Le and Schölkopf, Bernhard
(2014)
Open Problem: Finding Good Cascade Sampling Processes for the Network Inference Problem.
Gong, Nan-Wei and Steimle, Jürgen and Olberding, Simon and Hodges, Steve and Gillian, Nicholas Edward and Kawahara, Yoshihiro and Paradiso, Joseph A.
(2014)
PrintSense: a versatile sensing technique to support multimodal flexible surface interaction.
Gorla, Alessandra and Tavecchia, Ilaria and Gross, Florian and Zeller, Andreas
(2014)
Checking App Behavior Against App Descriptions.
Grycner, Adam and Weikum, Gerhard
(2014)
HARPY: Hypernyms and Alignment of Relational Paraphrases.
Harbach, Marian and Fahl, Sascha and Smith, Matthew
(2014)
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
Havrikov, Nikolas and Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014)
XMLMate: Evolutionary XML Test Generation.
Hoffart, Johannes and Altun, Yasemin and Weikum, Gerhard
(2014)
Discovering Emerging Entities with Ambiguous Names.
Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2014)
AESTHETICS: Analytics with Strings, Things, and Cats.
Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2014)
STICS: searching with strings, things, and cats.
Hoffmann, Jörg and Kissmann, Peter and Torralba, Àlvaro
(2014)
"Distance"? Who Cares? Tailoring Merge-and-Shrink Heuristics to Detect Unsolvability.
Hosang, Jan and Benenson, Rodrigo and Schiele, Bernt
(2014)
How Good are Detection Proposals, really?
Höschele, Matthias and Galeotti, Juan Pablo and Zeller, Andreas
(2014)
Test Generation Across Multiple Layers.
Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2014)
Bounds on Mobility.
Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2014)
Bounds on mobility.
Ibrahim, Yusra and Yosef, Mohamed Amir and Weikum, Gerhard
(2014)
AIDA-Social: Entity Linking on the Social Stream.
Kampmann, Alexander and Galeotti, Juan Pablo and Zeller, Andreas
(2014)
JTACO: Test Execution for Faster Bounded Verification.
Karayev, Sergey and Fritz, Mario and Darrell, Trevor
(2014)
Anytime Recognition of Objects and Scenes.
Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014)
On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
Kerber, Frederic and Krüger, Antonio and Löchtefeld, Markus
(2014)
Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task.
Kerber, Frederic and Lessel, Pascal and Altmeyer, Maximilian and Kaltenhauser, Annika and Neurohr, Christian and Krüger, Antonio
(2014)
Towards a novel digital household account book.
Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2014)
Learning Must-Link Constraints for Video Segmentation Based on Spectral Clustering.
Kilpatrick, Scott and Dreyer, Derek and Jones, Simon L. Peyton and Marlow, Simon
(2014)
Backpack: retrofitting Haskell with interfaces.
Klein, Felix and Spieldenner, Torsten and Sons, Kristian and Slusallek, Philipp
(2014)
Configurable instances of 3D models for declarative 3D in the web.
Kondreddi, Sarath Kumar and Triantafillou, Peter and Weikum, Gerhard
(2014)
Combining information extraction and human computing for crowdsourced knowledge acquisition.
Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2014)
VoG: Summarizing and Understanding Large Graphs.
Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014)
Learning Pruning Rules for Heuristic Search Planning.
Kremer, Steve and Künnemann, Robert
(2014)
Automated Analysis of Security Protocols with Global State.
Krupp, Johannes and Schröder, Dominique and Simkin, Mark
(2014)
DEMO: Enhancing Security and Privacy with Google Glass.
Kupriyanov, Andrey and Finkbeiner, Bernd
(2014)
Causal Termination of Multi-threaded Programs.
Kuzey, Erdal and Vreeken, Jilles and Weikum, Gerhard
(2014)
A Fresh Look on Knowledge Bases: Distilling Named Events from News.
Kuzey, Erdal and Weikum, Gerhard
(2014)
EVIN: building a knowledge base of events.
Kyriakopoulos, Charalampos and Wolf, Verena
(2014)
Optimal Observation Time Points in Stochastic Chemical Kinetics.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014)
Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014)
Scalable Multitask Representation Learning for Scene Classification.
Leißa, Roland and Haffner, Immanuel and Hack, Sebastian
(2014)
Sierra: a SIMD extension for C++.
Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby
(2014)
SDDR: Light-Weight, Secure Mobile Encounters.
Li, Cheng and Leitão, João and Clement, Allen and Preguiça, Nuno M. and Rodrigues, Rodrigo and Vafeiadis, Viktor
(2014)
Automating the Choice of Consistency Levels in Replicated Systems.
Lissermann, Roman and Huber, Jochen and Schmitz, Martin and Steimle, Jürgen and Mühlhäuser, Max
(2014)
Permulin: mixed-focus collaboration on multi-view tabletops.
Löchtefeld, Markus and Lautemann, Nadine and Gehring, Sven and Krüger, Antonio
(2014)
ambiPad: enriching mobile digital media with ambient feedback.
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2014)
Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting.
Maiya, Pallavi and Kanade, Aditya and Majumdar, Rupak
(2014)
Race Detection for Android Applications.
Majumdar, Rupak and Tetali, Sai Deep and Wang, Zilong
(2014)
Kuai: A model checker for software-defined networks.
Maksoud, Mohamed Abdel and Reineke, Jan
(2014)
A Compiler Optimization to Increase the Efficiency of WCET Analysis.
Malinowski, Mateusz and Fritz, Mario
(2014)
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
Mehlhorn, Kurt
(2014)
Algorithms for Equilibrium Prices in Linear Market Models.
Membarth, Richard and Slusallek, Philipp and Köster, Marcel and Leißa, Roland and Hack, Sebastian
(2014)
Target-specific refinement of multigrid codes.
Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014)
Beyond Access Control: Managing Online Privacy via Exposure.
Mondal, Mainack and Liu, Yabing and Viswanath, Bimal and Gummadi, Krishna P. and Mislove, Alan
(2014)
Understanding and Specifying Social Access Control Lists.
Mukherjee, Subhabrata and Weikum, Gerhard and Danescu-Niculescu-Mizil, Cristian
(2014)
People on Drugs: Credibility of User Statements in Health Communities.
Möllers, Frederik and Seitz, Sebastian and Hellmann, Andreas and Sorge, Christoph
(2014)
Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication.
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Böhm, Klemens
(2014)
Multivariate Maximal Correlation Analysis.
Noschinski, Lars and Rizkallah, Christine and Mehlhorn, Kurt
(2014)
Verification of Certifying Computations through AutoCorres and Simpl.
Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014)
Privacy-preserving audit for broker-based health information exchange.
Olberding, Simon and Wessely, Michael and Steimle, Jürgen
(2014)
PrintScreen: fabricating highly customizable thin-film touch-displays.
Ou, Jifei and Yao, Lining and Tauber, Daniel and Steimle, Jürgen and Niiyama, Ryuma and Ishii, Hiroshi
(2014)
jamSheets: thin interfaces with tunable stiffness enabled by layer jamming.
Pecina, Kim and Mohammadi, Esfandiar and Pöpper, Christina
(2014)
Zero-Communication Seed Establishment for Anti-Jamming Techniques.
Pepik, Bojan and Stark, Michael and Gehler, Peter and Schiele, Bernt
(2014)
Multi-view Priors for Learning Detectors from Sparse Viewpoint Data.
Perl, Henning and Fahl, Sascha and Smith, Matthew
(2014)
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores.
Petrlic, Ronald and Jungmann, Alexander and Platenius, Marie Christin and Schäfer, Wilhelm and Sorge, Christoph
(2014)
Security and Privacy Challenges in On-The-Fly Computing.
Petrlic, Ronald and Lutters, Sascha and Sorge, Christoph
(2014)
Privacy-Preserving Reputation Management.
Petrlic, Ronald and Sorge, Christoph
(2014)
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption.
Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014)
Leveraging semantic signatures for bug search in binary programs.
Pishchulin, Leonid and Andriluka, Mykhaylo and Schiele, Bernt
(2014)
Fine-grained Activity Recognition with Holistic and Pose Based Features.
Platenius, Marie Christin and Arifulina, Svetlana and Petrlic, Ronald and Schäfer, Wilhelm
(2014)
Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.
Podosinnikova, Anastasia and Setzer, Simon and Hein, Matthias
(2014)
Robust PCA: Optimization of the Robust Reconstruction Error Over the Stiefel Manifold.
Rangapuram, Syama Sundar and Mudrakarta, Pramod Kaushik and Hein, Matthias
(2014)
Tight Continuous Relaxation of the Balanced k-Cut Problem.
Reineke, Jan and Altmeyer, Sebastian and Grund, Daniel and Hahn, Sebastian and Maiza, Claire
(2014)
Selfish-LRU: Preemption-aware caching for predictability and performance.
Reineke, Jan and Doerfert, Johannes
(2014)
Architecture-parametric timing analysis.
Reineke, Jan and Doerfert, Johannes
(2014)
Architecture-parametric timing analysis.
Reineke, Jan and Maksoud, Mohamed Abdel
(2014)
A Compiler Optimization to Increase the Efficiency of WCET Analysis.
Reineke, Jan and Tripakis, Stavros
(2014)
Basic Problems in Multi-View Modeling.
Reineke, Jan and Wilhelm, Reinhard
(2014)
Impact of resource sharing on performance and performance prediction.
Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2014)
Image-Based Synthesis and Re-synthesis of Viewpoints Guided by 3D Models.
Reznichenko, Alexey and Francis, Paul
(2014)
Private-by-Design Advertising Meets the Real World.
Riebler, Heinrich and Kenter, Tobias and Plessl, Christian and Sorge, Christoph
(2014)
Reconstructing AES Key Schedules from Decayed Memory with FPGAs.
Rohrbach, Anna and Rohrbach, Marcus and Qiu, Wei and Friedrich, Annemarie and Pinkal, Manfred and Schiele, Bernt
(2014)
Coherent Multi-sentence Video Description with Variable Level of Detail.
Rossow, Christian
(2014)
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014)
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Ruffing, Tim and Moreno-Sanchez, Pedro and Kate, Aniket
(2014)
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2014)
ProCrawl: Mining Test Models from Multi-user Web Applications.
Simeonovski, Milivoj
(2014)
Poster: Quasi-ID: In fact, I am a human.
Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014)
Bridging the Gap Between Digital Cryptography and the Physical World.
Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014)
Ubic: Bridging the Gap between Digital Cryptography and the Physical World.
Sorge, Christoph and Petrlic, Ronald
(2014)
Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen.
Spliet, Roy and Vanga, Manohar and Brandenburg, Björn B. and Dziadek, Sven
(2014)
Fast on Average, Predictable in the Worst Case: Exploring Real-Time Futexes in LITMUSRT.
Steimle, Jürgen and Olberding, Simon and Wessely, Michael
(2014)
Digitale Fabrikation von flexiblen Displays und Touch-Oberflächen.
Stock, Ben and Johns, Martin
(2014)
Protecting Users Against XSS-based Password Manager Abuse.
Stock, Ben and Lekies, Sebastian and Johns, Martin
(2014)
DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land.
Stock, Ben and Lekies, Sebastian and Mueller, Tobias and Spiegel, Patrick and Johns, Martin
(2014)
Precise Client-side Protection against DOM-based Cross-Site Scripting.
Sutter, Jan and Sons, Kristian and Slusallek, Philipp
(2014)
Blast: a binary large structured transmission format for the web.
Tandon, Niket and de, Gerard Melo and Suchanek, Fabian M and Weikum, Gerhard
(2014)
WebChild: harvesting and organizing commonsense knowledge from the web.
Tandon, Niket and de Melo, Gerard and Weikum, Gerhard
(2014)
Acquiring Comparative Commonsense Knowledge from the Web.
Thome, Julian and Gorla, Alessandra and Zeller, Andreas
(2014)
Search-based Security Testing of Web Applications.
Tippenhauer, Nils Ole and Temple, William G. and Vu, An Hoa and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew and Sanders, William
(2014)
Automatic Generation of Security Argument Graphs.
Turon, Aaron and Vafeiadis, Viktor and Dreyer, Derek
(2014)
GPS: navigating weak memory with ghosts, protocols, and separation.
Viswanath, Bimal and Bashir, Ahmad M and Crovella, Mark and Guha, Saikat and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2014)
Towards Detecting Anomalous User Behavior in Online Social Networks.
Vu, An Hoa and Tippenhauer, Nils Ole and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew
(2014)
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
Wei-Chen, Walon and Johnson, Gregory and McCulley, Daniel and Grau, Oliver and Fritz, Mario
(2014)
Object Disambiguation for Augmented Reality Applications.
Weier, Martin and Maiero, Jens and Roth, Thorsten and Hinkenjann, André and Slusallek, Philipp
(2014)
Lazy details for large high-resolution displays.
Weigel, Martin and Mehta, Vikram and Steimle, Jürgen
(2014)
More than touch: understanding how people use skin as an input surface for mobile computing.
Weikum, Gerhard
(2014)
Big Text: von Sprache zu Wissen.
Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014)
On Measuring the Impact of DDoS Botnets.
Wieder, Alexander and Brandenburg, Björn B.
(2014)
On the Complexity of Worst-Case Blocking Analysis of Nested Critical Sections.
Winkler, Christian and Löchtefeld, Markus and Dobbelstein, David and Krüger, Antonio and Rukzio, Enrico
(2014)
SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction.
Yosef, Mohamed Amir and Spaniol, Marc and Weikum, Gerhard
(2014)
AIDArabic A Named-Entity Disambiguation Framework for Arabic Text.
Article
Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014)
Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3).
pp. 49-54.
Axer, Philip and Ernst, Rolf and Falk, Heiko and Girault, Alain and Grund, Daniel and Guan, Nan and Jonsson, Bengt and Marwedel, Peter and Reineke, Jan and Rochange, Christine and Sebastian, Maurice and Hanxleden, Reinhard von and Wilhelm, Reinhard and Yi, Wang
(2014)
Building timing predictable embedded systems.
ACM Transactions on Embedded Computing Systems, 13 (4).
p. 82.
Backes, Michael and Dagdelen, Özgür and Fischlin, Marc and Gajek, Sebastian and Meiser, Sebastian and Schröder, Dominique
(2014)
Operational Signature Schemes.
IACR Cryptology ePrint Archive, 2014.
p. 820.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014)
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2).
pp. 301-353.
Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat
(2014)
Parameterized Synthesis Case Study: AMBA AHB.
CoRR, abs/14.
Borges, Georg
(2014)
Cloud Computing und Datenschutz.
Datenschutz und Datensicherheit, 38 (3).
165–169.
Brandenburg, Björn B.
(2014)
Blocking Optimality in Distributed Real-Time Locking Protocols.
LITES, 1 (2).
01: 1-01: 22.
Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014)
A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3).
pp. 1-33.
Böhmer, Matthias and Krüger, Antonio
(2014)
A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers.
International Journal of Mobile Human Computer Interaction (IJMHCI), 6 (2).
pp. 32-45.
Christodoulou, Giorgos and Mehlhorn, Kurt and Pyrga, Evangelia
(2014)
Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms.
Algorithmica, 69 (3).
619–640.
Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, Kristopher K. and Rabe, Markus N. and Sánchez, César
(2014)
Temporal Logics for Hyperproperties.
CoRR, abs/14.
Davidovic, Tomás and Krivánek, Jaroslav and Hasan, Milos and Slusallek, Philipp
(2014)
Progressive Light Transport Simulation on the GPU: Survey and Improvements.
ACM Trans. Graph., 33 (3).
29:1–29:19.
Dittrich, Jens
(2014)
Die Umgedrehte Vorlesung - Chancen für die Informatiklehre.
Datenbank-Spektrum, 14 (1).
69–76.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptology ePrint Archive, 2014.
p. 482.
Finkbeiner, Bernd and Rabe, Markus N.
(2014)
The linear-hyper-branching spectrum of temporal logics.
it - Information Technology, 56 (6).
273–279.
Freymann, Hans-Peter and Vogelgesang, Stephanie
(2014)
Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte.
Zeitschrift für Schadensrecht.
pp. 544-555.
Galeotti, Juan P. and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014)
Automating Full Functional Verification of Programs with Loops.
CoRR - Computing Research Repository, abs/14.
Gomez-Rodriguez, Manuel and Leskovec, Jure
(2014)
Visualizing information networks: the 2011 Fukushima earthquake.
AI Matters, 1 (1).
23–24.
Gruschka, Nils and Iacono, Luigi Lo and Sorge, Christoph
(2014)
Analysis of the Current State in Website Certificate Validation.
Security and Communication Networks, 7 (5).
pp. 865-877.
Helmert, Malte and Haslum, Patrik and Hoffmann, Jörg and Nissim, Raz
(2014)
Merge-and-Shrink Abstraction: A Method for Generating Lower Bounds in Factored State Spaces.
J. ACM, 61 (3).
16:1–16:63.
Hessel, Stefan and Klose, Carsten
(2014)
Blut und Boden: Die NS-Agrarideologie und die Extreme Rechte heute.
Forum Recht (1).
pp. 21-22.
Jacobs, Swen
(2014)
Extended AIGER Format for Synthesis.
CoRR, abs/14.
Jacobs, Swen and Bloem, Roderick
(2014)
Parameterized Synthesis.
Logical Methods in Computer Science, 10 (1).
Jungmann, Alexander and Brangewitz, Sonja and Petrlic, Ronald and Platenius, Marie Christin
(2014)
Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.
International Journal On Advances in Intelligent Systems, 7 (4).
Jurkiewicz, Tomasz and Mehlhorn, Kurt
(2014)
On a Model of Virtual Address Translation.
ACM Journal of Experimental Algorithmics, 19 (1).
Kawahara, Yoshihiro and Hodges, Steve and Gong, Nan-Wei and Olberding, Simon and Steimle, Jürgen
(2014)
Building Functional Prototypes Using Conductive Inkjet Printing.
IEEE Pervasive Computing, 13 (3).
30–38.
Keyder, Emil Ragip and Hoffmann, Jörg and Haslum, Patrik
(2014)
Improving Delete Relaxation Heuristics Through Explicitly Represented Conjunctions.
J. Artif. Intell. Res., 50.
487–533.
Kissmann, Peter and Hoffmann, Jörg
(2014)
BDD Ordering Heuristics for Classical Planning.
J. Artif. Intell. Res., 51.
779–804.
Krüger, Antonio
(2014)
Räumliche Benutzerschnittstellen.
Informatik Spektrum, 37 (5).
423–427.
Köster, Marcel and Leißa, Roland and Hack, Sebastian and Membarth, Richard and Slusallek, Philipp
(2014)
Code Refinement of Stencil Codes.
Parallel Processing Letters, 24 (3).
Kütük, Merih Erdem and Sorge, Christoph
(2014)
Bitcoin im deutschen Vollstreckungsrecht.
Multimedia und Recht, 17 (10).
pp. 643-646.
Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014)
Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53.
pp. 95-108.
Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014)
Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 269-270.
ISSN 0170-7256
Leibenger, Dominik and Möllers, Frederik and Petrlic, Ronald
(2014)
Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 269-270.
Li, Wenbin and Fritz, Mario
(2014)
Learning Multi-Scale Representations for Material Classification.
CoRR, abs/14.
Maffei, Matteo
(2014)
Security & privacy column.
SIGLOG News, 1 (1).
p. 6.
Malinowski, Mateusz and Fritz, Mario
(2014)
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input.
CoRR, abs/14.
Malinowski, Mateusz and Fritz, Mario
(2014)
A Pooling Approach to Modelling Spatial Relations for Image Retrieval and Annotation.
CoRR, abs/14.
Malinowski, Mateusz and Fritz, Mario
(2014)
Towards a Visual Turing Challenge.
CoRR, abs/14.
Megiddo, Nimrod and Mehlhorn, Kurt and Savani, Rahul and Vazirani, Vijay V.
(2014)
Equilibrium Computation (Dagstuhl Seminar 14342).
Dagstuhl Reports, 4 (8).
73–88.
Miettinen, Pauli and Vreeken, Jilles
(2014)
MDL4BMF : Minimum Description Length for Boolean Matrix Factorization.
Transactions on Knowledge Discovery from Data, 8 (4).
pp. 1-31.
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Klemens, Böhm
(2014)
Unsupervised Interaction-Preserving Discretization of Multivariate Data.
Data Mining and Knowledge Discovery, 28 (5).
pp. 1366-1397.
Petrlic, Ronald and Sorge, Christoph
(2014)
Establishing user trust in Automated Teller Machine Integrity.
IET Information Security, 8 (2).
pp. 132-139.
Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2014)
Efficiently Spotting the Starting Points of an Epidemic in a Large Graph.
Knowledge and Information Systems, 38 (1).
pp. 35-59.
Pryvalov, Ivan and Kate, Aniket
(2014)
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2014.
p. 247.
Qu, Lizhen and Zhang, Yi and Wang, Rui and Jiang, Lili and Gemulla, Rainer and Weikum, Gerhard
(2014)
Senti-LSSVM: Sentiment-Oriented Multi-Relation Extraction with Latent Structural SVM.
TACL, 2.
155–168.
Reineke, Jan
(2014)
Randomized Caches Considered Harmful in Hard Real-Time Systems.
LITES, 1 (1).
03:1–03:13.
Rossberg, Andreas and Russo, Claudio V and Dreyer, Derek
(2014)
F-ing modules.
J. Funct. Program., 24 (5).
pp. 529-607.
Schaub, Thomas and Moll, Simon and Karrenberg, Ralf and Hack, Sebastian
(2014)
The Impact of the SIMD Width on Control-Flow and Memory Divergence.
TACO, 11 (4).
54:1–54:25.
Snelting, Gregor and Giffhorn, Dennis and Graf, Jürgen and Hammer, Christian and Hecker, Martin and Mohr, Martin and Wasserrab, Daniel
(2014)
Checking probabilistic noninterference using JOANA.
it - Information Technology, 56 (6).
pp. 280-287.
Sons, Kristian and Klein, Felix and Sutter, Jan and Slusallek, Philipp
(2014)
shade.js: Adaptive Material Descriptions.
Comput. Graph. Forum, 33 (7).
51–60.
Sorge, Christoph
(2014)
The Legal Classification of Identity-Based Signatures.
Computer Law and Security Review, 30 (2).
pp. 126-136.
Steimle, Jürgen and Hornecker, Eva and Schmidt, Albrecht
(2014)
Interaction Beyond the Desktop.
Informatik Spektrum, 37 (5).
p. 385.
Steimle, Jürgen and Olberding, Simon
(2014)
Verformbaren Mobilgeräten gehört die Zukunft - Wie gedruckte Elektronik und deformierbare Bildschirme die Interaktion mit mobilen Anwendungen verändern werden.
Informatik Spektrum, 37 (5).
402–406.
Suchanek, Fabian M and Weikum, Gerhard
(2014)
Knowledge Bases in the Age of Big Data Analytics.
PVLDB, 7 (13).
pp. 1713-1714.
Tabuada, Paulo and Caliskan, Sina Yamac and Rungger, Matthias and Majumdar, Rupak
(2014)
Towards Robustness for Cyber-Physical Systems.
IEEE Trans. Automat. Contr., 59 (12).
3151–3163.
Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014)
Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1).
pp. 58-69.
Telaar, Daniel and Krüger, Antonio and Schöning, Johannes
(2014)
A Large-Scale Quantitative Survey of the German Geocaching Community in 2007.
Adv. Human-Computer Interaction, 2014.
257815:1–257815:11.
Valera, Isabel and Gomez-Rodriguez, Manuel and Gummadi, Krishna P.
(2014)
Modeling Diffusion of Competing Products and Conventions in Social Media.
CoRR, abs/14.
Verbeek, Freek and Tverdyshev, Sergey and Havle, Oto and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Nemouchi, Yakoub and Feliachi, Abderrahmane and Wolff, Burkhart and Schmaltz, Julien
(2014)
Formal Specification of a Generic Separation Kernel.
Archive of Formal Proofs, 2014.
Woll, Robin and Birkenstock, Matthias and Mohr, Daniel and Berrang, Pascal and Steffens, Tino and Loviscach, Jörn
(2014)
Hundert Jahre Quizze-und nichts dazugelernt?(Visionen & Konzepte).
Proceedings of GMW 2014.
pp. 200-206.
Woll, Robin and Buschbeck, Sven and Steffens, Tino and Berrang, Pascal and Loviscach, Jörn
(2014)
A Platform that Integrates Quizzes into Videos.
Proceedings of the European MOOC Stakeholder Summit 2014.
p. 155.
Wu, Hao and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2014)
Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas.
Data Mining and Knowledge Discovery, 28 (5).
pp. 1398-1428.
Wuhrer, Stefanie and Pishchulin, Leonid and Brunton, Alan and Shu, Chang and Lang, Jochen
(2014)
Estimation of Human Body Shape and Posture Under Clothing.
Computer Vision and Image Understanding, 127.
pp. 31-42.
Zamani, Majid and Esfahani, Peyman Mohajerin and Majumdar, Rupak and Abate, Alessandro and Lygeros, John
(2014)
Symbolic Control of Stochastic Systems via Approximately Bisimilar Finite Abstractions.
IEEE Trans. Automat. Contr., 59 (12).
3135–3150.
Zeller, Andreas and Wei, Yi and Meyer, Bertrand and Nordio, Martin and Furia, Carlo A. and Pei, Yu
(2014)
Automated Fixing of Programs with Contracts.
IEEE Transactions on Software Engineering, 40 (5).
pp. 427-449.
ISSN 0098-5589
Zinnikus, Ingo and Byelozyorov, Sergiy and Cao, Xiaoqi and Klusch, Matthias and Krauss, Christopher and Nonnengart, Andreas and Spieldenner, Torsten and Warwas, Stefan and Slusallek, Philipp
(2014)
A Collaborative VirtualWorkspace for Factory Configuration and Evaluation.
EAI Endorsed Trans. Collaborative Computing, 1 (1).
e5.
de Melo, Gerard and Weikum, Gerhard
(2014)
Taxonomic data integration from multilingual Wikipedia editions.
Knowl. Inf. Syst., 39 (1).
1–39.
von Luxburg, Ulrike and Radl, Agnes and Hein, Matthias
(2014)
Hitting and commute times in large random neighborhood graphs.
Journal of Machine Learning Research, 15 (1).
1751–1798.
Thesis
Brachmann, Niklas
(2014)
Evaluating the Effectiveness of In-app DRM Systems for Android.
Bachelors thesis, Saarland University.
Derr, Erik
(2014)
Verifying the Internet Access of Android Applications.
Masters thesis, Saarland University.
Dietrich, Aljoscha
(2014)
Rechtliche und technische Aspekte des Datenschutzes bei intelligenten Messsystemen (Smart Metern).
Masters thesis, UNSPECIFIED.
Endner-Dühr, Frederic
(2014)
Application-level Firewall in Stock Android.
Bachelors thesis, Saarland University.
Frey, Tobias
(2014)
System Centric IPC Call Chains for Android.
Bachelors thesis, Saarland University.
Grishchenko, Ilya
(2014)
Static Analysis of Android Applications.
Masters thesis, Saarland University.
Perlov, Artem
(2014)
Identifying the Optimal Permission Set of Android Applications.
Bachelors thesis, Saarland University.
Petrlic, Ronald
(2014)
Privacy-Preserving Multiparty Digital Rights Management.
Doctoral thesis, University of Paderborn.
Reischuk, Raphael M.
(2014)
Declarative Design and Enforcement for Secure Cloud Applications.
Doctoral thesis, Saarland University.
Schweig, Marc
(2014)
Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.
Book Section
Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014)
Information Flow Control in WebKit's JavaScript Bytecode.
In:
Principles of Security and Trust.
Springer.
Herzig, Kim and Zeller, Andreas
(2014)
Mining Bug Data: A Practitioner’s Guide.
In:
Recommendation Systems in Software Engineering.
Springer Berlin Heidelberg, pp. 131-171.
ISBN 978-3-642-45134-8
Hoffmann, Jörg and Weber, Ingo
(2014)
Web Service Composition.
In:
Encyclopedia of Social Network Analysis and Mining.
UNSPECIFIED, 2389–2399.
Leibenger, Dominik and Sorge, Christoph
(2014)
Automatismen in einem verteilten System: Das Beispiel Bitcoin.
In:
UNSPECIFIED
Schriftenreihe des Graduiertenkollegs
.
Wilhelm Fink, pp. 161-174.
Sorge, Christoph
(2014)
The German electronic identity card: Lessons learned.
In:
UNSPECIFIED
IGI Global.
Book
UNSPECIFIED, ed.
(2014)
Proceedings Second Workshop on Synthesis, SYNT 2013, Saint Petersburg, Russia, July 13th and July 14th, 2013.
EPTCS, 142
.
UNSPECIFIED.
UNSPECIFIED, ed.
(2014)
Proceedings of the 2nd International Workshop on Eye Tracking for Spatial Research co-located with the 8th International Conference on Geographic Information Science, ET4S@GIScience 2014, Vienna, Austria, September 23, 2014.
CEUR Workshop Proceedings, 1241
.
CEUR-WS.org.
UNSPECIFIED, ed.
(2014)
Trustworthy Global Computing - 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers.
Lecture Notes in Computer Science, 8902
.
Springer.
Butz, Andreas and Krüger, Antonio
(2014)
Mensch-Maschine-Interaktion.
Oldenbourg.
Chau, Duen Horng and Vreeken, Jilles and Matthijs, van Leeuwen and Faloutsos, Christos
(2014)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-130.
Dietzfelbinger, Martin and Mehlhorn, Kurt and Sanders, Peter
(2014)
Algorithmen und Datenstrukturen - die Grundwerkzeuge.
eXamen.press
.
Springer.
Kovalev, Mikhail and Müller, Silvia M. and Paul, Wolfgang J.
(2014)
A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof.
UNSPECIFIED.
Zimek, Arthur and Assent, Ira and Vreeken, Jilles
(2014)
Frequent Pattern Mining.
Springer.
Monograph
Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014)
Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report.
UNSPECIFIED.
(Unpublished)
Other
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Differentially Private Data Aggregation with Optimal Utility.
Giustiniano, Domenico and Mangold, Stefan and Tippenhauer, Nils Ole
(2014)
Visible light communication with flickering prevention.
This list was generated on Wed Nov 20 16:49:45 2024 CET.