Number of items: 293.
A
Abel, Andreas and Reineke, Jan
(2015)
MeMin: SAT-based Exact Minimization of Incompletely Specified Mealy Machines.
Abiteboul, Serge and Dong, Xin Luna and Etzioni, Oren and Srivastava, Divesh and Weikum, Gerhard and Stoyanovich, Julia and Suchanek, Fabian M
(2015)
The elephant in the room: getting value from Big Data.
Akata, Zeynep and Reed, Scott and Walter, Daniel and Lee, Honglak and Schiele, Bernt
(2015)
Evaluation of Output Embeddings for Fine-grained Image Classification.
Altmeyer, Sebastian and Davis, Robert I. and Indrusiak, Leandro Soares and Maiza, Claire and Nélis, Vincent and Reineke, Jan
(2015)
A generic and compositional framework for multicore response time analysis.
Altmeyer, Sebastian and Davis, Robert I. and Indrusiak, Leandro Soares and Maiza, Claire and Nélis, Vincent and Reineke, Jan
(2015)
A generic and compositional framework for multicore response time analysis.
Altmeyer, Sebastian and Lisper, Björn and Maiza, Claire and Reineke, Jan and Rochange, Christine
(2015)
WCET and Mixed-Criticality: What does Confidence in WCET Estimations Depend Upon?
Alvarez, V. and Richter, Stefan and Chen, X. and Dittrich, Jens
(2015)
A comparison of adaptive radix trees and hash tables.
Alvin, Chris and Gulwani, Sumit and Majumdar, Rupak and Mukhopadhyay, Supratik
(2015)
Automatic Synthesis of Geometry Problems for an Intelligent Tutoring System.
CoRR, abs/15.
Andreychenko, Alexandr and Mikeev, Linar and Wolf, Verena
(2015)
Model Reconstruction for Moment-Based Stochastic Chemical Kinetics.
ACM Transactions on Modeling and Computer Simulation, 25 (2).
12:1–12:19.
Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015)
Reliable Recon in Adversarial Peer-to-Peer Botnets.
Antonioli, Daniele and Tippenhauer, Nils Ole
(2015)
MiniCPS: A toolkit for security research on CPS Networks.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015)
Mining Apps for Abnormal Usage of Sensitive Data.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015)
Mining apps for abnormal usage of sensitive data.
and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling and Nilges, Tobias
(2015)
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling and Nilges, Tobias
(2015)
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
and Dominique Schr\"der, Nico D\"ttling
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
B
Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015)
On the Users' Efficiency in the Twitter Information Network.
Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015)
Quantifying Information Overload in Social Media and its Impact on Social Contagions.
Bachynskyi, Myroslav and Palmas, Gregorio and Oulasvirta, Antti and Steimle, Jürgen and Weinkauf, Tino
(2015)
Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation.
Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015)
ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015)
PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015)
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.
Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
Boxify: Full-fledged App Sandboxing for Stock Android.
Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015)
Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015)
Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2).
178 - 191.
ISSN 1545-5971
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015)
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Backes, Michael and Köpf, Boris
(2015)
Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.
Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015)
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015)
Computational Soundness for Interactive Primitves.
Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
Backes, Peter and Reineke, Jan
(2015)
ASTRA: A Tool for Abstract Interpretation of Graph Transformation Systems.
Backes, Peter and Reineke, Jan
(2015)
Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction.
Bauer, Markus
(2015)
The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.
Becchetti, Luca and Bonifaci, Vincenzo and Dirnberger, Michael and Karrenbauer, Andreas and Mehlhorn, Kurt and Varma, Girish
(2015)
P. polycephalum Can Compute Shortest Paths.
Bhadra, Sahely and Hein, Matthias
(2015)
Correction of noisy labels via mutual consistency check.
Neurocomputing, 160.
34–52.
Bhatotia, Pramod and Fonseca, Pedro and Acar, Umut A. and Brandenburg, Björn B. and Rodrigues, Rodrigo
(2015)
iThreads: A Threading Library for Parallel Incremental Computation.
Bichhawat, Abhishek and Hammer, Christian and Garg, Deepak and Rajani, Vineet
(2015)
Information Flow Control for Event Handling and the DOM in Web Browsers.
Birkedal, Lars and Dreyer, Derek and Gardner, Philippa and Shao, Zhong
(2015)
Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191).
Dagstuhl Reports, 5 (5).
1–23.
Birkedal, Lars and Dreyer, Derek and Gardner, Philippa and Shao, Zhong
(2015)
Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191).
Dagstuhl Reports, 5 (5).
pp. 1-23.
Bloem, Roderick and Chatterjee, Krishnendu and Jacobs, Swen and Könighofer, Robert
(2015)
Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information.
Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat and Konnov, Igor and Rubin, Sasha and Veith, Helmut and Widder, Josef
(2015)
Decidability of Parameterized Verification.
Synthesis Lectures on Distributed Computing Theory
.
Morgan & Claypool Publishers.
Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
Bock, Christoph and Bortolussi, Luca and Krüger, Thilo and Mikeev, Linar and Wolf, Verena
(2015)
Model-Based Whole-Genome Analysis of DNA Methylation Fidelity.
Boonk, Martin and Petrlic, Ronald and Sorge, Christoph
(2015)
Save Our Passwords.
Bortolussi, Luca and Krüger, Thilo and Lehr, Thorsten and Wolf, Verena
(2015)
Rule-based modelling and simulation of drug-administration policies.
Bouget, David and Benenson, Rodrigo and Omran, Mohamed and Riffaud, Laurent and Schiele, Bernt and Jannin, Pierre
(2015)
Detecting Surgical Tools by Modelling Local Appearance and Global Shape.
IEEE Transactions on Medical Imaging, 34 (12).
2603–2617.
Budhathoki, Kailash and Vreeken, Jilles
(2015)
The Difference and the Norm — Characterising Similarities and Differences between Databases.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2015)
Affine Refinement Types for Secure Distributed Programming.
ACM Transactions on Programming Languages and Systems, 37 (4).
11:1-11:66.
C
Chakraborty, Soham and Henzinger, Thomas A. and Sezgin, Ali and Vafeiadis, Viktor
(2015)
Aspect-oriented linearizability proofs.
Logical Methods in Computer Science, 11 (1).
Chalermsook, Parinya and Goswami, Mayank and Kozma, László and Mehlhorn, Kurt and Saranurak, Thatchaphol
(2015)
Greedy Is an Almost Optimal Deque.
Chalermsook, Parinya and Goswami, Mayank and Kozma, László and Mehlhorn, Kurt and Saranurak, Thatchaphol
(2015)
Pattern-Avoiding Access in Binary Search Trees.
Chalermsook, Parinya and Goswami, Mayank and Kozma, László and Mehlhorn, Kurt and Saranurak, Thatchaphol
(2015)
Self-Adjusting Binary Search Trees: What Makes Them Tick?
Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2015)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-72.
Chistikov, Dmitry and Dimitrova, Rayna and Majumdar, Rupak
(2015)
Approximate Counting in SMT and Value Estimation for Probabilistic Programs.
Chistikov, Dmitry and Dimitrova, Rayna and Majumdar, Rupak
(2015)
Approximate Counting in SMT and Value Estimation for Probabilistic Programs.
Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5).
pp. 639-652.
Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015)
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Correa, Denzil and Silva, Leandro Araújo and Mondal, Mainack and Benevenuto, Fabrício and Gummadi, Krishna P.
(2015)
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
Corro, Luciano Del and Abujabal, Abdalghani and Gemulla, Rainer and Weikum, Gerhard
(2015)
FINET: Context-Aware Fine-Grained Named Entity Typing.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Cramer, Ronald and Damgård, Ivan Bjerre and Döttling, Nico and Fehr, Serge and Spini, Gabriele
(2015)
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Cramer, Ronald and and Nico D\"ttling, Ivan Bjerre Damgård and Fehr, Serge and Spini, Gabriele
(2015)
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Cramer, Ronald and and Nico D\"ttling, Ivan Bjerre Damgård and Fehr, Serge and Spini, Gabriele
(2015)
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
IACR Cryptology ePrint Archive, 2015.
p. 1089.
D
D\"ttling, Nico
(2015)
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
Dahmen, Tim and Roland, Michael and Tjardes, Thorsten and Bouillon, Bertiol and Slusallek, Philipp and Diebels, Stefan
(2015)
An automated workflow for the biomechanical simulation of a tibia with implant using computed tomography and the finite element method.
Computers & Mathematics with Applications, 70 (5).
903–916.
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
A Logic of Programs with Interface-Confined Code.
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).
Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Sharma, Divya and Sinha, Arunesh
(2015)
Program Actions as Actual Causes: A Building Block for Accountability.
Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015)
Quantifying Conformance Using the Skorokhod Metric.
Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015)
Quantifying Conformance Using the Skorokhod Metric.
Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015)
Quantifying Conformance using the Skorokhod Metric (full version).
CoRR, abs/15.
Dimitrova, Rayna and Majumdar, Rupak
(2015)
Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs.
Dimitrova, Rayna and Majumdar, Rupak
(2015)
Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs.
Dirnberger, Michael and Kehl, Tim and Mehlhorn, Tim and Mehlhorn, Kurt and Neumann, Adrian
(2015)
Towards an open online repository of P. polycephalum networks and their corresponding graph representations.
Dittrich, Jens
(2015)
The Case for Small Data Management.
Dittrich, Jens and Bender, Patrick
(2015)
Janiform intra-document analytics for reproducible research.
Proceedings of the VLDB Endowment - Proceedings of the 41st International Conference on Very Large Data Bases, Kohala Coast, 8 (12).
pp. 1972-1975.
Doerfert, Johannes and Streit, Kevin and Hack, Sebastian and Benaissa, Zino
(2015)
Polly's Polyhedral Scheduling in the Presence of Reductions.
CoRR, abs/15.
Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015)
Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221.
pp. 73-114.
Doychev, Goran and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2015)
CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 18 (1).
4:1–4:32.
Doychev, Goran and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2015)
CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 18 (1).
4:1-4:32.
Duan, Ran and Mehlhorn, Kurt
(2015)
A combinatorial polynomial algorithm for the linear Arrow-Debreu market.
Information and Computation, 243.
112–132.
Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015)
Model Checking Parameterized Asynchronous Shared-Memory Systems.
Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015)
Model Checking Parameterized Asynchronous Shared-Memory Systems.
CoRR, abs/15.
Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015)
Model Checking Parameterized Asynchronous Shared-Memory Systems.
Dutta, Sourav and Weikum, Gerhard
(2015)
C3EL: A Joint Model for Cross-Document Co-Reference Resolution and Entity Linking.
Dutta, Sourav and Weikum, Gerhard
(2015)
Cross-Document Co-Reference Resolution using Sample-Based Clustering with Knowledge Enrichment.
TACL, 3.
15–28.
Döttling, Nico
(2015)
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn and Nilges, Tobias
(2015)
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
Döttling, Nico and Schröder, Dominique
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
E
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015)
Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In:
UNSPECIFIED
Cryptology and Information Security Series, 13
.
IOS Press, 81 - 105.
Elbassioni, Khaled M. and Makino, Kazuhisa and Mehlhorn, Kurt and Ramezani, Fahimeh
(2015)
On Randomized Fictitious Play for Approximating Saddle Points Over Convex Sets.
Algorithmica, 73 (2).
441–459.
Elbassioni, Khaled M. and Mehlhorn, Kurt and Ramezani, Fahimeh
(2015)
Towards More Practical Linear Programming-Based Techniques for Algorithmic Mechanism Design.
Elhayek, Ahmed and de Aguiar, Edilson and Tompson, Jonathan and Jain, Arjun and Pishchulin, Leonid and Andriluka, Mykhaylo and Bregler, Chri and Schiele, Bernt and Theobalt, Christian
(2015)
Efficient ConvNet-based Marker-less Motion Capture in General Scenes with a Low Number of Cameras.
Emmi, Michael and Ganty, Pierre and Majumdar, Rupak and Rosa-Velardo, Fernando
(2015)
Analysis of Asynchronous Programs with Event-Based Synchronization.
Esparza, Javier and Ganty, Pierre and Leroux, Jérôme and Majumdar, Rupak
(2015)
Verification of Population Protocols.
F
Farajtabar, M. and Wang, Y and Gomez-Rodriguez, Manuel and Li, S and Zha, H and Song, Le
(2015)
COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015)
Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Wang, Yichen and Li, Shuang and Zha, Hongyuan and Song, Le
(2015)
Co-evolutionary Dynamics of Information Diffusion and Network Structure.
Fatz, Filip
(2015)
Toward a Backward-compatible API for Defining Fine-grained App Policies on Android.
Bachelors thesis, Saarland University.
Finkbeiner, Bernd
(2015)
Bounded Synthesis for Petri Games.
Finkbeiner, Bernd and Gieseking, Manuel and Olderog, Ernst-Rüdiger
(2015)
Adam: Causality-Based Synthesis of Distributed Systems.
Finkbeiner, Bernd and Rabe, Markus N. and Sanchez, Cesar
(2015)
Algorithms for Model Checking HyperLTL and HyperCTL ^*.
Finkbeiner, Bernd and Tentrup, Leander
(2015)
Detecting Unrealizability of Distributed Fault-tolerant Systems.
Logical Methods in Computer Science, 11 (3).
Francis, Paul
(2015)
Network Address Translation (NAT).
Computer Communication Review, 45 (2).
p. 50.
Frassinelli, Daniel
(2015)
Security Analysis of Telematic and Emergency Devices in a Modern Car.
Masters thesis, Saarland University.
Freymann, Hans-Peter and Vogelgesang, Stephanie
(2015)
Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte.
Zeitschrift für Schadensrecht.
pp. 543-554.
G
Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2015)
Inferring Loop Invariants by Mutation, Dynamic Analysis, and Static Checking.
IEEE Transactions of Software Engineering, 41 (10).
1019–1037.
Garg, Deepak and Çiçek, Ezgi and Acar, Umut A.
(2015)
Refinement Types for Incremental Computational Complexity.
Gavran, Ivan and Niksic, Filip and Kanade, Aditya and Majumdar, Rupak and Vafeiadis, Viktor
(2015)
Rely/Guarantee Reasoning for Asynchronous Programs.
Ghosh, Satrajit and Kate, Aniket
(2015)
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Gnad, Daniel and Hoffmann, Jörg
(2015)
Beating LM-Cut with h-max (Sometimes): Fork-Decoupled State Space Search.
Gnad, Daniel and Hoffmann, Jörg
(2015)
Red-Black Planning: A New Tractability Analysis and Heuristic Function.
Gnad, Daniel and Hoffmann, Jörg and Domshlak, Carmel
(2015)
From Fork Decoupling to Star-Topology Decoupling.
Goga, Oana and Loiseau, Patrick and Sommer, Robin and Teixeira, Renata and Gummadi, Krishna P.
(2015)
On the Reliability of Profile Matching Across Large Online Social Networks.
Goga, Oana and Venkatadri, Giridhari and Gummadi, Krishna P.
(2015)
The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
Gomez-Rodriguez, Manuel and Song, Le
(2015)
Diffusion in Social and Information Networks: Research Problems, Probabilistic Models and Machine Learning Methods.
Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2015)
Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests.
Grabowicz, Przemyslaw A. and Romero-Ferrero, Francisco and Lins, Theo and de Polavieja, Gonzalo G. and Benevenuto, Fabricio and Gummadi, Krishna P.
(2015)
An experimental study of opinion influenceability.
CoRR, abs/15.
Grosse, Kathrin and González, María Paula and Chesñevar, Carlos Iván and Maguitman, Ana Gabriela
(2015)
Integrating argumentation and sentiment analysis for mining opinions from Twitter.
AI Commun., 28 (3).
pp. 387-401.
Grycner, Adam and Weikum, Gerhard and Pujara, Jay and Foulds, James R. and Getoor, Lise
(2015)
RELLY: Inferring Hypernym Relationships Between Relational Phrases.
Gujarati, Arpan and Brandenburg, Björn B.
(2015)
When Is CAN the Weakest Link? A Bound on Failures-in-Time in CAN-Based Real-Time Systems.
Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2015)
Multiprocessor real-time scheduling with arbitrary processor affinities: from practice to theory.
Real-Time Systems, 51 (4).
pp. 440-483.
H
H., Mohamed and Yosef, Mohamed Amir and Weikum, Gerhard
(2015)
EDRAK: Entity-Centric Data Resource for Arabic Knowledge.
H., Mohamed and Yosef, Mohamed Amir and Weikum, Gerhard
(2015)
Named Entity Disambiguation for Resource-Poor Languages.
Hahn, Sebastian and Reineke, Jan and Wilhelm, Reinhard
(2015)
Toward Compact Abstractions for Processor Pipelines.
Hahn, Sebastian and Reineke, Jan and Wilhelm, Reinhard
(2015)
Towards compositionality in execution time analysis: definition and challenges.
SIGBED Review, 12 (1).
28–36.
Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015)
Verifiably Encrypted Signatures: Security Revisited and a New Construction.
Hein, Matthias and Lugosi, Gábor and Rosasco, Lorenzo
(2015)
Mathematical and Computational Foundations of Learning Theory (Dagstuhl Seminar 15361).
Dagstuhl Reports, 5 (8).
54–0.
Hemed, Nir and Rinetzky, Noam and Vafeiadis, Viktor
(2015)
Modular Verification of Concurrency-Aware Linearizability.
Hessel, Stefan
(2015)
Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS".
Hessel, Stefan
(2015)
Ein Plädoyer für e-Klausuren im Jurastudium.
JurPC (Web-Do).
Hoffart, Johannes and Preda, Nicoleta and Suchanek, Fabian M and Weikum, Gerhard
(2015)
Knowledge Bases for Web Content Analytics.
Hoffmann, Jörg
(2015)
Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
Hoffmann, Jörg and Fern, Alan
(2015)
Journal Track Paper Abstracts.
Hoffmann, Jörg and Fickert, Maximilian
(2015)
Explicit Conjunctions without Compilation: Computing h-FF(Pi-C) in Polynomial Time.
Hosang, Jan and Omran, Mohamed and Benenson, Rodrigo and Schiele, Bernt
(2015)
Taking a Deeper Look at Pedestrians.
J
Jacobs, Michael and Hahn, Sebastian and Hack, Sebastian
(2015)
WCET analysis for multi-core processors with shared buses and event-driven bus arbitration.
Jacobs, Swen and Bloem, Roderick and Brenguier, Romain and Könighofer, Robert and Perez, Guillermo A. and Raskin, Jean-Francois and Ryzhyk, Leonid and Sankur, Ocan and Seidl, Martina and Tentrup, Leander and Walker, Adam
(2015)
The Second Reactive Synthesis Competition (SYNTCOMP 2015).
Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015)
Efficient Output Kernel Learning for Multiple Tasks.
Jia, Xiao and Li, Wei and Vafeiadis, Viktor
(2015)
Proving Lock-Freedom Easily and Automatically.
Jung, Ralf and Swasey, David and Sieczkowski, Filip and Svendsen, Kasper and Turon, Aaron and Birkedal, Lars and Dreyer, Derek
(2015)
Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning.
K
Kang, Jeehoon and Hur, Chung-Kil and Mansky, William and Garbuzov, Dmitri and Zdancewic, Steve and Vafeiadis, Viktor
(2015)
A formal C memory model supporting integer-pointer casts.
Karaev, Sanjar and Miettinen, Pauli and Vreeken, Jilles
(2015)
Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization.
Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015)
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Kerber, Frederic and Lessel, Pascal and Krüger, Antonio
(2015)
Same-side Hand Interactions with Arm-placed Devices Using EMG.
Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015)
Classifier based graph construction for video segmentation.
Kloos, Johannes and Majumdar, Rupak and Vafeiadis, Viktor
(2015)
Asynchronous Liquid Separation Types.
Koch, Simon
(2015)
Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.
Kokoschka, Andreas and Petrlic, Ronald and Sorge, Christoph
(2015)
A Reputation System supporting Unlinkable, yet Authorized Expert Ratings.
Kosmalla, Felix and Daiber, Florian and Krüger, Antonio
(2015)
ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units.
Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2015)
Summarizing and Understanding Large Graphs.
Statistical Analysis and Data Mining, 8 (3).
pp. 183-202.
Kraschewski, Daniel and Nilges, Tobias and Döttling, Nico and Müller-Quade, Jörn
(2015)
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
Krämer, Lukas and Krupp, Johannes and Makita, Daisuke and Nishizoe, Tomomi and Koide, Takashi and Yoshioka, Katsunari and Rossow, Christian
(2015)
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
Krüger, Jochen and Vogelgesang, Stephanie
(2015)
Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht.
Kulshrestha, Juhi and Zafar, Muhammad Bilal and Noboa, Lisette Espin and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015)
Characterizing Information Diets of Social Media Users.
Kuznetsov, Konstantin
(2015)
Poster: Mining Apps for Abnormal Usage of Sensitive Data.
Kuznetsov, Konstantin and Gorla, Alessandra and Tavecchia, Ilaria and Groß, Florian and Zeller, Andreas
(2015)
Mining Android Apps for Anomalies.
In:
Perspectives on Data Science for Software Engineering.
The Art and Science of Analyzing Software Data.
ISBN 9780124115194
Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015)
Going Wild: Large-Scale Classification of Open DNS Resolvers.
Künnemann, Robert
(2015)
Automated Backward Analysis of PKCS#11 v2.20.
L
Lahav, Ori and Vafeiadis, Viktor
(2015)
Owicki-Gries Reasoning for Weak Memory Models.
Lander, Christian and Coenen, Norine and Biewer, Sebastian and Krüger, Antonio
(2015)
Kollaboratives Text Lesen: Adaptive Text Scroll Geschwindigkeit.
Lander, Christian and Gehring, Sven and Krüger, Antonio and Boring, Sebastian and Bulling, Andreas
(2015)
GazeProjector: Accurate Gaze Estimation and Seamless Gaze Interaction Across Multiple Displays.
Lander, Christian and Speicher, Marco and Paradowski, Denise and Coenen, Norine and Biewer, Sebastian and Krüger, Antonio
(2015)
Collaborative Newspaper Demo: Exploring an adaptive Scrolling Algorithm in a Multi-user Reading Scenario.
Lander, Christian and Speicher, Marco and Paradowski, Denise and Coenen, Norine and Biewer, Sebastian and Krüger, Antonio
(2015)
Collaborative Newspaper: Exploring an adaptive Scrolling Algorithm in a Multi-user Reading Scenario.
Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015)
Top-k Multiclass SVM.
Leibenger, Dominik and Petrlic, Ronald and Sorge, Christoph and Vogelgesang, Stephanie
(2015)
Elektronische Akten: Anforderungen und technische Lösungsmöglichkeiten.
Leißa, Roland and Boesche, Klaas and Hack, Sebastian and Membarth, Richard and Slusallek, Philipp
(2015)
Shallow embedding of DSLs via online partial evaluation.
Leißa, Roland and Köster, Marcel and Hack, Sebastian
(2015)
A graph-based higher-order intermediate representation.
Lekies, Sebastian and Stock, Ben and Wentzel, Martin and Johns, Martin
(2015)
The Unexpected Dangers of Dynamic JavaScript.
Lessel, Pascal and Altmeyer, Maximilian and Krüger, Antonio
(2015)
Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully.
Lessel, Pascal and Müller, Marc and Krüger, Antonio
(2015)
Towards a Novel Issue Tracking System for "Industry 4.0" Environments.
Li, Wenbin and Fritz, Mario
(2015)
Teaching robots the use of human tools from demonstration with non-dexterous end-effectors.
Lischke, Lars and Grüninger, Jürgen and Klouche, Khalil and Schmidt, Albrecht and Slusallek, Philipp and Jacucci, Giulio
(2015)
Interaction Techniques for Wall-Sized Screens.
Lubos, Paul and Ariza, Oscar and Bruder, Gerd and Daiber, Florian and Steinicke, Frank and Krüger, Antonio
(2015)
HoverSpace - Analyses of the Perceived Spatial Affordances of Hover Interaction Above Tabletop Surfaces.
Löchtefeld, Markus and Jäckel, Christian and Krüger, Antonio
(2015)
TwitSoccer: knowledge-based crowd-sourcing of live soccer events.
Löchtefeld, Markus and Schardt, Phillip and Krüger, Antonio and Boring, Sebastian
(2015)
Detecting users handedness for ergonomic adaptation of mobile user interfaces.
M
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015)
Privacy and Access Control for Outsourced Personal Records.
Maiya, Pallavi and Gupta, Rahul and Kanade, Aditya and Majumdar, Rupak
(2015)
A Partial Order Reduction Technique for Event-driven Multi-threaded Programs.
CoRR, abs/15.
Majumdar, Rupak and Prabhu, Vinayak S.
(2015)
Computing the Skorokhod distance between polygonal traces.
Majumdar, Rupak and Prabhu, Vinayak S.
(2015)
Computing the Skorokhod distance between polygonal traces.
Majumdar, Rupak and Wang, Zilong
(2015)
Bbs: A Phase-Bounded Model Checker for Asynchronous Programs.
Malinowski, Mateusz and Fritz, Mario
(2015)
Hard to Cheat: A Turing Test based on Answering Questions about Images.
CoRR, abs/15.
Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015)
Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images.
Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015)
Ask Your Neurons: A Neural-based Approach to Answering Questions about Images.
CoRR, abs/15.
Mehlhorn, Kurt
(2015)
On the Implementation of Combinatorial Algorithms for the Linear Exchange Market.
In:
Algorithms, Probability, Networks, and Games.
Lecture Notes in Computer Science, 9295
.
Springer, 87–94.
Mehlhorn, Kurt and Sagraloff, Michael and Wang, Pengming
(2015)
From approximate factorization to root isolation with application to cylindrical algebraic decomposition.
Journal of Symbolic Computation, 66.
34–69.
Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015)
Guardat: enforcing data policies at the storage layer.
Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015)
Symbolic Malleable Zero-knowledge Proofs.
Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015)
Privacy Preserving Payments in Credit Networks.
Mukherjee, Subhabrata and Lamba, Hemank and Weikum, Gerhard
(2015)
Experience-Aware Item Recommendation in Evolving Review Communities.
Mukherjee, Subhabrata and Weikum, Gerhard
(2015)
Leveraging Joint Interactions for Credibility Analysis in News Communities.
Möllers, Frederik and Sorge, Christoph
(2015)
Hausautomationssysteme im Datenschutzrecht.
N
Neis, Georg and Hur, Chung-Kil and Kaiser, Jan-Oliver and McLaughlin, Craig and Dreyer, Derek and Vafeiadis, Viktor
(2015)
Pilsner: a compositionally verified compiler for a higher-order imperative language.
Ngoc, Quynh Nguyen and Gautier, Antoine and Hein, Matthias
(2015)
A flexible tensor block coordinate ascent scheme for hypergraph matching.
Nguyen, Hoang-Vu and Vreeken, Jilles
(2015)
Non-Parametric Jensen-Shannon Divergence.
O
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015)
Person Recognition in Personal Photo Collections.
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015)
Person Recognition in Personal Photo Collections.
CoRR, abs/15.
Olberding, Simon and Ortega, Sergio Soto and Hildebrandt, Klaus and Steimle, Jürgen
(2015)
Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electronics.
Olberding, Simon and Steimle, Jürgen and Nanayakkara, Suranga and Maes, Pattie
(2015)
CloudDrops: Stamp-sized Pervasive Displays for Situated Awareness of Web-based Information.
Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha
(2015)
To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections.
P
Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015)
IoTPOT: Analysing the Rise of IoT Compromises.
Patel, Vikash
(2015)
Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.
Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj
(2015)
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Pellegrino, Giancarlo and Rossow, Christian and Ryba, Fabrice J. and Schmidt, Thomas C. and Wählisch, Matthias
(2015)
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.
Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian
(2015)
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
Pepik, Bojan and Benenson, Rodrigo and Ritschel, Tobias and Schiele, Bernt
(2015)
What is Holding Back Convnets for Detection?
Pepik, Bojan and Stark, Michael and Gehler, Peter and Ritschel, Tobias and Schiele, Bernt
(2015)
3D Object Class Detection in the Wild.
Pepik, Bojan and Stark, Michael and Gehler, Peter and Schiele, Bernt
(2015)
Multi-view and 3D Deformable Part Models.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 37 (11).
2232–2245.
Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015)
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015)
Cross-Architecture Bug Search in Binary Executables.
Pfaff, David and Hack, Sebastian and Hammer, Christian
(2015)
Learning How to Prevent Return-Oriented Programming Efficiently.
Pienta, Robert and Lin, Zhang and Kahng, M. and Vreeken, Jilles and Talukdar, Partha and Abello, J. and Parameswaran, G. and Chau, D.H.
(2015)
AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs.
Porto, Daniel and Leitão, João and Li, Cheng and Clement, Allen and Kate, Aniket and Junqueira, Flavio Paiva and Rodrigues, Rodrigo
(2015)
Visigoth fault tolerance.
Prytkova, Natalia and Weikum, Gerhard and Spaniol, Marc
(2015)
Aligning Multi-Cultural Knowledge Taxonomies by Combinatorial Optimization.
R
Raber, Frederic and Krüger, Antonio and Kahl, Gerrit
(2015)
The Comparison of Performance, Efficiency, and Task Solution Strategies in Real, Virtual and Dual Reality Environments.
Reineke, Jan and Salinger, Alejandro
(2015)
On the Smoothness of Paging Algorithms.
Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2015)
Deep Reflectance Maps.
CoRR, abs/15.
Richter, Stefan and Alvarez, Victor and Dittrich, Jens
(2015)
A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing.
PVLDB, 9 (3).
pp. 96-107.
Rohrbach, Anna and Rohrbach, Marcus and Schiele, Bernt
(2015)
The Long-short Story of Movie Description.
Rohrbach, Anna and Rohrbach, Marcus and Tandon, Niket and Schiele, Bernt
(2015)
A Dataset for Movie Description.
Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015)
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015)
Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
Ryba, Fabrice J. and Orlinski, Matthew and Wählisch, Matthias and Rossow, Christian and Schmidt, Thomas C.
(2015)
Amplification and DRDoS Attack Defense - A Survey and New Perspectives.
CoRR, abs/15.
S
Saha, Indranil and Baruah, Sanjoy and Majumdar, Rupak
(2015)
Dynamic scheduling for networked control systems.
Salvesen, Kevin and Galeotti, Juan Pablo and Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2015)
Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing.
Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015)
Prediction of search targets from fixations in open-world settings.
Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015)
Prediction of search targets from fixations in open-world settings.
CoRR, abs/15.
Schmitz, Martin and Khalilbeigi, Mohammadreza and Balwierz, Matthias and Lissermann, Roman and Mühlhäuser, Max and Steimle, Jürgen
(2015)
Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects.
Schmuck, Anne-Kathrin and Majumdar, Rupak
(2015)
Dynamic Hierarchical Reactive Controller Synthesis.
CoRR, abs/15.
Schneider, Jonas
(2015)
Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.
Schneider, Jonas and Schröder, Dominique
(2015)
Foundations of Reconfigurable PUFs.
Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2015)
A First-Order Functional Intermediate Language for Verified Compilers.
CoRR, abs/15.
Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2015)
A Linear First-Order Functional Intermediate Language for Verified Compilers.
Schranz, Oliver
(2015)
Towards Compiler-Assisted Taint Tracking on the Android Runtime.
Masters thesis, Saarland University.
Schröder, Dominique and Döttling, Nico
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
Schröder, Dominique and Simkin, Mark
(2015)
VeriStream - A Framework for Verifiable Data Streaming.
Schuh, Stefan and Dittrich, Jens
(2015)
AIR: Adaptive Index Replacement in Hadoop.
Schuhknecht, Felix Martin and Khanchandani, Pankaj and Dittrich, Jens
(2015)
On the Surprising Difficulty of Simple Things: The Case of Radix Partitioning.
Proc. VLDB Endow., 8 (9).
pp. 934-937.
Schulte, Christian and Taneva, Bilyana and Weikum, Gerhard
(2015)
On-topic Cover Stories from News Archives.
Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2015)
Mining Workflow Models from Web Applications.
IEEE Trans. Software Eng., 41 (12).
1184–1201.
Schwarz, Fabian Frank
(2015)
Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.
Seiter, Julia and Wei-Chen, Chiu and Fritz, Mario and Amft, Oliver and Tröster, Gerhard
(2015)
Joint segmentation and activity discovery using semantic and temporal priors.
Sharma, Gaurav and Schiele, Bernt
(2015)
Scalable Nonlinear Embeddings for Semantic Category-based Image Retrieval.
Shcherbatyi, Iaroslav and Bulling, Andreas and Fritz, Mario
(2015)
GazeDPM: Early Integration of Gaze Information in Deformable Part Models.
CoRR, abs/15.
Shilkrot, Roy and Huber, Jochen and Steimle, Jürgen and Nanayakkara, Suranga and Maes, Pattie
(2015)
Digital Digits: A Comprehensive Survey of Finger Augmentation Devices.
ACM Comput. Surv., 48 (2).
30:1–30:29.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015.
p. 592.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
Siu, Amy and Weikum, Gerhard
(2015)
Semantic Type Classification of Common Words in Biomedical Noun Phrases.
Slawski, Martin and Li, Ping and Hein, Matthias
(2015)
Regularization-Free Estimation in Trace Regression with Symmetric Positive Semidefinite Matrices.
Sons, Kristian and Klein, Felix and Sutter, Jan and Slusallek, Philipp
(2015)
The XML3D architecture.
Sorge, Christoph
(2015)
Bargeld und andere Bezahlverfahren.
Wirtschaftsdienst, 95 (8).
pp. 519-522.
Sorge, Christoph and Krüger, Jochen
(2015)
E-Akte, elektronischer Rechtsverkehr und Barrierefreiheit.
Neue Juristische Wochenschrift, 68 (38).
pp. 2764-2767.
Soudjani, Sadegh Esmaeil Zadeh and Abate, Alessandro and Majumdar, Rupak
(2015)
Dynamic Bayesian Networks as Formal Abstractions of Structured Stochastic Processes.
Soudjani, Sadegh Esmaeil Zadeh and Abate, Alessandro and Majumdar, Rupak
(2015)
Dynamic Bayesian Networks as Formal Abstractions of Structured Stochastic Processes.
CoRR, abs/15.
Spier, Steffen
(2015)
Cold boot attacks and the error model of DRAM modules.
Bachelors thesis, Saarland University.
Steimle, Jürgen
(2015)
Printed electronics for human-computer interaction.
Interactions, 22 (3).
72–75.
Stock, Ben and Kaiser, Bernd and Pfistner, Stephan and Lekies, Sebastian and Johns, Martin
(2015)
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting.
Sundareisan, Shashi and Vreeken, Jilles and Prakash, B. Aditya
(2015)
Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics.
Sutter, Jan and Sons, Kristian and Slusallek, Philipp
(2015)
A CSS integration model for declarative 3D.
T
Tamm, Georg and Slusallek, Philipp
(2015)
Plugin free remote visualization in the browser.
Tandon, Niket and Weikum, Gerhard and de Melo, Gerard and De, Abir
(2015)
Lights, Camera, Action: Knowledge Extraction from Movie Scripts.
Tandon, Niket and de Melo, Gerard and De, Abir and Weikum, Gerhard
(2015)
Knowlywood: Mining Activity Knowledge From Hollywood Narratives.
Tang, Siyu and Andres, Bjoern and Andriluka, Mykhaylo and Schiele, Bernt
(2015)
Subgraph Decomposition for Multi-target Tracking.
Tassarotti, Joseph and Dreyer, Derek and Vafeiadis, Viktor
(2015)
Verifying read-copy-update in a logic for weak memory.
Tippenhauer, Nils Ole and Luecken, Heinrich and Kuhn, Marc and Capkun, Srdjan
(2015)
UWB Rapid-Bit-Exchange System for Distance Bounding.
Tiwari, Abishek
(2015)
Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.
Torralba, Àlvaro and Hoffmann, Jörg
(2015)
Simulation-Based Admissible Dominance Pruning.
U
Unger, Nik and Dechand, Sergej and Bonneau, Joseph and Fahl, Sascha and Perl, Henning and Goldberg, Ian and Smith, Matthew
(2015)
SoK: Secure Messaging.
V
Vafeiadis, Viktor
(2015)
Formal Reasoning about the C11 Weak Memory Model.
Vafeiadis, Viktor and Balabonski, Thibaut and Chakraborty, Soham and Morisset, Robin and Nardelli, Francesco Zappa
(2015)
Common Compiler Optimisations are Invalid in the C11 Memory Model and what we can do about it.
Valera, Isabel and Gomez-Rodriguez, Manuel
(2015)
Modeling Adoption and Usage of Competing Products.
Verbeek, Freek and Havle, Oto and Schmaltz, Julien and Tverdyshev, Sergey and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Wolff, Burkhart and Nemouchi, Yakoub
(2015)
Formal API Specification of the PikeOS Separation Kernel.
Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015)
Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Vreeken, Jilles
(2015)
Causal Inference by Direction of Information.
von Radziewsky, Luisa and Krüger, Antonio and Löchtefeld, Markus
(2015)
Scarfy: Augmenting Human Fashion Behaviour with Self-Actuated Clothes.
W
Wei-Chen, Walon and Fritz, Mario
(2015)
See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
Wei-Chen, Walon and Fritz, Mario
(2015)
See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
CoRR, abs/15.
Weigel, Martin and Lu, Tong and Bailly, Gilles and Oulasvirta, Antti and Majidi, Carmel and Steimle, Jürgen
(2015)
iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile Computing.
Weigel, Martin and Steimle, Jürgen
(2015)
iSkin: Stretchable On-Body Touch Sensors for Mobile Computing.
Wißfeld, Marvin
(2015)
ArtHook: Callee-side Method Hook Injection on the New Android Runtime ART.
Bachelors thesis, Saarland University.
Y
Yang, Maolin and Wieder, Alexander and Brandenburg, Björn B.
(2015)
Global Real-Time Semaphore Protocols: A Survey, Unified Analysis, and Comparison.
Z
Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015)
Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream.
TWEB, 9 (3).
12:1-12:33.
Zeller, Andreas
(2015)
Test Complement Exclusion: Guarantees from Dynamic Analysis.
Zeller, Andreas and Hammacher, Clemens and Doerfert, Johannes and Streit, Kevin and Hack, Sebastian
(2015)
Generalized Task Parallelism.
ACM Transactions on Architecture and Code Optimization (TACO), 12 (1).
p. 8.
Zeller, Andreas and Herzig, Kim and Just, Sascha
(2015)
It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction.
Zeller, Andreas and Weyrich, Michael
(2015)
Test case selection for networked production systems.
Zhang, Shanshan and Benenson, Rodrigo and Schiele, Bernt
(2015)
Filtered Channel Features for Pedestrian Detection.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015)
Appearance-Based Gaze Estimation in the Wild.
CoRR, abs/15.
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015)
Appearance-based gaze estimation in the wild.
Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2015)
Mtac: A monad for typed tactic programming in Coq.
J. Funct. Program., 25.
Zimek, Arthur and Vreeken, Jilles
(2015)
The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives.
Machine Learning, 98 (1).
pp. 121-155.
This list was generated on Sat Dec 21 00:54:27 2024 CET.