Items where Year is 2015

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 297.

Conference or Workshop Item (A Paper)

Abel, Andreas and Reineke, Jan
(2015) MeMin: SAT-based Exact Minimization of Incompletely Specified Mealy Machines.
In: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2015, Austin, TX, USA, November 2-6, 2015.
Conference: ICCAD IEEE/ACM International Conference on Computer-Aided Design

Abiteboul, Serge and Dong, Xin Luna and Etzioni, Oren and Srivastava, Divesh and Weikum, Gerhard and Stoyanovich, Julia and Suchanek, Fabian M
(2015) The elephant in the room: getting value from Big Data.
In: Proceedings of the 18th International Workshop on Web and Databases (WebDB '15).

Akata, Zeynep and Reed, Scott and Walter, Daniel and Lee, Honglak and Schiele, Bernt
(2015) Evaluation of Output Embeddings for Fine-grained Image Classification.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Altmeyer, Sebastian and Davis, Robert I. and Indrusiak, Leandro Soares and Maiza, Claire and Nélis, Vincent and Reineke, Jan
(2015) A generic and compositional framework for multicore response time analysis.
In: Proceedings of the 23rd International Conference on Real Time Networks and Systems, RTNS 2015, Lille, France, November 4-6, 2015.

Altmeyer, Sebastian and Davis, Robert I. and Indrusiak, Leandro Soares and Maiza, Claire and Nélis, Vincent and Reineke, Jan
(2015) A generic and compositional framework for multicore response time analysis.
In: Proceedings of the 23rd International Conference on Real Time Networks and Systems, RTNS 2015, Lille, France, November 4-6, 2015.

Altmeyer, Sebastian and Lisper, Björn and Maiza, Claire and Reineke, Jan and Rochange, Christine
(2015) WCET and Mixed-Criticality: What does Confidence in WCET Estimations Depend Upon?
In: 15th International Workshop on Worst-Case Execution Time Analysis, WCET 2015, July 7, 2015, Lund, Sweden.

Alvarez, V. and Richter, Stefan and Chen, X. and Dittrich, Jens
(2015) A comparison of adaptive radix trees and hash tables.
In: 2015 IEEE 31st International Conference on Data Engineering.
Conference: ICDE International Conference on Data Engineering

Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015) Reliable Recon in Adversarial Peer-to-Peer Botnets.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Antonioli, Daniele and Tippenhauer, Nils Ole
(2015) MiniCPS: A toolkit for security research on CPS Networks.
In: Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS.

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015) Mining Apps for Abnormal Usage of Sensitive Data.
In: Proceedings of the 37th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015) Mining apps for abnormal usage of sensitive data.
In: In Proceedings of Grande Region Security and Reliability Day.

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015) On the Users' Efficiency in the Twitter Information Network.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015) Quantifying Information Overload in Social Media and its Impact on Social Contagions.
In: ICWSM '15: Proceedings of the 9th International AAAI Conference on Weblogs and Social Media.

Bachynskyi, Myroslav and Palmas, Gregorio and Oulasvirta, Antti and Steimle, Jürgen and Weinkauf, Tino
(2015) Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation.
In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, Seoul, Republic of Korea, April 18-23, 2015.
Conference: CHI International Conference on Human Factors in Computing Systems

Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015) ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015) PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
In: Proceedings of the 4th Conference on Principles of Security and Trust (POST).

Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) Boxify: Full-fledged App Sandboxing for Stock Android.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015) Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
In: ACM ASIACCS Security in Cloud Computing Workshop 2015.

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).

Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015) Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
In: Proceedings on Privacy Enhancing Technologies.

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015) Computational Soundness for Interactive Primitves.
In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15).
Conference: ESORICS European Symposium On Research In Computer Security

Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Peter and Reineke, Jan
(2015) ASTRA: A Tool for Abstract Interpretation of Graph Transformation Systems.
In: Model Checking Software - 22nd International Symposium, SPIN 2015, Stellenbosch, South Africa, August 24-26, 2015, Proceedings.

Backes, Peter and Reineke, Jan
(2015) Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction.
In: Verification, Model Checking, and Abstract Interpretation - 16th International Conference, VMCAI 2015, Mumbai, India, January 12-14, 2015. Proceedings.

Becchetti, Luca and Bonifaci, Vincenzo and Dirnberger, Michael and Karrenbauer, Andreas and Mehlhorn, Kurt and Varma, Girish
(2015) P. polycephalum Can Compute Shortest Paths.
In: BICT 2015 - International Conference on Bio-inspired Information and Communications Technologies.

Bhatotia, Pramod and Fonseca, Pedro and Acar, Umut A. and Brandenburg, Björn B. and Rodrigues, Rodrigo
(2015) iThreads: A Threading Library for Parallel Incremental Computation.
In: Proc. of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '15).
Conference: ASPLOS Architectural Support for Programming Languages and Operating Systems

Bichhawat, Abhishek and Hammer, Christian and Garg, Deepak and Rajani, Vineet
(2015) Information Flow Control for Event Handling and the DOM in Web Browsers.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Bloem, Roderick and Chatterjee, Krishnendu and Jacobs, Swen and Könighofer, Robert
(2015) Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information.
In: Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
In: Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15).
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Bock, Christoph and Bortolussi, Luca and Krüger, Thilo and Mikeev, Linar and Wolf, Verena
(2015) Model-Based Whole-Genome Analysis of DNA Methylation Fidelity.
In: Hybrid Systems Biology - Fourth International Workshop, HSB 2015, Madrid, Spain, September 4-5, 2015. Revised Selected Papers.

Boonk, Martin and Petrlic, Ronald and Sorge, Christoph
(2015) Save Our Passwords.
In: Proceedings of The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
Conference: TrustCom International Conference on Trust, Security and Privacy in Computing and Communications

Bortolussi, Luca and Krüger, Thilo and Lehr, Thorsten and Wolf, Verena
(2015) Rule-based modelling and simulation of drug-administration policies.
In: Proceedings of the Symposium on Modeling and Simulation in Medicine, part of the 2015 Spring Simulation Multiconference, SpringSim '15, Alexandria, VA, USA, April 12-15, 2015.

Budhathoki, Kailash and Vreeken, Jilles
(2015) The Difference and the Norm — Characterising Similarities and Differences between Databases.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Chalermsook, Parinya and Goswami, Mayank and Kozma, László and Mehlhorn, Kurt and Saranurak, Thatchaphol
(2015) Greedy Is an Almost Optimal Deque.
In: WADS 2015: Workshop on Algorithms and Data Structures.

Chalermsook, Parinya and Goswami, Mayank and Kozma, László and Mehlhorn, Kurt and Saranurak, Thatchaphol
(2015) Pattern-Avoiding Access in Binary Search Trees.
In: FOCS.
Conference: FOCS IEEE Symposium on Foundations of Computer Science

Chalermsook, Parinya and Goswami, Mayank and Kozma, László and Mehlhorn, Kurt and Saranurak, Thatchaphol
(2015) Self-Adjusting Binary Search Trees: What Makes Them Tick?
In: ESA.
Conference: ESA European Symposium on Algorithms

Chistikov, Dmitry and Dimitrova, Rayna and Majumdar, Rupak
(2015) Approximate Counting in SMT and Value Estimation for Probabilistic Programs.
In: Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings.

Chistikov, Dmitry and Dimitrova, Rayna and Majumdar, Rupak
(2015) Approximate Counting in SMT and Value Estimation for Probabilistic Programs.
In: Proc. 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 15).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015) Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015).
Conference: CCS ACM Conference on Computer and Communications Security

Correa, Denzil and Silva, Leandro Araújo and Mondal, Mainack and Benevenuto, Fabrício and Gummadi, Krishna P.
(2015) The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.

Corro, Luciano Del and Abujabal, Abdalghani and Gemulla, Rainer and Weikum, Gerhard
(2015) FINET: Context-Aware Fine-Grained Named Entity Typing.
In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, EMNLP 2015, Lisbon, Portugal, September 17-21, 2015.
Conference: EMNLP Empirical Methods in Natural Language Processing

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
In: Proceedings of the 4th International Conference on Principles of Security and Trust (POST).

Cramer, Ronald and Damgård, Ivan Bjerre and Döttling, Nico and Fehr, Serge and Spini, Gabriele
(2015) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Cramer, Ronald and and Nico D\"ttling, Ivan Bjerre Damgård and Fehr, Serge and Spini, Gabriele
(2015) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
In: EUROCRYPT (2).

D\"ttling, Nico
(2015) Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
In: Public Key Cryptography.

Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015) A Logic of Programs with Interface-Confined Code.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Sharma, Divya and Sinha, Arunesh
(2015) Program Actions as Actual Causes: A Building Block for Accountability.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Quantifying Conformance Using the Skorokhod Metric.
In: Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part II.
Conference: CAV Computer Aided Verification

Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Quantifying Conformance Using the Skorokhod Metric.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Dimitrova, Rayna and Majumdar, Rupak
(2015) Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs.
In: Proceedings Sixth International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2015, Genoa, Italy, 21-22nd September 2015..

Dimitrova, Rayna and Majumdar, Rupak
(2015) Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs.
In: Proceedings of 6th International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2015).

Dirnberger, Michael and Kehl, Tim and Mehlhorn, Tim and Mehlhorn, Kurt and Neumann, Adrian
(2015) Towards an open online repository of P. polycephalum networks and their corresponding graph representations.
In: BICT 2015 - International Conference on Bio-inspired Information and Communications Technologies.

Dittrich, Jens
(2015) The Case for Small Data Management.
In: Datenbanksysteme für Business, Technologie und Web (BTW), 16. Fachtagung des GI-Fachbereichs "Datenbanken und Informationssysteme" (DBIS), 4.-6.3.2015 in Hamburg, Germany. Proceedings.

Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015) Model Checking Parameterized Asynchronous Shared-Memory Systems.
In: Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I.
Conference: CAV Computer Aided Verification

Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015) Model Checking Parameterized Asynchronous Shared-Memory Systems.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Dutta, Sourav and Weikum, Gerhard
(2015) C3EL: A Joint Model for Cross-Document Co-Reference Resolution and Entity Linking.
In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, EMNLP 2015, Lisbon, Portugal, September 17-21, 2015.
Conference: EMNLP Empirical Methods in Natural Language Processing

Döttling, Nico
(2015) Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
In: PKC.

Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn and Nilges, Tobias
(2015) From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
In: ProvSec.

Döttling, Nico and Schröder, Dominique
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Elbassioni, Khaled M. and Mehlhorn, Kurt and Ramezani, Fahimeh
(2015) Towards More Practical Linear Programming-Based Techniques for Algorithmic Mechanism Design.
In: SAGT 2015 - International Symposium on Algorithmic Game Theory.

Elhayek, Ahmed and de Aguiar, Edilson and Tompson, Jonathan and Jain, Arjun and Pishchulin, Leonid and Andriluka, Mykhaylo and Bregler, Chri and Schiele, Bernt and Theobalt, Christian
(2015) Efficient ConvNet-based Marker-less Motion Capture in General Scenes with a Low Number of Cameras.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Emmi, Michael and Ganty, Pierre and Majumdar, Rupak and Rosa-Velardo, Fernando
(2015) Analysis of Asynchronous Programs with Event-Based Synchronization.
In: Programming Languages and Systems - 24th European Symposium on Programming, ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings.

Esparza, Javier and Ganty, Pierre and Leroux, Jérôme and Majumdar, Rupak
(2015) Verification of Population Protocols.
In: 26th International Conference on Concurrency Theory, CONCUR 2015, Madrid, Spain, September 1.4, 2015.
Conference: CONCUR International Conference on Concurrency Theory

Farajtabar, M. and Wang, Y and Gomez-Rodriguez, Manuel and Li, S and Zha, H and Song, Le
(2015) COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
In: NIPS '15: Advances in Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015) Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
In: Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS International Conference on Artificial Intelligence and Statistics

Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Wang, Yichen and Li, Shuang and Zha, Hongyuan and Song, Le
(2015) Co-evolutionary Dynamics of Information Diffusion and Network Structure.
In: Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18-22, 2015 - Companion Volume.
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Finkbeiner, Bernd
(2015) Bounded Synthesis for Petri Games.
In: Correct System Design - Symposium in Honor of Ernst-Rüdiger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings.

Finkbeiner, Bernd and Gieseking, Manuel and Olderog, Ernst-Rüdiger
(2015) Adam: Causality-Based Synthesis of Distributed Systems.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Rabe, Markus N. and Sanchez, Cesar
(2015) Algorithms for Model Checking HyperLTL and HyperCTL ^*.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Garg, Deepak and Çiçek, Ezgi and Acar, Umut A.
(2015) Refinement Types for Incremental Computational Complexity.
In: Proceedings of the 24th European Symposium on Programming (ESOP '15).
Conference: ESOP European Symposium on Programming

Gavran, Ivan and Niksic, Filip and Kanade, Aditya and Majumdar, Rupak and Vafeiadis, Viktor
(2015) Rely/Guarantee Reasoning for Asynchronous Programs.
In: Proceedings of the 26th International Conference on Concurrency Theory (CONCUR '15).
Conference: CONCUR International Conference on Concurrency Theory

Ghosh, Satrajit and Kate, Aniket
(2015) Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
In: Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers.

Gnad, Daniel and Hoffmann, Jörg
(2015) Beating LM-Cut with h-max (Sometimes): Fork-Decoupled State Space Search.
In: Proceedings of the Twenty-Fifth International Conference on Automated Planning and Scheduling, ICAPS 2015, Jerusalem, Israel, June 7-11, 2015..
Conference: ICAPS International Conference on Automated Planning and Scheduling

Gnad, Daniel and Hoffmann, Jörg
(2015) Red-Black Planning: A New Tractability Analysis and Heuristic Function.
In: Proceedings of the 8th Annual Symposium on Combinatorial Search (SOCS'15).

Gnad, Daniel and Hoffmann, Jörg and Domshlak, Carmel
(2015) From Fork Decoupling to Star-Topology Decoupling.
In: Proceedings of the Eighth Annual Symposium on Combinatorial Search, SOCS 2015, 11-13 June 2015, Ein Gedi, the Dead Sea, Israel..

Goga, Oana and Loiseau, Patrick and Sommer, Robin and Teixeira, Renata and Gummadi, Krishna P.
(2015) On the Reliability of Profile Matching Across Large Online Social Networks.
In: Proc. of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'15).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Goga, Oana and Venkatadri, Giridhari and Gummadi, Krishna P.
(2015) The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Gomez-Rodriguez, Manuel and Song, Le
(2015) Diffusion in Social and Information Networks: Research Problems, Probabilistic Models and Machine Learning Methods.
In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, NSW, Australia, August 10-13, 2015.
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2015) Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests.
In: Proc. of the 24th International Conference on World Wide Web (WWW 2015).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Grycner, Adam and Weikum, Gerhard and Pujara, Jay and Foulds, James R. and Getoor, Lise
(2015) RELLY: Inferring Hypernym Relationships Between Relational Phrases.
In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, EMNLP 2015, Lisbon, Portugal, September 17-21, 2015.
Conference: EMNLP Empirical Methods in Natural Language Processing

Gujarati, Arpan and Brandenburg, Björn B.
(2015) When Is CAN the Weakest Link? A Bound on Failures-in-Time in CAN-Based Real-Time Systems.
In: Proceedings of the IEEE 36th Real-Time Systems Symposium (RTSS'15).
Conference: RTSS Real Time Systems Symposium

H., Mohamed and Yosef, Mohamed Amir and Weikum, Gerhard
(2015) EDRAK: Entity-Centric Data Resource for Arabic Knowledge.
In: Proceedings of the Second Workshop on Arabic Natural Language Processing, ANLP@ACL 2015, Beijing, China, July 30, 2015.

H., Mohamed and Yosef, Mohamed Amir and Weikum, Gerhard
(2015) Named Entity Disambiguation for Resource-Poor Languages.
In: Proceedings of the Eighth Workshop on Exploiting Semantic Annotations in Information Retrieval, ESAIR 2015, Melbourne, Australia, October 23, 2015.

Hahn, Sebastian and Reineke, Jan and Wilhelm, Reinhard
(2015) Toward Compact Abstractions for Processor Pipelines.
In: Correct System Design - Symposium in Honor of Ernst-Rüdiger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings.

Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015) Verifiably Encrypted Signatures: Security Revisited and a New Construction.
In: Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
Conference: ESORICS European Symposium On Research In Computer Security

Hemed, Nir and Rinetzky, Noam and Vafeiadis, Viktor
(2015) Modular Verification of Concurrency-Aware Linearizability.
In: Distributed Computing - 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings.
Conference: DISC International Symposium on Distributed Computing (was WDAG)

Hessel, Stefan
(2015) Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits "Challenge OS".
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Hoffart, Johannes and Preda, Nicoleta and Suchanek, Fabian M and Weikum, Gerhard
(2015) Knowledge Bases for Web Content Analytics.
In: Proccedings of the 24th International Conference on World Wide Web (WWW '15), Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Hoffmann, Jörg
(2015) Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2015).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Hoffmann, Jörg and Fern, Alan
(2015) Journal Track Paper Abstracts.
In: Proceedings of the Twenty-Fifth International Conference on Automated Planning and Scheduling, ICAPS 2015, Jerusalem, Israel, June 7-11, 2015..
Conference: ICAPS International Conference on Automated Planning and Scheduling

Hoffmann, Jörg and Fickert, Maximilian
(2015) Explicit Conjunctions without Compilation: Computing h-FF(Pi-C) in Polynomial Time.
In: Proceedings of the Twenty-Fifth International Conference on Automated Planning and Scheduling, ICAPS 2015, Jerusalem, Israel, June 7-11, 2015..
Conference: ICAPS International Conference on Automated Planning and Scheduling

Hosang, Jan and Omran, Mohamed and Benenson, Rodrigo and Schiele, Bernt
(2015) Taking a Deeper Look at Pedestrians.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Jacobs, Michael and Hahn, Sebastian and Hack, Sebastian
(2015) WCET analysis for multi-core processors with shared buses and event-driven bus arbitration.
In: Proceedings of the 23rd International Conference on Real Time Networks and Systems, RTNS 2015, Lille, France, November 4-6, 2015.

Jacobs, Swen and Bloem, Roderick and Brenguier, Romain and Könighofer, Robert and Perez, Guillermo A. and Raskin, Jean-Francois and Ryzhyk, Leonid and Sankur, Ocan and Seidl, Martina and Tentrup, Leander and Walker, Adam
(2015) The Second Reactive Synthesis Competition (SYNTCOMP 2015).
In: Proceedings Fourth Workshop on Synthesis, SYNT 2015, San Francisco, CA, USA, 18th July 2015..

Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015) Efficient Output Kernel Learning for Multiple Tasks.
In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Jia, Xiao and Li, Wei and Vafeiadis, Viktor
(2015) Proving Lock-Freedom Easily and Automatically.
In: Proceedings of the 2015 Conference on Certified Programs and Proofs, CPP 2015, Mumbai, India, January 15-17, 2015.

Jung, Ralf and Swasey, David and Sieczkowski, Filip and Svendsen, Kasper and Turon, Aaron and Birkedal, Lars and Dreyer, Derek
(2015) Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning.
In: Proceedings of the 43nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15).
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Kang, Jeehoon and Hur, Chung-Kil and Mansky, William and Garbuzov, Dmitri and Zdancewic, Steve and Vafeiadis, Viktor
(2015) A formal C memory model supporting integer-pointer casts.
In: Proc. of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2016).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Karaev, Sanjar and Miettinen, Pauli and Vreeken, Jilles
(2015) Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015) Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15).
Conference: ICDCS International Conference on Distributed Computing Systems

Kerber, Frederic and Lessel, Pascal and Krüger, Antonio
(2015) Same-side Hand Interactions with Arm-placed Devices Using EMG.
In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, Seoul, CHI 2015 Extended Abstracts, Republic of Korea, April 18 - 23, 2015.
Conference: CHI International Conference on Human Factors in Computing Systems

Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015) Classifier based graph construction for video segmentation.
In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'15).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Kloos, Johannes and Majumdar, Rupak and Vafeiadis, Viktor
(2015) Asynchronous Liquid Separation Types.
In: Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP'16).
Conference: ECOOP European Conference on Object-Oriented Programming

Kokoschka, Andreas and Petrlic, Ronald and Sorge, Christoph
(2015) A Reputation System supporting Unlinkable, yet Authorized Expert Ratings.
In: Proceedings of The 30th ACM/SIGAPP Symposium On Applied Computing.

Kosmalla, Felix and Daiber, Florian and Krüger, Antonio
(2015) ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units.
In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, Seoul, Republic of Korea, April 18-23, 2015.
Conference: CHI International Conference on Human Factors in Computing Systems

Kraschewski, Daniel and Nilges, Tobias and Döttling, Nico and Müller-Quade, Jörn
(2015) General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
In: TCC.
Conference: TCC Theory of Cryptography Conference

Krämer, Lukas and Krupp, Johannes and Makita, Daisuke and Nishizoe, Tomomi and Koide, Takashi and Yoshioka, Katsunari and Rossow, Christian
(2015) AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Krüger, Jochen and Vogelgesang, Stephanie
(2015) Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht.
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Kulshrestha, Juhi and Zafar, Muhammad Bilal and Noboa, Lisette Espin and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Characterizing Information Diets of Social Media Users.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.

Kuznetsov, Konstantin
(2015) Poster: Mining Apps for Abnormal Usage of Sensitive Data.
In: MSR Asia Summit 2015.

Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015) Going Wild: Large-Scale Classification of Open DNS Resolvers.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Künnemann, Robert
(2015) Automated Backward Analysis of PKCS#11 v2.20.
In: Proc. 4th International Conference on Principles of Security and Trust (POST'15).

Lahav, Ori and Vafeiadis, Viktor
(2015) Owicki-Gries Reasoning for Weak Memory Models.
In: Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part II.
Conference: ICALP International Colloquium on Automata Languages and Programming

Lander, Christian and Coenen, Norine and Biewer, Sebastian and Krüger, Antonio
(2015) Kollaboratives Text Lesen: Adaptive Text Scroll Geschwindigkeit.
In: Mensch und Computer 2015 - Proceedings, Stuttgart, Germany, September 6-9, 2015.

Lander, Christian and Gehring, Sven and Krüger, Antonio and Boring, Sebastian and Bulling, Andreas
(2015) GazeProjector: Accurate Gaze Estimation and Seamless Gaze Interaction Across Multiple Displays.
In: Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, UIST 2015, Charlotte, NC, USA, November 8-11, 2015.
Conference: UIST ACM Symposium on User Interface Software and Technology

Lander, Christian and Speicher, Marco and Paradowski, Denise and Coenen, Norine and Biewer, Sebastian and Krüger, Antonio
(2015) Collaborative Newspaper Demo: Exploring an adaptive Scrolling Algorithm in a Multi-user Reading Scenario.
In: Proceedings of the 4th International Symposium on Pervasive Displays, PerDis 2015, Saarbrücken, Germany, June 10-12, 2015.

Lander, Christian and Speicher, Marco and Paradowski, Denise and Coenen, Norine and Biewer, Sebastian and Krüger, Antonio
(2015) Collaborative Newspaper: Exploring an adaptive Scrolling Algorithm in a Multi-user Reading Scenario.
In: Proceedings of the 4th International Symposium on Pervasive Displays, PerDis 2015, Saarbrücken, Germany, June 10-12, 2015.

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015) Top-k Multiclass SVM.
In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Leibenger, Dominik and Petrlic, Ronald and Sorge, Christoph and Vogelgesang, Stephanie
(2015) Elektronische Akten: Anforderungen und technische Lösungsmöglichkeiten.
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Leißa, Roland and Boesche, Klaas and Hack, Sebastian and Membarth, Richard and Slusallek, Philipp
(2015) Shallow embedding of DSLs via online partial evaluation.
In: Proceedings of the 2015 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, GPCE 2015, Pittsburgh, PA, USA, October 26-27, 2015.

Leißa, Roland and Köster, Marcel and Hack, Sebastian
(2015) A graph-based higher-order intermediate representation.
In: Proceedings of the 13th Annual IEEE/ACM International Symposium on Code Generation and Optimization, CGO 2015, San Francisco, CA, USA, February 07 - 11, 2015.
Conference: CGO International Symposium on Code Generation and Optimization

Lekies, Sebastian and Stock, Ben and Wentzel, Martin and Johns, Martin
(2015) The Unexpected Dangers of Dynamic JavaScript.
In: 24th USENIX Security Symposium (USENIX Security 15).
Conference: USENIX-Security Usenix Security Symposium

Lessel, Pascal and Altmeyer, Maximilian and Krüger, Antonio
(2015) Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully.
In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, Seoul, Republic of Korea, April 18-23, 2015.
Conference: CHI International Conference on Human Factors in Computing Systems

Lessel, Pascal and Müller, Marc and Krüger, Antonio
(2015) Towards a Novel Issue Tracking System for "Industry 4.0" Environments.
In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, Seoul, CHI 2015 Extended Abstracts, Republic of Korea, April 18 - 23, 2015.
Conference: CHI International Conference on Human Factors in Computing Systems

Li, Wenbin and Fritz, Mario
(2015) Teaching robots the use of human tools from demonstration with non-dexterous end-effectors.
In: 15th IEEE-RAS International Conference on Humanoid Robots, Humanoids 2015, Seoul, South Korea, November 3-5, 2015.

Lischke, Lars and Grüninger, Jürgen and Klouche, Khalil and Schmidt, Albrecht and Slusallek, Philipp and Jacucci, Giulio
(2015) Interaction Techniques for Wall-Sized Screens.
In: Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces, ITS 2015, Funchal, Portugal, November 15-18, 2015.

Lubos, Paul and Ariza, Oscar and Bruder, Gerd and Daiber, Florian and Steinicke, Frank and Krüger, Antonio
(2015) HoverSpace - Analyses of the Perceived Spatial Affordances of Hover Interaction Above Tabletop Surfaces.
In: Human-Computer Interaction - INTERACT 2015 - 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part III.
Conference: Interact IFIP TC13 Conference on Human-Computer Interaction

Löchtefeld, Markus and Jäckel, Christian and Krüger, Antonio
(2015) TwitSoccer: knowledge-based crowd-sourcing of live soccer events.
In: Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30 - December 2, 2015.

Löchtefeld, Markus and Schardt, Phillip and Krüger, Antonio and Boring, Sebastian
(2015) Detecting users handedness for ergonomic adaptation of mobile user interfaces.
In: Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30 - December 2, 2015.

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015) Privacy and Access Control for Outsourced Personal Records.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Computing the Skorokhod distance between polygonal traces.
In: Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, HSCC'15, Seattle, WA, USA, April 14-16, 2015.

Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Computing the Skorokhod distance between polygonal traces.
In: Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015).

Majumdar, Rupak and Wang, Zilong
(2015) Bbs: A Phase-Bounded Model Checker for Asynchronous Programs.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015) Guardat: enforcing data policies at the storage layer.
In: Proceedings of the 10th European Conference on Computer Systems (EuroSys '15).
Conference: EuroSys Eurosys Conference

Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015) Symbolic Malleable Zero-knowledge Proofs.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015) Privacy Preserving Payments in Credit Networks.
In: Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15).
Conference: NDSS Network and Distributed System Security Symposium

Mukherjee, Subhabrata and Lamba, Hemank and Weikum, Gerhard
(2015) Experience-Aware Item Recommendation in Evolving Review Communities.
In: 2015 IEEE International Conference on Data Mining, ICDM 2015, Atlantic City, NJ, USA, November 14-17, 2015.
Conference: ICDM IEEE International Conference on Data Mining

Mukherjee, Subhabrata and Weikum, Gerhard
(2015) Leveraging Joint Interactions for Credibility Analysis in News Communities.
In: Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015.
Conference: CIKM ACM International Conference on Information and Knowledge Management

Möllers, Frederik and Sorge, Christoph
(2015) Hausautomationssysteme im Datenschutzrecht.
In: Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015.

Neis, Georg and Hur, Chung-Kil and Kaiser, Jan-Oliver and McLaughlin, Craig and Dreyer, Derek and Vafeiadis, Viktor
(2015) Pilsner: a compositionally verified compiler for a higher-order imperative language.
In: Proceedings of the 20st ACM SIGPLAN International Conference on Functional Programming (ICFP '15).
Conference: ICFP International Conference on Functional Programming

Ngoc, Quynh Nguyen and Gautier, Antoine and Hein, Matthias
(2015) A flexible tensor block coordinate ascent scheme for hypergraph matching.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Nguyen, Hoang-Vu and Vreeken, Jilles
(2015) Non-Parametric Jensen-Shannon Divergence.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Olberding, Simon and Ortega, Sergio Soto and Hildebrandt, Klaus and Steimle, Jürgen
(2015) Foldio: Digital Fabrication of Interactive and Shape-Changing Objects With Foldable Printed Electronics.
In: Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, UIST 2015, Charlotte, NC, USA, November 8-11, 2015.
Conference: UIST ACM Symposium on User Interface Software and Technology

Olberding, Simon and Steimle, Jürgen and Nanayakkara, Suranga and Maes, Pattie
(2015) CloudDrops: Stamp-sized Pervasive Displays for Situated Awareness of Web-based Information.
In: Proceedings of the 4th International Symposium on Pervasive Displays, PerDis 2015, Saarbrücken, Germany, June 10-12, 2015.

Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha
(2015) To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections.
In: 24th USENIX Security Symposium (USENIX Security 15).
Conference: USENIX-Security Usenix Security Symposium

Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015) IoTPOT: Analysing the Rise of IoT Compromises.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj
(2015) In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security Usenix Security Symposium

Pellegrino, Giancarlo and Rossow, Christian and Ryba, Fabrice J. and Schmidt, Thomas C. and Wählisch, Matthias
(2015) Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian
(2015) jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Pepik, Bojan and Benenson, Rodrigo and Ritschel, Tobias and Schiele, Bernt
(2015) What is Holding Back Convnets for Detection?
In: Pattern Recognition (GCPR 2015).

Pepik, Bojan and Stark, Michael and Gehler, Peter and Ritschel, Tobias and Schiele, Bernt
(2015) 3D Object Class Detection in the Wild.
In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (3DSI 2015).

Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015) Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Pfaff, David and Hack, Sebastian and Hammer, Christian
(2015) Learning How to Prevent Return-Oriented Programming Efficiently.
In: Engineering Secure Software and Systems.

Pienta, Robert and Lin, Zhang and Kahng, M. and Vreeken, Jilles and Talukdar, Partha and Abello, J. and Parameswaran, G. and Chau, D.H.
(2015) AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs.
In: Proceedings of the IEEE Conference on Visualization (VIS).

Porto, Daniel and Leitão, João and Li, Cheng and Clement, Allen and Kate, Aniket and Junqueira, Flavio Paiva and Rodrigues, Rodrigo
(2015) Visigoth fault tolerance.
In: Proceedings of the Tenth European Conference on Computer Systems, EuroSys 2015, Bordeaux, France, April 21-24, 2015.
Conference: EuroSys Eurosys Conference

Prytkova, Natalia and Weikum, Gerhard and Spaniol, Marc
(2015) Aligning Multi-Cultural Knowledge Taxonomies by Combinatorial Optimization.
In: Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18-22, 2015 - Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Raber, Frederic and Krüger, Antonio and Kahl, Gerrit
(2015) The Comparison of Performance, Efficiency, and Task Solution Strategies in Real, Virtual and Dual Reality Environments.
In: Human-Computer Interaction - INTERACT 2015 - 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part IV.
Conference: Interact IFIP TC13 Conference on Human-Computer Interaction

Reineke, Jan and Salinger, Alejandro
(2015) On the Smoothness of Paging Algorithms.
In: Approximation and Online Algorithms - 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised Selected Papers.

Rohrbach, Anna and Rohrbach, Marcus and Schiele, Bernt
(2015) The Long-short Story of Movie Description.
In: Pattern Recognition (GCPR 2015).

Rohrbach, Anna and Rohrbach, Marcus and Tandon, Niket and Schiele, Bernt
(2015) A Dataset for Movie Description.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Ruffing, Tim and Kate, Aniket and Schröder, Dominique
(2015) Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Saha, Indranil and Baruah, Sanjoy and Majumdar, Rupak
(2015) Dynamic scheduling for networked control systems.
In: Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015).

Salvesen, Kevin and Galeotti, Juan Pablo and Gross, Florian and Fraser, Gordon and Zeller, Andreas
(2015) Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing.
In: Proceedings of the Eighth International Workshop on Search-Based Software Testing.

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Schmitz, Martin and Khalilbeigi, Mohammadreza and Balwierz, Matthias and Lissermann, Roman and Mühlhäuser, Max and Steimle, Jürgen
(2015) Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects.
In: Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, UIST 2015, Charlotte, NC, USA, November 8-11, 2015.
Conference: UIST ACM Symposium on User Interface Software and Technology

Schneider, Jonas and Schröder, Dominique
(2015) Foundations of Reconfigurable PUFs.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015.

Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2015) A Linear First-Order Functional Intermediate Language for Verified Compilers.
In: Interactive Theorem Proving - 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings.
Conference: ITP Conference on Interactive Theorem Proving (previously TPHOLs, changed in 2009)

Schröder, Dominique and Döttling, Nico
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: Proceedings of the 35th International Cryptology Conference (CRYPTO '15).
Conference: CRYPTO Advances in Cryptology

Schröder, Dominique and Simkin, Mark
(2015) VeriStream - A Framework for Verifiable Data Streaming.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers.

Schuh, Stefan and Dittrich, Jens
(2015) AIR: Adaptive Index Replacement in Hadoop.
In: 31st IEEE International Conference on Data Engineering Workshops, ICDE Workshops 2015, Seoul, South Korea, April 13-17, 2015.
Conference: ICDE International Conference on Data Engineering

Schulte, Christian and Taneva, Bilyana and Weikum, Gerhard
(2015) On-topic Cover Stories from News Archives.
In: Advances in Information Retrieval - 37th European Conference on IR Research, ECIR 2015, Vienna, Austria, March 29 - April 2, 2015. Proceedings.
Conference: ECIR European Conference on Information Retrieval

Seiter, Julia and Wei-Chen, Chiu and Fritz, Mario and Amft, Oliver and Tröster, Gerhard
(2015) Joint segmentation and activity discovery using semantic and temporal priors.
In: 2015 IEEE International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015.
Conference: PERCOM IEEE International Conference on Pervasive Computing and Communications

Sharma, Gaurav and Schiele, Bernt
(2015) Scalable Nonlinear Embeddings for Semantic Category-based Image Retrieval.
In: ICCV 2015, IEEE International Conference on Computer Vision.
Conference: ICCV IEEE International Conference on Computer Vision

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
In: 13th International Conference on Applied Cryptography and Network Security (ACNS).

Siu, Amy and Weikum, Gerhard
(2015) Semantic Type Classification of Common Words in Biomedical Noun Phrases.
In: Proceedings of the Workshop on Biomedical Natural Language Processing, BioNLP@IJCNLP 2015, Beijing, China, July 30, 2015.

Slawski, Martin and Li, Ping and Hein, Matthias
(2015) Regularization-Free Estimation in Trace Regression with Symmetric Positive Semidefinite Matrices.
In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Sons, Kristian and Klein, Felix and Sutter, Jan and Slusallek, Philipp
(2015) The XML3D architecture.
In: Special Interest Group on Computer Graphics and Interactive Techniques Conference, SIGGRAPH '15, Los Angeles, CA, USA, August 9-13, 2015, Posters Proceedings.
Conference: SIGGRAPH ACM SIG International Conference on Computer Graphics and Interactive Techniques

Soudjani, Sadegh Esmaeil Zadeh and Abate, Alessandro and Majumdar, Rupak
(2015) Dynamic Bayesian Networks as Formal Abstractions of Structured Stochastic Processes.
In: 26th International Conference on Concurrency Theory, CONCUR 2015, Madrid, Spain, September 1.4, 2015.

Stock, Ben and Kaiser, Bernd and Pfistner, Stephan and Lekies, Sebastian and Johns, Martin
(2015) From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting.
In: Proceedings of the 22nd ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Sundareisan, Shashi and Vreeken, Jilles and Prakash, B. Aditya
(2015) Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Sutter, Jan and Sons, Kristian and Slusallek, Philipp
(2015) A CSS integration model for declarative 3D.
In: Proceedings of the 20th International Conference on 3D Web Technology, Web3D 2015, Heraklion, Greece, June 18-21, 2015.

Tamm, Georg and Slusallek, Philipp
(2015) Plugin free remote visualization in the browser.
In: Visualization and Data Analysis 2015, San Francisco, CA, USA, February 9-11, 2015.

Tandon, Niket and Weikum, Gerhard and de Melo, Gerard and De, Abir
(2015) Lights, Camera, Action: Knowledge Extraction from Movie Scripts.
In: Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18-22, 2015 - Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Tandon, Niket and de Melo, Gerard and De, Abir and Weikum, Gerhard
(2015) Knowlywood: Mining Activity Knowledge From Hollywood Narratives.
In: Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015.
Conference: CIKM ACM International Conference on Information and Knowledge Management

Tang, Siyu and Andres, Bjoern and Andriluka, Mykhaylo and Schiele, Bernt
(2015) Subgraph Decomposition for Multi-target Tracking.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Tassarotti, Joseph and Dreyer, Derek and Vafeiadis, Viktor
(2015) Verifying read-copy-update in a logic for weak memory.
In: Proc. of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2015).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Tippenhauer, Nils Ole and Luecken, Heinrich and Kuhn, Marc and Capkun, Srdjan
(2015) UWB Rapid-Bit-Exchange System for Distance Bounding.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).

Torralba, Àlvaro and Hoffmann, Jörg
(2015) Simulation-Based Admissible Dominance Pruning.
In: Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Unger, Nik and Dechand, Sergej and Bonneau, Joseph and Fahl, Sascha and Perl, Henning and Goldberg, Ian and Smith, Matthew
(2015) SoK: Secure Messaging.
In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015.
Conference: SP IEEE Symposium on Security and Privacy

Vafeiadis, Viktor
(2015) Formal Reasoning about the C11 Weak Memory Model.
In: Proceedings of the 2015 Conference on Certified Programs and Proofs, CPP 2015, Mumbai, India, January 15-17, 2015.

Vafeiadis, Viktor and Balabonski, Thibaut and Chakraborty, Soham and Morisset, Robin and Nardelli, Francesco Zappa
(2015) Common Compiler Optimisations are Invalid in the C11 Memory Model and what we can do about it.
In: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, Mumbai, India, January 15-17, 2015.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Valera, Isabel and Gomez-Rodriguez, Manuel
(2015) Modeling Adoption and Usage of Competing Products.
In: 2015 IEEE International Conference on Data Mining, ICDM 2015, Atlantic City, NJ, USA, November 14-17, 2015.
Conference: ICDM IEEE International Conference on Data Mining

Verbeek, Freek and Havle, Oto and Schmaltz, Julien and Tverdyshev, Sergey and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Wolff, Burkhart and Nemouchi, Yakoub
(2015) Formal API Specification of the PikeOS Separation Kernel.
In: Proc. 7th NASA Formal Methods Symposium (NFM 2015).

Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015) Strength in Numbers: Robust Tamper Detection in Crowd Computations.
In: Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015.

Vreeken, Jilles
(2015) Causal Inference by Direction of Information.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015.
Conference: ICCV IEEE International Conference on Computer Vision

Weigel, Martin and Lu, Tong and Bailly, Gilles and Oulasvirta, Antti and Majidi, Carmel and Steimle, Jürgen
(2015) iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile Computing.
In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, Seoul, Republic of Korea, April 18-23, 2015.
Conference: CHI International Conference on Human Factors in Computing Systems

Weigel, Martin and Steimle, Jürgen
(2015) iSkin: Stretchable On-Body Touch Sensors for Mobile Computing.
In: Mensch und Computer 2015 - Proceedings, Stuttgart, Germany, September 6-9, 2015.

Yang, Maolin and Wieder, Alexander and Brandenburg, Björn B.
(2015) Global Real-Time Semaphore Protocols: A Survey, Unified Analysis, and Comparison.
In: Proceedings of the IEEE 36th Real-Time Systems Symposium (RTSS'15).
Conference: RTSS Real Time Systems Symposium

Zeller, Andreas
(2015) Test Complement Exclusion: Guarantees from Dynamic Analysis.
In: Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension.

Zeller, Andreas and Herzig, Kim and Just, Sascha
(2015) It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction.
In: Software-Engineering & Management, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI).

Zeller, Andreas and Weyrich, Michael
(2015) Test case selection for networked production systems.
In: 20th IEEE Conference on Emerging Technologies & Factory Automation, ETFA 2015, Luxembourg, September 8-11, 2015.

Zhang, Shanshan and Benenson, Rodrigo and Schiele, Bernt
(2015) Filtered Channel Features for Pedestrian Detection.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-based gaze estimation in the wild.
In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling and Nilges, Tobias
(2015) From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
In: ProvSec.

and Daniel Kraschewski and J\"rn M\"ller-Quade, Nico D\"ttling and Nilges, Tobias
(2015) General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
In: TCC (1).

and Dominique Schr\"der, Nico D\"ttling
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: CRYPTO (1).

von Radziewsky, Luisa and Krüger, Antonio and Löchtefeld, Markus
(2015) Scarfy: Augmenting Human Fashion Behaviour with Self-Actuated Clothes.
In: Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction, TEI '15, Stanford, California, USA, January 15-19, 2015.
Conference: TEI Tangible, Embedded, and Embodied Interaction

Article

Alvin, Chris and Gulwani, Sumit and Majumdar, Rupak and Mukhopadhyay, Supratik
(2015) Automatic Synthesis of Geometry Problems for an Intelligent Tutoring System.
CoRR, abs/15.

Andreychenko, Alexandr and Mikeev, Linar and Wolf, Verena
(2015) Model Reconstruction for Moment-Based Stochastic Chemical Kinetics.
ACM Transactions on Modeling and Computer Simulation, 25 (2). 12:1–12:19.

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015) How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Backes, Michael and Köpf, Boris
(2015) Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.

Bhadra, Sahely and Hein, Matthias
(2015) Correction of noisy labels via mutual consistency check.
Neurocomputing, 160. 34–52.

Birkedal, Lars and Dreyer, Derek and Gardner, Philippa and Shao, Zhong
(2015) Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191).
Dagstuhl Reports, 5 (5). 1–23.

Birkedal, Lars and Dreyer, Derek and Gardner, Philippa and Shao, Zhong
(2015) Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191).
Dagstuhl Reports, 5 (5). pp. 1-23.

Bouget, David and Benenson, Rodrigo and Omran, Mohamed and Riffaud, Laurent and Schiele, Bernt and Jannin, Pierre
(2015) Detecting Surgical Tools by Modelling Local Appearance and Global Shape.
IEEE Transactions on Medical Imaging, 34 (12). 2603–2617.

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2015) Affine Refinement Types for Secure Distributed Programming.
ACM Transactions on Programming Languages and Systems, 37 (4). 11:1-11:66.

Chakraborty, Soham and Henzinger, Thomas A. and Sezgin, Ali and Vafeiadis, Viktor
(2015) Aspect-oriented linearizability proofs.
Logical Methods in Computer Science, 11 (1).

Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5). pp. 639-652.

Cramer, Ronald and and Nico D\"ttling, Ivan Bjerre Damgård and Fehr, Serge and Spini, Gabriele
(2015) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
IACR Cryptology ePrint Archive, 2015. p. 1089.

Dahmen, Tim and Roland, Michael and Tjardes, Thorsten and Bouillon, Bertiol and Slusallek, Philipp and Diebels, Stefan
(2015) An automated workflow for the biomechanical simulation of a tibia with implant using computed tomography and the finite element method.
Computers & Mathematics with Applications, 70 (5). 903–916.

Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015) System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).

Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Quantifying Conformance using the Skorokhod Metric (full version).
CoRR, abs/15.

Dittrich, Jens and Bender, Patrick
(2015) Janiform intra-document analytics for reproducible research.
Proceedings of the VLDB Endowment - Proceedings of the 41st International Conference on Very Large Data Bases, Kohala Coast, 8 (12). pp. 1972-1975.

Doerfert, Johannes and Streit, Kevin and Hack, Sebastian and Benaissa, Zino
(2015) Polly's Polyhedral Scheduling in the Presence of Reductions.
CoRR, abs/15.

Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015) Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221. pp. 73-114.

Doychev, Goran and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2015) CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 18 (1). 4:1–4:32.

Doychev, Goran and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2015) CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 18 (1). 4:1-4:32.

Duan, Ran and Mehlhorn, Kurt
(2015) A combinatorial polynomial algorithm for the linear Arrow-Debreu market.
Information and Computation, 243. 112–132.

Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015) Model Checking Parameterized Asynchronous Shared-Memory Systems.
CoRR, abs/15.

Dutta, Sourav and Weikum, Gerhard
(2015) Cross-Document Co-Reference Resolution using Sample-Based Clustering with Knowledge Enrichment.
TACL, 3. 15–28.

Elbassioni, Khaled M. and Makino, Kazuhisa and Mehlhorn, Kurt and Ramezani, Fahimeh
(2015) On Randomized Fictitious Play for Approximating Saddle Points Over Convex Sets.
Algorithmica, 73 (2). 441–459.

Finkbeiner, Bernd and Tentrup, Leander
(2015) Detecting Unrealizability of Distributed Fault-tolerant Systems.
Logical Methods in Computer Science, 11 (3).

Francis, Paul
(2015) Network Address Translation (NAT).
Computer Communication Review, 45 (2). p. 50.

Freymann, Hans-Peter and Vogelgesang, Stephanie
(2015) Schwacke-Liste und Fraunhofer-Tabelle in der Rechtsprechung der Berufungsgerichte.
Zeitschrift für Schadensrecht. pp. 543-554.

Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2015) Inferring Loop Invariants by Mutation, Dynamic Analysis, and Static Checking.
IEEE Transactions of Software Engineering, 41 (10). 1019–1037.

Grabowicz, Przemyslaw A. and Romero-Ferrero, Francisco and Lins, Theo and de Polavieja, Gonzalo G. and Benevenuto, Fabricio and Gummadi, Krishna P.
(2015) An experimental study of opinion influenceability.
CoRR, abs/15.

Grosse, Kathrin and González, María Paula and Chesñevar, Carlos Iván and Maguitman, Ana Gabriela
(2015) Integrating argumentation and sentiment analysis for mining opinions from Twitter.
AI Commun., 28 (3). pp. 387-401.

Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2015) Multiprocessor real-time scheduling with arbitrary processor affinities: from practice to theory.
Real-Time Systems, 51 (4). pp. 440-483.

Hahn, Sebastian and Reineke, Jan and Wilhelm, Reinhard
(2015) Towards compositionality in execution time analysis: definition and challenges.
SIGBED Review, 12 (1). 28–36.

Hein, Matthias and Lugosi, Gábor and Rosasco, Lorenzo
(2015) Mathematical and Computational Foundations of Learning Theory (Dagstuhl Seminar 15361).
Dagstuhl Reports, 5 (8). 54–0.

Hessel, Stefan
(2015) Ein Plädoyer für e-Klausuren im Jurastudium.
JurPC (Web-Do).

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2015) Summarizing and Understanding Large Graphs.
Statistical Analysis and Data Mining, 8 (3). pp. 183-202.

Maiya, Pallavi and Gupta, Rahul and Kanade, Aditya and Majumdar, Rupak
(2015) A Partial Order Reduction Technique for Event-driven Multi-threaded Programs.
CoRR, abs/15.

Malinowski, Mateusz and Fritz, Mario
(2015) Hard to Cheat: A Turing Test based on Answering Questions about Images.
CoRR, abs/15.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2015) Ask Your Neurons: A Neural-based Approach to Answering Questions about Images.
CoRR, abs/15.

Mehlhorn, Kurt and Sagraloff, Michael and Wang, Pengming
(2015) From approximate factorization to root isolation with application to cylindrical algebraic decomposition.
Journal of Symbolic Computation, 66. 34–69.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2015) Person Recognition in Personal Photo Collections.
CoRR, abs/15.

Pepik, Bojan and Stark, Michael and Gehler, Peter and Schiele, Bernt
(2015) Multi-view and 3D Deformable Part Models.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 37 (11). 2232–2245.

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2015) Deep Reflectance Maps.
CoRR, abs/15.

Richter, Stefan and Alvarez, Victor and Dittrich, Jens
(2015) A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing.
PVLDB, 9 (3). pp. 96-107.

Ryba, Fabrice J. and Orlinski, Matthew and Wählisch, Matthias and Rossow, Christian and Schmidt, Thomas C.
(2015) Amplification and DRDoS Attack Defense - A Survey and New Perspectives.
CoRR, abs/15.

Sattar, Hosnieh and Müller, Sabine and Fritz, Mario and Bulling, Andreas
(2015) Prediction of search targets from fixations in open-world settings.
CoRR, abs/15.

Schmuck, Anne-Kathrin and Majumdar, Rupak
(2015) Dynamic Hierarchical Reactive Controller Synthesis.
CoRR, abs/15.

Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2015) A First-Order Functional Intermediate Language for Verified Compilers.
CoRR, abs/15.

Schuhknecht, Felix Martin and Khanchandani, Pankaj and Dittrich, Jens
(2015) On the Surprising Difficulty of Simple Things: The Case of Radix Partitioning.
Proc. VLDB Endow., 8 (9). pp. 934-937.

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2015) Mining Workflow Models from Web Applications.
IEEE Trans. Software Eng., 41 (12). 1184–1201.

Shcherbatyi, Iaroslav and Bulling, Andreas and Fritz, Mario
(2015) GazeDPM: Early Integration of Gaze Information in Deformable Part Models.
CoRR, abs/15.

Shilkrot, Roy and Huber, Jochen and Steimle, Jürgen and Nanayakkara, Suranga and Maes, Pattie
(2015) Digital Digits: A Comprehensive Survey of Finger Augmentation Devices.
ACM Comput. Surv., 48 (2). 30:1–30:29.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015. p. 592.

Sorge, Christoph
(2015) Bargeld und andere Bezahlverfahren.
Wirtschaftsdienst, 95 (8). pp. 519-522.

Sorge, Christoph and Krüger, Jochen
(2015) E-Akte, elektronischer Rechtsverkehr und Barrierefreiheit.
Neue Juristische Wochenschrift, 68 (38). pp. 2764-2767.

Soudjani, Sadegh Esmaeil Zadeh and Abate, Alessandro and Majumdar, Rupak
(2015) Dynamic Bayesian Networks as Formal Abstractions of Structured Stochastic Processes.
CoRR, abs/15.

Steimle, Jürgen
(2015) Printed electronics for human-computer interaction.
Interactions, 22 (3). 72–75.

Wei-Chen, Walon and Fritz, Mario
(2015) See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG.
CoRR, abs/15.

Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream.
TWEB, 9 (3). 12:1-12:33.

Zeller, Andreas and Hammacher, Clemens and Doerfert, Johannes and Streit, Kevin and Hack, Sebastian
(2015) Generalized Task Parallelism.
ACM Transactions on Architecture and Code Optimization (TACO), 12 (1). p. 8.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2015) Appearance-Based Gaze Estimation in the Wild.
CoRR, abs/15.

Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2015) Mtac: A monad for typed tactic programming in Coq.
J. Funct. Program., 25.

Zimek, Arthur and Vreeken, Jilles
(2015) The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives.
Machine Learning, 98 (1). pp. 121-155.

Thesis

Bauer, Markus
(2015) The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.

Fatz, Filip
(2015) Toward a Backward-compatible API for Defining Fine-grained App Policies on Android.
Bachelors thesis, Saarland University.

Frassinelli, Daniel
(2015) Security Analysis of Telematic and Emergency Devices in a Modern Car.
Masters thesis, Saarland University.

Koch, Simon
(2015) Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.

Patel, Vikash
(2015) Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.

Schneider, Jonas
(2015) Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.

Schranz, Oliver
(2015) Towards Compiler-Assisted Taint Tracking on the Android Runtime.
Masters thesis, Saarland University.

Schwarz, Fabian Frank
(2015) Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.

Spier, Steffen
(2015) Cold boot attacks and the error model of DRAM modules.
Bachelors thesis, Saarland University.

Tiwari, Abishek
(2015) Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.

Wißfeld, Marvin
(2015) ArtHook: Callee-side Method Hook Injection on the New Android Runtime ART.
Bachelors thesis, Saarland University.

Book Section

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015) Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In: UNSPECIFIED Cryptology and Information Security Series, 13 . IOS Press, 81 - 105.

Kuznetsov, Konstantin and Gorla, Alessandra and Tavecchia, Ilaria and Groß, Florian and Zeller, Andreas
(2015) Mining Android Apps for Anomalies.
In: Perspectives on Data Science for Software Engineering. The Art and Science of Analyzing Software Data. ISBN 9780124115194

Mehlhorn, Kurt
(2015) On the Implementation of Combinatorial Algorithms for the Linear Exchange Market.
In: Algorithms, Probability, Networks, and Games. Lecture Notes in Computer Science, 9295 . Springer, 87–94.

Book

UNSPECIFIED, ed.
(2015) Automated Technology for Verification and Analysis - 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings.
Lecture Notes in Computer Science, 9364 . Springer.

UNSPECIFIED, ed.
(2015) Fields of Logic and Computation II - Essays Dedicated to Yuri Gurevich on the Occasion of His 75th Birthday.
Lecture Notes in Computer Science, 9300 . Springer.

UNSPECIFIED, ed.
(2015) Proceedings of the 4th International Symposium on Pervasive Displays, PerDis 2015, Saarbrücken, Germany, June 10-12, 2015.
ACM.

UNSPECIFIED, ed.
(2015) Runtime Verification - 6th International Conference, RV 2015 Vienna, Austria, September 22-25, 2015. Proceedings.
Lecture Notes in Computer Science, 9333 . Springer.

Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat and Konnov, Igor and Rubin, Sasha and Veith, Helmut and Widder, Josef
(2015) Decidability of Parameterized Verification.
Synthesis Lectures on Distributed Computing Theory . Morgan & Claypool Publishers.

Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2015) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-72.

Other

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
UNSPECIFIED
.

This list was generated on Wed Nov 20 14:13:32 2024 CET.