Items where Year is 2016

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 374.

Paolo, Frasconi and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles, eds.
(2016) Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence (9852). Springer.

UNSPECIFIED, ed.
(2016) Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, MobileHCI 2016, Florence, Italy, September 6-9, 2016.
ACM.

UNSPECIFIED, ed.
(2016) Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2016, Florence, Italy, September 6-9, 2016.
ACM.

UNSPECIFIED, ed.
(2016) Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, Heidelberg, Germany, September 12-16, 2016.
ACM.

UNSPECIFIED, ed.
(2016) Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016.
ACM.

UNSPECIFIED, ed.
(2016) Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2016, St. Petersburg, FL, USA, January 20 - 22, 2016.
ACM.

Abel, Andreas and Reineke, Jan
(2016) Gray-Box Learning of Serial Compositions of Mealy Machines.
In: NASA Formal Methods - 8th International Symposium, NFM 2016, Minneapolis, MN, USA, June 7-9, 2016, Proceedings.

Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: SP IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016) You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: SP IEEE Symposium on Security and Privacy

Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle
(2016) You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.
In: IEEE SecDev 2016.

Aditya, Paarijaat and Sen, Rijurekha and Druschel, Peter and Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt and Bhattacharjee, Bobby and Wu, Tong Tong
(2016) I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-Cue Zero-Shot Learning with Strong Supervision.
CoRR, abs/16.

Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016) Multi-cue Zero-Shot Learning with Strong Supervision.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Altmeyer, Maximilian and Lessel, Pascal and Krüger, Antonio
(2016) Expense Control: A Gamified, Semi-Automated, Crowd-Based Approach For Receipt Capturing.
In: Proceedings of the 21st International Conference on Intelligent User Interfaces, IUI 2016, Sonoma, CA, USA, March 7-10, 2016.
Conference: IUI International Conference on Intelligent User Interfaces

Antonioli, Daniele and Agrawal, Anand and Tippenhauer, Nils Ole
(2016) Towards High-Interaction Virtual ICS Honeypots-in-a-Box.
In: Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS.

Athukorala, Kumaripaba and Glowacka, Dorata and Jacucci, Giulio and Oulasvirta, Antti and Vreeken, Jilles
(2016) Is Exploratory Search Different? A Comparison of Information Search Behavior for Exploratory and Lookup Tasks.
Journal of the Association for Information Science and Technology, 67 (11). pp. 2635-2651.

Außerlechner, Simon and Jacobs, Swen and Khalimov, Ayrat
(2016) Tight Cutoffs for Guarded Protocols with Fairness.
In: Verification, Model Checking, and Abstract Interpretation - 17th International Conference, VMCAI 2016, St. Petersburg, FL, USA, January 17-19, 2016. Proceedings.

Avdiienko, Vitalii and Kuznetsov, Konstantin and Calciati, Paolo and Caiza Rom\'an, Juan Carlos and Gorla, Alessandra and Zeller, Andreas
(2016) CALAPPA: A Toolchain for Mining Android Applications.
In: Proceedings of the International Workshop on App Market Analytics.

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2016) Abnormal Sensitive Data Usage in Android Apps.
In: In Proceedings of the Jornadas Nacionales de Investigación en Ciberseguridad.

Awazid, Tahleen Rahman
(2016) Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gummadi, Krishna P. and Gomez-Rodriguez, Manuel
(2016) On the Efficiency of the Information Networks in Social Media.
In: Proceedings of the 9th ACM International Conference on Web Search and Data Mining.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Backenköhler, Michael and Bortolussi, Luca and Wolf, Verena
(2016) Generalized Method of Moments for Stochastic Reaction Networks in Equilibrium.
In: Computational Methods in Systems Biology - 14th International Conference, CMSB 2016, Cambridge, UK, September 21-23, 2016, Proceedings.

Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016) On Profile Linkability despite Anonymity in Social Media Systems.
In: Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016) Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
In: Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16).

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016) From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In: UNSPECIFIED Springer International Publishing, Cham, pp. 87-138. ISBN 978-3-319-43005-8

Backes, Michael and Bugiel, Sven and Derr, Erik
(2016) Reliable Third-Party Library Detection in Android and its Security Applications.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016) R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.

Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016) On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016) POSTER: The ART of App Compartmentalization.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016) Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2). pp. 16-21.

Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016) Implementation-level Analysis of the JavaScript Helios Voting Client.
In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016.

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016) Computational Soundness for Dalvik Bytecode.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016) Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016) Delegatable Functional Signatures.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386. ISBN 978-3-662-49384-7

Balegas, Valter and Li, Cheng and Najafzadeh, Mahsa and Porto, Daniel and Clement, Allen and Duarte, Sérgio and Ferreira, Carla and Gehrke, Johannes and Leitão, João and Preguiça, Nuno M. and Rodrigues, Rodrigo and Shapiro, Marc and Vafeiadis, Viktor
(2016) Geo-Replication: Fast If Possible, Consistent If Necessary.
IEEE Data Eng. Bull., 39 (1). 81–92.

Banerjee, Abhijeet and Chattopadhyay, Sudipta and Roychoudhury, Abhik
(2016) On Testing Embedded Software.
In: UNSPECIFIED Advances in Computers, 101 . Elsevier, pp. 121-153. ISBN 978-0-12-805158-0

Barthe, Gilles and D'Argenio, Pedro R. and Finkbeiner, Bernd and Hermanns, Holger
(2016) Facets of Software Doping.
In: Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II.

Bei, Xiaohui and Garg, Jugal and Hoefer, Martin and Mehlhorn, Kurt
(2016) Computing Equilibria in Markets with Budget-Additive Utilities.
In: ESA - European Symposium on Algorithms.
Conference: ESA European Symposium on Algorithms

Belagiannis, Vasileios and Amin, Sikandar and Andriluka, Mykhaylo and Schiele, Bernt and Navab, Nassir and Ilic, Slobodan
(2016) 3D Pictorial Structures Revisited: Multiple Human Pose Estimation.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 38 (10). 1929–1942.

Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2016) Keeping it Short and Simple: Summarising Complex Event Sequences with Multivariate Patterns.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Bhattacharjee, Bobby and Druschel, Peter and Herbster, Raul and DellaTorre, Scott
(2016) Privacy Capsules: Preventing Information Leaks by Mobile Apps.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016.

Bhattacharyya, Apratim and Malinowski, Mateusz and Fritz, Mario
(2016) Spatio-Temporal Image Boundary Extrapolation.
CoRR, abs/16.

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2016) Long-Term Image Boundary Extrapolation.
CoRR, abs/16.

Biega, Joanna Asia and Gummadi, Krishna P. and Mele, Ida and Milchevski, Dragan and Tryfonopoulos, Christos and Weikum, Gerhard
(2016) R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities.
In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16).
Conference: SIGIR ACM International Conference on Research and Development in Information Retrieval

Biondi, Alessandro and Brandenburg, Björn B.
(2016) Lightweight Real-Time Synchronization under P-EDF on Symmetric and Asymmetric Multiprocessors.
In: 28th Euromicro Conference on Real-Time Systems, ECRTS 2016, Toulouse, France, July 5-8, 2016.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Biondi, Alessandro and Brandenburg, Björn B. and Wieder, Alexander
(2016) A Blocking Bound for Nested FIFO Spin Locks.
In: Proceedings of the IEEE 37th Real-Time Systems Symposium, RTSS 2016.
Conference: RTSS Real Time Systems Symposium

Blackburn, Stephen M. and Diwan, Amer and Hauswirth, Matthias and Sweeney, Peter F. and Amaral, José Nelson and Brecht, Tim and Bulej, Lubomír and Click, Cliff and Eeckhout, Lieven and Fischmeister, Sebastian and Frampton, Daniel and Hendren, Laurie J. and Hind, Michael and Hosking, Antony L. and Jones, Richard E. and Kalibera, Tomas and Keynes, Nathan and Nystrom, Nathaniel and Zeller, Andreas
(2016) The Truth, The Whole Truth, and Nothing But the Truth: A Pragmatic Guide to Assessing Empirical Evaluations.
ACM Trans. Program. Lang. Syst., 38 (4). 15:1–15:20.

Bloem, Roderick and Braud-Santoni, Nicolas and Jacobs, Swen
(2016) Synthesis of Self-Stabilising and Byzantine-Resilient Distributed Systems.
In: Computer Aided Verification - 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part I.
Conference: CAV Computer Aided Verification

Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat and Konnov, Igor and Rubin, Sasha and Veith, Helmut and Widder, Josef
(2016) Decidability in Parameterized Verification.
SIGACT News, 47 (2). pp. 53-64.

Boldyrev, Natalia and Spaniol, Marc and Weikum, Gerhard
(2016) ACROSS: A framework for multi-cultural interlinking of web taxonomies.
In: Proceedings of the 8th ACM Conference on Web Science, WebSci 2016, Hannover, Germany, May 22-25, 2016.

Bonakdarpour, Borzoo and Finkbeiner, Bernd
(2016) Runtime Verification for HyperLTL.
In: Proceedings of the 16th International Conference on Runtime Verification (RV'2016).

Bonifaci, Vincenzo and Brandenburg, Björn B. and D'Angelo, Gianlorenzo and Marchetti-Spaccamela, Alberto
(2016) Multiprocessor Real-Time Scheduling with Hierarchical Processor Affinities.
In: 28th Euromicro Conference on Real-Time Systems, ECRTS 2016, Toulouse, France, July 5-8, 2016.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Brakerski, Zvika and Brzuska, Christina and Fleischhacker, Nils
(2016) On Statistically Secure Obfuscation with Approximate Correctness.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).

Brandenburg, Björn B. and Gul, Mahircan
(2016) Global Scheduling Not Required: Simple, Near-Optimal Multiprocessor Real-Time Scheduling with Semi-Partitioned Reservations.
In: Proceedings of the IEEE 37th Real-Time Systems Symposium, RTSS 2016.
Conference: RTSS Real Time Systems Symposium

Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) Detecting Hardware-Assisted Virtualization.
In: Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.

Budhathoki, Kailash and Vreeken, Jilles
(2016) Causal Inference by Compression.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Bugiel, Sven
(2016) Establishing mandatory access control on Android OS.
Doctoral thesis, UNSPECIFIED.

Bushart, Jonas
(2016) Time-to-Live based Trilateration.
Bachelors thesis, UNSPECIFIED.

Busom, Nuria and Petrlic, Ronald and Sebe, Francesc and Sorge, Christoph and Valls, Magda
(2016) Efficient smart metering based on homomorphic encryption.
Computer Communications, 82. pp. 95-101. ISSN 0140-3664

Böhm, Alexander and Dittrich, Jens and Mukherjee, Niloy and Pandis, Ippokrantis and Sen, Rajkumar
(2016) Operational Analytics Data Management Systems.
PVLDB, 9 (13). pp. 1601-1604.

Cahsor, Guido and Sorge, Christoph
(2016) Datensicherheit (technisch-organisatorische Maßnahmen).
In: UNSPECIFIED C.H. Beck, pp. 356-379.

Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Nielsen, Jesper Buus
(2016) Rate-1, Linear Time and Additively Homomorphic UC Commitments.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Cascudo, Ignacio and and Bernardo David and Nico D\"ttling, Ivan Damgård and Nielsen, Jesper Buus
(2016) Rate-1, Linear Time and Additively Homomorphic UC Commitments.
In: CRYPTO (3).

Cerqueira, Felipe and Stutz, Felix and Brandenburg, Björn B.
(2016) PROSA: A Case for Readable Mechanized Schedulability Analysis.
In: 28th Euromicro Conference on Real-Time Systems, ECRTS 2016, Toulouse, France, July 5-8, 2016.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Chakraborty, Abhijnan and Ghosh, Saptarshi and Ganguly, Niloy and Gummadi, Krishna P.
(2016) Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News.
In: Proceedings of the 10th International Conference on Web and Social Media.

Chakraborty, Soham and Vafeiadis, Viktor
(2016) Validating optimizations of concurrent C/C++ programs.
In: Proceedings of the 2016 International Symposium on Code Generation and Optimization, CGO 2016, Barcelona, Spain, March 12-18, 2016.
Conference: CGO International Symposium on Code Generation and Optimization

Chen, Jian-Jia and Brandenburg, Björn B.
(2016) A Note on the Period Enforcer Algorithm for Self-Suspending Tasks.
CoRR, abs/16.

Chistikov, Dmitry and Majumdar, Rupak and Niksic, Filip
(2016) Hitting Families of Schedules for Asynchronous Programs.
In: Proc. of the 28th International Conference on Computer Aided Verification (CAV 2016).
Conference: CAV Computer Aided Verification

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
In: Computer Vision - ACCV 2016 - 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part V.

Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016) Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
CoRR, abs/16.

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Contextual Media Retrieval Using Natural Language Queries.
CoRR, abs/16.

Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016) Xplore-M-Ego: Contextual Media Retrieval Using Natural Language Queries.
In: Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, ICMR 2016, New York, New York, USA, June 6-9, 2016.

Chowdhury, Sreyasi Nag and Tandon, Niket and Weikum, Gerhard
(2016) Know2Look: Commonsense Knowledge for Visual Search.
In: Proceedings of the 5th Workshop on Automated Knowledge Base Construction, AKBC@NAACL-HLT 2016, San Diego, CA, USA, June 17, 2016.

Cordts, Marius and Omran, Mohamed and Ramos, Sebastian and Rehfeld, Timo and Enzweiler, Markus and Benenson, Rodrigo and Franke, Uwe and Roth, Stefan and Schiele, Bernt
(2016) The Cityscapes Dataset for Semantic Urban Scene Understanding.
In: 29th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2016).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Croitoru, Cosmina and Mehlhorn, Kurt
(2016) Opposition Frameworks.
In: JELIA.
Conference: JELIA Logics in Artificial Intelligence, European Conference

D\"ttling, Nico
(2016) Low Noise LPN: Key dependent message secure public key encryption an sample amplification.
IET Information Security, 10 (6). pp. 372-385.

Damm, Werner and Finkbeiner, Bernd and Rakow, Astrid
(2016) What You Really Need To Know About Your Neighbor.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016.
Conference: CAV Computer Aided Verification

Darwish, Omar and Mehlhorn, Kurt
(2016) Improved balanced flow computation using parametric flow.
Information Processing Letters, 116 (9). 560–563.

Daum, Jeanette and Torralba, Àlvaro and Hoffmann, Jörg and Haslum, Patrik and Weber, Ingo
(2016) Practical Undoability Checking via Contingent Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Davies, Nigel and Langheinrich, Marc and Krüger, Antonio
(2016) Pervasive Displays Guest editors' introduction.
IEEE Pervasive Computing, 15 (3). 11–13.

Davis, Robert I. and Altmeyer, Sebastian and Reineke, Jan
(2016) Analysis of Write-back Caches under Fixed-priority Preemptive and Non-preemptive Scheduling.
In: Proceedings of the 24th International Conference on Real-Time Networks and Systems, RTNS 2016, Brest, France, October 19-21, 2016.

De, Abir and Valera, Isabel and Ganguly, Niloy and Bhattacharya, Sourangshu and Gomez-Rodriguez, Manuel
(2016) Learning and Forecasting Opinion Dynamics in Social Networks.
In: NIPS '16: Advances in Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Deininger, David and Dimitrova, Rayna and Majumdar, Rupak
(2016) Symbolic Model Checking for Factored Probabilistic Models.
In: Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016).
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Demberg, Vera and Hoffmann, Jörg and Howcroft, David M. and Klakow, Dietrich and Torralba, Àlvaro
(2016) Search Challenges in Natural Language Generation with Complex Optimization Objectives.
KI, 30 (1). 63–69.

Dietel, Sebastian
(2016) Towards Native Client Executables via Binary Translation on the x86 Platform.
Bachelors thesis, UNSPECIFIED.

Dietrich, Aljoscha and Sorge, Christoph
(2016) Attributbasierte Verschlüsselung für die Justiz.
In: Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016.

Dimitrova, Rayna and Fioriti, Luis María Ferrer and Hermanns, Holger and Majumdar, Rupak
(2016) Probabilistic CTL*: The Deductive Way.
In: Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Dittrich, Jens
(2016) Patterns in Data Management.
Jens Dittrich.

Doko, Marko and Vafeiadis, Viktor
(2016) A Program Logic for C11 Memory Fences.
In: Verification, Model Checking, and Abstract Interpretation - 17th International Conference, VMCAI 2016, St. Petersburg, FL, USA, January 17-19, 2016. Proceedings.

Dong, Xinshu and Jauhar, Sumeet and Temple, William G. and Chen, Binbin and Kalbarczyk, Zbigniew and Sanders, William H. and Tippenhauer, Nils Ole and Nicol, David M.
(2016) The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment.
In: Proceedings of Workshop on Graphical Models for Security (GraMSec).

Dreyer, Derek and Sheeran, Mary
(2016) Special issue dedicated to ICFP 2014: Editorial.
J. Funct. Program., 26. e20.

Du, Nan and Dai, Hanjun and Trivedi, Rakshit and Upadhyay, Utkarsh and Gomez-Rodriguez, Manuel and Song, Le
(2016) Recurrent Marked Temporal Point Processes: Embedding Event History to Vector.
In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016.
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Du, Nan and Liang, Yingyu and Balcan, Maria-Florina and Gomez-Rodriguez, Manuel and Zha, Hongyuan and Song, Le
(2016) Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm.
Journal of Machine Learning Research (JMLR).

Du, Xu and Emebo, Onyeka and Varde, Aparna S. and Tandon, Niket and Chowdhury, Sreyasi Nag and Weikum, Gerhard
(2016) Air quality assessment from social media and structured data: Pollutants and health impacts in urban planning.
In: 32nd IEEE International Conference on Data Engineering Workshops, ICDE Workshops 2016, Helsinki, Finland, May 16-20, 2016.

Duan, Ran and Garg, Jugal and Mehlhorn, Kurt
(2016) An Improved Combinatorial Polynomial Algorithm for the Linear Arrow-Debreu Market.
In: SODA 2016 - ACM/SIAM Symposium on Discrete Algorithms.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two Message Oblivious Evaluation of Cryptographic Functionalities.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).
Conference: CRYPTO Advances in Cryptology

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Elbassioni, Khaled M. and Mehlhorn, Kurt and Ramezani, Fahimeh
(2016) Towards More Practical Linear Programming-based Techniques for Algorithmic Mechanism Design.
Theory of Computing Systems, 59 (4). 641–663. ISSN 1432-4350

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) T3: Comprehensive policy compliance in data retrieval systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Endner-Dühr, Frederic
(2016) Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data.
Masters thesis, UNSPECIFIED.

Ernst, Patrick and Siu, Amy and Milchevski, Dragan and Hoffart, Johannes and Weikum, Gerhard
(2016) DeepLife: An Entity-aware Search, Analytics and Exploration Platform for Health and Life Sciences.
In: Proceedings of ACL-2016 System Demonstrations, Berlin, Germany, August 7-12, 2016.
Conference: ACL Association of Computational Linguistics

Esparza, Javier and Ganty, Pierre and Leroux, Jérôme and Majumdar, Rupak
(2016) Model Checking Population Protocols.
In: 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2016, December 13-15, 2016, Chennai, India.

Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2016) Parameterized Verification of Asynchronous Shared-Memory Systems.
J. ACM, 63 (1). 10:1–10:48.

Fahl, Sascha
(2016) On the importance of ecologically valid usable security research for end users and IT workers.
Doctoral thesis, University of Hanover, Hannover, Germany.

Faymonville, Peter and Finkbeiner, Bernd and Schirmer, Sebastian and Torfah, Hazem
(2016) A Stream-Based Specification Language for Network Monitoring.
In: Proceedings of the 16th International Conference on Runtime Verification (RV'2016).

Feld, Thomas and Höger, Sebastian and Johann, Denis and Borgert, Stephan and Feld, Michael and Heuser, Dirk and Maringer, Silke and Keßler, Tobias and Petry, Florian and Reis, Robin and Sorge, Christoph and Tänzer, Guillem and Werth, Dirk and Keinath, Sabine and Zillekens, Peter Robert
(2016) Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität.

Ferreira, Miguel and Zafar, Muhammad Bilal and Gummadi, Krishna P.
(2016) The Case for Temporal Transparency: Detecting Policy Change Events in Black-Box Decision Making Systems.
CoRR, abs/16.

Fickert, Maximilian and Hoffmann, Jörg and Steinmetz, Marcel
(2016) Combining the Delete Relaxation with Critical-Path Heuristics: A Direct Characterization.
J. Artif. Intell. Res., 56. 269–327.

Finkbeiner, Bernd
(2016) Synthesis of Reactive Systems.
In: Dependable Software Systems Engineering. UNSPECIFIED, 72–98.

Finkbeiner, Bernd and Hahn, Christopher
(2016) Deciding Hyperproperties.
In: 27th International Conference on Concurrency Theory, CONCUR 2016, August 23-26, 2016, Québec City, Canada.
Conference: CONCUR International Conference on Concurrency Theory

Finkbeiner, Bernd and Hahn, Christopher
(2016) Deciding Hyperproperties.
CoRR, abs/16.

Finkbeiner, Bernd and Klein, Felix
(2016) Bounded Cycle Synthesis.
In: Computer Aided Verification - 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part I.
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Klein, Felix
(2016) Bounded Cycle Synthesis.
CoRR, abs/16.

Finkbeiner, Bernd and Rabe, Markus N.
(2016) Verifying hyperproperties of hardware systems.
In: 2016 Formal Methods in Computer-Aided Design, FMCAD 2016, Mountain View, CA, USA, October 3-6, 2016.

Finkbeiner, Bernd and Seidl, Helmut and Müller, Christian
(2016) Specifying and Verifying Secrecy in Workflows with Arbitrarily Many Agents.
In: Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016).
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Sánchez, César
(2016) Special issue on Rich Models, EU-COST Action IC0901 Rich-Model Toolkit.
Acta Inf., 53 (4). 325–326.

Finkbeiner, Bernd and Torfah, Hazem
(2016) Synthesizing Skeletons for Reactive Systems.
In: Automated Technology for Verification and Analysis - 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Zimmermann, Martin
(2016) The First-Order Logic of Hyperproperties.
CoRR, abs/16.

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2016) Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.

Forero, Juan Pablo and Fernando, Piyum and Priyashri, Sridhar and Withana, Anusha I. and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016) PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6). 1001–1014.

Forero, Juan Pablo and Fernando, Piyum and Sridhar, Priyashri and Withana, Anusha Indrajith and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016) PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6). pp. 1001-1014.

Frasconi, Paolo and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles
(2016) Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence (9851). Springer.

Gao, Min and He, Lei and Majumdar, Rupak and Wang, Zilong
(2016) LLSPLAT: Improving Concolic Testing by Bounded Model Checking.
In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016.

Garg, Deepak and Bolosteanu, Iulia
(2016) Asymmetric Secure Multi-execution with Declassification.
In: Proceedings of Principles of Security and Trust - 5th International Conference (POST '16).

Garg, Deepak and Cheney, James and Perera, Roly
(2016) Causally Consistent Dynamic Slicing.
In: Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16).
Conference: CONCUR International Conference on Concurrency Theory

Garg, Deepak and Rafnsson, Willard and Sabelfeld, Andrei
(2016) Progress-Sensitive Security for SPARK.
In: Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16).

Garg, Deepak and Rezk, Tamara and Rajani, Vineet
(2016) On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
In: Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Garg, Deepak and Çiçek, Ezgi and Paraskevopoulou, Zoe
(2016) A type theory for incremental computational complexity with control flow changes.
In: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16).
Conference: ICFP International Conference on Functional Programming

Gautier, Antoine and Nguyen, Quynh N. and Hein, Matthias
(2016) Globally Optimal Training of Generalized Polynomial Neural Networks with Nonlinear Spectral Methods.
In: Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain.
Conference: NeurIPS Conference on Neural Information Processing Systems

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gool, Luc J. Van and Tuytelaars, Tinne
(2016) DeLight-Net: Decomposing Reflectance Maps into Specular Materials and Natural Illumination.
CoRR, abs/16.

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2016) Natural Illumination from Multiple Materials Using Deep Learning.
CoRR, abs/16.

Gerling, Sebastian and Rossow, Christian
(2016) Angreiferjagd im "Internet der Dinge".
Datenschutz und Datensicherheit, 40 (8). pp. 507-510.

Ghaeini, Hamid and Tippenhauer, Nils Ole
(2016) HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems.
In: Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS.

Giannopoulos, Ioannis and Schöning, Johannes and Krüger, Antonio and Raubal, Martin
(2016) Attention as an input modality for Post-WIMP interfaces using the viGaze eye tracking framework.
Multimedia Tools Appl., 75 (6). 2913–2929.

Gnad, Daniel and Steinmetz, Marcel and Jany, Mathäus and Hoffmann, Jörg and Serina, Ivan and Gerevini, Alfonso
(2016) Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications.
In: Proceedings of the 9th Annual Symposium on Combinatorial Search (SOCS'16).

Gnad, Daniel and Wehrle, Martin and Hoffmann, Jörg
(2016) Decoupled Strong Stubborn Sets.
In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Gomez-Rodriguez, Manuel and Song, Le and Du, Nan and Zha, Hongyuan and Schölkopf, Bernhard
(2016) Influence Estimation and Maximization in Continuous-Time Diffusion Networks.
ACM Transactions on Information Systems (TOIS).

Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2016) Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media.
In: Proceedings of the 10th International Conference on Web and Social Media.

Grimm, Rüdiger and Sorge, Christoph and Döhmann, Indra Spiecker genannt
(2016) Recht und Technik: Datenschutz im Diskurs.
In: Informatik 2016, 46. Jahrestagung der Gesellschaft für Informatik, 26.-30. September 2016, Klagenfurt, Österreich.

Grishchenko, Ilya and Maffei, Matteo and Calzavara, Stefano
(2016) HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving.
In: Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P '16).
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Groeger, Daniel and Loo, Elena Chong and Steimle, Jürgen
(2016) HotFlex: Post-print Customization of 3D Prints Using Embedded State Change.
In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016.
Conference: CHI International Conference on Human Factors in Computing Systems

Grycner, Adam and Weikum, Gerhard
(2016) POLY: Mining Relational Paraphrases from Multilingual Sentences.
In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, EMNLP 2016, Austin, Texas, USA, November 1-4, 2016.
Conference: EMNLP Empirical Methods in Natural Language Processing

Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016) RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
In: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS).

H., Mohamed and Stepanova, Daria and Urbani, Jacopo and Weikum, Gerhard
(2016) Exception-Enriched Rule Learning from Knowledge Graphs.
In: The Semantic Web - ISWC 2016 - 15th International Semantic Web Conference, Kobe, Japan, October 17-21, 2016, Proceedings, Part I.
Conference: ISWC IEEE International Symposium on Wearable Computers

Hagestedt, Inken
(2016) Static Analysis of Non-interference for Android Apps.
Masters thesis, UNSPECIFIED.

Hahn, Sebastian and Jacobs, Michael and Reineke, Jan
(2016) Enabling Compositionality for Multicore Timing Analysis.
In: Proceedings of the 24th International Conference on Real-Time Networks and Systems, RTNS 2016, Brest, France, October 19-21, 2016.

Hammacher, Clemens and Streit, Kevin and Zeller, Andreas and Hack, Sebastian
(2016) Thread-level Speculation with Kernel Support.
In: Proceedings of the 25th International Conference on Compiler Construction.
Conference: CC International Conference on Compiler Construction

He, Mengda and Vafeiadis, Viktor and Qin, Shengchao and Ferreira, João F.
(2016) Reasoning about Fences and Relaxed Atomics.
In: 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2016, Heraklion, Crete, Greece, February 17-19, 2016.

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2016) RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
CoRR, abs/16.

Hendricks, Lisa Anne and Akata, Zeynep and Rohrbach, Marcus and Donahue, Jeff and Schiele, Bernt and Darrell, Trevor
(2016) Generating Visual Explanations.
In: Computer Vision – ECCV 2016.
Conference: ECCV European Conference on Computer Vision

Herzig, Kim and Just, Sascha and Zeller, Andreas
(2016) The Impact of Tangled Code Changes on Defect Prediction Models.
Empirical Software Engineering, 21 (2). pp. 303-336. ISSN 1382-3256

Hessel, Stefan
(2016) Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -.
JurPC (137).

Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard and Anand, Avishek and Singh, Jaspreet
(2016) The Knowledge Awakens: Keeping Knowledge Bases Fresh with Emerging Entities.
In: Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11-15, 2016, Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Hosang, Jan and Benenson, Rodrigo and Dollár, Piotr and Schiele, Bernt
(2016) What Makes for Effective Detection Proposals?
IEEE Transactions on Pattern Analysis and Machine Intelligence, 38 (4). 814–830.

Hosang, Jan and Benenson, Rodrigo and Schiele, Bernt
(2016) A Convnet for Non-maximum Suppression.
In: Pattern Recognition (GCPR 2016).

Huang, Chien-Chung and Kavitha, Telikepalli and Mehlhorn, Kurt and Michail, Dimitrios
(2016) Fair Matchings and Related Problems.
Algorithmica, 74 (3). 1184–1203.

Huang, Wen-Hung and Chen, Jian-Jia and Reineke, Jan
(2016) MIRROR: symmetric timing analysis for real-time tasks on multicore platforms with shared resources.
In: Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, Austin, TX, USA, June 5-9, 2016.

Höschele, Matthias and Zeller, Andreas
(2016) Mining input grammars from dynamic taints.
In: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, ASE 2016, Singapore, September 3-7, 2016.
Conference: ASE Automated Software Engineering Conference

Ibrahim, Yusra and Riedewald, Mirek and Weikum, Gerhard
(2016) Making Sense of Entities and Quantities in Web Tables.
In: Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Insafutdinov, Eldar and Pishchulin, Leonid and Andres, Bjoern and Andriluka, Mykhaylo and Schiele, Bernt
(2016) DeeperCut: A Deeper, Stronger, and Faster Multi-Person Pose Estimation Model.
In: Computer Vision – ECCV 2016.
Conference: ECCV European Conference on Computer Vision

Jacobs, Michael and Hahn, Sebastian and Hack, Sebastian
(2016) A Framework for the Derivation of WCET Analyses for Multi-core Processors.
In: 28th Euromicro Conference on Real-Time Systems, ECRTS 2016, Toulouse, France, July 5-8, 2016.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Jacobs, Swen and Bloem, Roderick
(2016) The Reactive Synthesis Competition: SYNTCOMP 2016 and Beyond.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016..

Jacobs, Swen and Bloem, Roderick and Brenguier, Romain and Khalimov, Ayrat and Klein, Felix and Könighofer, Robert and Kreber, Jens and Legg, Alexander and Narodytska, Nina and Perez, Guillermo A. and Raskin, Jean-Francois and Ryzhyk, Leonid and Sankur, Ocan and Seidl, Martina and Tentrup, Leander and Walker, Adam
(2016) The 3rd Reactive Synthesis Competition (SYNTCOMP 2016): Benchmarks, Participants & Results.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016..

Jacobs, Swen and Klein, Felix and Schirmer, Sebastian
(2016) A High-Level LTL Synthesis Format: TLSF v1.1.
In: Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016..

Jacobs, Swen and Tentrup, Leander and Zimmermann, Martin
(2016) Distributed PROMPT-LTL Synthesis.
In: Proceedings of the Seventh International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2016, Catania, Italy, 14-16 September 2016..

Jamrozik, Konrad and Styp-Rekowsky, Philipp von and Zeller, Andreas
(2016) Mining Sandboxes.
In: Proceedings of the 38th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Jansen, Kai and Tippenhauer, Nils Ole and Pöpper, Christina
(2016) Multi-Receiver GPS Spoofing Detection: Error Models and Realization.
In: Proceedings of the Annual Computer Security Applications Conference (ACSAC).

Jiang, Ke and Eles, Petru and Peng, Zebo and Chattopadhyay, Sudipta and Batina, Lejla
(2016) SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks.
In: 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

Jung, Ralf and Krebbers, Robbert and Birkedal, Lars and Dreyer, Derek
(2016) Higher-order ghost state.
In: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, ICFP 2016, Nara, Japan, September 18-22, 2016.
Conference: ICFP International Conference on Functional Programming

Just, Sascha and Herzig, Kim
(2016) Gotchas from mining bug reports.
In: Perspectives on Data Science for Software Engineering. Morgan Kaufmann, pp. 261-265.

Just, Sascha and Herzig, Kim and Czerwonka, Jacek and Murphy, Brendan
(2016) Switching to Git: The Good, the Bad, and the Ugly.
In: International Symposium on Software Reliability Engineering (ISSRE).

Kalojanov, Javor and Wand, Michael and Slusallek, Philipp
(2016) Building Construction Sets by Tiling Grammar Simplification.
Computer Graphics Forum, 35 (2). 13–25.

Kang, Jeehoon and Kim, Yoonseung and Hur, Chung-Kil and Dreyer, Derek and Vafeiadis, Viktor
(2016) Lightweight verification of separate compilation.
In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16).
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Karimi, M. and Tavakoli, E. and Farajtabar, Mehrdad and Song, Le and Gomez-Rodriguez, Manuel
(2016) Smart Broadcasting: Do you want to be seen?
In: Proc. of the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'16).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Kate, Aniket
(2016) Introduction to Credit Networks: Security, Privacy, and Applications.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
Conference: CCS ACM Conference on Computer and Communications Security

Kerber, Frederic and Hirtz, Christoph and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2016) Managing smartwatch notifications through filtering and ambient illumination.
In: Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, MobileHCI 2016, Florence, Italy, September 6-9, 2016.

Kerber, Frederic and Löchtefeld, Markus and Krüger, Antonio and McIntosh, Jess and McNeill, Charlie and Fraser, Mike
(2016) Understanding Same-Side Interactions with Wrist-Worn Devices.
In: Proceedings of the 9th Nordic Conference on Human-Computer Interaction. Nordic Conference on Human-Computer Interaction (NordiCHI-16), October 23-27, Gothenburg, Sweden.

Khoreva, Anna and Benenson, Rodrigo and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2016) Improved Image Boundaries for Better Video Segmentation.
In: Computer Vision - ECCV 2016 Workshops - Amsterdam, The Netherlands, October 8-10 and 15-16, 2016, Proceedings, Part III.

Khoreva, Anna and Benenson, Rodrigo and Omran, Mohamed and Hein, Matthias and Schiele, Bernt
(2016) Weakly Supervised Object Boundaries.
In: 29th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2016).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Kolev, Pavel and Mehlhorn, Kurt
(2016) A Note On Spectral Clustering.
In: ESA.
Conference: ESA European Symposium on Algorithms

Kosmalla, Felix and Wiehr, Frederik and Daiber, Florian and Krüger, Antonio and Löchtefeld, Markus
(2016) ClimbAware: Investigating Perception and Acceptance of Wearables in Rock Climbing.
In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016.
Conference: CHI International Conference on Human Factors in Computing Systems

Kremer, Steve and Künnemann, Robert
(2016) Automated analysis of security protocols with global state.
Journal of Computer Security.

Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016) Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
In: Symposium on Usable Privacy and Security (SOUPS) 2016.

Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar
(2016) The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
In: Financial Cryptography and Data Security 2016.

Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016) Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016) Nearly Optimal Verifiable Data Streaming.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.

Krüger, Jochen
(2016) Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht, 19 (11). pp. 728-731.

Krüger, Jochen and Möllers, Frederik
(2016) Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht. ISSN 1434-596X

Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2016) Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik-Spektrum, 39. pp. 427-435. ISSN 0170-6012

Krüger, Jochen and Sorge, Christoph and Vogelgesang, Stephanie
(2016) Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?
In: Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016.

Krüger, Jochen and Vogelgesang, Stephanie
(2016) Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik Spektrum, 39. pp. 427-435.

Krüger, Thilo and Wolf, Verena
(2016) Hybrid Stochastic Simulation of Rule-Based Polymerization Models.
In: Hybrid Systems Biology - 5th International Workshop, HSB 2016, Grenoble, France, October 20-21, 2016, Proceedings.

Kuzey, Erdal and Setty, Vinay and Strötgen, Jannik and Weikum, Gerhard
(2016) As Time Goes By: Comprehensive Tagging of Textual Phrases with Temporal Scopes.
In: Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11 - 15, 2016.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Kuzey, Erdal and Strötgen, Jannik and Setty, Vinay and Weikum, Gerhard
(2016) Temponym Tagging: Temporal Scopes for Textual Phrases.
In: Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11-15, 2016, Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Kuznetsov, Konstantin and Avdiienko, Vitalii and Gorla, Alessandra and Zeller, Andreas
(2016) Checking App User Interfaces Against App Descriptions.
In: Proceedings of the International Workshop on App Market Analytics.

Lahav, Ori and Giannarakis, Nick and Vafeiadis, Viktor
(2016) Taming release-acquire consistency.
In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16).
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Lahav, Ori and Vafeiadis, Viktor
(2016) Explaining Relaxed Memory Models with Program Transformations.
In: FM 2016: Formal Methods - 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings.
Conference: FM International Symposium on Formal Methods (was Formal Methods Europe FME)

Lai, Russell W F and Zhang, Tao and Chow, Sherman S M and Schröder, Dominique
(2016) Efficient Sanitizable Signatures Without Random Oracles.
In: Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16).
Conference: ESORICS European Symposium On Research In Computer Security

Lander, Christian and Kerber, Frederic and Rauber, Thorsten and Krüger, Antonio
(2016) A time-efficient re-calibration algorithm for improved long-term accuracy of head-worn eye trackers.
In: Proceedings of the Ninth Biennial ACM Symposium on Eye Tracking Research & Applications, ETRA 2016, Charleston, SC, USA, March 14-17, 2016.

Lander, Christian and Krüger, Antonio and Löchtefeld, Markus
(2016) "The story of life is quicker than the blink of an eye": using corneal imaging for life logging.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2016) Loss Functions for Top-k Error: Analysis and Insights.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Lass, Michael and Leibenger, Dominik and Sorge, Christoph
(2016) Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension.
In: Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN 2016).
Conference: LCN IEEE Conference on Local Computer Networks

Leffer, Lena and Mayer, Hendrik
(2016) EU-Datenschutz nach „Safe Harbor“.
Wirtschaftsführer für junge Juristen (2). pp. 58-60.

Leibenger, Dominik and Fortmann, Jonas and Sorge, Christoph
(2016) EncFS goes Multi-User: Adding Access Control to an Encrypted File System.
In: Proceedings of the 2nd IEEE Workshop on Security and Privacy in the Cloud (in conjunction with IEEE CNS 2016).

Leibenger, Dominik and Möllers, Frederik and Petrlic, Anna and Petrlic, Ronald and Sorge, Christoph
(2016) Privacy Challenges in the Quantified Self Movement - An EU Perspective.
Proceedings on Privacy Enhancing Technologies, 2016 (4). pp. 315-334.

Leibenger, Dominik and Möllers, Frederik and Petrlic, Anna and Petrlic, Ronald and Sorge, Christoph
(2016) Privacy Challenges in the Quantified Self Movement - An EU Perspective.
Proceedings on Privacy Enhancing Technologies, 2016 (4). ISSN 2299-0984

Leibenger, Dominik and Sorge, Christoph
(2016) sec-cs: Getting the Most out of Untrusted Cloud Storage.
CoRR.

Lemme, Stefan and Sutter, Jan and Schlinkmann, Christian and Slusallek, Philipp
(2016) The basic building blocks of declarative 3D on the web.
In: Proceedings of the 21st International Conference on Web3D Technology, Anaheim, CA, USA, July 22-24, 2016.

Lessel, Pascal and Altmeyer, Maximilian and Kerber, Frederic and Barz, Michael and Leidinger, Cornelius and Krüger, Antonio
(2016) WaterCoaster: A Device to Encourage People in a Playful Fashion to Reach Their Daily Water Intake Level.
In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016, Extended Abstracts.
Conference: CHI International Conference on Human Factors in Computing Systems

Lessel, Pascal and Altmeyer, Maximilian and Müller, Marc and Wolff, Christian and Krüger, Antonio
(2016) "Don't Whip Me With Your Games": Investigating "Bottom-Up" Gamification.
In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016.
Conference: CHI International Conference on Human Factors in Computing Systems

Li, Wenbin and Azimi, Seyedmajid and Leonardis, Ales and Fritz, Mario
(2016) To Fall Or Not To Fall: A Visual Approach to Physical Stability Prediction.
CoRR, abs/16.

Li, Wenbin and Fritz, Mario
(2016) Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2016) Visual Stability Prediction and Its Application to Manipulation.
CoRR, abs/16.

Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2016) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-137.

Lipp, Nils Peter
(2016) Full Reference Monitoring for Android Intents.
Bachelors thesis, UNSPECIFIED.

Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016) How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
In: Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16).
Conference: NDSS Network and Distributed System Security Symposium

Lv, Mingsong and Guan, Nan and Reineke, Jan and Wilhelm, Reinhard and Yi, Wang
(2016) A Survey on Static Cache Analysis for Real-Time Systems.
LITES, 3 (1). 05:1-05:48.

Löchtefeld, Markus and Krüger, Antonio and Gellersen, Hans
(2016) DeceptiBike: Assessing the Perception of Speed Deception in a Virtual Reality Training Bike System.
In: Proceedings of the 9th Nordic Conference on Human-Computer Interaction, Gothenburg, Sweden, October 23 - 27, 2016.

Lück, Alexander and Wolf, Verena
(2016) Generalized method of moments for estimating parameters of stochastic reaction networks.
BMC Systems Biology, 10. 98:1–98:12.

Maffei, Matteo
(2016) Security & Privacy Column.
SIGLOG News.

Maffei, Matteo and Grimm, Niklas and Focardi, Riccardo and Calzavara, Stefano
(2016) Micro-Policies for Web Session Security.
In: Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016) What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Maiya, Pallavi and Gupta, Rahul and Kanade, Aditya and Majumdar, Rupak
(2016) Partial Order Reduction for Event-Driven Multi-threaded Programs.
In: Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Majumdar, Rupak
(2016) Robots at the Edge of the Cloud.
In: Tools and Algorithms for the Construction and Analysis of Systems - 22nd International Conference, TACAS 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proc.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Majumdar, Rupak and Mallik, Kaushik and Schmuck, Anne-Kathrin
(2016) Compositional Synthesis of Finite State Abstractions.
CoRR, abs/16.

Majumdar, Rupak and Prabhu, Vinayak S.
(2016) Computing Distances between Reach Flowpipes.
In: Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control, HSCC 2016, Vienna, Austria, April 12-14, 2016.

Majumdar, Rupak and Prabhu, Vinayak S.
(2016) Computing Distances between Reach Flowpipes.
CoRR, abs/16.

Malinowski, Mateusz and Fritz, Mario
(2016) Tutorial on Answering Questions about Images with Deep Learning.
CoRR, abs/16.

Malinowski, Mateusz and Mokarian, Ashkan and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
In: Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, September 19-22, 2016.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2016) Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
CoRR, abs/16.

Marnau, Ninja
(2016) Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit (DuD), 05/201.

Mathur, Aditya and Tippenhauer, Nils Ole
(2016) SWaT: A Water Treatment Testbed for Research and Training on ICS Security.
In: Proceedings of Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater).

McIntosh, Jess and McNeill, Charlie and Fraser, Mike and Kerber, Frederic and Löchtefeld, Markus and Krüger, Antonio
(2016) EMPress: Practical Hand Gesture Classification with Wrist-Mounted EMG and Pressure Sensing.
In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016.
Conference: CHI International Conference on Human Factors in Computing Systems

Mehlhorn, Kurt and Saxena, Sanjeev
(2016) A still simpler way of introducing interior-point method for linear programming.
Computer Science Review, 22. 1–11.

Mercado, Pedro and Tudisco, Francesco and Hein, Matthias
(2016) Clustering Signed Networks with the Geometric Mean of Laplacians.
In: Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain.
Conference: NeurIPS Conference on Neural Information Processing Systems

Mokarian, Ashkan and Malinowski, Mateusz and Fritz, Mario
(2016) Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
CoRR, abs/16.

Moll, Simon and Doerfert, Johannes and Hack, Sebastian
(2016) Input space splitting for OpenCL.
In: Proceedings of the 25th International Conference on Compiler Construction, CC 2016, Barcelona, Spain, March 12-18, 2016.
Conference: CC International Conference on Compiler Construction

Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016) Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
In: 12th Symposium on Usable Privacy and Security (SOUPS'16).

Moreno-Sanchez, Pedro and Zafar, Muhammad Bilal and Kate, Aniket
(2016) Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Proceedings on Privacy Enhancing Technologies, 2016 (4). 436–453. ISSN 2299-0984

Mukherjee, Subhabrata and Dutta, Sourav and Weikum, Gerhard
(2016) Credible Review Detection with Limited Information Using Consistency Features.
In: Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2016, Riva del Garda, Italy, September 19-23, 2016, Proceedings, Part II.
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Mukherjee, Subhabrata and Günnemann, Stephan and Weikum, Gerhard
(2016) Continuous Experience-aware Language Model.
In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016.
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Möllers, Frederik and Hessel, Stefan
(2016) Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände.
In: Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016.

Möllers, Frederik and Hessel, Stefan
(2016) Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände.
In: Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016.

Möllers, Frederik and Sorge, Christoph
(2016) Deducing User Presence from Inter-Message Intervals in Home Automation Systems.
In: ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12). p. 81.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12). p. 81. ISSN 0949-2356

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit - DuD, 40 (8). pp. 497-502.

Möllers, Frederik and Vogelgesang, Stephanie
(2016) Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit – DuD, 40 (8). pp. 497-502. ISSN 1614-0702

Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2016) J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features.
Transactions of the Association for Computational Linguistics (TACL), 4. pp. 215-229.

Nguyen, Hoang-Vu and Mandros, Panagiotis and Vreeken, Jilles
(2016) Universal Dependency Analysis.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Nguyen, Hoang-Vu and Vreeken, Jilles
(2016) Flexibly Mining Better Subgroups.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Nguyen, Hoang-Vu and Vreeken, Jilles
(2016) Linear-Time Detection of Non-Linear Changes in Massively High Dimensional Time Series.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Nittala, Aditya Shekhar and Steimle, Jürgen
(2016) Digital fabrication pipeline for on-body sensors: design goals and challenges.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016.

Nürnberger, Stefan and Bugiel, Sven
(2016) Autonome Systeme.
Datenschutz und Datensicherheit, 40 (8). pp. 503-506.

Nürnberger, Stefan and Rossow, Christian
(2016) VatiCAN - Vetted, Authenticated CAN Bus.
In: . Conference on Cryptographic Hardware and Embedded Systems (CHES).
Conference: CHES Workshop on Cryptographic Hardware and Embedded Systems

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition: Privacy Implications in Social Media.
In: Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III.
Conference: ECCV European Conference on Computer Vision

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition; Privacy Implications in Social Media.
CoRR, abs/16.

Ohrimenko, Olga and Costa, Manuel and Fournet, Cédric and Nowozin, Sebastian and Mehta, Aastha and Schuster, Felix and Vaswani, Kapil
(2016) SGX-Enabled Oblivious Machine Learning.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2016) IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
JIP, 24 (3). 522–533.

Palatinus, Endre and Dittrich, Jens
(2016) Runtime Fragility in Main Memory.
In: Data Management on New Hardware. Springer, pp. 150-165.

Paul, Wolfgang J. and Baumann, Christoph and Lutsyk, P. and Schmaltz, Sabine and Oberhauser, J.
(2016) System Architecture as an Ordinary Engineering Discipline.
Springer.

Paul, Wolfgang J. and Lutsyk, P and Oberhauser, J
(2016) Multi-core System Architecture.
Technical Report. UNSPECIFIED.

Pellegrino, Giancarlo and Catakoglu, Onur and Balzarotti, Davide and Rossow, Christian
(2016) Uses and Abuses of Server-Side Requests.
In: Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Pfaff, David and Hack, Sebastian and Hammer, Christian
(2016) Learning how to prevent return-oriented programming efficiently.
In: Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik, 23.-26. Februar 2016, Wien, Österreich.

Pishchulin, Leonid and Insafutdinov, Eldar and Tang, Siyu and Andres, Bjoern and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2016) DeepCut: Joint Subset Partition and Labeling for Multi Person Pose Estimation.
In: 29th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2016).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Popat, Kashyap and Mukherjee, Subhabrata and Strötgen, Jannik and Weikum, Gerhard
(2016) Credibility Assessment of Textual Claims on the Web.
In: Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016) Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).

Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016) Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).

Rau, Andreas and Reinert, Maximilian and Zeller, Andreas
(2016) Automatic Test Transfer across Applications.
Technical Report. Chair of Software Engineering, Saarland University, Saarbrücken, Germany.

Rebele, Thomas and Suchanek, Fabian M and Hoffart, Johannes and Biega, Joanna and Kuzey, Erdal and Weikum, Gerhard
(2016) YAGO: A Multilingual Knowledge Base from Wikipedia, Wordnet, and Geonames.
In: Proc. 15th International Semantic Web Conference (ISWC 2016).
Conference: ISWC IEEE International Symposium on Wearable Computers

Reed, Scott and Akata, Zeynep and Lee, Honglak and Schiele, Bernt
(2016) Learning Deep Representations of Fine-Grained Visual Descriptions.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Reed, Scott and Akata, Zeynep and Mohan, Santos and Tenka, Samuel and Schiele, Bernt and Honglak, Lee
(2016) Learning What and Where to Draw.
In: Advances in Neural Information Processing Systems 29 (NIPS 2016).
Conference: NeurIPS Conference on Neural Information Processing Systems

Reed, Scott and Akata, Zeynep and Yan, Xinchen and Logeswaran, Lajanugen and Schiele, Bernt and Lee, Honglak
(2016) Generative Adversarial Text to Image Synthesis.
In: Proceedings of the 33rd International Conference on Machine Learning (ICML 2016).
Conference: ICML International Conference on Machine Learning

Reineke, Jan and Wilhelm, Reinhard
(2016) Static Timing Analysis - What is Special?
In: Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays.

Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2016) Novel Views of Objects from a Single Image.
CoRR, abs/16.

Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2016) Deep Reflectance Maps.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Rhodin, Helge and Richardt, Christian and Casas, Dan and Insafutdinov, Eldar and Shafiei, Mohammad and Seidel, Hans-Peter and Schiele, Bernt and Theobalt, Christian
(2016) EgoCap: Egocentric Marker-less Motion Capture with Two Fisheye Cameras.
ACM Transactions on Graphics (Proc. ACM SIGGRAPH Asia), 35 (6).

Rigby, Michael and Winter, Stephan and Krüger, Antonio
(2016) A Continuous Representation of Ad Hoc Ridesharing Potential.
IEEE Trans. Intelligent Transportation Systems, 17 (10). 2832–2842.

Rocchetto, Marco and Tippenhauer, Nils Ole
(2016) On Attacker Models and Profiles for Cyber-Physical Systems.
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS).

Rocchetto, Marco and Tippenhauer, Nils Ole
(2016) CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
In: Proceedings of the International Conference on Formal Engineering Methods (ICFEM).

Rohrbach, Anna and Rohrbach, Marcus and Hu, Ronghang and Darrell, Trevor and Schiele, Bernt
(2016) Grounding of Textual Phrases in Images by Reconstruction.
In: Computer Vision – ECCV 2016.
Conference: ECCV European Conference on Computer Vision

Rohrbach, Marcus and Rohrbach, Anna and Regneri, Michaela and Amin, Sikandar and Andriluka, Mykhaylo and Pinkal, Manfred and Schiele, Bernt
(2016) Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data.
International Journal of Computer Vision, 119 (3). pp. 346-373.

Roth, Thorsten and Weier, Martin and Hinkenjann, André and Li, Yongmin and Slusallek, Philipp
(2016) An analysis of eye-tracking data in foveated ray tracing.
In: 2016 IEEE Second Workshop on Eye Tracking and Visualization, ETVIS 2016, Baltimore, MD, USA, October 23, 2016.

Rozenshtein, Polina and Gionis, Aristides and Prakash, B. Aditya and Vreeken, Jilles
(2016) Reconstructing an Epidemic over Time.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Sagraloff, Michael and Mehlhorn, Kurt
(2016) Computing real roots of real polynomials.
Journal of Symbolic Computation, 73. 46–86.

Salem, Ahmed
(2016) CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Mental Pictures Using Deep Gaze Pooling.
CoRR, abs/16.

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
Technical Report. UNSPECIFIED.

Scheer, Jonas and Fritz, Mario and Grau, Oliver
(2016) Learning to Select Long-Track Features for Structure-From-Motion and Visual SLAM.
In: Pattern Recognition - 38th German Conference, GCPR 2016, Hannover, Germany, September 12-15, 2016, Proceedings.

Schiele, Bernt and Bhattacharjee, Bobby and Fritz, Mario and Aditya, Paarijaat and Druschel, Peter and Sen, Rijurekha and Oh, Seong Joon and Benenson, Rodrigo and Wu, Tong Tong
(2016) Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16).

Schmidt, Andreas and Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2016) Context-Sensitive Auto-Completion for Searching with Entities and Categories.
In: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, SIGIR 2016, Pisa, Italy, July 17-21, 2016.
Conference: SIGIR ACM International Conference on Research and Development in Information Retrieval

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS ACM Conference on Computer and Communications Security

Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2016) An Inductive Proof Method for Simulation-based Compiler Correctness.
CoRR, abs/16.

Schuh, Stefan and Chen, Xiao and Dittrich, Jens
(2016) An experimental comparison of thirteen relational equi-joins in main memory.
In: Proceedings of the 2016 International Conference on Management of Data.

Schuhknecht, Felix Martin and Dittrich, Jens and Sharma, Ankur
(2016) RUMA has it: rewired user-space memory access is possible!
Proceedings of the VLDB Endowment, 9 (10). pp. 768-779.

Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2016) An experimental evaluation and analysis of database cracking.
VLDB J., 25 (1). pp. 27-52.

Schwenger, Maximilian
(2016) When a Sentence Falls apart. Using Heuristically Guided Dead End Detection in Natural Language Processing.
Bachelors thesis, Saarland University.

Schwenger, Maximilian and Torralba, Àlvaro and Hoffmann, Jörg and Howcroft, David M. and Demberg, Vera
(2016) From OpenCCG to AI Planning: Detecting Infeasible Edges in Sentence Generation.
In: COLING 2016, 26th International Conference on Computational Linguistics, Proceedings of the Conference: Technical Papers, December 11-16, 2016, Osaka, Japan.
Conference: COLING International Conference on Computational Linguistics

Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016) An Empirical Study of Textual Key-Fingerprint Representations.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Sen, Rijurekha and Pirzada, Hasnain Ali and Phokeer, Amreesh and Farooq, Zaid Ahmed and Sengupta, Satadal and Choffnes, David R. and Gummadi, Krishna P.
(2016) On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service.
In: Proceedings of the 2016 ACM on Internet Measurement Conference, IMC 2016, Santa Monica, CA, USA, November 14-16, 2016.
Conference: IMC Internet Measurement Conference

Sen, Rijurekha and Quercia, Daniele and Ruiz, Carmen Karina Vaca and Gummadi, Krishna P.
(2016) Scalable Urban Data Collection from the Web.
In: Proceedings of the Tenth International Conference on Web and Social Media, Cologne, Germany, May 17-20, 2016..

Seufert, Stephan and Berberich, Klaus and Bedathur, Srikanta J. and Kondreddi, Sarath Kumar and Ernst, Patrick and Weikum, Gerhard
(2016) ESPRESSO: Explaining Relationships between Entity Sets.
In: Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Seufert, Stephan and Ernst, Patrick and Bedathur, Srikanta J. and Kondreddi, Sarath Kumar and Berberich, Klaus and Weikum, Gerhard
(2016) Instant Espresso: Interactive Analysis of Relationships in Knowledge Graphs.
In: Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11-15, 2016, Companion Volume..
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
In: Computer Vision - ECCV 2016 Workshops - Amsterdam, The Netherlands, October 8-10 and 15-16, 2016, Proceedings, Part III.

Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016) VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
CoRR, abs/16.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016) A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.

Siboni, Shachar and Shabtai, Asaf and Tippenhauer, Nils Ole and Lee, Jemin and Elovici, Yuval
(2016) Advanced Security Testbed Framework for Wearable IoT Devices.
Transactions on Internet Technology (TOIT), 16 (4). pp. 1-25.

Siu, Amy and Ernst, Patrick and Weikum, Gerhard
(2016) Disambiguation of entities in MEDLINE abstracts by combining MeSH terms with knowledge.
In: Proceedings of the 15th Workshop on Biomedical Natural Language Processing, BioNLP@ACL 2016, Berlin, Germany, August 12, 2016.

Song, Hyun Oh and Fritz, Mario and Göhring, Daniel and Darrell, Trevor
(2016) Learning to Detect Visual Grasp Affordance.
IEEE Trans. Automation Science and Engineering, 13 (2). pp. 798-809.

Sorge, Christoph
(2016) Modellierung in Recht und Informatik.
In: UNSPECIFIED juris GmbH, pp. 877-884.

Sorge, Christoph
(2016) Sicherheit der Kommunikation zwischen Rechtsanwalt und Mandant.
Neue Juristische Wochenschrift (38). pp. 20-22.

Soudjani, Sadegh Esmaeil Zadeh and Majumdar, Rupak and Abate, Alessandro
(2016) Safety Verification of Continuous-Space Pure Jump Markov Processes.
In: Tools and Algorithms for the Construction and Analysis of Systems - 22nd International Conference, TACAS 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proc.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Soudjani, Sadegh Esmaeil Zadeh and Majumdar, Rupak and Abate, Alessandro
(2016) Safety Verification of Continuous-Space Pure Jump Markov Processes.
In: Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Speicher, Marco and Daiber, Florian and Gehring, Sven and Krüger, Antonio
(2016) Exploring 3D manipulation on large stereoscopic displays.
In: Proceedings of the 5th ACM International Symposium on Pervasive Displays, PerDis 2016, Oulu, Finland, June 20 - 22, 2016.

Speicher, Marco and Gröber, Lea and Haluska, Julian and Hegemann, Lena and Hoffmann, Isabelle and Gehring, Sven and Krüger, Antonio
(2016) The audience in the role of the conductor: an interactive concert experience.
In: Proceedings of the 5th ACM International Symposium on Pervasive Displays, PerDis 2016, Oulu, Finland, June 20 - 22, 2016.

Steffensky, Joshua
(2016) Hardening Intel SGX enclaves against memory safety exploits.
Bachelors thesis, UNSPECIFIED.

Steimle, Jürgen
(2016) Skin-The Next User Interface.
IEEE Computer, 49 (4). 83–87.

Steinmetz, Marcel and Hoffmann, Jörg
(2016) Towards Clause-Learning State Space Search: Learning to Recognize Dead-Ends.
In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, USA..
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art.
J. Artif. Intell. Res. (JAIR), 57. pp. 229-271.

Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016) Revisiting Goal Probability Analysis in Probabilistic Planning.
In: Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Stock, Ben and Livshits, Benjamin and Zorn, Benjamin
(2016) Kizzle: A Signature Compiler for Detecting Exploit Kits.
In: The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks.
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
Conference: CCS ACM Conference on Computer and Communications Security

Tandon, Niket and Hariman, Charles and Urbani, Jacopo and Rohrbach, Anna and Rohrbach, Marcus and Weikum, Gerhard
(2016) Commonsense in Parts: Mining Part-Whole Relations from the Web and Image Tags.
In: Proc. of the 30th Conference of Artificial Intelligence (AAAI 2016).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016) Assessing the effect of cyber-physical attacks on water distribution systems.
In: Proceedings of World Congress on Environmental & Water Resources (EWRI).

Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016) Characterizing Cyber-Physical Attacks on Water Distribution Systems.
Journal of Water Resources Planning and Management, 143.

Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016) Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET.
In: Proceedings of Singapore Cyber Security Conference (SG-CRC).

Thrän, Daniela and Schaldach, Rüdiger and Millinger, Markus and Wolf, Verena and Arendt, Oliver and Ponitka, Jens and Gärtner, Sven and Rettenmaier, Nils and Hennenberg, Klaus and Schüngel, Jan
(2016) The MILESTONES modeling framework: An integrated analysis of national bioenergy strategies and their global environmental impacts.
Environmental Modelling & Software, 86. 14–29.

Tippenhauer, Nils Ole and Ochoa, Martín and Mathur, Aditya
(2016) Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures.
In: Proceedings of Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN).

Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Capkun, Srdjan
(2016) Physical-Layer Integrity for Wireless Messages.
Computer Networks, 109 (1). pp. 31-38.

Torralba, Àlvaro and Gnad, Daniel and Dubbert, Patrick and Hoffmann, Jörg
(2016) On State-Dominance Criteria in Fork-Decoupled Search.
In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Tran, Hai Dang and Stepanova, Daria and H., Mohamed and Lisi, Francesca A. and Weikum, Gerhard
(2016) Towards Nonmonotonic Relational Learning from Knowledge Graphs.
In: Inductive Logic Programming - 26th International Conference, ILP 2016, London, UK, September 4-6, 2016, Revised Selected Papers.

Urbani, Jacopo and Dutta, Sourav and Gurajada, Sairam and Weikum, Gerhard
(2016) KOGNAC: Efficient Encoding of Large Knowledge Graphs.
In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI 2016).
Conference: IJCAI International Joint Conference on Artificial Intelligence

Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik
(2016) Limiting The Impact of Stealthy Attacks on Industrial Control Systems.
In: ACM Conference on Computer and Communications Security (CCS), Vienna, Austria.
Conference: CCS ACM Conference on Computer and Communications Security

Urbina, David and Giraldo, Jairo and Tippenhauer, Nils Ole and Cárdenas, Alvaro
(2016) Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
In: Proceedings of Singapore Cyber Security Conference (SG-CRC).

Vahldiek-Oberwanger, Anjo and Bhattacharjee, Bobby and Garg, Deepak and Elnikety, Eslam and Druschel, Peter and Litton, James
(2016) Light-Weight Contexts: An OS Abstraction for Safety and Performance.
In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16).
Conference: OSDI Usenix Symposium on Operating Systems Design and Implementation

Venkatadri, Giridhari and Goga, Oana and Zhong, Changtao and Viswanath, Bimal and Gummadi, Krishna P. and Sastry, Nishanth R
(2016) Strengthening Weak Identities Through Inter-Domain Trust Transfer.
In: Proceedings of the 25th International Conference on World Wide Web (WWW'16).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Vogelgesang, Stephanie
(2016) Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?
juris – Die Monatszeitschrift, 3 (1). pp. 2-8. ISSN 2197-5345

Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016) Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11). pp. 729-734.

Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016) Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11). pp. 729-734. ISSN 1614-0702

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 233-235.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12). pp. 233-235. ISSN 0170-7256

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift, 3 (10). pp. 381-387.

Vogelgesang, Stephanie and Möllers, Frederik
(2016) Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift. ISSN 2197-5345

Waxweiler, Daniel
(2016) Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.

Wedeking, Lukas
(2016) Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.

Weier, Martin and Roth, Thorsten and Kruijff, Ernst and Hinkenjann, André and Pérard-Gayot, Arsène and Slusallek, Philipp and Li, Yongmin
(2016) Foveated Real-Time Ray Tracing for Head-Mounted Displays.
Computer Graphics Forum, 35 (7). 289–298.

Weikum, Gerhard
(2016) Die Abteilung Datenbanken und Informationssysteme am Max-Planck-Institut für Informatik.
Datenbank-Spektrum, 16 (1). 77–82.

Weikum, Gerhard and Hoffart, Johannes and Suchanek, Fabian M
(2016) Ten Years of Knowledge Harvesting: Lessons and Challenges.
IEEE Data Engineering Bulletin, 39 (3). pp. 41-50.

Weller, Michael and Vogelgesang, Stephanie
(2016) Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16.
jurisPR-ITR (19).

Wiehr, Frederik and Kosmalla, Felix and Daiber, Florian and Krüger, Antonio
(2016) Interfaces for assessing the rated perceived exertion (RPE) during high-intensity activities.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Wiehr, Frederik and Kosmalla, Felix and Daiber, Florian and Krüger, Antonio
(2016) betaCube: Enhancing Training for Climbing by a Self-Calibrating Camera-Projection Unit.
In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016, Extended Abstracts.
Conference: CHI International Conference on Human Factors in Computing Systems

Wiehr, Frederik and Voit, Alexandra and Weber, Dominik and Gehring, Sven and Witte, Christoph and Kärcher, Daniel and Henze, Niels and Krüger, Antonio
(2016) Challenges in designing and implementing adaptive ambient notification environments.
In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016.
Conference: UbiComp ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Wilhelm, Erik and Siby, Sandra and Zhou, Yuren and Ashok, Xavier J. S. and Jayasuriya, Melani and Foong, Shaohui and Kee, Jacksheeng and Wood, Kristin and Tippenhauer, Nils Ole
(2016) Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment.
Sensors, 16 (22). pp. 8111-8123.

Wilhelm, Erik and Tippenhauer, Nils Ole and Zhou, Yuren and Zhang, Nan
(2016) SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging.
In: Proceedings of Transportation Research Board Annual Meeting (TRB).

Xian, Yongqin and Akata, Zeynep and Sharma, Gaurav and Nguyen, Quynh N. and Hein, Matthias and Schiele, Bernt
(2016) Latent Embeddings for Zero-Shot Classification.
In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Yahya, Mohamed and Barbosa, Denilson and Berberich, Klaus and Wang, Qiuyue and Weikum, Gerhard
(2016) Relationship Queries on Extended Knowledge Graphs.
In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, February 22-25, 2016.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Yahya, Mohamed and Berberich, Klaus and Ramanath, Maya and Weikum, Gerhard
(2016) Exploratory Querying of Extended Knowledge Graphs.
PVLDB, 9 (13). pp. 1521-1524.

Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2016) On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs.
In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW'16).
Conference: CSCW ACM Conference on Computer Supported Cooperative Work

Zafar, Muhammad Bilal and Gummadi, Krishna P. and Danescu-Niculescu-Mizil, Cristian
(2016) Message Impartiality in Social Media Discussions.
In: Proceedings of the 10th International Conference on Web and Social Media.

Zeller, Andreas
(2016) Automatisches Sicherheitstesten.
Datenschutz und Datensicherheit (DuD), 40 (8). pp. 519-522.

Zeller, Andreas
(2016) Mining Apps for Anomalies.
In: SoftwareMining. Perspectives on Data Science for Software Engineering. ISBN 9780128042069

Zeller, Andreas
(2016) Software verstehen, zerstören, schützen mit automatischen Software-Modellen.
In: 46. Jahrestagung der Gesellschaft fuer Informatik (Informatik 2016).

Zeller, Andreas and Jamrozik, Konrad
(2016) DroidMate: a robust and extensible test generator for Android.
In: Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16).

Zeller, Andreas and Weyrich, Michael
(2016) Challenges for functional testing of reconfigurable production systems.
In: 21st IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2016, Berlin, Germany, September 6-9, 2016.

Zhang, Shanshan and Benenson, Rodrigo and Omran, Mohamed and Hosang, Jan and Schiele, Bernt
(2016) How Far are We from Solving Pedestrian Detection?
In: 29th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2016).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2016) It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
CoRR, abs/16.

and Nils Fleischhacker and Johannes Krupp and Dominique Schr\"de, Nico D\"ttling
(2016) Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
In: CRYPTO (3).

This list was generated on Wed Nov 20 19:11:19 2024 CET.