Number of items: 368.
A
Abel, Andreas and Reineke, Jan
(2016)
Gray-Box Learning of Serial Compositions of Mealy Machines.
Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016)
SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016)
You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle
(2016)
You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.
Aditya, Paarijaat and Sen, Rijurekha and Druschel, Peter and Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt and Bhattacharjee, Bobby and Wu, Tong Tong
(2016)
I-Pic: A Platform for Privacy-Compliant Image Capture.
Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016)
Multi-Cue Zero-Shot Learning with Strong Supervision.
CoRR, abs/16.
Akata, Zeynep and Malinowski, Mateusz and Fritz, Mario and Schiele, Bernt
(2016)
Multi-cue Zero-Shot Learning with Strong Supervision.
Altmeyer, Maximilian and Lessel, Pascal and Krüger, Antonio
(2016)
Expense Control: A Gamified, Semi-Automated, Crowd-Based Approach For Receipt Capturing.
Antonioli, Daniele and Agrawal, Anand and Tippenhauer, Nils Ole
(2016)
Towards High-Interaction Virtual ICS Honeypots-in-a-Box.
Athukorala, Kumaripaba and Glowacka, Dorata and Jacucci, Giulio and Oulasvirta, Antti and Vreeken, Jilles
(2016)
Is Exploratory Search Different? A Comparison of Information Search Behavior for Exploratory and Lookup Tasks.
Journal of the Association for Information Science and Technology, 67 (11).
pp. 2635-2651.
Außerlechner, Simon and Jacobs, Swen and Khalimov, Ayrat
(2016)
Tight Cutoffs for Guarded Protocols with Fairness.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Calciati, Paolo and Caiza Rom\'an, Juan Carlos and Gorla, Alessandra and Zeller, Andreas
(2016)
CALAPPA: A Toolchain for Mining Android Applications.
Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2016)
Abnormal Sensitive Data Usage in Android Apps.
Awazid, Tahleen Rahman
(2016)
Curious Volunteers: Anonymity Impact of adding Tor nodes.
Masters thesis, UNSPECIFIED.
and Nils Fleischhacker and Johannes Krupp and Dominique Schr\"de, Nico D\"ttling
(2016)
Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
B
Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gummadi, Krishna P. and Gomez-Rodriguez, Manuel
(2016)
On the Efficiency of the Information Networks in Social Media.
Backenköhler, Michael and Bortolussi, Luca and Wolf, Verena
(2016)
Generalized Method of Moments for Stochastic Reaction Networks in Equilibrium.
Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016)
On Profile Linkability despite Anonymity in Social Media Systems.
Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016)
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016)
Membership Privacy in MicroRNA-based Studies.
Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016)
Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016)
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In:
UNSPECIFIED
Springer International Publishing, Cham, pp. 87-138.
ISBN 978-3-319-43005-8
Backes, Michael and Bugiel, Sven and Derr, Erik
(2016)
Reliable Third-Party Library Detection in Android and its Security Applications.
Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016)
R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016)
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016)
POSTER: The ART of App Compartmentalization.
Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016)
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2).
pp. 16-21.
Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016)
Implementation-level Analysis of the JavaScript Helios Voting Client.
Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016)
Anonymous RAM.
Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016)
On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016)
Computational Soundness for Dalvik Bytecode.
Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016)
Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.
Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016)
Delegatable Functional Signatures.
In:
UNSPECIFIED
Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386.
ISBN 978-3-662-49384-7
Balegas, Valter and Li, Cheng and Najafzadeh, Mahsa and Porto, Daniel and Clement, Allen and Duarte, Sérgio and Ferreira, Carla and Gehrke, Johannes and Leitão, João and Preguiça, Nuno M. and Rodrigues, Rodrigo and Shapiro, Marc and Vafeiadis, Viktor
(2016)
Geo-Replication: Fast If Possible, Consistent If Necessary.
IEEE Data Eng. Bull., 39 (1).
81–92.
Banerjee, Abhijeet and Chattopadhyay, Sudipta and Roychoudhury, Abhik
(2016)
On Testing Embedded Software.
In:
UNSPECIFIED
Advances in Computers, 101
.
Elsevier, pp. 121-153.
ISBN 978-0-12-805158-0
Barthe, Gilles and D'Argenio, Pedro R. and Finkbeiner, Bernd and Hermanns, Holger
(2016)
Facets of Software Doping.
Bei, Xiaohui and Garg, Jugal and Hoefer, Martin and Mehlhorn, Kurt
(2016)
Computing Equilibria in Markets with Budget-Additive Utilities.
Belagiannis, Vasileios and Amin, Sikandar and Andriluka, Mykhaylo and Schiele, Bernt and Navab, Nassir and Ilic, Slobodan
(2016)
3D Pictorial Structures Revisited: Multiple Human Pose Estimation.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 38 (10).
1929–1942.
Bertens, Roel and Vreeken, Jilles and Siebes, Arno
(2016)
Keeping it Short and Simple: Summarising Complex Event Sequences with Multivariate Patterns.
Bhattacharjee, Bobby and Druschel, Peter and Herbster, Raul and DellaTorre, Scott
(2016)
Privacy Capsules: Preventing Information Leaks by Mobile Apps.
Bhattacharyya, Apratim and Malinowski, Mateusz and Fritz, Mario
(2016)
Spatio-Temporal Image Boundary Extrapolation.
CoRR, abs/16.
Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2016)
Long-Term Image Boundary Extrapolation.
CoRR, abs/16.
Biega, Joanna Asia and Gummadi, Krishna P. and Mele, Ida and Milchevski, Dragan and Tryfonopoulos, Christos and Weikum, Gerhard
(2016)
R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities.
Biondi, Alessandro and Brandenburg, Björn B.
(2016)
Lightweight Real-Time Synchronization under P-EDF on Symmetric and Asymmetric Multiprocessors.
Biondi, Alessandro and Brandenburg, Björn B. and Wieder, Alexander
(2016)
A Blocking Bound for Nested FIFO Spin Locks.
Blackburn, Stephen M. and Diwan, Amer and Hauswirth, Matthias and Sweeney, Peter F. and Amaral, José Nelson and Brecht, Tim and Bulej, Lubomír and Click, Cliff and Eeckhout, Lieven and Fischmeister, Sebastian and Frampton, Daniel and Hendren, Laurie J. and Hind, Michael and Hosking, Antony L. and Jones, Richard E. and Kalibera, Tomas and Keynes, Nathan and Nystrom, Nathaniel and Zeller, Andreas
(2016)
The Truth, The Whole Truth, and Nothing But the Truth: A Pragmatic Guide to Assessing Empirical Evaluations.
ACM Trans. Program. Lang. Syst., 38 (4).
15:1–15:20.
Bloem, Roderick and Braud-Santoni, Nicolas and Jacobs, Swen
(2016)
Synthesis of Self-Stabilising and Byzantine-Resilient Distributed Systems.
Bloem, Roderick and Jacobs, Swen and Khalimov, Ayrat and Konnov, Igor and Rubin, Sasha and Veith, Helmut and Widder, Josef
(2016)
Decidability in Parameterized Verification.
SIGACT News, 47 (2).
pp. 53-64.
Boldyrev, Natalia and Spaniol, Marc and Weikum, Gerhard
(2016)
ACROSS: A framework for multi-cultural interlinking of web taxonomies.
Bonakdarpour, Borzoo and Finkbeiner, Bernd
(2016)
Runtime Verification for HyperLTL.
Bonifaci, Vincenzo and Brandenburg, Björn B. and D'Angelo, Gianlorenzo and Marchetti-Spaccamela, Alberto
(2016)
Multiprocessor Real-Time Scheduling with Hierarchical Processor Affinities.
Brakerski, Zvika and Brzuska, Christina and Fleischhacker, Nils
(2016)
On Statistically Secure Obfuscation with Approximate Correctness.
Brandenburg, Björn B. and Gul, Mahircan
(2016)
Global Scheduling Not Required: Simple, Near-Optimal Multiprocessor Real-Time Scheduling with Semi-Partitioned Reservations.
Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
Detecting Hardware-Assisted Virtualization.
Budhathoki, Kailash and Vreeken, Jilles
(2016)
Causal Inference by Compression.
Bugiel, Sven
(2016)
Establishing mandatory access control on Android OS.
Doctoral thesis, UNSPECIFIED.
Bushart, Jonas
(2016)
Time-to-Live based Trilateration.
Bachelors thesis, UNSPECIFIED.
Busom, Nuria and Petrlic, Ronald and Sebe, Francesc and Sorge, Christoph and Valls, Magda
(2016)
Efficient smart metering based on homomorphic encryption.
Computer Communications, 82.
pp. 95-101.
ISSN 0140-3664
Böhm, Alexander and Dittrich, Jens and Mukherjee, Niloy and Pandis, Ippokrantis and Sen, Rajkumar
(2016)
Operational Analytics Data Management Systems.
PVLDB, 9 (13).
pp. 1601-1604.
C
Cahsor, Guido and Sorge, Christoph
(2016)
Datensicherheit (technisch-organisatorische Maßnahmen).
In:
UNSPECIFIED
C.H. Beck, pp. 356-379.
Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Nielsen, Jesper Buus
(2016)
Rate-1, Linear Time and Additively Homomorphic UC Commitments.
Cascudo, Ignacio and and Bernardo David and Nico D\"ttling, Ivan Damgård and Nielsen, Jesper Buus
(2016)
Rate-1, Linear Time and Additively Homomorphic UC Commitments.
Cerqueira, Felipe and Stutz, Felix and Brandenburg, Björn B.
(2016)
PROSA: A Case for Readable Mechanized Schedulability Analysis.
Chakraborty, Abhijnan and Ghosh, Saptarshi and Ganguly, Niloy and Gummadi, Krishna P.
(2016)
Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News.
Chakraborty, Soham and Vafeiadis, Viktor
(2016)
Validating optimizations of concurrent C/C++ programs.
Chen, Jian-Jia and Brandenburg, Björn B.
(2016)
A Note on the Period Enforcer Algorithm for Self-Suspending Tasks.
CoRR, abs/16.
Chistikov, Dmitry and Majumdar, Rupak and Niksic, Filip
(2016)
Hitting Families of Schedules for Asynchronous Programs.
Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016)
Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
Chiu, Wei-Chen and Galasso, Fabio and Fritz, Mario
(2016)
Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles.
CoRR, abs/16.
Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016)
Contextual Media Retrieval Using Natural Language Queries.
CoRR, abs/16.
Chowdhury, Sreyasi Nag and Malinowski, Mateusz and Bulling, Andreas and Fritz, Mario
(2016)
Xplore-M-Ego: Contextual Media Retrieval Using Natural Language Queries.
Chowdhury, Sreyasi Nag and Tandon, Niket and Weikum, Gerhard
(2016)
Know2Look: Commonsense Knowledge for Visual Search.
Cordts, Marius and Omran, Mohamed and Ramos, Sebastian and Rehfeld, Timo and Enzweiler, Markus and Benenson, Rodrigo and Franke, Uwe and Roth, Stefan and Schiele, Bernt
(2016)
The Cityscapes Dataset for Semantic Urban Scene Understanding.
Croitoru, Cosmina and Mehlhorn, Kurt
(2016)
Opposition Frameworks.
D
D\"ttling, Nico
(2016)
Low Noise LPN: Key dependent message secure public key encryption an sample amplification.
IET Information Security, 10 (6).
pp. 372-385.
Damm, Werner and Finkbeiner, Bernd and Rakow, Astrid
(2016)
What You Really Need To Know About Your Neighbor.
Darwish, Omar and Mehlhorn, Kurt
(2016)
Improved balanced flow computation using parametric flow.
Information Processing Letters, 116 (9).
560–563.
Daum, Jeanette and Torralba, Àlvaro and Hoffmann, Jörg and Haslum, Patrik and Weber, Ingo
(2016)
Practical Undoability Checking via Contingent Planning.
Davies, Nigel and Langheinrich, Marc and Krüger, Antonio
(2016)
Pervasive Displays Guest editors' introduction.
IEEE Pervasive Computing, 15 (3).
11–13.
Davis, Robert I. and Altmeyer, Sebastian and Reineke, Jan
(2016)
Analysis of Write-back Caches under Fixed-priority Preemptive and Non-preemptive Scheduling.
De, Abir and Valera, Isabel and Ganguly, Niloy and Bhattacharya, Sourangshu and Gomez-Rodriguez, Manuel
(2016)
Learning and Forecasting Opinion Dynamics in Social Networks.
Deininger, David and Dimitrova, Rayna and Majumdar, Rupak
(2016)
Symbolic Model Checking for Factored Probabilistic Models.
Demberg, Vera and Hoffmann, Jörg and Howcroft, David M. and Klakow, Dietrich and Torralba, Àlvaro
(2016)
Search Challenges in Natural Language Generation with Complex Optimization Objectives.
KI, 30 (1).
63–69.
Dietel, Sebastian
(2016)
Towards Native Client Executables via Binary Translation on the x86 Platform.
Bachelors thesis, UNSPECIFIED.
Dietrich, Aljoscha and Sorge, Christoph
(2016)
Attributbasierte Verschlüsselung für die Justiz.
Dimitrova, Rayna and Fioriti, Luis María Ferrer and Hermanns, Holger and Majumdar, Rupak
(2016)
Probabilistic CTL*: The Deductive Way.
Dittrich, Jens
(2016)
Patterns in Data Management.
Jens Dittrich.
Doko, Marko and Vafeiadis, Viktor
(2016)
A Program Logic for C11 Memory Fences.
Dong, Xinshu and Jauhar, Sumeet and Temple, William G. and Chen, Binbin and Kalbarczyk, Zbigniew and Sanders, William H. and Tippenhauer, Nils Ole and Nicol, David M.
(2016)
The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment.
Dreyer, Derek and Sheeran, Mary
(2016)
Special issue dedicated to ICFP 2014: Editorial.
J. Funct. Program., 26.
e20.
Du, Nan and Dai, Hanjun and Trivedi, Rakshit and Upadhyay, Utkarsh and Gomez-Rodriguez, Manuel and Song, Le
(2016)
Recurrent Marked Temporal Point Processes: Embedding Event History to Vector.
Du, Nan and Liang, Yingyu and Balcan, Maria-Florina and Gomez-Rodriguez, Manuel and Zha, Hongyuan and Song, Le
(2016)
Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm.
Journal of Machine Learning Research (JMLR).
Du, Xu and Emebo, Onyeka and Varde, Aparna S. and Tandon, Niket and Chowdhury, Sreyasi Nag and Weikum, Gerhard
(2016)
Air quality assessment from social media and structured data: Pollutants and health impacts in urban planning.
Duan, Ran and Garg, Jugal and Mehlhorn, Kurt
(2016)
An Improved Combinatorial Polynomial Algorithm for the Linear Arrow-Debreu Market.
Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016)
Two Message Oblivious Evaluation of Cryptographic Functionalities.
Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016)
Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
E
Elbassioni, Khaled M. and Mehlhorn, Kurt and Ramezani, Fahimeh
(2016)
Towards More Practical Linear Programming-based Techniques for Algorithmic Mechanism Design.
Theory of Computing Systems, 59 (4).
641–663.
ISSN 1432-4350
Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016)
T3: Comprehensive policy compliance in data retrieval systems.
Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016)
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
Endner-Dühr, Frederic
(2016)
Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data.
Masters thesis, UNSPECIFIED.
Ernst, Patrick and Siu, Amy and Milchevski, Dragan and Hoffart, Johannes and Weikum, Gerhard
(2016)
DeepLife: An Entity-aware Search, Analytics and Exploration Platform for Health and Life Sciences.
Esparza, Javier and Ganty, Pierre and Leroux, Jérôme and Majumdar, Rupak
(2016)
Model Checking Population Protocols.
Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2016)
Parameterized Verification of Asynchronous Shared-Memory Systems.
J. ACM, 63 (1).
10:1–10:48.
F
Fahl, Sascha
(2016)
On the importance of ecologically valid usable security research for end users and IT workers.
Doctoral thesis, University of Hanover, Hannover, Germany.
Faymonville, Peter and Finkbeiner, Bernd and Schirmer, Sebastian and Torfah, Hazem
(2016)
A Stream-Based Specification Language for Network Monitoring.
Feld, Thomas and Höger, Sebastian and Johann, Denis and Borgert, Stephan and Feld, Michael and Heuser, Dirk and Maringer, Silke and Keßler, Tobias and Petry, Florian and Reis, Robin and Sorge, Christoph and Tänzer, Guillem and Werth, Dirk and Keinath, Sabine and Zillekens, Peter Robert
(2016)
Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität.
Ferreira, Miguel and Zafar, Muhammad Bilal and Gummadi, Krishna P.
(2016)
The Case for Temporal Transparency: Detecting Policy Change Events in Black-Box Decision Making Systems.
CoRR, abs/16.
Fickert, Maximilian and Hoffmann, Jörg and Steinmetz, Marcel
(2016)
Combining the Delete Relaxation with Critical-Path Heuristics: A Direct Characterization.
J. Artif. Intell. Res., 56.
269–327.
Finkbeiner, Bernd
(2016)
Synthesis of Reactive Systems.
In:
Dependable Software Systems Engineering.
UNSPECIFIED, 72–98.
Finkbeiner, Bernd and Hahn, Christopher
(2016)
Deciding Hyperproperties.
Finkbeiner, Bernd and Hahn, Christopher
(2016)
Deciding Hyperproperties.
CoRR, abs/16.
Finkbeiner, Bernd and Klein, Felix
(2016)
Bounded Cycle Synthesis.
Finkbeiner, Bernd and Klein, Felix
(2016)
Bounded Cycle Synthesis.
CoRR, abs/16.
Finkbeiner, Bernd and Rabe, Markus N.
(2016)
Verifying hyperproperties of hardware systems.
Finkbeiner, Bernd and Seidl, Helmut and Müller, Christian
(2016)
Specifying and Verifying Secrecy in Workflows with Arbitrarily Many Agents.
Finkbeiner, Bernd and Sánchez, César
(2016)
Special issue on Rich Models, EU-COST Action IC0901 Rich-Model Toolkit.
Acta Inf., 53 (4).
325–326.
Finkbeiner, Bernd and Torfah, Hazem
(2016)
Synthesizing Skeletons for Reactive Systems.
Finkbeiner, Bernd and Zimmermann, Martin
(2016)
The First-Order Logic of Hyperproperties.
CoRR, abs/16.
Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2016)
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Forero, Juan Pablo and Fernando, Piyum and Priyashri, Sridhar and Withana, Anusha I. and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016)
PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6).
1001–1014.
Forero, Juan Pablo and Fernando, Piyum and Sridhar, Priyashri and Withana, Anusha Indrajith and Nanayakkara, Suranga and Steimle, Jürgen and Maes, Pattie
(2016)
PostBits: using contextual locations for embedding cloud information in the home.
Personal and Ubiquitous Computing, 20 (6).
pp. 1001-1014.
Frasconi, Paolo and Landwehr, Niels and Manco, Giuseppe and Vreeken, Jilles
(2016)
Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016).
Lecture Notes on Artificial Intelligence
(9851).
Springer.
G
Gao, Min and He, Lei and Majumdar, Rupak and Wang, Zilong
(2016)
LLSPLAT: Improving Concolic Testing by Bounded Model Checking.
Garg, Deepak and Bolosteanu, Iulia
(2016)
Asymmetric Secure Multi-execution with Declassification.
Garg, Deepak and Cheney, James and Perera, Roly
(2016)
Causally Consistent Dynamic Slicing.
Garg, Deepak and Rafnsson, Willard and Sabelfeld, Andrei
(2016)
Progress-Sensitive Security for SPARK.
Garg, Deepak and Rezk, Tamara and Rajani, Vineet
(2016)
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
Garg, Deepak and Çiçek, Ezgi and Paraskevopoulou, Zoe
(2016)
A type theory for incremental computational complexity with control flow changes.
Gautier, Antoine and Nguyen, Quynh N. and Hein, Matthias
(2016)
Globally Optimal Training of Generalized Polynomial Neural Networks with Nonlinear Spectral Methods.
Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gool, Luc J. Van and Tuytelaars, Tinne
(2016)
DeLight-Net: Decomposing Reflectance Maps into Specular Materials and Natural Illumination.
CoRR, abs/16.
Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne and Gool, Luc Van
(2016)
Natural Illumination from Multiple Materials Using Deep Learning.
CoRR, abs/16.
Gerling, Sebastian and Rossow, Christian
(2016)
Angreiferjagd im "Internet der Dinge".
Datenschutz und Datensicherheit, 40 (8).
pp. 507-510.
Ghaeini, Hamid and Tippenhauer, Nils Ole
(2016)
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems.
Giannopoulos, Ioannis and Schöning, Johannes and Krüger, Antonio and Raubal, Martin
(2016)
Attention as an input modality for Post-WIMP interfaces using the viGaze eye tracking framework.
Multimedia Tools Appl., 75 (6).
2913–2929.
Gnad, Daniel and Steinmetz, Marcel and Jany, Mathäus and Hoffmann, Jörg and Serina, Ivan and Gerevini, Alfonso
(2016)
Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications.
Gnad, Daniel and Wehrle, Martin and Hoffmann, Jörg
(2016)
Decoupled Strong Stubborn Sets.
Gomez-Rodriguez, Manuel and Song, Le and Du, Nan and Zha, Hongyuan and Schölkopf, Bernhard
(2016)
Influence Estimation and Maximization in Continuous-Time Diffusion Networks.
ACM Transactions on Information Systems (TOIS).
Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2016)
Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media.
Grimm, Rüdiger and Sorge, Christoph and Döhmann, Indra Spiecker genannt
(2016)
Recht und Technik: Datenschutz im Diskurs.
Grishchenko, Ilya and Maffei, Matteo and Calzavara, Stefano
(2016)
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving.
Groeger, Daniel and Loo, Elena Chong and Steimle, Jürgen
(2016)
HotFlex: Post-print Customization of 3D Prints Using Embedded State Change.
Grycner, Adam and Weikum, Gerhard
(2016)
POLY: Mining Relational Paraphrases from Multilingual Sentences.
Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016)
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
H
H., Mohamed and Stepanova, Daria and Urbani, Jacopo and Weikum, Gerhard
(2016)
Exception-Enriched Rule Learning from Knowledge Graphs.
Hagestedt, Inken
(2016)
Static Analysis of Non-interference for Android Apps.
Masters thesis, UNSPECIFIED.
Hahn, Sebastian and Jacobs, Michael and Reineke, Jan
(2016)
Enabling Compositionality for Multicore Timing Analysis.
Hammacher, Clemens and Streit, Kevin and Zeller, Andreas and Hack, Sebastian
(2016)
Thread-level Speculation with Kernel Support.
He, Mengda and Vafeiadis, Viktor and Qin, Shengchao and Ferreira, João F.
(2016)
Reasoning about Fences and Relaxed Atomics.
He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2016)
RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
CoRR, abs/16.
Hendricks, Lisa Anne and Akata, Zeynep and Rohrbach, Marcus and Donahue, Jeff and Schiele, Bernt and Darrell, Trevor
(2016)
Generating Visual Explanations.
Herzig, Kim and Just, Sascha and Zeller, Andreas
(2016)
The Impact of Tangled Code Changes on Defect Prediction Models.
Empirical Software Engineering, 21 (2).
pp. 303-336.
ISSN 1382-3256
Hessel, Stefan
(2016)
Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -.
JurPC (137).
Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard and Anand, Avishek and Singh, Jaspreet
(2016)
The Knowledge Awakens: Keeping Knowledge Bases Fresh with Emerging Entities.
Hosang, Jan and Benenson, Rodrigo and Dollár, Piotr and Schiele, Bernt
(2016)
What Makes for Effective Detection Proposals?
IEEE Transactions on Pattern Analysis and Machine Intelligence, 38 (4).
814–830.
Hosang, Jan and Benenson, Rodrigo and Schiele, Bernt
(2016)
A Convnet for Non-maximum Suppression.
Huang, Chien-Chung and Kavitha, Telikepalli and Mehlhorn, Kurt and Michail, Dimitrios
(2016)
Fair Matchings and Related Problems.
Algorithmica, 74 (3).
1184–1203.
Huang, Wen-Hung and Chen, Jian-Jia and Reineke, Jan
(2016)
MIRROR: symmetric timing analysis for real-time tasks on multicore platforms with shared resources.
Höschele, Matthias and Zeller, Andreas
(2016)
Mining input grammars from dynamic taints.
I
Ibrahim, Yusra and Riedewald, Mirek and Weikum, Gerhard
(2016)
Making Sense of Entities and Quantities in Web Tables.
Insafutdinov, Eldar and Pishchulin, Leonid and Andres, Bjoern and Andriluka, Mykhaylo and Schiele, Bernt
(2016)
DeeperCut: A Deeper, Stronger, and Faster Multi-Person Pose Estimation Model.
J
Jacobs, Michael and Hahn, Sebastian and Hack, Sebastian
(2016)
A Framework for the Derivation of WCET Analyses for Multi-core Processors.
Jacobs, Swen and Bloem, Roderick
(2016)
The Reactive Synthesis Competition: SYNTCOMP 2016 and Beyond.
Jacobs, Swen and Bloem, Roderick and Brenguier, Romain and Khalimov, Ayrat and Klein, Felix and Könighofer, Robert and Kreber, Jens and Legg, Alexander and Narodytska, Nina and Perez, Guillermo A. and Raskin, Jean-Francois and Ryzhyk, Leonid and Sankur, Ocan and Seidl, Martina and Tentrup, Leander and Walker, Adam
(2016)
The 3rd Reactive Synthesis Competition (SYNTCOMP 2016): Benchmarks, Participants & Results.
Jacobs, Swen and Klein, Felix and Schirmer, Sebastian
(2016)
A High-Level LTL Synthesis Format: TLSF v1.1.
Jacobs, Swen and Tentrup, Leander and Zimmermann, Martin
(2016)
Distributed PROMPT-LTL Synthesis.
Jamrozik, Konrad and Styp-Rekowsky, Philipp von and Zeller, Andreas
(2016)
Mining Sandboxes.
Jansen, Kai and Tippenhauer, Nils Ole and Pöpper, Christina
(2016)
Multi-Receiver GPS Spoofing Detection: Error Models and Realization.
Jiang, Ke and Eles, Petru and Peng, Zebo and Chattopadhyay, Sudipta and Batina, Lejla
(2016)
SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks.
Jung, Ralf and Krebbers, Robbert and Birkedal, Lars and Dreyer, Derek
(2016)
Higher-order ghost state.
Just, Sascha and Herzig, Kim
(2016)
Gotchas from mining bug reports.
In:
Perspectives on Data Science for Software Engineering.
Morgan Kaufmann, pp. 261-265.
Just, Sascha and Herzig, Kim and Czerwonka, Jacek and Murphy, Brendan
(2016)
Switching to Git: The Good, the Bad, and the Ugly.
K
Kalojanov, Javor and Wand, Michael and Slusallek, Philipp
(2016)
Building Construction Sets by Tiling Grammar Simplification.
Computer Graphics Forum, 35 (2).
13–25.
Kang, Jeehoon and Kim, Yoonseung and Hur, Chung-Kil and Dreyer, Derek and Vafeiadis, Viktor
(2016)
Lightweight verification of separate compilation.
Karimi, M. and Tavakoli, E. and Farajtabar, Mehrdad and Song, Le and Gomez-Rodriguez, Manuel
(2016)
Smart Broadcasting: Do you want to be seen?
Kate, Aniket
(2016)
Introduction to Credit Networks: Security, Privacy, and Applications.
Kerber, Frederic and Hirtz, Christoph and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2016)
Managing smartwatch notifications through filtering and ambient illumination.
Kerber, Frederic and Löchtefeld, Markus and Krüger, Antonio and McIntosh, Jess and McNeill, Charlie and Fraser, Mike
(2016)
Understanding Same-Side Interactions with Wrist-Worn Devices.
Khoreva, Anna and Benenson, Rodrigo and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2016)
Improved Image Boundaries for Better Video Segmentation.
Khoreva, Anna and Benenson, Rodrigo and Omran, Mohamed and Hein, Matthias and Schiele, Bernt
(2016)
Weakly Supervised Object Boundaries.
Kolev, Pavel and Mehlhorn, Kurt
(2016)
A Note On Spectral Clustering.
Kosmalla, Felix and Wiehr, Frederik and Daiber, Florian and Krüger, Antonio and Löchtefeld, Markus
(2016)
ClimbAware: Investigating Perception and Acceptance of Wearables in Rock Climbing.
Kremer, Steve and Künnemann, Robert
(2016)
Automated analysis of security protocols with global state.
Journal of Computer Security.
Krombholz, Katharina and Hupperich, Thomas and Holz, Thorsten
(2016)
Use the Force: Evaluating Force-sensitive Authentication for Mobile Devices.
Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar
(2016)
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016)
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
Krupp, Johannes and Schröder, Dominique and Simkin, Mark and Fiore, Dario and Ateniese, Giuseppe and Nürnberger, Stefan
(2016)
Nearly Optimal Verifiable Data Streaming.
Krüger, Jochen
(2016)
Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht, 19 (11).
pp. 728-731.
Krüger, Jochen and Möllers, Frederik
(2016)
Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?
MultiMedia und Recht.
ISSN 1434-596X
Krüger, Jochen and Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik-Spektrum, 39.
pp. 427-435.
ISSN 0170-6012
Krüger, Jochen and Sorge, Christoph and Vogelgesang, Stephanie
(2016)
Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?
Krüger, Jochen and Vogelgesang, Stephanie
(2016)
Pokémon GO – Technische Innovation und Strafrecht im Konflikt.
Informatik Spektrum, 39.
pp. 427-435.
Krüger, Thilo and Wolf, Verena
(2016)
Hybrid Stochastic Simulation of Rule-Based Polymerization Models.
Kuzey, Erdal and Setty, Vinay and Strötgen, Jannik and Weikum, Gerhard
(2016)
As Time Goes By: Comprehensive Tagging of Textual Phrases with Temporal Scopes.
Kuzey, Erdal and Strötgen, Jannik and Setty, Vinay and Weikum, Gerhard
(2016)
Temponym Tagging: Temporal Scopes for Textual Phrases.
Kuznetsov, Konstantin and Avdiienko, Vitalii and Gorla, Alessandra and Zeller, Andreas
(2016)
Checking App User Interfaces Against App Descriptions.
L
Lahav, Ori and Giannarakis, Nick and Vafeiadis, Viktor
(2016)
Taming release-acquire consistency.
Lahav, Ori and Vafeiadis, Viktor
(2016)
Explaining Relaxed Memory Models with Program Transformations.
Lai, Russell W F and Zhang, Tao and Chow, Sherman S M and Schröder, Dominique
(2016)
Efficient Sanitizable Signatures Without Random Oracles.
Lander, Christian and Kerber, Frederic and Rauber, Thorsten and Krüger, Antonio
(2016)
A time-efficient re-calibration algorithm for improved long-term accuracy of head-worn eye trackers.
Lander, Christian and Krüger, Antonio and Löchtefeld, Markus
(2016)
"The story of life is quicker than the blink of an eye": using corneal imaging for life logging.
Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2016)
Loss Functions for Top-k Error: Analysis and Insights.
Lass, Michael and Leibenger, Dominik and Sorge, Christoph
(2016)
Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension.
Leffer, Lena and Mayer, Hendrik
(2016)
EU-Datenschutz nach „Safe Harbor“.
Wirtschaftsführer für junge Juristen (2).
pp. 58-60.
Leibenger, Dominik and Fortmann, Jonas and Sorge, Christoph
(2016)
EncFS goes Multi-User: Adding Access Control to an Encrypted File System.
Leibenger, Dominik and Möllers, Frederik and Petrlic, Anna and Petrlic, Ronald and Sorge, Christoph
(2016)
Privacy Challenges in the Quantified Self Movement - An EU Perspective.
Proceedings on Privacy Enhancing Technologies, 2016 (4).
pp. 315-334.
Leibenger, Dominik and Möllers, Frederik and Petrlic, Anna and Petrlic, Ronald and Sorge, Christoph
(2016)
Privacy Challenges in the Quantified Self Movement - An EU Perspective.
Proceedings on Privacy Enhancing Technologies, 2016 (4).
ISSN 2299-0984
Leibenger, Dominik and Sorge, Christoph
(2016)
sec-cs: Getting the Most out of Untrusted Cloud Storage.
CoRR.
Lemme, Stefan and Sutter, Jan and Schlinkmann, Christian and Slusallek, Philipp
(2016)
The basic building blocks of declarative 3D on the web.
Lessel, Pascal and Altmeyer, Maximilian and Kerber, Frederic and Barz, Michael and Leidinger, Cornelius and Krüger, Antonio
(2016)
WaterCoaster: A Device to Encourage People in a Playful Fashion to Reach Their Daily Water Intake Level.
Lessel, Pascal and Altmeyer, Maximilian and Müller, Marc and Wolff, Christian and Krüger, Antonio
(2016)
"Don't Whip Me With Your Games": Investigating "Bottom-Up" Gamification.
Li, Wenbin and Azimi, Seyedmajid and Leonardis, Ales and Fritz, Mario
(2016)
To Fall Or Not To Fall: A Visual Approach to Physical Stability Prediction.
CoRR, abs/16.
Li, Wenbin and Fritz, Mario
(2016)
Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space.
Li, Wenbin and Leonardis, Ales and Fritz, Mario
(2016)
Visual Stability Prediction and Its Application to Manipulation.
CoRR, abs/16.
Lijffijt, Jefrey and Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Shahaf, Dafna and Faloutsos, Christos
(2016)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-137.
Lipp, Nils Peter
(2016)
Full Reference Monitoring for Android Intents.
Bachelors thesis, UNSPECIFIED.
Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016)
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Lv, Mingsong and Guan, Nan and Reineke, Jan and Wilhelm, Reinhard and Yi, Wang
(2016)
A Survey on Static Cache Analysis for Real-Time Systems.
LITES, 3 (1).
05:1-05:48.
Löchtefeld, Markus and Krüger, Antonio and Gellersen, Hans
(2016)
DeceptiBike: Assessing the Perception of Speed Deception in a Virtual Reality Training Bike System.
Lück, Alexander and Wolf, Verena
(2016)
Generalized method of moments for estimating parameters of stochastic reaction networks.
BMC Systems Biology, 10.
98:1–98:12.
M
Maffei, Matteo
(2016)
Security & Privacy Column.
SIGLOG News.
Maffei, Matteo and Grimm, Niklas and Focardi, Riccardo and Calzavara, Stefano
(2016)
Micro-Policies for Web Session Security.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016)
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Maiya, Pallavi and Gupta, Rahul and Kanade, Aditya and Majumdar, Rupak
(2016)
Partial Order Reduction for Event-Driven Multi-threaded Programs.
Majumdar, Rupak
(2016)
Robots at the Edge of the Cloud.
Majumdar, Rupak and Mallik, Kaushik and Schmuck, Anne-Kathrin
(2016)
Compositional Synthesis of Finite State Abstractions.
CoRR, abs/16.
Majumdar, Rupak and Prabhu, Vinayak S.
(2016)
Computing Distances between Reach Flowpipes.
Majumdar, Rupak and Prabhu, Vinayak S.
(2016)
Computing Distances between Reach Flowpipes.
CoRR, abs/16.
Malinowski, Mateusz and Fritz, Mario
(2016)
Tutorial on Answering Questions about Images with Deep Learning.
CoRR, abs/16.
Malinowski, Mateusz and Mokarian, Ashkan and Fritz, Mario
(2016)
Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2016)
Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
CoRR, abs/16.
Marnau, Ninja
(2016)
Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung.
Datenschutz und Datensicherheit (DuD), 05/201.
Mathur, Aditya and Tippenhauer, Nils Ole
(2016)
SWaT: A Water Treatment Testbed for Research and Training on ICS Security.
McIntosh, Jess and McNeill, Charlie and Fraser, Mike and Kerber, Frederic and Löchtefeld, Markus and Krüger, Antonio
(2016)
EMPress: Practical Hand Gesture Classification with Wrist-Mounted EMG and Pressure Sensing.
Mehlhorn, Kurt and Saxena, Sanjeev
(2016)
A still simpler way of introducing interior-point method for linear programming.
Computer Science Review, 22.
1–11.
Mercado, Pedro and Tudisco, Francesco and Hein, Matthias
(2016)
Clustering Signed Networks with the Geometric Mean of Laplacians.
Mokarian, Ashkan and Malinowski, Mateusz and Fritz, Mario
(2016)
Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task.
CoRR, abs/16.
Moll, Simon and Doerfert, Johannes and Hack, Sebastian
(2016)
Input space splitting for OpenCL.
Mondal, Mainack and Messias, Johnnatan and Ghosh, Saptarshi and Gummadi, Krishna P. and Kate, Aniket
(2016)
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Moreno-Sanchez, Pedro and Zafar, Muhammad Bilal and Kate, Aniket
(2016)
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Proceedings on Privacy Enhancing Technologies, 2016 (4).
436–453.
ISSN 2299-0984
Mukherjee, Subhabrata and Dutta, Sourav and Weikum, Gerhard
(2016)
Credible Review Detection with Limited Information Using Consistency Features.
Mukherjee, Subhabrata and Günnemann, Stephan and Weikum, Gerhard
(2016)
Continuous Experience-aware Language Model.
Möllers, Frederik and Hessel, Stefan
(2016)
Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände.
Möllers, Frederik and Hessel, Stefan
(2016)
Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände.
Möllers, Frederik and Sorge, Christoph
(2016)
Deducing User Presence from Inter-Message Intervals in Home Automation Systems.
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12).
p. 81.
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Sicherheit in der Gebäudeautomation.
xia - intelligente architektur (10–12).
p. 81.
ISSN 0949-2356
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit - DuD, 40 (8).
pp. 497-502.
Möllers, Frederik and Vogelgesang, Stephanie
(2016)
Smart-Home-Systeme in Zeiten digitaler Kriminalität.
Datenschutz und Datensicherheit – DuD, 40 (8).
pp. 497-502.
ISSN 1614-0702
N
Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2016)
J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features.
Transactions of the Association for Computational Linguistics (TACL), 4.
pp. 215-229.
Nguyen, Hoang-Vu and Mandros, Panagiotis and Vreeken, Jilles
(2016)
Universal Dependency Analysis.
Nguyen, Hoang-Vu and Vreeken, Jilles
(2016)
Flexibly Mining Better Subgroups.
Nguyen, Hoang-Vu and Vreeken, Jilles
(2016)
Linear-Time Detection of Non-Linear Changes in Massively High Dimensional Time Series.
Nittala, Aditya Shekhar and Steimle, Jürgen
(2016)
Digital fabrication pipeline for on-body sensors: design goals and challenges.
Nürnberger, Stefan and Bugiel, Sven
(2016)
Autonome Systeme.
Datenschutz und Datensicherheit, 40 (8).
pp. 503-506.
Nürnberger, Stefan and Rossow, Christian
(2016)
VatiCAN - Vetted, Authenticated CAN Bus.
O
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016)
Faceless Person Recognition: Privacy Implications in Social Media.
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016)
Faceless Person Recognition; Privacy Implications in Social Media.
CoRR, abs/16.
Ohrimenko, Olga and Costa, Manuel and Fournet, Cédric and Nowozin, Sebastian and Mehta, Aastha and Schuster, Felix and Vaswani, Kapil
(2016)
SGX-Enabled Oblivious Machine Learning.
P
Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2016)
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
JIP, 24 (3).
522–533.
Palatinus, Endre and Dittrich, Jens
(2016)
Runtime Fragility in Main Memory.
In:
Data Management on New Hardware.
Springer, pp. 150-165.
Paul, Wolfgang J. and Baumann, Christoph and Lutsyk, P. and Schmaltz, Sabine and Oberhauser, J.
(2016)
System Architecture as an Ordinary Engineering Discipline.
Springer.
Paul, Wolfgang J. and Lutsyk, P and Oberhauser, J
(2016)
Multi-core System Architecture.
Technical Report.
UNSPECIFIED.
Pellegrino, Giancarlo and Catakoglu, Onur and Balzarotti, Davide and Rossow, Christian
(2016)
Uses and Abuses of Server-Side Requests.
Pfaff, David and Hack, Sebastian and Hammer, Christian
(2016)
Learning how to prevent return-oriented programming efficiently.
Pishchulin, Leonid and Insafutdinov, Eldar and Tang, Siyu and Andres, Bjoern and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2016)
DeepCut: Joint Subset Partition and Labeling for Multi Person Pose Estimation.
Popat, Kashyap and Mukherjee, Subhabrata and Strötgen, Jannik and Weikum, Gerhard
(2016)
Credibility Assessment of Textual Claims on the Web.
Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).
Potel, Karin and Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit.
JurPC (141).
R
Rau, Andreas and Reinert, Maximilian and Zeller, Andreas
(2016)
Automatic Test Transfer across Applications.
Technical Report.
Chair of Software Engineering, Saarland University, Saarbrücken, Germany.
Rebele, Thomas and Suchanek, Fabian M and Hoffart, Johannes and Biega, Joanna and Kuzey, Erdal and Weikum, Gerhard
(2016)
YAGO: A Multilingual Knowledge Base from Wikipedia, Wordnet, and Geonames.
Reed, Scott and Akata, Zeynep and Lee, Honglak and Schiele, Bernt
(2016)
Learning Deep Representations of Fine-Grained Visual Descriptions.
Reed, Scott and Akata, Zeynep and Mohan, Santos and Tenka, Samuel and Schiele, Bernt and Honglak, Lee
(2016)
Learning What and Where to Draw.
Reed, Scott and Akata, Zeynep and Yan, Xinchen and Logeswaran, Lajanugen and Schiele, Bernt and Lee, Honglak
(2016)
Generative Adversarial Text to Image Synthesis.
Reineke, Jan and Wilhelm, Reinhard
(2016)
Static Timing Analysis - What is Special?
Rematas, Konstantinos and Nguyen, Chuong H. and Ritschel, Tobias and Fritz, Mario and Tuytelaars, Tinne
(2016)
Novel Views of Objects from a Single Image.
CoRR, abs/16.
Rematas, Konstantinos and Ritschel, Tobias and Fritz, Mario and Gavves, Efstratios and Tuytelaars, Tinne
(2016)
Deep Reflectance Maps.
Rhodin, Helge and Richardt, Christian and Casas, Dan and Insafutdinov, Eldar and Shafiei, Mohammad and Seidel, Hans-Peter and Schiele, Bernt and Theobalt, Christian
(2016)
EgoCap: Egocentric Marker-less Motion Capture with Two Fisheye Cameras.
ACM Transactions on Graphics (Proc. ACM SIGGRAPH Asia), 35 (6).
Rigby, Michael and Winter, Stephan and Krüger, Antonio
(2016)
A Continuous Representation of Ad Hoc Ridesharing Potential.
IEEE Trans. Intelligent Transportation Systems, 17 (10).
2832–2842.
Rocchetto, Marco and Tippenhauer, Nils Ole
(2016)
On Attacker Models and Profiles for Cyber-Physical Systems.
Rocchetto, Marco and Tippenhauer, Nils Ole
(2016)
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
Rohrbach, Anna and Rohrbach, Marcus and Hu, Ronghang and Darrell, Trevor and Schiele, Bernt
(2016)
Grounding of Textual Phrases in Images by Reconstruction.
Rohrbach, Marcus and Rohrbach, Anna and Regneri, Michaela and Amin, Sikandar and Andriluka, Mykhaylo and Pinkal, Manfred and Schiele, Bernt
(2016)
Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data.
International Journal of Computer Vision, 119 (3).
pp. 346-373.
Roth, Thorsten and Weier, Martin and Hinkenjann, André and Li, Yongmin and Slusallek, Philipp
(2016)
An analysis of eye-tracking data in foveated ray tracing.
Rozenshtein, Polina and Gionis, Aristides and Prakash, B. Aditya and Vreeken, Jilles
(2016)
Reconstructing an Epidemic over Time.
S
Sagraloff, Michael and Mehlhorn, Kurt
(2016)
Computing real roots of real polynomials.
Journal of Symbolic Computation, 73.
46–86.
Salem, Ahmed
(2016)
CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms.
Masters thesis, UNSPECIFIED.
Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016)
Predicting the Category and Attributes of Mental Pictures Using Deep Gaze Pooling.
CoRR, abs/16.
Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2016)
Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
Technical Report.
UNSPECIFIED.
Scheer, Jonas and Fritz, Mario and Grau, Oliver
(2016)
Learning to Select Long-Track Features for Structure-From-Motion and Visual SLAM.
Schiele, Bernt and Bhattacharjee, Bobby and Fritz, Mario and Aditya, Paarijaat and Druschel, Peter and Sen, Rijurekha and Oh, Seong Joon and Benenson, Rodrigo and Wu, Tong Tong
(2016)
Demo: I-Pic: A Platform for Privacy-Compliant Image Capture.
Schmidt, Andreas and Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2016)
Context-Sensitive Auto-Completion for Searching with Entities and Categories.
Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016)
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2016)
An Inductive Proof Method for Simulation-based Compiler Correctness.
CoRR, abs/16.
Schuh, Stefan and Chen, Xiao and Dittrich, Jens
(2016)
An experimental comparison of thirteen relational equi-joins in main memory.
Schuhknecht, Felix Martin and Dittrich, Jens and Sharma, Ankur
(2016)
RUMA has it: rewired user-space memory access is possible!
Proceedings of the VLDB Endowment, 9 (10).
pp. 768-779.
Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2016)
An experimental evaluation and analysis of database cracking.
VLDB J., 25 (1).
pp. 27-52.
Schwenger, Maximilian
(2016)
When a Sentence Falls apart. Using Heuristically Guided Dead End Detection in Natural Language Processing.
Bachelors thesis, Saarland University.
Schwenger, Maximilian and Torralba, Àlvaro and Hoffmann, Jörg and Howcroft, David M. and Demberg, Vera
(2016)
From OpenCCG to AI Planning: Detecting Infeasible Edges in Sentence Generation.
Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016)
An Empirical Study of Textual Key-Fingerprint Representations.
Sen, Rijurekha and Pirzada, Hasnain Ali and Phokeer, Amreesh and Farooq, Zaid Ahmed and Sengupta, Satadal and Choffnes, David R. and Gummadi, Krishna P.
(2016)
On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service.
Sen, Rijurekha and Quercia, Daniele and Ruiz, Carmen Karina Vaca and Gummadi, Krishna P.
(2016)
Scalable Urban Data Collection from the Web.
Seufert, Stephan and Berberich, Klaus and Bedathur, Srikanta J. and Kondreddi, Sarath Kumar and Ernst, Patrick and Weikum, Gerhard
(2016)
ESPRESSO: Explaining Relationships between Entity Sets.
Seufert, Stephan and Ernst, Patrick and Bedathur, Srikanta J. and Kondreddi, Sarath Kumar and Berberich, Klaus and Weikum, Gerhard
(2016)
Instant Espresso: Interactive Analysis of Relationships in Knowledge Graphs.
Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016)
VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
Sharma, Abhishek and Grau, Oliver and Fritz, Mario
(2016)
VConv-DAE: Deep Volumetric Shape Learning Without Object Labels.
CoRR, abs/16.
Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016)
A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.
Siboni, Shachar and Shabtai, Asaf and Tippenhauer, Nils Ole and Lee, Jemin and Elovici, Yuval
(2016)
Advanced Security Testbed Framework for Wearable IoT Devices.
Transactions on Internet Technology (TOIT), 16 (4).
pp. 1-25.
Siu, Amy and Ernst, Patrick and Weikum, Gerhard
(2016)
Disambiguation of entities in MEDLINE abstracts by combining MeSH terms with knowledge.
Song, Hyun Oh and Fritz, Mario and Göhring, Daniel and Darrell, Trevor
(2016)
Learning to Detect Visual Grasp Affordance.
IEEE Trans. Automation Science and Engineering, 13 (2).
pp. 798-809.
Sorge, Christoph
(2016)
Modellierung in Recht und Informatik.
In:
UNSPECIFIED
juris GmbH, pp. 877-884.
Sorge, Christoph
(2016)
Sicherheit der Kommunikation zwischen Rechtsanwalt und Mandant.
Neue Juristische Wochenschrift (38).
pp. 20-22.
Soudjani, Sadegh Esmaeil Zadeh and Majumdar, Rupak and Abate, Alessandro
(2016)
Safety Verification of Continuous-Space Pure Jump Markov Processes.
Soudjani, Sadegh Esmaeil Zadeh and Majumdar, Rupak and Abate, Alessandro
(2016)
Safety Verification of Continuous-Space Pure Jump Markov Processes.
Speicher, Marco and Daiber, Florian and Gehring, Sven and Krüger, Antonio
(2016)
Exploring 3D manipulation on large stereoscopic displays.
Speicher, Marco and Gröber, Lea and Haluska, Julian and Hegemann, Lena and Hoffmann, Isabelle and Gehring, Sven and Krüger, Antonio
(2016)
The audience in the role of the conductor: an interactive concert experience.
Steffensky, Joshua
(2016)
Hardening Intel SGX enclaves against memory safety exploits.
Bachelors thesis, UNSPECIFIED.
Steimle, Jürgen
(2016)
Skin-The Next User Interface.
IEEE Computer, 49 (4).
83–87.
Steinmetz, Marcel and Hoffmann, Jörg
(2016)
Towards Clause-Learning State Space Search: Learning to Recognize Dead-Ends.
Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016)
Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art.
J. Artif. Intell. Res. (JAIR), 57.
pp. 229-271.
Steinmetz, Marcel and Hoffmann, Jörg and Buffet, Olivier
(2016)
Revisiting Goal Probability Analysis in Probabilistic Planning.
Stock, Ben and Livshits, Benjamin and Zorn, Benjamin
(2016)
Kizzle: A Signature Compiler for Detecting Exploit Kits.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
T
Tandon, Niket and Hariman, Charles and Urbani, Jacopo and Rohrbach, Anna and Rohrbach, Marcus and Weikum, Gerhard
(2016)
Commonsense in Parts: Mining Part-Whole Relations from the Web and Image Tags.
Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016)
Assessing the effect of cyber-physical attacks on water distribution systems.
Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016)
Characterizing Cyber-Physical Attacks on Water Distribution Systems.
Journal of Water Resources Planning and Management, 143.
Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016)
Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET.
Thrän, Daniela and Schaldach, Rüdiger and Millinger, Markus and Wolf, Verena and Arendt, Oliver and Ponitka, Jens and Gärtner, Sven and Rettenmaier, Nils and Hennenberg, Klaus and Schüngel, Jan
(2016)
The MILESTONES modeling framework: An integrated analysis of national bioenergy strategies and their global environmental impacts.
Environmental Modelling & Software, 86.
14–29.
Tippenhauer, Nils Ole and Ochoa, Martín and Mathur, Aditya
(2016)
Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures.
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Capkun, Srdjan
(2016)
Physical-Layer Integrity for Wireless Messages.
Computer Networks, 109 (1).
pp. 31-38.
Torralba, Àlvaro and Gnad, Daniel and Dubbert, Patrick and Hoffmann, Jörg
(2016)
On State-Dominance Criteria in Fork-Decoupled Search.
Tran, Hai Dang and Stepanova, Daria and H., Mohamed and Lisi, Francesca A. and Weikum, Gerhard
(2016)
Towards Nonmonotonic Relational Learning from Knowledge Graphs.
U
Urbani, Jacopo and Dutta, Sourav and Gurajada, Sairam and Weikum, Gerhard
(2016)
KOGNAC: Efficient Encoding of Large Knowledge Graphs.
Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik
(2016)
Limiting The Impact of Stealthy Attacks on Industrial Control Systems.
Urbina, David and Giraldo, Jairo and Tippenhauer, Nils Ole and Cárdenas, Alvaro
(2016)
Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
V
Vahldiek-Oberwanger, Anjo and Bhattacharjee, Bobby and Garg, Deepak and Elnikety, Eslam and Druschel, Peter and Litton, James
(2016)
Light-Weight Contexts: An OS Abstraction for Safety and Performance.
Venkatadri, Giridhari and Goga, Oana and Zhong, Changtao and Viswanath, Bimal and Gummadi, Krishna P. and Sastry, Nishanth R
(2016)
Strengthening Weak Identities Through Inter-Domain Trust Transfer.
Vogelgesang, Stephanie
(2016)
Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?
juris – Die Monatszeitschrift, 3 (1).
pp. 2-8.
ISSN 2197-5345
Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016)
Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11).
pp. 729-734.
Vogelgesang, Stephanie and Hessel, Stefan and Möllers, Frederik
(2016)
Hardware-Keylogger: Die Tastatur in der Hand des Feindes.
Datenschutz und Datensicherheit - DuD, 40 (11).
pp. 729-734.
ISSN 1614-0702
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 233-235.
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016.
Datenschutz-Berater: Informationsdienst der Verlagsgruppe Handelsblatt (12).
pp. 233-235.
ISSN 0170-7256
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift, 3 (10).
pp. 381-387.
Vogelgesang, Stephanie and Möllers, Frederik
(2016)
Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität.
juris – Die Monatszeitschrift.
ISSN 2197-5345
W
Waxweiler, Daniel
(2016)
Making Chromium´s Certificate Transparency integration more accessible.
Masters thesis, UNSPECIFIED.
Wedeking, Lukas
(2016)
Anonymity Guarantees for Tor Hidden Services.
Bachelors thesis, Saarland University.
Weier, Martin and Roth, Thorsten and Kruijff, Ernst and Hinkenjann, André and Pérard-Gayot, Arsène and Slusallek, Philipp and Li, Yongmin
(2016)
Foveated Real-Time Ray Tracing for Head-Mounted Displays.
Computer Graphics Forum, 35 (7).
289–298.
Weikum, Gerhard
(2016)
Die Abteilung Datenbanken und Informationssysteme am Max-Planck-Institut für Informatik.
Datenbank-Spektrum, 16 (1).
77–82.
Weikum, Gerhard and Hoffart, Johannes and Suchanek, Fabian M
(2016)
Ten Years of Knowledge Harvesting: Lessons and Challenges.
IEEE Data Engineering Bulletin, 39 (3).
pp. 41-50.
Weller, Michael and Vogelgesang, Stephanie
(2016)
Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16.
jurisPR-ITR (19).
Wiehr, Frederik and Kosmalla, Felix and Daiber, Florian and Krüger, Antonio
(2016)
Interfaces for assessing the rated perceived exertion (RPE) during high-intensity activities.
Wiehr, Frederik and Kosmalla, Felix and Daiber, Florian and Krüger, Antonio
(2016)
betaCube: Enhancing Training for Climbing by a Self-Calibrating Camera-Projection Unit.
Wiehr, Frederik and Voit, Alexandra and Weber, Dominik and Gehring, Sven and Witte, Christoph and Kärcher, Daniel and Henze, Niels and Krüger, Antonio
(2016)
Challenges in designing and implementing adaptive ambient notification environments.
Wilhelm, Erik and Siby, Sandra and Zhou, Yuren and Ashok, Xavier J. S. and Jayasuriya, Melani and Foong, Shaohui and Kee, Jacksheeng and Wood, Kristin and Tippenhauer, Nils Ole
(2016)
Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment.
Sensors, 16 (22).
pp. 8111-8123.
Wilhelm, Erik and Tippenhauer, Nils Ole and Zhou, Yuren and Zhang, Nan
(2016)
SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging.
X
Xian, Yongqin and Akata, Zeynep and Sharma, Gaurav and Nguyen, Quynh N. and Hein, Matthias and Schiele, Bernt
(2016)
Latent Embeddings for Zero-Shot Classification.
Y
Yahya, Mohamed and Barbosa, Denilson and Berberich, Klaus and Wang, Qiuyue and Weikum, Gerhard
(2016)
Relationship Queries on Extended Knowledge Graphs.
Yahya, Mohamed and Berberich, Klaus and Ramanath, Maya and Weikum, Gerhard
(2016)
Exploratory Querying of Extended Knowledge Graphs.
PVLDB, 9 (13).
pp. 1521-1524.
Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Z
Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2016)
On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs.
Zafar, Muhammad Bilal and Gummadi, Krishna P. and Danescu-Niculescu-Mizil, Cristian
(2016)
Message Impartiality in Social Media Discussions.
Zeller, Andreas
(2016)
Automatisches Sicherheitstesten.
Datenschutz und Datensicherheit (DuD), 40 (8).
pp. 519-522.
Zeller, Andreas
(2016)
Mining Apps for Anomalies.
In:
SoftwareMining.
Perspectives on Data Science for Software Engineering.
ISBN 9780128042069
Zeller, Andreas
(2016)
Software verstehen, zerstören, schützen mit automatischen Software-Modellen.
Zeller, Andreas and Jamrozik, Konrad
(2016)
DroidMate: a robust and extensible test generator for Android.
Zeller, Andreas and Weyrich, Michael
(2016)
Challenges for functional testing of reconfigurable production systems.
Zhang, Shanshan and Benenson, Rodrigo and Omran, Mohamed and Hosang, Jan and Schiele, Bernt
(2016)
How Far are We from Solving Pedestrian Detection?
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2016)
It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation.
CoRR, abs/16.
This list was generated on Fri Dec 20 18:31:57 2024 CET.