TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Á | Ö | Č | Ş
Number of items at this level: 13847.

A

Araslanov, Nikita and Rothkopf, Constantin and Roth, Stefan (2019):
Actor-Critic Instance Segmentation.
In: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, [Conference or Workshop Item]

Aschermann, Cornelius and Frassetto, Tommaso and Holz, Thorsten and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Alt, Bastian and Weckesser, Markus and Becker, Christian and Hollick, Matthias and Kar, Sounak and Klein, Anja and Klose, Robin and Kluge, Roland and Koeppl, Heinz and KhudaBukhsh, Wasiur R. and Luthra, Manisha and Mousavi, Mahdi and Mühlhäuser, Max and Pfannemüller, Martin and Rizk, Amr and Schürr, Andy and Steinmetz, Ralf (2019):
Transitions: A Protocol-Independent View of the Future Internet.
In: Proceedings of the IEEE, pp. 835-846, 107, (4), ISSN 0018-9219,
DOI: 10.1109/JPROC.2019.2895964,
[Article]

Abera, Tigist and Bahmani, Raad and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Arul, Tolga and Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan (2019):
Privacy & Usability of IPTV Recommender Systems.
Las Vegas, USA, In: 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE), Las Vegas, USA, DOI: 10.1109/ICCE.2019.8662046,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Kumar, Manish and Katzenbeisser, Stefan (2019):
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems.
Las Vegas, USA, In: 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE), Las Vegas, USA, DOI: 10.1109/ICCE.2019.8661840,
[Conference or Workshop Item]

Almon, Lars and Álvarez, Flor and Lieser, Patrick and Meuser, Tobias and Schaller, Fabian (2018):
Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rechtlich ungeregelt.
In: Die Fortentwicklung des Datenschutzes, Vieweg, Wiesbaden, Springer, pp. 77-98, DOI: 10.1007/978-3-658-23727-1_5,
[Book Section]

Akrour, R. and Peters, J. and Neuman, G. (2018):
Constraint-Space Projection Direct Policy Search.
In: European Workshops on Reinforcement Learning (EWRL), Lille, France, [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...],
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Lotichius, Jan and Hatzfeld, Christian and Fernandes, Felipe and Sharma, Ratika and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Securing IoT Devices Using Robust DRAM PUFs.
Thessaloniki, Greece, In: 2018 Global Information Infrastructure and Networking Symposium (GIIS) (GIIS'18), Thessaloniki, Greece, DOI: 10.1109/GIIS.2018.8635789,
[Conference or Workshop Item]

Arul, Tolga and Anagnostopoulos, Nikolaos A. and Katzenbeisser, Stefan (2018):
Behavioral Workload Generation for IPTV.
Berlin, Germany, In: 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin) (ICCE-Berlin 2018), Berlin, Germany, DOI: 10.1109/ICCE-Berlin.2018.8576230,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: 28th Crypto-Day, München, Deutschland, In: GI, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos A. and Arul, Tolga and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2018):
Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs.
Prague, Czech Republic, In: 2018 Euromicro Conference on Digital System Design (DSD), Prague, Czech Republic, DOI: 10.1109/DSD.2018.00102,
[Conference or Workshop Item]

Albrecht, Martin R. and Curtis, Benjamin R. and Deo, Amit and Davidson, Alex and Player, Rachel and Postlethwaite, Eamonn W. and Virdia, Fernando and Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: SCN 2018, In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, In: LNCS, [Online-Edition: http://scn.di.unisa.it/],
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
In: IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, New York, NY, USA, ACM, Budapest, HU, 20-25 August 2018, [Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....],
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Chandy, John A. and Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, MDPI, Volume 2, (7), DOI: 10.3390/cryptography2020007,
[Article]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Asokan, N. and Nyman, Thomas and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, [Article]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Schaller, André and Xiong, Wenjie and Jain, Manishkumar and Saleem, Umair and Lotichius, Jan and Gabmeyer, Sebastian and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, MDPI, 2, (3), ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm],
[Article]

Amann, Sven (2018):
A Systematic Approach to Benchmark and Improve Automated Static Detection of Java-API Misuses.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7422],
[Ph.D. Thesis]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Arnold, Thomas Otmar (2018):
Advanced Motif Analysis on Text Induced Graphs.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7442],
[Ph.D. Thesis]

Aragon, Santiago and Tiloca, Marco and Maass, Max and Hollick, Matthias and Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE, ISSN 978-1-5386-4586-4,
DOI: 10.1109/CNS.2018.8433209,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7696],
[Article]

Asadiand, Arash and Müller, Sabrina and Sim, Gek Hong and Klein, Anja and Matthias, Hollick (2018):
FML: Fast Machine Learning for 5G mmWave Vehicular Communications.
In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, DOI: 10.1109/INFOCOM.2018.8485876,
[Conference or Workshop Item]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Master Thesis]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Schulz, Steffen and Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: CoRR, abs/1801.05764, [Online-Edition: http://arxiv.org/abs/1801.05764],
[Article]

Amann, Sven and Nguyen, Hoan Anh and Nadi, Sarah and Nguyen, Tien and Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Article]

Asokan, N. and Nguyen, Thien Duc and Tarkoma, Sasu and Toivonen, Juhani and Truong, Hien Thi Thu (2018):
Proximity Verification Based on Acoustic Room Impulse Response.
In: CoRR, abs/1803.07211, [Online-Edition: http://arxiv.org/abs/1803.07211],
[Article]

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1, ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...],
[Article]

Asokan, N. and Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...],
[Article]

Akrour, R. and Veiga, F. and Peters, J. and Neuman, G. (2018):
Regularizing Reinforcement Learning with State Abstraction.
In: Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...],
[Conference or Workshop Item]

Albrecht, Martin and Göpfert, Florian and Vidria, Fernando and Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology, Springer, [Conference or Workshop Item]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
TU Darmstadt, [Master Thesis]

Anagnostopoulos, Nikolaos Athanasios and Gabmeyer, Sebastian and Arul, Tolga and Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Conference or Workshop Item]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt, [Master Thesis]

Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Martin and Tippenhauer, Nils Ole (2017):
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
In: ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, USA, ISBN 978-1-4503-5394-6,
DOI: 10.1145/3140241.3140253,
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Critical Information Infrastructures Security (CRITIS), Cham, CH, Springer, Lucca, Italy, 8-13 October 2018, In: Lecture Notes in Computer Science, 10707, [Conference or Workshop Item]

Aroudj, Samir and Seemann, Patrick and Langguth, Fabian and Guthe, Stefan and Goesele, Michael (2017):
Visibility-Consistent Thin Surface Reconstruction Using Multi-Scale Kernels.
In: ACM Transactions on Graphics (Proceedings of SIGGRAPH Asia), ACM, pp. 187:1-187:13, 36, (6), DOI: 10.1145/3130800.3130851,
[Article]

Arul, Tolga (2017):
Channel Switching-Triggered Charging for Pay-TV over IPTV.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6680],
[Ph.D. Thesis]

Arias, Orlando and Gens, David and Jin, Yier and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), [Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Frieß, Tamara and Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session, Vancouver, Canada, [Other]

Alexopoulos, Nikolaos and Daubert, Jörg and Mühlhäuser, Max and Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, IEEE, Sydney, Australia, 1-4 August 2017, [Conference or Workshop Item]

Alexopoulos, Nikolaos and Kiayias, Aggelos and Talviste, Riivo and Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Online-Edition: https://www.usenix.org/conference/usenixsecurity17],
[Conference or Workshop Item]

Atre, Rohit and Jannesari, Ali and Wolf, Felix (2017):
Meeting the challenges of parallelizing sequential programs.
ACM, In: Proceedinggs of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Washington, DC, USA, ISBN 978-1-4503-4593-4,
DOI: 10.1145/3087556.3087592,
[Conference or Workshop Item]

Atre, Rohit and Huda, Zia Ul and Jannesari, Ali and Wolf, Felix (2017):
Dissecting sequential programs for parallelization - an approach based on computational units.
In: 10th International Symposium on High-Level Parallel Programming and Applications, Valladolid, Spain, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Schaller, André and Fan, Yufan and Xiong, Wenjie and Tehranipoor, Fatemeh and Arul, Tolga and Gabmeyer, Sebastian and Szefer, Jakub and Chandy, John A. and Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
In: 26th Crypto-Day, [Conference or Workshop Item]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Article]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), Springer, pp. 805-858, 30, (3), DOI: 10.1007/s00145-016-9236-6,
[Article]

Alkeilani Alkadri, Nabil and Buchmann, Johannes and El Bansarkhani, Rachid and Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
[Other]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Eaton, Edward and Gutoski, Gus and Krämer, Juliane and Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Arnold, Thomas and Daxenberger, Johannes and Weihe, Karsten and Gurevych, Iryna (2017):
Is Interaction More Important Than Individual Performance? A Study of Motifs in Wikia.
In: Proceedings of the 26th International Conference Companion on World Wide Web, International World Wide Web Conferences Steering Committee, Perth, Australia, In: WWW '17 Companion, [Online-Edition: http://dl.acm.org/citation.cfm?id=3041021.3053362],
[Conference or Workshop Item]

Abualhaija, Sallam and Miller, Tristan and Eckle-Kohler, Judith and Gurevych, Iryna and Zimmermann, Karl-Heinz (2017):
Metaheuristic Approaches to Lexical Substitution and Simplification.
In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2017), Association for Computational Linguistics, Valencia, Spain, 1, ISBN 978-1-945626-34-0,
[Online-Edition: http://aclweb.org/anthology/E/E17/E17-1082.pdf],
[Conference or Workshop Item]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing, New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Conference or Workshop Item]

Amend, Sandra C. (2017):
Predicting Execution Time of GPU Kernels using automatic Performance Models.
TU Darmstadt, [Master Thesis]

Arazy, Ofer and Lifshitz-Assaf, Hila and Nov, Oded and Daxenberger, Johannes and Balestra, Martina and Cheshire, Coye (2017):
On the "How" and "Why" of Emergent Role Behaviors in Wikipedia.
In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, Portland, OR, USA, [Online-Edition: https://dl.acm.org/citation.cfm?id=2998317],
[Conference or Workshop Item]

Arzt, Steven (2017):
Static Data Flow Analysis for Android Applications.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937],
[Ph.D. Thesis]

Ali, Azad (2017):
Fault-Tolerant Spatio-Temporal Compression Scheme for Wireless Sensor Networks.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5924],
[Ph.D. Thesis]

Asadi, Arash and Mancuso, Vincenzo and Gupta, Rohit (2017):
DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks.
In: IEEE/ACM Transactions on Networking, [Article]

Abdulsamad, H. and Arenz, O. and Peters, J. and Neumann, G. (2017):
State-Regularized Policy Search for Linearized Dynamical Systems.
In: Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Akrour, R. and Sorokin, D. and Peters, J. and Neumann, G. (2017):
Local Bayesian Optimization of Motor Skills.
In: Proceedings of the International Conference on Machine Learning (ICML), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Almon, Lars and Riecker, Michael and Hollick, Matthias (2017):
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
IEEE, In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 9-12 Oct. 2017, DOI: 10.1109/LCN.2017.110,
[Online-Edition: https://ieeexplore.ieee.org/document/8109386],
[Conference or Workshop Item]

Arazy, Ofer and Daxenberger, Johannes and Lifshitz-Assaf, Hila and Nov, Oded and Gurevych, Iryna (2016):
Turbulent Stability of Emergent Roles: The Dualistic Nature of Self-Organizing Knowledge Co-Production.
In: Information Systems Research, pp. 792-812, 27, (4), [Online-Edition: https://pubsonline.informs.org/doi/abs/10.1287/isre.2016.064...],
[Article]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Abel, Andrea and Meyer, Christian M.
Klosa, Annette and Müller-Spitzer, Carolin (eds.) (2016):
Nutzerbeteiligung.
In: Internetlexikografie. Ein Kompendium, Berlin: De Gruyter, pp. 249-290, DOI: 10.1515/9783050095615-009,
[Online-Edition: https://www.degruyter.com/view/books/9783050095615/978305009...],
[Book Section]

Appel, Michael and Bossert, Andreas and Cooper, Steven and Kußmaul, Tobias and Löffler, Johannes and Pauer, Christof and Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Andrienko, Gennady and Andrienko, Natalia and Budziak, Guido and Landesberger, Tatiana von and Weber, Hendrik (2016):
Coordinate Transformations for Characterization and Cluster Analysis of Spatial Configurations in Football.
In: Machine Learning and Knowledge Discovery in Databases, Proceedings, Part II, Springer, In: European Conference, ECML PKDD 2016, Riva del Garda, Italy, September 19-23, In: Lecture Notes in Computer Science (LNCS); 9853, DOI: 10.1007/978-3-319-46131-1₆,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Arazy, Ofer and Daxenberger, Johannes and Lifshitz-Assaf, Hila and Nov, Oded and Gurevych, Iryna (2016):
Emergent Roles in Self-Organizing Knowledge Co-Production: Turbulence and Stability.
In: 2017 Collective Intelligence Conference, New York, NY, USA, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Conference or Workshop Item]

Amann, Sven and Proksch, Sebastian and Nadi, Sarah (2016):
FeedBaG: An Interaction Tracker for Visual Studio.
In: Proceedings of the 24th International Conference on Program Comprehension, In: International Conference on Program Comprehension, Austin, Texas, USA, May 16–17, 2016, In: ICPC, [Online-Edition: http://sven-amann.de/publications/feedbag.pdf],
[Conference or Workshop Item]

Akleylek, Sedat and Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Amann, Sven and Nadi, Sarah and Nguyen, Hoan A. and Nguyen, Tien N. and Mezini, Mira (2016):
MUBench: A Benchmark for API-Misuse Detectors.
In: Proceedings of the 13th International Conference on Mining Software Repositories, In: 13th International Conference on Mining Software Repositories, Austin, Texas, USA, May 14–15, 2016, In: MSR'16, [Conference or Workshop Item]

Amann, Sven and Proksch, Sebastian and Nadi, Sarah and Mezini, Mira (2016):
A Study of Visual Studio Usage in Practice.
In: 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering, Osaka, Japan, 14-18 March 2016, In: SANER '16, [Online-Edition: http://dx.doi.org/10.1109/SANER.2016.39],
[Conference or Workshop Item]

Akleylek, Sedat and Dagdelen, Özgür and Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: Cryptography and Information Security in the Balkans, Springer, Koper, Slovenia, In: LNCS, 9540, [Conference or Workshop Item]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Andrychowicz, Marcin and Dziembowski, Stefan and Faust, Sebastian (2016):
Circuit Compilers with O(1/ log(n)) Leakage Rate.
In: IACR Cryptology ePrint Archive, p. 173, 2016, [Online-Edition: http://eprint.iacr.org/2016/173],
[Article]

Albert, Elvira and Bubel, Richard and Genaim, Samir and Hähnle, Reiner and Puebla, German and Roman-Diez, Guillermo (2016):
A formal verification framework for static analysis - As well as its instantiation to the resource analyzer COSTA and formal verification tool KeY.
In: Software and System Modeling, pp. 987-1012, 15, (4), DOI: 10.1007/s10270-015-0476-y,
[Online-Edition: https://doi.org/10.1007/s10270-015-0476-y],
[Article]

Alagic, Gorjan and Broadbent, Anne and Fefferman, Bill and Gagliardoni, Tommaso and Schaffner, Christian and Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Computational Security of Quantum Encryption - QCRYPT 2016, Springer, Wahington, D.C., USA, In: Lecture Notes in Computer Science - ICITS, [Other]

Asadi, Arash and Mancuso, Vincenzo (2016):
Network-assisted Outband D2D-clustering in 5G Cellular Networks: Theory and Practice.
In: IEEE Transactions on Mobile Computing, [Article]

Asadi, Arash and Mancuso, Vincenzo and Gupta, Rohit (2016):
An SDR-based Experimental Study of Outband D2D Communications.
In: International Conference on Computer Communications, IEEE, [Conference or Workshop Item]

Arnold, Thomas and Weihe, Karsten (2016):
Network Motifs May Improve Quality Assessment of Text Documents.
In: Proceedings of TextGraphs-10: the Workshop on Graph-based Methods for Natural Language Processing, [Online-Edition: http://www.aclweb.org/anthology/W16-1404],
[Conference or Workshop Item]

Andrychowicz, Marcin and Dziembowski, Stefan and Faust, Sebastian (2016):
Circuit Compilers with O(1/log (n)) Leakage Rate.
In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, DOI: 10.1007/978-3-662-49896-5₂₁,
[Online-Edition: https://doi.org/10.1007/978-3-662-49896-5_21],
[Conference or Workshop Item]

Arenz, O. and Abdulsamad, H. and Neumann, G. (2016):
Optimal Control and Inverse Optimal Control by Distribution Matching.
In: Proceedings of the International Conference on Intelligent Robots and Systems (IROS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Team/OlegArenz/OC an...],
[Conference or Workshop Item]

Abdolmaleki, A. and Lau, N. and Reis, L. and Peters, J. and Neumann, G. (2016):
Contextual Policy Search for Linear and Nonlinear Generalization of a Humanoid Walking Controller.
In: Journal of Intelligent & Robotic Systems, pp. 393-408, 83, (3-4), [Online-Edition: https://link.springer.com/article/10.1007/s10846-016-0347-y],
[Article]

Akrour, R. and Abdolmaleki, A. and Abdulsamad, H. and Neumann, G. (2016):
Model-Free Trajectory Optimization for Reinforcement Learning.
In: Proceedings of the International Conference on Machine Learning (ICML), [Online-Edition: http://proceedings.mlr.press/v48/akrour16.pdf],
[Conference or Workshop Item]

Azad, M. and Ortenzi, V. and Lin, C. and Rueckert, E. and Mistry, M. (2016):
Model Estimation and Control of Complaint Contact Normal Force.
In: Proceedings of the International Conference on Humanoid Robots (HUMANOIDS), [Online-Edition: https://rueckert.lima-city.de/papers/Humanoids2016Azad.pdf],
[Conference or Workshop Item]

Altenhofen, Christian and Dietrich, Andreas and Stork, André and Fellner, Dieter W. (2016):
Rixels: Towards Secure Interactive 3D Graphics in Engineering Clouds.
In: The IPSI BgD Transactions on Internet Research, pp. 31-38, 12, (1), [Article]

Arul, Tolga and Shoufan, Abdulhadi (2016):
Subscription-free Pay-TV over IPTV.
In: Journal of Systems Architecture, pp. 37 - 49, 64, ISSN 1383-7621,
DOI: 10.1016/j.sysarc.2015.12.001,
[Article]

Amann, Sven and Beyer, Stefanie and Kevic, Katja and Gall, Harald
Meyer, Bertrand and Nordio, Martin (eds.) (2015):
Software Mining Studies: Goals, Approaches, Artifacts, and Replicability.
In: Advances in the theory and practice of software engineering - LASER 2013-2014, Springer, pp. 121-159, [Book Section]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Arzt, Steven and Nadi, Sarah and Ali, Karim and Bodden, Eric and Erdweg, Sebastian and Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: OOPSLA Onward!, Piitsburgh, 25.10.2015, In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Conference or Workshop Item]

Al-Hadhrami, Nasser and Aziz, Benjamin and Sardesai, Shantanu and Othmane, Lotfi Ben (2015):
Incremental Development of RBAC-controlled E-marking System Using the B Method.
In: Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015), [Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
[Other]

Arzt, Steven and Rasthofer, Siegfried and Hahn, Robert and Bodden, Eric (2015):
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, Portland, USA, 14.06.2015, [Conference or Workshop Item]

Amin, Osama (2015):
Implementation and Evaluation of PUF based Cryptographic Key Generation Schemes on FPGA.
TU Darmstadt, [Master Thesis]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Allouis, E. and Marc, R. and Gancet, J. and Nevatia, Y. and Sonsalla, R. U. and Fritsche, M. and Machowinski, J. and Vogele, T. and Lewinger, W. and Yeomans, B. and Saaj, C. and Gao, Y. and Delfa, Juan and Weclewski, P. and Skocki, K. and Imhof, B. and Ransom, S. and Richter, L. (2015):
FP7 FASTER project - Demonstration of Multi-platform Operation for Safer Planetary Traverses.
In: ASTRA, [Conference or Workshop Item]

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2015):
Mining Apps for Abnormal Usage of Sensitive Data.
In: 2015 International Conference on Software Engineering (ICSE), [Conference or Workshop Item]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
TU Darmstadt, [Master Thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt, [Master Thesis]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]

Atre, Rohit and Jannesari, Ali and Wolf, Felix (2015):
The Basic Building Blocks of Parallel Tasks.
ACM, In: Proc. of the International Workshop on Code Optimisation for Multi and Many Cores, San Francisco, CA, USA, DOI: 10.1145/2723772.2723778,
[Online-Edition: http://doi.acm.org/10.1145/2723772.2723778],
[Conference or Workshop Item]

Aroudj, Samir (2015):
Meshless Collision Detection for Deformable Bodies.
TU Darmstadt, [Master Thesis]

Andrychowicz, Marcin and Damgard, Ivan and Dziembowski, Stefan and Faust, Sebastian and Polychroniadou, Antigoni (2015):
Efficient Leakage Resilient Circuit Compilers.
In: Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, DOI: 10.1007/978-3-319-16715-2₁₇,
[Online-Edition: https://doi.org/10.1007/978-3-319-16715-2_17],
[Conference or Workshop Item]

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep (2015):
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
In: CoRR, abs/1511.02119, [Online-Edition: https://arxiv.org/pdf/1511.02119.pdf],
[Article]

Abdolmaleki, A. and Lioutikov, R. and Peters, J and Lau, N. and Reis, L. and Neumann, G. (2015):
Model-Based Relative Entropy Stochastic Search.
mit press, In: Advances in Neural Information Processing Systems (NIPS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Team/GerhardNeumann/...],
[Conference or Workshop Item]

Appelhans, Lukas (2015):
Adaptive Voxel-based Classifier for Semi-automatic Segmentation of Tumors in the Head and Neck Area Based on T2-Weighted MRI Image Data.
TU Darmstadt, [Bachelor Thesis]

Arnold, Fabio (2015):
Approximation von Reflexionsmodellen für das interaktive Kleidungsdesign unter natürlicher Beleuchtung : Approximation of Reflection Models for Interactive Clothing Design under Natural Illumination.
TU Darmstadt, [Bachelor Thesis]

Audenrith, Benjamin (2015):
Path Prediction in Multiagent Pedestrian Scenario.
Darmstadt, TU, Master Thesis, 2015, [Master Thesis]

Alekseew, Michael (2015):
Hochpräzise Algorithmen zur Detektion von Armen für Interaktionssysteme aus kapazitiven Abstandssensoren.
Darmstadt, TU, Master Thesis, 2015, [Master Thesis]

Ackermann, Jens and Langguth, Fabian and Fuhrmann, Simon and Kuijper, Arjan and Goesele, Michael (2014):
Multi-view Photometric Stereo by Example.
In: 3D Vision (3DV), 2014 2nd International Conference on, pp. 259-266, (1), [Article]

Aly, Mohamed Abdulazim Mohamed (2014):
An Extension Interface Concept for Multilayered Applications.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4247],
[Ph.D. Thesis]

Araujo, Frederico and Hamlen, Kevin and Biedermann, Sebastian and Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, Scottsdale, AZ, USA, In: ACM, [Conference or Workshop Item]

Ambrosin, Moreno and Busold, Christoph and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias
Kutylowski, Miroslaw and Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014, Springer International Publishing, pp. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, pp. 1189-1206, 102, (8), [Article]

Ahrendt, Wolfgang and Beckert, Bernhard and Bruns, Daniel and Bubel, Richard and Gladisch, Christoph and Grebing, Sarah and Hähnle, Reiner and Hentschel, Martin and Klebanov, Vladimir and Mostowski, Wojciech and Scheben, Christoph and Schmitt, Peter and Ulbrich, Mattias
Giannakopoulou, Dimitra and Kroening, Daniel (eds.) (2014):
The KeY Platform for Verification and Analysis of Java Programs.
In: Post-Conference Proceedings VSTTE 2014, Springer, In: LNCS, [Conference or Workshop Item]

Amann, Sven and Proksch, Sebastian and Mezini, Mira (2014):
Method-Call Recommendations from Implicit Developer Feedback.
In: Proceedings of the 1st International Workshop on CrowdSourcing in Software Engineering - CSI-SE 2014, [Online-Edition: http://dx.doi.org/10.1145/2593728.2593730],
[Conference or Workshop Item]

Appel, Stefan (2014):
Integration of Event Processing with Service-oriented Architectures and Business Processes.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3978],
[Ph.D. Thesis]

Ackermann, Jens (2014):
Photometric Reconstruction from Images: New Scenarios and Approaches for Uncontrolled Input Data.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4060],
[Ph.D. Thesis]

Ali, Karim and Rapoport, Marianna and Lhoták, Ondřej and Dolby, Julian and Tip, Frank (2014):
Constructing Call Graphs of Scala Programs.
In: Proceedings of the 28th European Conference on Object-Oriented Programming, In: ECOOP '14, [Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Fritz, Christian and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2014):
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, [Conference or Workshop Item]

Arzt, Steven and Huber, Stephan and Rasthofer, Siegfried and Bodden, Eric (2014):
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, [Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad, [Conference or Workshop Item]

Albert, Elvira and de Boer, Frank S. and Hähnle, Reiner and Johnsen, Einar Broch and Schlatte, Rudolf and Tarifa, Silvia Lizeth Tapia and Wong, Peter Y. H. (2014):
Formal modeling and analysis of resource management for cloud architectures: an industrial case study using Real-Time ABS.
In: Service Oriented Computing and Applications, pp. 323-339, 8, (4), DOI: 10.1007/s11761-013-0148-0,
[Online-Edition: https://doi.org/10.1007/s11761-013-0148-0],
[Article]

Asadi, Arash and Mancuso, Vincenzo (2014):
DRONEE: Dual-radio opportunistic networking for energy efficiency.
In: Computer Communications (Special issue: Green Networking), [Article]

Asadi, Arash and Jacko, Peter and Mancuso, Vincenzo (2014):
Modeling D2D communications with LTE and WiFi.
In: ACM SIGMETRICS Performance Evaluation Review, [Article]

Asadi, Arash and Qing, Wang and Mancuso, Vincenzo (2014):
A Survey on Device-to-Device Communication in Cellular Networks.
In: IEEE Communications Surveys & Tutorials, [Article]

Aderhold, Andreas and Wilkosinska, Katarzyna and Corsini, Massimiliano and Jung, Yvonne and Graf, Holger and Kuijper, Arjan (2014):
The Common Implementation Framework as Service - Towards Novel Applications for Streamlined Presentation of 3D Content on the Web.
Springer, Berlin, Heidelberg, New York, In: Design, User Experience, and Usability. Proceedings Part II, In: Lecture Notes in Computer Science (LNCS); 8518, DOI: 10.1007/978-3-319-07626-3₁,
[Conference or Workshop Item]

Ackermann, Jens and Langguth, Fabian and Fuhrmann, Simon and Kuijper, Arjan and Goesele, Michael (2014):
Multi-View Photometric Stereo by Example.
IEEE Computer Society, Los Alamitos, Calif., In: 3DV 2014 - Volume I, DOI: 10.1109/3DV.2014.63,
[Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, DOI: 10.1145/2508859.2516738,
[Conference or Workshop Item]

Albrecht, Martin and Fitzpatrick, Robert and Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013, Seoul, Korea, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), Springer, pp. 364-381, [Article]

Abel, Andrea and Meyer, Christian M.
Kosem, Iztok and Kallas, Jelena and Gantar, Polona and Krek, Simon and Langemets, Margit and Tuulik, Maria (eds.) (2013):
The dynamics outside the paper: user contributions to online dictionaries.
In: Proceedings of the 3rd Biennial Conference on Electronic Lexicography (eLex), Ljubljana: Trojina, Institute for Applied Slovene Studies/Tallinn: Eesti Keele Instituut, Tallinn, Estonia, [Online-Edition: http://eki.ee/elex2013/proceedings/eLex2013_13_Abel+Meyer.pd...],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Erdweg, Sebastian and Mezini, Mira (2013):
XPoints: Extension Interfaces for Multilayered Applications.
In: Enterprise Distributed Object Computing Conference (EDOC), 2013 17th IEEE International, Vancouver, Canada, 9 - 13 Sept., [Online-Edition: http://dx.doi.org/10.1109/EDOC.2013.34],
[Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2013):
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf],
[Report]

Aly, M. and Charfi, A. and Erdweg, S. and Mezini, M. (2013):
Extension Interfaces for Multilayered Applications.
In: XPoints, [Article]

Alaoui, Sidi Mohamed El Yousfi and El Bansarkhani, Rachid and Cayrel, Pierre-Louis and Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Aderhold, Markus and Kochtchi, Artjom (2013):
Tailoring PMD to Secure Coding.
(TUD-CS-2013-0245), [Report]

Alsouri, Sami (2013):
Behavior Compliance Control for More Trustworthy Computation Outsourcing.
TU Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3578],
[Ph.D. Thesis]

Aderhold, Markus and Gebhardt, Alexander and Mantel, Heiko (2013):
Choosing a Formalism for Secure Coding: FSM vs. LTL.
[Report]

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
In: 11. International Conference on Applied Cryptography and Network Security (ACNS'13), Springer, ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Alkassar, Ammar and Heuser, Stephan and Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, pp. 209-232, 67, (2), [Article]

Amann, Sven (2013):
Code Completion Based on Implicit User Feedback.
Technische Universität Darmstadt, [Master Thesis]

Arzt, Steven and Falzon, Kevin and Follner, Andreas and Rasthofer, Siegfried and Bodden, Eric and Stolz, Volker (2013):
How useful are existing monitoring languages for securing Android apps?
Gesellschaft für Informatik, In: 6. Arbeitstagung Programmiersprachen (ATPS 2013), In: GI Lecture Notes in Informatics, [Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Wu, Di and Mezini, Mira (2013):
Understanding multilayered applications for building extensions.
In: Proceedings of the 1st Workshop on Comprehension of Complex Systems, New York, NY, USA, ACM, In: 1st Workshop on Comprehension of Complex Systems, Fukuoka, Japan, March 25th, 2013, In: CoCoS '13, [Online-Edition: http://doi.acm.org/10.1145/2451592.2451594],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Mezini, Mira (2013):
Building Extensions for Applications: Towards the Understanding of Extension Possibilities.
In: 2013 IEEE 21st International Conference on Program Comprehension (ICPC), IEEE, In: 21st International Conference on Program Comprehension , San Francisco, California, USA, May 20th - 21st, 2013, In: ICPC 2013, [Online-Edition: http://dx.doi.org/10.1109/ICPC.2013.6613846],
[Conference or Workshop Item]

Appel, Stefan and Frischbier, Sebastian and Freudenreich, Tobias and Buchmann, Alejandro (2013):
Event Stream Processing Units in Business Processes.
Beijing, China, In: 11th International Conference on Business Process Management (BPM), [Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Wu, Di and Mezini, Mira (2013):
Understanding multilayered applications for building extensions.
In: Proceedings of the 1st workshop on Comprehension of complex systems - CoCoS '13, [Online-Edition: http://dx.doi.org/10.1145/2451592.2451594],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Erdweg, Sebastian and Mezini, Mira (2013):
XPoints: Extension Interfaces for Multilayered Applications.
In: 2013 17th IEEE International Enterprise Distributed Object Computing Conference, [Online-Edition: http://dx.doi.org/10.1109/EDOC.2013.34],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Mezini, Mira (2013):
Building extensions for applications: Towards the understanding of extension possibilities.
In: 2013 21st International Conference on Program Comprehension (ICPC), [Online-Edition: http://dx.doi.org/10.1109/ICPC.2013.6613846],
[Conference or Workshop Item]

Ali, Karim and Lhoták, Ondřej (2013):
Averroes: Whole-Program Analysis without the Whole Program.
In: Proceedings of the 27th European Conference on Object-Oriented Programming, In: ECOOP '13, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16],
[Conference or Workshop Item]

Ackermann, Jens and Goesele, Michael (2013):
A Survey of Photometric Stereo Techniques.
In: Foundations and Trends in Computer Graphics and Vision, Now Publishers Inc., pp. 149-154, 9, (3-4), [Article]

Ackermann, Jens and Fuhrmann, Simon and Goesele, Michael (2013):
Geometric Point Light Source Calibration.
In: Proceedings of Vision, Modeling, and Visualization (VMV 2013),, Lugano, Switzerland, September 11-13, 2013, [Conference or Workshop Item]

Ackermann, Jens and Goesele, Michael (2013):
How bright is the moon? Recovering and Using Absolute Luminance Values from Internet Images.
In: Proceedings of the Fourth Computational Color Imaging Workshop, Springer, [Conference or Workshop Item]

Aroudj, Samir (2013):
Grammar-Based Dungeon Generation For Massively Multiplayer Online Games.
Hochschule Trier, [Bachelor Thesis]

Albert, Elvira and de Boer, Frank S. and Hähnle, Reiner and Johnsen, Einar Broch and Laneve, Cosimo
Solberg, Arnor and Babar, Muhammad Ali and Dumas, Marlon and Cuesta, Carlos E. (eds.) (2013):
Engineering virtualized services.
ACM, In: Second Nordic Symposium on Cloud Computing & Internet Technologies, NordiCloud '13, Oslo, Norway, September 1-3, 2013, In: ACM International Conference Proceeding Series, 826, DOI: 10.1145/2513534.2513545,
[Online-Edition: http://doi.acm.org/10.1145/2513534.2513545],
[Conference or Workshop Item]

Albert, Elvira and de Boer, Frank and Hähnle, Reiner and Johnsen, Einar Broch and Laneve, Cosimo
Babar, Ali and Dumas, Marlon (eds.) (2013):
Engineering Virtualized Services.
In: 2nd Nordic Symposium on Cloud Computing and Internet Technologies (NordiCloud), ACM Press, [Conference or Workshop Item]

Armknecht, Frederik and Schulz, Steffen and Wachsmann, Christian (2013):
A security framework for the analysis and design of software attestation.
New York, NY, USA, DOI: 10.1145/2508859.2516650,
[Conference or Workshop Item]

Alsouri, S. and Feller, T. and Malipatlolla, S. and Katzenbeisser, S. (2013):
Hardware-based Security for Virtual Trusted Platform Modules.
[Article]

Asadi, Arash and Mancuso, Vincenzo (2013):
A Survey on Opportunistic Scheduling in Wireless Communications.
In: IEEE Communications Surveys & Tutorials, [Article]

Ahmed, Sarah and Kaiser, Maximilian and Kreutzer, Michael (2013):
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.
[Report]

Aderhold, Andreas and Jung, Yvonne and Wilkosinska, Katarzyna and Fellner, Dieter W. (2013):
Distributed 3D Model Optimization for the Web with the Common Implementation Framework for Online Virtual Museums.
The Institute of Electrical and Electronics Engineers (IEEE), New York, In: 2013 Digital Heritage International Congress. Volume 2, DOI: 10.1109/DigitalHeritage.2013.6744841,
[Conference or Workshop Item]

Augusto, Juan Carlos and Grimstad, Terje and Wichert, Reiner and Schulze, Eva and Braun, Andreas and Rødevand, Gro Marit and Ridley, Vanda (2013):
Personalized Smart Environments to Increase Inclusion of People with Down's Syndrome.
Springer, Berlin; Heidelberg; New York, In: Ambient Intelligence, In: Lecture Notes in Computer Science (LNCS); 8309, DOI: 10.1007/978-3-319-03647-2₁₆,
[Conference or Workshop Item]

Appel, Stefan and Frischbier, Sebastian and Freudenreich, Tobias and Buchmann, Alejandro (2012):
Eventlets: Components for the Integration of Event Streams with SOA.
In: 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), [Conference or Workshop Item]

Alsouri, Sami and Sinschek, Jan and Sewe, Andreas and Bodden, Eric and Mezini, Mira and Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Information Security, In: 15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, In: Lecture Notes in Computer Science, 7483, ISSN 0302-9743,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11],
[Conference or Workshop Item]

Ansaloni, Danilo and Binder, Walter and Bockisch, Christoph and Bodden, Eric and Hatun, Kardelen and Marek, Lukas and Qi, Zhengwei and Sarimbekov, Aibek and Sewe, Andreas and Tuma, Petr and Zheng, Yudi (2012):
Challenges for Refinement and Composition of Instrumentations (Position Paper).
In: International Conference on Software Composition (SC 2012), [Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf],
[Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi and Dagdelen, Özgür and Véron, Pascal and Galindo, David and Cayrel, Pierre-Louis (2012):
Extended Security Arguments for Signature Schemes.
In: AfricaCrypt 2012, pp. 19 - 34, LNCS, (7374), [Article]

Albert, Elvira and Bubel, Richard and Genaim, Samir and Hähnle, Reiner and Román-Díez, Guillermo (2012):
Verified Resource Guarantees for Heap Manipulating Programs.
In: Proceedings of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012), Springer-Verlag, In: Lecture Notes in Computer Science, 7212, DOI: 10.1007/978-3-642-28872-2,
[Conference or Workshop Item]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), pp. 175-179, 2012, (3), DOI: 10.1007/s11623-012-0060-3,
[Article]

Arul, Tolga and Shoufan, Abdulhadi (2012):
Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV.
In: 26th International Conference on Advanced Information Networking and Applications Workshops, DOI: 10.1109/WAINA.2012.95,
[Conference or Workshop Item]

Ahmad, Junaid Jameel and Li, Shujun and Sadeghi, Ahmad-Reza and Schneider, Thomas (2012):
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
In: 16. International Conference on Financial Cryptography and Data Security (FC'12), Springer, DOI: 10.1007/978-3-642-32946-3_22,
[Conference or Workshop Item]

an Mey, Dieter and Biersdorff, Scott and Bischof, Christian and Diethelm, Kai and Eschweiler, Dominic and Gerndt, Michael and Knüpfer, Andreas and Lorenz, Daniel and Malony, Allen D. and Nagel, Wolfgang E. and Oleynik, Yury and Rössel, Christian and Saviankou, Pavel and Schmidl, Dirk and Shende, Sameer S. and Wagner, Michael and Wesarg, Bert and Wolf, Felix (2012):
Score-P: A Unified Performance Measurement System for Petascale Applications.
Berlin u.a., Springer, In: Competence in High Performance Computing 2010 : Proceedings of an International Conference on Competence in High Performance Computing, June 2010, Schloss Schwetzingen, Germany / ed. by Christian Bischof, In: SpringerLink: Springer e-Books, [Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Mezini, Mira (2012):
On the extensibility requirements of business applications.
New York, NY, USA, ACM, In: Proceedings of the 2012 workshop on Next Generation Modularity Approaches for Requirements and Architecture, In: NEMARA '12, [Online-Edition: http://doi.acm.org/10.1145/2162004.2162006],
[Conference or Workshop Item]

Ali, Karim and Lhoták, Ondřej (2012):
Application-Only Call Graph Construction.
In: Proceedings of the 26th European Conference on Object-Oriented Programming, In: ECOOP '12, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30],
[Conference or Workshop Item]

Ackermann, Jens and Langguth, Fabian and Fuhrmann, Simon and Goesele, Michael (2012):
Photometric Stereo for Outdoor Webcams.
In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Providence, USA, June 16-21, 2012, [Conference or Workshop Item]

an Mey, Dieter and Biersdorff, Scott and Bischof, Christian and Diethelm, Kai and Eschweiler, Dominic and Gerndt, Michael and Knüpfer, Andreas and Saviankou, Pavel and Schmidl, Dirk and Shende, Sameer S. and Wagner, Michael and Wesarg, Bert and Wolf, Felix and Lorenz, Daniel and Mallony, Allen D. and Nagel, Wolfgang E. and Oleynik, Yury and Rössel, Christian (2012):
Score-P: A Unified Performance Measurement System for Petascale Applications.
Springer, In: Proc. of the CiHPC: Competence in High Performance Computing, HPC Status Konferenz der Gauß-Allianz e.V., Schwetzingen, Germany, June 2010, ISBN 978-3-642-24025-6,
DOI: 10.1007/978-3-642-24025-6₈,
[Online-Edition: http://www.springerlink.com/content/t041605372024474/?MUD=MP],
[Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer, [Conference or Workshop Item]

Alomari, Esraa and Manickam, Selvakumar and Gupta, B. and Karuppayah, Shankar and Alfaris, Rafeef (2012):
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, pp. 24-32, 49, (7), [Article]

Ackermann, Jens and Ritz, Martin and Stork, André and Goesele, Michael (2012):
Removing the Example from Example-based Photometric Stereo.
Springer, Berlin, Heidelberg, New York, In: Trends and Topics in Computer Vision, In: Lecture Notes in Computer Science (LNCS); 6554, DOI: 10.1007/978-3-642-35740-4₁₆,
[Conference or Workshop Item]

Altenhofen, Christian (2012):
Effiziente Selbstschattierung in Szenen mit bildbasierter Beleuchtungsinformation und glänzenden Materialien.
Darmstadt, TU, Master Thesis, 2012, [Master Thesis]

Andriluka, Mykhaylo (2011):
Detection, Tracking and Pose Estimation of People in Challenging Real-World Scenes.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-27636],
[Ph.D. Thesis]

Anquetil, Nicolas and Kulesza, Uirá and Mateus, Ricardo and Mitschke, Ralf and Moreira, Ana and Royer, Jean-Claude and Rummler, Andreas
Rashid, Awais and Royer, Jean-Claude and Rummler, Andreas (eds.) (2011):
Managing information flow in the SPL development process.
In: Aspect-oriented, model-driven software product lines, New York, NY, USA, Cambridge University Press, pp. 222-262, [Book Section]

Abdelmageed Mohamed, Wael Said (2011):
Improvements for the XL Algorithm with Applications to Algebraic Cryptanalysis.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-26216],
[Ph.D. Thesis]

Armknecht, Frederik and Maes, Roel and Sadeghi, Ahmad-Reza and Standaert, François-Xavier and Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), IEEE Computer Society, [Conference or Workshop Item]

Abele, E. and Bauer, J. and Friedmann, Martin and Pischan, M. and Reinl, Christian and Stryk, Oskar von and Stryk, Oskar von (2011):
Einsatz von Robotern in der spanenden Fertigung.
In: Wissenschaftsmagazin forschen, TU Darmstadt, p. 44, [Book Section]

Andrade, Rodrigo and Ribeiro, Márcio and Gasiunas, Vaidas and Satabin, Lucas and Rebelo, Herique and Borba, Paulo (2011):
Assessing Idioms for Implementing Features with Flexible Binding Times.
In: European Conference on Software Maintenance and Reengineering (CSMR), 2011, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2011):
On the Design of Perturbation-Resilient Atomic Commit Protocols for Mobile Transactions.
In: ACM Transactions on Computer Systems, [Article]

Appadurai, Daniel (2011):
Entwurf eines serviceorientierten Recommender-Systems im BMW Group Kontext.
TU Darmstadt, [Master Thesis]

Alvaro, M. and Peters, J. and Schölkopf, B. and Lawrence, N. (2011):
Switched Latent Force Models for Movement Segmentation.
In: Advances in Neural Information Processing Systems 24 (NIPS 2010), Cambridge, MA: MIT Press, In: Spotlight � Acceptance Rate: 5.9%, [Conference or Workshop Item]

Aitenbichler, Erwin and Borgert, Stephan and Mühlhäuser, Max (2011):
Distributed Execution of S-BPM Business Processes.
Springer, In: S-BPM ONE 2010 - The Subjectoriented BPM Conference, ISBN 978-3-642-23134-6,
[Conference or Workshop Item]

Abele, E. and Bauer, J. and Hemker, Thomas and Laurischkat, R. and Meier, H. and Reese, S. and Stryk, Oskar von and Stryk, Oskar von (2011):
Comparison and Validation of Implementations of a Flexible Joint Multibody Dynamics System Model for an Industrial Robot.
In: CIRP Journal of Manufacturing Science and Technology, pp. 38-43, 4, (1), DOI: 10.1016/j.cirpj.2011.01.006,
[Article]

Armknecht, Frederik and Strufe, Thorsten (2011):
An Efficient Distributed Privacy-preserving Recommendation System.
In: Proceedings of the 10th IEEE/IFIP Med-Hoc-Net, [Conference or Workshop Item]

Albert, Elvira and Bubel, Richard and Genaim, Samir and Hähnle, Reiner and Puebla, Germán and Román-Díez, Guillermo (2011):
Verified Resource Guarantees using COSTA and KeY.
In: Proc. ACM SIGPLAN 2011 Workshop on Partial Evaluation and Program Manipulation (PEPM'11), Austin, Texas, USA, ACM Press, [Conference or Workshop Item]

Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]

Amodeo, G. and Blanco, R. and Brefeld, U. (2011):
Hybrid Models for Future Event Prediction.
In: Proceedings of the International ACM Conference on Information and Knowledge Management, [Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis and Meziani, Mohammed
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: ISA, Springer, In: Communications in Computer and Information Science, 200, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Scafuro, Alessandra and Visconti, Ivan and Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: Transactions on Computational Science IX, Springer, In: LNCS, 6480, [Conference or Workshop Item]

Aitenbichler, Erwin and Borgert, Stephan and Mühlhäuser, Max (2010):
Automatic Service Composition for the Internet of Services.
Gesellschaft für Informatik KuVS, In: 3rd GI/ITG KuVS Fachgespräch on NG SDPs: \"Towards SDPs for the Future Internet\", [Conference or Workshop Item]

Anjorin, Anthony and Lauder, Marius and Schlereth, Michael and Schürr, Andy (2010):
Support for Bidirectional Model-to-Text Transformations.
European Assoc. of Software Science and Technology, In: Electronic Communications of the EASST, 36, [Conference or Workshop Item]

Ayari, Brahim (2010):
Perturbation-Resilient Atomic Commit Protocols for Mobile Environments.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-22740],
[Ph.D. Thesis]

Almeida, José Bacelar and Bangerter, Endre and Barbosa, Manuel and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
In: 15. European Symposium on Research in Computer Security (ESORICS'10), Springer, DOI: 10.1007/978-3-642-15497-3_10,
[Conference or Workshop Item]

Alnusair, Awny and Zhao, Tian and Bodden, Eric (2010):
Effective API Navigation and Reuse.
IEEE, In: International Conference on Conference on Information Reuse and Integration (IEEE IRI), [Conference or Workshop Item]

Appel, Stefan and Sachs, Kai and Buchmann, Alejandro (2010):
Towards Benchmarking of AMQP.
In: 4th ACM International Conference on Distributed Event-Based Systems (DEBS), [Conference or Workshop Item]

Abele, Eberhard and Bauer, Jörg and Pischan, Matthias and Fiedmann, Martin and Hemker, Thomas and Stryk, Oskar von and Stryk, Oskar von (2010):
Prediction of the Tool Displacement for Robot Milling Applications using Co-Simulation of an Industrial Robot and a Removal Process.
In: Proceedings of the CIRP 2nd International Conference Process Machine Interactions, Vancouver, BC, Canada, June 10-11, 2010, [Conference or Workshop Item]

Aitenbichler, Erwin and Schnelle-Walka, Dirk (2010):
An Extensible Architecture for Multitouch & Pen Interactive Tables.
In: Engineering Patterns for Multi-Touch Interfaces 2010, in congunction with EICS 2010, [Conference or Workshop Item]

Armknecht, Frederik and Ghosal, Dipak and Katzenbeisser, Stefan and Liu, Yali and Sadeghi, Ahmad-Reza and Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH), Springer, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: International Conference on Applied Cryptography and Network Security (ACNS), Springer, In: LNCS, 6123, [Conference or Workshop Item]

Armknecht, Frederik and Chen, Liqun and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: Workshop on RFID Security (RFIDSec), Springer, In: LNCS, 6370, [Conference or Workshop Item]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max and Ries, Sebastian and Schnelle-Walka, Dirk (2010):
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, pp. 1 - 7, Special Issue of IOPTS, [Article]

Appel, Stefan and Sachs, Kai and Buchmann, Alejandro (2010):
Quality of Service in Event-based Systems.
In: 22nd GI-Workshop on Foundations of Databases (GvD), [Conference or Workshop Item]

Abdalla, Michel and Chevalier, Celine and Manulis, Mark and Pointcheval, David (2010):
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: Progress in Cryptology - AFRICACRYPT 2010, Springer, In: LNCS, [Conference or Workshop Item]

Attig, Norbert and Berberich, Florian and Detert, Ulrich and Eicker, Nobert and Eickermann, Thomas and Gibbon, Paul and Gürich, Wolfgang and Homberg, Willi and Illich, Antonia and Rinke, Sebastian and Stephan, Michael and Wolkersdorfer, Klaus and Lippert, Thomas
Münster, Gernot and Wolf, Dietrich and Kremer, Manfred (eds.) (2010):
Entering the Petaflop-Era - New Developments in Supercomputing.
John von Neumann Institute for Supercomputing, In: NIC Symposium 2010, Jülich, In: IAS Series, 3, ISBN 978-3-89336-606-4,
[Conference or Workshop Item]

Ali, Azad and Khelil, Abdelmajid and Shaikh, Faisal Karim and Suri, Neeraj (2010):
Effcient Predictive Monitoring of Wireless Sensor Networks.
In: Special Edition of "International Journal of Autonomous and Adaptive Communications Systems (IJAACS)", [Article]

Aderhold, Markus
Esparza, Javier and Majumdar, Rupak (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16), Springer, [Conference or Workshop Item]

Aderhold, Markus and Cuéllar, Jorge and Mantel, Heiko and Sudbrock, Henning (2010):
Exemplary Formalization of Secure Coding Guidelines.
Germany, In: aderhold.ea:exemplary:2010a, [Report]

Appel, Stefan and Petrov, Ilia and Buchmann, Alejandro (2010):
Performance Evaluation of Multi Machine Virtual Environments.
In: International SPEC Benchmark Workshop 2010, [Conference or Workshop Item]

Aitenbichler, Erwin and Borgert, Stephan
Buchwald, H. and Fleischmann, A. and Seese, D. and Stary, C. (eds.) (2010):
Application of Subject-oriented Modeling in Automatic Service Composition.
In: S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management, Berlin ; Heidelberg, Springer, pp. 71-82, DOI: https://www.springer.com/de/book/9783642159145,
[Book Section]

Aitenbichler, Erwin and Schnelle-Walka, Dirk (2010):
An Extensible Architecture for Multitouch & Pen Interactive Tables.
In: Engineering Patterns for Multi-Touch Interfaces, Workshop Proceedings of ACM EICS, [Conference or Workshop Item]

Aderhold, Markus
Esparza, J. and Majumdar, R. (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16), Springer, In: LNCS 6015, [Conference or Workshop Item]

Aderhold, Markus
Giesl, J. and Hähnle, R. (eds.) (2010):
Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
In: 5th International Joint Conference on Automated Reasoning (IJCAR-5), Springer, In: LNAI 6173, [Conference or Workshop Item]

Ackermann, Tobias and Brandt, Björn and Buxmann, Peter (2010):
Risiken der Adoption von SaaS.
In: Software-as-a-Service (SaaS) ? {"U}ber den Wandel von Anbieterstrategien, Kundenbedürfnissen und Marktstrukturen in der SW-Industrie, Gabler-Verlag, [Article]

Alvaro, Mauricio A. and Peters, Jan and Schoelkopf, Bernhard and Lawrence, Neil D. (2010):
Switched Latent Force Models for Movement Segmentation.
In: Advances in neural information processing systems 23 : Proceedings of the 2010 Conference, Red Hook, NY : Curran, Neural Information Processing Systems Foundation, In: 24th Annual Conference on Neural Information Processing Systems 2010, Vancouver, Canada, 2010.12.06-09, [Online-Edition: http://robot-learning.de/uploads/Publications/Alvarez_NIPS_2...],
[Conference or Workshop Item]

Andrienko, Gennady and Andrienko, Natalia and Bak, Peter and Bremm, Sebastian and Keim, Daniel A. and Landesberger, Tatiana von and Pölitz, Christian and Schreck, Tobias (2010):
A Framework for Using Self-Organizing Maps to Analyze Spatio-Temporal Patterns, Exemplified by Analysis of Mobile Phone Usage.
In: Journal of Location Based Services, pp. 200-221, 4, (3-4), DOI: 10.1080/17489725.2010.532816,
[Article]

Andrienko, Gennady and Andrienko, Natalia and Bremm, Sebastian and Schreck, Tobias and Landesberger, Tatiana von and Bak, Peter and Keim, Daniel A. (2010):
Space-in-Time and Time-in-Space Self-Organizing Maps for Exploring Spatiotemporal Patterns.
In: Computer Graphics Forum, pp. 913-922, 29, (3), [Article]

Appel, Stefan and Sachs, Kai
Sachs, Kai and Petrov, Ilia and Guerrero, Pablo (eds.) (2010):
A Logistics Workload for Event Notification Middleware.
In: From Active Data Management to Event-Based Systems and More, Springer, pp. 312-324, [Book Section]

Aderhold, Markus Axel (2009):
Verification of second-order functional programs.
Darmstadt, Technische Universität, TU Darmstadt, [Ph.D. Thesis]

Avdil, Alaubek (2009):
A Novel LP-based Local Search Technique -Fast and Quite Good-.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-19149],
[Ph.D. Thesis]

Aderhold, Markus Axel (2009):
Verification of Second-Order Functional Programs.
Darmstadt, Technische Universität, Technische Universität Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-18652],
[Ph.D. Thesis]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
TU Darmstadt, [Bachelor Thesis]

Abboud, Osama and König, André and Gottron, Christian (2009):
Quality Adaptation and Security in Peer-to-Peer Systems.
In: Proceedings 9th Würzburg Workshop on IP: Joint ITG and Euro-NF Workshop "Visions of I Generation Networks" (EuroView 2009), Würzburg, In: 9th Würzburg Workshop on IP, Würzburg, [Conference or Workshop Item]

Anquetil, Nicolas and Kulesza, Uirá and Mitschke, Ralf and Moreira, Ana and Royer, Jean-Claude and Rummler, Andreas and Sousa, André (2009):
A model-driven traceability framework for software product lines.
In: Software and Systems Modeling, Springer Berlin / Heidelberg, ISSN 1619-1366 (Print) 1619-1374 (Online),
[Online-Edition: http://www.springerlink.com/content/wvm4hv8r78117785/],
[Article]

Alfonseca, Enrique and Hall, Keith and Hartmann, Silvana (2009):
Large-scale Computation of Distributional Similarities for Queries.
In: Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL-HLT), Companion Volume: Short Papers, [Online-Edition: http://www.aclweb.org/anthology/N09-2008],
[Conference or Workshop Item]

Abboud, Osama and Kovacevic, Aleksandra and Graffi, Kalman and Pussep, Konstantin and Steinmetz, Ralf (2009):
Underlay Awareness in P2P Systems: Techniques and Challenges.
In: 2009 IEEE International Symposium on Parallel & Distributed Processing : (IPDPS 2009) ; Rome, Italy, 23 - 29 May 2009, Piscataway, NJ, IEEE, [Book Section]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2009):
Exploring Delay-Aware Transactions in Heterogenous Mobile Environments.
In: Journal of Software, Special Issue: Selected Papers of The 6th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, pp. 634-643, 4, (7), [Article]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2009):
Exploring Delay-Aware Transactions in Heterogeneous Mobile Environments.
In: Journal Of Software Special Issue: Selected Papers of The 6th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, Academy Publisher, pp. 634-643, 4, [Article]

Awerbuch, Wladimir (2009):
Anwendung von Data Mining zu statistischen Auswertungen und Vorhersagen im Sport.
TU Darmstadt, [Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/diplom/2009/Awe...],
[Master Thesis]

Abraham, Rene (2009):
On­to­log­i­cal De­scrip­tion of UI In­ter­ac­tions.
TU Darmstadt, [Master Thesis]

Ali, Karim and Aib, Issam and Boutaba, Raouf (2009):
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: Global Information Infrastructure Symposium, In: GIIS '09, [Conference or Workshop Item]

Ali, Karim and Boutaba, Raouf (2009):
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: Global Information Infrastructure Symposium, In: GIIS '09, [Conference or Workshop Item]

Andriluka, Micha and Friedmann, Martin and Kohlbrecher, Stefan and Meyer, Johannes and Petersen, Karen and Reinl, Christian and Schauss, Peter and Schnitzspan, Paul and Strobel, Armin and Thomas, Dirk and Stryk, Oskar von and Stryk, Oskar von (2009):
RoboCupRescue 2009 - Robot League Team: Darmstadt Rescue Robot Team (Germany).
Graz, [Report]

Ackermann, Jens and Baecher, Paul and Franzel, Thorsten and Goesele, Michael and Hamacher, Kay (2009):
Massively-Parallel Simulation of Biochemical Systems.
In: Proceedings of Massively Parallel Computational Biology on GPUs, In: Jahrestagung der Gesellschaft für Informatik e.V., Lübeck, Germany, September 29, 2009, [Conference or Workshop Item]

Aitenbichler, Erwin and Lyardet, Fernando and Hadjakos, Aristotelis and Mühlhäuser, Max (2009):
Fine-Grained Evaluation of Local Positioning Systems for Specific Target Applications.
In: Ubiquitous Intelligence and Computing (UIC-09), Springer Berlin-Heidelberg, In: LNCS, 5585, [Conference or Workshop Item]

Adolph, Daniel (2009):
Fractional Recoding for the Shamir Method.
Technische Universität Darmstadt, [Master Thesis]

Arzt, Steven (2009):
Design and Implementation of a Cryptographic Plugin for E-mail Clients.
[Other]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
[Other]

Abdulla, Parosh Aziz and Atto, Muhsin and Cederberg, Jonathan and Ji, Ran
Liu, Zhiming and Ravn, Anders (eds.) (2009):
Automated Analysis of Data-Dependent Programs with Dynamic Memory.
In: Proc. 7th International Symposium on Automated Technology for Verification and Analysis (ATVA), Springer, In: LNCS, 5799, [Conference or Workshop Item]

Ahrendt, Wolfgang and Bubel, Richard and Hähnle, Reiner
Gibbons, J. and Oliveira, J. N. (eds.) (2009):
Integrated and Tool-Supported Teaching of Testing, Debugging, and Verification.
In: Proc. Second International Conference on Teaching Formal Methods, Springer-Verlag, In: Teaching Formal Methods, Second International Conference, TFM 2009, Eindhoven, November 2-6, 2009, In: LNCS, 5846, DOI: 10.1007/978-3-642-04912-5_9,
[Online-Edition: https://doi.org/10.1007/978-3-642-04912-5_9],
[Conference or Workshop Item]

Ackermann, Tobias and Widjaja, Thomas and Buxmann, Peter (2009):
Increasing the Diffusion of Communication Standards - A General Simulation Framework from the Vendor?s Perspective.
In: Proceedings of the 6th International Conference on Standardization and Innovation in Information Technology (SIIT2009), [Other]

Alonso, Gustavo and Kossmann, Donald and Roscoe, Timothy and Tatbul, Nesime and Baumann, Andrew and Binnig, Carsten and Fischer, Peter and Riva, Oriana and Teubner, Jens (2009):
The ETH Zurich systems group and enterprise computing center.
In: ACM SIGMOD Record, ACM, pp. 94-99, 37, (4), [Article]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Ries, Sebastian and Schnelle-Walka, Dirk and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max (2009):
Shaping the Future Internet.
In: Proceedings of the 3rd International CompanionAble Workshop IoPTS, [Conference or Workshop Item]

Alemu, Yihun and Koh, Jong-bin and Ikram, Muhammed and Kim, Dong-Kyoo (2009):
Image Retrieval in Multimedia Databases: A Survey.
In: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on, IEEE Computer Society, pp. 681-689, [Article]

Akram, Shahid (2009):
Coronary Tree Segmentation Using an Enhanced Corkscrew Algorithm.
Darmstadt, TU, Master Thesis, 2009, [Master Thesis]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häussge, Gina (2008):
Smart Products: Integration Challenges.
In: Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08), [Conference or Workshop Item]

Abele, Eberhard and Bauer, Jörg and Rothenbücher, Stefan and Stelzer, Maximilian and Stryk, Oskar von and Stryk, Oskar von (2008):
Prediction of the Tool Displacement by Coupled Models of the Compliant Industrial Robot and the Milling Process.
In: Proceedings of the International Conference on Process Machine Interactions, Hannover, Germany, 3-4 September, [Conference or Workshop Item]

Amelunxen, Carsten and Legros, Elodie and Schürr, Andy (2008):
Generic and Reflective Graph Transformations for the Checking and Enforcement of Modeling Guidelines.
In: VLHCC '08: Proceedings of the Visual Languages and Human-Centric Computing, In: IEEE Symposium on Visual Languages & Human-Centric Computing, [Conference or Workshop Item]

Armknecht, Frederik and Furukawa, Jun and Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008), [Conference or Workshop Item]

Aitenbichler, Erwin and Rößling, Guido (2008):
Webreg: An Online System for Registration and Grade Distribution.
In: Proceedings of the ACM Innovation and Technology in Computer Science Education Conference (ITiCSE'08), Madrid, Spain, ACM Press, New York, NY, [Conference or Workshop Item]

Armknecht, Frederik and Mirzadeh, Shahab and Tafazolli, Rahim and Pallares, Jordi Jaen and Afifi, Hossam (2008):
CPFP: An efficient key management scheme for large scale personal networks.
In: IEEE ISWPC 2008, [Conference or Workshop Item]

Armknecht, Frederik and Westhoff, Dirk and Girao, Joao and Hessler, Alban (2008):
A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing.
In: Computer Communications Journal, pp. 734-749, 31, (4), [Article]

Amelunxen, Carsten and Klar, Felix and Königs, Alexander and Rötschke, Tobias and Schürr, Andy (2008):
Metamodel-based tool integration with MOFLON.
New York, NY, ACM, In: Proceedings of the thirtieth International Conference on Software Engineering . - New York, NY : ACM , 2008, S. 807-810 ISBN 978-1-605-58079-1, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2008):
Delay-Aware Mobile Transactions.
In: SEUS '08: Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems, Berlin, Heidelberg, Springer-Verlag, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj and Bleim, Eugen (2008):
Implementation and Evaluation of Delay-Aware and Fault-Tolerant Mobile Transactions.
In: Proceedings of the The 2nd International Conference on E-Medical Systems, [Conference or Workshop Item]

Aly, Sherif G. and Nadi, Sarah and Hamdan, Karim (2008):
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, pp. 329-336, 8, (6), [Article]

Andriluka, Mykhaylo and Roth, Stefan and Schiele, Bernt (2008):
People-Tracking-by-Detection and People-Detection-by-Tracking.
IEEE, New York, In: IEEE Conference on Computer Vision and Pattern Recognition, [Conference or Workshop Item]

Abele, E. and Bauer, J. and Bertsch, C. and Laurischkat, R. and Meier, H. and Reese, S. and Stelzer, M. and Stryk, Oskar von and Stryk, Oskar von (2008):
Comparison of Implementations of a Flexible Joint Multibody Dynamic System Model for an Industrial Robot.
In: 6th CIRP International Conference on Intelligent Computation in Manufacturing Engineering, 23-25 July, Naples, Italy, [Conference or Workshop Item]

Adamer, Kurt and Bannach, David and Klug, Tobias and Lukowicz, Paul and Sbodio, Marco Luca and Tresman, Mimi and Zinnen, Andreas and Ziegert, Thomas (2008):
Developing a Wearable Assistant for Hospital Ward Rounds.
In: Proceedings of Internet of Things 2008, Springer Verlag, Heidelberg etc., Germany, ISBN 978-3-540-78730-3,
[Conference or Workshop Item]

Armknecht, Frederik and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Springer, In: Lecture Notes in Computer Science, 4991, [Conference or Workshop Item]

Araújo, Roberto and Ryan, Peter Y. A. (2008):
Improving Farnel, Threeballot and Randell-Ryan Voting Schemes.
[Other]

Aitenbichler, Erwin
Mühlhäuser, Max and Gurevych, Iryna (eds.) (2008):
Ubiquitous Computing Technology for Real Time Enterprises.
Idea Group Publishing, pp. 257--281, [Book Section]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, [Conference or Workshop Item]

Aitenbichler, Erwin
Mühlhäuser, Max and Gurevych, Iryna (eds.) (2008):
Ubiquitous Computing Technology for Real Time Enterprises.
Idea Group Publishing, p. 152, [Book Section]

Austaller, Gerhard
Mühlhäuser, Max and Gurevych, Iryna (eds.) (2008):
Ubiquitous Computing Technology for Real Time Enterprises.
IGI Publishing, pp. 107-127, [Book Section]

Aitenbichler, Erwin
Gurevych, Iryna and Mühlhäuser, Max (eds.) (2008):
A Focus on Location Context.
IGI, [Conference or Workshop Item]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, [Conference or Workshop Item]

Amelunxen, Carsten and Klar, Felix and Königs, Alexander and Rötschke, Tobias and Schürr, Andy (2008):
Metamodel-based Tool Integration with MOFLON.
New York, ACM Press, In: 30th International Conference on Software Engineering, [Conference or Workshop Item]

Aitenbichler, Erwin (2008):
Event-Based and Publish/Subscribe Communication.
In: Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, pp. 152-171, [Online-Edition: https://www.igi-global.com/chapter/event-based-publish-subsc...],
[Article]

Abele, E. and Bauer, J. and Stelzer, M. and Stryk, Oskar von and Stryk, Oskar von (2008):
Wechselwirkungen von Fräsprozess und Maschinenstruktur am Beispiel des Industrieroboters.
In: wt Werkstattstechnik online, pp. 733-737, 98, (9), ISSN 1436-4980,
[Article]

Adamson, Anders (2007):
Computing Curves and Surfaces from Points.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-8931],
[Ph.D. Thesis]

Asokan, N. and Gasmi, Yacine and Sadeghi, Ahmad-Reza and Stewin, Patrick and Unger, Martin (2007):
Beyond Secure Channels.
ACM Press, In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2007):
MundoCore: A Light-weight Infrastructure for Pervasive Computing.
In: Pervasive and Mobile Computing, pp. 332-361, 3, (4), [Article]

Aitenbichler, Erwin and Lyardet, Fernando and Mühlhäuser, Max (2007):
Designing and Implementing Smart Spaces.
In: Cepis Upgrade, pp. 31--37, VIII, (4), [Article]

Aitenbichler, Erwin and Heinemann, Andreas (2007):
Proximity-based authentication for Windows domains.
In: UbiComp 2007: ubiquitous computing : 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16 - 19, 2007; proceedings, Berlin [u.a.], Springer, pp. 475-480, [Book Section]

Aitenbichler, Erwin and Lyardet, Fernando and Austaller, Gerhard and Kangasharju, Jussi and Mühlhäuser, Max (2007):
Engineering intuitive and self-explanatory smart products.
In: 22 Annual ACM Symposium on Applied Computing : Proceedings. - S. 1632-1637, [Conference or Workshop Item]

Aitenbichler, Erwin and Lyardet, Fernando and Mühlhäuser, Max (2007):
Diseno e implementacion de espacios inteligentes.
In: Upgrade [Elektronische Ressource], pp. 29-34, 33, (188), [Article]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2007):
MundoCore : a light-weight infrastructure for pervasive computing.
In: Pervasive and mobile computing, pp. 332-361, [Article]

Aitenbichler, Erwin and Mühlhäuser, Max (2007):
Softwareentwicklung für Mundo Smart Environments.
In: KIVS 2007 : Kommunikation in verteilten Systemen : 15. ITG-GI-Fachtagung vom 26. Februar bis 2. März 2007 in Bern, Schweiz ; Industriebeiträge, Kurzbeiträge und Workshops / T. Braun ... (Hrsg.).- S. 323-336, Berlin [u.a.], VDE-Verl., [Book Section]

Anikeev, Maxim and Madlener, Felix and Schlosser, Andreas and Huss, Sorin A. and Walther, Christoph (2007):
Automated Verification for an Efficient Elliptic-Curve Algorithm - A Case Study.
In: Information Security: Proceedings of the IX. International Conference, January 2007, [Conference or Workshop Item]

Aderhold, Markus (2007):
Improvements in Formula Generalization.
Berlin [u.a.], Springer, In: Automated deduction - CADE-21 : 21st International Conference on Automated Deduction, Bremen, Germany, July 17 - 20, 2007 ; proceedings / Frank Pfenning (ed.). - Berlin [u.a.] : Springer, 2007, S. 231-246 (Lecture notes in computer science ; 4603 : Lectur, [Conference or Workshop Item]

Adamson, Anders (2007):
Computing curves and surfaces from points.
Darmstadt, Technische Universität, TU Darmstadt, [Ph.D. Thesis]

Amelunxen, Carsten and Schürr, Andy (2007):
Formalizing model transformation rules for UML/MOF 2.
In: Software, IET, pp. 204-222, 2, [Article]

Aqqal, A. and Rensing, C. and Steinmetz, Ralf (2007):
The Macro Design as an Own Task in WBT Production.
In: EC-tel 2007 <Graz,2007> ; Second European Conference on Technology Enhanced Learning ; 420-425 ; ISBN: 9783540751946, [Conference or Workshop Item]

Amelunxen, Carsten and Legros, Elodie and Schürr, Andy and Stürmer, I. and Nagl, M. and Zündorf, A. (2007):
Checking and enforcement of modeling guideline with graph transofrmations.
In: Proceedings of the Third International Symposium on Applications of Graph Transformations with Industrial Relevance, In: Applications of graph transformations with industrial relevance : third international symposium, AGTIVE 2007 ; proceedings of selected and invited papers ; Kassel, Germany, October 10 - 12, 2007 / Andy Schürr ... (eds.). - Kassel, 2007, [Conference or Workshop Item]

Amelunxen, Carsten and Königs, Alexander and Rötschke, Tobias and Schürr, Andy (2007):
Metamodeling with MOFLON.
In: Applications of graph transformations with industrial relevance : third international symposium, AGTIVE 2007 ; proceedings of selected and invited papers ; Kassel, Germany, October 10 - 12, 2007 / Andy Schürr ... (eds.) : AGTIVE <3, 2007, Kassel> Kassel,, [Conference or Workshop Item]

Aqqal, A. and Rensing, C. and Steinmetz, Ralf (2007):
Using Taxonomies to Support the Macro Design Process for the Production of Web Based Trainings.
In: 7th International Conference on Knowledge Management <Graz,2007> ; 7th International Conference on Knowledge Management ; 420-425, [Conference or Workshop Item]

Arnold, Thomas (2007):
Ein evolutionärer Algorithmus zur Erstellung eines künstlichen Gegenspielers für "Chinesische Mauer".
TU Darmstadt, [Online-Edition: http://www.ke.informatik.tu-darmstadt.de/lehre/arbeiten/bach...],
[Master Thesis]

Adamson, Anders (2007):
Computing Curves and Surfaces from Points.
Darmstadt, TU, Diss., 2007, [Ph.D. Thesis]

Adams, Bart and Adamson, Anders (2007):
Ray Tracing of Point Models.
Elsevier, Morgan Kaufmann, San Francisco, pp. 294-312, [Book Section]

Adelsbach, Andre and Huber, Ulrich and Sadeghi, Ahmad-Reza (2007):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
Springer Verlag, In: Transactions on Data Hiding and Multimedia Security II, In: LNCS, 4499, [Conference or Workshop Item]

Andriluka, Mykhaylo and Weizsäcker, Lorenz and Hofmann, Thomas (2007):
Multi-class Classification with Dependent Gaussian Processes.
In: 12th International Conference on Applied Stochastic Models and Data Analysis (ASMDA 2007), [Conference or Workshop Item]

Abbé, Thomas (2007):
Implementierung eines qualifiziert signierenden Timestamping-Servers.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Alaoui, Sidi Mohamed El Yousfi (2007):
Konstruktion von Hashfunktionen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Araújo, Roberto and Foulle, Sébastian and Traoré, Jacques (2007):
A practical and secure coercion-resistant scheme for remote elections.
[Other]

Alkassar, Ammar and Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Schmitt, Peter
Bonsangue, Marcello and Johnsen, Einar Broch (eds.) (2007):
KeY: A Formal Method for Object-Oriented Systems.
In: Proc. 9th IFIP Intl. Conf. on Formal Methods for Open Object-based Distributed Systems (FMOODS), Springer-Verlag, In: Formal Methods for Open Object-Based Distributed Systems, 9th IFIP WG 6.1 International Conference, FMOODS 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, In: LNCS, 4468, DOI: 10.1007/978-3-540-72952-5_2,
[Online-Edition: https://doi.org/10.1007/978-3-540-72952-5_2],
[Conference or Workshop Item]

Amelunxen, Carsten and Schürr, Andy and Weisemöller, Ingo (2007):
Missing Meta-Modeling-In-The-Large Concepts in EMOF.
In: eclipse summit 2007, Contribution to the discussion about EMF, ?, [Conference or Workshop Item]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Rümmer, Philipp and Schmitt, Peter
de Boer, Frank and Bonsangue, Marcello and Graf, Susanne and de Roever, Willem (eds.) (2007):
Verifying Object-Oriented Programs with KeY: a Tutorial.
In: Post Conf. Proc. 5th International Symposium on Formal Methods for Components and Objects (FMCO), Springer-Verlag, In: LNCS, 4709, ISBN 978-3-540-74791-8,
DOI: 10.1007/978-3-540-74792-5_4,
[Conference or Workshop Item]

Araújo, Roberto and Wiesmaier, Alexander and Buchmann, Johannes (2006):
The T-Vote Protocol.
(TI-3/06), [Report]

Aguilera, Gaby and Teller, Patricia J. and Taufer, Michaela and Wolf, Felix (2006):
A Systematic Multi-step Methodology for Performance Analysis of Communication Traces of Distributed Applications based on Hierarchical Clustering.
IEEE Computer Society, In: Proc. of the 5th International Workshop on Performance Modeling, Evaluation, and Organization of Parallel and Distributed Systems (PMEO-PDS, in conjunction with IPDPS 2006), Rhodes Island, Greece, [Conference or Workshop Item]

Austaller, Gerhard and Aitenbichler, Erwin and Kangasharju, Jussi (2006):
Interaction with a Smart Espresso Machine.
In: IEEE Conference on Pervasive Computing and Communications (PerCom'06) Demo Track, [Conference or Workshop Item]

Aitenbichler, Erwin (2006):
System support for ubiquitous computing.
Aachen, Shaker, TU Darmstadt, ISBN 3-8322-5365-3,
[Ph.D. Thesis]

Austaller, Gerhard and Kangasharju, Jussi and Kangasharju, Jussi (2006):
Applications for smart environments.
Darmstadt, Techn. Univ., Fachbereich Informatik, [Report]

Aitenbichler, Erwin (2006):
Development tools for Mundo Smart environments.
In: Workshop on Software Engineering Challenges for Ubiquitous Computing. Gerd Kortuem (Ed.). S. 89-90, Lancaster University, 2006., [Conference or Workshop Item]

Austaller, Gerhard and Hartl, A. and Lauff, M. and Lyardet, F. and Mühlhäuser, Max (2006):
Technology-aware web application design.
In: Web engineering : the discipline of systematic development of Web applications / ed. by Gerti Kappel .... - Chichester : Wiley, 2006, S. 85-110 ISBN: 0-470-01554-3, Chichester, Wiley, [Book Section]

Aderhold, Markus and Walther, Christoph and Szallies, Daniel and Schlosser, Andreas (2006):
A Fast Disprover for VeriFun.
In: Proceedings Workshop on Non-Theorems, Non-Validity, Non-Provability (DISPROVING-06) Eds.: Wolfgang Ahrendt ; Peter Baumgartner ; Hans de Nivelle, S. 59-69,. - Seattle, WA, 2006. Federated Logic Conference, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2006):
FT-PPTC : An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments.
In: IEEE Symposium on Reliable Distributed Systems <Leeds, UK,2006> ; Proceedings 25th IEEE Symposium on Reliable Distributed Systems ; 96-105 ; ISBN 0-7695-2677-2, [Conference or Workshop Item]

Aracic, Ivica and Gasiunas, Vaidas and Mezini, Mira and Ostermann, Klaus (2006):
Overview of CaesarJ.
Berlin, Springer T. !, In: Transactions on aspect oriented software development . - Berlin : Springer T. !, S. 135-173 .- 2006 (Lecture notes in computer science ; 3880) ISBN: 978-3-540-32972-5 3-540-32972-2, [Conference or Workshop Item]

Amelunxen, Carsten and Königs, Alexander and Rötschke, Tobias and Schürr, Andy and Rensink, A. and Warmer, J. (2006):
MOFLON : a standard-compliant metamodeling framework with graph transformations.
In: Model driven architecture - foundations and applications : second European conference, ECMDA-FA 2006, Bilbao, Spain, July 10 - 13, 2006 ; proceedings / Arend Rensink ... (eds.). - Berlin [u.a.] : Springer, 2006, S. 361-375 (Lecture notes in computer scien, Berlin [u.a.], Springer, In: Model Driven Architecture - Foundations and Applications: Second European Conference, In: Lecture Notes in Computer Science (LNCS), [Conference or Workshop Item]

Amelunxen, Carsten and Königs, Alexander and Rötschke, Tobias and Schürr, Andy and Grundy, J. and Howse, J.
IEEE Computer Society Press (Corporate Creator) (2006):
M0SL : Composing a Visual Language for a Metamodeling Framework.
Los Alamitos, Calif. [u.a.], IEEE Computer Society, In: IEEE Symposium on Visual Languages and Human-Centric Computing (VLHCC 2006), In: Proceedings / IEEE Symposium on Visual Languages and Human-Centric Computing : VL/HCC 2006 ; 4-8 September, Brighton, United Kingdom/ ed. by John Grundy; John Howse. - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2006 ISBN: 0-7695-2586-5,, [Conference or Workshop Item]

Amelunxen, Carsten and Schürr, Andy (2006):
On OCL as part of the metamodeling framework MOFLON.
Dresden, TU, In: OCL for (meta-)models in multiple application domains / Technische Universität Dresden, Fakultät Informatik. Birgit Demuth ... (ed.). - Dresden : TU, Fak. Informatik, 2006, S. 182-193 (Technical reports / Technische Universität Dresden, Fakultät Infor, [Conference or Workshop Item]

Amelunxen, Carsten and Schürr, Andy (2006):
Vervollständigung des Constraint-basierten Assoziationskonzeptes von UML 2.0.
24. März 2006 in Innsbruck, Austria / Heinrich C. Mayr; Ruth Breu (Hrsg.). - Bonn, Gesellschaft für Informatik, In: Modellierung 2006 : 22. - 24. März 2006 in Innsbruck, Austria / Heinrich C. Mayr; Ruth Breu (Hrsg.). - Bonn : Gesellschaft für Informatik, 2006, S. 163-172 (GI-Edition : Proceedings ; 82) ISBN: 3-88579-176-5, [Conference or Workshop Item]

Amelunxen, Carsten and Rötchke, T. and Zündorf, A. and Varro, D. (2006):
Creating Well-Structured Specifications in MOFLON.
In: Proceedings of the Third International Workshop on Graph Based Tools (GraBaTs 2006), 9 2006; Electronic Communications of EASST, Vol. 1., In: Third International Workshop on Graph Based Tools (GraBaTs 2006), 2006, In: Electronic Communications of EASST, 1, [Conference or Workshop Item]

Alt, O. and Schmidt, M. and Ritter, T. and Eichler, H. (2006):
Derivation of System Integration Tests from Design Models in UML.
Stuttgart, IRB Verl., In: ECMDA workshop on Integration of Model Driven Development and Model Driven Testing IMDT, Bilbao, Spain, In: Proceedings of the ECMDA Workshop on Integration of Model Driven Development and Model Driven Testing : [July 11th, 2006,Bilbao, Spain] / Fraunhofer-Institut für Offene Kommunikationssysteme, FOKUS. Hajo Eichler; Tom Ritter (editors). - Stuttgart : IRB V, [Conference or Workshop Item]

Antollini, Mario and Cilia, Mariano and Buchmann, Alejandro (2006):
Implementing a High Level Pub/Sub Layer for Enterprise Information Systems.
In: International Conference on Enterprise Information Systems (ICEIS'06), Paphos, Cyprus, 2006, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2006):
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments.
In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006, [Conference or Workshop Item]

Assenmacher, Ingo and Hentschel, Bernd and Ni, C. and Kuhlen, Torsten and Bischof, Christian (2006):
Interactive data annotation in virtual environments.
Aire-la-Ville, Switzerland, Eurographics Association, In: Virtual environments 2006 : 12th Eurographics Symposium on Virtual Enviroments, 8 - 10 May, Gulbenkian Foundation Congress Centre, Braga, Portugal / sponsored by EUROGRAPHICS Association in cooperation with ACM SIGGGRAPH. Symposium Chair: Joaquim Jorge ;, In: Eurographics/ACM SIGGRAPH symposium proceedings, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc (2006):
Anisotropic Point Set Surfaces.
In: Computer Graphics Forum, pp. 717-724, 25, (4), [Article]

Adamson, Anders and Alexa, Marc (2006):
Anisotropic Point Set Surfaces.
ACM, New York, In: Proceedings AFRIGRAPH 2006, [Conference or Workshop Item]

Aarts, Emile and Encarnação, José L. (2006):
Into Ambient Intelligence.
Springer, Berlin, Heidelberg, New York, pp. 1-16, [Book Section]

Appel, Stefan (2006):
Lokalisierung von Knoten in mobilen Ad-hoc-Netzen ohne zusätzliche Infrastruktur.
TU Darmstadt, [Bachelor Thesis]

Adamson, Anders and Alexa, Marc (2006):
Point-Sampled Cell Complexes.
In: ACM Transactions on Graphics, pp. 671-680, 25, (3), [Article]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Rümmer, Philipp and Schmitt, Peter H.
de Boer, Frank S. and Bonsangue, Marcello M. and Graf, Susanne and de Roever, Willem P. (eds.) (2006):
Verifying Object-Oriented Programs with KeY: A Tutorial.
Springer, In: Formal Methods for Components and Objects, 5th International Symposium, FMCO 2006, Amsterdam, The Netherlands, November 7-10, 2006, Revised Lectures, In: Lecture Notes in Computer Science, 4709, DOI: 10.1007/978-3-540-74792-5₄,
[Online-Edition: https://doi.org/10.1007/978-3-540-74792-5_4],
[Conference or Workshop Item]

Adelsbach, Andre and Rohe, Markus and Sadeghi, Ahmad-Reza (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security, [Conference or Workshop Item]

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2006):
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop, [Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Scheibel, Michael and Stüble, Christian and Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Abbing, Jana and Koidl, Kevin (2006):
Template Approach for Adaptive Learning Strategies.
In: Workshop Proceedings of the Adaptive Hypermedia 2006 (AH 2006), Dublin, Ireland, Dublin, Ireland, [Conference or Workshop Item]

Araújo, Roberto and Custódio, Ricardo Felipe and Wiesmaier, Alexander and Takagi, Tsuyoshi (2006):
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
In: Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), Springer, [Conference or Workshop Item]

Adler, Steven and Brown, Nigel and Gilbert, Art and Palmer, Charles and Schnyder, Michael and Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Atkinson, Colin and Kühne, Thomas (2005):
A generalized notion of platforms for model-driven development.
In: Model-Driven Software Development / edited by Sami Beydeda, Matthias Book, Volker Gruhn. - Berlin, Heidelberg : Springer, 2005. - Bd. 2, S. 119-136, Berlin, Heidelberg, Springer, [Book Section]

Atkinson, Colin and Kühne, Thomas (2005):
Multi-level platform descriptions.
In: Workshop on metamodeling and corresponding tools <1, 2005, Essen>. - 2005, [Conference or Workshop Item]

Austaller, Gerhard and Roth, Eric (2005):
Globale Referenzen basierend auf SOAP.
In: Kommunikation in Verteilten Systemen (KiVS) : Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005 in Kaiserslautern / Paul Müller ... (Hrsg.)- Bonn : Ges. für Informatik, 2005.- 229 S.- (GI-Edition : Proceedings ; 61).- ISB, [Conference or Workshop Item]

Antifakos, S. and Kern, Nicky and Schiele, Bernt and Schwaninger, A. (2005):
Towards improving trust in context-aware systems by displaying system confidence.
In: 7th International Conference on Human Computer Interaction with Mobile Devices and Services, 19 to 22 September 2005, University of Salzburg, Austria : Proceedings ...- S. 9-14, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Regression analysis of ozone data.
Los Alamitos, Calif. [u.a.], IEEE Computer Society, In: International Conference on Information Technology : Coding and Computing : proceedings; ITCC 2005; April 4 - 6, 2005, Las Vegas, Nevada / Ed. by Henry Selvaraj .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2005, Vol. 1, 1, S. 174-178 ISBN:, [Conference or Workshop Item]

Atkinson, Colin and Kühne, Thomas (2005):
Concepts for comparing modeling tool architectures.
Berlin [u.a.], Springer, In: Model driven engineering languages and systems : 8th international conference, MoDELS 2005, Montego Bay, Jamaica, October 2 - 7, 2005 ; proceedings / Lionel Briand ... (eds.). - Berlin [u.a.] : Springer, 2005 (Lecture notes in computer science ; 3713) ISB, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Optimal statistical model for forecasting ozone.
Los Alamitos, Calif. [u.a.], IEEE Computer Society, In: International Conference on Information Technology : Coding and Computing : proceedings; ITCC 2005; April 4 - 6, 2005, Las Vegas, Nevada / Ed. by Henry Selvaraj .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2005, Vol. 1, 1, S. 169-173 ISBN:, [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2005):
Experiences with MundoCore.
Los Alamitos, Calif. [u.a.], IEEE Computer Society, In: Proceedings, Third IEEE International Conference on Pervasive Computing and Communications workshops, PerCom 2005 workshops : 8 - 12 March 2005, Kauai Island, Hawaii / sponsored by the IEEE Computer Society; the Department of Computer Science, the Univers, [Conference or Workshop Item]

Amelunxen, Carsten and Rötschke, Tobias and Schürr, Andy (2005):
Graph Transformations with MOF 2.0.
In: H. Giese, A. Zündorf (eds.), Proc. 3rd International Fujaba Days 2005, 9 2005, Vol. tr-ri-05-259, Universität Paderborn, 25-31, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Regression Analysis of Ozone Data.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE International Conference on Information Technology: Coding and Computing 2005. Proceedings Vol. I, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Optimal Statistical Model for Forecasting Ozone.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE International Conference on Information Technology: Coding and Computing 2005. Proceedings Vol. I, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc and Nealen, Andrew (2005):
Adaptive Sampling of Intersectable Models Exploiting Image and Object-space Coherence.
ACM Press, New York, In: Proceedings of the 2005 ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games (I3D), [Conference or Workshop Item]

Alaoui, Omar (2005):
Interoperabilität und Standards von mobilen Agenten.
TU Darmstadt, [Master Thesis]

Alexa, Marc (2005):
Non-conforming Surface Representations.
Eurographics Association, Aire-la-Ville, In: SGP 2005. Proceedings, [Conference or Workshop Item]

Aldinger, T. and Kopf, S. and Scheele, N. and Effelsberg, W. (2005):
Participatory Simulation of a Stock Exchange.
In: World Conference on Educational Multimedia, Hypermedia and Telecommunications (EdMedia), Montr&#039;eal, Canada, 2005, [Conference or Workshop Item]

Adelsbach, A. and Alkassar, A. and Garbe, K.-H. and Luzaic, M. and Manulis, M. and Scherer, E. and Schwenk, J. and Siemens, E. (2005):
Voice over IP - Sichere Umstellung der Sprachkommunikation auf IP-Technologie.
BSI - Bundesamt für Sicherheit in der Informationstechnik, [Book]

Antollini, Jose (2005):
Implementing an Active Functionality Service on Different Platforms.
UNICEN, [Master Thesis]

Antollini, Mario (2005):
A High Level Pub/Sub Layer for Open Distributed Heterogeneous Environments.
UNICEN, [Master Thesis]

Anton, Tobias
Bauer, Mathias and Brandherm, Boris and Fürnkranz, Johannes and Grieser, Gunter and Hotho, Andreas and Jedlitschka, Andreas and Kröner, Alexander (eds.) (2005):
XPath-Wrapper Induction by generating tree traversal patterns.
In: Lernen, Wissensentdeckung und Adaptivit&auml;t (LWA-05), [Conference or Workshop Item]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Bubel, Richard and Giese, Martin and Hähnle, Reiner and Menzel, Wolfram and Mostowski, Wojciech and Roth, Andreas and Schlager, Steffen and Schmitt, Peter (2005):
The KeY tool: integrating object oriented design and formal verification.
In: Software and System Modeling, p. 32, 4, (1), DOI: 0.1007/s10270-004-0058-x,
[Online-Edition: http://www.springerlink.com/index/10.1007/s10270-004-0058-x],
[Article]

Alkassar, Ammar and Krimmer, Robert and Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, pp. 480-482, 8, [Article]

Antollini, Jose and Antollini, Mario and Guerrero, Pablo and Cilia, Mariano (2004):
Extending REBECA to Support Concept-Based Addressing.
In: In Proceedings of the Argentinean Symposium on Information Systems (ASIS&#039;04), Cordoba, Argentina, [Conference or Workshop Item]

Arnold, Michael (2004):
Digital audio watermarking.
Berlin, Logos-Verl., TU Darmstadt, ISBN 3-8325-0582-2,
[Ph.D. Thesis]

Alexa, Marc and Adamson, Anders (2004):
On normals and projection operators for surfaces defined by point sets.
In: Proceedings of Eurographics Symposium on point-based graphics. Eds. : Marc Alexa .... .- 2004. S. 149-156, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc (2004):
Approximating bounded, non-orientable surfaces from points,.
Los Alamitos, Calif. [u.a.], IEEE Computer Soc., In: Proceedings / Shape Modeling International 2004 : [proceedings of the International Conference on Shape Modeling and Applications] ; SMI 2004 ; 7 - 9 June 2004, Genova, Italy / ed. by Franca Giannini .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Soc., [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2004):
Optimal Statistical Model for Forecasting Air Quality Data.
[S.l.], CSREA Press, In: Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Sciences, METMBS '04 : Las Vegas, Nevada, USA, June 21 - 24, 2004 / ed.: Faramarz Valafar .... - [S.l.] : CSREA Press, 2004, S.436-442 .- ISBN, [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2004):
Talking assistant headset : a smart digital identity for ubiquitous computing.
In: Advances in pervasive computing : a collection of contributions presented an PERVASIVE 2004 ; [18. - 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien : Österreichische Computer Gesellsch., 2004, S. 279-284 (books-at-ocg.at ; 176) ISBN 3, 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien, Österreichische Computer Gesellsch., [Book Section]

Aitenbichler, Erwin (2004):
System support for ubiquitous computing (submission to the doctoral colloquium at Pervasive 2004).
In: Advances in pervasive computing : a collection of contributions presented an PERVASIVE 2004 ; [18. - 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien : Österreichische Computer Gesellsch., 2004, S.1-6 (books-at-ocg.at ; 176) ISBN 3-8540, 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien, Österreichische Computer Gesellsch., [Book Section]

Austaller, Gerhard and Lauff, Markus and Lyardet, Fernando and Mühlhäuser, Max (2004):
Technologiebewusstes Design von Web-Anwendungen.
In: Web Engineering : systematische Entwicklung von Web-Anwendungen / Gerti Kappel ... (Hrsg.). - 1. Aufl.. - Heidelberg : dpunkt-Verl., 2004. - XVI, 416 S. ISBN: 3-89864-234-8 , S. 101-123, 1. Aufl.. - Heidelberg, dpunkt-Verl., [Book Section]

Austaller, Gerhard and Kangasharju, Jussi and Mühlhäuser, Max (2004):
Using web services to build context-aware applications in ubiquitous computing.
Berlin [u.a.], Springer, In: Web engineering : 4th international conference, ICWE 2004, Munich, Germany, July 26 - 30, 2004 ; proceedings / Nora Koch ... (eds.). - Berlin [u.a.] : Springer, 2004 (Lecture notes in computer science ; 3140), S. 483-487 ISBN: 3-540-22511-0, [Conference or Workshop Item]

Austaller, Gerhard (2004):
Web Services als Bausteine für kontextabhängige Anwendungen.
In: 1. GI/ITG KuVS Fachgespräch Ortsbezogene Anwendungen und Dienste : am 24.und 25.06.2004, Fernuniversität Hagen / Jörg Roth (Ed.). - Hagen : FernUniversität, Fachbereich Informatik, 2004 , S. 23-26 (Informatik-Berichte ; 317), FernUniversität, [Article]

an Mey, Dieter and Bischof, Christian (2004):
Die Zukunft ist parallel - Perspektiven des Hochleistungsrechnens.
Aachen, Rechen-und Kommunikationszentrum der RWTH Aachen, [Online-Edition: http://www.rz.rwth-aachen.de/global/showdocument.asp?id=bjoi...],
[Report]

Abdollahain, M. and Foroughi, Roya (2004):
Optimal Statistical Model for Forecasting Air Quality Data.
CSREA Press, Las Vegas, In: METMBS '04, [Conference or Workshop Item]

Alexa, Marc and Adamson, Anders (2004):
On Normals and Projection Operators for Surfaces Defined by Point Sets.
Eurographics, Aire-la-Ville, In: Symposium on Point Based Graphics, [Conference or Workshop Item]

Arnold, Michael (2004):
Digital Audio Watermarking.
Logos Verlag, Berlin, Darmstadt, TU, Diss., 2004, ISBN 3-8325-0582-2,
[Ph.D. Thesis]

Adamson, Anders and Alexa, Marc (2004):
Approximating Bounded, Non-orientable Surfaces from Points.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2004. Proceedings, [Conference or Workshop Item]

Altmeyer, Oliver and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian
Paulus, Sachar and Pohlmann, Norbert and Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, pp. 346-361, [Book Section]

Amelunxen, Carsten and Schürr, Andy and Bichler, Lutz
Rumpe, Bernhard and Hesse, Wolfgang (eds.) (2004):
Codegenerierung für Assoziationen in MOF 2.0.
GI, In: Modellierung 2004, Proceedings zur Tagung, 23.-26. M\"rz 2004, Marburg, Proceedings, In: LNI, 45, [Online-Edition: http://subs.emis.de/LNI/Proceedings/Proceedings45/article127...],
[Conference or Workshop Item]

Arnold, Axel and Flentge, Felix (2004):
Team Description Mainz Rolling Brains 2004 - 2D.
[Other]

Arnold, Axel and Flentge, Felix and Schneider, Christoph (2004):
Team Description Mainz Rolling Brains 2004 - 3D.
[Other]

Antifakos, Stavros and Schwaninger, Adrian and Schiele, Bernt (2004):
Evaluating the Effects of Displaying Uncertainty in Context-Aware Applications.
In: 6th International Conference on Ubiquitous Computing (ubicomp 2004), [Conference or Workshop Item]

Antifakos, Stavros and Michahelles, Florian and Schiele, Bernt (2004):
Towards Situation-Aware Affordances: An Experimental Study.
In: 2nd International Conference on Pervasive Computing (pervasive 2004), [Conference or Workshop Item]

Atluri, Vijayalakshmi and Backes, Michael and Basin, David and Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE, ACM, [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2004):
Talking Assistant: A Smart Digital Identity for Ubiquitous Computing.
In: Advances in Pervasive Computing, Austrian Computer Society (OCG), ISBN 3-85403-176-9,
[Conference or Workshop Item]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: ISC 2003 - Information Security, 6th International Conference, Springer, Bristol, UK, In: LNCS, 2851, ISBN 3-540-20176-9,
[Conference or Workshop Item]

Alkassar, Ammar and Stüble, Christian (2003):
A Security Framework for Integrated Networks.
In: MILCOM 2003 IEEE Military Communications Conference, Boston, USA, [Conference or Workshop Item]

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2003):
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, pp. 266-278, 9, (3), [Article]

Ackermann, Ralf (2003):
Gateways and Components for Supplementary IP Telephony Services in Heterogeneous Environments.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-3591],
[Ph.D. Thesis]

Alves dos Santos, Luiz Manoel (2003):
Asymmetric and Adaptive Conference Systems for Enabling Computer-Supported Mobile Activities.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-3345],
[Ph.D. Thesis]

Aitenbichler, Erwin and Kangasharju, Jussi (2003):
Communication abstractions in MundoCore.
In: ECOOP <2003, Darmstadt> / Communications Abstractions for Distributed Systems Workshop: Proceedings, [Conference or Workshop Item]

Askerdal, Örjan and Gäfvert, Magnus and Hiller, Martin and Suri, Neeraj (2003):
Analyzing the impacts of data errors in safety-critical control systems.
In: IEICE transactions / E, English transactions / D, information & systems, p. 2623, Vol. 8, [Article]

Ackermann, Ralf (2003):
Gateways and components for supplementary IP telephony services in heterogeneous environments.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Alves dos Santos, Luiz Manoel (2003):
Asymmetric and adaptive conference systems for enabling computer supported mobile activities.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Aschenbrenner, Peter and Schürr, Andy (2003):
Generating interactive animations from visual specifications.
In: IEEE Symposium on Visual Languages and Formal Methods <2003, Auckland>: Proceedings ... October 2003, [Conference or Workshop Item]

Alexa, Marc and Behr, Johannes and Cohen-Or, Daniel and Fleishman, Shachar and Levin, David and Silva, Claudio T. (2003):
Computing and rendering point set surfaces.
In: IEEE transactions on visualization and computer graphics, pp. 3-15, 9, [Article]

Alfert, K. and Doberkat, E.-E. and Engels, G. and Lohmann, M. and Magenheim, J. and Schürr, Andy (2003):
MuSoft - Multimedia in der Software-Technik.
In: Software Engineering im Unterricht der Hochschulen / SEUH 8 - Berlin 2003. Hrsg. Johannes Siedersleben ...- Heidelberg : dPunkt-Verl., 2003.- VIII, 120 S.- ISBN 3-89864-201-1.- S. 70-80, dPunkt-Verl., [Article]

Alexa, Marc (2003):
Differential coordinates for local mesh morphing and deformation.
In: The visual computer, pp. 105-114, 19, [Article]

Aitenbichler, Erwin (2003):
Ortungssysteme für mobile Endgeräte.
2. Okt. 2003 in Frankfurt am Main; proceedings / Klaus Dittrich ... (Hrsg.)-Teil 1.- Bonn, Ges. für Informatik, In: Innovative Informatikanwendungen : Informatik 2003, Beiträge der 33. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 29. Sept. - 2. Okt. 2003 in Frankfurt am Main; proceedings / Klaus Dittrich ... (Hrsg.)-Teil 1.- Bonn : Ges. für Informatik, 20, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2003):
An IR local positioning system for smart items and devices.
Los Alamitos, Calif. [u.a.], IEEE Computer Society, In: International Conference on Distributed Computing Systems workshops <23, 2003, Providence, RI>: Proceedings, 19 - 22 May 2003, Providence, Rhode Island, USA ; [3rd International Workshop on Smart Appliances and Wearable Computing / sponsored by the IEEE C, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2003):
Audiobasierte Endgeräte für Ubiquitous Computing und geeignete Infrastrukturen.
In: Ubiquitous Computing / Heinz Sauerburger (Hrsg.)- Heidelberg : dpunkt-Verl., 2003.-127 S.- (HMD : Praxis der Wirtschaftsinformatik ; 229).- ISBN: 3-89864-200-3.- S. 68-80, [Article]

Adamson, Anders and Alexa, Marc (2003):
Approximation and intersecting surfaces from points.
Darmstadt, Techn. Univ., Fachbereich Informatik, Fachgebiet Graphisch-Interaktive Systeme, 2003-0, [Book]

Arnold, Michael and Daum, Henning and Busch, Christoph (2003):
Comparative study on fingerprint recognition systems - project BioFinger.
Bonn, Ges. für Informatik, In: BIOSIG 2003 : proceedings of the first International Conference on Biometrics and Electronic Signatures of the GI Working Group BIOSIG / ed. Arslan Brömme, Christoph Busch.- Bonn: Ges. für Informatik, 2003.- 138 S.- (GI edition : lecture notes in inform, [Conference or Workshop Item]

Arnold, Michael and Busch, Christoph and Schmucker, Martin (2003):
Szenario-basierte Testverfahren zur Zertifizierung von Wasserzeichen.
In: Mit Sicherheit Informatik : Informatik 2003 : [Teiltagung] Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit" [der GI-Jahrestagung Informatik 2003], 29. September - 2. Oktober 2003 in Frankfurt am Main / Rüdiger Grimm ... (Hrsg.)- Bonn : Ges. für In, [Conference or Workshop Item]

Alexa, Marc and Klug, Tobias and Stoll, Carsten (2003):
Direction Fields over Point-Sampled Geometry.
University of West Bohemia, Plzen, In: Journal of WSCG Volume 11 No. 1. Proceedings, [Conference or Workshop Item]

Alexa, Marc (2003):
Differential Coordinates for Local Mesh Morphing and Deformation.
In: The Visual Computer, pp. 105-114, (19), [Article]

Alexa, Marc and Behr, Johannes and Cohen-Or, Daniel and Fleishman, Shachar and Levin, David and Silva, Claudio T. (2003):
Computing and Rendering Point Set Surfaces.
In: IEEE Transactions on Visualization and Computer Graphics, pp. 3-15, 9, (1), [Article]

Alves dos Santos, Luiz M. (2003):
Asymmetric and Adaptive Conference Systems for Enabling Computer-Supported Mobile Activities.
Shaker, Aachen, Zugl.: Darmstadt, TU, Diss., 2003, In: Berichte aus der Informatik, ISBN 3-8322-2101-8,
[Ph.D. Thesis]

Adamson, Anders and Alexa, Marc (2003):
Approximating and Intersecting Surfaces from Points.
Association for Computing Machinery, New York, In: Symposium on Geometry Processing. Proceedings, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc (2003):
Ray Tracing Point Set Surfaces.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2003. Proceedings, [Conference or Workshop Item]

Alexa, Marc and Klug, Tobias and Stoll, Carsten (2003):
Direction Fields over Point-Sampled Geometry.
In: WSCG, In: 11, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2003):
Audiobasierte Endgeräte für Ubiquitous Computing und geeignete Infrastrukturen.
In: dpunkt Heidelberg, pp. 68--80, [Article]

Antifakos, Stavros and Borchers, Jan and Schiele, Bernt (2003):
Designing Physical Interaction with Sensor Drawbacks in Mind.
In: 5th International Symposium on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2003), [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2003):
Grouping Mechanisms for Smart Objects Based on Implicit Interaction and Context Proximity.
In: International Conference on Ubiquitous Computing (UBICOMP 2003), [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2003):
LaughingLily: Using a Flower as a Real World Information Display.
In: International Conference on Ubiquitous Computing (UBICOMP 2003), [Conference or Workshop Item]

Antifakos, Stavros and Borchers, Jan and Schiele, Bernt (2003):
The Role of Perception in Ubiquitous Interactive Systems.
In: At the Crossroads: The Interaction of HCI and System Issues in Ubicomp. Workshop at UBICOMP’03, [Conference or Workshop Item]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
(TI-1/03), [Report]

Ahsen, Anette von and Buxmann, Peter and Díaz, Luis Martín (2003):
Economic Evaluation of Cooperation in Supply Chains - Models and Results from an Empirical Study, Working Paper, Freiberg.
[Other]

Amelunxen, C. and Königs, Alexander and Rötschke, Tobias and Schürr, Andy
Giese, H. and Zündorf, A. (eds.) (2003):
Adapting FUJABA for Building a Meta Modelling Framework.
In: Proc. 1st International Fujaba Days, tr-ri-04-247, [Conference or Workshop Item]

Alfert, Klaus and Doberkat, Ernst-Erich and Engels, Gregor and Lohmann, Marc and Magenheim, Johannes and Schürr, Andy
Siedersleben, Johannes and Weber-Wulff, Debora (eds.) (2003):
MuSoft: Multimedia in der Softwaretechnik.
In: Proc. SEUH 8 Software Engineerung im Unterricht der Hochschulen Berlin, dpunkt, In: Software Engineering im Unterricht der Hochschulen, SEUH 8, Berlin 2003, Berlin, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2002):
The Talking Assistant Headset: A Novel Terminal for Ubiquitous Computing.
(TK-02/02), [Report]

Alexa, Marc (2002):
Shape Spaces from Morphing.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-2134],
[Ph.D. Thesis]

Adelsbach, Andre and Stüble, Christian and Creese, Sadie and Pfitzmann, Birgit and Ryan, Peter Y. A. and Simmonds, William and Steinbrechner, Sandra and Steiner, Michael and Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Alexa, Marc (2002):
Recent advances in mesh morphing.
In: Computer graphics forum, pp. 173-196, 21, [Article]

Alexa, Marc and Taponecco, Francesca (2002):
Scan converting spirals.
In: Journal of WSCG, pp. 115-120, Vol. 1, [Article]

Alexa, Marc (2002):
Wiener filtering of meshes.
Los Alamitos, Calif., IEEE Computer Soc. Pr., In: International Conference on Shape Modeling <4, 2002, Banff, Alberta>: Shape modeling 2002, proceedings / ed. by Geoff Wyvill.- Los Alamitos, Calif.: IEEE Computer Soc. Pr., 2002.- ISBN 0-7695-1546-0.- S. 51-57, [Conference or Workshop Item]

Alexa, Marc (2002):
Refinement operators for triangle meshes.
In: Computer aided geometric design, pp. 169-172, 19, [Article]

Alexa, Marc (2002):
Shape spaces from morphing.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Alexa, Marc (2002):
Linear combinations of transformations.
In: ACM transactions on graphics, pp. 380-387, 21, [Article]

Aitenbichler, Erwin and Mühlhäuser, Max (2002):
The talking assistant headset : a novel terminal for ubiquitous computing.
Darmstadt, Dept. of Computer Science, Telecooperation Group, TK02/0, [Book]

Alexa, Marc (2002):
Wiener Filtering of Meshes.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2002. Proceedings, [Conference or Workshop Item]

Amicis, Raffaele de and Santos, Pedro and Stork, André and Fiorentino, Michele (2002):
SketchAR - Sketching in Mixed Realities.
Heinz Nixdorf Institut, Paderborn, In: Augmented und Virtual Reality in der Produktentstehung, In: HNI-Verlagsschriftenreihe; 107, [Conference or Workshop Item]

Alexa, Marc (2002):
Shape Spaces from Morphing.
Darmstadt, TU, Diss., 2002, [Ph.D. Thesis]

Alexa, Marc and Taponecco, Francesca (2002):
Scan Converting Spirals.
University of West Bohemia, Plzen, In: WSCG 2002. Short Communication Papers, [Conference or Workshop Item]

Alexa, Marc (2002):
Refinement operators for triangle meshes.
In: Computer Aided Geometric Design, pp. 169-172, 19, (3), [Article]

Alexa, Marc (2002):
Recent Advances in Mesh Morphing.
In: Computer Graphics Forum, pp. 173-196, 21, (2), [Article]

Alexa, Marc (2002):
Linear Combinations of Transformations.
In: ACM Transactions on Graphics, pp. 380-387, 21, (3), [Article]

Adamson, Anders (2002):
Ray Tracing von Punktmengenflächen.
TU Darmstadt, [Master Thesis]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Mostowski, Wojciech and Schmitt, Peter H.
Kutsche, Ralf-Detlef and Weber, Herbert (eds.) (2002):
The KeY System: Integrating Object-Oriented Design and Formal Methods.
Springer, In: Fundamental Approaches to Software Engineering, 5th International Conference, FASE 2002, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2002, Grenoble, France, April 8-12, 2002, Proceedings, In: Lecture Notes in Computer Science, 2306, DOI: 10.1007/3-540-45923-5₂₃,
[Online-Edition: https://doi.org/10.1007/3-540-45923-5_23],
[Conference or Workshop Item]

Alkassar, Ammar and Stüble, Christian (2002):
Towards Secure IFF: Preventing Mafia Fraud Attacks.
In: MILCOM 2002, IEEE Military Communication Conference, [Conference or Workshop Item]

Anderl, Reiner and Reichenbach, Christoph and Hessling, Christian and Weimer, Markus (2002):
Embedded Systems - Vom virtuellen zum realen Produkt.
In: thema Forschung 1/2002: Eingebettete Systeme: Entwurf und Anwendungen versteckter Computer, TU Darmstadt, pp. 50-58, [Article]

Arnold, Axel and Flentge, Felix and Schneider, Christoph and Schwandtner, Götz and Uthmann, Thomas and Wache, Martin
Birk, A. and Coradeschi, S. and Tadokoro, S. (eds.) (2002):
Team Description Mainz Rolling Brains 2001.
In: RoboCup-2001. Robot Soccer World Cup V, Springer, [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2002):
Bridging the Gap between Virtual and Physical Games Using Wearable Sensors.
In: 3rd International Conference on Computer Vision Systems (ICVS 2002), [Conference or Workshop Item]

Antifakos, Stavros and Michahelles, Florian and Schiele, Bernt (2002):
Proactive Instructions for Furniture Assembly.
In: 4th international conference on Ubiquitous Computing (UbiComp 2002), Springer-Verlag, Göteborg, Sweden, ISBN 3-540-44267-7,
[Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2002):
Beyond Position Awareness.
In: Personal and Ubiquitous Computing, pp. 313--317, 6, (5/6), [Article]

Altheide, F. and Dörr, H. and Schürr, Andy
Stoewer, H. and Garnier, L. (eds.) (2002):
Requirements to a Framework for sustainable Integration of System Development Tools.
AFIS PC Chairs, In: Proc. of the 3rd European Systems Engineering Conference (EuSEC'02), Toulouse, 2002, [Conference or Workshop Item]

Alexa, Marc and Behr, J. and Cohen-Or, D. and Fleishman, S. and Levin, D. and Silva, C. T. (2001):
Point set surfaces.
In: Visualization 2001: Vision, modeling and visualization <6, 2001, Stuttgart>: Proceedings. Hrsg.: T. Ertl [u.a.], [Conference or Workshop Item]

Ackermann, Ralf and Görtz, M. and Karsten, M. and Steinmetz, Ralf (2001):
Prototyping a PDA based communication appliance.
In: Softcom <2001, Split>: Proceedings. S. 739-746, [Conference or Workshop Item]

Ackermann, Ralf and Darlagiannis, V. and Görtz, M. and Karsten, M. and Steinmetz, Ralf (2001):
An open source H.323-SIP gateway as basis for supplementary service interworking.
In: IP Telephony Workshop <2, 2001, New York>: Proceedings. S. 169-175, [Conference or Workshop Item]

Ackermann, Ralf and Schumacher, M. and Roedig, U. and Steinmetz, Ralf (2001):
Vulnerabilities and security limitations of current IP telephony systems.
Boston [u.a.], Kluwer, In: CMS 2001: Working Conference on Communications and Multimedia Security <5, 2001, Darmstadt>: Proceedings. S. 53-66. Hrsg.: R. Steinmetz. - Boston [u.a.]: Kluwer, 2001, [Conference or Workshop Item]

Aschemann, Gerd and Hasselmeyer, P. (2001):
A loosely coupled federation of distributed management services.
In: Journal of network and systems management, pp. S. 51-65, 9, [Article]

Alexa, Marc (2001):
Local control for mesh morphing.
Los Alamitos, IEEE Computer Soc. Press, In: Internatioal Conference on Shape Modelling and Applications <3, 2001,Genova>: Proceedings. S. 209-215. - Los Alamitos: IEEE Computer Soc. Press, 2001, [Conference or Workshop Item]

Alexa, Marc (2001):
Mesh morphing: STAR - state of the art report.
Oxford, Blackwell, In: European Association for Computer Graphics: Eurographics 2001: Annual Conference <22, 2001, Manchester>: State of the Art Reports. S. 1-20. - Oxford: Blackwell, 2001, [Conference or Workshop Item]

Alexa, Marc and Hellenschmidt, M. and Rieger, T. and Berner, U. (2001):
An animation system for user interface agents.
Plzen, Univ. of West Bohemia, In: WSCG 2001: International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision <9, 2001, Plzen>: Conference Proceedings. Hrsg.: V. Skala [u.a.]. - Plzen: Univ. of West Bohemia, 2001.- S. 154-160, [Conference or Workshop Item]

Alexa, Marc (2001):
Shape spaces from mesh morphing.
In: Graphiktag 2001: Workshop über Trends und Höhepunte der Graphischen Datenverarbeitung <2001, Tübingen>; Tagungsbd. S. 44-55. Hrsg.: D. Saupe, Ges. für Informatik, Fachausschuß 4.1 [u.a.], [Conference or Workshop Item]

Alexa, Marc (2001):
Shape Spaces from Mesh Morphing.
In: Graphiktag 2001. Proceedings, [Conference or Workshop Item]

Alexa, Marc and Behr, Johannes and Cohen-Or, Daniel and Fleishman, Shachar and Levin, David and Silva, Claudio T. (2001):
Point Set Surfaces.
IEEE Computer Society Press, Los Alamitos, Calif., In: IEEE Visualization 2001. Proceedings, [Conference or Workshop Item]

Alexa, Marc (2001):
Mesh Morphing : STAR - State of the Art Report.
In: Eurographics 2001. State of the Art Reports, [Conference or Workshop Item]

Alexa, Marc (2001):
Local Control for Mesh Morphing.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2001. Proceedings, [Conference or Workshop Item]

Alexa, Marc and Müller, Wolfgang and Spierling, Ulrike and Rieger, Thomas (2001):
Face-to-Face with Your Assistant. Realization Issues of Animated User Interface Agents for Home Appliances.
Neuer Hochschulschriftenverlag, Rostock, In: IMC 2000. Intelligent Interactive Assistance & Mobile Multimedia Computing. Proceedings, [Conference or Workshop Item]

Alexa, Marc and Hellenschmidt, Michael and Rieger, Thomas and Berner, Uwe (2001):
An Animation System for User Interface Agents.
University of West Bohemia, Plzen, In: WSCG 2001. Conference Proceedings Vol. 1, [Conference or Workshop Item]

Abawi, Daniel F. and Reinhold, Silvan (2001):
XML-basierte 3D-Komponenten.
TU Darmstadt, [Master Thesis]

Adelsbach, Andre and Sadeghi, Ahmad-Reza (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
Springer-Verlag, In: Information Hiding: Fourth International Workshop, In: LNCS, 2137, [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2001):
Beyond position Awareness.
In: Workshop on Location Modeling for Ubiquitous Computing at Ubicomp 2001, [Conference or Workshop Item]

Albert, Michael (2001):
Konzeption und Implementierung eines Remote Access {VPNs} für Außendienstarbeiter unter Einsatz einer Public-Key-Infrastruktur.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Adler, Steven and Bangerter, Endre and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Karjoth, Günter and Kesdogan, Dogan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Presler-Marshall, Martin and Schnyder, Michael and Herreweghen, Els Van and Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Adler, Steven and Bangerter, Endre and Bohrer, Kathy and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Kesdogan, Dogan and Leonard, Matthew and Liu, Xuan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Powers, Calvin and Schnyder, Michael and Schonberg, Edith and Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Adelsbach, Andre and Pfitzmann, Birgit and Sadeghi, Ahmad-Reza (2000):
Proving ownership of digital content.
Springer-Verlag, In: 3rd International Workshop on Information Hiding, IH 1999, In: LNCS, 1768, [Conference or Workshop Item]

Alireza, Ameneh and Lang, Ulrich and Padelis, Marios and Schreiner, Rudolf and Schumacher, Markus (2000):
The Challenges of CORBA Security.
Berlin, Heidelberg (u.a.), Springer, In: Proceedings of the Workshop "Sicherheit in Mediendaten", Gesellschaft für Informatik (GI), In: Sicherheit in Netzen und Medienströmen: Tagungsbd. des GI Workshops 'Sicherheit in Mediendaten'. Hrsg.: M. Schumacher, R. Steinmetz. - Berlin, Heidelberg (u.a.): Springer, 2000, [Conference or Workshop Item]

Alexa, Marc (2000):
Merging polyhedral shapes with scattered features.
In: The visual computer, pp. S. 26-37, 16, [Article]

Ackermann, Ralf and Darlagiannis, V. and Steinmetz, Ralf (2000):
Using DMIF for abstracting from IP-telephony signaling protocols.
Berlin (u.a.), Springer, In: IDMS 2000: Internatinal Workshop on Interactive Distributes Multimedia Systems and Telecommunication Services <7, 2000, Enschede>: Proceedings. Hrsg.: H. Scholten. - Berlin (u.a.): Springer, 2000 = Lecture notes in computer science; 1905. S. 104-115, [Conference or Workshop Item]

Ackermann, Ralf and Roedig, U. and Zink, M. and Griwodz, C. and Steinmetz, Ralf (2000):
Associating network flows with user and application information.
In: ACM Multimedia Workshop Security <2000, Los Angeles>: Proceedings. S. 149-152, [Conference or Workshop Item]

Ackermann, Ralf and Roedig, U. and Steinmetz, Ralf (2000):
Entwicklung und Nutzung von IP-Telefonie Anwendungen auf Unix-Systemen.
In: GUUG-Nachrichten, pp. S. 37-41, [Article]

Ackermann, Ralf and Rensing, C. and Noll-Hussong, S. and Wolf, L. and Steinmetz, Ralf (2000):
SSS4it - secure session setup für Internet-Telefonie.
In: Systemsicherheit 2000 <2000, Bremen>: Tagungsbd. S. 140-150, [Conference or Workshop Item]

Andrew, Mark and Hasselmeyer, P. (2000):
Using CORBA and JAVA for PBX management.
In: NOMS 2000: IEEE/IFIP Network Operations and Management Symposium <2000, Honolulu, Hawaii>; Proceedings. Hrsg.: J.W..Hong (u.a.) - Piscataway, NJ: IEEE Service Center, 2000. S. 353-365, [Conference or Workshop Item]

Alexa, Marc and Behr, J. and Müller, W. (2000):
The morph node.
New York, ACM Press, In: ACM SIGCOMM: Symposium on the Virtual Reality Modeling Language <5, 2000, Monterey, Calif.>: Proceedings. Hrsg.: S.N. Spencer. - New York: ACM Press, 2000. S. 29-34, [Conference or Workshop Item]

Alexa, Marc and Müller, W. (2000):
Representing animations by principal components.
Amsterdam, NCC Blackwell, In: Eurographics 2000 <21, 2000, Interlaken>: Proceedings. Hrsg.: D.A.Duce, C. Vandoni = Computer graphics forum. Vol. 19 (2000), No. 3. - Amsterdam: NCC Blackwell, North-Holland. S. C-411 - C-418, [Conference or Workshop Item]

Alexa, Marc (2000):
As-rigid-as possible shape interpolation.
Reading, MA, Addison-Wesley, In: SIGGRAPH: International Conference on Computer Graphics and Interactive Techniques <27, 2000, New Orleans, Louisiana>: Proceedings. Hrsg.: K. Akeley. - Reading, MA: Addison-Wesley, 2000. S. 157-164 = Computer Graphics Annual Conference Series, [Conference or Workshop Item]

Alexa, Marc and Müller, W. and Spierling, U. and Rieger, T. (2000):
Face-to-face with your assistant: realization issues of animated user interface agents for home appliances.
Rostock, Fraunhofer-Institut für Graphische Datenverarbeitung u. Univ. Rostock. - Darmstadt: Techn. Univ., In: ICM 2000: Intelligent Interactive Assistance & Mobile Multimedia Computing <2000, Rostock>. - Rostock: Fraunhofer-Institut für Graphische Datenverarbeitung u. Univ. Rostock. - Darmstadt: Techn. Univ., FB Informatik, FG Graphisch-Interaktive Systeme u. Ge, [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (2000):
Termination of term rewriting using dependency pairs.
In: Theoretical computer science, pp. 133-178, 236, [Article]

Austaller, Gerhard and Hartl, Andreas and Kappel, G. and Lechleitner, C. and Mühlhäuser, Max and Reich, S. and Rudisch, R. (2000):
Gulliver beans: a tool for fine tuning data delivery in E-Commerce applications.
In: EMISA'00: Informationssysteme für E-Commerce <2000, Linz>; Proceedings. S. 29-40, [Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Langenstein, Bruno and Mantel, Heiko and Rock, Georg and Schairer, Axel and Stephan, Werner and Vogt, Roland and Wolpers, Andreas (2000):
VSE: Formal Methods Meet Industrial Needs.
In: International Journal on Software Tools for Technology Transfer, Springer, pp. 66-77, 3, (1), ISSN 1433-2779,
[Online-Edition: https://link.springer.com/article/10.1007/s100099900022],
[Article]

Alexa, Marc and Müller, Wolfgang (2000):
Representing Animations by Principal Components.
In: Computer Graphics Forum, pp. C-411-C-418, 19, (3), [Article]

Alexa, Marc and Behr, Johannes and Müller, Wolfgang (2000):
The Morph Node.
ACM Press, New York, In: Web3D - VRML 2000. Proceedings, [Conference or Workshop Item]

Alexa, Marc (2000):
Merging polyhedral shapes with scattered features.
In: The Visual Computer, pp. 26-37, 16, (1), [Article]

Alexa, Marc (2000):
As-Rigid-As-Possible Shape Interpolation.
Addison-Wesley, Reading, MA, USA, In: Siggraph 2000. Conference Proceedings, In: Computer Graphics Annual Conference Series, [Conference or Workshop Item]

Adelsbach, Andre (2000):
Anonymous fingerprinting with direct non-repudiation.
In: Advances in Cryptology - ASIACRYPT‘2000, Springer-Verlag, Kyoto, Japan, In: LNCS, 1976, [Conference or Workshop Item]

Austaller, Gerhard and Hartl, Andreas and Kappel, Gerti and Kapsammer, Elisabeth and Lechleitner, Christoph and Mühlhäuser, Max and Reich, Siegfried and Rudisch, Rimbert
Jasper, Heinrich and Küng, Josef and Vossen, Gottfried (eds.) (2000):
Gulliver Beans: A Tool for Fine Tuning Data Delivery in E-Commerce Applications.
In: Proceedings of EMISA 2000 - Informationssystem f&uuml;r E-Commerce, ISBN 3 85487 1945,
[Conference or Workshop Item]

Aitenbichler, Erwin (2000):
Entwurf und Implementierung eines programmierten Graphersetzungssystems in Java.
Johannes Kepler Universität Linz, Institut für Technische Informatik und Telematik, [Master Thesis]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Schmitt, Peter (2000):
The KeY Approach: Integrating Object Oriented Design and Formal Verification.
(2000/4), [Report]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Schmitt, Peter (2000):
The KeY Approach: Integrating Object Oriented Design and Formal Verification.
In: In Proc. Java Card Workshop, Cannes, France, {INRIA} technical report, [Conference or Workshop Item]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Schmitt, Peter
Ojeda-Aciego, Manuel and de Guzmán, Inma P. and Brewka, Gerhard and Pereira, Luís Moniz (eds.) (2000):
The KeY Approach: Integrating Object Oriented Design and Formal Verification.
In: Proc. 8th European Workshop on Logics in AI (JELIA), Springer-Verlag, In: LNCS, 1919, [Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel (1999):
System Description: INKA 5.0 -- A Logic Voyager.
In: 16th International Conference on Automated Deduction, CADE--16, Trento, Italy, Springer, In: LNAI 1632, [Conference or Workshop Item]

Ackermann, Ralf and Pommitz, J. and Wolf, L. C. and Steinmetz, Ralf (1999):
MBone2Tel - telephone users meeting the MBone.
In: IDMS'99: International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services <6, 1999, Toulouse>: Proceedings. S. 121-132, [Conference or Workshop Item]

Alexa, Marc (1999):
Merging polyhedral shapes with scattered features.
Los Alamitos, IEEE Computer Soc. Press, In: International Conference on Shape Modeling and Applications <2, 1999, Aizu-Wakamatsu, Japan>: Proceedings. S. 202-210. - Los Alamitos: IEEE Computer Soc. Press, 1999, [Conference or Workshop Item]

Ackermann, Ralf and Pommitz, J. and Wolf, L. C. and Steinmetz, Ralf (1999):
Eine virtuelle PBX.
In: GI Multicast-Workshop <1, 1999, Braunschweig>: Tagungsbd. S. 187-197, [Conference or Workshop Item]

Aschemann, Gerd and Mohr, T. and Ruppert, M. (1999):
Integration of SNMP into a CORBA- and Web-based management environment.
Berlin (u.a.), Springer, In: Kommunikation in Verteilten Systemen (KiVS): 11. ITG/GI-Fachtagung 1999 Darmstadt. Hrsg.: R. Steinmetz. S. 210-221. - Berlin (u.a.): Springer, 1999, [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (1999):
Applying rewriting techniques to the verification of Erlang processes.
Berlin (u.a.), Springer, In: CSL'99: Annual Conference of the European Association for Computer Science Logic <1999, Madrid>; Proceedings. S. 96-110. - Berlin (u.a.): Springer, 1999 (Lecture notes in computer science; 1683), [Conference or Workshop Item]

Ackermann, Ralf and Pommitz, J. and Wolf, L. C. and Steinmetz, Ralf (1999):
MBone2Tel - ein Gateway für die Teilnahme von Nutzern konventioneller Telefonendgeräte an MBone-Konferenzen.
In: ITG/TKTG-Fachtagung Multimedia: Anwendungen, Technologie, Systeme; 8. Dortmunder Fersehseminar; Tagungsbd. - Dortmund 1999. S. 237-240, [Conference or Workshop Item]

Alexa, Marc and Müller, W. (1999):
The morphing space.
Plzen, Univ. of West Bohemia, In: International Conference on Central Europe on Computer Graphics and Visualization <7, 1999, Plzen>: Conference Proceedings. Hrsg.: V. Skala; IFIP Woking Group 5.10 on Computer Graphics and Virtual Worlds; European Ass. for Computer Graphics. Vol.2. S. 329, [Conference or Workshop Item]

Alexa, Marc and Müller, W. (1999):
Visualization by examples: mapping data to visual representations using few correspondences.
Berlin (u.a.), Springer, In: Data Visualization '99: Joint Eurographics and IEEE TCVG Symposium on Visualization <1999, Vienna>; Proceedings. Hrsg.: E. Gröller, H. Löffelmann, W. Ribarsky. S. 23-32. - Berlin (u.a.): Springer, 1999, [Conference or Workshop Item]

Aschemann, Gerd and Kehr, Roger and Zeidler, Andreas
Cap, Clemens H. (ed.) (1999):
A Jini-based gateway architecture for mobile devices.
In: JIT'99 : Java Informationstage 1999, Berlin (u.a.), Springer, DOI: 10.1007/978-3-642-60247-4_19,
[Conference or Workshop Item]

Aschemann, Gerd and Domnitcheva, Svetlana and Hasselmeyer, Peer and Kehr, Roger and Zeidler, Andreas (1999):
A framework for the integration of legacy devices into a Jini Management Federation.
In: Active Technologies for Network and Service Management. DSOM 1999, Berlin, Heidelberg (u.a.), Springer, In: DSOM 1999 : International Workshop on Distributed Systems: Operations and Management, 10, 1999, In: Lecture notes in computer science, vol. 1700, DOI: 10.1007/3-540-48100-1_20,
[Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel
Bert, Didier and Choppy, C. and Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99, Berlin ; Heidelberg, Springer, pp. 73-88, [Book Section]

Anderson, E. and Bai, Z. and Bischof, Christian and Blackford, S. and Demmel, J. and Dongarra, J. and Croz, J. Du and Greenbaum, A. and Hammarling, S. and McKenney, A. (1999):
LAPACK User's Guide / E. Anderson ...
Philadelphia, Pa., SIAM, Society for Industrial and Applied Mathematics, In: Software, environments, tools ; 9, [Book]

Alexa, Marc and Müller, Wolfgang (1999):
Visualization by Examples: Mapping Data to Visual Representations using Few Correspondences.
Springer, Wien, In: Data Visualization '99, In: Springer Computer Science, [Conference or Workshop Item]

Alexa, Marc and Müller, Wolfgang (1999):
The Morphing Space.
University of West Bohemia, Plzen, In: WSCG `99. Conference Proceedings Vol. 2, [Conference or Workshop Item]

Alexa, Marc (1999):
Merging Polyhedral Shapes with Scattered Features.
IEEE Computer Society Press, Los Alamitos, In: Shape Modeling International '99. Proceedings, [Conference or Workshop Item]

Austaller, Gerhard (1999):
Strategien zur Behandlung von mobilitätsbedingten Verbindungsunterbrechungen in verteilten Programmierumgebungen.
Johannes Kepler Universit&auml;t Linz, Institut f&uuml;r Technische Informatik und Telematik, [Master Thesis]

Aoki, Hisashi and Schiele, Bernt and Pentland, Alex (1999):
Realtime Personal Positioning System for Wearable Computers.
In: 3rd IEEE International Symposium on Wearable Computers (ISWC 1999), IEEE Computer Society, ISBN 0-7695-0428-0,
[Conference or Workshop Item]

Appel, Helo and Biehl, Ingrid and Fuhrmann, Arnulf and Ruppert, Markus and Takagi, Tsuyoshi and Takura, Akira and Valentin, Christian (1999):
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
(TI-21/99), [Report]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel
Bert, D. and Choppy, C. and Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: 14th International Workshop on Algebraic Development Techniques, WADT&#039;99, Springer, In: LNCS, 1827, [Conference or Workshop Item]

Andries, Marc and Engels, Gregor and Habel, Annegret and Hoffmann, Berthold and Kreowski, Hans-Jörg and Kuske, Sabine and Plump, Detlef and Schürr, Andy and Taentzer, Gabriele (1999):
Graph Transformation for Specification and Programming.
In: Science of Computer Programming, Elsevier Science Publ., pp. 1-54, 34, (1), [Article]

Autexier, Serge and Mantel, Heiko and Stephan, Werner
Herzog, Otthein and Günter, Andreas (eds.) (1998):
Simultaneous Quantifier Elimination.
In: KI-98: Advances in Artificial Intelligence, 22nd Annual German Conference on Artificial Intelligence, Bremen, Germany, Springer, In: LNAI 1504, [Conference or Workshop Item]

Achour, Mostefaoui and Theel, (1998):
Shrinking timestamp sizes of event ordering protocols.
IEEE 1998, IEEE 1998, In: ICPADS'98: International Conference on Parallel and Distributed Systems <6, 1998, Tainan, Taiwan>: Proceedings. S. 193-200, [Conference or Workshop Item]

Aschemann, Gerd and Kehr, R. (1998):
Towards a requirements-based information model for configuration management.
Piscataway, NJ, IEEE Computer Soc. Press, In: International Conference on Configurable Distributed Systems <4, 1998>: Proceedings. - Piscataway, NJ: IEEE Computer Soc. Press, 1998, [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (1998):
Modularity of termination using dependency pairs.
Berlin (u.a.), Springer, In: RTA'98: International Conference on Rewriting Techniques and Applications <9, 1998, Tsukuba, Japan>: Proceedings. - Berlin (u.a.): Springer, 1998. S. 226-240, 1379, [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
Germany, In: autexier.ea:semantical-investigation-of-simultaneous-skolemization-for-first-order-sequent-calculus:1998a, [Report]

Aoki, Hisashi and Schiele, Bernt and Pentland, Alex (1998):
Recognizing personal location from video.
In: Workshop on Perceptual User Interfaces (PUI), [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
(SEKI Report SR-98-05), [Report]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Menzel, Wolfram and Reif, Wolfgang and Schellhorn, Gerhard and Schmitt, Peter
Bibel, Wolfgang and Schmitt, Peter (eds.) (1998):
Integration of Automated and Interactive Theorem Proving.
In: Automated Deduction: A Basis for Applications, Kluwer, pp. 97--116, [Book Section]

Arts, Thomas and Giesl, J. (1997):
Proving innermost normalisation automatically.
Berlin, Heidelberg (u.a.), Springer, In: International Conference on Rewriting Techniques and Applications <8, 1997, Sitges, Spain>: Proceedings. - Berlin (u.a.): Springer, 1997. S. 157-171, 1232, [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (1997):
Automatically proving termination where simplification orderings fail.
Berlin, Heidelberg (u.a.), Springer, In: International Joint Conference on Theory and Practice of Software Development <7, 1997, Lille, France>: Proceedings. - Berlin (u.a.): Springer, 1997. S. 261-272, 1214, [Conference or Workshop Item]

Alexa, Marc (1997):
Der Morphing-Raum : Verallgemeinerung des Morphing-Prozesses und Entwicklung von Algorithmen zum Morphing zwischen mehreren Objekten beliebiger Dimensionalität.
TU Darmstadt, [Master Thesis]

Assmus, Kerstin (1997):
Realisierung von Teilen eines Systems fuer den Zugriff auf multimediale Datenbanken mittels wandernder Agenten im Intranet.
TU Darmstadt, [Master Thesis]

Arts, Thomas and Giesl, J. (1996):
Termination of constructor systems.
Berlin (u.a.), Springer, In: International Conference on Rewriting Techniques and Applications RTA'96 <7, 1996, New Brunswick, NJ>: Proceedings. - Berlin (u.a.): Springer, 1996. S. 63-77, 1103, [Conference or Workshop Item]

Ackermann, Hans-Josef (1996):
Hardware-Unterstützung für effiziente Dreiecksrasterisierung und Texture Mapping.
Aachen: Shaker, 1996. III, 162 S.,
Aachen, Shaker, TU Darmstadt, [Ph.D. Thesis]

Anzill, W. and Stryk, Oskar von and Stryk, Oskar von (1996):
Optimum design of microwave oscillators with minimized phase noise.
In: Progress in industrial mathematics at ECMI 94. Hrsg.: H. Neunzert. - Chichester (u.a.): Wiley , 1996. S. 301-306, Chichester (u.a.), Wiley, [Book Section]

Alexa, Marc and Gerfelder, Norbert and Grimm, P. and Seiler, Christian (1996):
AVWoD - Concept and Realization for Internet-Based Media Integration.
Institut National de Recherche en Informatique, Sophia-Antipolis, In: Real Time Multimedia and the World Wide Web. W3C Workshop, [Conference or Workshop Item]

Ackermann, Hans-Josef (1996):
Hardware-Unterstuetzung fuer effiziente Dreiecksrasterisierung und Texture Mapping.
Shaker, Aachen, Darmstadt, TH, Diss., 1996, In: Berichte aus der Informatik, ISBN 0940-0807 and 3-8265-1208-1,
[Ph.D. Thesis]

Adam, Winfried (1996):
Konzeption und Implementierung einer Kopplung zwischen Unternehmensmodellierung und EDM-Systemen.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1995):
Acoustic simulation for visualization and virtual reality.
In: Eurographics state-of-the-art <1995, Maastricht, NL>: Reports. Hrsg.: R. Veltkamp. S. 1-23, [Conference or Workshop Item]

Andelfinger, Urs (1995):
Diskursive Anforderungsanalyse und Validierung.
Darmstadt: 1995. V, 231 S.,
Darmstadt, Technische Univ. Darmstadt, TU Darmstadt, [Ph.D. Thesis]

Astheimer, Peter (1995):
Sonifikation numerischer Daten für Visualisierung und Virtuelle Realität.
Aachen: Shaker, 1995. 149 S.,
Aachen, Shaker, TU Darmstadt, [Ph.D. Thesis]

Astheimer, Peter and Dai, and Felger, and Göbel, and Haase, and Müller, and Ziegler, and Encarnacao, José L. (1995):
Virtual reality technology: enabling new dimensions in computer supported applications.
Maribor, Univ, In: International Conference on Design to Manufacture in Modern Industry: DMMI '95 <1995, Maribor, Slovenia>: Proceedings. Vol. I. S. 3-25, [Conference or Workshop Item]

Astheimer, Peter and Felger, (1995):
An interactive virtual world experience: the SBG cyberspace roadshow.
Berlin, Heidelberg (u.a.), Springer, In: Eurographics Workshop on Virtual Environments: Realism and Realtime <2, 1995, Monte Carlo>: Selected Papers. Hrsg.: M. Göbel, [Conference or Workshop Item]

Astheimer, Peter and Dai, and Felger, and Göbel, and Haase, and Müller, and Ziegler, (1995):
Virtual design II: an advanced VR system for industrial applications.
In: Virtual Reality World <1995, Stuttgart>: Proceedings. s. 337-363, [Conference or Workshop Item]

Astheimer, Peter and Göbel, (1995):
Virtual design II: an advanced VR development environment.
Berlin, Heidelberg (u.a.), Springer, In: Eurographics Workshop on Virtual Environments: Realism and Realtime <2, 1995, Monte Carlo>: Selected Papers. Hrsg.: M. Göbel, [Conference or Workshop Item]

Astheimer, Peter and Felger, (1995):
Mobile virtual reality installations: a review of the SBG cyberspace roadshow.
In: Topics 1995, H. 1, S. 6-9, [Article]

Astheimer, Peter and Göbel, (1995):
Virtual design II: IGD's VR development environment and applications.
In: Topics 1995, H. 4, S. 27-30, [Article]

Anzill, W. and Stryk, Oskar von and Bulirsch, R. and Russer, P. and Stryk, Oskar von (1995):
Phase noise minimization of microwave oscillators by optimal design.
Piscataway, NJ, IEEE, In: IEEE MTT-S Symposium < 39, 1995, Orlando, Florida>: Symposium digest. Hrsg.: L. Kiry. - Piscataway, NJ: IEEE, 1995. S. 1565-1568, [Conference or Workshop Item]

Auerbach, S. and Buchmann, Alejandro and Buchmann, I. and Kudrass, Thomas and Lange, K. and Lier, C. and Weidmann, K. (1995):
Database Support for PC Software Configuration and Version Management in the START Network.
In: Information and communication technologies in tourism : proceedings of the international conference, Wien, Springer, In: ENTER <1995, Innsbruck>, Innsbruck, Austria, 1995.01.18-20, [Conference or Workshop Item]

Ak, Sevguel (1995):
Entwurf und Implementierung eines Rendering-Moduls fuer ein graphisches interaktives Visualisierungssystem.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Felger, Wolfgang (1995):
An Interactive Virtual World Experience - The Cyberspace Roadshow.
Springer, Berlin, Heidelberg, New York, In: Virtual Environments '95, In: Springer Computer Science, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang (1995):
Mobile Virtual Reality Installations : A Review of the Cyberspace Roadshow.
In: Computer Graphik Topics, pp. 6-9, 7, (1), [Article]

Albold, Oliver (1995):
Realisierung einer objekt-orientierten Klassenbibliothek zur Darstellung und Verwaltung von dreidimensionalen Geo-Objeken und deren Beziehungen zueinander.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1995):
Sonifikation numerischer Daten fuer Visualisierung und Virtuelle Realitaet.
Shaker, Darmstadt, Darmstadt, TH, Diss., 1995, In: Berichte aus der Informatik, ISBN 0945-0807 and 3-8265-1021-6,
[Ph.D. Thesis]

Astheimer, Peter and Dai, Fan and Felger, Wolfgang and Göbel, Martin and Haase, Helmut and Müller, Stefan and Ziegler, Rolf (1995):
VirtualDesign II - an Advanced VR System for Industrial Applications.
In: Virtual Reality World '95. Conference Documentation, [Conference or Workshop Item]

Amendola, Sandro (1995):
Effiziente Algorithmen für Probleme in Gittern über {$mathbbR^d$}.
Universit&auml;t des Saarlandes, [Master Thesis]

Astheimer, Peter (1995):
Acoustic Simulation for Visualization and Virtual Reality.
In: Eurographics '95. State Of The Art Reports, [Conference or Workshop Item]

Astheimer, Peter (1995):
Virtual Design II - an advanced VR development environment.
Springer, Berlin, Heidelberg, New York, In: Virtual Environments '95, In: Springer Computer Science, [Conference or Workshop Item]

Astheimer, Peter and Dai, Fan and Felger, Wolfgang and Göbel, Martin and Haase, Helmut and Müller, Stefan and Ziegler, Rolf and Encarnação, José L. (1995):
Virtual Reality Technology - Enabling New Dimensions in Computer-Supported Applications.
In: dmmi '95. Proceedings Part 1, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Göbel, Martin and Müller, Stefan (1994):
Das Demonstrationszentrum für Virtuelle Realität am Fraunhofer-Institut für Graphische Datenverarbeitung, Darmstadt - Konzeption, Anwendungen, Zukunftsperspektiven.
[Other]

Astheimer, Peter and Pöche, Maria-Luise (1994):
Level-of-Detail Generation and its Application in Virtual Reality.
World Scientific, Singapore, In: Virtual Reality Software & Technology, [Conference or Workshop Item]

Astheimer, Peter and Dai, Fan and Göbel, Martin and Müller, Stefan and Kruse, Rolf and Zachmann, Gabriel (1994):
Realism in Virtual Reality.
Wiley, New York, pp. 189-208, [Book Section]

Augusto, E.J.M. and Dionisio, Jose M.S. and Domingos, J.J.D. and Gomes, Mario Rui (1994):
The Sun and its Impact on Thermal Analysis in Buildings: Physical Simulation and Visualization (1994).
In: Graphics and Modelling in Science & Technology. Proceedings, [Conference or Workshop Item]

Astheimer, Peter and Göbel, Martin and Böhm, Klaus and Felger, Wolfgang and Müller, Stefan (1994):
Die Virtuelle Umgebung - Eine neue Epoche in der Mensch-Maschine-Kommunikation. Teil I: Einordnung, Begriffe, Geraete.
In: Informatik Spektrum, pp. 281-290, 17, (5), [Article]

Astheimer, Peter and Göbel, Martin and Böhm, Klaus and Felger, Wolfgang and Müller, Stefan (1994):
Die Virtuelle Umgebung - Eine neue Epoche in der Mensch-Maschine-Kommunikation. Teil II: Kommunikations- und Praesentationstechniken, Systeme, Anwendungen.
In: Informatik Spektrum, pp. 357-367, 17, (6), [Article]

Arens, Georg (1994):
Konzeption und Realisierung einer Transaktionsverwaltung fr ein aktives objektorientiertes datenbanksystem.
Technische Hochschule Darmstadt, [Master Thesis]

Abel, Christine (1994):
Ein Algorithmus zur Berechnung der Klassenzahl und des Regulators reellquadratischer Ordnungen.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Andelfinger, Urs (1993):
Validierung von Systementwicklungen : Forschungsgruppe MuSE, Forschungsbericht.
Darmstadt, Fachbereich Informatik, 93-2, [Book]

Astheimer, Peter (1993):
Acoustic Sensations in Virtual Worlds.
In: Computer Graphik Topics, pp. 10-11, 5, (1), [Article]

Astheimer, Peter (1993):
Acoustic Virtual Reality - Imitation of Real Worlds.
[Other]

Astheimer, Peter and Dai, Fan (1993):
Dynamic Objects in Virtual Worlds - Integrating Simulations in a Virtual Reality Toolkit -.
In: European Simulation Symposium 1993. Proceedings, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Thomas and Göbel, Martin and Müller, Stefan and Encarnação, José L. (1993):
Graphics and Visualization: The Essential Features for the Classification of Systems.
Jaico; North-Holland, Bombay, In: Graphics, Design and Visualisation. Proceedings, In: IFIP Transactions B: Applications in Technology; B-9, [Conference or Workshop Item]

Astheimer, Peter and Göbel, Martin (1993):
Integration akustischer Effekte und Simulationen in VR-Entwicklungsumgebungen.
Springer, Berlin; Heidelberg; New York, In: Virtual Reality '93. Anwendungen und Trends, In: Forschung und Praxis. IPA/IAO FhG; T 35, [Conference or Workshop Item]

Astheimer, Peter (1993):
Realtime Sonification to enhance the Human-Computer-Interaction in Virtual Worlds.
In: Visualization in Scientific Computing '93. Proceedings, [Conference or Workshop Item]

Astheimer, Peter (1993):
Sounds of Silence - How to animate Virtual Worlds with Sound.
[Other]

Astheimer, Peter and Felger, Wolfgang and Müller, Stefan (1993):
Virtual Design - A Generic Virtual Reality System.
Eurographics, Catalonia, In: First Eurographics Workshop on Virtual Reality. Proceedings, In: Eurographics Technical Report Series; EG VR 93, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Müller, Stefan (1993):
Virtual Design - A Generic VR System for Industrial Applications.
In: Computers & Graphics, pp. 671-678, 17, (6), [Article]

Astheimer, Peter and Felger, Wolfgang (1993):
Virtuelle Realität in der Architektur.
In: Bau-Informatik, pp. 54-58, 4, (2), [Article]

Astheimer, Peter (1993):
What You See is What You Hear - Acoustics Applied in Virtual Worlds.
IEEE Computer Society Press, California, In: Research Frontiers in Virtual Reality 1993. Proceedings, [Conference or Workshop Item]

Arndt, Susanne and Frühauf, Thomas and Karlsson, Kennet and Schröder, Florian (1992):
Integration of Compute Servers in an Environment for Distributed Simulation and Visualization.
In: ECUC '92. Proceedings, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Martin and Göbel, Martin and Karlsson, Kennet and Encarnação, José L. (1992):
Interactive Modeling in High-performance Scientific Visualization - the VIS-A-VIS Project.
In: Computers in Industry, pp. 213-225, Volume 19, (2), [Article]

Ala-Rantala, Martti (1992):
NeuroGlove: An Interactive Test Environment for Hand Posture and Gesture Recognition Using Dataglove and Neural Networks.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1992):
Sonification in Scientific Visualization and Virtual Reality Applications.
In: Visualisierung - Rolle von Interaktivität und Echtzeit. Preprints, [Conference or Workshop Item]

Astheimer, Peter (1992):
Sonification Tools to supplement Dataflow Visualization.
In: Visualization in Scientific Computing '92. Proceedings, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Göbel, Martin (1992):
Virtual Reality - An Application Development Platform.
In: Computer Graphik Topics, pp. 16-17, 4, (2), [Article]

Astheimer, Peter (1992):
The VIS-A-VIS Audification Toolkit.
In: Computer Graphik Topics, pp. 16-17, (1), [Article]

Astheimer, Peter and Felger, Wolfgang (1991):
Application of Animation and Audio in Visualization Systems.
In: Second Eurographics Workshop on Visualization in Scientific Computing. Proceedings, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Martin and Göbel, Martin and Karlsson, Kennet and Encarnação, José L. (1991):
Graphics Modeling as a Basic Tool for Scientific Visualization.
Springer, Berlin, Heidelberg, In: Modeling in Computer Graphics, In: IFIP Series on Computer Graphics, [Conference or Workshop Item]

Abel, Volker (1991):
Untersuchung des Einsatzes neuronaler Netze und klassischer Klassifikationsverfahren bei der Zeichenerkennung.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Felger, Wolfgang (1991):
Visualisierung von Volumenfunktionen.
Springer, Berlin; Heidelberg; New York, pp. 31-38, [Book Section]

Astheimer, Peter and Felger, Wolfgang (1991):
Working with apE.
In: Computer Graphik Topics, p. 22, 3, (3), [Article]

Ahlmann, Dirk (1990):
Einsatz von Modellen des menschlichen visuellen Systems in der Werbung.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1990):
Graphik in Prozeßleitsystemen.
In: Produktion, pp. 12-13, (9), [Article]

Anheuser, Frederik (1989):
Ein Aufgabenmodell für eine adaptive Benutzerschnittstelle.
TU Darmstadt, [Master Thesis]

An, Gan Hoa (1989):
Definition und Repräsentation von Aktionen in Roboterarbeitszellen und deren graphisch-interaktive Verifizierung und Modifizierung.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Martin and Göbel, Martin (1988):
Intelligent User Interfaces Control System.
In: Proceedings of the Second IFIP Workshop on Intelligent CAD, [Conference or Workshop Item]

Arnold, Richard (1988):
Untersuchung objekt-orientierter Graphikkonzepte auf der Grundlage von Smalltalk-80.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Frühauf, Martin and Göbel, Martin and Karlsson, Kennet (1988):
Visualisierung und Steuerung technischer Prozesse mit einer graphisch-interaktiven Benutzungsoberfläche.
Springer, Berlin; Heidelberg; New York, In: GI - 18.Jahrestagung II - Vernetzte und Komplexe Informatik-Systeme, In: Informatik-Fachberichte; 188, [Conference or Workshop Item]

Ackermann, Hans-Josef (1987):
Entwicklung und Aufbau eines Transputer-Systems zur Darstellung von Bildsegmenten auf Fernseh- und Graphikmonitoren.
TU Darmstadt, [Master Thesis]

Altenkirch, Erich (1987):
Spezifikation und Implementierung der Archivierung von hierarchischen Darstellungs-Datenstrukturen für PHI-GKS.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1986):
Realisierung eines allgemeinen Moduls zur Verdeckungsberechnung der graphischen Ausgabeprimitive in GKS.
TU Darmstadt, [Master Thesis]

B

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Bock, Carsten and Brasser, Ferdinand and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, In: ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Böck, Leon and Vasilomanolakis, Emmanouil and Wolf, Jan Helge and Mühlhäuser, Max (2019):
Autonomously detecting sensors in fully distributed botnets.
In: Computers & Security, Elsevier, pp. 1-13, 83, ISSN 0167-4048,
DOI: 10.1016/j.cose.2019.01.004,
[Online-Edition: https://www.sciencedirect.com/science/article/pii/S016740481...],
[Article]

Burger, Michael and Bischof, Christian and Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: Proceeding of the INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2019, Springer, [Conference or Workshop Item]

Barhom, Shany and Shwartz, Vered and Eirew, Alon and Bugert, Michael and Reimers, Nils and Dagan, Ido (2019):
Revisiting Joint Modeling of Cross-document Entity and Event Coreference Resolution.
In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics (ACL 2019), In: The 57th Annual Meeting of the Association for Computational Linguistics (ACL 2019), Florence, Italy, 28.07.2019--02.08.2019, [Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[Ph.D. Thesis]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, Springer, pp. 276-280, 43, (5), ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Brandherm, Florian and Wang, Lin and Mühlhäuser, Max (2019):
A Learning-based Framework for Optimizing Service Migration in Mobile Edge Clouds.
In: Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, ACM, In: EdgeSys, Dresden, 25.03.2019, DOI: 10.1145/3301418.3313939,
[Online-Edition: https://doi.org/10.1145/3301418.3313939],
[Conference or Workshop Item]

Brasser, Ferdinand and Gens, David and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Brandherm, Florian and Peters, Jan and Neumann, Gerhard and Akrour, Riad (2019):
Learning Replanning Policies with Direct Policy Search.
In: IEEE Robotics and Automation Letters, IEEE, pp. 2196- 2203, 4, (2), DOI: 10.1109/LRA.2019.2901656,
[Online-Edition: https://doi.org/10.1109/LRA.2019.2901656],
[Article]

Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, [Conference or Workshop Item]

Botschen, Teresa (2019):
Uni- and Multimodal and Structured Representations for Modeling Frame Semantics.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8484],
[Ph.D. Thesis]

Biemueller, Felix (2019):
Trajektorienoptimierung für lasttragende Laufroboter.
Darmstadt, Technische Universitaet Darmstadt, Department of Computer Science (SIM), [Master Thesis]

Becker, Katrin (2019):
Compliant Balance Control for a Biped Humanoid Robot.
Darmstadt, TU Darmstadt, Department of Computer Science (SIM), [Bachelor Thesis]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[Ph.D. Thesis]

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Buechler, Dieter and Calandra, Roberto and Schoelkopf, Bernhard and Peters, Jan (2018):
Control of Musculoskeletal Systems using Learned Dynamics Models.
In: IEEE Robotics and Automation Letters, pp. 3161-3168, 3, (4), ISSN 2377-3766, 2377-3774 (elektronisch),
DOI: 10.1109/LRA.2018.284960,
[Article]

Burger, Michael and Bischof, Christian and Calotoiu, Alexandru and Wunderer, Thomas and Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Conference or Workshop Item]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, DOI: 10.1145/3243734.3243786,
[Conference or Workshop Item]

Böck, Leon and Vasilomanolakis, Emmanouil and Mühlhäuser, Max and Karuppayah, Shankar (2018):
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
In: Research in Attacks, Intrusions, and Defenses, Springer International Publishing, In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece, In: Lecture Notes in Computer Science, 11050, DOI: 10.1007/978-3-030-00470-5_24,
[Online-Edition: https://www.raid2018.org/],
[Conference or Workshop Item]

Bračevac, Oliver and Amin, Nada and Salvaneschi, Guido and Erdweg, Sebastian and Eugster, Patrick and Mezini, Mira (2018):
Versatile Event Correlation with Algebraic Effects.
In: Proceedings of the ACM on Programming Languages, ACM, pp. 67:1-67:31, DOI: 10.1145/3236762,
[Online-Edition: https://doi.org/10.1145/3236762],
[Book Section]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]

Botschen, Teresa and Sorokin, Daniil and Gurevych, Iryna (2018):
Frame- and Entity-Based Knowledge for Common-Sense Argumentative Reasoning.
In: Proceedings of the 5th Workshop on Argument Mining held in conjunction with EMNLP 2018, Brussels, Belgium, 31.10.2018, Short Papers, [Online-Edition: http://aclweb.org/anthology/W18-5211],
[Conference or Workshop Item]

Boullosa, Beto and Eckart de Castilho, Richard and Kumar, Naveen and Klie, Jan-Christoph and Gurevych, Iryna (2018):
Integrating Knowledge-Supported Search into the INCEpTION Annotation Platform.
In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, In: The 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, 31.10.2018--04.11.2018, Demo Papers, [Online-Edition: http://www.aclweb.org/anthology/D18-2022],
[Conference or Workshop Item]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelor Thesis]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Göpfert, Florian and Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Botschen, Teresa and Beinborn, Lisa and Gurevych, Iryna (2018):
Multimodal Grounding for Language Processing.
In: Proceedings of the 27th International Conference on Computational Linguistics (COLING 2018), In: The 27th International Conference on Computational Linguistics (COLING 2018), Santa Fe, USA, 20.08.2018--26.08.2018, [Online-Edition: http://www.aclweb.org/anthology/C18-1197],
[Conference or Workshop Item]

Birkholz, Henk and Krauß, Christoph and Zhdanova, Maria and Kuzhiyelil, Don and Arul, Tolga and Heinrich, Markus and Katzenbeisser, Stefan and Suri, Neeraj and Vateva-Gurova, Tsvetoslava and Schlehuber, Christian (2018):
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Zenodo, In: International Workshop on MILS: Architecture and Assurance for Secure Systems, Luxembourg, 25.06.2018, DOI: 10.5281/zenodo.1314095,
[Online-Edition: http://dx.doi.org/10.5281/zenodo.1314095],
[Conference or Workshop Item]

Botschen, Teresa and Gurevych, Iryna and Klie, Jan-Christoph and Sergieh, Hatem Mousselly and Roth, Stefan (2018):
Multimodal Frame Identification with Multilingual Evaluation.
In: Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Association for Computational Linguistics, New Orleans, USA, [Online-Edition: http://www.aclweb.org/anthology/N18-1134],
[Conference or Workshop Item]

Brandherm, Florian (2018):
Learning Replanning Policies with Direct Policy Search.
TU Darmstadt, [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...],
[Master Thesis]

Bračevac, Oliver and Gay, Richard and Grewe, Sylvia and Mantel, Heiko and Sudbrock, Henning and Tasch, Markus (2018):
An Isabelle/HOL Formalization of the Modular Assembly Kit for Security Properties.
In: Archive of Formal Proofs, 2018, [Article]

Biondo, Andrea and Conti, Mauro and Davi, Lucas and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium, [Conference or Workshop Item]

Bielsa, Guillermo and Palacios, Joan and Loch, Adrian and Steinmetzer, Daniel and Cesari, Paolo and Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Master Thesis]

Bubel, Richard (2018):
Deduktive Verifikation : Von der Theorie in die Praxis.
Darmstadt, [Habilitation]

Binnig, Carsten and Buratti, Benedetto and Chung, Yeounoh and Cousins, Cyrus and Ebert, Dylan and Kraska, Tim and Shang, Zeyuan and Tromba, Isabella and Upfal, Eli and Wang, Linnan (2018):
Towards Interactive Curation & Automatic Tuning of ML Pipelines.
In: 1st Inaugural Conference on Systems ML (SysML), [Conference or Workshop Item]

Binnig, Carsten and Kersting, Kristian and Molina, Alejandro and Zgraggen, Emanuel (2018):
DeepVizdom: Deep Interactive Data Exploration.
[Article]

Belousov, B. and Peters, J. (2018):
Mean squared advantage minimization as a consequence of entropic policy improvement regularization.
In: The 14th European Workshop on Reinforcement Learning (EWRL 2018), Lille, France, October 1-3, 2018, [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Bori...],
[Conference or Workshop Item]

Beck, Tilman and Böschen, Falk and Scherp, Ansgar (2018):
What to Read Next? Challenges and Preliminary Results in Selecting Representative Documents.
In: Database and Expert Systems Applications - DEXA 2018 International Workshops, BDMICS, BIOKDD, and TIR, Regensburg, Germany, September 3-6, 2018, Proceedings, DOI: 10.1007/978-3-319-99133-7_19,
[Online-Edition: https://doi.org/10.1007/978-3-319-99133-7\_19],
[Conference or Workshop Item]

Böschen, Falk and Beck, Tilman and Scherp, Ansgar (2018):
Survey and empirical comparison of different approaches for text extraction from scholarly figures.
In: Multimedia Tools and Applications, pp. 29475-29505, 77, (22), ISSN Online 1573-7721; Print 1380-7501,
DOI: 10.1007/s11042-018-6162-7,
[Online-Edition: https://doi.org/10.1007/s11042-018-6162-7],
[Article]

Bürdek, Johannes (2018):
Rekonfigurierbare Software-Systeme: Spezifikation und Testfallgenerierung.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8161],
[Ph.D. Thesis]

Bindel, Nina (2018):
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8100],
[Ph.D. Thesis]

Brasser, Ferdinand and Davi, Lucas and Dhavlle, Abhijitt and Frassetto, Tommaso and Dinakarrao, Sai Manoj Pudukotai and Rafatirad, Setareh and Sadeghi, Ahmad-Reza and Sasan, Avesta and Sayadi, Hossein and Zeitouni, Shaza and Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Piscataway, NJ, USA, IEEE Press, In: Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, In: CASES '18, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283552.3283567],
[Conference or Workshop Item]

Balreira, Dennis G. and Walter, Marcelo and Fellner, Dieter W. (2018):
A survey of the contents in introductory Computer Graphics courses.
In: Computers & Graphics, pp. 88-96, 77, ISSN 00978493,
DOI: 10.1016/j.cag.2018.10.001,
[Online-Edition: https://doi.org/10.1016/j.cag.2018.10.001],
[Article]

Buchmann, Johannes and Holzer, Patrick and Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Springer, [Conference or Workshop Item]

Beller, Moritz and Gousios, Georgius and Panichella, Annibale and Proksch, Sebastian and Amann, Sven and Zaidman, Andy (2017):
Developer Testing in the IDE: Patterns, Beliefs, and Behavior.
In: IEEE Transactions on Software Engineering, DOI: 10.1109/TSE.2017.2776152,
[Article]

Bavishi, Rohan and Pradel, Michael and Sen, Koushik (2017):
Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts.
[Report]

Berens, Yannick (2017):
Scalability Validation of Parallel Sorting Algorithms.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6825],
[Bachelor Thesis]

Butin, Denis and Wälde, Julian and Buchmann, Johannes (2017):
Post-Quantum Authentication in OpenSSL with Hash-Based Signatures.
In: ICMU - The Tenth International Conference on Mobile Computing and Ubiquitous Networking, Toyama International Conference Center, Toyama, Japan, October 3-5, 2017, [Online-Edition: http://www.icmu.org/icmu2017/],
[Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security, Springer, [Conference or Workshop Item]

Bindel, Nina and Krämer, Juliane and Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion, Springer, [Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
TU Darmstadt, [Master Thesis]

Baumgärtner, Lars and Kohlbrecher, Stefan and Euler, Juliane and Ritter, Tobias and Stute, Milan and Meurisch, Christian and Mühlhäuser, Max and Hollick, Matthias and Stryk, Oskar von and Freisleben, Bernd (2017):
Emergency Communication in Challenged Environments via Unmanned Ground and Aerial Vehicles.
In: IEEE Global Humanitarian Technology Conference (GHTC), IEEE, [Conference or Workshop Item]

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Müller, Urs and Sadeghi, Ahmad-Reza (2017):
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
[Report]

Botschen, Teresa and Mousselly-Sergieh, Hatem and Gurevych, Iryna (2017):
Experimental study of multimodal representations for Frame Identification - How to find the right multimodal representations for this task?
In: Language-Learning-Logic Workshop (3L 2017), London, UK, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc
Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, pp. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Buchmann, Johannes and Lauter, Kristin and Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, pp. 12-13, 15, [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, pp. 37-43, 15, (4), DOI: 10.1109/MSP.2017.3151334,
[Article]

Bauereiß, Thomas and Greiner, Simon and Herda, Mihai and Kirsten, Michael and Li, Ximeng and Mantel, Heiko and Mohr, Martin and Perner, Matthias and Schneider, David and Tasch, Markus (2017):
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.
[Report]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian
Katz, Jonathan and Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Botschen, Teresa and Mousselly-Sergieh, Hatem and Gurevych, Iryna (2017):
Prediction of Frame-to-Frame Relations in the FrameNet Hierarchy with Frame Embeddings.
In: Proceedings of th 2nd Workshop on Representation Learning for NLP (RepL4NLP, held in conjunction with ACL 2017), Vancouver, Canada, [Online-Edition: http://www.aclweb.org/anthology/W17-2618],
[Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: 26th USENIX Security Symposium, In: USENIX Security '17, [Conference or Workshop Item]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies, In: WOOT, [Conference or Workshop Item]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
TU Darmstadt, [Master Thesis]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, 2017, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Burger, Michael and Nguyen, Giang Nam and Bischof, Christian (2017):
Extending Perfect Spatial Hashing to Index Tuple-based Graphs Representing Super Carbon Nanotubes.
In: Proceedings of the International Conference on Computational Science, In: ICCS 2017, Zürich, 12.06.2017, [Online-Edition: http://www.iccs-meeting.org/iccs2017/],
[Conference or Workshop Item]

Boukoros, Spyros and Karvelas, Nikolaos and Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference, IEEE, Valencia Spain, [Conference or Workshop Item]

Bindel, Nina and Herath, Udyani and McKague, Matthew and Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Brandl, Sascha (2017):
Online Traversability Analysis of unknown Obstacles for mobile autonomous Robots.
Darmstadt, Technische Universitaet Darmstadt, Department of Computer Science (SIM), [Master Thesis]

Burger, Michael (2017):
Memory-Efficient and Parallel Simulation of Super Carbon Nanotubes.
Darmstadt, tuprints, Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6229/],
[Ph.D. Thesis]

Buchmann, Johannes and Braun, Johannes and Demirel, Denise and Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2, (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, [Conference or Workshop Item]

Biemann, Chris and Bontcheva, Kalina and Eckart de Castilho, Richard and Gurevych, Iryna and Yimam, Seid Muhie
Ide, Nancy and Pustejovsky, James (eds.) (2017):
Collaborative Web-based Tools for Multi-layer Text Annotation.
In: The Handbook of Linguistic Annotation, Springer Netherlands, pp. 229-256, DOI: 10.1007/978-94-024-0881-2,
[Online-Edition: http://www.springer.com/de/book/9789402408799],
[Book Section]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIACCS 2017 - ACM Asia Conference on Computer and Communications Security, Springer, Abu Dhabi, UAE, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas and Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, Springer, Rabat, Morocco, In: LNCS, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Bugert, Michael and Puzikov, Yevgeniy and Rücklé, Andreas and Eckle-Kohler, Judith and Martin, Teresa and Martínez Cámara, Eugenio and Sorokin, Daniil and Peyrard, Maxime and Gurevych, Iryna (2017):
LSDSem 2017: Exploring Data Generation Methods for the Story Cloze Test.
In: Proceedings of the 2nd Workshop on Linking Models of Lexical, Sentential and Discourse-level Semantics, Association for Computational Linguistics, In: The 2nd Workshop on Linking Models of Lexical, Sentential and Discourse-level Semantics, Valencia, Spain, 03.04.2017--04.04.2017, ISBN 978-1-945626-40-1,
[Online-Edition: http://aclweb.org/anthology/W17-0908],
[Conference or Workshop Item]

Boullosa, Beto and Eckart de Castilho, Richard and Geyken, Alexander and Lemnitzer, Lothar and Gurevych, Iryna (2017):
A tool for extracting sense-disambiguated example sentences through user feedback.
In: Proceedings of the Software Demonstrations of the 15th Conference of the European Chapter of the Association for Computational Linguistics, Association for Computational Linguistics, Valencia, Spain, [Online-Edition: http://aclweb.org/anthology/E17-3018],
[Conference or Workshop Item]

Breuils, Stéphane and Nozick, Vincent and Fuchs, Laurent and Hildenbrand, Dietmar and Benger, Werner and Steinmetz, Christian (2017):
A Hybrid Approach for Computing Products of High-dimensional Geometric Algebras.
New York, NY, USA, ACM, In: Proceedings of the Computer Graphics International Conference, Yokohama, Japan, June 27 - 30, 2017, In: CGI '17, ISBN 978-1-4503-5228-4,
DOI: 10.1145/3095140.3097284,
[Online-Edition: http://doi.acm.org/10.1145/3095140.3097284],
[Conference or Workshop Item]

Bleikertz, Sören (2017):
Automated Security Analysis of Virtualized Infrastructures.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6610],
[Ph.D. Thesis]

Blöcher, Marcel and Viering, Malte and Schmid, Stefan and Eugster, Patrick (2017):
The Grand CRU Challenge.
In: Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems, [Conference or Workshop Item]

Borges, Fábio and Lara, Pedro and Portugal, Renato (2017):
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, pp. 406--416, 292, DOI: 10.1016/j.amc.2016.07.036,
[Article]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Binnig, Carsten and De Stefani, Lorenzo and Kraska, Tim and Upfal, Eli and Zgraggen, Emanuel and Zhao, Zheguang (2017):
Toward Sustainable Insights, or Why Polygamy is Bad for You.
In: CIDR, [Conference or Workshop Item]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt and Paglialonga, Clara and Standaert, Francois-Xavier (2017):
Consolidating Inner Product Masking.
In: IACR Cryptology ePrint Archive, p. 1047, 2017, [Online-Edition: http://eprint.iacr.org/2017/1047],
[Article]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt and Paglialonga, Clara and Standaert, Francois-Xavier (2017):
Consolidating Inner Product Masking.
In: Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, DOI: 10.1007/978-3-319-70694-8₂₅,
[Online-Edition: https://doi.org/10.1007/978-3-319-70694-8_25],
[Conference or Workshop Item]

Barthe, Gilles and Dupressoir, Francois and Faust, Sebastian and Gregoire, Benjamin and Standaert, Francois-Xavier and Strub, Pierre-Yves (2017):
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I, DOI: 10.1007/978-3-319-56620-7₁₉,
[Online-Edition: https://doi.org/10.1007/978-3-319-56620-7_19],
[Conference or Workshop Item]

Brody, Joshua and Dziembowski, Stefan and Faust, Sebastian and Pietrzak, Krzysztof (2017):
Position-Based Cryptography and Multiparty Communication Complexity.
In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, DOI: 10.1007/978-3-319-70500-2₃,
[Online-Edition: https://doi.org/10.1007/978-3-319-70500-2_3],
[Conference or Workshop Item]

Belousov, B. and Peters, J. (2017):
f-Divergence constrained policy improvement.
In: Journal of Machine Learning Research X, [Online-Edition: https://arxiv.org/pdf/1801.00056.pdf],
[Article]

Belousov, B. and Neumann, G. and Rothkopf, C. A. and Peters, J. (2017):
Catching heuristics are optimal control policies.
In: Proceedings of the Karniel Thirteenth Computational Motor Control Workshop, [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Busch, Baptiste and Maeda, Guilherme and Mollard, Yoan and Demangeat, Marie and Lopes, Manuel (2017):
Postural Optimization for an Ergonomic Human-Robot Interaction.
IEEE, In: 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Vancouver, BC, Canada, 24-28 Sept. 2017, DOI: 10.1109/IROS.2017.8206107,
[Conference or Workshop Item]

Büscher, Niklas and Franz, Martin and Holzer, Andreas and Veith, Helmut and Katzenbeisser, Stefan (2017):
On compiling Boolean circuits optimized for secure multi-party computation.
In: Formal Methods in System Design, pp. 308-331, 51, (2), DOI: 10.1007/s10703-017-0300-0,
[Online-Edition: https://doi.org/10.1007/s10703-017-0300-0],
[Article]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference or Workshop Item]

Benikova, Darina and Mieskes, Margot and Meyer, Christian M. and Gurevych, Iryna (2016):
Bridging the gap between extractive and abstractive summaries: Creation and evaluation of coherent extracts from heterogeneous sources.
In: Proceedings of the 26th International Conference on Computational Linguistics (COLING), Osaka, Japan, ISBN 978-4-87974-702-0,
[Online-Edition: http://aclweb.org/anthology/C16-1099],
[Conference or Workshop Item]

Brendel, Jacqueline and Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Brendel, J. and Demirel, D. (2016):
Efficient proactive secret sharing.
In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), DOI: 10.1109/PST.2016.7907013,
[Conference or Workshop Item]

Bartschat, Andreas and Toso, Lorenzo and Stegmaier, Johannes and Kuijper, Arjan and Mikut, Ralf and Köhler, Bernd and Allgeier, Stephan (2016):
Automatic Corneal Tissue Classification Using Bag-Of-Visual-Words Approaches.
KIT Scientific Publishing, Karlsruhe, In: Forum Bildverarbeitung 2016, Karlsruhe, 01.-02. Dezember 2016, [Conference or Workshop Item]

Blom, David and Ertl, Thomas and Fernandes, Oliver and Frey, Steffen and Klimach, Harald and Krupp, Verena and Mehl, Miriam and Roller, Sabine and Sternel, Dörte Carla and Uekermann, Benjamin and Winter, Tilo and van Zuijlen, Alexander
Bungartz, Hans-Joachim and Neumann, Philipp and Nagel, Wolfgang E. (eds.) (2016):
Partitioned Fluid-Structure-Acoustics Interaction on Distributed Data: Numerical Results and Visualization.
In: Software for Exascale Computing -- SPPEXA 2013-2015, Springer, September 2016, In: Lecture Notes in Computational Science and Engineering, 113, [Conference or Workshop Item]

Buescher, Niklas and Kretzmer, David and Jindal, Arnav and Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security, IEEE, [Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Online-Edition: https://arxiv.org/abs/1611.08396],
[Article]

Ben Hmida, Helmi and Braun, Andreas (2016):
Scaling up IoT: Impact of Semantic Open Platforms.
VDE-Verlag, In: VDE-Kongress 2016 - Internet der Dinge, Mannheim, 7. und 8. November 2016, [Conference or Workshop Item]

Benz, Manuel (2016):
Interprocedural Graph-based Object Usage Model Generation for Detecting Anomalous Usage of Cryptographic APIs.
Technische Universität Darmstadt, [Master Thesis]

Ballweg, Kathrin and Zouhar, Florian and Wilhelmi-Dworski, Patrick and Landesberger, Tatiana von and Fahrer, Uli and Panchenko, Alexander and Yimam, Seid Muhie and Biemann, Chris and Regneri, Michaela and Ulrich, Heiner (2016):
new/s/leak – A Tool for Visual Exploration of Large Text Document Collections in the Journalistic Doman.
In: IEEE VIS'16, [Article]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelor Thesis]

Beinborn, Lisa Marina (2016):
Predicting and Manipulating the Difficulty of Text-Completion Exercises for Language Learning.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5647],
[Ph.D. Thesis]

Berninger, Kim and Hoppe, Jannis and Milde, Benjamin (2016):
Classification of Speaker Intoxication Using a Bidirectional Recurrent Neural Network.
In: International Conference on Text, Speech, and Dialogue, In: Lecture Notes in Computer Science (LNCS), 9924, DOI: 10.1007/978-3-319-45510-5_50,
[Conference or Workshop Item]

Buescher, Niklas and Holzer, Andreas and Weber, Alina and Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Bossert, Andreas and Cooper, Steven and Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Butin, Denis and Demirel, Denise and Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016, sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
[Other]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Wackerfuß, Jens (2016):
Compressed Symmetric Graphs for the Simulation of Super Carbon Nanotubes.
In: Proceedings of the 2016 International Conference on High Performance Computing & Simulation, Innsbruch, Austria, Innsbruch, Austria, 2016, [Online-Edition: http://hpcs2016.cisedu.info/],
[Conference or Workshop Item]

Böhme, David and Geimer, Markus and Arnold, Lukas and Voigtländer, Felix and Wolf, Felix (2016):
Identifying the root causes of wait states in large-scale parallel applications.
In: ACM Transactions on Parallel Computing, pp. Article No. 11, 24 pages, 3, (2), ISSN 2329-4949,
DOI: 10.1145/2934661,
[Article]

Braun, Andreas and Majewski, Martin and Wichert, Reiner and Kuijper, Arjan (2016):
Investigating Low-Cost Wireless Occupancy Sensors for Beds.
In: Distributed, Ambient, and Pervasive Interactions, Springer International Publishing, Switzerland, In: 4th International Conference, DAPI 2016, Toronto, ON, Canada, July 17-22, 2016, In: Lecture Notes in Computer Science (LNCS); 9749, DOI: 10.1007/978-3-319-39862-4₃,
[Conference or Workshop Item]

Braun, Andreas and Alekseew, Michael and Kuijper, Arjan (2016):
Exploring Machine Learning Object Classification for Interactive Proximity Surfaces.
In: Distributed, Ambient, and Pervasive Interactions, Springer International Publishing, Switzerland, In: 4th International Conference, DAPI 2016, Toronto, ON, Canada, July 17-22, 2016, In: Lecture Notes in Computer Science (LNCS); 9749, DOI: 10.1007/978-3-319-39862-4₁₅,
[Conference or Workshop Item]

Borgwart, Andreas and Shulman, Haya and Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Bernard, Jürgen and Dobermann, Eduard and Bögl, Markus and Röhlig, Martin and Vögele, Anna and Kohlhammer, Jörn (2016):
Visual-Interactive Segmentation of Multivariate Time Series.
Eurographics Association, Goslar, In: EuroVA 2016, 7th international EuroVis workshop on Visual Analytics, Groningen, The Netherlands, June 6-7, 2016, DOI: 10.2312/eurova.20161121,
[Conference or Workshop Item]

Bernard, Jürgen and Sessler, David and Steiger, Martin and Spott, Martin and Kohlhammer, Jörn (2016):
Visual-Interactive Exploration of Relations Between Time-Oriented Data and Multivariate Data.
In: EuroVA 2016, 7th international EuroVis workshop on Visual Analytics, Groningen, The Netherlands, June 6-7, 2016., DOI: 10.2312/eurova.20161124,
[Conference or Workshop Item]

Braun, Andreas and Zander-Walz, Sebastian and Krepp, Stefan and Rus, Silvia and Wichert, Reiner and Kuijper, Arjan (2016):
CapTap - Combining Capacitive Gesture Recognition and Acoustic Touch Detection.
ACM Press, New York, In: iWOAR 2016, Rostock, Germany, 23. - 24. June 2016, In: ACM International Conference Proceedings Series; 1183, DOI: 10.1145/2948963.2948969,
[Conference or Workshop Item]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Buchmann, Johannes and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Conference or Workshop Item]

Benikova, Darina and Biemann, Chris (2016):
SemRelData – Multilingual Contextual Annotation of Semantic Relations between Nominals: Dataset and Guidelines.
In: Proceedings Tenth International Conference on Language Resources and Evaluation (LREC 2016), ELRA, [Conference or Workshop Item]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, Springer Fachmedien Wiesbaden, pp. 300-304, 40, (5), DOI: 10.1007/s11623-016-0600-3,
[Article]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Book]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Springer Paris, pp. 309–322, 71, (7), DOI: 10.1007/s12243-016-0510-2,
[Article]

Buchmann, Johannes and Göpfert, Florian and Player, Rachel and Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Braun, Andreas and Rus, Silvia and Majewski, Martin (2016):
Unsichtbare Erkennung menschlicher Aktivitäten in Smart Living Umgebungen mit Kapazitiven Sensoren.
VDE-Verlag, In: Zukunft Lebensräume 2016, Frankfurt a.M., 20. und 21. April 2016, [Conference or Workshop Item]

Bračevac, Oliver and Erdweg, Sebastian and Salvaneschi, Guido and Mezini, Mira (2016):
CPL: A Core Language for Cloud Computing.
In: Proceedings of the 15th International Conference on Modularity, New York, NY, USA, ACM, pp. 94-105, [Online-Edition: http://doi.acm.org/10.1145/2889443.2889452],
[Book Section]

Bernhard, David and Fischlin, Marc and Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: Public-Key Cryptography - PKC 2016, Springer, Taipei, Taiwan, In: LNCS, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Berndt, René and Silva, Nelson and Caldera, Christian and Krispel, Ulrich and Eggeling, Eva and Sunk, Alexander and Edtmayr, Thomas and Sihn, Wilfried and Fellner, Dieter W. (2016):
VASCO - Mastering the Shoals of Value Stream Mapping.
In: CONTENT 2016, The Eighth International Conference on Creative Content Technologies, Rome, Italy, March 20-24, 2016, [Conference or Workshop Item]

Budurushi, Jurlind (2016):
Usable Security Evaluation of EasyVote in the Context of Complex Elections.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5418],
[Ph.D. Thesis]

Bračevac, Oliver and Erdweg, Sebastian and Salvaneschi, Guido and Mezini, Mira (2016):
CPL: A Core Language for Cloud Computing -- Technical Report.
In: CoRR, abs/1602.00981, [Article]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
TU Darmstadt, [Master Thesis]

Brody, Joshua and Dziembowski, Stefan and Faust, Sebastian and Pietrzak, Krzysztof (2016):
Position-Based Cryptography and Multiparty Communication Complexity.
In: IACR Cryptology ePrint Archive, p. 536, 2016, [Online-Edition: http://eprint.iacr.org/2016/536],
[Article]

Barthe, Gilles and Dupressoir, Francois and Faust, Sebastian and Gregoire, Benjamin and Standaert, Francois-Xavier and Strub, Pierre-Yves (2016):
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: IACR Cryptology ePrint Archive, p. 912, 2016, [Online-Edition: http://eprint.iacr.org/2016/912],
[Article]

Brodkorb, Felix and Kopp, Manuel and Kuijper, Arjan and Landesberger, Tatiana von (2016):
A Modular Rule-Based Visual Interactive Creation of Tree-Shaped Geo-Located Networks.
IEEE Computer Society Conference Publishing Services (CPS), Los Alamitos, Calif., In: 12th International Conference on Signal-Image Technology & Internet-Based Systems, Naples, Italy, 28. November-1. December, 2016, DOI: 10.1109/SITIS.2016.69,
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2016):
Methods to Model and Simulate Super Carbon Nanotubes of Higher Order.
In: Concurrency and Computation: Practice and Experience, John Wiley & Sons, Ltd, Special Issue, [Online-Edition: https://paginas.fe.up.pt/~specs/events/cse2015/ccpe-cse2015....],
[Article]

Büttner, Carsten (2016):
Anonymous Authenticated Car-to-X Communication.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5832],
[Ph.D. Thesis]

Boubekeur, Tamy and Cignoni, Paolo and Eisemann, Elmar and Goesele, Michael and Klein, Reinhard and Roth, Stefan and Weinmann, Michael and Wimmer, Michael
Catalano, Chiara Eva and Luca, Livio De (eds.) (2016):
Harvesting Dynamic 3D Worlds from Commodity Sensor Clouds.
The Eurographics Association, In: Eurographics Workshop on Graphics and Cultural Heritage, ISSN 2312-6124,
ISBN 978-3-03868-011-6,
[Conference or Workshop Item]

Bodden, Eric and Pun, Ka I. and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina
Margaria, Tiziana and Steffen, Bernhard (eds.) (2016):
Information Flow Analysis for Go.
In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, Springer International Publishing, pp. 431-445, DOI: 10.1007/978-3-319-47166-2_30,
[Online-Edition: https://doi.org/10.1007/978-3-319-47166-2_30],
[Book Section]

Beckert, Bernhard and Hähnle, Reiner and Hentschel, Martin and Schmitt, Peter H.
Ahrendt, Wolfgang and Beckert, Bernhard and Bubel, Richard and Hähnle, Reiner and Schmitt, Peter H. and Ulbrich, Mattias (eds.) (2016):
Formal Verification with KeY: A Tutorial.
In: Deductive Software Verification - The KeY Book - From Theory to Practice, Springer, pp. 541-570, DOI: 10.1007/978-3-319-49812-6₁₆,
[Online-Edition: https://doi.org/10.1007/978-3-319-49812-6_16],
[Book Section]

Bubel, Richard and Damiani, Ferruccio and Hähnle, Reiner and Johnsen, Einar Broch and Owe, Olaf and Schaefer, Ina and Yu, Ingrid Chieh (2016):
Proof Repositories for Compositional Verification of Evolving Software Systems - Managing Change When Proving Software Correct.
In: Trans. Found. Mastering Chang., pp. 130-156, 1, DOI: 10.1007/978-3-319-46508-1₈,
[Online-Edition: https://doi.org/10.1007/978-3-319-46508-1_8],
[Article]

Bubel, Richard and Hähnle, Reiner
Ahrendt, Wolfgang and Beckert, Bernhard and Bubel, Richard and Hähnle, Reiner and Schmitt, Peter H. and Ulbrich, Mattias (eds.) (2016):
KeY-Hoare.
In: Deductive Software Verification - The KeY Book - From Theory to Practice, Springer, pp. 571-589, DOI: 10.1007/978-3-319-49812-6₁₇,
[Online-Edition: https://doi.org/10.1007/978-3-319-49812-6_17],
[Book Section]

Bennaceur, Amel and Giannakopoulou, Dimitra and Hähnle, Reiner and Meinke, Karl (2016):
Machine Learning for Dynamic Software Analysis: Potentials and Limits (Dagstuhl Seminar 16172).
In: Dagstuhl Reports, pp. 161-173, 6, (4), DOI: 10.4230/DagRep.6.4.161,
[Online-Edition: https://doi.org/10.4230/DagRep.6.4.161],
[Article]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: Proceedings of the 53nd Annual Design Automation Conference, ACM, In: DAC '16, [Conference or Workshop Item]

Binnig, Carsten and Crotty, Andrew and Galakatos, Alex and Kraska, Tim and Zamanian, Erfan (2016):
The end of slow networks: It's time for a redesign.
In: Proceedings of the VLDB Endowment, VLDB Endowment, pp. 528-539, 9, (7), [Article]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2016):
Predicting the Spelling Difficulty of Words for Language Learners.
In: Proceedings of the 11th Workshop on Innovative Use of NLP for Building Educational Applications held in conjunction with NAACL 2016, San Diego, CA, USA, [Online-Edition: http://m-mitchell.com/NAACL-2016/BEA/pdf/BEA1108.pdf],
[Conference or Workshop Item]

Buechler, D. and Ott, H. and Peters, J. (2016):
A Lightweight Robotic Arm with Pneumatic Muscles for Robot Learning.
In: Proceedings of the International Conference on Robotics and Automation (ICRA), [Conference or Workshop Item]

Belousov, B. and Neumann, G. and Rothkopf, C. and Peters, J. (2016):
Catching heuristics are optimal control policies.
In: Advances in Neural Information Processing Systems (NIPS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Büscher, Niklas and Schiffner, Stefan and Fischer, Mathias (2016):
Consumer Privacy on Distributed Energy Markets.
In: Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, Germany, September 7-8, 2016, DOI: 10.1007/978-3-319-44760-5_7,
[Online-Edition: https://doi.org/10.1007/978-3-319-44760-5\_7],
[Conference or Workshop Item]

Bartschat, Andreas (2016):
Automatic Classification of Cornea Tissues for Autofocus Algorithm.
Darmstadt, TU, Master Thesis, 2016, [Master Thesis]

Berkei, Sarah (2016):
Effiziente und Vollautomatische Grobausrichtung für den Soll-Ist-Abgleich zwischen CAD-Modellen und Scandaten.
Darmstadt, TU, Master Thesis, 2016, [Master Thesis]

Bernard, Jürgen
Hölldobler, Steffen (ed.) (2016):
Explorative Suche in zeitbasierten Primärdaten.
In: Ausgezeichnete Informatikdissertationen 2015, Bonn, Gesellschaft für Informatik e.V. (GI), pp. 11-20, [Book Section]

Berndt, René and Silva, Nelson and Caldera, Christian and Krispel, Ulrich and Eggeling, Eva and Sunk, Alexander and Reisinger, Gerhard and Sihn, Wilfried and Fellner, Dieter W. (2016):
VASCO - Digging the Dead Man's Chest of Value Streams.
In: International Journal on Advances in Intelligent Systems, pp. 401-416, 9, (3), [Article]

Beuth, Marcel (2016):
Visualization of General Graphs with Metro Maps.
TU Darmstadt, [Bachelor Thesis]

Bockholt, Ulrich
Schenk, Michael and Schumann, Marco (eds.) (2016):
Teilprojekt TP 3 - Tracking.
In: Angewandte Virtuelle Techniken im Produktentstehungsprozess, Berlin, Heidelberg, Springer, Vieweg, pp. 141-222, DOI: 10.1007/978-3-662-49317-5,
[Book Section]

Borrmann, Daniel (2016):
Incorporating the Unscented Transform in Rao-Blackwellised Visual-Inertial SLAM.
Darmstadt, TU, Master Thesis, 2016, [Master Thesis]

Braun, Andreas and Kirchbuchner, Florian and Wichert, Reiner
Fischer, Florian and Krämer, Alexander (eds.) (2016):
Ambient Assisted Living.
In: eHealth in Deutschland, Berlin, Heidelberg, Springer, Vieweg,, pp. 203-222, DOI: 10.1007/978-3-662-49504-9_10,
[Book Section]

Brodkorb, Felix and Kuijper, Arjan and Andrienko, Gennady and Andrienko, Natalia and Landesberger, Tatiana von (2016):
Overview with Details for Exploring Geo-located Graphs on Maps.
In: Information Visualization, pp. 214-237, 15, (3), DOI: 10.1177/1473871615597077,
[Article]

Breitfelder, Simon (2016):
Invertierte GML-Modellierung durch Einpassen und Zusammensetzen von einfachen Strukturen.
TU Darmstadt, [Bachelor Thesis]

Braun, Andreas and Wichert, Reiner and Kuijper, Arjan and Fellner, Dieter W. (2016):
Benchmarking Sensors in Smart Environments - Method and Use Cases.
In: Journal of Ambient Intelligence and Smart Environments, pp. 645-664, 8, (6), DOI: 10.3233/AIS-160402,
[Article]

Bernard, Jürgen (2015):
Exploratory search in time-oriented primary data.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5173],
[Ph.D. Thesis]

Baier, Harald (2015):
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
In: it - Information Technology, 6, DOI: 10.1515/itit-2015-0023,
[Article]

Bagci, Ibrahim Ethem and Roedig, Utz and Martinovic, Ivan and Schulz, Matthias and Hollick, Matthias (2015):
Using Channel State Information for Tamper Detection in the Internet of Things.
In: 31st Annual Computer Security Applications Conference (ACSAC 2015), [Article]

Borgwart, Andreas and Boukoros, Spyros and Shulman, Haya and Waidner, Michael and van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2015):
Factors of Difficulty in German Language Proficiency Tests.
[Other]

Bračevac, Oliver (2015):
Temporal Correlation Patterns -- Intersecting Joins, Streams, Events and Reactive Programming.
In: Workshop on Reactive and Event-based Languages & Systems co-located with SPLASH '15, 27 Oct 2015, [Online-Edition: http://2015.splashcon.org/track/rebls2015],
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2015):
An Improved Algorithm for Simulating the Mechanical Behavior of Super Carbon Nanotubes.
In: Proceedings of the IEEE International Conference on Computational Science and Engineering, Porto, Portugal, [Conference or Workshop Item]

Borges, Fábio and Santos, Raqueline A. M. and Marquezino, Franklin L. (2015):
Preserving Privacy in a Smart Grid Scenario using Quantum Mechanics.
In: Security and Communication Networks, Wiley, pp. 2061-2069, 8, (12), ISSN 1939-0122,
DOI: 10.1002/sec.1152,
[Article]

Barroso, Ana and Hollick, Matthias (2015):
Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication.
In: IEEE 40th Conference on Local Computer Networks (LCN 2015), pp. 474 - 477, DOI: 10.1109/LCN.2015.7366356,
[Article]

Buchmann, Nicolas and Baier, Harald (2015):
Elektronische Identifizierung und vertrauenswürdige Dienste.
In: D.A.C.H. Security 2015, [Conference or Workshop Item]

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Baluda, Mauro (2015):
EvoSE: Evolutionary Symbolic Execution.
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015), [Online-Edition: http://dx.doi.org/10.1145/2804322.2804325],
[Article]

Borges de Oliveira, Fábio (2015):
On Privacy-Preserving Protocols for Smart Metering Systems.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4693],
[Ph.D. Thesis]

Beckerle, Philipp and Wojtusch, Janis and Seyfarth, André and Stryk, Oskar von and Rinderknecht, Stephan (2015):
Analyzing and Considering Inertial Effects in Powered Lower Limb Prosthetic Design.
In: Proceedings of IEEE International Conference on Rehabilitation Robotics, In: IEEE International Conference on Rehabilitation Robotics, Singapore, 11 - 14 August 2015, [Conference or Workshop Item]

Buescher, Niklas and Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15), USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2015):
Exploiting Structural Properties During Carbon Nanotube Simulation.
In: Proceedings of the International Conference on Computational Science and Its Applications, Banff, Canada, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2015):
A Unified and Memory Efficient Framework for Simulating Mechanical Behavior of Carbon Nanotubes.
In: Proceedings of the International Conference on Computational Science, Reykjavik, Iceland, 15, [Conference or Workshop Item]

Brasser, Ferdinand and Koeberl, Patrick and Mahjoub, Brahim El and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference or Workshop Item]

Bringer, J. and Morel, C. and Rathgeb, C. (2015):
Security analysis of Bloom filter-based iris biometric template protection.
In: 2015 International Conference on Biometrics (ICB), IEEE, DOI: 10.1109/ICB.2015.7139069,
[Conference or Workshop Item]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag, TU Darmstadt, In: Tagungsband zum Deutschen IT-Sicherheitskonkress, 14, [Master Thesis]

Bucicoiu, Mihai and Davi, Lucas and Deaconescu, Razvan and Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Beyer, Philip (2015):
Proposal for a STS Evaluation Framework for STS based Applications.
Technische Universität Darmstadt, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Barekatain, Behrang and Khezrimotlagh, Dariush and Aizaini Maarof, Mohd and Ghaeini, Hamid Reza and Ariza Quintana, Alfonso and Trivino Cabrera, Alicia (2015):
Efficient P2P live video streaming over hybrid WMNs using random network coding.
In: Wireless Personal Communications, pp. 1761-1789, 80, (4), DOI: 10.1007/s11277-014-2112-5,
[Article]

Bär, Daniel and Zesch, Torsten and Gurevych, Iryna
UKP Lab, Technische Universität Darmstadt (Corporate Creator) (2015):
Composing Measures for Computing Text Similarity.
Darmstadt, Germany, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4342],
[Report]

Busold, Christoph and Heuser, Stephan and Rios, Jon and Sadeghi, Ahmad-Reza and Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13, [Article]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt (2015):
Inner Product Masking Revisited.
In: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, DOI: 10.1007/978-3-662-46800-5₁₉,
[Online-Edition: https://doi.org/10.1007/978-3-662-46800-5_19],
[Conference or Workshop Item]

Biedermann, Sebastian (2015):
Transparent Security Services for an Infrastructure-as-a-Service Cloud.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4415],
[Ph.D. Thesis]

Braun, Johannes (2015):
Maintaining Security and Trust in Large Scale Public Key Infrastructures.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4566],
[Ph.D. Thesis]

Bubel, Richard and Din, Crystal Chang and Hähnle, Reiner and Nakata, Keiko
de Nivelle, Hans (ed.) (2015):
A Dynamic Logic with Traces and Coinduction.
Springer, In: Automated Reasoning with Analytic Tableaux and Related Methods - 24th International Conference, TABLEAUX 2015, Wroclaw, Poland, September 21-24, 2015. Proceedings, In: Lecture Notes in Computer Science, 9323, DOI: 10.1007/978-3-319-24312-2₂₁,
[Online-Edition: https://doi.org/10.1007/978-3-319-24312-2_21],
[Conference or Workshop Item]

Butin, Denis and Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015), IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis and Gazdag, Stefan-Lukas and Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt (2015):
Inner Product Masking Revisited.
In: IACR Cryptology ePrint Archive, p. 105, 2015, [Online-Edition: http://eprint.iacr.org/2015/105],
[Article]

Binnig, Carsten and Salama, Abdallah and Zamanian, Erfan and El-Hindi, Muhammad and Feil, Sebastian and Ziegler, Tobias (2015):
Spotgres-parallel data analytics on spot instances.
In: Data Engineering Workshops (ICDEW), 2015 31st IEEE International Conference on, [Conference or Workshop Item]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2015):
Candidate Evaluation Strategies for Improved Difficulty Prediction of Language Tests.
In: Proceedings of the Tenth Workshop on Innovative Use of NLP for Building Educational Applications held in conjunction with NAACL 2015, [Online-Edition: http://aclweb.org/anthology/W15-0601],
[Conference or Workshop Item]

Benikova, Darina and Yimam, Seid Muhie and Santhanam, Prabhakaran and Biemann, Chris (2015):
GermaNER: Free Open German Named Entity Recognition Tool.
In: International Conference of the German Society for Computational Linguistics and Language Technology (GSCL-2015), Campus Essen, Germany, [Conference or Workshop Item]

Bollmann, Dominik and Lortz, Steffen and Mantel, Heiko and Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS), [Conference or Workshop Item]

Bechtold, Oskar (2015):
An Interaction Concept for Wearable Low-resolution LED Displays to Increase Traffic Safety.
TU Darmstadt, [Bachelor Thesis]

Bernard, Jürgen and Daberkow, Debora and Fellner, Dieter W. and Fischer, Katrin and Koepler, Oliver and Kohlhammer, Jörn and Runnwerth, Mila and Ruppert, Tobias and Schreck, Tobias and Sens, Irina (2015):
VisInfo: A Digital Library System for Time Series Research Data Based on Exploratory Search - a User-centered Design Approach.
In: International Journal on Digital Libraries, pp. 37-59, 16, (1), DOI: 10.1007/s00799-014-0134-y,
[Article]

Bernard, Jürgen and Steiger, Martin and Mittelstädt, Sebastian and Thum, Simon and Keim, Daniel A. and Kohlhammer, Jörn (2015):
A Survey and Task-Based Quality Assessment of Static 2D Colormaps.
SPIE Press, In: Visualization and Data Analysis 2015, In: Proceedings of SPIE; 9397, DOI: 10.1117/12.2079841,
[Conference or Workshop Item]

Bernhard, Felix (2015):
Benutzerfreundliche Kalibrierung für Tracking von Optical Stereo See-Through Head Worn Displays für Augmented Reality.
TU Darmstadt, [Bachelor Thesis]

Berz, Florian (2015):
Intuitive 3D-Interaktion für Design und Modellierung von volumetrischen Strukturen.
Darmstadt, TU, Master Thesis, 2015, [Master Thesis]

Blahová, Jana and Kirchner, Eric and Dekker, Niels and Lucassen, Marcel and Njo, Lan and van der Lans, Ivo and Urban, Philipp and Huertas, Rafael (2015):
Goniochromatic Difference Between Effect Coatings: Is the Whole More than the Sum of its Parts?
SPIE Press, Bellingham, In: Measuring, Modeling, and Reproducing Material Appearance 2015, In: Proceedings of SPIE; 9398, DOI: 10.1117/12.2083112,
[Conference or Workshop Item]

Bockholt, Ulrich and Roth, Matthias and Lengowski, Stefan and Olbrich, Manuel and Schwerdtfeger, Björn and Staack, Ingo (2015):
Zeichnungslose Fertigung - AR-Überlagerung von PMI (Product and Manufacturing Information) auf die zu fertigenden Baugruppen.
In: 18. IFF-Wissenschaftstage 2015, [Conference or Workshop Item]

Braun, Andreas and Frank, Sebastian and Majewski, Martin and Wang, Xiaofeng (2015):
CapSeat - Capacitive Proximity Sensing for Automotive Activity Recognition.
ACM Press, New York, In: The 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications. Proceedings, DOI: 10.1145/2799250.2799263,
[Conference or Workshop Item]

Braun, Andreas and Frank, Sebastian and Wichert, Reiner (2015):
The Capacitive Chair.
In: Distributed, Ambient, and Pervasive Interactions, Proceedings, Springer International Publishing, In: Distributed, Ambient, and Pervasive Interactions, Third International Conference, DAPI 2015, In: Lecture Notes in Computer Science (LNCS); 9189, DOI: 10.1007/978-3-319-20804-6₃₆,
[Conference or Workshop Item]

Braun, Andreas and Schembri, Ingrid and Frank, Sebastian (2015):
ExerSeat - Sensor-Supported Exercise System for Ergonomic Microbreaks.
Springer, In: Ambient Intelligence, 12th European Conference, AmI 2015, In: Lecture Notes in Computer Science (LNCS); 9425, DOI: 10.1007/978-3-319-26005-1₁₆,
[Conference or Workshop Item]

Braun, Andreas and Wichert, Reiner and Kuijper, Arjan and Fellner, Dieter W. (2015):
Capacitive Proximity Sensing in Smart Environments.
In: Journal of Ambient Intelligence and Smart Environments, pp. 483-510, 7, (4), DOI: 10.3233/AIS-150324,
[Article]

Brodkorb, Felix and Heucher, Johannes and Dundukov, Eugen (2015):
Interactive Analysis of Movement and Communication Data by Animation.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE Conference on Visual Analytics Science and Technology, DOI: 10.1109/VAST.2015.7347642,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Ginters, Egils (2015):
Best-Practice Piloting Based on an Integrated Social Media Analysis and Visualization for E-Participation Simulation in Cities.
In: Procedia Computer Science online, pp. 66-74, 75, DOI: 10.1016/j.procs.2015.12.214,
[Article]

Burkhardt, Dirk and Nazemi, Kawa and Kohlhammer, Jörn (2015):
Policy Modeling Methodologies.
Hershey, Pennsylvania, IGI Global, pp. 512-524, DOI: 10.4018/978-1-4666-8358-7.ch023,
[Book Section]

Burkhardt, Dirk and Nazemi, Kawa and Zilke, Jan Ruben and Kohlhammer, Jörn and Kuijper, Arjan (2015):
Fundamental Aspects for E-Government.
IGI Global, pp. 52-68, DOI: 10.4018/978-1-4666-8111-8.ch003,
[Book Section]

Bißmeyer, Norbert (2014):
Misbehavior Detection and Attacker Identification in Vehicular Ad-hoc Networks.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4257],
[Ph.D. Thesis]

Brinker, Christian and Loza Mencía, Eneldo and Fürnkranz, Johannes (2014):
Graded Multilabel Classification by Pairwise Comparisons.
Shenzhen, China, Curran Associates, IEEE, In: 2014 IEEE International Conference on Data Mining (ICDM 2014), Shenzhen, China, ISSN 1550-4786,
ISBN 978-1-4799-4303-6,
[Online-Edition: http://www.ke.tu-darmstadt.de/publications/papers/ICDM14grad...],
[Conference or Workshop Item]

Berlin, Eugen (2014):
Early Abstraction of Inertial Sensor Data for Long-Term Deployments.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4225],
[Ph.D. Thesis]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2014):
Predicting the Difficulty of Language Proficiency Tests.
In: Transactions of the Association for Computational Linguistics, pp. 517-529, 2, (1), [Online-Edition: http://aclweb.org/anthology/Q14-1040],
[Article]

Buchmann, Nicolas and Baier, Harald (2014):
Towards a more secure and scalable verifying PKI of eMRTD.
In: Journal of Computer Security, pp. 1025-1049, 22, (6), [Article]

Baecher, Paul (2014):
Cryptographic Reductions: Classification and Applications to Ideal Models.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4000],
[Ph.D. Thesis]

Becker, Meike (2014):
Patientenspezifische Planung für die Multi-Port Otobasischirurgie.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4180],
[Ph.D. Thesis]

Braun, Andreas (2014):
Application and validation of capacitive proximity sensing systems in smart environments.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4175],
[Ph.D. Thesis]

Borges, Fábio and Martucci, Leonardo A. (2014):
iKUP Keeps Users' Privacy in the Smart Grid.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014, [Conference or Workshop Item]

Borges, Fábio and Buchmann, Johannes and Mühlhäuser, Max (2014):
Introducing Asymmetric DC-Nets.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian
Mehl, Miriam (ed.) (2014):
Using Instancing to Efficiently Render Carbon Nanotubes.
In: 3rd International Workshop on Computational Engineering, Stuttgart, Germany, 3, [Online-Edition: http://ipvs.informatik.uni-stuttgart.de/SGS/ICCE2014/],
[Conference or Workshop Item]

Burrows, Steven and Gurevych, Iryna and Stein, Benno (2014):
The Eras and Trends of Automatic Short Answer Grading.
In: International Journal of Artificial Intelligence in Education, pp. 60-117, 25, (1), DOI: 10.1007/s40593-014-0026-8,
[Online-Edition: https://link.springer.com/article/10.1007/s40593-014-0026-8],
[Article]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session), San Francisco, USA, [Conference or Workshop Item]

Buchmann, Johannes and Bischof, Christian and Dagdelen, Özgür and Fitzpatrick, Robert and Göpfert, Florian and Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference or Workshop Item]

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Borazio, Marko Antonio Matteo (2014):
Rhythm Modelling of Long-Term Activity Data.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4290],
[Ph.D. Thesis]

Borges, Fábio and Martucci, Leonardo A. and Beato, Filipe and Mühlhäuser, Max (2014):
Secure and Privacy-Friendly Public Key Generation and Certification.
IEEE CS, In: Proceedings of the 13th IEEE TrustCom 2014, [Conference or Workshop Item]

Buchmann, Johannes and El Bansarkhani, Rachid and Hauke, Sascha
Brunetti, Gino and Feld, Thomas and Heuser, Lutz and Schnittner, Joachim and Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Beckerle, Philipp and Schültje, F. and Wojtusch, J. and Christ, O. (2014):
Implementation, Control and User-Feedback of the Int²Bot for the Investigation of Lower Limb Body Schema Integration.
In: Proceedings of IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), In: IEEE International Symposium on Robot and Human Interactive Communication, Edinburgh, Schottland, 25. – 29. August 2014, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian (2014):
Optimizing the Memory Access Performance of FASTEST's Sispol Routine.
In: World Congress on Computational Mechanics, Barcelona, Spain, 11, [Online-Edition: http://www.wccm-eccm-ecfd2014.org/admin/files/filePaper/p153...],
[Conference or Workshop Item]

Borges, Fábio and Demirel, Denise and Böck, Leon and Buchmann, Johannes and Mühlhäuser, Max (2014):
A Privacy-Enhancing Protocol that Provides In-Network Data Aggregation and Verifiable Smart Meter Billing.
In: IEEE Symposium on Computers and Communications (ISCC), In: 19th IEEE Symposium on Computers and Communications (ISCC 2014), Funchal, Portugal, DOI: 10.1109/ISCC.2014.6912612,
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, pp. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie
Tryfonas, Theo and Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, In: LNCS, 8533, [Conference or Workshop Item]

Buchmann, Nicolas and Rathgeb, Christian and Baier, Harald and Busch, Christoph (2014):
Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area.
In: Proceedings of the 2nd Annual Privacy Forum (APF’14), [Article]

Budurushi, Jurlind and Volkamer, Melanie
Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, pp. 1-10, 19, (2), DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Beckerle, Philipp and Wojtusch, Janis and Rinderknecht, Stephan and Stryk, Oskar von (2014):
Analysis of System Dynamic Influences in Robotic Actuators with Variable Stiffness.
In: Smart Structures and Systems, pp. 711-730, 13, (4), DOI: 10.12989/sss.2014.13.4.711,
[Article]

Bergmann, Clemens and Canova, Gamze (2014):
Design, Implementation and Evaluation of an Anti-Phishing Education App.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3763],
[Master Thesis]

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, [Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, pp. 119-127, (2), DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Berger, Kai and Kastner, Marc and Schroeder, Yannic and Guthe, Stefan (2014):
Using Sparse Optical Flow for Two-Phase Gas Flow Capturing with Multiple Kinect.
In: Computer Vision and Machine Learning with RGB-D Sensors, Springer International Publishing, pp. 157-169, [Book Section]

Beckerle, Matthias (2014):
Usable Access Control.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3828],
[Ph.D. Thesis]

Breitinger, Frank (2014):
On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4055],
[Ph.D. Thesis]

Biedermann, Alexander (2014):
Design Concepts for a Virtualizable Embedded MPSoC Architecture : Enabling Virtualization in Embedded Multi-Processor Systems.
Wiesbaden, Springer Vieweg, TU Darmstadt, ISBN 3-658-08046-9 ; 978-3-658-08046-4,
[Ph.D. Thesis]

Borges, Fábio and Mühlhäuser, Max (2014):
EPPP4SMS: Efficient Privacy-Preserving Protocol for Smart Metering Systems and Its Simulation Using Real-World Data.
In: IEEE Transactions on Smart Grid, pp. 2701 - 2708, ISSN 1949-3053,
[Article]

Brinker, Christian and Loza Mencía, Eneldo and Fürnkranz, Johannes (2014):
Graded Multilabel Classification by Pairwise Comparisons.
[Online-Edition: http://www.ke.tu-darmstadt.de/publications/reports/tud-ke-20...],
[Report]

Bernard, Jürgen and Steiger, Martin and Widmer, Sven and Lücke-Tieke, Hendrik and May, Thorsten and Kohlhammer, Jörn (2014):
Visual-interactive Exploration of Interesting Multivariate Relations in Mixed Research Data Sets.
In: Computer Graphics Forum, Wiley Online Library, pp. 291-300, 33, (3), [Article]

Beckert, Bernhard and Hähnle, Reiner (2014):
Reasoning and Verification: State of the Art and Current Trends.
In: IEEE Intelligent Systems, pp. 20-29, 29, (1), DOI: 10.1109/MIS.2014.3,
[Online-Edition: https://doi.org/10.1109/MIS.2014.3],
[Article]

Buchner, Karolina and Lissermann, Roman and Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, ACM, [Conference or Workshop Item]

Borgert, Stephan and Mühlhäuser, Max
Nanopoulos, Alexandros and Schmidt, Werner (eds.) (2014):
Formal Based Correctness Check for ePASS-IoS 1.1 Process Models with Integrated User Support for Error Correcting.
In: {S-BPM} {ONE} - Scientific Research - 6th International Conference, {S-BPM} {ONE} 2014, Eichst{\"{a}}tt, Germany, April 22-23, 2014. Proceedings, Springer, In: Lecture Notes in Business Information Processing, 170, DOI: 10.1007/978-3-319-06065-1_2,
[Conference or Workshop Item]

Borgert, Stephan and Mühlhäuser, Max
Nanopoulos, Alexandros and Schmidt, Werner (eds.) (2014):
A {S-BPM} Suite for the Execution of Cross Company Subject Oriented Business Processes.
In: {S-BPM} {ONE} - Scientific Research - 6th International Conference, {S-BPM} {ONE} 2014, Eichst{\"{a}}tt, Germany, April 22-23, 2014. Proceedings, Springer, In: Lecture Notes in Business Information Processing, 170, DOI: 10.1007/978-3-319-06065-1_12,
[Conference or Workshop Item]

Borgert, Stephan and Münch, Daniel and Heuser, Lutz (2014):
Facility Management by Means of Subject Oriented Cross Organizational Business Process Management.
In: {IEEE} 16th Conference on Business Informatics, {CBI} 2014, Geneva, Switzerland, July 14-17, 2014 - Volume 2, {IEEE} Computer Society, DOI: 10.1109/CBI.2014.59,
[Conference or Workshop Item]

Bodden, E. and Maoz, S. (2014):
Special Section on Runtime Verification and Analysis.
In: Transactions on Aspect-Oriented Software Development (TAOSD), Springer, [Conference or Workshop Item]

Bubel, Richard and Hähnle, Reiner and Pelevina, Maria (2014):
Fully Abstract Operation Contracts.
In: Proceedings 6th International Symposium On Leveraging Applications of Formal Methods, Springer, In: LNCS, [Conference or Workshop Item]

Bubel, Richard and Montoya, Antonio Flores and Hähnle, Reiner
Bernardo, M. and Damiani, F. and Hähnle, R. and Johnsen, E. B. and Schaefer, I. (eds.) (2014):
Analysis of Executable Software Models.
In: SFM 2014, Springer, In: LNCS, DOI: 10.1007/978-3-319-07317-0_1,
[Conference or Workshop Item]

Bagci, Ibrahim Ethem and Roedig, Utz and Schulz, Matthias and Hollick, Matthias (2014):
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), DOI: 10.1145/2627393.2627405,
[Conference or Workshop Item]

Basin, David and Caronni, Germano and Ereth, Sarah and Harvan, Matus and Klaedtke, Felix and Mantel, Heiko (2014):
Scalable Offline Monitoring.
Heidelberg, Germany, Springer, In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference or Workshop Item]

Binnig, Carsten and Hildenbrand, Stefan and Färber, Franz and Kossmann, Donald and Lee, Juchang and May, Norman (2014):
Distributed snapshot isolation: global transactions pay globally, local transactions pay locally.
In: The VLDB Journal, Springer Berlin Heidelberg, pp. 987-1011, 23, (6), [Article]

Binnig, Carsten and Salama, Abdallah and Zamanian, Erfan (2014):
DoomDB: kill the query.
In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, [Conference or Workshop Item]

Binnig, Carsten and Salama, Abdallah and Zamanian, Erfan and Kornmayer, Harald and Listing, Sven and Mueller, Alexander C (2014):
XDB-A novel Database Architecture for Data Analytics as a Service.
In: Big Data (BigData Congress), 2014 IEEE International Congress on, [Conference or Workshop Item]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2014):
Readability for foreign language learning: The importance of cognates.
In: International Journal of Applied Linguistics, pp. 136-162, 165, (2), [Online-Edition: https://www.jbe-platform.com/content/journals/10.1075/itl.16...],
[Article]

Benikova, Darina and Fahrer, Uli and Gabriel, Alexander and Kaufmann, Manuel and Yimam, Seid Muhie and Landesberger, Tatiana von and Biemann, Chris (2014):
Network of the Day: Aggregating and Visualizing Entity Networks from Online Sources.
In: Proceedings of the NLP4CMC Workshop at KONVENS, [Conference or Workshop Item]

Benikova, Darina and Biemann, Chris and Reznicek, Marc (2014):
NoSta-D Named Entity Annotation for German: Guidelines and Dataset.
In: Proceedings of LREC-14, [Conference or Workshop Item]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, Springer Gabler Verlag, pp. 98-102, 38, (2), [Article]

Beinborn, Lisa (2014):
Book Review: Multilingual Corpora and Multilingual Corpus Analyses.
In: International Journal of Multilingualism, pp. 266-268, 11, (2), DOI: 10.1080/14790718.2013.788268,
[Online-Edition: https://www.tandfonline.com/doi/pdf/10.1080/14790718.2013.78...],
[Article]

Brandl, S. and Kroemer, O. and Peters, J. (2014):
Generalizing Pouring Actions Between Objects using Warped Parameters.
In: International Conference on Humanoid Robots (HUMANOIDS), Madrid, November 18-20th, 2014, [Online-Edition: http://www.ias.tu-darmstadt.de/uploads/Site/EditPublication/...],
[Conference or Workshop Item]

Bocsi, B. and Csato, L. and Peters, J. (2014):
Indirect Robot Model Learning for Tracking Control.
In: Advanced Robotics, [Online-Edition: http://www.ias.tu-darmstadt.de/uploads/Publications/Bocsi_AR...],
[Article]

Bischoff, B. and Nguyen-Tuong, D. and van Hoof, A. and Rasmussen, C. E. and Knoll, A. and Peters, J. and Deisenroth, M. P. (2014):
Policy Search For Learning Robot Control Using Sparse Data.
In: Proceedings of 2014 IEEE International Conference on Robotics and Automation (ICRA), [Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=690...],
[Conference or Workshop Item]

Ben Amor, H. and Neumann, G. and Kamthe, S. and Kroemer, O. and Peters, J. (2014):
Interaction Primitives for Human-Robot Cooperation Tasks.
In: Proceedings of 2014 IEEE International Conference on Robotics and Automation (ICRA), [Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=690...],
[Conference or Workshop Item]

Braun, Andreas and Wichert, Reiner and Kuijper, Arjan and Fellner, Dieter W. (2014):
A Benchmarking Model for Sensors in Smart Environments.
Springer, Berlin, Heidelberg, New York, In: Ambient Intelligence, In: Lecture Notes in Computer Science (LNCS); 8850, DOI: 10.1007/978-3-319-14112-1₂₀,
[Conference or Workshop Item]

Becker, Meike and Hansen, Stefan and Wesarg, Stefan and Sakas, Georgios (2014):
Path Planning for Multi-port Lateral Skull Base Surgery Based on First Clinical Experiences.
Springer, Berlin, Heidelberg, New York, In: Clinical Image-Based Procedures. Translational Research in Medical Imaging, In: Lecture Notes in Computer Science (LNCS); 8361, DOI: 10.1007/978-3-319-05666-1₄,
[Conference or Workshop Item]

Braun, Andreas and Cieslik, Silvana and Zmugg, René and Wichert, Reiner and Klein, Peter and Havemann, Sven and Wagner, Tobias (2014):
V2me - Virtuelles Coaching für Senioren.
VDE-Verlag GmbH, Berlin, Offenbach, In: Wohnen - Pflege - Teilhabe. Besser leben durch Technik, [Conference or Workshop Item]

Behrisch, Michael and Davey, James and Fischer, Fabian and Thonnard, Olivier and Schreck, Tobias and Keim, Daniel A. and Kohlhammer, Jörn (2014):
Visual Analysis of Sets of Heterogeneous Matrices Using Projection-Based Distance Functions and Semantic Zoom.
In: Computer Graphics Forum, pp. 411-420, 33, (3), DOI: 10.1111/cgf.12397,
[Article]

Burkhardt, Dirk and Nazemi, Kawa and Kohlhammer, Jörn (2014):
Policy Modeling Methodologies.
IGI Global, Hershey, Pennsylvania, pp. 48-60, [Book Section]

Bernard, Jürgen and Sessler, David and Ruppert, Tobias and Davey, James and Kuijper, Arjan and Kohlhammer, Jörn (2014):
User-Based Visual-Interactive Similarity Definition for Mixed Data Objects - Concept and First Implementation.
University of West Bohemia, Plzen, In: WSCG 2014. Communication Papers Proceedings, [Conference or Workshop Item]

Baar, Teun and Samadzadegan, Sepideh and Brettel, Hans and Urban, Philipp and Segovia, Maria V. Ortiz (2014):
Printing Gloss Effects in a 2.5D System.
SPIE Press, Bellingham, In: Measuring, Modeling, and Reproducing Material Appearance, In: Proceedings of SPIE; 9018, DOI: 10.1117/12.2039792,
[Conference or Workshop Item]

Bernard, Jürgen and Hutter, Marco and Sessler, David and Schreck, Tobias and Behrisch, Michael and Kohlhammer, Jörn (2014):
Towards a User-Defined Visual-Interactive Definition of Similarity Functions for Mixed Data.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE Conference on Visual Analytics Science and Technology. Proceedings, DOI: 10.1109/VAST.2014.7042503,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Retz, Wilhelm and Kohlhammer, Jörn (2014):
Visual Explanation of Government-Data for Policy Making through Open-Data Inclusion.
IEEE, In: International Conference for Internet Technology and Secured Transactions, DOI: 10.1109/ICITST.2014.7038782,
[Conference or Workshop Item]

Butt, Moazzam and Henniger, Olaf and Nouak, Alexander and Kuijper, Arjan (2014):
Privacy Protection of Biometric Templates.
Springer, Berlin, Heidelberg, New York, In: HCI International 2014 - Posters' Extended Abstracts. Proceedings Part I, In: Communications in Computer and Information Science (CCIS); 434, DOI: 10.1007/978-3-319-07857-1₂₇,
[Conference or Workshop Item]

Braun, Andreas and Schmidt, Sönke and Kuijper, Arjan and Neumann, Stephan and Wichert, Reiner (2014):
Towards Interactive Car Interiors - the Active Armrest.
ACM, New York, In: NordiCHI '14, DOI: 10.1145/2639189.2670191,
[Conference or Workshop Item]

Brandherm, Florian (2014):
Automatic Appearance-Preserving Generation of Compact 3D Models for the Web.
TU Darmstadt, [Bachelor Thesis]

Burkhardt, Dirk and Nazemi, Kawa and Encarnação, José Daniel and Retz, Wilhelm and Kohlhammer, Jörn (2014):
Visualization Adaptation Based on Environmental Influencing Factors.
Springer, Berlin, Heidelberg, New York, In: Human-Computer Interaction: Part 1, In: Lecture Notes in Computer Science (LNCS); 8510, DOI: 10.1007/978-3-319-07233-3₃₈,
[Conference or Workshop Item]

Becker, Meike and Kirschner, Matthias and Sakas, Georgios (2014):
Segmentation of Risk Structures for Otologic Surgery using the Probabilistic Active Shape Model.
SPIE Press, Bellingham, In: Medical Imaging 2014: Image-Guided Procedures, Robotic Interventions, and Modeling, In: Proceedings of SPIE; 9036, DOI: 10.1117/12.2043411,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Parisay, Mohsen and Kohlhammer, Jörn (2014):
Visual Correlation Analysis to Explain Open Government Data based on Linked-Open Data for Decision Making.
In: International Journal of Digital Society, pp. 915-923, 5, (3), DOI: 10.20533/ijds.2040.2570.2014.0116,
[Article]

Bockholt, Ulrich (2014):
Fusing Web Technologies & Augmented Reality.
IEEE Service Center, Piscataway, NJ, In: IEEE International Symposium on Mixed and Augmented Reality - Science & Technology 2014, DOI: 10.1109/ISMAR.2014.6948509,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Klamm, Christopher and Kohlhammer, Jörn and Kuijper, Arjan (2014):
Comparison of e-Participation Roadmap in Industrial and Developing Countries based on Germany and Kenya.
ACM Press, New York, In: ICEGOV 2014, DOI: 10.1145/2691195.2691209,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Kohlhammer, Jörn (2014):
Visual Process Support to Assist Users in Policy Making.
IGI Global, Hershey, Pennsylvania, pp. 149-162, [Book Section]

Bockholt, Ulrich and Behr, Johannes and Wagner, Sebastian and Limper, Max and Olbrich, Manuel and Franke, Tobias (2014):
VR/AR-Technologien im Browser: Effiziente Integration virtueller Technologien ins PDM-Umfeld durch Nutzung von Web-Technologien.
In: 17. IFF-Wissenschaftstage 2014. Tagungsband, [Conference or Workshop Item]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Biemann, Chris and Bildhauer, Felix and Evert, Stefan and Goldhahn, Dirk and Quasthoff, Uwe and Schäfer, Roland and Simon, Johannes and Swiezinski, Leonard and Zesch, Torsten (2013):
Scalable Construction of High-Quality Web Corpora.
In: JLCL, pp. 23-59, 28, (2), [Article]

Bär, Daniel (2013):
A Composite Model for Computing Similarity Between Texts.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3641],
[Ph.D. Thesis]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna
Mitkov, Ruslan and Park, Jong (eds.) (2013):
Cognate Production using Character-based Machine Translation.
In: Proceedings of the Sixth International Joint Conference on Natural Language Processing, Asian Federation of Natural Language Processing, Nagoya, Japan, [Online-Edition: http://www.aclweb.org/anthology/I13-1112],
[Conference or Workshop Item]

Biemann, Chris and Riedl, Martin (2013):
From Global to Local Similarities: A Graph-Based Contextualization Method using Distributional Thesauri.
In: Proceedings of the 8th Workshop on TextGraphs in conjunction with EMNLP 2013, pp. 39-43, [Online-Edition: http://aclweb.org/anthology/W13-50],
[Article]

Biedermann, Alexander and Dreyer, Boris and Huss, Sorin A. (2013):
A generic, scalable reconfiguration infrastructure for sensor networks functionality adaption.
In: 2013 IEEE 26th International SOC Conference (SOCC), [Online-Edition: http://ieeexplore.ieee.org/document/6749705/],
[Conference or Workshop Item]

Bodden, Eric and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2013):
Reducing human factors in software security architectures.
In: Future Security Conference 2013, [Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf],
[Conference or Workshop Item]

Braun, Johannes and Kiefer, Franziskus and Hülsing, Andreas
Katsikas, Sokratis and Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, Springer Berlin Heidelberg, RHUL, Egham, UK, In: LNCS, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Braun, Johannes and Volk, Florian and Buchmann, Johannes and Mühlhäuser, Max
Katsikas, Sokatis and Agudo, Isaac (eds.) (2013):
Trust Views for the Web PKI.
Springer Berlin Heidelberg, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, In: LNCS, ISSN 0302-9743,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Barekatain, Behrang and Khezrimotlagh, Dariush and Aizaini Maarof, Mohd and Ghaeini, Hamid Reza and Salleh, Shaharuddin and Ariza Quintana, Alfonso and Akbari, Behzad and Trivino Cabrera, Alicia (2013):
MATIN: A random network coding based framework for high quality peer-to-peer live video streaming.
In: PloS one, pp. e69844, 8, (8), DOI: 10.1371/journal.pone.0069844,
[Article]

Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar
Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing, Springer, pp. 157 - 158, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt, [Master Thesis]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2013):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, pp. 267-297, 12, (4), [Article]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference or Workshop Item]

Bär, Daniel and Zesch, Torsten and Gurevych, Iryna (2013):
DKPro Similarity: An Open Source Framework for Text Similarity.
In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (System Demonstrations) (ACL 2013), Association for Computational Linguistics, Sofia, Bulgaria, [Online-Edition: http://www.aclweb.org/anthology/P13-4021],
[Conference or Workshop Item]

Biehl, Robert (2013):
Part based object detection with a flexible context constraint.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6868],
[Diploma Thesis or Magisterarbeit]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw, [Article]

Beckerle, Matthias and Martucci, Leonardo (2013):
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
In: Symposium on Usable Privacy and Security (SOUPS) 2013, [Conference or Workshop Item]

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Bartsch, Steffen and Berger, Bernhard and Bunke, Michaela and Sohr, Karsten
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bračevac, Oliver (2013):
A Formal Model for Event Correlation in Information Flow Processing.
TU Darmstadt, [Master Thesis]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf],
[Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin (2013):
Leakage Detection and Tracing for Databases.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, [Conference or Workshop Item]

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference or Workshop Item]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Baumöller, Claas and Schaaf, Joachim and Horsch, Moritz and Wiesmaier, Alexander and Braun, Johannes (2013):
EP 2600270 Identification element-based authentication and identification with decentralised service use.
[Standards, patents]

Braun, Johannes and Horsch, Moritz and Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, In: LNCS, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Biemann, Chris and Riedl, Martin (2013):
Text: Now in 2D! A Framework for Lexical Expansion with Contextual Similarity.
In: Journal of Language Modelling, pp. 55-95, 1, (1), [Online-Edition: http://jlm.ipipan.waw.pl/index.php/JLM/issue/view/7],
[Article]

Becker, Daniel and Geimer, Markus and Rabenseifner, Rolf and Wolf, Felix (2013):
Extending the scope of the controlled logical clock.
In: Cluster Computing, Springer, pp. 171-189, 16, (1), ISSN 1386-7857,
DOI: 10.1007/s10586-011-0181-8,
[Article]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, In: Lecture Notes in Computer Science, 7779, [Conference or Workshop Item]

Blass, Erik-Oliver and Kurmus, Anil and Molva, Refik and Strufe, Thorsten (2013):
PSP: Private and Secure Payment with RFID.
In: Computer Communications, pp. 468-480, 36, (4), [Article]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, In: CODASPY '13, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Brzuska, Christina (2013):
On the Foundations of Key Exchange.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3414],
[Ph.D. Thesis]

Bremm, Sebastian (2013):
Visual Analytics Approaches for Descriptor Space Comparison and the Exploration of Time Dependent Data.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3719],
[Ph.D. Thesis]

Bayer, Daniel (2013):
Theorie und Anwendung der impulsbasierten Dynamiksimulation.
Göttingen, Optimus-Verl., TU Darmstadt, ISBN 978-3-86376-058-8,
[Ph.D. Thesis]

Berger, Kai and Schroeder, Yannic and Guthe, Stefan and Kastner, Marc Aurel (2013):
Using sparse optical flow for multiple Kinect applications.
In: Robotics: science and systems 2013 workshop on rgb-d: advanced reasoning with depth cameras, [Conference or Workshop Item]

Bjorner, Nikolaj and Hähnle, Reiner and Nipkow, Tobias and Weidenbach, Christoph (2013):
Deduction and Arithmetic (Dagstuhl Seminar 13411).
In: Dagstuhl Reports, pp. 1-24, 3, (10), DOI: 10.4230/DagRep.3.10.1,
[Online-Edition: https://doi.org/10.4230/DagRep.3.10.1],
[Article]

Beckerle, P. and Lahnstein, L. and Wojtusch, Janis and Rinderknecht, Stephan and Stryk, Oskar von (2013):
Conception and Design of a Hardware Simulator for Restoring Lost Biomechanical Function.
In: IEEE International Conference on Systems, Man and Cybernetics (SMC), [Conference or Workshop Item]

Beckerle, P. and Stuhlenmiller, F. and Schuy, J. and Rinderknecht, Stephan and Stryk, Oskar von and Wojtusch, Janis (2013):
Friction Compensation and Stiffness Evaluation on a Variable Torsion Stiffness.
In: International Symposium on Adaptive Motion of Animals and Machines (AMAM), [Conference or Workshop Item]

Beckerle, P. and Wojtusch, Janis and Schuy, J. and Strah, B. and Rinderknecht, Stephan and Stryk, Oskar von (2013):
Power-optimized Stiffness and Nonlinear Position Control of an Actuator with Variable Torsion Stiffness.
In: IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), [Conference or Workshop Item]

Böker, S. and Beckerle, P. and Wojtusch, Janis and Rinderknecht, Stephan (2013):
A Novel Design Approach and Operational Strategy for an Active Ankle-Foot Prosthesis.
In: International Symposium on Adaptive Motion of Animals and Machines (AMAM), [Conference or Workshop Item]

Beckerle, P. and Christ, O. and Windrich, M. and Rinderknecht, Stephan and Vogt, J. and Wojtusch, Janis (2013):
A methodological approach to integrate psychological factors to lower limb prosthetic functional design.
In: International Society of Prosthetics and Orthotics World Congress (ISPO), [Conference or Workshop Item]

Binder, W. and Bodden, E. and Löwe, W. (2013):
Proceedings of the 12th International Conference on Software Composition.
In: Lecture Notes in Computer Science, Springer, [Article]

Bender, J. and Fischlin, M. and Kügler, D. (2013):
The PACE|CA Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science, pp. 17-35, 8292, [Article]

Baecher, Paul and Brzuska, Christina and Fischlin, Marc (2013):
Notions of Black-Box Reductions.
In: Lecture Notes in Computer Science, pp. 269-315, 8269, [Article]

Baecher, Paul and Farshim, Pooya and Fischlin, Marc and Stam, Martijn (2013):
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
In: Lecture Notes in Computer Science, pp. 426-443, 7881, [Article]

Busch, Christoph and Pflug, Anika and Zhou, Xuebing and Dose, Michael and Brauckmann, Michael and Helbig, Jörg and Opel, Alexander and Neugebauer, Peter and Leowski, Katja and Sieber, Harald and Lotz, Oliver (2013):
Multi-Biometrische Gesichtserkennung.
In: Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Biedermann, Sebastian and Zittel, Martin and Katzenbeisser, Stefan (2013):
Improving security of virtual machines during live migrations.
In: IEEE Press, pp. 352-357, [Article]

Buchmann, Nicolas and Baier, Harald (2013):
Towards a more secure and scalable verifying PKI of eMRTD.
In: EuroPKI 2013, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan (2013):
POSTER: Event-based Isolation of Critical Data in the Cloud.
[Article]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Buchmann, Johannes and Cabarcas, Daniel and Göpfert, Florian and Hülsing, Andreas and Weiden, Patrick
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Braun, Johannes and Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Advances in Cryptology - ASIACRYPT 2013, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Buchegger, Sonja and Crowcroft, Jon and Krishnamurthy, Balachander and Strufe, Thorsten (2013):
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, pp. 22 -- 44, 3, (2), DOI: 10.4230/DagRep.3.2.22,
[Article]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, pp. 84-96, 3, (1), [Article]

Berger, E. and Vogt, D. and Haji-Ghassemi, N. and Jung, B. and Ben Amor, H. (2013):
Inferring Guidance Information in Cooperative Human-Robot Tasks.
In: Proceedings of the International Conference on Humanoid Robots (HUMANOIDS), [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Bocsi, B. and Csato, L. and Peters, J. (2013):
Alignment-based Transfer Learning for Robot Models.
In: International Joint Conference on Neural Networks (IJCNN), Dallas, Texas, USA, Aug 4, 2013 - Aug 9, 2013, [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Ben Amor, H. and Vogt, D. and Ewerton, M. and Berger, E. and Jung, B. and Peters, J. (2013):
Learning Responsive Robot Behavior by Imitation.
In: Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Bernard, Jürgen and Wilhelm, Nils and Krüger, Björn and May, Thorsten and Schreck, Tobias and Kohlhammer, Jörn (2013):
MotionExplorer: Exploratory Search in Human Motion Capture Data Based on Hierarchical Aggregation.
In: IEEE Transactions on Visualization and Computer Graphics, pp. 2257-2266, 19, (12), DOI: 10.1109/TVCG.2013.178,
[Article]

Bockholt, Ulrich and Wientapper, Folker and Wuest, Harald and Fellner, Dieter W. (2013):
Augmented-Reality-basierte Interaktion mit Smartphone-Systemen zur Unterstützung von Servicetechnikern.
In: at - Automatisierungstechnik, pp. 793-799, 61, (11), DOI: 10.1524/auto.2013.1056,
[Article]

Beutel, Johannes (2013):
Sub-Pixel Accurate Fiducial Marker Detection and Pose Estimation from CBCT-Data.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Berghöfer, Yannick (2013):
Human-Machine-Interfaces in Automotive Environments using Capacitive Proximity Sensors.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Bauer, Fabian (2013):
Realistic Realtime Rendering of Garment with Transparency and Ambient Occlusion.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Brodkorb, Felix (2013):
Visualisierung von Graphen mit geographischem Bezug.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Behrisch, Michael and Davey, James and Simon, Svenja and Schreck, Tobias and Keim, Daniel A. and Kohlhammer, Jörn (2013):
Visual Comparison of Orderings and Rankings.
Eurographics Association, Goslar, In: EuroVA 2013, DOI: 10.2312/PE.EuroVAST.EuroVA13.007-011,
[Conference or Workshop Item]

Biehl, Karl Robert (2013):
Part Based Object Detection with a Flexible Context Constraint : Supporting Object Detection with Easy Context.
Darmstadt, TU, Diplomarbeit, 2013, [Master Thesis]

Bauer, Fabian and Knuth, Martin and Kuijper, Arjan and Bender, Jan (2013):
Screen-Space Ambient Occlusion Using A-Buffer Techniques.
IEEE Computer Society Conference Publishing Services (CPS), Los Alamitos, Calif., In: 13th International Conference on Computer-Aided Design and Computer Graphics. Proceedings, DOI: 10.1109/CADGraphics.2013.26,
[Conference or Workshop Item]

Bockholt, Ulrich and Wuest, Harald and Wientapper, Folker and Engelke, Timo and Webel, Sabine (2013):
Augmented Reality Assistenzsysteme für Wartung und Service in Industrie, Bau und Gebäudemanagement.
Fraunhofer Verlag, Stuttgart, In: 16. IFF-Wissenschaftstage 2013. Tagungsband, [Conference or Workshop Item]

Bockholt, Ulrich and Webel, Sabine and Engelke, Timo and Olbrich, Manuel and Wuest, Harald (2013):
Skill Capturing and Augmented Reality for Training.
Taylor & Francis, CRC Press, Boca Raton, pp. 81-90, [Book Section]

Bockholt, Ulrich and Behr, Johannes (2013):
instantreality - Virtual and Augmented Reality Applications for Industrial Use.
Wissenschaftliche Scripten, Auerbach, In: VAR² 2013 - Realität Erweitern. Tagungsband, [Conference or Workshop Item]

Becker, Meike and Kirschner, Matthias and Sakas, Georgios (2013):
Segmentierung von Risikostrukturen der Otobasis für die minimalinvasive multi-port Chirurgie.
In: Curac 2013, [Conference or Workshop Item]

Becker, Meike and Gutbell, Ralf and Stenin, Igor and Wesarg, Stefan (2013):
Towards Automatic Path Planning for Multi-port Minimally-Traumatic Lateral Skull Base Surgery.
Springer, Berlin, Heidelberg, New York, In: Clinical Image-Based Procedures. From Planning to Intervention, In: Lecture Notes in Computer Science (LNCS); 7761, DOI: 10.1007/978-3-642-38079-2₈,
[Conference or Workshop Item]

Basgier, Dennis (2013):
Visual Analysis of Local Correspondence in Segmentation Quality.
TU Darmstadt, [Bachelor Thesis]

Burkhardt, Dirk and Nazemi, Kawa and Stab, Christian and Steiger, Martin and Kuijper, Arjan and Kohlhammer, Jörn (2013):
Visual Statistics Cockpits for Information Gathering in the Policy-Making Process.
Springer, Berlin, Heidelberg, New York, In: Advances in Visual Computing. 9th International Symposium, ISVC 2013, In: Lecture Notes in Computer Science (LNCS); 8034, DOI: 10.1007/978-3-642-41939-3₉,
[Conference or Workshop Item]

Beck, Sebastian (2013):
A Gesture Recognition Device with Visual Feedback Based on Capacitive Proximity Sensing.
TU Darmstadt, [Bachelor Thesis]

Burkhardt, Dirk and Nazemi, Kawa and Sonntagbauer, Peter and Kohlhammer, Jörn (2013):
Interactive Visualizations in the Process of Policy Modeling.
Köllen, Bonn, In: Electronic Government and Electronic Participation, In: GI-Edition - Lecture Notes in Informatics (LNI); P-221, [Conference or Workshop Item]

Binotto, Alécio P. D. and Wehrmeister, Marco A. and Kuijper, Arjan and Pereira, Carlos Eduardo (2013):
Sm@rtConfig: A Context-Aware Runtime and Tuning System Using an Aspect-Oriented Approach for Data Intensive Engineering Applications.
In: Control Engineering Practice, pp. 204-217, 21, (2), DOI: 10.1016/j.conengprac.2012.10.001,
[Article]

Bauer, Jörg and Friedmann, Martin and Hemker, Thomas and Pischan, M. and Reinl, Christian and Abele, Eberhard and Stryk, Oskar von
Denkena, Berend and Hollmann, Ferdinand (eds.) (2013):
Analysis of Industrial Robot Structure and Milling Process Interaction for Path Manipulation.
In: Process Machine Interactions : Predicition and Manipulation of Interactions between Manufacturing Processes and Machine Tool Structures, Berlin, Heidelberg, Springer, pp. 245-263, [Book Section]

Beckerle, P. and Wojtusch, J. and Rinderknecht, S. and Stryk, Oskar von (2013):
Mechanical Influences on the Design of Actuators with Variable Stiffness.
In: International Symposium on Adaptive Motion of Animals and Machines (AMAM), [Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Bär, Daniel and Zesch, Torsten and Gurevych, Iryna (2012):
Text Reuse Detection Using a Composition of Text Similarity Measures.
In: Proceedings of the 24th International Conference on Computational Linguistics (COLING 2012), Mumbai, India, [Online-Edition: http://aclweb.org/anthology/C12-1011],
[Conference or Workshop Item]

Bodden, Eric and Tolêdo, Társis and Ribeiro, Márcio and Brabrand, Claus and Borba, Paulo and Mezini, Mira (2012):
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf],
[Report]

Borges, Fábio and Martucci, Leonardo and Mühlhäuser, Max (2012):
Analysis of Privacy-Enhancing Protocols Based on Anonymity Networks.
Tainan City, Taiwan, In: IEEE SmartGridComm 2012 Symposium - Cyber Security and Privacy (IEEE SmartGridComm 2012 Symposium - Security), ISBN 978-1-4577-1703-1/12,
[Conference or Workshop Item]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Bischof, Christian H. and Bücker, H. Martin and Vehreschild, André and Willkomm, Johannes (2012):
Automatic Differentiation for Matlab (ADiMat).
Aachen, Germany, In: MATLAB-Day, RWTH Aachen University, [Conference or Workshop Item]

Bodden, Eric and Falzon, Kevin and Pun, Ka I. and Stolz, Volker (2012):
Delta-oriented Monitor Specification.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf],
[Conference or Workshop Item]

Bodden, Eric and Follner, Andreas and Rasthofer, Siegfried (2012):
Challenges in defining a programming language for provably correct dynamic analyses.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander
Ryan, Mark and Smyth, Ben and Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, Hangzhou, China, In: LNCS, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2012):
Towards fine-grained readability measures for self-directed language learning.
In: Proceedings of the SLTC 2012 workshop on NLP for CALL, Linköping University Electronic Press, Linköpings universitet, Lund, Sweden, In: Linköping Electronic Conference Proceedings, 80, [Online-Edition: http://www.ep.liu.se/ecp/080/002/ecp12080002.pdf],
[Conference or Workshop Item]

Borges, Fábio and Petzoldt, Albrecht and Portugal, Renato (2012):
Small private keys for systems of multivariate quadratic equations using symmetric cryptography.
TU Darmstadt, [Other]

Berchtold, Waldemar and Schäfer, Marcel (2012):
Performance and code length optimization of joint decoding tardos fingerprinting.
In: Proceedings of The 14th ACM Workshop on Multimedia and Security (MMSEC 2012), ACM, [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012, Birmingham, UK, [Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander and Vigil, Martín and Buchmann, Johannes
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Bruch, Marcel (2012):
IDE 2.0: Leveraging the Wisdom of the Software Engineering Crowds.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-31377],
[Ph.D. Thesis]

Bär, Daniel and Biemann, Chris and Gurevych, Iryna and Zesch, Torsten (2012):
UKP: Computing Semantic Textual Similarity by Combining Multiple Content Similarity Measures.
In: Proceedings of the 6th International Workshop on Semantic Evaluation, held in conjunction with the 1st Joint Conference on Lexical and Computational Semantics, [Online-Edition: http://www.aclweb.org/anthology/S12-1059],
[Conference or Workshop Item]

Behring, Alexander (2012):
Entwicklung multipler Benutzerschnittstellen für eine Anwendung.
TU Darmstadt, Fachbereich Informatik, [Online-Edition: urn:nbn:de:tuda-tuprints-29819],
[Ph.D. Thesis]

Böhme, David and Geimer, Markus and Wolf, Felix (2012):
Characterizing Load and Communication Imbalance in Large-Scale Parallel Applications.
IEEE Computer Society, In: Proc. of the 26th IEEE International Parallel & Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), Shanghai, China, [Conference or Workshop Item]

Böhme, David and de Supinski, Bronis R. and Geimer, Markus and Schulz, Martin and Wolf, Felix (2012):
Scalable Critical-Path Based Performance Analysis.
IEEE Computer Society, In: Proc. of the 26th IEEE International Parallel & Distributed Processing Symposium (IPDPS), Shanghai, China, ISSN 1530-2075,
DOI: 10.1109/IPDPS.2012.120,
[Conference or Workshop Item]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Braun, Johannes and Buchmann, Johannes
Levi, Albert and Badra, Mohamad and Cesana, Matteo and Ghassemian, Mona and Jabeur, Nafaa and Klonowski, Marek and Mana, Antonio and Sargento, Susana and Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Bockisch, Christoph and Sewe, Andreas and Yin, Haihan and Mezini, Mira and Aksit, Mehmet (2012):
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, pp. 1-28, 11, (1), ISSN 1660-1769,
[Online-Edition: http://dx.doi.org/10.5381/jot.2012.11.1.a7],
[Article]

Baumann, Leander (2012):
Using Human Visual Intelligence - Multiple Sequence Alignment as Serious Game.
TU Darmstadt, [Bachelor Thesis]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bodden, Eric (2012):
Towards Typesafe Weaving for Modular Reasoning in Aspect-Oriented Programs.
In: FOAL 2012: International Workshop on the Foundations of Aspect-Oriented Languages, [Conference or Workshop Item]

Bessani, Alysson and Abbadi, Imad M. and Bugiel, Sven and Cesena, Emanuele and Deng, Mina and Gröne, Michael and Marnau, Ninja and Nürnberger, Stefan and Pasin, Marcelo and Schirmer, Norbert (2012):
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing, [Book]

Bulygin, Stanislav and Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2012):
Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Bodden, Eric (2012):
Identifying meaningless parameterized linear-temporal-logic formulas.
[Report]

Bodden, Eric (2012):
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
[Report]

Böhmer, Stefan and Lange, Enno and Hafner, Martin and Cramer, Tim and Bischof, Christian and Hameyer, Kay (2012):
Mesh Decomposition for Efficient Parallel Computing of Electrical Machines by Means of FEM Accounting for Motion.
In: Ieee transactions on magnetics, IEEE, pp. 891-894, 48, (2), [Online-Edition: http://www.bibliothek.uni-regensburg.de/ezeit/?2025397],
[Article]

Berr, Nicolas and Schmidl, Dirk and Göbbert, Jens Henrik and Lankes, Stefan and an Mey, Dieter and Bemmerl, Thomas and Bischof, Christian (2012):
Trajectory-Search on ScaleMP's vSMP Architecture.
New York, NY, IOS Press, In: Applications, Tools and Techniques on the Road to Exascale Computing : proceedings of the 14th biennial ParCo conference ; ParCo2011 ; held in Ghent, Belgium / Ed. by Koen De Bosschere ..., In: Advances in Parallel Computing ; 22, [Conference or Workshop Item]

Böhmer, Stefan and Lange, Enno and Hafner, Martin and Cramer, Tim and Bischof, Christian and Hameyer, Kay (2012):
Mesh Decomposition for Efficient Parallel Computing of Electrical Machines by Means of FEM Accounting for Motion.
In: IEEE transactions on magnetics, IEEE, pp. 891-894, 48, (2), [Online-Edition: http://www.bibliothek.uni-regensburg.de/ezeit/?2025397],
[Article]

Bockisch, Christoph and Sewe, Andreas (2012):
The ALIA4J Approach to Efficient Language Implementation.
In: Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, In: Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, Tucson, AZ, USA, [Online-Edition: http://dx.doi.org/10.1145/2384716.2384726],
[Conference or Workshop Item]

Bischof, Christian and an Mey, Dieter and Iwainsky, Christian (2012):
Brainware for green HPC.
In: Computer Science - Research and Development, Springer Berlin / Heidelberg, pp. 1-7, [Online-Edition: http://dx.doi.org/10.1007/s00450-011-0198-5],
[Article]

Bischof, Christian and An Mey, Dieter and Iwainsky, Christian (2012):
Brainware for green HPC.
In: Computer Science-Research and Development, Springer, pp. 227-233, 27, (4), [Article]

Bodden, Eric and Lam, Patrick and Hendren, Laurie (2012):
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS), [Article]

Bodden, Eric (2012):
MOPBox: A Library Approach to Runtime Verification.
Springer, In: RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30, In: Lecture notes in computer science , 7186, [Online-Edition: http://www.bodden.de/pubs/bodden11mopbox.pdf],
[Conference or Workshop Item]

Beljan, Mate and Ackermann, Jens and Goesele, Michael (2012):
Consensus Multi-View Photometric Stereo.
In: Proceedings of DAGM-OAGM 2012, Springer LNCS, Graz, Austria, August 28-31, 2012, [Conference or Workshop Item]

Bremm, Sebastian and Hess, Martin and von Landesberger, Tatiana and Fellner, Dieter W. (2012):
PCDC – On the Highway to Data – A Tool for the Fast Generation of Large Synthetic Data Sets.
In: International Workshop on Visual Analytics, [Conference or Workshop Item]

Böhme, David and Hermanns, Marc-André and Wolf, Felix (2012):
Scalasca.
Shaker, In: Entwicklung und Evolution von Forschungssoftware, Rolduc, November 2011, In: Aachener Informatik-Berichte, Software Engineering, 14, [Conference or Workshop Item]

Beckerle, Philipp and Christ, O. and Wojtusch, Janis and Schuy, Jochen and Wolff, K. and Rinderknecht, Stephan and Vogt, Joachim and Stryk, Oskar von (2012):
Design and Control of a Robot for the Assessment of Psychological Factors in Prosthetic Development.
In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, Korea, 14 Oct - 17 Oct 2012, [Conference or Workshop Item]

Bartsch, Steffen and Sohr, Karsten and Bunke, Michaela and Hofrichter, Oliver and Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Binder, A. and Nakajima, S. and Kloft, M. and Müller, C. and Samek, W. and Brefeld, U. and Müller, K.-R. and Kawanabe, M. (2012):
Insights from Classifying Visual Concepts with Multiple Kernel Learning.
In: PLoS ONE, 7(8):e38897, [Article]

Brzuska, Christina and Dagdelen, Özgür and Fischlin, Marc (2012):
TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols.
In: Sicherheit 2012, Gesellschaft für Informatik, In: Sicherheit 2012, P-195, [Conference or Workshop Item]

Bender, Jens and Dagdelen, Özgür and Fischlin, Marc and Kügler, Dennis (2012):
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Financial Cryptography, Springer-Verlag, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen, [Ph.D. Thesis]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013), London, UK, [Conference or Workshop Item]

Binnig, Carsten and Rehrmann, Robin and Faerber, Franz and Riewe, Rudolf (2012):
FunSQL: It is time to make SQL functional.
In: Proceedings of the 2012 Joint EDBT/ICDT Workshops, [Conference or Workshop Item]

Bodden, Eric and Thies, Andreas (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs.
In: International Symposium on Software Testing and Analysis (ISSTA 2012), [Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2012):
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
(TUD-CS-2012-0106), [Report]

Bartsch, Steffen and Sasse, Angela
Ossowski, Sascha and Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, ACM, Trento, Italy, In: SAC '12, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt and Verbauwhede, Ingrid (2012):
Theory and Practice of a Leakage Resilient Masking Scheme.
In: Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings, DOI: 10.1007/978-3-642-34961-4₄₅,
[Online-Edition: https://doi.org/10.1007/978-3-642-34961-4_45],
[Conference or Workshop Item]

Biemann, Chris and Roos, Stefanie and Weihe, Karsten (2012):
Quantifying Semantics Using Complex Network Analysis.
In: Proceedings of COLING‐12, [Online-Edition: http://aclweb.org/anthology/C12-1017],
[Conference or Workshop Item]

Boularias, A. and Kroemer, O. and Peters, J. (2012):
Algorithms for Learning Markov Field Policies.
In: Advances in Neural Information Processing Systems 26 (NIPS 2012), [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Boularias, A. and Kroemer, O. and Peters, J. (2012):
Structured Apprenticeship Learning.
In: Proceedings of the European Conference on Machine Learning (ECML), Bristol, UK, September 24-28, 2012, [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Ben Amor, H. and Kroemer, O. and Hillenbrand, U. and Neumann, G. and Peters, J. (2012):
Generalization of Human Grasping for Multi-Fingered Robot Hands.
In: Proceedings of the International Conference on Robot Systems (IROS), [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Bocsi, B. and Hennig, P. and Csato, L. and Peters, J. (2012):
Learning Tracking Control with Forward Models.
In: Proceedings of the International Conference on Robotics and Automation (ICRA), St. Paul, Minnesota, USA, May 14-18, 2012, [Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=622...],
[Conference or Workshop Item]

Bein, Matthias and Peña Serna, Sebastian and Stork, André and Fellner, Dieter W. (2012):
Completing Digital Cultural Heritage Objects by Sketching Subdivision Surfaces toward Restoration Planning.
Springer, Berlin, Heidelberg, New York, In: Progress in Cultural Heritage Preservation, In: Lecture Notes in Computer Science (LNCS); 7616, DOI: 10.1007/978-3-642-34234-9₃₀,
[Conference or Workshop Item]

Baduza, G. and Eloff, Jan H.P. and Kok, D. and Encarnação, José L. and Merz, C. and Przewloka, M. (2012):
GUI 4D - The Role and the Impact of Visual, Multimedia and Multilingual User Interfaces in ICT Applications and Services for Users Coming from the Bottom of the Pyramid - First Concepts, Prototypes and Experiences.
Springer, Berlin, Heidelberg, New York, pp. 209-237, DOI: 10.1007/978-1-4471-2804-5₁₃,
[Book Section]

Berndt, René and Settgast, Volker and Eggeling, Eva and Schinko, Christoph and Krispel, Ulrich and Havemann, Sven and Fellner, Dieter W. (2012):
Ring's Anatomy - Parametric Design of Wedding Rings.
ThinkMind, In: CONTENT 2012, [Conference or Workshop Item]

Braun, Andreas and Heggen, Henning and Wichert, Reiner (2012):
CapFloor - A Flexible Capacitive lndoor Localization System.
Springer, Berlin, Heidelberg, New York, In: Evaluating AAL Systems Through Competitive Benchmarking. Indoor Localization and Tracking, In: Communications in Computer and Information Science; 309, DOI: 10.1007/978-3-642-33533-4₃,
[Conference or Workshop Item]

Bernard, Jürgen and Wilhelm, Nils and Scherer, Maximilian and May, Thorsten and Schreck, Tobias (2012):
TimeSeriesPaths: Projection-Based Explorative Analysis of Multivariate Time Series Data.
University of West Bohemia, Plzen, In: Journal of WSCG Vol. 20 No. 1-3, 2012. Proceedings, [Conference or Workshop Item]

Behrisch, Michael and Davey, James and Schreck, Tobias and Keim, Daniel A. and Kohlhammer, Jörn (2012):
Matrix-Based Visual Correlation Analysis on Large Timeseries Data.
IEEE Press, New York, In: IEEE Conference on Visual Analytics Science and Technology 2012. Proceedings, DOI: 10.1109/VAST.2012.6400549,
[Conference or Workshop Item]

Baumann, Leander (2012):
Using Human Visual Intelligence - Multiple Sequence Alignment as Serious Game.
TU Darmstadt, [Bachelor Thesis]

Bernard, Jürgen and Ruppert, Tobias and Scherer, Maximilian and Kohlhammer, Jörn and Schreck, Tobias (2012):
Content-Based Layouts for Exploratory Metadata Search in Scientific Research Data.
ACM, New York, In: JCDL 2012. Proceedings, DOI: 10.1145/2232817.2232844,
[Conference or Workshop Item]

Bremm, Sebastian and Heß, Martin and Landesberger, Tatiana von and Fellner, Dieter W. (2012):
PCDC - On the Highway to Data. A Tool for the Fast Generation of Large Synthetic Data Sets.
Eurographics Association, Goslar, In: EuroVA 2012, DOI: 10.2312/PE/EuroVAST/EuroVA12/007-011,
[Conference or Workshop Item]

Brix, Torsten and Fellner, Dieter W. and Krämer, Bernd J. and Schrader, Thomas (2012):
Workshop: Centers of Excellence for Research Information - Digital Text and Data Centers for Science and Open Research.
In: Eleed Journal, (8), [Article]

Berndt, René and Blümel, Ina and Sens, Irina and Clausen, Michael and Damm, David and Klein, Reinhard and Thomas, Verena and Wessel, Raoul and Diet, Jürgen and Fellner, Dieter W. and Scherer, Maximilian (2012):
PROBADO - A Digital Library System for Heterogeneous Non-textual Documents.
In: Eleed Journal, p. 5, (8), [Article]

Bernard, Jürgen and Ruppert, Tobias and Scherer, Maximilian and Schreck, Tobias and Kohlhammer, Jörn (2012):
Guided Discovery of Interesting Relationships Between Time Series Clusters and Metadata Properties.
ACM, New York, In: i-KNOW '12. Proceedings, In: ACM International Conference Proceedings Series; 642, DOI: 10.1145/2362456.2362485,
[Conference or Workshop Item]

Braun, Andreas and Wichert, Reiner (2012):
Dynamic User Representation in Video Phone Applications.
Springer, Berlin, Heidelberg, New York, In: Constructing Ambient Intelligence, In: Communications in Computer and Information Science; 277, DOI: 10.1007/978-3-642-31479-7₃₀,
[Conference or Workshop Item]

Bernard, Jürgen and Ruppert, Tobias and Goroll, Oliver and May, Thorsten and Kohlhammer, Jörn (2012):
Visual-Interactive Preprocessing of Time Series Data.
Linköping University Electronic Press, Linköping, In: Proceedings of SIGRAD 2012, In: Linköping Electronic Conference Proceedings; 81, [Conference or Workshop Item]

Betz, Detlef and Bothe, Michael and Braecklein, Martin and Bruhnke, Michael and Eberhardt, Birgid and Galkow-Schneider, Mandy and Fuchs, Gerhard and Gimpel, Nancy and Hartmann, Armin and Haverkamp, Tobias and Klaus, Harald and Keiser, Thomas and Pfaffner, Kevin and Pietsch, Ingo and Rachmann, Alexander and Rode-Schubert, Christina and Rumm, Peter and Stockmanns, Gudrun and Strunck, Stefan and Tunder, Ralph and Wernicke, Maximilian E. and Wichert, Reiner and Zähringer, Daniel (2012):
Ambient Assisted Living - Ein Markt der Zukunft : Potenziale, Szenarien, Geschäftsmodelle.
VDE-Verlag GmbH, Berlin, Offenbach, [Book]

Bokor, Péter (2011):
Efficient Verification of Fault-Tolerant Message-Passing Protocols.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-28185],
[Ph.D. Thesis]

Bulygin, Stanislav and Buchmann, Johannes
Lin, Dongdai and Tsudik, Gene and Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), Springer, Sanya, China, In: Lecture Notes in Computer Science, 7092, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]

Boneh, Dan and Dagdelen, Özgür and Fischlin, Marc and Lehmann, Anja and Schaffner, Christian and Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security, [Conference or Workshop Item]

Burger, Michael (2011):
Das effiziente Raytracen von Dreiecksnetzen auf Mehrkernprozessoren, GPUs und FPGAs mittels Geometrischer Algebra.
Darmstadt, TU Darmstadt, [Master Thesis]

Burgaß, Robert (2011):
Mobile Inhaltserfassung und mobiles Lernen mit dem Semantic Wiki im Bauingenieurwesen.
In: Fachforum Mobile Learning – Kompetenznetz E-Learning Hessen, Darmstadt, 16.11.2011, [Conference or Workshop Item]

Berger, Kai and Ruhl, Kai and Albers, Mark and Schröder, Yannic and Scholz, Alexander and Kokemüller, Jan and Guthe, Stefan and Magnor, Marcus (2011):
The capturing of turbulent gas flows using multiple kinects.
In: Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on, [Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Hülsing, Andreas
Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, Springer Berlin / Heidelberg, In: Lecture Notes in Computer Science - LNCS, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Twin Clouds: Secure Cloud Computing with Low Latency.
In: 12. Communications and Multimedia Security Conference (CMS'11), Springer, DOI: 10.1007/978-3-642-24712-5_3,
[Conference or Workshop Item]

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), ACM, DOI: 10.1145/2046707.2046753,
[Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
Practical and Lightweight Domain Isolation on Android.
In: Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), ACM Press, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Schulz, Steffen
Sadeghi, Ahmad-Reza and Zhang, Xinwen (eds.) (2011):
Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC), ACM Press, Chicago, Illinois, USA, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava (2011):
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
In: 18th ACM Conference on Computer and Communications Security (CCS'11), ACM, [Conference or Workshop Item]

Burgaß, Robert (2011):
Mobile Inhaltserfassung und mobiles Lernen mit dem Semantic Wiki im Bauingenieurwesen.
In: DeLFI 2011 – die 9. e-learning Fachtagung Informatik, Dresden, 05.09.2011, [Conference or Workshop Item]

Bodden, Eric (2011):
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Online-Edition: http://www.bodden.de/pubs/bodden11stateful.pdf],
[Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Klieme, Eric and Strick, Linda and Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]

Bartsch, Steffen (2011):
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
In: NSS &#039;11: Proceedings of the 5th International Conference on Network and System Security, IEEE Computer Society, Milan, Italy, DOI: 10.1109/ICNSS.2011.6060003,
[Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander and Hühnlein, Detlef
Schartner, Peter and Taeger, Jürgen (eds.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, syssec Verlag, Oldenburg, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Bär, Daniel and Zesch, Torsten and Gurevych, Iryna (2011):
A Reflective View on Text Similarity.
In: Proceedings of the International Conference on Recent Advances in Natural Language Processing, Hissar, Bulgaria, [Online-Edition: http://www.aclweb.org/anthology/R11-1071],
[Conference or Workshop Item]

Boularias, A. and Kroemer, O. and Peters, J. (2011):
Learning Robot Grasping from 3D Images with Markov Random Fields.
In: IEEE/RSJ International Conference on Intelligent Robot Systems (IROS), [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/publications/Boula...],
[Conference or Workshop Item]

Bartsch, Steffen (2011):
Practitioners Perspectives on Security in Agile Development.
In: FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security, IEEE Computer Society, Vienna, Austria, DOI: 10.1109/ARES.2011.82,
[Conference or Workshop Item]

Bodden, Eric (2011):
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
ACM, In: WODA '11: International Workshop on Dynamic Analysis, [Online-Edition: http://www.bodden.de/pubs/bodden11continuation.pdf],
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus
Nitaj, Abderrahmane and Pointcheval, David (eds.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Progress in Cryptology - AFRICACRYPT 2011, Springer Berlin / Heidelberg, Dakar, Senegal, In: Lecture Notes in Computer Science (LNCS), ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference or Workshop Item]

Bradler, Dirk and Krumov, Lachezar and Kangasharju, Jussi and Mühlhäuser, Max
Aguilera, M. and Yu, H. and Vaidya, N. and Srinivasan, V. and Choudhury, R. (eds.) (2011):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
6522, ISBN 978-3-642-17679-1_7,
DOI: 10.1007,
[Conference or Workshop Item]

Bhatti, Nadeem (2011):
Visual Semantic Analysis to Support Semi Automatic Modeling of Service Descriptions.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-26405],
[Ph.D. Thesis]

Barni, Mauro and Failla, Pierluigi and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), pp. 452-468, 6, (2), DOI: 10.1109/TIFS.2011.2108650,
[Article]

Bär, Daniel and Erbs, Nicolai and Zesch, Torsten and Gurevych, Iryna (2011):
Wikulu: An Extensible Architecture for Integrating Natural Language Processing Techniques With Wikis.
In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. System Demonstrations, Portland, OR, USA, [Online-Edition: http://www.aclweb.org/anthology/P11-4013],
[Conference or Workshop Item]

Barros, A. and Allgaier, M. and Charfi, A. and Heller, M. and Kylau, U. and Schmeling, B. and Stollberg, M. (2011):
Diversified Service Provisioning in Global Business Networks.
In: Proceedings of the SRII Global Conference (SRII), In: SRII Global Conference (SRII), 2011 Annual, San Jose, CA, USA, [Online-Edition: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5958152...],
[Conference or Workshop Item]

Beckerle, Matthias and Martucci, Leonardo and Mühlhäuser, Max and Ries, Sebastian
Beklen, A. and Ejarque, J. and Gentzsch, W. and Kanstren, T. and Koschel, A. and Lee, Y. W. and Li, L. and Zemlicka, M. (eds.) (2011):
Interactive Access Rule Learning for Access Control: Concepts and Design.
In: International Journal On Advances in Intelligent Systems, 4, [Conference or Workshop Item]

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza (2011):
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
(TR-2011-04), [Report]

Bodden, Eric (2011):
Closure Joinpoints: Block joinpoints without surprises.
ACM, In: AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development, [Online-Edition: http://www.bodden.de/pubs/bodden11closure.pdf],
[Conference or Workshop Item]

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
In: Workshop on Cryptography and Security in Clouds (WCSC'11), [Conference or Workshop Item]

Bradler, Dirk and Krumov, Lachezar and Aitenbichler, Erwin and Kangasharju, Jussi (2011):
BridgeFinder: Finding communication bottlenecks in distributed environments.
IEEE Intl. Conf. Information Networking (ICOIN), Barcelona, Spain, ISBN 978-1-61284-661-3,
[Conference or Workshop Item]

Bücker, H. M. and Willkomm, J. and Groß, S. and Fortmeier, O. (2011):
Discrete and Continuous Adjoint Approaches to Estimate Boundary Heat Fluxes in Falling Films.
In: Optimization Methods & Software, Taylor & Francis, pp. 105-125, 26, (1), ISSN 1055-6788 ,
[Article]

Bartsch, Steffen (2011):
An Authorization Enforcement Usability Case Study.
In: ESSoS 2011, Springer, Madrid, Spain, DOI: 10.1007/978-3-642-19125-1_16,
[Conference or Workshop Item]

Birk, Dominik and Heinson, Dennis and Wegener, Christoph (2011):
Virtuelle Spurensuche.
In: Datenschutz und Datensicherheit, pp. 329-332, [Article]

Bodden, Eric and Sewe, Andreas and Sinschek, Jan and Oueslati, Hela and Mezini, Mira (2011):
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
In: Proceedings of the 33rd International Conference on Software Engineering, New York, NY, USA, In: International Conference on Software Engineering, Waikiki, Honolulu, HI, USA, 21-28 May 2011, [Online-Edition: http://doi.acm.org/10.1145/1985793.1985827],
[Conference or Workshop Item]

Bank, Max (2011):
Eine Grafische Benutzeroberfläche für ein Poker-Spiel.
TU Darmstadt, [Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/bachelor/2011/B...],
[Master Thesis]

Büscher, Niklas (2011):
On Solving Pentago.
TU Darmstadt, [Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/bachelor/2011/B...],
[Master Thesis]

Baecher, Paul and Fischlin, Marc and Schröder, Dominique
Kiayias, Aggelos (ed.) (2011):
Expedient Non-malleability Notions for Hash Functions.
Springer, In: CT-RSA, In: Lecture Notes in Computer Science, 6558, [Conference or Workshop Item]

Bockisch, Christoph and Sewe, Andreas and Mezini, Mira and Akşit, Mehmet
Bishop, Judith and Vallecillo, Antonio (eds.) (2011):
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
In: Objects, Models, Components, Patterns, Berlin / Heidelberg, Springer, pp. 131-146, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-21952-8_11],
[Book Section]

Bocsi, B. and Nguyen-Tuong, D. and Csatol, L. and Schölkopf, B. and Peters, Jan (2011):
Learning Inverse Kinematics with Structured Prediction.
In: IEEE/RSJ International Conference on Intelligent Robot Systems (IROS), [Conference or Workshop Item]

Boularias, A. and Kroemer, O. and Peters, J. (2011):
Learning Robot Grasping from 3-D Images with Markov Random Fields.
In: IEEE/RSJ International Conference on Intelligent Robot Systems (IROS), [Conference or Workshop Item]

Boularias, A. and Kober, J. and Peters, J. (2011):
Model-free Inverse Reinforcement Learning.
In: Proceedings of the International Conference on Artificial Intelligence and Statistics (AIStats), In: Acceptance Rate: 28.3%, [Conference or Workshop Item]

Blanke, Ulf (2011):
Recognizing complex human activity based an activity spotting.
München, Verl. Dr. Hut, TU Darmstadt, ISBN 978-3-8439-0113-0,
[Ph.D. Thesis]

Borazio, Marko and Van Laerhoven, Kristof (2011):
Predicting Sleeping Behaviors in Long-Term Studies with Wrist-Worn Sensor Data.
Amsterdam, Springer Verlag, LNCS 7, [Online-Edition: http://www.springerlink.com/content/h955508761143442/],
[Conference or Workshop Item]

Bockisch, Christoph and Sewe, Andreas and Zandberg, Martin (2011):
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
In: Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11 & VMIL'11, New York, NY, USA, ACM, In: 5th workshop on Virtual Machines and Intermediate Languages, Portland, OR, USA, 24 Oct 2011, In: SPLASH '11 Workshops, [Online-Edition: http://doi.acm.org/10.1145/2095050.2095101],
[Conference or Workshop Item]

Bücker, H. M. and Bischof, C. H. (2011):
What computers can do for you automatically: the role of automatic differentiation in inverse modeling.
In: GACM Report, pp. 25-28, Spring, (6), [Article]

Bücker, H. Martin and Bischof, Christian H. (2011):
What computers can do for you automatically: The role of automatic differentiation in inverse modeling.
In: GACM Report, German Association for Computational Mechanics, pp. 25-28, Spring, (6), [Article]

Büsing, H. and Willkomm, J. and Bischof, C. H. and Clauser, C. (2011):
Using exact Jacobians in an implicit Newton method for solving multiphase flow in porous media.
In: Int. J. Computational Science and Engineering, Inderscience, ISSN 1742-7185,
[Article]

Buchmann, Irene and Frischbier, Sebastian and Pütz, Dieter (2011):
Towards an Estimation Model for Software Maintenance Costs.
In: Software Maintenance and Reengineering, European Conference on , IEEE Computer Society, pp. 313-316, [Article]

Bicer, Veli and Borgert, Stephan and Winkler, Matthias and Scheithauer, Gregor and Voigt, Konrad and Cardoso, Jorge and Aitenbichler, Erwin
Ali H. Dogru, Veli Bicer (ed.) (2011):
Modern Software Engineering Concepts and Practices: Advanced Approaches.
In: Modern Software Engineering Concepts and Practices: Advanced Approaches, Information Science Pub, [Book Section]

Beljan, Mate and Klowsky, Ronny and Goesele, Michael (2011):
A Multi-View Stereo Implementation on Massively Parallel Hardware.
[Report]

Bremm, Sebastian and Landesberger von Antburg, Tatiana and Hess, Martin and Schreck, Tobias and Weil, Philipp and Hamacher, Kay (2011):
Interactive Visual Comparison of Multiple Trees.
In: IEEE Visual Analytics Science and Technology, [Article]

Bradler, Dirk and Krumov, Lachezar and Kangasharju, Jussi and Mühlhäuser, Max (2011):
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In: In Proceedings of the 12th International Conference on Distributed Computing and Networking (ICDCN), [Conference or Workshop Item]

Borgert, Stephan and Steinmetz, Joachim and Mühlhäuser, Max (2011):
ePASS-IoS 1.1: Enabling Inter-enterprise Business Process Modeling by S-BPM and the Internet of Services Concept.
In: Subject-Oriented Business Process Management: Third International Conference, S-BPM ONE 2011, Springer Berlin Heidelberg, [Conference or Workshop Item]

Borgert, Stephan and Steinmetz, Joachim and Mühlhäuser, Max
Schmidt, Werner (ed.) (2011):
ePASS-IoS 1.1: Enabling Inter-enterprise Business Process Modeling by {S-BPM} and the Internet of Services Concept.
In: {S-BPM} {ONE} - Learning by Doing - Doing by Learning - Third International Conference, {S-BPM} {ONE} 2011, Ingolstadt, Germany, September 29-30, 2011. Proceedings, Springer, In: Communications in Computer and Information Science, 213, DOI: 10.1007/978-3-642-23471-2_14,
[Conference or Workshop Item]

Bodden, Eric and Hendren, Laurie (2011):
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer), [Article]

Binder, A. and Nakajima, S. and Kloft, M. and Müller, C. and Samek, W. and Brefeld, U. and Müller, K.-R. and Kawanabe, M. (2011):
Insights from Classifying Visual Concepts with Multiple Kernel Learning.
[Report]

Berjani, Betim and Strufe, Thorsten (2011):
A Recommendation System for Spots in Location-Based Online Social Networks.
In: Proceedings of the Eurosys Workshop on Social Network Systems, [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Schröder, Heike and Katzenbeisser, Stefan (2011):
Physically Uncloneable Functions in the Universal Composition Framework.
In: Advances in Cryptography (CRYPTO 2011), Springer, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan (2011):
Detecting Computer Worms in the Cloud.
In: Open Problems in Network Security (iNetSec 2011), Springer, [Conference or Workshop Item]

Bubel, Richard and Hähnle, Reiner and Geilmann, Ulrich
Barthe, Gilles and Schneider, Gerardo and Pardo, Alberto (eds.) (2011):
A Formalisation of Java Strings for Program Specification and Verification.
In: Proc. 9th International Conference on Software Engineering and Formal Methods ({SEFM}), Montevideo, Uruguay, IEEE Computer Society, [Conference or Workshop Item]

Bubel, Richard and Hähnle, Reiner and Ji, Ran
Aichernig, Bernhard and de Boer, Frank and Bonsangue, Marcello (eds.) (2011):
Program Specialization Via a Software Verification Tool.
In: Post Conf. Proc. 9th International Symposium on Formal Methods for Components and Objects (FMCO), Springer-Verlag, In: LNCS, [Conference or Workshop Item]

Baum-Waidner, Birgit and Kenyon, Christopher and Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
[Standards, patents]

Biedermann, Alexander and Piper, Thorsten and Patzina, Lars and Patzina, Sven and Huss, Sorin A. and Schürr, Andy and Suri, Neeraj (2011):
Enhancing FPGA Robustness via Generic Monitoring Cores.
In: 1st International Conference on Pervasive and Embedded Computing and Communication Systems, [Conference or Workshop Item]

Beckerle, Matthias and Martucci, Leonardo and Mühlhäuser, Max and Ries, Sebastian (2011):
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems, IARIA, pp. 234-244, [Book Section]

Brefeld, U. and Cambazoglu, B. B. and Junqueira, F. P. (2011):
Document Assignment in Multi-Site Search Engines.
In: Proceedings of the International Conference on Web Search and Data Mining, [Conference or Workshop Item]

Biemann, Chris and Giesbrecht, E. (2011):
Distributional Semantics and Compositionality 2011: Shared Task Description and Results.
In: Proceedings of the Workshop on Distributional Semantics and Compositionality at ACL 2011, [Online-Edition: http://www.aclweb.org/anthology/W11-1304],
[Conference or Workshop Item]

Boularias, A. and Kober, J. and Peters, J. (2011):
Relative Entropy Inverse Reinforcement Learning.
In: Proceedings of Fourteenth International Conference on Artificial Intelligence and Statistics (AISTATS 2011), Fort Lauderdale, FL, USA, April 11-13, 2011, [Online-Edition: http://jmlr.csail.mit.edu/proceedings/papers/v15/boularias11...],
[Conference or Workshop Item]

Bocsi, B. and Nguyen-Tuong, D. and Csato, L. and Schoelkopf, B. and Peters, J. (2011):
Learning Inverse Kinematics with Structured Prediction.
In: IEEE/RSJ International Conference on Intelligent Robot Systems (IROS), San Francisco, California, September 25-30, 2011, [Online-Edition: http://robot-learning.de/uploads/Publications/Bocsi_IROS_201...],
[Conference or Workshop Item]

Baecher, Paul and Büscher, Niklas and Fischlin, Marc and Milde, Benjamin (2011):
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, DOI: 10.1007/978-3-642-21424-0_5,
[Online-Edition: https://doi.org/10.1007/978-3-642-21424-0\_5],
[Conference or Workshop Item]

Bremm, Sebastian and Landesberger, Tatiana von and Andrienko, Gennady and Andrienko, Natalia and Schreck, Tobias (2011):
Interactive Analysis of Object Group Changes over Time.
Eurographics Association, Goslar, In: EuroVA 2011, DOI: 10.2312/PE/EuroVAST/EuroVA11/041-044,
[Conference or Workshop Item]

Breuel, Frank and Berndt, René and Ullrich, Torsten and Eggeling, Eva and Fellner, Dieter W. (2011):
Mate in 3D - Publishing Interactive Content in PDF3D.
Hacettepe University Department of Information Management, Ankara, In: Digital Publishing and Mobile Technologies, [Conference or Workshop Item]

Bremm, Sebastian and Landesberger, Tatiana von and Bernard, Jürgen and Schreck, Tobias (2011):
Assisted Descriptor Selection Based on Visual Comparative Data Analysis.
In: Computer Graphics Forum, pp. 891-900, 30, (3), DOI: 10.1111/j.1467-8659.2011.01938.x,
[Article]

Bockholt, Ulrich and Webel, Sabine and Staack, Ingo and Riedel, Michael and Rieß, Patrick and Olbrich, Manuel and Wuest, Harald (2011):
Kooperative Mixed Reality für Konstruktion und Fertigung im Schiffsbau.
Fraunhofer Verlag, Stuttgart, In: 14. IFF-Wissenschaftstage 2011. Tagungsband, [Conference or Workshop Item]

Becker, Meike and Kirschner, Matthias and Fuhrmann, Simon and Wesarg, Stefan (2011):
Automatic Construction of Statistical Shape Models for Vertebrae.
Springer, Berlin; Heidelberg; New York, In: Medical Image Computing and Computer-Assisted Intervention - MICCAI 2011: Part II, In: Lecture Notes in Computer Science (LNCS); 6892, DOI: 10.1007/978-3-642-23629-7₆₁,
[Conference or Workshop Item]

Binotto, Alécio P. D. and Pereira, Carlos Eduardo and Kuijper, Arjan and Stork, André and Fellner, Dieter W. (2011):
An Effective Dynamic Scheduling Runtime and Tuning System for Heterogeneous Multi and Many-Core Desktop Platforms.
IEEE Computer Society Conference Publishing Services (CPS), Los Alamitos, Calif., In: Proceedings 2011 IEEE International Conference on High Performance Computing and Communications, DOI: 10.1109/HPCC.2011.20,
[Conference or Workshop Item]

Bernard, Jürgen and Landesberger, Tatiana von and Bremm, Sebastian and Schreck, Tobias (2011):
Multi-Scale Visual Quality Assessment for Cluster Analysis with Self-Organizing Maps.
SPIE Press, Bellingham, In: Visualization and Data Analysis 2011, In: Proceedings of SPIE; 7868, DOI: 10.1117/12.872545,
[Conference or Workshop Item]

Beljan, Mate (2011):
Multi-view Photometric Stereo Using a Normal Consistency Approach.
Darmstadt, TU, Master Thesis, 2011, [Master Thesis]

Burkhardt, Dirk and Nazemi, Kawa and Breyer, Matthias and Stab, Christian and Kuijper, Arjan (2011):
SemaZoom: Semantics Exploration by Using a Layer-Based Focus and Context Metaphor.
Springer, Berlin, Heidelberg, New York, In: Human Centered Design, In: Lecture Notes in Computer Science (LNCS); 6776, DOI: 10.1007/978-3-642-21753-1₅₅,
[Conference or Workshop Item]

Bobev, Galin (2011):
Schätzung von Kartendarstellungen für automative Anwendungen durch 2D Scene Labeling.
TU Darmstadt, [Bachelor Thesis]

Benger, Werner and Heinzl, Rene and Hildenbrand, Dietmar and Weinkauf, Tino and Theisel, Holger and Tschumperlé, David (2011):
Differential Methods for Multi-Dimensional Visual Data Analysis.
Springer Science+Business Media, pp. 1533-1595, DOI: 10.1007/978-0-387-92920-0₃₅,
[Book Section]

Bremm, Sebastian and Landesberger, Tatiana von and Heß, Martin and Schreck, Tobias and Weil, Philipp and Hamacher, Kay (2011):
Interactive Visual Comparison of Multiple Trees.
IEEE Press, New York, In: IEEE Conference on Visual Analytics Science and Technology 2011. Proceedings, DOI: 10.1109/VAST.2011.6102439,
[Conference or Workshop Item]

Bein, Matthias and Fellner, Dieter W. and Stork, André (2011):
Genetic B-Spline Approximation on Combined B-Reps.
In: The Visual Computer, pp. 485-494, 27, (6-8), DOI: 10.1007/s00371-011-0592-9,
[Article]

Breyer, Matthias and Nazemi, Kawa and Stab, Christian and Burkhardt, Dirk and Kuijper, Arjan (2011):
A Comprehensive Reference Model for Personalized Recommender Systems.
Springer, Berlin, Heidelberg, New York, In: Human Interface and the Management of Information: Part I, In: Lecture Notes in Computer Science (LNCS); 6771, DOI: 10.1007/978-3-642-21793-7₆₀,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Stab, Christian and Breyer, Matthias and Wichert, Reiner and Fellner, Dieter W. (2011):
Natürliche Gesteninteraktion mit Beschleunigungssensorbasierten Eingabegeräten in unterstützenden Umgebungen.
VDE-Verl., Berlin u.a., In: Ambient Assisted Living, [Conference or Workshop Item]

Bader, Sebastian and Hanekamp, Nils and Heuten, Wilko and Kabitzsch, Klaus and Kirste, Thomas and Nelles, Sandra and Spöttle, Margit and Strese, Hartmut and Wallbruch, Rainer and Wichert, Reiner (2011):
Ambient Assisted Living (AAL) : Komponenten, Projekte, Services. Eine Bestandsaufnahme.
VDE-Verlag GmbH, Berlin, Offenbach, ISBN 978-3-8007-3328-6,
[Book]

Burkhardt, Dirk and Breyer, Matthias and Nazemi, Kawa and Kuijper, Arjan (2011):
Search Intention Analysis for User-Centered Adaptive Visualizations.
Springer, Berlin, Heidelberg, New York, In: Universal Access in Human-Computer Interaction: Part I, In: Lecture Notes in Computer Science (LNCS); 6765, DOI: 10.1007/978-3-642-21672-5₃₅,
[Conference or Workshop Item]

Bernard, Jürgen and Brase, Jan and Fellner, Dieter W. and Koepler, Oliver and Kohlhammer, Jörn and Ruppert, Tobias and Schreck, Tobias and Sens, Irina (2011):
A Visual Digital Library Approach for Time-Oriented Scientific Primary Data.
In: International Journal on Digital Libraries, pp. 111-123, 11, (2), DOI: 10.1007/s00799-011-0072-x,
[Article]

Bhatti, Nadeem and Fellner, Dieter W. (2011):
Visual Semantic Analysis to Support Semi-Automatic Modeling of Semantic Service Descriptions.
IGI Global, Hershey, pp. 151-195, DOI: 10.4018/978-1-60960-215-4.ch007,
[Book Section]

Burkhardt, Dirk and Breyer, Matthias and Glaser, Christian and Nazemi, Kawa and Kuijper, Arjan (2011):
Classifying Interaction Methods to Support Intuitive Interaction Devices for Creating User-Centered-Systems.
Springer, Berlin, Heidelberg, New York, In: Universal Access in Human-Computer Interaction: Part I, In: Lecture Notes in Computer Science (LNCS); 6765, DOI: 10.1007/978-3-642-21672-5₃,
[Conference or Workshop Item]

Becker, Meike and Kirschner, Matthias and Wesarg, Stefan (2011):
Konsistente Parametrisierung von Flächen vom Geschlecht 1 zur Bildung eines statistischen Formmodells des Wirbels.
Springer, Berlin; Heidelberg; New York, In: Bildverarbeitung für die Medizin 2011, In: Informatik aktuell, DOI: 10.1007/978-3-642-19335-4₁₇,
[Conference or Workshop Item]

Bausch, Daniel and Petrov, Ilia and Buchmann, Alejandro (2011):
On The Performance Of Database Query Processing Algorithms On Flash Solid State.
In: Proceedings Workshop on Flexible Database and Information System Technology, In: Proceedings Workshop on Flexible Database and Information System Technology, [Conference or Workshop Item]

Bulygin, Stanislav and Petzoldt, Albrecht and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Bugiel, Sven and