TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Ö | Č | Ş
Anzahl der Einträge auf dieser Ebene: 13357.

A

Akrour, R. ; Peters, J. ; Neuman, G. :
Constraint-Space Projection Direct Policy Search.
[Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...]
In: European Workshops on Reinforcement Learning (EWRL), Lille, France.
[Konferenz- oder Workshop-Beitrag] , (2018)

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan :
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: GI .
[Konferenz- oder Workshop-Beitrag] , (2018)

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas :
Estimate all the {LWE, NTRU} schemes!
[Online-Edition: http://scn.di.unisa.it/]
In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy. In: LNCS .
[Konferenz- oder Workshop-Beitrag] , (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max :
Towards Secure Distributed Trust Management on a Global Scale.
[Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....]
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag] , (2018)

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh :
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, Volume 2 (7)
[Artikel] , (2018)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), 2018, Barcelona, Spain.
[Konferenz- oder Workshop-Beitrag] , (2018)

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
[Artikel] , (2018)

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan :
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm]
In: Cryptography, 2 (3) ISSN 2410-387X
[Artikel] , (2018)

Amann, Sven :
A Systematic Approach to Benchmark and Improve Automated Static Detection of Java-API Misuses.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7422]
Technische Universität , Darmstadt
[Dissertation], (2018)

Arnold, Thomas Otmar :
Advanced Motif Analysis on Text Induced Graphs.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7442]
Technische Universität , Darmstadt
[Dissertation], (2018)

Aragon, Santiago ; Tiloca, Marco ; Maass, Max ; Hollick, Matthias ; Raza, Shahid :
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7696]
In: 2018 IEEE Conference on Communications and Network Security (CNS) ISSN 978-1-5386-4586-4
[Artikel] , (2018)

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit] , (2018)

Ahmad, Saad :
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt
[Masterarbeit] , (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max :
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
[Online-Edition: http://arxiv.org/abs/1801.05764]
In: CoRR, abs/1801.05764
[Artikel] , (2018)

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira :
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
[Artikel] , (2018)

Asokan, N. ; Nguyen, Thien Duc ; Tarkoma, Sasu ; Toivonen, Juhani ; Truong, Hien Thi Thu :
Proximity Verification Based on Acoustic Room Impulse Response.
[Online-Edition: http://arxiv.org/abs/1803.07211]
In: CoRR, abs/1803.07211
[Artikel] , (2018)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...]
In: IEEE Internet Computing p. 1. ISSN 1089-7801
[Artikel] , (2018)

Asokan, N. ; Miettinen, Markus :
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...]
In: Computer Communications ISSN 0140-3664
[Artikel] , (2018) (Im Druck)

Akrour, R. ; Veiga, F. ; Peters, J. ; Neuman, G. :
Regularizing Reinforcement Learning with State Abstraction.
[Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...]
In: Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[Konferenz- oder Workshop-Beitrag] , (2018)

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas :
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
ASIACRYPT 2017 - Advances in Cryptology Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit] , (2017)

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan :
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...]
In: 27th Crypto-Day, 7 - 8 December 2017, Frankfurt (Oder), Germany. Angewandte Kryptographie of Gesellschaft für Informatik e.V
[Konferenz- oder Workshop-Beitrag] , (2017)

Afridi, Hassaan Ali Khan :
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt
[Masterarbeit] , (2017)

Antonioli, Daniele ; Ghaeini, Hamid Reza ; Adepu, Sridhar ; Ochoa, Martin ; Tippenhauer, Nils Ole :
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science , 10707 . Springer , Cham, CH
[Konferenz- oder Workshop-Beitrag] , (2017)

Aroudj, Samir ; Seemann, Patrick ; Langguth, Fabian ; Guthe, Stefan ; Goesele, Michael :
Visibility-Consistent Thin Surface Reconstruction Using Multi-Scale Kernels.
In: ACM Transactions on Graphics (Proceedings of SIGGRAPH Asia), 36 (6) 187:1-187:13.
[Artikel] , (2017) (Im Druck)

Arul, Tolga :
Channel Switching-Triggered Charging for Pay-TV over IPTV.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6680]
Technische Universität , Darmstadt
[Dissertation], (2016)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag] , (2017)

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas :
MCMix: Anonymous Messaging via Secure Multiparty Computation.
[Online-Edition: https://www.usenix.org/conference/usenixsecurity17]
26th USENIX Security Symposium USENIX Association
[Konferenz- oder Workshop-Beitrag] , (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes] , (2017)

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub :
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE Trustcom IEEE
[Konferenz- oder Workshop-Beitrag] , (2017)

Atre, Rohit ; Jannesari, Ali ; Wolf, Felix :
Meeting the challenges of parallelizing sequential programs.
In: Proceedinggs of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Washington, DC, USA. ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Atre, Rohit ; Huda, Zia Ul ; Jannesari, Ali ; Wolf, Felix :
Dissecting sequential programs for parallelization - an approach based on computational units.
In: 10th International Symposium on High-Level Parallel Programming and Applications, Valladolid, Spain.
[Konferenz- oder Workshop-Beitrag] , (2017)

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan :
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day
[Konferenz- oder Workshop-Beitrag] , (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Artikel] , (2017)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) pp. 805-858.
[Artikel] , (2017)

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; El Bansarkhani, Rachid ; Krämer, Juliane :
A Framework to Select Parameters for Lattice-Based Cryptography.

[Anderes] , (2017)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip :
Revisiting TESLA in the quantum random oracle model.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Asokan, N. ; Davi, Lucas ; Dessouky, Ghada ; Koeberl, Patrick ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17).
[Konferenz- oder Workshop-Beitrag] , (2017)

Alexopoulos, Nikolaos :
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Proceedings of the 32nd Annual ACM Symposium on Applied Computing ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag] , (2017)

Arnold, Thomas ; Daxenberger, Johannes ; Weihe, Karsten ; Gurevych, Iryna :
Is Interaction More Important Than Individual Performance? A Study of Motifs in Wikia.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3041021.3053362]
In: WWW '17 Companion . International World Wide Web Conferences Steering Committee
[Konferenz- oder Workshop-Beitrag] , (2017)

Abualhaija, Sallam ; Miller, Tristan ; Eckle-Kohler, Judith ; Gurevych, Iryna ; Zimmermann, Karl-Heinz :
Metaheuristic Approaches to Lexical Substitution and Simplification.
[Online-Edition: http://aclweb.org/anthology/E/E17/E17-1082.pdf]
Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2017) Association for Computational Linguistics
[Konferenz- oder Workshop-Beitrag] , (2017)

Amend, Sandra C. :
Predicting Execution Time of GPU Kernels using automatic Performance Models.
TU Darmstadt
[Masterarbeit] , (2017)

Arazy, Ofer ; Lifshitz-Assaf, Hila ; Nov, Oded ; Daxenberger, Johannes ; Balestra, Martina ; Cheshire, Coye :
On the "How" and "Why" of Emergent Role Behaviors in Wikipedia.
[Online-Edition: https://dl.acm.org/citation.cfm?id=2998317]
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
[Konferenz- oder Workshop-Beitrag] , (2017)

Arzt, Steven :
Static Data Flow Analysis for Android Applications.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937]
Technische Universität , Darmstadt
[Dissertation], (2016)

Ali, Azad :
Fault-Tolerant Spatio-Temporal Compression Scheme for Wireless Sensor Networks.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5924]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Asadi, Arash ; Mancuso, Vincenzo ; Gupta, Rohit :
DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks.
In: IEEE/ACM Transactions on Networking
[Artikel] , (2017)

Abdulsamad, H. ; Arenz, O. ; Peters, J. ; Neumann, G. :
State-Regularized Policy Search for Linearized Dynamical Systems.
[Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...]
In: Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS).
[Konferenz- oder Workshop-Beitrag] , (2017)

Akrour, R. ; Sorokin, D. ; Peters, J. ; Neumann, G. :
Local Bayesian Optimization of Motor Skills.
[Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...]
In: Proceedings of the International Conference on Machine Learning (ICML).
[Konferenz- oder Workshop-Beitrag] , (2017)

Arazy, Ofer ; Daxenberger, Johannes ; Lifshitz-Assaf, Hila ; Nov, Oded ; Gurevych, Iryna :
Turbulent Stability of Emergent Roles: The Dualistic Nature of Self-Organizing Knowledge Co-Production.
[Online-Edition: https://pubsonline.informs.org/doi/abs/10.1287/isre.2016.064...]
In: Information Systems Research, 27 (4) pp. 792-812.
[Artikel] , (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2016)

Abel, Andrea ; Meyer, Christian M.
Klosa, Annette ; Müller-Spitzer, Carolin (eds.) :

Nutzerbeteiligung.
[Online-Edition: https://www.degruyter.com/view/books/9783050095615/978305009...]
In: Internetlexikografie. Ein Kompendium. Berlin: De Gruyter , pp. 249-290. ISBN 978-3-05-009561-5
[Buchkapitel] , (2016)

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander :
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.

[Report] , (2016)

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander :
Security aspects and comparison of block ciphers LED and TEA.

[Report] , (2016)

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga :
Low-temperature data remanence attacks against intrinsic SRAM PUFs.

[Report] , (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag] , (2016)

Arazy, Ofer ; Daxenberger, Johannes ; Lifshitz-Assaf, Hila ; Nov, Oded ; Gurevych, Iryna :
Emergent Roles in Self-Organizing Knowledge Co-Production: Turbulence and Stability.
[Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...]
In: 2017 Collective Intelligence Conference, New York, NY, USA.
[Konferenz- oder Workshop-Beitrag] , (2016)

Amann, Sven ; Proksch, Sebastian ; Nadi, Sarah :
FeedBaG: An Interaction Tracker for Visual Studio.
[Online-Edition: http://sven-amann.de/publications/feedbag.pdf]
In: International Conference on Program Comprehension, May 16–17, 2016, Austin, Texas, USA. In: ICPC .
[Konferenz- oder Workshop-Beitrag] , (2016)

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra :
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Amann, Sven ; Nadi, Sarah ; Nguyen, Hoan A. ; Nguyen, Tien N. ; Mezini, Mira :
MUBench: A Benchmark for API-Misuse Detectors.
In: 13th International Conference on Mining Software Repositories, May 14–15, 2016, Austin, Texas, USA. In: MSR'16 .
[Konferenz- oder Workshop-Beitrag] , (2016)

Amann, Sven ; Proksch, Sebastian ; Nadi, Sarah ; Mezini, Mira :
A Study of Visual Studio Usage in Practice.
[Online-Edition: http://dx.doi.org/10.1109/SANER.2016.39]
In: 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering, 14-18 March 2016, Osaka, Japan. In: SANER '16 .
[Konferenz- oder Workshop-Beitrag] , (2016)

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce :
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS , 9540 . Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander :
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.

[Report] , (2016)

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian :
Circuit Compilers with O(1/ log(n)) Leakage Rate.
[Online-Edition: http://eprint.iacr.org/2016/173]
In: IACR Cryptology ePrint Archive, 2016 p. 173.
[Artikel] , (2016)

Albert, Elvira ; Bubel, Richard ; Genaim, Samir ; Hähnle, Reiner ; Puebla, German ; Roman-Diez, Guillermo :
A formal verification framework for static analysis - As well as its instantiation to the resource analyzer COSTA and formal verification tool KeY.
[Online-Edition: https://doi.org/10.1007/s10270-015-0476-y]
In: Software and System Modeling, 15 (4) pp. 987-1012.
[Artikel] , (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes] , (2016)

Asadi, Arash ; Mancuso, Vincenzo :
Network-assisted Outband D2D-clustering in 5G Cellular Networks: Theory and Practice.
In: IEEE Transactions on Mobile Computing
[Artikel] , (2016)

Asadi, Arash ; Mancuso, Vincenzo ; Gupta, Rohit :
An SDR-based Experimental Study of Outband D2D Communications.
International Conference on Computer Communications IEEE
[Konferenz- oder Workshop-Beitrag] , (2016)

Arnold, Thomas ; Weihe, Karsten :
Network Motifs May Improve Quality Assessment of Text Documents.
[Online-Edition: http://www.aclweb.org/anthology/W16-1404]
Proceedings of TextGraphs-10: the Workshop on Graph-based Methods for Natural Language Processing
[Konferenz- oder Workshop-Beitrag] , (2016)

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian :
Circuit Compilers with O(1/log (n)) Leakage Rate.
[Online-Edition: https://doi.org/10.1007/978-3-662-49896-5_21]
In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II.
[Konferenz- oder Workshop-Beitrag] , (2016)

Arenz, O. ; Abdulsamad, H. ; Neumann, G. :
Optimal Control and Inverse Optimal Control by Distribution Matching.
[Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Team/OlegArenz/OC an...]
In: Proceedings of the International Conference on Intelligent Robots and Systems (IROS).
[Konferenz- oder Workshop-Beitrag] , (2016)

Abdolmaleki, A. ; Lau, N. ; Reis, L. ; Peters, J. ; Neumann, G. :
Contextual Policy Search for Linear and Nonlinear Generalization of a Humanoid Walking Controller.
[Online-Edition: https://link.springer.com/article/10.1007/s10846-016-0347-y]
In: Journal of Intelligent & Robotic Systems, 83 (3-4) pp. 393-408.
[Artikel] , (2016)

Akrour, R. ; Abdolmaleki, A. ; Abdulsamad, H. ; Neumann, G. :
Model-Free Trajectory Optimization for Reinforcement Learning.
[Online-Edition: http://proceedings.mlr.press/v48/akrour16.pdf]
Proceedings of the International Conference on Machine Learning (ICML)
[Konferenz- oder Workshop-Beitrag] , (2016)

Azad, M. ; Ortenzi, V. ; Lin, C. ; Rueckert, E. ; Mistry, M. :
Model Estimation and Control of Complaint Contact Normal Force.
[Online-Edition: https://rueckert.lima-city.de/papers/Humanoids2016Azad.pdf]
Proceedings of the International Conference on Humanoid Robots (HUMANOIDS)
[Konferenz- oder Workshop-Beitrag] , (2016)

Amann, Sven ; Beyer, Stefanie ; Kevic, Katja ; Gall, Harald
Meyer, Bertrand ; Nordio, Martin (eds.) :

Software Mining Studies: Goals, Approaches, Artifacts, and Replicability.
In: Advances in the theory and practice of software engineering - LASER 2013-2014. Springer , pp. 121-159.
[Buchkapitel] , (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2015)

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira :
Towards Secure Integration of Cryptographic Software.
[Online-Edition: http://2015.splashcon.org/track/onward2015-papers]
In: OOPSLA Onward!, 25.10.2015, Piitsburgh. In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software .
[Konferenz- oder Workshop-Beitrag] , (2015)

Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben :
Incremental Development of RBAC-controlled E-marking System Using the B Method.
Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015)
[Konferenz- oder Workshop-Beitrag] , (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report] , (2015)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter :
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.

[Anderes] , (2015)

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric :
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 14.06.2015, Portland, USA. Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis
[Konferenz- oder Workshop-Beitrag] , (2015)

Amin, Osama :
Implementation and Evaluation of PUF based Cryptographic Key Generation Schemes on FPGA.
TU Darmstadt
[Masterarbeit] , (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag] , (2015)

Allouis, E. ; Marc, R. ; Gancet, J. ; Nevatia, Y. ; Sonsalla, R. U. ; Fritsche, M. ; Machowinski, J. ; Vogele, T. ; Lewinger, W. ; Yeomans, B. ; Saaj, C. ; Gao, Y. ; Delfa, Juan ; Weclewski, P. ; Skocki, K. ; Imhof, B. ; Ransom, S. ; Richter, L. :
FP7 FASTER project - Demonstration of Multi-platform Operation for Safer Planetary Traverses.
ASTRA
[Konferenz- oder Workshop-Beitrag] , (2015)

Avdiienko, Vitalii ; Kuznetsov, Konstantin ; Gorla, Alessandra ; Zeller, Andreas ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
Mining Apps for Abnormal Usage of Sensitive Data.
2015 International Conference on Software Engineering (ICSE)
[Konferenz- oder Workshop-Beitrag] , (2015)

Alkeilani Alkadri, Nabil :
Post-Quantum Commitment Schemes.
TU Darmstadt
[Masterarbeit] , (2015)

Arabadzhieva, Vladislava :
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt
[Masterarbeit] , (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag] , (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag] , (2015)

Atre, Rohit ; Jannesari, Ali ; Wolf, Felix :
The Basic Building Blocks of Parallel Tasks.
[Online-Edition: http://doi.acm.org/10.1145/2723772.2723778]
In: Proc. of the International Workshop on Code Optimisation for Multi and Many Cores, San Francisco, CA, USA. ACM
[Konferenz- oder Workshop-Beitrag] , (2015)

Aroudj, Samir :
Meshless Collision Detection for Deformable Bodies.
TU Darmstadt
[Masterarbeit] , (2015)

Andrychowicz, Marcin ; Damgard, Ivan ; Dziembowski, Stefan ; Faust, Sebastian ; Polychroniadou, Antigoni :
Efficient Leakage Resilient Circuit Compilers.
[Online-Edition: https://doi.org/10.1007/978-3-319-16715-2_17]
In: Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (2015)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
[Online-Edition: https://arxiv.org/pdf/1511.02119.pdf]
In: CoRR, abs/1511.02119
[Artikel] , (2015)

Abdolmaleki, A. ; Lioutikov, R. ; Peters, J ; Lau, N. ; Reis, L. ; Neumann, G. :
Model-Based Relative Entropy Stochastic Search.
[Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Team/GerhardNeumann/...]
In: Advances in Neural Information Processing Systems (NIPS). mit press
[Konferenz- oder Workshop-Beitrag] , (2015)

Ackermann, Jens ; Langguth, Fabian ; Fuhrmann, Simon ; Kuijper, Arjan ; Goesele, Michael :
Multi-view Photometric Stereo by Example.
In: 3D Vision (3DV), 2014 2nd International Conference on (1) pp. 259-266.
[Artikel] , (2014)

Aly, Mohamed Abdulazim Mohamed :
An Extension Interface Concept for Multilayered Applications.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4247]
TU Darmstadt , Darmstadt
[Dissertation], (2014)

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[Konferenz- oder Workshop-Beitrag] , (2014)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel] , (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Artikel] , (2014)

Ahrendt, Wolfgang ; Beckert, Bernhard ; Bruns, Daniel ; Bubel, Richard ; Gladisch, Christoph ; Grebing, Sarah ; Hähnle, Reiner ; Hentschel, Martin ; Klebanov, Vladimir ; Mostowski, Wojciech ; Scheben, Christoph ; Schmitt, Peter ; Ulbrich, Mattias
Giannakopoulou, Dimitra ; Kroening, Daniel (eds.) :

The KeY Platform for Verification and Analysis of Java Programs.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Amann, Sven ; Proksch, Sebastian ; Mezini, Mira :
Method-Call Recommendations from Implicit Developer Feedback.
[Online-Edition: http://dx.doi.org/10.1145/2593728.2593730]
Proceedings of the 1st International Workshop on CrowdSourcing in Software Engineering - CSI-SE 2014
[Konferenz- oder Workshop-Beitrag] , (2014)

Appel, Stefan :
Integration of Event Processing with Service-oriented Architectures and Business Processes.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3978]
TU Darmstadt , Darmstadt
[Dissertation], (2014)

Ackermann, Jens :
Photometric Reconstruction from Images: New Scenarios and Approaches for Uncontrolled Input Data.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4060]
TU Darmstadt
[Dissertation], (2014)

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank :
Constructing Call Graphs of Scala Programs.
[Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3]
In: Proceedings of the 28th European Conference on Object-Oriented Programming. In: ECOOP '14 .
[Konferenz- oder Workshop-Beitrag] , (2014)

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick :
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh.
[Konferenz- oder Workshop-Beitrag] , (2014)

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric :
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices .
[Konferenz- oder Workshop-Beitrag] , (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad.
[Konferenz- oder Workshop-Beitrag] , (2014)

Albert, Elvira ; de Boer, Frank S. ; Hähnle, Reiner ; Johnsen, Einar Broch ; Schlatte, Rudolf ; Tarifa, Silvia Lizeth Tapia ; Wong, Peter Y. H. :
Formal modeling and analysis of resource management for cloud architectures: an industrial case study using Real-Time ABS.
[Online-Edition: https://doi.org/10.1007/s11761-013-0148-0]
In: Service Oriented Computing and Applications, 8 (4) pp. 323-339.
[Artikel] , (2014)

Asadi, Arash ; Mancuso, Vincenzo :
DRONEE: Dual-radio opportunistic networking for energy efficiency.
In: Computer Communications (Special issue: Green Networking)
[Artikel] , (2014)

Asadi, Arash ; Jacko, Peter ; Mancuso, Vincenzo :
Modeling D2D communications with LTE and WiFi.
In: ACM SIGMETRICS Performance Evaluation Review
[Artikel] , (2014)

Asadi, Arash ; Qing, Wang ; Mancuso, Vincenzo :
A Survey on Device-to-Device Communication in Cellular Networks.
In: IEEE Communications Surveys & Tutorials
[Artikel] , (2014)

Aderhold, Andreas ; Wilkosinska, Katarzyna ; Corsini, Massimiliano ; Jung, Yvonne ; Graf, Holger ; Kuijper, Arjan :
The Common Implementation Framework as Service - Towards Novel Applications for Streamlined Presentation of 3D Content on the Web.
In: Design, User Experience, and Usability. Proceedings Part II. In: Lecture Notes in Computer Science (LNCS); 8518 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2014)

Ackermann, Jens ; Langguth, Fabian ; Fuhrmann, Simon ; Kuijper, Arjan ; Goesele, Michael :
Multi-View Photometric Stereo by Example.
In: 3DV 2014 - Volume I. IEEE Computer Society, Los Alamitos, Calif.
[Konferenz- oder Workshop-Beitrag] , (2014)

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch] , (2013)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[Konferenz- oder Workshop-Beitrag] , (2013)

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian :
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
ICISC 2013
[Konferenz- oder Workshop-Beitrag] , (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2013)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13) pp. 364-381.
[Artikel] , (2013)

Abel, Andrea ; Meyer, Christian M.
Kosem, Iztok ; Kallas, Jelena ; Gantar, Polona ; Krek, Simon ; Langemets, Margit ; Tuulik, Maria (eds.) :

The dynamics outside the paper: user contributions to online dictionaries.
[Online-Edition: http://eki.ee/elex2013/proceedings/eLex2013_13_Abel+Meyer.pd...]
Proceedings of the 3rd Biennial Conference on Electronic Lexicography (eLex) Ljubljana: Trojina, Institute for Applied Slovene Studies/Tallinn: Eesti Keele Instituut
[Konferenz- oder Workshop-Beitrag] , (2013)

Aly, Mohamed ; Charfi, Anis ; Erdweg, Sebastian ; Mezini, Mira :
XPoints: Extension Interfaces for Multilayered Applications.
[Online-Edition: http://dx.doi.org/10.1109/EDOC.2013.34]
In: Enterprise Distributed Object Computing Conference (EDOC), 2013 17th IEEE International, 9 - 13 Sept., Vancouver, Canada.
[Konferenz- oder Workshop-Beitrag] , (2013)

Arzt, Steven ; Bodden, Eric :
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf]

[Report] , (2013)

Aly, M. ; Charfi, A. ; Erdweg, S. ; Mezini, M. :
Extension Interfaces for Multilayered Applications.
In: XPoints
[Artikel] , (2013)

Alaoui, Sidi Mohamed El Yousfi ; El Bansarkhani, Rachid ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard :
Code based Identification and Signature Schemes in Software.
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[Konferenz- oder Workshop-Beitrag] , (2013)

Aderhold, Markus ; Kochtchi, Artjom :
Tailoring PMD to Secure Coding.

[Report] , (2013)

Alsouri, Sami :
Behavior Compliance Control for More Trustworthy Computation Outsourcing.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3578]
TU Darmstadt , TU Darmstadt
[Dissertation], (2013)

Aderhold, Markus ; Gebhardt, Alexander ; Mantel, Heiko :
Choosing a Formalism for Secure Coding: FSM vs. LTL.

[Report] , (2013)

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...]

[Report] , (2013)

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian :
Vertrauenswürdige Smartphones: Technologien und Lösungen.
13. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag] , (2013)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2) pp. 209-232.
[Artikel] , (2013)

Amann, Sven :
Code Completion Based on Implicit User Feedback.
Technische Universität Darmstadt
[Masterarbeit] , (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag] , (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag] , (2013)

Aly, Mohamed ; Charfi, Anis ; Wu, Di ; Mezini, Mira :
Understanding multilayered applications for building extensions.
[Online-Edition: http://doi.acm.org/10.1145/2451592.2451594]
In: 1st Workshop on Comprehension of Complex Systems, March 25th, 2013, Fukuoka, Japan. In: CoCoS '13 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag] , (2013)

Aly, Mohamed ; Charfi, Anis ; Mezini, Mira :
Building Extensions for Applications: Towards the Understanding of Extension Possibilities.
[Online-Edition: http://dx.doi.org/10.1109/ICPC.2013.6613846]
In: 21st International Conference on Program Comprehension , May 20th - 21st, 2013, San Francisco, California, USA. In: ICPC 2013 . IEEE
[Konferenz- oder Workshop-Beitrag] , (2013)

Appel, Stefan ; Frischbier, Sebastian ; Freudenreich, Tobias ; Buchmann, Alejandro :
Event Stream Processing Units in Business Processes.
In: 11th International Conference on Business Process Management (BPM). Beijing, China
[Konferenz- oder Workshop-Beitrag] , (2013)

Aly, Mohamed ; Charfi, Anis ; Wu, Di ; Mezini, Mira :
Understanding multilayered applications for building extensions.
[Online-Edition: http://dx.doi.org/10.1145/2451592.2451594]
Proceedings of the 1st workshop on Comprehension of complex systems - CoCoS '13
[Konferenz- oder Workshop-Beitrag] , (2013)

Aly, Mohamed ; Charfi, Anis ; Erdweg, Sebastian ; Mezini, Mira :
XPoints: Extension Interfaces for Multilayered Applications.
[Online-Edition: http://dx.doi.org/10.1109/EDOC.2013.34]
2013 17th IEEE International Enterprise Distributed Object Computing Conference
[Konferenz- oder Workshop-Beitrag] , (2013)

Aly, Mohamed ; Charfi, Anis ; Mezini, Mira :
Building extensions for applications: Towards the understanding of extension possibilities.
[Online-Edition: http://dx.doi.org/10.1109/ICPC.2013.6613846]
2013 21st International Conference on Program Comprehension (ICPC)
[Konferenz- oder Workshop-Beitrag] , (2013)

Ali, Karim ; Lhoták, Ondřej :
Averroes: Whole-Program Analysis without the Whole Program.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16]
In: Proceedings of the 27th European Conference on Object-Oriented Programming. In: ECOOP '13 .
[Konferenz- oder Workshop-Beitrag] , (2013)

Ackermann, Jens ; Goesele, Michael :
A Survey of Photometric Stereo Techniques.
In: Foundations and Trends in Computer Graphics and Vision, 9 (3-4) pp. 149-154.
[Artikel] , (2013)

Ackermann, Jens ; Fuhrmann, Simon ; Goesele, Michael :
Geometric Point Light Source Calibration.
Proceedings of Vision, Modeling, and Visualization (VMV 2013),
[Konferenz- oder Workshop-Beitrag] , (2013)

Ackermann, Jens ; Goesele, Michael :
How bright is the moon? Recovering and Using Absolute Luminance Values from Internet Images.
Proceedings of the Fourth Computational Color Imaging Workshop Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Aroudj, Samir :
Grammar-Based Dungeon Generation For Massively Multiplayer Online Games.
Hochschule Trier
[Bachelorarbeit] , (2013)

Albert, Elvira ; de Boer, Frank S. ; Hähnle, Reiner ; Johnsen, Einar Broch ; Laneve, Cosimo
Solberg, Arnor ; Babar, Muhammad Ali ; Dumas, Marlon ; Cuesta, Carlos E. (eds.) :

Engineering virtualized services.
[Online-Edition: http://doi.acm.org/10.1145/2513534.2513545]
In: Second Nordic Symposium on Cloud Computing & Internet Technologies, NordiCloud '13, Oslo, Norway, September 1-3, 2013. In: ACM International Conference Proceeding Series , 826 . ACM
[Konferenz- oder Workshop-Beitrag] , (2013)

Albert, Elvira ; de Boer, Frank ; Hähnle, Reiner ; Johnsen, Einar Broch ; Laneve, Cosimo
Babar, Ali ; Dumas, Marlon (eds.) :

Engineering Virtualized Services.
2nd Nordic Symposium on Cloud Computing and Internet Technologies (NordiCloud) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2013)

Armknecht, Frederik ; Schulz, Steffen ; Wachsmann, Christian :
A security framework for the analysis and design of software attestation.

[Konferenz- oder Workshop-Beitrag] , (2013)

Alsouri, S. ; Feller, T. ; Malipatlolla, S. ; Katzenbeisser, S. :
Hardware-based Security for Virtual Trusted Platform Modules.
In:
[Artikel] , (2013)

Asadi, Arash ; Mancuso, Vincenzo :
A Survey on Opportunistic Scheduling in Wireless Communications.
In: IEEE Communications Surveys & Tutorials
[Artikel] , (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013)
[Artikel] , (2013)

Ahmed, Sarah ; Kaiser, Maximilian ; Kreutzer, Michael :
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.

[Report] , (2013)

Aderhold, Andreas ; Jung, Yvonne ; Wilkosinska, Katarzyna ; Fellner, Dieter W. :
Distributed 3D Model Optimization for the Web with the Common Implementation Framework for Online Virtual Museums.
In: 2013 Digital Heritage International Congress. Volume 2. The Institute of Electrical and Electronics Engineers (IEEE), New York
[Konferenz- oder Workshop-Beitrag] , (2013)

Augusto, Juan Carlos ; Grimstad, Terje ; Wichert, Reiner ; Schulze, Eva ; Braun, Andreas ; Rødevand, Gro Marit ; Ridley, Vanda :
Personalized Smart Environments to Increase Inclusion of People with Down's Syndrome.
In: Ambient Intelligence. In: Lecture Notes in Computer Science (LNCS); 8309 . Springer, Berlin; Heidelberg; New York
[Konferenz- oder Workshop-Beitrag] , (2013)

Appel, Stefan ; Frischbier, Sebastian ; Freudenreich, Tobias ; Buchmann, Alejandro :
Eventlets: Components for the Integration of Event Streams with SOA.
In: 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA).
[Konferenz- oder Workshop-Beitrag] , (2012)

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan :
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11]
In: 15th International Conference on Information Security, 19-21 Sep 2012, Passau, Germany. In: Lecture Notes in Computer Science (ISSN 0302-9743) , 7483 .
[Konferenz- oder Workshop-Beitrag] , (2012)

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi :
Challenges for Refinement and Composition of Instrumentations (Position Paper).
[Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf]
In: International Conference on Software Composition (SC 2012).
[Konferenz- oder Workshop-Beitrag] , (2012)

Alaoui, Sidi Mohamed El Yousfi ; Dagdelen, Özgür ; Véron, Pascal ; Galindo, David ; Cayrel, Pierre-Louis :
Extended Security Arguments for Signature Schemes.
In: AfricaCrypt 2012, LNCS (7374) 19 - 34.
[Artikel] , (2012)

Albert, Elvira ; Bubel, Richard ; Genaim, Samir ; Hähnle, Reiner ; Román-Díez, Guillermo :
Verified Resource Guarantees for Heap Manipulating Programs.
In: Lecture Notes in Computer Science , 7212 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2012)

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian :
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3) pp. 175-179.
[Artikel] , (2012)

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12) Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

an Mey, Dieter ; Biersdorff, Scott ; Bischof, Christian ; Diethelm, Kai ; Eschweiler, Dominic ; Gerndt, Michael ; Knüpfer, Andreas ; Lorenz, Daniel ; Malony, Allen D. ; Nagel, Wolfgang E. ; Oleynik, Yury ; Rössel, Christian ; Saviankou, Pavel ; Schmidl, Dirk ; Shende, Sameer S. ; Wagner, Michael ; Wesarg, Bert ; Wolf, Felix :
Score-P: A Unified Performance Measurement System for Petascale Applications.
In: Competence in High Performance Computing 2010 : Proceedings of an International Conference on Competence in High Performance Computing, June 2010, Schloss Schwetzingen, Germany / ed. by Christian Bischof. In: SpringerLink: Springer e-Books . Springer , Berlin u.a.
[Konferenz- oder Workshop-Beitrag] , (2012)

Aly, Mohamed ; Charfi, Anis ; Mezini, Mira :
On the extensibility requirements of business applications.
[Online-Edition: http://doi.acm.org/10.1145/2162004.2162006]
In: Proceedings of the 2012 workshop on Next Generation Modularity Approaches for Requirements and Architecture. In: NEMARA '12 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag] , (2012)

Ali, Karim ; Lhoták, Ondřej :
Application-Only Call Graph Construction.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30]
In: Proceedings of the 26th European Conference on Object-Oriented Programming. In: ECOOP '12 .
[Konferenz- oder Workshop-Beitrag] , (2012)

Ackermann, Jens ; Langguth, Fabian ; Fuhrmann, Simon ; Goesele, Michael :
Photometric Stereo for Outdoor Webcams.
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
[Konferenz- oder Workshop-Beitrag] , (2012)

an Mey, Dieter ; Biersdorff, Scott ; Bischof, Christian ; Diethelm, Kai ; Eschweiler, Dominic ; Gerndt, Michael ; Knüpfer, Andreas ; Saviankou, Pavel ; Schmidl, Dirk ; Shende, Sameer S. ; Wagner, Michael ; Wesarg, Bert ; Wolf, Felix ; Lorenz, Daniel ; Mallony, Allen D. ; Nagel, Wolfgang E. ; Oleynik, Yury ; Rössel, Christian :
Score-P: A Unified Performance Measurement System for Petascale Applications.
[Online-Edition: http://www.springerlink.com/content/t041605372024474/?MUD=MP]
In: Proc. of the CiHPC: Competence in High Performance Computing, HPC Status Konferenz der Gauß-Allianz e.V., Schwetzingen, Germany, June 2010. Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
International Conference on Cryptology in Africa (AFRICACRYPT 2012) Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef :
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7) pp. 24-32.
[Artikel] , (2012)

Ackermann, Jens ; Ritz, Martin ; Stork, André ; Goesele, Michael :
Removing the Example from Example-based Photometric Stereo.
In: Trends and Topics in Computer Vision. In: Lecture Notes in Computer Science (LNCS); 6554 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2012)

Altenhofen, Christian :
Effiziente Selbstschattierung in Szenen mit bildbasierter Beleuchtungsinformation und glänzenden Materialien.
Darmstadt, TU, Master Thesis, 2012
[Masterarbeit] , (2012)

Andriluka, Mykhaylo :
Detection, Tracking and Pose Estimation of People in Challenging Real-World Scenes.
[Online-Edition: urn:nbn:de:tuda-tuprints-27636]
TU Darmstadt
[Dissertation], (2010)

Anquetil, Nicolas ; Kulesza, Uirá ; Mateus, Ricardo ; Mitschke, Ralf ; Moreira, Ana ; Royer, Jean-Claude ; Rummler, Andreas
Rashid, Awais ; Royer, Jean-Claude ; Rummler, Andreas (eds.) :

Managing information flow in the SPL development process.
In: Aspect-oriented, model-driven software product lines. Cambridge University Press, New York, NY, USA , pp. 222-262. ISBN 978-0-521-76722-4
[Buchkapitel] , (2011)

Abdelmageed Mohamed, Wael Said :
Improvements for the XL Algorithm with Applications to Algebraic Cryptanalysis.
[Online-Edition: urn:nbn:de:tuda-tuprints-26216]
TU Darmstadt , Darmstadt, Germany
[Dissertation], (2011)

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian :
A Formal Foundation for the Security Features of Physical Functions.
IEEE Symposium on Security and Privacy (SSP) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2011)

Andrade, Rodrigo ; Ribeiro, Márcio ; Gasiunas, Vaidas ; Satabin, Lucas ; Rebelo, Herique ; Borba, Paulo :
Assessing Idioms for Implementing Features with Flexible Binding Times.
In: European Conference on Software Maintenance and Reengineering (CSMR), 2011.
[Konferenz- oder Workshop-Beitrag] , (2011)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
On the Design of Perturbation-Resilient Atomic Commit Protocols for Mobile Transactions.
In: ACM Transactions on Computer Systems
[Artikel] , (2011)

Appadurai, Daniel :
Entwurf eines serviceorientierten Recommender-Systems im BMW Group Kontext.
TU Darmstadt
[Masterarbeit] , (2011)

Alvaro, M. ; Peters, J. ; Schölkopf, B. ; Lawrence, N. :
Switched Latent Force Models for Movement Segmentation.
In: Advances in Neural Information Processing Systems 24 (NIPS 2010), Cambridge, MA: MIT Press. In: Spotlight � Acceptance Rate: 5.9% .
[Konferenz- oder Workshop-Beitrag] , (2011)

Aitenbichler, Erwin ; Borgert, Stephan ; Mühlhäuser, Max :
Distributed Execution of S-BPM Business Processes.
In: S-BPM ONE 2010 - The Subjectoriented BPM Conference. Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Abele, E. ; Bauer, J. ; Friedmann, Martin ; Pischan, M. ; Reinl, Christian ; von Stryk, Oskar :
Einsatz von Robotern in der spanenden Fertigung.
In: Wissenschaftsmagazin forschen. TU Darmstadt , p. 44.
[Buchkapitel] , (2011)

Abele, E. ; Bauer, J. ; Hemker, Thomas ; Laurischkat, R. ; Meier, H. ; Reese, S. ; von Stryk, Oskar :
Comparison and Validation of Implementations of a Flexible Joint Multibody Dynamics System Model for an Industrial Robot.
In: CIRP Journal of Manufacturing Science and Technology, 4 (1) p. 38.
[Artikel] , (2011)

Armknecht, Frederik ; Strufe, Thorsten :
An Efficient Distributed Privacy-preserving Recommendation System.
Proceedings of the 10th IEEE/IFIP Med-Hoc-Net
[Konferenz- oder Workshop-Beitrag] , (2011)

Albert, Elvira ; Bubel, Richard ; Genaim, Samir ; Hähnle, Reiner ; Puebla, Germán ; Román-Díez, Guillermo :
Verified Resource Guarantees using COSTA and KeY.
Proc. ACM SIGPLAN 2011 Workshop on Partial Evaluation and Program Manipulation (PEPM'11), Austin, Texas, USA ACM Press
[Konferenz- oder Workshop-Beitrag] , (2011)

Ahmed, Sarah :
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt
[Masterarbeit] , (2011)

Amodeo, G. ; Blanco, R. ; Brefeld, U. :
Hybrid Models for Future Event Prediction.
Proceedings of the International ACM Conference on Information and Knowledge Management
[Konferenz- oder Workshop-Beitrag] , (2011)

Alaoui, Sidi Mohamed El Yousfi ; Cayrel, Pierre-Louis ; Meziani, Mohammed
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) :

Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: Communications in Computer and Information Science , 200 . Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian :
Impossibility Results for RFID Privacy Notions.
In: LNCS , 6480 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Aitenbichler, Erwin ; Borgert, Stephan ; Mühlhäuser, Max :
Automatic Service Composition for the Internet of Services.
In: 3rd GI/ITG KuVS Fachgespräch on NG SDPs: \"Towards SDPs for the Future Internet\". Gesellschaft für Informatik KuVS
[Konferenz- oder Workshop-Beitrag] , (2010)

Anjorin, Anthony ; Lauder, Marius ; Schlereth, Michael ; Schürr, Andy :
Support for Bidirectional Model-to-Text Transformations.
In: Electronic Communications of the EASST , 36 . European Assoc. of Software Science and Technology
[Konferenz- oder Workshop-Beitrag] , (2010)

Ayari, Brahim :
Perturbation-Resilient Atomic Commit Protocols for Mobile Environments.
[Online-Edition: urn:nbn:de:tuda-tuprints-22740]
TU Darmstadt
[Dissertation], (2010)

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15. European Symposium on Research in Computer Security (ESORICS'10) Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Alnusair, Awny ; Zhao, Tian ; Bodden, Eric :
Effective API Navigation and Reuse.
In: International Conference on Conference on Information Reuse and Integration (IEEE IRI). IEEE
[Konferenz- oder Workshop-Beitrag] , (2010)

Appel, Stefan ; Sachs, Kai ; Buchmann, Alejandro :
Towards Benchmarking of AMQP.
In: 4th ACM International Conference on Distributed Event-Based Systems (DEBS).
[Konferenz- oder Workshop-Beitrag] , (2010)

Abele, E. ; Bauer, J. ; Pischan, M. ; von Stryk, Oskar ; Friedmann, Martin ; Hemker, Thomas :
Prediction of the Tool Displacement for Robot Milling Applications using Co-Simulation of an Industrial Robot and a Removal Process.
CIRP 2nd International Conference Process Machine Interactions
[Konferenz- oder Workshop-Beitrag] , (2010)

Aitenbichler, Erwin ; Schnelle-Walka, Dirk :
An Extensible Architecture for Multitouch & Pen Interactive Tables.
Engineering Patterns for Multi-Touch Interfaces 2010, in congunction with EICS 2010
[Konferenz- oder Workshop-Beitrag] , (2010)

Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian :
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS , 6123 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
Anonymous Authentication for RFID Systems.
In: LNCS , 6370 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk :
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, Special Issue of IOPTS 1 - 7.
[Artikel] , (2010)

Appel, Stefan ; Sachs, Kai ; Buchmann, Alejandro :
Quality of Service in Event-based Systems.
In: 22nd GI-Workshop on Foundations of Databases (GvD).
[Konferenz- oder Workshop-Beitrag] , (2010)

Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David :
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Attig, Norbert ; Berberich, Florian ; Detert, Ulrich ; Eicker, Nobert ; Eickermann, Thomas ; Gibbon, Paul ; Gürich, Wolfgang ; Homberg, Willi ; Illich, Antonia ; Rinke, Sebastian ; Stephan, Michael ; Wolkersdorfer, Klaus ; Lippert, Thomas
Münster, Gernot ; Wolf, Dietrich ; Kremer, Manfred (eds.) :

Entering the Petaflop-Era - New Developments in Supercomputing.
In: NIC Symposium 2010, Jülich. In: IAS Series , 3 . John von Neumann Institute for Supercomputing
[Konferenz- oder Workshop-Beitrag] , (2010)

Ali, Azad ; Khelil, Abdelmajid ; Shaikh, Faisal Karim ; Suri, Neeraj :
Effcient Predictive Monitoring of Wireless Sensor Networks.
In: Special Edition of "International Journal of Autonomous and Adaptive Communications Systems (IJAACS)"
[Artikel] , (2010)

Aderhold, Markus
Esparza, Javier ; Majumdar, Rupak (eds.) :

Automated Termination Analysis for Programs with Second-Order Recursion.
16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16) Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Aderhold, Markus ; Cuéllar, Jorge ; Mantel, Heiko ; Sudbrock, Henning :
Exemplary Formalization of Secure Coding Guidelines.
In: aderhold.ea:exemplary:2010a . Germany
[Report] , (2010)

Appel, Stefan ; Petrov, Ilia ; Buchmann, Alejandro :
Performance Evaluation of Multi Machine Virtual Environments.
In: Proceedings of the 2010 SPEC Benchmark Workshop.
[Konferenz- oder Workshop-Beitrag] , (2010)

Aitenbichler, Erwin ; Borgert, Stephan
Buchwald, H. ; Fleischmann, A. ; Seese, D. ; Stary, C. (eds.) :

Application of Subject-oriented Modeling in Automatic Service Composition.
In: S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management. Communications in Computer and Information Science, 85 (85). Springer, Berlin ; Heidelberg Karlsruhe , pp. 71-82.
[Buchkapitel] , (2010)

Andriluka, Mykhaylo ; Kohlbrecher, Stefan ; Meyer, Johannes ; Petersen, Karen ; Schitzspan, Paul ; von Stryk, Oskar :
RoboCupRescue 2010 - Robot League Team Hector Darmstadt (Germany).

[Report] , (2010)

Andriluka, Mykhaylo ; Schnitzspan, Paul ; Meyer, Johannes ; Kohlbrecher, Stefan ; Petersen, Karen ; von Stryk, Oskar ; Roth, Stefan ; Schiele, Bernt :
Vision Based Victim Detection from Unmanned Aerial Vehicles.
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
[Konferenz- oder Workshop-Beitrag] , (2010)

Aitenbichler, Erwin ; Schnelle-Walka, Dirk :
An Extensible Architecture for Multitouch & Pen Interactive Tables.
Engineering Patterns for Multi-Touch Interfaces, Workshop Proceedings of ACM EICS
[Konferenz- oder Workshop-Beitrag] , (2010)

Appel, Stefan ; Sachs, Kai
Sachs, Kai ; Petrov, Ilia ; Guerrero, Pablo (eds.) :

From Active Data Management to Event-Based Systems and More.
In: Keine Angabe Lecture Notes in Computer Science, 6462. Springer , pp. 312-324. ISBN 978-3-642-17225-0
[Buchkapitel] , (2010)

Aderhold, Markus
Esparza, J. ; Majumdar, R. (eds.) :

Automated Termination Analysis for Programs with Second-Order Recursion.
In: LNCS 6015 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Aderhold, Markus
Giesl, J. ; Hähnle, R. (eds.) :

Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
In: LNAI 6173 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Ackermann, Tobias ; Brandt, Björn ; Buxmann, Peter :
Risiken der Adoption von SaaS.
In: Software-as-a-Service (SaaS) ? {"U}ber den Wandel von Anbieterstrategien, Kundenbedürfnissen und Marktstrukturen in der SW-Industrie
[Artikel] , (2010)

Alvaro, Mauricio A. ; Peters, Jan ; Schoelfkopf, Bernhard ; Lawrence, Neil D. :
Switched Latent Force Models for Movement Segmentation.
[Online-Edition: http://robot-learning.de/uploads/Publications/Alvarez_NIPS_2...]
In: 24th Annual Conference on Neural Information Processing Systems 2010, 2010.12.06-09, Vancouver, Canada. Advances in neural information processing systems 23 : Proceedings of the 2010 Conference Neural Information Processing Systems Foundation , Red Hook, NY : Curran
[Konferenz- oder Workshop-Beitrag] , (2010)

Andrienko, Gennady ; Andrienko, Natalia ; Bak, Peter ; Bremm, Sebastian ; Keim, Daniel A. ; Landesberger, Tatiana von ; Pölitz, Christian ; Schreck, Tobias :
A Framework for Using Self-Organizing Maps to Analyze Spatio-Temporal Patterns, Exemplified by Analysis of Mobile Phone Usage.
In: Journal of Location Based Services, 4 (3-4) pp. 200-221.
[Artikel] , (2010)

Andrienko, Gennady ; Andrienko, Natalia ; Bremm, Sebastian ; Schreck, Tobias ; Landesberger, Tatiana von ; Bak, Peter ; Keim, Daniel A. :
Space-in-Time and Time-in-Space Self-Organizing Maps for Exploring Spatiotemporal Patterns.
In: Computer Graphics Forum, 29 (3) pp. 913-922.
[Artikel] , (2010)

Aderhold, Markus Axel :
Verification of second-order functional programs.
Technische Universität , Darmstadt
[Dissertation]

Avdil, Alaubek :
A Novel LP-based Local Search Technique -Fast and Quite Good-.
[Online-Edition: urn:nbn:de:tuda-tuprints-19149]
Technische Universität , Darmstadt
[Dissertation], (2009)

Aderhold, Markus Axel :
Verification of Second-Order Functional Programs.
[Online-Edition: urn:nbn:de:tuda-tuprints-18652]
Technische Universität , Darmstadt
[Dissertation], (2009)

Amann, Sven :
Spezifikation und Codegenerierung von Sicherheitsautomaten.
TU Darmstadt
[Bachelorarbeit] , (2009)

Abboud, Osama ; König, André ; Gottron, Christian :
Quality Adaptation and Security in Peer-to-Peer Systems.
In: 9th Würzburg Workshop on IP, Würzburg. Proceedings 9th Würzburg Workshop on IP: Joint ITG and Euro-NF Workshop "Visions of I Generation Networks" (EuroView 2009) Würzburg
[Konferenz- oder Workshop-Beitrag] , (2009)

Anquetil, Nicolas ; Kulesza, Uirá ; Mitschke, Ralf ; Moreira, Ana ; Royer, Jean-Claude ; Rummler, Andreas ; Sousa, André :
A model-driven traceability framework for software product lines.
[Online-Edition: http://www.springerlink.com/content/wvm4hv8r78117785/]
In: Software and Systems Modeling ISSN 1619-1366 (Print) 1619-1374 (Online)
[Artikel] , (2009)

Alfonseca, Enrique ; Hall, Keith ; Hartmann, Silvana :
Large-scale Computation of Distributional Similarities for Queries.
[Online-Edition: http://www.aclweb.org/anthology/N09-2008]
Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL-HLT), Companion Volume: Short Papers
[Konferenz- oder Workshop-Beitrag] , (2009)

Abboud, Osama ; Kovacevic, Aleksandra ; Graffi, Kalman ; Pussep, Konstantin ; Steinmetz, Ralf :
Underlay Awareness in P2P Systems: Techniques and Challenges.
In: 2009 IEEE International Symposium on Parallel & Distributed Processing : (IPDPS 2009) ; Rome, Italy, 23 - 29 May 2009. IEEE, Piscataway, NJ ISBN 978-1-4244-3750-4
[Buchkapitel] , (2009)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
Exploring Delay-Aware Transactions in Heterogenous Mobile Environments.
In: Journal of Software, Special Issue: Selected Papers of The 6th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 4 (7) pp. 634-643.
[Artikel] , (2009)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
Exploring Delay-Aware Transactions in Heterogeneous Mobile Environments.
In: Journal Of Software Special Issue: Selected Papers of The 6th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 4 pp. 634-643.
[Artikel] , (2009)

Awerbuch, Wladimir :
Anwendung von Data Mining zu statistischen Auswertungen und Vorhersagen im Sport.
[Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/diplom/2009/Awe...]
TU Darmstadt
[Masterarbeit] , (2009)

Abraham, Rene :
On­to­log­i­cal De­scrip­tion of UI In­ter­ac­tions.
TU Darmstadt
[Masterarbeit] , (2009)

Ali, Karim ; Aib, Issam ; Boutaba, Raouf :
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[Konferenz- oder Workshop-Beitrag] , (2009)

Ali, Karim ; Boutaba, Raouf :
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[Konferenz- oder Workshop-Beitrag] , (2009)

Andriluka, Micha ; Friedmann, Martin ; Kohlbrecher, Stefan ; Meyer, Johannes ; Petersen, Karen ; Reinl, Christian ; Schauss, Peter ; Schnitzpan, Paul ; Strobel, Armin ; Thomas, Dirk ; von Stryk, Oskar :
RoboCupRescue 2009 - Robot League Team: Darmstadt Rescue Robot Team (Germany).
Graz
[Report] , (2009)

Ackermann, Jens ; Baecher, Paul ; Franzel, Thorsten ; Goesele, Michael ; Hamacher, Kay :
Massively-Parallel Simulation of Biochemical Systems.
In: Jahrestagung der Gesellschaft für Informatik e.V., September 29, 2009, Lübeck, Germany. Proceedings of Massively Parallel Computational Biology on GPUs
[Konferenz- oder Workshop-Beitrag] , (2009)

Aitenbichler, Erwin ; Lyardet, Fernando ; Hadjakos, Aristotelis ; Mühlhäuser, Max :
Fine-Grained Evaluation of Local Positioning Systems for Specific Target Applications.
In: LNCS , 5585 . Springer Berlin-Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2009)

Adolph, Daniel :
Fractional Recoding for the Shamir Method.
Technische Universität Darmstadt
[Masterarbeit] , (2009)

Arzt, Steven :
Design and Implementation of a Cryptographic Plugin for E-mail Clients.

[Anderes] , (2009)

Amann, Sven :
Spezifikation und Codegenerierung von Sicherheitsautomaten.

[Anderes] , (2009)

Abdulla, Parosh Aziz ; Atto, Muhsin ; Cederberg, Jonathan ; Ji, Ran
Liu, Zhiming ; Ravn, Anders (eds.) :

Automated Analysis of Data-Dependent Programs with Dynamic Memory.
In: LNCS , 5799 . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Ahrendt, Wolfgang ; Bubel, Richard ; Hähnle, Reiner
Gibbons, J. ; Oliveira, J. N. (eds.) :

Integrated and Tool-Supported Teaching of Testing, Debugging, and Verification.
[Online-Edition: https://doi.org/10.1007/978-3-642-04912-5_9]
In: Teaching Formal Methods, Second International Conference, TFM 2009, November 2-6, 2009, Eindhoven. In: LNCS , 5846 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2009)

Ackermann, Tobias ; Widjaja, Thomas ; Buxmann, Peter :
Increasing the Diffusion of Communication Standards - A General Simulation Framework from the Vendor?s Perspective.
Proceedings of the 6th International Conference on Standardization and Innovation in Information Technology (SIIT2009)
[Anderes] , (2009)

Alonso, Gustavo ; Kossmann, Donald ; Roscoe, Timothy ; Tatbul, Nesime ; Baumann, Andrew ; Binnig, Carsten ; Fischer, Peter ; Riva, Oriana ; Teubner, Jens :
The ETH Zurich systems group and enterprise computing center.
In: ACM SIGMOD Record, 37 (4) pp. 94-99.
[Artikel] , (2009)

Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max :
Shaping the Future Internet.
Proceedings of the 3rd International CompanionAble Workshop IoPTS
[Konferenz- oder Workshop-Beitrag] , (2009)

Alemu, Yihun ; Koh, Jong-bin ; Ikram, Muhammed ; Kim, Dong-Kyoo :
Image Retrieval in Multimedia Databases: A Survey.
In: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on pp. 681-689.
[Artikel] , (2009)

Akram, Shahid :
Coronary Tree Segmentation Using an Enhanced Corkscrew Algorithm.
Darmstadt, TU, Master Thesis, 2009
[Masterarbeit] , (2009)

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina :
Smart Products: Integration Challenges.
Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08)
[Konferenz- oder Workshop-Beitrag] , (2008)

Amelunxen, Carsten ; Legros, Elodie ; Schürr, Andy :
Generic and Reflective Graph Transformations for the Checking and Enforcement of Modeling Guidelines.
In: VLHCC '08: Proceedings of the Visual Languages and Human-Centric Computing. In: IEEE Symposium on Visual Languages & Human-Centric Computing .
[Konferenz- oder Workshop-Beitrag] , (2008)

Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru :
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Sixth Conference on Security and Cryptography for Networks (SCN 2008)
[Konferenz- oder Workshop-Beitrag] , (2008)

Aitenbichler, Erwin ; Rößling, Guido :
Webreg: An Online System for Registration and Grade Distribution.
Proceedings of the ACM Innovation and Technology in Computer Science Education Conference (ITiCSE'08), Madrid, Spain ACM Press, New York, NY
[Konferenz- oder Workshop-Beitrag] , (2008)

Armknecht, Frederik ; Mirzadeh, Shahab ; Tafazolli, Rahim ; Pallares, Jordi Jaen ; Afifi, Hossam :
CPFP: An efficient key management scheme for large scale personal networks.
IEEE ISWPC 2008
[Konferenz- oder Workshop-Beitrag] , (2008)

Armknecht, Frederik ; Westhoff, Dirk ; Girao, Joao ; Hessler, Alban :
A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing.
In: Computer Communications Journal, 31 (4) pp. 734-749.
[Artikel] , (2008)

Amelunxen, Carsten ; Klar, Felix ; Königs, Alexander ; Rötschke, Tobias ; Schürr, Andy :
Metamodel-based tool integration with MOFLON.
In: Proceedings of the thirtieth International Conference on Software Engineering . - New York, NY : ACM , 2008, S. 807-810 ISBN 978-1-605-58079-1 . ACM , New York, NY
[Konferenz- oder Workshop-Beitrag] , (2008)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
Delay-Aware Mobile Transactions.
SEUS '08: Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems Springer-Verlag , Berlin, Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2008)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj ; Bleim, Eugen :
Implementation and Evaluation of Delay-Aware and Fault-Tolerant Mobile Transactions.
Proceedings of the The 2nd International Conference on E-Medical Systems
[Konferenz- oder Workshop-Beitrag] , (2008)

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim :
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6) pp. 329-336.
[Artikel] , (2008)

Andriluka, Mykhaylo ; Roth, Stefan ; Schiele, Bernt :
People-Tracking-by-Detection and People-Detection-by-Tracking.
In: IEEE Conference on Computer Vision and Pattern Recognition. IEEE, New York
[Konferenz- oder Workshop-Beitrag] , (2008)

Abele, E. ; Bauer, J. ; Rothenbücher, S. ; Stelzer, M. ; von Stryk, Oskar :
Prediction of the Tool Displacement by Coupled Models of the Compliant Industrial Robot and the Milling Process.
Proceedings of the International Conference on Process Machine Interactions
[Konferenz- oder Workshop-Beitrag] , (2008)

Abele, E. ; Bauer, J. ; Bertsch, C. ; Laurischkat, R. ; Meier, H. ; Reese, S. ; Stelzer, M. ; von Stryk, Oskar :
Comparison of Implementations of a Flexible Joint Multibody Dynamic System Model for an Industrial Robot.
6th CIRP International Conference on Intelligent Computation in Manufacturing Engineering, 23-25 July, Naples, Italy
[Konferenz- oder Workshop-Beitrag] , (2008)

Abele, E. ; Bauer, J. ; Stelzer, M. ; von Stryk, Oskar :
Wechselwirkungen von Fräsprozess und Maschinenstruktur am Beispiel des Industrieroboters.
In: WT-online p. 733.
[Artikel] , (2008)

Adamer, Kurt ; Bannach, David ; Klug, Tobias ; Lukowicz, Paul ; Sbodio, Marco Luca ; Tresman, Mimi ; Zinnen, Andreas ; Ziegert, Thomas :
Developing a Wearable Assistant for Hospital Ward Rounds.
Proceedings of Internet of Things 2008 Springer Verlag, Heidelberg etc., Germany
[Konferenz- oder Workshop-Beitrag] , (2008)

Armknecht, Frederik ; Escalante, Alberto ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza :
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Lecture Notes in Computer Science , 4991 . Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Araújo, Roberto ; Ryan, Peter Y. A. :
Improving Farnel, Threeballot and Randell-Ryan Voting Schemes.

[Anderes] , (2008)

Aitenbichler, Erwin
Mühlhäuser, Max ; Gurevych, Iryna (eds.) :

Ubiquitous Computing Technology for Real Time Enterprises.
In: Keine Angabe Idea Group Publishing , 257--281. ISBN 1599048321
[Buchkapitel] , (2008)

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina :
Smart Products: Integration Challenges.
AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence
[Konferenz- oder Workshop-Beitrag] , (2008)

Aitenbichler, Erwin
Mühlhäuser, Max ; Gurevych, Iryna (eds.) :

Ubiquitous Computing Technology for Real Time Enterprises.
In: Keine Angabe Idea Group Publishing , 152--171. ISBN 1599048321
[Buchkapitel] , (2008)

Austaller, Gerhard
Mühlhäuser, Max ; Gurevych, Iryna (eds.) :

Ubiquitous Computing Technology for Real Time Enterprises.
In: Keine Angabe IGI Publishing , pp. 107-127. ISBN 978-159904832-1
[Buchkapitel] , (2008)

Aitenbichler, Erwin
Gurevych, Iryna ; Mühlhäuser, Max (eds.) :

A Focus on Location Context.
In: Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises IGI
[Konferenz- oder Workshop-Beitrag] , (2008)

Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina :
Smart Products: Integration Challenges.
AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence
[Konferenz- oder Workshop-Beitrag] , (2008)

Amelunxen, Carsten ; Klar, Felix ; Königs, Alexander ; Rötschke, Tobias ; Schürr, Andy :
Metamodel-based Tool Integration with MOFLON.
In: 30th International Conference on Software Engineering. ACM Press , New York
[Konferenz- oder Workshop-Beitrag] , (2008)

Aitenbichler, Erwin :
Event-Based and Publish/Subscribe Communication.
[Online-Edition: https://www.igi-global.com/chapter/event-based-publish-subsc...]
In: Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises pp. 152-171.
[Artikel] , (2008)

Adamson, Anders :
Computing Curves and Surfaces from Points.
[Online-Edition: urn:nbn:de:tuda-tuprints-8931]
Technische Universität , Darmstadt
[Dissertation], (2007)

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin :
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Konferenz- oder Workshop-Beitrag] , (2007)

Aitenbichler, Erwin ; Kangasharju, Jussi ; Mühlhäuser, Max :
MundoCore: A Light-weight Infrastructure for Pervasive Computing.
In: Pervasive and Mobile Computing, 3 (4) pp. 332-361.
[Artikel] , (2007)

Aitenbichler, Erwin ; Lyardet, Fernando ; Mühlhäuser, Max :
Designing and Implementing Smart Spaces.
In: Cepis Upgrade, VIII (4) 31--37.
[Artikel] , (2007)

Aitenbichler, Erwin ; Heinemann, Andreas :
Proximity-based authentication for Windows domains.
In: UbiComp 2007: ubiquitous computing : 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16 - 19, 2007; proceedings. Lecture notes in computer science (4717). Springer, Berlin [u.a.] , pp. 475-480. ISBN 3-540-74852-0 ; 978-3-540-74852-6
[Buchkapitel] , (2007)

Aitenbichler, Erwin ; Lyardet, Fernando ; Austaller, Gerhard ; Kangasharju, Jussi ; Mühlhäuser, Max :
Engineering intuitive and self-explanatory smart products.
In: 22 Annual ACM Symposium on Applied Computing : Proceedings. - S. 1632-1637.
[Konferenz- oder Workshop-Beitrag] , (2007)

Aitenbichler, Erwin ; Lyardet, Fernando ; Mühlhäuser, Max :
Diseno e implementacion de espacios inteligentes.
In: Upgrade [Elektronische Ressource], 33 (188) pp. 29-34.
[Artikel] , (2007)

Aitenbichler, Erwin ; Kangasharju, Jussi ; Mühlhäuser, Max :
MundoCore : a light-weight infrastructure for pervasive computing.
In: Pervasive and mobile computing pp. 332-361.
[Artikel] , (2007)

Aitenbichler, Erwin ; Mühlhäuser, Max :
Softwareentwicklung für Mundo Smart Environments.
In: KIVS 2007 : Kommunikation in verteilten Systemen : 15. ITG-GI-Fachtagung vom 26. Februar bis 2. März 2007 in Bern, Schweiz ; Industriebeiträge, Kurzbeiträge und Workshops / T. Braun ... (Hrsg.).- S. 323-336. VDE-Verl., Berlin [u.a.] ISBN 3-8007-2980-6, 978-3-8007-2980-7
[Buchkapitel] , (2007)

Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin A. ; Walther, Christoph :
Automated Verification for an Efficient Elliptic-Curve Algorithm - A Case Study.
In: Information Security: Proceedings of the IX. International Conference, January 2007.
[Konferenz- oder Workshop-Beitrag] , (2007)

Aderhold, Markus :
Improvements in Formula Generalization.
In: Automated deduction - CADE-21 : 21st International Conference on Automated Deduction, Bremen, Germany, July 17 - 20, 2007 ; proceedings / Frank Pfenning (ed.). - Berlin [u.a.] : Springer, 2007, S. 231-246 (Lecture notes in computer science ; 4603 : Lectur . Springer , Berlin [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2007)

Adamson, Anders :
Computing curves and surfaces from points.
Technische Universität , Darmstadt
[Dissertation]

Amelunxen, Carsten ; Schürr, Andy :
Formalizing model transformation rules for UML/MOF 2.
In: Software, IET, 2 pp. 204-222.
[Artikel] , (2007)

Aqqal, A. ; Rensing, C. ; Steinmetz, Ralf :
The Macro Design as an Own Task in WBT Production.
In: EC-tel 2007 <Graz,2007> ; Second European Conference on Technology Enhanced Learning ; 420-425 ; ISBN: 9783540751946 .
[Konferenz- oder Workshop-Beitrag] , (2007)

Amelunxen, Carsten ; Legros, Elodie ; Schürr, Andy ; Stürmer, I. ; Nagl, M. ; Zündorf, A. :
Checking and enforcement of modeling guideline with graph transofrmations.
In: Applications of graph transformations with industrial relevance : third international symposium, AGTIVE 2007 ; proceedings of selected and invited papers ; Kassel, Germany, October 10 - 12, 2007 / Andy Schürr ... (eds.). - Kassel, 2007 .
[Konferenz- oder Workshop-Beitrag] , (2007)

Amelunxen, Carsten ; Königs, Alexander ; Rötschke, Tobias ; Schürr, Andy :
Metamodeling with MOFLON.
In: Applications of graph transformations with industrial relevance : third international symposium, AGTIVE 2007 ; proceedings of selected and invited papers ; Kassel, Germany, October 10 - 12, 2007 / Andy Schürr ... (eds.) : AGTIVE <3, 2007, Kassel> Kassel, .
[Konferenz- oder Workshop-Beitrag] , (2007)

Aqqal, A. ; Rensing, C. ; Steinmetz, Ralf :
Using Taxonomies to Support the Macro Design Process for the Production of Web Based Trainings.
In: 7th International Conference on Knowledge Management <Graz,2007> ; 7th International Conference on Knowledge Management ; 420-425 .
[Konferenz- oder Workshop-Beitrag] , (2007)

Arnold, Thomas :
Ein evolutionärer Algorithmus zur Erstellung eines künstlichen Gegenspielers für "Chinesische Mauer".
[Online-Edition: http://www.ke.informatik.tu-darmstadt.de/lehre/arbeiten/bach...]
TU Darmstadt
[Masterarbeit] , (2007)

Adamson, Anders :
Computing Curves and Surfaces from Points.
Darmstadt, TU, Diss., 2007
[Dissertation]

Adams, Bart ; Adamson, Anders :
Ray Tracing of Point Models.
In: Keine Angabe The Morgan Kaufmann Series in Computer Graphics. Elsevier, Morgan Kaufmann, San Francisco , pp. 294-312.
[Buchkapitel] , (2007)

Adelsbach, Andre ; Huber, Ulrich ; Sadeghi, Ahmad-Reza :
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: Transactions on Data Hiding and Multimedia Security II. In: LNCS , 4499 . Springer Verlag
[Konferenz- oder Workshop-Beitrag] , (2007)

Andriluka, Mykhaylo ; Weizsäcker, Lorenz ; Hofmann, Thomas :
Multi-class Classification with Dependent Gaussian Processes.
12th International Conference on Applied Stochastic Models and Data Analysis (ASMDA 2007)
[Konferenz- oder Workshop-Beitrag] , (2007)

Abbé, Thomas :
Implementierung eines qualifiziert signierenden Timestamping-Servers.
Technische Universit&auml;t Darmstadt
[Masterarbeit] , (2007)

Alaoui, Sidi Mohamed El Yousfi :
Konstruktion von Hashfunktionen.
Technische Universit&auml;t Darmstadt
[Masterarbeit] , (2007)

Araújo, Roberto ; Foulle, Sébastian ; Traoré, Jacques :
A practical and secure coercion-resistant scheme for remote elections.

[Anderes] , (2007)

Alkassar, Ammar ; Volkamer, Melanie :
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
In:
[Artikel] , (2007)

Ahrendt, Wolfgang ; Beckert, Bernhard ; Hähnle, Reiner ; Schmitt, Peter
Bonsangue, Marcello ; Johnsen, Einar Broch (eds.) :

KeY: A Formal Method for Object-Oriented Systems.
[Online-Edition: https://doi.org/10.1007/978-3-540-72952-5_2]
In: Formal Methods for Open Object-Based Distributed Systems, 9th IFIP WG 6.1 International Conference, FMOODS 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings. In: LNCS , 4468 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2007)

Amelunxen, Carsten ; Schürr, Andy ; Weisemöller, Ingo :
Missing Meta-Modeling-In-The-Large Concepts in EMOF.
eclipse summit 2007, Contribution to the discussion about EMF ?
[Konferenz- oder Workshop-Beitrag] , (2007)

Ahrendt, Wolfgang ; Beckert, Bernhard ; Hähnle, Reiner ; Rümmer, Philipp ; Schmitt, Peter
de Boer, Frank ; Bonsangue, Marcello ; Graf, Susanne ; de Roever, Willem (eds.) :

Verifying Object-Oriented Programs with KeY: a Tutorial.
In: LNCS , 4709 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2007)

Araújo, Roberto ; Wiesmaier, Alexander ; Buchmann, Johannes :
The T-Vote Protocol.

[Report] , (2006)

Aguilera, Gaby ; Teller, Patricia J. ; Taufer, Michaela ; Wolf, Felix :
A Systematic Multi-step Methodology for Performance Analysis of Communication Traces of Distributed Applications based on Hierarchical Clustering.
In: Proc. of the 5th International Workshop on Performance Modeling, Evaluation, and Organization of Parallel and Distributed Systems (PMEO-PDS, in conjunction with IPDPS 2006), Rhodes Island, Greece. IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2006)

Austaller, Gerhard ; Aitenbichler, Erwin ; Kangasharju, Jussi :
Interaction with a Smart Espresso Machine.
IEEE Conference on Pervasive Computing and Communications (PerCom'06) Demo Track
[Konferenz- oder Workshop-Beitrag] , (2006)

Aitenbichler, Erwin :
System support for ubiquitous computing.
Shaker , Aachen
[Dissertation]

Austaller, Gerhard ; Kangasharju, Jussi ; Kangasharju, Jussi :
Applications for smart environments.
Techn. Univ., Fachbereich Informatik , Darmstadt
[Report] , (2006)

Aitenbichler, Erwin :
Development tools for Mundo Smart environments.
In: Workshop on Software Engineering Challenges for Ubiquitous Computing. Gerd Kortuem (Ed.). S. 89-90, Lancaster University, 2006. .
[Konferenz- oder Workshop-Beitrag] , (2006)

Austaller, Gerhard ; Hartl, A. ; Lauff, M. ; Lyardet, F. ; Mühlhäuser, Max :
Technology-aware web application design.
In: Web engineering : the discipline of systematic development of Web applications / ed. by Gerti Kappel .... - Chichester : Wiley, 2006, S. 85-110 ISBN: 0-470-01554-3. Wiley, Chichester
[Buchkapitel] , (2006)

Aderhold, Markus ; Walther, Christoph ; Szallies, Daniel ; Schlosser, Andreas :
A Fast Disprover for VeriFun.
In: Proceedings Workshop on Non-Theorems, Non-Validity, Non-Provability (DISPROVING-06) Eds.: Wolfgang Ahrendt ; Peter Baumgartner ; Hans de Nivelle, S. 59-69,. - Seattle, WA, 2006. Federated Logic Conference.
[Konferenz- oder Workshop-Beitrag] , (2006)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
FT-PPTC : An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments.
In: IEEE Symposium on Reliable Distributed Systems <Leeds, UK,2006> ; Proceedings 25th IEEE Symposium on Reliable Distributed Systems ; 96-105 ; ISBN 0-7695-2677-2 .
[Konferenz- oder Workshop-Beitrag] , (2006)

Antollini, Mario ; Cilia, Mariano ; Buchmann, Alejandro :
Implementing a High Level Pub/Sub Layer for Enterprise Information Systems.
In: International Conference on Enterprise Information Systems (ICEIS'06), Paphos, Cyprus, 2006 .
[Konferenz- oder Workshop-Beitrag] , (2006)

Aracic, Ivica ; Gasiunas, Vaidas ; Mezini, Mira ; Ostermann, Klaus :
Overview of CaesarJ.
In: Transactions on aspect oriented software development . - Berlin : Springer T. !, S. 135-173 .- 2006 (Lecture notes in computer science ; 3880) ISBN: 978-3-540-32972-5 3-540-32972-2 . Springer T. ! , Berlin
[Konferenz- oder Workshop-Beitrag] , (2006)

Amelunxen, Carsten ; Königs, Alexander ; Rötschke, Tobias ; Schürr, Andy ; Rensink, A. ; Warmer, J. :
MOFLON : a standard-compliant metamodeling framework with graph transformations.
In: Model Driven Architecture - Foundations and Applications: Second European Conference. In: Lecture Notes in Computer Science (LNCS) . Springer , Berlin [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2006)

Amelunxen, Carsten ; Königs, Alexander ; Rötschke, Tobias ; Schürr, Andy ; Grundy, J. ; Howse, J.
IEEE Computer Society Press (ed.) :

M0SL : Composing a Visual Language for a Metamodeling Framework.
IEEE Computer Society Press (.) In: IEEE Symposium on Visual Languages and Human-Centric Computing (VLHCC 2006). In: Proceedings / IEEE Symposium on Visual Languages and Human-Centric Computing : VL/HCC 2006 ; 4-8 September, Brighton, United Kingdom/ ed. by John Grundy; John Howse. - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2006 ISBN: 0-7695-2586-5, . IEEE Computer Society , Los Alamitos, Calif. [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2006)

Amelunxen, Carsten ; Schürr, Andy :
On OCL as part of the metamodeling framework MOFLON.
In: OCL for (meta-)models in multiple application domains / Technische Universität Dresden, Fakultät Informatik. Birgit Demuth ... (ed.). - Dresden : TU, Fak. Informatik, 2006, S. 182-193 (Technical reports / Technische Universität Dresden, Fakultät Infor . TU , Dresden
[Konferenz- oder Workshop-Beitrag] , (2006)

Amelunxen, Carsten ; Schürr, Andy :
Vervollständigung des Constraint-basierten Assoziationskonzeptes von UML 2.0.
In: Modellierung 2006 : 22. - 24. März 2006 in Innsbruck, Austria / Heinrich C. Mayr; Ruth Breu (Hrsg.). - Bonn : Gesellschaft für Informatik, 2006, S. 163-172 (GI-Edition : Proceedings ; 82) ISBN: 3-88579-176-5 . Gesellschaft für Informatik , 24. März 2006 in Innsbruck, Austria / Heinrich C. Mayr; Ruth Breu (Hrsg.). - Bonn
[Konferenz- oder Workshop-Beitrag] , (2006)

Amelunxen, Carsten ; Rötchke, T. ; Zündorf, A. ; Varro, D. :
Creating Well-Structured Specifications in MOFLON.
In: Third International Workshop on Graph Based Tools (GraBaTs 2006), 2006. In: Electronic Communications of EASST , 1 .
[Konferenz- oder Workshop-Beitrag] , (2006)

Alt, O. ; Schmidt, M. ; Ritter, T. ; Eichler, H. :
Derivation of System Integration Tests from Design Models in UML.
In: ECMDA workshop on Integration of Model Driven Development and Model Driven Testing IMDT, Bilbao, Spain. In: Proceedings of the ECMDA Workshop on Integration of Model Driven Development and Model Driven Testing : [July 11th, 2006,Bilbao, Spain] / Fraunhofer-Institut für Offene Kommunikationssysteme, FOKUS. Hajo Eichler; Tom Ritter (editors). - Stuttgart : IRB V . IRB Verl. , Stuttgart
[Konferenz- oder Workshop-Beitrag] , (2006)

Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj :
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments.
25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006
[Konferenz- oder Workshop-Beitrag] , (2006)

Assenmacher, Ingo ; Hentschel, Bernd ; Ni, C. ; Kuhlen, Torsten ; Bischof, Christian :
Interactive data annotation in virtual environments.
In: Virtual environments 2006 : 12th Eurographics Symposium on Virtual Enviroments, 8 - 10 May, Gulbenkian Foundation Congress Centre, Braga, Portugal / sponsored by EUROGRAPHICS Association in cooperation with ACM SIGGGRAPH. Symposium Chair: Joaquim Jorge ;. In: Eurographics/ACM SIGGRAPH symposium proceedings . Eurographics Association , Aire-la-Ville, Switzerland
[Konferenz- oder Workshop-Beitrag] , (2006)

Adamson, Anders ; Alexa, Marc :
Anisotropic Point Set Surfaces.
In: Computer Graphics Forum, 25 (4) pp. 717-724.
[Artikel] , (2006)

Adamson, Anders ; Alexa, Marc :
Anisotropic Point Set Surfaces.
In: Proceedings AFRIGRAPH 2006. ACM, New York
[Konferenz- oder Workshop-Beitrag] , (2006)

Aarts, Emile ; Encarnação, José L. :
Into Ambient Intelligence.
In: Keine Angabe Springer, Berlin, Heidelberg, New York , pp. 1-16.
[Buchkapitel] , (2006)

Appel, Stefan :
Lokalisierung von Knoten in mobilen Ad-hoc-Netzen ohne zusätzliche Infrastruktur.
TU Darmstadt
[Bachelorarbeit] , (2006)

Adamson, Anders ; Alexa, Marc :
Point-Sampled Cell Complexes.
In: ACM Transactions on Graphics, 25 (3) pp. 671-680.
[Artikel] , (2006)

Ahrendt, Wolfgang ; Beckert, Bernhard ; Hähnle, Reiner ; Rümmer, Philipp ; Schmitt, Peter H.
de Boer, Frank S. ; Bonsangue, Marcello M. ; Graf, Susanne ; de Roever, Willem P. (eds.) :

Verifying Object-Oriented Programs with KeY: A Tutorial.
[Online-Edition: https://doi.org/10.1007/978-3-540-74792-5_4]
In: Formal Methods for Components and Objects, 5th International Symposium, FMCO 2006, Amsterdam, The Netherlands, November 7-10, 2006, Revised Lectures. In: Lecture Notes in Computer Science , 4709 . Springer
[Konferenz- oder Workshop-Beitrag] , (2006)

Adelsbach, Andre ; Rohe, Markus ; Sadeghi, Ahmad-Reza :
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security.
[Konferenz- oder Workshop-Beitrag] , (2006)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop.
[Konferenz- oder Workshop-Beitrag] , (2006)

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Scheibel, Michael ; Stüble, Christian ; Winandy, Marcel :
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06).
[Konferenz- oder Workshop-Beitrag] , (2006)

Abbing, Jana ; Koidl, Kevin :
Template Approach for Adaptive Learning Strategies.
Workshop Proceedings of the Adaptive Hypermedia 2006 (AH 2006), Dublin, Ireland
[Konferenz- oder Workshop-Beitrag] , (2006)

Araújo, Roberto ; Custódio, Ricardo Felipe ; Wiesmaier, Alexander ; Takagi, Tsuyoshi :
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06) Springer
[Konferenz- oder Workshop-Beitrag] , (2006)

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael :
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard] , (2006)

Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian :
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI).
[Konferenz- oder Workshop-Beitrag] , (2005)

Atkinson, Colin ; Kühne, Thomas :
A generalized notion of platforms for model-driven development.
In: Model-Driven Software Development / edited by Sami Beydeda, Matthias Book, Volker Gruhn. - Berlin, Heidelberg : Springer, 2005. - Bd. 2, S. 119-136. Springer, Berlin, Heidelberg
[Buchkapitel] , (2005)

Atkinson, Colin ; Kühne, Thomas :
Multi-level platform descriptions.
In: Workshop on metamodeling and corresponding tools <1, 2005, Essen>. - 2005 .
[Konferenz- oder Workshop-Beitrag] , (2005)

Austaller, Gerhard ; Roth, Eric :
Globale Referenzen basierend auf SOAP.
In: Kommunikation in Verteilten Systemen (KiVS) : Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005 in Kaiserslautern / Paul Müller ... (Hrsg.)- Bonn : Ges. für Informatik, 2005.- 229 S.- (GI-Edition : Proceedings ; 61).- ISB .
[Konferenz- oder Workshop-Beitrag] , (2005)

Antifakos, S. ; Kern, Nicky ; Schiele, Bernt ; Schwaninger, A. :
Towards improving trust in context-aware systems by displaying system confidence.
In: 7th International Conference on Human Computer Interaction with Mobile Devices and Services, 19 to 22 September 2005, University of Salzburg, Austria : Proceedings ...- S. 9-14 .
[Konferenz- oder Workshop-Beitrag] , (2005)

Abdollahian, M. ; Foroughi, Roya :
Regression analysis of ozone data.
In: International Conference on Information Technology : Coding and Computing : proceedings; ITCC 2005; April 4 - 6, 2005, Las Vegas, Nevada / Ed. by Henry Selvaraj .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2005, Vol. 1, 1, S. 174-178 ISBN: . IEEE Computer Society , Los Alamitos, Calif. [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2005)

Atkinson, Colin ; Kühne, Thomas :
Concepts for comparing modeling tool architectures.
In: Model driven engineering languages and systems : 8th international conference, MoDELS 2005, Montego Bay, Jamaica, October 2 - 7, 2005 ; proceedings / Lionel Briand ... (eds.). - Berlin [u.a.] : Springer, 2005 (Lecture notes in computer science ; 3713) ISB . Springer , Berlin [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2005)

Abdollahian, M. ; Foroughi, Roya :
Optimal statistical model for forecasting ozone.
In: International Conference on Information Technology : Coding and Computing : proceedings; ITCC 2005; April 4 - 6, 2005, Las Vegas, Nevada / Ed. by Henry Selvaraj .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2005, Vol. 1, 1, S. 169-173 ISBN: . IEEE Computer Society , Los Alamitos, Calif. [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2005)

Aitenbichler, Erwin ; Kangasharju, Jussi ; Mühlhäuser, Max :
Experiences with MundoCore.
In: Proceedings, Third IEEE International Conference on Pervasive Computing and Communications workshops, PerCom 2005 workshops : 8 - 12 March 2005, Kauai Island, Hawaii / sponsored by the IEEE Computer Society; the Department of Computer Science, the Univers . IEEE Computer Society , Los Alamitos, Calif. [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2005)

Amelunxen, Carsten ; Rötschke, Tobias ; Schürr, Andy :
Graph Transformations with MOF 2.0.
In: H. Giese, A. Zündorf (eds.), Proc. 3rd International Fujaba Days 2005, 9 2005, Vol. tr-ri-05-259, Universität Paderborn, 25-31 .
[Konferenz- oder Workshop-Beitrag] , (2005)

Abdollahian, M. ; Foroughi, Roya :
Regression Analysis of Ozone Data.
In: IEEE International Conference on Information Technology: Coding and Computing 2005. Proceedings Vol. I. IEEE Computer Society, Los Alamitos, Calif.
[Konferenz- oder Workshop-Beitrag] , (2005)

Abdollahian, M. ; Foroughi, Roya :
Optimal Statistical Model for Forecasting Ozone.
In: IEEE International Conference on Information Technology: Coding and Computing 2005. Proceedings Vol. I. IEEE Computer Society, Los Alamitos, Calif.
[Konferenz- oder Workshop-Beitrag] , (2005)

Adamson, Anders ; Alexa, Marc ; Nealen, Andrew :
Adaptive Sampling of Intersectable Models Exploiting Image and Object-space Coherence.
In: Proceedings of the 2005 ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games (I3D). ACM Press, New York
[Konferenz- oder Workshop-Beitrag] , (2005)

Alaoui, Omar :
Interoperabilität und Standards von mobilen Agenten.
TU Darmstadt
[Masterarbeit] , (2005)

Alexa, Marc :
Non-conforming Surface Representations.
In: SGP 2005. Proceedings. Eurographics Association, Aire-la-Ville
[Konferenz- oder Workshop-Beitrag] , (2005)

Aldinger, T. ; Kopf, S. ; Scheele, N. ; Effelsberg, W. :
Participatory Simulation of a Stock Exchange.
World Conference on Educational Multimedia, Hypermedia and Telecommunications (EdMedia), Montr&#039;eal, Canada, 2005
[Konferenz- oder Workshop-Beitrag] , (2005)

Adelsbach, A. ; Alkassar, A. ; Garbe, K.-H. ; Luzaic, M. ; Manulis, M. ; Scherer, E. ; Schwenk, J. ; Siemens, E.:
Voice over IP - Sichere Umstellung der Sprachkommunikation auf IP-Technologie.
BSI - Bundesamt für Sicherheit in der Informationstechnik
[Buch] , (2005)

Antollini, Jose :
Implementing an Active Functionality Service on Different Platforms.
UNICEN
[Masterarbeit] , (2005)

Antollini, Mario :
A High Level Pub/Sub Layer for Open Distributed Heterogeneous Environments.
UNICEN
[Masterarbeit] , (2005)

Anton, Tobias
Bauer, Mathias ; Brandherm, Boris ; Fürnkranz, Johannes ; Grieser, Gunter ; Hotho, Andreas ; Jedlitschka, Andreas ; Kröner, Alexander (eds.) :

XPath-Wrapper Induction by generating tree traversal patterns.
Lernen, Wissensentdeckung und Adaptivit&auml;t (LWA-05)
[Konferenz- oder Workshop-Beitrag] , (2005)

Ahrendt, Wolfgang ; Baar, Thomas ; Beckert, Bernhard ; Bubel, Richard ; Giese, Martin ; Hähnle, Reiner ; Menzel, Wolfram ; Mostowski, Wojciech ; Roth, Andreas ; Schlager, Steffen ; Schmitt, Peter :
The KeY tool: integrating object oriented design and formal verification.
[Online-Edition: http://www.springerlink.com/index/10.1007/s10270-004-0058-x]
In: Software and System Modeling, 4 (1) p. 32.
[Artikel] , (2005)

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie :
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8 pp. 480-482.
[Artikel] , (2005)

Antollini, Jose ; Antollini, Mario ; Guerrero, Pablo ; Cilia, Mariano :
Extending {sc Rebeca} to Support Concept-Based Addressing.
In Proceedings of the Argentinean Symposium on Information Systems (ASIS&#039;04)
[Konferenz- oder Workshop-Beitrag] , (2004)

Antollini, José ; Antollini, Mario ; Guerrero, Pablo ; Cilia, Mariano :
Extending REBECA to support concept-based addressing.
In: Proceedings First Argentine Symposium on Information Systems September 23-24, 2004 <1, 2004, Cordoba, Argenina> FAMAF, Universidad Nacional de Córdoba, Argentina [as part of the 33rd International Conference on Computer Science and Operational Research ( .
[Konferenz- oder Workshop-Beitrag] , (2004)

Arnold, Michael :
Digital audio watermarking.
Logos-Verl. , Berlin
[Dissertation]

Alexa, Marc ; Adamson, Anders :
On normals and projection operators for surfaces defined by point sets.
In: Proceedings of Eurographics Symposium on point-based graphics. Eds. : Marc Alexa .... .- 2004. S. 149-156 .
[Konferenz- oder Workshop-Beitrag] , (2004)

Adamson, Anders ; Alexa, Marc :
Approximating bounded, non-orientable surfaces from points,.
In: Proceedings / Shape Modeling International 2004 : [proceedings of the International Conference on Shape Modeling and Applications] ; SMI 2004 ; 7 - 9 June 2004, Genova, Italy / ed. by Franca Giannini .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Soc. . IEEE Computer Soc. , Los Alamitos, Calif. [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2004)

Abdollahian, M. ; Foroughi, Roya :
Optimal Statistical Model for Forecasting Air Quality Data.
In: Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Sciences, METMBS '04 : Las Vegas, Nevada, USA, June 21 - 24, 2004 / ed.: Faramarz Valafar .... - [S.l.] : CSREA Press, 2004, S.436-442 .- ISBN . CSREA Press , [S.l.]
[Konferenz- oder Workshop-Beitrag] , (2004)

Aitenbichler, Erwin ; Kangasharju, Jussi ; Mühlhäuser, Max :
Talking assistant headset : a smart digital identity for ubiquitous computing.
In: Advances in pervasive computing : a collection of contributions presented an PERVASIVE 2004 ; [18. - 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien : Österreichische Computer Gesellsch., 2004, S. 279-284 (books-at-ocg.at ; 176) ISBN 3. Österreichische Computer Gesellsch., 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien
[Buchkapitel] , (2004)

Aitenbichler, Erwin :
System support for ubiquitous computing (submission to the doctoral colloquium at Pervasive 2004).
In: Advances in pervasive computing : a collection of contributions presented an PERVASIVE 2004 ; [18. - 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien : Österreichische Computer Gesellsch., 2004, S.1-6 (books-at-ocg.at ; 176) ISBN 3-8540. Österreichische Computer Gesellsch., 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien
[Buchkapitel] , (2004)

Austaller, Gerhard ; Lauff, Markus ; Lyardet, Fernando ; Mühlhäuser, Max :
Technologiebewusstes Design von Web-Anwendungen.
In: Web Engineering : systematische Entwicklung von Web-Anwendungen / Gerti Kappel ... (Hrsg.). - 1. Aufl.. - Heidelberg : dpunkt-Verl., 2004. - XVI, 416 S. ISBN: 3-89864-234-8 , S. 101-123. dpunkt-Verl., 1. Aufl.. - Heidelberg
[Buchkapitel] , (2004)

Austaller, Gerhard ; Kangasharju, Jussi ; Mühlhäuser, Max :
Using web services to build context-aware applications in ubiquitous computing.
In: Web engineering : 4th international conference, ICWE 2004, Munich, Germany, July 26 - 30, 2004 ; proceedings / Nora Koch ... (eds.). - Berlin [u.a.] : Springer, 2004 (Lecture notes in computer science ; 3140), S. 483-487 ISBN: 3-540-22511-0 . Springer , Berlin [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2004)

Austaller, Gerhard :
Web Services als Bausteine für kontextabhängige Anwendungen.
In: 1. GI/ITG KuVS Fachgespräch Ortsbezogene Anwendungen und Dienste : am 24.und 25.06.2004, Fernuniversität Hagen / Jörg Roth (Ed.). - Hagen : FernUniversität, Fachbereich Informatik, 2004 , S. 23-26 (Informatik-Berichte ; 317)
[Artikel] , (2004)

an Mey, Dieter ; Bischof, Christian :
Die Zukunft ist parallel - Perspektiven des Hochleistungsrechnens.
[Online-Edition: http://www.rz.rwth-aachen.de/global/showdocument.asp?id=bjoi...]
Rechen-und Kommunikationszentrum der RWTH Aachen , Aachen
[Report] , (2004)

Abdollahain, M. ; Foroughi, Roya :
Optimal Statistical Model for Forecasting Air Quality Data.
In: METMBS '04. CSREA Press, Las Vegas
[Konferenz- oder Workshop-Beitrag] , (2004)

Alexa, Marc ; Adamson, Anders :
On Normals and Projection Operators for Surfaces Defined by Point Sets.
In: Symposium on Point Based Graphics. Eurographics, Aire-la-Ville
[Konferenz- oder Workshop-Beitrag] , (2004)

Arnold, Michael :
Digital Audio Watermarking.
Logos Verlag, Berlin
[Dissertation]

Adamson, Anders ; Alexa, Marc :
Approximating Bounded, Non-orientable Surfaces from Points.
In: International Conference on Shape Modeling and Applications 2004. Proceedings. IEEE Computer Society Press, Los Alamitos
[Konferenz- oder Workshop-Beitrag] , (2004)

Altmeyer, Oliver ; Sadeghi, Ahmad-Reza ; Selhorst, Marcel ; Stüble, Christian
Paulus, Sachar ; Pohlmann, Norbert ; Reimer, Helmut (eds.) :

Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004). Vieweg Verlag , pp. 346-361.
[Buchkapitel] , (2004)

Amelunxen, Carsten ; Schürr, Andy ; Bichler, Lutz
Rumpe, Bernhard ; Hesse, Wolfgang (eds.) :

Codegenerierung für Assoziationen in MOF 2.0.
[Online-Edition: http://subs.emis.de/LNI/Proceedings/Proceedings45/article127...]
In: Modellierung 2004, Proceedings zur Tagung, 23.-26. M\"rz 2004, Marburg, Proceedings. In: LNI , 45 . GI
[Konferenz- oder Workshop-Beitrag] , (2004)

Arnold, Axel ; Flentge, Felix :
Team Description Mainz Rolling Brains 2004 - 2D.

[Anderes] , (2004)

Arnold, Axel ; Flentge, Felix ; Schneider, Christoph :
Team Description Mainz Rolling Brains 2004 - 3D.

[Anderes] , (2004)

Antifakos, Stavros ; Schwaninger, Adrian ; Schiele, Bernt :
Evaluating the Effects of Displaying Uncertainty in Context-Aware Applications.
6th International Conference on Ubiquitous Computing (ubicomp 2004)
[Konferenz- oder Workshop-Beitrag] , (2004)

Antifakos, Stavros ; Michahelles, Florian ; Schiele, Bernt :
Towards Situation-Aware Affordances: An Experimental Study.
2nd International Conference on Pervasive Computing (pervasive 2004)
[Konferenz- oder Workshop-Beitrag] , (2004)

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael :
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
FMSE ACM
[Konferenz- oder Workshop-Beitrag] , (2004)

Aitenbichler, Erwin ; Kangasharju, Jussi ; Mühlhäuser, Max :
Talking Assistant: A Smart Digital Identity for Ubiquitous Computing.
Advances in Pervasive Computing Austrian Computer Society (OCG)
[Konferenz- oder Workshop-Beitrag] , (2004)

Akishita, Toru ; Takagi, Tsuyoshi :
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: LNCS , 2851 . Springer
[Konferenz- oder Workshop-Beitrag] , (2003)

Alkassar, Ammar ; Stüble, Christian :
A Security Framework for Integrated Networks.
MILCOM 2003 IEEE Military Communications Conference
[Konferenz- oder Workshop-Beitrag] , (2003)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Artikel] , (2003)

Ackermann, Ralf :
Gateways and Components for Supplementary IP Telephony Services in Heterogeneous Environments.
[Online-Edition: urn:nbn:de:tuda-tuprints-3591]
Technische Universität , Darmstadt
[Dissertation], (2003)

Alves dos Santos, Luiz Manoel :
Asymmetric and Adaptive Conference Systems for Enabling Computer-Supported Mobile Activities.
[Online-Edition: urn:nbn:de:tuda-tuprints-3345]
Technische Universität , Darmstadt
[Dissertation], (2003)

Aitenbichler, Erwin ; Kangasharju, Jussi :
Communication abstractions in MundoCore.
In: ECOOP <2003, Darmstadt> / Communications Abstractions for Distributed Systems Workshop: Proceedings .
[Konferenz- oder Workshop-Beitrag] , (2003)

Askerdal, Örjan ; Gäfvert, Magnus ; Hiller, Martin ; Suri, Neeraj :
Analyzing the impacts of data errors in safety-critical control systems.
In: IEICE transactions / E, English transactions / D, information & systems, Vol. 8 p. 2623.
[Artikel] , (2003)

Ackermann, Ralf :
Gateways and components for supplementary IP telephony services in heterogeneous environments.
Techn. Univ. , Darmstadt
[Dissertation]

Alves dos Santos, Luiz Manoel :
Asymmetric and adaptive conference systems for enabling computer supported mobile activities.
Techn. Univ. , Darmstadt
[Dissertation]

Aschenbrenner, Peter ; Schürr, Andy :
Generating interactive animations from visual specifications.
In: IEEE Symposium on Visual Languages and Formal Methods <2003, Auckland>: Proceedings ... October 2003 .
[Konferenz- oder Workshop-Beitrag] , (2003)

Alexa, Marc ; Behr, Johannes ; Cohen-Or, Daniel ; Fleishman, Shachar ; Levin, David ; Silva, Claudio T. :
Computing and rendering point set surfaces.
In: IEEE transactions on visualization and computer graphics, 9 pp. 3-15.
[Artikel] , (2003)

Alfert, K. ; Doberkat, E.-E. ; Engels, G. ; Lohmann, M. ; Magenheim, J. ; Schürr, Andy :
MuSoft - Multimedia in der Software-Technik.
In: Software Engineering im Unterricht der Hochschulen / SEUH 8 - Berlin 2003. Hrsg. Johannes Siedersleben ...- Heidelberg : dPunkt-Verl., 2003.- VIII, 120 S.- ISBN 3-89864-201-1.- S. 70-80
[Artikel] , (2003)

Alexa, Marc :
Differential coordinates for local mesh morphing and deformation.
In: The visual computer, 19 pp. 105-114.
[Artikel] , (2003)

Aitenbichler, Erwin :
Ortungssysteme für mobile Endgeräte.
In: Innovative Informatikanwendungen : Informatik 2003, Beiträge der 33. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 29. Sept. - 2. Okt. 2003 in Frankfurt am Main; proceedings / Klaus Dittrich ... (Hrsg.)-Teil 1.- Bonn : Ges. für Informatik, 20 . Ges. für Informatik , 2. Okt. 2003 in Frankfurt am Main; proceedings / Klaus Dittrich ... (Hrsg.)-Teil 1.- Bonn
[Konferenz- oder Workshop-Beitrag] , (2003)

Aitenbichler, Erwin ; Mühlhäuser, Max :
An IR local positioning system for smart items and devices.
In: International Conference on Distributed Computing Systems workshops <23, 2003, Providence, RI>: Proceedings, 19 - 22 May 2003, Providence, Rhode Island, USA ; [3rd International Workshop on Smart Appliances and Wearable Computing / sponsored by the IEEE C . IEEE Computer Society , Los Alamitos, Calif. [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2003)

Aitenbichler, Erwin ; Mühlhäuser, Max :
Audiobasierte Endgeräte für Ubiquitous Computing und geeignete Infrastrukturen.
In: Ubiquitous Computing / Heinz Sauerburger (Hrsg.)- Heidelberg : dpunkt-Verl., 2003.-127 S.- (HMD : Praxis der Wirtschaftsinformatik ; 229).- ISBN: 3-89864-200-3.- S. 68-80
[Artikel] , (2003)

Adamson, Anders ; Alexa, Marc:
Approximation and intersecting surfaces from points.
Techn. Univ., Fachbereich Informatik, Fachgebiet Graphisch-Interaktive Systeme, Darmstadt
[Buch] , (2003)

Arnold, Michael ; Daum, Henning ; Busch, Christoph :
Comparative study on fingerprint recognition systems - project BioFinger.
In: BIOSIG 2003 : proceedings of the first International Conference on Biometrics and Electronic Signatures of the GI Working Group BIOSIG / ed. Arslan Brömme, Christoph Busch.- Bonn: Ges. für Informatik, 2003.- 138 S.- (GI edition : lecture notes in inform . Ges. für Informatik , Bonn
[Konferenz- oder Workshop-Beitrag] , (2003)

Arnold, Michael ; Busch, Christoph ; Schmucker, Martin :
Szenario-basierte Testverfahren zur Zertifizierung von Wasserzeichen.
In: Mit Sicherheit Informatik : Informatik 2003 : [Teiltagung] Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit" [der GI-Jahrestagung Informatik 2003], 29. September - 2. Oktober 2003 in Frankfurt am Main / Rüdiger Grimm ... (Hrsg.)- Bonn : Ges. für In .
[Konferenz- oder Workshop-Beitrag] , (2003)

Alexa, Marc ; Klug, Tobias ; Stoll, Carsten :
Direction Fields over Point-Sampled Geometry.
In: Journal of WSCG Volume 11 No. 1. Proceedings. University of West Bohemia, Plzen
[Konferenz- oder Workshop-Beitrag] , (2003)

Alexa, Marc :
Differential Coordinates for Local Mesh Morphing and Deformation.
In: The Visual Computer (19) pp. 105-114.
[Artikel] , (2003)

Alexa, Marc ; Behr, Johannes ; Cohen-Or, Daniel ; Fleishman, Shachar ; Levin, David ; Silva, Claudio T. :
Computing and Rendering Point Set Surfaces.
In: IEEE Transactions on Visualization and Computer Graphics, 9 (1) pp. 3-15.
[Artikel] , (2003)

Alves dos Santos, Luiz M. :
Asymmetric and Adaptive Conference Systems for Enabling Computer-Supported Mobile Activities.
Shaker, Aachen
[Dissertation]

Adamson, Anders ; Alexa, Marc :
Approximating and Intersecting Surfaces from Points.
In: Symposium on Geometry Processing. Proceedings. Association for Computing Machinery, New York
[Konferenz- oder Workshop-Beitrag] , (2003)

Adamson, Anders ; Alexa, Marc :
Ray Tracing Point Set Surfaces.
In: International Conference on Shape Modeling and Applications 2003. Proceedings. IEEE Computer Society Press, Los Alamitos
[Konferenz- oder Workshop-Beitrag] , (2003)

Alexa, Marc ; Klug, Tobias ; Stoll, Carsten :
Direction Fields over Point-Sampled Geometry.
In: 11 (1).
[Konferenz- oder Workshop-Beitrag] , (2003)

Aitenbichler, Erwin ; Mühlhäuser, Max :
Audiobasierte Endgeräte für Ubiquitous Computing und geeignete Infrastrukturen.
In: dpunkt Heidelberg 68--80.
[Artikel] , (2003)

Antifakos, Stavros ; Borchers, Jan ; Schiele, Bernt :
Designing Physical Interaction with Sensor Drawbacks in Mind.
5th International Symposium on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2003)
[Konferenz- oder Workshop-Beitrag] , (2003)

Antifakos, Stavros ; Schiele, Bernt :
Grouping Mechanisms for Smart Objects Based on Implicit Interaction and Context Proximity.
International Conference on Ubiquitous Computing (UBICOMP 2003)
[Konferenz- oder Workshop-Beitrag] , (2003)

Antifakos, Stavros ; Schiele, Bernt :
LaughingLily: Using a Flower as a Real World Information Display.
International Conference on Ubiquitous Computing (UBICOMP 2003)
[Konferenz- oder Workshop-Beitrag] , (2003)

Antifakos, Stavros ; Borchers, Jan ; Schiele, Bernt :
The Role of Perception in Ubiquitous Interactive Systems.
At the Crossroads: The Interaction of HCI and System Issues in Ubicomp. Workshop at UBICOMP’03
[Konferenz- oder Workshop-Beitrag] , (2003)

Akishita, Toru ; Takagi, Tsuyoshi :
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.

[Report] , (2003)

Ahsen, Anette von ; Buxmann, Peter ; Díaz, Luis Martín :
Economic Evaluation of Cooperation in Supply Chains - Models and Results from an Empirical Study, Working Paper, Freiberg.

[Anderes] , (2003)

Amelunxen, C. ; Königs, Alexander ; Rötschke, Tobias ; Schürr, Andy
Giese, H. ; Zündorf, A. (eds.) :

Adapting FUJABA for Building a Meta Modelling Framework.
In: Proc. 1st International Fujaba Days.
[Konferenz- oder Workshop-Beitrag] , (2003)

Alfert, Klaus ; Doberkat, Ernst-Erich ; Engels, Gregor ; Lohmann, Marc ; Magenheim, Johannes ; Schürr, Andy
Siedersleben, Johannes ; Weber-Wulff, Debora (eds.) :

MuSoft: Multimedia in der Softwaretechnik.
In: Software Engineering im Unterricht der Hochschulen, SEUH 8, Berlin 2003, Berlin. Proc. SEUH 8 Software Engineerung im Unterricht der Hochschulen Berlin dpunkt
[Konferenz- oder Workshop-Beitrag] , (2003)

Aitenbichler, Erwin ; Mühlhäuser, Max :
The Talking Assistant Headset: A Novel Terminal for Ubiquitous Computing.

[Report] , (2002)

Alexa, Marc :
Shape Spaces from Morphing.
[Online-Edition: urn:nbn:de:tuda-tuprints-2134]
Technische Universität , Darmstadt
[Dissertation], (2002)

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael :
Cryptographic Semantics For The Algebraic Models.

[Report] , (2002)

Alexa, Marc :
Recent advances in mesh morphing.
In: Computer graphics forum, 21 pp. 173-196.
[Artikel] , (2002)

Alexa, Marc ; Taponecco, Francesca :
Scan converting spirals.
In: Journal of WSCG, Vol. 1 pp. 115-120.
[Artikel] , (2002)

Alexa, Marc :
Wiener filtering of meshes.
In: International Conference on Shape Modeling <4, 2002, Banff, Alberta>: Shape modeling 2002, proceedings / ed. by Geoff Wyvill.- Los Alamitos, Calif.: IEEE Computer Soc. Pr., 2002.- ISBN 0-7695-1546-0.- S. 51-57 . IEEE Computer Soc. Pr. , Los Alamitos, Calif.
[Konferenz- oder Workshop-Beitrag] , (2002)

Alexa, Marc :
Refinement operators for triangle meshes.
In: Computer aided geometric design, 19 pp. 169-172.
[Artikel] , (2002)

Alexa, Marc :
Shape spaces from morphing.
Techn. Univ. , Darmstadt
[Dissertation]

Alexa, Marc :
Linear combinations of transformations.
In: ACM transactions on graphics, 21 pp. 380-387.
[Artikel] , (2002)

Aitenbichler, Erwin ; Mühlhäuser, Max:
The talking assistant headset : a novel terminal for ubiquitous computing.
Dept. of Computer Science, Telecooperation Group, Darmstadt
[Buch] , (2002)

Alexa, Marc :
Wiener Filtering of Meshes.
In: International Conference on Shape Modeling and Applications 2002. Proceedings. IEEE Computer Society Press, Los Alamitos
[Konferenz- oder Workshop-Beitrag] , (2002)

Amicis, Raffaele de ; Santos, Pedro ; Stork, André ; Fiorentino, Michele :
SketchAR - Sketching in Mixed Realities.
In: Augmented und Virtual Reality in der Produktentstehung. In: HNI-Verlagsschriftenreihe; 107 . Heinz Nixdorf Institut, Paderborn
[Konferenz- oder Workshop-Beitrag] , (2002)

Alexa, Marc :
Shape Spaces from Morphing.
Darmstadt, TU, Diss., 2002
[Dissertation]

Alexa, Marc ; Taponecco, Francesca :
Scan Converting Spirals.
In: WSCG 2002. Short Communication Papers. University of West Bohemia, Plzen
[Konferenz- oder Workshop-Beitrag] , (2002)

Alexa, Marc :
Refinement operators for triangle meshes.
In: Computer Aided Geometric Design, 19 (3) pp. 169-172.
[Artikel] , (2002)

Alexa, Marc :
Recent Advances in Mesh Morphing.
In: Computer Graphics Forum, 21 (2) pp. 173-196.
[Artikel] , (2002)

Alexa, Marc :
Linear Combinations of Transformations.
In: ACM Transactions on Graphics, 21 (3) pp. 380-387.
[Artikel] , (2002)

Adamson, Anders :
Ray Tracing von Punktmengenflächen.
TU Darmstadt
[Masterarbeit] , (2002)

Ahrendt, Wolfgang ; Baar, Thomas ; Beckert, Bernhard ; Giese, Martin ; Habermalz, Elmar ; Hähnle, Reiner ; Menzel, Wolfram ; Mostowski, Wojciech ; Schmitt, Peter H.
Kutsche, Ralf-Detlef ; Weber, Herbert (eds.) :

The KeY System: Integrating Object-Oriented Design and Formal Methods.
[Online-Edition: https://doi.org/10.1007/3-540-45923-5_23]
In: Fundamental Approaches to Software Engineering, 5th International Conference, FASE 2002, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2002, Grenoble, France, April 8-12, 2002, Proceedings. In: Lecture Notes in Computer Science , 2306 . Springer
[Konferenz- oder Workshop-Beitrag] , (2002)

Alkassar, Ammar ; Stüble, Christian :
Towards Secure IFF: Preventing Mafia Fraud Attacks.
MILCOM 2002, IEEE Military Communication Conference
[Konferenz- oder Workshop-Beitrag] , (2002)

Anderl, Reiner ; Reichenbach, Christoph ; Hessling, Christian ; Weimer, Markus :
Embedded Systems - Vom virtuellen zum realen Produkt.
In: thema Forschung 1/2002: Eingebettete Systeme: Entwurf und Anwendungen versteckter Computer pp. 50-58.
[Artikel] , (2002)

Arnold, Axel ; Flentge, Felix ; Schneider, Christoph ; Schwandtner, Götz ; Uthmann, Thomas ; Wache, Martin
Birk, A. ; Coradeschi, S. ; Tadokoro, S. (eds.) :

Team Description Mainz Rolling Brains 2001.
RoboCup-2001. Robot Soccer World Cup V Springer
[Konferenz- oder Workshop-Beitrag] , (2002)

Antifakos, Stavros ; Schiele, Bernt :
Bridging the Gap between Virtual and Physical Games Using Wearable Sensors.
3rd International Conference on Computer Vision Systems (ICVS 2002)
[Konferenz- oder Workshop-Beitrag] , (2002)

Antifakos, Stavros ; Michahelles, Florian ; Schiele, Bernt :
Proactive Instructions for Furniture Assembly.
4th international conference on Ubiquitous Computing (UbiComp 2002) Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2002)

Antifakos, Stavros ; Schiele, Bernt :
Beyond Position Awareness.
In: Personal and Ubiquitous Computing, 6 (5/6) 313--317.
[Artikel] , (2002)

Altheide, F. ; Dörr, H. ; Schürr, Andy
Stoewer, H. ; Garnier, L. (eds.) :

Requirements to a Framework for sustainable Integration of System Development Tools.
In: Proc. of the 3rd European Systems Engineering Conference (EuSEC'02), 2002, Toulouse. AFIS PC Chairs
[Konferenz- oder Workshop-Beitrag] , (2002)

Alexa, Marc ; Behr, J. ; Cohen-Or, D. ; Fleishman, S. ; Levin, D. ; Silva, C. T. :
Point set surfaces.
In: Visualization 2001: Vision, modeling and visualization <6, 2001, Stuttgart>: Proceedings. Hrsg.: T. Ertl [u.a.] .
[Konferenz- oder Workshop-Beitrag] , (2001)

Ackermann, Ralf ; Görtz, M. ; Karsten, M. ; Steinmetz, Ralf :
Prototyping a PDA based communication appliance.
In: Softcom <2001, Split>: Proceedings. S. 739-746 .
[Konferenz- oder Workshop-Beitrag] , (2001)

Ackermann, Ralf ; Darlagiannis, V. ; Görtz, M. ; Karsten, M. ; Steinmetz, Ralf :
An open source H.323-SIP gateway as basis for supplementary service interworking.
In: IP Telephony Workshop <2, 2001, New York>: Proceedings. S. 169-175 .
[Konferenz- oder Workshop-Beitrag] , (2001)

Ackermann, Ralf ; Schumacher, M. ; Roedig, U. ; Steinmetz, Ralf :
Vulnerabilities and security limitations of current IP telephony systems.
In: CMS 2001: Working Conference on Communications and Multimedia Security <5, 2001, Darmstadt>: Proceedings. S. 53-66. Hrsg.: R. Steinmetz. - Boston [u.a.]: Kluwer, 2001 . Kluwer , Boston [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2001)

Aschemann, Gerd ; Hasselmeyer, P. :
A loosely coupled federation of distributed management services.
In: Journal of network and systems management, 9 S. 51-65.
[Artikel] , (2001)

Alexa, Marc :
Local control for mesh morphing.
In: Internatioal Conference on Shape Modelling and Applications <3, 2001,Genova>: Proceedings. S. 209-215. - Los Alamitos: IEEE Computer Soc. Press, 2001 . IEEE Computer Soc. Press , Los Alamitos
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc :
Mesh morphing: STAR - state of the art report.
In: European Association for Computer Graphics: Eurographics 2001: Annual Conference <22, 2001, Manchester>: State of the Art Reports. S. 1-20. - Oxford: Blackwell, 2001 . Blackwell , Oxford
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc ; Hellenschmidt, M. ; Rieger, T. ; Berner, U. :
An animation system for user interface agents.
In: WSCG 2001: International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision <9, 2001, Plzen>: Conference Proceedings. Hrsg.: V. Skala [u.a.]. - Plzen: Univ. of West Bohemia, 2001.- S. 154-160 . Univ. of West Bohemia , Plzen
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc :
Shape spaces from mesh morphing.
In: Graphiktag 2001: Workshop über Trends und Höhepunte der Graphischen Datenverarbeitung <2001, Tübingen>; Tagungsbd. S. 44-55. Hrsg.: D. Saupe, Ges. für Informatik, Fachausschuß 4.1 [u.a.] .
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc :
Shape Spaces from Mesh Morphing.
In: Graphiktag 2001. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc ; Behr, Johannes ; Cohen-Or, Daniel ; Fleishman, Shachar ; Levin, David ; Silva, Claudio T. :
Point Set Surfaces.
In: IEEE Visualization 2001. Proceedings. IEEE Computer Society Press, Los Alamitos, Calif.
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc :
Mesh Morphing : STAR - State of the Art Report.
In: Eurographics 2001. State of the Art Reports.
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc :
Local Control for Mesh Morphing.
In: International Conference on Shape Modeling and Applications 2001. Proceedings. IEEE Computer Society Press, Los Alamitos
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc ; Müller, Wolfgang ; Spierling, Ulrike ; Rieger, Thomas :
Face-to-Face with Your Assistant. Realization Issues of Animated User Interface Agents for Home Appliances.
In: IMC 2000. Intelligent Interactive Assistance & Mobile Multimedia Computing. Proceedings. Neuer Hochschulschriftenverlag, Rostock
[Konferenz- oder Workshop-Beitrag] , (2001)

Alexa, Marc ; Hellenschmidt, Michael ; Rieger, Thomas ; Berner, Uwe :
An Animation System for User Interface Agents.
In: WSCG 2001. Conference Proceedings Vol. 1. University of West Bohemia, Plzen
[Konferenz- oder Workshop-Beitrag] , (2001)

Arnold, Michael :
Entwicklung eines Framework zur objektiven Bewertung von Audio Watermarking Verfahren.

[Monograph] , (2001)

Abawi, Daniel F. ; Reinhold, Silvan :
XML-basierte 3D-Komponenten.
TU Darmstadt
[Masterarbeit] , (2001)

Adelsbach, Andre ; Sadeghi, Ahmad-Reza :
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: Information Hiding: Fourth International Workshop. In: LNCS , 2137 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2001)

Antifakos, Stavros ; Schiele, Bernt :
Beyond position Awareness.
Workshop on Location Modeling for Ubiquitous Computing at Ubicomp 2001
[Konferenz- oder Workshop-Beitrag] , (2001)

Albert, Michael :
Konzeption und Implementierung eines Remote Access {VPNs} für Außendienstarbeiter unter Einsatz einer Public-Key-Infrastruktur.
Technische Universit&auml;t Darmstadt
[Masterarbeit] , (2001)

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael :
Using a Rules Model to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard] , (2001)

Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias :
Using an Object Model to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard] , (2001)

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Proving ownership of digital content.
In: 3rd International Workshop on Information Hiding, IH 1999. In: LNCS , 1768 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2000)

Alireza, Ameneh ; Lang, Ulrich ; Padelis, Marios ; Schreiner, Rudolf ; Schumacher, Markus :
The Challenges of CORBA Security.
In: Proceedings of the Workshop "Sicherheit in Mediendaten", Gesellschaft für Informatik (GI).
[Konferenz- oder Workshop-Beitrag] , (2000)

Alexa, Marc :
Merging polyhedral shapes with scattered features.
In: The visual computer, 16 S. 26-37.
[Artikel] , (2000)

Ackermann, Ralf ; Darlagiannis, V. ; Steinmetz, Ralf :
Using DMIF for abstracting from IP-telephony signaling protocols.
In: IDMS 2000: Internatinal Workshop on Interactive Distributes Multimedia Systems and Telecommunication Services <7, 2000, Enschede>: Proceedings. Hrsg.: H. Scholten. - Berlin (u.a.): Springer, 2000 = Lecture notes in computer science; 1905. S. 104-115 . Springer , Berlin (u.a.)
[Konferenz- oder Workshop-Beitrag] , (2000)

Ackermann, Ralf ; Roedig, U. ; Zink, M. ; Griwodz, C. ; Steinmetz, Ralf :
Associating network flows with user and application information.
In: ACM Multimedia Workshop Security <2000, Los Angeles>: Proceedings. S. 149-152 .
[Konferenz- oder Workshop-Beitrag] , (2000)

Ackermann, Ralf ; Roedig, U. ; Steinmetz, Ralf :
Entwicklung und Nutzung von IP-Telefonie Anwendungen auf Unix-Systemen.
In: GUUG-Nachrichten S. 37-41.
[Artikel] , (2000)

Ackermann, Ralf ; Rensing, C. ; Noll-Hussong, S. ; Wolf, L. ; Steinmetz, Ralf :
SSS4it - secure session setup für Internet-Telefonie.
In: Systemsicherheit 2000 <2000, Bremen>: Tagungsbd. S. 140-150 .
[Konferenz- oder Workshop-Beitrag] , (2000)

Andrew, Mark ; Hasselmeyer, P. :
Using CORBA and JAVA for PBX management.
In: NOMS 2000: IEEE/IFIP Network Operations and Management Symposium <2000, Honolulu, Hawaii>; Proceedings. Hrsg.: J.W..Hong (u.a.) - Piscataway, NJ: IEEE Service Center, 2000. S. 353-365 .
[Konferenz- oder Workshop-Beitrag] , (2000)

Alireza, Ameneh ; Lang, U. ; Padelis, M. ; Schreiner, R. ; Schumacher, M. :
The challenges of CORBA security.
In: Sicherheit in Netzen und Medienströmen: Tagungsbd. des GI Workshops 'Sicherheit in Mediendaten'. Hrsg.: M. Schumacher, R. Steinmetz. - Berlin, Heidelberg (u.a.): Springer, 2000 . Springer , Berlin, Heidelberg (u.a.)
[Konferenz- oder Workshop-Beitrag] , (2000)

Alexa, Marc ; Behr, J. ; Müller, W. :
The morph node.
In: ACM SIGCOMM: Symposium on the Virtual Reality Modeling Language <5, 2000, Monterey, Calif.>: Proceedings. Hrsg.: S.N. Spencer. - New York: ACM Press, 2000. S. 29-34 . ACM Press , New York
[Konferenz- oder Workshop-Beitrag] , (2000)

Alexa, Marc ; Müller, W. :
Representing animations by principal components.
In: Eurographics 2000 <21, 2000, Interlaken>: Proceedings. Hrsg.: D.A.Duce, C. Vandoni = Computer graphics forum. Vol. 19 (2000), No. 3. - Amsterdam: NCC Blackwell, North-Holland. S. C-411 - C-418 . NCC Blackwell , Amsterdam
[Konferenz- oder Workshop-Beitrag] , (2000)

Alexa, Marc :
As-rigid-as possible shape interpolation.
In: SIGGRAPH: International Conference on Computer Graphics and Interactive Techniques <27, 2000, New Orleans, Louisiana>: Proceedings. Hrsg.: K. Akeley. - Reading, MA: Addison-Wesley, 2000. S. 157-164 = Computer Graphics Annual Conference Series . Addison-Wesley , Reading, MA
[Konferenz- oder Workshop-Beitrag] , (2000)

Alexa, Marc ; Müller, W. ; Spierling, U. ; Rieger, T. :
Face-to-face with your assistant: realization issues of animated user interface agents for home appliances.
In: ICM 2000: Intelligent Interactive Assistance & Mobile Multimedia Computing <2000, Rostock>. - Rostock: Fraunhofer-Institut für Graphische Datenverarbeitung u. Univ. Rostock. - Darmstadt: Techn. Univ., FB Informatik, FG Graphisch-Interaktive Systeme u. Ge . Fraunhofer-Institut für Graphische Datenverarbeitung u. Univ. Rostock. - Darmstadt: Techn. Univ. , Rostock
[Konferenz- oder Workshop-Beitrag] , (2000)

Arts, Thomas ; Giesl, J. :
Termination of term rewriting using dependency pairs.
In: Theoretical computer science, 236 pp. 133-178.
[Artikel] , (2000)

Austaller, Gerhard ; Hartl, Andreas ; Kappel, G. ; Lechleitner, C. ; Mühlhäuser, Max ; Reich, S. ; Rudisch, R. :
Gulliver beans: a tool for fine tuning data delivery in E-Commerce applications.
In: EMISA'00: Informationssysteme für E-Commerce <2000, Linz>; Proceedings. S. 29-40 .
[Konferenz- oder Workshop-Beitrag] , (2000)

Autexier, Serge ; Hutter, Dieter ; Langenstein, Bruno ; Mantel, Heiko ; Rock, Georg ; Schairer, Axel ; Stephan, Werner ; Vogt, Roland ; Wolpers, Andreas :
VSE: Formal Methods Meet Industrial Needs.
[Online-Edition: https://link.springer.com/article/10.1007/s100099900022]
In: International Journal on Software Tools for Technology Transfer, 3 (1) pp. 66-77. ISSN 1433-2779
[Artikel] , (2000)

Alexa, Marc ; Müller, Wolfgang :
Representing Animations by Principal Components.
In: Computer Graphics Forum, 19 (3) C-411-C-418.
[Artikel] , (2000)

Alexa, Marc ; Behr, Johannes ; Müller, Wolfgang :
The Morph Node.
In: Web3D - VRML 2000. Proceedings. ACM Press, New York
[Konferenz- oder Workshop-Beitrag] , (2000)

Alexa, Marc :
Merging polyhedral shapes with scattered features.
In: The Visual Computer, 16 (1) pp. 26-37.
[Artikel] , (2000)

Alexa, Marc :
As-Rigid-As-Possible Shape Interpolation.
In: Siggraph 2000. Conference Proceedings. In: Computer Graphics Annual Conference Series . Addison-Wesley, Reading, MA, USA
[Konferenz- oder Workshop-Beitrag] , (2000)

Anderl, Reiner ; Rix, Joachim :
Analyse von Alternativen für eine integrierte Produktentwicklungsumgebung.

[Monograph] , (2000)

Arnold, Michael :
Simultanes Einbetten mehrerer Wasserzeichen in Audiodaten.

[Monograph] , (2000)

Adelsbach, Andre :
Anonymous fingerprinting with direct non-repudiation.
In: LNCS , 1976 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2000)

Austaller, Gerhard ; Hartl, Andreas ; Kappel, Gerti ; Kapsammer, Elisabeth ; Lechleitner, Christoph ; Mühlhäuser, Max ; Reich, Siegfried ; Rudisch, Rimbert
Jasper, Heinrich ; Küng, Josef ; Vossen, Gottfried (eds.) :

Gulliver Beans: A Tool for Fine Tuning Data Delivery in E-Commerce Applications.
Proceedings of EMISA 2000 - Informationssystem f&uuml;r E-Commerce
[Konferenz- oder Workshop-Beitrag] , (2000)

Aitenbichler, Erwin :
Entwurf und Implementierung eines programmierten Graphersetzungssystems in Java.
Johannes Kepler Universität Linz, Institut für Technische Informatik und Telematik
[Masterarbeit] , (2000)

Ahrendt, Wolfgang ; Baar, Thomas ; Beckert, Bernhard ; Giese, Martin ; Habermalz, Elmar ; Hähnle, Reiner ; Menzel, Wolfram ; Schmitt, Peter :
The KeY Approach: Integrating Object Oriented Design and Formal Verification.

[Report] , (2000)

Ahrendt, Wolfgang ; Baar, Thomas ; Beckert, Bernhard ; Giese, Martin ; Habermalz, Elmar ; Hähnle, Reiner ; Menzel, Wolfram ; Schmitt, Peter :
The KeY Approach: Integrating Object Oriented Design and Formal Verification.
In Proc. Java Card Workshop, Cannes, France {INRIA} technical report
[Konferenz- oder Workshop-Beitrag] , (2000)

Ahrendt, Wolfgang ; Baar, Thomas ; Beckert, Bernhard ; Giese, Martin ; Habermalz, Elmar ; Hähnle, Reiner ; Menzel, Wolfram ; Schmitt, Peter
Ojeda-Aciego, Manuel ; de Guzmán, Inma P. ; Brewka, Gerhard ; Pereira, Luís Moniz (eds.) :

The KeY Approach: Integrating Object Oriented Design and Formal Verification.
In: LNCS , 1919 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2000)

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel :
System Description: INKA 5.0 -- A Logic Voyager.
In: LNAI 1632 . Springer , Trento, Italy
[Konferenz- oder Workshop-Beitrag] , (1999)

Ackermann, Ralf ; Pommitz, J. ; Wolf, L. C. ; Steinmetz, Ralf :
MBone2Tel - telephone users meeting the MBone.
In: IDMS'99: International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services <6, 1999, Toulouse>: Proceedings. S. 121-132 .
[Konferenz- oder Workshop-Beitrag] , (1999)

Alexa, Marc :
Merging polyhedral shapes with scattered features.
In: International Conference on Shape Modeling and Applications <2, 1999, Aizu-Wakamatsu, Japan>: Proceedings. S. 202-210. - Los Alamitos: IEEE Computer Soc. Press, 1999 . IEEE Computer Soc. Press , Los Alamitos
[Konferenz- oder Workshop-Beitrag] , (1999)

Ackermann, Ralf ; Pommitz, J. ; Wolf, L. C. ; Steinmetz, Ralf :
Eine virtuelle PBX.
In: GI Multicast-Workshop <1, 1999, Braunschweig>: Tagungsbd. S. 187-197 .
[Konferenz- oder Workshop-Beitrag] , (1999)

Aschemann, Gerd ; Mohr, T. ; Ruppert, M. :
Integration of SNMP into a CORBA- and Web-based management environment.
In: Kommunikation in Verteilten Systemen (KiVS): 11. ITG/GI-Fachtagung 1999 Darmstadt. Hrsg.: R. Steinmetz. S. 210-221. - Berlin (u.a.): Springer, 1999 . Springer , Berlin (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1999)

Arts, Thomas ; Giesl, J. :
Applying rewriting techniques to the verification of Erlang processes.
In: CSL'99: Annual Conference of the European Association for Computer Science Logic <1999, Madrid>; Proceedings. S. 96-110. - Berlin (u.a.): Springer, 1999 (Lecture notes in computer science; 1683) . Springer , Berlin (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1999)

Aschemann, Gerd ; Kehr, R. ; Zeidler, A. :
A Jini-based gateway architecture for mobile devices.
In: JIT'99: Java Informationstage 1999. Hrsg.: C.H. Cap. - Berlin (u.a.): Springer, 1999. S. 203-212 . Springer , Berlin (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1999)

Ackermann, Ralf ; Pommitz, J. ; Wolf, L. C. ; Steinmetz, Ralf :
MBone2Tel - ein Gateway für die Teilnahme von Nutzern konventioneller Telefonendgeräte an MBone-Konferenzen.
In: ITG/TKTG-Fachtagung Multimedia: Anwendungen, Technologie, Systeme; 8. Dortmunder Fersehseminar; Tagungsbd. - Dortmund 1999. S. 237-240 .
[Konferenz- oder Workshop-Beitrag] , (1999)

Aschemann, Gerd ; Domnitcheva, S. ; Hasselmeyer, P. ; Kehr, R. ; Zeidler, A. :
A framework for the integration of legacy devices into a Jini Management Federation.
In: DSOM'99: IFIP/IEEE International Workshop on Distributed Systems: Operations and Management <10, 1999>; Proceedings. S. 257-268. - Berlin, Heidelberg (u.a.): Springer, 1999 (Lecture notes in computer science; 1700) . Springer , Berlin, Heidelberg (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1999)

Alexa, Marc ; Müller, W. :
The morphing space.
In: International Conference on Central Europe on Computer Graphics and Visualization <7, 1999, Plzen>: Conference Proceedings. Hrsg.: V. Skala; IFIP Woking Group 5.10 on Computer Graphics and Virtual Worlds; European Ass. for Computer Graphics. Vol.2. S. 329 . Univ. of West Bohemia , Plzen
[Konferenz- oder Workshop-Beitrag] , (1999)

Alexa, Marc ; Müller, W. :
Visualization by examples: mapping data to visual representations using few correspondences.
In: Data Visualization '99: Joint Eurographics and IEEE TCVG Symposium on Visualization <1999, Vienna>; Proceedings. Hrsg.: E. Gröller, H. Löffelmann, W. Ribarsky. S. 23-32. - Berlin (u.a.): Springer, 1999 . Springer , Berlin (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1999)

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
Bert, Didier ; Choppy, C. ; Mosses, P. (eds.) :

Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99. Lecture Notes in Computer Science, 1827. Springer, Berlin ; Heidelberg Chateaux de Bonas, France , pp. 73-88.
[Buchkapitel] , (1999)

Anderson, E. ; Bai, Z. ; Bischof, Christian ; Blackford, S. ; Demmel, J. ; Dongarra, J. ; Croz, J. Du ; Greenbaum, A. ; Hammarling, S. ; McKenney, A.:
LAPACK User's Guide / E. Anderson ...
Software, environments, tools ; 9. SIAM, Society for Industrial and Applied Mathematics, Philadelphia, Pa.
[Buch] , (1999)

Alexa, Marc ; Müller, Wolfgang :
Visualization by Examples: Mapping Data to Visual Representations using Few Correspondences.
In: Data Visualization '99. In: Springer Computer Science . Springer, Wien
[Konferenz- oder Workshop-Beitrag] , (1999)

Alexa, Marc ; Müller, Wolfgang :
The Morphing Space.
In: WSCG `99. Conference Proceedings Vol. 2. University of West Bohemia, Plzen
[Konferenz- oder Workshop-Beitrag] , (1999)

Alexa, Marc :
Merging Polyhedral Shapes with Scattered Features.
In: Shape Modeling International '99. Proceedings. IEEE Computer Society Press, Los Alamitos
[Konferenz- oder Workshop-Beitrag] , (1999)

Austaller, Gerhard :
Strategien zur Behandlung von mobilitätsbedingten Verbindungsunterbrechungen in verteilten Programmierumgebungen.
Johannes Kepler Universit&auml;t Linz, Institut f&uuml;r Technische Informatik und Telematik
[Masterarbeit] , (1999)

Aoki, Hisashi ; Schiele, Bernt ; Pentland, Alex :
Realtime Personal Positioning System for Wearable Computers.
3rd IEEE International Symposium on Wearable Computers (ISWC 1999) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (1999)

Appel, Helo ; Biehl, Ingrid ; Fuhrmann, Arnulf ; Ruppert, Markus ; Takagi, Tsuyoshi ; Takura, Akira ; Valentin, Christian :
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.

[Report] , (1999)

Autexier, Serge ; Hutter, Dieter ; Mantel, Heiko ; Schairer, Axel
Bert, D. ; Choppy, C. ; Mosses, P. (eds.) :

Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: LNCS , 1827 . Springer
[Konferenz- oder Workshop-Beitrag] , (1999)

Andries, Marc ; Engels, Gregor ; Habel, Annegret ; Hoffmann, Berthold ; Kreowski, Hans-Jörg ; Kuske, Sabine ; Plump, Detlef ; Schürr, Andy ; Taentzer, Gabriele :
Graph Transformation for Specification and Programming.
In: Science of Computer Programming, 34 (1) pp. 1-54.
[Artikel] , (1999)

Autexier, Serge ; Mantel, Heiko ; Stephan, Werner
Herzog, Otthein ; Günter, Andreas (eds.) :

Simultaneous Quantifier Elimination.
In: LNAI 1504 . Springer , Bremen, Germany
[Konferenz- oder Workshop-Beitrag] , (1998)

Achour, Mostefaoui ; Theel, :
Shrinking timestamp sizes of event ordering protocols.
In: ICPADS'98: International Conference on Parallel and Distributed Systems <6, 1998, Tainan, Taiwan>: Proceedings. S. 193-200 . IEEE 1998 , IEEE 1998
[Konferenz- oder Workshop-Beitrag] , (1998) , IEEE 1998

Aschemann, Gerd ; Kehr, R. :
Towards a requirements-based information model for configuration management.
In: International Conference on Configurable Distributed Systems <4, 1998>: Proceedings. - Piscataway, NJ: IEEE Computer Soc. Press, 1998 . IEEE Computer Soc. Press , Piscataway, NJ
[Konferenz- oder Workshop-Beitrag] , (1998)

Arts, Thomas ; Giesl, J. :
Modularity of termination using dependency pairs.
In: RTA'98: International Conference on Rewriting Techniques and Applications <9, 1998, Tsukuba, Japan>: Proceedings. - Berlin (u.a.): Springer, 1998. S. 226-240 , 1379 . Springer , Berlin (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1998)

Autexier, Serge ; Mantel, Heiko :
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
In: autexier.ea:semantical-investigation-of-simultaneous-skolemization-for-first-order-sequent-calculus:1998a . Germany
[Report] , (1998)

Aoki, Hisashi ; Schiele, Bernt ; Pentland, Alex :
Recognizing personal location from video.
Workshop on Perceptual User Interfaces (PUI)
[Konferenz- oder Workshop-Beitrag] , (1998)

Autexier, Serge ; Mantel, Heiko :
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.

[Report] , (1998)

Ahrendt, Wolfgang ; Beckert, Bernhard ; Hähnle, Reiner ; Menzel, Wolfram ; Reif, Wolfgang ; Schellhorn, Gerhard ; Schmitt, Peter
Bibel, Wolfgang ; Schmitt, Peter (eds.) :

Integration of Automated and Interactive Theorem Proving.
In: Automated Deduction: A Basis for Applications. Kluwer , 97--116.
[Buchkapitel] , (1998)

Arts, Thomas ; Giesl, J. :
Proving innermost normalisation automatically.
In: International Conference on Rewriting Techniques and Applications <8, 1997, Sitges, Spain>: Proceedings. - Berlin (u.a.): Springer, 1997. S. 157-171 , 1232 . Springer , Berlin, Heidelberg (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1997)

Arts, Thomas ; Giesl, J. :
Automatically proving termination where simplification orderings fail.
In: International Joint Conference on Theory and Practice of Software Development <7, 1997, Lille, France>: Proceedings. - Berlin (u.a.): Springer, 1997. S. 261-272 , 1214 . Springer , Berlin, Heidelberg (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1997)

Alexa, Marc :
Der Morphing-Raum : Verallgemeinerung des Morphing-Prozesses und Entwicklung von Algorithmen zum Morphing zwischen mehreren Objekten beliebiger Dimensionalität.
TU Darmstadt
[Masterarbeit] , (1997)

Assmus, Kerstin :
Realisierung von Teilen eines Systems fuer den Zugriff auf multimediale Datenbanken mittels wandernder Agenten im Intranet.
TU Darmstadt
[Masterarbeit] , (1997)

Arts, Thomas ; Giesl, J. :
Termination of constructor systems.
In: International Conference on Rewriting Techniques and Applications RTA'96 <7, 1996, New Brunswick, NJ>: Proceedings. - Berlin (u.a.): Springer, 1996. S. 63-77 , 1103 . Springer , Berlin (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1996)

Ackermann, Hans-Josef :
Hardware-Unterstützung für effiziente Dreiecksrasterisierung und Texture Mapping.
Shaker , Aachen
[Dissertation]

Anzill, W. ; Stryk, Oskar von :
Optimum design of microwave oscillators with minimized phase noise.
In: Progress in industrial mathematics at ECMI 94. Hrsg.: H. Neunzert. - Chichester (u.a.): Wiley , 1996. S. 301-306. Wiley, Chichester (u.a.)
[Buchkapitel] , (1996)

Alexa, Marc ; Gerfelder, Norbert ; Grimm, P. ; Seiler, Christian :
AVWoD - Concept and Realization for Internet-Based Media Integration.
In: Real Time Multimedia and the World Wide Web. W3C Workshop. Institut National de Recherche en Informatique, Sophia-Antipolis
[Konferenz- oder Workshop-Beitrag] , (1996)

Ackermann, Hans-Josef :
Hardware-Unterstuetzung fuer effiziente Dreiecksrasterisierung und Texture Mapping.
Shaker, Aachen
[Dissertation]

Adam, Winfried :
Konzeption und Implementierung einer Kopplung zwischen Unternehmensmodellierung und EDM-Systemen.
TU Darmstadt
[Masterarbeit] , (1996)

Astheimer, Peter :
Acoustic simulation for visualization and virtual reality.
In: Eurographics state-of-the-art <1995, Maastricht, NL>: Reports. Hrsg.: R. Veltkamp. S. 1-23 .
[Konferenz- oder Workshop-Beitrag] , (1995)

Andelfinger, Urs :
Diskursive Anforderungsanalyse und Validierung.
Technische Univ. Darmstadt , Darmstadt
[Dissertation]

Astheimer, Peter :
Sonifikation numerischer Daten für Visualisierung und Virtuelle Realität.
Shaker , Aachen
[Dissertation]

Astheimer, Peter ; Dai, ; Felger, ; Göbel, ; Haase, ; Müller, ; Ziegler, ; Encarnacao, José L. :
Virtual reality technology: enabling new dimensions in computer supported applications.
In: International Conference on Design to Manufacture in Modern Industry: DMMI '95 <1995, Maribor, Slovenia>: Proceedings. Vol. I. S. 3-25 . Univ , Maribor
[Konferenz- oder Workshop-Beitrag] , (1995) , Maribor: Univ., 1995

Astheimer, Peter ; Felger, :
An interactive virtual world experience: the SBG cyberspace roadshow.
In: Eurographics Workshop on Virtual Environments: Realism and Realtime <2, 1995, Monte Carlo>: Selected Papers. Hrsg.: M. Göbel . Springer , Berlin, Heidelberg (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1995) , Berlin, Heidelberg (u.a.): Springer, 1995

Astheimer, Peter ; Dai, ; Felger, ; Göbel, ; Haase, ; Müller, ; Ziegler, :
Virtual design II: an advanced VR system for industrial applications.
In: Virtual Reality World <1995, Stuttgart>: Proceedings. s. 337-363 .
[Konferenz- oder Workshop-Beitrag] , (1995)

Astheimer, Peter ; Göbel, :
Virtual design II: an advanced VR development environment.
In: Eurographics Workshop on Virtual Environments: Realism and Realtime <2, 1995, Monte Carlo>: Selected Papers. Hrsg.: M. Göbel . Springer , Berlin, Heidelberg (u.a.)
[Konferenz- oder Workshop-Beitrag] , (1995) , Berlin, Heidelberg (u.a.): Springer, 1995

Astheimer, Peter ; Felger, :
Mobile virtual reality installations: a review of the SBG cyberspace roadshow.
In: Topics 1995, H. 1, S. 6-9
[Artikel] , (1995)

Astheimer, Peter ; Göbel, :
Virtual design II: IGD's VR development environment and applications.
In: Topics 1995, H. 4, S. 27-30
[Artikel] , (1995)

Anzill, W. ; Stryk, Oskar von ; Bulirsch, R. ; Russer, P. :
Phase noise minimization of microwave oscillators by optimal design.
In: IEEE MTT-S Symposium < 39, 1995, Orlando, Florida>: Symposium digest. Hrsg.: L. Kiry. - Piscataway, NJ: IEEE, 1995. S. 1565-1568 . IEEE , Piscataway, NJ
[Konferenz- oder Workshop-Beitrag] , (1995)

Auerbach, S. ; Buchmann, Alejandro ; Buchmann, I. ; Kudrass, Thomas :
Database Support for PC Software Configuration and Version Management in the START Network.
In: Proc. of the Intl. Conference on Information and Communication Technologies in Tourism (ENTER).
[Konferenz- oder Workshop-Beitrag] , (1995)

Ak, Sevguel :
Entwurf und Implementierung eines Rendering-Moduls fuer ein graphisches interaktives Visualisierungssystem.
TU Darmstadt
[Masterarbeit] , (1995)

Astheimer, Peter ; Felger, Wolfgang :
An Interactive Virtual World Experience - The Cyberspace Roadshow.
In: Virtual Environments '95. In: Springer Computer Science . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (1995)

Astheimer, Peter ; Felger, Wolfgang :
Mobile Virtual Reality Installations : A Review of the Cyberspace Roadshow.
In: Computer Graphik Topics, 7 (1) pp. 6-9.
[Artikel] , (1995)

Albold, Oliver :
Realisierung einer objekt-orientierten Klassenbibliothek zur Darstellung und Verwaltung von dreidimensionalen Geo-Objeken und deren Beziehungen zueinander.
TU Darmstadt
[Masterarbeit] , (1995)

Astheimer, Peter :
Sonifikation numerischer Daten fuer Visualisierung und Virtuelle Realitaet.
Shaker, Darmstadt
[Dissertation]

Astheimer, Peter ; Dai, Fan ; Felger, Wolfgang ; Göbel, Martin ; Haase, Helmut ; Müller, Stefan ; Ziegler, Rolf :
VirtualDesign II - an Advanced VR System for Industrial Applications.
In: Virtual Reality World '95. Conference Documentation.
[Konferenz- oder Workshop-Beitrag] , (1995)

Amendola, Sandro :
Effiziente Algorithmen für Probleme in Gittern über {$mathbbR^d$}.
Universit&auml;t des Saarlandes
[Masterarbeit] , (1995)

Astheimer, Peter :
Acoustic Simulation for Visualization and Virtual Reality.
In: Eurographics '95. State Of The Art Reports.
[Konferenz- oder Workshop-Beitrag] , (1995)

Astheimer, Peter :
Virtual Design II - an advanced VR development environment.
In: Virtual Environments '95. In: Springer Computer Science . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (1995)

Astheimer, Peter ; Dai, Fan ; Felger, Wolfgang ; Göbel, Martin ; Haase, Helmut ; Müller, Stefan ; Ziegler, Rolf ; Encarnação, José L. :
Virtual Reality Technology - Enabling New Dimensions in Computer-Supported Applications.
In: dmmi '95. Proceedings Part 1.
[Konferenz- oder Workshop-Beitrag] , (1995)

Astheimer, Peter ; Felger, Wolfgang ; Göbel, Martin ; Müller, Stefan :
Das Demonstrationszentrum für Virtuelle Realität am Fraunhofer-Institut für Graphische Datenverarbeitung, Darmstadt - Konzeption, Anwendungen, Zukunftsperspektiven.

[Anderes] , (1994)

Astheimer, Peter ; Pöche, Maria-Luise :
Level-of-Detail Generation and its Application in Virtual Reality.
In: Virtual Reality Software & Technology. World Scientific, Singapore
[Konferenz- oder Workshop-Beitrag] , (1994)

Astheimer, Peter ; Dai, Fan ; Göbel, Martin ; Müller, Stefan ; Kruse, Rolf ; Zachmann, Gabriel :
Realism in Virtual Reality.
In: Keine Angabe Wiley, New York , pp. 189-208.
[Buchkapitel] , (1994)

Augusto, E.J.M. ; Dionisio, Jose M.S. ; Domingos, J.J.D. ; Gomes, Mario Rui :
The Sun and its Impact on Thermal Analysis in Buildings: Physical Simulation and Visualization (1994).
In: Graphics and Modelling in Science & Technology. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (1994)

Astheimer, Peter ; Göbel, Martin ; Böhm, Klaus ; Felger, Wolfgang ; Müller, Stefan :
Die Virtuelle Umgebung - Eine neue Epoche in der Mensch-Maschine-Kommunikation. Teil I: Einordnung, Begriffe, Geraete.
In: Informatik Spektrum, 17 (5) pp. 281-290.
[Artikel] , (1994)

Astheimer, Peter ; Göbel, Martin ; Böhm, Klaus ; Felger, Wolfgang ; Müller, Stefan :
Die Virtuelle Umgebung - Eine neue Epoche in der Mensch-Maschine-Kommunikation. Teil II: Kommunikations- und Praesentationstechniken, Systeme, Anwendungen.
In: Informatik Spektrum, 17 (6) pp. 357-367.
[Artikel] , (1994)

Arens, Georg :
Konzeption und Realisierung einer Transaktionsverwaltung fr ein aktives objektorientiertes datenbanksystem.
Technische Hochschule Darmstadt
[Masterarbeit] , (1994)

Abel, Christine :
Ein Algorithmus zur Berechnung der Klassenzahl und des Regulators reellquadratischer Ordnungen.
Universit&auml;t des Saarlandes
[Dissertation]

Andelfinger, Urs:
Validierung von Systementwicklungen : Forschungsgruppe MuSE, Forschungsbericht.
Fachbereich Informatik, Darmstadt
[Buch] , (1993)

Astheimer, Peter :
Acoustic Sensations in Virtual Worlds.
In: Computer Graphik Topics, 5 (1) pp. 10-11.
[Artikel] , (1993)

Astheimer, Peter :
Acoustic Virtual Reality - Imitation of Real Worlds.

[Anderes] , (1993)

Astheimer, Peter ; Dai, Fan :
Dynamic Objects in Virtual Worlds - Integrating Simulations in a Virtual Reality Toolkit -.
In: European Simulation Symposium 1993. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (1993)

Astheimer, Peter ; Felger, Wolfgang ; Frühauf, Thomas ; Göbel, Martin ; Müller, Stefan ; Encarnação, José L. :
Graphics and Visualization: The Essential Features for the Classification of Systems.
In: Graphics, Design and Visualisation. Proceedings. In: IFIP Transactions B: Applications in Technology; B-9 . Jaico; North-Holland, Bombay
[Konferenz- oder Workshop-Beitrag] , (1993)

Astheimer, Peter ; Göbel, Martin :
Integration akustischer Effekte und Simulationen in VR-Entwicklungsumgebungen.
In: Virtual Reality '93. Anwendungen und Trends. In: Forschung und Praxis. IPA/IAO FhG; T 35 . Springer, Berlin; Heidelberg; New York
[Konferenz- oder Workshop-Beitrag] , (1993)

Astheimer, Peter :
Realtime Sonification to enhance the Human-Computer-Interaction in Virtual Worlds.
In: Visualization in Scientific Computing '93. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (1993)

Astheimer, Peter :
Sounds of Silence - How to animate Virtual Worlds with Sound.

[Anderes] , (1993)

Astheimer, Peter ; Felger, Wolfgang ; Müller, Stefan :
Virtual Design - A Generic Virtual Reality System.
In: First Eurographics Workshop on Virtual Reality. Proceedings. In: Eurographics Technical Report Series; EG VR 93 . Eurographics, Catalonia
[Konferenz- oder Workshop-Beitrag] , (1993)

Astheimer, Peter ; Felger, Wolfgang ; Müller, Stefan :
Virtual Design - A Generic VR System for Industrial Applications.
In: Computers & Graphics, 17 (6) pp. 671-678.
[Artikel] , (1993)

Astheimer, Peter ; Felger, Wolfgang :
Virtuelle Realität in der Architektur.
In: Bau-Informatik, 4 (2) pp. 54-58.
[Artikel] , (1993)

Astheimer, Peter :
What You See is What You Hear - Acoustics Applied in Virtual Worlds.
In: Research Frontiers in Virtual Reality 1993. Proceedings. IEEE Computer Society Press, California
[Konferenz- oder Workshop-Beitrag] , (1993)

Arndt, Susanne ; Frühauf, Thomas ; Karlsson, Kennet ; Schröder, Florian :
Integration of Compute Servers in an Environment for Distributed Simulation and Visualization.
In: ECUC '92. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (1992)

Astheimer, Peter ; Felger, Wolfgang ; Frühauf, Martin ; Göbel, Martin ; Karlsson, Kennet ; Encarnação, José L. :
Interactive Modeling in High-performance Scientific Visualization - the VIS-A-VIS Project.
In: Computers in Industry, Volume 19 (2) pp. 213-225.
[Artikel] , (1992)

Ala-Rantala, Martti :
NeuroGlove: An Interactive Test Environment for Hand Posture and Gesture Recognition Using Dataglove and Neural Networks.
TU Darmstadt
[Masterarbeit] , (1992)

Astheimer, Peter :
Sonification in Scientific Visualization and Virtual Reality Applications.
In: Visualisierung - Rolle von Interaktivität und Echtzeit. Preprints.
[Konferenz- oder Workshop-Beitrag] , (1992)

Astheimer, Peter :
Sonification Tools to supplement Dataflow Visualization.
In: Visualization in Scientific Computing '92. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (1992)

Astheimer, Peter ; Felger, Wolfgang ; Göbel, Martin :
Virtual Reality - An Application Development Platform.
In: Computer Graphik Topics, 4 (2) pp. 16-17.
[Artikel] , (1992)

Astheimer, Peter :
The VIS-A-VIS Audification Toolkit.
In: Computer Graphik Topics (1) pp. 16-17.
[Artikel] , (1992)

Astheimer, Peter ; Felger, Wolfgang :
Application of Animation and Audio in Visualization Systems.
In: Second Eurographics Workshop on Visualization in Scientific Computing. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (1991)

Astheimer, Peter ; Felger, Wolfgang ; Frühauf, Martin ; Göbel, Martin ; Karlsson, Kennet ; Encarnação, José L. :
Graphics Modeling as a Basic Tool for Scientific Visualization.
In: Modeling in Computer Graphics. In: IFIP Series on Computer Graphics . Springer, Berlin, Heidelberg
[Konferenz- oder Workshop-Beitrag] , (1991)

Abel, Volker :
Untersuchung des Einsatzes neuronaler Netze und klassischer Klassifikationsverfahren bei der Zeichenerkennung.
TU Darmstadt
[Masterarbeit] , (1991)

Astheimer, Peter ; Felger, Wolfgang :
Visualisierung von Volumenfunktionen.
In: Keine Angabe Beiträge zur Graphischen Datenverarbeitung. Springer, Berlin; Heidelberg; New York , pp. 31-38.
[Buchkapitel] , (1991)

Astheimer, Peter ; Felger, Wolfgang :
Working with apE.
In: Computer Graphik Topics, 3 (3) p. 22.
[Artikel] , (1991)

Abou-Abed, Ali :
Design und Prototypimplementierung einer Darstellungsschnittstelle für ein Netzmanagementsystem.

[Monograph] , (1990)

Ahlmann, Dirk :
Einsatz von Modellen des menschlichen visuellen Systems in der Werbung.
TU Darmstadt
[Masterarbeit] , (1990)

Astheimer, Peter :
Graphik in Prozeßleitsystemen.
In: Produktion (9) pp. 12-13.
[Artikel] , (1990)

Anheuser, Frederik :
Ein Aufgabenmodell für eine adaptive Benutzerschnittstelle.
TU Darmstadt
[Masterarbeit] , (1989)

An, Gan Hoa :
Definition und Repräsentation von Aktionen in Roboterarbeitszellen und deren graphisch-interaktive Verifizierung und Modifizierung.
TU Darmstadt
[Masterarbeit] , (1989)

Astheimer, Peter ; Felger, Wolfgang ; Frühauf, Martin ; Göbel, Martin :
Intelligent User Interfaces Control System.
In: Proceedings of the Second IFIP Workshop on Intelligent CAD.
[Konferenz- oder Workshop-Beitrag] , (1988)

Arnold, Richard :
Untersuchung objekt-orientierter Graphikkonzepte auf der Grundlage von Smalltalk-80.
TU Darmstadt
[Masterarbeit] , (1988)

Astheimer, Peter ; Frühauf, Martin ; Göbel, Martin ; Karlsson, Kennet :
Visualisierung und Steuerung technischer Prozesse mit einer graphisch-interaktiven Benutzungsoberfläche.
In: GI - 18.Jahrestagung II - Vernetzte und Komplexe Informatik-Systeme. In: Informatik-Fachberichte; 188 . Springer, Berlin; Heidelberg; New York
[Konferenz- oder Workshop-Beitrag] , (1988)

Ackermann, Hans-Josef :
Entwicklung und Aufbau eines Transputer-Systems zur Darstellung von Bildsegmenten auf Fernseh- und Graphikmonitoren.
TU Darmstadt
[Masterarbeit] , (1987)

Altenkirch, Erich :
Spezifikation und Implementierung der Archivierung von hierarchischen Darstellungs-Datenstrukturen für PHI-GKS.
TU Darmstadt
[Masterarbeit] , (1987)

Astheimer, Peter :
Realisierung eines allgemeinen Moduls zur Verdeckungsberechnung der graphischen Ausgabeprimitive in GKS.
TU Darmstadt
[Masterarbeit] , (1986)

B

Brand, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Domain Validation ++ for MitM-Resilient PKI.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: ACM CCS 2018, 15.-19.10. 2018, Toronto, Canada.
[Konferenz- oder Workshop-Beitrag] , (2018)

Buechler, Dieter ; Calandra, Roberto ; Schoelkopf, Bernhard ; Peters, Jan :
Control of Musculoskeletal Systems using Learned Dynamics Models.
In: IEEE Robotics and Automation Letters, 3 (4) pp. 3161-3168. ISSN 2377-3766, 2377-3774 (elektronisch)
[Artikel] , (2018)

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix :
Exploring the Performance Envelope of the LLL Algorithm.
[Online-Edition: https://cse2018.hpc.pub.ro/]
In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, 29.-31.10.2018, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania. CSE-2018 IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2018)

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[Konferenz- oder Workshop-Beitrag] , (2018)

Böck, Leon ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max ; Karuppayah, Shankar :
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
[Online-Edition: https://www.raid2018.org/]
In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece. In: Lecture Notes in Computer Science , 11050 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag] , (2018)

Bühler, Moritz ; Heinz, Carsten ; Kohaut, Simon :
Dynamic Simulation Model for an Autonomous Sailboat.
In: IRSC 2018, 30.08 - 01.09.2018, Southampton.
[Konferenz- oder Workshop-Beitrag] , (2018)

Bračevac, Oliver ; Amin, Nada ; Salvaneschi, Guido ; Erdweg, Sebastian ; Eugster, Patrick ; Mezini, Mira :
Versatile Event Correlation with Algebraic Effects.
[Online-Edition: https://doi.org/10.1145/3236762]
In: Proceedings of the ACM on Programming Languages. PACMPL, Volume 2 (Issue ICFP). ACM , 67:1-67:31.
[Buchkapitel] , (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[Konferenz- oder Workshop-Beitrag] , (2018)

Botschen, Teresa ; Sorokin, Daniil ; Gurevych, Iryna :
Frame- and Entity-Based Knowledge for Common-Sense Argumentative Reasoning.
[Online-Edition: https://fileserver.ukp.informatik.tu-darmstadt.de/sorokin/20...]
In: 5th Workshop on Argument Mining, 31.10.2018, Brussels, Belgium. Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing
[Konferenz- oder Workshop-Beitrag] , (2018) (Im Druck)

Boullosa, Beto ; Eckart de Castilho, Richard ; Kumar, Naveen ; Klie, Jan-Christoph ; Gurevych, Iryna :
Integrating Knowledge-Supported Search into the INCEpTION Annotation Platform.
[Online-Edition: https://fileserver.ukp.informatik.tu-darmstadt.de/UKP_Webpag...]
In: The 2018 Conference on Empirical Methods in Natural Language Processing, 31.10.2018--04.11.2018, Brussels, Belgium. Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing
[Konferenz- oder Workshop-Beitrag] , (2018) (Eingereicht)

Baack, Leon :
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt
[Bachelorarbeit] , (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Konferenz- oder Workshop-Beitrag] , (2018)

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus :
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
[Artikel] , (2018)

Botschen, Teresa ; Beinborn, Lisa ; Gurevych, Iryna :
Multimodal Grounding for Language Processing.
[Online-Edition: http://www.aclweb.org/anthology/C18-1197]
In: The 27th International Conference on Computational Linguistics (COLING 2018), 20.08.2018--26.08.2018, Santa Fe, USA. Proceedings of the 27th International Conference on Computational Linguistics (COLING 2018)
[Konferenz- oder Workshop-Beitrag] , (2018)

Binnig, Carsten :
Generierung Relevanter Testdatenbanken.
In: Gesellschaft für Informatik eV (GI) publishes this series in order to make available to a broad public recent findings in informatics (ie computer science and informa-tion systems), to document conferences that are organized in co-operation with GI and to.
[Konferenz- oder Workshop-Beitrag] , (2018)

Binnig, Carsten ; Kossmann, Donald ; Kraska, Tim ; Losing, Simon :
Towards a Benchmark for the Cloud.
In:
[Artikel] , (2018)

Birkholz, Henk ; Krauß, Christoph ; Zhdanova, Maria ; Kuzhiyelil, Don ; Arul, Tolga ; Heinrich, Markus ; Katzenbeisser, Stefan ; Suri, Neeraj ; Vateva-Gurova, Tsvetoslava ; Schlehuber, Christian :
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
In: International Workshop on MILS: Architecture and Assurance for Secure Systems, Luxembourg, 25.06.2018. Zenodo
[Konferenz- oder Workshop-Beitrag] , (2018)

Botschen, Teresa ; Gurevych, Iryna ; Klie, Jan-Christoph ; Sergieh, Hatem Mousselly ; Roth, Stefan :
Multimodal Frame Identification with Multilingual Evaluation.
[Online-Edition: http://www.aclweb.org/anthology/N18-1134]
Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies Association for Computational Linguistics
[Konferenz- oder Workshop-Beitrag] , (2018)

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza :
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium.
[Konferenz- oder Workshop-Beitrag] , (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[Konferenz- oder Workshop-Beitrag] , (2018)

Brandy, Malte :
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt
[Masterarbeit] , (2018)

Bubel, Richard :
Deduktive Verifikation : Von der Theorie in die Praxis.
Darmstadt
[Habilitation] , (2018)

Binnig, Carsten ; Buratti, Benedetto ; Chung, Yeounoh ; Cousins, Cyrus ; Ebert, Dylan ; Kraska, Tim ; Shang, Zeyuan ; Tromba, Isabella ; Upfal, Eli ; Wang, Linnan :
Towards Interactive Curation & Automatic Tuning of ML Pipelines.
In: 1st Inaugural Conference on Systems ML (SysML).
[Konferenz- oder Workshop-Beitrag] , (2018)

Binnig, Carsten ; Kersting, Kristian ; Molina, Alejandro ; Zgraggen, Emanuel :
DeepVizdom: Deep Interactive Data Exploration.
In:
[Artikel] , (2018)

Belousov, B. ; Peters, J. :
Mean squared advantage minimization as a consequence of entropic policy improvement regularization.
[Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Bori...]
In: The 14th European Workshop on Reinforcement Learning (EWRL 2018), October 1-3, 2018, Lille, France.
[Konferenz- oder Workshop-Beitrag] , (2018)

Beck, Tilman ; Böschen, Falk ; Scherp, Ansgar :
What to Read Next? Challenges and Preliminary Results in Selecting Representative Documents.
[Online-Edition: https://doi.org/10.1007/978-3-319-99133-7\_19]
In: Database and Expert Systems Applications - DEXA 2018 International Workshops, BDMICS, BIOKDD, and TIR, Regensburg, Germany, September 3-6, 2018, Proceedings.
[Konferenz- oder Workshop-Beitrag] , (2018)

Böschen, Falk ; Beck, Tilman ; Scherp, Ansgar :
Survey and empirical comparison of different approaches for text extraction from scholarly figures.
[Online-Edition: https://doi.org/10.1007/s11042-018-6162-7]
In: Multimedia Tools and Applications, 77 (22) pp. 29475-29505. ISSN Online 1573-7721; Print 1380-7501
[Artikel] , (2018)

Bindel, Nina :
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8100]
Technische Universität , Darmstadt
[Dissertation], (2018)

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas :
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
INDOCRYPT 2017 - 18th International Conference on Cryptology in India Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Beller, Moritz ; Gousios, Georgius ; Panichella, Annibale ; Proksch, Sebastian ; Amann, Sven ; Zaidman, Andy :
Developer Testing in the IDE: Patterns, Beliefs, and Behavior.
In: IEEE Transactions on Software Engineering
[Artikel] , (2017) (Im Druck)

Bavishi, Rohan ; Pradel, Michael ; Sen, Koushik :
Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts.

[Report] , (2017)

Berens, Yannick :
Scalability Validation of Parallel Sorting Algorithms.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6825]
Technische Universität , Darmstadt
[Bachelorarbeit] , (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
ProvSec 2017 - The 11th International Conference on Provable Security Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes :
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
CODES/ISSS ’17 Companion Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit] , (2017)

Baumgärtner, Lars ; Kohlbrecher, Stefan ; Euler, Juliane ; Ritter, Tobias ; Stute, Milan ; Meurisch, Christian ; Mühlhäuser, Max ; Hollick, Matthias ; von Stryk, Oskar ; Freisleben, Bernd :
Emergency Communication in Challenged Environments via Unmanned Ground and Aerial Vehicles.
IEEE Global Humanitarian Technology Conference (GHTC) IEEE
[Konferenz- oder Workshop-Beitrag] , (2017)

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza :
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.

[Report] , (2017)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
ESORICS 2017 - 22nd European Symposium on Research in Computer Security
[Konferenz- oder Workshop-Beitrag] , (2017)

Botschen, Teresa ; Mousselly-Sergieh, Hatem ; Gurevych, Iryna :
Experimental study of multimodal representations for Frame Identification - How to find the right multimodal representations for this task?
Language-Learning-Logic Workshop (3L 2017)
[Konferenz- oder Workshop-Beitrag] , (2017)

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele :
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15 pp. 12-13.
[Artikel] , (2017)

Butin, Denis :
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4) pp. 37-43.
[Artikel] , (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag] , (2017)

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian :
PRF-ODH: Relations, Instantiations, and Impossibility Results.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag] , (2017)

Bauereiß, Thomas ; Greiner, Simon ; Herda, Mihai ; Kirsten, Michael ; Li, Ximeng ; Mantel, Heiko ; Mohr, Martin ; Perner, Matthias ; Schneider, David ; Tasch, Markus :
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.

[Report] , (2017)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Botschen, Teresa ; Mousselly-Sergieh, Hatem ; Gurevych, Iryna :
Prediction of Frame-to-Frame Relations in the FrameNet Hierarchy with Frame Embeddings.
[Online-Edition: http://www.aclweb.org/anthology/W17-2618]
Proceedings of th 2nd Workshop on Representation Learning for NLP (RepL4NLP, held in conjunction with ACL 2017)
[Konferenz- oder Workshop-Beitrag] , (2017)

Büscher, Niklas ; Katzenbeisser, Stefan:
Compilation for Secure Multi-party Computation.
[Online-Edition: https://www.springer.com/de/book/9783319675213]
Springer Briefs in Computer Science ISBN 978-3-319-67521-3
[Buch] , (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Bugge, Sebastian :
Solving Learning With Errors Instances Using Quantum Reductions.
TU Darmstadt
[Masterarbeit] , (2017)

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan :
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Proceedings on Privacy Enhancing Technologies De Gruyter
[Konferenz- oder Workshop-Beitrag] , (2017)

Burger, Michael ; Nguyen, Giang Nam ; Bischof, Christian :
Extending Perfect Spatial Hashing to Index Tuple-based Graphs Representing Super Carbon Nanotubes.
[Online-Edition: http://www.iccs-meeting.org/iccs2017/]
In: ICCS 2017, 12.06.2017, Zürich. Proceedings of the International Conference on Computational Science
[Konferenz- oder Workshop-Beitrag] , (2017) (Im Druck)

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan :
A lightweight protocol for privacy preserving division.
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference IEEE
[Konferenz- oder Workshop-Beitrag] , (2017)

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas :
Transitioning to a Quantum-Resistant Public Key Infrastructure.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Burger, Michael :
Memory-Efficient and Parallel Simulation of Super Carbon Nanotubes.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6229/]
tuprints , Darmstadt
[Dissertation], (2017)

Burger, Michael :
Memory-Efficient and Parallel Simulation of Super Carbon Nanotubes.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6229]
Technische Universität , Darmstadt
[Dissertation], (2017)

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias :
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
[Artikel] , (2017)

Bindel, Nina :
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag] , (2017)

Biemann, Chris ; Bontcheva, Kalina ; Eckart de Castilho, Richard ; Gurevych, Iryna ; Yimam, Seid Muhie
Ide, Nancy ; Pustejovsky, James (eds.) :

Collaborative Web-based Tools for Multi-layer Text Annotation.
[Online-Edition: http://www.springer.com/de/book/9789402408799]
In: The Handbook of Linguistic Annotation. Text, Speech, and Technology book series. Springer Netherlands , pp. 229-256. ISBN 978-94-024-0879-9
[Buchkapitel] , (2017)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick :
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS (10194). Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Bugert, Michael ; Puzikov, Yevgeniy ; Rücklé, Andreas ; Eckle-Kohler, Judith ; Martin, Teresa ; Martínez Cámara, Eugenio ; Sorokin, Daniil ; Peyrard, Maxime ; Gurevych, Iryna :
LSDSem 2017: Exploring Data Generation Methods for the Story Cloze Test.
[Online-Edition: http://aclweb.org/anthology/W17-0908]
In: The 2nd Workshop on Linking Models of Lexical, Sentential and Discourse-level Semantics, 03.04.2017--04.04.2017, Valencia, Spain. Proceedings of the 2nd Workshop on Linking Models of Lexical, Sentential and Discourse-level Semantics Association for Computational Linguistics
[Konferenz- oder Workshop-Beitrag] , (2017)

Boullosa, Beto ; Eckart de Castilho, Richard ; Geyken, Alexander ; Lemnitzer, Lothar ; Gurevych, Iryna :
A tool for extracting sense-disambiguated example sentences through user feedback.
[Online-Edition: http://aclweb.org/anthology/E17-3018]
Proceedings of the Software Demonstrations of the 15th Conference of the European Chapter of the Association for Computational Linguistics Association for Computational Linguistics
[Konferenz- oder Workshop-Beitrag] , (2017)

Breuils, Stéphane ; Nozick, Vincent ; Fuchs, Laurent ; Hildenbrand, Dietmar ; Benger, Werner ; Steinmetz, Christian :
A Hybrid Approach for Computing Products of High-dimensional Geometric Algebras.
[Online-Edition: http://doi.acm.org/10.1145/3095140.3097284]
In: Proceedings of the Computer Graphics International Conference, June 27 - 30, 2017, Yokohama, Japan. In: CGI '17 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag] , (2017)

Bleikertz, Sören :
Automated Security Analysis of Virtualized Infrastructures.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6610]
Technische Universität , Darmstadt
[Dissertation], (2017)

Blöcher, Marcel ; Viering, Malte ; Schmid, Stefan ; Eugster, Patrick :
The Grand CRU Challenge.
In: Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems.
[Konferenz- oder Workshop-Beitrag] , (2017)

Borges, Fábio ; Lara, Pedro ; Portugal, Renato :
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292 406--416.
[Artikel] , (2017)

Binnig, Carsten ; De Stefani, Lorenzo ; Kraska, Tim ; Upfal, Eli ; Zgraggen, Emanuel ; Zhao, Zheguang :
Toward Sustainable Insights, or Why Polygamy is Bad for You.
In: CIDR.
[Konferenz- oder Workshop-Beitrag] , (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag] , (2017)

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier :
Consolidating Inner Product Masking.
[Online-Edition: http://eprint.iacr.org/2017/1047]
In: IACR Cryptology ePrint Archive, 2017 p. 1047.
[Artikel] , (2017)

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier :
Consolidating Inner Product Masking.
[Online-Edition: https://doi.org/10.1007/978-3-319-70694-8_25]
In: Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
[Konferenz- oder Workshop-Beitrag] , (2017)

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves :
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
[Online-Edition: https://doi.org/10.1007/978-3-319-56620-7_19]
In: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I.
[Konferenz- oder Workshop-Beitrag] , (2017)

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof :
Position-Based Cryptography and Multiparty Communication Complexity.
[Online-Edition: https://doi.org/10.1007/978-3-319-70500-2_3]
In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I.
[Konferenz- oder Workshop-Beitrag] , (2017)

Boukoros, Spyros ; Katzenbeisser, Stefan :
Measuring privacy in high dimensional microdata collections.
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977]
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017.
[Konferenz- oder Workshop-Beitrag] , (2017)

Belousov, B. ; Peters, J. :
f-Divergence constrained policy improvement.
[Online-Edition: https://arxiv.org/pdf/1801.00056.pdf]
In: Journal of Machine Learning Research X
[Artikel] , (2017)

Belousov, B. ; Neumann, G. ; Rothkopf, C.A. ; Peters, J. :
Catching heuristics are optimal control policies.
[Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...]
In: Proceedings of the Karniel Thirteenth Computational Motor Control Workshop.
[Konferenz- oder Workshop-Beitrag] , (2017)

Busch, Baptiste ; Maeda, Guilherme ; Mollard, Yoan ; Demangeat, Marie ; Lopes, Manuel :
Postural Optimization for an Ergonomic Human-Robot Interaction.
In: 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 24-28 Sept. 2017, Vancouver, BC, Canada. IEEE
[Konferenz- oder Workshop-Beitrag] , (2017)

Büscher, Niklas ; Franz, Martin ; Holzer, Andreas ; Veith, Helmut ; Katzenbeisser, Stefan :
On compiling Boolean circuits optimized for secure multi-party computation.
[Online-Edition: https://doi.org/10.1007/s10703-017-0300-0]
In: Formal Methods in System Design, 51 (2) pp. 308-331.
[Artikel] , (2017)

Benikova, Darina ; Mieskes, Margot ; Meyer, Christian M. ; Gurevych, Iryna :
Bridging the gap between extractive and abstractive summaries: Creation and evaluation of coherent extracts from heterogeneous sources.
[Online-Edition: http://aclweb.org/anthology/C16-1099]
Proceedings of the 26th International Conference on Computational Linguistics (COLING)
[Konferenz- oder Workshop-Beitrag] , (2016)

Brendel, Jacqueline ; Demirel, Denise :
Efficient Proactive Secret Sharing.
2016 Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag] , (2016)

Brendel, J. ; Demirel, D. :
Efficient proactive secret sharing.
In: 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[Konferenz- oder Workshop-Beitrag] , (2016)

Blom, David ; Ertl, Thomas ; Fernandes, Oliver ; Frey, Steffen ; Klimach, Harald ; Krupp, Verena ; Mehl, Miriam ; Roller, Sabine ; Sternel, Dörte Carla ; Uekermann, Benjamin ; Winter, Tilo ; van Zuijlen, Alexander
Bungartz, Hans-Joachim ; Neumann, Philipp ; Nagel, Wolfgang E. (eds.) :

Partitioned Fluid-Structure-Acoustics Interaction on Distributed Data: Numerical Results and Visualization.
In: Lecture Notes in Computational Science and Engineering , 113 Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan :
Scalable Secure Computation from ANSI-C.
WIFS - IEEE International Workshop on Information Forensics and Security IEEE
[Konferenz- oder Workshop-Beitrag] , (2016)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
[Online-Edition: https://arxiv.org/abs/1611.08396]
In: Cryptography and Security
[Artikel] , (2016)

Benz, Manuel :
Interprocedural Graph-based Object Usage Model Generation for Detecting Anomalous Usage of Cryptographic APIs.
Technische Universität Darmstadt
[Masterarbeit] , (2016)

Ballweg, Kathrin ; Zouhar, Florian ; Wilhelmi-Dworski, Patrick ; Landesberger, Tatiana von ; Fahrer, Uli ; Panchenko, Alexander ; Yimam, Seid Muhie ; Biemann, Chris ; Regneri, Michaela ; Ulrich, Heiner :
new/s/leak – A Tool for Visual Exploration of Large Text Document Collections in the Journalistic Doman.
In: IEEE VIS'16
[Artikel] , (2016)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit] , (2016)

Beinborn, Lisa Marina :
Predicting and Manipulating the Difficulty of Text-Completion Exercises for Language Learning.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5647]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Berninger, Kim ; Hoppe, Jannis ; Milde, Benjamin :
Classification of Speaker Intoxication Using a Bidirectional Recurrent Neural Network.
In: Lecture Notes in Computer Science (LNCS) , 9924 .
[Konferenz- oder Workshop-Beitrag] , (2016)

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan :
Compiling Low Depth Circuits for Practical Secure Computation.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander :
A comparison of block ciphers SIMON, SPECK, and KATAN.

[Report] , (2016)

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes :
Formal Policy-based Provenance Audit.
The 11th International Workshop on Security - IWSEC 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).

[Anderes] , (2016)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane :
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography IEEE Conference Publication
[Konferenz- oder Workshop-Beitrag] , (2016)

Burger, Michael ; Bischof, Christian ; Wackerfuß, Jens :
Compressed Symmetric Graphs for the Simulation of Super Carbon Nanotubes.
[Online-Edition: http://hpcs2016.cisedu.info/]
Proceedings of the 2016 International Conference on High Performance Computing & Simulation Innsbruch, Austria
[Konferenz- oder Workshop-Beitrag] , (2016)

Böhme, David ; Geimer, Markus ; Arnold, Lukas ; Voigtländer, Felix ; Wolf, Felix :
Identifying the root causes of wait states in large-scale parallel applications.
In: ACM Transactions on Parallel Computing, 3 (2) Article No. 11, 24 pages. ISSN 2329-4949
[Artikel] , (2016)

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael :
Towards Automated Measurements of Internets Naming Infrastructure.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Konferenz- oder Workshop-Beitrag] , (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Konferenz- oder Workshop-Beitrag] , (2016)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.

[Anderes] , (2016)

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas :
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security ACM
[Konferenz- oder Workshop-Beitrag] , (2016)

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Konferenz- oder Workshop-Beitrag] , (2016)

Benikova, Darina ; Biemann, Chris :
SemRelData – Multilingual Contextual Annotation of Semantic Relations between Nominals: Dataset and Guidelines.
Proceedings Tenth International Conference on Language Resources and Evaluation (LREC 2016) ELRA
[Konferenz- oder Workshop-Beitrag] , (2016)

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie :
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5) pp. 300-304.
[Artikel] , (2016)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas:
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9
[Buch] , (2016)

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel :
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7) 309–322.
[Artikel] , (2016)

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas :
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Bračevac, Oliver ; Erdweg, Sebastian ; Salvaneschi, Guido ; Mezini, Mira :
CPL: A Core Language for Cloud Computing.
[Online-Edition: http://doi.acm.org/10.1145/2889443.2889452]
In: Proceedings of the 15th International Conference on Modularity. MODULARITY 2016. ACM, New York, NY, USA , pp. 94-105. ISBN 978-1-4503-3995-7
[Buchkapitel] , (2016)

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan :
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS (9614). Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Budurushi, Jurlind :
Usable Security Evaluation of EasyVote in the Context of Complex Elections.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5418]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Bračevac, Oliver ; Erdweg, Sebastian ; Salvaneschi, Guido ; Mezini, Mira :
CPL: A Core Language for Cloud Computing -- Technical Report.
In: CoRR, abs/1602.00981
[Artikel] , (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2016)

Brendel, Jacqueline :
Efficient Proactive Secret Sharing.
TU Darmstadt
[Masterarbeit] , (2016)

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof :
Position-Based Cryptography and Multiparty Communication Complexity.
[Online-Edition: http://eprint.iacr.org/2016/536]
In: IACR Cryptology ePrint Archive, 2016 p. 536.
[Artikel] , (2016)

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves :
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
[Online-Edition: http://eprint.iacr.org/2016/912]
In: IACR Cryptology ePrint Archive, 2016 p. 912.
[Artikel] , (2016)

Burger, Michael ; Bischof, Christian ; Schröppel, Christian ; Wackerfuß, Jens :
Methods to Model and Simulate Super Carbon Nanotubes of Higher Order.
[Online-Edition: https://paginas.fe.up.pt/~specs/events/cse2015/ccpe-cse2015....]
In: Concurrency and Computation: Practice and Experience, Special Issue
[Artikel] , (2016)

Büttner, Carsten :
Anonymous Authenticated Car-to-X Communication.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5832]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Boubekeur, Tamy ; Cignoni, Paolo ; Eisemann, Elmar ; Goesele, Michael ; Klein, Reinhard ; Roth, Stefan ; Weinmann, Michael ; Wimmer, Michael
Catalano, Chiara Eva ; Luca, Livio De (eds.) :

Harvesting Dynamic 3D Worlds from Commodity Sensor Clouds.
In: Eurographics Workshop on Graphics and Cultural Heritage. The Eurographics Association
[Konferenz- oder Workshop-Beitrag] , (2016)

Bodden, Eric ; Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina
Margaria, Tiziana ; Steffen, Bernhard (eds.) :

Information Flow Analysis for Go.
[Online-Edition: https://doi.org/10.1007/978-3-319-47166-2_30]
In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques. Springer International Publishing , pp. 431-445. ISBN 978-3-319-47166-2 ISSN 0302-9743
[Buchkapitel] , (2016)

Beckert, Bernhard ; Hähnle, Reiner ; Hentschel, Martin ; Schmitt, Peter H.
Ahrendt, Wolfgang ; Beckert, Bernhard ; Bubel, Richard ; Hähnle, Reiner ; Schmitt, Peter H. ; Ulbrich, Mattias (eds.) :

Formal Verification with KeY: A Tutorial.
[Online-Edition: https://doi.org/10.1007/978-3-319-49812-6_16]
In: Deductive Software Verification - The KeY Book - From Theory to Practice. Lecture Notes in Computer Science, 10001. Springer , pp. 541-570.
[Buchkapitel] , (2016)

Bubel, Richard ; Damiani, Ferruccio ; Hähnle, Reiner ; Johnsen, Einar Broch ; Owe, Olaf ; Schaefer, Ina ; Yu, Ingrid Chieh :
Proof Repositories for Compositional Verification of Evolving Software Systems - Managing Change When Proving Software Correct.
[Online-Edition: https://doi.org/10.1007/978-3-319-46508-1_8]
In: Trans. Found. Mastering Chang., 1 pp. 130-156.
[Artikel] , (2016)

Bubel, Richard ; Hähnle, Reiner
Ahrendt, Wolfgang ; Beckert, Bernhard ; Bubel, Richard ; Hähnle, Reiner ; Schmitt, Peter H. ; Ulbrich, Mattias (eds.) :

KeY-Hoare.
[Online-Edition: https://doi.org/10.1007/978-3-319-49812-6_17]
In: Deductive Software Verification - The KeY Book - From Theory to Practice. Lecture Notes in Computer Science, 10001. Springer , pp. 571-589.
[Buchkapitel] , (2016)

Bennaceur, Amel ; Giannakopoulou, Dimitra ; Hähnle, Reiner ; Meinke, Karl :
Machine Learning for Dynamic Software Analysis: Potentials and Limits (Dagstuhl Seminar 16172).
[Online-Edition: https://doi.org/10.4230/DagRep.6.4.161]
In: Dagstuhl Reports, 6 (4) pp. 161-173.
[Artikel] , (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag] , (2016)

Binnig, Carsten ; Crotty, Andrew ; Galakatos, Alex ; Kraska, Tim ; Zamanian, Erfan :
The end of slow networks: It's time for a redesign.
In: Proceedings of the VLDB Endowment, 9 (7) pp. 528-539.
[Artikel] , (2016)

Beinborn, Lisa ; Zesch, Torsten ; Gurevych, Iryna :
Predicting the Spelling Difficulty of Words for Language Learners.
[Online-Edition: http://m-mitchell.com/NAACL-2016/BEA/pdf/BEA1108.pdf]
Proceedings of the 11th Workshop on Innovative Use of NLP for Building Educational Applications held in conjunction with NAACL 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

Buechler, D. ; Ott, H. ; Peters, J. :
A Lightweight Robotic Arm with Pneumatic Muscles for Robot Learning.
Proceedings of the International Conference on Robotics and Automation (ICRA)
[Konferenz- oder Workshop-Beitrag] , (2016)

Belousov, B. ; Neumann, G. ; Rothkopf, C. ; Peters, J. :
Catching heuristics are optimal control policies.
[Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...]
In: Advances in Neural Information Processing Systems (NIPS).
[Konferenz- oder Workshop-Beitrag] , (2016)

Büscher, Niklas ; Schiffner, Stefan ; Fischer, Mathias :
Consumer Privacy on Distributed Energy Markets.
[Online-Edition: https://doi.org/10.1007/978-3-319-44760-5\_7]
In: Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Germany, September 7-8, 2016, Frankfurt/Main, Germany.
[Konferenz- oder Workshop-Beitrag] , (2016)

Bernard, Jürgen :
Exploratory search in time-oriented primary data.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5173]
Technische Universität , Darmstadt
[Dissertation], (2015)

Baier, Harald :
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
In: it - Information Technology, 6
[Artikel] , (2015)

Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias :
Using Channel State Information for Tamper Detection in the Internet of Things.
In: 31st Annual Computer Security Applications Conference (ACSAC 2015)
[Artikel] , (2015)

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel :
Detection and Forensics of Domains Hijacking.
IEEE Global Communications Conference IEEE
[Konferenz- oder Workshop-Beitrag] , (2015)

Beinborn, Lisa ; Zesch, Torsten ; Gurevych, Iryna :
Factors of Difficulty in German Language Proficiency Tests.

[Anderes] , (2015)

Bračevac, Oliver :
Temporal Correlation Patterns -- Intersecting Joins, Streams, Events and Reactive Programming.
[Online-Edition: http://2015.splashcon.org/track/rebls2015]
In: Workshop on Reactive and Event-based Languages & Systems co-located with SPLASH '15, 27 Oct 2015.
[Konferenz- oder Workshop-Beitrag] , (2015)

Burger, Michael ; Bischof, Christian ; Schröppel, Christian ; Wackerfuß, Jens :
An Improved Algorithm for Simulating the Mechanical Behavior of Super Carbon Nanotubes.
In: Proceedings of the IEEE International Conference on Computational Science and Engineering, Porto, Portugal.
[Konferenz- oder Workshop-Beitrag] , (2015)

Barroso, Ana ; Hollick, Matthias :
Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication.
In: IEEE 40th Conference on Local Computer Networks (LCN 2015) 474 - 477.
[Artikel] , (2015)

Buchmann, Nicolas ; Baier, Harald :
Elektronische Identifizierung und vertrauenswürdige Dienste.
D.A.C.H. Security 2015
[Konferenz- oder Workshop-Beitrag] , (2015)

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[Konferenz- oder Workshop-Beitrag] , (2015)

Baluda, Mauro :
EvoSE: Evolutionary Symbolic Execution.
[Online-Edition: http://dx.doi.org/10.1145/2804322.2804325]
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015)
[Artikel] , (2015)

Borges de Oliveira, Fábio :
On Privacy-Preserving Protocols for Smart Metering Systems.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4693]
TU Darmstadt , Darmstadt
[Dissertation], (2015)

Buescher, Niklas ; Katzenbeisser, Stefan :
Faster Secure Computation through Automatic Parallelization.
24th USENIX Security Symposium (USENIX Security'15) USENIX Association
[Konferenz- oder Workshop-Beitrag] , (2015)

Burger, Michael ; Bischof, Christian ; Schröppel, Christian ; Wackerfuß, Jens :
Exploiting Structural Properties During Carbon Nanotube Simulation.
Proceedings of the International Conference on Computational Science and Its Applications Banff, Canada
[Konferenz- oder Workshop-Beitrag] , (2015)

Burger, Michael ; Bischof, Christian ; Schröppel, Christian ; Wackerfuß, Jens :
A Unified and Memory Efficient Framework for Simulating Mechanical Behavior of Carbon Nanotubes.
In: Proceedings of the International Conference on Computational Science, Reykjavik, Iceland.
[Konferenz- oder Workshop-Beitrag] , (2015)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
52nd Design Automation Conference (DAC) 2015
[Konferenz- oder Workshop-Beitrag] , (2015)

Bringer, J. ; Morel, C. ; Rathgeb, C. :
Security analysis of Bloom filter-based iris biometric template protection.
2015 International Conference on Biometrics (ICB) IEEE
[Konferenz- oder Workshop-Beitrag] , (2015)

Braun, Kristoffer ; Rack, Philipp :
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag
[Masterarbeit] , (2015)

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza :
XiOS: Extended Application Sandboxing on iOS.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag] , (2015)

Beyer, Philip :
Proposal for a STS Evaluation Framework for STS based Applications.
[Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...]
Technische Universität Darmstadt
[Masterarbeit] , (2015)

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Ariza Quintana, Alfonso ; Trivino Cabrera, Alicia :
Efficient P2P live video streaming over hybrid WMNs using random network coding.
In: Wireless Personal Communications, 80 (4) pp. 1761-1789.
[Artikel] , (2015)

Bär, Daniel ; Zesch, Torsten ; Gurevych, Iryna
UKP Lab, Technische Universität Darmstadt (ed.) :

Composing Measures for Computing Text Similarity.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4342]
UKP Lab, Technische Universität Darmstadt (.) Darmstadt, Germany
[Report] , (2015)

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah :
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag] , (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 pp. 5-13.
[Artikel] , (2015)

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt :
Inner Product Masking Revisited.
[Online-Edition: https://doi.org/10.1007/978-3-662-46800-5_19]
In: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
[Konferenz- oder Workshop-Beitrag] , (2015)

Biedermann, Sebastian :
Transparent Security Services for an Infrastructure-as-a-Service Cloud.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4415]
TU Darmstadt
[Dissertation], (2015)

Braun, Johannes :
Maintaining Security and Trust in Large Scale Public Key Infrastructures.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4566]
TU Darmstadt
[Dissertation], (2015)

Bubel, Richard ; Din, Crystal Chang ; Hähnle, Reiner ; Nakata, Keiko
de Nivelle, Hans (ed.) :

A Dynamic Logic with Traces and Coinduction.
[Online-Edition: https://doi.org/10.1007/978-3-319-24312-2_21]
In: Automated Reasoning with Analytic Tableaux and Related Methods - 24th International Conference, TABLEAUX 2015, Wroclaw, Poland, September 21-24, 2015. Proceedings. In: Lecture Notes in Computer Science , 9323 . Springer
[Konferenz- oder Workshop-Beitrag] , (2015)

Beckerle, P. ; Wojtusch, Janis ; Seyfarth, André ; von Stryk, Oskar ; Rinderknecht, Stephan :
Analyzing and Considering Inertial Effects in Powered Lower Limb Prosthetic Design.
Proceedings of IEEE International Conference on Rehabilitation Robotics
[Konferenz- oder Workshop-Beitrag] , (2015)

Butin, Denis ; Métayer, Daniel Le :
A Guide to End-to-End Privacy Accountability.
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) IEEE
[Konferenz- oder Workshop-Beitrag] , (2015)

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes :
Real-World Post-Quantum Digital Signatures.
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015) Springer CCIS
[Konferenz- oder Workshop-Beitrag] , (2015)

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt :
Inner Product Masking Revisited.
[Online-Edition: http://eprint.iacr.org/2015/105]
In: IACR Cryptology ePrint Archive, 2015 p. 105.
[Artikel] , (2015)

Binnig, Carsten ; Salama, Abdallah ; Zamanian, Erfan ; El-Hindi, Muhammad ; Feil, Sebastian ; Ziegler, Tobias :
Spotgres-parallel data analytics on spot instances.
In: Data Engineering Workshops (ICDEW), 2015 31st IEEE International Conference on.
[Konferenz- oder Workshop-Beitrag] , (2015)

Beinborn, Lisa ; Zesch, Torsten ; Gurevych, Iryna :
Candidate Evaluation Strategies for Improved Difficulty Prediction of Language Tests.
[Online-Edition: http://aclweb.org/anthology/W15-0601]
Proceedings of the Tenth Workshop on Innovative Use of NLP for Building Educational Applications held in conjunction with NAACL 2015
[Konferenz- oder Workshop-Beitrag] , (2015)

Benikova, Darina ; Yimam, Seid Muhie ; Santhanam, Prabhakaran ; Biemann, Chris :
GermaNER: Free Open German Named Entity Recognition Tool.
International Conference of the German Society for Computational Linguistics and Language Technology (GSCL-2015)
[Konferenz- oder Workshop-Beitrag] , (2015)

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem :
An Automatic Inference of Minimal Security Types.
Proceedings of the 11th International Conference on Information Systems Security (ICISS)
[Konferenz- oder Workshop-Beitrag] , (2015)

Bißmeyer, Norbert :
Misbehavior Detection and Attacker Identification in Vehicular Ad-hoc Networks.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4257]
TU Darmstadt
[Dissertation], (2014)

Brinker, Christian ; Loza Mencía, Eneldo ; Fürnkranz, Johannes :
Graded Multilabel Classification by Pairwise Comparisons.
[Online-Edition: http://www.ke.tu-darmstadt.de/publications/papers/ICDM14grad...]
In: 2014 IEEE International Conference on Data Mining (ICDM 2014), Shenzhen, China. Curran Associates, IEEE , Shenzhen, China
[Konferenz- oder Workshop-Beitrag] , (2014)

Berlin, Eugen :
Early Abstraction of Inertial Sensor Data for Long-Term Deployments.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4225]
TU Darmstadt , Darmstadt, Germany
[Dissertation], (2014)

Beinborn, Lisa ; Zesch, Torsten ; Gurevych, Iryna :
Predicting the Difficulty of Language Proficiency Tests.
[Online-Edition: http://aclweb.org/anthology/Q14-1040]
In: Transactions of the Association for Computational Linguistics, 2 (1) pp. 517-529.
[Artikel] , (2014)

Buchmann, Nicolas ; Baier, Harald :
Towards a more secure and scalable verifying PKI of eMRTD.
In: Journal of Computer Security, 22 (6) pp. 1025-1049.
[Artikel] , (2014)

Baecher, Paul :
Cryptographic Reductions: Classification and Applications to Ideal Models.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4000]
TU Darmstadt
[Dissertation], (2014)

Becker, Meike :
Patientenspezifische Planung für die Multi-Port Otobasischirurgie.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4180]
TU Darmstadt
[Dissertation], (2014)

Braun, Andreas :
Application and validation of capacitive proximity sensing systems in smart environments.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4175]
TU Darmstadt , Darmstadt
[Dissertation], (2014)

Borges, Fábio ; Martucci, Leonardo A. :
iKUP Keeps Users' Privacy in the Smart Grid.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014.
[Konferenz- oder Workshop-Beitrag] , (2014)

Borges, Fábio ; Buchmann, Johannes ; Mühlhäuser, Max :
Introducing Asymmetric DC-Nets.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014.
[Konferenz- oder Workshop-Beitrag] , (2014)

Borges, Fábio ; Raqueline A. M., Santos ; L. Marquezino, Franklin :
Preserving Privacy in a Smart Grid Scenario using Quantum Mechanics.
In: Security and Communication Networks ISSN 1939-0122
[Artikel] , (2014)

Burger, Michael ; Bischof, Christian
Mehl, Miriam (ed.) :

Using Instancing to Efficiently Render Carbon Nanotubes.
[Online-Edition: http://ipvs.informatik.uni-stuttgart.de/SGS/ICCE2014/]
In: 3rd International Workshop on Computational Engineering, Stuttgart, Germany.
[Konferenz- oder Workshop-Beitrag] , (2014)

Burrows, Steven ; Gurevych, Iryna ; Stein, Benno :
The Eras and Trends of Automatic Short Answer Grading.
[Online-Edition: https://link.springer.com/article/10.1007/s40593-014-0026-8]
In: International Journal of Artificial Intelligence in Education, 25 (1) pp. 60-117.
[Artikel] , (2014)

Braun, Johannes :
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[Konferenz- oder Workshop-Beitrag] , (2014)

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) :

Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
6th International Conference on Electronic Voting (EVOTE) IEEE
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur :
Nearest Planes in Practice.
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[Konferenz- oder Workshop-Beitrag] , (2014)

Borazio, Marko Antonio Matteo :
Rhythm Modelling of Long-Term Activity Data.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4290]
TU Darmstadt , Darmstadt
[Dissertation], (2014)

Borges, Fábio ; Martucci, Leonardo A. ; Beato, Filipe ; Mühlhäuser, Max :
Secure and Privacy-Friendly Public Key Generation and Certification.
In: Proceedings of the 13th IEEE TrustCom 2014. IEEE CS
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; El Bansarkhani, Rachid ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) :

Towards Security Solutions for Emergent Business Software.
Future Business Software Conference 2012 Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Konferenz- oder Workshop-Beitrag] , (2014)

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014 Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag] , (2014)

Burger, Michael ; Bischof, Christian :
Optimizing the Memory Access Performance of FASTEST's Sispol Routine.
[Online-Edition: http://www.wccm-eccm-ecfd2014.org/admin/files/filePaper/p153...]
In: World Congress on Computational Mechanics, Barcelona, Spain.
[Konferenz- oder Workshop-Beitrag] , (2014)

Borges, Fábio ; Demirel, Denise ; Böck, Leon ; Buchmann, Johannes ; Mühlhäuser, Max :
A Privacy-Enhancing Protocol that Provides In-Network Data Aggregation and Verifiable Smart Meter Billing.
In: 19th IEEE Symposium on Computers and Communications (ISCC 2014), Funchal, Portugal. IEEE Symposium on Computers and Communications (ISCC)
[Konferenz- oder Workshop-Beitrag] , (2014)

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander :
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3) pp. 459-478.
[Artikel] , (2014)

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max :
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014 913-959 (2014).
[Artikel] , (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag] , (2014)

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) :

Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS , 8533 . Springer International Publishing Switzerland
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Nicolas ; Rathgeb, Christian ; Baier, Harald ; Busch, Christoph :
Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area.
In: Proceedings of the 2nd Annual Privacy Forum (APF’14)
[Artikel] , (2014)

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) :

Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
International Conference for E-Democracy and Open Government 2014 Edition Donau-Universität Krems
[Konferenz- oder Workshop-Beitrag] , (2014)

Bartsch, Steffen ; Volkamer, Melanie :
Expert Knowledge for Contextualized Warnings.

[Report] , (2014)

Beckerle, P. ; Wojtusch, Janis ; Rinderknecht, Stephan ; von Stryk, Oskar :
Analysis of System Dynamic Influences in Robotic Actuators with Variable Stiffness.
In: Smart Structures and Systems, 13 (4) p. 711.
[Artikel] , (2014)

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie :
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2) pp. 1-10.
[Artikel] , (2014)

Bergmann, Clemens ; Canova, Gamze :
Design, Implementation and Evaluation of an Anti-Phishing Education App.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3763]
TU Darmstadt , Darmstadt, Germany
[Masterarbeit] , (2014)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Konferenz- oder Workshop-Beitrag] , (2014)

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie :
Unterstützung für ein risikobewusstes Verhalten im Internet.
Vielfalt der Informatik
[Konferenz- oder Workshop-Beitrag] , (2014)

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie :
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht (2) pp. 119-127.
[Artikel] , (2014)

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie :
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Workshop on Usable Security (USEC) Internet Society
[Konferenz- oder Workshop-Beitrag] , (2014)

Berger, Kai ; Kastner, Marc ; Schroeder, Yannic ; Guthe, Stefan :
Using Sparse Optical Flow for Two-Phase Gas Flow Capturing with Multiple Kinect.
In: Computer Vision and Machine Learning with RGB-D Sensors. Springer International Publishing , pp. 157-169.
[Buchkapitel] , (2014)

Beckerle, Matthias :
Usable Access Control.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3828]
TU Darmstadt
[Dissertation], (2013)

Breitinger, Frank :
On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4055]
TU Darmstadt
[Dissertation], (2014)

Biedermann, Alexander :
Design Concepts for a Virtualizable Embedded MPSoC Architecture : Enabling Virtualization in Embedded Multi-Processor Systems.
Springer Vieweg , Wiesbaden
[Dissertation]

Borges, Fábio ; Mühlhäuser, Max :
EPPP4SMS: Efficient Privacy-Preserving Protocol for Smart Metering Systems and Its Simulation Using Real-World Data.
In: IEEE Transactions on Smart Grid 2701 - 2708. ISSN 1949-3053
[Artikel] , (2014)

Brinker, Christian ; Loza Mencía, Eneldo ; Fürnkranz, Johannes :
Graded Multilabel Classification by Pairwise Comparisons.
[Online-Edition: http://www.ke.tu-darmstadt.de/publications/reports/tud-ke-20...]
2014 IEEE International Conference on Data Mining (ICDM 2014)
[Report] , (2014)

Bernard, Juergen ; Steiger, Martin ; Widmer, Sven ; Luecke-Tieke, Hendrik ; May, Thorsten ; Kohlhammer, Joern :
Visual-interactive Exploration of Interesting Multivariate Relations in Mixed Research Data Sets.
In: Computer Graphics Forum, 33 (3) pp. 291-300.
[Artikel] , (2014)

Beckert, Bernhard ; Hähnle, Reiner :
Reasoning and Verification: State of the Art and Current Trends.
[Online-Edition: https://doi.org/10.1109/MIS.2014.3]
In: IEEE Intelligent Systems, 29 (1) pp. 20-29.
[Artikel] , (2014)

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik :
Interaction Techniques for Co-located Collaborative TV.
CHI 2014 ACM
[Konferenz- oder Workshop-Beitrag] , (2014)

Beckerle, P. ; Schültje, F. ; Wojtusch, Janis ; Christ, O. :
Implementation, Control and User-Feedback of the Int²Bot for the Investigation of Lower Limb Body Schema Integration.
Proceedings of IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN)
[Konferenz- oder Workshop-Beitrag] , (2014)

Borgert, Stephan ; Mühlhäuser, Max
Nanopoulos, Alexandros ; Schmidt, Werner (eds.) :

Formal Based Correctness Check for ePASS-IoS 1.1 Process Models with Integrated User Support for Error Correcting.
In: Lecture Notes in Business Information Processing , 170 . Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Borgert, Stephan ; Mühlhäuser, Max
Nanopoulos, Alexandros ; Schmidt, Werner (eds.) :

A {S-BPM} Suite for the Execution of Cross Company Subject Oriented Business Processes.
In: Lecture Notes in Business Information Processing , 170 . Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Borgert, Stephan ; Münch, Daniel ; Heuser, Lutz :
Facility Management by Means of Subject Oriented Cross Organizational Business Process Management.
{IEEE} 16th Conference on Business Informatics, {CBI} 2014, Geneva, Switzerland, July 14-17, 2014 - Volume 2 {IEEE} Computer Society
[Konferenz- oder Workshop-Beitrag] , (2014)

Bodden, E. ; Maoz, S. :
Special Section on Runtime Verification and Analysis.
Transactions on Aspect-Oriented Software Development (TAOSD) Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Bubel, Richard ; Hähnle, Reiner ; Pelevina, Maria :
Fully Abstract Operation Contracts.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Bubel, Richard ; Montoya, Antonio Flores ; Hähnle, Reiner
Bernardo, M. ; Damiani, F. ; Hähnle, R. ; Johnsen, E. B. ; Schaefer, I. (eds.) :

Analysis of Executable Software Models.
In: LNCS (8483). Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias :
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014)
[Konferenz- oder Workshop-Beitrag] , (2014)

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[Konferenz- oder Workshop-Beitrag] , (2014)

Binnig, Carsten ; Hildenbrand, Stefan ; Färber, Franz ; Kossmann, Donald ; Lee, Juchang ; May, Norman :
Distributed snapshot isolation: global transactions pay globally, local transactions pay locally.
In: The VLDB Journal, 23 (6) pp. 987-1011.
[Artikel] , (2014)

Binnig, Carsten ; Salama, Abdallah ; Zamanian, Erfan :
DoomDB: kill the query.
In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data.
[Konferenz- oder Workshop-Beitrag] , (2014)

Binnig, Carsten ; Salama, Abdallah ; Zamanian, Erfan ; Kornmayer, Harald ; Listing, Sven ; Mueller, Alexander C :
XDB-A novel Database Architecture for Data Analytics as a Service.
In: Big Data (BigData Congress), 2014 IEEE International Congress on.
[Konferenz- oder Workshop-Beitrag] , (2014)

Beinborn, Lisa ; Zesch, Torsten ; Gurevych, Iryna :
Readability for foreign language learning: The importance of cognates.
[Online-Edition: https://www.jbe-platform.com/content/journals/10.1075/itl.16...]
In: International Journal of Applied Linguistics, 165 (2) pp. 136-162.
[Artikel] , (2014)

Benikova, Darina ; Fahrer, Uli ; Gabriel, Alexander ; Kaufmann, Manuel ; Yimam, Seid Muhie ; Landesberger, Tatiana von ; Biemann, Chris :
Network of the Day: Aggregating and Visualizing Entity Networks from Online Sources.
Proceedings of the NLP4CMC Workshop at KONVENS
[Konferenz- oder Workshop-Beitrag] , (2014)

Benikova, Darina ; Biemann, Chris ; Reznicek, Marc :
NoSta-D Named Entity Annotation for German: Guidelines and Dataset.
Proceedings of LREC-14
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; Neumann, Stephan :
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2) pp. 98-102.
[Artikel] , (2014)

Beinborn, Lisa :
Book Review: Multilingual Corpora and Multilingual Corpus Analyses.
[Online-Edition: https://www.tandfonline.com/doi/pdf/10.1080/14790718.2013.78...]
In: International Journal of Multilingualism, 11 (2) pp. 266-268.
[Artikel] , (2014)

Brandl, S. ; Kroemer, O. ; Peters, J. :
Generalizing Pouring Actions Between Objects using Warped Parameters.
[Online-Edition: http://www.ias.tu-darmstadt.de/uploads/Site/EditPublication/...]
In: International Conference on Humanoid Robots (HUMANOIDS), November 18-20th, 2014, Madrid.
[Konferenz- oder Workshop-Beitrag] , (2014)

Bischoff, B. ; Nguyen-Tuong, D. ; van Hoof, A. ; Rasmussen, C.E. ; Knoll, A. ; Peters, J. ; Deisenroth, M.P. :
Policy Search For Learning Robot Control Using Sparse Data.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=690...]
In: Proceedings of 2014 IEEE International Conference on Robotics and Automation (ICRA).
[Konferenz- oder Workshop-Beitrag] , (2014)

Ben Amor, H. ; Neumann, G. ; Kamthe, S. ; Kroemer, O. ; Peters, J. :
Interaction Primitives for Human-Robot Cooperation Tasks.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=690...]
In: Proceedings of 2014 IEEE International Conference on Robotics and Automation (ICRA).
[Konferenz- oder Workshop-Beitrag] , (2014)

Braun, Andreas ; Wichert, Reiner ; Kuijper, Arjan ; Fellner, Dieter W. :
A Benchmarking Model for Sensors in Smart Environments.
In: Ambient Intelligence. In: Lecture Notes in Computer Science (LNCS); 8850 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2014)

Becker, Meike ; Hansen, Stefan ; Wesarg, Stefan ; Sakas, Georgios :
Path Planning for Multi-port Lateral Skull Base Surgery Based on First Clinical Experiences.
In: Clinical Image-Based Procedures. Translational Research in Medical Imaging. In: Lecture Notes in Computer Science (LNCS); 8361 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2014)

Braun, Andreas ; Cieslik, Silvana ; Zmugg, René ; Wichert, Reiner ; Klein, Peter ; Havemann, Sven ; Wagner, Tobias :
V2me - Virtuelles Coaching für Senioren.
In: Wohnen - Pflege - Teilhabe. Besser leben durch Technik. VDE-Verlag GmbH, Berlin, Offenbach
[Konferenz- oder Workshop-Beitrag] , (2014)

Behrisch, Michael ; Davey, James ; Fischer, Fabian ; Thonnard, Olivier ; Schreck, Tobias ; Keim, Daniel A. ; Kohlhammer, Jörn :
Visual Analysis of Sets of Heterogeneous Matrices Using Projection-Based Distance Functions and Semantic Zoom.
In: Computer Graphics Forum, 33 (3) pp. 411-420.
[Artikel] , (2014)

Burkhardt, Dirk ; Nazemi, Kawa ; Kohlhammer, Jörn :
Policy Modeling Methodologies.
In: Keine Angabe IGI Global, Hershey, Pennsylvania , pp. 48-60.
[Buchkapitel] , (2014)

Bernard, Jürgen ; Sessler, David ; Ruppert, Tobias ; Davey, James ; Kuijper, Arjan ; Kohlhammer, Jörn :
User-Based Visual-Interactive Similarity Definition for Mixed Data Objects - Concept and First Implementation.
In: WSCG 2014. Communication Papers Proceedings. University of West Bohemia, Plzen
[Konferenz- oder Workshop-Beitrag] , (2014)

Baar, Teun ; Samadzadegan, Sepideh ; Brettel, Hans ; Urban, Philipp ; Segovia, Maria V. Ortiz :
Printing Gloss Effects in a 2.5D System.
In: Measuring, Modeling, and Reproducing Material Appearance. In: Proceedings of SPIE; 9018 . SPIE Press, Bellingham
[Konferenz- oder Workshop-Beitrag] , (2014)

Bernard, Jürgen ; Hutter, Marco ; Sessler, David ; Schreck, Tobias ; Behrisch, Michael ; Kohlhammer, Jörn :
Towards a User-Defined Visual-Interactive Definition of Similarity Functions for Mixed Data.
In: IEEE Conference on Visual Analytics Science and Technology. Proceedings. IEEE Computer Society, Los Alamitos, Calif.
[Konferenz- oder Workshop-Beitrag] , (2014)

Burkhardt, Dirk ; Nazemi, Kawa ; Retz, Wilhelm ; Kohlhammer, Jörn :
Visual Explanation of Government-Data for Policy Making through Open-Data Inclusion.
In: International Conference for Internet Technology and Secured Transactions. IEEE
[Konferenz- oder Workshop-Beitrag] , (2014)

Butt, Moazzam ; Henniger, Olaf ; Nouak, Alexander ; Kuijper, Arjan :
Privacy Protection of Biometric Templates.
In: HCI International 2014 - Posters' Extended Abstracts. Proceedings Part I. In: Communications in Computer and Information Science (CCIS); 434 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2014)

Braun, Andreas ; Schmidt, Sönke ; Kuijper, Arjan ; Neumann, Stephan ; Wichert, Reiner :
Towards Interactive Car Interiors - the Active Armrest.
In: NordiCHI '14. ACM, New York
[Konferenz- oder Workshop-Beitrag] , (2014)

Brandherm, Florian :
Automatic Appearance-Preserving Generation of Compact 3D Models for the Web.
TU Darmstadt
[Bachelorarbeit] , (2014)

Burkhardt, Dirk ; Nazemi, Kawa ; Zilke, Jan Ruben ; Kohlhammer, Jörn ; Kuijper, Arjan :
Fundamental Aspects for E-Government.
In: Keine Angabe IGI Global, Hershey, Pennsylvania , pp. 1-18.
[Buchkapitel] , (2014)

Burkhardt, Dirk ; Nazemi, Kawa ; Encarnação, José Daniel ; Retz, Wilhelm ; Kohlhammer, Jörn :
Visualization Adaptation Based on Environmental Influencing Factors.
In: Human-Computer Interaction: Part 1. In: Lecture Notes in Computer Science (LNCS); 8510 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2014)

Becker, Meike ; Kirschner, Matthias ; Sakas, Georgios :
Segmentation of Risk Structures for Otologic Surgery using the Probabilistic Active Shape Model.
In: Medical Imaging 2014: Image-Guided Procedures, Robotic Interventions, and Modeling. In: Proceedings of SPIE; 9036 . SPIE Press, Bellingham
[Konferenz- oder Workshop-Beitrag] , (2014)

Burkhardt, Dirk ; Nazemi, Kawa ; Parisay, Mohsen ; Kohlhammer, Jörn :
Visual Correlation Analysis to Explain Open Government Data based on Linked-Open Data for Decision Making.
In: International Journal of Digital Society, 5 (3) pp. 915-923.
[Artikel] , (2014)

Bockholt, Ulrich :
Fusing Web Technologies & Augmented Reality.
In: IEEE International Symposium on Mixed and Augmented Reality - Science & Technology 2014. IEEE Service Center, Piscataway, NJ
[Konferenz- oder Workshop-Beitrag] , (2014)

Burkhardt, Dirk ; Nazemi, Kawa ; Klamm, Christopher ; Kohlhammer, Jörn ; Kuijper, Arjan :
Comparison of e-Participation Roadmap in Industrial and Developing Countries based on Germany and Kenya.
In: ICEGOV 2014. ACM Press, New York
[Konferenz- oder Workshop-Beitrag] , (2014)

Burkhardt, Dirk ; Nazemi, Kawa ; Kohlhammer, Jörn :
Visual Process Support to Assist Users in Policy Making.
In: Keine Angabe IGI Global, Hershey, Pennsylvania , pp. 149-162.
[Buchkapitel] , (2014)

Bockholt, Ulrich ; Behr, Johannes ; Wagner, Sebastian ; Limper, Max ; Olbrich, Manuel ; Franke, Tobias :
VR/AR-Technologien im Browser: Effiziente Integration virtueller Technologien ins PDM-Umfeld durch Nutzung von Web-Technologien.
In: 17. IFF-Wissenschaftstage 2014. Tagungsband.
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander:
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg ISBN 978-3-642-40656-0
[Buch] , (2013)

Biemann, Chris ; Bildhauer, Felix ; Evert, Stefan ; Goldhahn, Dirk ; Quasthoff, Uwe ; Schäfer, Roland ; Simon, Johannes ; Swiezinski, Leonard ; Zesch, Torsten :
Scalable Construction of High-Quality Web Corpora.
In: JLCL, 28 (2) pp. 23-59.
[Artikel] , (2013)

Bär, Daniel :
A Composite Model for Computing Similarity Between Texts.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3641]
TU Darmstadt
[Dissertation], (2013)

Beinborn, Lisa ; Zesch, Torsten ; Gurevych, Iryna
Mitkov, Ruslan ; Park, Jong (eds.) :

Cognate Production using Character-based Machine Translation.
[Online-Edition: http://www.aclweb.org/anthology/I13-1112]
Proceedings of the Sixth International Joint Conference on Natural Language Processing Asian Federation of Natural Language Processing
[Konferenz- oder Workshop-Beitrag] , (2013)

Biemann, Chris ; Riedl, Martin :
From Global to Local Similarities: A Graph-Based Contextualization Method using Distributional Thesauri.
[Online-Edition: http://aclweb.org/anthology/W13-50]
In: Proceedings of the 8th Workshop on TextGraphs in conjunction with EMNLP 2013 pp. 39-43.
[Artikel] , (2013)

Biedermann, Alexander ; Dreyer, Boris ; Huss, Sorin A. :
A generic, scalable reconfiguration infrastructure for sensor networks functionality adaption.
[Online-Edition: http://ieeexplore.ieee.org/document/6749705/]
2013 IEEE 26th International SOC Conference (SOCC)
[Konferenz- oder Workshop-Beitrag] , (2013)

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira :
Reducing human factors in software security architectures.
[Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf]
In: Future Security Conference 2013.
[Konferenz- oder Workshop-Beitrag] , (2013)

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) :

Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS (8341). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2013)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch] , (2013)

Braun, Johannes ; Volk, Florian ; Buchmann, Johannes ; Mühlhäuser, Max
Sokatis Katsikas, Isaac Agudi (Eds.) (ed.) :

Trust Views for the Web PKI.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013. In: LNCS (ISSN 0302-9743) (8341). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2013)

Bartsch, Steffen ; Volkamer, Melanie :
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
RiskKom-Workshop, INFORMATIK 2013 Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag] , (2013)

Barekatain, Behrang ; Khezrimotlagh, Dariush ; Aizaini Maarof, Mohd ; Ghaeini, Hamid Reza ; Salleh, Shaharuddin ; Ariza Quintana, Alfonso ; Akbari, Behzad ; Trivino Cabrera, Alicia :
MATIN: A random network coding based framework for high quality peer-to-peer live video streaming.
In: PloS one, 8 (8) e69844.
[Artikel] , (2013)

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (eds.) :

Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing. Springer , 157 - 158.
[Buchkapitel] , (2013)

Braden, Kjell :
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt
[Masterarbeit] , (2013)

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen :
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, 12 (4) pp. 267-297.
[Artikel] , (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
22nd USENIX Security Symposium (USENIX Security '13) USENIX
[Konferenz- oder Workshop-Beitrag] , (2013)

Bär, Daniel ; Zesch, Torsten ; Gurevych, Iryna :
DKPro Similarity: An Open Source Framework for Text Similarity.
[Online-Edition: http://www.aclweb.org/anthology/P13-4021]
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (System Demonstrations) (ACL 2013) Association for Computational Linguistics
[Konferenz- oder Workshop-Beitrag] , (2013)

Biehl, Robert :
Part based object detection with a flexible context constraint.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6868]
Technische Universität , Darmstadt
[Diplom- oder Magisterarbeit] , (2013)

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: Software Engineering Top Journals, Rank 5, ACM Transactions on Softw
[Artikel] , (2013)

Beckerle, Matthias ; Martucci, Leonardo :
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
Symposium on Usable Privacy and Security (SOUPS) 2013
[Konferenz- oder Workshop-Beitrag] , (2013)

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) :

Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[Konferenz- oder Workshop-Beitrag] , (2013)

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) :

The Transitivity-of-Trust Problem in Android Application Interaction.
8th International Conference on Availability, Reliability and Security (ARES 2013) IEEE
[Konferenz- oder Workshop-Beitrag] , (2013)

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) :

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
8th International Conference on Availability, Reliability and Security (AReS 2013) IEEE
[Konferenz- oder Workshop-Beitrag] , (2013)

Bračevac, Oliver :
A Formal Model for Event Correlation in Information Flow Processing.
TU Darmstadt
[Masterarbeit] , (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
[Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf]
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
[Konferenz- oder Workshop-Beitrag] , (2013)

Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin :
Leakage Detection and Tracing for Databases.
Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France
[Konferenz- oder Workshop-Beitrag] , (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Konferenz- oder Workshop-Beitrag] , (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013)
[Konferenz- oder Workshop-Beitrag] , (2013)

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes :
EP 2600270 Identification element-based authentication and identification with decentralised service use.

[Norm, Patent, Standard] , (2013)

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas :
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag] , (2013)

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) :

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS (7859). Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Biemann, Chris ; Riedl, Martin :
Text: Now in 2D! A Framework for Lexical Expansion with Contextual Similarity.
[Online-Edition: http://jlm.ipipan.waw.pl/index.php/JLM/issue/view/7]
In: Journal of Language Modelling, 1 (1) pp. 55-95.
[Artikel] , (2013)

Becker, Daniel ; Geimer, Markus ; Rabenseifner, Rolf ; Wolf, Felix :
Extending the scope of the controlled logical clock.
In: Cluster Computing, 16 (1) pp. 171-189. ISSN 1386-7857
[Artikel] , (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (ed.) :

Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science , 7779 . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten :
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4) pp. 468-480.
[Artikel] , (2013)

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13 . ACM Press
[Konferenz- oder Workshop-Beitrag] , (2013)

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) :

On the Security of Encrypted Secret Sharing.
46th Hawaii International Conference on Systems Science (HICSS-46) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2013)

Brzuska, Christina :
On the Foundations of Key Exchange.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3414]
TU Darmstadt , Darmstadt
[Dissertation], (2012)

Bremm, Sebastian :
Visual Analytics Approaches for Descriptor Space Comparison and the Exploration of Time Dependent Data.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3719]
TU Darmstadt , Darmstadt
[Dissertation], (2013)

Bayer, Daniel :
Theorie und Anwendung der impulsbasierten Dynamiksimulation.
Optimus-Verl. , Göttingen
[Dissertation], (2013)

Berger, Kai ; Schroeder, Yannic ; Guthe, Stefan ; Kastner, Marc Aurel :
Using sparse optical flow for multiple Kinect applications.
In: Robotics: science and systems 2013 workshop on rgb-d: advanced reasoning with depth cameras.
[Konferenz- oder Workshop-Beitrag] , (2013)

Bjorner, Nikolaj ; Hähnle, Reiner ; Nipkow, Tobias ; Weidenbach, Christoph :
Deduction and Arithmetic (Dagstuhl Seminar 13411).
[Online-Edition: https://doi.org/10.4230/DagRep.3.10.1]
In: Dagstuhl Reports, 3 (10) pp. 1-24.
[Artikel] , (2013)

Beckerle, P. ; Stuhlenmiller, F. ; Schuy, J. ; Wojtusch, Janis ; Rinderknecht, Stephan ; von Stryk, Oskar :
Friction Compensation and Stiffness Evaluation on a Variable Torsion Stiffness.
International Symposium on Adaptive Motion of Animals and Machines (AMAM)
[Konferenz- oder Workshop-Beitrag] , (2013)

Beckerle, P. ; Lahnstein, L. ; Wojtusch, Janis ; Rinderknecht, Stephan ; von Stryk, Oskar :
Conception and Design of a Hardware Simulator for Restoring Lost Biomechanical Function.
IEEE International Conference on Systems, Man and Cybernetics (SMC)
[Konferenz- oder Workshop-Beitrag] , (2013)

Beckerle, P. ; Stuhlenmiller, F. ; Schuy, J. ; Rinderknecht, Stephan ; von Stryk, Oskar :
Friction Compensation and Stiffness Evaluation on a Variable Torsion Stiffness.
International Symposium on Adaptive Motion of Animals and Machines (AMAM)
[Konferenz- oder Workshop-Beitrag] , (2013)

Beckerle, P. ; Wojtusch, Janis ; Rinderknecht, Stephan ; von Stryk, Oskar :
Mechanical Influences on the Design of Actuators with Variable Stiffness.
International Symposium on Adaptive Motion of Animals and Machines (AMAM)
[Konferenz- oder Workshop-Beitrag] , (2013)

Böker, S. ; Beckerle, P. ; Wojtusch, Janis ; Rinderknecht, Stephan :
A Novel Design Approach and Operational Strategy for an Active Ankle-Foot Prosthesis.
International Symposium on Adaptive Motion of Animals and Machines (AMAM)
[Konferenz- oder Workshop-Beitrag] , (2013)

Beckerle, P. ; Christ, O. ; Windrich, M. ; Rinderknecht, Stephan ; Vogt, J. ; Wojtusch, Janis :
A methodological approach to integrate psychological factors to lower limb prosthetic functional design.
International Society of Prosthetics and Orthotics World Congress (ISPO)
[Konferenz- oder Workshop-Beitrag] , (2013)

Beckerle, P. ; Wojtusch, Janis ; Schuy, J. ; Strah, B. ; Rinderknecht, Stephan ; von Stryk, Oskar :
Power-optimized Stiffness and Nonlinear Position Control of an Actuator with Variable Torsion Stiffness.
IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM)
[Konferenz- oder Workshop-Beitrag] , (2013)

Binder, W. ; Bodden, E. ; Löwe, W. :
Proceedings of the 12th International Conference on Software Composition.
In: Lecture Notes in Computer Science, Springer
[Artikel] , (2013)

Bender, J. ; Fischlin, M. ; Kügler, D. :
The PACE|CA Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science, 8292 pp. 17-35.
[Artikel] , (2013)

Baecher, Paul ; Brzuska, Christina ; Fischlin, Marc :
Notions of Black-Box Reductions.
In: Lecture Notes in Computer Science, 8269 pp. 269-315.
[Artikel] , (2013)

Baecher, Paul ; Farshim, Pooya ; Fischlin, Marc ; Stam, Martijn :
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
In: Lecture Notes in Computer Science, 7881 pp. 426-443.
[Artikel] , (2013)

Busch, Christoph ; Pflug, Anika ; Zhou, Xuebing ; Dose, Michael ; Brauckmann, Michael ; Helbig, Jörg ; Opel, Alexander ; Neugebauer, Peter ; Leowski, Katja ; Sieber, Harald ; Lotz, Oliver :
Multi-Biometrische Gesichtserkennung.
Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag] , (2013)

Biedermann, Sebastian ; Zittel, Martin ; Katzenbeisser, Stefan :
Improving security of virtual machines during live migrations.
In: IEEE Press pp. 352-357.
[Artikel] , (2013)

Buchmann, Nicolas ; Baier, Harald :
Towards a more secure and scalable verifying PKI of eMRTD.
EuroPKI 2013
[Konferenz- oder Workshop-Beitrag] , (2013)

Biedermann, Sebastian ; Katzenbeisser, Stefan :
POSTER: Event-based Isolation of Critical Data in the Cloud.
In:
[Artikel] , (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes :
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3) 997-1022 (2014).
[Artikel] , (2013)

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS (8282). Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Braun, Johannes ; Rynkowski, Gregor :
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Social Computing (SocialCom) - PASSAT2013
[Konferenz- oder Workshop-Beitrag] , (2013)

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten :
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2) 22 -- 44.
[Artikel] , (2013)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus :
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1) pp. 84-96.
[Artikel] , (2013)

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih :
Contextualized Web warnings, and how they cause distrust.
Trust and Trustworthy Computing (TRUST 2013) Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Berger, E. ; Vogt, D. ; Haji-Ghassemi, N. ; Jung, B. ; Ben Amor, H. :
Inferring Guidance Information in Cooperative Human-Robot Tasks.
[Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...]
In: Proceedings of the International Conference on Humanoid Robots (HUMANOIDS).
[Konferenz- oder Workshop-Beitrag] , (2013)

Bocsi, B. ; Csato, L. ; Peters, J. :
Alignment-based Transfer Learning for Robot Models.
[Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...]
In: International Joint Conference on Neural Networks (IJCNN), Aug 4, 2013 - Aug 9, 2013, Dallas, Texas, USA.
[Konferenz- oder Workshop-Beitrag] , (2013)

Ben Amor, H. ; Vogt, D. ; Ewerton, M. ; Berger, E. ; Jung, B. ; Peters, J. :
Learning Responsive Robot Behavior by Imitation.
[Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...]
In: Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[Konferenz- oder Workshop-Beitrag] , (2013)

Bernard, Jürgen ; Wilhelm, Nils ; Krüger, Björn ; May, Thorsten ; Schreck, Tobias ; Kohlhammer, Jörn :
MotionExplorer: Exploratory Search in Human Motion Capture Data Based on Hierarchical Aggregation.
In: IEEE Transactions on Visualization and Computer Graphics, 19 (12) pp. 2257-2266.
[Artikel] , (2013)

Bockholt, Ulrich ; Wientapper, Folker ; Wuest, Harald ; Fellner, Dieter W. :
Augmented-Reality-basierte Interaktion mit Smartphone-Systemen zur Unterstützung von Servicetechnikern.
In: at - Automatisierungstechnik, 61 (11) pp. 793-799.
[Artikel] , (2013)

Beutel, Johannes :
Sub-Pixel Accurate Fiducial Marker Detection and Pose Estimation from CBCT-Data.
Darmstadt, TU, Master Thesis, 2013
[Masterarbeit] , (2013)

Berghöfer, Yannick :
Human-Machine-Interfaces in Automotive Environments using Capacitive Proximity Sensors.
Darmstadt, TU, Master Thesis, 2013
[Masterarbeit] , (2013)

Bauer, Fabian :
Realistic Realtime Rendering of Garment with Transparency and Ambient Occlusion.
Darmstadt, TU, Master Thesis, 2013
[Masterarbeit] , (2013)

Brodkorb, Felix :
Visualisierung von Graphen mit geographischem Bezug.
Darmstadt, TU, Master Thesis, 2013
[Masterarbeit] , (2013)

Behrisch, Michael ; Davey, James ; Simon, Svenja ; Schreck, Tobias ; Keim, Daniel A. ; Kohlhammer, Jörn :
Visual Comparison of Orderings and Rankings.
In: EuroVA 2013. Eurographics Association, Goslar
[Konferenz- oder Workshop-Beitrag] , (2013)

Biehl, Karl Robert :
Part Based Object Detection with a Flexible Context Constraint : Supporting Object Detection with Easy Context.
Darmstadt, TU, Diplomarbeit, 2013
[Masterarbeit] , (2013)

Bauer, Fabian ; Knuth, Martin ; Kuijper, Arjan ; Bender, Jan :
Screen-Space Ambient Occlusion Using A-Buffer Techniques.
In: 13th International Conference on Computer-Aided Design and Computer Graphics. Proceedings. IEEE Computer Society Conference Publishing Services (CPS), Los Alamitos, Calif.
[Konferenz- oder Workshop-Beitrag] , (2013)

Bockholt, Ulrich ; Wuest, Harald ; Wientapper, Folker ; Engelke, Timo ; Webel, Sabine :
Augmented Reality Assistenzsysteme für Wartung und Service in Industrie, Bau und Gebäudemanagement.
In: 16. IFF-Wissenschaftstage 2013. Tagungsband. Fraunhofer Verlag, Stuttgart
[Konferenz- oder Workshop-Beitrag] , (2013)

Bockholt, Ulrich ; Webel, Sabine ; Engelke, Timo ; Olbrich, Manuel ; Wuest, Harald :
Skill Capturing and Augmented Reality for Training.
In: Keine Angabe Taylor & Francis, CRC Press, Boca Raton , pp. 81-90.
[Buchkapitel] , (2013)

Bockholt, Ulrich ; Behr, Johannes :
instantreality - Virtual and Augmented Reality Applications for Industrial Use.
In: VAR² 2013 - Realität Erweitern. Tagungsband. Wissenschaftliche Scripten, Auerbach
[Konferenz- oder Workshop-Beitrag] , (2013)

Becker, Meike ; Kirschner, Matthias ; Sakas, Georgios :
Segmentierung von Risikostrukturen der Otobasis für die minimalinvasive multi-port Chirurgie.
In: Curac 2013.
[Konferenz- oder Workshop-Beitrag] , (2013)

Becker, Meike ; Gutbell, Ralf ; Stenin, Igor ; Wesarg, Stefan :
Towards Automatic Path Planning for Multi-port Minimally-Traumatic Lateral Skull Base Surgery.
In: Clinical Image-Based Procedures. From Planning to Intervention. In: Lecture Notes in Computer Science (LNCS); 7761 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2013)

Basgier, Dennis :
Visual Analysis of Local Correspondence in Segmentation Quality.
TU Darmstadt
[Bachelorarbeit] , (2013)

Burkhardt, Dirk ; Nazemi, Kawa ; Stab, Christian ; Steiger, Martin ; Kuijper, Arjan ; Kohlhammer, Jörn :
Visual Statistics Cockpits for Information Gathering in the Policy-Making Process.
In: Advances in Visual Computing. 9th International Symposium, ISVC 2013. In: Lecture Notes in Computer Science (LNCS); 8034 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2013)

Beck, Sebastian :
A Gesture Recognition Device with Visual Feedback Based on Capacitive Proximity Sensing.
TU Darmstadt
[Bachelorarbeit] , (2013)

Burkhardt, Dirk ; Nazemi, Kawa ; Sonntagbauer, Peter ; Kohlhammer, Jörn :
Interactive Visualizations in the Process of Policy Modeling.
In: Electronic Government and Electronic Participation. In: GI-Edition - Lecture Notes in Informatics (LNI); P-221 . Köllen, Bonn
[Konferenz- oder Workshop-Beitrag] , (2013)

Binotto, Alécio P. D. ; Wehrmeister, Marco A. ; Kuijper, Arjan ; Pereira, Carlos Eduardo :
Sm@rtConfig: A Context-Aware Runtime and Tuning System Using an Aspect-Oriented Approach for Data Intensive Engineering Applications.
In: Control Engineering Practice, 21 (2) pp. 204-217.
[Artikel] , (2013)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander :
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.

[Report] , (2012)

Bär, Daniel ; Zesch, Torsten ; Gurevych, Iryna :
Text Reuse Detection Using a Composition of Text Similarity Measures.
[Online-Edition: http://aclweb.org/anthology/C12-1011]
Proceedings of the 24th International Conference on Computational Linguistics (COLING 2012)
[Konferenz- oder Workshop-Beitrag] , (2012)

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira :
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf]

[Report] , (2012)

Borges, Fábio ; Martucci, Leonardo ; Mühlhäuser, Max :
Analysis of Privacy-Enhancing Protocols Based on Anonymity Networks.
In: IEEE SmartGridComm 2012 Symposium - Cyber Security and Privacy (IEEE SmartGridComm 2012 Symposium - Security). Tainan City, Taiwan
[Konferenz- oder Workshop-Beitrag] , (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.

[Report] , (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.

[Report] , (2012)

Bischof, Christian H. ; Bücker, H. Martin ; Vehreschild, André ; Willkomm, Johannes :
Automatic Differentiation for Matlab (ADiMat).
In: MATLAB-Day, RWTH Aachen University. Aachen, Germany
[Konferenz- oder Workshop-Beitrag] , (2012)

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker :
Delta-oriented Monitor Specification.
[Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf]
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried :
Challenges in defining a programming language for provably correct dynamic analyses.
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) :

iPIN and mTAN for secure eID applications.
In: LNCS (7232). Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Beinborn, Lisa ; Zesch, Torsten ; Gurevych, Iryna :
Towards fine-grained readability measures for self-directed language learning.
[Online-Edition: http://www.ep.liu.se/ecp/080/002/ecp12080002.pdf]
In: Linköping Electronic Conference Proceedings , 80 (2). Linköping University Electronic Press, Linköpings universitet
[Konferenz- oder Workshop-Beitrag] , (2012)

Borges, Fábio ; Petzoldt, Albrecht ; Portugal, Renato :
Small private keys for systems of multivariate quadratic equations using symmetric cryptography.
TU Darmstadt
[Anderes] , (2012)

Berchtold, Waldemar ; Schäfer, Marcel :
Performance and code length optimization of joint decoding tardos fingerprinting.
Proceedings of The 14th ACM Workshop on Multimedia and Security (MMSEC 2012) ACM
[Konferenz- oder Workshop-Beitrag] , (2012)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS (7868). Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Bartsch, Steffen ; Volkamer, Melanie :
Towards the Systematic Development of Contextualized Security Interventions.
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Konferenz- oder Workshop-Beitrag] , (2012)

Bruch, Marcel :
IDE 2.0: Leveraging the Wisdom of the Software Engineering Crowds.
[Online-Edition: urn:nbn:de:tuda-tuprints-31377]
TU Darmstadt
[Dissertation], (2011)

Bär, Daniel ; Biemann, Chris ; Gurevych, Iryna ; Zesch, Torsten :
UKP: Computing Semantic Textual Similarity by Combining Multiple Content Similarity Measures.
[Online-Edition: http://www.aclweb.org/anthology/S12-1059]
Proceedings of the 6th International Workshop on Semantic Evaluation, held in conjunction with the 1st Joint Conference on Lexical and Computational Semantics
[Konferenz- oder Workshop-Beitrag] , (2012)

Behring, Alexander :
Entwicklung multipler Benutzerschnittstellen für eine Anwendung.
[Online-Edition: urn:nbn:de:tuda-tuprints-29819]
TU Darmstadt, Fachbereich Informatik
[Dissertation], (2011)

Böhme, David ; Geimer, Markus ; Wolf, Felix :
Characterizing Load and Communication Imbalance in Large-Scale Parallel Applications.
In: Proc. of the 26th IEEE International Parallel & Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), Shanghai, China. IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2012)

Böhme, David ; de Supinski, Bronis R. ; Geimer, Markus ; Schulz, Martin ; Wolf, Felix :
Scalable Critical-Path Based Performance Analysis.
In: Proc. of the 26th IEEE International Parallel & Distributed Processing Symposium (IPDPS), Shanghai, China. IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2012)

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) :

Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012 IEEE
[Konferenz- oder Workshop-Beitrag] , (2012)

Bartsch, Steffen :
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
[Artikel] , (2012)

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.

[Report] , (2012)

Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet :
An In-Depth Look at ALIA4J.
[Online-Edition: http://dx.doi.org/10.5381/jot.2012.11.1.a7]
In: The Journal of Object Technology, 11 (1) pp. 1-28. ISSN 1660-1769
[Artikel] , (2012)

Baumann, Leander :
Using Human Visual Intelligence - Multiple Sequence Alignment as Serious Game.
TU Darmstadt
[Bachelorarbeit] , (2012)

Busold, Christoph :
Hash-based Signatures on Smart Cards.
TU Darmstadt
[Masterarbeit] , (2012)

Bodden, Eric :
Towards Typesafe Weaving for Modular Reasoning in Aspect-Oriented Programs.
In: FOAL 2012: International Workshop on the Foundations of Aspect-Oriented Languages.
[Konferenz- oder Workshop-Beitrag] , (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , pp. 160-186.
[Buch] , (2012)

Bulygin, Stanislav ; Walter, Michael :
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.

[Report] , (2012)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2012)

Bodden, Eric :
Identifying meaningless parameterized linear-temporal-logic formulas.

[Report] , (2012)

Bodden, Eric :
On the Expressiveness of Parameterized Finite-state Runtime Monitors.

[Report] , (2012)

Böhmer, Stefan ; Lange, Enno ; Hafner, Martin ; Cramer, Tim ; Bischof, Christian ; Hameyer, Kay :
Mesh Decomposition for Efficient Parallel Computing of Electrical Machines by Means of FEM Accounting for Motion.
[Online-Edition: http://www.bibliothek.uni-regensburg.de/ezeit/?2025397]
In: Ieee transactions on magnetics, 48 (2) pp. 891-894.
[Artikel] , (2012)

Berr, Nicolas ; Schmidl, Dirk ; Göbbert, Jens Henrik ; Lankes, Stefan ; an Mey, Dieter ; Bemmerl, Thomas ; Bischof, Christian :
Trajectory-Search on ScaleMP's vSMP Architecture.
In: Applications, Tools and Techniques on the Road to Exascale Computing : proceedings of the 14th biennial ParCo conference ; ParCo2011 ; held in Ghent, Belgium / Ed. by Koen De Bosschere .... In: Advances in Parallel Computing ; 22 . IOS Press , New York, NY
[Konferenz- oder Workshop-Beitrag] , (2012)

Böhmer, Stefan ; Lange, Enno ; Hafner, Martin ; Cramer, Tim ; Bischof, Christian ; Hameyer, Kay :
Mesh Decomposition for Efficient Parallel Computing of Electrical Machines by Means of FEM Accounting for Motion.
[Online-Edition: http://www.bibliothek.uni-regensburg.de/ezeit/?2025397]
In: IEEE transactions on magnetics, 48 (2) pp. 891-894.
[Artikel] , (2012)

Bockisch, Christoph ; Sewe, Andreas :
The ALIA4J Approach to Efficient Language Implementation.
[Online-Edition: http://dx.doi.org/10.1145/2384716.2384726]
In: Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity, Tucson, AZ, USA. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity
[Konferenz- oder Workshop-Beitrag] , (2012)

Bodden, Eric ; Toledo, Tarsis ; Ribeiro, Marcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira :
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.

[Report] , (2012)

Bischof, Christian ; an Mey, Dieter ; Iwainsky, Christian :
Brainware for green HPC.
[Online-Edition: http://dx.doi.org/10.1007/s00450-011-0198-5]
In: Computer Science - Research and Development pp. 1-7.
[Artikel] , (2012)

Bischof, Christian ; An Mey, Dieter ; Iwainsky, Christian :
Brainware for green HPC.
In: Computer Science-Research and Development, 27 (4) pp. 227-233.
[Artikel] , (2012)

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie :
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
[Artikel] , (2012)

Bodden, Eric :
MOPBox: A Library Approach to Runtime Verification.
[Online-Edition: http://www.bodden.de/pubs/bodden11mopbox.pdf]
In: RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30. In: Lecture notes in computer science , 7186 . Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Beljan, Mate ; Ackermann, Jens ; Goesele, Michael :
Consensus Multi-View Photometric Stereo.
Proceedings of DAGM-OAGM 2012 Springer LNCS
[Konferenz- oder Workshop-Beitrag] , (2012)

Bremm, Sebastian ; Hess, Martin ; von Landesberger, Tatiana ; Fellner, Dieter W. :
PCDC – On the Highway to Data – A Tool for the Fast Generation of Large Synthetic Data Sets.
International Workshop on Visual Analytics
[Konferenz- oder Workshop-Beitrag] , (2012)

Böhme, David ; Hermanns, Marc-André ; Wolf, Felix :
Scalasca.
In: Entwicklung und Evolution von Forschungssoftware, Rolduc, November 2011. In: Aachener Informatik-Berichte, Software Engineering , 14 . Shaker
[Konferenz- oder Workshop-Beitrag] , (2012)

Beckerle, P. ; Christ, O. ; Wojtusch, Janis ; Schuy, J. ; Wolff, K. ; Rinderknecht, Stephan ; Vogt, J. ; von Stryk, Oskar :
Design and Control of a Robot for the Assessment of Psychological Factors in Prosthetic Development.
IEEE International Conference on Systems, Man, and Cybernetics (SMC)
[Konferenz- oder Workshop-Beitrag] , (2012)

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard :
The Transitivity of Trust Problem in the Interaction of Android Applications.

[Report] , (2012)

Binder, A. ; Nakajima, S. ; Kloft, M. ; Müller, C. ; Samek, W. ; Brefeld, U. ; Müller, K.-R. ; Kawanabe, M. :
Insights from Classifying Visual Concepts with Multiple Kernel Learning.
In: PLoS ONE, 7(8):e38897
[Artikel] , (2012)

Brzuska, Christina ; Dagdelen, Özgür ; Fischlin, Marc :
TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols.
In: Sicherheit 2012 , P-195 . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag] , (2012)

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis :
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2012)

Bartsch, Steffen :
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
[Dissertation]

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
Proceedings of the 21st European Conference on Information Systems (ECIS 2013)
[Konferenz- oder Workshop-Beitrag] , (2012)

Binnig, Carsten ; Rehrmann, Robin ; Faerber, Franz ; Riewe, Rudolf :
FunSQL: It is time to make SQL functional.
In: Proceedings of the 2012 Joint EDBT/ICDT Workshops.
[Konferenz- oder Workshop-Beitrag] , (2012)

Bodden, Eric ; Thies, Andreas :
RefaFlex: Safer Refactorings for Reflective Java Programs.
International Symposium on Software Testing and Analysis (ISSTA 2012)
[Konferenz- oder Workshop-Beitrag] , (2012)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Safe and Practical Decoupling of Aspects with Join Point Interfaces.

[Report] , (2012)

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) :

Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12 . ACM
[Konferenz- oder Workshop-Beitrag] , (2012)

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Verbauwhede, Ingrid :
Theory and Practice of a Leakage Resilient Masking Scheme.
[Online-Edition: https://doi.org/10.1007/978-3-642-34961-4_45]
In: Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
[Konferenz- oder Workshop-Beitrag] , (2012)

Biemann, Chris ; Roos, Stefanie ; Weihe, Karsten :
Quantifying Semantics Using Complex Network Analysis.
[Online-Edition: http://aclweb.org/anthology/C12-1017]
Proceedings of COLING‐12
[Konferenz- oder Workshop-Beitrag] , (2012)

Bein, Matthias ; Peña Serna, Sebastian ; Stork, André ; Fellner, Dieter W. :
Completing Digital Cultural Heritage Objects by Sketching Subdivision Surfaces toward Restoration Planning.
In: Progress in Cultural Heritage Preservation. In: Lecture Notes in Computer Science (LNCS); 7616 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2012)

Baduza, G. ; Eloff, Jan H.P. ; Kok, D. ; Encarnação, José L. ; Merz, C. ; Przewloka, M. :
GUI 4D - The Role and the Impact of Visual, Multimedia and Multilingual User Interfaces in ICT Applications and Services for Users Coming from the Bottom of the Pyramid - First Concepts, Prototypes and Experiences.
In: Keine Angabe Springer, Berlin, Heidelberg, New York , pp. 209-237.
[Buchkapitel] , (2012)

Berndt, René ; Settgast, Volker ; Eggeling, Eva ; Schinko, Christoph ; Krispel, Ulrich ; Havemann, Sven ; Fellner, Dieter W. :
Ring's Anatomy - Parametric Design of Wedding Rings.
In: CONTENT 2012. ThinkMind
[Konferenz- oder Workshop-Beitrag] , (2012)

Braun, Andreas ; Heggen, Henning ; Wichert, Reiner :
CapFloor - A Flexible Capacitive lndoor Localization System.
In: Evaluating AAL Systems Through Competitive Benchmarking. Indoor Localization and Tracking. In: Communications in Computer and Information Science; 309 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2012)

Bernard, Jürgen ; Wilhelm, Nils ; Scherer, Maximilian ; May, Thorsten ; Schreck, Tobias :
TimeSeriesPaths: Projection-Based Explorative Analysis of Multivariate Time Series Data.
In: Journal of WSCG Vol. 20 No. 1-3, 2012. Proceedings. University of West Bohemia, Plzen
[Konferenz- oder Workshop-Beitrag] , (2012)

Behrisch, Michael ; Davey, James ; Schreck, Tobias ; Keim, Daniel A. ; Kohlhammer, Jörn :
Matrix-Based Visual Correlation Analysis on Large Timeseries Data.
In: IEEE Conference on Visual Analytics Science and Technology 2012. Proceedings. IEEE Press, New York
[Konferenz- oder Workshop-Beitrag] , (2012)

Baumann, Leander :
Using Human Visual Intelligence - Multiple Sequence Alignment as Serious Game.
TU Darmstadt
[Bachelorarbeit] , (2012)

Bernard, Jürgen ; Ruppert, Tobias ; Scherer, Maximilian ; Kohlhammer, Jörn ; Schreck, Tobias :
Content-Based Layouts for Exploratory Metadata Search in Scientific Research Data.
In: JCDL 2012. Proceedings. ACM, New York
[Konferenz- oder Workshop-Beitrag] , (2012)

Bremm, Sebastian ; Heß, Martin ; Landesberger, Tatiana von ; Fellner, Dieter W. :
PCDC - On the Highway to Data. A Tool for the Fast Generation of Large Synthetic Data Sets.
In: EuroVA 2012. Eurographics Association, Goslar
[Konferenz- oder Workshop-Beitrag] , (2012)

Brix, Torsten ; Fellner, Dieter W. ; Krämer, Bernd J. ; Schrader, Thomas :
Workshop: Centers of Excellence for Research Information - Digital Text and Data Centers for Science and Open Research.
In: Eleed Journal (8)
[Artikel] , (2012)

Berndt, René ; Blümel, Ina ; Sens, Irina ; Clausen, Michael ; Damm, David ; Klein, Reinhard ; Thomas, Verena ; Wessel, Raoul ; Diet, Jürgen ; Fellner, Dieter W. ; Scherer, Maximilian :
PROBADO - A Digital Library System for Heterogeneous Non-textual Documents.
In: Eleed Journal (8) p. 5.
[Artikel] , (2012)

Bernard, Jürgen ; Ruppert, Tobias ; Scherer, Maximilian ; Schreck, Tobias ; Kohlhammer, Jörn :
Guided Discovery of Interesting Relationships Between Time Series Clusters and Metadata Properties.
In: i-KNOW '12. Proceedings. In: ACM International Conference Proceedings Series; 642 . ACM, New York
[Konferenz- oder Workshop-Beitrag] , (2012)

Braun, Andreas ; Wichert, Reiner :
Dynamic User Representation in Video Phone Applications.
In: Constructing Ambient Intelligence. In: Communications in Computer and Information Science; 277 . Springer, Berlin, Heidelberg, New York
[Konferenz- oder Workshop-Beitrag] , (2012)

Bernard, Jürgen ; Ruppert, Tobias ; Goroll, Oliver ; May, Thorsten ; Kohlhammer, Jörn :
Visual-Interactive Preprocessing of Time Series Data.
In: Proceedings of SIGRAD 2012. In: Linköping Electronic Conference Proceedings; 81 . Linköping University Electronic Press, Linköping
[Konferenz- oder Workshop-Beitrag] , (2012)

Betz, Detlef ; Bothe, Michael ; Braecklein, Martin ; Bruhnke, Michael ; Eberhardt, Birgid ; Galkow-Schneider, Mandy ; Fuchs, Gerhard ; Gimpel, Nancy ; Hartmann, Armin ; Haverkamp, Tobias ; Klaus, Harald ; Keiser, Thomas ; Pfaffner, Kevin ; Pietsch, Ingo ; Rachmann, Alexander ; Rode-Schubert, Christina ; Rumm, Peter ; Stockmanns, Gudrun ; Strunck, Stefan ; Tunder, Ralph ; Wernicke, Maximilian E. ; Wichert, Reiner ; Zähringer, Daniel:
Ambient Assisted Living - Ein Markt der Zukunft : Potenziale, Szenarien, Geschäftsmodelle.
VDE-Verlag GmbH, Berlin, Offenbach
[Buch] , (2012)

Bokor, Péter :
Efficient Verification of Fault-Tolerant Message-Passing Protocols.
[Online-Edition: urn:nbn:de:tuda-tuprints-28185]
TU Darmstadt
[Dissertation], (2011)

Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (eds.) :

Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science , 7092 . Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Konferenz- oder Workshop-Beitrag] , (2011)

Burger, Michael :
Das effiziente Raytracen von Dreiecksnetzen auf Mehrkernprozessoren, GPUs und FPGAs mittels Geometrischer Algebra.
TU Darmstadt , Darmstadt
[Masterarbeit] , (2011)

Burgaß, Robert :
Mobile Inhaltserfassung und mobiles Lernen mit dem Semantic Wiki im Bauingenieurwesen.
In: Fachforum Mobile Learning – Kompetenznetz E-Learning Hessen, 16.11.2011, Darmstadt.
[Konferenz- oder Workshop-Beitrag] , (2011)

Berger, Kai ; Ruhl, Kai ; Albers, Mark ; Schröder, Yannic ; Scholz, Alexander ; Kokemüller, Jan ; Guthe, Stefan ; Magnor, Marcus :
The capturing of turbulent gas flows using multiple kinects.
In: Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on.
[Konferenz- oder Workshop-Beitrag] , (2011)

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (ed.) :

XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS (7071). Springer Berlin / Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11) Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11) ACM
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Practical and Lightweight Domain Isolation on Android.
Proceedings of the 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
Sadeghi, Ahmad-Reza ; Zhang, Xinwen (eds.) :

Scalable Trust Establishment with Software Reputation.
Workshop on Scalable Trusted Computing (STC) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
18th ACM Conference on Computer and Communications Security (CCS'11) ACM
[Konferenz- oder Workshop-Beitrag] , (2011)

Burgaß, Robert :
Mobile Inhaltserfassung und mobiles Lernen mit dem Semantic Wiki im Bauingenieurwesen.
In: DeLFI 2011 – die 9. e-learning Fachtagung Informatik, 05.09.2011, Dresden.
[Konferenz- oder Workshop-Beitrag] , (2011)

Bodden, Eric :
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
[Online-Edition: http://www.bodden.de/pubs/bodden11stateful.pdf]
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
[Konferenz- oder Workshop-Beitrag] , (2011)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
Schartner, Peter ; Taeger, Jürgen (eds.) :

Mobile Authentisierung und Signatur.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven syssec Verlag
[Konferenz- oder Workshop-Beitrag] , (2011)

Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang :
Der elektronische Safe als vertrauenswürdiger Cloud Service.

[Report] , (2011)

Bartsch, Steffen :
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
NSS &#039;11: Proceedings of the 5th International Conference on Network and System Security IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2011)

Bär, Daniel ; Zesch, Torsten ; Gurevych, Iryna :
A Reflective View on Text Similarity.
[Online-Edition: http://www.aclweb.org/anthology/R11-1071]
Proceedings of the International Conference on Recent Advances in Natural Language Processing
[Konferenz- oder Workshop-Beitrag] , (2011)

Bartsch, Steffen :
Practitioners Perspectives on Security in Agile Development.
FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2011)

Bodden, Eric :
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
[Online-Edition: http://www.bodden.de/pubs/bodden11continuation.pdf]
In: WODA '11: International Workshop on Dynamic Analysis. ACM
[Konferenz- oder Workshop-Beitrag] , (2011)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (eds.) :

On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS) (6737). Springer Berlin / Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2011)

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (eds.) :

PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In: Distributed Computing and Networking: 12th International Conference, ICDCN 2011 , 6522
[Konferenz- oder Workshop-Beitrag] , (2011)

Bhatti, Nadeem :
Visual Semantic Analysis to Support Semi Automatic Modeling of Service Descriptions.
[Online-Edition: urn:nbn:de:tuda-tuprints-26405]
TU Darmstadt
[Dissertation], (2011)

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2) pp. 452-468.
[Artikel] , (2011)

Bär, Daniel ; Erbs, Nicolai ; Zesch, Torsten ; Gurevych, Iryna :
Wikulu: An Extensible Architecture for Integrating Natural Language Processing Techniques With Wikis.
[Online-Edition: http://www.aclweb.org/anthology/P11-4013]
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. System Demonstrations
[Konferenz- oder Workshop-Beitrag] , (2011)

Barros, A. ; Allgaier, M. ; Charfi, A. ; Heller, M. ; Kylau, U. ; Schmeling, B. ; Stollberg, M. :
Diversified Service Provisioning in Global Business Networks.
[Online-Edition: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5958152...]
In: SRII Global Conference (SRII), 2011 Annual, San Jose, CA, USA. Proceedings of the SRII Global Conference (SRII)
[Konferenz- oder Workshop-Beitrag] , (2011)

Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (eds.) :

Interactive Access Rule Learning for Access Control: Concepts and Design.
International Journal On Advances in Intelligent Systems
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza :
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.

[Report] , (2011)

Bodden, Eric :
Closure Joinpoints: Block joinpoints without surprises.
[Online-Edition: http://www.bodden.de/pubs/bodden11closure.pdf]
In: AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development. ACM
[Konferenz- oder Workshop-Beitrag] , (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
Workshop on Cryptography and Security in Clouds (WCSC'11)
[Konferenz- oder Workshop-Beitrag] , (2011)

Bradler, Dirk ; Krumov, Lachezar ; Aitenbichler, Erwin ; Kangasharju, Jussi :
BridgeFinder: Finding communication bottlenecks in distributed environments.
IEEE Intl. Conf. Information Networking (ICOIN)
[Konferenz- oder Workshop-Beitrag] , (2011)

Bücker, H. M. ; Willkomm, J. ; Groß, S. ; Fortmeier, O. :
Discrete and Continuous Adjoint Approaches to Estimate Boundary Heat Fluxes in Falling Films.
In: Optimization Methods & Software, 26 (1) pp. 105-125. ISSN 1055-6788
[Artikel] , (2011)

Bartsch, Steffen :
An Authorization Enforcement Usability Case Study.
ESSoS 2011 Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Birk, Dominik ; Heinson, Dennis ; Wegener, Christoph :
Virtuelle Spurensuche.
In: Datenschutz und Datensicherheit pp. 329-332.
[Artikel] , (2011)

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira :
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
[Online-Edition: http://doi.acm.org/10.1145/1985793.1985827]
In: International Conference on Software Engineering, 21-28 May 2011, Waikiki, Honolulu, HI, USA. Proceedings of the 33rd International Conference on Software Engineering New York, NY, USA
[Konferenz- oder Workshop-Beitrag] , (2011)

Bank, Max :
Eine Grafische Benutzeroberfläche für ein Poker-Spiel.
[Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/bachelor/2011/B...]
TU Darmstadt
[Masterarbeit] , (2011)

Büscher, Niklas :
On Solving Pentago.
[Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/bachelor/2011/B...]
TU Darmstadt
[Masterarbeit] , (2011)

Baecher, Paul ; Fischlin, Marc ; Schröder, Dominique
Kiayias, Aggelos (ed.) :

Expedient Non-malleability Notions for Hash Functions.
In: CT-RSA. In: Lecture Notes in Computer Science , 6558 . Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
Bishop, Judith ; Vallecillo, Antonio (eds.) :

An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-21952-8_11]
In: Objects, Models, Components, Patterns. Lecture Notes in Computer Science, 6705. Springer, Berlin / Heidelberg , pp. 131-146. ISSN 0302-9743
[Buchkapitel] , (2011)

Bocsi, B. ; Nguyen-Tuong, D. ; Csatol, L. ; Schölkopf, B. ; Peters, Jan :
Learning Inverse Kinematics with Structured Prediction.
In: IEEE/RSJ International Conference on Intelligent Robot Systems (IROS).
[Konferenz- oder Workshop-Beitrag] , (2011)

Boularias, A. ; Kroemer, O. ; Peters, J. :
Learning Robot Grasping from 3-D Images with Markov Random Fields.
In: IEEE/RSJ International Conference on Intelligent Robot Systems (IROS).
[Konferenz- oder Workshop-Beitrag] , (2011)

Boularias, A. ; Kober, J. ; Peters, J. :
Model-free Inverse Reinforcement Learning.
In: Proceedings of the International Conference on Artificial Intelligence and Statistics (AIStats). In: Acceptance Rate: 28.3% .
[Konferenz- oder Workshop-Beitrag] , (2011)

Blanke, Ulf :
Recognizing complex human activity based an activity spotting.
Verl. Dr. Hut , München
[Dissertation]

Borazio, Marko ; Van Laerhoven, Kristof :
Predicting Sleeping Behaviors in Long-Term Studies with Wrist-Worn Sensor Data.
[Online-Edition: http://www.springerlink.com/content/h955508761143442/]
Springer Verlag , Amsterdam
[Konferenz- oder Workshop-Beitrag] , (2011)

Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin :
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
[Online-Edition: http://doi.acm.org/10.1145/2095050.2095101]
In: 5th workshop on Virtual Machines and Intermediate Languages, 24 Oct 2011, Portland, OR, USA. In: SPLASH '11 Workshops . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag] , (2011)

Bücker, H. M. ; Bischof, C. H. :
What computers can do for you automatically: the role of automatic differentiation in inverse modeling.
In: GACM Report, Spring (6) pp. 25-28.
[Artikel] , (2011)

Bücker, H. Martin ; Bischof, Christian H. :
What computers can do for you automatically: The role of automatic differentiation in inverse modeling.
In: GACM Report, Spring (6) pp. 25-28.
[Artikel] , (2011)

Büsing, H. ; Willkomm, J. ; Bischof, C. H. ; Clauser, C. :
Using exact Jacobians in an implicit Newton method for solving multiphase flow in porous media.
In: Int. J. Computational Science and Engineering ISSN 1742-7185
[Artikel] , (2011)

Buchmann, Irene ; Frischbier, Sebastian ; Pütz, Dieter :
Towards an Estimation Model for Software Maintenance Costs.
In: Software Maintenance and Reengineering, European Conference on pp. 313-316.
[Artikel] , (2011)

Bausch, Daniel ; Petrov, Ilia ; Buchmann, Alejandro :
On The Performance Of Database Query Processing Algorithms On Flash Solid State.
In: Proceedings Workshop on Flexible Database and Information System Technology.
[Konferenz- oder Workshop-Beitrag] , (2011)

Bicer, Veli ; Borgert, Stephan ; Winkler, Matthias ; Scheithauer, Gregor ; Voigt, Konrad ; Cardoso, Jorge ; Aitenbichler, Erwin
Ali H. Dogru, Veli Bicer (ed.) :

Modern Software Engineering Concepts and Practices: Advanced Approaches.
In: Modern Software Engineering Concepts and Practices: Advanced Approaches. Information Science Pub ISBN 1609602153
[Buchkapitel] , (2011)

Beljan, Mate ; Klowsky, Ronny ; Goesele, Michael :
A Multi-View Stereo Implementation on Massively Parallel Hardware.

[Report] , (2011)

Bremm, Sebastian ; Landesberger von Antburg, Tatiana ; Hess, Martin ; Schreck, Tobias ; Weil, Philipp ; Hamacher, Kay :
Interactive Visual Comparison of Multiple Trees.
In: IEEE Visual Analytics Science and Technology
[Artikel] , (2011)

Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max :
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
In Proceedings of the 12th International Conference on Distributed Computing and Networking (ICDCN)
[Konferenz- oder Workshop-Beitrag] , (2011)

Borgert, Stephan ; Steinmetz, Joachim ; Mühlhäuser, Max :
ePASS-IoS 1.1: Enabling Inter-enterprise Business Process Modeling by S-BPM and the Internet of Services Concept.
Subject-Oriented Business Process Management: Third International Conference, S-BPM ONE 2011 Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2011)

Bauer, J. ; Friedmann, Martin ; Hemker, Thomas ; Pischan, M. ; Reinl, Christian ; Abele, E. ; von Stryk, Oskar
Denkena, Berend (ed.) :

Analysis of Industrial Robot Structure and Milling Process Interaction for Path Manipulation.
In: Process Machine Interactions. Lecture Notes in Production Engineering. Springer , p. 245.
[Buchkapitel] , (2011)

Borgert, Stephan ; Steinmetz, Joachim ; Mühlhäuser, Max
Schmidt, Werner (ed.) :

ePASS-IoS 1.1: Enabling Inter-enterprise Business Process Modeling by {S-BPM} and the Internet of Services Concept.
In: Communications in Computer and Information Science , 213 . Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Bausch, Daniel ;