TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Á | Ö | Č | Ş
Number of items at this level: 14217.

A

Alhindi, Tariq and Pfeiffer, Jonas and Muresan, Smaranda (2019):
Fine-Tuned Neural Models for Propaganda Detection at the Sentence and Fragment levels.
In: 2nd Workshop on Natural Language Processing for Internet Freedom: Censorship, Disinformation, and Propaganda, In: EMNLP-IJCNLP 2019, Hong Kong, China, 03.11.2019--07.11.2019, pp. 98-102, [Online-Edition: https://www.aclweb.org/anthology/D19-5013.pdf],
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Egert, Rolf and Grube, Tim and Mühlhäuser, Max Cavallaro, Lorenzo and Kinder, Johannes and Wang, XiaoFeng and Katz, Jonathan (eds.) (2019):
Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
In: ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pp. 2677-2679, DOI: 10.1145/3319535.3363285,
[Online-Edition: https://doi.org/10.1145/3319535.3363285],
[Conference or Workshop Item]

Araslanov, Nikita and Rothkopf, Constantin and Roth, Stefan (2019):
Actor-Critic Instance Segmentation.
In: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, [Conference or Workshop Item]

Amann, Sven and Nguyen, Hoan Anh and Nadi, Sarah and Nguyen, Tien N. and Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: MSR, In: Proceedings of the 16th International Conference on Mining Software Repositories, k.A., IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, [Online-Edition: https://conf.researchr.org/home/msr-2019],
[Conference or Workshop Item]

Aschermann, Cornelius and Frassetto, Tommaso and Holz, Thorsten and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Alt, Bastian and Weckesser, Markus and Becker, Christian and Hollick, Matthias and Kar, Sounak and Klein, Anja and Klose, Robin and Kluge, Roland and Koeppl, Heinz and KhudaBukhsh, Wasiur R. and Luthra, Manisha and Mousavi, Mahdi and Mühlhäuser, Max and Pfannemüller, Martin and Rizk, Amr and Schürr, Andy and Steinmetz, Ralf (2019):
Transitions: A Protocol-Independent View of the Future Internet.
107, In: Proceedings of the IEEE, (4), pp. 835-846, ISSN 0018-9219, DOI: 10.1109/JPROC.2019.2895964,
[Article]

Abera, Tigist and Bahmani, Raad and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Arul, Tolga and Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan (2019):
Privacy & Usability of IPTV Recommender Systems.
Las Vegas, USA, In: 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE), Las Vegas, USA, DOI: 10.1109/ICCE.2019.8662046,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Kumar, Manish and Katzenbeisser, Stefan (2019):
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems.
Las Vegas, USA, In: 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE), Las Vegas, USA, DOI: 10.1109/ICCE.2019.8661840,
[Conference or Workshop Item]

Abrams, Jesse F. and Vashishtha, Anand and Wong, Seth T. and Nguyen, An and Mohamed, Azlan and Wieser, Sebastian and Kuijper, Arjan and Wilting, Andreas and Mukhopadhyay, Anirban (2019):
Habitat-Net: Segmentation of habitat images using deep learning.
51, In: Ecological Informatics, pp. 121-128, ISSN 15749541, DOI: 10.1016/j.ecoinf.2019.01.009,
[Online-Edition: https://doi.org/10.1016/j.ecoinf.2019.01.009],
[Article]

Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/larissaaldehoff/2019/1798_Lariss...],
[Conference or Workshop Item]

Almon, Lars and Álvarez, Flor and Kamp, Laurenz and Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
In: 2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Andreas, Nautsch (2019):
Speaker Recognition in Unconstrained Environments.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9199],
[Ph.D. Thesis]

Almon, Lars and Álvarez, Flor and Lieser, Patrick and Meuser, Tobias and Schaller, Fabian (2018):
Ad-Hoc-Kommunikation – Gesellschaftlich wünschenswert, rechtlich ungeregelt.
In: DuD-Fachbeiträge, In: Die Fortentwicklung des Datenschutzes, Vieweg, Wiesbaden, Springer, pp. 77-98, DOI: 10.1007/978-3-658-23727-1_5,
[Book Section]

Akrour, R. and Peters, J. and Neuman, G. (2018):
Constraint-Space Projection Direct Policy Search.
In: European Workshops on Reinforcement Learning (EWRL), Lille, France, [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...],
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Lotichius, Jan and Hatzfeld, Christian and Fernandes, Felipe and Sharma, Ratika and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Securing IoT Devices Using Robust DRAM PUFs.
Thessaloniki, Greece, In: 2018 Global Information Infrastructure and Networking Symposium (GIIS) (GIIS'18), Thessaloniki, Greece, DOI: 10.1109/GIIS.2018.8635789,
[Conference or Workshop Item]

Arul, Tolga and Anagnostopoulos, Nikolaos A. and Katzenbeisser, Stefan (2018):
Behavioral Workload Generation for IPTV.
Berlin, Germany, In: 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin) (ICCE-Berlin 2018), Berlin, Germany, DOI: 10.1109/ICCE-Berlin.2018.8576230,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: GI, In: 28th Crypto-Day, München, Deutschland, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos A. and Arul, Tolga and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2018):
Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs.
Prague, Czech Republic, In: 2018 Euromicro Conference on Digital System Design (DSD), Prague, Czech Republic, DOI: 10.1109/DSD.2018.00102,
[Conference or Workshop Item]

Albrecht, Martin R. and Curtis, Benjamin R. and Deo, Amit and Davidson, Alex and Player, Rachel and Postlethwaite, Eamonn W. and Virdia, Fernando and Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018, In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Online-Edition: http://scn.di.unisa.it/],
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
In: IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, New York, NY, USA, ACM, Budapest, HU, 20-25 August 2018, pp. 49-54, [Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....],
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Chandy, John A. and Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
Volume 2, In: Cryptography 2018, (7), MDPI, DOI: 10.3390/cryptography2020007,
[Article]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Asokan, N. and Nyman, Thomas and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, [Article]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Schaller, André and Xiong, Wenjie and Jain, Manishkumar and Saleem, Umair and Lotichius, Jan and Gabmeyer, Sebastian and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
2, In: Cryptography, (3), MDPI, ISSN 2410-387X, DOI: 10.3390/cryptography2030013,
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm],
[Article]

Amann, Sven (2018):
A Systematic Approach to Benchmark and Improve Automated Static Detection of Java-API Misuses.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7422],
[Ph.D. Thesis]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Arnold, Thomas Otmar (2018):
Advanced Motif Analysis on Text Induced Graphs.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7442],
[Ph.D. Thesis]

Aragon, Santiago and Tiloca, Marco and Maass, Max and Hollick, Matthias and Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE, ISSN 978-1-5386-4586-4, DOI: 10.1109/CNS.2018.8433209,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/7696],
[Article]

Asadiand, Arash and Müller, Sabrina and Sim, Gek Hong and Klein, Anja and Matthias, Hollick (2018):
FML: Fast Machine Learning for 5G mmWave Vehicular Communications.
In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 1961-1969, DOI: 10.1109/INFOCOM.2018.8485876,
[Conference or Workshop Item]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Schulz, Steffen and Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
abs/1801.05764, In: CoRR, [Online-Edition: http://arxiv.org/abs/1801.05764],
[Article]

Amann, Sven and Nguyen, Hoan Anh and Nadi, Sarah and Nguyen, Tien and Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Article]

Asokan, N. and Nguyen, Thien Duc and Tarkoma, Sasu and Toivonen, Juhani and Truong, Hien Thi Thu (2018):
Proximity Verification Based on Acoustic Room Impulse Response.
abs/1803.07211, In: CoRR, [Online-Edition: http://arxiv.org/abs/1803.07211],
[Article]

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1, ISSN 1089-7801, DOI: 10.1109/MIC.2018.182130646,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...],
[Article]

Asokan, N. and Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664, DOI: 10.1016/j.comcom.2018.07.030,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...],
[Article]

Akrour, R. and Veiga, F. and Peters, J. and Neuman, G. (2018):
Regularizing Reinforcement Learning with State Abstraction.
In: Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...],
[Conference or Workshop Item]

Altenhofen, Christian and Luu, Thu Huong and Grasser, Tim and Dennstädt, Marco and Mueller-Roemer, Johannes and Weber, Daniel and Stork, André (2018):
Continuous Property Gradation for Multi-material 3D-printed Objects.
In: Solid Freeform Fabrication 2018: Proceedings of the 29th Annual International Solid Freeform Fabrication Symposium - An Additive Manufacturing Conference, Austin, Tex., University of Texas, In: Annual International Solid Freeform Fabrication Symposium - An Additive Manufacturing Conference, Austin, TX, USA, 2018, [Online-Edition: http://publica.fraunhofer.de/urns/urn:nbn:de:0011-n-512629-1...],
[Conference or Workshop Item]

Albrecht, Martin and Göpfert, Florian and Vidria, Fernando and Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology, Springer, [Conference or Workshop Item]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Master Thesis]

Anagnostopoulos, Nikolaos Athanasios and Gabmeyer, Sebastian and Arul, Tolga and Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Conference or Workshop Item]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Master Thesis]

Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Martin and Tippenhauer, Nils Ole (2017):
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
In: ACM Workshop on Cyber-Physical Systems Security and Privacy, ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, USA, ISBN 978-1-4503-5394-6,
DOI: 10.1145/3140241.3140253,
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Lecture Notes in Computer Science, 10707, In: Critical Information Infrastructures Security (CRITIS), Cham, CH, Springer, Lucca, Italy, 8-13 October 2018, pp. 107-118, [Conference or Workshop Item]

Aroudj, Samir and Seemann, Patrick and Langguth, Fabian and Guthe, Stefan and Goesele, Michael (2017):
Visibility-Consistent Thin Surface Reconstruction Using Multi-Scale Kernels.
36, In: ACM Transactions on Graphics (Proceedings of SIGGRAPH Asia), (6), ACM, pp. 187:1-187:13, DOI: 10.1145/3130800.3130851,
[Article]

Arul, Tolga (2017):
Channel Switching-Triggered Charging for Pay-TV over IPTV.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6680],
[Ph.D. Thesis]

Arias, Orlando and Gens, David and Jin, Yier and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), [Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Frieß, Tamara and Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
[Other]

Alexopoulos, Nikolaos and Daubert, Jörg and Mühlhäuser, Max and Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, IEEE, Sydney, Australia, 1-4 August 2017, pp. 546-553, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Kiayias, Aggelos and Talviste, Riivo and Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, pp. 1217-1234, [Online-Edition: https://www.usenix.org/conference/usenixsecurity17],
[Conference or Workshop Item]

Atre, Rohit and Jannesari, Ali and Wolf, Felix (2017):
Meeting the challenges of parallelizing sequential programs.
ACM, In: Proceedinggs of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Washington, DC, USA, pp. 363-365, ISBN 978-1-4503-4593-4,
DOI: 10.1145/3087556.3087592,
[Conference or Workshop Item]

Atre, Rohit and Huda, Zia Ul and Jannesari, Ali and Wolf, Felix (2017):
Dissecting sequential programs for parallelization - an approach based on computational units.
In: 10th International Symposium on High-Level Parallel Programming and Applications, Valladolid, Spain, pp. 1-18, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Schaller, André and Fan, Yufan and Xiong, Wenjie and Tehranipoor, Fatemeh and Arul, Tolga and Gabmeyer, Sebastian and Szefer, Jakub and Chandy, John A. and Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
In: 26th Crypto-Day, [Conference or Workshop Item]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
2017, In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), De Gruyter Open, pp. 143-163, DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Article]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
30, In: Journal of Cryptology (JoC), (3), Springer, pp. 805-858, DOI: 10.1007/s00145-016-9236-6,
[Online-Edition: https://encrypto.de/papers/ALSZ17.pdf],
[Article]

Alkeilani Alkadri, Nabil and Buchmann, Johannes and El Bansarkhani, Rachid and Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
[Other]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Eaton, Edward and Gutoski, Gus and Krämer, Juliane and Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Arnold, Thomas and Daxenberger, Johannes and Weihe, Karsten and Gurevych, Iryna (2017):
Is Interaction More Important Than Individual Performance? A Study of Motifs in Wikia.
In: WWW '17 Companion, In: Proceedings of the 26th International Conference Companion on World Wide Web, International World Wide Web Conferences Steering Committee, Perth, Australia, pp. 1609-1617, [Online-Edition: http://dl.acm.org/citation.cfm?id=3041021.3053362],
[Conference or Workshop Item]

Abualhaija, Sallam and Miller, Tristan and Eckle-Kohler, Judith and Gurevych, Iryna and Zimmermann, Karl-Heinz (2017):
Metaheuristic Approaches to Lexical Substitution and Simplification.
1, In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2017), Association for Computational Linguistics, Valencia, Spain, pp. 870-880, ISBN 978-1-945626-34-0,
[Online-Edition: http://aclweb.org/anthology/E/E17/E17-1082.pdf],
[Conference or Workshop Item]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing, New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Conference or Workshop Item]

Amend, Sandra C. (2017):
Predicting Execution Time of GPU Kernels using automatic Performance Models.
TU Darmstadt, [Master Thesis]

Arazy, Ofer and Lifshitz-Assaf, Hila and Nov, Oded and Daxenberger, Johannes and Balestra, Martina and Cheshire, Coye (2017):
On the "How" and "Why" of Emergent Role Behaviors in Wikipedia.
In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, Portland, OR, USA, pp. 2039-2051, [Online-Edition: https://dl.acm.org/citation.cfm?id=2998317],
[Conference or Workshop Item]

Arzt, Steven (2017):
Static Data Flow Analysis for Android Applications.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937],
[Ph.D. Thesis]

Ali, Azad (2017):
Fault-Tolerant Spatio-Temporal Compression Scheme for Wireless Sensor Networks.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5924],
[Ph.D. Thesis]

Asadi, Arash and Mancuso, Vincenzo and Gupta, Rohit (2017):
DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks.
In: IEEE/ACM Transactions on Networking, [Article]

Abdulsamad, H. and Arenz, O. and Peters, J. and Neumann, G. (2017):
State-Regularized Policy Search for Linearized Dynamical Systems.
In: Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Akrour, R. and Sorokin, D. and Peters, J. and Neumann, G. (2017):
Local Bayesian Optimization of Motor Skills.
In: Proceedings of the International Conference on Machine Learning (ICML), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Almon, Lars and Riecker, Michael and Hollick, Matthias (2017):
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
IEEE, In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 9-12 Oct. 2017, DOI: 10.1109/LCN.2017.110,
[Online-Edition: https://ieeexplore.ieee.org/document/8109386],
[Conference or Workshop Item]

Altenhofen, Christian and Loosmann, Felix and Mueller-Roemer, Johannes and Grasser, Tim and Luu, Thu Huong and Stork, André (2017):
Integrating Interactive Design and Simulation for Mass Customized 3D-Printed Objects - A Cup Holder Example.
In: Solid Freeform Fabrication 2017: Proceedings ..., Austin, Tex., In: 28th Annual International Solid Freeform Fabrication Symposium - An Additive Manufacturing Conference, Austin, USA, August 7-9, 2017, pp. 2289-2301, [Online-Edition: urn:nbn:de:0011-n-4776958],
[Conference or Workshop Item]

Arazy, Ofer and Daxenberger, Johannes and Lifshitz-Assaf, Hila and Nov, Oded and Gurevych, Iryna (2016):
Turbulent Stability of Emergent Roles: The Dualistic Nature of Self-Organizing Knowledge Co-Production.
27, In: Information Systems Research, (4), pp. 792-812, [Online-Edition: https://pubsonline.informs.org/doi/abs/10.1287/isre.2016.064...],
[Article]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Abel, Andrea and Meyer, Christian M. Klosa, Annette and Müller-Spitzer, Carolin (eds.) (2016):
Nutzerbeteiligung.
In: Internetlexikografie. Ein Kompendium, Berlin: De Gruyter, pp. 249-290, DOI: 10.1515/9783050095615-009,
[Online-Edition: https://www.degruyter.com/view/books/9783050095615/978305009...],
[Book Section]

Appel, Michael and Bossert, Andreas and Cooper, Steven and Kußmaul, Tobias and Löffler, Johannes and Pauer, Christof and Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Andrienko, Gennady and Andrienko, Natalia and Budziak, Guido and Landesberger, Tatiana von and Weber, Hendrik (2016):
Coordinate Transformations for Characterization and Cluster Analysis of Spatial Configurations in Football.
In: Lecture Notes in Computer Science (LNCS); 9853, In: Machine Learning and Knowledge Discovery in Databases, Proceedings, Part II, Springer, In: European Conference, ECML PKDD 2016, Riva del Garda, Italy, September 19-23, pp. 27-31, DOI: 10.1007/978-3-319-46131-1₆,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference or Workshop Item]

Arazy, Ofer and Daxenberger, Johannes and Lifshitz-Assaf, Hila and Nov, Oded and Gurevych, Iryna (2016):
Emergent Roles in Self-Organizing Knowledge Co-Production: Turbulence and Stability.
In: 2017 Collective Intelligence Conference, New York, NY, USA, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Conference or Workshop Item]

Amann, Sven and Proksch, Sebastian and Nadi, Sarah (2016):
FeedBaG: An Interaction Tracker for Visual Studio.
In: ICPC, In: Proceedings of the 24th International Conference on Program Comprehension, In: International Conference on Program Comprehension, Austin, Texas, USA, May 16–17, 2016, [Online-Edition: http://sven-amann.de/publications/feedbag.pdf],
[Conference or Workshop Item]

Akleylek, Sedat and Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, p. 10, [Conference or Workshop Item]

Amann, Sven and Nadi, Sarah and Nguyen, Hoan A. and Nguyen, Tien N. and Mezini, Mira (2016):
MUBench: A Benchmark for API-Misuse Detectors.
In: MSR'16, In: Proceedings of the 13th International Conference on Mining Software Repositories, In: 13th International Conference on Mining Software Repositories, Austin, Texas, USA, May 14–15, 2016, [Conference or Workshop Item]

Amann, Sven and Proksch, Sebastian and Nadi, Sarah and Mezini, Mira (2016):
A Study of Visual Studio Usage in Practice.
In: SANER '16, In: 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering, Osaka, Japan, 14-18 March 2016, [Online-Edition: http://dx.doi.org/10.1109/SANER.2016.39],
[Conference or Workshop Item]

Akleylek, Sedat and Dagdelen, Özgür and Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS, 9540, In: Cryptography and Information Security in the Balkans, Springer, Koper, Slovenia, pp. 155-168, [Conference or Workshop Item]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Andrychowicz, Marcin and Dziembowski, Stefan and Faust, Sebastian (2016):
Circuit Compilers with O(1/ log(n)) Leakage Rate.
2016, In: IACR Cryptology ePrint Archive, p. 173, [Online-Edition: http://eprint.iacr.org/2016/173],
[Article]

Albert, Elvira and Bubel, Richard and Genaim, Samir and Hähnle, Reiner and Puebla, German and Roman-Diez, Guillermo (2016):
A formal verification framework for static analysis - As well as its instantiation to the resource analyzer COSTA and formal verification tool KeY.
15, In: Software and System Modeling, (4), pp. 987-1012, DOI: 10.1007/s10270-015-0476-y,
[Online-Edition: https://doi.org/10.1007/s10270-015-0476-y],
[Article]

Asadi, Arash and Mancuso, Vincenzo (2016):
Network-assisted Outband D2D-clustering in 5G Cellular Networks: Theory and Practice.
In: IEEE Transactions on Mobile Computing, [Article]

Asadi, Arash and Mancuso, Vincenzo and Gupta, Rohit (2016):
An SDR-based Experimental Study of Outband D2D Communications.
In: International Conference on Computer Communications, IEEE, [Conference or Workshop Item]

Alagic, Gorjan and Broadbent, Anne and Fefferman, Bill and Gagliardoni, Tommaso and Schaffner, Christian and Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Cham, Springer, pp. 47-71, [Online-Edition: https://doi.org/10.1007/978-3-319-49175-2],
[Book Section]

Arnold, Thomas and Weihe, Karsten (2016):
Network Motifs May Improve Quality Assessment of Text Documents.
In: Proceedings of TextGraphs-10: the Workshop on Graph-based Methods for Natural Language Processing, [Online-Edition: http://www.aclweb.org/anthology/W16-1404],
[Conference or Workshop Item]

Andrychowicz, Marcin and Dziembowski, Stefan and Faust, Sebastian (2016):
Circuit Compilers with O(1/log (n)) Leakage Rate.
In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, pp. 586-615, DOI: 10.1007/978-3-662-49896-5₂₁,
[Online-Edition: https://doi.org/10.1007/978-3-662-49896-5_21],
[Conference or Workshop Item]

Arenz, O. and Abdulsamad, H. and Neumann, G. (2016):
Optimal Control and Inverse Optimal Control by Distribution Matching.
In: Proceedings of the International Conference on Intelligent Robots and Systems (IROS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Team/OlegArenz/OC an...],
[Conference or Workshop Item]

Abdolmaleki, A. and Lau, N. and Reis, L. and Peters, J. and Neumann, G. (2016):
Contextual Policy Search for Linear and Nonlinear Generalization of a Humanoid Walking Controller.
83, In: Journal of Intelligent & Robotic Systems, (3-4), pp. 393-408, [Online-Edition: https://link.springer.com/article/10.1007/s10846-016-0347-y],
[Article]

Akrour, R. and Abdolmaleki, A. and Abdulsamad, H. and Neumann, G. (2016):
Model-Free Trajectory Optimization for Reinforcement Learning.
In: Proceedings of the International Conference on Machine Learning (ICML), [Online-Edition: http://proceedings.mlr.press/v48/akrour16.pdf],
[Conference or Workshop Item]

Azad, M. and Ortenzi, V. and Lin, C. and Rueckert, E. and Mistry, M. (2016):
Model Estimation and Control of Complaint Contact Normal Force.
In: Proceedings of the International Conference on Humanoid Robots (HUMANOIDS), [Online-Edition: https://rueckert.lima-city.de/papers/Humanoids2016Azad.pdf],
[Conference or Workshop Item]

Altenhofen, Christian and Dietrich, Andreas and Stork, André and Fellner, Dieter W. (2016):
Rixels: Towards Secure Interactive 3D Graphics in Engineering Clouds.
12, In: The IPSI BgD Transactions on Internet Research, (1), pp. 31-38, [Article]

Arul, Tolga and Shoufan, Abdulhadi (2016):
Subscription-free Pay-TV over IPTV.
64, In: Journal of Systems Architecture, pp. 37 - 49, ISSN 1383-7621, DOI: 10.1016/j.sysarc.2015.12.001,
[Article]

Amann, Sven and Beyer, Stefanie and Kevic, Katja and Gall, Harald Meyer, Bertrand and Nordio, Martin (eds.) (2015):
Software Mining Studies: Goals, Approaches, Artifacts, and Replicability.
In: Advances in the theory and practice of software engineering - LASER 2013-2014, Springer, pp. 121-159, [Book Section]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Arzt, Steven and Nadi, Sarah and Ali, Karim and Bodden, Eric and Erdweg, Sebastian and Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, In: OOPSLA Onward!, Piitsburgh, 25.10.2015, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Conference or Workshop Item]

Al-Hadhrami, Nasser and Aziz, Benjamin and Sardesai, Shantanu and Othmane, Lotfi Ben (2015):
Incremental Development of RBAC-controlled E-marking System Using the B Method.
In: Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015), [Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
[Other]

Arzt, Steven and Rasthofer, Siegfried and Hahn, Robert and Bodden, Eric (2015):
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, Portland, USA, 14.06.2015, [Conference or Workshop Item]

Amin, Osama (2015):
Implementation and Evaluation of PUF based Cryptographic Key Generation Schemes on FPGA.
Darmstadt, Technische Universität, [Master Thesis]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference or Workshop Item]

Allouis, E. and Marc, R. and Gancet, J. and Nevatia, Y. and Sonsalla, R. U. and Fritsche, M. and Machowinski, J. and Vogele, T. and Lewinger, W. and Yeomans, B. and Saaj, C. and Gao, Y. and Delfa, Juan and Weclewski, P. and Skocki, K. and Imhof, B. and Ransom, S. and Richter, L. (2015):
FP7 FASTER project - Demonstration of Multi-platform Operation for Safer Planetary Traverses.
In: ASTRA, [Conference or Workshop Item]

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2015):
Mining Apps for Abnormal Usage of Sensitive Data.
In: 2015 International Conference on Software Engineering (ICSE), [Conference or Workshop Item]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, pp. 430-454, DOI: 10.1007/978-3-662-46800-5_17,
[Online-Edition: https://encrypto.de/papers/ARSTZ15.pdf],
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, pp. 673-701, DOI: 10.1007/978-3-662-46800-5_26,
[Online-Edition: https://encrypto.de/papers/ALSZ15.pdf],
[Conference or Workshop Item]

Atre, Rohit and Jannesari, Ali and Wolf, Felix (2015):
The Basic Building Blocks of Parallel Tasks.
ACM, In: Proc. of the International Workshop on Code Optimisation for Multi and Many Cores, San Francisco, CA, USA, pp. 3:1-3:11, DOI: 10.1145/2723772.2723778,
[Online-Edition: http://doi.acm.org/10.1145/2723772.2723778],
[Conference or Workshop Item]

Aroudj, Samir (2015):
Meshless Collision Detection for Deformable Bodies.
TU Darmstadt, [Master Thesis]

Andrychowicz, Marcin and Damgard, Ivan and Dziembowski, Stefan and Faust, Sebastian and Polychroniadou, Antigoni (2015):
Efficient Leakage Resilient Circuit Compilers.
In: Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, pp. 311-329, DOI: 10.1007/978-3-319-16715-2₁₇,
[Online-Edition: https://doi.org/10.1007/978-3-319-16715-2_17],
[Conference or Workshop Item]

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep (2015):
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
abs/1511.02119, In: CoRR, [Online-Edition: https://arxiv.org/pdf/1511.02119.pdf],
[Article]

Abdolmaleki, A. and Lioutikov, R. and Peters, J and Lau, N. and Reis, L. and Neumann, G. (2015):
Model-Based Relative Entropy Stochastic Search.
mit press, In: Advances in Neural Information Processing Systems (NIPS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Team/GerhardNeumann/...],
[Conference or Workshop Item]

Appelhans, Lukas (2015):
Adaptive Voxel-based Classifier for Semi-automatic Segmentation of Tumors in the Head and Neck Area Based on T2-Weighted MRI Image Data.
TU Darmstadt, [Bachelor Thesis]

Arnold, Fabio (2015):
Approximation von Reflexionsmodellen für das interaktive Kleidungsdesign unter natürlicher Beleuchtung : Approximation of Reflection Models for Interactive Clothing Design under Natural Illumination.
TU Darmstadt, [Bachelor Thesis]

Audenrith, Benjamin (2015):
Path Prediction in Multiagent Pedestrian Scenario.
Darmstadt, TU, Master Thesis, 2015, [Master Thesis]

Alekseew, Michael (2015):
Hochpräzise Algorithmen zur Detektion von Armen für Interaktionssysteme aus kapazitiven Abstandssensoren.
Darmstadt, TU, Master Thesis, 2015, [Master Thesis]

Ackermann, Jens and Langguth, Fabian and Fuhrmann, Simon and Kuijper, Arjan and Goesele, Michael (2014):
Multi-view Photometric Stereo by Example.
In: 3D Vision (3DV), 2014 2nd International Conference on, (1), pp. 259-266, [Article]

Aly, Mohamed Abdulazim Mohamed (2014):
An Extension Interface Concept for Multilayered Applications.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4247],
[Ph.D. Thesis]

Araujo, Frederico and Hamlen, Kevin and Biedermann, Sebastian and Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, Scottsdale, AZ, USA, pp. 942-953, [Conference or Workshop Item]

Ambrosin, Moreno and Busold, Christoph and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias Kutylowski, Miroslaw and Vaidya, Jaideep (eds.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Lecture Notes in Computer Science, In: Computer Security - ESORICS 2014, Springer International Publishing, pp. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book Section]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
102, In: Proceedings of the IEEE, (8), pp. 1189-1206, [Article]

Ahrendt, Wolfgang and Beckert, Bernhard and Bruns, Daniel and Bubel, Richard and Gladisch, Christoph and Grebing, Sarah and Hähnle, Reiner and Hentschel, Martin and Klebanov, Vladimir and Mostowski, Wojciech and Scheben, Christoph and Schmitt, Peter and Ulbrich, Mattias Giannakopoulou, Dimitra and Kroening, Daniel (eds.) (2014):
The KeY Platform for Verification and Analysis of Java Programs.
In: LNCS, In: Post-Conference Proceedings VSTTE 2014, Springer, pp. 55--71, [Conference or Workshop Item]

Amann, Sven and Proksch, Sebastian and Mezini, Mira (2014):
Method-Call Recommendations from Implicit Developer Feedback.
In: Proceedings of the 1st International Workshop on CrowdSourcing in Software Engineering - CSI-SE 2014, pp. 5-6, [Online-Edition: http://dx.doi.org/10.1145/2593728.2593730],
[Conference or Workshop Item]

Appel, Stefan (2014):
Integration of Event Processing with Service-oriented Architectures and Business Processes.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3978],
[Ph.D. Thesis]

Ackermann, Jens (2014):
Photometric Reconstruction from Images: New Scenarios and Approaches for Uncontrolled Input Data.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4060],
[Ph.D. Thesis]

Ali, Karim and Rapoport, Marianna and Lhoták, Ondřej and Dolby, Julian and Tip, Frank (2014):
Constructing Call Graphs of Scala Programs.
In: ECOOP '14, In: Proceedings of the 28th European Conference on Object-Oriented Programming, pp. (Acceptance Rate: 26%), [Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Fritz, Christian and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2014):
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, p. 29, [Conference or Workshop Item]

Arzt, Steven and Huber, Stephan and Rasthofer, Siegfried and Bodden, Eric (2014):
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, pp. 21-26, [Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad, pp. 288-298, [Conference or Workshop Item]

Albert, Elvira and de Boer, Frank S. and Hähnle, Reiner and Johnsen, Einar Broch and Schlatte, Rudolf and Tarifa, Silvia Lizeth Tapia and Wong, Peter Y. H. (2014):
Formal modeling and analysis of resource management for cloud architectures: an industrial case study using Real-Time ABS.
8, In: Service Oriented Computing and Applications, (4), pp. 323-339, DOI: 10.1007/s11761-013-0148-0,
[Online-Edition: https://doi.org/10.1007/s11761-013-0148-0],
[Article]

Asadi, Arash and Mancuso, Vincenzo (2014):
DRONEE: Dual-radio opportunistic networking for energy efficiency.
In: Computer Communications (Special issue: Green Networking), [Article]

Asadi, Arash and Jacko, Peter and Mancuso, Vincenzo (2014):
Modeling D2D communications with LTE and WiFi.
In: ACM SIGMETRICS Performance Evaluation Review, [Article]

Asadi, Arash and Qing, Wang and Mancuso, Vincenzo (2014):
A Survey on Device-to-Device Communication in Cellular Networks.
In: IEEE Communications Surveys & Tutorials, [Article]

Aderhold, Andreas and Wilkosinska, Katarzyna and Corsini, Massimiliano and Jung, Yvonne and Graf, Holger and Kuijper, Arjan (2014):
The Common Implementation Framework as Service - Towards Novel Applications for Streamlined Presentation of 3D Content on the Web.
In: Lecture Notes in Computer Science (LNCS); 8518, Springer, Berlin, Heidelberg, New York, In: Design, User Experience, and Usability. Proceedings Part II, pp. 3-14, DOI: 10.1007/978-3-319-07626-3₁,
[Conference or Workshop Item]

Ackermann, Jens and Langguth, Fabian and Fuhrmann, Simon and Kuijper, Arjan and Goesele, Michael (2014):
Multi-View Photometric Stereo by Example.
IEEE Computer Society, Los Alamitos, Calif., In: 3DV 2014 - Volume I, pp. 259-266, DOI: 10.1109/3DV.2014.63,
[Conference or Workshop Item]

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, Morgan & Claypool, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, Berlin, November 04 - 08, 2013, pp. 535-548, DOI: 10.1145/2508859.2516738,
[Online-Edition: https://encrypto.de/papers/ALSZ13.pdf],
[Conference or Workshop Item]

Albrecht, Martin and Fitzpatrick, Robert and Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013, Seoul, Korea, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, pp. 1-12, [Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), Springer, pp. 364-381, [Article]

Abel, Andrea and Meyer, Christian M. Kosem, Iztok and Kallas, Jelena and Gantar, Polona and Krek, Simon and Langemets, Margit and Tuulik, Maria (eds.) (2013):
The dynamics outside the paper: user contributions to online dictionaries.
In: Proceedings of the 3rd Biennial Conference on Electronic Lexicography (eLex), Ljubljana: Trojina, Institute for Applied Slovene Studies/Tallinn: Eesti Keele Instituut, Tallinn, Estonia, pp. 179-194, [Online-Edition: http://eki.ee/elex2013/proceedings/eLex2013_13_Abel+Meyer.pd...],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Erdweg, Sebastian and Mezini, Mira (2013):
XPoints: Extension Interfaces for Multilayered Applications.
In: Enterprise Distributed Object Computing Conference (EDOC), 2013 17th IEEE International, Vancouver, Canada, 9 - 13 Sept., pp. 237-246, [Online-Edition: http://dx.doi.org/10.1109/EDOC.2013.34],
[Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2013):
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf],
[Report]

Aly, M. and Charfi, A. and Erdweg, S. and Mezini, M. (2013):
Extension Interfaces for Multilayered Applications.
In: XPoints, [Article]

Alaoui, Sidi Mohamed El Yousfi and El Bansarkhani, Rachid and Cayrel, Pierre-Louis and Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Aderhold, Markus and Kochtchi, Artjom (2013):
Tailoring PMD to Secure Coding.
(TUD-CS-2013-0245), [Report]

Alsouri, Sami (2013):
Behavior Compliance Control for More Trustworthy Computation Outsourcing.
TU Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3578],
[Ph.D. Thesis]

Aderhold, Markus and Gebhardt, Alexander and Mantel, Heiko (2013):
Choosing a Formalism for Secure Coding: FSM vs. LTL.
[Report]

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
Springer, In: 11. International Conference on Applied Cryptography and Network Security (ACNS'13), pp. 432-440, ISSN 0302-9743, DOI: 10.1007/978-3-642-38980-1_27,
[Online-Edition: https://encrypto.de/papers/ADNRSSS13.pdf],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Alkassar, Ammar and Heuser, Stephan and Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
67, In: Designs, Codes and Cryptography, (2), pp. 209-232, [Article]

Amann, Sven (2013):
Code Completion Based on Implicit User Feedback.
Technische Universität Darmstadt, [Master Thesis]

Arzt, Steven and Falzon, Kevin and Follner, Andreas and Rasthofer, Siegfried and Bodden, Eric and Stolz, Volker (2013):
How useful are existing monitoring languages for securing Android apps?
In: GI Lecture Notes in Informatics, Gesellschaft für Informatik, In: 6. Arbeitstagung Programmiersprachen (ATPS 2013), [Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Wu, Di and Mezini, Mira (2013):
Understanding multilayered applications for building extensions.
In: CoCoS '13, In: Proceedings of the 1st Workshop on Comprehension of Complex Systems, New York, NY, USA, ACM, In: 1st Workshop on Comprehension of Complex Systems, Fukuoka, Japan, March 25th, 2013, pp. 1-6, [Online-Edition: http://doi.acm.org/10.1145/2451592.2451594],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Mezini, Mira (2013):
Building Extensions for Applications: Towards the Understanding of Extension Possibilities.
In: ICPC 2013, In: 2013 IEEE 21st International Conference on Program Comprehension (ICPC), IEEE, In: 21st International Conference on Program Comprehension , San Francisco, California, USA, May 20th - 21st, 2013, pp. 182-191, [Online-Edition: http://dx.doi.org/10.1109/ICPC.2013.6613846],
[Conference or Workshop Item]

Appel, Stefan and Frischbier, Sebastian and Freudenreich, Tobias and Buchmann, Alejandro (2013):
Event Stream Processing Units in Business Processes.
Beijing, China, In: 11th International Conference on Business Process Management (BPM), [Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Wu, Di and Mezini, Mira (2013):
Understanding multilayered applications for building extensions.
In: Proceedings of the 1st workshop on Comprehension of complex systems - CoCoS '13, p. 1, [Online-Edition: http://dx.doi.org/10.1145/2451592.2451594],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Erdweg, Sebastian and Mezini, Mira (2013):
XPoints: Extension Interfaces for Multilayered Applications.
In: 2013 17th IEEE International Enterprise Distributed Object Computing Conference, pp. 237-246, [Online-Edition: http://dx.doi.org/10.1109/EDOC.2013.34],
[Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Mezini, Mira (2013):
Building extensions for applications: Towards the understanding of extension possibilities.
In: 2013 21st International Conference on Program Comprehension (ICPC), pp. 182-191, [Online-Edition: http://dx.doi.org/10.1109/ICPC.2013.6613846],
[Conference or Workshop Item]

Ali, Karim and Lhoták, Ondřej (2013):
Averroes: Whole-Program Analysis without the Whole Program.
In: ECOOP '13, In: Proceedings of the 27th European Conference on Object-Oriented Programming, pp. (Acceptance Rate: 25%), [Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16],
[Conference or Workshop Item]

Ackermann, Jens and Goesele, Michael (2013):
A Survey of Photometric Stereo Techniques.
9, In: Foundations and Trends in Computer Graphics and Vision, (3-4), Now Publishers Inc., pp. 149-154, [Article]

Ackermann, Jens and Fuhrmann, Simon and Goesele, Michael (2013):
Geometric Point Light Source Calibration.
In: Proceedings of Vision, Modeling, and Visualization (VMV 2013),, Lugano, Switzerland, September 11-13, 2013, pp. 161-168, [Conference or Workshop Item]

Ackermann, Jens and Goesele, Michael (2013):
How bright is the moon? Recovering and Using Absolute Luminance Values from Internet Images.
In: Proceedings of the Fourth Computational Color Imaging Workshop, Springer, [Conference or Workshop Item]

Aroudj, Samir (2013):
Grammar-Based Dungeon Generation For Massively Multiplayer Online Games.
Hochschule Trier, [Bachelor Thesis]

Albert, Elvira and de Boer, Frank S. and Hähnle, Reiner and Johnsen, Einar Broch and Laneve, Cosimo Solberg, Arnor and Babar, Muhammad Ali and Dumas, Marlon and Cuesta, Carlos E. (eds.) (2013):
Engineering virtualized services.
In: ACM International Conference Proceeding Series, 826, ACM, In: Second Nordic Symposium on Cloud Computing & Internet Technologies, NordiCloud '13, Oslo, Norway, September 1-3, 2013, pp. 59-63, DOI: 10.1145/2513534.2513545,
[Online-Edition: http://doi.acm.org/10.1145/2513534.2513545],
[Conference or Workshop Item]

Albert, Elvira and de Boer, Frank and Hähnle, Reiner and Johnsen, Einar Broch and Laneve, Cosimo Babar, Ali and Dumas, Marlon (eds.) (2013):
Engineering Virtualized Services.
In: 2nd Nordic Symposium on Cloud Computing and Internet Technologies (NordiCloud), ACM Press, pp. 59-63, [Conference or Workshop Item]

Armknecht, Frederik and Schulz, Steffen and Wachsmann, Christian (2013):
A security framework for the analysis and design of software attestation.
New York, NY, USA, DOI: 10.1145/2508859.2516650,
[Conference or Workshop Item]

Alsouri, S. and Feller, T. and Malipatlolla, S. and Katzenbeisser, S. (2013):
Hardware-based Security for Virtual Trusted Platform Modules.
[Article]

Asadi, Arash and Mancuso, Vincenzo (2013):
A Survey on Opportunistic Scheduling in Wireless Communications.
In: IEEE Communications Surveys & Tutorials, [Article]

Ahmed, Sarah and Kaiser, Maximilian and Kreutzer, Michael (2013):
IT-Sicherheitstrends kleiner und mittelständischer Unternehmen.
[Report]

Aderhold, Andreas and Jung, Yvonne and Wilkosinska, Katarzyna and Fellner, Dieter W. (2013):
Distributed 3D Model Optimization for the Web with the Common Implementation Framework for Online Virtual Museums.
The Institute of Electrical and Electronics Engineers (IEEE), New York, In: 2013 Digital Heritage International Congress. Volume 2, pp. 719-726, DOI: 10.1109/DigitalHeritage.2013.6744841,
[Conference or Workshop Item]

Augusto, Juan Carlos and Grimstad, Terje and Wichert, Reiner and Schulze, Eva and Braun, Andreas and Rødevand, Gro Marit and Ridley, Vanda (2013):
Personalized Smart Environments to Increase Inclusion of People with Down's Syndrome.
In: Lecture Notes in Computer Science (LNCS); 8309, Springer, Berlin; Heidelberg; New York, In: Ambient Intelligence, pp. 223-228, DOI: 10.1007/978-3-319-03647-2₁₆,
[Conference or Workshop Item]

Alekseew, Michael (2013):
Untersuchung von Verfahren zur Erfassung von menschlichen Laufbewegungen mit mehreren RGB-D-Kameras.
Darmstadt, Technische Universität Darmstadt, Department of Computer Science (SIM), [Bachelor Thesis]

Appel, Stefan and Frischbier, Sebastian and Freudenreich, Tobias and Buchmann, Alejandro (2012):
Eventlets: Components for the Integration of Event Streams with SOA.
In: 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), [Conference or Workshop Item]

Alsouri, Sami and Sinschek, Jan and Sewe, Andreas and Bodden, Eric and Mezini, Mira and Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Lecture Notes in Computer Science, 7483, In: Information Security, In: 15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, pp. 168-187, ISSN 0302-9743, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11],
[Conference or Workshop Item]

Ansaloni, Danilo and Binder, Walter and Bockisch, Christoph and Bodden, Eric and Hatun, Kardelen and Marek, Lukas and Qi, Zhengwei and Sarimbekov, Aibek and Sewe, Andreas and Tuma, Petr and Zheng, Yudi (2012):
Challenges for Refinement and Composition of Instrumentations (Position Paper).
In: International Conference on Software Composition (SC 2012), [Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf],
[Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi and Dagdelen, Özgür and Véron, Pascal and Galindo, David and Cayrel, Pierre-Louis (2012):
Extended Security Arguments for Signature Schemes.
LNCS, In: AfricaCrypt 2012, (7374), pp. 19 - 34, [Article]

Albert, Elvira and Bubel, Richard and Genaim, Samir and Hähnle, Reiner and Román-Díez, Guillermo (2012):
Verified Resource Guarantees for Heap Manipulating Programs.
In: Lecture Notes in Computer Science, 7212, In: Proceedings of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012), Springer-Verlag, pp. 130-145, DOI: 10.1007/978-3-642-28872-2,
[Conference or Workshop Item]

Alkassar, Ammar and Schulz, Steffen and Stüble, Christian (2012):
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
2012, In: Datenschutz und Datensicherheit (DuD), (3), pp. 175-179, DOI: 10.1007/s11623-012-0060-3,
[Article]

Arul, Tolga and Shoufan, Abdulhadi (2012):
Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV.
In: 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 147-153, DOI: 10.1109/WAINA.2012.95,
[Conference or Workshop Item]

Ahmad, Junaid Jameel and Li, Shujun and Sadeghi, Ahmad-Reza and Schneider, Thomas (2012):
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
In: 16. International Conference on Financial Cryptography and Data Security (FC'12), Springer, pp. 299-313, DOI: 10.1007/978-3-642-32946-3_22,
[Online-Edition: https://encrypto.de/papers/ALSS12.pdf],
[Conference or Workshop Item]

an Mey, Dieter and Biersdorff, Scott and Bischof, Christian and Diethelm, Kai and Eschweiler, Dominic and Gerndt, Michael and Knüpfer, Andreas and Lorenz, Daniel and Malony, Allen D. and Nagel, Wolfgang E. and Oleynik, Yury and Rössel, Christian and Saviankou, Pavel and Schmidl, Dirk and Shende, Sameer S. and Wagner, Michael and Wesarg, Bert and Wolf, Felix (2012):
Score-P: A Unified Performance Measurement System for Petascale Applications.
In: SpringerLink: Springer e-Books, Berlin u.a., Springer, In: Competence in High Performance Computing 2010 : Proceedings of an International Conference on Competence in High Performance Computing, June 2010, Schloss Schwetzingen, Germany / ed. by Christian Bischof, pp. 85-97, [Conference or Workshop Item]

Aly, Mohamed and Charfi, Anis and Mezini, Mira (2012):
On the extensibility requirements of business applications.
In: NEMARA '12, New York, NY, USA, ACM, In: Proceedings of the 2012 workshop on Next Generation Modularity Approaches for Requirements and Architecture, pp. 1-6, [Online-Edition: http://doi.acm.org/10.1145/2162004.2162006],
[Conference or Workshop Item]

Ali, Karim and Lhoták, Ondřej (2012):
Application-Only Call Graph Construction.
In: ECOOP '12, In: Proceedings of the 26th European Conference on Object-Oriented Programming, pp. (Acceptance Rate: 19%), [Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30],
[Conference or Workshop Item]

Ackermann, Jens and Langguth, Fabian and Fuhrmann, Simon and Goesele, Michael (2012):
Photometric Stereo for Outdoor Webcams.
In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Providence, USA, June 16-21, 2012, [Conference or Workshop Item]

an Mey, Dieter and Biersdorff, Scott and Bischof, Christian and Diethelm, Kai and Eschweiler, Dominic and Gerndt, Michael and Knüpfer, Andreas and Saviankou, Pavel and Schmidl, Dirk and Shende, Sameer S. and Wagner, Michael and Wesarg, Bert and Wolf, Felix and Lorenz, Daniel and Mallony, Allen D. and Nagel, Wolfgang E. and Oleynik, Yury and Rössel, Christian (2012):
Score-P: A Unified Performance Measurement System for Petascale Applications.
Springer, In: Proc. of the CiHPC: Competence in High Performance Computing, HPC Status Konferenz der Gauß-Allianz e.V., Schwetzingen, Germany, June 2010, pp. 85-97, ISBN 978-3-642-24025-6,
DOI: 10.1007/978-3-642-24025-6₈,
[Online-Edition: http://www.springerlink.com/content/t041605372024474/?MUD=MP],
[Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer, pp. 234-251, [Conference or Workshop Item]

Alomari, Esraa and Manickam, Selvakumar and Gupta, B. and Karuppayah, Shankar and Alfaris, Rafeef (2012):
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
49, In: International Journal of Computer Applications, (7), pp. 24-32, [Article]

Ackermann, Jens and Ritz, Martin and Stork, André and Goesele, Michael (2012):
Removing the Example from Example-based Photometric Stereo.
In: Lecture Notes in Computer Science (LNCS); 6554, Springer, Berlin, Heidelberg, New York, In: Trends and Topics in Computer Vision, pp. 197-210, DOI: 10.1007/978-3-642-35740-4₁₆,
[Conference or Workshop Item]

Altenhofen, Christian (2012):
Effiziente Selbstschattierung in Szenen mit bildbasierter Beleuchtungsinformation und glänzenden Materialien.
Darmstadt, TU, Master Thesis, 2012, [Master Thesis]

Andriluka, Mykhaylo (2011):
Detection, Tracking and Pose Estimation of People in Challenging Real-World Scenes.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-27636],
[Ph.D. Thesis]

Anquetil, Nicolas and Kulesza, Uirá and Mateus, Ricardo and Mitschke, Ralf and Moreira, Ana and Royer, Jean-Claude and Rummler, Andreas Rashid, Awais and Royer, Jean-Claude and Rummler, Andreas (eds.) (2011):
Managing information flow in the SPL development process.
In: Aspect-oriented, model-driven software product lines, New York, NY, USA, Cambridge University Press, pp. 222-262, [Book Section]

Abdelmageed Mohamed, Wael Said (2011):
Improvements for the XL Algorithm with Applications to Algebraic Cryptanalysis.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-26216],
[Ph.D. Thesis]

Armknecht, Frederik and Maes, Roel and Sadeghi, Ahmad-Reza and Standaert, François-Xavier and Wachsmann, Christian (2011):
A Formal Foundation for the Security Features of Physical Functions.
In: IEEE Symposium on Security and Privacy (SSP), IEEE Computer Society, pp. 397-412, [Conference or Workshop Item]

Abele, E. and Bauer, J. and Friedmann, Martin and Pischan, M. and Reinl, Christian and Stryk, Oskar von and Stryk, Oskar von (2011):
Einsatz von Robotern in der spanenden Fertigung.
In: Wissenschaftsmagazin forschen, TU Darmstadt, p. 44, [Book Section]

Andrade, Rodrigo and Ribeiro, Márcio and Gasiunas, Vaidas and Satabin, Lucas and Rebelo, Herique and Borba, Paulo (2011):
Assessing Idioms for Implementing Features with Flexible Binding Times.
In: European Conference on Software Maintenance and Reengineering (CSMR), 2011, pp. 231 -240, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2011):
On the Design of Perturbation-Resilient Atomic Commit Protocols for Mobile Transactions.
In: ACM Transactions on Computer Systems, [Article]

Appadurai, Daniel (2011):
Entwurf eines serviceorientierten Recommender-Systems im BMW Group Kontext.
TU Darmstadt, [Master Thesis]

Alvaro, M. and Peters, J. and Schölkopf, B. and Lawrence, N. (2011):
Switched Latent Force Models for Movement Segmentation.
In: Spotlight � Acceptance Rate: 5.9%, In: Advances in Neural Information Processing Systems 24 (NIPS 2010), Cambridge, MA: MIT Press, [Conference or Workshop Item]

Aitenbichler, Erwin and Borgert, Stephan and Mühlhäuser, Max (2011):
Distributed Execution of S-BPM Business Processes.
Springer, In: S-BPM ONE 2010 - The Subjectoriented BPM Conference, pp. 19-35, ISBN 978-3-642-23134-6,
[Conference or Workshop Item]

Abele, E. and Bauer, J. and Hemker, Thomas and Laurischkat, R. and Meier, H. and Reese, S. and Stryk, Oskar von and Stryk, Oskar von (2011):
Comparison and Validation of Implementations of a Flexible Joint Multibody Dynamics System Model for an Industrial Robot.
4, In: CIRP Journal of Manufacturing Science and Technology, (1), pp. 38-43, DOI: 10.1016/j.cirpj.2011.01.006,
[Article]

Armknecht, Frederik and Strufe, Thorsten (2011):
An Efficient Distributed Privacy-preserving Recommendation System.
In: Proceedings of the 10th IEEE/IFIP Med-Hoc-Net, [Conference or Workshop Item]

Albert, Elvira and Bubel, Richard and Genaim, Samir and Hähnle, Reiner and Puebla, Germán and Román-Díez, Guillermo (2011):
Verified Resource Guarantees using COSTA and KeY.
In: Proc. ACM SIGPLAN 2011 Workshop on Partial Evaluation and Program Manipulation (PEPM'11), Austin, Texas, USA, ACM Press, [Conference or Workshop Item]

Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]

Amodeo, G. and Blanco, R. and Brefeld, U. (2011):
Hybrid Models for Future Event Prediction.
In: Proceedings of the International ACM Conference on Information and Knowledge Management, [Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis and Meziani, Mohammed Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: Communications in Computer and Information Science, 200, In: ISA, Springer, pp. 146-155, [Conference or Workshop Item]

Ahmedou, Cheikh Tijani Ould Chrif (2011):
Simulation von Biomasseverbrennung mit Diskrete-Elemente-Methode.
Technische Universitaet Darmstadt, Department of Computer Science & Department of Mechanical Engineering, [Master Thesis]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Scafuro, Alessandra and Visconti, Ivan and Wachsmann, Christian (2010):
Impossibility Results for RFID Privacy Notions.
In: LNCS, 6480, In: Transactions on Computational Science IX, Springer, pp. 39-63, [Conference or Workshop Item]

Aitenbichler, Erwin and Borgert, Stephan and Mühlhäuser, Max (2010):
Automatic Service Composition for the Internet of Services.
Gesellschaft für Informatik KuVS, In: 3rd GI/ITG KuVS Fachgespräch on NG SDPs: \"Towards SDPs for the Future Internet\", p. 2, [Conference or Workshop Item]

Anjorin, Anthony and Lauder, Marius and Schlereth, Michael and Schürr, Andy (2010):
Support for Bidirectional Model-to-Text Transformations.
In: Electronic Communications of the EASST, 36, European Assoc. of Software Science and Technology, [Conference or Workshop Item]

Ayari, Brahim (2010):
Perturbation-Resilient Atomic Commit Protocols for Mobile Environments.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-22740],
[Ph.D. Thesis]

Almeida, José Bacelar and Bangerter, Endre and Barbosa, Manuel and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
In: 15. European Symposium on Research in Computer Security (ESORICS'10), Springer, pp. 151-167, DOI: 10.1007/978-3-642-15497-3_10,
[Online-Edition: https://encrypto.de/papers/ABBKSS10.pdf],
[Conference or Workshop Item]

Alnusair, Awny and Zhao, Tian and Bodden, Eric (2010):
Effective API Navigation and Reuse.
IEEE, In: International Conference on Conference on Information Reuse and Integration (IEEE IRI), pp. 7-12, [Conference or Workshop Item]

Appel, Stefan and Sachs, Kai and Buchmann, Alejandro (2010):
Towards Benchmarking of AMQP.
In: 4th ACM International Conference on Distributed Event-Based Systems (DEBS), [Conference or Workshop Item]

Abele, Eberhard and Bauer, Jörg and Pischan, Matthias and Fiedmann, Martin and Hemker, Thomas and Stryk, Oskar von and Stryk, Oskar von (2010):
Prediction of the Tool Displacement for Robot Milling Applications using Co-Simulation of an Industrial Robot and a Removal Process.
In: Proceedings of the CIRP 2nd International Conference Process Machine Interactions, Vancouver, BC, Canada, June 10-11, 2010, [Conference or Workshop Item]

Aitenbichler, Erwin and Schnelle-Walka, Dirk (2010):
An Extensible Architecture for Multitouch & Pen Interactive Tables.
In: Engineering Patterns for Multi-Touch Interfaces 2010, in congunction with EICS 2010, pp. 1 - 6, [Conference or Workshop Item]

Armknecht, Frederik and Ghosal, Dipak and Katzenbeisser, Stefan and Liu, Yali and Sadeghi, Ahmad-Reza and Schulz, Steffen (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding Conference (IH), Springer, [Conference or Workshop Item]

Armknecht, Frederik and Sadeghi, Ahmad-Reza and Visconti, Ivan and Wachsmann, Christian (2010):
On RFID Privacy with Mutual Authentication and Tag Corruption.
In: LNCS, 6123, In: International Conference on Applied Cryptography and Network Security (ACNS), Springer, pp. 493-510, [Conference or Workshop Item]

Armknecht, Frederik and Chen, Liqun and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2010):
Anonymous Authentication for RFID Systems.
In: LNCS, 6370, In: Workshop on RFID Security (RFIDSec), Springer, pp. 158-175, [Conference or Workshop Item]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max and Ries, Sebastian and Schnelle-Walka, Dirk (2010):
Shaping the Future Internet.
Special Issue of IOPTS, In: Ubiquitous Computing and Communication Journal, pp. 1 - 7, [Article]

Appel, Stefan and Sachs, Kai and Buchmann, Alejandro (2010):
Quality of Service in Event-based Systems.
In: 22nd GI-Workshop on Foundations of Databases (GvD), [Conference or Workshop Item]

Abdalla, Michel and Chevalier, Celine and Manulis, Mark and Pointcheval, David (2010):
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2010, Springer, [Conference or Workshop Item]

Attig, Norbert and Berberich, Florian and Detert, Ulrich and Eicker, Nobert and Eickermann, Thomas and Gibbon, Paul and Gürich, Wolfgang and Homberg, Willi and Illich, Antonia and Rinke, Sebastian and Stephan, Michael and Wolkersdorfer, Klaus and Lippert, Thomas Münster, Gernot and Wolf, Dietrich and Kremer, Manfred (eds.) (2010):
Entering the Petaflop-Era - New Developments in Supercomputing.
In: IAS Series, 3, John von Neumann Institute for Supercomputing, In: NIC Symposium 2010, Jülich, pp. 1-12, ISBN 978-3-89336-606-4,
[Conference or Workshop Item]

Ali, Azad and Khelil, Abdelmajid and Shaikh, Faisal Karim and Suri, Neeraj (2010):
Effcient Predictive Monitoring of Wireless Sensor Networks.
In: Special Edition of "International Journal of Autonomous and Adaptive Communications Systems (IJAACS)", [Article]

Aderhold, Markus Esparza, Javier and Majumdar, Rupak (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16), Springer, [Conference or Workshop Item]

Aderhold, Markus and Cuéllar, Jorge and Mantel, Heiko and Sudbrock, Henning (2010):
Exemplary Formalization of Secure Coding Guidelines.
In: aderhold.ea:exemplary:2010a, Germany, [Report]

Appel, Stefan and Petrov, Ilia and Buchmann, Alejandro (2010):
Performance Evaluation of Multi Machine Virtual Environments.
In: International SPEC Benchmark Workshop 2010, [Conference or Workshop Item]

Aitenbichler, Erwin and Borgert, Stephan Buchwald, H. and Fleischmann, A. and Seese, D. and Stary, C. (eds.) (2010):
Application of Subject-oriented Modeling in Automatic Service Composition.
In: Communications in Computer and Information Science, In: S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management, Berlin ; Heidelberg, Springer, pp. 71-82, DOI: https://www.springer.com/de/book/9783642159145,
[Book Section]

Aitenbichler, Erwin and Schnelle-Walka, Dirk (2010):
An Extensible Architecture for Multitouch & Pen Interactive Tables.
In: Engineering Patterns for Multi-Touch Interfaces, Workshop Proceedings of ACM EICS, [Conference or Workshop Item]

Aderhold, Markus Esparza, J. and Majumdar, R. (eds.) (2010):
Automated Termination Analysis for Programs with Second-Order Recursion.
In: LNCS 6015, In: 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS-16), Springer, pp. 221--235, [Conference or Workshop Item]

Aderhold, Markus Giesl, J. and Hähnle, R. (eds.) (2010):
Automated Synthesis of Induction Axioms for Programs with Second-Order Recursion.
In: LNAI 6173, In: 5th International Joint Conference on Automated Reasoning (IJCAR-5), Springer, pp. 263--277, [Conference or Workshop Item]

Ackermann, Tobias and Brandt, Björn and Buxmann, Peter (2010):
Risiken der Adoption von SaaS.
In: Software-as-a-Service (SaaS) ? {"U}ber den Wandel von Anbieterstrategien, Kundenbedürfnissen und Marktstrukturen in der SW-Industrie, Gabler-Verlag, [Article]

Alvaro, Mauricio A. and Peters, Jan and Schoelkopf, Bernhard and Lawrence, Neil D. (2010):
Switched Latent Force Models for Movement Segmentation.
In: Advances in neural information processing systems 23 : Proceedings of the 2010 Conference, Red Hook, NY : Curran, Neural Information Processing Systems Foundation, In: 24th Annual Conference on Neural Information Processing Systems 2010, Vancouver, Canada, 2010.12.06-09, pp. 55-63, [Online-Edition: http://robot-learning.de/uploads/Publications/Alvarez_NIPS_2...],
[Conference or Workshop Item]

Andrienko, Gennady and Andrienko, Natalia and Bak, Peter and Bremm, Sebastian and Keim, Daniel A. and Landesberger, Tatiana von and Pölitz, Christian and Schreck, Tobias (2010):
A Framework for Using Self-Organizing Maps to Analyze Spatio-Temporal Patterns, Exemplified by Analysis of Mobile Phone Usage.
4, In: Journal of Location Based Services, (3-4), pp. 200-221, DOI: 10.1080/17489725.2010.532816,
[Article]

Andrienko, Gennady and Andrienko, Natalia and Bremm, Sebastian and Schreck, Tobias and Landesberger, Tatiana von and Bak, Peter and Keim, Daniel A. (2010):
Space-in-Time and Time-in-Space Self-Organizing Maps for Exploring Spatiotemporal Patterns.
29, In: Computer Graphics Forum, (3), pp. 913-922, [Article]

Appel, Stefan and Sachs, Kai Sachs, Kai and Petrov, Ilia and Guerrero, Pablo (eds.) (2010):
A Logistics Workload for Event Notification Middleware.
In: Lecture Notes in Computer Science, In: From Active Data Management to Event-Based Systems and More, Springer, pp. 312-324, [Book Section]

Aderhold, Markus Axel (2009):
Verification of second-order functional programs.
Darmstadt, Technische Universität, TU Darmstadt, [Ph.D. Thesis]

Avdil, Alaubek (2009):
A Novel LP-based Local Search Technique -Fast and Quite Good-.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-19149],
[Ph.D. Thesis]

Aderhold, Markus Axel (2009):
Verification of Second-Order Functional Programs.
Darmstadt, Technische Universität, Technische Universität Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-18652],
[Ph.D. Thesis]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
TU Darmstadt, [Bachelor Thesis]

Abboud, Osama and König, André and Gottron, Christian (2009):
Quality Adaptation and Security in Peer-to-Peer Systems.
In: Proceedings 9th Würzburg Workshop on IP: Joint ITG and Euro-NF Workshop "Visions of I Generation Networks" (EuroView 2009), Würzburg, In: 9th Würzburg Workshop on IP, Würzburg, pp. Poster, [Conference or Workshop Item]

Anquetil, Nicolas and Kulesza, Uirá and Mitschke, Ralf and Moreira, Ana and Royer, Jean-Claude and Rummler, Andreas and Sousa, André (2009):
A model-driven traceability framework for software product lines.
In: Software and Systems Modeling, Springer Berlin / Heidelberg, ISSN 1619-1366 (Print) 1619-1374 (Online), [Online-Edition: http://www.springerlink.com/content/wvm4hv8r78117785/],
[Article]

Alfonseca, Enrique and Hall, Keith and Hartmann, Silvana (2009):
Large-scale Computation of Distributional Similarities for Queries.
In: Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL-HLT), Companion Volume: Short Papers, pp. 29 -32, [Online-Edition: http://www.aclweb.org/anthology/N09-2008],
[Conference or Workshop Item]

Abboud, Osama and Kovacevic, Aleksandra and Graffi, Kalman and Pussep, Konstantin and Steinmetz, Ralf (2009):
Underlay Awareness in P2P Systems: Techniques and Challenges.
In: 2009 IEEE International Symposium on Parallel & Distributed Processing : (IPDPS 2009) ; Rome, Italy, 23 - 29 May 2009, Piscataway, NJ, IEEE, [Book Section]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2009):
Exploring Delay-Aware Transactions in Heterogenous Mobile Environments.
4, In: Journal of Software, Special Issue: Selected Papers of The 6th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, (7), pp. 634-643, [Article]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2009):
Exploring Delay-Aware Transactions in Heterogeneous Mobile Environments.
4, In: Journal Of Software Special Issue: Selected Papers of The 6th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, Academy Publisher, pp. 634-643, [Article]

Awerbuch, Wladimir (2009):
Anwendung von Data Mining zu statistischen Auswertungen und Vorhersagen im Sport.
TU Darmstadt, [Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/diplom/2009/Awe...],
[Master Thesis]

Abraham, Rene (2009):
On­to­log­i­cal De­scrip­tion of UI In­ter­ac­tions.
TU Darmstadt, [Master Thesis]

Ali, Karim and Aib, Issam and Boutaba, Raouf (2009):
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: GIIS '09, In: Global Information Infrastructure Symposium, [Conference or Workshop Item]

Ali, Karim and Boutaba, Raouf (2009):
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: GIIS '09, In: Global Information Infrastructure Symposium, [Conference or Workshop Item]

Andriluka, Micha and Friedmann, Martin and Kohlbrecher, Stefan and Meyer, Johannes and Petersen, Karen and Reinl, Christian and Schauss, Peter and Schnitzspan, Paul and Strobel, Armin and Thomas, Dirk and Stryk, Oskar von and Stryk, Oskar von (2009):
RoboCupRescue 2009 - Robot League Team: Darmstadt Rescue Robot Team (Germany).
Graz, [Report]

Ackermann, Jens and Baecher, Paul and Franzel, Thorsten and Goesele, Michael and Hamacher, Kay (2009):
Massively-Parallel Simulation of Biochemical Systems.
In: Proceedings of Massively Parallel Computational Biology on GPUs, In: Jahrestagung der Gesellschaft für Informatik e.V., Lübeck, Germany, September 29, 2009, pp. 739-750, [Conference or Workshop Item]

Aitenbichler, Erwin and Lyardet, Fernando and Hadjakos, Aristotelis and Mühlhäuser, Max (2009):
Fine-Grained Evaluation of Local Positioning Systems for Specific Target Applications.
In: LNCS, 5585, In: Ubiquitous Intelligence and Computing (UIC-09), Springer Berlin-Heidelberg, pp. 236--250, [Conference or Workshop Item]

Adolph, Daniel (2009):
Fractional Recoding for the Shamir Method.
Technische Universität Darmstadt, [Master Thesis]

Arzt, Steven (2009):
Design and Implementation of a Cryptographic Plugin for E-mail Clients.
[Other]

Amann, Sven (2009):
Spezifikation und Codegenerierung von Sicherheitsautomaten.
[Other]

Abdulla, Parosh Aziz and Atto, Muhsin and Cederberg, Jonathan and Ji, Ran Liu, Zhiming and Ravn, Anders (eds.) (2009):
Automated Analysis of Data-Dependent Programs with Dynamic Memory.
In: LNCS, 5799, In: Proc. 7th International Symposium on Automated Technology for Verification and Analysis (ATVA), Springer, pp. 197-212, [Conference or Workshop Item]

Ahrendt, Wolfgang and Bubel, Richard and Hähnle, Reiner Gibbons, J. and Oliveira, J. N. (eds.) (2009):
Integrated and Tool-Supported Teaching of Testing, Debugging, and Verification.
In: LNCS, 5846, In: Proc. Second International Conference on Teaching Formal Methods, Springer-Verlag, In: Teaching Formal Methods, Second International Conference, TFM 2009, Eindhoven, November 2-6, 2009, pp. 125-143, DOI: 10.1007/978-3-642-04912-5_9,
[Online-Edition: https://doi.org/10.1007/978-3-642-04912-5_9],
[Conference or Workshop Item]

Ackermann, Tobias and Widjaja, Thomas and Buxmann, Peter (2009):
Increasing the Diffusion of Communication Standards - A General Simulation Framework from the Vendor?s Perspective.
[Other]

Alonso, Gustavo and Kossmann, Donald and Roscoe, Timothy and Tatbul, Nesime and Baumann, Andrew and Binnig, Carsten and Fischer, Peter and Riva, Oriana and Teubner, Jens (2009):
The ETH Zurich systems group and enterprise computing center.
37, In: ACM SIGMOD Record, (4), ACM, pp. 94-99, [Article]

Aitenbichler, Erwin and Behring, Alexander and Bradler, Dirk and Hartmann, Melanie and Martucci, Leonardo and Ries, Sebastian and Schnelle-Walka, Dirk and Schreiber, Daniel and Steimle, Jürgen and Strufe, Thorsten and Mühlhäuser, Max (2009):
Shaping the Future Internet.
In: Proceedings of the 3rd International CompanionAble Workshop IoPTS, pp. 1 - 10, [Conference or Workshop Item]

Alemu, Yihun and Koh, Jong-bin and Ikram, Muhammed and Kim, Dong-Kyoo (2009):
Image Retrieval in Multimedia Databases: A Survey.
In: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on, IEEE Computer Society, pp. 681-689, [Article]

Akram, Shahid (2009):
Coronary Tree Segmentation Using an Enhanced Corkscrew Algorithm.
Darmstadt, Technische Universität, [Bachelor Thesis]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häussge, Gina (2008):
Smart Products: Integration Challenges.
In: Proceedings of Smart Products: Building Blocks of Ambient Intelligence (AmI-Blocks'08), [Conference or Workshop Item]

Abele, Eberhard and Bauer, Jörg and Rothenbücher, Stefan and Stelzer, Maximilian and Stryk, Oskar von and Stryk, Oskar von (2008):
Prediction of the Tool Displacement by Coupled Models of the Compliant Industrial Robot and the Milling Process.
In: Proceedings of the International Conference on Process Machine Interactions, Hannover, Germany, 3-4 September, pp. 223-230, [Conference or Workshop Item]

Amelunxen, Carsten and Legros, Elodie and Schürr, Andy (2008):
Generic and Reflective Graph Transformations for the Checking and Enforcement of Modeling Guidelines.
In: IEEE Symposium on Visual Languages & Human-Centric Computing, In: VLHCC '08: Proceedings of the Visual Languages and Human-Centric Computing, pp. 211-218, [Conference or Workshop Item]

Armknecht, Frederik and Furukawa, Jun and Kurosawa, Kaoru (2008):
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
In: Sixth Conference on Security and Cryptography for Networks (SCN 2008), [Conference or Workshop Item]

Aitenbichler, Erwin and Rößling, Guido (2008):
Webreg: An Online System for Registration and Grade Distribution.
In: Proceedings of the ACM Innovation and Technology in Computer Science Education Conference (ITiCSE'08), Madrid, Spain, ACM Press, New York, NY, p. 336, [Conference or Workshop Item]

Armknecht, Frederik and Mirzadeh, Shahab and Tafazolli, Rahim and Pallares, Jordi Jaen and Afifi, Hossam (2008):
CPFP: An efficient key management scheme for large scale personal networks.
In: IEEE ISWPC 2008, [Conference or Workshop Item]

Armknecht, Frederik and Westhoff, Dirk and Girao, Joao and Hessler, Alban (2008):
A life-time optimized end-to-end encryption scheme for sensor networks allowing in-networking processing.
31, In: Computer Communications Journal, (4), pp. 734-749, [Article]

Amelunxen, Carsten and Klar, Felix and Königs, Alexander and Rötschke, Tobias and Schürr, Andy (2008):
Metamodel-based tool integration with MOFLON.
In: Proceedings of the thirtieth International Conference on Software Engineering . - New York, NY : ACM , 2008, S. 807-810 ISBN 978-1-605-58079-1, New York, NY, ACM, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2008):
Delay-Aware Mobile Transactions.
In: SEUS '08: Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems, Berlin, Heidelberg, Springer-Verlag, pp. 280-291, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj and Bleim, Eugen (2008):
Implementation and Evaluation of Delay-Aware and Fault-Tolerant Mobile Transactions.
In: Proceedings of the The 2nd International Conference on E-Medical Systems, [Conference or Workshop Item]

Aly, Sherif G. and Nadi, Sarah and Hamdan, Karim (2008):
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
8, In: International Journal of Computer Science and Network Security, (6), pp. 329-336, [Article]

Andriluka, Mykhaylo and Roth, Stefan and Schiele, Bernt (2008):
People-Tracking-by-Detection and People-Detection-by-Tracking.
IEEE, New York, In: IEEE Conference on Computer Vision and Pattern Recognition, p. 8, [Conference or Workshop Item]

Abele, E. and Bauer, J. and Bertsch, C. and Laurischkat, R. and Meier, H. and Reese, S. and Stelzer, M. and Stryk, Oskar von and Stryk, Oskar von (2008):
Comparison of Implementations of a Flexible Joint Multibody Dynamic System Model for an Industrial Robot.
In: 6th CIRP International Conference on Intelligent Computation in Manufacturing Engineering, 23-25 July, Naples, Italy, [Conference or Workshop Item]

Adamer, Kurt and Bannach, David and Klug, Tobias and Lukowicz, Paul and Sbodio, Marco Luca and Tresman, Mimi and Zinnen, Andreas and Ziegert, Thomas (2008):
Developing a Wearable Assistant for Hospital Ward Rounds.
In: Proceedings of Internet of Things 2008, Springer Verlag, Heidelberg etc., Germany, pp. 289-307, ISBN 978-3-540-78730-3,
[Conference or Workshop Item]

Armknecht, Frederik and Escalante, Alberto and Löhr, Hans and Manulis, Mark and Sadeghi, Ahmad-Reza (2008):
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
In: Lecture Notes in Computer Science, 4991, In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Springer, pp. 29--44, [Conference or Workshop Item]

Araújo, Roberto and Ryan, Peter Y. A. (2008):
Improving Farnel, Threeballot and Randell-Ryan Voting Schemes.
[Other]

Aitenbichler, Erwin Mühlhäuser, Max and Gurevych, Iryna (eds.) (2008):
Ubiquitous Computing Technology for Real Time Enterprises.
Idea Group Publishing, pp. 257--281, [Book Section]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, pp. 39--40, [Conference or Workshop Item]

Aitenbichler, Erwin Mühlhäuser, Max and Gurevych, Iryna (eds.) (2008):
Ubiquitous Computing Technology for Real Time Enterprises.
Idea Group Publishing, p. 152, [Book Section]

Austaller, Gerhard Mühlhäuser, Max and Gurevych, Iryna (eds.) (2008):
Ubiquitous Computing Technology for Real Time Enterprises.
IGI Publishing, pp. 107-127, [Book Section]

Aitenbichler, Erwin Gurevych, Iryna and Mühlhäuser, Max (eds.) (2008):
A Focus on Location Context.
IGI, pp. 257-281, [Conference or Workshop Item]

Aitenbichler, Erwin and Ries, Sebastian and Schröder-Bernhardi, Julian and Turban, Georg and Borgert, Stephan and Bradler, Dirk and Hartle, Michael and Häußge, Gina (2008):
Smart Products: Integration Challenges.
In: AmI-Blocks'08: Second European Workshop on Smart Products: Building Blocks of Ambient Intelligence, pp. 39-40, [Conference or Workshop Item]

Amelunxen, Carsten and Klar, Felix and Königs, Alexander and Rötschke, Tobias and Schürr, Andy (2008):
Metamodel-based Tool Integration with MOFLON.
New York, ACM Press, In: 30th International Conference on Software Engineering, pp. 807-810, [Conference or Workshop Item]

Aitenbichler, Erwin (2008):
Event-Based and Publish/Subscribe Communication.
In: Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, pp. 152-171, [Online-Edition: https://www.igi-global.com/chapter/event-based-publish-subsc...],
[Article]

Abele, E. and Bauer, J. and Stelzer, M. and Stryk, Oskar von and Stryk, Oskar von (2008):
Wechselwirkungen von Fräsprozess und Maschinenstruktur am Beispiel des Industrieroboters.
98, In: wt Werkstattstechnik online, (9), pp. 733-737, ISSN 1436-4980, [Article]

Adamson, Anders (2007):
Computing Curves and Surfaces from Points.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-8931],
[Ph.D. Thesis]

Asokan, N. and Gasmi, Yacine and Sadeghi, Ahmad-Reza and Stewin, Patrick and Unger, Martin (2007):
Beyond Secure Channels.
ACM Press, In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007), pp. 30-40, [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2007):
MundoCore: A Light-weight Infrastructure for Pervasive Computing.
3, In: Pervasive and Mobile Computing, (4), pp. 332-361, [Article]

Aitenbichler, Erwin and Lyardet, Fernando and Mühlhäuser, Max (2007):
Designing and Implementing Smart Spaces.
VIII, In: Cepis Upgrade, (4), pp. 31--37, [Article]

Aitenbichler, Erwin and Heinemann, Andreas (2007):
Proximity-based authentication for Windows domains.
In: Lecture notes in computer science, In: UbiComp 2007: ubiquitous computing : 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16 - 19, 2007; proceedings, Berlin [u.a.], Springer, pp. 475-480, [Book Section]

Aitenbichler, Erwin and Lyardet, Fernando and Austaller, Gerhard and Kangasharju, Jussi and Mühlhäuser, Max (2007):
Engineering intuitive and self-explanatory smart products.
In: 22 Annual ACM Symposium on Applied Computing : Proceedings. - S. 1632-1637, [Conference or Workshop Item]

Aitenbichler, Erwin and Lyardet, Fernando and Mühlhäuser, Max (2007):
Diseno e implementacion de espacios inteligentes.
33, In: Upgrade [Elektronische Ressource], (188), pp. 29-34, [Article]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2007):
MundoCore : a light-weight infrastructure for pervasive computing.
In: Pervasive and mobile computing, pp. 332-361, [Article]

Aitenbichler, Erwin and Mühlhäuser, Max (2007):
Softwareentwicklung für Mundo Smart Environments.
In: KIVS 2007 : Kommunikation in verteilten Systemen : 15. ITG-GI-Fachtagung vom 26. Februar bis 2. März 2007 in Bern, Schweiz ; Industriebeiträge, Kurzbeiträge und Workshops / T. Braun ... (Hrsg.).- S. 323-336, Berlin [u.a.], VDE-Verl., [Book Section]

Anikeev, Maxim and Madlener, Felix and Schlosser, Andreas and Huss, Sorin A. and Walther, Christoph (2007):
Automated Verification for an Efficient Elliptic-Curve Algorithm - A Case Study.
In: Information Security: Proceedings of the IX. International Conference, January 2007, [Conference or Workshop Item]

Aderhold, Markus (2007):
Improvements in Formula Generalization.
In: Automated deduction - CADE-21 : 21st International Conference on Automated Deduction, Bremen, Germany, July 17 - 20, 2007 ; proceedings / Frank Pfenning (ed.). - Berlin [u.a.] : Springer, 2007, S. 231-246 (Lecture notes in computer science ; 4603 : Lectur, Berlin [u.a.], Springer, [Conference or Workshop Item]

Adamson, Anders (2007):
Computing curves and surfaces from points.
Darmstadt, Technische Universität, TU Darmstadt, [Ph.D. Thesis]

Amelunxen, Carsten and Schürr, Andy (2007):
Formalizing model transformation rules for UML/MOF 2.
2, In: Software, IET, pp. 204-222, [Article]

Aqqal, A. and Rensing, C. and Steinmetz, Ralf (2007):
The Macro Design as an Own Task in WBT Production.
In: EC-tel 2007 <Graz,2007> ; Second European Conference on Technology Enhanced Learning ; 420-425 ; ISBN: 9783540751946, pp. 420-425, [Conference or Workshop Item]

Amelunxen, Carsten and Legros, Elodie and Schürr, Andy and Stürmer, I. and Nagl, M. and Zündorf, A. (2007):
Checking and enforcement of modeling guideline with graph transofrmations.
In: Applications of graph transformations with industrial relevance : third international symposium, AGTIVE 2007 ; proceedings of selected and invited papers ; Kassel, Germany, October 10 - 12, 2007 / Andy Schürr ... (eds.). - Kassel, 2007, In: Proceedings of the Third International Symposium on Applications of Graph Transformations with Industrial Relevance, pp. 313-328, [Conference or Workshop Item]

Amelunxen, Carsten and Königs, Alexander and Rötschke, Tobias and Schürr, Andy (2007):
Metamodeling with MOFLON.
In: Applications of graph transformations with industrial relevance : third international symposium, AGTIVE 2007 ; proceedings of selected and invited papers ; Kassel, Germany, October 10 - 12, 2007 / Andy Schürr ... (eds.) : AGTIVE <3, 2007, Kassel> Kassel,, [Conference or Workshop Item]

Aqqal, A. and Rensing, C. and Steinmetz, Ralf (2007):
Using Taxonomies to Support the Macro Design Process for the Production of Web Based Trainings.
In: 7th International Conference on Knowledge Management <Graz,2007> ; 7th International Conference on Knowledge Management ; 420-425, pp. 420-425, [Conference or Workshop Item]

Arnold, Thomas (2007):
Ein evolutionärer Algorithmus zur Erstellung eines künstlichen Gegenspielers für "Chinesische Mauer".
TU Darmstadt, [Online-Edition: http://www.ke.informatik.tu-darmstadt.de/lehre/arbeiten/bach...],
[Master Thesis]

Adamson, Anders (2007):
Computing Curves and Surfaces from Points.
Darmstadt, TU, Diss., 2007, [Ph.D. Thesis]

Adams, Bart and Adamson, Anders (2007):
Ray Tracing of Point Models.
In: The Morgan Kaufmann Series in Computer Graphics, Elsevier, Morgan Kaufmann, San Francisco, pp. 294-312, [Book Section]

Adelsbach, Andre and Huber, Ulrich and Sadeghi, Ahmad-Reza (2007):
Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages.
In: LNCS, 4499, Springer Verlag, In: Transactions on Data Hiding and Multimedia Security II, pp. 1-34, [Conference or Workshop Item]

Andriluka, Mykhaylo and Weizsäcker, Lorenz and Hofmann, Thomas (2007):
Multi-class Classification with Dependent Gaussian Processes.
In: 12th International Conference on Applied Stochastic Models and Data Analysis (ASMDA 2007), [Conference or Workshop Item]

Abbé, Thomas (2007):
Implementierung eines qualifiziert signierenden Timestamping-Servers.
Darmstadt, Technische Universität, [Bachelor Thesis]

Alaoui, Sidi Mohamed El Yousfi (2007):
Konstruktion von Hashfunktionen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Araújo, Roberto and Foulle, Sébastian and Traoré, Jacques (2007):
A practical and secure coercion-resistant scheme for remote elections.
[Other]

Alkassar, Ammar and Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Schmitt, Peter Bonsangue, Marcello and Johnsen, Einar Broch (eds.) (2007):
KeY: A Formal Method for Object-Oriented Systems.
In: LNCS, 4468, In: Proc. 9th IFIP Intl. Conf. on Formal Methods for Open Object-based Distributed Systems (FMOODS), Springer-Verlag, In: Formal Methods for Open Object-Based Distributed Systems, 9th IFIP WG 6.1 International Conference, FMOODS 2007, Paphos, Cyprus, June 6-8, 2007, Proceedings, pp. 32-43, DOI: 10.1007/978-3-540-72952-5_2,
[Online-Edition: https://doi.org/10.1007/978-3-540-72952-5_2],
[Conference or Workshop Item]

Amelunxen, Carsten and Schürr, Andy and Weisemöller, Ingo (2007):
Missing Meta-Modeling-In-The-Large Concepts in EMOF.
In: eclipse summit 2007, Contribution to the discussion about EMF, ?, [Conference or Workshop Item]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Rümmer, Philipp and Schmitt, Peter de Boer, Frank and Bonsangue, Marcello and Graf, Susanne and de Roever, Willem (eds.) (2007):
Verifying Object-Oriented Programs with KeY: a Tutorial.
In: LNCS, 4709, In: Post Conf. Proc. 5th International Symposium on Formal Methods for Components and Objects (FMCO), Springer-Verlag, pp. 70--101, ISBN 978-3-540-74791-8,
DOI: 10.1007/978-3-540-74792-5_4,
[Conference or Workshop Item]

Anjorin, Anthony (2007):
Aufbau und Validierung eines elastischen Manipulatormodells.
TU Darmstadt, FB Informatik, Simulation, Systemoptimierung und Robotik, [Bachelor Thesis]

Araújo, Roberto and Wiesmaier, Alexander and Buchmann, Johannes (2006):
The T-Vote Protocol.
(TI-3/06), [Report]

Aguilera, Gaby and Teller, Patricia J. and Taufer, Michaela and Wolf, Felix (2006):
A Systematic Multi-step Methodology for Performance Analysis of Communication Traces of Distributed Applications based on Hierarchical Clustering.
IEEE Computer Society, In: Proc. of the 5th International Workshop on Performance Modeling, Evaluation, and Organization of Parallel and Distributed Systems (PMEO-PDS, in conjunction with IPDPS 2006), Rhodes Island, Greece, [Conference or Workshop Item]

Austaller, Gerhard and Aitenbichler, Erwin and Kangasharju, Jussi (2006):
Interaction with a Smart Espresso Machine.
In: IEEE Conference on Pervasive Computing and Communications (PerCom'06) Demo Track, [Conference or Workshop Item]

Aitenbichler, Erwin (2006):
System support for ubiquitous computing.
Aachen, Shaker, TU Darmstadt, ISBN 3-8322-5365-3,
[Ph.D. Thesis]

Austaller, Gerhard and Kangasharju, Jussi and Kangasharju, Jussi (2006):
Applications for smart environments.
20064, Darmstadt, Techn. Univ., Fachbereich Informatik, [Report]

Aitenbichler, Erwin (2006):
Development tools for Mundo Smart environments.
In: Workshop on Software Engineering Challenges for Ubiquitous Computing. Gerd Kortuem (Ed.). S. 89-90, Lancaster University, 2006., [Conference or Workshop Item]

Austaller, Gerhard and Hartl, A. and Lauff, M. and Lyardet, F. and Mühlhäuser, Max (2006):
Technology-aware web application design.
In: Web engineering : the discipline of systematic development of Web applications / ed. by Gerti Kappel .... - Chichester : Wiley, 2006, S. 85-110 ISBN: 0-470-01554-3, Chichester, Wiley, [Book Section]

Aderhold, Markus and Walther, Christoph and Szallies, Daniel and Schlosser, Andreas (2006):
A Fast Disprover for VeriFun.
In: Proceedings Workshop on Non-Theorems, Non-Validity, Non-Provability (DISPROVING-06) Eds.: Wolfgang Ahrendt ; Peter Baumgartner ; Hans de Nivelle, S. 59-69,. - Seattle, WA, 2006. Federated Logic Conference, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2006):
FT-PPTC : An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments.
In: IEEE Symposium on Reliable Distributed Systems <Leeds, UK,2006> ; Proceedings 25th IEEE Symposium on Reliable Distributed Systems ; 96-105 ; ISBN 0-7695-2677-2, pp. 96-105, [Conference or Workshop Item]

Aracic, Ivica and Gasiunas, Vaidas and Mezini, Mira and Ostermann, Klaus (2006):
Overview of CaesarJ.
In: Transactions on aspect oriented software development . - Berlin : Springer T. !, S. 135-173 .- 2006 (Lecture notes in computer science ; 3880) ISBN: 978-3-540-32972-5 3-540-32972-2, Berlin, Springer T. !, [Conference or Workshop Item]

Amelunxen, Carsten and Königs, Alexander and Rötschke, Tobias and Schürr, Andy and Rensink, A. and Warmer, J. (2006):
MOFLON : a standard-compliant metamodeling framework with graph transformations.
In: Lecture Notes in Computer Science (LNCS), In: Model driven architecture - foundations and applications : second European conference, ECMDA-FA 2006, Bilbao, Spain, July 10 - 13, 2006 ; proceedings / Arend Rensink ... (eds.). - Berlin [u.a.] : Springer, 2006, S. 361-375 (Lecture notes in computer scien, Berlin [u.a.], Springer, In: Model Driven Architecture - Foundations and Applications: Second European Conference, pp. 361-375, [Conference or Workshop Item]

Amelunxen, Carsten and Königs, Alexander and Rötschke, Tobias and Schürr, Andy and Grundy, J. and Howse, J. IEEE Computer Society Press (Corporate Creator) (2006):
M0SL : Composing a Visual Language for a Metamodeling Framework.
In: Proceedings / IEEE Symposium on Visual Languages and Human-Centric Computing : VL/HCC 2006 ; 4-8 September, Brighton, United Kingdom/ ed. by John Grundy; John Howse. - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2006 ISBN: 0-7695-2586-5,, Los Alamitos, Calif. [u.a.], IEEE Computer Society, In: IEEE Symposium on Visual Languages and Human-Centric Computing (VLHCC 2006), pp. 81-84, [Conference or Workshop Item]

Amelunxen, Carsten and Schürr, Andy (2006):
On OCL as part of the metamodeling framework MOFLON.
In: OCL for (meta-)models in multiple application domains / Technische Universität Dresden, Fakultät Informatik. Birgit Demuth ... (ed.). - Dresden : TU, Fak. Informatik, 2006, S. 182-193 (Technical reports / Technische Universität Dresden, Fakultät Infor, Dresden, TU, [Conference or Workshop Item]

Amelunxen, Carsten and Schürr, Andy (2006):
Vervollständigung des Constraint-basierten Assoziationskonzeptes von UML 2.0.
In: Modellierung 2006 : 22. - 24. März 2006 in Innsbruck, Austria / Heinrich C. Mayr; Ruth Breu (Hrsg.). - Bonn : Gesellschaft für Informatik, 2006, S. 163-172 (GI-Edition : Proceedings ; 82) ISBN: 3-88579-176-5, 24. März 2006 in Innsbruck, Austria / Heinrich C. Mayr; Ruth Breu (Hrsg.). - Bonn, Gesellschaft für Informatik, [Conference or Workshop Item]

Amelunxen, Carsten and Rötchke, T. and Zündorf, A. and Varro, D. (2006):
Creating Well-Structured Specifications in MOFLON.
In: Electronic Communications of EASST, 1, In: Proceedings of the Third International Workshop on Graph Based Tools (GraBaTs 2006), 9 2006; Electronic Communications of EASST, Vol. 1., In: Third International Workshop on Graph Based Tools (GraBaTs 2006), 2006, [Conference or Workshop Item]

Alt, O. and Schmidt, M. and Ritter, T. and Eichler, H. (2006):
Derivation of System Integration Tests from Design Models in UML.
In: Proceedings of the ECMDA Workshop on Integration of Model Driven Development and Model Driven Testing : [July 11th, 2006,Bilbao, Spain] / Fraunhofer-Institut für Offene Kommunikationssysteme, FOKUS. Hajo Eichler; Tom Ritter (editors). - Stuttgart : IRB V, Stuttgart, IRB Verl., In: ECMDA workshop on Integration of Model Driven Development and Model Driven Testing IMDT, Bilbao, Spain, [Conference or Workshop Item]

Antollini, Mario and Cilia, Mariano and Buchmann, Alejandro (2006):
Implementing a High Level Pub/Sub Layer for Enterprise Information Systems.
In: International Conference on Enterprise Information Systems (ICEIS'06), Paphos, Cyprus, 2006, [Conference or Workshop Item]

Ayari, Brahim and Khelil, Abdelmajid and Suri, Neeraj (2006):
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments.
In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006, pp. 96-105, [Conference or Workshop Item]

Assenmacher, Ingo and Hentschel, Bernd and Ni, C. and Kuhlen, Torsten and Bischof, Christian (2006):
Interactive data annotation in virtual environments.
In: Eurographics/ACM SIGGRAPH symposium proceedings, Aire-la-Ville, Switzerland, Eurographics Association, In: Virtual environments 2006 : 12th Eurographics Symposium on Virtual Enviroments, 8 - 10 May, Gulbenkian Foundation Congress Centre, Braga, Portugal / sponsored by EUROGRAPHICS Association in cooperation with ACM SIGGGRAPH. Symposium Chair: Joaquim Jorge ;, pp. 119-126, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc (2006):
Anisotropic Point Set Surfaces.
25, In: Computer Graphics Forum, (4), pp. 717-724, [Article]

Adamson, Anders and Alexa, Marc (2006):
Anisotropic Point Set Surfaces.
ACM, New York, In: Proceedings AFRIGRAPH 2006, pp. 7-13, [Conference or Workshop Item]

Aarts, Emile and Encarnação, José L. (2006):
Into Ambient Intelligence.
Springer, Berlin, Heidelberg, New York, pp. 1-16, [Book Section]

Appel, Stefan (2006):
Lokalisierung von Knoten in mobilen Ad-hoc-Netzen ohne zusätzliche Infrastruktur.
TU Darmstadt, [Bachelor Thesis]

Adamson, Anders and Alexa, Marc (2006):
Point-Sampled Cell Complexes.
25, In: ACM Transactions on Graphics, (3), pp. 671-680, [Article]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Rümmer, Philipp and Schmitt, Peter H. de Boer, Frank S. and Bonsangue, Marcello M. and Graf, Susanne and de Roever, Willem P. (eds.) (2006):
Verifying Object-Oriented Programs with KeY: A Tutorial.
In: Lecture Notes in Computer Science, 4709, Springer, In: Formal Methods for Components and Objects, 5th International Symposium, FMCO 2006, Amsterdam, The Netherlands, November 7-10, 2006, Revised Lectures, pp. 70-101, DOI: 10.1007/978-3-540-74792-5₄,
[Online-Edition: https://doi.org/10.1007/978-3-540-74792-5_4],
[Conference or Workshop Item]

Adelsbach, Andre and Rohe, Markus and Sadeghi, Ahmad-Reza (2006):
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
In: Transactions on Data Hiding and Multimedia Security, [Conference or Workshop Item]

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2006):
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop, [Conference or Workshop Item]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Scheibel, Michael and Stüble, Christian and Winandy, Marcel (2006):
Security Architecture for Device Encryption and VPN.
In: Information Security Solution Europe (ISSE06), [Conference or Workshop Item]

Abbing, Jana and Koidl, Kevin (2006):
Template Approach for Adaptive Learning Strategies.
In: Workshop Proceedings of the Adaptive Hypermedia 2006 (AH 2006), Dublin, Ireland, Dublin, Ireland, [Conference or Workshop Item]

Araújo, Roberto and Custódio, Ricardo Felipe and Wiesmaier, Alexander and Takagi, Tsuyoshi (2006):
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
In: Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), Springer, pp. 78-91, [Conference or Workshop Item]

Adler, Steven and Brown, Nigel and Gilbert, Art and Palmer, Charles and Schnyder, Michael and Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Alkassar, Ammar and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian (2005):
Towards Secure Computing Platforms with Open-Source and Trusted Computing.
In: 9. German IT security Congress, Federal Office for Information Security (Deutscher IT-Sicherheitskongress des BSI), [Conference or Workshop Item]

Atkinson, Colin and Kühne, Thomas (2005):
A generalized notion of platforms for model-driven development.
In: Model-Driven Software Development / edited by Sami Beydeda, Matthias Book, Volker Gruhn. - Berlin, Heidelberg : Springer, 2005. - Bd. 2, S. 119-136, Berlin, Heidelberg, Springer, [Book Section]

Atkinson, Colin and Kühne, Thomas (2005):
Multi-level platform descriptions.
In: Workshop on metamodeling and corresponding tools <1, 2005, Essen>. - 2005, [Conference or Workshop Item]

Austaller, Gerhard and Roth, Eric (2005):
Globale Referenzen basierend auf SOAP.
In: Kommunikation in Verteilten Systemen (KiVS) : Kurzbeiträge und Workshop der 14. GI/ITG-Fachtagung, 28. Februar - 3. März 2005 in Kaiserslautern / Paul Müller ... (Hrsg.)- Bonn : Ges. für Informatik, 2005.- 229 S.- (GI-Edition : Proceedings ; 61).- ISB, [Conference or Workshop Item]

Antifakos, S. and Kern, Nicky and Schiele, Bernt and Schwaninger, A. (2005):
Towards improving trust in context-aware systems by displaying system confidence.
In: 7th International Conference on Human Computer Interaction with Mobile Devices and Services, 19 to 22 September 2005, University of Salzburg, Austria : Proceedings ...- S. 9-14, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Regression analysis of ozone data.
In: International Conference on Information Technology : Coding and Computing : proceedings; ITCC 2005; April 4 - 6, 2005, Las Vegas, Nevada / Ed. by Henry Selvaraj .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2005, Vol. 1, 1, S. 174-178 ISBN:, Los Alamitos, Calif. [u.a.], IEEE Computer Society, [Conference or Workshop Item]

Atkinson, Colin and Kühne, Thomas (2005):
Concepts for comparing modeling tool architectures.
In: Model driven engineering languages and systems : 8th international conference, MoDELS 2005, Montego Bay, Jamaica, October 2 - 7, 2005 ; proceedings / Lionel Briand ... (eds.). - Berlin [u.a.] : Springer, 2005 (Lecture notes in computer science ; 3713) ISB, Berlin [u.a.], Springer, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Optimal statistical model for forecasting ozone.
In: International Conference on Information Technology : Coding and Computing : proceedings; ITCC 2005; April 4 - 6, 2005, Las Vegas, Nevada / Ed. by Henry Selvaraj .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Society, 2005, Vol. 1, 1, S. 169-173 ISBN:, Los Alamitos, Calif. [u.a.], IEEE Computer Society, [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2005):
Experiences with MundoCore.
In: Proceedings, Third IEEE International Conference on Pervasive Computing and Communications workshops, PerCom 2005 workshops : 8 - 12 March 2005, Kauai Island, Hawaii / sponsored by the IEEE Computer Society; the Department of Computer Science, the Univers, Los Alamitos, Calif. [u.a.], IEEE Computer Society, [Conference or Workshop Item]

Amelunxen, Carsten and Rötschke, Tobias and Schürr, Andy (2005):
Graph Transformations with MOF 2.0.
In: H. Giese, A. Zündorf (eds.), Proc. 3rd International Fujaba Days 2005, 9 2005, Vol. tr-ri-05-259, Universität Paderborn, 25-31, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Regression Analysis of Ozone Data.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE International Conference on Information Technology: Coding and Computing 2005. Proceedings Vol. I, pp. 174-178, [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2005):
Optimal Statistical Model for Forecasting Ozone.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE International Conference on Information Technology: Coding and Computing 2005. Proceedings Vol. I, pp. 169-173, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc and Nealen, Andrew (2005):
Adaptive Sampling of Intersectable Models Exploiting Image and Object-space Coherence.
ACM Press, New York, In: Proceedings of the 2005 ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games (I3D), pp. 171-178, [Conference or Workshop Item]

Alaoui, Omar (2005):
Interoperabilität und Standards von mobilen Agenten.
TU Darmstadt, [Master Thesis]

Alexa, Marc (2005):
Non-conforming Surface Representations.
Eurographics Association, Aire-la-Ville, In: SGP 2005. Proceedings, pp. 83-84, [Conference or Workshop Item]

Aldinger, T. and Kopf, S. and Scheele, N. and Effelsberg, W. (2005):
Participatory Simulation of a Stock Exchange.
In: World Conference on Educational Multimedia, Hypermedia and Telecommunications (EdMedia), Montr&#039;eal, Canada, 2005, pp. 1 - 8, [Conference or Workshop Item]

Adelsbach, A. and Alkassar, A. and Garbe, K.-H. and Luzaic, M. and Manulis, M. and Scherer, E. and Schwenk, J. and Siemens, E. (2005):
Voice over IP - Sichere Umstellung der Sprachkommunikation auf IP-Technologie.
BSI - Bundesamt für Sicherheit in der Informationstechnik, [Book]

Antollini, Jose (2005):
Implementing an Active Functionality Service on Different Platforms.
UNICEN, [Master Thesis]

Antollini, Mario (2005):
A High Level Pub/Sub Layer for Open Distributed Heterogeneous Environments.
UNICEN, [Master Thesis]

Anton, Tobias Bauer, Mathias and Brandherm, Boris and Fürnkranz, Johannes and Grieser, Gunter and Hotho, Andreas and Jedlitschka, Andreas and Kröner, Alexander (eds.) (2005):
XPath-Wrapper Induction by generating tree traversal patterns.
In: Lernen, Wissensentdeckung und Adaptivit&auml;t (LWA-05), pp. 126-133, [Conference or Workshop Item]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Bubel, Richard and Giese, Martin and Hähnle, Reiner and Menzel, Wolfram and Mostowski, Wojciech and Roth, Andreas and Schlager, Steffen and Schmitt, Peter (2005):
The KeY tool: integrating object oriented design and formal verification.
4, In: Software and System Modeling, (1), p. 32, DOI: 0.1007/s10270-004-0058-x,
[Online-Edition: http://www.springerlink.com/index/10.1007/s10270-004-0058-x],
[Article]

Alkassar, Ammar and Krimmer, Robert and Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
8, In: Datenschutz und Datensicherheit, pp. 480-482, [Article]

Antollini, Jose and Antollini, Mario and Guerrero, Pablo and Cilia, Mariano (2004):
Extending REBECA to Support Concept-Based Addressing.
In: In Proceedings of the Argentinean Symposium on Information Systems (ASIS&#039;04), Cordoba, Argentina, [Conference or Workshop Item]

Arnold, Michael (2004):
Digital audio watermarking.
Berlin, Logos-Verl., TU Darmstadt, ISBN 3-8325-0582-2,
[Ph.D. Thesis]

Alexa, Marc and Adamson, Anders (2004):
On normals and projection operators for surfaces defined by point sets.
In: Proceedings of Eurographics Symposium on point-based graphics. Eds. : Marc Alexa .... .- 2004. S. 149-156, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc (2004):
Approximating bounded, non-orientable surfaces from points,.
In: Proceedings / Shape Modeling International 2004 : [proceedings of the International Conference on Shape Modeling and Applications] ; SMI 2004 ; 7 - 9 June 2004, Genova, Italy / ed. by Franca Giannini .... - Los Alamitos, Calif. [u.a.] : IEEE Computer Soc., Los Alamitos, Calif. [u.a.], IEEE Computer Soc., [Conference or Workshop Item]

Abdollahian, M. and Foroughi, Roya (2004):
Optimal Statistical Model for Forecasting Air Quality Data.
In: Proceedings of the International Conference on Mathematics and Engineering Techniques in Medicine and Biological Sciences, METMBS '04 : Las Vegas, Nevada, USA, June 21 - 24, 2004 / ed.: Faramarz Valafar .... - [S.l.] : CSREA Press, 2004, S.436-442 .- ISBN, [S.l.], CSREA Press, [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2004):
Talking assistant headset : a smart digital identity for ubiquitous computing.
In: Advances in pervasive computing : a collection of contributions presented an PERVASIVE 2004 ; [18. - 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien : Österreichische Computer Gesellsch., 2004, S. 279-284 (books-at-ocg.at ; 176) ISBN 3, 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien, Österreichische Computer Gesellsch., [Book Section]

Aitenbichler, Erwin (2004):
System support for ubiquitous computing (submission to the doctoral colloquium at Pervasive 2004).
In: Advances in pervasive computing : a collection of contributions presented an PERVASIVE 2004 ; [18. - 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien : Österreichische Computer Gesellsch., 2004, S.1-6 (books-at-ocg.at ; 176) ISBN 3-8540, 23. April 2004 in Linz und Wien] / Alois Ferscha ... (ed.). - Wien, Österreichische Computer Gesellsch., [Book Section]

Austaller, Gerhard and Lauff, Markus and Lyardet, Fernando and Mühlhäuser, Max (2004):
Technologiebewusstes Design von Web-Anwendungen.
In: Web Engineering : systematische Entwicklung von Web-Anwendungen / Gerti Kappel ... (Hrsg.). - 1. Aufl.. - Heidelberg : dpunkt-Verl., 2004. - XVI, 416 S. ISBN: 3-89864-234-8 , S. 101-123, 1. Aufl.. - Heidelberg, dpunkt-Verl., [Book Section]

Austaller, Gerhard and Kangasharju, Jussi and Mühlhäuser, Max (2004):
Using web services to build context-aware applications in ubiquitous computing.
In: Web engineering : 4th international conference, ICWE 2004, Munich, Germany, July 26 - 30, 2004 ; proceedings / Nora Koch ... (eds.). - Berlin [u.a.] : Springer, 2004 (Lecture notes in computer science ; 3140), S. 483-487 ISBN: 3-540-22511-0, Berlin [u.a.], Springer, [Conference or Workshop Item]

Austaller, Gerhard (2004):
Web Services als Bausteine für kontextabhängige Anwendungen.
In: 1. GI/ITG KuVS Fachgespräch Ortsbezogene Anwendungen und Dienste : am 24.und 25.06.2004, Fernuniversität Hagen / Jörg Roth (Ed.). - Hagen : FernUniversität, Fachbereich Informatik, 2004 , S. 23-26 (Informatik-Berichte ; 317), FernUniversität, [Article]

an Mey, Dieter and Bischof, Christian (2004):
Die Zukunft ist parallel - Perspektiven des Hochleistungsrechnens.
Aachen, Rechen-und Kommunikationszentrum der RWTH Aachen, [Online-Edition: http://www.rz.rwth-aachen.de/global/showdocument.asp?id=bjoi...],
[Report]

Abdollahain, M. and Foroughi, Roya (2004):
Optimal Statistical Model for Forecasting Air Quality Data.
CSREA Press, Las Vegas, In: METMBS '04, pp. 436-442, [Conference or Workshop Item]

Alexa, Marc and Adamson, Anders (2004):
On Normals and Projection Operators for Surfaces Defined by Point Sets.
Eurographics, Aire-la-Ville, In: Symposium on Point Based Graphics, pp. 150-155, [Conference or Workshop Item]

Arnold, Michael (2004):
Digital Audio Watermarking.
Logos Verlag, Berlin, Darmstadt, TU, Diss., 2004, ISBN 3-8325-0582-2,
[Ph.D. Thesis]

Adamson, Anders and Alexa, Marc (2004):
Approximating Bounded, Non-orientable Surfaces from Points.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2004. Proceedings, pp. 243-250, [Conference or Workshop Item]

Altmeyer, Oliver and Sadeghi, Ahmad-Reza and Selhorst, Marcel and Stüble, Christian Paulus, Sachar and Pohlmann, Norbert and Reimer, Helmut (eds.) (2004):
Enhancing Security of Computing Platforms with TC-Technology.
In: Information Security Solutions Europe (ISSE 2004), Vieweg Verlag, pp. 346-361, [Book Section]

Amelunxen, Carsten and Schürr, Andy and Bichler, Lutz Rumpe, Bernhard and Hesse, Wolfgang (eds.) (2004):
Codegenerierung für Assoziationen in MOF 2.0.
In: LNI, 45, GI, In: Modellierung 2004, Proceedings zur Tagung, 23.-26. M\"rz 2004, Marburg, Proceedings, pp. 149-168, [Online-Edition: http://subs.emis.de/LNI/Proceedings/Proceedings45/article127...],
[Conference or Workshop Item]

Arnold, Axel and Flentge, Felix (2004):
Team Description Mainz Rolling Brains 2004 - 2D.
[Other]

Arnold, Axel and Flentge, Felix and Schneider, Christoph (2004):
Team Description Mainz Rolling Brains 2004 - 3D.
[Other]

Antifakos, Stavros and Schwaninger, Adrian and Schiele, Bernt (2004):
Evaluating the Effects of Displaying Uncertainty in Context-Aware Applications.
In: 6th International Conference on Ubiquitous Computing (ubicomp 2004), pp. 54-69, [Conference or Workshop Item]

Antifakos, Stavros and Michahelles, Florian and Schiele, Bernt (2004):
Towards Situation-Aware Affordances: An Experimental Study.
In: 2nd International Conference on Pervasive Computing (pervasive 2004), [Conference or Workshop Item]

Atluri, Vijayalakshmi and Backes, Michael and Basin, David and Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE, ACM, [Conference or Workshop Item]

Aitenbichler, Erwin and Kangasharju, Jussi and Mühlhäuser, Max (2004):
Talking Assistant: A Smart Digital Identity for Ubiquitous Computing.
In: Advances in Pervasive Computing, Austrian Computer Society (OCG), pp. 279-284, ISBN 3-85403-176-9,
[Conference or Workshop Item]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: LNCS, 2851, In: ISC 2003 - Information Security, 6th International Conference, Springer, Bristol, UK, pp. 218-233, ISBN 3-540-20176-9,
[Conference or Workshop Item]

Alkassar, Ammar and Stüble, Christian (2003):
A Security Framework for Integrated Networks.
In: MILCOM 2003 IEEE Military Communications Conference, Boston, USA, [Conference or Workshop Item]

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2003):
Watermark Detection with Zero-Knowledge Disclosure.
9, In: ACM Multimedia Systems Journal, (3), pp. 266-278, [Article]

Ackermann, Ralf (2003):
Gateways and Components for Supplementary IP Telephony Services in Heterogeneous Environments.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-3591],
[Ph.D. Thesis]

Alves dos Santos, Luiz Manoel (2003):
Asymmetric and Adaptive Conference Systems for Enabling Computer-Supported Mobile Activities.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-3345],
[Ph.D. Thesis]

Aitenbichler, Erwin and Kangasharju, Jussi (2003):
Communication abstractions in MundoCore.
In: ECOOP <2003, Darmstadt> / Communications Abstractions for Distributed Systems Workshop: Proceedings, [Conference or Workshop Item]

Askerdal, Örjan and Gäfvert, Magnus and Hiller, Martin and Suri, Neeraj (2003):
Analyzing the impacts of data errors in safety-critical control systems.
Vol. 8, In: IEICE transactions / E, English transactions / D, information & systems, p. 2623, [Article]

Ackermann, Ralf (2003):
Gateways and components for supplementary IP telephony services in heterogeneous environments.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Alves dos Santos, Luiz Manoel (2003):
Asymmetric and adaptive conference systems for enabling computer supported mobile activities.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Aschenbrenner, Peter and Schürr, Andy (2003):
Generating interactive animations from visual specifications.
In: IEEE Symposium on Visual Languages and Formal Methods <2003, Auckland>: Proceedings ... October 2003, [Conference or Workshop Item]

Alexa, Marc and Behr, Johannes and Cohen-Or, Daniel and Fleishman, Shachar and Levin, David and Silva, Claudio T. (2003):
Computing and rendering point set surfaces.
9, In: IEEE transactions on visualization and computer graphics, pp. 3-15, [Article]

Alfert, K. and Doberkat, E.-E. and Engels, G. and Lohmann, M. and Magenheim, J. and Schürr, Andy (2003):
MuSoft - Multimedia in der Software-Technik.
In: Software Engineering im Unterricht der Hochschulen / SEUH 8 - Berlin 2003. Hrsg. Johannes Siedersleben ...- Heidelberg : dPunkt-Verl., 2003.- VIII, 120 S.- ISBN 3-89864-201-1.- S. 70-80, dPunkt-Verl., [Article]

Alexa, Marc (2003):
Differential coordinates for local mesh morphing and deformation.
19, In: The visual computer, pp. 105-114, [Article]

Aitenbichler, Erwin (2003):
Ortungssysteme für mobile Endgeräte.
In: Innovative Informatikanwendungen : Informatik 2003, Beiträge der 33. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 29. Sept. - 2. Okt. 2003 in Frankfurt am Main; proceedings / Klaus Dittrich ... (Hrsg.)-Teil 1.- Bonn : Ges. für Informatik, 20, 2. Okt. 2003 in Frankfurt am Main; proceedings / Klaus Dittrich ... (Hrsg.)-Teil 1.- Bonn, Ges. für Informatik, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2003):
An IR local positioning system for smart items and devices.
In: International Conference on Distributed Computing Systems workshops <23, 2003, Providence, RI>: Proceedings, 19 - 22 May 2003, Providence, Rhode Island, USA ; [3rd International Workshop on Smart Appliances and Wearable Computing / sponsored by the IEEE C, Los Alamitos, Calif. [u.a.], IEEE Computer Society, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2003):
Audiobasierte Endgeräte für Ubiquitous Computing und geeignete Infrastrukturen.
In: Ubiquitous Computing / Heinz Sauerburger (Hrsg.)- Heidelberg : dpunkt-Verl., 2003.-127 S.- (HMD : Praxis der Wirtschaftsinformatik ; 229).- ISBN: 3-89864-200-3.- S. 68-80, [Article]

Adamson, Anders and Alexa, Marc (2003):
Approximation and intersecting surfaces from points.
2003-0, Darmstadt, Techn. Univ., Fachbereich Informatik, Fachgebiet Graphisch-Interaktive Systeme, [Book]

Arnold, Michael and Daum, Henning and Busch, Christoph (2003):
Comparative study on fingerprint recognition systems - project BioFinger.
In: BIOSIG 2003 : proceedings of the first International Conference on Biometrics and Electronic Signatures of the GI Working Group BIOSIG / ed. Arslan Brömme, Christoph Busch.- Bonn: Ges. für Informatik, 2003.- 138 S.- (GI edition : lecture notes in inform, Bonn, Ges. für Informatik, [Conference or Workshop Item]

Arnold, Michael and Busch, Christoph and Schmucker, Martin (2003):
Szenario-basierte Testverfahren zur Zertifizierung von Wasserzeichen.
In: Mit Sicherheit Informatik : Informatik 2003 : [Teiltagung] Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit" [der GI-Jahrestagung Informatik 2003], 29. September - 2. Oktober 2003 in Frankfurt am Main / Rüdiger Grimm ... (Hrsg.)- Bonn : Ges. für In, [Conference or Workshop Item]

Alexa, Marc and Klug, Tobias and Stoll, Carsten (2003):
Direction Fields over Point-Sampled Geometry.
University of West Bohemia, Plzen, In: Journal of WSCG Volume 11 No. 1. Proceedings, pp. 27-32, [Conference or Workshop Item]

Alexa, Marc (2003):
Differential Coordinates for Local Mesh Morphing and Deformation.
In: The Visual Computer, (19), pp. 105-114, [Article]

Alexa, Marc and Behr, Johannes and Cohen-Or, Daniel and Fleishman, Shachar and Levin, David and Silva, Claudio T. (2003):
Computing and Rendering Point Set Surfaces.
9, In: IEEE Transactions on Visualization and Computer Graphics, (1), pp. 3-15, [Article]

Alves dos Santos, Luiz M. (2003):
Asymmetric and Adaptive Conference Systems for Enabling Computer-Supported Mobile Activities.
In: Berichte aus der Informatik, Shaker, Aachen, Zugl.: Darmstadt, TU, Diss., 2003, ISBN 3-8322-2101-8,
[Ph.D. Thesis]

Adamson, Anders and Alexa, Marc (2003):
Approximating and Intersecting Surfaces from Points.
Association for Computing Machinery, New York, In: Symposium on Geometry Processing. Proceedings, pp. 230-239, [Conference or Workshop Item]

Adamson, Anders and Alexa, Marc (2003):
Ray Tracing Point Set Surfaces.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2003. Proceedings, pp. 272-279, [Conference or Workshop Item]

Alexa, Marc and Klug, Tobias and Stoll, Carsten (2003):
Direction Fields over Point-Sampled Geometry.
In: 11, In: WSCG, pp. 27-32, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2003):
Audiobasierte Endgeräte für Ubiquitous Computing und geeignete Infrastrukturen.
In: dpunkt Heidelberg, pp. 68--80, [Article]

Antifakos, Stavros and Borchers, Jan and Schiele, Bernt (2003):
Designing Physical Interaction with Sensor Drawbacks in Mind.
In: 5th International Symposium on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2003), [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2003):
Grouping Mechanisms for Smart Objects Based on Implicit Interaction and Context Proximity.
In: International Conference on Ubiquitous Computing (UBICOMP 2003), [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2003):
LaughingLily: Using a Flower as a Real World Information Display.
In: International Conference on Ubiquitous Computing (UBICOMP 2003), [Conference or Workshop Item]

Antifakos, Stavros and Borchers, Jan and Schiele, Bernt (2003):
The Role of Perception in Ubiquitous Interactive Systems.
In: At the Crossroads: The Interaction of HCI and System Issues in Ubicomp. Workshop at UBICOMP’03, [Conference or Workshop Item]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
(TI-1/03), [Report]

Ahsen, Anette von and Buxmann, Peter and Díaz, Luis Martín (2003):
Economic Evaluation of Cooperation in Supply Chains - Models and Results from an Empirical Study, Working Paper, Freiberg.
[Other]

Amelunxen, C. and Königs, Alexander and Rötschke, Tobias and Schürr, Andy Giese, H. and Zündorf, A. (eds.) (2003):
Adapting FUJABA for Building a Meta Modelling Framework.
tr-ri-04-247, In: Proc. 1st International Fujaba Days, pp. 29-34, [Conference or Workshop Item]

Alfert, Klaus and Doberkat, Ernst-Erich and Engels, Gregor and Lohmann, Marc and Magenheim, Johannes and Schürr, Andy Siedersleben, Johannes and Weber-Wulff, Debora (eds.) (2003):
MuSoft: Multimedia in der Softwaretechnik.
In: Proc. SEUH 8 Software Engineerung im Unterricht der Hochschulen Berlin, dpunkt, In: Software Engineering im Unterricht der Hochschulen, SEUH 8, Berlin 2003, Berlin, pp. 70-80, [Conference or Workshop Item]

Aitenbichler, Erwin and Mühlhäuser, Max (2002):
The Talking Assistant Headset: A Novel Terminal for Ubiquitous Computing.
(TK-02/02), [Report]

Alexa, Marc (2002):
Shape Spaces from Morphing.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-2134],
[Ph.D. Thesis]

Adelsbach, Andre and Stüble, Christian and Creese, Sadie and Pfitzmann, Birgit and Ryan, Peter Y. A. and Simmonds, William and Steinbrechner, Sandra and Steiner, Michael and Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Alexa, Marc (2002):
Recent advances in mesh morphing.
21, In: Computer graphics forum, pp. 173-196, [Article]

Alexa, Marc and Taponecco, Francesca (2002):
Scan converting spirals.
Vol. 1, In: Journal of WSCG, pp. 115-120, [Article]

Alexa, Marc (2002):
Wiener filtering of meshes.
In: International Conference on Shape Modeling <4, 2002, Banff, Alberta>: Shape modeling 2002, proceedings / ed. by Geoff Wyvill.- Los Alamitos, Calif.: IEEE Computer Soc. Pr., 2002.- ISBN 0-7695-1546-0.- S. 51-57, Los Alamitos, Calif., IEEE Computer Soc. Pr., [Conference or Workshop Item]

Alexa, Marc (2002):
Refinement operators for triangle meshes.
19, In: Computer aided geometric design, pp. 169-172, [Article]

Alexa, Marc (2002):
Shape spaces from morphing.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Alexa, Marc (2002):
Linear combinations of transformations.
21, In: ACM transactions on graphics, pp. 380-387, [Article]

Aitenbichler, Erwin and Mühlhäuser, Max (2002):
The talking assistant headset : a novel terminal for ubiquitous computing.
TK02/0, Darmstadt, Dept. of Computer Science, Telecooperation Group, [Book]

Alexa, Marc (2002):
Wiener Filtering of Meshes.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2002. Proceedings, pp. 51-57, [Conference or Workshop Item]

Amicis, Raffaele de and Santos, Pedro and Stork, André and Fiorentino, Michele (2002):
SketchAR - Sketching in Mixed Realities.
In: HNI-Verlagsschriftenreihe; 107, Heinz Nixdorf Institut, Paderborn, In: Augmented und Virtual Reality in der Produktentstehung, pp. 145-156, [Conference or Workshop Item]

Alexa, Marc (2002):
Shape Spaces from Morphing.
Darmstadt, TU, Diss., 2002, [Ph.D. Thesis]

Alexa, Marc and Taponecco, Francesca (2002):
Scan Converting Spirals.
University of West Bohemia, Plzen, In: WSCG 2002. Short Communication Papers, pp. 115-120, [Conference or Workshop Item]

Alexa, Marc (2002):
Refinement operators for triangle meshes.
19, In: Computer Aided Geometric Design, (3), pp. 169-172, [Article]

Alexa, Marc (2002):
Recent Advances in Mesh Morphing.
21, In: Computer Graphics Forum, (2), pp. 173-196, [Article]

Alexa, Marc (2002):
Linear Combinations of Transformations.
21, In: ACM Transactions on Graphics, (3), pp. 380-387, [Article]

Adamson, Anders (2002):
Ray Tracing von Punktmengenflächen.
TU Darmstadt, [Master Thesis]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Mostowski, Wojciech and Schmitt, Peter H. Kutsche, Ralf-Detlef and Weber, Herbert (eds.) (2002):
The KeY System: Integrating Object-Oriented Design and Formal Methods.
In: Lecture Notes in Computer Science, 2306, Springer, In: Fundamental Approaches to Software Engineering, 5th International Conference, FASE 2002, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2002, Grenoble, France, April 8-12, 2002, Proceedings, pp. 327-330, DOI: 10.1007/3-540-45923-5₂₃,
[Online-Edition: https://doi.org/10.1007/3-540-45923-5_23],
[Conference or Workshop Item]

Alkassar, Ammar and Stüble, Christian (2002):
Towards Secure IFF: Preventing Mafia Fraud Attacks.
In: MILCOM 2002, IEEE Military Communication Conference, [Conference or Workshop Item]

Anderl, Reiner and Reichenbach, Christoph and Hessling, Christian and Weimer, Markus (2002):
Embedded Systems - Vom virtuellen zum realen Produkt.
In: thema Forschung 1/2002: Eingebettete Systeme: Entwurf und Anwendungen versteckter Computer, TU Darmstadt, pp. 50-58, [Article]

Arnold, Axel and Flentge, Felix and Schneider, Christoph and Schwandtner, Götz and Uthmann, Thomas and Wache, Martin Birk, A. and Coradeschi, S. and Tadokoro, S. (eds.) (2002):
Team Description Mainz Rolling Brains 2001.
In: RoboCup-2001. Robot Soccer World Cup V, Springer, pp. 531 -- 534, [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2002):
Bridging the Gap between Virtual and Physical Games Using Wearable Sensors.
In: 3rd International Conference on Computer Vision Systems (ICVS 2002), pp. 139--140, [Conference or Workshop Item]

Antifakos, Stavros and Michahelles, Florian and Schiele, Bernt (2002):
Proactive Instructions for Furniture Assembly.
In: 4th international conference on Ubiquitous Computing (UbiComp 2002), Springer-Verlag, Göteborg, Sweden, pp. 351--360, ISBN 3-540-44267-7,
[Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2002):
Beyond Position Awareness.
6, In: Personal and Ubiquitous Computing, (5/6), pp. 313--317, [Article]

Altheide, F. and Dörr, H. and Schürr, Andy Stoewer, H. and Garnier, L. (eds.) (2002):
Requirements to a Framework for sustainable Integration of System Development Tools.
AFIS PC Chairs, In: Proc. of the 3rd European Systems Engineering Conference (EuSEC'02), Toulouse, 2002, pp. 53-57, [Conference or Workshop Item]

Alexa, Marc and Behr, J. and Cohen-Or, D. and Fleishman, S. and Levin, D. and Silva, C. T. (2001):
Point set surfaces.
In: Visualization 2001: Vision, modeling and visualization <6, 2001, Stuttgart>: Proceedings. Hrsg.: T. Ertl [u.a.], [Conference or Workshop Item]

Ackermann, Ralf and Görtz, M. and Karsten, M. and Steinmetz, Ralf (2001):
Prototyping a PDA based communication appliance.
In: Softcom <2001, Split>: Proceedings. S. 739-746, [Conference or Workshop Item]

Ackermann, Ralf and Darlagiannis, V. and Görtz, M. and Karsten, M. and Steinmetz, Ralf (2001):
An open source H.323-SIP gateway as basis for supplementary service interworking.
In: IP Telephony Workshop <2, 2001, New York>: Proceedings. S. 169-175, [Conference or Workshop Item]

Ackermann, Ralf and Schumacher, M. and Roedig, U. and Steinmetz, Ralf (2001):
Vulnerabilities and security limitations of current IP telephony systems.
In: CMS 2001: Working Conference on Communications and Multimedia Security <5, 2001, Darmstadt>: Proceedings. S. 53-66. Hrsg.: R. Steinmetz. - Boston [u.a.]: Kluwer, 2001, Boston [u.a.], Kluwer, [Conference or Workshop Item]

Aschemann, Gerd and Hasselmeyer, P. (2001):
A loosely coupled federation of distributed management services.
9, In: Journal of network and systems management, pp. S. 51-65, [Article]

Alexa, Marc (2001):
Local control for mesh morphing.
In: Internatioal Conference on Shape Modelling and Applications <3, 2001,Genova>: Proceedings. S. 209-215. - Los Alamitos: IEEE Computer Soc. Press, 2001, Los Alamitos, IEEE Computer Soc. Press, [Conference or Workshop Item]

Alexa, Marc (2001):
Mesh morphing: STAR - state of the art report.
In: European Association for Computer Graphics: Eurographics 2001: Annual Conference <22, 2001, Manchester>: State of the Art Reports. S. 1-20. - Oxford: Blackwell, 2001, Oxford, Blackwell, [Conference or Workshop Item]

Alexa, Marc and Hellenschmidt, M. and Rieger, T. and Berner, U. (2001):
An animation system for user interface agents.
In: WSCG 2001: International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision <9, 2001, Plzen>: Conference Proceedings. Hrsg.: V. Skala [u.a.]. - Plzen: Univ. of West Bohemia, 2001.- S. 154-160, Plzen, Univ. of West Bohemia, [Conference or Workshop Item]

Alexa, Marc (2001):
Shape spaces from mesh morphing.
In: Graphiktag 2001: Workshop über Trends und Höhepunte der Graphischen Datenverarbeitung <2001, Tübingen>; Tagungsbd. S. 44-55. Hrsg.: D. Saupe, Ges. für Informatik, Fachausschuß 4.1 [u.a.], [Conference or Workshop Item]

Alexa, Marc (2001):
Shape Spaces from Mesh Morphing.
In: Graphiktag 2001. Proceedings, pp. 44-55, [Conference or Workshop Item]

Alexa, Marc and Behr, Johannes and Cohen-Or, Daniel and Fleishman, Shachar and Levin, David and Silva, Claudio T. (2001):
Point Set Surfaces.
IEEE Computer Society Press, Los Alamitos, Calif., In: IEEE Visualization 2001. Proceedings, pp. 21-28, [Conference or Workshop Item]

Alexa, Marc (2001):
Mesh Morphing : STAR - State of the Art Report.
In: Eurographics 2001. State of the Art Reports, pp. 1-20, [Conference or Workshop Item]

Alexa, Marc (2001):
Local Control for Mesh Morphing.
IEEE Computer Society Press, Los Alamitos, In: International Conference on Shape Modeling and Applications 2001. Proceedings, pp. 209-215, [Conference or Workshop Item]

Alexa, Marc and Müller, Wolfgang and Spierling, Ulrike and Rieger, Thomas (2001):
Face-to-Face with Your Assistant. Realization Issues of Animated User Interface Agents for Home Appliances.
Neuer Hochschulschriftenverlag, Rostock, In: IMC 2000. Intelligent Interactive Assistance & Mobile Multimedia Computing. Proceedings, pp. 77-84, [Conference or Workshop Item]

Arnold, Michael (2001):
Entwicklung eines Framework zur objektiven Bewertung von Audio Watermarking Verfahren.
[Book]

Alexa, Marc and Hellenschmidt, Michael and Rieger, Thomas and Berner, Uwe (2001):
An Animation System for User Interface Agents.
University of West Bohemia, Plzen, In: WSCG 2001. Conference Proceedings Vol. 1, pp. 154-160, [Conference or Workshop Item]

Abawi, Daniel F. and Reinhold, Silvan (2001):
XML-basierte 3D-Komponenten.
TU Darmstadt, [Master Thesis]

Adelsbach, Andre and Sadeghi, Ahmad-Reza (2001):
Zero-Knowledge Watermark Detection and Proof of Ownership.
In: LNCS, 2137, Springer-Verlag, In: Information Hiding: Fourth International Workshop, pp. 273-288, [Conference or Workshop Item]

Antifakos, Stavros and Schiele, Bernt (2001):
Beyond position Awareness.
In: Workshop on Location Modeling for Ubiquitous Computing at Ubicomp 2001, [Conference or Workshop Item]

Albert, Michael (2001):
Konzeption und Implementierung eines Remote Access {VPNs} für Außendienstarbeiter unter Einsatz einer Public-Key-Infrastruktur.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Adler, Steven and Bangerter, Endre and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Karjoth, Günter and Kesdogan, Dogan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Presler-Marshall, Martin and Schnyder, Michael and Herreweghen, Els Van and Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Adler, Steven and Bangerter, Endre and Bohrer, Kathy and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Kesdogan, Dogan and Leonard, Matthew and Liu, Xuan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Powers, Calvin and Schnyder, Michael and Schonberg, Edith and Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Adelsbach, Andre and Pfitzmann, Birgit and Sadeghi, Ahmad-Reza (2000):
Proving ownership of digital content.
In: LNCS, 1768, Springer-Verlag, In: 3rd International Workshop on Information Hiding, IH 1999, pp. 126-141, [Conference or Workshop Item]

Alireza, Ameneh and Lang, Ulrich and Padelis, Marios and Schreiner, Rudolf and Schumacher, Markus (2000):
The Challenges of CORBA Security.
In: Sicherheit in Netzen und Medienströmen: Tagungsbd. des GI Workshops 'Sicherheit in Mediendaten'. Hrsg.: M. Schumacher, R. Steinmetz. - Berlin, Heidelberg (u.a.): Springer, 2000, Berlin, Heidelberg (u.a.), Springer, In: Proceedings of the Workshop "Sicherheit in Mediendaten", Gesellschaft für Informatik (GI), pp. 61-72, [Conference or Workshop Item]

Alexa, Marc (2000):
Merging polyhedral shapes with scattered features.
16, In: The visual computer, pp. S. 26-37, [Article]

Ackermann, Ralf and Darlagiannis, V. and Steinmetz, Ralf (2000):
Using DMIF for abstracting from IP-telephony signaling protocols.
In: IDMS 2000: Internatinal Workshop on Interactive Distributes Multimedia Systems and Telecommunication Services <7, 2000, Enschede>: Proceedings. Hrsg.: H. Scholten. - Berlin (u.a.): Springer, 2000 = Lecture notes in computer science; 1905. S. 104-115, Berlin (u.a.), Springer, [Conference or Workshop Item]

Ackermann, Ralf and Roedig, U. and Zink, M. and Griwodz, C. and Steinmetz, Ralf (2000):
Associating network flows with user and application information.
In: ACM Multimedia Workshop Security <2000, Los Angeles>: Proceedings. S. 149-152, [Conference or Workshop Item]

Ackermann, Ralf and Roedig, U. and Steinmetz, Ralf (2000):
Entwicklung und Nutzung von IP-Telefonie Anwendungen auf Unix-Systemen.
In: GUUG-Nachrichten, pp. S. 37-41, [Article]

Ackermann, Ralf and Rensing, C. and Noll-Hussong, S. and Wolf, L. and Steinmetz, Ralf (2000):
SSS4it - secure session setup für Internet-Telefonie.
In: Systemsicherheit 2000 <2000, Bremen>: Tagungsbd. S. 140-150, [Conference or Workshop Item]

Andrew, Mark and Hasselmeyer, P. (2000):
Using CORBA and JAVA for PBX management.
In: NOMS 2000: IEEE/IFIP Network Operations and Management Symposium <2000, Honolulu, Hawaii>; Proceedings. Hrsg.: J.W..Hong (u.a.) - Piscataway, NJ: IEEE Service Center, 2000. S. 353-365, [Conference or Workshop Item]

Alexa, Marc and Behr, J. and Müller, W. (2000):
The morph node.
In: ACM SIGCOMM: Symposium on the Virtual Reality Modeling Language <5, 2000, Monterey, Calif.>: Proceedings. Hrsg.: S.N. Spencer. - New York: ACM Press, 2000. S. 29-34, New York, ACM Press, [Conference or Workshop Item]

Alexa, Marc and Müller, W. (2000):
Representing animations by principal components.
In: Eurographics 2000 <21, 2000, Interlaken>: Proceedings. Hrsg.: D.A.Duce, C. Vandoni = Computer graphics forum. Vol. 19 (2000), No. 3. - Amsterdam: NCC Blackwell, North-Holland. S. C-411 - C-418, Amsterdam, NCC Blackwell, [Conference or Workshop Item]

Alexa, Marc (2000):
As-rigid-as possible shape interpolation.
In: SIGGRAPH: International Conference on Computer Graphics and Interactive Techniques <27, 2000, New Orleans, Louisiana>: Proceedings. Hrsg.: K. Akeley. - Reading, MA: Addison-Wesley, 2000. S. 157-164 = Computer Graphics Annual Conference Series, Reading, MA, Addison-Wesley, [Conference or Workshop Item]

Alexa, Marc and Müller, W. and Spierling, U. and Rieger, T. (2000):
Face-to-face with your assistant: realization issues of animated user interface agents for home appliances.
In: ICM 2000: Intelligent Interactive Assistance & Mobile Multimedia Computing <2000, Rostock>. - Rostock: Fraunhofer-Institut für Graphische Datenverarbeitung u. Univ. Rostock. - Darmstadt: Techn. Univ., FB Informatik, FG Graphisch-Interaktive Systeme u. Ge, Rostock, Fraunhofer-Institut für Graphische Datenverarbeitung u. Univ. Rostock. - Darmstadt: Techn. Univ., [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (2000):
Termination of term rewriting using dependency pairs.
236, In: Theoretical computer science, pp. 133-178, [Article]

Austaller, Gerhard and Hartl, Andreas and Kappel, G. and Lechleitner, C. and Mühlhäuser, Max and Reich, S. and Rudisch, R. (2000):
Gulliver beans: a tool for fine tuning data delivery in E-Commerce applications.
In: EMISA'00: Informationssysteme für E-Commerce <2000, Linz>; Proceedings. S. 29-40, [Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Langenstein, Bruno and Mantel, Heiko and Rock, Georg and Schairer, Axel and Stephan, Werner and Vogt, Roland and Wolpers, Andreas (2000):
VSE: Formal Methods Meet Industrial Needs.
3, In: International Journal on Software Tools for Technology Transfer, (1), Springer, pp. 66-77, ISSN 1433-2779, [Online-Edition: https://link.springer.com/article/10.1007/s100099900022],
[Article]

Arnold, Michael (2000):
Simultanes Einbetten mehrerer Wasserzeichen in Audiodaten.
[Book]

Alexa, Marc and Müller, Wolfgang (2000):
Representing Animations by Principal Components.
19, In: Computer Graphics Forum, (3), pp. C-411-C-418, [Article]

Alexa, Marc and Behr, Johannes and Müller, Wolfgang (2000):
The Morph Node.
ACM Press, New York, In: Web3D - VRML 2000. Proceedings, pp. 29-34, [Conference or Workshop Item]

Alexa, Marc (2000):
Merging polyhedral shapes with scattered features.
16, In: The Visual Computer, (1), pp. 26-37, [Article]

Alexa, Marc (2000):
As-Rigid-As-Possible Shape Interpolation.
In: Computer Graphics Annual Conference Series, Addison-Wesley, Reading, MA, USA, In: Siggraph 2000. Conference Proceedings, pp. 157-164, [Conference or Workshop Item]

Anderl, Reiner and Rix, Joachim (2000):
Analyse von Alternativen für eine integrierte Produktentwicklungsumgebung.
[Book]

Adelsbach, Andre (2000):
Anonymous fingerprinting with direct non-repudiation.
In: LNCS, 1976, In: Advances in Cryptology - ASIACRYPT‘2000, Springer-Verlag, Kyoto, Japan, pp. 401-414, [Conference or Workshop Item]

Austaller, Gerhard and Hartl, Andreas and Kappel, Gerti and Kapsammer, Elisabeth and Lechleitner, Christoph and Mühlhäuser, Max and Reich, Siegfried and Rudisch, Rimbert Jasper, Heinrich and Küng, Josef and Vossen, Gottfried (eds.) (2000):
Gulliver Beans: A Tool for Fine Tuning Data Delivery in E-Commerce Applications.
In: Proceedings of EMISA 2000 - Informationssystem f&uuml;r E-Commerce, pp. 29-40, ISBN 3 85487 1945,
[Conference or Workshop Item]

Aitenbichler, Erwin (2000):
Entwurf und Implementierung eines programmierten Graphersetzungssystems in Java.
Johannes Kepler Universität Linz, Institut für Technische Informatik und Telematik, [Master Thesis]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Schmitt, Peter (2000):
The KeY Approach: Integrating Object Oriented Design and Formal Verification.
(2000/4), [Report]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Schmitt, Peter (2000):
The KeY Approach: Integrating Object Oriented Design and Formal Verification.
In: In Proc. Java Card Workshop, Cannes, France, {INRIA} technical report, [Conference or Workshop Item]

Ahrendt, Wolfgang and Baar, Thomas and Beckert, Bernhard and Giese, Martin and Habermalz, Elmar and Hähnle, Reiner and Menzel, Wolfram and Schmitt, Peter Ojeda-Aciego, Manuel and de Guzmán, Inma P. and Brewka, Gerhard and Pereira, Luís Moniz (eds.) (2000):
The KeY Approach: Integrating Object Oriented Design and Formal Verification.
In: LNCS, 1919, In: Proc. 8th European Workshop on Logics in AI (JELIA), Springer-Verlag, pp. 21--36, [Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel (1999):
System Description: INKA 5.0 -- A Logic Voyager.
In: LNAI 1632, In: 16th International Conference on Automated Deduction, CADE--16, Trento, Italy, Springer, pp. pp.~207-211, [Conference or Workshop Item]

Ackermann, Ralf and Pommitz, J. and Wolf, L. C. and Steinmetz, Ralf (1999):
MBone2Tel - telephone users meeting the MBone.
In: IDMS'99: International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services <6, 1999, Toulouse>: Proceedings. S. 121-132, [Conference or Workshop Item]

Alexa, Marc (1999):
Merging polyhedral shapes with scattered features.
In: International Conference on Shape Modeling and Applications <2, 1999, Aizu-Wakamatsu, Japan>: Proceedings. S. 202-210. - Los Alamitos: IEEE Computer Soc. Press, 1999, Los Alamitos, IEEE Computer Soc. Press, [Conference or Workshop Item]

Ackermann, Ralf and Pommitz, J. and Wolf, L. C. and Steinmetz, Ralf (1999):
Eine virtuelle PBX.
In: GI Multicast-Workshop <1, 1999, Braunschweig>: Tagungsbd. S. 187-197, [Conference or Workshop Item]

Aschemann, Gerd and Mohr, T. and Ruppert, M. (1999):
Integration of SNMP into a CORBA- and Web-based management environment.
In: Kommunikation in Verteilten Systemen (KiVS): 11. ITG/GI-Fachtagung 1999 Darmstadt. Hrsg.: R. Steinmetz. S. 210-221. - Berlin (u.a.): Springer, 1999, Berlin (u.a.), Springer, [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (1999):
Applying rewriting techniques to the verification of Erlang processes.
In: CSL'99: Annual Conference of the European Association for Computer Science Logic <1999, Madrid>; Proceedings. S. 96-110. - Berlin (u.a.): Springer, 1999 (Lecture notes in computer science; 1683), Berlin (u.a.), Springer, [Conference or Workshop Item]

Ackermann, Ralf and Pommitz, J. and Wolf, L. C. and Steinmetz, Ralf (1999):
MBone2Tel - ein Gateway für die Teilnahme von Nutzern konventioneller Telefonendgeräte an MBone-Konferenzen.
In: ITG/TKTG-Fachtagung Multimedia: Anwendungen, Technologie, Systeme; 8. Dortmunder Fersehseminar; Tagungsbd. - Dortmund 1999. S. 237-240, [Conference or Workshop Item]

Alexa, Marc and Müller, W. (1999):
The morphing space.
In: International Conference on Central Europe on Computer Graphics and Visualization <7, 1999, Plzen>: Conference Proceedings. Hrsg.: V. Skala; IFIP Woking Group 5.10 on Computer Graphics and Virtual Worlds; European Ass. for Computer Graphics. Vol.2. S. 329, Plzen, Univ. of West Bohemia, [Conference or Workshop Item]

Alexa, Marc and Müller, W. (1999):
Visualization by examples: mapping data to visual representations using few correspondences.
In: Data Visualization '99: Joint Eurographics and IEEE TCVG Symposium on Visualization <1999, Vienna>; Proceedings. Hrsg.: E. Gröller, H. Löffelmann, W. Ribarsky. S. 23-32. - Berlin (u.a.): Springer, 1999, Berlin (u.a.), Springer, [Conference or Workshop Item]

Aschemann, Gerd and Kehr, Roger and Zeidler, Andreas Cap, Clemens H. (ed.) (1999):
A Jini-based gateway architecture for mobile devices.
In: JIT'99 : Java Informationstage 1999, Berlin (u.a.), Springer, pp. 203-212, DOI: 10.1007/978-3-642-60247-4_19,
[Conference or Workshop Item]

Aschemann, Gerd and Domnitcheva, Svetlana and Hasselmeyer, Peer and Kehr, Roger and Zeidler, Andreas (1999):
A framework for the integration of legacy devices into a Jini Management Federation.
In: Lecture notes in computer science, vol. 1700, In: Active Technologies for Network and Service Management. DSOM 1999, Berlin, Heidelberg (u.a.), Springer, In: DSOM 1999 : International Workshop on Distributed Systems: Operations and Management, 10, 1999, pp. 257-268, DOI: 10.1007/3-540-48100-1_20,
[Conference or Workshop Item]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel Bert, Didier and Choppy, C. and Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: Lecture Notes in Computer Science, In: Recent trends in algebraic development techniques : 14th International Workshop on Algebraic Development Techniques, WADT'99, Berlin ; Heidelberg, Springer, pp. 73-88, [Book Section]

Anderson, E. and Bai, Z. and Bischof, Christian and Blackford, S. and Demmel, J. and Dongarra, J. and Croz, J. Du and Greenbaum, A. and Hammarling, S. and McKenney, A. (1999):
LAPACK User's Guide / E. Anderson ...
In: Software, environments, tools ; 9, Philadelphia, Pa., SIAM, Society for Industrial and Applied Mathematics, [Book]

Alexa, Marc and Müller, Wolfgang (1999):
Visualization by Examples: Mapping Data to Visual Representations using Few Correspondences.
In: Springer Computer Science, Springer, Wien, In: Data Visualization '99, pp. 23-32, [Conference or Workshop Item]

Alexa, Marc and Müller, Wolfgang (1999):
The Morphing Space.
University of West Bohemia, Plzen, In: WSCG `99. Conference Proceedings Vol. 2, pp. 329-336, [Conference or Workshop Item]

Alexa, Marc (1999):
Merging Polyhedral Shapes with Scattered Features.
IEEE Computer Society Press, Los Alamitos, In: Shape Modeling International '99. Proceedings, pp. 202-210, [Conference or Workshop Item]

Austaller, Gerhard (1999):
Strategien zur Behandlung von mobilitätsbedingten Verbindungsunterbrechungen in verteilten Programmierumgebungen.
Johannes Kepler Universit&auml;t Linz, Institut f&uuml;r Technische Informatik und Telematik, [Master Thesis]

Aoki, Hisashi and Schiele, Bernt and Pentland, Alex (1999):
Realtime Personal Positioning System for Wearable Computers.
In: 3rd IEEE International Symposium on Wearable Computers (ISWC 1999), IEEE Computer Society, p. 37, ISBN 0-7695-0428-0,
[Conference or Workshop Item]

Appel, Helo and Biehl, Ingrid and Fuhrmann, Arnulf and Ruppert, Markus and Takagi, Tsuyoshi and Takura, Akira and Valentin, Christian (1999):
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
(TI-21/99), [Report]

Autexier, Serge and Hutter, Dieter and Mantel, Heiko and Schairer, Axel Bert, D. and Choppy, C. and Mosses, P. (eds.) (1999):
Towards an evolutionary formal software-development using CASL -- ABSTRACT.
In: LNCS, 1827, In: 14th International Workshop on Algebraic Development Techniques, WADT&#039;99, Springer, pp. 73--88, [Conference or Workshop Item]

Andries, Marc and Engels, Gregor and Habel, Annegret and Hoffmann, Berthold and Kreowski, Hans-Jörg and Kuske, Sabine and Plump, Detlef and Schürr, Andy and Taentzer, Gabriele (1999):
Graph Transformation for Specification and Programming.
34, In: Science of Computer Programming, (1), Elsevier Science Publ., pp. 1-54, [Article]

Autexier, Serge and Mantel, Heiko and Stephan, Werner Herzog, Otthein and Günter, Andreas (eds.) (1998):
Simultaneous Quantifier Elimination.
In: LNAI 1504, In: KI-98: Advances in Artificial Intelligence, 22nd Annual German Conference on Artificial Intelligence, Bremen, Germany, Springer, pp. 141-152, [Conference or Workshop Item]

Achour, Mostefaoui and Theel, (1998):
Shrinking timestamp sizes of event ordering protocols.
In: ICPADS'98: International Conference on Parallel and Distributed Systems <6, 1998, Tainan, Taiwan>: Proceedings. S. 193-200, IEEE 1998,
IEEE 1998, IEEE 1998, [Conference or Workshop Item]

Aschemann, Gerd and Kehr, R. (1998):
Towards a requirements-based information model for configuration management.
In: International Conference on Configurable Distributed Systems <4, 1998>: Proceedings. - Piscataway, NJ: IEEE Computer Soc. Press, 1998, Piscataway, NJ, IEEE Computer Soc. Press, [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (1998):
Modularity of termination using dependency pairs.
In: RTA'98: International Conference on Rewriting Techniques and Applications <9, 1998, Tsukuba, Japan>: Proceedings. - Berlin (u.a.): Springer, 1998. S. 226-240, 1379, Berlin (u.a.), Springer, [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
In: autexier.ea:semantical-investigation-of-simultaneous-skolemization-for-first-order-sequent-calculus:1998a, Germany, [Report]

Aoki, Hisashi and Schiele, Bernt and Pentland, Alex (1998):
Recognizing personal location from video.
In: Workshop on Perceptual User Interfaces (PUI), [Conference or Workshop Item]

Autexier, Serge and Mantel, Heiko (1998):
Semantical Investigation of Simultaneous Skolemization for First-Order Sequent Calculus.
(SEKI Report SR-98-05), [Report]

Ahrendt, Wolfgang and Beckert, Bernhard and Hähnle, Reiner and Menzel, Wolfram and Reif, Wolfgang and Schellhorn, Gerhard and Schmitt, Peter Bibel, Wolfgang and Schmitt, Peter (eds.) (1998):
Integration of Automated and Interactive Theorem Proving.
In: Automated Deduction: A Basis for Applications, Kluwer, pp. 97--116, [Book Section]

Arts, Thomas and Giesl, J. (1997):
Proving innermost normalisation automatically.
In: International Conference on Rewriting Techniques and Applications <8, 1997, Sitges, Spain>: Proceedings. - Berlin (u.a.): Springer, 1997. S. 157-171, 1232, Berlin, Heidelberg (u.a.), Springer, [Conference or Workshop Item]

Arts, Thomas and Giesl, J. (1997):
Automatically proving termination where simplification orderings fail.
In: International Joint Conference on Theory and Practice of Software Development <7, 1997, Lille, France>: Proceedings. - Berlin (u.a.): Springer, 1997. S. 261-272, 1214, Berlin, Heidelberg (u.a.), Springer, [Conference or Workshop Item]

Alexa, Marc (1997):
Der Morphing-Raum : Verallgemeinerung des Morphing-Prozesses und Entwicklung von Algorithmen zum Morphing zwischen mehreren Objekten beliebiger Dimensionalität.
TU Darmstadt, [Master Thesis]

Assmus, Kerstin (1997):
Realisierung von Teilen eines Systems fuer den Zugriff auf multimediale Datenbanken mittels wandernder Agenten im Intranet.
TU Darmstadt, [Master Thesis]

Arts, Thomas and Giesl, J. (1996):
Termination of constructor systems.
In: International Conference on Rewriting Techniques and Applications RTA'96 <7, 1996, New Brunswick, NJ>: Proceedings. - Berlin (u.a.): Springer, 1996. S. 63-77, 1103, Berlin (u.a.), Springer, [Conference or Workshop Item]

Ackermann, Hans-Josef (1996):
Hardware-Unterstützung für effiziente Dreiecksrasterisierung und Texture Mapping.
Aachen: Shaker, 1996. III, 162 S.,
Aachen, Shaker, TU Darmstadt, [Ph.D. Thesis]

Anzill, W. and Stryk, Oskar von and Stryk, Oskar von (1996):
Optimum design of microwave oscillators with minimized phase noise.
In: Progress in industrial mathematics at ECMI 94. Hrsg.: H. Neunzert. - Chichester (u.a.): Wiley , 1996. S. 301-306, Chichester (u.a.), Wiley, [Book Section]

Alexa, Marc and Gerfelder, Norbert and Grimm, P. and Seiler, Christian (1996):
AVWoD - Concept and Realization for Internet-Based Media Integration.
Institut National de Recherche en Informatique, Sophia-Antipolis, In: Real Time Multimedia and the World Wide Web. W3C Workshop, pp. 14/1-14/7, [Conference or Workshop Item]

Ackermann, Hans-Josef (1996):
Hardware-Unterstuetzung fuer effiziente Dreiecksrasterisierung und Texture Mapping.
In: Berichte aus der Informatik, Shaker, Aachen, Darmstadt, TH, Diss., 1996, ISBN 0940-0807 and 3-8265-1208-1,
[Ph.D. Thesis]

Adam, Winfried (1996):
Konzeption und Implementierung einer Kopplung zwischen Unternehmensmodellierung und EDM-Systemen.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1995):
Acoustic simulation for visualization and virtual reality.
In: Eurographics state-of-the-art <1995, Maastricht, NL>: Reports. Hrsg.: R. Veltkamp. S. 1-23, [Conference or Workshop Item]

Andelfinger, Urs (1995):
Diskursive Anforderungsanalyse und Validierung.
Darmstadt: 1995. V, 231 S.,
Darmstadt, Technische Univ. Darmstadt, TU Darmstadt, [Ph.D. Thesis]

Astheimer, Peter (1995):
Sonifikation numerischer Daten für Visualisierung und Virtuelle Realität.
Aachen: Shaker, 1995. 149 S.,
Aachen, Shaker, TU Darmstadt, [Ph.D. Thesis]

Astheimer, Peter and Dai, and Felger, and Göbel, and Haase, and Müller, and Ziegler, and Encarnacao, José L. (1995):
Virtual reality technology: enabling new dimensions in computer supported applications.
In: International Conference on Design to Manufacture in Modern Industry: DMMI '95 <1995, Maribor, Slovenia>: Proceedings. Vol. I. S. 3-25, Maribor: Univ., 1995,
Maribor, Univ, [Conference or Workshop Item]

Astheimer, Peter and Felger, (1995):
An interactive virtual world experience: the SBG cyberspace roadshow.
In: Eurographics Workshop on Virtual Environments: Realism and Realtime <2, 1995, Monte Carlo>: Selected Papers. Hrsg.: M. Göbel, Berlin, Heidelberg (u.a.): Springer, 1995,
Berlin, Heidelberg (u.a.), Springer, [Conference or Workshop Item]

Astheimer, Peter and Dai, and Felger, and Göbel, and Haase, and Müller, and Ziegler, (1995):
Virtual design II: an advanced VR system for industrial applications.
In: Virtual Reality World <1995, Stuttgart>: Proceedings. s. 337-363, [Conference or Workshop Item]

Astheimer, Peter and Göbel, (1995):
Virtual design II: an advanced VR development environment.
In: Eurographics Workshop on Virtual Environments: Realism and Realtime <2, 1995, Monte Carlo>: Selected Papers. Hrsg.: M. Göbel, Berlin, Heidelberg (u.a.): Springer, 1995,
Berlin, Heidelberg (u.a.), Springer, [Conference or Workshop Item]

Astheimer, Peter and Felger, (1995):
Mobile virtual reality installations: a review of the SBG cyberspace roadshow.
In: Topics 1995, H. 1, S. 6-9, [Article]

Astheimer, Peter and Göbel, (1995):
Virtual design II: IGD's VR development environment and applications.
In: Topics 1995, H. 4, S. 27-30, [Article]

Anzill, W. and Stryk, Oskar von and Bulirsch, R. and Russer, P. and Stryk, Oskar von (1995):
Phase noise minimization of microwave oscillators by optimal design.
In: IEEE MTT-S Symposium < 39, 1995, Orlando, Florida>: Symposium digest. Hrsg.: L. Kiry. - Piscataway, NJ: IEEE, 1995. S. 1565-1568, Piscataway, NJ, IEEE, [Conference or Workshop Item]

Auerbach, S. and Buchmann, Alejandro and Buchmann, I. and Kudrass, Thomas and Lange, K. and Lier, C. and Weidmann, K. (1995):
Database Support for PC Software Configuration and Version Management in the START Network.
In: Information and communication technologies in tourism : proceedings of the international conference, Wien, Springer, In: ENTER <1995, Innsbruck>, Innsbruck, Austria, 1995.01.18-20, pp. 212-219, [Conference or Workshop Item]

Ak, Sevguel (1995):
Entwurf und Implementierung eines Rendering-Moduls fuer ein graphisches interaktives Visualisierungssystem.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Felger, Wolfgang (1995):
An Interactive Virtual World Experience - The Cyberspace Roadshow.
In: Springer Computer Science, Springer, Berlin, Heidelberg, New York, In: Virtual Environments '95, pp. 199-210, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang (1995):
Mobile Virtual Reality Installations : A Review of the Cyberspace Roadshow.
7, In: Computer Graphik Topics, (1), pp. 6-9, [Article]

Albold, Oliver (1995):
Realisierung einer objekt-orientierten Klassenbibliothek zur Darstellung und Verwaltung von dreidimensionalen Geo-Objeken und deren Beziehungen zueinander.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1995):
Sonifikation numerischer Daten fuer Visualisierung und Virtuelle Realitaet.
In: Berichte aus der Informatik, Shaker, Darmstadt, Darmstadt, TH, Diss., 1995, ISBN 0945-0807 and 3-8265-1021-6,
[Ph.D. Thesis]

Astheimer, Peter and Dai, Fan and Felger, Wolfgang and Göbel, Martin and Haase, Helmut and Müller, Stefan and Ziegler, Rolf (1995):
VirtualDesign II - an Advanced VR System for Industrial Applications.
In: Virtual Reality World '95. Conference Documentation, pp. 337-363, [Conference or Workshop Item]

Amendola, Sandro (1995):
Effiziente Algorithmen für Probleme in Gittern über {$mathbbR^d$}.
Universit&auml;t des Saarlandes, [Master Thesis]

Astheimer, Peter (1995):
Acoustic Simulation for Visualization and Virtual Reality.
In: Eurographics '95. State Of The Art Reports, pp. 1-23, [Conference or Workshop Item]

Astheimer, Peter (1995):
Virtual Design II - an advanced VR development environment.
In: Springer Computer Science, Springer, Berlin, Heidelberg, New York, In: Virtual Environments '95, pp. 247-272, [Conference or Workshop Item]

Astheimer, Peter and Dai, Fan and Felger, Wolfgang and Göbel, Martin and Haase, Helmut and Müller, Stefan and Ziegler, Rolf and Encarnação, José L. (1995):
Virtual Reality Technology - Enabling New Dimensions in Computer-Supported Applications.
In: dmmi '95. Proceedings Part 1, pp. 3-25, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Göbel, Martin and Müller, Stefan (1994):
Das Demonstrationszentrum für Virtuelle Realität am Fraunhofer-Institut für Graphische Datenverarbeitung, Darmstadt - Konzeption, Anwendungen, Zukunftsperspektiven.
[Other]

Astheimer, Peter and Pöche, Maria-Luise (1994):
Level-of-Detail Generation and its Application in Virtual Reality.
World Scientific, Singapore, In: Virtual Reality Software & Technology, pp. 299-309, [Conference or Workshop Item]

Astheimer, Peter and Dai, Fan and Göbel, Martin and Müller, Stefan and Kruse, Rolf and Zachmann, Gabriel (1994):
Realism in Virtual Reality.
Wiley, New York, pp. 189-208, [Book Section]

Augusto, E.J.M. and Dionisio, Jose M.S. and Domingos, J.J.D. and Gomes, Mario Rui (1994):
The Sun and its Impact on Thermal Analysis in Buildings: Physical Simulation and Visualization (1994).
In: Graphics and Modelling in Science & Technology. Proceedings, [Conference or Workshop Item]

Astheimer, Peter and Göbel, Martin and Böhm, Klaus and Felger, Wolfgang and Müller, Stefan (1994):
Die Virtuelle Umgebung - Eine neue Epoche in der Mensch-Maschine-Kommunikation. Teil I: Einordnung, Begriffe, Geraete.
17, In: Informatik Spektrum, (5), pp. 281-290, [Article]

Astheimer, Peter and Göbel, Martin and Böhm, Klaus and Felger, Wolfgang and Müller, Stefan (1994):
Die Virtuelle Umgebung - Eine neue Epoche in der Mensch-Maschine-Kommunikation. Teil II: Kommunikations- und Praesentationstechniken, Systeme, Anwendungen.
17, In: Informatik Spektrum, (6), pp. 357-367, [Article]

Arens, Georg (1994):
Konzeption und Realisierung einer Transaktionsverwaltung für ein aktives objektorientiertes Datenbanksystem.
Darmstadt, Technische Hochschule, [Bachelor Thesis]

Abel, Christine (1994):
Ein Algorithmus zur Berechnung der Klassenzahl und des Regulators reellquadratischer Ordnungen.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Andelfinger, Urs (1993):
Validierung von Systementwicklungen : Forschungsgruppe MuSE, Forschungsbericht.
93-2, Darmstadt, Fachbereich Informatik, [Book]

Astheimer, Peter (1993):
Acoustic Sensations in Virtual Worlds.
5, In: Computer Graphik Topics, (1), pp. 10-11, [Article]

Astheimer, Peter (1993):
Acoustic Virtual Reality - Imitation of Real Worlds.
[Other]

Astheimer, Peter and Dai, Fan (1993):
Dynamic Objects in Virtual Worlds - Integrating Simulations in a Virtual Reality Toolkit -.
In: European Simulation Symposium 1993. Proceedings, pp. 299-304, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Thomas and Göbel, Martin and Müller, Stefan and Encarnação, José L. (1993):
Graphics and Visualization: The Essential Features for the Classification of Systems.
In: IFIP Transactions B: Applications in Technology; B-9, Jaico; North-Holland, Bombay, In: Graphics, Design and Visualisation. Proceedings, pp. 3-17, [Conference or Workshop Item]

Astheimer, Peter and Göbel, Martin (1993):
Integration akustischer Effekte und Simulationen in VR-Entwicklungsumgebungen.
In: Forschung und Praxis. IPA/IAO FhG; T 35, Springer, Berlin; Heidelberg; New York, In: Virtual Reality '93. Anwendungen und Trends, pp. 187-208, [Conference or Workshop Item]

Astheimer, Peter (1993):
Realtime Sonification to enhance the Human-Computer-Interaction in Virtual Worlds.
In: Visualization in Scientific Computing '93. Proceedings, [Conference or Workshop Item]

Astheimer, Peter (1993):
Sounds of Silence - How to animate Virtual Worlds with Sound.
[Other]

Astheimer, Peter and Felger, Wolfgang and Müller, Stefan (1993):
Virtual Design - A Generic Virtual Reality System.
In: Eurographics Technical Report Series; EG VR 93, Eurographics, Catalonia, In: First Eurographics Workshop on Virtual Reality. Proceedings, pp. 41-56, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Müller, Stefan (1993):
Virtual Design - A Generic VR System for Industrial Applications.
17, In: Computers & Graphics, (6), pp. 671-678, [Article]

Astheimer, Peter and Felger, Wolfgang (1993):
Virtuelle Realität in der Architektur.
4, In: Bau-Informatik, (2), pp. 54-58, [Article]

Astheimer, Peter (1993):
What You See is What You Hear - Acoustics Applied in Virtual Worlds.
IEEE Computer Society Press, California, In: Research Frontiers in Virtual Reality 1993. Proceedings, pp. 100-107, [Conference or Workshop Item]

Arndt, Susanne and Frühauf, Thomas and Karlsson, Kennet and Schröder, Florian (1992):
Integration of Compute Servers in an Environment for Distributed Simulation and Visualization.
In: ECUC '92. Proceedings, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Martin and Göbel, Martin and Karlsson, Kennet and Encarnação, José L. (1992):
Interactive Modeling in High-performance Scientific Visualization - the VIS-A-VIS Project.
Volume 19, In: Computers in Industry, (2), pp. 213-225, [Article]

Ala-Rantala, Martti (1992):
NeuroGlove: An Interactive Test Environment for Hand Posture and Gesture Recognition Using Dataglove and Neural Networks.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1992):
Sonification in Scientific Visualization and Virtual Reality Applications.
In: Visualisierung - Rolle von Interaktivität und Echtzeit. Preprints, pp. 1-19, [Conference or Workshop Item]

Astheimer, Peter (1992):
Sonification Tools to supplement Dataflow Visualization.
In: Visualization in Scientific Computing '92. Proceedings, pp. 39-68, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Göbel, Martin (1992):
Virtual Reality - An Application Development Platform.
4, In: Computer Graphik Topics, (2), pp. 16-17, [Article]

Astheimer, Peter (1992):
The VIS-A-VIS Audification Toolkit.
In: Computer Graphik Topics, (1), pp. 16-17, [Article]

Astheimer, Peter and Felger, Wolfgang (1991):
Application of Animation and Audio in Visualization Systems.
In: Second Eurographics Workshop on Visualization in Scientific Computing. Proceedings, p. 15, [Conference or Workshop Item]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Martin and Göbel, Martin and Karlsson, Kennet and Encarnação, José L. (1991):
Graphics Modeling as a Basic Tool for Scientific Visualization.
In: IFIP Series on Computer Graphics, Springer, Berlin, Heidelberg, In: Modeling in Computer Graphics, pp. 293-320, [Conference or Workshop Item]

Abel, Volker (1991):
Untersuchung des Einsatzes neuronaler Netze und klassischer Klassifikationsverfahren bei der Zeichenerkennung.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Felger, Wolfgang (1991):
Visualisierung von Volumenfunktionen.
In: Beiträge zur Graphischen Datenverarbeitung, Springer, Berlin; Heidelberg; New York, pp. 31-38, [Book Section]

Astheimer, Peter and Felger, Wolfgang (1991):
Working with apE.
3, In: Computer Graphik Topics, (3), p. 22, [Article]

Ahlmann, Dirk (1990):
Einsatz von Modellen des menschlichen visuellen Systems in der Werbung.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1990):
Graphik in Prozeßleitsystemen.
In: Produktion, (9), pp. 12-13, [Article]

Abou-Abed, Ali (1990):
Design und Prototypimplementierung einer Darstellungsschnittstelle für ein Netzmanagementsystem.
[Book]

Anheuser, Frederik (1989):
Ein Aufgabenmodell für eine adaptive Benutzerschnittstelle.
TU Darmstadt, [Master Thesis]

An, Gan Hoa (1989):
Definition und Repräsentation von Aktionen in Roboterarbeitszellen und deren graphisch-interaktive Verifizierung und Modifizierung.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Felger, Wolfgang and Frühauf, Martin and Göbel, Martin (1988):
Intelligent User Interfaces Control System.
In: Proceedings of the Second IFIP Workshop on Intelligent CAD, pp. 31-38, [Conference or Workshop Item]

Arnold, Richard (1988):
Untersuchung objekt-orientierter Graphikkonzepte auf der Grundlage von Smalltalk-80.
TU Darmstadt, [Master Thesis]

Astheimer, Peter and Frühauf, Martin and Göbel, Martin and Karlsson, Kennet (1988):
Visualisierung und Steuerung technischer Prozesse mit einer graphisch-interaktiven Benutzungsoberfläche.
In: Informatik-Fachberichte; 188, Springer, Berlin; Heidelberg; New York, In: GI - 18.Jahrestagung II - Vernetzte und Komplexe Informatik-Systeme, pp. 265-280, [Conference or Workshop Item]

Ackermann, Hans-Josef (1987):
Entwicklung und Aufbau eines Transputer-Systems zur Darstellung von Bildsegmenten auf Fernseh- und Graphikmonitoren.
TU Darmstadt, [Master Thesis]

Altenkirch, Erich (1987):
Spezifikation und Implementierung der Archivierung von hierarchischen Darstellungs-Datenstrukturen für PHI-GKS.
TU Darmstadt, [Master Thesis]

Astheimer, Peter (1986):
Realisierung eines allgemeinen Moduls zur Verdeckungsberechnung der graphischen Ausgabeprimitive in GKS.
TU Darmstadt, [Master Thesis]

B

Bayerl, Sebastian P. and Frassetto, Tommaso and Jauernig, Patrick and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
In: 23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
In: ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Bračevac, Oliver (2019):
Event Correlation with Algebraic Effects - Theory, Design and Implementation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9258],
[Ph.D. Thesis]

Böck, Leon and Alexopoulos, Nikolaos and Saracoglu, Emine and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2019):
Assessing the threat of blockchain-based botnets.
In: eCrime 2019 – Symposium on Electronic Crime Research, Pittsburgh, USA, Nov 13, 2019 - Nov 15, 2019, [Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Buchmann, Johannes and Geihs, Matthias and Hamacher, Kay and Katzenbeisser, Stefan and Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, SpringerOpen, p. 16, DOI: 10.1186/s13635-019-0099-x,
[Online-Edition: https://jis-eurasipjournals.springeropen.com/articles/10.118...],
[Article]

Baumgärtner, Lars and Höchst, Jonas and Lampe, Patrik and Mogk, Ragnar and Sterz, Artur and Weisenburger, Pascal and Mezini, Mira and Freisleben, Bernd (2019):
Smart Street Lights and Mobile Citizen Apps for Resilient Communication in a Digital City.
Seattle, USA, In: 2019 IEEE Global Humanitarian Technology Conference (GHTC) (GHTC 2019), Seattle, USA, [Conference or Workshop Item]

Blöcher, Marcel and Eichholz, Matthias and Weisenburger, Pascal and Eugster, Patrick and Mezini, Mira and Salvaneschi, Guido (2019):
GRASS: Generic Reactive Application-specific Scheduling.
In: REBLS 2019 : Proceedings of the 6th ACM SIGPLAN International Workshop on Reactive and Event-Based Languages and Systems, New York, NY, USA, 21.10.2019, pp. 21-30, ISBN 978-1-4503-6986-2,
DOI: 10.1145/3358503.3361274,
[Online-Edition: http://doi.acm.org/10.1145/3358503.3361274],
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, pp. 521-541, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Böhm, Florian and Gao, Yang and Meyer, Christian M. and Shapira, Ori and Dagan, Ido and Gurevych, Iryna (2019):
Better Rewards Yield Better Summaries: Learning to Summarise Without References.
In: The 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019), Hong Kong, China, 03.11.201-07.11.2019, pp. 3101-3111, [Online-Edition: https://www.aclweb.org/anthology/D19-1307.pdf],
[Conference or Workshop Item]

Bindel, Nina and Braun, Johannes and Gladiator, Luca and Stöckert, Tobias and Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
4, In: Journal of Open Source Software, (40), The Open Journal, ISSN 2475-9066, DOI: 10.21105/joss.01606,
[Article]

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Krämer, Juliane Khalid, Zine-Dine (ed.) (2019):
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
In: Proceedings of the 2019 International Conference on High Performance Computing & Simulation, Dublin, IEEE, In: HPCS 2019, Dublin, Irland, 15.7. - 19.7.2019, pp. 931-940, [Online-Edition: http://hpcs2019.cisedu.info/],
[Conference or Workshop Item]

Bock, Carsten and Brasser, Ferdinand and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, In: ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Böck, Leon and Vasilomanolakis, Emmanouil and Wolf, Jan Helge and Mühlhäuser, Max (2019):
Autonomously detecting sensors in fully distributed botnets.
83, In: Computers & Security, Elsevier, pp. 1-13, ISSN 0167-4048, DOI: 10.1016/j.cose.2019.01.004,
[Online-Edition: https://www.sciencedirect.com/science/article/pii/S016740481...],
[Article]

Burger, Michael and Bischof, Christian and Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: Proceeding of the INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2019, Springer, [Conference or Workshop Item]

Batina, Lejla and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, In: Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Online-Edition: https://dl.acm.org/citation.cfm?id=3316781],
[Conference or Workshop Item]

Barhom, Shany and Shwartz, Vered and Eirew, Alon and Bugert, Michael and Reimers, Nils and Dagan, Ido (2019):
Revisiting Joint Modeling of Cross-document Entity and Event Coreference Resolution.
In: The 57th Annual Meeting of the Association for Computational Linguistics (ACL 2019), Florence, Italy, 28.07.2019-02.08.2019, pp. 4179-4189, [Online-Edition: https://www.aclweb.org/anthology/P19-1409],
[Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[Ph.D. Thesis]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
43, In: Datenschutz und Datensicherheit - DuD, (5), Springer, pp. 276-280, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version), DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Brandherm, Florian and Wang, Lin and Mühlhäuser, Max (2019):
A Learning-based Framework for Optimizing Service Migration in Mobile Edge Clouds.
In: Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, ACM, In: EdgeSys, Dresden, 25.03.2019, pp. 12-17, DOI: 10.1145/3301418.3313939,
[Online-Edition: https://doi.org/10.1145/3301418.3313939],
[Conference or Workshop Item]

Brasser, Ferdinand and Gens, David and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Brandherm, Florian and Peters, Jan and Neumann, Gerhard and Akrour, Riad (2019):
Learning Replanning Policies with Direct Policy Search.
4, In: IEEE Robotics and Automation Letters, (2), IEEE, pp. 2196- 2203, DOI: 10.1109/LRA.2019.2901656,
[Online-Edition: https://doi.org/10.1109/LRA.2019.2901656],
[Article]

Botschen, Teresa (2019):
Uni- and Multimodal and Structured Representations for Modeling Frame Semantics.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8484],
[Ph.D. Thesis]

Biemueller, Felix (2019):
Trajektorienoptimierung für lasttragende Laufroboter.
Darmstadt, Technische Universitaet Darmstadt, Department of Computer Science (SIM), [Master Thesis]

Becker, Katrin (2019):
Compliant Balance Control for a Biped Humanoid Robot.
Darmstadt, TU Darmstadt, Department of Computer Science (SIM), [Bachelor Thesis]

Bernard, Jürgen and Sessler, David and Kohlhammer, Jörn and Ruddle, Roy A. (2019):
Using Dashboard Networks to Visualize Multiple Patient Histories: A Design Study on Post-Operative Prostate Cancer.
25, In: IEEE Transactions on Visualization and Computer Graphics, (3), IEEE, pp. 1615-1628, ISSN 1077-2626, DOI: 10.1109/TVCG.2018.2803829,
[Online-Edition: https://doi.org/10.1109/TVCG.2018.2803829],
[Article]

Binnig, Carsten Meyer, Holger and Ritter, Norbert and Thor, Andreas and Nicklas, Daniela and Heuer, Andreas and Klettke, Meike (eds.) (2019):
DPI: The Data Processing Interface for Modern Networks (Extended Abstract).
Bonn, Gesellschaft für Informatik, In: BTW 2019 – Workshopband, pp. 29-30, [Online-Edition: https://dl.gi.de/handle/20.500.12116/21806],
[Conference or Workshop Item]

Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
Gesellschaft für Informatik, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna, Austria:, 18.-19.2.2019, [Online-Edition: http://gil-net.de/Publikationen/139_25-30.pdf],
[Conference or Workshop Item]

Bock, Estuardo Alpirez and Brzuska, Chris and Fischlin, Marc and Janson, Christian and Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1014.pdf],
[Article]

Belousov, Boris and Peters, Jan (2019):
Entropic Regularization of Markov Decision Processes.
21, In: Entropy, (7), MDPI, ISSN 1099-4300, DOI: 10.3390/e21070674,
[Online-Edition: https://doi.org/10.3390/e21070674],
[Article]

Bubel, Richard and Hähnle, Reiner and Tabar, Asmae Heydari Ahrendt, Wolfgang and Tarifa, Silvia Lizeth Tapia (eds.) (2019):
A Program Logic for Dependence Analysis.
In: Integrated Formal Methods - 15th International Conference, IFM 2019, Bergen, Norway, December 2-6, 2019, DOI: 10.1007/978-3-030-34968-4_5,
[Online-Edition: https://doi.org/10.1007/978-3-030-34968-4\_5],
[Conference or Workshop Item]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[Ph.D. Thesis]

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Buechler, Dieter and Calandra, Roberto and Schoelkopf, Bernhard and Peters, Jan (2018):
Control of Musculoskeletal Systems using Learned Dynamics Models.
3, In: IEEE Robotics and Automation Letters, (4), pp. 3161-3168, ISSN 2377-3766, 2377-3774 (elektronisch), DOI: 10.1109/LRA.2018.284960,
[Article]

Burger, Michael and Bischof, Christian and Calotoiu, Alexandru and Wunderer, Thomas and Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Conference or Workshop Item]

Becker, Simon Nicolas Helmut (2018):
Group Formation for Asymmetric DC-nets.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9143],
[Bachelor Thesis]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, pp. 847-861, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Conference or Workshop Item]

Böck, Leon and Vasilomanolakis, Emmanouil and Mühlhäuser, Max and Karuppayah, Shankar (2018):
Next Generation P2P Botnets: Monitoring under Adverse Conditions.
In: Lecture Notes in Computer Science, 11050, In: Research in Attacks, Intrusions, and Defenses, Springer International Publishing, In: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece, pp. 511-531, DOI: 10.1007/978-3-030-00470-5_24,
[Online-Edition: https://www.raid2018.org/],
[Conference or Workshop Item]

Bračevac, Oliver and Amin, Nada and Salvaneschi, Guido and Erdweg, Sebastian and Eugster, Patrick and Mezini, Mira (2018):
Versatile Event Correlation with Algebraic Effects.
In: PACMPL, In: Proceedings of the ACM on Programming Languages, ACM, pp. 67:1-67:31, DOI: 10.1145/3236762,
[Online-Edition: https://doi.org/10.1145/3236762],
[Book Section]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), pp. 1303-1307, DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Conference or Workshop Item]

Botschen, Teresa and Sorokin, Daniil and Gurevych, Iryna (2018):
Frame- and Entity-Based Knowledge for Common-Sense Argumentative Reasoning.
Short Papers, In: Proceedings of the 5th Workshop on Argument Mining held in conjunction with EMNLP 2018, Brussels, Belgium, 31.10.2018, pp. 90-96, [Online-Edition: http://aclweb.org/anthology/W18-5211],
[Conference or Workshop Item]

Boullosa, Beto and Eckart de Castilho, Richard and Kumar, Naveen and Klie, Jan-Christoph and Gurevych, Iryna (2018):
Integrating Knowledge-Supported Search into the INCEpTION Annotation Platform.
Demo Papers, In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, In: The 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, 31.10.2018--04.11.2018, pp. 127-132, [Online-Edition: http://www.aclweb.org/anthology/D18-2022],
[Conference or Workshop Item]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelor Thesis]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Göpfert, Florian and Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Botschen, Teresa and Beinborn, Lisa and Gurevych, Iryna (2018):
Multimodal Grounding for Language Processing.
In: Proceedings of the 27th International Conference on Computational Linguistics (COLING 2018), In: The 27th International Conference on Computational Linguistics (COLING 2018), Santa Fe, USA, 20.08.2018--26.08.2018, pp. 2325-2339, [Online-Edition: http://www.aclweb.org/anthology/C18-1197],
[Conference or Workshop Item]

Birkholz, Henk and Krauß, Christoph and Zhdanova, Maria and Kuzhiyelil, Don and Arul, Tolga and Heinrich, Markus and Katzenbeisser, Stefan and Suri, Neeraj and Vateva-Gurova, Tsvetoslava and Schlehuber, Christian (2018):
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Zenodo, In: International Workshop on MILS: Architecture and Assurance for Secure Systems, Luxembourg, 25.06.2018, DOI: 10.5281/zenodo.1314095,
[Online-Edition: http://dx.doi.org/10.5281/zenodo.1314095],
[Conference or Workshop Item]

Botschen, Teresa and Gurevych, Iryna and Klie, Jan-Christoph and Sergieh, Hatem Mousselly and Roth, Stefan (2018):
Multimodal Frame Identification with Multilingual Evaluation.
In: Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Association for Computational Linguistics, New Orleans, USA, pp. 1481-1491, [Online-Edition: http://www.aclweb.org/anthology/N18-1134],
[Conference or Workshop Item]

Brandherm, Florian (2018):
Learning Replanning Policies with Direct Policy Search.
TU Darmstadt, [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Riad...],
[Master Thesis]

Bračevac, Oliver and Gay, Richard and Grewe, Sylvia and Mantel, Heiko and Sudbrock, Henning and Tasch, Markus (2018):
An Isabelle/HOL Formalization of the Modular Assembly Kit for Security Properties.
2018, In: Archive of Formal Proofs, [Article]

Biondo, Andrea and Conti, Mauro and Davi, Lucas and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium, [Conference or Workshop Item]

Bielsa, Guillermo and Palacios, Joan and Loch, Adrian and Steinmetzer, Daniel and Cesari, Paolo and Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Master Thesis]

Braun, Andreas and Zander-Walz, Sebastian and Majewski, Martin and Kuijper, Arjan (2018):
Investigating Large Curved Interaction Devices.
In: Personal and Ubiquitous Computing, pp. 1-10, DOI: 10.1007/s00779-018-1109-6,
[Article]

Berkei, Sarah and Limper, Max and Hörr, Christian and Kuijper, Arjan (2018):
Efficient Global Registration for Nominal/Actual Comparisons.
In: VMV 2018, Goslar, Eurographics Association, In: International Symposium on Vision, Modeling and Visualization (VMV), Stuttgart, Germany, 2018, pp. 71-78, ISBN 978-3-03868-072-7,
[Conference or Workshop Item]

Bubel, Richard (2018):
Deduktive Verifikation : Von der Theorie in die Praxis.
Darmstadt, [Habilitation]

Binnig, Carsten and Buratti, Benedetto and Chung, Yeounoh and Cousins, Cyrus and Ebert, Dylan and Kraska, Tim and Shang, Zeyuan and Tromba, Isabella and Upfal, Eli and Wang, Linnan (2018):
Towards Interactive Curation & Automatic Tuning of ML Pipelines.
In: 1st Inaugural Conference on Systems ML (SysML), [Conference or Workshop Item]

Binnig, Carsten and Kersting, Kristian and Molina, Alejandro and Zgraggen, Emanuel (2018):
DeepVizdom: Deep Interactive Data Exploration.
[Article]

Blöcher, Marcel and Ziegler, Tobias and Binnig, Carsten and Eugster, Patrick (2018):
Boosting Scalable Data Analytics with Modern Programmable Networks.
In: DAMON '18, ACM, In: Proceedings of the 14th International Workshop on Data Management on New Hardware, Houston, Texas, 11.06.2018, pp. 1:1-1:3, ISBN 978-1-4503-5853-8,
DOI: 10.1145/3211922.3211923,
[Online-Edition: http://doi.acm.org/10.1145/3211922.3211923],
[Conference or Workshop Item]

Belousov, B. and Peters, J. (2018):
Mean squared advantage minimization as a consequence of entropic policy improvement regularization.
In: The 14th European Workshop on Reinforcement Learning (EWRL 2018), Lille, France, October 1-3, 2018, [Online-Edition: https://www.ias.informatik.tu-darmstadt.de/uploads/Team/Bori...],
[Conference or Workshop Item]

Beck, Tilman and Böschen, Falk and Scherp, Ansgar (2018):
What to Read Next? Challenges and Preliminary Results in Selecting Representative Documents.
In: Database and Expert Systems Applications - DEXA 2018 International Workshops, BDMICS, BIOKDD, and TIR, Regensburg, Germany, September 3-6, 2018, Proceedings, pp. 230-242, DOI: 10.1007/978-3-319-99133-7_19,
[Online-Edition: https://doi.org/10.1007/978-3-319-99133-7\_19],
[Conference or Workshop Item]

Böschen, Falk and Beck, Tilman and Scherp, Ansgar (2018):
Survey and empirical comparison of different approaches for text extraction from scholarly figures.
77, In: Multimedia Tools and Applications, (22), pp. 29475-29505, ISSN Online 1573-7721; Print 1380-7501, DOI: 10.1007/s11042-018-6162-7,
[Online-Edition: https://doi.org/10.1007/s11042-018-6162-7],
[Article]

Bürdek, Johannes (2018):
Rekonfigurierbare Software-Systeme: Spezifikation und Testfallgenerierung.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8161],
[Ph.D. Thesis]

Bindel, Nina (2018):
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8100],
[Ph.D. Thesis]

Brasser, Ferdinand and Davi, Lucas and Dhavlle, Abhijitt and Frassetto, Tommaso and Dinakarrao, Sai Manoj Pudukotai and Rafatirad, Setareh and Sadeghi, Ahmad-Reza and Sasan, Avesta and Sayadi, Hossein and Zeitouni, Shaza and Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, Piscataway, NJ, USA, IEEE Press, In: Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, pp. 15:1-15:10, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283552.3283567],
[Conference or Workshop Item]

Balreira, Dennis G. and Walter, Marcelo and Fellner, Dieter W. (2018):
A survey of the contents in introductory Computer Graphics courses.
77, In: Computers & Graphics, pp. 88-96, ISSN 00978493, DOI: 10.1016/j.cag.2018.10.001,
[Online-Edition: https://doi.org/10.1016/j.cag.2018.10.001],
[Article]

Bernard, Jurgen and Hutter, Marco and Zeppelzauer, Matthias and Fellner, Dieter and Sedlmair, Michael (2018):
Comparing Visual-Interactive Labeling with Active Learning: An Experimental Study.
24, In: IEEE Transactions on Visualization and Computer Graphics, (1), pp. 298-308, ISSN 1077-2626, DOI: 10.1109/TVCG.2017.2744818,
[Online-Edition: https://doi.org/10.1109/TVCG.2017.2744818],
[Article]

Behr, Johannes and Limper, Max and Sturm, Timo (2018):
MoST- A 3DWeb Architectural Style for Hybrid Model Data.
In: Proceedings of the 23rd International ACM Conference on 3D Web Technology - Web3D '18, New York, NY, ACM, In: International Conference on 3D Web Technology (WEB3D), Poznań, Poland, 2018, pp. 1-8, ISBN 978-1-4503-5800-2,
DOI: 10.1145/3208806.3208823,
[Online-Edition: https://doi.org/10.1145/3208806.3208823],
[Conference or Workshop Item]

Braun, Andreas and Majewski, Martin and Loge, Joachim and Kirchbuchner, Florian and Kuijper, Arjan (2018):
SurfaceVox - Exploring Sound Control for Gesture-Tracking Interactive Surfaces.
In: 2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Los Alamitos, IEEE, In: International Conference on Signal Image Technology & Internet-Based Systems (SITIS), Las Palmas de Gran Canaria, Spain, 2018, pp. 703-710, ISBN 978-1-5386-9385-8,
DOI: 10.1109/SITIS.2018.00113,
[Online-Edition: https://doi.org/10.1109/SITIS.2018.00113],
[Conference or Workshop Item]

Bernard, Jürgen and Zeppelzauer, Matthias and Sedlmair, Michael and Aigner, Wolfgang (2018):
VIAL: a unified process for visual interactive labeling.
34, In: The Visual Computer, (9), Springer, pp. 1189-1207, ISSN 0178-2789, DOI: 10.1007/s00371-018-1500-3,
[Online-Edition: https://doi.org/10.1007/s00371-018-1500-3],
[Article]

Brakowski, Alexander and Maier, Sebastian and Kuijper, Arjan (2018):
Visual Guidance to Find the Right Spot in Parameter Space.
In: Lecture Notes in Computer Science (LNCS), 10904, In: Human Interface and the Management of Information. Interaction, Visualization, and Analytics, Cham, Springer, pp. 527-544, ISSN 0302-9743, ISBN 978-3-319-92042-9,
DOI: 10.1007/978-3-319-92043-6_43,
[Online-Edition: https://doi.org/10.1007/978-3-319-92043-6_43],
[Conference or Workshop Item]

Ballweg, Kathrin and Pohl, Margit and Wallner, Günter and von Landesberger, Tatiana (2018):
Visual Similarity Perception of Directed Acyclic Graphs: A Study on Influencing Factors.
In: Lecture Notes in Computer Science (LNCS), 10692, In: Graph Drawing and Network Visualization, Cham, Springer, In: International Symposium on Graph Drawing and Network Visualization (GD), Boston, MA, USA, 2017, pp. 241-255, ISSN 0302-9743, ISBN 978-3-319-73914-4,
DOI: 10.1007/978-3-319-73915-1_20,
[Online-Edition: https://doi.org/10.1007/978-3-319-73915-1_20],
[Conference or Workshop Item]

Ballweg, Kathrin and Pohl, Margit and Wallner, Günter and von Landesberger, Tatiana (2018):
Visual Similarity Perception of Directed Acyclic Graphs: A Study on Influencing Factors and Similarity Judgment Strategies.
22, In: Journal of Graph Algorithms and Applications, (3), pp. 519-553, ISSN 1526-1719, DOI: 10.7155/jgaa.00467,
[Online-Edition: https://doi.org/10.7155/jgaa.00467],
[Article]

Bernard, Jürgen and Zeppelzauer, Matthias and Lehmann, Markus and Müller, Martin and Sedlmair, Michael (2018):
Towards User-Centered Active Learning Algorithms.
37, In: Computer Graphics Forum, (3), pp. 121-132, ISSN 01677055, DOI: 10.1111/cgf.13406,
[Online-Edition: https://doi.org/10.1111/cgf.13406],
[Article]

Buchmann, Johannes and Holzer, Patrick and Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Springer, [Conference or Workshop Item]

Beller, Moritz and Gousios, Georgius and Panichella, Annibale and Proksch, Sebastian and Amann, Sven and Zaidman, Andy (2017):
Developer Testing in the IDE: Patterns, Beliefs, and Behavior.
In: IEEE Transactions on Software Engineering, DOI: 10.1109/TSE.2017.2776152,
[Article]

Bavishi, Rohan and Pradel, Michael and Sen, Koushik (2017):
Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts.
[Report]

Berens, Yannick (2017):
Scalability Validation of Parallel Sorting Algorithms.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6825],
[Bachelor Thesis]

Butin, Denis and Wälde, Julian and Buchmann, Johannes (2017):
Post-Quantum Authentication in OpenSSL with Hash-Based Signatures.
In: ICMU - The Tenth International Conference on Mobile Computing and Ubiquitous Networking, Toyama International Conference Center, Toyama, Japan, October 3-5, 2017, [Online-Edition: http://www.icmu.org/icmu2017/],
[Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security, Springer, [Conference or Workshop Item]

Bindel, Nina and Krämer, Juliane and Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion, Springer, [Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Master Thesis]

Baumgärtner, Lars and Kohlbrecher, Stefan and Euler, Juliane and Ritter, Tobias and Stute, Milan and Meurisch, Christian and Mühlhäuser, Max and Hollick, Matthias and Stryk, Oskar von and Freisleben, Bernd (2017):
Emergency Communication in Challenged Environments via Unmanned Ground and Aerial Vehicles.
In: IEEE Global Humanitarian Technology Conference (GHTC), IEEE, [Conference or Workshop Item]

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Müller, Urs and Sadeghi, Ahmad-Reza (2017):
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
[Report]

Botschen, Teresa and Mousselly-Sergieh, Hatem and Gurevych, Iryna (2017):
Experimental study of multimodal representations for Frame Identification - How to find the right multimodal representations for this task?
In: Language-Learning-Logic Workshop (3L 2017), London, UK, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, pp. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Buchmann, Johannes and Lauter, Kristin and Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
15, In: IEEE Security & Privacy, pp. 12-13, [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
15, In: IEEE Security & Privacy, (4), pp. 37-43, DOI: 10.1109/MSP.2017.3151334,
[Article]

Bauereiß, Thomas and Greiner, Simon and Herda, Mihai and Kirsten, Michael and Li, Ximeng and Mantel, Heiko and Mohr, Martin and Perner, Matthias and Schneider, David and Tasch, Markus (2017):
RIFL 1.1: A Common Specification Language for Information-Flow Requirements.
[Report]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, pp. 1-10, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian Katz, Jonathan and Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, pp. 651-681, [Conference or Workshop Item]

Botschen, Teresa and Mousselly-Sergieh, Hatem and Gurevych, Iryna (2017):
Prediction of Frame-to-Frame Relations in the FrameNet Hierarchy with Frame Embeddings.
In: Proceedings of th 2nd Workshop on Representation Learning for NLP (RepL4NLP, held in conjunction with ACL 2017), Vancouver, Canada, pp. 146-156, [Online-Edition: http://www.aclweb.org/anthology/W17-2618],
[Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium, [Conference or Workshop Item]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies, [Conference or Workshop Item]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Springer, Auckland, New Zealand, [Conference or Workshop Item]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, pp. 118–134, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Burger, Michael and Nguyen, Giang Nam and Bischof, Christian (2017):
Extending Perfect Spatial Hashing to Index Tuple-based Graphs Representing Super Carbon Nanotubes.
In: Proceedings of the International Conference on Computational Science, In: ICCS 2017, Zürich, 12.06.2017, [Online-Edition: http://www.iccs-meeting.org/iccs2017/],
[Conference or Workshop Item]

Boukoros, Spyros and Karvelas, Nikolaos and Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference, IEEE, Valencia Spain, [Conference or Workshop Item]

Bindel, Nina and Herath, Udyani and McKague, Matthew and Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Brandl, Sascha (2017):
Online Traversability Analysis of unknown Obstacles for mobile autonomous Robots.
Darmstadt, Technische Universitaet Darmstadt, Department of Computer Science (SIM), [Master Thesis]

Burger, Michael (2017):
Memory-Efficient and Parallel Simulation of Super Carbon Nanotubes.
Darmstadt, tuprints, Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6229/],
[Ph.D. Thesis]

Buchmann, Johannes and Braun, Johannes and Demirel, Denise and Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
2, In: Quantum Science and Technology, (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, [Conference or Workshop Item]

Biemann, Chris and Bontcheva, Kalina and Eckart de Castilho, Richard and Gurevych, Iryna and Yimam, Seid Muhie Ide, Nancy and Pustejovsky, James (eds.) (2017):
Collaborative Web-based Tools for Multi-layer Text Annotation.
In: Text, Speech, and Technology book series, In: The Handbook of Linguistic Annotation, Springer Netherlands, pp. 229-256, DOI: 10.1007/978-94-024-0881-2,
[Online-Edition: http://www.springer.com/de/book/9789402408799],
[Book Section]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: LNCS, In: ASIACCS 2017 - ACM Asia Conference on Computer and Communications Security, Springer, Abu Dhabi, UAE, [Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas and Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, Springer, Rabat, Morocco, pp. 142-160, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Bugert, Michael and Puzikov, Yevgeniy and Rücklé, Andreas and Eckle-Kohler, Judith and Martin, Teresa and Martínez Cámara, Eugenio and Sorokin, Daniil and Peyrard, Maxime and Gurevych, Iryna (2017):
LSDSem 2017: Exploring Data Generation Methods for the Story Cloze Test.
In: Proceedings of the 2nd Workshop on Linking Models of Lexical, Sentential and Discourse-level Semantics, Association for Computational Linguistics, In: The 2nd Workshop on Linking Models of Lexical, Sentential and Discourse-level Semantics, Valencia, Spain, 03.04.2017--04.04.2017, pp. 56-61, ISBN 978-1-945626-40-1,
[Online-Edition: http://aclweb.org/anthology/W17-0908],
[Conference or Workshop Item]

Boullosa, Beto and Eckart de Castilho, Richard and Geyken, Alexander and Lemnitzer, Lothar and Gurevych, Iryna (2017):
A tool for extracting sense-disambiguated example sentences through user feedback.
In: Proceedings of the Software Demonstrations of the 15th Conference of the European Chapter of the Association for Computational Linguistics, Association for Computational Linguistics, Valencia, Spain, pp. 69-72, [Online-Edition: http://aclweb.org/anthology/E17-3018],
[Conference or Workshop Item]

Breuils, Stéphane and Nozick, Vincent and Fuchs, Laurent and Hildenbrand, Dietmar and Benger, Werner and Steinmetz, Christian (2017):
A Hybrid Approach for Computing Products of High-dimensional Geometric Algebras.
In: CGI '17, New York, NY, USA, ACM, In: Proceedings of the Computer Graphics International Conference, Yokohama, Japan, June 27 - 30, 2017, pp. 43:1-43:6, ISBN 978-1-4503-5228-4,
DOI: 10.1145/3095140.3097284,
[Online-Edition: http://doi.acm.org/10.1145/3095140.3097284],
[Conference or Workshop Item]

Bleikertz, Sören (2017):
Automated Security Analysis of Virtualized Infrastructures.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6610],
[Ph.D. Thesis]

Blöcher, Marcel and Viering, Malte and Schmid, Stefan and Eugster, Patrick (2017):
The Grand CRU Challenge.
In: Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems, pp. 7-11, [Conference or Workshop Item]

Borges, Fábio and Lara, Pedro and Portugal, Renato (2017):
Parallel algorithms for modular multi-exponentiation.
292, In: Applied Mathematics and Computation, pp. 406--416, DOI: 10.1016/j.amc.2016.07.036,
[Article]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), pp. 225-241, [Conference or Workshop Item]

Binnig, Carsten and De Stefani, Lorenzo and Kraska, Tim and Upfal, Eli and Zgraggen, Emanuel and Zhao, Zheguang (2017):
Toward Sustainable Insights, or Why Polygamy is Bad for You.
In: CIDR, [Conference or Workshop Item]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt and Paglialonga, Clara and Standaert, Francois-Xavier (2017):
Consolidating Inner Product Masking.
2017, In: IACR Cryptology ePrint Archive, p. 1047, [Online-Edition: http://eprint.iacr.org/2017/1047],
[Article]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt and Paglialonga, Clara and Standaert, Francois-Xavier (2017):
Consolidating Inner Product Masking.
In: Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, pp. 724-754, DOI: 10.1007/978-3-319-70694-8₂₅,
[Online-Edition: https://doi.org/10.1007/978-3-319-70694-8_25],
[Conference or Workshop Item]

Barthe, Gilles and Dupressoir, Francois and Faust, Sebastian and Gregoire, Benjamin and Standaert, Francois-Xavier and Strub, Pierre-Yves (2017):
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I, pp. 535-566, DOI: 10.1007/978-3-319-56620-7₁₉,
[Online-Edition: https://doi.org/10.1007/978-3-319-56620-7_19],
[Conference or Workshop Item]

Brody, Joshua and Dziembowski, Stefan and Faust, Sebastian and Pietrzak, Krzysztof (2017):
Position-Based Cryptography and Multiparty Communication Complexity.
In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, pp. 56-81, DOI: 10.1007/978-3-319-70500-2₃,
[Online-Edition: https://doi.org/10.1007/978-3-319-70500-2_3],
[Conference or Workshop Item]

Belousov, B. and Peters, J. (2017):
f-Divergence constrained policy improvement.
In: Journal of Machine Learning Research X, [Online-Edition: https://arxiv.org/pdf/1801.00056.pdf],
[Article]

Belousov, B. and Neumann, G. and Rothkopf, C. A. and Peters, J. (2017):
Catching heuristics are optimal control policies.
In: Proceedings of the Karniel Thirteenth Computational Motor Control Workshop, [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Busch, Baptiste and Maeda, Guilherme and Mollard, Yoan and Demangeat, Marie and Lopes, Manuel (2017):
Postural Optimization for an Ergonomic Human-Robot Interaction.
IEEE, In: 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Vancouver, BC, Canada, 24-28 Sept. 2017, DOI: 10.1109/IROS.2017.8206107,
[Conference or Workshop Item]

Büscher, Niklas and Franz, Martin and Holzer, Andreas and Veith, Helmut and Katzenbeisser, Stefan (2017):
On compiling Boolean circuits optimized for secure multi-party computation.
51, In: Formal Methods in System Design, (2), pp. 308-331, DOI: 10.1007/s10703-017-0300-0,
[Online-Edition: https://doi.org/10.1007/s10703-017-0300-0],
[Article]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 15:1-15:8, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference or Workshop Item]

Benikova, Darina and Mieskes, Margot and Meyer, Christian M. and Gurevych, Iryna (2016):
Bridging the gap between extractive and abstractive summaries: Creation and evaluation of coherent extracts from heterogeneous sources.
In: Proceedings of the 26th International Conference on Computational Linguistics (COLING), Osaka, Japan, pp. 1039-1050, ISBN 978-4-87974-702-0,
[Online-Edition: http://aclweb.org/anthology/C16-1099],
[Conference or Workshop Item]

Brendel, Jacqueline and Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Brendel, J. and Demirel, D. (2016):
Efficient proactive secret sharing.
In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 543-550, DOI: 10.1109/PST.2016.7907013,
[Conference or Workshop Item]

Bartschat, Andreas and Toso, Lorenzo and Stegmaier, Johannes and Kuijper, Arjan and Mikut, Ralf and Köhler, Bernd and Allgeier, Stephan (2016):
Automatic Corneal Tissue Classification Using Bag-Of-Visual-Words Approaches.
KIT Scientific Publishing, Karlsruhe, In: Forum Bildverarbeitung 2016, Karlsruhe, 01.-02. Dezember 2016, pp. 245-256, [Conference or Workshop Item]

Blom, David and Ertl, Thomas and Fernandes, Oliver and Frey, Steffen and Klimach, Harald and Krupp, Verena and Mehl, Miriam and Roller, Sabine and Sternel, Dörte Carla and Uekermann, Benjamin and Winter, Tilo and van Zuijlen, Alexander Bungartz, Hans-Joachim and Neumann, Philipp and Nagel, Wolfgang E. (eds.) (2016):
Partitioned Fluid-Structure-Acoustics Interaction on Distributed Data: Numerical Results and Visualization.
In: Lecture Notes in Computational Science and Engineering, 113, In: Software for Exascale Computing -- SPPEXA 2013-2015, Springer, September 2016, pp. 267-291, [Conference or Workshop Item]

Buescher, Niklas and Kretzmer, David and Jindal, Arnav and Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security, IEEE, [Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Online-Edition: https://arxiv.org/abs/1611.08396],
[Article]

Ben Hmida, Helmi and Braun, Andreas (2016):
Scaling up IoT: Impact of Semantic Open Platforms.
VDE-Verlag, In: VDE-Kongress 2016 - Internet der Dinge, Mannheim, 7. und 8. November 2016, [Conference or Workshop Item]

Benz, Manuel (2016):
Interprocedural Graph-based Object Usage Model Generation for Detecting Anomalous Usage of Cryptographic APIs.
Technische Universität Darmstadt, [Master Thesis]

Ballweg, Kathrin and Zouhar, Florian and Wilhelmi-Dworski, Patrick and Landesberger, Tatiana von and Fahrer, Uli and Panchenko, Alexander and Yimam, Seid Muhie and Biemann, Chris and Regneri, Michaela and Ulrich, Heiner (2016):
new/s/leak – A Tool for Visual Exploration of Large Text Document Collections in the Journalistic Doman.
In: IEEE VIS'16, [Article]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Beinborn, Lisa Marina (2016):
Predicting and Manipulating the Difficulty of Text-Completion Exercises for Language Learning.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5647],
[Ph.D. Thesis]

Berninger, Kim and Hoppe, Jannis and Milde, Benjamin (2016):
Classification of Speaker Intoxication Using a Bidirectional Recurrent Neural Network.
In: Lecture Notes in Computer Science (LNCS), 9924, In: International Conference on Text, Speech, and Dialogue, pp. 435--442, DOI: 10.1007/978-3-319-45510-5_50,
[Conference or Workshop Item]

Buescher, Niklas and Holzer, Andreas and Weber, Alina and Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Bossert, Andreas and Cooper, Steven and Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Butin, Denis and Demirel, Denise and Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016, sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
[Other]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Wackerfuß, Jens (2016):
Compressed Symmetric Graphs for the Simulation of Super Carbon Nanotubes.
2016, In: Proceedings of the 2016 International Conference on High Performance Computing & Simulation, Innsbruch, Austria, Innsbruch, Austria, [Online-Edition: http://hpcs2016.cisedu.info/],
[Conference or Workshop Item]

Böhme, David and Geimer, Markus and Arnold, Lukas and Voigtländer, Felix and Wolf, Felix (2016):
Identifying the root causes of wait states in large-scale parallel applications.
3, In: ACM Transactions on Parallel Computing, (2), pp. Article No. 11, 24 pages, ISSN 2329-4949, DOI: 10.1145/2934661,
[Article]

Braun, Andreas and Majewski, Martin and Wichert, Reiner and Kuijper, Arjan (2016):
Investigating Low-Cost Wireless Occupancy Sensors for Beds.
In: Lecture Notes in Computer Science (LNCS); 9749, In: Distributed, Ambient, and Pervasive Interactions, Springer International Publishing, Switzerland, In: 4th International Conference, DAPI 2016, Toronto, ON, Canada, July 17-22, 2016, pp. 26-34, DOI: 10.1007/978-3-319-39862-4₃,
[Conference or Workshop Item]

Braun, Andreas and Alekseew, Michael and Kuijper, Arjan (2016):
Exploring Machine Learning Object Classification for Interactive Proximity Surfaces.
In: Lecture Notes in Computer Science (LNCS); 9749, In: Distributed, Ambient, and Pervasive Interactions, Springer International Publishing, Switzerland, In: 4th International Conference, DAPI 2016, Toronto, ON, Canada, July 17-22, 2016, pp. 157-167, DOI: 10.1007/978-3-319-39862-4₁₅,
[Conference or Workshop Item]

Borgwart, Andreas and Shulman, Haya and Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Bernard, Jürgen and Dobermann, Eduard and Bögl, Markus and Röhlig, Martin and Vögele, Anna and Kohlhammer, Jörn (2016):
Visual-Interactive Segmentation of Multivariate Time Series.
Eurographics Association, Goslar, In: EuroVA 2016, 7th international EuroVis workshop on Visual Analytics, Groningen, The Netherlands, June 6-7, 2016, pp. 31-35, DOI: 10.2312/eurova.20161121,
[Conference or Workshop Item]

Bernard, Jürgen and Sessler, David and Steiger, Martin and Spott, Martin and Kohlhammer, Jörn (2016):
Visual-Interactive Exploration of Relations Between Time-Oriented Data and Multivariate Data.
In: EuroVA 2016, 7th international EuroVis workshop on Visual Analytics, Groningen, The Netherlands, June 6-7, 2016., DOI: 10.2312/eurova.20161124,
[Conference or Workshop Item]

Braun, Andreas and Zander-Walz, Sebastian and Krepp, Stefan and Rus, Silvia and Wichert, Reiner and Kuijper, Arjan (2016):
CapTap - Combining Capacitive Gesture Recognition and Acoustic Touch Detection.
In: ACM International Conference Proceedings Series; 1183, ACM Press, New York, In: iWOAR 2016, Rostock, Germany, 23. - 24. June 2016, DOI: 10.1145/2948963.2948969,
[Conference or Workshop Item]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Buchmann, Johannes and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Conference or Workshop Item]

Benikova, Darina and Biemann, Chris (2016):
SemRelData – Multilingual Contextual Annotation of Semantic Relations between Nominals: Dataset and Guidelines.
In: Proceedings Tenth International Conference on Language Resources and Evaluation (LREC 2016), ELRA, [Conference or Workshop Item]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
40, In: Datenschutz und Datensicherheit - DuD, (5), Springer Fachmedien Wiesbaden, pp. 300-304, DOI: 10.1007/s11623-016-0600-3,
[Article]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Book]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
71, In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, (7), Springer Paris, pp. 309–322, DOI: 10.1007/s12243-016-0510-2,
[Article]

Buchmann, Johannes and Göpfert, Florian and Player, Rachel and Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Braun, Andreas and Rus, Silvia and Majewski, Martin (2016):
Unsichtbare Erkennung menschlicher Aktivitäten in Smart Living Umgebungen mit Kapazitiven Sensoren.
VDE-Verlag, In: Zukunft Lebensräume 2016, Frankfurt a.M., 20. und 21. April 2016, pp. 440-445, [Conference or Workshop Item]

Bračevac, Oliver and Erdweg, Sebastian and Salvaneschi, Guido and Mezini, Mira (2016):
CPL: A Core Language for Cloud Computing.
In: MODULARITY 2016, In: Proceedings of the 15th International Conference on Modularity, New York, NY, USA, ACM, pp. 94-105, [Online-Edition: http://doi.acm.org/10.1145/2889443.2889452],
[Book Section]

Bernhard, David and Fischlin, Marc and Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, Springer, Taipei, Taiwan, p. 24, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Berndt, René and Silva, Nelson and Caldera, Christian and Krispel, Ulrich and Eggeling, Eva and Sunk, Alexander and Edtmayr, Thomas and Sihn, Wilfried and Fellner, Dieter W. (2016):
VASCO - Mastering the Shoals of Value Stream Mapping.
In: CONTENT 2016, The Eighth International Conference on Creative Content Technologies, Rome, Italy, March 20-24, 2016, [Conference or Workshop Item]

Budurushi, Jurlind (2016):
Usable Security Evaluation of EasyVote in the Context of Complex Elections.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5418],
[Ph.D. Thesis]

Bračevac, Oliver and Erdweg, Sebastian and Salvaneschi, Guido and Mezini, Mira (2016):
CPL: A Core Language for Cloud Computing -- Technical Report.
abs/1602.00981, In: CoRR, [Article]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Brody, Joshua and Dziembowski, Stefan and Faust, Sebastian and Pietrzak, Krzysztof (2016):
Position-Based Cryptography and Multiparty Communication Complexity.
2016, In: IACR Cryptology ePrint Archive, p. 536, [Online-Edition: http://eprint.iacr.org/2016/536],
[Article]

Barthe, Gilles and Dupressoir, Francois and Faust, Sebastian and Gregoire, Benjamin and Standaert, Francois-Xavier and Strub, Pierre-Yves (2016):
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
2016, In: IACR Cryptology ePrint Archive, p. 912, [Online-Edition: http://eprint.iacr.org/2016/912],
[Article]

Brodkorb, Felix and Kopp, Manuel and Kuijper, Arjan and Landesberger, Tatiana von (2016):
A Modular Rule-Based Visual Interactive Creation of Tree-Shaped Geo-Located Networks.
IEEE Computer Society Conference Publishing Services (CPS), Los Alamitos, Calif., In: 12th International Conference on Signal-Image Technology & Internet-Based Systems, Naples, Italy, 28. November-1. December, 2016, pp. 397-403, DOI: 10.1109/SITIS.2016.69,
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2016):
Methods to Model and Simulate Super Carbon Nanotubes of Higher Order.
Special Issue, In: Concurrency and Computation: Practice and Experience, John Wiley & Sons, Ltd, [Online-Edition: https://paginas.fe.up.pt/~specs/events/cse2015/ccpe-cse2015....],
[Article]

Büttner, Carsten (2016):
Anonymous Authenticated Car-to-X Communication.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5832],
[Ph.D. Thesis]

Boubekeur, Tamy and Cignoni, Paolo and Eisemann, Elmar and Goesele, Michael and Klein, Reinhard and Roth, Stefan and Weinmann, Michael and Wimmer, Michael Catalano, Chiara Eva and Luca, Livio De (eds.) (2016):
Harvesting Dynamic 3D Worlds from Commodity Sensor Clouds.
The Eurographics Association, In: Eurographics Workshop on Graphics and Cultural Heritage, ISSN 2312-6124, ISBN 978-3-03868-011-6,
[Conference or Workshop Item]

Bodden, Eric and Pun, Ka I. and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina Margaria, Tiziana and Steffen, Bernhard (eds.) (2016):
Information Flow Analysis for Go.
In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, Springer International Publishing, pp. 431-445, DOI: 10.1007/978-3-319-47166-2_30,
[Online-Edition: https://doi.org/10.1007/978-3-319-47166-2_30],
[Book Section]

Beckert, Bernhard and Hähnle, Reiner and Hentschel, Martin and Schmitt, Peter H. Ahrendt, Wolfgang and Beckert, Bernhard and Bubel, Richard and Hähnle, Reiner and Schmitt, Peter H. and Ulbrich, Mattias (eds.) (2016):
Formal Verification with KeY: A Tutorial.
In: Lecture Notes in Computer Science, In: Deductive Software Verification - The KeY Book - From Theory to Practice, Springer, pp. 541-570, DOI: 10.1007/978-3-319-49812-6₁₆,
[Online-Edition: https://doi.org/10.1007/978-3-319-49812-6_16],
[Book Section]

Bubel, Richard and Damiani, Ferruccio and Hähnle, Reiner and Johnsen, Einar Broch and Owe, Olaf and Schaefer, Ina and Yu, Ingrid Chieh (2016):
Proof Repositories for Compositional Verification of Evolving Software Systems - Managing Change When Proving Software Correct.
1, In: Trans. Found. Mastering Chang., pp. 130-156, DOI: 10.1007/978-3-319-46508-1₈,
[Online-Edition: https://doi.org/10.1007/978-3-319-46508-1_8],
[Article]

Bubel, Richard and Hähnle, Reiner Ahrendt, Wolfgang and Beckert, Bernhard and Bubel, Richard and Hähnle, Reiner and Schmitt, Peter H. and Ulbrich, Mattias (eds.) (2016):
KeY-Hoare.
In: Lecture Notes in Computer Science, In: Deductive Software Verification - The KeY Book - From Theory to Practice, Springer, pp. 571-589, DOI: 10.1007/978-3-319-49812-6₁₇,
[Online-Edition: https://doi.org/10.1007/978-3-319-49812-6_17],
[Book Section]

Bennaceur, Amel and Giannakopoulou, Dimitra and Hähnle, Reiner and Meinke, Karl (2016):
Machine Learning for Dynamic Software Analysis: Potentials and Limits (Dagstuhl Seminar 16172).
6, In: Dagstuhl Reports, (4), pp. 161-173, DOI: 10.4230/DagRep.6.4.161,
[Online-Edition: https://doi.org/10.4230/DagRep.6.4.161],
[Article]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference, ACM, [Conference or Workshop Item]

Binnig, Carsten and Crotty, Andrew and Galakatos, Alex and Kraska, Tim and Zamanian, Erfan (2016):
The end of slow networks: It's time for a redesign.
9, In: Proceedings of the VLDB Endowment, (7), VLDB Endowment, pp. 528-539, [Article]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2016):
Predicting the Spelling Difficulty of Words for Language Learners.
In: Proceedings of the 11th Workshop on Innovative Use of NLP for Building Educational Applications held in conjunction with NAACL 2016, San Diego, CA, USA, pp. 73-83, [Online-Edition: http://m-mitchell.com/NAACL-2016/BEA/pdf/BEA1108.pdf],
[Conference or Workshop Item]

Buechler, D. and Ott, H. and Peters, J. (2016):
A Lightweight Robotic Arm with Pneumatic Muscles for Robot Learning.
In: Proceedings of the International Conference on Robotics and Automation (ICRA), [Conference or Workshop Item]

Belousov, B. and Neumann, G. and Rothkopf, C. and Peters, J. (2016):
Catching heuristics are optimal control policies.
In: Advances in Neural Information Processing Systems (NIPS), [Online-Edition: http://www.ausy.tu-darmstadt.de/uploads/Site/EditPublication...],
[Conference or Workshop Item]

Büscher, Niklas and Schiffner, Stefan and Fischer, Mathias (2016):
Consumer Privacy on Distributed Energy Markets.
In: Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, Germany, September 7-8, 2016, pp. 96-114, DOI: 10.1007/978-3-319-44760-5_7,
[Online-Edition: https://doi.org/10.1007/978-3-319-44760-5\_7],
[Conference or Workshop Item]

Bartschat, Andreas (2016):
Automatic Classification of Cornea Tissues for Autofocus Algorithm.
Darmstadt, TU, Master Thesis, 2016, [Master Thesis]

Berkei, Sarah (2016):
Effiziente und Vollautomatische Grobausrichtung für den Soll-Ist-Abgleich zwischen CAD-Modellen und Scandaten.
Darmstadt, TU, Master Thesis, 2016, [Master Thesis]

Bernard, Jürgen Hölldobler, Steffen (ed.) (2016):
Explorative Suche in zeitbasierten Primärdaten.
In: GI-Edition - Lecture Notes in Informatics (LNI); D-16, In: Ausgezeichnete Informatikdissertationen 2015, Bonn, Gesellschaft für Informatik e.V. (GI), pp. 11-20, [Book Section]

Berndt, René and Silva, Nelson and Caldera, Christian and Krispel, Ulrich and Eggeling, Eva and Sunk, Alexander and Reisinger, Gerhard and Sihn, Wilfried and Fellner, Dieter W. (2016):
VASCO - Digging the Dead Man's Chest of Value Streams.
9, In: International Journal on Advances in Intelligent Systems, (3), pp. 401-416, [Article]

Beuth, Marcel (2016):
Visualization of General Graphs with Metro Maps.
TU Darmstadt, [Bachelor Thesis]

Bockholt, Ulrich Schenk, Michael and Schumann, Marco (eds.) (2016):
Teilprojekt TP 3 - Tracking.
In: Angewandte Virtuelle Techniken im Produktentstehungsprozess, Berlin, Heidelberg, Springer, Vieweg, pp. 141-222, DOI: 10.1007/978-3-662-49317-5,
[Book Section]

Borrmann, Daniel (2016):
Incorporating the Unscented Transform in Rao-Blackwellised Visual-Inertial SLAM.
Darmstadt, TU, Master Thesis, 2016, [Master Thesis]

Braun, Andreas and Kirchbuchner, Florian and Wichert, Reiner Fischer, Florian and Krämer, Alexander (eds.) (2016):
Ambient Assisted Living.
In: eHealth in Deutschland, Berlin, Heidelberg, Springer, Vieweg,, pp. 203-222, DOI: 10.1007/978-3-662-49504-9_10,
[Book Section]

Brodkorb, Felix and Kuijper, Arjan and Andrienko, Gennady and Andrienko, Natalia and Landesberger, Tatiana von (2016):
Overview with Details for Exploring Geo-located Graphs on Maps.
15, In: Information Visualization, (3), pp. 214-237, DOI: 10.1177/1473871615597077,
[Article]

Breitfelder, Simon (2016):
Invertierte GML-Modellierung durch Einpassen und Zusammensetzen von einfachen Strukturen.
TU Darmstadt, [Bachelor Thesis]

Braun, Andreas and Wichert, Reiner and Kuijper, Arjan and Fellner, Dieter W. (2016):
Benchmarking Sensors in Smart Environments - Method and Use Cases.
8, In: Journal of Ambient Intelligence and Smart Environments, (6), pp. 645-664, DOI: 10.3233/AIS-160402,
[Article]

Bernard, Jürgen (2015):
Exploratory search in time-oriented primary data.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5173],
[Ph.D. Thesis]

Baier, Harald (2015):
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
6, In: it - Information Technology, DOI: 10.1515/itit-2015-0023,
[Article]

Bagci, Ibrahim Ethem and Roedig, Utz and Martinovic, Ivan and Schulz, Matthias and Hollick, Matthias (2015):
Using Channel State Information for Tamper Detection in the Internet of Things.
In: 31st Annual Computer Security Applications Conference (ACSAC 2015), [Article]

Borgwart, Andreas and Boukoros, Spyros and Shulman, Haya and Waidner, Michael and van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2015):
Factors of Difficulty in German Language Proficiency Tests.
[Other]

Bračevac, Oliver (2015):
Temporal Correlation Patterns -- Intersecting Joins, Streams, Events and Reactive Programming.
In: Workshop on Reactive and Event-based Languages & Systems co-located with SPLASH '15, 27 Oct 2015, [Online-Edition: http://2015.splashcon.org/track/rebls2015],
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2015):
An Improved Algorithm for Simulating the Mechanical Behavior of Super Carbon Nanotubes.
In: Proceedings of the IEEE International Conference on Computational Science and Engineering, Porto, Portugal, [Conference or Workshop Item]

Borges, Fábio and Santos, Raqueline A. M. and Marquezino, Franklin L. (2015):
Preserving Privacy in a Smart Grid Scenario using Quantum Mechanics.
8, In: Security and Communication Networks, (12), Wiley, pp. 2061-2069, ISSN 1939-0122, DOI: 10.1002/sec.1152,
[Article]

Barroso, Ana and Hollick, Matthias (2015):
Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication.
In: IEEE 40th Conference on Local Computer Networks (LCN 2015), pp. 474 - 477, DOI: 10.1109/LCN.2015.7366356,
[Article]

Buchmann, Nicolas and Baier, Harald (2015):
Elektronische Identifizierung und vertrauenswürdige Dienste.
In: D.A.C.H. Security 2015, [Conference or Workshop Item]

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, pp. 731-732, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Baluda, Mauro (2015):
EvoSE: Evolutionary Symbolic Execution.
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015), [Online-Edition: http://dx.doi.org/10.1145/2804322.2804325],
[Article]

Borges de Oliveira, Fábio (2015):
On Privacy-Preserving Protocols for Smart Metering Systems.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4693],
[Ph.D. Thesis]

Beckerle, Philipp and Wojtusch, Janis and Seyfarth, André and Stryk, Oskar von and Rinderknecht, Stephan (2015):
Analyzing and Considering Inertial Effects in Powered Lower Limb Prosthetic Design.
In: Proceedings of IEEE International Conference on Rehabilitation Robotics, In: IEEE International Conference on Rehabilitation Robotics, Singapore, 11 - 14 August 2015, [Conference or Workshop Item]

Buescher, Niklas and Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15), USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2015):
Exploiting Structural Properties During Carbon Nanotube Simulation.
In: Proceedings of the International Conference on Computational Science and Its Applications, Banff, Canada, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Schröppel, Christian and Wackerfuß, Jens (2015):
A Unified and Memory Efficient Framework for Simulating Mechanical Behavior of Carbon Nanotubes.
15, In: Proceedings of the International Conference on Computational Science, Reykjavik, Iceland, [Conference or Workshop Item]

Brasser, Ferdinand and Koeberl, Patrick and Mahjoub, Brahim El and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference or Workshop Item]

Bringer, J. and Morel, C. and Rathgeb, C. (2015):
Security analysis of Bloom filter-based iris biometric template protection.
In: 2015 International Conference on Biometrics (ICB), IEEE, DOI: 10.1109/ICB.2015.7139069,
[Conference or Workshop Item]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelor Thesis]

Bucicoiu, Mihai and Davi, Lucas and Deaconescu, Razvan and Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference or Workshop Item]

Beyer, Philip (2015):
Proposal for a STS Evaluation Framework for STS based Applications.
Technische Universität Darmstadt, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Master Thesis]

Barekatain, Behrang and Khezrimotlagh, Dariush and Aizaini Maarof, Mohd and Ghaeini, Hamid Reza and Ariza Quintana, Alfonso and Trivino Cabrera, Alicia (2015):
Efficient P2P live video streaming over hybrid WMNs using random network coding.
80, In: Wireless Personal Communications, (4), pp. 1761-1789, DOI: 10.1007/s11277-014-2112-5,
[Article]

Bär, Daniel and Zesch, Torsten and Gurevych, Iryna UKP Lab, Technische Universität Darmstadt (Corporate Creator) (2015):
Composing Measures for Computing Text Similarity.
Darmstadt, Germany, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4342],
[Report]

Busold, Christoph and Heuser, Stephan and Rios, Jon and Sadeghi, Ahmad-Reza and Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13, [Article]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt (2015):
Inner Product Masking Revisited.
In: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, pp. 486-510, DOI: 10.1007/978-3-662-46800-5₁₉,
[Online-Edition: https://doi.org/10.1007/978-3-662-46800-5_19],
[Conference or Workshop Item]

Biedermann, Sebastian (2015):
Transparent Security Services for an Infrastructure-as-a-Service Cloud.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4415],
[Ph.D. Thesis]

Braun, Johannes (2015):
Maintaining Security and Trust in Large Scale Public Key Infrastructures.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4566],
[Ph.D. Thesis]

Bubel, Richard and Din, Crystal Chang and Hähnle, Reiner and Nakata, Keiko de Nivelle, Hans (ed.) (2015):
A Dynamic Logic with Traces and Coinduction.
In: Lecture Notes in Computer Science, 9323, Springer, In: Automated Reasoning with Analytic Tableaux and Related Methods - 24th International Conference, TABLEAUX 2015, Wroclaw, Poland, September 21-24, 2015. Proceedings, pp. 307-322, DOI: 10.1007/978-3-319-24312-2₂₁,
[Online-Edition: https://doi.org/10.1007/978-3-319-24312-2_21],
[Conference or Workshop Item]

Butin, Denis and Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015), IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis and Gazdag, Stefan-Lukas and Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Balasch, Josep and Faust, Sebastian and Gierlichs, Benedikt (2015):
Inner Product Masking Revisited.
2015, In: IACR Cryptology ePrint Archive, p. 105, [Online-Edition: http://eprint.iacr.org/2015/105],
[Article]

Binnig, Carsten and Salama, Abdallah and Zamanian, Erfan and El-Hindi, Muhammad and Feil, Sebastian and Ziegler, Tobias (2015):
Spotgres-parallel data analytics on spot instances.
In: Data Engineering Workshops (ICDEW), 2015 31st IEEE International Conference on, pp. 14-21, [Conference or Workshop Item]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2015):
Candidate Evaluation Strategies for Improved Difficulty Prediction of Language Tests.
In: Proceedings of the Tenth Workshop on Innovative Use of NLP for Building Educational Applications held in conjunction with NAACL 2015, pp. 1-11, [Online-Edition: http://aclweb.org/anthology/W15-0601],
[Conference or Workshop Item]

Benikova, Darina and Yimam, Seid Muhie and Santhanam, Prabhakaran and Biemann, Chris (2015):
GermaNER: Free Open German Named Entity Recognition Tool.
In: International Conference of the German Society for Computational Linguistics and Language Technology (GSCL-2015), Campus Essen, Germany, [Conference or Workshop Item]

Bollmann, Dominik and Lortz, Steffen and Mantel, Heiko and Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS), [Conference or Workshop Item]

Bechtold, Oskar (2015):
An Interaction Concept for Wearable Low-resolution LED Displays to Increase Traffic Safety.
TU Darmstadt, [Bachelor Thesis]

Bernard, Jürgen and Daberkow, Debora and Fellner, Dieter W. and Fischer, Katrin and Koepler, Oliver and Kohlhammer, Jörn and Runnwerth, Mila and Ruppert, Tobias and Schreck, Tobias and Sens, Irina (2015):
VisInfo: A Digital Library System for Time Series Research Data Based on Exploratory Search - a User-centered Design Approach.
16, In: International Journal on Digital Libraries, (1), pp. 37-59, DOI: 10.1007/s00799-014-0134-y,
[Article]

Bernard, Jürgen and Steiger, Martin and Mittelstädt, Sebastian and Thum, Simon and Keim, Daniel A. and Kohlhammer, Jörn (2015):
A Survey and Task-Based Quality Assessment of Static 2D Colormaps.
In: Proceedings of SPIE; 9397, SPIE Press, In: Visualization and Data Analysis 2015, DOI: 10.1117/12.2079841,
[Conference or Workshop Item]

Bernhard, Felix (2015):
Benutzerfreundliche Kalibrierung für Tracking von Optical Stereo See-Through Head Worn Displays für Augmented Reality.
TU Darmstadt, [Bachelor Thesis]

Berz, Florian (2015):
Intuitive 3D-Interaktion für Design und Modellierung von volumetrischen Strukturen.
Darmstadt, TU, Master Thesis, 2015, [Master Thesis]

Blahová, Jana and Kirchner, Eric and Dekker, Niels and Lucassen, Marcel and Njo, Lan and van der Lans, Ivo and Urban, Philipp and Huertas, Rafael (2015):
Goniochromatic Difference Between Effect Coatings: Is the Whole More than the Sum of its Parts?
In: Proceedings of SPIE; 9398, SPIE Press, Bellingham, In: Measuring, Modeling, and Reproducing Material Appearance 2015, DOI: 10.1117/12.2083112,
[Conference or Workshop Item]

Bockholt, Ulrich and Roth, Matthias and Lengowski, Stefan and Olbrich, Manuel and Schwerdtfeger, Björn and Staack, Ingo (2015):
Zeichnungslose Fertigung - AR-Überlagerung von PMI (Product and Manufacturing Information) auf die zu fertigenden Baugruppen.
In: 18. IFF-Wissenschaftstage 2015, pp. 245-251, [Conference or Workshop Item]

Braun, Andreas and Frank, Sebastian and Majewski, Martin and Wang, Xiaofeng (2015):
CapSeat - Capacitive Proximity Sensing for Automotive Activity Recognition.
ACM Press, New York, In: The 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications. Proceedings, pp. 225-232, DOI: 10.1145/2799250.2799263,
[Conference or Workshop Item]

Braun, Andreas and Frank, Sebastian and Wichert, Reiner (2015):
The Capacitive Chair.
In: Lecture Notes in Computer Science (LNCS); 9189, In: Distributed, Ambient, and Pervasive Interactions, Proceedings, Springer International Publishing, In: Distributed, Ambient, and Pervasive Interactions, Third International Conference, DAPI 2015, pp. 397-407, DOI: 10.1007/978-3-319-20804-6₃₆,
[Conference or Workshop Item]

Braun, Andreas and Schembri, Ingrid and Frank, Sebastian (2015):
ExerSeat - Sensor-Supported Exercise System for Ergonomic Microbreaks.
In: Lecture Notes in Computer Science (LNCS); 9425, Springer, In: Ambient Intelligence, 12th European Conference, AmI 2015, pp. 236-251, DOI: 10.1007/978-3-319-26005-1₁₆,
[Conference or Workshop Item]

Braun, Andreas and Wichert, Reiner and Kuijper, Arjan and Fellner, Dieter W. (2015):
Capacitive Proximity Sensing in Smart Environments.
7, In: Journal of Ambient Intelligence and Smart Environments, (4), pp. 483-510, DOI: 10.3233/AIS-150324,
[Article]

Brodkorb, Felix and Heucher, Johannes and Dundukov, Eugen (2015):
Interactive Analysis of Movement and Communication Data by Animation.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE Conference on Visual Analytics Science and Technology, pp. 125-126, DOI: 10.1109/VAST.2015.7347642,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Ginters, Egils (2015):
Best-Practice Piloting Based on an Integrated Social Media Analysis and Visualization for E-Participation Simulation in Cities.
75, In: Procedia Computer Science online, pp. 66-74, DOI: 10.1016/j.procs.2015.12.214,
[Article]

Burkhardt, Dirk and Nazemi, Kawa and Kohlhammer, Jörn (2015):
Policy Modeling Methodologies.
Hershey, Pennsylvania, IGI Global, pp. 512-524, DOI: 10.4018/978-1-4666-8358-7.ch023,
[Book Section]

Burkhardt, Dirk and Nazemi, Kawa and Zilke, Jan Ruben and Kohlhammer, Jörn and Kuijper, Arjan (2015):
Fundamental Aspects for E-Government.
IGI Global, pp. 52-68, DOI: 10.4018/978-1-4666-8111-8.ch003,
[Book Section]

Bißmeyer, Norbert (2014):
Misbehavior Detection and Attacker Identification in Vehicular Ad-hoc Networks.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4257],
[Ph.D. Thesis]

Brinker, Christian and Loza Mencía, Eneldo and Fürnkranz, Johannes (2014):
Graded Multilabel Classification by Pairwise Comparisons.
Shenzhen, China, Curran Associates, IEEE, In: 2014 IEEE International Conference on Data Mining (ICDM 2014), Shenzhen, China, pp. 731-736, ISSN 1550-4786, ISBN 978-1-4799-4303-6,
[Online-Edition: http://www.ke.tu-darmstadt.de/publications/papers/ICDM14grad...],
[Conference or Workshop Item]

Berlin, Eugen (2014):
Early Abstraction of Inertial Sensor Data for Long-Term Deployments.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4225],
[Ph.D. Thesis]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2014):
Predicting the Difficulty of Language Proficiency Tests.
2, In: Transactions of the Association for Computational Linguistics, (1), pp. 517-529, [Online-Edition: http://aclweb.org/anthology/Q14-1040],
[Article]

Buchmann, Nicolas and Baier, Harald (2014):
Towards a more secure and scalable verifying PKI of eMRTD.
22, In: Journal of Computer Security, (6), pp. 1025-1049, [Article]

Baecher, Paul (2014):
Cryptographic Reductions: Classification and Applications to Ideal Models.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4000],
[Ph.D. Thesis]

Becker, Meike (2014):
Patientenspezifische Planung für die Multi-Port Otobasischirurgie.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4180],
[Ph.D. Thesis]

Braun, Andreas (2014):
Application and validation of capacitive proximity sensing systems in smart environments.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4175],
[Ph.D. Thesis]

Borges, Fábio and Martucci, Leonardo A. (2014):
iKUP Keeps Users' Privacy in the Smart Grid.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014, p. 509, [Conference or Workshop Item]

Borges, Fábio and Buchmann, Johannes and Mühlhäuser, Max (2014):
Introducing Asymmetric DC-Nets.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014, pp. 508 - 509 , [Conference or Workshop Item]

Burger, Michael and Bischof, Christian Mehl, Miriam (ed.) (2014):
Using Instancing to Efficiently Render Carbon Nanotubes.
3, In: 3rd International Workshop on Computational Engineering, Stuttgart, Germany, pp. 206-210, [Online-Edition: http://ipvs.informatik.uni-stuttgart.de/SGS/ICCE2014/],
[Conference or Workshop Item]

Burrows, Steven and Gurevych, Iryna and Stein, Benno (2014):
The Eras and Trends of Automatic Short Answer Grading.
25, In: International Journal of Artificial Intelligence in Education, (1), pp. 60-117, DOI: 10.1007/s40593-014-0026-8,
[Online-Edition: https://link.springer.com/article/10.1007/s40593-014-0026-8],
[Article]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session), San Francisco, USA, [Conference or Workshop Item]

Buchmann, Johannes and Bischof, Christian and Dagdelen, Özgür and Fitzpatrick, Robert and Göpfert, Florian and Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference or Workshop Item]

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, pp. 1 - 8, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Borazio, Marko Antonio Matteo (2014):
Rhythm Modelling of Long-Term Activity Data.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4290],
[Ph.D. Thesis]

Borges, Fábio and Martucci, Leonardo A. and Beato, Filipe and Mühlhäuser, Max (2014):
Secure and Privacy-Friendly Public Key Generation and Certification.
IEEE CS, In: Proceedings of the 13th IEEE TrustCom 2014, [Conference or Workshop Item]

Buchmann, Johannes and El Bansarkhani, Rachid and Hauke, Sascha Brunetti, Gino and Feld, Thomas and Heuser, Lutz and Schnittner, Joachim and Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, pp. 67-80, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, pp. 2069-2078, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, pp. 1415-1426, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Beckerle, Philipp and Schültje, F. and Wojtusch, J. and Christ, O. (2014):
Implementation, Control and User-Feedback of the Int²Bot for the Investigation of Lower Limb Body Schema Integration.
In: Proceedings of IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), In: IEEE International Symposium on Robot and Human Interactive Communication, Edinburgh, Schottland, 25. – 29. August 2014, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian (2014):
Optimizing the Memory Access Performance of FASTEST's Sispol Routine.
11, In: World Congress on Computational Mechanics, Barcelona, Spain, [Online-Edition: http://www.wccm-eccm-ecfd2014.org/admin/files/filePaper/p153...],
[Conference or Workshop Item]

Borges, Fábio and Demirel, Denise and Böck, Leon and Buchmann, Johannes and Mühlhäuser, Max (2014):
A Privacy-Enhancing Protocol that Provides In-Network Data Aggregation and Verifiable Smart Meter Billing.
In: IEEE Symposium on Computers and Communications (ISCC), In: 19th IEEE Symposium on Computers and Communications (ISCC 2014), Funchal, Portugal, pp. 1-6, DOI: 10.1109/ISCC.2014.6912612,
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
71, In: Designs, Codes and Cryptography, (3), pp. 459-478, DOI: 10.1007/s10623-012-9747-6,
[Article]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, pp. 187-198, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Online-Edition: https://encrypto.de/papers/BCFPSZ14.pdf],
[Conference or Workshop Item]

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie Tryfonas, Theo and Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, pp. 400-409, [Conference or Workshop Item]

Buchmann, Nicolas and Rathgeb, Christian and Baier, Harald and Busch, Christoph (2014):
Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area.
In: Proceedings of the 2nd Annual Privacy Forum (APF’14), [Article]

Budurushi, Jurlind and Volkamer, Melanie Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, pp. 141-152, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
19, In: Journal of Information Security and Applications, (2), pp. 1-10, DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Beckerle, Philipp and Wojtusch, Janis and Rinderknecht, Stephan and Stryk, Oskar von (2014):
Analysis of System Dynamic Influences in Robotic Actuators with Variable Stiffness.
13, In: Smart Structures and Systems, (4), pp. 711-730, DOI: 10.12989/sss.2014.13.4.711,
[Article]

Bergmann, Clemens and Canova, Gamze (2014):
Design, Implementation and Evaluation of an Anti-Phishing Education App.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3763],
[Master Thesis]

Busold, Christoph and Dmitrienko, Alexandra and Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, pp. 168-171, [Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127, DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Berger, Kai and Kastner, Marc and Schroeder, Yannic and Guthe, Stefan (2014):
Using Sparse Optical Flow for Two-Phase Gas Flow Capturing with Multiple Kinect.
In: Computer Vision and Machine Learning with RGB-D Sensors, Springer International Publishing, pp. 157-169, [Book Section]

Beckerle, Matthias (2014):
Usable Access Control.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3828],
[Ph.D. Thesis]

Breitinger, Frank (2014):
On the utility of bytewise approximate matching in computer science with a special focus on digital forensics investigations.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4055],
[Ph.D. Thesis]

Biedermann, Alexander (2014):
Design Concepts for a Virtualizable Embedded MPSoC Architecture : Enabling Virtualization in Embedded Multi-Processor Systems.
Wiesbaden, Springer Vieweg, TU Darmstadt, ISBN 3-658-08046-9 ; 978-3-658-08046-4,
[Ph.D. Thesis]

Borges, Fábio and Mühlhäuser, Max (2014):
EPPP4SMS: Efficient Privacy-Preserving Protocol for Smart Metering Systems and Its Simulation Using Real-World Data.
In: IEEE Transactions on Smart Grid, pp. 2701 - 2708, ISSN 1949-3053, [Article]

Brinker, Christian and Loza Mencía, Eneldo and Fürnkranz, Johannes (2014):
Graded Multilabel Classification by Pairwise Comparisons.
[Online-Edition: http://www.ke.tu-darmstadt.de/publications/reports/tud-ke-20...],
[Report]

Bernard, Jürgen and Steiger, Martin and Widmer, Sven and Lücke-Tieke, Hendrik and May, Thorsten and Kohlhammer, Jörn (2014):
Visual-interactive Exploration of Interesting Multivariate Relations in Mixed Research Data Sets.
33, In: Computer Graphics Forum, (3), Wiley Online Library, pp. 291-300, [Article]

Beckert, Bernhard and Hähnle, Reiner (2014):
Reasoning and Verification: State of the Art and Current Trends.
29, In: IEEE Intelligent Systems, (1), pp. 20-29, DOI: 10.1109/MIS.2014.3,
[Online-Edition: https://doi.org/10.1109/MIS.2014.3],
[Article]

Buchner, Karolina and Lissermann, Roman and Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, ACM, pp. 1819-1824, [Conference or Workshop Item]

Borgert, Stephan and Mühlhäuser, Max Nanopoulos, Alexandros and Schmidt, Werner (eds.) (2014):
Formal Based Correctness Check for ePASS-IoS 1.1 Process Models with Integrated User Support for Error Correcting.
In: Lecture Notes in Business Information Processing, 170, In: {S-BPM} {ONE} - Scientific Research - 6th International Conference, {S-BPM} {ONE} 2014, Eichst{\"{a}}tt, Germany, April 22-23, 2014. Proceedings, Springer, pp. 20--40, DOI: 10.1007/978-3-319-06065-1_2,
[Conference or Workshop Item]

Borgert, Stephan and Mühlhäuser, Max Nanopoulos, Alexandros and Schmidt, Werner (eds.) (2014):
A {S-BPM} Suite for the Execution of Cross Company Subject Oriented Business Processes.
In: Lecture Notes in Business Information Processing, 170, In: {S-BPM} {ONE} - Scientific Research - 6th International Conference, {S-BPM} {ONE} 2014, Eichst{\"{a}}tt, Germany, April 22-23, 2014. Proceedings, Springer, pp. 161--170, DOI: 10.1007/978-3-319-06065-1_12,
[Conference or Workshop Item]

Borgert, Stephan and Münch, Daniel and Heuser, Lutz (2014):
Facility Management by Means of Subject Oriented Cross Organizational Business Process Management.
In: {IEEE} 16th Conference on Business Informatics, {CBI} 2014, Geneva, Switzerland, July 14-17, 2014 - Volume 2, {IEEE} Computer Society, pp. 85--92, DOI: 10.1109/CBI.2014.59,
[Conference or Workshop Item]

Bodden, E. and Maoz, S. (2014):
Special Section on Runtime Verification and Analysis.
In: Transactions on Aspect-Oriented Software Development (TAOSD), Springer, [Conference or Workshop Item]

Bubel, Richard and Hähnle, Reiner and Pelevina, Maria (2014):
Fully Abstract Operation Contracts.
In: LNCS, In: Proceedings 6th International Symposium On Leveraging Applications of Formal Methods, Springer, [Conference or Workshop Item]

Bubel, Richard and Montoya, Antonio Flores and Hähnle, Reiner Bernardo, M. and Damiani, F. and Hähnle, R. and Johnsen, E. B. and Schaefer, I. (eds.) (2014):
Analysis of Executable Software Models.
In: LNCS, In: SFM 2014, Springer, DOI: 10.1007/978-3-319-07317-0_1,
[Conference or Workshop Item]

Bagci, Ibrahim Ethem and Roedig, Utz and Schulz, Matthias and Hollick, Matthias (2014):
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
In: Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 183-188, DOI: 10.1145/2627393.2627405,
[Conference or Workshop Item]

Basin, David and Caronni, Germano and Ereth, Sarah and Harvan, Matus and Klaedtke, Felix and Mantel, Heiko (2014):
Scalable Offline Monitoring.
Heidelberg, Germany, Springer, In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, pp. 31-47, [Conference or Workshop Item]

Binnig, Carsten and Hildenbrand, Stefan and Färber, Franz and Kossmann, Donald and Lee, Juchang and May, Norman (2014):
Distributed snapshot isolation: global transactions pay globally, local transactions pay locally.
23, In: The VLDB Journal, (6), Springer Berlin Heidelberg, pp. 987-1011, [Article]

Binnig, Carsten and Salama, Abdallah and Zamanian, Erfan (2014):
DoomDB: kill the query.
In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, pp. 913-916, [Conference or Workshop Item]

Binnig, Carsten and Salama, Abdallah and Zamanian, Erfan and Kornmayer, Harald and Listing, Sven and Mueller, Alexander C (2014):
XDB-A novel Database Architecture for Data Analytics as a Service.
In: Big Data (BigData Congress), 2014 IEEE International Congress on, pp. 96-103, [Conference or Workshop Item]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna (2014):
Readability for foreign language learning: The importance of cognates.
165, In: International Journal of Applied Linguistics, (2), pp. 136-162, [Online-Edition: https://www.jbe-platform.com/content/journals/10.1075/itl.16...],
[Article]

Benikova, Darina and Fahrer, Uli and Gabriel, Alexander and Kaufmann, Manuel and Yimam, Seid Muhie and Landesberger, Tatiana von and Biemann, Chris (2014):
Network of the Day: Aggregating and Visualizing Entity Networks from Online Sources.
In: Proceedings of the NLP4CMC Workshop at KONVENS, [Conference or Workshop Item]

Benikova, Darina and Biemann, Chris and Reznicek, Marc (2014):
NoSta-D Named Entity Annotation for German: Guidelines and Dataset.
In: Proceedings of LREC-14, [Conference or Workshop Item]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
38, In: Datenschutz und Datensicherheit - DuD, (2), Springer Gabler Verlag, pp. 98-102, [Article]

Beinborn, Lisa (2014):
Book Review: Multilingual Corpora and Multilingual Corpus Analyses.
11, In: International Journal of Multilingualism, (2), pp. 266-268, DOI: 10.1080/14790718.2013.788268,
[Online-Edition: https://www.tandfonline.com/doi/pdf/10.1080/14790718.2013.78...],
[Article]

Brandl, S. and Kroemer, O. and Peters, J. (2014):
Generalizing Pouring Actions Between Objects using Warped Parameters.
In: International Conference on Humanoid Robots (HUMANOIDS), Madrid, November 18-20th, 2014, [Online-Edition: http://www.ias.tu-darmstadt.de/uploads/Site/EditPublication/...],
[Conference or Workshop Item]

Bocsi, B. and Csato, L. and Peters, J. (2014):
Indirect Robot Model Learning for Tracking Control.
In: Advanced Robotics, [Online-Edition: http://www.ias.tu-darmstadt.de/uploads/Publications/Bocsi_AR...],
[Article]

Bischoff, B. and Nguyen-Tuong, D. and van Hoof, A. and Rasmussen, C. E. and Knoll, A. and Peters, J. and Deisenroth, M. P. (2014):
Policy Search For Learning Robot Control Using Sparse Data.
In: Proceedings of 2014 IEEE International Conference on Robotics and Automation (ICRA), [Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=690...],
[Conference or Workshop Item]

Ben Amor, H. and Neumann, G. and Kamthe, S. and Kroemer, O. and Peters, J. (2014):
Interaction Primitives for Human-Robot Cooperation Tasks.
In: Proceedings of 2014 IEEE International Conference on Robotics and Automation (ICRA), [Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=690...],
[Conference or Workshop Item]

Braun, Andreas and Wichert, Reiner and Kuijper, Arjan and Fellner, Dieter W. (2014):
A Benchmarking Model for Sensors in Smart Environments.
In: Lecture Notes in Computer Science (LNCS); 8850, Springer, Berlin, Heidelberg, New York, In: Ambient Intelligence, pp. 242-257, DOI: 10.1007/978-3-319-14112-1₂₀,
[Conference or Workshop Item]

Becker, Meike and Hansen, Stefan and Wesarg, Stefan and Sakas, Georgios (2014):
Path Planning for Multi-port Lateral Skull Base Surgery Based on First Clinical Experiences.
In: Lecture Notes in Computer Science (LNCS); 8361, Springer, Berlin, Heidelberg, New York, In: Clinical Image-Based Procedures. Translational Research in Medical Imaging, pp. 23-30, DOI: 10.1007/978-3-319-05666-1₄,
[Conference or Workshop Item]

Braun, Andreas and Cieslik, Silvana and Zmugg, René and Wichert, Reiner and Klein, Peter and Havemann, Sven and Wagner, Tobias (2014):
V2me - Virtuelles Coaching für Senioren.
VDE-Verlag GmbH, Berlin, Offenbach, In: Wohnen - Pflege - Teilhabe. Besser leben durch Technik, p. 5, [Conference or Workshop Item]

Behrisch, Michael and Davey, James and Fischer, Fabian and Thonnard, Olivier and Schreck, Tobias and Keim, Daniel A. and Kohlhammer, Jörn (2014):
Visual Analysis of Sets of Heterogeneous Matrices Using Projection-Based Distance Functions and Semantic Zoom.
33, In: Computer Graphics Forum, (3), pp. 411-420, DOI: 10.1111/cgf.12397,
[Article]

Burkhardt, Dirk and Nazemi, Kawa and Kohlhammer, Jörn (2014):
Policy Modeling Methodologies.
IGI Global, Hershey, Pennsylvania, pp. 48-60, [Book Section]

Bernard, Jürgen and Sessler, David and Ruppert, Tobias and Davey, James and Kuijper, Arjan and Kohlhammer, Jörn (2014):
User-Based Visual-Interactive Similarity Definition for Mixed Data Objects - Concept and First Implementation.
University of West Bohemia, Plzen, In: WSCG 2014. Communication Papers Proceedings, pp. 329-338, [Conference or Workshop Item]

Baar, Teun and Samadzadegan, Sepideh and Brettel, Hans and Urban, Philipp and Segovia, Maria V. Ortiz (2014):
Printing Gloss Effects in a 2.5D System.
In: Proceedings of SPIE; 9018, SPIE Press, Bellingham, In: Measuring, Modeling, and Reproducing Material Appearance, pp. 90180M-1-90180M-8, DOI: 10.1117/12.2039792,
[Conference or Workshop Item]

Bernard, Jürgen and Hutter, Marco and Sessler, David and Schreck, Tobias and Behrisch, Michael and Kohlhammer, Jörn (2014):
Towards a User-Defined Visual-Interactive Definition of Similarity Functions for Mixed Data.
IEEE Computer Society, Los Alamitos, Calif., In: IEEE Conference on Visual Analytics Science and Technology. Proceedings, pp. 227-228, DOI: 10.1109/VAST.2014.7042503,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Retz, Wilhelm and Kohlhammer, Jörn (2014):
Visual Explanation of Government-Data for Policy Making through Open-Data Inclusion.
IEEE, In: International Conference for Internet Technology and Secured Transactions, pp. 83-89, DOI: 10.1109/ICITST.2014.7038782,
[Conference or Workshop Item]

Butt, Moazzam and Henniger, Olaf and Nouak, Alexander and Kuijper, Arjan (2014):
Privacy Protection of Biometric Templates.
In: Communications in Computer and Information Science (CCIS); 434, Springer, Berlin, Heidelberg, New York, In: HCI International 2014 - Posters' Extended Abstracts. Proceedings Part I, pp. 153-158, DOI: 10.1007/978-3-319-07857-1₂₇,
[Conference or Workshop Item]

Braun, Andreas and Schmidt, Sönke and Kuijper, Arjan and Neumann, Stephan and Wichert, Reiner (2014):
Towards Interactive Car Interiors - the Active Armrest.
ACM, New York, In: NordiCHI '14, pp. 911-914, DOI: 10.1145/2639189.2670191,
[Conference or Workshop Item]

Brandherm, Florian (2014):
Automatic Appearance-Preserving Generation of Compact 3D Models for the Web.
TU Darmstadt, [Bachelor Thesis]

Burkhardt, Dirk and Nazemi, Kawa and Encarnação, José Daniel and Retz, Wilhelm and Kohlhammer, Jörn (2014):
Visualization Adaptation Based on Environmental Influencing Factors.
In: Lecture Notes in Computer Science (LNCS); 8510, Springer, Berlin, Heidelberg, New York, In: Human-Computer Interaction: Part 1, pp. 411-422, DOI: 10.1007/978-3-319-07233-3₃₈,
[Conference or Workshop Item]

Becker, Meike and Kirschner, Matthias and Sakas, Georgios (2014):
Segmentation of Risk Structures for Otologic Surgery using the Probabilistic Active Shape Model.
In: Proceedings of SPIE; 9036, SPIE Press, Bellingham, In: Medical Imaging 2014: Image-Guided Procedures, Robotic Interventions, and Modeling, pp. 90360O-1-90360O-7, DOI: 10.1117/12.2043411,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Parisay, Mohsen and Kohlhammer, Jörn (2014):
Visual Correlation Analysis to Explain Open Government Data based on Linked-Open Data for Decision Making.
5, In: International Journal of Digital Society, (3), pp. 915-923, DOI: 10.20533/ijds.2040.2570.2014.0116,
[Article]

Bockholt, Ulrich (2014):
Fusing Web Technologies & Augmented Reality.
IEEE Service Center, Piscataway, NJ, In: IEEE International Symposium on Mixed and Augmented Reality - Science & Technology 2014, p. 1, DOI: 10.1109/ISMAR.2014.6948509,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Klamm, Christopher and Kohlhammer, Jörn and Kuijper, Arjan (2014):
Comparison of e-Participation Roadmap in Industrial and Developing Countries based on Germany and Kenya.
ACM Press, New York, In: ICEGOV 2014, pp. 399-402, DOI: 10.1145/2691195.2691209,
[Conference or Workshop Item]

Burkhardt, Dirk and Nazemi, Kawa and Kohlhammer, Jörn (2014):
Visual Process Support to Assist Users in Policy Making.
IGI Global, Hershey, Pennsylvania, pp. 149-162, [Book Section]

Bockholt, Ulrich and Behr, Johannes and Wagner, Sebastian and Limper, Max and Olbrich, Manuel and Franke, Tobias (2014):
VR/AR-Technologien im Browser: Effiziente Integration virtueller Technologien ins PDM-Umfeld durch Nutzung von Web-Technologien.
In: 17. IFF-Wissenschaftstage 2014. Tagungsband, pp. 103-108, [Conference or Workshop Item]

Buchta, Arthur (2014):
Entwicklung eines mechatronischen Systems zur Reduktion von Interferenzen zwischen RGB-D-Kameras.
TU Darmstadt, Department of Computer Science (SIM), [Bachelor Thesis]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Biemann, Chris and Bildhauer, Felix and Evert, Stefan and Goldhahn, Dirk and Quasthoff, Uwe and Schäfer, Roland and Simon, Johannes and Swiezinski, Leonard and Zesch, Torsten (2013):
Scalable Construction of High-Quality Web Corpora.
28, In: JLCL, (2), pp. 23-59, [Article]

Bär, Daniel (2013):
A Composite Model for Computing Similarity Between Texts.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3641],
[Ph.D. Thesis]

Beinborn, Lisa and Zesch, Torsten and Gurevych, Iryna Mitkov, Ruslan and Park, Jong (eds.) (2013):
Cognate Production using Character-based Machine Translation.
In: Proceedings of the Sixth International Joint Conference on Natural Language Processing, Asian Federation of Natural Language Processing, Nagoya, Japan, pp. 883-891, [Online-Edition: http://www.aclweb.org/anthology/I13-1112],
[Conference or Workshop Item]

Biemann, Chris and Riedl, Martin (2013):
From Global to Local Similarities: A Graph-Based Contextualization Method using Distributional Thesauri.
In: Proceedings of the 8th Workshop on TextGraphs in conjunction with EMNLP 2013, pp. 39-43, [Online-Edition: http://aclweb.org/anthology/W13-50],
[Article]

Biedermann, Alexander and Dreyer, Boris and Huss, Sorin A. (2013):
A generic, scalable reconfiguration infrastructure for sensor networks functionality adaption.
In: 2013 IEEE 26th International SOC Conference (SOCC), [Online-Edition: http://ieeexplore.ieee.org/document/6749705/],
[Conference or Workshop Item]

Bodden, Eric and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2013):
Reducing human factors in software security architectures.
In: Future Security Conference 2013, [Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf],
[Conference or Workshop Item]

Braun, Johannes and Kiefer, Franziskus and Hülsing, Andreas Katsikas, Sokratis and Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, Springer Berlin Heidelberg, RHUL, Egham, UK, pp. 31-46, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Braun, Johannes and Volk, Florian and Buchmann, Johannes and Mühlhäuser, Max Katsikas, Sokatis and Agudo, Isaac (eds.) (2013):
Trust Views for the Web PKI.
In: LNCS, Springer Berlin Heidelberg, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, pp. 134-151, ISSN 0302-9743, [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, Gesellschaft für Informatik, Koblenz, pp. 1971-1984, [Conference or Workshop Item]

Barekatain, Behrang and Khezrimotlagh, Dariush and Aizaini Maarof, Mohd and Ghaeini, Hamid Reza and Salleh, Shaharuddin and Ariza Quintana, Alfonso and Akbari, Behzad and Trivino Cabrera, Alicia (2013):
MATIN: A random network coding based framework for high quality peer-to-peer live video streaming.
8, In: PloS one, (8), pp. e69844, DOI: 10.1371/journal.pone.0069844,
[Article]

Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing, Springer, pp. 157 - 158, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Darmstadt, Technische Universität, [Bachelor Thesis]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2013):
Less is more: relaxed yet composable security notions for key exchange.
12, In: Int. J. Inf. Sec, (4), pp. 267-297, [Article]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference or Workshop Item]

Bär, Daniel and Zesch, Torsten and Gurevych, Iryna (2013):
DKPro Similarity: An Open Source Framework for Text Similarity.
In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (System Demonstrations) (ACL 2013), Association for Computational Linguistics, Sofia, Bulgaria, pp. 121-126, [Online-Edition: http://www.aclweb.org/anthology/P13-4021],
[Conference or Workshop Item]

Biehl, Robert (2013):
Part based object detection with a flexible context constraint.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6868],
[Diploma Thesis or Magisterarbeit]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, pp. 176 - 192, [Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2013):
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
ACM Transactions on Softw, In: Software Engineering Top Journals, Rank 5, [Article]

Beckerle, Matthias and Martucci, Leonardo (2013):
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
In: Symposium on Usable Privacy and Security (SOUPS) 2013, pp. 1-11, [Conference or Workshop Item]

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, pp. 752 - 766, [Conference or Workshop Item]

Bartsch, Steffen and Berger, Bernhard and Bunke, Michaela and Sohr, Karsten Pernul, Günther and Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), IEEE, University of Surrey, Guildford, UK, pp. 291 - 296, [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, pp. 61-75, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, pp. 198-207, [Conference or Workshop Item]

Bračevac, Oliver (2013):
A Formal Model for Event Correlation in Information Flow Processing.
TU Darmstadt, [Master Thesis]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf],
[Conference or Workshop Item]

Berchtold, Waldemar and Schäfer, Marcel and Steinebach, Martin (2013):
Leakage Detection and Tracing for Databases.
In: Proceedings of The 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), June 17-19, 2013 Montpellier, France, [Conference or Workshop Item]

Bleikertz, Sören and Bugiel, Sven and Ideler, Hugo and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference or Workshop Item]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, pp. 205-222, [Conference or Workshop Item]

Baumöller, Claas and Schaaf, Joachim and Horsch, Moritz and Wiesmaier, Alexander and Braun, Johannes (2013):
EP 2600270 Identification element-based authentication and identification with decentralised service use.
[Standards, patents]

Braun, Johannes and Horsch, Moritz and Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, pp. 347-359, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and van de Graaf, Jeroen Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, pp. 197-204, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Biemann, Chris and Riedl, Martin (2013):
Text: Now in 2D! A Framework for Lexical Expansion with Contextual Similarity.
1, In: Journal of Language Modelling, (1), pp. 55-95, [Online-Edition: http://jlm.ipipan.waw.pl/index.php/JLM/issue/view/7],
[Article]

Becker, Daniel and Geimer, Markus and Rabenseifner, Rolf and Wolf, Felix (2013):
Extending the scope of the controlled logical clock.
16, In: Cluster Computing, (1), Springer, pp. 171-189, ISSN 1386-7857, DOI: 10.1007/s10586-011-0181-8,
[Article]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science, 7779, In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, pp. 189–206, [Conference or Workshop Item]

Blass, Erik-Oliver and Kurmus, Anil and Molva, Refik and Strufe, Thorsten (2013):
PSP: Private and Secure Payment with RFID.
36, In: Computer Communications, (4), pp. 468-480, [Article]

Busold, Christoph and Dmitrienko, Alexandra and Seudié, Hervé and Taha, Ahmed and Sobhani, Majid and Wachsmann, Christian and Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13, In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, pp. 233-242, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, pp. 4966-4976, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Brzuska, Christina (2013):
On the Foundations of Key Exchange.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3414],
[Ph.D. Thesis]

Bremm, Sebastian (2013):
Visual Analytics Approaches for Descriptor Space Comparison and the Exploration of Time Dependent Data.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3719],
[Ph.D. Thesis]

Bayer, Daniel (2013):
Theorie und Anwendung der impulsbasierten Dynamiksimulation.
Göttingen, Optimus-Verl., TU Darmstadt, ISBN 978-3-86376-058-8,
[Ph.D. Thesis]

Berger, Kai and Schroeder, Yannic and Guthe, Stefan and Kastner, Marc Aurel (2013):
Using sparse optical flow for multiple Kinect applications.
In: Robotics: science and systems 2013 workshop on rgb-d: advanced reasoning with depth cameras, pp. 1-8, [Conference or Workshop Item]

Bjorner, Nikolaj and Hähnle, Reiner and Nipkow, Tobias and Weidenbach, Christoph (2013):
Deduction and Arithmetic (Dagstuhl Seminar 13411).
3, In: Dagstuhl Reports, (10), pp. 1-24, DOI: 10.4230/DagRep.3.10.1,
[Online-Edition: https://doi.org/10.4230/DagRep.3.10.1],
[Article]

Beckerle, P. and Lahnstein, L. and Wojtusch, Janis and Rinderknecht, Stephan and Stryk, Oskar von (2013):
Conception and Design of a Hardware Simulator for Restoring Lost Biomechanical Function.
In: IEEE International Conference on Systems, Man and Cybernetics (SMC), [Conference or Workshop Item]

Beckerle, P. and Stuhlenmiller, F. and Schuy, J. and Rinderknecht, Stephan and Stryk, Oskar von and Wojtusch, Janis (2013):
Friction Compensation and Stiffness Evaluation on a Variable Torsion Stiffness.
In: International Symposium on Adaptive Motion of Animals and Machines (AMAM), [Conference or Workshop Item]

Beckerle, P. and Wojtusch, Janis and Schuy, J. and Strah, B. and Rinderknecht, Stephan and Stryk, Oskar von (2013):
Power-optimized Stiffness and Nonlinear Position Control of an Actuator with Variable Torsion Stiffness.
In: IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), [Conference or Workshop Item]

Böker, S. and Beckerle, P. and Wojtusch, Janis and Rinderknecht, Stephan (2013):
A Novel Design Approach and Operational Strategy for an Active Ankle-Foot Prosthesis.
In: International Symposium on Adaptive Motion of Animals and Machines (AMAM), [Conference or Workshop Item]

Beckerle, P. and Christ, O. and Windrich, M. and Rinderknecht, Stephan and Vogt, J. and Wojtusch, Janis (2013):
A methodological approach to integrate psychological factors to lower limb prosthetic functional design.
In: International Society of Prosthetics and Orthotics World Congress (ISPO), [Conference or Workshop Item]

Binder, W. and Bodden, E. and Löwe, W. (2013):
Proceedings of the 12th International Conference on Software Composition.
Springer, In: Lecture Notes in Computer Science, [Article]

Bender, J. and Fischlin, M. and Kügler, D. (2013):
The PACE|CA Protocol for Machine Readable Travel Documents.
8292, In: Lecture Notes in Computer Science, pp. 17-35, [Article]

Baecher, Paul and Brzuska, Christina and Fischlin, Marc (2013):
Notions of Black-Box Reductions.
8269, In: Lecture Notes in Computer Science, pp. 269-315, [Article]

Baecher, Paul and Farshim, Pooya and Fischlin, Marc and Stam, Martijn (2013):
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
7881, In: Lecture Notes in Computer Science, pp. 426-443, [Article]

Busch, Christoph and Pflug, Anika and Zhou, Xuebing and Dose, Michael and Brauckmann, Michael and Helbig, Jörg and Opel, Alexander and Neugebauer, Peter and Leowski, Katja and Sieber, Harald and Lotz, Oliver (2013):
Multi-Biometrische Gesichtserkennung.
In: Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Biedermann, Sebastian and Zittel, Martin and Katzenbeisser, Stefan (2013):
Improving security of virtual machines during live migrations.
In: IEEE Press, pp. 352-357, [Article]

Buchmann, Nicolas and Baier, Harald (2013):
Towards a more secure and scalable verifying PKI of eMRTD.
In: EuroPKI 2013, [Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan (2013):
POSTER: Event-based Isolation of Critical Data in the Cloud.
[Article]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Buchmann, Johannes and Cabarcas, Daniel and Göpfert, Florian and Hülsing, Andreas and Weiden, Patrick Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, pp. 402-417, [Conference or Workshop Item]

Braun, Johannes and Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, Washington D.C., USA, pp. 600-605, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science, In: Advances in Cryptology - ASIACRYPT 2013, Springer, pp. 154-173, [Conference or Workshop Item]

Buchegger, Sonja and Crowcroft, Jon and Krishnamurthy, Balachander and Strufe, Thorsten (2013):
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
3, In: Dagstuhl Reports, (2), pp. 22 -- 44, DOI: 10.4230/DagRep.3.2.22,
[Article]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
3, In: International Journal of Applied Cryptography, (1), pp. 84-96, [Article]

Berger, E. and Vogt, D. and Haji-Ghassemi, N. and Jung, B. and Ben Amor, H. (2013):
Inferring Guidance Information in Cooperative Human-Robot Tasks.
In: Proceedings of the International Conference on Humanoid Robots (HUMANOIDS), [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Bocsi, B. and Csato, L. and Peters, J. (2013):
Alignment-based Transfer Learning for Robot Models.
In: International Joint Conference on Neural Networks (IJCNN), Dallas, Texas, USA, Aug 4, 2013 - Aug 9, 2013, [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Ben Amor, H. and Vogt, D. and Ewerton, M. and Berger, E. and Jung, B. and Peters, J. (2013):
Learning Responsive Robot Behavior by Imitation.
In: Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), [Online-Edition: http://www.ias.informatik.tu-darmstadt.de/uploads/Publicatio...],
[Conference or Workshop Item]

Bernard, Jürgen and Wilhelm, Nils and Krüger, Björn and May, Thorsten and Schreck, Tobias and Kohlhammer, Jörn (2013):
MotionExplorer: Exploratory Search in Human Motion Capture Data Based on Hierarchical Aggregation.
19, In: IEEE Transactions on Visualization and Computer Graphics, (12), pp. 2257-2266, DOI: 10.1109/TVCG.2013.178,
[Article]

Bockholt, Ulrich and Wientapper, Folker and Wuest, Harald and Fellner, Dieter W. (2013):
Augmented-Reality-basierte Interaktion mit Smartphone-Systemen zur Unterstützung von Servicetechnikern.
61, In: at - Automatisierungstechnik, (11), pp. 793-799, DOI: 10.1524/auto.2013.1056,
[Article]

Beutel, Johannes (2013):
Sub-Pixel Accurate Fiducial Marker Detection and Pose Estimation from CBCT-Data.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Berghöfer, Yannick (2013):
Human-Machine-Interfaces in Automotive Environments using Capacitive Proximity Sensors.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Bauer, Fabian (2013):
Realistic Realtime Rendering of Garment with Transparency and Ambient Occlusion.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Brodkorb, Felix (2013):
Visualisierung von Graphen mit geographischem Bezug.
Darmstadt, TU, Master Thesis, 2013, [Master Thesis]

Behrisch, Michael and Davey, James and Simon, Svenja and Schreck, Tobias and Keim, Daniel A. and Kohlhammer, Jörn (2013):
Visual Comparison of Orderings and Rankings.
Eurographics Association, Goslar, In: EuroVA 2013, pp. 7-11, DOI: 10.2312/PE.EuroVAST.EuroVA13.007-011,
[Conference or Workshop Item]

Biehl, Karl Robert (2013):
Part Based Object Detection with a Flexible Context Constraint : Supporting Object Detection with Easy Context.
Darmstadt, TU, Diplomarbeit, 2013, [Master Thesis]

Bauer, Fabian and Knuth, Martin and Kuijper, Arjan and Bender, Jan (2013):
Screen-Space Ambient Occlusion Using A-Buffer Techniques.
IEEE Computer Society Conference Publishing Services (CPS), Los Alamitos, Calif., In: 13th International Conference on Computer-Aided Design and Computer Graphics. Proceedings, pp. 140-147, DOI: 10.1109/CADGraphics.2013.26,
[Conference or Workshop Item]

Bockholt, Ulrich and Wuest, Harald and Wientapper, Folker and Engelke, Timo and Webel, Sabine (2013):
Augmented Reality Assistenzsysteme für Wartung und Service in Industrie, Bau und Gebäudemanagement.
Fraunhofer Verlag, Stuttgart, In: 16. IFF-Wissenschaftstage 2013. Tagungsband, pp. 195-200, [Conference or Workshop Item]

Bockholt, Ulrich and Webel, Sabine and Engelke, Timo and