Details

Displaying results 1 to 20 out of 10259

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
Crowdsourcing a large dataset of domain-specific context-sensitive semantic verb relations
Maria Sukhareva and Judith Eckle-Kohler and Ivan Habernal and Iryna Gurevych
In: Proceedings of the 10th International Conference on Language Resources and Evaluation (LREC 2016), p. (to appear), European Language Resources Association (ELRA), Mai 2016.

Sense-annotating a lexical substitution data set with Ubyline
Tristan Miller and Mohamed Khemakhem and Richard Eckart de Castilho and Iryna Gurevych
In: Proceedings of the 10th International Conference on Language Resources and Evaluation (LREC 2016), p. (to appear), European Language Resources Association (ELRA), Mai 2016.

C4Corpus: Multilingual Web-size corpus with free license
Ivan Habernal and Omnia Zayed and Iryna Gurevych
In: Proceedings of the 10th International Conference on Language Resources and Evaluation (LREC 2016), p. (to appear), European Language Resources Association (ELRA), Mai 2016.

"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden
In: International Conference on Software Engineering, ACM, Mai 2016.
2016.icse.cs.txstate.edu/.

Combining Semantic Annotation of Word Sense & Semantic Roles: A Novel Annotation Scheme for VerbNet Roles on German Language Data
Éva Mújdricza-Maydt and Silvana Hartmann and Anette Frank and Iryna Gurevych
In: Proceedings of the 10th International Conference on Language Resources and Evaluation (LREC 2016), p. (to appear), European Language Resources Association (ELRA), Mai 2016.

An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer and Giorgia Azzurra Marson
In: International Conference on Cryptology AFRICACRYPT 2016, p. 10, Springer, April 2016.
africacrypt2016.aui.ma/.

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, April 2016.
africacrypt2016.aui.ma/.

mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing
Daniel Steinmetzer, Jiska Classen, Matthias Hollick
In: Millimeter-wave Networking Workshop (mmNet 2016), April 2016.

Remanence Decay Side-Channel: The PUF Case
Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi
In: IEEE Transactions on Information Forensics and Security, vol. 99, 2016. ISSN 1556-6013.

What Belongs Together Comes Together. Activity-centric Document Clustering for Information Work.
Alexander Seeliger, Benedikt Schmidt, Immanuel Schweizer, Max Mühlhäuser
In: ACM: Proceedings of the 21th International Conference on Intelligent User Interfaces (to appear), 2016.

Transitions on Multiple Layers for Scalable, Energy-Efficient and Robust Wireless Video Streaming
Michael Stein, Roland Kluge, Dario Mirizzi, Stefan Wilk, Andy Schürr, Max Mühlhäuser
In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), p. 1-3, 2016.

Leakage-Resilient Layout Randomization for Mobile Devices
Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Ahmad-Reza Sadeghi
In: 23nd Annual Network & Distributed System Security Symposium (NDSS), Februar 2016.

Efficiency Comparison of Various Approaches in E-Voting Protocols
Oksana Kulyk, Melanie Volkamer
In: Financial Cryptography, 1st Workshop on Advances in Secure Electronic Voting Schemes (VOTING'16), Februar 2016.

Exploring 3D Printed Interaction
Martin Schmitz
In: TEI '16, Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction, ACM, Februar 2016. ISBN 978-1-4503-3582-9.
http://dx.doi.org/10.1145/2839462.2854105.

Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs
Artur Mariano, Christian Bischof
In: PDP2016, Conference Publishing Services (CPS), Februar 2016.

Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do
Oksana Kulyk, Paul Gerber, Michael El Hanafi, Benjamin Reinheimer, Karen Renaud, Melanie Volkamer
In: Usable Security Workshop (USEC), Februar 2016.

On the Efficiency of Lattice-Based Encryption
Vanessa Erbenich
Februar 2016.

New Horizons for a Data-Driven Economy
Martin Strohbach and Jörg Daubert and Herman Ravkin and Mario Lischka
In: Springer Open, chap. Big Data Storage, p. 119-141, Springer, Januar 2016. ISBN 978-3-319-21568-6.

On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Jörg Daubert, Tim Grube, Max Mühlhäuser, Mathias Fischer
In: IEEE: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), p. to be presented, IEEE, Januar 2016.

Variability Modeling of Cryptographic Components (Clafer Experience Report)
Sarah Nadi, Stefan Krüger
In: 10th International Workshop on Variability Modelling of Software-intensive Systems, ACM, Januar 2016.
https://vamos2016.wordpress.com/.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang