Home > Research > LANCASTER UNIVERSITY LEIPZIG > Publications & Outputs
View graph of relations

LANCASTER UNIVERSITY LEIPZIG

  1. 2019
  2. Published

    Of Cores: A Partial-Exploration Framework for Markov Decision Processes.

    Kretínský, J. & Meggendorfer, T., 1/08/2019, 30th International Conference on Concurrency Theory, CONCUR 2019. Fokkink, W. & van Glabbeek, R. (eds.). p. 1-17 17 p. 5. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 140).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Probabilistic and exact frequent subtree mining in graphs beyond forests

    Welke, P., Horváth, T. & Wrobel, S., 15/07/2019, In: Machine Learning. 108, 7, p. 1137-1164 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Architecting software for the Internet of Thing based systems

    Alreshidi, A. & Ahmad, A., 10/07/2019, In: Future Internet. 11, 7, 153.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  5. Published

    A mobile cloud framework for context-aware and portable recommender system for smart markets

    Khan, A., Ahmad, A., Rahman, A. U. & Alkhalil, A., 21/06/2019, EAI/Springer Innovations in Communication and Computing. Mehmood, R., See, S., Katib, I. & Chlamtac, I. (eds.). Cham: Springer, p. 283-309 27 p. (EAI/Springer Innovations in Communication and Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published
  7. 2018
  8. Published

    A probabilistic evaluation framework for preference aggregation reflecting group homogeneity

    Jansen, C., Schollmeyer, G. & Augustin, T., 30/11/2018, In: Mathematical Social Sciences. 96, p. 49-62 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Probabilistic frequent subtrees for efficient graph classification and retrieval

    Welke, P., Horváth, T. & Wrobel, S., 30/11/2018, In: Machine Learning. 107, 11, p. 1847-1873 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures

    Ahmad, A., Pahl, C., Altamimi, A. B. & Alreshidi, A., 1/11/2018, In: Journal of Computer Science and Technology. 33, 6, p. 1278-1306 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Domain Validation++ For MitM-Resilient PKI

    Brandt, M., Dai, T., Klein, A., Shulman, H. & Waidner, M., 15/10/2018, ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 2060-2076 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Off-Path Attacks Against PKI

    Dai, T., Shulman, H. & Waidner, M., 15/10/2018, CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 2213-2215 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Mining Tree Patterns with Partially Injective Homomorphisms.

    Schulz, T. H., Horváth, T., Welke, P. & Wrobel, S., 14/09/2018, Mining Tree Patterns with Partially Injective Homomorphisms.. Springer, Cham, Vol. 11052. p. 585-601 16 p. (Lecture Notes in Computer Science; vol. 11052).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Concepts for decision making under severe uncertainty with partial ordinal and partial cardinal preferences

    Jansen, C., Schollmeyer, G. & Augustin, T., 31/07/2018, In: International Journal of Approximate Reasoning. 98, p. 112-131 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    IoT-based implementation and mobility-driven management of the smart and energy efficient home appliance ecosystem

    Ahmad, A., Altamimi, A. B. & Alshammari, M. T., 22/07/2018, Smart Societies, Infrastructure, Technologies and Applications - First International Conference, SCITA 2017, Proceedings. Mehmood, R., Katib, I., Chlamtac, I. & Bhaduri, B. (eds.). Springer-Verlag, p. 353-356 4 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 224).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Rabinizer 4: From LTL to Your Favourite Deterministic Automaton.

    Kretínský, J., Meggendorfer, T., Sickert, S. & Ziegler, C., 18/07/2018, CAV 2018: Computer Aided Verification . Springer, p. 567-577 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Conditional Value-at-Risk for Reachability and Mean Payoff in Markov Decision Processes.

    Kretínský, J. & Meggendorfer, T., 9/07/2018, LICS. p. 609-618 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Owl: A Library for ω-Words, Automata, and LTL.

    Kretínský, J., Meggendorfer, T. & Sickert, S., 2018, ATVA 2018: Automated Technology for Verification and Analysis. Springer, p. 543-550 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. 2017
  20. Published

    The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines

    Fett, D., Küsters, R. & Schmitz, G., 28/09/2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Efficient Strategy Iteration for Mean Payoff in Markov Decision Processes.

    Kretínský, J. & Meggendorfer, T., 27/09/2017, ATVA 2017: Automated Technology for Verification and Analysis . Springer, p. 380-399 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published
  23. Published

    A simple descriptive method for multidimensional item response theory based on stochastic dominance

    Schollmeyer, G., Jansen, C. & Augustin, T., 31/08/2017, Technical Reports, Department of Statistics, LMU Munich, 210 30 p.

    Research output: Contribution to specialist publicationTechnical Reportpeer-review

  24. Published

    Detecting stochastic dominance for poset-valued random variables as an example of linear programming on closure systems

    Schollmeyer, G., Jansen, C. & Augustin, T., 31/08/2017, Technical Reports, Department of Statistics, LMU Munich, 209 69 p.

    Research output: Contribution to specialist publicationTechnical Reportpeer-review

  25. Published

    Value Iteration for Long-Run Average Reward in Markov Decision Processes.

    Ashok, P., Chatterjee, K., Daca, P., Kretínský, J. & Meggendorfer, T., 13/07/2017, CAV 2017: Computer Aided Verification . Majumdar, R. & Kunčak, V. (eds.). Cham: Springer, p. 201-221 21 p. (Lecture Notes in Computer Science ; vol. 10426).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Decision Theory Meets Linear Optimization Beyond Computation

    Jansen, C., Schollmeyer, G. & Augustin, T., 15/06/2017, Symbolic and Quantitative Approaches to Reasoning with Uncertainty: 14th European Conference, ECSQARU 2017, Lugano, Switzerland, July 10–14, 2017, Proceedings. Antonucci, A., Cholvy, L. & Papini, O. (eds.). Cham: Springer, p. 329-339 11 p. (Lecture Notes in Computer Science; vol. 10369).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Index Appearance Record for Transforming Rabin Automata into Parity Automata.

    Kretínský, J., Meggendorfer, T., Waldmann, C. & Weininger, M., 31/03/2017, TACAS 2017: Tools and Algorithms for the Construction and Analysis of Systems. Springer, p. 443-460 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. 2016
  29. Published

    Three-hop distance estimation in social graphs.

    Welke, P., Markowetz, A., Suel, T. & Christoforaki, M., 5/12/2016, Three-hop distance estimation in social graphs.. IEEE, p. 1048-1055 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Software architectures for robotic systems: A systematic mapping study

    Ahmad, A. & Babar, M. A., 1/12/2016, In: Journal of Systems and Software. 122, p. 16-39 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    DNSSEC Misconfigurations in Popular Domains

    Dai, T., Shulman, H. & Waidner, M., 28/10/2016, Cryptology and Network Security. CANS 2016.. Foresti, S. & Persiano, G. (eds.). Cham: Springer, p. 651-660 10 p. (Lecture Notes in Computer Science; vol. 10052).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    A comprehensive formal security analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 24/10/2016, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 1204-1215

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Ligand Affinity Prediction with Multi-pattern Kernels.

    Ullrich, K., Mack, J. & Welke, P., 21/09/2016, Ligand Affinity Prediction with Multi-pattern Kernels.. Springer Nature, p. 474-489 15 p. (Lecture Notes in Computer Science; vol. 9956).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Min-Hashing for Probabilistic Frequent Subtree Feature Spaces.

    Welke, P., Horváth, T. & Wrobel, S., 21/09/2016, Min-Hashing for Probabilistic Frequent Subtree Feature Spaces.. 1 ed. Springer, Cham, Vol. 9956. p. 67-82 15 p. (Lecture Notes in Computer Science; vol. 9956).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Differentiating smartphone users by app usage.

    Welke, P., Andone, I., Blaszkiewicz, K. & Markowetz, A., 12/09/2016, Differentiating smartphone users by app usage.. The Association for Computing Machinery, p. 519-523 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Probabilistic Frequent Subtree Kernels.

    Welke, P., Horváth, T. & Wrobel, S., 18/05/2016, Probabilistic Frequent Subtree Kernels.. Springer, Cham, Vol. 9067. p. 179-193 14 p. (Lecture Notes in Computer Science; vol. 9607).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web

    Fett, D., Küsters, R. & Schmitz, G., 13/01/2016, Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham: Springer, (Lecture Notes in Computer Science; vol. 9326).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A Comprehensive Formal Security Analysis of OAuth 2.0.

    Fett, D., Küsters, R. & Schmitz, G., 2016

    Research output: Other contribution

  39. Published

    Pi and More: Eine Veranstaltungsreihe rund um "kleine Computer"

    Fett, D. & Schmitz, G., 2016, Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. 2015
  41. Published

    On the Complexity of Frequent Subtree Mining in Very Simple Structures.

    Welke, P., Horváth, T. & Wrobel, S., 27/12/2015, Springer Switerzland. Springer Nature, Vol. 9046. p. 194-209 (Lecture Notes in Computer Science; vol. 9046).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web

    Fett, D., Küsters, R. & Schmitz, G., 12/10/2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15. New York: ACM, p. 1358-1369 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web

    Fett, D., Küsters, R. & Schmitz, G., 7/08/2015

    Research output: Other contribution

  44. 2014
  45. Published

    An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 20/11/2014, 2014 IEEE Symposium on Security and Privacy. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Classification and comparison of architecture evolution reuse knowledge - A systematic review

    Ahmad, A., Jamshidi, P. & Pahl, C., 18/07/2014, In: Journal of Software: Evolution and Process. 26, 7, p. 654-691 38 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Autonomic resource provisioning for cloud-based software

    Jamshidi, P., Ahmad, A. & Pahl, C., 2/06/2014, 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014 - Proceedings. The Association for Computing Machinery, p. 95-104 10 p. (9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014 - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    A framework for architecture-driven migration of legacy systems to cloud-enabled software

    Ahmad, A. & Babar, M. A., 7/04/2014, 11th Working IEEE/IFIP Conference on Software Architecture, WICSA 2014 - Proceedings. The Association for Computing Machinery, p. 1-8 8 p. 7. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Towards a pattern language for self-adaptation of cloud-based architectures

    Ahmad, A. & Babar, M. A., 7/04/2014, 11th Working IEEE/IFIP Conference on Software Architecture, WICSA 2014 - Proceedings. New York: The Association for Computing Machinery, p. 1-8 8 p. 7. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. 2013
  51. Published

    Cloud Migration Research: A Systematic Review

    Jamshidi, P., Ahmad, A. & Pahl, C., 31/12/2013, In: IEEE Transactions on Cloud Computing. 1, 2, p. 142-157 16 p., 6624108.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    A framework for classifying and comparing architecture-centric software evolution research

    Jamshidi, P., Ghafari, M., Ahmad, A. & Pahl, C., 8/03/2013, Proceedings of the 17th European Conference on Software Maintenance and Reengineering, CSMR 2013. IEEE, p. 305-314 10 p. 6498478. (Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. 2012
  54. Published

    Graph-based implicit knowledge discovery from architecture change logs

    Ahmad, A., Jamshidi, P., Arshad, M. & Pahl, C., 20/08/2012, Joint 10th Working Conference on Software Architecture, WICSA 2012 and 6th European Conference on Software Architecture, ECSA 2012 - Proceedings Companion Volume. New York: The Association for Computing Machinery, p. 116-123 8 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Pattern-driven reuse in architecture-centric evolution for service software

    Ahmad, A., Jamshidi, P. & Pahl, C., 24/07/2012, ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends. SciTePress, p. 279-284 6 p. (ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Graph-based pattern identification from architecture change logs

    Ahmad, A., Jamshidi, P. & Pahl, C., 2012, Advanced Information Systems EngineeringWorkshops - CAiSE 2012 International Workshops, Proceedings. Bajec, M. & Eder, J. (eds.). Berlin: Springer-Verlag, p. 200-213 14 p. (Lecture Notes in Business Information Processing; vol. 112 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. 2011
  58. Published

    Customisable transformation-driven evolution for service architectures

    Ahmad, A. & Pahl, C., 5/04/2011, Proceedings - 2011 15th European Conference on Software Maintenance and Reengineering, CSMR 2011. IEEE, p. 373-376 4 p. 5741350. (Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. 2010
  60. Published

    Pattern-based customisable transformations for style-based service architecture evolution

    Ahmad, A. & Pahl, C., 22/11/2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010. IEEE, p. 371-376 6 p. 5643631. (2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 Next

Back to top