• Postbus 513, MF

    5600MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Conferentiebijdrage
2014

The Euclidean distance degree

Draisma, J., Horobet, E., Ottaviani, G., Sturmfels, B. & Thomas, R. R., 2014, 2014 Symposium on Symbolic-Numeric Computation (SNC'14, Shanghai, China, July 28-31, 2014). Zhi, L. & Watt, M. (redactie). New York: Association for Computing Machinery, Inc, blz. 9-16

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)
1 Downloads (Pure)

The extended and generalized rank weight enumerator of a code

Jurrius, R. P. M. J. & Pellikaan, G. R., 2014, Computer Algebra in Coding Theory and Cryptography (Special Session at 20th Conference on Applications of Computer Algebra, ACA 2014, New York NY, USA, July 9-12, 2014). Martínez-Moro, E., Kotsireas, I. & Szabo, S. (redactie). Valladolid: University of Valladolid, blz. 1-5

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Tuple decoders for traitor tracing schemes

Oosterwijk, J-J., Doumen, J. & Laarhoven, T. M. M., 2014, Media Watermarking, Security, and Forensics 2014 (San Francisco CA, USA, February 3-5, 2014). SPIE, 21 blz. 90280C. (Proceedings of SPIE; vol. 9028).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)
2013

A case study in the future challenges in electricity grid infrastructure

Akker, van den, J. M., Blok, H., Budd, C. J., Eggermont, R. H., Guterman, A., Lahaye, D. J. P., Lansink Rotgerink, J., Myerscough, K. W., Prins, C. R., Tromper, T. & Wadman, W., 2013, Proceedings of the 84th European Study Group Mathematics with Industry (SWI 2012). Boon, M. A. A. (redactie). blz. 5-21

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Open Access
Bestand
53 Downloads (Pure)

A complexity and approximability study of the bilevel knapsack problem

Caprara, A., Carvalho, M., Lodi, A. & Woeginger, G. J., 2013, Integer Programming and Combinatorial Optimization (16th International Conference, IPCO 2013, Valparaíso, Chile, March 18-20, 2013. Proceedings). Goemans, M. & Correa, J. (redactie). Berlin: Springer, blz. 98-109 (Lecture Notes in Computer Science; vol. 7801).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

14 Citaten (Scopus)

Affine pairings on ARM

Acar, T., Lauter, K., Naehrig, M. & Shumow, D., 2013, Pairing-Based Cryptography – Pairing 2012 (). Abdalla, M. & Lange, T. (redactie). Berlin: Springer, blz. 203-209 (Lecture Notes in Computer Science; vol. 7708).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

Are there any nicely structured preference profiles nearby?

Bredereck, R., Chen, J. & Woeginger, G. J., 2013, IJCAI 2013 (Proceedings of the 23rd International Joint Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013). Rossi, F. (redactie). AAAI Press, blz. 62-68

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

19 Citaten (Scopus)

Core stability in hedonic coalition formation

Woeginger, G. J., 2013, SOFSEM 2013: Theory and Practice of Computer Science (39th International Conference on Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, January 26-31, 2013. Proceedings). Emde Boas, van, P., Groen, F. C. A., Italiano, G. F., Nawrocki, J. & Sack, H. (redactie). Berlin: Springer, blz. 33-50 (Lecture Notes in Computer Science; vol. 7741).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

23 Citaten (Scopus)

Diagnostic category leakage in helper data schemes for biometric authentication

Groot, de, J. A., Skoric, B., Vreede, de, N. & Linnartz, J. P. M. G., 2013, SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, 29-31 July, 2013, Reykjavík, Iceland. Samarati, P. (redactie). SCITEPRESS-Science and Technology Publications, Lda., blz. 506-511

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
1 Downloads (Pure)

Discrete distributions in the Tardos scheme, revisited

Laarhoven, T. M. M. & Weger, de, B. M. M., 2013, First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13, Montpellier, France, June 17-19, 2013). New York NY: Association for Computing Machinery, Inc, blz. 13-17

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

8 Citaten (Scopus)

Dynamic traitor tracing schemes, revisited

Laarhoven, T., 18 nov 2013, Information Forensics and Security (WIFS), 2013 IEEE International Workshop on . Institute of Electrical and Electronics Engineers, blz. 191-196

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Efficient probabilistic group testing based on traitor tracing

Laarhoven, T. M. M., 2013, 51st Annual Allerton Conference on Communication, Control, and Computing (Monticello IL, USA, October 2-3, 2013). Piscataway: Institute of Electrical and Electronics Engineers, blz. 1458-1465

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

Elligator : elliptic-curve points indistinguishable from uniform random strings

Bernstein, D. J., Hamburg, M., Krasnova, A. & Lange, T., 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013). Sadeghi, A-R., Gligor, V. D. & Yung, M. (redactie). New York: Association for Computing Machinery, Inc, blz. 967-979

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

48 Citaten (Scopus)

Error-correcting pairs and arrays from algebraic geometry codes

Márquez-Corbella, I. & Pellikaan, G. R., 2013, Proceedings of Applications of Computer Algebra (ACA 2013, Málaga, Spain, July 2-6, 2013). Galán, J. L., Aguilera, G. & Rodríguez, P. (redactie). S.l.: IATED, blz. 129-132

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
56 Downloads (Pure)

Factoring RSA keys from certified smart cards : Coppersmith in the wild

Bernstein, D. J., Chang, Y. A., Cheng, C. M., Chou, L. P., Heninger, N., Lange, T. & Someren, van, N., 2013, Advances in Cryptology - ASIACRYPT 2013 (19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013. Proceedings). Sako, K. & Sarkar, P. (redactie). Berlin: Springer, Vol. 3. blz. 341-360 (Lecture Notes in Computer Science; vol. 8270).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

45 Citaten (Scopus)
2 Downloads (Pure)

Formal modelling of (de)pseudonymisation : a case study in health care privacy

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Security and Trust Management (8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers). Jøsang, A., Samarati, P. & Petrocchi, M. (redactie). Berlin: Springer, blz. 145-160 (Lecture Notes in Computer Science; vol. 7783).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)
2 Downloads (Pure)

Formative assessment and learning analytics

Tempelaar, D. T., Heck, A. J. P., Cuypers, H., Kooij, van der, H. & Vrie, van de, E. M., 2013, Proceedings of the Third International Conference on Learning Analytics and Knowledge (LAK'13, Leuven, Belgium, April 8-12, 2013). New York NY: Association for Computing Machinery, Inc, blz. 205-209

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

36 Citaten (Scopus)

Forward secure signatures on smart cards preliminary version

Hülsing, A., Busold, C. & Buchmann, J., 2013, Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Knudsen, L. R. & Wu, H. (redactie). Berlin: Springer, blz. 66-80 15 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7707 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)

How to avoid the breakdown of public key infrastructures: forward secure signatures for certificate authorities

Braun, J., Hülsing, A., Wiesmaier, A., Vigil, M. A. G. & Buchmann, J., 2013, Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. De Capitani di Vimercati, S. & Mitchell, C. (redactie). Berlin: Springer, blz. 53-68 16 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7868 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

How to put through your agenda in collective binary decisions

Alon, N., Bredereck, R., Chen, J., Kratsch, S., Niedermeier, R. & Woeginger, G. J., 2013, Algorithmic Decision Theory (3rd International Conference, ADT'13, Brussels, Belgium, November 13-15, 2013. Proceedings). Perny, P., Pirlot, M. & Tsoukiàs, A. (redactie). Berlin: Springer, blz. 30-44 (Lecture Notes in Computer Science; vol. 8176).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

Interactive mathematical videos

Cuypers, H. & Knopper, J. W., 2013, 8th Workshop on Mathematical User Interfaces (MathUI'13, Bath, UK, July 9-10, 2013)). Kohlhase, A. & Libbrecht, P. (redactie). CEUR-WS.org, blz. 1-7 (CEUR Workshop Proceedings; vol. 1010).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Downloads (Pure)

McBits : Fast constant-time code-based cryptography

Bernstein, D. J., Chou, T. & Schwabe, P., 2013, Cryptographic Hardware and Embedded Systems – CHES 2013 (15th International Workshop, Santa Barbara CA, USA, August 20-23, 2013. Proceedings). Bertoni, G. & Coron, J-S. (redactie). Berlin: Springer, blz. 250-272 (Lecture Notes in Computer Science; vol. 8086).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

39 Citaten (Scopus)
2 Downloads (Pure)

MinimaLT : minimal-latency networking through better security

Petullo, W. M., Zhang, X., Solworth, J. A., Bernstein, D. J. & Lange, T., 2013, Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013). New York: Association for Computing Machinery, Inc, blz. 425-438

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

20 Citaten (Scopus)
1 Downloads (Pure)

ML Confidential : machine learning on encrypted data

Graepel, T., Lauter, K. & Naehrig, M., 2013, Information Security and Cryptology - ICISC 2012 (15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers). Kwon, T., Lee, M-K. & Kwon, D. (redactie). Berlin: Springer, blz. 1-21 (Lecture Notes in Computer Science; vol. 7839).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

130 Citaten (Scopus)
3 Downloads (Pure)

Never trust a bunny

Bernstein, D. J. & Lange, T., 2013, Radio Frequency Identification. Security and Privacy Issues (8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers). Hoepman, J. H. & Verbauwhede, I. (redactie). Berlin: Springer, blz. 137-148 (Lecture Notes in Computer Science; vol. 7739).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

17 Citaten (Scopus)

Non-imaging optics for LED-lighting

Berg, van den, J. B., Castro, R. M., Draisma, J., Evers, J. H. M., Hendriks, M., Krehel, O., Kryven, I., Mora, K., Szabó, B. T. & Zwiernik, P. W., 2013, Proceedings of the 84th European Study Group Mathematics with Industry (SWI 2012). Boon, M. A. A. (redactie). blz. 70-103

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Open Access
Bestand
55 Downloads (Pure)

Non-uniform cracks in the concrete : the power of free precomputation

Bernstein, D. J. & Lange, T., 2013, Advances in Cryptology - ASIACRYPT 2013 (19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013. Sako, K. & Sarkar, P. (redactie). Berlin: Springer, Vol. 3. blz. 321-340 (Lecture Notes in Computer Science; vol. 8270).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

26 Citaten (Scopus)

On the number of matroids

Bansal, N., Pendavingh, R. A. & Pol, van der, J. G., 2013, Proceedings 24th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'13, New Orleans LA, USA, January 6-8, 2013). Philadelphia PA: Society for Industrial and Applied Mathematics (SIAM), blz. 675-694

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Downloads (Pure)

On the security of RC4 in TLS

AlFardan, N. J., Bernstein, D. J., Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2013, 22nd USENIX Security Symposium (Washington DC, USA, August 14-16, 2013). Kling, S. (redactie). Berkeley: Usenix Association, blz. 305-320

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
108 Citaten (Scopus)
86 Downloads (Pure)

Optimal suspicion functions for Tardos traitor tracing schemes

Oosterwijk, J., Skoric, B. & Doumen, J. M., 2013, First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13, Montpellier, France, June 17-19, 2013). New York NY: Association for Computing Machinery, Inc, blz. 19-27

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

16 Citaten (Scopus)

Optimization of lifetime in sensor networks

Bansal, N., Bourne, D. P., Firat, M., de Graaf, M., Kapodistria, S., Kumar, K., Meerman, C., Mitici, M., Nardi, F. R., Rijk, de, B., Sarswat, S. & Scardia, L., 2013, Proceedings of the 84th European Study Group Mathematics with Industry (SWI 2012). Boon, M. A. A. (redactie). blz. 39-69

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Open Access
Bestand
30 Downloads (Pure)

Quantum algorithms for the subset-sum problem

Bernstein, D. J., Jeffery, S., Lange, T. & Meurer, A., 2013, Post-Quantum Cryptography - 5th International Workshop (PQ Crypto 2013, Limoges, France, June 4-7, 2013. Proceedings). Gaborit, P. (redactie). Berlin: Springer, blz. 16-33 (Lecture Notes in Computer Science; vol. 7932).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

17 Citaten (Scopus)
1 Downloads (Pure)

Solving the shortest vector problem in lattices faster using quantum search

Laarhoven, T. M. M., Mosca, M. & Pol, van de, J., 2013, Post-Quantum Cryptography - 5th International Workshop (PQ Crypto 2013, Limoges, France, June 4-7, 2013. Proceedings). Gaborit, P. (redactie). Berlin: Springer, blz. 83-101 (Lecture Notes in Computer Science; vol. 7932).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

Symbolic privacy analysis through linkability and detectability

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Trust Management VII (7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings). Fernández-Gago, C., Martinelli, F., Pearson, S. & Agudo, I. (redactie). Berlin: Springer, blz. 1-16 (IFIP Advances in Information and Communication Technology; vol. 401).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)
4 Downloads (Pure)

The complexity of finding a large subgraph under anonymity constraints

Bredereck, R., Hartung, S., Nichterlein, A. & Woeginger, G. J., 2013, Algorithms and Computation (24th International Symposium, ISAAC 2013, Hong Kong, December 16-18, 2013. Proceedings). Cai, L., Chen, S-W. & Lam, T-W. (redactie). Berlin: Springer, blz. 152-162 (Lecture Notes in Computer Science; vol. 8283).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

The Holey Grail : a special score function for non-binary traitor tracing

Skoric, B., Oosterwijk, J. & Doumen, J. M., 2013, Proceedings of the IEEE Workshop on Information Forensics and Security (WIFS'13, Guangzhou, China, November 18-21, 2013). Institute of Electrical and Electronics Engineers, blz. 180-185

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

The primal-dual approach for online algorithms (Invited speaker)

Bansal, N., 2013, Approximation and Online Algorithms (10th International Workshop, WAOA 2012, Ljubljana, Slovenia, September 13-14, 2012. Revised Selected Papers). Erlebach, T. & Persiano, G. (redactie). Berlin: Springer, blz. 1-1 (Lecture Notes in Computer Science; vol. 7846).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademic

Tropically unirational varieties

Draisma, J. & Frenk, B. J., 2013, Algebraic and Combinatorial Aspects of Tropical Geometry (Proceedings of the Tropical Geometry Workshop, Castro Urdiales, Spain, December 12-16, 2011). Brugallé, E., Cueto, M. A., Dickenstein, A., Feichtner, E. M. & Itenberg, I. (redactie). Providence: American Mathematical Society, blz. 109-123 (Contemporary Mathematics Series; vol. 589).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
75 Downloads (Pure)

Two grumpy giants and a baby

Bernstein, D. J. & Lange, T., 2013, ANTS X (Proceedings of the Tenth Algorithmic Number Theory Symposium, San Diego, California, July 9-13, 2012). Howe, E. W. & Kedlaya, K. S. (redactie). Berkeley: Mathematical Sciences Publishers, blz. 87-111 (The Open Book Series; vol. 1).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

Up and beyond: Building a mountain in the Netherlands

Andrade Serra, De, P. J., Fatima, T., Fernández, A., Hulshof, W. J. T., Khaniyev, T., Meurs, van, P. J. P., Oosterwijk, J., Postma, S., Rottschäfer, V., Sewalt, L. & Veerman, F., 2013, Proceedings of the 84th European Study Group Mathematics with Industry (SWI 2012). Boon, M. A. A. (redactie). blz. 104-125

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
76 Downloads (Pure)
2012

A practical approximation algorithm for solving massive instances of hybridization number

Iersel, van, L. J. J., Kelk, S. M., Lekic, N. & Scornavacca, C., 2012, Algorithms in Bioinformatics (12th International Workshop, WABI 2012, Ljubljana, Slovenia, September 10-12, 2012. Proceedings). Raphael, B. & Tang, J. (redactie). Berlin: Springer, blz. 430-440 (Lecture Notes in Computer Science; vol. 7534).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

Cinderella versus the Wicked Stepmother

Bodlaender, M. H. L., Hurkens, C. A. J., Kusters, V. J. J., Staals, F., Woeginger, G. J. & Zantema, H., 2012, Theoretical Computer Science (7th IFIP TC 1/WG 2.2 International Conference, TCS 2012, Amsterdam, The Netherlands, September 26-28, 2012. Proceedings). Baeten, J. C. M., Ball, T. & Boer, de, F. S. (redactie). Berlin: Springer, blz. 57-71 (Lecture Notes in Computer Science; vol. 7604).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)
2 Downloads (Pure)

Computing small discrete logarithms faster

Bernstein, D. J. & Lange, T., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (redactie). Berlin: Springer, blz. 318-338 (Lecture Notes in Computer Science; vol. 7668).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

17 Citaten (Scopus)

Divorcing made easy

Pruhs, K. R. & Woeginger, G. J., 2012, Fun with Algorithms (6th International Conference, FUN 2012, Venice, Italy, June 4-6, 2012. Proceedings). Kranakis, E., Krizanc, D. & Luccio, F. (redactie). Berlin: Springer, blz. 305-314 (Lecture Notes in Computer Science; vol. 7288).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

Dynamic traitor tracing for arbitrary alphabets: divide and conquer

Laarhoven, T. M. M., Oosterwijk, J-J. & Doumen, J., 2012, Proceedings of the International Workshop on Information Forensics and Security (WIFS, Tenerife, Spain, December 2-5, 2012). Piscataway: Institute of Electrical and Electronics Engineers, blz. 240-245

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
10 Citaten (Scopus)
106 Downloads (Pure)

Faster batch forgery identification

Bernstein, D. J., Doumen, J. M., Lange, T. & Oosterwijk, J., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (redactie). Berlin: Springer, blz. 454-473 (Lecture Notes in Computer Science; vol. 7668).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

12 Citaten (Scopus)

Group activity selection problem

Darmann, A., Elkind, E., Kurz, S., Lang, J., Schauer, J. & Woeginger, G. J., 2012, Internet and Network Economics (8th International Workshop, WINE 2012, Liverpool, UK, December 10-12, 2012. Proceedings). Goldberg, P. W. (redactie). Berlin: Springer, blz. 156-169 (Lecture Notes in Computer Science; vol. 7695).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

35 Citaten (Scopus)
1 Downloads (Pure)

Motion planning with pulley, rope, and baskets

Eggermont, C. E. J. & Woeginger, G. J., 2012, Proceedings of the 29th International Symposium on Theoretical Aspects of Computer Science (STACS 2012), February 29-March 3, 2012, Paris, France. Dürr, C. & Wilke, T. (redactie). Dagstuhl, Germany: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 374-383 (LIPIcs: Leibniz International Proceedings in Informatics; vol. 14).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

Multicast routing for energy minimization using speed scaling

Bansal, N., Gupta, A., Krishnaswamy, R., Nagarajan, V., Pruhs, K. R. & Stein, C., 2012, Design and Analysis of Algorithms (First Mediterranean Conference on Algorithms, MedAlg 2012, Kibbutz Ein Gedi, Israel, December 3-5, 2012. Proceedings). Even, G. & Rawitz, D. (redactie). Berlin: Springer, blz. 37-51 (Lecture Notes in Computer Science; vol. 7659).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

83 Citaten (Scopus)

Multiple leakage localization and leak size estimation in water networks

Abbasi, N., Habibi, H., Hurkens, C. A. J., Klabbers, M. D., Tijsseling, A. S. & Eijndhoven, van, S. J. L., 2012, ASCE 14th Water Distribution Systems Analysis Conference (Adelaide, Australia, September 24-27, 2012). blz. 758-766

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)