default search action
Martin Beck
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Florian Dumpert, Martin Beck:
Verbesserung der Datengrundlage der Mindestlohnforschung mittels maschineller Lernverfahren. AStA Wirtschafts und Sozialstatistisches Arch. 17(1): 5-34 (2023) - [c21]Martin Beck, Koustubha Bhat, Lazar Stricevic, Geng Chen, Diogo Behrens, Ming Fu, Viktor Vafeiadis, Haibo Chen, Hermann Härtig:
AtoMig: Automatically Migrating Millions Lines of Code from TSO to WMM. ASPLOS (2) 2023: 61-73 - 2021
- [j8]Timo Koch, Dennis Gläser, Kilian Weishaupt, Sina Ackermann, Martin Beck, Beatrix Becker, Samuel Burbulla, Holger Class, Edward Coltman, Simon Emmert, Thomas Fetzer, Christoph Grüninger, Katharina Heck, Johannes Hommel, Theresa Kurz, Melanie Lipp, Farid Mohammadi, Samuel Scherrer, Bernd Flemisch:
DuMux 3 - an open-source simulator for solving flow and transport problems in porous media with a focus on model coupling. Comput. Math. Appl. 81: 423-443 (2021) - [j7]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services. Online Soc. Networks Media 22: 100125 (2021) - 2020
- [c20]Frederik Armknecht, Paul Walther, Gene Tsudik, Martin Beck, Thorsten Strufe:
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams. CCS 2020: 211-223 - [c19]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Breaking and (Partially) Fixing Provably Secure Onion Routing. SP 2020: 168-185 - [i13]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Covid Notions: Towards Formal Definitions - and Documented Understanding - of Privacy Goals and Claimed Protection in Proximity-Tracing Services. CoRR abs/2004.07723 (2020)
2010 – 2019
- 2019
- [j6]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
PrivApprox: Privacy-Preserving Stream Analytics - (Extended Abstract). Inform. Spektrum 42(5): 358-359 (2019) - [j5]Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notions in Anonymous Communication. Proc. Priv. Enhancing Technol. 2019(2): 105-125 (2019) - [c18]Kilian Becher, Martin Beck, Thorsten Strufe:
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking. NetSys 2019: 1-8 - [r1]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy-Preserving Data Analytics. Encyclopedia of Big Data Technologies 2019 - [i12]Timo Koch, Dennis Gläser, Kilian Weishaupt, Sina Ackermann, Martin Beck, Beatrix Becker, Samuel Burbulla, Holger Class, Edward Coltman, Simon Emmert, Thomas Fetzer, Christoph Grüninger, Katharina Heck, Johannes Hommel, Theresa Kurz, Melanie Lipp, Farid Mohammadi, Samuel Scherrer, Martin Schneider, Gabriele Seitz, Leopold Stadler, Martin Utz, Felix Weinhardt, Bernd Flemisch:
DuMux 3 - an open-source simulator for solving flow and transport problems in porous media with a focus on model coupling. CoRR abs/1909.05052 (2019) - [i11]Christiane Kuhn, Martin Beck, Thorsten Strufe:
Breaking and (Partially) Fixing Provably Secure Onion Routing. CoRR abs/1910.13772 (2019) - 2018
- [b1]Martin Beck:
Secure and efficient comparisons between untrusted parties. Dresden University of Technology, Germany, 2018, pp. 1-213 - [i10]Kilian Becher, Martin Beck, Thorsten Strufe:
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version). CoRR abs/1810.04971 (2018) - [i9]Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notion in Anonymous Communication. CoRR abs/1812.05638 (2018) - [i8]Martin Beck, Florian Dumpert, Jörg Feuerhake:
Machine Learning in Official Statistics. CoRR abs/1812.10422 (2018) - 2017
- [j4]Florian Dumpert, Martin Beck:
Einsatz von Machine-Learning-Verfahren in amtlichen Unternehmensstatistiken. AStA Wirtschafts und Sozialstatistisches Arch. 11(2): 83-106 (2017) - [c17]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
PrivApprox: Privacy-Preserving Stream Analytics. USENIX ATC 2017: 659-672 - [i7]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing. CoRR abs/1701.05403 (2017) - [i6]Alexander Senier, Martin Beck, Thorsten Strufe:
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols. CoRR abs/1706.04759 (2017) - 2016
- [c16]Stefanie Roos, Martin Beck, Thorsten Strufe:
Anonymous addresses for efficient and resilient routing in F2F overlays. INFOCOM 2016: 1-9 - [i5]Stefanie Roos, Martin Beck, Thorsten Strufe:
VOUTE-Virtual Overlays Using Tree Embeddings. CoRR abs/1601.06119 (2016) - 2015
- [c15]Martin Beck:
Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency. INFOCOM Workshops 2015: 220-226 - [c14]Josef Spillner, Martin Beck, Alexander Schill, Thomas Michael Bohnert:
Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments. UCC 2015: 261-270 - 2014
- [p2]Martin Beck, V. Joachim Haupt, Janine Roy, Jan Mönnich, René Jäkel, Michael Schroeder, Zerrin Isik:
GeneCloud: Secure Cloud Computing for Biomedical Research. Trusted Cloud Computing 2014: 3-14 - [p1]Martin Beck, V. Joachim Haupt, Janine Roy, Jan Mönnich, René Jäkel, Michael Schroeder, Zerrin Isik:
Privacy-Preserving Cloud Computing for Biomedical Research. Trusted Cloud Computing 2014: 259-282 - [i4]Florian Kerschbaum, Martin Beck, Dagmar Schönfeld:
Inference Control for Privacy-Preserving Genome Matching. CoRR abs/1405.0205 (2014) - [i3]Martin Beck:
Enhanced TKIP Michael Attacks. CoRR abs/1410.6295 (2014) - 2013
- [j3]Pieter J. C. J. de Wilde, Carlos Martinez-Ortiz, Darren Pearson, Ian Beynon, Martin Beck, Nigel Barlow:
Building simulation approaches for the training of automated data analysis tools in building energy management. Adv. Eng. Informatics 27(4): 457-465 (2013) - [c13]Martin Beck, Florian Kerschbaum:
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity. BigData Congress 2013: 31-37 - [c12]Jakob Hasse, Thomas Gloe, Martin Beck:
Forensic identification of GSM mobile phones. IH&MMSec 2013: 131-140 - 2012
- [c11]Martin Beck, Michael Marhöfer:
Privacy-preserving data mining demonstrator. ICIN 2012: 210-216 - [c10]Jonas Trümper, Martin Beck, Jürgen Döllner:
A Visual Analysis Approach to Support Perfective Software Maintenance. IV 2012: 308-315 - [i2]Martin Beck, Florian Kerschbaum:
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity. CoRR abs/1209.5208 (2012) - 2011
- [j2]Min Xu, Martin Beck, Frank Alber:
Template-free detection of macromolecular complexes in cryo electron tomograms. Bioinform. 27(13): 69-76 (2011) - [c9]Carlos Martinez-Ortiz, Martin Beck, Pieter J. C. J. de Wilde:
EWMA based approaches for automated building energy analysis. ISSPIT 2011: 562-566 - [c8]Martin Beck, Michael Marhöfer:
Do-Not-Track Techniques for Browsers and Their Implications for Consumers. PrimeLife 2011: 187-196 - [c7]Martin Beck, Jonas Trümper, Jürgen Döllner:
A visual analysis and design tool for planning software reengineerings. VISSOFT 2011: 1-8 - 2010
- [c6]Martin Beck, Jürgen Döllner:
Towards automated analysis and visualization of distributed software systems. SOFTVIS 2010: 213-214
2000 – 2009
- 2009
- [c5]Martin Beck, Michael Haupt, Robert Hirschfeld:
NXTalk: dynamic object-oriented programming in a constrained environment. IWST 2009: 38-49 - [c4]Bastian Steinert, Michael Perscheid, Martin Beck, Jens Lincke, Robert Hirschfeld:
Debugging into Examples. TestCom/FATES 2009: 235-240 - [c3]Erik Tews, Martin Beck:
Practical attacks against WEP and WPA. WISEC 2009: 79-86 - 2008
- [i1]Martin Beck, Erik Tews:
Practical attacks against WEP and WPA. IACR Cryptol. ePrint Arch. 2008: 472 (2008) - 2006
- [j1]Andrew P. Leis, Martin Beck, Manuela Gruska, Christoph Best, Reiner Hegerl, Wolfgang Baumeister, John W. Leis:
Cryo-electron tomography of biological specimens. IEEE Signal Process. Mag. 23(3): 95-103 (2006) - [c2]Valerij Tchernykh, Martin Beck, Klaus Janschek:
An Embedded Optical Flow Processor for Visual Navigation using Optical Correlator Technology. IROS 2006: 67-72
1990 – 1999
- 1998
- [c1]Martin Beck, Eberhard Zehendner, Theo Ungerer:
Architecture-dependent partitioning of dependence graphs. PDP 1998: 70-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint