@inbook{3014,
author = {May, Alexander},
booktitle = {Public Key Cryptography – PKC 2004},
isbn = {9783540210184},
issn = {0302-9743},
pages = {218--230},
publisher = {Springer Berlin Heidelberg},
title = {{Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q}},
doi = {10.1007/978-3-540-24632-9_16},
year = {2004},
}
@inproceedings{5765,
abstract = {Voting via the Internet has become a feasible option for political as well as non-political ballots. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. The article starts with a brief presentation of advantages and disadvantages of Internet ballots and presents application fields and pilot schemes. Then, technological security aspects are derived due to democratic basic principles. Especially the applied voting procedures are critical in security terms. Hence, the most relevant cryptographic protocols are presented and their drawbacks and shortcomings are identified. However, this article does not propose a new voting protocol. Beyond fixing cryptographic procedures for ballots, more elements are to be specified, e.g. responsibilities and rights of involved authorities or security precautions regarding hardware and software. For this reason, a structural security framework for electronic voting systems is presented which can be used for their composition and analysis.},
author = {Schryen, Guido},
booktitle = {37th Annual Hawaii International Conference on System Sciences},
title = {{Security Aspects of Internet Voting}},
year = {2004},
}
@article{3648,
author = {Harteis, Christian and Bauer, Johannes and Festner, Dagmar and Gruber, Hans},
journal = {UNTERRICHTSWISSENSCHAFT.},
number = {2},
pages = {128----142},
title = {{Selbstbestimmung im Arbeitsalltag}},
year = {2004},
}
@book{25205,
author = {Frank, Ursula and Giese, Holger and Klein, Florian and Oberschelp, Oliver and Schmidt, Andreas and Schulz, Bernd and Voecking, Henner and Witting, Katrin},
publisher = {Heinz Nixdorf Institut, Universität Paderborn},
title = {{Selbstoptimierende Systeme des Maschinenbaus - Definitionen und Konzepte.}},
volume = {155},
year = {2004},
}
@inproceedings{20932,
abstract = {Design recovery, which means extracting design documents from source code, is usually done by static analysis techniques. Analysing behaviour by static analysis is very imprecise. We combine static and dynamic analysis to increase the preciseness of our design recovery process. In this paper we present an approach to collect data for the dynamic analysis by recording method calls during a program's execution. To reduce the amount of information we monitor only relevant classes and methods identified by static analysis.},
author = {Wendehals, Lothar and Meyer, Matthias and Elsner, Andreas},
booktitle = {Proc. of the 2nd International Fujaba Days 2004, Darmstadt, Germany},
pages = {7--10},
publisher = {University of Paderborn},
title = {{Selective Tracing of Java Programs}},
volume = {tr-ri-04-253},
year = {2004},
}
@inproceedings{9522,
author = {Mracek, Maik and Wallaschek, Jörg and Hemsel, Tobias},
booktitle = {Proceedings of the 18th International Congress on Acoustics},
pages = {417--420},
title = {{Self configuration of miniature ultrasonic linear motors}},
year = {2004},
}
@article{8702,
author = {Russ, M and Lorke, A and Reuter, Dirk and Schafmeister, P},
issn = {1386-9477},
journal = {Physica E: Low-dimensional Systems and Nanostructures},
pages = {506--509},
title = {{Self-assembled quantum dots as probes for Landau-level spectroscopy}},
doi = {10.1016/j.physe.2003.12.056},
year = {2004},
}
@inbook{4286,
abstract = {Due to their many-particle character and their application in quantum cascade lasers, optical intersubband excitations in semiconductor quantum wells have become the focus of many recent publications [1,2]. In samples of high quality,
intrinsic processes like electron-electron and electron-phonon many particle correlations determine the basic optical and transport properties such as lineshape and ultrafast dynamics. At the same time, intersubband excitations allow
the direct investigation of dynamical properties of an important model system of many particle physics - the two-dimensional electron gas. We here present a microscopic theory for the intersubband dynamics and absorption.
The calculation of absorption spectra of MQW systems is in principle composed of two parts: the determination of the polarization in a single quantum well within a density matrix approach as the source of electromagnetic radiation
(Fig. 1a) and the calculation of the generated fields in the geometry of interest (Fig. 1b) within a Green's function approach [3,4]. We will here focus on the so-called single-pass geometry (cf. Fig. 1b, [5]).},
author = {Waldmüller, Ines and Förstner, Jens and Knorr, Andreas },
booktitle = {Nonequilibrium Physics at Short Time Scales},
editor = {Morawetz, Klaus},
isbn = {9783642057458},
keyword = {tet_topic_qw},
publisher = {Springer Berlin Heidelberg},
title = {{Self-consistent Projection Operator Theory of Intersubband Absorbance in Semiconductor Quantum Wells}},
doi = {10.1007/978-3-662-08990-3},
year = {2004},
}
@inproceedings{3618,
author = {Harteis, Christian and Bauer, Johannes and Festner, Dagmar and Gruber, Hans},
booktitle = {Current issues in adult learning and motivation. 7th Adult Education Colloquium},
pages = {212----221},
title = {{Self-determination in daily working life}},
year = {2004},
}
@inproceedings{13071,
author = {Liu Jing, Michelle and Ruehrup, Stefan and Schindelhauer, Christian and Volbert, Klaus and Dierkes, Martin and Bellgardt, Andreas and Ibers, Rüdiger and Hilleringmann, Ulrich},
booktitle = {{GOR/NGB Conference Tilburg 2004}},
title = {{Sensor Networks with More Features Using Less Hardware}},
year = {2004},
}
@article{8703,
author = {Würtz, A. and Deviatov, E.V. and Lorke, A. and Dolgopolov, V.T. and Reuter, Dirk and Wieck, A.D.},
issn = {1386-9477},
journal = {Physica E: Low-dimensional Systems and Nanostructures},
pages = {177--180},
title = {{Separately contacted edge states in the fractional quantum Hall regime}},
doi = {10.1016/j.physe.2003.11.244},
year = {2004},
}
@misc{18802,
author = {Peckhaus, Volker},
booktitle = {Mathematical Reviews [MR 2004h.03007; online: MathSciNet 2014619]},
title = {{Seuren, P.A.M., The Logic of Thinking, Koninklijke Nederlandse Akademie van Wetenschappen: Amsterdam 2002 (Mededelingen van de Afdeling Letterkunde, Niewe Reeks, Deel 65, no. 9)}},
year = {2004},
}
@article{2119,
author = {Kolman, Petr and Scheideler, Christian},
journal = {Algorithmica},
number = {3},
pages = {209----233},
title = {{Simple On-Line Algorithms for the Maximum Disjoint Paths Problem}},
doi = {10.1007/s00453-004-1086-1},
year = {2004},
}
@inproceedings{7928,
author = {Guo, Ping and Heckel, Reiko},
booktitle = {Proceedings of the 2nd International Fujaba Days (2004), Darmstadt (Germany)},
title = {{Simulation and Testing of Mobile Computing Systems using Fujaba}},
year = {2004},
}
@article{4615,
author = {Feng, Yuanhua},
issn = {0266-4666},
journal = {Econometric Theory},
number = {03},
publisher = {Cambridge University Press (CUP)},
title = {{SIMULTANEOUSLY MODELING CONDITIONAL HETEROSKEDASTICITY AND SCALE CHANGE}},
doi = {10.1017/s0266466604203061},
volume = {20},
year = {2004},
}
@inproceedings{1993,
author = {Kao, Odej and Hovestadt, Matthias and Keller, Axel},
booktitle = {Proc. Advanced Research Workshop on High Perfomance Computing: Technology and Applications},
title = {{SLA-aware Job Migration in Grid Environments}},
year = {2004},
}
@inproceedings{18777,
author = {Sohler, Christian and Damerow, Valentina},
booktitle = {Proceedings of the 20th European Workshop on Computational Geometry (EWCG'04)},
pages = {93 -- 96},
title = {{Smoothed Number of Extreme Points under Uniform Noise}},
year = {2004},
}
@inproceedings{11790,
abstract = {A major drawback of distributed versus terminal-based speech recognition is the fact that transmission errors can lead to degraded recognition performance. In this paper we employ soft features to mitigate the effect of bit errors on wireless transmission links: At the receiver a posteriori probabilities of the transmitted feature vectors are computed by combining bit reliability information provided by the channel decoder and a priori knowledge about residual redundancy in the feature vectors. While the first-order moment of the a posteriori probability function is the MMSE estimate, the second-order moment is a measure of the uncertainty in the reconstructed features. We conducted realistic simulations of GSM transmission and achieved significant improvements in word accuracy compared to the error mitigation strategy described in the ETSI standard.},
author = {Haeb-Umbach, Reinhold and Ion, Valentin},
booktitle = {International Conference on Spoken Language Processing (ICSLP 2004)},
title = {{Soft Features for Improved Distributed Speech Recognition over Wireless Networks}},
year = {2004},
}
@inproceedings{7919,
author = {Belli, Fevzi and Güldali, Baris},
booktitle = {Proceedings of the conference on Computer and Information Sciences (ISCIS 2004), Kemer-Antalya (Turkey)},
pages = {907--916},
publisher = {Springer},
title = {{Software Testing via Model Checking}},
doi = {http://dx.doi.org/10.1007/b101749},
volume = {3280},
year = {2004},
}
@inproceedings{18279,
abstract = {For $c in REAL$, a $c$-spanner is a subgraph of a complete Euclidean graph satisfying that between any two vertices there exists a path of weighted length at most $c$ times their geometric distance. Based on this property to approximate a complete weighted graph, sparse spanners have found many applications, e.g., in FPTAS, geometric searching, and radio networks. For geometric searching, it turned out to suffice whether the radius rather than the length of some path between any two vertices is bounded relatively to their geometric distance; this is the defining property of weak spanners. Finally regarding radio network applications, a power spanner accounts for the total energy afforded for a wireless transmission with the requirement that the sum of the squares of the lengths of some path between any two planar vertices must be bounded relatively to the square of their geometric distance (or higher powers up to 6 or even 8).

While it is known that any $c$-spanner is also both a weak $C_1$-spanner and a $C_2$-power spanner (for appropriate $C_1,C_2$ depending only on $c$ but not on the graph under consideration), we show that the converse fails: There exists a family of $c_1$-power spanners that are no weak $C$-spanners and also a family of weak $c_2$-spanners that are no $C$-spanners for any fixed $C$ (and thus no uniform spanners, either). However the deepest result of the present work reveals that, surprisingly, any weak spanner is also a uniform power spanner. We further generalize the latter notion by considering $(c,delta)$-power spanners where the sum of the $delta$-th powers of the lengths has to be bounded; so $(cdot,2)$-power spanners coincide with the usual power spanners and $(cdot,1)$-power spanners are classical spanners. Interestingly, these $(cdot,delta)$-power spanners form a strict hierarchy where the above results still hold for any $deltageq2$; some even hold for $delta>1$ while counterexamples reveal others to fail for $delta<2$. In fact we show that in general every self-similar curve of fractal dimension $d>delta$ is no $(C,delta)$-power spanner for any fixed $C$. },
author = {Schindelhauer, Christian and Volbert, Klaus and Ziegler, Martin},
booktitle = {Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC'04)},
isbn = {9783540241317},
issn = {0302-9743},
pages = {805--821},
publisher = {Springer },
title = {{Spanners, Weak Spanners, and Power Spanners for Wireless Networks}},
doi = {10.1007/978-3-540-30551-4_69},
volume = {3341},
year = {2004},
}