Index of 2005
Department Of Computer Science
Technical Reports
Aachener Informatik-Berichte (AIB)

Available Reports

2005-01
Fachgruppe Informatik
Jahresbericht 2004
2005-02
Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz, Martin Mink
An Offensive Approach to Teaching Information Security: "Aachen Summer School Applied IT Security"
2005-03
Jürgen Giesl, René Thiemann, Peter Schneider-Kamp
Proving and Disproving Termination of Higher-Order Functions
2005-04
Daniel Mölle, Stefan Richter, Peter Rossmanith
A Faster Algorithm for the Steiner Tree Problem
2005-05
Fabien Pouget, Thorsten Holz
A Pointillist Approach for Comparing Honeypots
2005-06
Simon Fischer, Berthold Vöcking
Adaptive Routing with Stale Information
2005-07
Felix C. Freiling, Thorsten Holz, Georg Wicherski
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
2005-08
Joachim Kneis, Peter Rossmanith
A New Satisfiability Algorithm With Applications To Max-Cut
2005-09
Klaus Kursawe, Felix C. Freiling
Byzantine Fault Tolerance on General Hybrid Adversary Structures
2005-10
Benedikt Bollig
Automata and Logics for Message Sequence Charts
2005-11
Simon Fischer, Berthold Vöcking
A Counterexample to the Fully Mixed Nash Equilibrium Conjecture
2005-12
Neeraj Mittal, Felix Freiling, S. Venkatesan, Lucia Draque Penso
Efficient Reductions for Wait-Free Termination Detection in Faulty Distributed Systems
2005-13
Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling
Revisiting Failure Detection and Consensus in Omission Failure Environments
2005-14
Felix C. Freiling, Sukumar Ghosh
Code Stabilization
2005-15
Uwe Naumann
The Complexity of Derivative Computation
2005-16
Uwe Naumann
Syntax-Directed Derivative Code (Part I: Tangent-Linear Code)
2005-17
Uwe Naumann
Syntax-directed Derivative Code (Part II: Intraprocedural Adjoint Code)
2005-18
Thomas von der Maßen, Klaus Müller, John MacGregor, Eva Geisberger, Jörg Dörr, Frank Houdek, Harbhajan Singh, Holger Wußmann, Hans-Veit Bacher, Barbara Paech
Einsatz von Features im Software-Entwicklungsprozess - Abschlußbericht des GI-Arbeitskreises "Features"
2005-19
Uwe Naumann, Andre Vehreschild
Tangent-Linear Code by Augmented LL-Parsers
2005-20
Felix C. Freiling, Martin Mink
Bericht über den Workshop zur Ausbildung im Bereich IT-Sicherheit Hochschulausbildung, berufliche Weiterbildung, Zertifizierung von Ausbildungsangeboten am 11. und 12. August 2005 in Köln organisiert von RWTH Aachen in Kooperation mit BITKOM, BSI, DLR und Gesellschaft fuer Informatik (GI) e.V.
2005-21
Thomas Noll, Stefan Rieger
Optimization of Straight-Line Code Revisited
2005-22
Felix Freiling, Maurice Herlihy, Lucia Draque Penso
Optimal Randomized Fair Exchange with Secret Shared Coins
2005-23
Heiner Ackermann, Alantha Newman, Heiko Röglin, Berthold Vöcking
Decision Making Based on Approximate and Smoothed Pareto Curves
2005-24
Alexander Becher, Zinaida Benenson, Maximillian Dornseif
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks