default search action
Boris Düdder
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Haiqin Wu, Boris Düdder, Liangmin Wang, Zhenfu Cao, Jun Zhou, Xia Feng:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture. ACM Comput. Surv. 56(3): 63:1-63:40 (2024) - [j11]Haiqin Wu, Boris Düdder, Shunrong Jiang, Liangmin Wang:
VP$^{2}$2-Match: Verifiable Privacy-Aware and Personalized Crowdsourcing Task Matching via Blockchain. IEEE Trans. Mob. Comput. 23(10): 9913-9930 (2024) - [j10]Xikun Jiang, Chenhao Ying, Lei Li, Boris Düdder, Haiqin Wu, Haiming Jin, Yuan Luo:
Incentive Mechanism for Uncertain Tasks Under Differential Privacy. IEEE Trans. Serv. Comput. 17(3): 977-989 (2024) - [c28]Liang Li, Haiqin Wu, Boris Düdder, Jiachen Shen, Zhenfu Cao:
Bilateral Secure and Decentralized Crowdsourcing Task Matching Atop Consortium Blockchain. Blockchain 2024: 294-301 - [c27]Guofeng Li, Xia Feng, Liang-Min Wang, Haiqin Wu, Boris Düdder:
Federated Unlearning in the Internet of Vehicles. DSN-S 2024: 96-103 - [c26]Michel Avital, Samir Chatterjee, Boris Düdder, Nishtha Langer, Jan Marco Leimeister, Natalia Levina, Jonathan Wareham:
Quantum Computing: Going Where No One Has Gone Before. ICIS 2024 - [c25]Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo:
Privacy-Preserving UCB Decision Process Verification via zk-SNARKs. IJCAI 2024: 5900-5908 - [c24]Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou:
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. NDSS 2024 - [i10]Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo:
Privacy-Preserving UCB Decision Process Verification via zk-SNARKs. CoRR abs/2404.12186 (2024) - [i9]Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder, Yongluan Zhou:
A Study on Asynchronous Vote-based Blockchains. CoRR abs/2409.08161 (2024) - [i8]Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou:
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. IACR Cryptol. ePrint Arch. 2024: 304 (2024) - 2023
- [j9]Dennis Vetter, Julia Amann, Frédérick Bruneault, Megan Coffee, Boris Düdder, Alessio Gallucci, Thomas Krendl Gilbert, Thilo Hagendorff, Irmhild van Halem, Eleanore Hickman, Elisabeth Hildt, Sune Holm, Georgios Kararigas, Pedro Kringen, Vince I. Madai, Emilie Wiinblad Mathez, Jesmin Jahan Tithi, Magnus Westerlund, Renee Wurth, Roberto V. Zicari:
Lessons Learned from Assessing Trustworthy AI in Practice. Digit. Soc. 2(3): 35 (2023) - [j8]Liangmin Wang, Victor S. Sheng, Boris Düdder, Haiqin Wu, Huijuan Zhu:
Security and privacy issues in blockchain and its applications. IET Blockchain 3(4): 169-171 (2023) - [j7]Yibin Xu, Tijs Slaats, Boris Düdder:
A two-dimensional sharding model for access control and data privilege management of blockchain. Simul. Model. Pract. Theory 122: 102678 (2023) - [j6]Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder:
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding. ACM Trans. Internet Techn. 23(2): 34:1-34:27 (2023) - [c23]Yibin Xu, Tijs Slaats, Boris Düdder, Thomas Troels Hildebrandt:
Adding Generic Role- and Process-based Behaviors to Smart Contracts using Dynamic Condition Response Graphs. ICSSP 2023: 70-80 - [c22]Prasanna Siddharth Mukkamala, Haiqin Wu, Boris Düdder:
Reliable and Streaming Truth Discovery in Blockchain-based Crowdsourcing. SECON 2023: 492-500 - [i7]Xikun Jiang, Chenhao Ying, Lei Li, Haiqin Wu, Yuan Luo, Boris Düdder:
Incentive Mechanism for Uncertain Tasks under Differential Privacy. CoRR abs/2305.16793 (2023) - [i6]Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou:
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. CoRR abs/2310.11373 (2023) - 2022
- [j5]Simon L. Bager, Boris Düdder, Fritz Henglein, Juan Manuel Hébert, Haiqin Wu:
Event-Based Supply Chain Network Modeling: Blockchain for Good Coffee. Frontiers Blockchain 5: 846783 (2022) - [j4]Haiqin Wu, Boris Düdder, Liangmin Wang, Shipu Sun, Guoliang Xue:
Blockchain-Based Reliable and Privacy-Aware Crowdsourcing With Truth and Fairness Assurance. IEEE Internet Things J. 9(5): 3586-3598 (2022) - [c21]Yibin Xu, Tijs Slaats, Boris Düdder:
Poster: Unanimous-Majority - Pushing Blockchain Sharding Throughput to its Limit. CCS 2022: 3495-3497 - [c20]Xikun Jiang, Chenhao Ying, Xinchun Yu, Boris Düdder, Yuan Luo:
Incentive Mechanism Design for Uncertain Tasks in Mobile Crowd Sensing Systems Utilizing Smart Contract in Blockchain. CollaborateCom (1) 2022: 475-493 - [c19]Tilman Zuckmantel, Yongluan Zhou, Boris Düdder, Thomas T. Hildebrandt:
Event-based data-centric semantics for consistent data management in microservices. DEBS 2022: 97-102 - [c18]Yibin Xu, Tijs Slaats, Boris Düdder, Søren Debois, Haiqin Wu:
Distributed and Adversarial Resistant Workflow Execution on the Algorand Blockchain. Financial Cryptography Workshops 2022: 583-597 - [i5]Roberto V. Zicari, Julia Amann, Frédérick Bruneault, Megan Coffee, Boris Düdder, Eleanore Hickman, Alessio Gallucci, Thomas Krendl Gilbert, Thilo Hagendorff, Irmhild van Halem, Elisabeth Hildt, Sune Holm, Georgios Kararigas, Pedro Kringen, Vince I. Madai, Emilie Wiinblad Mathez, Jesmin Jahan Tithi, Dennis Vetter, Magnus Westerlund, Renee Wurth:
How to Assess Trustworthy AI in Practice. CoRR abs/2206.09887 (2022) - [i4]Yibin Xu, Tijs Slaats, Boris Düdder, Søren Debois, Haiqin Wu:
Distributed and Adversarial Resistant Workflow Execution on the Algorand Blockchain. CoRR abs/2211.08695 (2022) - 2021
- [j3]Jan Bessai, George T. Heineman, Boris Düdder:
Covariant Conversions (CoCo): A Design Pattern for Type-Safe Modular Software Evolution in Object-Oriented Systems (Artifact). Dagstuhl Artifacts Ser. 7(2): 04:1-04:4 (2021) - [c17]Jan Bessai, George T. Heineman, Boris Düdder:
Covariant Conversions (CoCo): A Design Pattern for Type-Safe Modular Software Evolution in Object-Oriented Systems. ECOOP 2021: 4:1-4:25 - [i3]Boris Düdder, Haiqin Wu, Michael Henke, Natalia Straub, Tan Gürpinar, Philipp Asterios Ioannidis, Vladislav Fomin, Raimundas Matulevicius, Mubashar Iqbal:
BlockNet Report: Curriculum Guidance Document. CoRR abs/2102.03226 (2021) - [i2]Boris Düdder, Vladislav Fomin, Tan Gürpinar, Michael Henke, Philipp Asterios Ioannidis, Viktorija Janaviciene, Raimundas Matulevicius, Mubashar Iqbal, Natalia Straub:
BlockNet Report: Exploring the Blockchain Skills Concept and Best Practice Use Cases. CoRR abs/2102.04333 (2021) - 2020
- [j2]Boris Düdder, Vladislav Fomin, Tan Gürpinar, Michael Henke, Mubashar Iqbal, Viktorija Janaviciene, Raimundas Matulevicius, Natalia Straub, Haiqin Wu:
Interdisciplinary Blockchain Education: Utilizing Blockchain Technology From Various Perspectives. Frontiers Blockchain 3: 578022 (2020)
2010 – 2019
- 2018
- [j1]Jan Bessai, Tzu-Chun Chen, Andrej Dudenhefner, Boris Düdder, Ugo de'Liguoro, Jakob Rehof:
Mixin Composition Synthesis based on Intersection Types. Log. Methods Comput. Sci. 14(1) (2018) - [c16]Jan Bessai, Jakob Rehof, Boris Düdder:
Fast Verified BCD Subtyping. Models, Mindsets, Meta 2018: 356-371 - 2017
- [c15]Boris Düdder, Omri Ross:
Timber Tracking - Reducing Complexity of Due Diligence by using Blockchain Technology (Position Paper). BIR Workshops 2017 - [i1]Jan Bessai, Tzu-Chun Chen, Andrej Dudenhefner, Boris Düdder, Ugo de'Liguoro, Jakob Rehof:
Mixin Composition Synthesis based on Intersection Types. CoRR abs/1712.06906 (2017) - 2016
- [c14]Boris Düdder, George T. Heineman, Jakob Rehof:
ModSyn-PP: Modular Synthesis of Programs and Processes Track Introduction. ISoLA (1) 2016: 261-265 - [c13]Jan Bessai, Andrej Dudenhefner, Boris Düdder, Moritz Martens, Jakob Rehof:
Combinatory Process Synthesis. ISoLA (1) 2016: 266-281 - [c12]George T. Heineman, Jan Bessai, Boris Düdder, Jakob Rehof:
A Long and Winding Road Towards Modular Synthesis. ISoLA (1) 2016: 303-317 - 2015
- [c11]Jan Bessai, Boris Düdder, George T. Heineman, Jakob Rehof:
Combinatory Synthesis of Classes Using Feature Grammars. FACS 2015: 123-140 - [c10]Boris Düdder, Moritz Martens, Jakob Rehof:
Staged Composition Synthesis. Software Engineering & Management 2015: 89-90 - [c9]George T. Heineman, Armend Hoxha, Boris Düdder, Jakob Rehof:
Towards migrating object-oriented frameworks to enable synthesis of product line members. SPLC 2015: 56-60 - [c8]Boris Düdder, Jakob Rehof, George T. Heineman:
Synthesizing type-safe compositions in feature oriented software designs using staged composition. SPLC 2015: 398-401 - [c7]Jan Bessai, Andrej Dudenhefner, Boris Düdder, Tzu-Chun Chen, Ugo de'Liguoro, Jakob Rehof:
Mixin Composition Synthesis Based on Intersection Types. TLCA 2015: 76-91 - 2014
- [b1]Boris Düdder:
Automatic synthesis of component & connector software architectures with bounded combinatory logic. Technical University Dortmund, Germany, 2014 - [c6]Boris Düdder, Moritz Martens, Jakob Rehof:
Staged Composition Synthesis. ESOP 2014: 67-86 - [c5]Jan Bessai, Andrej Dudenhefner, Boris Düdder, Moritz Martens, Jakob Rehof:
Combinatory Logic Synthesizer. ISoLA (1) 2014: 26-40 - [c4]Jan Bessai, Boris Düdder, Andrej Dudenhefner, Tzu-Chun Chen, Ugo de'Liguoro:
Typing Classes and Mixins with Intersection Types. ITRS 2014: 79-93 - 2013
- [c3]Boris Düdder, Moritz Martens, Jakob Rehof:
Intersection Type Matching with Subtyping. TLCA 2013: 125-139 - 2012
- [c2]Boris Düdder, Moritz Martens, Jakob Rehof, Pawel Urzyczyn:
Bounded Combinatory Logic. CSL 2012: 243-258 - [c1]Boris Düdder, Oliver Garbe, Moritz Martens, Jakob Rehof, Pawel Urzyczyn:
Using Inhabitation in Bounded Combinatory Logic with Intersection Types for Composition Synthesis. ITRS 2012: 18-34
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint