Search Results - "Berndt, Sebastian"

Refine Results
  1. 1

    Practical Access to Dynamic Programming on Tree Decompositions by Bannach, Max, Berndt, Sebastian

    Published in Algorithms (01-08-2019)
    “…Parameterized complexity theory has led to a wide range of algorithmic breakthroughs within the last few decades, but the practicability of these methods for…”
    Get full text
    Journal Article
  2. 2

    Recent Advances in Positive-Instance Driven Graph Searching by Bannach, Max, Berndt, Sebastian

    Published in Algorithms (01-01-2022)
    “…Research on the similarity of a graph to being a tree—called the treewidth of the graph—has seen an enormous rise within the last decade, but a practically…”
    Get full text
    Journal Article
  3. 3

    Polynomial sharings on two secrets: Buy one, get one free by Arnold, Paula, Berndt, Sebastian, Eisenbarth, Thomas, Orlt, Maximilian

    “…While passive side-channel attacks and active fault attacks have been studied intensively in the last few decades, strong attackers combining these attacks…”
    Get full text
    Journal Article
  4. 4

    TeeJam: Sub-Cache-Line Leakages Strike Back by Sieck, Florian, Zhang, Zhiyuan, Berndt, Sebastian, Chuengsatiansup, Chitchanok, Eisenbarth, Thomas, Yarom, Yuval

    “…The microarchitectural behavior of modern CPUs is mostly hidden from developers and users of computer software. Due to a plethora of attacks exploiting…”
    Get full text
    Journal Article
  5. 5

    Side-Channel Protections for Picnic Signatures by Aranha, Diego F., Berndt, Sebastian, Eisenbarth, Thomas, Seker, Okan, Takahashi, Akira, Wilke, Luca, Zaverucha, Greg

    “…We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC…”
    Get full text
    Journal Article
  6. 6

    Online load balancing with general reassignment cost by Berndt, Sebastian, Eberle, Franziska, Megow, Nicole

    Published in Operations research letters (01-05-2022)
    “…We investigate a semi-online variant of load balancing with restricted assignment. In this problem, we are given n jobs, which need to be processed by m…”
    Get full text
    Journal Article
  7. 7

    Fully dynamic bin packing revisited by Berndt, Sebastian, Jansen, Klaus, Klein, Kim-Manuel

    Published in Mathematical programming (01-01-2020)
    “…We consider the fully dynamic bin packing problem, where items arrive and depart in an online fashion and repacking of previously packed items is allowed. The…”
    Get full text
    Journal Article
  8. 8

    On the universal steganography of optimal rate by Berndt, Sebastian, Liśkiewicz, Maciej

    Published in Information and computation (01-12-2020)
    “…In this work, we present the first secure stegosystem in the common computational model which, for any communication channel, is provably secure, reliable, and…”
    Get full text
    Journal Article
  9. 9

    Online bin covering with limited migration by Berndt, Sebastian, Epstein, Leah, Jansen, Klaus, Levin, Asaf, Maack, Marten, Rohwedder, Lars

    Published in Journal of computer and system sciences (01-06-2023)
    “…Semi-online models where decisions may be revoked in a limited way have been studied extensively in the last years. A well-studied measure of the amount of…”
    Get full text
    Journal Article
  10. 10

    Learning residual alternating automata by Berndt, Sebastian, Liśkiewicz, Maciej, Lutter, Matthias, Reischuk, Rüdiger

    Published in Information and computation (01-11-2022)
    “…Residuality plays an essential role for learning finite automata. While residual deterministic and nondeterministic automata have been understood quite well,…”
    Get full text
    Journal Article
  11. 11

    Resonant laser ionization of neptunium: investigation on excitation schemes and the first ionization potential by Kaja, Magdalena, Studer, Dominik, Berg, Felix, Berndt, Sebastian, Düllmann, Christoph E., Kneip, Nina, Reich, Tobias, Urquiza-González, Mitzi, Wendt, Klaus

    “…The atomic structure of neptunium (Np) was investigated by two-step resonance ionization spectroscopy. The study involved exploring ground-state transitions as…”
    Get full text
    Journal Article
  12. 12

    Positive-Instance Driven Dynamic Programming for Graph Searching by Bannach, Max, Berndt, Sebastian

    Published 03-05-2019
    “…Research on the similarity of a graph to being a tree - called the treewidth of the graph - has seen an enormous rise within the last decade, but a practically…”
    Get full text
    Journal Article
  13. 13

    "Act natural!": Exchanging Private Messages on Public Blockchains by Tiemann, Thore, Berndt, Sebastian, Eisenbarth, Thomas, Liskiewicz, Maciej

    “…Messengers have become an essential means of interpersonal interaction. Yet untraceable private communication remains an elusive goal, as most messengers hide…”
    Get full text
    Conference Proceeding
  14. 14

    New Support Size Bounds for Integer Programming, Applied to Makespan Minimization on Uniformly Related Machines by Berndt, Sebastian, Brinkop, Hauke, Jansen, Klaus, Mnich, Matthias, Stamm, Tobias

    Published 15-05-2023
    “…Mixed-integer linear programming (MILP) is at the core of many advanced algorithms for solving fundamental problems in combinatorial optimization. The…”
    Get full text
    Journal Article
  15. 15

    Collaborative VR: Conveying a Complex Disease and Its Treatment by Rettinger, Maximilian, Berndt, Sebastian, Rigoll, Gerhard, Schmaderer, Christoph

    “…In medical research, there are constantly new findings that lead to new insights and novel treatments. Hence, physicians always need to stay up-to-date to…”
    Get full text
    Conference Proceeding
  16. 16

    Practical Access to Dynamic Programming on Tree Decompositions by Bannach, Max, Berndt, Sebastian

    Published 26-06-2018
    “…Parameterized complexity theory has lead to a wide range of algorithmic breakthroughs within the last decades, but the practicability of these methods for…”
    Get full text
    Journal Article
  17. 17

    Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits by Sander, Jonas, Berndt, Sebastian, Bruhns, Ida, Eisenbarth, Thomas

    Published 13-02-2023
    “…The adoption of machine learning solutions is rapidly increasing across all parts of society. As the models grow larger, both training and inference of machine…”
    Get full text
    Journal Article
  18. 18

    Neural stem cell culture model for LRRK2 function determines regulation of dopaminergic and microtubule-associated genes by Meyer, Anne K., Sampathkumar, Charanya, Fransecky, Lars, Maisel, Martina, Kißenkötter, Stefan, Weselek, Grit, Berndt, Sebastian, Kirsch, Matthias, Schwarz, Johannes, Hermann, Andreas, Storch, Alexander

    Published in Basal ganglia (01-11-2015)
    “…Leucine-rich repeat kinase 2 (Lrrk2) is a Parkinson’s disease (PD)-related protein involved in sporadic and familial cases of the disease. Lrrk2 is a kinase…”
    Get full text
    Journal Article
  19. 19

    On the Gold Standard for Security of Universal Steganography by Berndt, Sebastian, Liśkiewicz, Maciej

    Published 24-01-2018
    “…While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about…”
    Get full text
    Journal Article
  20. 20

    Algorithm Substitution Attacks from a Steganographic Perspective by Berndt, Sebastian, Liskiewicz, Maciej

    Published 21-08-2017
    “…The goal of an algorithm substitution attack (ASA), also called a subversion attack (SA), is to replace an honest implementation of a cryptographic tool by a…”
    Get full text
    Journal Article