Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Sofronie-Stokkermans, Viorica
Efficient Hierarchical Reasoning about Functions over Numerical DomainsAndreas R. Dengel; Karsten Berns; Thomas M. Breuel; Frank Bomarius; Thomas R. Roth-Berghofer (Hrsg). KI 2008: Advances in Artificial Intelligence: 31st Annual German Conference on AI, KI 2008, Kaiserslautern, Germany, September 23-26, 2008. Proceedings. Berlin: Springer 2008 S. 135 - 143
Ratiu, Daniel; Jürjens, Jan
Evaluating the Reference and Representation of Domain Concepts in APIsRené Krikhaar; Ralf Lämmel; Verhoef Chris (Hrsg). Proceedings of the 16th IEEE International Conference on Program Comprehension ICPC 2008: 10-13 June 2008; Amsterdam, The Netherlands. Los Alamitos, CA: IEEE Computer Society 2008 S. 242 - 247
Hopfgartner, Frank; Urruty, Thierry; Villa, Robert et al.
Exploiting Log Files in Video RetrievalRonald L. Larsen;Andreas Paepcke;Mor Naaman;José Borbinha (Hrsg). Compilation E-Proceedings of the JCDL 2008 and Hypertext 2008: June 16-21, 2008 Pittsburgh, PA, USA & the co-located workshops (Creating'08 and WebScience'08). New York, NY: ACM Association for Computing Machinery 2008 S. 454
Ratiu, Daniel; Feilkas, Martin; Jürjens, Jan
Extracting Domain Ontologies from Domain Specific APIsKostas Kontogiannis; Christos Tjortjis; Andreas Winter (Hrsg). Proceeding of the 12th European Conference on Software Maintenance and Reengineering CSMR 2008: April 1–4, 2008; Athens, Greece. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2008 S. 203 - 212
Whittle, Jon; Jürjens, Jan; Nuseibeh, Bashar et al.
First International Modeling Security WorkshopMichel R. V. Chaudron (Hrsg). Models in Software Engineering: Workshops and Symposia at MODELS 2008, Toulouse, France, September 28 - October 3, 2008. Reports and Revised Selected Papers. Berlin: Springer 2008 S. 181 - 184
Frey, Hannes; Pind, Kristen
First Results of a Performance Comparison of Dynamic Source Routing versus Greedy Routing in Real-World Sensor Network DeploymentsHartmut Ritter;Kirsten Terfloth;Georg Wittenburg;Jochen Schiller (Hrsg). 7. GI/ITG KuVS Fachgespräch Drahtlose Sensornetze: Am 25. und 26. September 2008 in Berlin. Berlin: Freie Universität Berlin, Institut für Informatik 2008 S. 73 - 76
Furbach, Ulrich
IJCAR PrefaceJournal of Automated Reasoning. Bd. 40. H. 2-3. Dordrecht: Springer 2008 S. IJCAR
Halvey, Martin; Hopfgartner, Frank; Vallet, David et al.
Implicit Search Trails for Video Recommendation2008 S. 1 - 3
Fernández, Eduardo B.; Jürjens, Jan; Yoshioka, Nobukazu et al.
Incorporating Database Systems into a Secure Software Development MethodologyA. Min Tjoa; Roland R. Wagner (Hrsg). Proceedings of the 19th International Conference on Database and Expert Systems Applications: 1.- 5. September 2008; Turin, Italy. Los Alamitos, CA: IEEE Computer Society 2008 S. 310 - 314
Islam, Shareeful; Jürjens, Jan
Incorporating Security Requirements from Legal Regulations into UMLsec ModelsJon Whittle;Jan Jürjens;Bashar Nuseibeh;Glen Dobson (Hrsg). Proceedings of the Workshop on Modeling Security MODSEC 08 held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems MODELS: Toulouse, France, September 28, 2008. Aachen: CEUR/RWTH 2008 S. 1 - 10