Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Brust, Matthias R.; Frey, Hannes; Rothkugel, Steffen
Adaptive multi-hop clustering in mobile networksPeter H. J. Chong; Adrian David Cheok (Hrsg). Proceedings of the 4th International Conference on Mobile Technology, Applications and Systems Mobility 2007 Incorporating The 1st International Symposium on Computer Human Interaction in Mobile Technology IS-CHI 2007: 10 – 12 September, 2007; Singapore Polytechnic, Singapore. New York, NY: ACM Association for Computing Machinery 2007 S. 132 - 138
Houmb, Siv Hilde; Georg, Geri; Jürjens, Jan et al.
An Integrated Security Verification and Security Solution Design Trade-off Analysis ApproachHaralambos Mouratidis;Paolo Giorgini (Hrsg). Integrating Security and Software Engineering: Advances and Future Visions. Hershey, PA: IGI Global 2007 S. 190 - 219
Jacobs, Swen; Sofronie-Stokkermans, Viorica
Applications of Hierarchical Reasoning in the Verification of Complex Systems 3Electronic Notes in Theoretical Computer Science. Bd. 174. H. 8. Amsterdam: Elsevier 2007 S. 39 - 54
Zöbel, Dieter; Weyand, Christian
Augmenting sensitivity analysis for embedded applications by program level derivation of process parametersLuis Gomes; Eric Dekneuvel; João Paulo Barros (Hrsg). 2007 Symposium on Industrial Embedded Systems Proceedings: Hotel Costa da Caparica, Lisbon, Portugal; 4-6 July 2007. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2007 S. 17 - 24
Sofronie-Stokkermans, Viorica; Ihlemann, Carsten
Automated Reasoning in Some Local Extensions of Ordered StructuresJournal of Multiple-Valued Logic and Soft Computing. Bd. 13. H. 4-6. Philadelphia, PA: Old City Publishing 2007 S. 397 - 414
Sofronie-Stokkermans, Viorica; Ihlemann, Carsten
Automated Reasoning in Some Local Extensions of Ordered StructuresYngvar Berg; Omid Mirmotahari (Hrsg). Proceedings of the 37th International Symposium on Multiple-Valued Logic ISMVL 2007; May 13 – 26, 2007; Oslo, Norway. Los Alamitos, CA: IEEE Computer Society 2007 S. 1
Jürjens, Jan
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie ProjectSeventh International Workshop on Automated Verification of Critical Systems (AVOCS 2007). Oxford. 2007
Sofronie-Stokkermans, Viorica
Automated theorem proving by resolution in non-classical logicsAnnals of Mathematics and Artificial Intelligence. Bd. 49. H. 1-4. Dordrecht: Springer 2007 S. 221 - 252
Höhfeld, Alexander; Frey, Hannes; Sturm, Peter
Beispielapplikationen für die Pervasive UniversityRainer Koschke; Otthein Herzog; Karl-Heinz Rödiger; Marc Ronthaler (Hrsg). INFORMATIK 2007 - Informatik trifft Logistik, Band 1: Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V. (GI); September 24. - 27., 2007; Bremen. Bonn: Gesellschaft für Informatik 2007 S. 492 - 496
Jürjens, Jan
Compliance-driven Secure Software Quality ManagementSoftware & Systems Quality Conference (SQC-UK 2007). London, 2./3. Oct. 2007