Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Ochoa, Martín; Jürjens, Jan; Warzecha, Daniel
A Sound Decision Procedure for the Compositionality of SecrecyGilles Barthe; Benjamin Livshits; Riccardo Scandariato (Hrsg). Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Berlin: Springer 2012 S. 97 - 105
Bailer, Werner; Schoeffmann, Klaus; Hopfgartner, Frank
A Survey of Advanced Content Management Tools for TV Post-ProductionYiannis Kompatsiaris;Bernard Merialdo;Shiguo Lian (Hrsg). TV Content Analysis: Techniques and Applications. New York: Auerbach Publications 2012 S. 529 - 566
Jürjens, Jan; Schneider, Kurt
Beyond One-Shot SecurityNorbert Seyff;Anne Koziolek (Hrsg). Modelling and Quality in requirements Engineering: Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday. Münster: Monsenstein und Vannerdat 2012 S. 121 - 132
Hopfgartner, Frank
Capturing Long-Term User Interests in Online Television News ProgramsYiannis Kompatsiaris;Bernard Merialdo;Shiguo Lian (Hrsg). TV Content Analysis: Techniques and Applications. New York: Auerbach Publications 2012 S. 309 - 330
Lee, Alvin J. X.; Roylance, Rebecca; Sander, Jil et al.
CERT depletion predicts chemotherapy benefit and mediates cytotoxic and polyploid-specific cancer cell death through autophagy inductionThe journal of pathology. Bd. 226. H. 3. Bognor Regis: Wiley 2012 S. 482 - 494
Burrell, Rebecca A.; McClelland, Sarah E.; Endesfelder, David et al.
Chromosome 18q encodes a chromosomal instability suppressor locus in colorectal cancerCancer Research. Bd. 72. H. 8. Supplement. Philadelphia, PA: AACR 2012
Scott, David; Guo, Jinlin; Wang, Hongyi et al.
Clipboard: A Visual Search and Browsing Experience for Tablet and PCKlaus Schoeffmann;Bernard Merialdo;Alexander G. Hauptmann;Chong-Wah Ngo;Yiannis Andreopoulos;Christian Breiteneder (Hrsg). Advances in Multimedia Modeling: 18th International Conference, MMM 2012, Klagenfurt, Austria, January 4-6, 2012, Proceedings. Berlin: Springer 2012 S. 646 - 648
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Computational Verification of C Protocol Implementations by Symbolic ExecutionTing Yu; George Danezis; Virgil Gligor (Hrsg). Proceedings of the 19th ACM Conference on Computer and Communications Security CCS 2012: October 16–18, 2012; Raleigh, North Carolina, USA. New York, NY: ACM Association for Computing Machinery 2012 S. 712 - 723
Frey, Hannes; Hollick, Matthias; Loch, Adrian
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless NetworksPrasant Mohapatra (Hrsg). Digital Proceedings of the 2012 IEEE International Symposium on ”A World of Wireless, Mobile and Multimedia Networks” (WoWMoM); June 25. - 28., 2012; San Francisco, California, USA. Piscataway, NJ: IEEE Computer Society 2012 S. 1 - 9
Jürjens, Jan
Den Nebel lichten: Von Compliance-Regularien zu testbaren Sicherheitsanforderungeniqnite 2012. 2012