Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Institut für Informatik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287 - 2720
  • 0261/287 - 2721
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Damm, Werner; Ihlemann, Carsten; Sofronie-Stokkermans, Viorica

Decidability and Complexity for the Verification of Safety Properties of Reasonable Linear Hybrid Automata

Emilio Frazzoli; Radu Grosu (Hrsg). Proceedings of the 2011 ACM/SIGBED: Hybrid Systems: Computation and Control HSCC 2001; April 12–14, 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 73 - 82


Hopfgartner, Frank; Jose, Joemon M.

Development of a test collection for studying long-term user modelling

Myra Spiliopoulou;Andreas Nürnberger;Rene Schult (Hrsg). Report of the symposium "Lernen, Wissen, Adaptivität 2011" of the GI special interest groups KDML, IR and WM, LWA 2011, Magdeburg, 28.-30.September 2011. Magdeburg: Otto-Von-Guericke-Universität Magdeburg 2011 S. 1 - 8


Kaiser, Robert; Zöbel, Dieter

Echtzeitfähigkeit virtueller Maschinen

Wolfgang A. Halang; Peter Holleczek (Hrsg). Eingebettete Systeme: Echtzeit 2010; Boppart; 18. und 19. November, 2010. Berlin: Springer 2011 S. 41 - 50


Vallet, David; Hopfgartner, Frank; Jose, Joemon M. et al.

Effects of Usage-Based Feedback on Video Retrieval: A Simulation-Based Study

ACM Transactions on Information Systems. Bd. 29. H. 2. New York, NY: ACM Association for Computing Machinery 2011 S. 11


Gasse, Francis; Sofronie-Stokkermans, Viorica

Efficient TBox Subsumption Checking in Combinations of EL and (fragments of) FL0

Riccardo Rosati; Sebastian Rudolph; Michael Zakharyaschev (Hrsg). Proccedings of the 24th International Workshop on Description Logics DL 2011; Barcelona, Spain; July 13-16, 2011. Aachen: CEUR/RWTH 2011 S. 125 - 135


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Extracting and verifying cryptographic models from C protocol code by symbolic execution

Yan Chen; George Danezis; Vitaly Shmatikov (Hrsg). Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11: October 17. - 21., 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 331 - 340


Furbach, Ulrich

First-Order Tableaux in Applications (Extended Abstract)

Kai Brünnler; George Metclfe (Hrsg). Automated Reasoning with Analytic Tableaux and Related Methods: 20th International Conference, TABLEAUX 2011, Bern, Switzerland, July 4-8, 2011. Proceedings. Berlin: Springer 2011 S. 17 - 19



Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Steve Kremer; Michael Backes; Steve Zdancewic; Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17


Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.

Incremental Security Verification for Evolving UMLsec models

Robert B. France; Jochen M. Kuester; Behzad Bordbar; Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68