Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Damm, Werner; Ihlemann, Carsten; Sofronie-Stokkermans, Viorica
Decidability and Complexity for the Verification of Safety Properties of Reasonable Linear Hybrid AutomataEmilio Frazzoli; Radu Grosu (Hrsg). Proceedings of the 2011 ACM/SIGBED: Hybrid Systems: Computation and Control HSCC 2001; April 12–14, 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 73 - 82
Hopfgartner, Frank; Jose, Joemon M.
Development of a test collection for studying long-term user modellingMyra Spiliopoulou;Andreas Nürnberger;Rene Schult (Hrsg). Report of the symposium "Lernen, Wissen, Adaptivität 2011" of the GI special interest groups KDML, IR and WM, LWA 2011, Magdeburg, 28.-30.September 2011. Magdeburg: Otto-Von-Guericke-Universität Magdeburg 2011 S. 1 - 8
Kaiser, Robert; Zöbel, Dieter
Echtzeitfähigkeit virtueller MaschinenWolfgang A. Halang; Peter Holleczek (Hrsg). Eingebettete Systeme: Echtzeit 2010; Boppart; 18. und 19. November, 2010. Berlin: Springer 2011 S. 41 - 50
Vallet, David; Hopfgartner, Frank; Jose, Joemon M. et al.
Effects of Usage-Based Feedback on Video Retrieval: A Simulation-Based StudyACM Transactions on Information Systems. Bd. 29. H. 2. New York, NY: ACM Association for Computing Machinery 2011 S. 11
Gasse, Francis; Sofronie-Stokkermans, Viorica
Efficient TBox Subsumption Checking in Combinations of EL and (fragments of) FL0Riccardo Rosati; Sebastian Rudolph; Michael Zakharyaschev (Hrsg). Proccedings of the 24th International Workshop on Description Logics DL 2011; Barcelona, Spain; July 13-16, 2011. Aachen: CEUR/RWTH 2011 S. 125 - 135
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Extracting and verifying cryptographic models from C protocol code by symbolic executionYan Chen; George Danezis; Vitaly Shmatikov (Hrsg). Proceedings of the 18th ACM Conference on Computer and Communications Security CCS '11: October 17. - 21., 2011; Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2011 S. 331 - 340
Furbach, Ulrich
First-Order Tableaux in Applications (Extended Abstract)Kai Brünnler; George Metclfe (Hrsg). Automated Reasoning with Analytic Tableaux and Related Methods: 20th International Conference, TABLEAUX 2011, Bern, Switzerland, July 4-8, 2011. Proceedings. Berlin: Springer 2011 S. 17 - 19
Tinelli, Cesare; Sofronie-Stokkermans, Viorica
Frontiers of Combining Systems: 8th International Symposium, FroCoS 2011, Saarbrücken, Germany, October 5-7, 2011. ProceedingsBerlin: Springer 2011
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan et al.
Guiding a General-Purpose C Verifier to Prove Cryptographic ProtocolsSteve Kremer; Michael Backes; Steve Zdancewic; Jonathan Herzog (Hrsg). 24th IEEE Computer Security Foundations Symposium CSF 2011: 27-29 June, 2011; Cernay-la-Ville, France. Los Alamitos, CA: IEEE Computer Society 2011 S. 3 - 17
Jürjens, Jan; Marchal, Loïc; Ochoa, Martín et al.
Incremental Security Verification for Evolving UMLsec modelsRobert B. France; Jochen M. Kuester; Behzad Bordbar; Richard F. Paige (Hrsg). Modelling Foundations and Applications: 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings. Berlin: Springer 2011 S. 52 - 68