Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Institut für Informatik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287 - 2720
  • 0261/287 - 2721
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk

International Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37


Rybalchenko, Andrey; Sofronie-Stokkermans, Viorica

Constraint solving for interpolation

Journal of Symbolic Computation. Bd. 45. H. 11. Amsterdam: Elsevier 2010 S. 1212 - 1233


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentation

Computer Security Foundations Symposium (CSF). 2010


Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec

Requirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93


Mohammed, Ammar; Furbach, Ulrich

Extending CTL to Specify Quantitative Temporal Requirements

Manuel Isidoro Capel-Tuñón; Juan Garbajosa (Hrsg). Proceedings of the 8th International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems MSVVEIS 2010 in conjunction with ICEIS 2010; Funchal, Madeira, Portugal; 8 - 12 June, 2010. Setúbal: INSTICC Press 2010 S. 70 - 79


Lichte, Hermann S.; Frey, Hannes; Karl, Holger

Fading-Resistant Low-Latency Broadcasts in Wireless Multihop Networks: The Probabilistic Cooperation Diversity Approach

Nitin Vaidya; Christoph Lindemann; Jitendra Padhye (Hrsg). MobiCom'10 & MobiHoc'10Proceedings of the 16th Annual International Conference on Mobile Computing and Networking and the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing; September 20–24, 2010; Chicago, Illinois, USA Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2010 S. 101 - 110


Pironti, Alfredo; Jürjens, Jan

Formally-Based Black-Box Monitoring of Security Protocols

Fabio Massacci; Dan Wallach; Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95


Mouratidis, Haralambos; Jürjens, Jan

From goal-driven security requirements engineering to secure design

International Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840


Frey, Hannes

General lower and best case upper bounds on energy optimal multicasting in wireless ad hoc and sensor networks

Azzedine Boukerche; Giuseppe Bianchi (Hrsg). Digital Proceedings of the 2010 IEEE International Symposium on ”A World of Wireless, Mobile and Multimedia Networks” (WoWMoM); 14.-17. June, 2010; Montreal, QC, Canada. Piscataway, NJ: IEEE Computer Society 2010 S. 1 - 9


Zöbel, Dieter; Weyand, Christian

Generic Data Types for Planning and Control in Intermodal Freight Transshipment Applications

Changyun Wen; Danwei Wang; Eric Sung (Hrsg). Proceedings of the 11th International Conference on Control, Automation, Robotics, and Vision ICARCV 2010: 7.-10. December 2010; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2010 S. 1991 - 1996