Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.
Component criticality analysis to minimize soft errors riskInternational Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37
Rybalchenko, Andrey; Sofronie-Stokkermans, Viorica
Constraint solving for interpolationJournal of Symbolic Computation. Bd. 45. H. 11. Amsterdam: Elsevier 2010 S. 1212 - 1233
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentationComputer Security Foundations Symposium (CSF). 2010
Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsecRequirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93
Mohammed, Ammar; Furbach, Ulrich
Extending CTL to Specify Quantitative Temporal RequirementsManuel Isidoro Capel-Tuñón; Juan Garbajosa (Hrsg). Proceedings of the 8th International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems MSVVEIS 2010 in conjunction with ICEIS 2010; Funchal, Madeira, Portugal; 8 - 12 June, 2010. Setúbal: INSTICC Press 2010 S. 70 - 79
Lichte, Hermann S.; Frey, Hannes; Karl, Holger
Fading-Resistant Low-Latency Broadcasts in Wireless Multihop Networks: The Probabilistic Cooperation Diversity ApproachNitin Vaidya; Christoph Lindemann; Jitendra Padhye (Hrsg). MobiCom'10 & MobiHoc'10Proceedings of the 16th Annual International Conference on Mobile Computing and Networking and the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing; September 20–24, 2010; Chicago, Illinois, USA Chicago, Illinois, USA. New York, NY: ACM Association for Computing Machinery 2010 S. 101 - 110
Pironti, Alfredo; Jürjens, Jan
Formally-Based Black-Box Monitoring of Security ProtocolsFabio Massacci; Dan Wallach; Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95
Mouratidis, Haralambos; Jürjens, Jan
From goal-driven security requirements engineering to secure designInternational Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840
Frey, Hannes
General lower and best case upper bounds on energy optimal multicasting in wireless ad hoc and sensor networksAzzedine Boukerche; Giuseppe Bianchi (Hrsg). Digital Proceedings of the 2010 IEEE International Symposium on ”A World of Wireless, Mobile and Multimedia Networks” (WoWMoM); 14.-17. June, 2010; Montreal, QC, Canada. Piscataway, NJ: IEEE Computer Society 2010 S. 1 - 9
Zöbel, Dieter; Weyand, Christian
Generic Data Types for Planning and Control in Intermodal Freight Transshipment ApplicationsChangyun Wen; Danwei Wang; Eric Sung (Hrsg). Proceedings of the 11th International Conference on Control, Automation, Robotics, and Vision ICARCV 2010: 7.-10. December 2010; Singapore. Piscataway, NJ: IEEE Institute of Electrical and Electronics Engineers 2010 S. 1991 - 1996