Starten Sie Ihre Suche...


Wir weisen darauf hin, dass wir technisch notwendige Cookies verwenden. Weitere Informationen

Institut für Informatik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287 - 2720
  • 0261/287 - 2721
Publikationen
PDF | RTF
Ergebnisse pro Seite:  10

Furbach, Ulrich

IJCAR Preface

Journal of Automated Reasoning. Bd. 40. H. 2-3. Dordrecht: Springer 2008 S. IJCAR


Halvey, Martin; Hopfgartner, Frank; Vallet, David et al.

Implicit Search Trails for Video Recommendation

2008 S. 1 - 3


Fernández, Eduardo B.; Jürjens, Jan; Yoshioka, Nobukazu et al.

Incorporating Database Systems into a Secure Software Development Methodology

A. Min Tjoa; Roland R. Wagner (Hrsg). Proceedings of the 19th International Conference on Database and Expert Systems Applications: 1.- 5. September 2008; Turin, Italy. Los Alamitos, CA: IEEE Computer Society 2008 S. 310 - 314


Islam, Shareeful; Jürjens, Jan

Incorporating Security Requirements from Legal Regulations into UMLsec Models

Jon Whittle;Jan Jürjens;Bashar Nuseibeh;Glen Dobson (Hrsg). Proceedings of the Workshop on Modeling Security MODSEC 08 held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems MODELS: Toulouse, France, September 28, 2008. Aachen: CEUR/RWTH 2008 S. 1 - 10


Sofronie-Stokkermans, Viorica

Interpolation in Local Theory Extensions

Logical Methods in Computer Science. Bd. 4. H. 4. Braunschweig: Department of Theoretical Computer Science, Technical University of Braunschweig 2008 S. 1 - 31


Taubenberger, Stefan; Jürjens, Jan

IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements

Jon Whittle;Jan Jürjens;Bashar Nuseibeh;Glen Dobson (Hrsg). Proceedings of the Workshop on Modeling Security MODSEC 08 held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems MODELS: Toulouse, France, September 28, 2008. Aachen: CEUR/RWTH 2008 S. 1 - 10


Wilkins, Peter; Byrne, Daragh; Jones, Gareth J. F. et al.

K-Space at TRECVID 2008

Paul Over;George Awad;R. Travis Rose;Jonathan G. Fiscus;Wessel Kraaij;Alan F. Smeaton (Hrsg). Proceedings of TREC Video Retrieval Evaluation TRECVID 2008 - workshop participants notebook papers: 17-18 November 2008; Gaithersburg, MD, USA. Gaithersburg, MD: NIST National Institute of Standards and Technology 2008 S. 260 - 269


Jürjens, Jan

Linking Cryptoprotocol Verification to Reality

Annual Meeting of the Working Group on Formal Methods and Software Engineering for Safety and Security (German Computer Society). Darmstadt (Germany). 2008 S. 1 - 29


Sofronie-Stokkermans, Viorica

Locality and Subsumption Testing in EL and Some of its Extensions

Franz Baader; Carsten Lutz; Boris Motik (Hrsg). Proccedings of the 21th International Workshop on Description Logics DL 2008; Dresden, Germany; May 13–16, 2008. Aachen: CEUR/RWTH 2008 S. keine Angaben


Sofronie-Stokkermans, Viorica

Locality and subsumption testing in EL and some of its extensions

Carlos Areces; Robert Goldblatt (Hrsg). Advances in Modal Logic. Rickmansworth: College Publications 2008 S. 315 - 339