Institut für Informatik
FB 4: Informatik / Universität Koblenz
- 0261/287 - 2720
- 0261/287 - 2721
Kschischo, Maik
Stochastische Signalkaskaden mit RückkopplungThorsten Pöschel; Horst Malchow; Lutz Schimansky-Geier (Hrsg). Irreversible Prozesse und Selbstorganisation. Berlin: Logos 2006 S. 219 - 232
Jürjens, Jan; Fox, Jorge
Tools for Model-based Security EngineeringLeon J. Osterweil; Dieter Rombach; Mary Lou Soffa (Hrsg). Proceedings of the 28th International Conference on Software Engineering ICSE 2006: May 20. - 28., 2006; Shanghai, China. New York, NY: ACM Association for Computing Machinery 2006 S. 819 - 822
Mouratidis, Haralambos; Jürjens, Jan; Fox, Jorge
Towards a Comprehensive Framework for Secure Systems DevelopmentEric Dubois; Klaus Pohl (Hrsg). Advanced Information Systems Engineering: 18th International Conference, CAiSE 2006: Luxembourg, Luxembourg, June 5-9, 2006; Proceedings. Berlin: Springer 2006 S. 48 - 62
Cordy, James R.; Lämmel, Ralf; Winter, Andreas
Transformation Techniques in Software Engineering - Dagstuhl Seminar Proceedings 05161: 17.04. - 22.04.2005; Schloß DagstuhlWadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2006
Zöbel, Dieter; Berg, Uwe; Schönfeld, Martin
Visuelle Lenkassistenz für Fahrzeuge mit EinachsanhängerPeter Holleczek; Birgit Vogel-Heuser (Hrsg). Echtzeitsysteme im Alltag: Fachtagung der GI-Fachgruppe Echtzeitsysteme (RT), Boppard, 30. November/1. Dezember 2006. Berlin: Springer 2006 S. 1 - 10
Kschischo, Maik; Kern, Rainer; Gieger, Christian et al.
Automatic Scoring and Quality Assessment Using Accuracy Bounds for FP-TDI SNP Genotyping DataApplied Bioinformatics. Bd. 4. H. 2. Auckland: Adis Online 2005 S. 75 - 84
Jürjens, Jan
Code Security Analysis of a Biometric Authentication System Using Automated Theorem ProversDan Thomsen; Christoph Schuba; Charles Payne (Hrsg). Proceedings of the 21st Annual Computer Security Applications Conference ACSAC 2005: 5-9 December 2005; Tucson, Arizona. Los Alamitos, CA: IEEE Computer Society 2005 S. 138 - 149
Jürjens, Jan; Yampolskiy, Mark
Code security analysis with assertionsDavid F. Redmiles; Tom Ellman; Andrea Zisman (Hrsg). Proceeding of the 20th IEEE/ACM International Conference on Automated Software Engineering ASE 2005: Long Beach, California, USA; November 7-11, 2005. New York, NY: ACM Association for Computing Machinery 2005 S. 392 - 395
Wagner, Stefan; Jürjens, Jan; Koller, Claudia et al.
Comparing Bug Finding Tools with Reviews and TestsFerhat Khendek; Rachida Dssouli (Hrsg). Testing of Communicating Systems: 17th IFIP TC6/WG 6.1 International Conference, TestCom 2005, Montreal, Canada, May 31 - June 2, 2005. Proceedings. Berlin: Springer 2005 S. 40 - 55
Jürjens, Jan; Wagner, Stefan
Component-Based Development of Dependable Systems with UMLColin Atkinson; Christian Bunse; Hans-Gerhard Gross; Christian Peper (Hrsg). Component-Based Software Development for Embedded Systems: An Overview of Current Research Trends. Berlin: Springer 2005 S. 320 - 344