FB 4: Informatik
Universität Koblenz
- 0261/287-2501
- 0261/287-2502
Santos, Marc; Müller, Stefan
LessonTalk - Mehr Interaktionsmöglichkeiten für Studierende in MassenvorlesungenArmin B. Cremers;Rainer Manthey;Peter Martini;Volker Steinhage (Hrsg). INFORMATIK 2005 - Informatik LIVE!, Band 2: Beiträge der 35. Jahrestagung der Gesellschaft für Informatik e.V. (GI); September 19. - 22., 2005; Bonn. Bonn: Gesellschaft für Informatik 2005 S. 558 - 562
Lechner, Ulrike; Nonnecke, Blair; Schubert, Petra
Minitrack: "Online Communities in the Digital Economy"Ralph H. Sprague (Hrsg). Proceedings of the 38th Annual Hawaii International Conference on System Sciences HICSS 2005: Big Island, Hawaii; 3 - 6 January, 2005. Los Alamitos, CA: IEEE Computer Society 2005 S. 1
Paulus, Dietrich; Droege, Detlev
Mixed-reality as a challenge to image understanding and artificial intelligence: KI 2005, Workshop 7; September 11th, 2005; KoblenzKoblenz: Universität Koblenz-Landau, Institut für Informatik 2005 (Fachberichte Informatik)
Hampe, J. Felix; Lehner, Franz; Pousttchi, Key et al.
Mobile Business - Processes, Platforms, Payment: Proceedings zur 5. Konferenz Mobile Commerce Technologien und Anwendungen MCTA 2005; 31.01.-02.02.2005; Universität AugsburgBonn: Gesellschaft für Informatik 2005
Hampe, Felix; Hampe, J. F.; Lehner, F. et al.
Mobile Business - Processes, Platforms, Payments (Proceedings zur 5. Konferenz Mobile Commerce Technologien und Anwendungen, MCTA 2005, Augsburg)Hampe, J. F.;Lehner F.; Pousttchi K.; Rannenberg K.; Turowski K. (Hrsg). Bonn, Germany: GI Lecture Notes in Informatics (P 59) 2005
Jürjens, Jan; Lehrhuber, Markus; Wimmel, Guido
Model-Based Design and Analysis of Permission-Based SecurityCarlo Ghezzi; Yuxi Fu; Shaoying Liu; Jim Woodcock (Hrsg). Proceeding of the 10th IEEE International Conference on Engineering of Complex Computer Systems ICECCS 2005: 16-20 June 2005; Shanghai, China. Los Alamitos, CA: IEEE Computer Society 2005 S. 224 - 233
Wagner, Stefan; Jürjens, Jan
Model-Based Identification of Fault-Prone ComponentsMario Dal Cin; Mohamed Kaâniche; András Pataricza (Hrsg). Dependable Computing - EDCC 5: 5th European Dependable Computing Conference, Budapest, Hungary, April 20-22, 2005. Proceedings. Berlin: Springer 2005 S. 435 - 452
Jürjens, Jan
Model-based Security Engineering with UMLAlessandro Aldini; Roberto Gorrieri; Fabio Martinelli (Hrsg). Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures. Berlin: Springer 2005 S. 42 - 77
Jürjens, Jan
Model-based Security Engineering with UMLAldini, A.; , ; Martinelli, F. (Hrsg). Foundations of Security Analysis and Desing III: FOSAD 2004/2005 Tutorial Lectures. 2005 S. 42 - 77 (Lecture Notes in Computer Science)
Botaschanjan, Jewgenij; Jürjens, Jan
MoDll: Modeling and Analyzing Time-ConstraintsJerzy Rozenblit; Tim O’Neill; Jianfeng Peng (Hrsg). Proceedings of the 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems ECBS 2005: 4-7 April 2005; Greenbelt, Maryland. Los Alamitos, CA: IEEE Computer Society 2005 S. 299 - 306