Skip to main content Skip to main navigation

Publikationen

 

Aufgrund von Wartungsarbeiten ist die Suche von Publikationen nach Autor:innen derzeit nicht möglich.

Zeige Ergebnisse 91 bis 100 von 327
  1. Software Certification Management: How Can Formal Methods Help?

    In: Proceedings of the 2005 Automated Software Engineering Workshop on Software Certificate Management (SoftCeMent05). Automated Software Engineering …

  2. Fernando Godínez; Dieter Hutter; Raul Monroy

    On the Role of Information Compaction to Intrusion Detection

    In: Proceedings of the Fifth IEEE International Symposium and School on Advanced Distributed Systems, ISSADS 2005. IEEE International Symposium and …

  3. Fernando Godínez; Dieter Hutter; Raul Monroy

    Audit file reduction using n-gram models

    In: Proceedings of the Financial Cryptography and Data Security. Financial Cryptography and Data Security, Lecture Notes in Computer Science, …

  4. Dieter Hutter; Werner Stephan

    A Portrait of a Scientist: Logics, AI and Politics

    In: Festschrift in Honor of J.H.~Siekmann. Pages 1-14, Springer-Verlag, LNCS 2605, 2005.

  5. Mind the Gap - Maintaining Formal Developments in MAYA

    In: Festschrift in Honor of J.H.~Siekmann. Springer-Verlag, LNCS 2605, 2005.

  6. Alan Bundy; David Basin; Dieter Hutter; Andrew Ireland

    Rippling: Meta-level Guidance for Mathematical Reasoning

    Cambridge University Press, 2005.

  7. Dieter Hutter; Markus Ullmann (Eds.)

    Proceedings of the Second International Conference on Security in Pervasive Computing

    Springer-Verlag, LNCS 3450, Boppard, Germany, 2005.

  8. Florian Kupsch; Dirk Werth

    Integrating Business Processes with Peer-to-Peer technology

    In: INTEROP ESA Conference, Geneva. INTEROP ESA Conference, 2005.

  9. Heiko Mantel; Axel Schairer

    Exploiting Generic Aspects of Security Models in Formal Developments

    In: Dieter Hutter; Werner Stephan (Hrsg.). Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday. Springer, 2005.