Skip to main content Skip to main navigation

Publikationen

 

Aufgrund von Wartungsarbeiten ist die Suche von Publikationen nach Autor:innen derzeit nicht möglich.

Zeige Ergebnisse 61 bis 70 von 370
  1. Dieter Hutter; Heiko Mantel; Ina Schäfer; Axel Schairer

    Security of Multi-Agent Systems: A Case Study on Comparison Shopping

    In: Journal of Applied Logic, Vol. 5, No. 2, Pages 303-332, Elsevier B.V. 6/2007.

  2. Workflow-Kontext zur Realisierung prozessorientierter Assistenz in Organisational Memories

    PhD-Thesis, TU Kaiserslautern, dissertation.de - Verlag im Internet GmbH, 2007.

  3. Semantic Annotation of Paper-Based Information

    In: Koichi Kise; David S. Doermann (Hrsg.). Proceedings of Second International Workshop on Camera-Based Document Analysis and Recognition …

  4. Framework and Meta Model for Specifying Business Components

    In: Business Process Management Journal (BPMJ), Vol. 13, No. 5, Pages 628-643, 2007.

  5. Jan Alexandersson; Tillmann Becker

    Efficient Computation of Overlay for Multiple Inheritance Hierachies in Discourse Modeling

    In: Harry Bunt; Reinhard Muskens. Computing Meaning. Pages 423-455, Studies in Linguistics and Philosophy, Vol. 3, Kluwer, Dordrecht, 2007.

  6. Christoph Stahl; Dominikus Heckmann; Tim Schwartz; Oliver Fickert

    Here and Now: A User-Adaptive and Location-Aware Task Planner

    In: International Workshop on Ubiquitous and Decentralized User Modeling (UbiDeUM\2007). International Conference on User Modeling (UM), 11th, June …

  7. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  8. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at …

  9. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …