Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications in category Conference Papers - back to overwiew...

Conference Papers

M. Kammerstetter, Ch. Platzer, G. Wondracek: Vanity, Cracks and Malware: Insights into the Anti-Copy Protection Ecosystem
19th ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA; in: Proceedings of The 19th ACM Conference on Computer and Communications Security, CCS 2012, 2012; 12 pages
bib details pdf

B. Löwenstein, M. Di Angelo: Lego Mindstorms-Roboter - Coole Klassenkameraden im Programmierunterricht
Edu|days 2012, Krems; in: Zukunft des Lernens, E. Blaschitz, G. Brandhofer, C. Nosko, G. Schwed (ed.); vwh, 2012, ISBN: 978-3-86488-028-5, p. 293 - 313
bib details pdf

M. Jung, J. Weidinger, W. Kastner: A seamless integration of KNX into Constrained RESTful Environments
KNX Scientific Conference 2012, Las Palmas, Spain; in: Proceedings KNX Scientific Conference 2012, 2012; 13 pages
bib details

M. Jung, T. Hofer, G. Kienesberger, F. Judex, W. Kastner: Access control for a Smart Grid SOA
The 8th International Conference for Internet Technology and Secured Transactions, London, UK; in: Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2012, p. 1 - 7
bib details

M. Jung, J. Weidinger, C. Reinisch, W. Kastner, C. Crettaz, A. Olivieri, Y. Bocchi: A transparent IPv6 multi-protocol gateway to integrate Building Automation Systems in the Internet of Things
The IEEE International Conference on Internet of Things, Besançon, France; in: Proceedings of the 2012 IEEE International Conference on Gree Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, 2012, ISBN: 978-0-7695-4865-4, p. 225 - 233
bib details doi

M. Jung, J. Weidinger, D. Bunyai, C. Reinisch, W. Kastner, A. Olivieri: Demonstration of an IPv6 multi-protocol gateway for seamless integration of Building Automation Systems into Constrained RESTful Environments
2012 International Conference on the Internet of Things, Wuxi, China; in: Proceedings of 2012 International Conference on the Internet of Things, IEEE Press, 2012, ISBN: 978-1-4673-1346-9, p. 211 - 212
bib details

M. Jung, W. Kastner, G. Kienesberger, M. Leithner: A comparison of Web service technologies for smart meter data exchange
2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Berlin, Berlin, Deutschland; in: Proceedings of 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Berlin, IEEE, 2012, ISBN: 978-1-4673-2597-4, p. 1 - 8
bib details

M. Jung, C. Reinisch, W. Kastner: Integrating Building Automation Systems and IPv6 in the Internet of Things
Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Palermo, Italien; in: Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE Computer Society, 2012, ISBN: 978-0-7695-4684-1, p. 683 - 688
bib details doi

S. Bogomolov, G. Frehse, R. Grosu, H. Ladan, A. Podelski: A Box-Based Distance between Regions for Guiding the Reachability Analysis of SpaceEx
CAV'12, the 24th International Conference on Computer Aided Verification, Berkeley, California, USA; in: Proceedings of CAV'12, the 24th International Conference on Computer Aided Verification, LNCS / Springer, 7358 (2012), ISBN: 978-3-642-31423-0, p. 479 - 494
bib details doi pdf

D. Donze, O. Maler, E. Bartocci, D. Nickovic, R. Grosu, S. Smolka: On Temporal Logic and Signal Processing
Automated Technology for Verification and Analysis (ATVA), Thiruvananthapuram, India; in: Proceedings of ATVA 2012, the 10th International Symposium on Automated Technology for Verification and Analysis, LNCS/Springer, vol. 7561 (2012), ISBN: 978-3-642-33385-9, p. 92 - 106
bib details doi

A. Murthy, I. Ariful, E. Bartocci, E. Cherry, F. Fenton, J. Glimm, S. Smolka, R. Grosu: Approximate Bisimulations for Sodium Channel Dynamics
The 10th ACM International Conference on Computational Methods in Systems Biology (CMSB 2012), London, UK; in: Proc. of CMSB 2012: the 10th ACM International Conference on Computational Methods in Systems Biology, LNCS / Springer, vol. 7605 (2012), ISBN: 978-3-642-33635-5, p. 267 - 287
bib details doi

E. Bartocci, R. Grosu, A. Karmarkar, S. Smolka, S. Stoller, J. Seyster: Adaptive Runtime Verification
RV 2012: the 3rd International Conference on Runtime Verification, Istanbul; in: Proc. of RV 2012: the 3rd International Conference on Runtime Verification, LNCS / Springer, vol. 7687 (2012), ISSN: 0302-9743, p. 168 - 182
bib details doi

R. Kammerer, R. Obermaisser, B. Frömel: Dynamic Configuration of a Time-Triggered Router for Controller Area Network
17th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Krakow, Poland; in: 17th IEEE International Conference on Emerging Technologies and Factory Automation, 2012
bib details pdf

P. Puschner, R. Kirner, D. Prokesch, B. Huber: Compiling for Time Predictability
ERCIM/EWICS/Cyberphysical Systems Workshop, Magdeburg, Germany; in: Computer Safety, Reliability, and Security - SAFECOMP 2012 Workshops, Lecture Notes in Computer Science / Springer, 7613 (2012), ISBN: 978-3-642-33674-4, p. 382 - 391
bib details doi

B. Huber, D. Prokesch, P. Puschner: A Formal Framework for Precise Parametric WCET Formulas
12th International Workshop on Worst-Case Execution Time Analysis (WCET 2012), Pisa; in: 12th International Workshop on Worst-Case Execution Time Analysis, WCET 2012, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Oasics / 23 (2012), ISBN: 978-3-939897-41-5, p. 91 - 102
bib details doi pdf

G. Jacob, P. Milani Comparetti, M. Neugschwandtner, C. Krügel, G. Vigna: A Static, Packer-Agnostic Filter to Detect Similar Malware Sample
Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Heraklion, Kreta; in: Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Springer, 2012
bib details pdf

L. Invernizzi, S. Benvenuti, M. Cova, P. Milani Comparetti, C. Krügel, G. Vigna: EVILSEED: A Guided Approach to Finding Malicious Web Pages
IEEE Symposium on Security and Privacy, San Francisco; in: Proceedings of the 2011 IEEE Symposium on Security and Privacy, 2012, ISBN: 978-0-7695-4681-0, p. 428 - 442
bib details pdf

M. Lindorfer, A. Di Federico, F. Maggi, P. Milani Comparetti, S. Zanero: Lines of Malicious Code: Insights Into the Malicious Software Industry
Proceedings of the 28th Annual Computer Security Applications Conference, ACM, New York, 2012, ISBN: 978-1-4503-1312-4, p. 349 - 358
bib details pdf

M. Kofler, C. Reinisch, W. Kastner: An Ontological Weather Representation for Improving Energy-Efficiency in Interconnected Smart Home Systems
IASTED International Conference on Artificial Intelligence and Soft Computing (ASC), Napoli, Italy; in: Applied Simulation and Modelling /777: Artificial Intelligence and Soft Computing, ACTA Press, Napoli, Italy (2012), ISBN: 978-0-88986-935-6, p. 256 - 263
bib details doi

M Függer, J. Widder: Efficient Checking of Link-Reversal-Based Concurrent Systems
International Conference on Concurrency Theory (CONCUR), Newcaslte upon Tyne, UK; in: CONCUR 2012 - Concurrency Theory, Lecture Notes in Computer Science. Springer Verlag., 7454 (2012), ISBN: 978-3-642-32939-5, p. 486 - 499
bib details doi

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 >   >>