Publications

Shows all publications by members of the Institute of Computer Engineering.

Currently viewing all publications in category Presentations - back to overwiew...

Presentations

M. Biely, M. Hutle: Consensus When All Processes May Be Byzantine for Some Time
11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), Lyon; in: Stabilization, Safety, and Security of Distributed Systems, Lecture Notes in Conputer Science / Springer Verlag, 5873 (2009), ISBN: 978-3-642-05117-3, p. 120 - 132
bib details doi

M. Zolda, S. Bünte, R. Kirner: Towards Adaptable Control Flow Segmentation for measurement-Based Execution Time Analysis
International Conference on Real-Time and Network Systems (RTNS), Paris, France; in: 17th International Conference on Real-Time and Network Systems, Proceedings, 2009; 10 pages
bib details

R. Kirner: Towards Automatic Verification of Structural Code-Coverage Preservation
Timing Analysis and Symbolic Computation, TASCo 2009, Wien; in: Timing Analysis and Symbolic Computation, TASCo 2009, 2009; 1 pages
bib details

R. Kirner, W. Zimmermann, D. Richter: On Undecidability Results of Real Programming Languages
15. Kolloquium Programmiersprachen und Grundlagen der Programmierung (KPS 2009), Maria Taferl; in: 15. Kolloquium Programmiersprachen und Grundlagen der Programmierung (KPS 2009), J. Knoop, A. Prantl (ed.); Schriftenreihe des Instituts für Computersprachen, TU Wien, Bericht 2009-X-1 (2009), p. 141 - 154
bib details

R. Kirner, W. Haas: Automatic Calculation of Coverage Profiles for Coverage-based Testing
15. Kolloquium Programmiersprachen und Grundlagen der Programmierung (KPS 2009), Maria Taferl; in: 15. Kolloquium Programmiersprachen und Grundlagen der Programmierung (KPS 2009), J. Knoop, A. Prantl (ed.); Schriftenreihe des Instituts für Computersprachen, TU Wien, Bericht 2009-X-1 (2009), p. 126 - 140
bib details

B. Huber, R. Obermaisser: A Comparison of NoTA and GENESYS
Embedded Computer Systems: Architectures, Modeling, and Simulation, 9th InternationalWorkshop, SAMOS 2009, Proceedings, Samos, Greece; in: Embedded Computer Systems: Architectures, Modeling, and Simulation, 9th InternationalWorkshop, SAMOS 2009, Proceedings, LNCS / Springer, 5657 (2009), ISBN: 3-642-03137-4, p. 181 - 192
bib details doi

C. Stögerer, W. Kastner: System Management Standards for Traffic Management Systems
14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain; in: Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
bib details

W. Kastner, T. Novak: Functional Safety in Building Automation
14th IEEE International Conference on Emerging Technologies and Factory Automation, Mallorca, Spain; in: Proceedings 14th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
bib details

F. Praus, W. Granzer, W. Kastner: Enhanced Control Application Development in Building Automation
7th IEEE International Conference on Industrial Informatics, Cardiff, UK; in: 7th IEEE International Conference on Industrial Informatics (INDIN '09), Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN '09), 2009, p. 390 - 395
bib details

W. Granzer, D. Lechner, F. Praus, W. Kastner: Securing IP Backbones in Building Automation Networks
7th IEEE International Conference on Industrial Informatics, Cardiff, UK; in: Proceedings 7th IEEE International Concerence on Industrial Informatics, Proceedings 7th IEEE International Conference on Industrial Informatics (INDIN '09),, 2009, p. 410 - 415
bib details

B. Stone-Gross, A. Moser, C. Krügel, E. Kirda, K. Almaroth: FIRE: FInding Rogue nEtworks
Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA; in: 25th Annual Computer Security Applications Conference (ACSAC), 2009
bib details pdf

P. Wurzinger, L. Bilge, E. Kirda, C. Krügel, T. Holz, J. Göbel: Automatically Generating Models for Botnet Detection
European Symposium on Research in Computer Security (ESORICS), Saint Malo, Brittany, France; in: 14th European Symposium on Research in Computer Security (ESORICS 2009), 2009
bib details pdf

G. Neugschwandtner, W. Kastner: Congestion control in building automation networks: Considerations for KNX
35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009), Porto, Portugal; in: Proceedings of the 35th Annual Conference of the IEEE Industrial Electronics Society (IECON 2009), 2009; 6 pages
bib details

G. Fuchs: Implications of VLSI Fault Models and Distributed Systems Failure Models --- A Hardware Designer's View
Dagstuhl Seminar 08371 : Fault-Tolerant Distributed Algorithms on VLSI Chips, Dagstuhl, Germany; in: Fault-Tolerant Distributed Algorithms on VLSI Chips, Leibniz Zentrum Informatik, 8371 (2009), ISSN: 1862-4405, p. ?
bib details

P. Milani Comparetti, C. Kolbitsch, E. Kirda, C. Krügel, Z. Xiaoyong, W. Xiaofeng: Effective and Efficient Malware Detection at the End Host
Usenix Security Symposium, Montreal, Canada; in: usenix 2009, 2009
bib details pdf

W. Puffitsch: Data Caching, Garbage Collection, and the Java Memory Model
Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems (JTRES09), Madrid, Spain; in: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, ACM Digital Library, 2009, ISBN: 978-1-60558-732-5, p. 130 - 139
bib details

S. Edwards, S. Kim, E. Lee, I. Liu, H. Patel, M. Schoeberl: A Disruptive Computer Design Idea: Architectures with Repeatable Timing
2009 IEEE International Conference on Computer Design, Resort at Squaw Creek, Lake Tahoe, California; in: 2009 IEEE International Conference on Computer Design, IEEE, CFP09ICD (2009), ISBN: 978-1-4244-5028-2, p. 54 - 59
bib details

P. Wurzinger, M. Egele, E. Kirda, C. Krügel: Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks
Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Milan, Italy; in: Sixth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2009
bib details pdf

M. Egele, E. Kirda, Ch. Krügel: Mitigating Drive-by Download Attacks: Challenges and Open Problems
Open Research Problems in Network Security Workshop, Zurich; in: Open Research Problems in Network Security Workshop, 2009
bib details pdf

J. Whitham, N. Audsley, M. Schoeberl: Using Hardware Methods to Improve Time-predictable Performance in Real-time Java Systems
Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems (JTRES09), Madrid, Spain; in: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, ACM Digital Library, 2009, ISBN: 978-1-60558-732-5, p. 130 - 139
bib details doi

<<   < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 >   >>