Skip to main content Skip to main navigation

Publications

Page 3 of 14.

  1. Constructive DL update and reasoning for modeling and executing the orchestration of heterogenous processes

    In: Proceedings of the 26th International Workshop on Description Logics, 2013. International Workshop on Description Logics (DL-13), July 23-26, Ulm, Germany, Pages 501-512, CEUR, Vol. 1014, CEUR Workshop Proceedings, ceur-ws.org/Vol-1014/, 7/2013.

  2. Thomas Bauereiß; Stefan Gohmann; Dieter Hutter; Alexander Kläser

    Selective LDAP Multi-Master Replication

    In: Proceedings Open Identity Summit 2013. Open Identity Summit (OID-2013), September 9-11, Kloster Banz, Germany, Lecture Notes in Informatics (LNI), Springer, 2013.

  3. Serge Autexier; Dominik Dietrich; Dieter Hutter; Christoph Lüth; Christian Maeder

    SmartTies - Management of Safety-Critical Developments

    In: Margaria Tiziana; Bernhard Steffen (Hrsg.). Proc. 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLa'12). International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA-12), October 15-18, Amirandes, Heraclion, Crete, Greece, Pages 238-252, Lecture Notes in Computer Science (LNCS), Vol. 7609, Springer, 10/2012.

  4. Alan Bundy; Dieter Hutter; Cliff B. Jones; J Strother Moore

    AI meets Formal Software Development (Dagstuhl Seminar 12271)

    In: Dagstuhl Reports, Vol. 2, No. 7, Pages 1-29, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 7/2012.

  5. Structure Formation to Modularize Ontologies

    In: Thomas Schneider; Dirk Walther (Hrsg.). Proceedings of the 6th International Workshop on Modular Ontologies. International Workshop on Modular Ontologies (WoMO-2012), 6th, located at 7th International Conference on Formal Ontology in Information Systems, July 24-27, Graz, Austria, CEUR, Vol. 875, ISBN ISSN 1613-0073, CEUR Workshop Proceedings, 2012.

  6. Achim Brucker; Dieter Hutter

    Information Flow in Disaster Management Systems

    In: M. Takizawa; A M. Tjoa (Hrsg.). Proceedings of the 5th International Conference on Availability, Reliability and Security 2010. International Conference on Availability, Reliability and Security (ARES-2010), February 15-18, Krakau, Poland, IEEE Computer Society, 1/2010.

  7. Semantic Management of Heterogeneous Documents

    In: Proceedings of the Mexican International Conference on Artificial Intelligence. Mexican International Conference on Artificial Intelligence (MICAI-2009), November 9 - October 13, Guanajuato, Mexico, Lecture Notes on Artificial Intelligence (LNAI), Vol. 5845, Springer, 2009.

  8. Dieter Hutter; Raul Monroy

    On the Automated Correction of Protocols with Improper Message Encoding

    In: Luca Vigano; Pierpaolo Degano (Hrsg.). Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA), located at Affiliated with ETAPS 2009, March 28-29, York, United Kingdom, Lectures Notes in Computer Science (LNCS), Springer Verlag, 2009.

  9. Dieter Hutter; Heiko Mantel; Ina Schäfer; Axel Schairer

    Security of Multi-Agent Systems: A Case Study on Comparison Shopping

    In: Journal of Applied Logic, Vol. 5, No. 2, Pages 303-332, Elsevier B.V. 6/2007.

  10. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova Science Publishers, Inc. 2007.