Sciweavers

95
Voted
GI
2007
Springer
15 years 8 months ago
Transformation und Vergleich von endlichen Automaten zur Analyse von Software-Protokollen
: Der Artikel beschreibt, wie endliche Automaten f
Gunther Vogel
224
Voted
GI
2007
Springer
15 years 8 months ago
The Use of Complex Stateflow-Charts with KIEL - An Automotive Case Study
Abstract: Modeling systems with Statecharts has become standard practice in the design of reactive embedded devices. However, the modeling of realistic applications with the paradi...
Steffen Prochnow, Reinhard von Hanxleden
GI
2007
Springer
15 years 8 months ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch
118
Voted
GI
2007
Springer
15 years 8 months ago
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme
: A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for a benefit (some good or service). Recently, Chen et al. [CEL+ 07] prop...
Alberto N. Escalante, Hans Löhr, Ahmad-Reza S...
167
Voted
ECTEL
2009
Springer
15 years 8 months ago
Context-Aware Combination of Adapted User Profiles for Interchange of Knowledge between Peers
Abstract. This paper presents a system that connects students with complementary profiles, so they can interchange knowledge and help each other. The profile of the students is bui...
Sergio Gutiérrez Santos, Mario Muñoz...