Publications

Export 324 results:
2011
Tschernuth, M., Lettner M., & Mayrhofer R. (2011).  Evaluation of Descriptive User Interface Methodologies for Mobile Devices. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 520–527.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components. Proc. {MoMM} 2011: 9th International Conference on Advances in Mobile Computing and Multimedia. 268–272.
Höbarth, S., & Mayrhofer R. (2011).  A framework for on-device privilege escalation exploit execution on Android. Proc. {IWSSI/SPMU 2011}: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with {Pervasive 2011}.
Sonntag, M. (2011).  Group Learning Histories for Wikis. Journal of Systems Integration.
Sonntag, M. (2011).  Impact of Legal Regulation of Technological Developments on Competitiveness. Doucek Petr, Gerhard Chroust Gerhard, Oskrdal Vaclav (Eds.): IDIMT-2011, Interdisciplinarity in Complex Systems, 19th Interdisciplinary Information Management Talks.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Mobile Platform Architecture Review: Android, iPhone, Qt. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 545–552.
Klingelhuber, P., & Mayrhofer R. (2011).  Private Notes: Encrypted XML Notes Synchronization and Sharing with Untrusted Web Services. Proc. {iiWAS2011}: 13th International Conference on Information Integration and Web-based Applications & Services.
Habib, M.A.. (2011).  Secure RBAC with Dynamic, Efficient & Usable DSD.
Nguyen, B. Thanh, & Sprenger C. (2011).  Sound Security Protocol Transformations. POST.  (369.07 KB)
Sonntag, M. (2011).  Technische Schutzmaßnahmen bei Verbindungen von Computerprogrammen mit anderen Werkarten. JusIT3. 85-89.
Baader, F., Nguyen T. Binh, Morawska B., & Borgwardt S. (2011).  Unification in the Description Logic EL without the Top Concept. CADE.  (327.07 KB)
Baader, F., Nguyen T. Binh, Morawska B., & Borgwardt S. (2011).  Unification in the Description Logic EL without the Top Concept. DL.  (327.07 KB)
Sonntag, M. (2011).  Von der Semantik zur Syntax und wieder zurück: Testen Juristischer Modelle. A. Geist, C. R. Brunschwig, F. Lachmayer, G. Schefbeck (Eds.): Strukturierung der Juristischen Semantik - Structuring Legal Semantics; Festschrift für Erich Schweighofer.
Sonntag, M. (2011).  Zur Urheberrechtlichen Zulässigkeit von Screen Scraping. Erich Schweighofer, Franz Kummer (Eds.): Europäische Projektkultur als Beitrag zur Rationalisierung des Rechts.
2010
Mayrhofer, R., Sommer A., & Saral S. (2010).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. Proc. {iiWAS2010}: 12th International Conference on Information Integration and Web-based Applications & Services. 181–189.
König, F., & Paramythis A. (2010).  Closing the Circle: IMS LD Extensions for Advanced Adaptive Collaboration Support. Proceedings of the 2nd Int. Workshop on Adaptive Systems for Collaborative Learning in the context of the Int. Conference on Intelligent Networking and Collaborative Systems (INCoS 2010).
König, F., & Paramythis A. (2010).  Collaboration Contexts, Services, Events and Actions: Four Steps Closer to Adaptive Collaboration Support in IMS LD. Proceedings of the International Conference on Intelligent Networking and Collaborative Systems (INCoS 2010), Thessaloniki, Greece.
Hörmanseder, R. (2010).  Computernetzwerke - Grundlagen.
Sonntag, M. (2010).  Computerprogramme: Investition für geschützte Datenbanken?. in: Erich Schweighofer, Anton Geist, Ines Staufer (Eds.): Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik.
Sonntag, M. (2010).  Der Schutz technischer Sicherheitsmaßnahmen im UrhG.. in: Sonja Gögele, Kaja Unger (Eds.): IT-Sicherheit aus rechtlicher, wirtschaftlicher und technologischer Perspektive.
Sonntag, M. (2010).  Einführung in das Internetrecht. Rechtsgrundlagen für Informatiker.
Sonntag, M. (2010).  Group-Adaptive Personal Learning History. in: Petr Doucek, Gerhard Gerhard Chroust, Vaclav Oskrdal (Eds.): IDIMT-2010. 18th Interdisciplinary Information Management Talks.
Mayrhofer, R., & Ion I. (2010).  OpenUAT: The Open Source Ubiquitous Authentication Toolkit.
Sonntag, M. (2010).  Securing Webpages - An Overview. in: Charles A. Shoniregun, Galyna A. Akmayeva (Eds.): International Conference on Information Society (i-Society 2010).
König, F., & Paramythis A. (2010).  Towards Improved Support for Adaptive Collaboration Scripting in IMS LD. in: M. Wolpers et al. (Eds.): European Conference on Technology Enhanced Learning 2010 (EC-TEL), LNCS 6383.

Pages