Bernd Bruegge;Asa MacWilliams;Thomas ReicherStudy on Software Architectures for Augmented Reality Systems200481
Ulrich Rueckert;Lothar Richter;Stefan KramerQuantitative Associaton Rules Based on Half-Spaces: An Optimization Approach200417
Stefan WagnerEfficiency Analysis of Defect-Detection Techniques200424
Stefan Wagner;María Victoria Cengarle;Peter GraubmannModelling System Families with Message Sequence Charts: A Case Study200450
Prof. Gudrun Klinker;Ph.D. Martin Wagner (eds.)2nd Joint Advanced Summer School 2004 Course3: Ubiquitous Tracking for Augmented Reality2004108
Robin Sommer;Vern PaxsonExploiting Independent State For Network Intrusion Detection200426
Jan Juerjens;Thomas A. KuhnPractical Security Analysis of C Programs Using Automated Theorem Proving200426
Jan Juerjens;Thomas A. KuhnAutomated Theorem Proving for Cryptographic Protocols with Automatic Attack Generation200421
Sven KosubLocal Density200431
Frank Kammer;Hanjo TäubigGraph Connectivity200447