paluno – The Ruhr Institute for Software Technology

Ausgewählte Publikationen

  • Beckers, K., I. Côté, I. Faßbender, M. Heisel, S. Hofbauer (2013): A Pattern-Based Method for Establishing a ­Cloud-Specific Information Security Management System. Requirements Engineering, Springer, London. 1–53.
  • Beckers, K., T. Frese, D. Hatebur, M. Heisel (2013): A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems. In: Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering. IEEE Computer Society. 238–247.
  • Benner, M., M. Book, T. Brückmann, V. Gruhn, T. Richter, S. Seyhan (2012): Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts. In: Proceedings of the Business Process Management – 10th International Conference (BPM 2012), Lecture Notes in Computer Science (LNCS) 7481. Springer, Heidelberg. 188–193.
  • Beul, M., S. Eicker (2012): Crowdsourcing Supported ­Context Detection for Improving Information Search ­Activities. In: Proceedings of the Seventh International Multi-Conference on Computing in the Global Information Technology, Curran Associates, Inc., Red Hook 2012. 254–259.
  • Book, M., S. Grapenthin, V. Gruhn (2012): Seeing the ­Forest and the Trees: Focusing Team Interaction on Value and Effort Drivers. In: Proceedings of the 20th International Symposium on the Foundations of Software Engineering (ACM SIGSOFT 2012 FSE-20) New Ideas Track. ACM, New York.
  • Cheng, B., K. Pohl (2013): Proceedings of the 35th ACM/IEEE International Conference on Software Engineering, ACM/IEEE.
  • Durdik, Z., M. Konersmann, R. Reussner, M. Goedicke (2013): Towards Architecture – Centric Evolution of Long-Living Systems (The ADVERT Approach). In: Proceedings of the QoSA’13, Vancouver, Canada.
  • Fet, N., M. Handte, P. J. Marrón (2013): A Model for WLAN Signal Attenuation of the Human Body. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
  • Pohl, R., V. Stricker, K. Pohl (2013): Measuring the Structural Complexity of Feature Models. In: Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, IEEE.
  • Pohl, K., H. Hönninger, R. Achatz, M. Broy (2012): Model-Based Engineering of Embedded Systems – The SPES 2020 Methodology, Springer, Heidelberg.
  • Schwittek, W., A. Diermann, S. Eicker (2012): A Guidance Model for Architecting Secure Mobile Applications. In: A. U. Schmidt, G. Russello, I. Krontiris, S. Lian (eds.): Security and Privacy in Mobile Information and Communication Systems. Springer, Berlin, Heidelberg. 12–23.
  • Striewe, M., M. Goedicke (2013): Trace Alignment forAutomated Tutoring. In: Proceedings of the International Computer Assisted Assessment (CAA) Conference, ­Southampton.
  • Wagner, S., M. Handte, M. Zuniga, P.J. Marrón (2013): Enhancing the Performance of Indoor Localization Using Multiple Steady Tags. Pervasive and Mobile Computing 9 (3), 392–405.