paluno – The Ruhr Institute for Software Technology

Ausgewählte Publikationen

  • Apolinarski, W., M. Handte, M. U. Iqbal, P. J. Marrón (2014): Secure interaction with piggybacked key-exchange. Pervasive and Mobile Computing, vol. 10, Part A, 22–33, Selected Papers from the Eleventh Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2013).
  • Beckers, K., I. Côté, L. Goeke, Selim Güler and Maritta Heisel (2014): A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain, in: International Journal of Secure Software Engineering (IJSSE).
  • Beckers, K., D. Hatebur, M. Heisel (2014): Supporting Common Criteria Security Analysis with Problem Frames, in: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 5:1, 37–63.
  • Buchwald, A., N. Urbach, F. Ahlemann (2014): Business Value through Controlled IT: Toward an Integrated Model of IT Governance Success and its Impact. Journal of Information Technology, 29(2), 128–147. doi.org/10.1057/jit.2014.3
  • Daun, M., A. Salmon, T. Weyer, K. Pohl (2015): The impact of students’ skills and experiences on empirical results: a controlled experiment with undergraduate and graduate students. In: Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering (EASE ’15), ACM, New York, NY, USA.
  • Dittes, S., N. Urbach, F. Ahlemann, (2014): IT-Standardization – lip service to sustainable benefit. Business Information Systems & Management, 6(4), 29–39. doi.org/10.1365/s35764-014-0440-6.
  • Figura, R., M. Ceriotti, C.-Y. Shih, M. Mulero-Pázmány, S. Fu, R. Daidone, S. Jungen, J. J. Negro, P. J. Marrón (2014): IRIS: Efficient Visualization, Data Analysis and Experiment Management for Wireless Sensor Networks. EAI Endorsed Transactions on Ubiquitous Environments, vol. 1 no. 3.
  • Fischer, G., T. Herrmann (2015): Meta-design: Transforming and enriching the design and use of socio-technical systems, in: Designing Socially Embedded Technologies in the Real-World, 79–109.
  • Metzger, A., K. Pohl (2014): Software product line engineering and variability management: Achievements and challenges, in: ICSE Future of Software Engineering Track (FOSE 2014), Hyderabad, India, May 31–June 7, 2014, J. D. Herbsleb and M. B. Dwyer, Eds. ACM, 2014, 70–84.
  • Prilla, M. (2015): Supporting collaborative reflection at work: A socio-technical analysis. AIS Transactions on Human-Computer Interaction, 7(1), 1–17.
  • Striewe, M., M. Goedicke (2014): A Review of Static Analysis Approaches for Programming Exercises, in: Proceedings of the International Conference on Computer Assisted Assessment (CAA 2014), Number 439 in CCIS, Zeist, Netherlands, 100–113.
  • Schmieders, E., A. Metzger, K. Pohl (2015): Runtime model-based privacy checks of big data cloud services, in: Int’l Conference on Service Oriented Computing (ICSOC 2015), Ghoa, India, 16-19 November, 2015, A. Barros, D. Grigori, N. C. Narendra, Eds., 2015.
  • Schwinning, N., F. Kurt-Karaoglu, M. Striewe, B. Zurmaar, M. Goedicke (2015): A Framework for Generic Exercises with Mathematical Content, in: Proceedings of the International Conference on Learning and Teaching in Computing and Engineering (LaTiCE 2015), 70–75.