Publikationen 2010

Name der Professorin/des Professors Titel der Publikation, des Vortrages, der Präsentation oder des Wettbewerbs Name der Fachzeitschrift, der Fachtagung oder der Fachmesse, Ausstellung bzw. des Wettbewerbs
Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou Biometrische Template-Protection-Verfahren und Interoperabilitaetsstrategien GI Sicherheit 2010
Mark M. Seeger, Stephen D. Wolthusen Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency 5th International Conference on Systems (ICONS 2010) 
Reinhard RiedmĂĽller, Mark M. Seeger, Stephen D. Wolthusen, Harald Baier, Christoph Busch Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection 2nd International Workshop on Security and Communication Networks (IWSCN 2010)
Christoph KemetmĂĽller, Mark M. Seeger, Harald Baier, Christoph Busch Manipulating Mobile Devices with a private GSM Base Station - a Case Study 8th International Network Conference (INC 2010) 
Mark M. Seeger Three Years Hacker Paragraph - A Review Datenschutz und Datensicherheit (DuD), Ausgabe 7/2010 
Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch, Harald Baier The Cost of Observation for Intrusion Detection - Performance Impact of Concurrent Host  Observation 9th Information Security South Afrika (ISSA 2010) 
Sebastian Abt, Christoph Busch, Claudia Nickel Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien Biometrie und elektronische Signaturen (BIOSIG 2010)
Claudia Nickel, Xuebing Zhou, Christoph Busch Template Protection for Biometric Gait Data Biometrie und elektronische Signaturen (BIOSIG 2010)
Jan Hirzel, Daniel Hartung, Christoph Busch Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets Biometrie und elektronische Signaturen (BIOSIG 2010)
Tom Kevenaar, Ulrike Korte, Johannes Merkle, Matthias Niesing, Heinrich Ihmor, Christoph Busch, Xuebing Zhou A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems Biometrie und elektronische Signaturen (BIOSIG 2010)
Heiko Witte, Claudia Nickel Modular Biometric Authentication Service System (MBASSy) Biometrie und elektronische Signaturen (BIOSIG 2010)
Frank Breitinger, Claudia Nickel User Survey on Phone Security and Usage Biometrie und Elektronische Signaturen (BIOSIG 2010)
Christoph Busch, Daniel Hartung Biometrische Nachrichten-Authentisierung  Sicherheit 2010
Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien GI Sicherheit 2010
Mohammad Derawi, Claudia Nickel, Patrick Bours, Christoph Busch Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingMark M.
H. Baier, Chr. Busch CASED - Ein Darmstäder Forschungszentrum entwickelt IT-Sicherheitsbausteine von morgen Querschnitt, Hochschule Darmstadt, S. 111-115, 2010
Friedrich, Ralf, Udo Bleimann, Thomas Martens, Ingo Stengel, Paul Walsh Vorhersage der Teamleistung von virtuellen Software-Entwicklungs-Teams in Bezug auf die zu erwartende Projektkomplexität in: Querschnitt (Beiträge aus Forschung und Entwicklung der Hochschule Darmstadt), Nr. 24, Februar 2010, 98-101
Axt, Thomas, Udo Bleimann, Geraldine Eichler Introduction to Atlantis University in: Conference Proceedings of the 5th Plymouth e-Learning Conference “Learning without Limits – Facing the Challenges”, Hrsg. Steve Wheeler, Plymouth 2010, 14
Bleimann, Udo International Project-Based Learning – Bologna 2.0 in: Conference Proceedings of the 5th Plymouth e-Learning Conference “Learning without Limits – Facing the Challenges”, Hrsg. Steve Wheeler, Plymouth 2010
Böving, Roland, Udo Bleimann Semantic Search Scenarios to Enhance University Needs – based on a Multilingual Next Generation Topic Map (NGTM) in: Conference Proceedings of the 5th Plymouth e-Learning Conference “Learning without Limits – Facing the Challenges”, Hrsg. Steve Wheeler, Plymouth 2010, 47
Thaul, Witold, Udo Bleimann, Christoph Wentzel, Nathan Clarke E-Book Readers in Academic Personal Knowledge Management in: Conference Proceedings of the 5th Plymouth e-Learning Conference “Learning without Limits – Facing the Challenges”, Hrsg. Steve Wheeler, Plymouth 2010, 55
M. Minich, B. Harriehausen-MĂĽhlbauer, C. Wentzel An Organizational Approach for Industrialized Systems Integration in: Proceedings of the 8. International Network Conference (INC 2010), hrsg. von Udo Bleimann et. al., Heidelberg 2010
M. Minich, B. Harriehausen-MĂĽhlbauer, C. Wentzel Implementing Software Product Lines in Systems Integration in: Proceedings of the Annual International Conference on Software Engineering 2010 (SE2010), Phuket, Thailand, 2010
Karin Kronawitter, Christoph Wentzel, Maria Papadaki ITO success factor model – first steps towards a guide for IT outsourcing (ITO) success in: Proceedings of the 8. International Network Conference (INC 2010), hrsg. von Udo Bleimann et. al., Heidelberg 2010
Stengel, Ingo, Udo Bleimann Producing e-Learning Content in the Context of learner Preferences in the Media Department in: Conference Proceedings of the 5th Plymouth e-Learning Conference “Learning without Limits – Facing the Challenges”, Hrsg. Steve Wheeler, Plymouth 2010, 57
Schneider, Oliver, Udo Bleimann, Bettina Harriehausen-Mühlbauer Cooperative Creation of Non-linear e-Learning Content in: Conference Proceedings of the 5th Plymouth e-Learning Conference “Learning without Limits – Facing the Challenges”, Hrsg. Steve Wheeler, Plymouth 2010, 58
Rimbach, Felix, Udo Bleimann, Steven Furnell Psycho-Analytical Considerations in Internet Marketing – Focusing on Human Needs and Personal Trust in: Proceedings of the Eighth International Network Conference (INC 2010), Hrsg. Udo Bleimann et. al., Heidelberg 2010, 345-354
Roland Böving, Udo Bleimann, Christoph Wentzel, Paul Walsh High Level Semantic Networking – Using K-infinity to Build a Multi-Ontological Learning Environment in: Proceedings of the Eighth International Network Conference (INC 2010), Hrsg. Udo Bleimann et. al., Heidelberg 2010, 361-370
Friedrich, Ralf, Udo Bleimann, Ingo Stengel, Paul Walsh Towards a new Role Model in Virtual Teams – the Effects of “Elective Leadership” in: Proceedings of the Eighth International Network Conference (INC 2010), Hrsg. Udo Bleimann et. al., Heidelberg 2010, 371-374
Bleimann, Udo, Paul Dowland, Steven Furnell, Oliver Schneider (Hrsg.) Proceedings of the Eighth International Network Conference INC 2010, Heidelberg 2010, ISBN 978-1-84102-259-8
Weber, Frank und Woldemar Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan Ghita A Bootstrap Mechanism for NGN QoS Profiling in: Proceedings of the Eighth International Network Conference (INC 2010), Hrsg. Udo Bleimann et. al., Heidelberg 2010, 61-70
Shauchenka, Hanna und Udo Bleimann, Matthias Knoll, Nathan Clarke Service Quality Assessment in Distance Learning in: Proceedings of the Eighth International Network Conference (INC 2010), Hrsg. Udo Bleimann et. al., Heidelberg 2010, 269-277
Stengel, Ingo und Oliver Schneider, Udo Bleimann Exploration of Learner Preferences and their Impact within a Media Module in: Proceedings of the Eighth International Network Conference (INC 2010), Hrsg. Udo Bleimann et. al., Heidelberg 2010, 279-288
Michael Braun On lattices, binary codes, and network codes to appear in Advances in Mathematics of Communications.
Michael Braun A note on balanced incomplete block designs International Electronic Journal of Geometry, 3(2) 49-52, October 2010.
Michael Braun, Ulrike Meyer, Susanne Wetzel Efficient mutual authentication for multi-domain RFID systems using distributed signatures in: WISTP'10 - Workshop for Information Security Theory and Practices, April 12-14, 2010, Passau, Germany, 2010 (Most Innovative Technology Award)
Gianmarco Baldini, Michael Braun, Erwin Hess, Franco Oliveri, and Hermann Seuschek Securing disaster supply chains with cryptography enhanced RFID to appear in Disaster Prevention and Management
Sanjay Jain, Steffen Lange, Samuel E. Moelius, Sandra Zilles Incremental learning with temporary memory Theoretical Computer Science 411(29-30): 2757-2772 (2010)
H.E. Erbs, F. Mies Mobile Umfragen mit Handy - Von den ersten Prototypen über die Serienfertigung bis zu Einsatzerfahrungen in: "Querschnitt" Beiträge aus Forschung und Entwicklung, 24. Ausgabe Februar 2010
S. Frei, W. Fuhrmann, A. Rinkel, B. Ghita QoS enforcement within the EPS considering the macro mobility protocols 2nd ngnlab.eu International Workshop, Leipzig, 2010
F. Weber, W. Fuhrmann, U. Trick, U. Bleimann, B. Ghita A Bootstrap Mechanism for NGN QoS Profiling INC 2010, Heidelberg 2010
T. Eichelmann, W. Fuhrmann, U. Trick, B. Ghita Enhanced Concept of the TeamCom SCE for Automatically Generated Services Based on JSLEE INC 2010, Heidelberg 2010-11-15
S. Frei, W. Fuhrmann, A. Rinkel, B. Ghita Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core Network INC 2010, Heidelberg, 2010
M. Glaab, W. Fuhrmann, J. Wietzke, B. Ghita A New Architectural Approach for Next Generation Automotive Applications SEIN 2010, Plymouth, 2010
W. D. Groch, B. P. Selby, G. Sakas, S. Walter, U. Stilla The Effects of Radiometry on the Accuracy of Intensity Based Registration Proceedings of ICPR 2010 International Conference on Pattern Recognition, 23.-26. August 2010; Istanbul, TĂĽrkei
Schneider, O., Bleimann, U., Phippen, A.D., and Harriehausen-Mühlbauer, B. Cooperative Creation of Non-Linear eLearning, Content in: S. Wheeler (Ed.) “Learning without Limits Facing the Challenges”, pp. 59, 5th Plymouth e-Learning Conference 2010, Plymouth, UK (2010)
George, Mathew und Klaus-Peter Fischer-Hellmann, Martin Knahl, Udo Bleimann, Shirley Atkinson Introducing a Framework and Methodological Guidance for Model Based Testing in: Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), hrsg. von Paul Dowland et. al., Plymouth 2010, 1-10
Bernhard Humm Leserbrief zu Niklas Schlimm "Serviceorientierte Architektur - eine Standortanalyse" (letter to the editor re: "Service-Oriented Architecture - An Analysis", in German). Informatik Spektrum 33/5, October 2010, pp. 533-534. Springer Verlag, 2010.
Bernhard G. Humm, Ralf S. Engelschall Language-Oriented Programming via DSL Stacking In JosĂ© Cordeiro, Maria Virvou, Boris Shishkov (Eds.):  Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT 2010), Vol. 2, pp. 279 - 287. Athens, Greece, July 2010.
Bernhard G. Humm, Ralf S. Engelschall A Plea for Pluggable Programming Language Features In Pericles Loucopoulos, Leszek Maciaszek (Eds.):  Proceedings of the 5th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2010), pp. 5-11. Athens, Greece, July 2010 (Best paper award).
Normen Haas, Bernhard Humm, Ingo Stengel, Paul Walsh Commoditisation as a Criterion for Semantic Service Provisioning In Udo G. Bleimann, Paul S. Dowland, Steven M. Furnell, Oliver Schneider (Eds): Proceedings of the 8th International Network Conference (INC 2010), pp 335-344. Heidelberg, Germany, July, 2010.
Sascha Roth, Bernhard Humm, Michael Rebstock Context- and Domain-Aware Semantic Web Services In: Gesellschaft fĂĽr Informatik (Hrsg.): Informatiktage 2010 - Fachwissenschaftlicher Informatik-Kongress, pp 93 - 96. Lecture Notes in Informatics (LNI) - Seminars. March, 2010.
Paul S. Dowland, Bernhard Humm, Martin H. Knahl (Herausgeber) Proceedings of the 6th Collaborative Research Symposium on Security, E-Learning, Internet and Networking SEIN 2010, Plymouth, UK, 2010. ISBN: 978-1-84102-269-7
Andreas Knirsch, Joachim Wietzke, Ronald Moore, Paul S. Dowland. An Approach for Structuring Heterogeneous Automotive Software Systems by use of Multicore Architectures In Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Seite 19-30, ISBN 978-1-84102-269-7, Plymouth, UK, 2010.
Robin Acker, Steffen Brandt, Nicolas Buchmann, Thorsten Fugmann, Michael Massoth Ubiquitous Home Control based on SIP and Presence Service In Proceedings of the 12th International Conference on Information Integration and Web Based Applications & Services (iiWAS2010). November, 2010. Paris, France. p. 757 – 760, ACM Digital Library
Andreas Plies, Michael Massoth, Ronald Marx Approach to Identity Card-based Voice-over-IP Authentication Second International Conferences on Advances in Multimedia (MMEDIA 2010), June 13-19, 2010, Athens/Glyfada, Greece. MMEDIA 2010 Proceedings, IEEE Computer Society, June 2010
JĂĽrgen MĂĽller, Michael Massoth Abwehr von Direct Spam over Internet Telephony durch Anrufer Pre-Validierung In ITG (eds.), Mobilkommunikation - Technologien und Anwendungen, ITG-Fachbericht, OsnabrĂĽck, Mai 2010, S. 107-113
Klaus Schwarzkopf, Michael Massoth Konzeption und Implementierung einer standortbezogenen Gruppen-Voicemailbox auf Basis des Mobicents JSLEE Servers In ITG (eds.), Mobilkommunikation - Technologien und Anwendungen, ITG-Fachbericht, OsnabrĂĽck, Mai 2010, S. 131-136
JĂĽrgen MĂĽller, Michael Massoth Defense Against Direct Spam Over Internet Telephony by Caller Pre-Validation Sixth Advanced International Conference on Telecommunications (AICT 2010), May 9 - 15, 2010 - Barcelona, Spain. AICT 2010 Proceedings, IEEE Computer Society, May 2010, p. 172-177 (Best paper award)
Robin Acker, Michael Massoth Secure Ubiquitous House and Facility Control Solution Fifth International Conference on Internet and Web Applications and Services (ICIW 2010), May 9 - 15, 2010 - Barcelona, Spain. ICIW 2010 Proceedings, IEEE Computer Society, May 2010, p. 262-267
Michael Massoth, Robin Acker, Ronald Moore Häuser fernsteuern und Prozesse optimieren durch mobile Lösungen Querschnitt – Beiträge aus Forschung und Entwicklung, Hochschule Darmstadt, Ausgabe 24, Februar 2010, S. 102-106
Michael Massoth Wie die Informations- und Kommunikationstechnologie (IKT) unsere Welt verändert Vortrag auf dem IT-SLAM anlässlich dem internationalem IKT-Kongress "iTEC10 - Your Technology Hotspot" am 24.11.2010 in Hanau
Jürgen Müller Abwehr von Spam over Internet Telephony (SPIT) Vortrag auf dem IT-SLAM anlässlich dem internationalem IKT-Kongress "iTEC10 - Your Technology Hotspot" am 24.11.2010 in Hanau
JĂĽrgen MĂĽller, Michael Massoth Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony In: International Journal On Advances in Telecommunications, Vol.3, Nr. 3 & 4, Dezember 2010
H. YĂĽksel, J. Reichardt, C. Johnson Towards a complete and minimal basis for the definition of software architecture languages INC 2010, Proceedings 8th International Network Conference, Heidelberg, p. 387-397
Markus Döhring, Alexandru Berlea, Uta Störl Automatically Tagging Online Community Content using Probabilistic Topic Models Informatiktage 2010 - Fachwissenschaftlicher Informatik-Kongress 19. und 20. März 2010, B-IT Bonn-Aachen International Center for Information Technology in Bonn. LNI S-9 GI 2010. Seiten 113-116. ISBN 978-3-88579-443-157. 
Uta Störl Produkt-News Datenbank-Spektrum 10(2). Springer-Verlag 2010. Seiten 116-117. ISSN 1618-2162
H.-P. Wiedling, G. Turetschek 1. MobileOTP - VerknĂĽpfung von Smartphones (Android), Geo-Informationen und Social Communites, 2. Service-orientierte Software-Konstruktion (SSC) als Software-Reuse-Enviromment-Ansatz, 3. Business Management in SOA-Infrastrukturen, 4. Utiltiy Computing (Voraussetzungen und Simulation), 5. Sicherer und konsistenter Datenaustausch im Kontext von Mobile Computing CeBit-Exponate, Hannover 2010
S. Vergata, J. Wietzke, A. SchĂĽtte, P.S. Dowland System Design for Embedded Automotive Systems Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK
A. Knirsch, J. Wietzke, R. Moore, P. S. Dowland An Approach for Structuring Heterogeneous Automotive Software Systems by use of Multicore Architectures In Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, 2010.
Heckmann, B., Phippen, A.D. Quantitative and Qualitative Description of the Consumer to Provider Relation in the Context of Utility Computing Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp335-344, 2010