Heiko Krumm

Affiliations:
  • Technical University of Dortmund, Germany


According to our database1, Heiko Krumm authored at least 70 papers between 1983 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Development of a Computer-Aided Dosage and Telemonitoring System for Patients Under Oral Anticoagulation Therapy.
Proceedings of the Health Informatics Meets eHealth - Biomedical Meets eHealth - From Sensors to Decisions, 2018

2017
Enhancing Long-Term Motivation of Cardiac Patients by Applying Exergaming in Rehabilitation Training.
Proceedings of the pHealth 2017, 2017

Rule-based technical management for the dependable operation of networked building automation systems.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Telemonitoring and Medical Care of Heart Failure Patients Supported by Left Ventricular Assist Devices - The Medolution Project.
Proceedings of the Health Informatics Meets eHealth - Digital Insight - Information-Driven Health & Care, 2017

2016
A small-scale model house evaluation platform for building automation systems.
Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation, 2016

Dependency Management in Component-Based Building Automation Systems.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Technical management system for dependable Building Automation Systems.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015

2014
CordiAAL: Enhanced Motivation for Cardiological Ergometer Training through Virtual Groups in Virtual Worlds.
Proceedings of the HEALTHINF 2014, 2014

2011
Scalable model-based configuration management of security services in complex enterprise networks.
Softw. Pract. Exp., 2011

Tool-Supported Refinement of High-Level Requirements and Constraints Into Low-Level Policies.
Proceedings of the POLICY 2011, 2011

Adaptive and reliable binding in ambient service systems.
Proceedings of the IEEE 16th Conference on Emerging Technologies & Factory Automation, 2011

2010
Formal validation of automated policy refinement in the management of network security systems.
Int. J. Inf. Sec., 2010

Policy-Based Management for Resource-Constrained Devices and Systems.
Proceedings of the POLICY 2010, 2010

Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Policy-gesteuertes Management adaptiver und gütegesicherter Dienstesysteme im Projekt OSAMI.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Integration of a Legacy Automation System into a SOA for Devices.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

Location-Transparent Integration of Distributed OSGi Frameworks and Web Services.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Model-based management of security services in complex network environments.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Policy-Based Framework for Interoperable Digital Content Management.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Model-based Management of Embedded Service Systems - An Applied Approach.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models.
Proceedings of the Model Checking Software, 2005

Formale Modellierung und Analyse protokollbasierter Angriffe in TCP/IP Netzwerken am Beispiel von ARP und RIP.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Policy Modeling and Refinement for Network Security Systems.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Policy Controlled Automated Management of Distributed and Embedded Service Systems.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

On Scalability and Modularisation in the Modelling of Network Security Systems.
Proceedings of the Computer Security, 2005

Improving the Configuration Management of Large Network Security Systems.
Proceedings of the Ambient Networks, 2005

2004
Trust-Based Monitoring of Component-Structured Software.
Prax. Inf.verarb. Kommun., 2004

Analyzing Network Management Effects with SPIN and cTLA.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2002
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs.
Telecommun. Syst., 2002

Model-based configuration of VPNs.
Proceedings of the Management Solutions for the New Communications World, 2002

State-Based Security Policy Enforcement in Component-Based E-Commerce Applications.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

2001
Model-Based Tool-Assistance for Packet-Filter Design.
Proceedings of the Policies for Distributed Systems and Networks, 2001

Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Tool-Assisted Security Assessment of Distributed Applications.
Proceedings of the New Developments in Distributed Applications and Interoperable Systems, 2001

2000
Animation of Protocols and Distributed Algorithms.
Comput. Sci. Educ., 2000

Improving the efficiency of automated protocol implementations using a configurable FDT compiler.
Comput. Commun., 2000

A framework for modeling transfer protocols.
Comput. Networks, 2000

Verification of UML-Based Real-Time System Designs by Means of cTLA.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000

1999
Formal Hazard Analysis of Hybrid Systems in cTLA.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Composing Object-Oriented Specifications and Verifications with cTLA.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

Derivation of Backup Service Management Applications from Service and System Models.
Proceedings of the Active Technologies for Network and Service Management, 1999

A Component framework for the configuration management of networks.
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999

Constraint-oriented formal modelling of OO-systems.
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999

1998
Modular specification and verification of XTP.
Telecommun. Syst., 1998

Protokollspezifikation und -verifikation mit dem Transferprotokoll-Framework.
Prax. Inf.verarb. Kommun., 1998

Compositional Specification and Structured Verification of Hybrid Systems in cTLA.
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998

User-Defined Telecooperation Services.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

1997
Formal Behavioural Patterns for the Tool-assisted Design of Distributed Applications.
Proceedings of the Distributed Applications and Interoperable Systems, Proceedings IFIP TC 6.1 Working Conference DAIS'97, Cottbus, Germany, September 30, 1997

1996
Implementierung von Kommunikationsprotokollen.
Inform. Spektrum, 1996

cTc - A Tool Supporting the Construction of cTLA-Specifications.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1996

Support of cooperating and distributed business processes.
Proceedings of the 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), 1996

1995
Re-usable verification elements for high-speed transfer protocol configurations.
Proceedings of the Protocol Specification, 1995

1994
Compositional specification and verification of high-speed transfer protocols.
Proceedings of the Protocol Specification, 1994

1993
Großrechner-Anschluß an Kommunikationsvorrechner.
Prax. Inf.verarb. Kommun., 1993

Telekommunikation und Datenhaltung.
Hanser, ISBN: 978-3-446-17465-8, 1993

1990
Funktionelle Analyse von Kommunikationsprotokollen
Informatik-Fachberichte 247, Springer, ISBN: 3-540-52854-7, 1990

1989
Projections of the Reachability Graph and Environment Models.
Proceedings of the Automatic Verification Methods for Finite State Systems, 1989

1987
Logische Verifikation nebenläufiger Programme.
Angew. Inform., 1987

Offener Zugang zu abgesetzten Daten im Bürosystem.
Proceedings of the GI, 1987

1986
Problem-Oriented Logical Specifications of Communication Services and Protocols.
Proceedings of the New Communication Services: A Challenge to Computer Technology, 1986

1984
Spezifikation, Implementierung und Verifikation von Kommunikationsdiensten für verteilte DV-Systeme.
PhD thesis, 1984

Interactive verification of communication software on the basis of CIL.
Comput. Commun. Rev., 1984

Transformation of Constructive Specifications of Services and Protocols into the Logical Language of CIL.
Proceedings of the Protocol Specification, 1984

1983
CIL - Eine Sprache zur Implementierung von Kommunikationsdiensten.
Proceedings of the Kommunikation in Verteilten Systemen, 1983

Specification, Implementation, and Verification of Communication Services on the Basis of CIL.
Proceedings of the Protocol Specification, Testing, and Verification, III, Proceedings of the IFIP WG 6.1 Third International Workshop on Protocol Specification, Testing and Verification, organized by IBM Research, Rüschlikon, Switzerland, 31 May, 1983


  Loading...