feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (8)
  • EUV Frankfurt  (2)
  • Kammergericht  (1)
  • SB Zossen
  • HPol Brandenburg
  • Akad. der Künste
  • Huth, Michael  (10)
Type of Medium
Language
Region
Library
Subjects(RVK)
Access
  • 1
    UID:
    b3kat_BV043210777
    Format: 1 Online Ressource (XXV, 385 S. 144 Abb., 7 Abb. in Farbe)
    Edition: 1. Aufl. 2016
    ISBN: 9783658058968
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-3-658-05895-1
    Language: German
    Subjects: Economics
    RVK:
    Keywords: Logistik ; Risikomanagement ; Risikoanalyse ; Aufsatzsammlung
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Romeike, Frank 1968-
    Author information: Huth, Michael 1968-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV012620869
    Format: XVII, 387 S. , graph. Darst.
    Edition: 1. publ.
    ISBN: 0521652006 , 0521656028
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    RVK:
    Keywords: Mathematische Logik ; Informatik ; Prädikatenlogik ; Modallogik ; Programmierung
    Author information: Ryan, Mark 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV042719731
    Format: 311 S. , graph. Darst., Kt.
    Edition: 1. Aufl.
    ISBN: 3527530223 , 9783527530229
    Series Statement: Wiley-Schnellkurs
    Additional Edition: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-3-527-69975-9
    Additional Edition: Erscheint auch als Online-Ausgabe, MOBI ISBN 978-3-527-69976-6
    Language: German
    Subjects: Economics
    RVK:
    RVK:
    Keywords: Logistik ; Einführung
    Author information: Huth, Michael 1968-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV041406406
    Format: 1 Online-Ressource (XIII, 278 S.)
    ISBN: 3642389074 , 9783642389085
    Series Statement: Lecture notes in computer science 7904
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-642-38907-8
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Trusted Computing ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV041605826
    Format: 1 Online-Ressource (XXX, 321S. 71 Abb)
    Edition: Gabler Edition Wissenschaft
    ISBN: 9783322817440 , 9783824480937
    Series Statement: Logistik und Verkehr
    Note: Wie Unfälle immer wieder beweisen, sind Gefahrguttransporte mit einem erheblichen Schadenpotenzial verbunden. Dennoch werden viele Entscheidungen im Rahmen der Gefahrgutbeförderung ohne ausreichende risikopolitische Fundierung getroffen. Auf einem geografischen Informationssystem (GIS) basierende EDV-Programme leisten bei verkehrspolitischen Aufgabenstellungen und bei der Planung von Gefahrgut-Logistikketten wertvolle Hilfe. Michael Huth konzipiert ein GIS-basiertes EDV-Programm zur Unterstützung des Gefahrgut-Risikomanagements. Er analysiert, welche Faktoren das Risiko der Gefahrgutbeförderung beeinflussen, und entwickelt auf dieser Basis Anforderungen an Aufbau und Funktionalität eines Entscheidungsunterstützungssystems. Anhand zweier praxisnaher Beispiele aus der Verkehrspolitik und der Logistikplanung werden die Einsatzmöglichkeiten aufgezeigt , 1 Einleitung -- 1.1 Risikomanagement im Rahmen der Gefahrgutbeförderung -- 1.2 Zielsetzung -- 1.3 Gang der Untersuchung -- 2 Logistische Systeme für die Beförderung von Gefahrgütern -- 2.1 Übersicht -- 2.2 Charakterisierung von logistischen Systemen der Gefahrgutbeförderung -- 2.3 Gefahrgutlogistische Beförderungsnetzwerke -- 2.4 Aufgabenstellungen für das Risikomanagement der Gefahrgutbeförderung -- 2.5 Forschungsergebnis: Entwicklung und Implementierung eines Prototyps -- 3 Der Risikobegriff im Zusammenhang mit der Gefahrgutbeförderung -- 3.1 Übersicht -- 3.2 Schaden -- 3.3 Eintrittswahrscheinlichkeit -- 3.4 Risiko -- 3.5 Risikomaße -- 4 Risikoanalysen für die Gefahrgutbeförderung -- 4.1 Übersicht -- 4.2 Risikomanagement für die Gefahrgutbeförderung -- 4.3 Grundlagen von Risikoanalysen -- 4.4 Ablauf von Risikoanalysen für die Gefahrgutbeförderung -- 5 Geografisches Entscheidungsunterstützungssystem für das Risikomanagement der Gefahrgutbeförderung -- 5.1 Übersicht -- 5.2 Grundlagen von Entscheidungsunterstützungssystemen -- 5.3 Grundlagen von Geografischen Informationssystemen -- 5.4 Konzeption eines SDSS für das Gefahrgut-Risikomanagement -- 6 Lösungsansätze für ausgewählte Aufgabenstellungen des Risikomanagements der Gefahrgutbeförderung -- 6.1 Übersicht -- 6.2 Regionale Risikoanalyse -- 6.3 Routenplanung für Gefahrguttransporte -- 7 Zusammenfassung
    Language: German
    Keywords: Gefahrgut ; Güterverkehrsbetrieb ; Risikomanagement ; Geoinformationssystem ; Entscheidungsunterstützungssystem ; Hochschulschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Cambridge [u.a.] : Cambridge University Press
    UID:
    gbv_582947537
    Format: XIV, 427 S. , graph. Darst. , 25 cm
    Edition: 2. ed., 4. print.
    ISBN: 9780521543101
    Note: Literaturverz. S. 414 - 417
    Language: English
    Subjects: Mathematics
    RVK:
    Keywords: Theoretische Informatik ; Mathematische Logik ; Lehrbuch
    Author information: Ryan, Mark 1962-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1646749812
    Format: Online-Ressource (XX, 738 p. Also available online, digital)
    ISBN: 9783540712091
    Series Statement: Lecture Notes in Computer Science 4424
    Content: Invited Contributions -- THERE AND BACK AGAIN: Lessons Learned on the Way to the Market -- Verifying Object-Oriented Software: Lessons and Challenges -- Software Verification -- Shape Analysis by Graph Decomposition -- A Reachability Predicate for Analyzing Low-Level Software -- Generating Representation Invariants of Structurally Complex Data -- Probabilistic Model Checking and Markov Chains -- Multi-objective Model Checking of Markov Decision Processes -- PReMo: An Analyzer for Probabilistic Recursive Models -- Counterexamples in Probabilistic Model Checking -- Bisimulation Minimisation Mostly Speeds Up Probabilistic Model Checking -- Static Analysis -- Causal Dataflow Analysis for Concurrent Programs -- Type-Dependence Analysis and Program Transformation for Symbolic Execution -- JPF–SE: A Symbolic Execution Extension to Java PathFinder -- Markov Chains and Real-Time Systems -- A Symbolic Algorithm for Optimal Markov Chain Lumping -- Flow Faster: Efficient Decision Algorithms for Probabilistic Simulations -- Model Checking Probabilistic Timed Automata with One or Two Clocks -- Adaptor Synthesis for Real-Time Components -- Timed Automata and Duration Calculus -- Deciding an Interval Logic with Accumulated Durations -- From Time Petri Nets to Timed Automata: An Untimed Approach -- Complexity in Simplicity: Flexible Agent-Based State Space Exploration -- On Sampling Abstraction of Continuous Time Logic with Durations -- Assume-Guarantee Reasoning -- Assume-Guarantee Synthesis -- Optimized L*-Based Assume-Guarantee Reasoning -- Refining Interface Alphabets for Compositional Verification -- MAVEN: Modular Aspect Verification -- Biological Systems -- Model Checking Liveness Properties of Genetic Regulatory Networks -- Checking Pedigree Consistency with PCS -- “Don’t Care” Modeling: A Logical Framework for Developing Predictive System Models -- Abstraction Refinement -- Deciding Bit-Vector Arithmetic with Abstraction -- Abstraction Refinement of Linear Programs with Arrays -- Property-Driven Partitioning for Abstraction Refinement -- Combining Abstraction Refinement and SAT-Based Model Checking -- Message Sequence Charts -- Detecting Races in Ensembles of Message Sequence Charts -- Replaying Play In and Play Out: Synthesis of Design Models from Scenarios by Learning -- Automata-Based Model Checking -- Improved Algorithms for the Automata-Based Approach to Model-Checking -- GOAL: A Graphical Tool for Manipulating Büchi Automata and Temporal Formulae -- Faster Algorithms for Finitary Games -- Specification Languages -- Planned and Traversable Play-Out: A Flexible Method for Executing Scenario-Based Programs, -- motor:The modest Tool Environment -- Syntactic Optimizations for PSL Verification -- The Heterogeneous Tool Set, Hets -- Security -- Searching for Shapes in Cryptographic Protocols -- Automatic Analysis of the Security of XOR-Based Key Management Schemes -- Software and Hardware Verification -- State of the Union: Type Inference Via Craig Interpolation -- Hoare Logic for Realistically Modelled Machine Code -- VCEGAR: Verilog CounterExample Guided Abstraction Refinement -- Decision Procedures and Theorem Provers -- Alloy Analyzer+PVS in the Analysis and Verification of Alloy Specifications -- Combined Satisfiability Modulo Parametric Theories -- A Gröbner Basis Approach to CNF-Formulae Preprocessing -- Kodkod: A Relational Model Finder -- Model Checking -- Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams -- Model Checking on Trees with Path Equivalences -- Uppaal/DMC – Abstraction-Based Heuristics for Directed Model Checking -- Distributed Analysis with ?CRL: A Compendium of Case Studies -- Infinite-State Systems -- A Generic Framework for Reasoning About Dynamic Networks of Infinite-State Processes -- Unfolding Concurrent Well-Structured Transition Systems -- Regular Model Checking Without Transducers (On Efficient Verification of Parameterized Systems).
    Note: Description based upon print version of record , ""Title""; ""Foreword""; ""Preface""; ""Organization""; ""Table of Contents""; ""THERE AND BACK AGAIN: Lessons Learned on the Way to the Market""; ""Verifying Object-Oriented Software: Lessons and Challenges""; ""Shape Analysis by Graph Decomposition""; ""Introduction""; ""Overview""; ""A Full Heap Abstraction for Lists""; ""Abstracting List Segments""; ""A Graph Decomposition Abstraction for Lists""; ""The Abstract Domain of Shape Subgraphs""; ""Abstraction by Graph Decomposition""; ""Concretization by Composition of Shape Subgraphs"" , ""Developing Efficient Abstract Transformersfor the Graph Decomposition Abstraction""""The Most Precise Abstract Transformer""; ""Sound and Efficient Transformers""; ""An Incremental Transformer""; ""Prototype Implementation and Empirical Results""; ""Related Work""; ""A Reachability Predicate for Analyzing Low-Level Software""; ""Introduction""; ""Related Work""; ""Motivation""; ""Example""; ""Operational Semantics of C""; ""Reachability and Pointer Arithmetic""; ""Annotation Language""; ""Implementation""; ""Proving Verification Conditions""; ""Evaluation""; ""Conclusions and Future Work"" , ""Generating Representation Invariants of Structurally Complex Data""""Introduction""; ""Example""; ""Deryaft""; ""Program Heap as an Edge-Labeled Graph""; ""Core and Derived Fields""; ""Properties of Interest""; ""Algorithm""; ""Illustration: Binary Tree Representation of Heaps""; ""Experiments""; ""Discussion""; ""Related Work""; ""Conclusions""; ""Multi-objective Model Checking of Markov Decision Processes""; ""Introduction""; ""Basics and Background""; ""Multi-objective Reachability""; ""Qualitative Multi-objective Model Checking""; ""Quantitative Multi-objective Model Checking"" , ""Concluding Remarks""""PReMo: An Analyzer for Probabilistic Recursive Models""; ""Introduction""; ""Experimental Results""; ""Future Work""; ""Counterexamples in Probabilistic Model Checking""; ""Introduction""; ""Preliminaries""; ""Strongest Evidences and Counterexamples""; ""From a DTMC to a Weighted Digraph""; ""Finding Strongest Evidences""; ""Finding Smallest Counterexamples""; ""Lower Bounds on Probabilities""; ""Conclusion""; ""Bisimulation Minimisation Mostly Speeds Up Probabilistic Model Checking""; ""Introduction""; ""Preliminaries""; ""Bisimulation""; ""Experiments"" , ""Discrete Time""""Continuous Time""; ""Rewards""; ""Concluding Remarks""; ""Causal Dataflow Analysis for Concurrent Programs""; ""Introduction""; ""Preliminaries""; ""The Control Net of a Program""; ""Causal Concurrent Dataflow Framework""; ""Meet over All Traces Solution""; ""Formulation of Specific Problems in the CCD Framework""; ""Solving the Distributive CCD Problem""; ""Experiments""; ""Conclusions""; ""Type-Dependence Analysis and Program Transformation for Symbolic Execution""; ""Introduction""; ""Type-Dependence Analysis""; ""Building the TDG"" , ""Performing CFL-Reachability on the TDG""
    Additional Edition: ISBN 9783540712084
    Additional Edition: Buchausg. u.d.T. Tools and algorithms for the construction and analysis of systems Berlin : Springer, 2007 ISBN 3540712089
    Additional Edition: ISBN 9783540712084
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Systementwicklung ; Softwareentwicklung ; Model Checking ; Programmanalyse ; Theoretische Informatik ; Systementwicklung ; Softwareentwicklung ; Model Checking ; Programmanalyse ; Theoretische Informatik ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_1665241268
    Format: 526 Seiten , 21 cm x 14.8 cm
    Edition: 1. Auflage
    ISBN: 9783824015856
    Series Statement: Das Mandat
    Additional Edition: Erscheint auch als Online-Ausgabe Pauly, Stephan, 1958 - Das arbeitsrechtliche Mandat Bonn : Deutscher Anwaltverlag, 2019
    Language: German
    Subjects: Law
    RVK:
    Keywords: Deutschland ; Geringfügige Beschäftigung ; Teilzeitbeschäftigung
    Author information: Osnabrügge, Stephan
    Author information: Pauly, Stephan 1958-
    Author information: Huth, Michael
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cambridge : Cambridge University Press
    UID:
    gbv_883398478
    Format: 1 Online-Ressource (x, 283 pages) , digital, PDF file(s)
    ISBN: 9781139164870
    Content: More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented
    Content: Secure communication in modern information societies -- Public-key cryptography -- Symmetric-key cryptography -- Security protocol design and analysis -- Optimal public-key encryption with RSA -- Secure information-flow analysis
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015)
    Additional Edition: ISBN 9780521807319
    Additional Edition: ISBN 9780521001885
    Additional Edition: Print version ISBN 9780521807319
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_1859629075
    Format: 1 online resource (xiv, 427 pages) , digital, PDF file(s).
    Edition: 2nd ed.
    ISBN: 9780511810275 , 9780521835367 , 9780521543101
    Content: Recent years have seen the development of powerful tools for verifying hardware and software systems, as companies worldwide realise the need for improved means of validating their products. There is increasing demand for training in basic methods in formal reasoning so that students can gain proficiency in logic-based verification methods. The second edition of this successful textbook addresses both those requirements, by continuing to provide a clear introduction to formal reasoning which is both relevant to the needs of modern computer science and rigorous enough for practical application. Improvements to the first edition have been made throughout, with extra and expanded sections on SAT solvers, existential/universal second-order logic, micro-models, programming by contract and total correctness. The coverage of model-checking has been substantially updated. Further exercises have been added. Internet support for the book includes worked solutions for all exercises for teachers, and model solutions to some exercises for students.
    Note: Title from publisher's bibliographic system (viewed on 18 Jul 2016)
    Additional Edition: ISBN 9780521835367
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780521835367
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages