default search action
Heiko Krumm
Person information
- affiliation: Technical University of Dortmund, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c54]Heiko Krumm, Nils Reiss, Malte Burkert, Thomas Schmidt, Steffen Biehs, Christian Bohr, Fabian Gürtler, Hendrik Horn, Philipp Kreutzer, Philipp Mewes, Hendrik Miller, Christian Riest, Christian Römer, Albert Seebold, Gertrude Sprung, Oliver Ziegler:
Development of a Computer-Aided Dosage and Telemonitoring System for Patients Under Oral Anticoagulation Therapy. eHealth 2018: 188-195 - 2017
- [c53]Nils Reiss, Thomas Schmidt, Frerk Müller-von Aschwege, Wolfgang Thronicke, Jan-Dirk Hoffmann, Jenny Inge Röbesaat, Ezin Deniz, Andreas Hein, Heiko Krumm, Franz-Josef Stewing, Detlev Willemsen, Jan Dieter Schmitto, Christina Feldmann:
Telemonitoring and Medical Care of Heart Failure Patients Supported by Left Ventricular Assist Devices - The Medolution Project. eHealth 2017: 267-274 - [c52]Malte Burkert, Joe Volmer, Heiko Krumm, Christoph Fiehe:
Rule-based technical management for the dependable operation of networked building automation systems. IM 2017: 612-615 - [c51]Joe Volmer, Malte Burkert, Heiko Krumm, Abdurrahman Abodahab, Patrick Dinklage, Marius Feltmann, Chris Kröger, Pernes Panta, Felix Schäfer, David Scheidt, Marcel Sellung, Hauke Singerhoff, Christofer Steingrefer, Thomas Schmidt, Jan-Dirk Hoffmann, Detlev Willemsen, Nils Reiss:
Enhancing Long-Term Motivation of Cardiac Patients by Applying Exergaming in Rehabilitation Training. pHealth 2017: 183-187 - 2016
- [c50]Malte Burkert, Heiko Krumm:
Dependency Management in Component-Based Building Automation Systems. DASC/PiCom/DataCom/CyberSciTech 2016: 352-359 - [c49]Malte Burkert, Jorn Esdohr, Heiko Krumm:
A small-scale model house evaluation platform for building automation systems. ETFA 2016: 1-8 - 2015
- [c48]Malte Burkert, Heiko Krumm, Christoph Fiehe:
Technical management system for dependable Building Automation Systems. ETFA 2015: 1-8 - 2014
- [c47]Israfil Akman, Rafael Bielen, Henning Brümmer, Egor Kudrjaschow, Stefan Tschentscher, Oliver Dohndorf, Heiko Krumm, Jan-Dirk Hoffmann, Anke Workowski, Detlev Willemsen:
CordiAAL: Enhanced Motivation for Cardiological Ergometer Training through Virtual Groups in Virtual Worlds. HEALTHINF 2014: 78-89 - 2011
- [j13]João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus, René Jeruschkat:
Scalable model-based configuration management of security services in complex enterprise networks. Softw. Pract. Exp. 41(3): 307-338 (2011) - [c46]Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Adaptive and reliable binding in ambient service systems. ETFA 2011: 1-8 - [c45]Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Tool-Supported Refinement of High-Level Requirements and Constraints Into Low-Level Policies. POLICY 2011: 97-104 - 2010
- [j12]João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
Formal validation of automated policy refinement in the management of network security systems. Int. J. Inf. Sec. 9(2): 99-125 (2010) - [c44]Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems. AINA Workshops 2010: 526-531 - [c43]Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms. PerCom Workshops 2010: 720-725 - [c42]Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Policy-Based Management for Resource-Constrained Devices and Systems. POLICY 2010: 61-64
2000 – 2009
- 2009
- [c41]Christoph Fiehe, Anna Litvina, Ingo Lück, Oliver Dohndorf, Jens Kattwinkel, Franz-Josef Stewing, Jan Krüger, Heiko Krumm:
Location-Transparent Integration of Distributed OSGi Frameworks and Web Services. AINA Workshops 2009: 464-469 - [c40]Sascha Feldhorst, Sergey Libert, Michael ten Hompel, Heiko Krumm:
Integration of a Legacy Automation System into a SOA for Devices. ETFA 2009: 1-8 - [c39]Jan Krüger, Heiko Krumm, Oliver Dohndorf, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Policy-gesteuertes Management adaptiver und gütegesicherter Dienstesysteme im Projekt OSAMI. GI Jahrestagung 2009: 970-983 - 2008
- [c38]Andre Pohl, Heiko Krumm, Felix Holland, Franz-Josef Stewing, Ingo Lück:
Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems. AINA Workshops 2008: 1393-1398 - [c37]João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
Model-based management of security services in complex network environments. NOMS 2008: 1031-1036 - 2007
- [c36]Fernando Marques Figueira Filho, João Porto de Albuquerque, Paulo Lício de Geus, Heiko Krumm:
A Policy-Based Framework for Interoperable Digital Content Management. CCNC 2007: 945-949 - 2006
- [c35]Stefan Illner, Heiko Krumm, Ingo Lück, Andre Pohl, Andreas Bobek, Hendrik Bohn, Frank Golatowski:
Model-based Management of Embedded Service Systems - An Applied Approach. AINA (2) 2006: 519-523 - 2005
- [c34]João Porto de Albuquerque, Holger Isenberg, Heiko Krumm, Paulo Lício de Geus:
Improving the Configuration Management of Large Network Security Systems. DSOM 2005: 36-47 - [c33]João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
On Scalability and Modularisation in the Modelling of Network Security Systems. ESORICS 2005: 287-304 - [c32]Gerrit Rothmaier, Heiko Krumm:
A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks. FORTE 2005: 247-260 - [c31]João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen. GI Jahrestagung (2) 2005: 633-637 - [c30]Stefan Illner, Heiko Krumm, Andre Pohl, Ingo Lück, Darius Manka, Thomas Sparenberg:
Policy Controlled Automated Management of Distributed and Embedded Service Systems. Parallel and Distributed Computing and Networks 2005: 710-715 - [c29]João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
Policy Modeling and Refinement for Network Security Systems. POLICY 2005: 24-33 - [c28]Gerrit Rothmaier, Heiko Krumm:
Formale Modellierung und Analyse protokollbasierter Angriffe in TCP/IP Netzwerken am Beispiel von ARP und RIP. Sicherheit 2005: 77-88 - [c27]Gerrit Rothmaier, Tobias Kneiphoff, Heiko Krumm:
Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models. SPIN 2005: 236-250 - 2004
- [j11]Peter Herrmann, Heiko Krumm:
Trust-Based Monitoring of Component-Structured Software. Prax. Inf.verarb. Kommun. 27(4): 237-245 (2004) - [c26]Peter Herrmann, Lars Wiebusch, Heiko Krumm:
Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software. DIMVA 2004: 55-70 - [c25]Gerrit Rothmaier, Andre Pohl, Heiko Krumm:
Analyzing Network Management Effects with SPIN and cTLA. SEC 2004: 65-82 - 2002
- [j10]Peter Herrmann, Heiko Krumm, Olaf Drögehorn, Walter Geisselhardt:
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs. Telecommun. Syst. 20(3-4): 291-310 (2002) - [c24]Peter Herrmann, Lars Wiebusch, Heiko Krumm:
State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. I3E 2002: 195-209 - [c23]Ingo Lück, Sebastian Vogel, Heiko Krumm:
Model-based configuration of VPNs. NOMS 2002: 589-602 - 2001
- [c22]Peter Herrmann, Lars Wiebusch, Heiko Krumm:
Tool-Assisted Security Assessment of Distributed Applications. DAIS 2001: 289-294 - [c21]Peter Herrmann, Heiko Krumm:
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. ISCC 2001: 2-8 - [c20]Ingo Lück, Christian Schäfer, Heiko Krumm:
Model-Based Tool-Assistance for Packet-Filter Design. POLICY 2001: 120-136 - 2000
- [j9]Peter Herrmann, Heiko Krumm:
A framework for modeling transfer protocols. Comput. Networks 34(2): 317-337 (2000) - [j8]Hartmut König, Peter Langendörfer, Heiko Krumm:
Improving the efficiency of automated protocol implementations using a configurable FDT compiler. Comput. Commun. 23(12): 1179-1195 (2000) - [j7]Arnulf Mester, Heiko Krumm:
Animation of Protocols and Distributed Algorithms. Comput. Sci. Educ. 10(3): 243-265 (2000) - [c19]Günter Graw, Peter Herrmann, Heiko Krumm:
Verification of UML-Based Real-Time System Designs by Means of cTLA. ISORC 2000: 86-95
1990 – 1999
- 1999
- [c18]Michael Wimmers, Arnulf Mester, Heiko Krumm:
A Component framework for the configuration management of networks. DAIS 1999: 135-148 - [c17]Günter Graw, Peter Herrmann, Heiko Krumm:
Constraint-oriented formal modelling of OO-systems. DAIS 1999: 345- - [c16]Ingo Lück, Marcus Schönbach, Arnulf Mester, Heiko Krumm:
Derivation of Backup Service Management Applications from Service and System Models. DSOM 1999: 243-256 - [c15]Günter Graw, Peter Herrmann, Heiko Krumm:
Composing Object-Oriented Specifications and Verifications with cTLA. ECOOP Workshops 1999: 318 - [c14]Peter Herrmann, Heiko Krumm:
Formal Hazard Analysis of Hybrid Systems in cTLA. SRDS 1999: 68-77 - 1998
- [j6]Peter Herrmann, Heiko Krumm:
Protokollspezifikation und -verifikation mit dem Transferprotokoll-Framework. Prax. Inf.verarb. Kommun. 21(2): 79-88 (1998) - [j5]Peter Herrmann, Heiko Krumm:
Modular specification and verification of XTP. Telecommun. Syst. 9(2): 207-221 (1998) - [c13]Volker Gruhn, Peter Herrmann, Heiko Krumm:
User-Defined Telecooperation Services. ICPADS 1998: 590-598 - [c12]Peter Herrmann, Günter Graw, Heiko Krumm:
Compositional Specification and Structured Verification of Hybrid Systems in cTLA. ISORC 1998: 335- - 1997
- [c11]Arnulf Mester, Heiko Krumm:
Formal Behavioural Patterns for the Tool-assisted Design of Distributed Applications. DAIS 1997 - 1996
- [j4]Hartmut König, Heiko Krumm:
Implementierung von Kommunikationsprotokollen. Inform. Spektrum 19(6): 316-325 (1996) - [c10]Günter Graw, Volker Gruhn, Heiko Krumm:
Support of cooperating and distributed business processes. ICPADS 1996: 22- - [c9]Carsten Heyl, Arnulf Mester, Heiko Krumm:
cTc - A Tool Supporting the Construction of cTLA-Specifications. TACAS 1996: 407-411 - 1995
- [c8]Peter Herrmann, Heiko Krumm:
Re-usable verification elements for high-speed transfer protocol configurations. PSTV 1995: 171-186 - 1994
- [c7]Peter Herrmann, Heiko Krumm:
Compositional specification and verification of high-speed transfer protocols. PSTV 1994: 339-346 - 1993
- [b3]Peter C. Lockemann, Gerhard Krüger, Heiko Krumm:
Telekommunikation und Datenhaltung. Hanser 1993, ISBN 978-3-446-17465-8, pp. I-XXI, 1-655 - [j3]Heiko Krumm, Josef Reichl, Alexander Söder:
Großrechner-Anschluß an Kommunikationsvorrechner. Prax. Inf.verarb. Kommun. 16(2): 70-77 (1993) - 1990
- [b2]Heiko Krumm:
Funktionelle Analyse von Kommunikationsprotokollen. Informatik-Fachberichte 247, Springer 1990, ISBN 3-540-52854-7
1980 – 1989
- 1989
- [c6]Heiko Krumm:
Projections of the Reachability Graph and Environment Models. Automatic Verification Methods for Finite State Systems 1989: 89-96 - 1987
- [j2]Heiko Krumm:
Logische Verifikation nebenläufiger Programme. Angew. Inform. 29(4): 131-140 (1987) - [c5]Heiko Krumm:
Offener Zugang zu abgesetzten Daten im Bürosystem. GI Jahrestagung 1987: 150-162 - 1986
- [c4]Heiko Krumm, Oswald Drobnik:
Problem-Oriented Logical Specifications of Communication Services and Protocols. ICCC 1986: 474-478 - 1984
- [b1]Heiko Krumm:
Spezifikation, Implementierung und Verifikation von Kommunikationsdiensten für verteilte DV-Systeme. Karlsruhe Institute of Technology, Germany, 1984, pp. 1-141 - [j1]Heiko Krumm, Oswald Drobnik:
Interactive verification of communication software on the basis of CIL. Comput. Commun. Rev. 14(2): 92-99 (1984) - [c3]Heiko Krumm, Oswald Drobnik:
Transformation of Constructive Specifications of Services and Protocols into the Logical Language of CIL. PSTV 1984: 31-45 - 1983
- [c2]Heiko Krumm, Oswald Drobnik:
Specification, Implementation, and Verification of Communication Services on the Basis of CIL. Protocol Specification, Testing, and Verification 1983: 301-316 - [c1]Oswald Drobnik, Heiko Krumm:
CIL - Eine Sprache zur Implementierung von Kommunikationsdiensten. Kommunikation in Verteilten Systemen 1983: 301-315
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint