LEADER 03943nam 2200601 a 450 001 9910483984803321 005 20200520144314.0 010 $a1-280-38712-2 010 $a9786613565044 010 $a3-642-13595-1 024 7 $a10.1007/978-3-642-13595-8 035 $a(CKB)2550000000011546 035 $a(SSID)ssj0000446643 035 $a(PQKBManifestationID)11271436 035 $a(PQKBTitleCode)TC0000446643 035 $a(PQKBWorkID)10496401 035 $a(PQKB)11284382 035 $a(DE-He213)978-3-642-13595-8 035 $a(MiAaPQ)EBC3065307 035 $a(PPN)149063849 035 $a(EXLCZ)992550000000011546 100 $a20100507d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aModelling foundations and applications $e6th European Conference, ECMFA 2010, Paris, France, June 15-18, 2010 : proceedings /$fThomas Kuhne ... [et al.], (eds.) 205 $a1st ed. 2010. 210 $aNew York $cSpringer$d2010 215 $a1 online resource (364 p. 150 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6138 225 1 $aLNCS sublibrary. SL 2, Programming and software engineering 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-13594-3 320 $aIncludes bibliographical references and index. 327 $aOrthographic Software Modelling: A Novel Approach to View-Based Software Engineering -- The Good, the Bad and the Ugly: Experiences with Model Driven Development in Large Scale Projects at Ericsson -- Comparing Approaches to Implement Feature Model Composition -- A UML 2.0 Profile to Model Block Cipher Algorithms -- Towards Model Driven Tool Interoperability: Bridging Eclipse and Microsoft Modeling Tools -- Aspect-Oriented Business Process Modeling with AO4BPMN -- A Reflective Approach to Model-Driven Web Engineering -- Requirements Analysis and Modeling with Problem Frames and SysML: A Case Study -- Generative Technologies for Model Animation in the TopCased Platform -- Model-Driven Engineering of Machine Executable Code -- eSPEM ? A SPEM Extension for Enactable Behavior Modeling -- Adding Abstraction and Reuse to a Network Modelling Tool Using the Reuseware Composition Framework -- Model-Based Development of Automotive Electronic Climate Control Software -- Example-Based Sequence Diagrams to Colored Petri Nets Transformation Using Heuristic Search -- Model Search: Formalizing and Automating Constraint Solving in MDE Platforms -- MoPCoM Methodology: Focus on Models of Computation -- Dynamic Computation of Change Operations in Version Management of Business Process Models -- Detecting Inconsistencies in Multi-View Models with Variability -- A Model-Based Method for Evaluating Embedded System Performance by Abstraction of Execution Traces -- Concordance: A Framework for Managing Model Integrity -- An Integrated Facet-Based Library for Arbitrary Software Components -- Precise Specification of Design Pattern Structure and Behaviour -- Coping with Variability in Model-Based Systems Engineering: An Experience in Green Energy -- On the Combination of Domain Specific Modeling Languages -- Joint Language and Domain Engineering -- An Automated Approach to Transform Use Cases into Activity Diagrams. 410 0$aLecture notes in computer science ;$v6138. 410 0$aLNCS sublibrary.$nSL 2,$pProgramming and software engineering. 606 $aDatabase design$vCongresses 606 $aDatabase management 615 0$aDatabase design 615 0$aDatabase management. 676 $a005.10285 701 $aKuhne$b Thomas$0387237 712 12$aEuropean Conference on Modelling Foundations and Applications 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483984803321 996 $aModelling foundations and applications$94200689 997 $aUNINA LEADER 04013oam 22006494a 450 001 9910703238103321 005 20230802003435.0 035 $a(CKB)3390000000045531 035 $a(MH)012961834-9 035 $a(SSID)ssj0000614853 035 $a(PQKBManifestationID)12227593 035 $a(PQKBTitleCode)TC0000614853 035 $a(PQKBWorkID)10605613 035 $a(PQKB)10424083 035 $a(OCoLC)761198030 035 $a(EXLCZ)993390000000045531 100 $a20110526d2011 uy 0 101 0 $aeng 135 $aurbn||||a|||| 181 $ctxt 182 $cc 183 $acr 200 00$aInternational law and the changing character of war /$fRaul A. "Pete" Pedrozo and Daria P. Wollschlaeger, editors$b[electronic resource] 210 $aNewport, R. I. $cNaval War College$d2011 210 1$aNewport, Rhode Island :$cNaval War College,$d2011. 215 $a1 online resource (552 p. ) 225 1 $aInternational law studies series ;$vv. 87 300 $aIncludes bibliographical references and index. 320 $aIncludes bibliographical references and index. 327 $aCombating terrorists : legal challenges in the Post-9/11 World / Nicholas Rostow -- Mission impossible? international law, and the changing character of war / John F. Murphy -- Cyber attacks as "Force" under UN Charter Article 2(4) / Matthew C. Waxman -- Low-intensity computer network attack and self-defense / Sean Watts -- Cyber operations and the Jus in Bello : key issues / Michael N. Schmitt -- Who may be held? military detention through the Habeas Lens / Robert M. Chesney -- The changing character of the participants in war : civilianization of warfighting and the concept of "direct participation in hostilities" / Charles Garraway -- Direct participation in hostilities and the interoperability of the law of armed conflict and human rights law / Françoise J. Hampson -- Use of unmanned systems to combat terrorism / Raul A. "Pete" Pedrozo -- New technology and the law of armed conflict / Darren M. Stewart -- The law of armed conflict in asymmetric urban armed conflict / David E. Graham -- Lawfare today ... and tomorrow / Charles J. Dunlap, Jr. -- The age of lawfare / Dale Stephens -- Warning civilians prior to attack under international law : theory and practice / Pnina Sharvit Baruch and Noam Neuman -- The changing character of public legal scrutiny of operations / Rob McLaughlin -- Litigating how we fight / Ashley S. Deeks -- Asymmetric warfare : how to respond? / Wolff Heintschel von Heinegg -- Concluding remarks : LOAC and attempts to abuse or subvert it / Yoram Dinstein. 410 0$aInternational law studies ;$vv. 87. 606 $aInformation warfare (International law) 606 $aWar (International law) 606 $aCyberterrorism 606 $aComputer networks$xLaw and legislation$xCriminal provisions 606 $aInformation warfare (International law)$xLaw and legislation$xCriminal provisions 606 $aCyberterrorism 606 $aComputer networks 615 0$aInformation warfare (International law) 615 0$aWar (International law) 615 0$aCyberterrorism. 615 0$aComputer networks$xLaw and legislation$xCriminal provisions. 615 0$aInformation warfare (International law)$xLaw and legislation$xCriminal provisions. 615 0$aCyberterrorism. 615 0$aComputer networks. 676 $a341.6 701 $aPedrozo$b Raul A$01180213 701 $aWollschlaeger$b Daria P$01351930 712 02$aNaval War College (U.S.) 801 0$bDLC 801 1$bDLC 801 2$bMH-L 906 $aBOOK 912 $a9910703238103321 996 $aInternational law and the changing character of war$93141095 997 $aUNINA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress