Christoph Meinel

According to our database1, Christoph Meinel authored at least 691 papers between 1981 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Incrementally updating unary inclusion dependencies in dynamic data.
Distributed and Parallel Databases, 2019

Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL).
Computer Networks, 2019

Detect Me If You Can: Spam Bot Detection Using Inductive Representation Learning.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Conditional Generative Adversarial Refinement Networks for Unbalanced Medical Image Semantic Segmentation.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2019

Learning imbalanced semantic segmentation through cross-domain relations of multi-agent generative adversarial networks.
Proceedings of the Medical Imaging 2019: Computer-Aided Diagnosis, 2019

Graded Team Assignments in MOOCs: Effects of Team Composition and Further Factors on Team Dropout Rates and Performance.
Proceedings of the Sixth ACM Conference on Learning @ Scale, 2019

On the Acceptance and Usefulness of Personalized Learning Objectives in MOOCs.
Proceedings of the Sixth ACM Conference on Learning @ Scale, 2019

Unified Cloud Access Control Model for Cloud Storage Broker.
Proceedings of the 33rd International Conference on Information Networking, 2019

Finding Classification Zone Violations with Anonymized Message Flow Analysis.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Rough Logs: A Data Reduction Approach for Log Files.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Utilizing Warm-Up Games in MOOC Discussion Forums.
Proceedings of Work in Progress Papers of the Research, 2019

A Ubiquitous Learning Analytics Architecture for a Service-Oriented MOOC Platform.
Proceedings of the Digital Education: At the MOOC Crossroads Where the Interests of Academia and Business Converge, 2019

Applied Mobile-Assisted Seamless Learning Techniques in MOOCs.
Proceedings of the Digital Education: At the MOOC Crossroads Where the Interests of Academia and Business Converge, 2019

MOOCs in Secondary Education - Experiments and Observations from German Classrooms.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Utilizing Web Analytics in the Context of Learning Analytics for Large-Scale Online Learning.
Proceedings of the IEEE Global Engineering Education Conference, 2019

The "Bachelor Project": Project Based Computer Science Education.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Finding Learning and Teaching Content inside HPI School Cloud (Schul-Cloud).
Proceedings of the IEEE Global Engineering Education Conference, 2019

From MOOCs to Micro Learning Activities.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Towards Identifying De-anonymisation Risks in Distributed Health Data Silos.
Proceedings of the Database and Expert Systems Applications, 2019

Towards Culturally Inclusive MOOCs: A Design-based Approach.
Proceedings of the 11th International Conference on Computer Supported Education, 2019

Skill Confidence Ratings in a MOOC: Examining the Link between Skill Confidence and Learner Development.
Proceedings of the 11th International Conference on Computer Supported Education, 2019

Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Machine Learning Approach for Live Migration Cost Prediction in VMware Environments.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

Holistic Strategy-Based Threat Model for Organizations.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution.
Proceedings of the Advanced Information Networking and Applications, 2019

A Comparative Analysis of Trust Requirements in Decentralized Identity Management.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Power Systems: A Matter of Security and Privacy.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Inferring Private User Behaviour Based on Information Leakage.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Image Captioning with Deep Bidirectional LSTMs and Multi-Task Learning.
TOMCCAP, 2018

Automatic Online Lecture Highlighting Based on Multimedia Analysis.
TLT, 2018

Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments.
T. Large-Scale Data- and Knowledge-Centered Systems, 2018

Information Propagation Speed and Patterns in Social Networks: A Case Study Analysis of German Tweets.
JCP, 2018

Fast Automated Processing and Evaluation of Identity Leaks.
International Journal of Parallel Programming, 2018

VuWaDB: A Vulnerability Workaround Database.
IJISP, 2018

A survey on essential components of a self-sovereign identity.
Computer Science Review, 2018

Personality Exploration System for Online Social Networks: Facebook Brands As a Use Case.
Proceedings of the 2018 IEEE/WIC/ACM International Conference on Web Intelligence, 2018

Beware of SMOMBIES: Verification of Users Based on Activities While Walking.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Virtual Machine Integrity Verification in Crowd-Resourcing Virtual Laboratory.
Proceedings of the 11th IEEE Conference on Service-Oriented Computing and Applications, 2018

Exploring possibilities to partially transform simulation exercises into interactive games on OpenWHO.org digitizing live role-playing game exercises online for epidemics and health emergency work.
Proceedings of the 6th IEEE International Conference on Serious Games and Applications for Health, 2018

CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era.
Proceedings of the Security and Privacy in Communication Networks, 2018

Enhanced Cost Analysis of Multiple Virtual Machines Live Migration in VMware Environments.
Proceedings of the 8th IEEE International Symposium on Cloud and Service Computing, 2018

A threat modeling approach for cloud storage brokerage and file sharing systems.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Evaluation of the Technology Acceptance of a Collaborative Documentation System for Addiction Therapists and Clients.
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

voxel-GAN: Adversarial Framework for Learning Imbalanced Brain Tumor Segmentation.
Proceedings of the Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2018

Team-Based Assignments in MOOCs - User Feedback.
Proceedings of the Learning With MOOCS, 2018

Towards a Better Understanding of Mobile Learning in MOOCs.
Proceedings of the Learning With MOOCS, 2018

Team based assignments in MOOCs: results and observations.
Proceedings of the Fifth Annual ACM Conference on Learning at Scale, 2018

A Quantifiable Trust Model for Blockchain-Based Identity Management.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Instance Tumor Segmentation using Multitask Convolutional Neural Network.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Unified logging system for monitoring multiple cloud storage providers in cloud storage broker.
Proceedings of the 2018 International Conference on Information Networking, 2018

Securing the Flow - Data Flow Analysis with Operational Node Structures.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

ASEDS: Towards Automatic Social Emotion Detection System Using Facebook Reactions.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Cooperative Note-Taking in Psychotherapy Sessions: An Evaluation of the Therapist's User Experience with Tele-Board MED.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018

Collaborative Learning in MOOCs Approaches and Experiments.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

Embedded smart home - remote lab MOOC with optional real hardware experience for over 4000 students.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Enhance learning in a video lecture archive with annotations.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Improving access to online lecture videos.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

OpenWHO: Integrating Online Knowledge Transfer into Health Emergency Response.
Proceedings of the EC-TEL Practitioner Proceedings 2018: 13th European Conference On Technology Enhanced Learning, 2018

Towards Personalized Learning Objectives in MOOCs.
Proceedings of the Lifelong Technology-Enhanced Learning, 2018

Generative Adversarial Framework for Learning Multiple Clinical Tasks.
Proceedings of the 2018 Digital Image Computing: Techniques and Applications, 2018

Datenschutzkonforme Learning Analytics bei Einbindung externer Materialen in Lernportale im schulischen Umfeld (Data-protection-compliant Learning Analytics for the Use of External Resources in Learning Portals in Schools).
Proceedings of the Proceedings der Pre-Conference-Workshops der 16. E-Learning Fachtagung Informatik co-located with 16th e-Learning Conference of the German Computer Society (DeLFI 2018), 2018

Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Malicious Behaviour Identification in Online Social Networks.
Proceedings of the Distributed Applications and Interoperable Systems, 2018

Smart MOOC - Social Computing for Learning and Knowledge Sharing.
Proceedings of the 10th International Conference on Computer Supported Education, 2018

Improving the Efficiency of Inclusion Dependency Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Whole Heart and Great Vessel Segmentation with Context-aware of Generative Adversarial Networks.
Proceedings of the Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme, 2018

Authorship Verification on Short Text Samples Using Stylometric Embeddings.
Proceedings of the Analysis of Images, Social Networks and Texts, 2018

Securing Cloud Storage Brokerage Systems Through Threat Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Privacy Risks in Resource Constrained Smart Micro-Grids.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

LoANs: Weakly Supervised Object Detection with Localizer Assessor Networks.
Proceedings of the Computer Vision - ACCV 2018 Workshops, 2018

SEE: Towards Semi-Supervised End-to-End Scene Text Recognition.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Event Driven Network Topology Discovery and Inventory Listing Using REAMS.
Wireless Personal Communications, 2017

Ensuring patients' privacy in a cryptographic-based-electronic health records using bio-cryptography.
IJEH, 2017

Cellular Automata as an Example for Advanced Beginners' Level Coding Exercises in a MOOC on Test Driven Development.
iJEP, 2017

Evaluation of in-memory storage engine for machine learning analysis of security events.
Concurrency and Computation: Practice and Experience, 2017

Towards a system for complex analysis of security events in large-scale networks.
Computers & Security, 2017

Integrating Continuous Security Assessments in Microservices and Cloud Native Applications.
Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Embedded smart home - remote lab grading in a MOOC with over 6000 participants.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

Incremental Discovery of Inclusion Dependencies.
Proceedings of the 29th International Conference on Scientific and Statistical Database Management, 2017

Cognitive adaptability to optimize online behavior personalizing digital workspaces with virtual reality.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Guilt-by-Association: Detecting Malicious Entities via Graph Mining.
Proceedings of the Security and Privacy in Communication Networks, 2017

Traversal-Free Word Vector Evaluation in Analogy Space.
Proceedings of the 2nd Workshop on Evaluating Vector Space Representations for NLP, 2017

Enhanced Sinkhole System: Collecting System Details to Support Investigations.
Proceedings of the Mobile, Secure, and Programmable Networking, 2017

BMXNet: An Open-Source Binary Neural Network Implementation Based on MXNet.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Supporting Multi-Device E-Learning Patterns with Second Screen Mobile Applications.
Proceedings of the 16th World Conference on Mobile and Contextual Learning, 2017

A Conditional Adversarial Network for Semantic Segmentation of Brain Tumor.
Proceedings of the Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2017

Establishing Therapeutic Alliance in Mental Health Care via Cooperative Documentation.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

Collaboration and Teamwork on a MOOC Platform: A Toolset.
Proceedings of the Fourth ACM Conference on Learning @ Scale, 2017

Secure self-seeding with power-up SRAM states.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Deep Neural Network with l2-Norm Unit for Brain Lesions Detection.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Language Identification Using Deep Convolutional Recurrent Neural Networks.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Juggling Doctor and Patient Needs in Mental Health Record Design.
Proceedings of the Informatics Empowers Healthcare Transformation, 2017

Signed URL for an Isolated Web Server in a Virtual Laboratory.
Proceedings of the 9th International Conference on Education Technology and Computers, 2017

Identifying Audience Attributes: Predicting Age, Gender and Personality for Enhanced Article Writing.
Proceedings of the 2017 International Conference on Cloud and Big Data Computing, ICCBDC 2017, London, United Kingdom, September 17, 2017

Team Placement in Crowd-Resourcing Virtual Laboratory for IT Security e-Learning.
Proceedings of the 2017 International Conference on Cloud and Big Data Computing, ICCBDC 2017, London, United Kingdom, September 17, 2017

Exploring the Potential of Game-Based Learning in Massive Open Online Courses.
Proceedings of the 17th IEEE International Conference on Advanced Learning Technologies, 2017

Automatic Lecture Subtitle Generation and How It Helps.
Proceedings of the 17th IEEE International Conference on Advanced Learning Technologies, 2017

Density and Intensity-Based Spatiotemporal Clustering with Fixed Distance and Time Radius.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Design Thinking and Cognitive Science: An Exploratory Approach to Create Intellectual Capital with Decentralised Organisations.
Proceedings of the Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Countering Three Denial-of-Sleep Attacks on ContikiMAC.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

The gamification of a MOOC platform.
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Introducing digital game-based learning in MOOCs: What do the learners want and need?
Proceedings of the 2017 IEEE Global Engineering Education Conference, 2017

Clustering Heuristics for Efficient t-closeness Anonymisation.
Proceedings of the Database and Expert Systems Applications, 2017

Schulrechner wandern in die Cloud - Was bedeutet das für die unterschiedlichen Stakeholder?
Proceedings of the Bildungsräume 2017: DeLFI 2017, 2017

Peer Tutoring Orchestration - Streamlined Technology-driven Orchestration for Peer Tutoring.
Proceedings of the CSEDU 2017, 2017

Analysis of data from the Twitter account of the Berlin Police for public safety awareness.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

Identifying Suspicious User Behavior with Neural Networks.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Automatic Vulnerability Classification Using Machine Learning.
Proceedings of the Risks and Security of Internet and Systems, 2017

A Smart Micro-Grid Architecture for Resource Constrained Environments.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Offline-enabled web-based E-leaming for improved user experience in Africa.
Proceedings of the IEEE AFRICON 2017, Cape Town, South Africa, September 18-20, 2017, 2017

openHPI's Coding Tool Family: CodeOcean, CodeHarbor, CodePilot.
Proceedings of the Third Workshop "Automatische Bewertung von Programmieraufgaben" (ABP 2017), 2017

2016
Processing Over Encrypted Data: Between Theory and Practice.
SIGMOD Record, 2016

A deep semantic framework for multimodal representation learning.
Multimedia Tools Appl., 2016

Design Thinking.
Informatik Spektrum, 2016

openSAP: Evaluating xMOOC Usage and Challenges for Scalable and Open Enterprise Education.
iJAC, 2016

Streamlined orchestration: An orchestration workbench framework for effective teaching.
Computers & Education, 2016

A Journey of Bounty Hunters: Analyzing the Influence of Reward Systems on StackOverflow Question Response Times.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Ad Hoc vs. Organised Orchestration: A Comparative Analysis of Technology-Driven Orchestration Approaches.
Proceedings of the Eighth IEEE International Conference on Technology for Education, 2016

Improved e-learning experience with embedded LED system.
Proceedings of the Annual IEEE Systems Conference, 2016

Automatic multi-step signature derivation from taint graphs.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Early Detection of Acute Kidney Injury with Bayesian Networks.
Proceedings of the 7th International Symposium on Semantic Mining in Biomedicine, 2016

Couch Learning Mode: Multiple-Video Lecture Playlist Selection out of a Lecture Video Archive for E-learning Students.
Proceedings of the 2016 ACM SIGUCCS Annual Conference on User Services, 2016

Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Event attribute tainting: A new approach for attack tracing and event correlation.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

SceneTextReg: A Real-Time Video OCR System.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Image Captioning with Deep Bidirectional LSTMs.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

Patient-Provider Teamwork via Cooperative Note Taking on Tele-Board MED.
Proceedings of the Exploring Complexity in Health: An Interdisciplinary Systems Approach - Proceedings of MIE2016 at HEC2016, Munich, Germany, 28 August, 2016

Punctuation Prediction for Unsegmented Transcript Based on Word Vector.
Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, 2016

Towards Vulnerability Assessment as a Service in OpenStack Clouds.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

Improving the Peer Assessment Experience on MOOC Platforms.
Proceedings of the Third ACM Conference on Learning @ Scale, 2016

Enabling Schema Agnostic Learning Analytics in a Service-Oriented MOOC Platform.
Proceedings of the Third ACM Conference on Learning @ Scale, 2016

Using A/B testing in MOOC environments.
Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, 2016

Signature Embedding: Writer Independent Offline Signature Verification with Deep Metric Learning.
Proceedings of the Advances in Visual Computing - 12th International Symposium, 2016

Sentence Boundary Detection Based on Parallel Lexical and Acoustic Models.
Proceedings of the Interspeech 2016, 2016

Exploring multimodal video representation for action recognition.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Real-Time Action Recognition in Surveillance Videos Using ConvNets.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Action Recognition in Surveillance Video Using ConvNets and Motion History Image.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2016, 2016

Pre-Course Key Segment Analysis of Online Lecture Videos.
Proceedings of the 16th IEEE International Conference on Advanced Learning Technologies, 2016

Visualization and analysis of public social geodata to provide situational awareness.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016

Multiple Virtual Machines Live Migration Performance Modelling - VMware vMotion Based Study.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Analysis of the Value of Public Geotagged Data from Twitter from the Perspective of Providing Situational Awareness.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

CodeOcean - A versatile platform for practical programming excercises in online environments.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Enhance embedded system E-leaming experience with sensors.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Detecting Maximum Inclusion Dependencies without Candidate Generation.
Proceedings of the Database and Expert Systems Applications, 2016

Automated k-Anonymization and l-Diversity for Shared Data Privacy.
Proceedings of the Database and Expert Systems Applications, 2016

Automatisierte Online-Aufsicht im Kontext der Wertigkeit von Zertifikaten einer MOOC Plattform.
Proceedings of the DeLFI 2016, 2016

Tele-Board Prototyper - Distributed 3D Modeling in a Web-Based Real-Time Collaboration System.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

Full-body WebRTC video conferencing in a web-based real-time collaboration system.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Advanced persistent threats: Behind the scenes.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Automated parsing and interpretation of identity leaks.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Key Management for Secure Demand Data Communication in Constrained Micro-Grids.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Privacy Violations in Constrained Micro-Grids: Adversarial Cases.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Sentence-Level Automatic Lecture Highlighting Based on Acoustic Analysis.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Weiterbildung aus dem Netz.
Wirtschaftsinformatik & Management, 2015

Implementation and Evaluation of Digital E-Lecture Annotation in Learning Groups to Foster Active Learning.
TLT, 2015

MOOCs - am Beispiel openHPI.
Informatik Spektrum, 2015

Normalizing Security Events with a Hierarchical Knowledge Base.
Proceedings of the Information Security Theory and Practice, 2015

Blog, Forum or Newspaper? Web Genre Detection Using SVMs.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

Extraction and Analysis of Web Interviews.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

Social Media Story Telling.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Extracting Image Context from Pinterest for Image Recommendation.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Finding Demand for Products in the Social Web.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Towards Cloud-Aware Vulnerability Assessments.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Automatic vulnerability detection for weakness visualization and advisory creation.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Simulation user behavior on a security testbed using user behavior states graph.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Lecture Butler: Teaching Reasonable Lectures from a Lecture Video Archive.
Proceedings of the 2015 ACM Annual Conference on SIGUCCS, 2015

Table Detection from Slide Images.
Proceedings of the Image and Video Technology - 7th Pacific-Rim Symposium, 2015

Concept for a security investigation framework.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Concept-Based Multimodal Learning for Topic Generation.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

An Improved System For Real-Time Scene Text Recognition.
Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, 2015

Secure access control for multi-cloud resources.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

High-Speed Security Analytics Powered by In-Memory Machine Learning Engine.
Proceedings of the 14th International Symposium on Parallel and Distributed Computing, 2015

Parallel and distributed normalization of security events for instant attack analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Adaptive E-Lecture Video Outline Extraction Based on Slides Analysis.
Proceedings of the Advances in Web-Based Learning - ICWL 2015, 2015

Deep Semantic Mapping for Cross-Modal Retrieval.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Visual-Textual Late Semantic Fusion Using Deep Neural Network for Document Categorization.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Application of quantitative security metrics in cloud computing.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

A proposed framework for proactive vulnerability assessments in cloud deployments.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Analyzing Boundary Device Logs on the In-memory Platform.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

Scaling youth development training in IT using an xMOOC platform.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Automatic Treatment Session Summaries in Psychotherapy - A Step towards Therapist-Patient Cooperation.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

Hot spot detection - An interactive cluster heat map for sentiment analysis.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

Does Multilevel Semantic Representation Improve Text Categorization?
Proceedings of the Database and Expert Systems Applications, 2015

Scalable Inclusion Dependency Discovery.
Proceedings of the Database Systems for Advanced Applications, 2015

Parallel network data processing in client side JavaScript applications.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

Reward-based Intermittent Reinforcement in Gamification for E-learning.
Proceedings of the CSEDU 2015, 2015

Enhance Lecture Archive Search with OCR Slide Detection and In-Memory Database Technology.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

Multi-step Attack Pattern Detection on Normalized Event Logs.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A verification mechanism for cloud brokerage system.
Proceedings of the Second International Conference on Computer Science, 2015

Implementation of Data Security Requirements in a Web-based Application for Interactive Medical Documentation.
Proceedings of the HEALTHINF 2015, 2015

Automatic detection of vulnerabilities for advanced security analytics.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

Handling Reboots and Mobility in 802.15.4 Security.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Blogosphere and its Exploration
Springer, ISBN: 978-3-662-44409-2, 2015

2014
Digital Communication - Communication, Multimedia, Security
X.media.publishing, Springer, ISBN: 978-3-642-54331-9, 2014

Content Based Lecture Video Retrieval Using Speech and Video Text Information.
TLT, 2014

Multiperiod robust optimization for proactive resource provisioning in virtualized data centers.
The Journal of Supercomputing, 2014

Big Data in Forschung und Lehre am HPI.
Informatik Spektrum, 2014

The Automated Generation and Further Application of Tree-Structure Outline for Lecture Videos with Synchronized Slides.
IJTEM, 2014

SecPlace: A Security-Aware Placement Model for Multi-tenant SaaS Environments.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Construction of Agent-Based Trust in Cloud Infrastructure.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Gathering and Analyzing Identity Leaks for Security Awareness.
Proceedings of the Technology and Practice of Passwords, 2014

Supporting talk-based mental health interventions with digital whiteboards.
Proceedings of the e-Health - For Continuity of Care - Proceedings of MIE2014, the 25th European Medical Informatics Conference, Istanbul, Turkey, August 31, 2014

Coordinating VMs' Memory Demand Heterogeneity and Memory DVFS for Energy-Efficient VMs Consolidation.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Robust Virtual Machine Consolidation for Efficient Energy and Performance in Virtualized Data Centers.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

A concept to analyze user navigation behavior inside a recorded lecture (to identify difficult spots).
Proceedings of the 2014 Information Technology Based Higher Education and Training, 2014

Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Live Migration Impact on Virtual Datacenter Performance: Vmware vMotion Based Study.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Lightweight ad hoc assessment of practical programming skills at scale.
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014

Handling re-grading of automatically graded assignments in MOOCs.
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014

Modeling cognitive style patterns to explore individuals' capabilities for processing knowledge in virtual settings.
Proceedings of the 2014 European Conference on Cognitive Ergonomics, 2014

Exploring emotions over time within the blogosphere.
Proceedings of the International Conference on Data Science and Advanced Analytics, 2014

Asynchronous understanding of creative sessions using archived collaboration artifacts.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

The Future of Teleteaching in MOOC Times.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Recommendations for Medical Treatment Processes: The PIGS Approach.
Proceedings of the Business Process Management Workshops, 2014

Cluster Labeling for the Blogosphere.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

Efficient Event Detection for the Blogosphere.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

Accelerate the detection of trends by using sentiment analysis within the blogosphere.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Geographic focus detection using multiple location taggers.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Supporting the synthesis of information in design teams.
Proceedings of the Designing Interactive Systems Conference 2014, DIS '14, Vancouver, BC, 2014

Sicherheit und Vertrauen im Internet - Eine technische Perspektive.
essentials, Springer Vieweg, ISBN: 978-3-658-04833-4, 2014

2013
Internetworking - Technological Foundations and Applications
X.media.publishing, Springer, ISBN: 978-3-642-35392-5, 2013

High-quality attack graph-based IDS correlation.
Logic Journal of the IGPL, 2013

A robust optimization for proactive energy management in virtualized data centers.
Proceedings of the ACM/SPEC International Conference on Performance Engineering, 2013

Identifying Domain Experts in the Blogosphere - Ranking Blogs Based on Topic Consistency.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Communication-Aware and Energy-Efficient Scheduling for Parallel Applications in Virtualized Data Centers.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Energy and Performance Efficient Consolidation of Independent VMs in Virtualized Data Center by Exploiting VMs' Memory Demand Heterogeneity.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Next Generation Tele-Teaching: Latest Recording Technology, User Engagement and Automatic Metadata Retrieval.
Proceedings of the Human Factors in Computing and Informatics, 2013

Tracking Visitor Engagement in the Blogosphere for Leveraging Rankings.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

A flexible framework for detecting IPv6 vulnerabilities.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Privacy and security in IPv6 networks: challenges and possible solutions.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

CGA integration into IPsec/IKEv2 authentication.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

SSAS: A simple secure addressing scheme for IPv6 autoconfiguration.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Catch the Spike: On the Locality of Individual BGP Update Bursts.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Lecture video segmentation by automatically analyzing the synchronized slides.
Proceedings of the ACM Multimedia Conference, 2013

Attack Scenario Prediction Methodology.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Lecture Video Browsing Using Multimodal Information Resources.
Proceedings of the Advances in Web-Based Learning - ICWL 2013, 2013

Evaluating the Digital Manuscript Functionality - User Testing for Lecture Video Annotation Features.
Proceedings of the Advances in Web-Based Learning - ICWL 2013, 2013

Security Event Correlation Supported by Multi-Core Architecture.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

SignedQuery: Protecting users data in multi-tenant SaaS environments.
Proceedings of the International Conference on Advances in Computing, 2013

Identify Emergent Trends Based on the Blogosphere.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2013

6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer.
Proceedings of the International Workshop on Adaptive Security, 2013

Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

openHPI - A case-study on the emergence of two learning communities.
Proceedings of the IEEE Global Engineering Education Conference, 2013

Designing MOOCs for the Support of Multiple Learning Styles.
Proceedings of the Scaling up Learning for Sustained Impact, 2013

openHPI: Soziales und Praktisches Lernen im Kontext eines MOOC.
Proceedings of the DeLFI 2013, 2013

A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Multi-core Supported High Performance Security Analytics.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

A document-centric method for combined synchronous and asynchronous applications.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

openHPI: Evolution of a MOOC Platform from LMS to SOA.
Proceedings of the CSEDU 2013, 2013

Applying Erasure Codes for Fault Tolerance in Cloud-RAID.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Towards cross-platform collaboration - Transferring real-time groupware to the browser.
Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2013

Supporting creative collaboration in globally distributed companies.
Proceedings of the Computer Supported Cooperative Work, 2013

HPISecure: Towards Data Confidentiality in Cloud Applications.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

DNS Update Extension to IPv6 Secure Addressing.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Web Mining Accelerated with In-Memory and Column Store Technology.
Proceedings of the Advanced Data Mining and Applications, 9th International Conference, 2013

Hierarchical object log format for normalisation of security events.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Scrutinizing the State of Cloud Storage with Cloud-RAID: A Secure and Reliable Storage Above the Clouds.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Internetworking - Technische Grundlagen und Anwendungen
X.media.press, Springer, ISBN: 978-3-540-92940-6, 2012

Supporting Object-Oriented Programming of Semantic-Web Software.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

Identifying the top-dogs of the blogosphere.
Social Netw. Analys. Mining, 2012

Energy efficient scheduling of HPC-jobs on virtualize clusters using host and VM dynamic configuration.
Operating Systems Review, 2012

IPv6 Deployment and Spam Challenges.
IEEE Internet Computing, 2012

Collaboratecom Special Issue Analyzing Distributed Whiteboard Interactions.
Int. J. Cooperative Inf. Syst., 2012

Secure Neighbor Discovery: Review, Challenges, Perspectives, and Recommendations.
IEEE Security & Privacy, 2012

An alert correlation platform for memory-supported techniques.
Concurrency and Computation: Practice and Experience, 2012

A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Understanding asynchronous design work - segmentation of digital whiteboard sessions.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

An Automated Analysis and Indexing Framework for Lecture Video Portal.
Proceedings of the Advances in Web-Based Learning - ICWL 2012, 2012

Multicore-based auto-scaling SEcure Neighbor Discovery for Windows operating systems.
Proceedings of the 2012 International Conference on Information Networking, 2012

Stopping time condition for practical IPv6 Cryptographically Generated Addresses.
Proceedings of the 2012 International Conference on Information Networking, 2012

Analysis and Simulation of HPC Applications in Virtualized Data Centers.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Online assessment for hands-on cyber security training in a virtual lab.
Proceedings of the IEEE Global Engineering Education Conference, 2012

Automatic Categorization of Lecture Videos: Using Statistical Log File Analysis To Enhance Tele-Teaching Metadata.
Proceedings of the DeLFI 2012, 2012

Implementing a Culture of Participation as Means for Collaboration in Tele-Teaching Using the Example of Cooperative Video Annotation.
Proceedings of the DeLFI 2012, 2012

Handwriting recognition for a digital whiteboard collaboration platform.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Automated Extraction of Lecture Outlines from Lecture Videos - A Hybrid Solution for Lecture Video Indexing.
Proceedings of the CSEDU 2012, 2012

Reputation objects for interoperable reputation exchange: Implementation and design decisions.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Dynamic scalability and contention prediction in public infrastructure using Internet application profiling.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Increasing Spot Instances Reliability Using Dynamic Scalability.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Lecture Video Indexing and Analysis Using Video OCR Technology.
JMPT, 2011

Vier Jahre Docu-blogging im IT-Gipfel-Prozess der Bundesregierung - Partizipation und Dokumentation leicht gemacht.
Informatik Spektrum, 2011

Measuring Expertise in Online Communities.
IEEE Intelligent Systems, 2011

SPEAR: Spamming-Resistant Expertise Analysis and Ranking in Collaborative Tagging Systems.
Computational Intelligence, 2011

Improving search in tele-lecturing: using folksonomies as trigger to query semantic datasets to extract additional metadata.
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011

Towards Context-Aware Service-Oriented Semantic Reputation Framework.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Visualizing the Blogosphere with BlogConnect.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Mapping the Blogosphere-Towards a Universal and Scalable Blog-Crawler.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Lecture Video Indexing and Analysis Using Video OCR Technology.
Proceedings of the Seventh International Conference on Signal-Image Technology and Internet-Based Systems, 2011

WinSEND: Windows SEcure Neighbor Discovery.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Automatic Lecture Video Indexing Using Video OCR Technology.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011

BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

From Reputation Models and Systems to Reputation Ontologies.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Automated Security Service Orchestration for the Identity Management in Web Service Based Systems.
Proceedings of the IEEE International Conference on Web Services, 2011

An Attribute Assurance Framework to Define and Match Trust in Identity Attributes.
Proceedings of the IEEE International Conference on Web Services, 2011

CS-CGA: Compact and more Secure CGA.
Proceedings of the 17th IEEE International Conference on Networks, 2011

A distributed virtual laboratory architecture for cybersecurity training.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Simulating Additional Area on Tele-Board's Large Shared Display.
Proceedings of the HCI International 2011 - Posters' Extended Abstracts, 2011

An Integrated Network Scanning Tool for Attack Graph Construction.
Proceedings of the Advances in Grid and Pervasive Computing - 6th International Conference, 2011

Whom to Trust? Generating WS-Security Policies Based on Assurance Information.
Proceedings of the 9th IEEE European Conference on Web Services, 2011

Accurate Mutlicore Processor Power Models for Power-Aware Resource Management.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Tele-Board: Enabling efficient collaboration in digital design spaces.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

User-centered development of social collaboration software.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Analyzing distributed whiteboard interactions.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Why rating is not enough: A study on online reputation systems.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

A New Alert Correlation Algorithm Based on Attack Graph.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Elastic VM for Cloud Resources Provisioning Optimization.
Proceedings of the Advances in Computing and Communications, 2011

German Speech Recognition: A Solution for the Analysis and Processing of Lecture Recordings.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

Mathematische Grundlagen der Informatik - Mathematisches Denken und Beweisen: eine Einführung, 5. Auflage.
Vieweg+Teubner, ISBN: 978-3-8348-1520-0, 2011

E-Librarian Service - User-Friendly Semantic Search in Digital Libraries.
X.media.publishing, Springer, ISBN: 978-3-642-17743-9, 2011

2010
Social Physics of the Blogosphere - Capturing, Analyzing and Presenting Interdependencies within a Single Framework.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

An approach to capture authorisation requirements in business processes.
Requir. Eng., 2010

Digitale Videos im Unterricht - Die "YouTube-Generation" lernt Judo mit E-Videos.
LOG IN, 2010

Besser Mathematik begreifen mit MatES - Autonomes Lernen mit Videosequenzen im Unterricht.
LOG IN, 2010

Enabling Usage Control through Reputation Objects: A Discussion on e-Commerce and the Internet of Services Environments.
JTAER, 2010

A Security and High-Availability Layer for Cloud Storage.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

Visualizing Blog Archives to Explore Content- and Context-Related Interdependencies.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Efficient traffic simulator coupling in a distributed V2X simulation environment.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

Technology based motivation of students to collaborate by digital annotations during real lecture and learning sessions.
Proceedings of the ACM SIGUCCS Fall Conference on User Services 2010, Norfolk, VA, USA, 2010

The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud.
Proceedings of the 6th World Congress on Services, 2010

A Flexible and Efficient Alert Correlation Platform for Distributed IDS.
Proceedings of the Fourth International Conference on Network and System Security, 2010

An identity provider to manage reliable digital identities for SOA and the web.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures.
Proceedings of the IEEE International Conference on Web Services, 2010

Enriching E-Learning meta data with user generated playlists.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Improving community rating in the tele-lecturing context.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Unsupervised matching of object models and ontologies using canonical vocabulary.
Proceedings of the Proceedings the 6th International Conference on Semantic Systems, 2010

Enabling reputation interoperability through semantic technologies.
Proceedings of the Proceedings the 6th International Conference on Semantic Systems, 2010

Transformation and Aggregation of Web Service Security Requirements.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Message capturing as a paradigm for asynchronous digital whiteboard interaction.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Secure Communication Using Identity Based Encryption.
Proceedings of the Communications and Multimedia Security, 2010

Contract-based cloud architecture.
Proceedings of the Second International CIKM Workshop on Cloud Data Management, 2010

A Specialized Tool for Simulating Lock-Keeper Data Transfer.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Mapping the Blogosphere with RSS-Feeds.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

SecureSOA.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

Using vulnerability information and attack graphs for intrusion detection.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

Establishing an Expandable Architecture for a Tele-teaching Portal.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

Realization of an Expandable Search Function for an E-Learning Web Portal.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

Mobile Web Usability Evaluation - Combining the Modified Think Aloud Method with the Testing of Emotional, Cognitive and Conative Aspects of the Usage of a Web Application.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
Digitale Kommunikation - Vernetzen, Multimedia, Sicherheit
X.media.press, Springer, ISBN: 978-3-540-92923-9, 2009

Model-driven business process security requirement specification.
Journal of Systems Architecture - Embedded Systems Design, 2009

A pattern-driven security advisor for service-oriented architectures.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

A message meta model for federated authentication in service-oriented architectures.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Teaching with information and communication technologies: preliminary results of a large scale survey.
Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, 2009

Distribution to multiple platforms based on one video lecture archive.
Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, 2009

Telling experts from spammers: expertise ranking in folksonomies.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

Automatic Extraction of Semantic Descriptions from the Lecturer's Speech.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

An XACML Extension for Business Process-Centric Access Control Policies.
Proceedings of the POLICY 2009, 2009

X-Tracking the Changes of Web Navigation Patterns.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Towards Semantic Event-Driven Systems.
Proceedings of the NTMS 2009, 2009

A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification.
Proceedings of the NPC 2009, 2009

Verteiltes Design Thinking mit teleBoard.
Proceedings of the Mensch & Computer 2009: Grenzenlos frei!?, 2009

Towards Unifying Vulnerability Information for Attack Graph Construction.
Proceedings of the Information Security, 12th International Conference, 2009

Security Requirements Specification in Process-aware Information Systems.
Proceedings of the ISSE 2009, 2009

Implementing IDS Management on Lock-Keeper.
Proceedings of the Information Security Practice and Experience, 2009

Linking Tele-TASK Video Portal to the Semantic Web.
Proceedings of the 9th International Conference on Innovative Coummunity Systems, 2009

A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control.
Proceedings of the IEEE International Conference on Web Services, 2009

Security in Tele-Lab - Protecting an online virtual lab for security training.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Can Software Developers Use Linked Data Vocabulary?
Proceedings of the 5th International Conference on Semantic Systems, 2009

Verification of Business Process Entailment Constraints Using SPIN.
Proceedings of the Engineering Secure Software and Systems, 2009

Post Recommendation in Social Web Site.
Proceedings of the Electronic Government, 8th International Conference, 2009

Tele-Lecturing - Quo vadis Vorlesungsaufzeichnungen.
Proceedings of the Lernen im Digitalen Zeitalter Workshop-Band Dokumentation der Pre-Conference zur DeLFI2009, 2009

Intrusion Detection in the Cloud.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Enabling Video-Blogging without Relying on External Service-Providers.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Spurring Design Thinking through Educational Weblogging.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Remodeling Vulnerability Information.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Implementing a Corporate Weblog for SAP.
Proceedings of the Recent Trends and Developments in Social Software, 2009

Improving V2X simulation performance with optimistic synchronization.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

Trust Requirements in Identity Federation Topologies.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

Design Pattern for Object Triple Mapping.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

A Security Meta-model for Service-Oriented Architectures.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

Constructing a Context-Aware Service-Oriented Reputation Model Using Attention Allocation Points.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

An Extensible and Virtualization-Compatible IDS Management Architecture.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Security Requirements Specification in Service-Oriented Business Process Management.
Proceedings of the The Forth International Conference on Availability, 2009

Design Thinking: Innovation lernen - Ideenwelten öffnen.
mi-Wirtschaftsbuch, ISBN: 978-3-86880-013-5, 2009

2008
Browsing within Lecture Videos Based on the Chain Index of Speech Transcription.
TLT, 2008

Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab.
Int. J. Online Eng., 2008

The Metadata Triumvirate: Social Annotations, Anchor Texts and Search Queries.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

Using quantified trust levels to describe authentication requirements in federated identity management.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Strong Authentication over Lock-Keeper.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Building a Scalable Collaborative Web Filter with Free and Open Source Software.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Awareness Creation mit Tele-Lab IT-Security: Praktisches Sicherheitstraining im virtuellen Labor am Beispiel Trojanischer Pferde.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Task-based entailment constraints for basic workflow patterns.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Exploring social annotations for web document classification.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Modelling Security Goals in Business Processes.
Proceedings of the Modellierung 2008, 12.-14. März 2008, Berlin, 2008

Vorwort: Alltagstauglichkeit von Anwendungssystemen und Infrastrukturen.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2008

Applications of description logics to improve multimedia information retrieval for efficient educational tools.
Proceedings of the 1st ACM SIGMM International Conference on Multimedia Information Retrieval, 2008

Dynamic Browsing of Audiovisual Lecture Recordings Based on Automated Speech Recognition.
Proceedings of the Intelligent Tutoring Systems, 9th International Conference, 2008

Motivation of the students in game development projects.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

Question answering from lecture videos based on an automatic semantic annotation.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

Quantified Trust Levels for Authentication.
Proceedings of the ISSE 2008, 2008

Segmentation of Lecture Videos Based on Spontaneous Speech Recognition.
Proceedings of the Tenth IEEE International Symposium on Multimedia (ISM2008), 2008

Enforcing Information Flow Constraints in RBAC Environments.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Question Answering from Lecture Videos Based on Automatically-Generated Learning Objects.
Proceedings of the Advances in Web Based Learning, 2008

Who Reads and Writes the Social Web? A Security Architecture for Web 2.0 Applications.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Explorative Learning of Wireless Network Security with Tele-Lab IT-Security.
Proceedings of the Hybrid Learning and Education, First International Conference, 2008

Towards Secure Mobile Payment Based on SIP.
Proceedings of the 15th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2008), 31 March, 2008

Automatische Erzeugung Semantischer Annotationen für Vorlesungsvideos.
Proceedings of the DeLFI 2008: Die 6. e-Learning Fachtagung Informatik der Gesellschaft für Informatik e.V., 07., 2008

Webbasierte Suche in Vorlesungsvideos auf Basis der Transkripte eines Spracherkenners.
Proceedings of the DeLFI 2008: Die 6. e-Learning Fachtagung Informatik der Gesellschaft für Informatik e.V., 07., 2008

Towards the Aggregation of Security Requirements in Cross-Organisational Service Compositions.
Proceedings of the Business Information Systems, 11th International Conference, 2008

Realistic Simulation of V2X Communication Scenarios.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Can VoIP Live up to the QoS Standards of Traditional Wireline Telephony?
Proceedings of the Fourth Advanced International Conference on Telecommunications, 2008

SIMPA: A SIP-Based Mobile Payment Architecture.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Vom ersten nationalen IT-Gipfel der Bundesregierung.
it - Information Technology, 2007

Semantic Interpretation of Natural Language User Input to Improve Search in Multimedia Knowledge Base (Semantische Interpretation einer Benutzer-Eingabe in natürlicher Sprache für eine verbesserte Suche in einer multimedialen Wissensdatenbank).
it - Information Technology, 2007

Physikalische Trennung als Ultima Ratio im Hochsicherheitsbereich.
Informatik Spektrum, 2007

Deriving XACML Policies from Business Process Models.
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007

Detecting the Changes ofWeb Students' Learning Interest.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Why HTTPS Is Not Enough - A Signature-Based Architecture for Trusted Content on the Social Web.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Teleteaching anywhere solution kit (Tele-TASK) goes mobile.
Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, 2007

The virtual tele-tASK professor: semantic search in recorded lectures.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Web Search Personalization Via Social Bookmarking and Tagging.
Proceedings of the Semantic Web, 2007

Optimizing the Retrieval of Pertinent Answers for NL Questions with the E-Librarian Service.
Proceedings of the SMR<sup>2</sup> 2007 Workshop on Service Matchmaking and Resource Retrieval in the Semantic Web (SMRR 2007) co-located with ISWC 2007 + ASWC 2007, 2007

Lernortkooperation in der IT-Ausbildung - Kompetenzentwicklung in Projekten.
Proceedings of the Didaktik der Informatik in Theorie und Praxis. INFOS 2007: 12. GI-Fachtagung Informatik und Schule, 2007

Towards to an automatic semantic annotation for multimedia learning objects.
Proceedings of the International Workshop on Educational Multimedia and Multimedia Education 2007, 2007

Team and Task Based RBAC Access Control Model.
Proceedings of the 2007 Latin American Network Operations and Management Symposium, 2007

Segmentation and Annotation of Audiovisual Recordings Based on Automated Speech Recognition.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2007

A Policy Language for Integrating Heterogeneous Authorization Policies.
Proceedings of the Grid Service Engineering and Management: The 4th International Conference on Grid Service Engineering and Management, 2007

Semantic Composition of Lecture Subparts for a Personalized e-Learning.
Proceedings of the Semantic Web: Research and Applications, 2007

Authors vs. readers: a comparative study of document metadata and content in the www.
Proceedings of the 2007 ACM Symposium on Document Engineering, 2007

Bessere Schulnoten mit MatES, dem e-Bibliothekardienst für den Mathematikunterricht.
Proceedings of the DeLFI 2007, 2007

A Simple, Smart and Extensible Framework for Network Security Measurement.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Mining the Students' Learning Interest in Browsing Web-Streaming Lectures.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

User Centricity in Healthcare Infrastructures.
Proceedings of the BIOSIG 2007: Biometrics and Electronic Signatures, 2007

A Secure Web Services Providing Framework Based on Lock-Keeper.
Proceedings of the Managing Next Generation Networks and Services, 2007

Function-Based Authorization Constraints Specification and Enforcement.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
The first 10 years of the ECCC digital library.
Commun. ACM, 2006

Deployment of Virtual Machines in Lock-Keeper.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Label-Based Access Control Policy Enforcement and Management.
Proceedings of the Seventh International Conference on Software Engineering, 2006

Better results in mathematics lessons with a virtual personal teacher.
Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, 2006

Segmenting of Recorded Lecture Videos - The Algorithm VoiceSeg.
Proceedings of the SIGMAP 2006, 2006

An e-Librarian Service that Yields Pertinent Resources from a Multimedia Knowledge Base.
Proceedings of the SIGMAP 2006, 2006

Semantic Indexing for Recorded Educational Lecture Videos.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Lock-Keeper: A New Implementation of Physical Separation Technology.
Proceedings of the ISSE 2006, 2006

Resolving Ambiguities in the Semantic Interpretation of Natural Language Questions.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2006

An E-Librarian Service That Yields Pertinent Resources from a Multimedia Knowledge Base.
Proceedings of the E-Business and Telecommunication Networks, 2006

New Media for Teaching Applied Cryptography and Network Security.
Proceedings of the Innovative Approaches for Learning and Knowledge Sharing, 2006

An e-Librarian Service that Understands Natural Language Questions from Students.
Proceedings of the 18th Conference on Advanced Information Systems Engineering (CAiSE '06), 2006

Building Content Clusters Based on Modelling Page Pairs.
Proceedings of the Frontiers of WWW Research and Development, 2006

Mathematische Grundlagen der Informatik - Mathematisches Denken und Beweisen: eine Einführung, 3. Auflage.
Teubner, ISBN: 978-3-8351-0049-7, 2006

2005
Medical Image Segmentation Using a Combined Approach.
Proceedings of The 2005 International Conference on Computer Vision, 2005

Recovering Individual Accessing Behaviour from Web Logs.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Discovering Characteristic Individual Accessing Behaviors in Web Environment.
Proceedings of the Rough Sets, 2005

A Framework for Supporting Distributed Access Control Policies.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Virtual Machine Management for Tele-Lab "IT-Security" Server.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

A CORBA-Based Dynamic Reconfigurable Middleware.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Student's Perception of a Semantic Search Engine.
Proceedings of the Cognition and Exploratory Learning in Digital Age, 2005

A simple application of description logics for a semantic search engine.
Proceedings of the AC 2005, 2005

A simple solution for an intelligent librarian system.
Proceedings of the AC 2005, 2005

tele-TASK - Ein praktikables, Standardkomponenten-basiertes, mobil einsetzbares Teleteaching-System.
Proceedings of the Workshop Proceedings DeLFI 2005 und GMW05, 2005

Teaching in the Cyber-Age: Technologies, Experiments, and Realizations.
Proceedings of the DeLFI 2005: 3. Deutsche e-Learning Fachtagung Informatik, 2005

Hybrid Framework for Medical Image Segmentation.
Proceedings of the Computer Analysis of Images and Patterns, 11th International Conference, 2005

A XML format secure protocol - OpenSST.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
10 Jahre ECCC - Eine Digitale Bibliothek in weltweiter Benutzung
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2004

TI-jPACS - eine frei verfügbare leistungsfähige Plattform zur medizinischen Bildverarbeitung und -visualisierung
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2004

Medizinische Bildverarbeitung - eine Übersicht
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2004

On relations between counting communication complexity classes.
J. Comput. Syst. Sci., 2004

Tele-Lab "IT-Security" on CD: portable, reliable and safe IT security training.
Computers & Security, 2004

Segmentation and quantification of brain tumor.
Proceedings of the IEEE International Conference on Virtual Environments, 2004

Tele-lab IT security: an architecture for interactive lessons for security education.
Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, 2004

Routing based workflow for construction of distributed applications.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Automatic Interpretation of Natural Language for a Multimedia E-learning Tool.
Proceedings of the Web Engineering - 4th International Conference, 2004

Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining.
Proceedings of the Web Engineering - 4th International Conference, 2004

tele-TASK - Teleteaching praxistauglich für den Universitätsalltag.
Proceedings of the EMISA 2004, 2004

A Virtual Laboratory for IT Security Education.
Proceedings of the EMISA 2004, 2004

Embedding Memoization to the Semantic Tree Search for Deciding QBFs.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004

Tele-Lab IT Security: A Means to Build Security Laboratories on the Web.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Design and Implementation of a PHP-based Web Server for the Tele-Lab IT Security
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2003

Lock-Keeper Technology - A New Network Security Solution
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2003

tele-TASK - Teleteaching praxistauglich für den Universitätsalltag
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2003

Implement Role-Based Access Control with Attribute Certificates
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2003

The DualGate Lock-Keeper: A Highly Efficient, Flexible and Applicable Network Security Solution.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003

A Flexible Middleware Platform with Piped Workflow.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

A Tutoring System for IT Security.
Proceedings of the Security Education and Critical Infrastructures, 2003

Enhance Opensst Protocol's Security with Smart Card.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

WWW - Kommunikation, Internetworking, Web-Technologien
Xpert.press, Springer, ISBN: 978-3-642-18963-0, 2003

2002
tele-TASK - Teleteaching Anywhere Solution Kit
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2002

Ordered Binary Decision Diagrams in Electronic Design Automation
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2002

tele-TASK: teleteaching anywhere solution kit.
Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses, 2002

Course management in the twinkle of an eye - LCMS: a professional course management system.
Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses, 2002

A Hyperlink-Proposal Mechanism to Exemplify Cognitive Algorithms for Web-Applications.
Proceedings of the 6th Joint Conference on Information Science, 2002

VisBDD - A Web-based Visualization Framework for OBDD Algorithms.
Proceedings of the 11th IEEE/ACM International Workshop on Logic & Synthesis, 2002

Modular Partitioning and Dynamic Conjunction Scheduling in Image Computation.
Proceedings of the 11th IEEE/ACM International Workshop on Logic & Synthesis, 2002

Application for Repairing and Presenting DICOM Objects.
Proceedings of the Internet and Multimedia Systems and Applications, 2002

The Internal Workflow of the Smart-Data-Server.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

A Proposal for Trust Model: Independent Trust Intermediary Service (ITIS).
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

Mathematische Grundlagen der Informatik - Mathematisches Denken und Beweisen, Eine Einführung, 2. Auflage
Teubner, ISBN: 3-519-12949-3, 2002

2001
VisBDD - A Webbased Visualization Framework for OBDD Algorithms
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2001

Modular Partitioning for Improvement of Image Computation
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2001

IDDS: An Interactive Decentallzed Documentation System
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2001

WWW.BDD-PORTAL.ORG: An Experimentation Platform for Binary Decision Diagram Algorithms
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2001

Improving XOR-Node Placement for (+)-OBDDs
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2001

A Heuristic for (+)-OBDD Minimization
Universität Trier, Mathematik/Informatik, Forschungsbericht, 2001

How Much Middle-Tier Do You Need?
Proceedings of WebNet 2001, 2001

Managing Distributed Personal Firewalls with Smart Data Servers.
Proceedings of WebNet 2001, 2001

Suggestion for an alternative to watermarking and digital signatures.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

IDDS: an interactive decentralized documentation system.
Proceedings of the Nineteenth Annual International Conference of Computer Documentation: Communicating in the New Millennium, 2001

Electronic publishing, science portals and virtual universities - the scientific community is well-established in the World Wide Web.
Proceedings of the 7th Annual Meeting of the IuK Initiative Information and Communication of the Learned Societies in Germany, 2001

Hierarchical Image Computation with Dynamic Conjunction Scheduling.
Proceedings of the 19th International Conference on Computer Design (ICCD 2001), 2001

A new partitioning scheme for improvement of image computation.
Proceedings of ASP-DAC 2001, 2001

Data Structures for Boolean Functions.
Proceedings of the Computational Discrete Mathematics, Advanced Lectures, 2001

2000
Linear sifting of decision diagrams and its application insynthesis.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2000

Concept for Increased Security for Internet/Intranet - Based Administration of Patient Data.
Proceedings of the 8-th International Conference in Central Europe on Computer Graphics, 2000

Logging and Signing Document-Transfers on the WWW-A Trusted Third Party Gateway.
Proceedings of the WISE 2000, 2000

A Search-Engine-Topologie to Improve Document Retrieval on the Web.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Signed Preservation Of Online References.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Link Proposals with Case-Based Reasoning Techniques.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Proposal for a combination of compression and encryption.
Proceedings of the Visual Communications and Image Processing 2000, 2000

Implementation of a WebDAV-based Collaborative Distance Learning Environment.
Proceedings of the 28th annual ACM SIGUCCS conference on User services: Building the future, Richmond, Virginia, USA, October 29, 2000

Modeling of Time and Document Aging for Request Prediction - One Step Further.
Proceedings of the Applied Computing 2000, 2000

Mod-p Decision Diagrams: A Data Structure for Multiple-Valued Functions.
Proceedings of the 30th IEEE International Symposium on Multiple-Valued Logic, 2000

Web Site Design Using a Web-Based Authoring and Publishing System.
Proceedings of the International Conference on Internet Computing, 2000

Improving the Quality of Information-Flow with the Smart Data Server.
Proceedings of the International Conference on Internet Computing, 2000

Proprietary versus Interoperable User Certificates in E-Commerce via Internet.
Proceedings of the International Conference on Internet Computing, 2000

Advanced Reliability for Internet Transactions by Signed Bills.
Proceedings of the International Conference on Internet Computing, 2000

Role-based Web Authoring and Web-Site Management for Commercial Sites.
Proceedings of the International Conference on Internet Computing, 2000

A Hyperlink Focused Browse Assistant for the World Wide Web.
Proceedings of the International Conference on Internet Computing, 2000

Advanced Techniques for Analyzing Web Server Logs.
Proceedings of the International Conference on Internet Computing, 2000

Techniques for Securing Networks Against Criminal Attacks.
Proceedings of the International Conference on Internet Computing, 2000

Smart Cards - the Personal Safe in an E-Commerce World.
Proceedings of the International Conference on Internet Computing, 2000

Speeding up symbolic model checking by accelerating dynamic variable reordering.
Proceedings of the 10th ACM Great Lakes Symposium on VLSI 2000, 2000

Speeding Up Image Computation by Using RTL Information.
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000

Implementation of an Enterprise-Level Groupware System Based on J2EE Platform and WebDAV Protocol.
Proceedings of the 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 2000

Advanced Studies on Link Proposals and Knowledge Retrieval of Hypertexts with CBR.
Proceedings of the Electronic Commerce and Web Technologies, 2000

Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration.
Proceedings of the 8th European Conference on Information Systems, 2000

WWW.BDD-Portal.ORG: An Experimentation Platform for Binary Decision Diagram Algorithms.
Proceedings of the Experimental Algorithmics, 2000

Algorithms and Heuristics in VLSI Design.
Proceedings of the Experimental Algorithmics, 2000

Web-based frameworks to enable CAD RD (abstract).
Proceedings of the 37th Conference on Design Automation, 2000

A Multimedia-Editor for Making Findings in Radiology.
Proceedings of the 13th IEEE Symposium on Computer-Based Medical Systems (CBMS 2000), 2000

Internet-Orientated Medical Information System for Dicom-Data Transfer, Visualization and Revision.
Proceedings of the 13th IEEE Symposium on Computer-Based Medical Systems (CBMS 2000), 2000

What Do Hyperlink-Proposals and Request-Prediction Have in Common?
Proceedings of the Advances in Information Systems, First International Conference, 2000

Mathematische Grundlagen der Informatik - Mathematisches Denken und Beweisen, Eine Einführung
Teubner, ISBN: 3-519-02949-9, 2000

1999
Speeding Up Symbolic Model Checking by Accelerating Dynamic Variable Reordering
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1999

Algorithmic Considerations for +-OBDD Reordering.
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1999

One Step Further: Integrating Electronic Submission and the Reviewing Process
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1999

Ordered Binary Decision Diagrams and their Significance in Computer-Aided Design of VLSI Circuits.
Journal of Circuits, Systems, and Computers, 1999

Parity-OBDDs - a BDD structure for Probabilistic Verification.
Electr. Notes Theor. Comput. Sci., 1999

Editors foreword - Selected papers from STACS 1998.
Discrete Mathematics & Theoretical Computer Science, 1999

An Approach to Distributed Functionality - The Smart Data Server.
Proceedings of WebNet 99, 1999

Database based Navigation Assistant.
Proceedings of WebNet 99, 1999

The Importance of Link-Transformation and Link-Proposals for Hyperlink-Management Systems.
Proceedings of WebNet 99, 1999

Compression of Medical Images.
Proceedings of the Signal and Image Processing (SIP), 1999

Role-based access control in online authoring and publishing systems vs. document hierarchy.
Proceedings of the 17th annual international conference on Documentation, 1999

One step further: extending electronic submission into the reviewing process.
Proceedings of the 17th annual international conference on Documentation, 1999

The Smart Data Server: A New Kind of Middle-Tier.
Proceedings of the Internet, Multimedia Systems and Applications, 1999

Database based History Browse Assistant.
Proceedings of the Internet, Multimedia Systems and Applications, 1999

Increasing Efficiency of Symbolic Model Checking by Accelerating Dynamic Variable Reordering.
Proceedings of the 1999 Design, 1999

PACS for Teleradiology.
Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems (CBMS '99). 18-20 June 1999, 1999

DICOM - Image Compression.
Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems (CBMS '99). 18-20 June 1999, 1999

Flächen- und Volumenmessung lokaler Objekte in DICOM-Bildern und -Bildfolgen.
Proceedings of the Bildverarbeitung für die Medizin 1999: Algorithmen, 1999

LZW-JPEG Kompression radiologischer Bilder.
Proceedings of the Bildverarbeitung für die Medizin 1999: Algorithmen, 1999

Application Driven Variable Reordering and an Example Implementation in Reachability Analysis.
Proceedings of the 1999 Conference on Asia South Pacific Design Automation, 1999

1998
Do We Really Need Common Variable Orders for Synthesizing OBDDs?
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

Xor-OBDDs - a BDD Structure for Probabilistic Verification
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

The WWW meets EDA: Usability evaluation of OBDD-heuristics via the Internet
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

Accelerating OBDD-Minimization by Means of Structural and Semantical Properties
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

Application Driven Variable Reordering and an Example in Reachability Analysis
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

Increasing Efficiency of Symbolic Model Checking by Accelerating Dynamic Variable Reordering
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

Binary Decision Diagrams and the Multiple Variable Order Problem
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

Ordered Binary Decision Diagrams and Their Significance in Computer-Aided Design of VLSI Circuits
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1998

Institut für Telematik (Trier) - angewandte Forschung nach Fraunhofer Ideal.
Inform., Forsch. Entwickl., 1998

Ordered Binary Decision Diagrams and Their Significance in Computer-Aided Design of VLSI Circuits - a Survey
Electronic Colloquium on Computational Complexity (ECCC), 1998

Adaptive compression of image data.
Proceedings of the Broadband European Networks and Multimedia Services, 1998

Sample Method for Minimization of OBDDs.
Proceedings of the SOFSEM '98: Theory and Practice of Informatics, 1998

Electronic Colloquia: Idea and Practice.
Proceedings of the Sixteenth Annual International Conference of Computer Documentation, 1998

Interface for Navigation and Database - Querying via WWW.
Proceedings of the Knowledge Management und Kommunikationssysteme, Workflow Management, Multimedia, Knowledge Transfer, 1998

The flood-gate principle - a hybrid approach to a high security solution.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

The STACS Electronic Submission Service.
Proceedings of the Research and Advanced Technology for Digital Libraries, 1998

Adaptive compression of DICOM-image data.
Proceedings of the Electronic Imaging: Processing, 1998

Function Decomposition and Synthesis Using Linear Sifting.
Proceedings of the ASP-DAC '98, 1998

Algorithmen und Datenstrukturen im VLSI-Design: OBDD - Grundlagen und Anwendungen
Springer, ISBN: 3-540-63869-5, 1998

Algorithms and Data Structures in VLSI Design: OBDD - Foundations and Applications
Springer, ISBN: 3-540-64486-5, 1998

1997
OBDD-based Verification of Communication Protocols - Methods for the Verification of Data Link Protocols
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1997

Block-Restricted Reordering - Extended Experiments
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1997

The Electronic Colloquium on Computational Complexity (ECCC): A Digital Library in Use
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1997

Case Study: Manipulating xor-OBDDs by Means of Signatures
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1997

Function Decomposition and Synthesis Using Linear Sifting
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1997

A Unifying Theoretical Background for Some Bdd-based Data Structures.
Formal Methods in System Design, 1997

A Reducibility Concept for Problems Defined in Terms of Ordered Binary Decision Diagrams.
Proceedings of the STACS 97, 14th Annual Symposium on Theoretical Aspects of Computer Science, Lübeck, Germany, February 27, 1997

On the Influence of the State Encoding on OBDD-Representations of Finite State Machines.
Proceedings of the Mathematical Foundations of Computer Science 1997, 1997

Speeding up Variable Reordering of OBDDs.
Proceedings of the Proceedings 1997 International Conference on Computer Design: VLSI in Computers & Processors, 1997

Geordnete binäre Entscheidungsgraphen und ihre Bedeutung im rechnergestützten Entwurf hochintegrierter Schaltkreise.
Proceedings of the Informatik '97, 1997

33. Workshop "Komplexitätstheorie, Datenstrukturen und Effiziente Algorithmen".
Proceedings of the Informatik '97, 1997

The Electronic Colloquium on Computational Complexity (ECCC): A Digital Library in Use.
Proceedings of the Research and Advanced Technology for Digital Libraries. First European Conference, 1997

Linear Sifting of Decision Diagrams.
Proceedings of the 34st Conference on Design Automation, 1997

1996
Linear Sifting of Decision Diagrams
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1996

Local Encoding Transformations for Optimizing OBDD-Representations of Finite State Machines
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1996

State Encodings and OBDD-Sizes
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1996

An Adequate Reducibility Concept for Problems Defined in Terms of Ordered Binary Decision Diagrams
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1996

Global rebuilding of OBDD's avoiding memory requirement maxima.
IEEE Trans. on CAD of Integrated Circuits and Systems, 1996

Some heuristics for generating tree-like FBDD types.
IEEE Trans. on CAD of Integrated Circuits and Systems, 1996

Mod-2-OBDDs - A Data Structure that Generalizes EXOR-Sum-of-Products and Ordered Binary Decision Diagrams.
Formal Methods in System Design, 1996

The "Log Rank" Conjecture for Modular Communication Complexity
Electronic Colloquium on Computational Complexity (ECCC), 1996

An Adequate Reducibility Concept for Problems Defined in Terms of Ordered Binary Decision Diagrams
Electronic Colloquium on Computational Complexity (ECCC), 1996

The "log Rank" Conjecture for Modular Communication Complexity.
Proceedings of the STACS 96, 1996

Local Encoding Transformations for Optimizing OBDD-Representations of Finite State Machines.
Proceedings of the Formal Methods in Computer-Aided Design, First International Conference, 1996

1995
Die Entwicklung der Informatik braucht Theorie und Praxis: Ein Fallbeispiel aus dem CAD-Schaltkreisentwurf
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1995

Global Rebuilding of OBDD's - Tunneling Memory Requirement Maxima
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1995

Separating Complexity Classes Related to Bounded Alternating \omega-Branching Programs.
Mathematical Systems Theory, 1995

Lower Bounds for the Majority Communication Complexity of Various Graph Accessibility Problems
Electronic Colloquium on Computational Complexity (ECCC), 1995

Lower Bounds for the Majority Communication Complexity of Various Graph Accessibility Problems.
Proceedings of the Mathematical Foundations of Computer Science 1995, 1995

Lower Bounds for the Modular Communication Complexity of Various Graph Accessibility Problems.
Proceedings of the LATIN '95: Theoretical Informatics, 1995

Die Entwicklung der Informatik braucht Theorie und Praxis. Ein Fallbeispiel aus dem CAD-Schaltkreisentwurf.
Proceedings of the GISI 95, 1995

Efficient OBDD-Based Boolean Manipulation in CAD beyond Current Limits.
Proceedings of the 32st Conference on Design Automation, 1995

Global rebuilding of OBDDs Avoiding Memory Requirement Maxima.
Proceedings of the Computer Aided Verification, 1995

1994
A Unifying Theoretical Background for Some BDD-based Data Structures
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1994

Efficient OBDD-Based Boolean Manipulation in CAD Beyond Current Limits
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1994

On the Complexity of Constructing Optimal OBDD's
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1994

The Möbius Function, Variations Ranks, and Theta(n)-Bounds on the Modular Communication Complexity of the Undirected Graph Connectivity Problem
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1994

Some Heuristics for Generating Tree-like FBDD Types
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1994

Efficient Boolean Manipulation With OBDD's can be Extended to FBDD's.
IEEE Trans. Computers, 1994

On the Complexity of Analysis and Manipulation of Boolean Functions in Terms of Decision Graphs.
Inf. Process. Lett., 1994

Separating Oblivious Linear Length MODp-Branching Program Classes.
Elektronische Informationsverarbeitung und Kybernetik, 1994

The Möbius Function, Variations Ranks, and Theta(n)-Bounds on the Modular Communication Complexity of the Undirected Graph Connectivity Problem
Electronic Colloquium on Computational Complexity (ECCC), 1994

On the Complexity of Constructing Optimal Ordered Binary Decision Diagrams.
Proceedings of the Mathematical Foundations of Computer Science 1994, 1994

Boolean Manipulation with Free BDDs: An Application in Combinational Logic Verification.
Proceedings of the Technology and Foundations - Information Processing '94, Volume 1, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

Boolean Manipulation with Free BDD's. First Experimental Results.
Proceedings of the EDAC - The European Conference on Design Automation, ETC - European Test Conference, EUROASIC - The European Event in ASIC Design, Proceedings, February 28, 1994

1993
Mod-2-OBDD's: A Generalization of OBDD's and EXOR-Sum-of-Products
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1993

Boolean Manipulation with Free BDD's - First Experimental Results
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1993

Efficient Boolean Manipulation with OBDD's can be Extended to FBDD's
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1993

Efficient Manipulation of FBDDs by Means of a Modified OBDD-Package
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1993

Combinational Logic Verification with FBDDs
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1993

Frontiers of Feasible and Probabilistic Feasible Boolean Manipulation with Branching Programs.
Proceedings of the STACS 93, 1993

Separating Complexity Classes Related to Bounded Alternating omega-Branching Programs.
Proceedings of the Algorithms and Computation, 4th International Symposium, 1993

1992
Branching Programs Provide Lower Bounds on the Areas of Multilective Deterministic and Nondeterministic VLSI-Circuits
Inf. Comput., February, 1992

Efficient Analysis and Manipulation of OBDDs can be Extended to Read-once-only Branching Programs
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1992

Analysis and Manipulation of Boolean Functions in Terms of Decision Graphs
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1992

A Note on Möbius Functions and the Communication Complexity of the Graph-Accessability-Problem
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1992

Upper and Lower Bounds for Certain Graph-Accessability-Problems on Bounded Alternating (omega)-Branching Programs
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1992

Separating Counting Communication Complexity Classes
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1992

Separating Complexity Classes Related to Omega-Decision Trees.
Theor. Comput. Sci., 1992

Structure and Importance of Logspace-MOD Class.
Mathematical Systems Theory, 1992

Separating complexity classes related to certain input oblivious logarithmic space-bounded turing machines.
ITA, 1992

Branching Programs - An Efficient Data Structure for Computer-Aided Circuit Design.
Bulletin of the EATCS, 1992

Analysis and Manipulation of Boolean Functions in Terms of Decision Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 1992

Separating Counting Communication Complexity Classes.
Proceedings of the STACS 92, 1992

Upper and Lower Bounds for Certain Graph Accessibility Problems on Bounded Alternating omega-Branching Programs.
Proceedings of the Complexity Theory: Current Research, 1992

1991
Separating the Eraser Turing Machine Classes L_e, NL_e, co-NL_e and P_e.
Theor. Comput. Sci., 1991

Structure and Importance of Logspace-MOD-Classes.
Proceedings of the STACS 91, 1991

Upper and Lower Bounds for Certain Graph-Accessibility Problems on Bounded Alternating Omega-Branching Programs.
Proceedings of the Mathematical Foundations of Computer Science 1991, 1991

Effiziente Algorithmen - Entwurf und Analyse.
Mathematik für Ingenieure, Fachbuchverl., ISBN: 978-3-343-00732-5, 1991

1990
Polynomial Size Omega-Branching Programs and Their Computational Power
Inf. Comput., April, 1990

Logic VS. Complexity Theoretic Properties of the Graph Accessibility Problem for Directed Graphs of Bounded Degree.
Inf. Process. Lett., 1990

Entwurfserfahrungen mit dem rekursiven Layoutentwurfssystem RELACS; II.
Elektronische Informationsverarbeitung und Kybernetik, 1990

Entwurfserfahrungen mit dem rekursiven Layoutentwurfssystem RELACS; I.
Elektronische Informationsverarbeitung und Kybernetik, 1990

RELACS - a Recursive Layout Computing System.
Elektronische Informationsverarbeitung und Kybernetik, 1990

Restricted Branching Programs and Their Computational Power.
Proceedings of the Mathematical Foundations of Computer Science 1990, 1990

1989
Recursive VLSI design theory and application.
Bulletin of the EATCS, 1989

Switching Graphs and Their Complexity.
Proceedings of the Mathematical Foundations of Computer Science 1989, 1989

Separating Complexity Classes Related to Restricted Logarithmic Space-Bounded Turing Machines.
Proceedings of the Information Processing 89, Proceedings of the IFIP 11th World Computer Congress, San Francisco, USA, August 28, 1989

Separating Completely Complexity Classes Related to Polynomial Size Omega-Decision Trees.
Proceedings of the Fundamentals of Computation Theory, 1989

Omega-Branching Programs of Bounded Width.
Proceedings of the CSL '89, 1989

Seperating Complexity Classes Related to Certain Input Oblivious Logarithmic Space-Bounded Turing Machines.
Proceedings of the Proceedings: Fourth Annual Structure in Complexity Theory Conference, 1989

Modified Branching Programs and Their Computational Power
Lecture Notes in Computer Science 370, Springer, ISBN: 3-540-51340-X, 1989

1988
The Power of Nondeterminism in Polynomial-Size Bounded-Width Branching Programs.
Theor. Comput. Sci., 1988

The Power of Polynomial Size Omega-Branching Programs.
Proceedings of the STACS 88, 1988

Recursive design of communication schemes for parallel computation with RELACS.
Proceedings of the Parcella '88, 1988

Separating the Eraser Turing Machine Classes Le, NLe, co-NLe and Pe.
Proceedings of the Mathematical Foundations of Computer Science 1988, 1988

1987
The Nonuniform Complexity Classes NC, L and NL.
Elektronische Informationsverarbeitung und Kybernetik, 1987

RELACS - A Recursive Layout Computing System.
Proceedings of the Parallel Algorithms and Architectures, 1987

The Power of Nondeterminism in Polynominal-size Bounded-width Branching Programs.
Proceedings of the Fundamentals of Computation Theory, 1987

1986
Symbolic Simulation of Synchronous Parallel Systems.
Elektronische Informationsverarbeitung und Kybernetik, 1986

p-Projection Reducibility and the Complexity Classes L(nonuniform) and NL(nonuniform).
Proceedings of the Mathematical Foundations of Computer Science 1986, 1986

1985
A Functional Description of Synchronous Systems.
Elektronische Informationsverarbeitung und Kybernetik, 1985

1982
Über die durch Kodierungen induzierte Hierarchie von Umwelten und Labyrinthen.
PhD thesis, 1982

On the Structure of Endomorphism Monoids and Automorphism Groups of Group Labyrinths in the Category code.
Elektronische Informationsverarbeitung und Kybernetik, 1982

The Importance of Plane Labyrinths.
Elektronische Informationsverarbeitung und Kybernetik, 1982

Embedding of the Poset of Turing Degrees in the Poset [µ, <=].
Elektronische Informationsverarbeitung und Kybernetik, 1982

Environment and Automata II.
Elektronische Informationsverarbeitung und Kybernetik, 1982

Environments and Automata I.
Elektronische Informationsverarbeitung und Kybernetik, 1982

1981
About the by Codings of Environments Induced Posets [az, <=] and [Lz, <=].
Proceedings of the Fundamentals of Computation Theory, 1981


  Loading...