004 Datenverarbeitung; Informatik
Refine
Has Fulltext
- yes (257)
Year of publication
Document Type
- Journal article (123)
- Doctoral Thesis (68)
- Working Paper (37)
- Preprint (19)
- Conference Proceeding (8)
- Report (2)
Language
- English (257) (remove)
Keywords
- virtual reality (16)
- Datennetz (14)
- Leistungsbewertung (13)
- Quran (8)
- Robotik (8)
- Koran (7)
- Text Mining (7)
- Mobiler Roboter (6)
- Autonomer Roboter (5)
- Komplexitätstheorie (5)
- Maschinelles Lernen (5)
- Netzwerk (5)
- Optimierung (5)
- P4 (5)
- Theoretische Informatik (5)
- Visualisierung (5)
- artificial intelligence (5)
- machine learning (5)
- Overlay-Netz (4)
- Routing (4)
- SDN (4)
- Verteiltes System (4)
- XML (4)
- augmented reality (4)
- deep learning (4)
- human-computer interaction (4)
- Algorithmus (3)
- Approximationsalgorithmus (3)
- Bayesian classifier (3)
- Computer Vision (3)
- Deep learning (3)
- Dienstgüte (3)
- Drahtloses Sensorsystem (3)
- Graph (3)
- Graphenzeichnen (3)
- IoT (3)
- Komplexität (3)
- Machine Learning (3)
- Mensch-Maschine-Schnittstelle (3)
- Netzwerkmanagement (3)
- Optimization (3)
- Peer-to-Peer-Netz (3)
- Performance Evaluation (3)
- QoE (3)
- Quadrocopter (3)
- Quality of Experience (3)
- Rechnernetz (3)
- Ressourcenmanagement (3)
- Robotics (3)
- Softwarearchitektur (3)
- Textvergleich (3)
- Visualization (3)
- Wissensmanagement (3)
- approximation algorithm (3)
- crowdsensing (3)
- database (3)
- graph drawing (3)
- immersion (3)
- mHealth (3)
- neural networks (3)
- resistance (3)
- simulation (3)
- 5G (2)
- Algorithmische Geometrie (2)
- Ausfallsicheres System (2)
- Ausfallsicherheit (2)
- Base text (2)
- Benutzerschnittstelle (2)
- CSS (2)
- Cascading Style Sheets (2)
- Content Management (2)
- Crowdsourcing (2)
- Data Mining (2)
- Dot-Depth Problem (2)
- Drahtloses lokales Netz (2)
- Effizienter Algorithmus (2)
- Entscheidbarkeit (2)
- Fernwartung (2)
- Future Internet (2)
- Gothenburg model (2)
- Human-Robot-Interaction (2)
- IEEE 802.11 (2)
- Internet of Things (2)
- Kleinsatellit (2)
- Knowledge Management (2)
- Kreuzung (2)
- Localization (2)
- Lokalisation (2)
- MP-DCCP (2)
- Maschinelles Sehen (2)
- Mensch-Maschine-System (2)
- Mensch-Roboter-Interaktion (2)
- Meta-model (2)
- Mixed Reality (2)
- Modellierung (2)
- NP-hardness (2)
- PROLOG <Programmiersprache> (2)
- Punktwolke (2)
- Quadrotor (2)
- Resilience (2)
- Resource Management (2)
- Simulation (2)
- Situation Awareness (2)
- Software Defined Networking (2)
- Software Engineering (2)
- Teleoperation (2)
- Text mining (2)
- Textual alterations weighting system (2)
- Textual document collation (2)
- Theoretical Computer Science (2)
- User Interface (2)
- Verbotsmuster (2)
- Wissensrepräsentation (2)
- Wrapper <Programmierung> (2)
- XR (2)
- automation (2)
- connected mobility applications (2)
- cosmology (2)
- crossing minimization (2)
- decidability (2)
- design (2)
- dot-depth problem (2)
- education (2)
- educational tool (2)
- endliche Automaten (2)
- endoscopy (2)
- engineering (2)
- evolution (2)
- exposure (2)
- finite automata (2)
- fog computing (2)
- forbidden patterns (2)
- framework (2)
- fully convolutional neural networks (2)
- games (2)
- gastroenterology (2)
- genetics (2)
- historical document analysis (2)
- immersive technologies (2)
- knowledge representation (2)
- measurements (2)
- metabolic modeling (2)
- mobile networks (2)
- multipath (2)
- multipath scheduling (2)
- natural variation (2)
- navigation (2)
- network calculus (2)
- networks (2)
- ontology (2)
- perception (2)
- prediction (2)
- regular languages (2)
- reguläre Sprachen (2)
- satellite communication (2)
- scalability (2)
- segmentation (2)
- self-aware computing (2)
- sensor (2)
- smart speaker (2)
- spatial presence (2)
- tinnitus (2)
- virtual agent (2)
- virtual environments (2)
- 26S RDNA Data (1)
- 3D Laser Scanning (1)
- 3D Pointcloud (1)
- 3D Punktwolke (1)
- 3D Reconstruction (1)
- 3D Sensor (1)
- 3D Vision (1)
- 3D collation (1)
- 3D fluoroscopy (1)
- 3D point cloud (1)
- 3D thermal mapping (1)
- 3D viewer (1)
- 3D-Rekonstruktion (1)
- 3D-reconstruction methods (1)
- 3DTK toolkit (1)
- 4D-GIS (1)
- 4G Networks (1)
- 5G core network (1)
- 5G-ATSSS (1)
- 5GC (1)
- 6DOF Pose Estimation (1)
- 6G (1)
- ACKR4 (1)
- AI (1)
- AKT (1)
- ATSSSS (1)
- AVA (1)
- Abhängigskeitsgraph (1)
- Accessibility (1)
- Add-on-Miss (1)
- Admission Control (1)
- Analysis (1)
- Anwendungsfall (1)
- Approximation (1)
- Arctic (1)
- Arterie (1)
- Artery (1)
- Automat <Automatentheorie> (1)
- Automata Theory (1)
- Automatentheorie (1)
- Autonomous Robot (1)
- Autonomous UAV (1)
- Autonomous multi-vehicle systems (1)
- Autorotation (1)
- BPM (1)
- BPMN (1)
- Backbone-Netz (1)
- Background Knowledge (1)
- Balloon (1)
- Banks Islands (1)
- Barcodes (1)
- Bayes-Klassifikator (1)
- Benutzererlebnis (1)
- Benutzerforschung (1)
- Benutzerinteraktion (1)
- Berechenbarkeit (1)
- Berechnungskomplexität (1)
- Betriebssystem (1)
- Bewegungskompensation (1)
- Bewegungskoordination (1)
- Bildverarbeitung (1)
- Biological Networks (1)
- Biology (1)
- BitTorrent (1)
- Bodenstation (1)
- Boolean Grammar (1)
- Boolean equivalence (1)
- Boolean function (1)
- Boolean functions (1)
- Boolean hierarchy (1)
- Boolean isomorphism (1)
- Boolean tree (1)
- Boolesche Funktionen (1)
- Boolesche Grammatik (1)
- Boolesche Hierarchie (1)
- CASE (1)
- CD4+T cells (1)
- CD8+T cells (1)
- CD95 (1)
- CETCH cycle (1)
- CHI Conference (1)
- CLIP (1)
- CO2-sequestration (1)
- COVID-19 (1)
- Caenorhabditis elegans (1)
- Call Graph (1)
- Causes of revelation (1)
- Chapters arrangement (1)
- Charged aerosol detector (CAD) (1)
- Chord (1)
- Chronology of revelation (1)
- Clones (1)
- Cloud Gaming (1)
- Clustering (1)
- Colonial volvocales chlorophyta (1)
- Communication Networks (1)
- Complex Systems (1)
- Complexity Theory (1)
- Compression (1)
- Computational Geometry (1)
- Computational complexity (1)
- Computer software (1)
- Computersimulation (1)
- Computerspiel (1)
- Computerunterstütztes Lernen (1)
- Containerization (1)
- Content Distribution (1)
- Crowdsensing (1)
- CubeSat (1)
- DHT (1)
- DNA (1)
- DNA storage (1)
- Daedalus-Projekt (1)
- Dasycladales chlorophyta (1)
- Datenkommunikationsnetz (1)
- Deep Georeferencing (1)
- Deep Learning (1)
- Dependency Graph (1)
- Design (1)
- Design and Development (1)
- Dezentrale Regelung (1)
- Dichotomy (1)
- Digital Elevation Model (1)
- Dijkstra’s algorithm (1)
- Diskrete Simulation (1)
- Distributed Space Systems (1)
- Domänenspezifische Sprache (1)
- Dot-Depth-Hierarchie (1)
- Drahtloses vermaschtes Netz (1)
- Dreidimensionale Rekonstruktion (1)
- Dreieck (1)
- Dynamic Memory Management (1)
- Dynamische Speicherverwaltung (1)
- E8 symmetry (1)
- EEG (1)
- EEG frequency band analysis (1)
- EEG preprocessing (1)
- EEG processing (1)
- EPM (1)
- Echtzeitsystem (1)
- Echzeit (1)
- Edge-MEC-Cloud (1)
- Edge-based Intelligence (1)
- Eingebettetes System (1)
- Elasticity tensor (1)
- Elastizitätstensor (1)
- Embedded Systems (1)
- Emotion inference (1)
- Emotionserkennung (1)
- Emotionsinterpretation (1)
- Endpoint Mobility (1)
- Energieeffizienz (1)
- Energy efficiency (1)
- Erfüllbarkeitsproblem (1)
- Erweiterte Realität (1)
- Euclidean plane (1)
- Euklidische Ebene (1)
- Expert System (1)
- Expertensystem (1)
- FIFO caching strategies (1)
- FLIMbee (1)
- Fairness (1)
- Fatty acids (1)
- Feature Based Registration (1)
- Fehlertoleranz (1)
- Fernsteuerung (1)
- Flugkörper (1)
- Forces (1)
- Formale Sprache (1)
- Formation (1)
- Formation Flight (1)
- Formationsbewegung (1)
- Formmessung (1)
- Fragmentation (1)
- Fragmentierung (1)
- Frames (1)
- Funkressourcenverwaltung (1)
- GNSS/INS integrated navigation (1)
- Gastroenterologische Endoskopie (1)
- Gefühl (1)
- Generalisierung <Kartografie> (1)
- Generation Problem (1)
- Generierungsproblem (1)
- Genetic Optimization (1)
- Genetische Optimierung (1)
- Georeferenzierung (1)
- Gothenburg Modell (1)
- Gothenburg model of collation process (1)
- Gradient boosted trees (GBT) (1)
- Graphentheorie (1)
- Ground Station Networks (1)
- H.264 SVC (1)
- H.264/SVC (1)
- HGPS (1)
- HHblits (1)
- HMD (Head-Mounted Display) (1)
- HSPA (1)
- HTML (1)
- HTTP adaptive video streaming (1)
- Halbordnungen (1)
- Hardware (1)
- Herzkatheter (1)
- Herzkathetereingriff (1)
- High-performance liquid chromatography (HPLC) (1)
- Hintergrundwissen (1)
- Historical Maps (1)
- Historische Karte (1)
- Historische Landkarten (1)
- Hittitology (1)
- Human-centered computing / Access (1)
- Human-centered computing / Human computer interaction (HCI) / Interaction paradigms / Mixed / augmented reality (1)
- Human-centered computing / Human computer interaction (HCI) / Interaction paradigms / Virtual reality (1)
- Human-centered computing / Human computer interaction (HCI) / Interactiondevices (1)
- Human-centered computing / Human computerinteraction (HCI) / Interaction techniques (1)
- Hurwitz theorem (1)
- I-tasser (1)
- ICEP (1)
- IEEE 802.11e (1)
- IEEE 802.15.4 (1)
- IGFBP2 (1)
- III secretion (1)
- INS/LIDAR integrated navigation (1)
- IP (1)
- IT security (1)
- Image Aesthetic Assessment (1)
- Image Registration (1)
- ImageJ (1)
- Implementierung <Informatik> (1)
- Industrial internet (1)
- Industrie 4.0 (1)
- Information Extraction (1)
- Information Visualization (1)
- Instrument Control Toolbox (1)
- Intelligent Virtual Agents (1)
- InteractionSuitcase (1)
- Interaktion (1)
- Internet (1)
- Internet Protokoll (1)
- IoT-driven processes (1)
- IronChip Evaluation Package (1)
- Isomorphie (1)
- Itinerare (1)
- Itineraries (1)
- JCAS (1)
- JSF (1)
- Jacobian matrix (1)
- Java 3D (1)
- Java <Programmiersprache> (1)
- Java Frameworks (1)
- Java Message Service (1)
- Kademlia (1)
- Kanalzugriff (1)
- Karte (1)
- Kathará (1)
- Kerneldensity estimation (1)
- Klassendiagramm (1)
- Klassifikation (1)
- Klima (1)
- Knowledge Discovery (1)
- Knowledge Management System (1)
- Knowledge Modeling (1)
- Knowledge representation (1)
- Knowledge-based System (1)
- Knowledge-based Systems Engineering (1)
- Kombinatorik (1)
- Kommunikation (1)
- Kommunikationsnetze (1)
- Komplexes System (1)
- Komplexitätsklasse (1)
- Komplexitätsklasse NP (1)
- Konvexe Zeichnungen (1)
- Kooperierende mobile Roboter (1)
- Kreuzungsminimierung (1)
- Kryoelektronenmikroskopie (1)
- Kurve (1)
- Künstliche Intelligenz (1)
- LC-MS/MS (1)
- LFU (1)
- LRU (1)
- Land Cover Classification (1)
- Land plants (1)
- Landkartenbeschriftung (1)
- Landnutzungskartierung (1)
- Laser scanning (1)
- Lava (1)
- Lawhul-Mahfuz (1)
- Lee Smolin (1)
- Lidar (1)
- Lifetime spectroscopy (1)
- Lightning (1)
- Link rate adaptation (1)
- Linkratenanpassung (1)
- Linux (1)
- LoRa (1)
- LoRaWAN (1)
- LoRaWan (1)
- Logic Programming (1)
- Logische Programmierung (1)
- Lunar Caves (1)
- Lunar Exploration (1)
- MAC (1)
- MDR (1)
- MTC (1)
- MVC <Software> (1)
- Mackenzie-River-Delta (1)
- Mapping (1)
- Mars (1)
- Mashup (1)
- Mashup <Internet> (1)
- Mathematische Modellierung (1)
- Mathematisches Modell (1)
- Measurement (1)
- Medical Image Analysis (1)
- Medium <Physik> (1)
- Medizin (1)
- Mehrfahrzeugsysteme (1)
- Mehrkriterielle Optimierung (1)
- Mehrpfadübertragung (1)
- Mehrschichtnetze (1)
- Mehrschichtsystem (1)
- Mensch-Maschine-Kommunikation (1)
- Mesh Networks (1)
- Mesh Netze (1)
- Metaverse (1)
- Methode (1)
- Microarray (1)
- Middleware (1)
- Miniaturisierung (1)
- Minimally invasive vascular intervention (1)
- Mobiles Internet (1)
- Mobilfunk (1)
- Modell (1)
- Modellierungstechniken (1)
- Modularität (1)
- Molecular systematics (1)
- Mond (1)
- Multi-Layer (1)
- Multi-Network Service (1)
- Multi-Netzwerk Dienste (1)
- Multi-Paradigm Programming (1)
- Multi-Paradigm Programming Framework (1)
- Multipath Transmission (1)
- Mustererkennung (1)
- Mycoplasma (1)
- Mycoplasma pneumoniae (1)
- NP (1)
- NP-Vollständigkeit (1)
- NP-complete sets (1)
- NP-hartes Problem (1)
- NP-schweres Problem (1)
- Naïve Bayesian (1)
- Network Emulator (1)
- Network Experiments (1)
- Network Management (1)
- Network Measurements (1)
- Network Virtualization (1)
- Networks (1)
- Netzplantechnik (1)
- Netzplanung (1)
- Netzvirtualisierung (1)
- Netzwerkplanung (1)
- Netzwerkvirtualisierung (1)
- Neuromuscular junctions (1)
- Neuronales Netz (1)
- Newton Methods (1)
- Newton-Verfahren (1)
- Next Generation Networks (1)
- Nichtholonome Fahrzeuge (1)
- Nichtlineare Regelung (1)
- Nuclear RDNA (1)
- Object Detection (1)
- Object-Oriented Programming (1)
- Objektorientierte Programmierung (1)
- Operator (1)
- Optical Flow (1)
- Optimale Kontrolle (1)
- Optimierungsproblem (1)
- Optimization on Lie Groups (1)
- Overlapping (1)
- Overlay (1)
- Overlay Netzwerke (1)
- Overlay networks (1)
- Overlays (1)
- P4-INT (1)
- Panorama Images (1)
- Partition <Mengenlehre> (1)
- Partitionen (1)
- Path Computation Element (1)
- Pattern Recognition (1)
- Peer-to-Peer (1)
- Performance Analysis (1)
- Performance Enhancing Proxies (1)
- Performance Management (1)
- Performance Modeling (1)
- Pfadberechnungselement (1)
- Picosatellite (1)
- Place of revelation (1)
- Planare Graphen (1)
- Planung (1)
- Poisson surface reconstruction (1)
- PolSAR (1)
- Polyeder (1)
- Polypektomie (1)
- Positron annihilation spectroscopy (1)
- Post's Classes (1)
- Postsche Klassen (1)
- Prediction (1)
- Processing Model (1)
- Processing model (1)
- Profile distances (1)
- Programmierbare logische Anordnung (1)
- Publish-Subscribe-System (1)
- QUIC (1)
- QoS (1)
- Quality of Experience (QoE) (1)
- Quality of Experience QoE (1)
- Quality of Service (1)
- Quality of Service (QoS) (1)
- Quality-of-Experience (1)
- Quality-of-Service (1)
- Quality-of-Service (QoS) (1)
- Quantitative structure-property relationship modeling (QSPR) (1)
- Quantor (1)
- RBCL Gene-sequences (1)
- RGB-D (1)
- RNA sequencing (1)
- RRM (1)
- Radarfernerkundung (1)
- Raumdaten (1)
- Real-Time Operating Systems (1)
- Real-time (1)
- Reconstruction of original text (1)
- Refactoring (1)
- Reference Architecture (1)
- Regelung (1)
- Registration (1)
- Registrierung (1)
- Registrierung <Bildverarbeitung> (1)
- Reguläre Sprache (1)
- Relief <Geografie> (1)
- Rendezvous (1)
- Reproducibility (1)
- Resource and Performance Management (1)
- Ressourcen Management (1)
- Ressourcenallokation (1)
- Rettungsroboter (1)
- SARS-CoV-2 (1)
- SBA (1)
- SDN/NVF (1)
- SMLM (1)
- SNP (1)
- Satellit (1)
- Scatter Plot (1)
- Scheduling (1)
- Search-and-Rescue (1)
- Secondary structure (1)
- Selbstkalibrierung (1)
- Self-calibration (1)
- Semantic Web (1)
- Semantics (1)
- Semantik (1)
- Sensing-aaS (1)
- Sensor (1)
- Septins (1)
- Service Mobility (1)
- Sichtbarkeit (1)
- Similarity Measure (1)
- Simulator (1)
- Situationsbewusstsein (1)
- Skype (1)
- Small Satellites (1)
- Smart User Interaction (1)
- Social Web (1)
- Software (1)
- Software Performance Engineering (1)
- Software Performance Modeling (1)
- Software architecture (1)
- Software design (1)
- Software product lines (1)
- Source Code Visualization (1)
- Soziale Software (1)
- Spherical Robot (1)
- Spring (1)
- Stages of Prophet Mohammad’s messengership (1)
- Standardisierung (1)
- Standortproblem (1)
- Statistical classifiers (1)
- Statistics (1)
- Statistische Mechanik (1)
- Statistische Physik (1)
- Sternfreie Sprache (1)
- Steuerung (1)
- Stiffness (1)
- Stochastic Algorithms (1)
- Stochastische Optimierung (1)
- Strahlentherapie (1)
- Straubing-Th´erien-Hierarchie (1)
- Structure-from-Motion (1)
- Strukturelle Komplexität (1)
- Struts (1)
- Subgroup Mining (1)
- Subgruppenentdeckung (1)
- Substruktur (1)
- Support Vector Machine (1)
- Synapses (1)
- Synaptic vesicles (1)
- Synthetic Aperture Radar (1)
- TSN (1)
- TTL (1)
- TTL validation of data consistency (1)
- Telematik (1)
- Terramechanics (1)
- Testbed (1)
- Text categorization (1)
- Text segmentation (1)
- Theoretical computer science (1)
- Thermografie (1)
- Time resolved measurements (1)
- Tomografie (1)
- Topografie (1)
- Torque (1)
- Trainingssystem (1)
- Travelling-salesman-Problem (1)
- Tumor motion (1)
- Tumorbewegung (1)
- U-Bahnlinienplan (1)
- UI and Interaction Design (1)
- UML Klassendiagramm (1)
- UML class diagram (1)
- UMTS (1)
- URL (1)
- URLLC (1)
- Underwater Mapping (1)
- Underwater Scanning (1)
- Unmanned Aerial Vehicle (1)
- Unstetige Regelung (1)
- Usability (1)
- Use case (1)
- User Behavior (1)
- User Participation (1)
- V-antigen (1)
- VNF (1)
- VPN (1)
- Variability (1)
- Venus (1)
- Veranstaltung (1)
- Verbotenes Muster (1)
- Verbände (1)
- Verkehrslenkung (1)
- Verteilung von Inhalten (1)
- Vesicles (1)
- Video Quality Monitoring (1)
- Video Streaming (1)
- Videoübertragung (1)
- Virtualisierung (1)
- Virtuelles Netzwerk (1)
- Visibility (1)
- Visual Text Mining (1)
- Visual Tracking (1)
- Visualized Kathará (1)
- Voice-over-IP (VoIP) (1)
- Vorhersage (1)
- WH2 domain (1)
- WLAN (1)
- WNT (1)
- Warteschlangentheorie (1)
- Web service (1)
- WebGL (1)
- Webservice Composition (1)
- WhatsApp (1)
- Wheel (1)
- Winkel (1)
- Wire relaxation (1)
- Wireless LAN (1)
- Wireless Sensor/Actuator Systems (1)
- Wissensbanksystem (1)
- Wissensbasiertes System (1)
- Wissenschaftliche Beobachtung (1)
- Wissensendeckung (1)
- Worterweiterungen (1)
- Wrapper (1)
- Wrappers (1)
- XML model (1)
- XR-artificial intelligence combination (1)
- XR-artificial intelligence continuum (1)
- Yersinia enterocolitica (1)
- Yolk protein (1)
- YouTube (1)
- Zebrafish (1)
- Zeichnen von Graphen (1)
- Zeitdiskretes System (1)
- Zugangskontrolle (1)
- Zählprobleme (1)
- abgeschlossene Klassen (1)
- acrophobia (1)
- actin nucleation (1)
- adaptation (1)
- adaptation models (1)
- administrative boundary (1)
- admission control (1)
- adult learning (1)
- advertising effectiveness (1)
- aerodynamics (1)
- aerospace (1)
- agent-based models (1)
- agents (1)
- agile Prozesse (1)
- agile processes (1)
- aging (1)
- alignment (1)
- anamnesis tool (1)
- aneurysm (1)
- angular schematization (1)
- annotation (1)
- anomaly detection (1)
- anomaly prediction (1)
- ant-colony optimization (1)
- anthropomorphism (1)
- anxiety (1)
- apixaban (1)
- application design (1)
- approximation algorithms (1)
- arabidopsis thaliana (1)
- arabidpsis thaliana (1)
- architectural design (1)
- arithmetic calculations (1)
- artificial intelligence education (1)
- artificial intelligence literacy (1)
- augmentation (1)
- automatic Layout (1)
- automatisches Layout (1)
- autonomic orchestration (1)
- autonomous (1)
- autonomous UAV (1)
- autorotation (1)
- availability (1)
- avatar embodiment (1)
- avatars (1)
- background knowledge (1)
- baseline detection (1)
- behavior (1)
- behavior change (1)
- behavior perception (1)
- bibliometric analysis (1)
- binary decision diagram (1)
- binary tanglegram (1)
- biofuel (1)
- biohybrid systems (1)
- bioinformatics (1)
- biological development (1)
- biomanufacturing (1)
- biosignals (1)
- bit (1)
- boundary labeling (1)
- brain (1)
- building (1)
- caenorhabditis elegans (1)
- camera orientation (1)
- car-like robots (1)
- carbon (1)
- carboxylation (1)
- cardiac magnetic resonance (1)
- caspase-3 (1)
- cell membranes (1)
- cerebral ischemia (1)
- certifying algorithm (1)
- chain cover (1)
- channel management (1)
- cisplatin (1)
- classification (1)
- climate (1)
- cloud-native (1)
- co-authorships (1)
- co-inventorships (1)
- cognitive impairment (1)
- coherence (1)
- collaboration (1)
- collision (1)
- colony-stimulating factor (1)
- combination therapy (1)
- communication models (1)
- communication networks (1)
- community detection (1)
- comparative sequence analysis (1)
- competitive location (1)
- complex traits (1)
- complexity (1)
- compressed sensing (1)
- computational (1)
- computational complexity (1)
- computer performance evaluation (1)
- computergestützte Softwaretechnik (1)
- computers as social actors (1)
- condition prediction (1)
- congruence (1)
- connector (1)
- constrained forest (1)
- contact representation (1)
- container virtualization (1)
- content-based image retrieval (1)
- continuous-time SLAM (1)
- conversational agent (1)
- conversational agents (1)
- convex bipartite graph (1)
- corticotropin-releasing hormone (1)
- cost-sensitive learning (1)
- counting problems (1)
- crosstalk (1)
- crowdsourced QoE measurements (1)
- crowdsourced measurements (1)
- crowdsourced network measurements (1)
- cryo-EM (1)
- cryo-ET (1)
- crystal growth (1)
- crystallization (1)
- cultural and media studies (1)
- culturally aware (1)
- cuneiform (1)
- curves (1)
- cyber-physical systems (1)
- cybersickness (1)
- cytokine profiling (1)
- d3web.Train (1)
- dSTORM (1)
- data plane programming (1)
- data stream processing (1)
- data structure (1)
- data warehouse (1)
- dataplane programming (1)
- decision support system (1)
- decision-making (1)
- decoding error rate (1)
- deep metric learning (1)
- definite clause grammars (1)
- deformation-based method (1)
- delay QoS exponent (1)
- delay bound violation probability (1)
- delay constrained (1)
- dementia (1)
- descent (1)
- design cycle (1)
- detection time simulation (1)
- diagnostic accuracy (1)
- dial a ride (1)
- differentiation (1)
- digital twin (1)
- dimensions of proximity (1)
- direct oral anticoagulants (1)
- direct thrombin inhibitor (1)
- discrete-time analysis (1)
- disease (1)
- disjoint multi-paths (1)
- disruption project (1)
- distance-based classifier (1)
- distributed control (1)
- docker (1)
- drug (1)
- drug-minded protein (1)
- dynamic flow migration (1)
- dynamic programming (1)
- eHealth (1)
- eco-metabolomics (1)
- ecological momentary assessment (1)
- edge labeled graphs (1)
- effective Bandwidth (1)
- efficient algorithm (1)
- electroencephalography (1)
- electrolytes (1)
- electronic health records (1)
- elementary mode analysis (1)
- elementary modes (1)
- elevated plus-maze (1)
- embedding techniques (1)
- emergent time (1)
- emotions (1)
- empathy (1)
- emulation (1)
- encryption (1)
- endurance (1)
- energy efficiency (1)
- environmental sound (1)
- enzyme (1)
- event detection (1)
- event-related potentials-ERP (1)
- exercise intensity (1)
- experience (1)
- experimental evaluation (1)
- expertise framing (Min5-Max 8) (1)
- expression (1)
- expression signature (1)
- extended reality (1)
- extended reality (XR) (1)
- factor XA inhibitor (1)
- failure prediction (1)
- fast reroute (1)
- fault detection (1)
- feature matching (1)
- federated learning (1)
- few-shot learning (1)
- fixed-parameter tractability (1)
- flies (1)
- fluoroscopy (1)
- food quality (1)
- force dynamics (1)
- foreign language learning and teaching (1)
- formation driving (1)
- formation flight (1)
- fruit temperature (1)
- functional analysis (1)
- future Internet architecture (1)
- future energy grid exploration (1)
- game mechanics (1)
- gamification (1)
- gamma (1)
- generative systems (1)
- genes (1)
- genetic algorithm (1)
- genetic regulatory network (1)
- geospatial data (1)
- global IPX network (1)
- graph (1)
- graph algorithm (1)
- graph decomposition (1)
- graphs (1)
- green systems biology (1)
- group-based communication (1)
- handwriting (1)
- haptic data (1)
- hardness (1)
- hardware-in-the-loop simulation (1)
- hardware-in-the-loop streaming system (1)
- hepatotoxicity (1)
- heuristics (1)
- hierarchy (1)
- histidine kinase (1)
- historical images (1)
- hit ratio analysis and simulation (1)
- homology modeling (1)
- hospital data (1)
- human body weight (1)
- human computer interaction (HCI) (1)
- human-artificial intelligence interaction (1)
- human-artificial intelligence interface (1)
- human-centered design (1)
- human-centered, human-robot (1)
- humantechnology interaction (1)
- human–computer interaction (1)
- hybrid access (1)
- hypotonic (1)
- hypotonic solutions (1)
- illusion of self-motion (1)
- image classification (1)
- image processing (1)
- image schemas (1)
- imbalanced regression (1)
- immersive advertising (1)
- immersive classroom (1)
- immersive classroom management (1)
- immersive learning technologies (1)
- immunity (1)
- implicit association test (1)
- in situ analysis (1)
- independent crossing (1)
- induced matching (1)
- inflation (1)
- informal education (1)
- information extraction (1)
- information systems and information technology (1)
- inhibitor (1)
- intelligent transportation systems (1)
- intelligent vehicles (1)
- intelligent virtual agents (1)
- intelligent voice assistant (1)
- intelligente Applikationen (1)
- intention-behavior-gap (1)
- inter-coder reliability (1)
- interaction (1)
- interactive authoring system (1)
- interactive collation of textual variants (1)
- intercultural learning and teaching (1)
- interdisciplinary education (1)
- intermediate host (1)
- internal transcribed spacer 2 (1)
- internet protocol (1)
- internet traffic (1)
- interpolation (1)
- intervention design (1)
- intervention evaluation (1)
- intraoperative imaging (1)
- invasive vascular interventions (1)
- iowa gambling task (1)
- isotonic (1)
- key-insight extraction (1)
- kinect (1)
- labeling (1)
- land-cover area (1)
- landing (1)
- language-image pre-training (1)
- latency (1)
- lattices (1)
- layout recognition (1)
- learning environments (1)
- least cost (1)
- life-span regulation (1)
- lifetime spectroscopy (1)
- light-gated proteins (1)
- load balancing (1)
- local energy system (1)
- locomotion (1)
- logic programming (1)
- logistics (1)
- long-term analysis (1)
- lymphotoxicity (1)
- malaria (1)
- map projections (1)
- mapping (1)
- markers (1)
- mathematical model (1)
- measurement (1)
- media analysis (1)
- media equation (1)
- medical analytics (1)
- medical device regulation (1)
- medical device software (1)
- medical records (1)
- medieval manuscripts (1)
- meditation (1)
- membrane protein (1)
- membrane proteins (1)
- memory immune responses (1)
- metabolic flux (1)
- metabolism (1)
- metabolomics (1)
- metastasis (1)
- methylene blue (1)
- metro map (1)
- mice (1)
- microbes (1)
- mindfulness (1)
- misconceptions (1)
- mixed reality (1)
- mixed-cultural (1)
- mixed-cultural settings (1)
- mobile application (1)
- mobile instant messaging (1)
- mobile messaging application (1)
- mobile robots (1)
- mobile streaming (1)
- model following (1)
- model output statistics (1)
- model predictive control (1)
- model-based diagnosis (1)
- modeling techniques (1)
- modules (1)
- molecular systematics (1)
- monotone drawing (1)
- morphing (1)
- mouse (1)
- multi-vehicle formations (1)
- multi-vehicle rendezvous (1)
- multimodal fusion (1)
- multimodal interface (1)
- multimodal learning (1)
- multipath communication (1)
- multipath packet scheduling (1)
- multiple myeloma (1)
- multirotors (1)
- multiscale encoder (1)
- mutation (1)
- mycoplasma (1)
- nano-satellite (1)
- nanocellulose (1)
- natural interfaces (1)
- natural language processing (1)
- natural language processing · · · (1)
- natural user interfaces (1)
- network (1)
- network design (1)
- network planning (1)
- network softwarization (1)
- network upgrade (1)
- network virtualization (1)
- networked robotics (1)
- networking (1)
- neume notation (1)
- neural architecture (1)
- noise measurement (1)
- non-native accent (1)
- non-terrestrial networks (1)
- nonholonomic vehicles (1)
- nonhuman-primates (1)
- nonverbal behavior (1)
- object detection (1)
- octree (1)
- omics (1)
- optical music recognition (1)
- optimization (1)
- orchestration (1)
- organogenesis (1)
- origin (1)
- overprovisioning (1)
- oxidative stress (1)
- packet reception method (1)
- painful (1)
- pangolin (1)
- particle picking (1)
- partitions (1)
- passage of time (1)
- passive haptic feedback (1)
- path computation (1)
- pathway (1)
- performance (1)
- performance analysis (1)
- performance evaluation (1)
- performance liquid chromatography (1)
- performance monitoring (1)
- performance prediction (1)
- permeability (1)
- pestis infection (1)
- phase space (1)
- phase transition (1)
- photorespiration (1)
- phylogenetic tree (1)
- phylogeny (1)
- place-illusion (1)
- plain orchestrating service (1)
- plausibility (1)
- plausibility-illusion (1)
- pneumoniae (1)
- pneumonic plague (1)
- point cloud (1)
- point cloud compression (1)
- point-to-plane measure (1)
- point-to-point measure (1)
- pollution (1)
- pos (1)
- posets (1)
- positioning (1)
- precision horticulture (1)
- precision training (1)
- presence (1)
- private chat groups (1)
- procedural content generation (1)
- procedural fusion methods (1)
- processing pipeline (1)
- progeria (1)
- promoter (1)
- prompt engineering (1)
- protein (1)
- protein chip (1)
- protein-interaction networks (1)
- pseudomas-syringae (1)
- psychomotor training (1)
- psychophyisology (1)
- public speaking (1)
- pulse simulation (1)
- quadcopter (1)
- quadcopters (1)
- quality assurance (1)
- quality evaluation (1)
- quality of experience (1)
- quality of experience prediction (1)
- quantification (1)
- qubit (1)
- radio resource management (1)
- radiology (1)
- ransomware (1)
- real world evidence (1)
- real-world application (1)
- realism (1)
- receding horizon control (1)
- receptor (1)
- recombinant protein rVE (1)
- recombination (1)
- recommender system (1)
- reconfiguration (1)
- reload cost (1)
- remote control (1)
- research methods (1)
- resilience (1)
- response regulator (1)
- ribosomal RNA (1)
- rich vehicle routing problem (1)
- richtersius coronifer (1)
- right angle crossing (1)
- robotics (1)
- robustness (1)
- rotorcraft (1)
- rotors (1)
- routing (1)
- sample weighting (1)
- satisfiability problems (1)
- scalability evaluation (1)
- scalable quadcopter (1)
- scheduling (1)
- science, technology and society (1)
- secondary structure (1)
- secure group communication (1)
- self-adaptive (1)
- self-adaptive systems (1)
- self-assembly (1)
- self-aware computing systems (1)
- self-managing systems (1)
- semantic fusion (1)
- semantic understanding (1)
- semantic web (1)
- semantical aesthetic (1)
- semantische Ästhetik (1)
- sensitivity analysis (1)
- sensor devices (1)
- sensor fusion (1)
- sensor networks (1)
- sentinel (1)
- sequence alignment (1)
- serious games (1)
- serum (1)
- service based software architecture (1)
- service brokerage (1)
- service-curve estimation (1)
- sesnsors (1)
- set (1)
- shootin-1 (1)
- short block-length (1)
- shortest path routing (1)
- signal processing (1)
- signaling traffic (1)
- simulation system (1)
- simultaneous embedding (1)
- single-electron transistors (1)
- sketching (1)
- smart meter data utilization (1)
- smooth orthogonal drawing (1)
- snow shoveling (1)
- social VR (1)
- social interaction (1)
- social relationship (1)
- social robot (1)
- social robotics (1)
- social role (1)
- socially interactive agents (1)
- software defined network (1)
- spanning tree (1)
- spire (1)
- stability (1)
- stable state (1)
- standardization (1)
- state management (1)
- statistical validity (1)
- statistics and numerical data (1)
- stereotypes (1)
- stream processing (1)
- stroke (1)
- structural complexity (1)
- student simulation (1)
- stylus (1)
- sun exposure (1)
- sunburn (1)
- superoxide-dismutase (1)
- supervised learning (1)
- surface model (1)
- survey (1)
- survival (1)
- sustainability (1)
- switching navigation (1)
- synthetic biology (1)
- synthetic pathways (1)
- system architecture design (1)
- systematic literature review (1)
- systematic review (1)
- table extraction (1)
- table understanding (1)
- taxonomy (1)
- teacher education (1)
- technology-supported learning (1)
- telematics (1)
- temperature (1)
- text categorization (1)
- text line detection (1)
- text supervision (1)
- theory (1)
- therapeutic application (1)
- thermal camera (1)
- thermal point cloud (1)
- time calibration (1)
- time perception (1)
- time series (1)
- timestamping method (1)
- tolerance (1)
- tomography (1)
- tonicity (1)
- tools (1)
- topology (1)
- training systems (1)
- trait anxiety (1)
- trajectory planning (1)
- transcription (1)
- transformations (1)
- transformer (1)
- translational neuroscience (1)
- transmission (1)
- transport microenvironments (1)
- transport protocols (1)
- transportation (1)
- tree (1)
- trust (1)
- trustworthiness (1)
- unmanned aerial vehicle (1)
- unmanned aerial vehicles (1)
- usability evaluation (1)
- use cases (1)
- user experience (1)
- user interaction (1)
- user interfaces (1)
- user study (1)
- user-generated content (1)
- v (1)
- vaccine (1)
- validation (1)
- vection (1)
- vehicle dynamics (1)
- vehicular navigation (1)
- verbal behaviour (1)
- vernetzte Roboter (1)
- virtual agent interaction (1)
- virtual audience (1)
- virtual humans (1)
- virtual queue (1)
- virtual reality training (1)
- virtual stimuli (1)
- virtual tunnel (1)
- virtual-reality-continuum (1)
- visual analytics (1)
- visual proteomics (1)
- vitellogenin (1)
- voice assistant (1)
- voice-based artificial intelligence (1)
- vom Nutzer erfahrene Dienstgüte QoE (1)
- voting location (1)
- water stress (1)
- waypoint parameter (1)
- wearable (1)
- wheel (1)
- word clouds (1)
- word extensions (1)
- zooming (1)
- zukünftige Kommunikationsnetze (1)
- zukünftiges Internet (1)
- Ähnlichkeitsmaß (1)
- Überlappung (1)
Institute
- Institut für Informatik (183)
- Theodor-Boveri-Institut für Biowissenschaften (29)
- Institut Mensch - Computer - Medien (17)
- Institut für deutsche Philologie (17)
- Institut für Klinische Epidemiologie und Biometrie (7)
- Center for Computational and Theoretical Biology (4)
- Graduate School of Science and Technology (3)
- Medizinische Klinik und Poliklinik II (3)
- Institut für Funktionsmaterialien und Biofabrikation (2)
- Institut für Geographie und Geologie (2)
Schriftenreihe
Sonstige beteiligte Institutionen
- Cologne Game Lab (2)
- Birmingham City University (1)
- DATE Lab, KITE Research Insititute, University Health Network, Toronto, Canada (1)
- EMBL Heidelberg (1)
- INAF Padova, Italy (1)
- Jacobs University Bremen, Germany (1)
- Open University of the Netherlands (1)
- Servicezentrum Medizin-Informatik (Universitätsklinikum) (1)
- Social and Technological Systems (SaTS) lab, School of Art, Media, Performance and Design, York University, Toronto, Canada (1)
- TH Köln (1)
Operators of Higher Order
(1998)
Motivated by results on interactive proof systems we investigate the computational power of quantifiers applied to well-known complexity classes.
In special, we are interested in existential, universal and probabilistic bounded error quantifiers ranging over words and sets of words, i.e. oracles if we think in a Turing machine model.
In addition to the standard oracle access mechanism, we also consider quantifiers ranging over oracles to which access is restricted in a certain way.
The thesis looks at the question asking for the computability of the dot-depth of star-free regular languages. Here one has to determine for a given star-free regular language the minimal number of alternations between concatenation on one hand, and intersection, union, complement on the other hand. This question was first raised in 1971 (Brzozowski/Cohen) and besides the extended star-heights problem usually refered to as one of the most difficult open questions on regular languages. The dot-depth problem can be captured formally by hierarchies of classes of star-free regular languages B(0), B(1/2), B(1), B(3/2),... and L(0), L(1/2), L(1), L(3/2),.... which are defined via alternating the closure under concatenation and Boolean operations, beginning with single alphabet letters. Now the question of dot-depth is the question whether these hierarchy classes have decidable membership problems. The thesis makes progress on this question using the so-called forbidden pattern approach: Classes of regular languages are characterized in terms of patterns in finite automata (subgraphs in the transition graph) that are not allowed. Such a characterization immediately implies the decidability of the respective class, since the absence of a certain pattern in a given automaton can be effectively verified. Before this work, the decidability of B(0), B(1/2), B(1) and L(0), L(1/2), L(1), L(3/2) were known. Here a detailed study of these classes with help of forbidden patterns is given which leads to new insights into their inner structure. Furthermore, the decidability of B(3/2) is proven. Based on these results a theory of pattern iteration is developed which leads to the introduction of two new hierarchies of star-free regular languages. These hierarchies are decidable on one hand, on the other hand they are in close connection to the classes B(n) and L(n). It remains an open question here whether they may in fact coincide. Some evidence is given in favour of this conjecture which opens a new way to attack the dot-depth problem. Moreover, it is shown that the class L(5/2) is decidable in the restricted case of a two-letter alphabet.
In the last 40 years, complexity theory has grown to a rich and powerful field in theoretical computer science. The main task of complexity theory is the classification of problems with respect to their consumption of resources (e.g., running time or required memory). To study the computational complexity (i.e., consumption of resources) of problems, similar problems are grouped into so called complexity classes. During the systematic study of numerous problems of practical relevance, no efficient algorithm for a great number of studied problems was found. Moreover, it was unclear whether such algorithms exist. A major breakthrough in this situation was the introduction of the complexity classes P and NP and the identification of hardest problems in NP. These hardest problems of NP are nowadays known as NP-complete problems. One prominent example of an NP-complete problem is the satisfiability problem of propositional formulas (SAT). Here we get a propositional formula as an input and it must be decided whether an assignment for the propositional variables exists, such that this assignment satisfies the given formula. The intensive study of NP led to numerous related classes, e.g., the classes of the polynomial-time hierarchy PH, P, #P, PP, NL, L and #L. During the study of these classes, problems related to propositional formulas were often identified to be complete problems for these classes. Hence some questions arise: Why is SAT so hard to solve? Are there modifications of SAT which are complete for other well-known complexity classes? In the context of these questions a result by E. Post is extremely useful. He identified and characterized all classes of Boolean functions being closed under superposition. It is possible to study problems which are connected to generalized propositional logic by using this result, which was done in this thesis. Hence, many different problems connected to propositional logic were studied and classified with respect to their computational complexity, clearing the borderline between easy and hard problems.
Complexity and Partitions
(2001)
Computational complexity theory usually investigates the complexity of sets, i.e., the complexity of partitions into two parts. But often it is more appropriate to represent natural problems by partitions into more than two parts. A particularly interesting class of such problems consists of classification problems for relations. For instance, a binary relation R typically defines a partitioning of the set of all pairs (x,y) into four parts, classifiable according to the cases where R(x,y) and R(y,x) hold, only R(x,y) or only R(y,x) holds or even neither R(x,y) nor R(y,x) is true. By means of concrete classification problems such as Graph Embedding or Entailment (for propositional logic), this thesis systematically develops tools, in shape of the boolean hierarchy of NP-partitions and its refinements, for the qualitative analysis of the complexity of partitions generated by NP-relations. The Boolean hierarchy of NP-partitions is introduced as a generalization of the well-known and well-studied Boolean hierarchy (of sets) over NP. Whereas the latter hierarchy has a very simple structure, the situation is much more complicated for the case of partitions into at least three parts. To get an idea of this hierarchy, alternative descriptions of the partition classes are given in terms of finite, labeled lattices. Based on these characterizations the Embedding Conjecture is established providing the complete information on the structure of the hierarchy. This conjecture is supported by several results. A natural extension of the Boolean hierarchy of NP-partitions emerges from the lattice-characterization of its classes by considering partition classes generated by finite, labeled posets. It turns out that all significant ideas translate from the case of lattices. The induced refined Boolean hierarchy of NP-partitions enables us more accuratly capturing the complexity of certain relations (such as Graph Embedding) and a description of projectively closed partition classes.
Network planning has come to great importance during the past decades. Today's telecommunication, traffic systems, and logistics would not have been evolved to the current state without careful analysis of the underlying network problems and precise implementation of the results obtained from those examinations. Graphs with node and arc attributes are a very useful tool to model realistic applications, while on the other hand they are well understood in theory. We investigate network design problems which are motivated particularly from applications in communication networks and logistics. Those problems include the search for homogeneous subgraphs in edge labeled graphs where either the total number of labels or the reload cost are subject to optimize. Further, we investigate some variants of the dial a ride problem. On the other hand, we use node and edge upgrade models to deal with the fact that in many cases one prefers to change existing networks rather than implementing a newly computed solution from scratch. We investigate the construction of bottleneck constrained forests under a node upgrade model, as well as several flow cost problems under a edge based upgrade model. All problems are examined within a framework of multi-criteria optimization. Many of the problems can be shown to be NP-hard, with the consequence that, under the widely accepted assumption that P is not equal to NP, there cannot exist efficient algorithms for solving the problems. This motivates the development of approximation algorithms which compute near-optimal solutions with provable performance guarantee in polynomial time.
Starfree regular languages can be build up from alphabet letters by using only Boolean operations and concatenation. The complexity of these languages can be measured with the so-called dot-depth. This measure leads to concatenation hierarchies like the dot-depth hierarchy (DDH) and the closely related Straubing-Thérien hierarchy (STH). The question whether the single levels of these hierarchies are decidable is still open and is known as the dot-depth problem. In this thesis we prove/reprove the decidability of some lower levels of both hierarchies. More precisely, we characterize these levels in terms of patterns in finite automata (subgraphs in the transition graph) that are not allowed. Therefore, such characterizations are called forbidden-pattern characterizations. The main results of the thesis are as follows: forbidden-pattern characterization for level 3/2 of the DDH (this implies the decidability of this level) decidability of the Boolean hierarchy over level 1/2 of the DDH definition of decidable hierarchies having close relations to the DDH and STH Moreover, we prove/reprove the decidability of the levels 1/2 and 3/2 of both hierarchies in terms of forbidden-pattern characterizations. We show the decidability of the Boolean hierarchies over level 1/2 of the DDH and over level 1/2 of the STH. A technique which uses word extensions plays the central role in the proofs of these results. With this technique it is possible to treat the levels 1/2 and 3/2 of both hierarchies in a uniform way. Furthermore, it can be used to prove the decidability of the mentioned Boolean hierarchies. Among other things we provide a combinatorial tool that allows to partition words of arbitrary length into factors of bounded length such that every second factor u leads to a loop with label u in a given finite automaton.
Nowadays, robotics plays an important role in increasing fields of application. There exist many environments or situations where mobile robots instead of human beings are used, since the tasks are too hazardous, uncomfortable, repetitive, or costly for humans to perform. The autonomy and the mobility of the robot are often essential for a good solution of these problems. Thus, such a robot should at least be able to answer the question "Where am I?". This thesis investigates the problem of self-localizing a robot in an indoor environment using range measurements. That is, a robot equipped with a range sensor wakes up inside a building and has to determine its position using only its sensor data and a map of its environment. We examine this problem from an idealizing point of view (reducing it into a pure geometric one) and further investigate a method of Guibas, Motwani, and Raghavan from the field of computational geometry to solving it. Here, so-called visibility skeletons, which can be seen as coarsened representations of visibility polygons, play a decisive role. In the major part of this thesis we analyze the structures and the occurring complexities in the framework of this scheme. It turns out that the main source of complication are so-called overlapping embeddings of skeletons into the map polygon, for which we derive some restrictive visibility constraints. Based on these results we are able to improve one of the occurring complexity bounds in the sense that we can formulate it with respect to the number of reflex vertices instead of the total number of map vertices. This also affects the worst-case bound on the preprocessing complexity of the method. The second part of this thesis compares the previous idealizing assumptions with the properties of real-world environments and discusses the occurring problems. In order to circumvent these problems, we use the concept of distance functions, which model the resemblance between the sensor data and the map, and appropriately adapt the above method to the needs of realistic scenarios. In particular, we introduce a distance function, namely the polar coordinate metric, which seems to be well suited to the localization problem. Finally, we present the RoLoPro software where most of the discussed algorithms are implemented (including the polar coordinate metric).
This work is subdivided into two main areas: resilient admission control and resilient routing. The work gives an overview of the state of the art of quality of service mechanisms in communication networks and proposes a categorization of admission control (AC) methods. These approaches are investigated regarding performance, more precisely, regarding the potential resource utilization by dimensioning the capacity for a network with a given topology, traffic matrix, and a required flow blocking probability. In case of a failure, the affected traffic is rerouted over backup paths which increases the traffic rate on the respective links. To guarantee the effectiveness of admission control also in failure scenarios, the increased traffic rate must be taken into account for capacity dimensioning and leads to resilient AC. Capacity dimensioning is not feasible for existing networks with already given link capacities. For the application of resilient NAC in this case, the size of distributed AC budgets must be adapted according to the traffic matrix in such a way that the maximum blocking probability for all flows is minimized and that the capacity of all links is not exceeded by the admissible traffic rate in any failure scenario. Several algorithms for the solution of that problem are presented and compared regarding their efficiency and fairness. A prototype for resilient AC was implemented in the laboratories of Siemens AG in Munich within the scope of the project KING. Resilience requires additional capacity on the backup paths for failure scenarios. The amount of this backup capacity depends on the routing and can be minimized by routing optimization. New protection switching mechanisms are presented that deviate the traffic quickly around outage locations. They are simple and can be implemented, e.g, by MPLS technology. The Self-Protecting Multi-Path (SPM) is a multi-path consisting of disjoint partial paths. The traffic is distributed over all faultless partial paths according to an optimized load balancing function both in the working case and in failure scenarios. Performance studies show that the network topology and the traffic matrix also influence the amount of required backup capacity significantly. The example of the COST-239 network illustrates that conventional shortest path routing may need 50% more capacity than the optimized SPM if all single link and node failures are protected.
Wireless communication is nothing new. The first data transmissions based on electromagnetic waves have been successfully performed at the end of the 19th century. However, it took almost another century until the technology was ripe for mass market. The first mobile communication systems based on the transmission of digital data were introduced in the late 1980s. Within just a couple of years they have caused a revolution in the way people communicate. The number of cellular phones started to outnumber the fixed telephone lines in many countries and is still rising. New technologies in 3G systems, such as UMTS, allow higher data rates and support various kinds of multimedia services. Nevertheless, the end of the road in wireless communication is far from being reached. In the near future, the Internet and cellular phone systems are expected to be integrated to a new form of wireless system. Bandwidth requirements for a rich set of wireless services, e.g.\ video telephony, video streaming, online gaming, will be easily met. The transmission of voice data will just be another IP based service. On the other hand, building such a system is by far not an easy task. The problems in the development of the UMTS system showed the high complexity of wireless systems with support for bandwidth-hungry, IP-based services. But the technological challenges are just one difficulty. Telecommunication systems are planned on a world-wide basis, such that standard bodies, governments, institutions, hardware vendors, and service providers have to find agreements and compromises on a number of different topics. In this work, we provide the reader with a discussion of many of the topics involved in the planning of a Wireless LAN system that is capable of being integrated into the 4th generation mobile networks (4G) that is being discussed nowadays. Therefore, it has to be able to cope with interactive voice and video traffic while still offering high data rates for best effort traffic. Let us assume a scenario where a huge office complex is completely covered with Wireless LAN access points. Different antenna systems are applied in order to reduce the number of access points that are needed on the one hand, while optimizing the coverage on the other. No additional infrastructure is implemented. Our goal is to evaluate whether the Wireless LAN technology is capable of dealing with the various demands of such a scenario. First, each single access point has to be capable of supporting best-effort and Quality of Service (QoS) demanding applications simultaneously. The IT infrastructure in our scenario consists solely of Wireless LAN, such that it has to allow users surfing the Web, while others are involved in voice calls or video conferences. Then, there is the problem of overlapping cells. Users attached to one access point produce interference for others. However, the QoS support has to be maintained, which is not an easy task. Finally, there are nomadic users, which roam from one Wireless LAN cell to another even during a voice call. There are mechanisms in the standard that allow for mobility, but their capabilities for QoS support are yet to be studied. This shows the large number of unresolved issues when it comes to Wireless LAN in the context of 4G networks. In this work we want to tackle some of the problems.
In the last years, visual methods have been introduced in industrial software production and teaching of software engineering. In particular, the international standardization of a graphical software engineering language, the Unified Modeling Language (UML) was a reason for this tendency. Unfortunately, various problems exist in concrete realizations of tools, e.g. due to a missing compliance to the standard. One problem is the automatic layout, which is required for a consistent automatic software design. The thesis derives reasons and criteria for an automatic layout method, which produces drawings of UML class diagrams according to the UML specification and issues of human computer interaction, e.g. readability. A unique set of aesthetic criteria is combined from four different disciplines involved in this topic. Based on these aethetic rules, a hierarchical layout algorithm is developed, analyzed, measured by specialized measuring techniques and compared to related work. Then, the realization of the algorithm as a Java framework is given as an architectural description. Finally, adaptions to anticipated future changes of the UML, improvements of the framework and example drawings of the implementation are given.