Design Theory and Similarity Mechanics

The research area design theory and similarity mechanics at the Institute of Aircraft Design deals with the digitization and automation of complex design tasks.

Design languages for design automation

Graph-based design languages map terms (i.e. the "vocabulary") and assembly knowledge (i.e. the "rules") into recombineable language building blocks and operations. In the information representation of a design language, the nodes of a graph serve as abstract placeholders (i.e. as models) for real objects or processes. Thus a graph representation ("design graph") is machine-processed in place of the product design. This machine processing expands and modifies the graph dynamically at runtime by so-called "model-to-model transformations" (M2M). The abstract product representation allows a simple modularization and scalability and allows the consistent integration of different disciplinary domain models (see figure below). The coupling of the framework to domain-specific software systems is essential in order to integrate the existing knowledge and subprocesses. The couplings are implemented as interfaces that generate domain-specific models in the target format (DSL) from the abstract graph representation ("model-to-text transformations" (M2T)). There are already interfaces for geometry (CAD), multi-body systems (MBS), finite elements (FEM), flow analysis (CFD), etc. (see figure below).

Design analysis and evaluation

Using Buckingham's Pi theorem it is possible to transform a physical relationship of n dimensioned variables into a dimensionless description with only m = n - g dimensionless variables. Where g stands for the number of basic variables used. This knowledge can also be transferred to drafts - which can also be described by dimensioned variables - and reinterpreted as evaluation.

Every minimal description in the sense of the Pi theorem is an evaluation.

Digital factory

In addition to a multitude of boundary conditions, a product has a significant influence on the associated (digital) factory. The information already provided by a product created with graph-based design languages can be further processed automatically and used to generate suitable production sites. The aim is to be able to automatically design an optimal factory (in terms of costs, energy, time, etc.). This concerns the resources used as well as the manufacturing processes. In addition, the "Pi Group" is also concerned with the question of the optimal factory layout.

Automated cable routing and piping

An essential step in the design of complex products is cabling and piping. The "Pi-Group" researches algorithms for automated cable and pipe routing, as well as the physical simulation of cables and pipes for installation simulations and other applications.

© IILS mbH


The Center for Applied Research "Digital Product Lifecycle" (DiP) transfers the extremely powerful approaches of hardware and software development (e.g. the Unified Modellig Language UML) and adapts them to wide areas of mechanical engineering and automotive engineering. The aim is to integrate the entire product life cycle with all relevant product, process and resource-related data into a digital overall model and to provide the necessary processes, methods, tools and libraries.

Digital modelling of the product life cycle of a car bonnet

© ZaFH Project "Digital Product Lifecycle (DiP)"

Homepage Digital Product Lifecycle

The overall IDEaliSM aim can be divided into three main-objectives:

  • An advanced integration framework for distributed multidisciplinary design and optimization enabling Competence Centres to offer and share engineering services and to collaborate in Distributed Development Teams.
  • An Engineering Language Workbench: a set of domain specific and high-level modelling languages, ontologies and data standards to enable flexible configuration of engineering workflows and services and enable straightforward integration into distributed the advanced integration framework.
  • A methodology for service-oriented development processes to redefine the product development process and information architecture to enable collaboration between service-oriented Competence Centers in Distributed Development Teams.

The resulting development framework will support European industries to enhance their level of integration and flexibility in product development to reduce the effort, cost and time-to-market in designing innovative aircraft and automotive structures and systems. As such, IDEaliSM fits well within the ‘Engineering Technology’ field identified in the ITEA2 research roadmap and the challenges within the Systems Engineering and Software Engineering domains.

Homepage Project IDEaliSM


All publications by year of publication

  1. 2021

    1. Walter, B. (2021). Formal knowledge representations for textual automotive system requirements and tests [Dissertation, Universität Stuttgart].
    2. Holder, K., Schumacher, S., Friedrich, M., Till, M., Stetter, R., Fichter, W., & Rudolph, S. (2021). Digital Development Process for the Drive System of a Balanced Two-Wheel Scooter. Vehicles, 3(1), 33--60.
    3. Wasielewski, S. (2021). Ammoniumrückgewinnung aus Schlammwasser mittels Ionenaustausch an Klinoptilolith [Dissertation, Universität Stuttgart]. In Stuttgarter Berichte zur Siedlungswasserwirtschaft, Band 248.
    4. Riestenpatt genannt Richter, M. (2021). Automatische Fehlerbaumerstellung und -analyse zeitinvarianter Netzwerke [Dissertation, Universität Stuttgart].
    5. Schopper, D., Kübler, K., Rudolph, S., & Riedel, O. (2021). EIPPM—The Executable Integrative Product-Production Model. Computers, 10(6), 72.
  2. 2020

    1. Kübler, K., Schopper, D., Riedel, O., & Rudolph, S. (2020). Towards an Automated Product-Production System Design - Combining Simulation-based Engineering and Graph-based Design Languages. Procedia Manufacturing, 52, 258--265.
    2. Kübler, K., Schopper, D., Riedel, O., & Rudolph, S. (2020). Towards an Automated Product-Production System Design - Combining Simulation-based Engineering and Graph-based Design Languages. Procedia Manufacturing, 52, 258--265.
    3. Stephan, J. (2020). Flight control for manned multirotor aircraft with complex and constrained actuation systems. In Fortschrittsberichte des Instituts für Flugmechanik und Flugregelung (Dissertation No. 10; Issue 10). Shaker Verlag.
  3. 2019

    1. Rudolph, M., & Feth, D. (2019). Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms. In F. Alt, A. Bulling, & T. Döring (Eds.), Mensch & Computer Workshopband. Gesellschaft für Informatik e.V.
    2. Bossek, J., Grimme, C., Meisel, S., Rudolph, G., & Trautmann, H. (2019). Bi-objective Orienteering: Towards a Dynamic Multi-objective Evolutionary Algorithm. In K. Deb, E. D. Goodman, C. A. C. Coello, K. Klamroth, K. Miettinen, S. Mostaghim, & P. Reed (Eds.), EMO (Vol. 11411, pp. 516–528). Springer.
    3. Krötzsch, M., Marx, M., & Rudolph, S. (2019). The Power of the Terminating Chase (Invited Talk). In P. Barceló & M. Calautti (Eds.), ICDT (Vol. 127, pp. 3:1-3:17). Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik.
    4. Haarmann, S. (2019). Estimating the Duration of Blockchain-Based Business Processes Using Simulation. In S. Kolb & C. Sturm (Eds.), ZEUS (Vol. 2339, pp. 24–31).
    5. Rudolph, J., Herbst, M., Roth, A., Swacek, C., & Schopf, T. (2019). Important Effects in Environmentally Assisted Fatigue (Eaf) of Austenitic and Ferritic Steel Components Including Welds and Their Consideration in a Fatigue Assessment Concept. In K. Hojo, V. Lacroix, & R. Crane (Eds.), Proceedings of the ASME Pressure Vessels and Piping Conference - 2019: Vols. 1 : Codes and Standards (p. V001T01A022). The American Society of Mechanical Engineers.
    6. Baier, S. (2019). Analyzing Customer Feedback for Product Fit Prediction. CoRR, abs/1908.10896.
    7. Vogl, R., Rudolph, D., & Thoring, A. (2019). Bringing Structure to Research Data Management Through a Pervasive, Scalable and Sustainable Research Data Infrastructure. In K. Bergener, M. Räckers, & A. Stein (Eds.), The Art of Structuring (pp. 501–512). Springer.
    8. Bosch, S. (2019). Internet Message Access Protocol (IMAP) - SAVEDATE Extension. RFC, 8514, 1–7.
    9. Wenger, J., Kjellström, H., & Triebel, R. (2019). Non-Parametric Calibration for Classification. CoRR, abs/1906.04933.
    10. Zech, A., Stetter, R., Holder, K., Rudolph, S., & Till, M. (2019). Novel approach for a holistic and completely digital represented product development process by using graph-based design languages. In R. Teti (Ed.), 12th CIRP Conference on Intelligent Computation in Manufacturing Engineering, 18-20 July 2018, Gulf of Naples, Italy (No. 79; Issue 79, pp. 568–573). Elsevier.
    11. Ozaki, A., Krötzsch, M., & Rudolph, S. (2019). Temporally Attributed Description Logics. In C. Lutz, U. Sattler, C. Tinelli, A.-Y. Turhan, & F. Wolter (Eds.), Description Logic, Theory Combination, and All That (Vol. 11560, pp. 441–474). Springer.
    12. Ganter, B., Rudolph, S., & Stumme, G. (2019). Explaining Data with Formal Concept Analysis. In M. Krötzsch & D. Stepanova (Eds.), Reasoning Web (Vol. 11810, pp. 153–195). Springer.
    13. Bednarczyk, B., & Rudolph, S. (2019). Worst-Case Optimal Querying of Very Expressive Description Logics with Path Expressions and Succinct Counting. In M. Simkus & G. E. Weddell (Eds.), Description Logics (Vol. 2373).
    14. Raaijmakers, S. (2019). Artificial Intelligence for Law Enforcement: Challenges and Opportunities. IEEE Security & Privacy, 17(5), 74–77.
    15. Bachmann, S., Fischer, S., & Drück, H. (2019). Reduktion des solaren Wärmepreises durch Leistungssteigerung der Solaranlage. 29. Symposium Solarthermie und innovative Wärmesysteme. 29. Symposium Solarthermie und innovative Wärmesysteme, Bad Staffelstein, Deutschland.
    16. Stephan, M. (2019). Towards a cognizant virtual software modeling assistant using model clones. In A. Sarma & L. Murta (Eds.), ICSE (NIER) (pp. 21–24). IEEE / ACM.
    17. Rudolph, M., Polst, S., & Dörr, J. (2019). Enabling Users to Specify Correct Privacy Requirements. In E. Knauss & M. Goedicke (Eds.), REFSQ (Vol. 11412, pp. 39–54). Springer.
    18. Baader, F., Bednarczyk, B., & Rudolph, S. (2019). Satisfiability Checking and Conjunctive Query Answering in Description Logics with Global and Local Cardinality Constraints. In M. Simkus & G. E. Weddell (Eds.), Description Logics (Vol. 2373).
    19. Dempe, S. (2019). Computing Locally Optimal Solutions of the Bilevel Optimization Problem Using the KKT Approach. In M. Khachay, Y. Kochetov, & P. M. Pardalos (Eds.), MOTOR (Vol. 11548, pp. 147–157). Springer.
    20. Diestelhorst, S. (2019). Interaction of hardware transactional memory and microprocessor microarchitecture. (pp. 1–317). Dresden University of Technology, Germany.
    21. Meisel, S. (2019). All Dynamic Decision Problems Are Created with Equal Structure. In K. Bergener, M. Räckers, & A. Stein (Eds.), The Art of Structuring (pp. 113–123). Springer.
    22. Yin, X., Gromann, D., & Rudolph, S. (2019). Neural Machine Translating from Natural Language to SPARQL. CoRR, abs/1906.09302.
    23. Larriva, M. R. (2019). Semi-Greedy Construction of Oblique-Split Decision Trees. University of California, Los Angeles, USA.
    24. Rudolph, S., Tomforde, S., & Hähner, J. (2019). On the Detection of Mutual Influences and Their Consideration in Reinforcement Learning Processes. CoRR, abs/1905.04205.
    25. Rudolph, S., Schweizer, L., & Yao, Z. (2019). SPARQL Queries over Ontologies Under the Fixed-Domain Semantics. In A. C. Nayak & A. Sharma (Eds.), PRICAI (1) (Vol. 11670, pp. 486–499). Springer.
    26. Beck, S. (2019). Immersive Telepresence Systems and Technologies. Bauhaus University, Weimar, Germany.
    27. Rudolph, “Johann” Sebastian. (2019). Presburger Concept Cardinality Constraints in Very Expressive Description Logics - Allegro sexagenarioso ma non ritardando. In C. Lutz, U. Sattler, C. Tinelli, A.-Y. Turhan, & F. Wolter (Eds.), Description Logic, Theory Combination, and All That (Vol. 11560, pp. 542–561). Springer.
    28. Rudolph, M., Wandt, B., & Rosenhahn, B. (2019). Structuring Autoencoders. CoRR, abs/1908.02626.
    29. Walter, B., Kaiser, D., & Rudolph, S. (2019). From Manual to Machine-executable Model-based Systems Engineering via Graph-based Design Languages. In S. Hammoudi, L. F. Pires, & B. Selic (Eds.), MODELSWARD (pp. 201–208). SciTePress.
    30. Bommert, M., & Rudolph, G. (2019). Reliable Biobjective Solution of Stochastic Problems Using Metamodels. In K. Deb, E. D. Goodman, C. A. C. Coello, K. Klamroth, K. Miettinen, S. Mostaghim, & P. Reed (Eds.), EMO (Vol. 11411, pp. 581–592). Springer.
    31. Rupasinghe, T., Burstein, F., & Rudolph, C. (2019). Blockchain based Dynamic Patient Consent: A Privacy-Preserving Data Acquisition Architecture for Clinical Data Analytics. In H. Krcmar, J. Fedorowicz, W. F. Boh, J. M. Leimeister, & S. Wattal (Eds.), ICIS. Association for Information Systems.
    32. Holder, K., Rudolph, S., Stetter, R., & Salander, C. (2019). Automated requirements-driven design synthesis of gearboxes with graph-based design languages using state of the art tools. Best of Gears 2019, 83, 3, 655–668.
    33. Walter, B., Martin, J., Schmidt, J., Dettki, H., & Rudolph, S. (2019). Executable State Machines Derived from Structured Textual Requirements - Connecting Requirements and Formal System Design. In S. Hammoudi, L. F. Pires, & B. Selic (Eds.), MODELSWARD (pp. 193–200). SciTePress.
    34. Braun, T., Reuter, J., & Rudolph, J. (2019). Observer Design for Self-Sensing of Solenoid Actuators With Application to Soft Landing. IEEE Trans. Contr. Sys. Techn., 27(4), 1720–1727.
    35. Walter, B., Kaiser, D., & Rudolph, S. (2019). Machine-Executable Model-Based Systems Engineering with Graph-Based Design Languages. In E. Bonjour, D. Krob, L. Palladino, & F. Stephan (Eds.), Complex Systems Design & Management (p. 239). Springer.
    36. Hammer, S. (2019). UX-orientierte Entwicklung von Empfehlungssystemen für Beratung und Assistenz. University of Augsburg, Germany.
    37. Schuler, X., Schopf, T., Beck, T., Smaga, M., Daniel, T., Rudolph, J., & Buchholz, B. (2019). Investigation of the fatigue behavior of austenitic stainless steels and their welds for reactor internals under combined low cycle (LCF), high cycle (HCF) and very high cycle (VHCF) operational loading conditions. In H. Qian, M. Brongers, & M. Uddin (Eds.), Proceedings Of The ASME Pressure Vessels And Piping Conference: Vols. 6B : Materials and Fabrication (pp. PVP2018-85028, V06BT06A060). ASME.
    38. Euler, S. (2019). Automatic Evaluation of the Quality of Solutions for an Open Programming Task. In B. Scharlau, R. McDermott, A. Pears, & M. Sabin (Eds.), ITiCSE (pp. 237–238). ACM.
  4. 2018

    1. Rudolph, S., & Simkus, M. (2018). Satisfiability in the Triguarded Fragment of First-Order Logic. In M. Ortiz & T. Schneider (Eds.), Description Logics (Vol. 2211).
    2. Bossek, J., Grimme, C., Meisel, S., Rudolph, G., & Trautmann, H. (2018). Local search effects in bi-objective orienteering. In H. E. Aguirre & K. Takadama (Eds.), GECCO (pp. 585–592). ACM.
    3. Rudolph, S., Schweizer, L., & Tirtarasa, S. (2018). Justifications for Description Logic Knowledge Bases Under the Fixed-Domain Semantics. In C. Benzmüller, F. Ricca, X. Parent, & D. Roman (Eds.), RuleML+RR (Vol. 11092, pp. 185–200). Springer.
    4. Vatolkin, I., & Rudolph, G. (2018). Comparison of Audio Features for Recognition of Western and Ethnic Instruments in Polyphonic Mixtures. In E. Gómez, X. Hu, E. Humphrey, & E. Benetos (Eds.), ISMIR (pp. 554–560).
    5. Walter, B., Kaiser, D., & Rudolph, S. (2018). Machine-Executable Model-Based Systems Engineering with Graph-Based Design Languages. In E. Bonjour, D. Krob, L. Palladino, & F. Stephan (Eds.), CSDM (p. 239). Springer.
    6. Vogel, S., & Rudolph, S. (2018). Complex System Design with Design Languages: Method, Applications and Design Principles. CoRR, abs/1805.09111.
    7. Ashoori, E., & Rudolph, T. (2018). Commentary on Quantum-Inspired Information Retrieval. CoRR, abs/1809.05685.
    8. Rudolph, D. (2018). Strukturelle und spektroskopische Untersuchungen an gemischtanionischen Hydriden und Oxidhalogeniden der Seltenerdmetalle [Dissertation]. In Anorganische Chemie. Verlag Dr. Hut.
    9. Denninger, M., & Triebel, R. (2018). Persistent Anytime Learning of Objects from Unseen Classes. IROS, 4075–4082.
    10. Rössler, A. M. S., & Günnemann, S. (2018). ThingML+: Augmenting Model-Driven Software Engineering for the Internet of Things with Machine Learning. In R. Hebig & T. Berger (Eds.), MODELS Workshops (Vol. 2245, pp. 521–523).
    11. Gerbet, D., & Rudolph, J. (2018). Redundante Koordinaten in der Modellbildung für ein schweres Seil. Automatisierungstechnik, 66(7), 536–547.
    12. Eckert, S. (2018). Wirkungsorientiertes Investieren in Deutschland - Anlagebereitschaft, Erfordernisse und Potenzial hochvermögender deutscher Investoren : eine Analyse der Bedürfnisstrukturen hochvermögender Anleger im Kontext der Behavioral Finance [Dissertation, Springer Gabler]. In Nachhaltigkeit und Finanzen.
    13. Alrabbaa, C., Rudolph, S., & Schweizer, L. (2018). Faceted Answer-Set Navigation. In C. Benzmüller, F. Ricca, X. Parent, & D. Roman (Eds.), RuleML+RR (Vol. 11092, pp. 211–225). Springer.
    14. Rudolph, S., & Simkus, M. (2018). The Triguarded Fragment of First-Order Logic. In G. Barthe, G. Sutcliffe, & M. Veanes (Eds.), LPAR (Vol. 57, pp. 604–619). EasyChair.
    15. Thoring, A., Rudolph, D., & Vogl, R. (2018). The Digital Transformation of Teaching in Higher Education from an Academic’s Point of View: An Explorative Study. In P. Zaphiris & A. Ioannou (Eds.), HCI (24) (Vol. 10924, pp. 294–309). Springer.
    16. Rudolph, M., Feth, D., & Polst, S. (2018). Why Users Ignore Privacy Policies - A Survey and Intention Model for Explaining User Privacy Behavior. In M. Kurosu (Ed.), HCI (1) (Vol. 10901, pp. 587–598). Springer.
    17. Bertet, K., & Rudolph, S. (2018). Preface: Concept Lattices and Applications: Recent Advances and New Opportunities. Discrete Applied Mathematics, 249, 1.
    18. Ozaki, A., Krötzsch, M., & Rudolph, S. (2018). Happy Ever After: Temporally Attributed Description Logics. In M. Ortiz & T. Schneider (Eds.), Description Logics (Vol. 2211).
    19. Stieglitz, S., Vogl, R., & Rudolph, D. (2018). Introduction to the Minitrack on Research Data and Knowledge Systems. In T. Bui (Ed.), HICSS (p. 1). ScholarSpace / AIS Electronic Library (AISeL).
    20. Matzka, S. (2018). Using Process Quality Prediction to Increase Resource Efficiency in Manufacturing Processes. AI4I, 110–111.
    21. Rudolph, M. R., & Blei, D. M. (2018). Dynamic Embeddings for Language Evolution. In P.-A. Champin, F. L. Gandon, M. Lalmas, & P. G. Ipeirotis (Eds.), WWW (pp. 1003–1011). ACM.
    22. Schopper, D., & Rudolph, S. (2018). From Model-Driven Architecture and Model-Based Systems Engineering via Formal Concept Analysis to Graph-Based Design Languages and Back : A Scientific Discourse. Proceedings Of The ASME International Design Engineering Technical Conferences And Computers And Information In Engineering Conference, 1B : 38th Computers and Information in Engineering Conference, DETC2018-86392, V01BT02A043.
    23. Thuluva, A. S., Anicic, D., & Rudolph, S. (2018). IoT Semantic Interoperability with Device Description Shapes. In A. Gangemi, A. L. Gentile, A. G. Nuzzolese, S. Rudolph, M. Maleshkova, H. Paulheim, J. Z. Pan, & M. Alam (Eds.), ESWC (Satellite Events) (Vol. 11155, pp. 409–422). Springer.
    24. Walter, B., Schilling, M., Piechotta, M., & Rudolph, S. (2018). Improving Test Execution Efficiency Through Clustering and Reordering of Independent Test Steps. ICST, 363–373.
    25. Rudolph, M., & Polst, S. (2018). Satisfying and Efficient Privacy Settings. In R. Dachselt & G. Weber (Eds.), Mensch & Computer. Gesellschaft für Informatik e.V.
    26. Bachmann, S., Fischer, S., & Drück, H. (2018). Vorstellung der im Projekt “KoST” entwickelten Standards für Flachkollektoren und bivalente Trinkwasserspeicher. Symposium Thermische Solarenergie.
  5. 2017

    1. Rudolph, D., Enseling, D., Jüstel, T., & Schleid, T. (2017). Crystal Structure and Luminescence Properties of the First Hydride Oxide Chloride with Divalent Europium: LiEu2HOCl2. Zeitschrift Für Anorganische Und Allgemeine Chemie, 643(21), 1525–1530.
    2. Ostermann, F., Vatolkin, I., & Rudolph, G. (2017). Evaluation Rules for Evolutionary Generation of Drum Patterns in Jazz Solos. In J. Correia, V. Ciesielski, & A. Liapis (Eds.), EvoMUSART (Vol. 10198, pp. 246–261).
    3. Keller, W., Einholz, W., Rudolph, D., & Schleid, T. (2017). Syntheses and Crystal Structures of Brominated Polyhedral Arsa- and Phosphaboranes. Zeitschrift Für Anorganische Und Allgemeine Chemie, 643(10), 664–668.
    4. Rudolph, M. R., & Blei, D. M. (2017). Dynamic Bernoulli Embeddings for Language Evolution. CoRR, abs/1703.08052.
    5. Rudolph, S., & Schweizer, L. (2017). Not Too Big, Not Too Small... Complexities of Fixed-Domain Reasoning in First-Order and Description Logics. In A. Artale, B. Glimm, & R. Kontchakov (Eds.), Description Logics (Vol. 1879).
    6. Kalkreuth, R., Rudolph, G., & Droschinsky, A. (2017). A New Subgraph Crossover for Cartesian Genetic Programming. In J. McDermott, M. Castelli, L. Sekanina, E. Haasdijk, & P. García-Sánchez (Eds.), EuroGP (Vol. 10196, pp. 294–310).
    7. Rabanser, S., Shchur, O., & Günnemann, S. (2017). Introduction to Tensor Decompositions and their Applications in Machine Learning. CoRR, abs/1711.10781.
    8. Zolotavkin, Y., García, J., & Rudolph, C. (2017). Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools. In S. Rass, B. An, C. Kiekintveld, F. Fang, & S. Schauer (Eds.), GameSec (Vol. 10575, pp. 21–39). Springer.
    9. Volz, V., Rudolph, G., & Naujoks, B. (2017). Surrogate-Assisted Partial Order-Based Evolutionary Optimisation. In H. Trautmann, G. Rudolph, K. Klamroth, O. Schütze, M. M. Wiecek, Y. Jin, & C. Grimme (Eds.), EMO (Vol. 10173, pp. 639–653). Springer.
    10. Stauch, C., & Rudolph, J. (2017). Control-oriented modelling and development of a model-based switching algorithm for a digital hydraulic independent metering cylinder drive. J. Systems & Control Engineering, 231(2), 66–81.
    11. Ohl, S. (2017). Models for the design of distributed telepresence systems. (pp. 1–148). University of Rostock, Germany.
    12. Rudolph, D., Laufer, S., & Hartenbach, I. (2017). On the dimorphism of Pr6Mo10O39. Zeitschrift Für Naturforschung. B, Chemical Sciences, 72(11), 765–774.
    13. Rudolph, S. (2017). Succinctness and tractability of closure operator representations. Theor. Comput. Sci., 658, 327–345.
    14. Walter, B., Hammes, J., Piechotta, M., & Rudolph, S. (2017). A Formalization Method to Process Structured Natural Language to Logic Expressions to Detect Redundant Specification and Test Statements. In A. Moreira, J. Araújo, J. Hayes, & B. Paech (Eds.), RE (pp. 263–272). IEEE Computer Society.
    15. Dreiseitl, S. (2017). Evaluating Parallel Minibatch Training for Machine Learning Applications. In R. Moreno-Díaz, F. Pichler, & A. Quesada-Arencibia (Eds.), EUROCAST (1) (Vol. 10671, pp. 400–407). Springer.
    16. Asaadi, S., & Rudolph, S. (2017). Gradual Learning of Matrix-Space Models of Language for Sentiment Analysis. In P. Blunsom, A. Bordes, K. Cho, S. B. Cohen, C. Dyer, E. Grefenstette, K. M. Hermann, L. Rimell, J. Weston, & S. Yih (Eds.), Rep4NLP@ACL (pp. 178–185). Association for Computational Linguistics.
    17. Volz, V., Rudolph, G., & Naujoks, B. (2017). Investigating uncertainty propagation in surrogate-assisted evolutionary algorithms. In P. A. N. Bosman (Ed.), GECCO (pp. 881–888). ACM.
    18. Holder, K., Zech, A., Ramsaier, M., Stetter, R., Niedermeier, H.-P., Rudolph, S., & Till, M. (2017). Model-Based Requirements Management in Gear Systems Design Based On Graph-Based Design Languages. Applied Sciences, 7(11), 1112.
    19. Adamy, J., Willert, V., & Rudolph, J. (2017). Ausgewählte Beiträge der GMA-Fachausschüsse 1.30 und 1.40. Automatisierungstechnik, 65(8), 527.
    20. Rudolph, D., & Schleid, T. (2017). Die Europium(II)-Oxidhalogenide Eu2OBr2 und Eu2OI2. Zeitschrift für Naturforschung. B, Chemical sciences, 72(11), 795–799.
    21. Braun, T., Reuter, J., & Rudolph, J. (2017). Sensorlose Positionsregelung eines hydraulischen Proportional-Wegeventils mittels Signalinjektion. Automatisierungstechnik, 65(4), 260.
    22. Wessing, S., Pink, R., Brandenbusch, K., & Rudolph, G. (2017). Toward Step-Size Adaptation in Evolutionary Multiobjective Optimization. In H. Trautmann, G. Rudolph, K. Klamroth, O. Schütze, M. M. Wiecek, Y. Jin, & C. Grimme (Eds.), EMO (Vol. 10173, pp. 670–684). Springer.
    23. Rudolph, S., Schweizer, L., & Tirtarasa, S. (2017). Wolpertinger: A Fixed-Domain Reasoner. In N. Nikitina, D. Song, A. Fokoue, & P. Haase (Eds.), International Semantic Web Conference (Posters, Demos & Industry Tracks) (Vol. 1963).
    24. Stephan, M. (2017). Challenges in Teaching Modeling in Agile Software Engineering Courses. In L. Burgueño, J. Corley, N. Bencomo, P. J. Clarke, P. Collet, M. Famelis, S. Ghosh, M. Gogolla, J. Greenyer, E. Guerra, S. Kokaly, A. Pierantonio, J. Rubin, & D. D. Ruscio (Eds.), MODELS (Satellite Events) (Vol. 2019, pp. 525–528).
  6. 2016

    1. Escobar, M., Rudolph, B., & Zagst, R. (2016). Algorithm 963: Estimation of Stochastic Covariance Models using a Continuum of Moment Conditions. ACM Trans. Math. Softw., 42(4), 33:1-33:26.
    2. Krusche, S. (2016). Rugby - A Process Model for Continuous Software Engineering. Technical University Munich, Germany.
    3. García-Rudolph, A., & Gibert, K. (2016). Understanding effects of cognitive rehabilitation under a knowledge discovery approach. Eng. Appl. of AI, 55, 165–185.
    4. Volz, V., Rudolph, G., & Naujoks, B. (2016). Surrogate-Assisted Partial Order-based Evolutionary Optimisation. CoRR, abs/1611.00260.
    5. Kalkreuth, R., Rudolph, G., & Krone, J. (2016). More efficient evolution of small genetic programs in Cartesian Genetic Programming by using genotypie age. CEC, 5052–5059.
    6. Konz, M., & Rudolph, J. (2016). Beispiele für einen direkten Zugang zu einer globalen, energiebasierten Modellbildung und Regelung von Starrkörpersystemen. Automatisierungstechnik, 64(2), 96–109.
    7. Neumann, S. (2016). Evaluation and improvement of internet voting schemes based on legally-founded security requirements. (pp. 1–165). Darmstadt University of Technology, Germany.
    8. Rudolph, S., & Thomazo, M. (2016). Expressivity of Datalog Variants - Completing the Picture. In S. Kambhampati (Ed.), IJCAI (pp. 1230–1236). IJCAI/AAAI Press.
    9. Rudolph, S. (2016). The Curse of Finiteness: Undecidability of Database-Inspired Reasoning Problems in Very Expressive Description Logics. In M. Lenzerini & R. Peñaloza (Eds.), Description Logics (Vol. 1577).
    10. Kreutzer, S. (2016). Nowhere Crownful Classes of Directed Graphs. In Encyclopedia of Algorithms (pp. 1416–1419).
    11. Rudolph, G., Schütze, O., & Trautmann, H. (2016). On the Closest Averaged Hausdorff Archive for a Circularly Convex Pareto Front. In G. Squillero & P. Burelli (Eds.), EvoApplications (2) (Vol. 9598, pp. 42–55). Springer.
    12. Gross, J., & Rudolph, S. (2016). Geometry and simulation modeling in design languages. Aerospace Science and Technology, 54, 183–191.
    13. Narr, A., Triebel, R., & Cremers, D. (2016). Stream-based Active Learning for efficient and adaptive classification of 3D objects. In D. Kragic, A. Bicchi, & A. D. Luca (Eds.), ICRA (pp. 227–233). IEEE.
    14. Krötzsch, M., & Rudolph, S. (2016). Is Your Database System a Semantic Web Reasoner? KI, 30(2), 169–176.
    15. Uppala, V., Bedeley, R., & Wang, W. (2016). Managing the Implementation of Cloud Based Technologies: Role of Competing Organizational Objectives. AMCIS.
    16. Bedeley, R., Benbow, M., & Iyer, L. (2016). An Analytics-based Strategy for College Sports Ticket Sales and Management. AMCIS.
    17. Rudolph, M. R., Ruiz, F. J. R., Mandt, S., & Blei, D. M. (2016). Exponential Family Embeddings. CoRR, abs/1608.00778.
    18. Rudolph-Lilith, M. (2016). On a recursive construction of circular paths and the search for $π$ on the integer lattice $Z^2$. CoRR, abs/1602.06239.
    19. Schmidt, J., & Rudolph, S. (2016). Graph-Based Design Languages: A Lingua Franca for Product Design Including Abstract Geometry. IEEE Computer Graphics and Applications, 36(5), 88–93.
    20. Gehring, N., Stauch, C., & Rudolph, J. (2016). Parameter identification, fault detection and localization for an electrical transmission line. ECC, 2090–2095.
    21. Rudolph, D., Thoring, A., & Vogl, R. (2016). Research Data Management: Wishful Thinking or Reality? Praxis Der Informationsverarbeitung Und Kommunikation, 38(3–4), 113–120.
    22. Gross, J., & Rudolph, S. (2016). Rule-based spacecraft design space exploration and sensitivity analysis. Aerospace Science and Technology, 59, 162–171.
    23. Rudolph, S. (2016). Undecidability Results for Database-Inspired Reasoning Problems in Very Expressive Description Logics. In C. Baral, J. P. Delgrande, & F. Wolter (Eds.), KR (pp. 247–257). AAAI Press.
    24. Manthey, N., Peñaloza, R., & Rudolph, S. (2016). Efficient Axiom Pinpointing in EL using SAT Technology. In M. Lenzerini & R. Peñaloza (Eds.), Description Logics (Vol. 1577).
    25. Meyer, S. (2016). Analysis of sigmoid-based blind equalizer algorithms. CSNDSP, 1–6.
    26. Lenor, S. (2016). Model-based estimation of meteorological visibility in the context of automative camera systems. (pp. 1–222). University of Heidelberg, Germany.
    27. Rudolph, M., Moucha, C., & Feth, D. (2016). A Framework for Generating User-and Domain-Tailored Security Policy Editors. RE Workshops, 56–61.
    28. Rudolph, G., & Wessing, S. (2016). Linear Time Estimators for Assessing Uniformity of Point Samples in Hypercubes. Informatica, Lith. Acad. Sci., 27(2), 335–349.
    29. Rudolph, C. (2016). Recent developments in example-based texture synthesis for graphics rendering. In H. C. Mayr & M. Pinzger (Eds.), GI-Jahrestagung: Vol. P-259 (pp. 2175–2185). GI.
    30. Lorentz, R., & Yan, C. H. (2016). Bivariate affine Gončarov polynomials. Discrete Mathematics, 339(9), 2371–2383.
    31. Rudolph, M., & Feth, D. (2016). Usable Security Policy Specification. In B. Weyers & A. Dittmar (Eds.), Mensch & Computer Workshopband. Gesellschaft für Informatik e.V.
    32. Volz, V., Rudolph, G., & Naujoks, B. (2016). Demonstrating the Feasibility of Automatic Game Balancing. In T. Friedrich, F. Neumann, & A. M. Sutton (Eds.), GECCO (pp. 269–276). ACM.
    33. Delivorias, S., & Rudolph, S. (2016). Revisiting Grounded Circumscription in Description Logics. In M. Ortiz & S. Schlobach (Eds.), RR (Vol. 9898, pp. 46–60). Springer.
    34. Rudolph, S., Sacarea, C., & Troanca, D. (2016). Conceptual Navigation for Polyadic Formal Concept Analysis. In E. Mercier-Laurent & D. Boulanger (Eds.), AI4KM@IJCAI (Vol. 518, pp. 50–70). Springer.
    35. Gross, J., & Rudolph, S. (2016). Modeling graph-based satellite design languages. Aerospace Science and Technology, 49, 63–72.
    36. Petrova, A., & Rudolph, S. (2016). Web-Mining Defeasible Knowledge from Concessional Statements. In O. Haemmerlé, G. Stapleton, & C. Faron-Zucker (Eds.), ICCS (Vol. 9717, pp. 191–203). Springer.
    37. Lancier, S. (2016). Spatial memories in place recognition. University of Tübingen, Germany.
    38. Rudolph, S., Tomforde, S., & Hähner, J. (2016). A Mutual Influence-based Learning Algorithm. In H. J. van den Herik & J. Filipe (Eds.), ICAART (1) (pp. 181–189). SciTePress.
    39. Rudolph, C. (2016). Exploring the Space of Digital Evidence - Position Paper. In J. K. Liu & R. Steinfeld (Eds.), ACISP (1) (Vol. 9722, pp. 249–262). Springer.
  7. 2015

    1. Majchrzak, K., Quadflieg, J., & Rudolph, G. (2015). Advanced Dynamic Scripting for Fighting Game AI. In K. Chorianopoulos, M. Divitini, J. B. Hauge, L. Jaccheri, & R. Malaka (Eds.), ICEC (Vol. 9353, pp. 86–99). Springer.
    2. Rudolph, S. (2015). Leidenschaftliche Poeten und Mahner. Südwest Presse.
    3. Rudolph, S., Sacarea, C., & Troanca, D. (2015). Membership Constraints in Formal Concept Analysis. In Q. Yang & M. J. Wooldridge (Eds.), IJCAI (pp. 3186–3192). AAAI Press.
    4. Rudolph, M. B., & Semwal, S. K. (2015). A method for 3D content creation. CTS, 481–482.
    5. Lincke, N., Kuntze, N., & Rudolph, C. (2015). Distributed security management for the IoT. In R. Badonnel, J. Xiao, S. Ata, F. D. Turck, V. Groza, & C. R. P. dos Santos (Eds.), IM (pp. 1373–1376). IEEE.
    6. Mund, D., Triebel, R., & Cremers, D. (2015). Active online confidence boosting for efficient object classification. ICRA, 1367–1373.
    7. Rudolph, D., & Schleid, T. (2015). Single crystals of matlockite-type YbHCl. 23rd Annual Conference of the German Crystallographic Society, 35, 84.
    8. Vatolkin, I., Rudolph, G., & Weihs, C. (2015). Interpretability of Music Classification as a Criterion for Evolutionary Multi-objective Feature Selection. In C. G. Johnson, A. Carballal, & J. Correia (Eds.), EvoMUSART (Vol. 9027, pp. 236–248). Springer.
    9. Novak, E., Ritter, K., Sloan, I. H., Traub, J. F., & Wozniakowski, H. (2015). Bernd Carl, Aicke Hinrichs, and Philipp Rudolph share the 2014 Best Paper Award. J. Complexity, 31(3), v.
    10. Ewen, S. (2015). Programming abstractions, compilation, and execution techniques for massively parallel data analysis. Berlin Institute of Technology.
    11. Rudolph, S., & Thomazo, M. (2015). Characterization of the Expressivity of Existential Rule Queries. In Q. Yang & M. J. Wooldridge (Eds.), IJCAI (pp. 3193–3199). AAAI Press.
    12. Bourhis, P., Krötzsch, M., & Rudolph, S. (2015). Reasonable Highly Expressive Query Languages - IJCAI-15 Distinguished Paper (Honorary Mention). In Q. Yang & M. J. Wooldridge (Eds.), IJCAI (pp. 2826–2832). AAAI Press.
    13. Rudolph, S., Sacarea, C., & Troanca, D. (2015). Towards a Navigation Paradigm for Triadic Concepts. In J. Baixeries, C. Sacarea, & M. Ojeda-Aciego (Eds.), ICFCA (Vol. 9113, pp. 252–267). Springer.
    14. Hudson, T., & Rudolph, L. (2015). Thunderstrike: EFI firmware bootkits for Apple MacBooks. In D. Naor, G. Heiser, & I. Keidar (Eds.), SYSTOR (pp. 15:1-15:10). ACM.
    15. Rudolph, H. (2015). IT-Sicherheitsgesetz - was bedeutet es für Sie? Wirtschaftsinformatik & Management, 7(4), 18–27.
    16. Rudolph, D., & Stitt, G. (2015). An interpolation-based approach to multi-parameter performance modeling for heterogeneous systems. ASAP, 174–180.
    17. Wienert, S. (2015). Quantitative Analyse von Zell- und Gewebeeigenschaften in histologischen Bilddaten. Medizinische Fakultät Charité, Berlin.
    18. Verbücheln, S. (2015). How Perfect Offline Wallets Can Still Leak Bitcoin Private Keys. CoRR, abs/1501.00447.
    19. Rudolph-Lilith, M., & Muller, L. E. (2015). On a link between Dirichlet kernels and central multinomial coefficients. Discrete Mathematics, 338(9), 1567–1572.
    20. Adamy, J., Khodaverdian, S., & Rudolph, J. (2015). Ausgewählte Beiträge der GMA-Fachausschüsse 1.30 und 1.40. Automatisierungstechnik, 63(8), 567–569.
    21. Kuhlenkamp, J., Rudolph, K., & Bermbach, D. (2015). AISLE: Assessment of Provisioned Service Levels in Public IaaS-Based Database Systems. In A. Barros, D. Grigori, N. C. Narendra, & H. K. Dam (Eds.), ICSOC (Vol. 9435, pp. 154–168). Springer.
    22. Arnold, P., Rudolph, M., & Rohland, H. (2015). E-Learning vor Präsenzveranstaltung - eine “Flipped-Vorlesung” in der Lehrerausbildung der TU Dresden. In J. Gallenbacher (Ed.), INFOS: Vol. P-249 (pp. 13–22). GI.
    23. Rudolph, G. L., & Martinez, T. R. (2015). Finding the Real Differences Between Learning Algorithms. International Journal on Artificial Intelligence Tools, 24(3), 1550001:1-1550001:20.
    24. Vatolkin, I., Rudolph, G., & Weihs, C. (2015). Evaluation of Album Effect for Feature Selection in Music Genre Recognition. In M. Müller & F. Wiering (Eds.), ISMIR (pp. 169–175).
    25. Kuntze, N., Fuchs, A., & Rudolph, C. (2015). On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. In H. Federrath & D. Gollmann (Eds.), SEC (Vol. 455, pp. 630–644). Springer.
    26. Kalkreuth, R., Rudolph, G., & Krone, J. (2015). Improving Convergence in Cartesian Genetic Programming Using Adaptive Crossover, Mutation and Selection. SSCI, 1415–1422.
    27. Meisel, S., Grimme, C., Bossek, J., Wölck, M., Rudolph, G., & Trautmann, H. (2015). Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle. In S. Silva & A. I. Esparcia-Alcázar (Eds.), GECCO (pp. 425–432). ACM.
    28. Kolassa, S. (2015). Retail analytics: integrated forecasting and inventory management for perishable products in retailing. JORS, 66(12), 2103–2104.
    29. Tao, Y., Triebel, R., & Cremers, D. (2015). Semi-supervised online learning for efficient classification of objects in 3D data streams. IROS, 2904–2910.
    30. Oosthuizen, R., & Pretorius, L. (2015). System dynamics modelling of situation awareness. MilCIS, 1–6.
    31. Rudolph, S., Sacarea, C., & Troanca, D. (2015). Reduction in Triadic Data Sets. In S. O. Kuznetsov, A. Napoli, & S. Rudolph (Eds.), FCA4AI@IJCAI (Vol. 1430, pp. 55–62).
    32. Quadflieg, J., Rudolph, G., & Preuss, M. (2015). How costly is a good compromise: Multi-objective TORCS controller parameter optimization. CIG, 454–460.
    33. Rudolph, C., Storck, T., & Sandamirskaya, Y. (2015). Learning to reach after learning to look: A study of autonomy in learning sensorimotor transformations. IJCNN, 1–6.
    34. Grimme, C., Meisel, S., Trautmann, H., Rudolph, G., & Wölck, M. (2015). Multi-objective Analysis of Approaches to Dynamic Routing of a Vehicle. In J. Becker, J. vom Brocke, & M. de Marco (Eds.), ECIS.
    35. Preuss, M., & Rudolph, G. (2015). Conference Report on IEEE CIG 2014 Conference Reports. IEEE Comput. Intell. Mag., 10(1), 14–15.
  8. 2014

    1. Stephan, H. (2014). Application of Methods for Syntax Analysis of Context-Free Languages to Query Evaluation of Logic Programs. CoRR, abs/1405.3826.
    2. Leuenberger, S. (2014). Total Logic-ERRATUM. Rev. Symb. Log., 7(3), 599.
    3. Kauer, M., & Krupka, M. (2014). Removing an Incidence from a Formal Context. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 195–206).
    4. García-Rudolph, A., & Gibert, K. (2014). A data mining approach to identify cognitive NeuroRehabilitation Range in Traumatic Brain Injury patients. Expert Syst. Appl., 41(11), 5238–5251.
    5. Carl, B., Hinrichs, A., & Rudolph, P. (2014). Entropy numbers of convex hulls in Banach spaces and applications. J. Complexity, 30(5), 555–587.
    6. Jacobs, S. (2014). Tagungsbericht: 36. Treffen der GI - Fachgruppe Test, Analyse und Verifikation von Software (TAV-36), 26. und 27. Juni 2014, Softwareforen Leipzig. Softwaretechnik-Trends, 34(3), Article 3.
    7. Dimassi, I., Mouakher, A., & Yahia, S. B. (2014). DFSP: A New Algorithm for a Swift Computation of Formal Concept Set Stability. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 169–180).
    8. Göppert, S. (2014). Wie Shared Services Center zu strategischen Partnern werden. Wirtschaftsinformatik & Management, 2014(3), 28–29.
    9. Sigg, S. (2014). A fast binary feedback-based distributed adaptive carrier synchronisation for transmission among clusters of disconnected IoT nodes in smart spaces. Ad Hoc Networks, 16, 120–130.
    10. Hell, S. (2014). On the Number of Colored Birch and Tverberg Partitions. Electr. J. Comb., 21(3), P3.23.
    11. Cabrera, I. P., Ojeda-Aciego, M., & Pócs, J. (2014). Ordering Objects via Attribute Preferences. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 157–168).
    12. Trnecka, M., & Trneckova, M. (2014). An Algorithm for the Multi-Relational Boolean Factor Analysis based on Essential Elements. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 107–118).
    13. Kley, O., & Rudolph, P. (2014). Critically large entropy of absolutely convex hulls in Banach spaces of type p. Journal of Approximation Theory, 184, 1–27.
    14. Rudolph, S. (2014). On the Succinctness of Closure Operator Representations. In C. V. Glodeanu, M. Kaytoue, & C. Sacarea (Eds.), ICFCA (Vol. 8478, pp. 15–36). Springer.
    15. Bosch, S. (2014). Sieve Email Filtering: Detecting Duplicate Deliveries. RFC, 7352, 1–15.
    16. Pfletschinger, S. (2014). Joint decoding of multiple non-binary LDPC codewords. ICC Workshops, 513–519.
    17. Büttner, S. (2014). Langzeitarchivierung von Forschungsdaten. Eine Bestandsaufnahme. Inf. Wiss. & Praxis, 65(4–5), 299–300.
    18. Naidenova, X. A., & Parkhomenko, V. (2014). Attributive and Object Subcontexts in Inferring Good Maximally Redundant Tests. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 181–193).
    19. Leuenberger, S. (2014). Total Logic. Rev. Symb. Log., 7(3), 529–547.
    20. Kridlo, O., Antoni, L., & Krajci, S. (2014). Looking for Bonds between Nonhomogeneous Formal Contexts. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 83–94).
    21. Bourhis, P., Krötzsch, M., & Rudolph, S. (2014). How to Best Nest Regular Path Queries. In M. Bienvenu, M. Ortiz, R. Rosati, & M. Simkus (Eds.), Description Logics (Vol. 1193, pp. 404–415).
    22. Krötzsch, M., & Rudolph, S. (2014). Nominal Schemas in Description Logics: Complexities Clarified. In C. Baral, G. D. Giacomo, & T. Eiter (Eds.), KR. AAAI Press.
    23. Seki, H., & Kamiya, Y. (2014). Merging Closed Pattern Sets in Distributed Multi-Relational Data. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 71–82).
    24. Albacete, F. J. V., Peláez-Moreno, C., & Peñas, A. (2014). On Concept Lattices as Information Channels. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 119–130).
    25. Glasmachers, T., Naujoks, B., & Rudolph, G. (2014). Start Small, Grow Big? Saving Multi-objective Function Evaluations. In T. Bartz-Beielstein, J. Branke, B. Filipic, & J. Smith (Eds.), PPSN (Vol. 8672, pp. 579–588). Springer.
    26. Kuntze, N., Rudolph, C., & Hanka, O. (2014). Security foundation for a distributed cabin core architecture. In H. S. Venter, M. Loock, M. Coetzee, & M. M. Eloff (Eds.), ISSA (pp. 1–6). IEEE.
    27. Gnatyshak, D., Ignatov, D. I., Kuznetsov, S. O., & Nourine, L. (2014). A One-pass Triclustering Approach: Is There any Room for Big Data? In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 231–242).
    28. Dao, N. B., Bertet, K., & Revel, A. (2014). Reduction Dimension of Bags of Visual Words with FCA. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 219–230).
    29. Rudolph, S. (2014). The Two Views on Ontological Query Answering. In G. Gottlob & J. Pérez (Eds.), AMW (Vol. 1189).
    30. Rudolph, S., & Glimm, B. (2014). Nominals, Inverses, Counting, and Conjunctive Queries or: Why Infinity is your Friend! CoRR, abs/1401.3849.
    31. Sun, F., Lolenko, K., & Rudolph, J. (2014). Nonlinear observer design for state estimation during antilock braking. J. Systems & Control Engineering, 228(2), 78–86.
    32. Potoniec, J., Rudolph, S., & Lawrynowicz, A. (2014). Towards Combining Machine Learning with Attribute Exploration for Ontology Refinement. In M. Horridge, M. Rospocher, & J. van Ossenbruggen (Eds.), International Semantic Web Conference (Posters & Demos) (Vol. 1272, pp. 229–232).
    33. Thomazo, M., & Rudolph, S. (2014). Mixing Materialization and Query Rewriting for Existential Rules. In T. Schaub, G. Friedrich, & B. O’Sullivan (Eds.), ECAI (Vol. 263, pp. 897–902). IOS Press.
    34. Mertens, S. (2014). Stable Roommates Problem with Random Preferences. CoRR, abs/1401.5269.
    35. Bourhis, P., Krötzsch, M., & Rudolph, S. (2014). Query Containment for Highly Expressive Datalog Fragments. CoRR, abs/1406.7801.
    36. Beilstein, L. T., & Rudolph, S. (2014). Optimum function for minimum weight evaluation of structural joints. In E. Plödereder, L. Grunske, E. Schneider, & D. Ull (Eds.), GI-Jahrestagung: Vol. P-232 (pp. 1961–1965). GI.
    37. Bartl, E., & Konecny, J. (2014). Formal L-concepts with Rough Intents. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 207–218).
    38. Bedeley, R., & Palvia, P. (2014). A Study of the Issues of E-Health Care in Developing Countries: The Case of Ghana. AMCIS.
    39. Rodríguez-Jiménez, J. M., Cordero, P., Enciso, M., & Mora, A. (2014). A Generalized Framework to Consider Positive and Negative Attributes in Formal Concept Analysis. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 267–278).
    40. Proceedings of the Eleventh International Conference on Concept Lattices and Their Applications, Košice, Slovakia, October 7-10, 2014. (2014). In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252).
    41. Rudolph-Lilith, M., & Muller, L. E. (2014). On a representation of the Verhulst logistic map. Discrete Mathematics, 324, 19–27.
    42. Al-Msie’deen, R., Huchard, M., Seriai, A., Urtado, C., & Vauttier, S. (2014). Reverse Engineering Feature Models from Software Configurations using Formal Concept Analysis. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 95–106).
    43. Holzer, S. (2014). Distance computation, information dissemination, and wireless capacity in networks. (pp. 1–242). Hartung-Gorre.
    44. Quadflieg, J., Preuss, M., & Rudolph, G. (2014). Driving as a human: a track learning based adaptable architecture for a car racing controller. Genetic Programming and Evolvable Machines, 15(4), 433–476.
    45. Alam, M., & Napoli, A. (2014). Defining Views with Formal Concept Analysis for Understanding SPARQL Query Results. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 255–266).
    46. Kaytoue, M., Codocedo, V., Baixeries, J., & Napoli, A. (2014). Three Interrelated FCA Methods for Mining Biclusters of Similar Values on Columns. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 243–254).
    47. Antoni, L., Gunis, J., Krajci, S., Kridlo, O., & Snajder, L. (2014). The Educational Tasks and Objectives System within a Formal Context. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 35–46).
    48. Otaki, K., Ikeda, M., & Yamamoto, A. (2014). Pattern Structures for Understanding Episode Patterns. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 47–58).
    49. Reuter, S. (2014). Multi-object tracking using random finite sets. (pp. 1–214). University of Ulm.
    50. Darken, R. P., & Peterson, B. (2014). Spatial Orientation, Wayfinding, and Representation. In K. S. Hale & K. M. Stanney (Eds.), Handbook of Virtual Environments, 2nd ed. (pp. 467–491). CRC Press.
    51. Meyer, S. (2014). Verbundoptimierung und Realisierung echtzeitfähiger blinder Kanalentzerrungs- und Synchronisationsmodule. (pp. 1–174). Shaker.
    52. Heckmüller, S. (2014). Modellbasierte Lasttransformationen. Praxis Der Informationsverarbeitung Und Kommunikation, 37(2), 73–80.
    53. Rudolph, M., Schwarz, R., & Jung, C. (2014). Security policy specification templates for critical infrastructure services in the cloud. ICITST, 61–66.
    54. Huhn, M., Gerken, S., & Rudolph, C. (2014). CeMoSS - Certification and Model-Driven Development of Safe and Secure Software. In W. Hasselbring & N. C. Ehmke (Eds.), Software Engineering: Vol. P-227 (pp. 207–208). GI.
    55. Lorenzo, E. R., Bertet, K., Cordero, P., Enciso, M., & Mora, A. (2014). The Direct-optimal Basis via Reductions. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 145–156).
    56. Fischer, S. (2014). Big Data: Herausforderungen und Potenziale für deutsche Softwareunternehmen. Informatik Spektrum, 37(2), 112–119.
    57. Rudolph-Lilith, M., & Muller, L. E. (2014). Aspects of randomness in neural graph structures. Biological Cybernetics, 108(4), 381–396.
    58. Schmidt, S. (2014). A Two Stage CVT / Eikonal Convection Mesh Deformation Approach for Large Nodal Deformations. CoRR, abs/1411.7663.
    59. Pattison, T., & Ceglar, A. (2014). Interaction Challenges for the Dynamic Construction of Partially-Ordered Sets. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 23–34).
    60. Nikitina, N., & Rudolph, S. (2014). (Non-)Succinctness of uniform interpolants of general terminologies in the description logic EL. Artif. Intell., 215, 120–140.
    61. Coupelon, O., Dia, D., Labernia, F., Loiseau, Y., & Raynaud, O. (2014). Using Closed Itemsets for Implicit User Authentication in Web Browsing. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 131–144).
    62. Aier, S. (2014). The role of organizational culture for grounding, management, guidance and effectiveness of enterprise architecture principles. Inf. Syst. E-Business Management, 12(1), 43–70.
    63. Gottlob, G., Rudolph, S., & Simkus, M. (2014). Expressiveness of guarded existential rule languages. In R. Hull & M. Grohe (Eds.), PODS (pp. 27–38). ACM.
    64. Saada, H., Huchard, M., Liquiere, M., & Nebut, C. (2014). Learning Model Transformation Patterns using Graph Generalization. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 11–22).
    65. Krötzsch, M., & Rudolph, S. (2014). Complexities of Nominal Schemas. In M. Bienvenu, M. Ortiz, R. Rosati, & M. Simkus (Eds.), Description Logics (Vol. 1193, pp. 270–273).
    66. Ikeda, M., Otaki, K., & Yamamoto, A. (2014). Formal Concept Analysis for Process Enhancement Based on a Pair of Perspectives. In K. Bertet & S. Rudolph (Eds.), CLA (Vol. 1252, pp. 59–70).
    67. Scheuren, S. (2014). Process-Optimized Planning for Cooperative Mobile Robots. KI, 28(4), 325–328.
    68. Spitz, S. (2014). Vertrauen und Sicherheit bei Smartphones. Datenschutz Und Datensicherheit, 38(10), 671–674.
  9. 2013

    1. Konz, M., & Rudolph, J. (2013). Quadrotor Tracking Control Based on a Moving Frame. In S. Tarbouriech & M. Krstic (Eds.), NOLCOS (pp. 80–85). International Federation of Automatic Control.
    2. Stauch, C., Gehring, N., & Rudolph, J. (2013). Algebraic parameter identification for infinite dimensional fluid transmission line models. J. Systems & Control Engineering, 227(10), 733–743.
    3. Pech, S. (2013). Software Agents in Industrial Automation Systems. IEEE Software, 30(3), 20–24.
    4. Kuntze, N., Larbig, P., & Rudolph, C. (2013). Demo: Zero touch configuration. In F. D. Turck, Y. Diao, C. S. Hong, D. Medhi, & R. Sadre (Eds.), IM (pp. 1076–1077). IEEE.
    5. Krötzsch, M., Rudolph, S., & Hitzler, P. (2013). Complexities of Horn Description Logics. ACM Trans. Comput. Log., 14(1), 2:1-2:36.
    6. Dreiseitl, S. (2013). Feature Selection for Unsupervised Learning via Comparison of Distance Matrices. In R. Moreno-Díaz, F. Pichler, & A. Quesada-Arencibia (Eds.), EUROCAST (1) (Vol. 8111, pp. 203–210). Springer.
    7. IV, R. L. M., & Briscoe, E. (2013). Layered behavioral trace modeling for threat detection. In K. Glass, R. Colbaugh, A. Sanfilippo, A. Kao, M. Gabbay, C. Corley, J. Li, L. Khan, A. Wynne, L. Coote, W. Mao, D. Zeng, & A. Yaghoobi (Eds.), ISI (pp. 173–175). IEEE.
    8. Rudolph, K. (2013). Pattern Popularity in 132-Avoiding Permutations. Electr. J. Comb., 20(1), P8.
    9. Rudolph, G. (2013). Convergence Rates of Evolutionary Algorithms for Quadratic Convex Functions with Rank-Deficient Hessian. In M. Tomassini, A. Antonioni, F. Daolio, & P. Buesser (Eds.), ICANNGA (Vol. 7824, pp. 151–160). Springer.
    10. Schulz, S. (2013). System Description: E 1.8. In K. L. McMillan, A. Middeldorp, & A. Voronkov (Eds.), LPAR (Vol. 8312, pp. 735–743). Springer.
    11. Rudolph-Lilith, M., & Muller, L. E. (2013). Aspects of randomness in neural graph structures. CoRR, abs/1310.5062.
    12. Rudolph, N. (2013). TOTA: a construction set for the impending apocalypse. In N. “Nick” Sawhney, E. Reardon, & J. P. Hourcade (Eds.), IDC (pp. 554–556). ACM.
    13. Herrera-Martí, D. A., & Rudolph, T. (2013). Loss tolerance with a concatenated graph state. Quantum Information & Computation, 13(11–12), 995–1006.
    14. Baumstark, L., & Rudolph, E. (2013). Automated online grading for virtual machine-based systems administration courses. In T. Camp, P. T. Tymann, J. D. Dougherty, & K. Nagel (Eds.), SIGCSE (pp. 477–482). ACM.
    15. Kiltz, L., Janocha, M., & Rudolph, J. (2013). Algebraic estimation of impact times: Juggling a ball with a magnetically levitated plate. ICSCS, 145–149.
    16. Rudolph, S., & Krötzsch, M. (2013). Flag & check: data access with monadically defined queries. In R. Hull & W. Fan (Eds.), PODS (pp. 151–162). ACM.
    17. Rudolph, J. (2013). Fluoreszenzspektroskopie an K-Schalen-Übergängen hochgeladener Eisenionen. Justus Liebig University Giessen.
    18. Tran, T., Ladwig, G., & Rudolph, S. (2013). Managing Structured and Semistructured RDF Data Using Structure Indexes. IEEE Trans. Knowl. Data Eng., 25(9), 2076–2089.
    19. Huhn, M., Gerken, S., & Rudolph, C. (2013). ZeMoSS-Workshop: Zertifizierung und modellgetriebene Entwicklung sicherer Software. In S. Kowalewski & B. Rumpe (Eds.), Software Engineering: Vol. P-213 (p. 367). GI.
    20. Wong, S. (2013). Embedded Reconfigurable Architectures. In P. Brisk, J. G. F. Coutinho, & P. C. Diniz (Eds.), ARC (Vol. 7806, pp. 229–230). Springer.
    21. Künster, S. (2013). Räumliche Informationen bei Entscheidungen einbeziehen - mit ArcGIS. In M. Clasen, K. C. Kersebaum, A. Meyer-Aurich, & B. Theuvsen (Eds.), GIL Jahrestagung: Vol. P-211 (pp. 179–182). GI.
    22. García-Rudolph, A., & Gibert, K. (2013). Finding Patterns in Cognitive Rehabilitation. In K. Gibert, V. J. Botti, & R. R. Bolaño (Eds.), CCIA (Vol. 256, pp. 193–202). IOS Press.
    23. Wessing, S., Preuss, M., & Rudolph, G. (2013). Niching by multiobjectivization with neighbor information: Trade-offs and benefits. IEEE Congress on Evolutionary Computation, 103–110.
    24. Stephan, V. (2013). Ortsbezogene Visualisierung von komplexen relationalen Daten am Beispiel von Food Environment Maps. In H.-C. Hobohm (Ed.), ISI (Vol. 63, pp. 442–447). Verlag Werner Hülsbusch.
    25. Barnklau, H., Gensior, A., & Rudolph, J. (2013). A Model-Based Control Scheme for Modular Multilevel Converters. IEEE Trans. Industrial Electronics, 60(12), 5359–5375.
    26. Vatolkin, I., & Rudolph, G. (2013). Interpretable Music Categorisation Based on Fuzzy Rules and High-Level Audio Features. In B. Lausen, S. Krolak-Schwerdt, & M. Böhmer (Eds.), ECDA (pp. 423–432). Springer.
    27. Kiltz, L., & Rudolph, J. (2013). Parametrization of algebraic numerical differentiators to achieve desired filter characteristics. CDC, 7010–7015.
    28. Wasielewski, S. (2013). Anwendung und Bewertung verschiedener Verfahren zur Entgiftung PBSM-haltiger Produktionsabwässer hinsichtlich ihrer Übertragbarkeit auf die Anwendung in einer Pilotanlage unter tropischen Bedingungen am Beispiel der Firma CPC: Diplomarbeit.
    29. Mattern, V., Vatolkin, I., & Rudolph, G. (2013). A Case Study About the Effort to Classify Music Intervals by Chroma and Spectrum Analysis. In B. Lausen, D. V. den Poel, & A. Ultsch (Eds.), Algorithms from and for Nature and Life (pp. 519–528). Springer.
    30. Kuchem, M., Preuss, M., & Rudolph, G. (2013). Multi-objective assessment of pre-optimized build orders exemplified for StarCraft 2. CIG, 1–8.
    31. Schneider, M., Rudolph, S., & Sutcliffe, G. (2013). Modeling in OWL 2 without Restrictions. In M. Rodriguez-Muro, S. Jupp, & K. Srinivas (Eds.), OWLED (Vol. 1080).
    32. Kuntze, N., & Rudolph, C. (2013). On the automatic establishment of security relations for devices. In F. D. Turck, Y. Diao, C. S. Hong, D. Medhi, & R. Sadre (Eds.), IM (pp. 832–835). IEEE.
    33. Böhm, S. (2013). Behavior and expectations of mobile job seekers: an industry study focusing on job boards. In T. W. Ferratt, E. M. Trauth, K. D. Joshi, & A. J. Morgan (Eds.), CPR (pp. 105–110). ACM.
  10. 2012

    1. Nikitina, N., & Rudolph, S. (2012). ExpExpExplosion: Uniform Interpolation in General EL Terminologies. In L. D. Raedt, C. Bessiere, D. Dubois, P. Doherty, P. Frasconi, F. Heintz, & P. J. F. Lucas (Eds.), ECAI (Vol. 242, pp. 618–623). IOS Press.
    2. Gehring, N., Rudolph, J., & Woittennek, F. (2012). Prediction-Free Tracking Control for Systems with Incommensurate Lumped and Distributed Delays: Two Examples. In R. Sipahi (Ed.), TDS (pp. 37–42). International Federation of Automatic Control.
    3. Huhn, M., Gerken, S., & Rudolph, C. (2012). Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS 2012). In S. Jähnichen, A. Küpper, & S. Albayrak (Eds.), Software Engineering: Vol. P-198 (pp. 198–200). GI.
    4. Augenstein, I., Padó, S., & Rudolph, S. (2012). LODifier: Generating Linked Data from Unstructured Text. In E. Simperl, P. Cimiano, A. Polleres, Ó. Corcho, & V. Presutti (Eds.), ESWC (Vol. 7295, pp. 210–224). Springer.
    5. Rudolph, G. (2012). Stochastic Convergence. In G. Rozenberg, T. Bäck, & J. N. Kok (Eds.), Handbook of Natural Computing (pp. 847–869). Springer.
    6. Ferré, S., & Rudolph, S. (2012). Advocatus Diaboli - Exploratory Enrichment of Ontologies with Negative Constraints. In A. ten Teije, J. Völker, S. Handschuh, H. Stuckenschmidt, M. d’Aquin, A. Nikolov, N. Aussenac-Gilles, & N. Hernandez (Eds.), EKAW (Vol. 7603, pp. 42–56). Springer.
    7. Dubois, C., & Sock, R. (2012). Traitement audiovisuel lors d’une tâche de discrimination syllabique : une étude EEG/IRMf simultanée (Audiovisual processing in syllabic discrimination task: a simultaneous fMRI-EEG study) in French. In L. Besacier, B. Lecouteux, & G. Sérasset (Eds.), JEP-TALN-RECITAL 2012 (pp. 851–858). ATALA/AFCP.
    8. Walter, S. (2012). E. Francesconi, S. Montemagni, W. Peters, D. Tiscornia: Semantic Processing of Legal Texts: where the language of law meets the law of language (Lecture notes in computer science: lecture notes in artificial intelligence, Vol 6036) - 1st Edition, Springer, 2010, XII, 249 pp, 49.22 €. Language Resources and Evaluation, 46(1), 109–115.
    9. Mennicke, S. (2012). An Operational Petri Net Semantics for the Join-Calculus. In B. Luttik & M. A. Reniers (Eds.), EXPRESS/SOS (Vol. 89, pp. 131–147).
    10. Collon, C., & Rudolph, J. (2012). Invariant feedback control for the kinematic car on the sphere. Systems & Control Letters, 61(10), 967–972.
    11. Grimmelikhuijsen, S. (2012). A good man but a bad wizard. About the limits and future of transparency of democratic governments. Information Polity, 17(3–4), 293–302.
    12. Szalai, S. (2012). Strafbarkeit von Outsourcing. Wirtschaftsinformatik & Management, 2012(5), 44–51.
    13. Günnemann, S. (2012). Subspace clustering for complex data. RWTH Aachen University.
    14. Rudolph, C., & Fuchs, A. (2012). Redefining Security Engineering. In A. Levi, M. Badra, M. Cesana, M. Ghassemian, Ö. Gürbüz, N. Jabeur, M. Klonowski, A. Maña, S. Sargento, & S. Zeadally (Eds.), NTMS (pp. 1–6). IEEE.
    15. Schneider, M., Rudolph, S., & Sutcliffe, G. (2012). Modeling in OWL 2 without Restrictions. CoRR, abs/1212.2902.
    16. Bock, J., Rudolph, S., & Mutter, M. (2012). More Than the Sum of Its Parts - Holistic Ontology Alignment by Population-Based Optimisation. In T. Lukasiewicz & A. Sali (Eds.), FoIKS (Vol. 7153, pp. 71–90). Springer.
    17. Gradl, S. (2012). Performance-Modellierung und Simulation eines SAP-ERP-Systems. (pp. 1–200). Technical University Munich.
    18. Congote, J., Novo, E., Kabongo, L., Ginsburg, D., Gerhard, S., Pienaar, R., & Ruiz, O. E. (2012). Real-time Volume Rendering and Tractography Visualization on the Web. Journal of WSCG, 20(2), 81–88.
    19. Nikitina, N., & Rudolph, S. (2012). On the (Non-)Succinctness of Uniform Interpolation in General $EL$ Terminologies. In M. Krötzsch & U. Straccia (Eds.), RR (Vol. 7497, pp. 246–249). Springer.
    20. Falke, S. (2012). Review of transitions and trees: an introduction to structural operational semantics, by Hans Hüttel. SIGACT News, 43(4), 34–37.
    21. Rudolph, S. (2012). Some Notes on Managing Closure Operators. In F. Domenach, D. I. Ignatov, & J. Poelmans (Eds.), ICFCA (Vol. 7278, pp. 278–291). Springer.
    22. Groß, J., & Rudolph, S. (2012). Generating simulation models from UML - a FireSat example. In G. A. Wainer & P. J. Mosterman (Eds.), SpringSim (TMS-DEVS) (p. 25). SCS/ACM.
    23. Kitchovitch, S. (2012). Computational modelling and analysis of seasonal influenza transmission and evolution. University of Cambridge, UK.
    24. Kramer, O., Igel, C., & Rudolph, G. (2012). Evolutionary kernel machines. Evolutionary Intelligence, 5(3), 151–152.
    25. Nikitina, N., Rudolph, S., & Glimm, B. (2012). Interactive ontology revision. J. Web Semant., 12, 118–130.
    26. Dubois, C., & Sock, R. (2012). Audiovisual discrimination of CV syllables: a simultaneous fMRI-EEG study. INTERSPEECH, 410–413.
    27. Spitz, S. (2012). Neue Mobiltelefone: Geldbörse und Bankfiliale zugleich - Sicherheitslösungen für mobile Geldgeschäfte. Datenschutz Und Datensicherheit, 36(3), 185–188.
    28. Kajan, R., Herout, A., & Zachariá, M. (2012). Selective Availability fpr Security Monitoring in IPv6 Networks. In M. Rezagholi & H. Gläser (Eds.), STeP (pp. 43–54). Oldenbourg Verlag, Munich.
    29. Merz, S. (2012). Stuttering Equivalence. Archive of Formal Proofs, 2012.
    30. Rudolph, S., Heisserman, J., & Culley, S. (2012). Design Computing and Cognition (DCC’10). AI EDAM, 26(2), 105–106.
    31. Schwiebert, S. (2012). Tesla - ein virtuelles Labor für experimentelle Computer- und Korpuslinguistik. University of Cologne.
    32. Rudolph, G. (2012). Evolutionary Strategies. In G. Rozenberg, T. Bäck, & J. N. Kok (Eds.), Handbook of Natural Computing (pp. 673–698). Springer.
    33. Kreutzer, S. (2012). On the Parameterized Intractability of Monadic Second-Order Logic. Logical Methods in Computer Science, 8(1), Article 1.
    34. Rudolph, S., Krötzsch, M., & Hitzler, P. (2012). Type-elimination-based reasoning for the description logic SHIQbs using decision diagrams and disjunctive datalog. Logical Methods in Computer Science, 8(1), Article 1.
    35. Rudolph, S., & Croitoru, M. (2012). Multi-Agent Knowledge Allocation. In M. Bramer & M. Petridis (Eds.), SGAI Conf. (pp. 165–178). Springer.
    36. Kuntze, N., Rudolph, C., & Paatero, J. (2012). Establishing Trust between Nodes in Mobile Ad-Hoc Networks. In C. J. Mitchell & A. Tomlinson (Eds.), INTRUST (Vol. 7711, pp. 48–62). Springer.
    37. Bechet, M., Hirsch, F., & Sock, R. (2012). F2/F3 d’occlusives sonores chez des locuteurs porteurs de fente palatine (F2/F3 of voiced plosives and F1/F2 of vowel in VCV Sequences in Children with a Cleft Palate-An acoustic Study) in French. In L. Besacier, B. Lecouteux, & G. Sérasset (Eds.), JEP-TALN-RECITAL 2012 (pp. 561–568). ATALA/AFCP.
    38. Croitoru, M., & Rudolph, S. (2012). Exclusivity-based allocation of knowledge. In W. van der Hoek, L. Padgham, V. Conitzer, & M. Winikoff (Eds.), AAMAS (pp. 1249–1250). IFAAMAS.
    39. Büttner, S. (2012). Forschungsaktivitäten am Fachbereich Informationswissenschaften der Fachhochschule Potsdam. Inf. Wiss. & Praxis, 63(1), 7–13.
    40. Rudolph-Lilith, M., Dubois, M., & Destexhe, A. (2012). Analytical Integrate-and-Fire Neuron Models with Conductance-Based Dynamics and Realistic Postsynaptic Potential Time Course for Event-Driven Simulation Strategies. Neural Computation, 24(6), 1426–1461.
    41. Rudolph, M., & Schwarz, R. (2012). A Critical Survey of Security Indicator Approaches. ARES, 291–300.
    42. Schleim, S. (2012). Mind Reading - Neuroimaging as a gaze into the innermost of the psyche. Datenschutz Und Datensicherheit, 36(5), 344–349.
    43. Rudolph, G., Trautmann, H., & Schütze, O. (2012). Homogene Approximation der Paretofront bei mehrkriteriellen Kontrollproblemen. Automatisierungstechnik, 60(10), 612–621.
  11. 2011

    1. Bode, S. (2011). Qualitätsziel-orientierter Architekturentwurf und Traceability für weiterentwickelbare Software-Systeme. In S. Hölldobler (Ed.), Ausgezeichnete Informatikdissertationen: Vol. D-12 (pp. 21–30). GI.
    2. Grimmelikhuijsen, S. (2011). Being transparent or spinning the message? An experiment into the effects of varying message content on trust in government. Information Polity, 16(1), 35–50.
    3. Rudolph, T., & Salwen, J. (2011). Proposed SoSE strategy for the air force electronic Systems Center. SoSE, 25–30.
    4. Huang, S., Li, Q., & Hitzler, P. (2011). Paraconsistent Semantics for Hybrid MKNF Knowledge Bases. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 93–107). Springer.
    5. Heckmüller, S. (2011). Einsatz von Lasttransformationen und ihren Invertierungen zur realitätsnahen Lastmodellierung in Rechnernetzen. (pp. 1–222). Shaker.
    6. Kotowski, J., Bry, F., & Brodt, S. (2011). Reasoning as Axioms Change - Incremental View Maintenance Reconsidered. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 139–154). Springer.
    7. Rezk, M., & Kifer, M. (2011). Reasoning with Actions in Transaction Logic. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 201–216). Springer.
    8. Winkelvos, T., Rudolph, C., & Repp, J. (2011). A Property Based Security Risk Analysis Through Weighted Simulation. In H. S. Venter, M. Coetzee, & M. Loock (Eds.), ISSA. ISSA, Pretoria, South Africa.
    9. Rudolph, S. (2011). Foundations of Description Logics. In A. Polleres, C. d’Amato, M. Arenas, S. Handschuh, P. Kroner, S. Ossowski, & P. F. Patel-Schneider (Eds.), Reasoning Web (Vol. 6848, pp. 76–136). Springer.
    10. Mehdi, A., & Rudolph, S. (2011). Practical Epistemic Entailment Checking in SROIQ. In R. Rosati, S. Rudolph, & M. Zakharyaschev (Eds.), Description Logics (Vol. 745).
    11. Weißleder, S. (2011). Towards Impact Analysis of Test Goal Prioritization on the Efficient Execution of Automatically Generated Test Suites Based on State Machines. In M. Núñez, R. M. Hierons, & M. G. Merayo (Eds.), QSIC (pp. 150–155). IEEE Computer Society.
    12. Hogan, A. (2011). Integrating Linked Data through RDFS and OWL: Some Lessons Learnt. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 250–256). Springer.
    13. Kliegr, T., Hazucha, A., & Marek, T. (2011). Instant Feedback on Discovered Association Rules with PMML-Based Query-by-Example. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 257–262). Springer.
    14. Collon, C., & Rudolph, J. (2011). Zwei Beispiele für die Berücksichtigung von Symmetrien beim Reglerentwurf. Automatisierungstechnik, 59(9), 540–551.
    15. Preuss, M., Quadflieg, J., & Rudolph, G. (2011). TORCS sensor noise removal and multi-objective track selection for driving style adaptation. In S.-B. Cho, S. M. Lucas, & P. Hingston (Eds.), CIG (pp. 337–344). IEEE.
    16. Bouzidi, K. R., Faron-Zucker, C., Fiés, B., & Thanh, N. L. (2011). An Ontological Approach for Modeling Technical Standards for Compliance Checking. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 244–249). Springer.
    17. Xiao, G., & Eiter, T. (2011). Inline Evaluation of Hybrid Knowledge Bases - PhD Description. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 300–305). Springer.
    18. Schockaert, S., & Prade, H. (2011). Interpolation and Extrapolation in Conceptual Spaces: A Case Study in the Music Domain. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 217–231). Springer.
    19. Nguyen, T. B. (2011). Decidability of Unification in EL without Top Constructor. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 170–184). Springer.
    20. Mugnier, M.-L. (2011). Ontological Query Answering with Existential Rules. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 2–23). Springer.
    21. Kikot, S., Kontchakov, R., & Zakharyaschev, M. (2011). Polynomial Conjunctive Query Rewriting under Unary Inclusion Dependencies. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 124–138). Springer.
    22. Rudolph, C. (2011). Trust Areas: A Security Paradigm for the Future Internet. In C. A. Meadows & M. C. F. Gago (Eds.), STM (Vol. 7170, pp. 22–27). Springer.
    23. Baget, J.-F., Mugnier, M.-L., & Thomazo, M. (2011). Towards Farsighted Dependencies for Existential Rules. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 30–45). Springer.
    24. Furche, T., Gottlob, G., Grasso, G., Orsi, G., Schallhart, C., & Wang, C. (2011). Little Knowledge Rules the Web: Domain-Centric Result Page Extraction. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 61–76). Springer.
    25. Ortiz, M., Rudolph, S., & Simkus, M. (2011). Query Answering in the Horn Fragments of the Description Logics SHOIQ and SROIQ. In T. Walsh (Ed.), IJCAI (pp. 1039–1044). IJCAI/AAAI.
    26. Rudolph, S., & Schneider, M. (2011). Utility and Feasibility of Reasoning beyond Decidability in Semantic Technologies. In S. Andrews, S. Polovina, R. Hill, & B. Akhgar (Eds.), ICCS (Vol. 6828, pp. 19–34). Springer.
    27. Espil, M. M. (2011). RDF Semantics for Web Association Rules. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 269–274). Springer.
    28. Fodor, P., Anicic, D., & Rudolph, S. (2011). Results on Out-of-Order Event Processing. In R. Rocha & J. Launchbury (Eds.), PADL (Vol. 6539, pp. 220–234). Springer.
    29. Mehdi, A., Rudolph, S., & Grimm, S. (2011). Epistemic Querying of OWL Knowledge Bases. In G. Antoniou, M. Grobelnik, E. P. B. Simperl, B. Parsia, D. Plexousakis, P. D. Leenheer, & J. Z. Pan (Eds.), ESWC (1) (Vol. 6643, pp. 397–409). Springer.
    30. Quadflieg, J., Preuss, M., & Rudolph, G. (2011). Driving Faster Than a Human Player. In C. D. Chio, S. Cagnoni, C. Cotta, M. Ebner, A. Ekárt, A. Esparcia-Alcázar, J. J. M. Guervós, F. Neri, M. Preuss, H. Richter, J. Togelius, & G. N. Yannakakis (Eds.), EvoApplications (1) (Vol. 6624, pp. 143–152). Springer.
    31. Fuchs, A., Gürgens, S., & Rudolph, C. (2011). Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. JIP, 19, 274–291.
    32. Krötzsch, M., & Rudolph, S. (2011). Extending Decidable Existential Rules by Joining Acyclicity and Guardedness. In T. Walsh (Ed.), IJCAI (pp. 963–968). IJCAI/AAAI.
    33. Meisel, S. (2011). Anticipatory Optimization for Dynamic Decision Making. In Operations research / computer science interfaces series (Vol. 51, pp. I–XIII, 1–182). Springer.
    34. Doesinger, S. (2011). Medienführerschein, wozu? Datenschutz Und Datensicherheit, 35(9), 648–649.
    35. Boran, A., Bedini, I., Matheus, C. J., Patel-Schneider, P. F., & Keeney, J. (2011). A Smart Campus Prototype for Demonstrating the Semantic Integration of Heterogeneous Data. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 238–243). Springer.
    36. Arenas, M. (2011). Exchanging More Than Complete Data. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, p. 1). Springer.
    37. Moodley, K., Meyer, T., & Varzinczak, I. J. (2011). Root Justifications for Ontology Repair. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 275–280). Springer.
    38. Nikitina, N., Rudolph, S., & Glimm, B. (2011). Reasoning-Supported Interactive Revision of Knowledge Bases. In R. Rosati, S. Rudolph, & M. Zakharyaschev (Eds.), Description Logics (Vol. 745).
    39. Noessner, J., & Niepert, M. (2011). ELOG: A Probabilistic Reasoner for OWL EL. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 281–286). Springer.
    40. Wessing, S., Preuss, M., & Rudolph, G. (2011). When parameter tuning actually is parameter control. In N. Krasnogor & P. L. Lanzi (Eds.), GECCO (pp. 821–828). ACM.
    41. Mehdi, A., & Rudolph, S. (2011). Revisiting Semantics for Epistemic Extensions of Description Logics. In W. Burgard & D. Roth (Eds.), AAAI. AAAI Press.
    42. Krisnadhi, A. A., Sengupta, K., & Hitzler, P. (2011). Local Closed World Semantics: Grounded Circumscription for Description Logics. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 263–268). Springer.
    43. Bischof, S., Lopes, N., & Polleres, A. (2011). Improve Efficiency of Mapping Data between XML and RDF with XSPARQL. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 232–237). Springer.
    44. Gottlob, G., Lukasiewicz, T., & Simari, G. I. (2011). Conjunctive Query Answering in Probabilistic Datalog+/- Ontologies. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 77–92). Springer.
    45. Kuntze, N., & Rudolph, C. (2011). Secure Digital Chains of Evidence. In R. F. Erbacher, R. H. Campbell, & Y. Guan (Eds.), SADFE (pp. 1–8). IEEE Computer Society.
    46. Schlicht, A., & Stuckenschmidt, H. (2011). MapResolve. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 294–299). Springer.
    47. Jung, C., Rudolph, M., & Schwarz, R. (2011). Security Evaluation of Service-Oriented Systems Using the SiSOA Method. IJSSE, 2(4), 19–33.
    48. Shin, J., Triebel, R., & Siegwart, R. (2011). Unsupervised 3D Object Discovery and Categorization for Mobile Robots. In H. I. Christensen & O. Khatib (Eds.), ISRR (Vol. 100, pp. 61–76). Springer.
    49. Rezk, M., & Nutt, W. (2011). Combining Production Systems and Ontologies. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 287–293). Springer.
    50. Delbru, R., Tummarello, G., & Polleres, A. (2011). Context-Dependent OWL Reasoning in Sindice - Experiences and Lessons Learnt. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 46–60). Springer.
    51. Frank, S. (2011). Efficient Constraint Solving in Dynamic Languages. Berlin Institute of Technology.
    52. Lembo, D., Lenzerini, M., Rosati, R., Ruzzi, M., & Savo, D. F. (2011). Query Rewriting for Inconsistent DL-Lite Ontologies. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 155–169). Springer.
    53. Khandelwal, A., Jacobi, I., & Kagal, L. (2011). Linked Rules: Principles for Rule Reuse on the Web. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 108–123). Springer.
    54. Rudolph, G. (2011). On geometrically fast convergence to optimal dominated hypervolume of set-based multiobjective evolutionary algorithms. IEEE Congress on Evolutionary Computation, 1719–1723.
    55. Jung, C., Rudolph, M., & Schwarz, R. (2011). Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base. ARES, 698–703.
    56. Nikitina, N., Glimm, B., & Rudolph, S. (2011). Wheat and Chaff - Practically Feasible Interactive Ontology Revision. In L. Aroyo, C. Welty, H. Alani, J. Taylor, A. Bernstein, L. Kagal, N. F. Noy, & E. Blomqvist (Eds.), International Semantic Web Conference (1) (Vol. 7031, pp. 487–503). Springer.
    57. Reuter, C., Dadam, P., Rudolph, S., Deiters, W., & Trillsch, S. (2011). Guarded Process Spaces (GPS): A Navigation System towards Creation and Dynamic Change of Healthcare Processes from the End-User’s Perspective. In F. Daniel, K. Barkaoui, & S. Dustdar (Eds.), Business Process Management Workshops (2) (Vol. 100, pp. 237–248). Springer.
    58. Web Reasoning and Rule Systems - 5th International Conference, RR 2011, Galway, Ireland, August 29-30, 2011. Proceedings. (2011). In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902). Springer.
    59. Wieschebrink, S. (2011). Collaborative editing of multimodal annotation data. In M. R. B. Hardy & F. Wm. Tompa (Eds.), ACM Symposium on Document Engineering (pp. 69–72). ACM.
    60. Vatolkin, I., Preuß, M., & Rudolph, G. (2011). Multi-objective feature selection in music genre and style recognition tasks. In N. Krasnogor & P. L. Lanzi (Eds.), GECCO (pp. 411–418). ACM.
    61. Rezk, M., & Kifer, M. (2011). On the Equivalence between the $L_1$ Action Language and Partial Actions in Transaction Logic. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 185–200). Springer.
    62. Eng, T. L., & Mitchell, R. (2011). Continued assessment of students’ learning experience in an oral communication course at MIT for EECS majors. In J. B. Thompson, E. O. Navarro, & D. Port (Eds.), CSEE&T (pp. 439–443). IEEE Computer Society.
    63. de Sainte Marie, C., Escudero, M. I., & Rosina, P. (2011). The ONTORULE Project : Where Ontology Meets Business Rules. In S. Rudolph & C. Gutiérrez (Eds.), RR (Vol. 6902, pp. 24–29). Springer.
    64. Colombo, C., Francalanza, A., & Gatt, R. (2011). Elarva: A Monitoring Tool for Erlang. In S. Khurshid & K. Sen (Eds.), RV (Vol. 7186, pp. 370–374). Springer.
    65. Beume, N., Laumanns, M., & Rudolph, G. (2011). Convergence rates of SMS-EMOA on continuous bi-objective problem classes. In H.-G. Beyer & W. B. Langdon (Eds.), FOGA (pp. 243–252). ACM.
  12. 2010

    1. Fuchs, A., Gürgens, S., & Rudolph, C. (2010). A Formal Notion of Trust - Enabling Reasoning about Security Properties. In M. Nishigaki, A. Jøsang, Y. Murayama, & S. Marsh (Eds.), IFIPTM (Vol. 321, pp. 200–215). Springer.
    2. Rudolph, S., & Glimm, B. (2010). Nominals, Inverses, Counting, and Conjunctive Queries or: Why Infinity is your Friend! J. Artif. Intell. Res., 39, 429–481.
    3. Rudolph, J., & Thiemann, P. (2010). Mnemonics: type-safe bytecode generation at run time. Higher-Order and Symbolic Computation, 23(3), 371–407.
    4. Prätsch, S. (2010). Ein Modellprüfungsansatz für die Erreichbarkeitspüfung von Process Algebra Nets. Informatiktage, S-9, 89–92.
    5. Spinello, L., Triebel, R., & Siegwart, R. (2010). Multiclass Multimodal Detection and Tracking in Urban Environments. I. J. Robotics Res., 29(12), 1498–1515.
    6. Otto, S., & Bannenberg, T. (2010). Decentralized Evolutionary Agents Streamlining Logistic Network Design. In R. Schaefer, C. Cotta, J. Kolodziej, & G. Rudolph (Eds.), PPSN (2) (Vol. 6239, pp. 240–249). Springer.
    7. Abecker, A., Bloehdorn, S., & Grimm, S. (2010). Application of Semantic Technologies. AST2010. 5th International Workshop (Vorwort). In K.-P. Fähnrich & B. Franczyk (Eds.), GI Jahrestagung (2): Vol. P-176 (pp. 71–72). GI.
    8. Hitzler, P., Krötzsch, M., & Rudolph, S. (2010). Foundations of Semantic Web Technologies. Chapman and Hall/CRC Press.
    9. Knüppel, T., Rudolph, J., & Woittennek, F. (2010). Flachheitsbasierte Trajektorienplanung für semilineare hyperbolische Systeme mit Randeingriff (Flatness based Trajectory Planning for Boundary Controlled Semi-linear Hyperbolic Systems). Automatisierungstechnik, 58(3), 117–127.
    10. Knüppel, T., Woittennek, F., & Rudolph, J. (2010). Flatness-based trajectory planning for the shallow water equations. CDC, 2960–2965.
    11. Rudolph, S., & Giesbrecht, E. (2010). Compositional Matrix-Space Models of Language. In J. Hajic, S. Carberry, & S. Clark (Eds.), ACL (pp. 907–916). The Association for Computer Linguistics.
    12. Cimiano, P., Rudolph, S., & Hartfiel, H. (2010). Computing intensional answers to questions - An inductive logic programming approach. Data Knowl. Eng., 69(3), 261–278.
    13. Zimmer, S., & Diehl, S. (2010). Visual Amortization Analysis of Recompilation Strategies. In E. Banissi, S. Bertschi, R. A. Burkhard, J. Counsell, M. Dastbaz, M. J. Eppler, C. Forsell, G. G. Grinstein, J. Johansson, M. Jern, F. Khosrowshahi, F. T. Marchese, C. Maple, R. Laing, U. Cvek, M. Trutschl, M. Sarfraz, L. J. Stuart, A. Ursyn, & T. G. Wyeld (Eds.), IV (pp. 509–514). IEEE Computer Society.
    14. Wessing, S., Beume, N., Rudolph, G., & Naujoks, B. (2010). Parameter Tuning Boosts Performance of Variation Operators in Multiobjective Optimization. In R. Schaefer, C. Cotta, J. Kolodziej, & G. Rudolph (Eds.), PPSN (1) (Vol. 6238, pp. 728–737). Springer.
    15. Strodl, S. (2010). (Semi-)Automated digital preservation archives for small institutions and private users. In J.-P. Chanod, M. Dobreva, A. Rauber, & S. Ross (Eds.), Automation in Digital Preservation (Vol. 10291). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany.
    16. Weißleder, S. (2010). Static and Dynamic Boundary Value Analysis. In H. Giese, M. Huhn, J. Phillips, & B. Schätz (Eds.), MBEES (pp. 55–64). fortiss GmbH, München.
    17. Glimm, B., Rudolph, S., & Völker, J. (2010). Integrated Metamodeling and Diagnosis in OWL 2. In P. F. Patel-Schneider, Y. Pan, P. Hitzler, P. Mika, L. Zhang, J. Z. Pan, I. Horrocks, & B. Glimm (Eds.), International Semantic Web Conference (1) (Vol. 6496, pp. 257–272). Springer.
    18. Beume, N., Laumanns, M., & Rudolph, G. (2010). Convergence Rates of (1+1) Evolutionary Multiobjective Optimization Algorithms. In R. Schaefer, C. Cotta, J. Kolodziej, & G. Rudolph (Eds.), PPSN (1) (Vol. 6238, pp. 597–606). Springer.
    19. Kottler, S. (2010). SAT Solving with Reference Points. In O. Strichman & S. Szeider (Eds.), SAT (Vol. 6175, pp. 143–157). Springer.
    20. Brandt, S. (2010). A note on generalized pentagons. Discrete Mathematics, 310(20), 2766–2767.
    21. Richter, J., Kuntze, N., & Rudolph, C. (2010). Security Digital Evidence. SADFE, 119–130.
    22. Krötzsch, M., Mehdi, A., & Rudolph, S. (2010). Orel: Database-Driven Reasoning for OWL 2 Profiles. In V. Haarslev, D. Toman, & G. E. Weddell (Eds.), Description Logics (Vol. 573).
    23. Triebel, R., Shin, J., & Siegwart, R. (2010). Segmentation and Unsupervised Part-based Discovery of Repetitive Objects. In Y. Matsuoka, H. F. Durrant-Whyte, & J. Neira (Eds.), Robotics: Science and Systems. The MIT Press.
    24. Shin, J., Triebel, R., & Siegwart, R. (2010). Unsupervised discovery of repetitive objects. ICRA, 5041–5046.
    25. Kuntze, N., & Rudolph, C. (2010). Privacy in Distributed Commercial Applications. In J. Berleur, M. D. Hercheui, & L. M. Hilty (Eds.), HCC (Vol. 328, pp. 214–224). Springer.
    26. Rosswog, S. (2010). Conservative, special-relativistic smoothed particle hydrodynamics. J. Comput. Physics, 229(22), 8591–8612.
    27. Stephan, P. (2010). System architecture for using location information for process optimization within a factory of things. LocWeb, 6.
    28. Beckett, P., & Rudolph, H. (2010). Run. DELTA, 245–249.
    29. Kluth, S. (2010). Quantitative Modeling and Analysis with FMC-QE. In K. Bollue, D. Gückel, U. Loup, J. Spönemann, & M. Winkler (Eds.), AlgoSyn (p. 198). Verlagshaus Mainz, Aachen, Germany.
    30. Bruckmeier, K., Graf, T., & Rudolph, H. (2010). Working Poor: Arm oder bedürftig? AStA Wirtschafts- Und Sozialstatistisches Archiv, 4(3), 201–222.
    31. Preuss, M., Rudolph, G., & Wessing, S. (2010). Tuning optimization algorithms for real-world problems by means of surrogate modeling. In M. Pelikan & J. Branke (Eds.), GECCO (pp. 401–408). ACM.
    32. Ortiz, M., Rudolph, S., & Simkus, M. (2010). Worst-Case Optimal Reasoning for the Horn-DL Fragments of OWL 1 and 2. In F. Lin, U. Sattler, & M. Truszczynski (Eds.), KR. AAAI Press.
    33. Glimm, B., & Rudolph, S. (2010). Status QIO: Conjunctive Query Entailment Is Decidable. In F. Lin, U. Sattler, & M. Truszczynski (Eds.), KR. AAAI Press.
    34. Goebbels, S. (2010). Disruption tolerant networking by Smart Caching. Int. J. Communication Systems, 23(5), 569–595.
    35. Kuntze, N., Rudolph, C., & Fuchs, A. (2010). Trust in Peer-to-Peer Content Distribution Protocols. In P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, & D. Sauveron (Eds.), WISTP (Vol. 6033, pp. 76–89). Springer.
  13. 2009

    1. Rudolph, S., & Krcmar, H. (2009). Maturity Model for IT Service Catalogues An Approach to Assess the Quality of IT Service Documentation. In R. C. Nickerson & R. Sharda (Eds.), AMCIS (p. 750). Association for Information Systems.
    2. Han, L., & Rudolph, L. (2009). Explicit parametrizations of the configuration spaces of anthropomorphic multi-linkage systems. In J. Trinkle, Y. Matsuoka, & J. A. Castellanos (Eds.), Robotics: Science and Systems. The MIT Press.
    3. Fuchs, A., Gürgens, S., & Rudolph, C. (2009). Towards a Generic Process for Security Pattern Integration. In A. M. Tjoa & R. Wagner (Eds.), DEXA Workshops (pp. 171–175). IEEE Computer Society.
    4. Missaoui, R., & Kwuida, L. (2009). What Can Formal Concept Analysis Do for Data Warehouses?. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 58–65). Springer.
    5. Øhrstrøm, P. (2009). Time and Logic: A.N. Prior’s Formal Analysis of Temporal Concepts. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 66–81). Springer.
    6. Kötters, J., Schmidt, H., & Squire, D. McG. (2009). Context Graphs - Representing Formal Concepts by Connected Subgraphs. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 178–193). Springer.
    7. Meschke, C. (2009). Robust Elements in Rough Set Abstractions. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 114–129). Springer.
    8. Medina, R., & Nourine, L. (2009). A Unified Hierarchy for Functional Dependencies, Conditional Functional Dependencies and Association Rules. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 98–113). Springer.
    9. Bertaux, A., Ber, F. L., Braud, A., & Trémolières, M. (2009). Identifying Ecological Traits: A Concrete FCA-Based Approach. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 224–236). Springer.
    10. Raedt, L. D. (2009). The Logic of Learning. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, p. 57). Springer.
    11. Schleim, S. (2009). The risk that neurogenetic approaches may inflate the psychiatric concept of disease and how to cope with it. Poiesis & Praxis, 6(1–2), 79–91.
    12. Krötzsch, M., & Rudolph, S. (2009). A Matter of Principles: Towards the Largest DLP Possible. In B. C. Grau, I. Horrocks, B. Motik, & U. Sattler (Eds.), Description Logics (Vol. 477).
    13. Rimsa, A., Zárate, L. E., & Song, M. A. J. (2009). Handling Large Formal Context Using BDD - Perspectives and Limitations. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 194–209). Springer.
    14. Rudolph, C., Kuntze, N., & Velikova, Z. (2009). Secure Web Service Workflow Execution. Electron. Notes Theor. Comput. Sci., 236, 33–46.
    15. Kramer, O., Barthelmes, A., & Rudolph, G. (2009). Surrogate Constraint Functions for CMA Evolution Strategies. In B. Mertsching, M. Hund, & M. Z. Aziz (Eds.), KI (Vol. 5803, pp. 169–176). Springer.
    16. Rein, S., Lehmann, S., & Gühmann, C. (2009). Wavelet Image Two-Line Coder for Wireless Sensor Node with Extremely Little RAM. In J. A. Storer & M. W. Marcellin (Eds.), DCC (pp. 252–261). IEEE Computer Society.
    17. Kurpjuweit, S., & Aier, S. (2009). Ein allgemeiner Ansatz zur Ableitung von Abhängigkeitsanalysen auf Unternehmensarchitekturmodellen. In H. R. Hansen, D. Karagiannis, & H.-G. Fill (Eds.), Wirtschaftsinformatik (1) (Vol. 246, pp. 129–138). Österreichische Computer Gesellschaft.
    18. Lingner, S. (2009). O. Renn, P.-J. Schweizer, M. Dreyer, A. Klinke: Risiko. Über den gesellschaftlichen Umgang mit Unsicherheit. Poiesis & Praxis, 6(3–4), 273–276.
    19. Sertkaya, B. (2009). Some Computational Problems Related to Pseudo-intents. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 130–145). Springer.
    20. Rudolph, H., & Brown, A. (2009). Sicherheit ist messbar! - Faktoren, Funktion, Anwendung und Nutzen der Sicherheitsmetrik von OSSTMM. Datenschutz Und Datensicherheit, 33(3), 145–149.
    21. Kuntze, N., Fuchs, A., & Rudolph, C. (2009). Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. CSE (2), 781–786.
    22. Kleuker, S. (2009). Werkzeuge zur Qualitätssicherung in der Software-Engineering-Ausbildung. In U. Jaeger & K. Schneider (Eds.), SEUH (pp. 145–159). dpunkt.
    23. Wyssusek, B. (2009). Can Ontology Inform Ontologies?. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, p. 82). Springer.
    24. Rudolph, G., & Preuss, M. (2009). A multiobjective approach for finding equivalent inverse images of Pareto-optimal objective vectors. MCDM, 74–79.
    25. Kaytoue-Uberall, M., Duplessis, S., Kuznetsov, S. O., & Napoli, A. (2009). Two FCA-Based Methods for Mining Gene Expression Data. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 251–266). Springer.
    26. Seetharaman, A., & Raj, J. R. (2009). Evolution, Development and Growth of Electronic Money. Int. J. E Adopt., 1(1), 76–94.
    27. Baader, F., & Sertkaya, B. (2009). Usability Issues in Description Logic Knowledge Base Completion. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 1–21). Springer.
    28. Weißleder, S. (2009). Influencing Factors in Model-Based Testing with UML State Machines: Report on an Industrial Cooperation. In A. Schürr & B. Selic (Eds.), MoDELS (Vol. 5795, pp. 211–225). Springer.
    29. Nikitina, N., Rudolph, S., & Blohm, S. (2009). Refining Ontologies by Pattern-Based Completion. In E. Blomqvist, K. Sandkuhl, F. Scharffe, & V. Svátek (Eds.), WOP (Vol. 516).
    30. Preibisch, S., Saalfeld, S., & Tomancak, P. (2009). Globally optimal stitching of tiled 3D microscopic image acquisitions. Bioinformatics, 25(11), 1463–1465.
    31. Fuchs, A., Gürgens, S., & Rudolph, C. (2009). On the Security Validation of Integrated Security Solutions. In D. Gritzalis & J. López (Eds.), SEC (Vol. 297, pp. 190–201). Springer.
    32. Li, Z., Rudolph, G., & Li, K. (2009). Convergence performance comparison of quantum-inspired multi-objective evolutionary algorithms. Computers & Mathematics with Applications, 57(11–12), 1843–1854.
    33. Stephan, R. (2009). Facets of the (s, t)-p-path polytope. Discrete Applied Mathematics, 157(14), 3119–3132.
    34. Kassel, S. (2009). An Architectural Approach for Service Interoperability. IESA, 212–218.
    35. Baixeries, J., Szathmary, L., Valtchev, P., & Godin, R. (2009). Yet a Faster Algorithm for Building the Hasse Diagram of a Concept Lattice. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 162–177). Springer.
    36. Weißleder, S. (2009). Semantic-Preserving Test Model Transformationsfor Interchangeable Coverage Criteria. In H. Giese, M. Huhn, U. Nickel, & B. Schätz (Eds.), MBEES (Vols. 2009–01, pp. 26–35). TU Braunschweig, Institut für Software Systems Engineering.
    37. Formal Concept Analysis, 7th International Conference, ICFCA 2009, Darmstadt, Germany, May 21-24, 2009, Proceedings. (2009). In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548). Springer.
    38. Rudolph, L. (2009). A Virtualization Infrastructure that Supports Pervasive Computing. IEEE Pervasive Computing, 8(4), 8–13.
    39. Venter, F., Kourie, D. G., & Watson, B. W. (2009). FCA-Based Two Dimensional Pattern Matching. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 299–313). Springer.
    40. Rudolph, Th., & Weber, Th. (2009). Intelligente Lösungen für effiziente Verteilnetze. Elektrotechnik Und Informationstechnik, 126(10), 378–382.
    41. Wille, R. (2009). Restructuring Lattice Theory: An Approach Based on Hierarchies of Concepts. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 314–339). Springer.
    42. Borchmann, D., & Ganter, B. (2009). Concept Lattice Orbifolds - First Steps. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 22–37). Springer.
    43. Baader, F., & Distel, F. (2009). Exploring Finite Models in the Description Logic . In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 146–161). Springer.
    44. Rudolph, S. (2009). Servicebasierte Planung und Steuerung der IT-Infrastruktur im Mittelstand: ein Modellansatz zur Struktur der IT-Leistungserbringung. (pp. 1–407). Gabler.
    45. Pan, T., & Fang, K. (2009). Ontology-Based Formal Concept Differences Analysis in Radiology Report Impact by the Adoption of PACS. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 267–283). Springer.
    46. Rudolph, T. (2009). A simple encoding of a quantum circuit amplitude as a matrix permanent. CoRR, abs/0909.3005.
    47. Dau, F. (2009). The Advent of Formal Diagrammatic Reasoning Systems. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 38–56). Springer.
    48. Spinello, L., Triebel, R., & Siegwart, R. (2009). Multiclass Multimodal Detection and Tracking in Urban Environments * . In A. Howard, K. Iagnemma, & A. Kelly (Eds.), FSR (Vol. 62, pp. 125–135). Springer.
    49. Belohlávek, R., & Vychodil, V. (2009). Factor Analysis of Incidence Data via Novel Decomposition of Matrices. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 83–97). Springer.
    50. Krenn, S. (2009). Bringing Zero-Knowledge Proofs of Knowledge to Practice. In B. Christianson, J. A. Malcolm, V. Matyas, & M. Roe (Eds.), Security Protocols Workshop (Vol. 7028, pp. 63–68). Springer.
    51. Priss, U., & Old, L. J. (2009). Revisiting the Potentialities of a Mechanical Thesaurus. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 284–298). Springer.
    52. Lorentz, R. A. H. (2009). On the entropy of a function. Journal of Approximation Theory, 158(2), 145–150.
    53. Glimm, B., & Rudolph, S. (2009). Conjunctive Query Entailment: Decidable in Spite of O, I, and Q. In B. C. Grau, I. Horrocks, B. Motik, & U. Sattler (Eds.), Description Logics (Vol. 477).
    54. Grimm, S. (2009). A Unifying Formal Ontology Model - A Simple Formal Model for Unifying the Presentation of Ontologies in Semantic Web Research. In J. L. G. Dietz (Ed.), KEOD (pp. 327–335). INSTICC Press.
    55. Belohlávek, R., Kulkarni, N., & Vychodil, V. (2009). A Novel Approach to Cell Formation. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 210–223). Springer.
    56. Carpineto, C., Michini, C., & Nicolussi, R. (2009). A Concept Lattice-Based Kernel for SVM Text Classification. In S. Ferré & S. Rudolph (Eds.), ICFCA (Vol. 5548, pp. 237–250). Springer.
  14. 2008

    1. Walter, S. (2008). Linguistic Description and Automatic Extraction of Definitions from German Court Decisions. LREC.
    2. Rudolph, S., Tserendorj, T., & Hitzler, P. (2008). What Is Approximate Reasoning?. In D. Calvanese & G. Lausen (Eds.), RR (Vol. 5341, pp. 150–164). Springer.
    3. Agarwal, S., Rudolph, S., & Abecker, A. (2008). Semantic Description of Distributed Business Processes. AAAI Spring Symposium: AI Meets Business Rules and Process Management, 1–11.
    4. Rudolph, S., Krötzsch, M., & Hitzler, P. (2008). Description Logic Reasoning with Decision Diagrams: Compiling SHIQ to Disjunctive Datalog. In A. P. Sheth, S. Staab, M. Dean, M. Paolucci, D. Maynard, T. W. Finin, & K. Thirunarayan (Eds.), International Semantic Web Conference (Vol. 5318, pp. 435–450). Springer.
    5. Rudolph, H. (2008). The Authority of the Bible and the Authority of Reason in Leibniz’s Ecumenical Argument. In M. Dascal (Ed.), Leibniz: What Kind of Rationalist? (Vol. 13, pp. 441–447). Springer.
    6. Rudolph, S., Böhmann, T., & Krcmar, H. (2008). Struktur von IT-Servicekatalogen: Ein praxisorientierter Gestaltungsvorschlag für die Dokumentation des IT-Leistungsangebots. In M. Bichler, T. Hess, H. Krcmar, U. Lechner, F. Matthes, A. Picot, B. Speitkamp, & P. Wolf (Eds.), Multikonferenz Wirtschaftsinformatik. GITO-Verlag, Berlin.
    7. Vorobiev, A., & Seviora, R. E. (2008). Fuzzy Belief-Based Supervision. ARES, 383–389.
    8. Han, L., & Rudolph, L. (2008). Simplex-Tree Based Kinematics of Foldable Objects as Multi-body Systems Involving Loops. In O. Brock, J. Trinkle, & F. Ramos (Eds.), Robotics: Science and Systems. The MIT Press.
    9. Sathe, M., Rudolph, G., & Deb, K. (2008). Design and validation of a hybrid interactive reference point method for multi-objective optimization. IEEE Congress on Evolutionary Computation, 2909–2916.
    10. Lehmann, S., Rein, S., & Gühmann, C. (2008). External Flash Filesystem for Sensor Nodes with sparse Resources. In J. Huusko & T. Frantti (Eds.), MobiMedia. ICST.
    11. Dean, M. E., & Rudolph, B. (2008). Message from the Vice President, Technical Strategy and Global Operations, IBM Research and the Vice President, System Storage, IBM Systems and Technology Group. IBM Journal of Research and Development, 52(4–5), 316–316.
    12. Cimiano, P., Hartfiel, H., & Rudolph, S. (2008). Intensional Question Answering Using ILP: What Does an Answer Mean?. In E. Kapetanios, V. Sugumaran, & M. Spiliopoulou (Eds.), NLDB (Vol. 5039, pp. 151–162). Springer.
    13. Spinello, L., Triebel, R., & Siegwart, R. (2008). Multimodal People Detection and Tracking in Crowded Scenes. In D. Fox & C. P. Gomes (Eds.), AAAI (pp. 1409–1414). AAAI Press.
    14. Rudolph, S., Krötzsch, M., & Hitzler, P. (2008). Terminological Reasoning in SHIQ with Ordered Binary Decision Diagrams. In D. Fox & C. P. Gomes (Eds.), AAAI (pp. 529–534). AAAI Press.
    15. Mounier, H., & Rudolph, J. (2008). Flatness and quasi-static state feedback in non-linear delay systems. Int. J. Control, 81(3), 445–456.
    16. Lamprecht, S. (2008). XING - Networking im Internet (3. Aufl.). (pp. I–IX, 1–169). Heise.
    17. Spinello, L., Triebel, R., & Siegwart, R. (2008). Multimodal detection and tracking of pedestrians in urban environments with explicit ground plane extraction. IROS, 1823–1829.
    18. Völker, J., & Rudolph, S. (2008). Lexico-Logical Acquisition of OWL DL Axioms. In R. Medina & S. A. Obiedkov (Eds.), ICFCA (Vol. 4933, pp. 62–77). Springer.
    19. Kassel, S. (2008). Design of services as interoperable systems an e-commerce case study. In M. van Sinderen, J. P. A. Almeida, L. F. Pires, & M. Steen (Eds.), EDOCW (pp. 264–268). IEEE Computer Society.
    20. Rudolph, S., Krötzsch, M., & Hitzler, P. (2008). All Elephants are Bigger than All Mice. In F. Baader, C. Lutz, & B. Motik (Eds.), Description Logics (Vol. 353).
    21. Beume, N., Naujoks, B., & Rudolph, G. (2008). SMS-EMOA - Effektive evolutionäre Mehrzieloptimierung (SMS-EMOA - Effective Evolutionary Multiobjective Optimization). Automatisierungstechnik, 56(7), 357–364.
    22. Foldes, S. (2008). On McMillan’s theorem about uniquely decipherable codes. CoRR, abs/0806.3277.
    23. Rudolph, S., Krötzsch, M., & Hitzler, P. (2008). Cheap Boolean Role Constructors for Description Logics. In S. Hölldobler, C. Lutz, & H. Wansing (Eds.), JELIA (Vol. 5293, pp. 362–374). Springer.
    24. Rudolph, G., & Schwefel, H.-P. (2008). Simulated Evolution under Multiple Criteria Conditions Revisited. In J. M. Zurada, G. G. Yen, & J. Wang (Eds.), WCCI (Vol. 5050, pp. 249–261). Springer.
    25. Weißleder, S. (2008). Partition-Oriented Test Generation. In H.-G. Hegering, A. Lehmann, H. J. Ohlbach, & C. Scheideler (Eds.), GI Jahrestagung (1): Vol. P-133 (pp. 199–204). GI.
    26. Rein, S., Lehmann, S., & Gühmann, C. (2008). Fractional Wavelet Filter for Camera Sensor Node with external Flash and extremely little RAM. In J. Huusko & T. Frantti (Eds.), MobiMedia. ICST.
    27. Neuhaus, S. (2008). Repeating the past experimental and empirical methods in system and software security. Saarland University.
    28. Dlugosz, S. (2008). Multi-layer perceptron networks for ordinal data analysis: order independent online learning by sequential estimation. (pp. 1–214). University of Münster.
    29. Rudolph, J., & Woittennek, F. (2008). Motion planning and open loop control design for linear distributed parameter systems with lumped controls. Int. J. Control, 81(3), 457–474.
    30. Krötzsch, M., Rudolph, S., & Hitzler, P. (2008). ELP: Tractable Rules for OWL 2. In A. P. Sheth, S. Staab, M. Dean, M. Paolucci, D. Maynard, T. W. Finin, & K. Thirunarayan (Eds.), International Semantic Web Conference (Vol. 5318, pp. 649–664). Springer.
    31. Mäs, S. (2008). Reasoning on Spatial Relations between Entity Classes. In T. J. Cova, H. J. Miller, K. Beard, A. U. Frank, & M. F. Goodchild (Eds.), GIScience (Vol. 5266, pp. 234–248). Springer.
    32. Reiter, S. (2008). Multimodale Modellierung von Gruppenaktionen zur Segmentierung von Besprechungen. (pp. 1–141). Technical University Munich, Germany.
    33. Rudolph, S. (2008). Acquiring Generalized Domain-Range Restrictions. In R. Medina & S. A. Obiedkov (Eds.), ICFCA (Vol. 4933, pp. 32–45). Springer.
    34. Krötzsch, M., Rudolph, S., & Hitzler, P. (2008). Description Logic Rules. In M. Ghallab, C. D. Spyropoulos, N. Fakotakis, & N. M. Avouris (Eds.), ECAI (Vol. 178, pp. 80–84). IOS Press.
    35. Hell, S. (2008). Tverberg’s theorem with constraints. J. Comb. Theory, Ser. A, 115(8), 1402–1416.
    36. Völker, J., & Rudolph, S. (2008). Fostering Web Intelligence by Semi-automatic OWL Ontology Refinement. Web Intelligence, 454–460.
  15. 2007

    1. Pfaff, P., Triebel, R., & Burgard, W. (2007). An Efficient Extension to Elevation Maps for Outdoor Terrain Mapping and Loop Closing. I. J. Robotic Res., 26(2), 217–230.
    2. Han, L., & Rudolph, L. (2007). A Unified Geometric Approach for Inverse Kinematics of a Spatial Chain with Spherical Joints. ICRA, 4420–4427.
    3. Rudolph, J., & Woittennek, F. (2007). Ein algebraischer Zugang zur Parameteridentifikation in linearen unendlichdimensionalen Systemen (An Algebraic Approach to Parameter Identification in Linear Infinite Dimensional Systems). Automatisierungstechnik, 55(9), 457–467.
    4. Goebbels, S. (2007). Traffic Theory Approach for Heterogeneous Mobile Communication Networks. VTC Spring, 2636–2640.
    5. Triebel, R., & Burgard, W. (2007). Recovering the Shape of Objects in 3D Point Clouds with Partial Occlusions. In C. Laugier & R. Siegwart (Eds.), FSR (Vol. 42, pp. 13–22). Springer.
    6. Rudolph, S. (2007). Encoding Closure Operators into Neural Networks. In A. S. d’Avila Garcez, P. Hitzler, & G. Tamburrini (Eds.), NeSy (Vol. 230).
    7. Rudolph, S. (2007). Some Notes on Pseudo-closed Sets. In S. O. Kuznetsov & S. Schmidt (Eds.), ICFCA (Vol. 4390, pp. 151–165). Springer.
    8. Schneider, S. (2007). Konstruktion generischer Datenmodelle auf fachkonzeptioneller Ebene im betrieblichen Anwendungskontext: Methode und Studie. (pp. 1–563). EBS Universität für Wirtschaft und Recht.
    9. Rudolph, I., Reyer, M., & Nitsche, W. (2007). Infrared based visualization of wall shear stress distributions with a high temporal and spatial resolution. J. Visualization, 10(1), 8.
    10. Triebel, R. (2007). Three-dimensional perception for mobile robots. University of Freiburg.
    11. Morgenthaler, S. (2007). A survey of robust statistics. Statistical Methods and Applications, 16(1), 171–172.
    12. Mäs, S. (2007). Reasoning on Spatial Semantic Integrity Constraints. In S. Winter, M. Duckham, L. Kulik, & B. Kuipers (Eds.), COSIT (Vol. 4736, pp. 285–302). Springer.
    13. Rudolph, S. (2007). Using FCA for Encoding Closure Operators into Neural Networks. In U. Priss, S. Polovina, & R. Hill (Eds.), ICCS (Vol. 4604, pp. 321–332). Springer.
    14. Krötzsch, M., Rudolph, S., & Hitzler, P. (2007). Conjunctive Queries for a Tractable Fragment of OWL 1.1. In K. Aberer, K.-S. Choi, N. F. Noy, D. Allemang, K.-I. Lee, L. J. B. Nixon, J. Golbeck, P. Mika, D. Maynard, R. Mizoguchi, G. Schreiber, & P. Cudré-Mauroux (Eds.), ISWC/ASWC (Vol. 4825, pp. 310–323). Springer.
    15. Rudolph, M. (2007). Still disturbing. Kybernetes, 36(7/8), 946–948.
    16. Rudolph, S., Völker, J., & Hitzler, P. (2007). Supporting Lexical Ontology Learning by Relational Exploration. In U. Priss, S. Polovina, & R. Hill (Eds.), ICCS (Vol. 4604, pp. 488–491). Springer.
    17. Olariu, S. (2007). Transitional Issues. In S. Rajasekaran & J. H. Reif (Eds.), Handbook of Parallel Computing. Chapman and Hall/CRC.
    18. Krötzsch, M., Rudolph, S., & Hitzler, P. (2007). Complexity Boundaries for Horn Description Logics. AAAI, 452–457.
    19. Werther, B., Möhlenbrink, C., & Rudolph, M. (2007). Colored Petri Net Based Formal Airport Control Model for Simulation and Analysis of Airport Control Processes. In V. G. Duffy (Ed.), HCI (12) (Vol. 4561, pp. 1027–1036). Springer.
    20. Rudolph, S., Krötzsch, M., & Hitzler, P. (2007). Quo Vadis, CS? - On the (non)-Impact of Conceptual Structures on the Semantic Web. In U. Priss, S. Polovina, & R. Hill (Eds.), ICCS (Vol. 4604, pp. 464–467). Springer.
    21. Rudolph, S. (2007). Relational Exploration - Reconciling Plato and Aristotle. In P. Hitzler, T. Roth-Berghofer, & S. Rudolph (Eds.), FAInt (Vol. 277).
    22. Goericke, S. (2007). Qualifizierung von Software-Entwicklern als gesamtgesellschaftliche Aufgabe. Datenschutz Und Datensicherheit, 31(12), 911–913.
    23. Li, Z., & Rudolph, G. (2007). A framework of quantum-inspired multi-objective evolutionary algorithms and its convergence condition. In H. Lipson (Ed.), GECCO (p. 908). ACM.
    24. Rudolph, C. (2007). Covert Identity Information in Direct Anonymous Attestation (DAA). In H. S. Venter, M. M. Eloff, L. Labuschagne, J. H. P. Eloff, & R. von Solms (Eds.), SEC (Vol. 232, pp. 443–448). Springer.
    25. Jacobs, S. (2007). Towards integration driven design. In W.-G. Bleek, H. Schwentner, & H. Züllighoven (Eds.), Software Engineering (Workshops): Vol. P-106 (pp. 143–148). GI.
    26. Haq, M., & Rudolph, S. (2007). A design language for generic space-frame structure design. IJCAT, 30(1/2), 77–87.
    27. Eichler, S. (2007). Performance Evaluation of the IEEE 802.11p WAVE Communication Standard. VTC Fall, 2199–2203.
    28. Rudolph, M., & Destexhe, A. (2007). How much can we trust neural simulation strategies? Neurocomputing, 70(10–12), 1966–1969.
    29. Kopf, S. (2007). Computergestützte Inhaltsanalyse von digitalen Videoarchiven. (pp. 1–266). University of Mannheim.
    30. Olariu, S. (2007). Mesh-Based Parallel Algorithms for Ultra Fast Computer Vision. In S. Rajasekaran & J. H. Reif (Eds.), Handbook of Parallel Computing. Chapman and Hall/CRC.
    31. Frank, S. (2007). Constraint solving in common Lisp. In C. Shapiro, P. Costanza, & J. L. White (Eds.), ILC (p. 10). ACM.
    32. Preuss, M., Rudolph, G., & Tumakaka, F. (2007). Solving multimodal problems via multiobjective techniques with Application to phase equilibrium detection. IEEE Congress on Evolutionary Computation, 2703–2710.
    33. Krötzsch, M., & Rudolph, S. (2007). Conjunctive Queries for EL with Composition of Roles. In D. Calvanese, E. Franconi, V. Haarslev, D. Lembo, B. Motik, A.-Y. Turhan, & S. Tessaris (Eds.), Description Logics (Vol. 250).
    34. Li, Z., Li, Z., & Rudolph, G. (2007). On the Convergence Properties of Quantum-Inspired Multi-Objective Evolutionary Algorithms. In D.-S. Huang, L. Heutte, & M. Loog (Eds.), ICIC (3) (Vol. 2, pp. 245–255). Springer.
    35. Hazy, P., & Seviora, R. E. (2007). Automatic Failure Detection with Separation of Concerns. ARES, 173–181.
  16. 2006

    1. Han, L., & Rudolph, L. (2006). Inverse Kinematics for a Serial Chain with Joints Under Distance Constraints. In G. S. Sukhatme, S. Schaal, W. Burgard, & D. Fox (Eds.), Robotics: Science and Systems. The MIT Press.
    2. Rudolph, M., & Destexhe, A. (2006). Analytical Integrate-and-Fire Neuron Models with Conductance-Based Dynamics for Event-Driven Simulation Strategies. Neural Computation, 18(9), 2146–2210.
    3. Vollmer, S. (2006). Portierung des DBLP-Systems auf ein relationales Datenbanksystem und Evaluation der Performance.
    4. Rudolph, S. (2006). Relational exploration: combining description logics and formal concept analysis for knowledge specification. Dresden University of Technology.
    5. Rudolph, G., Naujoks, B., & Preuss, M. (2006). Capabilities of EMOA to Detect and Preserve Equivalent Pareto Subsets. In S. Obayashi, K. Deb, C. Poloni, T. Hiroyasu, & T. Murata (Eds.), EMO (Vol. 4403, pp. 36–50). Springer.
    6. Rudolph, J., & Woittennek, F. (2006). Trajektorienplanung für die Steuerung gewisser linearer Systeme mit verteilten Parametern (Trajectory Planning for the Control of some Linear Distributed Parameter Systems). Automatisierungstechnik, 54(5), 228–239.
    7. Rudolph, D., & Book, N. (2006). IT-Sicherheitsmanagement als messbare Dienstleistung - Wer ITIL sagt, sagt auch ISO 17799? Datenschutz Und Datensicherheit, 30(1), 29–32.
    8. Preuss, M., Naujoks, B., & Rudolph, G. (2006). Pareto Set and EMOA Behavior for Simple Multimodal Multiobjective Functions. In T. P. Runarsson, H.-G. Beyer, E. K. Burke, J. J. M. Guervós, L. D. Whitley, & X. Yao (Eds.), PPSN (Vol. 4193, pp. 513–522). Springer.
    9. Triebel, R., Kersting, K., & Burgard, W. (2006). Robust 3D Scan Point Classification using Associative Markov Networks. ICRA, 2603–2608.
    10. Rudolph, M., & Destexhe, A. (2006). On the Use of Analytical Expressions for the Voltage Distribution to Analyze Intracellular Recordings. Neural Computation, 18(12), 2917–2922.
    11. Beume, N., & Rudolph, G. (2006). Faster s-metric calculation by considering dominated hypervolume as klee’s measure problem. In B. Kovalerchuk (Ed.), Computational Intelligence (pp. 233–238). IASTED/ACTA Press.
    12. Scheuerer, S. (2006). A tabu search heuristic for the truck and trailer routing problem. Computers & OR, 33, 894–909.
    13. Neuhaus, S. (2006). Experimentelle Methoden zum Aufspüren von Einbrüchen. Softwaretechnik-Trends, 26(2), Article 2.
    14. Helling, S. (2006). Improvement of Multispectral Image Capture by Compensating for Stray Light. CGIV, 458–462.
    15. Schwan, S. (2006). Internationale Tagung “Mass media and the audience: The cultivation of beliefs, emotions and personality” in Saarbrücken (5. 10.-7. 10. 2005). Zeitschrift Für Medienpsychologie, 18(3), 137–138.
    16. Curphey, M., & Arawo, R. (2006). Web application security assessment tools. IEEE Security & Privacy, 4(4), 32–41.
    17. Rudolph, T., Ebert, L., & Kowal, J. (2006). Noninvasive CT to Iso-C3D registration for improved intraoperative visualization in computer assisted orthopedic surgery. In K. R. Cleary & R. L. G. Jr. (Eds.), Medical Imaging: Image-Guided Procedures (Vol. 6141, p. 61411X). SPIE.
    18. Jarrett, M., & Seviora, R. E. (2006). Diversity to Enhance Autonomic Computing Self-Protection. ARES, 295–299.
    19. Wolfer, S. (2006). How manufacturing can learn from nature : exploration of ecological resilience. Loughborough University, UK.
    20. Lindner, B., & Longtin, A. (2006). Comment on "Characterization of Subthreshold Voltage Fluctuations in Neuronal Membranes, " by M. Rudolph and A. Destexhe. Neural Computation, 18(8), 1896–1931.
    21. Peserico, E., & Rudolph, L. (2006). Robust network connectivity: when it’s the big picture that matters. In R. A. Marie, P. B. Key, & E. Smirni (Eds.), SIGMETRICS/Performance (pp. 299–310). ACM.
    22. Rudolph, M., & Destexhe, A. (2006). Event-based simulation strategy for conductance-based synaptic interactions and plasticity. Neurocomputing, 69(10–12), 1130–1133.
    23. Lamprecht, S. (2006). openBC - das Buch: Netzwerken leicht gemacht. (pp. I–IX, 1–155). Heise.
    24. Triebel, R., Pfaff, P., & Burgard, W. (2006). Multi-Level Surface Maps for Outdoor Terrain Mapping and Loop Closing. IROS, 2276–2282.
    25. Klaus, S. (2006). System-Level-Entwurfsmethodik eingebetteter Systeme. (pp. 1–142). Darmstadt University of Technology.
    26. Stilkerich, S. (2006). On the Hardware-Relevant Simulation of Regular Two-Dimensional CNN Processing Grids. IJCNN, 5177–5184.
    27. Krötzsch, M., Rudolph, S., & Hitzler, P. (2006). On the Complexity of Horn Description Logics. In B. C. Grau, P. Hitzler, C. Shankey, & E. Wallace (Eds.), OWLED (Vol. 216).
  17. 2005

    1. Dürr, S. (2005). Gauge action improvement and smearing. Comput. Phys. Commun., 172(3), 163–186.
    2. Wang, H., Parthasarathy, S., Ghoting, A., Tatikonda, S., Buehrer, G., Kurç, T. M., & Saltz, J. H. (2005). Design of a next generation sampling service for large scale data analysis applications. In Arvind & L. Rudolph (Eds.), ICS (pp. 91–100). ACM.
    3. Burgard, W., & Triebel, R. (2005). Learning Accurate Three-Dimensional Models from Range Data using Global Constraints. In A. B. Cremers, R. Manthey, P. Martini, & V. Steinhage (Eds.), GI Jahrestagung (2): Vol. P-68 (p. 667). GI.
    4. Almási, G., Bhanot, G., Gara, A., Gupta, M., Sexton, J. C., Walkup, R., Bulatov, V., Cook, A. W., de Supinski, B. R., Glosli, J. N., Greenough, J. A., Gygi, F., Kubota, A., Louis, S., Spelce, T. E., Streitz, F. H., Williams, P. L., Yates, R. K., Archer, C., … Rendleman, C. A. (2005). Scaling physics and material science applications on a massively parallel Blue Gene/L system. In Arvind & L. Rudolph (Eds.), ICS (pp. 246–252). ACM.
    5. Proceedings of the 19th Annual International Conference on Supercomputing, ICS 2005, Cambridge, Massachusetts, USA, June 20-22, 2005. (2005). In Arvind & L. Rudolph (Eds.), ICS. ACM.
    6. Nurvitadhi, E., Chalainanont, N., & Lu, S.-L. (2005). Characterization of L3 cache behavior of SPECjAppServer2002 and TPC-C. In Arvind & L. Rudolph (Eds.), ICS (pp. 12–20). ACM.
    7. Felter, W. M., Rajamani, K., Keller, T. W., & Rusu, C. (2005). A performance-conserving approach for reducing peak power consumption in server systems. In Arvind & L. Rudolph (Eds.), ICS (pp. 293–302). ACM.
    8. Liu, Y., Shayesteh, A., Memik, G., & Reinman, G. (2005). Tornado warning: the perils of selective replay in multithreaded processors. In Arvind & L. Rudolph (Eds.), ICS (pp. 51–60). ACM.
    9. Shen, K. (2005). Parallel sparse LU factorization on second-class message passing platforms. In Arvind & L. Rudolph (Eds.), ICS (pp. 351–360). ACM.
    10. Gürgens, S., & Rudolph, C. (2005). Security analysis of efficient (Un-)fair non-repudiation protocols. Formal Asp. Comput., 17(3), 260–276.
    11. Steglich, S. (2005). Cooperating objects for ubiquitous computing. In Q. Qian (Ed.), ISADS (pp. 107–108). IEEE Computer Society.
    12. Huh, J., Kim, C., Shafi, H., Zhang, L., Burger, D., & Keckler, S. W. (2005). A NUCA substrate for flexible CMP cache sharing. In Arvind & L. Rudolph (Eds.), ICS (pp. 31–40). ACM.
    13. Rudolph, M., & Destexhe, A. (2005). Multi-channel shot noise and characterization of cortical network activity. Neurocomputing, 65–66, 641–646.
    14. Gürgens, S., Ochsenschläger, P., & Rudolph, C. (2005). Abstractions Preserving Parameter Confidentiality. In S. D. C. di Vimercati, P. F. Syverson, & D. Gollmann (Eds.), ESORICS (Vol. 3679, pp. 418–437). Springer.
    15. Seviora, R. E. (2005). A curriculum for embedded system engineering. ACM Trans. Embedded Comput. Syst., 4(3), 569–586.
    16. Aggarwal, A. (2005). Reducing latencies of pipelined cache accesses through set prediction. In Arvind & L. Rudolph (Eds.), ICS (pp. 2–11). ACM.
    17. Froyd, N., Mellor-Crummey, J. M., & Fowler, R. J. (2005). Low-overhead call path profiling of unmodified, optimized code. In Arvind & L. Rudolph (Eds.), ICS (pp. 81–90). ACM.
    18. Murphy, R. C., Rodrigues, A., Kogge, P. M., & Underwood, K. D. (2005). The implications of working set analysis on supercomputing memory hierarchy design. In Arvind & L. Rudolph (Eds.), ICS (pp. 332–340). ACM.
    19. Haneda, M., Knijnenburg, P. M. W., & Wijshoff, H. A. G. (2005). Generating new general compiler optimization settings. In Arvind & L. Rudolph (Eds.), ICS (pp. 161–168). ACM.
    20. Azimi, R., Stumm, M., & Wisniewski, R. W. (2005). Online performance analysis by statistical sampling of microprocessor performance counters. In Arvind & L. Rudolph (Eds.), ICS (pp. 101–110). ACM.
    21. Philippi, S. (2005). Model driven generation and testing of object-relational mappings. Journal of Systems and Software, 77(2), 193–207.
    22. Gostin, G., Collard, J.-F., & Collins, K. (2005). The architecture of the HP Superdome shared-memory multiprocessor. In Arvind & L. Rudolph (Eds.), ICS (pp. 239–245). ACM.
    23. Huang, A., Pulli, K., & Rudolph, L. (2005). Kimono: kiosk-mobile phone knowledge sharing system. In M. Billinghurst (Ed.), MUM (Vol. 154, pp. 142–149). ACM.
    24. Jr., R. H. B., & John, L. K. (2005). Improved automatic testcase synthesis for performance model validation. In Arvind & L. Rudolph (Eds.), ICS (pp. 111–120). ACM.
    25. Lawson, B., & Smirni, E. (2005). Power-aware resource allocation in high-end systems via online simulation. In Arvind & L. Rudolph (Eds.), ICS (pp. 229–238). ACM.
    26. Amza, C., Soundararajan, G., & Cecchet, E. (2005). Transparent caching with strong consistency in dynamic content web sites. In Arvind & L. Rudolph (Eds.), ICS (pp. 264–273). ACM.
    27. Valluri, M. G., John, L. K., & McKinley, K. S. (2005). Low-power, low-complexity instruction issue using compiler assistance. In Arvind & L. Rudolph (Eds.), ICS (pp. 209–218). ACM.
    28. Marathe, J., Mueller, F., & de Supinski, B. R. (2005). A hybrid hardware/software approach to efficiently determine cache coherence Bottlenecks. In Arvind & L. Rudolph (Eds.), ICS (pp. 21–30). ACM.
    29. Zilber, J., Amit, O., & Talby, D. (2005). What is worth learning from parallel workloads?: a user and session based analysis. In Arvind & L. Rudolph (Eds.), ICS (pp. 377–386). ACM.
    30. Zhou, P., Önder, S., & Carr, S. (2005). Fast branch misprediction recovery in out-of-order superscalar processors. In Arvind & L. Rudolph (Eds.), ICS (pp. 41–50). ACM.
    31. Gürgens, S., Ochsenschläger, P., & Rudolph, C. (2005). On a formal framework for security properties. Computer Standards & Interfaces, 27(5), 457–466.
    32. Renau, J., Tuck, J., Liu, W., Ceze, L., Strauss, K., & Torrellas, J. (2005). Tasking with out-of-order spawn in TLS chip multiprocessors: microarchitecture and compilation. In Arvind & L. Rudolph (Eds.), ICS (pp. 179–188). ACM.
    33. Faraj, A., & Yuan, X. (2005). Automatic generation and tuning of MPI collective communication routines. In Arvind & L. Rudolph (Eds.), ICS (pp. 393–402). ACM.
    34. Rajan, K., & Govindarajan, R. (2005). A heterogeneously segmented cache architecture for a packet forwarding engine. In Arvind & L. Rudolph (Eds.), ICS (pp. 71–80). ACM.
    35. Shen, X., Gao, Y., Ding, C., & Archambault, R. (2005). Lightweight reference affinity analysis. In Arvind & L. Rudolph (Eds.), ICS (pp. 131–140). ACM.
    36. Basumallik, A., & Eigenmann, R. (2005). Towards automatic translation of OpenMP to MPI. In Arvind & L. Rudolph (Eds.), ICS (pp. 189–198). ACM.
    37. Triebel, R., Burgard, W., & Dellaert, F. (2005). Using Hierarchical EM to Extract Planes from 3D Range Scans. ICRA, 4437–4442.
    38. Chafi, H., Minh, C. C., McDonald, A., Carlstrom, B. D., Chung, J., Hammond, L., Kozyrakis, C., & Olukotun, K. (2005). TAPE: a transactional application profiling environment. In Arvind & L. Rudolph (Eds.), ICS (pp. 199–208). ACM.
    39. Rudolph, M., & Destexhe, A. (2005). An Extended Analytic Expression for the Membrane Potential Distribution of Conductance-Based Synaptic Noise. Neural Computation, 17(11), 2301–2315.
    40. Rudolph, C., & Mana, A. (2005). Specification and automated processing of security requirements (SAPS’05). In D. F. Redmiles, T. Ellman, & A. Zisman (Eds.), ASE (p. 460). ACM.
    41. Yu, W., Liang, S., & Panda, D. K. (2005). High performance support of parallel virtual file system (PVFS2) over Quadrics. In Arvind & L. Rudolph (Eds.), ICS (pp. 323–331). ACM.
    42. Cohen, A., Sigler, M., Girbal, S., Temam, O., Parello, D., & Vasilache, N. (2005). Facilitating the search for compositions of program transformations. In Arvind & L. Rudolph (Eds.), ICS (pp. 151–160). ACM.
    43. Loukopoulos, T., Lampsas, P., & Ahmad, I. (2005). Continuous Replica Placement schemes in distributed systems. In Arvind & L. Rudolph (Eds.), ICS (pp. 284–292). ACM.
    44. Stephan, E. (2005). IP Performance Metrics (IPPM) Metrics Registry. RFC, 4148, 1–14.
    45. Darken, R. P., & Durost, R. (2005). Mixed-dimension interaction in virtual environments. In G. Singh, R. W. H. Lau, Y. Chrysanthou, & R. P. Darken (Eds.), VRST (pp. 38–45). ACM.
    46. Löf, H., & Holmgren, S. (2005). affinity-on-next-touch: increasing the performance of an industrial PDE solver on a cc-NUMA system. In Arvind & L. Rudolph (Eds.), ICS (pp. 387–392). ACM.
    47. Reinschke, K. (2005). Dr. Joachim Rudolph erhielt Dr. Meyer-Struckmann-Wissenschaftspreis 2004. Automatisierungstechnik, 53(9), 464–466.
    48. Rudolph, J. (2005). Flachheit: Eine nützliche Eigenschaft auch für Systeme mit Totzeiten (Flatness: A Useful Property also for Systems with Delays). Automatisierungstechnik, 53(4–5), 178–188.
    49. Son, S. W., Chen, G., & Kandemir, M. T. (2005). Disk layout optimization for reducing energy consumption. In Arvind & L. Rudolph (Eds.), ICS (pp. 274–283). ACM.
    50. Tsafrir, D., Etsion, Y., Feitelson, D. G., & Kirkpatrick, S. (2005). System noise, OS clock ticks, and fine-grained parallel applications. In Arvind & L. Rudolph (Eds.), ICS (pp. 303–312). ACM.
    51. Rudolph, A. (2005). Ein vereinheitlichtes Modell zur fehlertoleranten Navigation mobiler Roboter. Automatisierungstechnik, 53(4–5), 234–235.
    52. Renau, J., Strauss, K., Ceze, L., Liu, W., Sarangi, S. R., Tuck, J., & Torrellas, J. (2005). Thread-Level Speculation on a CMP can be energy efficient. In Arvind & L. Rudolph (Eds.), ICS (pp. 219–228). ACM.
    53. White, B. S., McKee, S. A., de Supinski, B. R., Miller, B., Quinlan, D. J., & Schulz, M. (2005). Improving the computational intensity of unstructured mesh applications. In Arvind & L. Rudolph (Eds.), ICS (pp. 341–350). ACM.
    54. Wu, P., Eichenberger, A. E., Wang, A., & Zhao, P. (2005). An integrated simdization framework using virtual vectors. In Arvind & L. Rudolph (Eds.), ICS (pp. 169–178). ACM.
    55. Frigo, M., & Strumpen, V. (2005). Cache oblivious stencil computations. In Arvind & L. Rudolph (Eds.), ICS (pp. 361–366). ACM.
    56. Lau, A., & Seviora, R. E. (2005). Design Patterns for Software Health Monitoring. ICECCS, 467–476.
    57. Euler, S. (2005). Java tools for teaching speech recognition. ICASSP (5), 541–544.
    58. Antonopoulos, C. D., Ding, X., Chernikov, A. N., Blagojevic, F., Nikolopoulos, D. S., & Chrisochoides, N. (2005). Multigrain parallel Delaunay Mesh generation: challenges and opportunities for multithreaded architectures. In Arvind & L. Rudolph (Eds.), ICS (pp. 367–376). ACM.
    59. Almási, G., Heidelberger, P., Archer, C., Martorell, X., Erway, C. C., Moreira, J. E., Steinmacher-Burow, B. D., & Zheng, Y. (2005). Optimization of MPI collective communication on BlueGene/L systems. In Arvind & L. Rudolph (Eds.), ICS (pp. 253–262). ACM.
    60. Rudolph, M. (2005). Attaining exponential convergence for the flux error with second- and fourth-order accurate finite-difference equations. I. Presentation of the basic concept and application to a pure diffusion system. Journal of Computational Chemistry, 26(6), 619–632.
    61. Triebel, R., & Burgard, W. (2005). Improving Simultaneous Mapping and Localization in 3D Using Global Constraints. In M. M. Veloso & S. Kambhampati (Eds.), AAAI (pp. 1330–1335). AAAI Press / The MIT Press.
    62. Rusdorf, S., & Brunnett, G. (2005). Real time tracking of high speed movements in the context of a table tennis application. In G. Singh, R. W. H. Lau, Y. Chrysanthou, & R. P. Darken (Eds.), VRST (pp. 192–200). ACM.
    63. Rudolph, M. (2005). Attaining exponential convergence for the flux error with second- and fourth-order accurate finite-difference equations. Part 3. Application to electrochemical systems comprising second-order chemical reactions. Journal of Computational Chemistry, 26(11), 1193–1204.
    64. Rudolph, M. (2005). Attaining exponential convergence for the flux error with second- and fourth-order accurate finite-difference equations. II. Application to systems comprising first-order chemical reactions. Journal of Computational Chemistry, 26(6), 633–641.
    65. Rudolph, O. (2005). Further Results on the Cross Norm Criterion for Separability. Quantum Information Processing, 4(3), 219–239.
    66. Andreasson, H., Triebel, R., & Burgard, W. (2005). Improving plane extraction from 3D data by fusing laser data and vision. IROS, 2656–2661.
    67. Gürgens, S., Rudolph, C., & Vogt, H. (2005). On the security of fair non-repudiation protocols. Int. J. Inf. Sec., 4(4), 253–262.
    68. Utrera, G., Corbalán, J., & Labarta, J. (2005). Another approach to backfilled jobs: applying virtual malleability to expired windows. In Arvind & L. Rudolph (Eds.), ICS (pp. 313–322). ACM.
    69. Duran, A., González, M., & Corbalán, J. (2005). Automatic thread distribution for nested parallelism in OpenMP. In Arvind & L. Rudolph (Eds.), ICS (pp. 121–130). ACM.
    70. Destexhe, A., & Rudolph, M. (2005). Extracting information from the power spectrum of voltage noise. Neurocomputing, 65–66, 901–906.
    71. Yotov, K., Pingali, K., & Stodghill, P. (2005). Think globally, search locally. In Arvind & L. Rudolph (Eds.), ICS (pp. 141–150). ACM.
    72. Rudolph, J. (2005). Rekursiver Entwurf stabiler Regelkreise durch sukzessive Berücksichtigung von Integratoren und quasi-statische Rückführungen (Recursive Design of Stable Control Loops by Integrator Backstepping and Quasi-static Feedback). Automatisierungstechnik, 53(8), 389–399.
    73. González, R., Cristal, A., Pericàs, M., Valero, M., & Veidenbaum, A. V. (2005). An asymmetric clustered processor based on value content. In Arvind & L. Rudolph (Eds.), ICS (pp. 61–70). ACM.
    74. Frei, S. (2005). Bestimmung der bordnetzgebundenen Störaussendung mit dem kapazitiven Spannungssensor. GMM EMV, 48, 41–46.
    75. Zulkernine, M., & Seviora, R. E. (2005). Towards automatic monitoring of component-based software systems. Journal of Systems and Software, 74(1), 15–24.
    76. Rees, S. (2005). New cascaded control system for current-source rectifiers. IEEE Trans. Industrial Electronics, 52(3), 774–784.
  18. 2004

    1. Grover, L. K., & Rudolph, T. (2004). How significant are the known collision and element distinctness quantum algorithms? Quantum Information & Computation, 4(3), 201–206.
    2. Kassanke, S. (2004). Ontologiebasierte Strukturierung von Lernobjekten in der Domäne Operations Research, Management Science und Einbettung in ein hypermediales Lernsystem - Konzeption und Implementierung. (pp. 1–219). University of Paderborn.
    3. Destexhe, A., & Rudolph, M. (2004). Extracting Information from the Power Spectrum of Synaptic Noise. Journal of Computational Neuroscience, 17(3), 327–345.
    4. Heuel, S. (2004). Uncertain Projective Geometry: Statistical Reasoning for Polyhedral Object Reconstruction. In Lecture Notes in Computer Science (Vol. 3008). Springer.
    5. Feitelson, D. G., Rudolph, L., & Schwiegelshohn, U. (2004). Parallel Job Scheduling - A Status Report. In D. G. Feitelson, L. Rudolph, & U. Schwiegelshohn (Eds.), JSSPP (Vol. 3277, pp. 1–16). Springer.
    6. Lingner, S. (2004). J. Loomis, G. Helfand: Environmental policy analysis for decision making. Poiesis & Praxis, 3(1–2), 148–151.
    7. Roppel, S. (2004). Navigation, Adaption und Information Retrieval: Informationstechnik im Dienst des Buchkaufs. In M. Eibl, C. Wolff, & C. Womser-Hacker (Eds.), Designing Information Systems (Vol. 43, pp. 71–83). UVK.
    8. Dempe, S. (2004). Book review. OR Spectrum, 26(1), 147–148.
    9. Flake, S. (2004). Towards the Completion of the Formal Semantics of OCL 2.0. In V. Estivill-Castro (Ed.), ACSC (Vol. 26, pp. 73–82). Australian Computer Society.
    10. Ghafari, N., & Seviora, R. E. (2004). A Signal Processing Approach to Global Predicate Monitoring. SRDS, 136–145.
    11. Flake, S. (2004). Enhancing the Message Concept of the Object Constraint Language. In F. Maurer & G. Ruhe (Eds.), SEKE (pp. 161–166).
    12. Herrmann, S. (2004). Sustainable architectures by combining flexibility and strictness in Object Teams. IEE Proceedings - Software, 151(2), 57–66.
    13. Rudolph, S. (2004). Exploring Relational Structures Via FLE. In K. E. Wolff, H. D. Pfeiffer, & H. S. Delugach (Eds.), ICCS (Vol. 3127, pp. 196–212). Springer.
  19. 2003

    1. Destexhe, A., & Rudolph, M. (2003). Location independence and fast conduction of synaptic inputs in neocortical neurons in vivo. Neurocomputing, 52–54, 233–238.
    2. Rudolph, J., & Winkler, J. (2003). A Generalized flatness concept for nonlinear delay systems: motivation by chemical reactor models with constant or input dependent delays. Int. J. Systems Science, 34(8–9), 529–541.
    3. Rudolph, M., & Destexhe, A. (2003). Characterization of Subthreshold Voltage Fluctuations in Neuronal Membranes. Neural Computation, 15(11), 2577–2618.
    4. Diehl, S. (2003). Softwarevisualisierung. Informatik Spektrum, 26(4), 257–260.
    5. Rudolph, M., & Destexhe, A. (2003). Gain modulation and frequency locking under conductance noise. Neurocomputing, 52–54, 907–912.
    6. Pekilis, B. R., & Seviora, R. E. (2003). Automatic response performance monitoring for real-time software with nondeterministic behaviors. Perform. Eval., 53(1), 1–21.
    7. Raimer, S. (2003). Projekt Hilwa - Benutzerorientierte Gestaltung eines Lerncontentmanagementsystems für die Berufliche Aus- und Weiterbildung. In M. Peissner & K. Röse (Eds.), Usability Professionals (pp. 115–121). Fraunhofer Verlag.
    8. Gürgens, S., Rudolph, C., & Vogt, H. (2003). On the Security of Fair Non-repudiation Protocols. In C. Boyd & W. Mao (Eds.), ISC (Vol. 2851, pp. 193–207). Springer.
    9. Rudolph, M., & Destexhe, A. (2003). Tuning Neocortical Pyramidal Neurons between Integrators and Coincidence Detectors. Journal of Computational Neuroscience, 14(3), 239–251.
    10. Lingner, S. (2003). Legitimacy of tolerating limited environmental pollution? The case for natural attenuation. Poiesis & Praxis, 2(1), 73–78.
    11. Rudolph, L. (2003). What I Did on My Fall Vacation-A Pervasive Computing Class. IEEE Pervasive Computing, 2(2), 100–104.
    12. van Enk, S. J., & Rudolph, T. (2003). Quantum communication protocols using the vacuum. Quantum Information & Computation, 3(5), 423–430.
    13. Stephan, S. (2003). Browning, G.: Electronic democracy - using the internet to transform American politics. Poiesis & Praxis, 1(4), 317–320.
    14. Wenger, S. (2003). H.264/AVC over IP. IEEE Trans. Circuits Syst. Video Techn., 13(7), 645–656.
    15. Gürgens, S., Ochsenschläger, P., & Rudolph, C. (2003). Parameter-Confidentiality. In R. Grimm, H. B. Keller, & K. Rannenberg (Eds.), GI Jahrestagung (Schwerpunkt “Sicherheit - Schutz und Zuverlässigkeit”): Vol. P-36 (pp. 383–394). GI.
    16. Rudolph, J., Weiß, E., & Forster, M. (2003). Modeling of welded joints for design against fatigue. Eng. Comput. (Lond.), 19(2–3), 142–151.
    17. Ferrée, T. C., & Hwa, R. C. (2003). Power-law scaling in human EEG: relation to Fourier power spectrum. Neurocomputing, 52–54, 755–761.
    18. Rudolph, A. (2003). Quantification and Estimation of Differential Odometry Errors in Mobile Robotics with Redundant Sensor Information. I. J. Robotics Res., 22(2), 117–128.
    19. Brückner, S., & Rudolph, S. (2003). Knowledge discovery in engineering dynamic system analysis. In B. V. Dasarathy (Ed.), Data Mining and Knowledge Discovery: Theory, Tools, and Technology (Vol. 5098, pp. 185–192). SPIE.
    20. Busemann, S. (2003). Generierung natürlichsprachlicher Texte. In G. Görz, C.-R. Rollinger, & J. Schneeberger (Eds.), Handbuch der Künstlichen Intelligenz (pp. 783–814). Oldenbourg / De Gruyter.
  20. 2002

    1. Rudolph, M., & Destexhe, A. (2002). Point-conductance models of cortical neurons with high discharge variability. Neurocomputing, 44–46, 147–152.
    2. Oepen, S. (2002). Competence and performance profiling for constraint-based grammars: a new methodology, toolkit, and applications. (pp. 1–178). Saarland University.
    3. Grabmeier, J., & Rudolph, A. (2002). Techniques of Cluster Algorithms in Data Mining. Data Min. Knowl. Discov., 6(4), 303–360.
    4. Spekkens, R. W., & Rudolph, T. (2002). Optimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol. Quantum Information & Computation, 2(1), 66–96.
    5. Kreutzer, S. (2002). Pure and applied fixed-point logics. In D. Wagner (Ed.), Ausgezeichnete Informatikdissertationen: Vol. D-3 (pp. 59–68). GI.
    6. Graubmann, P., & Rudolph, E. (2002). MSC Connectors: The Philosopher’s Stone. In E. Sherratt (Ed.), SAM (Vol. 2599, pp. 199–220). Springer.
    7. Zulkernine, M., & Seviora, R. E. (2002). Assume-Guarantee Algorithms for Automatic Detection of Software Failures. In M. J. Butler, L. Petre, & K. Sere (Eds.), IFM (Vol. 2335, pp. 89–108). Springer.
    8. Mertens, S. (2002). Computational complexity for physicists. Computing in Science and Engineering, 4(3), 31–47.
    9. Wiegandt, D., & Nassar, C. R. (2002). Higher-speed, higher-performance 802.11a wireless LAN via carrier-interferometry orthogonal frequency division multiplexing. ICC, 527–532.
    10. Schulz, S. (2002). E - a brainiac theorem prover. AI Commun., 15(2–3), 111–126.
    11. Spitz, S. (2002). Entwurf einer Beschreibungssprache zur Verifikation digitaler Signaturen. (pp. 1–115). Technical University Munich, Germany.
    12. Rudolph, M., & Destexhe, A. (2002). Novel dynamics of dendritic integration in the high conductance state of cortical neurons. Neurocomputing, 44–46, 141–146.
    13. Tao, Y.-C., & Leibel, R. L. (2002). Identifying functional relationships among human genes by systematic analysis of biological literature. BMC Bioinformatics, 3, 16.
    14. Gürgens, S., Ochsenschläger, P., & Rudolph, C. (2002). Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. DEXA Workshops, 473–482.
    15. Kiemle, S. (2002). From Digital Archive to Digital Library - A Middleware for Earth-Observation Data Management. In M. Agosti & C. Thanos (Eds.), ECDL (Vol. 2458, pp. 230–237). Springer.
    16. Gürgens, S., & Rudolph, C. (2002). Security Analysis of (Un-) Fair Non-repudiation Protocols. In A. E. Abdallah, P. Ryan, & S. Schneider (Eds.), FASec (Vol. 2629, pp. 97–114). Springer.
    17. Zulkernine, M., & Seviora, R. E. (2002). A Compositional Approach to Monitoring Distributed Systems. DSN, 763–772.
    18. Grigolli, S. (2002). Datenschutz in Italien. Datenschutz Und Datensicherheit, 26(6), Article 6.
    19. Gürgens, S., Ochsenschläger, P., & Rudolph, C. (2002). Authenticity and Provability - A Formal Framework. In G. I. Davida, Y. Frankel, & O. Rees (Eds.), InfraSec (Vol. 2437, pp. 227–245). Springer.
    20. Herrmann, S. (2002). Bericht über die Component Deployment 2002 am 20. und 21. Juni 2002 in Berlin. Softwaretechnik-Trends, 22(4), Article 4.
    21. Herrmann, S. (2002). Object Teams: Improving Modularity for Crosscutting Collaborations. In M. Aksit, M. Mezini, & R. Unland (Eds.), NetObjectDays (Vol. 2591, pp. 248–264). Springer.
    22. Brückner, S., & Rudolph, S. (2002). Aspects of knowledge discovery in technical data. In B. V. Dasarathy (Ed.), Data Mining and Knowledge Discovery: Theory, Tools, and Technology (Vol. 4730, pp. 109–117). SPIE.
    23. Herrmann, S. (2002). Views and concerns and interrelationships: lessons learned from developing the multi-view software engineering environment PIROL. Technical University of Berlin, Germany.
    24. Barrios, L. J., & Rudolph, S. (2002). Knowledge discovery process for scientific and engineering data. In B. V. Dasarathy (Ed.), Data Mining and Knowledge Discovery: Theory, Tools, and Technology (Vol. 4730, pp. 118–125). SPIE.
  21. 2001

    1. Grabowski, J., Graubmann, P., & Rudolph, E. (2001). HyperMSCs with Connectors for Advanced Visual System Modelling and Testing. In R. Reed & J. Reed (Eds.), SDL Forum (Vol. 2078, pp. 129–147). Springer.
    2. Schulz, S. (2001). Information-Based Selection of Abstraction Levels. In I. Russell & J. F. Kolen (Eds.), FLAIRS Conference (pp. 402–406). AAAI Press.
    3. Suh, G. E., Rudolph, L., & Devadas, S. (2001). Effects of Memory Performance on Parallel Job Scheduling. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 2221, pp. 116–132). Springer.
    4. Kreutzer, S. (2001). Operational Semantics for Fixed-Point Logics on Constraint Databases. In R. Nieuwenhuis & A. Voronkov (Eds.), LPAR (Vol. 2250, pp. 470–484). Springer.
    5. Volmer, S. (2001). Buoy Indexing of Metric Feature Spaces for Fast Approximate Image Queries. In J. A. Jorge, N. Correia, H. Jones, & M. B. Kamegai (Eds.), Eurographics Multimedia Workshop (pp. 131–140). Eurographics Association.
    6. Philippi, S. (2001). Modeling and Inheritance of Behaviour in Object-Oriented Systems. IV, 342–350.
    7. Fischer, S. (2001). Course and exercise sequencing using metadata in adaptive hypermedia learning systems. ACM Journal of Educational Resources in Computing, 1(1), 5.
    8. Noser, H., Rudolph, S., & Stucki, P. (2001). Physics-Enhanced L-Systems. WSCG, 214–221.
    9. Zulkernine, M., & Seviora, R. E. (2001). Assume-Guarantee Supervisor for Concurrent Systems. IPDPS, 151.
    10. Heuser, S. (2001). Digital Rights Management - Dealmaker for E-business? In L. Fiege, G. Mühl, & U. G. Wilhelm (Eds.), WELCOM (Vol. 2232, pp. 11–12). Springer.
    11. Schulz, S. (2001). System Abstract: E 0.61. In R. Goré, A. Leitsch, & T. Nipkow (Eds.), IJCAR (Vol. 2083, pp. 370–375). Springer.
    12. Heuel, S. (2001). Points, Lines, and Planes and Their Optimal Estimation. In B. Radig & S. Florczyk (Eds.), DAGM-Symposium (Vol. 2191, pp. 92–99). Springer.
    13. Ganter, B., & Rudolph, S. (2001). Formal Concept Analysis Methods for Dynamic Conceptual Graphs. In H. S. Delugach & G. Stumme (Eds.), ICCS (Vol. 2120, pp. 143–156). Springer.
    14. Rudolph, A. R. (2001). Software-Lizenzverträge. Aus der Arbeit des Arbeitskreises Software-Lizenzen im ZKI. Praxis Der Informationsverarbeitung Und Kommunikation, 24(2), 111–114.
    15. Radetzky, A., & Rudolph, M. (2001). Simulating tumour removal in neurosurgery. I. J. Medical Informatics, 64(2–3), 461–472.
    16. Mizuko, M., & Chlemik, R. (2001). Utlizing Computer Dictation for Language SampleTranscript. In W. A. Lawrence-Fowler & J. Hasebrook (Eds.), WebNet (p. 869). AACE.
    17. Diehl, S. (2001). Future Perspectives - Introduction. In S. Diehl (Ed.), Software Visualization (Vol. 2269, pp. 347–353). Springer.
    18. Rudolph, M., Hô, N., & Destexhe, A. (2001). Synaptic background activity affects the dynamics of dendritic integration in model neocortical pyramidal neurons. Neurocomputing, 38–40, 327–333.
    19. Robertson, S. (2001). On Laboratory Testing of Text Retrieval Systems. NTCIR.
    20. Diehl, S. (2001). Distributed virtual worlds - foundations and implementation techniques using VRML, Java, and CORBA. (pp. I–XII, 1–166). Springer.
    21. Mertens, S. (2001). A physicist’s approach to number partitioning. Theor. Comput. Sci., 265(1–2), 79–108.
    22. Heymann, P., Doerner, R., & Rudolph, M. (2001). Multiharmonic generators for relative phase calibration of nonlinear network analyzers. IEEE Trans. Instrumentation and Measurement, 50(1), 129–134.
    23. Olariu, S. (2001). Preface: Special Issue on Wireless Networks. J. Parallel Distrib. Comput., 61(7), 853–854.
    24. Baker, P., Rudolph, E., & Schieferdecker, I. (2001). Graphical Test Specification - The Graphical Format of TTCN-3. In R. Reed & J. Reed (Eds.), SDL Forum (Vol. 2078, pp. 148–167). Springer.
    25. Rudolph, M., & Destexhe, A. (2001). Do Neocortical Pyramidal Neurons Display Stochastic Resonance? Journal of Computational Neuroscience, 11(1), 19–42.
    26. Philippi, S. (2001). Visual Programming of Concurrent Object-Oriented Systems. J. Vis. Lang. Comput., 12(2), 127–143.
    27. Tobies, S. (2001). Complexity results and practical algorithms for logics in knowledge representation. (pp. 1–174). RWTH Aachen University, Germany.
    28. Rudolph, G. (2001). Self-adaptive mutations may lead to premature convergence. IEEE Trans. Evolutionary Computation, 5(4), 410–414.
    29. Rudolph, L. (2001). Project Oxygen: Pervasive, Human-Centric Computing - An Initial Experience. In K. R. Dittrich, A. Geppert, & M. C. Norrie (Eds.), CAiSE (Vol. 2068, pp. 1–12). Springer.
    30. Brückner, S., & Rudolph, S. (2001). Knowledge discovery in scientific data using hierarchical modeling in dimensional analysis. In B. V. Dasarathy (Ed.), Data Mining and Knowledge Discovery: Theory, Tools, and Technology (Vol. 4384, pp. 208–217). SPIE.
    31. Graubmann, P., Rudolph, E., & Grabowski, J. (2001). Component Interface Description Using HyperMSCs and Connectors. HCC, 96–102.
  22. 2000

    1. Schäfer, S. (2000). Efficient object-based hierarchical radiosity methods. (pp. I–VII, 1–121). Universität Braunschweig.
    2. Redstone, J., Eggers, S. J., & Levy, H. M. (2000). An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 245–256). ACM Press.
    3. Sundaramoorthy, K., Purser, Z., & Rotenberg, E. (2000). Slipstream Processors: Improving both Performance and Fault Tolerance. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 257–268). ACM Press.
    4. Flautner, K., Uhlig, R., Reinhardt, S. K., & Mudge, T. N. (2000). Thread Level Parallelism and Interactive Performance of Desktop Applications. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 129–138). ACM Press.
    5. Diehl, S. (2000). Natural Semantics-Directed Generation of Compilers and Abstract Machines. Formal Asp. Comput., 12(2), 71–99.
    6. Schlosser, S. W., Griffin, J. L., Nagle, D., & Ganger, G. R. (2000). Designing computer systems with MEMS-based storage. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 1–12). ACM Press.
    7. Duesterwald, E., & Bala, V. (2000). Software Profiling for Hot Path Prediction: Less is More. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 202–211). ACM Press.
    8. Rudolph, E., Schieferdecker, I., & Grabowski, J. (2000). HyperMSC - a Graphical Representation of TTCN. In E. Sherratt (Ed.), SAM (pp. 76-). VERIMAG, IRISA, SDL Forum.
    9. Jarzabek, S., & Seviora, R. E. (2000). Engineering components for ease of customisation and evolution. IEE Proceedings - Software, 147(6), 237–248.
    10. Rudolph, G. (2000). Takeover Times and Probabilities of Non-Generational Selection Rules. In L. D. Whitley, D. E. Goldberg, E. Cantú-Paz, L. Spector, I. C. Parmee, & H.-G. Beyer (Eds.), GECCO (pp. 903-). Morgan Kaufmann.
    11. Burrows, M., Erlingsson, Ú., Leung, S.-T., Vandevoorde, M. T., Waldspurger, C. A., Walker, K., & Weihl, W. E. (2000). Efficient and Flexible Value Sampling. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 160–167). ACM Press.
    12. Vaxelaire, B., Sock, R., & Perrier, P. (2000). Gestural overlap, place of articulation and speech rate - an x-ray investigation. INTERSPEECH, 166–169.
    13. Mattson, P. R., Dally, W. J., Rixner, S., Kapasi, U. J., & Owens, J. D. (2000). Communication Scheduling. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 82–92). ACM Press.
    14. Rudolph, E., Schieferdecker, I., & Grabowski, J. (2000). Development of a MSC/UML Test Format. In J. Grabowski & S. Heymer (Eds.), FBT (pp. 153–164). Verlag Shaker.
    15. Diehl, S. (2000). A generative methodology for the design of abstract machines. Sci. Comput. Program., 38(1–3), 125–142.
    16. Merz, S. (2000). Weak Alternating Automata in Isabelle/HOL. In M. Aagaard & J. Harrison (Eds.), TPHOLs (Vol. 1869, pp. 424–441). Springer.
    17. ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, 2000. (2000). In L. Rudolph & A. Gupta (Eds.), ASPLOS. ACM Press.
    18. Snavely, A., & Tullsen, D. M. (2000). Symbiotic Jobscheduling for a Simultaneous Multithreading Processor. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 234–244). ACM Press.
    19. Kawahito, M., Komatsu, H., & Nakatani, T. (2000). Effective Null Pointer Check Elimination Utilizing Hardware Trap. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 139–149). ACM Press.
    20. Zahir, R., Ross, J., Morris, D., & Hess, D. (2000). OS and Compiler Considerations in the Design of the IA-64 Architecture. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 212–221). ACM Press.
    21. Lie, D., Thekkath, C. A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J. C., & Horowitz, M. (2000). Architectural Support for Copy and Tamper Resistant Software. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 168–177). ACM Press.
    22. Connors, D. A., Hunter, H. C., Cheng, B.-C., & mei W. Hwu, W. (2000). Hardware Support for Dynamic Management of Compiler-Directed Computation Reuse. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 222–233). ACM Press.
    23. Rudolph, S. (2000). Knowledge discovery in scientific data. In B. V. Dasarathy (Ed.), Data Mining and Knowledge Discovery: Theory, Tools, and Technology (Vol. 4057, pp. 250–258). SPIE.
    24. Nanda, A. K., Mak, K.-K., Sugavanam, K., Sahoo, R. K., Soundararajan, V., & Smith, T. B. (2000). MemorIES: A Programmable, Real-Time Hardware Emulation Tool for Multiprocessor Server Design. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 37–48). ACM Press.
    25. Berger, E. D., McKinley, K. S., Blumofe, R. D., & Wilson, P. R. (2000). Hoard: A Scalable Memory Allocator for Multithreaded Applications. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 117–128). ACM Press.
    26. Winter, S. (2000). Uncertain topological relations between imprecise regions. International Journal of Geographical Information Science, 14(5), 411–430.
    27. Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S. E., Eaton, P. R., Geels, D., Gummadi, R., Rhea, S. C., Weatherspoon, H., Weimer, W., Wells, C., & Zhao, B. Y. (2000). OceanStore: An Architecture for Global-Scale Persistent Storage. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 190–201). ACM Press.
    28. Lebeck, A. R., Fan, X., Zeng, H., & Ellis, C. S. (2000). Power Aware Page Allocation. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 105–116). ACM Press.
    29. Rudolph, L., & Smith, P. H. (2000). Valuation of Ultra-scale Computing Systems. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 1911, pp. 39–55). Springer.
    30. Hertkorn, P., & Rudolph, S. (2000). Systematic method to identify patterns in engineering data. In B. V. Dasarathy (Ed.), Data Mining and Knowledge Discovery: Theory, Tools, and Technology (Vol. 4057, pp. 273–280). SPIE.
    31. Rudolph, S., & Noser, H. (2000). On Engineering Design Generation with XML-based Knowledge-Enhanced Grammars. In U. Cugini & M. J. Wozny (Eds.), Knowledge Intensive CAD (Vol. 207, pp. 213–226). Kluwer.
    32. Gibson, J., Kunz, R., Ofelt, D., & Heinrich, M. (2000). FLASH vs. (Simulated) FLASH: Closing the Simulation Loop. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 49–58). ACM Press.
    33. Werner, S. (2000). Der Autor im digitalen Medium - ein notwendiges Konstrukt? In G. Knorz & R. Kuhlen (Eds.), ISI (Vol. 38, pp. 285–302). Hochschulverband für Informationswissenschaft.
    34. Chou, A., Chelf, B., Engler, D. R., & Heinrich, M. (2000). Using Meta-level Compilation to Check FLASH Protocol Code. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 59–70). ACM Press.
    35. Dempe, S. (2000). A Bundle Algorithm Applied to Bilevel Programming Problems with Non-Unique Lower Level Solutions. Comp. Opt. and Appl., 15(2), 145–166.
    36. Hill, J. L., Szewczyk, R., Woo, A., Hollar, S., Culler, D. E., & Pister, K. S. J. (2000). System Architecture Directions for Networked Sensors. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 93–104). ACM Press.
    37. Graubmann, P., & Rudolph, E. (2000). HyperMSCs and Sequence Diagrams for Use Case Modelling and Testing. In A. Evans, S. Kent, & B. Selic (Eds.), UML (Vol. 1939, pp. 32–46). Springer.
    38. Bhoedjang, R., Verstoep, K., Rühl, T., Bal, H. E., & Hofman, R. F. H. (2000). Evaluating Design Alternatives for Reliable Communication on High-Speed Networks. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 71–81). ACM Press.
    39. Burke, J., McDonald, J., & Austin, T. M. (2000). Architectural Support for Fast Symmetric-Key Cryptography. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 178–189). ACM Press.
    40. Düwel, S. (2000). BASE - Ein begriffbasiertes Analyseverfahren für die Software-Entwicklung. Softwaretechnik-Trends, 20(4), Article 4.
    41. Zhang, Y., Yang, J., & Gupta, R. (2000). Frequent Value Locality and Value-Centric Data Cache Design. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 150–159). ACM Press.
    42. Martin, M. M. K., Sorin, D. J., Ailamaki, A., Alameldeen, A. R., Dickson, R. M., Mauer, C. J., Moore, K. E., Plakal, M., Hill, M. D., & Wood, D. A. (2000). Timestamp snooping: an approach for extending SMPs. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 25–36). ACM Press.
    43. Schmitt, S. (2000). A Tableau-Like Representation Framework for Efficient Proof Reconstruction. In R. Dyckhoff (Ed.), TABLEAUX (Vol. 1847, pp. 398–414). Springer.
    44. Gharachorloo, K., Sharma, M., Steely, S., & Doren, S. V. (2000). Architecture and design of AlphaServer GS320. In L. Rudolph & A. Gupta (Eds.), ASPLOS (pp. 13–24). ACM Press.
  23. 1999

    1. Philippi, S. (1999). OOPr/T-Modelle - ein Pr/T-Netz basierter Ansatz zur objektorientierten Modellierung. In J. Desel & A. Oberweis (Eds.), AWPN (Vol. 26).
    2. Brandt, S. (1999). 9-Connected Claw-Free Graphs Are Hamilton-Connected. J. Comb. Theory, Ser. B, 75(2), 167–173.
    3. Shen, X., Arvind, & Rudolph, L. (1999). Commit-Reconcile & Fences (CRF): A New Memory Model for Architects and Compiler Writers. In A. Gottlieb & W. J. Dally (Eds.), ISCA (pp. 150–161). IEEE Computer Society.
    4. Rudolph, E., Grabowski, J., & Graubmann, P. (1999). Towards a harmonization of UML-sequence diagrams and MSC. In R. Dssouli, G. von Bochmann, & Y. Lahav (Eds.), SDL Forum (pp. 193–208). Elsevier.
    5. Korsholm, S. (1999). Transparent, Scalable, Efficient OO-Persistence. In A. M. D. Moreira & S. Demeyer (Eds.), ECOOP Workshops (Vol. 1743, p. 212). Springer.
    6. Reitzner, S. (1999). Koordinierung in nebenläufigen, objektorientierten Systemen. (pp. 1–117). University of Erlangen-Nuremberg, Germany.
    7. Pienaar, R., & Kruger, J. J. (1999). An Introduction to an Egocentric Concept of Machine Intelligence. International Journal on Artificial Intelligence Tools, 8(3), 313–336.
    8. Winter, S. (1999). Topological Relations in Hierarchical Partitions. In C. Freksa & D. M. Mark (Eds.), COSIT (Vol. 1661, pp. 141–155). Springer.
    9. Brissett, R., & Sodha, J. (1999). On unequal error protection using convolutional codes. Signal Processing, 77(1), 63–70.
    10. Darken, R. P., & Cevik, H. (1999). Map Usage in Virtual Environments: Orientation Issues. VR, 133–140.
    11. Wehner, S. (1999). On Recursive Enumerability with Finite Repetitions. J. Symb. Log., 64(3), 927–945.
    12. Eiben, A. E., & Rudolph, G. (1999). Theory of Evolutionary Algorithms: A Bird’s Eye View. Theor. Comput. Sci., 229(1), 3–9.
    13. Hertkorn, P., & Rudolph, S. (1999). From data to models: synergies of a joint data mining and similarity theory approach. In B. V. Dasarathy (Ed.), Data Mining and Knowledge Discovery: Theory, Tools, and Technology (Vol. 3695, pp. 120–127). SPIE.
    14. Shen, X., Arvind, & Rudolph, L. (1999). CACHET: an adaptive cache coherence protocol for distributed shared-memory systems. In T. S. Papatheodorou, M. Valero, C. D. Polychronopoulos, Y. Muraoka, & J. Labarta (Eds.), International Conference on Supercomputing (pp. 135–144). ACM.
    15. Mertens, S. (1999). A complete anytime algorithm for balanced number partitioning. CoRR, cs.DS/9903011.
    16. Vaxelaire, B., Sock, R., & Hecker, V. (1999). Perceiving anticipatory phonetic gestures in French. EUROSPEECH.
    17. Hartmann, S. (1999). Layout problems in VLSI circuit design. (pp. 1–142). Cuvillier.
    18. Rudolph, T. (1999). Evolutionäre Optimierung schneller Worterkenner. (pp. 1–286). w.e.b.-Univ.-Verlag.
  24. 1998

    1. Feitelson, D. G., & Rudolph, L. (1998). Metrics and Benchmarking for Parallel Job Scheduling. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 1459, pp. 1–24). Springer.
    2. Rudolph, J., & Delaleau, E. (1998). Some Examples and Remarks on Quasi-Static Feedback of Generalized States. Automatica, 34(8), 993–999.
    3. Rudolph, C. (1998). Analyse kryptographischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik. In GMD research series: Vol. 13/1998 (pp. 1–49). GMD.
    4. Rudolph, G. (1998). On Risky Methods for Local Selection under Noise. In A. E. Eiben, T. Bäck, M. Schoenauer, & H.-P. Schwefel (Eds.), PPSN (Vol. 1498, pp. 169–177). Springer.
    5. Diehl, S. (1998). A Formal Introduction to the Compilation of Java. Softw., Pract. Exper., 28(3), 297–327.
    6. Kleuker, S. (1998). Reengineering of Distributed Systems Using Formal Methods. CSMR, 189–192.
    7. Ohr, S. (1998). How Much Analog Does a Designer Need to Know for Successful Mixed-Signal Design? (Panel). In B. R. Chawla, R. E. Bryant, & J. M. Rabaey (Eds.), DAC (p. 250). ACM Press.
    8. Rudolph, G. (1998). Evolutionary Search for Minimal Elements in Partially Ordered Finite Sets. In V. W. Porto, N. Saravanan, D. E. Waagen, & A. E. Eiben (Eds.), Evolutionary Programming (Vol. 1447, pp. 345–353). Springer.
    9. Rudolph, M. M. (1998). National freight transport planning : towards a Strategic Planning Extranet Decision Support System (SPEDSS). Loughborough University, UK.
    10. Darken, R. P., & Banker, W. P. (1998). Navigating in natural environments: a virtual environment training transfer study. VRAIS, 12–19.
    11. Reitzner, S. (1998). Virtual synchronization: uncoupling synchronization annotations from synchronization code. In K. M. George & G. B. Lamont (Eds.), SAC (pp. 655–659). ACM.
    12. Zyda, M., & Darken, R. P. (1998). The Naval Postgraduate School’s Moves Curriculum. IEEE Computer Graphics and Applications, 18(3), 8–11.
    13. Wesemeyer, S. (1998). On the Automorphism Group of Various Goppa Codes. IEEE Trans. Information Theory, 44(2), 630–643.
    14. Savor, T., & Seviora, R. E. (1998). Toward Automatic Detection of Software Failures. IEEE Computer, 31(8), 68–74.
    15. Rudolph, G. (1998). Finite Markov Chain Results in Evolutionary Computation: A Tour d’Horizon. Fundam. Inform., 35(1–4), 67–89.
    16. Rudolph, C. (1998). A Formal Model for Systematic Design of Key Establishment Protocols. In C. Boyd & E. Dawson (Eds.), ACISP (Vol. 1438, pp. 332–343). Springer.
    17. Savor, T., & Seviora, R. E. (1998). Automatic detection of software failures: issues and experience. ECRTS, 245–252.
    18. Pontow, S. (1998). Modelling CSP Solution Algorithms with Petri Decision Nets. In M. J. Maher & J.-F. Puget (Eds.), CP (Vol. 1520, p. 471). Springer.
  25. 1997

    1. Kleuker, S. (1997). Formalizing Requirements for Distributed Systems with Trace Diagrams. In J. S. Fitzgerald, C. B. Jones, & P. Lucas (Eds.), FME (Vol. 1313, pp. 102–121). Springer.
    2. Rudolph, R. (1997). Stellenbewerbung und Datenschutz. (pp. 1–182). Stämpfli.
    3. Rudolph, S. (1997). On topology, size and generalization of non-linear feed-forward neural networks. Neurocomputing, 16(1), 1–22.
    4. Feitelson, D. G., Rudolph, L., Schwiegelshohn, U., Sevcik, K. C., & Wong, P. (1997). Theory and Practice in Parallel Job Scheduling. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 1291, pp. 1–34). Springer.
    5. Rudolph, G. (1997). Local convergence rates of simple evolutionary algorithms with Cauchy mutations. IEEE Trans. Evolutionary Computation, 1(4), 249–258.
    6. Kleuker, S. (1997). Inkrementelle Entwicklung von verifizierten Spezifikationen für verteilte Systeme. (pp. 1–320). University of Oldenburg, Germany.
    7. Diehl, S. (1997). VRML++: A Language for Object-Oriented Virtual-Reality Models. TOOLS (24), 141–150.
    8. Zelewski, S. (1997). Elektronische Märkte zur Prozeßkoordinierung in Produktionsnetzwerken. Wirtschaftsinformatik, 39(3), 231–243.
    9. Loidl, S., Rudolph, E., & Hinkel, U. (1997). MSC’96 and beyond - a critical look. In A. R. Cavalli & A. Sarma (Eds.), SDL Forum (pp. 213-). Elsevier.
    10. Kleuker, S. (1997). Anforderungsformalisierung für synchron kommunizierende Prozesse mit Trace-Diagrammen. In A. Wolisz, I. Schieferdecker, & A. Rennoch (Eds.), FBT (Vol. 315, pp. 175–184). GMD-Forschungszentrum Informationstechnik GmbH.
    11. Savor, T., & Seviora, R. E. (1997). Hierarchical supervisors for automatic detection of software failures. ISSRE, 48–59.
    12. Brandt, S. (1997). Computing the Independence Number of Dense Triangle-Free Graphs. In R. H. Möhring (Ed.), WG (Vol. 1335, pp. 100–108). Springer.
    13. Melzer, S. (1997). Verification of Parallel Systems using Constraint Programming. In G. Smolka (Ed.), CP (Vol. 1330, pp. 92–106). Springer.
    14. Rudolph, G. (1997). Reflections on Bandit Problems and Selection Methods in Uncertain Environments. In T. Bäck (Ed.), ICGA (pp. 166–173). Morgan Kaufmann.
    15. Lee, W., Frank, M. I., Lee, V., Mackenzie, K., & Rudolph, L. (1997). Implications of I/O for Gang Scheduled Workloads. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 1291, pp. 215–237). Springer.
    16. Pekilis, B. R., & Seviora, R. E. (1997). Detection of response time failures of real-time software. ISSRE, 38–47.
    17. Burger, R. E. (1997). Colormanagement - Konzepte, Begriffe, Systeme. In Edition PAGE (pp. I–XII, 1–79). Springer.
    18. Roppel, S. (1997). Visualisierung und Adaption: Techniken zur Verbesserung der Interaktion mit hierarchisch strukturierter Information. (pp. 1–248). University of Regensburg.
    19. Stephan, F. (1997). Noisy Inference and Oracles. Theor. Comput. Sci., 185(1), 129–157.
    20. Rudolph, G. (1997). Asymptotical Convergence Rates of Simple Evolutionary Algorithms under Factorizing Mutation Distributions. In J.-K. Hao, E. Lutton, E. M. A. Ronald, M. Schoenauer, & D. Snyers (Eds.), Artificial Evolution (Vol. 1363, pp. 223–236). Springer.
    21. Kleuker, S. (1997). Incremental Development of Deadlock-Free Communicating Systems. In E. Brinksma (Ed.), TACAS (Vol. 1217, pp. 306–320). Springer.
    22. Rudolph, G. (1997). Convergence properties of evolutionary algorithms. (pp. I–X, 1–286). Kovac.
    23. Vaxelaire, B., & Sock, R. (1997). Laryngeal movements and speech rate: an x-ray investigation. In G. Kokkinakis, N. Fakotakis, & E. Dermatas (Eds.), EUROSPEECH. ISCA.
    24. Savor, T., & Seviora, R. E. (1997). An Approach to Automatic Detection of Software Failures in Real-Time Systems. IEEE Real Time Technology and Applications Symposium, 136–146.
    25. Savor, T., & Seviora, R. E. (1997). Supervisors for Testing Non-Deterministically Specified Systems. ITC, 948–953.
    26. Greene, S. (1997). Metadata for Units of Measure in Social Science Databases. Int. J. on Digital Libraries, 1(2), 161–175.
    27. Schäfer, S. (1997). Hierarchcal Radiosity on Curved Surfaces. In J. Dorsey & P. Slusallek (Eds.), Rendering Techniques (pp. 187–192). Springer.
    28. Kindermann, S. (1997). Strukturbasierte Programmgenerierung für massiv parallele Rechensysteme. (pp. 1–235). University of Erlangen-Nuremberg.
    29. Lagerstrom, R. N., & Gipp, S. K. (1997). PScheD: Political Scheduling on the CRAY T3E. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 1291, pp. 117–138). Springer.
    30. Iorgulescu, R., & Seviora, R. E. (1997). A Method for Continuous Real-Time Supervision. Softw. Test., Verif. Reliab., 7(2), 69–98.
    31. Johnson, S., Rudolph, B., & Sharp, J. (1997). Using the Internet for and by Teachers. In S. Lobodzinski & I. Tomek (Eds.), WebNet. AACE.
    32. Rudolph, G. L., & Martinez, T. R. (1997). A transformation strategy for implementing distributed, multilayer feedforward neural networks: Backpropagation transformation. Future Generation Comp. Syst., 12(6), 547–564.
    33. Diehl, S. (1997). VRML - Das aktuelle Schlagwort. Informatik Spektrum, 20(5), 294–295.
  26. 1996

    1. Rudolph, T. (1996). Discriminative Codebook Design for Critical Word Recognition Using Evolution Strategies. International Conference on Evolutionary Computation, 67–70.
    2. Roppel, S. (1996). Visualisierter hierarchischer Zugriff auf Faktendatenbanken. In W. D. Rauch, F. Strohmeier, H. Hiller, & C. Schlögl (Eds.), ISI (Vol. 27, pp. 285–296). Hochschulverband für Informationswissenschaft.
    3. Li, J. J., & Seviora, R. E. (1996). Automatic failure detection with Conditional-Belief supervisors. ISSRE, 4–13.
    4. Kolletzki, S. (1996). Secure Internet Banking with Privacy Enhanced Mail - A Protocol for Reliable Exchange of Secured Order Forms. Computer Networks and ISDN Systems, 28(14), 1891–1899.
    5. Feitelson, D. G., & Rudolph, L. (1996). Towards Convergence in Job Schedulers for Parallel Supercomputers. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 1162, pp. 1–26). Springer.
    6. Savor, T., & Seviora, R. E. (1996). An Architectural Overview of a Software Supervisor. RTS, 52–56.
    7. Rudolph, E., Graubmann, P., & Grabowski, J. (1996). Tutorial on Message Sequence Charts. Computer Networks and ISDN Systems, 28(12), 1629–1641.
    8. Busemann, S. (1996). Best-First Surface Realization. INLG (1).
    9. Simser, D. A., & Seviora, R. E. (1996). Supervision of real-time software systems using optimistic path prediction and rollbacks. ISSRE, 340–349.
    10. Feitelson, D. G., & Rudolph, L. (1996). Evaluation of Design Choices for Gang Scheduling Using Distributed Hierarchical Control. J. Parallel Distrib. Comput., 35(1), 18–34.
    11. Rothfuß, R., Rudolph, J., & Zeitz, M. (1996). Flatness based control of a nonlinear chemical reactor model. Automatica, 32(10), 1433–1439.
    12. Rudolph, G. (1996). How Mutation and Selection solve Long Path Problems in Polynomial Expected Time. Evolutionary Computation, 4(2), 195–205.
    13. Olariu, S. (1996). Foreword. Parallel Algorithms Appl., 8(3–4), 177–178.
    14. Rudolph, G. (1996). On Interactive Evolutionary Algorithms and Stochastic Mealy Automata. In H.-M. Voigt, W. Ebeling, I. Rechenberg, & H.-P. Schwefel (Eds.), PPSN (Vol. 1141, pp. 218–226). Springer.
    15. Rudolph, G., & Sprave, J. (1996). Significance of Locality and Selection Pressure in the Grand Deluge Evolutionary Algorithm. In H.-M. Voigt, W. Ebeling, I. Rechenberg, & H.-P. Schwefel (Eds.), PPSN (Vol. 1141, pp. 686–695). Springer.
    16. Darken, R. P., & Sibert, J. L. (1996). Wayfinding Strategies and Behaviors in Large Virtual Worlds. In B. A. Nardi, G. C. van der Veer, & M. J. Tauber (Eds.), CHI (pp. 142–149). ACM.
    17. Wang, F., Franke, H., Papaefthymiou, M. C., Pattnaik, P., Rudolph, L., & Squillante, M. S. (1996). A Gang Scheduling Design for Multiprogrammed Parallel Computing Environments. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 1162, pp. 111–125). Springer.
    18. Rothfuss, R., Rudolph, J., & Zeitz, M. (1996). Flatness based control of a nonlinear chemical reactor model. Automatica, 32(10), 1433–1439.
    19. Rudolph, G. L., & Martinez, T. R. (1996). LIA: A Location-Independent Transformation for ASOCS Adaptive Algorithm 2. Int. J. Neural Syst., 7(5), 639–654.
    20. Rudolph, G. (1996). Convergence of Evolutionary Algorithms in General Search Spaces. International Conference on Evolutionary Computation, 50–54.
    21. Randell, B., & Hirsch, R. E. (1996). Anecdotes. IEEE Annals of the History of Computing, 18(3), 56–59.
    22. Darken, R. P., & Sibert, J. L. (1996). Navigating large virtual spaces. Int. J. Hum. Comput. Interaction, 8(1), 49–71.
    23. Diehl, S. (1996). Semantics-directed generation of compilers and abstract machines (pp. 1–183). Saarland University, Saarbrücken, Germany.
  27. 1995

    1. Schwefel, H.-P., & Rudolph, G. (1995). Contemporary Evolution Strategies. In F. Morán, A. Moreno, J. J. M. Guervós, & P. Chacón (Eds.), ECAL (Vol. 929, pp. 893–907). Springer.
    2. Stephan, F. (1995). Learning via Queries and Oracles. In W. Maass (Ed.), COLT (pp. 162–169). ACM.
    3. Feitelson, D. G., & Rudolph, L. (1995). Parallel Job Scheduling: Issues and Approaches. In D. G. Feitelson & L. Rudolph (Eds.), JSSPP (Vol. 949, pp. 1–18). Springer.
    4. Darken, R. P. (1995). Wayfinding in large-scale virtual worlds. In J. Miller, I. R. Katz, R. L. Mack, & L. Marks (Eds.), CHI 95 Conference Companion (pp. 45–46). ACM.
    5. Rudolph, G. L., & Martinez, T. R. (1995). A transformation for implementing localist neural networks. Neural Parallel & Scientific Comp., 3(2), 173–187.
    6. Rechtschaffen, R. N., & Ekanadham, K. (1995). Self-parallelization of sequential object codes. In L. Bic, P. Evripidou, A. P. W. Böhm, & J.-L. Gaudiot (Eds.), PACT (pp. 281–283). IFIP Working Group on Algol / ACM.
    7. Sock, R., Perrier, P., & Löfqvist, A. (1995). Comparing tongue kinematic and acoustic phasing patterns for vowel quantity contrasts in WOLOF. EUROSPEECH.
    8. Rudolph, T. (1995). Entwurf diskriminativer Merkmalstransformation für die Spracherkennung mit naturanalogen Verfahren. In G. Sagerer, S. Posch, & F. Kummert (Eds.), DAGM-Symposium (pp. 52–59). Springer.
    9. Feitelson, D. G., & Rudolph, L. (1995). Coscheduling based on runtime identification of activity working sets. International Journal of Parallel Programming, 23(2), 135–160.
    10. Rudolph, G. L., & Martinez, T. R. (1995). A Transformation for Implementing Efficient Dynamic Backpropagation Neural Networks. In D. W. Pearson, N. C. Steele, & R. F. Albrecht (Eds.), ICANNGA (pp. 41–44). Springer.
    11. Savor, T., & Seviora, R. E. (1995). Improving the efficiency of supervision by software through state aggregation. IEEE Real Time Technology and Applications Symposium, 202–211.
    12. Citron, D., & Rudolph, L. (1995). Creating a Wider Bus Using Caching Techniques. HPCA, 90–99.
    13. Baumann, S. (1995). A simplified attributed graph grammar for high-level music recognition. ICDAR, 1080–1083.
  28. 1994

    1. Rudolph, G. (1994). Convergence of Non-Elitist Strategies. International Conference on Evolutionary Computation, 63–66.
    2. Brandt, S. (1994). Subtrees and Subforests of Graphs. J. Comb. Theory, Ser. B, 61(1), 63–70.
    3. Burger, R. E., & Sherman, D. (1994). Producing colorimetric data from film scanners using a spectral characterization target. In E. Walowit (Ed.), Device-Independent Color Imaging (Vol. 2170, pp. 42–52). SPIE.
    4. Rudolph, H. (1994). Dienstleistung à la carte. In H.-J. Kreowski, T. Risse, A. Spillner, R. E. Streibl, & K. Vosseberg (Eds.), FIFF Jahrestagung (pp. 162–164). agenda Verlag.
    5. Rudolph, G. (1994). Convergence analysis of canonical genetic algorithms. IEEE Trans. Neural Networks, 5(1), 96–101.
    6. Hartmann, S. (1994). Gewinnung effektiver Relevanzbeschreibungen und Indexierungsfunktionen für die automatische Indexierung. (pp. I–II, 1–141). TH Darmstadt.
    7. Rudolph, G. L., & Martinez, T. R. (1994). Location-Independent Transformations: a General Strategy for Implementing Neural Networks. International Journal on Artificial Intelligence Tools, 3(3), 417–428.
    8. Rudolph, G. (1994). An Evolutionary Algorithm for Integer Programming. In Y. Davidor, H.-P. Schwefel, & R. Männer (Eds.), PPSN (Vol. 866, pp. 139–148). Springer.
    9. Iorgulescu, R., & Seviora, R. E. (1994). A resynchronization method for real-time supervision. RTS, 66–71.
  29. 1993

    1. Lerman, G., & Rudolph, L. (1993). Parallel evolution of parallel processors. In Frontiers of computer science (pp. I–XI, 1–270). Plenum Press.
    2. Darken, R. P., & Sibert, J. L. (1993). A Toolset for Navigation in Virtual Environments. In S. E. Hudson, R. Pausch, B. T. V. Zanden, & J. D. Foley (Eds.), ACM Symposium on User Interface Software and Technology (pp. 157–165). ACM.
    3. Burger, R. E. (1993). Device-independent color scanning. In R. J. Motta & H. A. Berberian (Eds.), Device-Independent Color Imaging and Imaging Systems Integration (Vol. 1909, pp. 70–74). SPIE.
    4. Pickover, C. A., & Rudolph, L. (1993). Electronic Kaleidoscopes for the Mind. Comput. Graph. Forum, 12(1), 41–46.
    5. Roppel, S. (1993). Intelligent Retrieval in a Multimodal Materials Information System. In J. Rix & E. G. Schlechtendahl (Eds.), Interfaces in Industrial Systems for Production Engineering: Vol. B-10 (pp. 73–86). North-Holland.
    6. Seviora, R. E. (1993). Real-Time Detection of Failures of Reactive Systems. In J. Górski (Ed.), SAFECOMP (pp. 265–275). Springer.
    7. Seviora, R. E. (1993). Models for Real-Time Supervision. RTS, 232–237.
    8. Köber, R., & Schwederski, T. (1993). Special Issue Editorial: Parallel Processing. Comput. J., 36(8), 683–684.
    9. Rudolph, G. (1993). Massively Parallel Simulated Annealing and Its Relation to Evolutionary Algorithms. Evolutionary Computation, 1(4), 361–383.
    10. Sock, R., & Löfqvist, A. (1993). Resistance of bilabials /p, b/ to anticipatory labial and mandibular coarticulation from vowel types /i, a, u/. EUROSPEECH.
  30. 1992

    1. Heep, S. (1992). Anfragen auf Geometriedaten in CAD-Datenbanksystemen. (pp. 1–346). University of Bremen, Germany.
    2. Malhotra, P., & Seviora, R. E. (1992). Object Oriented Framework for Generating Machine Understanding of a Digital System Design. In F. Belli & F. J. Radermacher (Eds.), IEA/AIE (Vol. 604, pp. 690–700). Springer.
    3. Rudolph, G. (1992). On Correlated Mutations in Evolution Strategies. In R. Männer & B. Manderick (Eds.), PPSN (pp. 107–116). Elsevier.
    4. Cypser, R. J. (1992). Evolution of an Open Communications Architecture. IBM Systems Journal, 31(2), 161–188.
    5. Merz, S. (1992). Decidability and incompleteness results for first-order temporal logics of linear time. Journal of Applied Non-Classical Logics, 2(2), 139–156.
    6. Rudolph, L. (1992). Hardware Support for Collective Communication Operations. In F. M. auf der Heide, B. Monien, & A. L. Rosenberg (Eds.), Heinz Nixdorf Symposium (Vol. 678, pp. 110–118). Springer.
    7. Grabowski, J., & Rudolph, E. (1992). Message Sequence Chart (MSC) - A Survey of the new CCITT Language for the Description to Traces within Communications Systems. In H. König (Ed.), FBT (pp. 66–87). K. G. Saur Verlag.
    8. Kaufmann, S. (1992). Mathematica als Werkzeug - eine Einführung mit Anwendungsbeispielen. (pp. I–IV, 1–396). Birkhäuser.
    9. Feitelson, D. G., & Rudolph, L. (1992). Gang Scheduling Performance Benefits for Fine-Grain Synchronization. J. Parallel Distrib. Comput., 16(4), 306–318.
  31. 1991

    1. Busemann, S. (1991). Structure-Driven Generation From Separate Semantic Representations. In J. Kunze & D. Reimann (Eds.), EACL (pp. 113–118). The Association for Computer Linguistics.
    2. Rudolph, M., Neher, M., & Rosenstiel, W. (1991). Test scheduling and controller synthesis in the CADDY-system. In T. Ambler, J. A. G. Jess, & H. D. Man (Eds.), EURO-DAC (pp. 278–282). EEE Computer Society.
    3. Olariu, S. (1991). An Optimal Greedy Heuristic to Color Interval Graphs. Inf. Process. Lett., 37(1), 21–25.
    4. Schmid, S. (1991). Adaptive synchronization of interconnected systems. Kaiserslautern University of Technology, Germany.
    5. Olariu, S. (1991). Some aspects of the semi-perfect elimination. Discrete Applied Mathematics, 31(3), 291–298.
    6. Zernik, D., & Rudolph, L. (1991). Animating Work and Time for Debugging Parallel Programs - Foudations and Experience. In B. P. Miller & C. E. McDowell (Eds.), Workshop on Parallel and Distributed Debugging (pp. 46–56). ACM.
    7. Zernik, D., & Rudolph, L. (1991). Using Visual Tools for Developing an Asynchronous Parallel Layout Algorithm. ICPP (2), 280–281.
  32. 1990

    1. Albrecht, K.-F., & Rudolph, P. (1990). Parameterschätzung in nichtlinearen Modellen: Anwendung auf ein Wassergütemodell. In D. P. F. Möller & O. Richter (Eds.), Analyse dynamischer Systeme in Medizin, Biologie und Ökologie (Vol. 275, pp. 210–215). Springer.
    2. Wolf, S. (1990). CARGEX - ein Fallbeispiel eines objektorientierten Expertensystems zur Luftfrachtdisposition. Wirtschaftsinformatik, 32(3), 263–272.
    3. Rudolph, P. (1990). Entscheidungsunterstützung für die Wassergütebewirtschaftung. In D. P. F. Möller & O. Richter (Eds.), Analyse dynamischer Systeme in Medizin, Biologie und Ökologie (Vol. 275, pp. 216–222). Springer.
    4. Feitelson, D. G., & Rudolph, L. (1990). Mapping and Scheduling in a Shared Parallel Environment Using Distributed Hierarchical Control. In B. W. Wah (Ed.), ICPP (1) (pp. 1–8). Pennsylvania State University Press.
    5. Rudolph, G. (1990). Global Optimization by Means of Distributed Evolution Strategies. In H.-P. Schwefel & R. Männer (Eds.), PPSN (Vol. 496, pp. 209–213). Springer.
    6. Rudolph, M. (1990). Feedback-testing by using multiple input signature registers. J. Electronic Testing, 1(3), 213–219.
    7. Olariu, S. (1990). A Generalization of Chvátal’s Star-Cutset Lemma. Inf. Process. Lett., 33(6), 301–303.
    8. Olariu, S. (1990). Wings and perfect graphs. Discrete Mathematics, 80(3), 281–296.
    9. Rudolph, B. A. (1990). Self-Assessment Procedure XXI: A Self-Assessment Procedure on Concurrency. Commun. ACM, 33(5), 563–576.
    10. Feitelson, D. G., & Rudolph, L. (1990). Distributed Hierarchical Control for Parallel Processing. IEEE Computer, 23(5), 65–77.
    11. Feitelson, D. G., & Rudolph, L. (1990). Wasted resources in gang scheduling. In J. Maor & A. Peled (Eds.), Jerusalem Conference on Information Technology (pp. 127–136). IEEE Computer Society.
  33. 1989

    1. Reed, D. A., & Rudolph, D. C. (1989). Experiences with Hypercube Operating System Instrumentation. International Journal of High Speed Computing, 1(4), 517–542.
    2. Kelly, M. A., & Seviora, R. E. (1989). An Evaluation of DRete on CUPlD for OPSS Matching. In N. S. Sridharan (Ed.), IJCAI (pp. 84–90). Morgan Kaufmann.
    3. Rudolph, M. (1989). On the Use of Cepstral Representation in Synthesis From Reduced Performance Information. ICMC.
    4. Fensch, S. (1989). Anwendung von Netzen im Software-Entwurf für Steuerungssysteme. Technische Hochschule Karl-Marx-Stadt, Germany.
    5. Feitelson, D. G., & Rudolph, L. (1989). Implementation of a Wait-Free Synchronization Primitive that Solves n-Process Consensus. Inf. Process. Lett., 32(2), 81–83.
    6. Weinand, A., Gamma, E., & Marty, R. (1989). Design and Implementation of ET++, a Seamless Object-Oriented Application Framework. Structured Programming, 10(2), 63–87.
    7. Olariu, S. (1989). A decomposition for strongly perfect graphs. Journal of Graph Theory, 13(3), 301–311.
    8. Abramowski, S. (1989). Exakte Algorithmen zur Bewegung gelenkgekoppelter Objekte zwischen festen Hindernissen. (pp. 1–119). Karlsruhe Institute of Technology, Germany.
    9. Waack, S. (1989). Obere und untere Schranken für Schaltkreise und Verzweigungsprogramme. Academy of Sciences of the German Democratic Republic, Berlin, Germany.
    10. Rudolph, D. C., & Polychronopoulos, C. D. (1989). An efficient message-passing scheduler based on guided self scheduling. In G. Paul, T. S. Papatheodorou, D. Gannon, & E. N. Pudue (Eds.), ICS (pp. 50–61). ACM.
    11. Olariu, S. (1989). Weak bipolarizable graphs. Discrete Mathematics, 74(1–2), 159–171.
    12. Sydow, A., & Rudolph, P. (1989). Software zur Modellierung, Analyse und Steuerung der Wasserqualität. In A. Jaeschke, W. Geiger, & B. Page (Eds.), Informatik im Umweltschutz (Vol. 228, pp. 120–131). Springer.
    13. Gamma, E., Weinand, A., & Marty, R. (1989). Integration of a Programming Environment into ET++ - A Case Study. In S. Cook (Ed.), ECOOP (pp. 283–297). Cambridge University Press.
  34. 1988

    1. Euler, S. (1988). Automatische Spracherkennung auf der Grundlage stochastischer Wortmodelle. Goethe University Frankfurt, Frankfurt am Main, Germany.
    2. Neswadba, H., & Nitsch, R. (1988). Quality of telecommunication systems after sales: evaluation of field data. IEEE Journal on Selected Areas in Communications, 6(8), 1305–1308.
    3. Jahnsen, D., & Rudolph, H. (Eds.). (1988). Frauen gestalten Technik : Ingenieurinnen im internationalen Vergleich. Centaurus.
    4. Weinand, A., Gamma, E., & Marty, R. (1988). ET++ - An Object-Oriented Application Framework in C++. In N. K. Meyrowitz (Ed.), OOPSLA (pp. 46–57). ACM.
    5. Rudolph, B. A. (1988). Spin-out: the Chinese rings in the classroom. In H. L. Dershem (Ed.), SIGCSE (pp. 279–282). ACM.
    6. Zelewski, S. (1988). The concept of fuzzy sets with special regard to their linguistic interpretation - a solution for fuzzy problems? ZOR - Meth. & Mod. of OR, 32(1), 47–68.
    7. Olariu, S. (1988). Paw-Fee Graphs. Inf. Process. Lett., 28(1), 53–54.
    8. Olariu, S. (1988). All variations on perfectly orderable graphs. J. Comb. Theory, Ser. B, 45(2), 150–159.
    9. Sommerhalder, R., & van Westrhenen, S. C. (1988). The theory of computability - programs, machines, effectiveness and feasibility. In International computer science series (pp. I–XII, 1–441). Addison-Wesley.
    10. So, K., & Rechtschaffen, R. N. (1988). Cache Operations by MRU Change. IEEE Trans. Computers, 37(6), 700–709.
  35. 1987

    1. Kelly, M. A., & Seviora, R. E. (1987). A Multiprocessor Architecture for Production System Matching. In K. D. Forbus & H. E. Shrobe (Eds.), AAAI (pp. 36–41). Morgan Kaufmann.
    2. Selle, S. (1987). Desktop Publishing - ein Überblick. In M. Paul (Ed.), GI Jahrestagung (Vol. 156, pp. 240–251). Springer.
    3. Strohmeyer, S. (1987). Theoretisch-methodologische Probleme der Entwicklung und Nutzung diskreter Simulationsmodelle und daraus resultierende Konsequenzen für die Gestaltung des Zugangs zu fachgebietsorientierten Simulationssystemen. Dresden University of Technology, Germany.
    4. Seviora, R. E. (1987). Knowledge-Based Program Debugging Systems. IEEE Software, 4(3), 20–32.
    5. Peters, J. G., & Rudolph, L. (1987). Parallel Approximation Schemes for Subset Sum and Knapsack Problems. Acta Inf., 24(4), 417–432.
    6. Tsai, H. S., & Regner, R. G. (1987). Simulation analysis of demand assigned multiple access (DAMA) algorithms used in satelite communications systems. In A. Thesen, H. Grant, & W. D. Kelton (Eds.), Winter Simulation Conference (pp. 802–808). ACM.
    7. Trispel, S. (1987). Die Konstruktion effizienter Teststrategien zur automatisierten Bestimmung von Wahrnehmungsschwellen. (pp. 1–4). RWTH Aachen University, Germany.
    8. Kaufmann, S. (1987). Ein geometrieorientiertes Datenmodell für hochaggregiertes Arbeiten. Bundeswehr University Munich, Neubiberg, Germany.
  36. 1986

    1. Sommerhalder, R., & van Westrhenen, S. C. (1986). A Parallel O(log n) Algorithm for the Drawing of Algebraic Curves in an n*n Square. Inf. Process. Lett., 23(5), 221–226.
    2. Gil, J., & Rudolph, L. (1986). Counting and Packing in Parallel. ICPP, 1000–1002.
    3. Thun, R. E. (1986). On residue number system decoding. IEEE Trans. Acoustics, Speech, and Signal Processing, 34(5), 1346–1347.
    4. Mehl, S. (1986). Word Expert Parsing and Disambiguierung. Can inquiring expects be helpful?. LDV Forum, 4(2), 3–8.
  37. 1985

    1. Rudolph, L. (1985). A Robust Sorting Network. IEEE Trans. Computers, 34(4), 326–336.
    2. Rudolph, L., & Steiger, W. L. (1985). Subset Selection in Parallel. ICPP, 11–13.
    3. Dempe, S. (1985). Polynomiale Näherungsalgorithmen für ein NP-schwieriges lineares, gemischt-ganzzahliges Optimierungsproblem spezieller Struktur. Technische Hochschule Karl-Marx-Stadt, Germany.
    4. Segall, Z., & Rudolph, L. (1985). PIE: A Programming and Instrumentation Environment for Parallel Processing. IEEE Software, 2(6), 22–37.
    5. Albert, S. (1985). Untersuchung von Verfahren zur Prüfung von digitalen Systemen unter dem Gesichtspunkt der Erarbeitung eines neuen Prüfverfahrens mit Eignung für Selbstprüfanwendungen. Ingenieurhochschule Mittweida, Germany.
    6. Jobke, S. (1985). Über ein Näherungsverfahren zur Berechnung von Netzknoten in Zeitmultiplexnetzen mit Vielfachzugriff und Burst-Verkehr. In H. Beilner (Ed.), MMB (Vol. 110, pp. 360–374). Springer.
    7. Frydrychowicz, S. (1985). Anwendung der Gruppentheorie auf Probleme der Mustererkennung. (pp. 1–135). VDI-Verlag.
  38. 1984

    1. Rudolph, L., & Segall, Z. (1984). Dynamic Decentralized Cache Schemes for MIMD Parallel Processors. In D. P. Agrawal (Ed.), ISCA (pp. 340–347). ACM.
    2. Rudolph, J. (1984). Beitrag zur Gestaltung des Übertragungssystems funktionserweiterter DNC-Systeme für den gemischten Betrieb von verdrahtungsprogrammierten und speicherprogrammierten numerischen Steuerungen. Ingenieurhochschule Dresden, Germany.
    3. Neuthe, S. (1984). Untersuchungen zur Implementation des automatentheoretischen Modellkonzeptes für fachgebietsbezogene Simulationssysteme, dargestellt am Simulationssystem TOMAS. Ingenieurhochschule Dresden, Germany.
    4. Graubmann, P., & Rudolph, E. (1984). Prozessanalyse und Testdatengewinning für Vermittlungssysteme mit Hilfe von Petrinetzen. In H. Morgenbrod & W. Remmele (Eds.), Entwurf großer Software-Systeme (Vol. 19, pp. 192–209). Teubner.
    5. Rudolph, A. (1984). Stoppkriterien für ε-optimale Lernalgorithmen. (pp. 1–86). University of Bonn, Germany.
  39. 1983

    1. Sommerhalder, R., & van Westrhenen, S. C. (1983). Parallel Language Recognition in Constant Time by Cellular Automata. Acta Inf., 19, 397–407.
    2. Heilbrunner, S. (1983). Tests for the LR-, LL-, and LC-Regular Conditions. J. Comput. Syst. Sci., 27(1), 1–13.
    3. Schwarz, S. (1983). Scientific and Technical Information in Development: the Small Systems Syndrome and the Inverted binocular Strategy. Journal of Documentation, 39(1), 38–48.
    4. Fiume, E., Fournier, A., & Rudolph, L. (1983). A parallel scan conversion algorithm with anti-aliasing for a general-purpose ultracomputer. In P. P. Tanner (Ed.), SIGGRAPH (pp. 141–150). ACM.
  40. 1982

    1. Stephan, W. (1982). Ein allgemeiner Ansatz zum Nachweis der Äquivalenz von denotationaler und operationaler Semantik bei Programmiersprachen. (pp. 1–162). Karlsruhe Institute of Technology, Germany.
    2. Rudolph, H. (1982). Beiträge zur Theorie, zu Verfahren und zu den Anwendungen der linearen Optimierung in topologischen Vektorräumen. Leipzig University, Germany.
  41. 1981

    1. Heilbrunner, S. (1981). A Parsing Automata Approach to LR Theory. Theor. Comput. Sci., 15, 117–157.
  42. 1980

    1. Sommerhalder, R. (1980). Classes of Languages Proof Against Regular Pumping. ITA, 14(2), 169–180.
    2. Heilbrunner, S. (1980). An Algorithm for the Solution of Fixed-Point Equations for Infinite Words. ITA, 14(2), 131–141.
  43. 1975

    1. Sommerhalder, R. (1975). On the number of automorphisms of non-cyclic automata. Computing, 15(3), 247–250.
  44. 1974

    1. Mendelssohn, R. C. (1974). The bureau of labor statistic’s Table Producing Language (TPL). In R. C. Brown & D. E. Glaze (Eds.), ACM Annual Conference (1) (pp. 116–122). ACM.
    2. Robbins, W. E., & Rudolph, L. D. (1974). On Two-Level Exclusive-or Majority Networks. IEEE Trans. Computers, 23(1), 34–41.
    3. Freihalter, R., & Ullrich, M. (1974). Integrierte Verkaufs-, Produktions- und Investitionsplanung. Zeitschr. Für OR, 18(2), B11–B16.
  45. 1972

    1. Rudolph, L. D., & Robbins, W. E. (1972). One-step weighted-majority decoding (Corresp.). IEEE Trans. Information Theory, 18(3), 446–448.
    2. Rudolph, J. A. (1972). A production implementation of an associative array processor: STARAN. AFIPS Fall Joint Computing Conference (1), 41, 229–241.
    3. Rechtschaffen, R. N. (1972). Queuing Simulation Using a Random Number Generator. IBM Systems Journal, 11(3), 255–271.
    4. Miczo, A., & Rudolph, L. D. (1972). A Relationship Between Output Symbol Occurrence Rate and Observability of Autonomous Machines. IEEE Trans. Computers, 21(8), 911–913.
  46. 1971

    1. Mendelssohn, R. C. (1971). Data Banks and Information Systems for National Statistics. In C. V. Freiman, J. E. Griffith, & J. L. Rosenfeld (Eds.), IFIP Congress (2) (pp. 1483–1489). North-Holland.
  47. 1970

    1. Rudolph, L. D. (1970). Generalized threshold decoding of convolutional codes. IEEE Trans. Information Theory, 16(6), 739–745.
    2. Miczo, A., & Rudolph, L. D. (1970). A note on the free distance of a convolutional code (Corresp.). IEEE Trans. Information Theory, 16(5), 646–648.
  48. 1969

    1. Rudolph, L. D. (1969). Threshold decoding of cyclic codes. IEEE Trans. Information Theory, 15(3), 414–418.
  49. 1967

    1. Krohn, K., Langer, R., & Rhodes, J. (1967). Algebraic Principles for the Analysis of a Biochemical System. J. Comput. Syst. Sci., 1(2), 119–136.
    2. Rudolph, L. D. (1967). A class of majority logic decodable codes (Corresp.). IEEE Trans. Information Theory, 13(2), 305–307.
  50. 1964

    1. Rudolph, L. D., & Mitchell, M. E. (1964). Implementation of decoders for cyclic codes (Corresp.). IEEE Trans. Information Theory, 10(3), 259–260.
  51. 1953

    1. Klein, R. J. (1953). Automatic Beam Current Stabilization for Williams Tube Memories. Trans. I.R.E. Prof. Group on Electronic Computers, 2(4), 8–11.
  52. 1852

    1. Monumenta Zollerana. 1, Urkunden der Schwäbischen Linie : 1095 - 1418. (1852). In R. Stillfried & T. Märcker (Eds.), Monumenta Zollerana : Urkunden-Buch zur Geschichte des Hauses Hohenzollern (Vol. 1). Ernst & Korn.

Group members

This image showsStephan Rudolph
PD Dr.-Ing.

Stephan Rudolph

Head of research group "Design Theory and Similarity Mechanics"

To the top of the page