@inproceedings{32870,
  author       = {{Böcker, Joachim}},
  booktitle    = {{EPE 2003, Graz}},
  location     = {{Toulouse, France}},
  title        = {{{Discrete-Event Converter Control}}},
  year         = {{2003}},
}

@misc{47641,
  author       = {{Ernst, Matthias}},
  title        = {{{Asymptotische Optimalität von LZ77 bei beschränktem Speicher}}},
  year         = {{2003}},
}

@misc{47635,
  author       = {{Voß, Kerstin}},
  title        = {{{Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen}}},
  year         = {{2003}},
}

@misc{47696,
  author       = {{Hoppe, Ulrich}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Markovprozesse zur Modellierung bei Codekompression}}},
  year         = {{2003}},
}

@misc{47636,
  author       = {{Unterkirchner, Claudia}},
  title        = {{{Implementierung eines arithmetischen Dekodierers in Java}}},
  year         = {{2003}},
}

@misc{47640,
  author       = {{Kuntze, Daniel}},
  title        = {{{Tabellenbasierte arithmetische Codierung}}},
  year         = {{2003}},
}

@misc{47638,
  author       = {{Soltenborn, Christian}},
  title        = {{{Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision}}},
  year         = {{2003}},
}

@misc{47637,
  author       = {{Todtenbier, Christian}},
  title        = {{{Implementierung eines arithmetischen Kodierers in Java}}},
  year         = {{2003}},
}

@misc{47634,
  author       = {{Ziegler, Max}},
  title        = {{{Fehlerangriffe auf spezielle Implementierungen von RSA}}},
  year         = {{2003}},
}

@misc{47639,
  author       = {{Lindner, Marvin}},
  title        = {{{Verkürzte Huffman-Codierung zur Codekompression}}},
  year         = {{2003}},
}

@misc{47695,
  author       = {{Ackermann, Marcel R.}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten}}},
  year         = {{2003}},
}

@article{51411,
  author       = {{Hilgert, Joachim and Vinberg, E.B. and Pasquale, A.}},
  journal      = {{AMS Translations}},
  pages        = {{135--143}},
  title        = {{{The Dual Horospherical Radon Transform as a Limit of Spherical Radon Transforms}}},
  volume       = {{210}},
  year         = {{2003}},
}

@inproceedings{39357,
  abstract     = {{Engineering collaboration gets its new global dimension with the omnipotent access to Internet. Engineers have severe requirements concerning: security of design data, quality of net connections, easiness of collaboration, etc. This article presents visions and middleware architecture to establish pan-European col- laborative engineering infrastructure and its application in the field of Electronic Design Automation (EDA). We present a transparent infrastructure to engineers to enable their Internet-based collaboration during the de- sign of complex electronic systems. In thi s context, we introduce an advanced collaborative infrastructure (ACI) for distance spanning, tool integration, and administration as well as open interfaces for XML-based data exchange. ACI constitutes a backbone for our collaborative research and engineering studies by fostering a combination of most recent plug-and-play technologies and secure, peer-to-peer data transfer with XML- based tool integration. ACI and its deployments have been developed with the EU project E-Colleg (IST- 1999-11746).}},
  author       = {{Kostienko, Tomasz and Müller, Wolfgang and Pawlak, Adam and Schattkowsky, Tim}},
  booktitle    = {{Proceedings of CE 2003}},
  title        = {{{An Advanced Infrastructure for Collaborative Engineering in Electronic Design Automation}}},
  year         = {{2003}},
}

@inproceedings{39355,
  abstract     = {{This pap er presents an approach to extend OSGi
server based home networks with JXTA's p eer-to-
p eer (P2P) technology to a multi-server home envi-
ronment connecting multiple private home networks
to one true virtual environment for communication,
media sharing/exchange, and distributed device con-
trol. We elab orate on the basic integration metho d-
ology and extend it to a general, security preserv-
ing, architectural concept based on a two level inte-
gration concept for inhome and interhome networks.
The integration is achieved through additional OSGi
services for the management of virtual devices, p eer-
to-p eer communication, and authentication. The ex-
ample of a Quality of Service based video streaming
management demonstrates one of the p otential ad-
vanced application for which p eer-to-p eer can b e used
in addition.}},
  author       = {{Loeser, Chris and Müller, Wolfgang and Berger, Franz and Eikerling, Heinz-Josef}},
  booktitle    = {{Proceedings of HICCS-36}},
  title        = {{{Peer-to-Peer for Virtual Home Environments}}},
  year         = {{2003}},
}

@inproceedings{39354,
  author       = {{Eikerling, Heinz-Josef and Müller, Wolfgang and Schattkowski, Tim and Wegner, J.}},
  booktitle    = {{Proceedings of DATE’03}},
  title        = {{{Tool Integration and Management in Heterogeneous Computer Networks}}},
  year         = {{2003}},
}

@inproceedings{39365,
  abstract     = {{Large-scale mobility in the era of embedded and mobile computers yields significant challenges with respect to personalization, networking, and security. Currently, mobile computing devices cannot be seamlessly and flexibly obtain information about the context in which computing takes place. This requires dedicated personalization and localization in combination with advanced autocustomization techniques in order to adapt them to the needs of the current context. For natural interaction, for instance, many devices offer different input and output modalities, which enable different modes of operation to perform the same task. Auto-customization of modalities and devices in range can be obtained, if the system has sufficient information on the user’s preferences, abilities, the current situation, and the device that performs a specific task. To aid the system’s decision, we propose a set of interrelated and expandable profiles, which are prepared for automated adaptation, what will play a central part in making the technology to become invisible.}},
  author       = {{Schäfer, Robbie and Müller, Wolfgang}},
  booktitle    = {{Proceedings of the Joint Workshop IJCAI Workshop on Artificial Intelligence, Information Access, and Mobile Computing}},
  title        = {{{Adaptive profiles for Multi-Modal Interaction in Intelligent Frameworks}}},
  year         = {{2003}},
}

@inproceedings{39364,
  abstract     = {{The textual Object Constraint Language (OCL) is an of-
ficial part of the Unified Modeling Language (UML). OCL
is primarily used to formulate restrictions over UML mod-
els, in particular, invariants and operation pre- and post-
conditions in the context of class diagrams. However, OCL
is missing means to specify constraints over the dynamic
behavior of a UML model. We have therefore developed a
temporal extension of OCL that enables modelers to specify
behavioral state-oriented constraints. That work provides
an alternative to the rather cryptic temporal logic formulae
that are commonly used to specify behavioral system prop-
erties.
This article now illustrates that our OCL extension al-
lows for specifying all kinds of properties that are regarded
as relevant in practice. We present according temporal OCL
expressions for property specification patterns that have
been identified in the area of formal specification.}},
  author       = {{Flake, Stephan and Müller, Wolfgang}},
  booktitle    = {{Proceedings of SERP'03}},
  keywords     = {{UML, Object Constraint Language, Patterns, Property Specification}},
  title        = {{{Expressing Property Specification Patterns with OCL}}},
  year         = {{2003}},
}

@inproceedings{39366,
  abstract     = {{Computer supported collaborative work (CSCW) is currently of growing interest for application industrial context. Integrated workflow systems are available to allow the integration of globally distributed teams. However, in many areas (i.e. in electronic design automation), tool integration remains to be a critical issue since existing legacy tools have to be integrated into distributed workflows. By integrating tools based on the operational semantics, dynamic assignment and replacement of tools in the workflows becomes possible. We present a middleware for secure collaborative engineering that enables flexible tool management and overcomes existing networking problems through a peer-to-peer based network infrastructure.}},
  author       = {{Schattkowsky, Tim and Müller, Wolfgang}},
  booktitle    = {{Proceedings of CCE'03}},
  title        = {{{Distributed Engineering Environment for the Design of Electronic Systems}}},
  year         = {{2003}},
}

@inproceedings{39363,
  abstract     = {{The textual Object Constraint Language (OCL) is an of-
ficial part of the Unified Modeling Language (UML). It is
primarily used to formulate restrictions for UML class di-
agrams. Additionally, it is possible to refer to UML State-
chart states in OCL expressions to reason about currently
activated states.
However, neither the current OCL standard nor the pro-
posal for the new OCL 2.0 version integrate Statecharts on
the language definition level, i.e., the semantics of State-
chart states in the context of OCL expressions is not suf-
ficiently defined so far. To overcome this deficiency, this
article provides a formal semantics for state-oriented OCL
expressions for application with UML Statecharts.}},
  author       = {{Flake, Stephan and Müller, Wolfgang}},
  booktitle    = {{Proceedings of SEKE 2003}},
  title        = {{{Semantics of State-Oriented Expressions in the Object Constraint Language}}},
  year         = {{2003}},
}

@inproceedings{39367,
  abstract     = {{Confidentiality and security in data access and transmission over multiple open networks are of utmost importance for most collaborative engineering environments. In this article, we review smart card based security technologies for their application in computer-based collaborative engineering environments. We focus on most recent microprocessor-based smart cards and on JavaCard as a development infrastructure and operating system. Since JavaCard supports the integration of multiple applications on one card, it enables smart cards to integrate large sets of additional applications. In that context, we identify and discuss three potential key applications: authentication with biometrics, certification, and advanced profile management.}},
  author       = {{Wang, J. and Müller, Wolfgang}},
  booktitle    = {{Proceedings of CCE'03}},
  title        = {{{SmartCard for Secure Collaborative Engineering}}},
  year         = {{2003}},
}

