@techreport{18961,
  author       = {{Lukovszki, Tamás and Benczúr, A.}},
  title        = {{{A Degree O(log log n) Fault Tolerant Distributed Location Service for Geographic Ad-Hoc Routing}}},
  year         = {{2002}},
}

@inproceedings{1921,
  author       = {{Ngo-Quynh, Thu and Karl, Holger and Wolisz, Adam and Rebensburg, Klaus}},
  booktitle    = {{Proc. IST Mobile & Wireless Telecommunications Summit 2002.}},
  title        = {{{New Scheduling Algorithm for Providing Proportional Jitter in  Differentiated Service Network }}},
  year         = {{2002}},
}

@phdthesis{18169,
  abstract     = {{Die Implementierung von Algorithmen zur Lösung geometrischer Probleme im Euklidischen Raum (z.B. Berechnung der konvexen Hülle oder des Durchschnitts zweier Polyeder) stellt sich oftmals als hochgradig nichttrivial heraus. Ob und unter welchen Voraussetzungen die verursachenden numerischen Instabilitäten überhaupt ini den Griff zu kriegen oder vielmehr dem Problem inhärent sind, untersucht diese Arbeit in einem auf Turing zurückgehenden Rechenmodell. Im Gegensatz zu algebraischen Ansätzen geht jenes nicht von der Verfügbarkeit exakter Tests auf z.B. Gleichheit reeller Zahlen aus, sondern berücksichtigt die auf Digitalcomputern tatsächlich realisierbare Approximation durch rationale Zahlen. In diesem Rahmen werden beweisbar stabile Algorithmen zum Lösen linearer Gleichungssysteme, zur Matrix-Diagonalisierung und zur linearen wie nichtlinearen Optimierung präsentiert. Als wichtiges technisches Hilfsmittel dient ein neuer Berechenbarkeitsbegriff für reguläre unendliche Mengen reller Zahlen, der sich aus dem systematischen Vergleich verschiedener der Literatur entnommener ad-hoc Ansätze ergibt.}},
  author       = {{Ziegler, Martin}},
  isbn         = {{3-935433-24-7}},
  publisher    = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}},
  title        = {{{Zur Berechenbarkeit reeller geometrischer Probleme}}},
  volume       = {{115}},
  year         = {{2002}},
}

@article{18176,
  author       = {{Ziegler, Martin}},
  issn         = {{0942-5616}},
  journal      = {{Mathematical Logic Quarterly (MLQ)}},
  number       = {{S1}},
  pages        = {{157--181}},
  title        = {{{Computability on Regular Subsets of Euclidean Space}}},
  doi          = {{10.1002/1521-3870(200210)48:1+<157::aid-malq157>3.0.co;2-4}},
  volume       = {{48}},
  year         = {{2002}},
}

@inproceedings{18177,
  abstract     = {{Consider the classical point location problem: for a fixed arrangement of m hyperplanes and its induced partition of d-space report, upon input of some point, which face it lies in. With sufficient memory, this is easy to solve in logarithmic time O(log m). But how fast can algorithms (formalized as Linear Decision Trees) of *minimum* size be? The present work gives lower and upper bounds for the time complexity of point location under this constraint. They show that, in addition to m, the maximum number w of walls of a cell turns out to be a crucial parameter. We also consider a relaxation of the strict minimum-size condition allowing for constant factor overhead.}},
  author       = {{Ziegler, Martin and Damerow, Valentina and Finschi, Lukas}},
  booktitle    = {{Proceedings of the 14th Canadian Conference on Computational Geometry (CCCG'02)}},
  title        = {{{Point Location Algorithms of Minimum Size}}},
  year         = {{2002}},
}

@inproceedings{18179,
  abstract     = {{Do the solutions of linear equations depend computably on their coefficients? Implicitly, this has been one of the central questions in linear algebra since the very beginning of the subject and the famous Gauß algorithm is one of its numerical answers. Today there exists a tremendous number of algorithms which solve this problem for different types of linear equations. However, actual implementations in floating point arithmetic keep exhibiting numerical instabilities for ill-conditioned inputs. This situation raises the question which of these instabilities are intrinsic, thus caused by the very nature of the problem, and which are just side effects of specific algorithms. To approach this principle question we revisit linear equations from the rigorous point of view of computability. Therefore we apply methods of computable analysis, which is the Turing machine based theory of computable real number functions. It turns out that, given the coefficients of a system of linear equations, we can compute the space of solutions, if and only if the dimension of the solution space is known in advance. Especially, this explains why there cannot exist any stable algorithms under weaker assumptions.}},
  author       = {{Brattka, Vasco and Ziegler, Martin}},
  booktitle    = {{Proceedings of the 2nd IFIP International Conference on Theoretical Computer Science}},
  pages        = {{95--106}},
  title        = {{{Computability of Linear Equations}}},
  doi          = {{10.1007/978-0-387-35608-2_9}},
  year         = {{2002}},
}

@inproceedings{18369,
  abstract     = {{Visualising is a method used to help experiencing and understanding causal cohesions in simulation processes. For this purpose, tools for visualising are already implemented in prevalent simulation systems. The user creates his simulation model and generates a 3-dimensional (2,5-dimensional) visualising by means of the simulation system. This helps examining the process which makes it easier for the viewer to understand it. Simulation tools usually only provide the opportunity for a unidirectional visualising. In a 3-dimensional surrounding the viewer can not implement an interaction with the simulation while the system is running. Though an interaction during the simulation run enables the user to gain a better understanding of causal cohesions. Solutions via HLA are sophisticated and therefore rather suited for extensive projects.
We present a distributed system consisting of a commercial manufacturing simulation tool, a coupling module and a walkthrough system. The distributed system in conjunctions with the coupling module guarantees generality and a wide field of applications of the walkthrough system. Further it guarantees flexibility and selection of the specialized graphics hardware for the walkthrough system. A further contribution of this paper is the solution of the time synchronisation problem caused by simulation tool and walkthrough system.
}},
  author       = {{Mueck, Bengt and Dangelmaier, Wilhelm and Fischer, Matthias and Klemisch, Wolfram}},
  booktitle    = {{Simulation und Visualisierung}},
  pages        = {{71--84}},
  publisher    = {{SCS European Publishing House}},
  title        = {{{Bi-directional Coupling of Simulation Tools with a Walkthrough-System}}},
  year         = {{2002}},
}

@inproceedings{18566,
  abstract     = {{We analyze a randomized pursuit-evasion game on graphs. This game is played by two players, a hunter and a rabbit. Let G be any connected, undirected graph with n nodes. The game is played in rounds and in each round both the hunter and the rabbit are located at a node of the graph. Between rounds both the hunter and the rabbit can stay at the current node or move to another node. The hunter is assumed to be restricted to the graph G: in every round, the hunter can move using at most one edge. For the rabbit we investigate two models: in one model the rabbit is restricted to the same graph as the hunter, and in the other model the rabbit is unrestricted, i.e., it can jump to an arbitrary node in every round.

We say that the rabbit is caught as soon as hunter and rabbit are located at the same node in a round. The goal of the hunter is to catch the rabbit in as few rounds as possible, whereas the rabbit aims to maximize the number of rounds until it is caught. Given a randomized hunter strategy for G, the escape length for that strategy is the worst case expected number of rounds it takes the hunter to catch the rabbit, where the worst case is with regards to all (possibly randomized) rabbit strategies. Our main result is a hunter strategy for general graphs with an escape length of only O
(n log (diam(G))) against restricted as well as unrestricted rabbits. This bound is close to optimal since Ω(n) is a trivial lower bound on the escape length in both models. Furthermore, we prove that our upper bound is optimal up to constant factors against unrestricted rabbits.}},
  author       = {{Adler, Micah and Räcke, Harald and Sivadasan, Naveen and Sohler, Christian and Vöcking, Berthold}},
  booktitle    = {{Proceedings of the 29th International Colloquium on Automata, Languages and Programming}},
  isbn         = {{9783540438649}},
  issn         = {{0302-9743}},
  title        = {{{Randomized Pursuit-Evasion in Graphs}}},
  doi          = {{10.1007/3-540-45465-9_77}},
  year         = {{2002}},
}

@proceedings{7785,
  editor       = {{Heckel, Reiko and Mens, T. and Wermelinger, M.}},
  number       = {{4}},
  publisher    = {{Elsevier}},
  title        = {{{Proceedings of the workshop on Software Evolution through Transformations, satellite of the ICGT 2002 conference, Barcelona (Spain)}}},
  volume       = {{72}},
  year         = {{2002}},
}

@proceedings{7786,
  editor       = {{Clauss, M. and Hanenberg, S. and John, I. and Mehner, Katharina and Van Der Straeten, Ragnhild}},
  number       = {{053.02/E}},
  title        = {{{Proceedings of the 4th Young Researchers Workshop, satellite of the 4th International Symposium on Generative and Component-Based Engineering (GCSE '02), Pittsburgh, PA (USA)}}},
  year         = {{2002}},
}

@inproceedings{7895,
  author       = {{Baresi, Luciano and Heckel, Reiko}},
  booktitle    = {{Proceedings of the 1st International Conference on Graph Transformation (ICGT 2002), Barcelona (Spain)}},
  pages        = {{402--429}},
  publisher    = {{Springer}},
  title        = {{{Tutorial Introduction to Graph Transformation: A Software Engineering Perspective}}},
  doi          = {{https://groups.uni-paderborn.de/fg-engels/Publications/10.1007/b100934}},
  volume       = {{2505}},
  year         = {{2002}},
}

@inproceedings{7896,
  author       = {{Depke, Ralph and Engels, Gregor and Langham, Matthew and Lütkemeier, Björn and Thöne, Sebastian}},
  booktitle    = {{Proceedings of the conference on Prolonging Software Life: Development and Redevelopment (COMPSAC 2002), Oxford (England)}},
  pages        = {{13--18}},
  publisher    = {{IEEE Computer Society}},
  title        = {{{Process-Oriented, Consistent Integration of Software Components}}},
  doi          = {{http://dx.doi.org/10.1109/CMPSAC.2002.1044527}},
  year         = {{2002}},
}

@inproceedings{7897,
  author       = {{Engels, Gregor and Heckel, Reiko and Küster, Jochen and Groenewegen, Luuk}},
  booktitle    = {{Proceedings of the 5th International Conference on The Unified Modeling Language (UML 2002), Dresden (Germany)}},
  pages        = {{212--226}},
  publisher    = {{Springer}},
  title        = {{{Consistency-Preserving Model Evolution through Transformations}}},
  volume       = {{2460}},
  year         = {{2002}},
}

@inproceedings{7898,
  author       = {{Engels, Gregor and Küster, Jochen and Groenewegen, Luuk}},
  booktitle    = {{Proceedings of the conference on Integrated Design and Process Technology (IDPT 2002), Pasadena, CA (USA)}},
  number       = {{4}},
  pages        = {{2--22}},
  publisher    = {{IOS Press}},
  title        = {{{Consistent Interaction Of Software Components}}},
  volume       = {{6}},
  year         = {{2002}},
}

@inproceedings{7899,
  author       = {{Engels, Gregor and Hendrik Hausmann, Jan and Heckel, Reiko and Sauer, Stefan}},
  booktitle    = {{Proceedings of the Sixth International Conference on Integrated Design and Process Technology (IDPT 2002), Pasadena, CA (USA)}},
  title        = {{{Testing the Consistency of Dynamic UML Diagrams}}},
  year         = {{2002}},
}

@inproceedings{7900,
  author       = {{Gyapay, Szilvia and Heckel, Reiko and Varró, Dániel}},
  booktitle    = {{Proceedings of the First International Conference on Graph Transformation (ICGT 2002), Barcelona (Spain)}},
  pages        = {{120--134}},
  publisher    = {{Springer}},
  title        = {{{Graph Transformation with Time: Causality and Logical Clocks}}},
  volume       = {{2505}},
  year         = {{2002}},
}

@inproceedings{7901,
  author       = {{Hendrik Hausmann, Jan and Heckel, Reiko and Taentzer, Gabriele}},
  booktitle    = {{Proceedings of the 24th International Conference on Software Engineering (ICSE 2002), Orlando, FL (USA)}},
  pages        = {{105--155 }},
  publisher    = {{ACM Press}},
  title        = {{{Detecting conflicting functional requirements in a use case driven approach: A static analysis technique based on graph transformation}}},
  doi          = {{http://doi.acm.org/10.1145/581339.581355}},
  year         = {{2002}},
}

@inproceedings{7902,
  author       = {{Heckel, Reiko and Chouikha, Mourad}},
  booktitle    = {{Proceedings of the conference on Integrated Design & Process Technology (IDPT 2002), Pasadena, CA (USA)}},
  pages        = {{63--77}},
  publisher    = {{Society of Design and Process Science}},
  title        = {{{Compositional Control Synthesis for Discrete Event Systems: An Approach based on Open Petri Nets}}},
  year         = {{2002}},
}

@inproceedings{7903,
  author       = {{Heckel, Reiko and Küster, Jochen and Taentzer, Gabriele}},
  booktitle    = {{Proceedings of the First International Conference on Graph Transformation (ICGT 2002), Barcelona (Spain)}},
  pages        = {{161--176}},
  publisher    = {{Springer}},
  title        = {{{Confluence of Typed Attributed Graph Transformation Systems}}},
  year         = {{2002}},
}

@inproceedings{7904,
  author       = {{Mehner, Katharina}},
  booktitle    = {{Proceedings of the International Seminar on Software Visualization, Dagstuhl (Germany)}},
  pages        = {{163--175}},
  publisher    = {{Springer}},
  title        = {{{JaVis: A UML-Based Visualization and Debugging Environment for Concurrent Java Programs}}},
  volume       = {{2269}},
  year         = {{2002}},
}

