@misc{24400,
  abstract     = {{Chipantenne (102), umfassend mindestens einen Strahler (114,116), der sich parallel zu einer Hauptoberfläche eines die Chipantenne tragenden Halbleitersubstrats (104) erstreckt, wobei der Strahler auf einer inselartigen Trägerzone (122,124) des Halbleitersubstrats angeordnet ist, die von mindestens einem vollständig mit einem Gas gefüllten Graben (126,128) umgeben ist, welcher das Halbleitersubstrat in dessen gesamter Tiefenerstreckung durchdringt und durch mindestens einen Haltesteg (130,132,134,136) überbrückt ist, welcher eine tragende Verbindung zwischen der Trägerzone und dem übrigen Halbleitersubstrat bildet.}},
  author       = {{Wang, Ruoyu and Sun, Yaoming and Kaynak, Mehmet and Scheytt, J. Christoph}},
  title        = {{{Chip-Antenne, Elektronisches Bauelement und Herstellungsverfahren}}},
  year         = {{2012}},
}

@book{53580,
  editor       = {{Müller, Wolfgang and Petrot, Frederic}},
  location     = {{Grenoble, France}},
  title        = {{{Proceedings of the 1st International QEMU Users' Forum}}},
  year         = {{2011}},
}

@book{53582,
  editor       = {{Gerard, Sebatian and Müller, Wolfgang and Rioux, L. and Selic, Brand}},
  title        = {{{Proceedings of the 1st Workshop on Model Based Engineering for Embedded Systems Design}}},
  year         = {{2010}},
}

@book{53581,
  editor       = {{De Micheli, Giovanni and Müller, Wolfgang}},
  location     = {{Dresden, Germany}},
  publisher    = {{IEEE Press}},
  title        = {{{Proceedings of 13th Design Automation and Test in Europe Conference & Exhibition  (DATE)}}},
  year         = {{2010}},
}

@article{45774,
  author       = {{Osmany, Sabbir A. and Herzel, Frank and Scheytt, J. Christoph}},
  journal      = {{IEEE Journal of Solid-State Circuits}},
  number       = {{9}},
  pages        = {{1657--1668}},
  title        = {{{An integrated 0.6–4.6 GHz, 5–7 GHz, 10–14 GHz, and 20–28 GHz frequency synthesizer for software-defined radio applications}}},
  doi          = {{10.1109/JSSC.2010.2051476}},
  volume       = {{45}},
  year         = {{2010}},
}

@article{45772,
  author       = {{Herzel, Frank and Osmany, Sabbir A.  and Scheytt, J. Christoph}},
  journal      = {{IEEE Transactions on Circuits and Systems I: Regular Papers}},
  number       = {{8}},
  pages        = {{1914--1924}},
  title        = {{{Analytical Phase-Noise Modeling and Charge Pump Optimization for Fractional-$N$ PLLs}}},
  volume       = {{57}},
  year         = {{2010}},
}

@book{40119,
  editor       = {{Ecker, Wolfgang and Müller, Wolfgang and Dömer, Rainer}},
  isbn         = {{9781402094354}},
  publisher    = {{Springer Netherlands}},
  title        = {{{Hardware-dependent Software}}},
  doi          = {{10.1007/978-1-4020-9436-1}},
  year         = {{2009}},
}

@book{53583,
  editor       = {{Müller, Wolfgang and Wolfe, John}},
  title        = {{{Proceedings of the 5th International DAC Workshop of UML for SoC Design}}},
  year         = {{2008}},
}

@book{53594,
  editor       = {{Wolfe, John and Müller, Wolfgang}},
  title        = {{{Proceedings of the 4th DAC Workshop on UML for SOC Design }}},
  year         = {{2008}},
}

@book{53584,
  editor       = {{Vanderperren, Yves}},
  title        = {{{Proceedings of the 1st International Workshop of UML for SoC and Embedded Systems Design}}},
  year         = {{2007}},
}

@inproceedings{19870,
  author       = {{Brinkmann, Andre and Effert, Sascha and Heidebuer, Michael and Vodisek, Mario}},
  booktitle    = {{5th International Conference on Networking (ICN)}},
  isbn         = {{0769525520}},
  title        = {{{Realizing Multilevel Snapshots in Dynamically Changing Virtualized Storage Environments}}},
  doi          = {{10.1109/icniconsmcl.2006.182}},
  year         = {{2006}},
}

@inproceedings{19871,
  abstract     = {{Data has become the most valuable asset for many companies; loosing important data can cause companies to fail quite immediately. The protection of data inside storage systems is mostly achieved by using a RAID scheme that adds redundant data to user data, enabling recovery from single or multiple disk failures. This protection against data loss in case of a disk failure can be achieved either by dedicated hardware or a software RAID solution.<br><br>One major advantage of software RAID is that it comes for free as a built-in functionality in many operating systems like Linux or Microsoft Windows. The drawback of the built-in functionality is that it is not suited to run in multiple server environments; synchronization and recovery processes can be corrupted if more than a single server is allowed to access a software RAID volume.<br><br>In this paper, we present an enhancement for the Linux md-driver that enables a consistent usage of RAID in multiple server environments. Based on the V:DRIVE virtualization environment, RAID volumes can be consistently synchronized and recovered even in distributed environments. Besides the architectural concepts, we present measurements that indicate the viability of this enhanced, distributed version of md.}},
  author       = {{Brinkmann, André and Effert, Sascha and Heidebuer, Michael and Vodisek, Mario}},
  booktitle    = {{In Proceedings of the International Workshop on Storage Network Architecture and Parallel I/Os}},
  pages        = {{81 -- 88}},
  title        = {{{Distributed MD}}},
  year         = {{2005}},
}

@inproceedings{19872,
  abstract     = {{Recent developments both in the business and the technological domain have led to a significant increase in demand for Business Intelligence (BI) infrastructures that can handle huge amounts of data in small time frames. BI applications are increasingly used by large user bases on all management levels; support tasks spanning the complete value chain are based on transactional data and are directly coupled with operational systems in closed loop approaches.<br><br>To effectively handle the resulting data volume turns out to be an extremely challenging task which encompasses a variety of issues on different levels. We propose an integrated multi layer tool for monitoring, benchmarking, analyzing, and optimizing the performance of such BI infrastructures.<br><br>Inside this paper we give a coarse outline of the tools architecture and demonstrate the value of distinct measurement points at operating system layer. For that purpose we introduce a kernel based benchmark environment and present first measurement results. The gathered data clearly indicates that a meaningful analysis of performance benchmarks without kernel trace points is of limited value - which shows the necessity to consider a separate component within the tools architecture.}},
  author       = {{Brinkmann, André and Effert, Sascha and Heidebuer, Michael and Vodisek, Mario and Baars, Henning}},
  booktitle    = {{In Proceedings of the International Workshop on Storage Network Architecture and Parallel I/Os}},
  pages        = {{1--8}},
  title        = {{{An integrated Architecture for Business Intelligence support from Application down to Storage}}},
  year         = {{2005}},
}

@inproceedings{19912,
  author       = {{Loeser, Chris and Schomaker, Gunnar and Brinkmann, André and Vodisek, Mario and Heidebuer, Michael}},
  booktitle    = {{Proceedings of the 4th International Conference on Networking}},
  isbn         = {{9783540253389}},
  issn         = {{0302-9743}},
  pages        = {{800--810}},
  title        = {{{Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA Forecasts}}},
  doi          = {{10.1007/978-3-540-31957-3_90}},
  volume       = {{3421}},
  year         = {{2005}},
}

@book{53592,
  editor       = {{Lavagno, Luciano and Müller, Wolfgang}},
  title        = {{{Proceedings of the 2nd International DAC Workshop on UML for SoC Design}}},
  year         = {{2005}},
}

@book{53585,
  editor       = {{Müller, Wolfgang and Martin, Grant}},
  title        = {{{Proceedings of the 1st International DAC Workshop of UML for SoC Design}}},
  year         = {{2004}},
}

@misc{53589,
  author       = {{Dangberg, Andreas and Müller, Wolfgang}},
  title        = {{{Control method for disposing graphical elements}}},
  year         = {{2004}},
}

@inproceedings{19790,
  abstract     = {{The advances in Internet technology have led to tremendous improvements in business, education, and science and have changed the way we think, live, and communicate. Information exchange has become ubiquitous by the possibilities offered through modern technologies. We are able to offer information 24 hours a day through our web sites and can leave messages every time and from anywhere in the world. This change in communication has led to new challenges. Enterprises have to deal with an information amount that doubles every year. The technological foundation to cope with this information explosion is given by Storage Area Networks (SANs), which are able to connect a great number of storage systems over a fast interconnection network. However, to be able to use the benefits of a SAN, an easy-to-use and efficient management support has to be given to the storage administrator. In this paper, we will suggest new storage management concepts and we will introduce a new management environment that is able to significantly reduce management costs and increases the performance and resource utilization of the given SAN infrastructure.}},
  author       = {{Scheideler, Christian and Salzwedel, Kay and Meyer auf der Heide, Friedhelm and Brinkmann, André and Vodisek, Mario and Rückert, Ulrich}},
  booktitle    = {{Proceedings of SSGRR 2003}},
  title        = {{{Storage Management as Means to cope with Exponential Information Growth}}},
  year         = {{2003}},
}

@inproceedings{19806,
  abstract     = {{We try to close the gap between theoretical investigations of wireless network topologies and realistic wireless environments. For point-to-point communication, we examine theoretically well-analyzed sparse graphs, i.e. the Yao-graph, the SparsY-graph, and the SymmY-graph.  We present distributed algorithms that can be used to build up these graphs in time $O(log n)$ per node without the use of any geo-graphical positioning system. Our algorithms are based only on local knowledge and local decisions and make use of power control to establish communication links with low energy-cost.  We compare these algorithms with respect to congestion, dilation, and energy. For congestion we introduce different measures that allow us to investigate the difference between real-world wireless networks and models for wireless communication at a high level of abstraction. For more realistic simulations we extend our simulation  environment SAHNE. We use a realistic transmission model for directed communication that uses sector subdivision.  Finally, our experimental results show that our topologies and algorithms work well in a distributed environment and we give some recommendations for the topology control based on our simulations.}},
  author       = {{Rührup, Stefan and Schindelhauer, Christian  and Volbert, Klaus and Grünewald, M.}},
  booktitle    = {{Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS)}},
  isbn         = {{0769519261}},
  title        = {{{Performance of distributed algorithms for topology control in wireless networks}}},
  doi          = {{10.1109/ipdps.2003.1213107}},
  year         = {{2003}},
}

@inproceedings{19833,
  abstract     = {{Communication facilities are important in Robotics if several robots have to work together. In this paper, we describe problems and solutions encountered while designing an infrared-based communication device for the mini robot Khepera. In contrast to traditional omnidirectional systems, it features directed, power-variable transmission in eight directions at unit[23.4]kbps up to a range of unit[1m]. It can differentiate incoming data signals from interference from adjacent sectors and can estimate their direction-of-arrival. We model the transmission over the infrared channel and show how interference influences the reception of the data signals. We also describe methods how to reduce these effects. We have tested the performance of the resulted signal processing in a worst case scenario by simulations and in experiments with a prototype implementation. The resulted module is  especially suited for experimental evaluation of ad hoc network protocols and for position estimation.}},
  author       = {{Volbert, Klaus and Grünewald, Matthias and Schindelhauer, Christian and Rückert, Ulrich}},
  booktitle    = {{Proceedings of the 2nd International Conference on Autonomous Minirobots for Research and Edutainment}},
  pages        = {{113--122}},
  title        = {{{Directed power-variable infrared communication for the mini robot Khepera}}},
  year         = {{2003}},
}

