@inproceedings{18279, abstract = {{For $c in REAL$, a $c$-spanner is a subgraph of a complete Euclidean graph satisfying that between any two vertices there exists a path of weighted length at most $c$ times their geometric distance. Based on this property to approximate a complete weighted graph, sparse spanners have found many applications, e.g., in FPTAS, geometric searching, and radio networks. For geometric searching, it turned out to suffice whether the radius rather than the length of some path between any two vertices is bounded relatively to their geometric distance; this is the defining property of weak spanners. Finally regarding radio network applications, a power spanner accounts for the total energy afforded for a wireless transmission with the requirement that the sum of the squares of the lengths of some path between any two planar vertices must be bounded relatively to the square of their geometric distance (or higher powers up to 6 or even 8).

While it is known that any $c$-spanner is also both a weak $C_1$-spanner and a $C_2$-power spanner (for appropriate $C_1,C_2$ depending only on $c$ but not on the graph under consideration), we show that the converse fails: There exists a family of $c_1$-power spanners that are no weak $C$-spanners and also a family of weak $c_2$-spanners that are no $C$-spanners for any fixed $C$ (and thus no uniform spanners, either). However the deepest result of the present work reveals that, surprisingly, any weak spanner is also a uniform power spanner. We further generalize the latter notion by considering $(c,delta)$-power spanners where the sum of the $delta$-th powers of the lengths has to be bounded; so $(cdot,2)$-power spanners coincide with the usual power spanners and $(cdot,1)$-power spanners are classical spanners. Interestingly, these $(cdot,delta)$-power spanners form a strict hierarchy where the above results still hold for any $deltageq2$; some even hold for $delta>1$ while counterexamples reveal others to fail for $delta<2$. In fact we show that in general every self-similar curve of fractal dimension $d>delta$ is no $(C,delta)$-power spanner for any fixed $C$. }}, author = {{Schindelhauer, Christian and Volbert, Klaus and Ziegler, Martin}}, booktitle = {{Proc. of 15th Annual International Symposium on Algorithms and Computation (ISAAC'04)}}, isbn = {{9783540241317}}, issn = {{0302-9743}}, pages = {{805--821}}, publisher = {{Springer }}, title = {{{Spanners, Weak Spanners, and Power Spanners for Wireless Networks}}}, doi = {{10.1007/978-3-540-30551-4_69}}, volume = {{3341}}, year = {{2004}}, } @inproceedings{18364, abstract = {{The visualisation of manufacturing-processes assists the user in understanding and analysis. Typically he can move free and unguided in a virtual environment which visualizes the entire process. Thus knowledge and conclusions are to some extend acquired on a random base. This article describes the development of a tool, which enables the user to interactively improve significant production processes in the simulation. He moves in a virtual 3D-environment (walkthrough system) and is able to acquire automatically calculated indications for significant processes. At the same time the simulation considers significant objects in a more detailed way. If the viewer is interested in a significant process, he is automatically guided to the relevant location where he can examine the critical situation by modification of the simulation model.}}, author = {{Mueck, Bengt and Dangelmaier, Wilhelm and Laroque, Christoph and Fischer, Matthias and Kortenjan, Michael}}, booktitle = {{Simulation and Visualisation 2004}}, pages = {{73--83}}, publisher = {{SCS European Publishing House}}, title = {{{Guidance of Users in Interactive 3D-Visualisations of Material Flow Simulations}}}, year = {{2004}}, } @article{18447, author = {{Oesterdiekhoff, Brigitte}}, journal = {{Informatik Spektrum}}, number = {{5}}, pages = {{448--452}}, title = {{{Transcoding von Webinhalten}}}, volume = {{27}}, year = {{2004}}, } @inproceedings{18448, author = {{Oesterdiekhoff, Brigitte}}, booktitle = {{Proceedings of IFIP Working Conference on Distributed and Parallel Embedded Systems (DIPES'04)}}, title = {{{Internet Premium Services for Flexible Format Distributed Devices}}}, year = {{2004}}, } @inproceedings{16474, abstract = {{Given n distinct points p1, p2, ... , pn in the plane, the map labeling problem with four squares is to place n axis-parallel equi-sized squares Q1, ... ,Qn of maximum possible size such that pi is a corner of Qi and no two squares overlap. This problem is NP-hard and no algorithm with approximation ratio better than 1/2 exists unless P = NP [10]. In this paper, we consider a scenario where we want to visualize the information gathered by smart dust, i.e. by a large set of simple devices, each consisting of a sensor and a sender that can gather sensor data and send it to a central station. Our task is to label (the positions of) these sensors in a way described by the labeling problem above. Since these devices are not positioned accurately (for example, they might be dropped from an airplane), this gives rise to consider the map labeling problem under the assumption, that the positions of the points are not fixed precisely, but perturbed by random noise. In other words, we consider the smoothed complexity of the map labeling problem. We present an algorithm that, under such an assumption and Gaussian random noise with sufficiently large variance, has linear smoothed complexity.}}, author = {{Bansal, Vikas and Meyer auf der Heide, Friedhelm and Sohler, Christian}}, booktitle = {{12th Annual European Symposium on Algorithms (ESA 2004)}}, isbn = {{9783540230250}}, issn = {{0302-9743}}, title = {{{Labeling Smart Dust}}}, doi = {{10.1007/978-3-540-30140-0_9}}, volume = {{3221}}, year = {{2004}}, } @inproceedings{16475, author = {{Bienkowski, Marcin and Korzeniowski, Miroslaw and Meyer auf der Heide, Friedhelm}}, booktitle = {{Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures - SPAA '04}}, isbn = {{1581138407}}, title = {{{Fighting against two adversaries}}}, doi = {{10.1145/1007912.1007923}}, year = {{2004}}, } @article{16477, author = {{Meyer auf der Heide, Friedhelm and Schindelhauer, Christian and Volbert, Klaus and Grünewald, Matthias}}, issn = {{1432-4350}}, journal = {{Theory of Computing Systems}}, pages = {{343--370}}, title = {{{Congestion, Dilation, and Energy in Radio Networks}}}, doi = {{10.1007/s00224-004-1124-z}}, year = {{2004}}, } @inproceedings{16480, author = {{Leonardi, S. and Marchetti-Spaccamela, A. and Meyer auf der Heide, Friedhelm}}, booktitle = {{SPAA '04: Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures}}, isbn = {{1581138407}}, title = {{{Scheduling against an adversarial network}}}, doi = {{10.1145/1007912.1007936}}, year = {{2004}}, } @article{16399, abstract = {{We present a new data structure for rendering highly complex virtual environments of arbitrary topology. The special feature of our approach is that it allows an interactive navigation in very large scenes (30 GB/400 million polygons in our benchmark scenes) that cannot be stored in main memory, but only on a local or remote hard disk. Furthermore, it allows interactive rendering of substantially more complex scenes by instantiating objects. The sampling process is done in the preprocessing. There, the polygons are randomly distributed in our hierarchical data structure, the randomized sample tree. This tree only uses space that is linear in the number of polygons. In order to produce an approximate image of the scene, the tree is traversed and polygons stored in the visited nodes are rendered. During the interactive walkthrough, parts of the sample tree are loaded from local or remote hard disk. We implemented our algorithm in a prototypical walkthrough system. Analysis and experiments show that the quality of our images is comparable to images computed by the conventional z-buffer algorithm regardless of the scene topology.}}, author = {{Klein, Jan and Krokowski, Jens and Fischer, Matthias and Wand, Michael and Wanka, Rolf and Meyer auf der Heide, Friedhelm}}, issn = {{1054-7460}}, journal = {{Presence: Teleoperators and Virtual Environments}}, pages = {{617--637}}, title = {{{The Randomized Sample Tree: A Data Structure for Interactive Walk-Throughs in Externally Stored Virtual Environments}}}, doi = {{10.1162/1054746043280619}}, year = {{2004}}, } @inproceedings{13071, author = {{Liu Jing, Michelle and Ruehrup, Stefan and Schindelhauer, Christian and Volbert, Klaus and Dierkes, Martin and Bellgardt, Andreas and Ibers, Rüdiger and Hilleringmann, Ulrich}}, booktitle = {{{GOR/NGB Conference Tilburg 2004}}}, title = {{{Sensor Networks with More Features Using Less Hardware}}}, year = {{2004}}, } @article{19726, abstract = {{The Paderborn University BSP (PUB) library is a C communication library based on the BSP model. The basic library supports buffered as well as unbuffered non-blocking communication between any pair of processors and a mechanism for synchronizing the processors in a barrier style. In addition, PUB provides non-blocking collective communication operations on arbitrary subsets of processors, the ability to partition the processors into independent groups that execute asynchronously from each other, and a zero-cost synchronization mechanism. Furthermore, some techniques used in the implementation of the PUB library deviate significantly from the techniques used in other BSP libraries.}}, author = {{Bonorden, Olaf and Juurlink, Bernhardus and von Otte, Ingo and Rieping, Ingo}}, issn = {{0167-8191}}, journal = {{Parallel Computing}}, pages = {{187--207}}, title = {{{The Paderborn University BSP (PUB) library}}}, doi = {{10.1016/s0167-8191(02)00218-1}}, year = {{2003}}, } @article{19785, author = {{Salzwedel, Kay A.}}, isbn = {{9783540008835}}, issn = {{0302-9743}}, journal = {{Algorithms for Memory Hierarchies}}, title = {{{Algorithmic Approaches for Storage Networks}}}, doi = {{10.1007/3-540-36574-5_12}}, volume = {{2625}}, year = {{2003}}, } @inproceedings{19790, abstract = {{The advances in Internet technology have led to tremendous improvements in business, education, and science and have changed the way we think, live, and communicate. Information exchange has become ubiquitous by the possibilities offered through modern technologies. We are able to offer information 24 hours a day through our web sites and can leave messages every time and from anywhere in the world. This change in communication has led to new challenges. Enterprises have to deal with an information amount that doubles every year. The technological foundation to cope with this information explosion is given by Storage Area Networks (SANs), which are able to connect a great number of storage systems over a fast interconnection network. However, to be able to use the benefits of a SAN, an easy-to-use and efficient management support has to be given to the storage administrator. In this paper, we will suggest new storage management concepts and we will introduce a new management environment that is able to significantly reduce management costs and increases the performance and resource utilization of the given SAN infrastructure.}}, author = {{Scheideler, Christian and Salzwedel, Kay and Meyer auf der Heide, Friedhelm and Brinkmann, André and Vodisek, Mario and Rückert, Ulrich}}, booktitle = {{Proceedings of SSGRR 2003}}, title = {{{Storage Management as Means to cope with Exponential Information Growth}}}, year = {{2003}}, } @inproceedings{19806, abstract = {{We try to close the gap between theoretical investigations of wireless network topologies and realistic wireless environments. For point-to-point communication, we examine theoretically well-analyzed sparse graphs, i.e. the Yao-graph, the SparsY-graph, and the SymmY-graph. We present distributed algorithms that can be used to build up these graphs in time $O(log n)$ per node without the use of any geo-graphical positioning system. Our algorithms are based only on local knowledge and local decisions and make use of power control to establish communication links with low energy-cost. We compare these algorithms with respect to congestion, dilation, and energy. For congestion we introduce different measures that allow us to investigate the difference between real-world wireless networks and models for wireless communication at a high level of abstraction. For more realistic simulations we extend our simulation environment SAHNE. We use a realistic transmission model for directed communication that uses sector subdivision. Finally, our experimental results show that our topologies and algorithms work well in a distributed environment and we give some recommendations for the topology control based on our simulations.}}, author = {{Rührup, Stefan and Schindelhauer, Christian and Volbert, Klaus and Grünewald, M.}}, booktitle = {{Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS)}}, isbn = {{0769519261}}, title = {{{Performance of distributed algorithms for topology control in wireless networks}}}, doi = {{10.1109/ipdps.2003.1213107}}, year = {{2003}}, } @misc{19828, author = {{Mahlmann, Peter}}, title = {{{Implementierung und Vergleich von Verfahren zum Information Retrieval im World Wide Web}}}, year = {{2003}}, } @inproceedings{19833, abstract = {{Communication facilities are important in Robotics if several robots have to work together. In this paper, we describe problems and solutions encountered while designing an infrared-based communication device for the mini robot Khepera. In contrast to traditional omnidirectional systems, it features directed, power-variable transmission in eight directions at unit[23.4]kbps up to a range of unit[1m]. It can differentiate incoming data signals from interference from adjacent sectors and can estimate their direction-of-arrival. We model the transmission over the infrared channel and show how interference influences the reception of the data signals. We also describe methods how to reduce these effects. We have tested the performance of the resulted signal processing in a worst case scenario by simulations and in experiments with a prototype implementation. The resulted module is especially suited for experimental evaluation of ad hoc network protocols and for position estimation.}}, author = {{Volbert, Klaus and Grünewald, Matthias and Schindelhauer, Christian and Rückert, Ulrich}}, booktitle = {{Proceedings of the 2nd International Conference on Autonomous Minirobots for Research and Edutainment}}, pages = {{113--122}}, title = {{{Directed power-variable infrared communication for the mini robot Khepera}}}, year = {{2003}}, } @inproceedings{19874, abstract = {{We present a novel framework for hierarchical collision detection that can be applied to virtually all bounding volume (BV) hierarchies. It allows an application to trade quality for speed. Our algorithm yields an estimation of the quality, so that applications can specify the desired quality. In a timecritical system, applications can specify the maximum time budget instead, and quantitatively assess the quality of the results returned by the collision detection afterwards.}}, author = {{Klein, Jan and Zachmann, Gabriel}}, booktitle = {{Proc. 8th International Fall Workshop Vision, Modeling, and Visualization (VMV 2003)}}, pages = {{37--45}}, title = {{{ADB-Trees: Controlling the Error of Time-Critical Collision Detection}}}, year = {{2003}}, } @inproceedings{19900, author = {{Klein, Jan and Zachmann, Gabriel}}, booktitle = {{ Proc. ACM Symposium on Virtual Reality Software and Technology (VRST 2003)}}, pages = {{22--31}}, title = {{{Time-Critical Collision Detection Using an Average-Case Approach}}}, doi = {{10.1145/1008653.1008660}}, year = {{2003}}, } @inproceedings{19952, abstract = {{Graph minors theory, developed by Robertson & Seymour, provides a list of powerful theoretical results and tools. However, the wide spread opinion in Graph Algorithms community about this theory is that it is mainly of theoretical importance. The main purpose of this paper is to show how very deep min-max and duality theorems from Graph Minors can be used to obtain essential speed-up to many known algorithms on different domination problems.}}, author = {{Fomin, Fedor V. and Thilikos, Dimitrios M.}}, booktitle = {{Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)}}, issn = {{0097-5397}}, title = {{{Dominating Sets in Planar Graphs: Branch-Width and Exponential Speed-Up}}}, doi = {{10.1137/s0097539702419649}}, year = {{2003}}, } @inproceedings{24273, author = {{Terbahl, Martina and Krokowski, Jens}}, booktitle = {{Proceedings of 5. GI-Informatiktage 2003}}, title = {{{Verteiltes Rendern durch dynamische Bildaufteilung}}}, year = {{2003}}, } @inproceedings{26263, author = {{Ziegler, Martin}}, booktitle = {{Proc. 5th Conference on Real Numbers and Computers (RNC5), INRIA}}, pages = {{47--64}}, title = {{{Stability versus Speed in a Computable Algebraic Model}}}, year = {{2003}}, } @inproceedings{26277, author = {{Ziegler, Martin}}, booktitle = {{Computability and Complexity in Analysis}}, pages = {{389--406}}, title = {{{Computable Operators on Regular Sets}}}, volume = {{302-8/2003}}, year = {{2003}}, } @inproceedings{2128, author = {{Damerow, Valentina and Meyer auf der Heide, Friedhelm and Räcke, Harald and Scheideler, Christian and Sohler, Christian}}, booktitle = {{ESA}}, pages = {{161----171}}, publisher = {{Springer}}, title = {{{Smoothed Motion Complexity}}}, doi = {{10.1007/978-3-540-39658-1_17}}, volume = {{2832}}, year = {{2003}}, } @inproceedings{2129, author = {{Awerbuch, Baruch and Brinkmann, André and Scheideler, Christian}}, booktitle = {{ICALP}}, pages = {{1153----1168}}, publisher = {{Springer}}, title = {{{Anycasting in Adversarial Systems: Routing and Admission Control}}}, volume = {{2719}}, year = {{2003}}, } @inproceedings{17423, author = {{Mueck, Bengt and Dangelmaier, Wilhelm and Fischer, Matthias}}, booktitle = {{15th European Simulation Symposium (ESS 2003)}}, pages = {{367--371}}, publisher = {{SCS - Europe}}, title = {{{Components for the Active Support of the Analysis of Material Flow Simulations in a Virtual Environment}}}, year = {{2003}}, } @inproceedings{18791, abstract = {{We consider the problem of finding the weight of a Euclidean minimum spanning tree for a set of n points in ℝd. We focus on the situation when the input point set is supported by certain basic (and commonly used) geometric data structures that can provide efficient access to the input in a structured way. We present an algorithm that estimates with high probability the weight of a Euclidean minimum spanning tree of a set of points to within 1 + ε using only \~{O}(√ poly(1/ε)) queries for constant d. The algorithm assumes that the input is supported by a minimal bounding cube enclosing it, by orthogonal range queries, and by cone approximate nearest neighbors queries.}}, author = {{Magen, Avner and Ergun, Funda and Sohler, Christian and Rubinfeld, Ronitt and Czumaj, Artur and Newman, Ilan and Fortnow, Lance}}, booktitle = {{Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003)}}, isbn = {{0898715385}}, pages = {{813–822}}, title = {{{Sublinear Approximation of Euclidean Minimum Spanning Tree}}}, year = {{2003}}, } @inproceedings{18907, abstract = {{In a (randomized) oblivious routing scheme the path chosen for a request
between a source $s$ and a target $t$ is independent from the current traffic
in the network. Hence, such a scheme consists of probability distributions
over $s-t$ paths for every source-target pair $s,t$ in the network.

In a recent result citeR02 it was shown that for any undirected network
there is an oblivious routing scheme that achieves a polylogarithmic
competitive ratio with respect to congestion. Subsequently, Azar et
al. citeACF+03 gave a polynomial time algorithm that for a given network
constructs the best oblivious routing scheme, i.e. the scheme that guarantees
the best possible competitive ratio.
Unfortunately, the latter result is based on the Ellipsoid algorithm; hence
it is unpractical for large networks.

In this paper we present a combinatorial algorithm for constructing an
oblivious routing scheme that guarantees a competitive ratio of $O(log^4n)$
for undirected networks. Furthermore, our approach yields a proof
for the existence of an oblivious routing scheme with competitive ratio
$O(log^3n)$, which is much simpler than the original proof from citeR02.}}, author = {{Bienkowski, Marcin and Korzeniowski, Miroslaw and Räcke, Harald}}, booktitle = {{Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures - SPAA '03}}, isbn = {{1581136617}}, title = {{{A practical algorithm for constructing oblivious routing schemes}}}, doi = {{10.1145/777412.777418}}, year = {{2003}}, } @inproceedings{18947, abstract = {{In this paper, we define a Petri net model for the network or routing layer of a mobile ad hoc network. Such networks require routing strategies substantially different from those used in static communication networks. The model pre- sented consists of two layers, a location service and a po- sition based routing. Both are described in detail. Our ap- proach considers a very strong definition of fault tolerance thereby improving state-of-the-art ad hoc routing protocols in several respects. Modeling of the communication archi- tecture for mobile ad hoc networks is part of our overall effort towards a design methodology for distributed embed- ded real-time systems including dynamically evolving com- ponents.}}, author = {{Rust, Carsten and Stappert, Friedhelm and Lukovszki, Tamás}}, booktitle = {{7th World Multiconference on Systemics, Cybernetics and Informatics}}, title = {{{A Petri Net Model for the Network Layer of a Mobile Ad Hoc Network Architecture}}}, year = {{2003}}, } @inproceedings{18960, abstract = {{We investigate distributed algorithms for mobile ad hoc networks for moving radio stations with adjustable transmission power in a worst case scenario. We consider two models to find a reasonable restriction on the worst-case mobility. In the pedestrian model we assume a maximum speed $v_max$ of the radio stations, while in the vehicular model we assume a maximum acceleration $a_max$ of the points. Our goal is to maintain persistent routes with nice communication network properties like hop-distance, energy-consumption, congestion and number of interferences. A route is persistent, if we can guarantee that all edges of this route can be uphold for a given time span $Delta$, which is a parameter denoting the minimum time the mobile network needs to adopt changes, i.e. update routing tables, change directory entries, etc. This $Delta$ can be used as the length of an update interval for a proactive routing scheme. We extend some known notions such as transmission range, interferences, spanner, power spanner and congestion to both mobility models and introduce a new parameter called crowdedness that states a lower bound on the number of radio interferences. Then we prove that a mobile spanner hosts a path system that polylogarithmically approximates the optimal congestion. We present distributed algorithms based on a grid clustering technique and a high-dimensional representation of the dynamical start situation which construct mobile spanners with low congestion, low interference number, low energy-consumption, and low degree. We measure the optimality of the output of our algorithm by comparing it with the optimal choice of persistent routes under the same circumstances with respect to pedestrian or vehicular worst-case movements. Finally, we present solutions for dynamic position information management under our mobility models.}}, author = {{Schindelhauer, Christian and Lukovszki, Tamás and Rührup, Stefan and Volbert, Klaus}}, booktitle = {{Proc. of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA03)}}, isbn = {{1581136617}}, title = {{{Worst case mobility in ad hoc networks}}}, doi = {{10.1145/777412.777448}}, year = {{2003}}, } @inproceedings{18966, abstract = {{A recent seminal result of Räcke is that for any undirected network there is an oblivious routing algorithm with a polylogarithmic competitive ratio with respect to congestion. Unfortunately, Räcke's construction is not polynomial time. We give a polynomial time construction that guarantees Räcke's bounds, and more generally gives the true optimal ratio for any (undirected or directed) network.}}, author = {{Azar, Yossi and Cohen, Edith and Fiat, Amos and Kaplan, Haim and Racke, Harald}}, booktitle = {{Proceedings of the thirty-fifth ACM symposium on Theory of computing - STOC '03}}, isbn = {{1581136749}}, title = {{{Optimal oblivious routing in polynomial time}}}, doi = {{10.1145/780542.780599}}, year = {{2003}}, } @misc{18982, abstract = {{In dieser Studienarbeit wurde ein System entworfen und implementiert, das der Ausführung paralleler Algorithmen nach dem Bulk-Synchronous Parallel (BSP)-Modell dient. Von der Paderborn University BSP Library (PUB) unterscheidet es sich dadurch, dass es vom Einsatzgebiet her nicht für Parallelrechner konzipiert ist, sondern vielmehr für eine Ansammlung von PCs und Workstations, die über das gesamte Internet verteilt sind.
Gegenüber anderen bekannten Web-Computing Projekten wie z.B. SETI@home oder distributed.net zeichnet sich dieses System dadurch aus, dass nicht Clients von einem zentralen Server "häppchenweise" unabhängige Teilprobleme anfordern und lösen, sondern dass die Clients gemeinsam an einem Problem arbeiten, indem sie nach dem BSP-Modell miteinander kommunizieren und sich synchronisieren.}}, author = {{Gehweiler, Joachim}}, title = {{{Entwurf und Implementierung einer Laufzeitumgebung für parallele Algorithmen in Java}}}, year = {{2003}}, } @article{20435, author = {{Hamann, Heiko}}, journal = {{Complex Systems}}, number = {{3}}, pages = {{263----268}}, title = {{{Definition and Behavior of Langton's Ant in Three Dimensions}}}, volume = {{14}}, year = {{2003}}, } @inproceedings{18196, abstract = {{Fast algorithms for arithmetic on real or complex polynomials are well-known and have proven to be not only asymptotically efficient but also very practical. Based on FAST FOURIER TRANSFORM, they for instance multiply two polynomials of degree up to N or multi-evaluate one at N points simultaneously within quasi-linear time O(N polylog N). An extension to (and in fact the mere definition of) polynomials over fields R and C to the SKEW-field H of quaternions is promising but still missing. The present work proposes three approaches which in the commutative case coincide but for H turn out to differ, each one satisfying some desirable properties while lacking others. For each notion, we devise algorithms for according arithmetic; these are quasi-optimal in that their running times match lower complexity bounds up to polylogarithmic factors.}}, author = {{Ziegler, Martin}}, booktitle = {{Proc. 14th Annual International Symposium on Algorithms and Computation (ISAAC'03)}}, isbn = {{9783540206958}}, issn = {{0302-9743}}, pages = {{705--715}}, title = {{{Quasi-optimal Arithmetic for Quaternion Polynomials}}}, doi = {{10.1007/978-3-540-24587-2_72}}, year = {{2003}}, } @inbook{18258, abstract = {{Multi-evaluation of the Coulomb potential induced by N particles is a central part of N-body simulations. In 3D, known subquadratic time algorithms return approximations up to given ABSOLUTE precision. By combining data structures from Computational Geometry with fast polynomial arithmetic, the present work obtains approximations of prescribable RELATIVE error e>0 in time O(1/e*N*polylog N).}}, author = {{Ziegler, Martin}}, booktitle = {{Lecture Notes in Computer Science}}, editor = {{Dehne, F. and Sack, JR. and Smid, M.}}, isbn = {{9783540405450}}, issn = {{0302-9743}}, publisher = {{Springer}}, title = {{{Fast Relative Approximation of Potential Fields}}}, doi = {{10.1007/978-3-540-45078-8_13}}, volume = {{2748}}, year = {{2003}}, } @inproceedings{18367, abstract = {{Unternehmen operieren zunehmend in einem schwierigen Umfeld: Die Innovationsdynamik nimmt zu; die Produktlebenszyklen werden kürzer; gleichzeitig werden die Produkte komplexer; der harte Wettbewerb zwingt die Unternehmen, auf Marktveränderungen zu reagieren. Aus dieser Entwicklung resultieren hohe Anforderungen an die Gestaltung der Fertigungsprozesse. Im Wesentlichen kommt es darauf an, die Fertigungsprozesse möglichst rasch an die neuen Gegebenheiten anzupassen, bzw. neue Fertigungsprozesse so zu planen, dass sie auf Anhieb die erforderlichen Resultate bringen. Ein wichtiges Mittel hierfür der Einsatz von Materialflusssimulationen. Hierzu ist zunächst die Erstellung eines Simulationsmodells notwendig. Dafür wird in einem ersten Schritt das zu betrachtende System analysiert und ein rechnerinternes Modell erzeugt. Dieses beinhaltet die Modellierung von Funktionen, Prozessen, Verhaltensweisen oder Regeln, die im Modell die tatsächlichen Wirkzusammenhänge im Unternehmen widerspiegeln sollen. Die so modellierten Aspekte sind untereinander so vernetzt, dass alle Funktionen des Modells ein Ganzes ergeben. Für viele Fragenstellungen werden umfangreiche Modelle mit einem komplexen Verhalten benötigt. Andererseits steigt mit zunehmender Größe und Komplexität des Simulationsmodells auch der Modellierungsaufwand, die Fehleranfälligkeit, die Laufzeit und der Interpretationsaufwand bei der Ergebnisauswertung. Fehler bei der Modellbildung führen bei der Simulation zu Fehlinterpretationen und falschen Ergebnissen. Einen wesentlichen Anteil daran hat die Gestaltung der Benutzungsschnittstelle: Das übliche, wenig intuitive WIMP-Interface (Windows, Icons, Mouse, Pointer) erfordert sehr gut geschulte Benutzer, sodass die Erzeugung der meist komplexen Simulationsmodelle mit großen Zeitaufwand verbunden ist. Die Präsentation der Simulationsergebnisse erfolgt in Form von Wertetabellen und zweidimensionalen, abstrakten Darstellungen des Fertigungssystems. Für die Simulationsexperten erscheint dies ausreichend, für ein aus verschiedenen Bereichen und Disziplinen zusammengesetztes Planungsteam ist das aber nicht akzeptabel. So können Fehlinterpretationen aufgrund der unklaren Darstellungen auftreten. Durch eine durchgängige Unterstützung von der Modellierung über die Ausführung bis zur Analyse von Simulationen durch Augmented-Reality und Virtual-Reality werden viele dieser Probleme überwunden aber viele neue Probleme entstehen. Marktgängige Simulatoren unterstützen zwar z.T. schon Virtual Reality; eine durchgängige Simulationsunterstützung wird aber in der Virtuellen Umgebung nicht geboten. Argumented Reality-Komponenten sind bisher nicht bekannt. In diesem Artikel werden nach einer Analyse der benötigten Technologien die Nutzenpotentiale insb. durch den Einsatz von AR ausgelotet. }}, author = {{Fischer, Matthias and Grafe, Michael and Matysczok, Carsten and Mueck, Bengt and Schoo, Michael}}, booktitle = {{Human Aspects in Production Management - Proceedings of the IFIP WG 5.7 Working Conference on Human Aspects in Production Management}}, pages = {{170--177}}, publisher = {{Shaker Verlag}}, title = {{{Virtual and Augmented Reality Support for Discrete Manufacturing System Simulation}}}, volume = {{5}}, year = {{2003}}, } @inproceedings{18372, abstract = {{Simulation und Visualisierung sind anerkannte Mittel zum Verstehen und Analysieren von Fertigungsprozessen. In Visualisierungen von Fertigungsprozessen können Betrachter frei und ungeleitet umherwandern. Erkenntnisse werden so aber eher zufällig erworben. Dieser Artikel skizziert ein System und Methoden, die den Betrachter unterstützen auf auffällige/signifikante Prozesse/ Punkte in Materialflusssimulationen aufmerksam zu werden und diese zu entschärfen. Es wird der Entwurf eines Werkzeugs beschrieben, dass den Betrachter einer Simulation die Möglichkeit bietet, signifikante Produktionsprozesse interaktiv zu verbessern. Der Benutzer wird sich in einer virtuellen 3D-Umgebung (Walkthrough-System) bewegen können und automatisch ermittelte Indizien für signifikante Abläufe erhalten. Zugleich soll die Simulation signifikante Objekte genauer simulieren. Bekundet der Benutzer Interesse an einem signifikanten Prozess, wird er automatisch zu dem jeweiligen Ort geführt werden und dort durch Eingriffe in die Simulation die kritische Situation experimentell untersuchen können. Da der kritische Moment in der Vergangenheit liegt und somit vom Betrachter schon verpasst ist, wird es dem Betrachter möglich sein, die Simulation auf einen Zeitpunkt vor dem Eintreten zurück zu setzen. Die virtuelle Szene (3D-Grafik-Modelle) einer typischen dynamischen Simulationsumgebung ist in der Regel zu komplex, um sie in Echtzeit in einem Walkthrough-System zu visualisieren und darzustellen. Typischerweise werden Approximationsverfahren eingesetzt, um die Komplexität zu reduzieren und ein flüssiges Navigieren des Betrachters zu erlauben. Durch spezifische Simulations-Anforderungen ist bekannt, an welchen Objekten des Simulationsmodells Probleme auftreten; sie sind für den Betrachter wichtig. Die zugehörigen virtuellen 3D-Repräsentanten, können von den Approximationsalgorithmen mit einer besonders hohen Darstellungsqualität dargestellt werden und die übrigen Teile der virtuellen Szene entsprechend vernachlässigt werden. Solche Approximationsalgorithmen und Datenstrukturen nutzen die spezifischen Eigenschaften virtueller Simulationsumgebungen aus, um eine hohe Darstellungsqualität und Darstellungsperformance zu erreichen. }}, author = {{Dangelmaier, Wilhelm and Franke, Werner and Mueck, Bengt and Fischer, Matthias}}, booktitle = {{2. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung}}, pages = {{141--151}}, title = {{{Komponenten zur aktiven Unterstützung der Analyse von Materialflusssimulationen in virtuellen Umgebungen}}}, volume = {{123}}, year = {{2003}}, } @inproceedings{18374, abstract = {{In der heutigen Zeit operieren Unternehmen zunehmend in einem schwierigen Umfeld: Die Innovationsdynamik nimmt zu und die Produktlebenszyklen werden kürzer. Daraus resultieren hohe Anforderungen an die Planung von Fertigungssysteme. Um diesen Prozess zu unterstützen, sollen die Technologien Augmented Reality und Virtual Reality in einem integrierten System genutzt werden. Dieses System unterstützt den Anwender bei der Modellbildung, der Validierung des Simulationsmodells sowie der folgenden Optimierung des Fertigungssystems. Durch die Entwicklung geeigneter Kopplungs- bzw. Integrationsmechanismen wird eine durchgängige Nutzung der Technologien AR, VR und Simulation realisiert. Die Visualisierung der anfallenden 3D-Daten innerhalb der VR- und ARUmgebungen erfolgt mittels einer 3D-Renderinglibrary, die es durch den Einsatz von neuen entwickelten Verfahren ermöglicht, die verwendeten 3D-Modelle weitgehend automatisiert aus unternehmensinternen 3D-CAD-Modellen zu generieren.}}, author = {{Fischer, Matthias and Grafe, Michael and Matysczok, Carsten and Schoo, Michael and Mueck, Bengt}}, booktitle = {{2. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung}}, pages = {{153--166}}, publisher = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}}, title = {{{Planung von komplexen Fertigungssystemen durch Einsatz einer VR/AR-unterstützten Simulation}}}, volume = {{123}}, year = {{2003}}, } @article{18567, author = {{Adler, Micah and Vöcking, Berthold and Sohler, Christian and Räcke, Harald and Sivadasan, Naveen}}, journal = {{Combinatorics, Probability & Computing}}, pages = {{225--244}}, title = {{{Randomized Pursuit-Evasion in Graphs}}}, year = {{2003}}, } @phdthesis{18573, author = {{Sohler, Christian}}, isbn = {{3-935433-28-X}}, publisher = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}}, title = {{{Property Testing and Geometry}}}, volume = {{119}}, year = {{2003}}, } @article{16481, abstract = {{ZusammenfassungVernetzte Systeme sind zu unverzichtbaren Bestandteilen unseres Umfelds geworden, zum Beispiel als Höchstleistungsrechner, als Kommunikations- und Informationssysteme oder als Planungs- und Steuerungskomponenten von Transport- und Produktionssystemen. Die ständig wachsende Komplexität solcher Systeme stellt Informatiker und Ingenieure vor immer neue Herausforderungen. In diesem Beitrag beschreibe ich die Zielsetzungen und die Struktur des SFB 376 Massive Parallelität: Algorithmen – Entwurfsmethoden – Anwendungen. Als Beispiel für unsere Arbeiten beschreibe ich einen algorithmisch orientierten Forschungszweig, in dem wir, ausgehend von theoretischen Problemen über effiziente Simulationen zwischen parallelen Rechenmodellen, Methoden, Techniken und Implementierungen entwickelt haben, die zu produktnahen Prototypen für die Speichervirtualisierung in verteilten Datenservern führen.}}, author = {{Meyer auf der Heide, Friedhelm}}, issn = {{2196-7032}}, journal = {{it - Information Technology}}, title = {{{Sonderforschungsbereich 376 Massive Parallelität: Algorithmen – Entwurfsmethoden – Anwendungen (Massively Parallel Computing: Algorithms – Design Methods – Applications)}}}, doi = {{10.1524/itit.45.2.108.19606}}, year = {{2003}}, } @article{16482, author = {{Juurlink, Bernhardus and Kolman, Petr and Meyer auf der Heide, Friedhelm and Rieping, Ingo}}, issn = {{1570-8667}}, journal = {{Journal of Discrete Algorithms}}, pages = {{151--166}}, title = {{{Optimal broadcast on parallel locality models}}}, doi = {{10.1016/s1570-8667(03)00023-6}}, year = {{2003}}, } @proceedings{16484, editor = {{Rosenberg, Arnold L. and Meyer auf der Heide, Friedhelm}}, isbn = {{1581136617}}, title = {{{Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures - SPAA '03}}}, doi = {{10.1145/777412}}, year = {{2003}}, } @inproceedings{16720, author = {{Bonorden, Olaf and Bruls, N. and Kastens, U. and Le, D. K. and Meyer auf der Heide, Friedhelm and Niemann, J.-C. and Porrmann, M. and Rückert, U. and Slowik, A. and Thies, M.}}, booktitle = {{28th Annual IEEE International Conference on Local Computer Networks}}, title = {{{A holistic methodology for network processor design}}}, doi = {{10.1109/LCN.2003.1243185}}, year = {{2003}}, } @inproceedings{19727, author = {{Bonorden, Olaf and Meyer auf der Heide, Friedhelm and Wanka, Rolf}}, booktitle = {{Int. Conf. on Parallel and Distributed Processing Techniques and Applications (PDPTA)}}, pages = {{2202--2208}}, title = {{{Composition of Efficient Nested BSP Algorithms: Minimum Spanning Tree Computation as an Instructive Example}}}, year = {{2002}}, } @inproceedings{19850, author = {{Wanka, Rolf}}, booktitle = {{Proc. Workshop on Graph-Theoretic Concepts in Computer Science (WG)}}, isbn = {{9783540003311}}, issn = {{0302-9743}}, pages = {{413--420}}, title = {{{Any Load-Balancing Regimen for Evolving Tree Computations on Circulant Graphs Is Asymptotically Optimal}}}, doi = {{10.1007/3-540-36379-3_36}}, year = {{2002}}, } @inproceedings{19873, abstract = {{We present a new and easy to use framework for navigating through scenes of arbitrary complexity and topology. In the preprocessing, images for discrete viewpoints and viewing directions are rendered and stored on an external volume. During navigation each image can be displayed within a very short time by loading it from the volume. For acceleration, our prefetching strategy loads possibly needed images for the next few frames if the viewer takes a break. The measurements show that we achieve interactive frame rates, whereby the difference between the minimal and maximal display time is very small. Our system works well with scenes modelled by polygons, but also digital photos can easily be used for describing a 3D scene.}}, author = {{Klein, Jan and Krokowski, Jens and Cuntz, Nicolas}}, booktitle = {{Proc. of 4. GI-Informatiktage}}, pages = {{224--229}}, title = {{{Realtime Navigation in Highly Complex 3D-Scenes Using JPEG Compression}}}, year = {{2002}}, } @article{24336, abstract = {{We define here a distributed abstract state machine (DASM) [7] of the network or routing layer of mobile ad hoc networks [13]. Such networks re- quire routing strategies substantially different from those used in static commu- nication networks, since storing and updating large routing tables at mobile hosts would congest the network with administration packets very fast. In [1], the hypercubic location service is presented, which considers a very strong definition of fault-tolerance thereby improving state-of-the-art ad hoc routing protocols in several respects. Our goal in modeling the protocols for the distrib- uted location service and the position based routing is twofold. First, we support the definition and validation of wireless communication protocols and imple- mentations based thereon. Second, we feel that the abstract computation model naturally reflects the layering principle of communication architectures in com- bination with an uncompromisingly local view of the application domain. Thus we can identify fundamental semantic concepts, such as concurrency, reactivity and asynchronism, directly with the related concepts as imposed by the given application context. }}, author = {{ Benczúr, András and Glässer, Uwe and Lukovszki, Tamás}}, journal = {{Proc. of 10th International Workshop on Abstract State Machines, LNCS}}, title = {{{Formal Description of a Distributed Location Service for Mobile Ad Hoc Networks}}}, year = {{2002}}, } @inproceedings{24338, author = {{Grünewald, Matthias and Lukovszki, Tamás and Schindelhauer, Christian and Volbert, Klaus}}, booktitle = {{Proceedings of the 8th International Euro-Par Conference}}, issn = {{0302-9743}}, title = {{{Distributed Maintenance of Resource Efficient Wireless Network Topologies}}}, doi = {{10.1007/3-540-45706-2_134}}, year = {{2002}}, } @inproceedings{26412, author = {{Volbert, Klaus}}, booktitle = {{Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing}}, title = {{{A simulation environment for ad hoc networks using sector subdivision}}}, doi = {{10.1109/empdp.2002.994324}}, year = {{2002}}, } @inproceedings{2136, author = {{Brinkmann, André and Salzwedel, Kay and Scheideler, Christian}}, booktitle = {{SPAA}}, pages = {{53----62}}, title = {{{Compact, adaptive placement schemes for non-uniform requirements}}}, year = {{2002}}, }