@inproceedings{15100, author = {{Böttcher, Stefan and Hartel, Rita and Stey, Sebastian}}, booktitle = {{Advances in Databases - 28th British National Conference on Databases, BNCOD 28, Revised Selected Papers}}, isbn = {{9783642245763}}, issn = {{0302-9743}}, pages = {{182--193}}, publisher = {{Springer}}, title = {{{TraCX: Transformation of Compressed XML}}}, doi = {{10.1007/978-3-642-24577-0_19}}, year = {{2011}}, } @inbook{16409, abstract = {{Given a set of n mobile robots in the d-dimensional Euclidean space, the goal is to let them converge to a single not predefined point. The challenge is that the robots are limited in their capabilities. Robots can, upon activation, compute the positions of all other robots using an individual affine coordinate system. The robots are indistinguishable, oblivious and may have different affine coordinate systems. A very general discrete time model assumes that robots are activated in arbitrary order. Further, the computation of a new target point may happen much earlier than the movement, so that the movement is based on outdated information about other robot's positions. Time is measured as the number of rounds, where a round ends as soon as each robot has moved at least once. In [Cohen, Peleg: Convergence properties of gravitational algorithms in asynchronous robot systems], the Center of Gravity is considered as target function, convergence was proven, and the number of rounds needed for halving the diameter of the convex hull of the robot's positions was shown to be O(n^2) and Omega(n). We present an easy-to-check property of target functions that guarantee convergence and yields upper time bounds. This property intuitively says that when a robot computes a new target point, this point is significantly within the current axes aligned minimal box containing all robots. This property holds, e.g., for the above-mentioned target function, and improves the above O(n^2) to an asymptotically optimal O(n) upper bound. Our technique also yields a constant time bound for a target function that requires all robots having identical coordinate axes. }}, author = {{Cord-Landwehr, Andreas and Degener, Bastian and Fischer, Matthias and Hüllmann, Martina and Kempkes, Barbara and Klaas, Alexander and Kling, Peter and Kurras, Sven and Märtens, Marcus and Meyer auf der Heide, Friedhelm and Raupach, Christoph and Swierkot, Kamil and Warner, Daniel and Weddemann, Christoph and Wonisch, Daniel}}, booktitle = {{Automata, Languages and Programming}}, isbn = {{9783642220111}}, issn = {{0302-9743}}, title = {{{A New Approach for Analyzing Convergence Algorithms for Mobile Robots}}}, doi = {{10.1007/978-3-642-22012-8_52}}, year = {{2011}}, } @inproceedings{19796, abstract = {{We introduce the Read-Write-Coding-System (RWC) – a very flexible class of linear block codes that generate efficient and flexible erasure codes for storage networks. In particular, given a message x of k symbols and a codeword y of n symbols, an RW code defines additional parameters k \leq r,w \leq n that offer enhanced possibilities to adjust the fault-tolerance capability of the code. More precisely, an RWC provides linear $\left(n,k,d\right)$-codes that have (a) minimum distance d=n-r+1 for any two codewords, and (b) for each codeword there exists a codeword for each other message with distance of at most w. Furthermore, depending on the values r,w and the code alphabet, different block codes such as parity codes (e.g. RAID 4/5) or Reed-Solomon (RS) codes (if r=k and thus, w=n) can be generated. In storage networks in which I/O accesses are very costly and redundancy is crucial, this flexibility has considerable advantages as r and w can optimally be adapted to read or write intensive applications; only w symbols must be updated if the message x changes completely, what is different from other codes which always need to rewrite y completely as x changes. In this paper, we first state a tight lower bound and basic conditions for all RW codes. Furthermore, we introduce special RW codes in which all mentioned parameters are adjustable even online, that is, those RW codes are adaptive to changing demands. At last, we point out some useful properties regarding safety and security of the stored data.}}, author = {{Mense, Mario and Schindelhauer, Christian}}, booktitle = {{Proceedings of 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems}}, isbn = {{9783642051173}}, issn = {{0302-9743}}, pages = {{624----639}}, title = {{{Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks}}}, doi = {{10.1007/978-3-642-05118-0_43}}, volume = {{5873}}, year = {{2010}}, } @inproceedings{20226, author = {{Hamann, Heiko and Meyer, Bernd and Schmickl, Thomas and Crailsheim, Karl}}, booktitle = {{From Animals to Animats 11}}, isbn = {{9783642151927}}, issn = {{0302-9743}}, pages = {{639--648}}, publisher = {{Springer}}, title = {{{A Model of Symmetry Breaking in Collective Decision-Making}}}, doi = {{10.1007/978-3-642-15193-4_60}}, volume = {{6226}}, year = {{2010}}, } @article{24282, author = {{Grza̧ślewicz, Ryszard and Kutyłowski, Jarosław and Kutyłowski, Mirosław and Pietkiewicz, Wojciech}}, issn = {{0302-9743}}, journal = {{ICCSA'05: Proceedings of the 2005 international conference on Computational Science and Its Applications}}, title = {{{Robust Undetectable Interference Watermarks}}}, doi = {{10.1007/11424826_55}}, year = {{2010}}, } @inbook{2988, author = {{Ackermann, Marcel R. and Blömer, Johannes}}, booktitle = {{SWAT 2010}}, isbn = {{9783642137303}}, issn = {{0302-9743}}, pages = {{212--223}}, publisher = {{Springer Berlin Heidelberg}}, title = {{{Bregman Clustering for Separable Instances}}}, doi = {{10.1007/978-3-642-13731-0_21}}, year = {{2010}}, } @inbook{20961, abstract = {{Self-healing promises to improve the dependability of systems. In particular safety-critical systems like automotive systems are well suited application, since safe operation is required in these systems even in case of failures. Prerequisite for the improved dependability is the correct realization of the self-healing techniques. Consequently, self-healing activities should be rigorously specified and appropriately integrated with the rest of the system. In this paper, we present an approach for designing self-healing mechanisms in automotive systems. The approach contains a construction model which consist of a structural description as well as an extensive set of constraints. The constraints specify a correct system structure and are also used in the self-healing activities. We exemplify the self-healing approach using the adaptive cruise control system of modern cars. }}, author = {{Seebach, Hella and Nafz, Florian and Holtmann, Jörg and Meyer, Jan and Tichy, Matthias and Reif, Wolfgang and Schäfer, Wilhelm}}, booktitle = {{Lecture Notes in Computer Science}}, isbn = {{9783642165757}}, issn = {{0302-9743}}, title = {{{Designing Self-healing in Automotive Systems}}}, doi = {{10.1007/978-3-642-16576-4_4}}, year = {{2010}}, } @inproceedings{19029, author = {{Briest, Patrick and Chalermsook, Parinya and Khanna, Sanjeev and Laekhanukit, Bundit and Nanongkai, Danupon}}, booktitle = {{Workshop on Internet and Network Economics (WINE)}}, isbn = {{9783642175718}}, issn = {{0302-9743}}, title = {{{Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing}}}, doi = {{10.1007/978-3-642-17572-5_37}}, year = {{2010}}, } @inbook{16505, abstract = {{We present an approach for real-time rendering of complex 3D scenes consisting of millions of polygons on limited graphics hardware. In a preprocessing step, powerful hardware is used to gain fine granular global visibility information of a scene using an adaptive sampling algorithm. Additively the visual influence of each object on the eventual rendered image is estimated. This influence is used to select the most important objects to display in our approximative culling algorithm. After the visibility data is compressed to meet the storage capabilities of small devices, we achieve an interactive walkthrough of the Power Plant scene on a standard netbook with an integrated graphics chipset.}}, author = {{Eikel, Benjamin and Jähn, Claudius and Fischer, Matthias}}, booktitle = {{Advances in Visual Computing}}, isbn = {{9783642172885}}, issn = {{0302-9743}}, title = {{{Preprocessed Global Visibility for Real-Time Rendering on Low-End Hardware}}}, doi = {{10.1007/978-3-642-17289-2_60}}, year = {{2010}}, } @inproceedings{15137, author = {{Böttcher, Stefan and Hartel, Rita and Messinger, Christian}}, booktitle = {{Database and XML Technologies - 7th International XML Database Symposium, XSym 2010}}, isbn = {{9783642156830}}, issn = {{0302-9743}}, pages = {{103--112}}, publisher = {{Springer}}, title = {{{Searchable Compression of Office Documents by XML Schema Subtraction}}}, doi = {{10.1007/978-3-642-15684-7_9}}, year = {{2010}}, }