@article{ElsenKraiss1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich}, title = {System concept and realization of a scalable neurocomputing architecture}, series = {Systems Analysis Modelling Simulation}, volume = {35}, journal = {Systems Analysis Modelling Simulation}, number = {4}, publisher = {Gordon and Breach Science Publishers}, address = {Amsterdam}, issn = {0232-9298}, pages = {399 -- 419}, year = {1999}, abstract = {This paper describes the realization of a novel neurocomputer which is based on the concepts of a coprocessor. In contrast to existing neurocomputers the main interest was the realization of a scalable, flexible system, which is capable of computing neural networks of arbitrary topology and scale, with full independence of special hardware from the software's point of view. On the other hand, computational power should be added, whenever needed and flexibly adapted to the requirements of the application. Hardware independence is achieved by a run time system which is capable of using all available computing power, including multiple host CPUs and an arbitrary number of neural coprocessors autonomously. The realization of arbitrary neural topologies is provided through the implementation of the elementary operations which can be found in most neural topologies.}, language = {en} } @article{ElsenKraissKrumbiegeletal.1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk and Walter, Peter and Wickel, Jochen}, title = {Visual information retrieval for 3D product identification: a midterm report}, series = {KI - K{\"u}nstliche Intelligenz}, volume = {13}, journal = {KI - K{\"u}nstliche Intelligenz}, number = {1}, publisher = {Springer}, address = {Berlin}, issn = {1610-1987}, pages = {64 -- 67}, year = {1999}, language = {en} } @article{ElsenHartungHornetal.2001, author = {Elsen, Ingo and Hartung, Frank and Horn, Uwe and Kampmann, Markus and Peters, Liliane}, title = {Streaming technology in 3G mobile communication systems}, series = {Computer : innovative technology for computer professionals}, volume = {34}, journal = {Computer : innovative technology for computer professionals}, number = {9 Seiten}, editor = {Voas, Jeffrey}, publisher = {IEEE}, address = {New York}, issn = {0018-9162}, pages = {46 -- 52}, year = {2001}, abstract = {Third-generation mobile communication systems will combine standardized streaming with a range of unique services to provide high-quality Internet content that meets the specific needs of the rapidly growing mobile market.}, language = {en} } @article{Wolf2000, author = {Wolf, Martin R.}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, journal = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, publisher = {-}, pages = {5 -- 8}, year = {2000}, language = {en} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, pages = {20 -- 28}, year = {2010}, language = {en} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, series = {Cognitive Robotics / Lakemeyer, Gerhard (ed.)}, journal = {Cognitive Robotics / Lakemeyer, Gerhard (ed.)}, pages = {1 -- 15}, year = {2010}, language = {en} } @article{Wolf2003, author = {Wolf, Martin R.}, title = {Risiko- und Maßnahmenmanagement bei der Computervalidierung}, series = {Pharma-Technologie-Journal (2003)}, journal = {Pharma-Technologie-Journal (2003)}, publisher = {-}, isbn = {0931-9700}, pages = {50 -- 62}, year = {2003}, language = {de} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin R.}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{WolfFoltzSchlicketal.2000, author = {Wolf, Martin R. and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Empirische Untersuchung eines Groupware-basierten Unterst{\"u}tzungs-Systems f{\"u}r verfahrenstechnische Entwickler / Wolf, M. ; Foltz, C. ; Schlick, C. ; Luczak, H.}, series = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, journal = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, publisher = {-}, isbn = {0340-2444}, pages = {258 -- 266}, year = {2000}, language = {de} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin R. and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} }