@article{ElsenKraiss1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich}, title = {System concept and realization of a scalable neurocomputing architecture}, series = {Systems Analysis Modelling Simulation}, volume = {35}, journal = {Systems Analysis Modelling Simulation}, number = {4}, publisher = {Gordon and Breach Science Publishers}, address = {Amsterdam}, issn = {0232-9298}, pages = {399 -- 419}, year = {1999}, abstract = {This paper describes the realization of a novel neurocomputer which is based on the concepts of a coprocessor. In contrast to existing neurocomputers the main interest was the realization of a scalable, flexible system, which is capable of computing neural networks of arbitrary topology and scale, with full independence of special hardware from the software's point of view. On the other hand, computational power should be added, whenever needed and flexibly adapted to the requirements of the application. Hardware independence is achieved by a run time system which is capable of using all available computing power, including multiple host CPUs and an arbitrary number of neural coprocessors autonomously. The realization of arbitrary neural topologies is provided through the implementation of the elementary operations which can be found in most neural topologies.}, language = {en} } @article{ElsenKraissKrumbiegeletal.1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk and Walter, Peter and Wickel, Jochen}, title = {Visual information retrieval for 3D product identification: a midterm report}, series = {KI - K{\"u}nstliche Intelligenz}, volume = {13}, journal = {KI - K{\"u}nstliche Intelligenz}, number = {1}, publisher = {Springer}, address = {Berlin}, issn = {1610-1987}, pages = {64 -- 67}, year = {1999}, language = {en} } @article{ElsenHartungHornetal.2001, author = {Elsen, Ingo and Hartung, Frank and Horn, Uwe and Kampmann, Markus and Peters, Liliane}, title = {Streaming technology in 3G mobile communication systems}, series = {Computer : innovative technology for computer professionals}, volume = {34}, journal = {Computer : innovative technology for computer professionals}, number = {9 Seiten}, editor = {Voas, Jeffrey}, publisher = {IEEE}, address = {New York}, issn = {0018-9162}, pages = {46 -- 52}, year = {2001}, abstract = {Third-generation mobile communication systems will combine standardized streaming with a range of unique services to provide high-quality Internet content that meets the specific needs of the rapidly growing mobile market.}, language = {en} } @article{Wolf2000, author = {Wolf, Martin R.}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, journal = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, publisher = {-}, pages = {5 -- 8}, year = {2000}, language = {en} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, pages = {20 -- 28}, year = {2010}, language = {en} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, series = {Cognitive Robotics / Lakemeyer, Gerhard (ed.)}, journal = {Cognitive Robotics / Lakemeyer, Gerhard (ed.)}, pages = {1 -- 15}, year = {2010}, language = {en} } @article{Wolf2003, author = {Wolf, Martin R.}, title = {Risiko- und Maßnahmenmanagement bei der Computervalidierung}, series = {Pharma-Technologie-Journal (2003)}, journal = {Pharma-Technologie-Journal (2003)}, publisher = {-}, isbn = {0931-9700}, pages = {50 -- 62}, year = {2003}, language = {de} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin R.}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{WolfFoltzSchlicketal.2000, author = {Wolf, Martin R. and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Empirische Untersuchung eines Groupware-basierten Unterst{\"u}tzungs-Systems f{\"u}r verfahrenstechnische Entwickler / Wolf, M. ; Foltz, C. ; Schlick, C. ; Luczak, H.}, series = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, journal = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, publisher = {-}, isbn = {0340-2444}, pages = {258 -- 266}, year = {2000}, language = {de} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin R. and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} } @article{SchifferFerrein2016, author = {Schiffer, Stefan and Ferrein, Alexander}, title = {Decision-Theoretic Planning with Fuzzy Notions in GOLOG}, series = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, volume = {24}, journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, number = {Issue Suppl. 2}, publisher = {World Scientific}, address = {Singapur}, issn = {1793-6411}, doi = {10.1142/S0218488516400134}, pages = {123 -- 143}, year = {2016}, abstract = {In this paper we present an extension of the action language Golog that allows for using fuzzy notions in non-deterministic argument choices and the reward function in decision-theoretic planning. Often, in decision-theoretic planning, it is cumbersome to specify the set of values to pick from in the non-deterministic-choice-of-argument statement. Also, even for domain experts, it is not always easy to specify a reward function. Instead of providing a finite domain for values in the non-deterministic-choice-of-argument statement in Golog, we now allow for stating the argument domain by simply providing a formula over linguistic terms and fuzzy uents. In Golog's forward-search DT planning algorithm, these formulas are evaluated in order to find the agent's optimal policy. We illustrate this in the Diner Domain where the agent needs to calculate the optimal serving order.}, language = {en} } @article{FerreinSteinbauer2016, author = {Ferrein, Alexander and Steinbauer, Gerald}, title = {The Interplay of Aldebaran and RoboCup}, series = {KI - K{\"u}nstliche Intelligenz}, volume = {30}, journal = {KI - K{\"u}nstliche Intelligenz}, number = {3-4}, publisher = {Springer}, address = {Berlin}, issn = {1610-1987}, doi = {10.1007/s13218-016-0440-1}, pages = {325 -- 326}, year = {2016}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin R.}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{WolfLuczak1999, author = {Wolf, Martin R. and Luczak, Holger}, title = {Computer Supported Communication and Cooperation - Making Information Aware / Luczak, H. ; Wolf, M.}, series = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, journal = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, publisher = {Erlbaum}, address = {Mahwah, NJ}, pages = {298 -- 302}, year = {1999}, language = {en} } @article{FerreinDyllaLakemeyeretal.2008, author = {Ferrein, Alexander and Dylla, Frank and Lakemeyer, Gerhard and Murray, Jan}, title = {Approaching a formal soccer theory from behaviour specifications in robotic soccer / Dylla, Frank ; Ferrein, Alexander ; Lakemeyer, Gerhard ; Murray, Jan ; Obst, Oliver ; R{\"o}fer, Thomas ; Schiffer, Stefan ; Stolzenburg, Frieder ; Visser, Ubbo ; Wagner, Tho}, series = {Computers in sport / editors: P Dabnichki}, journal = {Computers in sport / editors: P Dabnichki}, publisher = {WIT Press}, address = {Southampton}, isbn = {978-1-8456-4064-4}, pages = {161 -- 185}, year = {2008}, language = {en} } @article{BooysenRiegerFerrein2011, author = {Booysen, Tracy and Rieger, Michael and Ferrein, Alexander}, title = {Towards inexpensive robots for science \& technology teaching and education in Africa}, publisher = {IEEE}, address = {New York}, isbn = {978-1-61284-992-8}, pages = {1 -- 6}, year = {2011}, language = {en} } @article{GspandlPillReipetal.2011, author = {Gspandl, Stephan and Pill, Ingo and Reip, Michael and Steinbauer, Gerald and Ferrein, Alexander}, title = {Belief Management for High-Level Robot Programs}, series = {Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence [electronic resource] : Barcelona, Catalonia, Spain, 16 - 22 July 2011 / sponsored by International Joint Conferences on Artificial Intelligence (IJCAI) and the Association for the Advancement of Artificial Intelligence (AAAI). Ed. by Toby Walsh}, journal = {Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence [electronic resource] : Barcelona, Catalonia, Spain, 16 - 22 July 2011 / sponsored by International Joint Conferences on Artificial Intelligence (IJCAI) and the Association for the Advancement of Artificial Intelligence (AAAI). Ed. by Toby Walsh}, pages = {900 -- 905}, year = {2011}, language = {en} } @article{Ferrein2008, author = {Ferrein, Alexander}, title = {Towards applying soccer moves in the RoboCup Standard Platform League}, series = {{\"O}GAI-Journal}, volume = {Bd. 27}, journal = {{\"O}GAI-Journal}, number = {H. 3}, organization = {{\"O}sterreichische Gesellschaft f{\"u}r Artificial Intelligence}, issn = {0254-4326}, pages = {4 -- 9}, year = {2008}, language = {en} } @article{HeuermannErkens2007, author = {Heuermann, Holger and Erkens, H.}, title = {Mixed-Mode Chain Scattering Parameters: Theory and Verification}, series = {IEEE Transactions on Microwave Theory and Techniques}, volume = {55}, journal = {IEEE Transactions on Microwave Theory and Techniques}, number = {8}, publisher = {IEEE}, address = {New York}, isbn = {0018-9480}, doi = {10.1109/TMTT.2007.902587}, pages = {1704 -- 1708}, year = {2007}, abstract = {Chain scattering parameters or T-parameters are a useful tool for calculating cascaded two-ports. With the increasing importance of mixed-mode S-parameters, a need for converting the T-parameters from their unbalanced form into a balanced form emerges for suiting both common and differential mode waves, as well as the mode conversion. This paper presents the derivation of the equations for transformations between mixed-mode S- and T-parameters for a mixed-mode two-port. Although derived in a way very similar to monomode T-parameters, no simplifications were necessary. Measurement results exemplify the quality of the T-parameter transformation under real-life conditions.}, language = {en} } @article{RensFerrein2013, author = {Rens, Gavin and Ferrein, Alexander}, title = {Belief-node condensation for online POMDP algorithms}, publisher = {IEEE}, address = {New York}, pages = {1 -- 7}, year = {2013}, abstract = {Slightly extended version of the paper accepted at the Robotics and Artificial Intelligence Workshop, a special track of IEEE AFRICON-2013, held in Mauritius, 9-12 September 2013}, language = {en} }