Hannes Hartenstein

Orcid: 0000-0003-3441-3180

Affiliations:
  • Karlsruhe Institute of Technology, Germany


According to our database1, Hannes Hartenstein authored at least 183 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

Logical Clocks and Monotonicity for Byzantine-Tolerant Replicated Data Types.
Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 2024

Short Paper: Unpredictable Transaction Arrangement for MEV Mitigation in Ethereum.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

ReP2P Matrix: Decentralized Relays to Improve Reliability and Performance of Peer-to-Peer Matrix.
Proceedings of the ACM Conext-2024 Workshop on the Decentralization of the Internet, 2024

2023
How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots.
CoRR, 2023

Towards a Formal Verification of the Lightning Network with TLA+.
CoRR, 2023

Let It TEE: Asynchronous Byzantine Atomic Broadcast with n≥2f+1.
CoRR, 2023

On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types (Extended Version).
CoRR, 2023

Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1.
Proceedings of the 37th International Symposium on Distributed Computing, 2023

Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract.
Proceedings of the 24th International Middleware Conference Demos, 2023

On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types.
Proceedings of the 10th Workshop on Principles and Practice of Consistency for Distributed Data, 2023

2022
Decentralized Review and Attestation of Software Attribute Claims.
IEEE Access, 2022

Grasping the Concept of Decentralized Systems for Instant Messaging.
Proceedings of the WiPSCE '22: The 17th Workshop in Primary and Secondary Computing Education, Morschach, Switzerland, 31 October 2022, 2022

On CRDTs in Byzantine Environments.
Proceedings of the Sicherheit, 2022

BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Verifying Payment Channels with TLA<sup>+</sup>.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

On the Peer Degree Distribution of the Bitcoin P2P Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
On Conflict-Free Replicated Data Types and Equivocation in Byzantine Setups.
CoRR, 2021

Advancing Protocol Diversity in Network Security Monitoring.
CoRR, 2021

On the Estimation of the Number of Unreachable Peers in the Bitcoin P2P Network by Observation of Peer Announcements.
CoRR, 2021

Analysis of the Matrix Event Graph Replicated Data Type.
IEEE Access, 2021

Coupling Smart Contracts: A Comparative Case Study.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

ETHTID: Deployable Threshold Information Disclosure on Ethereum.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
Fundamental Properties of the Layer Below a Payment Channel Network (Extended Version).
CoRR, 2020

Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Practical Trade-Offs in Integrity Protection for Binaries via Ethereum.
Proceedings of the Middleware '20 Demos and Posters: Proceedings of the 21st International Middleware Conference Demos and Posters, 2020

Fundamental Properties of the Layer Below a Payment Channel Network.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A Glimpse of the Matrix (Extended Version): Scalability Issues of a New Message-Oriented Data Synchronization Middleware.
CoRR, 2019

Network Layer Aspects of Permissionless Blockchains.
IEEE Commun. Surv. Tutorials, 2019

Access Control for Binary Integrity Protection using Ethereum.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

A Glimpse of the Matrix: Scalability issues of a new message-oriented data synchronization middleware.
Proceedings of the 20th International Middleware Conference Demos and Posters, 2019

Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2019

TEE-Based Distributed Watchtowers for Fraud Protection in the Lightning Network.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

2018
PATCONFDB: Design and Evaluation of Access Pattern Confidentiality-Preserving Indexes.
Trans. Data Priv., 2018

Enabling Cross-Event Optimization in Discrete-Event Simulation Through Compile-Time Event Batching.
CoRR, 2018

Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2018

Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Towards Application of Cuckoo Filters in Network Security Monitoring.
Proceedings of the 14th International Conference on Network and Service Management, 2018

2017
Could Network Information Facilitate Address Clustering in Bitcoin?
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Designing fail-safe and traffic efficient 802.11p-based rear-end collision avoidance.
Ad Hoc Networks, 2016

Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Value sensitive design of Internet-based services: towards an integration of technology and values.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

Access Pattern Confidentiality-Preserving Relational Databases: Deployment Concept and Efficiency Evaluation.
Proceedings of the Workshops of the EDBT/ICDT 2016 Joint Conference, 2016

Decentralized Secure Data Sharing with Attribute-Based Encryption: A Resource Consumption Analysis.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Confidential database-as-a-service approaches: taxonomy and survey.
J. Cloud Comput., 2015

On the Resource Consumption of Secure Data Sharing.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Model-Based Concurrency Analysis of Network Simulations.
Proceedings of the 3rd ACM Conference on SIGSIM-Principles of Advanced Discrete Simulation, London, United Kingdom, June 10, 2015

A simulation model for analysis of attacks on the Bitcoin peer-to-peer network.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Bewertungskriterien und ihre Anwendung zur Evaluation und Entwicklung sicherer Sync \& Share-Dienste.
Proceedings of the 8. DFN-Forum Kommunikationstechnologien, 2015

2014
bwIDM - Federated Access to IT-Based Services at the Universities of the State of Baden-Württemberg.
Prax. Inf.verarb. Kommun., 2014

SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service.
Prax. Inf.verarb. Kommun., 2014

Inter-vehicle communication: Quo vadis.
IEEE Commun. Mag., 2014

Exploiting the parallelism of large-scale application-layer networks by adaptive GPU-based simulation.
Proceedings of the 2014 Winter Simulation Conference, 2014

Understanding differences in MAC performance.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Parallelism potentials in distributed simulations of Kademlia-based peer-to-peer networks.
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, 2014

Appropriate selection of urban vehicle-to-vehicle radio propagation models.
Proceedings of the 21st IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2014

Self-optimization of DHT lookups through run-time performance analysis.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

Index Optimization for L-Diversified Database-as-a-Service.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

From implicit to explicit knowledge: a tool for preserving and sharing mental links in science.
Proceedings of the Computer Supported Cooperative Work, 2014

Spoilt for choice: graph-based assessment of key management protocols to share encrypted data.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Special Section on Vehicular Networks and Communication Systems: From Laboratory into Reality.
IEEE Trans. Veh. Technol., 2013

Aktuelle Umsetzungskonzepte der Universitäten des Landes Baden-Württemberg für Hochleistungsrechnen und datenintensive Dienste.
Prax. Inf.verarb. Kommun., 2013

Inter-Vehicular Communication - Quo Vadis (Dagstuhl Seminar 13392).
Dagstuhl Reports, 2013

Search result presentation: supporting post-search navigation by integration of taxonomy data.
Proceedings of the 22nd International World Wide Web Conference, 2013

Balancing the requirements for a zero false positive/negative Forward Collision Warning.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

GRABEX: A Graph-Based Method for Web Site Block Classification and Its Application on Mining Breadcrumb Trails.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Verification and evaluation of fail-safe Virtual Traffic Light applications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

In-depth analysis and evaluation of Self-organizing TDMA.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

Federating HPC Access via SAML: Towards a Plug-and-Play Solution.
Proceedings of the Supercomputing - 28th International Supercomputing Conference, 2013

User-centric management of distributed credential repositories: balancing availability and vulnerability.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Towards performance evaluation of conservative distributed discrete-event network simulations using second-order simulation.
Proceedings of the SIGSIM Principles of Advanced Discrete Simulation, 2013

Joint power/rate congestion control optimizing packet reception in vehicle safety communications.
Proceedings of the Proceeding of the tenth ACM international workshop on Vehicular inter-networking, 2013

OCCASIO: An operable concept for confidential and secure identity outsourcing.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Mining Taxonomies from Web Menus: Rule-Based Concepts and Algorithms.
Proceedings of the Web Engineering - 13th International Conference, 2013

Schlüsselverwaltung für sichere Gruppeninteraktionen über beliebigen Speicheranbietern: ein Überblick.
Proceedings of the 6. DFN-Forum Kommunikationstechnologien, 2013

Do online social network friends still threaten my privacy?
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Characterization and modeling of dissemination delays in inter-vehicle communication networks.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Can V2X communication help electric vehicles save energy?
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

Is CSMA able to coordinate multiple access in vehicular radio channels effectively?
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Contextual Communications Congestion Control for Cooperative Vehicular Networks.
IEEE Trans. Wirel. Commun., 2011

Congestion and Awareness Control in Cooperative Vehicular Systems.
Proc. IEEE, 2011

Enabling Accurate Cross-Layer PHY/MAC/NET Simulation Studies of Vehicular Communication Networks.
Proc. IEEE, 2011

5.9 GHz inter-vehicle communication at intersections: a validated non-line-of-sight path-loss and fading model.
EURASIP J. Wirel. Commun. Netw., 2011

Design methodology and evaluation of rate adaptation based congestion control for Vehicle Safety Communications.
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

5.9GHz IEEE 802.11p inter-vehicle communication: Non-Line-of-Sight reception under competition.
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

Real-World Measurements of Non-Line-Of-Sight Reception Quality for 5.9GHz IEEE 802.11p at Intersections.
Proceedings of the Communication Technologies for Vehicles - Third International Workshop, 2011

A change in perspective: information-centric modeling of inter-vehicle communication.
Proceedings of the Eighth International Workshop on Vehicular Ad Hoc Networks, 2011

GPU-Based Architectures and Their Benefit for Accurate and Efficient Wireless Network Simulations.
Proceedings of the MASCOTS 2011, 2011

An analysis of data traffic in cellular networks caused by inter-vehicle communication at intersections.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

Extension for information card systems to achieve User-Controlled Automated Identity Delegation.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Towards a Basic DHT Service: Analyzing Network Characteristics of a Widely Deployed DHT.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

How I and others can link my various social network profiles as a basis to reveal my virtual appearance.
Proceedings of the 4. DFN-Forum Kommunikationstechnologien, 2011

Benutzerzentrierung und Föderation: Wie kann ein Benutzer die Kontrolle über seine Identitätsdaten bewahren?
Proceedings of the 4. DFN-Forum Kommunikationstechnologien, 2011

Accurate Simulation of Wireless Vehicular Networks Based on Ray Tracing and Physical Layer Simulation.
Proceedings of the High Performance Computing in Science and Engineering '11, 2011

2010
Vehicular Traffic Flow Theory: Three, Not Two Phases [review of "Introduction to Modern Traffic Flow Theory and Control: The Long Road to Three-Phase Traffic Theory; Kerner, B.S.; 2009) ].
IEEE Veh. Technol. Mag., 2010

Leistungsbewertung der Cloud-Plattform Apache Hadoop am Anwendungsbeispiel verteilter Simulationen.
Prax. Inf.verarb. Kommun., 2010

Vehicular Communications: Ubiquitous Networks for Sustainable Mobility [Point of View].
Proc. IEEE, 2010

Application-Based Congestion Control Policy for the Communication Channel in VANETs.
IEEE Commun. Lett., 2010

Assessing identity and access management systems based on domain-specific performance evaluation.
Proceedings of the first joint WOSP/SIPEW International Conference on Performance Engineering, 2010

Bridging the Gap between Physical Layer Emulation and Network Simulation.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

DEMO: Simulation-as-a-Service for ITS Applications.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

A comparison of UMTS and LTE for vehicular safety communication at intersections.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

Ensuring reproducibility through tool-based simulation process management.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

BitMON: A Tool for Automated Monitoring of the BitTorrent DHT.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Simulation-based capacity estimates for local broadcast transmissions.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

The impact of traffic-light-to-vehicle communication on fuel consumption and emissions.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems.
Proceedings of IEEE International Conference on Communications, 2010

10402 Report - Working Group on Fundamental Limits and Opportunities.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

A Consistency Model for Identity Information in Distributed Systems.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

User-Controlled Automated Identity Delegation.
Proceedings of the 6th International Conference on Network and Service Management, 2010

FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management.
Proceedings of the ARES 2010, 2010

MAC Layer and Scalability Aspects of Vehicular Communication Networks.
Proceedings of the VANET: Vehicular Applications and Inter-Networking Technologies, 2010

2009
Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety-Critical Information.
IEEE Trans. Veh. Technol., 2009

Federated Identity Management as a Basis for Integrated Information Management (Föderiertes Identitätsmanagement als Fundament eines Integrierten Informationsmanagements).
it Inf. Technol., 2009

An Empirical Model for Probability of Packet Reception in Vehicular Ad Hoc Networks.
EURASIP J. Wirel. Commun. Netw., 2009

Overcoming a Communication Barrier on the Way Towards a Global Sensor Network.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

A comparison of single- and multi-hop beaconing in VANETs.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Performance Evaluation of Identity and Access Management Systems in Federated Environments.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

2008
Traffic Telematics (Verkehrstelematik).
it Inf. Technol., 2008

A tutorial survey on vehicular ad hoc networks.
IEEE Commun. Mag., 2008

Visualizing and Understanding Spatio-Temporal Correlations of Data Dissemination in Vehicular Environments.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Introducing probabilistic radio propagation models in OMNeT++ mobility framework and cross validation check with NS-2.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

Towards Systematic Engineering of Service-Oriented Access Control in Federated Environments.
Proceedings of the 2008 IEEE World Congress on Services, 2008

Enabling traffic safety assessment of VANETs by means of accident simulations.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Analysis and design of effective and low-overhead transmission power control for VANETs.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

2007
Foreword.
IEEE Veh. Technol. Mag., 2007

Föderatives und dienstorientiertes Identitätsmanagement: Konzept und Erfahrungen.
Prax. Inf.verarb. Kommun., 2007

Vehicular Ad Hoc Networks: How to Show the Impact on Traffic Safety?
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Overhaul of ieee 802.11 modeling and simulation in ns-2.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Enabling efficient and accurate large-scale simulations of VANETs for vehicular traffic management.
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007

2006
Studying vehicle movements on highways and their impact on ad-hoc connectivity.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2006

Effects of a realistic channel model on packet forwarding in vehicular ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Distributed Fair Transmit Power Adjustment for Vehicular Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

IEEE 802.11-based one-hop broadcast communications: understanding transmission success and failure under different radio propagation environments.
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006

Dienstorientiertes Identitätsmanagement für eine Pervasive University.
Proceedings of the 36. Jahrestagung der Gesellschaft für Informatik, 2006

Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration.
Proceedings of the The First International Conference on Availability, 2006

2005
Geographic routing in city scenarios.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Guest editorial.
Eur. Trans. Telecommun., 2005

On the Challenge of Assessing Overlay Topology Adaptation Mechanisms.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

A Peer-to-Peer Framework for Electronic Markets.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Fair sharing of bandwidth in VANETs.
Proceedings of the Second International Workshop on Vehicular Ad Hoc Networks, 2005

Combining Service-Orientation and Peer-to-Peer Networks.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2005

2004
Definitions of Managed Objects for RObust Header Compression (ROHC).
RFC, June, 2004

Stochastic Properties of the Random Waypoint Mobility Model.
Wirel. Networks, 2004

Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004

The Impact of Wireless Radio Fluctuations on Ad Hoc Network Performance.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Der Einfluss von Schwankungen der Übertragungsreichweite auf die Leistungsfähigkeit von Ad-Hoc Netzwerken.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004

2003
Toward a mobility metric for comparable & reproducible results in ad hoc networks research.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

MobiCom poster: location-based routing for vehicular ad-hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

A performance comparison of Mobile IPv6, Hierarchical Mobile IPv6, fast handovers for Mobile IPv6 and their combination.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Ad-Hoc-Netzwerke: Netze für den Augenblick?
Prax. Inf.verarb. Kommun., 2003

Contention-based forwarding for mobile ad hoc networks.
Ad Hoc Networks, 2003

Simulation Results and a Proof-of-Concept Implementation of the FleetNet Position-Based Router: Extended Abstract.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

2002
Positionsbasiertes Routing für die Kommunikation zwischen Fahrzeugen (Position-Based Routing for Inter-Vehicle Communication).
Informationstechnik Tech. Inform., 2002

A simulation study on the performance of Mobile IPv6 in a WLAN-based cellular network.
Comput. Networks, 2002

Analysis of a Location Service for Position-Based Routing in Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-Hoc Netzwerke, 2002

Stochastic properties of the random waypoint mobility model: epoch length, direction distribution, and cell change rate.
Proceedings of the 5th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2002

A Robust Header Compression Simulator & Visualizer.
Proceedings of the Trends in Network and Pervasive Computing, 2002

2001
A survey on position-based routing in mobile ad hoc networks.
IEEE Netw., 2001

Scalable Anonymous Connections in the Context of MIP and AAA.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Position-aware ad hoc wireless networks for inter-vehicle communications: the Fleetnet project.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

High Quality Mobile Communication.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2001

Internet on the Road via Inter-Vehicle Communications.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
Region-based fractal image compression.
IEEE Trans. Image Process., 2000

Lossless acceleration of fractal image encoding via the fast Fourier transform.
Signal Process. Image Commun., 2000

Local iterative improvement of fractal image codes.
Image Vis. Comput., 2000

1999
A Video Codec Based on R/D-Optimized Adaptive Vector Quantization.
Proceedings of the Data Compression Conference, 1999

1998
Topics in fractal image compression and near lossless image coding.
PhD thesis, 1998

On entropy minimization for near-lossless differential coding.
IEEE Commun. Lett., 1998

Cost-based region growing for fractal image compression.
Proceedings of the 9th European Signal Processing Conference, 1998

Analysis of Trellis Quantization for Near-Lossless Image Coding.
Proceedings of the Data Compression Conference, 1998

1997
Adaptive Partitionings for Fractal Image Compression.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

VQ-encoding of luminance parameters in fractal coding schemes.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

Optimal Fractal Coding is NP-Hard.
Proceedings of the 7th Data Compression Conference (DCC '97), 1997

1996
Lossless acceleration of fractal image compression by fast convolution.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996


  Loading...