Search the dblp DataBase
Horst Wedde :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Horst Wedde , Muddassar Farooq , Yue Zhang BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior. [Citation Graph (0, 0)][DBLP ] ANTS Workshop, 2004, pp:83-94 [Conf ] Wolfgang A. Halang , K. H. Kim , Kinji Mori , Ulrich Schmid , Horst Wedde Real-Time Systems - Panel Overview. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1998, pp:338-343 [Conf ] Horst Wedde , Jens-Oliver P. Siepmann A Universal Framework for Managing Metadata in the Distributed Dragon Slayer System. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 2000, pp:2096-2101 [Conf ] Horst Wedde , Muddassar Farooq A Performance Evaluation Framework for Nature Inspired Routing Algorithms. [Citation Graph (0, 0)][DBLP ] EvoWorkshops, 2005, pp:136-146 [Conf ] Horst Wedde , Constantin Timm , Muddassar Farooq BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms. [Citation Graph (0, 0)][DBLP ] EvoWorkshops, 2006, pp:243-254 [Conf ] Horst Wedde , Arnim Wedig , Anca Lazarescu , Ralf Paaschen , Elisei Rotaru Incremental Modeling Under Large-Scale Distributed Interaction. [Citation Graph (0, 0)][DBLP ] FORTE, 2005, pp:542-546 [Conf ] Horst Wedde , Muddassar Farooq , Mario Lischka An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System. [Citation Graph (0, 0)][DBLP ] GECCO (2), 2004, pp:1334-1335 [Conf ] Horst Wedde , Muddassar Farooq , Thorsten Pannenbaecker , Bjoern Vogel , Christian Mueller , Johannes Meth , Rene Jeruschkat BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. [Citation Graph (0, 0)][DBLP ] GECCO, 2005, pp:153-160 [Conf ] Horst Wedde Lose Kopplung in Informationssystemen. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1973, pp:372-381 [Conf ] Ghasem S. Alijani , Horst Wedde A Three-Phase Task Scheduling Scheme in a Hard Real-Time Distributed Environment. [Citation Graph (0, 0)][DBLP ] Great Lakes Computer Science Conference, 1989, pp:336-342 [Conf ] Horst Wedde , Muddassar Farooq Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems. [Citation Graph (0, 0)][DBLP ] IC-AI, 2005, pp:938-943 [Conf ] Horst Wedde , Muddassar Farooq , Mario Lischka A User Centered Evolutionary Scheduling Framework. [Citation Graph (0, 0)][DBLP ] IC-AI, 2004, pp:1126-1132 [Conf ] Ghasem S. Alijani , Horst Wedde Enhanced Reliability in Scheduling Critical Tasks for Hard Real-Time Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICCI, 1991, pp:547-558 [Conf ] Horst Wedde , Douglas C. Daniels , Dorota M. Huizinga Efficient Distributed Resource Scheduling for Adaptive Real-Time Operation Support. [Citation Graph (0, 0)][DBLP ] ICCI, 1991, pp:610-627 [Conf ] Horst Wedde A Formal Basis for Correct Implementations of Distributed Programming Languages. [Citation Graph (0, 0)][DBLP ] ICDCS, 1985, pp:476-485 [Conf ] Horst Wedde , Bogdan Korel , Dorota M. Huizinga Formal Analysis of Waiting Times for Distributed Real-time Processes. [Citation Graph (0, 0)][DBLP ] ICDCS, 1992, pp:478-485 [Conf ] Jesse Fang , Yarsun Hsu , Shing-Tsaan Huang , Jie-Yong Juang , W. H. Tsai , Horst Wedde Are We Providing the Right Education for Computer Science/Engineering Students? [Citation Graph (0, 0)][DBLP ] ICPADS, 1994, pp:14-15 [Conf ] Horst Wedde , Jon A. Lind , A. Eiss Achieving Dependability in Mission-Critical Operating Systems Through Adaptability and Large-Scale Functional Integration. [Citation Graph (0, 0)][DBLP ] ICPADS, 1994, pp:655-661 [Conf ] Carl Friedlander , Horst Wedde Distributed Processing Under the Dragon Slayer Operating System. [Citation Graph (0, 0)][DBLP ] ICPP, 1986, pp:250-257 [Conf ] Horst Wedde , Frank Thorsten Breuer , Muddassar Farooq A Role-Based Adaptive CSCL Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints. [Citation Graph (0, 0)][DBLP ] SECIII, 2002, pp:241-250 [Conf ] Horst Wedde , Jon A. Lind Novel Principles for Developing and Evaluating Distributed Safety-Critical Systems. [Citation Graph (0, 0)][DBLP ] ISADS, 1999, pp:392-0 [Conf ] Horst Wedde , Sabine Böhm , Wolfgang Freund Concurrent Read/Write: Real-Time Theory and Practice. [Citation Graph (0, 0)][DBLP ] ISORC, 2001, pp:201-208 [Conf ] Norbert Kraft , Horst Wedde Inducing Patterns of Behaviour in Distributed System Parts. [Citation Graph (0, 0)][DBLP ] MFCS, 1980, pp:375-386 [Conf ] Kurt Lautenbach , Horst Wedde Generating Control Mechanisms by Restrictions. [Citation Graph (0, 0)][DBLP ] MFCS, 1976, pp:416-422 [Conf ] Michael Schiffers , Horst Wedde Analyzing Program Solutions of Coordination problems by CP-Nets. [Citation Graph (0, 0)][DBLP ] MFCS, 1978, pp:462-473 [Conf ] Horst Wedde A Starvation-Free Solution of the Dining Philosopher's Problem by Use of Interaction Systems. [Citation Graph (0, 0)][DBLP ] MFCS, 1981, pp:534-543 [Conf ] Horst Wedde , Józef Winkowski Determining Processes by Violations. [Citation Graph (0, 0)][DBLP ] MFCS, 1977, pp:549-559 [Conf ] Andrea Maggiolo-Schettini , Horst Wedde , Józef Winkowski Modelling a Solution for a Control Problem in Distributed Systems by Restrictions. [Citation Graph (0, 0)][DBLP ] Formale Modelle für Informationssysteme, 1979, pp:199-201 [Conf ] Horst Wedde Innovative Conceptual Perspectives for Adequately Modeling Complex Real Systems. [Citation Graph (0, 0)][DBLP ] International Working Conference on Model Realism, 1982, pp:1-3 [Conf ] Horst Wedde Comments on H.-D. Schulz/B. Schinzel. [Citation Graph (0, 0)][DBLP ] International Working Conference on Model Realism, 1982, pp:244-245 [Conf ] Horst Wedde , Constantin Timm , Muddassar Farooq BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems. [Citation Graph (0, 0)][DBLP ] PPSN, 2006, pp:623-632 [Conf ] Douglas C. Daniels , Horst Wedde Real-Time Performance of a Completely Distributed Operating System. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1986, pp:157-163 [Conf ] Horst Wedde , Ghasem S. Alijani , D. Baran , Gookhai Kang , Bo-Kyung Kim Real-Time File Performance of a Completely Decentralized Adaptive File System. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1989, pp:340-347 [Conf ] Horst Wedde , Ghasem S. Alijani , Gookhai Kang , Bo-Kyung Kim MELODY: A Distributed Real-Time Testbed for Adaptive Systems. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1988, pp:112-119 [Conf ] Horst Wedde , Peter H. L. Tjoie Long-Term Reconfiguration of Double-Ring Networks under Real-Time Constraints. [Citation Graph (0, 0)][DBLP ] IEEE Real-Time Systems Symposium, 1987, pp:104-111 [Conf ] Horst Wedde , Mario Lischka Modular authorization. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:97-105 [Conf ] Horst Wedde , Mario Lischka Cooperative role-based administration. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:21-32 [Conf ] Horst Wedde , Mario Lischka Role-based access control in ambient and remote space. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:21-30 [Conf ] Andrea Maggiolo-Schettini , Horst Wedde , Józef Winkowski Modeling a Solution for a Control Problem in Distributed Systems by Restrictions. [Citation Graph (0, 0)][DBLP ] Semantics of Concurrent Computation, 1979, pp:226-248 [Conf ] Bogdan Korel , Horst Wedde , Srinivas Magaraj , Kalique Nawaz , Venugopal Dayana Version Management in Distributed Network Environment. [Citation Graph (0, 0)][DBLP ] SCM, 1991, pp:161-166 [Conf ] Horst Wedde , Arnim Wedig Explicit Modeling of Influences, and of Their Absence, in Distributed Systems. [Citation Graph (0, 0)][DBLP ] TACAS, 2002, pp:127-141 [Conf ] Horst Wedde A Graph-Theoretic Approach for Designing Fair Distributed Resource Scheduling Algorithms. [Citation Graph (0, 0)][DBLP ] WG, 1986, pp:204-226 [Conf ] Horst Wedde , Douglas C. Daniels Graph-Theoretical Tools and their Use in a Practical Distributed Operating System Design Case. [Citation Graph (0, 0)][DBLP ] WG, 1987, pp:186-205 [Conf ] Horst Wedde , Sabine Böhm , Wolfgang Freund Adaptive Protocols For Survivability Of Transactions Operating On Replicated Objects. [Citation Graph (0, 0)][DBLP ] WORDS, 2001, pp:169-178 [Conf ] Horst Wedde , Muddassar Farooq BeeHive: Routing Algorithms Inspired by Honey Bee Behavior. [Citation Graph (0, 0)][DBLP ] KI, 2005, v:19, n:4, pp:18-24 [Journal ] Horst Wedde Critical Issues in Object-Oriented Real-Time Systems - A Guided Panel Discussion. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 2000, v:18, n:1, pp:69-70 [Journal ] Horst Wedde Can Formal Methods be Integrated into Real-Time Object-Oriented Design? Response to J. de la Puente's Contribution. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 2000, v:18, n:1, pp:85-87 [Journal ] Horst Wedde , Ghasem S. Alijani , Dorota M. Huizinga , Gookhai Kang , Bo-Kyung Kim MELODY: A Completely Decentralized Adaptive File System for Handling Real-Time Tasks in Unpredictable Environments. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1990, v:2, n:4, pp:347-364 [Journal ] Horst Wedde , Bogdan Korel , Dorota M. Huizinga Formal Timing Analysis for Distributed Real-Time Programs. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1994, v:7, n:1, pp:57-90 [Journal ] Horst Wedde , Jon A. Lind Building Large, Complex, Distributed Safety-Critical Operating Systems. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1997, v:13, n:3, pp:277-302 [Journal ] Horst Wedde , Ghasem S. Alijani , Willie G. Brown , Shengdong Chen , Gookhai Kang , Bo-Kyung Kim Operating System Support for Adaptive Distributed Real-Time Systems in DRAGON SLAYER. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1989, v:23, n:3, pp:126-140 [Journal ] Andrea Maggiolo-Schettini , Horst Wedde , Józef Winkowski Modeling a Solution for a Control Problem in Distributed Systems by Restrictions. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1981, v:13, n:, pp:61-83 [Journal ] Horst Wedde An Iterative and Starvation-Free Solution for a General Class of Distributed Control Problems Based on Interaction Primitives. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1983, v:24, n:, pp:1-20 [Journal ] Horst Wedde , Mario Lischka Modular authorization and administration. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:363-391 [Journal ] Electric Power Management and a Clean Environment - a Discrepancy and an Algorithmic Challenge. [Citation Graph (, )][DBLP ] Search in 0.017secs, Finished in 0.019secs