The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Horst Wedde: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Horst Wedde, Muddassar Farooq, Yue Zhang
    BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior. [Citation Graph (0, 0)][DBLP]
    ANTS Workshop, 2004, pp:83-94 [Conf]
  2. Wolfgang A. Halang, K. H. Kim, Kinji Mori, Ulrich Schmid, Horst Wedde
    Real-Time Systems - Panel Overview. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1998, pp:338-343 [Conf]
  3. Horst Wedde, Jens-Oliver P. Siepmann
    A Universal Framework for Managing Metadata in the Distributed Dragon Slayer System. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2000, pp:2096-2101 [Conf]
  4. Horst Wedde, Muddassar Farooq
    A Performance Evaluation Framework for Nature Inspired Routing Algorithms. [Citation Graph (0, 0)][DBLP]
    EvoWorkshops, 2005, pp:136-146 [Conf]
  5. Horst Wedde, Constantin Timm, Muddassar Farooq
    BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms. [Citation Graph (0, 0)][DBLP]
    EvoWorkshops, 2006, pp:243-254 [Conf]
  6. Horst Wedde, Arnim Wedig, Anca Lazarescu, Ralf Paaschen, Elisei Rotaru
    Incremental Modeling Under Large-Scale Distributed Interaction. [Citation Graph (0, 0)][DBLP]
    FORTE, 2005, pp:542-546 [Conf]
  7. Horst Wedde, Muddassar Farooq, Mario Lischka
    An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System. [Citation Graph (0, 0)][DBLP]
    GECCO (2), 2004, pp:1334-1335 [Conf]
  8. Horst Wedde, Muddassar Farooq, Thorsten Pannenbaecker, Bjoern Vogel, Christian Mueller, Johannes Meth, Rene Jeruschkat
    BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. [Citation Graph (0, 0)][DBLP]
    GECCO, 2005, pp:153-160 [Conf]
  9. Horst Wedde
    Lose Kopplung in Informationssystemen. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1973, pp:372-381 [Conf]
  10. Ghasem S. Alijani, Horst Wedde
    A Three-Phase Task Scheduling Scheme in a Hard Real-Time Distributed Environment. [Citation Graph (0, 0)][DBLP]
    Great Lakes Computer Science Conference, 1989, pp:336-342 [Conf]
  11. Horst Wedde, Muddassar Farooq
    Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2005, pp:938-943 [Conf]
  12. Horst Wedde, Muddassar Farooq, Mario Lischka
    A User Centered Evolutionary Scheduling Framework. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2004, pp:1126-1132 [Conf]
  13. Ghasem S. Alijani, Horst Wedde
    Enhanced Reliability in Scheduling Critical Tasks for Hard Real-Time Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:547-558 [Conf]
  14. Horst Wedde, Douglas C. Daniels, Dorota M. Huizinga
    Efficient Distributed Resource Scheduling for Adaptive Real-Time Operation Support. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:610-627 [Conf]
  15. Horst Wedde
    A Formal Basis for Correct Implementations of Distributed Programming Languages. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1985, pp:476-485 [Conf]
  16. Horst Wedde, Bogdan Korel, Dorota M. Huizinga
    Formal Analysis of Waiting Times for Distributed Real-time Processes. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1992, pp:478-485 [Conf]
  17. Jesse Fang, Yarsun Hsu, Shing-Tsaan Huang, Jie-Yong Juang, W. H. Tsai, Horst Wedde
    Are We Providing the Right Education for Computer Science/Engineering Students? [Citation Graph (0, 0)][DBLP]
    ICPADS, 1994, pp:14-15 [Conf]
  18. Horst Wedde, Jon A. Lind, A. Eiss
    Achieving Dependability in Mission-Critical Operating Systems Through Adaptability and Large-Scale Functional Integration. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1994, pp:655-661 [Conf]
  19. Carl Friedlander, Horst Wedde
    Distributed Processing Under the Dragon Slayer Operating System. [Citation Graph (0, 0)][DBLP]
    ICPP, 1986, pp:250-257 [Conf]
  20. Horst Wedde, Frank Thorsten Breuer, Muddassar Farooq
    A Role-Based Adaptive CSCL Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints. [Citation Graph (0, 0)][DBLP]
    SECIII, 2002, pp:241-250 [Conf]
  21. Horst Wedde, Jon A. Lind
    Novel Principles for Developing and Evaluating Distributed Safety-Critical Systems. [Citation Graph (0, 0)][DBLP]
    ISADS, 1999, pp:392-0 [Conf]
  22. Horst Wedde, Sabine Böhm, Wolfgang Freund
    Concurrent Read/Write: Real-Time Theory and Practice. [Citation Graph (0, 0)][DBLP]
    ISORC, 2001, pp:201-208 [Conf]
  23. Norbert Kraft, Horst Wedde
    Inducing Patterns of Behaviour in Distributed System Parts. [Citation Graph (0, 0)][DBLP]
    MFCS, 1980, pp:375-386 [Conf]
  24. Kurt Lautenbach, Horst Wedde
    Generating Control Mechanisms by Restrictions. [Citation Graph (0, 0)][DBLP]
    MFCS, 1976, pp:416-422 [Conf]
  25. Michael Schiffers, Horst Wedde
    Analyzing Program Solutions of Coordination problems by CP-Nets. [Citation Graph (0, 0)][DBLP]
    MFCS, 1978, pp:462-473 [Conf]
  26. Horst Wedde
    A Starvation-Free Solution of the Dining Philosopher's Problem by Use of Interaction Systems. [Citation Graph (0, 0)][DBLP]
    MFCS, 1981, pp:534-543 [Conf]
  27. Horst Wedde, Józef Winkowski
    Determining Processes by Violations. [Citation Graph (0, 0)][DBLP]
    MFCS, 1977, pp:549-559 [Conf]
  28. Andrea Maggiolo-Schettini, Horst Wedde, Józef Winkowski
    Modelling a Solution for a Control Problem in Distributed Systems by Restrictions. [Citation Graph (0, 0)][DBLP]
    Formale Modelle für Informationssysteme, 1979, pp:199-201 [Conf]
  29. Horst Wedde
    Innovative Conceptual Perspectives for Adequately Modeling Complex Real Systems. [Citation Graph (0, 0)][DBLP]
    International Working Conference on Model Realism, 1982, pp:1-3 [Conf]
  30. Horst Wedde
    Comments on H.-D. Schulz/B. Schinzel. [Citation Graph (0, 0)][DBLP]
    International Working Conference on Model Realism, 1982, pp:244-245 [Conf]
  31. Horst Wedde, Constantin Timm, Muddassar Farooq
    BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems. [Citation Graph (0, 0)][DBLP]
    PPSN, 2006, pp:623-632 [Conf]
  32. Douglas C. Daniels, Horst Wedde
    Real-Time Performance of a Completely Distributed Operating System. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1986, pp:157-163 [Conf]
  33. Horst Wedde, Ghasem S. Alijani, D. Baran, Gookhai Kang, Bo-Kyung Kim
    Real-Time File Performance of a Completely Decentralized Adaptive File System. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1989, pp:340-347 [Conf]
  34. Horst Wedde, Ghasem S. Alijani, Gookhai Kang, Bo-Kyung Kim
    MELODY: A Distributed Real-Time Testbed for Adaptive Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1988, pp:112-119 [Conf]
  35. Horst Wedde, Peter H. L. Tjoie
    Long-Term Reconfiguration of Double-Ring Networks under Real-Time Constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1987, pp:104-111 [Conf]
  36. Horst Wedde, Mario Lischka
    Modular authorization. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:97-105 [Conf]
  37. Horst Wedde, Mario Lischka
    Cooperative role-based administration. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:21-32 [Conf]
  38. Horst Wedde, Mario Lischka
    Role-based access control in ambient and remote space. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:21-30 [Conf]
  39. Andrea Maggiolo-Schettini, Horst Wedde, Józef Winkowski
    Modeling a Solution for a Control Problem in Distributed Systems by Restrictions. [Citation Graph (0, 0)][DBLP]
    Semantics of Concurrent Computation, 1979, pp:226-248 [Conf]
  40. Bogdan Korel, Horst Wedde, Srinivas Magaraj, Kalique Nawaz, Venugopal Dayana
    Version Management in Distributed Network Environment. [Citation Graph (0, 0)][DBLP]
    SCM, 1991, pp:161-166 [Conf]
  41. Horst Wedde, Arnim Wedig
    Explicit Modeling of Influences, and of Their Absence, in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    TACAS, 2002, pp:127-141 [Conf]
  42. Horst Wedde
    A Graph-Theoretic Approach for Designing Fair Distributed Resource Scheduling Algorithms. [Citation Graph (0, 0)][DBLP]
    WG, 1986, pp:204-226 [Conf]
  43. Horst Wedde, Douglas C. Daniels
    Graph-Theoretical Tools and their Use in a Practical Distributed Operating System Design Case. [Citation Graph (0, 0)][DBLP]
    WG, 1987, pp:186-205 [Conf]
  44. Horst Wedde, Sabine Böhm, Wolfgang Freund
    Adaptive Protocols For Survivability Of Transactions Operating On Replicated Objects. [Citation Graph (0, 0)][DBLP]
    WORDS, 2001, pp:169-178 [Conf]
  45. Horst Wedde, Muddassar Farooq
    BeeHive: Routing Algorithms Inspired by Honey Bee Behavior. [Citation Graph (0, 0)][DBLP]
    KI, 2005, v:19, n:4, pp:18-24 [Journal]
  46. Horst Wedde
    Critical Issues in Object-Oriented Real-Time Systems - A Guided Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2000, v:18, n:1, pp:69-70 [Journal]
  47. Horst Wedde
    Can Formal Methods be Integrated into Real-Time Object-Oriented Design? Response to J. de la Puente's Contribution. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2000, v:18, n:1, pp:85-87 [Journal]
  48. Horst Wedde, Ghasem S. Alijani, Dorota M. Huizinga, Gookhai Kang, Bo-Kyung Kim
    MELODY: A Completely Decentralized Adaptive File System for Handling Real-Time Tasks in Unpredictable Environments. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1990, v:2, n:4, pp:347-364 [Journal]
  49. Horst Wedde, Bogdan Korel, Dorota M. Huizinga
    Formal Timing Analysis for Distributed Real-Time Programs. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1994, v:7, n:1, pp:57-90 [Journal]
  50. Horst Wedde, Jon A. Lind
    Building Large, Complex, Distributed Safety-Critical Operating Systems. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1997, v:13, n:3, pp:277-302 [Journal]
  51. Horst Wedde, Ghasem S. Alijani, Willie G. Brown, Shengdong Chen, Gookhai Kang, Bo-Kyung Kim
    Operating System Support for Adaptive Distributed Real-Time Systems in DRAGON SLAYER. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1989, v:23, n:3, pp:126-140 [Journal]
  52. Andrea Maggiolo-Schettini, Horst Wedde, Józef Winkowski
    Modeling a Solution for a Control Problem in Distributed Systems by Restrictions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1981, v:13, n:, pp:61-83 [Journal]
  53. Horst Wedde
    An Iterative and Starvation-Free Solution for a General Class of Distributed Control Problems Based on Interaction Primitives. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1983, v:24, n:, pp:1-20 [Journal]
  54. Horst Wedde, Mario Lischka
    Modular authorization and administration. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:363-391 [Journal]

  55. Electric Power Management and a Clean Environment - a Discrepancy and an Algorithmic Challenge. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002