Search For:

Displaying 1-6 out of 6 total
A Cloud design for user-controlled storage and processing of sensor data
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Rene Hummen,Martin Henze,Daniel Catrein,Klaus Wehrle
Issue Date:December 2012
pp. 232-240
Ubiquitous sensing environments such as sensor networks collect large amounts of data. This data volume is destined to grow even further with the vision of the Internet of Things. Cloud computing promises to elastically store and process such sensor data. ...
M2ICAL: A Tool for Analyzing Imperfect Comparison Algorithms
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Wee-Chong Oon, Martin Henz
Issue Date:October 2007
pp. 28-35
Practical optimization problems often have objective func- tions that cannot be easily calculated. As a result, comparison-based algorithms that solve such problems use comparison functions that are imperfect (i.e. they may make errors). Machine learning a...
A Software Engineering Approach to Constraint Programming Systems
Found in: Asia-Pacific Software Engineering Conference
By Ka Boon Kevin Ng, Chiu Wo Choi, Martin Henz
Issue Date:December 2002
pp. 167
Constraint programming (CP) systems are useful for solving real-life combinatorial problems, such as scheduling, planning, rostering and routing problems. The design of modern CP systems has evolved from a monolithic to an open design in order to meet the ...
COMPOzE---Intention-based Music Composition through Constraint Programming
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Martin Henz, Stefan Lauer, Detlev Zimmermann
Issue Date:November 1996
pp. 118
The goal of this work is to derive four-voice music pieces from given musical plans, which describe the harmonic flow and the intentions of a desired composition. We developed the experimentation platform COMPOzE for intention-based composition. COMPOzE is...
Slimfit — A HIP DEX compression layer for the IP-based Internet of Things
Found in: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
By Rene Hummen,Jens Hiller,Martin Henze,Klaus Wehrle
Issue Date:October 2013
pp. 259-266
The HIP Diet EXchange (DEX) is an end-to-end security protocol designed for constrained network environments in the IP-based Internet of Things (IoT). It is a variant of the IETF-standardized Host Identity Protocol (HIP) with a refined protocol design that...
The Cloud Needs Cross-Layer Data Handling Annotations
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Martin Henze,Rene Hummen,Klaus Wehrle
Issue Date:May 2013
pp. 18-22
Nowadays, an ever-increasing number of service providers takes advantage of the cloud computing paradigm in order to efficiently offer services to private users, businesses, and governments. However, while cloud computing allows to transparently scale back...