


Остановите войну!
for scientists:


default search action
Michael Stein
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Michael Stein, Michael Leitner, Jill C. Trepanier, Kory Konsoer:
A Dataset of Dropout Rates and Other School-Level Variables in Louisiana Public High Schools. Data 7(4): 48 (2022) - [c28]Ali Tekeoglu
, Chen-Fu Chiang, Saumendra Sengupta, Norman Noor Ahmed, Michael Stein, Dilip Kusukuntla:
Optimized Transaction Processing in Lightweight Distributed Ledger Networks for Internet of Things. ICBC 2022: 117-128 - 2021
- [j12]Ruojun Li, Ganesh Prasanna Balakrishnan, Jiaming Nie, Yu Li, Emmanuel Agu
, Kristin Grimone, Debra Herman, Ana Abrantes, Michael Stein:
Estimation of Blood Alcohol Concentration From Smartphone Gait Data Using Neural Networks. IEEE Access 9: 61237-61255 (2021) - 2020
- [j11]Max Mühlhäuser, Christian Meurisch, Michael Stein, Jörg Daubert, Julius von Willich, Jan Riemann, Lin Wang:
Street lamps as a platform. Commun. ACM 63(6): 75-83 (2020)
2010 – 2019
- 2019
- [j10]Roland Kluge
, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A systematic approach to constructing families of incremental topology control algorithms using graph transformation. Softw. Syst. Model. 18(1): 279-319 (2019) - [c27]Ruojun Li, Ganesh Prasanna Balakrishnan, Jiaming Nie, Yu Li, Emmanuel Agu, Michael Stein, Ana Abrantes, Debra Herman, Kristin Grimone:
On Smartphone Sensability of Bi-Phasic User Intoxication Levels from Diverse Walk Types in Standardized Field Sobriety Tests. EMBC 2019: 3279-3285 - 2018
- [b1]Michael Stein:
Local Algorithms for Distributed Topology Adaptation. Darmstadt University of Technology, Germany, Dr. Hut 2018, ISBN 978-3-8439-3455-8, pp. 1-221 - [c26]Julien Gedeon
, Michael Stein, Jeff Krisztinkovics, Patrick Felka, Katharina Keller, Christian Meurisch, Lin Wang, Max Mühlhäuser:
From Cell Towers to Smart Street Lamps: Placing Cloudlets on Existing Urban Infrastructures. SEC 2018: 187-202 - [c25]Julien Gedeon
, Michael Stein, Lin Wang, Max Mühlhäuser:
On Scalable In-Network Operator Placement for Edge Computing. ICCCN 2018: 1-9 - [c24]Roman B. Gebhardt, Michael Stein, Athanasios Lykartsis:
A Confidence Measure For Key Labelling. ISMIR 2018: 3-9 - [c23]Michael Stein
:
Conducting Safety Inspections of Container Gantry Cranes Using Unmanned Aerial Vehicles. LDIC 2018: 154-161 - [c22]Julien Gedeon
, Nicolás Himmelmann, Patrick Felka, Fabian Herrlich, Michael Stein
, Max Mühlhäuser:
vStore: A Context-Aware Framework for Mobile Micro-Storage at the Edge. MobiCASE 2018: 165-182 - [c21]Julien Gedeon
, Jeff Krisztinkovics, Christian Meurisch, Michael Stein, Lin Wang, Max Mühlhäuser:
A Multi-Cloudlet Infrastructure for Future Smart Cities: An Empirical Study. EdgeSys@MobiSys 2018: 19-24 - [c20]Michael Stein, Alexander Frömmgen, Roland Kluge, Lin Wang, Augustin Wilberg, Boris Koldehofe
, Max Mühlhäuser:
Scaling topology pattern matching: a distributed approach. SAC 2018: 996-1005 - [c19]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A systematic approach to constructing families of incremental topology control algorithms using graph transformation. Software Engineering 2018: 109-110 - [i3]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A Systematic Approach to Constructing Incremental Topology Control Algorithms Using Graph Transformation. CoRR abs/1805.03386 (2018) - [i2]Roland Kluge, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A Systematic Approach to Constructing Families of Incremental Topology Control Algorithms Using Graph Transformation. CoRR abs/1805.05026 (2018) - 2017
- [j9]Michael Stein
, Mathias Fischer, Immanuel Schweizer, Max Mühlhäuser:
A Classification of Locality in Network Research. ACM Comput. Surv. 50(4): 53:1-53:37 (2017) - [j8]Roland Kluge
, Michael Stein, Gergely Varró, Andy Schürr, Matthias Hollick, Max Mühlhäuser:
A systematic approach to constructing incremental topology control algorithms using graph transformation. J. Vis. Lang. Comput. 38: 47-83 (2017) - [c18]Michael Stein, Karsten Weihe, Augustin Wilberg, Roland Kluge, Julian M. Klomp, Mathias Schnee, Lin Wang, Max Mühlhäuser:
Distributed Graph-based Topology Adaptation using Motif Signatures. ALENEX 2017: 1-12 - [c17]Alexander Seeliger
, Michael Stein, Max Mühlhäuser:
Can We Find Better Process Models? Process Model Improvement Using Motif-Based Graph Adaptation. Business Process Management Workshops 2017: 230-242 - [c16]Roland Kluge
, Michael Stein
, David Giessing
, Andy Schürr
, Max Mühlhäuser
:
cMoflon: Model-Driven Generation of Embedded C Code for Wireless Sensor Networks. ECMFA 2017: 109-125 - [c15]Julien Gedeon
, Christian Meurisch, Disha Bhat, Michael Stein, Lin Wang, Max Mühlhäuser:
Router-Based Brokering for Surrogate Discovery in Edge Computing. ICDCS Workshops 2017: 145-150 - [c14]Jens Heuschkel, Michael Stein, Lin Wang, Max Mühlhäuser:
Beyond the core: Enabling software-defined control at the network edge. NetSys 2017: 1-6 - 2016
- [c13]Michael Stein, Dominic Lerbs, Mohamed Hassan, Mathias Schnee, Immanuel Schweizer, Karsten Weihe, Max Mühlhäuser:
Evaluation study for clustering in wireless sensor networks. CSNDSP 2016: 1-6 - [c12]Michael Stein, Alexander Frömmgen, Roland Kluge, Frank Löffler, Andy Schürr, Alejandro P. Buchmann, Max Mühlhäuser:
TARL: modeling topology adaptations for networking applications. SEAMS@ICSE 2016: 57-63 - [c11]Michael Stein, Tobias Petry, Immanuel Schweizer, Martina Brachmann, Max Mühlhäuser:
Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough? LCN 2016: 389-397 - [c10]Michael Stein, Roland Kluge, Dario Mirizzi, Stefan Wilk, Andy Schürr, Max Mühlhäuser:
Transitions on multiple layers for scalable, energy-efficient and robust wireless video streaming. PerCom Workshops 2016: 1-3 - 2015
- [c9]Alexander Frömmgen, Stefan Haas, Michael Stein, Robert Rehner, Alejandro P. Buchmann, Max Mühlhäuser:
Always the Best: Executing Transitions between Search Overlays. ECSA Workshops 2015: 8:1-8:4 - [c8]Michael Stein, Géza Kulcsár, Immanuel Schweizer, Gergely Varró, Andy Schürr, Max Mühlhäuser:
Topology control with application constraints. LCN 2015: 229-232 - [c7]Immanuel Schweizer, Ralf Zimmermann, Michael Stein, Max Mühlhäuser:
a-kTC: Integrating topology control into the stack. LCN 2015: 414-417 - 2014
- [j7]Géza Kulcsár, Michael Stein, Immanuel Schweizer, Gergely Varró, Max Mühlhäuser, Andy Schürr:
Rapid Prototyping of Topology Control Algorithms by Graph Transformation. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 68 (2014) - [j6]Brian Wentz, Jonathan Lazar, Michael Stein, Oluwadamilola Gbenro, Edwin Holandez, Andrew Ramsey:
Danger, danger! Evaluating the accessibility of Web-based emergency alert sign-ups in the northeastern United States. Gov. Inf. Q. 31(3): 488-497 (2014) - 2013
- [j5]Jonathan Lazar, Timothy Elder, Michael Stein:
Understanding the connection between HCI and freedom of information and access laws. Interactions 20(6): 60-63 (2013) - [c6]Jonathan Wienß, Michael Stein, Roland Ewald:
Evaluating simulation software components with player rating systems. SimuTools 2013: 41-50 - [p1]Kamill Panitzek, Muhammad Ikram
, Michael Stein:
Service Overlays. Benchmarking Peer-to-Peer Systems 2013: 113-140 - 2010
- [j4]Chae Young Lim, Michael Stein, Jason Ching, Ruen Tang:
Statistical properties of differences between low and high resolution CMAQ runs with matched initial and boundary conditions. Environ. Model. Softw. 25(1): 158-169 (2010)
2000 – 2009
- 2009
- [j3]Jürgen Branke, B. Scheckenbach, Michael Stein, Kalyanmoy Deb, Hartmut Schmeck
:
Portfolio optimization with an envelope-based multi-objective evolutionary algorithm. Eur. J. Oper. Res. 199(3): 684-693 (2009) - 2008
- [j2]Michael Stein, Jürgen Branke, Hartmut Schmeck
:
Efficient implementation of an active set algorithm for large-scale portfolio selection. Comput. Oper. Res. 35(12): 3945-3961 (2008) - 2005
- [c5]Larry Gottschalk, Jigang Liu, Brahma Dathan, Sue Fitzgerald, Michael Stein:
Computer forensics programs in higher education: a preliminary study. SIGCSE 2005: 147-151 - [r1]Jürgen Branke, Michael Stein, Hartmut Schmeck:
A Unified View on Metaheuristics and Their Hybridization. Handbook of Bioinspired Algorithms and Applications 2005 - 2003
- [c4]Jürgen Branke, Michael Stein, Hartmut Schmeck:
A Unified Framework for Metaheuristics. GECCO 2003: 1568-1569 - 2002
- [j1]Joan Slottow, Ali Shahriari, Michael Stein, Xiao Chen, Chris Thomas, Philip B. Ender:
Instrumenting and tuning dataView - a networked application for navigating through large scientific datasets. Softw. Pract. Exp. 32(2): 165-190 (2002)
1990 – 1999
- 1999
- [c3]Michael Stein, Mats Per Erik Heimdahl, John Riedl:
Enhancing Annotation Visibility for Software Inspection. ASE 1999: 243-246 - 1998
- [c2]Michael Stein, Mats Per Erik Heimdahl, John Riedl:
A General Framework for Interconnecting Annotations of Software Systems. COMPSAC 1998: 421-429 - 1997
- [c1]Michael Stein, John Riedl, Sören J. Harner, Vahid Mashayekhi:
A Case Study of Distributed, Asynchronous Software Inspection. ICSE 1997: 107-117 - 1996
- [i1]Thomas Bayer, Ingrid Renz, Michael Stein, Ulrich Kressel:
Domain and Language Independent Feature Extraction for Statistical Text Categorization. CoRR cmp-lg/9607003 (1996)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-26 01:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint