of the publications of Prof. Dr. Christoph Meinel and his team
Our range of books are being complemented by a number of high-grade publications:
- Christoph Meinel, Christian Willems
openHPI. Das MOOC-Angebot des Hasso-Plattner-Instituts
Technical Report No. 79, Hasso-Plattner-Institut (2013)
The paper reports on start and first experiences of our engagement in the new field of massive open online courses (MOOCs). On the MOOC platform openHPI, which we have developed, we started already in the "year of MOOCs" 2012 to offer MOOCs about IT Systems Engineering which are attended by several ten thousends of learner.
- Wesam Dawoud, Ibrahim Takouna, Christoph Meinel
Infrastructure as a service security: Challenges and solutions
7th IEEE Informatics and Systems (INFOS) (2010)
In cloud computing infrastructure as a Service (IaaS) serves as the foundation layer for the other delivery models, and a lack of security in this layer affects the other delivery models, i.e., PaaS, and SaaS that are built upon IaaS layer. This paper presents an elaborated study of IaaS components’ security and determines vulnerabilities and countermeasures. As a result of this research, we propose a Security Model for IaaS (SMI).
- S. Roschke, F. Cheng, Christoph Meinel
Intrusion Detection in the Cloud
8th IEEE Dependable, Autonomic and Secure Computing (DASC'09) (2009)
Intrusion detection systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. Facing new application scenarios in cloud computing, the IDS approaches yield several problems. This paper summarizes several requirements for deploying IDS in the cloud and propose an extensible IDS architecture for being easily used in a distributed cloud infrastructure.
- MG Noll, Christoph Meinel
Personalization 2.0: Web Search Personlization via Social Bookmarking and Tagging
Semantic Web, 367-380 (2007)
In this paper, we present a new approach to web search personalization based on user collaboration and sharing of information about web documents. The proposed personalization technique separates data collection and user profiling from the information system whose contents and indexed documents are being searched for, i.e. the search engines, and uses social bookmarking and tagging to re-rank web search results.
- Christoph Meinel, Volker Klotz
10 Years ECCC - A Digital Library in World Wide Use
Communication of the ACM, Vol. 49, No. 1 (2006), 131-134.
This paper summarizes our experiences in designing, establishing and maintainining the (worldwide first) electronic colloquium. Focusing on computational complexity ECCC opens new ways for fast and reliable communicating of new scientific results and enhances (Internet-based) scientific discussions.
- Christoph Meinel, J. Hu
Tele-Lab "IT-Security" on CD: Portable, Reliable and Safe IT Security Training
Computers & Security Journal, COSE 234, Vol. 23, Iss. 4 (2004) pp. 282-289.
- Christoph Meinel, T. Theobald
Ordered Binary Decision Diagrams and Their Significance in Computer-Aided Design of VLSI-Circuits
Journal of Ciruits, Systems and Computers, Vol. 9, Nos. 3 & 4 (1999), 181-198.
The paper founds the use of ordered binary decisions diagrams (OBDDs) as a data structure for representing mirco-electronic circuits as well as surveys our contributions to increase their efficiency.
- Carsten Damm, Matthias Krause, Christoph Meinel, Stephan Waack
On Relations Between Counting Communication Complexity Classes
Journal on Computer and Systems Science, (1998)
Here we introduce and investigate new complexity classes which are characterized by different modes of communication complexity. By proving various exponential lower bounds we are even able to show that these classes are all different when communication complexity is restricted.
- Christoph Meinel, S. Waack
The "Log Rank" Conjecture for Modular Communication Complexity
Computational Complexity, Vol. 10 (2001), 70-91
- Christoph Meinel, F. Somenzi, T. Theobald
Linear Sifting of Decision Diagrams and ist Application in Synthesis
IEEE Transactions on CAD, Vol. 19 (2000), No. 5, 521-533.
Shifting ist a powerful technique to find suited variable order which minimize complexity of OBDD-based cuircuit representations and, therefore, enhance OBDD-based synthesis and verification. We considerably improved this method by exploiting and utilizing powerful algebraic techniques.
- Jordan Gergov, Christoph Meinel
Efficient Analysis and Manipulation of OBDD's can be Extended to FBDD's
IEEE Transactions on Computers, Vol. 43, No. 10 (1994), 1197-1209. OBDDs are a famous data structure for the formal verification of electronic micro-cicuits since they allow efficient Boolean synthesis and equivalence testing. It was a great surprise when we could show that same is true for the more compact FBDDs. More you can read here
- G. Buntrock, C. Damm, U. Hertrampf, Christoph Meinel
Structure and Importance of Logspace-MOD-Classes
Mathématical Systems Theory, Vol. 25, (1992), 223-237.
As a generalization of the computational parity mode we newly invent modulo acceptation modes, and define and investigate corresponding Log-space MOD complexity classes.
- Christoph Meinel
Polynomial Size Omega-Branching Programs and Their Computational Power
Information and Computation, Vol. 85, No. 2 (1990), 163-182.
This paper provides a first systematic categorization of all possible computational modes in the context of Log-space bounded computations. It was detected that beside of the well-known deterministic and nondeterministic / co-nondeterministic modes there exits merely one additional mode, the firstly characterized parity mode. More you can read here.
- Christoph Meinel
Symbolic Simulation of Synchronous Parallel Systems
EIK 22 (1986), 7/8, 355-370.
In this paper a formal calulus was developed that makes it possible to describe and formally verify processings of synchronously working parallel systems. This calculus made it possible to detect a serious design error in a famous systolic VLSI system ...
Our design of a virtual lab opens completely new ways to teach and exercise IT-security. Concept and architecuture of our Tele-Lab "IT-security" was one of the first attemps to utilize virtual machines for e-learning.