default search action
Wolfgang Bauer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1987
- [b1]Wolfgang Bauer:
Optimal control of storage power plants. Johannes Kepler University Linz, Austria, 1987, ISBN 978-3-85369-665-1, pp. 1-140
Journal Articles
- 2023
- [j7]Stefan Geißler, Florian Wamser, Wolfgang Bauer, Steffen Gebert, Samuel Kounev, Tobias Hoßfeld:
MVNOCoreSim: A Digital Twin for Virtualized IoT-Centric Mobile Core Networks. IEEE Internet Things J. 10(15): 13974-13987 (2023) - 2014
- [j6]Irina Sagert, Wolfgang Bauer, Dirk Colbry, Jim Howell, Rodney Pickett, Alec Staber, Terrance Strother:
Hydrodynamic shock wave studies within a kinetic Monte Carlo approach. J. Comput. Phys. 266: 191-213 (2014) - 2006
- [j5]Wolfgang Bauer, Eric Moderegger, Arno Kriechbaum:
Einbettung aktiver und passiver Bauelemente in mehrlagige Leiterplatten. Elektrotech. Informationstechnik 123(3): 101-109 (2006) - 2002
- [j4]Martin Welsch, Rainer Dammers, Wolfgang Bauer:
IBM WebSphere Portal als Basis für Unternehmensportale. HMD Prax. Wirtsch. 225 (2002) - 1986
- [j3]Wolfgang Bauer:
Modelling and optimization of the Gosau hydro electric power system. Z. Oper. Research 30(6) (1986) - 1984
- [j2]Wolfgang Bauer, Helmut Gfrerer, Hansjörg Wacker:
Optimization strategies for hydro energy storage plants. Z. Oper. Research 28(4) (1984) - 1982
- [j1]Wolfgang Bauer, H. Reisinger, Hansjörg Wacker:
Höhensteuerung eines Tagesspeicherkraftwerks. Z. Oper. Research 26(1) (1982)
Conference and Workshop Papers
- 2022
- [c20]Viktoria Vomhoff, Stefan Geissler, Frank Loh, Wolfgang Bauer, Tobias Hossfeld:
Characterizing Mobile Signaling Anomalies in the Internet-of-Things. NOMS 2022: 1-6 - 2021
- [c19]Stefan Geissler, Florian Wamser, Wolfgang Bauer, Michael Krolikowski, Steffen Gebert, Tobias Hoßfeld:
Signaling Traffic in Internet-of-Things Mobile Networks. IM 2021: 452-458 - 2019
- [c18]Wolfgang Bauer, Natalia Kryvinska, Jürgen Dorn:
Towards Trust in Digital Services Advertisements - Buying Experts' Opinions on USDL-Trust. CybHyg 2019: 15-31 - [c17]Wolfgang Bauer, Natalia Kryvinska, Jürgen Dorn, Owen Sacco:
Extending Linked USDL by Trust Assertion. iiWAS 2019: 377-384 - 2018
- [c16]Wolfgang Bauer, Philipp Holzinger, Marc Reichenbach, Steffen Vaas, Paul Hartke, Dietmar Fey:
Programmable HSA Accelerators for Zynq UltraScale+ MPSoC Systems. Euro-Par Workshops 2018: 733-744 - 2017
- [c15]Wolfgang Bauer, Jürgen Dorn:
Modeling trust for service e-marketplaces: case study in the manufacturing domain. iiWAS 2017: 241-247 - 2015
- [c14]Wolfgang Bauer, Fatos Elezi, Michael Roth, Maik Maurer:
Determination of the required product platform flexibility from a change perspective. SysCon 2015: 20-26 - [c13]Wolfgang Bauer, Patrick Bosch, Nepomuk Chucholowski, Fatos Elezi, Sebastian Maisenbacher, Udo Lindemann, Maik Maurer:
Complexity costs evaluation in product families by incorporating change propagation. SysCon 2015: 37-43 - 2014
- [c12]Wolfgang Bauer, Nepomuk Chucholowski, Udo Lindemann, Maik Maurer:
Domain-Spanning Change Propagation in Changing Technical Systems. CSDM Asia 2014: 111-123 - [c11]Daniel Kasperek, Stefanie Fink, Sebastian Maisenbacher, Wolfgang Bauer, Maik Maurer:
Assessing the informative value of complexity metrics within Design Structure Matrices in early development phases of complex systems. SysCon 2014: 351-356 - [c10]Wolfgang Bauer, Felix Braun, Fatos Elezi, Maik Maurer:
Monetary Evaluation of Platform Strategies from variant costs assessment to Economic Value Added. SysCon 2014: 567-574 - 2013
- [c9]Dirk Colbry, Bill Punch, Wolfgang Bauer:
The institute for cyber-enabled research: regional organization to promote computation in science. XSEDE 2013: 71:1-71:6 - 2012
- [c8]Harrys Daniilidis, Wolfgang Bauer, Udo Lindemann:
Compendium for modular and platform based architecting. CSER 2012: 220-225 - 2011
- [c7]Harrys Daniilidis, David Hellenbrand, Wolfgang Bauer, Udo Lindemann:
Using structural complexity management for design process driven modularization. IEEM 2011: 595-599 - 2010
- [c6]Peter Kontschieder, Michael Donoser, Johannes Kritzinger, Wolfgang Bauer, Horst Bischof:
Detecting Paper Fibre Cross Sections in Microtomy Images. ICPR 2010: 316-319 - [c5]Martin Centner, Clemens Orthacker, Wolfgang Bauer:
Minimal-footprint Middleware for the Creation of Qualified Signatures. WEBIST (1) 2010: 64-69 - 2005
- [c4]Igor Miladinovic, Klaus Umschaden, Thomas Hoeher, Mark Banfield, Wolfgang Bauer, Peter Tschulik:
IPV6 deployment scenarios for large ISP networks. Communications and Computer Networks 2005: 380-385 - 2003
- [c3]Gerd Kortemeyer, Guy Albertelli, Wolfgang Bauer, Felicia Berryman, Jeremy Bowers, Matthew Hall, Edwin Kashy, Deborah Kashy, Helen Keefe, Behrouz Minaei-Bidgoli, William F. Punch, Alexander Sakharuk, Cheryl Speier:
The LearningOnline Network with Computer-Assisted Personalized Approach (LON-CAPA). PGLDB 2003 - 2002
- [c2]Wolfgang Bauer:
Implementing elliptic curve cryptography. Communications and Multimedia Security 2002: 17-28 - 1998
- [c1]Hans-Peter Bernhard, Walter Reinisch, Wolfgang Bauer:
The Mutual Information Function as a Preprocessing Tool for Predictor Design. NC 1998: 868-873
Informal and Other Publications
- 2020
- [i1]Wolfgang Bauer, Natalia Kryvinska, Jürgen Dorn:
Model of Trust Management for Digital Industry Services. Towards E-Commerce 4.0. CoRR abs/2011.01523 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint