Max Muhlhauser

  • Citations Per Year
Learn More
This paper presents a method of on-chip commaunication topology synthesis for a shared multi-bus based architecture. An assumption for the synthesis is that the system has already been partitioned and mapped onto the appropriate components of a SoC so that size of data to be transferred at each time by an on-chip module is fixed. We model the communication(More)
After the partitioning in Hw/Sw co-design, an efficient mapping of hardware components to the target architectures fulfilling both power and delay requirements are still a challenging task for a system designer. In this paper, high level power/delay estimation to map hardware components to the target architectures based on Petri net is proposed, which helps(More)
First response communication is tackled by several independent research groups. While there are existing prototypes and simulated results, comparison of first response solutions is hardly possible so far. We have built an universal XML based description format to handle all relevant settings and actions typical for first response scenarios. In addition we(More)
The Distributed Tree Construction (DTC) algorithm is designed for optimally efficient multicast tree construction over structured peer-to-peer networks. It achieves this by creating a spanning tree over the peers in the multicast group, using only information available locally on each peer. Furthermore, we show that the tree depth has the same upper bound(More)
The mass spectra of copper(I) doped neon and argon clusters obtained in a time-of-flight apparatus are presented. Electronic structure calculations with density functional theory reveal that the first closed shell of CuNen complexes consists of 12 atoms with icosahedral geometry, whereas for CuArn complexes, six atoms form an octahedral structure. These(More)
Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not(More)
Defending against botnets has always been a cat and mouse game. Cyber-security researchers and government agencies attempt to detect and take down botnets by playing the role of the cat. In this context, a lot of work has been done towards reverse engineering certain variants of malware families as well as understanding the network protocols of botnets to(More)
Energy is the most limiting factor in wireless sensor networks. Harvesting solar energy is a feasible solution to overcome the energy-constraint in some applications. It enables a theoretically infinite network lifetime, sustaining a mode of operation termed energy neutral consumption rate. The challenge arises, how can the harvested energy be utilized to(More)
In this paper, we propose an extended version of our component-based framework for the development of educational presentation systems. The improvement is the application of a three-tier architecture. In contrast to related work, the introduction of new multimedia types, their rendering and storage can be completely decoupled from the core system.
This paper is a report about experiences and observations during the development of educational presentation systems for higher education. The paper discusses workflows during a typical slide-centric presentation. It presents different models that can be hierarchically aligned and extended by temporal information in order to reflect the workflows and to(More)
  • 1