Peter Dencker

Learn More
Six methods for parser table compression are compared. The investigations are focused on four methods that allow the access of table entries with a constant number of index operations. The advantage of these methods is that the access to the compressed tables can be programmed efficiently in portable high-level languages like Pascal or FORTRAN. The results(More)
This article is a survey on recent research on bivariate polynomial interpolation on the node points of Lissajous curves. The resulting theory is a generalization of the generating curve approach developed for Lagrange interpolation on the Padua points. After classifying the different types of Lissajous curves, we give a short overview on interpolation and(More)
In this contribution, we study multivariate polynomial interpolation and quadrature rules on non-tensor product node sets linked to Lissajous curves and Chebyshev varieties. After classifying multivariate Lissajous curves and the interpolation nodes related to these curves, we derive a discrete orthogonality structure on these node sets. Using this discrete(More)
The most ambit ious goal in the AdaIDAS project is to monitor the tasking behavior in real-time without disturbing the execution of the Ada program• This requires a deta i led knowledge of the runt ime and tasking implementa t ion of a specific ~ A d a environment and a hardware moni tor ing facility• By contras t , the work of German [3] and Helmbold,(More)
The talk introduces the simulation language Modelica and its<lb>concepts for the modeling and simulation of continuous system behavior. The<lb>language is competitive to Matlab/Simulink and in addition, supports an object-<lb>oriented style of modeling which leads to a high degree of component reuse.<lb>System behavior is expressed in an equation oriented(More)
The ever increasing complexity of automotive vehicular systems, their connection to external networks, to the internet of things as well as their greater internal networking opens doors to hacking and malicious attacks. Security and privacy risks in modern automotive vehicular systems are well publicized by now. That violation of security could lead to(More)