Thorsten Schneider

Learn More
— This paper investigates a novel text compressor for short text messages. Short text messages are used in cellular and sensor networks. The terminals or nodes are battery driven and compression is needed to save energy or to use bandwidth in an efficient manner. The presented work focuses on the trade-off between compression and energy consumption.(More)
There is evidence that ciliary neurotrophic factor (CNTF) is involved in reactive changes following lesions of the nervous system. To investigate, whether differences in the regulation of CNTF and CNTF receptor alpha (CNTFRalpha) contribute to the differences in PNS and CNS responses to injury, we have studied their expression on the mRNA and protein level(More)
Abnormalities in anatomy and function of the cranial nerve motor nuclei and brain stem structures have been demonstrated in some people with autism and can be modeled in rats by exposure to valproic acid (VPA) during very early nervous system developmental stages (neural tube closure). The aim of this study was to investigate if VPA will have an impact on(More)
AIMS Cardiovascular risk factors are associated with decreased levels of circulating progenitor cells (CPC). The aim of this study was to determine whether the number of CPC is an independent correlate of body mass index (BMI) and whether weight loss leads to an increase in CPC. METHODS AND RESULTS CD34 positive and KDR/CD34, CD133/CD34, and CD117/CD34(More)
A distribution model for the new generation of component languages, which allows to plug required into provided interfaces, is presented together with the distributed component language CompJava. The distribution model models an abstraction layer on top of existing component languages and middleware. It makes distributed component programming with CompJava(More)
This paper proposes a new technique for hardening registration number protections by using multithreaded Petri nets. Using this technique one is able to prevent reverse code engineering attacks, which consist of protection scheme analysis and reengineering. We come to the conclusion that using such a technique leads at minimum to an enormous reverse code(More)
  • 1