Torsten Grote

Learn More
We elaborate a uniform approach to computing answer sets of disjunctive logic programs based on state-of-theart Boolean constraint solving techniques. Starting from a constraint-based characterization of answer sets, we develop advanced solving algorithms, featuring backjumping and conflict-driven learning using the First-UIP scheme as well as sophisticated(More)
The advance of Internet and Sensor technology has brought about new challenges evoked by the emergence of continuous data streams. While existing data stream management systems allow for high-throughput stream processing, they lack complex reasoning capacities. We address this shortcoming and elaborate upon an approach to knowledge-intense stream reasoning,(More)
The advance of Internet and Sensor technology has brought about new challenges evoked by the emergence of continuous data streams. Beyond rapid data processing, application areas like ambient assisted living, robotics, or dynamic scheduling involve complex reasoning tasks. We address such scenarios and elaborate upon approaches to knowledge-intense stream(More)
We elaborate upon the usage of action language C for representing and reasoning about biological models. First, we provide a simple extension of C allowing for variables and show its usefulness in modeling biochemical reactions according to the well-known model of BIOCHAM. Second, we show how the biological action description language C<sub>TAID</sub> can(More)
The advance of Internet and Sensor technology has brought about new challenges evoked by the emergence of continuous data streams. While existing data stream management systems allow for high-throughput stream processing, they lack complex reasoning capacities. We address this shortcoming and elaborate upon an approach to knowledge-intense stream reasoning,(More)
Peak current mode control as well as digital control offers a number of benefits. Therefore it is an interesting approach to combine these two techniques in one control structure. Based on microcontrollers with on-chip comparators, this combination is realizable with very low effort. In order to eliminate the drawbacks of peak current mode control, a slope(More)
We introduce a general approach to cryptographic protocol verification based on answer set programming. In our approach, cryptographic protocols are represented as extended logic programs where the answer sets correspond to traces of protocol runs. Using queries, we can find attacks on a protocol by finding the answer sets for the corresponding logic(More)
Due to their high torque and power per volume ratio, interior permanent magnet synchronous motors (IPMSM) are widespread electrical machines for traction drive applications, e.g. in the drive train of hybrid electric vehicles (HEV). IPMSM exhibit a significant degree of saliency along the rotor circumference. Thus, in order to exploit the full potential of(More)