default search action
Sarah Edenhofer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j2]Jan Kantert, Sven Tomforde, Richard Scharrer, Susanne Weber, Sarah Edenhofer, Christian Müller-Schloer:
Identification and classification of agent behaviour at runtime in open, trust-based organic computing systems. J. Syst. Archit. 75: 68-78 (2017) - [c29]Jan Kantert, Sven Tomforde, Christian Müller-Schloer, Sarah Edenhofer, Bernhard Sick:
Quantitative Robustness - A Generalised Approach to Compare the Impact of Disturbances in Self-organising Systems. ICAART (1) 2017: 39-50 - [c28]Christian Heintz, Moritz Grunwald, Sarah Edenhofer, Jörg Hähner, Sebastian von Mammen:
The game of flow - cellular automaton-based fluid simulation for realtime interaction. VRST 2017: 76:1-76:2 - 2016
- [j1]Jan Kantert, Sven Tomforde, Melanie Kauder, Richard Scharrer, Sarah Edenhofer, Jörg Hähner, Christian Müller-Schloer:
Controlling Negative Emergent Behavior by Graph Analysis at Runtime. ACM Trans. Auton. Adapt. Syst. 11(2): 7:1-7:34 (2016) - [c27]Jan Kantert, Richard Scharrer, Sven Tomforde, Sarah Edenhofer, Christian Müller-Schloer:
Runtime Clustering of Similarly Behaving Agents in Open Organic Computing Systems. ARCS 2016: 321-333 - [c26]Sarah Edenhofer, Christopher Stifter, Sven Tomforde, Jan Kantert, Christian Müller-Schloer, Jörg Hähner:
Comparison of Surveillance Strategies to Identify Undesirable Behaviour in Multi-Agent Systems. ICAART (1) 2016: 132-140 - [c25]Jan Kantert, Lukas Klejnowski, Sarah Edenhofer, Sven Tomforde, Christian Müller-Schloer:
A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents. ICAART (1) 2016: 173-180 - [c24]Jan Kantert, Melanie Kauder, Sarah Edenhofer, Sven Tomforde, Christian Müller-Schloer:
Detecting Colluding Attackers in Distributed Grid Systems. ICAART (1) 2016: 198-206 - [c23]Sarah Edenhofer, Christopher Stifter, Youssef Madkour, Sven Tomforde, Jan Kantert, Christian Müller-Schloer, Jörg Hähner:
Bottom-Up Norm Adjustment in Open, Heterogeneous Agent Societies. FAS*W@SASO/ICCAC 2016: 36-41 - [c22]Sarah Edenhofer, Simon Rädler, Manuel Hoß, Sebastian von Mammen:
Self-Organised Construction with Revit. FAS*W@SASO/ICCAC 2016: 160-161 - [c21]Andreas Knote, Sarah Edenhofer, Sebastian von Mammen:
Neozoa: An immersive, interactive sandbox for the study of competing. KELVAR@VR 2016: 5-10 - [c20]Sebastian von Mammen, Andreas Knote, Sarah Edenhofer:
Cyber sick but still having fun. VRST 2016: 325-326 - [c19]Robin Han, Dominik Auer, Sarah Edenhofer, Sebastian von Mammen:
Skynetz: A Playful Experiential Robotics Simulator. VS-GAMES 2016: 1-4 - [c18]Simon Kerler, Johannes Vilsmeier, Sarah Edenhofer, Sebastian von Mammen:
Pheromander: Real-Time Strategy with Digital Pheromones. VS-GAMES 2016: 1-4 - [c17]Christopher Stifter, Sarah Edenhofer, Sebastian von Mammen:
Come Fly with Me - Perceive the World through a Mosquito's Senses. VS-GAMES 2016: 1-4 - [p2]Jan Kantert, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
Normative Control: Controlling Open Distributed Systems with Autonomous Entities. Trustworthy Open Self-Organising Systems 2016: 89-126 - [p1]Sarah Edenhofer, Sven Tomforde, Jan Kantert, Lukas Klejnowski, Yvonne Bernard, Jörg Hähner, Christian Müller-Schloer:
Trust Communities: An Open, Self-Organised Social Infrastructure of Autonomous Agents. Trustworthy Open Self-Organising Systems 2016: 127-152 - 2015
- [c16]Jan Kantert, Sarah Edenhofer, Sven Tomforde, Christian Müller-Schloer:
Representation of Trust and Reputation in Self-Managed Computing Systems. CIT/IUCC/DASC/PICom 2015: 1827-1834 - [c15]Jan Kantert, Sergej Wildemann, Georg von Zengen, Sarah Edenhofer, Sven Tomforde, Lars C. Wolf, Jörg Hähner, Christian Müller-Schloer:
Improving Reliability and Endurance Using End-to-End Trust in Distributed Low-Power Sensor Networks. ARCS 2015: 135-145 - [c14]Julian Schikarski, Oliver Meisch, Sarah Edenhofer, Sebastian von Mammen:
The Digital Aquarist: An Interactive Ecology Simulator. ECAL 2015: 389-396 - [c13]Jan Kantert, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
Defending Autonomous Agents Against Attacks in Multi-Agent Systems Using Norms. ICAART (1) 2015: 149-156 - [c12]Sarah Edenhofer, Christopher Stifter, Uwe Jänen, Jan Kantert, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
An Accusation-Based Strategy to Handle Undesirable Behaviour in Multi-agent Systems. ICAC 2015: 243-248 - [c11]Jan Kantert, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
Detecting and Isolating Inconsistently Behaving Agents using an Intelligent Control Loop. ICINCO (1) 2015: 246-253 - [c10]Uwe Jänen, Carsten Grenz, Sarah Edenhofer, Anthony Stein, Jürgen Brehm, Jörg Hähner:
Task Execution in Distributed Smart Systems. IDCS 2015: 103-117 - [c9]Sarah Edenhofer, Sebastian von Mammen, Katharina Eckardt, Julia Rauscher:
Cloud Computing - An Educational Game on Weather Phenomena. VS-GAMES 2015: 1-4 - [c8]Frank Gaibler, Simon Faber, Sarah Edenhofer, Sebastian von Mammen:
Drink & Drive: A Serious but Fun Game on Alcohol-Induced Impairments in Road Traffic. VS-GAMES 2015: 1-5 - 2014
- [c7]Sebastein von Mammen, Sarah Edenhofer:
Swarm Grammars GD: Interactive Exploration of Swarm Dynamics and Structural Development. ALIFE 2014: 312-319 - [c6]Stefan Rudolph, Sarah Edenhofer, Sven Tomforde, Jörg Hähner:
Reinforcement Learning for Coverage Optimization Through PTZ Camera Alignment in Highly Dynamic Environments. ICDSC 2014: 19:1-19:6 - [c5]Jan Kantert, Hannes Scharf, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
Implementing an Adaptive Higher Level Observer in Trusted Desktop Grid to Control Norms. ICINCO (1) 2014: 288-295 - [c4]Jan Kantert, Hannes Scharf, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
A Graph Analysis Approach to Detect Attacks in Multi-agent Systems at Runtime. SASO 2014: 80-89 - [c3]Jan Kantert, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
Robust Self-Monitoring in Trusted Desktop Grids for Self-Configuration at Runtime. SASO Workshops 2014: 178-185 - [c2]Jan Kantert, Sebastian Bödelt, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer:
Interactive Simulation of an Open Trusted Desktop Grid System with Visualisation in 3D. SASO 2014: 191-192 - 2012
- [c1]Sarah Edenhofer, Peter Höfner:
Towards a rigorous analysis of AODVv2 (DYMO). ICNP 2012: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint