default search action
Rudi Knorr
Person information
- affiliation: University of Augsburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j2]Neda Petreska, Hussein Al-Zubaidy, Rudi Knorr, James Gross:
Bound-based power optimization for multi-hop heterogeneous wireless industrial networks under statistical delay constraints. Comput. Networks 148: 262-279 (2019) - [c29]Ahmad Saad, Henning F. Schepker, Barbara Staehle, Rudi Knorr:
Whitespace Prediction Using Hidden Markov Model Based Maximum Likelihood Classification. VTC Spring 2019: 1-7 - 2018
- [j1]Martin Manderscheid, Gereon Weiss, Rudi Knorr:
Verification of network end-to-end latencies for adaptive ethernet-based cyber-physical systems. J. Syst. Archit. 88: 23-32 (2018) - [c28]Ahmad Saad, Barbara Staehle, Rudi Knorr:
Predictive medium access control for industrial cognitive radio. CCNC 2018: 1-8 - [c27]Dario Fanucchi, Barbara Staehle, Rudi Knorr:
Network Formation for Industrial IoT: Evaluation, Limits and Recommendations. ETFA 2018: 227-234 - 2017
- [c26]Karsten Roscher, Thomas Nitsche, Rudi Knorr:
Know Thy Neighbor - A Data-Driven Approach to Neighborhood Estimation in VANETs. VTC Fall 2017: 1-5 - 2016
- [c25]Neda Petreska, Hussein Al-Zubaidy, Barbara Staehle, Rudi Knorr, James Gross:
Statistical Delay Bound for WirelessHART Networks. PE-WASUN@MSWiM 2016: 33-40 - [c24]Karsten Roscher, Josef Jiru, Rudi Knorr:
Low-delay forwarding with multiple candidates for VANETs using multi-criteria decision making. VNC 2016: 1-8 - [c23]Ahmad Saad, Barbara Staehle, Rudi Knorr:
Spectrum prediction using hidden Markov models for industrial cognitive radio. WiMob 2016: 1-7 - [i2]Neda Petreska, Hussein Al-Zubaidy, Barbara Staehle, Rudi Knorr, James Gross:
Statistical Delay Bound for WirelessHART Networks. CoRR abs/1607.08102 (2016) - [i1]Neda Petreska, Hussein Al-Zubaidy, Rudi Knorr, James Gross:
Power-Minimization under Statistical Delay Constraints for Multi-Hop Wireless Industrial Networks. CoRR abs/1608.02191 (2016) - 2015
- [c22]Martin Manderscheid, Gereon Weiss, Rudi Knorr:
Verifying network performance of cyber-physical systems with multiple runtime configurations. EMSOFT 2015: 247-255 - [c21]Neda Petreska, Hussein Al-Zubaidy, Rudi Knorr, James Gross:
On the recursive nature of end-to-end delay bound for heterogeneous wireless networks. ICC 2015: 5998-6004 - [c20]Dario Fanucchi, Rudi Knorr, Barbara Staehle:
Impact of network monitoring in IEEE 802.15.4e-based wireless sensor networks. WOWMOM 2015: 1-3 - 2011
- [c19]Marc Zeller, Gereon Weiss, Dirk Eilers, Rudi Knorr:
An approach for providing dependable self-adaptation in distributed embedded systems. SAC 2011: 236-237 - [c18]Marc Zeller, Christian Prehofer, Gereon Weiss, Dirk Eilers, Rudi Knorr:
Towards Self-Adaptation in Real-Time, Networked Systems: Efficient Solving of System Constraints for Automotive Embedded Systems. SASO 2011: 79-88 - [c17]Patrick Heinrich, Dirk Eilers, Rudi Knorr, Markus Königer, Bernd Niehoff:
Autonomous Parameter and Schedule Configuration for TDMA-Based Communication Protocols Such as FlexRay. TrustCom 2011: 1241-1246 - 2010
- [c16]Marc Zeller, Gereon Weiss, Dirk Eilers, Rudi Knorr:
Co-Simulation of Self-Adaptive Automotive Embedded Systems. EUC 2010: 73-80 - [c15]Marc Zeller, Stefan Grosse, Dirk Eilers, Rudi Knorr:
Fail-Safe Data Management in Self-Healing Automotive Systems. ICAS 2010: 24-29
2000 – 2009
- 2009
- [c14]Gereon Weiss, Marc Zeller, Dirk Eilers, Rudi Knorr:
Towards Self-organization in Automotive Embedded Systems. ATC 2009: 32-46 - [c13]Falk Langer, Dirk Eilers, Rudi Knorr:
Fault Detection in Discrete Event Based Distributed Systems by Forecasting Message Sequences with Neural Networks. KI 2009: 411-418 - 2006
- [c12]Dietmar Toelle, Rudi Knorr:
Performance Evaluation of Potential and Management based Network Admission Control Methods. ICC 2006: 754-759 - [c11]Dietmar Toelle, Rudi Knorr:
Congestion Control for Carrier Ethernet using Network Potentials. NOMS 2006 - 2005
- [c10]Rainer Steffen, Thomas Messerer, Rudi Knorr:
Managing Access Control with Distributed Trust - A Feasible Approach. PSC 2005: 193-198 - [c9]Christian Sauer, Matthias Gries, Sören Sonntag, Dietmar Toelle, Bo Wu, Rudi Knorr:
Trends in Access Networks and their Implementation in DSLAMs. LCN 2005: 493-494 - 2004
- [c8]Markus Augel, Rudi Knorr:
Bluetooth Scatternet Formation - State of the Art and a New Approach. ARCS 2004: 260-272 - [c7]Rainer Steffen, Rudi Knorr:
Quality of service MAC protocol for shared media in-house networks. CCNC 2004: 289-294 - [c6]Helmut Steckenbiller, Rudi Knorr:
Buffer schemes for runtime reconfiguration of function variants in communication systems. FPGA 2004: 247 - [c5]Walter Zimmer, Thomas Messerer, Rainer Steffen, Rudi Knorr:
Security versus Usability in a Ubiquitous Environment. GI Jahrestagung (2) 2004: 605-609 - 2003
- [c4]Dirk Eilers, Helmut Steckenbiller, Rudi Knorr:
Architecture template with dynamic buffering for runtime reconfiguration of adaptive embedded communication systems. FPT 2003: 383-386 - [c3]Corina Scheiter, Rainer Steffen, Markus Zeller, Rudi Knorr, Benno Stabernack, Kai-Immo Wels:
A system for QOS-enabled MPEG-4 video transmission over Bluetooth for mobile applications. ICME 2003: 789-792 - 2000
- [c2]Dirk Eilers, Alfred Voglgsang, Arnold Plankl, Gerri Körner, Helmut Steckenbiller, Rudi Knorr:
Implementation of an AAL for High Bit Rate Real-Time Data Transmission System over ATM Networks Using a RSE CODEC. PDPTA 2000 - [c1]Dirk Eilers, Alfred Voglgsang, Arnold Plankl, Gerri Körner, Helmut Steckenbiller, Rudi Knorr:
A Prototype of an AAL for High Bit Rate Real-Time Data Transmission System over ATM Networks Using a RSE CODEC. IEEE International Workshop on Rapid System Prototyping 2000: 109-114
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint