Dr. Heiko Niedermayer

Research Associate
Image 74b0e03b

Postal address

  • Institut für Informatik der
  • Technischen Universität München
  • Lehrstuhl I8
  • Boltzmannstr. 3
  • 85748 Garching bei München - Germany

Contact

  • Tel: +49 89 289 - 18040
  • Fax: +49 89 289 - 18033
  • e-Mail: niedermayerAtnet.in.tum.de
    (GPG: 1D62 3E26 278C 0010 5F5B 3F1C 9544 281E 7909 A882)
  • Building/Room: MI Building, 03.05.040

Research

Topics

  • Realistic Modeling
  • Resilience
  • Social Informatics / Internet Science
  • Security and Privacy

projects

  • RECODIS: Cost Action on Resilient Communication Services Protecting End-user Applications from Disaster-based Failures (2016 – 2020)
  • SafeCloud: Safe and Privacy-Friendly Cloud Infrastructures (2015 – 2018)
  • SURF: Systemic Security for Critical Infrastructures (2014 – 2016)
  • EINS: European Network of Excellence of Internet Science (2011 – 2015)
  • SecFuNet: Security for Future Networks (2011 – 2014)
  • ANSII: Anomalieerkennung und eingebettete Sicherheit in industriellen Informationssystemen (2012 – 2014)

Teaching

  • Network Security
  • Peer-to-Peer Systems and Security
  • Seminar IITM and FI (advisor)

Supervised Theses

Open

Title Type Advisors Year Links
A fault-proof and tamper-resistant certificate issuance process MA Dr. Holger Kinkelin, Stefan Liebald, Dr. Heiko Niedermayer 2018 Pdf
Certificate Monitoring BA, MA Heiko Niedermayer, Sree Harsha Totakura 2017 Pdf
Designing a Multipath Overlay BA, MA Heiko Niedermayer 2017 Pdf
Route Monitoring to Detect Anomalies On Your Connection BA, MA Heiko Niedermayer, Sree Harsha Totakura 2016 Pdf

In progress

Student Title Type Advisors Year Links
Yannick Scherer Federated Identity and Transaction Management over Blockchain II BA Dr. Heiko Niedermayer, Dr. Holger Kinkelin 2018 Pdf
Marc Müller Trustworthy and tamperproof configuration management of networked devices MA Dr. Holger Kinkelin, Cora-Lisa Perner, Dr. Heiko Niedermayer 2018 Pdf

Finished

Author Title Type Advisors Year Links
Michael Mitterer Applicability and Performance Analysis of Encrypted Databases for Smart Environments BA Dr. Heiko Niedermayer, Marcel von Maltitz 2017 Pdf
Valentin Hauner Trustworthy Configuration Management with Distributed Ledgers MA Dr. Holger Kinkelin, Dr. Heiko Niedermayer 2017 Pdf
Stefanos Georgiou A Trustworthy Process-Tracing System for B2B-Applications based on Blockchain Technology MA Dr. Holger Kinkelin, Sree Harsha Totakura, Dr. Heiko Niedermayer 2017 Pdf
Jan Felix Hoops Federated Identity and Transaction Management over Blockchain II BA Dr. Heiko Niedermayer, Dr. Holger Kinkelin 2017 Pdf
Sirus Shahbakhti Scalable Solution for the Protection of SSH using DNSSEC BA Dr. Heiko Niedermayer, Lukas Schwaighofer 2017 Pdf
Markus Paulsen Certificate Monitoring BA Heiko Niedermayer 2017 Pdf
Andrea Drekovic Models for Normal and Attack Traffic in Traffic Causality Graphs BA Heiko Niedermayer 2017 Pdf
Adrian Schultz Route Monitoring to detect anomalies on your connection BA Heiko Niedermayer 2017 Pdf
Fabian Helfert Framework for Informed Route Selection Analysis in Overlay Networks BA Heiko Niedermayer, Sree Harsha Totakura 2017 Pdf
Frederic Naumann Enhanced Certificate Protection BA Heiko Niedermayer, Sree Harsha Totakura 2017 Pdf
Yasar Kücukkaya Measurement and Analysis of Traffic of Mobile Apps BA Heiko Niedermayer 2017 Pdf
Simon Klimek An empirical approach towards analysis of discussions on mailing lists BA Daniel Raumer, Heiko Niedermayer 2017 Pdf
Boonyakorn Jantaranuson Analysis of Social Networks in IETF Mailing Lists MA Daniel Raumer, Heiko Niedermayer 2017 Pdf
Benedikt Engeser Informed Route Selection Strategies for Multipath Routing MA Heiko Niedermayer, Sree Harsha Totakura 2016 Pdf
Daniel Sel Authenticated Scalable Port-Knocking BA Sree Harsha Totakura, Heiko Niedermayer 2016 Pdf
Nikolai Schwellnus A Heat Map for IETF Standardization Activities BA Daniel Raumer, Heiko Niedermayer, Edwin Cordeiro 2016 Pdf
Nikolai Schwellnus Datamining on IETF data IDP Heiko Niedermayer, Daniel Raumer, Edwin Cordeiro 2016 Pdf
Elias Hazboun Applicability and Performance Analysis of Encrypted Databases for Smart Environments MA Dr. Heiko Niedermayer, Dr. Holger Kinkelin, Marcel von Maltitz 2016 Pdf
Markus Dausch Measurement and Analysis of Traffic of Mobile Apps MA Heiko Niedermayer, Quirin Scheitle 2016 Pdf
Tizian Sarre Popularity over time - Analysis of Videos on Youtube BA Heiko Niedermayer 2016 Pdf
Sebastian Vogl Privatheitsprobleme von Datenmodellen im intelligenten Gebäudeumfeld BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz 2015 Pdf
Christian Brosche A modular framework for a collaborative solution for privacy-preserving network communication BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz 2015 Pdf
Benjamin Schöntag Integrating Voice over IP into a privacy friendly network underlay BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz 2015
Max von Tettenborn Permission-aware Resolution of Human-readable Identifiers and Connectivity Establishment in Smart Environments BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer 2014
Sebastian Rückerl Presence Detection using passive WLAN measurements BA Dr. Holger Kinkelin, Dr. Heiko Niedermayer 2014
Sebastian Bendeich Datenmodelle und Konfliktlösung im intelligenten Gebäudeumfeld MA Dr. Holger Kinkelin, Dr. Heiko Niedermayer, Marcel von Maltitz 2014
Cornelius Diekmann Security Requirement Modeling as Configuration Management for Scenario-Specific Networks MA Holger Kinkelin, Dr. Heiko Niedermayer 2013 Pdf
Simon Mittelberger Flexible and resilient services for user-centric identity management and access control MA Holger Kinkelin, Heiko Niedermayer 2013
Philip Wenger Bidirectional Data Queries with TinyIPFIX BA Corinna Schmitt, Heiko Niedermayer, Thomas Kothmayr 2013
Rupert Schneider Resource Depletion und Denial of Service Angriffe auf Xen und KVM BA Holger Kinkelin, Heiko Niedermayer 2013
Benedikt Peter Isolation Quality of Hypervisors BA Holger Kinkelin, Heiko Niedermayer 2012
Philipp Lowack Key Management and Secure Data Aggregation in Wireless Sensor Networks MA Corinna Schmitt, Heiko Niedermayer 2012 Pdf
Maximilian Szengel Spontaneous Private Networking - Governed by Security Policies Master thesis Ralph Holz, Christian Grothoff, Bart Polot, Heiko Niedermayer 2012 Pdf
Elias Tatros Evaluation of Different Caching Strategies for YouTube - Multimedia Content BA Alexander Klein, Heiko Niedermayer 2012 Pdf
David Ellermann Protecting against JavaScript-based attacks with signatures Bachelor thesis Ralph Holz, Heiko Niedermayer, Phillip Fehre 2011
Thomas Riedmaier Turning the Tables - Hunting the SSL/TLS Men-in-the-Middle Master thesis Ralph Holz, Heiko Niedermayer 2011 Pdf
Markus Sieber Online Anomaly Detection for Internet Services Masterarbeit Ali Fessi, Heiko Niedermayer 2011
Blaz Primc Authentisierende Adressierung in Netzwerken DA (University of Ljubljana, Slovenia) Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, Andreas Müller 2010
Deniz Ugurlu Understanding User Input in Home Networks Bachelor / Master / Diploma Thesis Heiko Niedermayer, Marc-Oliver Pahl 2010 Pdf
Sven Wiebusch Entwicklung und Bewertung richtlinienbasierter Sicherheitskonzepte in spontanen virtuellen Netzen Diplomarbeit Ralph Holz, Heiko Niedermayer 2009
Johann Schlamp Configuration Management via frequency analysis of synthetic load fluctuations Diplomarbeit Marc Fouquet, Heiko Niedermayer 2009 Pdf
Michael Herrmann Privacy in Online-Sozialen-Netzen Semesterprojekt Heiko Niedermayer 2009
Christoph Probst Signalbasierte Analyse von Abhängigkeiten bei Netzwerkdiensten Diplomarbeit, University of Tübingen Marc Fouquet, Heiko Niedermayer 2008
Ralph Holz Domain-Based Secure P2P Services: Concept and Implementation Diplomarbeit Ali Fessi, Heiko Niedermayer 2007
Johannes Riedl Authentication in Heterogeneous SIP-based P2P Networks Diplomarbeit Ali Fessi, Heiko Niedermayer 2007
Timo Teifel Clusterbasierter Peer-to-Peer Support für Online-Spiele Diplomarbeit, University of Tübingen Marc Fouquet, Heiko Niedermayer, Simon Rieche, Leo Petrak 2006
Andreas Rabius Sichere IP-Kommunikation Diplomarbeit, University of Tübingen Heiko Niedermayer, Gerhard Münz 2005
Jirko Cernik Peer-to-Peer-Infrastruktur für Massive Multiplayer Online Role-Playing Games (MMORPGs) Diplomarbeit, University of Tübingen Marc Fouquet, Heiko Niedermayer, Simon Rieche, Leo Petrak 2005

Publications

2018-04-01 Holger Kinkelin, Valentin Hauner, Heiko Niedermayer, Georg Carle, “Trustworthy Configuration Management for Networked Devices using Distributed Ledgers,” in NOMS 2018 - IEEE/IFIP DOMINOS workshop, Apr. 2018. [Preprint] [Bib]
2018-04-01 Michael Mitterer, Heiko Niedermayer, Marcel von Maltitz, Georg Carle, “An Experimental Performance Analysis of the Cryptographic Database ZeroDB,” in 1st Workshop on Privacy by Design in Distributed Systems (co-located with EuroSys), Apr. 2018. [Bib]
2018-02-01 F. Helfert, H. Niedermayer, G. Carle, “Evaluation of Algorithms for Multipath Route Selection over the Internet ,” in 14th International Workshop on Design of Reliable Communication Networks (DRCN), Feb. 2018. [Bib]
2017-11-01 Heiko Niedermayer, Nikolai Schwellnus, Daniel Raumer, Edwin Cordeiro, Georg Carle, “Information Mining from Public Mailing Lists: A Case Study on IETF Mailing Lists,” in Proceedings of the 4th international conference on Internet Science, INSCI2017, Thessaloniki, Greece, Nov. 2017. [Pdf] [Bib]
2016-09-01 Heiko Niedermayer, Daniel Raumer, Nikolai Schwellnus, Edwin Cordeiro, Georg Carle, “An Analysis of IETF Activities Using Mailing Lists and Social Media ,” in Proceedings of the third international conference on Internet Science, INSCI2016, Florence, Italy, Sep. 2016. [Pdf] [Bib]
2016-06-01 Jacek Rak, Heiko Niedermayer, Dimitri Papadimitriou, Pablo Romero, “Information-driven network resilience: Research challenges and perspectives,” Optical Switching and Networking, Jun. 2016. [Bib]
2014-10-01 Holger Kinkelin, Heiko Niedermayer, Simon Mittelberger, Georg Carle, “Human-Centric and Privacy-Protecting Trust Establishment over the Internet,” in Proceeding of the Seventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2014), Nice, France, Oct. 2014. [Bib]
2014-10-01 Holger Kinkelin, Marcel von Maltitz, Benedikt Peter, Cornelia Kappler, Heiko Niedermayer, Georg Carle, “Privacy Preserving Energy Management,” in Proceeding of City Labs Workshop in conjunction with the International Conference on Social Informatics (SocInfo 2014), Barcelona, Spain, Oct. 2014. [Pdf] [Bib]
2014-09-01 Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin, “Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services,” in Ninth International Conference on Availability, Reliability and Security (ARES), Sep. 2014, pp. 317–324. [Bib]
2014-06-01 Cornelius Diekmann, Stephan-A. Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, Georg Carle, “Verifying Security Policies using Host Attributes,” in FORTE – 34th IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems, Berlin, Germany, Jun. 2014, vol. 8461, pp. 133–148. [Pdf] [Preprint] [Slides] [Sourcecode] [Rawdata] [DOI] [Bib]
2013-10-01 Marc-Oliver Pahl, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “Enabling Sustainable Smart Neighborhoods,” in 3rd IFIP Conference on Sustainable Internet and ICT for Sustainability 2013 (SustainIT 2013), Palermo, Italy, Oct. 2013. [Pdf] [Bib]
2011-01-01 Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, Georg Carle, “On Using TPM for Secure Identities in Future Home Networks,” Future Internet, vol. 3, no. 1, pp. 1–13, 2011. [Pdf] [DOI] [Bib]
2010-10-29 Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Georg Carle, “On Using TPM for Secure Identities in Future Networks (ext. abstract),” in Proceedings of Security in NGNs and the Future Internet Workshop, Sep. 2010. [Bib]
2010-08-01 Ali Fessi, Nathan Evans, Heiko Niedermayer, Ralph Holz, “Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM,” in Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich, Aug. 2010. [Pdf] [Bib]
2010-07-01 Heiko Niedermayer, “Architecture and Components of secure and anonymous Peer-to-Peer Systems,” PhD thesis, Technische Universität München, Jul. 2010. [Pdf] [Bib]
2010-06-01 Holger Kinkelin, Heiko Niedermayer, Ralph Holz, Georg Carle, “TPM-based Access Control for the Future Internet (ext. abstract),” in 5th GI/ITG KuVS Workshop on Future Internet, Stuttgart, Germany, Jun. 2010. [Bib]
2009-12-01 Ralph Holz, Christoph P. Mayer, Sebastian Mies, Heiko Niedermayer, Muhammad Adnan Tariq, “SpoVNet Security Task Force Report,” Universität Karlsruhe, Karlsruhe, Germany, Technical Report TM-2009-3, Dec. 2009. [Pdf] [Homepage] [Bib]
2009-12-01 Marc Fouquet, Heiko Niedermayer, Georg Carle, “Cloud Computing for the Masses,” in Proceedings of the 1st ACM Workshop on User-provided Networking, co-located with CoNEXT 2009, Rome, Italy, Dec. 2009. [Bib]
2009-09-01 Heiko Niedermayer, Ralph Holz, Marc-Oliver Pahl, Georg Carle, “On Using Home Networks and Cloud Computing for a Future Internet of Things,” in Proc. Future Internet Symposium 2009 (FIS 2009), Berlin, Germany, Sep. 2009. [Bib]
2009-03-01 Dirk Haage, Ralph Holz, Heiko Niedermayer, Pavel Laskov, “CLIO – A Cross-Layer Information Service for Overlay Network Optimization,” in Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany, Mar. 2009. [Pdf] [Homepage] [Bib]
2008-12-01 Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, Georg Carle, “Clustering Players for Load Balancing in Virtual Worlds,” International Journal of Advanced Media and Communication (IJAMC), vol. 2, no. 4, pp. 351–363, Dec. 2008. [Bib]
2008-07-01 Georg Carle, Holger Kinkelin, Andreas Müller, Heiko Niedermayer, Marc-Oliver Pahl, Alexander König, Thomas Luckenbach, Klaus Scholl, Mario Schuster, Lasse Thiem, Leo Petrak, Markus Steinmetz, Christoph Niedermeier, Jürgen Reichmann, “Autonomic Home Networks in the BMBF project AutHoNe,” in 8th Würzburg Workshop on IP (EuroView 2008), Jul. 2008. [Bib]
2008-04-01 Ralph Holz, Heiko Niedermayer, “A Protocol for Inter-Domain Authentication with a Trust-Rating Mechanism.,” in 8. Kryptotag der GI-Fachgruppe KRYPTO (Workshop). Technical Report WSI-2008-02. University of Tübingen, Apr. 2008. [Bib]
2008-03-01 Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Timo Teifel, Georg Carle, “Clustering Players for Load Balancing in Virtual Worlds,” in Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008), Reno, Nevada, USA, Mar. 2008. [Bib]
2008-01-01 Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle, “Trust-Rated Authentication for Domain-Structured Distributed Systems,” in Proc. 5th European PKI Workshop: Theory and Practice (EuroPKI 2008), Trondheim, Norway, 2008. [Pdf] [Bib]
2007-11-01 Olaf Landsiedel, Alexis Pimenidis, Klaus Wehrle, Heiko Niedermayer, Georg Carle, “Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks,” in Proceedings of IEEE Global Communication Conference (GlobeCom), Washington, DC, USA, Nov. 2007. [Bib]
2007-07-01 Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services,” in Principles, Systems and Applications of IP Telecommunications (IPTComm), New York), Jul. 2007. [Pdf] [Bib]
2007-01-01 Simon Rieche, Klaus Wehrle, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Georg Carle, “Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games,” in Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, Nevada, USA, Jan. 2007. [Pdf] [Bib]
2007-01-01 Ali Fessi, Heiko Niedermayer, Holger Kinkelin, Georg Carle, “CoSIP - a hybrid architecture for reliable and secure SIP services,” Praxis in der Informationsverarbeitung und Kommunikation (PIK), special issue on Voice over IP, 2007. [Bib]
2006-11-01 Andreas Klenk, Heiko Niedermayer, Marcus Masekowsky, Georg Carle, “An Architecture for Autonomic Security Adaptation,” Journal Annals of the Telecommunications, vol. 61, no. 9/10, Nov. 2006. [Pdf] [Bib]
2006-08-01 Simon Rieche, Marc Fouquet, Heiko Niedermayer, Leo Petrak, Klaus Wehrle, Georg Carle, “Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games,” Wilhelm-Schickard-Institute for Computer Science, University of Tübingen, Tübingen, Germany, Technical Report WSI-2006-04, Aug. 2006. [Bib]
2006-06-30 T. Heer, H. Niedermayer, L. Petrak, S. Rieche, K. Wehrle, “On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios,” in Informatik 2004 (Workshop on Peer-to-Peer Systems), Ulm, Germany., Sep. 2004. [Bib]
2006-06-30 H. Niedermayer, S. Rieche, K. Wehrle, Georg Carle, “On the Distribution of Nodes in Distributed Hash Tables,” in KiVS 2005 (Workshop Peer-to-Peer-Systeme und Anwendungen), Kaiserslautern, Germany., Mar. 2005. [Bib]
2006-06-30 O. Landsiedel, K. Wehrle, H. Niedermayer, “An Infrastructure for Anonymous Internet Services,” in International Workshop on Innovations In Web Infrastructure (IWI2005), 14th International World Wide Web Conference - WWW2005, Chiba/Tokyo, Japan, May 2005. [Bib]
2006-06-30 O. Landsiedel, S. Rieche, H. Niedermayer, K. Wehrle, Georg Carle, “Anonymous IP-Services via Overlay Routing,” in Extended Abstract at 5th Würzburger Workshop IP Netzmanagement,IP Netzplanung und Optimierung, Würzburg, Jul. 2005. [Bib]
2006-06-30 H. Niedermayer, O. Rose, “Solution Approaches for the Cluster Tool Scheduling Problem in Semiconductor Manufacturing,” in ESS 2004 (16th European Simulation Symposium), Budapest, Hungary., Oct. 2004. [Bib]
2006-06-30 Heiko Niedermayer, Andreas Klenk, Georg Carle, “The Networking Perspective of Security Performance - a Measurement Study -,” in MMB 2006, Nürnberg, Germany, Mar. 2006. [Pdf] [Bib]
2006-06-30 H. Niedermayer, O. Rose, “Approximation of Cycle Times of Cluster Tools in Semiconductor Manufacturing,” in IERC 2004 (Industrial Engineering Research Conference), Houston, Texas., May 2004. [Bib]
2006-06-30 Simon Rieche, Marc Fouquet, Heiko Niedermayer, Klaus Wehrle, Georg Carle, “On the Use of Structured Peer-to-Peer Systems for Online Gaming,” in Extended Abstract at 5th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, Jul. 2005. [Pdf] [Bib]
2006-06-30 Heiko Niedermayer, Klaus Wehrle, Thomas Schreiner, Georg Carle, “Considering Security in Distributed Hash Tables,” in Abstract at 4th Würzburger Workshop IP Netzmanagement, IP Netzplanung und Optimierung, Würzburg, Germany., Jul. 2004. [Bib]
2006-06-30 S. Rieche, K. Wehrle, H. Niedermayer, S. Götz, “Reliability and Load Balancing in DHTs,” in chapter in the book Ralf Steinmetz, Klaus Wehrle (Eds.) Peer-to-Peer Systems and Applications, Lecture Notes in Computer Science Volume 3485, 657 pages, Springer, Sep. 2005, pp. 129–146. [Bib]
2006-06-30 H. Niedermayer, “Optimierungsmethoden für Fabriken mit Clustertool-Workcentern.” talk on the 7th Workshop Simulation und Leistungsbewertung von Fertigungssystemen(Performance Analysis and Simulation in Manufacturing), TU Dresden, Germany., Nov-2004. [Bib]
2006-06-30 H. Niedermayer, O. Rose, “A Simulation-Based Analysis of the Cycle Time of Cluster Tools in Semiconductor Manufacturing,” in 5th European Simulation Symposium, Delft, Netherlands., Oct. 2003. [Bib]
2006-06-30 Andreas Klenk, Marcus Masekowsky, Heiko Niedermayer, Georg Carle, “ESAF - an Extensible Security Adaptation Framework,” in 10th Nordic Workshop on Secure IT-systems, Tartu, Estonia, Oct. 2005. [Pdf] [Bib]
2006-06-30 K. Wehrle, H. Niedermayer, “Improving Performance-oriented Simulation Models for Communication Networks,” in MSO 2004 (Modelling, Simulation, and Optimization), Kauai, Hawaii., Aug. 2004. [Bib]
2006-06-30 H. Niedermayer, “Scheduling von Clustertools.” talk on the 6th Workshop Leistungsbewertung und Simulation von Fertigungsanlagen(Performance Analysis and Simulation in Manufacturing), Würzburg, Germany, Nov-2003. [Bib]