Marvin Ferber

Marvin Ferber
Berufsakademie Sachsen Staatliche Studienakademie Glauchau University of Cooperative Eucation · Business Information Systems

Professor

About

15
Publications
10,763
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
78
Citations
Citations since 2017
0 Research Items
45 Citations
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
Additional affiliations
May 2016 - June 2016
KU Leuven
Position
  • Researcher
Description
  • Multi-paradigm modeling for advanced UAV applications and computation offloading
August 2014 - October 2016
Technische Universität Bergakademie Freiberg
Position
  • PhD Student
Description
  • teaching mobile robotics research on mining robotics and networking underground
November 2008 - July 2014
University of Bayreuth
Position
  • PhD Student
Description
  • teaching parallel and distributed systems research on mobile cloud computing and web services
Education
October 2003 - October 2008
Technische Universität Chemnitz
Field of study
  • computer science

Publications

Publications (15)
Poster
Full-text available
The application of mobile robots in underground mines is highly desirable in smart mining of the future. As state estimation is crucial when operating mobile robots in an underground environment, we present a comparison of different odometry approaches and report on key difficulties that arise from this unique terrain. In contrast to above-ground a...
Article
Full-text available
Infrastructure-as-a-service offerings and the continuous evolution of wireless network technologies facilitate the integration of remote services into mobile applications. In contrast to cloud data stores, the mobile usage of cloud-based compute services is still underdeveloped. Platform-as-a-service offerings are not flexible enough to serve mobil...
Conference Paper
Full-text available
Virtual reality (VR) simulations involving highly detailed, realistic 3D models of underground mines offer significant cost and safety benefits in many application areas, including equipment prototyping, operator training, rescue simulations, and education. However, the generation of high-detail models of real mines is a time-consuming task. Conven...
Conference Paper
Full-text available
Mobile robots have been making impressive inroads in a variety of domains. Within the Mining-RoX project, Technical University Bergakademie Freiberg is exploring a further frontier for mobile and autonomous robots: underground mines. The potential benefits of mobile robots in underground mining are plentiful as underground mines are strenuous and p...
Conference Paper
Full-text available
Learning and teaching parallel programming in Java can sometimes be tedious, because the correct behavior of a parallel program can hardly be debugged. A runtime monitoring can help to gather information on the behavior of a parallel program. As Java Bytecode is executed inside a JVM, a runtime monitoring can be applied with almost no changes to th...
Article
Full-text available
Virtual Reality (VR) simulations involving highly detailed, realistic 3D models of underground mines offer significant cost and safety benefits in many applicationareas,including equipment prototyping, operator training, rescue simulations, and education. However, the generation of high-detail models of real mines is a time-consuming task. Conventi...
Conference Paper
Full-text available
The usage of remote compute and storage resources is becoming popular to assist mobile devices. However, existing frameworks that support mobile client/server applications do not consider the provision of resources in a large scale. Although a cloud-based infrastructure may provide a large number of resources on demand, most cloud offerings do not...
Conference Paper
Full-text available
Network latency is often high on mobile devices due to wireless access, e. g., via 3G cellular networks. To better use the ubiquitously available 3G network connections, we propose a pipelining task concept on a single encrypted channel between a mobile device and a cloud resource. This does not only increases wireless bandwidth occupation, it also...
Conference Paper
Full-text available
Mobile devices such as netbooks, smartphones, and tablets have made computing ubiquitous. However, such battery powered devices often have limited computing power for the benefit of an extended runtime. Nevertheless, despite the reduced processing power, users expect to perform the same types of operations as they could do using their desktop or la...
Conference Paper
Full-text available
Current approaches of accessing stateful resources via SOAP Web services do not provide a standardized way to use program objects (classes). In this article, we show how the interface of an object-oriented class can be expressed using WSDL. This approach enables a program object to be used in a distributed environment by accessing its Web service i...
Article
Full-text available
Im Projekt TransBS wurden existierende, über viele Jahre gewachsene Softwaresysteme zur Realisierung von Geschäftsprozessen betrachtet, in denen Aspekte wie Verteiltheit, Anpassbarkeit an heterogene Plattformen oder Skalierbarkeit zunehmend Bedeutung erlangen. Die notwendigen Anpassungen der Systeme sind nur schwierig und mit erheblichem Aufwand zu...
Conference Paper
Full-text available
Service-orientation and object-oriented design are common practice in the field of business application development. Business process execution languages help to facilitate the orchestration of Web services in service-oriented architectures (SOA). However, using business processes from within object-oriented and event-driven applications is difficu...
Conference Paper
Full-text available
With the rapid growth of the complexity of software systems, the problem of integrating and maintaining legacy software is more relevant than ever. To overcome this problem, many methods for refactoring legacy code have already been proposed such as renaming classes or extracting interfaces. To perform a real modularization, methods have to be move...
Conference Paper
Full-text available
Business workflows implemented as BPEL processes play an important role for many business applications. BPEL is used to orchestrate a series of Web service calls. Which provider is used for a specific Web service request is statically defined as endpoint of a Web service call within the BPEL code. If a Web service is offered by more than one provid...

Network

Cited By