[{"user_id":"220548","publication_identifier":{"eisbn":["978-3-031-53652-6"],"isbn":["978-3-031-53651-9"]},"type":"book_chapter","publication":"Integrated Systems: Data Driven Engineering","publication_status":"published","date_created":"2025-03-18T09:22:34Z","title":"Semantically Enriched Interfaces for Product Configuration","language":[{"iso":"eng"}],"_id":"5829","editor":[{"first_name":"Mohammad-Reza","last_name":"Alam","full_name":"Alam, Mohammad-Reza"},{"last_name":"Fathi","full_name":"Fathi, Madjid","first_name":"Madjid"}],"year":"2024","status":"public","author":[{"orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","last_name":"Berlik","first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308417"},{"last_name":"Hartmann","full_name":"Hartmann, Philipp","first_name":"Philipp"},{"last_name":"Stranghöner","full_name":"Stranghöner, Jannick","first_name":"Jannick"}],"citation":{"mla":"Berlik, Stefan, et al. “Semantically Enriched Interfaces for Product Configuration.” <i>Integrated Systems: Data Driven Engineering</i>, edited by Mohammad-Reza Alam and Madjid Fathi, Springer Nature Switzerland, 2024, pp. 183–93, doi:<a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">10.1007/978-3-031-53652-6_11</a>.","ama":"Berlik S, Hartmann P, Stranghöner J. Semantically Enriched Interfaces for Product Configuration. In: Alam M-R, Fathi M, eds. <i>Integrated Systems: Data Driven Engineering</i>. Cham: Springer Nature Switzerland; 2024:183-193. doi:<a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">10.1007/978-3-031-53652-6_11</a>","chicago":"Berlik, Stefan, Philipp Hartmann, and Jannick Stranghöner. “Semantically Enriched Interfaces for Product Configuration.” In <i>Integrated Systems: Data Driven Engineering</i>, edited by Mohammad-Reza Alam and Madjid Fathi, 183–93. Cham: Springer Nature Switzerland, 2024. <a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">https://doi.org/10.1007/978-3-031-53652-6_11</a>.","short":"S. Berlik, P. Hartmann, J. Stranghöner, in: M.-R. Alam, M. Fathi (Eds.), Integrated Systems: Data Driven Engineering, Springer Nature Switzerland, Cham, 2024, pp. 183–193.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Hartmann, Philipp</span> ; <span style=\"font-variant:small-caps;\">Stranghöner, Jannick</span>: Semantically Enriched Interfaces for Product Configuration. In: <span style=\"font-variant:small-caps;\">Alam, M.-R.</span> ; <span style=\"font-variant:small-caps;\">Fathi, M.</span> (Hrsg.): <i>Integrated Systems: Data Driven Engineering</i>. Cham : Springer Nature Switzerland, 2024, S. 183–193","apa":"Berlik, S., Hartmann, P., &#38; Stranghöner, J. (2024). Semantically Enriched Interfaces for Product Configuration. In M.-R. Alam &#38; M. Fathi (Eds.), <i>Integrated Systems: Data Driven Engineering</i> (pp. 183–193). Cham: Springer Nature Switzerland. <a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">https://doi.org/10.1007/978-3-031-53652-6_11</a>","bibtex":"@inbook{Berlik_Hartmann_Stranghöner_2024, place={Cham}, title={Semantically Enriched Interfaces for Product Configuration}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">10.1007/978-3-031-53652-6_11</a>}, booktitle={Integrated Systems: Data Driven Engineering}, publisher={Springer Nature Switzerland}, author={Berlik, Stefan and Hartmann, Philipp and Stranghöner, Jannick}, editor={Alam, Mohammad-Reza and Fathi, MadjidEditors}, year={2024}, pages={183–193} }","ieee":"S. Berlik, P. Hartmann, and J. Stranghöner, “Semantically Enriched Interfaces for Product Configuration,” in <i>Integrated Systems: Data Driven Engineering</i>, M.-R. Alam and M. Fathi, Eds. Cham: Springer Nature Switzerland, 2024, pp. 183–193."},"place":"Cham","date_updated":"2026-03-17T15:29:22Z","page":"183-193","publisher":"Springer Nature Switzerland","doi":"10.1007/978-3-031-53652-6_11"},{"date_updated":"2026-03-17T15:29:23Z","publisher":"DG Nexolution","citation":{"ieee":"S. Berlik, “Maschinelles Lernen: Ein Blick hinter die Kulissen,” in <i>Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden</i>, J. Bauer , N. Baum , and S. Berlik, Eds. DG Nexolution, 2022.","bibtex":"@inbook{Berlik_2022, title={Maschinelles Lernen: Ein Blick hinter die Kulissen}, booktitle={Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden}, publisher={DG Nexolution}, author={Berlik, Stefan}, editor={Bauer , Janis  and Baum , Nico and Berlik, StefanEditors}, year={2022} }","apa":"Berlik, S. (2022). Maschinelles Lernen: Ein Blick hinter die Kulissen. In J. Bauer , N. Baum , &#38; S. Berlik (Eds.), <i>Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden</i>. DG Nexolution.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: Maschinelles Lernen: Ein Blick hinter die Kulissen. In: <span style=\"font-variant:small-caps;\">Bauer , J.</span> ; <span style=\"font-variant:small-caps;\">Baum , N.</span> ; <span style=\"font-variant:small-caps;\">Berlik, S.</span> (Hrsg.): <i>Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden</i> : DG Nexolution, 2022","short":"S. Berlik, in: J. Bauer , N. Baum , S. Berlik (Eds.), Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden, DG Nexolution, 2022.","chicago":"Berlik, Stefan. “Maschinelles Lernen: Ein Blick Hinter Die Kulissen.” In <i>Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden</i>, edited by Janis  Bauer , Nico Baum , and Stefan Berlik. DG Nexolution, 2022.","ama":"Berlik S. Maschinelles Lernen: Ein Blick hinter die Kulissen. In: Bauer  J, Baum  N, Berlik S, eds. <i>Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden</i>. DG Nexolution; 2022.","mla":"Berlik, Stefan. “Maschinelles Lernen: Ein Blick Hinter Die Kulissen.” <i>Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden</i>, edited by Janis  Bauer  et al., DG Nexolution, 2022."},"author":[{"last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180326017","id":"237529"}],"status":"public","editor":[{"last_name":"Bauer ","full_name":"Bauer , Janis ","first_name":"Janis "},{"first_name":"Nico","last_name":"Baum ","full_name":"Baum , Nico"},{"last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","id":"237529","first_name":"Stefan"}],"_id":"5847","year":"2022","language":[{"iso":"eng"}],"date_created":"2025-03-18T13:40:56Z","title":"Maschinelles Lernen: Ein Blick hinter die Kulissen","publication":"Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden","type":"book_chapter","publication_identifier":{"isbn":["978-3-87151-299-5"]},"user_id":"220548"},{"publication":"Proceedings of the ninth international workshop on personal computers and particle accelerator controls","user_id":"220548","corporate_editor":["Variable Energy Cyclotron Center"],"main_file_link":[{"url":"https://accelconf.web.cern.ch/pcapac2012/html/keyw0056.htm"}],"type":"conference_abstract","publication_identifier":{"isbn":["9783954501243"]},"title":"Adaptive fuzzy control for transfer channels in particle accelerators","date_created":"2025-03-18T14:22:25Z","language":[{"iso":"eng"}],"year":"2012","_id":"5848","date_updated":"2026-03-17T15:29:23Z","conference":{"location":"Kolkata (India)","name":" PCaPAC 2012 - 9th International Workshop on Personal Computers and Particle Accelerator Controls","end_date":"2012-12-07","start_date":"2012-12-04"},"status":"public","author":[{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180328891","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"},{"first_name":"Heiko","last_name":"Ehrlichmann","full_name":"Ehrlichmann, Heiko"}],"citation":{"apa":"Berlik, S., &#38; Ehrlichmann, H. (2012). Adaptive fuzzy control for transfer channels in particle accelerators. In Variable Energy Cyclotron Center (Ed.), <i>Proceedings of the ninth international workshop on personal computers and particle accelerator controls</i>. Kolkata (India).","bibtex":"@inproceedings{Berlik_Ehrlichmann_2012, title={Adaptive fuzzy control for transfer channels in particle accelerators}, booktitle={Proceedings of the ninth international workshop on personal computers and particle accelerator controls}, author={Berlik, Stefan and Ehrlichmann, Heiko}, editor={Variable Energy Cyclotron CenterEditor}, year={2012} }","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Ehrlichmann, Heiko</span>: Adaptive fuzzy control for transfer channels in particle accelerators. In: <span style=\"font-variant:small-caps;\">Variable Energy Cyclotron Center</span> (Hrsg.): <i>Proceedings of the ninth international workshop on personal computers and particle accelerator controls</i>, 2012","ieee":"S. Berlik and H. Ehrlichmann, “Adaptive fuzzy control for transfer channels in particle accelerators,” in <i>Proceedings of the ninth international workshop on personal computers and particle accelerator controls</i>, Kolkata (India), 2012.","ama":"Berlik S, Ehrlichmann H. Adaptive fuzzy control for transfer channels in particle accelerators. In: Variable Energy Cyclotron Center, ed. <i>Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls</i>. ; 2012.","mla":"Berlik, Stefan, and Heiko Ehrlichmann. “Adaptive Fuzzy Control for Transfer Channels in Particle Accelerators.” <i>Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls</i>, edited by Variable Energy Cyclotron Center, 2012.","chicago":"Berlik, Stefan, and Heiko Ehrlichmann. “Adaptive Fuzzy Control for Transfer Channels in Particle Accelerators.” In <i>Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls</i>, edited by Variable Energy Cyclotron Center, 2012.","short":"S. Berlik, H. Ehrlichmann, in: Variable Energy Cyclotron Center (Ed.), Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls, 2012."}},{"_id":"5830","editor":[{"last_name":"Fathi","full_name":"Fathi, Madjid","first_name":"Madjid"},{"last_name":"Holland","full_name":"Holland, Alexander","first_name":"Alexander"},{"last_name":"Ansari","full_name":"Ansari, Fazel","first_name":"Fazel"},{"first_name":"Christian","last_name":"Weber","full_name":"Weber, Christian"}],"year":"2011","language":[{"iso":"eng"}],"doi":"10.1007/978-3-642-17384-4_23","date_updated":"2026-03-17T15:29:22Z","publisher":"Springer Berlin Heidelberg","page":"293-300","citation":{"mla":"Berlik, Stefan. “A Generic Knowledge Integration Approach for Complex Process Control.” <i>Integrated Systems, Design and Technology 2010</i>, edited by Madjid Fathi et al., Springer Berlin Heidelberg, 2011, pp. 293–300, doi:<a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">10.1007/978-3-642-17384-4_23</a>.","ama":"Berlik S. A Generic Knowledge Integration Approach for Complex Process Control. In: Fathi M, Holland A, Ansari F, Weber C, eds. <i>Integrated Systems, Design and Technology 2010</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011:293-300. doi:<a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">10.1007/978-3-642-17384-4_23</a>","chicago":"Berlik, Stefan. “A Generic Knowledge Integration Approach for Complex Process Control.” In <i>Integrated Systems, Design and Technology 2010</i>, edited by Madjid Fathi, Alexander Holland, Fazel Ansari, and Christian Weber, 293–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. <a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">https://doi.org/10.1007/978-3-642-17384-4_23</a>.","short":"S. Berlik, in: M. Fathi, A. Holland, F. Ansari, C. Weber (Eds.), Integrated Systems, Design and Technology 2010, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 293–300.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: A Generic Knowledge Integration Approach for Complex Process Control. In: <span style=\"font-variant:small-caps;\">Fathi, M.</span> ; <span style=\"font-variant:small-caps;\">Holland, A.</span> ; <span style=\"font-variant:small-caps;\">Ansari, F.</span> ; <span style=\"font-variant:small-caps;\">Weber, C.</span> (Hrsg.): <i>Integrated Systems, Design and Technology 2010</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011, S. 293–300","bibtex":"@inproceedings{Berlik_2011, place={Berlin, Heidelberg}, title={A Generic Knowledge Integration Approach for Complex Process Control}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">10.1007/978-3-642-17384-4_23</a>}, booktitle={Integrated Systems, Design and Technology 2010}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan}, editor={Fathi, Madjid and Holland, Alexander and Ansari, Fazel and Weber, ChristianEditors}, year={2011}, pages={293–300} }","apa":"Berlik, S. (2011). A Generic Knowledge Integration Approach for Complex Process Control. In M. Fathi, A. Holland, F. Ansari, &#38; C. Weber (Eds.), <i>Integrated Systems, Design and Technology 2010</i> (pp. 293–300). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">https://doi.org/10.1007/978-3-642-17384-4_23</a>","ieee":"S. Berlik, “A Generic Knowledge Integration Approach for Complex Process Control,” in <i>Integrated Systems, Design and Technology 2010</i>, Siegen, Germany, 2011, pp. 293–300."},"author":[{"last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308341","id":"237529"}],"place":"Berlin, Heidelberg","status":"public","conference":{"start_date":"2010-06-07","end_date":"2010-06-09","name":"4th International Joint Conference on Integrated Systems: Design and Technology","location":"Siegen, Germany"},"publication_status":"published","publication":"Integrated Systems, Design and Technology 2010","publication_identifier":{"isbn":["978-3-642-17383-7"],"eisbn":["978-3-642-17384-4"]},"type":"conference","user_id":"220548","date_created":"2025-03-18T09:22:35Z","title":"A Generic Knowledge Integration Approach for Complex Process Control"},{"year":"2011","_id":"5831","language":[{"iso":"eng"}],"doi":"10.1109/NTMS.2011.5720654","publisher":"IEEE","page":"1-6","date_updated":"2026-03-17T15:29:22Z","citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Bourimi, Mohamed</span> ; <span style=\"font-variant:small-caps;\">Ossowski, Jorn</span> ; <span style=\"font-variant:small-caps;\">Abou-Tair, Dhiah El-Diehn I</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Abu-Saymeh, Dirar</span>: Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i> : IEEE, 2011, S. 1–6","apa":"Bourimi, M., Ossowski, J., Abou-Tair, D. E.-D. I., Berlik, S., &#38; Abu-Saymeh, D. (2011). Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs. In IEEE (Ed.), <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i> (pp. 1–6). Paris: IEEE. <a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">https://doi.org/10.1109/NTMS.2011.5720654</a>","bibtex":"@inproceedings{Bourimi_Ossowski_Abou-Tair_Berlik_Abu-Saymeh_2011, title={Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs}, DOI={<a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">10.1109/NTMS.2011.5720654</a>}, booktitle={2011 4th IFIP International Conference on New Technologies, Mobility and Security}, publisher={IEEE}, author={Bourimi, Mohamed and Ossowski, Jorn and Abou-Tair, Dhiah El-Diehn I and Berlik, Stefan and Abu-Saymeh, Dirar}, editor={IEEEEditor}, year={2011}, pages={1–6} }","ieee":"M. Bourimi, J. Ossowski, D. E.-D. I. Abou-Tair, S. Berlik, and D. Abu-Saymeh, “Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs,” in <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>, Paris, 2011, pp. 1–6.","mla":"Bourimi, Mohamed, et al. “Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs.” <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>, edited by IEEE, IEEE, 2011, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">10.1109/NTMS.2011.5720654</a>.","ama":"Bourimi M, Ossowski J, Abou-Tair DE-DI, Berlik S, Abu-Saymeh D. Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs. In: IEEE, ed. <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>. IEEE; 2011:1-6. doi:<a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">10.1109/NTMS.2011.5720654</a>","short":"M. Bourimi, J. Ossowski, D.E.-D.I. Abou-Tair, S. Berlik, D. Abu-Saymeh, in: IEEE (Ed.), 2011 4th IFIP International Conference on New Technologies, Mobility and Security, IEEE, 2011, pp. 1–6.","chicago":"Bourimi, Mohamed, Jorn Ossowski, Dhiah El-Diehn I Abou-Tair, Stefan Berlik, and Dirar Abu-Saymeh. “Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs.” In <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>, edited by IEEE, 1–6. IEEE, 2011. <a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">https://doi.org/10.1109/NTMS.2011.5720654</a>."},"author":[{"full_name":"Bourimi, Mohamed","last_name":"Bourimi","first_name":"Mohamed"},{"last_name":"Ossowski","full_name":"Ossowski, Jorn","first_name":"Jorn"},{"full_name":"Abou-Tair, Dhiah El-Diehn I","last_name":"Abou-Tair","first_name":"Dhiah El-Diehn I"},{"full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308334","first_name":"Stefan"},{"full_name":"Abu-Saymeh, Dirar","last_name":"Abu-Saymeh","first_name":"Dirar"}],"conference":{"location":"Paris","name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011)","start_date":"2011-02-07","end_date":"2011-02-10"},"status":"public","publication":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","publication_status":"published","publication_identifier":{"isbn":["978-1-4244-8705-9"]},"type":"conference","user_id":"220548","corporate_editor":["IEEE"],"title":"Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs","date_created":"2025-03-18T09:22:36Z"},{"title":"An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry","date_created":"2025-03-18T09:22:38Z","publication":"Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications","series_title":"Communications in Computer and Information Science","publication_status":"published","publication_identifier":{"eissn":["1865-0937"],"isbn":["978-3-642-14057-0"],"eisbn":["978-3-642-14058-7"],"issn":["1865-0929"]},"type":"conference","user_id":"220548","doi":"10.1007/978-3-642-14058-7_75","page":"729-736","publisher":"Springer Berlin Heidelberg","date_updated":"2026-03-17T15:29:22Z","place":"Berlin, Heidelberg","citation":{"ama":"Berlik S, Nasiri M. An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry. In: Hüllermeier E, Kruse R, Hoffmann F, eds. <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>. Communications in Computer and Information Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010:729-736. doi:<a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">10.1007/978-3-642-14058-7_75</a>","mla":"Berlik, Stefan, and Maryam Nasiri. “An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry.” <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, edited by Eyke Hüllermeier et al., Springer Berlin Heidelberg, 2010, pp. 729–36, doi:<a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">10.1007/978-3-642-14058-7_75</a>.","short":"S. Berlik, M. Nasiri, in: E. Hüllermeier, R. Kruse, F. Hoffmann (Eds.), Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010, pp. 729–736.","chicago":"Berlik, Stefan, and Maryam Nasiri. “An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry.” In <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, edited by Eyke Hüllermeier, Rudolf Kruse, and Frank Hoffmann, 729–36. Communications in Computer and Information Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. <a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">https://doi.org/10.1007/978-3-642-14058-7_75</a>.","apa":"Berlik, S., &#38; Nasiri, M. (2010). An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry. In E. Hüllermeier, R. Kruse, &#38; F. Hoffmann (Eds.), <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i> (pp. 729–736). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">https://doi.org/10.1007/978-3-642-14058-7_75</a>","bibtex":"@inproceedings{Berlik_Nasiri_2010, place={Berlin, Heidelberg}, series={Communications in Computer and Information Science}, title={An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">10.1007/978-3-642-14058-7_75</a>}, booktitle={Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan and Nasiri, Maryam}, editor={Hüllermeier, Eyke and Kruse, Rudolf and Hoffmann, FrankEditors}, year={2010}, pages={729–736}, collection={Communications in Computer and Information Science} }","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Nasiri, Maryam</span>: An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry. In: <span style=\"font-variant:small-caps;\">Hüllermeier, E.</span> ; <span style=\"font-variant:small-caps;\">Kruse, R.</span> ; <span style=\"font-variant:small-caps;\">Hoffmann, F.</span> (Hrsg.): <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, <i>Communications in Computer and Information Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010, S. 729–736","ieee":"S. Berlik and M. Nasiri, “An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry,” in <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, Dortmund, Germany, 2010, pp. 729–736."},"author":[{"orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308318","id":"237529","first_name":"Stefan","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik"},{"last_name":"Nasiri","full_name":"Nasiri, Maryam","first_name":"Maryam"}],"conference":{"end_date":"2010-07-02","start_date":"2010-06-28","name":"13th International Conference, IPMU 2010","location":"Dortmund, Germany"},"status":"public","year":"2010","_id":"5832","editor":[{"full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","first_name":"Eyke"},{"first_name":"Rudolf","full_name":"Kruse, Rudolf","last_name":"Kruse"},{"first_name":"Frank","last_name":"Hoffmann","full_name":"Hoffmann, Frank"}],"language":[{"iso":"eng"}]},{"doi":"10.1109/IRI.2007.4296667","date_updated":"2026-03-17T15:29:22Z","page":"486-491","publisher":"IEEE","citation":{"ieee":"S. Berlik and M. Fathi, “Differences of Structured Documents - Improving their Quality,” in <i>2007 IEEE International Conference on Information Reuse and Integration</i>, Las Vegas, NV, USA, 2007, pp. 486–491.","bibtex":"@inproceedings{Berlik_Fathi_2007, title={Differences of Structured Documents - Improving their Quality}, DOI={<a href=\"https://doi.org/10.1109/IRI.2007.4296667\">10.1109/IRI.2007.4296667</a>}, booktitle={2007 IEEE International Conference on Information Reuse and Integration}, publisher={IEEE}, author={Berlik, Stefan and Fathi, Madjid}, editor={IEEEEditor}, year={2007}, pages={486–491} }","apa":"Berlik, S., &#38; Fathi, M. (2007). Differences of Structured Documents - Improving their Quality. In IEEE (Ed.), <i>2007 IEEE International Conference on Information Reuse and Integration</i> (pp. 486–491). Las Vegas, NV, USA: IEEE. <a href=\"https://doi.org/10.1109/IRI.2007.4296667\">https://doi.org/10.1109/IRI.2007.4296667</a>","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Fathi, Madjid</span>: Differences of Structured Documents - Improving their Quality. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2007 IEEE International Conference on Information Reuse and Integration</i> : IEEE, 2007, S. 486–491","chicago":"Berlik, Stefan, and Madjid Fathi. “Differences of Structured Documents - Improving Their Quality.” In <i>2007 IEEE International Conference on Information Reuse and Integration</i>, edited by IEEE, 486–91. IEEE, 2007. <a href=\"https://doi.org/10.1109/IRI.2007.4296667\">https://doi.org/10.1109/IRI.2007.4296667</a>.","short":"S. Berlik, M. Fathi, in: IEEE (Ed.), 2007 IEEE International Conference on Information Reuse and Integration, IEEE, 2007, pp. 486–491.","ama":"Berlik S, Fathi M. Differences of Structured Documents - Improving their Quality. In: IEEE, ed. <i>2007 IEEE International Conference on Information Reuse and Integration</i>. IEEE; 2007:486-491. doi:<a href=\"https://doi.org/10.1109/IRI.2007.4296667\">10.1109/IRI.2007.4296667</a>","mla":"Berlik, Stefan, and Madjid Fathi. “Differences of Structured Documents - Improving Their Quality.” <i>2007 IEEE International Conference on Information Reuse and Integration</i>, edited by IEEE, IEEE, 2007, pp. 486–91, doi:<a href=\"https://doi.org/10.1109/IRI.2007.4296667\">10.1109/IRI.2007.4296667</a>."},"author":[{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308315","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"},{"full_name":"Fathi, Madjid","last_name":"Fathi","first_name":"Madjid"}],"status":"public","conference":{"location":"Las Vegas, NV, USA","name":"2007 IEEE International Conference on Information Reuse and Integration","end_date":"2007-08-15","start_date":"2007-08-13"},"_id":"5833","year":"2007","language":[{"iso":"eng"}],"date_created":"2025-03-18T09:22:39Z","title":"Differences of Structured Documents - Improving their Quality","publication":"2007 IEEE International Conference on Information Reuse and Integration","publication_status":"published","type":"conference","publication_identifier":{"isbn":["1-4244-1499-7","1-4244-1500-4"]},"corporate_editor":["IEEE"],"user_id":"220548"},{"publication":"Third International Symposium on Information Assurance and Security","publication_status":"published","corporate_editor":["IEEE"],"user_id":"220548","publication_identifier":{"isbn":["0-7695-2876-7"]},"type":"conference","date_created":"2025-03-18T09:22:40Z","title":"Enforcing Privacy by Means of an Ontology Driven XACML Framework","language":[{"iso":"eng"}],"_id":"5834","year":"2007","date_updated":"2026-03-17T15:29:22Z","page":"279-284","publisher":"IEEE","doi":"10.1109/IAS.2007.52","status":"public","conference":{"end_date":"2007-08-31","start_date":"2007-08-29","location":"Manchester","name":"2007 3rd International Symposium on Information Assurance and Security"},"citation":{"chicago":"Abou-Tair, Dhiah el Diehn I., Stefan Berlik, and Udo Kelter. “Enforcing Privacy by Means of an Ontology Driven XACML Framework.” In <i>Third International Symposium on Information Assurance and Security</i>, edited by IEEE, 279–84. IEEE, 2007. <a href=\"https://doi.org/10.1109/IAS.2007.52\">https://doi.org/10.1109/IAS.2007.52</a>.","short":"D. el D.I. Abou-Tair, S. Berlik, U. Kelter, in: IEEE (Ed.), Third International Symposium on Information Assurance and Security, IEEE, 2007, pp. 279–284.","ama":"Abou-Tair D el DI, Berlik S, Kelter U. Enforcing Privacy by Means of an Ontology Driven XACML Framework. In: IEEE, ed. <i>Third International Symposium on Information Assurance and Security</i>. IEEE; 2007:279-284. doi:<a href=\"https://doi.org/10.1109/IAS.2007.52\">10.1109/IAS.2007.52</a>","mla":"Abou-Tair, Dhiah el Diehn I., et al. “Enforcing Privacy by Means of an Ontology Driven XACML Framework.” <i>Third International Symposium on Information Assurance and Security</i>, edited by IEEE, IEEE, 2007, pp. 279–84, doi:<a href=\"https://doi.org/10.1109/IAS.2007.52\">10.1109/IAS.2007.52</a>.","ieee":"D. el D. I. Abou-Tair, S. Berlik, and U. Kelter, “Enforcing Privacy by Means of an Ontology Driven XACML Framework,” in <i>Third International Symposium on Information Assurance and Security</i>, Manchester, 2007, pp. 279–284.","apa":"Abou-Tair, D. el D. I., Berlik, S., &#38; Kelter, U. (2007). Enforcing Privacy by Means of an Ontology Driven XACML Framework. In IEEE (Ed.), <i>Third International Symposium on Information Assurance and Security</i> (pp. 279–284). Manchester: IEEE. <a href=\"https://doi.org/10.1109/IAS.2007.52\">https://doi.org/10.1109/IAS.2007.52</a>","bibtex":"@inproceedings{Abou-Tair_Berlik_Kelter_2007, title={Enforcing Privacy by Means of an Ontology Driven XACML Framework}, DOI={<a href=\"https://doi.org/10.1109/IAS.2007.52\">10.1109/IAS.2007.52</a>}, booktitle={Third International Symposium on Information Assurance and Security}, publisher={IEEE}, author={Abou-Tair, Dhiah el Diehn I. and Berlik, Stefan and Kelter, Udo}, editor={IEEEEditor}, year={2007}, pages={279–284} }","alphadin":"<span style=\"font-variant:small-caps;\">Abou-Tair, Dhiah el Diehn I.</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Kelter, Udo</span>: Enforcing Privacy by Means of an Ontology Driven XACML Framework. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>Third International Symposium on Information Assurance and Security</i> : IEEE, 2007, S. 279–284"},"author":[{"first_name":"Dhiah el Diehn I.","full_name":"Abou-Tair, Dhiah el Diehn I.","last_name":"Abou-Tair"},{"id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308309","first_name":"Stefan","last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501"},{"full_name":"Kelter, Udo","last_name":"Kelter","first_name":"Udo"}]},{"year":"2007","_id":"5835","editor":[{"full_name":"Crnkovic, Ivica","last_name":"Crnkovic","first_name":"Ivica"},{"first_name":"Antonia","last_name":"Bertolino","full_name":"Bertolino, Antonia"}],"language":[{"iso":"eng"}],"doi":"10.1145/1287624.1287665","publisher":"ACM","page":"295-304","date_updated":"2026-03-17T15:29:22Z","place":"New York, NY, USA","citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Treude, Christoph</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Wenzel, Sven</span> ; <span style=\"font-variant:small-caps;\">Kelter, Udo</span>: Difference computation of large models. In: <span style=\"font-variant:small-caps;\">Crnkovic, I.</span> ; <span style=\"font-variant:small-caps;\">Bertolino, A.</span> (Hrsg.): <i>Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering</i>. New York, NY, USA : ACM, 2007, S. 295–304","apa":"Treude, C., Berlik, S., Wenzel, S., &#38; Kelter, U. (2007). Difference computation of large models. In I. Crnkovic &#38; A. Bertolino (Eds.), <i>Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering</i> (pp. 295–304). New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/1287624.1287665\">https://doi.org/10.1145/1287624.1287665</a>","bibtex":"@inproceedings{Treude_Berlik_Wenzel_Kelter_2007, place={New York, NY, USA}, title={Difference computation of large models}, DOI={<a href=\"https://doi.org/10.1145/1287624.1287665\">10.1145/1287624.1287665</a>}, booktitle={Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering}, publisher={ACM}, author={Treude, Christoph and Berlik, Stefan and Wenzel, Sven and Kelter, Udo}, editor={Crnkovic, Ivica and Bertolino, AntoniaEditors}, year={2007}, pages={295–304} }","ieee":"C. Treude, S. Berlik, S. Wenzel, and U. Kelter, “Difference computation of large models,” in <i>Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering</i>, Dubrovnik Croatia, 2007, pp. 295–304.","mla":"Treude, Christoph, et al. “Difference Computation of Large Models.” <i>Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering</i>, edited by Ivica Crnkovic and Antonia Bertolino, ACM, 2007, pp. 295–304, doi:<a href=\"https://doi.org/10.1145/1287624.1287665\">10.1145/1287624.1287665</a>.","ama":"Treude C, Berlik S, Wenzel S, Kelter U. Difference computation of large models. In: Crnkovic I, Bertolino A, eds. <i>Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering</i>. New York, NY, USA: ACM; 2007:295-304. doi:<a href=\"https://doi.org/10.1145/1287624.1287665\">10.1145/1287624.1287665</a>","chicago":"Treude, Christoph, Stefan Berlik, Sven Wenzel, and Udo Kelter. “Difference Computation of Large Models.” In <i>Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering</i>, edited by Ivica Crnkovic and Antonia Bertolino, 295–304. New York, NY, USA: ACM, 2007. <a href=\"https://doi.org/10.1145/1287624.1287665\">https://doi.org/10.1145/1287624.1287665</a>.","short":"C. Treude, S. Berlik, S. Wenzel, U. Kelter, in: I. Crnkovic, A. Bertolino (Eds.), Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ACM, New York, NY, USA, 2007, pp. 295–304."},"author":[{"first_name":"Christoph","last_name":"Treude","full_name":"Treude, Christoph"},{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308304","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"},{"full_name":"Wenzel, Sven","last_name":"Wenzel","first_name":"Sven"},{"first_name":"Udo","full_name":"Kelter, Udo","last_name":"Kelter"}],"conference":{"end_date":"2007-09-07","start_date":"2007-09-03","location":"Dubrovnik Croatia","name":"ESEC/FSE07: Joint 11th European Software Engineering Conference 2007"},"status":"public","publication_status":"published","publication":"Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering","type":"conference","publication_identifier":{"isbn":["9781595938114"]},"user_id":"220548","title":"Difference computation of large models","date_created":"2025-03-18T09:22:42Z"},{"title":"An Evolutionary Optimization Method for Screw-Type Machines","date_created":"2025-03-18T09:22:51Z","volume":84,"type":"conference","publication_identifier":{"issn":["1759-3433"],"isbn":["1-905088-11-6"]},"user_id":"220548","series_title":"Civil-Comp Proceedings","publication_status":"published","publication":"Proceedings of the Fifth International Conference on Engineering Computational Technology","place":"Stirlingshire, UK","citation":{"mla":"Fathi, M., and Stefan Berlik. “An Evolutionary Optimization Method for Screw-Type Machines.” <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, edited by B.H.V. Topping et al., vol. 84, Civil-Comp Press, 2006, doi:<a href=\"https://doi.org/10.4203/ccp.84.44\">10.4203/ccp.84.44</a>.","ama":"Fathi M, Berlik S. An Evolutionary Optimization Method for Screw-Type Machines. In: Topping BHV, Montero G, Montenegro R, eds. <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>. Vol 84. Civil-Comp Proceedings. Stirlingshire, UK: Civil-Comp Press; 2006. doi:<a href=\"https://doi.org/10.4203/ccp.84.44\">10.4203/ccp.84.44</a>","chicago":"Fathi, M., and Stefan Berlik. “An Evolutionary Optimization Method for Screw-Type Machines.” In <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, edited by B.H.V. Topping, G. Montero, and R. Montenegro, Vol. 84. Civil-Comp Proceedings. Stirlingshire, UK: Civil-Comp Press, 2006. <a href=\"https://doi.org/10.4203/ccp.84.44\">https://doi.org/10.4203/ccp.84.44</a>.","short":"M. Fathi, S. Berlik, in: B.H.V. Topping, G. Montero, R. Montenegro (Eds.), Proceedings of the Fifth International Conference on Engineering Computational Technology, Civil-Comp Press, Stirlingshire, UK, 2006.","alphadin":"<span style=\"font-variant:small-caps;\">Fathi, M.</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: An Evolutionary Optimization Method for Screw-Type Machines. In: <span style=\"font-variant:small-caps;\">Topping, B. H. V.</span> ; <span style=\"font-variant:small-caps;\">Montero, G.</span> ; <span style=\"font-variant:small-caps;\">Montenegro, R.</span> (Hrsg.): <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, <i>Civil-Comp Proceedings</i>. Bd. 84. Stirlingshire, UK : Civil-Comp Press, 2006","apa":"Fathi, M., &#38; Berlik, S. (2006). An Evolutionary Optimization Method for Screw-Type Machines. In B. H. V. Topping, G. Montero, &#38; R. Montenegro (Eds.), <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i> (Vol. 84). Stirlingshire, UK: Civil-Comp Press. <a href=\"https://doi.org/10.4203/ccp.84.44\">https://doi.org/10.4203/ccp.84.44</a>","bibtex":"@inproceedings{Fathi_Berlik_2006, place={Stirlingshire, UK}, series={Civil-Comp Proceedings}, title={An Evolutionary Optimization Method for Screw-Type Machines}, volume={84}, DOI={<a href=\"https://doi.org/10.4203/ccp.84.44\">10.4203/ccp.84.44</a>}, booktitle={Proceedings of the Fifth International Conference on Engineering Computational Technology}, publisher={Civil-Comp Press}, author={Fathi, M. and Berlik, Stefan}, editor={Topping, B.H.V. and Montero, G. and Montenegro, R.Editors}, year={2006}, collection={Civil-Comp Proceedings} }","ieee":"M. Fathi and S. Berlik, “An Evolutionary Optimization Method for Screw-Type Machines,” in <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, Las Palmas de Gran Canaria, Spain , 2006, vol. 84."},"author":[{"full_name":"Fathi, M.","last_name":"Fathi","first_name":"M."},{"orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308153","id":"237529","first_name":"Stefan","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik"}],"conference":{"name":"The Fifth International Conference on Engineering Computational Technology","location":"Las Palmas de Gran Canaria, Spain ","start_date":"2006-09-15","end_date":"2006-09-16"},"status":"public","intvolume":"        84","doi":"10.4203/ccp.84.44","publisher":"Civil-Comp Press","date_updated":"2026-03-17T15:29:23Z","year":"2006","editor":[{"first_name":"B.H.V.","full_name":"Topping, B.H.V.","last_name":"Topping"},{"first_name":"G.","last_name":"Montero","full_name":"Montero, G."},{"first_name":"R.","full_name":"Montenegro, R.","last_name":"Montenegro"}],"_id":"5842","language":[{"iso":"eng"}]},{"status":"public","author":[{"first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308112","id":"237529","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"},{"first_name":"Bernd","full_name":"Reusch, Bernd","last_name":"Reusch"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Reusch, Bernd</span>: Intragenerational Mutation Shape Adaptation. In: <span style=\"font-variant:small-caps;\">Reusch, B.</span> (Hrsg.): <i>Computational Intelligence, Theory and Applications</i> : Springer Berlin Heidelberg, 2006, S. 603–613","bibtex":"@inbook{Berlik_Reusch_2006, title={Intragenerational Mutation Shape Adaptation}, DOI={<a href=\"https://doi.org/10.1007/3-540-34783-6_58\">10.1007/3-540-34783-6_58</a>}, booktitle={Computational Intelligence, Theory and Applications}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan and Reusch, Bernd}, editor={Reusch, BerndEditor}, year={2006}, pages={603–613} }","apa":"Berlik, S., &#38; Reusch, B. (2006). Intragenerational Mutation Shape Adaptation. In B. Reusch (Ed.), <i>Computational Intelligence, Theory and Applications</i> (pp. 603–613). Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/3-540-34783-6_58\">https://doi.org/10.1007/3-540-34783-6_58</a>","ieee":"S. Berlik and B. Reusch, “Intragenerational Mutation Shape Adaptation,” in <i>Computational Intelligence, Theory and Applications</i>, B. Reusch, Ed. Springer Berlin Heidelberg, 2006, pp. 603–613.","mla":"Berlik, Stefan, and Bernd Reusch. “Intragenerational Mutation Shape Adaptation.” <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, Springer Berlin Heidelberg, 2006, pp. 603–13, doi:<a href=\"https://doi.org/10.1007/3-540-34783-6_58\">10.1007/3-540-34783-6_58</a>.","ama":"Berlik S, Reusch B. Intragenerational Mutation Shape Adaptation. In: Reusch B, ed. <i>Computational Intelligence, Theory and Applications</i>. Springer Berlin Heidelberg; 2006:603-613. doi:<a href=\"https://doi.org/10.1007/3-540-34783-6_58\">10.1007/3-540-34783-6_58</a>","short":"S. Berlik, B. Reusch, in: B. Reusch (Ed.), Computational Intelligence, Theory and Applications, Springer Berlin Heidelberg, 2006, pp. 603–613.","chicago":"Berlik, Stefan, and Bernd Reusch. “Intragenerational Mutation Shape Adaptation.” In <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, 603–13. Springer Berlin Heidelberg, 2006. <a href=\"https://doi.org/10.1007/3-540-34783-6_58\">https://doi.org/10.1007/3-540-34783-6_58</a>."},"publisher":"Springer Berlin Heidelberg","page":"603-613","date_updated":"2026-03-17T15:29:23Z","doi":"10.1007/3-540-34783-6_58","language":[{"iso":"eng"}],"year":"2006","editor":[{"first_name":"Bernd","last_name":"Reusch","full_name":"Reusch, Bernd"}],"_id":"5844","title":"Intragenerational Mutation Shape Adaptation","date_created":"2025-03-18T09:22:54Z","user_id":"220548","type":"book_chapter","publication_identifier":{"isbn":["978-3-540-34780-4"]},"publication":"Computational Intelligence, Theory and Applications","publication_status":"published"},{"status":"public","author":[{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180329171","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","last_name":"Berlik"}],"citation":{"ama":"Berlik S. <i>Directed Evolutionary Algorithms</i>.; 2006.","mla":"Berlik, Stefan. <i>Directed Evolutionary Algorithms</i>. 2006.","short":"S. Berlik, Directed Evolutionary Algorithms, 2006.","chicago":"Berlik, Stefan. <i>Directed Evolutionary Algorithms</i>, 2006.","apa":"Berlik, S. (2006). <i>Directed evolutionary algorithms</i>.","bibtex":"@book{Berlik_2006, title={Directed evolutionary algorithms}, author={Berlik, Stefan}, year={2006} }","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: <i>Directed evolutionary algorithms</i>, 2006","ieee":"S. Berlik, <i>Directed evolutionary algorithms</i>. 2006."},"date_updated":"2026-03-17T15:29:23Z","supervisor":[{"last_name":"Reusch ","full_name":"Reusch , Bernd ","first_name":"Bernd "},{"full_name":"Rudolph, Günter","last_name":"Rudolph","first_name":"Günter"}],"title":"Directed evolutionary algorithms","date_created":"2025-03-18T14:27:55Z","user_id":"220548","main_file_link":[{"url":"https://eldorado.tu-dortmund.de/server/api/core/bitstreams/d6189170-2952-4a9f-833e-cbf0c19e6ecf/content"}],"language":[{"iso":"eng"}],"year":"2006","type":"dissertation","_id":"5849"},{"_id":"5836","year":"2006","language":[{"iso":"eng"}],"citation":{"short":"S. Berlik, M. Fathi, A. Holland, in: IEEE (Ed.), 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2006, pp. 5147–5151.","chicago":"Berlik, Stefan, Madjid Fathi, and Alexander Holland. “Advances in Optimizing Screw-Lype Machines.” In <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 5147–51. IEEE, 2006. <a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">https://doi.org/10.1109/ICSMC.2006.385125</a>.","mla":"Berlik, Stefan, et al. “Advances in Optimizing Screw-Lype Machines.” <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, IEEE, 2006, pp. 5147–51, doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">10.1109/ICSMC.2006.385125</a>.","ama":"Berlik S, Fathi M, Holland A. Advances in Optimizing Screw-lype Machines. In: IEEE, ed. <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>. IEEE; 2006:5147-5151. doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">10.1109/ICSMC.2006.385125</a>","ieee":"S. Berlik, M. Fathi, and A. Holland, “Advances in Optimizing Screw-lype Machines,” in <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, Taipei, Taiwan, 2006, pp. 5147–5151.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Fathi, Madjid</span> ; <span style=\"font-variant:small-caps;\">Holland, Alexander</span>: Advances in Optimizing Screw-lype Machines. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> : IEEE, 2006, S. 5147–5151","apa":"Berlik, S., Fathi, M., &#38; Holland, A. (2006). Advances in Optimizing Screw-lype Machines. In IEEE (Ed.), <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> (pp. 5147–5151). Taipei, Taiwan: IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">https://doi.org/10.1109/ICSMC.2006.385125</a>","bibtex":"@inproceedings{Berlik_Fathi_Holland_2006, title={Advances in Optimizing Screw-lype Machines}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">10.1109/ICSMC.2006.385125</a>}, booktitle={2006 IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Berlik, Stefan and Fathi, Madjid and Holland, Alexander}, editor={IEEEEditor}, year={2006}, pages={5147–5151} }"},"author":[{"first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308251","id":"237529","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"},{"first_name":"Madjid","last_name":"Fathi","full_name":"Fathi, Madjid"},{"last_name":"Holland","full_name":"Holland, Alexander","first_name":"Alexander"}],"status":"public","conference":{"name":"2006 IEEE International Conference on Systems, Man and Cybernetics","location":"Taipei, Taiwan","start_date":"2006-10-08","end_date":"2006-10-11"},"doi":"10.1109/ICSMC.2006.385125","date_updated":"2026-03-17T15:29:22Z","publisher":"IEEE","page":"5147-5151","publication_identifier":{"isbn":["1-4244-0099-6","1-4244-0100-3"]},"type":"conference","corporate_editor":["IEEE"],"user_id":"220548","publication_status":"published","publication":"2006 IEEE International Conference on Systems, Man and Cybernetics","date_created":"2025-03-18T09:22:43Z","title":"Advances in Optimizing Screw-lype Machines"},{"doi":"10.1109/ICSMC.2006.385154","publisher":"IEEE","page":"5320-5324","date_updated":"2026-03-17T15:29:22Z","citation":{"ama":"Holland A, Fathi M, Berlik S. Rule-Based Compilation of Graphical Structures. In: IEEE, ed. <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>. IEEE; 2006:5320-5324. doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">10.1109/ICSMC.2006.385154</a>","mla":"Holland, Alexander, et al. “Rule-Based Compilation of Graphical Structures.” <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, IEEE, 2006, pp. 5320–24, doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">10.1109/ICSMC.2006.385154</a>.","chicago":"Holland, Alexander, Madjid Fathi, and Stefan Berlik. “Rule-Based Compilation of Graphical Structures.” In <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 5320–24. IEEE, 2006. <a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">https://doi.org/10.1109/ICSMC.2006.385154</a>.","short":"A. Holland, M. Fathi, S. Berlik, in: IEEE (Ed.), 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2006, pp. 5320–5324.","apa":"Holland, A., Fathi, M., &#38; Berlik, S. (2006). Rule-Based Compilation of Graphical Structures. In IEEE (Ed.), <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> (pp. 5320–5324). Taipei, Taiwan: IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">https://doi.org/10.1109/ICSMC.2006.385154</a>","bibtex":"@inproceedings{Holland_Fathi_Berlik_2006, title={Rule-Based Compilation of Graphical Structures}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">10.1109/ICSMC.2006.385154</a>}, booktitle={2006 IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Holland, Alexander and Fathi, Madjid and Berlik, Stefan}, editor={IEEEEditor}, year={2006}, pages={5320–5324} }","alphadin":"<span style=\"font-variant:small-caps;\">Holland, Alexander</span> ; <span style=\"font-variant:small-caps;\">Fathi, Madjid</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: Rule-Based Compilation of Graphical Structures. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> : IEEE, 2006, S. 5320–5324","ieee":"A. Holland, M. Fathi, and S. Berlik, “Rule-Based Compilation of Graphical Structures,” in <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, Taipei, Taiwan, 2006, pp. 5320–5324."},"author":[{"last_name":"Holland","full_name":"Holland, Alexander","first_name":"Alexander"},{"first_name":"Madjid","last_name":"Fathi","full_name":"Fathi, Madjid"},{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308234","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"}],"conference":{"location":"Taipei, Taiwan","name":"2006 IEEE International Conference on Systems, Man and Cybernetics","start_date":"2006-10-08","end_date":"2006-10-11"},"status":"public","year":"2006","_id":"5837","language":[{"iso":"eng"}],"title":"Rule-Based Compilation of Graphical Structures","date_created":"2025-03-18T09:22:44Z","publication":"2006 IEEE International Conference on Systems, Man and Cybernetics","publication_status":"published","publication_identifier":{"isbn":["1-4244-0099-6","1-4244-0100-3"]},"type":"conference","user_id":"220548","corporate_editor":["IEEE"]},{"date_created":"2025-03-18T09:22:46Z","title":"An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems","user_id":"220548","type":"conference","publication_identifier":{"eisbn":["978-3-540-48289-5"],"eissn":["1611-3349"],"isbn":["978-3-540-48287-1"],"issn":["0302-9743"]},"publication_status":"published","publication":"On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE","series_title":"Lecture Notes in Computer Science","status":"public","conference":{"end_date":"2006-11-03","start_date":"2006-10-29","location":"Montpellier, France","name":"OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006"},"citation":{"mla":"Abou-Tair, Dhiah el Diehn I., and Stefan Berlik. “An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems.” <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, edited by Robert Meersman and Zahir Tari, Springer Berlin Heidelberg, 2006, pp. 983–94, doi:<a href=\"https://doi.org/10.1007/11914853_63\">10.1007/11914853_63</a>.","ama":"Abou-Tair D el DI, Berlik S. An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In: Meersman R, Tari Z, eds. <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006:983-994. doi:<a href=\"https://doi.org/10.1007/11914853_63\">10.1007/11914853_63</a>","short":"D. el D.I. Abou-Tair, S. Berlik, in: R. Meersman, Z. Tari (Eds.), On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 983–994.","chicago":"Abou-Tair, Dhiah el Diehn I., and Stefan Berlik. “An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems.” In <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, edited by Robert Meersman and Zahir Tari, 983–94. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. <a href=\"https://doi.org/10.1007/11914853_63\">https://doi.org/10.1007/11914853_63</a>.","alphadin":"<span style=\"font-variant:small-caps;\">Abou-Tair, Dhiah el Diehn I.</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In: <span style=\"font-variant:small-caps;\">Meersman, R.</span> ; <span style=\"font-variant:small-caps;\">Tari, Z.</span> (Hrsg.): <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006, S. 983–994","bibtex":"@inproceedings{Abou-Tair_Berlik_2006, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems}, DOI={<a href=\"https://doi.org/10.1007/11914853_63\">10.1007/11914853_63</a>}, booktitle={On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE}, publisher={Springer Berlin Heidelberg}, author={Abou-Tair, Dhiah el Diehn I. and Berlik, Stefan}, editor={Meersman, Robert and Tari, ZahirEditors}, year={2006}, pages={983–994}, collection={Lecture Notes in Computer Science} }","apa":"Abou-Tair, D. el D. I., &#38; Berlik, S. (2006). An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In R. Meersman &#38; Z. Tari (Eds.), <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i> (pp. 983–994). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11914853_63\">https://doi.org/10.1007/11914853_63</a>","ieee":"D. el D. I. Abou-Tair and S. Berlik, “An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems,” in <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, Montpellier, France, 2006, pp. 983–994."},"author":[{"first_name":"Dhiah el Diehn I.","full_name":"Abou-Tair, Dhiah el Diehn I.","last_name":"Abou-Tair"},{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308226","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"}],"place":"Berlin, Heidelberg","date_updated":"2026-03-17T15:29:22Z","publisher":"Springer Berlin Heidelberg","page":"983-994","doi":"10.1007/11914853_63","language":[{"iso":"eng"}],"editor":[{"first_name":"Robert","last_name":"Meersman","full_name":"Meersman, Robert"},{"first_name":"Zahir","full_name":"Tari, Zahir","last_name":"Tari"}],"_id":"5838","year":"2006"},{"date_created":"2025-03-18T09:22:50Z","title":"A Design and Optimization Tool for Screw Type Machines","volume":4,"type":"conference","publication_identifier":{"isbn":["0-7803-9298-1"]},"corporate_editor":["IEEE"],"user_id":"220548","publication":"2005 IEEE International Conference on Systems, Man and Cybernetics","publication_status":"published","author":[{"id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308193","first_name":"Stefan","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik"},{"full_name":"Fathi, M.","last_name":"Fathi","first_name":"M."}],"citation":{"short":"S. Berlik, M. Fathi, in: IEEE (Ed.), 2005 IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2005, pp. 3089–3093.","chicago":"Berlik, Stefan, and M. Fathi. “A Design and Optimization Tool for Screw Type Machines.” In <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 4:3089–93. IEEE, 2005. <a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">https://doi.org/10.1109/ICSMC.2005.1571620</a>.","mla":"Berlik, Stefan, and M. Fathi. “A Design and Optimization Tool for Screw Type Machines.” <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, vol. 4, IEEE, 2005, pp. 3089–93, doi:<a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">10.1109/ICSMC.2005.1571620</a>.","ama":"Berlik S, Fathi M. A Design and Optimization Tool for Screw Type Machines. In: IEEE, ed. <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>. Vol 4. IEEE; 2005:3089-3093. doi:<a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">10.1109/ICSMC.2005.1571620</a>","ieee":"S. Berlik and M. Fathi, “A Design and Optimization Tool for Screw Type Machines,” in <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>, Waikoloa, HI, USA , 2005, vol. 4, pp. 3089–3093.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Fathi, M.</span>: A Design and Optimization Tool for Screw Type Machines. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>. Bd. 4 : IEEE, 2005, S. 3089–3093","bibtex":"@inproceedings{Berlik_Fathi_2005, title={A Design and Optimization Tool for Screw Type Machines}, volume={4}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">10.1109/ICSMC.2005.1571620</a>}, booktitle={2005 IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Berlik, Stefan and Fathi, M.}, editor={IEEEEditor}, year={2005}, pages={3089–3093} }","apa":"Berlik, S., &#38; Fathi, M. (2005). A Design and Optimization Tool for Screw Type Machines. In IEEE (Ed.), <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i> (Vol. 4, pp. 3089–3093). Waikoloa, HI, USA : IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">https://doi.org/10.1109/ICSMC.2005.1571620</a>"},"status":"public","conference":{"location":"Waikoloa, HI, USA ","name":"2005 IEEE International Conference on Systems, Man and Cybernetics","end_date":"2005-10-12","start_date":"2005-10-12"},"doi":"10.1109/ICSMC.2005.1571620","intvolume":"         4","date_updated":"2026-03-17T15:29:23Z","publisher":"IEEE","page":"3089-3093","_id":"5841","year":"2005","language":[{"iso":"eng"}]},{"date_created":"2025-03-18T09:22:52Z","title":"Directed Mutation by Means of the Skew-Normal Distribution","publication_status":"published","series_title":"Advances in Soft Computing","publication":"Computational Intelligence, Theory and Applications","publication_identifier":{"isbn":["978-3-540-22807-3"],"eisbn":["978-3-540-31182-9"]},"type":"book_chapter","user_id":"220548","doi":"10.1007/3-540-31182-3_4","date_updated":"2026-03-17T15:29:23Z","page":"35-50","publisher":"Springer Berlin Heidelberg","author":[{"orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","last_name":"Berlik","first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308140"}],"citation":{"chicago":"Berlik, Stefan. “Directed Mutation by Means of the Skew-Normal Distribution.” In <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, 35–50. Advances in Soft Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/3-540-31182-3_4\">https://doi.org/10.1007/3-540-31182-3_4</a>.","short":"S. Berlik, in: B. Reusch (Ed.), Computational Intelligence, Theory and Applications, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 35–50.","ama":"Berlik S. Directed Mutation by Means of the Skew-Normal Distribution. In: Reusch B, ed. <i>Computational Intelligence, Theory and Applications</i>. Advances in Soft Computing. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:35-50. doi:<a href=\"https://doi.org/10.1007/3-540-31182-3_4\">10.1007/3-540-31182-3_4</a>","mla":"Berlik, Stefan. “Directed Mutation by Means of the Skew-Normal Distribution.” <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, Springer Berlin Heidelberg, 2005, pp. 35–50, doi:<a href=\"https://doi.org/10.1007/3-540-31182-3_4\">10.1007/3-540-31182-3_4</a>.","ieee":"S. Berlik, “Directed Mutation by Means of the Skew-Normal Distribution,” in <i>Computational Intelligence, Theory and Applications</i>, B. Reusch, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 35–50.","apa":"Berlik, S. (2005). Directed Mutation by Means of the Skew-Normal Distribution. In B. Reusch (Ed.), <i>Computational Intelligence, Theory and Applications</i> (pp. 35–50). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/3-540-31182-3_4\">https://doi.org/10.1007/3-540-31182-3_4</a>","bibtex":"@inbook{Berlik_2005, place={Berlin, Heidelberg}, series={Advances in Soft Computing}, title={Directed Mutation by Means of the Skew-Normal Distribution}, DOI={<a href=\"https://doi.org/10.1007/3-540-31182-3_4\">10.1007/3-540-31182-3_4</a>}, booktitle={Computational Intelligence, Theory and Applications}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan}, editor={Reusch, BerndEditor}, year={2005}, pages={35–50}, collection={Advances in Soft Computing} }","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: Directed Mutation by Means of the Skew-Normal Distribution. In: <span style=\"font-variant:small-caps;\">Reusch, B.</span> (Hrsg.): <i>Computational Intelligence, Theory and Applications</i>, <i>Advances in Soft Computing</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005, S. 35–50"},"place":"Berlin, Heidelberg","status":"public","editor":[{"first_name":"Bernd","last_name":"Reusch","full_name":"Reusch, Bernd"}],"_id":"5843","year":"2005","language":[{"iso":"eng"}]},{"doi":"10.1007/11553939_160","publisher":"Springer Berlin Heidelberg","page":"1151-1159","date_updated":"2026-03-17T15:29:22Z","place":"Berlin, Heidelberg","author":[{"first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308220","id":"237529","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"},{"last_name":"Reusch","full_name":"Reusch, Bernd","first_name":"Bernd"}],"citation":{"short":"S. Berlik, B. Reusch, in: R. Khosla, R.J. Howlett, L.C. Jain (Eds.), Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 1151–1159.","chicago":"Berlik, Stefan, and Bernd Reusch. “Directed Mutation Operators – An Overview.” In <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>, edited by Rajiv Khosla, Robert J. Howlett, and Lakhmi C. Jain, 1151–59. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11553939_160\">https://doi.org/10.1007/11553939_160</a>.","mla":"Berlik, Stefan, and Bernd Reusch. “Directed Mutation Operators – An Overview.” <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>, edited by Rajiv Khosla et al., Springer Berlin Heidelberg, 2005, pp. 1151–59, doi:<a href=\"https://doi.org/10.1007/11553939_160\">10.1007/11553939_160</a>.","ama":"Berlik S, Reusch B. Directed Mutation Operators – An Overview. In: Khosla R, Howlett RJ, Jain LC, eds. <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:1151-1159. doi:<a href=\"https://doi.org/10.1007/11553939_160\">10.1007/11553939_160</a>","ieee":"S. Berlik and B. Reusch, “Directed Mutation Operators – An Overview,” in <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>,  Melbourne, Australia, 2005, pp. 1151–1159.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Reusch, Bernd</span>: Directed Mutation Operators – An Overview. In: <span style=\"font-variant:small-caps;\">Khosla, R.</span> ; <span style=\"font-variant:small-caps;\">Howlett, R. J.</span> ; <span style=\"font-variant:small-caps;\">Jain, L. C.</span> (Hrsg.): <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>, <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005, S. 1151–1159","apa":"Berlik, S., &#38; Reusch, B. (2005). Directed Mutation Operators – An Overview. In R. Khosla, R. J. Howlett, &#38; L. C. Jain (Eds.), <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i> (pp. 1151–1159). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11553939_160\">https://doi.org/10.1007/11553939_160</a>","bibtex":"@inproceedings{Berlik_Reusch_2005, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Directed Mutation Operators – An Overview}, DOI={<a href=\"https://doi.org/10.1007/11553939_160\">10.1007/11553939_160</a>}, booktitle={Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan and Reusch, Bernd}, editor={Khosla, Rajiv and Howlett, Robert J. and Jain, Lakhmi C.Editors}, year={2005}, pages={1151–1159}, collection={Lecture Notes in Computer Science} }"},"conference":{"start_date":"2005-09-14","end_date":"2005-09-16","name":"9th International Conference, KES 2005","location":" Melbourne, Australia"},"status":"public","year":"2005","_id":"5839","editor":[{"first_name":"Rajiv","last_name":"Khosla","full_name":"Khosla, Rajiv"},{"last_name":"Howlett","full_name":"Howlett, Robert J.","first_name":"Robert J."},{"last_name":"Jain","full_name":"Jain, Lakhmi C.","first_name":"Lakhmi C."}],"language":[{"iso":"eng"}],"title":"Directed Mutation Operators – An Overview","date_created":"2025-03-18T09:22:47Z","publication_status":"published","series_title":"Lecture Notes in Computer Science","publication":"Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III","publication_identifier":{"issn":["0302-9743"],"eisbn":["978-3-540-31990-0"],"eissn":["1611-3349"],"isbn":["978-3-540-28896-1"]},"type":"conference","user_id":"220548"},{"title":"A Step Size Preserving Directed Mutation Operator","date_created":"2025-03-18T09:22:48Z","user_id":"220548","type":"conference","publication_identifier":{"eissn":["1611-3349"],"isbn":["978-3-540-22344-3"],"eisbn":["978-3-540-24854-5"],"issn":["0302-9743"]},"publication":"Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I","series_title":"Lecture Notes in Computer Science","publication_status":"published","conference":{"name":"Genetic and Evolutionary Computation Conference ","location":"Seattle, WA, USA","start_date":"2004-06-26","end_date":"2004-06-30"},"status":"public","place":"Berlin, Heidelberg","author":[{"last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308216","id":"237529","first_name":"Stefan"}],"citation":{"short":"S. Berlik, in: K. Deb (Ed.), Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 786–787.","chicago":"Berlik, Stefan. “A Step Size Preserving Directed Mutation Operator.” In <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, edited by Kalyanmoy Deb, 786–87. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">https://doi.org/10.1007/978-3-540-24854-5_79</a>.","ama":"Berlik S. A Step Size Preserving Directed Mutation Operator. In: Deb K, ed. <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:786-787. doi:<a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">10.1007/978-3-540-24854-5_79</a>","mla":"Berlik, Stefan. “A Step Size Preserving Directed Mutation Operator.” <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, edited by Kalyanmoy Deb, Springer Berlin Heidelberg, 2004, pp. 786–87, doi:<a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">10.1007/978-3-540-24854-5_79</a>.","ieee":"S. Berlik, “A Step Size Preserving Directed Mutation Operator,” in <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, Seattle, WA, USA, 2004, pp. 786–787.","bibtex":"@inproceedings{Berlik_2004, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={A Step Size Preserving Directed Mutation Operator}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">10.1007/978-3-540-24854-5_79</a>}, booktitle={Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan}, editor={Deb, KalyanmoyEditor}, year={2004}, pages={786–787}, collection={Lecture Notes in Computer Science} }","apa":"Berlik, S. (2004). A Step Size Preserving Directed Mutation Operator. In K. Deb (Ed.), <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i> (pp. 786–787). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">https://doi.org/10.1007/978-3-540-24854-5_79</a>","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: A Step Size Preserving Directed Mutation Operator. In: <span style=\"font-variant:small-caps;\">Deb, K.</span> (Hrsg.): <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004, S. 786–787"},"page":"786-787","publisher":"Springer Berlin Heidelberg","date_updated":"2026-03-17T15:29:23Z","doi":"10.1007/978-3-540-24854-5_79","language":[{"iso":"eng"}],"year":"2004","_id":"5840","editor":[{"last_name":"Deb","full_name":"Deb, Kalyanmoy","first_name":"Kalyanmoy"}]},{"volume":5,"title":"Optimizing screw machines using an evolution strategy with extended creation scheme","date_created":"2025-03-18T09:22:55Z","publication_status":"published","publication":"IEEE International Conference on Systems, Man and Cybernetics","user_id":"220548","corporate_editor":["IEEE"],"publication_identifier":{"isbn":["0-7803-7437-1"]},"type":"conference","publisher":"IEEE","page":"6","date_updated":"2026-03-17T15:29:23Z","intvolume":"         5","doi":"10.1109/ICSMC.2002.1176382","conference":{"start_date":"2002-10-06","end_date":"2002-10-09","location":"Yasmine Hammamet, Tunisia","name":"SMC2002: IEEE International Conference on Systems, Man and Cybernetics"},"status":"public","citation":{"apa":"Berlik, S., &#38; Helpertz, M. (2002). Optimizing screw machines using an evolution strategy with extended creation scheme. In IEEE (Ed.), <i>IEEE International Conference on Systems, Man and Cybernetics</i> (Vol. 5, p. 6). Yasmine Hammamet, Tunisia: IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">https://doi.org/10.1109/ICSMC.2002.1176382</a>","bibtex":"@inproceedings{Berlik_Helpertz_2002, title={Optimizing screw machines using an evolution strategy with extended creation scheme}, volume={5}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">10.1109/ICSMC.2002.1176382</a>}, booktitle={IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Berlik, Stefan and Helpertz, M.}, editor={IEEEEditor}, year={2002}, pages={6} }","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Helpertz, M.</span>: Optimizing screw machines using an evolution strategy with extended creation scheme. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>IEEE International Conference on Systems, Man and Cybernetics</i>. Bd. 5 : IEEE, 2002, S. 6","ieee":"S. Berlik and M. Helpertz, “Optimizing screw machines using an evolution strategy with extended creation scheme,” in <i>IEEE International Conference on Systems, Man and Cybernetics</i>, Yasmine Hammamet, Tunisia, 2002, vol. 5, p. 6.","ama":"Berlik S, Helpertz M. Optimizing screw machines using an evolution strategy with extended creation scheme. In: IEEE, ed. <i>IEEE International Conference on Systems, Man and Cybernetics</i>. Vol 5. IEEE; 2002:6. doi:<a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">10.1109/ICSMC.2002.1176382</a>","mla":"Berlik, Stefan, and M. Helpertz. “Optimizing Screw Machines Using an Evolution Strategy with Extended Creation Scheme.” <i>IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, vol. 5, IEEE, 2002, p. 6, doi:<a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">10.1109/ICSMC.2002.1176382</a>.","chicago":"Berlik, Stefan, and M. Helpertz. “Optimizing Screw Machines Using an Evolution Strategy with Extended Creation Scheme.” In <i>IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 5:6. IEEE, 2002. <a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">https://doi.org/10.1109/ICSMC.2002.1176382</a>.","short":"S. Berlik, M. Helpertz, in: IEEE (Ed.), IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2002, p. 6."},"author":[{"last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308058"},{"first_name":"M.","full_name":"Helpertz, M.","last_name":"Helpertz"}],"language":[{"iso":"eng"}],"year":"2002","_id":"5845"}]
