[{"author":[{"orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","last_name":"Berlik","first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308417","id":"237529"},{"first_name":"Philipp","full_name":"Hartmann, Philipp","last_name":"Hartmann"},{"first_name":"Jannick","last_name":"Stranghöner","full_name":"Stranghöner, Jannick"}],"citation":{"short":"S. Berlik, P. Hartmann, J. Stranghöner, in: M.-R. Alam, M. Fathi (Eds.), Integrated Systems: Data Driven Engineering, Springer Nature Switzerland, Cham, 2024, pp. 183–193.","chicago":"Berlik, Stefan, Philipp Hartmann, and Jannick Stranghöner. “Semantically Enriched Interfaces for Product Configuration.” In <i>Integrated Systems: Data Driven Engineering</i>, edited by Mohammad-Reza Alam and Madjid Fathi, 183–93. Cham: Springer Nature Switzerland, 2024. <a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">https://doi.org/10.1007/978-3-031-53652-6_11</a>.","mla":"Berlik, Stefan, et al. “Semantically Enriched Interfaces for Product Configuration.” <i>Integrated Systems: Data Driven Engineering</i>, edited by Mohammad-Reza Alam and Madjid Fathi, Springer Nature Switzerland, 2024, pp. 183–93, doi:<a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">10.1007/978-3-031-53652-6_11</a>.","ama":"Berlik S, Hartmann P, Stranghöner J. Semantically Enriched Interfaces for Product Configuration. In: Alam M-R, Fathi M, eds. <i>Integrated Systems: Data Driven Engineering</i>. Cham: Springer Nature Switzerland; 2024:183-193. doi:<a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">10.1007/978-3-031-53652-6_11</a>","ieee":"S. Berlik, P. Hartmann, and J. Stranghöner, “Semantically Enriched Interfaces for Product Configuration,” in <i>Integrated Systems: Data Driven Engineering</i>, M.-R. Alam and M. Fathi, Eds. Cham: Springer Nature Switzerland, 2024, pp. 183–193.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Hartmann, Philipp</span> ; <span style=\"font-variant:small-caps;\">Stranghöner, Jannick</span>: Semantically Enriched Interfaces for Product Configuration. In: <span style=\"font-variant:small-caps;\">Alam, M.-R.</span> ; <span style=\"font-variant:small-caps;\">Fathi, M.</span> (Hrsg.): <i>Integrated Systems: Data Driven Engineering</i>. Cham : Springer Nature Switzerland, 2024, S. 183–193","bibtex":"@inbook{Berlik_Hartmann_Stranghöner_2024, place={Cham}, title={Semantically Enriched Interfaces for Product Configuration}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">10.1007/978-3-031-53652-6_11</a>}, booktitle={Integrated Systems: Data Driven Engineering}, publisher={Springer Nature Switzerland}, author={Berlik, Stefan and Hartmann, Philipp and Stranghöner, Jannick}, editor={Alam, Mohammad-Reza and Fathi, MadjidEditors}, year={2024}, pages={183–193} }","apa":"Berlik, S., Hartmann, P., &#38; Stranghöner, J. (2024). Semantically Enriched Interfaces for Product Configuration. In M.-R. Alam &#38; M. Fathi (Eds.), <i>Integrated Systems: Data Driven Engineering</i> (pp. 183–193). Cham: Springer Nature Switzerland. <a href=\"https://doi.org/10.1007/978-3-031-53652-6_11\">https://doi.org/10.1007/978-3-031-53652-6_11</a>"},"place":"Cham","status":"public","doi":"10.1007/978-3-031-53652-6_11","date_updated":"2026-03-17T15:29:22Z","page":"183-193","publisher":"Springer Nature Switzerland","_id":"5829","editor":[{"full_name":"Alam, Mohammad-Reza","last_name":"Alam","first_name":"Mohammad-Reza"},{"full_name":"Fathi, Madjid","last_name":"Fathi","first_name":"Madjid"}],"year":"2024","language":[{"iso":"eng"}],"date_created":"2025-03-18T09:22:34Z","title":"Semantically Enriched Interfaces for Product Configuration","publication_identifier":{"eisbn":["978-3-031-53652-6"],"isbn":["978-3-031-53651-9"]},"type":"book_chapter","user_id":"220548","publication":"Integrated Systems: Data Driven Engineering","publication_status":"published"},{"language":[{"iso":"eng"}],"editor":[{"last_name":"Bauer ","full_name":"Bauer , Janis ","first_name":"Janis "},{"last_name":"Baum ","full_name":"Baum , Nico","first_name":"Nico"},{"id":"237529","first_name":"Stefan","last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501"}],"_id":"5847","year":"2022","status":"public","author":[{"id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180326017","first_name":"Stefan","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik"}],"citation":{"chicago":"Berlik, Stefan. “Maschinelles Lernen: Ein Blick Hinter Die Kulissen.” In <i>Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden</i>, edited by Janis  Bauer , Nico Baum , and Stefan Berlik. DG Nexolution, 2022.","short":"S. Berlik, in: J. Bauer , N. Baum , S. Berlik (Eds.), Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden, DG Nexolution, 2022.","mla":"Berlik, Stefan. “Maschinelles Lernen: Ein Blick Hinter Die Kulissen.” <i>Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden</i>, edited by Janis  Bauer  et al., DG Nexolution, 2022.","ama":"Berlik S. Maschinelles Lernen: Ein Blick hinter die Kulissen. In: Bauer  J, Baum  N, Berlik S, eds. <i>Künstliche Intelligenz Für Kreditinstitute : Anwendungsbeispiele Und Methoden</i>. DG Nexolution; 2022.","ieee":"S. Berlik, “Maschinelles Lernen: Ein Blick hinter die Kulissen,” in <i>Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden</i>, J. Bauer , N. Baum , and S. Berlik, Eds. DG Nexolution, 2022.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: Maschinelles Lernen: Ein Blick hinter die Kulissen. In: <span style=\"font-variant:small-caps;\">Bauer , J.</span> ; <span style=\"font-variant:small-caps;\">Baum , N.</span> ; <span style=\"font-variant:small-caps;\">Berlik, S.</span> (Hrsg.): <i>Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden</i> : DG Nexolution, 2022","bibtex":"@inbook{Berlik_2022, title={Maschinelles Lernen: Ein Blick hinter die Kulissen}, booktitle={Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden}, publisher={DG Nexolution}, author={Berlik, Stefan}, editor={Bauer , Janis  and Baum , Nico and Berlik, StefanEditors}, year={2022} }","apa":"Berlik, S. (2022). Maschinelles Lernen: Ein Blick hinter die Kulissen. In J. Bauer , N. Baum , &#38; S. Berlik (Eds.), <i>Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden</i>. DG Nexolution."},"date_updated":"2026-03-17T15:29:23Z","publisher":"DG Nexolution","user_id":"220548","publication_identifier":{"isbn":["978-3-87151-299-5"]},"type":"book_chapter","publication":"Künstliche Intelligenz für Kreditinstitute : Anwendungsbeispiele und Methoden","date_created":"2025-03-18T13:40:56Z","title":"Maschinelles Lernen: Ein Blick hinter die Kulissen"},{"year":"2012","_id":"5848","language":[{"iso":"eng"}],"date_updated":"2026-03-17T15:29:23Z","author":[{"last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180328891","id":"237529"},{"last_name":"Ehrlichmann","full_name":"Ehrlichmann, Heiko","first_name":"Heiko"}],"citation":{"ieee":"S. Berlik and H. Ehrlichmann, “Adaptive fuzzy control for transfer channels in particle accelerators,” in <i>Proceedings of the ninth international workshop on personal computers and particle accelerator controls</i>, Kolkata (India), 2012.","bibtex":"@inproceedings{Berlik_Ehrlichmann_2012, title={Adaptive fuzzy control for transfer channels in particle accelerators}, booktitle={Proceedings of the ninth international workshop on personal computers and particle accelerator controls}, author={Berlik, Stefan and Ehrlichmann, Heiko}, editor={Variable Energy Cyclotron CenterEditor}, year={2012} }","apa":"Berlik, S., &#38; Ehrlichmann, H. (2012). Adaptive fuzzy control for transfer channels in particle accelerators. In Variable Energy Cyclotron Center (Ed.), <i>Proceedings of the ninth international workshop on personal computers and particle accelerator controls</i>. Kolkata (India).","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Ehrlichmann, Heiko</span>: Adaptive fuzzy control for transfer channels in particle accelerators. In: <span style=\"font-variant:small-caps;\">Variable Energy Cyclotron Center</span> (Hrsg.): <i>Proceedings of the ninth international workshop on personal computers and particle accelerator controls</i>, 2012","chicago":"Berlik, Stefan, and Heiko Ehrlichmann. “Adaptive Fuzzy Control for Transfer Channels in Particle Accelerators.” In <i>Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls</i>, edited by Variable Energy Cyclotron Center, 2012.","short":"S. Berlik, H. Ehrlichmann, in: Variable Energy Cyclotron Center (Ed.), Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls, 2012.","ama":"Berlik S, Ehrlichmann H. Adaptive fuzzy control for transfer channels in particle accelerators. In: Variable Energy Cyclotron Center, ed. <i>Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls</i>. ; 2012.","mla":"Berlik, Stefan, and Heiko Ehrlichmann. “Adaptive Fuzzy Control for Transfer Channels in Particle Accelerators.” <i>Proceedings of the Ninth International Workshop on Personal Computers and Particle Accelerator Controls</i>, edited by Variable Energy Cyclotron Center, 2012."},"conference":{"location":"Kolkata (India)","name":" PCaPAC 2012 - 9th International Workshop on Personal Computers and Particle Accelerator Controls","end_date":"2012-12-07","start_date":"2012-12-04"},"status":"public","publication":"Proceedings of the ninth international workshop on personal computers and particle accelerator controls","type":"conference_abstract","publication_identifier":{"isbn":["9783954501243"]},"user_id":"220548","main_file_link":[{"url":"https://accelconf.web.cern.ch/pcapac2012/html/keyw0056.htm"}],"corporate_editor":["Variable Energy Cyclotron Center"],"title":"Adaptive fuzzy control for transfer channels in particle accelerators","date_created":"2025-03-18T14:22:25Z"},{"doi":"10.1007/978-3-642-17384-4_23","date_updated":"2026-03-17T15:29:22Z","page":"293-300","publisher":"Springer Berlin Heidelberg","author":[{"orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308341","id":"237529","first_name":"Stefan","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik"}],"citation":{"bibtex":"@inproceedings{Berlik_2011, place={Berlin, Heidelberg}, title={A Generic Knowledge Integration Approach for Complex Process Control}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">10.1007/978-3-642-17384-4_23</a>}, booktitle={Integrated Systems, Design and Technology 2010}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan}, editor={Fathi, Madjid and Holland, Alexander and Ansari, Fazel and Weber, ChristianEditors}, year={2011}, pages={293–300} }","apa":"Berlik, S. (2011). A Generic Knowledge Integration Approach for Complex Process Control. In M. Fathi, A. Holland, F. Ansari, &#38; C. Weber (Eds.), <i>Integrated Systems, Design and Technology 2010</i> (pp. 293–300). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">https://doi.org/10.1007/978-3-642-17384-4_23</a>","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: A Generic Knowledge Integration Approach for Complex Process Control. In: <span style=\"font-variant:small-caps;\">Fathi, M.</span> ; <span style=\"font-variant:small-caps;\">Holland, A.</span> ; <span style=\"font-variant:small-caps;\">Ansari, F.</span> ; <span style=\"font-variant:small-caps;\">Weber, C.</span> (Hrsg.): <i>Integrated Systems, Design and Technology 2010</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011, S. 293–300","ieee":"S. Berlik, “A Generic Knowledge Integration Approach for Complex Process Control,” in <i>Integrated Systems, Design and Technology 2010</i>, Siegen, Germany, 2011, pp. 293–300.","ama":"Berlik S. A Generic Knowledge Integration Approach for Complex Process Control. In: Fathi M, Holland A, Ansari F, Weber C, eds. <i>Integrated Systems, Design and Technology 2010</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011:293-300. doi:<a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">10.1007/978-3-642-17384-4_23</a>","mla":"Berlik, Stefan. “A Generic Knowledge Integration Approach for Complex Process Control.” <i>Integrated Systems, Design and Technology 2010</i>, edited by Madjid Fathi et al., Springer Berlin Heidelberg, 2011, pp. 293–300, doi:<a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">10.1007/978-3-642-17384-4_23</a>.","short":"S. Berlik, in: M. Fathi, A. Holland, F. Ansari, C. Weber (Eds.), Integrated Systems, Design and Technology 2010, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 293–300.","chicago":"Berlik, Stefan. “A Generic Knowledge Integration Approach for Complex Process Control.” In <i>Integrated Systems, Design and Technology 2010</i>, edited by Madjid Fathi, Alexander Holland, Fazel Ansari, and Christian Weber, 293–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. <a href=\"https://doi.org/10.1007/978-3-642-17384-4_23\">https://doi.org/10.1007/978-3-642-17384-4_23</a>."},"place":"Berlin, Heidelberg","status":"public","conference":{"name":"4th International Joint Conference on Integrated Systems: Design and Technology","location":"Siegen, Germany","start_date":"2010-06-07","end_date":"2010-06-09"},"_id":"5830","editor":[{"first_name":"Madjid","full_name":"Fathi, Madjid","last_name":"Fathi"},{"first_name":"Alexander","full_name":"Holland, Alexander","last_name":"Holland"},{"last_name":"Ansari","full_name":"Ansari, Fazel","first_name":"Fazel"},{"last_name":"Weber","full_name":"Weber, Christian","first_name":"Christian"}],"year":"2011","language":[{"iso":"eng"}],"date_created":"2025-03-18T09:22:35Z","title":"A Generic Knowledge Integration Approach for Complex Process Control","publication":"Integrated Systems, Design and Technology 2010","publication_status":"published","publication_identifier":{"eisbn":["978-3-642-17384-4"],"isbn":["978-3-642-17383-7"]},"type":"conference","user_id":"220548"},{"doi":"10.1109/NTMS.2011.5720654","publisher":"IEEE","page":"1-6","date_updated":"2026-03-17T15:29:22Z","citation":{"short":"M. Bourimi, J. Ossowski, D.E.-D.I. Abou-Tair, S. Berlik, D. Abu-Saymeh, in: IEEE (Ed.), 2011 4th IFIP International Conference on New Technologies, Mobility and Security, IEEE, 2011, pp. 1–6.","chicago":"Bourimi, Mohamed, Jorn Ossowski, Dhiah El-Diehn I Abou-Tair, Stefan Berlik, and Dirar Abu-Saymeh. “Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs.” In <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>, edited by IEEE, 1–6. IEEE, 2011. <a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">https://doi.org/10.1109/NTMS.2011.5720654</a>.","mla":"Bourimi, Mohamed, et al. “Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs.” <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>, edited by IEEE, IEEE, 2011, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">10.1109/NTMS.2011.5720654</a>.","ama":"Bourimi M, Ossowski J, Abou-Tair DE-DI, Berlik S, Abu-Saymeh D. Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs. In: IEEE, ed. <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>. IEEE; 2011:1-6. doi:<a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">10.1109/NTMS.2011.5720654</a>","ieee":"M. Bourimi, J. Ossowski, D. E.-D. I. Abou-Tair, S. Berlik, and D. Abu-Saymeh, “Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs,” in <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i>, Paris, 2011, pp. 1–6.","alphadin":"<span style=\"font-variant:small-caps;\">Bourimi, Mohamed</span> ; <span style=\"font-variant:small-caps;\">Ossowski, Jorn</span> ; <span style=\"font-variant:small-caps;\">Abou-Tair, Dhiah El-Diehn I</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Abu-Saymeh, Dirar</span>: Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i> : IEEE, 2011, S. 1–6","bibtex":"@inproceedings{Bourimi_Ossowski_Abou-Tair_Berlik_Abu-Saymeh_2011, title={Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs}, DOI={<a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">10.1109/NTMS.2011.5720654</a>}, booktitle={2011 4th IFIP International Conference on New Technologies, Mobility and Security}, publisher={IEEE}, author={Bourimi, Mohamed and Ossowski, Jorn and Abou-Tair, Dhiah El-Diehn I and Berlik, Stefan and Abu-Saymeh, Dirar}, editor={IEEEEditor}, year={2011}, pages={1–6} }","apa":"Bourimi, M., Ossowski, J., Abou-Tair, D. E.-D. I., Berlik, S., &#38; Abu-Saymeh, D. (2011). Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs. In IEEE (Ed.), <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security</i> (pp. 1–6). Paris: IEEE. <a href=\"https://doi.org/10.1109/NTMS.2011.5720654\">https://doi.org/10.1109/NTMS.2011.5720654</a>"},"author":[{"full_name":"Bourimi, Mohamed","last_name":"Bourimi","first_name":"Mohamed"},{"first_name":"Jorn","last_name":"Ossowski","full_name":"Ossowski, Jorn"},{"last_name":"Abou-Tair","full_name":"Abou-Tair, Dhiah El-Diehn I","first_name":"Dhiah El-Diehn I"},{"id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308334","first_name":"Stefan","last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501"},{"first_name":"Dirar","last_name":"Abu-Saymeh","full_name":"Abu-Saymeh, Dirar"}],"conference":{"location":"Paris","name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011)","end_date":"2011-02-10","start_date":"2011-02-07"},"status":"public","year":"2011","_id":"5831","language":[{"iso":"eng"}],"title":"Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs","date_created":"2025-03-18T09:22:36Z","publication":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","publication_status":"published","type":"conference","publication_identifier":{"isbn":["978-1-4244-8705-9"]},"user_id":"220548","corporate_editor":["IEEE"]},{"title":"An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry","date_created":"2025-03-18T09:22:38Z","publication_status":"published","series_title":"Communications in Computer and Information Science","publication":"Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications","user_id":"220548","publication_identifier":{"issn":["1865-0929"],"eissn":["1865-0937"],"isbn":["978-3-642-14057-0"],"eisbn":["978-3-642-14058-7"]},"type":"conference","page":"729-736","publisher":"Springer Berlin Heidelberg","date_updated":"2026-03-17T15:29:22Z","doi":"10.1007/978-3-642-14058-7_75","conference":{"name":"13th International Conference, IPMU 2010","location":"Dortmund, Germany","start_date":"2010-06-28","end_date":"2010-07-02"},"status":"public","place":"Berlin, Heidelberg","author":[{"full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308318","first_name":"Stefan"},{"full_name":"Nasiri, Maryam","last_name":"Nasiri","first_name":"Maryam"}],"citation":{"apa":"Berlik, S., &#38; Nasiri, M. (2010). An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry. In E. Hüllermeier, R. Kruse, &#38; F. Hoffmann (Eds.), <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i> (pp. 729–736). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">https://doi.org/10.1007/978-3-642-14058-7_75</a>","bibtex":"@inproceedings{Berlik_Nasiri_2010, place={Berlin, Heidelberg}, series={Communications in Computer and Information Science}, title={An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">10.1007/978-3-642-14058-7_75</a>}, booktitle={Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan and Nasiri, Maryam}, editor={Hüllermeier, Eyke and Kruse, Rudolf and Hoffmann, FrankEditors}, year={2010}, pages={729–736}, collection={Communications in Computer and Information Science} }","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Nasiri, Maryam</span>: An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry. In: <span style=\"font-variant:small-caps;\">Hüllermeier, E.</span> ; <span style=\"font-variant:small-caps;\">Kruse, R.</span> ; <span style=\"font-variant:small-caps;\">Hoffmann, F.</span> (Hrsg.): <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, <i>Communications in Computer and Information Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010, S. 729–736","ieee":"S. Berlik and M. Nasiri, “An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry,” in <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, Dortmund, Germany, 2010, pp. 729–736.","ama":"Berlik S, Nasiri M. An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry. In: Hüllermeier E, Kruse R, Hoffmann F, eds. <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>. Communications in Computer and Information Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010:729-736. doi:<a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">10.1007/978-3-642-14058-7_75</a>","mla":"Berlik, Stefan, and Maryam Nasiri. “An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry.” <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, edited by Eyke Hüllermeier et al., Springer Berlin Heidelberg, 2010, pp. 729–36, doi:<a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">10.1007/978-3-642-14058-7_75</a>.","short":"S. Berlik, M. Nasiri, in: E. Hüllermeier, R. Kruse, F. Hoffmann (Eds.), Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010, pp. 729–736.","chicago":"Berlik, Stefan, and Maryam Nasiri. “An Adaptive Fuzzy Model Predictive Control System for the Textile Fiber Industry.” In <i>Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications</i>, edited by Eyke Hüllermeier, Rudolf Kruse, and Frank Hoffmann, 729–36. Communications in Computer and Information Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. <a href=\"https://doi.org/10.1007/978-3-642-14058-7_75\">https://doi.org/10.1007/978-3-642-14058-7_75</a>."},"language":[{"iso":"eng"}],"year":"2010","editor":[{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier"},{"last_name":"Kruse","full_name":"Kruse, Rudolf","first_name":"Rudolf"},{"first_name":"Frank","last_name":"Hoffmann","full_name":"Hoffmann, Frank"}],"_id":"5832"},{"publication_identifier":{"isbn":["1-4244-1499-7","1-4244-1500-4"]},"type":"conference","user_id":"220548","corporate_editor":["IEEE"],"publication_status":"published","publication":"2007 IEEE International Conference on Information Reuse and Integration","title":"Differences of Structured Documents - Improving their Quality","date_created":"2025-03-18T09:22:39Z","year":"2007","_id":"5833","language":[{"iso":"eng"}],"author":[{"id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308315","first_name":"Stefan","last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501"},{"first_name":"Madjid","last_name":"Fathi","full_name":"Fathi, Madjid"}],"citation":{"ieee":"S. Berlik and M. Fathi, “Differences of Structured Documents - Improving their Quality,” in <i>2007 IEEE International Conference on Information Reuse and Integration</i>, Las Vegas, NV, USA, 2007, pp. 486–491.","bibtex":"@inproceedings{Berlik_Fathi_2007, title={Differences of Structured Documents - Improving their Quality}, DOI={<a href=\"https://doi.org/10.1109/IRI.2007.4296667\">10.1109/IRI.2007.4296667</a>}, booktitle={2007 IEEE International Conference on Information Reuse and Integration}, publisher={IEEE}, author={Berlik, Stefan and Fathi, Madjid}, editor={IEEEEditor}, year={2007}, pages={486–491} }","apa":"Berlik, S., &#38; Fathi, M. (2007). Differences of Structured Documents - Improving their Quality. In IEEE (Ed.), <i>2007 IEEE International Conference on Information Reuse and Integration</i> (pp. 486–491). Las Vegas, NV, USA: IEEE. <a href=\"https://doi.org/10.1109/IRI.2007.4296667\">https://doi.org/10.1109/IRI.2007.4296667</a>","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Fathi, Madjid</span>: Differences of Structured Documents - Improving their Quality. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2007 IEEE International Conference on Information Reuse and Integration</i> : IEEE, 2007, S. 486–491","chicago":"Berlik, Stefan, and Madjid Fathi. “Differences of Structured Documents - Improving Their Quality.” In <i>2007 IEEE International Conference on Information Reuse and Integration</i>, edited by IEEE, 486–91. IEEE, 2007. <a href=\"https://doi.org/10.1109/IRI.2007.4296667\">https://doi.org/10.1109/IRI.2007.4296667</a>.","short":"S. Berlik, M. Fathi, in: IEEE (Ed.), 2007 IEEE International Conference on Information Reuse and Integration, IEEE, 2007, pp. 486–491.","ama":"Berlik S, Fathi M. Differences of Structured Documents - Improving their Quality. In: IEEE, ed. <i>2007 IEEE International Conference on Information Reuse and Integration</i>. IEEE; 2007:486-491. doi:<a href=\"https://doi.org/10.1109/IRI.2007.4296667\">10.1109/IRI.2007.4296667</a>","mla":"Berlik, Stefan, and Madjid Fathi. “Differences of Structured Documents - Improving Their Quality.” <i>2007 IEEE International Conference on Information Reuse and Integration</i>, edited by IEEE, IEEE, 2007, pp. 486–91, doi:<a href=\"https://doi.org/10.1109/IRI.2007.4296667\">10.1109/IRI.2007.4296667</a>."},"conference":{"start_date":"2007-08-13","end_date":"2007-08-15","name":"2007 IEEE International Conference on Information Reuse and Integration","location":"Las Vegas, NV, USA"},"status":"public","doi":"10.1109/IRI.2007.4296667","publisher":"IEEE","page":"486-491","date_updated":"2026-03-17T15:29:22Z"},{"_id":"5834","year":"2007","language":[{"iso":"eng"}],"citation":{"chicago":"Abou-Tair, Dhiah el Diehn I., Stefan Berlik, and Udo Kelter. “Enforcing Privacy by Means of an Ontology Driven XACML Framework.” In <i>Third International Symposium on Information Assurance and Security</i>, edited by IEEE, 279–84. IEEE, 2007. <a href=\"https://doi.org/10.1109/IAS.2007.52\">https://doi.org/10.1109/IAS.2007.52</a>.","short":"D. el D.I. Abou-Tair, S. Berlik, U. Kelter, in: IEEE (Ed.), Third International Symposium on Information Assurance and Security, IEEE, 2007, pp. 279–284.","mla":"Abou-Tair, Dhiah el Diehn I., et al. “Enforcing Privacy by Means of an Ontology Driven XACML Framework.” <i>Third International Symposium on Information Assurance and Security</i>, edited by IEEE, IEEE, 2007, pp. 279–84, doi:<a href=\"https://doi.org/10.1109/IAS.2007.52\">10.1109/IAS.2007.52</a>.","ama":"Abou-Tair D el DI, Berlik S, Kelter U. Enforcing Privacy by Means of an Ontology Driven XACML Framework. In: IEEE, ed. <i>Third International Symposium on Information Assurance and Security</i>. IEEE; 2007:279-284. doi:<a href=\"https://doi.org/10.1109/IAS.2007.52\">10.1109/IAS.2007.52</a>","ieee":"D. el D. I. Abou-Tair, S. Berlik, and U. Kelter, “Enforcing Privacy by Means of an Ontology Driven XACML Framework,” in <i>Third International Symposium on Information Assurance and Security</i>, Manchester, 2007, pp. 279–284.","alphadin":"<span style=\"font-variant:small-caps;\">Abou-Tair, Dhiah el Diehn I.</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Kelter, Udo</span>: Enforcing Privacy by Means of an Ontology Driven XACML Framework. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>Third International Symposium on Information Assurance and Security</i> : IEEE, 2007, S. 279–284","apa":"Abou-Tair, D. el D. I., Berlik, S., &#38; Kelter, U. (2007). Enforcing Privacy by Means of an Ontology Driven XACML Framework. In IEEE (Ed.), <i>Third International Symposium on Information Assurance and Security</i> (pp. 279–284). Manchester: IEEE. <a href=\"https://doi.org/10.1109/IAS.2007.52\">https://doi.org/10.1109/IAS.2007.52</a>","bibtex":"@inproceedings{Abou-Tair_Berlik_Kelter_2007, title={Enforcing Privacy by Means of an Ontology Driven XACML Framework}, DOI={<a href=\"https://doi.org/10.1109/IAS.2007.52\">10.1109/IAS.2007.52</a>}, booktitle={Third International Symposium on Information Assurance and Security}, publisher={IEEE}, author={Abou-Tair, Dhiah el Diehn I. and Berlik, Stefan and Kelter, Udo}, editor={IEEEEditor}, year={2007}, pages={279–284} }"},"author":[{"full_name":"Abou-Tair, Dhiah el Diehn I.","last_name":"Abou-Tair","first_name":"Dhiah el Diehn I."},{"last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308309","id":"237529"},{"first_name":"Udo","last_name":"Kelter","full_name":"Kelter, Udo"}],"status":"public","conference":{"start_date":"2007-08-29","end_date":"2007-08-31","location":"Manchester","name":"2007 3rd International Symposium on Information Assurance and Security"},"doi":"10.1109/IAS.2007.52","date_updated":"2026-03-17T15:29:22Z","publisher":"IEEE","page":"279-284","type":"conference","publication_identifier":{"isbn":["0-7695-2876-7"]},"corporate_editor":["IEEE"],"user_id":"220548","publication":"Third International Symposium on Information Assurance and Security","publication_status":"published","date_created":"2025-03-18T09:22:40Z","title":"Enforcing Privacy by Means of an Ontology Driven XACML Framework"},{"place":"New York, NY, USA","citation":{"bibtex":"@inproceedings{Treude_Berlik_Wenzel_Kelter_2007, place={New York, NY, USA}, title={Difference computation of large models}, DOI={<a href=\"https://doi.org/10.1145/1287624.1287665\">10.1145/1287624.1287665</a>}, booktitle={Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering}, publisher={ACM}, author={Treude, Christoph and Berlik, Stefan and Wenzel, Sven and Kelter, Udo}, editor={Crnkovic, Ivica and Bertolino, AntoniaEditors}, year={2007}, pages={295–304} }","apa":"Treude, C., Berlik, S., Wenzel, S., &#38; Kelter, U. (2007). Difference computation of large models. In I. Crnkovic &#38; A. Bertolino (Eds.), <i>Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering</i> (pp. 295–304). New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/1287624.1287665\">https://doi.org/10.1145/1287624.1287665</a>","alphadin":"<span style=\"font-variant:small-caps;\">Treude, Christoph</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Wenzel, Sven</span> ; <span style=\"font-variant:small-caps;\">Kelter, Udo</span>: Difference computation of large models. In: <span style=\"font-variant:small-caps;\">Crnkovic, I.</span> ; <span style=\"font-variant:small-caps;\">Bertolino, A.</span> (Hrsg.): <i>Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering</i>. New York, NY, USA : ACM, 2007, S. 295–304","ieee":"C. Treude, S. Berlik, S. Wenzel, and U. Kelter, “Difference computation of large models,” in <i>Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering</i>, Dubrovnik Croatia, 2007, pp. 295–304.","ama":"Treude C, Berlik S, Wenzel S, Kelter U. Difference computation of large models. In: Crnkovic I, Bertolino A, eds. <i>Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering</i>. New York, NY, USA: ACM; 2007:295-304. doi:<a href=\"https://doi.org/10.1145/1287624.1287665\">10.1145/1287624.1287665</a>","mla":"Treude, Christoph, et al. “Difference Computation of Large Models.” <i>Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering</i>, edited by Ivica Crnkovic and Antonia Bertolino, ACM, 2007, pp. 295–304, doi:<a href=\"https://doi.org/10.1145/1287624.1287665\">10.1145/1287624.1287665</a>.","chicago":"Treude, Christoph, Stefan Berlik, Sven Wenzel, and Udo Kelter. “Difference Computation of Large Models.” In <i>Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering</i>, edited by Ivica Crnkovic and Antonia Bertolino, 295–304. New York, NY, USA: ACM, 2007. <a href=\"https://doi.org/10.1145/1287624.1287665\">https://doi.org/10.1145/1287624.1287665</a>.","short":"C. Treude, S. Berlik, S. Wenzel, U. Kelter, in: I. Crnkovic, A. Bertolino (Eds.), Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ACM, New York, NY, USA, 2007, pp. 295–304."},"author":[{"first_name":"Christoph","last_name":"Treude","full_name":"Treude, Christoph"},{"last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308304","id":"237529","first_name":"Stefan"},{"first_name":"Sven","last_name":"Wenzel","full_name":"Wenzel, Sven"},{"first_name":"Udo","last_name":"Kelter","full_name":"Kelter, Udo"}],"conference":{"location":"Dubrovnik Croatia","name":"ESEC/FSE07: Joint 11th European Software Engineering Conference 2007","start_date":"2007-09-03","end_date":"2007-09-07"},"status":"public","doi":"10.1145/1287624.1287665","page":"295-304","publisher":"ACM","date_updated":"2026-03-17T15:29:22Z","year":"2007","editor":[{"first_name":"Ivica","last_name":"Crnkovic","full_name":"Crnkovic, Ivica"},{"full_name":"Bertolino, Antonia","last_name":"Bertolino","first_name":"Antonia"}],"_id":"5835","language":[{"iso":"eng"}],"title":"Difference computation of large models","date_created":"2025-03-18T09:22:42Z","type":"conference","publication_identifier":{"isbn":["9781595938114"]},"user_id":"220548","publication":"Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering","publication_status":"published"},{"volume":84,"title":"An Evolutionary Optimization Method for Screw-Type Machines","date_created":"2025-03-18T09:22:51Z","publication":"Proceedings of the Fifth International Conference on Engineering Computational Technology","series_title":"Civil-Comp Proceedings","publication_status":"published","user_id":"220548","type":"conference","publication_identifier":{"isbn":["1-905088-11-6"],"issn":["1759-3433"]},"publisher":"Civil-Comp Press","date_updated":"2026-03-17T15:29:23Z","intvolume":"        84","doi":"10.4203/ccp.84.44","conference":{"location":"Las Palmas de Gran Canaria, Spain ","name":"The Fifth International Conference on Engineering Computational Technology","start_date":"2006-09-15","end_date":"2006-09-16"},"status":"public","place":"Stirlingshire, UK","citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Fathi, M.</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: An Evolutionary Optimization Method for Screw-Type Machines. In: <span style=\"font-variant:small-caps;\">Topping, B. H. V.</span> ; <span style=\"font-variant:small-caps;\">Montero, G.</span> ; <span style=\"font-variant:small-caps;\">Montenegro, R.</span> (Hrsg.): <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, <i>Civil-Comp Proceedings</i>. Bd. 84. Stirlingshire, UK : Civil-Comp Press, 2006","bibtex":"@inproceedings{Fathi_Berlik_2006, place={Stirlingshire, UK}, series={Civil-Comp Proceedings}, title={An Evolutionary Optimization Method for Screw-Type Machines}, volume={84}, DOI={<a href=\"https://doi.org/10.4203/ccp.84.44\">10.4203/ccp.84.44</a>}, booktitle={Proceedings of the Fifth International Conference on Engineering Computational Technology}, publisher={Civil-Comp Press}, author={Fathi, M. and Berlik, Stefan}, editor={Topping, B.H.V. and Montero, G. and Montenegro, R.Editors}, year={2006}, collection={Civil-Comp Proceedings} }","apa":"Fathi, M., &#38; Berlik, S. (2006). An Evolutionary Optimization Method for Screw-Type Machines. In B. H. V. Topping, G. Montero, &#38; R. Montenegro (Eds.), <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i> (Vol. 84). Stirlingshire, UK: Civil-Comp Press. <a href=\"https://doi.org/10.4203/ccp.84.44\">https://doi.org/10.4203/ccp.84.44</a>","ieee":"M. Fathi and S. Berlik, “An Evolutionary Optimization Method for Screw-Type Machines,” in <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, Las Palmas de Gran Canaria, Spain , 2006, vol. 84.","mla":"Fathi, M., and Stefan Berlik. “An Evolutionary Optimization Method for Screw-Type Machines.” <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, edited by B.H.V. Topping et al., vol. 84, Civil-Comp Press, 2006, doi:<a href=\"https://doi.org/10.4203/ccp.84.44\">10.4203/ccp.84.44</a>.","ama":"Fathi M, Berlik S. An Evolutionary Optimization Method for Screw-Type Machines. In: Topping BHV, Montero G, Montenegro R, eds. <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>. Vol 84. Civil-Comp Proceedings. Stirlingshire, UK: Civil-Comp Press; 2006. doi:<a href=\"https://doi.org/10.4203/ccp.84.44\">10.4203/ccp.84.44</a>","short":"M. Fathi, S. Berlik, in: B.H.V. Topping, G. Montero, R. Montenegro (Eds.), Proceedings of the Fifth International Conference on Engineering Computational Technology, Civil-Comp Press, Stirlingshire, UK, 2006.","chicago":"Fathi, M., and Stefan Berlik. “An Evolutionary Optimization Method for Screw-Type Machines.” In <i>Proceedings of the Fifth International Conference on Engineering Computational Technology</i>, edited by B.H.V. Topping, G. Montero, and R. Montenegro, Vol. 84. Civil-Comp Proceedings. Stirlingshire, UK: Civil-Comp Press, 2006. <a href=\"https://doi.org/10.4203/ccp.84.44\">https://doi.org/10.4203/ccp.84.44</a>."},"author":[{"first_name":"M.","last_name":"Fathi","full_name":"Fathi, M."},{"id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308153","first_name":"Stefan","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik"}],"language":[{"iso":"eng"}],"year":"2006","_id":"5842","editor":[{"last_name":"Topping","full_name":"Topping, B.H.V.","first_name":"B.H.V."},{"full_name":"Montero, G.","last_name":"Montero","first_name":"G."},{"full_name":"Montenegro, R.","last_name":"Montenegro","first_name":"R."}]},{"_id":"5844","editor":[{"last_name":"Reusch","full_name":"Reusch, Bernd","first_name":"Bernd"}],"year":"2006","language":[{"iso":"eng"}],"author":[{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308112","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","last_name":"Berlik"},{"first_name":"Bernd","last_name":"Reusch","full_name":"Reusch, Bernd"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Reusch, Bernd</span>: Intragenerational Mutation Shape Adaptation. In: <span style=\"font-variant:small-caps;\">Reusch, B.</span> (Hrsg.): <i>Computational Intelligence, Theory and Applications</i> : Springer Berlin Heidelberg, 2006, S. 603–613","apa":"Berlik, S., &#38; Reusch, B. (2006). Intragenerational Mutation Shape Adaptation. In B. Reusch (Ed.), <i>Computational Intelligence, Theory and Applications</i> (pp. 603–613). Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/3-540-34783-6_58\">https://doi.org/10.1007/3-540-34783-6_58</a>","bibtex":"@inbook{Berlik_Reusch_2006, title={Intragenerational Mutation Shape Adaptation}, DOI={<a href=\"https://doi.org/10.1007/3-540-34783-6_58\">10.1007/3-540-34783-6_58</a>}, booktitle={Computational Intelligence, Theory and Applications}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan and Reusch, Bernd}, editor={Reusch, BerndEditor}, year={2006}, pages={603–613} }","ieee":"S. Berlik and B. Reusch, “Intragenerational Mutation Shape Adaptation,” in <i>Computational Intelligence, Theory and Applications</i>, B. Reusch, Ed. Springer Berlin Heidelberg, 2006, pp. 603–613.","mla":"Berlik, Stefan, and Bernd Reusch. “Intragenerational Mutation Shape Adaptation.” <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, Springer Berlin Heidelberg, 2006, pp. 603–13, doi:<a href=\"https://doi.org/10.1007/3-540-34783-6_58\">10.1007/3-540-34783-6_58</a>.","ama":"Berlik S, Reusch B. Intragenerational Mutation Shape Adaptation. In: Reusch B, ed. <i>Computational Intelligence, Theory and Applications</i>. Springer Berlin Heidelberg; 2006:603-613. doi:<a href=\"https://doi.org/10.1007/3-540-34783-6_58\">10.1007/3-540-34783-6_58</a>","short":"S. Berlik, B. Reusch, in: B. Reusch (Ed.), Computational Intelligence, Theory and Applications, Springer Berlin Heidelberg, 2006, pp. 603–613.","chicago":"Berlik, Stefan, and Bernd Reusch. “Intragenerational Mutation Shape Adaptation.” In <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, 603–13. Springer Berlin Heidelberg, 2006. <a href=\"https://doi.org/10.1007/3-540-34783-6_58\">https://doi.org/10.1007/3-540-34783-6_58</a>."},"status":"public","doi":"10.1007/3-540-34783-6_58","date_updated":"2026-03-17T15:29:23Z","publisher":"Springer Berlin Heidelberg","page":"603-613","type":"book_chapter","publication_identifier":{"isbn":["978-3-540-34780-4"]},"user_id":"220548","publication":"Computational Intelligence, Theory and Applications","publication_status":"published","date_created":"2025-03-18T09:22:54Z","title":"Intragenerational Mutation Shape Adaptation"},{"user_id":"220548","language":[{"iso":"eng"}],"main_file_link":[{"url":"https://eldorado.tu-dortmund.de/server/api/core/bitstreams/d6189170-2952-4a9f-833e-cbf0c19e6ecf/content"}],"year":"2006","type":"dissertation","_id":"5849","date_updated":"2026-03-17T15:29:23Z","supervisor":[{"first_name":"Bernd ","full_name":"Reusch , Bernd ","last_name":"Reusch "},{"first_name":"Günter","full_name":"Rudolph, Günter","last_name":"Rudolph"}],"title":"Directed evolutionary algorithms","date_created":"2025-03-18T14:27:55Z","status":"public","author":[{"first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180329171","id":"237529","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","last_name":"Berlik"}],"citation":{"ama":"Berlik S. <i>Directed Evolutionary Algorithms</i>.; 2006.","mla":"Berlik, Stefan. <i>Directed Evolutionary Algorithms</i>. 2006.","short":"S. Berlik, Directed Evolutionary Algorithms, 2006.","chicago":"Berlik, Stefan. <i>Directed Evolutionary Algorithms</i>, 2006.","bibtex":"@book{Berlik_2006, title={Directed evolutionary algorithms}, author={Berlik, Stefan}, year={2006} }","apa":"Berlik, S. (2006). <i>Directed evolutionary algorithms</i>.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: <i>Directed evolutionary algorithms</i>, 2006","ieee":"S. Berlik, <i>Directed evolutionary algorithms</i>. 2006."}},{"date_created":"2025-03-18T09:22:43Z","title":"Advances in Optimizing Screw-lype Machines","publication_status":"published","publication":"2006 IEEE International Conference on Systems, Man and Cybernetics","corporate_editor":["IEEE"],"user_id":"220548","publication_identifier":{"isbn":["1-4244-0099-6","1-4244-0100-3"]},"type":"conference","date_updated":"2026-03-17T15:29:22Z","publisher":"IEEE","page":"5147-5151","doi":"10.1109/ICSMC.2006.385125","status":"public","conference":{"location":"Taipei, Taiwan","name":"2006 IEEE International Conference on Systems, Man and Cybernetics","end_date":"2006-10-11","start_date":"2006-10-08"},"author":[{"full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308251","first_name":"Stefan"},{"first_name":"Madjid","last_name":"Fathi","full_name":"Fathi, Madjid"},{"full_name":"Holland, Alexander","last_name":"Holland","first_name":"Alexander"}],"citation":{"short":"S. Berlik, M. Fathi, A. Holland, in: IEEE (Ed.), 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2006, pp. 5147–5151.","chicago":"Berlik, Stefan, Madjid Fathi, and Alexander Holland. “Advances in Optimizing Screw-Lype Machines.” In <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 5147–51. IEEE, 2006. <a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">https://doi.org/10.1109/ICSMC.2006.385125</a>.","mla":"Berlik, Stefan, et al. “Advances in Optimizing Screw-Lype Machines.” <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, IEEE, 2006, pp. 5147–51, doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">10.1109/ICSMC.2006.385125</a>.","ama":"Berlik S, Fathi M, Holland A. Advances in Optimizing Screw-lype Machines. In: IEEE, ed. <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>. IEEE; 2006:5147-5151. doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">10.1109/ICSMC.2006.385125</a>","ieee":"S. Berlik, M. Fathi, and A. Holland, “Advances in Optimizing Screw-lype Machines,” in <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, Taipei, Taiwan, 2006, pp. 5147–5151.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Fathi, Madjid</span> ; <span style=\"font-variant:small-caps;\">Holland, Alexander</span>: Advances in Optimizing Screw-lype Machines. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> : IEEE, 2006, S. 5147–5151","bibtex":"@inproceedings{Berlik_Fathi_Holland_2006, title={Advances in Optimizing Screw-lype Machines}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">10.1109/ICSMC.2006.385125</a>}, booktitle={2006 IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Berlik, Stefan and Fathi, Madjid and Holland, Alexander}, editor={IEEEEditor}, year={2006}, pages={5147–5151} }","apa":"Berlik, S., Fathi, M., &#38; Holland, A. (2006). Advances in Optimizing Screw-lype Machines. In IEEE (Ed.), <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> (pp. 5147–5151). Taipei, Taiwan: IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2006.385125\">https://doi.org/10.1109/ICSMC.2006.385125</a>"},"language":[{"iso":"eng"}],"_id":"5836","year":"2006"},{"language":[{"iso":"eng"}],"_id":"5837","year":"2006","date_updated":"2026-03-17T15:29:22Z","page":"5320-5324","publisher":"IEEE","doi":"10.1109/ICSMC.2006.385154","status":"public","conference":{"end_date":"2006-10-11","start_date":"2006-10-08","location":"Taipei, Taiwan","name":"2006 IEEE International Conference on Systems, Man and Cybernetics"},"author":[{"first_name":"Alexander","last_name":"Holland","full_name":"Holland, Alexander"},{"first_name":"Madjid","last_name":"Fathi","full_name":"Fathi, Madjid"},{"full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","last_name":"Berlik","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308234","first_name":"Stefan"}],"citation":{"short":"A. Holland, M. Fathi, S. Berlik, in: IEEE (Ed.), 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2006, pp. 5320–5324.","chicago":"Holland, Alexander, Madjid Fathi, and Stefan Berlik. “Rule-Based Compilation of Graphical Structures.” In <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 5320–24. IEEE, 2006. <a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">https://doi.org/10.1109/ICSMC.2006.385154</a>.","mla":"Holland, Alexander, et al. “Rule-Based Compilation of Graphical Structures.” <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, IEEE, 2006, pp. 5320–24, doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">10.1109/ICSMC.2006.385154</a>.","ama":"Holland A, Fathi M, Berlik S. Rule-Based Compilation of Graphical Structures. In: IEEE, ed. <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>. IEEE; 2006:5320-5324. doi:<a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">10.1109/ICSMC.2006.385154</a>","ieee":"A. Holland, M. Fathi, and S. Berlik, “Rule-Based Compilation of Graphical Structures,” in <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i>, Taipei, Taiwan, 2006, pp. 5320–5324.","alphadin":"<span style=\"font-variant:small-caps;\">Holland, Alexander</span> ; <span style=\"font-variant:small-caps;\">Fathi, Madjid</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: Rule-Based Compilation of Graphical Structures. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> : IEEE, 2006, S. 5320–5324","apa":"Holland, A., Fathi, M., &#38; Berlik, S. (2006). Rule-Based Compilation of Graphical Structures. In IEEE (Ed.), <i>2006 IEEE International Conference on Systems, Man and Cybernetics</i> (pp. 5320–5324). Taipei, Taiwan: IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">https://doi.org/10.1109/ICSMC.2006.385154</a>","bibtex":"@inproceedings{Holland_Fathi_Berlik_2006, title={Rule-Based Compilation of Graphical Structures}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2006.385154\">10.1109/ICSMC.2006.385154</a>}, booktitle={2006 IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Holland, Alexander and Fathi, Madjid and Berlik, Stefan}, editor={IEEEEditor}, year={2006}, pages={5320–5324} }"},"publication":"2006 IEEE International Conference on Systems, Man and Cybernetics","publication_status":"published","corporate_editor":["IEEE"],"user_id":"220548","publication_identifier":{"isbn":["1-4244-0099-6","1-4244-0100-3"]},"type":"conference","date_created":"2025-03-18T09:22:44Z","title":"Rule-Based Compilation of Graphical Structures"},{"year":"2006","_id":"5838","editor":[{"first_name":"Robert","full_name":"Meersman, Robert","last_name":"Meersman"},{"full_name":"Tari, Zahir","last_name":"Tari","first_name":"Zahir"}],"language":[{"iso":"eng"}],"place":"Berlin, Heidelberg","author":[{"first_name":"Dhiah el Diehn I.","last_name":"Abou-Tair","full_name":"Abou-Tair, Dhiah el Diehn I."},{"last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308226","id":"237529","first_name":"Stefan"}],"citation":{"ama":"Abou-Tair D el DI, Berlik S. An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In: Meersman R, Tari Z, eds. <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006:983-994. doi:<a href=\"https://doi.org/10.1007/11914853_63\">10.1007/11914853_63</a>","mla":"Abou-Tair, Dhiah el Diehn I., and Stefan Berlik. “An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems.” <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, edited by Robert Meersman and Zahir Tari, Springer Berlin Heidelberg, 2006, pp. 983–94, doi:<a href=\"https://doi.org/10.1007/11914853_63\">10.1007/11914853_63</a>.","chicago":"Abou-Tair, Dhiah el Diehn I., and Stefan Berlik. “An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems.” In <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, edited by Robert Meersman and Zahir Tari, 983–94. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. <a href=\"https://doi.org/10.1007/11914853_63\">https://doi.org/10.1007/11914853_63</a>.","short":"D. el D.I. Abou-Tair, S. Berlik, in: R. Meersman, Z. Tari (Eds.), On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 983–994.","bibtex":"@inproceedings{Abou-Tair_Berlik_2006, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems}, DOI={<a href=\"https://doi.org/10.1007/11914853_63\">10.1007/11914853_63</a>}, booktitle={On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE}, publisher={Springer Berlin Heidelberg}, author={Abou-Tair, Dhiah el Diehn I. and Berlik, Stefan}, editor={Meersman, Robert and Tari, ZahirEditors}, year={2006}, pages={983–994}, collection={Lecture Notes in Computer Science} }","apa":"Abou-Tair, D. el D. I., &#38; Berlik, S. (2006). An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In R. Meersman &#38; Z. Tari (Eds.), <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i> (pp. 983–994). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11914853_63\">https://doi.org/10.1007/11914853_63</a>","alphadin":"<span style=\"font-variant:small-caps;\">Abou-Tair, Dhiah el Diehn I.</span> ; <span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems. In: <span style=\"font-variant:small-caps;\">Meersman, R.</span> ; <span style=\"font-variant:small-caps;\">Tari, Z.</span> (Hrsg.): <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006, S. 983–994","ieee":"D. el D. I. Abou-Tair and S. Berlik, “An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems,” in <i>On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE</i>, Montpellier, France, 2006, pp. 983–994."},"conference":{"end_date":"2006-11-03","start_date":"2006-10-29","name":"OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006","location":"Montpellier, France"},"status":"public","doi":"10.1007/11914853_63","publisher":"Springer Berlin Heidelberg","page":"983-994","date_updated":"2026-03-17T15:29:22Z","publication_identifier":{"issn":["0302-9743"],"isbn":["978-3-540-48287-1"],"eissn":["1611-3349"],"eisbn":["978-3-540-48289-5"]},"type":"conference","user_id":"220548","publication":"On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE","publication_status":"published","series_title":"Lecture Notes in Computer Science","title":"An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems","date_created":"2025-03-18T09:22:46Z"},{"date_created":"2025-03-18T09:22:50Z","title":"A Design and Optimization Tool for Screw Type Machines","volume":4,"type":"conference","publication_identifier":{"isbn":["0-7803-9298-1"]},"corporate_editor":["IEEE"],"user_id":"220548","publication_status":"published","publication":"2005 IEEE International Conference on Systems, Man and Cybernetics","citation":{"mla":"Berlik, Stefan, and M. Fathi. “A Design and Optimization Tool for Screw Type Machines.” <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, vol. 4, IEEE, 2005, pp. 3089–93, doi:<a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">10.1109/ICSMC.2005.1571620</a>.","ama":"Berlik S, Fathi M. A Design and Optimization Tool for Screw Type Machines. In: IEEE, ed. <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>. Vol 4. IEEE; 2005:3089-3093. doi:<a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">10.1109/ICSMC.2005.1571620</a>","chicago":"Berlik, Stefan, and M. Fathi. “A Design and Optimization Tool for Screw Type Machines.” In <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 4:3089–93. IEEE, 2005. <a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">https://doi.org/10.1109/ICSMC.2005.1571620</a>.","short":"S. Berlik, M. Fathi, in: IEEE (Ed.), 2005 IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2005, pp. 3089–3093.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Fathi, M.</span>: A Design and Optimization Tool for Screw Type Machines. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>. Bd. 4 : IEEE, 2005, S. 3089–3093","bibtex":"@inproceedings{Berlik_Fathi_2005, title={A Design and Optimization Tool for Screw Type Machines}, volume={4}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">10.1109/ICSMC.2005.1571620</a>}, booktitle={2005 IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Berlik, Stefan and Fathi, M.}, editor={IEEEEditor}, year={2005}, pages={3089–3093} }","apa":"Berlik, S., &#38; Fathi, M. (2005). A Design and Optimization Tool for Screw Type Machines. In IEEE (Ed.), <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i> (Vol. 4, pp. 3089–3093). Waikoloa, HI, USA : IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2005.1571620\">https://doi.org/10.1109/ICSMC.2005.1571620</a>","ieee":"S. Berlik and M. Fathi, “A Design and Optimization Tool for Screw Type Machines,” in <i>2005 IEEE International Conference on Systems, Man and Cybernetics</i>, Waikoloa, HI, USA , 2005, vol. 4, pp. 3089–3093."},"author":[{"last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","first_name":"Stefan","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308193","id":"237529"},{"first_name":"M.","full_name":"Fathi, M.","last_name":"Fathi"}],"status":"public","conference":{"name":"2005 IEEE International Conference on Systems, Man and Cybernetics","location":"Waikoloa, HI, USA ","start_date":"2005-10-12","end_date":"2005-10-12"},"doi":"10.1109/ICSMC.2005.1571620","intvolume":"         4","date_updated":"2026-03-17T15:29:23Z","publisher":"IEEE","page":"3089-3093","_id":"5841","year":"2005","language":[{"iso":"eng"}]},{"publication_status":"published","publication":"Computational Intelligence, Theory and Applications","series_title":"Advances in Soft Computing","user_id":"220548","type":"book_chapter","publication_identifier":{"isbn":["978-3-540-22807-3"],"eisbn":["978-3-540-31182-9"]},"date_created":"2025-03-18T09:22:52Z","title":"Directed Mutation by Means of the Skew-Normal Distribution","language":[{"iso":"eng"}],"editor":[{"last_name":"Reusch","full_name":"Reusch, Bernd","first_name":"Bernd"}],"_id":"5843","year":"2005","date_updated":"2026-03-17T15:29:23Z","page":"35-50","publisher":"Springer Berlin Heidelberg","doi":"10.1007/3-540-31182-3_4","status":"public","author":[{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308140","last_name":"Berlik","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: Directed Mutation by Means of the Skew-Normal Distribution. In: <span style=\"font-variant:small-caps;\">Reusch, B.</span> (Hrsg.): <i>Computational Intelligence, Theory and Applications</i>, <i>Advances in Soft Computing</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005, S. 35–50","bibtex":"@inbook{Berlik_2005, place={Berlin, Heidelberg}, series={Advances in Soft Computing}, title={Directed Mutation by Means of the Skew-Normal Distribution}, DOI={<a href=\"https://doi.org/10.1007/3-540-31182-3_4\">10.1007/3-540-31182-3_4</a>}, booktitle={Computational Intelligence, Theory and Applications}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan}, editor={Reusch, BerndEditor}, year={2005}, pages={35–50}, collection={Advances in Soft Computing} }","apa":"Berlik, S. (2005). Directed Mutation by Means of the Skew-Normal Distribution. In B. Reusch (Ed.), <i>Computational Intelligence, Theory and Applications</i> (pp. 35–50). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/3-540-31182-3_4\">https://doi.org/10.1007/3-540-31182-3_4</a>","ieee":"S. Berlik, “Directed Mutation by Means of the Skew-Normal Distribution,” in <i>Computational Intelligence, Theory and Applications</i>, B. Reusch, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 35–50.","mla":"Berlik, Stefan. “Directed Mutation by Means of the Skew-Normal Distribution.” <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, Springer Berlin Heidelberg, 2005, pp. 35–50, doi:<a href=\"https://doi.org/10.1007/3-540-31182-3_4\">10.1007/3-540-31182-3_4</a>.","ama":"Berlik S. Directed Mutation by Means of the Skew-Normal Distribution. In: Reusch B, ed. <i>Computational Intelligence, Theory and Applications</i>. Advances in Soft Computing. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:35-50. doi:<a href=\"https://doi.org/10.1007/3-540-31182-3_4\">10.1007/3-540-31182-3_4</a>","chicago":"Berlik, Stefan. “Directed Mutation by Means of the Skew-Normal Distribution.” In <i>Computational Intelligence, Theory and Applications</i>, edited by Bernd Reusch, 35–50. Advances in Soft Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/3-540-31182-3_4\">https://doi.org/10.1007/3-540-31182-3_4</a>.","short":"S. Berlik, in: B. Reusch (Ed.), Computational Intelligence, Theory and Applications, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 35–50."},"place":"Berlin, Heidelberg"},{"user_id":"220548","publication_identifier":{"eisbn":["978-3-540-31990-0"],"eissn":["1611-3349"],"isbn":["978-3-540-28896-1"],"issn":["0302-9743"]},"type":"conference","series_title":"Lecture Notes in Computer Science","publication":"Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III","publication_status":"published","date_created":"2025-03-18T09:22:47Z","title":"Directed Mutation Operators – An Overview","language":[{"iso":"eng"}],"editor":[{"first_name":"Rajiv","full_name":"Khosla, Rajiv","last_name":"Khosla"},{"first_name":"Robert J.","last_name":"Howlett","full_name":"Howlett, Robert J."},{"last_name":"Jain","full_name":"Jain, Lakhmi C.","first_name":"Lakhmi C."}],"_id":"5839","year":"2005","status":"public","conference":{"start_date":"2005-09-14","end_date":"2005-09-16","location":" Melbourne, Australia","name":"9th International Conference, KES 2005"},"author":[{"last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308220","id":"237529","first_name":"Stefan"},{"last_name":"Reusch","full_name":"Reusch, Bernd","first_name":"Bernd"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Reusch, Bernd</span>: Directed Mutation Operators – An Overview. In: <span style=\"font-variant:small-caps;\">Khosla, R.</span> ; <span style=\"font-variant:small-caps;\">Howlett, R. J.</span> ; <span style=\"font-variant:small-caps;\">Jain, L. C.</span> (Hrsg.): <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>, <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005, S. 1151–1159","apa":"Berlik, S., &#38; Reusch, B. (2005). Directed Mutation Operators – An Overview. In R. Khosla, R. J. Howlett, &#38; L. C. Jain (Eds.), <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i> (pp. 1151–1159). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11553939_160\">https://doi.org/10.1007/11553939_160</a>","bibtex":"@inproceedings{Berlik_Reusch_2005, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={Directed Mutation Operators – An Overview}, DOI={<a href=\"https://doi.org/10.1007/11553939_160\">10.1007/11553939_160</a>}, booktitle={Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan and Reusch, Bernd}, editor={Khosla, Rajiv and Howlett, Robert J. and Jain, Lakhmi C.Editors}, year={2005}, pages={1151–1159}, collection={Lecture Notes in Computer Science} }","ieee":"S. Berlik and B. Reusch, “Directed Mutation Operators – An Overview,” in <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>,  Melbourne, Australia, 2005, pp. 1151–1159.","mla":"Berlik, Stefan, and Bernd Reusch. “Directed Mutation Operators – An Overview.” <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>, edited by Rajiv Khosla et al., Springer Berlin Heidelberg, 2005, pp. 1151–59, doi:<a href=\"https://doi.org/10.1007/11553939_160\">10.1007/11553939_160</a>.","ama":"Berlik S, Reusch B. Directed Mutation Operators – An Overview. In: Khosla R, Howlett RJ, Jain LC, eds. <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:1151-1159. doi:<a href=\"https://doi.org/10.1007/11553939_160\">10.1007/11553939_160</a>","short":"S. Berlik, B. Reusch, in: R. Khosla, R.J. Howlett, L.C. Jain (Eds.), Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 1151–1159.","chicago":"Berlik, Stefan, and Bernd Reusch. “Directed Mutation Operators – An Overview.” In <i>Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III</i>, edited by Rajiv Khosla, Robert J. Howlett, and Lakhmi C. Jain, 1151–59. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11553939_160\">https://doi.org/10.1007/11553939_160</a>."},"place":"Berlin, Heidelberg","date_updated":"2026-03-17T15:29:22Z","publisher":"Springer Berlin Heidelberg","page":"1151-1159","doi":"10.1007/11553939_160"},{"publication":"Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I","series_title":"Lecture Notes in Computer Science","publication_status":"published","publication_identifier":{"isbn":["978-3-540-22344-3"],"eissn":["1611-3349"],"eisbn":["978-3-540-24854-5"],"issn":["0302-9743"]},"type":"conference","user_id":"220548","date_created":"2025-03-18T09:22:48Z","title":"A Step Size Preserving Directed Mutation Operator","_id":"5840","editor":[{"first_name":"Kalyanmoy","full_name":"Deb, Kalyanmoy","last_name":"Deb"}],"year":"2004","language":[{"iso":"eng"}],"doi":"10.1007/978-3-540-24854-5_79","date_updated":"2026-03-17T15:29:23Z","page":"786-787","publisher":"Springer Berlin Heidelberg","citation":{"mla":"Berlik, Stefan. “A Step Size Preserving Directed Mutation Operator.” <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, edited by Kalyanmoy Deb, Springer Berlin Heidelberg, 2004, pp. 786–87, doi:<a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">10.1007/978-3-540-24854-5_79</a>.","ama":"Berlik S. A Step Size Preserving Directed Mutation Operator. In: Deb K, ed. <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:786-787. doi:<a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">10.1007/978-3-540-24854-5_79</a>","short":"S. Berlik, in: K. Deb (Ed.), Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 786–787.","chicago":"Berlik, Stefan. “A Step Size Preserving Directed Mutation Operator.” In <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, edited by Kalyanmoy Deb, 786–87. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">https://doi.org/10.1007/978-3-540-24854-5_79</a>.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span>: A Step Size Preserving Directed Mutation Operator. In: <span style=\"font-variant:small-caps;\">Deb, K.</span> (Hrsg.): <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004, S. 786–787","bibtex":"@inproceedings{Berlik_2004, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={A Step Size Preserving Directed Mutation Operator}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">10.1007/978-3-540-24854-5_79</a>}, booktitle={Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I}, publisher={Springer Berlin Heidelberg}, author={Berlik, Stefan}, editor={Deb, KalyanmoyEditor}, year={2004}, pages={786–787}, collection={Lecture Notes in Computer Science} }","apa":"Berlik, S. (2004). A Step Size Preserving Directed Mutation Operator. In K. Deb (Ed.), <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i> (pp. 786–787). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-24854-5_79\">https://doi.org/10.1007/978-3-540-24854-5_79</a>","ieee":"S. Berlik, “A Step Size Preserving Directed Mutation Operator,” in <i>Genetic and Evolutionary Computation – GECCO 2004. Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004. Proceedings, Part I</i>, Seattle, WA, USA, 2004, pp. 786–787."},"author":[{"id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308216","first_name":"Stefan","last_name":"Berlik","full_name":"Berlik, Stefan","orcid":"0009-0007-3242-4501"}],"place":"Berlin, Heidelberg","status":"public","conference":{"end_date":"2004-06-30","start_date":"2004-06-26","name":"Genetic and Evolutionary Computation Conference ","location":"Seattle, WA, USA"}},{"volume":5,"date_created":"2025-03-18T09:22:55Z","title":"Optimizing screw machines using an evolution strategy with extended creation scheme","publication_status":"published","publication":"IEEE International Conference on Systems, Man and Cybernetics","corporate_editor":["IEEE"],"user_id":"220548","type":"conference","publication_identifier":{"isbn":["0-7803-7437-1"]},"date_updated":"2026-03-17T15:29:23Z","publisher":"IEEE","page":"6","doi":"10.1109/ICSMC.2002.1176382","intvolume":"         5","status":"public","conference":{"end_date":"2002-10-09","start_date":"2002-10-06","name":"SMC2002: IEEE International Conference on Systems, Man and Cybernetics","location":"Yasmine Hammamet, Tunisia"},"citation":{"ieee":"S. Berlik and M. Helpertz, “Optimizing screw machines using an evolution strategy with extended creation scheme,” in <i>IEEE International Conference on Systems, Man and Cybernetics</i>, Yasmine Hammamet, Tunisia, 2002, vol. 5, p. 6.","alphadin":"<span style=\"font-variant:small-caps;\">Berlik, Stefan</span> ; <span style=\"font-variant:small-caps;\">Helpertz, M.</span>: Optimizing screw machines using an evolution strategy with extended creation scheme. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>IEEE International Conference on Systems, Man and Cybernetics</i>. Bd. 5 : IEEE, 2002, S. 6","apa":"Berlik, S., &#38; Helpertz, M. (2002). Optimizing screw machines using an evolution strategy with extended creation scheme. In IEEE (Ed.), <i>IEEE International Conference on Systems, Man and Cybernetics</i> (Vol. 5, p. 6). Yasmine Hammamet, Tunisia: IEEE. <a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">https://doi.org/10.1109/ICSMC.2002.1176382</a>","bibtex":"@inproceedings{Berlik_Helpertz_2002, title={Optimizing screw machines using an evolution strategy with extended creation scheme}, volume={5}, DOI={<a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">10.1109/ICSMC.2002.1176382</a>}, booktitle={IEEE International Conference on Systems, Man and Cybernetics}, publisher={IEEE}, author={Berlik, Stefan and Helpertz, M.}, editor={IEEEEditor}, year={2002}, pages={6} }","short":"S. Berlik, M. Helpertz, in: IEEE (Ed.), IEEE International Conference on Systems, Man and Cybernetics, IEEE, 2002, p. 6.","chicago":"Berlik, Stefan, and M. Helpertz. “Optimizing Screw Machines Using an Evolution Strategy with Extended Creation Scheme.” In <i>IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, 5:6. IEEE, 2002. <a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">https://doi.org/10.1109/ICSMC.2002.1176382</a>.","mla":"Berlik, Stefan, and M. Helpertz. “Optimizing Screw Machines Using an Evolution Strategy with Extended Creation Scheme.” <i>IEEE International Conference on Systems, Man and Cybernetics</i>, edited by IEEE, vol. 5, IEEE, 2002, p. 6, doi:<a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">10.1109/ICSMC.2002.1176382</a>.","ama":"Berlik S, Helpertz M. Optimizing screw machines using an evolution strategy with extended creation scheme. In: IEEE, ed. <i>IEEE International Conference on Systems, Man and Cybernetics</i>. Vol 5. IEEE; 2002:6. doi:<a href=\"https://doi.org/10.1109/ICSMC.2002.1176382\">10.1109/ICSMC.2002.1176382</a>"},"author":[{"first_name":"Stefan","id":"237529","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0007-3242-4501/work/180308058","orcid":"0009-0007-3242-4501","full_name":"Berlik, Stefan","last_name":"Berlik"},{"first_name":"M.","last_name":"Helpertz","full_name":"Helpertz, M."}],"language":[{"iso":"eng"}],"_id":"5845","year":"2002"}]
