Dr. Maximilian Bügler, M.Sc.
Chief Technology Officer @ Altoida AG — Lecturer @ Technical University Munich
Curriculum Vitae
Time | Occupation |
| |
2018 - ongoing | Chief Technology Officer |
| Altoida AG |
| Switzerland |
| |
2016 - 2018 | Data Scientist |
| Altoida AG |
| Switzerland |
| |
2016 - ongoing | Lecturer |
| Course: Artificial Intelligence in Engineering |
| Chair of Computational Modeling and Simulation |
| Technische Universität München |
| Germany |
| |
2012 - 2016 | Researcher/PhD Candidate |
| Chair of Computational Modeling and Simulation |
| Technische Universität München |
| Germany |
| |
2010 - 2012 | Master Student |
| Operations Research |
| Graduated cum laude |
| Department of Data Science and Knowledge Engineering |
| Maastricht University |
| The Netherlands |
| |
2009 - 2012 | Student Assistant |
| Department of Data Science and Knowledge Engineering |
| Maastricht University |
| The Netherlands |
| |
2007 - 2010 | Bachelor Student |
| Knowledge Engineering | Computer Science |
| Department of Data Science and Knowledge Engineering |
| Maastricht University |
| The Netherlands |
| |
2004 - 2007 | College of Further Education |
| Berufsoberschule Rosenheim |
| Germany |
| |
2003 - 2004 | Computer Workshop Supervisor |
| PC-Spezialist Kolbermoor |
| Germany |
| |
2000 - 2003 | Apprenticeship, Computer Technician |
| PC-Spezialist Kolbermoor |
| Germany |
| |
1999 - 2000 | Junior High School |
| Grund- und Hauptschule Heufeld |
| Germany |
| |
1996 - 1999 | Secondary School |
| Wilhelm Leibl Realschule Bad Aibling |
| Germany |
| |
1993 - 1996 | Secondary School |
| Finsterwalder Gymnasium Rosenheim |
| Germany |
| |
1989 - 1993 | Elementary School |
| Grund- und Hauptschule Heufeld |
| Germany |
Projects
- Altoida ADPS - Monitoring cognition through evaluating perceptual and memory function in personnel at risk or with Mild Cognitive Impairment/Prodromal Alzheimer’s Disease [Website]
- BIMsite - BIM-based planning, simulation, and monitoring of construction sites (PhD project) [Website]
- Planning, simulation and optimzation of large scale construction projects (PhD project) [Website]
- Assessing and updating the reliability of concrete bridges subjected to spatial deterioration (PhD project)
- Integrating feedback from image based 3D reconstruction into models of excavation processes (PhD project) [Website]
- Multi-scale pedestrian simulation (PhD project) [Website]
- Artificial intelligence-based bridge design (PhD project)
- Simulating the development of obesity in the dutch population (Master's thesis) [Thesis]
- Planning, simulation, and optimization of a manned mission to Titan (Study project)
- Developing a semi-automated medical diagnosis system (Study project)
- Implement swarm intelligence using E-Puck robots (Study project) [Video]
- Programming a humanoid robot to play soccer by recognizing, locating and kicking the ball (Study research project) [Video]
- Simulating the evolution of polyembrionic parasitoid wasps (Bachelor's thesis) [Thesis][Paper]
- Automated analysis of ECG data to diagnose heart diseases (Study project)
- Developing a telepresence system using a robotic platform (Internship project)
- Simulation of bee swarms (Study project)
- Development of a program to solve problems in the area of game theory (Study project)
- Simulation of 2D environments for testing localization filters (Study project)
- Developing solutions for solving knapsack problems (Study project)
- Designing and building a model boat propelled by a magnetohydrodynamic drive (MHD) (High school project)
Skills
Programming in the following languages:
- JavaScript/Node (Expert)
- Python (Expert)
- Java (Expert)
- Octave/Matlab (Expert)
- PHP (Expert)
- HTML (Expert)
- CSS (Expert)
- Bash/Sh (Expert)
- Ajax (Experienced)
- JQuery (Experienced)
- Visual Basic, .net (Experienced)
- C, C++ (Experienced)
- SQL (Experienced)
Simulation of complex systems:
- Construction simulation
- Process simulation
- Physics simulation
- Simulation of space missions
- Swarm robotics
- Simulations in medicine and biology
Optimization:
- Constraint satisfaction problems
- Schedule optimization
- Optimal resource allocation
- Production optimization
- Game theory
- Linear and non-linear programming
- Regression
- Development, testing, and evaluation of new algorithms
|
Artificial intelligence:
- Frameworks:
- Scikit-learn
- Tensorflow
- MXNet
- Weka
- Strategic planning
- Risk assessment
- Disease prediction
- Classification
- Decision making
- Learning in games and robotics
- Self organization
- Image and video analysis
- Object and language recognition
- Audio and text synthesis
Signal and image analysis:
- Fourier and Wavelet analysis
- Statistical analysis
Bayesian networks:
- Automatic diagnosis systems
- Damage models of bridges
Statistical data analysis:
- Hypothesis testing
- Classification
- Clustering
Data mining/information extraction:
- Extracting metrics and relations from unstructured data to be used for machine learning
|
Scalable infrastructure:
- Deep knowledge of Amazon Web Services (AWS)
- Very experienced with scalable web service development using node.js
Presentation of projects and results:
- Data visualization
- Preparing slides and giving talks for different audiences
- Acquisition of >1.000.000€ project funding during my PhD period at TUM
Version control systems:
- Subversion (SVN)
- git
- Bitbucket
- Mercurial
- Jenkins
Web programming:
- HTML
- JavaScript
- CSS
- Ajax
- JQuery
- SQL
Electronic engineering (Hobby):
- Circuit design
- PCB routing and manufacturing
- Debugging
- Digital circuits
|
Publications
Journal Papers:
Bügler, M.; Harms, R.L.; Balasa, M.; et al.
Digital biomarker‐based individualized prognosis for people at risk of dementia.
Alzheimer's & Dementia: Diagnosis Assessment & Disease Monitoring 12 (1), 2020
DOI:
10.1002/dad2.12073
Bügler, M.; Borrmann, A.; Ogunmaking, G.; Vela, P. A.; Teizer, J.:
Fusion of Photogrammetry and Video Analysis for Productivity Assessment of Earthwork Processes
Computer-Aided Civil and Infrastructure Engineering 32 (2), pp. 107-123, 2017
DOI:
10.1111/mice.12235
A. Kargul, W. A. Günthner, M. Bügler, A. Borrmann:
Web based field data analysis and data-driven simulation application for construction performance prediction
Journal of Information Technology in Construction 20, pp. 479-494, 2015
R. Schneider, J. Fischer, M. Bügler, M. Nowak, S. Thöns, A. Borrmann, D. Straub:
Assessing and updating the reliability of concrete bridges subjected to spatial deterioration - principles and software implementation
Structural Concrete 16 (3), pp. 356-365, 2015
DOI:
10.1002/suco.201500014
M. Bügler, C. Rempoulakis, R. Shacham, T. Keasar, F. Thuijsman:
Sex allocation in a polyembryonic parasitoid with female soldiers: An evolutionary simulation and an experimental test
PLOS ONE 8 (6), pp. e64780, Public Library of Science, 2013
DOI:
10.1371/journal.pone.0064780
Book Chapters:
M. Bügler, A. Borrmann:
Simulation Based Construction Project Schedule Optimization: An Overview on the State-of-the-Art
In: Miranda, F.; Abreu, C. (Eds): Handbook of Research on Computational Simulation and Modeling in Engineering, IGI Global, 2015
DOI:
10.4018/978-1-4666-8823-0
Conference Papers:
D. Singer, M. Bügler, A. Borrmann:
Knowledge based Bridge Engineering - Artificial Intelligence meets Building Information Modeling
In: Proc. of the EG-ICE Workshop on Intelligent Computing in Engineering, Krakow, Poland, 2016
S. Krepp, K. Jahr, S. Bigontina, M. Bügler, A. Borrmann:
BIMsite - Towards a BIM-based Generation and Evaluation of Realization Variants Comprising Construction Methods, Site Layouts and Schedules
In: Proc. of the EG-ICE Workshop on Intelligent Computing in Engineering, Krakow, Poland, 2016
R. Schneider, J. Fischer, M. Bügler, S. Thöns, A. Borrmann, D. Straub:
A software prototype for assessing the reliability of a concrete bridge superstructure subjected to chloride-induced reinforcement corrosion
In: Proc. of the IALCCE, Tokyo, Japan, 2014
DOI:
10.13140/RG.2.1.3581.6806
M. Bügler; G. Ongunmakin; J. Teizer; P. A. Vela; A. Borrmann:
A Comprehensive Methodology for Vision-Based Progress and Activity Estimation of Excavation Processes for Productivity Assessment
In: Proc. of the EG-ICE Workshop on Intelligent Computing in Engineering, Cardiff, Wales, 2014
DOI:
10.13140/RG.2.1.4630.2561
M. Bügler; A. Borrmann:
Using Swap-Based Search Trees to obtain Solutions for Resource Constrained Project Scheduling Problems
In: Proceedings in Applied Mathematics and Mechanics, Erlangen, Germany, 2014
DOI:
10.1002/pamm.201410385
M. Bügler, G. Dori, A. Borrmann:
Swap Based Process Schedule Optimization using Discrete-Event Simulation
In: Proceedings of the CONVR International Conference on Construction Applications of Virtual Reality, London, 2013
DOI:
10.13140/RG.2.1.2008.8162
M. Bügler, A. Kargul, J. Wimmer, T. Horenburg, A. Borrmann, W. A. Günthner:
FAUST - Fertigungssynchrone Ablaufsimulation von Unikatbaustellen im Spezialtiefbau
In: Proceedings of the International BBB Congress, Darmstadt, Germany, 2013
DOI:
10.13140/RG.2.1.3057.3928
M. Bügler, H. Metzmacher, A. Borrmann, C.v. Treeck:
Integrating Feedback from Image based 3D Reconstruction into Models of Excavation Processes for efficient Scheduling
In: Proceedings of the EG-ICE Workshop on Intelligent Computing in Engineering, Vienna, Austria, 2013
DOI:
10.13140/RG.2.1.4105.9684
S. Alers, D. Bloembergen, M. Bügler, D. Hennes, K. Tuyls:
MITRO: an augmented mobile telepresence robot with assisted control
In: Proceedings of the AAMAS International Conference on Autonomous Agents and Multiagent Systems, p1475-1476, Valencia, 2012
Books:
F. Ritter, G. Schubert, M. Bügler, A. Braun, J. Amann, J. R. Jubierre, S. Daum (Editors):
Tagungsband des 25. Forum Bauinformatik 2013, Shaker Verlag
ISBN: 978-3-8440-2191-2
DOI:
10.2370/9783844021912
Theses:
M. Bügler:
Reactive Simulation of Shoring and Excavation Processes based on Automated Performance Monitoring
PhD Thesis, Technical University Munich, 2016
M. Bügler, F. Thuijsman:
Modeling the Development of Obesity in Populations
Master Thesis, Maastricht University, 2012
DOI:
10.13140/RG.2.1.3899.0161
M. Bügler, F. Thuijsman:
A Model of Oviposition Behavior of Copidosoma koehleri Parasitoid Wasps
Bachelor Thesis, Maastricht University, 2010
DOI:
10.13140/RG.2.1.1277.5762
Reports:
R. Schneider, J. Fischer, D. Straub, S. Thöns, M. Bügler, A. Borrmann:
Smart bridge - Prototype for assessing and updating the condition state and reliability of elements of the bridge model
In: BASt-Beiträge / ITRD Sachgebiete / 61 Unterhaltung und Instandsetzung, 2015
A. Kargul, M. Bügler, S. Kessler, A. Borrmann, W. A. Günthner:
Fertigungssynchrone Ablaufsimulation von Unikatbaustellen im Tiefbau
In: Arenz, B.; Blaasch, G.; Bischof, R. (Eds): Bauportal, Erich Schmidt Verlag GmbH & Co. KG, 2014
M. Bügler, N. Roos:
Efficient object recognition for robot soccer using the Nao Robot
Project Report, Research Based Learning, Maastricht University, 2010
DOI:
10.13140/RG.2.1.4892.4000
Photos
Me giving a talk at the LOC Center Day 2016 at Technical University Munich, November 11, 2016
‹
›
Hobby Projects
Astro Photography
In 2020 I decided to pick up another hobby based on my early fascination with space. After I found what is possible from my relatively dark Bortle class 4 backyard, I definitely wanted to get into the highly technical hobby of astro photography.
Please also visit my AstroBin to see more of my work.
The Wizard Nebula NGC 7380.
‹
›
Photography
My own 8-bit computer
I've built my own 8-bit computer from 4000 and 74HC series CMOS ICs. Find out more about it here.
3D Printing and Miniature Painting
One of my more recently acquired hobbies is 3D printing and designing models myself. Mostly I print miniature models for board games and have great joy painting them. Some models however, I just print and paint for the joy of it.
My 'Maker Space' on July 22, 2018 featuring two 3D printers and a CNC mill.
‹
›
Check out my Thingiverse page for more of my designs and makes.
Open Source Software
Check out my github page for more of my open source projects.
Java Libraries
Java Applets
(Require Java to be enabled in your browser)
Agentology Cargo Simulator
Agentology is a 2D cargo agent simulator designed for educational purposes. |
 |
 |
Download
Agentology source package 0.7 (9.4 KB)
Agentology source package 0.6 (8.1 KB)
License
Licensed under
GNU GENERAL PUBLIC LICENSE Version 3
Documentation
What does Agentology do?
Agentology is a java based framework that provides a simulation environment to experiment with different types of agents. The agents have to unload cargo from a container and load them into the storage area. In order to make it easier or harder for the agents different scenarios can be designed. The aim is to develop an agent that will unload the cargo as fast as possible.
Who can use Agentology?
In order to use agentology you should have basic knowledge about the java programming language.
How does Agentology work?
When starting a new simulation the world is initialized according to the scenario defined in the launcher class. The selected number of agents will then be initialized by repeatedly calling the getInstance(...) method of the agent class.
The simulation is then executed stepwise. At each step (1 timeunit) each agent gets the chance to do something which means every agent gets a call on the doSomething() method.
At this point the agent has the chance to perform at max one action.
In order to communicate agents can broadcast messages which will be received by all agents or send messages to single agents. Each agent is assigned an unique ID.
Message sending and querying information from the environment is not limited.
- agents can not pass Walls.
- agents can go below a package to pick it up (unless they are carrying a package), but not go from below one package to below another.
- agents may perform at max one action (also if it fails) each time the doSomething() method is called.
- agents can query as much information as they want.
- agents can send and receive as many messages as they want.
Broadcast messages are output into the console.
Agentology is not multi-threaded, so you don"t have to care about your code being thread safe.
When a simulation is finished the results of the simulation are displayed in a messagebox.
Recorded information is:
- elapsed time
- consumed fuel (1 move means 1 fuel unit)
- number of broadcast messages.
How to setup Agentology on your computer?
- Make sure you have a java software development kit (jdk) installed.
- If you like install an java IDE of your choice (like eclipse or intellij IDEA)
- Download the Agentology source package
- Extract it to an empty folder
- If you use an IDE setup a new project from the extracted source folder, otherwise you have to compile Agentology manually.
- You can now run Agentology by either launching mainGraphical.java or mainText.java in the Launchers Package
For easy working with the source files a java integrated development environment (IDE) like Eclipse, NetBeans or IntelliJ IDEA is recommended.
What does the graphical output mean?
- Colored squares are boxes.
- Circles are agents.
- Circles with black dots in the center are agents carrying boxes.
- Green rectangle is pick up area.
- Red rectangle is drop off area.
- Gray areas are walls.
How to create your own scenarios?
Scenarios are defined in the Scenarios package. The Scenario interface looks like this:

An example scenario ExampleScenario.java is also contained in that package.
You can also load scenarios from comma separated data using CommaSeparatedScenario.java
How to create your own agent?
An agent is basically a single java class implementing the Agent.java interface and being provided with the interface AgentController.java to control the agent in the environment.
Agentology is not multi-threaded, so you don"t have to care about your code being thread safe.

The package contains two simple example implementations located in the Agents package.
DumbAgent.java and BetterAgent.java . Have a look at those classes for further information.
In order to increase difficulty methods can be removed from the AgentController interface
How to start a simulation?
In the top lines of the main method in the launcher classes MainGraphical.java and MainText.java you can select the agent class and the scenario to use. Afterwards execute the class.
You will find more information in the comments of the source files.
JCryptoholic
JCryptoholic is a RSA based file encryption system that allows the user to specify the level of security and hide encrypted data within png and bmp images.
|
 |
ALPHA VERSION - ABSOLUTELY NO WARRANTY
USE AT YOUR OWN RISK
INTENDED FOR EDUCATIONAL PURPOSES - FOR REAL SECURITY YOU"D NEED TO ATTACH A PROPER RANDOM NUMBER GENERATOR!
Features:
- Command line interface
- GUI
- Variable security (Up to 8192bit keychipers)
- Multithreaded key generation
- Image steganography. Hide encrypted files within png/bmp images.
- Hides information in the least significant bits of the color values of each pixel in the image.
- Choose maximum number of bits to use per byte (1...4).
- Modified bits are spread over the entire image to minimize visible changes to the image.
- Virtually invisible in photos.
- Hide keys in images.
How it works:
- User A generates a pair of keys and sends the public key to user B, while storing the private key at a safe location.
- User A can also hide the public key within an image and send the image to user B.
- In case user A has hidden the key within an image, user B has to discover it first.
- User B encrypts a file using user A"s public key and sends the encrypted file to user A.
- Alternatively User B can hide the encrypted file within an image of his choice and send the image to user A.
- User A can now decrypt the file using his private key.
System requirements:
- Java runtime environment (jre) 1.6
Command line interface
- JCryptoholic 0.6alpha
- Create a pair of keys
jcryptoholic c <bits> <digits> <public key file> <private key file> [numThreads]
- Encrypt a file
-
jcryptoholic e <public key file> <input file> <output file>
- Decrypt a file
-
jcryptoholic d <private key file> <input file> <output file>
- Hide a file
jcryptoholic h <input image> <input file> <output image> [bitsPerByte]
- Discover a file
jcryptoholic s <input image> <output file>
- Encrypt and hide a file
-
jcryptoholic eh <public key file> <input image> <input file> <output image> [bitsPerByte]
- Discover and decrypt a file
-
jcryptoholic sd <private key file> <input image> <output file>
- Get this help
- Start GUI (no parameters)
Downloads:
jcryptoholic.tar.gz (Source code 0.6alpha)
jcryptoholic.jar (Binary 0.6alpha)
License
Licensed under
GNU GENERAL PUBLIC LICENSE Version 3
JCompress
JCompress is a java package containing compression and coding algorithms for educational purposes.
ALPHA VERSION - ABSOLUTELY NO WARRANTY
USE AT YOUR OWN RISK
System requirements:
- Java runtime environment (jre) 1.6
Currently contains:
- Huffman coding
- LZ77 compression
Downloads:
jcompress.tar.gz (Source code)
License
Licensed under
GNU GENERAL PUBLIC LICENSE Version 3
Markov Music Generator
That"s not music, ... is it?
A just for fun project
Markov Music is a random music generator that creates samples mathematically according to a number of parameters. |
 |
Features:
- 8 mathematical instruments
- Add as many tracks as you like.
- Randomize frequencies, amplitudes, beats.
- Synchronize tracks.
- Export result to wave.
- Set random seed to make results reproducable.
- No realtime playback possible yet.
System requirements:
- Java runtime environment (jre) 1.6
Downloads:
MarkovMusic.jar (Binary)
MarkovMusic.tar.gz (Source)
example1.wav (Example output)
example2.wav (Example output)
example3.wav (Example output)
License
Licensed under
GNU GENERAL PUBLIC LICENSE Version 3
Impressum
Verantwortlich für den Inhalt dieser Webseite:
Maximilian Bügler
Rosenheimer Straße 26
83135 Schechen
max@maxbuegler.eu www.maxbuegler.eu
Haftungsausschluss
1. Inhalt des Onlineangebotes
Der Autor übernimmt keinerlei Gewähr für die Aktualität, Korrektheit, Vollständigkeit oder Qualität der bereitgestellten Informationen. Haftungsansprüche gegen den Autor, welche sich auf Schäden materieller oder ideeller Art beziehen, die durch die Nutzung oder Nichtnutzung der dargebotenen Informationen bzw. durch die Nutzung fehlerhafter und unvollständiger Informationen verursacht wurden, sind grundsätzlich ausgeschlossen, sofern seitens des Autors kein nachweislich vorsätzliches oder grob fahrlässiges Verschulden vorliegt.
Alle Angebote sind freibleibend und unverbindlich. Der Autor behält es sich ausdrücklich vor, Teile der Seiten oder das gesamte Angebot ohne gesonderte Ankündigung zu verändern, zu ergänzen, zu löschen oder die Veröffentlichung zeitweise oder endgültig einzustellen.
2. Verweise und Links
Bei direkten oder indirekten Verweisen auf fremde Webseiten (Hyperlinks), die außerhalb des Verantwortungsbereiches des Autors liegen, würde eine Haftungsverpflichtung ausschließlich in dem Fall in Kraft treten, in dem der Autor von den Inhalten Kenntnis hat und es ihm technisch möglich und zumutbar wäre, die Nutzung im Falle rechtswidriger Inhalte zu verhindern.
Der Autor erklärt hiermit ausdrücklich, dass zum Zeitpunkt der Linksetzung keine illegalen Inhalte auf den zu verlinkenden Seiten erkennbar waren. Auf die aktuelle und zukünftige Gestaltung, die Inhalte oder die Urheberschaft der verlinkten/verknüpften Seiten hat der Autor keinerlei Einfluss. Deshalb distanziert er sich hiermit ausdrücklich von allen Inhalten aller verlinkten /verknüpften Seiten, die nach der Linksetzung verändert wurden. Diese Feststellung gilt für alle innerhalb des eigenen Internetangebotes gesetzten Links und Verweise sowie für Fremdeinträge in vom Autor eingerichteten Gästebüchern, Diskussionsforen, Linkverzeichnissen, Mailinglisten und in allen anderen Formen von Datenbanken, auf deren Inhalt externe Schreibzugriffe möglich sind. Für illegale, fehlerhafte oder unvollständige Inhalte und insbesondere für Schäden, die aus der Nutzung oder Nichtnutzung solcherart dargebotener Informationen entstehen, haftet allein der Anbieter der Seite, auf welche verwiesen wurde, nicht derjenige, der über Links auf die jeweilige Veröffentlichung lediglich verweist.
3. Urheber- und Kennzeichenrecht
Der Autor ist bestrebt, in allen Publikationen die Urheberrechte der verwendeten Grafiken, Tondokumente, Videosequenzen und Texte zu beachten, von ihm selbst erstellte Grafiken, Tondokumente, Videosequenzen und Texte zu nutzen oder auf lizenzfreie Grafiken, Tondokumente, Videosequenzen und Texte zurückzugreifen.
Alle innerhalb des Internetangebotes genannten und ggf. durch Dritte geschützten Marken- und Warenzeichen unterliegen uneingeschränkt den Bestimmungen des jeweils gültigen Kennzeichenrechts und den Besitzrechten der jeweiligen eingetragenen Eigentümer. Allein aufgrund der bloßen Nennung ist nicht der Schluss zu ziehen, dass Markenzeichen nicht durch Rechte Dritter geschützt sind!
Das Copyright für veröffentlichte, vom Autor selbst erstellte Objekte bleibt allein beim Autor der Seiten. Eine Vervielfältigung oder Verwendung solcher Grafiken, Tondokumente, Videosequenzen und Texte in anderen elektronischen oder gedruckten Publikationen ist ohne ausdrückliche Zustimmung des Autors nicht gestattet.
4. Datenschutz
Sofern innerhalb des Internetangebotes die Möglichkeit zur Eingabe persönlicher oder geschäftlicher Daten (Emailadressen, Namen, Anschriften) besteht, so erfolgt die Preisgabe dieser Daten seitens des Nutzers auf ausdrücklich freiwilliger Basis. Die Inanspruchnahme und Bezahlung aller angebotenen Dienste ist - soweit technisch möglich und zumutbar - auch ohne Angabe solcher Daten bzw. unter Angabe anonymisierter Daten oder eines Pseudonyms gestattet. Die Nutzung der im Rahmen des Impressums oder vergleichbarer Angaben veröffentlichten Kontaktdaten wie Postanschriften, Telefon- und Faxnummern sowie Emailadressen durch Dritte zur Übersendung von nicht ausdrücklich angeforderten Informationen ist nicht gestattet. Rechtliche Schritte gegen die Versender von sogenannten Spam-Mails bei Verstössen gegen dieses Verbot sind ausdrücklich vorbehalten.
5. Rechtswirksamkeit dieses Haftungsausschlusses
Dieser Haftungsausschluss ist als Teil des Internetangebotes zu betrachten, von dem aus auf diese Seite verwiesen wurde. Sofern Teile oder einzelne Formulierungen dieses Textes der geltenden Rechtslage nicht, nicht mehr oder nicht vollständig entsprechen sollten, bleiben die übrigen Teile des Dokumentes in ihrem Inhalt und ihrer Gültigkeit davon unberührt.
Disclaimer
1. Content
The author reserves the right not to be responsible for the topicality, correctness, completeness or quality of the information provided. Liability claims regarding damage caused by the use of any information provided, including any kind of information which is incomplete or incorrect,will therefore be rejected.
All offers are not-binding and without obligation. Parts of the pages or the complete publication including all offers and information might be extended, changed or partly or completely deleted by the author without separate announcement.
2. Referrals and links
The author is not responsible for any contents linked or referred to from his pages - unless he has full knowledge of illegal contents and would be able to prevent the visitors of his site fromviewing those pages. If any damage occurs by the use of information presented there, only the author of the respective pages might be liable, not the one who has linked to these pages. Furthermore the author is not liable for any postings or messages published by users of discussion boards, guestbooks or mailinglists provided on his page.
3. Copyright
The author intended not to use any copyrighted material for the publication or, if not possible, to indicatethe copyright of the respective object.
The copyright for any material created by the author is reserved. Any duplication or use of objects such as diagrams, sounds or texts in other electronic or printed publications is not permitted without the author's agreement.
4. Privacy policy
If the opportunity for the input of personal or business data (email addresses, name, addresses) is given, the input of these data takes place voluntarily. The use and payment of all offered services are permitted - if and so far technically possible and reasonable - without specification of any personal data or under specification of anonymized data or an alias. The use of published postal addresses, telephone or fax numbers and email addresses for marketing purposes is prohibited, offenders sending unwanted spam messages will be punished.
5. Legal validity of this disclaimer
This disclaimer is to be regarded as part of the internet publication which you were referred from. If sections or individual terms of this statement are not legal or correct, the content or validity of the other parts remain uninfluenced by this fact.