--- _id: '4684' author: - first_name: Daniel full_name: Beverungen, Daniel id: '59677' last_name: Beverungen - first_name: Oliver full_name: Müller, Oliver id: '72849' last_name: Müller - first_name: Martin full_name: Matzner, Martin last_name: Matzner - first_name: Jan full_name: Mendling, Jan last_name: Mendling - first_name: Jan full_name: vom Brocke, Jan last_name: vom Brocke citation: ama: Beverungen D, Müller O, Matzner M, Mendling J, vom Brocke J. Conceptualizing smart service systems. Electronic Markets. 2019:1--12. doi:10.1007/s12525-017-0270-5 apa: Beverungen, D., Müller, O., Matzner, M., Mendling, J., & vom Brocke, J. (2019). Conceptualizing smart service systems. Electronic Markets, 1--12. https://doi.org/10.1007/s12525-017-0270-5 bibtex: '@article{Beverungen_Müller_Matzner_Mendling_vom Brocke_2019, title={Conceptualizing smart service systems}, DOI={10.1007/s12525-017-0270-5}, journal={Electronic Markets}, author={Beverungen, Daniel and Müller, Oliver and Matzner, Martin and Mendling, Jan and vom Brocke, Jan}, year={2019}, pages={1--12} }' chicago: Beverungen, Daniel, Oliver Müller, Martin Matzner, Jan Mendling, and Jan vom Brocke. “Conceptualizing Smart Service Systems.” Electronic Markets, 2019, 1--12. https://doi.org/10.1007/s12525-017-0270-5. ieee: D. Beverungen, O. Müller, M. Matzner, J. Mendling, and J. vom Brocke, “Conceptualizing smart service systems,” Electronic Markets, pp. 1--12, 2019. mla: Beverungen, Daniel, et al. “Conceptualizing Smart Service Systems.” Electronic Markets, 2019, pp. 1--12, doi:10.1007/s12525-017-0270-5. short: D. Beverungen, O. Müller, M. Matzner, J. Mendling, J. vom Brocke, Electronic Markets (2019) 1--12. date_created: 2018-10-12T08:24:45Z date_updated: 2022-01-06T07:01:18Z doi: 10.1007/s12525-017-0270-5 extern: '1' keyword: - Boundary object - Internet of things - Service science - Smart products - Smart service language: - iso: eng page: 1--12 publication: Electronic Markets publication_identifier: issn: - '14228890' status: public title: Conceptualizing smart service systems type: journal_article user_id: '72849' year: '2019' ... --- _id: '1156' abstract: - lang: eng text: In this paper, we present an IoT architecture which handles stream sensor data of air pollution. Particle pollution is known as a serious threat to human health. Along with developments in the use of wireless sensors and the IoT, we propose an architecture that flexibly measures and processes stream data collected in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread network of wireless sensors that can follow changes in human behavior. Apart from stating reasons for the need of such a development and its requirements, we provide a conceptual design as well as a technological design of such an architecture. The technological design consists of Kaa and Apache Storm which can collect air pollution information in real-time and solve various problems to process data such as missing data and synchronization. This enables us to add a simulation in which we provide issues that might come up when having our architecture in use. Together with these issues, we state r easons for choosing specific modules among candidates. Our architecture combines wireless sensors with the Kaa IoT framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management System among others. We even provide open-government data sets that are freely available. author: - first_name: Joschka full_name: Kersting, Joschka id: '58701' last_name: Kersting - first_name: Michaela full_name: Geierhos, Michaela id: '42496' last_name: Geierhos orcid: 0000-0002-8180-5606 - first_name: Hanmin full_name: Jung, Hanmin last_name: Jung - first_name: Taehong full_name: Kim, Taehong last_name: Kim citation: ama: 'Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere V, Wills G, Walters R, Chang V, eds. Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security. Setúbal, Portugal: SCITEPRESS; 2017:117-124. doi:10.5220/0006354801170124' apa: 'Kersting, J., Geierhos, M., Jung, H., & Kim, T. (2017). Internet of Things Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, & V. Chang (Eds.), Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (pp. 117–124). Setúbal, Portugal: SCITEPRESS. https://doi.org/10.5220/0006354801170124' bibtex: '@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal}, title={Internet of Things Architecture for Handling Stream Air Pollution Data}, DOI={10.5220/0006354801170124}, booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert and Chang, VictorEditors}, year={2017}, pages={117–124} }' chicago: 'Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet of Things Architecture for Handling Stream Air Pollution Data.” In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills, Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017. https://doi.org/10.5220/0006354801170124.' ieee: J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture for Handling Stream Air Pollution Data,” in Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, Porto, Portugal, 2017, pp. 117–124. mla: Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream Air Pollution Data.” Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, edited by Muthu Ramachandran et al., SCITEPRESS, 2017, pp. 117–24, doi:10.5220/0006354801170124. short: 'J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, SCITEPRESS, Setúbal, Portugal, 2017, pp. 117–124.' conference: end_date: 2017-04-26 location: Porto, Portugal name: 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017) start_date: 2017-04-24 date_created: 2018-01-31T14:45:21Z date_updated: 2022-01-06T06:51:03Z ddc: - '000' department: - _id: '36' - _id: '1' - _id: '579' doi: 10.5220/0006354801170124 editor: - first_name: Muthu full_name: Ramachandran, Muthu last_name: Ramachandran - first_name: Víctor full_name: Méndez Muñoz, Víctor last_name: Méndez Muñoz - first_name: Verena full_name: Kantere, Verena last_name: Kantere - first_name: Gary full_name: Wills, Gary last_name: Wills - first_name: Robert full_name: Walters, Robert last_name: Walters - first_name: Victor full_name: Chang, Victor last_name: Chang file: - access_level: closed content_type: application/pdf creator: jkers date_created: 2020-09-18T09:09:27Z date_updated: 2020-09-18T09:09:27Z file_id: '19567' file_name: IoTBDS_2017_50_final.pdf file_size: 2612566 relation: main_file success: 1 file_date_updated: 2020-09-18T09:09:27Z has_accepted_license: '1' keyword: - Wireless Sensor Network - Internet of Things - Stream Data - Air Pollution - DSMS - Real-time Data Processing language: - iso: eng page: 117-124 place: Setúbal, Portugal publication: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security publication_identifier: isbn: - 978-989-758-245-5 publication_status: published publisher: SCITEPRESS quality_controlled: '1' status: public title: Internet of Things Architecture for Handling Stream Air Pollution Data type: conference user_id: '58701' year: '2017' ... --- _id: '50415' author: - first_name: Lars full_name: Riedl, Lars id: '31513' last_name: Riedl - first_name: Marco full_name: Giesselmann, Marco last_name: Giesselmann citation: ama: 'Riedl L, Giesselmann M. Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs. In: Grau A, von der Heyde J, Kotthaus J, Schmidt H, Winands M, eds. Sozialwissenschaftliche Perspektiven der Fußballfanforschung. Beltz Juventa; 2017:157-175.' apa: 'Riedl, L., & Giesselmann, M. (2017). Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs. In A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, & M. Winands (Eds.), Sozialwissenschaftliche Perspektiven der Fußballfanforschung (pp. 157–175). Beltz Juventa.' bibtex: '@inbook{Riedl_Giesselmann_2017, place={Weinheim, Basel}, title={Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs}, booktitle={Sozialwissenschaftliche Perspektiven der Fußballfanforschung}, publisher={Beltz Juventa}, author={Riedl, Lars and Giesselmann, Marco}, editor={Grau, Andreas and von der Heyde, Judith and Kotthaus, Jochem and Schmidt, Holger and Winands, Martin}, year={2017}, pages={157–175} }' chicago: 'Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” In Sozialwissenschaftliche Perspektiven der Fußballfanforschung, edited by Andreas Grau, Judith von der Heyde, Jochem Kotthaus, Holger Schmidt, and Martin Winands, 157–75. Weinheim, Basel: Beltz Juventa, 2017.' ieee: 'L. Riedl and M. Giesselmann, “Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs,” in Sozialwissenschaftliche Perspektiven der Fußballfanforschung, A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, and M. Winands, Eds. Weinheim, Basel: Beltz Juventa, 2017, pp. 157–175.' mla: 'Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” Sozialwissenschaftliche Perspektiven der Fußballfanforschung, edited by Andreas Grau et al., Beltz Juventa, 2017, pp. 157–75.' short: 'L. Riedl, M. Giesselmann, in: A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, M. Winands (Eds.), Sozialwissenschaftliche Perspektiven der Fußballfanforschung, Beltz Juventa, Weinheim, Basel, 2017, pp. 157–175.' date_created: 2024-01-10T09:36:53Z date_updated: 2024-02-27T12:49:59Z department: - _id: '175' editor: - first_name: Andreas full_name: Grau, Andreas last_name: Grau - first_name: Judith full_name: von der Heyde, Judith last_name: von der Heyde - first_name: Jochem full_name: Kotthaus, Jochem last_name: Kotthaus - first_name: Holger full_name: Schmidt, Holger last_name: Schmidt - first_name: Martin full_name: Winands, Martin last_name: Winands keyword: - Befragung - Demokratie - Entscheidung - Entscheidungsprozess - Fan - Fußballspiel - Gruppe - soziale - Internet - Interview - Kommunikation - Organisationssoziologie - Sozialwissenschaft - Sportsoziologie - Sportverein - Untersuchung - empirische Vereinsführung language: - iso: ger page: 157-175 place: Weinheim, Basel publication: Sozialwissenschaftliche Perspektiven der Fußballfanforschung publication_status: published publisher: Beltz Juventa status: public title: 'Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs' type: book_chapter user_id: '96222' year: '2017' ... --- _id: '51808' author: - first_name: Martin full_name: Schmitt, Martin id: '100968' last_name: Schmitt citation: ama: 'Schmitt M. Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes. transcript; 2016.' apa: 'Schmitt, M. (2016). Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes. transcript.' bibtex: '@book{Schmitt_2016, place={Bielefeld}, series={Histoire}, title={Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes}, publisher={transcript}, author={Schmitt, Martin}, year={2016}, collection={Histoire} }' chicago: 'Schmitt, Martin. Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes. Histoire. Bielefeld: transcript, 2016.' ieee: 'M. Schmitt, Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes. Bielefeld: transcript, 2016.' mla: 'Schmitt, Martin. Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes. transcript, 2016.' short: 'M. Schmitt, Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes, transcript, Bielefeld, 2016.' date_created: 2024-02-24T23:24:56Z date_updated: 2024-02-25T00:00:21Z keyword: - Ost-West-Konflikt - Hochschulschrift - Internet - Geschichte - Netzwerk - Geschichte 1967-1975 - Technikgeschichte - Computernetzwerk language: - iso: eng place: Bielefeld publication_identifier: isbn: - 978-3-8376-3681-9 978-3-8394-3681-3 publisher: transcript series_title: Histoire status: public title: 'Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes' type: book user_id: '100968' year: '2016' ... --- _id: '5598' abstract: - lang: eng text: Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia. author: - first_name: Melanie full_name: Volkamer, Melanie last_name: Volkamer - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen citation: ama: 'Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In: Proceedings of the 23rd Bled EConference. ; 2010.' apa: Volkamer, M., & Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In Proceedings of the 23rd Bled eConference. bibtex: '@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}, booktitle={Proceedings of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido}, year={2010} }' chicago: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” In Proceedings of the 23rd Bled EConference, 2010. ieee: M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General Concept and Application to Internet Voting,” in Proceedings of the 23rd Bled eConference, 2010. mla: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” Proceedings of the 23rd Bled EConference, 2010. short: 'M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.' date_created: 2018-11-14T11:49:50Z date_updated: 2022-01-06T07:02:06Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-11T15:14:05Z date_updated: 2018-12-13T15:16:50Z file_id: '6185' file_name: 06_Schryen.pdf file_size: 243413 relation: main_file file_date_updated: 2018-12-13T15:16:50Z has_accepted_license: '1' keyword: - distributed trust concepts - measuring etrust - Internet voting language: - iso: eng oa: '1' publication: Proceedings of the 23rd Bled eConference status: public title: Measuring eTrust in distributed systems - General Concept and Application to Internet Voting type: conference user_id: '61579' year: '2010' ... --- _id: '5621' abstract: - lang: eng text: Remote voting through the Internet provides convenience and access to the electorate. At the same time, the security concerns facing any distributed application are magnified when the task is so crucial to democratic society. In addition, some of the electoral process loses transparency when it is encapsulated in information technology. In this paper, we examine the public record of three recent elections that used Internet voting. Our specific goal is to identify any potential flaws that security experts would recognize, but may have not been identified in the rush to implement technology. To do this, we present a multiple exploratory case study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands, and Switzerland. These elections were selected as particularly interesting and accessible, and each presents its own technical and security challenges. The electoral environment, technical design and process for each election are described, including reconstruction of details which are implied but not specified within the source material. We found that all three elections warrant significant concern about voter security, verifiability, and transparency. Usability, our fourth area of focus, seems to have been well-addressed in these elections. While our analysis is based on public documents and previously published reports, and therefore lacking access to any confidential materials held by electoral officials, this comparative analysis provides interesting insight and consistent questions across all these cases. Effective review of Internet voting requires an aggressive stance towards identifying potential security and operational flaws, and we encourage the use of third party reviews with critical technology skills during design, programming, and voting to reduce the changes of failure or fraud that would undermine public confidence. author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen - first_name: Eliot full_name: Rich, Eliot last_name: Rich citation: ama: 'Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security. 2009;4(4 Part):729-744.' apa: 'Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics \& Security, 4(4 Part), 729–744.' bibtex: '@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}, volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics \& Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009}, pages={729–744} }' chicago: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” IEEE Transactions on Information Forensics \& Security 4, no. 4 Part (2009): 729–44.' ieee: 'G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland,” IEEE Transactions on Information Forensics \& Security, vol. 4, no. 4 Part, pp. 729–744, 2009.' mla: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.” IEEE Transactions on Information Forensics \& Security, vol. 4, no. 4 Part, IEEE, 2009, pp. 729–44.' short: G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security 4 (2009) 729–744. date_created: 2018-11-14T14:06:44Z date_updated: 2022-01-06T07:02:12Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:16:07Z date_updated: 2018-12-18T13:16:07Z file_id: '6316' file_name: JOURNAL VERSION.pdf file_size: 1544790 relation: main_file file_date_updated: 2018-12-18T13:16:07Z has_accepted_license: '1' intvolume: ' 4' issue: 4 Part keyword: - e-voting - Internet voting - Internet election - security - verifiability - RIES - Estonia - Neuch{\^a}tel language: - iso: eng oa: '1' page: 729-744 publication: IEEE Transactions on Information Forensics \& Security publisher: IEEE status: public title: 'Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland' type: journal_article user_id: '61579' volume: 4 year: '2009' ... --- _id: '5649' abstract: - lang: eng text: The Estonian parliamentary election in 2007 is regarded as a success story of large-scale Internet elections. I use this election in a single case study on practical security to show that low quality of security and its management does not necessarily prevent large-scale Internet elections from being conducted. I also provide research propositions with regard to future challenges for large-scale Internet elections. author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen citation: ama: 'Schryen G. Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business). ; 2008.' apa: 'Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. In 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business).' bibtex: '@inproceedings{Schryen_2008, title={Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia}, booktitle={7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)}, author={Schryen, Guido}, year={2008} }' chicago: 'Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia.” In 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.' ieee: 'G. Schryen, “Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia,” in 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.' mla: 'Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory Case Study of Internet Voting in Estonia.” 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.' short: 'G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest Group on E-Business), 2008.' date_created: 2018-11-14T14:43:23Z date_updated: 2022-01-06T07:02:20Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:18:21Z date_updated: 2018-12-18T13:18:21Z file_id: '6320' file_name: Schryen - Practical Security of Large-scale Elections - LNBIP - web version.pdf file_size: 273231 relation: main_file file_date_updated: 2018-12-18T13:18:21Z has_accepted_license: '1' keyword: - Internet voting - large-scale election - Estonian parliamen- tary election - security - security management language: - iso: eng oa: '1' publication: 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business) status: public title: 'Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia' type: conference user_id: '61579' year: '2008' ... --- _id: '11820' abstract: - lang: eng text: In this paper, we derive an uncertainty decoding rule for automatic speech recognition (ASR), which accounts for both corrupted observations and inter-frame correlation. The conditional independence assumption, prevalent in hidden Markov model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned on the complete observed feature vector sequence. This is a more informative posterior than one conditioned only on the current observation. The novel decoding is used to obtain a transmission-error robust remote ASR system, where the speech capturing unit is connected to the decoder via an error-prone communication network. We show how the clean speech posterior can be computed for communication links being characterized by either bit errors or packet loss. Recognition results are presented for both distributed and network speech recognition, where in the latter case common voice-over-IP codecs are employed. author: - first_name: Valentin full_name: Ion, Valentin last_name: Ion - first_name: Reinhold full_name: Haeb-Umbach, Reinhold id: '242' last_name: Haeb-Umbach citation: ama: Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. IEEE Transactions on Audio, Speech, and Language Processing. 2008;16(5):1047-1060. doi:10.1109/TASL.2008.925879 apa: Ion, V., & Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. IEEE Transactions on Audio, Speech, and Language Processing, 16(5), 1047–1060. https://doi.org/10.1109/TASL.2008.925879 bibtex: '@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition}, volume={16}, DOI={10.1109/TASL.2008.925879}, number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060} }' chicago: 'Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” IEEE Transactions on Audio, Speech, and Language Processing 16, no. 5 (2008): 1047–60. https://doi.org/10.1109/TASL.2008.925879.' ieee: V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 16, no. 5, pp. 1047–1060, 2008. mla: Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” IEEE Transactions on Audio, Speech, and Language Processing, vol. 16, no. 5, 2008, pp. 1047–60, doi:10.1109/TASL.2008.925879. short: V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language Processing 16 (2008) 1047–1060. date_created: 2019-07-12T05:28:53Z date_updated: 2022-01-06T06:51:10Z department: - _id: '54' doi: 10.1109/TASL.2008.925879 intvolume: ' 16' issue: '5' keyword: - automatic speech recognition - bit errors - codecs - communication links - corrupted observations - decoding - distributed speech recognition - error-prone communication network - feature vector sequence - hidden Markov model-based ASR - hidden Markov models - inter-frame correlation - Internet telephony - network speech recognition - packet loss - speech posterior - speech recognition - transmission error robust speech recognition - uncertainty decoding - voice-over-IP codecs language: - iso: eng main_file_link: - open_access: '1' url: https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf oa: '1' page: 1047-1060 publication: IEEE Transactions on Audio, Speech, and Language Processing status: public title: A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition type: journal_article user_id: '44006' volume: 16 year: '2008' ... --- _id: '6287' abstract: - lang: eng text: Spamming remains a form of Internet abuse, which burdens the Internet infrastructure, is generally regarded as an annoyance, and is said to cause a huge economic harm. Many technological, organizational, and legislative anti-spam measures have already been proposed and implemented, but have not led to any substantial decrease in the number of spam e-mails. We propose a scalable and flexible infrastructure framework that integrates several anti-spam measures and that features both a technological and an organizational facet. The key element of our infrastructure is a new organizational unit that reliably and transparently limits the number of e-mails that can be sent per day and per account. We also analyze the proposed framework in terms of its theoretical effectiveness, the required resources, and its limitations. author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen citation: ama: 'Schryen G. Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework.; 2007.' apa: 'Schryen, G. (2007). Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework.' bibtex: '@book{Schryen_2007, title={Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework}, author={Schryen, Guido}, year={2007} }' chicago: 'Schryen, Guido. Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework, 2007.' ieee: 'G. Schryen, Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework. 2007.' mla: 'Schryen, Guido. Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework. 2007.' short: 'G. Schryen, Preventing E-Mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework, 2007.' date_created: 2018-12-18T12:50:22Z date_updated: 2022-01-06T07:03:00Z ddc: - '000' department: - _id: '277' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:23:40Z date_updated: 2018-12-18T13:23:40Z file_id: '6322' file_name: anti_spam_framework.pdf file_size: 456755 relation: main_file file_date_updated: 2018-12-18T13:23:40Z has_accepted_license: '1' keyword: - Email - Infrastructure - Internet - Spam language: - iso: eng oa: '1' status: public title: 'Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework' type: report user_id: '61579' year: '2007' ... --- _id: '5667' abstract: - lang: eng text: Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. In the first part the article discusses advantages and disadvantages of Internet elections, shows different application fields, and presents important international pilot schemes (political and business ones). in the second part, due to democratic basic principles, technological security aspects are worked out. author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen citation: ama: 'Schryen G. E-Democracy: Internet Voting. In: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2. Algarve: IADIS Press; 2003:1017-1021.' apa: 'Schryen, G. (2003). E-Democracy: Internet Voting. In Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2 (pp. 1017–1021). Algarve: IADIS Press.' bibtex: '@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting}, booktitle={Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021} }' chicago: 'Schryen, Guido. “E-Democracy: Internet Voting.” In Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, 1017–21. Algarve: IADIS Press, 2003.' ieee: 'G. Schryen, “E-Democracy: Internet Voting,” in Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2, Algarve: IADIS Press, 2003, pp. 1017–1021.' mla: 'Schryen, Guido. “E-Democracy: Internet Voting.” Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, 2003, pp. 1017–21.' short: 'G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet 2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.' date_created: 2018-11-14T15:01:49Z date_updated: 2022-01-06T07:02:25Z department: - _id: '277' extern: '1' keyword: - Internet Voting - Online polls - E-Democracy - Security language: - iso: eng page: 1017-1021 place: Algarve publication: Proceedings of the IADIS International Conference WWW Internet 2003. vol. 2 publisher: IADIS Press status: public title: 'E-Democracy: Internet Voting' type: book_chapter user_id: '61579' year: '2003' ... --- _id: '5668' abstract: - lang: eng text: 'Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem Ausblick auf notwendige Untersuchungen.' author: - first_name: Guido full_name: Schryen, Guido id: '72850' last_name: Schryen citation: ama: 'Schryen G. Internet-Wahlen. In: 6. Internationale Tagung Wirtschaftsinformatik. ; 2003:937-956.' apa: Schryen, G. (2003). Internet-Wahlen. In 6. Internationale Tagung Wirtschaftsinformatik (pp. 937–956). bibtex: '@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956} }' chicago: Schryen, Guido. “Internet-Wahlen.” In 6. Internationale Tagung Wirtschaftsinformatik, 937–56, 2003. ieee: G. Schryen, “Internet-Wahlen,” in 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp. 937–956. mla: Schryen, Guido. “Internet-Wahlen.” 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp. 937–56. short: 'G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp. 937–956.' date_created: 2018-11-14T15:03:15Z date_updated: 2022-01-06T07:02:26Z ddc: - '000' department: - _id: '277' extern: '1' file: - access_level: open_access content_type: application/pdf creator: hsiemes date_created: 2018-12-18T13:40:14Z date_updated: 2018-12-18T13:40:14Z file_id: '6340' file_name: Schryen - Internet-Wahlen.pdf file_size: 364380 relation: main_file file_date_updated: 2018-12-18T13:40:14Z has_accepted_license: '1' keyword: - Internet-Wahlen - E-Democracy - Sicherheit - Kryptographie language: - iso: eng oa: '1' page: 937-956 publication: 6. Internationale Tagung Wirtschaftsinformatik status: public title: Internet-Wahlen type: conference user_id: '61579' year: '2003' ... --- _id: '39488' abstract: - lang: eng text: CSCW systems like BSCW (Basic Support for Cooperative Work), HyperNews, and Lotus Notes have been successfully introduced to support the cooperation of geographically distributed work groups. Unfortunately, some of these software systems are not flexible enough to be customized easily to the requirements of an individual user. Most of the environments can only be configured by experts through complex programming. In this article we introduce VIP space, a shared workspace space in the sense of exchanging and processing shared objects between members of distributed work groups. VIP space can be easily adapted to the user's individual views and needs by means of a visual programming language. In VIP space, objects of the shared workspace are moved by drag and drop between task fields. Task fields are programmed by visual "if-then" rules applying a combination of icon- and form-based techniques. When a document represented by an icon is dropped on a task field its rules are checked and actions of the selected rules are excited. VIP space is finally demonstrated in an Internet course application. author: - first_name: M. full_name: Dücker, M. last_name: Dücker - first_name: Wolfgang full_name: Müller, Wolfgang id: '16243' last_name: Müller - first_name: Jessica full_name: Rubart, Jessica last_name: Rubart citation: ama: 'Dücker M, Müller W, Rubart J. Innovative Concepts for Configurating Shared Workspaces through Visual Programming. In: Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. ; 1999. doi:10.1109/HICSS.1999.773046' apa: Dücker, M., Müller, W., & Rubart, J. (1999). Innovative Concepts for Configurating Shared Workspaces through Visual Programming. Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32, Maui, HI, USA . https://doi.org/10.1109/HICSS.1999.773046 bibtex: '@inproceedings{Dücker_Müller_Rubart_1999, place={Maui, HI, USA }, title={Innovative Concepts for Configurating Shared Workspaces through Visual Programming}, DOI={10.1109/HICSS.1999.773046}, booktitle={ Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences}, author={Dücker, M. and Müller, Wolfgang and Rubart, Jessica}, year={1999} }' chicago: Dücker, M., Wolfgang Müller, and Jessica Rubart. “Innovative Concepts for Configurating Shared Workspaces through Visual Programming.” In Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. Maui, HI, USA , 1999. https://doi.org/10.1109/HICSS.1999.773046. ieee: 'M. Dücker, W. Müller, and J. Rubart, “Innovative Concepts for Configurating Shared Workspaces through Visual Programming,” presented at the Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32, Maui, HI, USA , 1999, doi: 10.1109/HICSS.1999.773046.' mla: Dücker, M., et al. “Innovative Concepts for Configurating Shared Workspaces through Visual Programming.” Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, 1999, doi:10.1109/HICSS.1999.773046. short: 'M. Dücker, W. Müller, J. Rubart, in: Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, Maui, HI, USA , 1999.' conference: location: 'Maui, HI, USA ' name: Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32 date_created: 2023-01-24T11:35:47Z date_updated: 2023-01-24T11:35:52Z department: - _id: '672' doi: 10.1109/HICSS.1999.773046 keyword: - Application software - Electronic mail - Computer networks - Collaborative work - Teleconferencing - Asynchronous communication - Software systems - Internet - Computer applications - Discussion forums language: - iso: eng place: 'Maui, HI, USA ' publication: ' Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences' publication_identifier: isbn: - 0-7695-0001-3 status: public title: Innovative Concepts for Configurating Shared Workspaces through Visual Programming type: conference user_id: '5786' year: '1999' ...