---
_id: '4684'
author:
- first_name: Daniel
full_name: Beverungen, Daniel
id: '59677'
last_name: Beverungen
- first_name: Oliver
full_name: Müller, Oliver
id: '72849'
last_name: Müller
- first_name: Martin
full_name: Matzner, Martin
last_name: Matzner
- first_name: Jan
full_name: Mendling, Jan
last_name: Mendling
- first_name: Jan
full_name: vom Brocke, Jan
last_name: vom Brocke
citation:
ama: Beverungen D, Müller O, Matzner M, Mendling J, vom Brocke J. Conceptualizing
smart service systems. Electronic Markets. 2019:1--12. doi:10.1007/s12525-017-0270-5
apa: Beverungen, D., Müller, O., Matzner, M., Mendling, J., & vom Brocke, J.
(2019). Conceptualizing smart service systems. Electronic Markets, 1--12.
https://doi.org/10.1007/s12525-017-0270-5
bibtex: '@article{Beverungen_Müller_Matzner_Mendling_vom Brocke_2019, title={Conceptualizing
smart service systems}, DOI={10.1007/s12525-017-0270-5},
journal={Electronic Markets}, author={Beverungen, Daniel and Müller, Oliver and
Matzner, Martin and Mendling, Jan and vom Brocke, Jan}, year={2019}, pages={1--12}
}'
chicago: Beverungen, Daniel, Oliver Müller, Martin Matzner, Jan Mendling, and Jan
vom Brocke. “Conceptualizing Smart Service Systems.” Electronic Markets,
2019, 1--12. https://doi.org/10.1007/s12525-017-0270-5.
ieee: D. Beverungen, O. Müller, M. Matzner, J. Mendling, and J. vom Brocke, “Conceptualizing
smart service systems,” Electronic Markets, pp. 1--12, 2019.
mla: Beverungen, Daniel, et al. “Conceptualizing Smart Service Systems.” Electronic
Markets, 2019, pp. 1--12, doi:10.1007/s12525-017-0270-5.
short: D. Beverungen, O. Müller, M. Matzner, J. Mendling, J. vom Brocke, Electronic
Markets (2019) 1--12.
date_created: 2018-10-12T08:24:45Z
date_updated: 2022-01-06T07:01:18Z
doi: 10.1007/s12525-017-0270-5
extern: '1'
keyword:
- Boundary object
- Internet of things
- Service science
- Smart products
- Smart service
language:
- iso: eng
page: 1--12
publication: Electronic Markets
publication_identifier:
issn:
- '14228890'
status: public
title: Conceptualizing smart service systems
type: journal_article
user_id: '72849'
year: '2019'
...
---
_id: '1156'
abstract:
- lang: eng
text: In this paper, we present an IoT architecture which handles stream sensor
data of air pollution. Particle pollution is known as a serious threat to human
health. Along with developments in the use of wireless sensors and the IoT, we
propose an architecture that flexibly measures and processes stream data collected
in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread
network of wireless sensors that can follow changes in human behavior. Apart from
stating reasons for the need of such a development and its requirements, we provide
a conceptual design as well as a technological design of such an architecture.
The technological design consists of Kaa and Apache Storm which can collect air
pollution information in real-time and solve various problems to process data
such as missing data and synchronization. This enables us to add a simulation
in which we provide issues that might come up when having our architecture in
use. Together with these issues, we state r easons for choosing specific modules
among candidates. Our architecture combines wireless sensors with the Kaa IoT
framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management
System among others. We even provide open-government data sets that are freely
available.
author:
- first_name: Joschka
full_name: Kersting, Joschka
id: '58701'
last_name: Kersting
- first_name: Michaela
full_name: Geierhos, Michaela
id: '42496'
last_name: Geierhos
orcid: 0000-0002-8180-5606
- first_name: Hanmin
full_name: Jung, Hanmin
last_name: Jung
- first_name: Taehong
full_name: Kim, Taehong
last_name: Kim
citation:
ama: 'Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for
Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere
V, Wills G, Walters R, Chang V, eds. Proceedings of the 2nd International Conference
on Internet of Things, Big Data and Security. Setúbal, Portugal: SCITEPRESS;
2017:117-124. doi:10.5220/0006354801170124'
apa: 'Kersting, J., Geierhos, M., Jung, H., & Kim, T. (2017). Internet of Things
Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez
Muñoz, V. Kantere, G. Wills, R. Walters, & V. Chang (Eds.), Proceedings
of the 2nd International Conference on Internet of Things, Big Data and Security
(pp. 117–124). Setúbal, Portugal: SCITEPRESS. https://doi.org/10.5220/0006354801170124'
bibtex: '@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal},
title={Internet of Things Architecture for Handling Stream Air Pollution Data},
DOI={10.5220/0006354801170124},
booktitle={Proceedings of the 2nd International Conference on Internet of Things,
Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and
Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu
and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert
and Chang, VictorEditors}, year={2017}, pages={117–124} }'
chicago: 'Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet
of Things Architecture for Handling Stream Air Pollution Data.” In Proceedings
of the 2nd International Conference on Internet of Things, Big Data and Security,
edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills,
Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017.
https://doi.org/10.5220/0006354801170124.'
ieee: J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture
for Handling Stream Air Pollution Data,” in Proceedings of the 2nd International
Conference on Internet of Things, Big Data and Security, Porto, Portugal,
2017, pp. 117–124.
mla: Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream
Air Pollution Data.” Proceedings of the 2nd International Conference on Internet
of Things, Big Data and Security, edited by Muthu Ramachandran et al., SCITEPRESS,
2017, pp. 117–24, doi:10.5220/0006354801170124.
short: 'J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez
Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd
International Conference on Internet of Things, Big Data and Security, SCITEPRESS,
Setúbal, Portugal, 2017, pp. 117–124.'
conference:
end_date: 2017-04-26
location: Porto, Portugal
name: 2nd International Conference on Internet of Things, Big Data and Security
(IoTBDS 2017)
start_date: 2017-04-24
date_created: 2018-01-31T14:45:21Z
date_updated: 2022-01-06T06:51:03Z
ddc:
- '000'
department:
- _id: '36'
- _id: '1'
- _id: '579'
doi: 10.5220/0006354801170124
editor:
- first_name: Muthu
full_name: Ramachandran, Muthu
last_name: Ramachandran
- first_name: Víctor
full_name: Méndez Muñoz, Víctor
last_name: Méndez Muñoz
- first_name: Verena
full_name: Kantere, Verena
last_name: Kantere
- first_name: Gary
full_name: Wills, Gary
last_name: Wills
- first_name: Robert
full_name: Walters, Robert
last_name: Walters
- first_name: Victor
full_name: Chang, Victor
last_name: Chang
file:
- access_level: closed
content_type: application/pdf
creator: jkers
date_created: 2020-09-18T09:09:27Z
date_updated: 2020-09-18T09:09:27Z
file_id: '19567'
file_name: IoTBDS_2017_50_final.pdf
file_size: 2612566
relation: main_file
success: 1
file_date_updated: 2020-09-18T09:09:27Z
has_accepted_license: '1'
keyword:
- Wireless Sensor Network
- Internet of Things
- Stream Data
- Air Pollution
- DSMS
- Real-time Data Processing
language:
- iso: eng
page: 117-124
place: Setúbal, Portugal
publication: Proceedings of the 2nd International Conference on Internet of Things,
Big Data and Security
publication_identifier:
isbn:
- 978-989-758-245-5
publication_status: published
publisher: SCITEPRESS
quality_controlled: '1'
status: public
title: Internet of Things Architecture for Handling Stream Air Pollution Data
type: conference
user_id: '58701'
year: '2017'
...
---
_id: '50415'
author:
- first_name: Lars
full_name: Riedl, Lars
id: '31513'
last_name: Riedl
- first_name: Marco
full_name: Giesselmann, Marco
last_name: Giesselmann
citation:
ama: 'Riedl L, Giesselmann M. Fans: Entscheider oder Supporter? : eine organisationssoziologische
Analyse zur Mitbestimmung in Fußballclubs. In: Grau A, von der Heyde J, Kotthaus
J, Schmidt H, Winands M, eds. Sozialwissenschaftliche Perspektiven der Fußballfanforschung.
Beltz Juventa; 2017:157-175.'
apa: 'Riedl, L., & Giesselmann, M. (2017). Fans: Entscheider oder Supporter? :
eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs. In
A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt, & M. Winands (Eds.), Sozialwissenschaftliche
Perspektiven der Fußballfanforschung (pp. 157–175). Beltz Juventa.'
bibtex: '@inbook{Riedl_Giesselmann_2017, place={Weinheim, Basel}, title={Fans: Entscheider
oder Supporter? : eine organisationssoziologische Analyse zur Mitbestimmung in
Fußballclubs}, booktitle={Sozialwissenschaftliche Perspektiven der Fußballfanforschung},
publisher={Beltz Juventa}, author={Riedl, Lars and Giesselmann, Marco}, editor={Grau,
Andreas and von der Heyde, Judith and Kotthaus, Jochem and Schmidt, Holger and
Winands, Martin}, year={2017}, pages={157–175} }'
chicago: 'Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter? :
eine organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” In
Sozialwissenschaftliche Perspektiven der Fußballfanforschung, edited by
Andreas Grau, Judith von der Heyde, Jochem Kotthaus, Holger Schmidt, and Martin
Winands, 157–75. Weinheim, Basel: Beltz Juventa, 2017.'
ieee: 'L. Riedl and M. Giesselmann, “Fans: Entscheider oder Supporter? : eine organisationssoziologische
Analyse zur Mitbestimmung in Fußballclubs,” in Sozialwissenschaftliche Perspektiven
der Fußballfanforschung, A. Grau, J. von der Heyde, J. Kotthaus, H. Schmidt,
and M. Winands, Eds. Weinheim, Basel: Beltz Juventa, 2017, pp. 157–175.'
mla: 'Riedl, Lars, and Marco Giesselmann. “Fans: Entscheider oder Supporter? : eine
organisationssoziologische Analyse zur Mitbestimmung in Fußballclubs.” Sozialwissenschaftliche
Perspektiven der Fußballfanforschung, edited by Andreas Grau et al., Beltz
Juventa, 2017, pp. 157–75.'
short: 'L. Riedl, M. Giesselmann, in: A. Grau, J. von der Heyde, J. Kotthaus, H.
Schmidt, M. Winands (Eds.), Sozialwissenschaftliche Perspektiven der Fußballfanforschung,
Beltz Juventa, Weinheim, Basel, 2017, pp. 157–175.'
date_created: 2024-01-10T09:36:53Z
date_updated: 2024-02-27T12:49:59Z
department:
- _id: '175'
editor:
- first_name: Andreas
full_name: Grau, Andreas
last_name: Grau
- first_name: Judith
full_name: von der Heyde, Judith
last_name: von der Heyde
- first_name: Jochem
full_name: Kotthaus, Jochem
last_name: Kotthaus
- first_name: Holger
full_name: Schmidt, Holger
last_name: Schmidt
- first_name: Martin
full_name: Winands, Martin
last_name: Winands
keyword:
- Befragung
- Demokratie
- Entscheidung
- Entscheidungsprozess
- Fan
- Fußballspiel
- Gruppe
- soziale
- Internet
- Interview
- Kommunikation
- Organisationssoziologie
- Sozialwissenschaft
- Sportsoziologie
- Sportverein
- Untersuchung
- empirische Vereinsführung
language:
- iso: ger
page: 157-175
place: Weinheim, Basel
publication: Sozialwissenschaftliche Perspektiven der Fußballfanforschung
publication_status: published
publisher: Beltz Juventa
status: public
title: 'Fans: Entscheider oder Supporter? : eine organisationssoziologische Analyse
zur Mitbestimmung in Fußballclubs'
type: book_chapter
user_id: '96222'
year: '2017'
...
---
_id: '51808'
author:
- first_name: Martin
full_name: Schmitt, Martin
id: '100968'
last_name: Schmitt
citation:
ama: 'Schmitt M. Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes.
transcript; 2016.'
apa: 'Schmitt, M. (2016). Internet im Kalten Krieg: eine Vorgeschichte des globalen
Kommunikationsnetzes. transcript.'
bibtex: '@book{Schmitt_2016, place={Bielefeld}, series={Histoire}, title={Internet
im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes}, publisher={transcript},
author={Schmitt, Martin}, year={2016}, collection={Histoire} }'
chicago: 'Schmitt, Martin. Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen
Kommunikationsnetzes. Histoire. Bielefeld: transcript, 2016.'
ieee: 'M. Schmitt, Internet im Kalten Krieg: eine Vorgeschichte des globalen
Kommunikationsnetzes. Bielefeld: transcript, 2016.'
mla: 'Schmitt, Martin. Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen
Kommunikationsnetzes. transcript, 2016.'
short: 'M. Schmitt, Internet Im Kalten Krieg: Eine Vorgeschichte Des Globalen Kommunikationsnetzes,
transcript, Bielefeld, 2016.'
date_created: 2024-02-24T23:24:56Z
date_updated: 2024-02-25T00:00:21Z
keyword:
- Ost-West-Konflikt
- Hochschulschrift
- Internet
- Geschichte
- Netzwerk
- Geschichte 1967-1975
- Technikgeschichte
- Computernetzwerk
language:
- iso: eng
place: Bielefeld
publication_identifier:
isbn:
- 978-3-8376-3681-9 978-3-8394-3681-3
publisher: transcript
series_title: Histoire
status: public
title: 'Internet im Kalten Krieg: eine Vorgeschichte des globalen Kommunikationsnetzes'
type: book
user_id: '100968'
year: '2016'
...
---
_id: '5598'
abstract:
- lang: eng
text: Emerging digital environments and infrastructures, such as distributed services
and computing services, have generated new options of communication, information
sharing, and resource utilization in past years. Different distributed trust concepts
are applied to increase trust in such systems. However, these concepts yield to
rather complex architectures which make it difficult to determine which component
or system needs to be trusted. This paper presents a novel trust measurement method
for distributed systems which enables the t identification of weak points in the
overall system architecture. The measurement method includes the specification
of a formal trust language and its representation by means of propositional logic
formulas. The applicability of the proposed concepts is demonstrated by conducting
a case study on the Internet voting system that was used in the 2007 parliamentary
elections in Estonia.
author:
- first_name: Melanie
full_name: Volkamer, Melanie
last_name: Volkamer
- first_name: Guido
full_name: Schryen, Guido
id: '72850'
last_name: Schryen
citation:
ama: 'Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept
and Application to Internet Voting. In: Proceedings of the 23rd Bled EConference.
; 2010.'
apa: Volkamer, M., & Schryen, G. (2010). Measuring eTrust in distributed systems
- General Concept and Application to Internet Voting. In Proceedings of the
23rd Bled eConference.
bibtex: '@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed
systems - General Concept and Application to Internet Voting}, booktitle={Proceedings
of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido},
year={2010} }'
chicago: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed
Systems - General Concept and Application to Internet Voting.” In Proceedings
of the 23rd Bled EConference, 2010.
ieee: M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General
Concept and Application to Internet Voting,” in Proceedings of the 23rd Bled
eConference, 2010.
mla: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems
- General Concept and Application to Internet Voting.” Proceedings of the 23rd
Bled EConference, 2010.
short: 'M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.'
date_created: 2018-11-14T11:49:50Z
date_updated: 2022-01-06T07:02:06Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
content_type: application/pdf
creator: hsiemes
date_created: 2018-12-11T15:14:05Z
date_updated: 2018-12-13T15:16:50Z
file_id: '6185'
file_name: 06_Schryen.pdf
file_size: 243413
relation: main_file
file_date_updated: 2018-12-13T15:16:50Z
has_accepted_license: '1'
keyword:
- distributed trust concepts
- measuring etrust
- Internet voting
language:
- iso: eng
oa: '1'
publication: Proceedings of the 23rd Bled eConference
status: public
title: Measuring eTrust in distributed systems - General Concept and Application to
Internet Voting
type: conference
user_id: '61579'
year: '2010'
...
---
_id: '5621'
abstract:
- lang: eng
text: Remote voting through the Internet provides convenience and access to the
electorate. At the same time, the security concerns facing any distributed application
are magnified when the task is so crucial to democratic society. In addition,
some of the electoral process loses transparency when it is encapsulated in information
technology. In this paper, we examine the public record of three recent elections
that used Internet voting. Our specific goal is to identify any potential flaws
that security experts would recognize, but may have not been identified in the
rush to implement technology. To do this, we present a multiple exploratory case
study, looking at elections conducted between 2006 and 2007 in Estonia, Netherlands,
and Switzerland. These elections were selected as particularly interesting and
accessible, and each presents its own technical and security challenges. The electoral
environment, technical design and process for each election are described, including
reconstruction of details which are implied but not specified within the source
material. We found that all three elections warrant significant concern about
voter security, verifiability, and transparency. Usability, our fourth area of
focus, seems to have been well-addressed in these elections. While our analysis
is based on public documents and previously published reports, and therefore lacking
access to any confidential materials held by electoral officials, this comparative
analysis provides interesting insight and consistent questions across all these
cases. Effective review of Internet voting requires an aggressive stance towards
identifying potential security and operational flaws, and we encourage the use
of third party reviews with critical technology skills during design, programming,
and voting to reduce the changes of failure or fraud that would undermine public
confidence.
author:
- first_name: Guido
full_name: Schryen, Guido
id: '72850'
last_name: Schryen
- first_name: Eliot
full_name: Rich, Eliot
last_name: Rich
citation:
ama: 'Schryen G, Rich E. Security in Large-Scale Internet Elections: A Retrospective
Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions
on Information Forensics \& Security. 2009;4(4 Part):729-744.'
apa: 'Schryen, G., & Rich, E. (2009). Security in Large-Scale Internet Elections:
A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.
IEEE Transactions on Information Forensics \& Security, 4(4
Part), 729–744.'
bibtex: '@article{Schryen_Rich_2009, title={Security in Large-Scale Internet Elections:
A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland},
volume={4}, number={4 Part}, journal={IEEE Transactions on Information Forensics
\& Security}, publisher={IEEE}, author={Schryen, Guido and Rich, Eliot}, year={2009},
pages={729–744} }'
chicago: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
IEEE Transactions on Information Forensics \& Security 4, no. 4 Part
(2009): 729–44.'
ieee: 'G. Schryen and E. Rich, “Security in Large-Scale Internet Elections: A Retrospective
Analysis of Elections in Estonia, The Netherlands, and Switzerland,” IEEE Transactions
on Information Forensics \& Security, vol. 4, no. 4 Part, pp. 729–744,
2009.'
mla: 'Schryen, Guido, and Eliot Rich. “Security in Large-Scale Internet Elections:
A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland.”
IEEE Transactions on Information Forensics \& Security, vol. 4, no.
4 Part, IEEE, 2009, pp. 729–44.'
short: G. Schryen, E. Rich, IEEE Transactions on Information Forensics \& Security
4 (2009) 729–744.
date_created: 2018-11-14T14:06:44Z
date_updated: 2022-01-06T07:02:12Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
content_type: application/pdf
creator: hsiemes
date_created: 2018-12-18T13:16:07Z
date_updated: 2018-12-18T13:16:07Z
file_id: '6316'
file_name: JOURNAL VERSION.pdf
file_size: 1544790
relation: main_file
file_date_updated: 2018-12-18T13:16:07Z
has_accepted_license: '1'
intvolume: ' 4'
issue: 4 Part
keyword:
- e-voting
- Internet voting
- Internet election
- security
- verifiability
- RIES
- Estonia
- Neuch{\^a}tel
language:
- iso: eng
oa: '1'
page: 729-744
publication: IEEE Transactions on Information Forensics \& Security
publisher: IEEE
status: public
title: 'Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections
in Estonia, The Netherlands, and Switzerland'
type: journal_article
user_id: '61579'
volume: 4
year: '2009'
...
---
_id: '5649'
abstract:
- lang: eng
text: The Estonian parliamentary election in 2007 is regarded as a success story
of large-scale Internet elections. I use this election in a single case study
on practical security to show that low quality of security and its management
does not necessarily prevent large-scale Internet elections from being conducted.
I also provide research propositions with regard to future challenges for large-scale
Internet elections.
author:
- first_name: Guido
full_name: Schryen, Guido
id: '72850'
last_name: Schryen
citation:
ama: 'Schryen G. Practical Security of Large-scale Elections: An Exploratory Case
Study of Internet Voting in Estonia. In: 7th Workshop on E-Business (WEB 2008,
AIS Special Interest Group on E-Business). ; 2008.'
apa: 'Schryen, G. (2008). Practical Security of Large-scale Elections: An Exploratory
Case Study of Internet Voting in Estonia. In 7th Workshop on e-Business (WEB
2008, AIS Special Interest Group on E-Business).'
bibtex: '@inproceedings{Schryen_2008, title={Practical Security of Large-scale Elections:
An Exploratory Case Study of Internet Voting in Estonia}, booktitle={7th Workshop
on e-Business (WEB 2008, AIS Special Interest Group on E-Business)}, author={Schryen,
Guido}, year={2008} }'
chicago: 'Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory
Case Study of Internet Voting in Estonia.” In 7th Workshop on E-Business (WEB
2008, AIS Special Interest Group on E-Business), 2008.'
ieee: 'G. Schryen, “Practical Security of Large-scale Elections: An Exploratory
Case Study of Internet Voting in Estonia,” in 7th Workshop on e-Business (WEB
2008, AIS Special Interest Group on E-Business), 2008.'
mla: 'Schryen, Guido. “Practical Security of Large-Scale Elections: An Exploratory
Case Study of Internet Voting in Estonia.” 7th Workshop on E-Business (WEB
2008, AIS Special Interest Group on E-Business), 2008.'
short: 'G. Schryen, in: 7th Workshop on E-Business (WEB 2008, AIS Special Interest
Group on E-Business), 2008.'
date_created: 2018-11-14T14:43:23Z
date_updated: 2022-01-06T07:02:20Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
content_type: application/pdf
creator: hsiemes
date_created: 2018-12-18T13:18:21Z
date_updated: 2018-12-18T13:18:21Z
file_id: '6320'
file_name: Schryen - Practical Security of Large-scale Elections - LNBIP - web version.pdf
file_size: 273231
relation: main_file
file_date_updated: 2018-12-18T13:18:21Z
has_accepted_license: '1'
keyword:
- Internet voting
- large-scale election
- Estonian parliamen- tary election
- security
- security management
language:
- iso: eng
oa: '1'
publication: 7th Workshop on e-Business (WEB 2008, AIS Special Interest Group on E-Business)
status: public
title: 'Practical Security of Large-scale Elections: An Exploratory Case Study of
Internet Voting in Estonia'
type: conference
user_id: '61579'
year: '2008'
...
---
_id: '11820'
abstract:
- lang: eng
text: In this paper, we derive an uncertainty decoding rule for automatic speech
recognition (ASR), which accounts for both corrupted observations and inter-frame
correlation. The conditional independence assumption, prevalent in hidden Markov
model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned
on the complete observed feature vector sequence. This is a more informative posterior
than one conditioned only on the current observation. The novel decoding is used
to obtain a transmission-error robust remote ASR system, where the speech capturing
unit is connected to the decoder via an error-prone communication network. We
show how the clean speech posterior can be computed for communication links being
characterized by either bit errors or packet loss. Recognition results are presented
for both distributed and network speech recognition, where in the latter case
common voice-over-IP codecs are employed.
author:
- first_name: Valentin
full_name: Ion, Valentin
last_name: Ion
- first_name: Reinhold
full_name: Haeb-Umbach, Reinhold
id: '242'
last_name: Haeb-Umbach
citation:
ama: Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to
Transmission Error Robust Speech Recognition. IEEE Transactions on Audio, Speech,
and Language Processing. 2008;16(5):1047-1060. doi:10.1109/TASL.2008.925879
apa: Ion, V., & Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With
Applications to Transmission Error Robust Speech Recognition. IEEE Transactions
on Audio, Speech, and Language Processing, 16(5), 1047–1060. https://doi.org/10.1109/TASL.2008.925879
bibtex: '@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule
With Applications to Transmission Error Robust Speech Recognition}, volume={16},
DOI={10.1109/TASL.2008.925879},
number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing},
author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060}
}'
chicago: 'Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding
Rule With Applications to Transmission Error Robust Speech Recognition.” IEEE
Transactions on Audio, Speech, and Language Processing 16, no. 5 (2008): 1047–60.
https://doi.org/10.1109/TASL.2008.925879.'
ieee: V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications
to Transmission Error Robust Speech Recognition,” IEEE Transactions on Audio,
Speech, and Language Processing, vol. 16, no. 5, pp. 1047–1060, 2008.
mla: Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule
With Applications to Transmission Error Robust Speech Recognition.” IEEE Transactions
on Audio, Speech, and Language Processing, vol. 16, no. 5, 2008, pp. 1047–60,
doi:10.1109/TASL.2008.925879.
short: V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language
Processing 16 (2008) 1047–1060.
date_created: 2019-07-12T05:28:53Z
date_updated: 2022-01-06T06:51:10Z
department:
- _id: '54'
doi: 10.1109/TASL.2008.925879
intvolume: ' 16'
issue: '5'
keyword:
- automatic speech recognition
- bit errors
- codecs
- communication links
- corrupted observations
- decoding
- distributed speech recognition
- error-prone communication network
- feature vector sequence
- hidden Markov model-based ASR
- hidden Markov models
- inter-frame correlation
- Internet telephony
- network speech recognition
- packet loss
- speech posterior
- speech recognition
- transmission error robust speech recognition
- uncertainty decoding
- voice-over-IP codecs
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf
oa: '1'
page: 1047-1060
publication: IEEE Transactions on Audio, Speech, and Language Processing
status: public
title: A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust
Speech Recognition
type: journal_article
user_id: '44006'
volume: 16
year: '2008'
...
---
_id: '6287'
abstract:
- lang: eng
text: Spamming remains a form of Internet abuse, which burdens the Internet infrastructure,
is generally regarded as an annoyance, and is said to cause a huge economic harm.
Many technological, organizational, and legislative anti-spam measures have already
been proposed and implemented, but have not led to any substantial decrease in
the number of spam e-mails. We propose a scalable and flexible infrastructure
framework that integrates several anti-spam measures and that features both a
technological and an organizational facet. The key element of our infrastructure
is a new organizational unit that reliably and transparently limits the number
of e-mails that can be sent per day and per account. We also analyze the proposed
framework in terms of its theoretical effectiveness, the required resources, and
its limitations.
author:
- first_name: Guido
full_name: Schryen, Guido
id: '72850'
last_name: Schryen
citation:
ama: 'Schryen G. Preventing E-Mail Spam: The Conceptualization and the Analysis
of an Infrastructure Framework.; 2007.'
apa: 'Schryen, G. (2007). Preventing E-mail Spam: The Conceptualization and the
Analysis of an Infrastructure Framework.'
bibtex: '@book{Schryen_2007, title={Preventing E-mail Spam: The Conceptualization
and the Analysis of an Infrastructure Framework}, author={Schryen, Guido}, year={2007}
}'
chicago: 'Schryen, Guido. Preventing E-Mail Spam: The Conceptualization and the
Analysis of an Infrastructure Framework, 2007.'
ieee: 'G. Schryen, Preventing E-mail Spam: The Conceptualization and the Analysis
of an Infrastructure Framework. 2007.'
mla: 'Schryen, Guido. Preventing E-Mail Spam: The Conceptualization and the Analysis
of an Infrastructure Framework. 2007.'
short: 'G. Schryen, Preventing E-Mail Spam: The Conceptualization and the Analysis
of an Infrastructure Framework, 2007.'
date_created: 2018-12-18T12:50:22Z
date_updated: 2022-01-06T07:03:00Z
ddc:
- '000'
department:
- _id: '277'
file:
- access_level: open_access
content_type: application/pdf
creator: hsiemes
date_created: 2018-12-18T13:23:40Z
date_updated: 2018-12-18T13:23:40Z
file_id: '6322'
file_name: anti_spam_framework.pdf
file_size: 456755
relation: main_file
file_date_updated: 2018-12-18T13:23:40Z
has_accepted_license: '1'
keyword:
- Email
- Infrastructure
- Internet
- Spam
language:
- iso: eng
oa: '1'
status: public
title: 'Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure
Framework'
type: report
user_id: '61579'
year: '2007'
...
---
_id: '5667'
abstract:
- lang: eng
text: Voting via the Internet is part of electronic government and electronic democracy.
However, there are many obstacles which have to be overcome, especially legal
restrictions have to be transformed into technical and security solutions. In
the first part the article discusses advantages and disadvantages of Internet
elections, shows different application fields, and presents important international
pilot schemes (political and business ones). in the second part, due to democratic
basic principles, technological security aspects are worked out.
author:
- first_name: Guido
full_name: Schryen, Guido
id: '72850'
last_name: Schryen
citation:
ama: 'Schryen G. E-Democracy: Internet Voting. In: Proceedings of the IADIS International
Conference WWW Internet 2003. Vol. 2. Algarve: IADIS Press; 2003:1017-1021.'
apa: 'Schryen, G. (2003). E-Democracy: Internet Voting. In Proceedings of the
IADIS International Conference WWW Internet 2003. vol. 2 (pp. 1017–1021).
Algarve: IADIS Press.'
bibtex: '@inbook{Schryen_2003, place={Algarve}, title={E-Democracy: Internet Voting},
booktitle={Proceedings of the IADIS International Conference WWW Internet 2003.
vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, year={2003}, pages={1017–1021}
}'
chicago: 'Schryen, Guido. “E-Democracy: Internet Voting.” In Proceedings of the
IADIS International Conference WWW Internet 2003. Vol. 2, 1017–21. Algarve:
IADIS Press, 2003.'
ieee: 'G. Schryen, “E-Democracy: Internet Voting,” in Proceedings of the IADIS
International Conference WWW Internet 2003. vol. 2, Algarve: IADIS Press,
2003, pp. 1017–1021.'
mla: 'Schryen, Guido. “E-Democracy: Internet Voting.” Proceedings of the IADIS
International Conference WWW Internet 2003. Vol. 2, IADIS Press, 2003, pp.
1017–21.'
short: 'G. Schryen, in: Proceedings of the IADIS International Conference WWW Internet
2003. Vol. 2, IADIS Press, Algarve, 2003, pp. 1017–1021.'
date_created: 2018-11-14T15:01:49Z
date_updated: 2022-01-06T07:02:25Z
department:
- _id: '277'
extern: '1'
keyword:
- Internet Voting
- Online polls
- E-Democracy
- Security
language:
- iso: eng
page: 1017-1021
place: Algarve
publication: Proceedings of the IADIS International Conference WWW Internet 2003.
vol. 2
publisher: IADIS Press
status: public
title: 'E-Democracy: Internet Voting'
type: book_chapter
user_id: '61579'
year: '2003'
...
---
_id: '5668'
abstract:
- lang: eng
text: 'Zusammenfassung: Im Rahmen des E-Governments werden zunehmend Internetwahlen
diskutiert. Der Beitrag diskutiert zunächst die Vor- und Nachteile derartiger
Wahlen und zeigt Anwendungsgebiete sowie durchgeführte Pilotprojekte im politischen
wie auch wirtschaftlichen Bereich auf. Im Rahmen eines Anforderungssystems werden
anschließend aus demokratischen Wahlgrundsätzen sicherheitstechnologische Anforderungen
herausgearbeitet. Zu deren Adressierung werden kryptographischen Wahlkonzepte
herangezogen, von denen die wichtigsten vorgestellt werden. Aufgrund der Komplexität
der Anforderungslandschaft wird ein sicherheitstechnologisches Strukturmodell
vorgestellt, das insbesondere dazu dient, die Sicherheit(skomponenten) eines Wahlsystems
systematisch mit den Anforderungen abzugleichen. Der Artikel schließt mit einem
Ausblick auf notwendige Untersuchungen.'
author:
- first_name: Guido
full_name: Schryen, Guido
id: '72850'
last_name: Schryen
citation:
ama: 'Schryen G. Internet-Wahlen. In: 6. Internationale Tagung Wirtschaftsinformatik.
; 2003:937-956.'
apa: Schryen, G. (2003). Internet-Wahlen. In 6. Internationale Tagung Wirtschaftsinformatik
(pp. 937–956).
bibtex: '@inproceedings{Schryen_2003, title={Internet-Wahlen}, booktitle={6. Internationale
Tagung Wirtschaftsinformatik}, author={Schryen, Guido}, year={2003}, pages={937–956}
}'
chicago: Schryen, Guido. “Internet-Wahlen.” In 6. Internationale Tagung Wirtschaftsinformatik,
937–56, 2003.
ieee: G. Schryen, “Internet-Wahlen,” in 6. Internationale Tagung Wirtschaftsinformatik,
2003, pp. 937–956.
mla: Schryen, Guido. “Internet-Wahlen.” 6. Internationale Tagung Wirtschaftsinformatik,
2003, pp. 937–56.
short: 'G. Schryen, in: 6. Internationale Tagung Wirtschaftsinformatik, 2003, pp.
937–956.'
date_created: 2018-11-14T15:03:15Z
date_updated: 2022-01-06T07:02:26Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
content_type: application/pdf
creator: hsiemes
date_created: 2018-12-18T13:40:14Z
date_updated: 2018-12-18T13:40:14Z
file_id: '6340'
file_name: Schryen - Internet-Wahlen.pdf
file_size: 364380
relation: main_file
file_date_updated: 2018-12-18T13:40:14Z
has_accepted_license: '1'
keyword:
- Internet-Wahlen
- E-Democracy
- Sicherheit
- Kryptographie
language:
- iso: eng
oa: '1'
page: 937-956
publication: 6. Internationale Tagung Wirtschaftsinformatik
status: public
title: Internet-Wahlen
type: conference
user_id: '61579'
year: '2003'
...
---
_id: '39488'
abstract:
- lang: eng
text: CSCW systems like BSCW (Basic Support for Cooperative Work), HyperNews, and
Lotus Notes have been successfully introduced to support the cooperation of geographically
distributed work groups. Unfortunately, some of these software systems are not
flexible enough to be customized easily to the requirements of an individual user.
Most of the environments can only be configured by experts through complex programming.
In this article we introduce VIP space, a shared workspace space in the sense
of exchanging and processing shared objects between members of distributed work
groups. VIP space can be easily adapted to the user's individual views and needs
by means of a visual programming language. In VIP space, objects of the shared
workspace are moved by drag and drop between task fields. Task fields are programmed
by visual "if-then" rules applying a combination of icon- and form-based techniques.
When a document represented by an icon is dropped on a task field its rules are
checked and actions of the selected rules are excited. VIP space is finally demonstrated
in an Internet course application.
author:
- first_name: M.
full_name: Dücker, M.
last_name: Dücker
- first_name: Wolfgang
full_name: Müller, Wolfgang
id: '16243'
last_name: Müller
- first_name: Jessica
full_name: Rubart, Jessica
last_name: Rubart
citation:
ama: 'Dücker M, Müller W, Rubart J. Innovative Concepts for Configurating Shared
Workspaces through Visual Programming. In: Proceedings of the 32nd Annual
Hawaii International Conference on Systems Sciences. ; 1999. doi:10.1109/HICSS.1999.773046'
apa: Dücker, M., Müller, W., & Rubart, J. (1999). Innovative Concepts for Configurating
Shared Workspaces through Visual Programming. Proceedings of the 32nd Annual
Hawaii International Conference on Systems Sciences. Proceedings of the 32nd
Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32, Maui,
HI, USA . https://doi.org/10.1109/HICSS.1999.773046
bibtex: '@inproceedings{Dücker_Müller_Rubart_1999, place={Maui, HI, USA }, title={Innovative
Concepts for Configurating Shared Workspaces through Visual Programming}, DOI={10.1109/HICSS.1999.773046},
booktitle={ Proceedings of the 32nd Annual Hawaii International Conference on
Systems Sciences}, author={Dücker, M. and Müller, Wolfgang and Rubart, Jessica},
year={1999} }'
chicago: Dücker, M., Wolfgang Müller, and Jessica Rubart. “Innovative Concepts for
Configurating Shared Workspaces through Visual Programming.” In Proceedings
of the 32nd Annual Hawaii International Conference on Systems Sciences. Maui,
HI, USA , 1999. https://doi.org/10.1109/HICSS.1999.773046.
ieee: 'M. Dücker, W. Müller, and J. Rubart, “Innovative Concepts for Configurating
Shared Workspaces through Visual Programming,” presented at the Proceedings of
the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32,
Maui, HI, USA , 1999, doi: 10.1109/HICSS.1999.773046.'
mla: Dücker, M., et al. “Innovative Concepts for Configurating Shared Workspaces
through Visual Programming.” Proceedings of the 32nd Annual Hawaii International
Conference on Systems Sciences, 1999, doi:10.1109/HICSS.1999.773046.
short: 'M. Dücker, W. Müller, J. Rubart, in: Proceedings of the 32nd Annual Hawaii
International Conference on Systems Sciences, Maui, HI, USA , 1999.'
conference:
location: 'Maui, HI, USA '
name: Proceedings of the 32nd Annual Hawaii International Conference on Systems
Sciences. 1999. HICSS-32
date_created: 2023-01-24T11:35:47Z
date_updated: 2023-01-24T11:35:52Z
department:
- _id: '672'
doi: 10.1109/HICSS.1999.773046
keyword:
- Application software
- Electronic mail
- Computer networks
- Collaborative work
- Teleconferencing
- Asynchronous communication
- Software systems
- Internet
- Computer applications
- Discussion forums
language:
- iso: eng
place: 'Maui, HI, USA '
publication: ' Proceedings of the 32nd Annual Hawaii International Conference on Systems
Sciences'
publication_identifier:
isbn:
- 0-7695-0001-3
status: public
title: Innovative Concepts for Configurating Shared Workspaces through Visual Programming
type: conference
user_id: '5786'
year: '1999'
...