@inproceedings{56298,
  abstract     = {{In the general pattern formation (GPF) problem, a swarm of simple autonomous,
disoriented robots must form a given pattern. The robots' simplicity imply a
strong limitation: When the initial configuration is rotationally symmetric,
only patterns with a similar symmetry can be formed [Yamashita, Suzyuki; TCS
2010]. The only known algorithm to form large patterns with limited visibility
and without memory requires the robots to start in a near-gathering (a swarm of
constant diameter) [Hahn et al.; SAND 2024]. However, not only do we not know
any near-gathering algorithm guaranteed to preserve symmetry but most natural
gathering strategies trivially increase symmetries [Castenow et al.; OPODIS
2022].
  Thus, we study near-gathering without changing the swarm's rotational
symmetry for disoriented, oblivious robots with limited visibility (the
OBLOT-model, see [Flocchini et al.; 2019]). We introduce a technique based on
the theory of dynamical systems to analyze how a given algorithm affects
symmetry and provide sufficient conditions for symmetry preservation. Until
now, it was unknown whether the considered OBLOT-model allows for any
non-trivial algorithm that always preserves symmetry. Our first result shows
that a variant of Go-to-the-Average always preserves symmetry but may sometimes
lead to multiple, unconnected near-gathering clusters. Our second result is a
symmetry-preserving near-gathering algorithm that works on swarms with a convex
boundary (the outer boundary of the unit disc graph) and without holes (circles
of diameter 1 inside the boundary without any robots).}},
  author       = {{Gerlach, Raphael and von der Gracht, Sören and Hahn, Christopher and Harbig, Jonas and Kling, Peter}},
  booktitle    = {{28th International Conference on Principles of Distributed Systems (OPODIS 2024)}},
  editor       = {{Bonomi, Silvia and Galletta, Letterio and Rivière,  Etienne and Schiavoni,  Valerio}},
  isbn         = {{978-3-95977-360-7}},
  issn         = {{1868-8969}},
  keywords     = {{Swarm Algorithm, Swarm Robots, Distributed Algorithm, Pattern Formation, Limited Visibility, Oblivious}},
  location     = {{Lucca, Italy}},
  publisher    = {{Schloss Dagstuhl -- Leibniz-Zentrum für Informatik}},
  title        = {{{Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility}}},
  doi          = {{10.4230/LIPIcs.OPODIS.2024.13}},
  volume       = {{324}},
  year         = {{2025}},
}

@unpublished{58953,
  abstract     = {{In this article, we investigate symmetry properties of distributed systems of mobile robots. We consider a swarm of n robots in the OBLOT model and analyze their collective Fsync dynamics using of equivariant dynamical systems theory. To this end, we show that the corresponding evolution function commutes with rotational and reflective transformations of R^2. These form a group that is isomorphic to O(2) x S_n, the product group of the orthogonal group and the permutation on n elements. The theory of equivariant dynamical systems is used to deduce a hierarchy along which symmetries of a robot swarm can potentially increase following an arbitrary protocol. By decoupling the Look phase from the Compute and Move phases in the mathematical description of an LCM cycle, this hierarchy can be characterized in terms of automorphisms of connectivity graphs. In particular, we find all possible types of symmetry increase, if the decoupled Compute and Move phase is invertible. Finally, we apply our results to protocols which induce state-dependent linear dynamics, where the reduced system consisting of only the Compute and Move phase is linear.}},
  author       = {{Gerlach, Raphael and von der Gracht, Sören}},
  booktitle    = {{arXiv:2503.07576}},
  keywords     = {{dynamical systems, coupled systems, distributed computing, robot swarms, autonomous mobile robots, symmetry, equivariant dynamics}},
  pages        = {{23}},
  title        = {{{Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems}}},
  year         = {{2025}},
}

@unpublished{63403,
  abstract     = {{Stateful signatures like the NIST standardized signature schemes LMS and XMSS provide an efficient and mature realization of post-quantum secure signature schemes. They are recommended for long-term use cases like e.g. firmware signing. However, stateful signature schemes require to properly manage a so-called state. In stateful signature schemes like LMS and XMSS, signing keys consist of a set of keys of a one-time signature scheme and it has to be guaranteed that each one-time key is used only once. This is done by updating a state in each signature computation, basically recording which one-time keys have already been used. While this is straightforward in centralized systems, in distributed systems like secure enclaves consisting of e.g. multiple hardware security modules (HSMs) with limited communication keeping a distributed state that at any point in time is consistent among all parties involved presents a challenge. This challenge is not addressed by the current standardization processes. 
In this paper we present a security model for the distributed key management of post-quantum secure stateful signatures like XMSS and LMS. We also present a simple, efficient, and easy to implement protocol proven secure in this security model, i.e. the protocol guarantees at any point in time a consistent state among the parties in a distributed system, like a distributed security enclave. The security model is defined in the universal composabilty (UC) framework by Ran Canetti by providing an ideal functionality for the distributed key management for stateful signatures. Hence our protocol remains secure even if arbitrarily composed with other instances of the same or other protocols, a necessity for the security of distributed key management protocols. Our main application are security enclaves consisting of HSMs, but the model and the protocol can easily be adapted to other scenarios of distributed key management of stateful signature schemes.}},
  author       = {{Blömer, Johannes and Bröcher, Henrik and Krummel, Volker and Porzenheim, Laurens Alexander}},
  keywords     = {{distributed state, hash-based signature, stateful hash-based signature, universal composability, secure enclave}},
  pages        = {{22}},
  title        = {{{Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol}}},
  year         = {{2025}},
}

@inproceedings{21543,
  abstract     = {{Services often consist of multiple chained components such as microservices in a service mesh, or machine learning functions in a pipeline. Providing these services requires online coordination including scaling the service, placing instance of all components in the network, scheduling traffic to these instances, and routing traffic through the network. Optimized service coordination is still a hard problem due to many influencing factors such as rapidly arriving user demands and limited node and link capacity. Existing approaches to solve the problem are often built on rigid models and assumptions, tailored to specific scenarios. If the scenario changes and the assumptions no longer hold, they easily break and require manual adjustments by experts. Novel self-learning approaches using deep reinforcement learning (DRL) are promising but still have limitations as they only address simplified versions of the problem and are typically centralized and thus do not scale to practical large-scale networks.

To address these issues, we propose a distributed self-learning service coordination approach using DRL. After centralized training, we deploy a distributed DRL agent at each node in the network, making fast coordination decisions locally in parallel with the other nodes. Each agent only observes its direct neighbors and does not need global knowledge. Hence, our approach scales independently from the size of the network. In our extensive evaluation using real-world network topologies and traffic traces, we show that our proposed approach outperforms a state-of-the-art conventional heuristic as well as a centralized DRL approach (60% higher throughput on average) while requiring less time per online decision (1 ms).}},
  author       = {{Schneider, Stefan Balthasar and Qarawlus, Haydar and Karl, Holger}},
  booktitle    = {{IEEE International Conference on Distributed Computing Systems (ICDCS)}},
  keywords     = {{network management, service management, coordination, reinforcement learning, distributed}},
  location     = {{Washington, DC, USA}},
  publisher    = {{IEEE}},
  title        = {{{Distributed Online Service Coordination Using Deep Reinforcement Learning}}},
  year         = {{2021}},
}

@article{22510,
  abstract     = {{Over the past decades, the Gathering problem, which asks to gather a group of robots in finite time given some restrictions, has been intensively studied. In this paper, we are given a group of n autonomous, dimensionless, deterministic, and anonymous robots, with bounded viewing range. Assuming a continuous time model, the goal is to gather these robots into one point in finite time. We introduce a simple convergence criterion that defines a new class of algorithms which perform gathering in O(nd) time, where d is the diameter of the initial robot configuration. We show that some gathering algorithms in the literature belong to this class and propose two new algorithms that belong to this class and have quadratic running time, namely, Go-To-The-Relative-Center algorithm (GTRC) and Safe-Go-To-The-Relative-Center algorithm (S-GTRC). We prove that the latter can perform gathering without collision by using a slightly more complex robot model: non oblivious, chiral, and luminous (i.e. robots have observable external memory, as in [8]). We also consider a variant of the Gathering problem, the Near-Gathering problem, in which robots must get close to each other without colliding. We show that S-GTRC solves the Near-Gathering problem in quadratic time and assumes a weaker robot model than the one assumed in the current state-of-the-art.}},
  author       = {{Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm and Podlipyan, Pavel}},
  issn         = {{0304-3975}},
  journal      = {{Theoretical Computer Science}},
  keywords     = {{Local algorithms, Distributed algorithms, Collisionless gathering, Mobile robots, Multiagent system}},
  pages        = {{41--60}},
  title        = {{{A continuous strategy for collisionless gathering}}},
  doi          = {{10.1016/j.tcs.2020.10.037}},
  volume       = {{852}},
  year         = {{2021}},
}

@article{22511,
  abstract     = {{In this paper, we reconsider the well-known discrete, round-based Go-To-The-Center algorithm due to Ando, Suzuki, and Yamashita [2] for gathering n autonomous mobile robots with limited viewing range in the plane. Remarquably, this algorithm exploits the fact that during its execution, many collisions of robots occur. Such collisions are interpreted as a success because it is assumed that such collided robots behave the same from now on. This is acceptable under the assumption that each robot is represented by a single point. Otherwise, collisions should be avoided. In this paper, we consider a continuous Go-To-The-Center algorithm in which the robots continuously observe the positions of their neighbors and adapt their speed (assuming a speed limit) and direction. Our first results are time bounds of O(n2) for gathering in two dimensions Euclidean space, and Θ(n) for the one dimension. Our main contribution is the introduction and evaluation of a continuous algorithm which performs Go-To-The-Center considering only the neighbors of a robot with respect to the Gabriel subgraph of the visibility graph, i.e. Go-To-The-Gabriel-Center algorithm. We show that this modification still correctly executes gathering in one and two dimensions, with the same time bounds as above. Simulations exhibit a severe difference of the behavior of the Go-To-The-Center and the Go-To-The-Gabriel-Center algorithms: Whereas lots of collisions occur during a run of the Go-To-The-Center algorithm, typically only one, namely the final collision occurs during a run of the Go-To-The-Gabriel-Center algorithm. We can prove this “collisionless property” of the Go-To-The-Gabriel-Center algorithm for one dimension. In two-dimensional Euclidean space, we conjecture that the “collisionless property” holds for almost every initial configuration. We support our conjecture with measurements obtained from the simulation where robots execute both continuous Go-To-The-Center and Go-To-The-Gabriel-Center algorithms.
}},
  author       = {{Li, Shouwei and Meyer auf der Heide, Friedhelm and Podlipyan, Pavel}},
  issn         = {{0304-3975}},
  journal      = {{Theoretical Computer Science}},
  keywords     = {{Local algorithms, Distributed algorithms, Collisionless gathering, Mobile robots, Multiagent system}},
  pages        = {{29--40}},
  title        = {{{The impact of the Gabriel subgraph of the visibility graph on the gathering of mobile autonomous robots}}},
  doi          = {{10.1016/j.tcs.2020.11.009}},
  volume       = {{852}},
  year         = {{2021}},
}

@inproceedings{19607,
  abstract     = {{Modern services consist of modular, interconnected
components, e.g., microservices forming a service mesh. To
dynamically adjust to ever-changing service demands, service
components have to be instantiated on nodes across the network.
Incoming flows requesting a service then need to be routed
through the deployed instances while considering node and link
capacities. Ultimately, the goal is to maximize the successfully
served flows and Quality of Service (QoS) through online service
coordination. Current approaches for service coordination are
usually centralized, assuming up-to-date global knowledge and
making global decisions for all nodes in the network. Such global
knowledge and centralized decisions are not realistic in practical
large-scale networks.

To solve this problem, we propose two algorithms for fully
distributed service coordination. The proposed algorithms can be
executed individually at each node in parallel and require only
very limited global knowledge. We compare and evaluate both
algorithms with a state-of-the-art centralized approach in extensive
simulations on a large-scale, real-world network topology.
Our results indicate that the two algorithms can compete with
centralized approaches in terms of solution quality but require
less global knowledge and are magnitudes faster (more than
100x).}},
  author       = {{Schneider, Stefan Balthasar and Klenner, Lars Dietrich and Karl, Holger}},
  booktitle    = {{IEEE International Conference on Network and Service Management (CNSM)}},
  keywords     = {{distributed management, service coordination, network coordination, nfv, softwarization, orchestration}},
  publisher    = {{IEEE}},
  title        = {{{Every Node for Itself: Fully Distributed Service Coordination}}},
  year         = {{2020}},
}

@inproceedings{17667,
  abstract     = {{Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack.}},
  author       = {{Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}},
  booktitle    = {{2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}},
  issn         = {{null}},
  keywords     = {{computer network security, multinetwork environments, multidomain defensive action, task execution order, timing influence defense efficiency, distributed attacks, collaborative security defence approach, minimize propagation approach, minimize countermeasure approach, counteract everywhere approach, Conferences, Cloud computing, Computer crime, Edge computing, Security, Defense Approaches, Multi-Domain Defense, Collaborative Defense, Defense Algorithms, Computer Networks}},
  pages        = {{113--123}},
  title        = {{{Approaches for Collaborative Security Defences in Multi Network Environments}}},
  doi          = {{10.1109/CSCloud/EdgeCom.2019.000-9}},
  year         = {{2019}},
}

@inproceedings{3422,
  abstract     = {{We study the consensus problem in a synchronous distributed system of n nodes under an adaptive adversary that has a slightly outdated view of the system and can block all incoming and outgoing communication of a constant fraction of the nodes in each round. Motivated by a result of Ben-Or and Bar-Joseph (1998), showing that any consensus algorithm that is resilient against a linear number of crash faults requires $\tilde \Omega(\sqrt n)$ rounds in an n-node network against an adaptive adversary, we consider a late adaptive adversary, who has full knowledge of the network state at the beginning of the previous round and unlimited computational power, but is oblivious to the current state of the nodes. 

Our main contributions are randomized distributed algorithms that achieve consensus with high probability among all except a small constant fraction of the nodes (i.e., "almost-everywhere'') against a late adaptive adversary who can block up to ε n$ nodes in each round, for a small constant ε >0$. Our first protocol achieves binary almost-everywhere consensus and also guarantees a decision on the majority input value, thus ensuring plurality consensus. We also present an algorithm that achieves the same time complexity for multi-value consensus. Both of our algorithms succeed in $O(log n)$ rounds with high probability, thus showing an exponential gap to the $\tilde\Omega(\sqrt n)$ lower bound of Ben-Or and Bar-Joseph for strongly adaptive crash-failure adversaries, which can be strengthened to $\Omega(n)$ when allowing the adversary to block nodes instead of permanently crashing them. Our algorithms are scalable to large systems as each node contacts only an (amortized) constant number of peers in each communication round. We show that our algorithms are optimal up to constant (resp.\ sub-logarithmic) factors by proving that every almost-everywhere consensus protocol takes $\Omega(log_d n)$ rounds in the worst case, where d is an upper bound on the number of communication requests initiated per node in each round. We complement our theoretical results with an experimental evaluation of the binary almost-everywhere consensus protocol revealing a short convergence time even against an adversary blocking a large fraction of nodes.}},
  author       = {{Robinson, Peter and Scheideler, Christian and Setzer, Alexander}},
  booktitle    = {{Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}},
  isbn         = {{978-1-4503-5799-9/18/07}},
  keywords     = {{distributed consensus, randomized algorithm, adaptive adversary, complexity lower bound}},
  location     = {{Wien}},
  title        = {{{Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary}}},
  doi          = {{10.1145/3210377.3210399}},
  year         = {{2018}},
}

@inproceedings{4411,
  abstract     = {{While a lot of research in distributed computing has covered solutions for self-stabilizing computing and topologies, there is far less work on self-stabilization for distributed data structures.
Considering crashing peers in peer-to-peer networks, it should not be taken for granted that a distributed data structure remains intact.
In this work, we present a self-stabilizing protocol for a distributed data structure called the hashed Patricia Trie (Kniesburges and Scheideler WALCOM'11) that enables efficient prefix search on a set of keys.
The data structure has a wide area of applications including string matching problems while offering low overhead and efficient operations when embedded on top of a distributed hash table.
Especially, longest prefix matching for $x$ can be done in $\mathcal{O}(\log |x|)$ hash table read accesses.
We show how to maintain the structure in a self-stabilizing way.
Our protocol assures low overhead in a legal state and a total (asymptotically optimal) memory demand of $\Theta(d)$ bits, where $d$ is the number of bits needed for storing all keys.}},
  author       = {{Knollmann, Till and Scheideler, Christian}},
  booktitle    = {{Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}},
  editor       = {{Izumi, Taisuke and Kuznetsov, Petr}},
  keywords     = {{Self-Stabilizing, Prefix Search, Distributed Data Structure}},
  location     = {{Tokyo}},
  publisher    = {{Springer, Cham}},
  title        = {{{A Self-Stabilizing Hashed Patricia Trie}}},
  doi          = {{10.1007/978-3-030-03232-6_1}},
  volume       = {{11201}},
  year         = {{2018}},
}

@inproceedings{4375,
  abstract     = {{We present a peer-to-peer network that supports the efficient processing of orthogonal range queries $R=\bigtimes_{i=1}^{d}[a_i,\,b_i]$ in a $d$-dimensional point space.\\
The  network is the same for each dimension, namely a distance halving network like the one introduced by Naor and Wieder (ACM TALG'07).
We show how to execute such range queries using $\mathcal{O}\left(2^{d'}d\,\log m + d\,|R|\right)$ hops (and the same number of messages) in total. Here $[m]^d$ is the ground set, $|R|$ is the size and $d'$ the dimension of the queried range.
Furthermore, if the peers form a distributed network, the query can be answered in $\mathcal{O}\left(d\,\log m + d\,\sum_{i=1}^{d}(b_i-a_i+1)\right)$ communication rounds.
Our algorithms are based on a mapping of the Hilbert Curve through $[m]^d$ to the peers.}},
  author       = {{Benter, Markus and Knollmann, Till and Meyer auf der Heide, Friedhelm and Setzer, Alexander and Sundermeier, Jannik}},
  booktitle    = {{Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)}},
  keywords     = {{Distributed Storage, Multi-Dimensional Range Queries, Peer-to-Peer, Hilbert Curve}},
  location     = {{Helsinki}},
  title        = {{{A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension}}},
  doi          = {{10.1007/978-3-030-19759-9_4}},
  year         = {{2018}},
}

@inproceedings{10780,
  author       = {{Guettatfi, Zakarya and Hübner, Philipp and Platzner, Marco and Rinner, Bernhard}},
  booktitle    = {{12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)}},
  keywords     = {{embedded systems, image sensors, power aware computing, wireless sensor networks, Zynq-based VSN node prototype, computational self-awareness, design approach, platform levels, power consumption, visual sensor networks, visual sensor nodes, Cameras, Hardware, Middleware, Multicore processing, Operating systems, Runtime, Reconfigurable platforms, distributed embedded systems, performance-resource trade-off, self-awareness, visual sensor nodes}},
  pages        = {{1--8}},
  title        = {{{Computational self-awareness as design approach for visual sensor nodes}}},
  doi          = {{10.1109/ReCoSoC.2017.8016147}},
  year         = {{2017}},
}

@inproceedings{19,
  abstract     = {{Version Control Systems (VCS) are a valuable tool for software development
and document management. Both client/server and distributed (Peer-to-Peer)
models exist, with the latter (e.g., Git and Mercurial) becoming
increasingly popular. Their distributed nature introduces complications,
especially concerning security: it is hard to control the dissemination of
contents stored in distributed VCS as they rely on replication of complete
repositories to any involved user.

We overcome this issue by designing and implementing a concept for
cryptography-enforced access control which is transparent to the user. Use
of field-tested schemes (end-to-end encryption, digital signatures) allows
for strong security, while adoption of convergent encryption and
content-defined chunking retains storage efficiency. The concept is
seamlessly integrated into Mercurial---respecting its distributed storage
concept---to ensure practical usability and compatibility to existing
deployments.}},
  author       = {{Lass, Michael and Leibenger, Dominik and Sorge, Christoph}},
  booktitle    = {{Proc. 41st Conference on Local Computer Networks (LCN)}},
  isbn         = {{978-1-5090-2054-6}},
  keywords     = {{access control, distributed version control systems, mercurial, peer-to-peer, convergent encryption, confidentiality, authenticity}},
  publisher    = {{IEEE}},
  title        = {{{Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension}}},
  doi          = {{10.1109/lcn.2016.11}},
  year         = {{2016}},
}

@inproceedings{5598,
  abstract     = {{Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia.}},
  author       = {{Volkamer, Melanie and Schryen, Guido}},
  booktitle    = {{Proceedings of the 23rd Bled eConference}},
  keywords     = {{distributed trust concepts, measuring etrust, Internet voting}},
  title        = {{{Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}}},
  year         = {{2010}},
}

@article{11820,
  abstract     = {{In this paper, we derive an uncertainty decoding rule for automatic speech recognition (ASR), which accounts for both corrupted observations and inter-frame correlation. The conditional independence assumption, prevalent in hidden Markov model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned on the complete observed feature vector sequence. This is a more informative posterior than one conditioned only on the current observation. The novel decoding is used to obtain a transmission-error robust remote ASR system, where the speech capturing unit is connected to the decoder via an error-prone communication network. We show how the clean speech posterior can be computed for communication links being characterized by either bit errors or packet loss. Recognition results are presented for both distributed and network speech recognition, where in the latter case common voice-over-IP codecs are employed.}},
  author       = {{Ion, Valentin and Haeb-Umbach, Reinhold}},
  journal      = {{IEEE Transactions on Audio, Speech, and Language Processing}},
  keywords     = {{automatic speech recognition, bit errors, codecs, communication links, corrupted observations, decoding, distributed speech recognition, error-prone communication network, feature vector sequence, hidden Markov model-based ASR, hidden Markov models, inter-frame correlation, Internet telephony, network speech recognition, packet loss, speech posterior, speech recognition, transmission error robust speech recognition, uncertainty decoding, voice-over-IP codecs}},
  number       = {{5}},
  pages        = {{1047--1060}},
  title        = {{{A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition}}},
  doi          = {{10.1109/TASL.2008.925879}},
  volume       = {{16}},
  year         = {{2008}},
}

@inproceedings{2392,
  author       = {{Woehrle, Matthias and Plessl, Christian and Beutel, Jan and Thiele, Lothar}},
  booktitle    = {{Proc. Workshop on Embedded Networked Sensors (EmNets)}},
  isbn         = {{978-1-59593-694-3}},
  keywords     = {{WSN, testing, distributed, embedded}},
  pages        = {{93--97}},
  publisher    = {{ACM}},
  title        = {{{Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework}}},
  doi          = {{10.1145/1278972.1278996}},
  year         = {{2007}},
}

@inproceedings{11824,
  abstract     = {{Soft-feature based speech recognition, which is an example of uncertainty decoding, has been proven to be a robust error mitigation method for distributed speech recognition over wireless channels exhibiting bit errors. In this paper we extend this concept to packet-oriented transmissions. The a posteriori probability density function of the lost feature vector, given the closest received neighbours, is computed. In the experiments, the nearest frame repetition, which is shown to be equivalent to the MAP estimate, outperforms the MMSE estimate for long bursts. Taking the variance into account at the speech recognition stage results in superior performance compared to classical schemes using point estimates. A computationally and memory efficient implementation of the proposed packet loss compensation scheme based on table lookup is presented}},
  author       = {{Ion, Valentin and Haeb-Umbach, Reinhold}},
  booktitle    = {{IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)}},
  keywords     = {{distributed speech recognition, least mean squares methods, MAP estimate, maximum likelihood estimation, MMSE estimate, packet loss compensation scheme, packet switched communication, posteriori probability density function, robust error mitigation method, soft-features, speech recognition, table lookup, voice communication, wireless channels}},
  pages        = {{I}},
  title        = {{{An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features}}},
  doi          = {{10.1109/ICASSP.2006.1659984}},
  volume       = {{1}},
  year         = {{2006}},
}

@article{11825,
  abstract     = {{In this paper, we propose an enhanced error concealment strategy at the server side of a distributed speech recognition (DSR) system, which is fully compatible with the existing DSR standard. It is based on a Bayesian approach, where the a posteriori probability density of the error-free feature vector is computed, given all received feature vectors which are possibly corrupted by transmission errors. Rather than computing a point estimate, such as the MMSE estimate, and plugging it into the Bayesian decision rule, we employ uncertainty decoding, which results in an integration over the uncertainty in the feature domain. In a typical scenario the communication between the thin client, often a mobile device, and the recognition server spreads across heterogeneous networks. Both bit errors on circuit-switched links and lost data packets on IP connections are mitigated by our approach in a unified manner. The experiments reveal improved robustness both for small- and large-vocabulary recognition tasks.}},
  author       = {{Ion, Valentin and Haeb-Umbach, Reinhold}},
  journal      = {{Speech Communication}},
  keywords     = {{Channel error robustness, Distributed speech recognition, Soft features, Uncertainty decoding}},
  number       = {{11}},
  pages        = {{1435--1446}},
  title        = {{{Uncertainty decoding for distributed speech recognition over error-prone networks}}},
  doi          = {{10.1016/j.specom.2006.03.007}},
  volume       = {{48}},
  year         = {{2006}},
}

@inproceedings{11828,
  abstract     = {{In this paper we present a comparison of the recently proposed Soft-Feature Distributed Speech Recognition (SFDSR) with the two evaluated candidate codecs for Speech Enabled Services over wireless networks: Adaptive Multirate Codec (AMR) and the ETSI Extended Advanced Front-End for Distributed Speech Recognition (XAFE). It is shown that SFDSR achieves the best recognition performance on a simulated GSM transmission, followed by XAFE and AMR.We also present some new results concerning SFDSR which demonstrate the versatility of the approach. Further, a simple method is introduced which considerably reduces the computational effort.}},
  author       = {{Ion, Valentin and Haeb-Umbach, Reinhold}},
  booktitle    = {{IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)}},
  keywords     = {{adaptive codes, adaptive multirate codec, AMR, distributed speech recognition, ETSI, extended advanced front-end, recognition performance, SFDSR, simulated GSM transmission, soft-feature distributed speech recognition, speech codecs, speech coding, speech recognition, variable rate codes, XAFE}},
  pages        = {{333--336}},
  title        = {{{A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services}}},
  doi          = {{10.1109/ICASSP.2005.1415118}},
  volume       = {{1}},
  year         = {{2005}},
}

@inproceedings{39432,
  abstract     = {{This article presents SAL, a general purpose scripting language for the rapid development of distributed software agents seamlessly embedded in a visual environment. Integrated facilities for dynamic visualization provide sample but powerful means for debugging and domain-oriented animation. SAL agents are arranged on a set of 2D worksheets which can be distributed over different machines. An agent's program is defined by the means of a table specifying a set of state transition rules with a condition and a sequence of actions each. Beyond basic computation and communication, actions can dynamically modify the agent's depiction, its program, and spawn arbitrary processes. A couple of examples demonstrate SAL's applicability in various domains like electronic systems design and process management.}},
  author       = {{Müller, Wolfgang and Meyer, A. and Zabel, Henning}},
  booktitle    = {{Proceedings of the 34th Annual Hawaii International Conference on System Sciences}},
  isbn         = {{0-7695-0981-9}},
  keywords     = {{software prototyping, distributed programming, authoring languages, software agents, program visualisation, parallel languages}},
  title        = {{{A Language for the Rapid Prototyping of Mobile Evolving Agents}}},
  doi          = {{10.1109/HICSS.2001.926319}},
  year         = {{2001}},
}

