[{"year":"2025","title":"Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility","date_created":"2024-10-01T13:29:43Z","publisher":"Schloss Dagstuhl -- Leibniz-Zentrum für Informatik","abstract":[{"lang":"eng","text":"In the general pattern formation (GPF) problem, a swarm of simple autonomous,\r\ndisoriented robots must form a given pattern. The robots' simplicity imply a\r\nstrong limitation: When the initial configuration is rotationally symmetric,\r\nonly patterns with a similar symmetry can be formed [Yamashita, Suzyuki; TCS\r\n2010]. The only known algorithm to form large patterns with limited visibility\r\nand without memory requires the robots to start in a near-gathering (a swarm of\r\nconstant diameter) [Hahn et al.; SAND 2024]. However, not only do we not know\r\nany near-gathering algorithm guaranteed to preserve symmetry but most natural\r\ngathering strategies trivially increase symmetries [Castenow et al.; OPODIS\r\n2022].\r\n  Thus, we study near-gathering without changing the swarm's rotational\r\nsymmetry for disoriented, oblivious robots with limited visibility (the\r\nOBLOT-model, see [Flocchini et al.; 2019]). We introduce a technique based on\r\nthe theory of dynamical systems to analyze how a given algorithm affects\r\nsymmetry and provide sufficient conditions for symmetry preservation. Until\r\nnow, it was unknown whether the considered OBLOT-model allows for any\r\nnon-trivial algorithm that always preserves symmetry. Our first result shows\r\nthat a variant of Go-to-the-Average always preserves symmetry but may sometimes\r\nlead to multiple, unconnected near-gathering clusters. Our second result is a\r\nsymmetry-preserving near-gathering algorithm that works on swarms with a convex\r\nboundary (the outer boundary of the unit disc graph) and without holes (circles\r\nof diameter 1 inside the boundary without any robots)."}],"publication":"28th International Conference on Principles of Distributed Systems (OPODIS 2024)","language":[{"iso":"eng"}],"keyword":["Swarm Algorithm","Swarm Robots","Distributed Algorithm","Pattern Formation","Limited Visibility","Oblivious"],"external_id":{"arxiv":["2409.19277"]},"intvolume":"       324","citation":{"chicago":"Gerlach, Raphael, Sören von der Gracht, Christopher Hahn, Jonas Harbig, and Peter Kling. “Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility.” In <i>28th International Conference on Principles of Distributed Systems (OPODIS 2024)</i>, edited by Silvia Bonomi, Letterio Galletta,  Etienne Rivière, and  Valerio Schiavoni, Vol. 324. Leibniz International Proceedings in Informatics (LIPIcs). Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, 2025. <a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2024.13\">https://doi.org/10.4230/LIPIcs.OPODIS.2024.13</a>.","ieee":"R. Gerlach, S. von der Gracht, C. Hahn, J. Harbig, and P. Kling, “Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility,” in <i>28th International Conference on Principles of Distributed Systems (OPODIS 2024)</i>, Lucca, Italy, 2025, vol. 324, doi: <a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2024.13\">10.4230/LIPIcs.OPODIS.2024.13</a>.","ama":"Gerlach R, von der Gracht S, Hahn C, Harbig J, Kling P. Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility. In: Bonomi S, Galletta L, Rivière  Etienne, Schiavoni  Valerio, eds. <i>28th International Conference on Principles of Distributed Systems (OPODIS 2024)</i>. Vol 324. Leibniz International Proceedings in Informatics (LIPIcs). Schloss Dagstuhl -- Leibniz-Zentrum für Informatik; 2025. doi:<a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2024.13\">10.4230/LIPIcs.OPODIS.2024.13</a>","apa":"Gerlach, R., von der Gracht, S., Hahn, C., Harbig, J., &#38; Kling, P. (2025). Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility. In S. Bonomi, L. Galletta,  Etienne Rivière, &#38;  Valerio Schiavoni (Eds.), <i>28th International Conference on Principles of Distributed Systems (OPODIS 2024)</i> (Vol. 324). Schloss Dagstuhl -- Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2024.13\">https://doi.org/10.4230/LIPIcs.OPODIS.2024.13</a>","short":"R. Gerlach, S. von der Gracht, C. Hahn, J. Harbig, P. Kling, in: S. Bonomi, L. Galletta,  Etienne Rivière,  Valerio Schiavoni (Eds.), 28th International Conference on Principles of Distributed Systems (OPODIS 2024), Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, 2025.","mla":"Gerlach, Raphael, et al. “Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility.” <i>28th International Conference on Principles of Distributed Systems (OPODIS 2024)</i>, edited by Silvia Bonomi et al., vol. 324, Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, 2025, doi:<a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2024.13\">10.4230/LIPIcs.OPODIS.2024.13</a>.","bibtex":"@inproceedings{Gerlach_von der Gracht_Hahn_Harbig_Kling_2025, series={Leibniz International Proceedings in Informatics (LIPIcs)}, title={Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility}, volume={324}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2024.13\">10.4230/LIPIcs.OPODIS.2024.13</a>}, booktitle={28th International Conference on Principles of Distributed Systems (OPODIS 2024)}, publisher={Schloss Dagstuhl -- Leibniz-Zentrum für Informatik}, author={Gerlach, Raphael and von der Gracht, Sören and Hahn, Christopher and Harbig, Jonas and Kling, Peter}, editor={Bonomi, Silvia and Galletta, Letterio and Rivière,  Etienne and Schiavoni,  Valerio}, year={2025}, collection={Leibniz International Proceedings in Informatics (LIPIcs)} }"},"publication_identifier":{"isbn":["978-3-95977-360-7"],"issn":["1868-8969"]},"publication_status":"published","doi":"10.4230/LIPIcs.OPODIS.2024.13","conference":{"name":"28th International Conference on Principles of Distributed Systems (OPODIS 2024)","start_date":"2024-12-11","end_date":"2024-12-13","location":"Lucca, Italy"},"main_file_link":[{"url":"https://arxiv.org/abs/2409.19277","open_access":"1"}],"volume":324,"author":[{"first_name":"Raphael","last_name":"Gerlach","orcid":"0009-0002-4750-2051","full_name":"Gerlach, Raphael","id":"32655"},{"first_name":"Sören","full_name":"von der Gracht, Sören","id":"97359","last_name":"von der Gracht","orcid":"0000-0002-8054-2058"},{"first_name":"Christopher","last_name":"Hahn","full_name":"Hahn, Christopher"},{"last_name":"Harbig","id":"47213","full_name":"Harbig, Jonas","first_name":"Jonas"},{"last_name":"Kling","full_name":"Kling, Peter","first_name":"Peter"}],"date_updated":"2025-01-09T11:39:19Z","oa":"1","status":"public","editor":[{"first_name":"Silvia","full_name":"Bonomi, Silvia","last_name":"Bonomi"},{"first_name":"Letterio","full_name":"Galletta, Letterio","last_name":"Galletta"},{"first_name":" Etienne","full_name":"Rivière,  Etienne","last_name":"Rivière"},{"full_name":"Schiavoni,  Valerio","last_name":"Schiavoni","first_name":" Valerio"}],"type":"conference","department":[{"_id":"101"}],"series_title":"Leibniz International Proceedings in Informatics (LIPIcs)","user_id":"97359","_id":"56298","project":[{"grant_number":"453112019","name":"Algorithmen für Schwarmrobotik: Verteiltes Rechnen trifft Dynamische Systeme","_id":"106"}]},{"language":[{"iso":"eng"}],"keyword":["dynamical systems","coupled systems","distributed computing","robot swarms","autonomous mobile robots","symmetry","equivariant dynamics"],"ddc":["004"],"external_id":{"arxiv":["2503.07576"]},"file":[{"file_name":"Analyzing_Symmetries_of_Swarms_of_Mobile_Robots_Using_Equivariant_Dynamical_Systems.pdf","access_level":"open_access","file_id":"58954","file_size":812198,"date_created":"2025-03-11T08:27:32Z","creator":"svdg","date_updated":"2025-03-11T08:27:32Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"In this article, we investigate symmetry properties of distributed systems of mobile robots. We consider a swarm of n robots in the OBLOT model and analyze their collective Fsync dynamics using of equivariant dynamical systems theory. To this end, we show that the corresponding evolution function commutes with rotational and reflective transformations of R^2. These form a group that is isomorphic to O(2) x S_n, the product group of the orthogonal group and the permutation on n elements. The theory of equivariant dynamical systems is used to deduce a hierarchy along which symmetries of a robot swarm can potentially increase following an arbitrary protocol. By decoupling the Look phase from the Compute and Move phases in the mathematical description of an LCM cycle, this hierarchy can be characterized in terms of automorphisms of connectivity graphs. In particular, we find all possible types of symmetry increase, if the decoupled Compute and Move phase is invertible. Finally, we apply our results to protocols which induce state-dependent linear dynamics, where the reduced system consisting of only the Compute and Move phase is linear."}],"publication":"arXiv:2503.07576","title":"Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems","date_created":"2025-03-11T08:21:05Z","year":"2025","file_date_updated":"2025-03-11T08:27:32Z","department":[{"_id":"101"}],"user_id":"97359","_id":"58953","project":[{"grant_number":"453112019","name":"Algorithmen für Schwarmrobotik: Verteiltes Rechnen trifft Dynamische Systeme","_id":"106"}],"status":"public","type":"preprint","author":[{"first_name":"Raphael","orcid":"0009-0002-4750-2051","last_name":"Gerlach","full_name":"Gerlach, Raphael","id":"32655"},{"full_name":"von der Gracht, Sören","id":"97359","last_name":"von der Gracht","orcid":"0000-0002-8054-2058","first_name":"Sören"}],"oa":"1","date_updated":"2025-03-11T08:53:02Z","page":"23","citation":{"ama":"Gerlach R, von der Gracht S. Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems. <i>arXiv:250307576</i>. Published online 2025.","chicago":"Gerlach, Raphael, and Sören von der Gracht. “Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems.” <i>ArXiv:2503.07576</i>, 2025.","ieee":"R. Gerlach and S. von der Gracht, “Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems,” <i>arXiv:2503.07576</i>. 2025.","bibtex":"@article{Gerlach_von der Gracht_2025, title={Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems}, journal={arXiv:2503.07576}, author={Gerlach, Raphael and von der Gracht, Sören}, year={2025} }","mla":"Gerlach, Raphael, and Sören von der Gracht. “Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems.” <i>ArXiv:2503.07576</i>, 2025.","short":"R. Gerlach, S. von der Gracht, ArXiv:2503.07576 (2025).","apa":"Gerlach, R., &#38; von der Gracht, S. (2025). Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical Systems. In <i>arXiv:2503.07576</i>."},"has_accepted_license":"1"},{"main_file_link":[{"url":"https://eprint.iacr.org/2025/2278.pdf","open_access":"1"}],"title":"Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol","author":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"},{"first_name":"Henrik","last_name":"Bröcher","orcid":"0009-0008-3938-5485","id":"41047","full_name":"Bröcher, Henrik"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"},{"last_name":"Porzenheim","id":"47434","full_name":"Porzenheim, Laurens Alexander","first_name":"Laurens Alexander"}],"date_created":"2025-12-22T21:23:22Z","date_updated":"2025-12-23T11:30:38Z","oa":"1","page":"22","citation":{"bibtex":"@article{Blömer_Bröcher_Krummel_Porzenheim, title={Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol}, author={Blömer, Johannes and Bröcher, Henrik and Krummel, Volker and Porzenheim, Laurens Alexander} }","short":"J. Blömer, H. Bröcher, V. Krummel, L.A. Porzenheim, (n.d.).","mla":"Blömer, Johannes, et al. <i>Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol</i>.","apa":"Blömer, J., Bröcher, H., Krummel, V., &#38; Porzenheim, L. A. (n.d.). <i>Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol</i>.","ama":"Blömer J, Bröcher H, Krummel V, Porzenheim LA. Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol.","ieee":"J. Blömer, H. Bröcher, V. Krummel, and L. A. Porzenheim, “Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol.” .","chicago":"Blömer, Johannes, Henrik Bröcher, Volker Krummel, and Laurens Alexander Porzenheim. “Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol,” n.d."},"year":"2025","publication_status":"submitted","language":[{"iso":"eng"}],"keyword":["distributed state","hash-based signature","stateful hash-based signature","universal composability","secure enclave"],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"63403","project":[{"_id":"191","name":"PhoQuant: Photonische Quantencomputer -  Quantencomputing Testplattform"}],"status":"public","abstract":[{"lang":"eng","text":"Stateful signatures like the NIST standardized signature schemes LMS and XMSS provide an efficient and mature realization of post-quantum secure signature schemes. They are recommended for long-term use cases like e.g. firmware signing. However, stateful signature schemes require to properly manage a so-called state. In stateful signature schemes like LMS and XMSS, signing keys consist of a set of keys of a one-time signature scheme and it has to be guaranteed that each one-time key is used only once. This is done by updating a state in each signature computation, basically recording which one-time keys have already been used. While this is straightforward in centralized systems, in distributed systems like secure enclaves consisting of e.g. multiple hardware security modules (HSMs) with limited communication keeping a distributed state that at any point in time is consistent among all parties involved presents a challenge. This challenge is not addressed by the current standardization processes. \r\nIn this paper we present a security model for the distributed key management of post-quantum secure stateful signatures like XMSS and LMS. We also present a simple, efficient, and easy to implement protocol proven secure in this security model, i.e. the protocol guarantees at any point in time a consistent state among the parties in a distributed system, like a distributed security enclave. The security model is defined in the universal composabilty (UC) framework by Ran Canetti by providing an ideal functionality for the distributed key management for stateful signatures. Hence our protocol remains secure even if arbitrarily composed with other instances of the same or other protocols, a necessity for the security of distributed key management protocols. Our main application are security enclaves consisting of HSMs, but the model and the protocol can easily be adapted to other scenarios of distributed key management of stateful signature schemes."}],"type":"preprint"},{"file_date_updated":"2021-03-18T17:12:56Z","user_id":"35343","department":[{"_id":"75"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"_id":"21543","status":"public","type":"conference","conference":{"location":"Washington, DC, USA","name":"IEEE International Conference on Distributed Computing Systems (ICDCS)"},"author":[{"last_name":"Schneider","orcid":"0000-0001-8210-4011","full_name":"Schneider, Stefan Balthasar","id":"35343","first_name":"Stefan Balthasar"},{"first_name":"Haydar","full_name":"Qarawlus, Haydar","last_name":"Qarawlus"},{"first_name":"Holger","last_name":"Karl","id":"126","full_name":"Karl, Holger"}],"oa":"1","date_updated":"2022-01-06T06:55:04Z","citation":{"chicago":"Schneider, Stefan Balthasar, Haydar Qarawlus, and Holger Karl. “Distributed Online Service Coordination Using Deep Reinforcement Learning.” In <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>. IEEE, 2021.","ieee":"S. B. Schneider, H. Qarawlus, and H. Karl, “Distributed Online Service Coordination Using Deep Reinforcement Learning,” in <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>, Washington, DC, USA, 2021.","ama":"Schneider SB, Qarawlus H, Karl H. Distributed Online Service Coordination Using Deep Reinforcement Learning. In: <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>. IEEE; 2021.","apa":"Schneider, S. B., Qarawlus, H., &#38; Karl, H. (2021). Distributed Online Service Coordination Using Deep Reinforcement Learning. In <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>. Washington, DC, USA: IEEE.","short":"S.B. Schneider, H. Qarawlus, H. Karl, in: IEEE International Conference on Distributed Computing Systems (ICDCS), IEEE, 2021.","bibtex":"@inproceedings{Schneider_Qarawlus_Karl_2021, title={Distributed Online Service Coordination Using Deep Reinforcement Learning}, booktitle={IEEE International Conference on Distributed Computing Systems (ICDCS)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Qarawlus, Haydar and Karl, Holger}, year={2021} }","mla":"Schneider, Stefan Balthasar, et al. “Distributed Online Service Coordination Using Deep Reinforcement Learning.” <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>, IEEE, 2021."},"related_material":{"link":[{"url":"https://github.com/ RealVNF/distributed-drl-coordination","relation":"software"}]},"has_accepted_license":"1","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["network management","service management","coordination","reinforcement learning","distributed"],"file":[{"file_name":"public_author_version.pdf","file_id":"21544","access_level":"open_access","title":"Distributed Online Service Coordination Using Deep Reinforcement Learning","file_size":606321,"creator":"stschn","date_created":"2021-03-18T17:12:56Z","date_updated":"2021-03-18T17:12:56Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Services often consist of multiple chained components such as microservices in a service mesh, or machine learning functions in a pipeline. Providing these services requires online coordination including scaling the service, placing instance of all components in the network, scheduling traffic to these instances, and routing traffic through the network. Optimized service coordination is still a hard problem due to many influencing factors such as rapidly arriving user demands and limited node and link capacity. Existing approaches to solve the problem are often built on rigid models and assumptions, tailored to specific scenarios. If the scenario changes and the assumptions no longer hold, they easily break and require manual adjustments by experts. Novel self-learning approaches using deep reinforcement learning (DRL) are promising but still have limitations as they only address simplified versions of the problem and are typically centralized and thus do not scale to practical large-scale networks.\r\n\r\nTo address these issues, we propose a distributed self-learning service coordination approach using DRL. After centralized training, we deploy a distributed DRL agent at each node in the network, making fast coordination decisions locally in parallel with the other nodes. Each agent only observes its direct neighbors and does not need global knowledge. Hence, our approach scales independently from the size of the network. In our extensive evaluation using real-world network topologies and traffic traces, we show that our proposed approach outperforms a state-of-the-art conventional heuristic as well as a centralized DRL approach (60% higher throughput on average) while requiring less time per online decision (1 ms)."}],"publication":"IEEE International Conference on Distributed Computing Systems (ICDCS)","title":"Distributed Online Service Coordination Using Deep Reinforcement Learning","date_created":"2021-03-18T17:15:47Z","publisher":"IEEE","year":"2021"},{"publication_identifier":{"issn":["0304-3975"]},"publication_status":"published","year":"2021","intvolume":"       852","page":"41-60","citation":{"ieee":"S. Li, C. Markarian, F. Meyer auf der Heide, and P. Podlipyan, “A continuous strategy for collisionless gathering,” <i>Theoretical Computer Science</i>, vol. 852, pp. 41–60, 2021.","chicago":"Li, Shouwei, Christine Markarian, Friedhelm Meyer auf der Heide, and Pavel Podlipyan. “A Continuous Strategy for Collisionless Gathering.” <i>Theoretical Computer Science</i> 852 (2021): 41–60. <a href=\"https://doi.org/10.1016/j.tcs.2020.10.037\">https://doi.org/10.1016/j.tcs.2020.10.037</a>.","ama":"Li S, Markarian C, Meyer auf der Heide F, Podlipyan P. A continuous strategy for collisionless gathering. <i>Theoretical Computer Science</i>. 2021;852:41-60. doi:<a href=\"https://doi.org/10.1016/j.tcs.2020.10.037\">10.1016/j.tcs.2020.10.037</a>","apa":"Li, S., Markarian, C., Meyer auf der Heide, F., &#38; Podlipyan, P. (2021). A continuous strategy for collisionless gathering. <i>Theoretical Computer Science</i>, <i>852</i>, 41–60. <a href=\"https://doi.org/10.1016/j.tcs.2020.10.037\">https://doi.org/10.1016/j.tcs.2020.10.037</a>","mla":"Li, Shouwei, et al. “A Continuous Strategy for Collisionless Gathering.” <i>Theoretical Computer Science</i>, vol. 852, 2021, pp. 41–60, doi:<a href=\"https://doi.org/10.1016/j.tcs.2020.10.037\">10.1016/j.tcs.2020.10.037</a>.","short":"S. Li, C. Markarian, F. Meyer auf der Heide, P. Podlipyan, Theoretical Computer Science 852 (2021) 41–60.","bibtex":"@article{Li_Markarian_Meyer auf der Heide_Podlipyan_2021, title={A continuous strategy for collisionless gathering}, volume={852}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2020.10.037\">10.1016/j.tcs.2020.10.037</a>}, journal={Theoretical Computer Science}, author={Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm and Podlipyan, Pavel}, year={2021}, pages={41–60} }"},"date_updated":"2022-01-06T06:55:35Z","volume":852,"date_created":"2021-06-28T09:24:15Z","author":[{"first_name":"Shouwei","full_name":"Li, Shouwei","last_name":"Li"},{"full_name":"Markarian, Christine","last_name":"Markarian","first_name":"Christine"},{"last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"},{"first_name":"Pavel","full_name":"Podlipyan, Pavel","last_name":"Podlipyan"}],"title":"A continuous strategy for collisionless gathering","doi":"10.1016/j.tcs.2020.10.037","publication":"Theoretical Computer Science","type":"journal_article","abstract":[{"text":"Over the past decades, the Gathering problem, which asks to gather a group of robots in finite time given some restrictions, has been intensively studied. In this paper, we are given a group of n autonomous, dimensionless, deterministic, and anonymous robots, with bounded viewing range. Assuming a continuous time model, the goal is to gather these robots into one point in finite time. We introduce a simple convergence criterion that defines a new class of algorithms which perform gathering in O(nd) time, where d is the diameter of the initial robot configuration. We show that some gathering algorithms in the literature belong to this class and propose two new algorithms that belong to this class and have quadratic running time, namely, Go-To-The-Relative-Center algorithm (GTRC) and Safe-Go-To-The-Relative-Center algorithm (S-GTRC). We prove that the latter can perform gathering without collision by using a slightly more complex robot model: non oblivious, chiral, and luminous (i.e. robots have observable external memory, as in [8]). We also consider a variant of the Gathering problem, the Near-Gathering problem, in which robots must get close to each other without colliding. We show that S-GTRC solves the Near-Gathering problem in quadratic time and assumes a weaker robot model than the one assumed in the current state-of-the-art.","lang":"eng"}],"status":"public","_id":"22510","department":[{"_id":"63"}],"user_id":"15415","keyword":["Local algorithms","Distributed algorithms","Collisionless gathering","Mobile robots","Multiagent system"],"language":[{"iso":"eng"}]},{"publication_status":"published","publication_identifier":{"issn":["0304-3975"]},"year":"2021","citation":{"ama":"Li S, Meyer auf der Heide F, Podlipyan P. The impact of the Gabriel subgraph of the visibility graph on the gathering of mobile autonomous robots. <i>Theoretical Computer Science</i>. 2021;852:29-40. doi:<a href=\"https://doi.org/10.1016/j.tcs.2020.11.009\">10.1016/j.tcs.2020.11.009</a>","chicago":"Li, Shouwei, Friedhelm Meyer auf der Heide, and Pavel Podlipyan. “The Impact of the Gabriel Subgraph of the Visibility Graph on the Gathering of Mobile Autonomous Robots.” <i>Theoretical Computer Science</i> 852 (2021): 29–40. <a href=\"https://doi.org/10.1016/j.tcs.2020.11.009\">https://doi.org/10.1016/j.tcs.2020.11.009</a>.","ieee":"S. Li, F. Meyer auf der Heide, and P. Podlipyan, “The impact of the Gabriel subgraph of the visibility graph on the gathering of mobile autonomous robots,” <i>Theoretical Computer Science</i>, vol. 852, pp. 29–40, 2021.","mla":"Li, Shouwei, et al. “The Impact of the Gabriel Subgraph of the Visibility Graph on the Gathering of Mobile Autonomous Robots.” <i>Theoretical Computer Science</i>, vol. 852, 2021, pp. 29–40, doi:<a href=\"https://doi.org/10.1016/j.tcs.2020.11.009\">10.1016/j.tcs.2020.11.009</a>.","bibtex":"@article{Li_Meyer auf der Heide_Podlipyan_2021, title={The impact of the Gabriel subgraph of the visibility graph on the gathering of mobile autonomous robots}, volume={852}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2020.11.009\">10.1016/j.tcs.2020.11.009</a>}, journal={Theoretical Computer Science}, author={Li, Shouwei and Meyer auf der Heide, Friedhelm and Podlipyan, Pavel}, year={2021}, pages={29–40} }","short":"S. Li, F. Meyer auf der Heide, P. Podlipyan, Theoretical Computer Science 852 (2021) 29–40.","apa":"Li, S., Meyer auf der Heide, F., &#38; Podlipyan, P. (2021). The impact of the Gabriel subgraph of the visibility graph on the gathering of mobile autonomous robots. <i>Theoretical Computer Science</i>, <i>852</i>, 29–40. <a href=\"https://doi.org/10.1016/j.tcs.2020.11.009\">https://doi.org/10.1016/j.tcs.2020.11.009</a>"},"intvolume":"       852","page":"29-40","date_updated":"2022-01-06T06:55:35Z","date_created":"2021-06-28T09:34:45Z","author":[{"full_name":"Li, Shouwei","last_name":"Li","first_name":"Shouwei"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523"},{"last_name":"Podlipyan","full_name":"Podlipyan, Pavel","first_name":"Pavel"}],"volume":852,"title":"The impact of the Gabriel subgraph of the visibility graph on the gathering of mobile autonomous robots","doi":"10.1016/j.tcs.2020.11.009","type":"journal_article","publication":"Theoretical Computer Science","abstract":[{"text":"In this paper, we reconsider the well-known discrete, round-based Go-To-The-Center algorithm due to Ando, Suzuki, and Yamashita [2] for gathering n autonomous mobile robots with limited viewing range in the plane. Remarquably, this algorithm exploits the fact that during its execution, many collisions of robots occur. Such collisions are interpreted as a success because it is assumed that such collided robots behave the same from now on. This is acceptable under the assumption that each robot is represented by a single point. Otherwise, collisions should be avoided. In this paper, we consider a continuous Go-To-The-Center algorithm in which the robots continuously observe the positions of their neighbors and adapt their speed (assuming a speed limit) and direction. Our first results are time bounds of O(n2) for gathering in two dimensions Euclidean space, and Θ(n) for the one dimension. Our main contribution is the introduction and evaluation of a continuous algorithm which performs Go-To-The-Center considering only the neighbors of a robot with respect to the Gabriel subgraph of the visibility graph, i.e. Go-To-The-Gabriel-Center algorithm. We show that this modification still correctly executes gathering in one and two dimensions, with the same time bounds as above. Simulations exhibit a severe difference of the behavior of the Go-To-The-Center and the Go-To-The-Gabriel-Center algorithms: Whereas lots of collisions occur during a run of the Go-To-The-Center algorithm, typically only one, namely the final collision occurs during a run of the Go-To-The-Gabriel-Center algorithm. We can prove this “collisionless property” of the Go-To-The-Gabriel-Center algorithm for one dimension. In two-dimensional Euclidean space, we conjecture that the “collisionless property” holds for almost every initial configuration. We support our conjecture with measurements obtained from the simulation where robots execute both continuous Go-To-The-Center and Go-To-The-Gabriel-Center algorithms.\r\n","lang":"eng"}],"status":"public","_id":"22511","user_id":"15415","department":[{"_id":"63"}],"keyword":["Local algorithms","Distributed algorithms","Collisionless gathering","Mobile robots","Multiagent system"],"language":[{"iso":"eng"}]},{"has_accepted_license":"1","citation":{"ama":"Schneider SB, Klenner LD, Karl H. Every Node for Itself: Fully Distributed Service Coordination. In: <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE; 2020.","ieee":"S. B. Schneider, L. D. Klenner, and H. Karl, “Every Node for Itself: Fully Distributed Service Coordination,” in <i>IEEE International Conference on Network and Service Management (CNSM)</i>, 2020.","chicago":"Schneider, Stefan Balthasar, Lars Dietrich Klenner, and Holger Karl. “Every Node for Itself: Fully Distributed Service Coordination.” In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE, 2020.","mla":"Schneider, Stefan Balthasar, et al. “Every Node for Itself: Fully Distributed Service Coordination.” <i>IEEE International Conference on Network and Service Management (CNSM)</i>, IEEE, 2020.","short":"S.B. Schneider, L.D. Klenner, H. Karl, in: IEEE International Conference on Network and Service Management (CNSM), IEEE, 2020.","bibtex":"@inproceedings{Schneider_Klenner_Karl_2020, title={Every Node for Itself: Fully Distributed Service Coordination}, booktitle={IEEE International Conference on Network and Service Management (CNSM)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Klenner, Lars Dietrich and Karl, Holger}, year={2020} }","apa":"Schneider, S. B., Klenner, L. D., &#38; Karl, H. (2020). Every Node for Itself: Fully Distributed Service Coordination. In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE."},"oa":"1","date_updated":"2022-01-06T06:54:08Z","author":[{"first_name":"Stefan Balthasar","last_name":"Schneider","orcid":"0000-0001-8210-4011","full_name":"Schneider, Stefan Balthasar","id":"35343"},{"last_name":"Klenner","full_name":"Klenner, Lars Dietrich","first_name":"Lars Dietrich"},{"first_name":"Holger","full_name":"Karl, Holger","id":"126","last_name":"Karl"}],"type":"conference","status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"_id":"19607","user_id":"35343","department":[{"_id":"75"}],"file_date_updated":"2020-09-22T06:36:25Z","year":"2020","publisher":"IEEE","date_created":"2020-09-22T06:23:40Z","title":"Every Node for Itself: Fully Distributed Service Coordination","publication":"IEEE International Conference on Network and Service Management (CNSM)","abstract":[{"text":"Modern services consist of modular, interconnected\r\ncomponents, e.g., microservices forming a service mesh. To\r\ndynamically adjust to ever-changing service demands, service\r\ncomponents have to be instantiated on nodes across the network.\r\nIncoming flows requesting a service then need to be routed\r\nthrough the deployed instances while considering node and link\r\ncapacities. Ultimately, the goal is to maximize the successfully\r\nserved flows and Quality of Service (QoS) through online service\r\ncoordination. Current approaches for service coordination are\r\nusually centralized, assuming up-to-date global knowledge and\r\nmaking global decisions for all nodes in the network. Such global\r\nknowledge and centralized decisions are not realistic in practical\r\nlarge-scale networks.\r\n\r\nTo solve this problem, we propose two algorithms for fully\r\ndistributed service coordination. The proposed algorithms can be\r\nexecuted individually at each node in parallel and require only\r\nvery limited global knowledge. We compare and evaluate both\r\nalgorithms with a state-of-the-art centralized approach in extensive\r\nsimulations on a large-scale, real-world network topology.\r\nOur results indicate that the two algorithms can compete with\r\ncentralized approaches in terms of solution quality but require\r\nless global knowledge and are magnitudes faster (more than\r\n100x).","lang":"eng"}],"file":[{"date_created":"2020-09-22T06:25:57Z","creator":"stschn","date_updated":"2020-09-22T06:36:25Z","access_level":"open_access","file_id":"19608","file_name":"ris_with_copyright.pdf","file_size":500948,"content_type":"application/pdf","relation":"main_file"}],"ddc":["006"],"keyword":["distributed management","service coordination","network coordination","nfv","softwarization","orchestration"],"language":[{"iso":"eng"}]},{"main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8854057/authors#authors"}],"conference":{"name":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)"},"doi":"10.1109/CSCloud/EdgeCom.2019.000-9","author":[{"first_name":"Ralph","last_name":"Koning","full_name":"Koning, Ralph"},{"full_name":"Polevoy, Gleb","id":"83983","last_name":"Polevoy","first_name":"Gleb"},{"last_name":"Meijer","full_name":"Meijer, Lydia","first_name":"Lydia"},{"full_name":"de Laat, Cees","last_name":"de Laat","first_name":"Cees"},{"first_name":"Paola","last_name":"Grosso","full_name":"Grosso, Paola"}],"date_updated":"2022-01-06T06:53:16Z","citation":{"short":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123.","bibtex":"@inproceedings{Koning_Polevoy_Meijer_de Laat_Grosso_2019, series={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, title={Approaches for Collaborative Security Defences in Multi Network Environments}, DOI={<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>}, booktitle={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, author={Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}, year={2019}, pages={113–123}, collection={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)} }","mla":"Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi Network Environments.” <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–23, doi:<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>.","apa":"Koning, R., Polevoy, G., Meijer, L., de Laat, C., &#38; Grosso, P. (2019). Approaches for Collaborative Security Defences in Multi Network Environments. In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i> (pp. 113–123). <a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>","ama":"Koning R, Polevoy G, Meijer L, de Laat C, Grosso P. Approaches for Collaborative Security Defences in Multi Network Environments. In: <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). ; 2019:113-123. doi:<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>","chicago":"Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso. “Approaches for Collaborative Security Defences in Multi Network Environments.” In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 113–23. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019. <a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>.","ieee":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for Collaborative Security Defences in Multi Network Environments,” in <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–123."},"page":"113-123","publication_identifier":{"issn":["null"]},"extern":"1","user_id":"83983","series_title":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","department":[{"_id":"63"},{"_id":"541"}],"_id":"17667","status":"public","type":"conference","title":"Approaches for Collaborative Security Defences in Multi Network Environments","date_created":"2020-08-06T15:23:23Z","year":"2019","quality_controlled":"1","language":[{"iso":"eng"}],"keyword":["computer network security","multinetwork environments","multidomain defensive action","task execution order","timing influence defense efficiency","distributed attacks","collaborative security defence approach","minimize propagation approach","minimize countermeasure approach","counteract everywhere approach","Conferences","Cloud computing","Computer crime","Edge computing","Security","Defense Approaches","Multi-Domain Defense","Collaborative Defense","Defense Algorithms","Computer Networks"],"abstract":[{"text":"Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack.","lang":"eng"}],"publication":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)"},{"status":"public","type":"conference","file_date_updated":"2018-10-31T13:30:40Z","_id":"3422","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"79"},{"_id":"34"},{"_id":"7"}],"user_id":"11108","citation":{"short":"P. Robinson, C. Scheideler, A. Setzer, in: Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), n.d.","mla":"Robinson, Peter, et al. “Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.” <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, doi:<a href=\"https://doi.org/10.1145/3210377.3210399\">10.1145/3210377.3210399</a>.","bibtex":"@inproceedings{Robinson_Scheideler_Setzer, title={Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary}, DOI={<a href=\"https://doi.org/10.1145/3210377.3210399\">10.1145/3210377.3210399</a>}, booktitle={Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}, author={Robinson, Peter and Scheideler, Christian and Setzer, Alexander} }","apa":"Robinson, P., Scheideler, C., &#38; Setzer, A. (n.d.). Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary. In <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. Wien. <a href=\"https://doi.org/10.1145/3210377.3210399\">https://doi.org/10.1145/3210377.3210399</a>","chicago":"Robinson, Peter, Christian Scheideler, and Alexander Setzer. “Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.” In <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, n.d. <a href=\"https://doi.org/10.1145/3210377.3210399\">https://doi.org/10.1145/3210377.3210399</a>.","ieee":"P. Robinson, C. Scheideler, and A. Setzer, “Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary,” in <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, Wien.","ama":"Robinson P, Scheideler C, Setzer A. Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary. In: <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. doi:<a href=\"https://doi.org/10.1145/3210377.3210399\">10.1145/3210377.3210399</a>"},"publication_identifier":{"isbn":["978-1-4503-5799-9/18/07"]},"has_accepted_license":"1","publication_status":"accepted","conference":{"name":"30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","start_date":"2018-07-16","end_date":"2018-07-18","location":"Wien"},"doi":"10.1145/3210377.3210399","date_updated":"2022-01-06T06:59:16Z","author":[{"first_name":"Peter","full_name":"Robinson, Peter","last_name":"Robinson"},{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"},{"last_name":"Setzer","full_name":"Setzer, Alexander","id":"11108","first_name":"Alexander"}],"abstract":[{"text":"We study the consensus problem in a synchronous distributed system of n nodes under an adaptive adversary that has a slightly outdated view of the system and can block all incoming and outgoing communication of a constant fraction of the nodes in each round. Motivated by a result of Ben-Or and Bar-Joseph (1998), showing that any consensus algorithm that is resilient against a linear number of crash faults requires $\\tilde \\Omega(\\sqrt n)$ rounds in an n-node network against an adaptive adversary, we consider a late adaptive adversary, who has full knowledge of the network state at the beginning of the previous round and unlimited computational power, but is oblivious to the current state of the nodes. \r\n\r\nOur main contributions are randomized distributed algorithms that achieve consensus with high probability among all except a small constant fraction of the nodes (i.e., \"almost-everywhere'') against a late adaptive adversary who can block up to ε n$ nodes in each round, for a small constant ε >0$. Our first protocol achieves binary almost-everywhere consensus and also guarantees a decision on the majority input value, thus ensuring plurality consensus. We also present an algorithm that achieves the same time complexity for multi-value consensus. Both of our algorithms succeed in $O(log n)$ rounds with high probability, thus showing an exponential gap to the $\\tilde\\Omega(\\sqrt n)$ lower bound of Ben-Or and Bar-Joseph for strongly adaptive crash-failure adversaries, which can be strengthened to $\\Omega(n)$ when allowing the adversary to block nodes instead of permanently crashing them. Our algorithms are scalable to large systems as each node contacts only an (amortized) constant number of peers in each communication round. We show that our algorithms are optimal up to constant (resp.\\ sub-logarithmic) factors by proving that every almost-everywhere consensus protocol takes $\\Omega(log_d n)$ rounds in the worst case, where d is an upper bound on the number of communication requests initiated per node in each round. We complement our theoretical results with an experimental evaluation of the binary almost-everywhere consensus protocol revealing a short convergence time even against an adversary blocking a large fraction of nodes.","lang":"eng"}],"file":[{"file_size":1675407,"file_id":"5215","file_name":"p173-robinson.pdf","access_level":"closed","date_updated":"2018-10-31T13:30:40Z","creator":"asetzer","date_created":"2018-10-31T13:30:40Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"publication":"Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","keyword":["distributed consensus","randomized algorithm","adaptive adversary","complexity lower bound"],"ddc":["040"],"language":[{"iso":"eng"}],"year":"2018","title":"Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary","date_created":"2018-07-04T08:55:45Z"},{"year":"2018","publisher":"Springer, Cham","date_created":"2018-09-17T13:12:18Z","title":"A Self-Stabilizing Hashed Patricia Trie","publication":"Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)","abstract":[{"lang":"eng","text":"While a lot of research in distributed computing has covered solutions for self-stabilizing computing and topologies, there is far less work on self-stabilization for distributed data structures.\r\nConsidering crashing peers in peer-to-peer networks, it should not be taken for granted that a distributed data structure remains intact.\r\nIn this work, we present a self-stabilizing protocol for a distributed data structure called the hashed Patricia Trie (Kniesburges and Scheideler WALCOM'11) that enables efficient prefix search on a set of keys.\r\nThe data structure has a wide area of applications including string matching problems while offering low overhead and efficient operations when embedded on top of a distributed hash table.\r\nEspecially, longest prefix matching for $x$ can be done in $\\mathcal{O}(\\log |x|)$ hash table read accesses.\r\nWe show how to maintain the structure in a self-stabilizing way.\r\nOur protocol assures low overhead in a legal state and a total (asymptotically optimal) memory demand of $\\Theta(d)$ bits, where $d$ is the number of bits needed for storing all keys."}],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":500005,"access_level":"closed","file_name":"ASelf-stabilizingHashedPatrici.pdf","file_id":"5277","date_updated":"2018-11-02T14:38:37Z","date_created":"2018-11-02T14:38:37Z","creator":"ups"}],"external_id":{"arxiv":["1809.04923"]},"keyword":["Self-Stabilizing","Prefix Search","Distributed Data Structure"],"ddc":["000"],"language":[{"iso":"eng"}],"has_accepted_license":"1","intvolume":"     11201","citation":{"chicago":"Knollmann, Till, and Christian Scheideler. “A Self-Stabilizing Hashed Patricia Trie.” In <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, edited by Taisuke Izumi and Petr Kuznetsov, Vol. 11201. Lecture Notes of Computer Science. Springer, Cham, 2018. <a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">https://doi.org/10.1007/978-3-030-03232-6_1</a>.","ieee":"T. Knollmann and C. Scheideler, “A Self-Stabilizing Hashed Patricia Trie,” in <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, Tokyo, 2018, vol. 11201.","ama":"Knollmann T, Scheideler C. A Self-Stabilizing Hashed Patricia Trie. In: Izumi T, Kuznetsov P, eds. <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>. Vol 11201. Lecture Notes of Computer Science. Springer, Cham; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">10.1007/978-3-030-03232-6_1</a>","bibtex":"@inproceedings{Knollmann_Scheideler_2018, series={Lecture Notes of Computer Science}, title={A Self-Stabilizing Hashed Patricia Trie}, volume={11201}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">10.1007/978-3-030-03232-6_1</a>}, booktitle={Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}, publisher={Springer, Cham}, author={Knollmann, Till and Scheideler, Christian}, editor={Izumi, Taisuke and Kuznetsov, PetrEditors}, year={2018}, collection={Lecture Notes of Computer Science} }","mla":"Knollmann, Till, and Christian Scheideler. “A Self-Stabilizing Hashed Patricia Trie.” <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, edited by Taisuke Izumi and Petr Kuznetsov, vol. 11201, Springer, Cham, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">10.1007/978-3-030-03232-6_1</a>.","short":"T. Knollmann, C. Scheideler, in: T. Izumi, P. Kuznetsov (Eds.), Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Springer, Cham, 2018.","apa":"Knollmann, T., &#38; Scheideler, C. (2018). A Self-Stabilizing Hashed Patricia Trie. In T. Izumi &#38; P. Kuznetsov (Eds.), <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i> (Vol. 11201). Tokyo: Springer, Cham. <a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">https://doi.org/10.1007/978-3-030-03232-6_1</a>"},"date_updated":"2022-01-06T07:01:02Z","volume":11201,"author":[{"first_name":"Till","last_name":"Knollmann","orcid":"0000-0003-2014-4696","id":"39241","full_name":"Knollmann, Till"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"}],"conference":{"start_date":"2018-11-04","name":"20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)","location":"Tokyo","end_date":"2018-11-07"},"doi":"10.1007/978-3-030-03232-6_1","type":"conference","editor":[{"full_name":"Izumi, Taisuke","last_name":"Izumi","first_name":"Taisuke"},{"full_name":"Kuznetsov, Petr","last_name":"Kuznetsov","first_name":"Petr"}],"status":"public","_id":"4411","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"department":[{"_id":"63"},{"_id":"79"}],"series_title":"Lecture Notes of Computer Science","user_id":"39241","file_date_updated":"2018-11-02T14:38:37Z"},{"language":[{"iso":"eng"}],"file_date_updated":"2018-11-27T10:03:33Z","keyword":["Distributed Storage","Multi-Dimensional Range Queries","Peer-to-Peer","Hilbert Curve"],"ddc":["000"],"department":[{"_id":"63"},{"_id":"79"}],"user_id":"14955","_id":"4375","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"status":"public","file":[{"creator":"tillk","date_created":"2018-11-27T10:03:33Z","date_updated":"2018-11-27T10:03:33Z","file_name":"A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension.pdf","file_id":"5863","access_level":"closed","file_size":1122875,"content_type":"application/pdf","relation":"main_file","success":1}],"abstract":[{"text":"We present a peer-to-peer network that supports the efficient processing of orthogonal range queries $R=\\bigtimes_{i=1}^{d}[a_i,\\,b_i]$ in a $d$-dimensional point space.\\\\\r\nThe  network is the same for each dimension, namely a distance halving network like the one introduced by Naor and Wieder (ACM TALG'07).\r\nWe show how to execute such range queries using $\\mathcal{O}\\left(2^{d'}d\\,\\log m + d\\,|R|\\right)$ hops (and the same number of messages) in total. Here $[m]^d$ is the ground set, $|R|$ is the size and $d'$ the dimension of the queried range.\r\nFurthermore, if the peers form a distributed network, the query can be answered in $\\mathcal{O}\\left(d\\,\\log m + d\\,\\sum_{i=1}^{d}(b_i-a_i+1)\\right)$ communication rounds.\r\nOur algorithms are based on a mapping of the Hilbert Curve through $[m]^d$ to the peers.","lang":"eng"}],"publication":"Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)","type":"conference","doi":"10.1007/978-3-030-19759-9_4","conference":{"start_date":"2018-08-20","name":"4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)","location":"Helsinki","end_date":"2018-08-21"},"title":"A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension","author":[{"full_name":"Benter, Markus","last_name":"Benter","first_name":"Markus"},{"first_name":"Till","orcid":"0000-0003-2014-4696","last_name":"Knollmann","id":"39241","full_name":"Knollmann, Till"},{"first_name":"Friedhelm","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523"},{"first_name":"Alexander","id":"11108","full_name":"Setzer, Alexander","last_name":"Setzer"},{"first_name":"Jannik","full_name":"Sundermeier, Jannik","id":"38705","last_name":"Sundermeier"}],"date_created":"2018-09-11T05:26:59Z","date_updated":"2022-01-06T07:01:00Z","citation":{"bibtex":"@inproceedings{Benter_Knollmann_Meyer auf der Heide_Setzer_Sundermeier_2018, title={A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-19759-9_4\">10.1007/978-3-030-19759-9_4</a>}, booktitle={Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)}, author={Benter, Markus and Knollmann, Till and Meyer auf der Heide, Friedhelm and Setzer, Alexander and Sundermeier, Jannik}, year={2018} }","mla":"Benter, Markus, et al. “A Peer-to-Peer Based Cloud Storage Supporting Orthogonal Range Queries of Arbitrary Dimension.” <i>Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-030-19759-9_4\">10.1007/978-3-030-19759-9_4</a>.","short":"M. Benter, T. Knollmann, F. Meyer auf der Heide, A. Setzer, J. Sundermeier, in: Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD), 2018.","apa":"Benter, M., Knollmann, T., Meyer auf der Heide, F., Setzer, A., &#38; Sundermeier, J. (2018). A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension. In <i>Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>. Helsinki. <a href=\"https://doi.org/10.1007/978-3-030-19759-9_4\">https://doi.org/10.1007/978-3-030-19759-9_4</a>","ama":"Benter M, Knollmann T, Meyer auf der Heide F, Setzer A, Sundermeier J. A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension. In: <i>Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>. ; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-030-19759-9_4\">10.1007/978-3-030-19759-9_4</a>","ieee":"M. Benter, T. Knollmann, F. Meyer auf der Heide, A. Setzer, and J. Sundermeier, “A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension,” in <i>Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>, Helsinki, 2018.","chicago":"Benter, Markus, Till Knollmann, Friedhelm Meyer auf der Heide, Alexander Setzer, and Jannik Sundermeier. “A Peer-to-Peer Based Cloud Storage Supporting Orthogonal Range Queries of Arbitrary Dimension.” In <i>Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>, 2018. <a href=\"https://doi.org/10.1007/978-3-030-19759-9_4\">https://doi.org/10.1007/978-3-030-19759-9_4</a>."},"year":"2018","has_accepted_license":"1"},{"publication":"12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)","type":"conference","status":"public","department":[{"_id":"78"}],"user_id":"3118","_id":"10780","language":[{"iso":"eng"}],"keyword":["embedded systems","image sensors","power aware computing","wireless sensor networks","Zynq-based VSN node prototype","computational self-awareness","design approach","platform levels","power consumption","visual sensor networks","visual sensor nodes","Cameras","Hardware","Middleware","Multicore processing","Operating systems","Runtime","Reconfigurable platforms","distributed embedded systems","performance-resource trade-off","self-awareness","visual sensor nodes"],"page":"1-8","citation":{"short":"Z. Guettatfi, P. Hübner, M. Platzner, B. Rinner, in: 12th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC), 2017, pp. 1–8.","bibtex":"@inproceedings{Guettatfi_Hübner_Platzner_Rinner_2017, title={Computational self-awareness as design approach for visual sensor nodes}, DOI={<a href=\"https://doi.org/10.1109/ReCoSoC.2017.8016147\">10.1109/ReCoSoC.2017.8016147</a>}, booktitle={12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)}, author={Guettatfi, Zakarya and Hübner, Philipp and Platzner, Marco and Rinner, Bernhard}, year={2017}, pages={1–8} }","mla":"Guettatfi, Zakarya, et al. “Computational Self-Awareness as Design Approach for Visual Sensor Nodes.” <i>12th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)</i>, 2017, pp. 1–8, doi:<a href=\"https://doi.org/10.1109/ReCoSoC.2017.8016147\">10.1109/ReCoSoC.2017.8016147</a>.","apa":"Guettatfi, Z., Hübner, P., Platzner, M., &#38; Rinner, B. (2017). Computational self-awareness as design approach for visual sensor nodes. In <i>12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)</i> (pp. 1–8). <a href=\"https://doi.org/10.1109/ReCoSoC.2017.8016147\">https://doi.org/10.1109/ReCoSoC.2017.8016147</a>","ieee":"Z. Guettatfi, P. Hübner, M. Platzner, and B. Rinner, “Computational self-awareness as design approach for visual sensor nodes,” in <i>12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)</i>, 2017, pp. 1–8.","chicago":"Guettatfi, Zakarya, Philipp Hübner, Marco Platzner, and Bernhard Rinner. “Computational Self-Awareness as Design Approach for Visual Sensor Nodes.” In <i>12th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)</i>, 1–8, 2017. <a href=\"https://doi.org/10.1109/ReCoSoC.2017.8016147\">https://doi.org/10.1109/ReCoSoC.2017.8016147</a>.","ama":"Guettatfi Z, Hübner P, Platzner M, Rinner B. Computational self-awareness as design approach for visual sensor nodes. In: <i>12th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)</i>. ; 2017:1-8. doi:<a href=\"https://doi.org/10.1109/ReCoSoC.2017.8016147\">10.1109/ReCoSoC.2017.8016147</a>"},"year":"2017","date_created":"2019-07-10T12:13:15Z","author":[{"first_name":"Zakarya","last_name":"Guettatfi","full_name":"Guettatfi, Zakarya"},{"first_name":"Philipp","last_name":"Hübner","full_name":"Hübner, Philipp"},{"last_name":"Platzner","full_name":"Platzner, Marco","id":"398","first_name":"Marco"},{"first_name":"Bernhard","last_name":"Rinner","full_name":"Rinner, Bernhard"}],"date_updated":"2022-01-06T06:50:50Z","doi":"10.1109/ReCoSoC.2017.8016147","title":"Computational self-awareness as design approach for visual sensor nodes"},{"publication":"Proc. 41st Conference on Local Computer Networks (LCN)","type":"conference","abstract":[{"text":"Version Control Systems (VCS) are a valuable tool for software development\r\nand document management. Both client/server and distributed (Peer-to-Peer)\r\nmodels exist, with the latter (e.g., Git and Mercurial) becoming\r\nincreasingly popular. Their distributed nature introduces complications,\r\nespecially concerning security: it is hard to control the dissemination of\r\ncontents stored in distributed VCS as they rely on replication of complete\r\nrepositories to any involved user.\r\n\r\nWe overcome this issue by designing and implementing a concept for\r\ncryptography-enforced access control which is transparent to the user. Use\r\nof field-tested schemes (end-to-end encryption, digital signatures) allows\r\nfor strong security, while adoption of convergent encryption and\r\ncontent-defined chunking retains storage efficiency. The concept is\r\nseamlessly integrated into Mercurial---respecting its distributed storage\r\nconcept---to ensure practical usability and compatibility to existing\r\ndeployments.","lang":"eng"}],"status":"public","_id":"19","department":[{"_id":"27"},{"_id":"518"}],"user_id":"24135","keyword":["access control","distributed version control systems","mercurial","peer-to-peer","convergent encryption","confidentiality","authenticity"],"language":[{"iso":"eng"}],"publication_identifier":{"isbn":["978-1-5090-2054-6"]},"publication_status":"published","year":"2016","citation":{"ama":"Lass M, Leibenger D, Sorge C. Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In: <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>","chicago":"Lass, Michael, Dominik Leibenger, and Christoph Sorge. “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.” In <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/lcn.2016.11\">https://doi.org/10.1109/lcn.2016.11</a>.","ieee":"M. Lass, D. Leibenger, and C. Sorge, “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension,” in <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>, 2016.","mla":"Lass, Michael, et al. “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.” <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>.","bibtex":"@inproceedings{Lass_Leibenger_Sorge_2016, title={Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension}, DOI={<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>}, booktitle={Proc. 41st Conference on Local Computer Networks (LCN)}, publisher={IEEE}, author={Lass, Michael and Leibenger, Dominik and Sorge, Christoph}, year={2016} }","short":"M. Lass, D. Leibenger, C. Sorge, in: Proc. 41st Conference on Local Computer Networks (LCN), IEEE, 2016.","apa":"Lass, M., Leibenger, D., &#38; Sorge, C. (2016). Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE. <a href=\"https://doi.org/10.1109/lcn.2016.11\">https://doi.org/10.1109/lcn.2016.11</a>"},"publisher":"IEEE","date_updated":"2022-01-06T06:53:56Z","date_created":"2017-07-25T14:36:16Z","author":[{"orcid":"0000-0002-5708-7632","last_name":"Lass","id":"24135","full_name":"Lass, Michael","first_name":"Michael"},{"first_name":"Dominik","last_name":"Leibenger","full_name":"Leibenger, Dominik"},{"first_name":"Christoph","last_name":"Sorge","full_name":"Sorge, Christoph"}],"title":"Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension","doi":"10.1109/lcn.2016.11"},{"oa":"1","date_updated":"2022-01-06T07:02:06Z","date_created":"2018-11-14T11:49:50Z","author":[{"full_name":"Volkamer, Melanie","last_name":"Volkamer","first_name":"Melanie"},{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"}],"title":"Measuring eTrust in distributed systems - General Concept and Application to Internet Voting","has_accepted_license":"1","year":"2010","citation":{"apa":"Volkamer, M., &#38; Schryen, G. (2010). Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In <i>Proceedings of the 23rd Bled eConference</i>.","mla":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” <i>Proceedings of the 23rd Bled EConference</i>, 2010.","short":"M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.","bibtex":"@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed systems - General Concept and Application to Internet Voting}, booktitle={Proceedings of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido}, year={2010} }","ama":"Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept and Application to Internet Voting. In: <i>Proceedings of the 23rd Bled EConference</i>. ; 2010.","chicago":"Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems - General Concept and Application to Internet Voting.” In <i>Proceedings of the 23rd Bled EConference</i>, 2010.","ieee":"M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General Concept and Application to Internet Voting,” in <i>Proceedings of the 23rd Bled eConference</i>, 2010."},"_id":"5598","user_id":"61579","department":[{"_id":"277"}],"ddc":["000"],"keyword":["distributed trust concepts","measuring etrust","Internet voting"],"file_date_updated":"2018-12-13T15:16:50Z","language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"Proceedings of the 23rd Bled eConference","abstract":[{"lang":"eng","text":"Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia."}],"file":[{"relation":"main_file","content_type":"application/pdf","file_name":"06_Schryen.pdf","file_id":"6185","access_level":"open_access","file_size":243413,"date_created":"2018-12-11T15:14:05Z","creator":"hsiemes","date_updated":"2018-12-13T15:16:50Z"}],"status":"public"},{"title":"A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf","open_access":"1"}],"doi":"10.1109/TASL.2008.925879","oa":"1","date_updated":"2022-01-06T06:51:10Z","author":[{"full_name":"Ion, Valentin","last_name":"Ion","first_name":"Valentin"},{"last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242","first_name":"Reinhold"}],"date_created":"2019-07-12T05:28:53Z","volume":16,"year":"2008","citation":{"short":"V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language Processing 16 (2008) 1047–1060.","mla":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, 2008, pp. 1047–60, doi:<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>.","bibtex":"@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition}, volume={16}, DOI={<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>}, number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060} }","apa":"Ion, V., &#38; Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, <i>16</i>(5), 1047–1060. <a href=\"https://doi.org/10.1109/TASL.2008.925879\">https://doi.org/10.1109/TASL.2008.925879</a>","ama":"Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech, and Language Processing</i>. 2008;16(5):1047-1060. doi:<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>","ieee":"V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition,” <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, pp. 1047–1060, 2008.","chicago":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions on Audio, Speech, and Language Processing</i> 16, no. 5 (2008): 1047–60. <a href=\"https://doi.org/10.1109/TASL.2008.925879\">https://doi.org/10.1109/TASL.2008.925879</a>."},"page":"1047-1060","intvolume":"        16","issue":"5","keyword":["automatic speech recognition","bit errors","codecs","communication links","corrupted observations","decoding","distributed speech recognition","error-prone communication network","feature vector sequence","hidden Markov model-based ASR","hidden Markov models","inter-frame correlation","Internet telephony","network speech recognition","packet loss","speech posterior","speech recognition","transmission error robust speech recognition","uncertainty decoding","voice-over-IP codecs"],"language":[{"iso":"eng"}],"_id":"11820","user_id":"44006","department":[{"_id":"54"}],"abstract":[{"lang":"eng","text":"In this paper, we derive an uncertainty decoding rule for automatic speech recognition (ASR), which accounts for both corrupted observations and inter-frame correlation. The conditional independence assumption, prevalent in hidden Markov model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned on the complete observed feature vector sequence. This is a more informative posterior than one conditioned only on the current observation. The novel decoding is used to obtain a transmission-error robust remote ASR system, where the speech capturing unit is connected to the decoder via an error-prone communication network. We show how the clean speech posterior can be computed for communication links being characterized by either bit errors or packet loss. Recognition results are presented for both distributed and network speech recognition, where in the latter case common voice-over-IP codecs are employed."}],"status":"public","type":"journal_article","publication":"IEEE Transactions on Audio, Speech, and Language Processing"},{"title":"Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework","doi":"10.1145/1278972.1278996","publisher":"ACM","date_updated":"2023-09-26T14:00:38Z","author":[{"first_name":"Matthias","last_name":"Woehrle","full_name":"Woehrle, Matthias"},{"first_name":"Christian","id":"16153","full_name":"Plessl, Christian","last_name":"Plessl","orcid":"0000-0001-5728-9982"},{"first_name":"Jan","last_name":"Beutel","full_name":"Beutel, Jan"},{"first_name":"Lothar","last_name":"Thiele","full_name":"Thiele, Lothar"}],"date_created":"2018-04-17T13:34:42Z","place":"New York, NY, USA","year":"2007","citation":{"ama":"Woehrle M, Plessl C, Beutel J, Thiele L. Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework. In: <i>Proc. Workshop on Embedded Networked Sensors (EmNets)</i>. ACM; 2007:93-97. doi:<a href=\"https://doi.org/10.1145/1278972.1278996\">10.1145/1278972.1278996</a>","chicago":"Woehrle, Matthias, Christian Plessl, Jan Beutel, and Lothar Thiele. “Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework.” In <i>Proc. Workshop on Embedded Networked Sensors (EmNets)</i>, 93–97. New York, NY, USA: ACM, 2007. <a href=\"https://doi.org/10.1145/1278972.1278996\">https://doi.org/10.1145/1278972.1278996</a>.","ieee":"M. Woehrle, C. Plessl, J. Beutel, and L. Thiele, “Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework,” in <i>Proc. Workshop on Embedded Networked Sensors (EmNets)</i>, 2007, pp. 93–97, doi: <a href=\"https://doi.org/10.1145/1278972.1278996\">10.1145/1278972.1278996</a>.","mla":"Woehrle, Matthias, et al. “Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework.” <i>Proc. Workshop on Embedded Networked Sensors (EmNets)</i>, ACM, 2007, pp. 93–97, doi:<a href=\"https://doi.org/10.1145/1278972.1278996\">10.1145/1278972.1278996</a>.","bibtex":"@inproceedings{Woehrle_Plessl_Beutel_Thiele_2007, place={New York, NY, USA}, title={Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework}, DOI={<a href=\"https://doi.org/10.1145/1278972.1278996\">10.1145/1278972.1278996</a>}, booktitle={Proc. Workshop on Embedded Networked Sensors (EmNets)}, publisher={ACM}, author={Woehrle, Matthias and Plessl, Christian and Beutel, Jan and Thiele, Lothar}, year={2007}, pages={93–97} }","short":"M. Woehrle, C. Plessl, J. Beutel, L. Thiele, in: Proc. Workshop on Embedded Networked Sensors (EmNets), ACM, New York, NY, USA, 2007, pp. 93–97.","apa":"Woehrle, M., Plessl, C., Beutel, J., &#38; Thiele, L. (2007). Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing Framework. <i>Proc. Workshop on Embedded Networked Sensors (EmNets)</i>, 93–97. <a href=\"https://doi.org/10.1145/1278972.1278996\">https://doi.org/10.1145/1278972.1278996</a>"},"page":"93-97","quality_controlled":"1","publication_identifier":{"isbn":["978-1-59593-694-3"]},"keyword":["WSN","testing","distributed","embedded"],"language":[{"iso":"eng"}],"_id":"2392","user_id":"15278","department":[{"_id":"27"},{"_id":"518"}],"status":"public","type":"conference","publication":"Proc. Workshop on Embedded Networked Sensors (EmNets)"},{"date_updated":"2022-01-06T06:51:10Z","oa":"1","volume":1,"date_created":"2019-07-12T05:28:58Z","author":[{"first_name":"Valentin","last_name":"Ion","full_name":"Ion, Valentin"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","id":"242","full_name":"Haeb-Umbach, Reinhold"}],"title":"An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features","doi":"10.1109/ICASSP.2006.1659984","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2006/IoHa06-2.pdf"}],"year":"2006","page":"I","intvolume":"         1","citation":{"ama":"Ion V, Haeb-Umbach R. An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features. In: <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>. Vol 1. ; 2006:I. doi:<a href=\"https://doi.org/10.1109/ICASSP.2006.1659984\">10.1109/ICASSP.2006.1659984</a>","chicago":"Ion, Valentin, and Reinhold Haeb-Umbach. “An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features.” In <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>, 1:I, 2006. <a href=\"https://doi.org/10.1109/ICASSP.2006.1659984\">https://doi.org/10.1109/ICASSP.2006.1659984</a>.","ieee":"V. Ion and R. Haeb-Umbach, “An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features,” in <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>, 2006, vol. 1, p. I.","apa":"Ion, V., &#38; Haeb-Umbach, R. (2006). An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features. In <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i> (Vol. 1, p. I). <a href=\"https://doi.org/10.1109/ICASSP.2006.1659984\">https://doi.org/10.1109/ICASSP.2006.1659984</a>","bibtex":"@inproceedings{Ion_Haeb-Umbach_2006, title={An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features}, volume={1}, DOI={<a href=\"https://doi.org/10.1109/ICASSP.2006.1659984\">10.1109/ICASSP.2006.1659984</a>}, booktitle={IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2006}, pages={I} }","mla":"Ion, Valentin, and Reinhold Haeb-Umbach. “An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition Based on Soft-Features.” <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>, vol. 1, 2006, p. I, doi:<a href=\"https://doi.org/10.1109/ICASSP.2006.1659984\">10.1109/ICASSP.2006.1659984</a>.","short":"V. Ion, R. Haeb-Umbach, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006), 2006, p. I."},"_id":"11824","department":[{"_id":"54"}],"user_id":"44006","keyword":["distributed speech recognition","least mean squares methods","MAP estimate","maximum likelihood estimation","MMSE estimate","packet loss compensation scheme","packet switched communication","posteriori probability density function","robust error mitigation method","soft-features","speech recognition","table lookup","voice communication","wireless channels"],"language":[{"iso":"eng"}],"publication":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)","type":"conference","abstract":[{"text":"Soft-feature based speech recognition, which is an example of uncertainty decoding, has been proven to be a robust error mitigation method for distributed speech recognition over wireless channels exhibiting bit errors. In this paper we extend this concept to packet-oriented transmissions. The a posteriori probability density function of the lost feature vector, given the closest received neighbours, is computed. In the experiments, the nearest frame repetition, which is shown to be equivalent to the MAP estimate, outperforms the MMSE estimate for long bursts. Taking the variance into account at the speech recognition stage results in superior performance compared to classical schemes using point estimates. A computationally and memory efficient implementation of the proposed packet loss compensation scheme based on table lookup is presented","lang":"eng"}],"status":"public"},{"title":"Uncertainty decoding for distributed speech recognition over error-prone networks","date_created":"2019-07-12T05:28:59Z","year":"2006","issue":"11","keyword":["Channel error robustness","Distributed speech recognition","Soft features","Uncertainty decoding"],"language":[{"iso":"eng"}],"abstract":[{"text":"In this paper, we propose an enhanced error concealment strategy at the server side of a distributed speech recognition (DSR) system, which is fully compatible with the existing DSR standard. It is based on a Bayesian approach, where the a posteriori probability density of the error-free feature vector is computed, given all received feature vectors which are possibly corrupted by transmission errors. Rather than computing a point estimate, such as the MMSE estimate, and plugging it into the Bayesian decision rule, we employ uncertainty decoding, which results in an integration over the uncertainty in the feature domain. In a typical scenario the communication between the thin client, often a mobile device, and the recognition server spreads across heterogeneous networks. Both bit errors on circuit-switched links and lost data packets on IP connections are mitigated by our approach in a unified manner. The experiments reveal improved robustness both for small- and large-vocabulary recognition tasks.","lang":"eng"}],"publication":"Speech Communication","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2006/IoHa06-3.pdf"}],"doi":"10.1016/j.specom.2006.03.007","oa":"1","date_updated":"2022-01-06T06:51:10Z","author":[{"first_name":"Valentin","full_name":"Ion, Valentin","last_name":"Ion"},{"last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242","first_name":"Reinhold"}],"volume":48,"citation":{"ama":"Ion V, Haeb-Umbach R. Uncertainty decoding for distributed speech recognition over error-prone networks. <i>Speech Communication</i>. 2006;48(11):1435-1446. doi:<a href=\"https://doi.org/10.1016/j.specom.2006.03.007\">10.1016/j.specom.2006.03.007</a>","chicago":"Ion, Valentin, and Reinhold Haeb-Umbach. “Uncertainty Decoding for Distributed Speech Recognition over Error-Prone Networks.” <i>Speech Communication</i> 48, no. 11 (2006): 1435–46. <a href=\"https://doi.org/10.1016/j.specom.2006.03.007\">https://doi.org/10.1016/j.specom.2006.03.007</a>.","ieee":"V. Ion and R. Haeb-Umbach, “Uncertainty decoding for distributed speech recognition over error-prone networks,” <i>Speech Communication</i>, vol. 48, no. 11, pp. 1435–1446, 2006.","apa":"Ion, V., &#38; Haeb-Umbach, R. (2006). Uncertainty decoding for distributed speech recognition over error-prone networks. <i>Speech Communication</i>, <i>48</i>(11), 1435–1446. <a href=\"https://doi.org/10.1016/j.specom.2006.03.007\">https://doi.org/10.1016/j.specom.2006.03.007</a>","short":"V. Ion, R. Haeb-Umbach, Speech Communication 48 (2006) 1435–1446.","bibtex":"@article{Ion_Haeb-Umbach_2006, title={Uncertainty decoding for distributed speech recognition over error-prone networks}, volume={48}, DOI={<a href=\"https://doi.org/10.1016/j.specom.2006.03.007\">10.1016/j.specom.2006.03.007</a>}, number={11}, journal={Speech Communication}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2006}, pages={1435–1446} }","mla":"Ion, Valentin, and Reinhold Haeb-Umbach. “Uncertainty Decoding for Distributed Speech Recognition over Error-Prone Networks.” <i>Speech Communication</i>, vol. 48, no. 11, 2006, pp. 1435–46, doi:<a href=\"https://doi.org/10.1016/j.specom.2006.03.007\">10.1016/j.specom.2006.03.007</a>."},"intvolume":"        48","page":"1435-1446","_id":"11825","user_id":"44006","department":[{"_id":"54"}],"status":"public","type":"journal_article"},{"status":"public","abstract":[{"text":"In this paper we present a comparison of the recently proposed Soft-Feature Distributed Speech Recognition (SFDSR) with the two evaluated candidate codecs for Speech Enabled Services over wireless networks: Adaptive Multirate Codec (AMR) and the ETSI Extended Advanced Front-End for Distributed Speech Recognition (XAFE). It is shown that SFDSR achieves the best recognition performance on a simulated GSM transmission, followed by XAFE and AMR.We also present some new results concerning SFDSR which demonstrate the versatility of the approach. Further, a simple method is introduced which considerably reduces the computational effort.","lang":"eng"}],"type":"conference","publication":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)","language":[{"iso":"eng"}],"keyword":["adaptive codes","adaptive multirate codec","AMR","distributed speech recognition","ETSI","extended advanced front-end","recognition performance","SFDSR","simulated GSM transmission","soft-feature distributed speech recognition","speech codecs","speech coding","speech recognition","variable rate codes","XAFE"],"user_id":"44006","department":[{"_id":"54"}],"_id":"11828","citation":{"apa":"Ion, V., &#38; Haeb-Umbach, R. (2005). A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services. In <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i> (Vol. 1, pp. 333–336). <a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">https://doi.org/10.1109/ICASSP.2005.1415118</a>","bibtex":"@inproceedings{Ion_Haeb-Umbach_2005, title={A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services}, volume={1}, DOI={<a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">10.1109/ICASSP.2005.1415118</a>}, booktitle={IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2005}, pages={333–336} }","mla":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services.” <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>, vol. 1, 2005, pp. 333–36, doi:<a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">10.1109/ICASSP.2005.1415118</a>.","short":"V. Ion, R. Haeb-Umbach, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005), 2005, pp. 333–336.","ieee":"V. Ion and R. Haeb-Umbach, “A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services,” in <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>, 2005, vol. 1, pp. 333–336.","chicago":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services.” In <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>, 1:333–36, 2005. <a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">https://doi.org/10.1109/ICASSP.2005.1415118</a>.","ama":"Ion V, Haeb-Umbach R. A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services. In: <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>. Vol 1. ; 2005:333-336. doi:<a href=\"https://doi.org/10.1109/ICASSP.2005.1415118\">10.1109/ICASSP.2005.1415118</a>"},"intvolume":"         1","page":"333-336","year":"2005","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2005/IoHa05-2.pdf"}],"doi":"10.1109/ICASSP.2005.1415118","title":"A Comparison of Soft-Feature Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services","author":[{"last_name":"Ion","full_name":"Ion, Valentin","first_name":"Valentin"},{"last_name":"Haeb-Umbach","id":"242","full_name":"Haeb-Umbach, Reinhold","first_name":"Reinhold"}],"date_created":"2019-07-12T05:29:02Z","volume":1,"oa":"1","date_updated":"2022-01-06T06:51:10Z"},{"publication_identifier":{"isbn":["0-7695-0981-9"]},"citation":{"ieee":"W. Müller, A. Meyer, and H. Zabel, “A Language for the Rapid Prototyping of Mobile Evolving Agents,” 2001, doi: <a href=\"https://doi.org/10.1109/HICSS.2001.926319\">10.1109/HICSS.2001.926319</a>.","chicago":"Müller, Wolfgang, A. Meyer, and Henning Zabel. “A Language for the Rapid Prototyping of Mobile Evolving Agents.” In <i>Proceedings of the 34th Annual Hawaii International Conference on System Sciences</i>. Maui, HI, USA , 2001. <a href=\"https://doi.org/10.1109/HICSS.2001.926319\">https://doi.org/10.1109/HICSS.2001.926319</a>.","ama":"Müller W, Meyer A, Zabel H. A Language for the Rapid Prototyping of Mobile Evolving Agents. In: <i>Proceedings of the 34th Annual Hawaii International Conference on System Sciences</i>. ; 2001. doi:<a href=\"https://doi.org/10.1109/HICSS.2001.926319\">10.1109/HICSS.2001.926319</a>","mla":"Müller, Wolfgang, et al. “A Language for the Rapid Prototyping of Mobile Evolving Agents.” <i>Proceedings of the 34th Annual Hawaii International Conference on System Sciences</i>, 2001, doi:<a href=\"https://doi.org/10.1109/HICSS.2001.926319\">10.1109/HICSS.2001.926319</a>.","bibtex":"@inproceedings{Müller_Meyer_Zabel_2001, place={Maui, HI, USA }, title={A Language for the Rapid Prototyping of Mobile Evolving Agents}, DOI={<a href=\"https://doi.org/10.1109/HICSS.2001.926319\">10.1109/HICSS.2001.926319</a>}, booktitle={Proceedings of the 34th Annual Hawaii International Conference on System Sciences}, author={Müller, Wolfgang and Meyer, A. and Zabel, Henning}, year={2001} }","short":"W. Müller, A. Meyer, H. Zabel, in: Proceedings of the 34th Annual Hawaii International Conference on System Sciences, Maui, HI, USA , 2001.","apa":"Müller, W., Meyer, A., &#38; Zabel, H. (2001). A Language for the Rapid Prototyping of Mobile Evolving Agents. <i>Proceedings of the 34th Annual Hawaii International Conference on System Sciences</i>. <a href=\"https://doi.org/10.1109/HICSS.2001.926319\">https://doi.org/10.1109/HICSS.2001.926319</a>"},"year":"2001","place":"Maui, HI, USA ","author":[{"last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243","first_name":"Wolfgang"},{"last_name":"Meyer","full_name":"Meyer, A.","first_name":"A."},{"last_name":"Zabel","full_name":"Zabel, Henning","first_name":"Henning"}],"date_created":"2023-01-24T10:48:09Z","date_updated":"2023-01-24T10:48:14Z","doi":"10.1109/HICSS.2001.926319","title":"A Language for the Rapid Prototyping of Mobile Evolving Agents","type":"conference","publication":"Proceedings of the 34th Annual Hawaii International Conference on System Sciences","status":"public","abstract":[{"text":"This article presents SAL, a general purpose scripting language for the rapid development of distributed software agents seamlessly embedded in a visual environment. Integrated facilities for dynamic visualization provide sample but powerful means for debugging and domain-oriented animation. SAL agents are arranged on a set of 2D worksheets which can be distributed over different machines. An agent's program is defined by the means of a table specifying a set of state transition rules with a condition and a sequence of actions each. Beyond basic computation and communication, actions can dynamically modify the agent's depiction, its program, and spawn arbitrary processes. A couple of examples demonstrate SAL's applicability in various domains like electronic systems design and process management.","lang":"eng"}],"user_id":"5786","department":[{"_id":"672"}],"_id":"39432","language":[{"iso":"eng"}],"keyword":["software prototyping","distributed programming","authoring languages","software agents","program visualisation","parallel languages"]}]
