---
_id: '56298'
abstract:
- lang: eng
  text: "In the general pattern formation (GPF) problem, a swarm of simple autonomous,\r\ndisoriented
    robots must form a given pattern. The robots' simplicity imply a\r\nstrong limitation:
    When the initial configuration is rotationally symmetric,\r\nonly patterns with
    a similar symmetry can be formed [Yamashita, Suzyuki; TCS\r\n2010]. The only known
    algorithm to form large patterns with limited visibility\r\nand without memory
    requires the robots to start in a near-gathering (a swarm of\r\nconstant diameter)
    [Hahn et al.; SAND 2024]. However, not only do we not know\r\nany near-gathering
    algorithm guaranteed to preserve symmetry but most natural\r\ngathering strategies
    trivially increase symmetries [Castenow et al.; OPODIS\r\n2022].\r\n  Thus, we
    study near-gathering without changing the swarm's rotational\r\nsymmetry for disoriented,
    oblivious robots with limited visibility (the\r\nOBLOT-model, see [Flocchini et
    al.; 2019]). We introduce a technique based on\r\nthe theory of dynamical systems
    to analyze how a given algorithm affects\r\nsymmetry and provide sufficient conditions
    for symmetry preservation. Until\r\nnow, it was unknown whether the considered
    OBLOT-model allows for any\r\nnon-trivial algorithm that always preserves symmetry.
    Our first result shows\r\nthat a variant of Go-to-the-Average always preserves
    symmetry but may sometimes\r\nlead to multiple, unconnected near-gathering clusters.
    Our second result is a\r\nsymmetry-preserving near-gathering algorithm that works
    on swarms with a convex\r\nboundary (the outer boundary of the unit disc graph)
    and without holes (circles\r\nof diameter 1 inside the boundary without any robots)."
author:
- first_name: Raphael
  full_name: Gerlach, Raphael
  id: '32655'
  last_name: Gerlach
  orcid: 0009-0002-4750-2051
- first_name: Sören
  full_name: von der Gracht, Sören
  id: '97359'
  last_name: von der Gracht
  orcid: 0000-0002-8054-2058
- first_name: Christopher
  full_name: Hahn, Christopher
  last_name: Hahn
- first_name: Jonas
  full_name: Harbig, Jonas
  id: '47213'
  last_name: Harbig
- first_name: Peter
  full_name: Kling, Peter
  last_name: Kling
citation:
  ama: 'Gerlach R, von der Gracht S, Hahn C, Harbig J, Kling P. Symmetry Preservation
    in Swarms of Oblivious Robots with Limited  Visibility. In: Bonomi S, Galletta
    L, Rivière  Etienne, Schiavoni  Valerio, eds. <i>28th International Conference
    on Principles of Distributed Systems (OPODIS 2024)</i>. Vol 324. Leibniz International
    Proceedings in Informatics (LIPIcs). Schloss Dagstuhl -- Leibniz-Zentrum für Informatik;
    2025. doi:<a href="https://doi.org/10.4230/LIPIcs.OPODIS.2024.13">10.4230/LIPIcs.OPODIS.2024.13</a>'
  apa: Gerlach, R., von der Gracht, S., Hahn, C., Harbig, J., &#38; Kling, P. (2025).
    Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility.
    In S. Bonomi, L. Galletta,  Etienne Rivière, &#38;  Valerio Schiavoni (Eds.),
    <i>28th International Conference on Principles of Distributed Systems (OPODIS
    2024)</i> (Vol. 324). Schloss Dagstuhl -- Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.OPODIS.2024.13">https://doi.org/10.4230/LIPIcs.OPODIS.2024.13</a>
  bibtex: '@inproceedings{Gerlach_von der Gracht_Hahn_Harbig_Kling_2025, series={Leibniz
    International Proceedings in Informatics (LIPIcs)}, title={Symmetry Preservation
    in Swarms of Oblivious Robots with Limited  Visibility}, volume={324}, DOI={<a
    href="https://doi.org/10.4230/LIPIcs.OPODIS.2024.13">10.4230/LIPIcs.OPODIS.2024.13</a>},
    booktitle={28th International Conference on Principles of Distributed Systems
    (OPODIS 2024)}, publisher={Schloss Dagstuhl -- Leibniz-Zentrum für Informatik},
    author={Gerlach, Raphael and von der Gracht, Sören and Hahn, Christopher and Harbig,
    Jonas and Kling, Peter}, editor={Bonomi, Silvia and Galletta, Letterio and Rivière,  Etienne
    and Schiavoni,  Valerio}, year={2025}, collection={Leibniz International Proceedings
    in Informatics (LIPIcs)} }'
  chicago: Gerlach, Raphael, Sören von der Gracht, Christopher Hahn, Jonas Harbig,
    and Peter Kling. “Symmetry Preservation in Swarms of Oblivious Robots with Limited 
    Visibility.” In <i>28th International Conference on Principles of Distributed
    Systems (OPODIS 2024)</i>, edited by Silvia Bonomi, Letterio Galletta,  Etienne
    Rivière, and  Valerio Schiavoni, Vol. 324. Leibniz International Proceedings in
    Informatics (LIPIcs). Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, 2025.
    <a href="https://doi.org/10.4230/LIPIcs.OPODIS.2024.13">https://doi.org/10.4230/LIPIcs.OPODIS.2024.13</a>.
  ieee: 'R. Gerlach, S. von der Gracht, C. Hahn, J. Harbig, and P. Kling, “Symmetry
    Preservation in Swarms of Oblivious Robots with Limited  Visibility,” in <i>28th
    International Conference on Principles of Distributed Systems (OPODIS 2024)</i>,
    Lucca, Italy, 2025, vol. 324, doi: <a href="https://doi.org/10.4230/LIPIcs.OPODIS.2024.13">10.4230/LIPIcs.OPODIS.2024.13</a>.'
  mla: Gerlach, Raphael, et al. “Symmetry Preservation in Swarms of Oblivious Robots
    with Limited  Visibility.” <i>28th International Conference on Principles of Distributed
    Systems (OPODIS 2024)</i>, edited by Silvia Bonomi et al., vol. 324, Schloss Dagstuhl
    -- Leibniz-Zentrum für Informatik, 2025, doi:<a href="https://doi.org/10.4230/LIPIcs.OPODIS.2024.13">10.4230/LIPIcs.OPODIS.2024.13</a>.
  short: 'R. Gerlach, S. von der Gracht, C. Hahn, J. Harbig, P. Kling, in: S. Bonomi,
    L. Galletta,  Etienne Rivière,  Valerio Schiavoni (Eds.), 28th International Conference
    on Principles of Distributed Systems (OPODIS 2024), Schloss Dagstuhl -- Leibniz-Zentrum
    für Informatik, 2025.'
conference:
  end_date: 2024-12-13
  location: Lucca, Italy
  name: 28th International Conference on Principles of Distributed Systems (OPODIS
    2024)
  start_date: 2024-12-11
date_created: 2024-10-01T13:29:43Z
date_updated: 2025-01-09T11:39:19Z
department:
- _id: '101'
doi: 10.4230/LIPIcs.OPODIS.2024.13
editor:
- first_name: Silvia
  full_name: Bonomi, Silvia
  last_name: Bonomi
- first_name: Letterio
  full_name: Galletta, Letterio
  last_name: Galletta
- first_name: ' Etienne'
  full_name: Rivière,  Etienne
  last_name: Rivière
- first_name: ' Valerio'
  full_name: Schiavoni,  Valerio
  last_name: Schiavoni
external_id:
  arxiv:
  - '2409.19277'
intvolume: '       324'
keyword:
- Swarm Algorithm
- Swarm Robots
- Distributed Algorithm
- Pattern Formation
- Limited Visibility
- Oblivious
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/2409.19277
oa: '1'
project:
- _id: '106'
  grant_number: '453112019'
  name: 'Algorithmen für Schwarmrobotik: Verteiltes Rechnen trifft Dynamische Systeme'
publication: 28th International Conference on Principles of Distributed Systems (OPODIS
  2024)
publication_identifier:
  isbn:
  - 978-3-95977-360-7
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl -- Leibniz-Zentrum für Informatik
series_title: Leibniz International Proceedings in Informatics (LIPIcs)
status: public
title: Symmetry Preservation in Swarms of Oblivious Robots with Limited  Visibility
type: conference
user_id: '97359'
volume: 324
year: '2025'
...
---
_id: '58953'
abstract:
- lang: eng
  text: In this article, we investigate symmetry properties of distributed systems
    of mobile robots. We consider a swarm of n robots in the OBLOT model and analyze
    their collective Fsync dynamics using of equivariant dynamical systems theory.
    To this end, we show that the corresponding evolution function commutes with rotational
    and reflective transformations of R^2. These form a group that is isomorphic to
    O(2) x S_n, the product group of the orthogonal group and the permutation on n
    elements. The theory of equivariant dynamical systems is used to deduce a hierarchy
    along which symmetries of a robot swarm can potentially increase following an
    arbitrary protocol. By decoupling the Look phase from the Compute and Move phases
    in the mathematical description of an LCM cycle, this hierarchy can be characterized
    in terms of automorphisms of connectivity graphs. In particular, we find all possible
    types of symmetry increase, if the decoupled Compute and Move phase is invertible.
    Finally, we apply our results to protocols which induce state-dependent linear
    dynamics, where the reduced system consisting of only the Compute and Move phase
    is linear.
author:
- first_name: Raphael
  full_name: Gerlach, Raphael
  id: '32655'
  last_name: Gerlach
  orcid: 0009-0002-4750-2051
- first_name: Sören
  full_name: von der Gracht, Sören
  id: '97359'
  last_name: von der Gracht
  orcid: 0000-0002-8054-2058
citation:
  ama: Gerlach R, von der Gracht S. Analyzing Symmetries of Swarms of Mobile Robots
    Using Equivariant  Dynamical Systems. <i>arXiv:250307576</i>. Published online
    2025.
  apa: Gerlach, R., &#38; von der Gracht, S. (2025). Analyzing Symmetries of Swarms
    of Mobile Robots Using Equivariant  Dynamical Systems. In <i>arXiv:2503.07576</i>.
  bibtex: '@article{Gerlach_von der Gracht_2025, title={Analyzing Symmetries of Swarms
    of Mobile Robots Using Equivariant  Dynamical Systems}, journal={arXiv:2503.07576},
    author={Gerlach, Raphael and von der Gracht, Sören}, year={2025} }'
  chicago: Gerlach, Raphael, and Sören von der Gracht. “Analyzing Symmetries of Swarms
    of Mobile Robots Using Equivariant  Dynamical Systems.” <i>ArXiv:2503.07576</i>,
    2025.
  ieee: R. Gerlach and S. von der Gracht, “Analyzing Symmetries of Swarms of Mobile
    Robots Using Equivariant  Dynamical Systems,” <i>arXiv:2503.07576</i>. 2025.
  mla: Gerlach, Raphael, and Sören von der Gracht. “Analyzing Symmetries of Swarms
    of Mobile Robots Using Equivariant  Dynamical Systems.” <i>ArXiv:2503.07576</i>,
    2025.
  short: R. Gerlach, S. von der Gracht, ArXiv:2503.07576 (2025).
date_created: 2025-03-11T08:21:05Z
date_updated: 2025-03-11T08:53:02Z
ddc:
- '004'
department:
- _id: '101'
external_id:
  arxiv:
  - '2503.07576'
file:
- access_level: open_access
  content_type: application/pdf
  creator: svdg
  date_created: 2025-03-11T08:27:32Z
  date_updated: 2025-03-11T08:27:32Z
  file_id: '58954'
  file_name: Analyzing_Symmetries_of_Swarms_of_Mobile_Robots_Using_Equivariant_Dynamical_Systems.pdf
  file_size: 812198
  relation: main_file
file_date_updated: 2025-03-11T08:27:32Z
has_accepted_license: '1'
keyword:
- dynamical systems
- coupled systems
- distributed computing
- robot swarms
- autonomous mobile robots
- symmetry
- equivariant dynamics
language:
- iso: eng
oa: '1'
page: '23'
project:
- _id: '106'
  grant_number: '453112019'
  name: 'Algorithmen für Schwarmrobotik: Verteiltes Rechnen trifft Dynamische Systeme'
publication: arXiv:2503.07576
status: public
title: Analyzing Symmetries of Swarms of Mobile Robots Using Equivariant  Dynamical
  Systems
type: preprint
user_id: '97359'
year: '2025'
...
---
_id: '63403'
abstract:
- lang: eng
  text: "Stateful signatures like the NIST standardized signature schemes LMS and
    XMSS provide an efficient and mature realization of post-quantum secure signature
    schemes. They are recommended for long-term use cases like e.g. firmware signing.
    However, stateful signature schemes require to properly manage a so-called state.
    In stateful signature schemes like LMS and XMSS, signing keys consist of a set
    of keys of a one-time signature scheme and it has to be guaranteed that each one-time
    key is used only once. This is done by updating a state in each signature computation,
    basically recording which one-time keys have already been used. While this is
    straightforward in centralized systems, in distributed systems like secure enclaves
    consisting of e.g. multiple hardware security modules (HSMs) with limited communication
    keeping a distributed state that at any point in time is consistent among all
    parties involved presents a challenge. This challenge is not addressed by the
    current standardization processes. \r\nIn this paper we present a security model
    for the distributed key management of post-quantum secure stateful signatures
    like XMSS and LMS. We also present a simple, efficient, and easy to implement
    protocol proven secure in this security model, i.e. the protocol guarantees at
    any point in time a consistent state among the parties in a distributed system,
    like a distributed security enclave. The security model is defined in the universal
    composabilty (UC) framework by Ran Canetti by providing an ideal functionality
    for the distributed key management for stateful signatures. Hence our protocol
    remains secure even if arbitrarily composed with other instances of the same or
    other protocols, a necessity for the security of distributed key management protocols.
    Our main application are security enclaves consisting of HSMs, but the model and
    the protocol can easily be adapted to other scenarios of distributed key management
    of stateful signature schemes."
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Henrik
  full_name: Bröcher, Henrik
  id: '41047'
  last_name: Bröcher
  orcid: 0009-0008-3938-5485
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
- first_name: Laurens Alexander
  full_name: Porzenheim, Laurens Alexander
  id: '47434'
  last_name: Porzenheim
citation:
  ama: Blömer J, Bröcher H, Krummel V, Porzenheim LA. Secure Distributed State Management
    for Stateful Signatures with a Practical and Universally Composable Protocol.
  apa: Blömer, J., Bröcher, H., Krummel, V., &#38; Porzenheim, L. A. (n.d.). <i>Secure
    Distributed State Management for Stateful Signatures with a Practical and Universally
    Composable Protocol</i>.
  bibtex: '@article{Blömer_Bröcher_Krummel_Porzenheim, title={Secure Distributed State
    Management for Stateful Signatures with a Practical and Universally Composable
    Protocol}, author={Blömer, Johannes and Bröcher, Henrik and Krummel, Volker and
    Porzenheim, Laurens Alexander} }'
  chicago: Blömer, Johannes, Henrik Bröcher, Volker Krummel, and Laurens Alexander
    Porzenheim. “Secure Distributed State Management for Stateful Signatures with
    a Practical and Universally Composable Protocol,” n.d.
  ieee: J. Blömer, H. Bröcher, V. Krummel, and L. A. Porzenheim, “Secure Distributed
    State Management for Stateful Signatures with a Practical and Universally Composable
    Protocol.” .
  mla: Blömer, Johannes, et al. <i>Secure Distributed State Management for Stateful
    Signatures with a Practical and Universally Composable Protocol</i>.
  short: J. Blömer, H. Bröcher, V. Krummel, L.A. Porzenheim, (n.d.).
date_created: 2025-12-22T21:23:22Z
date_updated: 2025-12-23T11:30:38Z
department:
- _id: '34'
- _id: '64'
keyword:
- distributed state
- hash-based signature
- stateful hash-based signature
- universal composability
- secure enclave
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2025/2278.pdf
oa: '1'
page: '22'
project:
- _id: '191'
  name: 'PhoQuant: Photonische Quantencomputer -  Quantencomputing Testplattform'
publication_status: submitted
status: public
title: Secure Distributed State Management for Stateful Signatures with a Practical
  and Universally Composable Protocol
type: preprint
user_id: '41047'
year: '2025'
...
---
_id: '21543'
abstract:
- lang: eng
  text: "Services often consist of multiple chained components such as microservices
    in a service mesh, or machine learning functions in a pipeline. Providing these
    services requires online coordination including scaling the service, placing instance
    of all components in the network, scheduling traffic to these instances, and routing
    traffic through the network. Optimized service coordination is still a hard problem
    due to many influencing factors such as rapidly arriving user demands and limited
    node and link capacity. Existing approaches to solve the problem are often built
    on rigid models and assumptions, tailored to specific scenarios. If the scenario
    changes and the assumptions no longer hold, they easily break and require manual
    adjustments by experts. Novel self-learning approaches using deep reinforcement
    learning (DRL) are promising but still have limitations as they only address simplified
    versions of the problem and are typically centralized and thus do not scale to
    practical large-scale networks.\r\n\r\nTo address these issues, we propose a distributed
    self-learning service coordination approach using DRL. After centralized training,
    we deploy a distributed DRL agent at each node in the network, making fast coordination
    decisions locally in parallel with the other nodes. Each agent only observes its
    direct neighbors and does not need global knowledge. Hence, our approach scales
    independently from the size of the network. In our extensive evaluation using
    real-world network topologies and traffic traces, we show that our proposed approach
    outperforms a state-of-the-art conventional heuristic as well as a centralized
    DRL approach (60% higher throughput on average) while requiring less time per
    online decision (1 ms)."
author:
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Haydar
  full_name: Qarawlus, Haydar
  last_name: Qarawlus
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Schneider SB, Qarawlus H, Karl H. Distributed Online Service Coordination
    Using Deep Reinforcement Learning. In: <i>IEEE International Conference on Distributed
    Computing Systems (ICDCS)</i>. IEEE; 2021.'
  apa: 'Schneider, S. B., Qarawlus, H., &#38; Karl, H. (2021). Distributed Online
    Service Coordination Using Deep Reinforcement Learning. In <i>IEEE International
    Conference on Distributed Computing Systems (ICDCS)</i>. Washington, DC, USA:
    IEEE.'
  bibtex: '@inproceedings{Schneider_Qarawlus_Karl_2021, title={Distributed Online
    Service Coordination Using Deep Reinforcement Learning}, booktitle={IEEE International
    Conference on Distributed Computing Systems (ICDCS)}, publisher={IEEE}, author={Schneider,
    Stefan Balthasar and Qarawlus, Haydar and Karl, Holger}, year={2021} }'
  chicago: Schneider, Stefan Balthasar, Haydar Qarawlus, and Holger Karl. “Distributed
    Online Service Coordination Using Deep Reinforcement Learning.” In <i>IEEE International
    Conference on Distributed Computing Systems (ICDCS)</i>. IEEE, 2021.
  ieee: S. B. Schneider, H. Qarawlus, and H. Karl, “Distributed Online Service Coordination
    Using Deep Reinforcement Learning,” in <i>IEEE International Conference on Distributed
    Computing Systems (ICDCS)</i>, Washington, DC, USA, 2021.
  mla: Schneider, Stefan Balthasar, et al. “Distributed Online Service Coordination
    Using Deep Reinforcement Learning.” <i>IEEE International Conference on Distributed
    Computing Systems (ICDCS)</i>, IEEE, 2021.
  short: 'S.B. Schneider, H. Qarawlus, H. Karl, in: IEEE International Conference
    on Distributed Computing Systems (ICDCS), IEEE, 2021.'
conference:
  location: Washington, DC, USA
  name: IEEE International Conference on Distributed Computing Systems (ICDCS)
date_created: 2021-03-18T17:15:47Z
date_updated: 2022-01-06T06:55:04Z
ddc:
- '000'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2021-03-18T17:12:56Z
  date_updated: 2021-03-18T17:12:56Z
  file_id: '21544'
  file_name: public_author_version.pdf
  file_size: 606321
  relation: main_file
  title: Distributed Online Service Coordination Using Deep Reinforcement Learning
file_date_updated: 2021-03-18T17:12:56Z
has_accepted_license: '1'
keyword:
- network management
- service management
- coordination
- reinforcement learning
- distributed
language:
- iso: eng
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE International Conference on Distributed Computing Systems (ICDCS)
publisher: IEEE
related_material:
  link:
  - relation: software
    url: https://github.com/ RealVNF/distributed-drl-coordination
status: public
title: Distributed Online Service Coordination Using Deep Reinforcement Learning
type: conference
user_id: '35343'
year: '2021'
...
---
_id: '22510'
abstract:
- lang: eng
  text: 'Over the past decades, the Gathering problem, which asks to gather a group
    of robots in finite time given some restrictions, has been intensively studied.
    In this paper, we are given a group of n autonomous, dimensionless, deterministic,
    and anonymous robots, with bounded viewing range. Assuming a continuous time model,
    the goal is to gather these robots into one point in finite time. We introduce
    a simple convergence criterion that defines a new class of algorithms which perform
    gathering in O(nd) time, where d is the diameter of the initial robot configuration.
    We show that some gathering algorithms in the literature belong to this class
    and propose two new algorithms that belong to this class and have quadratic running
    time, namely, Go-To-The-Relative-Center algorithm (GTRC) and Safe-Go-To-The-Relative-Center
    algorithm (S-GTRC). We prove that the latter can perform gathering without collision
    by using a slightly more complex robot model: non oblivious, chiral, and luminous
    (i.e. robots have observable external memory, as in [8]). We also consider a variant
    of the Gathering problem, the Near-Gathering problem, in which robots must get
    close to each other without colliding. We show that S-GTRC solves the Near-Gathering
    problem in quadratic time and assumes a weaker robot model than the one assumed
    in the current state-of-the-art.'
author:
- first_name: Shouwei
  full_name: Li, Shouwei
  last_name: Li
- first_name: Christine
  full_name: Markarian, Christine
  last_name: Markarian
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Pavel
  full_name: Podlipyan, Pavel
  last_name: Podlipyan
citation:
  ama: Li S, Markarian C, Meyer auf der Heide F, Podlipyan P. A continuous strategy
    for collisionless gathering. <i>Theoretical Computer Science</i>. 2021;852:41-60.
    doi:<a href="https://doi.org/10.1016/j.tcs.2020.10.037">10.1016/j.tcs.2020.10.037</a>
  apa: Li, S., Markarian, C., Meyer auf der Heide, F., &#38; Podlipyan, P. (2021).
    A continuous strategy for collisionless gathering. <i>Theoretical Computer Science</i>,
    <i>852</i>, 41–60. <a href="https://doi.org/10.1016/j.tcs.2020.10.037">https://doi.org/10.1016/j.tcs.2020.10.037</a>
  bibtex: '@article{Li_Markarian_Meyer auf der Heide_Podlipyan_2021, title={A continuous
    strategy for collisionless gathering}, volume={852}, DOI={<a href="https://doi.org/10.1016/j.tcs.2020.10.037">10.1016/j.tcs.2020.10.037</a>},
    journal={Theoretical Computer Science}, author={Li, Shouwei and Markarian, Christine
    and Meyer auf der Heide, Friedhelm and Podlipyan, Pavel}, year={2021}, pages={41–60}
    }'
  chicago: 'Li, Shouwei, Christine Markarian, Friedhelm Meyer auf der Heide, and Pavel
    Podlipyan. “A Continuous Strategy for Collisionless Gathering.” <i>Theoretical
    Computer Science</i> 852 (2021): 41–60. <a href="https://doi.org/10.1016/j.tcs.2020.10.037">https://doi.org/10.1016/j.tcs.2020.10.037</a>.'
  ieee: S. Li, C. Markarian, F. Meyer auf der Heide, and P. Podlipyan, “A continuous
    strategy for collisionless gathering,” <i>Theoretical Computer Science</i>, vol.
    852, pp. 41–60, 2021.
  mla: Li, Shouwei, et al. “A Continuous Strategy for Collisionless Gathering.” <i>Theoretical
    Computer Science</i>, vol. 852, 2021, pp. 41–60, doi:<a href="https://doi.org/10.1016/j.tcs.2020.10.037">10.1016/j.tcs.2020.10.037</a>.
  short: S. Li, C. Markarian, F. Meyer auf der Heide, P. Podlipyan, Theoretical Computer
    Science 852 (2021) 41–60.
date_created: 2021-06-28T09:24:15Z
date_updated: 2022-01-06T06:55:35Z
department:
- _id: '63'
doi: 10.1016/j.tcs.2020.10.037
intvolume: '       852'
keyword:
- Local algorithms
- Distributed algorithms
- Collisionless gathering
- Mobile robots
- Multiagent system
language:
- iso: eng
page: 41-60
publication: Theoretical Computer Science
publication_identifier:
  issn:
  - 0304-3975
publication_status: published
status: public
title: A continuous strategy for collisionless gathering
type: journal_article
user_id: '15415'
volume: 852
year: '2021'
...
---
_id: '22511'
abstract:
- lang: eng
  text: "In this paper, we reconsider the well-known discrete, round-based Go-To-The-Center
    algorithm due to Ando, Suzuki, and Yamashita [2] for gathering n autonomous mobile
    robots with limited viewing range in the plane. Remarquably, this algorithm exploits
    the fact that during its execution, many collisions of robots occur. Such collisions
    are interpreted as a success because it is assumed that such collided robots behave
    the same from now on. This is acceptable under the assumption that each robot
    is represented by a single point. Otherwise, collisions should be avoided. In
    this paper, we consider a continuous Go-To-The-Center algorithm in which the robots
    continuously observe the positions of their neighbors and adapt their speed (assuming
    a speed limit) and direction. Our first results are time bounds of O(n2) for gathering
    in two dimensions Euclidean space, and Θ(n) for the one dimension. Our main contribution
    is the introduction and evaluation of a continuous algorithm which performs Go-To-The-Center
    considering only the neighbors of a robot with respect to the Gabriel subgraph
    of the visibility graph, i.e. Go-To-The-Gabriel-Center algorithm. We show that
    this modification still correctly executes gathering in one and two dimensions,
    with the same time bounds as above. Simulations exhibit a severe difference of
    the behavior of the Go-To-The-Center and the Go-To-The-Gabriel-Center algorithms:
    Whereas lots of collisions occur during a run of the Go-To-The-Center algorithm,
    typically only one, namely the final collision occurs during a run of the Go-To-The-Gabriel-Center
    algorithm. We can prove this “collisionless property” of the Go-To-The-Gabriel-Center
    algorithm for one dimension. In two-dimensional Euclidean space, we conjecture
    that the “collisionless property” holds for almost every initial configuration.
    We support our conjecture with measurements obtained from the simulation where
    robots execute both continuous Go-To-The-Center and Go-To-The-Gabriel-Center algorithms.\r\n"
author:
- first_name: Shouwei
  full_name: Li, Shouwei
  last_name: Li
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Pavel
  full_name: Podlipyan, Pavel
  last_name: Podlipyan
citation:
  ama: Li S, Meyer auf der Heide F, Podlipyan P. The impact of the Gabriel subgraph
    of the visibility graph on the gathering of mobile autonomous robots. <i>Theoretical
    Computer Science</i>. 2021;852:29-40. doi:<a href="https://doi.org/10.1016/j.tcs.2020.11.009">10.1016/j.tcs.2020.11.009</a>
  apa: Li, S., Meyer auf der Heide, F., &#38; Podlipyan, P. (2021). The impact of
    the Gabriel subgraph of the visibility graph on the gathering of mobile autonomous
    robots. <i>Theoretical Computer Science</i>, <i>852</i>, 29–40. <a href="https://doi.org/10.1016/j.tcs.2020.11.009">https://doi.org/10.1016/j.tcs.2020.11.009</a>
  bibtex: '@article{Li_Meyer auf der Heide_Podlipyan_2021, title={The impact of the
    Gabriel subgraph of the visibility graph on the gathering of mobile autonomous
    robots}, volume={852}, DOI={<a href="https://doi.org/10.1016/j.tcs.2020.11.009">10.1016/j.tcs.2020.11.009</a>},
    journal={Theoretical Computer Science}, author={Li, Shouwei and Meyer auf der
    Heide, Friedhelm and Podlipyan, Pavel}, year={2021}, pages={29–40} }'
  chicago: 'Li, Shouwei, Friedhelm Meyer auf der Heide, and Pavel Podlipyan. “The
    Impact of the Gabriel Subgraph of the Visibility Graph on the Gathering of Mobile
    Autonomous Robots.” <i>Theoretical Computer Science</i> 852 (2021): 29–40. <a
    href="https://doi.org/10.1016/j.tcs.2020.11.009">https://doi.org/10.1016/j.tcs.2020.11.009</a>.'
  ieee: S. Li, F. Meyer auf der Heide, and P. Podlipyan, “The impact of the Gabriel
    subgraph of the visibility graph on the gathering of mobile autonomous robots,”
    <i>Theoretical Computer Science</i>, vol. 852, pp. 29–40, 2021.
  mla: Li, Shouwei, et al. “The Impact of the Gabriel Subgraph of the Visibility Graph
    on the Gathering of Mobile Autonomous Robots.” <i>Theoretical Computer Science</i>,
    vol. 852, 2021, pp. 29–40, doi:<a href="https://doi.org/10.1016/j.tcs.2020.11.009">10.1016/j.tcs.2020.11.009</a>.
  short: S. Li, F. Meyer auf der Heide, P. Podlipyan, Theoretical Computer Science
    852 (2021) 29–40.
date_created: 2021-06-28T09:34:45Z
date_updated: 2022-01-06T06:55:35Z
department:
- _id: '63'
doi: 10.1016/j.tcs.2020.11.009
intvolume: '       852'
keyword:
- Local algorithms
- Distributed algorithms
- Collisionless gathering
- Mobile robots
- Multiagent system
language:
- iso: eng
page: 29-40
publication: Theoretical Computer Science
publication_identifier:
  issn:
  - 0304-3975
publication_status: published
status: public
title: The impact of the Gabriel subgraph of the visibility graph on the gathering
  of mobile autonomous robots
type: journal_article
user_id: '15415'
volume: 852
year: '2021'
...
---
_id: '19607'
abstract:
- lang: eng
  text: "Modern services consist of modular, interconnected\r\ncomponents, e.g., microservices
    forming a service mesh. To\r\ndynamically adjust to ever-changing service demands,
    service\r\ncomponents have to be instantiated on nodes across the network.\r\nIncoming
    flows requesting a service then need to be routed\r\nthrough the deployed instances
    while considering node and link\r\ncapacities. Ultimately, the goal is to maximize
    the successfully\r\nserved flows and Quality of Service (QoS) through online service\r\ncoordination.
    Current approaches for service coordination are\r\nusually centralized, assuming
    up-to-date global knowledge and\r\nmaking global decisions for all nodes in the
    network. Such global\r\nknowledge and centralized decisions are not realistic
    in practical\r\nlarge-scale networks.\r\n\r\nTo solve this problem, we propose
    two algorithms for fully\r\ndistributed service coordination. The proposed algorithms
    can be\r\nexecuted individually at each node in parallel and require only\r\nvery
    limited global knowledge. We compare and evaluate both\r\nalgorithms with a state-of-the-art
    centralized approach in extensive\r\nsimulations on a large-scale, real-world
    network topology.\r\nOur results indicate that the two algorithms can compete
    with\r\ncentralized approaches in terms of solution quality but require\r\nless
    global knowledge and are magnitudes faster (more than\r\n100x)."
author:
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Lars Dietrich
  full_name: Klenner, Lars Dietrich
  last_name: Klenner
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Schneider SB, Klenner LD, Karl H. Every Node for Itself: Fully Distributed
    Service Coordination. In: <i>IEEE International Conference on Network and Service
    Management (CNSM)</i>. IEEE; 2020.'
  apa: 'Schneider, S. B., Klenner, L. D., &#38; Karl, H. (2020). Every Node for Itself:
    Fully Distributed Service Coordination. In <i>IEEE International Conference on
    Network and Service Management (CNSM)</i>. IEEE.'
  bibtex: '@inproceedings{Schneider_Klenner_Karl_2020, title={Every Node for Itself:
    Fully Distributed Service Coordination}, booktitle={IEEE International Conference
    on Network and Service Management (CNSM)}, publisher={IEEE}, author={Schneider,
    Stefan Balthasar and Klenner, Lars Dietrich and Karl, Holger}, year={2020} }'
  chicago: 'Schneider, Stefan Balthasar, Lars Dietrich Klenner, and Holger Karl. “Every
    Node for Itself: Fully Distributed Service Coordination.” In <i>IEEE International
    Conference on Network and Service Management (CNSM)</i>. IEEE, 2020.'
  ieee: 'S. B. Schneider, L. D. Klenner, and H. Karl, “Every Node for Itself: Fully
    Distributed Service Coordination,” in <i>IEEE International Conference on Network
    and Service Management (CNSM)</i>, 2020.'
  mla: 'Schneider, Stefan Balthasar, et al. “Every Node for Itself: Fully Distributed
    Service Coordination.” <i>IEEE International Conference on Network and Service
    Management (CNSM)</i>, IEEE, 2020.'
  short: 'S.B. Schneider, L.D. Klenner, H. Karl, in: IEEE International Conference
    on Network and Service Management (CNSM), IEEE, 2020.'
date_created: 2020-09-22T06:23:40Z
date_updated: 2022-01-06T06:54:08Z
ddc:
- '006'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2020-09-22T06:25:57Z
  date_updated: 2020-09-22T06:36:25Z
  file_id: '19608'
  file_name: ris_with_copyright.pdf
  file_size: 500948
  relation: main_file
file_date_updated: 2020-09-22T06:36:25Z
has_accepted_license: '1'
keyword:
- distributed management
- service coordination
- network coordination
- nfv
- softwarization
- orchestration
language:
- iso: eng
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE International Conference on Network and Service Management (CNSM)
publisher: IEEE
status: public
title: 'Every Node for Itself: Fully Distributed Service Coordination'
type: conference
user_id: '35343'
year: '2020'
...
---
_id: '17667'
abstract:
- lang: eng
  text: 'Resolving distributed attacks benefits from collaboration between networks.
    We present three approaches for the same multi-domain defensive action that can
    be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures,
    and 3) Minimize Propagation. First, we provide a formula to compute efficiency
    of a defense; then we use this formula to compute the efficiency of the approaches
    under various circumstances. Finally, we discuss how task execution order and
    timing influence defense efficiency. Our results show that the Minimize Propagation
    approach is the most efficient method when defending against the chosen attack.'
author:
- first_name: Ralph
  full_name: Koning, Ralph
  last_name: Koning
- first_name: Gleb
  full_name: Polevoy, Gleb
  id: '83983'
  last_name: Polevoy
- first_name: Lydia
  full_name: Meijer, Lydia
  last_name: Meijer
- first_name: Cees
  full_name: de Laat, Cees
  last_name: de Laat
- first_name: Paola
  full_name: Grosso, Paola
  last_name: Grosso
citation:
  ama: 'Koning R, Polevoy G, Meijer L, de Laat C, Grosso P. Approaches for Collaborative
    Security Defences in Multi Network Environments. In: <i>2019 6th IEEE International
    Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International
    Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>. 2019 6th IEEE International
    Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International
    Conference on Edge Computing and Scalable Cloud (EdgeCom). ; 2019:113-123. doi:<a
    href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>'
  apa: Koning, R., Polevoy, G., Meijer, L., de Laat, C., &#38; Grosso, P. (2019).
    Approaches for Collaborative Security Defences in Multi Network Environments.
    In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)</i> (pp. 113–123). <a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>
  bibtex: '@inproceedings{Koning_Polevoy_Meijer_de Laat_Grosso_2019, series={2019
    6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)},
    title={Approaches for Collaborative Security Defences in Multi Network Environments},
    DOI={<a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>},
    booktitle={2019 6th IEEE International Conference on Cyber Security and Cloud
    Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing
    and Scalable Cloud (EdgeCom)}, author={Koning, Ralph and Polevoy, Gleb and Meijer,
    Lydia and de Laat, Cees and Grosso, Paola}, year={2019}, pages={113–123}, collection={2019
    6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}
    }'
  chicago: Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso.
    “Approaches for Collaborative Security Defences in Multi Network Environments.”
    In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)</i>, 113–23. 2019 6th IEEE International Conference on Cyber Security
    and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge
    Computing and Scalable Cloud (EdgeCom), 2019. <a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>.
  ieee: R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for
    Collaborative Security Defences in Multi Network Environments,” in <i>2019 6th
    IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>,
    2019, pp. 113–123.
  mla: Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi
    Network Environments.” <i>2019 6th IEEE International Conference on Cyber Security
    and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge
    Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–23, doi:<a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>.
  short: 'R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE
    International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019
    5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom),
    2019, pp. 113–123.'
conference:
  name: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)
date_created: 2020-08-06T15:23:23Z
date_updated: 2022-01-06T06:53:16Z
department:
- _id: '63'
- _id: '541'
doi: 10.1109/CSCloud/EdgeCom.2019.000-9
extern: '1'
keyword:
- computer network security
- multinetwork environments
- multidomain defensive action
- task execution order
- timing influence defense efficiency
- distributed attacks
- collaborative security defence approach
- minimize propagation approach
- minimize countermeasure approach
- counteract everywhere approach
- Conferences
- Cloud computing
- Computer crime
- Edge computing
- Security
- Defense Approaches
- Multi-Domain Defense
- Collaborative Defense
- Defense Algorithms
- Computer Networks
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/abstract/document/8854057/authors#authors
page: 113-123
publication: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
  (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
  Cloud (EdgeCom)
publication_identifier:
  issn:
  - 'null'
quality_controlled: '1'
series_title: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
  (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
  Cloud (EdgeCom)
status: public
title: Approaches for Collaborative Security Defences in Multi Network Environments
type: conference
user_id: '83983'
year: '2019'
...
---
_id: '3422'
abstract:
- lang: eng
  text: "We study the consensus problem in a synchronous distributed system of n nodes
    under an adaptive adversary that has a slightly outdated view of the system and
    can block all incoming and outgoing communication of a constant fraction of the
    nodes in each round. Motivated by a result of Ben-Or and Bar-Joseph (1998), showing
    that any consensus algorithm that is resilient against a linear number of crash
    faults requires $\\tilde \\Omega(\\sqrt n)$ rounds in an n-node network against
    an adaptive adversary, we consider a late adaptive adversary, who has full knowledge
    of the network state at the beginning of the previous round and unlimited computational
    power, but is oblivious to the current state of the nodes. \r\n\r\nOur main contributions
    are randomized distributed algorithms that achieve consensus with high probability
    among all except a small constant fraction of the nodes (i.e., \"almost-everywhere'')
    against a late adaptive adversary who can block up to ε n$ nodes in each round,
    for a small constant ε >0$. Our first protocol achieves binary almost-everywhere
    consensus and also guarantees a decision on the majority input value, thus ensuring
    plurality consensus. We also present an algorithm that achieves the same time
    complexity for multi-value consensus. Both of our algorithms succeed in $O(log
    n)$ rounds with high probability, thus showing an exponential gap to the $\\tilde\\Omega(\\sqrt
    n)$ lower bound of Ben-Or and Bar-Joseph for strongly adaptive crash-failure adversaries,
    which can be strengthened to $\\Omega(n)$ when allowing the adversary to block
    nodes instead of permanently crashing them. Our algorithms are scalable to large
    systems as each node contacts only an (amortized) constant number of peers in
    each communication round. We show that our algorithms are optimal up to constant
    (resp.\\ sub-logarithmic) factors by proving that every almost-everywhere consensus
    protocol takes $\\Omega(log_d n)$ rounds in the worst case, where d is an upper
    bound on the number of communication requests initiated per node in each round.
    We complement our theoretical results with an experimental evaluation of the binary
    almost-everywhere consensus protocol revealing a short convergence time even against
    an adversary blocking a large fraction of nodes."
author:
- first_name: Peter
  full_name: Robinson, Peter
  last_name: Robinson
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
- first_name: Alexander
  full_name: Setzer, Alexander
  id: '11108'
  last_name: Setzer
citation:
  ama: 'Robinson P, Scheideler C, Setzer A. Breaking the $\tilde\Omega(\sqrt{n})$
    Barrier: Fast Consensus under a Late Adversary. In: <i>Proceedings of the 30th
    ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. doi:<a
    href="https://doi.org/10.1145/3210377.3210399">10.1145/3210377.3210399</a>'
  apa: 'Robinson, P., Scheideler, C., &#38; Setzer, A. (n.d.). Breaking the $\tilde\Omega(\sqrt{n})$
    Barrier: Fast Consensus under a Late Adversary. In <i>Proceedings of the 30th
    ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. Wien.
    <a href="https://doi.org/10.1145/3210377.3210399">https://doi.org/10.1145/3210377.3210399</a>'
  bibtex: '@inproceedings{Robinson_Scheideler_Setzer, title={Breaking the $\tilde\Omega(\sqrt{n})$
    Barrier: Fast Consensus under a Late Adversary}, DOI={<a href="https://doi.org/10.1145/3210377.3210399">10.1145/3210377.3210399</a>},
    booktitle={Proceedings of the 30th ACM Symposium on Parallelism in Algorithms
    and Architectures (SPAA)}, author={Robinson, Peter and Scheideler, Christian and
    Setzer, Alexander} }'
  chicago: 'Robinson, Peter, Christian Scheideler, and Alexander Setzer. “Breaking
    the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.”
    In <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures
    (SPAA)</i>, n.d. <a href="https://doi.org/10.1145/3210377.3210399">https://doi.org/10.1145/3210377.3210399</a>.'
  ieee: 'P. Robinson, C. Scheideler, and A. Setzer, “Breaking the $\tilde\Omega(\sqrt{n})$
    Barrier: Fast Consensus under a Late Adversary,” in <i>Proceedings of the 30th
    ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, Wien.'
  mla: 'Robinson, Peter, et al. “Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast
    Consensus under a Late Adversary.” <i>Proceedings of the 30th ACM Symposium on
    Parallelism in Algorithms and Architectures (SPAA)</i>, doi:<a href="https://doi.org/10.1145/3210377.3210399">10.1145/3210377.3210399</a>.'
  short: 'P. Robinson, C. Scheideler, A. Setzer, in: Proceedings of the 30th ACM Symposium
    on Parallelism in Algorithms and Architectures (SPAA), n.d.'
conference:
  end_date: 2018-07-18
  location: Wien
  name: 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)
  start_date: 2018-07-16
date_created: 2018-07-04T08:55:45Z
date_updated: 2022-01-06T06:59:16Z
ddc:
- '040'
department:
- _id: '79'
- _id: '34'
- _id: '7'
doi: 10.1145/3210377.3210399
file:
- access_level: closed
  content_type: application/pdf
  creator: asetzer
  date_created: 2018-10-31T13:30:40Z
  date_updated: 2018-10-31T13:30:40Z
  file_id: '5215'
  file_name: p173-robinson.pdf
  file_size: 1675407
  relation: main_file
  success: 1
file_date_updated: 2018-10-31T13:30:40Z
has_accepted_license: '1'
keyword:
- distributed consensus
- randomized algorithm
- adaptive adversary
- complexity lower bound
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
publication: Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and
  Architectures (SPAA)
publication_identifier:
  isbn:
  - 978-1-4503-5799-9/18/07
publication_status: accepted
status: public
title: 'Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late
  Adversary'
type: conference
user_id: '11108'
year: '2018'
...
---
_id: '4411'
abstract:
- lang: eng
  text: "While a lot of research in distributed computing has covered solutions for
    self-stabilizing computing and topologies, there is far less work on self-stabilization
    for distributed data structures.\r\nConsidering crashing peers in peer-to-peer
    networks, it should not be taken for granted that a distributed data structure
    remains intact.\r\nIn this work, we present a self-stabilizing protocol for a
    distributed data structure called the hashed Patricia Trie (Kniesburges and Scheideler
    WALCOM'11) that enables efficient prefix search on a set of keys.\r\nThe data
    structure has a wide area of applications including string matching problems while
    offering low overhead and efficient operations when embedded on top of a distributed
    hash table.\r\nEspecially, longest prefix matching for $x$ can be done in $\\mathcal{O}(\\log
    |x|)$ hash table read accesses.\r\nWe show how to maintain the structure in a
    self-stabilizing way.\r\nOur protocol assures low overhead in a legal state and
    a total (asymptotically optimal) memory demand of $\\Theta(d)$ bits, where $d$
    is the number of bits needed for storing all keys."
author:
- first_name: Till
  full_name: Knollmann, Till
  id: '39241'
  last_name: Knollmann
  orcid: 0000-0003-2014-4696
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Knollmann T, Scheideler C. A Self-Stabilizing Hashed Patricia Trie. In: Izumi
    T, Kuznetsov P, eds. <i>Proceedings of the 20th International Symposium on Stabilization,
    Safety, and Security of Distributed Systems (SSS)</i>. Vol 11201. Lecture Notes
    of Computer Science. Springer, Cham; 2018. doi:<a href="https://doi.org/10.1007/978-3-030-03232-6_1">10.1007/978-3-030-03232-6_1</a>'
  apa: 'Knollmann, T., &#38; Scheideler, C. (2018). A Self-Stabilizing Hashed Patricia
    Trie. In T. Izumi &#38; P. Kuznetsov (Eds.), <i>Proceedings of the 20th International
    Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>
    (Vol. 11201). Tokyo: Springer, Cham. <a href="https://doi.org/10.1007/978-3-030-03232-6_1">https://doi.org/10.1007/978-3-030-03232-6_1</a>'
  bibtex: '@inproceedings{Knollmann_Scheideler_2018, series={Lecture Notes of Computer
    Science}, title={A Self-Stabilizing Hashed Patricia Trie}, volume={11201}, DOI={<a
    href="https://doi.org/10.1007/978-3-030-03232-6_1">10.1007/978-3-030-03232-6_1</a>},
    booktitle={Proceedings of the 20th International Symposium on Stabilization, Safety,
    and Security of Distributed Systems (SSS)}, publisher={Springer, Cham}, author={Knollmann,
    Till and Scheideler, Christian}, editor={Izumi, Taisuke and Kuznetsov, PetrEditors},
    year={2018}, collection={Lecture Notes of Computer Science} }'
  chicago: Knollmann, Till, and Christian Scheideler. “A Self-Stabilizing Hashed Patricia
    Trie.” In <i>Proceedings of the 20th International Symposium on Stabilization,
    Safety, and Security of Distributed Systems (SSS)</i>, edited by Taisuke Izumi
    and Petr Kuznetsov, Vol. 11201. Lecture Notes of Computer Science. Springer, Cham,
    2018. <a href="https://doi.org/10.1007/978-3-030-03232-6_1">https://doi.org/10.1007/978-3-030-03232-6_1</a>.
  ieee: T. Knollmann and C. Scheideler, “A Self-Stabilizing Hashed Patricia Trie,”
    in <i>Proceedings of the 20th International Symposium on Stabilization, Safety,
    and Security of Distributed Systems (SSS)</i>, Tokyo, 2018, vol. 11201.
  mla: Knollmann, Till, and Christian Scheideler. “A Self-Stabilizing Hashed Patricia
    Trie.” <i>Proceedings of the 20th International Symposium on Stabilization, Safety,
    and Security of Distributed Systems (SSS)</i>, edited by Taisuke Izumi and Petr
    Kuznetsov, vol. 11201, Springer, Cham, 2018, doi:<a href="https://doi.org/10.1007/978-3-030-03232-6_1">10.1007/978-3-030-03232-6_1</a>.
  short: 'T. Knollmann, C. Scheideler, in: T. Izumi, P. Kuznetsov (Eds.), Proceedings
    of the 20th International Symposium on Stabilization, Safety, and Security of
    Distributed Systems (SSS), Springer, Cham, 2018.'
conference:
  end_date: 2018-11-07
  location: Tokyo
  name: 20th International Symposium on Stabilization, Safety, and Security of Distributed
    Systems (SSS)
  start_date: 2018-11-04
date_created: 2018-09-17T13:12:18Z
date_updated: 2022-01-06T07:01:02Z
ddc:
- '000'
department:
- _id: '63'
- _id: '79'
doi: 10.1007/978-3-030-03232-6_1
editor:
- first_name: Taisuke
  full_name: Izumi, Taisuke
  last_name: Izumi
- first_name: Petr
  full_name: Kuznetsov, Petr
  last_name: Kuznetsov
external_id:
  arxiv:
  - '1809.04923'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T14:38:37Z
  date_updated: 2018-11-02T14:38:37Z
  file_id: '5277'
  file_name: ASelf-stabilizingHashedPatrici.pdf
  file_size: 500005
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T14:38:37Z
has_accepted_license: '1'
intvolume: '     11201'
keyword:
- Self-Stabilizing
- Prefix Search
- Distributed Data Structure
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '5'
  name: SFB 901 - Subproject A1
publication: Proceedings of the 20th International Symposium on Stabilization, Safety,
  and Security of Distributed Systems (SSS)
publisher: Springer, Cham
series_title: Lecture Notes of Computer Science
status: public
title: A Self-Stabilizing Hashed Patricia Trie
type: conference
user_id: '39241'
volume: 11201
year: '2018'
...
---
_id: '4375'
abstract:
- lang: eng
  text: "We present a peer-to-peer network that supports the efficient processing
    of orthogonal range queries $R=\\bigtimes_{i=1}^{d}[a_i,\\,b_i]$ in a $d$-dimensional
    point space.\\\\\r\nThe  network is the same for each dimension, namely a distance
    halving network like the one introduced by Naor and Wieder (ACM TALG'07).\r\nWe
    show how to execute such range queries using $\\mathcal{O}\\left(2^{d'}d\\,\\log
    m + d\\,|R|\\right)$ hops (and the same number of messages) in total. Here $[m]^d$
    is the ground set, $|R|$ is the size and $d'$ the dimension of the queried range.\r\nFurthermore,
    if the peers form a distributed network, the query can be answered in $\\mathcal{O}\\left(d\\,\\log
    m + d\\,\\sum_{i=1}^{d}(b_i-a_i+1)\\right)$ communication rounds.\r\nOur algorithms
    are based on a mapping of the Hilbert Curve through $[m]^d$ to the peers."
author:
- first_name: Markus
  full_name: Benter, Markus
  last_name: Benter
- first_name: Till
  full_name: Knollmann, Till
  id: '39241'
  last_name: Knollmann
  orcid: 0000-0003-2014-4696
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Alexander
  full_name: Setzer, Alexander
  id: '11108'
  last_name: Setzer
- first_name: Jannik
  full_name: Sundermeier, Jannik
  id: '38705'
  last_name: Sundermeier
citation:
  ama: 'Benter M, Knollmann T, Meyer auf der Heide F, Setzer A, Sundermeier J. A Peer-to-Peer
    based Cloud Storage supporting orthogonal Range Queries of arbitrary Dimension.
    In: <i>Proceedings of the 4th International Symposium on Algorithmic Aspects of
    Cloud Computing (ALGOCLOUD)</i>. ; 2018. doi:<a href="https://doi.org/10.1007/978-3-030-19759-9_4">10.1007/978-3-030-19759-9_4</a>'
  apa: Benter, M., Knollmann, T., Meyer auf der Heide, F., Setzer, A., &#38; Sundermeier,
    J. (2018). A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries
    of arbitrary Dimension. In <i>Proceedings of the 4th International Symposium on
    Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>. Helsinki. <a href="https://doi.org/10.1007/978-3-030-19759-9_4">https://doi.org/10.1007/978-3-030-19759-9_4</a>
  bibtex: '@inproceedings{Benter_Knollmann_Meyer auf der Heide_Setzer_Sundermeier_2018,
    title={A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries
    of arbitrary Dimension}, DOI={<a href="https://doi.org/10.1007/978-3-030-19759-9_4">10.1007/978-3-030-19759-9_4</a>},
    booktitle={Proceedings of the 4th International Symposium on Algorithmic Aspects
    of Cloud Computing (ALGOCLOUD)}, author={Benter, Markus and Knollmann, Till and
    Meyer auf der Heide, Friedhelm and Setzer, Alexander and Sundermeier, Jannik},
    year={2018} }'
  chicago: Benter, Markus, Till Knollmann, Friedhelm Meyer auf der Heide, Alexander
    Setzer, and Jannik Sundermeier. “A Peer-to-Peer Based Cloud Storage Supporting
    Orthogonal Range Queries of Arbitrary Dimension.” In <i>Proceedings of the 4th
    International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>,
    2018. <a href="https://doi.org/10.1007/978-3-030-19759-9_4">https://doi.org/10.1007/978-3-030-19759-9_4</a>.
  ieee: M. Benter, T. Knollmann, F. Meyer auf der Heide, A. Setzer, and J. Sundermeier,
    “A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary
    Dimension,” in <i>Proceedings of the 4th International Symposium on Algorithmic
    Aspects of Cloud Computing (ALGOCLOUD)</i>, Helsinki, 2018.
  mla: Benter, Markus, et al. “A Peer-to-Peer Based Cloud Storage Supporting Orthogonal
    Range Queries of Arbitrary Dimension.” <i>Proceedings of the 4th International
    Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)</i>, 2018, doi:<a
    href="https://doi.org/10.1007/978-3-030-19759-9_4">10.1007/978-3-030-19759-9_4</a>.
  short: 'M. Benter, T. Knollmann, F. Meyer auf der Heide, A. Setzer, J. Sundermeier,
    in: Proceedings of the 4th International Symposium on Algorithmic Aspects of Cloud
    Computing (ALGOCLOUD), 2018.'
conference:
  end_date: 2018-08-21
  location: Helsinki
  name: 4th International Symposium on Algorithmic Aspects of Cloud Computing (ALGOCLOUD)
  start_date: 2018-08-20
date_created: 2018-09-11T05:26:59Z
date_updated: 2022-01-06T07:01:00Z
ddc:
- '000'
department:
- _id: '63'
- _id: '79'
doi: 10.1007/978-3-030-19759-9_4
file:
- access_level: closed
  content_type: application/pdf
  creator: tillk
  date_created: 2018-11-27T10:03:33Z
  date_updated: 2018-11-27T10:03:33Z
  file_id: '5863'
  file_name: A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries
    of arbitrary Dimension.pdf
  file_size: 1122875
  relation: main_file
  success: 1
file_date_updated: 2018-11-27T10:03:33Z
has_accepted_license: '1'
keyword:
- Distributed Storage
- Multi-Dimensional Range Queries
- Peer-to-Peer
- Hilbert Curve
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '5'
  name: SFB 901 - Subproject A1
publication: Proceedings of the 4th International Symposium on Algorithmic Aspects
  of Cloud Computing (ALGOCLOUD)
status: public
title: A Peer-to-Peer based Cloud Storage supporting orthogonal Range Queries of arbitrary
  Dimension
type: conference
user_id: '14955'
year: '2018'
...
---
_id: '10780'
author:
- first_name: Zakarya
  full_name: Guettatfi, Zakarya
  last_name: Guettatfi
- first_name: Philipp
  full_name: Hübner, Philipp
  last_name: Hübner
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
- first_name: Bernhard
  full_name: Rinner, Bernhard
  last_name: Rinner
citation:
  ama: 'Guettatfi Z, Hübner P, Platzner M, Rinner B. Computational self-awareness
    as design approach for visual sensor nodes. In: <i>12th International Symposium
    on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)</i>. ; 2017:1-8.
    doi:<a href="https://doi.org/10.1109/ReCoSoC.2017.8016147">10.1109/ReCoSoC.2017.8016147</a>'
  apa: Guettatfi, Z., Hübner, P., Platzner, M., &#38; Rinner, B. (2017). Computational
    self-awareness as design approach for visual sensor nodes. In <i>12th International
    Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)</i>
    (pp. 1–8). <a href="https://doi.org/10.1109/ReCoSoC.2017.8016147">https://doi.org/10.1109/ReCoSoC.2017.8016147</a>
  bibtex: '@inproceedings{Guettatfi_Hübner_Platzner_Rinner_2017, title={Computational
    self-awareness as design approach for visual sensor nodes}, DOI={<a href="https://doi.org/10.1109/ReCoSoC.2017.8016147">10.1109/ReCoSoC.2017.8016147</a>},
    booktitle={12th International Symposium on Reconfigurable Communication-centric
    Systems-on-Chip (ReCoSoC)}, author={Guettatfi, Zakarya and Hübner, Philipp and
    Platzner, Marco and Rinner, Bernhard}, year={2017}, pages={1–8} }'
  chicago: Guettatfi, Zakarya, Philipp Hübner, Marco Platzner, and Bernhard Rinner.
    “Computational Self-Awareness as Design Approach for Visual Sensor Nodes.” In
    <i>12th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip
    (ReCoSoC)</i>, 1–8, 2017. <a href="https://doi.org/10.1109/ReCoSoC.2017.8016147">https://doi.org/10.1109/ReCoSoC.2017.8016147</a>.
  ieee: Z. Guettatfi, P. Hübner, M. Platzner, and B. Rinner, “Computational self-awareness
    as design approach for visual sensor nodes,” in <i>12th International Symposium
    on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)</i>, 2017, pp.
    1–8.
  mla: Guettatfi, Zakarya, et al. “Computational Self-Awareness as Design Approach
    for Visual Sensor Nodes.” <i>12th International Symposium on Reconfigurable Communication-Centric
    Systems-on-Chip (ReCoSoC)</i>, 2017, pp. 1–8, doi:<a href="https://doi.org/10.1109/ReCoSoC.2017.8016147">10.1109/ReCoSoC.2017.8016147</a>.
  short: 'Z. Guettatfi, P. Hübner, M. Platzner, B. Rinner, in: 12th International
    Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC), 2017,
    pp. 1–8.'
date_created: 2019-07-10T12:13:15Z
date_updated: 2022-01-06T06:50:50Z
department:
- _id: '78'
doi: 10.1109/ReCoSoC.2017.8016147
keyword:
- embedded systems
- image sensors
- power aware computing
- wireless sensor networks
- Zynq-based VSN node prototype
- computational self-awareness
- design approach
- platform levels
- power consumption
- visual sensor networks
- visual sensor nodes
- Cameras
- Hardware
- Middleware
- Multicore processing
- Operating systems
- Runtime
- Reconfigurable platforms
- distributed embedded systems
- performance-resource trade-off
- self-awareness
- visual sensor nodes
language:
- iso: eng
page: 1-8
publication: 12th International Symposium on Reconfigurable Communication-centric
  Systems-on-Chip (ReCoSoC)
status: public
title: Computational self-awareness as design approach for visual sensor nodes
type: conference
user_id: '3118'
year: '2017'
...
---
_id: '19'
abstract:
- lang: eng
  text: "Version Control Systems (VCS) are a valuable tool for software development\r\nand
    document management. Both client/server and distributed (Peer-to-Peer)\r\nmodels
    exist, with the latter (e.g., Git and Mercurial) becoming\r\nincreasingly popular.
    Their distributed nature introduces complications,\r\nespecially concerning security:
    it is hard to control the dissemination of\r\ncontents stored in distributed VCS
    as they rely on replication of complete\r\nrepositories to any involved user.\r\n\r\nWe
    overcome this issue by designing and implementing a concept for\r\ncryptography-enforced
    access control which is transparent to the user. Use\r\nof field-tested schemes
    (end-to-end encryption, digital signatures) allows\r\nfor strong security, while
    adoption of convergent encryption and\r\ncontent-defined chunking retains storage
    efficiency. The concept is\r\nseamlessly integrated into Mercurial---respecting
    its distributed storage\r\nconcept---to ensure practical usability and compatibility
    to existing\r\ndeployments."
author:
- first_name: Michael
  full_name: Lass, Michael
  id: '24135'
  last_name: Lass
  orcid: 0000-0002-5708-7632
- first_name: Dominik
  full_name: Leibenger, Dominik
  last_name: Leibenger
- first_name: Christoph
  full_name: Sorge, Christoph
  last_name: Sorge
citation:
  ama: 'Lass M, Leibenger D, Sorge C. Confidentiality and Authenticity for Distributed
    Version Control Systems - A Mercurial Extension. In: <i>Proc. 41st Conference
    on Local Computer Networks (LCN)</i>. IEEE; 2016. doi:<a href="https://doi.org/10.1109/lcn.2016.11">10.1109/lcn.2016.11</a>'
  apa: Lass, M., Leibenger, D., &#38; Sorge, C. (2016). Confidentiality and Authenticity
    for Distributed Version Control Systems - A Mercurial Extension. In <i>Proc. 41st
    Conference on Local Computer Networks (LCN)</i>. IEEE. <a href="https://doi.org/10.1109/lcn.2016.11">https://doi.org/10.1109/lcn.2016.11</a>
  bibtex: '@inproceedings{Lass_Leibenger_Sorge_2016, title={Confidentiality and Authenticity
    for Distributed Version Control Systems - A Mercurial Extension}, DOI={<a href="https://doi.org/10.1109/lcn.2016.11">10.1109/lcn.2016.11</a>},
    booktitle={Proc. 41st Conference on Local Computer Networks (LCN)}, publisher={IEEE},
    author={Lass, Michael and Leibenger, Dominik and Sorge, Christoph}, year={2016}
    }'
  chicago: Lass, Michael, Dominik Leibenger, and Christoph Sorge. “Confidentiality
    and Authenticity for Distributed Version Control Systems - A Mercurial Extension.”
    In <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE, 2016.
    <a href="https://doi.org/10.1109/lcn.2016.11">https://doi.org/10.1109/lcn.2016.11</a>.
  ieee: M. Lass, D. Leibenger, and C. Sorge, “Confidentiality and Authenticity for
    Distributed Version Control Systems - A Mercurial Extension,” in <i>Proc. 41st
    Conference on Local Computer Networks (LCN)</i>, 2016.
  mla: Lass, Michael, et al. “Confidentiality and Authenticity for Distributed Version
    Control Systems - A Mercurial Extension.” <i>Proc. 41st Conference on Local Computer
    Networks (LCN)</i>, IEEE, 2016, doi:<a href="https://doi.org/10.1109/lcn.2016.11">10.1109/lcn.2016.11</a>.
  short: 'M. Lass, D. Leibenger, C. Sorge, in: Proc. 41st Conference on Local Computer
    Networks (LCN), IEEE, 2016.'
date_created: 2017-07-25T14:36:16Z
date_updated: 2022-01-06T06:53:56Z
department:
- _id: '27'
- _id: '518'
doi: 10.1109/lcn.2016.11
keyword:
- access control
- distributed version control systems
- mercurial
- peer-to-peer
- convergent encryption
- confidentiality
- authenticity
language:
- iso: eng
publication: Proc. 41st Conference on Local Computer Networks (LCN)
publication_identifier:
  isbn:
  - 978-1-5090-2054-6
publication_status: published
publisher: IEEE
status: public
title: Confidentiality and Authenticity for Distributed Version Control Systems -
  A Mercurial Extension
type: conference
user_id: '24135'
year: '2016'
...
---
_id: '5598'
abstract:
- lang: eng
  text: Emerging digital environments and infrastructures, such as distributed services
    and computing services, have generated new options of communication, information
    sharing, and resource utilization in past years. Different distributed trust concepts
    are applied to increase trust in such systems. However, these concepts yield to
    rather complex architectures which make it difficult to determine which component
    or system needs to be trusted. This paper presents a novel trust measurement method
    for distributed systems which enables the t identification of weak points in the
    overall system architecture. The measurement method includes the specification
    of a formal trust language and its representation by means of propositional logic
    formulas. The applicability of the proposed concepts is demonstrated by conducting
    a case study on the Internet voting system that was used in the 2007 parliamentary
    elections in Estonia.
author:
- first_name: Melanie
  full_name: Volkamer, Melanie
  last_name: Volkamer
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
citation:
  ama: 'Volkamer M, Schryen G. Measuring eTrust in distributed systems - General Concept
    and Application to Internet Voting. In: <i>Proceedings of the 23rd Bled EConference</i>.
    ; 2010.'
  apa: Volkamer, M., &#38; Schryen, G. (2010). Measuring eTrust in distributed systems
    - General Concept and Application to Internet Voting. In <i>Proceedings of the
    23rd Bled eConference</i>.
  bibtex: '@inproceedings{Volkamer_Schryen_2010, title={Measuring eTrust in distributed
    systems - General Concept and Application to Internet Voting}, booktitle={Proceedings
    of the 23rd Bled eConference}, author={Volkamer, Melanie and Schryen, Guido},
    year={2010} }'
  chicago: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed
    Systems - General Concept and Application to Internet Voting.” In <i>Proceedings
    of the 23rd Bled EConference</i>, 2010.
  ieee: M. Volkamer and G. Schryen, “Measuring eTrust in distributed systems - General
    Concept and Application to Internet Voting,” in <i>Proceedings of the 23rd Bled
    eConference</i>, 2010.
  mla: Volkamer, Melanie, and Guido Schryen. “Measuring ETrust in Distributed Systems
    - General Concept and Application to Internet Voting.” <i>Proceedings of the 23rd
    Bled EConference</i>, 2010.
  short: 'M. Volkamer, G. Schryen, in: Proceedings of the 23rd Bled EConference, 2010.'
date_created: 2018-11-14T11:49:50Z
date_updated: 2022-01-06T07:02:06Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-11T15:14:05Z
  date_updated: 2018-12-13T15:16:50Z
  file_id: '6185'
  file_name: 06_Schryen.pdf
  file_size: 243413
  relation: main_file
file_date_updated: 2018-12-13T15:16:50Z
has_accepted_license: '1'
keyword:
- distributed trust concepts
- measuring etrust
- Internet voting
language:
- iso: eng
oa: '1'
publication: Proceedings of the 23rd Bled eConference
status: public
title: Measuring eTrust in distributed systems - General Concept and Application to
  Internet Voting
type: conference
user_id: '61579'
year: '2010'
...
---
_id: '11820'
abstract:
- lang: eng
  text: In this paper, we derive an uncertainty decoding rule for automatic speech
    recognition (ASR), which accounts for both corrupted observations and inter-frame
    correlation. The conditional independence assumption, prevalent in hidden Markov
    model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned
    on the complete observed feature vector sequence. This is a more informative posterior
    than one conditioned only on the current observation. The novel decoding is used
    to obtain a transmission-error robust remote ASR system, where the speech capturing
    unit is connected to the decoder via an error-prone communication network. We
    show how the clean speech posterior can be computed for communication links being
    characterized by either bit errors or packet loss. Recognition results are presented
    for both distributed and network speech recognition, where in the latter case
    common voice-over-IP codecs are employed.
author:
- first_name: Valentin
  full_name: Ion, Valentin
  last_name: Ion
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to
    Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech,
    and Language Processing</i>. 2008;16(5):1047-1060. doi:<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>
  apa: Ion, V., &#38; Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With
    Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions
    on Audio, Speech, and Language Processing</i>, <i>16</i>(5), 1047–1060. <a href="https://doi.org/10.1109/TASL.2008.925879">https://doi.org/10.1109/TASL.2008.925879</a>
  bibtex: '@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule
    With Applications to Transmission Error Robust Speech Recognition}, volume={16},
    DOI={<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>},
    number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing},
    author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060}
    }'
  chicago: 'Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding
    Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE
    Transactions on Audio, Speech, and Language Processing</i> 16, no. 5 (2008): 1047–60.
    <a href="https://doi.org/10.1109/TASL.2008.925879">https://doi.org/10.1109/TASL.2008.925879</a>.'
  ieee: V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications
    to Transmission Error Robust Speech Recognition,” <i>IEEE Transactions on Audio,
    Speech, and Language Processing</i>, vol. 16, no. 5, pp. 1047–1060, 2008.
  mla: Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule
    With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions
    on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, 2008, pp. 1047–60,
    doi:<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>.
  short: V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language
    Processing 16 (2008) 1047–1060.
date_created: 2019-07-12T05:28:53Z
date_updated: 2022-01-06T06:51:10Z
department:
- _id: '54'
doi: 10.1109/TASL.2008.925879
intvolume: '        16'
issue: '5'
keyword:
- automatic speech recognition
- bit errors
- codecs
- communication links
- corrupted observations
- decoding
- distributed speech recognition
- error-prone communication network
- feature vector sequence
- hidden Markov model-based ASR
- hidden Markov models
- inter-frame correlation
- Internet telephony
- network speech recognition
- packet loss
- speech posterior
- speech recognition
- transmission error robust speech recognition
- uncertainty decoding
- voice-over-IP codecs
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf
oa: '1'
page: 1047-1060
publication: IEEE Transactions on Audio, Speech, and Language Processing
status: public
title: A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust
  Speech Recognition
type: journal_article
user_id: '44006'
volume: 16
year: '2008'
...
---
_id: '2392'
author:
- first_name: Matthias
  full_name: Woehrle, Matthias
  last_name: Woehrle
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
- first_name: Jan
  full_name: Beutel, Jan
  last_name: Beutel
- first_name: Lothar
  full_name: Thiele, Lothar
  last_name: Thiele
citation:
  ama: 'Woehrle M, Plessl C, Beutel J, Thiele L. Increasing the Reliability of Wireless
    Sensor Networks with a Distributed Testing Framework. In: <i>Proc. Workshop on
    Embedded Networked Sensors (EmNets)</i>. ACM; 2007:93-97. doi:<a href="https://doi.org/10.1145/1278972.1278996">10.1145/1278972.1278996</a>'
  apa: Woehrle, M., Plessl, C., Beutel, J., &#38; Thiele, L. (2007). Increasing the
    Reliability of Wireless Sensor Networks with a Distributed Testing Framework.
    <i>Proc. Workshop on Embedded Networked Sensors (EmNets)</i>, 93–97. <a href="https://doi.org/10.1145/1278972.1278996">https://doi.org/10.1145/1278972.1278996</a>
  bibtex: '@inproceedings{Woehrle_Plessl_Beutel_Thiele_2007, place={New York, NY,
    USA}, title={Increasing the Reliability of Wireless Sensor Networks with a Distributed
    Testing Framework}, DOI={<a href="https://doi.org/10.1145/1278972.1278996">10.1145/1278972.1278996</a>},
    booktitle={Proc. Workshop on Embedded Networked Sensors (EmNets)}, publisher={ACM},
    author={Woehrle, Matthias and Plessl, Christian and Beutel, Jan and Thiele, Lothar},
    year={2007}, pages={93–97} }'
  chicago: 'Woehrle, Matthias, Christian Plessl, Jan Beutel, and Lothar Thiele. “Increasing
    the Reliability of Wireless Sensor Networks with a Distributed Testing Framework.”
    In <i>Proc. Workshop on Embedded Networked Sensors (EmNets)</i>, 93–97. New York,
    NY, USA: ACM, 2007. <a href="https://doi.org/10.1145/1278972.1278996">https://doi.org/10.1145/1278972.1278996</a>.'
  ieee: 'M. Woehrle, C. Plessl, J. Beutel, and L. Thiele, “Increasing the Reliability
    of Wireless Sensor Networks with a Distributed Testing Framework,” in <i>Proc.
    Workshop on Embedded Networked Sensors (EmNets)</i>, 2007, pp. 93–97, doi: <a
    href="https://doi.org/10.1145/1278972.1278996">10.1145/1278972.1278996</a>.'
  mla: Woehrle, Matthias, et al. “Increasing the Reliability of Wireless Sensor Networks
    with a Distributed Testing Framework.” <i>Proc. Workshop on Embedded Networked
    Sensors (EmNets)</i>, ACM, 2007, pp. 93–97, doi:<a href="https://doi.org/10.1145/1278972.1278996">10.1145/1278972.1278996</a>.
  short: 'M. Woehrle, C. Plessl, J. Beutel, L. Thiele, in: Proc. Workshop on Embedded
    Networked Sensors (EmNets), ACM, New York, NY, USA, 2007, pp. 93–97.'
date_created: 2018-04-17T13:34:42Z
date_updated: 2023-09-26T14:00:38Z
department:
- _id: '27'
- _id: '518'
doi: 10.1145/1278972.1278996
keyword:
- WSN
- testing
- distributed
- embedded
language:
- iso: eng
page: 93-97
place: New York, NY, USA
publication: Proc. Workshop on Embedded Networked Sensors (EmNets)
publication_identifier:
  isbn:
  - 978-1-59593-694-3
publisher: ACM
quality_controlled: '1'
status: public
title: Increasing the Reliability of Wireless Sensor Networks with a Distributed Testing
  Framework
type: conference
user_id: '15278'
year: '2007'
...
---
_id: '11824'
abstract:
- lang: eng
  text: Soft-feature based speech recognition, which is an example of uncertainty
    decoding, has been proven to be a robust error mitigation method for distributed
    speech recognition over wireless channels exhibiting bit errors. In this paper
    we extend this concept to packet-oriented transmissions. The a posteriori probability
    density function of the lost feature vector, given the closest received neighbours,
    is computed. In the experiments, the nearest frame repetition, which is shown
    to be equivalent to the MAP estimate, outperforms the MMSE estimate for long bursts.
    Taking the variance into account at the speech recognition stage results in superior
    performance compared to classical schemes using point estimates. A computationally
    and memory efficient implementation of the proposed packet loss compensation scheme
    based on table lookup is presented
author:
- first_name: Valentin
  full_name: Ion, Valentin
  last_name: Ion
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Ion V, Haeb-Umbach R. An Inexpensive Packet Loss Compensation Scheme for Distributed
    Speech Recognition Based on Soft-Features. In: <i>IEEE International Conference
    on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>. Vol 1. ; 2006:I.
    doi:<a href="https://doi.org/10.1109/ICASSP.2006.1659984">10.1109/ICASSP.2006.1659984</a>'
  apa: Ion, V., &#38; Haeb-Umbach, R. (2006). An Inexpensive Packet Loss Compensation
    Scheme for Distributed Speech Recognition Based on Soft-Features. In <i>IEEE International
    Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i> (Vol.
    1, p. I). <a href="https://doi.org/10.1109/ICASSP.2006.1659984">https://doi.org/10.1109/ICASSP.2006.1659984</a>
  bibtex: '@inproceedings{Ion_Haeb-Umbach_2006, title={An Inexpensive Packet Loss
    Compensation Scheme for Distributed Speech Recognition Based on Soft-Features},
    volume={1}, DOI={<a href="https://doi.org/10.1109/ICASSP.2006.1659984">10.1109/ICASSP.2006.1659984</a>},
    booktitle={IEEE International Conference on Acoustics, Speech and Signal Processing
    (ICASSP 2006)}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2006},
    pages={I} }'
  chicago: Ion, Valentin, and Reinhold Haeb-Umbach. “An Inexpensive Packet Loss Compensation
    Scheme for Distributed Speech Recognition Based on Soft-Features.” In <i>IEEE
    International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>,
    1:I, 2006. <a href="https://doi.org/10.1109/ICASSP.2006.1659984">https://doi.org/10.1109/ICASSP.2006.1659984</a>.
  ieee: V. Ion and R. Haeb-Umbach, “An Inexpensive Packet Loss Compensation Scheme
    for Distributed Speech Recognition Based on Soft-Features,” in <i>IEEE International
    Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>, 2006,
    vol. 1, p. I.
  mla: Ion, Valentin, and Reinhold Haeb-Umbach. “An Inexpensive Packet Loss Compensation
    Scheme for Distributed Speech Recognition Based on Soft-Features.” <i>IEEE International
    Conference on Acoustics, Speech and Signal Processing (ICASSP 2006)</i>, vol.
    1, 2006, p. I, doi:<a href="https://doi.org/10.1109/ICASSP.2006.1659984">10.1109/ICASSP.2006.1659984</a>.
  short: 'V. Ion, R. Haeb-Umbach, in: IEEE International Conference on Acoustics,
    Speech and Signal Processing (ICASSP 2006), 2006, p. I.'
date_created: 2019-07-12T05:28:58Z
date_updated: 2022-01-06T06:51:10Z
department:
- _id: '54'
doi: 10.1109/ICASSP.2006.1659984
intvolume: '         1'
keyword:
- distributed speech recognition
- least mean squares methods
- MAP estimate
- maximum likelihood estimation
- MMSE estimate
- packet loss compensation scheme
- packet switched communication
- posteriori probability density function
- robust error mitigation method
- soft-features
- speech recognition
- table lookup
- voice communication
- wireless channels
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2006/IoHa06-2.pdf
oa: '1'
page: I
publication: IEEE International Conference on Acoustics, Speech and Signal Processing
  (ICASSP 2006)
status: public
title: An Inexpensive Packet Loss Compensation Scheme for Distributed Speech Recognition
  Based on Soft-Features
type: conference
user_id: '44006'
volume: 1
year: '2006'
...
---
_id: '11825'
abstract:
- lang: eng
  text: In this paper, we propose an enhanced error concealment strategy at the server
    side of a distributed speech recognition (DSR) system, which is fully compatible
    with the existing DSR standard. It is based on a Bayesian approach, where the
    a posteriori probability density of the error-free feature vector is computed,
    given all received feature vectors which are possibly corrupted by transmission
    errors. Rather than computing a point estimate, such as the MMSE estimate, and
    plugging it into the Bayesian decision rule, we employ uncertainty decoding, which
    results in an integration over the uncertainty in the feature domain. In a typical
    scenario the communication between the thin client, often a mobile device, and
    the recognition server spreads across heterogeneous networks. Both bit errors
    on circuit-switched links and lost data packets on IP connections are mitigated
    by our approach in a unified manner. The experiments reveal improved robustness
    both for small- and large-vocabulary recognition tasks.
author:
- first_name: Valentin
  full_name: Ion, Valentin
  last_name: Ion
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: Ion V, Haeb-Umbach R. Uncertainty decoding for distributed speech recognition
    over error-prone networks. <i>Speech Communication</i>. 2006;48(11):1435-1446.
    doi:<a href="https://doi.org/10.1016/j.specom.2006.03.007">10.1016/j.specom.2006.03.007</a>
  apa: Ion, V., &#38; Haeb-Umbach, R. (2006). Uncertainty decoding for distributed
    speech recognition over error-prone networks. <i>Speech Communication</i>, <i>48</i>(11),
    1435–1446. <a href="https://doi.org/10.1016/j.specom.2006.03.007">https://doi.org/10.1016/j.specom.2006.03.007</a>
  bibtex: '@article{Ion_Haeb-Umbach_2006, title={Uncertainty decoding for distributed
    speech recognition over error-prone networks}, volume={48}, DOI={<a href="https://doi.org/10.1016/j.specom.2006.03.007">10.1016/j.specom.2006.03.007</a>},
    number={11}, journal={Speech Communication}, author={Ion, Valentin and Haeb-Umbach,
    Reinhold}, year={2006}, pages={1435–1446} }'
  chicago: 'Ion, Valentin, and Reinhold Haeb-Umbach. “Uncertainty Decoding for Distributed
    Speech Recognition over Error-Prone Networks.” <i>Speech Communication</i> 48,
    no. 11 (2006): 1435–46. <a href="https://doi.org/10.1016/j.specom.2006.03.007">https://doi.org/10.1016/j.specom.2006.03.007</a>.'
  ieee: V. Ion and R. Haeb-Umbach, “Uncertainty decoding for distributed speech recognition
    over error-prone networks,” <i>Speech Communication</i>, vol. 48, no. 11, pp.
    1435–1446, 2006.
  mla: Ion, Valentin, and Reinhold Haeb-Umbach. “Uncertainty Decoding for Distributed
    Speech Recognition over Error-Prone Networks.” <i>Speech Communication</i>, vol.
    48, no. 11, 2006, pp. 1435–46, doi:<a href="https://doi.org/10.1016/j.specom.2006.03.007">10.1016/j.specom.2006.03.007</a>.
  short: V. Ion, R. Haeb-Umbach, Speech Communication 48 (2006) 1435–1446.
date_created: 2019-07-12T05:28:59Z
date_updated: 2022-01-06T06:51:10Z
department:
- _id: '54'
doi: 10.1016/j.specom.2006.03.007
intvolume: '        48'
issue: '11'
keyword:
- Channel error robustness
- Distributed speech recognition
- Soft features
- Uncertainty decoding
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2006/IoHa06-3.pdf
oa: '1'
page: 1435-1446
publication: Speech Communication
status: public
title: Uncertainty decoding for distributed speech recognition over error-prone networks
type: journal_article
user_id: '44006'
volume: 48
year: '2006'
...
---
_id: '11828'
abstract:
- lang: eng
  text: 'In this paper we present a comparison of the recently proposed Soft-Feature
    Distributed Speech Recognition (SFDSR) with the two evaluated candidate codecs
    for Speech Enabled Services over wireless networks: Adaptive Multirate Codec (AMR)
    and the ETSI Extended Advanced Front-End for Distributed Speech Recognition (XAFE).
    It is shown that SFDSR achieves the best recognition performance on a simulated
    GSM transmission, followed by XAFE and AMR.We also present some new results concerning
    SFDSR which demonstrate the versatility of the approach. Further, a simple method
    is introduced which considerably reduces the computational effort.'
author:
- first_name: Valentin
  full_name: Ion, Valentin
  last_name: Ion
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Ion V, Haeb-Umbach R. A Comparison of Soft-Feature Distributed Speech Recognition
    with Candidate Codecs for Speech Enabled Mobile Services. In: <i>IEEE International
    Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>. Vol 1.
    ; 2005:333-336. doi:<a href="https://doi.org/10.1109/ICASSP.2005.1415118">10.1109/ICASSP.2005.1415118</a>'
  apa: Ion, V., &#38; Haeb-Umbach, R. (2005). A Comparison of Soft-Feature Distributed
    Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services. In
    <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP
    2005)</i> (Vol. 1, pp. 333–336). <a href="https://doi.org/10.1109/ICASSP.2005.1415118">https://doi.org/10.1109/ICASSP.2005.1415118</a>
  bibtex: '@inproceedings{Ion_Haeb-Umbach_2005, title={A Comparison of Soft-Feature
    Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile
    Services}, volume={1}, DOI={<a href="https://doi.org/10.1109/ICASSP.2005.1415118">10.1109/ICASSP.2005.1415118</a>},
    booktitle={IEEE International Conference on Acoustics, Speech and Signal Processing
    (ICASSP 2005)}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2005},
    pages={333–336} }'
  chicago: Ion, Valentin, and Reinhold Haeb-Umbach. “A Comparison of Soft-Feature
    Distributed Speech Recognition with Candidate Codecs for Speech Enabled Mobile
    Services.” In <i>IEEE International Conference on Acoustics, Speech and Signal
    Processing (ICASSP 2005)</i>, 1:333–36, 2005. <a href="https://doi.org/10.1109/ICASSP.2005.1415118">https://doi.org/10.1109/ICASSP.2005.1415118</a>.
  ieee: V. Ion and R. Haeb-Umbach, “A Comparison of Soft-Feature Distributed Speech
    Recognition with Candidate Codecs for Speech Enabled Mobile Services,” in <i>IEEE
    International Conference on Acoustics, Speech and Signal Processing (ICASSP 2005)</i>,
    2005, vol. 1, pp. 333–336.
  mla: Ion, Valentin, and Reinhold Haeb-Umbach. “A Comparison of Soft-Feature Distributed
    Speech Recognition with Candidate Codecs for Speech Enabled Mobile Services.”
    <i>IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP
    2005)</i>, vol. 1, 2005, pp. 333–36, doi:<a href="https://doi.org/10.1109/ICASSP.2005.1415118">10.1109/ICASSP.2005.1415118</a>.
  short: 'V. Ion, R. Haeb-Umbach, in: IEEE International Conference on Acoustics,
    Speech and Signal Processing (ICASSP 2005), 2005, pp. 333–336.'
date_created: 2019-07-12T05:29:02Z
date_updated: 2022-01-06T06:51:10Z
department:
- _id: '54'
doi: 10.1109/ICASSP.2005.1415118
intvolume: '         1'
keyword:
- adaptive codes
- adaptive multirate codec
- AMR
- distributed speech recognition
- ETSI
- extended advanced front-end
- recognition performance
- SFDSR
- simulated GSM transmission
- soft-feature distributed speech recognition
- speech codecs
- speech coding
- speech recognition
- variable rate codes
- XAFE
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2005/IoHa05-2.pdf
oa: '1'
page: 333-336
publication: IEEE International Conference on Acoustics, Speech and Signal Processing
  (ICASSP 2005)
status: public
title: A Comparison of Soft-Feature Distributed Speech Recognition with Candidate
  Codecs for Speech Enabled Mobile Services
type: conference
user_id: '44006'
volume: 1
year: '2005'
...
---
_id: '39432'
abstract:
- lang: eng
  text: This article presents SAL, a general purpose scripting language for the rapid
    development of distributed software agents seamlessly embedded in a visual environment.
    Integrated facilities for dynamic visualization provide sample but powerful means
    for debugging and domain-oriented animation. SAL agents are arranged on a set
    of 2D worksheets which can be distributed over different machines. An agent's
    program is defined by the means of a table specifying a set of state transition
    rules with a condition and a sequence of actions each. Beyond basic computation
    and communication, actions can dynamically modify the agent's depiction, its program,
    and spawn arbitrary processes. A couple of examples demonstrate SAL's applicability
    in various domains like electronic systems design and process management.
author:
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
- first_name: A.
  full_name: Meyer, A.
  last_name: Meyer
- first_name: Henning
  full_name: Zabel, Henning
  last_name: Zabel
citation:
  ama: 'Müller W, Meyer A, Zabel H. A Language for the Rapid Prototyping of Mobile
    Evolving Agents. In: <i>Proceedings of the 34th Annual Hawaii International Conference
    on System Sciences</i>. ; 2001. doi:<a href="https://doi.org/10.1109/HICSS.2001.926319">10.1109/HICSS.2001.926319</a>'
  apa: Müller, W., Meyer, A., &#38; Zabel, H. (2001). A Language for the Rapid Prototyping
    of Mobile Evolving Agents. <i>Proceedings of the 34th Annual Hawaii International
    Conference on System Sciences</i>. <a href="https://doi.org/10.1109/HICSS.2001.926319">https://doi.org/10.1109/HICSS.2001.926319</a>
  bibtex: '@inproceedings{Müller_Meyer_Zabel_2001, place={Maui, HI, USA }, title={A
    Language for the Rapid Prototyping of Mobile Evolving Agents}, DOI={<a href="https://doi.org/10.1109/HICSS.2001.926319">10.1109/HICSS.2001.926319</a>},
    booktitle={Proceedings of the 34th Annual Hawaii International Conference on System
    Sciences}, author={Müller, Wolfgang and Meyer, A. and Zabel, Henning}, year={2001}
    }'
  chicago: Müller, Wolfgang, A. Meyer, and Henning Zabel. “A Language for the Rapid
    Prototyping of Mobile Evolving Agents.” In <i>Proceedings of the 34th Annual Hawaii
    International Conference on System Sciences</i>. Maui, HI, USA , 2001. <a href="https://doi.org/10.1109/HICSS.2001.926319">https://doi.org/10.1109/HICSS.2001.926319</a>.
  ieee: 'W. Müller, A. Meyer, and H. Zabel, “A Language for the Rapid Prototyping
    of Mobile Evolving Agents,” 2001, doi: <a href="https://doi.org/10.1109/HICSS.2001.926319">10.1109/HICSS.2001.926319</a>.'
  mla: Müller, Wolfgang, et al. “A Language for the Rapid Prototyping of Mobile Evolving
    Agents.” <i>Proceedings of the 34th Annual Hawaii International Conference on
    System Sciences</i>, 2001, doi:<a href="https://doi.org/10.1109/HICSS.2001.926319">10.1109/HICSS.2001.926319</a>.
  short: 'W. Müller, A. Meyer, H. Zabel, in: Proceedings of the 34th Annual Hawaii
    International Conference on System Sciences, Maui, HI, USA , 2001.'
date_created: 2023-01-24T10:48:09Z
date_updated: 2023-01-24T10:48:14Z
department:
- _id: '672'
doi: 10.1109/HICSS.2001.926319
keyword:
- software prototyping
- distributed programming
- authoring languages
- software agents
- program visualisation
- parallel languages
language:
- iso: eng
place: 'Maui, HI, USA '
publication: Proceedings of the 34th Annual Hawaii International Conference on System
  Sciences
publication_identifier:
  isbn:
  - 0-7695-0981-9
status: public
title: A Language for the Rapid Prototyping of Mobile Evolving Agents
type: conference
user_id: '5786'
year: '2001'
...
