@inproceedings{20505,
  abstract     = {{Speech activity detection (SAD), which often rests on the fact that the noise is "more'' stationary than speech, is particularly challenging in non-stationary environments, because the time variance of the acoustic scene makes it difficult to discriminate  speech from noise. We propose two approaches to SAD, where one is based on statistical signal processing, while the other utilizes neural networks. The former employs sophisticated signal processing to track the noise and speech energies and is meant to support the case for a resource efficient, unsupervised signal processing approach.
The latter introduces a recurrent network layer that operates on short segments of the input speech to do temporal smoothing in the presence of non-stationary noise. The systems are tested on the Fearless Steps challenge database, which consists of the transmission data from the Apollo-11 space mission.
The statistical SAD  achieves comparable detection performance to earlier proposed neural network based SADs, while the neural network based approach leads to a decision cost function of 1.07% on the evaluation set of the 2020 Fearless Steps Challenge, which sets a new state of the art.}},
  author       = {{Heitkaemper, Jens and Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}},
  booktitle    = {{INTERSPEECH 2020 Virtual Shanghai China}},
  keywords     = {{voice activity detection, speech activity detection, neural network, statistical speech processing}},
  title        = {{{Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments}}},
  year         = {{2020}},
}

@inproceedings{17667,
  abstract     = {{Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack.}},
  author       = {{Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}},
  booktitle    = {{2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}},
  issn         = {{null}},
  keywords     = {{computer network security, multinetwork environments, multidomain defensive action, task execution order, timing influence defense efficiency, distributed attacks, collaborative security defence approach, minimize propagation approach, minimize countermeasure approach, counteract everywhere approach, Conferences, Cloud computing, Computer crime, Edge computing, Security, Defense Approaches, Multi-Domain Defense, Collaborative Defense, Defense Algorithms, Computer Networks}},
  pages        = {{113--123}},
  title        = {{{Approaches for Collaborative Security Defences in Multi Network Environments}}},
  doi          = {{10.1109/CSCloud/EdgeCom.2019.000-9}},
  year         = {{2019}},
}

@inproceedings{9613,
  abstract     = {{The ability to openly evaluate products, locations and services is an achievement of the Web 2.0. It has never been easier to inform oneself about the quality of products or services and possible alternatives. Forming one’s own opinion based on the impressions of other people can lead to better experiences. However, this presupposes trust in one’s fellows as well as in the quality of the review platforms. In previous work on physician reviews and the corresponding websites, it was observed that there occurs faulty behavior by some reviewers and there were noteworthy differences in the technical implementation of the portals and in the efforts of site operators to maintain high quality reviews. These experiences raise new questions regarding what trust means on review platforms, how trust arises and how easily it can be destroyed.}},
  author       = {{Kersting, Joschka and Bäumer, Frederik Simon and Geierhos, Michaela}},
  booktitle    = {{Proceedings of the 4th International Conference on Internet of Things, Big Data and Security}},
  editor       = {{Ramachandran, Muthu and Walters, Robert and Wills, Gary and Méndez Muñoz, Víctor and Chang, Victor}},
  isbn         = {{978-989-758-369-8}},
  keywords     = {{Trust, Physician Reviews, Network Analysis}},
  location     = {{Heraklion, Greece}},
  pages        = {{147--155}},
  publisher    = {{SCITEPRESS}},
  title        = {{{In Reviews We Trust: But Should We? Experiences with Physician Review Websites}}},
  year         = {{2019}},
}

@inproceedings{9809,
  abstract     = {{Remarkable advantages of Containers (CNs) over Virtual Machines (VMs) such as lower overhead and faster startup has gained the attention of Communication Service Providers (CSPs) as using CNs for providing Virtual Network Functions (VNFs) can save costs while increasing the service agility. However, as it is not feasible to realise all types of VNFs in CNs, the coexistence of VMs and CNs is proposed. To put VMs and CNs together, an orchestration framework that can chain services across distributed and heterogeneous domains is required. To this end, we implemented a framework by extending and consolidating state-of-the-art tools and technologies originated from Network Function Virtualization (NFV), Software-defined Networking (SDN) and cloud computing environments. This framework chains services provisioned across Kubernetes and OpenStack domains. During the demo, we deploy a service consist of CN- and VM-based VNFs to demonstrate different features provided by our framework.}},
  author       = {{Razzaghi Kouchaksaraei, Hadi and Karl, Holger}},
  booktitle    = {{13th ACM International Conference on Distributed and Event-based Systems}},
  keywords     = {{Network Function Virtualization, Software-defined Networking, Cloud Computing, service orchestration, OpenStack, Kubernetes}},
  location     = {{Darmstadt}},
  title        = {{{Service Function Chaining Across OpenStack and Kubernetes Domains}}},
  doi          = {{10.1145/3328905.3332505}},
  year         = {{2019}},
}

@inproceedings{15368,
  abstract     = {{Service Level Agreements are essential tools enabling clients and telco operators to specify required quality of service. The 5GTANGO NFV platform enables SLAs through policies and custom service lifecycle management components. This allows the operator to trigger certain lifecycle management events for a service, and the network service developer to define how to execute such events (e.g., how to scale). In this demo we will demonstrate this unique 5GTANGO concept using an elastic proxy service supported by a high availability SLA enforced through a range of traffic regimes.}},
  author       = {{Soenen, Thomas and Vicens, Felipe and Bonnet, José and Parada, Carlos and Kapassa, Evgenia and Touloupou, Marious and Fotopulou, Eleni and Zafeiropoulos, Anastasios and Pol, Ana and Kolometsos, Stavros and Xilouris, George and Alemany, Pol and Vilalta, Ricard and Trakadas, Panos and Karkazis, Panos and Peuster, Manuel and Tavernier, Wouter}},
  booktitle    = {{2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}},
  issn         = {{1573-0077}},
  keywords     = {{5G mobile communication, contracts, quality of service, telecommunication traffic, virtualisation, custom service lifecycle management components, lifecycle management events, network service developer, elastic proxy service, SLA-controlled proxy service, customisable MANO, operator policies, Service Level Agreements, unique 5G TANGO concept, 5G TANGO NFV platform, quality of service, traffic regimes, high availability SLA, Monitoring, Probes, Portals, Quality of service, Tools, Servers, Graphical user interfaces}},
  location     = {{Arlington, VA, USA, USA}},
  pages        = {{707--708}},
  title        = {{{SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies}}},
  year         = {{2019}},
}

@article{17666,
  abstract     = {{Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions.}},
  author       = {{Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}},
  issn         = {{0167-739X}},
  journal      = {{Future Generation Computer Systems}},
  keywords     = {{Software defined networks, Network function virtualization, Cyber attacks, Cyber security, Defense efficiency, Overlay networks}},
  title        = {{{Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}}},
  doi          = {{https://doi.org/10.1016/j.future.2018.08.011}},
  year         = {{2018}},
}

@inproceedings{1156,
  abstract     = {{In this paper, we present an IoT architecture which handles stream sensor data of air pollution. Particle pollution is known as a serious threat to human health. Along with developments in the use of wireless sensors and the IoT, we propose an architecture that flexibly measures and processes stream data collected in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread network of wireless sensors that can follow changes in human behavior. Apart from stating reasons for the need of such a development and its requirements, we provide a conceptual design as well as a technological design of such an architecture. The technological design consists of Kaa and Apache Storm which can collect air pollution information in real-time and solve various problems to process data such as missing data and synchronization. This enables us to add a simulation in which we provide issues that might come up when having our architecture in use. Together with these issues, we state r easons for choosing specific modules among candidates. Our architecture combines wireless sensors with the Kaa IoT framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management System among others. We even provide open-government data sets that are freely available.}},
  author       = {{Kersting, Joschka and Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}},
  booktitle    = {{Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security}},
  editor       = {{Ramachandran, Muthu and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert and Chang, Victor}},
  isbn         = {{978-989-758-245-5}},
  keywords     = {{Wireless Sensor Network, Internet of Things, Stream Data, Air Pollution, DSMS, Real-time Data Processing}},
  location     = {{Porto, Portugal}},
  pages        = {{117--124}},
  publisher    = {{SCITEPRESS}},
  title        = {{{Internet of Things Architecture for Handling Stream Air Pollution Data}}},
  doi          = {{10.5220/0006354801170124}},
  year         = {{2017}},
}

@article{9976,
  abstract     = {{State-of-the-art mechatronic systems offer inherent intelligence that enables them to autonomously adapt their behavior to current environmental conditions and to their own system state. This autonomous behavior adaptation is made possible by software in combination with complex sensor and actuator systems and by sophisticated information processing, all of which make these systems increasingly complex. This increasing complexity makes the design process a challenging task and brings new complex possibilities for operation and maintenance. However, with the risk of increased system complexity also comes the chance to adapt system behavior based on current reliability, which in turn increases reliability. The development of such an adaption strategy requires appropriate methods to evaluate reliability based on currently selected system behavior. A common approach to implement such adaptivity is to base system behavior on different working points that are obtained using multiobjective optimization. During operation, selection among these allows a changed operating strategy. To allow for multiobjective optimization, an accurate system model including system reliability is required. This model is repeatedly evaluated by the optimization algorithm. At present, modeling of system reliability and synchronization of the models of behavior and reliability is a laborious manual task and thus very error-prone. Since system behavior is crucial for system reliability, an integrated model is introduced that integrates system behavior and system reliability. The proposed approach is used to formulate reliability-related objective functions for a clutch test rig that are used to compute feasible working points using multiobjective optimization.}},
  author       = {{Kaul, Thorben and Meyer, Tobias and Sextro, Walter}},
  journal      = {{SAGE Journals}},
  keywords     = {{Integrated model, reliability, system behavior, Bayesian network, multiobjective optimization}},
  pages        = {{390 -- 399}},
  title        = {{{Formulation of reliability-related objective functions for design of intelligent mechatronic systems}}},
  doi          = {{10.1177/1748006X17709376}},
  volume       = {{Vol. 231(4)}},
  year         = {{2017}},
}

@article{1452,
  abstract     = {{Opinion leaders of an investment network can have a significant impact on capital mar-kets because their investment decisions are adopted by their peers and trigger large trad-ing cascades, increasing herding behavior and comovement among stock returns. This paper analyzes the interaction-based relations of traders from a large social trading plat-form and identifies the driving forces and the opinion leaders within a large online trading network as the nodes with the highest centrality and the highest force of infection, respec-tively. Relying on recent insights from epidemiological research, I maintain that central-ity identifies the most central traders in the network, while the expected force quantifies the most influential traders and their spreading power. I study the behavior and charac-teristics that set central and influential traders apart from other traders. The ability to identify focal points and their trading behavior within a trading network is important for investors, investment advisers, and policy makers.}},
  author       = {{Pelster, Matthias}},
  journal      = {{Proceedings of the International Conference on Information Systems}},
  keywords     = {{Online trading, investment advice, network modeling, Expected Force, herding.}},
  title        = {{{I’ll Have What S/he’s Having: A Case Study of a Social Trading Network}}},
  year         = {{2017}},
}

@inproceedings{17655,
  author       = {{Polevoy, Gleb and de Weerdt, M.M. and Jonker, C.M.}},
  booktitle    = {{Proceedings of the 2016 European Conference on Artificial Intelligence}},
  keywords     = {{agents, action, repeated reciprocation, fixed, floating, network, Nash equilibrium, social welfare, price of anarchy, price of stability, convex combination}},
  pages        = {{417--425}},
  title        = {{{The Game of Reciprocation Habits}}},
  doi          = {{10.3233/978-1-61499-672-9-417}},
  volume       = {{Volume 285: ECAI 2016}},
  year         = {{2016}},
}

@inproceedings{17660,
  author       = {{Polevoy, Gleb and de Weerdt, Mathijs M.}},
  booktitle    = {{Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems}},
  isbn         = {{978-1-4503-2738-1}},
  keywords     = {{dynamics, emotion modeling, negotiation, network interaction, shared effort game}},
  pages        = {{1741--1742}},
  publisher    = {{International Foundation for Autonomous Agents and Multiagent Systems}},
  title        = {{{Improving Human Interaction in Crowdsensing}}},
  year         = {{2014}},
}

@inproceedings{13322,
  abstract     = {{Previous research suggests the existence of sentiments in online social networks. In comparison to real life human interaction, in which sentiments have been shown to have an influence on human behaviour, it is not yet completely understood which mechanisms explain how sentiments influence users in online environments. We develop a theoretical framework that tries to bridge the gap between social influence theories that focus on offline interactions on one hand and online interaction in social networks on the other hand. We then test our hypothesis about the influence and dissemination of sentiments in a quantitative analysis that is based on retrieved textual messages of communication patterns in over 12000 online social networks. Our empirical results suggest a general influence of sentiments on node communication patterns that is evidenced by increased occurrences of subsequent messages that express the same sentiment polarization. We interpret these findings and suggest future research to advance our currently limited theories that assume perceived and generalized social influence to path-dependent social influence models that consider actual behaviour.}},
  author       = {{Hillmann, Robert and Trier, Matthias}},
  booktitle    = {{ECIS 2013 Proceedings}},
  isbn         = {{9783834924421}},
  keywords     = {{Social Network Analysis, Sentiment Analysis, Communication Patterns}},
  publisher    = {{Association for Information Systems. AIS Electronic Library (AISeL)}},
  title        = {{{Influence and Dissemination Of Sentiments in Social Network Communication Patterns}}},
  year         = {{2013}},
}

@inproceedings{11891,
  abstract     = {{In this paper we present a combined hardware/software approach for synchronizing the sampling clocks of an acoustic sensor network. A first clock frequency offset estimate is obtained by a time stamp exchange protocol with a low data rate and computational requirements. The estimate is then postprocessed by a Kalman filter which exploits the specific properties of the statistics of the frequency offset estimation error. In long term experiments the deviation between the sampling oscillators of two sensor nodes never exceeded half a sample with a wired and with a wireless link between the nodes. The achieved precision enables the estimation of time difference of arrival values across different hardware devices without sharing a common sampling hardware.}},
  author       = {{Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}},
  booktitle    = {{21th European Signal Processing Conference (EUSIPCO 2013)}},
  keywords     = {{synchronization, acoustic sensor network}},
  title        = {{{Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model}}},
  year         = {{2013}},
}

@inproceedings{13326,
  abstract     = {{Communication within online social network applications enables users to express and share sentiments electronically. Existing studies examined the existence or distribution of sentiments in online communication at a general level or in small-observed groups. Our paper extends this research by analyzing sentiment exchange within social networks from an ego-network perspective. We draw from research on social influence and social attachment to develop theories of node polarization, balance effects and sentiment mirroring within communication dyads. Our empirical analysis covers a multitude of social networks in which the sentiment valence of all messages was determined. Subsequently we studied ego-networks of focal actors (ego) and their immediate contacts. Results support our theories and indicate that actors develop polarized sentiments towards individual peers but keep sentiment in balance on the ego-network level. Further, pairs of nodes tend to establish similar attitudes towards each other leading to stable and polarized positive or negative relationships}},
  author       = {{Hillmann, Robert and Trier, Matthias}},
  booktitle    = {{AMCIS 2012 Proceedings}},
  editor       = {{Joshi, K.D. and Yoo, Youngjin}},
  keywords     = {{Social Network Analysis, Ego-Network Analysis, Node Polarization, Sentiment Dissemination}},
  publisher    = {{Association for Information Systems. AIS Electronic Library (AISeL)}},
  title        = {{{Sentiment Polarization and Balance among Users in Online Social Networks}}},
  volume       = {{24}},
  year         = {{2012}},
}

@inproceedings{13331,
  abstract     = {{Communication in online social networks has been analyzed for some time regarding the expression of sentiments. So far, very little is known about the relationship between sentiments and network emergence, dissemination patternsand possible differences between positive and negative sentiments. The dissemination patterns analyzed in this study consist of network motifs based on triples of actors and the ties among them. These motifs are associated with common social network effects to derive meaningful insights about dissemination activities. The data basis includes several thousand social networks with textual messages classified according to embedded positive and negative sentiments. Based on this data, sub-networks are extracted and analyzed with a dynamic network motif analysis to determine dissemination patterns and associated network effects. Results indicate that the emergence of digital social networks exhibits a strong tendency towards reciprocity, followed by the dominance ofhierarchy as an intermediate step leading to social clustering with hubs and transitivity effects for both positive and negative sentiments to the same extend. Sentiments embedded in exchanged textual messages do only play a secondary role in network emergence and do not express differences regarding the emergence of network patterns.}},
  author       = {{Hillmann, Robert and Trier, Matthias}},
  booktitle    = {{Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining}},
  isbn         = {{9780769547992}},
  keywords     = {{Social Network Analysis, Dynamic Network Motif Analysis, Sentiment Dissemination, Networking Effects, Triads}},
  pages        = {{510--515}},
  publisher    = {{IEEE}},
  title        = {{{Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks}}},
  year         = {{2012}},
}

@inproceedings{11806,
  abstract     = {{Microphone arrays represent the basis for many challenging acoustic sensing tasks. The accuracy of techniques like beamforming directly depends on a precise knowledge of the relative positions of the sensors used. Unfortunately, for certain use cases manually measuring the geometry of an array is not feasible due to practical constraints. In this paper we present an approach to unsupervised shape calibration of microphone array networks. We developed a hierarchical procedure that first performs local shape calibration based on coherence analysis and then employs SRP-PHAT in a network calibration method. Practical experiments demonstrate the effectiveness of our approach especially for highly reverberant acoustic environments.}},
  author       = {{Hennecke, Marius and Ploetz, Thomas and Fink, Gernot A. and Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}},
  booktitle    = {{IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)}},
  keywords     = {{acoustic sensing tasks, array geometry, calibration, coherence analysis, hierarchical procedure, local shape calibration, microphone array networks, microphone arrays, network calibration method, sensor arrays, SRP-PHAT, unsupervised shape calibration}},
  pages        = {{257--260}},
  title        = {{{A hierarchical approach to unsupervised shape calibration of microphone array networks}}},
  doi          = {{10.1109/SSP.2009.5278589}},
  year         = {{2009}},
}

@inproceedings{37063,
  abstract     = {{Safety-critical automotive systems must fulfill hard real-time constraints to guarantee their reliability and safety requirements. In the context of network-based electronics systems, high-level timing requirements have to be carefully mastered and traced throughout the whole development process. In this paper, we outline the management of scheduling-specific timing information by the application of a steer-by-wire design example. We apply the principles of the AUTOSAR-compliant Timing Augmented Description Language (TADL) following the methodology introduced by the TIMMO project[2]. Focus of the example will be the identification of end-to-end timing constraints and their refinement by means of stimuli-response event chains.}},
  author       = {{Klobedanz, Kay and Kuznik, Christoph and Elfeky, Ahmed and Müller, Wolfgang}},
  booktitle    = {{Proceedings of IESS09}},
  isbn         = {{978-3-642-04283-6}},
  keywords     = {{Abstraction Level     Controller Area Network     High Abstraction Level     Event Chain     Automotive System}},
  publisher    = {{Springer Verlag}},
  title        = {{{Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study}}},
  doi          = {{10.1007/978-3-642-04284-3_20}},
  year         = {{2009}},
}

@article{11820,
  abstract     = {{In this paper, we derive an uncertainty decoding rule for automatic speech recognition (ASR), which accounts for both corrupted observations and inter-frame correlation. The conditional independence assumption, prevalent in hidden Markov model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned on the complete observed feature vector sequence. This is a more informative posterior than one conditioned only on the current observation. The novel decoding is used to obtain a transmission-error robust remote ASR system, where the speech capturing unit is connected to the decoder via an error-prone communication network. We show how the clean speech posterior can be computed for communication links being characterized by either bit errors or packet loss. Recognition results are presented for both distributed and network speech recognition, where in the latter case common voice-over-IP codecs are employed.}},
  author       = {{Ion, Valentin and Haeb-Umbach, Reinhold}},
  journal      = {{IEEE Transactions on Audio, Speech, and Language Processing}},
  keywords     = {{automatic speech recognition, bit errors, codecs, communication links, corrupted observations, decoding, distributed speech recognition, error-prone communication network, feature vector sequence, hidden Markov model-based ASR, hidden Markov models, inter-frame correlation, Internet telephony, network speech recognition, packet loss, speech posterior, speech recognition, transmission error robust speech recognition, uncertainty decoding, voice-over-IP codecs}},
  number       = {{5}},
  pages        = {{1047--1060}},
  title        = {{{A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition}}},
  doi          = {{10.1109/TASL.2008.925879}},
  volume       = {{16}},
  year         = {{2008}},
}

@inbook{5218,
  abstract     = {{In order to avoid over-regulation, some countries have experimented with what might be called threat-based regulation. The idea is - similarly to the contestable market model - that actual regulation may not be necessary as long as the threat of regulation is credible. In that case, so the idea, even monopolies will abstain from setting monopolistic prices in order to avoid being regulated. As experience from Germany and New Zealand has demonstrated, there are quite a number of problems associated with threat-based regulatory systems. The most significant problem has turned out to be the likely under-regulation and according welfare losses from market power, and in this context, a critical issue that has been identified is the credibility of the regulatory threat. If the threat of regulation is not credible, a light-handed regulatory regime (LHRR) amounts to leaving monopolistic firms unregulated, clearly an undesirable situation from a welfare point of view. This failure of threat-based regulatory systems results from potential free-rider problems associated with good corporate behaviour (as in the case of Germany's electricity market) as well as the lack of credibility of the threat either because of the weakness of the enforcement authorities or due to political constraints. Furthermore, a problem emerges if exercising the threat of regulation implies an abandonment of the LHRR and a corresponding substitution with heavy-handed ex ante regulation. An innovative way out of this dilemma has been the quasi-automatic threshold system originally designed for New Zealand's electricity distribution networks, which aims at simulating the pressures that companies would face in competitive markets. }},
  author       = {{Haucap, Justus and Heimeshoff, Ulrich and Uhde, André}},
  booktitle    = {{REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY}},
  editor       = {{Welfens, P.}},
  keywords     = {{light-handed regulation, network industries, electricity, telecommunications}},
  pages        = {{171--202}},
  title        = {{{Credible Threats as an Instrument of Regulation for Network Industries}}},
  year         = {{2006}},
}

@inproceedings{39071,
  abstract     = {{The interconnection of software components is a key to enabling collaborative work. However, technology differences and security barriers like firewalls often hinder establishing collaborative infrastructures between enterprises or even within a single enterprise. We introduce a peer-to-peer based network infrastructure that transparently overcomes these problems using relay and routing mechanisms as well as different underlying transport protocols. We discuss the application of this technology to interconnect Web services.}},
  author       = {{Schattkowsky, Tim and Loeser, Chris and Müller, Wolfgang}},
  booktitle    = {{Proceedings of AINA2004}},
  isbn         = {{0-7695-2051-0}},
  keywords     = {{Peer to peer computing, Web services, Intelligent networks, Routing, Relays, Simple object access protocol, Collaborative work, Transport protocols, Network address translation, Java}},
  location     = {{Fukuoka, Japan }},
  publisher    = {{IEEE}},
  title        = {{{Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks}}},
  doi          = {{10.1109/AINA.2004.1283977}},
  year         = {{2004}},
}

