[{"year":"2020","citation":{"ieee":"J. Heitkaemper, J. Schmalenstroeer, and R. Haeb-Umbach, “Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments,” 2020.","chicago":"Heitkaemper, Jens, Joerg Schmalenstroeer, and Reinhold Haeb-Umbach. “Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments.” In <i>INTERSPEECH 2020 Virtual Shanghai China</i>, 2020.","ama":"Heitkaemper J, Schmalenstroeer J, Haeb-Umbach R. Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments. In: <i>INTERSPEECH 2020 Virtual Shanghai China</i>. ; 2020.","apa":"Heitkaemper, J., Schmalenstroeer, J., &#38; Haeb-Umbach, R. (2020). Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments. <i>INTERSPEECH 2020 Virtual Shanghai China</i>.","bibtex":"@inproceedings{Heitkaemper_Schmalenstroeer_Haeb-Umbach_2020, title={Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments}, booktitle={INTERSPEECH 2020 Virtual Shanghai China}, author={Heitkaemper, Jens and Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}, year={2020} }","mla":"Heitkaemper, Jens, et al. “Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments.” <i>INTERSPEECH 2020 Virtual Shanghai China</i>, 2020.","short":"J. Heitkaemper, J. Schmalenstroeer, R. Haeb-Umbach, in: INTERSPEECH 2020 Virtual Shanghai China, 2020."},"has_accepted_license":"1","title":"Statistical and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic Environments","date_updated":"2023-10-26T08:28:49Z","date_created":"2020-11-25T15:03:19Z","author":[{"first_name":"Jens","full_name":"Heitkaemper, Jens","id":"27643","last_name":"Heitkaemper"},{"first_name":"Joerg","full_name":"Schmalenstroeer, Joerg","id":"460","last_name":"Schmalenstroeer"},{"last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242","first_name":"Reinhold"}],"abstract":[{"text":"Speech activity detection (SAD), which often rests on the fact that the noise is \"more'' stationary than speech, is particularly challenging in non-stationary environments, because the time variance of the acoustic scene makes it difficult to discriminate  speech from noise. We propose two approaches to SAD, where one is based on statistical signal processing, while the other utilizes neural networks. The former employs sophisticated signal processing to track the noise and speech energies and is meant to support the case for a resource efficient, unsupervised signal processing approach.\r\nThe latter introduces a recurrent network layer that operates on short segments of the input speech to do temporal smoothing in the presence of non-stationary noise. The systems are tested on the Fearless Steps challenge database, which consists of the transmission data from the Apollo-11 space mission.\r\nThe statistical SAD  achieves comparable detection performance to earlier proposed neural network based SADs, while the neural network based approach leads to a decision cost function of 1.07% on the evaluation set of the 2020 Fearless Steps Challenge, which sets a new state of the art.","lang":"eng"}],"file":[{"file_name":"ms.pdf","access_level":"closed","file_id":"20697","file_size":998706,"date_created":"2020-12-11T12:33:04Z","creator":"jensheit","date_updated":"2020-12-11T12:33:04Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","type":"conference","publication":"INTERSPEECH 2020 Virtual Shanghai China","ddc":["000"],"keyword":["voice activity detection","speech activity detection","neural network","statistical speech processing"],"language":[{"iso":"eng"}],"file_date_updated":"2020-12-11T12:33:04Z","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"20505","user_id":"460","department":[{"_id":"54"}]},{"extern":"1","_id":"17667","department":[{"_id":"63"},{"_id":"541"}],"user_id":"83983","series_title":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","status":"public","type":"conference","doi":"10.1109/CSCloud/EdgeCom.2019.000-9","conference":{"name":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)"},"main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8854057/authors#authors"}],"date_updated":"2022-01-06T06:53:16Z","author":[{"last_name":"Koning","full_name":"Koning, Ralph","first_name":"Ralph"},{"first_name":"Gleb","last_name":"Polevoy","full_name":"Polevoy, Gleb","id":"83983"},{"first_name":"Lydia","last_name":"Meijer","full_name":"Meijer, Lydia"},{"full_name":"de Laat, Cees","last_name":"de Laat","first_name":"Cees"},{"first_name":"Paola","last_name":"Grosso","full_name":"Grosso, Paola"}],"page":"113-123","citation":{"apa":"Koning, R., Polevoy, G., Meijer, L., de Laat, C., &#38; Grosso, P. (2019). Approaches for Collaborative Security Defences in Multi Network Environments. In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i> (pp. 113–123). <a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>","short":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123.","bibtex":"@inproceedings{Koning_Polevoy_Meijer_de Laat_Grosso_2019, series={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, title={Approaches for Collaborative Security Defences in Multi Network Environments}, DOI={<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>}, booktitle={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, author={Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}, year={2019}, pages={113–123}, collection={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)} }","mla":"Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi Network Environments.” <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–23, doi:<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>.","ama":"Koning R, Polevoy G, Meijer L, de Laat C, Grosso P. Approaches for Collaborative Security Defences in Multi Network Environments. In: <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). ; 2019:113-123. doi:<a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">10.1109/CSCloud/EdgeCom.2019.000-9</a>","chicago":"Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso. “Approaches for Collaborative Security Defences in Multi Network Environments.” In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 113–23. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019. <a href=\"https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9\">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>.","ieee":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for Collaborative Security Defences in Multi Network Environments,” in <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–123."},"publication_identifier":{"issn":["null"]},"keyword":["computer network security","multinetwork environments","multidomain defensive action","task execution order","timing influence defense efficiency","distributed attacks","collaborative security defence approach","minimize propagation approach","minimize countermeasure approach","counteract everywhere approach","Conferences","Cloud computing","Computer crime","Edge computing","Security","Defense Approaches","Multi-Domain Defense","Collaborative Defense","Defense Algorithms","Computer Networks"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack."}],"publication":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","title":"Approaches for Collaborative Security Defences in Multi Network Environments","date_created":"2020-08-06T15:23:23Z","year":"2019","quality_controlled":"1"},{"status":"public","editor":[{"last_name":"Ramachandran","full_name":"Ramachandran, Muthu","first_name":"Muthu"},{"first_name":"Robert","last_name":"Walters","full_name":"Walters, Robert"},{"first_name":"Gary","last_name":"Wills","full_name":"Wills, Gary"},{"first_name":"Víctor","full_name":"Méndez Muñoz, Víctor","last_name":"Méndez Muñoz"},{"last_name":"Chang","full_name":"Chang, Victor","first_name":"Victor"}],"type":"conference","file_date_updated":"2020-09-18T09:24:41Z","department":[{"_id":"1"},{"_id":"579"}],"user_id":"58701","_id":"9613","page":"147-155","citation":{"apa":"Kersting, J., Bäumer, F. S., &#38; Geierhos, M. (2019). In Reviews We Trust: But Should We? Experiences with Physician Review Websites. In M. Ramachandran, R. Walters, G. Wills, V. Méndez Muñoz, &#38; V. Chang (Eds.), <i>Proceedings of the 4th International Conference on Internet of Things, Big Data and Security</i> (pp. 147–155). Setúbal, Portugal: SCITEPRESS.","bibtex":"@inproceedings{Kersting_Bäumer_Geierhos_2019, place={Setúbal, Portugal}, title={In Reviews We Trust: But Should We? Experiences with Physician Review Websites}, booktitle={Proceedings of the 4th International Conference on Internet of Things, Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and Bäumer, Frederik Simon and Geierhos, Michaela}, editor={Ramachandran, Muthu and Walters, Robert and Wills, Gary and Méndez Muñoz, Víctor and Chang, VictorEditors}, year={2019}, pages={147–155} }","mla":"Kersting, Joschka, et al. “In Reviews We Trust: But Should We? Experiences with Physician Review Websites.” <i>Proceedings of the 4th International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran et al., SCITEPRESS, 2019, pp. 147–55.","short":"J. Kersting, F.S. Bäumer, M. Geierhos, in: M. Ramachandran, R. Walters, G. Wills, V. Méndez Muñoz, V. Chang (Eds.), Proceedings of the 4th International Conference on Internet of Things, Big Data and Security, SCITEPRESS, Setúbal, Portugal, 2019, pp. 147–155.","ama":"Kersting J, Bäumer FS, Geierhos M. In Reviews We Trust: But Should We? Experiences with Physician Review Websites. In: Ramachandran M, Walters R, Wills G, Méndez Muñoz V, Chang V, eds. <i>Proceedings of the 4th International Conference on Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS; 2019:147-155.","ieee":"J. Kersting, F. S. Bäumer, and M. Geierhos, “In Reviews We Trust: But Should We? Experiences with Physician Review Websites,” in <i>Proceedings of the 4th International Conference on Internet of Things, Big Data and Security</i>, Heraklion, Greece, 2019, pp. 147–155.","chicago":"Kersting, Joschka, Frederik Simon Bäumer, and Michaela Geierhos. “In Reviews We Trust: But Should We? Experiences with Physician Review Websites.” In <i>Proceedings of the 4th International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran, Robert Walters, Gary Wills, Víctor Méndez Muñoz, and Victor Chang, 147–55. Setúbal, Portugal: SCITEPRESS, 2019."},"place":"Setúbal, Portugal","has_accepted_license":"1","publication_identifier":{"unknown":["2184-4976"],"isbn":["978-989-758-369-8"]},"publication_status":"published","conference":{"start_date":"2019-05-02","name":"4th International Conference on Internet of Things, Big Data and Security (IoTBDS 2019)","location":"Heraklion, Greece","end_date":"2019-05-04"},"main_file_link":[{"url":"www.insticc.org/Primoris/Resources/PaperPdf.ashx?idPaper=77454"}],"author":[{"full_name":"Kersting, Joschka","id":"58701","last_name":"Kersting","first_name":"Joschka"},{"first_name":"Frederik Simon","last_name":"Bäumer","id":"38837","full_name":"Bäumer, Frederik Simon"},{"full_name":"Geierhos, Michaela","id":"42496","last_name":"Geierhos","orcid":"0000-0002-8180-5606","first_name":"Michaela"}],"date_updated":"2022-01-06T07:04:17Z","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1112502,"access_level":"closed","file_name":"Kersting et al. (2019), Kersting2019.pdf","file_id":"19573","date_updated":"2020-09-18T09:24:41Z","date_created":"2020-09-18T09:24:41Z","creator":"jkers"}],"abstract":[{"lang":"eng","text":"The ability to openly evaluate products, locations and services is an achievement of the Web 2.0. It has never been easier to inform oneself about the quality of products or services and possible alternatives. Forming one’s own opinion based on the impressions of other people can lead to better experiences. However, this presupposes trust in one’s fellows as well as in the quality of the review platforms. In previous work on physician reviews and the corresponding websites, it was observed that there occurs faulty behavior by some reviewers and there were noteworthy differences in the technical implementation of the portals and in the efforts of site operators to maintain high quality reviews. These experiences raise new questions regarding what trust means on review platforms, how trust arises and how easily it can be destroyed."}],"publication":"Proceedings of the 4th International Conference on Internet of Things, Big Data and Security","language":[{"iso":"eng"}],"keyword":["Trust","Physician Reviews","Network Analysis"],"ddc":["000"],"year":"2019","quality_controlled":"1","title":"In Reviews We Trust: But Should We? Experiences with Physician Review Websites","date_created":"2019-05-06T09:00:48Z","publisher":"SCITEPRESS"},{"_id":"9809","project":[{"name":"5G Programmable Infrastructure Converging disaggregated neTwork and compUte Resources","_id":"23","grant_number":"762057"},{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"department":[{"_id":"34"}],"user_id":"477","file_date_updated":"2019-08-26T09:09:50Z","type":"conference","status":"public","date_updated":"2022-01-06T07:04:21Z","author":[{"first_name":"Hadi","last_name":"Razzaghi Kouchaksaraei","id":"60845","full_name":"Razzaghi Kouchaksaraei, Hadi"},{"last_name":"Karl","full_name":"Karl, Holger","id":"126","first_name":"Holger"}],"doi":"10.1145/3328905.3332505","conference":{"name":"13th ACM International Conference on Distributed and Event-based Systems","start_date":"2019-06-24","end_date":"2019-06-28","location":"Darmstadt"},"has_accepted_license":"1","publication_status":"published","place":"Darmstadt","citation":{"ama":"Razzaghi Kouchaksaraei H, Karl H. Service Function Chaining Across OpenStack and Kubernetes Domains. In: <i>13th ACM International Conference on Distributed and Event-Based Systems</i>. Darmstadt; 2019. doi:<a href=\"https://doi.org/10.1145/3328905.3332505\">10.1145/3328905.3332505</a>","chicago":"Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining Across OpenStack and Kubernetes Domains.” In <i>13th ACM International Conference on Distributed and Event-Based Systems</i>. Darmstadt, 2019. <a href=\"https://doi.org/10.1145/3328905.3332505\">https://doi.org/10.1145/3328905.3332505</a>.","ieee":"H. Razzaghi Kouchaksaraei and H. Karl, “Service Function Chaining Across OpenStack and Kubernetes Domains,” in <i>13th ACM International Conference on Distributed and Event-based Systems</i>, Darmstadt, 2019.","short":"H. Razzaghi Kouchaksaraei, H. Karl, in: 13th ACM International Conference on Distributed and Event-Based Systems, Darmstadt, 2019.","bibtex":"@inproceedings{Razzaghi Kouchaksaraei_Karl_2019, place={Darmstadt}, title={Service Function Chaining Across OpenStack and Kubernetes Domains}, DOI={<a href=\"https://doi.org/10.1145/3328905.3332505\">10.1145/3328905.3332505</a>}, booktitle={13th ACM International Conference on Distributed and Event-based Systems}, author={Razzaghi Kouchaksaraei, Hadi and Karl, Holger}, year={2019} }","mla":"Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining Across OpenStack and Kubernetes Domains.” <i>13th ACM International Conference on Distributed and Event-Based Systems</i>, 2019, doi:<a href=\"https://doi.org/10.1145/3328905.3332505\">10.1145/3328905.3332505</a>.","apa":"Razzaghi Kouchaksaraei, H., &#38; Karl, H. (2019). Service Function Chaining Across OpenStack and Kubernetes Domains. In <i>13th ACM International Conference on Distributed and Event-based Systems</i>. Darmstadt. <a href=\"https://doi.org/10.1145/3328905.3332505\">https://doi.org/10.1145/3328905.3332505</a>"},"keyword":["Network Function Virtualization","Software-defined Networking","Cloud Computing","service orchestration","OpenStack","Kubernetes"],"ddc":["004"],"language":[{"iso":"eng"}],"publication":"13th ACM International Conference on Distributed and Event-based Systems","abstract":[{"lang":"eng","text":"Remarkable advantages of Containers (CNs) over Virtual Machines (VMs) such as lower overhead and faster startup has gained the attention of Communication Service Providers (CSPs) as using CNs for providing Virtual Network Functions (VNFs) can save costs while increasing the service agility. However, as it is not feasible to realise all types of VNFs in CNs, the coexistence of VMs and CNs is proposed. To put VMs and CNs together, an orchestration framework that can chain services across distributed and heterogeneous domains is required. To this end, we implemented a framework by extending and consolidating state-of-the-art tools and technologies originated from Network Function Virtualization (NFV), Software-defined Networking (SDN) and cloud computing environments. This framework chains services provisioned across Kubernetes and OpenStack domains. During the demo, we deploy a service consist of CN- and VM-based VNFs to demonstrate different features provided by our framework."}],"file":[{"creator":"ups","date_created":"2019-08-26T09:09:50Z","date_updated":"2019-08-26T09:09:50Z","file_name":"p240-Kouchaksaraei.pdf","file_id":"12953","access_level":"closed","file_size":1206037,"content_type":"application/pdf","relation":"main_file"}],"date_created":"2019-05-14T05:43:57Z","title":"Service Function Chaining Across OpenStack and Kubernetes Domains","year":"2019"},{"date_created":"2019-12-18T06:54:18Z","author":[{"first_name":"Thomas","last_name":"Soenen","full_name":"Soenen, Thomas"},{"first_name":"Felipe","last_name":"Vicens","full_name":"Vicens, Felipe"},{"full_name":"Bonnet, José","last_name":"Bonnet","first_name":"José"},{"full_name":"Parada, Carlos","last_name":"Parada","first_name":"Carlos"},{"last_name":"Kapassa","full_name":"Kapassa, Evgenia","first_name":"Evgenia"},{"last_name":"Touloupou","full_name":"Touloupou, Marious","first_name":"Marious"},{"last_name":"Fotopulou","full_name":"Fotopulou, Eleni","first_name":"Eleni"},{"last_name":"Zafeiropoulos","full_name":"Zafeiropoulos, Anastasios","first_name":"Anastasios"},{"last_name":"Pol","full_name":"Pol, Ana","first_name":"Ana"},{"last_name":"Kolometsos","full_name":"Kolometsos, Stavros","first_name":"Stavros"},{"first_name":"George","last_name":"Xilouris","full_name":"Xilouris, George"},{"full_name":"Alemany, Pol","last_name":"Alemany","first_name":"Pol"},{"full_name":"Vilalta, Ricard","last_name":"Vilalta","first_name":"Ricard"},{"first_name":"Panos","full_name":"Trakadas, Panos","last_name":"Trakadas"},{"first_name":"Panos","full_name":"Karkazis, Panos","last_name":"Karkazis"},{"last_name":"Peuster","id":"13271","full_name":"Peuster, Manuel","first_name":"Manuel"},{"first_name":"Wouter","last_name":"Tavernier","full_name":"Tavernier, Wouter"}],"date_updated":"2022-01-06T06:52:21Z","conference":{"name":"IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","location":"Arlington, VA, USA, USA"},"main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8717922"}],"title":"SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies","publication_identifier":{"issn":["1573-0077"]},"page":"707-708","citation":{"chicago":"Soenen, Thomas, Felipe Vicens, José Bonnet, Carlos Parada, Evgenia Kapassa, Marious Touloupou, Eleni Fotopulou, et al. “SLA-Controlled Proxy Service Through Customisable MANO Supporting Operator Policies.” In <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>, 707–8, 2019.","ieee":"T. Soenen <i>et al.</i>, “SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies,” in <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>, Arlington, VA, USA, USA, 2019, pp. 707–708.","ama":"Soenen T, Vicens F, Bonnet J, et al. SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies. In: <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>. ; 2019:707-708.","apa":"Soenen, T., Vicens, F., Bonnet, J., Parada, C., Kapassa, E., Touloupou, M., … Tavernier, W. (2019). SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies. In <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i> (pp. 707–708). Arlington, VA, USA, USA.","short":"T. Soenen, F. Vicens, J. Bonnet, C. Parada, E. Kapassa, M. Touloupou, E. Fotopulou, A. Zafeiropoulos, A. Pol, S. Kolometsos, G. Xilouris, P. Alemany, R. Vilalta, P. Trakadas, P. Karkazis, M. Peuster, W. Tavernier, in: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019, pp. 707–708.","mla":"Soenen, Thomas, et al. “SLA-Controlled Proxy Service Through Customisable MANO Supporting Operator Policies.” <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>, 2019, pp. 707–08.","bibtex":"@inproceedings{Soenen_Vicens_Bonnet_Parada_Kapassa_Touloupou_Fotopulou_Zafeiropoulos_Pol_Kolometsos_et al._2019, title={SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies}, booktitle={2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, author={Soenen, Thomas and Vicens, Felipe and Bonnet, José and Parada, Carlos and Kapassa, Evgenia and Touloupou, Marious and Fotopulou, Eleni and Zafeiropoulos, Anastasios and Pol, Ana and Kolometsos, Stavros and et al.}, year={2019}, pages={707–708} }"},"year":"2019","user_id":"13271","_id":"15368","project":[{"grant_number":"761493","name":"5G Development and validation platform for global industry-specific network services and Apps","_id":"28"}],"language":[{"iso":"eng"}],"keyword":["5G mobile communication","contracts","quality of service","telecommunication traffic","virtualisation","custom service lifecycle management components","lifecycle management events","network service developer","elastic proxy service","SLA-controlled proxy service","customisable MANO","operator policies","Service Level Agreements","unique 5G TANGO concept","5G TANGO NFV platform","quality of service","traffic regimes","high availability SLA","Monitoring","Probes","Portals","Quality of service","Tools","Servers","Graphical user interfaces"],"publication":"2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","type":"conference","status":"public","abstract":[{"text":"Service Level Agreements are essential tools enabling clients and telco operators to specify required quality of service. The 5GTANGO NFV platform enables SLAs through policies and custom service lifecycle management components. This allows the operator to trigger certain lifecycle management events for a service, and the network service developer to define how to execute such events (e.g., how to scale). In this demo we will demonstrate this unique 5GTANGO concept using an elastic proxy service supported by a high availability SLA enforced through a range of traffic regimes.","lang":"eng"}]},{"title":"Measuring the efficiency of SDN mitigations against attacks on computer infrastructures","doi":"https://doi.org/10.1016/j.future.2018.08.011","date_updated":"2022-01-06T06:53:16Z","date_created":"2020-08-06T15:23:11Z","author":[{"last_name":"Koning","full_name":"Koning, R.","first_name":"R."},{"last_name":"de Graaff","full_name":"de Graaff, B.","first_name":"B."},{"first_name":"Gleb","last_name":"Polevoy","full_name":"Polevoy, Gleb","id":"83983"},{"first_name":"R.","last_name":"Meijer","full_name":"Meijer, R."},{"last_name":"de Laat","full_name":"de Laat, C.","first_name":"C."},{"last_name":"Grosso","full_name":"Grosso, P.","first_name":"P."}],"year":"2018","citation":{"ama":"Koning R, de Graaff B, Polevoy G, Meijer R, de Laat C, Grosso P. Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. <i>Future Generation Computer Systems</i>. 2018. doi:<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>","ieee":"R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, and P. Grosso, “Measuring the efficiency of SDN mitigations against attacks on computer infrastructures,” <i>Future Generation Computer Systems</i>, 2018.","chicago":"Koning, R., B. de Graaff, Gleb Polevoy, R. Meijer, C. de Laat, and P. Grosso. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” <i>Future Generation Computer Systems</i>, 2018. <a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>.","apa":"Koning, R., de Graaff, B., Polevoy, G., Meijer, R., de Laat, C., &#38; Grosso, P. (2018). Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. <i>Future Generation Computer Systems</i>. <a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>","bibtex":"@article{Koning_de Graaff_Polevoy_Meijer_de Laat_Grosso_2018, title={Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}, DOI={<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>}, journal={Future Generation Computer Systems}, author={Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}, year={2018} }","mla":"Koning, R., et al. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” <i>Future Generation Computer Systems</i>, 2018, doi:<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>.","short":"R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, P. Grosso, Future Generation Computer Systems (2018)."},"publication_identifier":{"issn":["0167-739X"]},"keyword":["Software defined networks","Network function virtualization","Cyber attacks","Cyber security","Defense efficiency","Overlay networks"],"language":[{"iso":"eng"}],"extern":"1","_id":"17666","department":[{"_id":"63"},{"_id":"541"}],"user_id":"83983","abstract":[{"lang":"eng","text":"Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions."}],"status":"public","publication":"Future Generation Computer Systems","type":"journal_article"},{"author":[{"first_name":"Joschka","id":"58701","full_name":"Kersting, Joschka","last_name":"Kersting"},{"full_name":"Geierhos, Michaela","id":"42496","orcid":"0000-0002-8180-5606","last_name":"Geierhos","first_name":"Michaela"},{"full_name":"Jung, Hanmin","last_name":"Jung","first_name":"Hanmin"},{"last_name":"Kim","full_name":"Kim, Taehong","first_name":"Taehong"}],"date_updated":"2022-01-06T06:51:03Z","doi":"10.5220/0006354801170124","conference":{"start_date":"2017-04-24","name":"2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017)","location":"Porto, Portugal","end_date":"2017-04-26"},"has_accepted_license":"1","publication_identifier":{"isbn":["978-989-758-245-5"]},"publication_status":"published","page":"117-124","citation":{"ama":"Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere V, Wills G, Walters R, Chang V, eds. <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS; 2017:117-124. doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>","chicago":"Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet of Things Architecture for Handling Stream Air Pollution Data.” In <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills, Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>.","ieee":"J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture for Handling Stream Air Pollution Data,” in <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, Porto, Portugal, 2017, pp. 117–124.","mla":"Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream Air Pollution Data.” <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran et al., SCITEPRESS, 2017, pp. 117–24, doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>.","short":"J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, SCITEPRESS, Setúbal, Portugal, 2017, pp. 117–124.","bibtex":"@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal}, title={Internet of Things Architecture for Handling Stream Air Pollution Data}, DOI={<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>}, booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert and Chang, VictorEditors}, year={2017}, pages={117–124} }","apa":"Kersting, J., Geierhos, M., Jung, H., &#38; Kim, T. (2017). Internet of Things Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, &#38; V. Chang (Eds.), <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i> (pp. 117–124). Setúbal, Portugal: SCITEPRESS. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>"},"place":"Setúbal, Portugal","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"user_id":"58701","_id":"1156","file_date_updated":"2020-09-18T09:09:27Z","type":"conference","status":"public","editor":[{"full_name":"Ramachandran, Muthu","last_name":"Ramachandran","first_name":"Muthu"},{"last_name":"Méndez Muñoz","full_name":"Méndez Muñoz, Víctor","first_name":"Víctor"},{"full_name":"Kantere, Verena","last_name":"Kantere","first_name":"Verena"},{"first_name":"Gary","last_name":"Wills","full_name":"Wills, Gary"},{"last_name":"Walters","full_name":"Walters, Robert","first_name":"Robert"},{"last_name":"Chang","full_name":"Chang, Victor","first_name":"Victor"}],"date_created":"2018-01-31T14:45:21Z","publisher":"SCITEPRESS","title":"Internet of Things Architecture for Handling Stream Air Pollution Data","quality_controlled":"1","year":"2017","language":[{"iso":"eng"}],"keyword":["Wireless Sensor Network","Internet of Things","Stream Data","Air Pollution","DSMS","Real-time Data Processing"],"ddc":["000"],"publication":"Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":2612566,"file_id":"19567","access_level":"closed","file_name":"IoTBDS_2017_50_final.pdf","date_updated":"2020-09-18T09:09:27Z","date_created":"2020-09-18T09:09:27Z","creator":"jkers"}],"abstract":[{"lang":"eng","text":"In this paper, we present an IoT architecture which handles stream sensor data of air pollution. Particle pollution is known as a serious threat to human health. Along with developments in the use of wireless sensors and the IoT, we propose an architecture that flexibly measures and processes stream data collected in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread network of wireless sensors that can follow changes in human behavior. Apart from stating reasons for the need of such a development and its requirements, we provide a conceptual design as well as a technological design of such an architecture. The technological design consists of Kaa and Apache Storm which can collect air pollution information in real-time and solve various problems to process data such as missing data and synchronization. This enables us to add a simulation in which we provide issues that might come up when having our architecture in use. Together with these issues, we state r easons for choosing specific modules among candidates. Our architecture combines wireless sensors with the Kaa IoT framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management System among others. We even provide open-government data sets that are freely available."}]},{"_id":"9976","user_id":"55222","department":[{"_id":"151"}],"keyword":["Integrated model","reliability","system behavior","Bayesian network","multiobjective optimization"],"language":[{"iso":"eng"}],"type":"journal_article","publication":"SAGE Journals","abstract":[{"text":"State-of-the-art mechatronic systems offer inherent intelligence that enables them to autonomously adapt their behavior to current environmental conditions and to their own system state. This autonomous behavior adaptation is made possible by software in combination with complex sensor and actuator systems and by sophisticated information processing, all of which make these systems increasingly complex. This increasing complexity makes the design process a challenging task and brings new complex possibilities for operation and maintenance. However, with the risk of increased system complexity also comes the chance to adapt system behavior based on current reliability, which in turn increases reliability. The development of such an adaption strategy requires appropriate methods to evaluate reliability based on currently selected system behavior. A common approach to implement such adaptivity is to base system behavior on different working points that are obtained using multiobjective optimization. During operation, selection among these allows a changed operating strategy. To allow for multiobjective optimization, an accurate system model including system reliability is required. This model is repeatedly evaluated by the optimization algorithm. At present, modeling of system reliability and synchronization of the models of behavior and reliability is a laborious manual task and thus very error-prone. Since system behavior is crucial for system reliability, an integrated model is introduced that integrates system behavior and system reliability. The proposed approach is used to formulate reliability-related objective functions for a clutch test rig that are used to compute feasible working points using multiobjective optimization.","lang":"eng"}],"status":"public","date_updated":"2019-09-16T10:20:49Z","author":[{"id":"14802","full_name":"Kaul, Thorben","last_name":"Kaul","first_name":"Thorben"},{"full_name":"Meyer, Tobias","last_name":"Meyer","first_name":"Tobias"},{"last_name":"Sextro","id":"21220","full_name":"Sextro, Walter","first_name":"Walter"}],"date_created":"2019-05-27T09:37:46Z","volume":"Vol. 231(4)","title":"Formulation of reliability-related objective functions for design of intelligent mechatronic systems","doi":"10.1177/1748006X17709376","quality_controlled":"1","year":"2017","citation":{"ieee":"T. Kaul, T. Meyer, and W. Sextro, “Formulation of reliability-related objective functions for design of intelligent mechatronic systems,” <i>SAGE Journals</i>, vol. Vol. 231(4), pp. 390–399, 2017.","chicago":"Kaul, Thorben, Tobias Meyer, and Walter Sextro. “Formulation of Reliability-Related Objective Functions for Design of Intelligent Mechatronic Systems.” <i>SAGE Journals</i> Vol. 231(4) (2017): 390–99. <a href=\"https://doi.org/10.1177/1748006X17709376\">https://doi.org/10.1177/1748006X17709376</a>.","ama":"Kaul T, Meyer T, Sextro W. Formulation of reliability-related objective functions for design of intelligent mechatronic systems. <i>SAGE Journals</i>. 2017;Vol. 231(4):390-399. doi:<a href=\"https://doi.org/10.1177/1748006X17709376\">10.1177/1748006X17709376</a>","apa":"Kaul, T., Meyer, T., &#38; Sextro, W. (2017). Formulation of reliability-related objective functions for design of intelligent mechatronic systems. <i>SAGE Journals</i>, <i>Vol. 231(4)</i>, 390–399. <a href=\"https://doi.org/10.1177/1748006X17709376\">https://doi.org/10.1177/1748006X17709376</a>","bibtex":"@article{Kaul_Meyer_Sextro_2017, title={Formulation of reliability-related objective functions for design of intelligent mechatronic systems}, volume={Vol. 231(4)}, DOI={<a href=\"https://doi.org/10.1177/1748006X17709376\">10.1177/1748006X17709376</a>}, journal={SAGE Journals}, author={Kaul, Thorben and Meyer, Tobias and Sextro, Walter}, year={2017}, pages={390–399} }","mla":"Kaul, Thorben, et al. “Formulation of Reliability-Related Objective Functions for Design of Intelligent Mechatronic Systems.” <i>SAGE Journals</i>, vol. Vol. 231(4), 2017, pp. 390–99, doi:<a href=\"https://doi.org/10.1177/1748006X17709376\">10.1177/1748006X17709376</a>.","short":"T. Kaul, T. Meyer, W. Sextro, SAGE Journals Vol. 231(4) (2017) 390–399."},"page":"390 - 399"},{"_id":"1452","user_id":"67265","department":[{"_id":"186"},{"_id":"578"}],"article_type":"original","keyword":["Online trading","investment advice","network modeling","Expected Force","herding."],"language":[{"iso":"eng"}],"type":"journal_article","publication":"Proceedings of the International Conference on Information Systems","abstract":[{"text":"Opinion leaders of an investment network can have a significant impact on capital mar-kets because their investment decisions are adopted by their peers and trigger large trad-ing cascades, increasing herding behavior and comovement among stock returns. This paper analyzes the interaction-based relations of traders from a large social trading plat-form and identifies the driving forces and the opinion leaders within a large online trading network as the nodes with the highest centrality and the highest force of infection, respec-tively. Relying on recent insights from epidemiological research, I maintain that central-ity identifies the most central traders in the network, while the expected force quantifies the most influential traders and their spreading power. I study the behavior and charac-teristics that set central and influential traders apart from other traders. The ability to identify focal points and their trading behavior within a trading network is important for investors, investment advisers, and policy makers.","lang":"eng"}],"urn":"14524","status":"public","date_updated":"2022-01-06T06:52:00Z","author":[{"first_name":"Matthias","id":"67265","full_name":"Pelster, Matthias","orcid":" https://orcid.org/0000-0001-5740-2420","last_name":"Pelster"}],"date_created":"2018-03-20T11:34:47Z","title":"I’ll Have What S/he’s Having: A Case Study of a Social Trading Network","publication_status":"published","year":"2017","citation":{"ama":"Pelster M. I’ll Have What S/he’s Having: A Case Study of a Social Trading Network. <i>Proceedings of the International Conference on Information Systems</i>. 2017.","ieee":"M. Pelster, “I’ll Have What S/he’s Having: A Case Study of a Social Trading Network,” <i>Proceedings of the International Conference on Information Systems</i>, 2017.","chicago":"Pelster, Matthias. “I’ll Have What S/He’s Having: A Case Study of a Social Trading Network.” <i>Proceedings of the International Conference on Information Systems</i>, 2017.","apa":"Pelster, M. (2017). I’ll Have What S/he’s Having: A Case Study of a Social Trading Network. <i>Proceedings of the International Conference on Information Systems</i>.","bibtex":"@article{Pelster_2017, title={I’ll Have What S/he’s Having: A Case Study of a Social Trading Network}, journal={Proceedings of the International Conference on Information Systems}, author={Pelster, Matthias}, year={2017} }","short":"M. Pelster, Proceedings of the International Conference on Information Systems (2017).","mla":"Pelster, Matthias. “I’ll Have What S/He’s Having: A Case Study of a Social Trading Network.” <i>Proceedings of the International Conference on Information Systems</i>, 2017."}},{"_id":"17655","department":[{"_id":"63"},{"_id":"541"}],"series_title":"Frontiers in Artificial Intelligence and Applications","user_id":"83983","keyword":["agents","action","repeated reciprocation","fixed","floating","network","Nash equilibrium","social welfare","price of anarchy","price of stability","convex combination"],"extern":"1","language":[{"iso":"eng"}],"publication":"Proceedings of the 2016 European Conference on Artificial Intelligence","type":"conference","status":"public","date_updated":"2022-01-06T06:53:16Z","volume":"Volume 285: ECAI 2016","author":[{"first_name":"Gleb","last_name":"Polevoy","full_name":"Polevoy, Gleb","id":"83983"},{"first_name":"M.M.","last_name":"de Weerdt","full_name":"de Weerdt, M.M."},{"first_name":"C.M.","full_name":"Jonker, C.M.","last_name":"Jonker"}],"date_created":"2020-08-06T15:20:30Z","title":"The Game of Reciprocation Habits","doi":"10.3233/978-1-61499-672-9-417","year":"2016","page":"417-425","citation":{"apa":"Polevoy, G., de Weerdt, M. M., &#38; Jonker, C. M. (2016). The Game of Reciprocation Habits. In <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i> (Vol. Volume 285: ECAI 2016, pp. 417–425). <a href=\"https://doi.org/10.3233/978-1-61499-672-9-417\">https://doi.org/10.3233/978-1-61499-672-9-417</a>","mla":"Polevoy, Gleb, et al. “The Game of Reciprocation Habits.” <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>, vol. Volume 285: ECAI 2016, 2016, pp. 417–25, doi:<a href=\"https://doi.org/10.3233/978-1-61499-672-9-417\">10.3233/978-1-61499-672-9-417</a>.","bibtex":"@inproceedings{Polevoy_de Weerdt_Jonker_2016, series={Frontiers in Artificial Intelligence and Applications}, title={The Game of Reciprocation Habits}, volume={Volume 285: ECAI 2016}, DOI={<a href=\"https://doi.org/10.3233/978-1-61499-672-9-417\">10.3233/978-1-61499-672-9-417</a>}, booktitle={Proceedings of the 2016 European Conference on Artificial Intelligence}, author={Polevoy, Gleb and de Weerdt, M.M. and Jonker, C.M.}, year={2016}, pages={417–425}, collection={Frontiers in Artificial Intelligence and Applications} }","short":"G. Polevoy, M.M. de Weerdt, C.M. Jonker, in: Proceedings of the 2016 European Conference on Artificial Intelligence, 2016, pp. 417–425.","ama":"Polevoy G, de Weerdt MM, Jonker CM. The Game of Reciprocation Habits. In: <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>. Vol Volume 285: ECAI 2016. Frontiers in Artificial Intelligence and Applications. ; 2016:417-425. doi:<a href=\"https://doi.org/10.3233/978-1-61499-672-9-417\">10.3233/978-1-61499-672-9-417</a>","chicago":"Polevoy, Gleb, M.M. de Weerdt, and C.M. Jonker. “The Game of Reciprocation Habits.” In <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>, Volume 285: ECAI 2016:417–25. Frontiers in Artificial Intelligence and Applications, 2016. <a href=\"https://doi.org/10.3233/978-1-61499-672-9-417\">https://doi.org/10.3233/978-1-61499-672-9-417</a>.","ieee":"G. Polevoy, M. M. de Weerdt, and C. M. Jonker, “The Game of Reciprocation Habits,” in <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>, 2016, vol. Volume 285: ECAI 2016, pp. 417–425."}},{"status":"public","publication":"Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems","type":"conference","keyword":["dynamics","emotion modeling","negotiation","network interaction","shared effort game"],"language":[{"iso":"eng"}],"extern":"1","_id":"17660","department":[{"_id":"63"},{"_id":"541"}],"series_title":"AAMAS '14","user_id":"83983","year":"2014","place":"Richland, SC","page":"1741-1742","citation":{"ama":"Polevoy G, de Weerdt MM. Improving Human Interaction in Crowdsensing. In: <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>. AAMAS ’14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems; 2014:1741-1742.","chicago":"Polevoy, Gleb, and Mathijs M. de Weerdt. “Improving Human Interaction in Crowdsensing.” In <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>, 1741–42. AAMAS ’14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems, 2014.","ieee":"G. Polevoy and M. M. de Weerdt, “Improving Human Interaction in Crowdsensing,” in <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems</i>, 2014, pp. 1741–1742.","apa":"Polevoy, G., &#38; de Weerdt, M. M. (2014). Improving Human Interaction in Crowdsensing. In <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems</i> (pp. 1741–1742). Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.","mla":"Polevoy, Gleb, and Mathijs M. de Weerdt. “Improving Human Interaction in Crowdsensing.” <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>, International Foundation for Autonomous Agents and Multiagent Systems, 2014, pp. 1741–42.","bibtex":"@inproceedings{Polevoy_de Weerdt_2014, place={Richland, SC}, series={AAMAS ’14}, title={Improving Human Interaction in Crowdsensing}, booktitle={Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems}, publisher={International Foundation for Autonomous Agents and Multiagent Systems}, author={Polevoy, Gleb and de Weerdt, Mathijs M.}, year={2014}, pages={1741–1742}, collection={AAMAS ’14} }","short":"G. Polevoy, M.M. de Weerdt, in: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems, International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 2014, pp. 1741–1742."},"publication_identifier":{"isbn":["978-1-4503-2738-1"]},"title":"Improving Human Interaction in Crowdsensing","date_updated":"2022-01-06T06:53:16Z","publisher":"International Foundation for Autonomous Agents and Multiagent Systems","date_created":"2020-08-06T15:21:35Z","author":[{"id":"83983","full_name":"Polevoy, Gleb","last_name":"Polevoy","first_name":"Gleb"},{"first_name":"Mathijs M.","last_name":"de Weerdt","full_name":"de Weerdt, Mathijs M."}]},{"title":"Influence and Dissemination Of Sentiments in Social Network Communication Patterns","date_updated":"2022-01-06T06:51:33Z","publisher":"Association for Information Systems. AIS Electronic Library (AISeL)","date_created":"2019-09-19T11:38:37Z","author":[{"first_name":"Robert","last_name":"Hillmann","full_name":"Hillmann, Robert"},{"first_name":"Matthias","last_name":"Trier","id":"72744","full_name":"Trier, Matthias"}],"year":"2013","citation":{"apa":"Hillmann, R., &#38; Trier, M. (2013). Influence and Dissemination Of Sentiments in Social Network Communication Patterns. In <i>ECIS 2013 Proceedings</i>. Association for Information Systems. AIS Electronic Library (AISeL).","mla":"Hillmann, Robert, and Matthias Trier. “Influence and Dissemination Of Sentiments in Social Network Communication Patterns.” <i>ECIS 2013 Proceedings</i>, Association for Information Systems. AIS Electronic Library (AISeL), 2013.","short":"R. Hillmann, M. Trier, in: ECIS 2013 Proceedings, Association for Information Systems. AIS Electronic Library (AISeL), 2013.","bibtex":"@inproceedings{Hillmann_Trier_2013, title={Influence and Dissemination Of Sentiments in Social Network Communication Patterns}, booktitle={ECIS 2013 Proceedings}, publisher={Association for Information Systems. AIS Electronic Library (AISeL)}, author={Hillmann, Robert and Trier, Matthias}, year={2013} }","ama":"Hillmann R, Trier M. Influence and Dissemination Of Sentiments in Social Network Communication Patterns. In: <i>ECIS 2013 Proceedings</i>. Association for Information Systems. AIS Electronic Library (AISeL); 2013.","ieee":"R. Hillmann and M. Trier, “Influence and Dissemination Of Sentiments in Social Network Communication Patterns,” in <i>ECIS 2013 Proceedings</i>, 2013.","chicago":"Hillmann, Robert, and Matthias Trier. “Influence and Dissemination Of Sentiments in Social Network Communication Patterns.” In <i>ECIS 2013 Proceedings</i>. Association for Information Systems. AIS Electronic Library (AISeL), 2013."},"publication_identifier":{"isbn":["9783834924421"]},"keyword":["Social Network Analysis","Sentiment Analysis","Communication Patterns"],"language":[{"iso":"eng"}],"_id":"13322","user_id":"62809","department":[{"_id":"198"}],"abstract":[{"text":"Previous research suggests the existence of sentiments in online social networks. In comparison to real life human interaction, in which sentiments have been shown to have an influence on human behaviour, it is not yet completely understood which mechanisms explain how sentiments influence users in online environments. We develop a theoretical framework that tries to bridge the gap between social influence theories that focus on offline interactions on one hand and online interaction in social networks on the other hand. We then test our hypothesis about the influence and dissemination of sentiments in a quantitative analysis that is based on retrieved textual messages of communication patterns in over 12000 online social networks. Our empirical results suggest a general influence of sentiments on node communication patterns that is evidenced by increased occurrences of subsequent messages that express the same sentiment polarization. We interpret these findings and suggest future research to advance our currently limited theories that assume perceived and generalized social influence to path-dependent social influence models that consider actual behaviour.","lang":"eng"}],"status":"public","type":"conference","publication":"ECIS 2013 Proceedings"},{"main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2013/SchHaeb2013.pdf","open_access":"1"}],"title":"Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model","author":[{"first_name":"Joerg","full_name":"Schmalenstroeer, Joerg","id":"460","last_name":"Schmalenstroeer"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242"}],"date_created":"2019-07-12T05:30:15Z","oa":"1","date_updated":"2023-10-26T08:11:01Z","citation":{"bibtex":"@inproceedings{Schmalenstroeer_Haeb-Umbach_2013, title={Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model}, booktitle={21th European Signal Processing Conference (EUSIPCO 2013)}, author={Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}, year={2013} }","short":"J. Schmalenstroeer, R. Haeb-Umbach, in: 21th European Signal Processing Conference (EUSIPCO 2013), 2013.","mla":"Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model.” <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>, 2013.","apa":"Schmalenstroeer, J., &#38; Haeb-Umbach, R. (2013). Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model. <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>.","ieee":"J. Schmalenstroeer and R. Haeb-Umbach, “Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model,” 2013.","chicago":"Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model.” In <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>, 2013.","ama":"Schmalenstroeer J, Haeb-Umbach R. Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model. In: <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>. ; 2013."},"year":"2013","related_material":{"link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2013/SchHaeb2013_Presentation.pdf","relation":"supplementary_material","description":"Presentation"}]},"quality_controlled":"1","language":[{"iso":"eng"}],"keyword":["synchronization","acoustic sensor network"],"department":[{"_id":"54"}],"user_id":"460","_id":"11891","status":"public","abstract":[{"text":"In this paper we present a combined hardware/software approach for synchronizing the sampling clocks of an acoustic sensor network. A first clock frequency offset estimate is obtained by a time stamp exchange protocol with a low data rate and computational requirements. The estimate is then postprocessed by a Kalman filter which exploits the specific properties of the statistics of the frequency offset estimation error. In long term experiments the deviation between the sampling oscillators of two sensor nodes never exceeded half a sample with a wired and with a wireless link between the nodes. The achieved precision enables the estimation of time difference of arrival values across different hardware devices without sharing a common sampling hardware.","lang":"eng"}],"publication":"21th European Signal Processing Conference (EUSIPCO 2013)","type":"conference"},{"department":[{"_id":"198"}],"user_id":"62809","_id":"13326","language":[{"iso":"eng"}],"keyword":["Social Network Analysis","Ego-Network Analysis","Node Polarization","Sentiment Dissemination"],"publication":"AMCIS 2012 Proceedings","type":"conference","status":"public","editor":[{"full_name":"Joshi, K.D.","last_name":"Joshi","first_name":"K.D."},{"first_name":"Youngjin","full_name":"Yoo, Youngjin","last_name":"Yoo"}],"abstract":[{"lang":"eng","text":"Communication within online social network applications enables users to express and share sentiments electronically. Existing studies examined the existence or distribution of sentiments in online communication at a general level or in small-observed groups. Our paper extends this research by analyzing sentiment exchange within social networks from an ego-network perspective. We draw from research on social influence and social attachment to develop theories of node polarization, balance effects and sentiment mirroring within communication dyads. Our empirical analysis covers a multitude of social networks in which the sentiment valence of all messages was determined. Subsequently we studied ego-networks of focal actors (ego) and their immediate contacts. Results support our theories and indicate that actors develop polarized sentiments towards individual peers but keep sentiment in balance on the ego-network level. Further, pairs of nodes tend to establish similar attitudes towards each other leading to stable and polarized positive or negative relationships"}],"volume":24,"date_created":"2019-09-19T12:22:08Z","author":[{"first_name":"Robert","last_name":"Hillmann","full_name":"Hillmann, Robert"},{"id":"72744","full_name":"Trier, Matthias","last_name":"Trier","first_name":"Matthias"}],"date_updated":"2022-01-06T06:51:33Z","publisher":"Association for Information Systems. AIS Electronic Library (AISeL)","title":"Sentiment Polarization and Balance among Users in Online Social Networks","intvolume":"        24","citation":{"ama":"Hillmann R, Trier M. Sentiment Polarization and Balance among Users in Online Social Networks. In: Joshi KD, Yoo Y, eds. <i>AMCIS 2012 Proceedings</i>. Vol 24. Association for Information Systems. AIS Electronic Library (AISeL); 2012.","chicago":"Hillmann, Robert, and Matthias Trier. “Sentiment Polarization and Balance among Users in Online Social Networks.” In <i>AMCIS 2012 Proceedings</i>, edited by K.D. Joshi and Youngjin Yoo, Vol. 24. Association for Information Systems. AIS Electronic Library (AISeL), 2012.","ieee":"R. Hillmann and M. Trier, “Sentiment Polarization and Balance among Users in Online Social Networks,” in <i>AMCIS 2012 Proceedings</i>, 2012, vol. 24.","apa":"Hillmann, R., &#38; Trier, M. (2012). Sentiment Polarization and Balance among Users in Online Social Networks. In K. D. Joshi &#38; Y. Yoo (Eds.), <i>AMCIS 2012 Proceedings</i> (Vol. 24). Association for Information Systems. AIS Electronic Library (AISeL).","mla":"Hillmann, Robert, and Matthias Trier. “Sentiment Polarization and Balance among Users in Online Social Networks.” <i>AMCIS 2012 Proceedings</i>, edited by K.D. Joshi and Youngjin Yoo, vol. 24, Association for Information Systems. AIS Electronic Library (AISeL), 2012.","short":"R. Hillmann, M. Trier, in: K.D. Joshi, Y. Yoo (Eds.), AMCIS 2012 Proceedings, Association for Information Systems. AIS Electronic Library (AISeL), 2012.","bibtex":"@inproceedings{Hillmann_Trier_2012, title={Sentiment Polarization and Balance among Users in Online Social Networks}, volume={24}, booktitle={AMCIS 2012 Proceedings}, publisher={Association for Information Systems. AIS Electronic Library (AISeL)}, author={Hillmann, Robert and Trier, Matthias}, editor={Joshi, K.D. and Yoo, YoungjinEditors}, year={2012} }"},"year":"2012"},{"publication_identifier":{"isbn":["9780769547992"]},"place":"United States","year":"2012","page":"510-515","citation":{"ama":"Hillmann R, Trier M. Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks. In: <i>Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</i>. United States: IEEE; 2012:510-515.","ieee":"R. Hillmann and M. Trier, “Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks,” in <i>Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</i>, 2012, pp. 510–515.","chicago":"Hillmann, Robert, and Matthias Trier. “Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks.” In <i>Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</i>, 510–15. United States: IEEE, 2012.","bibtex":"@inproceedings{Hillmann_Trier_2012, place={United States}, title={Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks}, booktitle={Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining}, publisher={IEEE}, author={Hillmann, Robert and Trier, Matthias}, year={2012}, pages={510–515} }","short":"R. Hillmann, M. Trier, in: Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, IEEE, United States, 2012, pp. 510–515.","mla":"Hillmann, Robert, and Matthias Trier. “Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks.” <i>Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</i>, IEEE, 2012, pp. 510–15.","apa":"Hillmann, R., &#38; Trier, M. (2012). Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks. In <i>Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</i> (pp. 510–515). United States: IEEE."},"date_updated":"2022-01-06T06:51:33Z","publisher":"IEEE","author":[{"first_name":"Robert","full_name":"Hillmann, Robert","last_name":"Hillmann"},{"last_name":"Trier","full_name":"Trier, Matthias","id":"72744","first_name":"Matthias"}],"date_created":"2019-09-19T12:49:33Z","title":"Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks","publication":"Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","type":"conference","abstract":[{"text":"Communication in online social networks has been analyzed for some time regarding the expression of sentiments. So far, very little is known about the relationship between sentiments and network emergence, dissemination patternsand possible differences between positive and negative sentiments. The dissemination patterns analyzed in this study consist of network motifs based on triples of actors and the ties among them. These motifs are associated with common social network effects to derive meaningful insights about dissemination activities. The data basis includes several thousand social networks with textual messages classified according to embedded positive and negative sentiments. Based on this data, sub-networks are extracted and analyzed with a dynamic network motif analysis to determine dissemination patterns and associated network effects. Results indicate that the emergence of digital social networks exhibits a strong tendency towards reciprocity, followed by the dominance ofhierarchy as an intermediate step leading to social clustering with hubs and transitivity effects for both positive and negative sentiments to the same extend. Sentiments embedded in exchanged textual messages do only play a secondary role in network emergence and do not express differences regarding the emergence of network patterns.","lang":"eng"}],"status":"public","_id":"13331","department":[{"_id":"198"}],"user_id":"62809","keyword":["Social Network Analysis","Dynamic Network Motif Analysis","Sentiment Dissemination","Networking Effects","Triads"],"language":[{"iso":"eng"}]},{"quality_controlled":"1","citation":{"ieee":"M. Hennecke, T. Ploetz, G. A. Fink, J. Schmalenstroeer, and R. Haeb-Umbach, “A hierarchical approach to unsupervised shape calibration of microphone array networks,” in <i>IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)</i>, 2009, pp. 257–260, doi: <a href=\"https://doi.org/10.1109/SSP.2009.5278589\">10.1109/SSP.2009.5278589</a>.","chicago":"Hennecke, Marius, Thomas Ploetz, Gernot A. Fink, Joerg Schmalenstroeer, and Reinhold Haeb-Umbach. “A Hierarchical Approach to Unsupervised Shape Calibration of Microphone Array Networks.” In <i>IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)</i>, 257–60, 2009. <a href=\"https://doi.org/10.1109/SSP.2009.5278589\">https://doi.org/10.1109/SSP.2009.5278589</a>.","ama":"Hennecke M, Ploetz T, Fink GA, Schmalenstroeer J, Haeb-Umbach R. A hierarchical approach to unsupervised shape calibration of microphone array networks. In: <i>IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)</i>. ; 2009:257-260. doi:<a href=\"https://doi.org/10.1109/SSP.2009.5278589\">10.1109/SSP.2009.5278589</a>","apa":"Hennecke, M., Ploetz, T., Fink, G. A., Schmalenstroeer, J., &#38; Haeb-Umbach, R. (2009). A hierarchical approach to unsupervised shape calibration of microphone array networks. <i>IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)</i>, 257–260. <a href=\"https://doi.org/10.1109/SSP.2009.5278589\">https://doi.org/10.1109/SSP.2009.5278589</a>","mla":"Hennecke, Marius, et al. “A Hierarchical Approach to Unsupervised Shape Calibration of Microphone Array Networks.” <i>IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)</i>, 2009, pp. 257–60, doi:<a href=\"https://doi.org/10.1109/SSP.2009.5278589\">10.1109/SSP.2009.5278589</a>.","short":"M. Hennecke, T. Ploetz, G.A. Fink, J. Schmalenstroeer, R. Haeb-Umbach, in: IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009), 2009, pp. 257–260.","bibtex":"@inproceedings{Hennecke_Ploetz_Fink_Schmalenstroeer_Haeb-Umbach_2009, title={A hierarchical approach to unsupervised shape calibration of microphone array networks}, DOI={<a href=\"https://doi.org/10.1109/SSP.2009.5278589\">10.1109/SSP.2009.5278589</a>}, booktitle={IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)}, author={Hennecke, Marius and Ploetz, Thomas and Fink, Gernot A. and Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}, year={2009}, pages={257–260} }"},"page":"257-260","year":"2009","author":[{"first_name":"Marius","last_name":"Hennecke","full_name":"Hennecke, Marius"},{"first_name":"Thomas","full_name":"Ploetz, Thomas","last_name":"Ploetz"},{"full_name":"Fink, Gernot A.","last_name":"Fink","first_name":"Gernot A."},{"first_name":"Joerg","full_name":"Schmalenstroeer, Joerg","id":"460","last_name":"Schmalenstroeer"},{"last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242","first_name":"Reinhold"}],"date_created":"2019-07-12T05:28:37Z","date_updated":"2023-10-26T08:09:22Z","oa":"1","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2009/HePlFiScHa09.pdf","open_access":"1"}],"doi":"10.1109/SSP.2009.5278589","title":"A hierarchical approach to unsupervised shape calibration of microphone array networks","type":"conference","publication":"IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)","status":"public","abstract":[{"lang":"eng","text":"Microphone arrays represent the basis for many challenging acoustic sensing tasks. The accuracy of techniques like beamforming directly depends on a precise knowledge of the relative positions of the sensors used. Unfortunately, for certain use cases manually measuring the geometry of an array is not feasible due to practical constraints. In this paper we present an approach to unsupervised shape calibration of microphone array networks. We developed a hierarchical procedure that first performs local shape calibration based on coherence analysis and then employs SRP-PHAT in a network calibration method. Practical experiments demonstrate the effectiveness of our approach especially for highly reverberant acoustic environments."}],"user_id":"460","department":[{"_id":"54"}],"_id":"11806","language":[{"iso":"eng"}],"keyword":["acoustic sensing tasks","array geometry","calibration","coherence analysis","hierarchical procedure","local shape calibration","microphone array networks","microphone arrays","network calibration method","sensor arrays","SRP-PHAT","unsupervised shape calibration"]},{"citation":{"apa":"Klobedanz, K., Kuznik, C., Elfeky, A., &#38; Müller, W. (2009). Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study. <i>Proceedings of IESS09</i>. <a href=\"https://doi.org/10.1007/978-3-642-04284-3_20\">https://doi.org/10.1007/978-3-642-04284-3_20</a>","short":"K. Klobedanz, C. Kuznik, A. Elfeky, W. Müller, in: Proceedings of IESS09, Springer Verlag, 2009.","mla":"Klobedanz, Kay, et al. “Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study.” <i>Proceedings of IESS09</i>, Springer Verlag, 2009, doi:<a href=\"https://doi.org/10.1007/978-3-642-04284-3_20\">10.1007/978-3-642-04284-3_20</a>.","bibtex":"@inproceedings{Klobedanz_Kuznik_Elfeky_Müller_2009, title={Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-04284-3_20\">10.1007/978-3-642-04284-3_20</a>}, booktitle={Proceedings of IESS09}, publisher={Springer Verlag}, author={Klobedanz, Kay and Kuznik, Christoph and Elfeky, Ahmed and Müller, Wolfgang}, year={2009} }","chicago":"Klobedanz, Kay, Christoph Kuznik, Ahmed Elfeky, and Wolfgang Müller. “Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study.” In <i>Proceedings of IESS09</i>. Springer Verlag, 2009. <a href=\"https://doi.org/10.1007/978-3-642-04284-3_20\">https://doi.org/10.1007/978-3-642-04284-3_20</a>.","ieee":"K. Klobedanz, C. Kuznik, A. Elfeky, and W. Müller, “Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study,” 2009, doi: <a href=\"https://doi.org/10.1007/978-3-642-04284-3_20\">10.1007/978-3-642-04284-3_20</a>.","ama":"Klobedanz K, Kuznik C, Elfeky A, Müller W. Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study. In: <i>Proceedings of IESS09</i>. Springer Verlag; 2009. doi:<a href=\"https://doi.org/10.1007/978-3-642-04284-3_20\">10.1007/978-3-642-04284-3_20</a>"},"year":"2009","publication_identifier":{"isbn":["978-3-642-04283-6"]},"doi":"10.1007/978-3-642-04284-3_20","title":"Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study","date_created":"2023-01-17T11:42:03Z","author":[{"first_name":"Kay","full_name":"Klobedanz, Kay","last_name":"Klobedanz"},{"full_name":"Kuznik, Christoph","last_name":"Kuznik","first_name":"Christoph"},{"last_name":"Elfeky","full_name":"Elfeky, Ahmed","first_name":"Ahmed"},{"first_name":"Wolfgang","last_name":"Müller","id":"16243","full_name":"Müller, Wolfgang"}],"publisher":"Springer Verlag","date_updated":"2023-01-17T11:42:08Z","status":"public","abstract":[{"lang":"eng","text":"Safety-critical automotive systems must fulfill hard real-time constraints to guarantee their reliability and safety requirements. In the context of network-based electronics systems, high-level timing requirements have to be carefully mastered and traced throughout the whole development process. In this paper, we outline the management of scheduling-specific timing information by the application of a steer-by-wire design example. We apply the principles of the AUTOSAR-compliant Timing Augmented Description Language (TADL) following the methodology introduced by the TIMMO project[2]. Focus of the example will be the identification of end-to-end timing constraints and their refinement by means of stimuli-response event chains."}],"type":"conference","publication":"Proceedings of IESS09","language":[{"iso":"eng"}],"keyword":["Abstraction Level     Controller Area Network     High Abstraction Level     Event Chain     Automotive System"],"user_id":"5786","department":[{"_id":"672"}],"_id":"37063"},{"page":"1047-1060","intvolume":"        16","citation":{"bibtex":"@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition}, volume={16}, DOI={<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>}, number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing}, author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060} }","mla":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, 2008, pp. 1047–60, doi:<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>.","short":"V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language Processing 16 (2008) 1047–1060.","apa":"Ion, V., &#38; Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, <i>16</i>(5), 1047–1060. <a href=\"https://doi.org/10.1109/TASL.2008.925879\">https://doi.org/10.1109/TASL.2008.925879</a>","ama":"Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech, and Language Processing</i>. 2008;16(5):1047-1060. doi:<a href=\"https://doi.org/10.1109/TASL.2008.925879\">10.1109/TASL.2008.925879</a>","chicago":"Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions on Audio, Speech, and Language Processing</i> 16, no. 5 (2008): 1047–60. <a href=\"https://doi.org/10.1109/TASL.2008.925879\">https://doi.org/10.1109/TASL.2008.925879</a>.","ieee":"V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition,” <i>IEEE Transactions on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, pp. 1047–1060, 2008."},"year":"2008","issue":"5","doi":"10.1109/TASL.2008.925879","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf","open_access":"1"}],"title":"A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust Speech Recognition","volume":16,"date_created":"2019-07-12T05:28:53Z","author":[{"first_name":"Valentin","last_name":"Ion","full_name":"Ion, Valentin"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242"}],"date_updated":"2022-01-06T06:51:10Z","oa":"1","status":"public","abstract":[{"text":"In this paper, we derive an uncertainty decoding rule for automatic speech recognition (ASR), which accounts for both corrupted observations and inter-frame correlation. The conditional independence assumption, prevalent in hidden Markov model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned on the complete observed feature vector sequence. This is a more informative posterior than one conditioned only on the current observation. The novel decoding is used to obtain a transmission-error robust remote ASR system, where the speech capturing unit is connected to the decoder via an error-prone communication network. We show how the clean speech posterior can be computed for communication links being characterized by either bit errors or packet loss. Recognition results are presented for both distributed and network speech recognition, where in the latter case common voice-over-IP codecs are employed.","lang":"eng"}],"publication":"IEEE Transactions on Audio, Speech, and Language Processing","type":"journal_article","language":[{"iso":"eng"}],"keyword":["automatic speech recognition","bit errors","codecs","communication links","corrupted observations","decoding","distributed speech recognition","error-prone communication network","feature vector sequence","hidden Markov model-based ASR","hidden Markov models","inter-frame correlation","Internet telephony","network speech recognition","packet loss","speech posterior","speech recognition","transmission error robust speech recognition","uncertainty decoding","voice-over-IP codecs"],"department":[{"_id":"54"}],"user_id":"44006","_id":"11820"},{"status":"public","abstract":[{"lang":"eng","text":"In order to avoid over-regulation, some countries have experimented with what might be called threat-based regulation. The idea is - similarly to the contestable market model - that actual regulation may not be necessary as long as the threat of regulation is credible. In that case, so the idea, even monopolies will abstain from setting monopolistic prices in order to avoid being regulated. As experience from Germany and New Zealand has demonstrated, there are quite a number of problems associated with threat-based regulatory systems. The most significant problem has turned out to be the likely under-regulation and according welfare losses from market power, and in this context, a critical issue that has been identified is the credibility of the regulatory threat. If the threat of regulation is not credible, a light-handed regulatory regime (LHRR) amounts to leaving monopolistic firms unregulated, clearly an undesirable situation from a welfare point of view. This failure of threat-based regulatory systems results from potential free-rider problems associated with good corporate behaviour (as in the case of Germany's electricity market) as well as the lack of credibility of the threat either because of the weakness of the enforcement authorities or due to political constraints. Furthermore, a problem emerges if exercising the threat of regulation implies an abandonment of the LHRR and a corresponding substitution with heavy-handed ex ante regulation. An innovative way out of this dilemma has been the quasi-automatic threshold system originally designed for New Zealand's electricity distribution networks, which aims at simulating the pressures that companies would face in competitive markets. "}],"editor":[{"full_name":"Welfens, P.","last_name":"Welfens","first_name":"P."}],"type":"book_chapter","publication":"REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY","extern":"1","language":[{"iso":"eng"}],"keyword":["light-handed regulation","network industries","electricity","telecommunications"],"user_id":"21810","department":[{"_id":"186"},{"_id":"188"}],"_id":"5218","citation":{"bibtex":"@inbook{Haucap_Heimeshoff_Uhde_2006, place={Berlin}, title={Credible Threats as an Instrument of Regulation for Network Industries}, booktitle={REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY}, author={Haucap, Justus and Heimeshoff, Ulrich and Uhde, André}, editor={Welfens, P.Editor}, year={2006}, pages={171–202} }","mla":"Haucap, Justus, et al. “Credible Threats as an Instrument of Regulation for Network Industries.” <i>REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i>, edited by P. Welfens, 2006, pp. 171–202.","short":"J. Haucap, U. Heimeshoff, A. Uhde, in: P. Welfens (Ed.), REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY, Berlin, 2006, pp. 171–202.","apa":"Haucap, J., Heimeshoff, U., &#38; Uhde, A. (2006). Credible Threats as an Instrument of Regulation for Network Industries. In P. Welfens (Ed.), <i>REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i> (pp. 171–202). Berlin.","ieee":"J. Haucap, U. Heimeshoff, and A. Uhde, “Credible Threats as an Instrument of Regulation for Network Industries,” in <i>REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i>, P. Welfens, Ed. Berlin, 2006, pp. 171–202.","chicago":"Haucap, Justus, Ulrich Heimeshoff, and André Uhde. “Credible Threats as an Instrument of Regulation for Network Industries.” In <i>REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i>, edited by P. Welfens, 171–202. Berlin, 2006.","ama":"Haucap J, Heimeshoff U, Uhde A. Credible Threats as an Instrument of Regulation for Network Industries. In: Welfens P, ed. <i>REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i>. Berlin; 2006:171-202."},"jel":["L96","L94","L50","K23"],"page":"171-202","place":"Berlin","year":"2006","publication_status":"published","title":"Credible Threats as an Instrument of Regulation for Network Industries","date_created":"2018-10-31T14:18:42Z","author":[{"full_name":"Haucap, Justus","last_name":"Haucap","first_name":"Justus"},{"first_name":"Ulrich","full_name":"Heimeshoff, Ulrich","last_name":"Heimeshoff"},{"first_name":"André","full_name":"Uhde, André","id":"36049","orcid":"https://orcid.org/0000-0002-8058-8857","last_name":"Uhde"}],"date_updated":"2022-01-06T07:01:47Z"},{"citation":{"ama":"Schattkowsky T, Loeser C, Müller W. Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks. In: <i>Proceedings of AINA2004</i>. IEEE; 2004. doi:<a href=\"https://doi.org/10.1109/AINA.2004.1283977\">10.1109/AINA.2004.1283977</a>","ieee":"T. Schattkowsky, C. Loeser, and W. Müller, “Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks,” presented at the  18th International Conference on Advanced Information Networking and Applications, Fukuoka, Japan , 2004, doi: <a href=\"https://doi.org/10.1109/AINA.2004.1283977\">10.1109/AINA.2004.1283977</a>.","chicago":"Schattkowsky, Tim, Chris Loeser, and Wolfgang Müller. “Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks.” In <i>Proceedings of AINA2004</i>. Fukuoka, Japan : IEEE, 2004. <a href=\"https://doi.org/10.1109/AINA.2004.1283977\">https://doi.org/10.1109/AINA.2004.1283977</a>.","bibtex":"@inproceedings{Schattkowsky_Loeser_Müller_2004, place={Fukuoka, Japan }, title={Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks}, DOI={<a href=\"https://doi.org/10.1109/AINA.2004.1283977\">10.1109/AINA.2004.1283977</a>}, booktitle={Proceedings of AINA2004}, publisher={IEEE}, author={Schattkowsky, Tim and Loeser, Chris and Müller, Wolfgang}, year={2004} }","mla":"Schattkowsky, Tim, et al. “Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks.” <i>Proceedings of AINA2004</i>, IEEE, 2004, doi:<a href=\"https://doi.org/10.1109/AINA.2004.1283977\">10.1109/AINA.2004.1283977</a>.","short":"T. Schattkowsky, C. Loeser, W. Müller, in: Proceedings of AINA2004, IEEE, Fukuoka, Japan , 2004.","apa":"Schattkowsky, T., Loeser, C., &#38; Müller, W. (2004). Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks. <i>Proceedings of AINA2004</i>.  18th International Conference on Advanced Information Networking and Applications, Fukuoka, Japan . <a href=\"https://doi.org/10.1109/AINA.2004.1283977\">https://doi.org/10.1109/AINA.2004.1283977</a>"},"year":"2004","place":"Fukuoka, Japan ","publication_identifier":{"isbn":["0-7695-2051-0"]},"doi":"10.1109/AINA.2004.1283977","conference":{"location":"Fukuoka, Japan ","name":" 18th International Conference on Advanced Information Networking and Applications"},"title":"Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks","date_created":"2023-01-24T09:05:58Z","author":[{"last_name":"Schattkowsky","full_name":"Schattkowsky, Tim","first_name":"Tim"},{"full_name":"Loeser, Chris","last_name":"Loeser","first_name":"Chris"},{"first_name":"Wolfgang","last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243"}],"publisher":"IEEE","date_updated":"2023-01-24T09:06:02Z","status":"public","abstract":[{"text":"The interconnection of software components is a key to enabling collaborative work. However, technology differences and security barriers like firewalls often hinder establishing collaborative infrastructures between enterprises or even within a single enterprise. We introduce a peer-to-peer based network infrastructure that transparently overcomes these problems using relay and routing mechanisms as well as different underlying transport protocols. We discuss the application of this technology to interconnect Web services.","lang":"eng"}],"type":"conference","publication":"Proceedings of AINA2004","language":[{"iso":"eng"}],"keyword":["Peer to peer computing","Web services","Intelligent networks","Routing","Relays","Simple object access protocol","Collaborative work","Transport protocols","Network address translation","Java"],"user_id":"5786","department":[{"_id":"672"}],"_id":"39071"}]
