---
_id: '20504'
abstract:
- lang: eng
  text: 'In recent years time domain speech separation has excelled over frequency
    domain separation in single channel scenarios and noise-free environments. In
    this paper we dissect the gains of the time-domain audio separation network (TasNet)
    approach by gradually replacing components of an utterance-level permutation invariant
    training (u-PIT) based separation system in the frequency domain until the TasNet
    system is reached, thus blending components of frequency domain approaches with
    those of time domain approaches. Some of the intermediate variants achieve comparable
    signal-to-distortion ratio (SDR) gains to TasNet, but retain the advantage of
    frequency domain processing: compatibility with classic signal processing tools
    such as frequency-domain beamforming and the human interpretability of the masks.
    Furthermore, we show that the scale invariant signal-to-distortion ratio (si-SDR)
    criterion used as loss function in TasNet is related to a logarithmic mean square
    error criterion and that it is this criterion which contributes most reliable
    to the performance advantage of TasNet. Finally, we critically assess which gains
    in a noise-free single channel environment generalize to more realistic reverberant
    conditions.'
author:
- first_name: Jens
  full_name: Heitkaemper, Jens
  id: '27643'
  last_name: Heitkaemper
- first_name: Darius
  full_name: Jakobeit, Darius
  last_name: Jakobeit
- first_name: Christoph
  full_name: Boeddeker, Christoph
  id: '40767'
  last_name: Boeddeker
- first_name: Lukas
  full_name: Drude, Lukas
  last_name: Drude
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Heitkaemper J, Jakobeit D, Boeddeker C, Drude L, Haeb-Umbach R. Demystifying
    TasNet: A Dissecting Approach. In: <i>ICASSP 2020 Virtual Barcelona Spain</i>.
    ; 2020.'
  apa: 'Heitkaemper, J., Jakobeit, D., Boeddeker, C., Drude, L., &#38; Haeb-Umbach,
    R. (2020). Demystifying TasNet: A Dissecting Approach. <i>ICASSP 2020 Virtual
    Barcelona Spain</i>.'
  bibtex: '@inproceedings{Heitkaemper_Jakobeit_Boeddeker_Drude_Haeb-Umbach_2020, title={Demystifying
    TasNet: A Dissecting Approach}, booktitle={ICASSP 2020 Virtual Barcelona Spain},
    author={Heitkaemper, Jens and Jakobeit, Darius and Boeddeker, Christoph and Drude,
    Lukas and Haeb-Umbach, Reinhold}, year={2020} }'
  chicago: 'Heitkaemper, Jens, Darius Jakobeit, Christoph Boeddeker, Lukas Drude,
    and Reinhold Haeb-Umbach. “Demystifying TasNet: A Dissecting Approach.” In <i>ICASSP
    2020 Virtual Barcelona Spain</i>, 2020.'
  ieee: 'J. Heitkaemper, D. Jakobeit, C. Boeddeker, L. Drude, and R. Haeb-Umbach,
    “Demystifying TasNet: A Dissecting Approach,” 2020.'
  mla: 'Heitkaemper, Jens, et al. “Demystifying TasNet: A Dissecting Approach.” <i>ICASSP
    2020 Virtual Barcelona Spain</i>, 2020.'
  short: 'J. Heitkaemper, D. Jakobeit, C. Boeddeker, L. Drude, R. Haeb-Umbach, in:
    ICASSP 2020 Virtual Barcelona Spain, 2020.'
date_created: 2020-11-25T14:56:53Z
date_updated: 2022-01-13T08:47:32Z
ddc:
- '000'
department:
- _id: '54'
file:
- access_level: closed
  content_type: application/pdf
  creator: jensheit
  date_created: 2020-12-11T12:36:37Z
  date_updated: 2020-12-11T12:36:37Z
  file_id: '20699'
  file_name: ms.pdf
  file_size: 3871374
  relation: main_file
  success: 1
file_date_updated: 2020-12-11T12:36:37Z
has_accepted_license: '1'
keyword:
- voice activity detection
- speech activity detection
- neural network
- statistical speech processing
language:
- iso: eng
project:
- _id: '52'
  name: 'PC2: Computing Resources Provided by the Paderborn Center for Parallel Computing'
publication: ICASSP 2020 Virtual Barcelona Spain
quality_controlled: '1'
status: public
title: 'Demystifying TasNet: A Dissecting Approach'
type: conference
user_id: '40767'
year: '2020'
...
---
_id: '20505'
abstract:
- lang: eng
  text: "Speech activity detection (SAD), which often rests on the fact that the noise
    is \"more'' stationary than speech, is particularly challenging in non-stationary
    environments, because the time variance of the acoustic scene makes it difficult
    to discriminate  speech from noise. We propose two approaches to SAD, where one
    is based on statistical signal processing, while the other utilizes neural networks.
    The former employs sophisticated signal processing to track the noise and speech
    energies and is meant to support the case for a resource efficient, unsupervised
    signal processing approach.\r\nThe latter introduces a recurrent network layer
    that operates on short segments of the input speech to do temporal smoothing in
    the presence of non-stationary noise. The systems are tested on the Fearless Steps
    challenge database, which consists of the transmission data from the Apollo-11
    space mission.\r\nThe statistical SAD  achieves comparable detection performance
    to earlier proposed neural network based SADs, while the neural network based
    approach leads to a decision cost function of 1.07% on the evaluation set of the
    2020 Fearless Steps Challenge, which sets a new state of the art."
author:
- first_name: Jens
  full_name: Heitkaemper, Jens
  id: '27643'
  last_name: Heitkaemper
- first_name: Joerg
  full_name: Schmalenstroeer, Joerg
  id: '460'
  last_name: Schmalenstroeer
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Heitkaemper J, Schmalenstroeer J, Haeb-Umbach R. Statistical and Neural Network
    Based Speech Activity Detection in Non-Stationary Acoustic Environments. In: <i>INTERSPEECH
    2020 Virtual Shanghai China</i>. ; 2020.'
  apa: Heitkaemper, J., Schmalenstroeer, J., &#38; Haeb-Umbach, R. (2020). Statistical
    and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic
    Environments. <i>INTERSPEECH 2020 Virtual Shanghai China</i>.
  bibtex: '@inproceedings{Heitkaemper_Schmalenstroeer_Haeb-Umbach_2020, title={Statistical
    and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic
    Environments}, booktitle={INTERSPEECH 2020 Virtual Shanghai China}, author={Heitkaemper,
    Jens and Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}, year={2020} }'
  chicago: Heitkaemper, Jens, Joerg Schmalenstroeer, and Reinhold Haeb-Umbach. “Statistical
    and Neural Network Based Speech Activity Detection in Non-Stationary Acoustic
    Environments.” In <i>INTERSPEECH 2020 Virtual Shanghai China</i>, 2020.
  ieee: J. Heitkaemper, J. Schmalenstroeer, and R. Haeb-Umbach, “Statistical and Neural
    Network Based Speech Activity Detection in Non-Stationary Acoustic Environments,”
    2020.
  mla: Heitkaemper, Jens, et al. “Statistical and Neural Network Based Speech Activity
    Detection in Non-Stationary Acoustic Environments.” <i>INTERSPEECH 2020 Virtual
    Shanghai China</i>, 2020.
  short: 'J. Heitkaemper, J. Schmalenstroeer, R. Haeb-Umbach, in: INTERSPEECH 2020
    Virtual Shanghai China, 2020.'
date_created: 2020-11-25T15:03:19Z
date_updated: 2023-10-26T08:28:49Z
ddc:
- '000'
department:
- _id: '54'
file:
- access_level: closed
  content_type: application/pdf
  creator: jensheit
  date_created: 2020-12-11T12:33:04Z
  date_updated: 2020-12-11T12:33:04Z
  file_id: '20697'
  file_name: ms.pdf
  file_size: 998706
  relation: main_file
  success: 1
file_date_updated: 2020-12-11T12:33:04Z
has_accepted_license: '1'
keyword:
- voice activity detection
- speech activity detection
- neural network
- statistical speech processing
language:
- iso: eng
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: INTERSPEECH 2020 Virtual Shanghai China
status: public
title: Statistical and Neural Network Based Speech Activity Detection in Non-Stationary
  Acoustic Environments
type: conference
user_id: '460'
year: '2020'
...
---
_id: '17667'
abstract:
- lang: eng
  text: 'Resolving distributed attacks benefits from collaboration between networks.
    We present three approaches for the same multi-domain defensive action that can
    be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures,
    and 3) Minimize Propagation. First, we provide a formula to compute efficiency
    of a defense; then we use this formula to compute the efficiency of the approaches
    under various circumstances. Finally, we discuss how task execution order and
    timing influence defense efficiency. Our results show that the Minimize Propagation
    approach is the most efficient method when defending against the chosen attack.'
author:
- first_name: Ralph
  full_name: Koning, Ralph
  last_name: Koning
- first_name: Gleb
  full_name: Polevoy, Gleb
  id: '83983'
  last_name: Polevoy
- first_name: Lydia
  full_name: Meijer, Lydia
  last_name: Meijer
- first_name: Cees
  full_name: de Laat, Cees
  last_name: de Laat
- first_name: Paola
  full_name: Grosso, Paola
  last_name: Grosso
citation:
  ama: 'Koning R, Polevoy G, Meijer L, de Laat C, Grosso P. Approaches for Collaborative
    Security Defences in Multi Network Environments. In: <i>2019 6th IEEE International
    Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International
    Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>. 2019 6th IEEE International
    Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International
    Conference on Edge Computing and Scalable Cloud (EdgeCom). ; 2019:113-123. doi:<a
    href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>'
  apa: Koning, R., Polevoy, G., Meijer, L., de Laat, C., &#38; Grosso, P. (2019).
    Approaches for Collaborative Security Defences in Multi Network Environments.
    In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)</i> (pp. 113–123). <a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>
  bibtex: '@inproceedings{Koning_Polevoy_Meijer_de Laat_Grosso_2019, series={2019
    6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)},
    title={Approaches for Collaborative Security Defences in Multi Network Environments},
    DOI={<a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>},
    booktitle={2019 6th IEEE International Conference on Cyber Security and Cloud
    Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing
    and Scalable Cloud (EdgeCom)}, author={Koning, Ralph and Polevoy, Gleb and Meijer,
    Lydia and de Laat, Cees and Grosso, Paola}, year={2019}, pages={113–123}, collection={2019
    6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}
    }'
  chicago: Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso.
    “Approaches for Collaborative Security Defences in Multi Network Environments.”
    In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)</i>, 113–23. 2019 6th IEEE International Conference on Cyber Security
    and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge
    Computing and Scalable Cloud (EdgeCom), 2019. <a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>.
  ieee: R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for
    Collaborative Security Defences in Multi Network Environments,” in <i>2019 6th
    IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>,
    2019, pp. 113–123.
  mla: Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi
    Network Environments.” <i>2019 6th IEEE International Conference on Cyber Security
    and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge
    Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–23, doi:<a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>.
  short: 'R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE
    International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019
    5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom),
    2019, pp. 113–123.'
conference:
  name: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)
date_created: 2020-08-06T15:23:23Z
date_updated: 2022-01-06T06:53:16Z
department:
- _id: '63'
- _id: '541'
doi: 10.1109/CSCloud/EdgeCom.2019.000-9
extern: '1'
keyword:
- computer network security
- multinetwork environments
- multidomain defensive action
- task execution order
- timing influence defense efficiency
- distributed attacks
- collaborative security defence approach
- minimize propagation approach
- minimize countermeasure approach
- counteract everywhere approach
- Conferences
- Cloud computing
- Computer crime
- Edge computing
- Security
- Defense Approaches
- Multi-Domain Defense
- Collaborative Defense
- Defense Algorithms
- Computer Networks
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/abstract/document/8854057/authors#authors
page: 113-123
publication: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
  (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
  Cloud (EdgeCom)
publication_identifier:
  issn:
  - 'null'
quality_controlled: '1'
series_title: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
  (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
  Cloud (EdgeCom)
status: public
title: Approaches for Collaborative Security Defences in Multi Network Environments
type: conference
user_id: '83983'
year: '2019'
...
---
_id: '9613'
abstract:
- lang: eng
  text: The ability to openly evaluate products, locations and services is an achievement
    of the Web 2.0. It has never been easier to inform oneself about the quality of
    products or services and possible alternatives. Forming one’s own opinion based
    on the impressions of other people can lead to better experiences. However, this
    presupposes trust in one’s fellows as well as in the quality of the review platforms.
    In previous work on physician reviews and the corresponding websites, it was observed
    that there occurs faulty behavior by some reviewers and there were noteworthy
    differences in the technical implementation of the portals and in the efforts
    of site operators to maintain high quality reviews. These experiences raise new
    questions regarding what trust means on review platforms, how trust arises and
    how easily it can be destroyed.
author:
- first_name: Joschka
  full_name: Kersting, Joschka
  id: '58701'
  last_name: Kersting
- first_name: Frederik Simon
  full_name: Bäumer, Frederik Simon
  id: '38837'
  last_name: Bäumer
- first_name: Michaela
  full_name: Geierhos, Michaela
  id: '42496'
  last_name: Geierhos
  orcid: 0000-0002-8180-5606
citation:
  ama: 'Kersting J, Bäumer FS, Geierhos M. In Reviews We Trust: But Should We? Experiences
    with Physician Review Websites. In: Ramachandran M, Walters R, Wills G, Méndez
    Muñoz V, Chang V, eds. <i>Proceedings of the 4th International Conference on
    Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS;
    2019:147-155.'
  apa: 'Kersting, J., Bäumer, F. S., &#38; Geierhos, M. (2019). In Reviews We Trust:
    But Should We? Experiences with Physician Review Websites. In M. Ramachandran,
    R. Walters, G. Wills, V. Méndez Muñoz, &#38; V. Chang (Eds.), <i>Proceedings
    of the 4th International Conference on Internet of Things, Big Data and Security</i>
    (pp. 147–155). Setúbal, Portugal: SCITEPRESS.'
  bibtex: '@inproceedings{Kersting_Bäumer_Geierhos_2019, place={Setúbal, Portugal},
    title={In Reviews We Trust: But Should We? Experiences with Physician Review Websites},
    booktitle={Proceedings of the 4th International Conference on Internet of Things,
    Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and
    Bäumer, Frederik Simon and Geierhos, Michaela}, editor={Ramachandran, Muthu and
    Walters, Robert and Wills, Gary and Méndez Muñoz, Víctor and Chang, VictorEditors},
    year={2019}, pages={147–155} }'
  chicago: 'Kersting, Joschka, Frederik Simon Bäumer, and Michaela Geierhos. “In Reviews
    We Trust: But Should We? Experiences with Physician Review Websites.” In <i>Proceedings
    of the 4th International Conference on Internet of Things, Big Data and Security</i>,
    edited by Muthu Ramachandran, Robert Walters, Gary Wills, Víctor Méndez Muñoz,
    and Victor Chang, 147–55. Setúbal, Portugal: SCITEPRESS, 2019.'
  ieee: 'J. Kersting, F. S. Bäumer, and M. Geierhos, “In Reviews We Trust: But Should
    We? Experiences with Physician Review Websites,” in <i>Proceedings of the 4th
    International Conference on Internet of Things, Big Data and Security</i>, Heraklion,
    Greece, 2019, pp. 147–155.'
  mla: 'Kersting, Joschka, et al. “In Reviews We Trust: But Should We? Experiences
    with Physician Review Websites.” <i>Proceedings of the 4th International Conference
    on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran
    et al., SCITEPRESS, 2019, pp. 147–55.'
  short: 'J. Kersting, F.S. Bäumer, M. Geierhos, in: M. Ramachandran, R. Walters,
    G. Wills, V. Méndez Muñoz, V. Chang (Eds.), Proceedings of the 4th International
    Conference on Internet of Things, Big Data and Security, SCITEPRESS, Setúbal,
    Portugal, 2019, pp. 147–155.'
conference:
  end_date: 2019-05-04
  location: Heraklion, Greece
  name: 4th International Conference on Internet of Things, Big Data and Security
    (IoTBDS 2019)
  start_date: 2019-05-02
date_created: 2019-05-06T09:00:48Z
date_updated: 2022-01-06T07:04:17Z
ddc:
- '000'
department:
- _id: '1'
- _id: '579'
editor:
- first_name: Muthu
  full_name: Ramachandran, Muthu
  last_name: Ramachandran
- first_name: Robert
  full_name: Walters, Robert
  last_name: Walters
- first_name: Gary
  full_name: Wills, Gary
  last_name: Wills
- first_name: Víctor
  full_name: Méndez Muñoz, Víctor
  last_name: Méndez Muñoz
- first_name: Victor
  full_name: Chang, Victor
  last_name: Chang
file:
- access_level: closed
  content_type: application/pdf
  creator: jkers
  date_created: 2020-09-18T09:24:41Z
  date_updated: 2020-09-18T09:24:41Z
  file_id: '19573'
  file_name: Kersting et al. (2019), Kersting2019.pdf
  file_size: 1112502
  relation: main_file
  success: 1
file_date_updated: 2020-09-18T09:24:41Z
has_accepted_license: '1'
keyword:
- Trust
- Physician Reviews
- Network Analysis
language:
- iso: eng
main_file_link:
- url: www.insticc.org/Primoris/Resources/PaperPdf.ashx?idPaper=77454
page: 147-155
place: Setúbal, Portugal
publication: Proceedings of the 4th International Conference on Internet of Things,
  Big Data and Security
publication_identifier:
  isbn:
  - 978-989-758-369-8
  unknown:
  - 2184-4976
publication_status: published
publisher: SCITEPRESS
quality_controlled: '1'
status: public
title: 'In Reviews We Trust: But Should We? Experiences with Physician Review Websites'
type: conference
user_id: '58701'
year: '2019'
...
---
_id: '9809'
abstract:
- lang: eng
  text: Remarkable advantages of Containers (CNs) over Virtual Machines (VMs) such
    as lower overhead and faster startup has gained the attention of Communication
    Service Providers (CSPs) as using CNs for providing Virtual Network Functions
    (VNFs) can save costs while increasing the service agility. However, as it is
    not feasible to realise all types of VNFs in CNs, the coexistence of VMs and CNs
    is proposed. To put VMs and CNs together, an orchestration framework that can
    chain services across distributed and heterogeneous domains is required. To this
    end, we implemented a framework by extending and consolidating state-of-the-art
    tools and technologies originated from Network Function Virtualization (NFV),
    Software-defined Networking (SDN) and cloud computing environments. This framework
    chains services provisioned across Kubernetes and OpenStack domains. During the
    demo, we deploy a service consist of CN- and VM-based VNFs to demonstrate different
    features provided by our framework.
author:
- first_name: Hadi
  full_name: Razzaghi Kouchaksaraei, Hadi
  id: '60845'
  last_name: Razzaghi Kouchaksaraei
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Razzaghi Kouchaksaraei H, Karl H. Service Function Chaining Across OpenStack
    and Kubernetes Domains. In: <i>13th ACM International Conference on Distributed
    and Event-Based Systems</i>. Darmstadt; 2019. doi:<a href="https://doi.org/10.1145/3328905.3332505">10.1145/3328905.3332505</a>'
  apa: Razzaghi Kouchaksaraei, H., &#38; Karl, H. (2019). Service Function Chaining
    Across OpenStack and Kubernetes Domains. In <i>13th ACM International Conference
    on Distributed and Event-based Systems</i>. Darmstadt. <a href="https://doi.org/10.1145/3328905.3332505">https://doi.org/10.1145/3328905.3332505</a>
  bibtex: '@inproceedings{Razzaghi Kouchaksaraei_Karl_2019, place={Darmstadt}, title={Service
    Function Chaining Across OpenStack and Kubernetes Domains}, DOI={<a href="https://doi.org/10.1145/3328905.3332505">10.1145/3328905.3332505</a>},
    booktitle={13th ACM International Conference on Distributed and Event-based Systems},
    author={Razzaghi Kouchaksaraei, Hadi and Karl, Holger}, year={2019} }'
  chicago: Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining
    Across OpenStack and Kubernetes Domains.” In <i>13th ACM International Conference
    on Distributed and Event-Based Systems</i>. Darmstadt, 2019. <a href="https://doi.org/10.1145/3328905.3332505">https://doi.org/10.1145/3328905.3332505</a>.
  ieee: H. Razzaghi Kouchaksaraei and H. Karl, “Service Function Chaining Across OpenStack
    and Kubernetes Domains,” in <i>13th ACM International Conference on Distributed
    and Event-based Systems</i>, Darmstadt, 2019.
  mla: Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining Across
    OpenStack and Kubernetes Domains.” <i>13th ACM International Conference on Distributed
    and Event-Based Systems</i>, 2019, doi:<a href="https://doi.org/10.1145/3328905.3332505">10.1145/3328905.3332505</a>.
  short: 'H. Razzaghi Kouchaksaraei, H. Karl, in: 13th ACM International Conference
    on Distributed and Event-Based Systems, Darmstadt, 2019.'
conference:
  end_date: 2019-06-28
  location: Darmstadt
  name: 13th ACM International Conference on Distributed and Event-based Systems
  start_date: 2019-06-24
date_created: 2019-05-14T05:43:57Z
date_updated: 2022-01-06T07:04:21Z
ddc:
- '004'
department:
- _id: '34'
doi: 10.1145/3328905.3332505
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2019-08-26T09:09:50Z
  date_updated: 2019-08-26T09:09:50Z
  file_id: '12953'
  file_name: p240-Kouchaksaraei.pdf
  file_size: 1206037
  relation: main_file
file_date_updated: 2019-08-26T09:09:50Z
has_accepted_license: '1'
keyword:
- Network Function Virtualization
- Software-defined Networking
- Cloud Computing
- service orchestration
- OpenStack
- Kubernetes
language:
- iso: eng
place: Darmstadt
project:
- _id: '23'
  grant_number: '762057'
  name: 5G Programmable Infrastructure Converging disaggregated neTwork and compUte
    Resources
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: 13th ACM International Conference on Distributed and Event-based Systems
publication_status: published
status: public
title: Service Function Chaining Across OpenStack and Kubernetes Domains
type: conference
user_id: '477'
year: '2019'
...
---
_id: '15368'
abstract:
- lang: eng
  text: Service Level Agreements are essential tools enabling clients and telco operators
    to specify required quality of service. The 5GTANGO NFV platform enables SLAs
    through policies and custom service lifecycle management components. This allows
    the operator to trigger certain lifecycle management events for a service, and
    the network service developer to define how to execute such events (e.g., how
    to scale). In this demo we will demonstrate this unique 5GTANGO concept using
    an elastic proxy service supported by a high availability SLA enforced through
    a range of traffic regimes.
author:
- first_name: Thomas
  full_name: Soenen, Thomas
  last_name: Soenen
- first_name: Felipe
  full_name: Vicens, Felipe
  last_name: Vicens
- first_name: José
  full_name: Bonnet, José
  last_name: Bonnet
- first_name: Carlos
  full_name: Parada, Carlos
  last_name: Parada
- first_name: Evgenia
  full_name: Kapassa, Evgenia
  last_name: Kapassa
- first_name: Marious
  full_name: Touloupou, Marious
  last_name: Touloupou
- first_name: Eleni
  full_name: Fotopulou, Eleni
  last_name: Fotopulou
- first_name: Anastasios
  full_name: Zafeiropoulos, Anastasios
  last_name: Zafeiropoulos
- first_name: Ana
  full_name: Pol, Ana
  last_name: Pol
- first_name: Stavros
  full_name: Kolometsos, Stavros
  last_name: Kolometsos
- first_name: George
  full_name: Xilouris, George
  last_name: Xilouris
- first_name: Pol
  full_name: Alemany, Pol
  last_name: Alemany
- first_name: Ricard
  full_name: Vilalta, Ricard
  last_name: Vilalta
- first_name: Panos
  full_name: Trakadas, Panos
  last_name: Trakadas
- first_name: Panos
  full_name: Karkazis, Panos
  last_name: Karkazis
- first_name: Manuel
  full_name: Peuster, Manuel
  id: '13271'
  last_name: Peuster
- first_name: Wouter
  full_name: Tavernier, Wouter
  last_name: Tavernier
citation:
  ama: 'Soenen T, Vicens F, Bonnet J, et al. SLA-controlled Proxy Service Through
    Customisable MANO Supporting Operator Policies. In: <i>2019 IFIP/IEEE Symposium
    on Integrated Network and Service Management (IM)</i>. ; 2019:707-708.'
  apa: Soenen, T., Vicens, F., Bonnet, J., Parada, C., Kapassa, E., Touloupou, M.,
    … Tavernier, W. (2019). SLA-controlled Proxy Service Through Customisable MANO
    Supporting Operator Policies. In <i>2019 IFIP/IEEE Symposium on Integrated Network
    and Service Management (IM)</i> (pp. 707–708). Arlington, VA, USA, USA.
  bibtex: '@inproceedings{Soenen_Vicens_Bonnet_Parada_Kapassa_Touloupou_Fotopulou_Zafeiropoulos_Pol_Kolometsos_et
    al._2019, title={SLA-controlled Proxy Service Through Customisable MANO Supporting
    Operator Policies}, booktitle={2019 IFIP/IEEE Symposium on Integrated Network
    and Service Management (IM)}, author={Soenen, Thomas and Vicens, Felipe and Bonnet,
    José and Parada, Carlos and Kapassa, Evgenia and Touloupou, Marious and Fotopulou,
    Eleni and Zafeiropoulos, Anastasios and Pol, Ana and Kolometsos, Stavros and et
    al.}, year={2019}, pages={707–708} }'
  chicago: Soenen, Thomas, Felipe Vicens, José Bonnet, Carlos Parada, Evgenia Kapassa,
    Marious Touloupou, Eleni Fotopulou, et al. “SLA-Controlled Proxy Service Through
    Customisable MANO Supporting Operator Policies.” In <i>2019 IFIP/IEEE Symposium
    on Integrated Network and Service Management (IM)</i>, 707–8, 2019.
  ieee: T. Soenen <i>et al.</i>, “SLA-controlled Proxy Service Through Customisable
    MANO Supporting Operator Policies,” in <i>2019 IFIP/IEEE Symposium on Integrated
    Network and Service Management (IM)</i>, Arlington, VA, USA, USA, 2019, pp. 707–708.
  mla: Soenen, Thomas, et al. “SLA-Controlled Proxy Service Through Customisable MANO
    Supporting Operator Policies.” <i>2019 IFIP/IEEE Symposium on Integrated Network
    and Service Management (IM)</i>, 2019, pp. 707–08.
  short: 'T. Soenen, F. Vicens, J. Bonnet, C. Parada, E. Kapassa, M. Touloupou, E.
    Fotopulou, A. Zafeiropoulos, A. Pol, S. Kolometsos, G. Xilouris, P. Alemany, R.
    Vilalta, P. Trakadas, P. Karkazis, M. Peuster, W. Tavernier, in: 2019 IFIP/IEEE
    Symposium on Integrated Network and Service Management (IM), 2019, pp. 707–708.'
conference:
  location: Arlington, VA, USA, USA
  name: IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
date_created: 2019-12-18T06:54:18Z
date_updated: 2022-01-06T06:52:21Z
keyword:
- 5G mobile communication
- contracts
- quality of service
- telecommunication traffic
- virtualisation
- custom service lifecycle management components
- lifecycle management events
- network service developer
- elastic proxy service
- SLA-controlled proxy service
- customisable MANO
- operator policies
- Service Level Agreements
- unique 5G TANGO concept
- 5G TANGO NFV platform
- quality of service
- traffic regimes
- high availability SLA
- Monitoring
- Probes
- Portals
- Quality of service
- Tools
- Servers
- Graphical user interfaces
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/abstract/document/8717922
page: 707-708
project:
- _id: '28'
  grant_number: '761493'
  name: 5G Development and validation platform for global industry-specific network
    services and Apps
publication: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management
  (IM)
publication_identifier:
  issn:
  - 1573-0077
status: public
title: SLA-controlled Proxy Service Through Customisable MANO Supporting Operator
  Policies
type: conference
user_id: '13271'
year: '2019'
...
---
_id: '17666'
abstract:
- lang: eng
  text: 'Software Defined Networks (SDN) and Network Function Virtualisation (NFV)
    provide the basis for autonomous response and mitigation against attacks on networked
    computer infrastructures. We propose a new framework that uses SDNs and NFV to
    achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an
    agent running a control loop constantly assesses the security state of the network
    by means of observables. The agent reacts to and resolves security problems, while
    learning from its previous decisions. Two main metrics govern the decision process
    in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate
    countermeasures and are the building blocks for self-learning SARNETs that exhibit
    autonomous response. In this paper we present the software implementation of the
    SARNET framework, evaluate it in a real-life network and discuss the tradeoffs
    between parameters used by the SARNET agent and the efficiency of its actions.'
author:
- first_name: R.
  full_name: Koning, R.
  last_name: Koning
- first_name: B.
  full_name: de Graaff, B.
  last_name: de Graaff
- first_name: Gleb
  full_name: Polevoy, Gleb
  id: '83983'
  last_name: Polevoy
- first_name: R.
  full_name: Meijer, R.
  last_name: Meijer
- first_name: C.
  full_name: de Laat, C.
  last_name: de Laat
- first_name: P.
  full_name: Grosso, P.
  last_name: Grosso
citation:
  ama: Koning R, de Graaff B, Polevoy G, Meijer R, de Laat C, Grosso P. Measuring
    the efficiency of SDN mitigations against attacks on computer infrastructures.
    <i>Future Generation Computer Systems</i>. 2018. doi:<a href="https://doi.org/10.1016/j.future.2018.08.011">https://doi.org/10.1016/j.future.2018.08.011</a>
  apa: Koning, R., de Graaff, B., Polevoy, G., Meijer, R., de Laat, C., &#38; Grosso,
    P. (2018). Measuring the efficiency of SDN mitigations against attacks on computer
    infrastructures. <i>Future Generation Computer Systems</i>. <a href="https://doi.org/10.1016/j.future.2018.08.011">https://doi.org/10.1016/j.future.2018.08.011</a>
  bibtex: '@article{Koning_de Graaff_Polevoy_Meijer_de Laat_Grosso_2018, title={Measuring
    the efficiency of SDN mitigations against attacks on computer infrastructures},
    DOI={<a href="https://doi.org/10.1016/j.future.2018.08.011">https://doi.org/10.1016/j.future.2018.08.011</a>},
    journal={Future Generation Computer Systems}, author={Koning, R. and de Graaff,
    B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}, year={2018}
    }'
  chicago: Koning, R., B. de Graaff, Gleb Polevoy, R. Meijer, C. de Laat, and P. Grosso.
    “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.”
    <i>Future Generation Computer Systems</i>, 2018. <a href="https://doi.org/10.1016/j.future.2018.08.011">https://doi.org/10.1016/j.future.2018.08.011</a>.
  ieee: R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, and P. Grosso,
    “Measuring the efficiency of SDN mitigations against attacks on computer infrastructures,”
    <i>Future Generation Computer Systems</i>, 2018.
  mla: Koning, R., et al. “Measuring the Efficiency of SDN Mitigations against Attacks
    on Computer Infrastructures.” <i>Future Generation Computer Systems</i>, 2018,
    doi:<a href="https://doi.org/10.1016/j.future.2018.08.011">https://doi.org/10.1016/j.future.2018.08.011</a>.
  short: R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, P. Grosso, Future
    Generation Computer Systems (2018).
date_created: 2020-08-06T15:23:11Z
date_updated: 2022-01-06T06:53:16Z
department:
- _id: '63'
- _id: '541'
doi: https://doi.org/10.1016/j.future.2018.08.011
extern: '1'
keyword:
- Software defined networks
- Network function virtualization
- Cyber attacks
- Cyber security
- Defense efficiency
- Overlay networks
language:
- iso: eng
publication: Future Generation Computer Systems
publication_identifier:
  issn:
  - 0167-739X
status: public
title: Measuring the efficiency of SDN mitigations against attacks on computer infrastructures
type: journal_article
user_id: '83983'
year: '2018'
...
---
_id: '1156'
abstract:
- lang: eng
  text: In this paper, we present an IoT architecture which handles stream sensor
    data of air pollution. Particle pollution is known as a serious threat to human
    health. Along with developments in the use of wireless sensors and the IoT, we
    propose an architecture that flexibly measures and processes stream data collected
    in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread
    network of wireless sensors that can follow changes in human behavior. Apart from
    stating reasons for the need of such a development and its requirements, we provide
    a conceptual design as well as a technological design of such an architecture.
    The technological design consists of Kaa and Apache Storm which can collect air
    pollution information in real-time and solve various problems to process data
    such as missing data and synchronization. This enables us to add a simulation
    in which we provide issues that might come up when having our architecture in
    use. Together with these issues, we state r easons for choosing specific modules
    among candidates. Our architecture combines wireless sensors with the Kaa IoT
    framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management
    System among others. We even provide open-government data sets that are freely
    available.
author:
- first_name: Joschka
  full_name: Kersting, Joschka
  id: '58701'
  last_name: Kersting
- first_name: Michaela
  full_name: Geierhos, Michaela
  id: '42496'
  last_name: Geierhos
  orcid: 0000-0002-8180-5606
- first_name: Hanmin
  full_name: Jung, Hanmin
  last_name: Jung
- first_name: Taehong
  full_name: Kim, Taehong
  last_name: Kim
citation:
  ama: 'Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for
    Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere
    V, Wills G, Walters R, Chang V, eds. <i>Proceedings of the 2nd International Conference
    on Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS;
    2017:117-124. doi:<a href="https://doi.org/10.5220/0006354801170124">10.5220/0006354801170124</a>'
  apa: 'Kersting, J., Geierhos, M., Jung, H., &#38; Kim, T. (2017). Internet of Things
    Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez
    Muñoz, V. Kantere, G. Wills, R. Walters, &#38; V. Chang (Eds.), <i>Proceedings
    of the 2nd International Conference on Internet of Things, Big Data and Security</i>
    (pp. 117–124). Setúbal, Portugal: SCITEPRESS. <a href="https://doi.org/10.5220/0006354801170124">https://doi.org/10.5220/0006354801170124</a>'
  bibtex: '@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal},
    title={Internet of Things Architecture for Handling Stream Air Pollution Data},
    DOI={<a href="https://doi.org/10.5220/0006354801170124">10.5220/0006354801170124</a>},
    booktitle={Proceedings of the 2nd International Conference on Internet of Things,
    Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and
    Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu
    and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert
    and Chang, VictorEditors}, year={2017}, pages={117–124} }'
  chicago: 'Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet
    of Things Architecture for Handling Stream Air Pollution Data.” In <i>Proceedings
    of the 2nd International Conference on Internet of Things, Big Data and Security</i>,
    edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills,
    Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017.
    <a href="https://doi.org/10.5220/0006354801170124">https://doi.org/10.5220/0006354801170124</a>.'
  ieee: J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture
    for Handling Stream Air Pollution Data,” in <i>Proceedings of the 2nd International
    Conference on Internet of Things, Big Data and Security</i>, Porto, Portugal,
    2017, pp. 117–124.
  mla: Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream
    Air Pollution Data.” <i>Proceedings of the 2nd International Conference on Internet
    of Things, Big Data and Security</i>, edited by Muthu Ramachandran et al., SCITEPRESS,
    2017, pp. 117–24, doi:<a href="https://doi.org/10.5220/0006354801170124">10.5220/0006354801170124</a>.
  short: 'J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez
    Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd
    International Conference on Internet of Things, Big Data and Security, SCITEPRESS,
    Setúbal, Portugal, 2017, pp. 117–124.'
conference:
  end_date: 2017-04-26
  location: Porto, Portugal
  name: 2nd International Conference on Internet of Things, Big Data and Security
    (IoTBDS 2017)
  start_date: 2017-04-24
date_created: 2018-01-31T14:45:21Z
date_updated: 2022-01-06T06:51:03Z
ddc:
- '000'
department:
- _id: '36'
- _id: '1'
- _id: '579'
doi: 10.5220/0006354801170124
editor:
- first_name: Muthu
  full_name: Ramachandran, Muthu
  last_name: Ramachandran
- first_name: Víctor
  full_name: Méndez Muñoz, Víctor
  last_name: Méndez Muñoz
- first_name: Verena
  full_name: Kantere, Verena
  last_name: Kantere
- first_name: Gary
  full_name: Wills, Gary
  last_name: Wills
- first_name: Robert
  full_name: Walters, Robert
  last_name: Walters
- first_name: Victor
  full_name: Chang, Victor
  last_name: Chang
file:
- access_level: closed
  content_type: application/pdf
  creator: jkers
  date_created: 2020-09-18T09:09:27Z
  date_updated: 2020-09-18T09:09:27Z
  file_id: '19567'
  file_name: IoTBDS_2017_50_final.pdf
  file_size: 2612566
  relation: main_file
  success: 1
file_date_updated: 2020-09-18T09:09:27Z
has_accepted_license: '1'
keyword:
- Wireless Sensor Network
- Internet of Things
- Stream Data
- Air Pollution
- DSMS
- Real-time Data Processing
language:
- iso: eng
page: 117-124
place: Setúbal, Portugal
publication: Proceedings of the 2nd International Conference on Internet of Things,
  Big Data and Security
publication_identifier:
  isbn:
  - 978-989-758-245-5
publication_status: published
publisher: SCITEPRESS
quality_controlled: '1'
status: public
title: Internet of Things Architecture for Handling Stream Air Pollution Data
type: conference
user_id: '58701'
year: '2017'
...
---
_id: '9976'
abstract:
- lang: eng
  text: State-of-the-art mechatronic systems offer inherent intelligence that enables
    them to autonomously adapt their behavior to current environmental conditions
    and to their own system state. This autonomous behavior adaptation is made possible
    by software in combination with complex sensor and actuator systems and by sophisticated
    information processing, all of which make these systems increasingly complex.
    This increasing complexity makes the design process a challenging task and brings
    new complex possibilities for operation and maintenance. However, with the risk
    of increased system complexity also comes the chance to adapt system behavior
    based on current reliability, which in turn increases reliability. The development
    of such an adaption strategy requires appropriate methods to evaluate reliability
    based on currently selected system behavior. A common approach to implement such
    adaptivity is to base system behavior on different working points that are obtained
    using multiobjective optimization. During operation, selection among these allows
    a changed operating strategy. To allow for multiobjective optimization, an accurate
    system model including system reliability is required. This model is repeatedly
    evaluated by the optimization algorithm. At present, modeling of system reliability
    and synchronization of the models of behavior and reliability is a laborious manual
    task and thus very error-prone. Since system behavior is crucial for system reliability,
    an integrated model is introduced that integrates system behavior and system reliability.
    The proposed approach is used to formulate reliability-related objective functions
    for a clutch test rig that are used to compute feasible working points using multiobjective
    optimization.
author:
- first_name: Thorben
  full_name: Kaul, Thorben
  id: '14802'
  last_name: Kaul
- first_name: Tobias
  full_name: Meyer, Tobias
  last_name: Meyer
- first_name: Walter
  full_name: Sextro, Walter
  id: '21220'
  last_name: Sextro
citation:
  ama: Kaul T, Meyer T, Sextro W. Formulation of reliability-related objective functions
    for design of intelligent mechatronic systems. <i>SAGE Journals</i>. 2017;Vol.
    231(4):390-399. doi:<a href="https://doi.org/10.1177/1748006X17709376">10.1177/1748006X17709376</a>
  apa: Kaul, T., Meyer, T., &#38; Sextro, W. (2017). Formulation of reliability-related
    objective functions for design of intelligent mechatronic systems. <i>SAGE Journals</i>,
    <i>Vol. 231(4)</i>, 390–399. <a href="https://doi.org/10.1177/1748006X17709376">https://doi.org/10.1177/1748006X17709376</a>
  bibtex: '@article{Kaul_Meyer_Sextro_2017, title={Formulation of reliability-related
    objective functions for design of intelligent mechatronic systems}, volume={Vol.
    231(4)}, DOI={<a href="https://doi.org/10.1177/1748006X17709376">10.1177/1748006X17709376</a>},
    journal={SAGE Journals}, author={Kaul, Thorben and Meyer, Tobias and Sextro, Walter},
    year={2017}, pages={390–399} }'
  chicago: 'Kaul, Thorben, Tobias Meyer, and Walter Sextro. “Formulation of Reliability-Related
    Objective Functions for Design of Intelligent Mechatronic Systems.” <i>SAGE Journals</i>
    Vol. 231(4) (2017): 390–99. <a href="https://doi.org/10.1177/1748006X17709376">https://doi.org/10.1177/1748006X17709376</a>.'
  ieee: T. Kaul, T. Meyer, and W. Sextro, “Formulation of reliability-related objective
    functions for design of intelligent mechatronic systems,” <i>SAGE Journals</i>,
    vol. Vol. 231(4), pp. 390–399, 2017.
  mla: Kaul, Thorben, et al. “Formulation of Reliability-Related Objective Functions
    for Design of Intelligent Mechatronic Systems.” <i>SAGE Journals</i>, vol. Vol.
    231(4), 2017, pp. 390–99, doi:<a href="https://doi.org/10.1177/1748006X17709376">10.1177/1748006X17709376</a>.
  short: T. Kaul, T. Meyer, W. Sextro, SAGE Journals Vol. 231(4) (2017) 390–399.
date_created: 2019-05-27T09:37:46Z
date_updated: 2019-09-16T10:20:49Z
department:
- _id: '151'
doi: 10.1177/1748006X17709376
keyword:
- Integrated model
- reliability
- system behavior
- Bayesian network
- multiobjective optimization
language:
- iso: eng
page: 390 - 399
publication: SAGE Journals
quality_controlled: '1'
status: public
title: Formulation of reliability-related objective functions for design of intelligent
  mechatronic systems
type: journal_article
user_id: '55222'
volume: Vol. 231(4)
year: '2017'
...
---
_id: '1452'
abstract:
- lang: eng
  text: Opinion leaders of an investment network can have a significant impact on
    capital mar-kets because their investment decisions are adopted by their peers
    and trigger large trad-ing cascades, increasing herding behavior and comovement
    among stock returns. This paper analyzes the interaction-based relations of traders
    from a large social trading plat-form and identifies the driving forces and the
    opinion leaders within a large online trading network as the nodes with the highest
    centrality and the highest force of infection, respec-tively. Relying on recent
    insights from epidemiological research, I maintain that central-ity identifies
    the most central traders in the network, while the expected force quantifies the
    most influential traders and their spreading power. I study the behavior and charac-teristics
    that set central and influential traders apart from other traders. The ability
    to identify focal points and their trading behavior within a trading network is
    important for investors, investment advisers, and policy makers.
article_type: original
author:
- first_name: Matthias
  full_name: Pelster, Matthias
  id: '67265'
  last_name: Pelster
  orcid: ' https://orcid.org/0000-0001-5740-2420'
citation:
  ama: 'Pelster M. I’ll Have What S/he’s Having: A Case Study of a Social Trading
    Network. <i>Proceedings of the International Conference on Information Systems</i>.
    2017.'
  apa: 'Pelster, M. (2017). I’ll Have What S/he’s Having: A Case Study of a Social
    Trading Network. <i>Proceedings of the International Conference on Information
    Systems</i>.'
  bibtex: '@article{Pelster_2017, title={I’ll Have What S/he’s Having: A Case Study
    of a Social Trading Network}, journal={Proceedings of the International Conference
    on Information Systems}, author={Pelster, Matthias}, year={2017} }'
  chicago: 'Pelster, Matthias. “I’ll Have What S/He’s Having: A Case Study of a Social
    Trading Network.” <i>Proceedings of the International Conference on Information
    Systems</i>, 2017.'
  ieee: 'M. Pelster, “I’ll Have What S/he’s Having: A Case Study of a Social Trading
    Network,” <i>Proceedings of the International Conference on Information Systems</i>,
    2017.'
  mla: 'Pelster, Matthias. “I’ll Have What S/He’s Having: A Case Study of a Social
    Trading Network.” <i>Proceedings of the International Conference on Information
    Systems</i>, 2017.'
  short: M. Pelster, Proceedings of the International Conference on Information Systems
    (2017).
date_created: 2018-03-20T11:34:47Z
date_updated: 2022-01-06T06:52:00Z
department:
- _id: '186'
- _id: '578'
keyword:
- Online trading
- investment advice
- network modeling
- Expected Force
- herding.
language:
- iso: eng
publication: Proceedings of the International Conference on Information Systems
publication_status: published
status: public
title: 'I’ll Have What S/he’s Having: A Case Study of a Social Trading Network'
type: journal_article
urn: '14524'
user_id: '67265'
year: '2017'
...
---
_id: '17655'
author:
- first_name: Gleb
  full_name: Polevoy, Gleb
  id: '83983'
  last_name: Polevoy
- first_name: M.M.
  full_name: de Weerdt, M.M.
  last_name: de Weerdt
- first_name: C.M.
  full_name: Jonker, C.M.
  last_name: Jonker
citation:
  ama: 'Polevoy G, de Weerdt MM, Jonker CM. The Game of Reciprocation Habits. In:
    <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>.
    Vol Volume 285: ECAI 2016. Frontiers in Artificial Intelligence and Applications.
    ; 2016:417-425. doi:<a href="https://doi.org/10.3233/978-1-61499-672-9-417">10.3233/978-1-61499-672-9-417</a>'
  apa: 'Polevoy, G., de Weerdt, M. M., &#38; Jonker, C. M. (2016). The Game of Reciprocation
    Habits. In <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>
    (Vol. Volume 285: ECAI 2016, pp. 417–425). <a href="https://doi.org/10.3233/978-1-61499-672-9-417">https://doi.org/10.3233/978-1-61499-672-9-417</a>'
  bibtex: '@inproceedings{Polevoy_de Weerdt_Jonker_2016, series={Frontiers in Artificial
    Intelligence and Applications}, title={The Game of Reciprocation Habits}, volume={Volume
    285: ECAI 2016}, DOI={<a href="https://doi.org/10.3233/978-1-61499-672-9-417">10.3233/978-1-61499-672-9-417</a>},
    booktitle={Proceedings of the 2016 European Conference on Artificial Intelligence},
    author={Polevoy, Gleb and de Weerdt, M.M. and Jonker, C.M.}, year={2016}, pages={417–425},
    collection={Frontiers in Artificial Intelligence and Applications} }'
  chicago: 'Polevoy, Gleb, M.M. de Weerdt, and C.M. Jonker. “The Game of Reciprocation
    Habits.” In <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>,
    Volume 285: ECAI 2016:417–25. Frontiers in Artificial Intelligence and Applications,
    2016. <a href="https://doi.org/10.3233/978-1-61499-672-9-417">https://doi.org/10.3233/978-1-61499-672-9-417</a>.'
  ieee: 'G. Polevoy, M. M. de Weerdt, and C. M. Jonker, “The Game of Reciprocation
    Habits,” in <i>Proceedings of the 2016 European Conference on Artificial Intelligence</i>,
    2016, vol. Volume 285: ECAI 2016, pp. 417–425.'
  mla: 'Polevoy, Gleb, et al. “The Game of Reciprocation Habits.” <i>Proceedings of
    the 2016 European Conference on Artificial Intelligence</i>, vol. Volume 285:
    ECAI 2016, 2016, pp. 417–25, doi:<a href="https://doi.org/10.3233/978-1-61499-672-9-417">10.3233/978-1-61499-672-9-417</a>.'
  short: 'G. Polevoy, M.M. de Weerdt, C.M. Jonker, in: Proceedings of the 2016 European
    Conference on Artificial Intelligence, 2016, pp. 417–425.'
date_created: 2020-08-06T15:20:30Z
date_updated: 2022-01-06T06:53:16Z
department:
- _id: '63'
- _id: '541'
doi: 10.3233/978-1-61499-672-9-417
extern: '1'
keyword:
- agents
- action
- repeated reciprocation
- fixed
- floating
- network
- Nash equilibrium
- social welfare
- price of anarchy
- price of stability
- convex combination
language:
- iso: eng
page: 417-425
publication: Proceedings of the 2016 European Conference on Artificial Intelligence
series_title: Frontiers in Artificial Intelligence and Applications
status: public
title: The Game of Reciprocation Habits
type: conference
user_id: '83983'
volume: 'Volume 285: ECAI 2016'
year: '2016'
...
---
_id: '17660'
author:
- first_name: Gleb
  full_name: Polevoy, Gleb
  id: '83983'
  last_name: Polevoy
- first_name: Mathijs M.
  full_name: de Weerdt, Mathijs M.
  last_name: de Weerdt
citation:
  ama: 'Polevoy G, de Weerdt MM. Improving Human Interaction in Crowdsensing. In:
    <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent
    Systems</i>. AAMAS ’14. Richland, SC: International Foundation for Autonomous
    Agents and Multiagent Systems; 2014:1741-1742.'
  apa: 'Polevoy, G., &#38; de Weerdt, M. M. (2014). Improving Human Interaction in
    Crowdsensing. In <i>Proceedings of the 2014 International Conference on Autonomous
    Agents and Multi-agent Systems</i> (pp. 1741–1742). Richland, SC: International
    Foundation for Autonomous Agents and Multiagent Systems.'
  bibtex: '@inproceedings{Polevoy_de Weerdt_2014, place={Richland, SC}, series={AAMAS
    ’14}, title={Improving Human Interaction in Crowdsensing}, booktitle={Proceedings
    of the 2014 International Conference on Autonomous Agents and Multi-agent Systems},
    publisher={International Foundation for Autonomous Agents and Multiagent Systems},
    author={Polevoy, Gleb and de Weerdt, Mathijs M.}, year={2014}, pages={1741–1742},
    collection={AAMAS ’14} }'
  chicago: 'Polevoy, Gleb, and Mathijs M. de Weerdt. “Improving Human Interaction
    in Crowdsensing.” In <i>Proceedings of the 2014 International Conference on Autonomous
    Agents and Multi-Agent Systems</i>, 1741–42. AAMAS ’14. Richland, SC: International
    Foundation for Autonomous Agents and Multiagent Systems, 2014.'
  ieee: G. Polevoy and M. M. de Weerdt, “Improving Human Interaction in Crowdsensing,”
    in <i>Proceedings of the 2014 International Conference on Autonomous Agents and
    Multi-agent Systems</i>, 2014, pp. 1741–1742.
  mla: Polevoy, Gleb, and Mathijs M. de Weerdt. “Improving Human Interaction in Crowdsensing.”
    <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent
    Systems</i>, International Foundation for Autonomous Agents and Multiagent Systems,
    2014, pp. 1741–42.
  short: 'G. Polevoy, M.M. de Weerdt, in: Proceedings of the 2014 International Conference
    on Autonomous Agents and Multi-Agent Systems, International Foundation for Autonomous
    Agents and Multiagent Systems, Richland, SC, 2014, pp. 1741–1742.'
date_created: 2020-08-06T15:21:35Z
date_updated: 2022-01-06T06:53:16Z
department:
- _id: '63'
- _id: '541'
extern: '1'
keyword:
- dynamics
- emotion modeling
- negotiation
- network interaction
- shared effort game
language:
- iso: eng
page: 1741-1742
place: Richland, SC
publication: Proceedings of the 2014 International Conference on Autonomous Agents
  and Multi-agent Systems
publication_identifier:
  isbn:
  - 978-1-4503-2738-1
publisher: International Foundation for Autonomous Agents and Multiagent Systems
series_title: AAMAS '14
status: public
title: Improving Human Interaction in Crowdsensing
type: conference
user_id: '83983'
year: '2014'
...
---
_id: '13322'
abstract:
- lang: eng
  text: Previous research suggests the existence of sentiments in online social networks.
    In comparison to real life human interaction, in which sentiments have been shown
    to have an influence on human behaviour, it is not yet completely understood which
    mechanisms explain how sentiments influence users in online environments. We develop
    a theoretical framework that tries to bridge the gap between social influence
    theories that focus on offline interactions on one hand and online interaction
    in social networks on the other hand. We then test our hypothesis about the influence
    and dissemination of sentiments in a quantitative analysis that is based on retrieved
    textual messages of communication patterns in over 12000 online social networks.
    Our empirical results suggest a general influence of sentiments on node communication
    patterns that is evidenced by increased occurrences of subsequent messages that
    express the same sentiment polarization. We interpret these findings and suggest
    future research to advance our currently limited theories that assume perceived
    and generalized social influence to path-dependent social influence models that
    consider actual behaviour.
author:
- first_name: Robert
  full_name: Hillmann, Robert
  last_name: Hillmann
- first_name: Matthias
  full_name: Trier, Matthias
  id: '72744'
  last_name: Trier
citation:
  ama: 'Hillmann R, Trier M. Influence and Dissemination Of Sentiments in Social Network
    Communication Patterns. In: <i>ECIS 2013 Proceedings</i>. Association for Information
    Systems. AIS Electronic Library (AISeL); 2013.'
  apa: Hillmann, R., &#38; Trier, M. (2013). Influence and Dissemination Of Sentiments
    in Social Network Communication Patterns. In <i>ECIS 2013 Proceedings</i>. Association
    for Information Systems. AIS Electronic Library (AISeL).
  bibtex: '@inproceedings{Hillmann_Trier_2013, title={Influence and Dissemination
    Of Sentiments in Social Network Communication Patterns}, booktitle={ECIS 2013
    Proceedings}, publisher={Association for Information Systems. AIS Electronic Library
    (AISeL)}, author={Hillmann, Robert and Trier, Matthias}, year={2013} }'
  chicago: Hillmann, Robert, and Matthias Trier. “Influence and Dissemination Of Sentiments
    in Social Network Communication Patterns.” In <i>ECIS 2013 Proceedings</i>. Association
    for Information Systems. AIS Electronic Library (AISeL), 2013.
  ieee: R. Hillmann and M. Trier, “Influence and Dissemination Of Sentiments in Social
    Network Communication Patterns,” in <i>ECIS 2013 Proceedings</i>, 2013.
  mla: Hillmann, Robert, and Matthias Trier. “Influence and Dissemination Of Sentiments
    in Social Network Communication Patterns.” <i>ECIS 2013 Proceedings</i>, Association
    for Information Systems. AIS Electronic Library (AISeL), 2013.
  short: 'R. Hillmann, M. Trier, in: ECIS 2013 Proceedings, Association for Information
    Systems. AIS Electronic Library (AISeL), 2013.'
date_created: 2019-09-19T11:38:37Z
date_updated: 2022-01-06T06:51:33Z
department:
- _id: '198'
keyword:
- Social Network Analysis
- Sentiment Analysis
- Communication Patterns
language:
- iso: eng
publication: ECIS 2013 Proceedings
publication_identifier:
  isbn:
  - '9783834924421'
publisher: Association for Information Systems. AIS Electronic Library (AISeL)
status: public
title: Influence and Dissemination Of Sentiments in Social Network Communication Patterns
type: conference
user_id: '62809'
year: '2013'
...
---
_id: '11891'
abstract:
- lang: eng
  text: In this paper we present a combined hardware/software approach for synchronizing
    the sampling clocks of an acoustic sensor network. A first clock frequency offset
    estimate is obtained by a time stamp exchange protocol with a low data rate and
    computational requirements. The estimate is then postprocessed by a Kalman filter
    which exploits the specific properties of the statistics of the frequency offset
    estimation error. In long term experiments the deviation between the sampling
    oscillators of two sensor nodes never exceeded half a sample with a wired and
    with a wireless link between the nodes. The achieved precision enables the estimation
    of time difference of arrival values across different hardware devices without
    sharing a common sampling hardware.
author:
- first_name: Joerg
  full_name: Schmalenstroeer, Joerg
  id: '460'
  last_name: Schmalenstroeer
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Schmalenstroeer J, Haeb-Umbach R. Sampling Rate Synchronisation in Acoustic
    Sensor Networks with a Pre-Trained Clock Skew Error Model. In: <i>21th European
    Signal Processing Conference (EUSIPCO 2013)</i>. ; 2013.'
  apa: Schmalenstroeer, J., &#38; Haeb-Umbach, R. (2013). Sampling Rate Synchronisation
    in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model. <i>21th
    European Signal Processing Conference (EUSIPCO 2013)</i>.
  bibtex: '@inproceedings{Schmalenstroeer_Haeb-Umbach_2013, title={Sampling Rate Synchronisation
    in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model}, booktitle={21th
    European Signal Processing Conference (EUSIPCO 2013)}, author={Schmalenstroeer,
    Joerg and Haeb-Umbach, Reinhold}, year={2013} }'
  chicago: Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Sampling Rate Synchronisation
    in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model.” In <i>21th
    European Signal Processing Conference (EUSIPCO 2013)</i>, 2013.
  ieee: J. Schmalenstroeer and R. Haeb-Umbach, “Sampling Rate Synchronisation in Acoustic
    Sensor Networks with a Pre-Trained Clock Skew Error Model,” 2013.
  mla: Schmalenstroeer, Joerg, and Reinhold Haeb-Umbach. “Sampling Rate Synchronisation
    in Acoustic Sensor Networks with a Pre-Trained Clock Skew Error Model.” <i>21th
    European Signal Processing Conference (EUSIPCO 2013)</i>, 2013.
  short: 'J. Schmalenstroeer, R. Haeb-Umbach, in: 21th European Signal Processing
    Conference (EUSIPCO 2013), 2013.'
date_created: 2019-07-12T05:30:15Z
date_updated: 2023-10-26T08:11:01Z
department:
- _id: '54'
keyword:
- synchronization
- acoustic sensor network
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2013/SchHaeb2013.pdf
oa: '1'
publication: 21th European Signal Processing Conference (EUSIPCO 2013)
quality_controlled: '1'
related_material:
  link:
  - description: Presentation
    relation: supplementary_material
    url: https://groups.uni-paderborn.de/nt/pubs/2013/SchHaeb2013_Presentation.pdf
status: public
title: Sampling Rate Synchronisation in Acoustic Sensor Networks with a Pre-Trained
  Clock Skew Error Model
type: conference
user_id: '460'
year: '2013'
...
---
_id: '13326'
abstract:
- lang: eng
  text: Communication within online social network applications enables users to express
    and share sentiments electronically. Existing studies examined the existence or
    distribution of sentiments in online communication at a general level or in small-observed
    groups. Our paper extends this research by analyzing sentiment exchange within
    social networks from an ego-network perspective. We draw from research on social
    influence and social attachment to develop theories of node polarization, balance
    effects and sentiment mirroring within communication dyads. Our empirical analysis
    covers a multitude of social networks in which the sentiment valence of all messages
    was determined. Subsequently we studied ego-networks of focal actors (ego) and
    their immediate contacts. Results support our theories and indicate that actors
    develop polarized sentiments towards individual peers but keep sentiment in balance
    on the ego-network level. Further, pairs of nodes tend to establish similar attitudes
    towards each other leading to stable and polarized positive or negative relationships
author:
- first_name: Robert
  full_name: Hillmann, Robert
  last_name: Hillmann
- first_name: Matthias
  full_name: Trier, Matthias
  id: '72744'
  last_name: Trier
citation:
  ama: 'Hillmann R, Trier M. Sentiment Polarization and Balance among Users in Online
    Social Networks. In: Joshi KD, Yoo Y, eds. <i>AMCIS 2012 Proceedings</i>. Vol
    24. Association for Information Systems. AIS Electronic Library (AISeL); 2012.'
  apa: Hillmann, R., &#38; Trier, M. (2012). Sentiment Polarization and Balance among
    Users in Online Social Networks. In K. D. Joshi &#38; Y. Yoo (Eds.), <i>AMCIS
    2012 Proceedings</i> (Vol. 24). Association for Information Systems. AIS Electronic
    Library (AISeL).
  bibtex: '@inproceedings{Hillmann_Trier_2012, title={Sentiment Polarization and Balance
    among Users in Online Social Networks}, volume={24}, booktitle={AMCIS 2012 Proceedings},
    publisher={Association for Information Systems. AIS Electronic Library (AISeL)},
    author={Hillmann, Robert and Trier, Matthias}, editor={Joshi, K.D. and Yoo, YoungjinEditors},
    year={2012} }'
  chicago: Hillmann, Robert, and Matthias Trier. “Sentiment Polarization and Balance
    among Users in Online Social Networks.” In <i>AMCIS 2012 Proceedings</i>, edited
    by K.D. Joshi and Youngjin Yoo, Vol. 24. Association for Information Systems.
    AIS Electronic Library (AISeL), 2012.
  ieee: R. Hillmann and M. Trier, “Sentiment Polarization and Balance among Users
    in Online Social Networks,” in <i>AMCIS 2012 Proceedings</i>, 2012, vol. 24.
  mla: Hillmann, Robert, and Matthias Trier. “Sentiment Polarization and Balance among
    Users in Online Social Networks.” <i>AMCIS 2012 Proceedings</i>, edited by K.D.
    Joshi and Youngjin Yoo, vol. 24, Association for Information Systems. AIS Electronic
    Library (AISeL), 2012.
  short: 'R. Hillmann, M. Trier, in: K.D. Joshi, Y. Yoo (Eds.), AMCIS 2012 Proceedings,
    Association for Information Systems. AIS Electronic Library (AISeL), 2012.'
date_created: 2019-09-19T12:22:08Z
date_updated: 2022-01-06T06:51:33Z
department:
- _id: '198'
editor:
- first_name: K.D.
  full_name: Joshi, K.D.
  last_name: Joshi
- first_name: Youngjin
  full_name: Yoo, Youngjin
  last_name: Yoo
intvolume: '        24'
keyword:
- Social Network Analysis
- Ego-Network Analysis
- Node Polarization
- Sentiment Dissemination
language:
- iso: eng
publication: AMCIS 2012 Proceedings
publisher: Association for Information Systems. AIS Electronic Library (AISeL)
status: public
title: Sentiment Polarization and Balance among Users in Online Social Networks
type: conference
user_id: '62809'
volume: 24
year: '2012'
...
---
_id: '13331'
abstract:
- lang: eng
  text: Communication in online social networks has been analyzed for some time regarding
    the expression of sentiments. So far, very little is known about the relationship
    between sentiments and network emergence, dissemination patternsand possible differences
    between positive and negative sentiments. The dissemination patterns analyzed
    in this study consist of network motifs based on triples of actors and the ties
    among them. These motifs are associated with common social network effects to
    derive meaningful insights about dissemination activities. The data basis includes
    several thousand social networks with textual messages classified according to
    embedded positive and negative sentiments. Based on this data, sub-networks are
    extracted and analyzed with a dynamic network motif analysis to determine dissemination
    patterns and associated network effects. Results indicate that the emergence of
    digital social networks exhibits a strong tendency towards reciprocity, followed
    by the dominance ofhierarchy as an intermediate step leading to social clustering
    with hubs and transitivity effects for both positive and negative sentiments to
    the same extend. Sentiments embedded in exchanged textual messages do only play
    a secondary role in network emergence and do not express differences regarding
    the emergence of network patterns.
author:
- first_name: Robert
  full_name: Hillmann, Robert
  last_name: Hillmann
- first_name: Matthias
  full_name: Trier, Matthias
  id: '72744'
  last_name: Trier
citation:
  ama: 'Hillmann R, Trier M. Dissemination Patterns and Associated Network Effects
    of Sentiments in Social Networks. In: <i>Proceedings of the 2012 IEEE/ACM International
    Conference on Advances in Social Networks Analysis and Mining</i>. United States:
    IEEE; 2012:510-515.'
  apa: 'Hillmann, R., &#38; Trier, M. (2012). Dissemination Patterns and Associated
    Network Effects of Sentiments in Social Networks. In <i>Proceedings of the 2012
    IEEE/ACM International Conference on Advances in Social Networks Analysis and
    Mining</i> (pp. 510–515). United States: IEEE.'
  bibtex: '@inproceedings{Hillmann_Trier_2012, place={United States}, title={Dissemination
    Patterns and Associated Network Effects of Sentiments in Social Networks}, booktitle={Proceedings
    of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis
    and Mining}, publisher={IEEE}, author={Hillmann, Robert and Trier, Matthias},
    year={2012}, pages={510–515} }'
  chicago: 'Hillmann, Robert, and Matthias Trier. “Dissemination Patterns and Associated
    Network Effects of Sentiments in Social Networks.” In <i>Proceedings of the 2012
    IEEE/ACM International Conference on Advances in Social Networks Analysis and
    Mining</i>, 510–15. United States: IEEE, 2012.'
  ieee: R. Hillmann and M. Trier, “Dissemination Patterns and Associated Network Effects
    of Sentiments in Social Networks,” in <i>Proceedings of the 2012 IEEE/ACM International
    Conference on Advances in Social Networks Analysis and Mining</i>, 2012, pp. 510–515.
  mla: Hillmann, Robert, and Matthias Trier. “Dissemination Patterns and Associated
    Network Effects of Sentiments in Social Networks.” <i>Proceedings of the 2012
    IEEE/ACM International Conference on Advances in Social Networks Analysis and
    Mining</i>, IEEE, 2012, pp. 510–15.
  short: 'R. Hillmann, M. Trier, in: Proceedings of the 2012 IEEE/ACM International
    Conference on Advances in Social Networks Analysis and Mining, IEEE, United States,
    2012, pp. 510–515.'
date_created: 2019-09-19T12:49:33Z
date_updated: 2022-01-06T06:51:33Z
department:
- _id: '198'
keyword:
- Social Network Analysis
- Dynamic Network Motif Analysis
- Sentiment Dissemination
- Networking Effects
- Triads
language:
- iso: eng
page: 510-515
place: United States
publication: Proceedings of the 2012 IEEE/ACM International Conference on Advances
  in Social Networks Analysis and Mining
publication_identifier:
  isbn:
  - '9780769547992'
publisher: IEEE
status: public
title: Dissemination Patterns and Associated Network Effects of Sentiments in Social
  Networks
type: conference
user_id: '62809'
year: '2012'
...
---
_id: '11806'
abstract:
- lang: eng
  text: Microphone arrays represent the basis for many challenging acoustic sensing
    tasks. The accuracy of techniques like beamforming directly depends on a precise
    knowledge of the relative positions of the sensors used. Unfortunately, for certain
    use cases manually measuring the geometry of an array is not feasible due to practical
    constraints. In this paper we present an approach to unsupervised shape calibration
    of microphone array networks. We developed a hierarchical procedure that first
    performs local shape calibration based on coherence analysis and then employs
    SRP-PHAT in a network calibration method. Practical experiments demonstrate the
    effectiveness of our approach especially for highly reverberant acoustic environments.
author:
- first_name: Marius
  full_name: Hennecke, Marius
  last_name: Hennecke
- first_name: Thomas
  full_name: Ploetz, Thomas
  last_name: Ploetz
- first_name: Gernot A.
  full_name: Fink, Gernot A.
  last_name: Fink
- first_name: Joerg
  full_name: Schmalenstroeer, Joerg
  id: '460'
  last_name: Schmalenstroeer
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: 'Hennecke M, Ploetz T, Fink GA, Schmalenstroeer J, Haeb-Umbach R. A hierarchical
    approach to unsupervised shape calibration of microphone array networks. In: <i>IEEE/SP
    15th Workshop on Statistical Signal Processing (SSP 2009)</i>. ; 2009:257-260.
    doi:<a href="https://doi.org/10.1109/SSP.2009.5278589">10.1109/SSP.2009.5278589</a>'
  apa: Hennecke, M., Ploetz, T., Fink, G. A., Schmalenstroeer, J., &#38; Haeb-Umbach,
    R. (2009). A hierarchical approach to unsupervised shape calibration of microphone
    array networks. <i>IEEE/SP 15th Workshop on Statistical Signal Processing (SSP
    2009)</i>, 257–260. <a href="https://doi.org/10.1109/SSP.2009.5278589">https://doi.org/10.1109/SSP.2009.5278589</a>
  bibtex: '@inproceedings{Hennecke_Ploetz_Fink_Schmalenstroeer_Haeb-Umbach_2009, title={A
    hierarchical approach to unsupervised shape calibration of microphone array networks},
    DOI={<a href="https://doi.org/10.1109/SSP.2009.5278589">10.1109/SSP.2009.5278589</a>},
    booktitle={IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)},
    author={Hennecke, Marius and Ploetz, Thomas and Fink, Gernot A. and Schmalenstroeer,
    Joerg and Haeb-Umbach, Reinhold}, year={2009}, pages={257–260} }'
  chicago: Hennecke, Marius, Thomas Ploetz, Gernot A. Fink, Joerg Schmalenstroeer,
    and Reinhold Haeb-Umbach. “A Hierarchical Approach to Unsupervised Shape Calibration
    of Microphone Array Networks.” In <i>IEEE/SP 15th Workshop on Statistical Signal
    Processing (SSP 2009)</i>, 257–60, 2009. <a href="https://doi.org/10.1109/SSP.2009.5278589">https://doi.org/10.1109/SSP.2009.5278589</a>.
  ieee: 'M. Hennecke, T. Ploetz, G. A. Fink, J. Schmalenstroeer, and R. Haeb-Umbach,
    “A hierarchical approach to unsupervised shape calibration of microphone array
    networks,” in <i>IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)</i>,
    2009, pp. 257–260, doi: <a href="https://doi.org/10.1109/SSP.2009.5278589">10.1109/SSP.2009.5278589</a>.'
  mla: Hennecke, Marius, et al. “A Hierarchical Approach to Unsupervised Shape Calibration
    of Microphone Array Networks.” <i>IEEE/SP 15th Workshop on Statistical Signal
    Processing (SSP 2009)</i>, 2009, pp. 257–60, doi:<a href="https://doi.org/10.1109/SSP.2009.5278589">10.1109/SSP.2009.5278589</a>.
  short: 'M. Hennecke, T. Ploetz, G.A. Fink, J. Schmalenstroeer, R. Haeb-Umbach, in:
    IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009), 2009, pp. 257–260.'
date_created: 2019-07-12T05:28:37Z
date_updated: 2023-10-26T08:09:22Z
department:
- _id: '54'
doi: 10.1109/SSP.2009.5278589
keyword:
- acoustic sensing tasks
- array geometry
- calibration
- coherence analysis
- hierarchical procedure
- local shape calibration
- microphone array networks
- microphone arrays
- network calibration method
- sensor arrays
- SRP-PHAT
- unsupervised shape calibration
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2009/HePlFiScHa09.pdf
oa: '1'
page: 257-260
publication: IEEE/SP 15th Workshop on Statistical Signal Processing (SSP 2009)
quality_controlled: '1'
status: public
title: A hierarchical approach to unsupervised shape calibration of microphone array
  networks
type: conference
user_id: '460'
year: '2009'
...
---
_id: '37063'
abstract:
- lang: eng
  text: Safety-critical automotive systems must fulfill hard real-time constraints
    to guarantee their reliability and safety requirements. In the context of network-based
    electronics systems, high-level timing requirements have to be carefully mastered
    and traced throughout the whole development process. In this paper, we outline
    the management of scheduling-specific timing information by the application of
    a steer-by-wire design example. We apply the principles of the AUTOSAR-compliant
    Timing Augmented Description Language (TADL) following the methodology introduced
    by the TIMMO project[2]. Focus of the example will be the identification of end-to-end
    timing constraints and their refinement by means of stimuli-response event chains.
author:
- first_name: Kay
  full_name: Klobedanz, Kay
  last_name: Klobedanz
- first_name: Christoph
  full_name: Kuznik, Christoph
  last_name: Kuznik
- first_name: Ahmed
  full_name: Elfeky, Ahmed
  last_name: Elfeky
- first_name: Wolfgang
  full_name: Müller, Wolfgang
  id: '16243'
  last_name: Müller
citation:
  ama: 'Klobedanz K, Kuznik C, Elfeky A, Müller W. Development of Automotive Communication
    Based Real-Time Systems - A Steer-by-Wire Case Study. In: <i>Proceedings of IESS09</i>.
    Springer Verlag; 2009. doi:<a href="https://doi.org/10.1007/978-3-642-04284-3_20">10.1007/978-3-642-04284-3_20</a>'
  apa: Klobedanz, K., Kuznik, C., Elfeky, A., &#38; Müller, W. (2009). Development
    of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study.
    <i>Proceedings of IESS09</i>. <a href="https://doi.org/10.1007/978-3-642-04284-3_20">https://doi.org/10.1007/978-3-642-04284-3_20</a>
  bibtex: '@inproceedings{Klobedanz_Kuznik_Elfeky_Müller_2009, title={Development
    of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study},
    DOI={<a href="https://doi.org/10.1007/978-3-642-04284-3_20">10.1007/978-3-642-04284-3_20</a>},
    booktitle={Proceedings of IESS09}, publisher={Springer Verlag}, author={Klobedanz,
    Kay and Kuznik, Christoph and Elfeky, Ahmed and Müller, Wolfgang}, year={2009}
    }'
  chicago: Klobedanz, Kay, Christoph Kuznik, Ahmed Elfeky, and Wolfgang Müller. “Development
    of Automotive Communication Based Real-Time Systems - A Steer-by-Wire Case Study.”
    In <i>Proceedings of IESS09</i>. Springer Verlag, 2009. <a href="https://doi.org/10.1007/978-3-642-04284-3_20">https://doi.org/10.1007/978-3-642-04284-3_20</a>.
  ieee: 'K. Klobedanz, C. Kuznik, A. Elfeky, and W. Müller, “Development of Automotive
    Communication Based Real-Time Systems - A Steer-by-Wire Case Study,” 2009, doi:
    <a href="https://doi.org/10.1007/978-3-642-04284-3_20">10.1007/978-3-642-04284-3_20</a>.'
  mla: Klobedanz, Kay, et al. “Development of Automotive Communication Based Real-Time
    Systems - A Steer-by-Wire Case Study.” <i>Proceedings of IESS09</i>, Springer
    Verlag, 2009, doi:<a href="https://doi.org/10.1007/978-3-642-04284-3_20">10.1007/978-3-642-04284-3_20</a>.
  short: 'K. Klobedanz, C. Kuznik, A. Elfeky, W. Müller, in: Proceedings of IESS09,
    Springer Verlag, 2009.'
date_created: 2023-01-17T11:42:03Z
date_updated: 2023-01-17T11:42:08Z
department:
- _id: '672'
doi: 10.1007/978-3-642-04284-3_20
keyword:
- Abstraction Level     Controller Area Network     High Abstraction Level     Event
  Chain     Automotive System
language:
- iso: eng
publication: Proceedings of IESS09
publication_identifier:
  isbn:
  - 978-3-642-04283-6
publisher: Springer Verlag
status: public
title: Development of Automotive Communication Based Real-Time Systems - A Steer-by-Wire
  Case Study
type: conference
user_id: '5786'
year: '2009'
...
---
_id: '11820'
abstract:
- lang: eng
  text: In this paper, we derive an uncertainty decoding rule for automatic speech
    recognition (ASR), which accounts for both corrupted observations and inter-frame
    correlation. The conditional independence assumption, prevalent in hidden Markov
    model-based ASR, is relaxed to obtain a clean speech posterior that is conditioned
    on the complete observed feature vector sequence. This is a more informative posterior
    than one conditioned only on the current observation. The novel decoding is used
    to obtain a transmission-error robust remote ASR system, where the speech capturing
    unit is connected to the decoder via an error-prone communication network. We
    show how the clean speech posterior can be computed for communication links being
    characterized by either bit errors or packet loss. Recognition results are presented
    for both distributed and network speech recognition, where in the latter case
    common voice-over-IP codecs are employed.
author:
- first_name: Valentin
  full_name: Ion, Valentin
  last_name: Ion
- first_name: Reinhold
  full_name: Haeb-Umbach, Reinhold
  id: '242'
  last_name: Haeb-Umbach
citation:
  ama: Ion V, Haeb-Umbach R. A Novel Uncertainty Decoding Rule With Applications to
    Transmission Error Robust Speech Recognition. <i>IEEE Transactions on Audio, Speech,
    and Language Processing</i>. 2008;16(5):1047-1060. doi:<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>
  apa: Ion, V., &#38; Haeb-Umbach, R. (2008). A Novel Uncertainty Decoding Rule With
    Applications to Transmission Error Robust Speech Recognition. <i>IEEE Transactions
    on Audio, Speech, and Language Processing</i>, <i>16</i>(5), 1047–1060. <a href="https://doi.org/10.1109/TASL.2008.925879">https://doi.org/10.1109/TASL.2008.925879</a>
  bibtex: '@article{Ion_Haeb-Umbach_2008, title={A Novel Uncertainty Decoding Rule
    With Applications to Transmission Error Robust Speech Recognition}, volume={16},
    DOI={<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>},
    number={5}, journal={IEEE Transactions on Audio, Speech, and Language Processing},
    author={Ion, Valentin and Haeb-Umbach, Reinhold}, year={2008}, pages={1047–1060}
    }'
  chicago: 'Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding
    Rule With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE
    Transactions on Audio, Speech, and Language Processing</i> 16, no. 5 (2008): 1047–60.
    <a href="https://doi.org/10.1109/TASL.2008.925879">https://doi.org/10.1109/TASL.2008.925879</a>.'
  ieee: V. Ion and R. Haeb-Umbach, “A Novel Uncertainty Decoding Rule With Applications
    to Transmission Error Robust Speech Recognition,” <i>IEEE Transactions on Audio,
    Speech, and Language Processing</i>, vol. 16, no. 5, pp. 1047–1060, 2008.
  mla: Ion, Valentin, and Reinhold Haeb-Umbach. “A Novel Uncertainty Decoding Rule
    With Applications to Transmission Error Robust Speech Recognition.” <i>IEEE Transactions
    on Audio, Speech, and Language Processing</i>, vol. 16, no. 5, 2008, pp. 1047–60,
    doi:<a href="https://doi.org/10.1109/TASL.2008.925879">10.1109/TASL.2008.925879</a>.
  short: V. Ion, R. Haeb-Umbach, IEEE Transactions on Audio, Speech, and Language
    Processing 16 (2008) 1047–1060.
date_created: 2019-07-12T05:28:53Z
date_updated: 2022-01-06T06:51:10Z
department:
- _id: '54'
doi: 10.1109/TASL.2008.925879
intvolume: '        16'
issue: '5'
keyword:
- automatic speech recognition
- bit errors
- codecs
- communication links
- corrupted observations
- decoding
- distributed speech recognition
- error-prone communication network
- feature vector sequence
- hidden Markov model-based ASR
- hidden Markov models
- inter-frame correlation
- Internet telephony
- network speech recognition
- packet loss
- speech posterior
- speech recognition
- transmission error robust speech recognition
- uncertainty decoding
- voice-over-IP codecs
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://groups.uni-paderborn.de/nt/pubs/2008/IoHa08-1.pdf
oa: '1'
page: 1047-1060
publication: IEEE Transactions on Audio, Speech, and Language Processing
status: public
title: A Novel Uncertainty Decoding Rule With Applications to Transmission Error Robust
  Speech Recognition
type: journal_article
user_id: '44006'
volume: 16
year: '2008'
...
---
_id: '5218'
abstract:
- lang: eng
  text: 'In order to avoid over-regulation, some countries have experimented with
    what might be called threat-based regulation. The idea is - similarly to the contestable
    market model - that actual regulation may not be necessary as long as the threat
    of regulation is credible. In that case, so the idea, even monopolies will abstain
    from setting monopolistic prices in order to avoid being regulated. As experience
    from Germany and New Zealand has demonstrated, there are quite a number of problems
    associated with threat-based regulatory systems. The most significant problem
    has turned out to be the likely under-regulation and according welfare losses
    from market power, and in this context, a critical issue that has been identified
    is the credibility of the regulatory threat. If the threat of regulation is not
    credible, a light-handed regulatory regime (LHRR) amounts to leaving monopolistic
    firms unregulated, clearly an undesirable situation from a welfare point of view.
    This failure of threat-based regulatory systems results from potential free-rider
    problems associated with good corporate behaviour (as in the case of Germany''s
    electricity market) as well as the lack of credibility of the threat either because
    of the weakness of the enforcement authorities or due to political constraints.
    Furthermore, a problem emerges if exercising the threat of regulation implies
    an abandonment of the LHRR and a corresponding substitution with heavy-handed
    ex ante regulation. An innovative way out of this dilemma has been the quasi-automatic
    threshold system originally designed for New Zealand''s electricity distribution
    networks, which aims at simulating the pressures that companies would face in
    competitive markets. '
author:
- first_name: Justus
  full_name: Haucap, Justus
  last_name: Haucap
- first_name: Ulrich
  full_name: Heimeshoff, Ulrich
  last_name: Heimeshoff
- first_name: André
  full_name: Uhde, André
  id: '36049'
  last_name: Uhde
  orcid: https://orcid.org/0000-0002-8058-8857
citation:
  ama: 'Haucap J, Heimeshoff U, Uhde A. Credible Threats as an Instrument of Regulation
    for Network Industries. In: Welfens P, ed. <i>REGULATORY CHANGES, INNOVATIONS
    AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i>. Berlin; 2006:171-202.'
  apa: Haucap, J., Heimeshoff, U., &#38; Uhde, A. (2006). Credible Threats as an Instrument
    of Regulation for Network Industries. In P. Welfens (Ed.), <i>REGULATORY CHANGES,
    INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i> (pp. 171–202).
    Berlin.
  bibtex: '@inbook{Haucap_Heimeshoff_Uhde_2006, place={Berlin}, title={Credible Threats
    as an Instrument of Regulation for Network Industries}, booktitle={REGULATORY
    CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY}, author={Haucap,
    Justus and Heimeshoff, Ulrich and Uhde, André}, editor={Welfens, P.Editor}, year={2006},
    pages={171–202} }'
  chicago: Haucap, Justus, Ulrich Heimeshoff, and André Uhde. “Credible Threats as
    an Instrument of Regulation for Network Industries.” In <i>REGULATORY CHANGES,
    INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i>, edited by
    P. Welfens, 171–202. Berlin, 2006.
  ieee: J. Haucap, U. Heimeshoff, and A. Uhde, “Credible Threats as an Instrument
    of Regulation for Network Industries,” in <i>REGULATORY CHANGES, INNOVATIONS AND
    INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY</i>, P. Welfens, Ed. Berlin,
    2006, pp. 171–202.
  mla: Haucap, Justus, et al. “Credible Threats as an Instrument of Regulation for
    Network Industries.” <i>REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS
    IN THE DIGITAL WORLD ECONOMY</i>, edited by P. Welfens, 2006, pp. 171–202.
  short: 'J. Haucap, U. Heimeshoff, A. Uhde, in: P. Welfens (Ed.), REGULATORY CHANGES,
    INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL WORLD ECONOMY, Berlin, 2006,
    pp. 171–202.'
date_created: 2018-10-31T14:18:42Z
date_updated: 2022-01-06T07:01:47Z
department:
- _id: '186'
- _id: '188'
editor:
- first_name: P.
  full_name: Welfens, P.
  last_name: Welfens
extern: '1'
jel:
- L96
- L94
- L50
- K23
keyword:
- light-handed regulation
- network industries
- electricity
- telecommunications
language:
- iso: eng
page: 171-202
place: Berlin
publication: REGULATORY CHANGES, INNOVATIONS AND INVESTMENT DYNAMICS IN THE DIGITAL
  WORLD ECONOMY
publication_status: published
status: public
title: Credible Threats as an Instrument of Regulation for Network Industries
type: book_chapter
user_id: '21810'
year: '2006'
...
