@article{57369,
  author       = {{Bürgel, Christoph and Siepmann, Dirk}},
  journal      = {{Zenodo}},
  title        = {{{Le corpus de référence du français contemporain}}},
  year         = {{2014}},
}

@inbook{18474,
  author       = {{Friedrich, Christoph and Schindlmayr, Arno}},
  booktitle    = {{Computing Solids: Models, ab initio Methods and Supercomputing}},
  editor       = {{Blügel, Stefan and Helbig, Nicole and Meden, Volker and Wortmann, Daniel}},
  isbn         = {{978-3-89336-912-6}},
  issn         = {{1866-1807}},
  location     = {{Jülich}},
  pages        = {{A4.1--A4.21}},
  publisher    = {{Forschungszentrum Jülich}},
  title        = {{{Many-body perturbation theory: The GW approximation}}},
  volume       = {{74}},
  year         = {{2014}},
}

@inproceedings{24072,
  author       = {{Büscher, Monika and Easton, Catherine and Kuhnert, Maike and Wietfeld, Christian and Ahls{\'e}n, Matts and Pottebaum, Jens and van Veelen, J. Bernard}},
  booktitle    = {{11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014}},
  editor       = {{Hiltz, Starr Roxanne and Plotnick, Linda and Pfaf, Mark and Shih, Patrick C.}},
  isbn         = {{978-0-692-21194-6}},
  keywords     = {{Ver{\}},
  publisher    = {{{ISCRAM Association}}},
  title        = {{{Cloud ethics for disaster response for Crisis Response and Management}}},
  year         = {{2014}},
}

@inproceedings{24046,
  author       = {{Pottebaum, Jens and Marterer, Robin and Schneider, Steffen}},
  booktitle    = {{11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014}},
  editor       = {{Hiltz, Starr Roxanne and Plotnick, Linda and Pfaf, Mark and Shih, Patrick C.}},
  isbn         = {{978-0-692-21194-6}},
  keywords     = {{Ver{\}},
  publisher    = {{{ISCRAM Association}}},
  title        = {{{Taxonomy of IT support for training emergency response & management for Crisis Response and Management}}},
  year         = {{2014}},
}

@techreport{2733,
  author       = {{Dimant, Eugen and Krieger, Tim and Redlin, Margarete}},
  publisher    = {{Paderborn University, CIE Center for International Economics}},
  title        = {{{A Crook is a Crook … But is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption}}},
  volume       = {{2013-14}},
  year         = {{2013}},
}

@techreport{2739,
  author       = {{Dimant, Eugen and Krieger, Tim  and Redlin, Margarete}},
  publisher    = {{Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg}},
  title        = {{{A crook is a crook ... but is he still a crook abroad? On the effect of immigration on destination-country corruption}}},
  volume       = {{2013-03}},
  year         = {{2013}},
}

@article{5682,
  author       = {{de Meer, Hermann and Diener, Michael and Herkenhöner, Ralph and Kucera, Markus and Niedermeier, Michael and Reisser, Andreas and Schryen, Guido and Vetter, Michael and Waas, Thomas and Yasasin, Emrah}},
  journal      = {{PIK - Praxis der Informationsverarbeitung und Kommunikation}},
  number       = {{3}},
  pages        = {{153--159}},
  publisher    = {{de Gruyter}},
  title        = {{{Sicherheitsherausforderungen in hochverteilten Systemen}}},
  volume       = {{36}},
  year         = {{2013}},
}

@article{6166,
  author       = {{Wex, Felix and Schryen, Guido}},
  journal      = {{Blick in die Wissenschaft}},
  number       = {{28}},
  pages        = {{27--32}},
  title        = {{{Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung}}},
  year         = {{2013}},
}

@misc{487,
  author       = {{Bobolz, Jan}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Security Proofs for Pairing-Based Cryptography in the Generic Group Model}}},
  year         = {{2013}},
}

@article{3963,
  abstract     = {{Whispering gallery modes (WGMs) were observed in 60 nm thin cubic AlN microdisk resonators containing a single layer of non-polar cubic GaN quantum dots. Freestanding microdisks were patterned by means of electron beam lithography and a two step reactive ion etching process. Micro-photoluminescence spectroscopy investigations were performed for optical characterization. We analyzed the mode spacing for disk diameters ranging from 2-4 lm. Numerical investigations using three dimensional finite difference time domain calculations were in good agreement
with the experimental data. Whispering gallery modes of the radial orders 1 and 2 were identified by means of simulated mode field distributions.}},
  author       = {{Bürger, M. and Ruth, M. and Declair, S. and Förstner, Jens and Meier, Cedrik and As, Donat Josef}},
  issn         = {{0003-6951}},
  journal      = {{Applied Physics Letters}},
  keywords     = {{tet_topic_qd, tet_topic_microdisk}},
  number       = {{8}},
  pages        = {{081105}},
  publisher    = {{AIP Publishing}},
  title        = {{{Whispering gallery modes in zinc-blende AlN microdisks containing non-polar GaN quantum dots}}},
  doi          = {{10.1063/1.4793653}},
  volume       = {{102}},
  year         = {{2013}},
}

@unpublished{538,
  abstract     = {{We present a new technique to realize attribute-based encryption (ABE) schemes secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE schemes to achieve more efficient constructions than the known generic constructions of CCA-secure ABE schemes. We restrict ourselves to the construction of attribute-based key encapsulation mechanisms (KEMs) and present two concrete CCA-secure schemes: a key-policy attribute-based KEM that is based on Goyal's key-policy ABE and a ciphertext-policy attribute-based KEM that is based on Waters' ciphertext-policy ABE. To achieve our goals, we use an appropriate hash function and need to extend the public parameters and the ciphertexts of the underlying CPA-secure encryption schemes only by a single group element. Moreover, we use the same hardness assumptions as the underlying CPA-secure encryption schemes.}},
  author       = {{Blömer, Johannes and Liske, Gennadij}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles}}},
  year         = {{2013}},
}

@article{5575,
  author       = {{Wex, Felix and Schryen, Guido and Neumann, Dirk}},
  journal      = {{International Journal of Information Systems for Crisis Response and Management}},
  number       = {{4}},
  pages        = {{63--80}},
  publisher    = {{IGI Publ.}},
  title        = {{{Assignments of Collaborative Rescue Units during Emergency Response}}},
  volume       = {{5}},
  year         = {{2013}},
}

@inproceedings{5576,
  author       = {{Wex, Felix and Schryen, Guido and Neumann, Dirk}},
  booktitle    = {{Proceedings of the 46th Hawaii International Conference on System Science}},
  title        = {{{Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response}}},
  year         = {{2013}},
}

@article{5637,
  author       = {{Schryen, Guido}},
  journal      = {{European Journal of Information Systems (EJIS)}},
  number       = {{2}},
  pages        = {{139--169}},
  title        = {{{Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there}}},
  volume       = {{22}},
  year         = {{2013}},
}

@inproceedings{11740,
  abstract     = {{In this contribution we derive the Maximum A-Posteriori (MAP) estimates of the parameters of a Gaussian Mixture Model (GMM) in the presence of noisy observations. We assume the distortion to be white Gaussian noise of known mean and variance. An approximate conjugate prior of the GMM parameters is derived allowing for a computationally efficient implementation in a sequential estimation framework. Simulations on artificially generated data demonstrate the superiority of the proposed method compared to the Maximum Likelihood technique and to the ordinary MAP approach, whose estimates are corrected by the known statistics of the distortion in a straightforward manner.}},
  author       = {{Chinaev, Aleksej and Haeb-Umbach, Reinhold}},
  booktitle    = {{38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)}},
  issn         = {{1520-6149}},
  keywords     = {{Gaussian noise, maximum likelihood estimation, parameter estimation, GMM parameter, Gaussian mixture model, MAP estimation, Map-based estimation, maximum a-posteriori estimation, maximum likelihood technique, noisy observation, sequential estimation framework, white Gaussian noise, Additive noise, Gaussian mixture model, Maximum likelihood estimation, Noise measurement, Gaussian mixture model, Maximum a posteriori estimation, Maximum likelihood estimation}},
  pages        = {{3352--3356}},
  title        = {{{MAP-based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations}}},
  doi          = {{10.1109/ICASSP.2013.6638279}},
  year         = {{2013}},
}

@inproceedings{11742,
  abstract     = {{In this paper we present an improved version of the recently proposed Maximum A-Posteriori (MAP) based noise power spectral density estimator. An empirical bias compensation and bandwidth adjustment reduce bias and variance of the noise variance estimates. The main advantage of the MAP-based postprocessor is its low estimation variance. The estimator is employed in the second stage of a two-stage single-channel speech enhancement system, where eight different state-of-the-art noise tracking algorithms were tested in the first stage. While the postprocessor hardly affects the results in stationary noise scenarios, it becomes the more effective the more nonstationary the noise is. The proposed postprocessor was able to improve all systems in babble noise w.r.t. the perceptual evaluation of speech quality performance.}},
  author       = {{Chinaev, Aleksej and Haeb-Umbach, Reinhold and Taghia, Jalal and Martin, Rainer}},
  booktitle    = {{38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)}},
  issn         = {{1520-6149}},
  pages        = {{7477--7481}},
  title        = {{{Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-based Postprocessor}}},
  doi          = {{10.1109/ICASSP.2013.6639116}},
  year         = {{2013}},
}

@inproceedings{11762,
  abstract     = {{Among the different configurations of multi-microphone systems, e.g., in applications of speech dereverberation or denoising, we consider the case without a priori information of the microphone-array geometry. This naturally invokes explicit or implicit identification of source-receiver transfer functions as an indirect description of the microphone-array configuration. However, this blind channel identification (BCI) has been difficult due to the lack of unique identifiability in the presence of observation noise or near-common channel zeros. In this paper, we study the implicit BCI performance of blind signal enhancement techniques such as the adaptive principal component analysis (PCA) or the iterative blind equalization and channel identification (BENCH). To this end, we make use of a recently proposed metric, the normalized filter-projection misalignment (NFPM), which is tailored for BCI evaluation in ill-conditioned (e.g., noisy) scenarios. The resulting understanding of implicit BCI performance can help to judge the behavior of multi-microphone speech enhancement systems and the suitability of implicit BCI to serve channel-based (i.e., channel-informed) enhancement.}},
  author       = {{Enzner, Gerald and Schmid, Dominic and Haeb-Umbach, Reinhold}},
  booktitle    = {{21th European Signal Processing Conference (EUSIPCO 2013)}},
  title        = {{{On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques}}},
  year         = {{2013}},
}

@inproceedings{11815,
  author       = {{Heymann, Jahn and Walter, Oliver and Haeb-Umbach, Reinhold and Raj, Bhiksha}},
  booktitle    = {{Automatic Speech Recognition and Understanding Workshop (ASRU 2013)}},
  title        = {{{Unsupervised Word Segmentation from Noisy Input}}},
  year         = {{2013}},
}

@inproceedings{11816,
  abstract     = {{In this paper, we consider the Maximum Likelihood (ML) estimation of the parameters of a GAUSSIAN in the presence of censored, i.e., clipped data. We show that the resulting Expectation Maximization (EM) algorithm delivers virtually biasfree and efficient estimates, and we discuss its convergence properties. We also discuss optimal classification in the presence of censored data. Censored data are frequently encountered in wireless LAN positioning systems based on the fingerprinting method employing signal strength measurements, due to the limited sensitivity of the portable devices. Experiments both on simulated and real-world data demonstrate the effectiveness of the proposed algorithms.}},
  author       = {{Hoang, Manh Kha and Haeb-Umbach, Reinhold}},
  booktitle    = {{38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)}},
  issn         = {{1520-6149}},
  keywords     = {{Gaussian processes, Global Positioning System, convergence, expectation-maximisation algorithm, fingerprint identification, indoor radio, signal classification, wireless LAN, EM algorithm, ML estimation, WiFi indoor positioning, censored Gaussian data classification, clipped data, convergence properties, expectation maximization algorithm, fingerprinting method, maximum likelihood estimation, optimal classification, parameters estimation, portable devices sensitivity, signal strength measurements, wireless LAN positioning systems, Convergence, IEEE 802.11 Standards, Maximum likelihood estimation, Parameter estimation, Position measurement, Training, Indoor positioning, censored data, expectation maximization, signal strength, wireless LAN}},
  pages        = {{3721--3725}},
  title        = {{{Parameter estimation and classification of censored Gaussian data with application to WiFi indoor positioning}}},
  doi          = {{10.1109/ICASSP.2013.6638353}},
  year         = {{2013}},
}

@inproceedings{11841,
  abstract     = {{Recently, substantial progress has been made in the field of reverberant speech signal processing, including both single- and multichannel de-reverberation techniques, and automatic speech recognition (ASR) techniques robust to reverberation. To evaluate state-of-the-art algorithms and obtain new insights regarding potential future research directions, we propose a common evaluation framework including datasets, tasks, and evaluation metrics for both speech enhancement and ASR techniques. The proposed framework will be used as a common basis for the REVERB (REverberant Voice Enhancement and Recognition Benchmark) challenge. This paper describes the rationale behind the challenge, and provides a detailed description of the evaluation framework and benchmark results.}},
  author       = {{Kinoshita, Keisuke and Delcroix, Marc and Yoshioka, Takuya and Nakatani, Tomohiro and Habets, Emanuel and Haeb-Umbach, Reinhold and Leutnant, Volker and Sehr, Armin and Kellermann, Walter and Maas, Roland and Gannot, Sharon and Raj, Bhiksha}},
  booktitle    = {{ IEEE Workshop on Applications of Signal Processing to Audio and Acoustics }},
  keywords     = {{Reverberant speech, dereverberation, ASR, evaluation, challenge}},
  pages        = {{ 22--23 }},
  title        = {{{The reverb challenge: a common evaluation framework for dereverberation and recognition of reverberant speech}}},
  year         = {{2013}},
}

