@article{41766,
  author       = {{Fuchs, Christian and Hofkirchner, Wolfgang}},
  journal      = {{tripleC}},
  number       = {{3}},
  pages        = {{28--50}},
  title        = {{{The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems}}},
  doi          = {{https://doi.org/10.31269/triplec.v3i2.21}},
  volume       = {{3}},
  year         = {{2005}},
}

@inproceedings{42438,
  author       = {{Fuchs, Christian}},
  booktitle    = {{Proceedings of FIS 2005: Third Conference on the Foundations of Information Science}},
  editor       = {{Petitjean, Michel}},
  isbn         = {{3-906980-17-0}},
  location     = {{Paris}},
  title        = {{{Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach}}},
  year         = {{2005}},
}

@inproceedings{2120,
  author       = {{Awerbuch, Baruch and Scheideler, Christian}},
  booktitle    = {{ICALP}},
  pages        = {{183----195}},
  title        = {{{Group Spreading: A Protocol for Provably Secure Distributed Name Service}}},
  volume       = {{3142}},
  year         = {{2004}},
}

@inproceedings{2121,
  author       = {{Riley, Chris and Scheideler, Christian}},
  booktitle    = {{IPDPS}},
  title        = {{{A Distributed Hash Table for Computational Grids}}},
  year         = {{2004}},
}

@inproceedings{2122,
  author       = {{Awerbuch, Baruch and Scheideler, Christian}},
  booktitle    = {{IPTPS}},
  pages        = {{237----249}},
  title        = {{{Robust Distributed Name Service}}},
  volume       = {{3279}},
  year         = {{2004}},
}

@inproceedings{2123,
  author       = {{Ateniese, Giuseppe and Riley, Chris and Scheideler, Christian}},
  booktitle    = {{IWIA}},
  pages        = {{33----47}},
  title        = {{{Survivable Monitoring in Dynamic Networks}}},
  year         = {{2004}},
}

@inproceedings{2124,
  author       = {{Awerbuch, Baruch and Scheideler, Christian}},
  booktitle    = {{SODA}},
  pages        = {{318----327}},
  title        = {{{The hyperring: a low-congestion deterministic data structure for distributed environments}}},
  year         = {{2004}},
}

@inproceedings{2125,
  author       = {{Awerbuch, Baruch and Scheideler, Christian}},
  booktitle    = {{SPAA}},
  pages        = {{44----53}},
  title        = {{{Consistent and compact data management in distributed storage systems}}},
  year         = {{2004}},
}

@inproceedings{2126,
  author       = {{Bhargava, Ankur and Kothapalli, Kishore and Riley, Chris and Scheideler, Christian and Thober, Mark}},
  booktitle    = {{SPAA}},
  pages        = {{170----179}},
  title        = {{{Pagoda: a dynamic overlay network for routing, data management, and multicasting}}},
  year         = {{2004}},
}

@inproceedings{2127,
  author       = {{Bagchi, Amitabha and Bhargava, Ankur and Chaudhary, Amitabh and Eppstein, David and Scheideler, Christian}},
  booktitle    = {{SPAA}},
  pages        = {{286----293}},
  publisher    = {{ACM}},
  title        = {{{The effect of faults on network expansion}}},
  year         = {{2004}},
}

@inproceedings{5765,
  abstract     = {{Voting via the Internet has become a feasible option for political as well as non-political ballots. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. The article starts with a brief presentation of advantages and disadvantages of Internet ballots and presents application fields and pilot schemes. Then, technological security aspects are derived due to democratic basic principles. Especially the applied voting procedures are critical in security terms. Hence, the most relevant cryptographic protocols are presented and their drawbacks and shortcomings are identified. However, this article does not propose a new voting protocol. Beyond fixing cryptographic procedures for ballots, more elements are to be specified, e.g. responsibilities and rights of involved authorities or security precautions regarding hardware and software. For this reason, a structural security framework for electronic voting systems is presented which can be used for their composition and analysis.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{37th Annual Hawaii International Conference on System Sciences}},
  title        = {{{Security Aspects of Internet Voting}}},
  year         = {{2004}},
}

@inbook{8452,
  author       = {{Kremer, H.-Hugo}},
  booktitle    = {{Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)}},
  editor       = {{Gramlinger, F. and Steinemann, S. and Tramm, T.}},
  title        = {{{Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte?}}},
  year         = {{2004}},
}

@article{4270,
  abstract     = {{The adiabatic driving of the resonant electron dynamics in a one-dimensional resonant photonic band gap is
proposed as an optical mechanism for nonlinear ultrafast switching. Pulsed excitation inside the photonic gap
results in an ultrafast suppression and recovery of the gap. This behavior results from the adiabatic carrier
dynamics due to rapid radiative damping inside the band gap.}},
  author       = {{Schaarschmidt, Martin and Förstner, Jens and Knorr, Andreas and Prineas, John P. and Nielsen, Nils C. and Kuhl, Jürgen and Khitrova, Galina and Gibbs, Hyatt M. and Giessen, Harald and Koch, Stephan W.}},
  issn         = {{1098-0121}},
  journal      = {{Physical Review B}},
  keywords     = {{tet_topic_qw}},
  number       = {{23}},
  publisher    = {{American Physical Society (APS)}},
  title        = {{{Adiabatically driven electron dynamics in a resonant photonic band gap: Optical switching of a Bragg periodic semiconductor}}},
  doi          = {{10.1103/physrevb.70.233302}},
  volume       = {{70}},
  year         = {{2004}},
}

@phdthesis{4319,
  abstract     = {{In dieser Arbeit wird eine Theorie vorgestellt, welche die quantenmechanische Vielteilchenphysik
der Licht-Materie Wechselwirkung in Halbleiternanostrukturen beschreibt. Diese mikroskopische Beschreibung
wird durch Kombination eines allgemeinen Dichtematrixansatzes mit speziellen Methoden
zur Auswertung der Maxwellgleichungen wie der zeitaufgelösten Finite-Differenzen-Methode
(FDTD) erreicht. Die Theorie wird auf verschiedene physikalische Situationen angewendet, wie z.B.
Lichtausbreitung in Volumenhalbleitern, Interband- und Intersubbandübergänge in Quantenfilmstrukturen
und optische Anregung von Quantenpunkten. Der Fokus liegt dabei auf der Beschreibung der
linearen und nichtlinearen Antwort des Vielteilchensystems und seiner Ankopplung an das elektromagnetische
Feld. In diesem Zusammenhang wird sowohl die Erzeugung als auch der Zerfall von optischen
Anregungen untersucht, indem verschiedene Kopplungsmechanismen wie Elektron-Phonon-,
Elektron-Photon- und Elektron-Elektron-Wechselwirkung berücksichtigt werden.
Im Bereich der linearen Optik, also für Anregung mit geringer Intensität, ermöglicht die Theorie
die Berechnung von Absorptionsspektren. Verschiedene Effekte in linearer Optik werden in dieser
Arbeit untersucht und beschrieben: Linienaufspaltung durch Polaritonen im Volumenmaterial, Zunahme
der Linienbreite bei Intersubbandübergängen verursacht durch Elektron-Elektron- und Elektron-
Phonon-Streuung in einzelnen Quantenfilmen, Bildung einer optischen Bandlücke durch starke radiative
Kopplung in Vielfilmstrukturen in Bragg-Geometrie, Phononenseitenbänder verursacht durch
quantenkinetische Effekte in einzelnen Quantenpunkten und schliesslich Superradianz und Interferenzeffekte
in Quantenpunktgittern.
Bei nichtlinearer Anregung treten Dichte-Rabiflops als fundamentale Prozesse in allen betrachteten
Systemen auf und können als kohärente Be- und Entvölkerung von quantenmechanischen Zuständen
beobachtet werden. Der Einfluss von starker Lichtkopplung und verschiedenen Wechselwirkungen
auf dynamische Größen wie die Besetzung wird untersucht. Bei nichtlinearer Propagation, bei
der sich ein starker Lichtpuls über längere Strecken in einem System bewegt, wird selbstinduzierte
Verstärkung der Transmission näher betrachtet. Des weiteren werden von der Coulombwechselwirkung
verursachte nichtlineare Effekte wie exzitoninduziertes Dephasieren in Volumenmaterial und
verschränkte Zustände in Quantenpunkten untersucht, die einen Zusammenbruch der Hartree-Fock-
Näherung darstellen.
Zusammenfassend werden in dieser Arbeit verschiedene lineare und nichtlineare optische Effekte
in Halbleiternanostrukturen verschiedener Dimensionalität mit Hilfe einer allgemeinen Theorie, die
einen Dichtematrixansatz mit den Maxwellschen Gleichungen kombiniert, untersucht.}},
  author       = {{Förstner, Jens}},
  keywords     = {{tet_topic_qd, tet_topic_qw, tet_topic_phc}},
  title        = {{{Light Propagation and Many-Particle Effects in Semiconductor Nanostructures}}},
  doi          = {{10.14279/depositonce-999}},
  year         = {{2004}},
}

@article{5662,
  abstract     = {{Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam.}},
  author       = {{Schryen, Guido}},
  journal      = {{Wirtschaftsinformatik}},
  keywords     = {{Spam, E-Mail, Spoofing, Blockieren, Filtern, Lightweight Mail Transfer Agent Authentication Protocol (LMAP)}},
  number       = {{4}},
  pages        = {{281--288}},
  publisher    = {{Springer}},
  title        = {{{Effektivität von Lösungsansätzen zur Bekämpfung von Spam}}},
  volume       = {{46}},
  year         = {{2004}},
}

@inproceedings{5663,
  abstract     = {{Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}},
  editor       = {{Isaias, Pedro}},
  keywords     = {{e-mail, spam, filtering, blocking, LMAP, SMTP account}},
  pages        = {{937--940}},
  publisher    = {{IADIS Press}},
  title        = {{{Fighting Spam: Motivating an Account-based Approach}}},
  year         = {{2004}},
}

@inproceedings{5664,
  abstract     = {{Remote Internet voting systems still suffer from many security problems which rely on the clients, the servers, and the network connections. Denial-ofservice attacks and viruses still belong to the most challenging security issues. Projects and studies like the ?Voting Technology Project? of CALTECH and MIT or SERVE of the US Department of Defense set up to gain experience evidence many of the notional weaknesses of current Internet voting systems.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Workshop of the ESF TED Programme}},
  pages        = {{121--131}},
  title        = {{{How Security Problems Can Compromise Remote Internet Voting Systems}}},
  year         = {{2004}},
}

@inbook{5666,
  author       = {{Schryen, Guido}},
  booktitle    = {{Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung}},
  editor       = {{Gehrke, Gernot}},
  pages        = {{45--51}},
  publisher    = {{KOPAED-Verlag}},
  title        = {{{Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz?}}},
  year         = {{2004}},
}

@article{11732,
  abstract     = {{Satellite positioning systems, such as GPS or the future European system Galileo, employ direct-sequence spread-spectrum signals. The positioning accuracy is strongly affected by the quality of the pseudo range measurements. These measurements necessitate code and carrier synchronization of the received signal with the internally generated reference signals. In this type of systems one major error source is the multipath phenomenon, which results in a sum of delayed and weighted copies of the original signal to be present at the receiver input. This can result in a systematic error of the code tracking loop resulting in range errors in the order of several tens of meters. In this paper we propose an extension of the standard code tracking loop capable of estimating the parameters of the line-of-sight (LOS) signal and separating the LOS from the reflected signal portions. It is based on an analysis of the cross correlation of the received signal with a locally generated code sequence in the vicinity of the tracking point of a Delay-Locked Loop (DLL). For this reason, we call this method Cross Correlation Function (CCF) Analysis. The proposed method achieves considerably more accurate estimates than a DLL. Its performance is comparable to the Multipath Estimating Delay-Locked Loop (MEDLL) which is considered to be the best method for reducing multipath induced errors, so far. However, the computational complexity of the CCF Analysis is by a factor of three smaller compared to the MEDLL. Extensive simulations have been conducted for the proposed method and the MEDLL in order to assess the robustness of the two approaches under various signal constellations.}},
  author       = {{Bischoff, R. and Haeb-Umbach, Reinhold and Nammi, Sai Ramesh}},
  journal      = {{AEUe, Int. Journal on Electronics and Communications}},
  number       = {{1}},
  title        = {{{Multipath-Resistant Time of Arrival Estimation for Satellite Positioning}}},
  volume       = {{58}},
  year         = {{2004}},
}

@inproceedings{11790,
  abstract     = {{A major drawback of distributed versus terminal-based speech recognition is the fact that transmission errors can lead to degraded recognition performance. In this paper we employ soft features to mitigate the effect of bit errors on wireless transmission links: At the receiver a posteriori probabilities of the transmitted feature vectors are computed by combining bit reliability information provided by the channel decoder and a priori knowledge about residual redundancy in the feature vectors. While the first-order moment of the a posteriori probability function is the MMSE estimate, the second-order moment is a measure of the uncertainty in the reconstructed features. We conducted realistic simulations of GSM transmission and achieved significant improvements in word accuracy compared to the error mitigation strategy described in the ETSI standard.}},
  author       = {{Haeb-Umbach, Reinhold and Ion, Valentin}},
  booktitle    = {{International Conference on Spoken Language Processing (ICSLP 2004)}},
  title        = {{{Soft Features for Improved Distributed Speech Recognition over Wireless Networks}}},
  year         = {{2004}},
}

