[{"extern":"1","language":[{"iso":"fre"}],"_id":"57369","user_id":"71124","department":[{"_id":"491"}],"status":"public","type":"journal_article","publication":"Zenodo","title":"Le corpus de référence du français contemporain","main_file_link":[{"open_access":"1","url":"https://zenodo.org/record/12353?ln=en#.VLebq3ti8Xg"}],"oa":"1","date_updated":"2024-11-24T00:11:36Z","date_created":"2024-11-23T22:55:00Z","author":[{"first_name":"Christoph","full_name":"Bürgel, Christoph","id":"58448","last_name":"Bürgel"},{"first_name":"Dirk","last_name":"Siepmann","full_name":"Siepmann, Dirk"}],"year":"2014","citation":{"short":"C. Bürgel, D. Siepmann, Zenodo (2014).","mla":"Bürgel, Christoph, and Dirk Siepmann. “Le corpus de référence du français contemporain.” <i>Zenodo</i>, 2014.","bibtex":"@article{Bürgel_Siepmann_2014, title={Le corpus de référence du français contemporain}, journal={Zenodo}, author={Bürgel, Christoph and Siepmann, Dirk}, year={2014} }","apa":"Bürgel, C., &#38; Siepmann, D. (2014). Le corpus de référence du français contemporain. <i>Zenodo</i>.","chicago":"Bürgel, Christoph, and Dirk Siepmann. “Le corpus de référence du français contemporain.” <i>Zenodo</i>, 2014.","ieee":"C. Bürgel and D. Siepmann, “Le corpus de référence du français contemporain,” <i>Zenodo</i>, 2014.","ama":"Bürgel C, Siepmann D. Le corpus de référence du français contemporain. <i>Zenodo</i>. Published online 2014."},"publication_status":"published"},{"intvolume":"        74","page":"A4.1-A4.21","citation":{"short":"C. Friedrich, A. Schindlmayr, in: S. Blügel, N. Helbig, V. Meden, D. Wortmann (Eds.), Computing Solids: Models, Ab Initio Methods and Supercomputing, Forschungszentrum Jülich, Jülich, 2014, p. A4.1-A4.21.","mla":"Friedrich, Christoph, and Arno Schindlmayr. “Many-Body Perturbation Theory: The GW Approximation.” <i>Computing Solids: Models, Ab Initio Methods and Supercomputing</i>, edited by Stefan Blügel et al., vol. 74, Forschungszentrum Jülich, 2014, p. A4.1-A4.21.","bibtex":"@inbook{Friedrich_Schindlmayr_2014, place={Jülich}, series={Key Technologies}, title={Many-body perturbation theory: The GW approximation}, volume={74}, booktitle={Computing Solids: Models, ab initio Methods and Supercomputing}, publisher={Forschungszentrum Jülich}, author={Friedrich, Christoph and Schindlmayr, Arno}, editor={Blügel, Stefan and Helbig, Nicole and Meden, Volker and Wortmann, Daniel}, year={2014}, pages={A4.1-A4.21}, collection={Key Technologies} }","apa":"Friedrich, C., &#38; Schindlmayr, A. (2014). Many-body perturbation theory: The GW approximation. In S. Blügel, N. Helbig, V. Meden, &#38; D. Wortmann (Eds.), <i>Computing Solids: Models, ab initio Methods and Supercomputing</i> (Vol. 74, p. A4.1-A4.21). Forschungszentrum Jülich.","chicago":"Friedrich, Christoph, and Arno Schindlmayr. “Many-Body Perturbation Theory: The GW Approximation.” In <i>Computing Solids: Models, Ab Initio Methods and Supercomputing</i>, edited by Stefan Blügel, Nicole Helbig, Volker Meden, and Daniel Wortmann, 74:A4.1-A4.21. Key Technologies. Jülich: Forschungszentrum Jülich, 2014.","ieee":"C. Friedrich and A. Schindlmayr, “Many-body perturbation theory: The GW approximation,” in <i>Computing Solids: Models, ab initio Methods and Supercomputing</i>, vol. 74, S. Blügel, N. Helbig, V. Meden, and D. Wortmann, Eds. Jülich: Forschungszentrum Jülich, 2014, p. A4.1-A4.21.","ama":"Friedrich C, Schindlmayr A. Many-body perturbation theory: The GW approximation. In: Blügel S, Helbig N, Meden V, Wortmann D, eds. <i>Computing Solids: Models, Ab Initio Methods and Supercomputing</i>. Vol 74. Key Technologies. Forschungszentrum Jülich; 2014:A4.1-A4.21."},"place":"Jülich","has_accepted_license":"1","publication_identifier":{"issn":["1866-1807"],"isbn":["978-3-89336-912-6"]},"publication_status":"published","conference":{"location":"Jülich","end_date":"2014-03-21","start_date":"2014-03-10","name":"45th Spring School of the Institute of Solid State Research"},"main_file_link":[{"open_access":"1","url":"http://hdl.handle.net/2128/8540"}],"volume":74,"author":[{"last_name":"Friedrich","full_name":"Friedrich, Christoph","first_name":"Christoph"},{"first_name":"Arno","last_name":"Schindlmayr","orcid":"0000-0002-4855-071X","full_name":"Schindlmayr, Arno","id":"458"}],"oa":"1","date_updated":"2025-12-16T08:07:31Z","status":"public","editor":[{"first_name":"Stefan","last_name":"Blügel","full_name":"Blügel, Stefan"},{"first_name":"Nicole","full_name":"Helbig, Nicole","last_name":"Helbig"},{"first_name":"Volker","last_name":"Meden","full_name":"Meden, Volker"},{"full_name":"Wortmann, Daniel","last_name":"Wortmann","first_name":"Daniel"}],"type":"book_chapter","file_date_updated":"2022-01-06T06:53:34Z","department":[{"_id":"296"},{"_id":"35"},{"_id":"15"},{"_id":"170"},{"_id":"230"}],"user_id":"16199","series_title":"Key Technologies","_id":"18474","year":"2014","title":"Many-body perturbation theory: The GW approximation","date_created":"2020-08-27T21:40:39Z","publisher":"Forschungszentrum Jülich","file":[{"creator":"schindlm","file_size":718521,"file_name":"A4-Friedrich.pdf","content_type":"application/pdf","date_updated":"2022-01-06T06:53:34Z","date_created":"2020-10-05T10:57:49Z","title":"Many-body perturbation theory: The GW approximation","description":"© 2014 Forschungszentrum Jülich","access_level":"request","file_id":"19876","relation":"main_file"}],"publication":"Computing Solids: Models, ab initio Methods and Supercomputing","language":[{"iso":"eng"}],"ddc":["530"]},{"language":[{"iso":"eng"}],"keyword":["Ver{\\"],"user_id":"405","_id":"24072","status":"public","editor":[{"first_name":"Starr Roxanne","last_name":"Hiltz","full_name":"Hiltz, Starr Roxanne"},{"first_name":"Linda","last_name":"Plotnick","full_name":"Plotnick, Linda"},{"first_name":"Mark","last_name":"Pfaf","full_name":"Pfaf, Mark"},{"full_name":"Shih, Patrick C.","last_name":"Shih","first_name":"Patrick C."}],"type":"conference","publication":"11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014","main_file_link":[{"url":"http://idl.iscram.org/files/buescher/2014/354_Buescher_etal2014.pdf","open_access":"1"}],"title":"Cloud ethics for disaster response for Crisis Response and Management","date_created":"2021-09-09T12:29:33Z","author":[{"full_name":"Büscher, Monika","last_name":"Büscher","first_name":"Monika"},{"first_name":"Catherine","last_name":"Easton","full_name":"Easton, Catherine"},{"full_name":"Kuhnert, Maike","last_name":"Kuhnert","first_name":"Maike"},{"full_name":"Wietfeld, Christian","last_name":"Wietfeld","first_name":"Christian"},{"last_name":"Ahls{\\'e}n","full_name":"Ahls{\\'e}n, Matts","first_name":"Matts"},{"full_name":"Pottebaum, Jens","id":"405","last_name":"Pottebaum","orcid":"http://orcid.org/0000-0001-8778-2989","first_name":"Jens"},{"last_name":"van Veelen","full_name":"van Veelen, J. Bernard","first_name":"J. Bernard"}],"date_updated":"2026-03-31T03:39:03Z","publisher":"{ISCRAM Association}","oa":"1","citation":{"ieee":"M. Büscher <i>et al.</i>, “Cloud ethics for disaster response for Crisis Response and Management,” in <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>, 2014.","chicago":"Büscher, Monika, Catherine Easton, Maike Kuhnert, Christian Wietfeld, Matts Ahls{\\’e}n, Jens Pottebaum, and J. Bernard van Veelen. “Cloud Ethics for Disaster Response for Crisis Response and Management.” In <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>, edited by Starr Roxanne Hiltz, Linda Plotnick, Mark Pfaf, and Patrick C. Shih. {ISCRAM Association}, 2014.","ama":"Büscher M, Easton C, Kuhnert M, et al. Cloud ethics for disaster response for Crisis Response and Management. In: Hiltz SR, Plotnick L, Pfaf M, Shih PC, eds. <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>. {ISCRAM Association}; 2014.","short":"M. Büscher, C. Easton, M. Kuhnert, C. Wietfeld, M. Ahls{\\’e}n, J. Pottebaum, J.B. van Veelen, in: S.R. Hiltz, L. Plotnick, M. Pfaf, P.C. Shih (Eds.), 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014, {ISCRAM Association}, 2014.","bibtex":"@inproceedings{Büscher_Easton_Kuhnert_Wietfeld_Ahls{\\’e}n_Pottebaum_van Veelen_2014, title={Cloud ethics for disaster response for Crisis Response and Management}, booktitle={11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014}, publisher={{ISCRAM Association}}, author={Büscher, Monika and Easton, Catherine and Kuhnert, Maike and Wietfeld, Christian and Ahls{\\’e}n, Matts and Pottebaum, Jens and van Veelen, J. Bernard}, editor={Hiltz, Starr Roxanne and Plotnick, Linda and Pfaf, Mark and Shih, Patrick C.}, year={2014} }","mla":"Büscher, Monika, et al. “Cloud Ethics for Disaster Response for Crisis Response and Management.” <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>, edited by Starr Roxanne Hiltz et al., {ISCRAM Association}, 2014.","apa":"Büscher, M., Easton, C., Kuhnert, M., Wietfeld, C., Ahls{\\’e}n, M., Pottebaum, J., &#38; van Veelen, J. B. (2014). Cloud ethics for disaster response for Crisis Response and Management. In S. R. Hiltz, L. Plotnick, M. Pfaf, &#38; P. C. Shih (Eds.), <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>. {ISCRAM Association}."},"year":"2014","quality_controlled":"1","publication_identifier":{"isbn":["978-0-692-21194-6"]}},{"user_id":"405","_id":"24046","language":[{"iso":"eng"}],"keyword":["Ver{\\"],"type":"conference","publication":"11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014","status":"public","editor":[{"last_name":"Hiltz","full_name":"Hiltz, Starr Roxanne","first_name":"Starr Roxanne"},{"full_name":"Plotnick, Linda","last_name":"Plotnick","first_name":"Linda"},{"first_name":"Mark","full_name":"Pfaf, Mark","last_name":"Pfaf"},{"first_name":"Patrick C.","full_name":"Shih, Patrick C.","last_name":"Shih"}],"author":[{"first_name":"Jens","orcid":"http://orcid.org/0000-0001-8778-2989","last_name":"Pottebaum","id":"405","full_name":"Pottebaum, Jens"},{"full_name":"Marterer, Robin","last_name":"Marterer","first_name":"Robin"},{"last_name":"Schneider","full_name":"Schneider, Steffen","first_name":"Steffen"}],"date_created":"2021-09-09T12:24:53Z","date_updated":"2026-03-31T03:38:32Z","oa":"1","publisher":"{ISCRAM Association}","main_file_link":[{"url":"http://idl.iscram.org/files/pottebaum/2014/848_Pottebaum_etal2014.pdf","open_access":"1"}],"title":"Taxonomy of IT support for training emergency response & management for Crisis Response and Management","quality_controlled":"1","publication_identifier":{"isbn":["978-0-692-21194-6"]},"citation":{"apa":"Pottebaum, J., Marterer, R., &#38; Schneider, S. (2014). Taxonomy of IT support for training emergency response &#38; management for Crisis Response and Management. In S. R. Hiltz, L. Plotnick, M. Pfaf, &#38; P. C. Shih (Eds.), <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>. {ISCRAM Association}.","ama":"Pottebaum J, Marterer R, Schneider S. Taxonomy of IT support for training emergency response &#38; management for Crisis Response and Management. In: Hiltz SR, Plotnick L, Pfaf M, Shih PC, eds. <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>. {ISCRAM Association}; 2014.","short":"J. Pottebaum, R. Marterer, S. Schneider, in: S.R. Hiltz, L. Plotnick, M. Pfaf, P.C. Shih (Eds.), 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014, {ISCRAM Association}, 2014.","mla":"Pottebaum, Jens, et al. “Taxonomy of IT Support for Training Emergency Response &#38; Management for Crisis Response and Management.” <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>, edited by Starr Roxanne Hiltz et al., {ISCRAM Association}, 2014.","bibtex":"@inproceedings{Pottebaum_Marterer_Schneider_2014, title={Taxonomy of IT support for training emergency response &#38; management for Crisis Response and Management}, booktitle={11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014}, publisher={{ISCRAM Association}}, author={Pottebaum, Jens and Marterer, Robin and Schneider, Steffen}, editor={Hiltz, Starr Roxanne and Plotnick, Linda and Pfaf, Mark and Shih, Patrick C.}, year={2014} }","chicago":"Pottebaum, Jens, Robin Marterer, and Steffen Schneider. “Taxonomy of IT Support for Training Emergency Response &#38; Management for Crisis Response and Management.” In <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>, edited by Starr Roxanne Hiltz, Linda Plotnick, Mark Pfaf, and Patrick C. Shih. {ISCRAM Association}, 2014.","ieee":"J. Pottebaum, R. Marterer, and S. Schneider, “Taxonomy of IT support for training emergency response &#38; management for Crisis Response and Management,” in <i>11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, May 18-21, 2014</i>, 2014."},"year":"2014"},{"status":"public","type":"working_paper","department":[{"_id":"475"},{"_id":"200"},{"_id":"202"}],"series_title":"Working Papers CIE","user_id":"135","_id":"2733","citation":{"apa":"Dimant, E., Krieger, T., &#38; Redlin, M. (2013). <i>A Crook is a Crook … But is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption</i> (Vol. 2013–14). Paderborn University, CIE Center for International Economics.","bibtex":"@book{Dimant_Krieger_Redlin_2013, series={Working Papers CIE}, title={A Crook is a Crook … But is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption}, volume={2013–14}, publisher={Paderborn University, CIE Center for International Economics}, author={Dimant, Eugen and Krieger, Tim and Redlin, Margarete}, year={2013}, collection={Working Papers CIE} }","short":"E. Dimant, T. Krieger, M. Redlin, A Crook Is a Crook … But Is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption, Paderborn University, CIE Center for International Economics, 2013.","mla":"Dimant, Eugen, et al. <i>A Crook Is a Crook … But Is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption</i>. Vol. 2013–14, Paderborn University, CIE Center for International Economics, 2013.","ama":"Dimant E, Krieger T, Redlin M. <i>A Crook Is a Crook … But Is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption</i>. Vol 2013-14. Paderborn University, CIE Center for International Economics; 2013.","chicago":"Dimant, Eugen, Tim Krieger, and Margarete Redlin. <i>A Crook Is a Crook … But Is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption</i>. Vol. 2013–14. Working Papers CIE. Paderborn University, CIE Center for International Economics, 2013.","ieee":"E. Dimant, T. Krieger, and M. Redlin, <i>A Crook is a Crook … But is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption</i>, vol. 2013–14. Paderborn University, CIE Center for International Economics, 2013."},"year":"2013","main_file_link":[{"open_access":"1","url":"https://EconPapers.repec.org/RePEc:pdn:ciepap:71"}],"title":"A Crook is a Crook … But is He Still a Crook Abroad? - On the Effect of Immigration on Destination-Country Corruption","volume":"2013-14","author":[{"full_name":"Dimant, Eugen","last_name":"Dimant","first_name":"Eugen"},{"full_name":"Krieger, Tim","last_name":"Krieger","first_name":"Tim"},{"last_name":"Redlin","id":"135","full_name":"Redlin, Margarete","first_name":"Margarete"}],"date_created":"2018-05-14T07:59:13Z","date_updated":"2022-01-06T06:57:38Z","oa":"1","publisher":"Paderborn University, CIE Center for International Economics"},{"oa":"1","publisher":"Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg","date_updated":"2022-01-06T06:57:38Z","date_created":"2018-05-14T08:38:49Z","author":[{"first_name":"Eugen","full_name":"Dimant, Eugen","last_name":"Dimant"},{"first_name":"Tim ","last_name":"Krieger","full_name":"Krieger, Tim "},{"first_name":"Margarete","id":"135","full_name":"Redlin, Margarete","last_name":"Redlin"}],"volume":"2013-03","title":"A crook is a crook ... but is he still a crook abroad? On the effect of immigration on destination-country corruption","main_file_link":[{"url":"http://hdl.handle.net/10419/87673","open_access":"1"}],"year":"2013","citation":{"short":"E. Dimant, T. Krieger, M. Redlin, A Crook Is a Crook ... but Is He Still a Crook Abroad? On the Effect of Immigration on Destination-Country Corruption, Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg, 2013.","mla":"Dimant, Eugen, et al. <i>A Crook Is a Crook ... but Is He Still a Crook Abroad? On the Effect of Immigration on Destination-Country Corruption</i>. Vol. 2013–03, Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg, 2013.","bibtex":"@book{Dimant_Krieger_Redlin_2013, series={Discussion Paper Series,}, title={A crook is a crook ... but is he still a crook abroad? On the effect of immigration on destination-country corruption}, volume={2013–03}, publisher={Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg}, author={Dimant, Eugen and Krieger, Tim  and Redlin, Margarete}, year={2013}, collection={Discussion Paper Series,} }","apa":"Dimant, E., Krieger, T., &#38; Redlin, M. (2013). <i>A crook is a crook ... but is he still a crook abroad? On the effect of immigration on destination-country corruption</i> (Vol. 2013–03). Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg.","ieee":"E. Dimant, T. Krieger, and M. Redlin, <i>A crook is a crook ... but is he still a crook abroad? On the effect of immigration on destination-country corruption</i>, vol. 2013–03. Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg, 2013.","chicago":"Dimant, Eugen, Tim  Krieger, and Margarete Redlin. <i>A Crook Is a Crook ... but Is He Still a Crook Abroad? On the Effect of Immigration on Destination-Country Corruption</i>. Vol. 2013–03. Discussion Paper Series,. Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg, 2013.","ama":"Dimant E, Krieger T, Redlin M. <i>A Crook Is a Crook ... but Is He Still a Crook Abroad? On the Effect of Immigration on Destination-Country Corruption</i>. Vol 2013-03. Wilfried-Guth-Stiftungsprofessur für Ordnungs- und Wettbewerbspolitik, Universität Freiburg; 2013."},"_id":"2739","user_id":"135","series_title":"Discussion Paper Series,","department":[{"_id":"475"},{"_id":"200"},{"_id":"202"}],"type":"working_paper","status":"public"},{"language":[{"iso":"eng"}],"ddc":["000"],"file":[{"file_size":203924,"file_name":"pik-2013-0015.pdf","access_level":"open_access","file_id":"6050","date_updated":"2018-12-13T15:12:17Z","creator":"hsiemes","date_created":"2018-12-07T12:01:06Z","relation":"main_file","content_type":"application/pdf"}],"publication":"PIK - Praxis der Informationsverarbeitung und Kommunikation","title":"Sicherheitsherausforderungen in hochverteilten Systemen","date_created":"2018-11-14T15:43:13Z","publisher":"de Gruyter","year":"2013","issue":"3","extern":"1","file_date_updated":"2018-12-13T15:12:17Z","department":[{"_id":"277"}],"user_id":"61579","_id":"5682","status":"public","type":"journal_article","volume":36,"author":[{"full_name":"de Meer, Hermann","last_name":"de Meer","first_name":"Hermann"},{"first_name":"Michael","full_name":"Diener, Michael","last_name":"Diener"},{"first_name":"Ralph","full_name":"Herkenhöner, Ralph","last_name":"Herkenhöner"},{"first_name":"Markus","last_name":"Kucera","full_name":"Kucera, Markus"},{"last_name":"Niedermeier","full_name":"Niedermeier, Michael","first_name":"Michael"},{"last_name":"Reisser","full_name":"Reisser, Andreas","first_name":"Andreas"},{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"},{"last_name":"Vetter","full_name":"Vetter, Michael","first_name":"Michael"},{"first_name":"Thomas","last_name":"Waas","full_name":"Waas, Thomas"},{"first_name":"Emrah","last_name":"Yasasin","full_name":"Yasasin, Emrah"}],"oa":"1","date_updated":"2022-01-06T07:02:32Z","intvolume":"        36","page":"153-159","citation":{"ama":"de Meer H, Diener M, Herkenhöner R, et al. Sicherheitsherausforderungen in hochverteilten Systemen. <i>PIK - Praxis der Informationsverarbeitung und Kommunikation</i>. 2013;36(3):153-159.","chicago":"Meer, Hermann de, Michael Diener, Ralph Herkenhöner, Markus Kucera, Michael Niedermeier, Andreas Reisser, Guido Schryen, Michael Vetter, Thomas Waas, and Emrah Yasasin. “Sicherheitsherausforderungen in Hochverteilten Systemen.” <i>PIK - Praxis Der Informationsverarbeitung Und Kommunikation</i> 36, no. 3 (2013): 153–59.","ieee":"H. de Meer <i>et al.</i>, “Sicherheitsherausforderungen in hochverteilten Systemen,” <i>PIK - Praxis der Informationsverarbeitung und Kommunikation</i>, vol. 36, no. 3, pp. 153–159, 2013.","short":"H. de Meer, M. Diener, R. Herkenhöner, M. Kucera, M. Niedermeier, A. Reisser, G. Schryen, M. Vetter, T. Waas, E. Yasasin, PIK - Praxis Der Informationsverarbeitung Und Kommunikation 36 (2013) 153–159.","mla":"de Meer, Hermann, et al. “Sicherheitsherausforderungen in Hochverteilten Systemen.” <i>PIK - Praxis Der Informationsverarbeitung Und Kommunikation</i>, vol. 36, no. 3, de Gruyter, 2013, pp. 153–59.","bibtex":"@article{de Meer_Diener_Herkenhöner_Kucera_Niedermeier_Reisser_Schryen_Vetter_Waas_Yasasin_2013, title={Sicherheitsherausforderungen in hochverteilten Systemen}, volume={36}, number={3}, journal={PIK - Praxis der Informationsverarbeitung und Kommunikation}, publisher={de Gruyter}, author={de Meer, Hermann and Diener, Michael and Herkenhöner, Ralph and Kucera, Markus and Niedermeier, Michael and Reisser, Andreas and Schryen, Guido and Vetter, Michael and Waas, Thomas and Yasasin, Emrah}, year={2013}, pages={153–159} }","apa":"de Meer, H., Diener, M., Herkenhöner, R., Kucera, M., Niedermeier, M., Reisser, A., … Yasasin, E. (2013). Sicherheitsherausforderungen in hochverteilten Systemen. <i>PIK - Praxis Der Informationsverarbeitung Und Kommunikation</i>, <i>36</i>(3), 153–159."},"has_accepted_license":"1"},{"publication":"Blick in die Wissenschaft","type":"journal_article","status":"public","file":[{"file_size":835076,"access_level":"open_access","file_id":"6167","file_name":"Schreyen_Wex.pdf","date_updated":"2018-12-13T15:20:50Z","date_created":"2018-12-11T13:44:17Z","creator":"hsiemes","relation":"main_file","content_type":"application/pdf"}],"department":[{"_id":"277"}],"user_id":"61579","_id":"6166","language":[{"iso":"eng"}],"extern":"1","file_date_updated":"2018-12-13T15:20:50Z","ddc":["000"],"issue":"28","has_accepted_license":"1","page":"27-32","citation":{"ieee":"F. Wex and G. Schryen, “Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung,” <i>Blick in die Wissenschaft</i>, no. 28, pp. 27–32, 2013.","chicago":"Wex, Felix, and Guido Schryen. “Effektiver Einsatz von Rettungskräften Bei Naturkatastrophen - Modelle Und Verfahren Zur Entscheidungsunterstützung.” <i>Blick in Die Wissenschaft</i>, no. 28 (2013): 27–32.","ama":"Wex F, Schryen G. Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung. <i>Blick in die Wissenschaft</i>. 2013;(28):27-32.","short":"F. Wex, G. Schryen, Blick in Die Wissenschaft (2013) 27–32.","bibtex":"@article{Wex_Schryen_2013, title={Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung}, number={28}, journal={Blick in die Wissenschaft}, author={Wex, Felix and Schryen, Guido}, year={2013}, pages={27–32} }","mla":"Wex, Felix, and Guido Schryen. “Effektiver Einsatz von Rettungskräften Bei Naturkatastrophen - Modelle Und Verfahren Zur Entscheidungsunterstützung.” <i>Blick in Die Wissenschaft</i>, no. 28, 2013, pp. 27–32.","apa":"Wex, F., &#38; Schryen, G. (2013). Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung. <i>Blick in Die Wissenschaft</i>, (28), 27–32."},"year":"2013","author":[{"first_name":"Felix","last_name":"Wex","full_name":"Wex, Felix"},{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"date_created":"2018-12-11T13:43:18Z","date_updated":"2022-01-06T07:02:55Z","oa":"1","title":"Effektiver Einsatz von Rettungskräften bei Naturkatastrophen - Modelle und Verfahren zur Entscheidungsunterstützung"},{"type":"bachelorsthesis","urn":"4875","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-06-29T09:56:54Z","date_created":"2018-04-13T11:42:08Z","creator":"jbobolz","file_size":874286,"file_id":"2346","access_level":"open_access","file_name":"thesis_jbobolz_final.pdf"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"_id":"487","user_id":"27207","department":[{"_id":"64"}],"ddc":["000"],"file_date_updated":"2018-06-29T09:56:54Z","has_accepted_license":"1","year":"2013","citation":{"ama":"Bobolz J. <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn; 2013.","ieee":"J. Bobolz, <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn, 2013.","chicago":"Bobolz, Jan. <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn, 2013.","apa":"Bobolz, J. (2013). <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn.","short":"J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model, Universität Paderborn, 2013.","mla":"Bobolz, Jan. <i>Security Proofs for Pairing-Based Cryptography in the Generic Group Model</i>. Universität Paderborn, 2013.","bibtex":"@book{Bobolz_2013, title={Security Proofs for Pairing-Based Cryptography in the Generic Group Model}, publisher={Universität Paderborn}, author={Bobolz, Jan}, year={2013} }"},"oa":"1","date_updated":"2022-01-06T07:01:28Z","publisher":"Universität Paderborn","author":[{"last_name":"Bobolz","id":"27207","full_name":"Bobolz, Jan","first_name":"Jan"}],"date_created":"2017-10-17T12:42:27Z","title":"Security Proofs for Pairing-Based Cryptography in the Generic Group Model"},{"file_date_updated":"2018-09-04T20:08:52Z","article_type":"original","user_id":"14","department":[{"_id":"15"},{"_id":"287"},{"_id":"284"},{"_id":"230"},{"_id":"35"}],"_id":"3963","status":"public","urn":"39635","type":"journal_article","doi":"10.1063/1.4793653","author":[{"full_name":"Bürger, M.","last_name":"Bürger","first_name":"M."},{"full_name":"Ruth, M.","last_name":"Ruth","first_name":"M."},{"first_name":"S.","last_name":"Declair","full_name":"Declair, S."},{"last_name":"Förstner","orcid":"0000-0001-7059-9862","id":"158","full_name":"Förstner, Jens","first_name":"Jens"},{"orcid":"https://orcid.org/0000-0002-3787-3572","last_name":"Meier","id":"20798","full_name":"Meier, Cedrik","first_name":"Cedrik"},{"first_name":"Donat Josef","id":"14","full_name":"As, Donat Josef","orcid":"0000-0003-1121-3565","last_name":"As"}],"volume":102,"oa":"1","date_updated":"2022-01-06T07:00:01Z","citation":{"mla":"Bürger, M., et al. “Whispering Gallery Modes in Zinc-Blende AlN Microdisks Containing Non-Polar GaN Quantum Dots.” <i>Applied Physics Letters</i>, vol. 102, no. 8, AIP Publishing, 2013, p. 081105, doi:<a href=\"https://doi.org/10.1063/1.4793653\">10.1063/1.4793653</a>.","short":"M. Bürger, M. Ruth, S. Declair, J. Förstner, C. Meier, D.J. As, Applied Physics Letters 102 (2013) 081105.","bibtex":"@article{Bürger_Ruth_Declair_Förstner_Meier_As_2013, title={Whispering gallery modes in zinc-blende AlN microdisks containing non-polar GaN quantum dots}, volume={102}, DOI={<a href=\"https://doi.org/10.1063/1.4793653\">10.1063/1.4793653</a>}, number={8}, journal={Applied Physics Letters}, publisher={AIP Publishing}, author={Bürger, M. and Ruth, M. and Declair, S. and Förstner, Jens and Meier, Cedrik and As, Donat Josef}, year={2013}, pages={081105} }","apa":"Bürger, M., Ruth, M., Declair, S., Förstner, J., Meier, C., &#38; As, D. J. (2013). Whispering gallery modes in zinc-blende AlN microdisks containing non-polar GaN quantum dots. <i>Applied Physics Letters</i>, <i>102</i>(8), 081105. <a href=\"https://doi.org/10.1063/1.4793653\">https://doi.org/10.1063/1.4793653</a>","ama":"Bürger M, Ruth M, Declair S, Förstner J, Meier C, As DJ. Whispering gallery modes in zinc-blende AlN microdisks containing non-polar GaN quantum dots. <i>Applied Physics Letters</i>. 2013;102(8):081105. doi:<a href=\"https://doi.org/10.1063/1.4793653\">10.1063/1.4793653</a>","chicago":"Bürger, M., M. Ruth, S. Declair, Jens Förstner, Cedrik Meier, and Donat Josef As. “Whispering Gallery Modes in Zinc-Blende AlN Microdisks Containing Non-Polar GaN Quantum Dots.” <i>Applied Physics Letters</i> 102, no. 8 (2013): 081105. <a href=\"https://doi.org/10.1063/1.4793653\">https://doi.org/10.1063/1.4793653</a>.","ieee":"M. Bürger, M. Ruth, S. Declair, J. Förstner, C. Meier, and D. J. As, “Whispering gallery modes in zinc-blende AlN microdisks containing non-polar GaN quantum dots,” <i>Applied Physics Letters</i>, vol. 102, no. 8, p. 081105, 2013."},"page":"081105","intvolume":"       102","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["0003-6951","1077-3118"]},"language":[{"iso":"eng"}],"ddc":["530"],"keyword":["tet_topic_qd","tet_topic_microdisk"],"file":[{"file_size":935911,"access_level":"open_access","file_name":"2013-02 Bürger,Ruth,Declair,Förstner,Meier,As_Whispering gallery modes in zinc-blende AlN microdisks containing non-polar GaN quantum dots.pdf","file_id":"3964","date_updated":"2018-09-04T20:08:52Z","date_created":"2018-08-21T07:47:02Z","creator":"hclaudia","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"Whispering gallery modes (WGMs) were observed in 60 nm thin cubic AlN microdisk resonators containing a single layer of non-polar cubic GaN quantum dots. Freestanding microdisks were patterned by means of electron beam lithography and a two step reactive ion etching process. Micro-photoluminescence spectroscopy investigations were performed for optical characterization. We analyzed the mode spacing for disk diameters ranging from 2-4 lm. Numerical investigations using three dimensional finite difference time domain calculations were in good agreement\r\nwith the experimental data. Whispering gallery modes of the radial orders 1 and 2 were identified by means of simulated mode field distributions.","lang":"eng"}],"publication":"Applied Physics Letters","title":"Whispering gallery modes in zinc-blende AlN microdisks containing non-polar GaN quantum dots","date_created":"2018-08-21T07:43:22Z","publisher":"AIP Publishing","year":"2013","issue":"8"},{"file":[{"access_level":"closed","file_name":"538-AB-KEM_01.pdf","file_id":"1292","file_size":389797,"creator":"florida","date_created":"2018-03-15T10:35:04Z","date_updated":"2018-03-15T10:35:04Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","abstract":[{"lang":"eng","text":"We present a new technique to realize attribute-based encryption (ABE) schemes secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE schemes to achieve more efficient constructions than the known generic constructions of CCA-secure ABE schemes. We restrict ourselves to the construction of attribute-based key encapsulation mechanisms (KEMs) and present two concrete CCA-secure schemes: a key-policy attribute-based KEM that is based on Goyal's key-policy ABE and a ciphertext-policy attribute-based KEM that is based on Waters' ciphertext-policy ABE. To achieve our goals, we use an appropriate hash function and need to extend the public parameters and the ciphertexts of the underlying CPA-secure encryption schemes only by a single group element. Moreover, we use the same hardness assumptions as the underlying CPA-secure encryption schemes."}],"type":"preprint","file_date_updated":"2018-03-15T10:35:04Z","ddc":["040"],"user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"43","name":"Securing the Financial Cloud"}],"_id":"538","citation":{"apa":"Blömer, J., &#38; Liske, G. (2013). Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. Universität Paderborn.","short":"J. Blömer, G. Liske, (2013).","mla":"Blömer, Johannes, and Gennadij Liske. <i>Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles</i>. Universität Paderborn, 2013.","bibtex":"@article{Blömer_Liske_2013, title={Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles}, publisher={Universität Paderborn}, author={Blömer, Johannes and Liske, Gennadij}, year={2013} }","ieee":"J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.","chicago":"Blömer, Johannes, and Gennadij Liske. “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.","ama":"Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. 2013."},"year":"2013","has_accepted_license":"1","main_file_link":[{"url":"https://eprint.iacr.org/2013/646","open_access":"1"}],"title":"Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles","date_created":"2017-10-17T12:42:37Z","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:51Z","oa":"1"},{"file":[{"relation":"main_file","content_type":"application/pdf","file_size":493113,"file_name":"ERS_IJISCRAM2013_Revision 1.pdf","file_id":"6168","access_level":"open_access","date_updated":"2018-12-13T15:13:02Z","creator":"hsiemes","date_created":"2018-12-11T14:25:51Z"}],"publication":"International Journal of Information Systems for Crisis Response and Management","ddc":["000"],"language":[{"iso":"eng"}],"year":"2013","issue":"4","title":"Assignments of Collaborative Rescue Units during Emergency Response","publisher":"IGI Publ.","date_created":"2018-11-14T11:14:07Z","status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-13T15:13:02Z","_id":"5575","department":[{"_id":"277"}],"user_id":"61579","page":"63-80","intvolume":"         5","citation":{"mla":"Wex, Felix, et al. “Assignments of Collaborative Rescue Units during Emergency Response.” <i>International Journal of Information Systems for Crisis Response and Management</i>, vol. 5, no. 4, IGI Publ., 2013, pp. 63–80.","short":"F. Wex, G. Schryen, D. Neumann, International Journal of Information Systems for Crisis Response and Management 5 (2013) 63–80.","bibtex":"@article{Wex_Schryen_Neumann_2013, title={Assignments of Collaborative Rescue Units during Emergency Response}, volume={5}, number={4}, journal={International Journal of Information Systems for Crisis Response and Management}, publisher={IGI Publ.}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2013}, pages={63–80} }","apa":"Wex, F., Schryen, G., &#38; Neumann, D. (2013). Assignments of Collaborative Rescue Units during Emergency Response. <i>International Journal of Information Systems for Crisis Response and Management</i>, <i>5</i>(4), 63–80.","ama":"Wex F, Schryen G, Neumann D. Assignments of Collaborative Rescue Units during Emergency Response. <i>International Journal of Information Systems for Crisis Response and Management</i>. 2013;5(4):63-80.","chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “Assignments of Collaborative Rescue Units during Emergency Response.” <i>International Journal of Information Systems for Crisis Response and Management</i> 5, no. 4 (2013): 63–80.","ieee":"F. Wex, G. Schryen, and D. Neumann, “Assignments of Collaborative Rescue Units during Emergency Response,” <i>International Journal of Information Systems for Crisis Response and Management</i>, vol. 5, no. 4, pp. 63–80, 2013."},"has_accepted_license":"1","oa":"1","date_updated":"2022-01-06T07:02:00Z","volume":5,"author":[{"full_name":"Wex, Felix","last_name":"Wex","first_name":"Felix"},{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"},{"first_name":"Dirk","full_name":"Neumann, Dirk","last_name":"Neumann"}]},{"extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:12:05Z","ddc":["000"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5576","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-13T15:12:05Z","date_created":"2018-12-07T12:00:30Z","creator":"hsiemes","file_size":394101,"file_id":"6049","file_name":"ERS_HICSS2013_revised_v11-ACM [number].pdf","access_level":"open_access"}],"status":"public","type":"conference","publication":"Proceedings of the 46th Hawaii International Conference on System Science","title":"Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response","author":[{"first_name":"Felix","last_name":"Wex","full_name":"Wex, Felix"},{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"first_name":"Dirk","full_name":"Neumann, Dirk","last_name":"Neumann"}],"date_created":"2018-11-14T11:14:56Z","oa":"1","date_updated":"2022-01-06T07:02:00Z","citation":{"short":"F. Wex, G. Schryen, D. Neumann, in: Proceedings of the 46th Hawaii International Conference on System Science, 2013.","bibtex":"@inproceedings{Wex_Schryen_Neumann_2013, title={Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response}, booktitle={Proceedings of the 46th Hawaii International Conference on System Science}, author={Wex, Felix and Schryen, Guido and Neumann, Dirk}, year={2013} }","mla":"Wex, Felix, et al. “Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response.” <i>Proceedings of the 46th Hawaii International Conference on System Science</i>, 2013.","apa":"Wex, F., Schryen, G., &#38; Neumann, D. (2013). Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response. In <i>Proceedings of the 46th Hawaii International Conference on System Science</i>.","ama":"Wex F, Schryen G, Neumann D. Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response. In: <i>Proceedings of the 46th Hawaii International Conference on System Science</i>. ; 2013.","ieee":"F. Wex, G. Schryen, and D. Neumann, “Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response,” in <i>Proceedings of the 46th Hawaii International Conference on System Science</i>, 2013.","chicago":"Wex, Felix, Guido Schryen, and Dirk Neumann. “Decision Modeling for Assignments of Collaborative Rescue Units during Emergency Response.” In <i>Proceedings of the 46th Hawaii International Conference on System Science</i>, 2013."},"year":"2013","has_accepted_license":"1"},{"date_created":"2018-11-14T14:31:37Z","title":"Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there","issue":"2","year":"2013","ddc":["000"],"language":[{"iso":"eng"}],"publication":"European Journal of Information Systems (EJIS)","file":[{"date_updated":"2018-12-13T15:11:53Z","creator":"hsiemes","date_created":"2018-12-07T11:59:54Z","file_size":792102,"access_level":"open_access","file_id":"6048","file_name":"EJIS-PAPER.pdf","content_type":"application/pdf","relation":"main_file"}],"oa":"1","date_updated":"2022-01-06T07:02:16Z","author":[{"first_name":"Guido","last_name":"Schryen","id":"72850","full_name":"Schryen, Guido"}],"volume":22,"has_accepted_license":"1","citation":{"chicago":"Schryen, Guido. “Revisiting IS Business Value Research: What We Already Know, What We Still Need to Know, and How We Can Get There.” <i>European Journal of Information Systems (EJIS)</i> 22, no. 2 (2013): 139–69.","ieee":"G. Schryen, “Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there,” <i>European Journal of Information Systems (EJIS)</i>, vol. 22, no. 2, pp. 139–169, 2013.","ama":"Schryen G. Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. <i>European Journal of Information Systems (EJIS)</i>. 2013;22(2):139-169.","short":"G. Schryen, European Journal of Information Systems (EJIS) 22 (2013) 139–169.","bibtex":"@article{Schryen_2013, title={Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there}, volume={22}, number={2}, journal={European Journal of Information Systems (EJIS)}, author={Schryen, Guido}, year={2013}, pages={139–169} }","mla":"Schryen, Guido. “Revisiting IS Business Value Research: What We Already Know, What We Still Need to Know, and How We Can Get There.” <i>European Journal of Information Systems (EJIS)</i>, vol. 22, no. 2, 2013, pp. 139–69.","apa":"Schryen, G. (2013). Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there. <i>European Journal of Information Systems (EJIS)</i>, <i>22</i>(2), 139–169."},"page":"139-169","intvolume":"        22","_id":"5637","user_id":"61579","department":[{"_id":"277"}],"file_date_updated":"2018-12-13T15:11:53Z","extern":"1","type":"journal_article","status":"public"},{"department":[{"_id":"54"}],"user_id":"44006","_id":"11740","language":[{"iso":"eng"}],"keyword":["Gaussian noise","maximum likelihood estimation","parameter estimation","GMM parameter","Gaussian mixture model","MAP estimation","Map-based estimation","maximum a-posteriori estimation","maximum likelihood technique","noisy observation","sequential estimation framework","white Gaussian noise","Additive noise","Gaussian mixture model","Maximum likelihood estimation","Noise measurement","Gaussian mixture model","Maximum a posteriori estimation","Maximum likelihood estimation"],"publication":"38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)","type":"conference","status":"public","abstract":[{"text":"In this contribution we derive the Maximum A-Posteriori (MAP) estimates of the parameters of a Gaussian Mixture Model (GMM) in the presence of noisy observations. We assume the distortion to be white Gaussian noise of known mean and variance. An approximate conjugate prior of the GMM parameters is derived allowing for a computationally efficient implementation in a sequential estimation framework. Simulations on artificially generated data demonstrate the superiority of the proposed method compared to the Maximum Likelihood technique and to the ordinary MAP approach, whose estimates are corrected by the known statistics of the distortion in a straightforward manner.","lang":"eng"}],"author":[{"full_name":"Chinaev, Aleksej","last_name":"Chinaev","first_name":"Aleksej"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242"}],"date_created":"2019-07-12T05:27:20Z","oa":"1","date_updated":"2022-01-06T06:51:08Z","doi":"10.1109/ICASSP.2013.6638279","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2013/ChHa13.pdf","open_access":"1"}],"title":"MAP-based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations","related_material":{"link":[{"description":"Poster","relation":"supplementary_material","url":"https://groups.uni-paderborn.de/nt/pubs/2013/ChHa13_Poster.pdf"}]},"publication_identifier":{"issn":["1520-6149"]},"page":"3352-3356","citation":{"ama":"Chinaev A, Haeb-Umbach R. MAP-based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations. In: <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>. ; 2013:3352-3356. doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6638279\">10.1109/ICASSP.2013.6638279</a>","ieee":"A. Chinaev and R. Haeb-Umbach, “MAP-based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations,” in <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>, 2013, pp. 3352–3356.","chicago":"Chinaev, Aleksej, and Reinhold Haeb-Umbach. “MAP-Based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations.” In <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>, 3352–56, 2013. <a href=\"https://doi.org/10.1109/ICASSP.2013.6638279\">https://doi.org/10.1109/ICASSP.2013.6638279</a>.","apa":"Chinaev, A., &#38; Haeb-Umbach, R. (2013). MAP-based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations. In <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i> (pp. 3352–3356). <a href=\"https://doi.org/10.1109/ICASSP.2013.6638279\">https://doi.org/10.1109/ICASSP.2013.6638279</a>","short":"A. Chinaev, R. Haeb-Umbach, in: 38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013), 2013, pp. 3352–3356.","bibtex":"@inproceedings{Chinaev_Haeb-Umbach_2013, title={MAP-based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations}, DOI={<a href=\"https://doi.org/10.1109/ICASSP.2013.6638279\">10.1109/ICASSP.2013.6638279</a>}, booktitle={38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)}, author={Chinaev, Aleksej and Haeb-Umbach, Reinhold}, year={2013}, pages={3352–3356} }","mla":"Chinaev, Aleksej, and Reinhold Haeb-Umbach. “MAP-Based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations.” <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>, 2013, pp. 3352–56, doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6638279\">10.1109/ICASSP.2013.6638279</a>."},"year":"2013"},{"language":[{"iso":"eng"}],"_id":"11742","department":[{"_id":"54"}],"user_id":"44006","abstract":[{"lang":"eng","text":"In this paper we present an improved version of the recently proposed Maximum A-Posteriori (MAP) based noise power spectral density estimator. An empirical bias compensation and bandwidth adjustment reduce bias and variance of the noise variance estimates. The main advantage of the MAP-based postprocessor is its low estimation variance. The estimator is employed in the second stage of a two-stage single-channel speech enhancement system, where eight different state-of-the-art noise tracking algorithms were tested in the first stage. While the postprocessor hardly affects the results in stationary noise scenarios, it becomes the more effective the more nonstationary the noise is. The proposed postprocessor was able to improve all systems in babble noise w.r.t. the perceptual evaluation of speech quality performance."}],"status":"public","publication":"38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)","type":"conference","title":"Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-based Postprocessor","doi":"10.1109/ICASSP.2013.6639116","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2013/ChHaTaRa13.pdf","open_access":"1"}],"oa":"1","date_updated":"2022-01-06T06:51:08Z","author":[{"full_name":"Chinaev, Aleksej","last_name":"Chinaev","first_name":"Aleksej"},{"first_name":"Reinhold","id":"242","full_name":"Haeb-Umbach, Reinhold","last_name":"Haeb-Umbach"},{"full_name":"Taghia, Jalal","last_name":"Taghia","first_name":"Jalal"},{"full_name":"Martin, Rainer","last_name":"Martin","first_name":"Rainer"}],"date_created":"2019-07-12T05:27:23Z","year":"2013","page":"7477-7481","citation":{"bibtex":"@inproceedings{Chinaev_Haeb-Umbach_Taghia_Martin_2013, title={Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-based Postprocessor}, DOI={<a href=\"https://doi.org/10.1109/ICASSP.2013.6639116\">10.1109/ICASSP.2013.6639116</a>}, booktitle={38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)}, author={Chinaev, Aleksej and Haeb-Umbach, Reinhold and Taghia, Jalal and Martin, Rainer}, year={2013}, pages={7477–7481} }","short":"A. Chinaev, R. Haeb-Umbach, J. Taghia, R. Martin, in: 38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013), 2013, pp. 7477–7481.","mla":"Chinaev, Aleksej, et al. “Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-Based Postprocessor.” <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>, 2013, pp. 7477–81, doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6639116\">10.1109/ICASSP.2013.6639116</a>.","apa":"Chinaev, A., Haeb-Umbach, R., Taghia, J., &#38; Martin, R. (2013). Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-based Postprocessor. In <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i> (pp. 7477–7481). <a href=\"https://doi.org/10.1109/ICASSP.2013.6639116\">https://doi.org/10.1109/ICASSP.2013.6639116</a>","chicago":"Chinaev, Aleksej, Reinhold Haeb-Umbach, Jalal Taghia, and Rainer Martin. “Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-Based Postprocessor.” In <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>, 7477–81, 2013. <a href=\"https://doi.org/10.1109/ICASSP.2013.6639116\">https://doi.org/10.1109/ICASSP.2013.6639116</a>.","ieee":"A. Chinaev, R. Haeb-Umbach, J. Taghia, and R. Martin, “Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-based Postprocessor,” in <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>, 2013, pp. 7477–7481.","ama":"Chinaev A, Haeb-Umbach R, Taghia J, Martin R. Improved Single-Channel Nonstationary Noise Tracking by an Optimized MAP-based Postprocessor. In: <i>38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)</i>. ; 2013:7477-7481. doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6639116\">10.1109/ICASSP.2013.6639116</a>"},"publication_identifier":{"issn":["1520-6149"]},"related_material":{"link":[{"relation":"supplementary_material","description":"Poster","url":"https://groups.uni-paderborn.de/nt/pubs/2013/ChHaTaRa13_Poster.pdf"}]}},{"oa":"1","date_updated":"2022-01-06T06:51:08Z","author":[{"last_name":"Enzner","full_name":"Enzner, Gerald","first_name":"Gerald"},{"last_name":"Schmid","full_name":"Schmid, Dominic","first_name":"Dominic"},{"full_name":"Haeb-Umbach, Reinhold","id":"242","last_name":"Haeb-Umbach","first_name":"Reinhold"}],"date_created":"2019-07-12T05:27:46Z","title":"On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2013/EnScHa2013.pdf"}],"year":"2013","citation":{"ama":"Enzner G, Schmid D, Haeb-Umbach R. On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques. In: <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>. ; 2013.","chicago":"Enzner, Gerald, Dominic Schmid, and Reinhold Haeb-Umbach. “On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques.” In <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>, 2013.","ieee":"G. Enzner, D. Schmid, and R. Haeb-Umbach, “On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques,” in <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>, 2013.","apa":"Enzner, G., Schmid, D., &#38; Haeb-Umbach, R. (2013). On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques. In <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>.","short":"G. Enzner, D. Schmid, R. Haeb-Umbach, in: 21th European Signal Processing Conference (EUSIPCO 2013), 2013.","bibtex":"@inproceedings{Enzner_Schmid_Haeb-Umbach_2013, title={On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques}, booktitle={21th European Signal Processing Conference (EUSIPCO 2013)}, author={Enzner, Gerald and Schmid, Dominic and Haeb-Umbach, Reinhold}, year={2013} }","mla":"Enzner, Gerald, et al. “On the Acoustic Channel Identification in Multi-Microphone Systems via Adaptive Blind Signal Enhancement Techniques.” <i>21th European Signal Processing Conference (EUSIPCO 2013)</i>, 2013."},"_id":"11762","department":[{"_id":"54"}],"user_id":"44006","language":[{"iso":"eng"}],"publication":"21th European Signal Processing Conference (EUSIPCO 2013)","type":"conference","abstract":[{"text":"Among the different configurations of multi-microphone systems, e.g., in applications of speech dereverberation or denoising, we consider the case without a priori information of the microphone-array geometry. This naturally invokes explicit or implicit identification of source-receiver transfer functions as an indirect description of the microphone-array configuration. However, this blind channel identification (BCI) has been difficult due to the lack of unique identifiability in the presence of observation noise or near-common channel zeros. In this paper, we study the implicit BCI performance of blind signal enhancement techniques such as the adaptive principal component analysis (PCA) or the iterative blind equalization and channel identification (BENCH). To this end, we make use of a recently proposed metric, the normalized filter-projection misalignment (NFPM), which is tailored for BCI evaluation in ill-conditioned (e.g., noisy) scenarios. The resulting understanding of implicit BCI performance can help to judge the behavior of multi-microphone speech enhancement systems and the suitability of implicit BCI to serve channel-based (i.e., channel-informed) enhancement.","lang":"eng"}],"status":"public"},{"title":"Unsupervised Word Segmentation from Noisy Input","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2013/HeWaHaRa13.pdf","open_access":"1"}],"date_updated":"2022-01-06T06:51:09Z","oa":"1","author":[{"last_name":"Heymann","id":"9168","full_name":"Heymann, Jahn","first_name":"Jahn"},{"first_name":"Oliver","last_name":"Walter","full_name":"Walter, Oliver"},{"last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242","first_name":"Reinhold"},{"first_name":"Bhiksha","last_name":"Raj","full_name":"Raj, Bhiksha"}],"date_created":"2019-07-12T05:28:47Z","year":"2013","citation":{"chicago":"Heymann, Jahn, Oliver Walter, Reinhold Haeb-Umbach, and Bhiksha Raj. “Unsupervised Word Segmentation from Noisy Input.” In <i>Automatic Speech Recognition and Understanding Workshop (ASRU 2013)</i>, 2013.","ieee":"J. Heymann, O. Walter, R. Haeb-Umbach, and B. Raj, “Unsupervised Word Segmentation from Noisy Input,” in <i>Automatic Speech Recognition and Understanding Workshop (ASRU 2013)</i>, 2013.","ama":"Heymann J, Walter O, Haeb-Umbach R, Raj B. Unsupervised Word Segmentation from Noisy Input. In: <i>Automatic Speech Recognition and Understanding Workshop (ASRU 2013)</i>. ; 2013.","apa":"Heymann, J., Walter, O., Haeb-Umbach, R., &#38; Raj, B. (2013). Unsupervised Word Segmentation from Noisy Input. In <i>Automatic Speech Recognition and Understanding Workshop (ASRU 2013)</i>.","mla":"Heymann, Jahn, et al. “Unsupervised Word Segmentation from Noisy Input.” <i>Automatic Speech Recognition and Understanding Workshop (ASRU 2013)</i>, 2013.","bibtex":"@inproceedings{Heymann_Walter_Haeb-Umbach_Raj_2013, title={Unsupervised Word Segmentation from Noisy Input}, booktitle={Automatic Speech Recognition and Understanding Workshop (ASRU 2013)}, author={Heymann, Jahn and Walter, Oliver and Haeb-Umbach, Reinhold and Raj, Bhiksha}, year={2013} }","short":"J. Heymann, O. Walter, R. Haeb-Umbach, B. Raj, in: Automatic Speech Recognition and Understanding Workshop (ASRU 2013), 2013."},"related_material":{"link":[{"description":"Poster","relation":"supplementary_material","url":"https://groups.uni-paderborn.de/nt/pubs/2013/HeWaHaRa_Poster.pdf"}]},"language":[{"iso":"eng"}],"_id":"11815","department":[{"_id":"54"}],"user_id":"44006","status":"public","publication":"Automatic Speech Recognition and Understanding Workshop (ASRU 2013)","type":"conference"},{"department":[{"_id":"54"}],"user_id":"44006","_id":"11816","language":[{"iso":"eng"}],"keyword":["Gaussian processes","Global Positioning System","convergence","expectation-maximisation algorithm","fingerprint identification","indoor radio","signal classification","wireless LAN","EM algorithm","ML estimation","WiFi indoor positioning","censored Gaussian data classification","clipped data","convergence properties","expectation maximization algorithm","fingerprinting method","maximum likelihood estimation","optimal classification","parameters estimation","portable devices sensitivity","signal strength measurements","wireless LAN positioning systems","Convergence","IEEE 802.11 Standards","Maximum likelihood estimation","Parameter estimation","Position measurement","Training","Indoor positioning","censored data","expectation maximization","signal strength","wireless LAN"],"publication":"38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)","type":"conference","status":"public","abstract":[{"lang":"eng","text":"In this paper, we consider the Maximum Likelihood (ML) estimation of the parameters of a GAUSSIAN in the presence of censored, i.e., clipped data. We show that the resulting Expectation Maximization (EM) algorithm delivers virtually biasfree and efficient estimates, and we discuss its convergence properties. We also discuss optimal classification in the presence of censored data. Censored data are frequently encountered in wireless LAN positioning systems based on the fingerprinting method employing signal strength measurements, due to the limited sensitivity of the portable devices. Experiments both on simulated and real-world data demonstrate the effectiveness of the proposed algorithms."}],"author":[{"full_name":"Hoang, Manh Kha","last_name":"Hoang","first_name":"Manh Kha"},{"last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242","first_name":"Reinhold"}],"date_created":"2019-07-12T05:28:48Z","date_updated":"2022-01-06T06:51:09Z","oa":"1","doi":"10.1109/ICASSP.2013.6638353","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2013/HoHa2013.pdf","open_access":"1"}],"title":"Parameter estimation and classification of censored Gaussian data with application to WiFi indoor positioning","related_material":{"link":[{"description":"Poster","relation":"supplementary_material","url":"https://groups.uni-paderborn.de/nt/pubs/2013/HoHa2013_Poster.pdf"}]},"publication_identifier":{"issn":["1520-6149"]},"page":"3721-3725","citation":{"mla":"Hoang, Manh Kha, and Reinhold Haeb-Umbach. “Parameter Estimation and Classification of Censored Gaussian Data with Application to WiFi Indoor Positioning.” <i>38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)</i>, 2013, pp. 3721–25, doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6638353\">10.1109/ICASSP.2013.6638353</a>.","bibtex":"@inproceedings{Hoang_Haeb-Umbach_2013, title={Parameter estimation and classification of censored Gaussian data with application to WiFi indoor positioning}, DOI={<a href=\"https://doi.org/10.1109/ICASSP.2013.6638353\">10.1109/ICASSP.2013.6638353</a>}, booktitle={38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)}, author={Hoang, Manh Kha and Haeb-Umbach, Reinhold}, year={2013}, pages={3721–3725} }","short":"M.K. Hoang, R. Haeb-Umbach, in: 38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013), 2013, pp. 3721–3725.","apa":"Hoang, M. K., &#38; Haeb-Umbach, R. (2013). Parameter estimation and classification of censored Gaussian data with application to WiFi indoor positioning. In <i>38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)</i> (pp. 3721–3725). <a href=\"https://doi.org/10.1109/ICASSP.2013.6638353\">https://doi.org/10.1109/ICASSP.2013.6638353</a>","chicago":"Hoang, Manh Kha, and Reinhold Haeb-Umbach. “Parameter Estimation and Classification of Censored Gaussian Data with Application to WiFi Indoor Positioning.” In <i>38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)</i>, 3721–25, 2013. <a href=\"https://doi.org/10.1109/ICASSP.2013.6638353\">https://doi.org/10.1109/ICASSP.2013.6638353</a>.","ieee":"M. K. Hoang and R. Haeb-Umbach, “Parameter estimation and classification of censored Gaussian data with application to WiFi indoor positioning,” in <i>38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)</i>, 2013, pp. 3721–3725.","ama":"Hoang MK, Haeb-Umbach R. Parameter estimation and classification of censored Gaussian data with application to WiFi indoor positioning. In: <i>38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)</i>. ; 2013:3721-3725. doi:<a href=\"https://doi.org/10.1109/ICASSP.2013.6638353\">10.1109/ICASSP.2013.6638353</a>"},"year":"2013"},{"year":"2013","page":" 22-23 ","citation":{"apa":"Kinoshita, K., Delcroix, M., Yoshioka, T., Nakatani, T., Habets, E., Haeb-Umbach, R., … Raj, B. (2013). The reverb challenge: a common evaluation framework for dereverberation and recognition of reverberant speech. In <i> IEEE Workshop on Applications of Signal Processing to Audio and Acoustics </i> (pp. 22–23).","short":"K. Kinoshita, M. Delcroix, T. Yoshioka, T. Nakatani, E. Habets, R. Haeb-Umbach, V. Leutnant, A. Sehr, W. Kellermann, R. Maas, S. Gannot, B. Raj, in:  IEEE Workshop on Applications of Signal Processing to Audio and Acoustics , 2013, pp. 22–23.","bibtex":"@inproceedings{Kinoshita_Delcroix_Yoshioka_Nakatani_Habets_Haeb-Umbach_Leutnant_Sehr_Kellermann_Maas_et al._2013, title={The reverb challenge: a common evaluation framework for dereverberation and recognition of reverberant speech}, booktitle={ IEEE Workshop on Applications of Signal Processing to Audio and Acoustics }, author={Kinoshita, Keisuke and Delcroix, Marc and Yoshioka, Takuya and Nakatani, Tomohiro and Habets, Emanuel and Haeb-Umbach, Reinhold and Leutnant, Volker and Sehr, Armin and Kellermann, Walter and Maas, Roland and et al.}, year={2013}, pages={22–23} }","mla":"Kinoshita, Keisuke, et al. “The Reverb Challenge: A Common Evaluation Framework for Dereverberation and Recognition of Reverberant Speech.” <i> IEEE Workshop on Applications of Signal Processing to Audio and Acoustics </i>, 2013, pp. 22–23.","ama":"Kinoshita K, Delcroix M, Yoshioka T, et al. The reverb challenge: a common evaluation framework for dereverberation and recognition of reverberant speech. In: <i> IEEE Workshop on Applications of Signal Processing to Audio and Acoustics </i>. ; 2013:22-23.","chicago":"Kinoshita, Keisuke, Marc Delcroix, Takuya Yoshioka, Tomohiro Nakatani, Emanuel Habets, Reinhold Haeb-Umbach, Volker Leutnant, et al. “The Reverb Challenge: A Common Evaluation Framework for Dereverberation and Recognition of Reverberant Speech.” In <i> IEEE Workshop on Applications of Signal Processing to Audio and Acoustics </i>, 22–23, 2013.","ieee":"K. Kinoshita <i>et al.</i>, “The reverb challenge: a common evaluation framework for dereverberation and recognition of reverberant speech,” in <i> IEEE Workshop on Applications of Signal Processing to Audio and Acoustics </i>, 2013, pp. 22–23."},"title":"The reverb challenge: a common evaluation framework for dereverberation and recognition of reverberant speech","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2013/Reverb2013.pdf"}],"date_updated":"2022-01-06T06:51:11Z","oa":"1","date_created":"2019-07-12T05:29:17Z","author":[{"last_name":"Kinoshita","full_name":"Kinoshita, Keisuke","first_name":"Keisuke"},{"first_name":"Marc","last_name":"Delcroix","full_name":"Delcroix, Marc"},{"full_name":"Yoshioka, Takuya","last_name":"Yoshioka","first_name":"Takuya"},{"last_name":"Nakatani","full_name":"Nakatani, Tomohiro","first_name":"Tomohiro"},{"last_name":"Habets","full_name":"Habets, Emanuel","first_name":"Emanuel"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","id":"242","full_name":"Haeb-Umbach, Reinhold"},{"first_name":"Volker","last_name":"Leutnant","full_name":"Leutnant, Volker"},{"full_name":"Sehr, Armin","last_name":"Sehr","first_name":"Armin"},{"full_name":"Kellermann, Walter","last_name":"Kellermann","first_name":"Walter"},{"full_name":"Maas, Roland","last_name":"Maas","first_name":"Roland"},{"full_name":"Gannot, Sharon","last_name":"Gannot","first_name":"Sharon"},{"full_name":"Raj, Bhiksha","last_name":"Raj","first_name":"Bhiksha"}],"abstract":[{"text":"Recently, substantial progress has been made in the field of reverberant speech signal processing, including both single- and multichannel de-reverberation techniques, and automatic speech recognition (ASR) techniques robust to reverberation. To evaluate state-of-the-art algorithms and obtain new insights regarding potential future research directions, we propose a common evaluation framework including datasets, tasks, and evaluation metrics for both speech enhancement and ASR techniques. The proposed framework will be used as a common basis for the REVERB (REverberant Voice Enhancement and Recognition Benchmark) challenge. This paper describes the rationale behind the challenge, and provides a detailed description of the evaluation framework and benchmark results.","lang":"eng"}],"status":"public","publication":" IEEE Workshop on Applications of Signal Processing to Audio and Acoustics ","type":"conference","keyword":["Reverberant speech","dereverberation","ASR","evaluation","challenge"],"language":[{"iso":"eng"}],"_id":"11841","department":[{"_id":"54"}],"user_id":"44006"}]
