[{"citation":{"bibtex":"@article{Fuchs_Hofkirchner_2005, title={The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems}, volume={3}, DOI={<a href=\"https://doi.org/10.31269/triplec.v3i2.21\">https://doi.org/10.31269/triplec.v3i2.21</a>}, number={3}, journal={tripleC}, author={Fuchs, Christian and Hofkirchner, Wolfgang}, year={2005}, pages={28–50} }","short":"C. Fuchs, W. Hofkirchner, TripleC 3 (2005) 28–50.","mla":"Fuchs, Christian, and Wolfgang Hofkirchner. “The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems.” <i>TripleC</i>, vol. 3, no. 3, 2005, pp. 28–50, doi:<a href=\"https://doi.org/10.31269/triplec.v3i2.21\">https://doi.org/10.31269/triplec.v3i2.21</a>.","apa":"Fuchs, C., &#38; Hofkirchner, W. (2005). The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems. <i>TripleC</i>, <i>3</i>(3), 28–50. <a href=\"https://doi.org/10.31269/triplec.v3i2.21\">https://doi.org/10.31269/triplec.v3i2.21</a>","ieee":"C. Fuchs and W. Hofkirchner, “The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems,” <i>tripleC</i>, vol. 3, no. 3, pp. 28–50, 2005, doi: <a href=\"https://doi.org/10.31269/triplec.v3i2.21\">https://doi.org/10.31269/triplec.v3i2.21</a>.","chicago":"Fuchs, Christian, and Wolfgang Hofkirchner. “The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems.” <i>TripleC</i> 3, no. 3 (2005): 28–50. <a href=\"https://doi.org/10.31269/triplec.v3i2.21\">https://doi.org/10.31269/triplec.v3i2.21</a>.","ama":"Fuchs C, Hofkirchner W. The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems. <i>tripleC</i>. 2005;3(3):28-50. doi:<a href=\"https://doi.org/10.31269/triplec.v3i2.21\">https://doi.org/10.31269/triplec.v3i2.21</a>"},"page":"28-50","intvolume":"         3","year":"2005","issue":"3","main_file_link":[{"url":"https://doi.org/10.31269/triplec.v3i2.21","open_access":"1"}],"doi":"https://doi.org/10.31269/triplec.v3i2.21","title":"The Dialectic of Bottom-Up- and Top-Down-Emergence in Social Systems","author":[{"first_name":"Christian","last_name":"Fuchs","orcid":"0000-0003-0589-4579","id":"21863","full_name":"Fuchs, Christian"},{"first_name":"Wolfgang","last_name":"Hofkirchner","full_name":"Hofkirchner, Wolfgang"}],"date_created":"2023-02-05T21:27:16Z","volume":3,"date_updated":"2023-03-08T03:27:19Z","oa":"1","status":"public","type":"journal_article","publication":"tripleC","extern":"1","language":[{"iso":"eng"}],"user_id":"49063","department":[{"_id":"136"}],"_id":"41766"},{"year":"2005","citation":{"ama":"Fuchs C. Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach. In: Petitjean M, ed. <i>Proceedings of FIS 2005: Third Conference on the Foundations of Information Science</i>. ; 2005.","chicago":"Fuchs, Christian. “Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach.” In <i>Proceedings of FIS 2005: Third Conference on the Foundations of Information Science</i>, edited by Michel Petitjean, 2005.","ieee":"C. Fuchs, “Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach,” in <i>Proceedings of FIS 2005: Third Conference on the Foundations of Information Science</i>, Paris, 2005.","bibtex":"@inproceedings{Fuchs_2005, title={Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach}, booktitle={Proceedings of FIS 2005: Third Conference on the Foundations of Information Science}, author={Fuchs, Christian}, editor={Petitjean, Michel}, year={2005} }","mla":"Fuchs, Christian. “Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach.” <i>Proceedings of FIS 2005: Third Conference on the Foundations of Information Science</i>, edited by Michel Petitjean, 2005.","short":"C. Fuchs, in: M. Petitjean (Ed.), Proceedings of FIS 2005: Third Conference on the Foundations of Information Science, 2005.","apa":"Fuchs, C. (2005). Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach. In M. Petitjean (Ed.), <i>Proceedings of FIS 2005: Third Conference on the Foundations of Information Science</i>."},"publication_identifier":{"isbn":["3-906980-17-0"]},"title":"Knowledge and Society from the Perspective of the Unified Theory of Information (UTI) Approach","conference":{"location":"Paris","end_date":"2005-07-07","start_date":"2005-07-04"},"main_file_link":[{"url":"http://www.mdpi.org/fis2005/proceedings.html","open_access":"1"}],"date_updated":"2023-03-08T07:10:52Z","oa":"1","date_created":"2023-02-24T03:30:47Z","author":[{"orcid":"0000-0003-0589-4579","last_name":"Fuchs","full_name":"Fuchs, Christian","id":"21863","first_name":"Christian"}],"editor":[{"last_name":"Petitjean","full_name":"Petitjean, Michel","first_name":"Michel"}],"status":"public","publication":"Proceedings of FIS 2005: Third Conference on the Foundations of Information Science","type":"conference","language":[{"iso":"eng"}],"extern":"1","_id":"42438","department":[{"_id":"136"}],"user_id":"49063"},{"citation":{"apa":"Awerbuch, B., &#38; Scheideler, C. (2004). Group Spreading: A Protocol for Provably Secure Distributed Name Service. In <i>ICALP</i> (Vol. 3142, pp. 183--195).","short":"B. Awerbuch, C. Scheideler, in: ICALP, 2004, pp. 183--195.","bibtex":"@inproceedings{Awerbuch_Scheideler_2004, series={Lecture Notes in Computer Science}, title={Group Spreading: A Protocol for Provably Secure Distributed Name Service}, volume={3142}, booktitle={ICALP}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2004}, pages={183--195}, collection={Lecture Notes in Computer Science} }","mla":"Awerbuch, Baruch, and Christian Scheideler. “Group Spreading: A Protocol for Provably Secure Distributed Name Service.” <i>ICALP</i>, vol. 3142, 2004, pp. 183--195.","chicago":"Awerbuch, Baruch, and Christian Scheideler. “Group Spreading: A Protocol for Provably Secure Distributed Name Service.” In <i>ICALP</i>, 3142:183--195. Lecture Notes in Computer Science, 2004.","ieee":"B. Awerbuch and C. Scheideler, “Group Spreading: A Protocol for Provably Secure Distributed Name Service,” in <i>ICALP</i>, 2004, vol. 3142, pp. 183--195.","ama":"Awerbuch B, Scheideler C. Group Spreading: A Protocol for Provably Secure Distributed Name Service. In: <i>ICALP</i>. Vol 3142. Lecture Notes in Computer Science. ; 2004:183--195."},"intvolume":"      3142","page":"183--195","has_accepted_license":"1","author":[{"full_name":"Awerbuch, Baruch","last_name":"Awerbuch","first_name":"Baruch"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"volume":3142,"oa":"1","date_updated":"2022-01-06T06:54:49Z","status":"public","urn":"21200","type":"conference","file_date_updated":"2018-04-12T09:20:16Z","series_title":"Lecture Notes in Computer Science","user_id":"15504","department":[{"_id":"79"}],"_id":"2120","year":"2004","title":"Group Spreading: A Protocol for Provably Secure Distributed Name Service","date_created":"2018-04-03T05:31:04Z","file":[{"file_size":145383,"file_id":"2312","access_level":"open_access","file_name":"ICALP-04.pdf","date_updated":"2018-04-12T09:20:16Z","creator":"florida","date_created":"2018-04-12T09:20:16Z","relation":"main_file","content_type":"application/pdf"}],"publication":"ICALP","ddc":["040"]},{"file":[{"relation":"main_file","content_type":"application/pdf","file_size":91542,"file_name":"IPDPS-04.pdf","access_level":"open_access","file_id":"2316","date_updated":"2018-04-12T09:50:26Z","creator":"florida","date_created":"2018-04-12T09:50:26Z"}],"status":"public","urn":"21212","type":"conference","publication":"IPDPS","file_date_updated":"2018-04-12T09:50:26Z","ddc":["040"],"user_id":"15504","department":[{"_id":"79"}],"_id":"2121","citation":{"apa":"Riley, C., &#38; Scheideler, C. (2004). A Distributed Hash Table for Computational Grids. In <i>IPDPS</i>.","short":"C. Riley, C. Scheideler, in: IPDPS, 2004.","mla":"Riley, Chris, and Christian Scheideler. “A Distributed Hash Table for Computational Grids.” <i>IPDPS</i>, 2004.","bibtex":"@inproceedings{Riley_Scheideler_2004, title={A Distributed Hash Table for Computational Grids}, booktitle={IPDPS}, author={Riley, Chris and Scheideler, Christian}, year={2004} }","ama":"Riley C, Scheideler C. A Distributed Hash Table for Computational Grids. In: <i>IPDPS</i>. ; 2004.","chicago":"Riley, Chris, and Christian Scheideler. “A Distributed Hash Table for Computational Grids.” In <i>IPDPS</i>, 2004.","ieee":"C. Riley and C. Scheideler, “A Distributed Hash Table for Computational Grids,” in <i>IPDPS</i>, 2004."},"year":"2004","has_accepted_license":"1","title":"A Distributed Hash Table for Computational Grids","date_created":"2018-04-03T05:31:59Z","author":[{"full_name":"Riley, Chris","last_name":"Riley","first_name":"Chris"},{"first_name":"Christian","last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian"}],"oa":"1","date_updated":"2022-01-06T06:54:50Z"},{"volume":3279,"date_created":"2018-04-03T05:32:33Z","author":[{"full_name":"Awerbuch, Baruch","last_name":"Awerbuch","first_name":"Baruch"},{"first_name":"Christian","last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792"}],"oa":"1","date_updated":"2022-01-06T06:54:50Z","title":"Robust Distributed Name Service","has_accepted_license":"1","intvolume":"      3279","page":"237--249","citation":{"apa":"Awerbuch, B., &#38; Scheideler, C. (2004). Robust Distributed Name Service. In <i>IPTPS</i> (Vol. 3279, pp. 237--249).","mla":"Awerbuch, Baruch, and Christian Scheideler. “Robust Distributed Name Service.” <i>IPTPS</i>, vol. 3279, 2004, pp. 237--249.","bibtex":"@inproceedings{Awerbuch_Scheideler_2004, series={Lecture Notes in Computer Science}, title={Robust Distributed Name Service}, volume={3279}, booktitle={IPTPS}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2004}, pages={237--249}, collection={Lecture Notes in Computer Science} }","short":"B. Awerbuch, C. Scheideler, in: IPTPS, 2004, pp. 237--249.","chicago":"Awerbuch, Baruch, and Christian Scheideler. “Robust Distributed Name Service.” In <i>IPTPS</i>, 3279:237--249. Lecture Notes in Computer Science, 2004.","ieee":"B. Awerbuch and C. Scheideler, “Robust Distributed Name Service,” in <i>IPTPS</i>, 2004, vol. 3279, pp. 237--249.","ama":"Awerbuch B, Scheideler C. Robust Distributed Name Service. In: <i>IPTPS</i>. Vol 3279. Lecture Notes in Computer Science. ; 2004:237--249."},"year":"2004","department":[{"_id":"79"}],"series_title":"Lecture Notes in Computer Science","user_id":"15504","_id":"2122","file_date_updated":"2018-04-12T11:39:38Z","ddc":["040"],"publication":"IPTPS","type":"conference","status":"public","file":[{"file_name":"IPTPS-04.pdf","access_level":"open_access","file_id":"2318","file_size":136987,"date_created":"2018-04-12T11:39:38Z","creator":"florida","date_updated":"2018-04-12T11:39:38Z","relation":"main_file","content_type":"application/pdf"}],"urn":"21229"},{"year":"2004","citation":{"apa":"Ateniese, G., Riley, C., &#38; Scheideler, C. (2004). Survivable Monitoring in Dynamic Networks. In <i>IWIA</i> (pp. 33--47).","short":"G. Ateniese, C. Riley, C. Scheideler, in: IWIA, 2004, pp. 33--47.","bibtex":"@inproceedings{Ateniese_Riley_Scheideler_2004, title={Survivable Monitoring in Dynamic Networks}, booktitle={IWIA}, author={Ateniese, Giuseppe and Riley, Chris and Scheideler, Christian}, year={2004}, pages={33--47} }","mla":"Ateniese, Giuseppe, et al. “Survivable Monitoring in Dynamic Networks.” <i>IWIA</i>, 2004, pp. 33--47.","chicago":"Ateniese, Giuseppe, Chris Riley, and Christian Scheideler. “Survivable Monitoring in Dynamic Networks.” In <i>IWIA</i>, 33--47, 2004.","ieee":"G. Ateniese, C. Riley, and C. Scheideler, “Survivable Monitoring in Dynamic Networks,” in <i>IWIA</i>, 2004, pp. 33--47.","ama":"Ateniese G, Riley C, Scheideler C. Survivable Monitoring in Dynamic Networks. In: <i>IWIA</i>. ; 2004:33--47."},"page":"33--47","has_accepted_license":"1","title":"Survivable Monitoring in Dynamic Networks","date_updated":"2022-01-06T06:54:50Z","oa":"1","date_created":"2018-04-03T05:33:37Z","author":[{"last_name":"Ateniese","full_name":"Ateniese, Giuseppe","first_name":"Giuseppe"},{"last_name":"Riley","full_name":"Riley, Chris","first_name":"Chris"},{"last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792","first_name":"Christian"}],"urn":"21238","file":[{"date_updated":"2018-04-12T11:38:22Z","date_created":"2018-04-12T11:38:22Z","creator":"florida","file_size":255111,"file_id":"2317","access_level":"open_access","file_name":"IIAW-04.pdf","content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"conference","publication":"IWIA","ddc":["040"],"file_date_updated":"2018-04-12T11:38:22Z","_id":"2123","user_id":"15504","department":[{"_id":"79"}]},{"date_created":"2018-04-03T05:34:17Z","author":[{"last_name":"Awerbuch","full_name":"Awerbuch, Baruch","first_name":"Baruch"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"date_updated":"2022-01-06T06:54:51Z","oa":"1","title":"The hyperring: a low-congestion deterministic data structure for distributed environments","has_accepted_license":"1","citation":{"ieee":"B. Awerbuch and C. Scheideler, “The hyperring: a low-congestion deterministic data structure for distributed environments,” in <i>SODA</i>, 2004, pp. 318--327.","chicago":"Awerbuch, Baruch, and Christian Scheideler. “The Hyperring: A Low-Congestion Deterministic Data Structure for Distributed Environments.” In <i>SODA</i>, 318--327, 2004.","ama":"Awerbuch B, Scheideler C. The hyperring: a low-congestion deterministic data structure for distributed environments. In: <i>SODA</i>. ; 2004:318--327.","apa":"Awerbuch, B., &#38; Scheideler, C. (2004). The hyperring: a low-congestion deterministic data structure for distributed environments. In <i>SODA</i> (pp. 318--327).","mla":"Awerbuch, Baruch, and Christian Scheideler. “The Hyperring: A Low-Congestion Deterministic Data Structure for Distributed Environments.” <i>SODA</i>, 2004, pp. 318--327.","bibtex":"@inproceedings{Awerbuch_Scheideler_2004, title={The hyperring: a low-congestion deterministic data structure for distributed environments}, booktitle={SODA}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2004}, pages={318--327} }","short":"B. Awerbuch, C. Scheideler, in: SODA, 2004, pp. 318--327."},"page":"318--327","year":"2004","user_id":"15504","department":[{"_id":"79"}],"_id":"2124","file_date_updated":"2018-04-13T08:36:08Z","ddc":["040"],"type":"conference","publication":"SODA","file":[{"creator":"florida","date_created":"2018-04-13T08:36:08Z","date_updated":"2018-04-13T08:36:08Z","file_id":"2323","access_level":"open_access","file_name":"SODA-04.pdf","file_size":193831,"content_type":"application/pdf","relation":"main_file"}],"status":"public","urn":"21247"},{"publication":"SPAA","type":"conference","urn":"21256","status":"public","file":[{"date_updated":"2018-04-12T09:41:38Z","creator":"florida","date_created":"2018-04-12T09:41:38Z","file_size":170429,"file_name":"AS-SPAA-04.pdf","file_id":"2315","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"_id":"2125","department":[{"_id":"79"}],"user_id":"15504","ddc":["040"],"file_date_updated":"2018-04-12T09:41:38Z","has_accepted_license":"1","year":"2004","page":"44--53","citation":{"short":"B. Awerbuch, C. Scheideler, in: SPAA, 2004, pp. 44--53.","bibtex":"@inproceedings{Awerbuch_Scheideler_2004, title={Consistent and compact data management in distributed storage systems}, booktitle={SPAA}, author={Awerbuch, Baruch and Scheideler, Christian}, year={2004}, pages={44--53} }","mla":"Awerbuch, Baruch, and Christian Scheideler. “Consistent and Compact Data Management in Distributed Storage Systems.” <i>SPAA</i>, 2004, pp. 44--53.","apa":"Awerbuch, B., &#38; Scheideler, C. (2004). Consistent and compact data management in distributed storage systems. In <i>SPAA</i> (pp. 44--53).","chicago":"Awerbuch, Baruch, and Christian Scheideler. “Consistent and Compact Data Management in Distributed Storage Systems.” In <i>SPAA</i>, 44--53, 2004.","ieee":"B. Awerbuch and C. Scheideler, “Consistent and compact data management in distributed storage systems,” in <i>SPAA</i>, 2004, pp. 44--53.","ama":"Awerbuch B, Scheideler C. Consistent and compact data management in distributed storage systems. In: <i>SPAA</i>. ; 2004:44--53."},"date_updated":"2022-01-06T06:54:51Z","oa":"1","author":[{"full_name":"Awerbuch, Baruch","last_name":"Awerbuch","first_name":"Baruch"},{"first_name":"Christian","last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian"}],"date_created":"2018-04-03T05:34:56Z","title":"Consistent and compact data management in distributed storage systems"},{"year":"2004","citation":{"apa":"Bhargava, A., Kothapalli, K., Riley, C., Scheideler, C., &#38; Thober, M. (2004). Pagoda: a dynamic overlay network for routing, data management, and multicasting. In <i>SPAA</i> (pp. 170--179).","bibtex":"@inproceedings{Bhargava_Kothapalli_Riley_Scheideler_Thober_2004, title={Pagoda: a dynamic overlay network for routing, data management, and multicasting}, booktitle={SPAA}, author={Bhargava, Ankur and Kothapalli, Kishore and Riley, Chris and Scheideler, Christian and Thober, Mark}, year={2004}, pages={170--179} }","mla":"Bhargava, Ankur, et al. “Pagoda: A Dynamic Overlay Network for Routing, Data Management, and Multicasting.” <i>SPAA</i>, 2004, pp. 170--179.","short":"A. Bhargava, K. Kothapalli, C. Riley, C. Scheideler, M. Thober, in: SPAA, 2004, pp. 170--179.","ama":"Bhargava A, Kothapalli K, Riley C, Scheideler C, Thober M. Pagoda: a dynamic overlay network for routing, data management, and multicasting. In: <i>SPAA</i>. ; 2004:170--179.","ieee":"A. Bhargava, K. Kothapalli, C. Riley, C. Scheideler, and M. Thober, “Pagoda: a dynamic overlay network for routing, data management, and multicasting,” in <i>SPAA</i>, 2004, pp. 170--179.","chicago":"Bhargava, Ankur, Kishore Kothapalli, Chris Riley, Christian Scheideler, and Mark Thober. “Pagoda: A Dynamic Overlay Network for Routing, Data Management, and Multicasting.” In <i>SPAA</i>, 170--179, 2004."},"page":"170--179","has_accepted_license":"1","title":"Pagoda: a dynamic overlay network for routing, data management, and multicasting","date_updated":"2022-01-06T06:54:52Z","oa":"1","author":[{"first_name":"Ankur","full_name":"Bhargava, Ankur","last_name":"Bhargava"},{"last_name":"Kothapalli","full_name":"Kothapalli, Kishore","first_name":"Kishore"},{"first_name":"Chris","full_name":"Riley, Chris","last_name":"Riley"},{"last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792","first_name":"Christian"},{"last_name":"Thober","full_name":"Thober, Mark","first_name":"Mark"}],"date_created":"2018-04-03T05:35:31Z","urn":"21266","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-04-12T09:40:42Z","creator":"florida","date_created":"2018-04-12T09:40:12Z","file_size":118175,"file_id":"2314","access_level":"open_access","file_name":"BKRST-SPAA-04.pdf"}],"status":"public","type":"conference","publication":"SPAA","ddc":["040"],"file_date_updated":"2018-04-12T09:40:42Z","_id":"2126","user_id":"15504","department":[{"_id":"79"}]},{"has_accepted_license":"1","citation":{"ama":"Bagchi A, Bhargava A, Chaudhary A, Eppstein D, Scheideler C. The effect of faults on network expansion. In: <i>SPAA</i>. ACM; 2004:286--293.","chicago":"Bagchi, Amitabha, Ankur Bhargava, Amitabh Chaudhary, David Eppstein, and Christian Scheideler. “The Effect of Faults on Network Expansion.” In <i>SPAA</i>, 286--293. ACM, 2004.","ieee":"A. Bagchi, A. Bhargava, A. Chaudhary, D. Eppstein, and C. Scheideler, “The effect of faults on network expansion,” in <i>SPAA</i>, 2004, pp. 286--293.","apa":"Bagchi, A., Bhargava, A., Chaudhary, A., Eppstein, D., &#38; Scheideler, C. (2004). The effect of faults on network expansion. In <i>SPAA</i> (pp. 286--293). ACM.","bibtex":"@inproceedings{Bagchi_Bhargava_Chaudhary_Eppstein_Scheideler_2004, title={The effect of faults on network expansion}, booktitle={SPAA}, publisher={ACM}, author={Bagchi, Amitabha and Bhargava, Ankur and Chaudhary, Amitabh and Eppstein, David and Scheideler, Christian}, year={2004}, pages={286--293} }","short":"A. Bagchi, A. Bhargava, A. Chaudhary, D. Eppstein, C. Scheideler, in: SPAA, ACM, 2004, pp. 286--293.","mla":"Bagchi, Amitabha, et al. “The Effect of Faults on Network Expansion.” <i>SPAA</i>, ACM, 2004, pp. 286--293."},"page":"286--293","year":"2004","date_created":"2018-04-03T05:36:11Z","author":[{"first_name":"Amitabha","full_name":"Bagchi, Amitabha","last_name":"Bagchi"},{"first_name":"Ankur","full_name":"Bhargava, Ankur","last_name":"Bhargava"},{"first_name":"Amitabh","full_name":"Chaudhary, Amitabh","last_name":"Chaudhary"},{"last_name":"Eppstein","full_name":"Eppstein, David","first_name":"David"},{"last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792","first_name":"Christian"}],"date_updated":"2022-01-06T06:54:52Z","oa":"1","publisher":"ACM","title":"The effect of faults on network expansion","type":"conference","publication":"SPAA","file":[{"file_name":"BBCES-SPAA-04.pdf","file_id":"2313","access_level":"open_access","file_size":197503,"date_created":"2018-04-12T09:21:24Z","creator":"florida","date_updated":"2018-04-12T09:21:24Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","urn":"21276","user_id":"15504","department":[{"_id":"79"}],"_id":"2127","file_date_updated":"2018-04-12T09:21:24Z","ddc":["040"]},{"publication":"37th Annual Hawaii International Conference on System Sciences","type":"conference","abstract":[{"text":"Voting via the Internet has become a feasible option for political as well as non-political ballots. However, there are many obstacles which have to be overcome, especially legal restrictions have to be transformed into technical and security solutions. The article starts with a brief presentation of advantages and disadvantages of Internet ballots and presents application fields and pilot schemes. Then, technological security aspects are derived due to democratic basic principles. Especially the applied voting procedures are critical in security terms. Hence, the most relevant cryptographic protocols are presented and their drawbacks and shortcomings are identified. However, this article does not propose a new voting protocol. Beyond fixing cryptographic procedures for ballots, more elements are to be specified, e.g. responsibilities and rights of involved authorities or security precautions regarding hardware and software. For this reason, a structural security framework for electronic voting systems is presented which can be used for their composition and analysis.","lang":"eng"}],"status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_size":385671,"access_level":"open_access","file_id":"6332","file_name":"Conference version - Security Aspects of Internet Voting.pdf","date_updated":"2018-12-18T13:32:44Z","date_created":"2018-12-18T13:32:44Z","creator":"hsiemes"}],"_id":"5765","department":[{"_id":"277"}],"user_id":"61579","ddc":["000"],"file_date_updated":"2018-12-18T13:32:44Z","language":[{"iso":"eng"}],"extern":"1","has_accepted_license":"1","year":"2004","citation":{"ama":"Schryen G. Security Aspects of Internet Voting. In: <i>37th Annual Hawaii International Conference on System Sciences</i>. ; 2004.","chicago":"Schryen, Guido. “Security Aspects of Internet Voting.” In <i>37th Annual Hawaii International Conference on System Sciences</i>, 2004.","ieee":"G. Schryen, “Security Aspects of Internet Voting,” in <i>37th Annual Hawaii International Conference on System Sciences</i>, 2004.","short":"G. Schryen, in: 37th Annual Hawaii International Conference on System Sciences, 2004.","bibtex":"@inproceedings{Schryen_2004, title={Security Aspects of Internet Voting}, booktitle={37th Annual Hawaii International Conference on System Sciences}, author={Schryen, Guido}, year={2004} }","mla":"Schryen, Guido. “Security Aspects of Internet Voting.” <i>37th Annual Hawaii International Conference on System Sciences</i>, 2004.","apa":"Schryen, G. (2004). Security Aspects of Internet Voting. In <i>37th Annual Hawaii International Conference on System Sciences</i>."},"oa":"1","date_updated":"2022-01-06T07:02:39Z","date_created":"2018-11-20T13:02:25Z","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"title":"Security Aspects of Internet Voting"},{"main_file_link":[{"url":"http://www.bwpat.de/spezial1/","open_access":"1"}],"title":"Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte?","author":[{"first_name":"H.-Hugo","last_name":"Kremer","id":"15280","full_name":"Kremer, H.-Hugo"}],"date_created":"2019-03-07T09:30:58Z","date_updated":"2022-01-06T07:03:55Z","oa":"1","citation":{"mla":"Kremer, H. Hugo. “Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte?” <i>Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)</i>, edited by F. Gramlinger et al., 2004.","short":"H.-H. Kremer, in: F. Gramlinger, S. Steinemann, T. Tramm (Eds.), Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004), 2004.","bibtex":"@inbook{Kremer_2004, title={Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte?}, booktitle={Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)}, author={Kremer, H.-Hugo}, editor={Gramlinger, F. and Steinemann, S. and Tramm, T.Editors}, year={2004} }","apa":"Kremer, H.-H. (2004). Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte? In F. Gramlinger, S. Steinemann, &#38; T. Tramm (Eds.), <i>Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)</i>.","chicago":"Kremer, H.-Hugo. “Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte?” In <i>Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)</i>, edited by F. Gramlinger, S. Steinemann, and T. Tramm, 2004.","ieee":"H.-H. Kremer, “Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte?,” in <i>Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)</i>, F. Gramlinger, S. Steinemann, and T. Tramm, Eds. 2004.","ama":"Kremer H-H. Qualifizierungsnetzwerke - Lernumgebung für Lehrkräfte? In: Gramlinger F, Steinemann S, Tramm T, eds. <i>Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)</i>. ; 2004."},"year":"2004","language":[{"iso":"ger"}],"user_id":"44715","department":[{"_id":"211"}],"_id":"8452","status":"public","editor":[{"first_name":"F.","last_name":"Gramlinger","full_name":"Gramlinger, F."},{"first_name":"S.","full_name":"Steinemann, S.","last_name":"Steinemann"},{"last_name":"Tramm","full_name":"Tramm, T.","first_name":"T."}],"type":"book_chapter","publication":"Lernfelder gestalten - miteinander Lernen - Innovationen vernetzen. Ergebnisse der 1. CULIK Fachtagung (12.05.2004)"},{"doi":"10.1103/physrevb.70.233302","volume":70,"author":[{"last_name":"Schaarschmidt","full_name":"Schaarschmidt, Martin","first_name":"Martin"},{"first_name":"Jens","orcid":"0000-0001-7059-9862","last_name":"Förstner","full_name":"Förstner, Jens","id":"158"},{"last_name":"Knorr","full_name":"Knorr, Andreas","first_name":"Andreas"},{"last_name":"Prineas","full_name":"Prineas, John P.","first_name":"John P."},{"first_name":"Nils C.","last_name":"Nielsen","full_name":"Nielsen, Nils C."},{"first_name":"Jürgen","last_name":"Kuhl","full_name":"Kuhl, Jürgen"},{"first_name":"Galina","last_name":"Khitrova","full_name":"Khitrova, Galina"},{"first_name":"Hyatt M.","full_name":"Gibbs, Hyatt M.","last_name":"Gibbs"},{"last_name":"Giessen","full_name":"Giessen, Harald","first_name":"Harald"},{"last_name":"Koch","full_name":"Koch, Stephan W.","first_name":"Stephan W."}],"date_updated":"2022-01-06T07:00:45Z","oa":"1","intvolume":"        70","citation":{"apa":"Schaarschmidt, M., Förstner, J., Knorr, A., Prineas, J. P., Nielsen, N. C., Kuhl, J., … Koch, S. W. (2004). Adiabatically driven electron dynamics in a resonant photonic band gap: Optical switching of a Bragg periodic semiconductor. <i>Physical Review B</i>, <i>70</i>(23). <a href=\"https://doi.org/10.1103/physrevb.70.233302\">https://doi.org/10.1103/physrevb.70.233302</a>","short":"M. Schaarschmidt, J. Förstner, A. Knorr, J.P. Prineas, N.C. Nielsen, J. Kuhl, G. Khitrova, H.M. Gibbs, H. Giessen, S.W. Koch, Physical Review B 70 (2004).","bibtex":"@article{Schaarschmidt_Förstner_Knorr_Prineas_Nielsen_Kuhl_Khitrova_Gibbs_Giessen_Koch_2004, title={Adiabatically driven electron dynamics in a resonant photonic band gap: Optical switching of a Bragg periodic semiconductor}, volume={70}, DOI={<a href=\"https://doi.org/10.1103/physrevb.70.233302\">10.1103/physrevb.70.233302</a>}, number={23233302}, journal={Physical Review B}, publisher={American Physical Society (APS)}, author={Schaarschmidt, Martin and Förstner, Jens and Knorr, Andreas and Prineas, John P. and Nielsen, Nils C. and Kuhl, Jürgen and Khitrova, Galina and Gibbs, Hyatt M. and Giessen, Harald and Koch, Stephan W.}, year={2004} }","mla":"Schaarschmidt, Martin, et al. “Adiabatically Driven Electron Dynamics in a Resonant Photonic Band Gap: Optical Switching of a Bragg Periodic Semiconductor.” <i>Physical Review B</i>, vol. 70, no. 23, 233302, American Physical Society (APS), 2004, doi:<a href=\"https://doi.org/10.1103/physrevb.70.233302\">10.1103/physrevb.70.233302</a>.","ieee":"M. Schaarschmidt <i>et al.</i>, “Adiabatically driven electron dynamics in a resonant photonic band gap: Optical switching of a Bragg periodic semiconductor,” <i>Physical Review B</i>, vol. 70, no. 23, 2004.","chicago":"Schaarschmidt, Martin, Jens Förstner, Andreas Knorr, John P. Prineas, Nils C. Nielsen, Jürgen Kuhl, Galina Khitrova, Hyatt M. Gibbs, Harald Giessen, and Stephan W. Koch. “Adiabatically Driven Electron Dynamics in a Resonant Photonic Band Gap: Optical Switching of a Bragg Periodic Semiconductor.” <i>Physical Review B</i> 70, no. 23 (2004). <a href=\"https://doi.org/10.1103/physrevb.70.233302\">https://doi.org/10.1103/physrevb.70.233302</a>.","ama":"Schaarschmidt M, Förstner J, Knorr A, et al. Adiabatically driven electron dynamics in a resonant photonic band gap: Optical switching of a Bragg periodic semiconductor. <i>Physical Review B</i>. 2004;70(23). doi:<a href=\"https://doi.org/10.1103/physrevb.70.233302\">10.1103/physrevb.70.233302</a>"},"publication_identifier":{"issn":["1098-0121","1550-235X"]},"has_accepted_license":"1","publication_status":"published","file_date_updated":"2018-09-04T19:10:53Z","extern":"1","article_type":"original","article_number":"233302","user_id":"158","_id":"4270","status":"public","urn":"42709","type":"journal_article","title":"Adiabatically driven electron dynamics in a resonant photonic band gap: Optical switching of a Bragg periodic semiconductor","date_created":"2018-08-29T09:44:09Z","publisher":"American Physical Society (APS)","year":"2004","issue":"23","language":[{"iso":"eng"}],"keyword":["tet_topic_qw"],"ddc":["530"],"file":[{"relation":"main_file","content_type":"application/pdf","file_size":54473,"access_level":"open_access","file_name":"2004 Schaarschmidt et al_Adiabatically driven electron dynamics in a resonant photonic band gap.pdf","file_id":"4271","date_updated":"2018-09-04T19:10:53Z","date_created":"2018-08-29T09:44:41Z","creator":"hclaudia"}],"abstract":[{"text":"The adiabatic driving of the resonant electron dynamics in a one-dimensional resonant photonic band gap is\r\nproposed as an optical mechanism for nonlinear ultrafast switching. Pulsed excitation inside the photonic gap\r\nresults in an ultrafast suppression and recovery of the gap. This behavior results from the adiabatic carrier\r\ndynamics due to rapid radiative damping inside the band gap.","lang":"eng"}],"publication":"Physical Review B"},{"citation":{"mla":"Förstner, Jens. <i>Light Propagation and Many-Particle Effects in Semiconductor Nanostructures</i>. 2004, doi:<a href=\"https://doi.org/10.14279/depositonce-999\">10.14279/depositonce-999</a>.","short":"J. Förstner, Light Propagation and Many-Particle Effects in Semiconductor Nanostructures, 2004.","bibtex":"@book{Förstner_2004, title={Light Propagation and Many-Particle Effects in Semiconductor Nanostructures}, DOI={<a href=\"https://doi.org/10.14279/depositonce-999\">10.14279/depositonce-999</a>}, author={Förstner, Jens}, year={2004} }","apa":"Förstner, J. (2004). <i>Light Propagation and Many-Particle Effects in Semiconductor Nanostructures</i>. <a href=\"https://doi.org/10.14279/depositonce-999\">https://doi.org/10.14279/depositonce-999</a>","chicago":"Förstner, Jens. <i>Light Propagation and Many-Particle Effects in Semiconductor Nanostructures</i>, 2004. <a href=\"https://doi.org/10.14279/depositonce-999\">https://doi.org/10.14279/depositonce-999</a>.","ieee":"J. Förstner, <i>Light Propagation and Many-Particle Effects in Semiconductor Nanostructures</i>. 2004.","ama":"Förstner J. <i>Light Propagation and Many-Particle Effects in Semiconductor Nanostructures</i>.; 2004. doi:<a href=\"https://doi.org/10.14279/depositonce-999\">10.14279/depositonce-999</a>"},"has_accepted_license":"1","doi":"10.14279/depositonce-999","date_updated":"2022-01-06T07:00:54Z","oa":"1","author":[{"first_name":"Jens","full_name":"Förstner, Jens","id":"158","last_name":"Förstner","orcid":"0000-0001-7059-9862"}],"supervisor":[{"first_name":"A.","last_name":"Knorr","full_name":"Knorr, A."}],"urn":"43190","status":"public","type":"dissertation","file_date_updated":"2018-09-04T19:39:32Z","extern":"1","_id":"4319","user_id":"158","year":"2004","title":"Light Propagation and Many-Particle Effects in Semiconductor Nanostructures","date_created":"2018-08-30T10:01:05Z","abstract":[{"lang":"eng","text":"In dieser Arbeit wird eine Theorie vorgestellt, welche die quantenmechanische Vielteilchenphysik\r\nder Licht-Materie Wechselwirkung in Halbleiternanostrukturen beschreibt. Diese mikroskopische Beschreibung\r\nwird durch Kombination eines allgemeinen Dichtematrixansatzes mit speziellen Methoden\r\nzur Auswertung der Maxwellgleichungen wie der zeitaufgelösten Finite-Differenzen-Methode\r\n(FDTD) erreicht. Die Theorie wird auf verschiedene physikalische Situationen angewendet, wie z.B.\r\nLichtausbreitung in Volumenhalbleitern, Interband- und Intersubbandübergänge in Quantenfilmstrukturen\r\nund optische Anregung von Quantenpunkten. Der Fokus liegt dabei auf der Beschreibung der\r\nlinearen und nichtlinearen Antwort des Vielteilchensystems und seiner Ankopplung an das elektromagnetische\r\nFeld. In diesem Zusammenhang wird sowohl die Erzeugung als auch der Zerfall von optischen\r\nAnregungen untersucht, indem verschiedene Kopplungsmechanismen wie Elektron-Phonon-,\r\nElektron-Photon- und Elektron-Elektron-Wechselwirkung berücksichtigt werden.\r\nIm Bereich der linearen Optik, also für Anregung mit geringer Intensität, ermöglicht die Theorie\r\ndie Berechnung von Absorptionsspektren. Verschiedene Effekte in linearer Optik werden in dieser\r\nArbeit untersucht und beschrieben: Linienaufspaltung durch Polaritonen im Volumenmaterial, Zunahme\r\nder Linienbreite bei Intersubbandübergängen verursacht durch Elektron-Elektron- und Elektron-\r\nPhonon-Streuung in einzelnen Quantenfilmen, Bildung einer optischen Bandlücke durch starke radiative\r\nKopplung in Vielfilmstrukturen in Bragg-Geometrie, Phononenseitenbänder verursacht durch\r\nquantenkinetische Effekte in einzelnen Quantenpunkten und schliesslich Superradianz und Interferenzeffekte\r\nin Quantenpunktgittern.\r\nBei nichtlinearer Anregung treten Dichte-Rabiflops als fundamentale Prozesse in allen betrachteten\r\nSystemen auf und können als kohärente Be- und Entvölkerung von quantenmechanischen Zuständen\r\nbeobachtet werden. Der Einfluss von starker Lichtkopplung und verschiedenen Wechselwirkungen\r\nauf dynamische Größen wie die Besetzung wird untersucht. Bei nichtlinearer Propagation, bei\r\nder sich ein starker Lichtpuls über längere Strecken in einem System bewegt, wird selbstinduzierte\r\nVerstärkung der Transmission näher betrachtet. Des weiteren werden von der Coulombwechselwirkung\r\nverursachte nichtlineare Effekte wie exzitoninduziertes Dephasieren in Volumenmaterial und\r\nverschränkte Zustände in Quantenpunkten untersucht, die einen Zusammenbruch der Hartree-Fock-\r\nNäherung darstellen.\r\nZusammenfassend werden in dieser Arbeit verschiedene lineare und nichtlineare optische Effekte\r\nin Halbleiternanostrukturen verschiedener Dimensionalität mit Hilfe einer allgemeinen Theorie, die\r\neinen Dichtematrixansatz mit den Maxwellschen Gleichungen kombiniert, untersucht."}],"file":[{"date_created":"2018-08-30T10:02:11Z","creator":"hclaudia","date_updated":"2018-09-04T19:39:32Z","access_level":"open_access","file_id":"4321","file_name":"2004 Förstner_dissertation.pdf","file_size":4120183,"content_type":"application/pdf","relation":"main_file"}],"keyword":["tet_topic_qd","tet_topic_qw","tet_topic_phc"],"ddc":["530"],"language":[{"iso":"eng"}]},{"intvolume":"        46","page":"281-288","citation":{"ama":"Schryen G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>. 2004;46(4):281-288.","ieee":"G. Schryen, “Effektivität von Lösungsansätzen zur Bekämpfung von Spam,” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, pp. 281–288, 2004.","chicago":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i> 46, no. 4 (2004): 281–88.","mla":"Schryen, Guido. “Effektivität von Lösungsansätzen Zur Bekämpfung von Spam.” <i>Wirtschaftsinformatik</i>, vol. 46, no. 4, Springer, 2004, pp. 281–88.","bibtex":"@article{Schryen_2004, title={Effektivität von Lösungsansätzen zur Bekämpfung von Spam}, volume={46}, number={4}, journal={Wirtschaftsinformatik}, publisher={Springer}, author={Schryen, Guido}, year={2004}, pages={281–288} }","short":"G. Schryen, Wirtschaftsinformatik 46 (2004) 281–288.","apa":"Schryen, G. (2004). Effektivität von Lösungsansätzen zur Bekämpfung von Spam. <i>Wirtschaftsinformatik</i>, <i>46</i>(4), 281–288."},"has_accepted_license":"1","oa":"1","date_updated":"2022-01-06T07:02:24Z","volume":46,"author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"}],"status":"public","type":"journal_article","extern":"1","file_date_updated":"2018-12-18T13:36:34Z","_id":"5662","department":[{"_id":"277"}],"user_id":"61579","year":"2004","issue":"4","title":"Effektivität von Lösungsansätzen zur Bekämpfung von Spam","publisher":"Springer","date_created":"2018-11-14T14:56:51Z","abstract":[{"text":"Spam als unerwünschte Massen-E-Mail hat die Grenze von der Belästigung zur ökonomischen Relevanz längst überschritten. Ihr relativer Anteil am gesamten, weltweiten E-Mail-Aufkommen stieg in den vergangenen Jahren auf mehr als 50% im Jahr 2003. Es entstehen jährlich volkswirtschaftliche Schäden in Milliardenhöhe. Zur Bekämpfung des Spam-Problems werden neben gesetzlichen Regelungen vor allem technische Lösungen eingesetzt, bei denen das Blockieren und Filtern von E-Mails in praktisch eingesetzten Anti-Spam-Systemen dominieren. Dieser Artikel führt in die Spam-Problematik ein und beschreibt, bewertet und klassifiziert die derzeit bedeutendsten Verfahren zur Bekämpfung von Spam.","lang":"eng"}],"file":[{"creator":"hsiemes","date_created":"2018-12-18T13:36:34Z","date_updated":"2018-12-18T13:36:34Z","file_name":"Verlagsversion Guido_Schryen__281__288.pdf","access_level":"open_access","file_id":"6338","file_size":288686,"content_type":"application/pdf","relation":"main_file"}],"publication":"Wirtschaftsinformatik","keyword":["Spam","E-Mail","Spoofing","Blockieren","Filtern","Lightweight Mail Transfer Agent Authentication Protocol (LMAP)"],"ddc":["000"],"language":[{"iso":"eng"}]},{"title":"Fighting Spam: Motivating an Account-based Approach","publisher":"IADIS Press","date_created":"2018-11-14T14:59:03Z","year":"2004","ddc":["000"],"keyword":["e-mail","spam","filtering","blocking","LMAP","SMTP account"],"language":[{"iso":"eng"}],"abstract":[{"text":"Spam as unsolicited e-mail to a large number of recipients is known to ecome an increasingly disturbing and costly issue of electronic business and internet traffic. Mainly technical-oriented approaches are applied with a focus on blocking, filtering, and authentication mechanisms based on the domain name system. They come along with different drawbacks and have all low effectiveness in common. The article sketches these approaches, shows its limitations, and proposes an account-based approach where the number of e-mails per day and account is restricted.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-18T13:33:30Z","creator":"hsiemes","date_created":"2018-12-18T13:33:30Z","file_size":46083,"access_level":"open_access","file_id":"6333","file_name":"Fighting Spam_Motivating an account-based approach.pdf"}],"publication":"Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2","oa":"1","date_updated":"2022-01-06T07:02:25Z","author":[{"last_name":"Schryen","id":"72850","full_name":"Schryen, Guido","first_name":"Guido"}],"place":"Madrid","citation":{"ama":"Schryen G. Fighting Spam: Motivating an Account-based Approach. In: Isaias P, ed. <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>. Madrid: IADIS Press; 2004:937-940.","chicago":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” In <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, 937–40. Madrid: IADIS Press, 2004.","ieee":"G. Schryen, “Fighting Spam: Motivating an Account-based Approach,” in <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i>, 2004, pp. 937–940.","apa":"Schryen, G. (2004). Fighting Spam: Motivating an Account-based Approach. In P. Isaias (Ed.), <i>Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2</i> (pp. 937–940). Madrid: IADIS Press.","short":"G. Schryen, in: P. Isaias (Ed.), Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2, IADIS Press, Madrid, 2004, pp. 937–940.","bibtex":"@inproceedings{Schryen_2004, place={Madrid}, title={Fighting Spam: Motivating an Account-based Approach}, booktitle={Proceedings of the IADIS International Conference WWW/Internet 2004. vol. 2}, publisher={IADIS Press}, author={Schryen, Guido}, editor={Isaias, PedroEditor}, year={2004}, pages={937–940} }","mla":"Schryen, Guido. “Fighting Spam: Motivating an Account-Based Approach.” <i>Proceedings of the IADIS International Conference WWW/Internet 2004. Vol. 2</i>, edited by Pedro Isaias, IADIS Press, 2004, pp. 937–40."},"page":"937-940","has_accepted_license":"1","extern":"1","file_date_updated":"2018-12-18T13:33:30Z","_id":"5663","user_id":"61579","department":[{"_id":"277"}],"editor":[{"first_name":"Pedro","full_name":"Isaias, Pedro","last_name":"Isaias"}],"status":"public","type":"conference"},{"type":"conference","publication":"Workshop of the ESF TED Programme","abstract":[{"text":"Remote Internet voting systems still suffer from many security problems which rely on the clients, the servers, and the network connections. Denial-ofservice attacks and viruses still belong to the most challenging security issues. Projects and studies like the ?Voting Technology Project? of CALTECH and MIT or SERVE of the US Department of Defense set up to gain experience evidence many of the notional weaknesses of current Internet voting systems.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","creator":"hsiemes","date_created":"2018-12-18T13:34:32Z","date_updated":"2018-12-18T13:34:32Z","access_level":"open_access","file_id":"6335","file_name":"Official paper schryen_e-voting_in_europe.pdf","file_size":516042}],"status":"public","_id":"5664","user_id":"61579","department":[{"_id":"277"}],"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-12-18T13:34:32Z","extern":"1","has_accepted_license":"1","year":"2004","citation":{"apa":"Schryen, G. (2004). How Security Problems Can Compromise Remote Internet Voting Systems. In <i>Workshop of the ESF TED Programme</i> (pp. 121–131).","mla":"Schryen, Guido. “How Security Problems Can Compromise Remote Internet Voting Systems.” <i>Workshop of the ESF TED Programme</i>, 2004, pp. 121–31.","bibtex":"@inproceedings{Schryen_2004, title={How Security Problems Can Compromise Remote Internet Voting Systems}, booktitle={Workshop of the ESF TED Programme}, author={Schryen, Guido}, year={2004}, pages={121–131} }","short":"G. Schryen, in: Workshop of the ESF TED Programme, 2004, pp. 121–131.","chicago":"Schryen, Guido. “How Security Problems Can Compromise Remote Internet Voting Systems.” In <i>Workshop of the ESF TED Programme</i>, 121–31, 2004.","ieee":"G. Schryen, “How Security Problems Can Compromise Remote Internet Voting Systems,” in <i>Workshop of the ESF TED Programme</i>, 2004, pp. 121–131.","ama":"Schryen G. How Security Problems Can Compromise Remote Internet Voting Systems. In: <i>Workshop of the ESF TED Programme</i>. ; 2004:121-131."},"page":"121-131","oa":"1","date_updated":"2022-01-06T07:02:25Z","author":[{"id":"72850","full_name":"Schryen, Guido","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T14:59:31Z","title":"How Security Problems Can Compromise Remote Internet Voting Systems"},{"oa":"1","date_updated":"2022-01-06T07:02:25Z","author":[{"first_name":"Guido","full_name":"Schryen, Guido","id":"72850","last_name":"Schryen"}],"place":"München","citation":{"bibtex":"@inbook{Schryen_2004, place={München}, title={Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz?}, booktitle={Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung}, publisher={KOPAED-Verlag}, author={Schryen, Guido}, editor={Gehrke, GernotEditor}, year={2004}, pages={45–51} }","short":"G. Schryen, in: G. Gehrke (Ed.), Digitale Teilung - Digitale Integration : Perspektiven Der Internetnutzung, KOPAED-Verlag, München, 2004, pp. 45–51.","mla":"Schryen, Guido. “Neulich Am Hotspot - Bringt Mobiles Internet Die Menschen Ins Netz?” <i>Digitale Teilung - Digitale Integration : Perspektiven Der Internetnutzung</i>, edited by Gernot Gehrke, KOPAED-Verlag, 2004, pp. 45–51.","apa":"Schryen, G. (2004). Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz? In G. Gehrke (Ed.), <i>Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung</i> (pp. 45–51). München: KOPAED-Verlag.","ama":"Schryen G. Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz? In: Gehrke G, ed. <i>Digitale Teilung - Digitale Integration : Perspektiven Der Internetnutzung</i>. München: KOPAED-Verlag; 2004:45-51.","ieee":"G. Schryen, “Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz?,” in <i>Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung</i>, G. Gehrke, Ed. München: KOPAED-Verlag, 2004, pp. 45–51.","chicago":"Schryen, Guido. “Neulich Am Hotspot - Bringt Mobiles Internet Die Menschen Ins Netz?” In <i>Digitale Teilung - Digitale Integration : Perspektiven Der Internetnutzung</i>, edited by Gernot Gehrke, 45–51. München: KOPAED-Verlag, 2004."},"page":"45-51","has_accepted_license":"1","file_date_updated":"2018-12-18T13:35:32Z","extern":"1","_id":"5666","user_id":"61579","department":[{"_id":"277"}],"editor":[{"first_name":"Gernot","full_name":"Gehrke, Gernot","last_name":"Gehrke"}],"status":"public","type":"book_chapter","title":"Neulich am Hotspot - Bringt Mobiles Internet die Menschen ins Netz?","publisher":"KOPAED-Verlag","date_created":"2018-11-14T15:00:48Z","year":"2004","ddc":["000"],"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-18T13:35:32Z","creator":"hsiemes","date_created":"2018-12-18T13:35:32Z","file_size":121468,"access_level":"open_access","file_id":"6337","file_name":"Schryen - Neulich am Hot Spot.pdf"}],"publication":"Digitale Teilung - digitale Integration : Perspektiven der Internetnutzung"},{"language":[{"iso":"eng"}],"_id":"11732","user_id":"44006","department":[{"_id":"54"}],"abstract":[{"text":"Satellite positioning systems, such as GPS or the future European system Galileo, employ direct-sequence spread-spectrum signals. The positioning accuracy is strongly affected by the quality of the pseudo range measurements. These measurements necessitate code and carrier synchronization of the received signal with the internally generated reference signals. In this type of systems one major error source is the multipath phenomenon, which results in a sum of delayed and weighted copies of the original signal to be present at the receiver input. This can result in a systematic error of the code tracking loop resulting in range errors in the order of several tens of meters. In this paper we propose an extension of the standard code tracking loop capable of estimating the parameters of the line-of-sight (LOS) signal and separating the LOS from the reflected signal portions. It is based on an analysis of the cross correlation of the received signal with a locally generated code sequence in the vicinity of the tracking point of a Delay-Locked Loop (DLL). For this reason, we call this method Cross Correlation Function (CCF) Analysis. The proposed method achieves considerably more accurate estimates than a DLL. Its performance is comparable to the Multipath Estimating Delay-Locked Loop (MEDLL) which is considered to be the best method for reducing multipath induced errors, so far. However, the computational complexity of the CCF Analysis is by a factor of three smaller compared to the MEDLL. Extensive simulations have been conducted for the proposed method and the MEDLL in order to assess the robustness of the two approaches under various signal constellations.","lang":"eng"}],"status":"public","type":"journal_article","publication":"AEUe, Int. Journal on Electronics and Communications","title":"Multipath-Resistant Time of Arrival Estimation for Satellite Positioning","main_file_link":[{"url":"https://groups.uni-paderborn.de/nt/pubs/2004/BiHaNa04.pdf","open_access":"1"}],"date_updated":"2022-01-06T06:51:08Z","oa":"1","date_created":"2019-07-12T05:27:11Z","author":[{"first_name":"R.","last_name":"Bischoff","full_name":"Bischoff, R."},{"first_name":"Reinhold","id":"242","full_name":"Haeb-Umbach, Reinhold","last_name":"Haeb-Umbach"},{"first_name":"Sai Ramesh","last_name":"Nammi","full_name":"Nammi, Sai Ramesh"}],"volume":58,"year":"2004","citation":{"chicago":"Bischoff, R., Reinhold Haeb-Umbach, and Sai Ramesh Nammi. “Multipath-Resistant Time of Arrival Estimation for Satellite Positioning.” <i>AEUe, Int. Journal on Electronics and Communications</i> 58, no. 1 (2004).","ieee":"R. Bischoff, R. Haeb-Umbach, and S. R. Nammi, “Multipath-Resistant Time of Arrival Estimation for Satellite Positioning,” <i>AEUe, Int. Journal on Electronics and Communications</i>, vol. 58, no. 1, 2004.","ama":"Bischoff R, Haeb-Umbach R, Nammi SR. Multipath-Resistant Time of Arrival Estimation for Satellite Positioning. <i>AEUe, Int Journal on Electronics and Communications</i>. 2004;58(1).","mla":"Bischoff, R., et al. “Multipath-Resistant Time of Arrival Estimation for Satellite Positioning.” <i>AEUe, Int. Journal on Electronics and Communications</i>, vol. 58, no. 1, 2004.","bibtex":"@article{Bischoff_Haeb-Umbach_Nammi_2004, title={Multipath-Resistant Time of Arrival Estimation for Satellite Positioning}, volume={58}, number={1}, journal={AEUe, Int. Journal on Electronics and Communications}, author={Bischoff, R. and Haeb-Umbach, Reinhold and Nammi, Sai Ramesh}, year={2004} }","short":"R. Bischoff, R. Haeb-Umbach, S.R. Nammi, AEUe, Int. Journal on Electronics and Communications 58 (2004).","apa":"Bischoff, R., Haeb-Umbach, R., &#38; Nammi, S. R. (2004). Multipath-Resistant Time of Arrival Estimation for Satellite Positioning. <i>AEUe, Int. Journal on Electronics and Communications</i>, <i>58</i>(1)."},"intvolume":"        58","issue":"1"},{"title":"Soft Features for Improved Distributed Speech Recognition over Wireless Networks","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2004/HaIo04.pdf"}],"date_updated":"2022-01-06T06:51:08Z","oa":"1","author":[{"first_name":"Reinhold","full_name":"Haeb-Umbach, Reinhold","id":"242","last_name":"Haeb-Umbach"},{"full_name":"Ion, Valentin","last_name":"Ion","first_name":"Valentin"}],"date_created":"2019-07-12T05:28:18Z","year":"2004","citation":{"apa":"Haeb-Umbach, R., &#38; Ion, V. (2004). Soft Features for Improved Distributed Speech Recognition over Wireless Networks. In <i>International Conference on Spoken Language Processing (ICSLP 2004)</i>.","bibtex":"@inproceedings{Haeb-Umbach_Ion_2004, title={Soft Features for Improved Distributed Speech Recognition over Wireless Networks}, booktitle={International Conference on Spoken Language Processing (ICSLP 2004)}, author={Haeb-Umbach, Reinhold and Ion, Valentin}, year={2004} }","short":"R. Haeb-Umbach, V. Ion, in: International Conference on Spoken Language Processing (ICSLP 2004), 2004.","mla":"Haeb-Umbach, Reinhold, and Valentin Ion. “Soft Features for Improved Distributed Speech Recognition over Wireless Networks.” <i>International Conference on Spoken Language Processing (ICSLP 2004)</i>, 2004.","ama":"Haeb-Umbach R, Ion V. Soft Features for Improved Distributed Speech Recognition over Wireless Networks. In: <i>International Conference on Spoken Language Processing (ICSLP 2004)</i>. ; 2004.","ieee":"R. Haeb-Umbach and V. Ion, “Soft Features for Improved Distributed Speech Recognition over Wireless Networks,” in <i>International Conference on Spoken Language Processing (ICSLP 2004)</i>, 2004.","chicago":"Haeb-Umbach, Reinhold, and Valentin Ion. “Soft Features for Improved Distributed Speech Recognition over Wireless Networks.” In <i>International Conference on Spoken Language Processing (ICSLP 2004)</i>, 2004."},"language":[{"iso":"eng"}],"_id":"11790","user_id":"44006","department":[{"_id":"54"}],"abstract":[{"lang":"eng","text":"A major drawback of distributed versus terminal-based speech recognition is the fact that transmission errors can lead to degraded recognition performance. In this paper we employ soft features to mitigate the effect of bit errors on wireless transmission links: At the receiver a posteriori probabilities of the transmitted feature vectors are computed by combining bit reliability information provided by the channel decoder and a priori knowledge about residual redundancy in the feature vectors. While the first-order moment of the a posteriori probability function is the MMSE estimate, the second-order moment is a measure of the uncertainty in the reconstructed features. We conducted realistic simulations of GSM transmission and achieved significant improvements in word accuracy compared to the error mitigation strategy described in the ETSI standard."}],"status":"public","type":"conference","publication":"International Conference on Spoken Language Processing (ICSLP 2004)"}]
