@inproceedings{19004,
abstract = {We present a deterministic kinetic data structure for the facility location problem that maintains a subset of the moving points as facilities such that, at any point of time, the sum of the maintenance cost for the facilities and the connection cost for the clients is at most a constant factor larger than the current optimal cost. In our scenario, each point can open a facility and moves continuously along a known trajectory in a d-dimensional Euclidean space where d is a constant.
Our kinetic data structure has a storage requirement of O(n (log^d(n)+log(nR))), where n is the number of points and R is the ratio of the product of the maximum maintenance cost and demand to the product of their corresponding minimum values. In the case that each trajectory can be described by a bounded degree polynomial, the data structure processes O(n^2 log^2(nR)) events, each requiring only O(log(nR)) facility changes and O(log^(d+1)(n) log(nR)) time. This results in a total processing time of O(n^2 log^(d+1)(n) log^3(nR)). To the best of our knowledge, this is the first kinetic data structure for the facility location problem.},
author = {Gehweiler, Joachim and Lammersen, Christiane and Degener, Bastian},
booktitle = {Proceedings of the 24th European Workshop on Computational Geometry},
pages = {251--254},
title = {{The Kinetic Facility Location Problem}},
year = {2008},
}
@inbook{19073,
author = {Seng, Eva- Maria},
booktitle = {Hallesche Beiträge zur Europäischen Aufklärung},
editor = {Stolzenberg, Jürgen},
title = {{„… Der Hauptzweck ist, die große Welt … allhier im kleineren beisammen zu haben“. Kunst- und Wunderkammern als Bildungseinrichtungen}},
year = {2008},
}
@book{19105,
author = {Eke, Norbert Otto and Olasz-Eke, Dagmar},
pages = {158},
publisher = {Nyland-Stiftung im Aisthesis Verlag},
title = {{Thomas Valentin Lesebuch (Edition)}},
volume = {16},
year = {2008},
}
@inbook{19319,
author = {Eke, Norbert Otto},
booktitle = {Schuld und Scham},
editor = {Pontzen, Alexandra and Preußer, Heinz-Peter},
pages = {165--180},
publisher = {Universitätsverlag Winter},
title = {{„Gott schütz uns vor den guten Menschen“. Reinigungsrituale und Beschämungsstrategien im deutsch-jüdischen Verhältnis}},
volume = {3},
year = {2008},
}
@inbook{19460,
author = {Eke, Norbert Otto},
booktitle = {Werner Fritsch/Johanna Fritsch: Das Meer rauscht und rauscht – bis es lauscht. Hörstück},
pages = {3--8},
title = {{Vorwort}},
year = {2008},
}
@misc{19509,
author = {Eke, Norbert Otto},
booktitle = {Germanistik},
number = {H. 1/2},
pages = {501},
title = {{Stefan Hulfeld: Theatergeschichtsschreibung als kulturelle Praxis. Wie Wissen über Theater entsteht. Zürich: Chronos, 2007}},
volume = {49},
year = {2008},
}
@phdthesis{19605,
author = {Lürwer-Brüggemeier, Katharina},
publisher = {Universität Paderborn},
title = {{Mächtigkeit und Komplexität von Berechnungen mit der ganzzahligen Division}},
year = {2008},
}
@article{18570,
abstract = {We present a game theoretic study of hybrid communication networks in which mobile devices can connect in an ad hoc fashion to a base station, possibly via a few hops using other mobile devices as intermediate nodes. The maximal number of allowed hops might be bounded with the motivation to guarantee small latency. We introduce hybrid connectivity games to study the impact of selfishness on this kind of infrastructure.
Mobile devices are represented by selfish players, each of which aims at establishing an uplink path to the base station minimizing its individual cost. Our model assumes that intermediate nodes on an uplink path are reimbursed for transmitting the packets of other devices. The reimbursements can be paid either by a benevolent network operator or by the senders of the packets using micropayments via a clearing agency that possibly collects a small percentage as commission. These different ways to implement the payments lead to different variants of the hybrid connectivity game. Our main findings are: (1) If there is no constraint on the number of allowed hops on the path to the base station, then the existence of equilibria is guaranteed regardless of whether the network operator or the senders pay for forwarding packets. (2) If the network operator pays, then the existence of equilibria is guaranteed only if at most one intermediate node is allowed, i.e., for at most two hops on the uplink path of a device, but not if the maximal number of allowed hops is three or larger. (3) In contrast, if the senders pay for forwarding their packets, then equilibria are guaranteed to exist given any bound on the number of allowed hops.
The equilibrium analysis presented in this paper gives a first game theoretical motivation for the implementation of micropayment schemes in which senders pay for forwarding their packets. We further support this evidence by giving an upper bound on the Price of Anarchy for this kind of hybrid connectivity games that is independent of the number of nodes, but only depends on the number of hops and the power gradient.},
author = {Ackermann, Heiner and Briest, Patrick and Fanghänel, Alexander and Vöcking, Berthold},
isbn = {9783540771043},
journal = {Internet Mathematics},
number = {4},
pages = {459--475},
publisher = {Springer},
title = {{Who Should Pay for Forwarding Packets?}},
doi = {10.1007/978-3-540-77105-0_21},
volume = {5},
year = {2008},
}
@inproceedings{19686,
author = {Briest, Patrick},
booktitle = {Proceedings of the 35th InternationalColloquium on Automata, Languages and Programming (ICALP)},
isbn = {9783540705741},
issn = {0302-9743},
title = {{Uniform Budgets and the Envy-Free Pricing Problem}},
doi = {10.1007/978-3-540-70575-8_66},
year = {2008},
}
@inproceedings{17868,
abstract = {The paper describes an approach for an aggregated animation of a simulation experiment in an interactive 3D environment, visualizing multiple, distributed simulation runs. Although the general approach of a 3-dimensional visualization of material flow simulation helps to understand the dynamic behavior of a system better as well as faster, it remains unclear, how typical the animated simulation represents the model, if there is a stochastic influence for even some parameters. By the integrated visualization of multiple distributed simulation runs, this uncertainty can be solved, which will be shown in this paper for a typical simulation study of a queuing system. },
author = {Dangelmaier, Wilhelm and Fischer, Matthias and Huber, Daniel and Laroque, Christoph and Süß, Tim},
booktitle = {2008 Winter Simulation Conference},
isbn = {9781424427079},
pages = {2012--2020},
title = {{Aggregated 3D-visualization of a distributed simulation experiment of a queuing system}},
doi = {10.1109/wsc.2008.4736296},
year = {2008},
}
@inproceedings{1940,
author = {Mense, Mario and Scheideler, Christian},
booktitle = {Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2008, San Francisco, California, USA, January 20-22, 2008},
pages = {1135----1144},
publisher = {SIAM},
title = {{SPREAD: an adaptive scheme for redundant and fair storage in dynamic heterogeneous storage systems}},
year = {2008},
}
@article{20481,
author = {Baumeister, J and Reinecke, K and Weiss, M},
journal = {Scand J Med Sci Sports},
number = {4},
pages = {473--484},
title = {{Changed cortical activity after anterior cruciate ligament reconstruction in a joint position paradigm: an EEG study}},
volume = {18},
year = {2008},
}
@article{20479,
author = {Baumeister, J and Barthel, T and Geiss, K.R. and Weiss, M},
journal = {Nutr Neurosci},
number = {3},
pages = {103--110},
title = {{Influence of phasphatidylserine on cognitive performance and cortical activity after induced stress}},
volume = {11},
year = {2008},
}
@inbook{10154,
author = {Hüllermeier, Eyke},
booktitle = {Encyclopedia of Data Warehousing and Mining - Second Edition},
pages = {907--912},
publisher = {Idea Group, Inc.,Hershey, USA},
title = {{Fuzzy methods in data mining}},
year = {2008},
}
@inbook{10185,
author = {Hüllermeier, Eyke and Fürnkranz, J.},
booktitle = {Preferences and Similarities},
editor = {Della Riccia, G. and Dubois, D. and Kruse, R. and Lenz, H.J.},
pages = {283--304},
publisher = {Springer},
title = {{Learning preference models from data: On the problem of label ranking and its variants}},
year = {2008},
}
@misc{10628,
author = {Boschmann, Alexander},
publisher = {Paderborn University},
title = {{Aufbau und experimentelle Bewertung eines Systems zur Langzeitklassiﬁkation von EMG-Signalen}},
year = {2008},
}
@inbook{11789,
abstract = {In distributed and network speech recognition the actual recognition task is not carried out on the user{\rq}s terminal but rather on a remote server in the network. While there are good reasons for doing so, a disadvantage of this client-server architecture is clearly that the communication medium may introduce errors, which then impairs speech recognition accuracy. Even sophisticated channel coding cannot completely prevent the occurrence of residual bit errors in the case of temporarily adverse channel conditions, and in packet-oriented transmission packets of data may arrive too late for the given real-time constraints and have to be declared lost. The goal of error concealment is to reduce the detrimental effect that such errors may induce on the recipient of the transmitted speech signal by exploiting residual redundancy in the bit stream at the source coder output. In classical speech transmission a human is the recipient, and erroneous data are reconstructed so as to reduce the subjectively annoying effect of corrupted bits or lost packets. Here, however, a statistical classifier is at the receiving end, which can benefit from knowledge about the quality of the reconstruction. In this book chapter we show how the classical Bayesian decision rule needs to be modified to account for uncertain features, and illustrate how the required feature posterior density can be estimated in the case of distributed speech recognition. Some other techniques for error concealment can be related to this approach. Experimental results are given for both a small and a medium vocabulary recognition task and both for a channel exhibiting bit errors and a packet erasure channel.},
author = {Haeb-Umbach, Reinhold and Ion, Valentin},
booktitle = {Automatic Speech Recognition on Mobile Devices and over Communication Networks},
editor = {Lindenberg, Borge and Tan, Zheng-Hua},
pages = {187--210},
publisher = {Springer},
title = {{Error Concealement}},
volume = {Advances in Computer Vision and Pattern Recognition},
year = {2008},
}
@article{12054,
author = {Sommer, Christoph and Dressler, Falko},
issn = {0163-6804},
journal = {IEEE Communications Magazine},
pages = {132--137},
title = {{Progressing toward realistic mobility models in VANET simulations}},
doi = {10.1109/mcom.2008.4689256},
year = {2008},
}
@misc{13033,
author = {Coym, Torsten and Hellebrand, Sybille and Ludwig, Stefan and Straube, Bernd and Wunderlich, Hans-Joachim and G. Zoellin, Christian},
keyword = {WORKSHOP},
title = {{Ein verfeinertes elektrisches Modell für Teilchentreffer und dessen Auswirkung auf die Bewertung der Schaltungsempfindlichkeit}},
year = {2008},
}
@article{13672,
author = {Hermann, A and Schwerdtfeger, P and Schmidt, Wolf Gero},
issn = {0953-8984},
journal = {Journal of Physics: Condensed Matter},
title = {{Theoretical study of the localization of excess electrons at the surface of ice}},
doi = {10.1088/0953-8984/20/22/225003},
volume = {20},
year = {2008},
}