[{"year":"2019","page":"4914-4919","intvolume":"        10","citation":{"ieee":"T. Ohto <i>et al.</i>, “Accessing the Accuracy of Density Functional Theory through Structure and Dynamics of the Water–Air Interface,” <i>The Journal of Physical Chemistry Letters</i>, vol. 10, pp. 4914–4919, 2019.","chicago":"Ohto, Tatsuhiko, Mayank Dodia, Jianhang Xu, Sho Imoto, Fujie Tang, Frederik Zysk, Thomas D. Kühne, et al. “Accessing the Accuracy of Density Functional Theory through Structure and Dynamics of the Water–Air Interface.” <i>The Journal of Physical Chemistry Letters</i> 10 (2019): 4914–19. <a href=\"https://doi.org/10.1021/acs.jpclett.9b01983\">https://doi.org/10.1021/acs.jpclett.9b01983</a>.","ama":"Ohto T, Dodia M, Xu J, et al. Accessing the Accuracy of Density Functional Theory through Structure and Dynamics of the Water–Air Interface. <i>The Journal of Physical Chemistry Letters</i>. 2019;10:4914-4919. doi:<a href=\"https://doi.org/10.1021/acs.jpclett.9b01983\">10.1021/acs.jpclett.9b01983</a>","apa":"Ohto, T., Dodia, M., Xu, J., Imoto, S., Tang, F., Zysk, F., … Nagata, Y. (2019). Accessing the Accuracy of Density Functional Theory through Structure and Dynamics of the Water–Air Interface. <i>The Journal of Physical Chemistry Letters</i>, <i>10</i>, 4914–4919. <a href=\"https://doi.org/10.1021/acs.jpclett.9b01983\">https://doi.org/10.1021/acs.jpclett.9b01983</a>","mla":"Ohto, Tatsuhiko, et al. “Accessing the Accuracy of Density Functional Theory through Structure and Dynamics of the Water–Air Interface.” <i>The Journal of Physical Chemistry Letters</i>, vol. 10, 2019, pp. 4914–19, doi:<a href=\"https://doi.org/10.1021/acs.jpclett.9b01983\">10.1021/acs.jpclett.9b01983</a>.","short":"T. Ohto, M. Dodia, J. Xu, S. Imoto, F. Tang, F. Zysk, T.D. Kühne, Y. Shigeta, M. Bonn, X. Wu, Y. Nagata, The Journal of Physical Chemistry Letters 10 (2019) 4914–4919.","bibtex":"@article{Ohto_Dodia_Xu_Imoto_Tang_Zysk_Kühne_Shigeta_Bonn_Wu_et al._2019, title={Accessing the Accuracy of Density Functional Theory through Structure and Dynamics of the Water–Air Interface}, volume={10}, DOI={<a href=\"https://doi.org/10.1021/acs.jpclett.9b01983\">10.1021/acs.jpclett.9b01983</a>}, journal={The Journal of Physical Chemistry Letters}, author={Ohto, Tatsuhiko and Dodia, Mayank and Xu, Jianhang and Imoto, Sho and Tang, Fujie and Zysk, Frederik and Kühne, Thomas D. and Shigeta, Yasuteru and Bonn, Mischa and Wu, Xifan and et al.}, year={2019}, pages={4914–4919} }"},"publication_identifier":{"issn":["1948-7185","1948-7185"]},"publication_status":"published","title":"Accessing the Accuracy of Density Functional Theory through Structure and Dynamics of the Water–Air Interface","doi":"10.1021/acs.jpclett.9b01983","date_updated":"2022-01-06T06:52:32Z","volume":10,"author":[{"last_name":"Ohto","full_name":"Ohto, Tatsuhiko","first_name":"Tatsuhiko"},{"first_name":"Mayank","full_name":"Dodia, Mayank","last_name":"Dodia"},{"first_name":"Jianhang","last_name":"Xu","full_name":"Xu, Jianhang"},{"full_name":"Imoto, Sho","last_name":"Imoto","first_name":"Sho"},{"first_name":"Fujie","full_name":"Tang, Fujie","last_name":"Tang"},{"full_name":"Zysk, Frederik","last_name":"Zysk","first_name":"Frederik"},{"first_name":"Thomas D.","last_name":"Kühne","full_name":"Kühne, Thomas D."},{"first_name":"Yasuteru","last_name":"Shigeta","full_name":"Shigeta, Yasuteru"},{"full_name":"Bonn, Mischa","last_name":"Bonn","first_name":"Mischa"},{"last_name":"Wu","full_name":"Wu, Xifan","first_name":"Xifan"},{"last_name":"Nagata","full_name":"Nagata, Yuki","first_name":"Yuki"}],"date_created":"2020-01-30T13:14:09Z","status":"public","publication":"The Journal of Physical Chemistry Letters","type":"journal_article","language":[{"iso":"eng"}],"_id":"15738","department":[{"_id":"304"}],"user_id":"71692"},{"department":[{"_id":"304"}],"user_id":"71051","_id":"15740","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"language":[{"iso":"eng"}],"publication":"The Journal of Physical Chemistry C","type":"journal_article","status":"public","volume":124,"date_created":"2020-01-30T13:23:09Z","author":[{"last_name":"Guc","full_name":"Guc, Maxim","first_name":"Maxim"},{"last_name":"Kodalle","full_name":"Kodalle, Tim","first_name":"Tim"},{"full_name":"Kormath Madam Raghupathy, Ramya","id":"71692","orcid":"https://orcid.org/0000-0003-4667-9744","last_name":"Kormath Madam Raghupathy","first_name":"Ramya"},{"last_name":"Mirhosseini","full_name":"Mirhosseini, Hossein","first_name":"Hossein"},{"last_name":"Kühne","full_name":"Kühne, Thomas D.","first_name":"Thomas D."},{"first_name":"Ignacio","last_name":"Becerril-Romero","full_name":"Becerril-Romero, Ignacio"},{"full_name":"Pérez-Rodríguez, Alejandro","last_name":"Pérez-Rodríguez","first_name":"Alejandro"},{"full_name":"Kaufmann, Christian A.","last_name":"Kaufmann","first_name":"Christian A."},{"last_name":"Izquierdo-Roca","full_name":"Izquierdo-Roca, Victor","first_name":"Victor"}],"date_updated":"2022-01-06T06:52:32Z","doi":"10.1021/acs.jpcc.9b08781","title":"Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations","publication_identifier":{"issn":["1932-7447","1932-7455"]},"publication_status":"published","page":"1285-1291","intvolume":"       124","citation":{"short":"M. Guc, T. Kodalle, R. Kormath Madam Raghupathy, H. Mirhosseini, T.D. Kühne, I. Becerril-Romero, A. Pérez-Rodríguez, C.A. Kaufmann, V. Izquierdo-Roca, The Journal of Physical Chemistry C 124 (2019) 1285–1291.","bibtex":"@article{Guc_Kodalle_Kormath Madam Raghupathy_Mirhosseini_Kühne_Becerril-Romero_Pérez-Rodríguez_Kaufmann_Izquierdo-Roca_2019, title={Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations}, volume={124}, DOI={<a href=\"https://doi.org/10.1021/acs.jpcc.9b08781\">10.1021/acs.jpcc.9b08781</a>}, journal={The Journal of Physical Chemistry C}, author={Guc, Maxim and Kodalle, Tim and Kormath Madam Raghupathy, Ramya and Mirhosseini, Hossein and Kühne, Thomas D. and Becerril-Romero, Ignacio and Pérez-Rodríguez, Alejandro and Kaufmann, Christian A. and Izquierdo-Roca, Victor}, year={2019}, pages={1285–1291} }","mla":"Guc, Maxim, et al. “Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations.” <i>The Journal of Physical Chemistry C</i>, vol. 124, 2019, pp. 1285–91, doi:<a href=\"https://doi.org/10.1021/acs.jpcc.9b08781\">10.1021/acs.jpcc.9b08781</a>.","apa":"Guc, M., Kodalle, T., Kormath Madam Raghupathy, R., Mirhosseini, H., Kühne, T. D., Becerril-Romero, I., … Izquierdo-Roca, V. (2019). Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations. <i>The Journal of Physical Chemistry C</i>, <i>124</i>, 1285–1291. <a href=\"https://doi.org/10.1021/acs.jpcc.9b08781\">https://doi.org/10.1021/acs.jpcc.9b08781</a>","ieee":"M. Guc <i>et al.</i>, “Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations,” <i>The Journal of Physical Chemistry C</i>, vol. 124, pp. 1285–1291, 2019.","chicago":"Guc, Maxim, Tim Kodalle, Ramya Kormath Madam Raghupathy, Hossein Mirhosseini, Thomas D. Kühne, Ignacio Becerril-Romero, Alejandro Pérez-Rodríguez, Christian A. Kaufmann, and Victor Izquierdo-Roca. “Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations.” <i>The Journal of Physical Chemistry C</i> 124 (2019): 1285–91. <a href=\"https://doi.org/10.1021/acs.jpcc.9b08781\">https://doi.org/10.1021/acs.jpcc.9b08781</a>.","ama":"Guc M, Kodalle T, Kormath Madam Raghupathy R, et al. Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations. <i>The Journal of Physical Chemistry C</i>. 2019;124:1285-1291. doi:<a href=\"https://doi.org/10.1021/acs.jpcc.9b08781\">10.1021/acs.jpcc.9b08781</a>"},"year":"2019"},{"year":"2019","quality_controlled":"1","title":"Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems","date_created":"2020-01-31T15:55:27Z","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2020-01-31T15:57:50Z","date_created":"2020-01-31T15:57:50Z","creator":"hkarl","file_size":"675382","file_id":"15743","access_level":"closed","file_name":"leoram20a.pdf"}],"abstract":[{"text":"\r\nIn many cyber–physical systems, we encounter the problem of remote state estimation of geo- graphically distributed and remote physical processes. This paper studies the scheduling of sensor transmissions to estimate the states of multiple remote, dynamic processes. Information from the different sensors has to be transmitted to a central gateway over a wireless network for monitoring purposes, where typically fewer wireless channels are available than there are processes to be monitored. For effective estimation at the gateway, the sensors need to be scheduled appropriately, i.e., at each time instant one needs to decide which sensors have network access and which ones do not. To address this scheduling problem, we formulate an associated Markov decision process (MDP). This MDP is then solved using a Deep Q-Network, a recent deep reinforcement learning algorithm that is at once scalable and model-free. We compare our scheduling algorithm to popular scheduling algorithms such as round-robin and reduced-waiting-time, among others. Our algorithm is shown to significantly outperform these algorithms for many example scenario","lang":"eng"}],"publication":"Automatica","language":[{"iso":"eng"}],"ddc":["000"],"citation":{"ama":"Leong AS, Ramaswamy A, Quevedo DE, Karl H, Shi L. Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems. <i>Automatica</i>. 2019. doi:<a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">10.1016/j.automatica.2019.108759</a>","chicago":"Leong, Alex S., Arunselvan Ramaswamy, Daniel E. Quevedo, Holger Karl, and Ling Shi. “Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber–Physical Systems.” <i>Automatica</i>, 2019. <a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">https://doi.org/10.1016/j.automatica.2019.108759</a>.","ieee":"A. S. Leong, A. Ramaswamy, D. E. Quevedo, H. Karl, and L. Shi, “Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems,” <i>Automatica</i>, 2019.","bibtex":"@article{Leong_Ramaswamy_Quevedo_Karl_Shi_2019, title={Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems}, DOI={<a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">10.1016/j.automatica.2019.108759</a>}, number={108759}, journal={Automatica}, author={Leong, Alex S. and Ramaswamy, Arunselvan and Quevedo, Daniel E. and Karl, Holger and Shi, Ling}, year={2019} }","mla":"Leong, Alex S., et al. “Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber–Physical Systems.” <i>Automatica</i>, 108759, 2019, doi:<a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">10.1016/j.automatica.2019.108759</a>.","short":"A.S. Leong, A. Ramaswamy, D.E. Quevedo, H. Karl, L. Shi, Automatica (2019).","apa":"Leong, A. S., Ramaswamy, A., Quevedo, D. E., Karl, H., &#38; Shi, L. (2019). Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems. <i>Automatica</i>. <a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">https://doi.org/10.1016/j.automatica.2019.108759</a>"},"publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["0005-1098"]},"doi":"10.1016/j.automatica.2019.108759","author":[{"last_name":"Leong","full_name":"Leong, Alex S.","first_name":"Alex S."},{"id":"66937","full_name":"Ramaswamy, Arunselvan","orcid":"https://orcid.org/ 0000-0001-7547-8111","last_name":"Ramaswamy","first_name":"Arunselvan"},{"full_name":"Quevedo, Daniel E.","last_name":"Quevedo","first_name":"Daniel E."},{"first_name":"Holger","last_name":"Karl","full_name":"Karl, Holger","id":"126"},{"first_name":"Ling","full_name":"Shi, Ling","last_name":"Shi"}],"date_updated":"2022-01-06T06:52:32Z","status":"public","type":"journal_article","file_date_updated":"2020-01-31T15:57:50Z","article_number":"108759","user_id":"126","department":[{"_id":"7"},{"_id":"34"},{"_id":"3"},{"_id":"75"},{"_id":"57"}],"project":[{"_id":"24","name":"Netzgewahre Regelung & regelungsgewahre Netze"}],"_id":"15741"},{"date_created":"2020-02-03T09:43:19Z","author":[{"first_name":"Oliver","full_name":"Otte, Oliver","last_name":"Otte"}],"date_updated":"2022-01-06T06:52:32Z","title":"Outsourced Decryption of Attribute-based Ciphertexts","citation":{"ieee":"O. Otte, <i>Outsourced Decryption of Attribute-based Ciphertexts</i>. 2019.","chicago":"Otte, Oliver. <i>Outsourced Decryption of Attribute-Based Ciphertexts</i>, 2019.","ama":"Otte O. <i>Outsourced Decryption of Attribute-Based Ciphertexts</i>.; 2019.","mla":"Otte, Oliver. <i>Outsourced Decryption of Attribute-Based Ciphertexts</i>. 2019.","short":"O. Otte, Outsourced Decryption of Attribute-Based Ciphertexts, 2019.","bibtex":"@book{Otte_2019, title={Outsourced Decryption of Attribute-based Ciphertexts}, author={Otte, Oliver}, year={2019} }","apa":"Otte, O. (2019). <i>Outsourced Decryption of Attribute-based Ciphertexts</i>."},"year":"2019","department":[{"_id":"64"}],"user_id":"13703","_id":"15746","language":[{"iso":"eng"}],"type":"mastersthesis","status":"public"},{"title":"On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model","date_updated":"2022-01-06T06:52:32Z","date_created":"2020-02-03T09:45:01Z","author":[{"first_name":"Nico Christof","full_name":"Wördenweber, Nico Christof","last_name":"Wördenweber"}],"year":"2019","citation":{"ama":"Wördenweber NC. <i>On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model</i>.; 2019.","chicago":"Wördenweber, Nico Christof. <i>On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model</i>, 2019.","ieee":"N. C. Wördenweber, <i>On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model</i>. 2019.","apa":"Wördenweber, N. C. (2019). <i>On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model</i>.","short":"N.C. Wördenweber, On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model, 2019.","bibtex":"@book{Wördenweber_2019, title={On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model}, author={Wördenweber, Nico Christof}, year={2019} }","mla":"Wördenweber, Nico Christof. <i>On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model</i>. 2019."},"language":[{"iso":"eng"}],"_id":"15747","department":[{"_id":"64"}],"user_id":"13703","status":"public","type":"bachelorsthesis"},{"project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"15812","user_id":"59789","department":[{"_id":"54"}],"ddc":["000"],"file_date_updated":"2020-02-06T07:24:26Z","language":[{"iso":"eng"}],"type":"conference","publication":"ICASSP 2019, Brighton, UK","abstract":[{"text":"Connectionist temporal classification (CTC) is a sequence-level loss that has been successfully applied to train recurrent neural network (RNN) models for automatic speech recognition. However, one major weakness of CTC is the conditional independence assumption that makes it difficult for the model to learn label dependencies. In this paper, we propose stimulated CTC, which uses stimulated learning to help CTC models learn label dependencies implicitly by using an auxiliary RNN to generate the appropriate stimuli. This stimuli comes in the form of an additional stimulation loss term which encourages the model to learn said label dependencies. The auxiliary network is only used during training and the inference model has the same structure as a standard CTC model. The proposed stimulated CTC model achieves about 35% relative character error rate improvements on a synthetic gesture keyboard recognition task and over 30% relative word error rate improvements on the Librispeech automatic speech recognition tasks over a baseline model trained with CTC only.","lang":"eng"}],"file":[{"file_size":239665,"file_name":"ICASSP_2019_Heymann_1_Paper.pdf","file_id":"15813","access_level":"open_access","date_updated":"2020-02-06T07:24:26Z","date_created":"2020-02-06T07:24:26Z","creator":"huesera","relation":"main_file","content_type":"application/pdf"}],"status":"public","oa":"1","date_updated":"2022-01-06T06:52:35Z","date_created":"2020-02-06T07:22:47Z","author":[{"full_name":"Heymann, Jahn","last_name":"Heymann","first_name":"Jahn"},{"first_name":"Bo Li","full_name":"Khe Chai Sim, Bo Li","last_name":"Khe Chai Sim"}],"title":"Improving CTC Using Stimulated Learning for Sequence Modeling","has_accepted_license":"1","year":"2019","citation":{"chicago":"Heymann, Jahn, and Bo Li Khe Chai Sim. “Improving CTC Using Stimulated Learning for Sequence Modeling.” In <i>ICASSP 2019, Brighton, UK</i>, 2019.","ieee":"J. Heymann and B. L. Khe Chai Sim, “Improving CTC Using Stimulated Learning for Sequence Modeling,” in <i>ICASSP 2019, Brighton, UK</i>, 2019.","ama":"Heymann J, Khe Chai Sim BL. Improving CTC Using Stimulated Learning for Sequence Modeling. In: <i>ICASSP 2019, Brighton, UK</i>. ; 2019.","short":"J. Heymann, B.L. Khe Chai Sim, in: ICASSP 2019, Brighton, UK, 2019.","bibtex":"@inproceedings{Heymann_Khe Chai Sim_2019, title={Improving CTC Using Stimulated Learning for Sequence Modeling}, booktitle={ICASSP 2019, Brighton, UK}, author={Heymann, Jahn and Khe Chai Sim, Bo Li}, year={2019} }","mla":"Heymann, Jahn, and Bo Li Khe Chai Sim. “Improving CTC Using Stimulated Learning for Sequence Modeling.” <i>ICASSP 2019, Brighton, UK</i>, 2019.","apa":"Heymann, J., &#38; Khe Chai Sim, B. L. (2019). Improving CTC Using Stimulated Learning for Sequence Modeling. In <i>ICASSP 2019, Brighton, UK</i>."}},{"department":[{"_id":"54"}],"user_id":"59789","_id":"15816","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"language":[{"iso":"eng"}],"file_date_updated":"2020-02-06T07:42:55Z","ddc":["000"],"publication":"ASRU 2019, Sentosa, Singapore","type":"conference","status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2020-02-06T07:42:42Z","creator":"huesera","date_created":"2020-02-06T07:42:42Z","file_size":200256,"file_id":"15817","access_level":"open_access","file_name":"ASRU_2019_Boeddeker_Paper.pdf"},{"creator":"huesera","date_created":"2020-02-06T07:42:55Z","date_updated":"2020-02-06T07:42:55Z","file_id":"15818","access_level":"open_access","file_name":"ASRU_2019_Boeddeker_Poster.pdf","file_size":123963,"content_type":"application/pdf","relation":"main_file"}],"abstract":[{"lang":"eng","text":"Despite the strong modeling power of neural network acoustic models, speech enhancement has been shown to deliver additional word error rate improvements if multi-channel data is available. However, there has been a longstanding debate whether enhancement should also be carried out on the ASR training data. In an extensive experimental evaluation on the acoustically very challenging CHiME-5 dinner party data we show that: (i) cleaning up the training data can lead to substantial error rate reductions, and (ii) enhancement in training is advisable as long as enhancement in test is at least as strong as in training. This approach stands in contrast and delivers larger gains than the common strategy reported in the literature to augment the training database with additional artificially degraded speech. Together with an acoustic model topology consisting of initial CNN layers followed by factorized TDNN layers we achieve with 41.6% and 43.2% WER on the DEV and EVAL test sets, respectively, a new single-system state-of-the-art result on the CHiME-5 data. This is a 8% relative improvement compared to the best word error rate published so far for a speech recognizer without system combination."}],"date_created":"2020-02-06T07:35:08Z","author":[{"first_name":"Catalin","last_name":"Zorila","full_name":"Zorila, Catalin"},{"id":"40767","full_name":"Boeddeker, Christoph","last_name":"Boeddeker","first_name":"Christoph"},{"full_name":"Doddipatla, Rama","last_name":"Doddipatla","first_name":"Rama"},{"first_name":"Reinhold","last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","id":"242"}],"oa":"1","date_updated":"2022-01-06T06:52:37Z","title":"An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription","has_accepted_license":"1","citation":{"apa":"Zorila, C., Boeddeker, C., Doddipatla, R., &#38; Haeb-Umbach, R. (2019). An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription. In <i>ASRU 2019, Sentosa, Singapore</i>.","bibtex":"@inproceedings{Zorila_Boeddeker_Doddipatla_Haeb-Umbach_2019, title={An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription}, booktitle={ASRU 2019, Sentosa, Singapore}, author={Zorila, Catalin and Boeddeker, Christoph and Doddipatla, Rama and Haeb-Umbach, Reinhold}, year={2019} }","mla":"Zorila, Catalin, et al. “An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription.” <i>ASRU 2019, Sentosa, Singapore</i>, 2019.","short":"C. Zorila, C. Boeddeker, R. Doddipatla, R. Haeb-Umbach, in: ASRU 2019, Sentosa, Singapore, 2019.","ieee":"C. Zorila, C. Boeddeker, R. Doddipatla, and R. Haeb-Umbach, “An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription,” in <i>ASRU 2019, Sentosa, Singapore</i>, 2019.","chicago":"Zorila, Catalin, Christoph Boeddeker, Rama Doddipatla, and Reinhold Haeb-Umbach. “An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription.” In <i>ASRU 2019, Sentosa, Singapore</i>, 2019.","ama":"Zorila C, Boeddeker C, Doddipatla R, Haeb-Umbach R. An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription. In: <i>ASRU 2019, Sentosa, Singapore</i>. ; 2019."},"year":"2019"},{"citation":{"ama":"Leutnant M. <i>Experimentelle Untersuchung Des SEM-Algorithmus</i>.; 2019.","chicago":"Leutnant, Matthias. <i>Experimentelle Untersuchung Des SEM-Algorithmus</i>, 2019.","ieee":"M. Leutnant, <i>Experimentelle Untersuchung des SEM-Algorithmus</i>. 2019.","mla":"Leutnant, Matthias. <i>Experimentelle Untersuchung Des SEM-Algorithmus</i>. 2019.","short":"M. Leutnant, Experimentelle Untersuchung Des SEM-Algorithmus, 2019.","bibtex":"@book{Leutnant_2019, title={Experimentelle Untersuchung des SEM-Algorithmus}, author={Leutnant, Matthias}, year={2019} }","apa":"Leutnant, M. (2019). <i>Experimentelle Untersuchung des SEM-Algorithmus</i>."},"year":"2019","title":"Experimentelle Untersuchung des SEM-Algorithmus","date_created":"2020-02-06T08:51:51Z","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"last_name":"Leutnant","full_name":"Leutnant, Matthias","first_name":"Matthias"}],"date_updated":"2022-01-06T06:52:37Z","status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"department":[{"_id":"64"}],"user_id":"13291","_id":"15819"},{"department":[{"_id":"77"}],"user_id":"477","_id":"15838","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"file_date_updated":"2020-02-06T17:09:45Z","type":"conference","status":"public","author":[{"id":"22398","full_name":"Pauck, Felix","last_name":"Pauck","first_name":"Felix"},{"first_name":"Shikun","full_name":"Zhang, Shikun","last_name":"Zhang"}],"date_updated":"2022-01-06T06:52:38Z","doi":"10.1109/asew.2019.00019","has_accepted_license":"1","publication_identifier":{"isbn":["9781728141367"]},"publication_status":"published","citation":{"chicago":"Pauck, Felix, and Shikun Zhang. “Android App Merging for Benchmark Speed-Up and Analysis Lift-Up.” In <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)</i>, 2019. <a href=\"https://doi.org/10.1109/asew.2019.00019\">https://doi.org/10.1109/asew.2019.00019</a>.","ieee":"F. Pauck and S. Zhang, “Android App Merging for Benchmark Speed-Up and Analysis Lift-Up,” in <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)</i>, 2019.","ama":"Pauck F, Zhang S. Android App Merging for Benchmark Speed-Up and Analysis Lift-Up. In: <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)</i>. ; 2019. doi:<a href=\"https://doi.org/10.1109/asew.2019.00019\">10.1109/asew.2019.00019</a>","apa":"Pauck, F., &#38; Zhang, S. (2019). Android App Merging for Benchmark Speed-Up and Analysis Lift-Up. In <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)</i>. <a href=\"https://doi.org/10.1109/asew.2019.00019\">https://doi.org/10.1109/asew.2019.00019</a>","bibtex":"@inproceedings{Pauck_Zhang_2019, title={Android App Merging for Benchmark Speed-Up and Analysis Lift-Up}, DOI={<a href=\"https://doi.org/10.1109/asew.2019.00019\">10.1109/asew.2019.00019</a>}, booktitle={2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)}, author={Pauck, Felix and Zhang, Shikun}, year={2019} }","mla":"Pauck, Felix, and Shikun Zhang. “Android App Merging for Benchmark Speed-Up and Analysis Lift-Up.” <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)</i>, 2019, doi:<a href=\"https://doi.org/10.1109/asew.2019.00019\">10.1109/asew.2019.00019</a>.","short":"F. Pauck, S. Zhang, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 2019."},"language":[{"iso":"eng"}],"keyword":["Program Analysis","Android App Analysis","Taint Analysis","App Merging","Benchmark"],"ddc":["004"],"publication":"2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)","file":[{"content_type":"application/pdf","relation":"main_file","creator":"fpauck","date_created":"2020-02-06T17:09:45Z","date_updated":"2020-02-06T17:09:45Z","file_name":"AMT_final.pdf","access_level":"closed","file_id":"15839","file_size":644517}],"abstract":[{"lang":"eng","text":"In the field of software analysis a trade-off between scalability and accuracy always exists. In this respect, Android app analysis is no exception, in particular, analyzing large or many apps can be challenging. Dealing with many small apps is a typical challenge when facing micro-benchmarks such as DROIDBENCH or ICC-BENCH. These particular benchmarks are not only used for the evaluation of novel tools but also in continuous integration pipelines of existing mature tools to maintain and guarantee a certain quality-level. Considering this latter usage it becomes very important to be able to achieve benchmark results as fast as possible. Hence, benchmarks have to be optimized for this purpose. One approach to do so is app merging. We implemented the Android Merge Tool (AMT) following this approach and show that its novel aspects can be used to produce scaled up and accurate benchmarks. For such benchmarks Android app analysis tools do not suffer from the scalability-accuracy trade-off anymore. We show this throughout detailed experiments on DROIDBENCH employing three different analysis tools (AMANDROID, ICCTA, FLOWDROID). Benchmark execution times are largely reduced without losing benchmark accuracy. Moreover, we argue why AMT is an advantageous successor of the state-of-the-art app merging tool (APKCOMBINER) in analysis lift-up scenarios."}],"date_created":"2020-02-06T17:06:51Z","title":"Android App Merging for Benchmark Speed-Up and Analysis Lift-Up","year":"2019"},{"status":"public","type":"journal_article","publication":"IOP Conference Series: Materials Science and Engineering","language":[{"iso":"eng"}],"user_id":"60544","department":[{"_id":"9"},{"_id":"321"},{"_id":"149"}],"project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"15875","citation":{"chicago":"Camberg, Alan Adam, Thomas Tröster, F. Bohner, and J. Tölle. “Predicting Plasticity and Fracture of Severe Pre-Strained EN AW-5182 by Yld2000 Yield Locus and Hosford-Coulomb Fracture Model in Sheet Forming Applications.” <i>IOP Conference Series: Materials Science and Engineering</i> 651 (2019): 012057. <a href=\"https://doi.org/10.1088/1757-899X/651/1/012057\">https://doi.org/10.1088/1757-899X/651/1/012057</a>.","ieee":"A. A. Camberg, T. Tröster, F. Bohner, and J. Tölle, “Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications,” <i>IOP Conference Series: Materials Science and Engineering</i>, vol. 651, p. 012057, 2019.","ama":"Camberg AA, Tröster T, Bohner F, Tölle J. Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications. <i>IOP Conference Series: Materials Science and Engineering</i>. 2019;651:012057. doi:<a href=\"https://doi.org/10.1088/1757-899X/651/1/012057\">10.1088/1757-899X/651/1/012057</a>","short":"A.A. Camberg, T. Tröster, F. Bohner, J. Tölle, IOP Conference Series: Materials Science and Engineering 651 (2019) 012057.","bibtex":"@article{Camberg_Tröster_Bohner_Tölle_2019, title={Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications}, volume={651}, DOI={<a href=\"https://doi.org/10.1088/1757-899X/651/1/012057\">10.1088/1757-899X/651/1/012057</a>}, journal={IOP Conference Series: Materials Science and Engineering}, author={Camberg, Alan Adam and Tröster, Thomas and Bohner, F. and Tölle, J.}, year={2019}, pages={012057} }","mla":"Camberg, Alan Adam, et al. “Predicting Plasticity and Fracture of Severe Pre-Strained EN AW-5182 by Yld2000 Yield Locus and Hosford-Coulomb Fracture Model in Sheet Forming Applications.” <i>IOP Conference Series: Materials Science and Engineering</i>, vol. 651, 2019, p. 012057, doi:<a href=\"https://doi.org/10.1088/1757-899X/651/1/012057\">10.1088/1757-899X/651/1/012057</a>.","apa":"Camberg, A. A., Tröster, T., Bohner, F., &#38; Tölle, J. (2019). Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications. <i>IOP Conference Series: Materials Science and Engineering</i>, <i>651</i>, 012057. <a href=\"https://doi.org/10.1088/1757-899X/651/1/012057\">https://doi.org/10.1088/1757-899X/651/1/012057</a>"},"page":"012057","intvolume":"       651","year":"2019","publication_identifier":{"issn":["1757-899X"]},"doi":"10.1088/1757-899X/651/1/012057","title":"Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications","date_created":"2020-02-11T10:21:57Z","author":[{"first_name":"Alan Adam","last_name":"Camberg","full_name":"Camberg, Alan Adam","id":"60544"},{"id":"553","full_name":"Tröster, Thomas","last_name":"Tröster","first_name":"Thomas"},{"first_name":"F.","full_name":"Bohner, F.","last_name":"Bohner"},{"full_name":"Tölle, J.","last_name":"Tölle","first_name":"J."}],"volume":651,"date_updated":"2022-01-06T06:52:39Z"},{"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"15883","user_id":"61186","department":[{"_id":"78"}],"year":"2019","citation":{"ama":"Kumar Jeyakumar S. <i>Incremental Learning with Support Vector Machine on Embedded Platforms</i>.; 2019.","ieee":"S. Kumar Jeyakumar, <i>Incremental learning with Support Vector Machine on embedded platforms</i>. 2019.","chicago":"Kumar Jeyakumar, Shankar. <i>Incremental Learning with Support Vector Machine on Embedded Platforms</i>, 2019.","apa":"Kumar Jeyakumar, S. (2019). <i>Incremental learning with Support Vector Machine on embedded platforms</i>.","short":"S. Kumar Jeyakumar, Incremental Learning with Support Vector Machine on Embedded Platforms, 2019.","mla":"Kumar Jeyakumar, Shankar. <i>Incremental Learning with Support Vector Machine on Embedded Platforms</i>. 2019.","bibtex":"@book{Kumar Jeyakumar_2019, title={Incremental learning with Support Vector Machine on embedded platforms}, author={Kumar Jeyakumar, Shankar}, year={2019} }"},"title":"Incremental learning with Support Vector Machine on embedded platforms","date_updated":"2022-01-06T06:52:39Z","author":[{"first_name":"Shankar","last_name":"Kumar Jeyakumar","full_name":"Kumar Jeyakumar, Shankar"}],"supervisor":[{"first_name":"Hassan","full_name":"Ghasemzadeh Mohammadi, Hassan","id":"61186","last_name":"Ghasemzadeh Mohammadi"}],"date_created":"2020-02-11T16:43:38Z"},{"_id":"15908","user_id":"83504","language":[{"iso":"eng"}],"publication":"28th {USENIX} Security Symposium ({USENIX} Security 19)","type":"conference","status":"public","date_updated":"2022-01-06T06:52:40Z","oa":"1","publisher":"{USENIX} Association","author":[{"last_name":"Müller","full_name":"Müller, Jens","first_name":"Jens"},{"first_name":"Marcus","full_name":"Brinkmann, Marcus","last_name":"Brinkmann"},{"last_name":"Poddebniak","full_name":"Poddebniak, Damian","first_name":"Damian"},{"first_name":"Hanno","full_name":"Böck, Hanno","last_name":"Böck"},{"full_name":"Schinzel, Sebastian","last_name":"Schinzel","first_name":"Sebastian"},{"first_name":"Juraj","full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_created":"2020-02-15T09:50:57Z","title":"\"Johnny, you are fired!\" -- Spoofing OpenPGP and S/MIME Signatures in Emails","main_file_link":[{"open_access":"1","url":"https://www.usenix.org/conference/usenixsecurity19/presentation/muller"}],"publication_identifier":{"isbn":["978-1-939133-06-9"]},"place":"Santa Clara, CA","year":"2019","page":"1011-1028","citation":{"short":"J. Müller, M. Brinkmann, D. Poddebniak, H. Böck, S. Schinzel, J. Somorovsky, J. Schwenk, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, Santa Clara, CA, 2019, pp. 1011–1028.","mla":"Müller, Jens, et al. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails.” <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>, {USENIX} Association, 2019, pp. 1011–28.","bibtex":"@inproceedings{Müller_Brinkmann_Poddebniak_Böck_Schinzel_Somorovsky_Schwenk_2019, place={Santa Clara, CA}, title={“Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails}, booktitle={28th {USENIX} Security Symposium ({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Müller, Jens and Brinkmann, Marcus and Poddebniak, Damian and Böck, Hanno and Schinzel, Sebastian and Somorovsky, Juraj and Schwenk, Jörg}, year={2019}, pages={1011–1028} }","apa":"Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky, J., &#38; Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i> (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.","ieee":"J. Müller <i>et al.</i>, “‘Johnny, you are fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails,” in <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>, 2019, pp. 1011–1028.","chicago":"Müller, Jens, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, and Jörg Schwenk. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails.” In <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>, 1011–28. Santa Clara, CA: {USENIX} Association, 2019.","ama":"Müller J, Brinkmann M, Poddebniak D, et al. “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In: <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>. Santa Clara, CA: {USENIX} Association; 2019:1011-1028."}},{"language":[{"iso":"eng"}],"_id":"15909","user_id":"83504","status":"public","type":"conference","publication":"28th {USENIX} Security Symposium ({USENIX} Security 19)","title":"Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities","main_file_link":[{"open_access":"1","url":"https://www.usenix.org/conference/usenixsecurity19/presentation/merget"}],"publisher":"{USENIX} Association","oa":"1","date_updated":"2022-01-06T06:52:40Z","date_created":"2020-02-15T09:51:09Z","author":[{"first_name":"Robert","last_name":"Merget","full_name":"Merget, Robert"},{"id":"83504","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","first_name":"Juraj"},{"last_name":"Aviram","full_name":"Aviram, Nimrod","first_name":"Nimrod"},{"first_name":"Craig","last_name":"Young","full_name":"Young, Craig"},{"last_name":"Fliegenschmidt","full_name":"Fliegenschmidt, Janis","first_name":"Janis"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"},{"last_name":"Shavitt","full_name":"Shavitt, Yuval","first_name":"Yuval"}],"place":"Santa Clara, CA","year":"2019","citation":{"ieee":"R. Merget <i>et al.</i>, “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities,” in <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>, 2019, pp. 1029–1046.","chicago":"Merget, Robert, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, and Yuval Shavitt. “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.” In <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>, 1029–46. Santa Clara, CA: {USENIX} Association, 2019.","ama":"Merget R, Somorovsky J, Aviram N, et al. Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In: <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>. Santa Clara, CA: {USENIX} Association; 2019:1029-1046.","bibtex":"@inproceedings{Merget_Somorovsky_Aviram_Young_Fliegenschmidt_Schwenk_Shavitt_2019, place={Santa Clara, CA}, title={Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities}, booktitle={28th {USENIX} Security Symposium ({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Merget, Robert and Somorovsky, Juraj and Aviram, Nimrod and Young, Craig and Fliegenschmidt, Janis and Schwenk, Jörg and Shavitt, Yuval}, year={2019}, pages={1029–1046} }","mla":"Merget, Robert, et al. “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.” <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i>, {USENIX} Association, 2019, pp. 1029–46.","short":"R. Merget, J. Somorovsky, N. Aviram, C. Young, J. Fliegenschmidt, J. Schwenk, Y. Shavitt, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, Santa Clara, CA, 2019, pp. 1029–1046.","apa":"Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk, J., &#38; Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In <i>28th {USENIX} Security Symposium ({USENIX} Security 19)</i> (pp. 1029–1046). Santa Clara, CA: {USENIX} Association."},"page":"1029-1046","publication_identifier":{"isbn":["978-1-939133-06-9"]}},{"date_created":"2020-02-15T10:01:05Z","author":[{"first_name":"Nils","full_name":"Engelbertz, Nils","last_name":"Engelbertz"},{"last_name":"Mladenov","full_name":"Mladenov, Vladislav","first_name":"Vladislav"},{"first_name":"Juraj","full_name":"Somorovsky, Juraj","id":"83504","orcid":"0000-0002-3593-7720","last_name":"Somorovsky"},{"first_name":"David","last_name":"Herring","full_name":"Herring, David"},{"first_name":"Nurullah","last_name":"Erinola","full_name":"Erinola, Nurullah"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_updated":"2022-01-06T06:52:40Z","publisher":"Gesellschaft für Informatik, Bonn","title":"Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)","page":" 95-106 ","citation":{"ama":"Engelbertz N, Mladenov V, Somorovsky J, Herring D, Erinola N, Schwenk J. Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In: Roßnagel H, Wagner S, Hühnlein D, eds. <i>Open Identity Summit 2019</i>. Gesellschaft für Informatik, Bonn; 2019:95-106.","chicago":"Engelbertz, Nils, Vladislav Mladenov, Juraj Somorovsky, David Herring, Nurullah Erinola, and Jörg Schwenk. “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS).” In <i>Open Identity Summit 2019</i>, edited by Heiko Roßnagel, Sven Wagner, and Detlef Hühnlein, 95–106. Gesellschaft für Informatik, Bonn, 2019.","ieee":"N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, and J. Schwenk, “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS),” in <i>Open Identity Summit 2019</i>, 2019, pp. 95–106.","apa":"Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., &#38; Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In H. Roßnagel, S. Wagner, &#38; D. Hühnlein (Eds.), <i>Open Identity Summit 2019</i> (pp. 95–106). Gesellschaft für Informatik, Bonn.","bibtex":"@inproceedings{Engelbertz_Mladenov_Somorovsky_Herring_Erinola_Schwenk_2019, title={Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)}, booktitle={Open Identity Summit 2019}, publisher={Gesellschaft für Informatik, Bonn}, author={Engelbertz, Nils and Mladenov, Vladislav and Somorovsky, Juraj and Herring, David and Erinola, Nurullah and Schwenk, Jörg}, editor={Roßnagel, Heiko and Wagner, Sven and Hühnlein, DetlefEditors}, year={2019}, pages={95–106} }","mla":"Engelbertz, Nils, et al. “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS).” <i>Open Identity Summit 2019</i>, edited by Heiko Roßnagel et al., Gesellschaft für Informatik, Bonn, 2019, pp. 95–106.","short":"N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, J. Schwenk, in: H. Roßnagel, S. Wagner, D. Hühnlein (Eds.), Open Identity Summit 2019, Gesellschaft für Informatik, Bonn, 2019, pp. 95–106."},"year":"2019","user_id":"83504","_id":"15910","language":[{"iso":"eng"}],"publication":"Open Identity Summit 2019","type":"conference","status":"public","editor":[{"last_name":"Roßnagel","full_name":"Roßnagel, Heiko","first_name":"Heiko"},{"first_name":"Sven","last_name":"Wagner","full_name":"Wagner, Sven"},{"full_name":"Hühnlein, Detlef","last_name":"Hühnlein","first_name":"Detlef"}]},{"status":"public","abstract":[{"lang":"eng","text":"Secure hardware design is the most important aspect to be considered in addition to functional correctness. Achieving hardware security in today’s globalized Integrated Cir- cuit(IC) supply chain is a challenging task. One solution that is widely considered to help achieve secure hardware designs is Information Flow Tracking(IFT). It provides an ap- proach to verify that the systems adhere to security properties either by static verification during design phase or dynamic checking during runtime.\r\nProof-Carrying Hardware(PCH) is an approach to verify a functional design prior to using it in hardware. It is a two-party verification approach, where the target party, the consumer requests new functionalities with pre-defined properties to the producer. In response, the producer designs the IP (Intellectual Property) cores with the requested functionalities that adhere to the consumer-defined properties. The producer provides the IP cores and a proof certificate combined into a proof-carrying bitstream to the consumer to verify it. If the verification is successful, the consumer can use the IP cores in his hardware. In essence, the consumer can only run verified IP cores. Correctly applied, PCH techniques can help consumers to defend against many unintentional modifications and malicious alterations of the modules they receive. There are numerous published examples of how to use PCH to detect any change in the functionality of a circuit, i.e., pairing a PCH approach with functional equivalence checking for combinational or sequential circuits. For non-functional properties, since opening new covert channels to leak secret information from secure circuits is a viable attack vector for hardware trojans, i.e., intentionally added malicious circuitry, IFT technique is employed to make sure that secret/untrusted information never reaches any unclassified/trusted outputs.\r\nThis master thesis aims to explore the possibility of adapting Information Flow Tracking into a Proof-Carrying Hardware scenario. It aims to create a method that combines Infor- mation Flow Tracking(IFT) with a PCH approach at bitstream level enabling consumers to validate the trustworthiness of a module’s information flow without the computational costs of a complete flow analysis."}],"type":"mastersthesis","language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"78"}],"project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901","_id":"1"}],"_id":"15920","citation":{"ama":"Keerthipati M. <i>A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking</i>. Universität Paderborn; 2019.","ieee":"M. Keerthipati, <i>A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking</i>. Universität Paderborn, 2019.","chicago":"Keerthipati, Monica. <i>A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking</i>. Universität Paderborn, 2019.","short":"M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking, Universität Paderborn, 2019.","bibtex":"@book{Keerthipati_2019, title={A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking}, publisher={Universität Paderborn}, author={Keerthipati, Monica}, year={2019} }","mla":"Keerthipati, Monica. <i>A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking</i>. Universität Paderborn, 2019.","apa":"Keerthipati, M. (2019). <i>A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking</i>. Universität Paderborn."},"year":"2019","title":"A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking","supervisor":[{"last_name":"Wiersema","id":"3118","full_name":"Wiersema, Tobias","first_name":"Tobias"},{"last_name":"Platzner","id":"398","full_name":"Platzner, Marco","first_name":"Marco"},{"orcid":"0000-0002-3717-3939","last_name":"Hellebrand","id":"209","full_name":"Hellebrand, Sybille","first_name":"Sybille"}],"author":[{"first_name":"Monica","last_name":"Keerthipati","full_name":"Keerthipati, Monica"}],"date_created":"2020-02-17T12:03:40Z","date_updated":"2022-01-06T06:52:41Z","publisher":"Universität Paderborn"},{"year":"2019","citation":{"apa":"Desouki, A. A., Röder, M., &#38; Ngonga Ngomo, A.-C. (2019). Ranking on Very Large Knowledge Graphs. In <i>Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19</i> (pp. 163–171). ACM. <a href=\"https://doi.org/10.1145/3342220.3343660\">https://doi.org/10.1145/3342220.3343660</a>","short":"A.A. Desouki, M. Röder, A.-C. Ngonga Ngomo, in: Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19, ACM, 2019, pp. 163–171.","bibtex":"@inproceedings{Desouki_Röder_Ngonga Ngomo_2019, title={Ranking on Very Large Knowledge Graphs}, DOI={<a href=\"https://doi.org/10.1145/3342220.3343660\">10.1145/3342220.3343660</a>}, booktitle={Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19}, publisher={ACM}, author={Desouki, Abdelmoneim Amer and Röder, Michael and Ngonga Ngomo, Axel-Cyrille}, year={2019}, pages={163–171} }","mla":"Desouki, Abdelmoneim Amer, et al. “Ranking on Very Large Knowledge Graphs.” <i>Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19</i>, ACM, 2019, pp. 163–71, doi:<a href=\"https://doi.org/10.1145/3342220.3343660\">10.1145/3342220.3343660</a>.","chicago":"Desouki, Abdelmoneim Amer, Michael Röder, and Axel-Cyrille Ngonga Ngomo. “Ranking on Very Large Knowledge Graphs.” In <i>Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19</i>, 163–71. ACM, 2019. <a href=\"https://doi.org/10.1145/3342220.3343660\">https://doi.org/10.1145/3342220.3343660</a>.","ieee":"A. A. Desouki, M. Röder, and A.-C. Ngonga Ngomo, “Ranking on Very Large Knowledge Graphs,” in <i>Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19</i>, 2019, pp. 163–171.","ama":"Desouki AA, Röder M, Ngonga Ngomo A-C. Ranking on Very Large Knowledge Graphs. In: <i>Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT ’19</i>. ACM; 2019:163-171. doi:<a href=\"https://doi.org/10.1145/3342220.3343660\">10.1145/3342220.3343660</a>"},"page":"163-171","publication_status":"published","publication_identifier":{"isbn":["9781450368858"]},"title":"Ranking on Very Large Knowledge Graphs","doi":"10.1145/3342220.3343660","conference":{"start_date":"2019-09-17","name":"30th ACM Conference on Hypertext and Social Media","end_date":"2019-09-20"},"date_updated":"2022-01-06T06:52:41Z","publisher":"ACM","author":[{"full_name":"Desouki, Abdelmoneim Amer","last_name":"Desouki","first_name":"Abdelmoneim Amer"},{"first_name":"Michael","full_name":"Röder, Michael","last_name":"Röder"},{"full_name":"Ngonga Ngomo, Axel-Cyrille","last_name":"Ngonga Ngomo","first_name":"Axel-Cyrille"}],"date_created":"2020-02-18T16:39:35Z","abstract":[{"text":"Ranking plays a central role in a large number of applications driven by RDF knowledge graphs. Over the last years, many popular RDF knowledge graphs have grown so large that rankings for the facts they contain cannot be computed directly using the currently common 64-bit platforms. In this paper, we tackle two problems:\r\nComputing ranks on such large knowledge bases efficiently and incrementally. First, we present D-HARE, a distributed approach for computing ranks on very large knowledge graphs. D-HARE assumes the random surfer model and relies on data partitioning to compute matrix multiplications and transpositions on disk for matrices of arbitrary size. Moreover, the data partitioning underlying D-HARE allows the execution of most of its steps in parallel.\r\nAs very large knowledge graphs are often updated periodically, we tackle the incremental computation of ranks on large knowledge bases as a second problem. We address this problem by presenting\r\nI-HARE, an approximation technique for calculating the overall ranking scores of a knowledge without the need to recalculate the ranking from scratch at each new revision. We evaluate our approaches by calculating ranks on the 3 × 10^9 and 2.4 × 10^9 triples from Wikidata resp. LinkedGeoData. Our evaluation demonstrates\r\nthat D-HARE is the first holistic approach for computing ranks on very large RDF knowledge graphs. In addition, our incremental approach achieves a root mean squared error of less than 10E−7 in the best case. Both D-HARE\r\n and I-HARE are open-source and are available at: https://github.com/dice-group/incrementalHARE.\r\n","lang":"eng"}],"status":"public","type":"conference","publication":"Proceedings of the 30th ACM Conference on Hypertext and Social Media  - HT '19","keyword":["Knowledge Graphs","Ranking","RDF"],"language":[{"iso":"eng"}],"project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"15921","user_id":"69382","department":[{"_id":"574"}]},{"citation":{"ama":"Heindorf S, Scholten Y, Engels G, Potthast M. Debiasing Vandalism Detection Models at Wikidata (Extended Abstract). In: <i>INFORMATIK</i>. ; 2019:289-290. doi:<a href=\"https://doi.org/10.18420/inf2019_48\">10.18420/inf2019_48</a>","chicago":"Heindorf, Stefan, Yan Scholten, Gregor Engels, and Martin Potthast. “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract).” In <i>INFORMATIK</i>, 289–90, 2019. <a href=\"https://doi.org/10.18420/inf2019_48\">https://doi.org/10.18420/inf2019_48</a>.","ieee":"S. Heindorf, Y. Scholten, G. Engels, and M. Potthast, “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract),” in <i>INFORMATIK</i>, 2019, pp. 289–290.","bibtex":"@inproceedings{Heindorf_Scholten_Engels_Potthast_2019, title={Debiasing Vandalism Detection Models at Wikidata (Extended Abstract)}, DOI={<a href=\"https://doi.org/10.18420/inf2019_48\">10.18420/inf2019_48</a>}, booktitle={INFORMATIK}, author={Heindorf, Stefan and Scholten, Yan and Engels, Gregor and Potthast, Martin}, year={2019}, pages={289–290} }","short":"S. Heindorf, Y. Scholten, G. Engels, M. Potthast, in: INFORMATIK, 2019, pp. 289–290.","mla":"Heindorf, Stefan, et al. “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract).” <i>INFORMATIK</i>, 2019, pp. 289–90, doi:<a href=\"https://doi.org/10.18420/inf2019_48\">10.18420/inf2019_48</a>.","apa":"Heindorf, S., Scholten, Y., Engels, G., &#38; Potthast, M. (2019). Debiasing Vandalism Detection Models at Wikidata (Extended Abstract). In <i>INFORMATIK</i> (pp. 289–290). <a href=\"https://doi.org/10.18420/inf2019_48\">https://doi.org/10.18420/inf2019_48</a>"},"page":"289-290","year":"2019","main_file_link":[{"url":"https://dl.gi.de/bitstream/handle/20.500.12116/24997/paper3_25.pdf","open_access":"1"}],"doi":"10.18420/inf2019_48","title":"Debiasing Vandalism Detection Models at Wikidata (Extended Abstract)","date_created":"2019-11-05T15:48:52Z","author":[{"first_name":"Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf","id":"11871","full_name":"Heindorf, Stefan"},{"first_name":"Yan","full_name":"Scholten, Yan","last_name":"Scholten"},{"full_name":"Engels, Gregor","id":"107","last_name":"Engels","first_name":"Gregor"},{"first_name":"Martin","full_name":"Potthast, Martin","last_name":"Potthast"}],"oa":"1","date_updated":"2022-01-06T06:52:03Z","status":"public","type":"conference","publication":"INFORMATIK","language":[{"iso":"eng"}],"user_id":"11871","department":[{"_id":"66"}],"_id":"14568"},{"title":"Advances and novel applications of mobile wireless networking","doi":"10.1016/j.adhoc.2019.101975","date_updated":"2022-01-06T06:52:06Z","author":[{"orcid":"0000-0002-4336-7350","last_name":"Sommer","full_name":"Sommer, Christoph","id":"49154","first_name":"Christoph"},{"first_name":"Stefano","full_name":"Basagni, Stefano","last_name":"Basagni"}],"date_created":"2019-11-05T18:38:44Z","year":"2019","citation":{"ama":"Sommer C, Basagni S. Advances and novel applications of mobile wireless networking. <i>Ad Hoc Networks</i>. 2019. doi:<a href=\"https://doi.org/10.1016/j.adhoc.2019.101975\">10.1016/j.adhoc.2019.101975</a>","ieee":"C. Sommer and S. Basagni, “Advances and novel applications of mobile wireless networking,” <i>Ad Hoc Networks</i>, 2019.","chicago":"Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of Mobile Wireless Networking.” <i>Ad Hoc Networks</i>, 2019. <a href=\"https://doi.org/10.1016/j.adhoc.2019.101975\">https://doi.org/10.1016/j.adhoc.2019.101975</a>.","apa":"Sommer, C., &#38; Basagni, S. (2019). Advances and novel applications of mobile wireless networking. <i>Ad Hoc Networks</i>. <a href=\"https://doi.org/10.1016/j.adhoc.2019.101975\">https://doi.org/10.1016/j.adhoc.2019.101975</a>","short":"C. Sommer, S. Basagni, Ad Hoc Networks (2019).","mla":"Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of Mobile Wireless Networking.” <i>Ad Hoc Networks</i>, 101975, 2019, doi:<a href=\"https://doi.org/10.1016/j.adhoc.2019.101975\">10.1016/j.adhoc.2019.101975</a>.","bibtex":"@article{Sommer_Basagni_2019, title={Advances and novel applications of mobile wireless networking}, DOI={<a href=\"https://doi.org/10.1016/j.adhoc.2019.101975\">10.1016/j.adhoc.2019.101975</a>}, number={101975}, journal={Ad Hoc Networks}, author={Sommer, Christoph and Basagni, Stefano}, year={2019} }"},"publication_status":"published","publication_identifier":{"issn":["1570-8705"]},"article_number":"101975","language":[{"iso":"eng"}],"_id":"14817","user_id":"49154","department":[{"_id":"589"}],"status":"public","type":"journal_article","publication":"Ad Hoc Networks"},{"language":[{"iso":"eng"}],"department":[{"_id":"589"}],"user_id":"49154","_id":"14819","status":"public","publication":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","type":"conference","doi":"10.1109/wowmom.2019.8793008","title":"Modeling Cycling Behavior to Improve Bicyclists' Safety at Intersections - A Networking Perspective","author":[{"first_name":"Julian","last_name":"Heinovski","full_name":"Heinovski, Julian"},{"full_name":"Stratmann, Lukas","last_name":"Stratmann","first_name":"Lukas"},{"first_name":"Dominik S.","full_name":"Buse, Dominik S.","last_name":"Buse"},{"full_name":"Klingler, Florian","last_name":"Klingler","first_name":"Florian"},{"first_name":"Mario","last_name":"Franke","full_name":"Franke, Mario"},{"first_name":"Marie-Christin H.","last_name":"Oczko","full_name":"Oczko, Marie-Christin H."},{"last_name":"Sommer","orcid":"0000-0002-4336-7350","id":"49154","full_name":"Sommer, Christoph","first_name":"Christoph"},{"first_name":"Ingrid","last_name":"Scharlau","full_name":"Scharlau, Ingrid"},{"first_name":"Falko","last_name":"Dressler","full_name":"Dressler, Falko"}],"date_created":"2019-11-05T18:38:48Z","date_updated":"2022-01-06T06:52:06Z","citation":{"ama":"Heinovski J, Stratmann L, Buse DS, et al. Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective. In: <i>2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>. ; 2019. doi:<a href=\"https://doi.org/10.1109/wowmom.2019.8793008\">10.1109/wowmom.2019.8793008</a>","chicago":"Heinovski, Julian, Lukas Stratmann, Dominik S. Buse, Florian Klingler, Mario Franke, Marie-Christin H. Oczko, Christoph Sommer, Ingrid Scharlau, and Falko Dressler. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective.” In <i>2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>, 2019. <a href=\"https://doi.org/10.1109/wowmom.2019.8793008\">https://doi.org/10.1109/wowmom.2019.8793008</a>.","ieee":"J. Heinovski <i>et al.</i>, “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective,” in <i>2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>, 2019.","apa":"Heinovski, J., Stratmann, L., Buse, D. S., Klingler, F., Franke, M., Oczko, M.-C. H., … Dressler, F. (2019). Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective. In <i>2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>. <a href=\"https://doi.org/10.1109/wowmom.2019.8793008\">https://doi.org/10.1109/wowmom.2019.8793008</a>","bibtex":"@inproceedings{Heinovski_Stratmann_Buse_Klingler_Franke_Oczko_Sommer_Scharlau_Dressler_2019, title={Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective}, DOI={<a href=\"https://doi.org/10.1109/wowmom.2019.8793008\">10.1109/wowmom.2019.8793008</a>}, booktitle={2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)}, author={Heinovski, Julian and Stratmann, Lukas and Buse, Dominik S. and Klingler, Florian and Franke, Mario and Oczko, Marie-Christin H. and Sommer, Christoph and Scharlau, Ingrid and Dressler, Falko}, year={2019} }","mla":"Heinovski, Julian, et al. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective.” <i>2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)</i>, 2019, doi:<a href=\"https://doi.org/10.1109/wowmom.2019.8793008\">10.1109/wowmom.2019.8793008</a>.","short":"J. Heinovski, L. Stratmann, D.S. Buse, F. Klingler, M. Franke, M.-C.H. Oczko, C. Sommer, I. Scharlau, F. Dressler, in: 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019."},"year":"2019","publication_identifier":{"isbn":["9781728102702"]},"publication_status":"published"},{"_id":"14821","user_id":"24239","article_type":"original","keyword":["Weber","Wien","Zensur"],"language":[{"iso":"ger"}],"type":"journal_article","publication":"Weberiana","status":"public","publisher":"Allitera","date_updated":"2022-01-06T06:52:06Z","date_created":"2019-11-06T08:34:40Z","author":[{"last_name":"Seipelt","full_name":"Seipelt, Agnes Regina","id":"24239","first_name":"Agnes Regina"}],"volume":29,"title":"Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien","publication_status":"published","publication_identifier":{"isbn":["978-3-96233-182-5"]},"year":"2019","citation":{"bibtex":"@article{Seipelt_2019, title={Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien}, volume={29}, journal={Weberiana}, publisher={Allitera}, author={Seipelt, Agnes Regina}, year={2019}, pages={107–161} }","short":"A.R. Seipelt, Weberiana 29 (2019) 107–161.","mla":"Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” <i>Weberiana</i>, vol. 29, Allitera, 2019, pp. 107–161.","apa":"Seipelt, A. R. (2019). Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien. <i>Weberiana</i>, <i>29</i>, 107–161.","ieee":"A. R. Seipelt, “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien,” <i>Weberiana</i>, vol. 29, pp. 107–161, 2019.","chicago":"Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” <i>Weberiana</i> 29 (2019): 107–161.","ama":"Seipelt AR. Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien. <i>Weberiana</i>. 2019;29:107–161."},"page":"107–161","intvolume":"        29"}]
