Publikationen (133)
2024 (6)
-
Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam MailsIn: 15th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C 2024)
-
Demo: Smartbright: Learning a Physics-Based Model of Light-Scattering With Symbolic RegressionIn: Proceedings of the 2024 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2024 ACM International Symposium on Wearable Computers
-
Extending PriPoCoG: A Privacy Policy Editor for GDPR-Compliant Privacy PoliciesIn: International Conference on Evaluation of Novel Approaches to Software Engineering
-
Hidden Markov Models with Unobservable TransitionsIn: Taming the Infinities of Concurrency
-
Towards Predicting the Perceived Brightness in a Smart Home Through Symbolic RegressionIn: 22nd IEEE International Conference on Pervasive Computing and Communications WiP (PerCom 2024)DOI: TBD
-
[Poster] BitTorrent-based Gossip LearningIn: 14th International Conference on the Internet of Things (IoT 2024), November 19--22, 2024, Oulu, Finland
2023 (8)
-
Towards Distributed Control under Deficient Communication with Multi-agent Reinforcement LearningIn: AUTOQUITOUS 2023: FIRST WORKSHOP ON AUTONOMOUS UBIQUITOUS SYSTEMS
-
Modelling Emergent Behaviour for Enhanced Autonomy in Cyber-Physical SystemsIn: Mobile and Ubiquitous Systems: Computing, Networking and Services - 20th EAI International Conference, MobiQuitous 2023, Melbourne, VIC, Australia, November 14–17, 2023, Proceedings, Part II
-
Creating Privacy Policies from Data-Flow DiagramsIn: European Symposium on Research in Computer Security
-
Revising Poor Man's Eye Tracker For Crowd-Sourced StudiesIn: 21st IEEE International Conference on Pervasive Computing and Communications (PerCom 2023)
-
Artifact: Revising Poor Man's Eye Tracker For Crowd-Sourced StudiesIn: 21st IEEE International Conference on Pervasive Computing and Communications (PerCom 2023)
-
How to Change a Light Bulb in Your Smart Home: A Digital-Twin Based ApproachIn: PDT 2023: First Workshop on Pervasive Digital Twins
-
P2BAC: Privacy Policy Based Access Control Using P-LPLIn: 9th International Conference on Information Systems Security and Privacy (ICISSP 2023)
-
A Privacy-Protecting Step-Level Walking Direction Detection Algorithm Based on Floor VibrationIn: IEEE Sensors Journal
2022 (10)
-
Deep Learning Based Framework for Emotion Recognition Using Facial Expression | Pakistan Journal of Engineering and Technology
-
Lifecycle-Based View on Cyber-Physical System Models Using Extended Hidden Markov ModelsIn: Proceedings of the 2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE)
-
Transfer Learning-Based Framework for Sentiment Classification of Cosmetics Products Reviews | Pakistan Journal of Engineering and Technology
-
Perspectives on Negative Research Results in Pervasive ComputingIn: IEEE Pervasive Computing, Vol. 22 Issue 3
-
A Comparative Analysis of Social Communication Applications Using Aspect Based Sentiment Analysis | Pakistan Journal of Engineering and Technology
-
PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy PoliciesIn: International Conference on Trust and Privacy in Digital Business
-
A Digital-Twin Based Architecture for Software Longevity in Smart HomesIn: 42nd IEEE International Conference on Distributed Computing Systems (ICDCS 2022)
-
AI-Based Cycling Analysis: Bike Type Detection and Predictive MaintenanceIn: DuEPublico 2 Duisburg-Essen Publications online
-
Pedestrian Counting Based on Piezoelectric Vibration SensorIn: Applied SciencesDOI: 10.3390/app12041920
-
Aspect2Labels: A novelistic decision support system for higher educational institutions by using multi-layer topic modeling approachIn: Expert Systems with Applications
2021 (8)
-
Persistent Streams: The Internet With Ephemeral StorageIn: Tagungsband des FG-BS Herbsttreffens 2021
-
Technical Report on the Extension of the Layered Privacy LanguageIn: DuEPublico 2 Duisburg-Essen Publications online
-
On the Digital Forensic Investigation of Hit-And-Run Accidents
-
Towards Predictive Safety Maintenance for IoT Equipped BikesIn: PerCom Work in Progress on Pervasive Computing and Communications 2021 (PerCom WiP 2021)
-
An Algorithm for Dependency-Preserving Smart Home UpdatesIn: PerIoT 2021: 5th International Workshop on Mobile and Pervasive Internet of Things (PerIoT 2021)
-
Bewertung des Fahrverhaltens mittels RadgeschwindigkeitenIn: Making Connected Mobility Work: Technische und betriebswirtschaftliche Aspekte, Springer Gabler, Wiesbaden
-
Towards Robust Models of Cyber-Physical SystemsIn: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers
-
IoT and Deep Learning Based Approach for Rapid Screening and Face Mask Detection for Infection Spread Control of COVID-19In: Applied SciencesDOI: 10.3390/app11083495
2020 (12)
-
Deep Learning-based Vibration Signal Personnel Positioning SystemIn: IEEE Access
-
Attending Doctoral Events—Experiences and LessonsIn: IEEE Pervasive Computing
-
Towards Bike Type and E-Scooter Classification With Smartphone SensorsIn: 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, ACM
-
A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run AccidentsIn: 11th EAI International Conference on Digital Forensics & Cyber Crime
-
Requirements and Mechanisms for Smart Home UpdatesIn: SENSYBLE 2020, 2nd workshop on Smart Systems for Better Living EnvironmentsDOI: 10.18420/inf2020_91
-
Group-based Memory Management in FyrIn: Tagungsband des FG-BS Herbsttreffens 2020
-
A Privacy-Protecting Indoor Emergency Monitoring System based on Floor VibrationIn: Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers
-
Assisted Generation of Privacy Policies using Textual PatternsIn: International Conference on Evaluation of Novel Approaches to Software Engineering
-
Online Driving Behavior Scoring using Wheel SpeedsIn: Proceedings of the 6th International Conference on Vehicle Technology and Intelligent Transport Systems - Volume 1: VEHITS,
-
Towards Enhancing Bike Navigation Safety and Experience Using Sensor Enabled Devices (Ph.D. Forum)In: PerCom PhD Forum 2020: 18th Annual IEEE International Conference on Pervasive Computing and Communications PhD Forum (PerCom PhD Forum 2020)
-
Towards Longevity of Smart Home SystemsIn: PerIoT 2020: 4th International Workshop on Mobile and Pervasive Internet of Things (PerIoT 2020)
-
Longevity of Smart HomesIn: PerCom PhD Forum 2020: 18th Annual IEEE International Conference on Pervasive Computing and Communications PhD Forum (PerCom PhD Forum 2020)
2019 (12)
-
Privacy Policy Specification Framework for Addressing End-Users’ Privacy RequirementsIn: International Conference on Trust and Privacy in Digital Business
-
A Survey on Privacy Policy Languages: Expressiveness Concerning Data Protection RegulationsIn: 12th CMI Conference on Cybersecurity and Privacy (CMI)
-
Good, Neutral or Bad - News ClassificationIn: Proceedings of the Third International Workshop on Recent Trends in News Information Retrieval, co-located with 42nd International ACM Conference on Research and Development in Information Retrieval (SIGIR 2019)
-
Architecture to Manage and Protect Personal Data Utilising BlockchainIn: International Conference on Evaluation of Novel Approaches to Software Engineering
-
Route Derivation Using Distances and Turn DirectionsIn: AutoSec 2019 - Proceedings of the ACM Workshop on Automotive Cybersecurity, co-located with CODASPY 2019
-
Privacy Threats in the Mobile Web & Social Media
-
Mobile devices as digital sextants for zero-permission geolocationIn: Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP
-
Herleitung von Fahrtstrecken aus Distanz- und KurvenbewegungsdatenIn: Mobilität in Zeiten der Veränderung: Technische und betriebswirtschaftliche Aspekte, Springer Gabler, Wiesbaden
-
Fyr: A memory-safe and thread-safe systems programming languageIn: Proceedings of the ACM Symposium on Applied Computing
-
Domain Impersonation is Feasible: A Study of CA Domain Validation VulnerabilitiesIn: 2019 IEEE European Symposium on Security and Privacy (EuroS&P)
-
Bike type identification using smartphone sensorsIn: Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers
-
An Approach to Exonerate Innocent Suspects in Hit-And-Run Accidents via Route ReconstructionIn: IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019
2018 (3)
-
Spawn & Merge - Eine Programmierabstraktion zur deterministischen Synchronisation verteilter Systeme
-
Towards Comprehensible Explanations of Phenomena in Home Automation SystemsIn: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
-
SecureCloud: An Encrypted, Scalable Storage for Cloud ForensicsIn: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
2017 (3)
-
Identifying TV Channels & On-Demand Videos using Ambient Light SensorsIn: Pervasive Mob. Comput.
-
Domain Name System Without Root ServersIn: CRiSIS
-
Application-level determinism in distributed systemsIn: 22nd IEEE International Conference on Parallel and Distributed Systems: Proceedings
2016 (1)
-
Video recognition using ambient light sensorsIn: 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)
2015 (1)
-
Impact of DNSSEC on the Internet Landscape
2014 (6)
-
Privacy Preservation in Decentralized Online Social NetworksIn: IEEE Internet ComputingDOI: 10.1109/MIC.2013.131
-
Measurement of Globally Visible DNS InjectionIn: IEEE Access
-
GPU-Based NSEC3 Hash BreakingIn: 2014 IEEE 13th International Symposium on Network Computing and ApplicationsDOI: 10.1109/NCA.2014.27
-
Deterministic Synchronization of Multi-threaded Programs with Operational TransformationIn: 2014 IEEE International Parallel & Distributed Processing Symposium Workshops
-
CAN Tree Routing for Content-Addressable NetworkDOI: None
-
Automatismen zur Strukturbildung und Selbst-Organisation in verteilten SystemenIn: Logiken strukturbildender Prozesse: Automatismen
2013 (4)
-
Temperature-controlled water saving valveIn: Patent {CN}202812427U
-
SoNet -- Privacy and Replication in Federated Online Social NetworksIn: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops
-
Measuring Occurrence of DNSSEC ValidationIn: PAM
-
Development of Efficient Role-Based Sensor Network Applications with Excel SpreadsheetsIn: 2013 International Conference on Parallel and Distributed Systems
2012 (7)
-
Large powder material storageIn: Patent {CN}202509831U
-
无线局域网络信道规划及控制技术分析In: 中国新通信
-
Using zone code to manage a Content-Addressable Network for Distributed SimulationsIn: 2012 IEEE 14th International Conference on Communication Technology
-
Two-dimensional symbol code and method for reading the symbol code: Patent US 20120145779 A1
-
Self-Stabilizing Micro Controller for Large-Scale Sensor Networks in Spite of Program Counter Corruptions Due to Soft ErrorsIn: 2012 IEEE 18th International Conference on Parallel and Distributed Systems
-
NTALG - TCP NAT traversal with application-level gatewaysIn: 2012 IEEE Consumer Communications and Networking Conference (CCNC)
-
An architecture for complex P2P systemsIn: 2012 IEEE Consumer Communications and Networking Conference (CCNC)
2011 (8)
-
VoroStore -- A Secure and Reliable Data Storage for Peer-to-Peer-Based MMVEsIn: 2011 IEEE 11th International Conference on Computer and Information TechnologyDOI: 10.1109/CIT.2011.97
-
SYNI - TCP Hole Punching Based on SYN InjectionIn: 2011 IEEE 10th International Symposium on Network Computing and ApplicationsDOI: 10.1109/NCA.2011.66
-
Self-stabilizing embedded systemsIn: OC '11
-
Model-Driven Development of Self-organising Control ApplicationsIn: Organic Computing
-
Federating Websites with the Google Wave ProtocolIn: IEEE Internet ComputingDOI: 10.1109/MIC.2011.28
-
Enforcing game rules in untrusted P2P-based MMVEsIn: SimuTools
-
Detecting Opportunistic Cheaters in Volunteer ComputingIn: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)
-
A New Protocol to Determine the NAT Characteristics of a HostIn: 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum
2010 (1)
-
Towards peer-to-peer-based cryptanalysisIn: IEEE Local Computer Network Conference
2009 (5)
-
Towards Logical Clocks in P2P-based MMVEsIn: Electron. Commun. Eur. Assoc. Softw. Sci. Technol.
-
Gears4Net An Asynchronous Programming ModelIn: 2009 International Conference on Parallel Processing Workshops
-
Fighting Cheating in P2P-based MMVEs with Disjoint Path RoutingIn: Electron. Commun. Eur. Assoc. Softw. Sci. Technol.
-
Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Towards Logical Clocks in P 2 P-based MMVEsDOI: None
-
Bootstrapping Peer-to-Peer Systems Using IRCIn: 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
2008 (6)
-
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual EnvironmentsIn: Int. J. Adv. Media Commun.
-
Self-stabilizing AutomataIn: BICC
-
Replication in Peer-to-Peer SystemsIn: IWSOS
-
Model-Driven Development and Adaptation of Autonomous Control ApplicationsIn: IEEE Distributed Systems OnlineDOI: 10.1109/MDSO.2008.32
-
Bootstrapping in Peer-to-Peer SystemsIn: 2008 14th IEEE International Conference on Parallel and Distributed Systems
-
A NAT Traversal Mechanism for Peer-To-Peer NetworksIn: 2008 Eighth International Conference on Peer-to-Peer ComputingDOI: 10.1109/P2P.2008.29
2007 (7)
-
The Internet of Things - Context-based Device FederationsIn: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
-
Symstry: ein P2P-System für Ortsbezogene AnwendungenIn: KIVS 2007: Kommunikation in verteilten Systemen : 15. ITG-GI-Fachtagung vom 26. Februar bis 2. März 2007 in Bern, Schweiz ; Industriebeiträge, Kurzbeiträge und Workshops
-
Requirements of Peer-to-Peer-based Massively Multiplayer Online GamingIn: Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07)
-
Rapid Prototyping for Pervasive ApplicationsIn: IEEE Pervasive ComputingDOI: 10.1109/MPRV.2007.41
-
Decentralized Bootstrapping in Pervasive ApplicationsIn: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)
-
A Model-driven Approach to the Development of Autonomous Control Applications ⋆DOI: None
-
A Middleware for Context-Aware Applications and Services Based on Messenger ProtocolsIn: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)
2006 (8)
-
Towards a Programming Paradigm for Pervasive Applications based on the Ambient CalculusDOI: None
-
Towards a general purpose user interface for service-oriented context-aware applicationsIn: CAI '06
-
Self-organizing and Self-stabilizing Role Assignment in Sensor/Actuator NetworksIn: OTM ConferencesDOI: 10.1007/11914952_52
-
Scripting Your HomeIn: LoCADOI: 10.1007/11752967_18
-
Optimizing Locality for Self-organizing Context-Based SystemsIn: IWSOS/EuroNGIDOI: 10.1007/11822035_7
-
LCARS: the next generation programming contextIn: CAI '06
-
Customizable pervasive applicationsIn: Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06)
-
A P2P-Framework for Context-Based InformationDOI: None
2005 (2)
-
Self-stabilizing Publish/Subscribe Systems: Algorithms and EvaluationIn: Euro-ParDOI: 10.1007/11549468_73
-
How to Configure Proof-of-Work Functions to Stop SpamIn: SicherheitDOI: None
2004 (4)
-
Quality of service in middleware and applications: a model-driven approachIn: Proceedings. Eighth IEEE International Enterprise Distributed Object Computing Conference, 2004. EDOC 2004.
-
Programming Abstractions for Content-Based Publish/Subscribe in Object-Oriented LanguagesIn: CoopIS/DOA/ODBASE
-
Model-driven development of QoS-enabled distributed applications
-
Disseminating information to mobile clients using publish-subscribeIn: IEEE Internet Computing
2003 (7)
-
Quality of service engineering with UML, .NET, and CORBAIn: 25th International Conference on Software Engineering, 2003. Proceedings.
-
QoS mechanism composition at design-time and runtimeIn: 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings.
-
QCCS: Quality Controlled Component-Based Software Development
-
QCCS: A methodology for the development of contract-aware components based on Aspect Oriented DesignDOI: None
-
Model MetamorphosisIn: IEEE Softw.
-
DotQoS: a QoS extension for .NET remotingIn: IWQoS'03
-
A QoS metamodel and its realization in a CORBA componentIn: 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the
2002 (1)
-
From contracts to aspects in uml designsDOI: None
2001 (1)
-
A UML Meta-model for Contract Aware ComponentsIn: UML
2000 (2)
-
OpenSource in Electronic Commerce - A Comparative AnalysisIn: EC-Web
-
Components on the desktopIn: Proceedings 33rd International Conference on Technology of Object-Oriented Languages and Systems TOOLS 33