Search For:

Displaying 1-12 out of 12 total
Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Benjamin Jochheim, Christian Keil, Dirk Westhoff, Jochen Schönfelder, Jochen Schiller, Martin Kutscher, Matthias Küster, Matthias Wählisch, Osman Ugus, Sebastian Trapp, Theodor Nolte, Thomas C. Schmidt
Issue Date:August 2012
pp. 271-272
Smartphones are popular attack targets, but usually too weak in applying common protection concepts. SKIMS designs and implements a cooperative, cross-layer security system for mobile devices. Detection mechanisms as well as a proactive and reactive defens...
     
Native actors: a scalable software platform for distributed, heterogeneous environments
Found in: Proceedings of the 2013 workshop on Programming based on actors, agents, and decentralized control (AGERE! '13)
By Dominik Charousset, Matthias Wählisch, Raphael Hiesgen, Thomas C. Schmidt
Issue Date:October 2013
pp. 87-96
Writing concurrent software is challenging, especially with low-level synchronization primitives such as threads or locks in shared memory environments. The actor model replaces implicit communication by an explicit message passing in a 'hared-nothing' par...
     
A scalable communication infrastructure for smart grid applications using multicast over public networks
Found in: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)
By Matthias Wählisch, Sebastian Meiling, Thomas C. Schmidt, Till Steinbach
Issue Date:March 2013
pp. 690-694
The transition to regenerative energy resources paves the path from a small number of large power plants to a grid of highly distributed, heterogeneous small generators. To establish a Smart Grid it requires a scalable machine-to-machine communication that...
     
Actors and publish/subscribe: an efficient approach to scalable distribution in data centers
Found in: Proceedings of the 2012 ACM conference on CoNEXT student workshop (CoNEXT Student '12)
By Dominik Charousset, Matthias Wählisch, Thomas C. Schmidt
Issue Date:December 2012
pp. 53-54
Data center applications are required to be fault-tolerant and self-healing, and at the same time to scale dynamically with the number of available hardware resources. Highly efficient task distribution is crucial for such services that require low latency...
     
Exploring reachability via settlement-free peering
Found in: Proceedings of the 2012 ACM conference on CoNEXT student workshop (CoNEXT Student '12)
By Matthias Wählisch, Sebastian Meyer, Thomas C. Schmidt
Issue Date:December 2012
pp. 49-50
The importance of an autonomous system is typically derived by its economic relevance, in Internet terms measured by the number of customer ASes it provides with connectivity. Such simple business relationship does not hold anymore. In this paper, we analy...
     
First insights from a mobile honeypot
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Christian Keil, Jochen Schönfelder, Jochen Schiller, Matthias Wählisch, Sebastian Trapp, Thomas C. schmidt
Issue Date:August 2012
pp. 305-306
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devic...
     
Towards detecting BGP route hijacking using the RPKI
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Matthias Wählisch, Olaf Maennel, Thomas C. Schmidt
Issue Date:August 2012
pp. 103-104
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The scale of the problem can only be estimated. The Resource Publication Infrastruc...
     
Bulk of interest: performance measurement of content-centric routing
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Markus Vahlenkamp, Matthias Wählisch, Thomas C. Schmidt
Issue Date:August 2012
pp. 99-100
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a dynamic mapping that directs content requests to a nearby copy, or an immedia...
     
Integrated circuit optimization by means of evolutionary multi-objective optimization
Found in: Proceedings of the 13th annual conference on Genetic and evolutionary computation (GECCO '11)
By Anouar Chebil, Matthias W. Blesken, Oliver Schuetze, Ulrich Rueckert, Xavier Esquivel
Issue Date:July 2011
pp. 807-812
The design of resource efficient integrated circuits (ICs) requires solving a minimization problem which consists of more than one objective given as measures of the available resources. This multi-objective optimization problem (MOP) can be solved on the ...
     
Explaining U.S. consumer behavior with news sentiment
Found in: ACM Transactions on Management Information Systems (TMIS)
By Matthias W. Uhl
Issue Date:June 2011
pp. 1-18
We introduce a novel dataset with a news sentiment index that was constructed from a selection of over 300,000 newspaper articles from five of the top ten U.S. newspapers by circulation. By constructing ARMA models, we show that news and consumer sentiment...
     
Convex variational Bayesian inference for large scale generalized linear models
Found in: Proceedings of the 26th Annual International Conference on Machine Learning (ICML '09)
By Hannes Nickisch, Matthias W. Seeger
Issue Date:June 2009
pp. 1-8
We show how variational Bayesian inference can be implemented for very large generalized linear models. Our relaxation is proven to be a convex problem for any log-concave model. We provide a generic double loop algorithm for solving this relaxation on mod...
     
Compressed sensing and Bayesian experimental design
Found in: Proceedings of the 25th international conference on Machine learning (ICML '08)
By Hannes Nickisch, Matthias W. Seeger
Issue Date:July 2008
pp. 912-919
We relate compressed sensing (CS) with Bayesian experimental design and provide a novel efficient approximate method for the latter, based on expectation propagation. In a large comparative study about linearly measuring natural images, we show that the si...
     
 1