% % This file was created by the TYPO3 extension % bib % --- Timezone: CET % Creation date: 2024-03-29 % Creation time: 14-10-24 % --- Number of references % 33 % @Phdthesis { 2015-schmidt-heuristic-header-recovery, title = {Heuristic Header Recovery for Corrupted Network Packets}, year = {2015}, month = {12}, day = {31}, tags = {refector}, publisher = {Shaker Verlag GmbH}, address = {Aachen, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {12}, school = {RWTH Aachen University}, institute = {Chair of Communication and Distributed Systems}, type = {Ph.D. Thesis}, ISBN = {978-3844041743}, author = {Schmidt, Florian} } @Inproceedings { 2015-ziegeldorf-cans-boma, title = {Bandwidth-optimized Secure Two-Party Computation of Minima}, year = {2015}, month = {12}, day = {8}, volume = {9476}, pages = {197-213}, url = {/fileadmin/papers/2015/2015-ziegeldorf-cans-boma.pdf}, misc2 = {Online}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, booktitle = {14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco}, language = {en}, ISBN = {978-3-319-26822-4}, DOI = {10.1007/978-3-319-26823-1_14}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Hiller, Jens and Henze, Martin and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 2015-zimmermann-remp, title = {Remp TCP: Low latency Multipath TCP}, year = {2015}, month = {12}, day = {1}, publisher = {ACM}, booktitle = {Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany}, event_place = {Heidelberg, Germany}, event_name = {CoNEXT 2015}, event_date = {1.-4.12.2015}, reviewed = {1}, author = {Fr{\"o}mmgen, Alexander and Erbsh{\"a}user, Tobias and Zimmermann, Torsten and Wehrle, Klaus and Buchmann, Alejandro} } @Inproceedings { 2015-serror-channel-coding, title = {Channel Coding Versus Cooperative ARQ: Reducing Outage Probability in Ultra-Low Latency Wireless Communications}, year = {2015}, month = {12}, tags = {koi}, url = {file:1704}, publisher = {IEEE}, howpublished = {online}, booktitle = {IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications (GC'15 - ULTRA2), San Diego, USA}, event_place = {San Diego, USA}, event_name = {IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications}, event_date = {December 6-10 2015}, DOI = {10.1109/GLOCOMW.2015.7414150}, reviewed = {1}, author = {Serror, Martin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-stoffers-mswim-data-deps, title = {Data Dependency based Parallel Simulation of Wireless Networks}, year = {2015}, month = {11}, day = {2}, pages = {291-300}, abstract = {Simulation of wireless systems is highly complex and can only be efficient if the simulation is executed in parallel. To this end, independent events have to be identified to enable their simultaneous execution. Hence, the number of events identified as independent needs to be maximized in order to increase the level of parallelism. Traditionally, dependencies are determined only by time and location of events: If two events take place on the same simulation entity, they must be simulated in timestamp order. Our approach to overcome this limitation is to also investigate data-dependencies between events. This enables event reordering and parallelization even for events at the same simulation entity. To this end, we design the simulation language PSimLa, which aids this process. In this paper, we discuss the PSimLa design and compiler as well as our data-dependency analysis approach in detail and present case studies of wireless network models, speeded up by a factor of 10 on 12 cores where time-based parallelization only achieves a 1.6x speedup.}, note = {Best Paper Award}, keywords = {Parallel simulation; Static code analysis; Data dependencies}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-mswim-data-deps.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Canc{\'u}n, Mexico (MSWiM'15)}, event_place = {Canc{\'u}n, Mexico}, language = {en}, DOI = {10.1145/2811587.2811593}, reviewed = {1}, author = {Stoffers, Mirko and Sehy, Torsten and Gross, James and Wehrle, Klaus} } @Inproceedings { 2015-wirtz-wifi-sharing, title = {Collaborative On-demand Wi-Fi Sharing}, year = {2015}, month = {10}, pages = {19-27}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-lcn-cows.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA}, event_place = {Clearwater Beach, Florida, USA}, event_name = {40th IEEE Conference on Local Computer Networks (LCN)}, event_date = {October 26-29 2015}, language = {en}, DOI = {10.1109/LCN.2015.7366279}, reviewed = {1}, author = {Wirtz, Hanno and Zimmermann, Torsten and Serror, Martin and Wehrle, Klaus} } @Poster { serror-zdn-2015, title = {How to Benefit from Cooperation in Latency-Constrained Wireless Communications}, year = {2015}, month = {9}, day = {25}, tags = {cps,koi,hodrian}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-serror-zdn-cooperation.pdf}, web_url = {http://kn.inf.uni-tuebingen.de/itg-zdn-2015-poster-session}, publisher = {VDE}, howpublished = {online}, organization = {ITG-Fachtagung ''Zukunft der Netze 2015'' – Poster Session, T{\"u}bingen, Germany}, event_place = {T{\"u}bingen, Germany}, author = {Serror, Martin and Dombrowski, Christian and Wehrle, Klaus and Gross, James} } @Inproceedings { 2015-ziegeldorf-dpm-comparison, title = {Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper)}, year = {2015}, month = {9}, day = {22}, volume = {9481}, pages = {226-234}, url = {fileadmin/papers/2015/2015-ziegeldorf-dpm-cbp.pdf}, misc2 = {Online}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, booktitle = {The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria}, language = {en}, ISBN = {978-3-319-29882-5}, DOI = {10.1007/978-3-319-29883-2_15}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Henze, Martin and Hummen, Ren{\'e} and Wehrle, Klaus} } @Inproceedings { 2015-gerdes-authorization, title = {Autorisierungsmanagement f{\"u}r das Internet of Things}, year = {2015}, month = {9}, tags = {iotsec}, misc2 = {Online}, booktitle = {D•A•CH Security 2015}, event_place = {Sankt Augustin, Germany}, event_name = {D•A•CH Security 2015}, event_date = {08.09. - 09.09.2015}, state = {accepted}, language = {de}, reviewed = {1}, author = {Gerdes, Stefanie and Hummen, Ren{\'e} and Bergmann, Olaf} } @Inproceedings { 2015-schmidt-santa, title = {Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]}, year = {2015}, month = {8}, day = {19}, tags = {ssiclops}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom}, event_place = {London, United Kingdom}, event_name = {43rd ACM SIGCOMM Conference (SIGCOMM '15)}, event_date = {17–21 August, 2015}, language = {en}, DOI = {10.1145/2785956.2790014}, reviewed = {1}, author = {Schmidt, Florian and Hohlfeld, Oliver and Glebke, Ren{\'e} and Wehrle, Klaus} } @Techreport { 2015-draft-moskowitz-hip-dex-04, title = {HIP Diet EXchange (DEX)}, year = {2015}, month = {7}, day = {20}, number = {draft-moskowitz-hip-dex-04}, abstract = {This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-dex-04}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Moskowitz, Robert and Hummen, Ren{\'e}} } @Inproceedings { 2015-ahfe-kowalewski-facebook, title = {Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany}, journal = {Procedia Manufacturing}, year = {2015}, month = {7}, volume = {3}, pages = {815--822}, publisher = {Elsevier}, booktitle = {The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA}, language = {en}, ISSN = {2351-9789}, DOI = {10.1016/j.promfg.2015.07.336}, reviewed = {1}, author = {Kowalewski, Sylvia and Ziefle, Martina and Ziegeldorf, Jan Henrik and Wehrle, Klaus} } @Phdthesis { 2015-hummen-resource-conscious, title = {Resource-Conscious Network Security for the IP-Based Internet of Things}, year = {2015}, month = {6}, day = {30}, tags = {iot}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-hummen-phd-thesis.pdf}, publisher = {Shaker Verlag}, address = {Aachen, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {11}, school = {RWTH Aachen University}, institute = {Chair of Communication and Distributed Systems}, type = {Ph.D. Thesis}, ISBN = {978-3-8440-3755-5}, author = {Hummen, Ren{\'e}} } @Inproceedings { 2015-wirtz-secon, title = {Enabling Ubiquitous Interaction with Smart Things}, year = {2015}, month = {6}, day = {24}, pages = {256-264}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf}, web_url = {http://www.comsys.rwth-aachen.de/short/secon15-stif}, misc2 = {Online}, publisher = {IEEE}, booktitle = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA}, event_place = {Seattle, USA}, event_name = {12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015)}, event_date = {22.06.2015 - 25.06.2015}, language = {en}, DOI = {10.1109/SAHCN.2015.7338324}, reviewed = {1}, author = {Wirtz, Hanno and R{\"u}th, Jan and Serror, Martin and Zimmermann, Torsten and Wehrle, Klaus} } @Techreport { 2015-draft-moskowitz-hip-dex-03, title = {HIP Diet EXchange (DEX)}, year = {2015}, month = {6}, day = {19}, number = {draft-moskowitz-hip-dex-03}, abstract = {This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2. The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.}, note = {Work in progress}, tags = {iotsec; ietf}, url = {http://tools.ietf.org/html/draft-moskowitz-hip-dex-03}, misc2 = {Online}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, language = {en}, author = {Moskowitz, Robert and Hummen, Ren{\'e}} } @Inproceedings { 2015-wowmom-schumacher-warpsim, title = {WARPsim: A Code-Transparent Network Simulator for WARP Devices}, year = {2015}, month = {6}, day = {14}, tags = {cps,koi}, url = {file:1688}, publisher = {IEEE}, howpublished = {online}, booktitle = {16th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks: Demos (IEEE WoWMoM 2015 - Demos), Boston, USA}, event_place = {Boston, USA}, event_name = {IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks}, event_date = {14.-17. June 2015}, DOI = {10.1109/WoWMoM.2015.7158181}, reviewed = {1}, author = {Schumacher, Andreas and Serror, Martin and Dombrowski, Christian and Gross, James} } @Inproceedings { 2015-stoffers-pads-data-deps, title = {Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation}, year = {2015}, month = {6}, day = {10}, pages = {73-74}, tags = {horizon}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-pads-data-deps.pdf}, misc2 = {Online}, publisher = {ACM}, address = {New York, NY}, booktitle = {Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom}, event_place = {London, United Kingdom}, language = {en}, DOI = {10.1145/2769458.2769487}, reviewed = {1}, author = {Stoffers, Mirko and Sehy, Torsten and Gross, James and Wehrle, Klaus} } @Inproceedings { 2015-bitsch-phealth-piap, title = {Psychologist in a Pocket: Towards Depression Screening on Mobile Phones}, year = {2015}, month = {6}, day = {2}, volume = {211}, pages = {153 --159}, abstract = {Depression is the most prevalent clinical disorder and one of the main causes of disability. This makes early detection of depressive symptoms critical in its prevention and management. This paper presents and discusses the development of Psychologist in a Pocket (PiaP), a mental mHealth application for Android which screens and monitors for these symptoms, and–given the explicit permission of the user–alerts a trusted contact such as the mental health professional or a close friend, if it detects symptoms. All text inputted electronically–such as short message services, emails, social network posts–is analyzed based on keywords related to depression based on DSM-5 and ICD criteria as well as Beck's Cognitive Theory of Depression and the Self-Focus Model. Data evaluation and collection happen in the background, on- device, without requiring any user involvement. Currently, the application is in an early prototype phase entering initial clinical validation.}, url = {fileadmin/papers/2015/2015-bitsch-phealth-piap.pdf}, misc = {Print}, editor = {Blobel, Bernd and Lind{\'e}n, Maria and Ahmed, Mobyen Uddin}, publisher = {IOS Press}, address = {Amsterdam}, series = {Studies in Health Technology and Informatics}, booktitle = {Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_place = {V{\"a}ster{\aa}s, Sweden}, event_name = {12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_date = {June 2-4, 2015}, language = {en}, ISBN = {978-1-61499-515-9}, ISSN = {0926-9630}, DOI = {10.3233/978-1-61499-516-6-153}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Ix, Tim and Ferrer Cheng, Paula Glenda and Wehrle, Klaus} } @Inproceedings { 2015-bitsch-phealth-brain, title = {Towards Brain Research in a Pocket: Bringing EEG Research and Diagnostics out of the Lab}, year = {2015}, month = {6}, day = {2}, volume = {211}, pages = {185 -- 190}, abstract = {Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment. We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach.}, url = {fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf}, misc = {Print}, editor = {Blobel, Bernd and Lind{\'e}n, Maria and Ahmed, Mobyen Uddin}, publisher = {IOS Press}, address = {Amsterdam}, series = {Studies in Health Technology and Informatics}, booktitle = {Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_place = {V{\"a}ster{\aa}s, Sweden}, event_name = {12th International Conference on Wearable Micro and Nano Technologies for Personalized Health}, event_date = {June 2-4, 2015}, language = {en}, ISBN = {978-1-61499-515-9}, ISSN = {0926-9630}, DOI = {10.3233/978-1-61499-516-6-185}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Ramos, Roann and Severijns, Cassandra and Wehrle, Klaus} } @Inproceedings { 2015-ziegeldorf-iwpe-comparison, title = {Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks}, year = {2015}, month = {5}, day = {21}, pages = {198-205}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA}, language = {en}, DOI = {10.1109/SPW.2015.9}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Metzke, Jan and Henze, Martin and Wehrle, Klaus} } @Inproceedings { Dombrowski2015EW, title = {EchoRing: A Low-Latency, Reliable Token-Passing MAC Protocol for Wireless Industrial Networks}, year = {2015}, month = {5}, day = {20}, abstract = {Spurred by recent industrial trends, such as factory automation or phase synchronization in the smart grid, there is a significant interest for wireless industrial networks lately. In contrast to traditional applications, the focus is on carrying out communication at very short latencies together with high reliabilities. Meeting such extreme requirements with wireless networks is challenging. A potential candidate for such a network is a token-passing protocol, as it allows to bound latencies. However, it lacks mechanisms to cope with the dynamics of wireless channels. In this paper, we present EchoRing, a novel wireless token-passing protocol. Cooperative communication and an improved fault tolerance allow this decentralized protocol to support industrial applications over wireless networks. Based on experimental results, we demonstrate the suitability of EchoRing to support demands of industrial applications. EchoRing outperforms other schemes by several orders of magnitude in terms of reliability for latencies of and below 10ms.}, keywords = {Protocols and architectures for wireless networks; Testbeds and experimental wireless systems; Reliability: robust and dependable wireless systems}, tags = {cps,hodrian}, publisher = {IEEE}, booktitle = {Proc. of 21st European Wireless Conference (EW15)}, event_place = {Budapest, Hungary}, event_name = {European Wireless Conference (EW)}, event_date = {20/05/2015}, ISBN = {978-3-8007-3976-9}, author = {Dombrowski, Christian and Gross, James} } @Inproceedings { virtualcoordinate_li_lin_stoffers_gross_2015, title = {Channel-Aware Virtual Coordinates Assignment Protocol and Routing in Multi-Hop Cognitive Radio Network}, year = {2015}, month = {5}, day = {20}, url = {http://dl.ifip.org/db/conf/networking/networking2015/1570067591.pdf}, misc2 = {Online}, publisher = {IFIP}, address = {Laxenburg, Austria}, booktitle = {Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France}, event_place = {Toulouse, France}, language = {en}, DOI = {10.1109/IFIPNetworking.2015.7145337}, reviewed = {1}, author = {Li, Di and Lin, Zhichao and Stoffers, Mirko and Gross, James} } @Proceedings { 2015-sdnflex-heuschkel-dyns, title = {Protocol Virtualization through Dynamic Network Stacks}, year = {2015}, month = {3}, day = {9}, publisher = {IEEE}, event_place = {Cottbus}, event_name = {SDNFlex Workshop (NetSys 2015)}, event_date = {March 2015, 9-12}, language = {en}, DOI = {10.1109/NetSys.2015.7089055}, reviewed = {1}, author = {Heuschkel, Jens and Schweizer, Immanuel and Zimmermann, Torsten and Wehrle, Klaus and M{\"u}hlh{\"a}user, Max} } @Inproceedings { Dombrowski2015NetSys, title = {EchoRing: Meeting Hard Real-Time Constraints with Decentralized Wireless Networks}, year = {2015}, month = {3}, day = {9}, pages = {1--3}, tags = {cps,hodrian}, url = {http://www.netsys2015.com/wp-content/uploads/NetSys2015_Demo_Dombrowski.pdf}, web_url = {http://www.netsys2015.com/program/demonstrations/}, web_url2 = {http://www.netsys2015.com/communication-software-awards/}, misc = {2nd Place Regular Demonstrations}, publisher = {IEEE}, booktitle = {Proc. of 2nd International Conference on Networked Systems, Demonstrations (NetSys15)}, event_place = {Cottbus, Germany}, event_name = {Conference on Networked Systems (NetSys) - Demo Session}, event_date = {09/03/2015}, reviewed = {1}, author = {Dombrowski, Christian and Gross, James} } @Inproceedings { 2014-ziegeldorf-codaspy-coinparty, title = {CoinParty: Secure Multi-Party Mixing of Bitcoins}, year = {2015}, month = {3}, day = {2}, tags = {rfc}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf}, misc2 = {Online}, publisher = {ACM}, booktitle = {The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA}, event_place = {San Antonio, TX, USA}, event_name = {The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015)}, language = {en}, ISBN = {978-1-4503-3191-3}, DOI = {10.1145/2699026.2699100}, reviewed = {1}, author = {Ziegeldorf, Jan Henrik and Grossmann, Fred and Henze, Martin and Inden, Nicolas and Wehrle, Klaus} } @Inproceedings { 2015-ewsn-schmidt-canttaketheheat, title = {If You Can't Take The Heat: Temperature Effects On Low-Power Wireless Networks And How To Mitigate Them}, year = {2015}, month = {2}, day = {10}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-ewsn-canttaketheheat.pdf}, misc2 = {Online}, publisher = {Springer}, booktitle = {Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal}, event_place = {Porto, Portugal}, event_name = {12th European Conference on Wireless Sensor Networks (EWSN 2015)}, event_date = {9-11 February, 2015}, language = {en}, ISBN = {978-3-319-15581-4}, DOI = {10.1007/978-3-319-15582-1_19}, reviewed = {1}, author = {Schmidt, Florian and Ceriotti, Matteo and Hauser, Niklas and Wehrle, Klaus} } @Phdthesis { 2015-wirtz-d2d-networking, title = {The Feasibility, Semantics, and Scope of Mobile Wireless Device-to-Device Networking}, year = {2015}, month = {1}, day = {30}, publisher = {Shaker Verlag}, address = {Aachen, Germany}, series = {Reports on Communications and Distributed Systems}, edition = {9}, school = {RWTH Aachen University}, institute = {Chair of Communication and Distributed Systems}, type = {Ph.D. Thesis}, ISBN = {978-3-8440-3367-0}, author = {Wirtz, Hanno} } @Proceedings { 2015-Jakobs-EURAS-Book, title = {The Role of Standards in Transatlantic Trade and Regulation. Proc. 20th EURAS Annual Standardisation Conference. EURAS contributions to standardisation research, vol. 9.}, year = {2015}, misc2 = {Online}, publisher = {Mainz Publishers}, ISBN = {978-3-95886-035-3}, reviewed = {1}, author = {Bergh Skriver, Katrine and Jakobs, Kai and Jerlang, Jesper} } @Inproceedings { 2015-Jakobs-EuroMed, title = {Corporate ICT Standardisation Management – Lessons from the Literature and from Case Studies}, year = {2015}, misc2 = {Online}, publisher = {EuroMed Press}, booktitle = {Proc. 7th Annual Conference of the EuroMed Academy of Business, 2015, Verona, Italy}, language = {EN}, reviewed = {1}, author = {Jakobs, Kai} } @Inproceedings { 2015-Jakobs-Euras-paper, title = {Standardisation Management – Some Lessons to be Learnt}, year = {2015}, pages = {175-190}, misc2 = {Online}, publisher = {Mainz Publishers}, booktitle = {Proc. 20th EURAS Annual Standardisation Conference, 2015, Copenhagen, Denmark.}, language = {EN}, reviewed = {1}, author = {Jakobs, Kai} } @Phdthesis { 2015-hummen-phdthesis, title = {Resource-Conscious Network Security for the IP-Based Internet of Things}, year = {2015}, school = {RWTH Aachen University}, author = {Hummen, Ren{\'e}} } @Phdthesis { 2015-punal-phdthesis, title = {Optimizing 802.11 Wireless Communications with Machine Learning}, year = {2015}, school = {RWTH Aachen University}, author = {Pu{\~n}al, Oscar} } @Phdthesis { 2015-schimdt-phdthesis, title = {Heuristic Header Error Recovery for Corrupted Network Packets}, year = {2015}, school = {RWTH Aachen University}, author = {Schmidt, Florian} }