This file was created by the TYPO3 extension
bib
--- Timezone: CET
Creation date: 2023-12-05
Creation time: 22-56-20
--- Number of references
33
phdthesis
2015-schmidt-heuristic-header-recovery
Heuristic Header Recovery for Corrupted Network Packets
2015
12
31
refector
Shaker Verlag GmbH
Aachen, Germany
Reports on Communications and Distributed Systems
12
RWTH Aachen University
Chair of Communication and Distributed Systems
Ph.D. Thesis
978-3844041743
FlorianSchmidt
inproceedings
2015-ziegeldorf-cans-boma
Bandwidth-optimized Secure Two-Party Computation of Minima
2015
12
8
9476
197-213
/fileadmin/papers/2015/2015-ziegeldorf-cans-boma.pdf
Online
Springer
Lecture Notes in Computer Science
14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco
en
978-3-319-26822-4
10.1007/978-3-319-26823-1_14
1
Jan HenrikZiegeldorf
JensHiller
MartinHenze
HannoWirtz
KlausWehrle
inproceedings
2015-zimmermann-remp
Remp TCP: Low latency Multipath TCP
2015
12
1
ACM
Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany
Heidelberg, Germany
CoNEXT 2015
1.-4.12.2015
1
AlexanderFrömmgen
TobiasErbshäuser
TorstenZimmermann
KlausWehrle
AlejandroBuchmann
inproceedings
2015-serror-channel-coding
Channel Coding Versus Cooperative ARQ: Reducing Outage Probability in
Ultra-Low Latency Wireless Communications
2015
12
koi
file:1704
IEEE
online
IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in
Wireless Communications (GC'15 - ULTRA2), San Diego, USA
San Diego, USA
IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications
December 6-10 2015
10.1109/GLOCOMW.2015.7414150
1
MartinSerror
ChristianDombrowski
KlausWehrle
JamesGross
inproceedings
2015-stoffers-mswim-data-deps
Data Dependency based Parallel Simulation of Wireless Networks
2015
11
2
291-300
Simulation of wireless systems is highly complex and can only be efficient if the simulation is executed in parallel. To this end, independent events have to be identified to enable their simultaneous execution. Hence, the number of events identified as independent needs to be maximized in order to increase the level of parallelism. Traditionally, dependencies are determined only by time and location of events: If two events take place on the same simulation entity, they must be simulated in timestamp order. Our approach to overcome this limitation is to also investigate data-dependencies between events. This enables event reordering and parallelization even for events at the same simulation entity. To this end, we design the simulation language PSimLa, which aids this process. In this paper, we discuss the PSimLa design and compiler as well as our data-dependency analysis approach in detail and present case studies of wireless network models, speeded up by a factor of 10 on 12 cores where time-based parallelization only achieves a 1.6x speedup.
Best Paper Award
Parallel simulation; Static code analysis; Data dependencies
horizon
http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-mswim-data-deps.pdf
Online
ACM
New York, NY
Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Cancún, Mexico (MSWiM'15)
Cancún, Mexico
en
10.1145/2811587.2811593
1
MirkoStoffers
TorstenSehy
JamesGross
KlausWehrle
inproceedings
2015-wirtz-wifi-sharing
Collaborative On-demand Wi-Fi Sharing
2015
10
19-27
http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-lcn-cows.pdf
Online
IEEE
40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA
Clearwater Beach, Florida, USA
40th IEEE Conference on Local Computer Networks (LCN)
October 26-29 2015
en
10.1109/LCN.2015.7366279
1
HannoWirtz
TorstenZimmermann
MartinSerror
KlausWehrle
poster
serror-zdn-2015
How to Benefit from Cooperation in Latency-Constrained Wireless Communications
2015
9
25
cps,koi,hodrian
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-serror-zdn-cooperation.pdf
http://kn.inf.uni-tuebingen.de/itg-zdn-2015-poster-session
VDE
online
ITG-Fachtagung "Zukunft der Netze 2015" – Poster Session, Tübingen, Germany
Tübingen, Germany
MartinSerror
ChristianDombrowski
KlausWehrle
JamesGross
inproceedings
2015-ziegeldorf-dpm-comparison
Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper)
2015
9
22
9481
226-234
fileadmin/papers/2015/2015-ziegeldorf-dpm-cbp.pdf
Online
Springer
Lecture Notes in Computer Science
The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria
en
978-3-319-29882-5
10.1007/978-3-319-29883-2_15
1
Jan HenrikZiegeldorf
MartinHenze
RenéHummen
KlausWehrle
inproceedings
2015-gerdes-authorization
Autorisierungsmanagement für das Internet of Things
2015
9
iotsec
Online
D•A•CH Security 2015
Sankt Augustin, Germany
D•A•CH Security 2015
08.09. - 09.09.2015
accepted
de
1
StefanieGerdes
RenéHummen
OlafBergmann
inproceedings
2015-schmidt-santa
Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]
2015
8
19
ssiclops
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-sigcomm-santa.pdf
Online
ACM
Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom
London, United Kingdom
43rd ACM SIGCOMM Conference (SIGCOMM '15)
17–21 August, 2015
en
10.1145/2785956.2790014
1
FlorianSchmidt
OliverHohlfeld
RenéGlebke
KlausWehrle
techreport
2015-draft-moskowitz-hip-dex-04
HIP Diet EXchange (DEX)
2015
7
20
draft-moskowitz-hip-dex-04
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-04
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
inproceedings
2015-ahfe-kowalewski-facebook
Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany
Procedia Manufacturing
2015
7
3
815--822
Elsevier
The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA
en
2351-9789
10.1016/j.promfg.2015.07.336
1
SylviaKowalewski
MartinaZiefle
Jan HenrikZiegeldorf
KlausWehrle
phdthesis
2015-hummen-resource-conscious
Resource-Conscious Network Security for the IP-Based Internet of Things
2015
6
30
iot
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-hummen-phd-thesis.pdf
Shaker Verlag
Aachen, Germany
Reports on Communications and Distributed Systems
11
RWTH Aachen University
Chair of Communication and Distributed Systems
Ph.D. Thesis
978-3-8440-3755-5
RenéHummen
inproceedings
2015-wirtz-secon
Enabling Ubiquitous Interaction with Smart Things
2015
6
24
256-264
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-wirtz-secon-stif.pdf
http://www.comsys.rwth-aachen.de/short/secon15-stif
Online
IEEE
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA
Seattle, USA
12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015)
22.06.2015 - 25.06.2015
en
10.1109/SAHCN.2015.7338324
1
HannoWirtz
JanRüth
MartinSerror
TorstenZimmermann
KlausWehrle
techreport
2015-draft-moskowitz-hip-dex-03
HIP Diet EXchange (DEX)
2015
6
19
draft-moskowitz-hip-dex-03
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-03
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
inproceedings
2015-wowmom-schumacher-warpsim
WARPsim: A Code-Transparent Network Simulator for WARP Devices
2015
6
14
cps,koi
file:1688
IEEE
online
16th IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks: Demos (IEEE WoWMoM 2015 - Demos), Boston, USA
Boston, USA
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
14.-17. June 2015
10.1109/WoWMoM.2015.7158181
1
AndreasSchumacher
MartinSerror
ChristianDombrowski
JamesGross
inproceedings
2015-stoffers-pads-data-deps
Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation
2015
6
10
73-74
horizon
http://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-stoffers-pads-data-deps.pdf
Online
ACM
New York, NY
Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom
London, United Kingdom
en
10.1145/2769458.2769487
1
MirkoStoffers
TorstenSehy
JamesGross
KlausWehrle
inproceedings
2015-bitsch-phealth-piap
Psychologist in a Pocket: Towards Depression Screening on Mobile Phones
2015
6
2
211
153 --159
Depression is the most prevalent clinical disorder and one of the main causes of disability. This makes early detection of depressive symptoms critical in its prevention and management. This paper presents and discusses the development of Psychologist in a Pocket (PiaP), a mental mHealth application for Android which screens and monitors for these symptoms, and–given the explicit permission of the user–alerts a trusted contact such as the mental health professional or a close friend, if it detects symptoms.
All text inputted electronically–such as short message services, emails, social network posts–is analyzed based on keywords related to depression based on DSM-5 and ICD criteria as well as Beck's Cognitive Theory of Depression and the Self-Focus Model. Data evaluation and collection happen in the background, on- device, without requiring any user involvement. Currently, the application is in an early prototype phase entering initial clinical validation.
fileadmin/papers/2015/2015-bitsch-phealth-piap.pdf
Print
Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin
IOS Press
Amsterdam
Studies in Health Technology and Informatics
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
Västerås, Sweden
12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
June 2-4, 2015
en
978-1-61499-515-9
0926-9630
10.3233/978-1-61499-516-6-153
1
Jó AgilaBitsch Link
RoannRamos
TimIx
Paula GlendaFerrer Cheng
KlausWehrle
inproceedings
2015-bitsch-phealth-brain
Towards Brain Research in a Pocket:
Bringing EEG Research and Diagnostics out of the Lab
2015
6
2
211
185 -- 190
Bringing brain research tools like EEG devices out of the lab into the pockets of practitioners and researchers may fundamentally change the way we perform diagnostics and research. While most of the current techniques are limited to research clinics and require excessive set-up, new consumer EEG devices connected to standard, off-the-shelf mobile devices allow us to lift these limitations. This allows neuropsychological assessment and research in mobile settings, possibly even in remote areas with limited accessibility and infrastructure, thus bringing the equip- ment to the patient, instead of bringing the patient to the equipment.
We are developing an Android based mobile framework to perform EEG studies. By connecting a mobile consumer EEG headset directly to an unmodified mobile device, presenting auditory and visual stimuli, as well as user interaction, we create a self-contained experimental plat- form. We complement this platform by a toolkit for immediate evalua- tion of the recorded data directly on the device, even without internet connectivity. Initial results from the replication of two Event Related Potentials studies indicate the feasibility of the approach.
fileadmin/papers/2015/2015-bitsch-phealth-brain.pdf
Print
Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin
IOS Press
Amsterdam
Studies in Health Technology and Informatics
Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
Västerås, Sweden
12th International Conference on Wearable Micro and Nano Technologies for Personalized Health
June 2-4, 2015
en
978-1-61499-515-9
0926-9630
10.3233/978-1-61499-516-6-185
1
Jó AgilaBitsch Link
RoannRamos
CassandraSeverijns
KlausWehrle
inproceedings
2015-ziegeldorf-iwpe-comparison
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
2015
5
21
198-205
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-iwpe-choose.pdf
Online
IEEE
2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA
en
10.1109/SPW.2015.9
1
Jan HenrikZiegeldorf
JanMetzke
MartinHenze
KlausWehrle
inproceedings
Dombrowski2015EW
EchoRing: A Low-Latency, Reliable Token-Passing MAC Protocol for Wireless Industrial Networks
2015
5
20
Spurred by recent industrial trends, such as factory automation or phase synchronization in the smart grid, there is a significant interest for wireless industrial networks lately. In contrast to traditional applications, the focus is on carrying out communication at very short latencies together with high reliabilities. Meeting such extreme requirements with wireless networks is challenging. A potential candidate for such a network is a token-passing protocol, as it allows to bound latencies. However, it lacks mechanisms to cope with the dynamics of wireless channels. In this paper, we present EchoRing, a novel wireless token-passing protocol. Cooperative communication and an improved fault tolerance allow this decentralized protocol to support industrial applications over wireless networks. Based on experimental results, we demonstrate the suitability of EchoRing to support demands of industrial applications. EchoRing outperforms other schemes by several orders of magnitude in terms of reliability for latencies of and below 10ms.
Protocols and architectures for wireless networks; Testbeds and experimental wireless systems; Reliability: robust and dependable wireless systems
cps,hodrian
IEEE
Proc. of 21st European Wireless Conference (EW15)
Budapest, Hungary
European Wireless Conference (EW)
20/05/2015
978-3-8007-3976-9
ChristianDombrowski
JamesGross
inproceedings
virtualcoordinate_li_lin_stoffers_gross_2015
Channel-Aware Virtual Coordinates Assignment Protocol and Routing in Multi-Hop Cognitive Radio Network
2015
5
20
http://dl.ifip.org/db/conf/networking/networking2015/1570067591.pdf
Online
IFIP
Laxenburg, Austria
Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France
Toulouse, France
en
10.1109/IFIPNetworking.2015.7145337
1
DiLi
ZhichaoLin
MirkoStoffers
JamesGross
proceedings
2015-sdnflex-heuschkel-dyns
Protocol Virtualization through Dynamic Network Stacks
2015
3
9
IEEE
Cottbus
SDNFlex Workshop (NetSys 2015)
March 2015, 9-12
en
10.1109/NetSys.2015.7089055
1
JensHeuschkel
ImmanuelSchweizer
TorstenZimmermann
KlausWehrle
MaxMühlhäuser
inproceedings
Dombrowski2015NetSys
EchoRing: Meeting Hard Real-Time Constraints with Decentralized Wireless Networks
2015
3
9
1--3
cps,hodrian
http://www.netsys2015.com/wp-content/uploads/NetSys2015_Demo_Dombrowski.pdf
http://www.netsys2015.com/program/demonstrations/
http://www.netsys2015.com/communication-software-awards/
2nd Place Regular Demonstrations
IEEE
Proc. of 2nd International Conference on Networked Systems, Demonstrations (NetSys15)
Cottbus, Germany
Conference on Networked Systems (NetSys) - Demo Session
09/03/2015
1
ChristianDombrowski
JamesGross
inproceedings
2014-ziegeldorf-codaspy-coinparty
CoinParty: Secure Multi-Party Mixing of Bitcoins
2015
3
2
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-ziegeldorf-codaspy-coinparty.pdf
Online
ACM
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
San Antonio, TX, USA
The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015)
en
978-1-4503-3191-3
10.1145/2699026.2699100
1
Jan HenrikZiegeldorf
FredGrossmann
MartinHenze
NicolasInden
KlausWehrle
inproceedings
2015-ewsn-schmidt-canttaketheheat
If You Can't Take The Heat: Temperature Effects On Low-Power Wireless Networks And How To Mitigate Them
2015
2
10
https://www.comsys.rwth-aachen.de/fileadmin/papers/2015/2015-schmidt-ewsn-canttaketheheat.pdf
Online
Springer
Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal
Porto, Portugal
12th European Conference on Wireless Sensor Networks (EWSN 2015)
9-11 February, 2015
en
978-3-319-15581-4
10.1007/978-3-319-15582-1_19
1
FlorianSchmidt
MatteoCeriotti
NiklasHauser
KlausWehrle
phdthesis
2015-wirtz-d2d-networking
The Feasibility, Semantics, and Scope of Mobile Wireless Device-to-Device Networking
2015
1
30
Shaker Verlag
Aachen, Germany
Reports on Communications and Distributed Systems
9
RWTH Aachen University
Chair of Communication and Distributed Systems
Ph.D. Thesis
978-3-8440-3367-0
HannoWirtz
proceedings
2015-Jakobs-EURAS-Book
The Role of Standards in Transatlantic Trade and Regulation. Proc. 20th EURAS Annual Standardisation Conference. EURAS contributions to standardisation research, vol. 9.
2015
Online
Mainz Publishers
978-3-95886-035-3
1
KatrineBergh Skriver
KaiJakobs
JesperJerlang
inproceedings
2015-Jakobs-EuroMed
Corporate ICT Standardisation Management – Lessons from the Literature and from Case Studies
2015
Online
EuroMed Press
Proc. 7th Annual Conference of the EuroMed Academy of Business, 2015, Verona, Italy
EN
1
KaiJakobs
inproceedings
2015-Jakobs-Euras-paper
Standardisation Management – Some Lessons to be Learnt
2015
175-190
Online
Mainz Publishers
Proc. 20th EURAS Annual Standardisation Conference, 2015, Copenhagen, Denmark.
EN
1
KaiJakobs
phdthesis
2015-hummen-phdthesis
Resource-Conscious Network Security for the IP-Based Internet of Things
2015
RWTH Aachen University
RenéHummen
phdthesis
2015-punal-phdthesis
Optimizing 802.11 Wireless Communications with Machine Learning
2015
RWTH Aachen University
OscarPuñal
phdthesis
2015-schimdt-phdthesis
Heuristic Header Error Recovery for Corrupted Network Packets
2015
RWTH Aachen University
FlorianSchmidt