- Multi-Agent Systems and Negotiation
- Recommender Systems and Techniques
- Service-Oriented Architecture and Web Services
- Smart Grid Energy Management
- Mobile Agent-Based Network Management
- Network Security and Intrusion Detection
- Context-Aware Activity Recognition Systems
- Semantic Web and Ontologies
- Advanced Malware Detection Techniques
- Peer-to-Peer Network Technologies
- Electric Vehicles and Infrastructure
- Usability and User Interface Design
- Advanced Software Engineering Methodologies
- Business Process Modeling and Analysis
- Topic Modeling
- Anomaly Detection Techniques and Applications
- Transportation and Mobility Innovations
- Energy Load and Power Forecasting
- Data Management and Algorithms
- Electric Power System Optimization
- Wireless Networks and Protocols
- Complex Network Analysis Techniques
- Model-Driven Software Engineering Techniques
- Speech and dialogue systems
- IoT and Edge/Fog Computing
Technische Universität Berlin
2016-2025
Intel (United States)
2020
Fraunhofer Institute for Production Systems and Design Technology
2009-2015
Deutsche Telekom (Germany)
2014
Dallas County
2013
Freie Universität Berlin
2007-2012
Intel (Germany)
2010
First Technical University
2007
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging features mobile devices give opportunity to threats. Android is one the newer operating systems targeting smartphones. While being based on a Linux kernel, has unique properties specific limitations due its nature. This makes it harder detect react upon malware attacks if using conventional techniques. In this paper,...
Previous chapter Next Full AccessProceedings Proceedings of the 2010 SIAM International Conference on Data Mining (SDM)Spectral Analysis Signed Graphs for Clustering, Prediction and VisualizationJérôme Kunegis, Stephan Schmidt, Andreas Lommatzsch, Jürgen Lerner, Ernesto W. De Luca, Sahin AlbayrakJérôme Albayrakpp.559 - 570Chapter DOI:https://doi.org/10.1137/1.9781611972801.49PDFBibTexSections ToolsAdd to favoritesExport CitationTrack CitationsEmail SectionsAboutAbstract We study application...
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone currently limited signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new unknown creating a window of opportunity for attackers. As smartphones become host sensitive data applications, extended malware detection mechanisms necessary complying the corresponding resource constraints. The...
Information and communication technologies (ICTs) have a profound impact on the current state envisioned future of automobiles. This paper presents an overview research ICT-based support assistance services for safety connected vehicles. A general classification brief description focus areas development in this direction are given under titles vehicle detection, road lane pedestrian drowsiness collision avoidance. Following taxonomy reviewed articles, categorized literature survey critical...
In the last decade, smartphones have gained widespread usage. Since advent of online application stores, hundreds thousands applications become instantly available to millions smart-phone users. Within Android ecosystem, security is governed by digital signatures and a list coarse-grained permissions. However, this mechanism not fine-grained enough provide user with sufficient means control applications' activities. Abuse highly sensible private information such as phone numbers without...
Collaborative filtering recommender systems often use nearest neighbor methods to identify candidate items. In this paper we present an inverted neighborhood model, k-Furthest Neighbors, less ordinary neighborhoods for the purpose of creating more diverse recommendations. The approach is evaluated two-fold, once in a traditional information retrieval evaluation setting where model trained and validated on split train/test set, through online user study (N=132) users' perceived quality...
Internet services are important part of daily activities for most us. These come with sophisticated authentication requirements which may not be handled by average users. The management secure passwords example creates an extra overhead is often neglected due to usability reasons. Furthermore, password-based approaches applicable only initial logins and do protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior...
Abstract The future of driving is autonomous. It requires a comprehensive stack embedded software components, enabled by open-source and proprietary platforms at different abstraction layers, then operating within larger ecosystem. Autonomous demands connectivity, cooperation automation to form the cornerstone autonomous mobility solutions. Platform economy principles have revolutionized way we produce, deliver consume products services worldwide. More more businesses in field transport...
Collaborative tagging services (folksonomies) have been among the stars of Web 2.0 era. They allow their users to label diverse resources with freely chosen keywords (tags). Our studies two real-world folksonomies unveil that individual develop highly personalized vocabularies tags. While these meet needs and preferences, considerable differences between personal tag (personomies) impede such as social search or customized recommendation. In this paper, we introduce a novel user-centric...
Smartphones started being targets for malware in June 2004 while count increased steadily until the introduction of a mandatory application signing mechanism Symbian OS 2006. From this point on, only few news could be read on topic. Even despite new emerging smartphone platforms, e.g. android and iPhone, writers seemed to lose interest writing smartphones giving users an unappropriate feeling safety. In paper, we revisit evolution completing appearance list end 2008. For contributing...
Automatic recognition of cardiac arrhythmias is important for diagnosis abnormalities. This paper presents a new approach to classification ECG signals based on feature extraction diagnose heartbeat irregularities. We introduce the independent component analysis (ICA) method and propose an over-complete combining ICA basis function's coefficients wavelet transform coefficients. A set relevant features are selected from entire overcomplete using selection method. The used trained support...
Nowadays we are faced with fast growing and permanently evolving data, including social networks sensor data recorded from smart phones or vehicles. Temporally brings a lot of new challenges to the mining machine learning community. This paper is concerned recognition recurring patterns within multivariate time series, which capture evolution multiple parameters over certain period time.
The radical increase in the popularity of electric vehicles (EVs) has turn increased number associated problems. Long waiting times at charging stations are a major barrier to widespread adoption EVs. Therefore, battery swapping (BSSs) an efficient solution that considers short and healthy recharging cycles for systems. Moreover, have emerged as great opportunity not only EVs, but also power systems, with regulation services can be provided grid particularly small networks, such microgrid...
Background: With urban logistics facing challenges such as high delivery volumes and driver shortages, autonomous driving emerges a promising solution. However, the integration of vans robots into existing fulfillment processes platforms remains largely unexplored. Method: This paper addresses this gap by developing piloting comprehensive blueprint architecture tailored for mobility in last-mile delivery. The proposed framework integrates vehicle operations, data processing, stakeholder...
article Share on Agent-based telematic services and telecom applications Authors: Stefan Fricke Technical Univ. of Berlin, Berlin BerlinView Profile , Karsten Bsufka Jan Keiser Torge Schmidt Ralf Sesseler Sahin Albayrak Authors Info & Claims Communications the ACMVolume 44Issue 4April 2001 pp 43–48https://doi.org/10.1145/367211.367251Published:01 April 2001Publication History 55citation1,301DownloadsMetricsTotal Citations55Total Downloads1,301Last 12 Months36Last 6 weeks1 Get Citation...
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most them still target Symbian OS. In the case OS, application signing seemed to be an appropriate measure slowing down malware appearance. Unfortunately, latest examples showed that can bypassed resulting in new outbreak. this...
Since gestures are one of the natural interaction modalities between humans they also represent a promising modality for human computer interaction. Finger rings provide an unobtrusive way to detect hand and finger if able large variety involving hands multiple fingers. One method that could be used such with single ring is electric field sensing. In this paper we present early prototype, called eRing, which uses evaluate its capability different finger- hand-gestures via user study.
News organizations employ personalized recommenders to target news articles specific readers and thus foster engagement. Existing approaches rely on extensive user profiles. However frequently possible, rarely authenticate themselves publishers' websites. This paper proposes an approach for such cases. It provides a basic degree of personalization while complying with the key characteristics recommendation including popularity, recency, dynamics reading behavior. We extend existing research...
We propose an architecture as a robot»s decision-making mechanism to anticipate human»s state of mind, and so plan accordingly during human-robot collaboration task. At the core lies novel stochastic that implements partially observable Markov decision process anticipating mind in two-stages. In first stage it anticipates task related availability, intent (motivation), capability collaboration. second, further reasons about these states true need for help. Our contribution ability our model...