Benjamin Schiller

ORCID: 0000-0002-1175-4727
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Natural Language Processing Techniques
  • Software Engineering Research
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Advanced Graph Neural Networks
  • University-Industry-Government Innovation Models
  • Misinformation and Its Impacts
  • Higher Education Governance and Development
  • Complex Network Analysis Techniques
  • Sentiment Analysis and Opinion Mining
  • Advanced Text Analysis Techniques
  • Privacy-Preserving Technologies in Data
  • Mobile Crowdsensing and Crowdsourcing
  • Privacy, Security, and Data Protection
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Organizational Strategy and Culture
  • Graph Theory and Algorithms
  • Service-Oriented Architecture and Web Services
  • Innovation, Technology, and Society
  • Additive Manufacturing Materials and Processes
  • Molecular Communication and Nanonetworks
  • Topological and Geometric Data Analysis
  • Corporate Management and Leadership

Friedrich-Alexander-Universität Erlangen-Nürnberg
2022

Technical University of Darmstadt
2010-2021

TU Dortmund University
2020

Ubiquitous Energy (United States)
2018-2019

TU Dresden
2019

Laboratoire d'Informatique de Paris-Nord
2018

The Fact Extraction and VERification (FEVER) shared task was launched to support the development of systems able verify claims by extracting supporting or refuting facts from raw text. organizers provide a large-scale dataset for consecutive steps involved in claim verification, particular, document retrieval, fact extraction, classification. In this paper, we present our verification pipeline approach, which, according preliminary results, scored third task, out 23 competing systems. For...

10.18653/v1/w18-5516 article EN cc-by 2018-01-01

We experiment with two recent contextualized word embedding methods (ELMo and BERT) in the context of open-domain argument search. For first time, we show how to leverage power embeddings classify cluster topic-dependent arguments, achieving impressive results on both tasks across multiple datasets. classification, improve state-of-the-art for UKP Sentential Argument Mining Corpus by 20.8 percentage points IBM Debater - Evidence Sentences dataset 7.4 points. understudied task clustering,...

10.18653/v1/p19-1054 article EN cc-by 2019-01-01

Argument mining is a core technology for automating argument search in large document collections. Despite its usefulness this task, most current approaches are designed use only with specific text types and fall short when applied to heterogeneous texts. In paper, we propose new sentential annotation scheme that reliably applicable by crowd workers arbitrary Web We source annotations over 25,000 instances covering eight controversial topics. show integrating topic information into...

10.18653/v1/d18-1402 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2018-01-01

Christian Stab, Johannes Daxenberger, Chris Stahlhut, Tristan Miller, Benjamin Schiller, Christopher Tauchmann, Steffen Eger, Iryna Gurevych. Proceedings of the 2018 Conference North American Chapter Association for Computational Linguistics: Demonstrations. 2018.

10.18653/v1/n18-5005 article EN cc-by 2018-01-01

Abstract Stance detection (StD) aims to detect an author’s stance towards a certain topic and has become key component in applications like fake news detection, claim validation, or argument search. However, while is easily detected by humans, machine learning (ML) models are clearly falling short of this task. Given the major differences dataset sizes framing StD (e.g. number classes inputs), ML trained on single usually generalize poorly other domains. Hence, we introduce benchmark that...

10.1007/s13218-021-00714-w article EN cc-by KI - Künstliche Intelligenz 2021-03-26

Benjamin Schiller, Johannes Daxenberger, Iryna Gurevych. Proceedings of the 2021 Conference North American Chapter Association for Computational Linguistics: Human Language Technologies. 2021.

10.18653/v1/2021.naacl-main.34 article EN cc-by Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2021-01-01

Molecular communication presents a new approach for data transmission between miniaturised devices, especially in the context of medical applications. A link is established using molecules, or other particles nanoscale, to modulate information. Due lack changing physical parameters, information channel often cannot be modelled accurately. Deep Learning provides solution receive transmitted sequence without need an analytical description channel. We present proof-of-concept application...

10.1109/ismict56646.2022.9828263 article EN 2022-05-02

Abstract The ArgumenText project creates argument mining technology for big and heterogeneous data aims to evaluate its use in real-world applications. mines clusters arguments from a variety of textual sources large range topics multiple languages. Its main strength is generalization very different including web crawls, news data, or customer reviews. We validated the with focus on supporting decisions innovation management as well feedback analysis. Along public search engine API, has...

10.1007/s13222-020-00347-7 article EN cc-by Datenbank-Spektrum 2020-06-16

Concise and reliable graph-theoretic analysis of complex networks today is a cumbersome task, consisting essentially the adaptation intricate libraries for each specific problem instance. The growing number metrics that have been proposed in last years, which mainly gain significance due to increasing computational capabilities at hand, led important new insights field. However, they solely implemented as single algorithms, specialized purpose calculating exactly targeted metric selected...

10.1145/1878537.1878653 article EN 2010-04-11

Self-certifying names provide the property that any entity in a distributed system can verify binding between corresponding public key and self-certifying name without relying on trusted third party. However, lack with real-world identity. In this demonstration, we present implementation of concrete mechanism for using Web-of-Trust conjunction to missing binding. Our prototype runs Android devices demonstrates decentralised message authentication scheme kind content-oriented architecture....

10.1145/2660129.2660130 article EN 2014-09-23

Routing in complex networks is increasingly optimized towards situation and properties of the underlying network. Quick hypothesis testing with respect to performance different strategies, however, posing be an unnecessarily complicated task. To this end we propose GTNA-2, enhanced second version Graph-Theoretic Network Analyzer. Based on broadly used GTNA, it allows both for efficient simple analysis a large set graph metrics, but additionally has been extended support rapid prototyping...

10.5555/2557696.2557722 article EN Summer Computer Simulation Conference 2013-07-07

The purpose of this article is to understand how Triple Helix linkages foster study program innovation at the micro-level and entrepreneurial university shapes support structures processes meso-level. We draw on case cooperative programs from a German applied sciences. selected business administration nursing as two different disciplinary examples. Cooperative are delivered partly in industry illustrate hybridity that knowledge transfer university. Our draws semi-structured interviews with...

10.1163/21971927-bja10002 article EN cc-by Triple Helix Journal 2020-03-05

Content-Centric Networking (CCN) promises to yield large efficiency gains for Internet content distribution. Its autonomous cache management, however, raises doubts about achieving the intended goals optimally. A coordinated based on timely usage information, will help fully leverage efficiency. In this poster we introduce CoMon, a system architecture that implements Coordinated caching Monitoring of and its stability. CoMon aims at improving CCN with low monitoring communication overheads.

10.1109/infcomw.2014.6849231 article EN 2014-04-01

With the rise of online social networks and other highly dynamic system, need for analysis their structural properties has grown in last years. While re-computation graph-theoretic metrics is feasible investigating a small set static system snapshots, this approach unfit application systems where we aim at frequent property updates. Based on concept data streams, new algorithms have been developed that update computed based changes instead recomputing them regularly.While there exists...

10.5555/2557696.2557750 article EN Summer Computer Simulation Conference 2013-07-07

10.18653/v1/2024.emnlp-main.608 article EN Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2024-01-01

Using Peer-to-Peer technology to deliver live video streams mobile devices is a promising approach. It allows service providers scale their distribution without increasing cost. As the resources are replicated at edge of network, can take advantage close-by peers in order get required data faster. This, however, challenging due highly dynamic nature participating devices. Hence, overlay needs adapt quickly changes available bandwidth as well location peers. Also, it should be resilient...

10.1109/percomw.2014.6815187 article EN 2014-03-01

Most tasks in NLP require labeled data. Data labeling is often done on crowdsourcing platforms due to scalability reasons. However, publishing data public can only be if no privacy-relevant information included. Textual contains sensitive like person names or locations. In this work, we investigate how removing personally identifiable (PII) as well applying differential privacy (DP) rewriting enable text with used for crowdsourcing. We find that DP-rewriting before preserve while still...

10.18653/v1/2023.law-1.8 article EN cc-by 2023-01-01

Decision-making tasks usually follow five steps: identifying the problem, collecting data, extracting evidence, iden-tifying arguments, and making decision. This paper focuses on two steps of decision-making: evidence by building knowledge graphs (KGs) specialized topics sentences' arguments through sentence-level argument mining. We present a hybrid model that combines topic modeling using latent Dirichlet allocation (LDA) word embeddings to obtain external from structured unstructured...

10.1109/ickg52313.2021.00049 article EN 2021-12-01

Decision-making usually takes five steps: identifying the problem, collecting data, extracting evidence, pro and con arguments, making decisions. Focusing on this paper presents a hybrid model that combines latent Dirichlet allocation word embeddings to obtain external knowledge from structured unstructured data. We study task of sentence-level argument mining, as arguments mostly require some degree world be identified understood. Given topic sentence, goal is classify whether sentence...

10.48550/arxiv.2102.02086 preprint EN cc-by-nc-sa arXiv (Cornell University) 2021-01-01
Coming Soon ...