Marten Fischer

ORCID: 0000-0003-3107-6465
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Data Management and Algorithms
  • Distributed systems and fault tolerance
  • Time Series Analysis and Forecasting
  • Service-Oriented Architecture and Web Services
  • Software System Performance and Reliability
  • Cryptography and Data Security
  • Anomaly Detection Techniques and Applications
  • Data Stream Mining Techniques
  • Cooperative Studies and Economics
  • Software Testing and Debugging Techniques
  • Smart Grid Security and Resilience
  • RFID technology advancements
  • Advanced Authentication Protocols Security
  • Traffic Prediction and Management Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • User Authentication and Security Systems
  • Caching and Content Delivery
  • Smart Grid Energy Management
  • Human Mobility and Location-Based Analysis
  • Scheduling and Optimization Algorithms
  • Complexity and Algorithms in Graphs
  • AI in Service Interactions
  • Energy Efficient Wireless Sensor Networks

Hochschule Osnabrück
2011-2023

Osnabrück University
2014-2023

Rigshospitalet
1999

Our world and our lives are changing in many ways. Communication, networking, computing technologies among the most influential enablers that shape today. Digital data connected worlds of physical objects, people, devices rapidly way we work, travel, socialize, interact with surroundings, they have a profound impact on different domains, such as healthcare, environmental monitoring, urban systems, control management applications, several other areas. Cities currently face an increasing...

10.1109/access.2016.2541999 article EN cc-by-nc-nd IEEE Access 2016-01-01

An increasing number of cities are confronted with challenges resulting from the rapid urbanization and new demands that a rapidly growing digital economy imposes on current applications information systems. Smart city enable authorities to monitor, manage, provide plans for public resources infrastructures in environments, while offering citizens businesses develop use intelligent services cities. However, providing such smart gives rise several issues, as semantic heterogeneity...

10.1109/jiot.2018.2872606 article EN IEEE Internet of Things Journal 2018-09-28

Hyperledger Fabric is currently one of the most popular business Blockchain platforms. With its included functionality executing custom smart contracts, has become widely used frameworks, e.g. for industry 4.0 applications. Though, applications require a previously known data throughput. For potentially interested developer, it not trivial to decide, whether given network configuration will meet required expectations in regards performance. Thus this work shows performance analysis v2.0 and...

10.1145/3417310.3431398 article EN 2020-11-07

Since the introduction of first cryptocurrency, Bitcoin, in 2008, gain popularity distributed ledger technologies (DLTs) has led to an increasing demand and, consequently, a larger number network participants general. Scaling blockchain-based solutions cope with several thousand transactions per second or growing nodes always been desirable goal for most developers. Enabling these performance metrics can lead further acceptance DLTs and even faster systems With directed acyclic graphs (DAGs)...

10.3390/computers12120257 article EN cc-by Computers 2023-12-09

Due to the rapid development of Internet Things (IoT) and consequently, availability more IoT data sources, mechanisms for searching integrating sources become essential leverage all relevant improving processes services. This paper presents search framework IoTCrawler. The IoTCrawler is not only another framework, it a system systems which connects existing solutions offer interoperability overcome fragmentation. In addition its domain-independent design, features layered approach, offering...

10.3390/s21051559 article EN cc-by Sensors 2021-02-24

The Internet of Things (IoT) offers an incredible innovation potential for developing smarter applications and services. However, today we see solutions in the development vertical services reflecting what used to be early days Web, leading fragmentation intra-nets Things. To achieve open IoT ecosystem systems platforms, several key enablers are needed effective, adaptive scalable mechanisms exploring discovering resources their data/capabilities. This paper discusses our work EU H2020...

10.1109/giots.2018.8534528 article EN 2018-06-01

The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order provide IoT services. readings are shared with multiple entities, such as services, other or third parties. collected data may be sensitive and include personal information. To protect the privacy users, needs protected through an encryption algorithm. For sharing cryptographic cipher-texts a group users Attribute-Based Encryption (ABE) is well suited, it does not require create keys. However,...

10.1109/percomw.2019.8730784 article EN 2019-03-01

The Internet of Things (IoT) is growing rapidly as more and household appliances, sensors actuators are connected to the internet communicate with each other. Because these IoT devices usually have only limited processing communication capabilities, an efficient protocol required reduce overhead. Message Queue Telemetry Transport (MQTT) provides such properties. MQTT a publish/subscribe protocol, where client can subscribe message topic in order receive all messages published under that...

10.1109/giots.2019.8766366 article EN 2019-06-01

For efficient analysis of large smart city data sets in (real) time a knowledge-based approach is suggested, constraining iteratively the search space while increasing accuracy by more complex computation. Results are shown for searching distance to nearest object, e.g., parking space.

10.1109/dsdis.2015.53 article EN IEEE International Conference on Data Science and Data Intensive Systems 2015-12-01

The development of context-aware applications is a difficult and error-prone task. dynamics the environmental context combined with complexity poses vast number possibilities for mistakes during creation new applications. Therefore it important to test before they are deployed in life system. For this reason, paper proposes testing tool, which will allow automatic generation various cases from application description documents. Semantic annotations used create specific data A case reduction...

10.1109/vtcfall.2015.7390847 article EN 2015-09-01

The provisioning of value-added services in next generation networks (NGN) is a very difficult and error-prone task. Various service architectures combined with the complexity protocols for NGN poses vast number possibilities mistakes during development new services. Therefore it important to test before they are deployed life system. For this reason, paper proposes Test Creation Environment (TCE), which will allow automatically generate various cases TTCN-3 (Testing Control Notation Version...

10.1109/etfa.2011.6059234 article EN 2011-09-01

Software testing is the most important and time-and cost consuming part in software development process. According to [10] about 50% of resources a project are spent for testing. Often, research activities, with goal automatise this process, cover only generation test cases their execution. The topic generating meaningful data often left out. Approaches based on analysis source code exist, but inapplicable perform black-box or message-based services more complex types. Thus, usually gathered...

10.1109/etfa.2012.6489789 article EN 2012-09-01

The Near Field Communication (NFC) technology has experienced a steep rise in popularity due to new advances contactless payment or virtual public transport tickets on mobile devices. Though, NFC can also be used exchange arbitrary data between two devices within close distance. This aspect is inherently useful prove physical access, e.g. during authentication. Modern wireless technologies such as Wi-Fi Bluetooth 5.0 use for their pairing schemes. However, there does not exist any approach...

10.1109/wf-iot51360.2021.9595145 article EN 2021-06-14

Reliable information processing is an indispensable task in Smart City environments. Heterogeneous sensor infrastructures of individual providers and data portal vendors tend to offer a hardly revisable quality. This paper proposes correlation model-based monitoring approach evaluate the plausibility smart city sources. The model based on spatial, temporal, domain dependent correlations between A set freely available datasets used component show challenges different spatial temporal resolutions.

10.1109/wf-iot.2016.7845441 article EN 2016-12-01

This paper presents a framework for processing the data generated by Smart City sensors and IoT streams in real-time. The scope of is to detect various event patterns from raw data. extensible because at any moment new sources can be registered or specific detection mechanism deployed. offers HTTP interface which used provide details about each stream. In order connect heterogeneous source end points fetching observations concept simple adaptable wrappers introduced. Having into framework,...

10.1109/icdmw.2016.0016 article EN 2016-12-01

The Industry 4.0 is offering novel opportunities for large enterprises or even small and medium (SME) to digitize also simplify their existing production workflows. With the uprise of Distributed Ledger Technology (DLT), receives new possibilities set up a more secure, redundant decentralized data infrastructure. Existing database systems can be exchanged with Blockchain systems, thus making use its inherent immutability. Popular open-source frameworks such as Hyperledger Fabric offer...

10.1109/iaict52856.2021.9532547 article EN 2021-07-27

The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows connection digital services with entities physical world. These are devices different sizes ranging from large machinery to tiny sensors. In latter case, typically characterized by limited resources terms computational power, available memory and sometimes power supply. As a consequence, use security algorithms requires them work within resources. This means find suitable implementation...

10.1145/3616391.3622764 article EN 2023-10-29
Coming Soon ...