Klaus Wehrle

Klaus Wehrle

Head of Group

Ahornstraße 55, building E3 52074 Aachen Germany
9011
klaus.wehrle@comsys.rwth-aachen.de
(+49) 241 80-21402

Biography

Klaus Wehrle is Professor of Computer Science and Head of the Communication and Distributed Systems Group (Informatik 4) at RWTH Aachen University. He received his diploma (1999) and his doctorate (Dr.-Ing., 2002) from the University of Karlsruhe (now KIT), both with distinction. His doctoral thesis on flexible and scalable Quality of Service mechanisms for the next generation Internet was awarded the Doctoral Dissertation Prize of Südwestmetall and the FZI Doctoral Dissertation Prize (Research Center for Information Technology, FZI).

In 2002 and 2003, Klaus was a postdoctoral fellow at the International Computer Science Institute at the University of California at Berkeley (UCB). In 2004, he received a DFG Emmy Noether (starting) grant to establish a junior research group on protocol engineering and distributed systems at the University of Tübingen. In 2006 he joined RWTH Aachen University as an associate professor, since 2010 as a full professor. From 2019 to 2022 he will be acting head of the Department of Computer Science at RWTH Aachen University.

His research activities focus on (but are not limited to) the engineering of network protocols, (formal) methods for protocol engineering and network analysis, network simulation, reliable communication software, and all operating system issues of networking. His research is mainly funded by the German Research Foundation (DFG), the European Research Council (through an ERC Consolidator Grant in 2014, an ERC PoC grant in 2020 and an ERC Synergy Grant in 2025), the EU, the German government (BMBF, BMWi), the state of North Rhine-Westphalia (NRW), and industrial partners. From 2015 to 2023 he was coordinating the DFG Priority Program on Cyber-Physical Networking. He is a member of IEEE, ACM, Sigcomm, GI (Gesellschaft für Informatik), VDE and GI/ITG-Fachgruppe KuVS. He was/is a member of several evaluation boards of the Alexander-von-Humboldt Foundation and serves as an elected representative for communication systems at the German Research Foundation (DFG).

Email / Exam Policy

Exam Dates and Procedure:

Dates for oral exams are offered biweekly, every second Wednesday from 3pm till 6pm.

If you plan to do an oral exam, please follow this procedure:

reserve a slot in advance at the COMSYS office (office(at)comsys.rwth-aachen.de) with mentioning your study program and the planned lectures to be examined. We will confirm the combination subsequently. Please download our examination sheet, fill it in, and keep it till you exam date. confirm the exam slot latest four weeks ahead of your exam at the COMSYS office (office(at)comsys.rwth-aachen.de). but be sure, that you are well prepared for the exam at that time. if you plan to have an oral exam with two professors, please check first the availability of slots with the ComSys office and then find a joint date with the other examiner. Then book the final date at the ComSys office. after reserving a slot please register at ZPA (Central Exam Registry, Zentrales Prüfungsamt) for the oral exam! As for all other exams, a registration with ZPA is mandatory before the exam date. Note that on our examination sheet you have to sign that you are registered with ZPA. bring the examination sheet with you on the exam day, and hand it over to us at the beginning of the exam. For teaching related emails, please use the following mail address: teaching@comsys.rwth-aachen.de If you are looking for a second advisor (Zweitgutachter) for your Bachelor’s / Master’s thesis, please consult the following website.

For scientific, project or other research/universiy-related purposes, please use the following address: wehrle@comsys.rwth-aachen.de

Publications

GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection. Proceedings of the 34th USENIX Security Symposium (USENIX Sec), Aug 13 - Aug 15, 2025, Seattle, WA, USA. August 2025.
CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping. Proceedings of the 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P), Venice, Italy. June 2025.
Scalable Supply and Demand Matching Involving Up-to-Date Information from Individual Prosumers. Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems (ACM e-Energy). June 2025.
Slicing Match-Action Pipeline Resources for Multitenancy on Programmable Switches. 11th IEEE International Conference on Network Softwarization. June 2025.
Advancing Network Monitoring with Packet-Level Records and Selective Flow Aggregation. Proceedings of the 2025 IEEE/IFIP Network Operations and Management Symposium (NOMS ‘25), May 12 - May 16, 2025, Honolulu, HI, USA. May 2025.
ConfMod: A Simple Modeling of Confidentiality Requirements for Inter-Organizational Data Sharing. Proceedings of the 6th Workshop on Management for Industry 5.0 (MFI5.0 ‘25), May 12 - May 16, 2025, Honolulu, HI, USA. May 2025.
Congestion-Responsive Queuing for Internet Flows. Proceedings of the 2025 IEEE/IFIP Network Operations and Management Symposium (NOMS ‘25), May 12 - May 16, 2025, Honolulu, HI, USA. May 2025.
Emulating and Evaluating Transport Layer Protocols for Resilient Communication in Smart Grids. Proceedings of the 2025 IEEE/IFIP Network Operations and Management Symposium (NOMS ‘25), May 12 - May 16, 2025, Honolulu, HI, USA. May 2025.
MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps. Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing (SAC ‘25), Mar 31 - Apr 4, 2025, Catania, Italy. April 2025.
Transformer-Based Integrative Patient Representations from Single-Cell RNA Data. Learning Meaningful Representations of Life Workshop (LMRL ‘25), Apr 24 - Apr 28, 2025, Singapore, Singapore. April 2025.
Privacy-Aware Supply Chain Ratings: Interdisciplinary Research On Collaborative Supply Chain Management. Proceedings of the 7th Conference on Production Systems and Logistics (CPSL ‘25), Mar 18 - Mar 21, 2025, Lima, Peru. March 2025.
Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach. Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS ‘25), Feb 24 - Feb 28, 2025, San Diego, CA, USA. February 2025.
Use Case Analysis for Computing in the Network. Internet Research Task Force. December 2024.
Use Cases for In-Network Computing. Internet Research Task Force. December 2024.
Complementing Organizational Security in Data Ecosystems with Technical Guarantees. Proceedings of the 1st Conference on Building a Secure and Empowered Cyberspace (BuildSEC ‘24), Dec 19 - Dec 20, 2024, New Delhi, India. December 2024.
scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data. Proceedings of the 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom ‘24), Dec 17 - Dec 21, 2024, Sanya, China. December 2024.
A Critical Review of Household Water Datasets. Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou City, China. November 2024.
Investigating Domain Bias in NILM. Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2024), Hangzhou City, China. November 2024.
LUA-IoT: Let's Usably Authenticate the IoT. Proceedings of the 27th Annual International Conference on Information Security and Cryptology (ICISC ‘24), Nov 20 - Nov 22, 2024, Seoul, Korea. November 2024.
mcBERT: Patient-Level Single-cell Transcriptomics Data Representation. bioRxiv. November 2024.
Resilient Control Center to Substation Device Communication. Proceedings of the CIRED Chicago Workshop 2024 on Resilience of Electric Distribution Systems, Nov 7 - Nov 8, 2024, Chicago, IL, United States. November 2024.
Toward Technically Enforceable Consent in Healthcare Research. Research Papers of the Platform Privacy, vol. 4, Oct 17 - Oct 18, 2024, Berlin, Germany. October 2024.
Deployment Challenges of Industrial Intrusion Detection Systems. Proceedings of the 10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS ‘24), Sep 16 - Sep 20, 2024, Bydgoszcz, Poland. September 2024.
Exploring Anomaly Detection for Marine Radar Systems. Proceedings of the 10th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS ‘24), Sep 16 - Sep 20, 2024, Bydgoszcz, Poland. September 2024.
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication. 19th ACM ASIA Conference on Computer and Communications Security (ACM AsiaCCS ‘24), Jul 1 - Jul 5, 2024, Singapore, Singapore. July 2024.
Reliable and Secure Control Center to Station Device Communication. Proceedings of the CIRED workshop on Increasing Distribution Network Hosting Capacity 2024, Jun 19 - Jun 20, 2024, Vienna, Austria. June 2024.
In-Situ Model Validation for Continuous Processes Using In-Network Computing. Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS ‘24), May 12 - May 15, 2024, St. Louis, MO, USA. May 2024.
Protocol Security in the Industrial Internet of Things. Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS ‘24), May 6 - May 10, 2024, Seoul, Korea. May 2024.
SpinTrap: Catching Speeding QUIC Flows. Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS ‘24), May 6 - May 10, 2024, Seoul, Korea, Republic of. May 2024.
The Unresolved Need for Dependable Guarantees on Security, Sovereignty, and Trust in Data Ecosystems. Data & Knowledge Engineering, vol. 151. May 2024.
Unconsidered Installations: Discovering IoT Deployments in the IPv6 Internet. Proceedings of the 2024 IEEE/IFIP Network Operations and Management Symposium (NOMS ‘24), May 6 - May 10, 2024, Seoul, Korea. May 2024.
Blockchain Technology Accelerating Industry 4.0. Blockchains – A Handbook on Fundamentals, vol. 105. March 2024.
Illicit Blockchain Content – Its Different Shapes, Consequences, and Remedies. Blockchains – A Handbook on Fundamentals, vol. 105. March 2024.
Poster: Resiliente Kommunikation für die Fernwirktechnik in digitalen Umspannwerken. VDE ETG/FNN-Tutorial 2024 Schutz- und Leittechnik, Mar 5 - Mar 6, 2024, Leipzig, Germany. March 2024.
Poster: Trusted Execution Environment-basierte Sicherheit für digitale Umspannwerke. VDE ETG/FNN-Tutorial 2024 Schutz- und Leittechnik, Mar 5 - Mar 6, 2024, Leipzig, Germany. March 2024.
When and How to Aggregate Message Authentication Codes on Lossy Channels?. 22nd International Conference on Applied Cryptography and Network Security (ACNS ‘24), Mar 5 - Mar 9, 2024, Abu Dhabi, UAE. March 2024.
An Interdisciplinary Survey on Information Flows in Supply Chains. ACM Computing Surveys, vol. 56, no. 2. February 2024.
Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach. Proceedings of the 16th International Symposium on Foundations and Practice of Security (FPS ‘23), vol. 14551, Dec 11 - Dec 13, 2023, Bordeaux, France. January 2024.
Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs. IEEE Access, vol. 12. January 2024.
Offering Two-Way Privacy for Evolved Purchase Inquiries. ACM Transactions on Internet Technology, vol. 23, no. 4. November 2023.
Poster: Accountable Processing of Reported Street Problems. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS ’23), Nov 26 - Nov 30, 2023, Copenhagen, Denmark. November 2023.
Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS ’23), Nov 26 - Nov 30, 2023, Copenhagen, Denmark. November 2023.
Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘23), Nov 26 - Nov 30, 2023, Copenhagen, Denmark. November 2023.
Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation. Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ‘23), Nov 14 - Nov 17, 2023, Melbourne, VIC, Australia. November 2023.
Delay-aware Model Predictive Control for Fast Frequency Control. Proceedings of the 14th IEEE International Conference on Smart Grid Communications (SmartGridComm 2023), Oct 31 - Nov 3, 2023, Glasgow, United Kingdom. October 2023.
Does It Spin? On the Adoption and Use of QUIC’s Spin Bit. Proceedings of the Internet Measurement Conference (IMC ‘23), Montreal, Canada. October 2023.
ECN with QUIC: Challenges in the Wild. Proceedings of the Internet Measurement Conference (IMC ‘23), Montreal, Canada. October 2023.
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols. 48th IEEE Conference on Local Computer Networks (LCN), Oct 1 - Oct 5, 2023, Daytona Beach, Florida, US. October 2023.
SoK: Evaluations in Industrial Intrusion Detection Research. Journal of Systems Research, vol. 3, no. 1. October 2023.
One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection. Proceedings of the 28th European Symposium on Research in Computer Security (ESORICS ‘23), vol. 14345, Sep 25 - Sep 29, 2023, The Hague, The Netherlands. September 2023.
Terminology for Computing in the Network. Internet Research Task Force. July 2023.
FAIR Sensor Ecosystem: Long-Term (Re-)Usability of FAIR Sensor Data through Contextualization. Proceedings of the 21th IEEE International Conference on Industrial Informatics (INDIN ‘23), Jul 18 - Jul 20, 2023, Lemgo, Germany. July 2023.
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security (ASIACCS ‘23), Jul 10 - Jul 14, 2023, Melbourne, VIC, Australia. July 2023.
Designing Secure and Privacy-Preserving Information Systems for Industry Benchmarking. Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE ‘23), vol. 13901, Jun 12 - Jun 16, 2023, Zaragoza, Spain. June 2023.
Instant Messaging Meets Video Conferencing: Studying the Performance of IM Video Calls. Proceedings of the Network Traffic Measurement and Analysis Conference (TMA ‘23), Jun 26 - Jun 29, 2023, Naples, Italy. June 2023.
Use of Computation Ecosystems to Analyze the Kidney-Heart Crosstalk. Circulation research, vol. 132, no. 8. April 2023.
Evolving the Digital Industrial Infrastructure for Production: Steps Taken and the Road Ahead. Internet of Production: Fundamentals. February 2023.
Model-Based Controlling Approaches for Manufacturing Processes. Internet of Production. February 2023.
Modular Control and Services to Operate Line-less Mobile Assembly Systems. Internet of Production: Fundamentals. February 2023.
Interconnected grid protection systems - reference grid for testing an adaptive protection scheme. 27th International Conference on Electricity Distribution (CIRED 2023), Jun 12 - Jun 15, 2023, Rome, Italy. January 2023.
CUMUL & Co: High-Impact Artifacts for Website Fingerprinting Research. Cybersecurity Artifacts Competition and Impact Award at 38th Annual Computer Security Applications Conference (ACSAC ‘22), Dec 5 - Dec 9, 2022, Austin, TX, USA. December 2022.
Harnessing Cooperative Anycast Communication for Increased Resilience in Wireless Control. Proceedings of the 61st IEEE Conference on Decision and Control (CDC 2022), Dec 6 - Dec 9, 2022, Cancun, Mexico. December 2022.
Poster: Ensemble Learning for Industrial Intrusion Detection. 38th Annual Computer Security Applications Conference (ACSAC ‘22), Dec 5 - Dec 9, 2022, Austin, TX, USA. December 2022.
Evolving the End-to-End Transport Layer in Times of Emerging Computing In The Network (COIN). Proceedings of the 1st Workshop on New IP and Beyond, co-located with the 30th IEEE International Conference on Network Protocols, Oct 30 - Nov 2, 2022, Lexington, Kentucky, USA. November 2022.
Can Industrial Intrusion Detection Be SIMPLE?. Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS ‘22), vol. 978-3-031-17143-7, Sep 26 - Sep 30, 2022, Copenhagen, Denmark. September 2022.
Complying with Data Handling Requirements in Cloud Storage Systems. IEEE Transactions on Cloud Computing, vol. 10, no. 3. September 2022.
On the Need for Strong Sovereignty in Data Ecosystems. Proceedings of the 1st International Workshop on Data Ecosystems (DEco ‘22), vol. 3306, Sep 5 - Sep 5, 2022, Sydney, NSW, Australia. September 2022.
Analyzing the Influence of Resource Prioritization on HTTP/3 HOL Blocking and Performance. Proceedings of the Network Traffic Measurement and Analysis Conference (TMA ‘22), Enschede, Netherlands. June 2022.
A Computer Science Perspective on Digital Transformation in Production. ACM Transactions on Internet of Things, vol. 3, no. 2. May 2022.
A Moderation Framework for the Swift and Transparent Removal of Illicit Blockchain Content. Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC ‘22), May 2 - May 5, 2022, Shanghai, China. May 2022.
BP-MAC: Fast Authentication for Short Messages. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘22), San Antonio, Texas, USA. May 2022.
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things. Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIACCS ‘22), May 30 - Jun 3, 2022, Nagasaki, Japan. May 2022.
Scalable and Privacy-Focused Company-Centric Supply Chain Management. Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC ‘22), May 2 - May 5, 2022, Shanghai, China. May 2022.
Anomaly Detection in Maritime AIS Tracks: A Review of Recent Approaches. Journal of Marine Science and Engineering, vol. 10, no. 1. January 2022.
Interconnected network protection systems - the basis for the reliable and safe operation of distribution grids with a high penetration of renewable energies and electric vehicle. Proceedings of the CIRED workshop on E-mobility and power distribution systems 2022, Jun 2 - Jun 3, 2022, Porto, Portugal. January 2022.
Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use. Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER ‘20), Dec 8 - Dec 8, 2020, Austin, TX, USA. December 2021.
Determination of Throughput Guarantees for Processor-based SmartNICs. The 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT ‘21), Virtual Event Germany. December 2021.
Tracking the QUIC Spin Bit on Tofino. Proceedings of the 2021 Workshop on Evolution, Performance and Interoperability of QUIC (EPIQ ‘21), Virtual Event Germany. December 2021.
Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships. Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW ‘21), Nov 14 - Nov 14, 2021, Seoul, Korea. November 2021.
Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web. ACM Transactions on the Web, vol. 15, no. 4. November 2021.
POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages. Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS ‘21), Nov 15 - Nov 19, 2021, Seoul, Korea. November 2021.
Sharding and HTTP/2 Connection Reuse Revisited: Why Are There Still Redundant Connections?. Proceedings of the Internet Measurement Conference (IMC ‘21), Virtual Event. November 2021.
Transport Protocol Issues of In-Network Computing Systems. Internet Research Task Force. October 2021.
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively. IEEE Transactions on Network and Service Management, vol. 18, no. 3. September 2021.
Demo: Traffic Splitting for Tor — A Defense against Fingerprinting Attacks. Proceedings of the 2021 International Conference on Networked Systems (NetSys ‘21), Sep 13 - Sep 16, 2021, Lübeck, Germany. September 2021.
L, Q, R, and T - Which Spin Bit Cousin Is Here to Stay?. ANRW ‘21: Proceedings of the Applied Networking Research Workshop, Virtual Event. July 2021.
Data Reliability and Trustworthiness through Digital Transmission Contracts. Proceedings of the 18th Extended Semantic Web Conference (ESWC ‘21), vol. 12731, Jun 6 - Jun 10, 2021, Heraklion, Greece. June 2021.
Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing. Proceedings of the 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE), Jun 20 - Jun 23, 2021, Kyoto, Japan. June 2021.
Service-based Forwarding via Programmable Dataplanes. Proceedings of the 2021 IEEE International Conference on High Performance Switching and Routing: Workshop on Semantic Addressing and Routing for Future Networks (SARNET-21), Jun 7 - Jun 10, 2021, Paris, France. June 2021.
Blockchain-Based Privacy Preservation for Supply Chains Supporting Lightweight Multi-Hop Information Accountability. Information Processing & Management, vol. 58, no. 3. May 2021.
Holarchy for Line-less Mobile Assembly Systems Operation in the Context of the Internet of Production. Proceedings of the 14th CIRP Conference on Intelligent Computation in Manufacturing Engineering (ICME ‘20), vol. 99, Jul 14 - Jul 17, 2020, Gulf of Naples, Italy. May 2021.
Investigating the Applicability of In-Network Computing to Industrial Scenarios. Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS ‘21), May 10 - May 12, 2021, Victoria, BC, Canada. May 2021.
Tofino + P4: A Strong Compound for AQM on High-Speed Networks?. Proceedings of the International Symposium on Integrated Network Management (IM ‘21), Virtual Event. May 2021.
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems. Proceedings of the 1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS ‘21), Apr 28 - Apr 28, 2021, Virtual Event, USA. April 2021.
Insights on Data Sensitivity from the Technical, Legal and the Users' Perspectives. Computer Law Review International, vol. 22, no. 1. February 2021.
A Novel Receiver Design for Energy Packet‐Based Dispatching. Energy Technology, vol. 9, no. 2. January 2021.
Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Information Sensitivity. INFORMATIK 2020, Karlsruhe, Germany. January 2021.
Privacy-Preserving Production Process Parameter Exchange. Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC ‘20), Dec 7 - Dec 11, 2020, Austin, TX, USA. December 2020.
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking. Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC ‘20), Dec 15 - Dec 15, 2020, Virtual Event. December 2020.
Extending MUD to Smartphones. IEEE, Nov 16 - Nov 19, 2020, Sydney, Australia. November 2020.
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS ‘20), Nov 9 - Nov 13, 2020, Virtual Event, USA. November 2020.
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments. Proceedings of the Internet Measurement Conference (IMC ‘20), Oct 27 - Oct 29, 2020, Pittsburgh, PA, USA. October 2020.
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services. Proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS ‘20), Oct 5 - Oct 9, 2020, Taipei, Taiwan. October 2020.
Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Transactions on Industrial Informatics, vol. 17, no. 5. September 2020.
Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation. International Symposium on a World of Wireless, Mobile and Multimedia Networks: Workshop on Communication, Computing, and Networking in Cyber Physical Systems (WoWMoM-CCNCPS'2020), Aug 31 - Sep 3, 2020, Cork, Ireland. August 2020.
Secure End-to-End Sensing in Supply Chains. Proceedings of the 5th International Workshop on Cyber-Physical Systems Security (CPS-Sec ‘20), Jun 29 - Jul 1, 2020, Avignon, France. July 2020.
Stamping Process Modelling in an Internet of Production. Proceedings of the 8th International Conference on Through-Life Engineering Service (TESConf ‘19), vol. 49, Oct 27 - Oct 29, 2019, Cleveland, OH, USA. July 2020.
How to Securely Prune Bitcoin’s Blockchain. Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING ‘20), Jun 22 - Jun 26, 2020, Paris, France. June 2020.
Private Multi-Hop Accountability for Supply Chains. Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops ‘20), Jun 7 - Jun 11, 2020, Dublin, Ireland. June 2020.
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation. Proceedings of the 19th IFIP Networking 2020 Conference (NETWORKING ‘20), Jun 22 - Jun 26, 2020, Paris, France. June 2020.
Study on weld seam geometry control for connected gas metal arc welding systems. Proceedings of the 2020 Internal Conference on Ubiquitous Robots, Jun 22 - Jun 26, 2020, Kyoto, Japan. June 2020.
Connected, digitalized welding production — Secure, ubiquitous utilization of data across process layers. Advanced Joining Processes, vol. 125, Oct 24 - Oct 25, 2019, Ponta Delgada, Azores, Portugal. April 2020.
FactDAG: Formalizing Data Interoperability in an Internet of Production. IEEE Internet of Things Journal, vol. 7, no. 4. April 2020.
A Secure and Practical Decentralized Ecosystem for Shareable Education Material. Proceedings of the 34th International Conference on Information Networking (ICOIN ‘20), Jan 7 - Jan 10, 2020, Barcelona, Spain. January 2020.
Mit ''Digitalen Schatten'' Daten verdichten und darstellen : Der Exzellenzcluster ''Internet der Produktion'' forscht über die Produktionstechnik hinaus. Der Profilbereich ‘‘Information & Communication Technology’’. January 2020.
Online Reprogrammable Multi Tenant Switches. 1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP ‘19), Orlando, FL, United States. December 2019.
Perceiving QUIC: Do Users Notice or Even Care?. In Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies (CoNEXT ‘19), Orlando, Florida, USA. December 2019.
Security Considerations for Collaborations in an Industrial IoT-based Lab of Labs. Proceedings of the 3rd IEEE Global Conference on Internet of Things (GCIoT ‘19), Dec 4 - Dec 7, 2019, Dubai, United Arab Emirates. December 2019.
Towards Executing Computer Vision Functionality on Programmable Network Devices. 1st ACM CoNEXT Workshop on Emerging in-Network Computing Paradigms (ENCP ‘19), Orlando, FL, United States. December 2019.
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective. Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC ‘19), Nov 11 - Nov 11, 2019, London, United Kingdom. November 2019.
In-situ material classification in sheet-metal blanking using deep convolutional neural networks. Production Engineering, vol. 13, no. 6. November 2019.
POSTER: Traffic Splitting to Counter Website Fingerprinting. Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS ‘19), Nov 11 - Nov 15, 2019, London, United Kingdom. November 2019.
Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19), Oct 8 - Oct 10, 2019, Chicago, IL, USA. October 2019.
Privacy-Preserving Remote Knowledge System. Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19), Oct 8 - Oct 10, 2019, Chicago, IL, USA. October 2019.
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. Proceedings of the 27th IEEE International Conference on Network Protocols (ICNP ‘19), Oct 8 - Oct 10, 2019, Chicago, IL, USA. October 2019.
The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads. IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Oct 14 - Oct 17, 2019, Osnabrück, Germany. October 2019.
Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids. Proceedings of the 2019 AEIT International Annual Conference, Sep 18 - Sep 20, 2019, Firenze, Italy. September 2019.
DeePCCI: Deep Learning-based Passive Congestion Control Identification. In Proceedings of the ACM SIGCOMM Workshop on Network Meets AI & ML (NetAI ‘19), Aug 23 - Aug 23, 2019, Beijing, China. August 2019.
Optimizing Data Plane Programs for the Network. NetPL ‘19: ACM SIGCOMM Workshop on Networking and Programming Languages, Beijing, China. August 2019.
A Performance Perspective on Web Optimized Protocol Stacks: TCP+TLS+HTTP/2 vs. QUIC. In Proceedings of the Applied Networking Research Workshop (ANRW ‘19), Montreal, Quebec, Canada. July 2019.
Demystifying the Performance of XDP BPF. IEEE International Conference on Network Softwarization (NetSoft), Jun 24 - Jun 28, 2019, Paris, France. June 2019.
Dispute Resolution for Smart Contract-based Two Party Protocols. IEEE International Conference on Blockchain and Cryptocurrency 2019 (ICBC 2019), May 14 - May 17, 2019, Seoul, South Korea. May 2019.
Towards an Infrastructure Enabling the Internet of Production. Proceedings of the 2nd IEEE International Conference on Industrial Cyber-Physical Systems (ICPS ‘19), May 6 - May 9, 2019, Taipei, Taiwan. May 2019.
Enabling Wireless Network Support for Gain Scheduled Control. In Proceedings of the International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2019), Dresden, Germany. March 2019.
A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems. Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS), USA. January 2019.
The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research. ACM SIGCOMM Computer Communication Review, vol. 49, no. 1. January 2019.
Is the Web ready for HTTP/2 Server Push?. Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greece. December 2018.
SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments. Proceedings of the 34rd Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA. December 2018.
Smart Contract-based Car Insurance Policies. 2018 IEEE Globecom Workshops (GC Wkshps), Dec 9 - Dec 13, 2018, Abu Dhabi, United Arab Emirates. December 2018.
On Automated Memoization in the Field of Simulation Parameter Studies. ACM Transactions on Modeling and Computer Simulation (TOMACS), vol. 28, no. 4. October 2018.
Secure Low Latency Communication for Constrained Industrial IoT Scenarios. 43rd IEEE Conference on Local Computer Networks (LCN), Oct 1 - Oct 4, 2018, Chicago, IL, United States. October 2018.
Application-Agnostic Offloading of Datagram Processing. Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Sep 3 - Sep 7, 2018, Vienna, Austria. September 2018.
PARTI: A Multi-interval Theory Solver for Symbolic Execution. Proceedings of the 2018 Conference on Automated Software Engineering (ASE'18), Montpellier, France. September 2018.
Circuit Switched VM Networks for Zero-Copy IO. Proceedings of the 2018 Afternoon Workshop on Kernel Bypassing Networks (KBNets'18), Budapest, Hungary. August 2018.
Towards In-Network Industrial Feedback Control. Proceedings of the ACM SIGCOMM 2018 1st Workshop on In-Network Computing (NetCompute ‘18), Budapest, Hungary. August 2018.
Towards In-Network Security for Smart Homes. Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), Hamburg, Germany. August 2018.
Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks. IEEE Transactions on Vehicular Technology, vol. 67, no. 7. July 2018.
Symbolic Liveness Analysis of Real-World Software. Computer Aided Verification (CAV 2018), Oxford, UK. July 2018.
Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency. 19th IEEE International Symposium on ‘‘A World of Wireless, Mobile and Multimedia Networks’’ (IEEE WoWMoM 2018), Jun 12 - Jun 15, 2018, Chania, Crete, Greece. June 2018.
Demo: Towards In-Network Processing for Low-Latency Industrial Control. In Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Apr 15 - Apr 19, 2018, Honolulu, HI, USA. April 2018.
Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud. Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Apr 17 - Apr 20, 2018, Orlando, Florida, USA. April 2018.
Thwarting Unwanted Blockchain Content Insertion. Proceedings of the First IEEE Workshop on Blockchain Technologies and Applications (BTA), Apr 17 - Apr 20, 2018, Orlando, Florida, USA. April 2018.
Towards Benchmark Optimization by Automated Equivalence Detection. Proceedings of the 1st Workshop on Benchmarking Cyber-Physical Networks and Systems (CPSBench'18), Apr 10 - Apr 13, 2018, Porto, Portugal. April 2018.
Secure and anonymous decentralized Bitcoin mixing. Future Generation Computer Systems, vol. 80. March 2018.
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao. February 2018.
SPLIT: Smart Protocol Loading for the IoT. Proceedings of the 15th European Conference on Wireless Sensor Networks (EWSN 2018), Madrid, Spain. February 2018.
A new solution for the Energy Packet-based Dispatching using power/signal dual modulation. Proceedings of the Ninth International Conference on Future Energy Systems (ACM e-Energy ‘18), Karlsruhe, Germany. January 2018.
CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps. Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ‘17), Nov 7 - Nov 10, 2017, Melbourne, VIC, Australia. November 2017.
Dynamic Algorithm Selection for the Logic of Tasks in IoT Stream Processing Systems. 13th International Conference on Network and Service Management, Nov 26 - Nov 30, 2017, Tokyo. November 2017.
Network Security and Privacy for Cyber-Physical Systems. Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. November 2017.
Analysis of Fingerprinting Techniques for Tor Hidden Services. Proceedings of the 16th Workshop on Privacy in the Electronic Society (WPES), Dallas, TX, United States. October 2017.
Automated Memoization: Automatically Identifying Memoization Units in Simulation Parameter Studies. Proceedings of the 21st IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT 2017), Oct 18 - Oct 20, 2017, Rome, Italy. October 2017.
Floating-Point Symbolic Execution: A Case Study in N-Version Programming. Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, Urbana-Champaign, IL, USA. October 2017.
Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things. Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Aug 1 - Aug 4, 2017, Sydney, Australia. August 2017.
BLOOM: BLoom filter based Oblivious Outsourced Matchings. Proceedings of the 5th iDASH Privacy and Security Workshop 2016, vol. 10, no. Suppl 2, Nov 11 - Nov 11, 2016, Chicago, IL, USA. July 2017.
Resource and Execution Control for Mobile Offloadee Devices. 14th IEEE International Conference on Sensing, Communication, and Networking (SECON 2017), Jun 12 - Jun 14, 2017, San Diego, CA, United States. June 2017.
Code-transparent Discrete Event Simulation for Time-accurate Wireless Prototyping. Proceedings of the 5th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’17), May 24 - May 26, 2017, Singapore, Singapore. May 2017.
Practical Data Compliance for Cloud Storage. Proceedings of the 2017 IEEE International Conference on Cloud Engineering (IC2E 2017), Apr 4 - Apr 7, 2017, Vancouver, BC. April 2017.
Demo: A Realistic Use-case for Wireless Industrial Automation and Control. IEEE, Mar 13 - Mar 16, 2017, Göttingen, Germany. March 2017.
Encrypting Data to Pervasive Contexts. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Mar 13 - Mar 17, 2017, Kona, Big Island, HI, USA. March 2017.
Privacy-Preserving HMM Forward Computation. Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, AZ, United States. March 2017.
TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party. Proceedings of the 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Feb 21 - Feb 24, 2017, Jackson, WY, USA. February 2017.
myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data. INFORMATIK 2017, Chemnitz, Germany. January 2017.
Towards Transparent Information on Individual Cloud Service Usage. Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Dec 12 - Dec 15, 2016, Luxembourg, Luxembourg. December 2016.
CPPL: Compact Privacy Policy Language. Proceedings of the 15th Workshop on Privacy in the Electronic Society (WPES), Vienna, Austria. October 2016.
POSTER: Fingerprinting Tor Hidden Services. Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria. October 2016.
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Vienna, Austria. October 2016.
EEG-based Automatic Emotion Recognition: Feature Extraction, Selection and Classification Methods. 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Sep 14 - Sep 17, 2016, Munich, Germany. September 2016.
Psychologist in a Pocket: Lexicon Development and Content Validation of a Mobile-Based App for Depression Screening. JMIR Mhealth Uhealth, vol. 4, no. 3. July 2016.
Performance Analysis of Cooperative ARQ Systems for Wireless Industrial Networks. 17th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2016), Jun 21 - Jun 24, 2016, Coimbra, Portugal. June 2016.
Automated Memoization for Parameter Studies Implemented in Impure Languages. Proceedings of the 4th ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’16), Banff, AB, Canada. May 2016.
ReMP TCP: Low Latency Multipath TCP. Proceedings of the IEEE International Conference on Communications (ICC 2016), May 22 - May 27, 2016, Kuala Lumpur, Malaysia. May 2016.
STEAN: A Storage and Transformation Engine for Advanced Networking Context. Proceedings of the 15th International IFIP Networking Conference (NETWORKING'16), May 17 - May 19, 2016, Vienna, Austria. May 2016.
Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds. Proceedings of the Second International Workshop on Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things (CLaw 2016), Apr 4 - Apr 8, 2016, Berlin, Germany. April 2016.
A Comprehensive Approach to Privacy in the Cloud-based Internet of Things. Future Generation Computer Systems, vol. 56. March 2016.
Website Fingerprinting at Internet Scale. Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS ‘16), Feb 21 - Feb 24, 2016, San Diego, CA, USA. February 2016.
Maintaining Integrity and Reputation in Content Offloading. 12th International Conference on Wireless On-demand Network Systems and Services (WONS), Cortina d'Ampezzo, Italy. January 2016.
Parallel Expanded Event Simulation of Tightly Coupled Systems. ACM Transactions on Modeling and Computer Simulation (TOMACS), vol. 26, no. 2. January 2016.
Bandwidth-optimized Secure Two-Party Computation of Minima. 14th International Conference on Cryptology and Network Security (CANS 2015), vol. 9476. December 2015.
Channel Coding Versus Cooperative ARQ: Reducing Outage Probability in Ultra-Low Latency Wireless Communications. IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in Wireless Communications (GC'15 - ULTRA2), Dec 6 - Dec 10, 2015, San Diego, CA, United States. December 2015.
Remp TCP: Low latency Multipath TCP. Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany. December 2015.
Data Dependency based Parallel Simulation of Wireless Networks. Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'15), Cancún, Mexico. November 2015.
Collaborative On-demand Wi-Fi Sharing. 40th IEEE Conference on Local Computer Networks (LCN), Oct 26 - Oct 29, 2015, Clearwater Beach, Florida, USA. October 2015.
Comparison-based Privacy: Nudging Privacy in Social Media (Position Paper). The 10th DPM International Workshop on Data Privacy Management, vol. 9481. September 2015.
Santa: Faster Packet Delivery for Commonly Wished Replies [Poster Abstract]. Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM ‘15), London, United Kingdom. August 2015.
Like us on Facebook! - Analyzing user preferences regarding privacy settings in Germany. The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), vol. 3, USA. July 2015.
Analyzing Data Dependencies for Increased Parallelism in Discrete Event Simulation. Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom. June 2015.
Enabling Ubiquitous Interaction with Smart Things. 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Jun 22 - Jun 25, 2015, Seattle, WA, United States. June 2015.
Psychologist in a Pocket: Towards Depression Screening on Mobile Phones. Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health, vol. 211, Jun 2 - Jun 4, 2015, Västerås, Sweden. June 2015.
Towards Brain Research in a Pocket: Bringing EEG Research and Diagnostics out of the Lab. Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health, vol. 211, Jun 2 - Jun 4, 2015, Västerås, Sweden. June 2015.
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks. 2015 International Workshop on Privacy Engineering (IWPE'15), May 21 - May 22, 2015, San Jose, CA. May 2015.
CoinParty: Secure Multi-Party Mixing of Bitcoins. The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA. March 2015.
Protocol Virtualization through Dynamic Network Stacks. IEEE, Mar 9 - Mar 12, 2015, Cottbus - Chóśebuz, Germany. March 2015.
If You Can't Take The Heat: Temperature Effects On Low-Power Wireless Networks And How To Mitigate Them. Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal. February 2015.
HotBox: Testing Temperature Effects in Sensor Networks. Department of Computer Science, RWTH Aachen. December 2014.
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. Trusted Cloud Computing. December 2014.
Facilitating Direct and Ubiquitous Mobile Computer Vision. The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014), Melbourne, Australia. November 2014.
High-performance, Energy-efficient Mobile Wireless Networking in 802.11 Infrastructure Mode. Proceedings of The 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014), Oct 28 - Oct 30, 2014, Philadelphia, PA, United States. October 2014.
A Framework for Remote Automation, Configuration, and Monitoring of Real-World Experiments. Proceedings of the 9th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2014), Hawaii, USA. September 2014.
Enabling Distributed Simulation of OMNeT++ INET Models. Proceedings of the 1st OMNeT++ Community Summit, Hamburg, Germany. September 2014.
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols. 1st KuVS Workshop on Anticipatory Networks, Sep 29 - Sep 30, 2014, Stuttgart, Germany. September 2014.
Opportunistic Interaction in the Challenged Internet of Things. Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, Hawaii, USA. September 2014.
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud. The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), vol. 37, Halifax, NS, Canada. September 2014.
Demo: Opportunistic Mobile Brain Research. Proceedings of the 6th Extreme Conference on Communication, Aug 11 - Aug 15, 2014, Galapagos Islands, Ecuador. August 2014.
User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things. 2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Aug 27 - Aug 29, 2014, Barcelona, Spain. August 2014.
WIP: Opportunistic Vote Delegation for e-Voting based on Liquid Democracy. Proceedings of the 6th Extreme Conference on Communication, Aug 11 - Aug 15, 2014, Galapagos Islands, Ecuador. August 2014.
CA-Fi: Ubiquitous Mobile Wireless Networking without 802.11 Overhead and Restrictions. 15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Jun 19 - Jun 19, 2014, Sydney, Australia. June 2014.
Delegation-based Authentication and Authorization for the IP-based Internet of Things. 11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014), Jun 30 - Jul 3, 2014, Singapore. June 2014.
Demo: Ubiquitous Interaction with Smart Objects. Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ‘14), Bretton Woods. June 2014.
Machine Learning-based Jamming Detection for IEEE 802.11: Design and Experimental Evaluation. Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia. June 2014.
Pervasive Content-centric Wireless Networking. 15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Jun 19 - Jun 19, 2014, Sydney, Australia. June 2014.
Piccett: Protocol-Independent Classification of Corrupted Error-Tolerant Traffic. Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Jun 23 - Jun 26, 2014, Funchal, Madeira, Portugal. June 2014.
Analyzing Metropolitan-area Networking within Public Transportation Systems for Smart City Applications. Proceedings of the 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14), Mar 30 - Apr 2, 2014, Dubai, UAE. March 2014.
Large-Scale Network Simulation: Leveraging the Strengths of Modern SMP-based Compute Clusters. Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SIMUTools'14), Mar 17 - Mar 19, 2014, Lisbon, Portugal. March 2014.
Graph-based Redundancy Removal Approach for Multiple Cross-Layer Interactions. Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Jan 6 - Jan 10, 2014, Bangalore, India. January 2014.
Probabilistic Location-Free Addressing in Wireless Networks. Elsevier Journal of Network and Computer Applications (JNCA). January 2014.
Maintaining User Control While Storing and Processing Sensor Data in the Cloud. International Journal of Grid and High Performance Computing (IJGHPC), vol. 5, no. 4. December 2013.
Support for Error Tolerance in the Real-Time Transport Protocol. Department of Computer Science, RWTH Aachen. December 2013.
Towards Data Handling Requirements-aware Cloud Computing (Poster Abstract). Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Dec 2 - Dec 5, 2013, Bristol, UK. December 2013.
Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things. Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 7 - Oct 9, 2013, Lyon, France. October 2013.
Standards-based End-to-End IP Security for the Internet of Things. 21st IEEE International Conference on Network Protocols (ICNP 2013 PhD Forum), Oct 7 - Oct 10, 2013, Göttingen, Germany. October 2013.
Tailoring End-to-End IP Security Protocols to the Internet of Things. In Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013), Oct 7 - Oct 10, 2013, Göttingen, Germany. October 2013.
Bit Error Distribution and Mutation Patterns of Corrupted Packets in Low-Power Wireless Networks. Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, FL, United States. September 2013.
Fingerprinting Channel Dynamics in Indoor Low-Power Wireless Networks. Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2013), Miami, FL, United States. September 2013.
Interest-based Cloud-facilitated Opportunistic Networking. Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks (CHANTS 2013), Miami, FL, United States. September 2013.
A Global One-Way Control Channel for Opportunistic Networks. Proceedings of the 5th Extreme Conference on Communication, Aug 24 - Aug 30, 2013, Thorsmork, Iceland. August 2013.
Demo: Opportunistic Deployment Support for Wireless Sensor Networks. Proceedings of the 5th Extreme Conference on Communication, Aug 24 - Aug 30, 2013, Thorsmork, Iceland. August 2013.
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks. Proceedings of the 4th IEEE International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN 2013). June 2013.
Opening the Loops - Towards Semantic, Information-centric Networking in the Internet of Things. Proceedings of the IEEE International Workshop on Internet-of-Things Networking and Control 2013 (IoT-NC'13), Jun 24 - Jun 27, 2013, New Orleans, LA, United States. June 2013.
Privacy in the Internet of Things: Threats and Challenges. Security and Communication Networks - Special Issue on ‘Security in a Completely Interconnected World’. June 2013.
The Cloud Needs Cross-Layer Data Handling Annotations (Position Paper). Proceedings of the 4th International Workshop on Data Usage Management (DUMA 2013), May 23 - May 24, 2013, San Francisco, CA. May 2013.
6LoWPAN Fragmentation Attacks and Mitigation Mechanisms. Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ‘13), Budapest, Hungary. April 2013.
Towards Viable Certificate-based Authentication for the Web of Things. Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec ‘13), Budapest, Hungary. April 2013.
“And Then, the Weekend Started”: Story of a WSN Deployment on a Construction Site. Journal of Sensor and Actuator Networks, vol. 2, no. 1. March 2013.
A Heuristic Header Error Recovery Scheme for RTP. Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS'13), Mar 18 - Mar 20, 2013, Banff, Canada. March 2013.
Fuzzy Logical Coordinates and Location Services for Scalable Addressing in Wireless Networks. Proceedings of the 10th International Conference on Wireless On-demand Network Systems and Services (WONS ‘13), Mar 18 - Mar 20, 2013, Banff, Canada. March 2013.
Demo: Improving Associations in IEEE 802.11 WLANs. Proceedings of the 10th IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, Nevada, USA. January 2013.
Gossipmule: Improving Association Decisions via Opportunistic Recommendations. Proceedings of the 1st Workshop on People Centric Sensing and Communications. January 2013.
Portable Wireless-Networking Protocol Evaluation. Journal of Network and Computer Applications (JNCA). January 2013.
A Cloud Design for User-controlled Storage and Processing of Sensor Data. Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Dec 3 - Dec 6, 2012, Taipei, Taiwan. December 2012.
Hidden Markov Model-based 3D Path-matching using Raytracing-generated Wi-Fi Models. Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Nov 13 - Nov 15, 2012, Sydney, Australia. November 2012.
Indoor Navigation on Wheels (and on Foot) using Smartphones. Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Nov 13 - Nov 15, 2012, Sydney, Australia. November 2012.
Versatile Geo-referenced Maps for Indoor Navigation of Pedestrians. Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Sydney, Australia. November 2012.
DHT-based Localized Service Discovery in Wireless Mesh Networks. Proceedings of The Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), Oct 8 - Oct 11, 2012, Las Vegas, NV, United States. October 2012.
Integration Testing of Protocol Implementations using Symbolic Distributed Execution. The 2nd International Workshop on Rigorous Protocol Engineering (WRiPE 2012), Oct 30 - Nov 2, 2012, Austin, TX, USA. October 2012.
A Receiver-Based 802.11 Rate Adaptation Scheme with On-Demand Feedback. Proceedings of the 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'12), Sep 9 - Sep 12, 2012, Sydney, Australia. September 2012.
How to simulate the Internet of Things?. 11. GI/ITG KuVS Fachgespräch ‘‘Drahtlose Sensornetze’’. September 2012.
An Adaptive Codec Switching Scheme for SIP-based VoIP. Internet of Things, Smart Spaces, and Next Generation Networking (NEW2AN 2012), St. Pettersburg, Russia. August 2012.
Demo: On-demand Content-centric Wireless Networking. Proceedings of the 18th ACM Annual International Conference on Mobile Computing and Networking (MobiCom'12), Istanbul, Turkey. August 2012.
Accurate Map-based Indoor Navigation on the Mobile. Journal of Location Based Services, vol. 7, no. 1. July 2012.
Multi-level Parallelism for Time- and Cost-efficient Parallel Discrete Event Simulation on GPUs. Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'12), Jul 15 - Jul 19, 2012, Zhangjiajie, China. July 2012.
CRAWLER: An Experimentation Architecture for System Monitoring and Cross-Layer-Coordination. Proceedings of the 13th International Symposium on a World of Wireless, Mobile and MultimediaNetworks (WoWMoM'12), Jun 25 - Jun 28, 2012, San Francisco, CA, United States. June 2012.
Mesh-DHT: A Locality-Based Distributed Look-Up Structure for Wireless Mesh Networks. Proceedings of the IEEE International Conference on Communications (ICC 2012), Jun 10 - Jun 15, 2012, Ottawa, Canada. June 2012.
SEAMS: A Signaling Layer for End-host-Assisted Middlebox Services. Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), Jun 25 - Jun 27, 2012, Liverpool, United Kingdom. June 2012.
Exploiting the Burstiness of Intermediate Quality Wireless Links. International Journal of Distributed Sensor Networks (IJDSN). April 2012.
A Versatile Architecture for DTN Services (Demo). Proceedings of the 4th Extreme Conference on Communication, Mar 10 - Mar 14, 2012, Zurich, Switzerland. March 2012.
Building a modular BitTorrent model for ns-3. Proceedings of the 2012 workshop on ns-3 (WNS3 2012), Desenzano del Garda, Italy. March 2012.
FANTASY: Fully Automatic Network Emulation Architecture with Cross-Layer Support. Proceedings of the 5th ACM International ICST Conference on Simulation Tools and Techniques (SIMUTools ‘12), Mar 19 - Mar 23, 2012, Desenzano, Italy. March 2012.
Gossipmule: Scanning and Disseminating Information Between Stations in Cooperative WLANs (Poster). Proceedings of the Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2012, Zurich, Switzerland. March 2012.
Know Thy Simulation Model: Analyzing Event Interactions for Probabilistic Synchronization in Parallel Simulations. Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques (SIMUTools'12), Mar 19 - Mar 23, 2012, Desenzano, Italy. March 2012.
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?. Proceedings of the 9th International Conference on Wireless On-demand Network Systems and Services (WONS ‘12), Jan 9 - Jan 11, 2012, Courmayeur, Italy. January 2012.
Cooperative Wi-Fi-Sharing: Encouraging Fair Play. Proceedings of the ITU-T Kaleidoscope Event 2011, Cape Town, South Africa. December 2011.
geoDTN: Geographic Routing in Disruption Tolerant Networks. IEEE GLOBECOM 2011 - Next Generation Networking Symposium (GC'11 - NGN), Houston, Texas, USA. December 2011.
Refector: Heuristic Header Error Recovery for Error-Tolerant Transmissions. Proceedings of the 7th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Tokyo, Japan. December 2011.
Security Challenges in the IP-based Internet of Things. Springer Wireless Personal Communications Journal, vol. 61, no. 3. October 2011.
Demo: Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode. Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH 2011), Las Vegas, Nevada, USA. September 2011.
Efficient Power Management Using Out-of-Band Signaling. Proceedings of the 10th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze (FGSN), Sep 15 - Sep 16, 2011, Paderborn, Germany. September 2011.
Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode. Proceedings of the ACM MobiCom Workshop on Challenged Networks (Chants 2011), Las Vegas, NV, USA. September 2011.
FootPath: Accurate Map-based Indoor Navigation Using Smartphones (short paper). Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Guimarães, Portugal. September 2011.
Perfect Difference Sets for Neighbor Discovery. Proceedings of the 3rd Extreme Conference of Communication (ExtremeCom 2011), Manaus, Brazil. September 2011.
TinyWifi: Making Network Protocol Evaluation Portable Across Multiple Phy-Link Layers. Proceedings of the Sixth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (WiNTECH), Las Vegas, NV, USA. September 2011.
Predicting Runtime Performance Bounds of Expanded Parallel Discrete Event Simulations. Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'11), Jul 25 - Jul 27, 2011, Singapore. July 2011.
Efficient Online Estimation of Bursty Wireless Links. 16th IEEE Symposium on Computers and Communications (ISCC), Jun 28 - Jul 1, 2011, Kerkyra, Greece. June 2011.
PISA-SA - Security and Mobility in a Collaborative Muni-Fi (Demo Abstract). Proceedings of the fourth ACM Conference on Wireless Network Security, vol. 15, Hamburg, Germany. June 2011.
Scalable Symbolic Execution of Distributed Systems. Proceedings of the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011), Jun 20 - Jun 24, 2011, Minneapolis, MN, USA. June 2011.
Probabilistic Addressing: Stable Addresses in Unstable Wireless Networks. Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2011), Chicago, IL, USA. April 2011.
Device-driver enabled Wireless Network Emulation. Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques (SIMUTools 2011), Barcelona, Spain. March 2011.
Runtime Efficient Event Scheduling in Multi-threaded Network Simulation. Proceedings of the 4th International Workshop on OMNeT++ (OMNeT++‘11), Mar 21 - Mar 25, 2011, Barcelona, Spain. March 2011.
SliceTime: A platform for scalable and accurate network emulation. Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI ‘11), Boston, Massachusetts. March 2011.
Work in Progress: Uncovering the Privacy Implications of Web Usage [Poster]. 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI ‘11), Boston, MA, USA. March 2011.
Demo Abstract: Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding. Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland. November 2010.
Poster Abstract: TinyOS Meets Wireless Mesh Networks. Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland. November 2010.
A Generic Service Overlay for Wireless Mesh Networks. 3rd GI/ITG KuVS Fachgespräch on NG SDPs, Oct 14 - Oct 14, 2010, Berlin, Germany. October 2010.
Flexible Analysis of Distributed Protocol Implementations using Virtual Time. Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010), Hvar, Croatia. September 2010.
Expanding the Event Horizon in Parallelized Network Simulations. Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Aug 17 - Aug 19, 2010, Miami, FL, USA. August 2010.
PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing. International Conference on Computer Communication Networks (ICCCN 2010), vol. 1, Aug 2 - Aug 5, 2010, Zurich, Switzerland. August 2010.
Probabilistic Addressing in Wireless Networks. Proceedings of the 2nd IEEE Student Conference, Hamburg University of Technology, May 20 - May 21, 2010, Hamburg, Germany. May 2010.
Towards Network Centric Development of Embedded Systems. Proceedings of the IEEE International Conference on Communications (ICC), May 23 - May 27, 2010, Cape Town, South Africa. May 2010.
Collaborative Municipal Wi-Fi Networks - Challenges and Opportunities. Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), vol. 1, Mar 29 - Apr 2, 2010, Mannheim, Germany. April 2010.
Demo Abstract: RatMote - A Sensor Platform for Animal Habitat Monitoring. Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Apr 12 - Apr 16, 2010, Stockholm, Sweden. April 2010.
KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment. Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden. April 2010.
Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks. Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Apr 12 - Apr 16, 2010, Stockholm, Sweden. April 2010.
Poster: A Statistical Vector based Routing Protocol for Wireless Networks. Proceedings of the Junior Scientist Conference 2010, Apr 7 - Apr 9, 2010, Vienna, Austria. April 2010.
BurrowView - Seeing the world through the eyes of rats. Proceedings of the Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010), Mar 29 - Apr 2, 2010, Mannheim, Germany. March 2010.
Towards a Flexible and Versatile Cross-Layer-Coordination Architecture. Proceedings of the 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA. March 2010.
Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks. Proceedings of the IEEE International Conference on Communications (ICC). January 2010.
Dynamic Wireless Sensor Networks for Animal Behavior Research. Recent Advances in Biomedical Engineering. January 2010.
Efficient and Context-Aware Access Control for Pervasive Medical Sensor Networks. Proceedings of the First IEEE PerCom Workshop on Pervasive Healthcare. January 2010.
Modular Context-Aware Access Control for Medical Sensor Network. Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT'10), Pittsburgh, PA, United States. January 2010.
On Applications of Cooperative Security in Distributed Networks. Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management, Morioka, Japan. January 2010.
Promoting Power to a First Class Metric in Network Simulations. Proceedings of the Workshop on Energy Aware Systems and Methods, in conjunction with GI/ITG ARCS 2010, Hanover, Germany. January 2010.
SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks. Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy. December 2009.
Bursty Traffic over Bursty Links. Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkley, California. November 2009.
Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation. Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), Sep 21 - Sep 23, 2009, London, Great Britain. September 2009.
Remote Incremental Adaptation of Sensor Network Applications. Proceedings of the 8th GI/ITG KuVS Fachgespräch ‘‘Wireless Sensor Networks’’, Hamburg, Germany. September 2009.
Routing Over Bursty Wireless Links. Proceedings of the 8th GI/ITG KuVS Fachgespräch ‘‘Wireless Sensor Networks’’, Hamburg, Germany. September 2009.
A Virtual Platform for Network Experimentation. Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain, Aug 17 - Aug 17, 2009, Barcelona, Spain. August 2009.
Security for Pervasive Medical Sensor Networks. 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), vol. 1, Jul 13 - Jul 16, 2009, Toronto, CAN. July 2009.
SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking. Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Jul 13 - Jul 16, 2009, Toronto, ON, Canada. July 2009.
Poster Abstract: Protocol Factory: Reuse for Network Experimentation. 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09). April 2009.
ProMoX: A protocol stack monitoring framework. Proceedings of the GI/ITG KIVS Workshop on Overlay and Network Virtualization 2009, vol. 17, no. 2009. March 2009.
Modelling Execution Time and Energy Consumption in Sensor Node Simulation. PIK Journal, Special Issue on Energy Aware Systems, vol. 32, no. 2. February 2009.
A performance comparison of recent network simulators. Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Germany. January 2009.
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace. Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), vol. 1, Jun 14 - Jun 18, 2009, Dresden, Germany. January 2009.
Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks. Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), vol. 1, Calgary, CN. January 2009.
Protocol Orchestration: A Semantic Approach to Communication Stacks. Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch ‘09), Krakow, Poland. January 2009.
Time accurate integration of software prototypes with event-based network simulations. Proceedings of the 11th Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance 2009), vol. 37, no. 2. January 2009.
ADAPT: A Semantics-Oriented Protocol Architecture. Self-Organizing Systems, vol. 5343/2008, Vienna, Austria. December 2008.
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. Proceedings of the 2008 ACM CoNEXT Conference, vol. 1, Dec 9 - Dec 12, 2008, Madrid, Spain. December 2008.
Poster Abstract: KleeNet - Automatic Bug Hunting in Sensor Network Applications. Proceedings of the 6th ACM conference on Embedded network sensor systems (SenSys'08), Raleigh, NC, United States. November 2008.
Range Queries and Load Balancing in a Hierarchically Structured P2P System. Proceedings of 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008), Oct 14 - Oct 17, 2008, Montreal, Canada. October 2008.
Smart Sensors for Small Rodent Observation. Proceedings of IEEE Sensors 2008, Oct 26 - Oct 29, 2008, Lecce, Italy. October 2008.
Bug Hunting in Sensor Network Applications. Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany. September 2008.
RatPack: Communication in a Sparse Dynamic Network. ACM SIGCOMM 2008 Poster Proceedings, Aug 17 - Aug 22, 2008, Seattle, WA, USA. August 2008.
Ratpack: Wearable Sensor Networks for Animal Observation. Proceedings of the 30th Annual International IEEE Engineering in Medicine and Biology Conference, Aug 20 - Aug 25, 2008, Vancouver, BC, Canada. August 2008.
Challenges in Short-term Wireless Link Quality Estimation. Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks. July 2008.
Secure Wi-Fi Sharing at Global Scales. Proc. of 15th International Conference on Telecommunication (ICT), vol. 1, St. Petersburg, Russian Federation. June 2008.
Towards Short-Term Wireless Link Quality Estimation. Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Jun 2 - Jun 3, 2008, Chalottesville, USA. June 2008.
Clustering Players for Load Balancing in Virtual Worlds. International Journal of Advanced Media and Communication (IJAMC), vol. 2, no. 4. January 2008.
Comparing recent network simulators: A performance evaluation study. Aachener Informatik Berichte, vol. 2008-16, no. AIB 2008-16. January 2008.
Synchronized network emulation: matching prototypes with complex simulations. SIGMETRICS Performance Evaluation Review, vol. 36, no. 2. January 2008.
When Timing Matters: Enabling Time Accurate & Scalable Simulation of Sensor Network Applications. Proceedings of the 7th ACM International Conference on Information Processing in Sensor Networks (IPSN 2008), USA. January 2008.
PISA: P2P Wi-Fi Internet Sharing Architecture. Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing, vol. 1, Sep 2 - Sep 5, 2007, Galway, Ireland. September 2007.
Accurate Timing in Sensor Network Simulations. Proceedings of the 6th GI/ITG KuVS Workshop on Wireless Sensor Networks (FGSN 07), Aachen, Germany. July 2007.
Ratpack: Using Sensor Networks for Animal Observation. 6th GI/ITG KuVS Fachgespräch ‘‘Wireless Sensor Networks’’, vol. 2007-11, Jul 16 - Jul 17, 2007, Aachen, Germany. July 2007.
Cooperative Security in Distributed Sensor Networks. Proceedings of the third International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2007, vol. 1. January 2007.
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks. IEEE Global Communication Conference (GlobeCom). January 2007.
MHT: A Mobility-Aware Distributed Hash Table. Special Issue on Peer-to-Peer of the it - Information Technology Journal, vol. 49, no. 5. January 2007.
P2P系统及其应用 (Chinese Translation of Peer-to-Peer Systems and Applications). China Machine Press. January 2007.
Peer-to-Peer Systems (Editorial). Special Issue on Peer-to-Peer of the it - Information Technology Journal, vol. 49. January 2007.
Peer-to-Peer-based Infrastructure Support for Massively Multiplayer Online Games. Proceedings of 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007), Jan 11 - Jan 13, 2007, Las Vegas, Nevada, USA. January 2007.
Simulation von plattformunabhängigen TinyOS-Applikationen mit ns-2. Proceedings of 6th GI/ITG KuVS Fachgespräch ‘‘Wireless Sensor Networks’’. January 2007.
Smart Composition of Sensor Network Applications. Proceedings of 6th GI/ITG KuVS Fachgespräch ‘‘Wireless Sensor Networks’’. January 2007.
Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System. Proceedings of 31st IEEE Conference on Local Computer Networks (LCN 2006), Nov 14 - Nov 16, 2006, Tampa, Florida, USA. November 2006.
Rat Watch: Using Sensor Networks for Animal Observation. ACM Workshop on Real-World Wireless Sensor Networks (RealWSN), vol. 1, Jun 19 - Jun 19, 2006, Uppsala, Sweden. June 2006.
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks. In Proceedings of 3. IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P'06), vol. 1, Pisa, Italy. March 2006.
Modular Communication Protocols for Sensor Networks. European Workshop on Wireless Sensor Networks (EWSN 2006), vol. 507, Feb 13 - Feb 15, 2006, Zurich, Switzerland. February 2006.
OCALA: An Architecture for Supporting Legacy Applications over Overlays. Proceedings of 3rd ACM Sigcomm/ACM Sigops Symposium on Networked Systems Design and Implementation (NSDI 2006). January 2006.
Towards flexible and modular simulation models. Visions of Future Generation Networks, Würzburg, Germany. January 2006.
Towards Scalable Mobility in Distributed Hash Tables. Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), Cambridge, UK. January 2006.
When Modularity Matters. 5th GI/ITG KuVS Fachgespräch ‘‘Wireless Sensor Networks’’, Stuttgart, Germany. January 2006.
Anonymous IP-Services via Overlay Routing. 5. Würzburger ‘‘Workshop IP Netzmanagement, IP Netzplanung und Optimierung’’, Würzburg, Germany. March 2005.
Dienstgüte in strukturierten hierarchischen Overlay Netzwerken. Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005, Kaiserslautern, Germany. March 2005.
On the Distribution of Nodes in Distributed Hash Tables. Proceedings of Workshop Peer-to-Peer-Systems and -Applications, KiVS 2005, Kaiserslautern, Germany. March 2005.
On the Use of Structured Peer-to-Peer Systems for Online Gaming. 5. Würzburger ‘‘Workshop IP Netzmanagement, IP Netzplanung und Optimierung’’, Würzburg, Germany. March 2005.
Spontaneous Windows File Sharing via Virtual Groups. Proceedings of Workshop on Peer-to-Peer-Systems and -Applications, vol. 61, Kaiserslautern, Germany. February 2005.
Distributed Hash Tables. Peer-to-Peer Systems and Applications. January 2005.
Enabling Detailed Modeling and Analysis of Sensor Networks. Special Issue on Sensor Networks, PIK Journal, vol. 28, no. 2. January 2005.
IP-QoS: Flexible and Scalable Quality-of-Service with Differentiated Services. The Industrial Information Technology Handbook. January 2005.
OCALA: An Architecture for Supporting Legacy Applications over Overlays. January 2005.
Peer-to-Peer Systems and Applications. Springer, vol. LNCS 3485. January 2005.
Project AEON. Proceedings of the 4th GI/ITG KuVS Fachgespräch ‘‘Wireless Sensor Networks’’, Techical Report No. 481. January 2005.
Reliability and Load Balancing in Distributed Hash Tables. Peer-to-Peer Systems and Applications. January 2005.
Selected Distributed Hash Table Algorithms. Peer-to-Peer Systems and Applications. January 2005.
T-DHT: Topology-Based Distributed Hash Tables. Proceedings of Fifth International IEEE Conference on Peer-to-Peer-Computing. January 2005.
Towards Realistic Strategy-Based Mobility Models for Ad Hoc Communication. Proceedings of the 2005 Conference on Software for Communication Systems and Computer Networks. January 2005.
Transparent End-Host-Based Service Composition through Network Virtualization. Proceedings of the First ACM International Workshop on Multimedia Service Composition at International Multimedia Conference, Singapore. January 2005.
A Thermal-Dissipation-based Approach for Balancing Data Load in Distributed Hash Tables. Proceedings of LCN 2004 – 29th IEEE Conference on Local Computer Networks, Tampa, Florida, USA. November 2004.
Reliability of Data in Structured Peer-to-Peer Systems. Proceedings of HOT-P2P ‘04: Hot Topics in Peer-to-Peer Computing at 12th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Volendam, Netherlands. October 2004.
Comparison of Load Balancing Algorithms for Structured Peer-to-Peer Systems. Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), vol. 51, Ulm, Germany. September 2004.
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios. Proceedings of Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (PEPPA), vol. 51, Ulm, Germany. September 2004.
Content-oriented Bridging of Today's Internet Heterogeneity. Service Management and Self-Organization in IP-based Networks. January 2004.
Integrierte Konstruktionsmethoden für flexible Protokolle in ubiquitären Kommunikationssystemen. Proceedings of the GI/ITG KuVS Fachgespräch Systemsoftware für Pervasive Computing. January 2004.
Peer-to-Peer-Networking & -Computing. Informatik-Spektrum, vol. 27, no. 1. January 2004.
Support for Service Composition in i3. Proceedings of ACM Multimedia 2004. January 2004.
Supporting Legacy Applications over i3. January 2004.