Skip to main content

Showing 1–40 of 40 results for author: Keller, J

Searching in archive cs. Search in all archives.
.
  1. Evaluation of Temporal Change in IR Test Collections

    Authors: Jüri Keller, Timo Breuer, Philipp Schaer

    Abstract: Information retrieval systems have been evaluated using the Cranfield paradigm for many years. This paradigm allows a systematic, fair, and reproducible evaluation of different retrieval methods in fixed experimental environments. However, real-world retrieval systems must cope with dynamic environments and temporal changes that affect the document collection, topical trends, and the individual us… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Journal ref: Proceedings of the 2024 ACM SIGIR International Conference on the Theory of Information Retrieval (ICTIR '24), July 13, 2024, Washington, DC, USA

  2. arXiv:2404.08785  [pdf, other

    cs.CV cs.LG cs.RO

    Under pressure: learning-based analog gauge reading in the wild

    Authors: Maurits Reitsma, Julian Keller, Kenneth Blomqvist, Roland Siegwart

    Abstract: We propose an interpretable framework for reading analog gauges that is deployable on real world robotic systems. Our framework splits the reading task into distinct steps, such that we can detect potential failures at each step. Our system needs no prior knowledge of the type of gauge or the range of the scale and is able to extract the units used. We show that our gauge reading algorithm is able… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 7 pages, 8 figures, accepted for presentation at the 2024 IEEE International Conference on Robotics and Automation (ICRA) and for inclusion in the conference proceedings, finalist for the IEEE ICRA 2024 Best Paper Award in Automation, source code https://github.com/ethz-asl/analog_gauge_reader, Autonomous Systems Lab, ETH Zurich

  3. arXiv:2310.07346  [pdf, other

    cs.IR cs.DL

    Preliminary Results of a Scientometric Analysis of the German Information Retrieval Community 2020-2023

    Authors: Philipp Schaer, Svetlana Myshkina, Jüri Keller

    Abstract: The German Information Retrieval community is located in two different sub-fields: Information and computer science. There are no current studies that investigate these communities on a scientometric level. Available studies only focus on the information scientific part of the community. We generated a data set of 401 recent IR-related publications extracted from six core IR conferences from a mai… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: Data available at https://github.com/irgroup/LWDA2023-IR-community

    Journal ref: M. Leyer, Wichmann, J. (Eds.): Proceedings of the LWDA 2023 Workshops: BIA, DB, IR, KDML and WM. Marburg, Germany, 09.-11. October 2023

  4. arXiv:2308.10549  [pdf, other

    cs.IR

    Evaluating Temporal Persistence Using Replicability Measures

    Authors: Jüri Keller, Timo Breuer, Philipp Schaer

    Abstract: In real-world Information Retrieval (IR) experiments, the Evaluation Environment (EE) is exposed to constant change. Documents are added, removed, or updated, and the information need and the search behavior of users is evolving. Simultaneously, IR systems are expected to retain a consistent quality. The LongEval Lab seeks to investigate the longitudinal persistence of IR systems, and in this work… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: To be published in Proceedings of the Working Notes of CLEF 2023 - Conference and Labs of the Evaluation Forum, Thessaloniki, Greece 18 - 21, 2023

  5. Multi-Robot Multi-Room Exploration with Geometric Cue Extraction and Circular Decomposition

    Authors: Seungchan Kim, Micah Corah, John Keller, Graeme Best, Sebastian Scherer

    Abstract: This work proposes an autonomous multi-robot exploration pipeline that coordinates the behaviors of robots in an indoor environment composed of multiple rooms. Contrary to simple frontier-based exploration approaches, we aim to enable robots to methodically explore and observe an unknown set of rooms in a structured building, kee** track of which rooms are already explored and sharing this infor… ▽ More

    Submitted 4 December, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

  6. arXiv:2307.07607  [pdf, other

    cs.RO

    SubT-MRS Dataset: Pushing SLAM Towards All-weather Environments

    Authors: Shibo Zhao, Yuanjun Gao, Tianhao Wu, Damanpreet Singh, Rushan Jiang, Haoxiang Sun, Mansi Sarawata, Yuheng Qiu, Warren Whittaker, Ian Higgins, Yi Du, Shaoshu Su, Can Xu, John Keller, Jay Karhade, Lucas Nogueira, Sourojit Saha, Ji Zhang, Wenshan Wang, Chen Wang, Sebastian Scherer

    Abstract: Simultaneous localization and map** (SLAM) is a fundamental task for numerous applications such as autonomous navigation and exploration. Despite many SLAM datasets have been released, current SLAM solutions still struggle to have sustained and resilient performance. One major issue is the absence of high-quality datasets including diverse all-weather conditions and a reliable metric for assessi… ▽ More

    Submitted 29 May, 2024; v1 submitted 14 July, 2023; originally announced July 2023.

    Journal ref: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Seattle, WA, June 2024

  7. arXiv:2307.05263  [pdf, other

    cs.RO eess.SY

    Pegasus Simulator: An Isaac Sim Framework for Multiple Aerial Vehicles Simulation

    Authors: Marcelo Jacinto, João Pinto, Jay Patrikar, John Keller, Rita Cunha, Sebastian Scherer, António Pascoal

    Abstract: Develo** and testing novel control and motion planning algorithms for aerial vehicles can be a challenging task, with the robotics community relying more than ever on 3D simulation technologies to evaluate the performance of new algorithms in a variety of conditions and environments. In this work, we introduce the Pegasus Simulator, a modular framework implemented as an NVIDIA Isaac Sim extensio… ▽ More

    Submitted 15 April, 2024; v1 submitted 11 July, 2023; originally announced July 2023.

    Comments: This paper has been accepted for publication in the 2024 International Conference on Unmanned Aircraft Systems (ICUAS), IEEE

  8. arXiv:2302.12131  [pdf, other

    cs.IR

    Automated Statement Extraction from Press Briefings

    Authors: Jüri Keller, Meik Bittkowski, Philipp Schaer

    Abstract: Scientific press briefings are a valuable information source. They consist of alternating expert speeches, questions from the audience and their answers. Therefore, they can contribute to scientific and fact-based media coverage. Even though press briefings are highly informative, extracting statements relevant to individual journalistic tasks is challenging and time-consuming. To support this tas… ▽ More

    Submitted 24 February, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

    Comments: Datenbanksysteme für Business, Technologie und Web (BTW 2023)

    ACM Class: H.3.3

  9. DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data

    Authors: Steffen Wendzel, Tobias Schmidbauer, Sebastian Zillien, Jörg Keller

    Abstract: Covert channels are stealthy communication channels that enable manifold adversary and legitimate scenarios, ranging from malware communications to the exchange of confidential information by journalists and censorship circumvention. We introduce a new class of covert channels that we call history covert channels. We further present a new paradigm: covert channel amplification. All covert channels… ▽ More

    Submitted 7 June, 2024; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: 20 pages. IEEE Transactions on Dependable and Secure Computing (TDSC), 2024

  10. Evaluating Research Dataset Recommendations in a Living Lab

    Authors: Jüri Keller, Leon Paul Mondrian Munz

    Abstract: The search for research datasets is as important as laborious. Due to the importance of the choice of research data in further research, this decision must be made carefully. Additionally, because of the growing amounts of data in almost all areas, research data is already a central artifact in empirical sciences. Consequentially, research dataset recommendations can beneficially supplement scient… ▽ More

    Submitted 30 September, 2022; v1 submitted 29 September, 2022; originally announced September 2022.

    Comments: Best of 2021 Labs: LiLAS

    ACM Class: H.3.3

    Journal ref: Lab Experimental IR Meets Multilinguality, Multimodality, and Interaction - 13th International Conference of the CLEF Association, CLEF 2022, Bologna, Italy, September 5-8, 2022, Proceedings

  11. arXiv:2209.03878  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Histogram Layers for Synthetic Aperture Sonar Imagery

    Authors: Joshua Peeples, Alina Zare, Jeffrey Dale, James Keller

    Abstract: Synthetic aperture sonar (SAS) imagery is crucial for several applications, including target recognition and environmental segmentation. Deep learning models have led to much success in SAS analysis; however, the features extracted by these approaches may not be suitable for capturing certain textural information. To address this problem, we present a novel application of histogram layers on SAS i… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

    Comments: 7 pages, 9 Figures, Accepted to IEEE International Conference on Machine Learning and Applications (ICMLA) 2022

  12. ir_metadata: An Extensible Metadata Schema for IR Experiments

    Authors: Timo Breuer, Jüri Keller, Philipp Schaer

    Abstract: The information retrieval (IR) community has a strong tradition of making the computational artifacts and resources available for future reuse, allowing the validation of experimental results. Besides the actual test collections, the underlying run files are often hosted in data archives as part of conferences like TREC, CLEF, or NTCIR. Unfortunately, the run data itself does not provide much info… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

    Comments: Resource paper

    Journal ref: Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '22), July 11-15, 2022, Madrid, Spain

  13. arXiv:2204.03140  [pdf, other

    cs.RO cs.AI cs.LG

    Off-Policy Evaluation with Online Adaptation for Robot Exploration in Challenging Environments

    Authors: Yafei Hu, Junyi Geng, Chen Wang, John Keller, Sebastian Scherer

    Abstract: Autonomous exploration has many important applications. However, classic information gain-based or frontier-based exploration only relies on the robot current state to determine the immediate exploration goal, which lacks the capability of predicting the value of future states and thus leads to inefficient exploration decisions. This paper presents a method to learn how "good" states are, measured… ▽ More

    Submitted 24 May, 2023; v1 submitted 6 April, 2022; originally announced April 2022.

    Comments: Published in RA-L 2023

  14. Possibilistic Fuzzy Local Information C-Means with Automated Feature Selection for Seafloor Segmentation

    Authors: Joshua Peeples, Daniel Suen, Alina Zare, James Keller

    Abstract: The Possibilistic Fuzzy Local Information C-Means (PFLICM) method is presented as a technique to segment side-look synthetic aperture sonar (SAS) imagery into distinct regions of the sea-floor. In this work, we investigate and present the results of an automated feature selection approach for SAS image segmentation. The chosen features and resulting segmentation from the image will be assessed bas… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: Proc. SPIE 10628, Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXIII (30 April 2018), 14 pages, 7 figures, 5 tables

  15. A Revised Taxonomy of Steganography Embedding Patterns

    Authors: Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert

    Abstract: Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital media steganography, text steganography, cyber-physical systems steganography, network steganography (network covert channels), local covert channels, and out-of-band covert channels. To cope with this, a prime attempt ha… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.

    Journal ref: Proc. of the 16th International Conference on Availability, Reliability and Security (ARES'21), August 17--20, 2021, Vienna, Austria

  16. arXiv:2105.05784  [pdf, other

    cs.CG cs.DS

    Particle-Based Assembly Using Precise Global Control

    Authors: Jakob Keller, Christian Rieck, Christian Scheffer, Arne Schmidt

    Abstract: In micro- and nano-scale systems, particles can be moved by using an external force like gravity or a magnetic field. In the presence of adhesive particles that can attach to each other, the challenge is to decide whether a shape is constructible. Previous work provides a class of shapes for which constructibility can be decided efficiently when particles move maximally into the same direction ind… ▽ More

    Submitted 15 June, 2022; v1 submitted 12 May, 2021; originally announced May 2021.

    Comments: 25 pages, 14 figures, full version of an extended abstract that appeared in the proceedings of the 17th Algorithms and Data Structures Symposium (WADS 2021); revised version with clearer model/problem description and some additional related work

    ACM Class: F.2.2

  17. arXiv:2103.16829  [pdf, other

    cs.RO

    Graph-Based Topological Exploration Planning in Large-Scale 3D Environments

    Authors: Fan Yang, Dung-Han Lee, John Keller, Sebastian Scherer

    Abstract: Currently, state-of-the-art exploration methods maintain high-resolution map representations in order to optimize exploration goals in each step that maximizes information gain. However, during exploring, those "optimal" selections could quickly become obsolete due to the influx of new information, especially in large-scale environments, and result in high-frequency re-planning that hinders the ov… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: Preprint version for ICRA2021 final submission

    MSC Class: 68T40 ACM Class: I.2.9

  18. arXiv:2103.04872  [pdf, ps, other

    cs.CV cs.LG eess.IV

    The Weakly-Labeled Rand Index

    Authors: Dylan Stewart, Anna Hampton, Alina Zare, Jeff Dale, James Keller

    Abstract: Synthetic Aperture Sonar (SAS) surveys produce imagery with large regions of transition between seabed types. Due to these regions, it is difficult to label and segment the imagery and, furthermore, challenging to score the image segmentations appropriately. While there are many approaches to quantify performance in standard crisp segmentation schemes, drawing hard boundaries in remote sensing ima… ▽ More

    Submitted 8 March, 2021; v1 submitted 8 March, 2021; originally announced March 2021.

  19. Countering Adaptive Network Covert Communication with Dynamic Wardens

    Authors: Wojciech Mazurczyk, Steffen Wendzel, Mehdi Chourib, Jörg Keller

    Abstract: Network covert channels are hidden communication channels in computer networks. They influence several factors of the cybersecurity economy. For instance, by improving the stealthiness of botnet communications, they aid and preserve the value of darknet botnet sales. Covert channels can also be used to secretly exfiltrate confidential data out of organizations, potentially resulting in loss of mar… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Journal ref: Elsevier FGCS, Volume 94, May 2019, Pages 712-725

  20. arXiv:2101.03134  [pdf, other

    eess.IV cs.LG

    Explainable Systematic Analysis for Synthetic Aperture Sonar Imagery

    Authors: Sarah Walker, Joshua Peeples, Jeff Dale, James Keller, Alina Zare

    Abstract: In this work, we present an in-depth and systematic analysis using tools such as local interpretable model-agnostic explanations (LIME) (arXiv:1602.04938) and divergence measures to analyze what changes lead to improvement in performance in fine tuned models for synthetic aperture sonar (SAS) data. We examine the sensitivity to factors in the fine tuning process such as class imbalance. Our findin… ▽ More

    Submitted 16 March, 2021; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: IGARSS 2021

  21. Divergence Regulated Encoder Network for Joint Dimensionality Reduction and Classification

    Authors: Joshua Peeples, Sarah Walker, Connor McCurley, Alina Zare, James Keller, Weihuang Xu

    Abstract: Feature representation is an important aspect of remote-sensing based image classification. While deep convolutional neural networks are able to effectively amalgamate information, large numbers of parameters often make learned features inscrutable and difficult to transfer to alternative models. In order to better represent statistical texture information for remote-sensing image classification,… ▽ More

    Submitted 3 March, 2022; v1 submitted 31 December, 2020; originally announced December 2020.

    Comments: 8 pages (5 main pages and 3 supplemental pages), 2 figures, accepted to IEEE Geoscience and Remote Sensing Letters

  22. arXiv:2010.00635  [pdf

    cs.CV eess.IV

    StreamSoNG: A Soft Streaming Classification Approach

    Authors: Wenlong Wu, James M. Keller, Jeffrey Dale, James C. Bezdek

    Abstract: Examining most streaming clustering algorithms leads to the understanding that they are actually incremental classification models. They model existing and newly discovered structures via summary information that we call footprints. Incoming data is normally assigned a crisp label (into one of the structures) and that structure's footprint is incrementally updated. There is no reason that these as… ▽ More

    Submitted 13 July, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

  23. arXiv:2006.11062  [pdf, other

    cs.DC

    Influence of Incremental Constraints on Energy Consumption and Static Scheduling Time for Moldable Tasks with Deadline

    Authors: Jörg Keller, Sebastian Litzinger

    Abstract: Static scheduling of independent, moldable tasks on parallel machines with frequency scaling comprises decisions on core allocation, assignment, frequency scaling and ordering, to meet a deadline and minimize energy consumption. Constraining some of these decisions reduces the solution space, i.e. may increase energy consumption, but may also reduce scheduling time or give the chance to tackle lar… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

    Comments: Presented at the 13th International Workshop on Programmability and Architectures for Heterogeneous Multicores, 2020 (arXiv:2005.07619)

    Report number: Report-no: MULTIPROG/2020/5

  24. arXiv:1912.02259  [pdf, other

    cs.CV

    Extending the Morphological Hit-or-Miss Transform to Deep Neural Networks

    Authors: Muhammad Aminul Islam, Bryce Murray, Andrew Buck, Derek T. Anderson, Grant Scott, Mihail Popescu, James Keller

    Abstract: While most deep learning architectures are built on convolution, alternative foundations like morphology are being explored for purposes like interpretability and its connection to the analysis and processing of geometric structures. The morphological hit-or-miss operation has the advantage that it takes into account both foreground and background information when evaluating target shape in an ima… ▽ More

    Submitted 27 September, 2020; v1 submitted 4 December, 2019; originally announced December 2019.

  25. arXiv:1910.04874  [pdf, other

    cs.CV cs.RO

    A Stereo Algorithm for Thin Obstacles and Reflective Objects

    Authors: John Keller, Sebastian Scherer

    Abstract: Stereo cameras are a popular choice for obstacle avoidance for outdoor lighweight, low-cost robotics applications. However, they are unable to sense thin and reflective objects well. Currently, many algorithms are tuned to perform well on indoor scenes like the Middlebury dataset. When navigating outdoors, reflective objects, like windows and glass, and thin obstacles, like wires, are not well han… ▽ More

    Submitted 3 October, 2019; originally announced October 2019.

    Comments: 6 pages, 5 figures

  26. Enabling Explainable Fusion in Deep Learning with Fuzzy Integral Neural Networks

    Authors: Muhammad Aminul Islam, Derek T. Anderson, Anthony J. Pinar, Timothy C. Havens, Grant Scott, James M. Keller

    Abstract: Information fusion is an essential part of numerous engineering systems and biological functions, e.g., human cognition. Fusion occurs at many levels, ranging from the low-level combination of signals to the high-level aggregation of heterogeneous decision-making processes. While the last decade has witnessed an explosion of research in deep learning, fusion in neural networks has not observed the… ▽ More

    Submitted 10 May, 2019; originally announced May 2019.

    Comments: IEEE Transactions on Fuzzy Systems

  27. arXiv:1904.12059  [pdf, other

    cs.CV cs.AI cs.CR cs.DC

    ARCHANGEL: Tamper-proofing Video Archives using Temporal Content Hashes on the Blockchain

    Authors: Tu Bui, Daniel Cooper, John Collomosse, Mark Bell, Alex Green, John Sheridan, Jez Higgins, Arindra Das, Jared Keller, Olivier Thereaux, Alan Brown

    Abstract: We present ARCHANGEL; a novel distributed ledger based system for assuring the long-term integrity of digital video archives. First, we describe a novel deep network architecture for computing compact temporal content hashes (TCHs) from audio-visual streams with durations of minutes or hours. Our TCHs are sensitive to accidental or malicious content modification (tampering) but invariant to the co… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

    Comments: Accepted to CVPR Blockchain Workshop 2019

  28. arXiv:1904.01795  [pdf, other

    cs.CV

    MAVNet: an Effective Semantic Segmentation Micro-Network for MAV-based Tasks

    Authors: Ty Nguyen, Shreyas S. Shivakumar, Ian D. Miller, James Keller, Elijah S. Lee, Alex Zhou, Tolga Ozaslan, Giuseppe Loianno, Joseph H. Harwood, Jennifer Wozencraft, Camillo J. Taylor, Vijay Kumar

    Abstract: Real-time semantic image segmentation on platforms subject to size, weight and power (SWaP) constraints is a key area of interest for air surveillance and inspection. In this work, we propose MAVNet: a small, light-weight, deep neural network for real-time semantic segmentation on micro Aerial Vehicles (MAVs). MAVNet, inspired by ERFNet, features 400 times fewer parameters and achieves comparable… ▽ More

    Submitted 8 June, 2019; v1 submitted 3 April, 2019; originally announced April 2019.

    Comments: 8 pages, 9 figures

  29. arXiv:1904.01014  [pdf, other

    eess.IV cs.LG stat.ML

    Comparison of Possibilistic Fuzzy Local Information C-Means and Possibilistic K-Nearest Neighbors for Synthetic Aperture Sonar Image Segmentation

    Authors: Joshua Peeples, Matthew Cook, Daniel Suen, Alina Zare, James Keller

    Abstract: Synthetic aperture sonar (SAS) imagery can generate high resolution images of the seafloor. Thus, segmentation algorithms can be used to partition the images into different seafloor environments. In this paper, we compare two possibilistic segmentation approaches. Possibilistic approaches allow for the ability to detect novel or outlier environments as well as well known classes. The Possibilistic… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Journal ref: Proc. SPIE 110120, Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXIV (10 May 2019)

  30. arXiv:1809.06576  [pdf, other

    cs.CV

    U-Net for MAV-based Penstock Inspection: an Investigation of Focal Loss in Multi-class Segmentation for Corrosion Identification

    Authors: Ty Nguyen, Tolga Ozaslan, Ian D. Miller, James Keller, Giuseppe Loianno, Camillo J. Taylor, Daniel D. Lee, Vijay Kumar, Joseph H. Harwood, Jennifer Wozencraft

    Abstract: Periodical inspection and maintenance of critical infrastructure such as dams, penstocks, and locks are of significant importance to prevent catastrophic failures. Conventional manual inspection methods require inspectors to climb along a penstock to spot corrosion, rust and crack formation which is unsafe, labor-intensive, and requires intensive training. This work presents an alternative approac… ▽ More

    Submitted 18 September, 2018; originally announced September 2018.

    Comments: 8 Pages, 4 figures

  31. arXiv:1709.10180  [pdf, other

    cs.CV

    Possibilistic Fuzzy Local Information C-Means for Sonar Image Segmentation

    Authors: Alina Zare, Nicholas Young, Daniel Suen, Thomas Nabelek, Aquila Galusha, James Keller

    Abstract: Side-look synthetic aperture sonar (SAS) can produce very high quality images of the sea-floor. When viewing this imagery, a human observer can often easily identify various sea-floor textures such as sand ripple, hard-packed sand, sea grass and rock. In this paper, we present the Possibilistic Fuzzy Local Information C-Means (PFLICM) approach to segment SAS imagery into sea-floor regions that exh… ▽ More

    Submitted 28 September, 2017; originally announced September 2017.

    Comments: 8 pages, 11 figures, to appear in the 2017 IEEE Symposium Series on Computational Intelligence (SSCI) Proceedings

  32. arXiv:1510.02055  [pdf, other

    cs.CV

    Diverse Large-Scale ITS Dataset Created from Continuous Learning for Real-Time Vehicle Detection

    Authors: Justin A. Eichel, Akshaya Mishra, Nicholas Miller, Nicholas Jankovic, Mohan A. Thomas, Tyler Abbott, Douglas Swanson, Joel Keller

    Abstract: In traffic engineering, vehicle detectors are trained on limited datasets resulting in poor accuracy when deployed in real world applications. Annotating large-scale high quality datasets is challenging. Typically, these datasets have limited diversity; they do not reflect the real-world operating environment. There is a need for a large-scale, cloud based positive and negative mining (PNM) proces… ▽ More

    Submitted 7 October, 2015; originally announced October 2015.

    Comments: 13 pages, 11 figures

  33. arXiv:1508.05228  [pdf, other

    cs.CR cs.OS

    A Case Study on Covert Channel Establishment via Software Caches in High-Assurance Computing Systems

    Authors: Wolfgang Schmidt, Michael Hanspach, Jörg Keller

    Abstract: Covert channels can be utilized to secretly deliver information from high privileged processes to low privileged processes in the context of a high-assurance computing system. In this case study, we investigate the possibility of covert channel establishment via software caches in the context of a framework for component-based operating systems. While component-based operating systems offer securi… ▽ More

    Submitted 21 August, 2015; originally announced August 2015.

    Comments: 12 pages, based upon the master's thesis of Schmidt

  34. arXiv:1505.07757  [pdf, other

    cs.MM cs.CY

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Authors: Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller

    Abstract: Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different desig… ▽ More

    Submitted 28 May, 2015; originally announced May 2015.

    Comments: 20 pages, 7 figures, 4 tables

  35. arXiv:1403.1165  [pdf, other

    cs.CR cs.OS cs.SD

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Authors: Michael Hanspach, Jörg Keller

    Abstract: We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Comments: 9 pages

    Journal ref: In Proceedings of the 7th Layered Assurance Workshop, New Orleans, LA, USA, December 2013

  36. arXiv:1211.4414  [pdf, ps, other

    cs.DB cs.CG cs.DC

    Towards a Scalable Dynamic Spatial Database System

    Authors: Joaquín Keller, Raluca Diaconu, Mathieu Valero

    Abstract: With the rise of GPS-enabled smartphones and other similar mobile devices, massive amounts of location data are available. However, no scalable solutions for soft real-time spatial queries on large sets of moving objects have yet emerged. In this paper we explore and measure the limits of actual algorithms and implementations regarding different application scenarios. And finally we propose a nove… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

    Comments: (2012)

  37. arXiv:1210.6411  [pdf, other

    cs.DC cs.CR cs.DS

    A structural analysis of the A5/1 state transition graph

    Authors: Andreas Beckmann, Jaroslaw Fedorowicz, Jörg Keller, Ulrich Meyer

    Abstract: We describe efficient algorithms to analyze the cycle structure of the graph induced by the state transition function of the A5/1 stream cipher used in GSM mobile phones and report on the results of the implementation. The analysis is performed in five steps utilizing HPC clusters, GPGPU and external memory computation. A great reduction of this huge state transition graph of 2^64 nodes is achieve… ▽ More

    Submitted 23 October, 2012; originally announced October 2012.

    Comments: In Proceedings GRAPHITE 2012, arXiv:1210.6118

    Journal ref: EPTCS 99, 2012, pp. 5-19

  38. arXiv:0810.0852  [pdf, ps, other

    math.HO cs.IR physics.soc-ph

    Evaluation of Authors and Journals

    Authors: Joseph B. Keller

    Abstract: A method is presented for evaluating authors on the basis of citations. It assigns to each author a citation score which depends upon the number of times he is cited, and upon the scores of the citers. The scores are found to be the components of an eigenvector of a normalized citation matrix. The same method can be applied to citation of journals by other journals, to evaluating teams in a leag… ▽ More

    Submitted 5 October, 2008; originally announced October 2008.

    Comments: 6 pages

  39. arXiv:cs/0105028  [pdf, ps, other

    cs.CR cs.DS

    When being Weak is Brave: Privacy in Recommender Systems

    Authors: Naren Ramakrishnan, Benjamin J. Keller, Batul J. Mirza, Ananth Y. Grama, George Karypis

    Abstract: We explore the conflict between personalization and privacy that arises from the existence of weak ties. A weak tie is an unexpected connection that provides serendipitous recommendations. However, information about weak ties could be used in conjunction with other sources of data to uncover identities and reveal other personal information. In this article, we use a graph-theoretic model to stud… ▽ More

    Submitted 18 May, 2001; originally announced May 2001.

    ACM Class: H.4.2

  40. arXiv:cs/0104009  [pdf, ps, other

    cs.IR cs.DM cs.DS

    Evaluating Recommendation Algorithms by Graph Analysis

    Authors: Batul J. Mirza, Benjamin J. Keller, Naren Ramakrishnan

    Abstract: We present a novel framework for evaluating recommendation algorithms in terms of the `jumps' that they make to connect people to artifacts. This approach emphasizes reachability via an algorithm within the implicit graph structure underlying a recommender dataset, and serves as a complement to evaluation in terms of predictive accuracy. The framework allows us to consider questions relating alg… ▽ More

    Submitted 3 April, 2001; originally announced April 2001.

    ACM Class: H.4.2