scispace - formally typeset
Search or ask a question
Institution

Deutsche Telekom

CompanyWelwyn Garden City, United Kingdom
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Terminal (electronics). The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.


Papers
More filters
Book ChapterDOI
16 May 2006
TL;DR: The proposed framework, Jiminy, is a framework for explicitly rewarding users who participate in reputation management systems by submitting ratings and facilitates a probabilistic mechanism to detect dishonesty and halt rewards accordingly.
Abstract: In this paper we present the design, implementation, and evaluation of Jiminy: a framework for explicitly rewarding users who participate in reputation management systems by submitting ratings. To defend against participants who submit random or malicious ratings in order to accumulate rewards, Jiminy facilitates a probabilistic mechanism to detect dishonesty and halt rewards accordingly. Jiminy's reward model and honesty detection algorithm are presented and its cluster-based implementation is described. The proposed framework is evaluated using a large sample of real-world user ratings in order to demonstrate its effectiveness. Jiminy's performance and scalability are analysed through experimental evaluation. The system is shown to scale linearly with the on-demand addition of slave machines to the Jiminy cluster, allowing it to successfully process large problem spaces.

16 citations

Journal ArticleDOI
TL;DR: In this paper, the authors examined whether high-tech start-ups are mainly founded in scientific and infrastructural well suited regions or not, based on the ZEW-Foundation Panel East, and found that specific human capital, knowledge spillovers at higher-education institutions are more important for founding a firm in one of the hightech sectors compared with the effects of other publicly financed institutions.
Abstract: Our research, based on the ZEW-Foundation Panel East, examines whether high-tech start-ups are mainly founded in scientific and infrastructural well suited regions or not. Estimation results on the level of postcode areas confirm the hypothesis that specific human capital, knowledge spillovers at higher-education institutions are more important for founding a firm in one of the high-tech sectors compared with the effects of other publicly financed institutions. The existence of large companies in the manufacturing sector has a considerable effect for start-up activities in this region in general. Moreover, high-tech start-ups are more concentrated within or near technology and foundation centres.

16 citations

Book ChapterDOI
03 Oct 2007
TL;DR: A two- person zero-sum non-cooperative Markov security game framework is presented as a basis for modeling the interaction between the attackers who generate malware traffic on a network and a corresponding intrusion detection system (IDS).
Abstract: We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop optimal detector algorithms taking into account attacker strategies and actions. Assuming rational and intelligent attackers, we present a two-person zero-sum non-cooperative Markov security game framework as a basis for modeling the interaction between the attackers who generate malware traffic on a network and a corresponding intrusion detection system (IDS). Thus, we establish a formal model of the detector placement problem based on game theory and derive optimal strategies for both players. In addition, we test the strategies obtained in a realistic agent-based network simulation environment and compare the results of static and dynamic placement scenarios. The obtained IDS strategies and the corresponding simulation results provide interesting insights into how to optimally deploy malware detectors in a network environment.

16 citations

Journal ArticleDOI
TL;DR: It is shown, that continuous scheduling is much better suited to serve VoIP traffic than on-demand scheduling, which is typically deployed in 802.11-based WMNs and is therefore not optimal from a network operator's point of view.

16 citations

Patent
23 Jul 2014
TL;DR: In this article, a method for utilizing a secure credential vault on a mobile computing device includes: prompting a user for and receiving from the user a credential vault password, prompting the user for receiving a near-field communication (NFC) security token from a NFC-enabled device, verifying the credential vault passwords and the received NFC security token, and opening a secure session with the secure vault in response to successful verification.
Abstract: A method for utilizing a secure credential vault on a mobile computing device includes: prompting a user for and receiving from the user a credential vault password; prompting a user for and receiving a near-field communication (NFC) security token from a NFC-enabled device; verifying the credential vault password and the received NFC security token; and opening a secure session with the secure credential vault in response to successful verification.

16 citations


Authors

Showing all 3475 results

NameH-indexPapersCitations
Jörg Müller6740715282
Anja Feldmann6734017422
Yuval Elovici6254414451
Lior Rokach5535719989
Pan Hui5246817724
Hartmut G. Roskos504349643
Wolfgang Haase5062411634
Shlomi Dolev4851610435
Jean-Pierre Seifert452987516
Stefan Schmid455619088
Fabian Schneider441647437
Karsten Buse433947774
Tansu Alpcan432937840
Florian Metze423187148
Christian Bauckhage422858313
Network Information
Related Institutions (5)
Nokia
28.3K papers, 695.7K citations

90% related

Ericsson
35.3K papers, 584.5K citations

89% related

Alcatel-Lucent
53.3K papers, 1.4M citations

87% related

Fujitsu
75K papers, 827.5K citations

85% related

Bell Labs
59.8K papers, 3.1M citations

84% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20227
202139
202061
201984
201897