scispace - formally typeset
Search or ask a question
Institution

University of Mannheim

EducationMannheim, Germany
About: University of Mannheim is a education organization based out in Mannheim, Germany. It is known for research contribution in the topics: Context (language use) & Politics. The organization has 4448 authors who have published 12918 publications receiving 446557 citations. The organization is also known as: Uni Mannheim & UMA.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper investigates how consistency can be established for replicated applications changing their state in reaction to user-initiated operations as well as the passing of time and presents a timewarp scheme that complements local-lag by guaranteeing consistency and correctness for replicated continuous applications.
Abstract: In this paper, we investigate how consistency can be established for replicated applications changing their state in reaction to user-initiated operations as well as the passing of time. Typical examples of these applications are networked computer games and distributed virtual environments. We give a formal definition of the terms consistency and correctness for this application class. Based on these definitions, it is shown that an important tradeoff relationship exists between the responsiveness of the application and the appearance of short-term inconsistencies. We propose to exploit the knowledge of this tradeoff by voluntarily decreasing the responsiveness of the application in order to eliminate short-term inconsistencies. This concept is called local-lag. Furthermore, a timewarp scheme is presented that complements local-lag by guaranteeing consistency and correctness for replicated continuous applications. The computational complexity of the timewarp algorithm is determined in theory and practice by examining a simple networked computer game. The timewarp scheme is then compared to the well-known dead-reckoning approach. It is shown that the choice between both schemes is application-dependent.

252 citations

Journal ArticleDOI
TL;DR: In this article, two gravity models for the estimation of air passenger volume between city-pairs are presented, one model is limited to city pairs with airports not subject to competition from airports in the vicinity, while the other model includes all city pairs.

249 citations

Journal ArticleDOI
TL;DR: In this paper, a hierarchical approach to personality developed by Mowen (Mowen J. The 3M Model of Motivation and Personality) was used to predict consumer intentions to purchase products and services online.

248 citations

Journal ArticleDOI
TL;DR: In this paper, the authors analyzed credit file data from four major German banks and found evidence that the combined use of financial and non-financial factors leads to a more accurate prediction of future default events than the single use of each of these factors.
Abstract: Internal credit ratings are expected to gain in importance because of their potential use for determining regulatory capital adequacy and banks' increasing focus on the risk-return profile in commercial lending. Whereas the eligibility of financial factors as inputs for internal credit ratings is widely accepted, the role of non-financial factors remains ambiguous. Analyzing credit file data from four major German banks, we find evidence that the combined use of financial and non-financial factors leads to a more accurate prediction of future default events than the single use of each of these factors.

248 citations

Book ChapterDOI
21 Sep 2009
TL;DR: This work investigates keylogger-based stealing of credentials via dropzones, anonymous collection points of illicitly collected data, and presents an empirical study of this phenomenon, giving many first-hand details about the attacks that were observed during a seven-month period between April and October 2008.
Abstract: We study an active underground economy that trades stolen digital credentials In particular, we investigate keylogger-based stealing of credentials via dropzones, anonymous collection points of illicitly collected data Based on the collected data from more than 70 dropzones, we present an empirical study of this phenomenon, giving many first-hand details about the attacks that were observed during a seven-month period between April and October 2008 We found more than 33 GB of keylogger data, containing stolen information from more than 173,000 victims Analyzing this data set helps us better understand the attacker's motivation and the nature and size of these emerging underground marketplaces

247 citations


Authors

Showing all 4522 results

NameH-indexPapersCitations
Andreas Kugel12891075529
Jürgen Rehm1261132116037
Norbert Schwarz11748871008
Andreas Hochhaus11792368685
Barry Eichengreen11694951073
Herta Flor11263848175
Eberhard Ritz111110961530
Marcella Rietschel11076565547
Andreas Meyer-Lindenberg10753444592
Daniel Cremers9965544957
Thomas Brox9932994431
Miles Hewstone8841826350
Tobias Banaschewski8569231686
Andreas Herrmann8276125274
Axel Dreher7835020081
Network Information
Related Institutions (5)
Carnegie Mellon University
104.3K papers, 5.9M citations

88% related

George Mason University
39.9K papers, 1.3M citations

87% related

London School of Economics and Political Science
35K papers, 1.4M citations

87% related

Lancaster University
44.5K papers, 1.6M citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202337
2022138
2021827
2020747
2019710
2018620