Exploring Reciprocal Exchanges and Trust-Based Authorizations: A Feasibility Demonstration with Location-Based Services |
Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Bohm |
|
Combining simulation and experimental data via surrogate modelling of continuum dislocation dynamics simulations |
Balduin Katzer, Daniel Betsche, Felix von Hoegen, Benjamin Jochum, Klemens Böhm, Katrin Schulz |
Modelling and Simulation in Materials Science and Engineering (2024). DOI: 10.1088/1361-651X/ad4b4c |
Alternative feature selection with user control |
Jakob Bach, Klemens Böhm |
International Journal of Data Science and Analytics (2024). DOI: 10.1007/s41060-024-00527-8 |
Adaptive Bernstein Change Detector for High-Dimensional Data Streams |
Marco Heyden, Edouard Fouché, Vadim Arzamasov, Tanja Fenn, Florian Kalinke, Klemens Böhm |
Data Mining and Knowledge Discovery (2024). DOI: 10.1007/s10618-023-00999-5 |
CH-Bench: a user-oriented benchmark for systems for efficient distant reading (design, performance, and insights) |
Jens Willkomm, Markus Raster, Martin Schäler, Klemens Böhm |
International Journal on Digital Libraries (2023). DOI: 10.1007/s00799-023-00347-4 |
Reduction of data-value-aware process models: A relevance-based approach |
Elaheh Ordoni, Jutta Mülle, Klemens Böhm |
Information Systems (2023). DOI: 10.1016/j.is.2022.102157 |
An Empirical Evaluation of Constrained Feature Selection |
Jakob Bach, Kolja Zoller, Holger Trittenbach, Katrin Schulz, Klemens Böhm |
SN Computer Science (2022). DOI: 10.1007/s42979-022-01338-z |
Analyzing and Predicting Verification of Data-Aware Process Models—A Case Study With Spectrum Auctions |
Elaheh Ordoni, Jakob Bach, Ann-Katrin Fleck |
IEEE Access (2022). DOI: 10.1109/ACCESS.2022.3154445 |
Effcient SVDD Sampling with Approximation Guarantees for the Decision Boundary |
Adrian Englhardt, Holger Trittenbach, Daniel Kottke, Bernhard Sick, Klemens Böhm |
Machine Learning (2022). DOI: 10.1007/s10994-022-06149-0 |
Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data |
Georg Steinbuss, Klemens Böhm |
ACM Transactions on Knowledge Discovery from Data (TKDD) (2021). DOI: 10.1145/3441453 |
Efficient Subspace Search in Data Streams |
Edouard Fouché, Florian Kalinke, Klemens Böhm |
Information Systems (2021). DOI: 10.1016/j.is.2020.101705.
|
An overview and a benchmark of active learning for outlier detection with one-class classifiers |
Holger Trittenbach, Adrian Englhardt, Klemens Böhm |
Expert Systems with Applications (2021). DOI: 10.1016/j.eswa.2020.114372 |
A framework for dependency estimation in heterogeneous data streams |
Edouard Fouché, Alan Mazankiewicz, Florian Kalinke, Klemens Böhm |
Distributed and Parallel Databases (2021). DOI: 10.1007/s10619-020-07295-x |
Secrecy and performance models for query processing on outsourced graph data |
Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm |
Distributed and Parallel Databases (2021). DOI: 10.1007/s10619-020-07284-0 |
Data-driven exploration and continuum modeling of dislocation networks |
Markus Sudmanns, Jakob Bach, Katrin Schulz |
Modelling and Simulation in Materials Science and Engineering (2020). DOI: 10.1088/1361-651X/ab97ef |
An Ensemble Technique for Better Decisions Based on Data Streams and its Application to Data Privacy |
Fabian Laforet, Christian Olms, Rudolf Biczok, Klemens Böhm |
IEEE Transactions on Knowledge an Data Engineering (2020). DOI: 10.1109/TKDE.2020.2977035 |
Preserving Secrecy in Mobile Social Networks |
Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm |
ACM Transactions on Cyber-Physical Systems (2020). DOI: 10.1145/3396071 |
Improving Semantic Change Analysis by Combining Word Embeddings and Word Frequencies |
Adrian Englhardt, Jens Willkomm, Martin Schäler, Klemens Böhm |
International Journal on Digital Libraries (2020). DOI: 10.1007/s00799-019-00271-6 |
Towards More Meaningful Notions of Similarity in NLP Embedding Models |
Ábel Elekes, Adrian Englhardt, Martin Schäler, Klemens Böhm |
International Journal on Digital Libraries (2020). DOI: 10.1007/s00799-018-0237-y |
On the Usefulness of SQL-Query-Similarity Measures to Find User Interests |
Natalia Arzamasova, Klemens Böhm, Bertrand Goldman, Christian Saaler, Martin Schäler |
IEEE Transactions on Knowledge and Data Engineering (2019). DOI: 10.1109/TKDE.2019.2913381 |
Reducing Energy Time Series for Energy System Models via Self-Organizing Maps |
Hasan Ümitcan Yilmaz, Edouard Fouché, Thomas Dengiz, Lucas Krauß, Dogan Keles, Wolf Fichtner |
it - Information Technology (2019). DOI: 10.1515/itit-2019-0025 |
Understanding the Effects of Temporal Energy-Data Aggregation on Clustering Quality |
Holger Trittenbach, Jakob Bach, Klemens Böhm |
it - Information Technology (2019). DOI: 10.1515/itit-2019-0014 |
How Meaningful Are Similarities in Deep Trajectory Representations? |
Saeed Taghizadeh, Ábel Elekes, Martin Schäler, Klemens Böhm |
Information Systems (2019): DOI: 10.1016/j.is.2019.101452 |
Data-driven crack assessment based on surface measurements |
Katrin Schulz, Stephan Kreis, Holger Trittenbach, Klemens Böhm |
Engineering Fracture Mechanics (2019). DOI: 10.1016/j.engfracmech.2019.106552 |
A Practical Data-Flow Verification Scheme for Business Processes |
Jutta Mülle, Christine Tex, Klemens Böhm |
Information Systems (2019). DOI: 10.1016/j.is.2018.12.002 |
Dimension-based Subspace Search for Outlier Detection |
Holger Trittenbach, Klemens Böhm |
International Journal of Data Science and Analytics (2019). DOI: 10.1007/s41060-018-0137-7 |
Cleaning Antipatterns in SQL Query Log |
Natalia Arzamasova, Martin Schäler, Klemens Böhm |
IEEE Transactions on Knowledge and Data Engineering |
Hiding Outliers in High-Dimensional Data Spaces |
Georg Steinbuss, Klemens Böhm |
International Journal of Data Science and Analytics |
An Evaluation of Combinations of Lossy Compression and Change-Detection Approaches for Time-Series Data |
Gregor Hollmig, Matthias Horne, Simon Leimkühler, Frederik Schöll, Carsten Strunk, Adrian Englhardt, Pavel Efros, Erik Buchmann, Klemens Böhm |
Information Systems |
How to Quantify the Impact of Lossy Transformations on Event Detection |
Pavel Efros, Erik Buchmann, Adrian Englhardt, Klemens Böhm |
Big Data Research, special issue on Online Forecasting and Proactive Analytics in the Big Data Era, Elsevier Science Publisher, 2017 |
Property Specification, Process Verification, and Reporting - a Case Study with Vehicle-Commissioning Processes |
Richard Mrasek, Jutta Mülle, Klemens Böhm, Michael Becker, Christian Allmann |
Information Systems, 56: 326-346, (2016) |
Protecting the Dawid-Skene Algorithm against Low-Competence Raters and Collusion Attacks with Gold-Selection Strategies |
Conny Kühne, Klemens Böhm
|
Social Network Analysis and Mining, Springer Verlag 2015
|
Individual privacy constraints on time-series data |
Fabian Laforet, Erik Buchmann, Klemens Böhm
|
Information Systems, Volume 54, 2015, Pages 74–91
|
Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clusterin |
Andranik Khachatryan, Emmanuel Müller, Christian Stier, Klemens Böhm
|
IEEE Transactions on Knowledge and Data Engineering
|
A Time-Series Compression Technique and its Application to the Smart Grid |
Frank Eichinger, Pavel Efros, Stamatis Karnouskos, Klemens Böhm |
The VLDB Journal 24(2), 193-218, 2015
|
Detecting Data-Flow Errors in BPMN 2.0 |
Silvia von Stackelberg, Susanne Putze, Jutta Mülle, Klemens Böhm
|
Open Journal of Information Systems (OJIS)
|
Deriving Bounds on the Size of Spatial Areas |
Erik Buchmann, Patrick Erik Bradley, Klemens Böhm
|
Open Journal of Databases (OJDB)
|
Allocative and Strategic Effects of Privacy Enhancement in Smart Grids |
Stephan Kessler, Christoph M Flath, Klemens Böhm |
Information Systems Special Issue on Information Integrity in Smart Grid Systems
|
Identity Business Processes |
Jens Müller, Klemens Böhm |
International Journal of Trust Management in Computing and Communications, Inderscience Publishers, 2014.
|
Towards Effective Structure-Based Assessment of Proposals and Arguments in Online Deliberation |
Sanja Tanasijevic, Klemens Böhm |
Erscheint in International Journal of Systems and Service-Oriented Engineering (IJSSOE), Special Issue on Social Media Systems and Services, IGI Global, 2014.
|
A Near-Linear Time Subspace Search Scheme for Unsupervised Selection of Correlated Features |
Hoang Vu Nguyen, Emmanuel Müller, Klemens Böhm |
Big Data Research Journal, Elsevier (2014) |
A New Verification Technique for Large Processes Based on Identification of Relevant Tasks |
Richard Mrasek, Jutta Mülle, Klemens Böhm |
Information Systems Journal, Elsevier Science Publisher, 2014
|
Unsupervised Interaction-Preserving Discretization of Multivariate Data |
|
|
Data Mining for Defects in Multicore Applications: An Entropy-Based Call-Graph Technique |
Frank Eichinger, Victor Pankratius, Klemens Böhm |
Concurrency and Computation: Practice and Experience 26(1), 1-20, 2014 |
Improved Bibliographic Reference Parsing Based on Repeated Patterns |
Guido Sautter, Klemens Böhm |
International Journal on Digital Libraries, Springer Verlag, 2014
|
Pattern-sensitive Time-series Anonymization and its Application to Energy-Consumption Data |
Stephan Kessler, Erik Buchmann, Thorben Burghardt, Klemens Böhm
|
Journal: OJIS 2014, 1(1), Pages 3-22
|
Efficient and secure exact-match queries in outsourced databases |
Clemens Heidinger, Klemens Böhm, Erik Buchmann, Martin Spoo
|
World Wide Web Journal
|
Re-identification of Smart Meter data |
Erik Buchmann, Klemens Böhm, Thorben Burghardt and Stephan Kessler |
Personal and Ubiquitous Computing, 17(4), 653-662.
|
Efficient and Secure Exact-Match Queries in Outsourced Databases |
Clemens Heidinger, Klemens Böhm, Erik Buchmann, Martin Spoo |
World Wide Web, Springer Verlag, 2013
|
Graphs for Mining-Based Defect Localization in Multithreaded Programs |
Christopher Oßner, Klemens Böhm |
International Journal of Parallel Programming, Volume 41, Issue 4 (2013), Page 570-593 |
Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests |
Thorben Burghardt, Klemens Böhm, Achim Guttmann, and Chris Clifton |
Transactions on Data Privacy 4:1 (2011) 31 - 50 |
Impact assessment in public policy: Towards a Web 2.0 application |
Clemens Heidinger, Erik Buchmann, and Klemens Böhm |
Information Polity – The International Journal of Government and Democracy in the Information Age |
Fault-Tolerant Query Processing for Structured Peer-to-Peer Systems |
Markus Bestehorn
Christian von der Weth
Erik Buchmann
Klemens Böhm |
Distributed and Paralell Databases - An International Journal
|
Count Suffix Trees for Natural Language Data |
Guido Sautter, Klemens Böhm |
International Journal of Data Engineering (IJDE), 3(1), 2012
|
Assessing the Suitability of an Honest Rating Mechanism for the Collaborative Creation of Structured Knowledge |
Conny Kühne, Klemens Böhm |
World Wide Web, Springer Verlag, 2012
|
A Study of the Impact of Structure on Coope¬ration in Networks |
Stefan Schosser, Klemens Böhm, Bodo Vogt |
Web Intelligence and Agent Systems: An International Journal, 9(3), 2011
|
From Source Code to Runtime Behaviour: Software Metrics Help to Select the Computer Architecture |
Frank Eichinger, David Kramer, Klemens Böhm, Wolfgang Karl |
Knowledge-Based Systems 23(4), 343-349, 2010
Proceedings of the 29th BCS SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence (AI), Cambridge, UK, 2009 |
Das datenscutzrechtliche Vollzugsdefizit im Bereich der Telemedien - ein Schreckensbericht |
Jürgen Kühling, Anastasios Sivridis, Mathis Schwuchow, Thorben Burghardt |
Datenschutz und Datensicherheit (DUD), 06/2009 |
Incentivizing connectivity in structured Peer-to-Peer systems |
Björn-Oliver Hartmann, Klemens Böhm, Andranik Khachatryan, Stephan Schosser, and Bodo Vogt. |
In: Web Intelligence and Agent Systems An International Journal, IOS Press, vol. 8, no. 2, pp. 123-147, 2010. |
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption. |
Markus Bestehorn, Zinaida Benenson, Erik Buchmann, Marek Jawurek, Klemens Böhm, and Felix Freiling. |
In: Ad Hoc and Sensor Wireless Networks, 2009. |
Automated derivation of executable business processes from choreographies in virtual organisations. |
Ingo Weber, Jochen Haller, Jutta Mülle |
Int. Journal of Business Process Integration and Management, Vol. 3, No. 2, 2008, pp. 85 - 95 |
Towards a Systematic Evaluation of Protein Mutation Extraction Systems |
René Witte, Christopher J. O. Baker |
Journal of Bioinformatics and Computational Biology (JBCB), Volume 5, Issue 6, December 2007, pp.1339-1359. |
Enhanced Semantic Access to the Protein Engineering Literature using Ontologies Populated by Text Mining |
René Witte, Thomas Kappler, Christopher J. O. Baker |
International Journal of Bioinformatics Research and Applications (IJBRA), Volume 3, Issue 3, 2007. PMID: 18048198. |
A Combined Approach to Find all Taxon Names (FAT) in Legacy Biosystematics Literature |
Guido Sautter, Donat Agosti, Klemens Böhm |
Biodiversity Informatics 2006. |
Free-Riding-Aware Forwarding in Content-Addressable Networks |
Klemens Böhm, Erik Buchmann |
VLDB Journal, 2005 |
Verteiltes Webcrawling in einer Peer-to-Peer-Umgebung |
Holger Steinhaus, Klemens Böhm |
Datenbank Spektrum, Heft 13/Mai 05 |
Von den Eigenschaften zur Architektur |
P.C.Lockemann, J.Nimis |
it - Information Technology 47:1 (2005), 28-35 |
PowerDB-IR – Scalable Information Retrieval and Storage on Top of a Database Cluster |
Torsten Grabs, Klemens Böhm, Hans-Jörg Schek |
Knowledge and Information Systems 6(4): 465-505, 2004 |