default search action
Klemens Böhm
Person information
- affiliation: Karlsruhe Institute of Technology, IPD, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Marco Heyden, Edouard Fouché, Vadim Arzamasov, Tanja Fenn, Florian Kalinke, Klemens Böhm:
Adaptive Bernstein change detector for high-dimensional data streams. Data Min. Knowl. Discov. 38(3): 1334-1363 (2024) - [j71]Jakob Bach, Klemens Böhm:
Correction to: Alternative feature selection with user control. Int. J. Data Sci. Anal. 18(3): 349-350 (2024) - [c192]Daniel Ebi, Edouard Fouché, Marco Heyden, Klemens Böhm:
MicroPPO: Safe Power Flow Management in Decentralized Micro-Grids with Proximal Policy Optimization. DSAA 2024: 1-10 - [c191]Tu Anh Dinh, Carlos Mullov, Leonard Bärmann, Zhaolin Li, Danni Liu, Simon Reiß, Jueun Lee, Nathan Lerzer, Jianfeng Gao, Fabian Peller-Konrad, Tobias Röddiger, Alexander Waibel, Tamim Asfour, Michael Beigl, Rainer Stiefelhagen, Carsten Dachsbacher, Klemens Böhm, Jan Niehues:
SciEx: Benchmarking Large Language Models on Scientific Exams with Human Expert Grading and Automatic Grading. EMNLP 2024: 11592-11610 - [c190]Marco Heyden, Vadim Arzamasov, Edouard Fouché, Klemens Böhm:
Budgeted Multi-Armed Bandits with Asymmetric Confidence Intervals. KDD 2024: 1073-1084 - [c189]Béla H. Böhnke, Edouard Fouché, Klemens Böhm:
DEAL: Data-Efficient Active Learning for Regression Under Drift. PAKDD (6) 2024: 188-200 - [c188]Marco Heyden, Heitor Murilo Gomes, Edouard Fouché, Bernhard Pfahringer, Klemens Böhm:
Leveraging Plasticity in Incremental Decision Trees. ECML/PKDD (5) 2024: 38-54 - [c187]Daniel Betsche, Balduin Katzer, Katrin Schulz, Klemens Böhm:
Towards a Temporal Graph Query Language for Durable Patterns. SSDBM 2024: 13:1-13:4 - [i21]Tobias Fuchs, Florian Kalinke, Klemens Böhm:
Uncertainty-Aware Partial-Label Learning. CoRR abs/2402.00592 (2024) - [i20]Jose Cribeiro-Ramallo, Vadim Arzamasov, Klemens Böhm:
Efficient Generation of Hidden Outliers for Improved Outlier Detection. CoRR abs/2402.03846 (2024) - [i19]Jose Cribeiro-Ramallo, Vadim Arzamasov, Federico Matteucci, Denis Wambold, Klemens Böhm:
Generative Subspace Adversarial Active Learning for Outlier Detection in Multiple Views of High-dimensional Data. CoRR abs/2404.14451 (2024) - [i18]Tu Anh Dinh, Carlos Mullov, Leonard Bärmann, Zhaolin Li, Danni Liu, Simon Reiß, Jueun Lee, Nathan Lerzer, Fabian Tërnava, Jianfeng Gao, Alexander Waibel, Tamim Asfour, Michael Beigl, Rainer Stiefelhagen, Carsten Dachsbacher, Klemens Böhm, Jan Niehues:
SciEx: Benchmarking Large Language Models on Scientific Exams with Human Expert Grading and Automatic Grading. CoRR abs/2406.10421 (2024) - [i17]Federico Matteucci, Vadim Arzamasov, Jose Cribeiro-Ramallo, Marco Heyden, Konstantin Ntounas, Klemens Böhm:
Generalizability of experimental studies. CoRR abs/2406.17374 (2024) - [i16]Vadim Arzamasov, Klemens Böhm:
Evaluating Privacy Measures for Load Hiding. CoRR abs/2408.06460 (2024) - 2023
- [j70]Elaheh Ordoni, Jutta A. Mülle, Klemens Böhm:
Reduction of data-value-aware process models: A relevance-based approach. Inf. Syst. 114: 102157 (2023) - [j69]Jens Willkomm, Markus Raster, Martin Schäler, Klemens Böhm:
CH-Bench: a user-oriented benchmark for systems for efficient distant reading (design, performance, and insights). Int. J. Digit. Libr. 24(4): 243-261 (2023) - [c186]Florian Kalinke, Edouard Fouché, Haiko Thiessen, Klemens Böhm:
Multi-kernel Times Series Outlier Detection. DS 2023: 688-702 - [c185]Federico Matteucci, Vadim Arzamasov, Klemens Böhm:
A benchmark of categorical encoders for binary classification. NeurIPS 2023 - [i15]Marco Heyden, Vadim Arzamasov, Edouard Fouché, Klemens Böhm:
Budgeted Multi-Armed Bandits with Asymmetric Confidence Intervals. CoRR abs/2306.07071 (2023) - [i14]Marco Heyden, Edouard Fouché, Vadim Arzamasov, Tanja Fenn, Florian Kalinke, Klemens Böhm:
Adaptive Bernstein Change Detector for High-Dimensional Data Streams. CoRR abs/2306.12974 (2023) - [i13]Federico Matteucci, Vadim Arzamasov, Klemens Böhm:
A benchmark of categorical encoders for binary classification. CoRR abs/2307.09191 (2023) - 2022
- [j68]Mirela T. Cazzolato, Agma J. M. Traina, Klemens Böhm:
Establishing trajectories of moving objects without identities: The intricacies of cell tracking and a solution. Inf. Syst. 105: 101955 (2022) - [j67]Christine Tex, Martin Schäler, Klemens Böhm:
Swellfish privacy: Supporting time-dependent relevance for continuous differential privacy. Inf. Syst. 109: 102079 (2022) - [j66]Adrian Englhardt, Holger Trittenbach, Daniel Kottke, Bernhard Sick, Klemens Böhm:
Efficient SVDD sampling with approximation guarantees for the decision boundary. Mach. Learn. 111(4): 1349-1375 (2022) - [j65]Jakob Bach, Kolja Zoller, Holger Trittenbach, Katrin Schulz, Klemens Böhm:
An Empirical Evaluation of Constrained Feature Selection. SN Comput. Sci. 3(6): 445 (2022) - [c184]Elaheh Ordoni, Jutta A. Mülle, Klemens Böhm:
Results from the Verification of Models of Spectrum Auctions. BMSD 2022: 54-68 - [c183]Jakob Bach, Markus Iser, Klemens Böhm:
A Comprehensive Study of k-Portfolios of Recent SAT Solvers. SAT 2022: 2:1-2:18 - [c182]Elaheh Ordoni, Jutta A. Mülle, Kuan Yang, Klemens Böhm:
Efficient Verification of Process Models Supporting Modifications of Data Values. CBI (1) 2022: 21-30 - [i12]Florian Kalinke, Marco Heyden, Edouard Fouché, Klemens Böhm:
Scalable Online Change Detection for High-dimensional Data Streams. CoRR abs/2205.12706 (2022) - 2021
- [j64]Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm:
Secrecy and performance models for query processing on outsourced graph data. Distributed Parallel Databases 39(1): 35-77 (2021) - [j63]Edouard Fouché, Alan Mazankiewicz, Florian Kalinke, Klemens Böhm:
A framework for dependency estimation in heterogeneous data streams. Distributed Parallel Databases 39(2): 415-444 (2021) - [j62]Holger Trittenbach, Adrian Englhardt, Klemens Böhm:
An overview and a benchmark of active learning for outlier detection with one-class classifiers. Expert Syst. Appl. 168: 114372 (2021) - [j61]Natalia Arzamasova, Klemens Böhm:
Scalable and data-aware SQL query recommendations. Inf. Syst. 96: 101646 (2021) - [j60]Edouard Fouché, Florian Kalinke, Klemens Böhm:
Efficient subspace search in data streams. Inf. Syst. 97: 101705 (2021) - [j59]Saeed Taghizadeh, Ábel Elekes, Martin Schäler, Klemens Böhm:
How meaningful are similarities in deep trajectory representations? Inf. Syst. 98: 101452 (2021) - [j58]Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm:
Preserving Secrecy in Mobile Social Networks. ACM Trans. Cyber Phys. Syst. 5(1): 5:1-5:29 (2021) - [j57]Georg Steinbuss, Klemens Böhm:
Generating Artificial Outliers in the Absence of Genuine Ones - A Survey. ACM Trans. Knowl. Discov. Data 15(2): 30:1-30:37 (2021) - [j56]Georg Steinbuss, Klemens Böhm:
Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data. ACM Trans. Knowl. Discov. Data 15(4): 65:1-65:20 (2021) - [j55]Fabian Laforet, Christian Olms, Rudolf Biczok, Klemens Böhm:
An Ensemble Technique for Better Decisions Based on Data Streams and its Application to Data Privacy. IEEE Trans. Knowl. Data Eng. 33(12): 3662-3674 (2021) - [c181]Jens Willkomm, Martin Schäler, Klemens Böhm:
Accurate Cardinality Estimation of Co-occurring Words Using Suffix Trees. DASFAA (2) 2021: 721-737 - [c180]Florian Kalinke, Pawel Bielski, Snigdha Singh, Edouard Fouché, Klemens Böhm:
An Evaluation of NILM Approaches on Industrial Energy-Consumption Data. e-Energy 2021: 239-243 - [c179]Vadim Arzamasov, Klemens Böhm:
REDS: Rule Extraction for Discovering Scenarios. SIGMOD Conference 2021: 115-128 - [i11]Vadim Arzamasov, Benjamin Jochum, Klemens Böhm:
Pedagogical Rule Extraction for Learning Interpretable Models. CoRR abs/2112.13285 (2021) - 2020
- [j54]Alan Mazankiewicz, Klemens Böhm, Mario Berges:
Incremental Real-Time Personalization in Human Activity Recognition Using Domain Adaptive Batch Normalization. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4): 144:1-144:20 (2020) - [j53]Ábel Elekes, Adrian Englhardt, Martin Schäler, Klemens Böhm:
Toward meaningful notions of similarity in NLP embedding models. Int. J. Digit. Libr. 21(2): 109-128 (2020) - [j52]Adrian Englhardt, Jens Willkomm, Martin Schäler, Klemens Böhm:
Improving semantic change analysis by combining word embeddings and word frequencies. Int. J. Digit. Libr. 21(3): 247-264 (2020) - [j51]Natalia Arzamasova, Klemens Böhm, Bertrand Goldman, Christian Saaler, Martin Schäler:
On the Usefulness of SQL-Query-Similarity Measures to Find User Interests. IEEE Trans. Knowl. Data Eng. 32(10): 1982-1999 (2020) - [c178]Holger Trittenbach, Klemens Böhm, Ira Assent:
Active Learning of SVDD Hyperparameter Values. DSAA 2020: 109-117 - [c177]Vadim Arzamasov, Rebecca Schwerdt, Shahab Karrari, Klemens Böhm, Tien Bach Nguyen:
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study. e-Energy 2020: 178-195 - [c176]Birgitta König-Ries, Klemens Böhm:
Data Science - more than just Machine Learning: A summary of the Data Science Session at INFORMATIK 2020. GI-Jahrestagung 2020: 59-60 - [c175]Edouard Fouché, Yu Meng, Fang Guo, Honglei Zhuang, Klemens Böhm, Jiawei Han:
Mining Text Outliers in Document Directories. ICDM 2020: 152-161 - [c174]Adrian Englhardt, Holger Trittenbach, Dennis Vetter, Klemens Böhm:
Finding the Sweet Spot: Batch Selection for One-Class Active Learning. SDM 2020: 118-126 - [c173]Adrian Englhardt, Klemens Böhm:
Exploring the Unknown - Query Synthesis in One-Class Active Learning. SDM 2020: 145-153 - [c172]Elaheh Ordoni, Jutta A. Mülle, Klemens Böhm:
Verification of Data-Value-Aware Processes and a Case Study on Spectrum Auctions. CBI (1) 2020: 181-190 - [i10]Georg Steinbuss, Klemens Böhm:
Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data. CoRR abs/2004.06947 (2020) - [i9]Alan Mazankiewicz, Klemens Böhm, Mario Bergés:
Incremental Real-Time Personalization in Human Activity Recognition Using Domain Adaptive Batch Normalization. CoRR abs/2005.12178 (2020) - [i8]Georg Steinbuss, Klemens Böhm:
Generating Artificial Outliers in the Absence of Genuine Ones - a Survey. CoRR abs/2006.03646 (2020) - [i7]Adrian Englhardt, Holger Trittenbach, Daniel Kottke, Bernhard Sick, Klemens Böhm:
Efficient SVDD Sampling with Approximation Guarantees for the Decision Boundary. CoRR abs/2009.13853 (2020) - [i6]Edouard Fouché, Florian Kalinke, Klemens Böhm:
Efficient Subspace Search in Data Streams. CoRR abs/2011.06959 (2020)
2010 – 2019
- 2019
- [j50]Holger Trittenbach, Klemens Böhm:
Dimension-based subspace search for outlier detection. Int. J. Data Sci. Anal. 7(2): 87-101 (2019) - [j49]Jutta A. Mülle, Christine Tex, Klemens Böhm:
A practical data-flow verification scheme for business processes. Inf. Syst. 81: 136-151 (2019) - [j48]Klemens Böhm, Dominik Werle:
Energy status data. it Inf. Technol. 61(2-3): 71-72 (2019) - [j47]Holger Trittenbach, Jakob Bach, Klemens Böhm:
Understanding the effects of temporal energy-data aggregation on clustering quality. it Inf. Technol. 61(2-3): 111-123 (2019) - [c171]Daniel Popovic, Edouard Fouché, Klemens Böhm:
Unsupervised Artificial Neural Networks for Outlier Detection in High-Dimensional Data. ADBIS 2019: 3-19 - [c170]Holger Trittenbach, Klemens Böhm:
One-Class Active Learning for Outlier Detection with Multiple Subspaces. CIKM 2019: 811-820 - [c169]Michael Vollmer, Klemens Böhm:
Iterative Estimation of Mutual Information with Error Bounds. EDBT 2019: 73-84 - [c168]Georg Steinbuss, Benedikt Rzepka, Simon Bischof, Thomas Blank, Klemens Böhm:
FOBSS: Monitoring Data from a Modular Battery System. e-Energy 2019: 456-459 - [c167]Michael Vollmer, Adrian Englhardt, Holger Trittenbach, Pawel Bielski, Shahab Karrari, Klemens Böhm:
Energy Time-Series Features for Emerging Applications on the Basis of Human-Readable Machine Descriptions. e-Energy 2019: 474-481 - [c166]Dominik Werle, Daniel Warzel, Simon Bischof, Anne Koziolek, Holger Trittenbach, Klemens Böhm:
The Effect of Temporal Aggregation on Battery Sizing for Peak Shaving. e-Energy 2019: 482-485 - [c165]Ábel Elekes, Antonino Simone Di Stefano, Martin Schäler, Klemens Böhm, Matthias Keller:
Learning from Few Samples: Lexical Substitution with Word Embeddings for Short Text Classification. JCDL 2019: 111-119 - [c164]Edouard Fouché, Junpei Komiyama, Klemens Böhm:
Scaling Multi-Armed Bandit Algorithms. KDD 2019: 1449-1459 - [c163]Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm:
Mutual Authorizations: Semantics and Integration Issues. SACMAT 2019: 213-218 - [c162]Jens Willkomm, Janek Bettinger, Martin Schäler, Klemens Böhm:
Efficient Interval-focused Similarity Search under Dynamic Time Warping. SSTD 2019: 130-139 - [c161]Vadim Arzamasov, Klemens Böhm, Ignaz Rutter:
Minimizing Bias in Estimation of Mutual Information from Data Streams. SSDBM 2019: 1-12 - [c160]Edouard Fouché, Klemens Böhm:
Monte Carlo Dependency Estimation. SSDBM 2019: 13-24 - [c159]Michael Vollmer, Lukasz Golab, Klemens Böhm, Divesh Srivastava:
Informative Summarization of Numeric Data. SSDBM 2019: 97-108 - [i5]Vadim Arzamasov, Klemens Böhm:
Scenario Discovery via Rule Extraction. CoRR abs/1910.01713 (2019) - [i4]Holger Trittenbach, Klemens Böhm, Ira Assent:
Active Learning of SVDD Hyperparameter Values. CoRR abs/1912.01927 (2019) - 2018
- [j46]Natalia Arzamasova, Martin Schäler, Klemens Böhm:
Cleaning Antipatterns in an SQL Query Log. IEEE Trans. Knowl. Data Eng. 30(3): 421-434 (2018) - [c158]Mirela T. Cazzolato, Agma J. M. Traina, Klemens Böhm:
Efficient and Reliable Estimation of Cell Positions. CIKM 2018: 1043-1052 - [c157]Ábel Elekes, Adrian Englhardt, Martin Schäler, Klemens Böhm:
Resources to Examine the Quality of Word Embedding Models Trained on n-Gram Data. CoNLL 2018: 423-432 - [c156]Holger Trittenbach, Martin Gauch, Klemens Böhm, Katrin Schulz:
Towards Simulation-Data Science - A Case Study on Material Failures. DSAA 2018: 450-459 - [c155]Michael Vollmer, Ignaz Rutter, Klemens Böhm:
On Complexity and Efficiency of Mutual Information Estimation on Static and Dynamic Data. EDBT 2018: 49-60 - [c154]Holger Trittenbach, Jakob Bach, Klemens Böhm:
On the Tradeoff between Energy Data Aggregation and Clustering Quality. e-Energy 2018: 399-401 - [c153]Christine Tex, Philipp Hertweck, Martin Schäler, Klemens Böhm:
PrivEnergy: a Privacy Operator Framework Addressing Individual Concerns. e-Energy 2018: 426-428 - [c152]Simon Bischof, Holger Trittenbach, Michael Vollmer, Dominik Werle, Thomas Blank, Klemens Böhm:
HIPE: An Energy-Status-Data Set from Industrial Production. e-Energy 2018: 599-603 - [c151]Christine Tex, Martin Schäler, Klemens Böhm:
Distance-Based Data Mining over Encrypted Data. ICDE 2018: 1264-1267 - [c150]Natalia Arzamasova, Martin Schäler, Klemens Böhm:
Cleaning Antipatterns in an SQL Query Log. ICDE 2018: 1751-1752 - [c149]Jens Willkomm, Christoph Schmidt-Petri, Martin Schäler, Michael Schefczyk, Klemens Böhm:
A Query Algebra for Temporal Text Corpora. JCDL 2018: 183-192 - [c148]Vadim Arzamasov, Klemens Böhm, Patrick Jochem:
Towards Concise Models of Grid Stability. SmartGridComm 2018: 1-6 - [c147]Christine Tex, Martin Schäler, Klemens Böhm:
Towards meaningful distance-preserving encryption. SSDBM 2018: 2:1-2:12 - [c146]Edouard Fouché, Alexander Eckert, Klemens Böhm:
In-database analytics with ibmdbpy. SSDBM 2018: 31:1-31:4 - [i3]Holger Trittenbach, Adrian Englhardt, Klemens Böhm:
An Overview and a Benchmark of Active Learning for One-Class Classification. CoRR abs/1808.04759 (2018) - [i2]Edouard Fouché, Klemens Böhm:
Monte Carlo Dependency Estimation. CoRR abs/1810.02112 (2018) - 2017
- [j45]Pavel Efros, Erik Buchmann, Adrian Englhardt, Klemens Böhm:
How to Quantify the Impact of Lossy Transformations on Event Detection. Big Data Res. 9: 84-97 (2017) - [j44]Georg Steinbuss, Klemens Böhm:
Hiding outliers in high-dimensional data spaces. Int. J. Data Sci. Anal. 4(3): 173-189 (2017) - [j43]Gregor Hollmig, Matthias Horne, Simon Leimkühler, Frederik Schöll, Carsten Strunk, Adrian Englhardt, Pavel Efros, Erik Buchmann, Klemens Böhm:
An evaluation of combinations of lossy compression and change-detection approaches for time-series data. Inf. Syst. 65: 65-77 (2017) - [c145]Ábel Elekes, Martin Schäler, Klemens Böhm:
On the Various Semantics of Similarity in Word Embedding Models. JCDL 2017: 139-148 - 2016
- [j42]Christopher Oßner, Erik Buchmann, Klemens Böhm:
Identifying defective nodes in wireless sensor networks. Distributed Parallel Databases 34(4): 591-610 (2016) - [j41]Sanja Tanasijevic, Klemens Böhm:
Towards Effective Structure-Based Assessment of Proposals and Arguments in Online Deliberation. Int. J. Syst. Serv. Oriented Eng. 6(2): 29-52 (2016) - [j40]Richard Mrasek, Jutta A. Mülle, Klemens Böhm, Michael Becker, Christian Allmann:
Property specification, process verification, and reporting - A case study with vehicle-commissioning processes. Inf. Syst. 56: 326-346 (2016) - [c144]Karl Lorey, Erik Buchmann, Klemens Böhm:
TEAL: Transparent Encryption for the Database Abstraction Layer. CAiSE Forum 2016: 145-152 - [c143]Fabian Laforet, Erik Buchmann, Klemens Böhm:
Towards provable privacy guarantees using rechargeable energy-storage devices. e-Energy 2016: 7:1-7:14 - [c142]Andranik Khachatryan, Emmanuel Müller, Klemens Böhm, Christian Stier:
Improving accuracy and robustness of self-tuning histograms by subspace clustering. ICDE 2016: 1544-1545 - [c141]Richard Mrasek, Jutta A. Mülle, Klemens Böhm:
Process Synthesis with Sequential and Parallel Constraints. OTM Conferences 2016: 43-60 - 2015
- [j39]Hoang Vu Nguyen, Emmanuel Müller, Jilles Vreeken, Klemens Böhm:
Erratum to: Unsupervised interaction-preserving discretization of multivariate data. Data Min. Knowl. Discov. 29(1): 296-297 (2015) - [j38]Richard Mrasek, Jutta A. Mülle, Klemens Böhm:
A new verification technique for large processes based on identification of relevant tasks. Inf. Syst. 47: 82-97 (2015) - [j37]Stephan Kessler, Christoph M. Flath, Klemens Böhm:
Allocative and strategic effects of privacy enhancement in smart grids. Inf. Syst. 53: 170-181 (2015) - [j36]Fabian Laforet, Erik Buchmann, Klemens Böhm:
Individual privacy constraints on time-series data. Inf. Syst. 54: 74-91 (2015) - [j35]Erik Buchmann, Patrick Erik Bradley, Klemens Böhm:
Deriving Bounds on the Size of Spatial Areas. Open J. Databases 2(1): 1-16 (2015) - [j34]Conny Kühne, Klemens Böhm:
Protecting the Dawid-Skene algorithm against low-competence raters and collusion attacks with gold-selection strategies. Soc. Netw. Anal. Min. 5(1): 67:1-67:25 (2015) - [j33]Andranik Khachatryan, Emmanuel Müller, Christian Stier, Klemens Böhm:
Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering. IEEE Trans. Knowl. Data Eng. 27(9): 2377-2389 (2015) - [j32]Frank Eichinger, Pavel Efros, Stamatis Karnouskos, Klemens Böhm:
A time-series compression technique and its application to the smart grid. VLDB J. 24(2): 193-218 (2015) - [j31]Clemens Heidinger, Klemens Böhm, Erik Buchmann, Martin Spoo:
Efficient and secure exact-match queries in outsourced databases. World Wide Web 18(3): 567-605 (2015) - [c140]Richard Mrasek, Jutta A. Mülle, Klemens Böhm:
Automatic Generation of Optimized Process Models from Declarative Specifications. CAiSE 2015: 382-397 - [c139]Yvonne Mülle, Chris Clifton, Klemens Böhm:
Privacy-Integrated Graph Clustering Through Differential Privacy. EDBT/ICDT Workshops 2015: 247-254 - [c138]Hoang Vu Nguyen, Klemens Böhm, Florian Becker, Bertrand Goldman, Georg Hinkel, Emmanuel Müller:
Identifying User Interests within the Data Space - a Case Study with SkyServer. EDBT 2015: 641-652 - [c137]Patricia Iglesias Sánchez, Emmanuel Müller, Uwe Leo Korn, Klemens Böhm, Andrea Kappes, Tanja Hartmann, Dorothea Wagner:
Efficient Algorithms for a Robust Modularity-Driven Clustering of Attributed Graphs. SDM 2015: 100-108 - [c136]Fabian Keller, Emmanuel Müller, Klemens Böhm:
Estimating mutual information on data streams. SSDBM 2015: 3:1-3:12 - [c135]Pavel Efros, Erik Buchmann, Adrian Englhardt, Klemens Böhm:
How to quantify the impact of lossy transformations on change detection. SSDBM 2015: 17:1-17:11 - [c134]Stephan Kessler, Erik Buchmann, Klemens Böhm:
Deploying and Evaluating Pufferfish Privacy for Smart Meter Data. UIC/ATC/ScalCom 2015: 229-238 - 2014
- [j30]Hoang Vu Nguyen, Emmanuel Müller, Klemens Böhm:
A Near-Linear Time Subspace Search Scheme for Unsupervised Selection of Correlated Features. Big Data Res. 1: 37-51 (2014) - [j29]Frank Eichinger, Victor Pankratius, Klemens Böhm:
Data mining for defects in multicore applications: an entropy-based call-graph technique. Concurr. Comput. Pract. Exp. 26(1): 1-20 (2014) - [j28]Hoang Vu Nguyen, Emmanuel Müller, Jilles Vreeken, Klemens Böhm:
Unsupervised interaction-preserving discretization of multivariate data. Data Min. Knowl. Discov. 28(5-6): 1366-1397 (2014) - [j27]Jens Müller, Klemens Böhm:
Identity business processes. Int. J. Trust. Manag. Comput. Commun. 2(1): 40-77 (2014) - [j26]Jing Zhi Yue, Klemens Böhm, Silvia von Stackelberg:
Incentivizing High-Quality Reviews in Peer-to-Peer Settings: A Feasibility Study with Student Assignments. Int. J. Virtual Communities Soc. Netw. 6(1): 1-21 (2014) - [j25]Guido Sautter, Klemens Böhm:
Improved bibliographic reference parsing based on repeated patterns. Int. J. Digit. Libr. 14(1-2): 59-80 (2014) - [j24]Stephan Kessler, Erik Buchmann, Thorben Burghardt, Klemens Böhm:
Pattern-sensitive Time-series Anonymization and its Application to Energy-Consumption Data. Open J. Inf. Syst. 1(1): 3-22 (2014) - [j23]Silvia von Stackelberg, Susanne Putze, Jutta A. Mülle, Klemens Böhm:
Detecting Data-Flow Errors in BPMN 2.0. Open J. Inf. Syst. 1(2): 1-19 (2014) - [j22]Conny Kühne, Klemens Böhm:
Assessing the suitability of an honest rating mechanism for the collaborative creation of structured knowledge. World Wide Web 17(1): 85-104 (2014) - [c133]Sanja Tanasijevic, Klemens Böhm, Karl-Martin Ehrhart:
Behavioral Strategies in Online Forums with Different Feedback Types. BDCloud 2014: 555-563 - [c132]Richard Mrasek, Jutta A. Mülle, Klemens Böhm, Michael Becker, Christian Allmann:
User-Friendly Property Specification and Process Verification - A Case Study with Vehicle-Commissioning Processes. BPM 2014: 301-316 - [c131]Clemens Heidinger, Klemens Böhm, Erik Buchmann, Kai Richter:
FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing - Exploratory Paper. CAiSE 2014: 120-135 - [c130]Hoang Vu Nguyen, Emmanuel Müller, Jilles Vreeken, Pavel Efros, Klemens Böhm:
Multivariate Maximal Correlation Analysis. ICML 2014: 775-783 - [c129]Patricia Iglesias Sánchez, Emmanuel Müller, Oretta Irmler, Klemens Böhm:
Local context selection for outlier ranking in graphs with multiple numeric node attributes. SSDBM 2014: 16:1-16:12 - [c128]Hoang Vu Nguyen, Emmanuel Müller, Periklis Andritsos, Klemens Böhm:
Detecting correlated columns in relational databases with mixed data types. SSDBM 2014: 30:1-30:12 - [c127]Pavel Efros, Erik Buchmann, Klemens Böhm:
FRESCO: A Framework to Estimate the Energy Consumption of Computers. CBI (1) 2014: 199-206 - 2013
- [j21]Christopher Oßner, Klemens Böhm:
Graphs for Mining-Based Defect Localization in Multithreaded Programs. Int. J. Parallel Program. 41(4): 570-593 (2013) - [j20]Erik Buchmann, Klemens Böhm, Thorben Burghardt, Stephan Kessler:
Re-identification of Smart Meter data. Pers. Ubiquitous Comput. 17(4): 653-662 (2013) - [j19]Guido Sautter, Klemens Böhm:
High-throughput crowdsourcing mechanisms for complex tasks. Soc. Netw. Anal. Min. 3(4): 873-888 (2013) - [c126]Hoang Vu Nguyen, Emmanuel Müller, Klemens Böhm:
4S: Scalable subspace search scheme overcoming traditional Apriori processing. IEEE BigData 2013: 359-367 - [c125]Sanja Tanasijevic, Klemens Böhm:
A New Approach to Large-Scale Deliberation. CGC 2013: 241-248 - [c124]Fabian Keller, Emmanuel Müller, Andreas Wixler, Klemens Böhm:
Flexible and adaptive subspace search for outlier analysis. CIKM 2013: 1381-1390 - [c123]Guido Sautter, Klemens Böhm, David King:
RefConcile - Automated Online Reconciliation of Bibliographic References. ICADL 2013: 161-170 - [c122]Emmanuel Müller, Patricia Iglesias Sánchez, Yvonne Mülle, Klemens Böhm:
Ranking outlier nodes in subspaces of attributed graphs. ICDE Workshops 2013: 216-222 - [c121]Patricia Iglesias Sánchez, Emmanuel Müller, Fabian Laforet, Fabian Keller, Klemens Böhm:
Statistical Selection of Congruent Subspaces for Mining Attributed Graphs. ICDM 2013: 647-656 - [c120]Klemens Böhm, Fabian Keller, Emmanuel Müller, Hoang Vu Nguyen, Jilles Vreeken:
CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection. SDM 2013: 198-206 - [c119]Erik Buchmann, Stephan Kessler, Patrick Jochem, Klemens Böhm:
The Costs of Privacy in Local Energy Markets. CBI 2013: 198-207 - [p6]Christian von der Weth, Klemens Böhm, Christian Hütter:
Optimization Techniques for Multiple Centrality Computations. The Influence of Technology on Social Network Analysis and Mining 2013: 21-47 - 2012
- [c118]Jens Müller, Murat Kavak, Klemens Böhm:
A Graphical Audit Facility for Data Processing and Its Evaluation with Users. APWeb 2012: 618-627 - [c117]Guido Sautter, Klemens Böhm:
Improved Bibliographic Reference Parsing Based on Repeated Patterns. TPDL 2012: 370-382 - [c116]Christian Hütter, Tobias Kimmerle, Klemens Böhm:
Peer-Supervised Learning with Built-In Quality Control Based on Multiple-Choice Questions: A Case Study. ICALT 2012: 453-457 - [c115]Fabian Keller, Emmanuel Müller, Klemens Böhm:
HiCS: High Contrast Subspaces for Density-Based Outlier Ranking. ICDE 2012: 1037-1048 - [c114]Emmanuel Müller, Ira Assent, Patricia Iglesias Sánchez, Yvonne Mülle, Klemens Böhm:
Outlier Ranking via Subspace Analysis in Multiple Views of the Data. ICDM 2012: 529-538 - [c113]Silvia von Stackelberg, Klemens Böhm, Matthias Bracht:
Embedding 'Break the Glass' into Business Process Models. OTM Conferences (1) 2012: 455-464 - [c112]Emmanuel Müller, Fabian Keller, Sebastian Blanc, Klemens Böhm:
OutRules: A Framework for Outlier Descriptions in Multiple Context Spaces. ECML/PKDD (2) 2012: 828-832 - [c111]Andranik Khachatryan, Emmanuel Müller, Christian Stier, Klemens Böhm:
Sensitivity of Self-tuning Histograms: Query Order Affecting Accuracy and Robustness. SSDBM 2012: 334-342 - 2011
- [j18]Thorben Burghardt, Klemens Böhm, Achim Guttmann, Chris Clifton:
Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests. Trans. Data Priv. 4(1): 31-50 (2011) - [j17]Stephan Schosser, Klemens Böhm, Bodo Vogt:
A study of the impact of structure on cooperation in networks. Web Intell. Agent Syst. 9(3): 269-288 (2011) - [c110]Christian Hütter, Klemens Böhm:
Cooperation through reciprocity in multiagent systems: an evolutionary analysis. AAMAS 2011: 241-248 - [c109]Natalja Pulter, Heiko Schepperle, Klemens Böhm:
How agents can help curbing fuel combustion: a performance study of intersection control for fuel-operated vehicles. AAMAS 2011: 795-802 - [c108]Ioana Ciuciu, Gang Zhao, Jutta A. Mülle, Silvia von Stackelberg, Cristian Vasquez Paulus, Thorsten Haberecht, Robert Meersman, Klemens Böhm:
Semantic Support for Security-Annotated Business Process Models. BMMDS/EMMSAD 2011: 284-298 - [c107]Bastian Karweg, Christian Hütter, Klemens Böhm:
Evolving social search based on bookmarks and status messages from social networks. CIKM 2011: 1825-1834 - [c106]Jens Müller, Klemens Böhm:
The Architecture of a Secure Business-Process-Management System in Service-Oriented Environments. ECOWS 2011: 49-56 - [c105]Björn-Oliver Hartmann, Klemens Böhm, Christian Hütter:
Strategic Behavior in Interaction Selection and Contact Selection. IAT 2011: 117-124 - [c104]Christian Hütter, Raphael Lorch, Klemens Böhm:
Evolving Cooperation through Reciprocity Using a Centrality-Based Reputation System. IAT 2011: 264-271 - [c103]Frank Eichinger, Christopher Oßner, Klemens Böhm:
Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs. SDM 2011: 723-734 - [c102]Jutta A. Mülle, Silvia von Stackelberg, Klemens Böhm:
Modelling and transforming security constraints in privacy-aware business processes. SOCA 2011: 1-4 - [c101]Guido Sautter, Klemens Böhm:
High-Throughput Crowdsourcing Mechanisms for Complex Tasks. SocInfo 2011: 240-254 - [c100]Andranik Khachatryan, Emmanuel Müller, Klemens Böhm, Jonida Kopper:
Efficient Selectivity Estimation by Histogram Construction Based on Subspace Clustering. SSDBM 2011: 351-368 - [c99]Andranik Khachatryan, Klemens Böhm:
Accurate Cost Estimation Using Distribution-Based Cardinality Estimates for Multi-dimensional Queries. SSDBM 2011: 581-582 - [p5]Jing Zhi Yue, Klemens Böhm, Karl-Martin Ehrhart:
A Bonus Mechanism to Stimulate Reciprocity in the Presence of Manipulated Feedback. Information Management and Market Engineering Vol. II 2011: 97-106 - [e6]Serge Abiteboul, Klemens Böhm, Christoph Koch, Kian-Lee Tan:
Proceedings of the 27th International Conference on Data Engineering, ICDE 2011, April 11-16, 2011, Hannover, Germany. IEEE Computer Society 2011, ISBN 978-1-4244-8958-9 [contents] - [e5]Serge Abiteboul, Klemens Böhm, Christoph Koch, Kian-Lee Tan:
Workshops Proceedings of the 27th International Conference on Data Engineering, ICDE 2011, April 11-16, 2011, Hannover, Germany. IEEE Computer Society 2011, ISBN 978-1-4244-9194-0 [contents] - 2010
- [j16]Markus Bestehorn, Zinaida Benenson, Erik Buchmann, Marek Jawurek, Klemens Böhm, Felix C. Freiling:
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption. Ad Hoc Sens. Wirel. Networks 9(1-2): 85-107 (2010) - [j15]Markus Bestehorn, Christian von der Weth, Erik Buchmann, Klemens Böhm:
Fault-tolerant query processing in structured P2P-systems. Distributed Parallel Databases 28(1): 33-66 (2010) - [j14]Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone:
A Flexible Architecture for Privacy-Aware Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2): 77-96 (2010) - [j13]Frank Eichinger, David Kramer, Klemens Böhm, Wolfgang Karl:
From source code to runtime behaviour: Software metrics help to select the computer architecture. Knowl. Based Syst. 23(4): 343-349 (2010) - [j12]Clemens Heidinger, Erik Buchmann, Klemens Böhm:
Impact assessment in public policy: Towards a Web 2.0 application. Inf. Polity 15(1-2): 33-50 (2010) - [j11]Klemens Böhm, Laks V. S. Lakshmanan:
Foreword. VLDB J. 19(6): 759-760 (2010) - [j10]Björn-Oliver Hartmann, Klemens Böhm, Andranik Khachatryan, Stephan Schosser, Bodo Vogt:
Incentivizing connectivity in structured Peer-to-Peer systems. Web Intell. Agent Syst. 8(2): 123-147 (2010) - [c98]Christian von der Weth, Klemens Böhm, Christian Hütter:
Optimizing Multiple Centrality Computations for Reputation Systems. ASONAM 2010: 160-167 - [c97]Guido Sautter, Klemens Böhm, Andranik Khachatryan:
Result-size estimation for information-retrieval subqueries. CIKM 2010: 709-718 - [c96]Thorben Burghardt, Klemens Böhm, Achim Guttmann, Chris Clifton:
Search-log anonymization and advertisement: are they mutually exclusive? CIKM 2010: 1269-1272 - [c95]Andranik Khachatryan, Klemens Böhm:
Quantifying uncertainty in multi-dimensional cardinality estimations. CIKM 2010: 1317-1320 - [c94]Conny Kühne, Klemens Böhm, Jing Zhi Yue:
Reviewing the reviewers: A study of author perception on peer reviews in computer science. CollaborateCom 2010: 1-8 - [c93]Jens Müller, Jutta A. Mülle, Silvia von Stackelberg, Klemens Böhm:
Secure Business Processes in Service-Oriented Architectures - A Requirements Analysis. ECOWS 2010: 35-42 - [c92]Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm:
Finding misplaced items in retail by clustering RFID data. EDBT 2010: 501-512 - [c91]Clemens Heidinger, Erik Buchmann, Klemens Böhm:
Collaborative data privacy for the web. EDBT/ICDT Workshops 2010 - [c90]Clemens Heidinger, Erik Buchmann, Matthias Huber, Klemens Böhm, Jörn Müller-Quade:
Privacy-Aware Folksonomies. ECDL 2010: 156-167 - [c89]Markus Bestehorn, Klemens Böhm, Erik Buchmann, Stephan Kessler:
Energy-efficient processing of spatio-temporal queries in wireless sensor networks. GIS 2010: 340-349 - [c88]Björn-Oliver Hartmann, Klemens Böhm:
Towards Efficient Equilibria of Combinations of Network-Formation and Interaction Strategies. IAT 2010: 14-23 - [c87]Guido Sautter, Klemens Böhm, Conny Kühne, Tobias Mathäß:
ProcessTron: efficient semi-automated markup generation for scientific documents. JCDL 2010: 21-28 - [c86]Frank Eichinger, Klaus Krogmann, Roland Klug, Klemens Böhm:
Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs. ECML/PKDD (1) 2010: 425-441 - [c85]Frank Eichinger, Matthias Huber, Klemens Böhm:
On the Usefulness of Weight-Based Constraints in Frequent Subgraph Mining. SGAI Conf. 2010: 65-78 - [c84]Mirco Stern, Klemens Böhm, Erik Buchmann:
Processing continuous join queries in sensor networks: a filtering approach. SIGMOD Conference 2010: 267-278 - [c83]Markus Bestehorn, Klemens Böhm, Patrick Erik Bradley, Erik Buchmann:
Deriving Spatio-temporal Query Results in Sensor Networks. SSDBM 2010: 6-23 - [c82]Frank Eichinger, Victor Pankratius, Philipp W. L. Große, Klemens Böhm:
Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs. TAIC PART 2010: 56-71 - [c81]Christian Hütter, Björn-Oliver Hartmann, Klemens Böhm, Till Heistermann, Kevin-Simon Kohlmeyer, Reno Reckling, Martin Reiche, David Soria Parra:
SONAR: Towards User-centric Social Network Analysis and Visualization. Web Intelligence 2010: 695-698 - [c80]Christian Hütter, Jing Zhi Yue, Christian von der Weth, Klemens Böhm:
Strategic Provider Selection in a Policy-Based Helping Scenario. CEC 2010: 104-111 - [c79]Thorben Burghardt, Erik Buchmann, Klemens Böhm, Jürgen Kühling, S. Bohnen, Anastasios Sivridis:
Tackling Compliance Deficits of Data-Protection Law with User Collaboration - A Feasibility Demonstration with Human Participants. CEC 2010: 120-127 - [p4]Frank Eichinger, Klemens Böhm:
Software-Bug Localization with Graph Mining. Managing and Mining Graph Data 2010: 515-546
2000 – 2009
- 2009
- [j9]Mirco Stern, Erik Buchmann, Klemens Böhm:
A Wavelet Transform for Efficient Consolidation of Sensor Relations with Quality Guarantees. Proc. VLDB Endow. 2(1): 157-168 (2009) - [c78]Clemens Heidinger, Erik Buchmann, Klemens Böhm:
Towards collaborative web-based impact assessment. D.GO 2009: 190-198 - [c77]Christian von der Weth, Klemens Böhm, Thorben Burghardt, Christian Hütter, Jing Zhi Yue:
Indirect Reciprocity in Policy-Based Helping Experiments. ECOWS 2009: 171-180 - [c76]Leonardo Weiss Ferreira Chaves, Erik Buchmann, Fabian Hueske, Klemens Böhm:
Towards materialized view selection for distributed databases. EDBT 2009: 1088-1099 - [c75]Thorben Burghardt, Klemens Böhm, Erik Buchmann, Jürgen Kühling, Anastasios Sivridis:
A Study on the Lack of Enforcement of Data Protection Acts. e-Democracy 2009: 3-12 - [c74]Guido Sautter, Klemens Böhm, Donat Agosti, Christiana Klingenberg:
Creating Digital Resources from Legacy Documents: An Experience Report from the Biosystematics Domain. ESWC 2009: 738-752 - [c73]Mirco Stern, Erik Buchmann, Klemens Böhm:
Towards Efficient Processing of General-Purpose Joins in Sensor Networks. ICDE 2009: 126-137 - [c72]Frank Eichinger, Klemens Böhm:
Selecting Computer Architectures by Means of Control-Flow-Graph Mining. IDA 2009: 309-320 - [c71]Thorben Burghardt, Erik Buchmann, Jens Müller, Klemens Böhm:
Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services. OTM Conferences (1) 2009: 304-321 - [c70]Frank Eichinger, David Kramer, Klemens Böhm, Wolfgang Karl:
From Source Code to Runtime Behaviour: Software Metrics Help to Select the Computer Architecture. SGAI Conf. 2009: 363-376 - [p3]Heiko Schepperle, Klemens Böhm:
Valuation-Aware Traffic Control. Multi-Agent Systems for Traffic and Transportation Engineering 2009: 218-239 - 2008
- [c69]Stephan Schosser, Klemens Böhm, Bodo Vogt:
Do humans identify efficient strategies in structured peer-to-peer systems? AAMAS (3) 2008: 1517-1520 - [c68]Christian Hütter, Conny Kühne, Klemens Böhm:
Peer production of structured knowledge -: an empirical study of ratings and incentive mechanisms. CIKM 2008: 827-842 - [c67]Thorben Burghardt, Erik Buchmann, Klemens Böhm, Chris Clifton:
Collaborative Search and User Privacy: How Can They Be Reconciled?. CollaborateCom 2008: 85-99 - [c66]Frank Eichinger, Klemens Böhm:
Kombiniertes Mining von strukturellen und relationalen Daten. Grundlagen von Datenbanken 2008: 121-125 - [c65]Thorben Burghardt, Andreas Walter, Erik Buchmann, Klemens Böhm:
PRIMO - Towards Privacy Aware Image Sharing. Web Intelligence/IAT Workshops 2008: 21-24 - [c64]Stephan Schosser, Klemens Böhm, Bodo Vogt:
Online vs. Offline Behavior: How to Design Strategic Agents for Distributed Coordinator-Free Environments. IAT 2008: 48-56 - [c63]Björn-Oliver Hartmann, Klemens Böhm, Bodo Vogt:
The Network Game: Analyzing Network-Formation and Interaction Strategies in Tandem. IAT 2008: 184-192 - [c62]Guido Sautter, Cristina Abba, Klemens Böhm:
Improved count suffix trees for natural language data. IDEAS 2008: 231-236 - [c61]Erik Buchmann, Klemens Böhm, Oliver Raabe:
Privacy2.0: Towards Collaborative Data-Privacy Protection. IFIPTM 2008: 247-262 - [c60]Leonardo Weiss Ferreira Chaves, Erik Buchmann, Klemens Böhm:
Tagmark: reliable estimations of RFID tags for business processes. KDD 2008: 999-1007 - [c59]Frank Eichinger, Klemens Böhm, Matthias Huber:
Mining Edge-Weighted Call Graphs to Localise Software Bugs. ECML/PKDD (1) 2008: 333-348 - [c58]Stephan Schosser, Klemens Böhm, Bodo Vogt:
Competition vs. Fairness - Analyzing Structured Networks by Means of User Experiments. Web Intelligence 2008: 897-905 - [c57]Thorben Burghardt, Erik Buchmann, Klemens Böhm:
Discovering the Scope of Privacy Needs in Collaborative Search. Web Intelligence 2008: 910-913 - [c56]Heiko Schepperle, Klemens Böhm:
Auction-Based Traffic Management: Towards Effective Concurrent Utilization of Road Intersections. CEC/EEE 2008: 105-112 - 2007
- [j8]Klemens Böhm, Erik Buchmann:
Free riding-aware forwarding in Content-Addressable Networks. VLDB J. 16(4): 463-482 (2007) - [c55]Heiko Schepperle, Klemens Böhm, Simone Forster:
Traffic Management Based on Negotiations between Vehicles - A Feasibility Demonstration Using Agents. AMEC/TADA 2007: 90-104 - [c54]Heiko Schepperle, Klemens Böhm, Simone Forster:
Towards valuation-aware agent-based traffic control. AAMAS 2007: 185 - [c53]Holger Steinhaus, Klemens Böhm, Stephan Schosser:
Anreizmechanismen für Peer-to-Peer Web Crawling unter Berücksichtigung bösartiger Teilnehmer. BTW 2007: 262-276 - [c52]Andreas Walter, Klemens Böhm, Stephan Schosser:
Überlegungen zur Entwicklung komplexer Grid-Anwendungen mit Globus Toolkit. BTW 2007: 532-541 - [c51]Heiko Schepperle, Klemens Böhm:
Agent-Based Traffic Control Using Auctions. CIA 2007: 119-133 - [c50]Guido Sautter, Klemens Böhm, Frank Padberg, Walter F. Tichy:
Empirical Evaluation of Semi-automated XML Annotation of Text Documents with the GoldenGATE Editor. ECDL 2007: 357-367 - [c49]Andreas Walter, Klemens Böhm, Stephan Schosser:
Building Data-Intensive Grid Applications with Globus Toolkit - An Evaluation Based on Web Crawling. ICSOC 2007: 570-581 - [c48]Guido Sautter, Klemens Böhm, Donat Agosti:
Semi-Automated XML Markup of Biosystematic Legacy Literature with the Goldengate Editor. Pacific Symposium on Biocomputing 2007: 391-402 - [c47]Stephan Schosser, Klemens Böhm, Bodo Vogt:
Indirect partner interaction in peer-to-peer networks: stimulating cooperation by means of structure. EC 2007: 124-133 - [c46]Björn-Oliver Hartmann, Klemens Böhm, Andranik Khachatryan, Stephan Schosser:
The Dangers of Poorly Connected Peers in Structured P2P Networks and a Solution Based on Incentives. Web Intelligence 2007: 500-508 - [c45]Christian von der Weth, Klemens Böhm:
Towards an Objective Assessment of Centrality Measures in Reputation Systems. CEC/EEE 2007: 270-277 - 2006
- [c44]Guido Sautter, Klemens Böhm:
The Difficulties of Taxonomic Name Extraction and a Solution. BioNLP@NAACL-HLT 2006: 126-133 - [c43]Stephan Schosser, Klemens Böhm, Rainer Schmidt, Bodo Vogt:
Strategic Properties of Peer-to-Peer Data Structures and Behaviour of Human Peers in Economic Experiments. ICDE Workshops 2006: 20 - [c42]Christian von der Weth, Klemens Böhm:
A Unifying Framework for Behavior-Based Trust Models. OTM Conferences (1) 2006: 444-461 - [c41]Erik Buchmann, Klemens Böhm, Christian von der Weth:
Towards Truthful Feedback in P2P Data Structures. OTM Conferences (1) 2006: 498-515 - [c40]Stephan Schosser, Klemens Böhm, Rainer Schmidt, Bodo Vogt:
Incentives engineering for structured P2P systems - a feasibility demonstration using economic experiments. EC 2006: 280-289 - [c39]Jutta A. Mülle, Klemens Böhm, Nicolas Roper, Tobias Sunder:
Building Conference Proceedings Requires Adaptable Workflow and Content Management. VLDB 2006: 1129-1139 - [p2]Jens Nimis, Peter C. Lockemann, Karl-Heinz Krempels, Erik Buchmann, Klemens Böhm:
Towards Dependable Agent Systems. Multiagent Engineering 2006: 465-501 - [e4]Yannis E. Ioannidis, Marc H. Scholl, Joachim W. Schmidt, Florian Matthes, Michael Hatzopoulos, Klemens Böhm, Alfons Kemper, Torsten Grust, Christian Böhm:
Advances in Database Technology - EDBT 2006, 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006, Proceedings. Lecture Notes in Computer Science 3896, Springer 2006, ISBN 3-540-32960-9 [contents] - 2005
- [j7]Holger Steinhaus, Klemens Böhm:
Verteiltes Webcrawling in einer Peer-to-Peer-Umgebung. Datenbank-Spektrum 13: 24-32 (2005) - [c38]Erik Buchmann, Klemens Böhm:
Efficient Evaluation of Nearest-Neighbor Queries in Content-Addressable Networks. From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments 2005: 31-40 - [c37]Sven Apel, Klemens Böhm:
Self-Organization in Overlay Networks. CAiSE Workshops (2) 2005: 139-153 - [c36]Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann:
Malicious Behaviour in Content-Addressable Peer-to-Peer Networks. CNSR 2005: 319-326 - [c35]Peter Fankhauser, Norbert Fuhr, Jens Hartmann, Anthony Jameson, Claus-Peter Klas, Stefan Klink, Agnes Koschmider, Sascha Kriewel, Patrick Lehti, Peter Luksch, Ernst W. Mayr, Andreas Oberweis, Paul Ortyl, Stefan Pfingstl, Patrick Reuther, Ute Rusnak, Guido Sautter, Klemens Böhm, André Schaefer, Lars Schmidt-Thieme, Eric Schwarzkopf, Nenad Stojanovic, Rudi Studer, Roland Vollmar, Bernd Walter, Alexander Weber:
Fachinformationssystem Informatik (FIS-I) und Semantische Technologien für Informationsportale (SemIPort). GI Jahrestagung (2) 2005: 698-712 - [e3]Klemens Böhm, Christian S. Jensen, Laura M. Haas, Martin L. Kersten, Per-Åke Larson, Beng Chin Ooi:
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30 - September 2, 2005. ACM 2005, ISBN 1-59593-154-6 [contents] - [i1]Karl Aberer, Klemens Böhm, Frederico T. Fonseca:
Summary of the Results of the Break-out Session "Social Issues around the Semantic Web". Semantic Interoperability and Integration 2005 - 2004
- [j6]Torsten Grabs, Klemens Böhm, Hans-Jörg Schek:
PowerDB-IR - Scalable Information Retrieval and Storage with a Cluster of Databases. Knowl. Inf. Syst. 6(4): 465-505 (2004) - [c34]Ralf Duckstein, Klemens Böhm:
Database support for species extraction from the biosystematics literature: a feasibility demonstration. CIKM 2004: 515-522 - [c33]Erik Buchmann, Klemens Böhm:
FairNet - How to Counter Free Riding in Peer-to-Peer Data Structures. CoopIS/DOA/ODBASE (1) 2004: 337-354 - [c32]Erik Buchmann, Klemens Böhm:
How to Run Experiments with Large Peer-to-Peer Data Structure. IPDPS 2004 - [c31]Sven Apel, Klemens Böhm:
Towards the Development of Ubiquitous Middleware Product Lines. SEM 2004: 137-153 - [e2]Elisa Bertino, Stavros Christodoulakis, Dimitris Plexousakis, Vassilis Christophides, Manolis Koubarakis, Klemens Böhm, Elena Ferrari:
Advances in Database Technology - EDBT 2004, 9th International Conference on Extending Database Technology, Heraklion, Crete, Greece, March 14-18, 2004, Proceedings. Lecture Notes in Computer Science 2992, Springer 2004, ISBN 3-540-21200-0 [contents] - 2003
- [c30]Erik Buchmann, Klemens Böhm:
Effizientes Routing in verteilten skalierbaren Datenstrukturen. BTW 2003: 334-343 - 2002
- [c29]Fuat Akal, Klemens Böhm, Hans-Jörg Schek:
OLAP Query Evaluation in a Database Cluster: A Performance Study on Intra-Query Parallelism. ADBIS 2002: 218-231 - [c28]Torsten Grabs, Klemens Böhm, Hans-Jörg Schek:
XMLTM: efficient transaction management for XML documents. CIKM 2002: 142-152 - [c27]Uwe Röhm, Klemens Böhm, Hans-Jörg Schek, Heiko Schuldt:
FAS - A Freshness-Sensitive Coordination Middleware for a Cluster of OLAP Components. VLDB 2002: 754-765 - [e1]Christian S. Jensen, Keith G. Jeffery, Jaroslav Pokorný, Simonas Saltenis, Elisa Bertino, Klemens Böhm, Matthias Jarke:
Advances in Database Technology - EDBT 2002, 8th International Conference on Extending Database Technology, Prague, Czech Republic, March 25-27, Proceedings. Lecture Notes in Computer Science 2287, Springer 2002, ISBN 3-540-43324-4 [contents] - 2001
- [c26]Torsten Grabs, Klemens Böhm, Hans-Jörg Schek:
PowerDB-IR - Information Retrieval on Top of a Database Cluster. CIKM 2001: 411-418 - [c25]Torsten Grabs, Klemens Böhm, Hans-Jörg Schek:
High-level Parallelism in a Database Cluster: A Feasibility Study Using Document Services. ICDE 2001: 121-130 - [c24]Klemens Böhm, Michael Mlivoncic, Roger Weber:
Quality-Aware and Load-Sensitive Planning of Image Similarity Queries. ICDE 2001: 401-410 - [c23]Uwe Röhm, Klemens Böhm, Hans-Jörg Schek:
Cache-Aware Query Routing in a Cluster of Databases. ICDE 2001: 641-650 - [c22]Klemens Böhm, Ana Stojanovic, Roger Weber:
Implementing Relevance Feedback Techniques for Large Image Collections Efficiently. Multimedia Information Systems 2001: 113-122 - [c21]Torsten Grabs, Klemens Böhm, Hans-Jörg Schek:
Scalable Distributed Query and Update Service Implementations for XML Document Elements. RIDE-DM 2001: 35-42 - [c20]Klemens Böhm, Michael Mlivoncic, Hans-Jörg Schek, Roger Weber:
Fast Evaluation Techniques for Complex Similarity Queries. VLDB 2001: 211-220 - 2000
- [c19]Klemens Böhm:
On Extending the XML Engine with Query-Processing Capabilities. ADL 2000: 127-138 - [c18]Roger Weber, Klemens Böhm:
Trading Quality for Time with Nearest Neighbor Search. EDBT 2000: 21-35 - [c17]Uwe Röhm, Klemens Böhm, Hans-Jörg Schek:
OLAP Query Routing and Physical Design in a Database Cluster. EDBT 2000: 254-268 - [c16]Roger Weber, Klemens Böhm, Hans-Jörg Schek:
Interactive-Time Similarity Search for Large Image Collections Using Parallel VA-Files. ECDL 2000: 83-92 - [c15]Klemens Böhm, Torsten Grabs, Uwe Röhm, Hans-Jörg Schek:
Evaluating the Coordination Overhead of Replica Maintenance in a Cluster of Databases. Euro-Par 2000: 435-444 - [c14]Roger Weber, Klemens Böhm, Hans-Jörg Schek:
Interactive-Time Similarity Search for Large Image Collections Using Parallel VA-Files. ICDE 2000: 197 - [c13]Hans-Jörg Schek, Klemens Böhm, Torsten Grabs, Uwe Röhm, Heiko Schuldt, Roger Weber:
Hyperdatabases. WISE 2000: 14-25 - [c12]Evangelos Kotsakis, Klemens Böhm:
XML Schema Directory: A Data Structure for XML Data Processing. WISE 2000: 62-69
1990 – 1999
- 1999
- [j5]Klemens Böhm, Karl Aberer, Wolfgang Klas:
Building a Hybrid Database Application for Structured Documents. Multim. Tools Appl. 8(1): 65-90 (1999) - [c11]Roger Weber, Klemens Böhm, Hans-Jörg Schek:
Parallel NN-search for large multimedia repositories. State-of-the-Art in Content-Based Image and Video Retrieval 1999: 319-343 - [c10]Uwe Röhm, Klemens Böhm:
Working Together in Harmony - An Implementation of the CORBA Object Query Service and Its Evaluation. ICDE 1999: 238-247 - 1998
- [c9]Klemens Böhm, Karl Aberer, M. Tamer Özsu, Kathrin Gayer:
Query Optimization for Structured Documents Based on Knowledge on the Document Type Definition. ADL 1998: 196-205 - [p1]Klemens Böhm:
Metadata Handling in HyperStorM. Multimedia Data Management 1998: 25-56 - 1997
- [b1]Klemens Böhm:
Verwendung objektorientierter Datenbanktechnologie zur Verwaltung strukturierter Dokumente. Darmstadt University of Technology, Oldenbourg 1997, ISBN 3-486-24624-0, pp. 1-198 - [j4]Klemens Böhm, Karl Aberer, Erich J. Neuhold, Xiaoya Yang:
Structured Document Storage and Refined Declarative and Navigational Access Mechanisms in HyperStorM. VLDB J. 6(4): 296-311 (1997) - [c8]Karl Aberer, Dunren Che, Klemens Böhm:
Rule-Based Generation of Logical Query Plans with Controlled Complexity. DOOD 1997: 399-416 - 1996
- [j3]Marc Volz, Karl Aberer, Klemens Böhm:
An OODBMS-IRS Coupling for Structured Documents. IEEE Data Eng. Bull. 19(1): 34-42 (1996) - [c7]Lars Bindzus, Klemens Böhm:
VROBS - Datenbankzugangskontrolle mittels einer verteilten Warteschlange. EMISA 1996 - [c6]Marc Volz, Karl Aberer, Klemens Böhm:
Applying a Flexible OODBMS-IRS-Coupling for Structured Document Handling. ICDE 1996: 10-19 - [c5]Klemens Böhm, Karl Aberer:
HyperStorM - Administering Structured Documents Using Object-Oriented Database Technology. SIGMOD Conference 1996: 547 - 1994
- [j2]Klemens Böhm, Thomas C. Rakow:
Metadata for Multimedia Documents. SIGMOD Rec. 23(4): 21-26 (1994) - [c4]Klemens Böhm, Karl Aberer:
An Object-Oriented Database Application for HyTime Document Storage. CIKM 1994: 26-33 - [c3]Klemens Böhm, Adrian Müller, Erich J. Neuhold:
Structured Document Handling - A Case For Integrating Databases and Information Retrieval. CIKM 1994: 147-154 - [c2]Klemens Böhm, Karl Aberer, Erich J. Neuhold:
Administering Structured Documents in Digital Libraries. DL 1994: 91-117 - 1993
- [j1]Karl Aberer, Klemens Böhm, Christoph Hüser:
The Prospects of Publishing using Advanced Database Concepts. Electron. Publ. 6(4): 469-480 (1993) - [c1]Klemens Böhm, Amílcar Sernadas:
Real-Time Object Specification Logic. DAISD 1993: 159-173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint