Continent of Edu-Blogs Use Case: InternetWorking Blog and openHPI
AbstractEdu-blogs are blogs that serve the education of an individual or group. An Edu-blog can have one or multiple authors and can be used as a resource for learning material, a discussion forum, or...
View ArticleOverview of the Continents of the Blogosphere
AbstractTo deal with the blogosphere in general requires a deep understanding of its smallest entities, individual weblogs, including their technical features and specifications. This knowledge (refer...
View ArticleMicro-perspective
AbstractThis chapter provides a comprehensive overview about weblogs as standalone entities. In particular, we discuss characteristic features of blogging software in general, its most important...
View ArticleVision of the Blogosphere and Its Exploration
AbstractIn this final chapter, we share our expectations about the development of the blogosphere and social media in general. In this context, we highlight the next development steps for the major...
View ArticleThe Challenge of Exploring the Blogosphere
AbstractWe know that single weblogs are embedded into a complex superstructure known as the blogosphere. However, the absence of any centralized control, usually regarded as the blogosphere’s best...
View ArticleContinent of Ego-Blogs: Use Case – svenblogt.de
AbstractIn the blogosphere, the continent Ego-blog refers to blogs that contain personal posts about the blogger’s daily life. Bloggers share their life experiences and knowledge of an enormous range...
View ArticleContinent of Docu-Blogs Use Case: The IT-Gipfelblog
AbstractThe Internet is not the first innovation which people have expected to lead to an enhanced sense of togetherness, understanding and even world peace. After the establishment of the first stable...
View ArticleTowards an Exploration Machine for the Blogosphere
AbstractThe analysis of data generated within and from the blogosphere’s network can be insightful for numerous reasons and for a high diversity of interest groups. As noted in previous chapters, the...
View ArticleVerifying Auto-generated C Code from Simulink
AbstractThis paper presents our experience with formal verification of C code that is automatically generated from Simulink open-loop controller models. We apply the state-of-the-art commercial model...
View ArticleMalicious Behaviour Identification in Online Social Networks
AbstractThis paper outlines work on the detection of anomalous behaviour in Online Social Networks (OSNs). We present various automated techniques for identifying a ‘prodigious’ segment within a tweet,...
View ArticleAuthorship Verification on Short Text Samples Using Stylometric Embeddings
AbstractGiven the increasing amounts of textual data published online and our inability to reliably identify a person by their writing style, impersonation in the context of social media applications...
View ArticleDigital Collaboration with a Whiteboard in Virtual Reality
AbstractNowadays virtual reality has become suitable for the end consumers and offers a whole new way of digital interaction. This technique allows users to perceive and engage with the environment as...
View ArticleMultiple Analyses, Requirements Once:
AbstractIn industrial model-based development (MBD) frameworks, requirements are typically specified informally using textual descriptions. To enable the application of formal methods, these...
View ArticleBenchmarking Software Model Checkers on Automotive Code
AbstractThis paper reports on our experiences with verifying automotive C code by state-of-the-art open source software model checkers. The embedded C code is automatically generated from Simulink...
View ArticleInterpretation-Based Violation Witness Validation for C: NITWIT
AbstractAs software verification is gaining traction in academia and industry the number and complexity of verification tools is growing constantly. This initiated research and interest into...
View ArticleConfigurable Benchmarks for C Model Checkers
AbstractSoftware model checkers employ many different techniques. During various competitions, the capabilities of these verification tools are compared on a wide variety of benchmarks. Our aim is to...
View ArticleRegulation of VEGFR2 trafficking and signaling by Rab GTPase-activating proteins
AbstractVascular endothelial growth factor receptor-2 (VEGFR2) and its ligands (VEGFs) are crucial players in vasculogenesis and angiogenesis. General blocking of this signaling system with antibodies...
View ArticleAnalysing Capacity Bottlenecks in Rail Infrastructure by Episode Mining
AbstractWe introduce a methodology to identify and analyse capacity bottlenecks in railway networks. It is based on operational data that has been recorded in real operation. In a first step, network...
View Article
More Pages to Explore .....