Skip to main content

Showing 1–19 of 19 results for author: Schommer, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.08394  [pdf, other

    cs.CY cs.LG

    Compatibility of Fairness Metrics with EU Non-Discrimination Laws: Demographic Parity & Conditional Demographic Disparity

    Authors: Lisa Koutsoviti Koumeri, Magali Legast, Yasaman Yousefi, Koen Vanhoof, Axel Legay, Christoph Schommer

    Abstract: Empirical evidence suggests that algorithmic decisions driven by Machine Learning (ML) techniques threaten to discriminate against legally protected groups or create new sources of unfairness. This work supports the contextual approach to fairness in EU non-discrimination legal framework and aims at assessing up to what point we can assure legal fairness through fairness metrics and under fairness… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

    Comments: Submitted at the 19th International Conference on Artificial Intelligence and Law - ICAIL 2023. Expected decision date is July 18, 2023

  2. A Cognitive Mind-map Framework to Foster Trust

    Authors: Jayanta Poray, Christoph Schommer

    Abstract: The explorative mind-map is a dynamic framework, that emerges automatically from the input, it gets. It is unlike a verificative modeling system where existing (human) thoughts are placed and connected together. In this regard, explorative mind-maps change their size continuously, being adaptive with connectionist cells inside; mind-maps process data input incrementally and offer lots of possibi… ▽ More

    Submitted 24 August, 2009; v1 submitted 24 August, 2009; originally announced August 2009.

    Comments: 5 pages, 4 Figures, Extended Version, presented at the 5th International Conference on Natural Computation, 2009

    ACM Class: I.2.0; I.2.6; H.2.8

  3. arXiv:0902.3196  [pdf, other

    cs.NE cs.AI

    Symbolic Computing with Incremental Mindmaps to Manage and Mine Data Streams - Some Applications

    Authors: Claudine Brucks, Michael Hilker, Christoph Schommer, Cynthia Wagner, Ralph Weires

    Abstract: In our understanding, a mind-map is an adaptive engine that basically works incrementally on the fundament of existing transactional streams. Generally, mind-maps consist of symbolic cells that are connected with each other and that become either stronger or weaker depending on the transactional stream. Based on the underlying biologic principle, these symbolic cells and their connections as wel… ▽ More

    Submitted 18 February, 2009; originally announced February 2009.

    Comments: 4 pages; 4 figures

    ACM Class: I.2.6; H.2.8

    Journal ref: Proceedings of the 4th International Workshop on Neural-Symbolic Learning and Reasoning (NeSy '08); July 2008., Patras, Greece

  4. arXiv:0811.0453  [pdf, ps, other

    cs.CL cs.IR

    CoZo+ - A Content Zoning Engine for textual documents

    Authors: Cynthia Wagner, Christoph Schommer

    Abstract: Content zoning can be understood as a segmentation of textual documents into zones. This is inspired by [6] who initially proposed an approach for the argumentative zoning of textual documents. With the prototypical CoZo+ engine, we focus on content zoning towards an automatic processing of textual streams while considering only the actors as the zones. We gain information that can be used to re… ▽ More

    Submitted 4 November, 2008; originally announced November 2008.

    Comments: 4 pages, 4 figures

    ACM Class: H.3.3; H.3.1

  5. arXiv:0810.4616  [pdf, other

    cs.CL cs.DL

    Assembling Actor-based Mind-Maps from Text Stream

    Authors: Claudine Brucks, Christoph Schommer

    Abstract: For human beings, the processing of text streams of unknown size leads generally to problems because e.g. noise must be selected out, information be tested for its relevance or redundancy, and linguistic phenomenon like ambiguity or the resolution of pronouns be advanced. Putting this into simulation by using an artificial mind-map is a challenge, which offers the gate for a wide field of applic… ▽ More

    Submitted 25 October, 2008; originally announced October 2008.

    Comments: 12 pages, 8 Figures

    ACM Class: I.2.4; H.3.1

    Journal ref: Summary of the Master Thesis "Actor-based Mind-map learning from Text Streams". Dept. of Computer Science and Communication, University of Luxembourg, 2008

  6. arXiv:0809.4916  [pdf, ps, other

    cs.CY cs.GL

    16 Propositions to Reconsider the Organization of a Scientific Workshop

    Authors: Christoph Schommer

    Abstract: Participating a scientific workshop is nowadays often an adventure because the number of participants do seldom exceed the number of talks. A half-day workshop is mostly finished at lunchtime, speakers are sometimes not present and unexcused, and a strict progression of the workshop offers little air for discussion. And when talks are re-scheduled on short notice in case that a speech is dropped… ▽ More

    Submitted 29 September, 2008; originally announced September 2008.

    Comments: 5 pages

    ACM Class: K.4.0; A.0

  7. arXiv:0809.2818  [pdf, other

    cs.DL cs.CG

    A Simple Framework to Typify Social Bibliographic Communities

    Authors: Christoph Schommer

    Abstract: Social Communities in bibliographic databases exist since many years, researchers share common research interests, and work and publish together. A social community may vary in type and size, being fully connected between participating members or even more expressed by a consortium of small and individual members who play individual roles in it. In this work, we focus on social communities insid… ▽ More

    Submitted 16 September, 2008; originally announced September 2008.

    Comments: 14 pages, 12 figures

    ACM Class: H.3.1; H.3.6

  8. arXiv:0809.2696  [pdf, other

    cs.SC cs.CY

    An Unified Definition of Data Mining

    Authors: Christoph Schommer

    Abstract: Since many years, theoretical concepts of Data Mining have been developed and improved. Data Mining has become applied to many academic and industrial situations, and recently, soundings of public opinion about privacy have been carried out. However, a consistent and standardized definition is still missing, and the initial explanation given by Frawley et al. has pragmatically often changed over… ▽ More

    Submitted 16 September, 2008; originally announced September 2008.

    Comments: 7 pages, 3 figures

    ACM Class: H.2.8; K.6

  9. arXiv:0805.1787  [pdf, other

    cs.MA cs.CR

    A Network Protection Framework through Artificial Immunity

    Authors: Michael Hilker, Christoph Schommer

    Abstract: Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these network systems rely on individuality and support an architecture with less collaborative work of the protection components. They give less administration suppo… ▽ More

    Submitted 13 May, 2008; originally announced May 2008.

    Comments: 24 pages, 2 figures

    ACM Class: C.2.0

  10. arXiv:0805.1296  [pdf, other

    cs.NE cs.SC

    A Simple Dynamic Mind-map Framework To Discover Associative Relationships in Transactional Data Streams

    Authors: Christoph Schommer

    Abstract: In this paper, we informally introduce dynamic mind-maps that represent a new approach on the basis of a dynamic construction of connectionist structures during the processing of a data stream. This allows the representation and processing of recursively defined structures and avoids the problem of a more traditional, fixed-size architecture with the processing of input structures of unknown siz… ▽ More

    Submitted 9 May, 2008; originally announced May 2008.

    Comments: 12 pages, 8 Figures. Updated version of a paper presented at the Workshop on Symbolic Networks, ECAI 2004, Valencia, Spain

    ACM Class: I.2.6; H.2.8

  11. arXiv:0805.0909  [pdf, ps, other

    cs.CR cs.MA

    SANA - Security Analysis in Internet Traffic through Artificial Immune Systems

    Authors: Michael Hilker, Christoph Schommer

    Abstract: The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local Installation. Therefore, we introduce a novel Framework for Network Security which is called SANA. SANA contains an artificial Immune System with artificial Cells whi… ▽ More

    Submitted 7 May, 2008; originally announced May 2008.

    Comments: 9 pages,

    ACM Class: C.2.0

    Journal ref: Proceedings of the Trustworthy Software Workshop 2006, IBFI, Schloss Dagstuhl, May 2006, Saarbruecken, Germany

  12. arXiv:0805.0850  [pdf, ps, other

    cs.CR cs.DC

    Service Oriented Architecture in Network Security - a novel Organisation in Security Systems

    Authors: Michael Hilker, Christoph Schommer

    Abstract: Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtu… ▽ More

    Submitted 7 May, 2008; originally announced May 2008.

    Comments: 4 pages

    ACM Class: C.2.0

    Journal ref: Proceedings of the 3rd International Workshop on Theory of Computer Viruses (TCV 2008), May 2008, Nancy, France

  13. arXiv:0805.0849  [pdf, ps, other

    cs.CR cs.MA

    SANA - Network Protection through artificial Immunity

    Authors: Michael Hilker, Christoph Schommer

    Abstract: Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these network systems rely on individuality and support an architecture with less collaborative work of the protection components. They give less administration suppo… ▽ More

    Submitted 7 May, 2008; originally announced May 2008.

    Comments: 5 pages

    ACM Class: C.2.0

    Journal ref: Proceedings of the 2nd International Workshop on Theory of Computer Viruses (TCV 2007), May 2007, Nancy, France

  14. arXiv:0805.0785  [pdf, ps, other

    cs.AI cs.MA

    AGNOSCO - Identification of Infected Nodes with artificial Ant Colonies

    Authors: Michael Hilker, Christoph Schommer

    Abstract: If a computer node is infected by a virus, worm or a backdoor, then this is a security risk for the complete network structure where the node is associated. Existing Network Intrusion Detection Systems (NIDS) provide a certain amount of support for the identification of such infected nodes but suffer from the need of plenty of communication and computational power. In this article, we present a… ▽ More

    Submitted 7 May, 2008; v1 submitted 6 May, 2008; originally announced May 2008.

    Comments: 5 pages, 2 figures

    ACM Class: C.2.0

    Journal ref: Proceedings of the 6th International Conference on Recent Advances in Soft Computing (RASC2006), July 2006, Canterbury, United Kingdom

  15. arXiv:0805.0782  [pdf, ps, other

    cs.NI

    A new queueing strategy for the Adversarial Queueing Theory

    Authors: Michael Hilker, Christoph Schommer

    Abstract: In the today's Internet and TCP/IP-networks, the queueing of packets is commonly implemented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversarial Queueing Theory. Other queueing strategies are researched in this model and better results are performed by alternative queueing strategies, e.g. LIS (Longest In System). This article introduces a new que… ▽ More

    Submitted 7 May, 2008; v1 submitted 6 May, 2008; originally announced May 2008.

    Comments: 8 pages, 1 figure, ps-trix

    ACM Class: C.2.2

    Journal ref: Proceedings, IPSI-2005, December 2005, Bled, Slovenia

  16. arXiv:0804.2621  [pdf, other

    cs.GL

    Design and Implementation of a Master of Science in Information and Computer Sciences - An Inventory and retrospect for the last four years

    Authors: Christoph Schommer

    Abstract: This Master of Science in Computer and Information Sciences (MICS) is an international accredited master program that has been initiated in 2004 and started in September 2005. MICS is a research-oriented academic study of 4 semesters and a continuation of the Bachelor towards the PhD. It is completely taught in English, supported by lecturers coming from more than ten different countries. This r… ▽ More

    Submitted 16 April, 2008; originally announced April 2008.

    Comments: 27 pages, 4 Figures

    ACM Class: K.3.2; A.2

  17. arXiv:0804.1033  [pdf, other

    cs.CL cs.LO

    A Semi-Automatic Framework to Discover Epistemic Modalities in Scientific Articles

    Authors: Sviatlana Danilava, Christoph Schommer

    Abstract: Documents in scientific newspapers are often marked by attitudes and opinions of the author and/or other persons, who contribute with objective and subjective statements and arguments as well. In this respect, the attitude is often accomplished by a linguistic modality. As in languages like english, french and german, the modality is expressed by special verbs like can, must, may, etc. and the s… ▽ More

    Submitted 7 April, 2008; originally announced April 2008.

    Comments: 18 pages, 5 Figures

    ACM Class: J.5; I.2.7; F.4.3

  18. arXiv:0803.2856  [pdf, other

    cs.CL cs.LG

    Figuring out Actors in Text Streams: Using Collocations to establish Incremental Mind-maps

    Authors: T. Rothenberger, S. Oez, E. Tahirovic, C. Schommer

    Abstract: The recognition, involvement, and description of main actors influences the story line of the whole text. This is of higher importance as the text per se represents a flow of words and expressions that once it is read it is lost. In this respect, the understanding of a text and moreover on how the actor exactly behaves is not only a major concern: as human beings try to store a given input on sh… ▽ More

    Submitted 19 March, 2008; originally announced March 2008.

    Comments: 10 pages, 3 Figures

    ACM Class: I.7.5; I.5.4; H.2.4

  19. arXiv:0802.2234  [pdf, other

    cs.CL cs.CR

    Textual Fingerprinting with Texts from Parkin, Bassewitz, and Leander

    Authors: Christoph Schommer, Conny Uhde

    Abstract: Current research in author profiling to discover a legal author's fingerprint does not only follow examinations based on statistical parameters only but include more and more dynamic methods that can learn and that react adaptable to the specific behavior of an author. But the question on how to appropriately represent a text is still one of the fundamental tasks, and the problem of which attrib… ▽ More

    Submitted 15 February, 2008; originally announced February 2008.

    Comments: 11 pages, 4 Figures

    ACM Class: I.7.5; I.5.4; K.6.5