default search action
Johannes Schneider 0002
Person information
- affiliation: University of Liechtenstein, Institute of Information Systems, Vaduz, Liechtenstein
- affiliation (PhD 2011): ETH Zurich, Computer Engineering and Networks Laboratory, Zürich, Switzerland,
Other persons with the same name
- Johannes Schneider — disambiguation page
- Johannes Schneider 0001 — University of Bonn, Department of Photogrammetry, Institute of Geodesy and Geoinformation, Germany
- Johannes Schneider 0003 — University of Potsdam, Hasso Plattner Institute, Germany
- Johannes Schneider 0004 — FZI Research Center for Information Technology, Department of Embedded Systems and Sensors Engineering, Karlsruhe, Germany
- Johannes Schneider 0005 — Karlsruhe Institute of Technology, KIT, wbk, Institute of Production Science, Germany
Other persons with a similar name
- Johannes C. Schneider
- Johannes J. Schneider (aka: Johannes Josef Schneider) — University of Mainz, Germany
- Johannes M. Schneider
- Ulrich Johannes Schneider
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Johannes Schneider:
Explainable Generative AI (GenXAI): a survey, conceptualization, and research agenda. Artif. Intell. Rev. 57(11): 289 (2024) - [j37]Johannes Schneider, Christian Meske, Pauline M. Kuss:
Foundation Models. Bus. Inf. Syst. Eng. 66(2): 221-231 (2024) - [j36]Johannes Schneider, Michalis Vlachos:
Reflective-net: learning from explanations. Data Min. Knowl. Discov. 38(5): 2975-2996 (2024) - [j35]Jonas Bokstaller, Johannes Schneider, Jan vom Brocke:
Estimating SoC, SoH, or RuL of Rechargeable Batteries via IoT: A Review. IEEE Internet Things J. 11(5): 7559-7582 (2024) - [j34]Jonas Bokstaller, Johannes Schneider, Simon Lux, Jan vom Brocke:
Battery Health Index: Combination of Physical and ML-Based SoH for Continuous Health Tracking. IEEE Internet Things J. 11(20): 33624-33641 (2024) - [j33]Johannes Schneider, Christian Meske, Michalis Vlachos:
Deceptive XAI: Typology, Creation and Detection. SN Comput. Sci. 5(1): 81 (2024) - [j32]Hédi Razgallah, Michalis Vlachos, Ahmad Ajalloeian, Ninghao Liu, Johannes Schneider, Alexis Steinmann:
Using Neural and Graph Neural Recommender Systems to Overcome Choice Overload: Evidence From a Music Education Platform. ACM Trans. Inf. Syst. 42(4): 92:1-92:26 (2024) - [c62]Johannes Schneider, Bernd Schenk, Christina Niklaus:
Towards LLM-Based Autograding for Short Textual Answers. CSEDU (1) 2024: 280-288 - [c61]Johannes Schneider, Leona Chandra Kruse, Isabella Seeber:
Validity Claims in Children-AI Discourse: Experiment with ChatGPT. CSEDU (1) 2024: 289-296 - [c60]Johannes Schneider:
Efficient and Flexible Topic Modeling Using Pretrained Embeddings and Bag of Sentences. ICAART (2) 2024: 407-418 - [c59]Johannes Schneider, Michalis Vlachos:
A Survey of Deep Learning: From Activations to Transformers. ICAART (2) 2024: 419-430 - [i33]Johannes Schneider, Rene Abraham, Christian Meske:
Governance of Generative Artificial Intelligence for Companies. CoRR abs/2403.08802 (2024) - 2023
- [j31]Johannes Schneider, Robin Richner, Micha Riser:
Towards Trustworthy AutoGrading of Short, Multi-lingual, Multi-type Answers. Int. J. Artif. Intell. Educ. 33(1): 88-118 (2023) - [j30]Johannes Schneider, Stefan Seidel, Marcus Basalla, Jan vom Brocke:
Reuse, Reduce, Support: Design Principles for Green Data Mining. Bus. Inf. Syst. Eng. 65(1): 65-83 (2023) - [j29]Rene Abraham, Johannes Schneider, Jan vom Brocke:
A taxonomy of data governance decision domains in data marketplaces. Electron. Mark. 33(1): 22 (2023) - [j28]Johannes Schneider, Rene Abraham, Christian Meske, Jan vom Brocke:
Artificial Intelligence Governance For Businesses. Inf. Syst. Manag. 40(3): 229-249 (2023) - [j27]Johannes Schneider, Giovanni Apruzzese:
Dual adversarial attacks: Fooling humans and classifiers. J. Inf. Secur. Appl. 75: 103502 (2023) - [j26]Johannes Schneider, Frank Breitinger:
Towards AI forensics: Did the artificial intelligence system do it? J. Inf. Secur. Appl. 76: 103517 (2023) - [j25]Johannes Schneider, Michalis Vlachos:
Explaining classifiers by constructing familiar concepts. Mach. Learn. 112(11): 4167-4200 (2023) - [j24]Alexander Simons, Isabell Wohlgenannt, Sarah Zelt, Markus Weinmann, Johannes Schneider, Jan vom Brocke:
Intelligence at play: game-based assessment using a virtual-reality application. Virtual Real. 27(3): 1827-1843 (2023) - [c58]Johannes Schneider, Christian Meske, Antonio Bikic:
How individuals can shape AI through data - An AI literacy and morality perspective. ECIS 2023 - [c57]Giovanni Apruzzese, Pavel Laskov, Johannes Schneider:
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection. EuroS&P 2023: 592-614 - [c56]Johannes Schneider, Alfred Sopi, Jan vom Brocke:
Implementing Smart Contracts: The case of NFT-rental with "pay-per-like". Wirtschaftsinformatik 2023: 13 - [c55]Johannes Schneider, Daniel Eisenhardt, Christian Utama, Christian Meske:
Impact of Data Collection on ML Models: Analyzing differences of Biases between low- vs. High-Skilled Annotators. Wirtschaftsinformatik 2023: 15 - [i32]Johannes Schneider, Michalis Vlachos:
A Survey of Deep Learning: From Activations to Transformers. CoRR abs/2302.00722 (2023) - [i31]Johannes Schneider:
Efficient and Flexible Topic Modeling using Pretrained Embeddings and Bag of Sentences. CoRR abs/2302.03106 (2023) - [i30]Giovanni Apruzzese, Pavel Laskov, Johannes Schneider:
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection. CoRR abs/2305.00550 (2023) - [i29]Alfred Sopi, Johannes Schneider, Jan vom Brocke:
Implementing Smart Contracts: The case of NFT-rental with pay-per-like. CoRR abs/2308.02424 (2023) - [i28]Johannes Schneider, Bernd Schenk, Christina Niklaus, Michalis Vlachos:
Towards LLM-based Autograding for Short Textual Answers. CoRR abs/2309.11508 (2023) - [i27]Johannes Schneider, Steffi Haag, Leona Chandra Kruse:
Negotiating with LLMS: Prompt Hacks, Skill Gaps, and Reasoning Deficits. CoRR abs/2312.03720 (2023) - 2022
- [j23]Johannes Schneider:
Optimizing human hand gestures for AI-systems. AI Commun. 35(3): 153-169 (2022) - [j22]Aliya Tastemirova, Johannes Schneider, Leona Chandra Kruse, Simon Heinzle, Jan vom Brocke:
Microexpressions in digital humans: perceived affect, sincerity, and trustworthiness. Electron. Mark. 32(3): 1603-1620 (2022) - [j21]Christian Meske, Enrico Bunde, Johannes Schneider, Martin Gersch:
Explainable Artificial Intelligence: Objectives, Stakeholders, and Future Research Opportunities. Inf. Syst. Manag. 39(1): 53-63 (2022) - [j20]Johannes Schneider:
Correlated Initialization for Correlated Data. Neural Process. Lett. 54(3): 2249-2266 (2022) - [c54]Ahmad Ajalloeian, Michalis Vlachos, Johannes Schneider, Alexis Steinmann:
A Case Study in Educational Recommenders: Recommending Music Partitures at Tomplay. CIKM 2022: 2853-2862 - [c53]Mathias Schäfer, Johannes Schneider, Katharina Drechsler, Jan vom Brocke:
Ai Governance: are Chief AI Officers and AI Risk Officers Needed? ECIS 2022 - [c52]Johannes Schneider, Christian Meske, Michalis Vlachos:
Deceptive AI Explanations: Creation and Detection. ICAART (2) 2022: 44-55 - [c51]Marcus Basalla, Johannes Schneider, Jan vom Brocke:
Creativity of Deep Learning: Conceptualization and Assessment. ICAART (2) 2022: 99-109 - [c50]Johannes Schneider:
Domain Transformer: Predicting Samples of Unseen, Future Domains. IJCNN 2022: 1-8 - [c49]Johannes Schneider, Giovanni Apruzzese:
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike. SP (Workshops) 2022: 66-72 - [i26]Johannes Schneider, Robin Richner, Micha Riser:
Towards Trustworthy AutoGrading of Short, Multi-lingual, Multi-type Answers. CoRR abs/2201.03425 (2022) - [i25]Johannes Schneider:
The learning phases in NN: From Fitting the Majority to Fitting a Few. CoRR abs/2202.08299 (2022) - [i24]Johannes Schneider, Michail Vlachos:
Explaining Classifiers by Constructing Familiar Concepts. CoRR abs/2203.04109 (2022) - [i23]Johannes Schneider, Giovanni Apruzzese:
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike. CoRR abs/2203.10166 (2022) - [i22]Johannes Schneider:
Foundation models in brief: A historical, socio-technical focus. CoRR abs/2212.08967 (2022) - 2021
- [j19]Flynn Werner, Marcus Basalla, Johannes Schneider, Demelza Hays, Jan vom Brocke:
Blockchain Adoption from an Interorganizational Systems Perspective - A Mixed-Methods Approach. Inf. Syst. Manag. 38(2): 135-150 (2021) - [j18]Michael Reiner Kamm, Jan-Peter Kucklick, Johannes Schneider, Jan vom Brocke:
Data mining for small shops: Empowering brick-and-mortar stores through BI functionalities of a loyalty program1. Inf. Syst. Manag. 38(4): 270-286 (2021) - [j17]Marcus Basalla, Johannes Schneider, Martin Luksik, Roope Jaakonmäki, Jan vom Brocke:
On Latency of E-Commerce Platforms. J. Organ. Comput. Electron. Commer. 31(1): 1-17 (2021) - [j16]Valentin Holzwarth, Johannes Schneider, Joshua Handali, Joy Gisler, Christian Hirt, Andreas M. Kunz, Jan vom Brocke:
Towards estimating affective states in Virtual Reality based on behavioral data. Virtual Real. 25(4): 1139-1152 (2021) - [c48]Wolfgang Fuhl, Johannes Schneider, Enkelejda Kasneci:
1000 Pupil Segmentations in a Second using Haar Like Features and Statistical Learning. ICCVW 2021: 3459-3469 - [c47]Johannes Schneider, Janine Hacker, Yulia Litvinova, Joshua Peter Handali, Jan vom Brocke:
Exploring the Use of Backgrounds in Web-conferencing with Image and Text Analysis. ICIS 2021 - [c46]Johannes Schneider, Michalis Vlachos:
Explaining Neural Networks by Decoding Layer Activations. IDA 2021: 63-75 - [c45]Joy Gisler, Johannes Schneider, Joshua Handali, Valentin Holzwarth, Christian Hirt, Wolfgang Fuhl, Jan vom Brocke, Andreas M. Kunz:
Indicators of Training Success in Virtual Reality Using Head and Eye Movements. ISMAR Adjunct 2021: 280-285 - [c44]Joshua Peter Handali, Johannes Schneider, Michael Gau, Valentin Holzwarth, Jan vom Brocke:
Visual Complexity and Scene Recognition: How Low Can You Go? VR 2021: 286-295 - [c43]Johannes Schneider, Gramoz Sejfijaj, Jan vom Brocke:
COVID-19 Vaccine Discussion: Evidence from Twitter Data Using Text Mining. WI/IAT (Workshop/Special Session) 2021: 90-96 - [i21]Johannes Schneider:
Domain Transformer: Predicting Samples of Unseen, Future Domains. CoRR abs/2106.06057 (2021) - 2020
- [j15]Janine Hacker, Jan vom Brocke, Joshua Handali, Markus Otto, Johannes Schneider:
Virtually in this together - how web-conferencing systems enabled a new virtual togetherness during the COVID-19 crisis. Eur. J. Inf. Syst. 29(5): 563-584 (2020) - [c42]Joshua Peter Handali, Johannes Schneider, Denis Dennehy, Benedikt Hoffmeister, Kieran Conboy, Jörg Becker:
Industry demand for Analytics: a longitudinal Study. ECIS 2020 - [c41]Michael Reiner Kamm, Michael Gau, Johannes Schneider, Jan vom Brocke:
Smart Waste Collection Processes - A Case Study about Smart Device Implementation. HICSS 2020: 1-10 - [c40]Jan-Peter Kucklick, Michael Reiner Kamm, Johannes Schneider, Jan vom Brocke:
Extending Loyalty Programs with BI Functionalities. HICSS 2020: 1-10 - [c39]Johannes Schneider:
Locality-Promoting Representation Learning. ICPR 2020: 8061-8068 - [c38]Johannes Schneider:
Human-to-AI Coach: Improving Human Inputs to AI Systems. IDA 2020: 431-443 - [c37]Denis Dennehy, Kieran Conboy, Jaganath Babu, Johannes Schneider, Joshua Handali, Jan vom Brocke, Benedikt Hoffmeister, Armin Stein:
Adopting Learning Analytics to Inform Postgraduate Curriculum Design. TDIT (1) 2020: 218-230 - [i20]Johannes Schneider, Joshua Handali, Michalis Vlachos, Christian Meske:
Deceptive AI Explanations: Creation and Detection. CoRR abs/2001.07641 (2020) - [i19]Johannes Schneider:
Correlated Initialization for Correlated Data. CoRR abs/2003.04422 (2020) - [i18]Johannes Schneider, Michalis Vlachos:
Explaining Neural Networks by Decoding Layer Activations. CoRR abs/2005.13630 (2020) - [i17]Johannes Schneider, Frank Breitinger:
Towards AI Forensics: Did the Artificial Intelligence System Do It? Why? CoRR abs/2005.13635 (2020) - [i16]Johannes Schneider:
Humans learn too: Better Human-AI Interaction using Optimized Human Inputs. CoRR abs/2009.09266 (2020) - [i15]Johannes Schneider, Rene Abraham, Christian Meske:
AI Governance for Businesses. CoRR abs/2011.10672 (2020) - [i14]Johannes Schneider, Michalis Vlachos:
Reflective-Net: Learning from Explanations. CoRR abs/2011.13986 (2020) - [i13]Johannes Schneider, Marcus Basalla:
Creativity of Deep Learning: Conceptualization and Assessment. CoRR abs/2012.02282 (2020)
2010 – 2019
- 2019
- [j14]Rene Abraham, Johannes Schneider, Jan vom Brocke:
Data governance: A conceptual framework, structured review, and research agenda. Int. J. Inf. Manag. 49: 424-438 (2019) - [c36]Johannes Schneider, Joshua Peter Handali:
Personalized Explanation for Machine Learning: a Conceptualization. ECIS 2019 - [c35]Johannes Schneider, Marcus Basalla, Stefan Seidel:
Principles of Green Data Mining. HICSS 2019: 1-10 - [c34]Christian Hirt, Valentin Holzwarth, Joy Gisler, Johannes Schneider, Andreas M. Kunz:
Virtual Learning Environment for an Industrial Assembly Task. ICCE-Berlin 2019: 337-342 - [c33]Christian Meske, Iris A. Junglas, Johannes Schneider, Roope Jaakonmäki:
How Social is Your Social Network? Toward A Measurement Model. ICIS 2019 - [c32]Francesco Fusco, Michalis Vlachos, Vasileios Vasileiadis, Kathrin Wardatzky, Johannes Schneider:
RecoNet: An Interpretable Neural Architecture for Recommender Systems. IJCAI 2019: 2343-2349 - [i12]Johannes Schneider, Joshua Handali:
Personalized explanation in machine learning. CoRR abs/1901.00770 (2019) - [i11]Johannes Schneider:
Locality-Promoting Representation Learning. CoRR abs/1905.10661 (2019) - [i10]Johannes Schneider, Michail Vlachos:
Mass Personalization of Deep Learning. CoRR abs/1909.02803 (2019) - [i9]Johannes Schneider:
AI, how can humans communicate better with you? CoRR abs/1912.03652 (2019) - 2018
- [j13]David G. Harris, Johannes Schneider, Hsin-Hao Su:
Distributed (Δ +1)-Coloring in Sublogarithmic Rounds. J. ACM 65(4): 19:1-19:21 (2018) - [j12]Johannes Schneider, Abraham Bernstein, Jan vom Brocke, Kostadin Damevski, David C. Shepherd:
Detecting Plagiarism Based on the Creation Process. IEEE Trans. Learn. Technol. 11(3): 348-361 (2018) - [c31]Johannes Schneider, Joshua Peter Handali, Jan vom Brocke:
Increasing Trust in (Big) Data Analytics. CAiSE Workshops 2018: 70-84 - [c30]Kevin Bösch, Oliver Müller, Johannes Schneider:
Emotional Contagion Through Online Newspapers. ECIS 2018: 171 - [c29]Ruanda Qamili, Shaban Shabani, Johannes Schneider:
An Intelligent Framework for Issue Ticketing System Based on Machine Learning. EDOC Workshops 2018: 79-86 - [c28]Johannes Schneider, Michail Vlachos:
Topic Modeling based on Keywords and Context. SDM 2018: 369-377 - 2017
- [j11]Johannes Schneider, Michail Vlachos:
Scalable density-based clustering with quality guarantees using random projections. Data Min. Knowl. Discov. 31(4): 972-1005 (2017) - [j10]Johannes Schneider, Alexandru Caracas:
Robust speed measurements with standard wireless devices. IET Wirel. Sens. Syst. 7(2): 35-43 (2017) - [j9]Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
A security evaluation of IEC 62351. J. Inf. Secur. Appl. 34: 197-204 (2017) - [j8]Johannes Schneider, Bin Lu:
Secure numerical and logical multi party operations. J. Inf. Secur. Appl. 34: 207-217 (2017) - [j7]Kostadin Damevski, David C. Shepherd, Johannes Schneider, Lori L. Pollock:
Mining Sequences of Developer Interactions in Visual Studio for Usage Smells. IEEE Trans. Software Eng. 43(4): 359-371 (2017) - [c27]Johannes Schneider, Markus Weinmann, Jan vom Brocke, Christoph Schneider:
Identifying Preferences through mouse cursor movements - Preliminary Evidence. ECIS 2017 - [c26]Matús Harvan, Samuel Kimoto, Thomas Locher, Yvonne-Anne Pignolet, Johannes Schneider:
Processing Encrypted and Compressed Time Series Data. ICDCS 2017: 1053-1062 - [c25]Johannes Schneider, Christian Meske:
Gender Differences in Enterprise Social Network Usage and Transformation over Time. ICIS 2017 - [i8]Johannes Schneider:
Topic Modeling based on Keywords and Context. CoRR abs/1710.02650 (2017) - 2016
- [j6]Leonid Barenboim, Michael Elkin, Seth Pettie, Johannes Schneider:
The Locality of Distributed Symmetry Breaking. J. ACM 63(3): 20:1-20:45 (2016) - [c24]Johannes Schneider, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier:
Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance. SECRYPT 2016: 49-60 - [c23]David G. Harris, Johannes Schneider, Hsin-Hao Su:
Distributed (∆+1)-coloring in sublogarithmic rounds. STOC 2016: 465-478 - [i7]David G. Harris, Johannes Schneider, Hsin-Hao Su:
Distributed (Δ+1)-Coloring in Sublogarithmic Rounds. CoRR abs/1603.01486 (2016) - [i6]Johannes Schneider:
Oblivious Sorting and Queues. CoRR abs/1612.03343 (2016) - [i5]Johannes Schneider, Thomas Locher:
Obfuscation using Encryption. CoRR abs/1612.03345 (2016) - [i4]Johannes Schneider, Avi Bernstein, Jan vom Brocke, Kostadin Damevski, David C. Shepherd:
Detecting Plagiarism based on the Creation Process. CoRR abs/1612.09183 (2016) - 2015
- [j5]Michail Vlachos, Johannes Schneider, Vassilios G. Vassiliadis:
On Data Publishing with Clustering Preservation. ACM Trans. Knowl. Discov. Data 9(3): 23:1-23:30 (2015) - [c22]Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
Assessing the Security of IEC 62351. ICS-CSR 2015 - [c21]Johannes Schneider, Sebastian Obermeier, Roman Schlegel:
Cyber Security Maintenance for SCADA Systems. ICS-CSR 2015 - [c20]Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
Structured system threat modeling and mitigation analysis for industrial automation systems. INDIN 2015: 197-203 - [i3]Johannes Schneider:
Secure Numerical and Logical Multi Party Operations. CoRR abs/1511.03829 (2015) - 2014
- [j4]Hans-Christian Estler, Martin Nordio, Carlo A. Furia, Bertrand Meyer, Johannes Schneider:
Agile vs. structured distributed software development: A case study. Empir. Softw. Eng. 19(5): 1197-1224 (2014) - [c19]Johannes Schneider, Jasmina Bogojeska, Michail Vlachos:
Solving Linear SVMs with Multiple 1D Projections. CIKM 2014: 221-230 - [c18]Johannes Schneider, Michail Vlachos:
On Randomly Projected Hierarchical Clustering with Guarantees. SDM 2014: 407-415 - [i2]Johannes Schneider, Michail Vlachos:
On Randomly Projected Hierarchical Clustering with Guarantees. CoRR abs/1401.5814 (2014) - 2013
- [j3]Johannes Schneider, Michael Elkin, Roger Wattenhofer:
Symmetry breaking depending on the chromatic number or the neighborhood growth. Theor. Comput. Sci. 509: 40-50 (2013) - [c17]Johannes Schneider, Michail Vlachos:
Fast parameterless density-based clustering via random projections. CIKM 2013: 861-866 - [c16]Johannes Schneider, Stefan Schmid:
Optimal bounds for online page migration with generalized migration costs. INFOCOM 2013: 1905-1913 - 2012
- [c15]Michail Vlachos, Aleksander Wieczorek, Johannes Schneider:
Right-protected data publishing with hierarchical clustering preservation. CIKM 2012: 654-663 - [c14]Leonid Barenboim, Michael Elkin, Seth Pettie, Johannes Schneider:
The Locality of Distributed Symmetry Breaking. FOCS 2012: 321-330 - [c13]H.-Christian Estler, Martín Nordio, Carlo A. Furia, Bertrand Meyer, Johannes Schneider:
Agile vs. Structured Distributed Software Development: A Case Study. ICGSE 2012: 11-20 - [i1]Leonid Barenboim, Michael Elkin, Seth Pettie, Johannes Schneider:
Fast Distributed Algorithms for Maximal Matching and Maximal Independent Set. CoRR abs/1202.1983 (2012) - 2011
- [b1]Johannes Schneider:
Decentralized coordination: methods and applications. ETH Zurich, Zürich, Switzerland, 2011 - [j2]Johannes Schneider, Roger Wattenhofer:
Bounds on contention management algorithms. Theor. Comput. Sci. 412(32): 4151-4160 (2011) - [c12]Johannes Schneider, Roger Wattenhofer:
Poster abstract: Three plane localization. IPSN 2011: 147-148 - [c11]Johannes Schneider, Roger Wattenhofer:
Poster abstract: Message position modulation for power saving and increased bandwidth in sensor networks. IPSN 2011: 149-150 - [c10]Johannes Schneider, Roger Wattenhofer:
Distributed Coloring Depending on the Chromatic Number or the Neighborhood Growth. SIROCCO 2011: 246-257 - [c9]Johannes Schneider, Roger Wattenhofer:
Trading Bit, Message, and Time Complexity of Distributed Algorithms. DISC 2011: 51-65 - 2010
- [j1]Johannes Schneider, Roger Wattenhofer:
An optimal maximal independent set algorithm for bounded-independence graphs. Distributed Comput. 22(5-6): 349-361 (2010) - [c8]David Hasenfratz, Johannes Schneider, Roger Wattenhofer:
Transactional Memory: How to perform load adaption in a simple and distributed manner. HPCS 2010: 163-170 - [c7]Johannes Schneider, Roger Wattenhofer:
A new technique for distributed symmetry breaking. PODC 2010: 257-266 - [c6]Johannes Schneider, Roger Wattenhofer:
Brief announcement: tree decomposition for faster concurrent data structures. PODC 2010: 287-288 - [c5]Johannes Schneider, Roger Wattenhofer:
Brief announcement: efficient graph algorithms without synchronization. PODC 2010: 289-290 - [c4]Johannes Schneider, Roger Wattenhofer:
What Is the Use of Collision Detection (in Wireless Networks)? DISC 2010: 133-147
2000 – 2009
- 2009
- [c3]Johannes Schneider, Roger Wattenhofer:
Bounds on Contention Management Algorithms. ISAAC 2009: 441-451 - [c2]Johannes Schneider, Roger Wattenhofer:
Coloring unstructured wireless multi-hop networks. PODC 2009: 210-219 - 2008
- [c1]Johannes Schneider, Roger Wattenhofer:
A log-star distributed maximal independent set algorithm for growth-bounded graphs. PODC 2008: 35-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint