Benjamin Erb

Benjamin Erb
Ulm University | UULM · Institute of Distributed Systems

Dr. rer. nat.

About

47
Publications
26,815
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
404
Citations
Introduction
Benjamin Erb has been studying Computer Sciene in Media at the University of Ulm until 2012. In summer 2012, he joined the Institute of Distributed Systems at the University of Ulm and now works as a research assistant. His main research interests include distrbuted event-based & graph-based computing and distributed systems & architectures.
Additional affiliations
October 2012 - present
Ulm University
Position
  • Research Assistant/Lecturer
August 2012 - present
Ulm University
Position
  • Research Assistant
Education
October 2014 - October 2017
Ulm University
Field of study
  • Psychology
October 2006 - July 2012
Ulm University
Field of study
  • Computer Science in Media

Publications

Publications (47)
Conference Paper
Systems for highly interconnected application domains are increasingly taking advantage of graph-based computing platforms. Existing platforms employ a batch-oriented computing model and neglect near-realtime processing or temporal analysis. We suggest an extended conceptual model for event-driven computing on graphs. It takes into account the evol...
Thesis
Full-text available
Web architectures are an important asset for various large-scale web applications, such as social networks or e-commerce sites. Being able to handle huge numbers of users concurrently is essential, thus scalability is one of the most important features of these architectures. Multicore processors, highly distributed backend architectures and new we...
Article
Full-text available
Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue that understanding the ``dark side'', namely how personal...
Conference Paper
Full-text available
The research field of data analytics has grown significantly with the increase of gathered and available data. Accordingly, a large number of tools, metrics, and best practices have been proposed to make sense of this vast amount of data. To this end, benchmarking and standardization are needed to understand the proposed approaches better and conti...
Article
Full-text available
Digital interactions via the internet have become the norm rather than the exception in our global society. Concerns have been raised about human-centered privacy and the often unreflected self-disclosure behavior of internet users. This study on human-centered privacy follows two major aims: first, investigate the willingness of university student...
Preprint
The open science movement has taken up the important challenge to increase transparency of statistical analyses, to facilitate reproducibility of studies, and to enhance reusability of data sets. To counter the replication crisis in the psychological and related sciences, the movement also urges researchers to publish their primary data sets alongs...
Preprint
Full-text available
Modern single page web applications require client-side executions of application logic, including critical functionality such as client-side cryptography. Existing mechanisms such as TLS and Subresource Integrity secure the communication and provide external resource integrity. However, the browser is unaware of modifications to the client-side ap...
Preprint
Full-text available
Empirical sciences and in particular psychology suffer a methodological crisis due to the non-reproducibility of results, and in rare cases, questionable research practices. Pre-registered studies and the publication of raw data sets have emerged as effective countermeasures. However, this approach represents only a conceptual procedure and may in...
Article
Full-text available
Background Software agents are computer-programs that conduct conversations with a human. The present study evaluates the feasibility of the software agent “SISU” aiming to uplift psychological wellbeing. Methods: Within a one-group pretest-posttest trial, N = 30 German-speaking participants were recruited. Assessments took place before (t1), durin...
Article
Full-text available
Introduction Only a minority of people living with mental health problems are getting professional help. As digitalisation moves on, the possibility of providing internet/mobile-based interventions (IMIs) arises. One type of IMIs are fully automated conversational software agents (chatbots). Software agents are computer programs that can hold conve...
Thesis
Modern applications with increasingly connected domain topologies require processing and programming abstractions that reflect the network structure inherent to these applications. At the same time, data-intensive applications necessitate more and more online processing capabilities when consuming incoming streams of events to execute continuous co...
Chapter
In this chapter, we discuss the privacy implications of mobile sensing and modern psycho-social sciences. We aim to raise awareness of the multifaceted nature of privacy, describing the legal, technical and applied aspects in some detail. Not only since the European GDPR, these aspects lead to a broad spectrum of challenges of which data processors...
Article
Background and Purpose: The present age of digitalization brings with it progress and new possibilities for health care in general and clinical psychology/psychotherapy in particular. Internet- and mobile-based interventions (IMIs) have often been evaluated. A fully automated version of IMIs are chatbots. Chatbots are automated computer programs th...
Article
Hintergrund und Ziel: Das gegenwärtige Zeitalter der Digitalisierung bringt Fortschritte und neue Möglichkeiten in der Gesundheitsversorgung im Allgemeinen und im Besonderen in der klinischen Psychologie und Psychotherapie mit sich. Internet- und mobilbasierte Interventionen (IMIs) sind inzwischen vielfach evaluiert. Eine vollständig automatisierte...
Chapter
Slow-running attacks against network applications are often not easy to detect, as the attackers behave according to the specification. The servers of many network applications are not prepared for such attacks, either due to missing countermeasures or because their default configurations ignores such attacks. The pressure to secure network service...
Preprint
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps. Novel services built upon UDP increase the need for automated mitigation mechanisms that react to attacks without prior knowledge of...
Conference Paper
State changes over time are inherent characteristics of stateful applications. So far, there are almost no attempts to make the past application history programmatically accessible or even modifiable. This is primarily due to the complexity of temporal changes and a difficult alignment with prevalent programming primitives and persistence strategie...
Conference Paper
Event sourcing is increasingly used and implemented in event-based systems for maintaining the evolution of application state. However, unbounded event logs are impracticable for many systems, as it is difficult to align scalability requirements and long-term runtime behavior with the corresponding storage requirements. To this end, we explore the...
Conference Paper
Distributed event-sourced systems adopt a fairly new architectural style for data-intensive applications that maintains the full history of the application state. However, the performance implications of such systems are not yet well explored, let alone how the performance of these systems can be improved. A central issue is the lack of systematic...
Conference Paper
Full-text available
Stream-based graph systems continuously ingest graph-changing events via an established input stream, performing the required computation on the corresponding graph. While there are various benchmarking and evaluation approaches for traditional, batch-oriented graph processing systems, there are no common procedures for evaluating stream-based grap...
Article
Full-text available
Slow-running attacks against network applications are often not easy to detect, as the attackers behave according to the specification. The servers of many network applications are not prepared for such attacks, either due to missing countermeasures or because their default configurations ignores such attacks. The pressure to secure network service...
Conference Paper
Several data-intensive applications take streams of events as a continuous input and internally map events onto a dynamic, graph-based data model which is then used for processing. The differences between event processing, graph computing, as well as batch processing and near-realtime processing yield a number of specific requirements for computing...
Conference Paper
An increasing number of distributed, event-based systems adopt an architectural style called event sourcing, in which entities keep their entire history in an event log. Event sourcing enables data lineage and allows entities to rebuild any previous state. Restoring previous application states is a straight-forward task in event-sourced systems wit...
Poster
Many data-driven applications require mechanisms for processing interconnected or graph-based data sets. Several platforms exist for offline processing of such data and fewer solutions address online computations on dynamic graphs. We combined a modified actor model, an event-sourced persistence layer, and a vertex-based, asynchronous programming m...
Conference Paper
The age of cloud computing has introduced all the mechanisms needed to elastically scale distributed, cloud-enabled applications. At roughly the same time, NoSQL databases have been proclaimed as the scalable alternative to relational databases. Since then, NoSQL databases are a core component of many large-scale distributed applications. This pape...
Conference Paper
In large-scale disaster scenarios, efficient triage management is a major challenge for emergency services. Rescue forces traditionally respond to such incidents with a paper-based triage system, but technical solutions can potentially achieve improved usability and data availability. We develop a triage management system based on commodity hardwar...
Technical Report
Full-text available
Big data and data analytics enable novel kinds of data-driven decision making and management strategies in human resources. Approaches such as people analytics have already been implemented by corporations and replace traditional procedures for recruiting, hiring, and staff development. Due to the disruptive force of automation and the momentum of...
Technical Report
Full-text available
One of the aims of artificial intelligence is the reproduction of human cognition. With increasing complexity of artificial intelligence, advanced cognitive characteristics such as the theory of mind may become relevant in this scheme. Therefore, we briefly discuss the intersection of artificial intelligence and the theory of mind for human-machine...
Conference Paper
The actor model is an established programming model for distributed applications. Combining event sourcing with the actor model allows the reconstruction of previous states of an actor. When this event sourcing approach for actors is enhanced with additional causality information, novel types of actor-based, retroactive computations are possible. A...
Conference Paper
A basic reason for backend systems in mobile application architectures is the centralized management of state. Mobile clients synchronize local states with the backend in order to maintain an up-to-date view of the application state. As not all mobile social applications require strong consistency guarantees, we survey an alternative approach usin...
Presentation
Full-text available
While traditional graph computing usually employs batch processing, near-realtime computations on streaming data are often accomplished using event processing technologies. However, an increasing number of applications requires both computing capabilities for scenarios with highly dynamic and highly interconnected data fed by a stream of events. We...
Technical Report
Full-text available
The processing of large-scale data sets and streaming data is challenging traditional computing platforms and lacks increasingly relevant features such as data lineage and inherent support for retrospective and predictive analytics. By combining concepts from event processing and graph computing, an Actor-related programming model, and an event-bas...
Conference Paper
Distributed database systems represent an essential component of modern enterprise application architectures. If the overall application needs to provide reliability and availability, the database has to guarantee these properties as well. Entailing non-functional database features such as replication, consistency, conflict management, and partitio...
Conference Paper
Full-text available
Computational power for content filtering in high-speed networks reaches a limit, but many applications as intru-sion detection systems rely on such processes. Especially signature based methods need extraction of header fields. Hence we created an parallel protocol-stack parser module on the NetFPGA 10G architecture with a framework for simple ada...
Article
Modern web applications are concurrently used by many users and provide increasingly interactive features. Multi-core processors, highly distributed backend architectures, and new web technologies force a reconsideration of approaches for concurrent programming in order to fulfil scalability demands and to implement modern web application features....
Conference Paper
Discrete event simulations (DES) represent the status quo for many different types of simulations. There are still open challenges, such as designing distributed simulation architectures, providing development and debugging support, or analyzing and evaluating simulation runs. In the area of scalable, distributed application architectures exists a...
Conference Paper
Full-text available
The goal of the diretto project is the creation of an extensible infrastructure and easy-to-use toolset for distributed on-site media reporting and collaborative event coverage in real-time. It empowers collocated users to participate dynamically in event reporting, and facilitates collaboration with remote users. For example, to cover public eve...
Technical Report
Full-text available
Nowadays, the World Wide Web is the most important source of information. However, the information is spread on many different web pages. Thus, there is an increasing demand to merge the data for a faster and easier access to the wanted information. Semantic mashup applications assist the user at this task. This report gives a brief overview of how...

Network

Cited By

Projects

Projects (2)
Project
The Next Generation: Chatbots in clinical psychology and psychotherapy to foster mental health? Development and evaluation of the Chatbot "SISU", a Software Agent providing a writing intervention for self-help to uplift psychological wellbeing.
Project
The aim of the chronograph research project is the design and implementation of a platform for event-driven computing on evolving graphs with support for online and offline computations.