Christoph Schommer

Christoph Schommer
University of Luxembourg · Computer Science and Communications Research Unit

Associate Professor

About

59
Publications
2,699
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
173
Citations
Citations since 2017
14 Research Items
98 Citations
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530

Publications

Publications (59)
Conference Paper
The rise of Artificial Intelligence has led to advancements in daily life, including applications in industries, telemedicine, farming, and smart cities. It is necessary to have human-AI synergies to guarantee user engagement and provide interactive expert knowledge, despite AI’s success in "less technical" fields. In this article, the possible syn...
Book
This book contains a selection of the best papers of the 33rd Benelux Conference on Artificial Intelligence, BNAIC/ BENELEARN 2021, held in Esch-sur-Alzette, Luxembourg, in November 2021. The 14 papers presented in this volume were carefully reviewed and selected from 46 regular submissions. They address various aspects of artificial intelligence s...
Article
Parkinson’s disease is a progressive neurodegenerative disorder often accompanied by impairment in articulation, phonation, prosody and fluency of speech. In fact, speech impairment is one of the earliest Parkinson’s disease symptoms, and may be used for early diagnosis. We present an experimental study of identification of Parkinson’s disease and...
Chapter
Full-text available
Conversational interfaces (also called chatbots) have recently disrupted the Internet and opened up endless opportunities for assessment and learning. Formative feedback that provides learners with practical instructions for improvement is one of the challenging tasks in self-assessment settings and self-directed learning. This becomes even more ch...
Conference Paper
This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person's past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that th...
Chapter
People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality. One possible approach to analyze such traits is to take a person’s past opinions into consideration. In practice, such a model can suffer from the...
Article
Full-text available
Previous psychophysiological research suggests that pain measurement needs to go beyond the assessment of Pain Intensity and Unpleasantness by adding the evaluation of Pain-Related Suffering. Based on this three-dimensional approach, we attempted to elucidate who is more likely to suffer by identifying reasons that may lead individuals to report Pa...
Data
Participants’ questionnaire data and pain thresholds. Mean (M) ± standard deviation (SD) and range, in parenthesis, are displayed for all participants. (DOCX)
Data
Participants’ questionnaire data examining the mood state of the participant before the main experiment. Mean ± standard deviation and range (min-max), are displayed for all participants. (DOCX)
Data
Demographic, psychophysical and questionnaire-related data sets. (XLS)
Poster
Type de document : Colloques, congrès, conférences scientifiques et actes : Communication poster Discipline(s) : Sciences sociales & comportementales, psychologie : Neurosciences & comportement Pour citer cette référence : http://hdl.handle.net/10993/28990 Titre : Facteurs psychologiques, cognitifs et les influences contextuelles dans la douleur...
Conference Paper
Spacecrafts provide a large set of on-board components information such as their temperature, power and pressure. This information is constantly monitored by engineers, who capture the outliers and determine whether the situation is abnormal or not. However, due to the large quantity of information, only a small part of the data is being processed...
Article
Spacecrafts provide a large set of on-board components information such as their temperature, power and pressure. This information is constantly monitored by engineers, who capture the outliers and determine whether the situation is abnormal or not. However, due to the large quantity of information, only a small part of the data is being processed...
Chapter
Financial news carry information about economical figures and indicators. However, these texts are mostly unstructured and consequently hard to be processed in an automatic way. In this paper, we present a representation formalism that supports a linguistic composition for machine learning tasks. We show an innovative approach to structuring financ...
Article
This position paper raises the question on how we can keep an independent standpoint regarding the finding of a polarity in a news document. As we know, an usefulness and relevance of a text news may be seen differently by a group of evaluators. The differences are depending on their interests, their knowledge, and/or their ability to understand. R...
Article
In this paper we describe a design approach for an Artificial Conversational Companion according to earlier identified requirements of utility, adaptivity, conversational capabilities and long-term interaction. The Companion is aimed to help advanced learners of a foreign language to practice conversation via instant messenger dialogues. In order t...
Article
Full-text available
This work is based on several attempts to provide a definition and a design approach of Artificial Companions that can be found in the referenced literature. We focus on computer agents that simulate human language behaviour and are aimed to serve, to assist and to accompany their owner over a long period of time, that we call Artificial Conversati...
Conference Paper
In this paper, we introduce an explorative but adaptive-associative information management system in the presence of a natural conversation. We take advantage of explorative mind-maps, which have been demonstrated in [10] and which are altogether a management framework that emerges automatically from the data input stream it gets. An explorative mi...
Article
Conviviality is a concept of great depth that plays an im-portant role in any social interaction. A convivial relation between individuals is one that allows the participating in-dividuals to behave and interact with each other following a set of conventions that are shared, commonly agreed upon, or at least understood. This presupposes implicit or...
Conference Paper
The following (position) paper follows the concept of the field of Artificial Life and argues that the (relational) management of data can be understood as a chemical model. Whereas each data itself is consistent with atomic entities, each combination of data corresponds to a (artificial) molecular structure. For example, an attribute D inside a re...
Conference Paper
We motivate the idea of e-conviviality in Web-based systems and argue that a convivial social being deeply depends on the implicit and explicit co-operation and collaboration of natural users inside a community. We believe that a (individual) conviviality benefits from the wisdom of crowds, meaning that a continuously and dynamic understanding of t...
Article
The explorative mind-map is a dynamic framework, that emerges automatically from the input, it gets. It is unlike a verificative modeling system where existing (human) thoughts are placed and connected together. In this regard, explorative mind-maps change their size continuously, being adaptive with connectionist cells inside; mind-maps process da...
Article
Full-text available
In our understanding, a mind-map is an adaptive engine that basically works incrementally on the fundament of existing transactional streams. Generally, mind-maps consist of symbolic cells that are connected with each other and that become either stronger or weaker depending on the transactional stream. Based on the underlying biologic principle, t...
Article
Since years, the efficiency and potential behind Data Min-ing stimulates the hope of detecting hidden but useful find-ings in the data. The explorative concept is attractive and an excellent initial situation regarding its application in one of the today's most challenging application fields: security, trust, and reliability. The following contribu...
Conference Paper
DBLP is a bibliographic database with more than one million data entries, collected from the last 70 years, and labeled with diverse attributes like the authorspsila names, the publication title, and the year of publishing. With this as ground, the motivation of applying analytical examinations to identifying publishing communities become meaningfu...
Article
Full-text available
Content zoning can be understood as a segmentation of textual documents into zones. This is inspired by [6] who initially proposed an approach for the argumentative zoning of textual documents. With the prototypical CoZo+ engine, we focus on content zoning towards an automatic processing of textual streams while considering only the actors as the z...
Article
For human beings, the processing of text streams of unknown size leads generally to problems because e.g. noise must be selected out, information be tested for its relevance or redundancy, and linguistic phenomenon like ambiguity or the resolution of pronouns be advanced. Putting this into simulation by using an artificial mind-map is a challenge,...
Article
Participating a scientific workshop is nowadays often an adventure because the number of participants do seldom exceed the number of talks. A half-day workshop is mostly finished at lunchtime, speakers are sometimes not present and unexcused, and a strict progression of the workshop offers little air for discussion. And when talks are re-scheduled...
Article
Since many years, theoretical concepts of Data Mining have been developed and improved. Data Mining has become applied to many academic and industrial situations, and recently, soundings of public opinion about privacy have been carried out. However, a consistent and standardized definition is still missing, and the initial explanation given by Fra...
Article
Social Communities in bibliographic databases exist since many years, researchers share common research interests, and work and publish together. A social community may vary in type and size, being fully connected between participating members or even more expressed by a consortium of small and individual members who play individual roles in it. In...
Article
Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these network systems rely on individuality and support an architecture with less collaborative work of the protection...
Article
In this paper, we informally introduce dynamic mind-maps that represent a new approach on the basis of a dynamic construction of connectionist structures during the processing of a data stream. This allows the representation and processing of recursively defined structures and avoids the problem of a more traditional, fixed-size architecture with t...
Article
Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these network systems rely on individuality and support an architecture with less collaborative work of the protection...
Article
Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The n...
Article
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local Installation. Therefore, we introduce a novel Framework for Network Security which is called SANA. SANA contains an ar...
Article
In the today's Internet and TCP/IP-networks, the queueing of packets is commonly implemented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversarial Queueing Theory. Other queueing strategies are researched in this model and better results are performed by alternative queueing strategies, e.g. LIS (Longe...
Article
If a computer node is infected by a virus, worm or a backdoor, then this is a security risk for the complete network structure where the node is associated. Existing Network Intrusion Detection Systems (NIDS) provide a certain amount of support for the identification of such infected nodes but suffer from the need of plenty of communication and com...
Article
This Master of Science in Computer and Information Sciences (MICS) is an international accredited master program that has been initiated in 2004 and started in September 2005. MICS is a research-oriented academic study of 4 semesters and a continuation of the Bachelor towards the PhD. It is completely taught in English, supported by lecturers comin...
Article
Documents in scientific newspapers are often marked by attitudes and opinions of the author and/or other persons, who contribute with objective and subjective statements and arguments as well. In this respect, the attitude is often accomplished by a linguistic modality. As in languages like english, french and german, the modality is expressed by s...
Article
Full-text available
The recognition, involvement, and description of main actors inuences the story line of the whole text. This is of higher importance as the text per se repre- sents a ow of words and expressions that once it is read it is lost. In this respect, the understanding of a text and moreover on how the actor exactly behaves is not only a major concern: as...
Article
Current research in author profiling to discover a legal author's fingerprint does not only follow examinations based on statistical parameters only but include more and more dynamic methods that can learn and that react adaptable to the specific behavior of an author. But the question on how to appropriately represent a text is still one of the fu...
Conference Paper
With the use of electronic mail as a communicative medium, the occurrence of spam emails has increased and kept stable; and although spam can be detected by spam filtering, an element of risk of a continuously network overload remains. To add insult to injury, spammers augment novel, clever and astute techniques, which currently leads to a neck-and...
Conference Paper
Spam is an increasing problem when using email as communication medium. Spam is detected and removed using spam filters. Furthermore, the spammers use more and more intelligent and complex techniques and novel approaches are required to enhance existing spam filters. One promising technique is the Argumentative Zoning that classifies a text in diff...
Conference Paper
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems normally use stochastic approaches or a rule-based system to detect intrusions and to describe the known intrusions. These systems have some disad- vantages which we solv...
Conference Paper
As a method structuring information and knowledge contained in texts, text categorization can be to a great extend automated. The automatic text classification systems implement machine learning algorithms and need training samples. In commercial applications however, the automatic categorization appear to come up against limiting factors. For exam...
Chapter
Full-text available
Churn Prediction, d.h. die Vorhersage einer Kündigung, ist heute eine wichtige Aufgabe vieler Unternehmen, in denen die Kunden per Vertrag an das Unternehmen gebunden sind. Dies gilt insbesondere auch in der Mobilfunkbranche, da hier ein sehr junger Markt mit ausgesprochen dynamischem Marktverhalten beim Kunden vorliegt. Die Akquise eines neuen Kun...
Article
Die Planung und Umsetzung eines umfassenden CRM-Konzeptes ist ein umfangreiches Vorhaben und erfordert deshalb ein systematisches Vorgehen. Es berührt alle Facetten des Unternehmens, die kundenorientiert ausgerichtet werden müssen: Geschäftsprozesse, Organisationsstruktur, Mitarbeiter und Informationstechnologie. In diesem Kapitel wird deswegen ein...
Article
The explorative analysis of tennis data through data mining is a widely un-explored field, and existing analytical approaches only concern an static delivery of textual-based information or statistical parameters. Moreover, the threatment of more intellectual questions concerning the discovery of a player's behaviour, the discovery of patterns that...

Network

Cited By

Projects

Projects (2)