@article{60351,
  abstract     = {{<jats:p>This article is a short summary of the report of survey team 3, presented to the 15th International Congress on Mathematical Education (ICME-15) in Sydney in July 2024.</jats:p>}},
  author       = {{Biehler, Rolf and Kawakami, Takashi and Lampen, Erna and Weiland, Travis and Zapata-Cardona, Lucía}},
  issn         = {{2747-7894}},
  journal      = {{European Mathematical Society Magazine}},
  publisher    = {{European Mathematical Society - EMS - Publishing House GmbH}},
  title        = {{{Statistics and data science education as a vehicle for empowering citizens – short summary of a survey}}},
  doi          = {{10.4171/mag/257}},
  year         = {{2025}},
}

@article{60357,
  abstract     = {{<jats:p>Transcripts play a crucial role in qualitative research in computing education, with significant implications for the credibility and reproducibility of findings. However, unreflective and inconsistent transcription standards may unintentionally introduce biases, potentially undermining the validity of research outcomes and the collective progress of the field. In this article, we introduce transcription as a theoretically guided process rather than a mere preparatory step, illustrating its role using a case example. Additionally, through a systematic review of 107 qualitative research articles in computing education, we identify widespread shortcomings in the reporting and implementation of transcription practices, revealing a need for greater intentionality and transparency. To address these challenges, we propose a three-step framework for selecting, applying, and documenting transcription standards that align with the specific context and goals of a study. Rather than advocating for overly complex, one-size-fits-all transcription strategies, we emphasize the importance of a context-appropriate approach that is clearly communicated to foster trust and reproducibility. By advancing a more robust transcription culture, this work aims to support computing education researchers in adopting standards that enhance the quality and reliability of qualitative research in the field.</jats:p>}},
  author       = {{Terfloth, Lutz and Lohmer, Vivien and Kern, Friederike and Schulte, Carsten}},
  issn         = {{1648-5831}},
  journal      = {{Informatics in Education}},
  publisher    = {{Vilnius University Press}},
  title        = {{{Transcription in Computing Education Research: A Review and Recommendations}}},
  doi          = {{10.15388/infedu.2025.09}},
  year         = {{2025}},
}

@article{53805,
  abstract     = {{The article introduces a method to learn dynamical systems that are governed by Euler–Lagrange equations from data. The method is based on Gaussian process regression and identifies continuous or discrete Lagrangians and is, therefore, structure preserving by design. A rigorous proof of convergence as the distance between observation data points converges to zero and lower bounds for convergence rates are provided. Next to convergence guarantees, the method allows for quantification of model uncertainty, which can provide a basis of adaptive sampling techniques. We provide efficient uncertainty quantification of any observable that is linear in the Lagrangian, including of Hamiltonian functions (energy) and symplectic structures, which is of interest in the context of system identification. The article overcomes major practical and theoretical difficulties related to the ill-posedness of the identification task of (discrete) Lagrangians through a careful design of geometric regularisation strategies and through an exploit of a relation to convex minimisation problems in reproducing kernel Hilbert spaces.}},
  author       = {{Offen, Christian}},
  journal      = {{Mathematics of Computation}},
  publisher    = {{American Mathematical Society}},
  title        = {{{Machine learning of continuous and discrete variational ODEs with convergence guarantee and uncertainty quantification}}},
  doi          = {{10.1090/mcom/4120}},
  year         = {{2025}},
}

@article{60496,
  abstract     = {{<jats:p>Hypertree decompositions provide a way to evaluate Conjunctive Queries (CQs) in polynomial time, where the exponent of this polynomial is determined by the width of the decomposition. In theory, the goal of efficient CQ evaluation therefore has to be a minimisation of the width. However, in practical settings, it turns out that there are also other properties of a decomposition that influence the performance of query evaluation. It is therefore of interest to restrict the computation of decompositions by constraints and to guide this computation by preferences. To this end, we propose a novel framework based on candidate tree decompositions, which allows us to introduce soft hypertree width (shw). This width measure is a relaxation of hypertree width (hw); it is never greater than hw and, in some cases, shw may actually be lower than hw. Most importantly, shw preserves the tractability of deciding if a given CQ is below some fixed bound, while offering more algorithmic flexibility. In particular, it provides a natural way to incorporate preferences and constraints into the computation of decompositions. A prototype implementation and preliminary experiments confirm that this novel framework can indeed have a practical impact on query evaluation.</jats:p>}},
  author       = {{Lanzinger, Matthias and Okulmus, Cem and Pichler, Reinhard and Selzer, Alexander and Gottlob, Georg}},
  issn         = {{2836-6573}},
  journal      = {{Proceedings of the ACM on Management of Data}},
  location     = {{Berlin}},
  number       = {{2}},
  pages        = {{1--25}},
  publisher    = {{Association for Computing Machinery (ACM)}},
  title        = {{{Soft and Constrained Hypertree Width}}},
  doi          = {{10.1145/3725251}},
  volume       = {{3}},
  year         = {{2025}},
}

@article{60495,
  author       = {{Podworny, Susanne and Fleischer, Yannik and Biehler, Rolf}},
  journal      = {{Stochastik in der Schule}},
  number       = {{2}},
  pages        = {{9--16}},
  title        = {{{Explorative Datenanalyse in der Schule – Analyse der Mediennutzung von Jugendlichen mit den YOU‑PB Daten}}},
  volume       = {{45}},
  year         = {{2025}},
}

@unpublished{60491,
  abstract     = {{We investigate generalisations of 1-factorisations and hyperfactorisations of the complete graph $K_{2n}$. We show that they are special subsets of the association scheme obtained from the Gelfand pair $(S_{2n},S_2 \wr S_n)$. This unifies and extends results by Cameron (1976) and gives rise to new existence and non-existence results. Our methods involve working in the group algebra $\mathbb{C}[S_{2n}]$ and using the representation theory of $S_{2n}$.}},
  author       = {{Klawuhn, Lukas-André Dominik and Bamberg, John}},
  title        = {{{On the association scheme of perfect matchings and their designs}}},
  year         = {{2025}},
}

@inproceedings{60497,
  abstract     = {{Despite the advantages that the virtual knowledge graph paradigm has brought to many application domains, state-of-the-art systems still do not support popular graph database management systems like Neo4j. Their query rewriting algorithms focus on languages like conjunctive queries and their unions, which were developed for relational data and are poorly suited for graph data. Moreover, they also limit the expressiveness of the ontology languages that admit rewritings, restricting them to those that enjoy the so-called FO-rewritability property. Rewritings have thus focused on the DL-Lite family of Description Logics. In this paper, we propose a technique for rewriting a family of navigational queries for a suitably tailored fragment of ELHI. Leveraging navigational features in the target query language, we can include some widely-used axiom shapes not supported by DL-Lite. We implemented a proof-of-concept prototype that rewrites into Cypher queries, and tested it on a real-world cognitive neuroscience use case with promising results.}},
  author       = {{Löhnert, Bianca and Augsten, Nikolaus and Okulmus, Cem and Ortiz, Magdalena}},
  booktitle    = {{The Semantic Web - 22nd European Semantic Web Conference, {ESWC} 2025, Portoroz, Slovenia, June 1-5, 2025, Proceedings, Part {I}}},
  isbn         = {{9783031945748}},
  issn         = {{0302-9743}},
  keywords     = {{Ontology-based Data Access, Property Graphs, Navigational Queries}},
  location     = {{Portorož, Slovenia}},
  pages        = {{342----361}},
  publisher    = {{Springer Nature Switzerland}},
  title        = {{{Towards Practicable Algorithms for Rewriting Graph Queries Beyond DL-Lite}}},
  doi          = {{10.1007/978-3-031-94575-5_19}},
  volume       = {{15718}},
  year         = {{2025}},
}

@inproceedings{60502,
  author       = {{Zeipert, Henning and Claes, Leander and Stoeckel, Chris and Mulay, Shubham and Henning, Bernd}},
  location     = {{Nürnberg}},
  title        = {{{Evaluation of piezoelectric micromachined ultrasonic transducers (PMUT) for the broadband detection of ultrasonic elastic waves}}},
  doi          = {{10.5162/SMSI2025/D5.2}},
  year         = {{2025}},
}

@inproceedings{60506,
  author       = {{Adler, Enno and Böttcher, Stefan and Hartel, Rita}},
  booktitle    = {{2025 Data Compression Conference (DCC)}},
  publisher    = {{IEEE}},
  title        = {{{String Partition for Building Long BWTs}}},
  doi          = {{10.1109/dcc62719.2025.00044}},
  year         = {{2025}},
}

@article{60508,
  author       = {{Höper, Lukas and Schulte, Carsten}},
  issn         = {{0899-3408}},
  journal      = {{Computer Science Education}},
  pages        = {{1--33}},
  publisher    = {{Informa UK Limited}},
  title        = {{{ReVEAL model and its application to revealing viewpoints on educational approaches to learning about data and AI}}},
  doi          = {{10.1080/08993408.2025.2516957}},
  year         = {{2025}},
}

@inbook{60532,
  author       = {{Biehler, Rolf and Schulte, Carsten}},
  booktitle    = {{Proceedings of the 1st Symposium on Integrating AI and Data Science into School Education Across Disciplines (AIDEA 1 2025), Salzburg, Austria}},
  title        = {{{Lessons Learned from the ProDaBi Project: Shaping Perspectives at the Intersection of Data, AI, and Education Towards Fostering AI and Data Science Literacy in Schools Across Disciplines.}}},
  year         = {{2025}},
}

@inproceedings{60813,
  author       = {{Seiler, Moritz and Preuß, Oliver Ludger and Trautmann, Heike}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2025, NH Malaga Hotel, Malaga, Spain, July 14-18, 2025}},
  editor       = {{Filipic, Bogdan}},
  pages        = {{76–84}},
  publisher    = {{ACM}},
  title        = {{{RandOptGen: A Unified Random Problem Generator for Single- and Multi-Objective Optimization Problems with Mixed-Variable Input Spaces}}},
  doi          = {{10.1145/3712256.3726478}},
  year         = {{2025}},
}

@inproceedings{60812,
  author       = {{Preuß, Oliver Ludger and Mensendiek, Carolin and Rook, Jeroen and Bossek, Jakob and Trautmann, Heike}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2025, NH Malaga Hotel, Malaga, Spain, July 14-18, 2025}},
  editor       = {{Filipic, Bogdan}},
  pages        = {{58–66}},
  publisher    = {{ACM}},
  title        = {{{Automated Algorithm Configuration and Systematic Benchmarking for Heterogeneous MNK-Landscapes}}},
  doi          = {{10.1145/3712256.3726481}},
  year         = {{2025}},
}

@inbook{60816,
  author       = {{Häsel-Weide, Uta and Hußmann, S. and Nührenbörger, M.}},
  booktitle    = {{Rechnen richtig  lernen - flexibel, für alle und von Anfang an. Fachdidaktische Hintergründe und Lernangebote für die Grundschule}},
  editor       = {{Rechtsteiner, C.}},
  pages        = {{71--80}},
  publisher    = {{Klett Kallmeyer}},
  title        = {{{ Flexibles Addieren und Subtrahieren im Zahlenraum bis 100}}},
  year         = {{2025}},
}

@inproceedings{60814,
  author       = {{Schede, Elias and Seiler, Moritz and Tierney, Kevin and Trautmann, Heike}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2025, NH Malaga Hotel, Malaga, Spain, July 14-18, 2025}},
  editor       = {{Filipic, Bogdan}},
  pages        = {{1190–1198}},
  publisher    = {{ACM}},
  title        = {{{Deep reinforcement learning for instance-specific algorithm configuration (GECCO Best Paper Award)}}},
  doi          = {{10.1145/3712256.3726480}},
  year         = {{2025}},
}

@inproceedings{60860,
  author       = {{Fleischer, Franz Yannik and Biehler, Rolf}},
  booktitle    = {{Proceedings of the 48th Conference of the International Group for the Psychology of Mathematics Education: Research Reports, Vol. 1 }},
  editor       = {{Cornejo, C. and Felmer, P. and Gomez, D.M. and Dartnell, P. and Araya, P. and Peri, A. and Randolph, V.}},
  pages        = {{267--274}},
  title        = {{{ANALYZING STUDENTS’INFORMAL APPROACHES TO CREATING DECISION TREES IN THE CLASSROOM}}},
  year         = {{2025}},
}

@inproceedings{60914,
  author       = {{Neumayr, Thomas and Yigitbas, Enes and Augstein, Mirjam and Herder, Eelco and Stojko, Laura and Strecker, Jannis  and Seitz, Julia}},
  booktitle    = {{Proceedings of the Mensch & Computer (2025)}},
  title        = {{{ABIS 2025 – 29th International Workshop on Personalization and Recommendation}}},
  year         = {{2025}},
}

@inproceedings{60915,
  author       = {{Krings, Sarah Claudia and Yigitbas, Enes and Sauer, Stefan}},
  booktitle    = {{Proceedings of the 29th International Workshop on Personalization and Recommendation}},
  title        = {{{Perspectives on Contexts and Adaptations for Cross-Reality}}},
  year         = {{2025}},
}

@inproceedings{60892,
  abstract     = {{At Paderborn University, an AR-based app is being developed to prepare electrical engineering students for laboratory work. This paper aims to review the development of AR since 2010, particularly in technical university laboratories, through a systematic literature review. The study investigates AR's relevance in university teaching and examines specific AR applications in laboratory settings.
Using a mixed-method approach, the research first employs a web crawler to gather 27,249 articles from the Lens database, followed by a bibliometric analysis. Further, Google Scholar is used to find 374 articles related to AR in scientific and technical laboratories, with 51 significant ones evaluated for application areas, findings, and other criteria.
The findings show that AR in education is a growing trend, with a significant increase in publications and citations in recent years. Most studies focus on marker-based mobile AR applications, assessing aspects like motivation and user experience through surveys and interviews. However, there's limited research on AR's learning effectiveness in laboratories, partly due to the scarcity of technical equipment. One study found no significant learning impact from AR.}},
  author       = {{Alptekin, Mesut and Froese, Lennart and Temmen, Katrin}},
  booktitle    = {{Recent Trends of AI Technologies and Virtual Reality: Proceedings of 8th International Conference on Artificial Intelligence and Virtual Reality (AIVR 2024)}},
  keywords     = {{Augmented Reality, Mixed Reality, Literature Review, Bibliometric Analysis, Education \and Laboratories}},
  location     = {{Fukuoka, Japan}},
  pages        = {{427}},
  publisher    = {{Springer Nature}},
  title        = {{{Quantitative and Qualitative Literature Review of Augmented Reality in Teaching}}},
  volume       = {{432}},
  year         = {{2025}},
}

@inproceedings{58657,
  abstract     = {{The rapid growth of 3D printing technology has transformed a wide range of industries, enabling the on-demand production of complex objects, from aerospace components to medical devices. However, this technology also introduces significant security challenges. Previous research highlighted the security implications of G-Codes—commands used to control the printing process. These studies assumed powerful attackers and focused on manipulations of the printed models, leaving gaps in understanding the full attack potential.

In this study, we systematically analyze security threats associated with 3D printing, focusing specifically on vulnerabilities caused by G-Code commands. We introduce attacks and attacker models that assume a less powerful adversary than traditionally considered, broadening the scope of potential security threats. Our findings show that even minimal access to the 3D printer can result in significant security breaches, such as unauthorized access to subsequent print jobs or persistent misconfiguration of the printer. We identify 278 potentially malicious G-Codes across the attack categories Information Disclosure, Denial of Service, and Model Manipulation. Our evaluation demonstrates the applicability of these attacks across various 3D printers and their firmware. Our findings underscore the need for a better standardization process of G-Codes and corresponding security best practices.
}},
  author       = {{Rossel, Jost and Mladenov, Vladislav and Wördenweber, Nico and Somorovsky, Juraj}},
  booktitle    = {{Proceedings of the 34th USENIX Security Symposium}},
  location     = {{Seattle, WA, USA}},
  pages        = {{1867 -- 1885}},
  title        = {{{Security Implications of Malicious G-Codes in 3D Printing}}},
  year         = {{2025}},
}

