[{"title":"Using Approximate Computing for the Calculation of Inverse Matrix p-th Roots","abstract":[{"text":"Approximate computing has shown to provide new ways to improve performance\r\nand power consumption of error-resilient applications. While many of these\r\napplications can be found in image processing, data classification or machine\r\nlearning, we demonstrate its suitability to a problem from scientific\r\ncomputing. Utilizing the self-correcting behavior of iterative algorithms, we\r\nshow that approximate computing can be applied to the calculation of inverse\r\nmatrix p-th roots which are required in many applications in scientific\r\ncomputing. Results show great opportunities to reduce the computational effort\r\nand bandwidth required for the execution of the discussed algorithm, especially\r\nwhen targeting special accelerator hardware.","lang":"eng"}],"doi":"10.1109/LES.2017.2760923","project":[{"_id":"32","name":"Performance and Efficiency in HPC with Custom Computing","grant_number":"PL 595/2-1"},{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"user_id":"16153","external_id":{"arxiv":["1703.02283"]},"publication":"Embedded Systems Letters","type":"journal_article","volume":10,"page":" 33-36","issue":"2","author":[{"orcid":"0000-0002-5708-7632","id":"24135","last_name":"Lass","first_name":"Michael","full_name":"Lass, Michael"},{"last_name":"Kühne","id":"49079","full_name":"Kühne, Thomas","first_name":"Thomas"},{"id":"16153","last_name":"Plessl","first_name":"Christian","full_name":"Plessl, Christian","orcid":"0000-0001-5728-9982"}],"intvolume":"        10","publication_status":"published","citation":{"chicago":"Lass, Michael, Thomas Kühne, and Christian Plessl. “Using Approximate Computing for the Calculation of Inverse Matrix P-Th Roots.” <i>Embedded Systems Letters</i> 10, no. 2 (2018): 33–36. <a href=\"https://doi.org/10.1109/LES.2017.2760923\">https://doi.org/10.1109/LES.2017.2760923</a>.","ieee":"M. Lass, T. Kühne, and C. Plessl, “Using Approximate Computing for the Calculation of Inverse Matrix p-th Roots,” <i>Embedded Systems Letters</i>, vol. 10, no. 2, pp. 33–36, 2018.","apa":"Lass, M., Kühne, T., &#38; Plessl, C. (2018). Using Approximate Computing for the Calculation of Inverse Matrix p-th Roots. <i>Embedded Systems Letters</i>, <i>10</i>(2), 33–36. <a href=\"https://doi.org/10.1109/LES.2017.2760923\">https://doi.org/10.1109/LES.2017.2760923</a>","ama":"Lass M, Kühne T, Plessl C. Using Approximate Computing for the Calculation of Inverse Matrix p-th Roots. <i>Embedded Systems Letters</i>. 2018;10(2):33-36. doi:<a href=\"https://doi.org/10.1109/LES.2017.2760923\">10.1109/LES.2017.2760923</a>","short":"M. Lass, T. Kühne, C. Plessl, Embedded Systems Letters 10 (2018) 33–36.","mla":"Lass, Michael, et al. “Using Approximate Computing for the Calculation of Inverse Matrix P-Th Roots.” <i>Embedded Systems Letters</i>, vol. 10, no. 2, IEEE, 2018, pp. 33–36, doi:<a href=\"https://doi.org/10.1109/LES.2017.2760923\">10.1109/LES.2017.2760923</a>.","bibtex":"@article{Lass_Kühne_Plessl_2018, title={Using Approximate Computing for the Calculation of Inverse Matrix p-th Roots}, volume={10}, DOI={<a href=\"https://doi.org/10.1109/LES.2017.2760923\">10.1109/LES.2017.2760923</a>}, number={2}, journal={Embedded Systems Letters}, publisher={IEEE}, author={Lass, Michael and Kühne, Thomas and Plessl, Christian}, year={2018}, pages={33–36} }"},"department":[{"_id":"27"},{"_id":"518"},{"_id":"304"}],"publisher":"IEEE","date_created":"2017-07-25T14:41:08Z","status":"public","language":[{"iso":"eng"}],"publication_identifier":{"issn":["1943-0663"],"eissn":["1943-0671"]},"year":"2018","_id":"20","date_updated":"2022-01-06T06:54:18Z"},{"type":"conference","year":"2018","language":[{"iso":"eng"}],"status":"public","publication":"Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","date_created":"2020-10-23T16:46:30Z","date_updated":"2022-01-06T06:54:21Z","page":"1930–1940","_id":"20188","title":"The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants","author":[{"last_name":"Habernal","full_name":"Habernal, Ivan","first_name":"Ivan"},{"first_name":"Henning","full_name":"Wachsmuth, Henning","id":"3900","last_name":"Wachsmuth"},{"last_name":"Gurevych","first_name":"Iryna","full_name":"Gurevych, Iryna"},{"first_name":"Benno","full_name":"Stein, Benno","last_name":"Stein"}],"department":[{"_id":"600"}],"citation":{"mla":"Habernal, Ivan, et al. “The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants.” <i>Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies</i>, 2018, pp. 1930–1940.","bibtex":"@inproceedings{Habernal_Wachsmuth_Gurevych_Stein_2018, title={The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants}, booktitle={Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies}, author={Habernal, Ivan and Wachsmuth, Henning and Gurevych, Iryna and Stein, Benno}, year={2018}, pages={1930–1940} }","short":"I. Habernal, H. Wachsmuth, I. Gurevych, B. Stein, in: Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2018, pp. 1930–1940.","apa":"Habernal, I., Wachsmuth, H., Gurevych, I., &#38; Stein, B. (2018). The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants. In <i>Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies</i> (pp. 1930–1940).","ama":"Habernal I, Wachsmuth H, Gurevych I, Stein B. The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants. In: <i>Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies</i>. ; 2018:1930–1940.","chicago":"Habernal, Ivan, Henning Wachsmuth, Iryna Gurevych, and Benno Stein. “The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants.” In <i>Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies</i>, 1930–1940, 2018.","ieee":"I. Habernal, H. Wachsmuth, I. Gurevych, and B. Stein, “The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants,” in <i>Proceedings of the 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies</i>, 2018, pp. 1930–1940."},"user_id":"82920"},{"conference":{"end_date":"2018-06-18","name":"The 13th Workshop on the Economics of Networks, Systems and Computation (NetEcon 2018)","start_date":"2018-06-18","location":"Irvine, California, USA"},"author":[{"orcid":"0000-0003-1348-6516","id":"14052","last_name":"Feldotto","first_name":"Matthias","full_name":"Feldotto, Matthias"},{"full_name":"Haake, Claus-Jochen","first_name":"Claus-Jochen","last_name":"Haake","id":"20801"},{"id":"40384","last_name":"Skopalik","first_name":"Alexander","full_name":"Skopalik, Alexander"},{"full_name":"Stroh-Maraun, Nadja","first_name":"Nadja","id":"13264","last_name":"Stroh-Maraun"}],"citation":{"apa":"Feldotto, M., Haake, C.-J., Skopalik, A., &#38; Stroh-Maraun, N. (2018). Disaggregating User Evaluations Using the Shapley Value. In <i>Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)</i> (pp. 5:1-5:6). Irvine, California, USA. <a href=\"https://doi.org/10.1145/3230654.3230659\">https://doi.org/10.1145/3230654.3230659</a>","ama":"Feldotto M, Haake C-J, Skopalik A, Stroh-Maraun N. Disaggregating User Evaluations Using the Shapley Value. In: <i>Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)</i>. ; 2018:5:1-5:6. doi:<a href=\"https://doi.org/10.1145/3230654.3230659\">10.1145/3230654.3230659</a>","chicago":"Feldotto, Matthias, Claus-Jochen Haake, Alexander Skopalik, and Nadja Stroh-Maraun. “Disaggregating User Evaluations Using the Shapley Value.” In <i>Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)</i>, 5:1-5:6, 2018. <a href=\"https://doi.org/10.1145/3230654.3230659\">https://doi.org/10.1145/3230654.3230659</a>.","ieee":"M. Feldotto, C.-J. Haake, A. Skopalik, and N. Stroh-Maraun, “Disaggregating User Evaluations Using the Shapley Value,” in <i>Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)</i>, Irvine, California, USA, 2018, pp. 5:1-5:6.","mla":"Feldotto, Matthias, et al. “Disaggregating User Evaluations Using the Shapley Value.” <i>Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)</i>, 2018, pp. 5:1-5:6, doi:<a href=\"https://doi.org/10.1145/3230654.3230659\">10.1145/3230654.3230659</a>.","bibtex":"@inproceedings{Feldotto_Haake_Skopalik_Stroh-Maraun_2018, title={Disaggregating User Evaluations Using the Shapley Value}, DOI={<a href=\"https://doi.org/10.1145/3230654.3230659\">10.1145/3230654.3230659</a>}, booktitle={Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)}, author={Feldotto, Matthias and Haake, Claus-Jochen and Skopalik, Alexander and Stroh-Maraun, Nadja}, year={2018}, pages={5:1-5:6} }","short":"M. Feldotto, C.-J. Haake, A. Skopalik, N. Stroh-Maraun, in: Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018), 2018, pp. 5:1-5:6."},"publication_status":"published","department":[{"_id":"541"},{"_id":"63"},{"_id":"205"},{"_id":"475"}],"date_created":"2018-05-22T10:28:51Z","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["978-1-4503-5916-0"]},"year":"2018","status":"public","_id":"2831","file_date_updated":"2018-08-15T07:30:50Z","date_updated":"2022-01-06T06:58:01Z","title":"Disaggregating User Evaluations Using the Shapley Value","file":[{"creator":"nmaraun","file_name":"Disaggregating User Evaluations Using the Shapley Value.pdf","file_size":1450171,"content_type":"application/pdf","access_level":"closed","file_id":"3910","date_created":"2018-08-15T07:30:50Z","relation":"main_file","date_updated":"2018-08-15T07:30:50Z","success":1}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A3","_id":"7"}],"abstract":[{"text":"We consider a market where final products or services are compositions of a number of basic services. Users are asked to evaluate the quality of the composed product after purchase. The quality of the basic service influences the performance of the composed services but cannot be observed directly. The question we pose is whether it is possible to use user evaluations on composed services to assess the quality of basic services. We discuss how to combine aggregation of evaluations across users and disaggregation of information on composed services to derive valuations for the single components. As a solution we propose to use the (weighted) average as aggregation device in connection with the Shapley value as disaggregation method, since this combination fulfills natural requirements in our context. In addition, we address some occurring computational issues: We give an approximate solution concept using only a limited number of evaluations which guarantees nearly optimal results with reduced running time. Lastly, we show that a slightly modified Shapley value and the weighted average are still applicable if the evaluation profiles are incomplete.","lang":"eng"}],"has_accepted_license":"1","doi":"10.1145/3230654.3230659","user_id":"14052","publication":"Proceedings of the 13th Workshop on Economics of Networks, Systems and Computation (NetEcon 2018)","ddc":["040"],"type":"conference","page":"5:1-5:6"},{"publication":"Algorithmica","ddc":["000"],"type":"journal_article","page":"1556–1574","volume":80,"issue":"5","title":"Towards Flexible Demands in Online Leasing Problems. ","file":[{"date_created":"2018-11-02T15:18:16Z","access_level":"closed","content_type":"application/pdf","file_id":"5298","file_name":"TowardsFlexibleDemandsInOnline.pdf","file_size":600583,"creator":"ups","success":1,"relation":"main_file","date_updated":"2018-11-02T15:18:16Z"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"has_accepted_license":"1","doi":"10.1007/s00453-018-0420-y","user_id":"477","date_created":"2018-05-24T08:32:38Z","publisher":"Springer","language":[{"iso":"eng"}],"year":"2018","status":"public","file_date_updated":"2018-11-02T15:18:16Z","_id":"2848","date_updated":"2022-01-06T06:58:06Z","author":[{"first_name":"Shouwei","full_name":"Li, Shouwei","last_name":"Li"},{"id":"37612","last_name":"Markarian","full_name":"Markarian, Christine","first_name":"Christine"},{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"intvolume":"        80","citation":{"short":"S. Li, C. Markarian, F. Meyer auf der Heide, Algorithmica 80 (2018) 1556–1574.","mla":"Li, Shouwei, et al. “Towards Flexible Demands in Online Leasing Problems. .” <i>Algorithmica</i>, vol. 80, no. 5, Springer, 2018, pp. 1556–1574, doi:<a href=\"https://doi.org/10.1007/s00453-018-0420-y\">10.1007/s00453-018-0420-y</a>.","bibtex":"@article{Li_Markarian_Meyer auf der Heide_2018, title={Towards Flexible Demands in Online Leasing Problems. }, volume={80}, DOI={<a href=\"https://doi.org/10.1007/s00453-018-0420-y\">10.1007/s00453-018-0420-y</a>}, number={5}, journal={Algorithmica}, publisher={Springer}, author={Li, Shouwei and Markarian, Christine and Meyer auf der Heide, Friedhelm}, year={2018}, pages={1556–1574} }","chicago":"Li, Shouwei, Christine Markarian, and Friedhelm Meyer auf der Heide. “Towards Flexible Demands in Online Leasing Problems. .” <i>Algorithmica</i> 80, no. 5 (2018): 1556–1574. <a href=\"https://doi.org/10.1007/s00453-018-0420-y\">https://doi.org/10.1007/s00453-018-0420-y</a>.","ieee":"S. Li, C. Markarian, and F. Meyer auf der Heide, “Towards Flexible Demands in Online Leasing Problems. ,” <i>Algorithmica</i>, vol. 80, no. 5, pp. 1556–1574, 2018.","ama":"Li S, Markarian C, Meyer auf der Heide F. Towards Flexible Demands in Online Leasing Problems. . <i>Algorithmica</i>. 2018;80(5):1556–1574. doi:<a href=\"https://doi.org/10.1007/s00453-018-0420-y\">10.1007/s00453-018-0420-y</a>","apa":"Li, S., Markarian, C., &#38; Meyer auf der Heide, F. (2018). Towards Flexible Demands in Online Leasing Problems. . <i>Algorithmica</i>, <i>80</i>(5), 1556–1574. <a href=\"https://doi.org/10.1007/s00453-018-0420-y\">https://doi.org/10.1007/s00453-018-0420-y</a>"},"department":[{"_id":"63"}]},{"publication_identifier":{"unknown":["1432-4350"]},"year":"2018","language":[{"iso":"eng"}],"status":"public","date_created":"2018-05-24T08:39:15Z","publisher":"Springer","date_updated":"2022-01-06T06:58:06Z","file_date_updated":"2018-11-02T15:24:32Z","_id":"2849","author":[{"last_name":"Abu-Khzam","full_name":"Abu-Khzam, Faisal N. ","first_name":"Faisal N. "},{"id":"37612","last_name":"Markarian","first_name":"Christine","full_name":"Markarian, Christine"},{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","last_name":"Meyer auf der Heide","id":"15523"},{"last_name":"Schubert","full_name":"Schubert, Michael","first_name":"Michael"}],"department":[{"_id":"63"}],"citation":{"ama":"Abu-Khzam FN, Markarian C, Meyer auf der Heide F, Schubert M. Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks. <i>Theory of Computing Systems</i>. 2018. doi:<a href=\"https://doi.org/10.1007/s00224-017-9836-z\">10.1007/s00224-017-9836-z</a>","apa":"Abu-Khzam, F. N., Markarian, C., Meyer auf der Heide, F., &#38; Schubert, M. (2018). Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks. <i>Theory of Computing Systems</i>. <a href=\"https://doi.org/10.1007/s00224-017-9836-z\">https://doi.org/10.1007/s00224-017-9836-z</a>","chicago":"Abu-Khzam, Faisal N. , Christine Markarian, Friedhelm Meyer auf der Heide, and Michael Schubert. “Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-Hoc Networks.” <i>Theory of Computing Systems</i>, 2018. <a href=\"https://doi.org/10.1007/s00224-017-9836-z\">https://doi.org/10.1007/s00224-017-9836-z</a>.","ieee":"F. N. Abu-Khzam, C. Markarian, F. Meyer auf der Heide, and M. Schubert, “Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks,” <i>Theory of Computing Systems</i>, 2018.","mla":"Abu-Khzam, Faisal N., et al. “Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-Hoc Networks.” <i>Theory of Computing Systems</i>, Springer, 2018, doi:<a href=\"https://doi.org/10.1007/s00224-017-9836-z\">10.1007/s00224-017-9836-z</a>.","bibtex":"@article{Abu-Khzam_Markarian_Meyer auf der Heide_Schubert_2018, title={Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks}, DOI={<a href=\"https://doi.org/10.1007/s00224-017-9836-z\">10.1007/s00224-017-9836-z</a>}, journal={Theory of Computing Systems}, publisher={Springer}, author={Abu-Khzam, Faisal N.  and Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert, Michael}, year={2018} }","short":"F.N. Abu-Khzam, C. Markarian, F. Meyer auf der Heide, M. Schubert, Theory of Computing Systems (2018)."},"type":"journal_article","ddc":["000"],"publication":"Theory of Computing Systems","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"doi":"10.1007/s00224-017-9836-z","has_accepted_license":"1","title":"Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks","file":[{"date_updated":"2018-11-02T15:24:32Z","relation":"main_file","success":1,"file_name":"ApproximationAndHeuristicAlgor.pdf","file_size":1371624,"creator":"ups","date_created":"2018-11-02T15:24:32Z","file_id":"5301","content_type":"application/pdf","access_level":"closed"}],"user_id":"477"},{"date_updated":"2022-01-06T06:58:07Z","file_date_updated":"2018-11-13T13:15:19Z","_id":"2850","status":"public","language":[{"iso":"eng"}],"type":"conference","year":"2018","date_created":"2018-05-24T08:41:48Z","publication":"Ninth International Conference on Fun with Algorithms (FUN)","ddc":["000"],"department":[{"_id":"63"},{"_id":"238"}],"user_id":"15415","citation":{"ama":"Hamann H, Markarian C, Meyer auf der Heide F, Wahby M. Pick, Pack, &#38; Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets. In: <i>Ninth International Conference on Fun with Algorithms (FUN)</i>. ; 2018. doi:<a href=\"https://doi.org/10.4230/LIPIcs.FUN.2018.22\">10.4230/LIPIcs.FUN.2018.22</a>","apa":"Hamann, H., Markarian, C., Meyer auf der Heide, F., &#38; Wahby, M. (2018). Pick, Pack, &#38; Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets. In <i>Ninth International Conference on Fun with Algorithms (FUN)</i>. <a href=\"https://doi.org/10.4230/LIPIcs.FUN.2018.22\">https://doi.org/10.4230/LIPIcs.FUN.2018.22</a>","chicago":"Hamann, Heiko, Christine Markarian, Friedhelm Meyer auf der Heide, and Mostafa Wahby. “Pick, Pack, &#38; Survive: Charging Robots in a Modern Warehouse Based on Online Connected Dominating Sets.” In <i>Ninth International Conference on Fun with Algorithms (FUN)</i>, 2018. <a href=\"https://doi.org/10.4230/LIPIcs.FUN.2018.22\">https://doi.org/10.4230/LIPIcs.FUN.2018.22</a>.","ieee":"H. Hamann, C. Markarian, F. Meyer auf der Heide, and M. Wahby, “Pick, Pack, &#38; Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets,” in <i>Ninth International Conference on Fun with Algorithms (FUN)</i>, 2018.","mla":"Hamann, Heiko, et al. “Pick, Pack, &#38; Survive: Charging Robots in a Modern Warehouse Based on Online Connected Dominating Sets.” <i>Ninth International Conference on Fun with Algorithms (FUN)</i>, 2018, doi:<a href=\"https://doi.org/10.4230/LIPIcs.FUN.2018.22\">10.4230/LIPIcs.FUN.2018.22</a>.","bibtex":"@inproceedings{Hamann_Markarian_Meyer auf der Heide_Wahby_2018, title={Pick, Pack, &#38; Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.FUN.2018.22\">10.4230/LIPIcs.FUN.2018.22</a>}, booktitle={Ninth International Conference on Fun with Algorithms (FUN)}, author={Hamann, Heiko and Markarian, Christine and Meyer auf der Heide, Friedhelm and Wahby, Mostafa}, year={2018} }","short":"H. Hamann, C. Markarian, F. Meyer auf der Heide, M. Wahby, in: Ninth International Conference on Fun with Algorithms (FUN), 2018."},"doi":"10.4230/LIPIcs.FUN.2018.22","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"file":[{"date_updated":"2018-11-13T13:15:19Z","relation":"main_file","success":1,"creator":"feldi","file_size":554298,"file_name":"LIPIcs-FUN-2018-22.pdf","content_type":"application/pdf","file_id":"5536","access_level":"closed","date_created":"2018-11-13T13:15:19Z"}],"author":[{"last_name":"Hamann","full_name":"Hamann, Heiko","first_name":"Heiko"},{"first_name":"Christine","full_name":"Markarian, Christine","last_name":"Markarian","id":"37612"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide"},{"last_name":"Wahby","full_name":"Wahby, Mostafa","first_name":"Mostafa"}],"title":"Pick, Pack, & Survive: Charging Robots in a Modern Warehouse based on Online Connected Dominating Sets"},{"date_updated":"2022-01-06T06:58:08Z","file_date_updated":"2018-11-06T15:18:26Z","_id":"2857","status":"public","year":"2018","language":[{"iso":"eng"}],"publisher":"AAAI","date_created":"2018-05-24T09:00:20Z","department":[{"_id":"355"}],"citation":{"bibtex":"@inproceedings{Mohr_Lettmann_Hüllermeier_Wever_2018, title={Programmatic Task Network Planning}, booktitle={Proceedings of the 1st ICAPS Workshop on Hierarchical Planning}, publisher={AAAI}, author={Mohr, Felix and Lettmann, Theodor and Hüllermeier, Eyke and Wever, Marcel Dominik}, year={2018}, pages={31–39} }","mla":"Mohr, Felix, et al. “Programmatic Task Network Planning.” <i>Proceedings of the 1st ICAPS Workshop on Hierarchical Planning</i>, AAAI, 2018, pp. 31–39.","short":"F. Mohr, T. Lettmann, E. Hüllermeier, M.D. Wever, in: Proceedings of the 1st ICAPS Workshop on Hierarchical Planning, AAAI, 2018, pp. 31–39.","ama":"Mohr F, Lettmann T, Hüllermeier E, Wever MD. Programmatic Task Network Planning. In: <i>Proceedings of the 1st ICAPS Workshop on Hierarchical Planning</i>. AAAI; 2018:31-39.","apa":"Mohr, F., Lettmann, T., Hüllermeier, E., &#38; Wever, M. D. (2018). Programmatic Task Network Planning. In <i>Proceedings of the 1st ICAPS Workshop on Hierarchical Planning</i> (pp. 31–39). Delft, Netherlands: AAAI.","ieee":"F. Mohr, T. Lettmann, E. Hüllermeier, and M. D. Wever, “Programmatic Task Network Planning,” in <i>Proceedings of the 1st ICAPS Workshop on Hierarchical Planning</i>, Delft, Netherlands, 2018, pp. 31–39.","chicago":"Mohr, Felix, Theodor Lettmann, Eyke Hüllermeier, and Marcel Dominik Wever. “Programmatic Task Network Planning.” In <i>Proceedings of the 1st ICAPS Workshop on Hierarchical Planning</i>, 31–39. AAAI, 2018."},"author":[{"first_name":"Felix","full_name":"Mohr, Felix","last_name":"Mohr"},{"last_name":"Lettmann","id":"315","first_name":"Theodor","full_name":"Lettmann, Theodor","orcid":"0000-0001-5859-2457"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier"},{"first_name":"Marcel Dominik","full_name":"Wever, Marcel Dominik","id":"33176","last_name":"Wever","orcid":" https://orcid.org/0000-0001-9782-6818"}],"conference":{"name":"28th International Conference on Automated Planning and Scheduling","location":"Delft, Netherlands","start_date":"2018-06-24","end_date":"2018-06-29"},"page":"31-39","type":"conference","ddc":["000"],"publication":"Proceedings of the 1st ICAPS Workshop on Hierarchical Planning","oa":"1","user_id":"315","main_file_link":[{"open_access":"1","url":"http://icaps18.icaps-conference.org/fileadmin/alg/conferences/icaps18/workshops/workshop08/docs/Mohr18ProgrammaticPlanning.pdf"}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"file":[{"relation":"main_file","date_updated":"2018-11-06T15:18:26Z","success":1,"file_size":349958,"file_name":"Mohr18ProgrammaticPlanning.pdf","creator":"wever","date_created":"2018-11-06T15:18:26Z","content_type":"application/pdf","access_level":"closed","file_id":"5384"}],"title":"Programmatic Task Network Planning"},{"page":"470-490","type":"conference","publication":"Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, Proceedings","ddc":["004"],"user_id":"477","oa":"1","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/029"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"doi":"10.1007/978-3-319-76953-0_25","has_accepted_license":"1","title":"Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems","file":[{"access_level":"closed","content_type":"application/pdf","file_id":"5253","date_created":"2018-11-02T13:45:40Z","creator":"ups","file_size":3371773,"file_name":"PracticalAnonymousAndPubliclyL.pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T13:45:40Z"}],"date_updated":"2022-01-06T06:58:12Z","_id":"2862","file_date_updated":"2018-11-02T13:45:40Z","year":"2018","publication_identifier":{"isbn":["9783319769523","9783319769530"],"issn":["0302-9743","1611-3349"]},"language":[{"iso":"eng"}],"status":"public","date_created":"2018-05-24T11:14:02Z","publisher":"Springer International Publishing","department":[{"_id":"7"},{"_id":"64"}],"citation":{"ieee":"J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems,” in <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>, San Francisco, CA, USA, 2018, pp. 470–490.","chicago":"Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” In <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>, 470–90. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">https://doi.org/10.1007/978-3-319-76953-0_25</a>.","apa":"Blömer, J., Eidens, F., &#38; Juhnke, J. (2018). Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i> (pp. 470–490). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">https://doi.org/10.1007/978-3-319-76953-0_25</a>","ama":"Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In: <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>. Cham: Springer International Publishing; 2018:470-490. doi:<a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">10.1007/978-3-319-76953-0_25</a>","short":"J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, Cham, 2018, pp. 470–490.","bibtex":"@inproceedings{Blömer_Eidens_Juhnke_2018, place={Cham}, title={Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">10.1007/978-3-319-76953-0_25</a>}, booktitle={Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings}, publisher={Springer International Publishing}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={470–490} }","mla":"Blömer, Johannes, et al. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>, Springer International Publishing, 2018, pp. 470–90, doi:<a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">10.1007/978-3-319-76953-0_25</a>."},"publication_status":"published","place":"Cham","conference":{"name":"Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018","location":"San Francisco, CA, USA","start_date":"2018-04-16","end_date":"2018-04-20"},"author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Fabian","full_name":"Eidens, Fabian","last_name":"Eidens","id":"25078"},{"last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob","first_name":"Jakob"}]},{"intvolume":"        64","title":"Stability of stochastic approximations with “controlled markov” noise and temporal difference learning","author":[{"first_name":"Arunselvan","full_name":"Ramaswamy, Arunselvan","id":"66937","last_name":"Ramaswamy","orcid":"https://orcid.org/ 0000-0001-7547-8111"},{"full_name":"Bhatnagar, Shalabh","first_name":"Shalabh","last_name":"Bhatnagar"}],"department":[{"_id":"355"}],"citation":{"short":"A. Ramaswamy, S. Bhatnagar, IEEE Transactions on Automatic Control 64 (2018) 2614–2620.","bibtex":"@article{Ramaswamy_Bhatnagar_2018, title={Stability of stochastic approximations with “controlled markov” noise and temporal difference learning}, volume={64}, number={6}, journal={IEEE Transactions on Automatic Control}, publisher={IEEE}, author={Ramaswamy, Arunselvan and Bhatnagar, Shalabh}, year={2018}, pages={2614–2620} }","mla":"Ramaswamy, Arunselvan, and Shalabh Bhatnagar. “Stability of Stochastic Approximations with ‘Controlled Markov’ Noise and Temporal Difference Learning.” <i>IEEE Transactions on Automatic Control</i>, vol. 64, no. 6, IEEE, 2018, pp. 2614–20.","ieee":"A. Ramaswamy and S. Bhatnagar, “Stability of stochastic approximations with ‘controlled markov’ noise and temporal difference learning,” <i>IEEE Transactions on Automatic Control</i>, vol. 64, no. 6, pp. 2614–2620, 2018.","chicago":"Ramaswamy, Arunselvan, and Shalabh Bhatnagar. “Stability of Stochastic Approximations with ‘Controlled Markov’ Noise and Temporal Difference Learning.” <i>IEEE Transactions on Automatic Control</i> 64, no. 6 (2018): 2614–20.","apa":"Ramaswamy, A., &#38; Bhatnagar, S. (2018). Stability of stochastic approximations with “controlled markov” noise and temporal difference learning. <i>IEEE Transactions on Automatic Control</i>, <i>64</i>(6), 2614–2620.","ama":"Ramaswamy A, Bhatnagar S. Stability of stochastic approximations with “controlled markov” noise and temporal difference learning. <i>IEEE Transactions on Automatic Control</i>. 2018;64(6):2614-2620."},"user_id":"66937","language":[{"iso":"eng"}],"type":"journal_article","year":"2018","status":"public","date_created":"2021-09-10T10:17:54Z","publication":"IEEE Transactions on Automatic Control","publisher":"IEEE","issue":"6","date_updated":"2022-01-06T06:56:08Z","_id":"24150","page":"2614-2620","volume":64},{"status":"public","year":"2018","type":"journal_article","language":[{"iso":"eng"}],"publisher":"IEEE","publication":"IEEE Control Systems Letters","date_created":"2021-09-10T10:19:07Z","date_updated":"2022-01-06T06:56:08Z","issue":"4","volume":2,"_id":"24151","page":"737-742","intvolume":"         2","author":[{"full_name":"Demirel, Burak","first_name":"Burak","last_name":"Demirel"},{"last_name":"Ramaswamy","id":"66937","full_name":"Ramaswamy, Arunselvan","first_name":"Arunselvan","orcid":"https://orcid.org/ 0000-0001-7547-8111"},{"last_name":"Quevedo","first_name":"Daniel E","full_name":"Quevedo, Daniel E"},{"last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"}],"title":"Deepcas: A deep reinforcement learning algorithm for control-aware scheduling","department":[{"_id":"355"}],"user_id":"66937","citation":{"ieee":"B. Demirel, A. Ramaswamy, D. E. Quevedo, and H. Karl, “Deepcas: A deep reinforcement learning algorithm for control-aware scheduling,” <i>IEEE Control Systems Letters</i>, vol. 2, no. 4, pp. 737–742, 2018.","chicago":"Demirel, Burak, Arunselvan Ramaswamy, Daniel E Quevedo, and Holger Karl. “Deepcas: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling.” <i>IEEE Control Systems Letters</i> 2, no. 4 (2018): 737–42.","ama":"Demirel B, Ramaswamy A, Quevedo DE, Karl H. Deepcas: A deep reinforcement learning algorithm for control-aware scheduling. <i>IEEE Control Systems Letters</i>. 2018;2(4):737-742.","apa":"Demirel, B., Ramaswamy, A., Quevedo, D. E., &#38; Karl, H. (2018). Deepcas: A deep reinforcement learning algorithm for control-aware scheduling. <i>IEEE Control Systems Letters</i>, <i>2</i>(4), 737–742.","short":"B. Demirel, A. Ramaswamy, D.E. Quevedo, H. Karl, IEEE Control Systems Letters 2 (2018) 737–742.","bibtex":"@article{Demirel_Ramaswamy_Quevedo_Karl_2018, title={Deepcas: A deep reinforcement learning algorithm for control-aware scheduling}, volume={2}, number={4}, journal={IEEE Control Systems Letters}, publisher={IEEE}, author={Demirel, Burak and Ramaswamy, Arunselvan and Quevedo, Daniel E and Karl, Holger}, year={2018}, pages={737–742} }","mla":"Demirel, Burak, et al. “Deepcas: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling.” <i>IEEE Control Systems Letters</i>, vol. 2, no. 4, IEEE, 2018, pp. 737–42."}},{"date_updated":"2022-01-06T06:56:19Z","_id":"24396","status":"public","language":[{"iso":"eng"}],"year":"2018","publication_identifier":{"issn":["0302-9743","1611-3349"]},"type":"conference","date_created":"2021-09-14T12:23:29Z","publication":"International Workshop on Combinatorial Algorithms (IWOCA)","department":[{"_id":"63"}],"publication_status":"published","user_id":"15415","citation":{"bibtex":"@inproceedings{Markarian_2018, place={Cham}, title={An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>}, booktitle={International Workshop on Combinatorial Algorithms (IWOCA)}, author={Markarian, Christine}, year={2018} }","mla":"Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest.” <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>.","short":"C. Markarian, in: International Workshop on Combinatorial Algorithms (IWOCA), Cham, 2018.","apa":"Markarian, C. (2018). An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest. <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>. <a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">https://doi.org/10.1007/978-3-319-94667-2_18</a>","ama":"Markarian C. An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest. In: <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>. ; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>","ieee":"C. Markarian, “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest,” 2018, doi: <a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>.","chicago":"Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest.” In <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>. Cham, 2018. <a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">https://doi.org/10.1007/978-3-319-94667-2_18</a>."},"doi":"10.1007/978-3-319-94667-2_18","abstract":[{"lang":"eng","text":"We study the Online Prize-collecting Node-weighted Steiner Forest problem (OPC-NWSF) in which we are given an undirected graph \\(G=(V, E)\\) with \\(|V| = n\\) and node-weight function \\(w: V \\rightarrow \\mathcal {R}^+\\). A sequence of k pairs of nodes of G, each associated with a penalty, arrives online. OPC-NWSF asks to construct a subgraph H such that each pair \\(\\{s, t\\}\\) is either connected (there is a path between s and t in H) or its associated penalty is paid. The goal is to minimize the weight of H and the total penalties paid. The current best result for OPC-NWSF is a randomized \\(\\mathcal {O}(\\log ^4 n)\\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014). We improve this by proposing a randomized \\(\\mathcal {O}(\\log n \\log k)\\)-competitive algorithm for OPC-NWSF, which is optimal up to constant factor since OPC-NWSF has a randomized lower bound of \\(\\varOmega (\\log ^2 n)\\) due to Korman [11]. Moreover, our result also implies an improvement for two special cases of OPC-NWSF, the Online Prize-collecting Node-weighted Steiner Tree problem (OPC-NWST) and the Online Node-weighted Steiner Forest problem (ONWSF). In OPC-NWST, there is a distinguished node which is one of the nodes in each pair. In ONWSF, all penalties are set to infinity. The currently best known results for OPC-NWST and ONWSF are a randomized \\(\\mathcal {O}(\\log ^3 n)\\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014) and a randomized \\(\\mathcal {O}(\\log n \\log ^2 k)\\)-competitive algorithm due to Hajiaghayi et al. (FOCS 2013), respectively."}],"place":"Cham","author":[{"last_name":"Markarian","first_name":"Christine","full_name":"Markarian, Christine"}],"title":"An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest"},{"_id":"2471","file_date_updated":"2018-11-06T15:15:38Z","date_updated":"2022-01-06T06:56:32Z","publisher":"IEEE Computer Society","date_created":"2018-04-23T11:40:20Z","status":"public","year":"2018","language":[{"iso":"eng"}],"citation":{"short":"F. Mohr, M.D. Wever, E. Hüllermeier, in: SCC, IEEE Computer Society, San Francisco, CA, USA, 2018.","mla":"Mohr, Felix, et al. “On-The-Fly Service Construction with Prototypes.” <i>SCC</i>, IEEE Computer Society, 2018, doi:<a href=\"https://doi.org/10.1109/SCC.2018.00036\">10.1109/SCC.2018.00036</a>.","bibtex":"@inproceedings{Mohr_Wever_Hüllermeier_2018, place={San Francisco, CA, USA}, title={On-The-Fly Service Construction with Prototypes}, DOI={<a href=\"https://doi.org/10.1109/SCC.2018.00036\">10.1109/SCC.2018.00036</a>}, booktitle={SCC}, publisher={IEEE Computer Society}, author={Mohr, Felix and Wever, Marcel Dominik and Hüllermeier, Eyke}, year={2018} }","chicago":"Mohr, Felix, Marcel Dominik Wever, and Eyke Hüllermeier. “On-The-Fly Service Construction with Prototypes.” In <i>SCC</i>. San Francisco, CA, USA: IEEE Computer Society, 2018. <a href=\"https://doi.org/10.1109/SCC.2018.00036\">https://doi.org/10.1109/SCC.2018.00036</a>.","ieee":"F. Mohr, M. D. Wever, and E. Hüllermeier, “On-The-Fly Service Construction with Prototypes,” in <i>SCC</i>, San Francisco, CA, USA, 2018.","ama":"Mohr F, Wever MD, Hüllermeier E. On-The-Fly Service Construction with Prototypes. In: <i>SCC</i>. San Francisco, CA, USA: IEEE Computer Society; 2018. doi:<a href=\"https://doi.org/10.1109/SCC.2018.00036\">10.1109/SCC.2018.00036</a>","apa":"Mohr, F., Wever, M. D., &#38; Hüllermeier, E. (2018). On-The-Fly Service Construction with Prototypes. In <i>SCC</i>. San Francisco, CA, USA: IEEE Computer Society. <a href=\"https://doi.org/10.1109/SCC.2018.00036\">https://doi.org/10.1109/SCC.2018.00036</a>"},"department":[{"_id":"355"}],"author":[{"last_name":"Mohr","full_name":"Mohr, Felix","first_name":"Felix"},{"orcid":" https://orcid.org/0000-0001-9782-6818","last_name":"Wever","id":"33176","full_name":"Wever, Marcel Dominik","first_name":"Marcel Dominik"},{"full_name":"Hüllermeier, Eyke","first_name":"Eyke","last_name":"Hüllermeier","id":"48129"}],"conference":{"name":"IEEE International Conference on Services Computing, SCC 2018","start_date":"2018-07-02","location":"San Francisco, CA, USA","end_date":"2018-07-07"},"place":"San Francisco, CA, USA","publication":"SCC","ddc":["000"],"type":"conference","oa":"1","user_id":"49109","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8456422","open_access":"1"}],"file":[{"creator":"wever","file_name":"08456422.pdf","file_size":356132,"content_type":"application/pdf","access_level":"closed","file_id":"5383","date_created":"2018-11-06T15:15:38Z","date_updated":"2018-11-06T15:15:38Z","relation":"main_file","success":1}],"title":"On-The-Fly Service Construction with Prototypes","has_accepted_license":"1","doi":"10.1109/SCC.2018.00036","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"10","name":"SFB 901 - Subproject B2"}]},{"user_id":"126","citation":{"ieee":"S. Auroux and H. Karl, “Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks,” 2018.","chicago":"Auroux, Sébastien, and Holger Karl. “Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks.” Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2018. <a href=\"https://doi.org/ 10.1109/WCNC.2018.8377335\">https://doi.org/ 10.1109/WCNC.2018.8377335</a>.","ama":"Auroux S, Karl H. Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks. In: Proc. of IEEE Wireless Communications and Networking Conference (WCNC); 2018. doi:<a href=\"https://doi.org/ 10.1109/WCNC.2018.8377335\"> 10.1109/WCNC.2018.8377335</a>","apa":"Auroux, S., &#38; Karl, H. (2018). Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks. Proc. of IEEE Wireless Communications and Networking Conference (WCNC). <a href=\"https://doi.org/ 10.1109/WCNC.2018.8377335\">https://doi.org/ 10.1109/WCNC.2018.8377335</a>","short":"S. Auroux, H. Karl, in: Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2018.","bibtex":"@inproceedings{Auroux_Karl_2018, title={Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks}, DOI={<a href=\"https://doi.org/ 10.1109/WCNC.2018.8377335\"> 10.1109/WCNC.2018.8377335</a>}, publisher={Proc. of IEEE Wireless Communications and Networking Conference (WCNC)}, author={Auroux, Sébastien and Karl, Holger}, year={2018} }","mla":"Auroux, Sébastien, and Holger Karl. <i>Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks</i>. Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2018, doi:<a href=\"https://doi.org/ 10.1109/WCNC.2018.8377335\"> 10.1109/WCNC.2018.8377335</a>."},"department":[{"_id":"75"}],"file":[{"relation":"main_file","date_updated":"2018-04-24T08:04:02Z","success":1,"file_size":371352,"file_name":"p2262-auroux.pdf","creator":"tabu","date_created":"2018-04-24T08:04:02Z","file_id":"2473","access_level":"closed","content_type":"application/pdf"}],"author":[{"first_name":"Sébastien","full_name":"Auroux, Sébastien","last_name":"Auroux"},{"id":"126","last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"}],"title":"Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks","doi":" 10.1109/WCNC.2018.8377335","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"file_date_updated":"2018-04-24T08:04:02Z","_id":"2472","date_updated":"2022-01-06T06:56:33Z","publisher":"Proc. of IEEE Wireless Communications and Networking Conference (WCNC)","date_created":"2018-04-24T08:04:28Z","ddc":["000"],"status":"public","type":"conference","year":"2018"},{"publication":"Proceedings of EdMedia: World Conference on Educational Media and Technology.","date_created":"2021-10-18T18:17:23Z","type":"conference","year":"2018","language":[{"iso":"eng"}],"status":"public","_id":"26421","page":"2397-2406","date_updated":"2022-01-06T06:57:20Z","title":"MediaThing – A Learning Scenario Targeting on Research Skills","author":[{"first_name":"Felix","full_name":"Winkelnkemper, Felix","id":"3117","last_name":"Winkelnkemper"},{"full_name":"Keil, Reinhard","first_name":"Reinhard","last_name":"Keil"}],"editor":[{"first_name":"T ","full_name":"Bastiaens, T ","last_name":"Bastiaens"},{"last_name":" Van Braak","first_name":" J","full_name":" Van Braak,  J"},{"full_name":"Brown,  M","first_name":" M","last_name":"Brown"}],"place":"Amsterdam, Netherlands","citation":{"ieee":"F. Winkelnkemper and R. Keil, “MediaThing – A Learning Scenario Targeting on Research Skills,” in <i>Proceedings of EdMedia: World Conference on Educational Media and Technology.</i>, 2018, pp. 2397–2406.","chicago":"Winkelnkemper, Felix, and Reinhard Keil. “MediaThing – A Learning Scenario Targeting on Research Skills.” In <i>Proceedings of EdMedia: World Conference on Educational Media and Technology.</i>, edited by T  Bastiaens,  J  Van Braak, and  M Brown, 2397–2406. Amsterdam, Netherlands, 2018.","apa":"Winkelnkemper, F., &#38; Keil, R. (2018). MediaThing – A Learning Scenario Targeting on Research Skills. In T. Bastiaens,  J  Van Braak, &#38;  M Brown (Eds.), <i>Proceedings of EdMedia: World Conference on Educational Media and Technology.</i> (pp. 2397–2406).","ama":"Winkelnkemper F, Keil R. MediaThing – A Learning Scenario Targeting on Research Skills. In: Bastiaens T,  Van Braak  J, Brown  M, eds. <i>Proceedings of EdMedia: World Conference on Educational Media and Technology.</i> ; 2018:2397-2406.","short":"F. Winkelnkemper, R. Keil, in: T. Bastiaens,  J  Van Braak,  M Brown (Eds.), Proceedings of EdMedia: World Conference on Educational Media and Technology., Amsterdam, Netherlands, 2018, pp. 2397–2406.","bibtex":"@inproceedings{Winkelnkemper_Keil_2018, place={Amsterdam, Netherlands}, title={MediaThing – A Learning Scenario Targeting on Research Skills}, booktitle={Proceedings of EdMedia: World Conference on Educational Media and Technology.}, author={Winkelnkemper, Felix and Keil, Reinhard}, editor={Bastiaens, T  and  Van Braak,  J and Brown,  M}, year={2018}, pages={2397–2406} }","mla":"Winkelnkemper, Felix, and Reinhard Keil. “MediaThing – A Learning Scenario Targeting on Research Skills.” <i>Proceedings of EdMedia: World Conference on Educational Media and Technology.</i>, edited by T  Bastiaens et al., 2018, pp. 2397–406."},"user_id":"71124","publication_status":"published","department":[{"_id":"71"}]},{"citation":{"bibtex":"@inproceedings{Seng_Keil_Oevel_2018, place={Berlin, Bosten}, title={studiolo communis}, publisher={De Gruyter}, author={Seng, E.-M and Keil, Reinhard and Oevel, Gudrun}, editor={Seng, E.-M and Keil, Reinhard and  Oevel, G}, year={2018}, pages={1–5} }","mla":"Seng, E. M., et al. <i>Studiolo Communis</i>. Edited by E.-M Seng et al., De Gruyter, 2018, pp. 1–5.","short":"E.-M. Seng, R. Keil, G. Oevel, in: E.-M. Seng, R. Keil, G.  Oevel (Eds.), De Gruyter, Berlin, Bosten, 2018, pp. 1–5.","ama":"Seng E-M, Keil R, Oevel G. studiolo communis. In: Seng E-M, Keil R,  Oevel G, eds. De Gruyter; 2018:1-5.","apa":"Seng, E.-M., Keil, R., &#38; Oevel, G. (2018). <i>studiolo communis</i> (E.-M. Seng, R. Keil, &#38; G.  Oevel, Eds.; pp. 1–5). De Gruyter.","ieee":"E.-M. Seng, R. Keil, and G. Oevel, “studiolo communis,” 2018, pp. 1–5.","chicago":"Seng, E.-M, Reinhard Keil, and Gudrun Oevel. “Studiolo Communis.” edited by E.-M Seng, Reinhard Keil, and G  Oevel, 1–5. Berlin, Bosten: De Gruyter, 2018."},"publication_status":"published","user_id":"71124","department":[{"_id":"71"}],"title":"studiolo communis","author":[{"full_name":"Seng, E.-M","first_name":"E.-M","last_name":"Seng"},{"last_name":"Keil","first_name":"Reinhard","full_name":"Keil, Reinhard"},{"orcid":"https://orcid.org/0000-0002-6396-9535","first_name":"Gudrun","full_name":"Oevel, Gudrun","id":"14924","last_name":"Oevel"}],"editor":[{"last_name":"Seng","first_name":"E.-M","full_name":"Seng, E.-M"},{"first_name":"Reinhard","full_name":"Keil, Reinhard","last_name":"Keil"},{"full_name":" Oevel, G","first_name":"G","last_name":" Oevel"}],"place":"Berlin, Bosten","alternative_title":["STUDIOLO. Kooperative Forschungsumgebungen in den eHumanities"],"page":"1-5","_id":"26422","date_updated":"2022-01-06T06:57:20Z","date_created":"2021-10-18T18:23:28Z","publisher":"De Gruyter","language":[{"iso":"eng"}],"year":"2018","type":"conference","status":"public"},{"author":[{"last_name":"Keil","full_name":"Keil, Reinhard","first_name":"Reinhard"}],"editor":[{"full_name":"Seng, E.-M","first_name":"E.-M","last_name":"Seng"},{"last_name":" Keil","full_name":" Keil, Reinhard","first_name":"Reinhard"},{"first_name":"G","full_name":"Oevel, G","last_name":"Oevel"}],"title":"Unterst{\\\"u}tzung kontingenter Wissensarbeit. Ein Rahmenwerk f{\\\"u}r die Entwicklung digitaler Arbeitsumgebungen zur Unterst{\\\"u}tzung des Forschungsdiskurses in den Kulturwissenschaften","alternative_title":["STUDIOLO. Kooperative Forschungsumgebungen in den eHumanities"],"place":"Berlin, Bosten","user_id":"71124","publication_status":"published","citation":{"bibtex":"@inproceedings{Keil_2018, place={Berlin, Bosten}, title={Unterst{\\\"u}tzung kontingenter Wissensarbeit. Ein Rahmenwerk f{\\\"u}r die Entwicklung digitaler Arbeitsumgebungen zur Unterst{\\\"u}tzung des Forschungsdiskurses in den Kulturwissenschaften}, publisher={De Gruyter}, author={Keil, Reinhard}, editor={Seng, E.-M and  Keil, Reinhard and Oevel, G}, year={2018} }","mla":"Keil, Reinhard. <i>Unterst{\\\"u}tzung Kontingenter Wissensarbeit. Ein Rahmenwerk F{\\\"u}r Die Entwicklung Digitaler Arbeitsumgebungen Zur Unterst{\\\"u}tzung Des Forschungsdiskurses in Den Kulturwissenschaften</i>. Edited by E.-M Seng et al., De Gruyter, 2018.","short":"R. Keil, in: E.-M. Seng, R.  Keil, G. Oevel (Eds.), De Gruyter, Berlin, Bosten, 2018.","ama":"Keil R. Unterst{\\\"u}tzung kontingenter Wissensarbeit. Ein Rahmenwerk f{\\\"u}r die Entwicklung digitaler Arbeitsumgebungen zur Unterst{\\\"u}tzung des Forschungsdiskurses in den Kulturwissenschaften. In: Seng E-M,  Keil R, Oevel G, eds. De Gruyter; 2018.","apa":"Keil, R. (2018). <i>Unterst{\\\"u}tzung kontingenter Wissensarbeit. Ein Rahmenwerk f{\\\"u}r die Entwicklung digitaler Arbeitsumgebungen zur Unterst{\\\"u}tzung des Forschungsdiskurses in den Kulturwissenschaften</i> (E.-M. Seng, R.  Keil, &#38; G. Oevel, Eds.). De Gruyter.","ieee":"R. Keil, “Unterst{\\\"u}tzung kontingenter Wissensarbeit. Ein Rahmenwerk f{\\\"u}r die Entwicklung digitaler Arbeitsumgebungen zur Unterst{\\\"u}tzung des Forschungsdiskurses in den Kulturwissenschaften,” 2018.","chicago":"Keil, Reinhard. “Unterst{\\\"u}tzung Kontingenter Wissensarbeit. Ein Rahmenwerk F{\\\"u}r Die Entwicklung Digitaler Arbeitsumgebungen Zur Unterst{\\\"u}tzung Des Forschungsdiskurses in Den Kulturwissenschaften.” edited by E.-M Seng, Reinhard  Keil, and G Oevel. Berlin, Bosten: De Gruyter, 2018."},"department":[{"_id":"71"}],"publisher":"De Gruyter","date_created":"2021-10-18T18:26:49Z","status":"public","type":"conference","year":"2018","language":[{"iso":"eng"}],"_id":"26423","date_updated":"2022-01-06T06:57:20Z"},{"date_updated":"2022-01-06T06:57:20Z","_id":"26424","language":[{"iso":"eng"}],"year":"2018","type":"book","status":"public","date_created":"2021-10-18T18:32:41Z","publisher":"De Gruyter","department":[{"_id":"71"}],"citation":{"mla":"Seng,  E.-M, et al. <i>STUDIOLO. Kooperative Forschungsumgebungen in Den EHumanities</i>. De Gruyter, 2018.","bibtex":"@book{Seng_Keil_Oevel_2018, place={Berlin, Bosten}, title={STUDIOLO. Kooperative Forschungsumgebungen in den eHumanities}, publisher={De Gruyter}, author={Seng,  E.-M and Keil, Reinhard and Oevel, Gudrun}, year={2018} }","short":"E.-M Seng, R. Keil, G. Oevel, STUDIOLO. Kooperative Forschungsumgebungen in Den EHumanities, De Gruyter, Berlin, Bosten, 2018.","apa":"Seng,  E.-M, Keil, R., &#38; Oevel, G. (2018). <i>STUDIOLO. Kooperative Forschungsumgebungen in den eHumanities</i>. De Gruyter.","ama":"Seng  E.-M, Keil R, Oevel G. <i>STUDIOLO. Kooperative Forschungsumgebungen in Den EHumanities</i>. De Gruyter; 2018.","chicago":"Seng,  E.-M, Reinhard Keil, and Gudrun Oevel. <i>STUDIOLO. Kooperative Forschungsumgebungen in Den EHumanities</i>. Berlin, Bosten: De Gruyter, 2018.","ieee":"E.-M Seng, R. Keil, and G. Oevel, <i>STUDIOLO. Kooperative Forschungsumgebungen in den eHumanities</i>. Berlin, Bosten: De Gruyter, 2018."},"publication_status":"published","user_id":"71124","place":"Berlin, Bosten","title":"STUDIOLO. Kooperative Forschungsumgebungen in den eHumanities","author":[{"last_name":"Seng","full_name":"Seng,  E.-M","first_name":" E.-M"},{"first_name":"Reinhard","full_name":"Keil, Reinhard","last_name":"Keil"},{"first_name":"Gudrun","full_name":"Oevel, Gudrun","id":"14924","last_name":"Oevel","orcid":"https://orcid.org/0000-0002-6396-9535"}]},{"department":[{"_id":"71"}],"citation":{"short":"H. Selke, in: R. Biehler,  L Budde, D. Frischemeier, B. Heinemann, S. Podworny, C. Schulte, T. Wassong (Eds.), Universit{\\\"a}tsbibliothek Paderborn, Paderborn, 2018, pp. 107–109.","mla":"Selke, Harald. <i>Data Science in Schools from the Perspective of Contextual Informatics</i>. Edited by R Biehler et al., Universit{\\\"a}tsbibliothek Paderborn, 2018, pp. 107–09.","bibtex":"@inproceedings{Selke_2018, place={Paderborn}, title={Data science in schools from the perspective of contextual informatics}, publisher={Universit{\\\"a}tsbibliothek Paderborn}, author={Selke, Harald}, editor={Biehler, R and Budde,  L and Frischemeier, D and Heinemann, B and Podworny, S and Schulte, Carsten and Wassong, T}, year={2018}, pages={107–109} }","chicago":"Selke, Harald. “Data Science in Schools from the Perspective of Contextual Informatics.” edited by R Biehler,  L Budde, D Frischemeier, B Heinemann, S Podworny, Carsten Schulte, and T Wassong, 107–9. Paderborn: Universit{\\\"a}tsbibliothek Paderborn, 2018.","ieee":"H. Selke, “Data science in schools from the perspective of contextual informatics,” 2018, pp. 107–109.","apa":"Selke, H. (2018). <i>Data science in schools from the perspective of contextual informatics</i> (R. Biehler,  L Budde, D. Frischemeier, B. Heinemann, S. Podworny, C. Schulte, &#38; T. Wassong, Eds.; pp. 107–109). Universit{\\\"a}tsbibliothek Paderborn.","ama":"Selke H. Data science in schools from the perspective of contextual informatics. In: Biehler R, Budde  L, Frischemeier D, et al., eds. Universit{\\\"a}tsbibliothek Paderborn; 2018:107-109."},"user_id":"71124","publication_status":"published","alternative_title":["Paderborn Symposium on Data Science Education at School Level 2017: The Collected Extended Abstracts"],"place":"Paderborn","title":"Data science in schools from the perspective of contextual informatics","author":[{"last_name":"Selke","id":"497","full_name":"Selke, Harald","first_name":"Harald"}],"editor":[{"last_name":"Biehler","full_name":"Biehler, R","first_name":"R"},{"last_name":"Budde","first_name":" L","full_name":"Budde,  L"},{"last_name":"Frischemeier","first_name":"D","full_name":"Frischemeier, D"},{"full_name":"Heinemann, B","first_name":"B","last_name":"Heinemann"},{"last_name":"Podworny","full_name":"Podworny, S","first_name":"S"},{"last_name":"Schulte","full_name":"Schulte, Carsten","first_name":"Carsten"},{"last_name":"Wassong","first_name":"T","full_name":"Wassong, T"}],"date_updated":"2022-01-06T06:57:20Z","page":"107-109","_id":"26425","year":"2018","type":"conference","language":[{"iso":"eng"}],"status":"public","date_created":"2021-10-18T18:37:32Z","publisher":"Universit{\\\"a}tsbibliothek Paderborn"},{"volume":2,"page":"314-338","issue":"2","ddc":["000"],"publication":"SIAM Journal on Applied Algebra and Geometry.","type":"journal_article","user_id":"477","file":[{"success":1,"date_updated":"2018-11-02T15:22:55Z","relation":"main_file","content_type":"application/pdf","access_level":"closed","file_id":"5300","date_created":"2018-11-02T15:22:55Z","creator":"ups","file_name":"17m1132045.pdf","file_size":1131048}],"title":"Voronoi Cells of Lattices with Respect to Arbitrary Norms","has_accepted_license":"1","doi":"10.1137/17M1132045","project":[{"name":"SFB 901 - Subproject C1","_id":"13"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"}],"file_date_updated":"2018-11-02T15:22:55Z","_id":"2685","date_updated":"2022-01-06T06:57:29Z","date_created":"2018-05-08T09:18:54Z","status":"public","language":[{"iso":"eng"}],"year":"2018","publication_identifier":{"eissn":["2470-6566"]},"publication_status":"epub_ahead","citation":{"chicago":"Blömer, Johannes, and Kathlén Kohn. “Voronoi Cells of Lattices with Respect to Arbitrary Norms.” <i>SIAM Journal on Applied Algebra and Geometry.</i> 2, no. 2 (2018): 314–38. <a href=\"https://doi.org/10.1137/17M1132045\">https://doi.org/10.1137/17M1132045</a>.","ieee":"J. Blömer and K. Kohn, “Voronoi Cells of Lattices with Respect to Arbitrary Norms,” <i>SIAM Journal on Applied Algebra and Geometry.</i>, vol. 2, no. 2, pp. 314–338, 2018.","apa":"Blömer, J., &#38; Kohn, K. (2018). Voronoi Cells of Lattices with Respect to Arbitrary Norms. <i>SIAM Journal on Applied Algebra and Geometry.</i>, <i>2</i>(2), 314–338. <a href=\"https://doi.org/10.1137/17M1132045\">https://doi.org/10.1137/17M1132045</a>","ama":"Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. <i>SIAM Journal on Applied Algebra and Geometry</i>. 2018;2(2):314-338. doi:<a href=\"https://doi.org/10.1137/17M1132045\">10.1137/17M1132045</a>","short":"J. Blömer, K. Kohn, SIAM Journal on Applied Algebra and Geometry. 2 (2018) 314–338.","mla":"Blömer, Johannes, and Kathlén Kohn. “Voronoi Cells of Lattices with Respect to Arbitrary Norms.” <i>SIAM Journal on Applied Algebra and Geometry.</i>, vol. 2, no. 2, 2018, pp. 314–38, doi:<a href=\"https://doi.org/10.1137/17M1132045\">10.1137/17M1132045</a>.","bibtex":"@article{Blömer_Kohn_2018, title={Voronoi Cells of Lattices with Respect to Arbitrary Norms}, volume={2}, DOI={<a href=\"https://doi.org/10.1137/17M1132045\">10.1137/17M1132045</a>}, number={2}, journal={SIAM Journal on Applied Algebra and Geometry.}, author={Blömer, Johannes and Kohn, Kathlén}, year={2018}, pages={314–338} }"},"department":[{"_id":"7"},{"_id":"64"}],"author":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"},{"last_name":"Kohn","first_name":"Kathlén","full_name":"Kohn, Kathlén"}],"intvolume":"         2"},{"ddc":["000"],"date_created":"2018-06-13T10:26:23Z","type":"conference","year":"2018","status":"public","file_date_updated":"2018-06-13T10:47:57Z","_id":"3217","date_updated":"2022-01-06T06:59:05Z","title":"DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling","author":[{"last_name":"Demirel","full_name":"Demirel, Burak","first_name":"Burak"},{"full_name":"Ramaswamy, Arunselvan","first_name":"Arunselvan","last_name":"Ramaswamy"},{"full_name":"Quevedo, Daniel","first_name":"Daniel","last_name":"Quevedo"},{"full_name":"Karl, Holger","first_name":"Holger","id":"126","last_name":"Karl"}],"file":[{"relation":"main_file","date_updated":"2018-06-13T10:47:57Z","success":1,"creator":"tabu","file_size":354166,"file_name":"1803.02998.pdf","content_type":"application/pdf","access_level":"closed","file_id":"3218","date_created":"2018-06-13T10:47:57Z"}],"project":[{"name":"Netzgewahre Regelung & regelungsgewahre Netze","_id":"24"}],"has_accepted_license":"1","doi":"10.1109/LCSYS.2018.2847721","citation":{"apa":"Demirel, B., Ramaswamy, A., Quevedo, D., &#38; Karl, H. (2018). DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling. <a href=\"https://doi.org/10.1109/LCSYS.2018.2847721\">https://doi.org/10.1109/LCSYS.2018.2847721</a>","ama":"Demirel B, Ramaswamy A, Quevedo D, Karl H. DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling. In: ; 2018. doi:<a href=\"https://doi.org/10.1109/LCSYS.2018.2847721\">10.1109/LCSYS.2018.2847721</a>","chicago":"Demirel, Burak, Arunselvan Ramaswamy, Daniel Quevedo, and Holger Karl. “DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling,” 2018. <a href=\"https://doi.org/10.1109/LCSYS.2018.2847721\">https://doi.org/10.1109/LCSYS.2018.2847721</a>.","ieee":"B. Demirel, A. Ramaswamy, D. Quevedo, and H. Karl, “DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling,” 2018.","mla":"Demirel, Burak, et al. <i>DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling</i>. 2018, doi:<a href=\"https://doi.org/10.1109/LCSYS.2018.2847721\">10.1109/LCSYS.2018.2847721</a>.","bibtex":"@inproceedings{Demirel_Ramaswamy_Quevedo_Karl_2018, title={DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling}, DOI={<a href=\"https://doi.org/10.1109/LCSYS.2018.2847721\">10.1109/LCSYS.2018.2847721</a>}, author={Demirel, Burak and Ramaswamy, Arunselvan and Quevedo, Daniel and Karl, Holger}, year={2018} }","short":"B. Demirel, A. Ramaswamy, D. Quevedo, H. Karl, in: 2018."},"user_id":"126","main_file_link":[{"url":"https://arxiv.org/pdf/1803.02998.pdf"}],"department":[{"_id":"75"}]}]
