[{"publication":"Proceedings 25. Workshop Computational Intelligence","type":"conference","status":"public","_id":"10245","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","language":[{"iso":"eng"}],"year":"2015","page":"97-104","citation":{"ama":"Lu S, Hüllermeier E. Locally weighted regression through data imprecisiation. In: <i>Proceedings 25. Workshop Computational Intelligence</i>. ; 2015:97-104.","ieee":"S. Lu and E. Hüllermeier, “Locally weighted regression through data imprecisiation,” in <i>Proceedings 25. Workshop Computational Intelligence</i>, 2015, pp. 97–104.","chicago":"Lu, S., and Eyke Hüllermeier. “Locally Weighted Regression through Data Imprecisiation.” In <i>Proceedings 25. Workshop Computational Intelligence</i>, 97–104, 2015.","short":"S. Lu, E. Hüllermeier, in: Proceedings 25. Workshop Computational Intelligence, 2015, pp. 97–104.","bibtex":"@inproceedings{Lu_Hüllermeier_2015, title={Locally weighted regression through data imprecisiation}, booktitle={Proceedings 25. Workshop Computational Intelligence}, author={Lu, S. and Hüllermeier, Eyke}, year={2015}, pages={97–104} }","mla":"Lu, S., and Eyke Hüllermeier. “Locally Weighted Regression through Data Imprecisiation.” <i>Proceedings 25. Workshop Computational Intelligence</i>, 2015, pp. 97–104.","apa":"Lu, S., &#38; Hüllermeier, E. (2015). Locally weighted regression through data imprecisiation. In <i>Proceedings 25. Workshop Computational Intelligence</i> (pp. 97–104)."},"date_updated":"2022-01-06T06:50:33Z","date_created":"2019-06-13T14:11:22Z","author":[{"last_name":"Lu","full_name":"Lu, S.","first_name":"S."},{"last_name":"Hüllermeier","id":"48129","full_name":"Hüllermeier, Eyke","first_name":"Eyke"}],"title":"Locally weighted regression through data imprecisiation"},{"publication":"Proceedings 25. Workshop Computational Intelligence","type":"conference","status":"public","_id":"10246","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","language":[{"iso":"eng"}],"year":"2015","page":"235-240","citation":{"short":"R. Ewerth, A. Balz, J. Gehlhaar, K. Dembczynski, E. Hüllermeier, in: Proceedings 25. Workshop Computational Intelligence, 2015, pp. 235–240.","bibtex":"@inproceedings{Ewerth_Balz_Gehlhaar_Dembczynski_Hüllermeier_2015, title={Depth estimation in monocular images: Quantitative versus qualitative approaches}, booktitle={Proceedings 25. Workshop Computational Intelligence}, author={Ewerth, Ralph and Balz, A. and Gehlhaar, J. and Dembczynski, K. and Hüllermeier, Eyke}, year={2015}, pages={235–240} }","mla":"Ewerth, Ralph, et al. “Depth Estimation in Monocular Images: Quantitative versus Qualitative Approaches.” <i>Proceedings 25. Workshop Computational Intelligence</i>, 2015, pp. 235–40.","apa":"Ewerth, R., Balz, A., Gehlhaar, J., Dembczynski, K., &#38; Hüllermeier, E. (2015). Depth estimation in monocular images: Quantitative versus qualitative approaches. In <i>Proceedings 25. Workshop Computational Intelligence</i> (pp. 235–240).","ama":"Ewerth R, Balz A, Gehlhaar J, Dembczynski K, Hüllermeier E. Depth estimation in monocular images: Quantitative versus qualitative approaches. In: <i>Proceedings 25. Workshop Computational Intelligence</i>. ; 2015:235-240.","ieee":"R. Ewerth, A. Balz, J. Gehlhaar, K. Dembczynski, and E. Hüllermeier, “Depth estimation in monocular images: Quantitative versus qualitative approaches,” in <i>Proceedings 25. Workshop Computational Intelligence</i>, 2015, pp. 235–240.","chicago":"Ewerth, Ralph, A. Balz, J. Gehlhaar, K. Dembczynski, and Eyke Hüllermeier. “Depth Estimation in Monocular Images: Quantitative versus Qualitative Approaches.” In <i>Proceedings 25. Workshop Computational Intelligence</i>, 235–40, 2015."},"date_updated":"2022-01-06T06:50:33Z","date_created":"2019-06-13T14:20:49Z","author":[{"first_name":"Ralph","last_name":"Ewerth","full_name":"Ewerth, Ralph"},{"full_name":"Balz, A.","last_name":"Balz","first_name":"A."},{"full_name":"Gehlhaar, J.","last_name":"Gehlhaar","first_name":"J."},{"first_name":"K.","full_name":"Dembczynski, K.","last_name":"Dembczynski"},{"first_name":"Eyke","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129"}],"title":"Depth estimation in monocular images: Quantitative versus qualitative approaches"},{"citation":{"ama":"Waegeman W, Dembczynski K, Jachnik A, Cheng W, Hüllermeier E. On the Bayes-Optimality of F-Measure Maximizers. <i>in Journal of Machine Learning Research</i>. 2015;15:3333-3388.","ieee":"W. Waegeman, K. Dembczynski, A. Jachnik, W. Cheng, and E. Hüllermeier, “On the Bayes-Optimality of F-Measure Maximizers,” <i>in Journal of Machine Learning Research</i>, vol. 15, pp. 3333–3388, 2015.","chicago":"Waegeman, W., K. Dembczynski, A. Jachnik, W. Cheng, and Eyke Hüllermeier. “On the Bayes-Optimality of F-Measure Maximizers.” <i>In Journal of Machine Learning Research</i> 15 (2015): 3333–88.","bibtex":"@article{Waegeman_Dembczynski_Jachnik_Cheng_Hüllermeier_2015, title={On the Bayes-Optimality of F-Measure Maximizers}, volume={15}, journal={in Journal of Machine Learning Research}, author={Waegeman, W. and Dembczynski, K. and Jachnik, A. and Cheng, W. and Hüllermeier, Eyke}, year={2015}, pages={3333–3388} }","short":"W. Waegeman, K. Dembczynski, A. Jachnik, W. Cheng, E. Hüllermeier, In Journal of Machine Learning Research 15 (2015) 3333–3388.","mla":"Waegeman, W., et al. “On the Bayes-Optimality of F-Measure Maximizers.” <i>In Journal of Machine Learning Research</i>, vol. 15, 2015, pp. 3333–88.","apa":"Waegeman, W., Dembczynski, K., Jachnik, A., Cheng, W., &#38; Hüllermeier, E. (2015). On the Bayes-Optimality of F-Measure Maximizers. <i>In Journal of Machine Learning Research</i>, <i>15</i>, 3333–3388."},"page":"3333-3388","intvolume":"        15","year":"2015","author":[{"first_name":"W.","last_name":"Waegeman","full_name":"Waegeman, W."},{"first_name":"K.","full_name":"Dembczynski, K.","last_name":"Dembczynski"},{"first_name":"A.","full_name":"Jachnik, A.","last_name":"Jachnik"},{"first_name":"W.","full_name":"Cheng, W.","last_name":"Cheng"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier"}],"date_created":"2019-06-26T13:04:35Z","volume":15,"date_updated":"2022-01-06T06:50:36Z","title":"On the Bayes-Optimality of F-Measure Maximizers","type":"journal_article","publication":"in Journal of Machine Learning Research","status":"public","user_id":"49109","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"_id":"10319","language":[{"iso":"eng"}]},{"intvolume":"       281","page":"292-299","citation":{"chicago":"Hüllermeier, Eyke. “Does Machine Learning Need Fuzzy Logic?” <i>Fuzzy Sets and Systems</i> 281 (2015): 292–99.","ieee":"E. Hüllermeier, “Does machine learning need fuzzy logic?,” <i>Fuzzy Sets and Systems</i>, vol. 281, pp. 292–299, 2015.","ama":"Hüllermeier E. Does machine learning need fuzzy logic? <i>Fuzzy Sets and Systems</i>. 2015;281:292-299.","apa":"Hüllermeier, E. (2015). Does machine learning need fuzzy logic? <i>Fuzzy Sets and Systems</i>, <i>281</i>, 292–299.","short":"E. Hüllermeier, Fuzzy Sets and Systems 281 (2015) 292–299.","bibtex":"@article{Hüllermeier_2015, title={Does machine learning need fuzzy logic?}, volume={281}, journal={Fuzzy Sets and Systems}, author={Hüllermeier, Eyke}, year={2015}, pages={292–299} }","mla":"Hüllermeier, Eyke. “Does Machine Learning Need Fuzzy Logic?” <i>Fuzzy Sets and Systems</i>, vol. 281, 2015, pp. 292–99."},"year":"2015","volume":281,"author":[{"first_name":"Eyke","last_name":"Hüllermeier","id":"48129","full_name":"Hüllermeier, Eyke"}],"date_created":"2019-06-26T13:07:00Z","date_updated":"2022-01-06T06:50:36Z","title":"Does machine learning need fuzzy logic?","publication":"Fuzzy Sets and Systems","type":"journal_article","status":"public","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","_id":"10320","language":[{"iso":"eng"}]},{"citation":{"apa":"Shaker, A., &#38; Hüllermeier, E. (2015). Recovery analysis for adaptive learning from non-stationary data streams: Experimental design and case study. <i>Neurocomputing</i>, <i>150</i>, 250–264.","mla":"Shaker, Ammar, and Eyke Hüllermeier. “Recovery Analysis for Adaptive Learning from Non-Stationary Data Streams: Experimental Design and Case Study.” <i>Neurocomputing</i>, vol. 150, 2015, pp. 250–64.","short":"A. Shaker, E. Hüllermeier, Neurocomputing 150 (2015) 250–264.","bibtex":"@article{Shaker_Hüllermeier_2015, title={Recovery analysis for adaptive learning from non-stationary data streams: Experimental design and case study}, volume={150}, journal={Neurocomputing}, author={Shaker, Ammar and Hüllermeier, Eyke}, year={2015}, pages={250–264} }","chicago":"Shaker, Ammar, and Eyke Hüllermeier. “Recovery Analysis for Adaptive Learning from Non-Stationary Data Streams: Experimental Design and Case Study.” <i>Neurocomputing</i> 150 (2015): 250–64.","ieee":"A. Shaker and E. Hüllermeier, “Recovery analysis for adaptive learning from non-stationary data streams: Experimental design and case study,” <i>Neurocomputing</i>, vol. 150, pp. 250–264, 2015.","ama":"Shaker A, Hüllermeier E. Recovery analysis for adaptive learning from non-stationary data streams: Experimental design and case study. <i>Neurocomputing</i>. 2015;150:250-264."},"page":"250-264","intvolume":"       150","year":"2015","author":[{"last_name":"Shaker","full_name":"Shaker, Ammar","first_name":"Ammar"},{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129","first_name":"Eyke"}],"date_created":"2019-06-26T13:09:44Z","volume":150,"date_updated":"2022-01-06T06:50:36Z","title":"Recovery analysis for adaptive learning from non-stationary data streams: Experimental design and case study","type":"journal_article","publication":"Neurocomputing","status":"public","user_id":"49109","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"_id":"10321","language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:50:36Z","volume":38,"date_created":"2019-06-26T13:12:59Z","author":[{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129","first_name":"Eyke"}],"title":"From Knowledge-based to Data-driven fuzzy modeling-Development, criticism and alternative directions","issue":"6","year":"2015","page":"500-509","intvolume":"        38","citation":{"ieee":"E. Hüllermeier, “From Knowledge-based to Data-driven fuzzy modeling-Development, criticism and alternative directions,” <i>Informatik Spektrum</i>, vol. 38, no. 6, pp. 500–509, 2015.","chicago":"Hüllermeier, Eyke. “From Knowledge-Based to Data-Driven Fuzzy Modeling-Development, Criticism and Alternative Directions.” <i>Informatik Spektrum</i> 38, no. 6 (2015): 500–509.","ama":"Hüllermeier E. From Knowledge-based to Data-driven fuzzy modeling-Development, criticism and alternative directions. <i>Informatik Spektrum</i>. 2015;38(6):500-509.","apa":"Hüllermeier, E. (2015). From Knowledge-based to Data-driven fuzzy modeling-Development, criticism and alternative directions. <i>Informatik Spektrum</i>, <i>38</i>(6), 500–509.","mla":"Hüllermeier, Eyke. “From Knowledge-Based to Data-Driven Fuzzy Modeling-Development, Criticism and Alternative Directions.” <i>Informatik Spektrum</i>, vol. 38, no. 6, 2015, pp. 500–09.","short":"E. Hüllermeier, Informatik Spektrum 38 (2015) 500–509.","bibtex":"@article{Hüllermeier_2015, title={From Knowledge-based to Data-driven fuzzy modeling-Development, criticism and alternative directions}, volume={38}, number={6}, journal={Informatik Spektrum}, author={Hüllermeier, Eyke}, year={2015}, pages={500–509} }"},"_id":"10322","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","language":[{"iso":"eng"}],"publication":"Informatik Spektrum","type":"journal_article","status":"public"},{"_id":"10323","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"user_id":"49109","language":[{"iso":"eng"}],"publication":"IEEE Transactions on Fuzzy Systems","type":"journal_article","status":"public","date_updated":"2022-01-06T06:50:36Z","volume":23,"date_created":"2019-06-26T13:17:46Z","author":[{"first_name":"S.","last_name":"Garcia-Jimenez","full_name":"Garcia-Jimenez, S."},{"full_name":"Bustince, U.","last_name":"Bustince","first_name":"U."},{"id":"48129","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","first_name":"Eyke"},{"first_name":"R.","last_name":"Mesiar","full_name":"Mesiar, R."},{"first_name":"N.R.","last_name":"Pal","full_name":"Pal, N.R."},{"first_name":"A.","full_name":"Pradera, A.","last_name":"Pradera"}],"title":"Overlap Indices: Construction of and Application of Interpolative Fuzzy Systems","issue":"4","year":"2015","intvolume":"        23","page":"1259-1273","citation":{"ama":"Garcia-Jimenez S, Bustince U, Hüllermeier E, Mesiar R, Pal NR, Pradera A. Overlap Indices: Construction of and Application of Interpolative Fuzzy Systems. <i>IEEE Transactions on Fuzzy Systems</i>. 2015;23(4):1259-1273.","chicago":"Garcia-Jimenez, S., U. Bustince, Eyke Hüllermeier, R. Mesiar, N.R. Pal, and A. Pradera. “Overlap Indices: Construction of and Application of Interpolative Fuzzy Systems.” <i>IEEE Transactions on Fuzzy Systems</i> 23, no. 4 (2015): 1259–73.","ieee":"S. Garcia-Jimenez, U. Bustince, E. Hüllermeier, R. Mesiar, N. R. Pal, and A. Pradera, “Overlap Indices: Construction of and Application of Interpolative Fuzzy Systems,” <i>IEEE Transactions on Fuzzy Systems</i>, vol. 23, no. 4, pp. 1259–1273, 2015.","bibtex":"@article{Garcia-Jimenez_Bustince_Hüllermeier_Mesiar_Pal_Pradera_2015, title={Overlap Indices: Construction of and Application of Interpolative Fuzzy Systems}, volume={23}, number={4}, journal={IEEE Transactions on Fuzzy Systems}, author={Garcia-Jimenez, S. and Bustince, U. and Hüllermeier, Eyke and Mesiar, R. and Pal, N.R. and Pradera, A.}, year={2015}, pages={1259–1273} }","short":"S. Garcia-Jimenez, U. Bustince, E. Hüllermeier, R. Mesiar, N.R. Pal, A. Pradera, IEEE Transactions on Fuzzy Systems 23 (2015) 1259–1273.","mla":"Garcia-Jimenez, S., et al. “Overlap Indices: Construction of and Application of Interpolative Fuzzy Systems.” <i>IEEE Transactions on Fuzzy Systems</i>, vol. 23, no. 4, 2015, pp. 1259–73.","apa":"Garcia-Jimenez, S., Bustince, U., Hüllermeier, E., Mesiar, R., Pal, N. R., &#38; Pradera, A. (2015). Overlap Indices: Construction of and Application of Interpolative Fuzzy Systems. <i>IEEE Transactions on Fuzzy Systems</i>, <i>23</i>(4), 1259–1273."}},{"title":"Fast Fuzzy Pattern Tree Learning of Classification","author":[{"first_name":"Robin","last_name":"Senge","full_name":"Senge, Robin"},{"first_name":"Eyke","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129"}],"date_created":"2019-06-26T13:20:43Z","volume":23,"date_updated":"2022-01-06T06:50:36Z","citation":{"ama":"Senge R, Hüllermeier E. Fast Fuzzy Pattern Tree Learning of Classification. <i>IEEE Transactions on Fuzzy Systems</i>. 2015;23(6):2024-2033.","chicago":"Senge, Robin, and Eyke Hüllermeier. “Fast Fuzzy Pattern Tree Learning of Classification.” <i>IEEE Transactions on Fuzzy Systems</i> 23, no. 6 (2015): 2024–33.","ieee":"R. Senge and E. Hüllermeier, “Fast Fuzzy Pattern Tree Learning of Classification,” <i>IEEE Transactions on Fuzzy Systems</i>, vol. 23, no. 6, pp. 2024–2033, 2015.","apa":"Senge, R., &#38; Hüllermeier, E. (2015). Fast Fuzzy Pattern Tree Learning of Classification. <i>IEEE Transactions on Fuzzy Systems</i>, <i>23</i>(6), 2024–2033.","mla":"Senge, Robin, and Eyke Hüllermeier. “Fast Fuzzy Pattern Tree Learning of Classification.” <i>IEEE Transactions on Fuzzy Systems</i>, vol. 23, no. 6, 2015, pp. 2024–33.","bibtex":"@article{Senge_Hüllermeier_2015, title={Fast Fuzzy Pattern Tree Learning of Classification}, volume={23}, number={6}, journal={IEEE Transactions on Fuzzy Systems}, author={Senge, Robin and Hüllermeier, Eyke}, year={2015}, pages={2024–2033} }","short":"R. Senge, E. Hüllermeier, IEEE Transactions on Fuzzy Systems 23 (2015) 2024–2033."},"page":"2024-2033","intvolume":"        23","year":"2015","issue":"6","language":[{"iso":"eng"}],"user_id":"49109","department":[{"_id":"34"},{"_id":"7"},{"_id":"355"}],"_id":"10324","status":"public","type":"journal_article","publication":"IEEE Transactions on Fuzzy Systems"},{"year":"2015","citation":{"short":"M.-H. Chen, W.-F. Chen, L.-W. Ku, in: Proceedings of the Sixth Joint Foreign Language Education and Technology Conference (FLEAT VI), 2015.","mla":"Chen, Mei-Hua, et al. “Technology Enhanced Emotion Expression Learning.” <i>Proceedings of the Sixth Joint Foreign Language Education and Technology Conference (FLEAT VI)</i>, 2015.","bibtex":"@inproceedings{Chen_Chen_Ku_2015, title={Technology Enhanced Emotion Expression Learning}, booktitle={Proceedings of the sixth joint Foreign Language Education and Technology Conference (FLEAT VI)}, author={Chen, Mei-Hua and Chen, Wei-Fan and Ku, Lun-Wei}, year={2015} }","apa":"Chen, M.-H., Chen, W.-F., &#38; Ku, L.-W. (2015). Technology Enhanced Emotion Expression Learning. <i>Proceedings of the Sixth Joint Foreign Language Education and Technology Conference (FLEAT VI)</i>.","ama":"Chen M-H, Chen W-F, Ku L-W. Technology Enhanced Emotion Expression Learning. In: <i>Proceedings of the Sixth Joint Foreign Language Education and Technology Conference (FLEAT VI)</i>. ; 2015.","chicago":"Chen, Mei-Hua, Wei-Fan Chen, and Lun-Wei Ku. “Technology Enhanced Emotion Expression Learning.” In <i>Proceedings of the Sixth Joint Foreign Language Education and Technology Conference (FLEAT VI)</i>, 2015.","ieee":"M.-H. Chen, W.-F. Chen, and L.-W. Ku, “Technology Enhanced Emotion Expression Learning,” 2015."},"date_updated":"2022-11-10T09:17:00Z","author":[{"first_name":"Mei-Hua","last_name":"Chen","full_name":"Chen, Mei-Hua"},{"last_name":"Chen","id":"82920","full_name":"Chen, Wei-Fan","first_name":"Wei-Fan"},{"first_name":"Lun-Wei","last_name":"Ku","full_name":"Ku, Lun-Wei"}],"date_created":"2019-11-11T12:23:45Z","title":"Technology Enhanced Emotion Expression Learning","publication":"Proceedings of the sixth joint Foreign Language Education and Technology Conference (FLEAT VI)","type":"conference","status":"public","_id":"14876","department":[{"_id":"600"}],"user_id":"82920","language":[{"iso":"eng"}],"extern":"1"},{"language":[{"iso":"eng"}],"ddc":["000"],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":322456,"access_level":"closed","file_id":"9517","file_name":"heindorf2015_SIGIR.pdf","date_updated":"2019-04-27T06:06:08Z","creator":"heindorf","date_created":"2019-04-27T06:06:08Z"}],"publication":"SIGIR","title":"Towards Vandalism Detection in Knowledge Bases","date_created":"2019-01-15T08:45:08Z","publisher":"ACM","year":"2015","file_date_updated":"2019-04-27T06:06:08Z","department":[{"_id":"66"}],"user_id":"11871","_id":"6719","status":"public","type":"conference","doi":"10.1145/2766462.2767804","main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/fg-engels/publications_pdfs/Konferenzbeitraege/heindorf2015_SIGIR.pdf"}],"author":[{"first_name":"Stefan","id":"11871","full_name":"Heindorf, Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf"},{"last_name":"Potthast","full_name":"Potthast, Martin","first_name":"Martin"},{"first_name":"Benno","full_name":"Stein, Benno","last_name":"Stein"},{"first_name":"Gregor","id":"107","full_name":"Engels, Gregor","last_name":"Engels"}],"date_updated":"2022-10-17T15:07:08Z","oa":"1","page":"831-834","citation":{"apa":"Heindorf, S., Potthast, M., Stein, B., &#38; Engels, G. (2015). Towards Vandalism Detection in Knowledge Bases. <i>SIGIR</i>, 831–834. <a href=\"https://doi.org/10.1145/2766462.2767804\">https://doi.org/10.1145/2766462.2767804</a>","ama":"Heindorf S, Potthast M, Stein B, Engels G. Towards Vandalism Detection in Knowledge Bases. In: <i>SIGIR</i>. ACM; 2015:831-834. doi:<a href=\"https://doi.org/10.1145/2766462.2767804\">10.1145/2766462.2767804</a>","bibtex":"@inproceedings{Heindorf_Potthast_Stein_Engels_2015, title={Towards Vandalism Detection in Knowledge Bases}, DOI={<a href=\"https://doi.org/10.1145/2766462.2767804\">10.1145/2766462.2767804</a>}, booktitle={SIGIR}, publisher={ACM}, author={Heindorf, Stefan and Potthast, Martin and Stein, Benno and Engels, Gregor}, year={2015}, pages={831–834} }","short":"S. Heindorf, M. Potthast, B. Stein, G. Engels, in: SIGIR, ACM, 2015, pp. 831–834.","mla":"Heindorf, Stefan, et al. “Towards Vandalism Detection in Knowledge Bases.” <i>SIGIR</i>, ACM, 2015, pp. 831–34, doi:<a href=\"https://doi.org/10.1145/2766462.2767804\">10.1145/2766462.2767804</a>.","ieee":"S. Heindorf, M. Potthast, B. Stein, and G. Engels, “Towards Vandalism Detection in Knowledge Bases,” in <i>SIGIR</i>, 2015, pp. 831–834, doi: <a href=\"https://doi.org/10.1145/2766462.2767804\">10.1145/2766462.2767804</a>.","chicago":"Heindorf, Stefan, Martin Potthast, Benno Stein, and Gregor Engels. “Towards Vandalism Detection in Knowledge Bases.” In <i>SIGIR</i>, 831–34. ACM, 2015. <a href=\"https://doi.org/10.1145/2766462.2767804\">https://doi.org/10.1145/2766462.2767804</a>."},"publication_identifier":{"isbn":["9781450336215"]},"has_accepted_license":"1","publication_status":"published"},{"status":"public","abstract":[{"lang":"eng","text":"The need for automatic methods of topic discovery in the Internet grows exponentially with the amount of available textual information. Nowadays it becomes impossible to manually read even a small part of the information in order to reveal the underlying topics. Social media provide us with a great pool of user generated content, where topic discovery may be extremely useful for businesses, politicians, researchers, and other stakeholders. However, conventional topic discovery methods, which are widely used in large text corpora, face several challenges when they are applied in social media and particularly in Twitter – the most popular microblogging platform. To the best of our knowledge no comprehensive overview of these challenges and of the methods dedicated to address these challenges does exist in IS literature until now. Therefore, this paper provides an overview of these challenges, matching methods and their expected usefulness for social media analytics."}],"publication":"Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"819"}],"user_id":"15504","_id":"46373","page":"1–10","citation":{"chicago":"Chinnov, Andrey, Pascal Kerschke, Christian Meske, Stefan Stieglitz, and Heike Trautmann. “An Overview of Topic Discovery in Twitter Communication through Social Media Analytics.” In <i>Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15)</i>, 1–10. Puerto Rico, 2015.","ieee":"A. Chinnov, P. Kerschke, C. Meske, S. Stieglitz, and H. Trautmann, “An Overview of Topic Discovery in Twitter Communication through Social Media Analytics,” in <i>Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15)</i>, 2015, pp. 1–10.","ama":"Chinnov A, Kerschke P, Meske C, Stieglitz S, Trautmann H. An Overview of Topic Discovery in Twitter Communication through Social Media Analytics. In: <i>Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15)</i>. ; 2015:1–10.","apa":"Chinnov, A., Kerschke, P., Meske, C., Stieglitz, S., &#38; Trautmann, H. (2015). An Overview of Topic Discovery in Twitter Communication through Social Media Analytics. <i>Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15)</i>, 1–10.","mla":"Chinnov, Andrey, et al. “An Overview of Topic Discovery in Twitter Communication through Social Media Analytics.” <i>Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15)</i>, 2015, pp. 1–10.","short":"A. Chinnov, P. Kerschke, C. Meske, S. Stieglitz, H. Trautmann, in: Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15), Puerto Rico, 2015, pp. 1–10.","bibtex":"@inproceedings{Chinnov_Kerschke_Meske_Stieglitz_Trautmann_2015, place={Puerto Rico}, title={An Overview of Topic Discovery in Twitter Communication through Social Media Analytics}, booktitle={Proceedings of the 20$^th$ Americas Conference on Information Systems (AMCIS ’15)}, author={Chinnov, Andrey and Kerschke, Pascal and Meske, Christian and Stieglitz, Stefan and Trautmann, Heike}, year={2015}, pages={1–10} }"},"place":"Puerto Rico","year":"2015","publication_identifier":{"isbn":["978-0-9966831-0-4"]},"title":"An Overview of Topic Discovery in Twitter Communication through Social Media Analytics","author":[{"last_name":"Chinnov","full_name":"Chinnov, Andrey","first_name":"Andrey"},{"last_name":"Kerschke","full_name":"Kerschke, Pascal","first_name":"Pascal"},{"first_name":"Christian","last_name":"Meske","full_name":"Meske, Christian"},{"full_name":"Stieglitz, Stefan","last_name":"Stieglitz","first_name":"Stefan"},{"first_name":"Heike","last_name":"Trautmann","orcid":"0000-0002-9788-8282","id":"100740","full_name":"Trautmann, Heike"}],"date_created":"2023-08-04T15:20:52Z","date_updated":"2023-10-16T13:41:00Z"},{"publication_identifier":{"isbn":["978-1-4503-3472-3"]},"year":"2015","place":"New York, NY, USA","page":"265–272","citation":{"apa":"Kerschke, P., Preuss, M., Wessing, S., &#38; Trautmann, H. (2015). Detecting Funnel Structures by Means of Exploratory Landscape Analysis. In S. Silva (Ed.), <i>Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15)</i> (pp. 265–272). ACM. <a href=\"https://doi.org/10.1145/2739480.2754642\">https://doi.org/10.1145/2739480.2754642</a>","mla":"Kerschke, Pascal, et al. “Detecting Funnel Structures by Means of Exploratory Landscape Analysis.” <i>Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15)</i>, edited by Sara Silva, ACM, 2015, pp. 265–272, doi:<a href=\"https://doi.org/10.1145/2739480.2754642\">10.1145/2739480.2754642</a>.","bibtex":"@inproceedings{Kerschke_Preuss_Wessing_Trautmann_2015, place={New York, NY, USA}, title={Detecting Funnel Structures by Means of Exploratory Landscape Analysis}, DOI={<a href=\"https://doi.org/10.1145/2739480.2754642\">10.1145/2739480.2754642</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15)}, publisher={ACM}, author={Kerschke, Pascal and Preuss, Mike and Wessing, Simon and Trautmann, Heike}, editor={Silva, Sara}, year={2015}, pages={265–272} }","short":"P. Kerschke, M. Preuss, S. Wessing, H. Trautmann, in: S. Silva (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15), ACM, New York, NY, USA, 2015, pp. 265–272.","ama":"Kerschke P, Preuss M, Wessing S, Trautmann H. Detecting Funnel Structures by Means of Exploratory Landscape Analysis. In: Silva S, ed. <i>Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15)</i>. ACM; 2015:265–272. doi:<a href=\"https://doi.org/10.1145/2739480.2754642\">10.1145/2739480.2754642</a>","chicago":"Kerschke, Pascal, Mike Preuss, Simon Wessing, and Heike Trautmann. “Detecting Funnel Structures by Means of Exploratory Landscape Analysis.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15)</i>, edited by Sara Silva, 265–272. New York, NY, USA: ACM, 2015. <a href=\"https://doi.org/10.1145/2739480.2754642\">https://doi.org/10.1145/2739480.2754642</a>.","ieee":"P. Kerschke, M. Preuss, S. Wessing, and H. Trautmann, “Detecting Funnel Structures by Means of Exploratory Landscape Analysis,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15)</i>, 2015, pp. 265–272, doi: <a href=\"https://doi.org/10.1145/2739480.2754642\">10.1145/2739480.2754642</a>."},"publisher":"ACM","date_updated":"2023-10-16T13:41:38Z","author":[{"first_name":"Pascal","full_name":"Kerschke, Pascal","last_name":"Kerschke"},{"full_name":"Preuss, Mike","last_name":"Preuss","first_name":"Mike"},{"last_name":"Wessing","full_name":"Wessing, Simon","first_name":"Simon"},{"full_name":"Trautmann, Heike","id":"100740","orcid":"0000-0002-9788-8282","last_name":"Trautmann","first_name":"Heike"}],"date_created":"2023-08-04T15:22:39Z","title":"Detecting Funnel Structures by Means of Exploratory Landscape Analysis","doi":"10.1145/2739480.2754642","publication":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO ’15)","type":"conference","abstract":[{"lang":"eng","text":"In single-objective optimization different optimization strategies exist depending on the structure and characteristics of the underlying problem. In particular, the presence of so-called funnels in multimodal problems offers the possibility of applying techniques exploiting the global structure of the function. The recently proposed Exploratory Landscape Analysis approach automatically identifies problem characteristics based on a moderately small initial sample of the objective function and proved to be effective for algorithm selection problems in continuous black-box optimization. In this paper, specific features for detecting funnel structures are introduced and combined with the existing ones in order to classify optimization problems regarding the funnel property. The effectiveness of the approach is shown by experiments on specifically generated test instances and validation experiments on standard benchmark problems."}],"editor":[{"first_name":"Sara","last_name":"Silva","full_name":"Silva, Sara"}],"status":"public","_id":"46375","department":[{"_id":"34"},{"_id":"819"}],"user_id":"15504","language":[{"iso":"eng"}]},{"publication_identifier":{"isbn":["978-3-319-19084-6"]},"page":"202–217","citation":{"ama":"Kotthoff L, Kerschke P, Hoos H, Trautmann H. Improving the State of the Art in Inexact TSP Solving Using Per-Instance Algorithm Selection. In: Dhaenens C, Jourdan L, Marmion M-E, eds. <i>Learning and Intelligent Optimization</i>. Springer International Publishing; 2015:202–217.","ieee":"L. Kotthoff, P. Kerschke, H. Hoos, and H. Trautmann, “Improving the State of the Art in Inexact TSP Solving Using Per-Instance Algorithm Selection,” in <i>Learning and Intelligent Optimization</i>, 2015, pp. 202–217.","chicago":"Kotthoff, Lars, Pascal Kerschke, Holger Hoos, and Heike Trautmann. “Improving the State of the Art in Inexact TSP Solving Using Per-Instance Algorithm Selection.” In <i>Learning and Intelligent Optimization</i>, edited by Clarisse Dhaenens, Laetitia Jourdan, and Marie-Eléonore Marmion, 202–217. Cham: Springer International Publishing, 2015.","mla":"Kotthoff, Lars, et al. “Improving the State of the Art in Inexact TSP Solving Using Per-Instance Algorithm Selection.” <i>Learning and Intelligent Optimization</i>, edited by Clarisse Dhaenens et al., Springer International Publishing, 2015, pp. 202–217.","bibtex":"@inproceedings{Kotthoff_Kerschke_Hoos_Trautmann_2015, place={Cham}, title={Improving the State of the Art in Inexact TSP Solving Using Per-Instance Algorithm Selection}, booktitle={Learning and Intelligent Optimization}, publisher={Springer International Publishing}, author={Kotthoff, Lars and Kerschke, Pascal and Hoos, Holger and Trautmann, Heike}, editor={Dhaenens, Clarisse and Jourdan, Laetitia and Marmion, Marie-Eléonore}, year={2015}, pages={202–217} }","short":"L. Kotthoff, P. Kerschke, H. Hoos, H. Trautmann, in: C. Dhaenens, L. Jourdan, M.-E. Marmion (Eds.), Learning and Intelligent Optimization, Springer International Publishing, Cham, 2015, pp. 202–217.","apa":"Kotthoff, L., Kerschke, P., Hoos, H., &#38; Trautmann, H. (2015). Improving the State of the Art in Inexact TSP Solving Using Per-Instance Algorithm Selection. In C. Dhaenens, L. Jourdan, &#38; M.-E. Marmion (Eds.), <i>Learning and Intelligent Optimization</i> (pp. 202–217). Springer International Publishing."},"year":"2015","place":"Cham","date_created":"2023-08-04T15:24:20Z","author":[{"first_name":"Lars","full_name":"Kotthoff, Lars","last_name":"Kotthoff"},{"first_name":"Pascal","last_name":"Kerschke","full_name":"Kerschke, Pascal"},{"first_name":"Holger","full_name":"Hoos, Holger","last_name":"Hoos"},{"orcid":"0000-0002-9788-8282","last_name":"Trautmann","full_name":"Trautmann, Heike","id":"100740","first_name":"Heike"}],"date_updated":"2023-10-16T13:41:54Z","publisher":"Springer International Publishing","title":"Improving the State of the Art in Inexact TSP Solving Using Per-Instance Algorithm Selection","publication":"Learning and Intelligent Optimization","type":"conference","status":"public","abstract":[{"text":"We investigate per-instance algorithm selection techniques for solving the Travelling Salesman Problem (TSP), based on the two state-of-the-art inexact TSP solvers, LKH and EAX. Our comprehensive experiments demonstrate that the solvers exhibit complementary performance across a diverse set of instances, and the potential for improving the state of the art by selecting between them is significant. Using TSP features from the literature as well as a set of novel features, we show that we can capitalise on this potential by building an efficient selector that achieves significant performance improvements in practice. Our selectors represent a significant improvement in the state-of-the-art in inexact TSP solving, and hence in the ability to find optimal solutions (without proof of optimality) for challenging TSP instances in practice.","lang":"eng"}],"editor":[{"full_name":"Dhaenens, Clarisse","last_name":"Dhaenens","first_name":"Clarisse"},{"first_name":"Laetitia","last_name":"Jourdan","full_name":"Jourdan, Laetitia"},{"full_name":"Marmion, Marie-Eléonore","last_name":"Marmion","first_name":"Marie-Eléonore"}],"department":[{"_id":"34"},{"_id":"819"}],"user_id":"15504","_id":"46376","language":[{"iso":"eng"}]},{"type":"journal_article","publication":"Evolutionary Computation Journal","abstract":[{"lang":"eng","text":"In multiobjective optimization, set-based performance indicators are commonly used to assess the quality of a Pareto front approximation. Based on the scalarization obtained by these indicators, a performance comparison of multiobjective optimization algorithms becomes possible. The R2 and the Hypervolume (HV) indicator represent two recommended approaches which have shown a correlated behavior in recent empirical studies. Whereas the HV indicator has been comprehensively analyzed in the last years, almost no studies on the R2 indicator exist. In this extended version of our previous conference paper, we thus perform a comprehensive investigation of the properties of the R2 indicator in a theoretical and empirical way. The influence of the number and distribution of the weight vectors on the optimal distribution of µ solutions is analyzed. Based on a comparative analysis, specific characteristics and differences of the R2 and HV indicator are presented. Furthermore, the R2 indicator is integrated into an indicator-based steady-state evolutionary multiobjective optimization algorithm (EMOA). It is shown that the so-called R2-EMOA can accurately approximate the optimal distribution of µ solutions regarding R2."}],"status":"public","_id":"46379","user_id":"15504","department":[{"_id":"34"},{"_id":"819"}],"language":[{"iso":"eng"}],"issue":"3","year":"2015","citation":{"chicago":"Brockhoff, D, T Wagner, and Heike Trautmann. “R2 Indicator Based Multiobjective Search.” <i>Evolutionary Computation Journal</i> 23, no. 3 (2015): 369–395. <a href=\"https://doi.org/10.1162/EVCO_a_00135\">https://doi.org/10.1162/EVCO_a_00135</a>.","ieee":"D. Brockhoff, T. Wagner, and H. Trautmann, “R2 Indicator Based Multiobjective Search,” <i>Evolutionary Computation Journal</i>, vol. 23, no. 3, pp. 369–395, 2015, doi: <a href=\"https://doi.org/10.1162/EVCO_a_00135\">10.1162/EVCO_a_00135</a>.","ama":"Brockhoff D, Wagner T, Trautmann H. R2 Indicator Based Multiobjective Search. <i>Evolutionary Computation Journal</i>. 2015;23(3):369–395. doi:<a href=\"https://doi.org/10.1162/EVCO_a_00135\">10.1162/EVCO_a_00135</a>","apa":"Brockhoff, D., Wagner, T., &#38; Trautmann, H. (2015). R2 Indicator Based Multiobjective Search. <i>Evolutionary Computation Journal</i>, <i>23</i>(3), 369–395. <a href=\"https://doi.org/10.1162/EVCO_a_00135\">https://doi.org/10.1162/EVCO_a_00135</a>","mla":"Brockhoff, D., et al. “R2 Indicator Based Multiobjective Search.” <i>Evolutionary Computation Journal</i>, vol. 23, no. 3, 2015, pp. 369–395, doi:<a href=\"https://doi.org/10.1162/EVCO_a_00135\">10.1162/EVCO_a_00135</a>.","bibtex":"@article{Brockhoff_Wagner_Trautmann_2015, title={R2 Indicator Based Multiobjective Search}, volume={23}, DOI={<a href=\"https://doi.org/10.1162/EVCO_a_00135\">10.1162/EVCO_a_00135</a>}, number={3}, journal={Evolutionary Computation Journal}, author={Brockhoff, D and Wagner, T and Trautmann, Heike}, year={2015}, pages={369–395} }","short":"D. Brockhoff, T. Wagner, H. Trautmann, Evolutionary Computation Journal 23 (2015) 369–395."},"intvolume":"        23","page":"369–395","date_updated":"2023-10-16T13:42:47Z","date_created":"2023-08-04T15:28:25Z","author":[{"first_name":"D","last_name":"Brockhoff","full_name":"Brockhoff, D"},{"last_name":"Wagner","full_name":"Wagner, T","first_name":"T"},{"first_name":"Heike","full_name":"Trautmann, Heike","id":"100740","last_name":"Trautmann","orcid":"0000-0002-9788-8282"}],"volume":23,"title":"R2 Indicator Based Multiobjective Search","doi":"10.1162/EVCO_a_00135"},{"status":"public","abstract":[{"text":"We consider a routing problem for a single vehicle serving customer Locations in the course of time. A subset of these customers must necessarily be served, while the complement of this subset contains dynamic customers which request for service over time, and which do not necessarily need to be served. The decision maker’s conflicting goals are serving as many customers as possible as well as minimizing total travel distance. We solve this bi-objective Problem with an evolutionary multi-objective algorithm in order to provide an a-posteriori evaluation tool for enabling decision makers to assess the single objective solution strategies that they actually use in real-time. We present the modifications to be applied to the evolutionary multi-objective algorithm NSGA2 in order to solve the routing problem, we describe a number of real-time single-objective solution strategies, and we finally use the gained efficient trade-off solutions of NSGA2 to exemplarily evaluate the real-time strategies. Our results show that the evolutionary multi-objective approach is well-suited to generate benchmarks for assessing dynamic heuristic strategies. Our findings point into future directions for designing dynamic multi-objective approaches for the vehicle routing problem with time windows.\r\n","lang":"eng"}],"type":"conference","publication":"Proceedings of the European Conference On Information Systems","language":[{"iso":"eng"}],"user_id":"15504","department":[{"_id":"34"},{"_id":"819"}],"_id":"46374","citation":{"ieee":"C. Grimme, S. Meisel, H. Trautmann, G. Rudolph, and M. Wölck, “Multi-Objective Analysis of Approaches to Dynamic Routing Of a Vehicle,” 2015.","chicago":"Grimme, C, S Meisel, Heike Trautmann, G Rudolph, and M Wölck. “Multi-Objective Analysis of Approaches to Dynamic Routing Of a Vehicle.” In <i>Proceedings of the European Conference On Information Systems</i>. Münster, Germany, 2015.","ama":"Grimme C, Meisel S, Trautmann H, Rudolph G, Wölck M. Multi-Objective Analysis of Approaches to Dynamic Routing Of a Vehicle. In: <i>Proceedings of the European Conference On Information Systems</i>. ; 2015.","mla":"Grimme, C., et al. “Multi-Objective Analysis of Approaches to Dynamic Routing Of a Vehicle.” <i>Proceedings of the European Conference On Information Systems</i>, 2015.","short":"C. Grimme, S. Meisel, H. Trautmann, G. Rudolph, M. Wölck, in: Proceedings of the European Conference On Information Systems, Münster, Germany, 2015.","bibtex":"@inproceedings{Grimme_Meisel_Trautmann_Rudolph_Wölck_2015, place={Münster, Germany}, title={Multi-Objective Analysis of Approaches to Dynamic Routing Of a Vehicle}, booktitle={Proceedings of the European Conference On Information Systems}, author={Grimme, C and Meisel, S and Trautmann, Heike and Rudolph, G and Wölck, M}, year={2015} }","apa":"Grimme, C., Meisel, S., Trautmann, H., Rudolph, G., &#38; Wölck, M. (2015). Multi-Objective Analysis of Approaches to Dynamic Routing Of a Vehicle. <i>Proceedings of the European Conference On Information Systems</i>."},"place":"Münster, Germany","year":"2015","title":"Multi-Objective Analysis of Approaches to Dynamic Routing Of a Vehicle","author":[{"full_name":"Grimme, C","last_name":"Grimme","first_name":"C"},{"full_name":"Meisel, S","last_name":"Meisel","first_name":"S"},{"last_name":"Trautmann","orcid":"0000-0002-9788-8282","full_name":"Trautmann, Heike","id":"100740","first_name":"Heike"},{"first_name":"G","full_name":"Rudolph, G","last_name":"Rudolph"},{"full_name":"Wölck, M","last_name":"Wölck","first_name":"M"}],"date_created":"2023-08-04T15:21:44Z","date_updated":"2023-10-16T13:41:16Z"},{"language":[{"iso":"eng"}],"_id":"46380","user_id":"15504","department":[{"_id":"34"},{"_id":"819"}],"abstract":[{"lang":"eng","text":"We present methods to answer two basic questions that arise when benchmarking optimization algorithms. The first one is: which algorithm is the \"best\" one? and the second one is: which algorithm should I use for my real-world problem? Both are connected and neither is easy to answer. We present a theoretical framework for designing and analyzing the raw data of such benchmark experiments. This represents a first step in answering the aforementioned questions. The 2009 and 2010 BBOB benchmark results are analyzed by means of this framework and we derive insight regarding the answers to the two questions. Furthermore, we discuss how to properly aggregate rankings from algorithm evaluations on individual problems into a consensus, its theoretical background and which common pitfalls should be avoided. Finally, we address the grouping of test problems into sets with similar optimizer rankings and investigate whether these are reflected by already proposed test problem characteristics, finding that this is not always the case."}],"status":"public","type":"journal_article","publication":"Evolutionary Computation Journal","title":"Analyzing the BBOB Results by Means of Benchmarking Concepts","date_updated":"2023-10-16T13:43:06Z","author":[{"last_name":"Mersmann","full_name":"Mersmann, O","first_name":"O"},{"first_name":"M","full_name":"Preuss, M","last_name":"Preuss"},{"first_name":"Heike","orcid":"0000-0002-9788-8282","last_name":"Trautmann","full_name":"Trautmann, Heike","id":"100740"},{"first_name":"B","last_name":"Bischl","full_name":"Bischl, B"},{"full_name":"Weihs, C","last_name":"Weihs","first_name":"C"}],"date_created":"2023-08-04T15:30:11Z","volume":23,"year":"2015","citation":{"chicago":"Mersmann, O, M Preuss, Heike Trautmann, B Bischl, and C Weihs. “Analyzing the BBOB Results by Means of Benchmarking Concepts.” <i>Evolutionary Computation Journal</i> 23, no. 1 (2015): 161–185.","ieee":"O. Mersmann, M. Preuss, H. Trautmann, B. Bischl, and C. Weihs, “Analyzing the BBOB Results by Means of Benchmarking Concepts,” <i>Evolutionary Computation Journal</i>, vol. 23, no. 1, pp. 161–185, 2015.","ama":"Mersmann O, Preuss M, Trautmann H, Bischl B, Weihs C. Analyzing the BBOB Results by Means of Benchmarking Concepts. <i>Evolutionary Computation Journal</i>. 2015;23(1):161–185.","apa":"Mersmann, O., Preuss, M., Trautmann, H., Bischl, B., &#38; Weihs, C. (2015). Analyzing the BBOB Results by Means of Benchmarking Concepts. <i>Evolutionary Computation Journal</i>, <i>23</i>(1), 161–185.","bibtex":"@article{Mersmann_Preuss_Trautmann_Bischl_Weihs_2015, title={Analyzing the BBOB Results by Means of Benchmarking Concepts}, volume={23}, number={1}, journal={Evolutionary Computation Journal}, author={Mersmann, O and Preuss, M and Trautmann, Heike and Bischl, B and Weihs, C}, year={2015}, pages={161–185} }","mla":"Mersmann, O., et al. “Analyzing the BBOB Results by Means of Benchmarking Concepts.” <i>Evolutionary Computation Journal</i>, vol. 23, no. 1, 2015, pp. 161–185.","short":"O. Mersmann, M. Preuss, H. Trautmann, B. Bischl, C. Weihs, Evolutionary Computation Journal 23 (2015) 161–185."},"page":"161–185","intvolume":"        23","issue":"1"},{"doi":"10.1145/2739480.2754673","title":"Learning Feature-Parameter Mappings for Parameter Tuning via the Profile Expected Improvement","author":[{"last_name":"Bossek","orcid":"0000-0002-4121-4668","id":"102979","full_name":"Bossek, Jakob","first_name":"Jakob"},{"full_name":"Bischl, Bernd","last_name":"Bischl","first_name":"Bernd"},{"first_name":"Tobias","full_name":"Wagner, Tobias","last_name":"Wagner"},{"last_name":"Rudolph","full_name":"Rudolph, Günter","first_name":"Günter"}],"date_created":"2023-11-14T15:58:51Z","date_updated":"2023-12-13T10:40:30Z","publisher":"Association for Computing Machinery","citation":{"chicago":"Bossek, Jakob, Bernd Bischl, Tobias Wagner, and Günter Rudolph. “Learning Feature-Parameter Mappings for Parameter Tuning via the Profile Expected Improvement.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>, 1319–1326. GECCO ’15. New York, NY, USA: Association for Computing Machinery, 2015. <a href=\"https://doi.org/10.1145/2739480.2754673\">https://doi.org/10.1145/2739480.2754673</a>.","ieee":"J. Bossek, B. Bischl, T. Wagner, and G. Rudolph, “Learning Feature-Parameter Mappings for Parameter Tuning via the Profile Expected Improvement,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>, 2015, pp. 1319–1326, doi: <a href=\"https://doi.org/10.1145/2739480.2754673\">10.1145/2739480.2754673</a>.","ama":"Bossek J, Bischl B, Wagner T, Rudolph G. Learning Feature-Parameter Mappings for Parameter Tuning via the Profile Expected Improvement. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>. GECCO ’15. Association for Computing Machinery; 2015:1319–1326. doi:<a href=\"https://doi.org/10.1145/2739480.2754673\">10.1145/2739480.2754673</a>","apa":"Bossek, J., Bischl, B., Wagner, T., &#38; Rudolph, G. (2015). Learning Feature-Parameter Mappings for Parameter Tuning via the Profile Expected Improvement. <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>, 1319–1326. <a href=\"https://doi.org/10.1145/2739480.2754673\">https://doi.org/10.1145/2739480.2754673</a>","bibtex":"@inproceedings{Bossek_Bischl_Wagner_Rudolph_2015, place={New York, NY, USA}, series={GECCO ’15}, title={Learning Feature-Parameter Mappings for Parameter Tuning via the Profile Expected Improvement}, DOI={<a href=\"https://doi.org/10.1145/2739480.2754673\">10.1145/2739480.2754673</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference}, publisher={Association for Computing Machinery}, author={Bossek, Jakob and Bischl, Bernd and Wagner, Tobias and Rudolph, Günter}, year={2015}, pages={1319–1326}, collection={GECCO ’15} }","short":"J. Bossek, B. Bischl, T. Wagner, G. Rudolph, in: Proceedings of the Genetic and Evolutionary Computation Conference, Association for Computing Machinery, New York, NY, USA, 2015, pp. 1319–1326.","mla":"Bossek, Jakob, et al. “Learning Feature-Parameter Mappings for Parameter Tuning via the Profile Expected Improvement.” <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>, Association for Computing Machinery, 2015, pp. 1319–1326, doi:<a href=\"https://doi.org/10.1145/2739480.2754673\">10.1145/2739480.2754673</a>."},"page":"1319–1326","place":"New York, NY, USA","year":"2015","publication_status":"published","publication_identifier":{"isbn":["978-1-4503-3472-3"]},"extern":"1","language":[{"iso":"eng"}],"keyword":["evolutionary algorithms","model-based optimization","parameter tuning"],"series_title":"GECCO ’15","user_id":"102979","department":[{"_id":"819"}],"_id":"48838","status":"public","abstract":[{"lang":"eng","text":"The majority of algorithms can be controlled or adjusted by parameters. Their values can substantially affect the algorithms’ performance. Since the manual exploration of the parameter space is tedious – even for few parameters – several automatic procedures for parameter tuning have been proposed. Recent approaches also take into account some characteristic properties of the problem instances, frequently termed instance features. Our contribution is the proposal of a novel concept for feature-based algorithm parameter tuning, which applies an approximating surrogate model for learning the continuous feature-parameter mapping. To accomplish this, we learn a joint model of the algorithm performance based on both the algorithm parameters and the instance features. The required data is gathered using a recently proposed acquisition function for model refinement in surrogate-based optimization: the profile expected improvement. This function provides an avenue for maximizing the information required for the feature-parameter mapping, i.e., the mapping from instance features to the corresponding optimal algorithm parameters. The approach is validated by applying the tuner to exemplary evolutionary algorithms and problems, for which theoretically grounded or heuristically determined feature-parameter mappings are available."}],"type":"conference","publication":"Proceedings of the Genetic and Evolutionary Computation Conference"},{"_id":"48887","user_id":"102979","series_title":"GECCO’15","department":[{"_id":"819"}],"keyword":["combinatorial optimization","metaheuristics","multi-objective optimization","online algorithms","transportation"],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"Proceedings of the Genetic and Evolutionary Computation Conference ","abstract":[{"text":"We evaluate the performance of a multi-objective evolutionary algorithm on a class of dynamic routing problems with a single vehicle. In particular we focus on relating algorithmic performance to the most prominent characteristics of problem instances. The routing problem considers two types of customers: mandatory customers must be visited whereas optional customers do not necessarily have to be visited. Moreover, mandatory customers are known prior to the start of the tour whereas optional customers request for service at later points in time with the vehicle already being on its way. The multi-objective optimization problem then results as maximizing the number of visited customers while simultaneously minimizing total travel time. As an a-posteriori evaluation tool, the evolutionary algorithm aims at approximating the related Pareto set for specifically designed benchmarking instances differing in terms of number of customers, geographical layout, fraction of mandatory customers, and request times of optional customers. Conceptional and experimental comparisons to online heuristic procedures are provided.","lang":"eng"}],"status":"public","publisher":"Association for Computing Machinery","date_updated":"2023-12-13T10:49:06Z","author":[{"first_name":"Stephan","last_name":"Meisel","full_name":"Meisel, Stephan"},{"first_name":"Christian","full_name":"Grimme, Christian","last_name":"Grimme"},{"full_name":"Bossek, Jakob","id":"102979","last_name":"Bossek","orcid":"0000-0002-4121-4668","first_name":"Jakob"},{"last_name":"Wölck","full_name":"Wölck, Martin","first_name":"Martin"},{"last_name":"Rudolph","full_name":"Rudolph, Günter","first_name":"Günter"},{"full_name":"Trautmann, Heike","last_name":"Trautmann","first_name":"Heike"}],"date_created":"2023-11-14T15:58:59Z","title":"Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle","doi":"10.1145/2739480.2754705","publication_identifier":{"isbn":["978-1-4503-3472-3"]},"place":"New York, NY, USA","year":"2015","citation":{"ama":"Meisel S, Grimme C, Bossek J, Wölck M, Rudolph G, Trautmann H. Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference </i>. GECCO’15. Association for Computing Machinery; 2015:425–432. doi:<a href=\"https://doi.org/10.1145/2739480.2754705\">10.1145/2739480.2754705</a>","ieee":"S. Meisel, C. Grimme, J. Bossek, M. Wölck, G. Rudolph, and H. Trautmann, “Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference </i>, 2015, pp. 425–432, doi: <a href=\"https://doi.org/10.1145/2739480.2754705\">10.1145/2739480.2754705</a>.","chicago":"Meisel, Stephan, Christian Grimme, Jakob Bossek, Martin Wölck, Günter Rudolph, and Heike Trautmann. “Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference </i>, 425–432. GECCO’15. New York, NY, USA: Association for Computing Machinery, 2015. <a href=\"https://doi.org/10.1145/2739480.2754705\">https://doi.org/10.1145/2739480.2754705</a>.","apa":"Meisel, S., Grimme, C., Bossek, J., Wölck, M., Rudolph, G., &#38; Trautmann, H. (2015). Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle. <i>Proceedings of the Genetic and Evolutionary Computation Conference </i>, 425–432. <a href=\"https://doi.org/10.1145/2739480.2754705\">https://doi.org/10.1145/2739480.2754705</a>","bibtex":"@inproceedings{Meisel_Grimme_Bossek_Wölck_Rudolph_Trautmann_2015, place={New York, NY, USA}, series={GECCO’15}, title={Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle}, DOI={<a href=\"https://doi.org/10.1145/2739480.2754705\">10.1145/2739480.2754705</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference }, publisher={Association for Computing Machinery}, author={Meisel, Stephan and Grimme, Christian and Bossek, Jakob and Wölck, Martin and Rudolph, Günter and Trautmann, Heike}, year={2015}, pages={425–432}, collection={GECCO’15} }","mla":"Meisel, Stephan, et al. “Evaluation of a Multi-Objective EA on Benchmark Instances for Dynamic Routing of a Vehicle.” <i>Proceedings of the Genetic and Evolutionary Computation Conference </i>, Association for Computing Machinery, 2015, pp. 425–432, doi:<a href=\"https://doi.org/10.1145/2739480.2754705\">10.1145/2739480.2754705</a>.","short":"S. Meisel, C. Grimme, J. Bossek, M. Wölck, G. Rudolph, H. Trautmann, in: Proceedings of the Genetic and Evolutionary Computation Conference , Association for Computing Machinery, New York, NY, USA, 2015, pp. 425–432."},"page":"425–432"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47233","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","status":"public","author":[{"first_name":"Henning","last_name":"Perl","full_name":"Perl, Henning"},{"full_name":"Dechand, Sergej","last_name":"Dechand","first_name":"Sergej"},{"last_name":"Smith","full_name":"Smith, Matthew","first_name":"Matthew"},{"last_name":"Arp","full_name":"Arp, Daniel","first_name":"Daniel"},{"first_name":"Fabian","full_name":"Yamaguchi, Fabian","last_name":"Yamaguchi"},{"full_name":"Rieck, Konrad","last_name":"Rieck","first_name":"Konrad"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2023-09-22T12:03:10Z","date_updated":"2024-06-05T13:16:23Z","publisher":"ACM","doi":"10.1145/2810103.2813604","title":"VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits","publication_status":"published","citation":{"ama":"Perl H, Dechand S, Smith M, et al. VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. In: <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2015. doi:<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>","chicago":"Perl, Henning, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, and Yasemin Acar. “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.” In <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2015. <a href=\"https://doi.org/10.1145/2810103.2813604\">https://doi.org/10.1145/2810103.2813604</a>.","ieee":"H. Perl <i>et al.</i>, “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits,” 2015, doi: <a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>.","apa":"Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl, S., &#38; Acar, Y. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/2810103.2813604\">https://doi.org/10.1145/2810103.2813604</a>","short":"H. Perl, S. Dechand, M. Smith, D. Arp, F. Yamaguchi, K. Rieck, S. Fahl, Y. Acar, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, 2015.","bibtex":"@inproceedings{Perl_Dechand_Smith_Arp_Yamaguchi_Rieck_Fahl_Acar_2015, title={VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits}, DOI={<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin}, year={2015} }","mla":"Perl, Henning, et al. “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.” <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2015, doi:<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>."},"year":"2015"},{"title":"To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections","date_created":"2023-09-22T12:01:30Z","author":[{"last_name":"Oltrogge","full_name":"Oltrogge, Marten","first_name":"Marten"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Dechand, Sergej","last_name":"Dechand","first_name":"Sergej"},{"first_name":"Matthew","full_name":"Smith, Matthew","last_name":"Smith"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_updated":"2024-06-05T13:16:45Z","publisher":"USENIX Association","citation":{"apa":"Oltrogge, M., Acar, Y., Dechand, S., Smith, M., &#38; Fahl, S. (2015). To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In J. Jung &#38; T. Holz (Eds.), <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i> (pp. 239–254). USENIX Association.","short":"M. Oltrogge, Y. Acar, S. Dechand, M. Smith, S. Fahl, in: J. Jung, T. Holz (Eds.), 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, USENIX Association, 2015, pp. 239–254.","mla":"Oltrogge, Marten, et al. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.” <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, USENIX Association, 2015, pp. 239–254.","bibtex":"@inproceedings{Oltrogge_Acar_Dechand_Smith_Fahl_2015, title={To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections}, booktitle={24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015}, publisher={USENIX Association}, author={Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha}, editor={Jung, Jaeyeon and Holz, Thorsten}, year={2015}, pages={239–254} }","ama":"Oltrogge M, Acar Y, Dechand S, Smith M, Fahl S. To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In: Jung J, Holz T, eds. <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>. USENIX Association; 2015:239–254.","ieee":"M. Oltrogge, Y. Acar, S. Dechand, M. Smith, and S. Fahl, “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections,” in <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, 2015, pp. 239–254.","chicago":"Oltrogge, Marten, Yasemin Acar, Sergej Dechand, Matthew Smith, and Sascha Fahl. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.” In <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, 239–254. USENIX Association, 2015."},"page":"239–254","year":"2015","extern":"1","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47232","status":"public","editor":[{"first_name":"Jaeyeon","full_name":"Jung, Jaeyeon","last_name":"Jung"},{"first_name":"Thorsten","last_name":"Holz","full_name":"Holz, Thorsten"}],"type":"conference","publication":"24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015"}]
