---
_id: '15631'
author:
- first_name: Björn
  full_name: Feldkord, Björn
  id: '22704'
  last_name: Feldkord
citation:
  ama: Feldkord B. <i>Mobile Resource Allocation</i>. Universität Paderborn; 2020.
    doi:<a href="https://doi.org/10.17619/UNIPB/1-869">10.17619/UNIPB/1-869</a>
  apa: Feldkord, B. (2020). <i>Mobile Resource Allocation</i>. Universität Paderborn.
    <a href="https://doi.org/10.17619/UNIPB/1-869">https://doi.org/10.17619/UNIPB/1-869</a>
  bibtex: '@book{Feldkord_2020, place={Universität Paderborn}, title={Mobile Resource
    Allocation}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-869">10.17619/UNIPB/1-869</a>},
    author={Feldkord, Björn}, year={2020} }'
  chicago: Feldkord, Björn. <i>Mobile Resource Allocation</i>. Universität Paderborn,
    2020. <a href="https://doi.org/10.17619/UNIPB/1-869">https://doi.org/10.17619/UNIPB/1-869</a>.
  ieee: B. Feldkord, <i>Mobile Resource Allocation</i>. Universität Paderborn, 2020.
  mla: Feldkord, Björn. <i>Mobile Resource Allocation</i>. 2020, doi:<a href="https://doi.org/10.17619/UNIPB/1-869">10.17619/UNIPB/1-869</a>.
  short: B. Feldkord, Mobile Resource Allocation, Universität Paderborn, 2020.
date_created: 2020-01-23T14:20:25Z
date_updated: 2022-01-06T06:52:31Z
ddc:
- '000'
department:
- _id: '63'
doi: 10.17619/UNIPB/1-869
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2020-01-24T08:19:38Z
  date_updated: 2020-01-24T08:19:38Z
  file_id: '15634'
  file_name: DissertationFeldkord.pdf
  file_size: 633652
  relation: main_file
  success: 1
file_date_updated: 2020-01-24T08:19:38Z
has_accepted_license: '1'
language:
- iso: eng
place: Universität Paderborn
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '5'
  name: SFB 901 - Subproject A1
status: public
supervisor:
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
title: Mobile Resource Allocation
type: dissertation
user_id: '15415'
year: '2020'
...
---
_id: '15770'
author:
- first_name: Daniel
  full_name: Warner, Daniel
  last_name: Warner
citation:
  ama: Warner D. <i>On the Complexity of Local Transformations in SDN Overlays</i>.
    Universität Paderborn; 2020.
  apa: Warner, D. (2020). <i>On the complexity of local transformations in SDN overlays</i>.
    Universität Paderborn.
  bibtex: '@book{Warner_2020, title={On the complexity of local transformations in
    SDN overlays}, publisher={Universität Paderborn}, author={Warner, Daniel}, year={2020}
    }'
  chicago: Warner, Daniel. <i>On the Complexity of Local Transformations in SDN Overlays</i>.
    Universität Paderborn, 2020.
  ieee: D. Warner, <i>On the complexity of local transformations in SDN overlays</i>.
    Universität Paderborn, 2020.
  mla: Warner, Daniel. <i>On the Complexity of Local Transformations in SDN Overlays</i>.
    Universität Paderborn, 2020.
  short: D. Warner, On the Complexity of Local Transformations in SDN Overlays, Universität
    Paderborn, 2020.
date_created: 2020-02-04T13:47:02Z
date_updated: 2022-01-06T06:52:32Z
department:
- _id: '79'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '13'
  name: SFB 901 - Subproject C1
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: On the complexity of local transformations in SDN overlays
type: mastersthesis
user_id: '477'
year: '2020'
...
---
_id: '15820'
author:
- first_name: Khalid
  full_name: Al-Khatib, Khalid
  last_name: Al-Khatib
- first_name: Yufang
  full_name: Hou, Yufang
  last_name: Hou
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Charles
  full_name: Jochim, Charles
  last_name: Jochim
- first_name: Francesca
  full_name: Bonin, Francesca
  last_name: Bonin
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
citation:
  ama: 'Al-Khatib K, Hou Y, Wachsmuth H, Jochim C, Bonin F, Stein B. End-to-End Argumentation
    Knowledge Graph Construction. In: <i>Proceedings of the Thirty-Fourth AAAI Conference
    on Artificial Intelligence (AAAI 2020)</i>. ; 2020:7367-7374.'
  apa: Al-Khatib, K., Hou, Y., Wachsmuth, H., Jochim, C., Bonin, F., &#38; Stein,
    B. (2020). End-to-End Argumentation Knowledge Graph Construction. In <i>Proceedings
    of the Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020)</i>
    (pp. 7367–7374).
  bibtex: '@inproceedings{Al-Khatib_Hou_Wachsmuth_Jochim_Bonin_Stein_2020, title={End-to-End
    Argumentation Knowledge Graph Construction}, booktitle={Proceedings of the Thirty-Fourth
    AAAI Conference on Artificial Intelligence (AAAI 2020)}, author={Al-Khatib, Khalid
    and Hou, Yufang and Wachsmuth, Henning and Jochim, Charles and Bonin, Francesca
    and Stein, Benno}, year={2020}, pages={7367–7374} }'
  chicago: Al-Khatib, Khalid, Yufang Hou, Henning Wachsmuth, Charles Jochim, Francesca
    Bonin, and Benno Stein. “End-to-End Argumentation Knowledge Graph Construction.”
    In <i>Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence
    (AAAI 2020)</i>, 7367–74, 2020.
  ieee: K. Al-Khatib, Y. Hou, H. Wachsmuth, C. Jochim, F. Bonin, and B. Stein, “End-to-End
    Argumentation Knowledge Graph Construction,” in <i>Proceedings of the Thirty-Fourth
    AAAI Conference on Artificial Intelligence (AAAI 2020)</i>, 2020, pp. 7367–7374.
  mla: Al-Khatib, Khalid, et al. “End-to-End Argumentation Knowledge Graph Construction.”
    <i>Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence
    (AAAI 2020)</i>, 2020, pp. 7367–74.
  short: 'K. Al-Khatib, Y. Hou, H. Wachsmuth, C. Jochim, F. Bonin, B. Stein, in: Proceedings
    of the Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020), 2020,
    pp. 7367–7374.'
date_created: 2020-02-06T10:41:22Z
date_updated: 2022-01-06T06:52:37Z
department:
- _id: '600'
- _id: '568'
language:
- iso: eng
main_file_link:
- url: https://aaai.org/ojs/index.php/AAAI/article/view/6231
page: 7367 - 7374
publication: Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence
  (AAAI 2020)
status: public
title: End-to-End Argumentation Knowledge Graph Construction
type: conference
user_id: '82920'
year: '2020'
...
---
_id: '15821'
author:
- first_name: Alexander
  full_name: Bondarenko, Alexander
  last_name: Bondarenko
- first_name: Matthias
  full_name: Hagen, Matthias
  last_name: Hagen
- first_name: Martin
  full_name: Potthast, Martin
  last_name: Potthast
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Meriem
  full_name: Beloucif, Meriem
  last_name: Beloucif
- first_name: Chris
  full_name: Biemann, Chris
  last_name: Biemann
- first_name: Alexander
  full_name: Panchenko, Alexander
  last_name: Panchenko
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
citation:
  ama: 'Bondarenko A, Hagen M, Potthast M, et al. Touché: First Shared Task on Argument
    Retrieval. In: <i>Proceedings of the 42nd European Conference on Information Retrieval
    (ECIR 2020)</i>. ; 2020:517-523.'
  apa: 'Bondarenko, A., Hagen, M., Potthast, M., Wachsmuth, H., Beloucif, M., Biemann,
    C., … Stein, B. (2020). Touché: First Shared Task on Argument Retrieval. In <i>Proceedings
    of the 42nd European Conference on Information Retrieval (ECIR 2020)</i> (pp.
    517–523).'
  bibtex: '@inproceedings{Bondarenko_Hagen_Potthast_Wachsmuth_Beloucif_Biemann_Panchenko_Stein_2020,
    title={Touché: First Shared Task on Argument Retrieval}, booktitle={Proceedings
    of the 42nd European Conference on Information Retrieval (ECIR 2020)}, author={Bondarenko,
    Alexander and Hagen, Matthias and Potthast, Martin and Wachsmuth, Henning and
    Beloucif, Meriem and Biemann, Chris and Panchenko, Alexander and Stein, Benno},
    year={2020}, pages={517–523} }'
  chicago: 'Bondarenko, Alexander, Matthias Hagen, Martin Potthast, Henning Wachsmuth,
    Meriem Beloucif, Chris Biemann, Alexander Panchenko, and Benno Stein. “Touché:
    First Shared Task on Argument Retrieval.” In <i>Proceedings of the 42nd European
    Conference on Information Retrieval (ECIR 2020)</i>, 517–23, 2020.'
  ieee: 'A. Bondarenko <i>et al.</i>, “Touché: First Shared Task on Argument Retrieval,”
    in <i>Proceedings of the 42nd European Conference on Information Retrieval (ECIR
    2020)</i>, 2020, pp. 517–523.'
  mla: 'Bondarenko, Alexander, et al. “Touché: First Shared Task on Argument Retrieval.”
    <i>Proceedings of the 42nd European Conference on Information Retrieval (ECIR
    2020)</i>, 2020, pp. 517–23.'
  short: 'A. Bondarenko, M. Hagen, M. Potthast, H. Wachsmuth, M. Beloucif, C. Biemann,
    A. Panchenko, B. Stein, in: Proceedings of the 42nd European Conference on Information
    Retrieval (ECIR 2020), 2020, pp. 517–523.'
date_created: 2020-02-06T10:42:19Z
date_updated: 2022-01-06T06:52:37Z
department:
- _id: '600'
- _id: '568'
language:
- iso: eng
main_file_link:
- url: https://webis.de/downloads/publications/papers/stein_2020c.pdf
page: 517-523
publication: Proceedings of the 42nd European Conference on Information Retrieval
  (ECIR 2020)
status: public
title: 'Touché: First Shared Task on Argument Retrieval'
type: conference
user_id: '82920'
year: '2020'
...
---
_id: '15825'
author:
- first_name: Johannes
  full_name: Kiesel, Johannes
  last_name: Kiesel
- first_name: Kevin
  full_name: Lang, Kevin
  last_name: Lang
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Eva
  full_name: Hornecker, Eva
  last_name: Hornecker
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
citation:
  ama: 'Kiesel J, Lang K, Wachsmuth H, Hornecker E, Stein B. Investigating Expectations
    for Voice-based and Conversational Argument Search on the Web. In: <i>Proceedings
    of the 2020 ACM SIGIR Conference on Human Information Interaction &#38; Retrieval
    (CHIIR 2020)</i>. ; 2020:53-62.'
  apa: Kiesel, J., Lang, K., Wachsmuth, H., Hornecker, E., &#38; Stein, B. (2020).
    Investigating Expectations for Voice-based and Conversational Argument Search
    on the Web. In <i>Proceedings of the 2020 ACM SIGIR Conference on Human Information
    Interaction &#38; Retrieval (CHIIR 2020)</i> (pp. 53–62).
  bibtex: '@inproceedings{Kiesel_Lang_Wachsmuth_Hornecker_Stein_2020, title={Investigating
    Expectations for Voice-based and Conversational Argument Search on the Web}, booktitle={Proceedings
    of the 2020 ACM SIGIR Conference on Human Information Interaction &#38; Retrieval
    (CHIIR 2020)}, author={Kiesel, Johannes and Lang, Kevin and Wachsmuth, Henning
    and Hornecker, Eva and Stein, Benno}, year={2020}, pages={53–62} }'
  chicago: Kiesel, Johannes, Kevin Lang, Henning Wachsmuth, Eva Hornecker, and Benno
    Stein. “Investigating Expectations for Voice-Based and Conversational Argument
    Search on the Web.” In <i>Proceedings of the 2020 ACM SIGIR Conference on Human
    Information Interaction &#38; Retrieval (CHIIR 2020)</i>, 53–62, 2020.
  ieee: J. Kiesel, K. Lang, H. Wachsmuth, E. Hornecker, and B. Stein, “Investigating
    Expectations for Voice-based and Conversational Argument Search on the Web,” in
    <i>Proceedings of the 2020 ACM SIGIR Conference on Human Information Interaction
    &#38; Retrieval (CHIIR 2020)</i>, 2020, pp. 53–62.
  mla: Kiesel, Johannes, et al. “Investigating Expectations for Voice-Based and Conversational
    Argument Search on the Web.” <i>Proceedings of the 2020 ACM SIGIR Conference on
    Human Information Interaction &#38; Retrieval (CHIIR 2020)</i>, 2020, pp. 53–62.
  short: 'J. Kiesel, K. Lang, H. Wachsmuth, E. Hornecker, B. Stein, in: Proceedings
    of the 2020 ACM SIGIR Conference on Human Information Interaction &#38; Retrieval
    (CHIIR 2020), 2020, pp. 53–62.'
date_created: 2020-02-06T10:49:08Z
date_updated: 2022-01-06T06:52:37Z
department:
- _id: '600'
- _id: '568'
language:
- iso: eng
main_file_link:
- url: https://webis.de/downloads/publications/papers/stein_2020b.pdf
page: 53-62
publication: Proceedings of the 2020 ACM SIGIR Conference on Human Information Interaction
  & Retrieval (CHIIR 2020)
status: public
title: Investigating Expectations for Voice-based and Conversational Argument Search
  on the Web
type: conference
user_id: '82920'
year: '2020'
...
---
_id: '15836'
author:
- first_name: K.
  full_name: Bellman, K.
  last_name: Bellman
- first_name: N.
  full_name: Dutt, N.
  last_name: Dutt
- first_name: L.
  full_name: Esterle, L.
  last_name: Esterle
- first_name: A.
  full_name: Herkersdorf, A.
  last_name: Herkersdorf
- first_name: A.
  full_name: Jantsch, A.
  last_name: Jantsch
- first_name: C.
  full_name: Landauer, C.
  last_name: Landauer
- first_name: P.
  full_name: R. Lewis, P.
  last_name: R. Lewis
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
- first_name: N.
  full_name: TaheriNejad, N.
  last_name: TaheriNejad
- first_name: K.
  full_name: Tammemäe, K.
  last_name: Tammemäe
citation:
  ama: Bellman K, Dutt N, Esterle L, et al. Self-aware Cyber-Physical Systems. <i>ACM
    Transactions on Cyber-Physical Systems</i>. 2020;Accepted for Publication:1-24.
  apa: Bellman, K., Dutt, N., Esterle, L., Herkersdorf, A., Jantsch, A., Landauer,
    C., … Tammemäe, K. (2020). Self-aware Cyber-Physical Systems. <i>ACM Transactions
    on Cyber-Physical Systems</i>, <i>Accepted for Publication</i>, 1–24.
  bibtex: '@article{Bellman_Dutt_Esterle_Herkersdorf_Jantsch_Landauer_R. Lewis_Platzner_TaheriNejad_Tammemäe_2020,
    title={Self-aware Cyber-Physical Systems}, volume={Accepted for Publication},
    journal={ACM Transactions on Cyber-Physical Systems}, author={Bellman, K. and
    Dutt, N. and Esterle, L. and Herkersdorf, A. and Jantsch, A. and Landauer, C.
    and R. Lewis, P. and Platzner, Marco and TaheriNejad, N. and Tammemäe, K.}, year={2020},
    pages={1–24} }'
  chicago: 'Bellman, K., N. Dutt, L. Esterle, A. Herkersdorf, A. Jantsch, C. Landauer,
    P. R. Lewis, Marco Platzner, N. TaheriNejad, and K. Tammemäe. “Self-Aware Cyber-Physical
    Systems.” <i>ACM Transactions on Cyber-Physical Systems</i> Accepted for Publication
    (2020): 1–24.'
  ieee: K. Bellman <i>et al.</i>, “Self-aware Cyber-Physical Systems,” <i>ACM Transactions
    on Cyber-Physical Systems</i>, vol. Accepted for Publication, pp. 1–24, 2020.
  mla: Bellman, K., et al. “Self-Aware Cyber-Physical Systems.” <i>ACM Transactions
    on Cyber-Physical Systems</i>, vol. Accepted for Publication, 2020, pp. 1–24.
  short: K. Bellman, N. Dutt, L. Esterle, A. Herkersdorf, A. Jantsch, C. Landauer,
    P. R. Lewis, M. Platzner, N. TaheriNejad, K. Tammemäe, ACM Transactions on Cyber-Physical
    Systems Accepted for Publication (2020) 1–24.
date_created: 2020-02-06T15:05:45Z
date_updated: 2022-01-06T06:52:37Z
department:
- _id: '78'
language:
- iso: eng
page: 1-24
publication: ACM Transactions on Cyber-Physical Systems
status: public
title: Self-aware Cyber-Physical Systems
type: journal_article
user_id: '398'
volume: Accepted for Publication
year: '2020'
...
---
_id: '15025'
abstract:
- lang: eng
  text: In software engineering, the imprecise requirements of a user are transformed
    to a formal requirements specification during the requirements elicitation process.
    This process is usually guided by requirements engineers interviewing the user.
    We want to partially automate this first step of the software engineering process
    in order to enable users to specify a desired software system on their own. With
    our approach, users are only asked to provide exemplary behavioral descriptions.
    The problem of synthesizing a requirements specification from examples can partially
    be reduced to the problem of grammatical inference, to which we apply an active
    coevolutionary learning approach. However, this approach would usually require
    many feedback queries to be sent to the user. In this work, we extend and generalize
    our active learning approach to receive knowledge from multiple oracles, also
    known as proactive learning. The ‘user oracle’ represents input received from
    the user and the ‘knowledge oracle’ represents available, formalized domain knowledge.
    We call our two-oracle approach the ‘first apply knowledge then query’ (FAKT/Q)
    algorithm. We compare FAKT/Q to the active learning approach and provide an extensive
    benchmark evaluation. As result we find that the number of required user queries
    is reduced and the inference process is sped up significantly. Finally, with so-called
    On-The-Fly Markets, we present a motivation and an application of our approach
    where such knowledge is available.
author:
- first_name: Marcel Dominik
  full_name: Wever, Marcel Dominik
  id: '33176'
  last_name: Wever
  orcid: ' https://orcid.org/0000-0001-9782-6818'
- first_name: Lorijn
  full_name: van Rooijen, Lorijn
  id: '58843'
  last_name: van Rooijen
- first_name: Heiko
  full_name: Hamann, Heiko
  last_name: Hamann
citation:
  ama: Wever MD, van Rooijen L, Hamann H. Multi-Oracle Coevolutionary Learning of
    Requirements Specifications from Examples in On-The-Fly Markets. <i>Evolutionary
    Computation</i>. 2020;28(2):165–193. doi:<a href="https://doi.org/10.1162/evco_a_00266">10.1162/evco_a_00266</a>
  apa: Wever, M. D., van Rooijen, L., &#38; Hamann, H. (2020). Multi-Oracle Coevolutionary
    Learning of Requirements Specifications from Examples in On-The-Fly Markets. <i>Evolutionary
    Computation</i>, <i>28</i>(2), 165–193. <a href="https://doi.org/10.1162/evco_a_00266">https://doi.org/10.1162/evco_a_00266</a>
  bibtex: '@article{Wever_van Rooijen_Hamann_2020, title={Multi-Oracle Coevolutionary
    Learning of Requirements Specifications from Examples in On-The-Fly Markets},
    volume={28}, DOI={<a href="https://doi.org/10.1162/evco_a_00266">10.1162/evco_a_00266</a>},
    number={2}, journal={Evolutionary Computation}, publisher={MIT Press Journals},
    author={Wever, Marcel Dominik and van Rooijen, Lorijn and Hamann, Heiko}, year={2020},
    pages={165–193} }'
  chicago: 'Wever, Marcel Dominik, Lorijn van Rooijen, and Heiko Hamann. “Multi-Oracle
    Coevolutionary Learning of Requirements Specifications from Examples in On-The-Fly
    Markets.” <i>Evolutionary Computation</i> 28, no. 2 (2020): 165–193. <a href="https://doi.org/10.1162/evco_a_00266">https://doi.org/10.1162/evco_a_00266</a>.'
  ieee: 'M. D. Wever, L. van Rooijen, and H. Hamann, “Multi-Oracle Coevolutionary
    Learning of Requirements Specifications from Examples in On-The-Fly Markets,”
    <i>Evolutionary Computation</i>, vol. 28, no. 2, pp. 165–193, 2020, doi: <a href="https://doi.org/10.1162/evco_a_00266">10.1162/evco_a_00266</a>.'
  mla: Wever, Marcel Dominik, et al. “Multi-Oracle Coevolutionary Learning of Requirements
    Specifications from Examples in On-The-Fly Markets.” <i>Evolutionary Computation</i>,
    vol. 28, no. 2, MIT Press Journals, 2020, pp. 165–193, doi:<a href="https://doi.org/10.1162/evco_a_00266">10.1162/evco_a_00266</a>.
  short: M.D. Wever, L. van Rooijen, H. Hamann, Evolutionary Computation 28 (2020)
    165–193.
date_created: 2019-11-18T14:19:19Z
date_updated: 2022-01-06T06:52:15Z
department:
- _id: '34'
- _id: '355'
- _id: '26'
- _id: '63'
- _id: '238'
doi: 10.1162/evco_a_00266
intvolume: '        28'
issue: '2'
language:
- iso: eng
page: 165–193
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '9'
  name: SFB 901 - Subproject B1
- _id: '10'
  name: SFB 901 - Subproject B2
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Evolutionary Computation
publication_status: published
publisher: MIT Press Journals
related_material:
  link:
  - relation: confirmation
    url: https://www.mitpressjournals.org/doi/pdf/10.1162/evco_a_00266
status: public
title: Multi-Oracle Coevolutionary Learning of Requirements Specifications from Examples
  in On-The-Fly Markets
type: journal_article
user_id: '15415'
volume: 28
year: '2020'
...
---
_id: '15169'
author:
- first_name: Jannik
  full_name: Castenow, Jannik
  id: '38705'
  last_name: Castenow
- first_name: Christina
  full_name: Kolb, Christina
  id: '43647'
  last_name: Kolb
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Castenow J, Kolb C, Scheideler C. A Bounding Box Overlay for Competitive Routing
    in Hybrid Communication Networks. In: <i>Proceedings of the 21st International
    Conference on Distributed Computing and Networking (ICDCN)</i>. ACM.'
  apa: 'Castenow, J., Kolb, C., &#38; Scheideler, C. (n.d.). A Bounding Box Overlay
    for Competitive Routing in Hybrid Communication Networks. In <i>Proceedings of
    the 21st International Conference on Distributed Computing and Networking (ICDCN)</i>.
    Kolkata, Indien: ACM.'
  bibtex: '@inproceedings{Castenow_Kolb_Scheideler, title={A Bounding Box Overlay
    for Competitive Routing in Hybrid Communication Networks}, booktitle={Proceedings
    of the 21st International Conference on Distributed Computing and Networking (ICDCN)},
    publisher={ACM}, author={Castenow, Jannik and Kolb, Christina and Scheideler,
    Christian} }'
  chicago: Castenow, Jannik, Christina Kolb, and Christian Scheideler. “A Bounding
    Box Overlay for Competitive Routing in Hybrid Communication Networks.” In <i>Proceedings
    of the 21st International Conference on Distributed Computing and Networking (ICDCN)</i>.
    ACM, n.d.
  ieee: J. Castenow, C. Kolb, and C. Scheideler, “A Bounding Box Overlay for Competitive
    Routing in Hybrid Communication Networks,” in <i>Proceedings of the 21st International
    Conference on Distributed Computing and Networking (ICDCN)</i>, Kolkata, Indien.
  mla: Castenow, Jannik, et al. “A Bounding Box Overlay for Competitive Routing in
    Hybrid Communication Networks.” <i>Proceedings of the 21st International Conference
    on Distributed Computing and Networking (ICDCN)</i>, ACM.
  short: 'J. Castenow, C. Kolb, C. Scheideler, in: Proceedings of the 21st International
    Conference on Distributed Computing and Networking (ICDCN), ACM, n.d.'
conference:
  end_date: 07.01.2020
  location: Kolkata, Indien
  name: '21st International Conference on Distributed Computing and Networking '
  start_date: 04.01.2020
date_created: 2019-11-25T12:18:41Z
date_updated: 2022-01-06T06:52:16Z
department:
- _id: '63'
- _id: '79'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '5'
  name: SFB 901 - Subproject A1
publication: Proceedings of the 21st International Conference on Distributed Computing
  and Networking (ICDCN)
publication_status: accepted
publisher: ACM
status: public
title: A Bounding Box Overlay for Competitive Routing in Hybrid Communication Networks
type: conference
user_id: '477'
year: '2020'
...
---
_id: '15267'
author:
- first_name: Enes
  full_name: Yigitbas, Enes
  id: '8447'
  last_name: Yigitbas
  orcid: 0000-0002-5967-833X
- first_name: Ivan
  full_name: Jovanovikj, Ivan
  id: '39187'
  last_name: Jovanovikj
  orcid: https://orcid.org/0000-0002-1838-794X
- first_name: Stefan
  full_name: Sauer, Stefan
  id: '447'
  last_name: Sauer
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
citation:
  ama: 'Yigitbas E, Jovanovikj I, Sauer S, Engels G. On the Development of Context-aware
    Augmented Reality Applications . In: <i>Handling Security, Usability, User Experience
    and Reliability in User-Centered Development Processes - IFIP WG 13.2/13.5</i>.
    Springer, LNCS; 2020.'
  apa: Yigitbas, E., Jovanovikj, I., Sauer, S., &#38; Engels, G. (2020). On the Development
    of Context-aware Augmented Reality Applications . In <i>Handling Security, Usability,
    User Experience and Reliability in User-Centered Development Processes - IFIP
    WG 13.2/13.5</i>. Springer, LNCS.
  bibtex: '@inbook{Yigitbas_Jovanovikj_Sauer_Engels_2020, title={On the Development
    of Context-aware Augmented Reality Applications }, booktitle={Handling Security,
    Usability, User Experience and Reliability in User-Centered Development Processes
    - IFIP WG 13.2/13.5}, publisher={Springer, LNCS}, author={Yigitbas, Enes and Jovanovikj,
    Ivan and Sauer, Stefan and Engels, Gregor}, year={2020} }'
  chicago: Yigitbas, Enes, Ivan Jovanovikj, Stefan Sauer, and Gregor Engels. “On the
    Development of Context-Aware Augmented Reality Applications .” In <i>Handling
    Security, Usability, User Experience and Reliability in User-Centered Development
    Processes - IFIP WG 13.2/13.5</i>. Springer, LNCS, 2020.
  ieee: E. Yigitbas, I. Jovanovikj, S. Sauer, and G. Engels, “On the Development of
    Context-aware Augmented Reality Applications ,” in <i>Handling Security, Usability,
    User Experience and Reliability in User-Centered Development Processes - IFIP
    WG 13.2/13.5</i>, Springer, LNCS, 2020.
  mla: Yigitbas, Enes, et al. “On the Development of Context-Aware Augmented Reality
    Applications .” <i>Handling Security, Usability, User Experience and Reliability
    in User-Centered Development Processes - IFIP WG 13.2/13.5</i>, Springer, LNCS,
    2020.
  short: 'E. Yigitbas, I. Jovanovikj, S. Sauer, G. Engels, in: Handling Security,
    Usability, User Experience and Reliability in User-Centered Development Processes
    - IFIP WG 13.2/13.5, Springer, LNCS, 2020.'
date_created: 2019-12-10T12:10:04Z
date_updated: 2022-01-06T06:52:20Z
department:
- _id: '66'
- _id: '534'
language:
- iso: eng
publication: Handling Security, Usability, User Experience and Reliability in User-Centered
  Development Processes - IFIP WG 13.2/13.5
publisher: Springer, LNCS
status: public
title: 'On the Development of Context-aware Augmented Reality Applications '
type: book_chapter
user_id: '8447'
year: '2020'
...
---
_id: '16213'
abstract:
- lang: eng
  text: 'Automated synthesis of approximate circuits via functional approximations
    is of prominent importance to provide efficiency in energy, runtime, and chip
    area required to execute an application. Approximate circuits are usually obtained
    either through analytical approximation methods leveraging approximate transformations
    such as bit-width scaling or via iterative search-based optimization methods when
    a library of approximate components, e.g., approximate adders and multipliers,
    is available. For the latter, exploring the extremely large design space is challenging
    in terms of both computations and quality of results. While the combination of
    both methods can create more room for further approximations, the \textit{Design
    Space Exploration}~(DSE) becomes a crucial issue. In this paper, we present such
    a hybrid synthesis methodology that applies a low-cost analytical method followed
    by parallel stochastic search-based optimization. We address the DSE challenge
    through efficient pruning of the design space and skipping unnecessary expensive
    testing and/or verification steps. The experimental results reveal up to 10.57x
    area savings in comparison with both purely analytical or search-based approaches. '
author:
- first_name: Muhammad
  full_name: Awais, Muhammad
  id: '64665'
  last_name: Awais
  orcid: https://orcid.org/0000-0003-4148-2969
- first_name: Hassan
  full_name: Ghasemzadeh Mohammadi, Hassan
  id: '61186'
  last_name: Ghasemzadeh Mohammadi
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: 'Awais M, Ghasemzadeh Mohammadi H, Platzner M. A Hybrid Synthesis Methodology
    for Approximate Circuits. In: <i>Proceedings of the 30th ACM Great Lakes Symposium
    on VLSI (GLSVLSI) 2020</i>. ACM; 2020:421-426. doi:<a href="https://doi.org/10.1145/3386263.3406952">10.1145/3386263.3406952</a>'
  apa: 'Awais, M., Ghasemzadeh Mohammadi, H., &#38; Platzner, M. (2020). A Hybrid
    Synthesis Methodology for Approximate Circuits. In <i>Proceedings of the 30th
    ACM Great Lakes Symposium on VLSI (GLSVLSI) 2020</i> (pp. 421–426). Beijing, China:
    ACM. <a href="https://doi.org/10.1145/3386263.3406952">https://doi.org/10.1145/3386263.3406952</a>'
  bibtex: '@inproceedings{Awais_Ghasemzadeh Mohammadi_Platzner_2020, title={A Hybrid
    Synthesis Methodology for Approximate Circuits}, DOI={<a href="https://doi.org/10.1145/3386263.3406952">10.1145/3386263.3406952</a>},
    booktitle={Proceedings of the 30th ACM Great Lakes Symposium on VLSI (GLSVLSI)
    2020}, publisher={ACM}, author={Awais, Muhammad and Ghasemzadeh Mohammadi, Hassan
    and Platzner, Marco}, year={2020}, pages={421–426} }'
  chicago: Awais, Muhammad, Hassan Ghasemzadeh Mohammadi, and Marco Platzner. “A Hybrid
    Synthesis Methodology for Approximate Circuits.” In <i>Proceedings of the 30th
    ACM Great Lakes Symposium on VLSI (GLSVLSI) 2020</i>, 421–26. ACM, 2020. <a href="https://doi.org/10.1145/3386263.3406952">https://doi.org/10.1145/3386263.3406952</a>.
  ieee: M. Awais, H. Ghasemzadeh Mohammadi, and M. Platzner, “A Hybrid Synthesis Methodology
    for Approximate Circuits,” in <i>Proceedings of the 30th ACM Great Lakes Symposium
    on VLSI (GLSVLSI) 2020</i>, Beijing, China, 2020, pp. 421–426.
  mla: Awais, Muhammad, et al. “A Hybrid Synthesis Methodology for Approximate Circuits.”
    <i>Proceedings of the 30th ACM Great Lakes Symposium on VLSI (GLSVLSI) 2020</i>,
    ACM, 2020, pp. 421–26, doi:<a href="https://doi.org/10.1145/3386263.3406952">10.1145/3386263.3406952</a>.
  short: 'M. Awais, H. Ghasemzadeh Mohammadi, M. Platzner, in: Proceedings of the
    30th ACM Great Lakes Symposium on VLSI (GLSVLSI) 2020, ACM, 2020, pp. 421–426.'
conference:
  location: Beijing, China
  name: ACM Great Lakes Symposium on VLSI (GLSVLSI) 2020
date_created: 2020-03-02T15:49:38Z
date_updated: 2022-01-06T06:52:45Z
department:
- _id: '78'
doi: 10.1145/3386263.3406952
language:
- iso: eng
page: 421-426
publication: Proceedings of the 30th ACM Great Lakes Symposium on VLSI (GLSVLSI) 2020
publication_status: published
publisher: ACM
status: public
title: A Hybrid Synthesis Methodology for Approximate Circuits
type: conference
user_id: '64665'
year: '2020'
...
---
_id: '16219'
abstract:
- lang: eng
  text: "Network function virtualization (NFV) proposes\r\nto replace physical middleboxes
    with more flexible virtual\r\nnetwork functions (VNFs). To dynamically adjust
    to everchanging\r\ntraffic demands, VNFs have to be instantiated and\r\ntheir
    allocated resources have to be adjusted on demand.\r\nDeciding the amount of allocated
    resources is non-trivial.\r\nExisting optimization approaches often assume fixed
    resource\r\nrequirements for each VNF instance. However, this can easily\r\nlead
    to either waste of resources or bad service quality if too\r\nmany or too few
    resources are allocated.\r\n\r\nTo solve this problem, we train machine learning
    models\r\non real VNF data, containing measurements of performance\r\nand resource
    requirements. For each VNF, the trained models\r\ncan then accurately predict
    the required resources to handle\r\na certain traffic load. We integrate these
    machine learning\r\nmodels into an algorithm for joint VNF scaling and placement\r\nand
    evaluate their impact on resulting VNF placements. Our\r\nevaluation based on
    real-world data shows that using suitable\r\nmachine learning models effectively
    avoids over- and underallocation\r\nof resources, leading to up to 12 times lower
    resource\r\nconsumption and better service quality with up to 4.5 times\r\nlower
    total delay than using standard fixed resource allocation."
author:
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Narayanan Puthenpurayil
  full_name: Satheeschandran, Narayanan Puthenpurayil
  last_name: Satheeschandran
- first_name: Manuel
  full_name: Peuster, Manuel
  id: '13271'
  last_name: Peuster
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Schneider SB, Satheeschandran NP, Peuster M, Karl H. Machine Learning for
    Dynamic Resource Allocation in Network Function Virtualization. In: <i>IEEE Conference
    on Network Softwarization (NetSoft)</i>. IEEE; 2020.'
  apa: 'Schneider, S. B., Satheeschandran, N. P., Peuster, M., &#38; Karl, H. (2020).
    Machine Learning for Dynamic Resource Allocation in Network Function Virtualization.
    In <i>IEEE Conference on Network Softwarization (NetSoft)</i>. Ghent, Belgium:
    IEEE.'
  bibtex: '@inproceedings{Schneider_Satheeschandran_Peuster_Karl_2020, title={Machine
    Learning for Dynamic Resource Allocation in Network Function Virtualization},
    booktitle={IEEE Conference on Network Softwarization (NetSoft)}, publisher={IEEE},
    author={Schneider, Stefan Balthasar and Satheeschandran, Narayanan Puthenpurayil
    and Peuster, Manuel and Karl, Holger}, year={2020} }'
  chicago: Schneider, Stefan Balthasar, Narayanan Puthenpurayil Satheeschandran, Manuel
    Peuster, and Holger Karl. “Machine Learning for Dynamic Resource Allocation in
    Network Function Virtualization.” In <i>IEEE Conference on Network Softwarization
    (NetSoft)</i>. IEEE, 2020.
  ieee: S. B. Schneider, N. P. Satheeschandran, M. Peuster, and H. Karl, “Machine
    Learning for Dynamic Resource Allocation in Network Function Virtualization,”
    in <i>IEEE Conference on Network Softwarization (NetSoft)</i>, Ghent, Belgium,
    2020.
  mla: Schneider, Stefan Balthasar, et al. “Machine Learning for Dynamic Resource
    Allocation in Network Function Virtualization.” <i>IEEE Conference on Network
    Softwarization (NetSoft)</i>, IEEE, 2020.
  short: 'S.B. Schneider, N.P. Satheeschandran, M. Peuster, H. Karl, in: IEEE Conference
    on Network Softwarization (NetSoft), IEEE, 2020.'
conference:
  location: Ghent, Belgium
  name: IEEE Conference on Network Softwarization (NetSoft)
date_created: 2020-03-03T11:42:22Z
date_updated: 2022-01-06T06:52:46Z
ddc:
- '000'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2020-03-03T11:42:16Z
  date_updated: 2020-03-03T11:42:16Z
  file_id: '16220'
  file_name: ris_preprint.pdf
  file_size: 476590
  relation: main_file
file_date_updated: 2020-03-03T11:42:16Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
project:
- _id: '28'
  grant_number: '761493'
  name: 5G Development and validation platform for global industry-specific network
    services and Apps
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE Conference on Network Softwarization (NetSoft)
publisher: IEEE
status: public
title: Machine Learning for Dynamic Resource Allocation in Network Function Virtualization
type: conference
user_id: '35343'
year: '2020'
...
---
_id: '16222'
author:
- first_name: A.
  full_name: Zafeiropoulos, A.
  last_name: Zafeiropoulos
- first_name: E.
  full_name: Fotopoulou, E.
  last_name: Fotopoulou
- first_name: Manuel
  full_name: Peuster, Manuel
  id: '13271'
  last_name: Peuster
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: P.
  full_name: Gouvas, P.
  last_name: Gouvas
- first_name: D.
  full_name: Behnke, D.
  last_name: Behnke
- first_name: M.
  full_name: Müller, M.
  last_name: Müller
- first_name: P.
  full_name: Bök, P.
  last_name: Bök
- first_name: P.
  full_name: Trakadas, P.
  last_name: Trakadas
- first_name: P.
  full_name: Karkazis, P.
  last_name: Karkazis
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Zafeiropoulos A, Fotopoulou E, Peuster M, et al. Benchmarking and Profiling
    5G Verticals’ Applications: An Industrial IoT Use Case. In: <i>IEEE Conference
    on Network Softwarization (NetSoft)</i>. ; 2020.'
  apa: 'Zafeiropoulos, A., Fotopoulou, E., Peuster, M., Schneider, S. B., Gouvas,
    P., Behnke, D., … Karl, H. (2020). Benchmarking and Profiling 5G Verticals’ Applications:
    An Industrial IoT Use Case. In <i>IEEE Conference on Network Softwarization (NetSoft)</i>.'
  bibtex: '@inproceedings{Zafeiropoulos_Fotopoulou_Peuster_Schneider_Gouvas_Behnke_Müller_Bök_Trakadas_Karkazis_et
    al._2020, title={Benchmarking and Profiling 5G Verticals’ Applications: An Industrial
    IoT Use Case}, booktitle={IEEE Conference on Network Softwarization (NetSoft)},
    author={Zafeiropoulos, A. and Fotopoulou, E. and Peuster, Manuel and Schneider,
    Stefan Balthasar and Gouvas, P. and Behnke, D. and Müller, M. and Bök, P. and
    Trakadas, P. and Karkazis, P. and et al.}, year={2020} }'
  chicago: 'Zafeiropoulos, A., E. Fotopoulou, Manuel Peuster, Stefan Balthasar Schneider,
    P. Gouvas, D. Behnke, M. Müller, et al. “Benchmarking and Profiling 5G Verticals’
    Applications: An Industrial IoT Use Case.” In <i>IEEE Conference on Network Softwarization
    (NetSoft)</i>, 2020.'
  ieee: 'A. Zafeiropoulos <i>et al.</i>, “Benchmarking and Profiling 5G Verticals’
    Applications: An Industrial IoT Use Case,” in <i>IEEE Conference on Network Softwarization
    (NetSoft)</i>, 2020.'
  mla: 'Zafeiropoulos, A., et al. “Benchmarking and Profiling 5G Verticals’ Applications:
    An Industrial IoT Use Case.” <i>IEEE Conference on Network Softwarization (NetSoft)</i>,
    2020.'
  short: 'A. Zafeiropoulos, E. Fotopoulou, M. Peuster, S.B. Schneider, P. Gouvas,
    D. Behnke, M. Müller, P. Bök, P. Trakadas, P. Karkazis, H. Karl, in: IEEE Conference
    on Network Softwarization (NetSoft), 2020.'
date_created: 2020-03-03T11:51:22Z
date_updated: 2022-01-06T06:52:46Z
department:
- _id: '75'
language:
- iso: eng
project:
- _id: '28'
  grant_number: '761493'
  name: 5G Development and validation platform for global industry-specific network
    services and Apps
publication: IEEE Conference on Network Softwarization (NetSoft)
status: public
title: 'Benchmarking and Profiling 5G Verticals'' Applications: An Industrial IoT
  Use Case'
type: conference
user_id: '35343'
year: '2020'
...
---
_id: '16274'
author:
- first_name: Ivan
  full_name: Jovanovikj, Ivan
  id: '39187'
  last_name: Jovanovikj
  orcid: https://orcid.org/0000-0002-1838-794X
- first_name: Achyuth
  full_name: Nagaraj, Achyuth
  last_name: Nagaraj
- first_name: Enes
  full_name: Yigitbas, Enes
  id: '8447'
  last_name: Yigitbas
  orcid: 0000-0002-5967-833X
- first_name: Anthony
  full_name: Anjorin, Anthony
  last_name: Anjorin
- first_name: Stefan
  full_name: Sauer, Stefan
  id: '447'
  last_name: Sauer
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
citation:
  ama: 'Jovanovikj I, Nagaraj A, Yigitbas E, Anjorin A, Sauer S, Engels G. Validating
    Test Case Migration via Mutation Analysis . In: <i>Proceedings of the 1st IEEE/ACM
    International Conference on Automation of Software Test AST</i>. ACM; 2020:31-40.'
  apa: 'Jovanovikj, I., Nagaraj, A., Yigitbas, E., Anjorin, A., Sauer, S., &#38; Engels,
    G. (2020). Validating Test Case Migration via Mutation Analysis . In <i>Proceedings
    of the 1st IEEE/ACM International Conference on Automation of Software Test AST</i>
    (pp. 31–40). Seoul: ACM.'
  bibtex: '@inproceedings{Jovanovikj_Nagaraj_Yigitbas_Anjorin_Sauer_Engels_2020, title={Validating
    Test Case Migration via Mutation Analysis }, booktitle={Proceedings of the 1st
    IEEE/ACM International Conference on Automation of Software Test AST}, publisher={ACM},
    author={Jovanovikj, Ivan and Nagaraj, Achyuth and Yigitbas, Enes and Anjorin,
    Anthony and Sauer, Stefan and Engels, Gregor}, year={2020}, pages={31–40} }'
  chicago: Jovanovikj, Ivan, Achyuth Nagaraj, Enes Yigitbas, Anthony Anjorin, Stefan
    Sauer, and Gregor Engels. “Validating Test Case Migration via Mutation Analysis
    .” In <i>Proceedings of the 1st IEEE/ACM International Conference on Automation
    of Software Test AST</i>, 31–40. ACM, 2020.
  ieee: I. Jovanovikj, A. Nagaraj, E. Yigitbas, A. Anjorin, S. Sauer, and G. Engels,
    “Validating Test Case Migration via Mutation Analysis ,” in <i>Proceedings of
    the 1st IEEE/ACM International Conference on Automation of Software Test AST</i>,
    Seoul, 2020, pp. 31–40.
  mla: Jovanovikj, Ivan, et al. “Validating Test Case Migration via Mutation Analysis
    .” <i>Proceedings of the 1st IEEE/ACM International Conference on Automation of
    Software Test AST</i>, ACM, 2020, pp. 31–40.
  short: 'I. Jovanovikj, A. Nagaraj, E. Yigitbas, A. Anjorin, S. Sauer, G. Engels,
    in: Proceedings of the 1st IEEE/ACM International Conference on Automation of
    Software Test AST, ACM, 2020, pp. 31–40.'
conference:
  location: Seoul
  name: 1st IEEE/ACM International Conference on Automation of Software Test (AST
    2020)
date_created: 2020-03-09T13:11:25Z
date_updated: 2022-01-06T06:52:47Z
department:
- _id: '66'
- _id: '534'
language:
- iso: eng
page: 31-40
publication: Proceedings of the 1st IEEE/ACM International Conference on Automation
  of Software Test AST
publisher: ACM
status: public
title: 'Validating Test Case Migration via Mutation Analysis '
type: conference
user_id: '8447'
year: '2020'
...
---
_id: '16278'
abstract:
- lang: eng
  text: Currently, the coexistence of multiple users and devices challenges the network's
    ability to reliably connect them. This article proposes a novel communication
    architecture that satisfies the requirements of fifth-generation (5G) mobile network
    applications. In particular, this architecture extends and combines ultra-dense
    networking (UDN), multi-access edge computing (MEC), and virtual infrastructure
    manager (VIM) concepts to provide a flexible network of moving radio access (RA)
    nodes, flying or moving to areas where users and devices struggle for connectivity
    and data rate. Furthermore, advances in radio communications and non-orthogonal
    multiple access (NOMA), virtualization technologies and energy-awareness mechanisms
    are integrated towards a mobile UDN that not only allows RA nodes to follow the
    user but also enables the virtualized network functions (VNFs) to adapt to user
    mobility by migrating from one node to another. Performance evaluation shows that
    the underlying network improves connectivity of users and devices through the
    flexible deployment of moving RA nodes and the use of NOMA.
article_number: '100250'
author:
- first_name: Nikolaos
  full_name: Nomikos, Nikolaos
  last_name: Nomikos
- first_name: Emmanouel T.
  full_name: Michailidis, Emmanouel T.
  last_name: Michailidis
- first_name: Panagiotis
  full_name: Trakadas, Panagiotis
  last_name: Trakadas
- first_name: Demosthenes
  full_name: Vouyioukas, Demosthenes
  last_name: Vouyioukas
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
- first_name: Josep
  full_name: Martrat, Josep
  last_name: Martrat
- first_name: Theodore
  full_name: Zahariadis, Theodore
  last_name: Zahariadis
- first_name: Konstantinos
  full_name: Papadopoulos, Konstantinos
  last_name: Papadopoulos
- first_name: Stamatis
  full_name: Voliotis, Stamatis
  last_name: Voliotis
citation:
  ama: Nomikos N, Michailidis ET, Trakadas P, et al. A UAV-based moving 5G RAN for
    massive connectivity of mobile users and IoT devices. <i>Vehicular Communications</i>.
    2020. doi:<a href="https://doi.org/10.1016/j.vehcom.2020.100250">10.1016/j.vehcom.2020.100250</a>
  apa: Nomikos, N., Michailidis, E. T., Trakadas, P., Vouyioukas, D., Karl, H., Martrat,
    J., … Voliotis, S. (2020). A UAV-based moving 5G RAN for massive connectivity
    of mobile users and IoT devices. <i>Vehicular Communications</i>. <a href="https://doi.org/10.1016/j.vehcom.2020.100250">https://doi.org/10.1016/j.vehcom.2020.100250</a>
  bibtex: '@article{Nomikos_Michailidis_Trakadas_Vouyioukas_Karl_Martrat_Zahariadis_Papadopoulos_Voliotis_2020,
    title={A UAV-based moving 5G RAN for massive connectivity of mobile users and
    IoT devices}, DOI={<a href="https://doi.org/10.1016/j.vehcom.2020.100250">10.1016/j.vehcom.2020.100250</a>},
    number={100250}, journal={Vehicular Communications}, author={Nomikos, Nikolaos
    and Michailidis, Emmanouel T. and Trakadas, Panagiotis and Vouyioukas, Demosthenes
    and Karl, Holger and Martrat, Josep and Zahariadis, Theodore and Papadopoulos,
    Konstantinos and Voliotis, Stamatis}, year={2020} }'
  chicago: Nomikos, Nikolaos, Emmanouel T. Michailidis, Panagiotis Trakadas, Demosthenes
    Vouyioukas, Holger Karl, Josep Martrat, Theodore Zahariadis, Konstantinos Papadopoulos,
    and Stamatis Voliotis. “A UAV-Based Moving 5G RAN for Massive Connectivity of
    Mobile Users and IoT Devices.” <i>Vehicular Communications</i>, 2020. <a href="https://doi.org/10.1016/j.vehcom.2020.100250">https://doi.org/10.1016/j.vehcom.2020.100250</a>.
  ieee: N. Nomikos <i>et al.</i>, “A UAV-based moving 5G RAN for massive connectivity
    of mobile users and IoT devices,” <i>Vehicular Communications</i>, 2020.
  mla: Nomikos, Nikolaos, et al. “A UAV-Based Moving 5G RAN for Massive Connectivity
    of Mobile Users and IoT Devices.” <i>Vehicular Communications</i>, 100250, 2020,
    doi:<a href="https://doi.org/10.1016/j.vehcom.2020.100250">10.1016/j.vehcom.2020.100250</a>.
  short: N. Nomikos, E.T. Michailidis, P. Trakadas, D. Vouyioukas, H. Karl, J. Martrat,
    T. Zahariadis, K. Papadopoulos, S. Voliotis, Vehicular Communications (2020).
date_created: 2020-03-10T15:59:56Z
date_updated: 2022-01-06T06:52:48Z
department:
- _id: '75'
doi: 10.1016/j.vehcom.2020.100250
language:
- iso: eng
publication: Vehicular Communications
publication_identifier:
  issn:
  - 2214-2096
publication_status: published
status: public
title: A UAV-based moving 5G RAN for massive connectivity of mobile users and IoT
  devices
type: journal_article
user_id: '126'
year: '2020'
...
---
_id: '16280'
abstract:
- lang: eng
  text: 'Assigning bands of the wireless spectrum as resources to users is a common
    problem in wireless networks. Typically, frequency bands were assumed to be available
    in a stable manner. Nevertheless, in recent scenarios where wireless networks
    may be deployed in unknown environments, spectrum competition is considered, making
    it uncertain whether a frequency band is available at all or at what quality.
    To fully exploit such resources with uncertain availability, the multi-armed bandit
    (MAB) method, a representative online learning technique, has been applied to
    design spectrum scheduling algorithms. This article surveys such proposals. We
    describe the following three aspects: how to model spectrum scheduling problems
    within the MAB framework, what the main thread is following which prevalent algorithms
    are designed, and how to evaluate algorithm performance and complexity. We also
    give some promising directions for future research in related fields.'
author:
- first_name: Feng
  full_name: Li, Feng
  last_name: Li
- first_name: Dongxiao
  full_name: Yu, Dongxiao
  last_name: Yu
- first_name: Huan
  full_name: Yang, Huan
  last_name: Yang
- first_name: Jiguo
  full_name: Yu, Jiguo
  last_name: Yu
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
- first_name: Xiuzhen
  full_name: Cheng, Xiuzhen
  last_name: Cheng
citation:
  ama: 'Li F, Yu D, Yang H, Yu J, Karl H, Cheng X. Multi-Armed-Bandit-Based Spectrum
    Scheduling Algorithms in Wireless Networks: A Survey. <i>IEEE Wireless Communications</i>.
    2020:24-30. doi:<a href="https://doi.org/10.1109/mwc.001.1900280">10.1109/mwc.001.1900280</a>'
  apa: 'Li, F., Yu, D., Yang, H., Yu, J., Karl, H., &#38; Cheng, X. (2020). Multi-Armed-Bandit-Based
    Spectrum Scheduling Algorithms in Wireless Networks: A Survey. <i>IEEE Wireless
    Communications</i>, 24–30. <a href="https://doi.org/10.1109/mwc.001.1900280">https://doi.org/10.1109/mwc.001.1900280</a>'
  bibtex: '@article{Li_Yu_Yang_Yu_Karl_Cheng_2020, title={Multi-Armed-Bandit-Based
    Spectrum Scheduling Algorithms in Wireless Networks: A Survey}, DOI={<a href="https://doi.org/10.1109/mwc.001.1900280">10.1109/mwc.001.1900280</a>},
    journal={IEEE Wireless Communications}, author={Li, Feng and Yu, Dongxiao and
    Yang, Huan and Yu, Jiguo and Karl, Holger and Cheng, Xiuzhen}, year={2020}, pages={24–30}
    }'
  chicago: 'Li, Feng, Dongxiao Yu, Huan Yang, Jiguo Yu, Holger Karl, and Xiuzhen Cheng.
    “Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks:
    A Survey.” <i>IEEE Wireless Communications</i>, 2020, 24–30. <a href="https://doi.org/10.1109/mwc.001.1900280">https://doi.org/10.1109/mwc.001.1900280</a>.'
  ieee: 'F. Li, D. Yu, H. Yang, J. Yu, H. Karl, and X. Cheng, “Multi-Armed-Bandit-Based
    Spectrum Scheduling Algorithms in Wireless Networks: A Survey,” <i>IEEE Wireless
    Communications</i>, pp. 24–30, 2020.'
  mla: 'Li, Feng, et al. “Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms
    in Wireless Networks: A Survey.” <i>IEEE Wireless Communications</i>, 2020, pp.
    24–30, doi:<a href="https://doi.org/10.1109/mwc.001.1900280">10.1109/mwc.001.1900280</a>.'
  short: F. Li, D. Yu, H. Yang, J. Yu, H. Karl, X. Cheng, IEEE Wireless Communications
    (2020) 24–30.
date_created: 2020-03-10T16:02:30Z
date_updated: 2022-01-06T06:52:48Z
department:
- _id: '75'
doi: 10.1109/mwc.001.1900280
language:
- iso: eng
page: 24-30
publication: IEEE Wireless Communications
publication_identifier:
  issn:
  - 1536-1284
  - 1558-0687
publication_status: published
status: public
title: 'Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks:
  A Survey'
type: journal_article
user_id: '126'
year: '2020'
...
---
_id: '16299'
author:
- first_name: Jannik
  full_name: Castenow, Jannik
  id: '38705'
  last_name: Castenow
- first_name: Matthias
  full_name: Fischer, Matthias
  id: '146'
  last_name: Fischer
- first_name: Jonas
  full_name: Harbig, Jonas
  last_name: Harbig
- first_name: Daniel
  full_name: Jung, Daniel
  id: '37827'
  last_name: Jung
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
citation:
  ama: Castenow J, Fischer M, Harbig J, Jung D, Meyer auf der Heide F. Gathering Anonymous,
    Oblivious Robots on a Grid. <i>Theoretical Computer Science</i>. 2020;815:289-309.
    doi:<a href="https://doi.org/10.1016/j.tcs.2020.02.018">10.1016/j.tcs.2020.02.018</a>
  apa: Castenow, J., Fischer, M., Harbig, J., Jung, D., &#38; Meyer auf der Heide,
    F. (2020). Gathering Anonymous, Oblivious Robots on a Grid. <i>Theoretical Computer
    Science</i>, <i>815</i>, 289–309. <a href="https://doi.org/10.1016/j.tcs.2020.02.018">https://doi.org/10.1016/j.tcs.2020.02.018</a>
  bibtex: '@article{Castenow_Fischer_Harbig_Jung_Meyer auf der Heide_2020, title={Gathering
    Anonymous, Oblivious Robots on a Grid}, volume={815}, DOI={<a href="https://doi.org/10.1016/j.tcs.2020.02.018">10.1016/j.tcs.2020.02.018</a>},
    journal={Theoretical Computer Science}, author={Castenow, Jannik and Fischer,
    Matthias and Harbig, Jonas and Jung, Daniel and Meyer auf der Heide, Friedhelm},
    year={2020}, pages={289–309} }'
  chicago: 'Castenow, Jannik, Matthias Fischer, Jonas Harbig, Daniel Jung, and Friedhelm
    Meyer auf der Heide. “Gathering Anonymous, Oblivious Robots on a Grid.” <i>Theoretical
    Computer Science</i> 815 (2020): 289–309. <a href="https://doi.org/10.1016/j.tcs.2020.02.018">https://doi.org/10.1016/j.tcs.2020.02.018</a>.'
  ieee: J. Castenow, M. Fischer, J. Harbig, D. Jung, and F. Meyer auf der Heide, “Gathering
    Anonymous, Oblivious Robots on a Grid,” <i>Theoretical Computer Science</i>, vol.
    815, pp. 289–309, 2020.
  mla: Castenow, Jannik, et al. “Gathering Anonymous, Oblivious Robots on a Grid.”
    <i>Theoretical Computer Science</i>, vol. 815, 2020, pp. 289–309, doi:<a href="https://doi.org/10.1016/j.tcs.2020.02.018">10.1016/j.tcs.2020.02.018</a>.
  short: J. Castenow, M. Fischer, J. Harbig, D. Jung, F. Meyer auf der Heide, Theoretical
    Computer Science 815 (2020) 289–309.
date_created: 2020-03-13T12:55:53Z
date_updated: 2022-01-06T06:52:48Z
department:
- _id: '63'
doi: 10.1016/j.tcs.2020.02.018
intvolume: '       815'
language:
- iso: eng
page: 289-309
publication: Theoretical Computer Science
publication_identifier:
  issn:
  - 0304-3975
publication_status: published
status: public
title: Gathering Anonymous, Oblivious Robots on a Grid
type: journal_article
user_id: '38705'
volume: 815
year: '2020'
...
---
_id: '16363'
author:
- first_name: Tim
  full_name: Hansmeier, Tim
  id: '49992'
  last_name: Hansmeier
  orcid: 0000-0003-1377-3339
- first_name: Paul
  full_name: Kaufmann, Paul
  last_name: Kaufmann
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: 'Hansmeier T, Kaufmann P, Platzner M. Enabling XCSF to Cope with Dynamic Environments
    via an Adaptive Error Threshold. In: <i>GECCO ’20: Proceedings of the Genetic
    and Evolutionary Computation Conference Companion</i>. New York, NY, United States:
    Association for Computing Machinery (ACM); 2020:125-126. doi:<a href="https://doi.org/10.1145/3377929.3389968">10.1145/3377929.3389968</a>'
  apa: 'Hansmeier, T., Kaufmann, P., &#38; Platzner, M. (2020). Enabling XCSF to Cope
    with Dynamic Environments via an Adaptive Error Threshold. In <i>GECCO ’20: Proceedings
    of the Genetic and Evolutionary Computation Conference Companion</i> (pp. 125–126).
    New York, NY, United States: Association for Computing Machinery (ACM). <a href="https://doi.org/10.1145/3377929.3389968">https://doi.org/10.1145/3377929.3389968</a>'
  bibtex: '@inproceedings{Hansmeier_Kaufmann_Platzner_2020, place={New York, NY, United
    States}, title={Enabling XCSF to Cope with Dynamic Environments via an Adaptive
    Error Threshold}, DOI={<a href="https://doi.org/10.1145/3377929.3389968">10.1145/3377929.3389968</a>},
    booktitle={GECCO ’20: Proceedings of the Genetic and Evolutionary Computation
    Conference Companion}, publisher={Association for Computing Machinery (ACM)},
    author={Hansmeier, Tim and Kaufmann, Paul and Platzner, Marco}, year={2020}, pages={125–126}
    }'
  chicago: 'Hansmeier, Tim, Paul Kaufmann, and Marco Platzner. “Enabling XCSF to Cope
    with Dynamic Environments via an Adaptive Error Threshold.” In <i>GECCO ’20: Proceedings
    of the Genetic and Evolutionary Computation Conference Companion</i>, 125–26.
    New York, NY, United States: Association for Computing Machinery (ACM), 2020.
    <a href="https://doi.org/10.1145/3377929.3389968">https://doi.org/10.1145/3377929.3389968</a>.'
  ieee: 'T. Hansmeier, P. Kaufmann, and M. Platzner, “Enabling XCSF to Cope with Dynamic
    Environments via an Adaptive Error Threshold,” in <i>GECCO ’20: Proceedings of
    the Genetic and Evolutionary Computation Conference Companion</i>, Cancún, Mexico,
    2020, pp. 125–126.'
  mla: 'Hansmeier, Tim, et al. “Enabling XCSF to Cope with Dynamic Environments via
    an Adaptive Error Threshold.” <i>GECCO ’20: Proceedings of the Genetic and Evolutionary
    Computation Conference Companion</i>, Association for Computing Machinery (ACM),
    2020, pp. 125–26, doi:<a href="https://doi.org/10.1145/3377929.3389968">10.1145/3377929.3389968</a>.'
  short: 'T. Hansmeier, P. Kaufmann, M. Platzner, in: GECCO ’20: Proceedings of the
    Genetic and Evolutionary Computation Conference Companion, Association for Computing
    Machinery (ACM), New York, NY, United States, 2020, pp. 125–126.'
conference:
  end_date: 2020-07-12
  location: Cancún, Mexico
  name: The Genetic and Evolutionary Computation Conference (GECCO 2020)
  start_date: 2020-07-08
date_created: 2020-04-02T10:07:10Z
date_updated: 2022-01-06T06:52:49Z
department:
- _id: '78'
doi: 10.1145/3377929.3389968
language:
- iso: eng
page: 125-126
place: New York, NY, United States
project:
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '1'
  name: SFB 901
- _id: '14'
  name: SFB 901 - Subproject C2
publication: 'GECCO ''20: Proceedings of the Genetic and Evolutionary Computation
  Conference Companion'
publication_identifier:
  isbn:
  - 978-1-4503-7127-8
publication_status: published
publisher: Association for Computing Machinery (ACM)
status: public
title: Enabling XCSF to Cope with Dynamic Environments via an Adaptive Error Threshold
type: conference
user_id: '477'
year: '2020'
...
---
_id: '16400'
abstract:
- lang: eng
  text: "Softwarization facilitates the introduction of smart\r\nmanufacturing applications
    in the industry. Manifold devices\r\nsuch as machine computers, Industrial IoT
    devices, tablets,\r\nsmartphones and smart glasses are integrated into factory
    networks\r\nto enable shop floor digitalization and big data analysis. To\r\nhandle
    the increasing number of devices and the resulting traffic,\r\na flexible and
    scalable factory network is necessary which can be\r\nrealized using softwarization
    technologies like Network Function\r\nVirtualization (NFV). However, the security
    risks increase with\r\nthe increasing number of new devices, so that cyber security
    must\r\nalso be considered in NFV-based networks.\r\n\r\nTherefore, extending
    our previous work, we showcase threat\r\ndetection using a cloud-native NFV-driven
    intrusion detection\r\nsystem (IDS) that is integrated in our industrial-specific
    network\r\nservices. As a result of the threat detection, the affected network\r\nservice
    is put into quarantine via automatic network reconfiguration.\r\nWe use the 5GTANGO
    service platform to deploy our\r\ndeveloped network services on Kubernetes and
    to initiate the\r\nnetwork reconfiguration."
author:
- first_name: Marcel
  full_name: Müller, Marcel
  last_name: Müller
- first_name: Daniel
  full_name: Behnke, Daniel
  last_name: Behnke
- first_name: Patrick-Benjamin
  full_name: Bök, Patrick-Benjamin
  last_name: Bök
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Manuel
  full_name: Peuster, Manuel
  id: '13271'
  last_name: Peuster
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Müller M, Behnke D, Bök P-B, Schneider SB, Peuster M, Karl H. Cloud-Native
    Threat Detection and Containment for Smart Manufacturing. In: <i>IEEE Conference
    on Network Softwarization (NetSoft) Demo Track</i>. Ghent, Belgium: IEEE; 2020.'
  apa: 'Müller, M., Behnke, D., Bök, P.-B., Schneider, S. B., Peuster, M., &#38; Karl,
    H. (2020). Cloud-Native Threat Detection and Containment for Smart Manufacturing.
    In <i>IEEE Conference on Network Softwarization (NetSoft) Demo Track</i>. Ghent,
    Belgium: IEEE.'
  bibtex: '@inproceedings{Müller_Behnke_Bök_Schneider_Peuster_Karl_2020, place={Ghent,
    Belgium}, title={Cloud-Native Threat Detection and Containment for Smart Manufacturing},
    booktitle={IEEE Conference on Network Softwarization (NetSoft) Demo Track}, publisher={IEEE},
    author={Müller, Marcel and Behnke, Daniel and Bök, Patrick-Benjamin and Schneider,
    Stefan Balthasar and Peuster, Manuel and Karl, Holger}, year={2020} }'
  chicago: 'Müller, Marcel, Daniel Behnke, Patrick-Benjamin Bök, Stefan Balthasar
    Schneider, Manuel Peuster, and Holger Karl. “Cloud-Native Threat Detection and
    Containment for Smart Manufacturing.” In <i>IEEE Conference on Network Softwarization
    (NetSoft) Demo Track</i>. Ghent, Belgium: IEEE, 2020.'
  ieee: M. Müller, D. Behnke, P.-B. Bök, S. B. Schneider, M. Peuster, and H. Karl,
    “Cloud-Native Threat Detection and Containment for Smart Manufacturing,” in <i>IEEE
    Conference on Network Softwarization (NetSoft) Demo Track</i>, Ghent, Belgium,
    2020.
  mla: Müller, Marcel, et al. “Cloud-Native Threat Detection and Containment for Smart
    Manufacturing.” <i>IEEE Conference on Network Softwarization (NetSoft) Demo Track</i>,
    IEEE, 2020.
  short: 'M. Müller, D. Behnke, P.-B. Bök, S.B. Schneider, M. Peuster, H. Karl, in:
    IEEE Conference on Network Softwarization (NetSoft) Demo Track, IEEE, Ghent, Belgium,
    2020.'
conference:
  location: Ghent, Belgium
  name: IEEE Conference on Network Softwarization (NetSoft) Demo Track
date_created: 2020-04-03T11:53:00Z
date_updated: 2022-01-06T06:52:50Z
department:
- _id: '75'
language:
- iso: eng
place: Ghent, Belgium
project:
- _id: '28'
  grant_number: '761493'
  name: 5G Development and validation platform for global industry-specific network
    services and Apps
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE Conference on Network Softwarization (NetSoft) Demo Track
publisher: IEEE
status: public
title: Cloud-Native Threat Detection and Containment for Smart Manufacturing
type: conference
user_id: '35343'
year: '2020'
...
---
_id: '13868'
author:
- first_name: Simon
  full_name: Pukrop, Simon
  id: '44428'
  last_name: Pukrop
- first_name: Alexander
  full_name: Mäcker, Alexander
  id: '13536'
  last_name: Mäcker
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
citation:
  ama: 'Pukrop S, Mäcker A, Meyer auf der Heide F. Approximating Weighted Completion
    Time for Order Scheduling with Setup Times. In: <i>Proceedings of the 46th International
    Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM)</i>.
    ; 2020.'
  apa: Pukrop, S., Mäcker, A., &#38; Meyer auf der Heide, F. (2020). Approximating
    Weighted Completion Time for Order Scheduling with Setup Times. In <i>Proceedings
    of the 46th International Conference on Current Trends in Theory and Practice
    of Computer Science (SOFSEM)</i>.
  bibtex: '@inproceedings{Pukrop_Mäcker_Meyer auf der Heide_2020, title={Approximating
    Weighted Completion Time for Order Scheduling with Setup Times}, booktitle={Proceedings
    of the 46th International Conference on Current Trends in Theory and Practice
    of Computer Science (SOFSEM)}, author={Pukrop, Simon and Mäcker, Alexander and
    Meyer auf der Heide, Friedhelm}, year={2020} }'
  chicago: Pukrop, Simon, Alexander Mäcker, and Friedhelm Meyer auf der Heide. “Approximating
    Weighted Completion Time for Order Scheduling with Setup Times.” In <i>Proceedings
    of the 46th International Conference on Current Trends in Theory and Practice
    of Computer Science (SOFSEM)</i>, 2020.
  ieee: S. Pukrop, A. Mäcker, and F. Meyer auf der Heide, “Approximating Weighted
    Completion Time for Order Scheduling with Setup Times,” in <i>Proceedings of the
    46th International Conference on Current Trends in Theory and Practice of Computer
    Science (SOFSEM)</i>, 2020.
  mla: Pukrop, Simon, et al. “Approximating Weighted Completion Time for Order Scheduling
    with Setup Times.” <i>Proceedings of the 46th International Conference on Current
    Trends in Theory and Practice of Computer Science (SOFSEM)</i>, 2020.
  short: 'S. Pukrop, A. Mäcker, F. Meyer auf der Heide, in: Proceedings of the 46th
    International Conference on Current Trends in Theory and Practice of Computer
    Science (SOFSEM), 2020.'
date_created: 2019-10-15T12:19:49Z
date_updated: 2022-01-06T06:51:45Z
department:
- _id: '63'
language:
- iso: eng
project:
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '1'
  name: SFB 901
- _id: '16'
  name: SFB 901 - Subproject C4
publication: Proceedings of the 46th International Conference on Current Trends in
  Theory and Practice of Computer Science (SOFSEM)
status: public
title: Approximating Weighted Completion Time for Order Scheduling with Setup Times
type: conference
user_id: '44428'
year: '2020'
...
---
_id: '10330'
author:
- first_name: Dora
  full_name: Kiesel, Dora
  last_name: Kiesel
- first_name: Patrick
  full_name: Riehmann, Patrick
  last_name: Riehmann
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
- first_name: Benno
  full_name: Stein, Benno
  last_name: Stein
- first_name: Bernd
  full_name: Fröhlich, Bernd
  last_name: Fröhlich
citation:
  ama: Kiesel D, Riehmann P, Wachsmuth H, Stein B, Fröhlich B. Visual Analysis of
    Argumentation in Essays. <i>IEEE Transactions of Visualization &#38; Computer
    Graphics</i>. 27(2):1139-1148.
  apa: Kiesel, D., Riehmann, P., Wachsmuth, H., Stein, B., &#38; Fröhlich, B. (n.d.).
    Visual Analysis of Argumentation in Essays. <i>IEEE Transactions of Visualization
    &#38; Computer Graphics</i>, <i>27</i>(2), 1139–1148.
  bibtex: '@article{Kiesel_Riehmann_Wachsmuth_Stein_Fröhlich, title={Visual Analysis
    of Argumentation in Essays}, volume={27}, number={2}, journal={IEEE Transactions
    of Visualization &#38; Computer Graphics}, author={Kiesel, Dora and Riehmann,
    Patrick and Wachsmuth, Henning and Stein, Benno and Fröhlich, Bernd}, pages={1139–1148}
    }'
  chicago: 'Kiesel, Dora, Patrick Riehmann, Henning Wachsmuth, Benno Stein, and Bernd
    Fröhlich. “Visual Analysis of Argumentation in Essays.” <i>IEEE Transactions of
    Visualization &#38; Computer Graphics</i> 27, no. 2 (n.d.): 1139–48.'
  ieee: D. Kiesel, P. Riehmann, H. Wachsmuth, B. Stein, and B. Fröhlich, “Visual Analysis
    of Argumentation in Essays,” <i>IEEE Transactions of Visualization &#38; Computer
    Graphics</i>, vol. 27, no. 2, pp. 1139–1148.
  mla: Kiesel, Dora, et al. “Visual Analysis of Argumentation in Essays.” <i>IEEE
    Transactions of Visualization &#38; Computer Graphics</i>, vol. 27, no. 2, pp.
    1139–48.
  short: D. Kiesel, P. Riehmann, H. Wachsmuth, B. Stein, B. Fröhlich, IEEE Transactions
    of Visualization &#38; Computer Graphics 27 (n.d.) 1139–1148.
date_created: 2019-06-27T12:58:13Z
date_updated: 2022-01-06T06:50:37Z
department:
- _id: '600'
intvolume: '        27'
issue: '2'
language:
- iso: eng
main_file_link:
- url: https://www.uni-weimar.de/fileadmin/user/fak/medien/professuren/Virtual_Reality/documents/publications/Visual_Analysis_of_Argumentation_in_Essays.pdf
page: 1139-1148
publication: IEEE Transactions of Visualization & Computer Graphics
publication_status: accepted
status: public
title: Visual Analysis of Argumentation in Essays
type: journal_article
user_id: '82920'
volume: 27
year: '2020'
...
