[{"conference":{"location":"Orlando, FL, USA","end_date":"2019-07-31","start_date":"2019-07-26","name":"21st International Conference on Human-Computer Interaction"},"doi":"10.1007/978-3-030-23535-2_27","title":"A Value-Centered Approach for Unique and Novel Software Applications","author":[{"first_name":"Björn","id":"9109","full_name":"Senft, Björn","last_name":"Senft"},{"last_name":"Rittmeier","id":"5281","full_name":"Rittmeier, Florian","first_name":"Florian"},{"first_name":"Holger Gerhard","last_name":"Fischer","full_name":"Fischer, Holger Gerhard","id":"30457"},{"first_name":"Simon","id":"383","full_name":"Oberthür, Simon","last_name":"Oberthür"}],"date_created":"2019-07-14T07:57:53Z","date_updated":"2022-01-06T06:51:13Z","citation":{"ama":"Senft B, Rittmeier F, Fischer HG, Oberthür S. A Value-Centered Approach for Unique and Novel Software Applications. In: <i>Design, User Experience, and Usability. Practice and Case Studies</i>. Cham; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-23535-2_27\">10.1007/978-3-030-23535-2_27</a>","ieee":"B. Senft, F. Rittmeier, H. G. Fischer, and S. Oberthür, “A Value-Centered Approach for Unique and Novel Software Applications,” in <i>Design, User Experience, and Usability. Practice and Case Studies</i>, Cham, 2019.","chicago":"Senft, Björn, Florian Rittmeier, Holger Gerhard Fischer, and Simon Oberthür. “A Value-Centered Approach for Unique and Novel Software Applications.” In <i>Design, User Experience, and Usability. Practice and Case Studies</i>. Cham, 2019. <a href=\"https://doi.org/10.1007/978-3-030-23535-2_27\">https://doi.org/10.1007/978-3-030-23535-2_27</a>.","short":"B. Senft, F. Rittmeier, H.G. Fischer, S. Oberthür, in: Design, User Experience, and Usability. Practice and Case Studies, Cham, 2019.","mla":"Senft, Björn, et al. “A Value-Centered Approach for Unique and Novel Software Applications.” <i>Design, User Experience, and Usability. Practice and Case Studies</i>, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-23535-2_27\">10.1007/978-3-030-23535-2_27</a>.","bibtex":"@inbook{Senft_Rittmeier_Fischer_Oberthür_2019, place={Cham}, title={A Value-Centered Approach for Unique and Novel Software Applications}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-23535-2_27\">10.1007/978-3-030-23535-2_27</a>}, booktitle={Design, User Experience, and Usability. Practice and Case Studies}, author={Senft, Björn and Rittmeier, Florian and Fischer, Holger Gerhard and Oberthür, Simon}, year={2019} }","apa":"Senft, B., Rittmeier, F., Fischer, H. G., &#38; Oberthür, S. (2019). A Value-Centered Approach for Unique and Novel Software Applications. In <i>Design, User Experience, and Usability. Practice and Case Studies</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-23535-2_27\">https://doi.org/10.1007/978-3-030-23535-2_27</a>"},"place":"Cham","year":"2019","publication_status":"published","publication_identifier":{"isbn":["9783030235345","9783030235352"],"issn":["0302-9743","1611-3349"]},"language":[{"iso":"eng"}],"user_id":"9109","department":[{"_id":"66"}],"_id":"11952","status":"public","type":"book_chapter","publication":"Design, User Experience, and Usability. Practice and Case Studies"},{"department":[{"_id":"277"}],"user_id":"38910","_id":"14890","language":[{"iso":"eng"}],"publication":"Lecture Notes in Computer Science","type":"book_chapter","status":"public","date_created":"2019-11-12T07:45:53Z","author":[{"first_name":"Stefan","id":"38910","full_name":"Kuhlemann, Stefan","last_name":"Kuhlemann"},{"first_name":"Meinolf","full_name":"Sellmann, Meinolf","last_name":"Sellmann"},{"first_name":"Kevin","last_name":"Tierney","full_name":"Tierney, Kevin"}],"date_updated":"2022-01-06T06:52:09Z","doi":"10.1007/978-3-030-30048-7_40","title":"Exploiting Counterfactuals for Scalable Stochastic Optimization","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030300470","9783030300487"]},"publication_status":"published","citation":{"apa":"Kuhlemann, S., Sellmann, M., &#38; Tierney, K. (2019). Exploiting Counterfactuals for Scalable Stochastic Optimization. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-30048-7_40\">https://doi.org/10.1007/978-3-030-30048-7_40</a>","short":"S. Kuhlemann, M. Sellmann, K. Tierney, in: Lecture Notes in Computer Science, Cham, 2019.","mla":"Kuhlemann, Stefan, et al. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” <i>Lecture Notes in Computer Science</i>, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-30048-7_40\">10.1007/978-3-030-30048-7_40</a>.","bibtex":"@inbook{Kuhlemann_Sellmann_Tierney_2019, place={Cham}, title={Exploiting Counterfactuals for Scalable Stochastic Optimization}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-30048-7_40\">10.1007/978-3-030-30048-7_40</a>}, booktitle={Lecture Notes in Computer Science}, author={Kuhlemann, Stefan and Sellmann, Meinolf and Tierney, Kevin}, year={2019} }","ama":"Kuhlemann S, Sellmann M, Tierney K. Exploiting Counterfactuals for Scalable Stochastic Optimization. In: <i>Lecture Notes in Computer Science</i>. Cham; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-30048-7_40\">10.1007/978-3-030-30048-7_40</a>","chicago":"Kuhlemann, Stefan, Meinolf Sellmann, and Kevin Tierney. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” In <i>Lecture Notes in Computer Science</i>. Cham, 2019. <a href=\"https://doi.org/10.1007/978-3-030-30048-7_40\">https://doi.org/10.1007/978-3-030-30048-7_40</a>.","ieee":"S. Kuhlemann, M. Sellmann, and K. Tierney, “Exploiting Counterfactuals for Scalable Stochastic Optimization,” in <i>Lecture Notes in Computer Science</i>, Cham, 2019."},"place":"Cham","year":"2019"},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030337773","9783030337780"]},"publication_status":"published","year":"2019","place":"Cham","citation":{"ieee":"M. Ahmadi Fahandar and E. Hüllermeier, “Feature Selection for Analogy-Based Learning to Rank,” in <i>Discovery Science</i>, Cham, 2019.","chicago":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” In <i>Discovery Science</i>. Cham, 2019. <a href=\"https://doi.org/10.1007/978-3-030-33778-0_22\">https://doi.org/10.1007/978-3-030-33778-0_22</a>.","ama":"Ahmadi Fahandar M, Hüllermeier E. Feature Selection for Analogy-Based Learning to Rank. In: <i>Discovery Science</i>. Cham; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-33778-0_22\">10.1007/978-3-030-33778-0_22</a>","apa":"Ahmadi Fahandar, M., &#38; Hüllermeier, E. (2019). Feature Selection for Analogy-Based Learning to Rank. In <i>Discovery Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-33778-0_22\">https://doi.org/10.1007/978-3-030-33778-0_22</a>","bibtex":"@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Feature Selection for Analogy-Based Learning to Rank}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-33778-0_22\">10.1007/978-3-030-33778-0_22</a>}, booktitle={Discovery Science}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }","mla":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” <i>Discovery Science</i>, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-33778-0_22\">10.1007/978-3-030-33778-0_22</a>.","short":"M. Ahmadi Fahandar, E. Hüllermeier, in: Discovery Science, Cham, 2019."},"date_updated":"2022-01-06T06:52:14Z","author":[{"first_name":"Mohsen","full_name":"Ahmadi Fahandar, Mohsen","id":"59547","last_name":"Ahmadi Fahandar"},{"first_name":"Eyke","last_name":"Hüllermeier","id":"48129","full_name":"Hüllermeier, Eyke"}],"date_created":"2019-11-15T10:24:45Z","title":"Feature Selection for Analogy-Based Learning to Rank","doi":"10.1007/978-3-030-33778-0_22","publication":"Discovery Science","type":"book_chapter","status":"public","_id":"15004","department":[{"_id":"34"},{"_id":"355"}],"user_id":"315","language":[{"iso":"eng"}]},{"date_created":"2019-11-15T10:30:10Z","author":[{"last_name":"Ahmadi Fahandar","id":"59547","full_name":"Ahmadi Fahandar, Mohsen","first_name":"Mohsen"},{"last_name":"Hüllermeier","id":"48129","full_name":"Hüllermeier, Eyke","first_name":"Eyke"}],"date_updated":"2022-01-06T06:52:14Z","doi":"10.1007/978-3-030-30179-8_3","title":"Analogy-Based Preference Learning with Kernels","publication_identifier":{"isbn":["9783030301781","9783030301798"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","citation":{"chicago":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” In <i>KI 2019: Advances in Artificial Intelligence</i>. Cham, 2019. <a href=\"https://doi.org/10.1007/978-3-030-30179-8_3\">https://doi.org/10.1007/978-3-030-30179-8_3</a>.","ieee":"M. Ahmadi Fahandar and E. Hüllermeier, “Analogy-Based Preference Learning with Kernels,” in <i>KI 2019: Advances in Artificial Intelligence</i>, Cham, 2019.","ama":"Ahmadi Fahandar M, Hüllermeier E. Analogy-Based Preference Learning with Kernels. In: <i>KI 2019: Advances in Artificial Intelligence</i>. Cham; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-30179-8_3\">10.1007/978-3-030-30179-8_3</a>","apa":"Ahmadi Fahandar, M., &#38; Hüllermeier, E. (2019). Analogy-Based Preference Learning with Kernels. In <i>KI 2019: Advances in Artificial Intelligence</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-30179-8_3\">https://doi.org/10.1007/978-3-030-30179-8_3</a>","short":"M. Ahmadi Fahandar, E. Hüllermeier, in: KI 2019: Advances in Artificial Intelligence, Cham, 2019.","bibtex":"@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Analogy-Based Preference Learning with Kernels}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-30179-8_3\">10.1007/978-3-030-30179-8_3</a>}, booktitle={KI 2019: Advances in Artificial Intelligence}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }","mla":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” <i>KI 2019: Advances in Artificial Intelligence</i>, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-30179-8_3\">10.1007/978-3-030-30179-8_3</a>."},"year":"2019","place":"Cham","department":[{"_id":"34"},{"_id":"355"}],"user_id":"315","_id":"15005","language":[{"iso":"eng"}],"publication":"KI 2019: Advances in Artificial Intelligence","type":"book_chapter","status":"public"},{"status":"public","type":"book_chapter","publication":"Discovery Science","language":[{"iso":"eng"}],"user_id":"49109","department":[{"_id":"34"},{"_id":"355"}],"_id":"15006","citation":{"mla":"Nguyen, Vu-Linh, et al. “Epistemic Uncertainty Sampling.” <i>Discovery Science</i>, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-33778-0_7\">10.1007/978-3-030-33778-0_7</a>.","bibtex":"@inbook{Nguyen_Destercke_Hüllermeier_2019, place={Cham}, title={Epistemic Uncertainty Sampling}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-33778-0_7\">10.1007/978-3-030-33778-0_7</a>}, booktitle={Discovery Science}, author={Nguyen, Vu-Linh and Destercke, Sébastien and Hüllermeier, Eyke}, year={2019} }","short":"V.-L. Nguyen, S. Destercke, E. Hüllermeier, in: Discovery Science, Cham, 2019.","apa":"Nguyen, V.-L., Destercke, S., &#38; Hüllermeier, E. (2019). Epistemic Uncertainty Sampling. In <i>Discovery Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-33778-0_7\">https://doi.org/10.1007/978-3-030-33778-0_7</a>","ama":"Nguyen V-L, Destercke S, Hüllermeier E. Epistemic Uncertainty Sampling. In: <i>Discovery Science</i>. Cham; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-33778-0_7\">10.1007/978-3-030-33778-0_7</a>","ieee":"V.-L. Nguyen, S. Destercke, and E. Hüllermeier, “Epistemic Uncertainty Sampling,” in <i>Discovery Science</i>, Cham, 2019.","chicago":"Nguyen, Vu-Linh, Sébastien Destercke, and Eyke Hüllermeier. “Epistemic Uncertainty Sampling.” In <i>Discovery Science</i>. Cham, 2019. <a href=\"https://doi.org/10.1007/978-3-030-33778-0_7\">https://doi.org/10.1007/978-3-030-33778-0_7</a>."},"place":"Cham","year":"2019","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030337773","9783030337780"]},"doi":"10.1007/978-3-030-33778-0_7","title":"Epistemic Uncertainty Sampling","author":[{"full_name":"Nguyen, Vu-Linh","last_name":"Nguyen","first_name":"Vu-Linh"},{"last_name":"Destercke","full_name":"Destercke, Sébastien","first_name":"Sébastien"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier"}],"date_created":"2019-11-15T10:35:08Z","date_updated":"2022-01-06T06:52:14Z"},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030057152","9783030057169"]},"year":"2019","citation":{"ieee":"R. Hartel and A. Dunst, “How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics,” in <i>International Conference on Multimedia Modeling, MMM</i>, Thessaloniki, Greece, 2019, pp. 662–671.","chicago":"Hartel, Rita, and Alexander Dunst. “How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics.” In <i>International Conference on Multimedia Modeling, MMM</i>, 662–71. Springer, 2019. <a href=\"https://doi.org/10.1007/978-3-030-05716-9_59\">https://doi.org/10.1007/978-3-030-05716-9_59</a>.","ama":"Hartel R, Dunst A. How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics. In: <i>International Conference on Multimedia Modeling, MMM</i>. Springer; 2019:662-671. doi:<a href=\"https://doi.org/10.1007/978-3-030-05716-9_59\">10.1007/978-3-030-05716-9_59</a>","short":"R. Hartel, A. Dunst, in: International Conference on Multimedia Modeling, MMM, Springer, 2019, pp. 662–671.","bibtex":"@inproceedings{Hartel_Dunst_2019, title={How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-05716-9_59\">10.1007/978-3-030-05716-9_59</a>}, booktitle={International Conference on Multimedia Modeling, MMM}, publisher={Springer}, author={Hartel, Rita and Dunst, Alexander}, year={2019}, pages={662–671} }","mla":"Hartel, Rita, and Alexander Dunst. “How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics.” <i>International Conference on Multimedia Modeling, MMM</i>, Springer, 2019, pp. 662–71, doi:<a href=\"https://doi.org/10.1007/978-3-030-05716-9_59\">10.1007/978-3-030-05716-9_59</a>.","apa":"Hartel, R., &#38; Dunst, A. (2019). How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics. In <i>International Conference on Multimedia Modeling, MMM</i> (pp. 662–671). Thessaloniki, Greece: Springer. <a href=\"https://doi.org/10.1007/978-3-030-05716-9_59\">https://doi.org/10.1007/978-3-030-05716-9_59</a>"},"page":"662-671","date_updated":"2022-01-06T06:52:15Z","publisher":"Springer","date_created":"2019-11-21T14:42:25Z","author":[{"first_name":"Rita","last_name":"Hartel","id":"14961","full_name":"Hartel, Rita"},{"first_name":"Alexander","last_name":"Dunst","full_name":"Dunst, Alexander"}],"title":"How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics","conference":{"location":"Thessaloniki, Greece"},"doi":"10.1007/978-3-030-05716-9_59","type":"conference","publication":"International Conference on Multimedia Modeling, MMM","status":"public","_id":"15080","user_id":"14961","department":[{"_id":"69"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"user_id":"44413","department":[{"_id":"77"}],"project":[{"_id":"85","name":"Kooperative Softwareverifikation"}],"_id":"13872","status":"public","type":"book_chapter","publication":"Fundamental Approaches to Software Engineering","doi":"10.1007/978-3-030-16722-6_23","title":"CoVeriTest: Cooperative Verifier-Based Testing","date_created":"2019-10-16T06:39:51Z","author":[{"last_name":"Beyer","full_name":"Beyer, Dirk","first_name":"Dirk"},{"first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine","last_name":"Jakobs"}],"date_updated":"2022-01-06T06:51:45Z","citation":{"ieee":"D. Beyer and M.-C. Jakobs, “CoVeriTest: Cooperative Verifier-Based Testing,” in <i>Fundamental Approaches to Software Engineering</i>, Cham, 2019.","chicago":"Beyer, Dirk, and Marie-Christine Jakobs. “CoVeriTest: Cooperative Verifier-Based Testing.” In <i>Fundamental Approaches to Software Engineering</i>. Cham, 2019. <a href=\"https://doi.org/10.1007/978-3-030-16722-6_23\">https://doi.org/10.1007/978-3-030-16722-6_23</a>.","ama":"Beyer D, Jakobs M-C. CoVeriTest: Cooperative Verifier-Based Testing. In: <i>Fundamental Approaches to Software Engineering</i>. Cham; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-16722-6_23\">10.1007/978-3-030-16722-6_23</a>","short":"D. Beyer, M.-C. Jakobs, in: Fundamental Approaches to Software Engineering, Cham, 2019.","bibtex":"@inbook{Beyer_Jakobs_2019, place={Cham}, title={CoVeriTest: Cooperative Verifier-Based Testing}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-16722-6_23\">10.1007/978-3-030-16722-6_23</a>}, booktitle={Fundamental Approaches to Software Engineering}, author={Beyer, Dirk and Jakobs, Marie-Christine}, year={2019} }","mla":"Beyer, Dirk, and Marie-Christine Jakobs. “CoVeriTest: Cooperative Verifier-Based Testing.” <i>Fundamental Approaches to Software Engineering</i>, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-16722-6_23\">10.1007/978-3-030-16722-6_23</a>.","apa":"Beyer, D., &#38; Jakobs, M.-C. (2019). CoVeriTest: Cooperative Verifier-Based Testing. In <i>Fundamental Approaches to Software Engineering</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-16722-6_23\">https://doi.org/10.1007/978-3-030-16722-6_23</a>"},"year":"2019","place":"Cham","publication_status":"published","publication_identifier":{"isbn":["9783030167219","9783030167226"],"issn":["0302-9743","1611-3349"]}},{"file_date_updated":"2024-11-19T15:28:45Z","user_id":"71039","_id":"56579","status":"public","editor":[{"full_name":"Acosta, Maribel","last_name":"Acosta","first_name":"Maribel"},{"first_name":"Philippe","last_name":"Cudr{\\'e}-Mauroux","full_name":"Cudr{\\'e}-Mauroux, Philippe"},{"full_name":"Maleshkova, Maria","last_name":"Maleshkova","first_name":"Maria"},{"first_name":"Tassilo","full_name":"Pellegrini, Tassilo","last_name":"Pellegrini"},{"full_name":"Sack, Harald","last_name":"Sack","first_name":"Harald"},{"full_name":"Sure-Vetter, York","last_name":"Sure-Vetter","first_name":"York"}],"type":"book_chapter","main_file_link":[{"url":"https://rdcu.be/d0KJc","open_access":"1"}],"conference":{"location":"Karlsruhe, Germany","end_date":"2019-09-12","start_date":"2019-09-09","name":"SEMANTiCS 2019"},"doi":"10.1007/978-3-030-33220-4_25","author":[{"last_name":"Gusmita","id":"71039","full_name":"Gusmita, Ria Hari","first_name":"Ria Hari"},{"full_name":"Jalota, Rricha","last_name":"Jalota","first_name":"Rricha"},{"full_name":"Vollmers, Daniel","last_name":"Vollmers","first_name":"Daniel"},{"first_name":"Jan","last_name":"Reineke","full_name":"Reineke, Jan"},{"first_name":"Axel-Cyrille","id":"65716","full_name":"Ngonga Ngomo, Axel-Cyrille","last_name":"Ngonga Ngomo"},{"last_name":"Usbeck","full_name":"Usbeck, Ricardo","first_name":"Ricardo"}],"oa":"1","date_updated":"2024-11-19T15:34:24Z","citation":{"ama":"Gusmita RH, Jalota R, Vollmers D, Reineke J, Ngonga Ngomo A-C, Usbeck R. QUANT - Question Answering Benchmark Curator. In: Acosta M, Cudr{\\’e}-Mauroux P, Maleshkova M, Pellegrini T, Sack H, Sure-Vetter Y, eds. <i>Semantic Systems. The Power of AI and Knowledge Graphs</i>. Springer International Publishing; 2019:343--358. doi:<a href=\"https://doi.org/10.1007/978-3-030-33220-4_25\">10.1007/978-3-030-33220-4_25</a>","ieee":"R. H. Gusmita, R. Jalota, D. Vollmers, J. Reineke, A.-C. Ngonga Ngomo, and R. Usbeck, “QUANT - Question Answering Benchmark Curator,” in <i>Semantic Systems. The Power of AI and Knowledge Graphs</i>, M. Acosta, P. Cudr{\\’e}-Mauroux, M. Maleshkova, T. Pellegrini, H. Sack, and Y. Sure-Vetter, Eds. Cham: Springer International Publishing, 2019, pp. 343--358.","chicago":"Gusmita, Ria Hari, Rricha Jalota, Daniel Vollmers, Jan Reineke, Axel-Cyrille Ngonga Ngomo, and Ricardo Usbeck. “QUANT - Question Answering Benchmark Curator.” In <i>Semantic Systems. The Power of AI and Knowledge Graphs</i>, edited by Maribel Acosta, Philippe Cudr{\\’e}-Mauroux, Maria Maleshkova, Tassilo Pellegrini, Harald Sack, and York Sure-Vetter, 343--358. Cham: Springer International Publishing, 2019. <a href=\"https://doi.org/10.1007/978-3-030-33220-4_25\">https://doi.org/10.1007/978-3-030-33220-4_25</a>.","short":"R.H. Gusmita, R. Jalota, D. Vollmers, J. Reineke, A.-C. Ngonga Ngomo, R. Usbeck, in: M. Acosta, P. Cudr{\\’e}-Mauroux, M. Maleshkova, T. Pellegrini, H. Sack, Y. Sure-Vetter (Eds.), Semantic Systems. The Power of AI and Knowledge Graphs, Springer International Publishing, Cham, 2019, pp. 343--358.","mla":"Gusmita, Ria Hari, et al. “QUANT - Question Answering Benchmark Curator.” <i>Semantic Systems. The Power of AI and Knowledge Graphs</i>, edited by Maribel Acosta et al., Springer International Publishing, 2019, pp. 343--358, doi:<a href=\"https://doi.org/10.1007/978-3-030-33220-4_25\">10.1007/978-3-030-33220-4_25</a>.","bibtex":"@inbook{Gusmita_Jalota_Vollmers_Reineke_Ngonga Ngomo_Usbeck_2019, place={Cham}, title={QUANT - Question Answering Benchmark Curator}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-33220-4_25\">10.1007/978-3-030-33220-4_25</a>}, booktitle={Semantic Systems. The Power of AI and Knowledge Graphs}, publisher={Springer International Publishing}, author={Gusmita, Ria Hari and Jalota, Rricha and Vollmers, Daniel and Reineke, Jan and Ngonga Ngomo, Axel-Cyrille and Usbeck, Ricardo}, editor={Acosta, Maribel and Cudr{\\’e}-Mauroux, Philippe and Maleshkova, Maria and Pellegrini, Tassilo and Sack, Harald and Sure-Vetter, York}, year={2019}, pages={343--358} }","apa":"Gusmita, R. H., Jalota, R., Vollmers, D., Reineke, J., Ngonga Ngomo, A.-C., &#38; Usbeck, R. (2019). QUANT - Question Answering Benchmark Curator. In M. Acosta, P. Cudr{\\’e}-Mauroux, M. Maleshkova, T. Pellegrini, H. Sack, &#38; Y. Sure-Vetter (Eds.), <i>Semantic Systems. The Power of AI and Knowledge Graphs</i> (pp. 343--358). Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-33220-4_25\">https://doi.org/10.1007/978-3-030-33220-4_25</a>"},"page":"343--358","place":"Cham","publication_status":"published","has_accepted_license":"1","publication_identifier":{"eisbn":["978-3-030-33220-4"],"issn":["0302-9743","1611-3349"],"isbn":["978-3-030-33219-8"]},"language":[{"iso":"eng"}],"ddc":["004"],"keyword":["Benchmark","Question answering","Knowledge base"],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1179910,"access_level":"closed","file_id":"57244","file_name":"Gusmita_et_al-2019-Semantic_Systems._The_Power_of_AI_and_Knowledge_Graphs,_15th_International....pdf","date_updated":"2024-11-19T15:28:45Z","date_created":"2024-11-19T15:28:45Z","creator":"gusmita"}],"abstract":[{"lang":"eng","text":"Question answering engines have become one of the most popular type of applications driven by Semantic Web technologies. Consequently, the provision of means to quantify the performance of current question answering approaches on current datasets has become ever more important. However, a large percentage of the queries found in popular question answering benchmarks cannot be executed on current versions of their reference dataset. There is a consequently a clear need to curate question answering benchmarks periodically. However, the manual alteration of question answering benchmarks is often error-prone. We alleviate this problem by presenting QUANT, a novel framework for the creation and curation of question answering benchmarks. QUANT sup-ports the curation of benchmarks by generating smart edit suggestions for question-query pair and for the corresponding metadata. In addition, our framework supports the creation of new benchmark entries by pro-viding predefined quality checks for queries. We evaluate QUANT on 653questions obtained from QALD-1 to QALD-8 with 10 users. Our results show that our framework generates reliable suggestions and can reduce the curation effort for QA benchmarks by up to 91%."}],"publication":"Semantic Systems. The Power of AI and Knowledge Graphs","title":"QUANT - Question Answering Benchmark Curator","date_created":"2024-10-10T14:25:00Z","publisher":"Springer International Publishing","year":"2019"},{"_id":"2862","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"477","file_date_updated":"2018-11-02T13:45:40Z","type":"conference","status":"public","date_updated":"2022-01-06T06:58:12Z","oa":"1","author":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"},{"full_name":"Eidens, Fabian","id":"25078","last_name":"Eidens","first_name":"Fabian"},{"first_name":"Jakob","last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob"}],"doi":"10.1007/978-3-319-76953-0_25","conference":{"start_date":"2018-04-16","name":"Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018","location":"San Francisco, CA, USA","end_date":"2018-04-20"},"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/029"}],"has_accepted_license":"1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319769523","9783319769530"]},"publication_status":"published","place":"Cham","page":"470-490","citation":{"ama":"Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In: <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>. Cham: Springer International Publishing; 2018:470-490. doi:<a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">10.1007/978-3-319-76953-0_25</a>","ieee":"J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems,” in <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>, San Francisco, CA, USA, 2018, pp. 470–490.","chicago":"Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” In <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>, 470–90. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">https://doi.org/10.1007/978-3-319-76953-0_25</a>.","short":"J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, Cham, 2018, pp. 470–490.","bibtex":"@inproceedings{Blömer_Eidens_Juhnke_2018, place={Cham}, title={Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">10.1007/978-3-319-76953-0_25</a>}, booktitle={Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings}, publisher={Springer International Publishing}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={470–490} }","mla":"Blömer, Johannes, et al. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i>, Springer International Publishing, 2018, pp. 470–90, doi:<a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">10.1007/978-3-319-76953-0_25</a>.","apa":"Blömer, J., Eidens, F., &#38; Juhnke, J. (2018). Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In <i>Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings</i> (pp. 470–490). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-76953-0_25\">https://doi.org/10.1007/978-3-319-76953-0_25</a>"},"ddc":["004"],"language":[{"iso":"eng"}],"publication":"Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, Proceedings","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":3371773,"access_level":"closed","file_id":"5253","file_name":"PracticalAnonymousAndPubliclyL.pdf","date_updated":"2018-11-02T13:45:40Z","date_created":"2018-11-02T13:45:40Z","creator":"ups"}],"publisher":"Springer International Publishing","date_created":"2018-05-24T11:14:02Z","title":"Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems","year":"2018"},{"_id":"24396","department":[{"_id":"63"}],"user_id":"15415","language":[{"iso":"eng"}],"publication":"International Workshop on Combinatorial Algorithms (IWOCA)","type":"conference","abstract":[{"text":"We study the Online Prize-collecting Node-weighted Steiner Forest problem (OPC-NWSF) in which we are given an undirected graph \\(G=(V, E)\\) with \\(|V| = n\\) and node-weight function \\(w: V \\rightarrow \\mathcal {R}^+\\). A sequence of k pairs of nodes of G, each associated with a penalty, arrives online. OPC-NWSF asks to construct a subgraph H such that each pair \\(\\{s, t\\}\\) is either connected (there is a path between s and t in H) or its associated penalty is paid. The goal is to minimize the weight of H and the total penalties paid. The current best result for OPC-NWSF is a randomized \\(\\mathcal {O}(\\log ^4 n)\\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014). We improve this by proposing a randomized \\(\\mathcal {O}(\\log n \\log k)\\)-competitive algorithm for OPC-NWSF, which is optimal up to constant factor since OPC-NWSF has a randomized lower bound of \\(\\varOmega (\\log ^2 n)\\) due to Korman [11]. Moreover, our result also implies an improvement for two special cases of OPC-NWSF, the Online Prize-collecting Node-weighted Steiner Tree problem (OPC-NWST) and the Online Node-weighted Steiner Forest problem (ONWSF). In OPC-NWST, there is a distinguished node which is one of the nodes in each pair. In ONWSF, all penalties are set to infinity. The currently best known results for OPC-NWST and ONWSF are a randomized \\(\\mathcal {O}(\\log ^3 n)\\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014) and a randomized \\(\\mathcal {O}(\\log n \\log ^2 k)\\)-competitive algorithm due to Hajiaghayi et al. (FOCS 2013), respectively.","lang":"eng"}],"status":"public","date_updated":"2022-01-06T06:56:19Z","author":[{"last_name":"Markarian","full_name":"Markarian, Christine","first_name":"Christine"}],"date_created":"2021-09-14T12:23:29Z","title":"An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest","doi":"10.1007/978-3-319-94667-2_18","publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2018","place":"Cham","citation":{"apa":"Markarian, C. (2018). An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest. <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>. <a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">https://doi.org/10.1007/978-3-319-94667-2_18</a>","mla":"Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest.” <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>.","bibtex":"@inproceedings{Markarian_2018, place={Cham}, title={An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>}, booktitle={International Workshop on Combinatorial Algorithms (IWOCA)}, author={Markarian, Christine}, year={2018} }","short":"C. Markarian, in: International Workshop on Combinatorial Algorithms (IWOCA), Cham, 2018.","ama":"Markarian C. An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest. In: <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>. ; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>","chicago":"Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest.” In <i>International Workshop on Combinatorial Algorithms (IWOCA)</i>. Cham, 2018. <a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">https://doi.org/10.1007/978-3-319-94667-2_18</a>.","ieee":"C. Markarian, “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest,” 2018, doi: <a href=\"https://doi.org/10.1007/978-3-319-94667-2_18\">10.1007/978-3-319-94667-2_18</a>."}},{"doi":"10.1007/978-3-319-77610-1_6","author":[{"first_name":"Achim","id":"43646","full_name":"Lösch, Achim","last_name":"Lösch"},{"first_name":"Alex","full_name":"Wiens, Alex","last_name":"Wiens"},{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"}],"volume":10793,"date_updated":"2022-01-06T06:59:13Z","citation":{"ama":"Lösch A, Wiens A, Platzner M. Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes. In: <i>Proceedings of the International Conference on Architecture of Computing Systems (ARCS)</i>. Vol 10793. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:73-84. doi:<a href=\"https://doi.org/10.1007/978-3-319-77610-1_6\">10.1007/978-3-319-77610-1_6</a>","chicago":"Lösch, Achim, Alex Wiens, and Marco Platzner. “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes.” In <i>Proceedings of the International Conference on Architecture of Computing Systems (ARCS)</i>, 10793:73–84. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-77610-1_6\">https://doi.org/10.1007/978-3-319-77610-1_6</a>.","ieee":"A. Lösch, A. Wiens, and M. Platzner, “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes,” in <i>Proceedings of the International Conference on Architecture of Computing Systems (ARCS)</i>, 2018, vol. 10793, pp. 73–84.","apa":"Lösch, A., Wiens, A., &#38; Platzner, M. (2018). Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes. In <i>Proceedings of the International Conference on Architecture of Computing Systems (ARCS)</i> (Vol. 10793, pp. 73–84). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-77610-1_6\">https://doi.org/10.1007/978-3-319-77610-1_6</a>","bibtex":"@inproceedings{Lösch_Wiens_Platzner_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes}, volume={10793}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-77610-1_6\">10.1007/978-3-319-77610-1_6</a>}, booktitle={Proceedings of the International Conference on Architecture of Computing Systems (ARCS)}, publisher={Springer International Publishing}, author={Lösch, Achim and Wiens, Alex and Platzner, Marco}, year={2018}, pages={73–84}, collection={Lecture Notes in Computer Science} }","mla":"Lösch, Achim, et al. “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes.” <i>Proceedings of the International Conference on Architecture of Computing Systems (ARCS)</i>, vol. 10793, Springer International Publishing, 2018, pp. 73–84, doi:<a href=\"https://doi.org/10.1007/978-3-319-77610-1_6\">10.1007/978-3-319-77610-1_6</a>.","short":"A. Lösch, A. Wiens, M. Platzner, in: Proceedings of the International Conference on Architecture of Computing Systems (ARCS), Springer International Publishing, Cham, 2018, pp. 73–84."},"intvolume":"     10793","page":"73-84","place":"Cham","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319776095","9783319776101"]},"file_date_updated":"2018-06-26T13:58:28Z","series_title":"Lecture Notes in Computer Science","user_id":"477","department":[{"_id":"78"}],"project":[{"name":"SFB 901 - Subproject C2","_id":"14"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"1","name":"SFB 901"}],"_id":"3362","status":"public","type":"conference","title":"Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes","date_created":"2018-06-26T13:47:52Z","publisher":"Springer International Publishing","year":"2018","ddc":["040"],"file":[{"file_size":1114026,"access_level":"closed","file_id":"3363","file_name":"loesch2017_arcs.pdf","date_updated":"2018-06-26T13:58:28Z","creator":"aloesch","date_created":"2018-06-26T13:58:28Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"Profiling applications on a heterogeneous compute node is challenging since the way to retrieve data from the resources and interpret them varies between resource types and manufacturers. This holds especially true for measuring the energy consumption. In this paper we present Ampehre, a novel open source measurement framework that allows developers to gather comparable measurements from heterogeneous compute nodes, e.g., nodes comprising CPU, GPU, and FPGA. We explain the architecture of Ampehre and detail the measurement process on the example of energy measurements on CPU and GPU. To characterize the probing effect, we quantitatively analyze the trade-off between the accuracy of measurements and the CPU load imposed by Ampehre. Based on this analysis, we are able to specify reasonable combinations of sampling periods for the different resource types of a compute node.","lang":"eng"}],"publication":"Proceedings of the International Conference on Architecture of Computing Systems (ARCS)"},{"type":"conference","status":"public","_id":"3373","project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"78"}],"user_id":"3118","series_title":"Lecture Notes in Computer Science","file_date_updated":"2018-11-02T13:55:07Z","has_accepted_license":"1","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319788890","9783319788906"]},"publication_status":"published","intvolume":"     10824","page":"153-165","citation":{"apa":"Hansmeier, T., Platzner, M., &#38; Andrews, D. (2018). An FPGA/HMC-Based Accelerator for Resolution Proof Checking. In <i>ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications</i> (Vol. 10824, pp. 153–165). Santorini, Greece: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-78890-6_13\">https://doi.org/10.1007/978-3-319-78890-6_13</a>","mla":"Hansmeier, Tim, et al. “An FPGA/HMC-Based Accelerator for Resolution Proof Checking.” <i>ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications</i>, vol. 10824, Springer International Publishing, 2018, pp. 153–65, doi:<a href=\"https://doi.org/10.1007/978-3-319-78890-6_13\">10.1007/978-3-319-78890-6_13</a>.","bibtex":"@inproceedings{Hansmeier_Platzner_Andrews_2018, series={Lecture Notes in Computer Science}, title={An FPGA/HMC-Based Accelerator for Resolution Proof Checking}, volume={10824}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-78890-6_13\">10.1007/978-3-319-78890-6_13</a>}, booktitle={ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications}, publisher={Springer International Publishing}, author={Hansmeier, Tim and Platzner, Marco and Andrews, David}, year={2018}, pages={153–165}, collection={Lecture Notes in Computer Science} }","short":"T. Hansmeier, M. Platzner, D. Andrews, in: ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications, Springer International Publishing, 2018, pp. 153–165.","chicago":"Hansmeier, Tim, Marco Platzner, and David Andrews. “An FPGA/HMC-Based Accelerator for Resolution Proof Checking.” In <i>ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications</i>, 10824:153–65. Lecture Notes in Computer Science. Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-78890-6_13\">https://doi.org/10.1007/978-3-319-78890-6_13</a>.","ieee":"T. Hansmeier, M. Platzner, and D. Andrews, “An FPGA/HMC-Based Accelerator for Resolution Proof Checking,” in <i>ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications</i>, Santorini, Greece, 2018, vol. 10824, pp. 153–165.","ama":"Hansmeier T, Platzner M, Andrews D. An FPGA/HMC-Based Accelerator for Resolution Proof Checking. In: <i>ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications</i>. Vol 10824. Lecture Notes in Computer Science. Springer International Publishing; 2018:153-165. doi:<a href=\"https://doi.org/10.1007/978-3-319-78890-6_13\">10.1007/978-3-319-78890-6_13</a>"},"date_updated":"2022-01-06T06:59:13Z","volume":10824,"author":[{"orcid":"0000-0003-1377-3339","last_name":"Hansmeier","id":"49992","full_name":"Hansmeier, Tim","first_name":"Tim"},{"first_name":"Marco","full_name":"Platzner, Marco","id":"398","last_name":"Platzner"},{"last_name":"Andrews","full_name":"Andrews, David","first_name":"David"}],"doi":"10.1007/978-3-319-78890-6_13","conference":{"name":"ARC: International Symposium on Applied Reconfigurable Computing","start_date":"2018-05-02","end_date":"2018-05-04","location":"Santorini, Greece"},"publication":"ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications","abstract":[{"text":"Modern Boolean satisfiability solvers can emit proofs of unsatisfiability. There is substantial interest in being able to verify such proofs and also in using them for further computations. In this paper, we present an FPGA accelerator for checking resolution proofs, a popular proof format. Our accelerator exploits parallelism at the low level by implementing the basic resolution step in hardware, and at the high level by instantiating a number of parallel modules for proof checking. Since proof checking involves highly irregular memory accesses, we employ Hybrid Memory Cube technology for accelerator memory. The results show that while the accelerator is scalable and achieves speedups for all benchmark proofs, performance improvements are currently limited by the overhead of transitioning the proof into the accelerator memory.","lang":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-11-02T13:55:07Z","creator":"ups","date_updated":"2018-11-02T13:55:07Z","file_name":"AnFPGAHMC-BasedAcceleratorForR.pdf","access_level":"closed","file_id":"5257","file_size":612367}],"ddc":["000"],"language":[{"iso":"eng"}],"year":"2018","publisher":"Springer International Publishing","date_created":"2018-06-27T09:30:24Z","title":"An FPGA/HMC-Based Accelerator for Resolution Proof Checking"},{"publication_identifier":{"isbn":["9783319929699","9783319929705"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","page":"105-120","citation":{"ieee":"G. Schellhorn, M. Wedel, O. Travkin, J. König, and H. Wehrheim, “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity,” in <i>Software Engineering and Formal Methods</i>, Cham: Springer International Publishing, 2018, pp. 105–120.","chicago":"Schellhorn, Gerhard, Monika Wedel, Oleg Travkin, Jürgen König, and Heike Wehrheim. “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity.” In <i>Software Engineering and Formal Methods</i>, 105–20. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">https://doi.org/10.1007/978-3-319-92970-5_7</a>.","ama":"Schellhorn G, Wedel M, Travkin O, König J, Wehrheim H. FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity. In: <i>Software Engineering and Formal Methods</i>. Cham: Springer International Publishing; 2018:105-120. doi:<a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">10.1007/978-3-319-92970-5_7</a>","short":"G. Schellhorn, M. Wedel, O. Travkin, J. König, H. Wehrheim, in: Software Engineering and Formal Methods, Springer International Publishing, Cham, 2018, pp. 105–120.","mla":"Schellhorn, Gerhard, et al. “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity.” <i>Software Engineering and Formal Methods</i>, Springer International Publishing, 2018, pp. 105–20, doi:<a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">10.1007/978-3-319-92970-5_7</a>.","bibtex":"@inbook{Schellhorn_Wedel_Travkin_König_Wehrheim_2018, place={Cham}, title={FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">10.1007/978-3-319-92970-5_7</a>}, booktitle={Software Engineering and Formal Methods}, publisher={Springer International Publishing}, author={Schellhorn, Gerhard and Wedel, Monika and Travkin, Oleg and König, Jürgen and Wehrheim, Heike}, year={2018}, pages={105–120} }","apa":"Schellhorn, G., Wedel, M., Travkin, O., König, J., &#38; Wehrheim, H. (2018). FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity. In <i>Software Engineering and Formal Methods</i> (pp. 105–120). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-92970-5_7\">https://doi.org/10.1007/978-3-319-92970-5_7</a>"},"place":"Cham","year":"2018","date_created":"2018-07-11T06:19:58Z","author":[{"full_name":"Schellhorn, Gerhard","last_name":"Schellhorn","first_name":"Gerhard"},{"last_name":"Wedel","full_name":"Wedel, Monika","first_name":"Monika"},{"last_name":"Travkin","full_name":"Travkin, Oleg","first_name":"Oleg"},{"first_name":"Jürgen","last_name":"König","id":"22358","full_name":"König, Jürgen"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_updated":"2022-01-06T06:59:22Z","publisher":"Springer International Publishing","doi":"10.1007/978-3-319-92970-5_7","title":"FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity","publication":"Software Engineering and Formal Methods","type":"book_chapter","status":"public","department":[{"_id":"77"}],"user_id":"29719","_id":"3536","project":[{"_id":"78","name":"Validation of Software Transactional Memory"}]},{"type":"conference","status":"public","department":[{"_id":"77"}],"user_id":"477","_id":"5774","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"file_date_updated":"2018-11-26T15:11:32Z","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030025076","9783030025083"]},"has_accepted_license":"1","publication_status":"published","page":"435-454","citation":{"ama":"Töws M, Wehrheim H. Information Flow Certificates. In: <i>Theoretical Aspects of Computing – ICTAC 2018</i>. Cham: Springer International Publishing; 2018:435-454. doi:<a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">10.1007/978-3-030-02508-3_23</a>","ieee":"M. Töws and H. Wehrheim, “Information Flow Certificates,” in <i>Theoretical Aspects of Computing – ICTAC 2018</i>, 2018, pp. 435–454.","chicago":"Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” In <i>Theoretical Aspects of Computing – ICTAC 2018</i>, 435–54. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">https://doi.org/10.1007/978-3-030-02508-3_23</a>.","short":"M. Töws, H. Wehrheim, in: Theoretical Aspects of Computing – ICTAC 2018, Springer International Publishing, Cham, 2018, pp. 435–454.","bibtex":"@inproceedings{Töws_Wehrheim_2018, place={Cham}, title={Information Flow Certificates}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">10.1007/978-3-030-02508-3_23</a>}, booktitle={Theoretical Aspects of Computing – ICTAC 2018}, publisher={Springer International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2018}, pages={435–454} }","mla":"Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” <i>Theoretical Aspects of Computing – ICTAC 2018</i>, Springer International Publishing, 2018, pp. 435–54, doi:<a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">10.1007/978-3-030-02508-3_23</a>.","apa":"Töws, M., &#38; Wehrheim, H. (2018). Information Flow Certificates. In <i>Theoretical Aspects of Computing – ICTAC 2018</i> (pp. 435–454). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-02508-3_23\">https://doi.org/10.1007/978-3-030-02508-3_23</a>"},"place":"Cham","author":[{"last_name":"Töws","id":"11315","full_name":"Töws, Manuel","first_name":"Manuel"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_updated":"2022-01-06T07:02:40Z","doi":"10.1007/978-3-030-02508-3_23","publication":"Theoretical Aspects of Computing – ICTAC 2018","file":[{"file_size":518016,"access_level":"closed","file_id":"5837","file_name":"Töws-Wehrheim2018_Chapter_InformationFlowCertificates.pdf","date_updated":"2018-11-26T15:11:32Z","creator":"mtoews","date_created":"2018-11-26T15:11:32Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Information flow analysis investigates the flow of data in applications, checking in particular for flows from private sources to public sinks. Flow- and path-sensitive analyses are, however, often too costly to be performed every time a security-critical application is run. In this paper, we propose a variant of proof carrying code for information flow security. To this end, we develop information flow (IF) certificates which get attached to programs as well as a method for IF certificate validation. We prove soundness of our technique, i.e., show it to be tamper-free. The technique is implemented within the program analysis tool CPAchecker. Our experiments confirm that the use of certificates pays off for costly analysis runs."}],"language":[{"iso":"eng"}],"ddc":["000"],"year":"2018","date_created":"2018-11-21T09:51:37Z","publisher":"Springer International Publishing","title":"Information Flow Certificates"},{"year":"2018","title":"Assist Users to Straightaway Suggest and Describe Experienced Problems","date_created":"2018-12-18T10:37:41Z","publisher":"Springer International Publishing","publication":"Design, User Experience, and Usability: Theory and Practice","language":[{"iso":"eng"}],"citation":{"ieee":"B. Senft, H. G. Fischer, S. Oberthür, and N. Patkar, “Assist Users to Straightaway Suggest and Describe Experienced Problems,” in <i>Design, User Experience, and Usability: Theory and Practice</i>, vol. 10918, Cham: Springer International Publishing, 2018, pp. 758–770.","chicago":"Senft, Björn, Holger Gerhard Fischer, Simon Oberthür, and Nitish Patkar. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” In <i>Design, User Experience, and Usability: Theory and Practice</i>, 10918:758–70. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">https://doi.org/10.1007/978-3-319-91797-9_52</a>.","ama":"Senft B, Fischer HG, Oberthür S, Patkar N. Assist Users to Straightaway Suggest and Describe Experienced Problems. In: <i>Design, User Experience, and Usability: Theory and Practice</i>. Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:758-770. doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">10.1007/978-3-319-91797-9_52</a>","apa":"Senft, B., Fischer, H. G., Oberthür, S., &#38; Patkar, N. (2018). Assist Users to Straightaway Suggest and Describe Experienced Problems. In <i>Design, User Experience, and Usability: Theory and Practice</i> (Vol. 10918, pp. 758–770). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">https://doi.org/10.1007/978-3-319-91797-9_52</a>","mla":"Senft, Björn, et al. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” <i>Design, User Experience, and Usability: Theory and Practice</i>, vol. 10918, Springer International Publishing, 2018, pp. 758–70, doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">10.1007/978-3-319-91797-9_52</a>.","short":"B. Senft, H.G. Fischer, S. Oberthür, N. Patkar, in: Design, User Experience, and Usability: Theory and Practice, Springer International Publishing, Cham, 2018, pp. 758–770.","bibtex":"@inbook{Senft_Fischer_Oberthür_Patkar_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={Assist Users to Straightaway Suggest and Describe Experienced Problems}, volume={10918}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-91797-9_52\">10.1007/978-3-319-91797-9_52</a>}, booktitle={Design, User Experience, and Usability: Theory and Practice}, publisher={Springer International Publishing}, author={Senft, Björn and Fischer, Holger Gerhard and Oberthür, Simon and Patkar, Nitish}, year={2018}, pages={758–770}, collection={Lecture Notes in Computer Science} }"},"page":"758-770","intvolume":"     10918","place":"Cham","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319917962","9783319917979"]},"doi":"10.1007/978-3-319-91797-9_52","conference":{"name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018","start_date":"2018-07-15","end_date":"2018-07-20","location":"Las Vegas, USA"},"author":[{"id":"9109","full_name":"Senft, Björn","last_name":"Senft","first_name":"Björn"},{"full_name":"Fischer, Holger Gerhard","id":"30457","last_name":"Fischer","first_name":"Holger Gerhard"},{"first_name":"Simon","id":"383","full_name":"Oberthür, Simon","last_name":"Oberthür"},{"first_name":"Nitish","full_name":"Patkar, Nitish","last_name":"Patkar"}],"volume":10918,"date_updated":"2022-01-06T07:02:58Z","status":"public","type":"book_chapter","series_title":"Lecture Notes in Computer Science","user_id":"30457","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"_id":"6253"},{"type":"book_chapter","status":"public","editor":[{"first_name":"Aaron","full_name":"Marcus, Aaron","last_name":"Marcus"},{"first_name":"Wentao","last_name":"Wang","full_name":"Wang, Wentao"}],"user_id":"30457","series_title":"Lecture Notes in Computer Science","department":[{"_id":"66"},{"_id":"534"},{"_id":"221"}],"_id":"6254","publication_status":"published","publication_identifier":{"isbn":["9783319917962","9783319917979"],"issn":["0302-9743","1611-3349"]},"citation":{"apa":"Fischer, H. G., Senft, B., Rittmeier, F., &#38; Sauer, S. (2018). A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In A. Marcus &#38; W. Wang (Eds.), <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i> (Vol. 10918, pp. 711–724). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">https://doi.org/10.1007/978-3-319-91797-9_49</a>","short":"H.G. Fischer, B. Senft, F. Rittmeier, S. Sauer, in: A. Marcus, W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), Springer International Publishing, Cham, 2018, pp. 711–724.","bibtex":"@inbook{Fischer_Senft_Rittmeier_Sauer_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems}, volume={10918}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">10.1007/978-3-319-91797-9_49</a>}, booktitle={Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn and Rittmeier, Florian and Sauer, Stefan}, editor={Marcus, Aaron and Wang, WentaoEditors}, year={2018}, pages={711–724}, collection={Lecture Notes in Computer Science} }","mla":"Fischer, Holger Gerhard, et al. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>, edited by Aaron Marcus and Wentao Wang, vol. 10918, Springer International Publishing, 2018, pp. 711–24, doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">10.1007/978-3-319-91797-9_49</a>.","ama":"Fischer HG, Senft B, Rittmeier F, Sauer S. A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In: Marcus A, Wang W, eds. <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>. Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:711-724. doi:<a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">10.1007/978-3-319-91797-9_49</a>","ieee":"H. G. Fischer, B. Senft, F. Rittmeier, and S. Sauer, “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems,” in <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>, vol. 10918, A. Marcus and W. Wang, Eds. Cham: Springer International Publishing, 2018, pp. 711–724.","chicago":"Fischer, Holger Gerhard, Björn Senft, Florian Rittmeier, and Stefan Sauer. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” In <i>Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)</i>, edited by Aaron Marcus and Wentao Wang, 10918:711–24. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-319-91797-9_49\">https://doi.org/10.1007/978-3-319-91797-9_49</a>."},"intvolume":"     10918","page":"711-724","place":"Cham","author":[{"first_name":"Holger Gerhard","last_name":"Fischer","id":"30457","full_name":"Fischer, Holger Gerhard"},{"id":"9109","full_name":"Senft, Björn","last_name":"Senft","first_name":"Björn"},{"id":"5281","full_name":"Rittmeier, Florian","last_name":"Rittmeier","first_name":"Florian"},{"first_name":"Stefan","id":"447","full_name":"Sauer, Stefan","last_name":"Sauer"}],"volume":10918,"date_updated":"2022-01-06T07:02:58Z","doi":"10.1007/978-3-319-91797-9_49","conference":{"name":"International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018","start_date":"2018-07-15","end_date":"2018-07-20","location":"Las Vegas, USA"},"publication":"Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)","language":[{"iso":"eng"}],"year":"2018","date_created":"2018-12-18T10:42:39Z","publisher":"Springer International Publishing","title":"A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems"},{"language":[{"iso":"eng"}],"ddc":["000"],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":458972,"file_name":"Schäfer-Hüllermeier2018_Chapter_Preference-BasedReinforcementL.pdf","access_level":"closed","file_id":"6623","date_updated":"2019-01-11T11:03:50Z","creator":"ups","date_created":"2019-01-11T11:03:50Z"}],"publication":"Discovery Science","title":"Preference-Based Reinforcement Learning Using Dyad Ranking","date_created":"2018-12-20T15:52:03Z","publisher":"Springer International Publishing","year":"2018","file_date_updated":"2019-01-11T11:03:50Z","department":[{"_id":"355"}],"user_id":"49109","_id":"6423","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"status":"public","type":"book_chapter","doi":"10.1007/978-3-030-01771-2_11","author":[{"first_name":"Dirk","last_name":"Schäfer","full_name":"Schäfer, Dirk"},{"id":"48129","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","first_name":"Eyke"}],"date_updated":"2022-01-06T07:03:04Z","page":"161-175","citation":{"apa":"Schäfer, D., &#38; Hüllermeier, E. (2018). Preference-Based Reinforcement Learning Using Dyad Ranking. In <i>Discovery Science</i> (pp. 161–175). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">https://doi.org/10.1007/978-3-030-01771-2_11</a>","short":"D. Schäfer, E. Hüllermeier, in: Discovery Science, Springer International Publishing, Cham, 2018, pp. 161–175.","bibtex":"@inbook{Schäfer_Hüllermeier_2018, place={Cham}, title={Preference-Based Reinforcement Learning Using Dyad Ranking}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">10.1007/978-3-030-01771-2_11</a>}, booktitle={Discovery Science}, publisher={Springer International Publishing}, author={Schäfer, Dirk and Hüllermeier, Eyke}, year={2018}, pages={161–175} }","mla":"Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” <i>Discovery Science</i>, Springer International Publishing, 2018, pp. 161–75, doi:<a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">10.1007/978-3-030-01771-2_11</a>.","ama":"Schäfer D, Hüllermeier E. Preference-Based Reinforcement Learning Using Dyad Ranking. In: <i>Discovery Science</i>. Cham: Springer International Publishing; 2018:161-175. doi:<a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">10.1007/978-3-030-01771-2_11</a>","ieee":"D. Schäfer and E. Hüllermeier, “Preference-Based Reinforcement Learning Using Dyad Ranking,” in <i>Discovery Science</i>, Cham: Springer International Publishing, 2018, pp. 161–175.","chicago":"Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” In <i>Discovery Science</i>, 161–75. Cham: Springer International Publishing, 2018. <a href=\"https://doi.org/10.1007/978-3-030-01771-2_11\">https://doi.org/10.1007/978-3-030-01771-2_11</a>."},"place":"Cham","publication_identifier":{"isbn":["9783030017705","9783030017712"],"issn":["0302-9743","1611-3349"]},"has_accepted_license":"1","publication_status":"published"},{"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319125671","9783319125688"]},"citation":{"ama":"Feldkord B, Malatyali M, Meyer auf der Heide F. A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In: <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>. Cham; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">10.1007/978-3-319-98355-4_18</a>","ieee":"B. Feldkord, M. Malatyali, and F. Meyer auf der Heide, “A Dynamic Distributed Data Structure for Top-k and k-Select Queries,” in <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>, Cham, 2018.","chicago":"Feldkord, Björn, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” In <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>. Cham, 2018. <a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">https://doi.org/10.1007/978-3-319-98355-4_18</a>.","short":"B. Feldkord, M. Malatyali, F. Meyer auf der Heide, in: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Cham, 2018.","bibtex":"@inbook{Feldkord_Malatyali_Meyer auf der Heide_2018, place={Cham}, title={A Dynamic Distributed Data Structure for Top-k and k-Select Queries}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">10.1007/978-3-319-98355-4_18</a>}, booktitle={Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications}, author={Feldkord, Björn and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}, year={2018} }","mla":"Feldkord, Björn, et al. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">10.1007/978-3-319-98355-4_18</a>.","apa":"Feldkord, B., Malatyali, M., &#38; Meyer auf der Heide, F. (2018). A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In <i>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-98355-4_18\">https://doi.org/10.1007/978-3-319-98355-4_18</a>"},"place":"Cham","year":"2018","author":[{"first_name":"Björn","full_name":"Feldkord, Björn","id":"22704","last_name":"Feldkord"},{"first_name":"Manuel","last_name":"Malatyali","full_name":"Malatyali, Manuel"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_created":"2020-04-03T07:04:59Z","date_updated":"2022-01-06T06:52:50Z","doi":"10.1007/978-3-319-98355-4_18","title":"A Dynamic Distributed Data Structure for Top-k and k-Select Queries","type":"book_chapter","publication":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","status":"public","user_id":"15415","department":[{"_id":"63"}],"_id":"16392","language":[{"iso":"eng"}]},{"place":"Cham","year":"2017","citation":{"bibtex":"@inproceedings{Khaluf_Markarian_Simoens_Reina_2017, place={Cham}, title={Scheduling Access to Shared Space in Multi-robot Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>}, booktitle={International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)}, author={Khaluf, Yara and Markarian, Christine and Simoens, Pieter and Reina, Andreagiovanni}, year={2017} }","short":"Y. Khaluf, C. Markarian, P. Simoens, A. Reina, in: International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017), Cham, 2017.","mla":"Khaluf, Yara, et al. “Scheduling Access to Shared Space in Multi-Robot Systems.” <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>, 2017, doi:<a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>.","apa":"Khaluf, Y., Markarian, C., Simoens, P., &#38; Reina, A. (2017). Scheduling Access to Shared Space in Multi-robot Systems. <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>. <a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">https://doi.org/10.1007/978-3-319-59930-4_12</a>","chicago":"Khaluf, Yara, Christine Markarian, Pieter Simoens, and Andreagiovanni Reina. “Scheduling Access to Shared Space in Multi-Robot Systems.” In <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">https://doi.org/10.1007/978-3-319-59930-4_12</a>.","ieee":"Y. Khaluf, C. Markarian, P. Simoens, and A. Reina, “Scheduling Access to Shared Space in Multi-robot Systems,” 2017, doi: <a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>.","ama":"Khaluf Y, Markarian C, Simoens P, Reina A. Scheduling Access to Shared Space in Multi-robot Systems. In: <i>International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1007/978-3-319-59930-4_12\">10.1007/978-3-319-59930-4_12</a>"},"publication_identifier":{"issn":["0302-9743","1611-3349"]},"publication_status":"published","title":"Scheduling Access to Shared Space in Multi-robot Systems","doi":"10.1007/978-3-319-59930-4_12","date_updated":"2022-01-06T06:56:19Z","author":[{"first_name":"Yara","last_name":"Khaluf","full_name":"Khaluf, Yara"},{"full_name":"Markarian, Christine","last_name":"Markarian","first_name":"Christine"},{"first_name":"Pieter","last_name":"Simoens","full_name":"Simoens, Pieter"},{"first_name":"Andreagiovanni","full_name":"Reina, Andreagiovanni","last_name":"Reina"}],"date_created":"2021-09-14T12:41:58Z","abstract":[{"text":"Through this study, we introduce the idea of applying scheduling techniques to allocate spatial resources that are shared among multiple robots moving in a static environment and having temporal constraints on the arrival time to destinations. To illustrate this idea, we present an exemplified algorithm that plans and assigns a motion path to each robot. The considered problem is particularly challenging because: (i) the robots share the same environment and thus the planner must take into account overlapping paths which cannot happen at the same time; (ii) there are time deadlines thus the planner must deal with temporal constraints; (iii) new requests arrive without a priori knowledge thus the planner must be able to add new paths online and adjust old plans; (iv) the robot motion is subject to noise thus the planner must be reactive to adapt to online changes. We showcase the functioning of the proposed algorithm through a set of agent-based simulations.","lang":"eng"}],"status":"public","publication":"International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)","type":"conference","language":[{"iso":"eng"}],"_id":"24398","department":[{"_id":"63"}],"user_id":"15415"},{"title":"Subtleties in Security Definitions for Predicate Encryption with Public Index","publisher":"Springer International Publishing","date_created":"2018-06-04T12:17:48Z","year":"2017","ddc":["000"],"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T14:52:10Z","date_created":"2018-11-02T14:52:10Z","creator":"ups","file_size":463904,"file_name":"SubtletiesInSecurityDefinition.pdf","file_id":"5286","access_level":"closed"}],"publication":"Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)","main_file_link":[{"url":"https://eprint.iacr.org/2017/453.pdf","open_access":"1"}],"doi":"10.1007/978-3-319-72453-9_35","date_updated":"2022-01-06T06:58:49Z","oa":"1","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Gennadij","last_name":"Liske","full_name":"Liske, Gennadij"}],"volume":10693,"place":"Cham","citation":{"bibtex":"@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }","short":"J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.","mla":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>.","apa":"Blömer, J., &#38; Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>","chicago":"Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">https://doi.org/10.1007/978-3-319-72453-9_35</a>.","ieee":"J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2017, vol. 10693, pp. 438–453.","ama":"Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: <i>Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:<a href=\"https://doi.org/10.1007/978-3-319-72453-9_35\">10.1007/978-3-319-72453-9_35</a>"},"intvolume":"     10693","page":"438-453","publication_status":"published","publication_identifier":{"isbn":["9783319724522","9783319724539"],"issn":["0302-9743","1611-3349"]},"has_accepted_license":"1","file_date_updated":"2018-11-02T14:52:10Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"2967","user_id":"477","series_title":"Lecture Notes in Computer Science","department":[{"_id":"64"}],"status":"public","type":"conference"}]
