[{"status":"public","type":"journal_article","extern":"1","user_id":"158","department":[{"_id":"622"}],"_id":"35571","citation":{"apa":"Schulze Darup, M., Book, G., Quevedo, D. E., &#38; Nagahara, M. (2021). Fast Hands-Off Control Using ADMM Real-Time Iterations. <i>IEEE Transactions on Automatic Control</i>, <i>67</i>(10), 5416–5423. <a href=\"https://doi.org/10.1109/tac.2021.3121255\">https://doi.org/10.1109/tac.2021.3121255</a>","bibtex":"@article{Schulze Darup_Book_Quevedo_Nagahara_2021, title={Fast Hands-Off Control Using ADMM Real-Time Iterations}, volume={67}, DOI={<a href=\"https://doi.org/10.1109/tac.2021.3121255\">10.1109/tac.2021.3121255</a>}, number={10}, journal={IEEE Transactions on Automatic Control}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Schulze Darup, Moritz and Book, Gerrit and Quevedo, Daniel E. and Nagahara, Masaaki}, year={2021}, pages={5416–5423} }","mla":"Schulze Darup, Moritz, et al. “Fast Hands-Off Control Using ADMM Real-Time Iterations.” <i>IEEE Transactions on Automatic Control</i>, vol. 67, no. 10, Institute of Electrical and Electronics Engineers (IEEE), 2021, pp. 5416–23, doi:<a href=\"https://doi.org/10.1109/tac.2021.3121255\">10.1109/tac.2021.3121255</a>.","short":"M. Schulze Darup, G. Book, D.E. Quevedo, M. Nagahara, IEEE Transactions on Automatic Control 67 (2021) 5416–5423.","chicago":"Schulze Darup, Moritz, Gerrit Book, Daniel E. Quevedo, and Masaaki Nagahara. “Fast Hands-Off Control Using ADMM Real-Time Iterations.” <i>IEEE Transactions on Automatic Control</i> 67, no. 10 (2021): 5416–23. <a href=\"https://doi.org/10.1109/tac.2021.3121255\">https://doi.org/10.1109/tac.2021.3121255</a>.","ieee":"M. Schulze Darup, G. Book, D. E. Quevedo, and M. Nagahara, “Fast Hands-Off Control Using ADMM Real-Time Iterations,” <i>IEEE Transactions on Automatic Control</i>, vol. 67, no. 10, pp. 5416–5423, 2021, doi: <a href=\"https://doi.org/10.1109/tac.2021.3121255\">10.1109/tac.2021.3121255</a>.","ama":"Schulze Darup M, Book G, Quevedo DE, Nagahara M. Fast Hands-Off Control Using ADMM Real-Time Iterations. <i>IEEE Transactions on Automatic Control</i>. 2021;67(10):5416-5423. doi:<a href=\"https://doi.org/10.1109/tac.2021.3121255\">10.1109/tac.2021.3121255</a>"},"intvolume":"        67","page":"5416-5423","publication_status":"published","publication_identifier":{"issn":["0018-9286","1558-2523","2334-3303"]},"doi":"10.1109/tac.2021.3121255","author":[{"first_name":"Moritz","last_name":"Schulze Darup","full_name":"Schulze Darup, Moritz"},{"full_name":"Book, Gerrit","last_name":"Book","first_name":"Gerrit"},{"first_name":"Daniel E.","full_name":"Quevedo, Daniel E.","last_name":"Quevedo"},{"last_name":"Nagahara","full_name":"Nagahara, Masaaki","first_name":"Masaaki"}],"volume":67,"date_updated":"2023-01-09T16:43:33Z","publication":"IEEE Transactions on Automatic Control","language":[{"iso":"eng"}],"keyword":["Electrical and Electronic Engineering","Computer Science Applications","Control and Systems Engineering"],"year":"2021","issue":"10","title":"Fast Hands-Off Control Using ADMM Real-Time Iterations","date_created":"2023-01-09T16:30:33Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)"},{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_created":"2023-01-09T16:31:10Z","title":"On the Stability of Linear Dynamic Controllers With Integer Coefficients","issue":"10","year":"2021","keyword":["Electrical and Electronic Engineering","Computer Science Applications","Control and Systems Engineering"],"language":[{"iso":"eng"}],"publication":"IEEE Transactions on Automatic Control","date_updated":"2023-01-09T16:43:28Z","volume":67,"author":[{"full_name":"Schluter, Nils","last_name":"Schluter","first_name":"Nils"},{"first_name":"Moritz Schulze","full_name":"Darup, Moritz Schulze","last_name":"Darup"}],"doi":"10.1109/tac.2021.3131126","publication_identifier":{"issn":["0018-9286","1558-2523","2334-3303"]},"publication_status":"published","page":"5610-5613","intvolume":"        67","citation":{"ieee":"N. Schluter and M. S. Darup, “On the Stability of Linear Dynamic Controllers With Integer Coefficients,” <i>IEEE Transactions on Automatic Control</i>, vol. 67, no. 10, pp. 5610–5613, 2021, doi: <a href=\"https://doi.org/10.1109/tac.2021.3131126\">10.1109/tac.2021.3131126</a>.","chicago":"Schluter, Nils, and Moritz Schulze Darup. “On the Stability of Linear Dynamic Controllers With Integer Coefficients.” <i>IEEE Transactions on Automatic Control</i> 67, no. 10 (2021): 5610–13. <a href=\"https://doi.org/10.1109/tac.2021.3131126\">https://doi.org/10.1109/tac.2021.3131126</a>.","ama":"Schluter N, Darup MS. On the Stability of Linear Dynamic Controllers With Integer Coefficients. <i>IEEE Transactions on Automatic Control</i>. 2021;67(10):5610-5613. doi:<a href=\"https://doi.org/10.1109/tac.2021.3131126\">10.1109/tac.2021.3131126</a>","apa":"Schluter, N., &#38; Darup, M. S. (2021). On the Stability of Linear Dynamic Controllers With Integer Coefficients. <i>IEEE Transactions on Automatic Control</i>, <i>67</i>(10), 5610–5613. <a href=\"https://doi.org/10.1109/tac.2021.3131126\">https://doi.org/10.1109/tac.2021.3131126</a>","bibtex":"@article{Schluter_Darup_2021, title={On the Stability of Linear Dynamic Controllers With Integer Coefficients}, volume={67}, DOI={<a href=\"https://doi.org/10.1109/tac.2021.3131126\">10.1109/tac.2021.3131126</a>}, number={10}, journal={IEEE Transactions on Automatic Control}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Schluter, Nils and Darup, Moritz Schulze}, year={2021}, pages={5610–5613} }","short":"N. Schluter, M.S. Darup, IEEE Transactions on Automatic Control 67 (2021) 5610–5613.","mla":"Schluter, Nils, and Moritz Schulze Darup. “On the Stability of Linear Dynamic Controllers With Integer Coefficients.” <i>IEEE Transactions on Automatic Control</i>, vol. 67, no. 10, Institute of Electrical and Electronics Engineers (IEEE), 2021, pp. 5610–13, doi:<a href=\"https://doi.org/10.1109/tac.2021.3131126\">10.1109/tac.2021.3131126</a>."},"_id":"35572","department":[{"_id":"622"}],"user_id":"158","extern":"1","type":"journal_article","status":"public"},{"keyword":["Control and Systems Engineering"],"language":[{"iso":"eng"}],"publication":"IFAC-PapersOnLine","publisher":"Elsevier BV","date_created":"2023-01-09T16:18:22Z","title":"Encrypted MPC based on ADMM real-time iterations","issue":"2","year":"2021","_id":"35561","department":[{"_id":"622"}],"user_id":"158","extern":"1","type":"journal_article","status":"public","date_updated":"2023-01-09T16:43:38Z","volume":53,"author":[{"first_name":"Moritz Schulze","full_name":"Darup, Moritz Schulze","last_name":"Darup"}],"doi":"10.1016/j.ifacol.2020.12.1708","publication_identifier":{"issn":["2405-8963"]},"publication_status":"published","intvolume":"        53","page":"3508-3514","citation":{"short":"M.S. Darup, IFAC-PapersOnLine 53 (2021) 3508–3514.","bibtex":"@article{Darup_2021, title={Encrypted MPC based on ADMM real-time iterations}, volume={53}, DOI={<a href=\"https://doi.org/10.1016/j.ifacol.2020.12.1708\">10.1016/j.ifacol.2020.12.1708</a>}, number={2}, journal={IFAC-PapersOnLine}, publisher={Elsevier BV}, author={Darup, Moritz Schulze}, year={2021}, pages={3508–3514} }","mla":"Darup, Moritz Schulze. “Encrypted MPC Based on ADMM Real-Time Iterations.” <i>IFAC-PapersOnLine</i>, vol. 53, no. 2, Elsevier BV, 2021, pp. 3508–14, doi:<a href=\"https://doi.org/10.1016/j.ifacol.2020.12.1708\">10.1016/j.ifacol.2020.12.1708</a>.","apa":"Darup, M. S. (2021). Encrypted MPC based on ADMM real-time iterations. <i>IFAC-PapersOnLine</i>, <i>53</i>(2), 3508–3514. <a href=\"https://doi.org/10.1016/j.ifacol.2020.12.1708\">https://doi.org/10.1016/j.ifacol.2020.12.1708</a>","chicago":"Darup, Moritz Schulze. “Encrypted MPC Based on ADMM Real-Time Iterations.” <i>IFAC-PapersOnLine</i> 53, no. 2 (2021): 3508–14. <a href=\"https://doi.org/10.1016/j.ifacol.2020.12.1708\">https://doi.org/10.1016/j.ifacol.2020.12.1708</a>.","ieee":"M. S. Darup, “Encrypted MPC based on ADMM real-time iterations,” <i>IFAC-PapersOnLine</i>, vol. 53, no. 2, pp. 3508–3514, 2021, doi: <a href=\"https://doi.org/10.1016/j.ifacol.2020.12.1708\">10.1016/j.ifacol.2020.12.1708</a>.","ama":"Darup MS. Encrypted MPC based on ADMM real-time iterations. <i>IFAC-PapersOnLine</i>. 2021;53(2):3508-3514. doi:<a href=\"https://doi.org/10.1016/j.ifacol.2020.12.1708\">10.1016/j.ifacol.2020.12.1708</a>"}},{"file_date_updated":"2021-07-29T09:37:49Z","series_title":"IFAC-PapersOnLine","user_id":"15694","department":[{"_id":"636"}],"_id":"22894","status":"public","type":"conference","main_file_link":[{"open_access":"1","url":"https://www.sciencedirect.com/science/article/pii/S2405896321021236"}],"doi":"https://doi.org/10.1016/j.ifacol.2021.11.099","conference":{"location":"Berlin, Germany","end_date":"2021-10-13","start_date":"2021-10-11","name":"7th IFAC Workshop on Lagrangian and Hamiltonian Methods for Nonlinear Control, LHMNC 2021"},"author":[{"orcid":"0000-0002-5940-8057","last_name":"Offen","id":"85279","full_name":"Offen, Christian","first_name":"Christian"},{"first_name":"Sina","id":"16494","full_name":"Ober-Blöbaum, Sina","last_name":"Ober-Blöbaum"}],"volume":"54(19)","date_updated":"2023-11-29T10:19:41Z","oa":"1","citation":{"apa":"Offen, C., &#38; Ober-Blöbaum, S. (2021). <i>Bifurcation preserving discretisations of optimal control problems: Vol. 54(19)</i> (pp. 334–339). <a href=\"https://doi.org/10.1016/j.ifacol.2021.11.099\">https://doi.org/10.1016/j.ifacol.2021.11.099</a>","mla":"Offen, Christian, and Sina Ober-Blöbaum. <i>Bifurcation Preserving Discretisations of Optimal Control Problems</i>. 2021, pp. 334–39, doi:<a href=\"https://doi.org/10.1016/j.ifacol.2021.11.099\">https://doi.org/10.1016/j.ifacol.2021.11.099</a>.","bibtex":"@article{Offen_Ober-Blöbaum_2021, series={IFAC-PapersOnLine}, title={Bifurcation preserving discretisations of optimal control problems}, volume={54(19)}, DOI={<a href=\"https://doi.org/10.1016/j.ifacol.2021.11.099\">https://doi.org/10.1016/j.ifacol.2021.11.099</a>}, author={Offen, Christian and Ober-Blöbaum, Sina}, year={2021}, pages={334–339}, collection={IFAC-PapersOnLine} }","short":"C. Offen, S. Ober-Blöbaum, 54(19) (2021) 334–339.","ama":"Offen C, Ober-Blöbaum S. Bifurcation preserving discretisations of optimal control problems. 2021;54(19):334-339. doi:<a href=\"https://doi.org/10.1016/j.ifacol.2021.11.099\">https://doi.org/10.1016/j.ifacol.2021.11.099</a>","ieee":"C. Offen and S. Ober-Blöbaum, “Bifurcation preserving discretisations of optimal control problems,” vol. 54(19). pp. 334–339, 2021, doi: <a href=\"https://doi.org/10.1016/j.ifacol.2021.11.099\">https://doi.org/10.1016/j.ifacol.2021.11.099</a>.","chicago":"Offen, Christian, and Sina Ober-Blöbaum. “Bifurcation Preserving Discretisations of Optimal Control Problems.” IFAC-PapersOnLine, 2021. <a href=\"https://doi.org/10.1016/j.ifacol.2021.11.099\">https://doi.org/10.1016/j.ifacol.2021.11.099</a>."},"page":"334-339","related_material":{"link":[{"description":"GitHub/Zenodo","relation":"software","url":"https://doi.org/10.5281/zenodo.4562664"}]},"publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["2405-8963"]},"language":[{"iso":"eng"}],"ddc":["510"],"keyword":["optimal control","catastrophe theory","bifurcations","variational methods","symplectic integrators"],"external_id":{"arxiv":["2107.13853"]},"file":[{"relation":"main_file","content_type":"application/pdf","file_size":3125220,"file_name":"ifacconf.pdf","file_id":"22895","access_level":"open_access","date_updated":"2021-07-29T09:37:49Z","creator":"coffen","date_created":"2021-07-29T09:37:49Z"}],"abstract":[{"lang":"eng","text":"The first order optimality conditions of optimal control problems (OCPs) can\r\nbe regarded as boundary value problems for Hamiltonian systems. Variational or\r\nsymplectic discretisation methods are classically known for their excellent\r\nlong term behaviour. As boundary value problems are posed on intervals of\r\nfixed, moderate length, it is not immediately clear whether methods can profit\r\nfrom structure preservation in this context. When parameters are present,\r\nsolutions can undergo bifurcations, for instance, two solutions can merge and\r\nannihilate one another as parameters are varied. We will show that generic\r\nbifurcations of an OCP are preserved under discretisation when the OCP is\r\neither directly discretised to a discrete OCP (direct method) or translated\r\ninto a Hamiltonian boundary value problem using first order necessary\r\nconditions of optimality which is then solved using a symplectic integrator\r\n(indirect method). Moreover, certain bifurcations break when a non-symplectic\r\nscheme is used. The general phenomenon is illustrated on the example of a cut\r\nlocus of an ellipsoid."}],"title":"Bifurcation preserving discretisations of optimal control problems","date_created":"2021-07-29T09:38:32Z","year":"2021","quality_controlled":"1"},{"year":"2021","citation":{"apa":"Rehlaender, P., Unruh, R., Schafmeister, F., &#38; Böcker, J. (2021). Alternating Asymmetrical Phase-Shift Modulation for Full-Bridge Converters with Balanced Switching Losses to Reduce Thermal Imbalances. <i>2021 IEEE Applied Power Electronics Conference and Exposition (APEC)</i>. 2021 IEEE Applied Power Electronics Conference and Exposition (APEC), Phoenix, AZ, USA. <a href=\"https://doi.org/10.1109/apec42165.2021.9487104\">https://doi.org/10.1109/apec42165.2021.9487104</a>","short":"P. Rehlaender, R. Unruh, F. Schafmeister, J. Böcker, in: 2021 IEEE Applied Power Electronics Conference and Exposition (APEC), IEEE, 2021.","mla":"Rehlaender, Philipp, et al. “Alternating Asymmetrical Phase-Shift Modulation for Full-Bridge Converters with Balanced Switching Losses to Reduce Thermal Imbalances.” <i>2021 IEEE Applied Power Electronics Conference and Exposition (APEC)</i>, IEEE, 2021, doi:<a href=\"https://doi.org/10.1109/apec42165.2021.9487104\">10.1109/apec42165.2021.9487104</a>.","bibtex":"@inproceedings{Rehlaender_Unruh_Schafmeister_Böcker_2021, title={Alternating Asymmetrical Phase-Shift Modulation for Full-Bridge Converters with Balanced Switching Losses to Reduce Thermal Imbalances}, DOI={<a href=\"https://doi.org/10.1109/apec42165.2021.9487104\">10.1109/apec42165.2021.9487104</a>}, booktitle={2021 IEEE Applied Power Electronics Conference and Exposition (APEC)}, publisher={IEEE}, author={Rehlaender, Philipp and Unruh, Roland and Schafmeister, Frank and Böcker, Joachim}, year={2021} }","ieee":"P. Rehlaender, R. Unruh, F. Schafmeister, and J. Böcker, “Alternating Asymmetrical Phase-Shift Modulation for Full-Bridge Converters with Balanced Switching Losses to Reduce Thermal Imbalances,” presented at the 2021 IEEE Applied Power Electronics Conference and Exposition (APEC), Phoenix, AZ, USA, 2021, doi: <a href=\"https://doi.org/10.1109/apec42165.2021.9487104\">10.1109/apec42165.2021.9487104</a>.","chicago":"Rehlaender, Philipp, Roland Unruh, Frank Schafmeister, and Joachim Böcker. “Alternating Asymmetrical Phase-Shift Modulation for Full-Bridge Converters with Balanced Switching Losses to Reduce Thermal Imbalances.” In <i>2021 IEEE Applied Power Electronics Conference and Exposition (APEC)</i>. IEEE, 2021. <a href=\"https://doi.org/10.1109/apec42165.2021.9487104\">https://doi.org/10.1109/apec42165.2021.9487104</a>.","ama":"Rehlaender P, Unruh R, Schafmeister F, Böcker J. Alternating Asymmetrical Phase-Shift Modulation for Full-Bridge Converters with Balanced Switching Losses to Reduce Thermal Imbalances. In: <i>2021 IEEE Applied Power Electronics Conference and Exposition (APEC)</i>. IEEE; 2021. doi:<a href=\"https://doi.org/10.1109/apec42165.2021.9487104\">10.1109/apec42165.2021.9487104</a>"},"publication_status":"published","publication_identifier":{"isbn":["978-1-7281-8950-5"]},"title":"Alternating Asymmetrical Phase-Shift Modulation for Full-Bridge Converters with Balanced Switching Losses to Reduce Thermal Imbalances","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/9487104"}],"conference":{"name":"2021 IEEE Applied Power Electronics Conference and Exposition (APEC)","start_date":"2021-06-14","end_date":"2021-06-17","location":"Phoenix, AZ, USA"},"doi":"10.1109/apec42165.2021.9487104","date_updated":"2023-10-20T11:50:25Z","publisher":"IEEE","date_created":"2022-02-20T21:19:46Z","author":[{"first_name":"Philipp","full_name":"Rehlaender, Philipp","id":"69469","last_name":"Rehlaender"},{"id":"34289","full_name":"Unruh, Roland","last_name":"Unruh","first_name":"Roland"},{"first_name":"Frank","full_name":"Schafmeister, Frank","id":"71291","last_name":"Schafmeister"},{"id":"66","full_name":"Böcker, Joachim","last_name":"Böcker","orcid":"0000-0002-8480-7295","first_name":"Joachim"}],"abstract":[{"text":"Phase-shift modulated full bridge converters suffer from thermal imbalances of the inverter switches. The lagging leg switches are subject to larger commutation currents compared to those of the leading leg as the transformer current reduces in the freewheeling interval. Furthermore, after this interval, the energy in the series inductance may not be large enough to achieve zero-voltage switching (ZVS) for the leading leg. Both effects result in thermal imbalances. This paper analyzes the alternating-asymmetrical phase-shift modulation to achieve balanced conduction and switching losses for all four switches while showing that this modulation is easily implemented on standard DSPs. The modulation has been implemented to LLC converters where experimental measurement results proved its effectiveness for LLC converters by reducing the temperature deviation from 6.3 K to only 0.2 K such that the peak temperature is reduced from 95 °C to 92 °C. The paper also proves that the modulation can be utilized to improve the efficiency of LLC converters operated at very low gains while simultaneously reducing the junction temperature of all four switches compared to the conventional complementary modulation. Finally, EMI implications are analyzed, which show that the modulation may be beneficial for reducing the common-mode emissions around the operating frequency.","lang":"eng"}],"status":"public","type":"conference","publication":"2021 IEEE Applied Power Electronics Conference and Exposition (APEC)","keyword":["Phase-Shifted Full Bridge","Full-Bridge Converter","Phase-Shift Control","Phase-Shift Modulation","LLC Converter","Thermal Balancing"],"language":[{"iso":"eng"}],"_id":"29893","user_id":"34289","department":[{"_id":"34"},{"_id":"52"}]},{"status":"public","abstract":[{"text":"LLC resonant converters are typically unsuitable to be applied for wide voltage-transfer ratio applications. With a full-bridge inverter, however, they can be operated in a variety of different modulations. Most notably, by permanently turning on one MOSFET and turning off the other MOSFET of the same bridge leg, the LLC can be operated in half-bridge configuration reducing the gain by a factor of two. The resonant capacitor is hereby charged to an average voltage of half the input voltage. In this modulation, however, the switch that is permanently turned on is stressed by the complete resonant current while exhibiting no switching losses. This paper proves that the frequency-doubler modulation can better balance the losses among all MOSFETs and should be the preferred mode of operation favored over the conventional half-bridge modulation. This paper analyzes the beneficial loss distribution, proposes an on-the-fly morphing modulation and discusses potential operating strategies to further reduce the junction temperature. Furthermore, it is shown that this modulation can also be altered to achieve the asymmetrical LLC operation. Experimental measurement results show that the modulation results in a substantial decrease of the maximum MOSFET temperature and shows that the converter can be smoothly transitioned during operation from full-bridge modulation to the frequency-doubler half-bridge operation and back.","lang":"eng"}],"type":"conference","publication":"23rd European Conference on Power Electronics and Applications (EPE'21 ECCE Europe)","language":[{"iso":"eng"}],"keyword":["Resonant converter","High frequency power converter","Switched-mode power supply","Converter control","Control methods for electrical systems"],"user_id":"34289","department":[{"_id":"34"},{"_id":"52"}],"_id":"29899","citation":{"ieee":"P. Rehlaender, R. Unruh, L. Hankeln, F. Schafmeister, and J. Böcker, “Frequency-Doubler Modulation for Reduced Junction Temperatures for LLC Resonant Converters Operated in Half-Bridge Configuration,” presented at the 23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe), Ghent, Belgium, 2021, doi: <a href=\"https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674\">10.23919/EPE21ECCEEurope50061.2021.9570674</a>.","chicago":"Rehlaender, Philipp, Roland Unruh, Lars Hankeln, Frank Schafmeister, and Joachim Böcker. “Frequency-Doubler Modulation for Reduced Junction Temperatures for LLC Resonant Converters Operated in Half-Bridge Configuration.” In <i>23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe)</i>. IEEE, 2021. <a href=\"https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674\">https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674</a>.","ama":"Rehlaender P, Unruh R, Hankeln L, Schafmeister F, Böcker J. Frequency-Doubler Modulation for Reduced Junction Temperatures for LLC Resonant Converters Operated in Half-Bridge Configuration. In: <i>23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe)</i>. IEEE; 2021. doi:<a href=\"https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674\">10.23919/EPE21ECCEEurope50061.2021.9570674</a>","apa":"Rehlaender, P., Unruh, R., Hankeln, L., Schafmeister, F., &#38; Böcker, J. (2021). Frequency-Doubler Modulation for Reduced Junction Temperatures for LLC Resonant Converters Operated in Half-Bridge Configuration. <i>23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe)</i>. 23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe), Ghent, Belgium. <a href=\"https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674\">https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674</a>","mla":"Rehlaender, Philipp, et al. “Frequency-Doubler Modulation for Reduced Junction Temperatures for LLC Resonant Converters Operated in Half-Bridge Configuration.” <i>23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe)</i>, IEEE, 2021, doi:<a href=\"https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674\">10.23919/EPE21ECCEEurope50061.2021.9570674</a>.","short":"P. Rehlaender, R. Unruh, L. Hankeln, F. Schafmeister, J. Böcker, in: 23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe), IEEE, 2021.","bibtex":"@inproceedings{Rehlaender_Unruh_Hankeln_Schafmeister_Böcker_2021, title={Frequency-Doubler Modulation for Reduced Junction Temperatures for LLC Resonant Converters Operated in Half-Bridge Configuration}, DOI={<a href=\"https://doi.org/10.23919/EPE21ECCEEurope50061.2021.9570674\">10.23919/EPE21ECCEEurope50061.2021.9570674</a>}, booktitle={23rd European Conference on Power Electronics and Applications (EPE’21 ECCE Europe)}, publisher={IEEE}, author={Rehlaender, Philipp and Unruh, Roland and Hankeln, Lars and Schafmeister, Frank and Böcker, Joachim}, year={2021} }"},"year":"2021","publication_status":"published","publication_identifier":{"isbn":["978-9-0758-1537-5"]},"main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/9570674"}],"conference":{"location":"Ghent, Belgium","end_date":"2021-09-10","start_date":"2021-09-06","name":"23rd European Conference on Power Electronics and Applications (EPE'21 ECCE Europe)"},"doi":"10.23919/EPE21ECCEEurope50061.2021.9570674","title":"Frequency-Doubler Modulation for Reduced Junction Temperatures for LLC Resonant Converters Operated in Half-Bridge Configuration","author":[{"first_name":"Philipp","last_name":"Rehlaender","full_name":"Rehlaender, Philipp","id":"69469"},{"id":"34289","full_name":"Unruh, Roland","last_name":"Unruh","first_name":"Roland"},{"first_name":"Lars","last_name":"Hankeln","full_name":"Hankeln, Lars"},{"first_name":"Frank","id":"71291","full_name":"Schafmeister, Frank","last_name":"Schafmeister"},{"first_name":"Joachim","full_name":"Böcker, Joachim","id":"66","orcid":"0000-0002-8480-7295","last_name":"Böcker"}],"date_created":"2022-02-20T21:29:48Z","publisher":"IEEE","date_updated":"2023-02-09T11:01:11Z"},{"_id":"23465","user_id":"36287","department":[{"_id":"156"},{"_id":"153"},{"_id":"241"}],"type":"conference","status":"public","date_updated":"2023-05-02T08:27:48Z","oa":"1","author":[{"first_name":"Bahman","last_name":"Arian","id":"36287","full_name":"Arian, Bahman"},{"last_name":"Homberg","full_name":"Homberg, Werner","id":"233","first_name":"Werner"},{"first_name":"Markus","full_name":"Riepold, Markus","last_name":"Riepold"},{"last_name":"Trächtler","id":"552","full_name":"Trächtler, Ansgar","first_name":"Ansgar"},{"full_name":"Rozo Vasquez, Julian","last_name":"Rozo Vasquez","first_name":"Julian"},{"last_name":"Walther","full_name":"Walther, Frank","first_name":"Frank"}],"main_file_link":[{"url":"https://popups.uliege.be/esaform21/index.php?id=2759","open_access":"1"}],"conference":{"end_date":"2021-04-16","location":"Liège, Belgium","name":"24th International Conference on Material Forming - ESAFORM 2021","start_date":"2021-04-14"},"publication_status":"published","publication_identifier":{"eisbn":["978-2-87019-303-7"],"isbn":["978-2-87019-302-0"]},"place":"Liège","citation":{"apa":"Arian, B., Homberg, W., Riepold, M., Trächtler, A., Rozo Vasquez, J., &#38; Walther, F. (2021). <i>Forming of metastable austenitic stainless steel tubes with axially graded martensite content by flow-forming</i>. 24th International Conference on Material Forming - ESAFORM 2021, Liège, Belgium.","bibtex":"@inproceedings{Arian_Homberg_Riepold_Trächtler_Rozo Vasquez_Walther_2021, place={Liège}, title={Forming of metastable austenitic stainless steel tubes with axially graded martensite content by flow-forming}, publisher={ULiège Library}, author={Arian, Bahman and Homberg, Werner and Riepold, Markus and Trächtler, Ansgar and Rozo Vasquez, Julian and Walther, Frank}, year={2021} }","mla":"Arian, Bahman, et al. <i>Forming of Metastable Austenitic Stainless Steel Tubes with Axially Graded Martensite Content by Flow-Forming</i>. ULiège Library, 2021.","short":"B. Arian, W. Homberg, M. Riepold, A. Trächtler, J. Rozo Vasquez, F. Walther, in: ULiège Library, Liège, 2021.","ieee":"B. Arian, W. Homberg, M. Riepold, A. Trächtler, J. Rozo Vasquez, and F. Walther, “Forming of metastable austenitic stainless steel tubes with axially graded martensite content by flow-forming,” presented at the 24th International Conference on Material Forming - ESAFORM 2021, Liège, Belgium, 2021.","chicago":"Arian, Bahman, Werner Homberg, Markus Riepold, Ansgar Trächtler, Julian Rozo Vasquez, and Frank Walther. “Forming of Metastable Austenitic Stainless Steel Tubes with Axially Graded Martensite Content by Flow-Forming.” Liège: ULiège Library, 2021.","ama":"Arian B, Homberg W, Riepold M, Trächtler A, Rozo Vasquez J, Walther F. Forming of metastable austenitic stainless steel tubes with axially graded martensite content by flow-forming. In: ULiège Library; 2021."},"keyword":["Flow-forming","Spinning","Process Strategy","Martensite Content","Property Control","Micromagnetic Measurement","Metastable Austenitic Stainless Steel"],"language":[{"iso":"eng"}],"abstract":[{"text":"One of the main objectives of production engineering is to reproducibly manufacture (complex) defect-free parts. To achieve this, it is necessary to employ an appropriate process or tool design. While this will generally prove successful, it cannot, however, offset stochastic defects with local variations in material properties. Closed-loop process control represents a promising approach for a solution in this context. The state of the art involves using this approach to control geometric parameters such as a length. So far, no research or applications have been conducted with closed-loop control for microstructure and product properties. In the project on which this paper is based, the local martensite content of parts is to be adjusted in a highly precise and reproducible manner. The forming process employed is a special, property-controlled flow-forming process. A model-based controller is thus to generate corresponding correction values for the tool-path geometry and tool-path velocity on the basis of online martensite content measurements. For the controller model, it is planned to use a special process or microstructure (correlation) model. The planned paper not only describes the experimental setup but also presents results of initial experimental investigations for subsequent use in the closed-loop control of α’-martensite content during flow-forming.","lang":"eng"}],"publisher":"ULiège Library","date_created":"2021-08-23T13:00:35Z","title":"Forming of metastable austenitic stainless steel tubes with axially graded martensite content by flow-forming","quality_controlled":"1","year":"2021"},{"doi":"10.36001/phme.2021.v6i1.3042","conference":{"name":"PHM Society European Conference"},"main_file_link":[{"open_access":"1","url":"http://papers.phmsociety.org/index.php/phme/article/download/3042/1812"}],"volume":6,"author":[{"last_name":"Aimiyekagbon","full_name":"Aimiyekagbon, Osarenren Kennedy","id":"9557","first_name":"Osarenren Kennedy"},{"first_name":"Lars","last_name":"Muth","orcid":"0000-0002-2938-5616","full_name":"Muth, Lars","id":"77313"},{"first_name":"Meike Claudia","id":"43991","full_name":"Wohlleben, Meike Claudia","orcid":"0009-0009-9767-7168","last_name":"Wohlleben"},{"first_name":"Amelie","last_name":"Bender","full_name":"Bender, Amelie","id":"54290"},{"first_name":"Walter","last_name":"Sextro","id":"21220","full_name":"Sextro, Walter"}],"date_updated":"2023-09-22T09:13:01Z","oa":"1","intvolume":"         6","page":"527-536","citation":{"apa":"Aimiyekagbon, O. K., Muth, L., Wohlleben, M. C., Bender, A., &#38; Sextro, W. (2021). Rule-based Diagnostics of a Production Line. In P. Do, S. King, &#38; O. Fink (Eds.), <i>Proceedings of the European Conference of the PHM Society 2021</i> (Vol. 6, Issue 1, pp. 527–536). <a href=\"https://doi.org/10.36001/phme.2021.v6i1.3042\">https://doi.org/10.36001/phme.2021.v6i1.3042</a>","mla":"Aimiyekagbon, Osarenren Kennedy, et al. “Rule-Based Diagnostics of a Production Line.” <i>Proceedings of the European Conference of the PHM Society 2021</i>, edited by Phuc Do et al., vol. 6, no. 1, 2021, pp. 527–36, doi:<a href=\"https://doi.org/10.36001/phme.2021.v6i1.3042\">10.36001/phme.2021.v6i1.3042</a>.","short":"O.K. Aimiyekagbon, L. Muth, M.C. Wohlleben, A. Bender, W. Sextro, in: P. Do, S. King, O. Fink (Eds.), Proceedings of the European Conference of the PHM Society 2021, 2021, pp. 527–536.","bibtex":"@inproceedings{Aimiyekagbon_Muth_Wohlleben_Bender_Sextro_2021, title={Rule-based Diagnostics of a Production Line}, volume={6}, DOI={<a href=\"https://doi.org/10.36001/phme.2021.v6i1.3042\">10.36001/phme.2021.v6i1.3042</a>}, number={1}, booktitle={Proceedings of the European Conference of the PHM Society 2021}, author={Aimiyekagbon, Osarenren Kennedy and Muth, Lars and Wohlleben, Meike Claudia and Bender, Amelie and Sextro, Walter}, editor={Do, Phuc and King, Steve and Fink, Olga}, year={2021}, pages={527–536} }","chicago":"Aimiyekagbon, Osarenren Kennedy, Lars Muth, Meike Claudia Wohlleben, Amelie Bender, and Walter Sextro. “Rule-Based Diagnostics of a Production Line.” In <i>Proceedings of the European Conference of the PHM Society 2021</i>, edited by Phuc Do, Steve King, and Olga Fink, 6:527–36, 2021. <a href=\"https://doi.org/10.36001/phme.2021.v6i1.3042\">https://doi.org/10.36001/phme.2021.v6i1.3042</a>.","ieee":"O. K. Aimiyekagbon, L. Muth, M. C. Wohlleben, A. Bender, and W. Sextro, “Rule-based Diagnostics of a Production Line,” in <i>Proceedings of the European Conference of the PHM Society 2021</i>, 2021, vol. 6, no. 1, pp. 527–536, doi: <a href=\"https://doi.org/10.36001/phme.2021.v6i1.3042\">10.36001/phme.2021.v6i1.3042</a>.","ama":"Aimiyekagbon OK, Muth L, Wohlleben MC, Bender A, Sextro W. Rule-based Diagnostics of a Production Line. In: Do P, King S, Fink O, eds. <i>Proceedings of the European Conference of the PHM Society 2021</i>. Vol 6. ; 2021:527-536. doi:<a href=\"https://doi.org/10.36001/phme.2021.v6i1.3042\">10.36001/phme.2021.v6i1.3042</a>"},"publication_status":"published","department":[{"_id":"151"}],"user_id":"9557","_id":"27111","status":"public","editor":[{"full_name":"Do, Phuc","last_name":"Do","first_name":"Phuc"},{"first_name":"Steve","full_name":"King, Steve","last_name":"King"},{"first_name":"Olga","last_name":"Fink","full_name":"Fink, Olga"}],"type":"conference","title":"Rule-based Diagnostics of a Production Line","date_created":"2021-11-03T12:26:39Z","year":"2021","issue":"1","quality_controlled":"1","language":[{"iso":"eng"}],"keyword":["PHME 2021","Feature Selection Classification","Feature Selection Clustering","Interpretable Model","Transparent Model","Industry 4.0","Real-World Diagnostics","Quality Control","Predictive Maintenance"],"abstract":[{"text":"In the industry 4.0 era, there is a growing need to transform unstructured data acquired by a multitude of sources into information and subsequently into knowledge to improve the quality of manufactured products, to boost production, for predictive maintenance, etc. Data-driven approaches, such as machine learning techniques, are typically employed to model the underlying relationship from data. However, an increase in model accuracy with state-of-the-art methods, such as deep convolutional neural networks, results in less interpretability and transparency. Due to the ease of implementation, interpretation and transparency to both domain experts and non-experts, a rule-based method is proposed in this paper, for prognostics and health management (PHM) and specifically for diagnostics. The proposed method utilizes the most relevant sensor signals acquired via feature extraction and selection techniques and expert knowledge. As a case study, the presented method is evaluated on data from a real-world quality control set-up provided by the European prognostics and health management society (PHME) at the conference’s 2021 data challenge. With the proposed method, our team took the third place, capable of successfully diagnosing different fault modes, irrespective of varying conditions.","lang":"eng"}],"publication":"Proceedings of the European Conference of the PHM Society 2021"},{"doi":"10.1109/tie.2020.3018060","title":"Comparison of Gray-Box and Black-Box Two-Level Three-Phase Inverter Models for Electrical Drives","volume":68,"author":[{"last_name":"Stender","id":"41240","full_name":"Stender, Marius","first_name":"Marius"},{"full_name":"Wallscheid, Oliver","id":"11291","last_name":"Wallscheid","orcid":"https://orcid.org/0000-0001-9362-8777","first_name":"Oliver"},{"full_name":"Böcker, Joachim","id":"66","orcid":"0000-0002-8480-7295","last_name":"Böcker","first_name":"Joachim"}],"date_created":"2022-02-24T09:26:06Z","date_updated":"2022-02-24T09:26:45Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","intvolume":"        68","page":"8646-8656","citation":{"chicago":"Stender, Marius, Oliver Wallscheid, and Joachim Böcker. “Comparison of Gray-Box and Black-Box Two-Level Three-Phase Inverter Models for Electrical Drives.” <i>IEEE Transactions on Industrial Electronics</i> 68, no. 9 (2020): 8646–56. <a href=\"https://doi.org/10.1109/tie.2020.3018060\">https://doi.org/10.1109/tie.2020.3018060</a>.","ieee":"M. Stender, O. Wallscheid, and J. Böcker, “Comparison of Gray-Box and Black-Box Two-Level Three-Phase Inverter Models for Electrical Drives,” <i>IEEE Transactions on Industrial Electronics</i>, vol. 68, no. 9, pp. 8646–8656, 2020, doi: <a href=\"https://doi.org/10.1109/tie.2020.3018060\">10.1109/tie.2020.3018060</a>.","ama":"Stender M, Wallscheid O, Böcker J. Comparison of Gray-Box and Black-Box Two-Level Three-Phase Inverter Models for Electrical Drives. <i>IEEE Transactions on Industrial Electronics</i>. 2020;68(9):8646-8656. doi:<a href=\"https://doi.org/10.1109/tie.2020.3018060\">10.1109/tie.2020.3018060</a>","apa":"Stender, M., Wallscheid, O., &#38; Böcker, J. (2020). Comparison of Gray-Box and Black-Box Two-Level Three-Phase Inverter Models for Electrical Drives. <i>IEEE Transactions on Industrial Electronics</i>, <i>68</i>(9), 8646–8656. <a href=\"https://doi.org/10.1109/tie.2020.3018060\">https://doi.org/10.1109/tie.2020.3018060</a>","bibtex":"@article{Stender_Wallscheid_Böcker_2020, title={Comparison of Gray-Box and Black-Box Two-Level Three-Phase Inverter Models for Electrical Drives}, volume={68}, DOI={<a href=\"https://doi.org/10.1109/tie.2020.3018060\">10.1109/tie.2020.3018060</a>}, number={9}, journal={IEEE Transactions on Industrial Electronics}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Stender, Marius and Wallscheid, Oliver and Böcker, Joachim}, year={2020}, pages={8646–8656} }","mla":"Stender, Marius, et al. “Comparison of Gray-Box and Black-Box Two-Level Three-Phase Inverter Models for Electrical Drives.” <i>IEEE Transactions on Industrial Electronics</i>, vol. 68, no. 9, Institute of Electrical and Electronics Engineers (IEEE), 2020, pp. 8646–56, doi:<a href=\"https://doi.org/10.1109/tie.2020.3018060\">10.1109/tie.2020.3018060</a>.","short":"M. Stender, O. Wallscheid, J. Böcker, IEEE Transactions on Industrial Electronics 68 (2020) 8646–8656."},"year":"2020","issue":"9","publication_identifier":{"issn":["0278-0046","1557-9948"]},"publication_status":"published","language":[{"iso":"eng"}],"keyword":["Electrical and Electronic Engineering","Control and Systems Engineering"],"department":[{"_id":"52"}],"user_id":"41240","_id":"30033","status":"public","publication":"IEEE Transactions on Industrial Electronics","type":"journal_article"},{"title":"Encrypted polynomial control based on tailored two‐party computation","publisher":"Wiley","date_created":"2023-01-09T16:36:47Z","year":"2020","issue":"11","keyword":["Electrical and Electronic Engineering","Industrial and Manufacturing Engineering","Mechanical Engineering","Aerospace Engineering","Biomedical Engineering","General Chemical Engineering","Control and Systems Engineering"],"language":[{"iso":"eng"}],"publication":"International Journal of Robust and Nonlinear Control","doi":"10.1002/rnc.5003","date_updated":"2023-01-09T16:36:57Z","volume":30,"author":[{"first_name":"Moritz","last_name":"Schulze Darup","full_name":"Schulze Darup, Moritz"}],"page":"4168-4187","intvolume":"        30","citation":{"mla":"Schulze Darup, Moritz. “Encrypted Polynomial Control Based on Tailored Two‐party Computation.” <i>International Journal of Robust and Nonlinear Control</i>, vol. 30, no. 11, Wiley, 2020, pp. 4168–87, doi:<a href=\"https://doi.org/10.1002/rnc.5003\">10.1002/rnc.5003</a>.","short":"M. Schulze Darup, International Journal of Robust and Nonlinear Control 30 (2020) 4168–4187.","bibtex":"@article{Schulze Darup_2020, title={Encrypted polynomial control based on tailored two‐party computation}, volume={30}, DOI={<a href=\"https://doi.org/10.1002/rnc.5003\">10.1002/rnc.5003</a>}, number={11}, journal={International Journal of Robust and Nonlinear Control}, publisher={Wiley}, author={Schulze Darup, Moritz}, year={2020}, pages={4168–4187} }","apa":"Schulze Darup, M. (2020). Encrypted polynomial control based on tailored two‐party computation. <i>International Journal of Robust and Nonlinear Control</i>, <i>30</i>(11), 4168–4187. <a href=\"https://doi.org/10.1002/rnc.5003\">https://doi.org/10.1002/rnc.5003</a>","ama":"Schulze Darup M. Encrypted polynomial control based on tailored two‐party computation. <i>International Journal of Robust and Nonlinear Control</i>. 2020;30(11):4168-4187. doi:<a href=\"https://doi.org/10.1002/rnc.5003\">10.1002/rnc.5003</a>","ieee":"M. Schulze Darup, “Encrypted polynomial control based on tailored two‐party computation,” <i>International Journal of Robust and Nonlinear Control</i>, vol. 30, no. 11, pp. 4168–4187, 2020, doi: <a href=\"https://doi.org/10.1002/rnc.5003\">10.1002/rnc.5003</a>.","chicago":"Schulze Darup, Moritz. “Encrypted Polynomial Control Based on Tailored Two‐party Computation.” <i>International Journal of Robust and Nonlinear Control</i> 30, no. 11 (2020): 4168–87. <a href=\"https://doi.org/10.1002/rnc.5003\">https://doi.org/10.1002/rnc.5003</a>."},"publication_identifier":{"issn":["1049-8923","1099-1239"]},"publication_status":"published","_id":"35580","department":[{"_id":"622"}],"user_id":"158","status":"public","type":"journal_article"},{"publication":"International Journal of Robust and Nonlinear Control","type":"journal_article","status":"public","department":[{"_id":"57"}],"user_id":"158","_id":"35585","language":[{"iso":"eng"}],"keyword":["Electrical and Electronic Engineering","Industrial and Manufacturing Engineering","Mechanical Engineering","Aerospace Engineering","Biomedical Engineering","General Chemical Engineering","Control and Systems Engineering"],"issue":"11","publication_identifier":{"issn":["1049-8923","1099-1239"]},"publication_status":"published","page":"4205-4224","intvolume":"        30","citation":{"chicago":"Lu, Jingyi, Alex S. Leong, and Daniel E. Quevedo. “Optimal Event‐triggered Transmission Scheduling for Privacy‐preserving Wireless State Estimation.” <i>International Journal of Robust and Nonlinear Control</i> 30, no. 11 (2020): 4205–24. <a href=\"https://doi.org/10.1002/rnc.4910\">https://doi.org/10.1002/rnc.4910</a>.","ieee":"J. Lu, A. S. Leong, and D. E. Quevedo, “Optimal event‐triggered transmission scheduling for privacy‐preserving wireless state estimation,” <i>International Journal of Robust and Nonlinear Control</i>, vol. 30, no. 11, pp. 4205–4224, 2020, doi: <a href=\"https://doi.org/10.1002/rnc.4910\">10.1002/rnc.4910</a>.","ama":"Lu J, Leong AS, Quevedo DE. Optimal event‐triggered transmission scheduling for privacy‐preserving wireless state estimation. <i>International Journal of Robust and Nonlinear Control</i>. 2020;30(11):4205-4224. doi:<a href=\"https://doi.org/10.1002/rnc.4910\">10.1002/rnc.4910</a>","apa":"Lu, J., Leong, A. S., &#38; Quevedo, D. E. (2020). Optimal event‐triggered transmission scheduling for privacy‐preserving wireless state estimation. <i>International Journal of Robust and Nonlinear Control</i>, <i>30</i>(11), 4205–4224. <a href=\"https://doi.org/10.1002/rnc.4910\">https://doi.org/10.1002/rnc.4910</a>","short":"J. Lu, A.S. Leong, D.E. Quevedo, International Journal of Robust and Nonlinear Control 30 (2020) 4205–4224.","mla":"Lu, Jingyi, et al. “Optimal Event‐triggered Transmission Scheduling for Privacy‐preserving Wireless State Estimation.” <i>International Journal of Robust and Nonlinear Control</i>, vol. 30, no. 11, Wiley, 2020, pp. 4205–24, doi:<a href=\"https://doi.org/10.1002/rnc.4910\">10.1002/rnc.4910</a>.","bibtex":"@article{Lu_Leong_Quevedo_2020, title={Optimal event‐triggered transmission scheduling for privacy‐preserving wireless state estimation}, volume={30}, DOI={<a href=\"https://doi.org/10.1002/rnc.4910\">10.1002/rnc.4910</a>}, number={11}, journal={International Journal of Robust and Nonlinear Control}, publisher={Wiley}, author={Lu, Jingyi and Leong, Alex S. and Quevedo, Daniel E.}, year={2020}, pages={4205–4224} }"},"year":"2020","volume":30,"author":[{"first_name":"Jingyi","full_name":"Lu, Jingyi","last_name":"Lu"},{"last_name":"Leong","full_name":"Leong, Alex S.","first_name":"Alex S."},{"first_name":"Daniel E.","last_name":"Quevedo","full_name":"Quevedo, Daniel E."}],"date_created":"2023-01-09T16:46:15Z","date_updated":"2023-01-09T16:46:29Z","publisher":"Wiley","doi":"10.1002/rnc.4910","title":"Optimal event‐triggered transmission scheduling for privacy‐preserving wireless state estimation"},{"abstract":[{"text":"<jats:p>Helhmoltz–Kirchhoff equations of motions of vortices of an incompressible fluid in the plane define a dynamics with singularities and this leads to a Zermelo navigation problem describing the ship travel in such a field where the control is the heading angle. Considering one vortex, we define a time minimization problem which can be analyzed with the technics of geometric optimal control combined with numerical simulations, the geometric frame being the extension of Randers metrics in the punctured plane, with rotational symmetry. Candidates as minimizers are parameterized thanks to the Pontryagin Maximum Principle as extremal solutions of a Hamiltonian vector field. We analyze the time minimal solution to transfer the ship between two points where during the transfer the ship can be either in a strong current region in the vicinity of the vortex or in a weak current region. The analysis is based on a micro-local classification of the extremals using mainly the integrability properties of the dynamics due to the rotational symmetry. The discussion is complex and related to the existence of an isolated extremal (Reeb) circle due to the vortex singularity. The explicit computation of cut points where the extremal curves cease to be optimal is given and the spheres are described in the case where at the initial point the current is weak.</jats:p>","lang":"eng"}],"status":"public","type":"journal_article","publication":"ESAIM: Control, Optimisation and Calculus of Variations","article_number":"S10","keyword":["Computational Mathematics","Control and Optimization","Control and Systems Engineering"],"language":[{"iso":"eng"}],"_id":"33866","user_id":"95394","year":"2020","citation":{"short":"B. Bonnard, O. Cots, B.E. Wembe Moafo, ESAIM: Control, Optimisation and Calculus of Variations 27 (2020).","bibtex":"@article{Bonnard_Cots_Wembe Moafo_2020, title={A Zermelo navigation problem with a vortex singularity}, volume={27}, DOI={<a href=\"https://doi.org/10.1051/cocv/2020058\">10.1051/cocv/2020058</a>}, number={S10}, journal={ESAIM: Control, Optimisation and Calculus of Variations}, publisher={EDP Sciences}, author={Bonnard, Bernard and Cots, Olivier and Wembe Moafo, Boris Edgar}, year={2020} }","mla":"Bonnard, Bernard, et al. “A Zermelo Navigation Problem with a Vortex Singularity.” <i>ESAIM: Control, Optimisation and Calculus of Variations</i>, vol. 27, S10, EDP Sciences, 2020, doi:<a href=\"https://doi.org/10.1051/cocv/2020058\">10.1051/cocv/2020058</a>.","apa":"Bonnard, B., Cots, O., &#38; Wembe Moafo, B. E. (2020). A Zermelo navigation problem with a vortex singularity. <i>ESAIM: Control, Optimisation and Calculus of Variations</i>, <i>27</i>, Article S10. <a href=\"https://doi.org/10.1051/cocv/2020058\">https://doi.org/10.1051/cocv/2020058</a>","ama":"Bonnard B, Cots O, Wembe Moafo BE. A Zermelo navigation problem with a vortex singularity. <i>ESAIM: Control, Optimisation and Calculus of Variations</i>. 2020;27. doi:<a href=\"https://doi.org/10.1051/cocv/2020058\">10.1051/cocv/2020058</a>","chicago":"Bonnard, Bernard, Olivier Cots, and Boris Edgar Wembe Moafo. “A Zermelo Navigation Problem with a Vortex Singularity.” <i>ESAIM: Control, Optimisation and Calculus of Variations</i> 27 (2020). <a href=\"https://doi.org/10.1051/cocv/2020058\">https://doi.org/10.1051/cocv/2020058</a>.","ieee":"B. Bonnard, O. Cots, and B. E. Wembe Moafo, “A Zermelo navigation problem with a vortex singularity,” <i>ESAIM: Control, Optimisation and Calculus of Variations</i>, vol. 27, Art. no. S10, 2020, doi: <a href=\"https://doi.org/10.1051/cocv/2020058\">10.1051/cocv/2020058</a>."},"intvolume":"        27","publication_status":"published","publication_identifier":{"issn":["1292-8119","1262-3377"]},"title":"A Zermelo navigation problem with a vortex singularity","doi":"10.1051/cocv/2020058","publisher":"EDP Sciences","date_updated":"2023-01-16T12:09:22Z","date_created":"2022-10-24T12:51:05Z","author":[{"last_name":"Bonnard","full_name":"Bonnard, Bernard","first_name":"Bernard"},{"first_name":"Olivier","last_name":"Cots","full_name":"Cots, Olivier"},{"id":"95394","full_name":"Wembe Moafo, Boris Edgar","last_name":"Wembe Moafo","first_name":"Boris Edgar"}],"volume":27},{"user_id":"52265","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"_id":"13443","file_date_updated":"2019-09-23T16:21:16Z","type":"conference","status":"public","author":[{"first_name":"Adrian","full_name":"Redder, Adrian","id":"52265","orcid":"https://orcid.org/0000-0001-7391-4688","last_name":"Redder"},{"last_name":"Ramaswamy","orcid":"https://orcid.org/ 0000-0001-7547-8111","full_name":"Ramaswamy, Arunselvan","id":"66937","first_name":"Arunselvan"},{"first_name":"Daniel","last_name":"Quevedo","full_name":"Quevedo, Daniel"}],"date_updated":"2022-01-06T06:51:36Z","oa":"1","main_file_link":[{"url":"https://arxiv.org/abs/1905.05992","open_access":"1"}],"conference":{"location":"Chicago, USA","end_date":"2019-09-17","start_date":"2019-09-16","name":"8th IFAC Workshop on Distributed Estimation and Control in Networked Systems - NECSYS 2019"},"publication_status":"published","has_accepted_license":"1","citation":{"ama":"Redder A, Ramaswamy A, Quevedo D. Deep reinforcement learning for scheduling in large-scale networked control systems. In: <i>Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems</i>. ; 2019.","ieee":"A. Redder, A. Ramaswamy, and D. Quevedo, “Deep reinforcement learning for scheduling in large-scale networked control systems,” in <i>Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems</i>, Chicago, USA, 2019.","chicago":"Redder, Adrian, Arunselvan Ramaswamy, and Daniel Quevedo. “Deep Reinforcement Learning for Scheduling in Large-Scale Networked Control Systems.” In <i>Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems</i>, 2019.","apa":"Redder, A., Ramaswamy, A., &#38; Quevedo, D. (2019). Deep reinforcement learning for scheduling in large-scale networked control systems. In <i>Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems</i>. Chicago, USA.","short":"A. Redder, A. Ramaswamy, D. Quevedo, in: Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems, 2019.","bibtex":"@inproceedings{Redder_Ramaswamy_Quevedo_2019, title={Deep reinforcement learning for scheduling in large-scale networked control systems}, booktitle={Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems}, author={Redder, Adrian and Ramaswamy, Arunselvan and Quevedo, Daniel}, year={2019} }","mla":"Redder, Adrian, et al. “Deep Reinforcement Learning for Scheduling in Large-Scale Networked Control Systems.” <i>Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems</i>, 2019."},"language":[{"iso":"eng"}],"ddc":["620"],"keyword":["Networked control systems","deep reinforcement learning","large-scale systems","resource scheduling","stochastic control"],"publication":"Proceedings of the 8th IFAC Workshop on Distributed Estimation and Control in Networked Systems","file":[{"date_updated":"2019-09-23T16:21:16Z","creator":"aredder","date_created":"2019-09-23T15:48:33Z","file_size":371429,"file_id":"13444","access_level":"local","file_name":"ifacconf.pdf","content_type":"application/pdf","relation":"main_file"}],"abstract":[{"text":"This work considers the problem of control and resource allocation in networked\r\nsystems. To this end, we present DIRA a Deep reinforcement learning based Iterative Resource\r\nAllocation algorithm, which is scalable and control-aware. Our algorithm is tailored towards\r\nlarge-scale problems where control and scheduling need to act jointly to optimize performance.\r\nDIRA can be used to schedule general time-domain optimization based controllers. In the present\r\nwork, we focus on control designs based on suitably adapted linear quadratic regulators. We\r\napply our algorithm to networked systems with correlated fading communication channels. Our\r\nsimulations show that DIRA scales well to large scheduling problems.","lang":"eng"}],"date_created":"2019-09-23T16:00:58Z","title":"Deep reinforcement learning for scheduling in large-scale networked control systems","year":"2019"},{"author":[{"full_name":"Schulze Darup, Moritz","last_name":"Schulze Darup","first_name":"Moritz"}],"volume":67,"date_updated":"2023-01-09T16:22:54Z","doi":"10.1515/auto-2019-0022","publication_status":"published","publication_identifier":{"issn":["2196-677X","0178-2312"]},"citation":{"chicago":"Schulze Darup, Moritz. “Verschlüsselte Regelung in Der Cloud – Stand Der Technik Und Offene Probleme.” <i>At - Automatisierungstechnik</i> 67, no. 8 (2019): 668–81. <a href=\"https://doi.org/10.1515/auto-2019-0022\">https://doi.org/10.1515/auto-2019-0022</a>.","ieee":"M. Schulze Darup, “Verschlüsselte Regelung in der Cloud – Stand der Technik und offene Probleme,” <i>at - Automatisierungstechnik</i>, vol. 67, no. 8, pp. 668–681, 2019, doi: <a href=\"https://doi.org/10.1515/auto-2019-0022\">10.1515/auto-2019-0022</a>.","ama":"Schulze Darup M. Verschlüsselte Regelung in der Cloud – Stand der Technik und offene Probleme. <i>at - Automatisierungstechnik</i>. 2019;67(8):668-681. doi:<a href=\"https://doi.org/10.1515/auto-2019-0022\">10.1515/auto-2019-0022</a>","apa":"Schulze Darup, M. (2019). Verschlüsselte Regelung in der Cloud – Stand der Technik und offene Probleme. <i>At - Automatisierungstechnik</i>, <i>67</i>(8), 668–681. <a href=\"https://doi.org/10.1515/auto-2019-0022\">https://doi.org/10.1515/auto-2019-0022</a>","short":"M. Schulze Darup, At - Automatisierungstechnik 67 (2019) 668–681.","bibtex":"@article{Schulze Darup_2019, title={Verschlüsselte Regelung in der Cloud – Stand der Technik und offene Probleme}, volume={67}, DOI={<a href=\"https://doi.org/10.1515/auto-2019-0022\">10.1515/auto-2019-0022</a>}, number={8}, journal={at - Automatisierungstechnik}, publisher={Walter de Gruyter GmbH}, author={Schulze Darup, Moritz}, year={2019}, pages={668–681} }","mla":"Schulze Darup, Moritz. “Verschlüsselte Regelung in Der Cloud – Stand Der Technik Und Offene Probleme.” <i>At - Automatisierungstechnik</i>, vol. 67, no. 8, Walter de Gruyter GmbH, 2019, pp. 668–81, doi:<a href=\"https://doi.org/10.1515/auto-2019-0022\">10.1515/auto-2019-0022</a>."},"intvolume":"        67","page":"668-681","user_id":"158","department":[{"_id":"622"}],"_id":"35566","type":"journal_article","status":"public","date_created":"2023-01-09T16:22:39Z","publisher":"Walter de Gruyter GmbH","title":"Verschlüsselte Regelung in der Cloud – Stand der Technik und offene Probleme","issue":"8","year":"2019","language":[{"iso":"eng"}],"keyword":["Electrical and Electronic Engineering","Computer Science Applications","Control and Systems Engineering"],"publication":"at - Automatisierungstechnik","abstract":[{"lang":"eng","text":"<jats:title>Zusammenfassung</jats:title>\r\n               <jats:p>Zukünftige Regelungskonzepte werden verstärkt auf Cloud-Computing und verteiltes Rechnen setzen. In den resultierenden vernetzten Regelungssystemen werden sensible Daten über öffentliche Netzwerke kommuniziert und auf Plattformen Dritter verarbeitet. Verschlüsselte Regelungen zielen darauf ab, die Vertraulichkeit dieser Daten im gesamten Regelkreis zu sichern. Um dieses Ziel zu erreichen, werden klassische Regelungsalgorithmen so modifiziert, dass sie verschlüsselte Regeleingriffe basierend auf verschlüsselten Systemzuständen berechnen. Zum Einsatz kommen dabei homomorphe Verschlüsselungsverfahren, die einfache mathematische Operationen auf verschlüsselten Daten ermöglichen. Der Artikel erläutert die Implementierung verschlüsselter Regelungen anhand von drei wegweisenden Realisierungen in der Cloud.</jats:p>"}]},{"citation":{"apa":"Leong, A. S., Ramaswamy, A., Quevedo, D. E., Karl, H., &#38; Shi, L. (2019). Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems. <i>Automatica</i>, <i>113</i>, Article 108759. <a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">https://doi.org/10.1016/j.automatica.2019.108759</a>","mla":"Leong, Alex S., et al. “Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber–Physical Systems.” <i>Automatica</i>, vol. 113, 108759, Elsevier BV, 2019, doi:<a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">10.1016/j.automatica.2019.108759</a>.","bibtex":"@article{Leong_Ramaswamy_Quevedo_Karl_Shi_2019, title={Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems}, volume={113}, DOI={<a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">10.1016/j.automatica.2019.108759</a>}, number={108759}, journal={Automatica}, publisher={Elsevier BV}, author={Leong, Alex S. and Ramaswamy, Arunselvan and Quevedo, Daniel E. and Karl, Holger and Shi, Ling}, year={2019} }","short":"A.S. Leong, A. Ramaswamy, D.E. Quevedo, H. Karl, L. Shi, Automatica 113 (2019).","ama":"Leong AS, Ramaswamy A, Quevedo DE, Karl H, Shi L. Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems. <i>Automatica</i>. 2019;113. doi:<a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">10.1016/j.automatica.2019.108759</a>","ieee":"A. S. Leong, A. Ramaswamy, D. E. Quevedo, H. Karl, and L. Shi, “Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems,” <i>Automatica</i>, vol. 113, Art. no. 108759, 2019, doi: <a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">10.1016/j.automatica.2019.108759</a>.","chicago":"Leong, Alex S., Arunselvan Ramaswamy, Daniel E. Quevedo, Holger Karl, and Ling Shi. “Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber–Physical Systems.” <i>Automatica</i> 113 (2019). <a href=\"https://doi.org/10.1016/j.automatica.2019.108759\">https://doi.org/10.1016/j.automatica.2019.108759</a>."},"intvolume":"       113","year":"2019","publication_status":"published","publication_identifier":{"issn":["0005-1098"]},"doi":"10.1016/j.automatica.2019.108759","title":"Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems","date_created":"2023-01-09T16:44:58Z","author":[{"first_name":"Alex S.","full_name":"Leong, Alex S.","last_name":"Leong"},{"full_name":"Ramaswamy, Arunselvan","last_name":"Ramaswamy","first_name":"Arunselvan"},{"last_name":"Quevedo","full_name":"Quevedo, Daniel E.","first_name":"Daniel E."},{"first_name":"Holger","full_name":"Karl, Holger","last_name":"Karl"},{"full_name":"Shi, Ling","last_name":"Shi","first_name":"Ling"}],"volume":113,"date_updated":"2023-01-09T16:45:15Z","publisher":"Elsevier BV","status":"public","type":"journal_article","publication":"Automatica","language":[{"iso":"eng"}],"article_number":"108759","keyword":["Electrical and Electronic Engineering","Control and Systems Engineering"],"user_id":"158","department":[{"_id":"57"}],"_id":"35583"},{"year":"2019","citation":{"ama":"Ding K, Ren X, Quevedo DE, Dey S, Shi L. Defensive deception against reactive jamming attacks in remote state estimation. <i>Automatica</i>. 2019;113. doi:<a href=\"https://doi.org/10.1016/j.automatica.2019.108680\">10.1016/j.automatica.2019.108680</a>","ieee":"K. Ding, X. Ren, D. E. Quevedo, S. Dey, and L. Shi, “Defensive deception against reactive jamming attacks in remote state estimation,” <i>Automatica</i>, vol. 113, Art. no. 108680, 2019, doi: <a href=\"https://doi.org/10.1016/j.automatica.2019.108680\">10.1016/j.automatica.2019.108680</a>.","chicago":"Ding, Kemi, Xiaoqiang Ren, Daniel E. Quevedo, Subhrakanti Dey, and Ling Shi. “Defensive Deception against Reactive Jamming Attacks in Remote State Estimation.” <i>Automatica</i> 113 (2019). <a href=\"https://doi.org/10.1016/j.automatica.2019.108680\">https://doi.org/10.1016/j.automatica.2019.108680</a>.","bibtex":"@article{Ding_Ren_Quevedo_Dey_Shi_2019, title={Defensive deception against reactive jamming attacks in remote state estimation}, volume={113}, DOI={<a href=\"https://doi.org/10.1016/j.automatica.2019.108680\">10.1016/j.automatica.2019.108680</a>}, number={108680}, journal={Automatica}, publisher={Elsevier BV}, author={Ding, Kemi and Ren, Xiaoqiang and Quevedo, Daniel E. and Dey, Subhrakanti and Shi, Ling}, year={2019} }","short":"K. Ding, X. Ren, D.E. Quevedo, S. Dey, L. Shi, Automatica 113 (2019).","mla":"Ding, Kemi, et al. “Defensive Deception against Reactive Jamming Attacks in Remote State Estimation.” <i>Automatica</i>, vol. 113, 108680, Elsevier BV, 2019, doi:<a href=\"https://doi.org/10.1016/j.automatica.2019.108680\">10.1016/j.automatica.2019.108680</a>.","apa":"Ding, K., Ren, X., Quevedo, D. E., Dey, S., &#38; Shi, L. (2019). Defensive deception against reactive jamming attacks in remote state estimation. <i>Automatica</i>, <i>113</i>, Article 108680. <a href=\"https://doi.org/10.1016/j.automatica.2019.108680\">https://doi.org/10.1016/j.automatica.2019.108680</a>"},"intvolume":"       113","publication_status":"published","publication_identifier":{"issn":["0005-1098"]},"title":"Defensive deception against reactive jamming attacks in remote state estimation","doi":"10.1016/j.automatica.2019.108680","date_updated":"2023-01-09T16:45:59Z","publisher":"Elsevier BV","date_created":"2023-01-09T16:45:46Z","author":[{"first_name":"Kemi","last_name":"Ding","full_name":"Ding, Kemi"},{"first_name":"Xiaoqiang","last_name":"Ren","full_name":"Ren, Xiaoqiang"},{"first_name":"Daniel E.","last_name":"Quevedo","full_name":"Quevedo, Daniel E."},{"full_name":"Dey, Subhrakanti","last_name":"Dey","first_name":"Subhrakanti"},{"full_name":"Shi, Ling","last_name":"Shi","first_name":"Ling"}],"volume":113,"status":"public","type":"journal_article","publication":"Automatica","article_number":"108680","keyword":["Electrical and Electronic Engineering","Control and Systems Engineering"],"language":[{"iso":"eng"}],"_id":"35584","user_id":"158","department":[{"_id":"57"}]},{"date_updated":"2023-09-15T12:26:09Z","publisher":"Shaker","date_created":"2019-05-27T10:21:17Z","author":[{"first_name":"Tobias","full_name":"Meyer, Tobias","last_name":"Meyer"}],"title":"Optimization-based reliability control of mechatronic systems","year":"2018","citation":{"apa":"Meyer, T. (2018). <i>Optimization-based reliability control of mechatronic systems</i>. Shaker.","bibtex":"@book{Meyer_2018, title={Optimization-based reliability control of mechatronic systems}, publisher={Shaker}, author={Meyer, Tobias}, year={2018} }","short":"T. Meyer, Optimization-Based Reliability Control of Mechatronic Systems, Shaker, 2018.","mla":"Meyer, Tobias. <i>Optimization-Based Reliability Control of Mechatronic Systems</i>. Shaker, 2018.","chicago":"Meyer, Tobias. <i>Optimization-Based Reliability Control of Mechatronic Systems</i>. Shaker, 2018.","ieee":"T. Meyer, <i>Optimization-based reliability control of mechatronic systems</i>. Shaker, 2018.","ama":"Meyer T. <i>Optimization-Based Reliability Control of Mechatronic Systems</i>. Shaker; 2018."},"_id":"9994","user_id":"210","department":[{"_id":"151"}],"keyword":["dependability","reliability","behavior adaptation","self-optimization","multiobjective optimization","optimal control","automotive drivetrain","clutch system","reliability-adaptive system"],"language":[{"iso":"eng"}],"type":"dissertation","abstract":[{"text":"Reliability-adaptive systems allow an adaptation of system behavior based on current system reliability. They can extend their lifetime at the cost of lowered performance or vice versa. This can be used to adapt failure behavior according to a maintenance plan, thus increasing availability while using up system capability fully. To facilitate setup, a control algorithm independent of a degradation model is desired. A closed loop control technique for reliability based on a health index, a measure for system degradation, is introduced. It uses self-optimization as means to implement behavior adaptation. This is based on selecting the priorities of objectives that the system pursues. Possible working points are computed beforehand using model-based multiobjective optimization techniques. The controller selects the priorities of objectives and this way balances reliability and performance. As exemplary application, an automatically actuated single plate dry clutch is introduced. The entire reliability control is setup and lifetime experiments are conducted. Results show that the variance of time to failure is reduced greatly, making the failure behavior more predictable. At the same time, the desired usable lifetime can be extended at the cost of system performance to allow for changed maintenance intervals. Together, these possibilities allow for greater system usage and better planning of maintenance.","lang":"eng"}],"status":"public"},{"keyword":["Beliefs","Competency Based Teacher Education","Control Groups","Early Childhood Education","Faculty Development","Foreign Countries","Inservice Teacher Education","Intervention","Mathematical Aptitude","Mathematics Skills","Pedagogical Content Knowledge","Preschool Teachers","Pretests Posttests","Professional Continuing Education","Statistical Analysis","Teacher Competency Testing"],"extern":"1","language":[{"iso":"eng"}],"_id":"36481","user_id":"49063","department":[{"_id":"611"},{"_id":"97"}],"abstract":[{"text":"Recent studies highlight early childhood teachers’ mathematics-related competence. Developing this competence should be a main aspect of early childhood teachers’ education. This is, however, not the case in all countries. Consequently, high-quality professional development courses are needed. Based on research results, we developed a competence-oriented continuous professional development course (\"EmMa\") and examined the effects of \"EmMa\" by asking: How does \"EmMa\" affect the development of early childhood teachers’ i) mathematical content knowledge, ii) mathematical pedagogical content knowledge and iii) beliefs towards mathematics in general? To answer these questions, we conducted a pre-test/post-test study including a control group with 99 in-service early childhood teachers. Results show that the course affected teachers’ mathematical pedagogical content knowledge and static orientation towards mathematics positively. From this we conclude that scaling-up \"EmMa\" might be a suitable approach to bridge the gap between pre-service education with nearly no mathematics and the challenges of early mathematics education.","lang":"eng"}],"status":"public","type":"journal_article","publication":"Mathematics Teacher Education and Development (MTED)","title":"Mathematics-related Competence of Early Childhood Teachers Visiting a Continuous Professional Development Course: An Intervention Study","date_updated":"2023-06-20T19:01:36Z","date_created":"2023-01-12T15:28:13Z","author":[{"first_name":"Julia","full_name":"Bruns, Julia","id":"72183","orcid":"https://orcid.org/0000-0002-6604-5864","last_name":"Bruns"},{"last_name":"Eichen","full_name":"Eichen, Lars","first_name":"Lars"},{"full_name":"Gasteiger, Hedwig","last_name":"Gasteiger","first_name":"Hedwig"}],"volume":19,"year":"2017","citation":{"ama":"Bruns J, Eichen L, Gasteiger H. Mathematics-related Competence of Early Childhood Teachers Visiting a Continuous Professional Development Course: An Intervention Study. <i>Mathematics Teacher Education and Development (MTED)</i>. 2017;19(3):76–93.","chicago":"Bruns, Julia, Lars Eichen, and Hedwig Gasteiger. “Mathematics-Related Competence of Early Childhood Teachers Visiting a Continuous Professional Development Course: An Intervention Study.” <i>Mathematics Teacher Education and Development (MTED)</i> 19, no. 3 (2017): 76–93.","ieee":"J. Bruns, L. Eichen, and H. Gasteiger, “Mathematics-related Competence of Early Childhood Teachers Visiting a Continuous Professional Development Course: An Intervention Study,” <i>Mathematics Teacher Education and Development (MTED)</i>, vol. 19, no. 3, pp. 76–93, 2017.","bibtex":"@article{Bruns_Eichen_Gasteiger_2017, title={Mathematics-related Competence of Early Childhood Teachers Visiting a Continuous Professional Development Course: An Intervention Study}, volume={19}, number={3}, journal={Mathematics Teacher Education and Development (MTED)}, author={Bruns, Julia and Eichen, Lars and Gasteiger, Hedwig}, year={2017}, pages={76–93} }","mla":"Bruns, Julia, et al. “Mathematics-Related Competence of Early Childhood Teachers Visiting a Continuous Professional Development Course: An Intervention Study.” <i>Mathematics Teacher Education and Development (MTED)</i>, vol. 19, no. 3, 2017, pp. 76–93.","short":"J. Bruns, L. Eichen, H. Gasteiger, Mathematics Teacher Education and Development (MTED) 19 (2017) 76–93.","apa":"Bruns, J., Eichen, L., &#38; Gasteiger, H. (2017). Mathematics-related Competence of Early Childhood Teachers Visiting a Continuous Professional Development Course: An Intervention Study. <i>Mathematics Teacher Education and Development (MTED)</i>, <i>19</i>(3), 76–93."},"intvolume":"        19","page":"76–93","publication_status":"published","quality_controlled":"1","issue":"3"},{"publication":"Proc. 41st Conference on Local Computer Networks (LCN)","type":"conference","abstract":[{"lang":"eng","text":"Version Control Systems (VCS) are a valuable tool for software development\r\nand document management. Both client/server and distributed (Peer-to-Peer)\r\nmodels exist, with the latter (e.g., Git and Mercurial) becoming\r\nincreasingly popular. Their distributed nature introduces complications,\r\nespecially concerning security: it is hard to control the dissemination of\r\ncontents stored in distributed VCS as they rely on replication of complete\r\nrepositories to any involved user.\r\n\r\nWe overcome this issue by designing and implementing a concept for\r\ncryptography-enforced access control which is transparent to the user. Use\r\nof field-tested schemes (end-to-end encryption, digital signatures) allows\r\nfor strong security, while adoption of convergent encryption and\r\ncontent-defined chunking retains storage efficiency. The concept is\r\nseamlessly integrated into Mercurial---respecting its distributed storage\r\nconcept---to ensure practical usability and compatibility to existing\r\ndeployments."}],"status":"public","_id":"19","department":[{"_id":"27"},{"_id":"518"}],"user_id":"24135","keyword":["access control","distributed version control systems","mercurial","peer-to-peer","convergent encryption","confidentiality","authenticity"],"language":[{"iso":"eng"}],"publication_identifier":{"isbn":["978-1-5090-2054-6"]},"publication_status":"published","year":"2016","citation":{"apa":"Lass, M., Leibenger, D., &#38; Sorge, C. (2016). Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE. <a href=\"https://doi.org/10.1109/lcn.2016.11\">https://doi.org/10.1109/lcn.2016.11</a>","bibtex":"@inproceedings{Lass_Leibenger_Sorge_2016, title={Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension}, DOI={<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>}, booktitle={Proc. 41st Conference on Local Computer Networks (LCN)}, publisher={IEEE}, author={Lass, Michael and Leibenger, Dominik and Sorge, Christoph}, year={2016} }","mla":"Lass, Michael, et al. “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.” <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>.","short":"M. Lass, D. Leibenger, C. Sorge, in: Proc. 41st Conference on Local Computer Networks (LCN), IEEE, 2016.","chicago":"Lass, Michael, Dominik Leibenger, and Christoph Sorge. “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension.” In <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/lcn.2016.11\">https://doi.org/10.1109/lcn.2016.11</a>.","ieee":"M. Lass, D. Leibenger, and C. Sorge, “Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension,” in <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>, 2016.","ama":"Lass M, Leibenger D, Sorge C. Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension. In: <i>Proc. 41st Conference on Local Computer Networks (LCN)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/lcn.2016.11\">10.1109/lcn.2016.11</a>"},"publisher":"IEEE","date_updated":"2022-01-06T06:53:56Z","author":[{"first_name":"Michael","id":"24135","full_name":"Lass, Michael","last_name":"Lass","orcid":"0000-0002-5708-7632"},{"full_name":"Leibenger, Dominik","last_name":"Leibenger","first_name":"Dominik"},{"full_name":"Sorge, Christoph","last_name":"Sorge","first_name":"Christoph"}],"date_created":"2017-07-25T14:36:16Z","title":"Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension","doi":"10.1109/lcn.2016.11"},{"date_updated":"2022-01-06T06:54:34Z","date_created":"2020-12-14T11:58:33Z","author":[{"full_name":"Holzinger, Philipp","last_name":"Holzinger","first_name":"Philipp"},{"last_name":"Triller","full_name":"Triller, Stefan","first_name":"Stefan"},{"last_name":"Bartel","full_name":"Bartel, Alexandre","first_name":"Alexandre"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"title":"An In-Depth Study of More Than Ten Years of Java Exploitation","doi":"http://doi.acm.org/10.1145/2976749.2978361","publication_identifier":{"isbn":["978-1-4503-4139-4"]},"year":"2016","citation":{"ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–90. CCS ’16, 2016. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi: <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","apa":"Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–90, doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790."},"page":"779-790","_id":"20719","series_title":"CCS '16","user_id":"5786","department":[{"_id":"76"}],"keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","status":"public"}]
