[{"abstract":[{"text":"Let G = (V,E) be an undirected graph on n vertices with non-negative capacities on its edges. The mincut sensitivity problem for the insertion of an edge is defined as follows. Build a compact data structure for G and a given set S ⊆ V of vertices that, on receiving any edge (x,y) ∈ S×S of positive capacity as query input, can efficiently report the set of all pairs from S× S whose mincut value increases upon insertion of the edge (x,y) to G. The only result that exists for this problem is for a single pair of vertices (Picard and Queyranne, Mathematical Programming Study, 13 (1980), 8-16). We present the following results for the single source and the all-pairs versions of this problem. \r\n1) Single source: Given any designated source vertex s, there exists a data structure of size 𝒪(|S|) that can output all those vertices from S whose mincut value to s increases upon insertion of any given edge. The time taken by the data structure to answer any query is 𝒪(|S|). \r\n2) All-pairs: There exists an 𝒪(|S|²) size data structure that can output all those pairs of vertices from S× S whose mincut value gets increased upon insertion of any given edge. The time taken by the data structure to answer any query is 𝒪(k), where k is the number of pairs of vertices whose mincut increases. \r\nFor both these versions, we also address the problem of reporting the values of the mincuts upon insertion of any given edge. To derive our results, we use interesting insights into the nearest and the farthest mincuts for a pair of vertices. In addition, a crucial result, that we establish and use in our data structures, is that there exists a directed acyclic graph of 𝒪(n) size that compactly stores the farthest mincuts from all vertices of V to a designated vertex s in the graph. We believe that this result is of independent interest, especially, because it also complements a previously existing result by Hariharan et al. (STOC 2007) that the nearest mincuts from all vertices of V to s is a laminar family, and hence, can be stored compactly in a tree of 𝒪(n) size.","lang":"eng"}],"publication":"28th Annual European Symposium on Algorithms (ESA 2020)","language":[{"iso":"eng"}],"keyword":["Mincut","Sensitivity","Data Structure"],"year":"2020","title":"Mincut Sensitivity Data Structures for the Insertion of an Edge","date_created":"2020-10-21T12:00:20Z","publisher":"Schloss Dagstuhl -- Leibniz-Zentrum für Informatik","status":"public","editor":[{"full_name":"Grandoni, Fabrizio","last_name":"Grandoni","first_name":"Fabrizio"},{"first_name":"Grzegorz","full_name":"Herman, Grzegorz","last_name":"Herman"},{"last_name":"Sanders","full_name":"Sanders, Peter","first_name":"Peter"}],"type":"conference","user_id":"39241","series_title":"Leibniz International Proceedings in Informatics (LIPIcs)","department":[{"_id":"63"}],"_id":"20159","citation":{"apa":"Baswana, S., Gupta, S., &#38; Knollmann, T. (2020). Mincut Sensitivity Data Structures for the Insertion of an Edge. In F. Grandoni, G. Herman, &#38; P. Sanders (Eds.), <i>28th Annual European Symposium on Algorithms (ESA 2020)</i> (Vol. 173, pp. 12:1-12:14). Dagstuhl, Germany: Schloss Dagstuhl -- Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.ESA.2020.12\">https://doi.org/10.4230/LIPIcs.ESA.2020.12</a>","short":"S. Baswana, S. Gupta, T. Knollmann, in: F. Grandoni, G. Herman, P. Sanders (Eds.), 28th Annual European Symposium on Algorithms (ESA 2020), Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2020, pp. 12:1-12:14.","bibtex":"@inproceedings{Baswana_Gupta_Knollmann_2020, place={Dagstuhl, Germany}, series={Leibniz International Proceedings in Informatics (LIPIcs)}, title={Mincut Sensitivity Data Structures for the Insertion of an Edge}, volume={173}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.ESA.2020.12\">10.4230/LIPIcs.ESA.2020.12</a>}, booktitle={28th Annual European Symposium on Algorithms (ESA 2020)}, publisher={Schloss Dagstuhl -- Leibniz-Zentrum für Informatik}, author={Baswana, Surender and Gupta, Shiv and Knollmann, Till}, editor={Grandoni, Fabrizio and Herman, Grzegorz and Sanders, PeterEditors}, year={2020}, pages={12:1-12:14}, collection={Leibniz International Proceedings in Informatics (LIPIcs)} }","mla":"Baswana, Surender, et al. “Mincut Sensitivity Data Structures for the Insertion of an Edge.” <i>28th Annual European Symposium on Algorithms (ESA 2020)</i>, edited by Fabrizio Grandoni et al., vol. 173, Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, 2020, pp. 12:1-12:14, doi:<a href=\"https://doi.org/10.4230/LIPIcs.ESA.2020.12\">10.4230/LIPIcs.ESA.2020.12</a>.","ama":"Baswana S, Gupta S, Knollmann T. Mincut Sensitivity Data Structures for the Insertion of an Edge. In: Grandoni F, Herman G, Sanders P, eds. <i>28th Annual European Symposium on Algorithms (ESA 2020)</i>. Vol 173. Leibniz International Proceedings in Informatics (LIPIcs). Dagstuhl, Germany: Schloss Dagstuhl -- Leibniz-Zentrum für Informatik; 2020:12:1-12:14. doi:<a href=\"https://doi.org/10.4230/LIPIcs.ESA.2020.12\">10.4230/LIPIcs.ESA.2020.12</a>","ieee":"S. Baswana, S. Gupta, and T. Knollmann, “Mincut Sensitivity Data Structures for the Insertion of an Edge,” in <i>28th Annual European Symposium on Algorithms (ESA 2020)</i>, 2020, vol. 173, pp. 12:1-12:14.","chicago":"Baswana, Surender, Shiv Gupta, and Till Knollmann. “Mincut Sensitivity Data Structures for the Insertion of an Edge.” In <i>28th Annual European Symposium on Algorithms (ESA 2020)</i>, edited by Fabrizio Grandoni, Grzegorz Herman, and Peter Sanders, 173:12:1-12:14. Leibniz International Proceedings in Informatics (LIPIcs). Dagstuhl, Germany: Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, 2020. <a href=\"https://doi.org/10.4230/LIPIcs.ESA.2020.12\">https://doi.org/10.4230/LIPIcs.ESA.2020.12</a>."},"intvolume":"       173","page":"12:1-12:14","place":"Dagstuhl, Germany","publication_identifier":{"isbn":["978-3-95977-162-7"],"issn":["1868-8969"]},"doi":"10.4230/LIPIcs.ESA.2020.12","author":[{"full_name":"Baswana, Surender","last_name":"Baswana","first_name":"Surender"},{"last_name":"Gupta","full_name":"Gupta, Shiv","first_name":"Shiv"},{"orcid":"0000-0003-2014-4696","last_name":"Knollmann","full_name":"Knollmann, Till","id":"39241","first_name":"Till"}],"volume":173,"date_updated":"2022-01-06T06:54:20Z"},{"keyword":["Huygens' box","NF-to-FF transformation","efficient FF radiation model","FF behaviour","EMI assessment","PCB","near-field measurements","efficient radiation model","far-field behaviour","RF design process","far-field prediction","Huygens'box principle","fullwave simulation","electronic system radiation","equivalent radiation source","electromagnetic simulation tool","near-field scan data","EM compatibility failure reduction"],"language":[{"iso":"eng"}],"abstract":[{"text":"Using near-field (NF) scan data to predict the far-field (FF) behaviour of radiating electronic systems represents a novel method to accompany the whole RF design process. This approach involves so-called Huygens' box as an efficient radiation model inside an electromagnetic (EM) simulation tool and then transforms the scanned NF measured data into the FF. For this, the basic idea of the Huygens'box principle and the NF-to-FF transformation are briefly presented. The NF is measured on the Huygens' box around a device under test using anNF scanner, recording the magnitude and phase of the site-related magnetic and electric components. A comparison between a fullwave simulation and the measurement results shows a good similarity in both the NF and the simulated and transformed FF.Thus, this method is applicable to predict the FF behaviour of any electronic system by measuring the NF. With this knowledge, the RF design can be improved due to allowing a significant reduction of EM compatibility failure at the end of the development flow. In addition, the very efficient FF radiation model can be used for detailed investigations in various environments and the impact of such an equivalent radiation source on other electronic systems can be assessed.","lang":"eng"}],"publication":"Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis","title":"Far-field prediction combining simulations with near-field measurements for EMI assessment of PCBs","publisher":" The Institution of Engineering and Technology (IET)","date_created":"2021-03-18T13:49:49Z","year":"2020","edition":"1","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"21542","user_id":"38240","department":[{"_id":"485"}],"status":"public","type":"book_chapter","main_file_link":[{"url":"https://digital-library.theiet.org/content/books/10.1049/pbcs072e_ch14"}],"doi":"10.1049/pbcs072e_ch14","date_updated":"2022-01-06T06:55:03Z","author":[{"full_name":"Schröder, Dominik","last_name":"Schröder","first_name":"Dominik"},{"first_name":"Sven","full_name":"Lange, Sven","id":"38240","last_name":"Lange"},{"last_name":"Hangmann","full_name":"Hangmann, Christian","first_name":"Christian"},{"last_name":"Hedayat","full_name":"Hedayat, Christian","first_name":"Christian"}],"place":"Croyton, UK","citation":{"chicago":"Schröder, Dominik, Sven Lange, Christian Hangmann, and Christian Hedayat. “Far-Field Prediction Combining Simulations with near-Field Measurements for EMI Assessment of PCBs.” In <i>Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis</i>, 1st ed., 315-346 (32). Croyton, UK:  The Institution of Engineering and Technology (IET), 2020. <a href=\"https://doi.org/10.1049/pbcs072e_ch14\">https://doi.org/10.1049/pbcs072e_ch14</a>.","ieee":"D. Schröder, S. Lange, C. Hangmann, and C. Hedayat, “Far-field prediction combining simulations with near-field measurements for EMI assessment of PCBs,” in <i>Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis</i>, 1st ed., Croyton, UK:  The Institution of Engineering and Technology (IET), 2020, pp. 315-346 (32).","ama":"Schröder D, Lange S, Hangmann C, Hedayat C. Far-field prediction combining simulations with near-field measurements for EMI assessment of PCBs. In: <i>Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis</i>. 1st ed. Croyton, UK:  The Institution of Engineering and Technology (IET); 2020:315-346 (32). doi:<a href=\"https://doi.org/10.1049/pbcs072e_ch14\">10.1049/pbcs072e_ch14</a>","bibtex":"@inbook{Schröder_Lange_Hangmann_Hedayat_2020, place={Croyton, UK}, edition={1}, title={Far-field prediction combining simulations with near-field measurements for EMI assessment of PCBs}, DOI={<a href=\"https://doi.org/10.1049/pbcs072e_ch14\">10.1049/pbcs072e_ch14</a>}, booktitle={Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis}, publisher={ The Institution of Engineering and Technology (IET)}, author={Schröder, Dominik and Lange, Sven and Hangmann, Christian and Hedayat, Christian}, year={2020}, pages={315-346 (32)} }","mla":"Schröder, Dominik, et al. “Far-Field Prediction Combining Simulations with near-Field Measurements for EMI Assessment of PCBs.” <i>Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis</i>, 1st ed.,  The Institution of Engineering and Technology (IET), 2020, pp. 315-346 (32), doi:<a href=\"https://doi.org/10.1049/pbcs072e_ch14\">10.1049/pbcs072e_ch14</a>.","short":"D. Schröder, S. Lange, C. Hangmann, C. Hedayat, in: Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis, 1st ed.,  The Institution of Engineering and Technology (IET), Croyton, UK, 2020, pp. 315-346 (32).","apa":"Schröder, D., Lange, S., Hangmann, C., &#38; Hedayat, C. (2020). Far-field prediction combining simulations with near-field measurements for EMI assessment of PCBs. In <i>Tensorial Analysis of Networks (TAN) Modelling for PCB Signal Integrity and EMC Analysis</i> (1st ed., pp. 315-346 (32)). Croyton, UK:  The Institution of Engineering and Technology (IET). <a href=\"https://doi.org/10.1049/pbcs072e_ch14\">https://doi.org/10.1049/pbcs072e_ch14</a>"},"page":"315-346 (32)","publication_status":"published","publication_identifier":{"isbn":["9781839530494","9781839530500"]},"related_material":{"record":[{"relation":"other","id":"21542","status":"public"}]}},{"date_updated":"2022-01-06T06:53:04Z","publisher":"IEEE Computer Society","date_created":"2020-06-06T07:40:45Z","author":[{"first_name":"Asif","id":"63288","full_name":"Hasnain, Asif","last_name":"Hasnain"},{"first_name":"Holger","last_name":"Karl","id":"126","full_name":"Karl, Holger"}],"title":"Coflow Scheduling with Performance Guarantees for Data Center Applications","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/9139642"}],"doi":"https://doi.org/10.1109/CCGrid49817.2020.00010","conference":{"location":"Melbourne, Australia","name":"2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)"},"publication_status":"published","year":"2020","citation":{"bibtex":"@inproceedings{Hasnain_Karl_2020, title={Coflow Scheduling with Performance Guarantees for Data Center Applications}, DOI={<a href=\"https://doi.org/10.1109/CCGrid49817.2020.00010\">https://doi.org/10.1109/CCGrid49817.2020.00010</a>}, booktitle={2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)}, publisher={IEEE Computer Society}, author={Hasnain, Asif and Karl, Holger}, year={2020} }","short":"A. Hasnain, H. Karl, in: 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), IEEE Computer Society, 2020.","mla":"Hasnain, Asif, and Holger Karl. “Coflow Scheduling with Performance Guarantees for Data Center Applications.” <i>2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)</i>, IEEE Computer Society, 2020, doi:<a href=\"https://doi.org/10.1109/CCGrid49817.2020.00010\">https://doi.org/10.1109/CCGrid49817.2020.00010</a>.","apa":"Hasnain, A., &#38; Karl, H. (2020). Coflow Scheduling with Performance Guarantees for Data Center Applications. In <i>2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)</i>. Melbourne, Australia: IEEE Computer Society. <a href=\"https://doi.org/10.1109/CCGrid49817.2020.00010\">https://doi.org/10.1109/CCGrid49817.2020.00010</a>","ama":"Hasnain A, Karl H. Coflow Scheduling with Performance Guarantees for Data Center Applications. In: <i>2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)</i>. IEEE Computer Society; 2020. doi:<a href=\"https://doi.org/10.1109/CCGrid49817.2020.00010\">https://doi.org/10.1109/CCGrid49817.2020.00010</a>","chicago":"Hasnain, Asif, and Holger Karl. “Coflow Scheduling with Performance Guarantees for Data Center Applications.” In <i>2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)</i>. IEEE Computer Society, 2020. <a href=\"https://doi.org/10.1109/CCGrid49817.2020.00010\">https://doi.org/10.1109/CCGrid49817.2020.00010</a>.","ieee":"A. Hasnain and H. Karl, “Coflow Scheduling with Performance Guarantees for Data Center Applications,” in <i>2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)</i>, Melbourne, Australia, 2020."},"project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"16","name":"SFB 901 - Subproject C4"},{"_id":"1","name":"SFB 901"}],"_id":"17082","user_id":"63288","department":[{"_id":"75"}],"ddc":["000"],"keyword":["Coflow","Scheduling","Deadlines","Data centers"],"language":[{"iso":"eng"}],"type":"conference","publication":"2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)","abstract":[{"text":"Data-parallel applications run on cluster of servers in a datacenter and their communication triggers correlated resource demand on multiple links that can be abstracted as coflow. They often desire predictable network performance, which can be passed to network via coflow abstraction for application-aware network scheduling. In this paper, we propose a heuristic and an optimization algorithm for predictable network performance such that they guarantee coflows completion within their deadlines. The algorithms also ensure high network utilization, i.e., it's work-conserving, and avoids starvation of coflows. We evaluate both algorithms via trace-driven simulation and show that they admit 1.1x more coflows than the Varys scheme while meeting their deadlines.","lang":"eng"}],"status":"public"},{"project":[{"_id":"745","name":"NFDI4Culture: NFDI4Culture – Konsortium für Forschungsdaten materieller und immaterieller Kulturgüter"}],"_id":"47476","user_id":"61139","department":[{"_id":"572"},{"_id":"856"},{"_id":"615"}],"article_type":"original","type":"journal_article","status":"public","oa":"1","date_updated":"2024-02-19T11:01:52Z","author":[{"first_name":"Reinhard","last_name":"Altenhöner","full_name":"Altenhöner, Reinhard"},{"last_name":"Blümel","full_name":"Blümel, Ina","first_name":"Ina"},{"first_name":"Franziska","full_name":"Boehm, Franziska","last_name":"Boehm"},{"first_name":"Jens","last_name":"Bove","full_name":"Bove, Jens"},{"first_name":"Katrin","full_name":"Bicher, Katrin","last_name":"Bicher"},{"last_name":"Bracht","full_name":"Bracht, Christian","first_name":"Christian"},{"full_name":"Brand, Ortrun","last_name":"Brand","first_name":"Ortrun"},{"first_name":"Lisa","last_name":"Dieckmann","full_name":"Dieckmann, Lisa"},{"full_name":"Effinger, Maria","last_name":"Effinger","first_name":"Maria"},{"first_name":"Malte","last_name":"Hagener","full_name":"Hagener, Malte"},{"first_name":"Andrea","full_name":"Hammes, Andrea","last_name":"Hammes"},{"last_name":"Heller","full_name":"Heller, Lambert","first_name":"Lambert"},{"last_name":"Kailus","full_name":"Kailus, Angela","first_name":"Angela"},{"first_name":"Hubertus","full_name":"Kohle, Hubertus","last_name":"Kohle"},{"full_name":"Ludwig, Jens","last_name":"Ludwig","first_name":"Jens"},{"first_name":"Andreas","last_name":"Münzmay","orcid":"0000-0002-8373-4055","full_name":"Münzmay, Andreas","id":"61139"},{"first_name":"Sarah","last_name":"Pittroff","full_name":"Pittroff, Sarah"},{"full_name":"Razum, Matthias","last_name":"Razum","first_name":"Matthias"},{"first_name":"Daniel","full_name":"Röwenstrunk, Daniel","last_name":"Röwenstrunk"},{"first_name":"Harald","last_name":"Sack","full_name":"Sack, Harald"},{"first_name":"Holger","last_name":"Simon","full_name":"Simon, Holger"},{"full_name":"Schmidt, Dörte","last_name":"Schmidt","first_name":"Dörte"},{"last_name":"Schrade","full_name":"Schrade, Torsten","first_name":"Torsten"},{"first_name":"Annika-Valeska","full_name":"Walzel, Annika-Valeska","last_name":"Walzel"},{"last_name":"Wiermann","full_name":"Wiermann, Barbara","first_name":"Barbara"}],"volume":6,"main_file_link":[{"open_access":"1","url":"https://doi.org/10.3897/rio.6.e57036"}],"doi":"10.3897/rio.6.e57036","publication_status":"published","publication_identifier":{"issn":["2367-7163"]},"citation":{"ama":"Altenhöner R, Blümel I, Boehm F, et al. NFDI4Culture - Consortium for research data on material and immaterial cultural heritage. <i>Research Ideas and Outcomes</i>. 2020;6. doi:<a href=\"https://doi.org/10.3897/rio.6.e57036\">10.3897/rio.6.e57036</a>","ieee":"R. Altenhöner <i>et al.</i>, “NFDI4Culture - Consortium for research data on material and immaterial cultural heritage,” <i>Research Ideas and Outcomes</i>, vol. 6, 2020, doi: <a href=\"https://doi.org/10.3897/rio.6.e57036\">10.3897/rio.6.e57036</a>.","chicago":"Altenhöner, Reinhard, Ina Blümel, Franziska Boehm, Jens Bove, Katrin Bicher, Christian Bracht, Ortrun Brand, et al. “NFDI4Culture - Consortium for Research Data on Material and Immaterial Cultural Heritage.” <i>Research Ideas and Outcomes</i> 6 (2020). <a href=\"https://doi.org/10.3897/rio.6.e57036\">https://doi.org/10.3897/rio.6.e57036</a>.","short":"R. Altenhöner, I. Blümel, F. Boehm, J. Bove, K. Bicher, C. Bracht, O. Brand, L. Dieckmann, M. Effinger, M. Hagener, A. Hammes, L. Heller, A. Kailus, H. Kohle, J. Ludwig, A. Münzmay, S. Pittroff, M. Razum, D. Röwenstrunk, H. Sack, H. Simon, D. Schmidt, T. Schrade, A.-V. Walzel, B. Wiermann, Research Ideas and Outcomes 6 (2020).","mla":"Altenhöner, Reinhard, et al. “NFDI4Culture - Consortium for Research Data on Material and Immaterial Cultural Heritage.” <i>Research Ideas and Outcomes</i>, vol. 6, Pensoft Publishers, 2020, doi:<a href=\"https://doi.org/10.3897/rio.6.e57036\">10.3897/rio.6.e57036</a>.","bibtex":"@article{Altenhöner_Blümel_Boehm_Bove_Bicher_Bracht_Brand_Dieckmann_Effinger_Hagener_et al._2020, title={NFDI4Culture - Consortium for research data on material and immaterial cultural heritage}, volume={6}, DOI={<a href=\"https://doi.org/10.3897/rio.6.e57036\">10.3897/rio.6.e57036</a>}, journal={Research Ideas and Outcomes}, publisher={Pensoft Publishers}, author={Altenhöner, Reinhard and Blümel, Ina and Boehm, Franziska and Bove, Jens and Bicher, Katrin and Bracht, Christian and Brand, Ortrun and Dieckmann, Lisa and Effinger, Maria and Hagener, Malte and et al.}, year={2020} }","apa":"Altenhöner, R., Blümel, I., Boehm, F., Bove, J., Bicher, K., Bracht, C., Brand, O., Dieckmann, L., Effinger, M., Hagener, M., Hammes, A., Heller, L., Kailus, A., Kohle, H., Ludwig, J., Münzmay, A., Pittroff, S., Razum, M., Röwenstrunk, D., … Wiermann, B. (2020). NFDI4Culture - Consortium for research data on material and immaterial cultural heritage. <i>Research Ideas and Outcomes</i>, <i>6</i>. <a href=\"https://doi.org/10.3897/rio.6.e57036\">https://doi.org/10.3897/rio.6.e57036</a>"},"intvolume":"         6","keyword":["Research Data Management"],"language":[{"iso":"eng"}],"publication":"Research Ideas and Outcomes","abstract":[{"lang":"eng","text":"Digital data on tangible and intangible cultural assets is an essential part of daily life, communication and experience. It has a lasting influence on the perception of cultural identity as well as on the interactions between research, the cultural economy and society. Throughout the last three decades, many cultural heritage institutions have contributed a wealth of digital representations of cultural assets (2D digital reproductions of paintings, sheet music, 3D digital models of sculptures, monuments, rooms, buildings), audio-visual data (music, film, stage performances), and procedural research data such as encoding and annotation formats. The long-term preservation and FAIR availability of research data from the cultural heritage domain is fundamentally important, not only for future academic success in the humanities but also for the cultural identity of individuals and society as a whole. Up to now, no coordinated effort for professional research data management on a national level exists in Germany. NFDI4Culture aims to fill this gap and create a user-centered, research-driven infrastructure that will cover a broad range of research domains from musicology, art history and architecture to performance, theatre, film, and media studies.</jats:p>\r\n          <jats:p>The research landscape addressed by the consortium is characterized by strong institutional differentiation. Research units in the consortium's community of interest comprise university institutes, art colleges, academies, galleries, libraries, archives and museums. This diverse landscape is also characterized by an abundance of research objects, methodologies and a great potential for data-driven research. In a unique effort carried out by the applicant and co-applicants of this proposal and ten academic societies, this community is interconnected for the first time through a federated approach that is ideally suited to the needs of the participating researchers. To promote collaboration within the NFDI, to share knowledge and technology and to provide extensive support for its users have been the guiding principles of the consortium from the beginning and will be at the heart of all workflows and decision-making processes. Thanks to these principles, NFDI4Culture has gathered strong support ranging from individual researchers to high-level cultural heritage organizations such as the UNESCO, the International Council of Museums, the Open Knowledge Foundation and Wikimedia. On this basis, NFDI4Culture will take innovative measures that promote a cultural change towards a more reflective and sustainable handling of research data and at the same time boost qualification and professionalization in data-driven research in the domain of cultural heritage. This will create a long-lasting impact on science, cultural economy and society as a whole."}],"publisher":"Pensoft Publishers","date_created":"2023-09-27T07:02:04Z","title":"NFDI4Culture - Consortium for research data on material and immaterial cultural heritage","quality_controlled":"1","year":"2020"},{"type":"journal_article","status":"public","_id":"17156","project":[{"call_identifier":"MSCA-RISE-2014","grant_number":"645751","name":"RISE_BPM: Propelling Business Process Management by Research and Innovation Staff Exchange","_id":"1070"}],"department":[{"_id":"526"}],"user_id":"59677","article_type":"original","file_date_updated":"2024-04-18T12:49:25Z","publication_identifier":{"issn":["2363-7005","1867-0202"]},"has_accepted_license":"1","publication_status":"published","page":"145-156","intvolume":"        63","citation":{"chicago":"Beverungen, Daniel, Joos C. A. M. Buijs, Jörg Becker, Claudio Di Ciccio, Wil M. P. van der Aalst, Christian Bartelheimer, Jan vom Brocke, et al. “Seven Paradoxes of Business Process Management in a Hyper-Connected World.” <i>Business &#38; Information Systems Engineering</i> 63 (2020): 145–56. <a href=\"https://doi.org/10.1007/s12599-020-00646-z\">https://doi.org/10.1007/s12599-020-00646-z</a>.","ieee":"D. Beverungen <i>et al.</i>, “Seven Paradoxes of Business Process Management in a Hyper-Connected World,” <i>Business &#38; Information Systems Engineering</i>, vol. 63, pp. 145–156, 2020, doi: <a href=\"https://doi.org/10.1007/s12599-020-00646-z\">10.1007/s12599-020-00646-z</a>.","ama":"Beverungen D, Buijs JCAM, Becker J, et al. Seven Paradoxes of Business Process Management in a Hyper-Connected World. <i>Business &#38; Information Systems Engineering</i>. 2020;63:145-156. doi:<a href=\"https://doi.org/10.1007/s12599-020-00646-z\">10.1007/s12599-020-00646-z</a>","apa":"Beverungen, D., Buijs, J. C. A. M., Becker, J., Di Ciccio, C., van der Aalst, W. M. P., Bartelheimer, C., vom Brocke, J., Comuzzi, M., Kraume, K., Leopold, H., Matzner, M., Mendling, J., Ogonek, N., Post, T., Resinas, M., Revoredo, K., del-Río-Ortega, A., La Rosa, M., Santoro, F. M., … Wolf, V. (2020). Seven Paradoxes of Business Process Management in a Hyper-Connected World. <i>Business &#38; Information Systems Engineering</i>, <i>63</i>, 145–156. <a href=\"https://doi.org/10.1007/s12599-020-00646-z\">https://doi.org/10.1007/s12599-020-00646-z</a>","short":"D. Beverungen, J.C.A.M. Buijs, J. Becker, C. Di Ciccio, W.M.P. van der Aalst, C. Bartelheimer, J. vom Brocke, M. Comuzzi, K. Kraume, H. Leopold, M. Matzner, J. Mendling, N. Ogonek, T. Post, M. Resinas, K. Revoredo, A. del-Río-Ortega, M. La Rosa, F.M. Santoro, A. Solti, M. Song, A. Stein, M. Stierle, V. Wolf, Business &#38; Information Systems Engineering 63 (2020) 145–156.","mla":"Beverungen, Daniel, et al. “Seven Paradoxes of Business Process Management in a Hyper-Connected World.” <i>Business &#38; Information Systems Engineering</i>, vol. 63, SpringerNature, 2020, pp. 145–56, doi:<a href=\"https://doi.org/10.1007/s12599-020-00646-z\">10.1007/s12599-020-00646-z</a>.","bibtex":"@article{Beverungen_Buijs_Becker_Di Ciccio_van der Aalst_Bartelheimer_vom Brocke_Comuzzi_Kraume_Leopold_et al._2020, title={Seven Paradoxes of Business Process Management in a Hyper-Connected World}, volume={63}, DOI={<a href=\"https://doi.org/10.1007/s12599-020-00646-z\">10.1007/s12599-020-00646-z</a>}, journal={Business &#38; Information Systems Engineering}, publisher={SpringerNature}, author={Beverungen, Daniel and Buijs, Joos C. A. M. and Becker, Jörg and Di Ciccio, Claudio and van der Aalst, Wil M. P. and Bartelheimer, Christian and vom Brocke, Jan and Comuzzi, Marco and Kraume, Karsten and Leopold, Henrik and et al.}, year={2020}, pages={145–156} }"},"date_updated":"2024-04-18T12:50:57Z","volume":63,"author":[{"last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677","first_name":"Daniel"},{"last_name":"Buijs","full_name":"Buijs, Joos C. A. M.","first_name":"Joos C. A. M."},{"full_name":"Becker, Jörg","last_name":"Becker","first_name":"Jörg"},{"first_name":"Claudio","full_name":"Di Ciccio, Claudio","last_name":"Di Ciccio"},{"last_name":"van der Aalst","full_name":"van der Aalst, Wil M. P.","first_name":"Wil M. P."},{"full_name":"Bartelheimer, Christian","id":"49160","last_name":"Bartelheimer","first_name":"Christian"},{"first_name":"Jan","full_name":"vom Brocke, Jan","last_name":"vom Brocke"},{"full_name":"Comuzzi, Marco","last_name":"Comuzzi","first_name":"Marco"},{"first_name":"Karsten","full_name":"Kraume, Karsten","last_name":"Kraume"},{"first_name":"Henrik","last_name":"Leopold","full_name":"Leopold, Henrik"},{"full_name":"Matzner, Martin","last_name":"Matzner","first_name":"Martin"},{"first_name":"Jan","full_name":"Mendling, Jan","last_name":"Mendling"},{"first_name":"Nadine","full_name":"Ogonek, Nadine","last_name":"Ogonek"},{"last_name":"Post","full_name":"Post, Till","first_name":"Till"},{"first_name":"Manuel","last_name":"Resinas","full_name":"Resinas, Manuel"},{"first_name":"Kate","last_name":"Revoredo","full_name":"Revoredo, Kate"},{"full_name":"del-Río-Ortega, Adela","last_name":"del-Río-Ortega","first_name":"Adela"},{"full_name":"La Rosa, Marcello","last_name":"La Rosa","first_name":"Marcello"},{"full_name":"Santoro, Flávia Maria","last_name":"Santoro","first_name":"Flávia Maria"},{"last_name":"Solti","full_name":"Solti, Andreas","first_name":"Andreas"},{"last_name":"Song","full_name":"Song, Minseok","first_name":"Minseok"},{"last_name":"Stein","full_name":"Stein, Armin","first_name":"Armin"},{"last_name":"Stierle","full_name":"Stierle, Matthias","first_name":"Matthias"},{"id":"23633","full_name":"Wolf, Verena","last_name":"Wolf","first_name":"Verena"}],"doi":"10.1007/s12599-020-00646-z","publication":"Business & Information Systems Engineering","abstract":[{"lang":"eng","text":"Business Process Management is a boundary-spanning discipline that aligns operational capabilities and technology to design and manage business processes. The Digital Transformation has enabled human actors, information systems, and smart products to interact with each other via multiple digital channels. The emergence of this hyper-connected world greatly leverages the prospects of business processes – but also boosts their complexity to a new level. We need to discuss how the BPM discipline can find new ways for identifying, analyzing, designing, implementing, executing, and monitoring business processes. In this research note, selected transformative trends are explored and their impact on current theories and IT artifacts in the BPM discipline is discussed to stimulate transformative thinking and prospective research in this field."}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"Business_Process_Management_in_a_Hyperconnected_World.pdf","file_id":"53574","file_size":360869,"creator":"dabe","date_created":"2024-04-18T12:49:25Z","date_updated":"2024-04-18T12:49:25Z"}],"keyword":["Business process management (BPM)","Social computing","Smart devices","Big data analytics","Real-time computing","BPM life-cycle"],"ddc":["380"],"language":[{"iso":"eng"}],"quality_controlled":"1","year":"2020","publisher":"SpringerNature","date_created":"2020-06-24T10:40:45Z","title":"Seven Paradoxes of Business Process Management in a Hyper-Connected World"},{"abstract":[{"text":"Creativity is perceived to be one of the core competences to succeed in the modern world. It is\r\nconnected to art, music, dancing, etc., but there is just little insight into the role of creativity in\r\nscience. As data analysis plays a major role in science, creative thinking has to be used to form\r\ntheories out of observations. This study uses models-of-data to represent the mental model of\r\nthe students. Within models-of-data different observations and previous knowledge are linked\r\nthrough different types of links, e.g. causal links. The goal of this study was to examine the\r\ncreative aspect of data evaluation in presence of anomalous data. The students were confronted\r\nwith two experiments which contradicted each other with regard to the underlying theory.\r\nAfterwards the students were asked to decide about their favored theory and reasoning about\r\ntheir choice in their lab reports. The model-of-data, which was reconstructed from the lab\r\nreports of the students, was used to extract creative aspects in the mental modelling process.\r\nFurthermore, a pre-post-questionnaire on epistemological beliefs of the students was\r\nconducted. Students mostly acquired an unscientific view on epistemology in school. The\r\nquestion was whether the confrontation with anomalous data and the triggering of creative\r\nmodelling processes have any influence on this.\r\nThe results show that most students did not take anomalous data into account in their modelling\r\nprocesses. They did either not recognise or just ignore the data. Just a few students worked on\r\ntheir theory because of the new, contradictory data. The students working on their theory\r\nscored higher in the post-questionnaire, so a positive effect of creativity on scientific\r\nepistemology can be assumed. Thus, creativity obviously gets a part of science and should be\r\ntaught in school science in order to make students aware of their own creative potential.","lang":"eng"}],"publication":"The beauty and pleasure of understanding: engaging with contemporary challenges through science education. Electronic Proceedings of the ESERA 2019 Conference. ","language":[{"iso":"eng"}],"keyword":["epistemology","conceptual change","anomalous data"],"ddc":["370"],"year":"2019","quality_controlled":"1","title":"Creativity in data analysis through confrontation with anomalous data","date_created":"2021-09-03T12:45:24Z","publisher":"ALMA MATER STUDIORUM - University of Bologna","status":"public","editor":[{"first_name":"Olivia","full_name":"Levrini, Olivia","last_name":"Levrini"},{"first_name":"Giulia","last_name":"Tasquir","full_name":"Tasquir, Giulia"},{"full_name":"Kaya, Ebru","last_name":"Kaya","first_name":"Ebru"},{"first_name":"Veli-Matti","last_name":"Vesterinen","full_name":"Vesterinen, Veli-Matti"}],"type":"conference","department":[{"_id":"386"}],"user_id":"54823","_id":"23756","page":"751-759","citation":{"bibtex":"@inproceedings{Pollmeier_Fechner_2019, place={Bologna}, title={Creativity in data analysis through confrontation with anomalous data}, booktitle={The beauty and pleasure of understanding: engaging with contemporary challenges through science education. Electronic Proceedings of the ESERA 2019 Conference. }, publisher={ALMA MATER STUDIORUM - University of Bologna}, author={Pollmeier, Pascal and Fechner, Sabine}, editor={Levrini, Olivia and Tasquir, Giulia and Kaya, Ebru and Vesterinen, Veli-Matti}, year={2019}, pages={751–759} }","short":"P. Pollmeier, S. Fechner, in: O. Levrini, G. Tasquir, E. Kaya, V.-M. Vesterinen (Eds.), The Beauty and Pleasure of Understanding: Engaging with Contemporary Challenges through Science Education. Electronic Proceedings of the ESERA 2019 Conference. , ALMA MATER STUDIORUM - University of Bologna, Bologna, 2019, pp. 751–759.","mla":"Pollmeier, Pascal, and Sabine Fechner. “Creativity in Data Analysis through Confrontation with Anomalous Data.” <i>The Beauty and Pleasure of Understanding: Engaging with Contemporary Challenges through Science Education. Electronic Proceedings of the ESERA 2019 Conference. </i>, edited by Olivia Levrini et al., ALMA MATER STUDIORUM - University of Bologna, 2019, pp. 751–59.","apa":"Pollmeier, P., &#38; Fechner, S. (2019). Creativity in data analysis through confrontation with anomalous data. In O. Levrini, G. Tasquir, E. Kaya, &#38; V.-M. Vesterinen (Eds.), <i>The beauty and pleasure of understanding: engaging with contemporary challenges through science education. Electronic Proceedings of the ESERA 2019 Conference. </i> (pp. 751–759). ALMA MATER STUDIORUM - University of Bologna.","ama":"Pollmeier P, Fechner S. Creativity in data analysis through confrontation with anomalous data. In: Levrini O, Tasquir G, Kaya E, Vesterinen V-M, eds. <i>The Beauty and Pleasure of Understanding: Engaging with Contemporary Challenges through Science Education. Electronic Proceedings of the ESERA 2019 Conference. </i>. ALMA MATER STUDIORUM - University of Bologna; 2019:751-759.","chicago":"Pollmeier, Pascal, and Sabine Fechner. “Creativity in Data Analysis through Confrontation with Anomalous Data.” In <i>The Beauty and Pleasure of Understanding: Engaging with Contemporary Challenges through Science Education. Electronic Proceedings of the ESERA 2019 Conference. </i>, edited by Olivia Levrini, Giulia Tasquir, Ebru Kaya, and Veli-Matti Vesterinen, 751–59. Bologna: ALMA MATER STUDIORUM - University of Bologna, 2019.","ieee":"P. Pollmeier and S. Fechner, “Creativity in data analysis through confrontation with anomalous data,” in <i>The beauty and pleasure of understanding: engaging with contemporary challenges through science education. Electronic Proceedings of the ESERA 2019 Conference. </i>, Bologna, 2019, pp. 751–759."},"place":"Bologna","publication_identifier":{"unknown":["978-88-945874-0-1"]},"has_accepted_license":"1","publication_status":"published","conference":{"end_date":"2019-08-30","location":"Bologna","name":"ESERA 2019 Conference. The beauty and pleasure of understanding: engaging with contemporary challenges through science education,","start_date":"2019-08-26"},"author":[{"first_name":"Pascal","last_name":"Pollmeier","full_name":"Pollmeier, Pascal","id":"44191"},{"first_name":"Sabine","full_name":"Fechner, Sabine","id":"54823","orcid":"0000-0001-5645-5870","last_name":"Fechner"}],"date_updated":"2025-12-03T18:11:41Z"},{"language":[{"iso":"eng"}],"keyword":["Curriculum Development","Data Science","Secondary Sc","acm reference format","big data","curriculum development","data literacy","data science","educa-","interdisciplinary","secondary schools","tion"],"user_id":"21241","_id":"5910","status":"public","type":"journal_article","publication":"Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling '18","doi":"10.1145/3279720.3279737","title":"Drafting a Data Science Curriculum for Secondary Schools","author":[{"first_name":"Birte","full_name":"Heinemann, Birte","last_name":"Heinemann"},{"last_name":"Opel","full_name":"Opel, Simone","first_name":"Simone"},{"first_name":"Lea","last_name":"Budde","full_name":"Budde, Lea"},{"full_name":"Schulte, Carsten","last_name":"Schulte","first_name":"Carsten"},{"first_name":"Daniel","full_name":"Frischemeier, Daniel","last_name":"Frischemeier"},{"full_name":"Biehler, Rolf","last_name":"Biehler","first_name":"Rolf"},{"first_name":"Susanne","full_name":"Podworny, Susanne","last_name":"Podworny"},{"first_name":"Thomas","last_name":"Wassong","id":"21241","full_name":"Wassong, Thomas"}],"date_created":"2018-11-27T10:44:10Z","date_updated":"2022-01-06T07:02:47Z","citation":{"apa":"Heinemann, B., Opel, S., Budde, L., Schulte, C., Frischemeier, D., Biehler, R., … Wassong, T. (2018). Drafting a Data Science Curriculum for Secondary Schools. <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling ’18</i>, (17), 1–5. <a href=\"https://doi.org/10.1145/3279720.3279737\">https://doi.org/10.1145/3279720.3279737</a>","bibtex":"@article{Heinemann_Opel_Budde_Schulte_Frischemeier_Biehler_Podworny_Wassong_2018, title={Drafting a Data Science Curriculum for Secondary Schools}, DOI={<a href=\"https://doi.org/10.1145/3279720.3279737\">10.1145/3279720.3279737</a>}, number={17}, journal={Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling ’18}, author={Heinemann, Birte and Opel, Simone and Budde, Lea and Schulte, Carsten and Frischemeier, Daniel and Biehler, Rolf and Podworny, Susanne and Wassong, Thomas}, year={2018}, pages={1–5} }","short":"B. Heinemann, S. Opel, L. Budde, C. Schulte, D. Frischemeier, R. Biehler, S. Podworny, T. Wassong, Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling ’18 (2018) 1–5.","mla":"Heinemann, Birte, et al. “Drafting a Data Science Curriculum for Secondary Schools.” <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling ’18</i>, no. 17, 2018, pp. 1–5, doi:<a href=\"https://doi.org/10.1145/3279720.3279737\">10.1145/3279720.3279737</a>.","ama":"Heinemann B, Opel S, Budde L, et al. Drafting a Data Science Curriculum for Secondary Schools. <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling ’18</i>. 2018;(17):1-5. doi:<a href=\"https://doi.org/10.1145/3279720.3279737\">10.1145/3279720.3279737</a>","ieee":"B. Heinemann <i>et al.</i>, “Drafting a Data Science Curriculum for Secondary Schools,” <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling ’18</i>, no. 17, pp. 1–5, 2018.","chicago":"Heinemann, Birte, Simone Opel, Lea Budde, Carsten Schulte, Daniel Frischemeier, Rolf Biehler, Susanne Podworny, and Thomas Wassong. “Drafting a Data Science Curriculum for Secondary Schools.” <i>Proceedings of the 18th Koli Calling International Conference on Computing Education Research - Koli Calling ’18</i>, no. 17 (2018): 1–5. <a href=\"https://doi.org/10.1145/3279720.3279737\">https://doi.org/10.1145/3279720.3279737</a>."},"page":"1-5","year":"2018","issue":"17","publication_status":"published","publication_identifier":{"isbn":["9781450365352"]}},{"date_updated":"2022-01-06T07:01:02Z","author":[{"first_name":"Till","orcid":"0000-0003-2014-4696","last_name":"Knollmann","full_name":"Knollmann, Till","id":"39241"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"volume":11201,"conference":{"name":"20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)","start_date":"2018-11-04","end_date":"2018-11-07","location":"Tokyo"},"doi":"10.1007/978-3-030-03232-6_1","has_accepted_license":"1","citation":{"ama":"Knollmann T, Scheideler C. A Self-Stabilizing Hashed Patricia Trie. In: Izumi T, Kuznetsov P, eds. <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>. Vol 11201. Lecture Notes of Computer Science. Springer, Cham; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">10.1007/978-3-030-03232-6_1</a>","ieee":"T. Knollmann and C. Scheideler, “A Self-Stabilizing Hashed Patricia Trie,” in <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, Tokyo, 2018, vol. 11201.","chicago":"Knollmann, Till, and Christian Scheideler. “A Self-Stabilizing Hashed Patricia Trie.” In <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, edited by Taisuke Izumi and Petr Kuznetsov, Vol. 11201. Lecture Notes of Computer Science. Springer, Cham, 2018. <a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">https://doi.org/10.1007/978-3-030-03232-6_1</a>.","apa":"Knollmann, T., &#38; Scheideler, C. (2018). A Self-Stabilizing Hashed Patricia Trie. In T. Izumi &#38; P. Kuznetsov (Eds.), <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i> (Vol. 11201). Tokyo: Springer, Cham. <a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">https://doi.org/10.1007/978-3-030-03232-6_1</a>","bibtex":"@inproceedings{Knollmann_Scheideler_2018, series={Lecture Notes of Computer Science}, title={A Self-Stabilizing Hashed Patricia Trie}, volume={11201}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">10.1007/978-3-030-03232-6_1</a>}, booktitle={Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}, publisher={Springer, Cham}, author={Knollmann, Till and Scheideler, Christian}, editor={Izumi, Taisuke and Kuznetsov, PetrEditors}, year={2018}, collection={Lecture Notes of Computer Science} }","mla":"Knollmann, Till, and Christian Scheideler. “A Self-Stabilizing Hashed Patricia Trie.” <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, edited by Taisuke Izumi and Petr Kuznetsov, vol. 11201, Springer, Cham, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-030-03232-6_1\">10.1007/978-3-030-03232-6_1</a>.","short":"T. Knollmann, C. Scheideler, in: T. Izumi, P. Kuznetsov (Eds.), Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Springer, Cham, 2018."},"intvolume":"     11201","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"_id":"4411","user_id":"39241","series_title":"Lecture Notes of Computer Science","department":[{"_id":"63"},{"_id":"79"}],"file_date_updated":"2018-11-02T14:38:37Z","type":"conference","editor":[{"first_name":"Taisuke","last_name":"Izumi","full_name":"Izumi, Taisuke"},{"last_name":"Kuznetsov","full_name":"Kuznetsov, Petr","first_name":"Petr"}],"status":"public","publisher":"Springer, Cham","date_created":"2018-09-17T13:12:18Z","title":"A Self-Stabilizing Hashed Patricia Trie","year":"2018","external_id":{"arxiv":["1809.04923"]},"ddc":["000"],"keyword":["Self-Stabilizing","Prefix Search","Distributed Data Structure"],"language":[{"iso":"eng"}],"publication":"Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)","abstract":[{"lang":"eng","text":"While a lot of research in distributed computing has covered solutions for self-stabilizing computing and topologies, there is far less work on self-stabilization for distributed data structures.\r\nConsidering crashing peers in peer-to-peer networks, it should not be taken for granted that a distributed data structure remains intact.\r\nIn this work, we present a self-stabilizing protocol for a distributed data structure called the hashed Patricia Trie (Kniesburges and Scheideler WALCOM'11) that enables efficient prefix search on a set of keys.\r\nThe data structure has a wide area of applications including string matching problems while offering low overhead and efficient operations when embedded on top of a distributed hash table.\r\nEspecially, longest prefix matching for $x$ can be done in $\\mathcal{O}(\\log |x|)$ hash table read accesses.\r\nWe show how to maintain the structure in a self-stabilizing way.\r\nOur protocol assures low overhead in a legal state and a total (asymptotically optimal) memory demand of $\\Theta(d)$ bits, where $d$ is the number of bits needed for storing all keys."}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"ups","date_created":"2018-11-02T14:38:37Z","date_updated":"2018-11-02T14:38:37Z","file_id":"5277","access_level":"closed","file_name":"ASelf-stabilizingHashedPatrici.pdf","file_size":500005}]},{"publication_status":"published","publication_identifier":{"isbn":["978-989-758-245-5"]},"has_accepted_license":"1","citation":{"ama":"Kersting J, Geierhos M, Jung H, Kim T. Internet of Things Architecture for Handling Stream Air Pollution Data. In: Ramachandran M, Méndez Muñoz V, Kantere V, Wills G, Walters R, Chang V, eds. <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>. Setúbal, Portugal: SCITEPRESS; 2017:117-124. doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>","ieee":"J. Kersting, M. Geierhos, H. Jung, and T. Kim, “Internet of Things Architecture for Handling Stream Air Pollution Data,” in <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, Porto, Portugal, 2017, pp. 117–124.","chicago":"Kersting, Joschka, Michaela Geierhos, Hanmin Jung, and Taehong Kim. “Internet of Things Architecture for Handling Stream Air Pollution Data.” In <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran, Víctor Méndez Muñoz, Verena Kantere, Gary Wills, Robert Walters, and Victor Chang, 117–24. Setúbal, Portugal: SCITEPRESS, 2017. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>.","short":"J. Kersting, M. Geierhos, H. Jung, T. Kim, in: M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, V. Chang (Eds.), Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, SCITEPRESS, Setúbal, Portugal, 2017, pp. 117–124.","bibtex":"@inproceedings{Kersting_Geierhos_Jung_Kim_2017, place={Setúbal, Portugal}, title={Internet of Things Architecture for Handling Stream Air Pollution Data}, DOI={<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>}, booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security}, publisher={SCITEPRESS}, author={Kersting, Joschka and Geierhos, Michaela and Jung, Hanmin and Kim, Taehong}, editor={Ramachandran, Muthu and Méndez Muñoz, Víctor and Kantere, Verena and Wills, Gary and Walters, Robert and Chang, VictorEditors}, year={2017}, pages={117–124} }","mla":"Kersting, Joschka, et al. “Internet of Things Architecture for Handling Stream Air Pollution Data.” <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i>, edited by Muthu Ramachandran et al., SCITEPRESS, 2017, pp. 117–24, doi:<a href=\"https://doi.org/10.5220/0006354801170124\">10.5220/0006354801170124</a>.","apa":"Kersting, J., Geierhos, M., Jung, H., &#38; Kim, T. (2017). Internet of Things Architecture for Handling Stream Air Pollution Data. In M. Ramachandran, V. Méndez Muñoz, V. Kantere, G. Wills, R. Walters, &#38; V. Chang (Eds.), <i>Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security</i> (pp. 117–124). Setúbal, Portugal: SCITEPRESS. <a href=\"https://doi.org/10.5220/0006354801170124\">https://doi.org/10.5220/0006354801170124</a>"},"page":"117-124","place":"Setúbal, Portugal","author":[{"id":"58701","full_name":"Kersting, Joschka","last_name":"Kersting","first_name":"Joschka"},{"last_name":"Geierhos","orcid":"0000-0002-8180-5606","id":"42496","full_name":"Geierhos, Michaela","first_name":"Michaela"},{"first_name":"Hanmin","full_name":"Jung, Hanmin","last_name":"Jung"},{"full_name":"Kim, Taehong","last_name":"Kim","first_name":"Taehong"}],"date_updated":"2022-01-06T06:51:03Z","doi":"10.5220/0006354801170124","conference":{"name":"2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017)","start_date":"2017-04-24","end_date":"2017-04-26","location":"Porto, Portugal"},"type":"conference","status":"public","editor":[{"last_name":"Ramachandran","full_name":"Ramachandran, Muthu","first_name":"Muthu"},{"first_name":"Víctor","last_name":"Méndez Muñoz","full_name":"Méndez Muñoz, Víctor"},{"first_name":"Verena","full_name":"Kantere, Verena","last_name":"Kantere"},{"full_name":"Wills, Gary","last_name":"Wills","first_name":"Gary"},{"first_name":"Robert","last_name":"Walters","full_name":"Walters, Robert"},{"first_name":"Victor","full_name":"Chang, Victor","last_name":"Chang"}],"user_id":"58701","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"_id":"1156","file_date_updated":"2020-09-18T09:09:27Z","quality_controlled":"1","year":"2017","date_created":"2018-01-31T14:45:21Z","publisher":"SCITEPRESS","title":"Internet of Things Architecture for Handling Stream Air Pollution Data","publication":"Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"jkers","date_created":"2020-09-18T09:09:27Z","date_updated":"2020-09-18T09:09:27Z","access_level":"closed","file_name":"IoTBDS_2017_50_final.pdf","file_id":"19567","file_size":2612566}],"abstract":[{"text":"In this paper, we present an IoT architecture which handles stream sensor data of air pollution. Particle pollution is known as a serious threat to human health. Along with developments in the use of wireless sensors and the IoT, we propose an architecture that flexibly measures and processes stream data collected in real-time by movable and low-cost IoT sensors. Thus, it enables a wide-spread network of wireless sensors that can follow changes in human behavior. Apart from stating reasons for the need of such a development and its requirements, we provide a conceptual design as well as a technological design of such an architecture. The technological design consists of Kaa and Apache Storm which can collect air pollution information in real-time and solve various problems to process data such as missing data and synchronization. This enables us to add a simulation in which we provide issues that might come up when having our architecture in use. Together with these issues, we state r easons for choosing specific modules among candidates. Our architecture combines wireless sensors with the Kaa IoT framework, an Apache Kafka pipeline and an Apache Storm Data Stream Management System among others. We even provide open-government data sets that are freely available.","lang":"eng"}],"language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Wireless Sensor Network","Internet of Things","Stream Data","Air Pollution","DSMS","Real-time Data Processing"]},{"intvolume":"       756","page":"77-89","citation":{"bibtex":"@inbook{Bäumer_Grote_Kersting_Geierhos_2017, place={Cham, Switzerland}, series={Communications in Computer and Information Science}, title={Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews}, volume={756}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-67642-5_7\">10.1007/978-3-319-67642-5_7</a>}, booktitle={Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings}, publisher={Springer}, author={Bäumer, Frederik Simon and Grote, Nicolai and Kersting, Joschka and Geierhos, Michaela}, editor={Damaševičius, Robertas and Mikašytė, VíctorEditors}, year={2017}, pages={77–89}, collection={Communications in Computer and Information Science} }","mla":"Bäumer, Frederik Simon, et al. “Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews.” <i>Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings</i>, edited by Robertas Damaševičius and Víctor Mikašytė, vol. 756, Springer, 2017, pp. 77–89, doi:<a href=\"https://doi.org/10.1007/978-3-319-67642-5_7\">10.1007/978-3-319-67642-5_7</a>.","short":"F.S. Bäumer, N. Grote, J. Kersting, M. Geierhos, in: R. Damaševičius, V. Mikašytė (Eds.), Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings, Springer, Cham, Switzerland, 2017, pp. 77–89.","apa":"Bäumer, F. S., Grote, N., Kersting, J., &#38; Geierhos, M. (2017). Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews. In R. Damaševičius &#38; V. Mikašytė (Eds.), <i>Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings</i> (Vol. 756, pp. 77–89). Cham, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-67642-5_7\">https://doi.org/10.1007/978-3-319-67642-5_7</a>","chicago":"Bäumer, Frederik Simon, Nicolai Grote, Joschka Kersting, and Michaela Geierhos. “Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews.” In <i>Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings</i>, edited by Robertas Damaševičius and Víctor Mikašytė, 756:77–89. Communications in Computer and Information Science. Cham, Switzerland: Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-67642-5_7\">https://doi.org/10.1007/978-3-319-67642-5_7</a>.","ieee":"F. S. Bäumer, N. Grote, J. Kersting, and M. Geierhos, “Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews,” in <i>Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings</i>, vol. 756, R. Damaševičius and V. Mikašytė, Eds. Cham, Switzerland: Springer, 2017, pp. 77–89.","ama":"Bäumer FS, Grote N, Kersting J, Geierhos M. Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews. In: Damaševičius R, Mikašytė V, eds. <i>Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings</i>. Vol 756. Communications in Computer and Information Science. Cham, Switzerland: Springer; 2017:77-89. doi:<a href=\"https://doi.org/10.1007/978-3-319-67642-5_7\">10.1007/978-3-319-67642-5_7</a>"},"place":"Cham, Switzerland","publication_identifier":{"isbn":["978-3-319-67641-8"],"eisbn":["978-3-319-67642-5"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1007/978-3-319-67642-5_7","conference":{"name":"23rd International Conference on Information and Software Technologies (ICIST 2017)","start_date":"2017-10-12","end_date":"2017-10-14","location":"Druskininkai, Lithuania"},"volume":756,"author":[{"first_name":"Frederik Simon","last_name":"Bäumer","full_name":"Bäumer, Frederik Simon","id":"38837"},{"last_name":"Grote","full_name":"Grote, Nicolai","first_name":"Nicolai"},{"first_name":"Joschka","last_name":"Kersting","full_name":"Kersting, Joschka","id":"58701"},{"full_name":"Geierhos, Michaela","id":"42496","last_name":"Geierhos","orcid":"0000-0002-8180-5606","first_name":"Michaela"}],"date_updated":"2022-01-06T06:51:04Z","status":"public","editor":[{"last_name":"Damaševičius","full_name":"Damaševičius, Robertas","first_name":"Robertas"},{"last_name":"Mikašytė","full_name":"Mikašytė, Víctor","first_name":"Víctor"}],"type":"book_chapter","file_date_updated":"2020-09-18T09:21:45Z","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"user_id":"58701","series_title":"Communications in Computer and Information Science","_id":"1161","year":"2017","quality_controlled":"1","title":"Privacy Matters: Detecting Nocuous Patient Data Exposure in Online Physician Reviews","date_created":"2018-02-01T09:17:36Z","publisher":"Springer","file":[{"file_name":"Bäumer et al. (2017), Bäumer2017_Original.pdf","file_id":"19570","access_level":"closed","file_size":770358,"date_created":"2020-09-18T09:21:45Z","creator":"jkers","date_updated":"2020-09-18T09:21:45Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Consulting a physician was long regarded as an intimate and private matter. The physician-patient relationship was perceived as sensitive and trustful. Nowadays, there is a change, as medical procedures and physicians consultations are reviewed like other services on the Internet. To allay user’s privacy doubts, physician review websites assure anonymity and the protection of private data. However, there are hundreds of reviews that reveal private information and hence enable physicians or the public to identify patients. Thus, we draw attention to the cases when de-anonymization is possible. We therefore introduce an approach that highlights private information in physician reviews for users to avoid an accidental disclosure. For this reason, we combine established natural-language-processing techniques such as named entity recognition as well as handcrafted patterns to achieve a high detection accuracy. That way, we can help websites to increase privacy protection by recognizing and uncovering apparently uncritical information in user-generated texts."}],"publication":"Information and Software Technologies: 23rd International Conference, ICIST 2017, Druskininkai, Lithuania, October 12–14, 2017, Proceedings","language":[{"iso":"eng"}],"keyword":["Physician Reviews","User Privacy","Nocuous Data Exposure"],"ddc":["000"]},{"year":"2017","publisher":"IEEE","date_created":"2018-11-26T11:49:31Z","title":"Linking Services to Websites by Leveraging Semantic Data","publication":"2017 IEEE International Conference on Web Services (ICWS)","abstract":[{"lang":"eng","text":"Websites increasingly embed semantic data for search engine optimization. The most common ontology for semantic data, schema.org, is supported by all major search engines and describes over 500 data types, including calendar events, recipes, products, and TV shows. As of today, users wishing to pass this data to their favorite applications, e.g., their calendars, cookbooks, price comparison applications or even smart devices such as TV receivers, rely on cumbersome and error-prone workarounds such as reentering the data or a series of copy and paste operations. In this paper, we present Semantic Data Mediator (SDM), an approach that allows the easy transfer of semantic data to a multitude of services, ranging from web services to applications installed on different devices. SDM extracts semantic data from the currently displayed web page on the client-side, offers suitable services to the user, and by the press of a button, forwards this data to the desired service while doing all the necessary data conversion and service interface adaptation in between. To realize this, we built a reusable repository of service descriptions, data converters, and service adapters, which can be extended by the crowd. Our approach for linking services to websites relies solely on semantic data and does not require any additional support by either website or service developers. We have fully implemented our approach and present a real-world case study demonstrating its feasibility and usefulness."}],"keyword":["Services","Websites","Semantic Data","schema.org","Data Conversion","Interface Adaptation","Mediation"],"language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9781538607527"]},"publication_status":"published","citation":{"apa":"Wolters, D., Heindorf, S., Kirchhoff, J., &#38; Engels, G. (2017). Linking Services to Websites by Leveraging Semantic Data. In I. Altintas &#38; S. Chen (Eds.), <i>2017 IEEE International Conference on Web Services (ICWS)</i>. IEEE. <a href=\"https://doi.org/10.1109/icws.2017.80\">https://doi.org/10.1109/icws.2017.80</a>","short":"D. Wolters, S. Heindorf, J. Kirchhoff, G. Engels, in: I. Altintas, S. Chen (Eds.), 2017 IEEE International Conference on Web Services (ICWS), IEEE, 2017.","bibtex":"@inproceedings{Wolters_Heindorf_Kirchhoff_Engels_2017, title={Linking Services to Websites by Leveraging Semantic Data}, DOI={<a href=\"https://doi.org/10.1109/icws.2017.80\">10.1109/icws.2017.80</a>}, booktitle={2017 IEEE International Conference on Web Services (ICWS)}, publisher={IEEE}, author={Wolters, Dennis and Heindorf, Stefan and Kirchhoff, Jonas and Engels, Gregor}, editor={Altintas, Ilkay and Chen, Shiping}, year={2017} }","mla":"Wolters, Dennis, et al. “Linking Services to Websites by Leveraging Semantic Data.” <i>2017 IEEE International Conference on Web Services (ICWS)</i>, edited by Ilkay Altintas and Shiping Chen, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/icws.2017.80\">10.1109/icws.2017.80</a>.","ama":"Wolters D, Heindorf S, Kirchhoff J, Engels G. Linking Services to Websites by Leveraging Semantic Data. In: Altintas I, Chen S, eds. <i>2017 IEEE International Conference on Web Services (ICWS)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/icws.2017.80\">10.1109/icws.2017.80</a>","chicago":"Wolters, Dennis, Stefan Heindorf, Jonas Kirchhoff, and Gregor Engels. “Linking Services to Websites by Leveraging Semantic Data.” In <i>2017 IEEE International Conference on Web Services (ICWS)</i>, edited by Ilkay Altintas and Shiping Chen. IEEE, 2017. <a href=\"https://doi.org/10.1109/icws.2017.80\">https://doi.org/10.1109/icws.2017.80</a>.","ieee":"D. Wolters, S. Heindorf, J. Kirchhoff, and G. Engels, “Linking Services to Websites by Leveraging Semantic Data,” in <i>2017 IEEE International Conference on Web Services (ICWS)</i>, 2017, doi: <a href=\"https://doi.org/10.1109/icws.2017.80\">10.1109/icws.2017.80</a>."},"date_updated":"2022-10-15T20:01:55Z","oa":"1","author":[{"first_name":"Dennis","id":"11308","full_name":"Wolters, Dennis","last_name":"Wolters"},{"id":"11871","full_name":"Heindorf, Stefan","orcid":"0000-0002-4525-6865","last_name":"Heindorf","first_name":"Stefan"},{"id":"39928","full_name":"Kirchhoff, Jonas","last_name":"Kirchhoff","first_name":"Jonas"},{"first_name":"Gregor","last_name":"Engels","full_name":"Engels, Gregor","id":"107"}],"doi":"10.1109/icws.2017.80","main_file_link":[{"open_access":"1","url":"https://cs.uni-paderborn.de/fileadmin/informatik/fg/dbis/Publikationen/2017/wolters2017_ICWS.pdf"}],"type":"conference","editor":[{"first_name":"Ilkay","full_name":"Altintas, Ilkay","last_name":"Altintas"},{"first_name":"Shiping","full_name":"Chen, Shiping","last_name":"Chen"}],"status":"public","_id":"5829","department":[{"_id":"66"}],"user_id":"11871"},{"date_updated":"2024-04-18T12:59:57Z","volume":99,"author":[{"first_name":"Benjamin","full_name":"Barann, Benjamin","last_name":"Barann"},{"last_name":"Beverungen","full_name":"Beverungen, Daniel","id":"59677","first_name":"Daniel"},{"first_name":"Oliver","id":"72849","full_name":"Müller, Oliver","last_name":"Müller"}],"doi":"10.1016/j.dss.2017.05.008","publication_status":"published","page":"86-95","intvolume":"        99","citation":{"chicago":"Barann, Benjamin, Daniel Beverungen, and Oliver Müller. “An Open-Data Approach for Quantifying the Potential of Taxi Ridesharing.” <i>Decision Support Systems</i> 99, no. July 2017 (2017): 86–95. <a href=\"https://doi.org/10.1016/j.dss.2017.05.008\">https://doi.org/10.1016/j.dss.2017.05.008</a>.","ieee":"B. Barann, D. Beverungen, and O. Müller, “An open-data approach for quantifying the potential of taxi ridesharing,” <i>Decision Support Systems</i>, vol. 99, no. July 2017, pp. 86–95, 2017, doi: <a href=\"https://doi.org/10.1016/j.dss.2017.05.008\">10.1016/j.dss.2017.05.008</a>.","ama":"Barann B, Beverungen D, Müller O. An open-data approach for quantifying the potential of taxi ridesharing. <i>Decision Support Systems</i>. 2017;99(July 2017):86-95. doi:<a href=\"https://doi.org/10.1016/j.dss.2017.05.008\">10.1016/j.dss.2017.05.008</a>","short":"B. Barann, D. Beverungen, O. Müller, Decision Support Systems 99 (2017) 86–95.","mla":"Barann, Benjamin, et al. “An Open-Data Approach for Quantifying the Potential of Taxi Ridesharing.” <i>Decision Support Systems</i>, vol. 99, no. July 2017, Elsevier, 2017, pp. 86–95, doi:<a href=\"https://doi.org/10.1016/j.dss.2017.05.008\">10.1016/j.dss.2017.05.008</a>.","bibtex":"@article{Barann_Beverungen_Müller_2017, title={An open-data approach for quantifying the potential of taxi ridesharing}, volume={99}, DOI={<a href=\"https://doi.org/10.1016/j.dss.2017.05.008\">10.1016/j.dss.2017.05.008</a>}, number={July 2017}, journal={Decision Support Systems}, publisher={Elsevier}, author={Barann, Benjamin and Beverungen, Daniel and Müller, Oliver}, year={2017}, pages={86–95} }","apa":"Barann, B., Beverungen, D., &#38; Müller, O. (2017). An open-data approach for quantifying the potential of taxi ridesharing. <i>Decision Support Systems</i>, <i>99</i>(July 2017), 86–95. <a href=\"https://doi.org/10.1016/j.dss.2017.05.008\">https://doi.org/10.1016/j.dss.2017.05.008</a>"},"_id":"2856","department":[{"_id":"526"}],"user_id":"59677","article_type":"original","type":"journal_article","status":"public","publisher":"Elsevier","date_created":"2018-05-24T08:48:58Z","title":"An open-data approach for quantifying the potential of taxi ridesharing","quality_controlled":"1","issue":"July 2017","year":"2017","keyword":["Taxi ridesharing Collaborative consumption Transportation Open data Sustainability Shared mobility"],"language":[{"iso":"eng"}],"publication":"Decision Support Systems","abstract":[{"text":"Taxi ridesharing1 (TRS) is an advanced form of urban transportation that matches separate ride requests with similar spatio-temporal characteristics to a jointly used taxi. As collaborative consumption, TRS saves customers money, enables taxi companies to economize use of their resources, and lowers greenhouse gas emissions. We develop a one-to-one TRS approach that matches rides with similar start and end points. We evaluate our approach by analyzing an open dataset of > 5 million taxi trajectories in New York City. Our empirical analysis reveals that the proposed approach matches up to 48.34% of all taxi rides, saving 2,892,036 km of travel distance, 231,362.89 l of gas, and 532,134.64 kg of CO2 emissions per week. Compared to many-to-many TRS approaches, our approach is competitive, simpler to implement and operate, and poses less rigid assumptions on data availability and customer acceptance.","lang":"eng"}]},{"date_created":"2018-10-12T08:29:46Z","author":[{"first_name":"Oliver","last_name":"Müller","full_name":"Müller, Oliver","id":"72849"},{"first_name":"Iris","full_name":"Junglas, Iris","last_name":"Junglas"},{"first_name":"Jan","last_name":"vom Brocke","full_name":"vom Brocke, Jan"},{"first_name":"Stefan","last_name":"Debortoli","full_name":"Debortoli, Stefan"}],"date_updated":"2022-01-06T07:01:18Z","doi":"10.1057/ejis.2016.2","title":"Utilizing big data analytics for information systems research: Challenges, promises and guidelines","issue":"4","publication_identifier":{"issn":["14769344"],"isbn":["0960-085X"]},"page":"289--302","citation":{"ama":"Müller O, Junglas I, vom Brocke J, Debortoli S. Utilizing big data analytics for information systems research: Challenges, promises and guidelines. <i>European Journal of Information Systems</i>. 2016;(4):289--302. doi:<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>","chicago":"Müller, Oliver, Iris Junglas, Jan vom Brocke, and Stefan Debortoli. “Utilizing Big Data Analytics for Information Systems Research: Challenges, Promises and Guidelines.” <i>European Journal of Information Systems</i>, no. 4 (2016): 289--302. <a href=\"https://doi.org/10.1057/ejis.2016.2\">https://doi.org/10.1057/ejis.2016.2</a>.","ieee":"O. Müller, I. Junglas, J. vom Brocke, and S. Debortoli, “Utilizing big data analytics for information systems research: Challenges, promises and guidelines,” <i>European Journal of Information Systems</i>, no. 4, pp. 289--302, 2016.","apa":"Müller, O., Junglas, I., vom Brocke, J., &#38; Debortoli, S. (2016). Utilizing big data analytics for information systems research: Challenges, promises and guidelines. <i>European Journal of Information Systems</i>, (4), 289--302. <a href=\"https://doi.org/10.1057/ejis.2016.2\">https://doi.org/10.1057/ejis.2016.2</a>","mla":"Müller, Oliver, et al. “Utilizing Big Data Analytics for Information Systems Research: Challenges, Promises and Guidelines.” <i>European Journal of Information Systems</i>, no. 4, 2016, pp. 289--302, doi:<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>.","bibtex":"@article{Müller_Junglas_vom Brocke_Debortoli_2016, title={Utilizing big data analytics for information systems research: Challenges, promises and guidelines}, DOI={<a href=\"https://doi.org/10.1057/ejis.2016.2\">10.1057/ejis.2016.2</a>}, number={4}, journal={European Journal of Information Systems}, author={Müller, Oliver and Junglas, Iris and vom Brocke, Jan and Debortoli, Stefan}, year={2016}, pages={289--302} }","short":"O. Müller, I. Junglas, J. vom Brocke, S. Debortoli, European Journal of Information Systems (2016) 289--302."},"year":"2016","user_id":"72849","_id":"4689","language":[{"iso":"eng"}],"extern":"1","keyword":["analytics","big data","data source","information systems research","methodology"],"publication":"European Journal of Information Systems","type":"journal_article","status":"public"},{"keyword":["ensemble methods","combined prognostics","data fusion"],"language":[{"iso":"eng"}],"_id":"9947","user_id":"55222","department":[{"_id":"151"}],"abstract":[{"lang":"eng","text":"This paper presents a comparison of a number of prognostic methods with regard to algorithm complexity and performance based on prognostic metrics. This information serves as a guide for selection and design of prognostic systems for real-time condition monitoring of technical systems. The methods are evaluated on ability to estimate the remaining useful life of rolling element bearing. Run-to failure vibration and temperature data is used in the analysis. The sampled prognostic methods include wear-temperature correlation method, health state estimation using temperature measurement, a multi-model particle filter approach with model parameter adaptation utilizing temperature measurements, prognostics through health state estimation and mapping extracted features to the remaining useful life through regression approach. Although the performance of the methods utilizing the vibration measurements is much better than the methods using temperature measurements, the methods using temperature measurements are quite promising in terms of reducing the overall cost of the condition monitoring system as well as the computational time. An ensemble of the presented methods through weighted average is also introduced. The results show that the methods are able to estimate the remaining useful life within error bounds of +-15\\%, which can be further reduced to +-5\\% with the ensemble approach."}],"status":"public","type":"conference","publication":"Annual Conference of the Prognostics and Health Management Society 2015","title":"Comparison and ensemble of temperature-based and vibration-based methods for machinery prognostics","date_updated":"2019-05-27T08:25:44Z","author":[{"first_name":"James Kuria","last_name":"Kimotho","full_name":"Kimotho, James Kuria"},{"first_name":"Walter","last_name":"Sextro","id":"21220","full_name":"Sextro, Walter"}],"date_created":"2019-05-27T08:24:50Z","volume":6,"year":"2015","citation":{"chicago":"Kimotho, James Kuria, and Walter Sextro. “Comparison and Ensemble of Temperature-Based and Vibration-Based Methods for Machinery Prognostics.” In <i>Annual Conference of the Prognostics and Health Management Society 2015</i>, Vol. 6, 2015.","ieee":"J. K. Kimotho and W. Sextro, “Comparison and ensemble of temperature-based and vibration-based methods for machinery prognostics,” in <i>Annual Conference of the Prognostics and Health Management Society 2015</i>, 2015, vol. 6.","ama":"Kimotho JK, Sextro W. Comparison and ensemble of temperature-based and vibration-based methods for machinery prognostics. In: <i>Annual Conference of the Prognostics and Health Management Society 2015</i>. Vol 6. ; 2015.","apa":"Kimotho, J. K., &#38; Sextro, W. (2015). Comparison and ensemble of temperature-based and vibration-based methods for machinery prognostics. In <i>Annual Conference of the Prognostics and Health Management Society 2015</i> (Vol. 6).","short":"J.K. Kimotho, W. Sextro, in: Annual Conference of the Prognostics and Health Management Society 2015, 2015.","bibtex":"@inproceedings{Kimotho_Sextro_2015, title={Comparison and ensemble of temperature-based and vibration-based methods for machinery prognostics}, volume={6}, booktitle={Annual Conference of the Prognostics and Health Management Society 2015}, author={Kimotho, James Kuria and Sextro, Walter}, year={2015} }","mla":"Kimotho, James Kuria, and Walter Sextro. “Comparison and Ensemble of Temperature-Based and Vibration-Based Methods for Machinery Prognostics.” <i>Annual Conference of the Prognostics and Health Management Society 2015</i>, vol. 6, 2015."},"intvolume":"         6"},{"year":"2014","quality_controlled":"1","title":"Linked Open Data System for Scientific Data Sets","publisher":"CEUR-WS.org","date_created":"2018-01-30T16:03:51Z","abstract":[{"text":"In this paper, we present a system which makes scientific data available following the linked open data principle using standards like RDF and URI as well as the popular D2R server (D2R) and the customizable D2RQ mapping language. Our scientific data sets include acronym data and expansions, as well as researcher data such as author name, affiliation, coauthors, and abstracts. The system can easily be extended to other records. Regarding this, a domain adaptation to patent mining seems possible. For this reason, obvious similarities and differences are presented here. The data set is collected from several different providers like publishing houses and digital libraries, which follow different standards in data format and structure. Most of them are not supporting semantic web technologies, but the legacy HTML standard. The integration of these large amounts of scientific data into the Semantic Web is challenging and it needs flexible data structures to access this information and interlink them. Based on these data sets, we will be able to derive a general technology trend as well as the individual research domain for each researcher. The goal of our Linked Open Data System for scientific data is to provide access to this data set for other researchers using the Web of Linked Data. Furthermore we implemented an application for visualization, which allows usto explorethe relations between single data sets.","lang":"eng"}],"publication":"Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) co-located with Konvens 2014","keyword":["Linked Open Data","Researcher Data","Acronym Data","D2R"],"language":[{"iso":"eng"}],"citation":{"ieee":"F. S. Bäumer, J. Gim, D.-H. Jeong, M. Geierhos, and H. Jung, “Linked Open Data System for Scientific Data Sets,” in <i>Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) co-located with Konvens 2014</i>, Hildesheim, Germany, 2014, vol. 1292.","chicago":"Bäumer, Frederik Simon, Jangwon Gim, Do-Heon Jeong, Michaela Geierhos, and Hanmin Jung. “Linked Open Data System for Scientific Data Sets.” In <i>Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) Co-Located with Konvens 2014</i>, edited by Hanmin Jung, Thomas Mandl, Christa Womsen-Hacker, and Shuo Xu, Vol. 1292. CEUR Workshop Proceedings. CEUR-WS.org, 2014.","ama":"Bäumer FS, Gim J, Jeong D-H, Geierhos M, Jung H. Linked Open Data System for Scientific Data Sets. In: Jung H, Mandl T, Womsen-Hacker C, Xu S, eds. <i>Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) Co-Located with Konvens 2014</i>. Vol 1292. CEUR Workshop Proceedings. CEUR-WS.org; 2014.","apa":"Bäumer, F. S., Gim, J., Jeong, D.-H., Geierhos, M., &#38; Jung, H. (2014). Linked Open Data System for Scientific Data Sets. In H. Jung, T. Mandl, C. Womsen-Hacker, &#38; S. Xu (Eds.), <i>Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) co-located with Konvens 2014</i> (Vol. 1292). Hildesheim, Germany: CEUR-WS.org.","short":"F.S. Bäumer, J. Gim, D.-H. Jeong, M. Geierhos, H. Jung, in: H. Jung, T. Mandl, C. Womsen-Hacker, S. Xu (Eds.), Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) Co-Located with Konvens 2014, CEUR-WS.org, 2014.","mla":"Bäumer, Frederik Simon, et al. “Linked Open Data System for Scientific Data Sets.” <i>Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) Co-Located with Konvens 2014</i>, edited by Hanmin Jung et al., vol. 1292, CEUR-WS.org, 2014.","bibtex":"@inproceedings{Bäumer_Gim_Jeong_Geierhos_Jung_2014, series={CEUR Workshop Proceedings}, title={Linked Open Data System for Scientific Data Sets}, volume={1292}, booktitle={Proceedings of the First International Workshop on Patent Mining and Its Applications (IPaMin 2014) co-located with Konvens 2014}, publisher={CEUR-WS.org}, author={Bäumer, Frederik Simon and Gim, Jangwon and Jeong, Do-Heon and Geierhos, Michaela and Jung, Hanmin}, editor={Jung, Hanmin and Mandl, Thomas and Womsen-Hacker, Christa and Xu, ShuoEditors}, year={2014}, collection={CEUR Workshop Proceedings} }"},"intvolume":"      1292","publication_status":"published","publication_identifier":{"issn":["16130073"]},"main_file_link":[{"url":"http://ceur-ws.org/Vol-1292/ipamin2014_paper2.pdf","open_access":"1"}],"conference":{"start_date":"2014-10-06","name":"First International Workshop on Patent Mining and Its Applications (IPaMin 2014)","location":"Hildesheim, Germany","end_date":"2014-10-07"},"oa":"1","date_updated":"2022-01-06T06:51:00Z","author":[{"last_name":"Bäumer","full_name":"Bäumer, Frederik Simon","id":"38837","first_name":"Frederik Simon"},{"last_name":"Gim","full_name":"Gim, Jangwon","first_name":"Jangwon"},{"last_name":"Jeong","full_name":"Jeong, Do-Heon","first_name":"Do-Heon"},{"last_name":"Geierhos","orcid":"0000-0002-8180-5606","full_name":"Geierhos, Michaela","id":"42496","first_name":"Michaela"},{"full_name":"Jung, Hanmin","last_name":"Jung","first_name":"Hanmin"}],"volume":1292,"editor":[{"last_name":"Jung","full_name":"Jung, Hanmin","first_name":"Hanmin"},{"last_name":"Mandl","full_name":"Mandl, Thomas","first_name":"Thomas"},{"first_name":"Christa","last_name":"Womsen-Hacker","full_name":"Womsen-Hacker, Christa"},{"first_name":"Shuo","full_name":"Xu, Shuo","last_name":"Xu"}],"status":"public","type":"conference","_id":"1137","user_id":"42496","series_title":"CEUR Workshop Proceedings","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}]},{"publication_identifier":{"isbn":["978-1-4503-2738-1"]},"page":"1651-1652","citation":{"mla":"King, Thomas C., et al. “Request Driven Social Sensing.” <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>, International Foundation for Autonomous Agents and Multiagent Systems, 2014, pp. 1651–52.","short":"T.C. King, Q. Liu, G. Polevoy, M. de Weerdt, V. Dignum, M.B. van Riemsdijk, M. Warnier, in: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems, International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 2014, pp. 1651–1652.","bibtex":"@inproceedings{King_Liu_Polevoy_de Weerdt_Dignum_van Riemsdijk_Warnier_2014, place={Richland, SC}, series={AAMAS ’14}, title={Request Driven Social Sensing}, booktitle={Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems}, publisher={International Foundation for Autonomous Agents and Multiagent Systems}, author={King, Thomas C. and Liu, Qingzhi and Polevoy, Gleb and de Weerdt, Mathijs and Dignum, Virginia and van Riemsdijk, M. Birna and Warnier, Martijn}, year={2014}, pages={1651–1652}, collection={AAMAS ’14} }","apa":"King, T. C., Liu, Q., Polevoy, G., de Weerdt, M., Dignum, V., van Riemsdijk, M. B., &#38; Warnier, M. (2014). Request Driven Social Sensing. In <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems</i> (pp. 1651–1652). Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.","ama":"King TC, Liu Q, Polevoy G, et al. Request Driven Social Sensing. In: <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>. AAMAS ’14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems; 2014:1651-1652.","ieee":"T. C. King <i>et al.</i>, “Request Driven Social Sensing,” in <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems</i>, 2014, pp. 1651–1652.","chicago":"King, Thomas C., Qingzhi Liu, Gleb Polevoy, Mathijs de Weerdt, Virginia Dignum, M. Birna van Riemsdijk, and Martijn Warnier. “Request Driven Social Sensing.” In <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>, 1651–52. AAMAS ’14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems, 2014."},"place":"Richland, SC","year":"2014","author":[{"full_name":"King, Thomas C.","last_name":"King","first_name":"Thomas C."},{"full_name":"Liu, Qingzhi","last_name":"Liu","first_name":"Qingzhi"},{"first_name":"Gleb","full_name":"Polevoy, Gleb","id":"83983","last_name":"Polevoy"},{"first_name":"Mathijs","full_name":"de Weerdt, Mathijs","last_name":"de Weerdt"},{"last_name":"Dignum","full_name":"Dignum, Virginia","first_name":"Virginia"},{"full_name":"van Riemsdijk, M. Birna","last_name":"van Riemsdijk","first_name":"M. Birna"},{"first_name":"Martijn","last_name":"Warnier","full_name":"Warnier, Martijn"}],"date_created":"2020-08-06T15:21:45Z","publisher":"International Foundation for Autonomous Agents and Multiagent Systems","date_updated":"2022-01-06T06:53:16Z","title":"Request Driven Social Sensing","publication":"Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems","type":"conference","status":"public","department":[{"_id":"63"},{"_id":"541"}],"user_id":"83983","series_title":"AAMAS '14","_id":"17661","extern":"1","language":[{"iso":"eng"}],"keyword":["crowd-sensing","crowdsourcing","data aggregation","game theory","norms","reciprocation","self interested agents","simulation"]},{"doi":"10.1007/s12599-014-0344-2","title":"Comparing business intelligence and big data skills: A text mining study using job advertisements","date_created":"2018-10-12T08:30:31Z","author":[{"first_name":"Stefan","full_name":"Debortoli, Stefan","last_name":"Debortoli"},{"last_name":"Müller","full_name":"Müller, Oliver","id":"72849","first_name":"Oliver"},{"last_name":"vom Brocke","full_name":"vom Brocke, Jan","first_name":"Jan"}],"date_updated":"2022-01-06T07:01:18Z","citation":{"ama":"Debortoli S, Müller O, vom Brocke J. Comparing business intelligence and big data skills: A text mining study using job advertisements. <i>Business and Information Systems Engineering</i>. 2014;(5):289--300. doi:<a href=\"https://doi.org/10.1007/s12599-014-0344-2\">10.1007/s12599-014-0344-2</a>","chicago":"Debortoli, Stefan, Oliver Müller, and Jan vom Brocke. “Comparing Business Intelligence and Big Data Skills: A Text Mining Study Using Job Advertisements.” <i>Business and Information Systems Engineering</i>, no. 5 (2014): 289--300. <a href=\"https://doi.org/10.1007/s12599-014-0344-2\">https://doi.org/10.1007/s12599-014-0344-2</a>.","ieee":"S. Debortoli, O. Müller, and J. vom Brocke, “Comparing business intelligence and big data skills: A text mining study using job advertisements,” <i>Business and Information Systems Engineering</i>, no. 5, pp. 289--300, 2014.","apa":"Debortoli, S., Müller, O., &#38; vom Brocke, J. (2014). Comparing business intelligence and big data skills: A text mining study using job advertisements. <i>Business and Information Systems Engineering</i>, (5), 289--300. <a href=\"https://doi.org/10.1007/s12599-014-0344-2\">https://doi.org/10.1007/s12599-014-0344-2</a>","short":"S. Debortoli, O. Müller, J. vom Brocke, Business and Information Systems Engineering (2014) 289--300.","bibtex":"@article{Debortoli_Müller_vom Brocke_2014, title={Comparing business intelligence and big data skills: A text mining study using job advertisements}, DOI={<a href=\"https://doi.org/10.1007/s12599-014-0344-2\">10.1007/s12599-014-0344-2</a>}, number={5}, journal={Business and Information Systems Engineering}, author={Debortoli, Stefan and Müller, Oliver and vom Brocke, Jan}, year={2014}, pages={289--300} }","mla":"Debortoli, Stefan, et al. “Comparing Business Intelligence and Big Data Skills: A Text Mining Study Using Job Advertisements.” <i>Business and Information Systems Engineering</i>, no. 5, 2014, pp. 289--300, doi:<a href=\"https://doi.org/10.1007/s12599-014-0344-2\">10.1007/s12599-014-0344-2</a>."},"page":"289--300","year":"2014","issue":"5","publication_identifier":{"issn":["18670202"],"isbn":["0910-8327 (Print)$\\backslash$n0910-8327 (Linking)"]},"language":[{"iso":"eng"}],"extern":"1","keyword":["Big data","Business intelligence","Competencies","Latent semantic analysis","Text mining"],"user_id":"72849","_id":"4695","status":"public","type":"journal_article","publication":"Business and Information Systems Engineering"},{"publication_identifier":{"issn":["15293181"]},"page":"151--167","citation":{"apa":"vom Brocke, J., Debortoli, S., Reuter, N., &#38; Müller, O. (2014). How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti. <i>Communications of the Association for Information Systems</i>, 151--167. <a href=\"https://doi.org/10.17705/1CAIS.03407\">https://doi.org/10.17705/1CAIS.03407</a>","short":"J. vom Brocke, S. Debortoli, N. Reuter, O. Müller, Communications of the Association for Information Systems (2014) 151--167.","bibtex":"@article{vom Brocke_Debortoli_Reuter_Müller_2014, title={How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti}, DOI={<a href=\"https://doi.org/10.17705/1CAIS.03407\">10.17705/1CAIS.03407</a>}, journal={Communications of the Association for Information Systems}, author={vom Brocke, Jan and Debortoli, Stefan and Reuter, Nadine and Müller, Oliver}, year={2014}, pages={151--167} }","mla":"vom Brocke, Jan, et al. “How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti.” <i>Communications of the Association for Information Systems</i>, 2014, pp. 151--167, doi:<a href=\"https://doi.org/10.17705/1CAIS.03407\">10.17705/1CAIS.03407</a>.","ama":"vom Brocke J, Debortoli S, Reuter N, Müller O. How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti. <i>Communications of the Association for Information Systems</i>. 2014:151--167. doi:<a href=\"https://doi.org/10.17705/1CAIS.03407\">10.17705/1CAIS.03407</a>","ieee":"J. vom Brocke, S. Debortoli, N. Reuter, and O. Müller, “How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti,” <i>Communications of the Association for Information Systems</i>, pp. 151--167, 2014.","chicago":"Brocke, Jan vom, Stefan Debortoli, Nadine Reuter, and Oliver Müller. “How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti.” <i>Communications of the Association for Information Systems</i>, 2014, 151--167. <a href=\"https://doi.org/10.17705/1CAIS.03407\">https://doi.org/10.17705/1CAIS.03407</a>."},"year":"2014","author":[{"first_name":"Jan","full_name":"vom Brocke, Jan","last_name":"vom Brocke"},{"full_name":"Debortoli, Stefan","last_name":"Debortoli","first_name":"Stefan"},{"last_name":"Reuter","full_name":"Reuter, Nadine","first_name":"Nadine"},{"last_name":"Müller","id":"72849","full_name":"Müller, Oliver","first_name":"Oliver"}],"date_created":"2018-10-12T08:30:38Z","date_updated":"2022-01-06T07:01:18Z","doi":"10.17705/1CAIS.03407","title":"How In-Memory Technology Can Create Business Value: Lessons Learned from Hilti","publication":"Communications of the Association for Information Systems","type":"journal_article","status":"public","user_id":"72849","_id":"4696","language":[{"iso":"eng"}],"extern":"1","keyword":["Advanced business analytics","Big Data","Business intelligence","IT business value","In-memory technology","OLAP","OLTP","Realtime analytics","Sentiment analysis"]},{"citation":{"apa":"Kimotho, J. K., Meyer, T., &#38; Sextro, W. (2014). PEM fuel cell prognostics using particle filter with model parameter adaptation. In <i>Prognostics and Health Management (PHM), 2014 IEEE Conference on</i> (pp. 1–6). <a href=\"https://doi.org/10.1109/ICPHM.2014.7036406\">https://doi.org/10.1109/ICPHM.2014.7036406</a>","mla":"Kimotho, James Kuria, et al. “PEM Fuel Cell Prognostics Using Particle Filter with Model Parameter Adaptation.” <i>Prognostics and Health Management (PHM), 2014 IEEE Conference On</i>, 2014, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/ICPHM.2014.7036406\">10.1109/ICPHM.2014.7036406</a>.","short":"J.K. Kimotho, T. Meyer, W. Sextro, in: Prognostics and Health Management (PHM), 2014 IEEE Conference On, 2014, pp. 1–6.","bibtex":"@inproceedings{Kimotho_Meyer_Sextro_2014, title={PEM fuel cell prognostics using particle filter with model parameter adaptation}, DOI={<a href=\"https://doi.org/10.1109/ICPHM.2014.7036406\">10.1109/ICPHM.2014.7036406</a>}, booktitle={Prognostics and Health Management (PHM), 2014 IEEE Conference on}, author={Kimotho, James Kuria  and Meyer, Tobias and Sextro, Walter}, year={2014}, pages={1–6} }","chicago":"Kimotho, James Kuria , Tobias Meyer, and Walter Sextro. “PEM Fuel Cell Prognostics Using Particle Filter with Model Parameter Adaptation.” In <i>Prognostics and Health Management (PHM), 2014 IEEE Conference On</i>, 1–6, 2014. <a href=\"https://doi.org/10.1109/ICPHM.2014.7036406\">https://doi.org/10.1109/ICPHM.2014.7036406</a>.","ieee":"J. K. Kimotho, T. Meyer, and W. Sextro, “PEM fuel cell prognostics using particle filter with model parameter adaptation,” in <i>Prognostics and Health Management (PHM), 2014 IEEE Conference on</i>, 2014, pp. 1–6.","ama":"Kimotho JK, Meyer T, Sextro W. PEM fuel cell prognostics using particle filter with model parameter adaptation. In: <i>Prognostics and Health Management (PHM), 2014 IEEE Conference On</i>. ; 2014:1-6. doi:<a href=\"https://doi.org/10.1109/ICPHM.2014.7036406\">10.1109/ICPHM.2014.7036406</a>"},"page":"1-6","year":"2014","date_created":"2019-05-20T13:11:02Z","author":[{"last_name":"Kimotho","full_name":"Kimotho, James Kuria ","first_name":"James Kuria "},{"first_name":"Tobias","last_name":"Meyer","full_name":"Meyer, Tobias"},{"id":"21220","full_name":"Sextro, Walter","last_name":"Sextro","first_name":"Walter"}],"date_updated":"2019-05-20T13:12:27Z","doi":"10.1109/ICPHM.2014.7036406","title":"PEM fuel cell prognostics using particle filter with model parameter adaptation","type":"conference","publication":"Prognostics and Health Management (PHM), 2014 IEEE Conference on","status":"public","abstract":[{"text":"Application of prognostics and health management (PHM) in the field of Proton Exchange Membrane (PEM) fuel cells is emerging as an important tool in increasing the reliability and availability of these systems. Though a lot of work is currently being conducted to develop PHM systems for fuel cells, various challenges have been encountered including the self-healing effect after characterization as well as accelerated degradation due to dynamic loading, all which make RUL predictions a difficult task. In this study, a prognostic approach based on adaptive particle filter algorithm is proposed. The novelty of the proposed method lies in the introduction of a self-healing factor after each characterization and the adaption of the degradation model parameters to fit to the changing degradation trend. An ensemble of five different state models based on weighted mean is then developed. The results show that the method is effective in estimating the remaining useful life of PEM fuel cells, with majority of the predictions falling within 5\\% error. The method was employed in the IEEE 2014 PHM Data Challenge and led to our team emerging the winner of the RUL category of the challenge.","lang":"eng"}],"user_id":"55222","department":[{"_id":"151"}],"_id":"9879","language":[{"iso":"eng"}],"keyword":["ageing","particle filtering (numerical methods)","proton exchange membrane fuel cells","remaining life assessment","PEM fuel cell prognostics","PHM","RUL predictions","accelerated degradation","adaptive particle filter algorithm","dynamic loading","model parameter adaptation","prognostics and health management","proton exchange membrane fuel cells","remaining useful life estimation","self-healing effect","Adaptation models","Data models","Degradation","Estimation","Fuel cells","Mathematical model","Prognostics and health management"]},{"status":"public","abstract":[{"lang":"eng","text":"The proposed paper aims to investigate the longitudinal development of students' motivation over the first year of their studies at a business school by using latent growth curve modeling. The study tackles the following core research questions: How do first-year university students' intrinsic and extrinsic vary over time? Which (motivational) factors are related to students' motivational development? Although motivational dispositions have been analyzed extensively in previous studies, their longitudinal development has hitherto not been examined in the higher education context.\r\n\r\nThis longitudinal study is conducted at the University of St. Gallen in Switzerland. The current sample includes 280 first-year students who have been surveyed three times and who are representative of the first-year student population.\r\n\r\nDescriptive results show that prior to their studies, students were motivated most by intrinsic factors, however, extrinsic motivation was also quite high. Employing latent growth curve modeling, it could be shown that both intrinsic and extrinsic motivation decline significantly over the course of the first year (8 months).\r\n\r\nThe study contributes to motivation theory by providing further insights into the development of academic motivation over time. Latent growth curve modeling as a method can be well used for longitudinal data analysis, thus, excluding measurement error from longitudinal data. Furthermore, the study supports educational developers by determining factors influencing students' motivational development."}],"type":"conference","extern":"1","keyword":["motivation","intrinsic motivation","extrinsic motivation","latent growth curve modeling","longitudinal data analysis","ASEQ","higher education","studying"],"user_id":"51057","department":[{"_id":"208"},{"_id":"282"}],"_id":"4480","citation":{"apa":"Brahm, T., &#38; Jenert, T. (2013). A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation. Presented at the 15th Biennial EARLI Conference, München: EARLI European Association for Research on Learning and Instruction.","bibtex":"@inproceedings{Brahm_Jenert_2013, title={A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation}, publisher={EARLI European Association for Research on Learning and Instruction}, author={Brahm, Taiga and Jenert, Tobias}, year={2013} }","mla":"Brahm, Taiga, and Tobias Jenert. <i>A Latent Growth Curve Analysis of Business Students’ Intrinsic and Extrinsic Motivation</i>. EARLI European Association for Research on Learning and Instruction, 2013.","short":"T. Brahm, T. Jenert, in: EARLI European Association for Research on Learning and Instruction, 2013.","ieee":"T. Brahm and T. Jenert, “A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation,” presented at the 15th Biennial EARLI Conference, München, 2013.","chicago":"Brahm, Taiga, and Tobias Jenert. “A Latent Growth Curve Analysis of Business Students’ Intrinsic and Extrinsic Motivation.” EARLI European Association for Research on Learning and Instruction, 2013.","ama":"Brahm T, Jenert T. A latent growth curve analysis of Business students’ intrinsic and extrinsic motivation. In: EARLI European Association for Research on Learning and Instruction; 2013."},"year":"2013","conference":{"name":"15th Biennial EARLI Conference","start_date":"2013-08-27","end_date":"2013-08-31","location":"München"},"title":"A latent growth curve analysis of Business students' intrinsic and extrinsic motivation","date_created":"2018-09-19T08:27:05Z","author":[{"first_name":"Taiga","full_name":"Brahm, Taiga","last_name":"Brahm"},{"full_name":"Jenert, Tobias","id":"71994","orcid":" https://orcid.org/0000-0001-9262-5646","last_name":"Jenert","first_name":"Tobias"}],"date_updated":"2022-01-06T07:01:06Z","publisher":"EARLI European Association for Research on Learning and Instruction"}]
