@article{45299, abstract = {{Many applications are driven by Machine Learning (ML) today. While complex ML models lead to an accurate prediction, their inner decision-making is obfuscated. However, especially for high-stakes decisions, interpretability and explainability of the model are necessary. Therefore, we develop a holistic interpretability and explainability framework (HIEF) to objectively describe and evaluate an intelligent system’s explainable AI (XAI) capacities. This guides data scientists to create more transparent models. To evaluate our framework, we analyse 50 real estate appraisal papers to ensure the robustness of HIEF. Additionally, we identify six typical types of intelligent systems, so-called archetypes, which range from explanatory to predictive, and demonstrate how researchers can use the framework to identify blind-spot topics in their domain. Finally, regarding comprehensiveness, we used a random sample of six intelligent systems and conducted an applicability check to provide external validity.}}, author = {{Kucklick, Jan-Peter}}, issn = {{1246-0125}}, journal = {{Journal of Decision Systems}}, keywords = {{Explainable AI (XAI), machine learning, interpretability, real estate appraisal, framework, taxonomy}}, pages = {{1--41}}, publisher = {{Taylor & Francis}}, title = {{{HIEF: a holistic interpretability and explainability framework}}}, doi = {{10.1080/12460125.2023.2207268}}, year = {{2023}}, } @inbook{52660, abstract = {{Application Programming Interfaces (APIs) are the primary mechanism developers use to obtain access to third-party algorithms and services. Unfortunately, APIs can be misused, which can have catastrophic consequences, especially if the APIs provide security-critical functionalities like cryptography. Understanding what API misuses are, and how they are caused, is important to prevent them, eg, with API misuse detectors. However, definitions for API misuses and related terms in literature vary. This paper presents a systematic literature review to clarify these terms and introduces FUM, a novel Framework for API Usage constraint and Misuse classification. The literature review revealed that API misuses are violations of API usage constraints. To address this, we provide unified definitions and use them to derive FUM. To assess the extent to which FUM aids in determining and guiding the improvement of an API misuses detector’s capabilities, we performed a case study on the state-of the-art misuse detection tool CogniCrypt. The study showed that FUM can be used to properly assess CogniCrypt’s capabilities, identify weaknesses and assist in deriving mitigations and improvements.}}, author = {{Schlichtig, Michael and Sassalla, Steffen and Narasimhan, Krishna and Bodden, Eric}}, booktitle = {{Software Engineering 2023}}, isbn = {{978-3-88579-726-5}}, keywords = {{API misuses API usage constraints, classification framework, API misuse detection, static analysis}}, pages = {{105–106}}, publisher = {{Gesellschaft für Informatik e.V.}}, title = {{{Introducing FUM: A Framework for API Usage Constraint and Misuse Classification}}}, year = {{2023}}, } @inproceedings{31133, abstract = {{Application Programming Interfaces (APIs) are the primary mechanism that developers use to obtain access to third-party algorithms and services. Unfortunately, APIs can be misused, which can have catastrophic consequences, especially if the APIs provide security-critical functionalities like cryptography. Understanding what API misuses are, and for what reasons they are caused, is important to prevent them, e.g., with API misuse detectors. However, definitions and nominations for API misuses and related terms in literature vary and are diverse. This paper addresses the problem of scattered knowledge and definitions of API misuses by presenting a systematic literature review on the subject and introducing FUM, a novel Framework for API Usage constraint and Misuse classification. The literature review revealed that API misuses are violations of API usage constraints. To capture this, we provide unified definitions and use them to derive FUM. To assess the extent to which FUM aids in determining and guiding the improvement of an API misuses detectors' capabilities, we performed a case study on CogniCrypt, a state-of-the-art misuse detector for cryptographic APIs. The study showed that FUM can be used to properly assess CogniCrypt's capabilities, identify weaknesses and assist in deriving mitigations and improvements. And it appears that also more generally FUM can aid the development and improvement of misuse detection tools.}}, author = {{Schlichtig, Michael and Sassalla, Steffen and Narasimhan, Krishna and Bodden, Eric}}, booktitle = {{2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)}}, keywords = {{API misuses, API usage constraints, classification framework, API misuse detection, static analysis}}, pages = {{673 -- 684}}, title = {{{FUM - A Framework for API Usage constraint and Misuse Classification}}}, doi = {{https://doi.org/10.1109/SANER53432.2022.00085}}, year = {{2022}}, } @article{3585, abstract = {{Existing approaches and tools for the generation of approximate circuits often lack generality and are restricted to certain circuit types, approximation techniques, and quality assurance methods. Moreover, only few tools are publicly available. This hinders the development and evaluation of new techniques for approximating circuits and their comparison to previous approaches. In this paper, we first analyze and classify related approaches and then present CIRCA, our flexible framework for search-based approximate circuit generation. CIRCA is developed with a focus on modularity and extensibility. We present the architecture of CIRCA with its clear separation into stages and functional blocks, report on the current prototype, and show initial experiments.}}, author = {{Witschen, Linus Matthias and Wiersema, Tobias and Ghasemzadeh Mohammadi, Hassan and Awais, Muhammad and Platzner, Marco}}, issn = {{0026-2714}}, journal = {{Microelectronics Reliability}}, keywords = {{Approximate Computing, Framework, Pareto Front, Accuracy}}, pages = {{277--290}}, publisher = {{Elsevier}}, title = {{{CIRCA: Towards a Modular and Extensible Framework for Approximate Circuit Generation}}}, doi = {{10.1016/j.microrel.2019.04.003}}, volume = {{99}}, year = {{2019}}, } @unpublished{3586, abstract = {{Existing approaches and tools for the generation of approximate circuits often lack generality and are restricted to certain circuit types, approximation techniques, and quality assurance methods. Moreover, only few tools are publicly available. This hinders the development and evaluation of new techniques for approximating circuits and their comparison to previous approaches. In this paper, we first analyze and classify related approaches and then present CIRCA, our flexible framework for search-based approximate circuit generation. CIRCA is developed with a focus on modularity and extensibility. We present the architecture of CIRCA with its clear separation into stages and functional blocks, report on the current prototype, and show initial experiments.}}, author = {{Witschen, Linus Matthias and Wiersema, Tobias and Ghasemzadeh Mohammadi, Hassan and Awais, Muhammad and Platzner, Marco}}, booktitle = {{Third Workshop on Approximate Computing (AxC 2018)}}, keywords = {{Approximate Computing, Framework, Pareto Front, Accuracy}}, pages = {{6}}, title = {{{CIRCA: Towards a Modular and Extensible Framework for Approximate Circuit Generation}}}, year = {{2018}}, } @article{9899, abstract = {{Bainite is a steel microstructure consisting of three phases, bainitic ferrite, austenite and carbides. It forms in two different morphologies, upper and lower bainite, where different diffusion mechanisms are dominant. The aim of this work is to simulate both transformations within a unified model. To this end, we extend an own previously published model for lower bainite with diffusion across the phase interface. As a central idea we introduce weighted Helmholtz energy functions and a weighted mobility tensor, respectively. The individual Helmholtz energy functions and mobility terms are related to the different diffusion mechanisms which are responsible for the formation of both morphologies. Two representative examples illustrate the capability of the coupled phase field/diffusion model and show the expected behaviour.}}, author = {{Düsing, M. and Mahnken, R.}}, issn = {{0020-7683}}, journal = {{International Journal of Solids and Structures}}, keywords = {{Coupled phase field/diffusion model, Bainite, Multiphase field method, Cahn–Hilliard diffusion, Diffusion across the interface, Lower bainitic transformation, Upper bainitic transformation, Thermodynamic framework, Microforce balance}}, pages = {{172--183}}, publisher = {{Elsevier}}, title = {{{„A coupled phase field/diffusion model for upper and lower bainitic transformation”}}}, volume = {{135}}, year = {{2018}}, } @article{5614, abstract = {{Natural disasters, including earthquakes, Tsunamis, floods, hurricanes, and volcanic eruptions, have caused tremendous harm and continue to threaten millions of humans and various infrastructure capabilities each year. In their efforts to take countermeasures against the threats posed by future natural disasters, the United Nations formulated the ?Hyogo Framework for Action?, which aims at assessing and reducing risk. This framework and a global review of disaster reduction initiatives of the United Nations acknowledge the need for information systems research contributions in addressing major challenges of natural disaster management. In this paper, we provide a review of the literature with regard to how information systems research has addressed risk assessment and reduction in natural disaster management. Based on the review we identify research gaps that are centered around the need for acquiring general knowledge on how to design IS artifacts for risk assessment and reduction. In order to close these gaps in further research, we develop a research agenda that follows the IS design science paradigm.}}, author = {{Schryen, Guido and Wex, Felix}}, journal = {{International Journal of Information Systems for Crisis Response and Management (IJISCRAM)}}, keywords = {{Natural Disaster Management, Risk Reduction, Hyogo Framework, IS Design Science, Literature review}}, number = {{1}}, title = {{{Risk Reduction in Natural Disaster Management Through Information Systems: A Literature review and an IS design science research agenda}}}, volume = {{6}}, year = {{2014}}, } @inproceedings{11716, abstract = {{The accuracy of automatic speech recognition systems in noisy and reverberant environments can be improved notably by exploiting the uncertainty of the estimated speech features using so-called uncertainty-of-observation techniques. In this paper, we introduce a new Bayesian decision rule that can serve as a mathematical framework from which both known and new uncertainty-of-observation techniques can be either derived or approximated. The new decision rule in its direct form leads to the new significance decoding approach for Gaussian mixture models, which results in better performance compared to standard uncertainty-of-observation techniques in different additive and convolutive noise scenarios.}}, author = {{Abdelaziz, Ahmed H. and Zeiler, Steffen and Kolossa, Dorothea and Leutnant, Volker and Haeb-Umbach, Reinhold}}, booktitle = {{Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on}}, issn = {{1520-6149}}, keywords = {{Bayes methods, Gaussian processes, convolution, decision theory, decoding, noise, reverberation, speech coding, speech recognition, Bayesian decision rule, GMM, Gaussian mixture models, additive noise scenarios, automatic speech recognition systems, convolutive noise scenarios, decoding approach, mathematical framework, reverberant environments, significance decoding, speech feature estimation, uncertainty-of-observation techniques, Hidden Markov models, Maximum likelihood decoding, Noise, Speech, Speech recognition, Uncertainty, Uncertainty-of-observation, modified imputation, noise robust speech recognition, significance decoding, uncertainty decoding}}, pages = {{6827--6831}}, title = {{{GMM-based significance decoding}}}, doi = {{10.1109/ICASSP.2013.6638984}}, year = {{2013}}, } @inproceedings{11740, abstract = {{In this contribution we derive the Maximum A-Posteriori (MAP) estimates of the parameters of a Gaussian Mixture Model (GMM) in the presence of noisy observations. We assume the distortion to be white Gaussian noise of known mean and variance. An approximate conjugate prior of the GMM parameters is derived allowing for a computationally efficient implementation in a sequential estimation framework. Simulations on artificially generated data demonstrate the superiority of the proposed method compared to the Maximum Likelihood technique and to the ordinary MAP approach, whose estimates are corrected by the known statistics of the distortion in a straightforward manner.}}, author = {{Chinaev, Aleksej and Haeb-Umbach, Reinhold}}, booktitle = {{38th International Conference on Acoustics, Speech and Signal Processing (ICASSP 2013)}}, issn = {{1520-6149}}, keywords = {{Gaussian noise, maximum likelihood estimation, parameter estimation, GMM parameter, Gaussian mixture model, MAP estimation, Map-based estimation, maximum a-posteriori estimation, maximum likelihood technique, noisy observation, sequential estimation framework, white Gaussian noise, Additive noise, Gaussian mixture model, Maximum likelihood estimation, Noise measurement, Gaussian mixture model, Maximum a posteriori estimation, Maximum likelihood estimation}}, pages = {{3352--3356}}, title = {{{MAP-based Estimation of the Parameters of a Gaussian Mixture Model in the Presence of Noisy Observations}}}, doi = {{10.1109/ICASSP.2013.6638279}}, year = {{2013}}, } @inproceedings{13324, abstract = {{The new technological enhancements and the accessibility to varieties of online applications, enable users to collect personal data and perform self-evaluation through test, comparison and experimentation. The sparked interest in numbers and numbers as self-representative visualisations is prominent in social networking sites, which are the empirical setting for the present study. This paper sets out to establish a multi-theoretical framework which enables the investigation of emerging phenomena of the role of numbers in social networking sites. The proposed framework rests on three theoretical pillars: self-determination theory, heuristic decision making and behavioural economics. A discussion departs from these convictions to investigate user reactions and behaviour when faced with numerical representations in the SNS.}}, author = {{Sjöklint, Mimmi and Constantiou, Ioanna and Trier, Matthias}}, booktitle = {{ECIS 2013 Proceedings}}, isbn = {{9783834924421}}, keywords = {{User Behaviour, Social Networking Sites, Numerical Representations, Multi-Theoretical Framework, Quantified Self, Pointification}}, publisher = {{Association for Information Systems. AIS Electronic Library (AISeL)}}, title = {{{Numerical Representations and User Behaviour in Social Networking Sites: Towards a Multi- Theoretical Research Framework}}}, year = {{2013}}, } @inproceedings{38537, abstract = {{Ubiquitous systems use context information to select and adapt multimodal user interfaces and appliances for individual users in certain situations. However, in order to enable true reactive environments, context information has to be adequately collected, filtered, and processed and combined with user, device and other profiles. In this article, we present how an XML-based transcoding system can be applied for advanced profile processing and evolution. We demonstrate how to encode domain knowledge into sets of rules, which perform adaptations of user, device and context profiles for smart environments.}}, author = {{Schäfer, Robbie and Müller, Wolfgang and Groppe, Jinghua}}, booktitle = {{Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06)}}, keywords = {{Resource Description Framework User Preference Smart Home Prefer Temperature Preference Profile}}, title = {{{Profile Processing and Evolution for Smart Environments}}}, year = {{2006}}, } @inproceedings{39052, abstract = {{Smart homes provide their users with maximum comfort and convenience. In this paper, we present a profile management framework for situation-dependent customization in smart home environments, which meet the user preferences with given device capabilities. We apply profile processing and evolution methods to customize profiles on the fly and to automatically evolve user preferences. Furthermore, we give a comprehensive study on profile management technology.}}, author = {{Groppe, Jinghua and Müller, Wolfgang}}, booktitle = {{Proceedings of the 1st International Workshop on Secure and Ubiquitous Networks (SUN-2005)}}, isbn = {{0-7695-2424-9}}, keywords = {{Technology management, Smart homes, Environmental management, Resource description framework, Data models, Navigation, Mobile computing, Embedded computing, Ubiquitous computing, Mobile communication}}, location = {{Copenhagen, Denmark }}, publisher = {{IEEE}}, title = {{{Profile Management technology for Smart Customization in Private Home Applications}}}, doi = {{10.1109/DEXA.2005.156}}, year = {{2005}}, }