[{"status":"public","abstract":[{"lang":"eng","text":"Vulnerability disclosures are necessary to improve the security of our digital ecosystem. However, they can also be challenging for researchers: it may be hard to find out who the affected parties even are, or how to contact them. Researchers may be ignored or face adversity when disclosing vulnerabilities. We investigate researchers' experiences with vulnerability disclosures, extract best practices, and make recommendations for researchers, institutions that employ them, industry, and regulators to enable effective vulnerability disclosures."}],"publication":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","language":[{"iso":"eng"}],"keyword":["software vulnerabilities","vulnerability disclosure","security research"],"user_id":"58331","_id":"62738","citation":{"ama":"Sri Ramulu H, Rotthaler AL, Rossel J, et al. Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures. In: <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2025. doi:<a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>","ieee":"H. Sri Ramulu <i>et al.</i>, “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures,” 2025, doi: <a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>.","chicago":"Sri Ramulu, Harshini, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, and Yasemin Acar. “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures.” In <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2025. <a href=\"https://doi.org/10.1145/3719027.3760723\">https://doi.org/10.1145/3719027.3760723</a>.","short":"H. Sri Ramulu, A.L. Rotthaler, J. Rossel, R. Gonzalez Rodriguez, D. Wermke, S. Fahl, T. Kohno, J. Somorovsky, Y. Acar, in: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2025.","mla":"Sri Ramulu, Harshini, et al. “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures.” <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2025, doi:<a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>.","bibtex":"@inproceedings{Sri Ramulu_Rotthaler_Rossel_Gonzalez Rodriguez_Wermke_Fahl_Kohno_Somorovsky_Acar_2025, title={Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures}, DOI={<a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>}, booktitle={Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Sri Ramulu, Harshini and Rotthaler, Anna Lena and Rossel, Jost and Gonzalez Rodriguez, Rachel and Wermke, Dominik and Fahl, Sascha and Kohno, Tadayoshi and Somorovsky, Juraj and Acar, Yasemin}, year={2025} }","apa":"Sri Ramulu, H., Rotthaler, A. L., Rossel, J., Gonzalez Rodriguez, R., Wermke, D., Fahl, S., Kohno, T., Somorovsky, J., &#38; Acar, Y. (2025). Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures. <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3719027.3760723\">https://doi.org/10.1145/3719027.3760723</a>"},"year":"2025","publication_status":"published","conference":{"end_date":"2025-10-17","start_date":"2025-10-13"},"doi":"10.1145/3719027.3760723","main_file_link":[{"open_access":"1","url":"https://dl.acm.org/doi/10.1145/3719027.3760723"}],"title":"Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures","date_created":"2025-12-02T08:48:00Z","author":[{"first_name":"Harshini","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","full_name":"Sri Ramulu, Harshini","id":"99000"},{"full_name":"Rotthaler, Anna Lena","id":"97843","last_name":"Rotthaler","first_name":"Anna Lena"},{"last_name":"Rossel","orcid":"0000-0002-3182-4059","full_name":"Rossel, Jost","id":"58331","first_name":"Jost"},{"first_name":"Rachel","full_name":"Gonzalez Rodriguez, Rachel","last_name":"Gonzalez Rodriguez"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"first_name":"Tadayoshi","full_name":"Kohno, Tadayoshi","last_name":"Kohno"},{"last_name":"Somorovsky","orcid":"0000-0002-3593-7720","id":"83504","full_name":"Somorovsky, Juraj","first_name":"Juraj"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"publisher":"ACM","date_updated":"2025-12-02T08:54:18Z","oa":"1"},{"type":"journal_article","publication":"Internet of Things","status":"public","_id":"53213","user_id":"51811","department":[{"_id":"277"}],"article_number":"101027","keyword":["Management of Technology and Innovation","Artificial Intelligence","Computer Science Applications","Hardware and Architecture","Engineering (miscellaneous)","Information Systems","Computer Science (miscellaneous)","Software"],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["2542-6605"]},"year":"2024","citation":{"chicago":"Amiri, Arman, Madjid Tavana, and Hosein Arman. “An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction.” <i>Internet of Things</i> 25 (2024). <a href=\"https://doi.org/10.1016/j.iot.2023.101027\">https://doi.org/10.1016/j.iot.2023.101027</a>.","ieee":"A. Amiri, M. Tavana, and H. Arman, “An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction,” <i>Internet of Things</i>, vol. 25, Art. no. 101027, 2024, doi: <a href=\"https://doi.org/10.1016/j.iot.2023.101027\">10.1016/j.iot.2023.101027</a>.","ama":"Amiri A, Tavana M, Arman H. An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction. <i>Internet of Things</i>. 2024;25. doi:<a href=\"https://doi.org/10.1016/j.iot.2023.101027\">10.1016/j.iot.2023.101027</a>","apa":"Amiri, A., Tavana, M., &#38; Arman, H. (2024). An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction. <i>Internet of Things</i>, <i>25</i>, Article 101027. <a href=\"https://doi.org/10.1016/j.iot.2023.101027\">https://doi.org/10.1016/j.iot.2023.101027</a>","bibtex":"@article{Amiri_Tavana_Arman_2024, title={An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction}, volume={25}, DOI={<a href=\"https://doi.org/10.1016/j.iot.2023.101027\">10.1016/j.iot.2023.101027</a>}, number={101027}, journal={Internet of Things}, publisher={Elsevier BV}, author={Amiri, Arman and Tavana, Madjid and Arman, Hosein}, year={2024} }","short":"A. Amiri, M. Tavana, H. Arman, Internet of Things 25 (2024).","mla":"Amiri, Arman, et al. “An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction.” <i>Internet of Things</i>, vol. 25, 101027, Elsevier BV, 2024, doi:<a href=\"https://doi.org/10.1016/j.iot.2023.101027\">10.1016/j.iot.2023.101027</a>."},"intvolume":"        25","publisher":"Elsevier BV","date_updated":"2024-04-15T13:08:17Z","date_created":"2024-04-04T13:34:26Z","author":[{"first_name":"Arman","last_name":"Amiri","full_name":"Amiri, Arman"},{"first_name":"Madjid","last_name":"Tavana","id":"31858","full_name":"Tavana, Madjid"},{"first_name":"Hosein","full_name":"Arman, Hosein","last_name":"Arman"}],"volume":25,"title":"An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for Bitcoin Price Prediction","doi":"10.1016/j.iot.2023.101027"},{"year":"2024","intvolume":"        72","page":"287-307","citation":{"ama":"Mahmoodi E, Fathi M, Tavana M, Ghobakhloo M, Ng AHC. Data-driven simulation-based decision support system for resource allocation in industry 4.0 and smart manufacturing. <i>Journal of Manufacturing Systems</i>. 2024;72:287-307. doi:<a href=\"https://doi.org/10.1016/j.jmsy.2023.11.019\">10.1016/j.jmsy.2023.11.019</a>","ieee":"E. Mahmoodi, M. Fathi, M. Tavana, M. Ghobakhloo, and A. H. C. Ng, “Data-driven simulation-based decision support system for resource allocation in industry 4.0 and smart manufacturing,” <i>Journal of Manufacturing Systems</i>, vol. 72, pp. 287–307, 2024, doi: <a href=\"https://doi.org/10.1016/j.jmsy.2023.11.019\">10.1016/j.jmsy.2023.11.019</a>.","chicago":"Mahmoodi, Ehsan, Masood Fathi, Madjid Tavana, Morteza Ghobakhloo, and Amos H.C. Ng. “Data-Driven Simulation-Based Decision Support System for Resource Allocation in Industry 4.0 and Smart Manufacturing.” <i>Journal of Manufacturing Systems</i> 72 (2024): 287–307. <a href=\"https://doi.org/10.1016/j.jmsy.2023.11.019\">https://doi.org/10.1016/j.jmsy.2023.11.019</a>.","apa":"Mahmoodi, E., Fathi, M., Tavana, M., Ghobakhloo, M., &#38; Ng, A. H. C. (2024). Data-driven simulation-based decision support system for resource allocation in industry 4.0 and smart manufacturing. <i>Journal of Manufacturing Systems</i>, <i>72</i>, 287–307. <a href=\"https://doi.org/10.1016/j.jmsy.2023.11.019\">https://doi.org/10.1016/j.jmsy.2023.11.019</a>","short":"E. Mahmoodi, M. Fathi, M. Tavana, M. Ghobakhloo, A.H.C. Ng, Journal of Manufacturing Systems 72 (2024) 287–307.","mla":"Mahmoodi, Ehsan, et al. “Data-Driven Simulation-Based Decision Support System for Resource Allocation in Industry 4.0 and Smart Manufacturing.” <i>Journal of Manufacturing Systems</i>, vol. 72, Elsevier BV, 2024, pp. 287–307, doi:<a href=\"https://doi.org/10.1016/j.jmsy.2023.11.019\">10.1016/j.jmsy.2023.11.019</a>.","bibtex":"@article{Mahmoodi_Fathi_Tavana_Ghobakhloo_Ng_2024, title={Data-driven simulation-based decision support system for resource allocation in industry 4.0 and smart manufacturing}, volume={72}, DOI={<a href=\"https://doi.org/10.1016/j.jmsy.2023.11.019\">10.1016/j.jmsy.2023.11.019</a>}, journal={Journal of Manufacturing Systems}, publisher={Elsevier BV}, author={Mahmoodi, Ehsan and Fathi, Masood and Tavana, Madjid and Ghobakhloo, Morteza and Ng, Amos H.C.}, year={2024}, pages={287–307} }"},"publication_identifier":{"issn":["0278-6125"]},"publication_status":"published","title":"Data-driven simulation-based decision support system for resource allocation in industry 4.0 and smart manufacturing","doi":"10.1016/j.jmsy.2023.11.019","publisher":"Elsevier BV","date_updated":"2024-04-15T13:08:02Z","volume":72,"author":[{"first_name":"Ehsan","full_name":"Mahmoodi, Ehsan","last_name":"Mahmoodi"},{"full_name":"Fathi, Masood","last_name":"Fathi","first_name":"Masood"},{"last_name":"Tavana","full_name":"Tavana, Madjid","id":"31858","first_name":"Madjid"},{"full_name":"Ghobakhloo, Morteza","last_name":"Ghobakhloo","first_name":"Morteza"},{"last_name":"Ng","full_name":"Ng, Amos H.C.","first_name":"Amos H.C."}],"date_created":"2024-04-04T13:33:48Z","status":"public","publication":"Journal of Manufacturing Systems","type":"journal_article","keyword":["Industrial and Manufacturing Engineering","Hardware and Architecture","Software","Control and Systems Engineering"],"language":[{"iso":"eng"}],"_id":"53212","department":[{"_id":"277"}],"user_id":"51811"},{"status":"public","type":"journal_article","publication":"Applied Soft Computing","language":[{"iso":"eng"}],"article_number":"111098","keyword":["Software"],"user_id":"51811","department":[{"_id":"277"}],"_id":"53205","citation":{"ieee":"M. Tavana and S. Sorooshian, “A systematic review of the soft computing methods shaping the future of the metaverse,” <i>Applied Soft Computing</i>, vol. 150, Art. no. 111098, 2024, doi: <a href=\"https://doi.org/10.1016/j.asoc.2023.111098\">10.1016/j.asoc.2023.111098</a>.","chicago":"Tavana, Madjid, and Shahryar Sorooshian. “A Systematic Review of the Soft Computing Methods Shaping the Future of the Metaverse.” <i>Applied Soft Computing</i> 150 (2024). <a href=\"https://doi.org/10.1016/j.asoc.2023.111098\">https://doi.org/10.1016/j.asoc.2023.111098</a>.","ama":"Tavana M, Sorooshian S. A systematic review of the soft computing methods shaping the future of the metaverse. <i>Applied Soft Computing</i>. 2024;150. doi:<a href=\"https://doi.org/10.1016/j.asoc.2023.111098\">10.1016/j.asoc.2023.111098</a>","mla":"Tavana, Madjid, and Shahryar Sorooshian. “A Systematic Review of the Soft Computing Methods Shaping the Future of the Metaverse.” <i>Applied Soft Computing</i>, vol. 150, 111098, Elsevier BV, 2024, doi:<a href=\"https://doi.org/10.1016/j.asoc.2023.111098\">10.1016/j.asoc.2023.111098</a>.","bibtex":"@article{Tavana_Sorooshian_2024, title={A systematic review of the soft computing methods shaping the future of the metaverse}, volume={150}, DOI={<a href=\"https://doi.org/10.1016/j.asoc.2023.111098\">10.1016/j.asoc.2023.111098</a>}, number={111098}, journal={Applied Soft Computing}, publisher={Elsevier BV}, author={Tavana, Madjid and Sorooshian, Shahryar}, year={2024} }","short":"M. Tavana, S. Sorooshian, Applied Soft Computing 150 (2024).","apa":"Tavana, M., &#38; Sorooshian, S. (2024). A systematic review of the soft computing methods shaping the future of the metaverse. <i>Applied Soft Computing</i>, <i>150</i>, Article 111098. <a href=\"https://doi.org/10.1016/j.asoc.2023.111098\">https://doi.org/10.1016/j.asoc.2023.111098</a>"},"intvolume":"       150","year":"2024","publication_status":"published","publication_identifier":{"issn":["1568-4946"]},"doi":"10.1016/j.asoc.2023.111098","title":"A systematic review of the soft computing methods shaping the future of the metaverse","date_created":"2024-04-04T12:00:22Z","author":[{"first_name":"Madjid","full_name":"Tavana, Madjid","id":"31858","last_name":"Tavana"},{"first_name":"Shahryar","last_name":"Sorooshian","full_name":"Sorooshian, Shahryar"}],"volume":150,"date_updated":"2024-04-15T13:07:49Z","publisher":"Elsevier BV"},{"status":"public","file":[{"date_updated":"2024-05-02T08:54:21Z","creator":"staaibi","date_created":"2024-05-02T08:54:21Z","file_size":540990,"file_name":"AMCIS2024_final_submission_maturity model security belt paper.pdf","file_id":"53812","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"text":"Persistent security challenges plague DevOps teams due to a deficiency in expertise regarding security tools and methods, as evidenced by frequent security incidents. Existing maturity models fail to adequately address the specific needs of DevOps teams. In response, this paper proposes \"Security Belts,\" a novel maturity model inspired by martial arts ranking systems. This model aims to assist DevOps teams in enhancing their security capabilities by providing a structured approach, starting with fundamental activities and progressing to more advanced techniques. Drawing from the experiences of monitoring 21 teams, the paper presents lessons learned and offers actionable advice for refining maturity models tailored to software quality improvement.","lang":"eng"}],"type":"conference","file_date_updated":"2024-05-02T08:54:21Z","language":[{"iso":"eng"}],"keyword":["Software security","maturity model"],"ddc":["000"],"department":[{"_id":"662"}],"user_id":"55800","_id":"53811","citation":{"chicago":"Taaibi, Samira, Stefan Dziwok, Lars Hermerschmidt, Thorsten Koch, Sven Merschjohann, and Mark Vollmary. “Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of Their Product - An Experience Report,” n.d.","ieee":"S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, and M. Vollmary, “Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report,” presented at the  30th Americas Conference on Information Systems, Salt Lake City.","ama":"Taaibi S, Dziwok S, Hermerschmidt L, Koch T, Merschjohann S, Vollmary M. Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report.","apa":"Taaibi, S., Dziwok, S., Hermerschmidt, L., Koch, T., Merschjohann, S., &#38; Vollmary, M. (n.d.). <i>Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report</i>.  30th Americas Conference on Information Systems, Salt Lake City.","short":"S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, M. Vollmary, in: n.d.","mla":"Taaibi, Samira, et al. <i>Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of Their Product - An Experience Report</i>.","bibtex":"@inproceedings{Taaibi_Dziwok_Hermerschmidt_Koch_Merschjohann_Vollmary, title={Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report}, author={Taaibi, Samira and Dziwok, Stefan and Hermerschmidt, Lars and Koch, Thorsten and Merschjohann, Sven and Vollmary, Mark} }"},"year":"2024","has_accepted_license":"1","publication_status":"accepted","conference":{"name":" 30th Americas Conference on Information Systems","start_date":"2024-08-15","end_date":"2024-08-17","location":"Salt Lake City"},"title":"Security Belts: A Maturity Model for DevOps Teams to Increase the Software Security of their Product - An Experience Report","author":[{"id":"55800","full_name":"Taaibi, Samira","last_name":"Taaibi","first_name":"Samira"},{"first_name":"Stefan","id":"3901","full_name":"Dziwok, Stefan","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673"},{"first_name":"Lars","full_name":"Hermerschmidt, Lars","last_name":"Hermerschmidt"},{"first_name":"Thorsten","full_name":"Koch, Thorsten","id":"13616","last_name":"Koch"},{"first_name":"Sven","last_name":"Merschjohann","full_name":"Merschjohann, Sven","id":"11394"},{"first_name":"Mark","last_name":"Vollmary","full_name":"Vollmary, Mark"}],"date_created":"2024-05-02T08:57:52Z","date_updated":"2024-08-09T08:55:49Z"},{"publication":"Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)","type":"conference","status":"public","abstract":[{"lang":"eng","text":"Joint value creation of organizations in ecosystems have a high failure rate, stressing the need for tools that enable the alignment of business models through visual inquiry. However, existing visual inquiry tools rarely consider recent design knowledge or ecosystem understanding. This leads to dissatisfied users and impedes the full realization of ecosystems’ potential. This short paper proposes an archaeological design science approach for enhancing the design of visual inquiry tools (e.g., a canvas) for ecosystems. Preliminary findings reveal 24 relevant artifacts, and shortcomings in the creation of conceptual models and rigorous evaluations. The proposed research process aims to develop design principles for more effective tools to bridge the gap between visual inquiry tools and ecosystems. This research contributes to design science research by reutilizing design knowledge and further developing the archaeological design approach. It also offers valuable information to practitioners about existing business model tools for the creation of ecosystems."}],"user_id":"29951","_id":"56918","language":[{"iso":"eng"}],"keyword":["Design Science Research","Design Archaeology","Canvas Analysis","Business Model Tools"],"related_material":{"link":[{"url":"https://aisel.aisnet.org/ecis2024/track23_designresearch/track23_designresearch/2/","relation":"confirmation"}]},"citation":{"short":"C. Vorbohle, in: Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024), 2024.","bibtex":"@inproceedings{Vorbohle_2024, title={Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology}, booktitle={Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)}, author={Vorbohle, Christian}, year={2024} }","mla":"Vorbohle, Christian. “Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology.” <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>, 2024.","apa":"Vorbohle, C. (2024). Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology. <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>. ECIS 2024, Paphos, Cyprus.","ama":"Vorbohle C. Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology. In: <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>. ; 2024.","ieee":"C. Vorbohle, “Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology,” presented at the ECIS 2024, Paphos, Cyprus, 2024.","chicago":"Vorbohle, Christian. “Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology.” In <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>, 2024."},"year":"2024","author":[{"full_name":"Vorbohle, Christian","id":"29951","last_name":"Vorbohle","first_name":"Christian"}],"date_created":"2024-11-06T11:06:05Z","date_updated":"2025-03-21T13:33:23Z","conference":{"name":"ECIS 2024","location":"Paphos, Cyprus"},"title":"Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology"},{"type":"journal_article","publication":"Systems","abstract":[{"text":"<jats:p>The introduction of Systems Engineering is an approach for dealing with the increasing complexity of products and their associated product development. Several introduction strategies are available in the literature; nevertheless, the introduction of Systems Engineering into practice still poses a great challenge to companies. Many companies have already gained experience in the introduction of Systems Engineering. Therefore, as part of the SE4OWL research project, the need to conduct a study including expert interviews and to collect the experiences of experts was identified. A total of 78 hypotheses were identified from 13 expert interviews concerning the lessons learned. Using exclusion criteria, 52 hypotheses were validated in a subsequent quantitative survey with 112 participants. Of these 52 hypotheses, 40 could be confirmed based on the survey results. Only four hypotheses were rejected, and eight could neither be confirmed nor rejected. Through this research, guidance is provided to companies to leverage best practices for the introduction of their own Systems Engineering and to avoid the poor practices of other companies.</jats:p>","lang":"eng"}],"status":"public","_id":"47800","user_id":"15782","department":[{"_id":"563"}],"article_number":"119","keyword":["Information Systems and Management","Computer Networks and Communications","Modeling and Simulation","Control and Systems Engineering","Software"],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["2079-8954"]},"issue":"3","year":"2023","citation":{"apa":"Wilke, D., Grothe, R., Bretz, L., Anacker, H., &#38; Dumitrescu, R. (2023). Lessons Learned from the Introduction of Systems Engineering. <i>Systems</i>, <i>11</i>(3), Article 119. <a href=\"https://doi.org/10.3390/systems11030119\">https://doi.org/10.3390/systems11030119</a>","short":"D. Wilke, R. Grothe, L. Bretz, H. Anacker, R. Dumitrescu, Systems 11 (2023).","bibtex":"@article{Wilke_Grothe_Bretz_Anacker_Dumitrescu_2023, title={Lessons Learned from the Introduction of Systems Engineering}, volume={11}, DOI={<a href=\"https://doi.org/10.3390/systems11030119\">10.3390/systems11030119</a>}, number={3119}, journal={Systems}, publisher={MDPI AG}, author={Wilke, Daria and Grothe, Robin and Bretz, Lukas and Anacker, Harald and Dumitrescu, Roman}, year={2023} }","mla":"Wilke, Daria, et al. “Lessons Learned from the Introduction of Systems Engineering.” <i>Systems</i>, vol. 11, no. 3, 119, MDPI AG, 2023, doi:<a href=\"https://doi.org/10.3390/systems11030119\">10.3390/systems11030119</a>.","ama":"Wilke D, Grothe R, Bretz L, Anacker H, Dumitrescu R. Lessons Learned from the Introduction of Systems Engineering. <i>Systems</i>. 2023;11(3). doi:<a href=\"https://doi.org/10.3390/systems11030119\">10.3390/systems11030119</a>","ieee":"D. Wilke, R. Grothe, L. Bretz, H. Anacker, and R. Dumitrescu, “Lessons Learned from the Introduction of Systems Engineering,” <i>Systems</i>, vol. 11, no. 3, Art. no. 119, 2023, doi: <a href=\"https://doi.org/10.3390/systems11030119\">10.3390/systems11030119</a>.","chicago":"Wilke, Daria, Robin Grothe, Lukas Bretz, Harald Anacker, and Roman Dumitrescu. “Lessons Learned from the Introduction of Systems Engineering.” <i>Systems</i> 11, no. 3 (2023). <a href=\"https://doi.org/10.3390/systems11030119\">https://doi.org/10.3390/systems11030119</a>."},"intvolume":"        11","date_updated":"2023-10-06T07:38:40Z","publisher":"MDPI AG","date_created":"2023-10-06T07:38:11Z","author":[{"first_name":"Daria","last_name":"Wilke","full_name":"Wilke, Daria"},{"full_name":"Grothe, Robin","last_name":"Grothe","first_name":"Robin"},{"full_name":"Bretz, Lukas","last_name":"Bretz","first_name":"Lukas"},{"last_name":"Anacker","full_name":"Anacker, Harald","first_name":"Harald"},{"first_name":"Roman","last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman"}],"volume":11,"title":"Lessons Learned from the Introduction of Systems Engineering","doi":"10.3390/systems11030119"},{"doi":"10.1007/s10994-023-06385-y","title":"Incremental permutation feature importance (iPFI): towards online explanations on data streams","date_created":"2023-11-10T14:15:36Z","author":[{"last_name":"Fumagalli","full_name":"Fumagalli, Fabian","first_name":"Fabian"},{"first_name":"Maximilian","full_name":"Muschalik, Maximilian","last_name":"Muschalik"},{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","first_name":"Eyke"},{"last_name":"Hammer","full_name":"Hammer, Barbara","first_name":"Barbara"}],"date_updated":"2023-11-10T14:24:27Z","publisher":"Springer Science and Business Media LLC","citation":{"ieee":"F. Fumagalli, M. Muschalik, E. Hüllermeier, and B. Hammer, “Incremental permutation feature importance (iPFI): towards online explanations on data streams,” <i>Machine Learning</i>, 2023, doi: <a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>.","chicago":"Fumagalli, Fabian, Maximilian Muschalik, Eyke Hüllermeier, and Barbara Hammer. “Incremental Permutation Feature Importance (IPFI): Towards Online Explanations on Data Streams.” <i>Machine Learning</i>, 2023. <a href=\"https://doi.org/10.1007/s10994-023-06385-y\">https://doi.org/10.1007/s10994-023-06385-y</a>.","ama":"Fumagalli F, Muschalik M, Hüllermeier E, Hammer B. Incremental permutation feature importance (iPFI): towards online explanations on data streams. <i>Machine Learning</i>. Published online 2023. doi:<a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>","apa":"Fumagalli, F., Muschalik, M., Hüllermeier, E., &#38; Hammer, B. (2023). Incremental permutation feature importance (iPFI): towards online explanations on data streams. <i>Machine Learning</i>. <a href=\"https://doi.org/10.1007/s10994-023-06385-y\">https://doi.org/10.1007/s10994-023-06385-y</a>","mla":"Fumagalli, Fabian, et al. “Incremental Permutation Feature Importance (IPFI): Towards Online Explanations on Data Streams.” <i>Machine Learning</i>, Springer Science and Business Media LLC, 2023, doi:<a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>.","bibtex":"@article{Fumagalli_Muschalik_Hüllermeier_Hammer_2023, title={Incremental permutation feature importance (iPFI): towards online explanations on data streams}, DOI={<a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>}, journal={Machine Learning}, publisher={Springer Science and Business Media LLC}, author={Fumagalli, Fabian and Muschalik, Maximilian and Hüllermeier, Eyke and Hammer, Barbara}, year={2023} }","short":"F. Fumagalli, M. Muschalik, E. Hüllermeier, B. Hammer, Machine Learning (2023)."},"year":"2023","publication_identifier":{"issn":["0885-6125","1573-0565"]},"publication_status":"published","language":[{"iso":"eng"}],"keyword":["Artificial Intelligence","Software"],"department":[{"_id":"424"},{"_id":"660"}],"user_id":"55908","_id":"48777","status":"public","abstract":[{"lang":"eng","text":"<jats:title>Abstract</jats:title><jats:p>Explainable artificial intelligence has mainly focused on static learning scenarios so far. We are interested in dynamic scenarios where data is sampled progressively, and learning is done in an incremental rather than a batch mode. We seek efficient incremental algorithms for computing feature importance (FI). Permutation feature importance (PFI) is a well-established model-agnostic measure to obtain global FI based on feature marginalization of absent features. We propose an efficient, model-agnostic algorithm called iPFI to estimate this measure incrementally and under dynamic modeling conditions including concept drift. We prove theoretical guarantees on the approximation quality in terms of expectation and variance. To validate our theoretical findings and the efficacy of our approaches in incremental scenarios dealing with streaming data rather than traditional batch settings, we conduct multiple experimental studies on benchmark data with and without concept drift.</jats:p>"}],"publication":"Machine Learning","type":"journal_article"},{"date_updated":"2023-12-04T11:05:26Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","author":[{"last_name":"Torres","full_name":"Torres, Adriano","first_name":"Adriano"},{"first_name":"Pedro","last_name":"Costa","full_name":"Costa, Pedro"},{"full_name":"Amaral, Luis","last_name":"Amaral","first_name":"Luis"},{"first_name":"Jonata","last_name":"Pastro","full_name":"Pastro, Jonata"},{"last_name":"Bonifácio","full_name":"Bonifácio, Rodrigo","first_name":"Rodrigo"},{"first_name":"Marcelo","full_name":"d'Amorim, Marcelo","last_name":"d'Amorim"},{"full_name":"Legunsen, Owolabi","last_name":"Legunsen","first_name":"Owolabi"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"first_name":"Edna","full_name":"Dias Canedo, Edna","last_name":"Dias Canedo"}],"date_created":"2023-09-06T07:42:40Z","volume":49,"title":"Runtime Verification of Crypto APIs: An Empirical Study","doi":"10.1109/tse.2023.3301660","publication_status":"published","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"issue":"10","year":"2023","citation":{"apa":"Torres, A., Costa, P., Amaral, L., Pastro, J., Bonifácio, R., d’Amorim, M., Legunsen, O., Bodden, E., &#38; Dias Canedo, E. (2023). Runtime Verification of Crypto APIs: An Empirical Study. <i>IEEE Transactions on Software Engineering</i>, <i>49</i>(10), 4510–4525. <a href=\"https://doi.org/10.1109/tse.2023.3301660\">https://doi.org/10.1109/tse.2023.3301660</a>","mla":"Torres, Adriano, et al. “Runtime Verification of Crypto APIs: An Empirical Study.” <i>IEEE Transactions on Software Engineering</i>, vol. 49, no. 10, Institute of Electrical and Electronics Engineers (IEEE), 2023, pp. 4510–25, doi:<a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>.","short":"A. Torres, P. Costa, L. Amaral, J. Pastro, R. Bonifácio, M. d’Amorim, O. Legunsen, E. Bodden, E. Dias Canedo, IEEE Transactions on Software Engineering 49 (2023) 4510–4525.","bibtex":"@article{Torres_Costa_Amaral_Pastro_Bonifácio_d’Amorim_Legunsen_Bodden_Dias Canedo_2023, title={Runtime Verification of Crypto APIs: An Empirical Study}, volume={49}, DOI={<a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>}, number={10}, journal={IEEE Transactions on Software Engineering}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Torres, Adriano and Costa, Pedro and Amaral, Luis and Pastro, Jonata and Bonifácio, Rodrigo and d’Amorim, Marcelo and Legunsen, Owolabi and Bodden, Eric and Dias Canedo, Edna}, year={2023}, pages={4510–4525} }","ama":"Torres A, Costa P, Amaral L, et al. Runtime Verification of Crypto APIs: An Empirical Study. <i>IEEE Transactions on Software Engineering</i>. 2023;49(10):4510-4525. doi:<a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>","chicago":"Torres, Adriano, Pedro Costa, Luis Amaral, Jonata Pastro, Rodrigo Bonifácio, Marcelo d’Amorim, Owolabi Legunsen, Eric Bodden, and Edna Dias Canedo. “Runtime Verification of Crypto APIs: An Empirical Study.” <i>IEEE Transactions on Software Engineering</i> 49, no. 10 (2023): 4510–25. <a href=\"https://doi.org/10.1109/tse.2023.3301660\">https://doi.org/10.1109/tse.2023.3301660</a>.","ieee":"A. Torres <i>et al.</i>, “Runtime Verification of Crypto APIs: An Empirical Study,” <i>IEEE Transactions on Software Engineering</i>, vol. 49, no. 10, pp. 4510–4525, 2023, doi: <a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>."},"intvolume":"        49","page":"4510 - 4525","_id":"46816","user_id":"15249","department":[{"_id":"76"}],"keyword":["Software"],"language":[{"iso":"eng"}],"type":"journal_article","publication":"IEEE Transactions on Software Engineering","status":"public"},{"publication":"Empirical Software Engineering","type":"journal_article","abstract":[{"lang":"eng","text":"<jats:title>Abstract</jats:title><jats:p>The use of static analysis security testing (SAST) tools has been increasing in recent years. However, previous studies have shown that, when shipped to end users such as development or security teams, the findings of these tools are often unsatisfying. Users report high numbers of false positives or long analysis times, making the tools unusable in the daily workflow. To address this, SAST tool creators provide a wide range of configuration options, such as customization of rules through domain-specific languages or specification of the application-specific analysis scope. In this paper, we study the configuration space of selected existing SAST tools when used within the integrated development environment (IDE). We focus on the configuration options that impact three dimensions, for which a trade-off is unavoidable, i.e., precision, recall, and analysis runtime. We perform a between-subjects user study with 40 users from multiple development and security teams - to our knowledge, the largest population for this kind of user study in the software engineering community. The results show that users who configure SAST tools are more effective in resolving security vulnerabilities detected by the tools than those using the default configuration. Based on post-study interviews, we identify common strategies that users have while configuring the SAST tools to provide further insights for tool creators. Finally, an evaluation of the configuration options of two commercial SAST tools, <jats:sc>Fortify</jats:sc> and <jats:sc>CheckMarx</jats:sc>, reveals that a quarter of the users do not understand the configuration options provided. The configuration options that are found most useful relate to the analysis scope.</jats:p>"}],"status":"public","_id":"49439","department":[{"_id":"76"},{"_id":"662"}],"user_id":"15249","keyword":["Software"],"article_number":"118","language":[{"iso":"eng"}],"publication_identifier":{"issn":["1382-3256","1573-7616"]},"publication_status":"published","issue":"5","year":"2023","intvolume":"        28","citation":{"apa":"Piskachev, G., Becker, M., &#38; Bodden, E. (2023). Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study. <i>Empirical Software Engineering</i>, <i>28</i>(5), Article 118. <a href=\"https://doi.org/10.1007/s10664-023-10354-3\">https://doi.org/10.1007/s10664-023-10354-3</a>","short":"G. Piskachev, M. Becker, E. Bodden, Empirical Software Engineering 28 (2023).","bibtex":"@article{Piskachev_Becker_Bodden_2023, title={Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study}, volume={28}, DOI={<a href=\"https://doi.org/10.1007/s10664-023-10354-3\">10.1007/s10664-023-10354-3</a>}, number={5118}, journal={Empirical Software Engineering}, publisher={Springer Science and Business Media LLC}, author={Piskachev, Goran and Becker, Matthias and Bodden, Eric}, year={2023} }","mla":"Piskachev, Goran, et al. “Can the Configuration of Static Analyses Make Resolving Security Vulnerabilities More Effective? - A User Study.” <i>Empirical Software Engineering</i>, vol. 28, no. 5, 118, Springer Science and Business Media LLC, 2023, doi:<a href=\"https://doi.org/10.1007/s10664-023-10354-3\">10.1007/s10664-023-10354-3</a>.","ama":"Piskachev G, Becker M, Bodden E. Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study. <i>Empirical Software Engineering</i>. 2023;28(5). doi:<a href=\"https://doi.org/10.1007/s10664-023-10354-3\">10.1007/s10664-023-10354-3</a>","ieee":"G. Piskachev, M. Becker, and E. Bodden, “Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study,” <i>Empirical Software Engineering</i>, vol. 28, no. 5, Art. no. 118, 2023, doi: <a href=\"https://doi.org/10.1007/s10664-023-10354-3\">10.1007/s10664-023-10354-3</a>.","chicago":"Piskachev, Goran, Matthias Becker, and Eric Bodden. “Can the Configuration of Static Analyses Make Resolving Security Vulnerabilities More Effective? - A User Study.” <i>Empirical Software Engineering</i> 28, no. 5 (2023). <a href=\"https://doi.org/10.1007/s10664-023-10354-3\">https://doi.org/10.1007/s10664-023-10354-3</a>."},"date_updated":"2023-12-04T11:29:49Z","publisher":"Springer Science and Business Media LLC","volume":28,"date_created":"2023-12-04T11:14:34Z","author":[{"last_name":"Piskachev","orcid":"0000-0003-4424-5838","id":"41936","full_name":"Piskachev, Goran","first_name":"Goran"},{"first_name":"Matthias","id":"4870","full_name":"Becker, Matthias","orcid":"https://orcid.org/0000-0003-2465-9347","last_name":"Becker"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"title":"Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study","doi":"10.1007/s10664-023-10354-3"},{"page":"1085-1150","intvolume":"        33","citation":{"mla":"Bartelheimer, Christian, et al. “Workarounds as Generative Mechanisms for Bottom‐up Process Innovation—Insights from a Multiple Case Study.” <i>Information Systems Journal</i>, vol. 33, no. 5, Wiley, 2023, pp. 1085–150, doi:<a href=\"https://doi.org/10.1111/isj.12435\">10.1111/isj.12435</a>.","short":"C. Bartelheimer, V. Wolf, D. Beverungen, Information Systems Journal 33 (2023) 1085–1150.","bibtex":"@article{Bartelheimer_Wolf_Beverungen_2023, title={Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study}, volume={33}, DOI={<a href=\"https://doi.org/10.1111/isj.12435\">10.1111/isj.12435</a>}, number={5}, journal={Information Systems Journal}, publisher={Wiley}, author={Bartelheimer, Christian and Wolf, Verena and Beverungen, Daniel}, year={2023}, pages={1085–1150} }","apa":"Bartelheimer, C., Wolf, V., &#38; Beverungen, D. (2023). Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study. <i>Information Systems Journal</i>, <i>33</i>(5), 1085–1150. <a href=\"https://doi.org/10.1111/isj.12435\">https://doi.org/10.1111/isj.12435</a>","ieee":"C. Bartelheimer, V. Wolf, and D. Beverungen, “Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study,” <i>Information Systems Journal</i>, vol. 33, no. 5, pp. 1085–1150, 2023, doi: <a href=\"https://doi.org/10.1111/isj.12435\">10.1111/isj.12435</a>.","chicago":"Bartelheimer, Christian, Verena Wolf, and Daniel Beverungen. “Workarounds as Generative Mechanisms for Bottom‐up Process Innovation—Insights from a Multiple Case Study.” <i>Information Systems Journal</i> 33, no. 5 (2023): 1085–1150. <a href=\"https://doi.org/10.1111/isj.12435\">https://doi.org/10.1111/isj.12435</a>.","ama":"Bartelheimer C, Wolf V, Beverungen D. Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study. <i>Information Systems Journal</i>. 2023;33(5):1085-1150. doi:<a href=\"https://doi.org/10.1111/isj.12435\">10.1111/isj.12435</a>"},"publication_identifier":{"issn":["1350-1917","1365-2575"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1111/isj.12435","date_updated":"2024-02-28T09:52:47Z","volume":33,"author":[{"last_name":"Bartelheimer","id":"49160","full_name":"Bartelheimer, Christian","first_name":"Christian"},{"full_name":"Wolf, Verena","id":"23633","last_name":"Wolf","first_name":"Verena"},{"first_name":"Daniel","full_name":"Beverungen, Daniel","id":"59677","last_name":"Beverungen"}],"status":"public","type":"journal_article","article_type":"original","file_date_updated":"2024-02-22T15:21:34Z","_id":"51770","project":[{"_id":"36","name":"Digivation: Digitale Prozessinnovationen durch datenbasierte Dienstleistungen ","grant_number":"O2K14A22O"}],"department":[{"_id":"195"}],"user_id":"59677","year":"2023","quality_controlled":"1","issue":"5","title":"Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study","publisher":"Wiley","date_created":"2024-02-22T15:19:57Z","abstract":[{"text":"<jats:title>Abstract</jats:title><jats:p>Workarounds are goal‐driven deviations from the standard operating procedures performed to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes, they can become established across an organisation and trigger the innovation of processes and IT artefacts that can resolve misfits permanently. Although prior research has elicited antecedents and types of workarounds, it is not known how workarounds diffuse in an organisation and, thereby, innovating co‐workers' activities, IT artefacts, and organisational structures. The results of our multiple two‐year case study provide unique empirical insights into the diffusion of workarounds and how they can act as generative mechanisms for bottom‐up process innovation.</jats:p>","lang":"eng"}],"file":[{"file_id":"51771","file_name":"Information Systems Journal - 2023 - Bartelheimer - Workarounds as generative mechanisms for bottom‐up process innovation.pdf","access_level":"closed","file_size":4520950,"date_created":"2024-02-22T15:21:34Z","creator":"dabe","date_updated":"2024-02-22T15:21:34Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"publication":"Information Systems Journal","keyword":["Computer Networks and Communications","Information Systems","Software"],"ddc":["330"],"language":[{"iso":"eng"}]},{"type":"book_chapter","publication":"Software Engineering 2023","status":"public","abstract":[{"lang":"eng","text":"Static analysis tools support developers in detecting potential coding issues, such as bugs or vulnerabilities. Research emphasizes technical challenges of such tools but also mentions severe usability shortcomings. These shortcomings hinder the adoption of static analysis tools, and user dissatisfaction may even lead to tool abandonment. To comprehensively assess the state of the art, we present the first systematic usability evaluation of a wide range of static analysis tools. We derived a set of 36 relevant criteria from the literature and used them to evaluate a total of 46 static analysis tools complying with our inclusion and exclusion criteria - a representative set of mainly non-proprietary tools. The evaluation against the usability criteria in a multiple-raters approach shows that two thirds of the considered tools off er poor warning messages, while about three-quarters provide hardly any fix support. Furthermore, the integration of user knowledge is strongly neglected, which could be used for instance, to improve handling of false positives. Finally, issues regarding workflow integration and specialized user interfaces are revealed. These findings should prove useful in guiding and focusing further research and development in user experience for static code analyses."}],"user_id":"32312","department":[{"_id":"76"}],"_id":"52662","language":[{"iso":"eng"}],"keyword":["Automated static analysis","Software usability"],"publication_identifier":{"isbn":["978-3-88579-726-5"]},"citation":{"apa":"Nachtigall, M., Schlichtig, M., &#38; Bodden, E. (2023). Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale. In <i>Software Engineering 2023</i> (pp. 95–96). Gesellschaft für Informatik e.V.","bibtex":"@inbook{Nachtigall_Schlichtig_Bodden_2023, place={Bonn}, title={Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale}, booktitle={Software Engineering 2023}, publisher={Gesellschaft für Informatik e.V.}, author={Nachtigall, Marcus and Schlichtig, Michael and Bodden, Eric}, year={2023}, pages={95–96} }","mla":"Nachtigall, Marcus, et al. “Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale.” <i>Software Engineering 2023</i>, Gesellschaft für Informatik e.V., 2023, pp. 95–96.","short":"M. Nachtigall, M. Schlichtig, E. Bodden, in: Software Engineering 2023, Gesellschaft für Informatik e.V., Bonn, 2023, pp. 95–96.","ama":"Nachtigall M, Schlichtig M, Bodden E. Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale. In: <i>Software Engineering 2023</i>. Gesellschaft für Informatik e.V.; 2023:95–96.","chicago":"Nachtigall, Marcus, Michael Schlichtig, and Eric Bodden. “Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale.” In <i>Software Engineering 2023</i>, 95–96. Bonn: Gesellschaft für Informatik e.V., 2023.","ieee":"M. Nachtigall, M. Schlichtig, and E. Bodden, “Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale,” in <i>Software Engineering 2023</i>, Bonn: Gesellschaft für Informatik e.V., 2023, pp. 95–96."},"page":"95–96","place":"Bonn","year":"2023","author":[{"full_name":"Nachtigall, Marcus","id":"41213","last_name":"Nachtigall","first_name":"Marcus"},{"orcid":"0000-0001-6600-6171","last_name":"Schlichtig","id":"32312","full_name":"Schlichtig, Michael","first_name":"Michael"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2024-03-20T09:26:29Z","publisher":"Gesellschaft für Informatik e.V.","date_updated":"2024-03-20T09:27:41Z","main_file_link":[{"url":"https://dl.gi.de/items/5afe477f-2f6a-4b3d-b391-f024baf0b7a5"}],"title":"Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale"},{"keyword":["Electrical and Electronic Engineering","Hardware and Architecture","Software"],"article_type":"original","language":[{"iso":"eng"}],"_id":"46264","department":[{"_id":"48"}],"user_id":"209","abstract":[{"text":"System-level interconnects provide the\r\nbackbone for increasingly complex systems on a chip. Their\r\nvulnerability to electromigration and crosstalk can lead to\r\nserious reliability and safety issues during the system lifetime.\r\nThis article presents an approach for periodic in-system testing\r\nwhich maintains a reliability profile to detect potential\r\nproblems before they actually cause a failure. Relying on a\r\ncommon infrastructure for EM-aware system workload\r\nmanagement and test, it minimizes the stress induced by the\r\ntest itself and contributes to the self-healing of system-induced\r\nelectromigration degradations. ","lang":"eng"}],"status":"public","publication":"IEEE Design &Test","type":"journal_article","title":"Workload-Aware Periodic Interconnect BIST","doi":"10.1109/mdat.2023.3298849","main_file_link":[{"url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10194315"}],"date_updated":"2024-03-22T17:15:10Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","author":[{"first_name":"Somayeh","full_name":"Sadeghi-Kohan, Somayeh","id":"78614","last_name":"Sadeghi-Kohan","orcid":"https://orcid.org/0000-0001-7246-0610"},{"orcid":"0000-0002-3717-3939","last_name":"Hellebrand","full_name":"Hellebrand, Sybille","id":"209","first_name":"Sybille"},{"last_name":"Wunderlich","full_name":"Wunderlich, Hans-Joachim","first_name":"Hans-Joachim"}],"date_created":"2023-08-02T11:07:43Z","year":"2023","page":"1-1","citation":{"ama":"Sadeghi-Kohan S, Hellebrand S, Wunderlich H-J. Workload-Aware Periodic Interconnect BIST. <i>IEEE Design &#38;Test</i>. Published online 2023:1-1. doi:<a href=\"https://doi.org/10.1109/mdat.2023.3298849\">10.1109/mdat.2023.3298849</a>","ieee":"S. Sadeghi-Kohan, S. Hellebrand, and H.-J. Wunderlich, “Workload-Aware Periodic Interconnect BIST,” <i>IEEE Design &#38;Test</i>, pp. 1–1, 2023, doi: <a href=\"https://doi.org/10.1109/mdat.2023.3298849\">10.1109/mdat.2023.3298849</a>.","chicago":"Sadeghi-Kohan, Somayeh, Sybille Hellebrand, and Hans-Joachim Wunderlich. “Workload-Aware Periodic Interconnect BIST.” <i>IEEE Design &#38;Test</i>, 2023, 1–1. <a href=\"https://doi.org/10.1109/mdat.2023.3298849\">https://doi.org/10.1109/mdat.2023.3298849</a>.","apa":"Sadeghi-Kohan, S., Hellebrand, S., &#38; Wunderlich, H.-J. (2023). Workload-Aware Periodic Interconnect BIST. <i>IEEE Design &#38;Test</i>, 1–1. <a href=\"https://doi.org/10.1109/mdat.2023.3298849\">https://doi.org/10.1109/mdat.2023.3298849</a>","bibtex":"@article{Sadeghi-Kohan_Hellebrand_Wunderlich_2023, title={Workload-Aware Periodic Interconnect BIST}, DOI={<a href=\"https://doi.org/10.1109/mdat.2023.3298849\">10.1109/mdat.2023.3298849</a>}, journal={IEEE Design &#38;Test}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Sadeghi-Kohan, Somayeh and Hellebrand, Sybille and Wunderlich, Hans-Joachim}, year={2023}, pages={1–1} }","mla":"Sadeghi-Kohan, Somayeh, et al. “Workload-Aware Periodic Interconnect BIST.” <i>IEEE Design &#38;Test</i>, Institute of Electrical and Electronics Engineers (IEEE), 2023, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/mdat.2023.3298849\">10.1109/mdat.2023.3298849</a>.","short":"S. Sadeghi-Kohan, S. Hellebrand, H.-J. Wunderlich, IEEE Design &#38;Test (2023) 1–1."},"publication_identifier":{"issn":["2168-2356","2168-2364"]},"publication_status":"published"},{"article_number":"100786","keyword":["Management of Technology and Innovation","Artificial Intelligence","Computer Science Applications","Hardware and Architecture","Engineering (miscellaneous)","Information Systems","Computer Science (miscellaneous)","Software"],"language":[{"iso":"eng"}],"_id":"53220","user_id":"51811","department":[{"_id":"277"}],"status":"public","type":"journal_article","publication":"Internet of Things","title":"An interval multi-criteria decision-making model for evaluating blockchain-IoT technology in supply chain networks","doi":"10.1016/j.iot.2023.100786","date_updated":"2024-04-15T13:10:41Z","publisher":"Elsevier BV","date_created":"2024-04-04T13:49:53Z","author":[{"first_name":"Madjid","full_name":"Tavana, Madjid","id":"31858","last_name":"Tavana"},{"first_name":"Arash","full_name":"Khalili Nasr, Arash","last_name":"Khalili Nasr"},{"full_name":"Ahmadabadi, Alireza Barati","last_name":"Ahmadabadi","first_name":"Alireza Barati"},{"full_name":"Amiri, Alireza Shamekhi","last_name":"Amiri","first_name":"Alireza Shamekhi"},{"full_name":"Mina, Hassan","last_name":"Mina","first_name":"Hassan"}],"volume":22,"year":"2023","citation":{"apa":"Tavana, M., Khalili Nasr, A., Ahmadabadi, A. B., Amiri, A. S., &#38; Mina, H. (2023). An interval multi-criteria decision-making model for evaluating blockchain-IoT technology in supply chain networks. <i>Internet of Things</i>, <i>22</i>, Article 100786. <a href=\"https://doi.org/10.1016/j.iot.2023.100786\">https://doi.org/10.1016/j.iot.2023.100786</a>","bibtex":"@article{Tavana_Khalili Nasr_Ahmadabadi_Amiri_Mina_2023, title={An interval multi-criteria decision-making model for evaluating blockchain-IoT technology in supply chain networks}, volume={22}, DOI={<a href=\"https://doi.org/10.1016/j.iot.2023.100786\">10.1016/j.iot.2023.100786</a>}, number={100786}, journal={Internet of Things}, publisher={Elsevier BV}, author={Tavana, Madjid and Khalili Nasr, Arash and Ahmadabadi, Alireza Barati and Amiri, Alireza Shamekhi and Mina, Hassan}, year={2023} }","mla":"Tavana, Madjid, et al. “An Interval Multi-Criteria Decision-Making Model for Evaluating Blockchain-IoT Technology in Supply Chain Networks.” <i>Internet of Things</i>, vol. 22, 100786, Elsevier BV, 2023, doi:<a href=\"https://doi.org/10.1016/j.iot.2023.100786\">10.1016/j.iot.2023.100786</a>.","short":"M. Tavana, A. Khalili Nasr, A.B. Ahmadabadi, A.S. Amiri, H. Mina, Internet of Things 22 (2023).","ama":"Tavana M, Khalili Nasr A, Ahmadabadi AB, Amiri AS, Mina H. An interval multi-criteria decision-making model for evaluating blockchain-IoT technology in supply chain networks. <i>Internet of Things</i>. 2023;22. doi:<a href=\"https://doi.org/10.1016/j.iot.2023.100786\">10.1016/j.iot.2023.100786</a>","ieee":"M. Tavana, A. Khalili Nasr, A. B. Ahmadabadi, A. S. Amiri, and H. Mina, “An interval multi-criteria decision-making model for evaluating blockchain-IoT technology in supply chain networks,” <i>Internet of Things</i>, vol. 22, Art. no. 100786, 2023, doi: <a href=\"https://doi.org/10.1016/j.iot.2023.100786\">10.1016/j.iot.2023.100786</a>.","chicago":"Tavana, Madjid, Arash Khalili Nasr, Alireza Barati Ahmadabadi, Alireza Shamekhi Amiri, and Hassan Mina. “An Interval Multi-Criteria Decision-Making Model for Evaluating Blockchain-IoT Technology in Supply Chain Networks.” <i>Internet of Things</i> 22 (2023). <a href=\"https://doi.org/10.1016/j.iot.2023.100786\">https://doi.org/10.1016/j.iot.2023.100786</a>."},"intvolume":"        22","publication_status":"published","publication_identifier":{"issn":["2542-6605"]}},{"language":[{"iso":"eng"}],"keyword":["Software"],"article_number":"110572","department":[{"_id":"277"}],"user_id":"51811","_id":"53215","status":"public","publication":"Applied Soft Computing","type":"journal_article","doi":"10.1016/j.asoc.2023.110572","title":"A fuzzy preference programming and weighted influence non-linear gauge system for mission architecture assessment at NASA","volume":145,"date_created":"2024-04-04T13:37:53Z","author":[{"first_name":"Madjid","last_name":"Tavana","id":"31858","full_name":"Tavana, Madjid"},{"first_name":"Mohammad Saeed","full_name":"Heidary, Mohammad Saeed","last_name":"Heidary"},{"last_name":"Mina","full_name":"Mina, Hassan","first_name":"Hassan"}],"date_updated":"2024-04-15T13:07:05Z","publisher":"Elsevier BV","intvolume":"       145","citation":{"ama":"Tavana M, Heidary MS, Mina H. A fuzzy preference programming and weighted influence non-linear gauge system for mission architecture assessment at NASA. <i>Applied Soft Computing</i>. 2023;145. doi:<a href=\"https://doi.org/10.1016/j.asoc.2023.110572\">10.1016/j.asoc.2023.110572</a>","ieee":"M. Tavana, M. S. Heidary, and H. Mina, “A fuzzy preference programming and weighted influence non-linear gauge system for mission architecture assessment at NASA,” <i>Applied Soft Computing</i>, vol. 145, Art. no. 110572, 2023, doi: <a href=\"https://doi.org/10.1016/j.asoc.2023.110572\">10.1016/j.asoc.2023.110572</a>.","chicago":"Tavana, Madjid, Mohammad Saeed Heidary, and Hassan Mina. “A Fuzzy Preference Programming and Weighted Influence Non-Linear Gauge System for Mission Architecture Assessment at NASA.” <i>Applied Soft Computing</i> 145 (2023). <a href=\"https://doi.org/10.1016/j.asoc.2023.110572\">https://doi.org/10.1016/j.asoc.2023.110572</a>.","bibtex":"@article{Tavana_Heidary_Mina_2023, title={A fuzzy preference programming and weighted influence non-linear gauge system for mission architecture assessment at NASA}, volume={145}, DOI={<a href=\"https://doi.org/10.1016/j.asoc.2023.110572\">10.1016/j.asoc.2023.110572</a>}, number={110572}, journal={Applied Soft Computing}, publisher={Elsevier BV}, author={Tavana, Madjid and Heidary, Mohammad Saeed and Mina, Hassan}, year={2023} }","mla":"Tavana, Madjid, et al. “A Fuzzy Preference Programming and Weighted Influence Non-Linear Gauge System for Mission Architecture Assessment at NASA.” <i>Applied Soft Computing</i>, vol. 145, 110572, Elsevier BV, 2023, doi:<a href=\"https://doi.org/10.1016/j.asoc.2023.110572\">10.1016/j.asoc.2023.110572</a>.","short":"M. Tavana, M.S. Heidary, H. Mina, Applied Soft Computing 145 (2023).","apa":"Tavana, M., Heidary, M. S., &#38; Mina, H. (2023). A fuzzy preference programming and weighted influence non-linear gauge system for mission architecture assessment at NASA. <i>Applied Soft Computing</i>, <i>145</i>, Article 110572. <a href=\"https://doi.org/10.1016/j.asoc.2023.110572\">https://doi.org/10.1016/j.asoc.2023.110572</a>"},"year":"2023","publication_identifier":{"issn":["1568-4946"]},"publication_status":"published"},{"publication_identifier":{"issn":["0196-9722","1087-6553"]},"publication_status":"published","page":"104-137","intvolume":"        54","citation":{"bibtex":"@article{Mahdiraji_Tavana_Rezayar_2023, title={A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability}, volume={54}, DOI={<a href=\"https://doi.org/10.1080/01969722.2022.2055402\">10.1080/01969722.2022.2055402</a>}, number={1}, journal={Cybernetics and Systems}, publisher={Informa UK Limited}, author={Mahdiraji, Hannan Amoozad and Tavana, Madjid and Rezayar, Ali}, year={2023}, pages={104–137} }","mla":"Mahdiraji, Hannan Amoozad, et al. “A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability.” <i>Cybernetics and Systems</i>, vol. 54, no. 1, Informa UK Limited, 2023, pp. 104–37, doi:<a href=\"https://doi.org/10.1080/01969722.2022.2055402\">10.1080/01969722.2022.2055402</a>.","short":"H.A. Mahdiraji, M. Tavana, A. Rezayar, Cybernetics and Systems 54 (2023) 104–137.","apa":"Mahdiraji, H. A., Tavana, M., &#38; Rezayar, A. (2023). A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability. <i>Cybernetics and Systems</i>, <i>54</i>(1), 104–137. <a href=\"https://doi.org/10.1080/01969722.2022.2055402\">https://doi.org/10.1080/01969722.2022.2055402</a>","ama":"Mahdiraji HA, Tavana M, Rezayar A. A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability. <i>Cybernetics and Systems</i>. 2023;54(1):104-137. doi:<a href=\"https://doi.org/10.1080/01969722.2022.2055402\">10.1080/01969722.2022.2055402</a>","chicago":"Mahdiraji, Hannan Amoozad, Madjid Tavana, and Ali Rezayar. “A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability.” <i>Cybernetics and Systems</i> 54, no. 1 (2023): 104–37. <a href=\"https://doi.org/10.1080/01969722.2022.2055402\">https://doi.org/10.1080/01969722.2022.2055402</a>.","ieee":"H. A. Mahdiraji, M. Tavana, and A. Rezayar, “A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability,” <i>Cybernetics and Systems</i>, vol. 54, no. 1, pp. 104–137, 2023, doi: <a href=\"https://doi.org/10.1080/01969722.2022.2055402\">10.1080/01969722.2022.2055402</a>."},"volume":54,"author":[{"full_name":"Mahdiraji, Hannan Amoozad","last_name":"Mahdiraji","first_name":"Hannan Amoozad"},{"first_name":"Madjid","last_name":"Tavana","id":"31858","full_name":"Tavana, Madjid"},{"full_name":"Rezayar, Ali","last_name":"Rezayar","first_name":"Ali"}],"date_updated":"2024-04-15T13:15:21Z","doi":"10.1080/01969722.2022.2055402","type":"journal_article","status":"public","department":[{"_id":"277"}],"user_id":"51811","_id":"53230","issue":"1","year":"2023","date_created":"2024-04-04T14:01:48Z","publisher":"Informa UK Limited","title":"A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability","publication":"Cybernetics and Systems","language":[{"iso":"eng"}],"keyword":["Artificial Intelligence","Information Systems","Software"]},{"status":"public","publication":"Operations Research Letters","type":"journal_article","keyword":["Applied Mathematics","Industrial and Manufacturing Engineering","Management Science and Operations Research","Software"],"language":[{"iso":"eng"}],"_id":"44077","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C4: SFB 901 - Subproject C4","_id":"16"}],"department":[{"_id":"63"}],"user_id":"88252","year":"2023","page":"220-225","intvolume":"        51","citation":{"ieee":"M. Maack, “Online load balancing on uniform machines with limited migration,” <i>Operations Research Letters</i>, vol. 51, no. 3, pp. 220–225, 2023, doi: <a href=\"https://doi.org/10.1016/j.orl.2023.02.013\">10.1016/j.orl.2023.02.013</a>.","chicago":"Maack, Marten. “Online Load Balancing on Uniform Machines with Limited Migration.” <i>Operations Research Letters</i> 51, no. 3 (2023): 220–25. <a href=\"https://doi.org/10.1016/j.orl.2023.02.013\">https://doi.org/10.1016/j.orl.2023.02.013</a>.","ama":"Maack M. Online load balancing on uniform machines with limited migration. <i>Operations Research Letters</i>. 2023;51(3):220-225. doi:<a href=\"https://doi.org/10.1016/j.orl.2023.02.013\">10.1016/j.orl.2023.02.013</a>","apa":"Maack, M. (2023). Online load balancing on uniform machines with limited migration. <i>Operations Research Letters</i>, <i>51</i>(3), 220–225. <a href=\"https://doi.org/10.1016/j.orl.2023.02.013\">https://doi.org/10.1016/j.orl.2023.02.013</a>","mla":"Maack, Marten. “Online Load Balancing on Uniform Machines with Limited Migration.” <i>Operations Research Letters</i>, vol. 51, no. 3, Elsevier BV, 2023, pp. 220–25, doi:<a href=\"https://doi.org/10.1016/j.orl.2023.02.013\">10.1016/j.orl.2023.02.013</a>.","short":"M. Maack, Operations Research Letters 51 (2023) 220–225.","bibtex":"@article{Maack_2023, title={Online load balancing on uniform machines with limited migration}, volume={51}, DOI={<a href=\"https://doi.org/10.1016/j.orl.2023.02.013\">10.1016/j.orl.2023.02.013</a>}, number={3}, journal={Operations Research Letters}, publisher={Elsevier BV}, author={Maack, Marten}, year={2023}, pages={220–225} }"},"publication_identifier":{"issn":["0167-6377"]},"issue":"3","title":"Online load balancing on uniform machines with limited migration","doi":"10.1016/j.orl.2023.02.013","date_updated":"2023-04-21T07:53:42Z","publisher":"Elsevier BV","volume":51,"author":[{"first_name":"Marten","last_name":"Maack","full_name":"Maack, Marten"}],"date_created":"2023-04-20T08:59:14Z"},{"type":"journal_article","status":"public","_id":"44382","department":[{"_id":"152"}],"user_id":"5905","article_number":"154","publication_identifier":{"issn":["2079-8954"]},"publication_status":"published","intvolume":"        11","citation":{"apa":"Gräßler, I., Wiechel, D., Koch, A.-S., Sturm, T., &#38; Markfelder, T. (2023). Methodology for Certification-Compliant Effect-Chain Modeling. <i>Systems</i>, <i>11</i>(3), Article 154. <a href=\"https://doi.org/10.3390/systems11030154\">https://doi.org/10.3390/systems11030154</a>","bibtex":"@article{Gräßler_Wiechel_Koch_Sturm_Markfelder_2023, title={Methodology for Certification-Compliant Effect-Chain Modeling}, volume={11}, DOI={<a href=\"https://doi.org/10.3390/systems11030154\">10.3390/systems11030154</a>}, number={3154}, journal={Systems}, publisher={MDPI AG}, author={Gräßler, Iris and Wiechel, Dominik and Koch, Anna-Sophie and Sturm, Tim and Markfelder, Thomas}, year={2023} }","short":"I. Gräßler, D. Wiechel, A.-S. Koch, T. Sturm, T. Markfelder, Systems 11 (2023).","mla":"Gräßler, Iris, et al. “Methodology for Certification-Compliant Effect-Chain Modeling.” <i>Systems</i>, vol. 11, no. 3, 154, MDPI AG, 2023, doi:<a href=\"https://doi.org/10.3390/systems11030154\">10.3390/systems11030154</a>.","ama":"Gräßler I, Wiechel D, Koch A-S, Sturm T, Markfelder T. Methodology for Certification-Compliant Effect-Chain Modeling. <i>Systems</i>. 2023;11(3). doi:<a href=\"https://doi.org/10.3390/systems11030154\">10.3390/systems11030154</a>","ieee":"I. Gräßler, D. Wiechel, A.-S. Koch, T. Sturm, and T. Markfelder, “Methodology for Certification-Compliant Effect-Chain Modeling,” <i>Systems</i>, vol. 11, no. 3, Art. no. 154, 2023, doi: <a href=\"https://doi.org/10.3390/systems11030154\">10.3390/systems11030154</a>.","chicago":"Gräßler, Iris, Dominik Wiechel, Anna-Sophie Koch, Tim Sturm, and Thomas Markfelder. “Methodology for Certification-Compliant Effect-Chain Modeling.” <i>Systems</i> 11, no. 3 (2023). <a href=\"https://doi.org/10.3390/systems11030154\">https://doi.org/10.3390/systems11030154</a>."},"date_updated":"2023-05-03T08:40:22Z","volume":11,"author":[{"first_name":"Iris","id":"47565","full_name":"Gräßler, Iris","orcid":"0000-0001-5765-971X","last_name":"Gräßler"},{"full_name":"Wiechel, Dominik","id":"67161","last_name":"Wiechel","first_name":"Dominik"},{"last_name":"Koch","id":"44158","full_name":"Koch, Anna-Sophie","first_name":"Anna-Sophie"},{"last_name":"Sturm","full_name":"Sturm, Tim","first_name":"Tim"},{"first_name":"Thomas","full_name":"Markfelder, Thomas","last_name":"Markfelder"}],"doi":"10.3390/systems11030154","publication":"Systems","abstract":[{"text":"<jats:p>The success of engineering complex technical systems is determined by meeting customer requirements and institutional regulations. One example relevant to the automobile industry is the United Nations Economic Commission of Europe (UN ECE), which specifies the homologation of automobile series and requires proof of traceability. The required traceability can be achieved by modeling system artifacts and their relations in a consistent, seamless model—an effect-chain model. Currently, no in-depth methodology exists to support engineers in developing certification-compliant effect-chain models. For this purpose, a new methodology for certification-compliant effect-chain modeling was developed, which includes extensions of an existing method, suitable models, and tools to support engineers in the modeling process. For evaluation purposes, applicability is proven based on the experience of more than 300 workshops at an automotive OEM and an automotive supplier. The following case example is chosen to demonstrate applicability: the development of a window lifter that has to meet the demands of UN ECE Regulations R156 and R21. Results indicate multiple benefits in supporting engineers with the certification-compliant modeling of effect chains. Three benefits are goal-oriented modeling to reduce the necessary modeling capacity, increasing model quality by applying information quality criteria, and the potential to reduce costs through automatable effect-chain analyses for technical changes. Further, companies in the automotive and other industries will benefit from increased modeling capabilities that can be used for architecture modeling and to comply with other regulations such as ASPICE or ISO 26262.</jats:p>","lang":"eng"}],"keyword":["Information Systems and Management","Computer Networks and Communications","Modeling and Simulation","Control and Systems Engineering","Software"],"language":[{"iso":"eng"}],"quality_controlled":"1","issue":"3","year":"2023","publisher":"MDPI AG","date_created":"2023-05-03T08:37:36Z","title":"Methodology for Certification-Compliant Effect-Chain Modeling"},{"type":"journal_article","status":"public","project":[{"name":"PC2: Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"45361","user_id":"75963","department":[{"_id":"27"},{"_id":"518"}],"article_number":"109434202311776","article_type":"original","publication_status":"published","publication_identifier":{"issn":["1094-3420","1741-2846"]},"citation":{"bibtex":"@article{Schade_Kenter_Elgabarty_Lass_Kühne_Plessl_2023, title={Breaking the exascale barrier for the electronic structure problem in ab-initio molecular dynamics}, DOI={<a href=\"https://doi.org/10.1177/10943420231177631\">10.1177/10943420231177631</a>}, number={109434202311776}, journal={The International Journal of High Performance Computing Applications}, publisher={SAGE Publications}, author={Schade, Robert and Kenter, Tobias and Elgabarty, Hossam and Lass, Michael and Kühne, Thomas and Plessl, Christian}, year={2023} }","short":"R. Schade, T. Kenter, H. Elgabarty, M. Lass, T. Kühne, C. Plessl, The International Journal of High Performance Computing Applications (2023).","mla":"Schade, Robert, et al. “Breaking the Exascale Barrier for the Electronic Structure Problem in Ab-Initio Molecular Dynamics.” <i>The International Journal of High Performance Computing Applications</i>, 109434202311776, SAGE Publications, 2023, doi:<a href=\"https://doi.org/10.1177/10943420231177631\">10.1177/10943420231177631</a>.","apa":"Schade, R., Kenter, T., Elgabarty, H., Lass, M., Kühne, T., &#38; Plessl, C. (2023). Breaking the exascale barrier for the electronic structure problem in ab-initio molecular dynamics. <i>The International Journal of High Performance Computing Applications</i>, Article 109434202311776. <a href=\"https://doi.org/10.1177/10943420231177631\">https://doi.org/10.1177/10943420231177631</a>","ama":"Schade R, Kenter T, Elgabarty H, Lass M, Kühne T, Plessl C. Breaking the exascale barrier for the electronic structure problem in ab-initio molecular dynamics. <i>The International Journal of High Performance Computing Applications</i>. Published online 2023. doi:<a href=\"https://doi.org/10.1177/10943420231177631\">10.1177/10943420231177631</a>","ieee":"R. Schade, T. Kenter, H. Elgabarty, M. Lass, T. Kühne, and C. Plessl, “Breaking the exascale barrier for the electronic structure problem in ab-initio molecular dynamics,” <i>The International Journal of High Performance Computing Applications</i>, Art. no. 109434202311776, 2023, doi: <a href=\"https://doi.org/10.1177/10943420231177631\">10.1177/10943420231177631</a>.","chicago":"Schade, Robert, Tobias Kenter, Hossam Elgabarty, Michael Lass, Thomas Kühne, and Christian Plessl. “Breaking the Exascale Barrier for the Electronic Structure Problem in Ab-Initio Molecular Dynamics.” <i>The International Journal of High Performance Computing Applications</i>, 2023. <a href=\"https://doi.org/10.1177/10943420231177631\">https://doi.org/10.1177/10943420231177631</a>."},"oa":"1","date_updated":"2023-08-02T15:04:53Z","author":[{"id":"75963","full_name":"Schade, Robert","orcid":"0000-0002-6268-539","last_name":"Schade","first_name":"Robert"},{"first_name":"Tobias","last_name":"Kenter","full_name":"Kenter, Tobias","id":"3145"},{"first_name":"Hossam","id":"60250","full_name":"Elgabarty, Hossam","last_name":"Elgabarty","orcid":"0000-0002-4945-1481"},{"first_name":"Michael","last_name":"Lass","orcid":"0000-0002-5708-7632","id":"24135","full_name":"Lass, Michael"},{"full_name":"Kühne, Thomas","id":"49079","last_name":"Kühne","first_name":"Thomas"},{"first_name":"Christian","full_name":"Plessl, Christian","id":"16153","last_name":"Plessl","orcid":"0000-0001-5728-9982"}],"main_file_link":[{"url":"https://journals.sagepub.com/doi/10.1177/10943420231177631","open_access":"1"}],"doi":"10.1177/10943420231177631","publication":"The International Journal of High Performance Computing Applications","abstract":[{"lang":"eng","text":"<jats:p> The non-orthogonal local submatrix method applied to electronic structure–based molecular dynamics simulations is shown to exceed 1.1 EFLOP/s in FP16/FP32-mixed floating-point arithmetic when using 4400 NVIDIA A100 GPUs of the Perlmutter system. This is enabled by a modification of the original method that pushes the sustained fraction of the peak performance to about 80%. Example calculations are performed for SARS-CoV-2 spike proteins with up to 83 million atoms. </jats:p>"}],"keyword":["Hardware and Architecture","Theoretical Computer Science","Software"],"language":[{"iso":"eng"}],"quality_controlled":"1","year":"2023","publisher":"SAGE Publications","date_created":"2023-05-30T09:19:09Z","title":"Breaking the exascale barrier for the electronic structure problem in ab-initio molecular dynamics"},{"project":[{"name":"TRR 318 - C3: TRR 318 - Subproject C3","_id":"126"},{"name":"TRR 318 - C: TRR 318 - Project Area C","_id":"117"},{"_id":"109","name":"TRR 318: TRR 318 - Erklärbarkeit konstruieren","grant_number":"438445824"}],"_id":"50262","user_id":"93420","department":[{"_id":"660"}],"status":"public","type":"journal_article","doi":"10.1007/s10994-023-06385-y","date_updated":"2025-01-16T16:20:12Z","author":[{"first_name":"Fabian","last_name":"Fumagalli","full_name":"Fumagalli, Fabian"},{"first_name":"Maximilian","full_name":"Muschalik, Maximilian","last_name":"Muschalik"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier"},{"full_name":"Hammer, Barbara","last_name":"Hammer","first_name":"Barbara"}],"volume":112,"citation":{"mla":"Fumagalli, Fabian, et al. “Incremental Permutation Feature Importance (IPFI): Towards Online Explanations on Data Streams.” <i>Machine Learning</i>, vol. 112, no. 12, Springer Science and Business Media LLC, 2023, pp. 4863–903, doi:<a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>.","short":"F. Fumagalli, M. Muschalik, E. Hüllermeier, B. Hammer, Machine Learning 112 (2023) 4863–4903.","bibtex":"@article{Fumagalli_Muschalik_Hüllermeier_Hammer_2023, title={Incremental permutation feature importance (iPFI): towards online explanations on data streams}, volume={112}, DOI={<a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>}, number={12}, journal={Machine Learning}, publisher={Springer Science and Business Media LLC}, author={Fumagalli, Fabian and Muschalik, Maximilian and Hüllermeier, Eyke and Hammer, Barbara}, year={2023}, pages={4863–4903} }","apa":"Fumagalli, F., Muschalik, M., Hüllermeier, E., &#38; Hammer, B. (2023). Incremental permutation feature importance (iPFI): towards online explanations on data streams. <i>Machine Learning</i>, <i>112</i>(12), 4863–4903. <a href=\"https://doi.org/10.1007/s10994-023-06385-y\">https://doi.org/10.1007/s10994-023-06385-y</a>","chicago":"Fumagalli, Fabian, Maximilian Muschalik, Eyke Hüllermeier, and Barbara Hammer. “Incremental Permutation Feature Importance (IPFI): Towards Online Explanations on Data Streams.” <i>Machine Learning</i> 112, no. 12 (2023): 4863–4903. <a href=\"https://doi.org/10.1007/s10994-023-06385-y\">https://doi.org/10.1007/s10994-023-06385-y</a>.","ieee":"F. Fumagalli, M. Muschalik, E. Hüllermeier, and B. Hammer, “Incremental permutation feature importance (iPFI): towards online explanations on data streams,” <i>Machine Learning</i>, vol. 112, no. 12, pp. 4863–4903, 2023, doi: <a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>.","ama":"Fumagalli F, Muschalik M, Hüllermeier E, Hammer B. Incremental permutation feature importance (iPFI): towards online explanations on data streams. <i>Machine Learning</i>. 2023;112(12):4863-4903. doi:<a href=\"https://doi.org/10.1007/s10994-023-06385-y\">10.1007/s10994-023-06385-y</a>"},"intvolume":"       112","page":"4863-4903","publication_status":"published","publication_identifier":{"issn":["0885-6125","1573-0565"]},"keyword":["Artificial Intelligence","Software"],"language":[{"iso":"eng"}],"abstract":[{"text":"<jats:title>Abstract</jats:title><jats:p>Explainable artificial intelligence has mainly focused on static learning scenarios so far. We are interested in dynamic scenarios where data is sampled progressively, and learning is done in an incremental rather than a batch mode. We seek efficient incremental algorithms for computing feature importance (FI). Permutation feature importance (PFI) is a well-established model-agnostic measure to obtain global FI based on feature marginalization of absent features. We propose an efficient, model-agnostic algorithm called iPFI to estimate this measure incrementally and under dynamic modeling conditions including concept drift. We prove theoretical guarantees on the approximation quality in terms of expectation and variance. To validate our theoretical findings and the efficacy of our approaches in incremental scenarios dealing with streaming data rather than traditional batch settings, we conduct multiple experimental studies on benchmark data with and without concept drift.</jats:p>","lang":"eng"}],"publication":"Machine Learning","title":"Incremental permutation feature importance (iPFI): towards online explanations on data streams","publisher":"Springer Science and Business Media LLC","date_created":"2024-01-05T21:52:28Z","year":"2023","issue":"12"}]
