---
_id: '62738'
abstract:
- lang: eng
  text: 'Vulnerability disclosures are necessary to improve the security of our digital
    ecosystem. However, they can also be challenging for researchers: it may be hard
    to find out who the affected parties even are, or how to contact them. Researchers
    may be ignored or face adversity when disclosing vulnerabilities. We investigate
    researchers'' experiences with vulnerability disclosures, extract best practices,
    and make recommendations for researchers, institutions that employ them, industry,
    and regulators to enable effective vulnerability disclosures.'
author:
- first_name: Harshini
  full_name: Sri Ramulu, Harshini
  id: '99000'
  last_name: Sri Ramulu
  orcid: 0000-0002-0000-5843
- first_name: Anna Lena
  full_name: Rotthaler, Anna Lena
  id: '97843'
  last_name: Rotthaler
- first_name: Jost
  full_name: Rossel, Jost
  id: '58331'
  last_name: Rossel
  orcid: 0000-0002-3182-4059
- first_name: Rachel
  full_name: Gonzalez Rodriguez, Rachel
  last_name: Gonzalez Rodriguez
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Tadayoshi
  full_name: Kohno, Tadayoshi
  last_name: Kohno
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Sri Ramulu H, Rotthaler AL, Rossel J, et al. Poster: Computer Security Researchers’
    Experiences with Vulnerability Disclosures. In: <i>Proceedings of the 2025 ACM
    SIGSAC Conference on Computer and Communications Security</i>. ACM; 2025. doi:<a
    href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>'
  apa: 'Sri Ramulu, H., Rotthaler, A. L., Rossel, J., Gonzalez Rodriguez, R., Wermke,
    D., Fahl, S., Kohno, T., Somorovsky, J., &#38; Acar, Y. (2025). Poster: Computer
    Security Researchers’ Experiences with Vulnerability Disclosures. <i>Proceedings
    of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>.
    <a href="https://doi.org/10.1145/3719027.3760723">https://doi.org/10.1145/3719027.3760723</a>'
  bibtex: '@inproceedings{Sri Ramulu_Rotthaler_Rossel_Gonzalez Rodriguez_Wermke_Fahl_Kohno_Somorovsky_Acar_2025,
    title={Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures},
    DOI={<a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>},
    booktitle={Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Sri Ramulu, Harshini and Rotthaler, Anna Lena
    and Rossel, Jost and Gonzalez Rodriguez, Rachel and Wermke, Dominik and Fahl,
    Sascha and Kohno, Tadayoshi and Somorovsky, Juraj and Acar, Yasemin}, year={2025}
    }'
  chicago: 'Sri Ramulu, Harshini, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez
    Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, and
    Yasemin Acar. “Poster: Computer Security Researchers’ Experiences with Vulnerability
    Disclosures.” In <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer
    and Communications Security</i>. ACM, 2025. <a href="https://doi.org/10.1145/3719027.3760723">https://doi.org/10.1145/3719027.3760723</a>.'
  ieee: 'H. Sri Ramulu <i>et al.</i>, “Poster: Computer Security Researchers’ Experiences
    with Vulnerability Disclosures,” 2025, doi: <a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>.'
  mla: 'Sri Ramulu, Harshini, et al. “Poster: Computer Security Researchers’ Experiences
    with Vulnerability Disclosures.” <i>Proceedings of the 2025 ACM SIGSAC Conference
    on Computer and Communications Security</i>, ACM, 2025, doi:<a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>.'
  short: 'H. Sri Ramulu, A.L. Rotthaler, J. Rossel, R. Gonzalez Rodriguez, D. Wermke,
    S. Fahl, T. Kohno, J. Somorovsky, Y. Acar, in: Proceedings of the 2025 ACM SIGSAC
    Conference on Computer and Communications Security, ACM, 2025.'
conference:
  end_date: 2025-10-17
  start_date: 2025-10-13
date_created: 2025-12-02T08:48:00Z
date_updated: 2025-12-02T08:54:18Z
doi: 10.1145/3719027.3760723
keyword:
- software vulnerabilities
- vulnerability disclosure
- security research
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://dl.acm.org/doi/10.1145/3719027.3760723
oa: '1'
publication: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'Poster: Computer Security Researchers'' Experiences with Vulnerability Disclosures'
type: conference
user_id: '58331'
year: '2025'
...
---
_id: '53213'
article_number: '101027'
author:
- first_name: Arman
  full_name: Amiri, Arman
  last_name: Amiri
- first_name: Madjid
  full_name: Tavana, Madjid
  id: '31858'
  last_name: Tavana
- first_name: Hosein
  full_name: Arman, Hosein
  last_name: Arman
citation:
  ama: Amiri A, Tavana M, Arman H. An Integrated Fuzzy Analytic Network Process and
    Fuzzy Regression Method for Bitcoin Price Prediction. <i>Internet of Things</i>.
    2024;25. doi:<a href="https://doi.org/10.1016/j.iot.2023.101027">10.1016/j.iot.2023.101027</a>
  apa: Amiri, A., Tavana, M., &#38; Arman, H. (2024). An Integrated Fuzzy Analytic
    Network Process and Fuzzy Regression Method for Bitcoin Price Prediction. <i>Internet
    of Things</i>, <i>25</i>, Article 101027. <a href="https://doi.org/10.1016/j.iot.2023.101027">https://doi.org/10.1016/j.iot.2023.101027</a>
  bibtex: '@article{Amiri_Tavana_Arman_2024, title={An Integrated Fuzzy Analytic Network
    Process and Fuzzy Regression Method for Bitcoin Price Prediction}, volume={25},
    DOI={<a href="https://doi.org/10.1016/j.iot.2023.101027">10.1016/j.iot.2023.101027</a>},
    number={101027}, journal={Internet of Things}, publisher={Elsevier BV}, author={Amiri,
    Arman and Tavana, Madjid and Arman, Hosein}, year={2024} }'
  chicago: Amiri, Arman, Madjid Tavana, and Hosein Arman. “An Integrated Fuzzy Analytic
    Network Process and Fuzzy Regression Method for Bitcoin Price Prediction.” <i>Internet
    of Things</i> 25 (2024). <a href="https://doi.org/10.1016/j.iot.2023.101027">https://doi.org/10.1016/j.iot.2023.101027</a>.
  ieee: 'A. Amiri, M. Tavana, and H. Arman, “An Integrated Fuzzy Analytic Network
    Process and Fuzzy Regression Method for Bitcoin Price Prediction,” <i>Internet
    of Things</i>, vol. 25, Art. no. 101027, 2024, doi: <a href="https://doi.org/10.1016/j.iot.2023.101027">10.1016/j.iot.2023.101027</a>.'
  mla: Amiri, Arman, et al. “An Integrated Fuzzy Analytic Network Process and Fuzzy
    Regression Method for Bitcoin Price Prediction.” <i>Internet of Things</i>, vol.
    25, 101027, Elsevier BV, 2024, doi:<a href="https://doi.org/10.1016/j.iot.2023.101027">10.1016/j.iot.2023.101027</a>.
  short: A. Amiri, M. Tavana, H. Arman, Internet of Things 25 (2024).
date_created: 2024-04-04T13:34:26Z
date_updated: 2024-04-15T13:08:17Z
department:
- _id: '277'
doi: 10.1016/j.iot.2023.101027
intvolume: '        25'
keyword:
- Management of Technology and Innovation
- Artificial Intelligence
- Computer Science Applications
- Hardware and Architecture
- Engineering (miscellaneous)
- Information Systems
- Computer Science (miscellaneous)
- Software
language:
- iso: eng
publication: Internet of Things
publication_identifier:
  issn:
  - 2542-6605
publication_status: published
publisher: Elsevier BV
status: public
title: An Integrated Fuzzy Analytic Network Process and Fuzzy Regression Method for
  Bitcoin Price Prediction
type: journal_article
user_id: '51811'
volume: 25
year: '2024'
...
---
_id: '53212'
author:
- first_name: Ehsan
  full_name: Mahmoodi, Ehsan
  last_name: Mahmoodi
- first_name: Masood
  full_name: Fathi, Masood
  last_name: Fathi
- first_name: Madjid
  full_name: Tavana, Madjid
  id: '31858'
  last_name: Tavana
- first_name: Morteza
  full_name: Ghobakhloo, Morteza
  last_name: Ghobakhloo
- first_name: Amos H.C.
  full_name: Ng, Amos H.C.
  last_name: Ng
citation:
  ama: Mahmoodi E, Fathi M, Tavana M, Ghobakhloo M, Ng AHC. Data-driven simulation-based
    decision support system for resource allocation in industry 4.0 and smart manufacturing.
    <i>Journal of Manufacturing Systems</i>. 2024;72:287-307. doi:<a href="https://doi.org/10.1016/j.jmsy.2023.11.019">10.1016/j.jmsy.2023.11.019</a>
  apa: Mahmoodi, E., Fathi, M., Tavana, M., Ghobakhloo, M., &#38; Ng, A. H. C. (2024).
    Data-driven simulation-based decision support system for resource allocation in
    industry 4.0 and smart manufacturing. <i>Journal of Manufacturing Systems</i>,
    <i>72</i>, 287–307. <a href="https://doi.org/10.1016/j.jmsy.2023.11.019">https://doi.org/10.1016/j.jmsy.2023.11.019</a>
  bibtex: '@article{Mahmoodi_Fathi_Tavana_Ghobakhloo_Ng_2024, title={Data-driven simulation-based
    decision support system for resource allocation in industry 4.0 and smart manufacturing},
    volume={72}, DOI={<a href="https://doi.org/10.1016/j.jmsy.2023.11.019">10.1016/j.jmsy.2023.11.019</a>},
    journal={Journal of Manufacturing Systems}, publisher={Elsevier BV}, author={Mahmoodi,
    Ehsan and Fathi, Masood and Tavana, Madjid and Ghobakhloo, Morteza and Ng, Amos
    H.C.}, year={2024}, pages={287–307} }'
  chicago: 'Mahmoodi, Ehsan, Masood Fathi, Madjid Tavana, Morteza Ghobakhloo, and
    Amos H.C. Ng. “Data-Driven Simulation-Based Decision Support System for Resource
    Allocation in Industry 4.0 and Smart Manufacturing.” <i>Journal of Manufacturing
    Systems</i> 72 (2024): 287–307. <a href="https://doi.org/10.1016/j.jmsy.2023.11.019">https://doi.org/10.1016/j.jmsy.2023.11.019</a>.'
  ieee: 'E. Mahmoodi, M. Fathi, M. Tavana, M. Ghobakhloo, and A. H. C. Ng, “Data-driven
    simulation-based decision support system for resource allocation in industry 4.0
    and smart manufacturing,” <i>Journal of Manufacturing Systems</i>, vol. 72, pp.
    287–307, 2024, doi: <a href="https://doi.org/10.1016/j.jmsy.2023.11.019">10.1016/j.jmsy.2023.11.019</a>.'
  mla: Mahmoodi, Ehsan, et al. “Data-Driven Simulation-Based Decision Support System
    for Resource Allocation in Industry 4.0 and Smart Manufacturing.” <i>Journal of
    Manufacturing Systems</i>, vol. 72, Elsevier BV, 2024, pp. 287–307, doi:<a href="https://doi.org/10.1016/j.jmsy.2023.11.019">10.1016/j.jmsy.2023.11.019</a>.
  short: E. Mahmoodi, M. Fathi, M. Tavana, M. Ghobakhloo, A.H.C. Ng, Journal of Manufacturing
    Systems 72 (2024) 287–307.
date_created: 2024-04-04T13:33:48Z
date_updated: 2024-04-15T13:08:02Z
department:
- _id: '277'
doi: 10.1016/j.jmsy.2023.11.019
intvolume: '        72'
keyword:
- Industrial and Manufacturing Engineering
- Hardware and Architecture
- Software
- Control and Systems Engineering
language:
- iso: eng
page: 287-307
publication: Journal of Manufacturing Systems
publication_identifier:
  issn:
  - 0278-6125
publication_status: published
publisher: Elsevier BV
status: public
title: Data-driven simulation-based decision support system for resource allocation
  in industry 4.0 and smart manufacturing
type: journal_article
user_id: '51811'
volume: 72
year: '2024'
...
---
_id: '53205'
article_number: '111098'
author:
- first_name: Madjid
  full_name: Tavana, Madjid
  id: '31858'
  last_name: Tavana
- first_name: Shahryar
  full_name: Sorooshian, Shahryar
  last_name: Sorooshian
citation:
  ama: Tavana M, Sorooshian S. A systematic review of the soft computing methods shaping
    the future of the metaverse. <i>Applied Soft Computing</i>. 2024;150. doi:<a href="https://doi.org/10.1016/j.asoc.2023.111098">10.1016/j.asoc.2023.111098</a>
  apa: Tavana, M., &#38; Sorooshian, S. (2024). A systematic review of the soft computing
    methods shaping the future of the metaverse. <i>Applied Soft Computing</i>, <i>150</i>,
    Article 111098. <a href="https://doi.org/10.1016/j.asoc.2023.111098">https://doi.org/10.1016/j.asoc.2023.111098</a>
  bibtex: '@article{Tavana_Sorooshian_2024, title={A systematic review of the soft
    computing methods shaping the future of the metaverse}, volume={150}, DOI={<a
    href="https://doi.org/10.1016/j.asoc.2023.111098">10.1016/j.asoc.2023.111098</a>},
    number={111098}, journal={Applied Soft Computing}, publisher={Elsevier BV}, author={Tavana,
    Madjid and Sorooshian, Shahryar}, year={2024} }'
  chicago: Tavana, Madjid, and Shahryar Sorooshian. “A Systematic Review of the Soft
    Computing Methods Shaping the Future of the Metaverse.” <i>Applied Soft Computing</i>
    150 (2024). <a href="https://doi.org/10.1016/j.asoc.2023.111098">https://doi.org/10.1016/j.asoc.2023.111098</a>.
  ieee: 'M. Tavana and S. Sorooshian, “A systematic review of the soft computing methods
    shaping the future of the metaverse,” <i>Applied Soft Computing</i>, vol. 150,
    Art. no. 111098, 2024, doi: <a href="https://doi.org/10.1016/j.asoc.2023.111098">10.1016/j.asoc.2023.111098</a>.'
  mla: Tavana, Madjid, and Shahryar Sorooshian. “A Systematic Review of the Soft Computing
    Methods Shaping the Future of the Metaverse.” <i>Applied Soft Computing</i>, vol.
    150, 111098, Elsevier BV, 2024, doi:<a href="https://doi.org/10.1016/j.asoc.2023.111098">10.1016/j.asoc.2023.111098</a>.
  short: M. Tavana, S. Sorooshian, Applied Soft Computing 150 (2024).
date_created: 2024-04-04T12:00:22Z
date_updated: 2024-04-15T13:07:49Z
department:
- _id: '277'
doi: 10.1016/j.asoc.2023.111098
intvolume: '       150'
keyword:
- Software
language:
- iso: eng
publication: Applied Soft Computing
publication_identifier:
  issn:
  - 1568-4946
publication_status: published
publisher: Elsevier BV
status: public
title: A systematic review of the soft computing methods shaping the future of the
  metaverse
type: journal_article
user_id: '51811'
volume: 150
year: '2024'
...
---
_id: '53811'
abstract:
- lang: eng
  text: Persistent security challenges plague DevOps teams due to a deficiency in
    expertise regarding security tools and methods, as evidenced by frequent security
    incidents. Existing maturity models fail to adequately address the specific needs
    of DevOps teams. In response, this paper proposes "Security Belts," a novel maturity
    model inspired by martial arts ranking systems. This model aims to assist DevOps
    teams in enhancing their security capabilities by providing a structured approach,
    starting with fundamental activities and progressing to more advanced techniques.
    Drawing from the experiences of monitoring 21 teams, the paper presents lessons
    learned and offers actionable advice for refining maturity models tailored to
    software quality improvement.
author:
- first_name: Samira
  full_name: Taaibi, Samira
  id: '55800'
  last_name: Taaibi
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Lars
  full_name: Hermerschmidt, Lars
  last_name: Hermerschmidt
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Sven
  full_name: Merschjohann, Sven
  id: '11394'
  last_name: Merschjohann
- first_name: Mark
  full_name: Vollmary, Mark
  last_name: Vollmary
citation:
  ama: 'Taaibi S, Dziwok S, Hermerschmidt L, Koch T, Merschjohann S, Vollmary M. Security
    Belts: A Maturity Model for DevOps Teams to Increase the Software Security of
    their Product - An Experience Report.'
  apa: 'Taaibi, S., Dziwok, S., Hermerschmidt, L., Koch, T., Merschjohann, S., &#38;
    Vollmary, M. (n.d.). <i>Security Belts: A Maturity Model for DevOps Teams to Increase
    the Software Security of their Product - An Experience Report</i>.  30th Americas
    Conference on Information Systems, Salt Lake City.'
  bibtex: '@inproceedings{Taaibi_Dziwok_Hermerschmidt_Koch_Merschjohann_Vollmary,
    title={Security Belts: A Maturity Model for DevOps Teams to Increase the Software
    Security of their Product - An Experience Report}, author={Taaibi, Samira and
    Dziwok, Stefan and Hermerschmidt, Lars and Koch, Thorsten and Merschjohann, Sven
    and Vollmary, Mark} }'
  chicago: 'Taaibi, Samira, Stefan Dziwok, Lars Hermerschmidt, Thorsten Koch, Sven
    Merschjohann, and Mark Vollmary. “Security Belts: A Maturity Model for DevOps
    Teams to Increase the Software Security of Their Product - An Experience Report,”
    n.d.'
  ieee: 'S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, and M.
    Vollmary, “Security Belts: A Maturity Model for DevOps Teams to Increase the Software
    Security of their Product - An Experience Report,” presented at the  30th Americas
    Conference on Information Systems, Salt Lake City.'
  mla: 'Taaibi, Samira, et al. <i>Security Belts: A Maturity Model for DevOps Teams
    to Increase the Software Security of Their Product - An Experience Report</i>.'
  short: 'S. Taaibi, S. Dziwok, L. Hermerschmidt, T. Koch, S. Merschjohann, M. Vollmary,
    in: n.d.'
conference:
  end_date: 2024-08-17
  location: Salt Lake City
  name: ' 30th Americas Conference on Information Systems'
  start_date: 2024-08-15
date_created: 2024-05-02T08:57:52Z
date_updated: 2024-08-09T08:55:49Z
ddc:
- '000'
department:
- _id: '662'
file:
- access_level: closed
  content_type: application/pdf
  creator: staaibi
  date_created: 2024-05-02T08:54:21Z
  date_updated: 2024-05-02T08:54:21Z
  file_id: '53812'
  file_name: AMCIS2024_final_submission_maturity model security belt paper.pdf
  file_size: 540990
  relation: main_file
  success: 1
file_date_updated: 2024-05-02T08:54:21Z
has_accepted_license: '1'
keyword:
- Software security
- maturity model
language:
- iso: eng
publication_status: accepted
status: public
title: 'Security Belts: A Maturity Model for DevOps Teams to Increase the Software
  Security of their Product - An Experience Report'
type: conference
user_id: '55800'
year: '2024'
...
---
_id: '56918'
abstract:
- lang: eng
  text: Joint value creation of organizations in ecosystems have a high failure rate,
    stressing the need for tools that enable the alignment of business models through
    visual inquiry. However, existing visual inquiry tools rarely consider recent
    design knowledge or ecosystem understanding. This leads to dissatisfied users
    and impedes the full realization of ecosystems’ potential. This short paper proposes
    an archaeological design science approach for enhancing the design of visual inquiry
    tools (e.g., a canvas) for ecosystems. Preliminary findings reveal 24 relevant
    artifacts, and shortcomings in the creation of conceptual models and rigorous
    evaluations. The proposed research process aims to develop design principles for
    more effective tools to bridge the gap between visual inquiry tools and ecosystems.
    This research contributes to design science research by reutilizing design knowledge
    and further developing the archaeological design approach. It also offers valuable
    information to practitioners about existing business model tools for the creation
    of ecosystems.
author:
- first_name: Christian
  full_name: Vorbohle, Christian
  id: '29951'
  last_name: Vorbohle
citation:
  ama: 'Vorbohle C. Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems
    through Design Archaeology. In: <i>Proceedings of the Thirty-Second European Conference
    on Information Systems (ECIS 2024)</i>. ; 2024.'
  apa: 'Vorbohle, C. (2024). Bridging Boundaries: Enhancing Visual Inquiry Tools for
    Ecosystems through Design Archaeology. <i>Proceedings of the Thirty-Second European
    Conference on Information Systems (ECIS 2024)</i>. ECIS 2024, Paphos, Cyprus.'
  bibtex: '@inproceedings{Vorbohle_2024, title={Bridging Boundaries: Enhancing Visual
    Inquiry Tools for Ecosystems through Design Archaeology}, booktitle={Proceedings
    of the Thirty-Second European Conference on Information Systems (ECIS 2024)},
    author={Vorbohle, Christian}, year={2024} }'
  chicago: 'Vorbohle, Christian. “Bridging Boundaries: Enhancing Visual Inquiry Tools
    for Ecosystems through Design Archaeology.” In <i>Proceedings of the Thirty-Second
    European Conference on Information Systems (ECIS 2024)</i>, 2024.'
  ieee: 'C. Vorbohle, “Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems
    through Design Archaeology,” presented at the ECIS 2024, Paphos, Cyprus, 2024.'
  mla: 'Vorbohle, Christian. “Bridging Boundaries: Enhancing Visual Inquiry Tools
    for Ecosystems through Design Archaeology.” <i>Proceedings of the Thirty-Second
    European Conference on Information Systems (ECIS 2024)</i>, 2024.'
  short: 'C. Vorbohle, in: Proceedings of the Thirty-Second European Conference on
    Information Systems (ECIS 2024), 2024.'
conference:
  location: Paphos, Cyprus
  name: ECIS 2024
date_created: 2024-11-06T11:06:05Z
date_updated: 2025-03-21T13:33:23Z
keyword:
- Design Science Research
- Design Archaeology
- Canvas Analysis
- Business Model Tools
language:
- iso: eng
publication: Proceedings of the Thirty-Second European Conference on Information Systems
  (ECIS 2024)
related_material:
  link:
  - relation: confirmation
    url: https://aisel.aisnet.org/ecis2024/track23_designresearch/track23_designresearch/2/
status: public
title: 'Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through
  Design Archaeology'
type: conference
user_id: '29951'
year: '2024'
...
---
_id: '47800'
abstract:
- lang: eng
  text: <jats:p>The introduction of Systems Engineering is an approach for dealing
    with the increasing complexity of products and their associated product development.
    Several introduction strategies are available in the literature; nevertheless,
    the introduction of Systems Engineering into practice still poses a great challenge
    to companies. Many companies have already gained experience in the introduction
    of Systems Engineering. Therefore, as part of the SE4OWL research project, the
    need to conduct a study including expert interviews and to collect the experiences
    of experts was identified. A total of 78 hypotheses were identified from 13 expert
    interviews concerning the lessons learned. Using exclusion criteria, 52 hypotheses
    were validated in a subsequent quantitative survey with 112 participants. Of these
    52 hypotheses, 40 could be confirmed based on the survey results. Only four hypotheses
    were rejected, and eight could neither be confirmed nor rejected. Through this
    research, guidance is provided to companies to leverage best practices for the
    introduction of their own Systems Engineering and to avoid the poor practices
    of other companies.</jats:p>
article_number: '119'
author:
- first_name: Daria
  full_name: Wilke, Daria
  last_name: Wilke
- first_name: Robin
  full_name: Grothe, Robin
  last_name: Grothe
- first_name: Lukas
  full_name: Bretz, Lukas
  last_name: Bretz
- first_name: Harald
  full_name: Anacker, Harald
  last_name: Anacker
- first_name: Roman
  full_name: Dumitrescu, Roman
  id: '16190'
  last_name: Dumitrescu
citation:
  ama: Wilke D, Grothe R, Bretz L, Anacker H, Dumitrescu R. Lessons Learned from the
    Introduction of Systems Engineering. <i>Systems</i>. 2023;11(3). doi:<a href="https://doi.org/10.3390/systems11030119">10.3390/systems11030119</a>
  apa: Wilke, D., Grothe, R., Bretz, L., Anacker, H., &#38; Dumitrescu, R. (2023).
    Lessons Learned from the Introduction of Systems Engineering. <i>Systems</i>,
    <i>11</i>(3), Article 119. <a href="https://doi.org/10.3390/systems11030119">https://doi.org/10.3390/systems11030119</a>
  bibtex: '@article{Wilke_Grothe_Bretz_Anacker_Dumitrescu_2023, title={Lessons Learned
    from the Introduction of Systems Engineering}, volume={11}, DOI={<a href="https://doi.org/10.3390/systems11030119">10.3390/systems11030119</a>},
    number={3119}, journal={Systems}, publisher={MDPI AG}, author={Wilke, Daria and
    Grothe, Robin and Bretz, Lukas and Anacker, Harald and Dumitrescu, Roman}, year={2023}
    }'
  chicago: Wilke, Daria, Robin Grothe, Lukas Bretz, Harald Anacker, and Roman Dumitrescu.
    “Lessons Learned from the Introduction of Systems Engineering.” <i>Systems</i>
    11, no. 3 (2023). <a href="https://doi.org/10.3390/systems11030119">https://doi.org/10.3390/systems11030119</a>.
  ieee: 'D. Wilke, R. Grothe, L. Bretz, H. Anacker, and R. Dumitrescu, “Lessons Learned
    from the Introduction of Systems Engineering,” <i>Systems</i>, vol. 11, no. 3,
    Art. no. 119, 2023, doi: <a href="https://doi.org/10.3390/systems11030119">10.3390/systems11030119</a>.'
  mla: Wilke, Daria, et al. “Lessons Learned from the Introduction of Systems Engineering.”
    <i>Systems</i>, vol. 11, no. 3, 119, MDPI AG, 2023, doi:<a href="https://doi.org/10.3390/systems11030119">10.3390/systems11030119</a>.
  short: D. Wilke, R. Grothe, L. Bretz, H. Anacker, R. Dumitrescu, Systems 11 (2023).
date_created: 2023-10-06T07:38:11Z
date_updated: 2023-10-06T07:38:40Z
department:
- _id: '563'
doi: 10.3390/systems11030119
intvolume: '        11'
issue: '3'
keyword:
- Information Systems and Management
- Computer Networks and Communications
- Modeling and Simulation
- Control and Systems Engineering
- Software
language:
- iso: eng
publication: Systems
publication_identifier:
  issn:
  - 2079-8954
publication_status: published
publisher: MDPI AG
status: public
title: Lessons Learned from the Introduction of Systems Engineering
type: journal_article
user_id: '15782'
volume: 11
year: '2023'
...
---
_id: '48777'
abstract:
- lang: eng
  text: <jats:title>Abstract</jats:title><jats:p>Explainable artificial intelligence
    has mainly focused on static learning scenarios so far. We are interested in dynamic
    scenarios where data is sampled progressively, and learning is done in an incremental
    rather than a batch mode. We seek efficient incremental algorithms for computing
    feature importance (FI). Permutation feature importance (PFI) is a well-established
    model-agnostic measure to obtain global FI based on feature marginalization of
    absent features. We propose an efficient, model-agnostic algorithm called iPFI
    to estimate this measure incrementally and under dynamic modeling conditions including
    concept drift. We prove theoretical guarantees on the approximation quality in
    terms of expectation and variance. To validate our theoretical findings and the
    efficacy of our approaches in incremental scenarios dealing with streaming data
    rather than traditional batch settings, we conduct multiple experimental studies
    on benchmark data with and without concept drift.</jats:p>
author:
- first_name: Fabian
  full_name: Fumagalli, Fabian
  last_name: Fumagalli
- first_name: Maximilian
  full_name: Muschalik, Maximilian
  last_name: Muschalik
- first_name: Eyke
  full_name: Hüllermeier, Eyke
  last_name: Hüllermeier
- first_name: Barbara
  full_name: Hammer, Barbara
  last_name: Hammer
citation:
  ama: 'Fumagalli F, Muschalik M, Hüllermeier E, Hammer B. Incremental permutation
    feature importance (iPFI): towards online explanations on data streams. <i>Machine
    Learning</i>. Published online 2023. doi:<a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>'
  apa: 'Fumagalli, F., Muschalik, M., Hüllermeier, E., &#38; Hammer, B. (2023). Incremental
    permutation feature importance (iPFI): towards online explanations on data streams.
    <i>Machine Learning</i>. <a href="https://doi.org/10.1007/s10994-023-06385-y">https://doi.org/10.1007/s10994-023-06385-y</a>'
  bibtex: '@article{Fumagalli_Muschalik_Hüllermeier_Hammer_2023, title={Incremental
    permutation feature importance (iPFI): towards online explanations on data streams},
    DOI={<a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>},
    journal={Machine Learning}, publisher={Springer Science and Business Media LLC},
    author={Fumagalli, Fabian and Muschalik, Maximilian and Hüllermeier, Eyke and
    Hammer, Barbara}, year={2023} }'
  chicago: 'Fumagalli, Fabian, Maximilian Muschalik, Eyke Hüllermeier, and Barbara
    Hammer. “Incremental Permutation Feature Importance (IPFI): Towards Online Explanations
    on Data Streams.” <i>Machine Learning</i>, 2023. <a href="https://doi.org/10.1007/s10994-023-06385-y">https://doi.org/10.1007/s10994-023-06385-y</a>.'
  ieee: 'F. Fumagalli, M. Muschalik, E. Hüllermeier, and B. Hammer, “Incremental permutation
    feature importance (iPFI): towards online explanations on data streams,” <i>Machine
    Learning</i>, 2023, doi: <a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>.'
  mla: 'Fumagalli, Fabian, et al. “Incremental Permutation Feature Importance (IPFI):
    Towards Online Explanations on Data Streams.” <i>Machine Learning</i>, Springer
    Science and Business Media LLC, 2023, doi:<a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>.'
  short: F. Fumagalli, M. Muschalik, E. Hüllermeier, B. Hammer, Machine Learning (2023).
date_created: 2023-11-10T14:15:36Z
date_updated: 2023-11-10T14:24:27Z
department:
- _id: '424'
- _id: '660'
doi: 10.1007/s10994-023-06385-y
keyword:
- Artificial Intelligence
- Software
language:
- iso: eng
publication: Machine Learning
publication_identifier:
  issn:
  - 0885-6125
  - 1573-0565
publication_status: published
publisher: Springer Science and Business Media LLC
status: public
title: 'Incremental permutation feature importance (iPFI): towards online explanations
  on data streams'
type: journal_article
user_id: '55908'
year: '2023'
...
---
_id: '46816'
author:
- first_name: Adriano
  full_name: Torres, Adriano
  last_name: Torres
- first_name: Pedro
  full_name: Costa, Pedro
  last_name: Costa
- first_name: Luis
  full_name: Amaral, Luis
  last_name: Amaral
- first_name: Jonata
  full_name: Pastro, Jonata
  last_name: Pastro
- first_name: Rodrigo
  full_name: Bonifácio, Rodrigo
  last_name: Bonifácio
- first_name: Marcelo
  full_name: d'Amorim, Marcelo
  last_name: d'Amorim
- first_name: Owolabi
  full_name: Legunsen, Owolabi
  last_name: Legunsen
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Edna
  full_name: Dias Canedo, Edna
  last_name: Dias Canedo
citation:
  ama: 'Torres A, Costa P, Amaral L, et al. Runtime Verification of Crypto APIs: An
    Empirical Study. <i>IEEE Transactions on Software Engineering</i>. 2023;49(10):4510-4525.
    doi:<a href="https://doi.org/10.1109/tse.2023.3301660">10.1109/tse.2023.3301660</a>'
  apa: 'Torres, A., Costa, P., Amaral, L., Pastro, J., Bonifácio, R., d’Amorim, M.,
    Legunsen, O., Bodden, E., &#38; Dias Canedo, E. (2023). Runtime Verification of
    Crypto APIs: An Empirical Study. <i>IEEE Transactions on Software Engineering</i>,
    <i>49</i>(10), 4510–4525. <a href="https://doi.org/10.1109/tse.2023.3301660">https://doi.org/10.1109/tse.2023.3301660</a>'
  bibtex: '@article{Torres_Costa_Amaral_Pastro_Bonifácio_d’Amorim_Legunsen_Bodden_Dias
    Canedo_2023, title={Runtime Verification of Crypto APIs: An Empirical Study},
    volume={49}, DOI={<a href="https://doi.org/10.1109/tse.2023.3301660">10.1109/tse.2023.3301660</a>},
    number={10}, journal={IEEE Transactions on Software Engineering}, publisher={Institute
    of Electrical and Electronics Engineers (IEEE)}, author={Torres, Adriano and Costa,
    Pedro and Amaral, Luis and Pastro, Jonata and Bonifácio, Rodrigo and d’Amorim,
    Marcelo and Legunsen, Owolabi and Bodden, Eric and Dias Canedo, Edna}, year={2023},
    pages={4510–4525} }'
  chicago: 'Torres, Adriano, Pedro Costa, Luis Amaral, Jonata Pastro, Rodrigo Bonifácio,
    Marcelo d’Amorim, Owolabi Legunsen, Eric Bodden, and Edna Dias Canedo. “Runtime
    Verification of Crypto APIs: An Empirical Study.” <i>IEEE Transactions on Software
    Engineering</i> 49, no. 10 (2023): 4510–25. <a href="https://doi.org/10.1109/tse.2023.3301660">https://doi.org/10.1109/tse.2023.3301660</a>.'
  ieee: 'A. Torres <i>et al.</i>, “Runtime Verification of Crypto APIs: An Empirical
    Study,” <i>IEEE Transactions on Software Engineering</i>, vol. 49, no. 10, pp.
    4510–4525, 2023, doi: <a href="https://doi.org/10.1109/tse.2023.3301660">10.1109/tse.2023.3301660</a>.'
  mla: 'Torres, Adriano, et al. “Runtime Verification of Crypto APIs: An Empirical
    Study.” <i>IEEE Transactions on Software Engineering</i>, vol. 49, no. 10, Institute
    of Electrical and Electronics Engineers (IEEE), 2023, pp. 4510–25, doi:<a href="https://doi.org/10.1109/tse.2023.3301660">10.1109/tse.2023.3301660</a>.'
  short: A. Torres, P. Costa, L. Amaral, J. Pastro, R. Bonifácio, M. d’Amorim, O.
    Legunsen, E. Bodden, E. Dias Canedo, IEEE Transactions on Software Engineering
    49 (2023) 4510–4525.
date_created: 2023-09-06T07:42:40Z
date_updated: 2023-12-04T11:05:26Z
department:
- _id: '76'
doi: 10.1109/tse.2023.3301660
intvolume: '        49'
issue: '10'
keyword:
- Software
language:
- iso: eng
page: 4510 - 4525
publication: IEEE Transactions on Software Engineering
publication_identifier:
  issn:
  - 0098-5589
  - 1939-3520
  - 2326-3881
publication_status: published
publisher: Institute of Electrical and Electronics Engineers (IEEE)
status: public
title: 'Runtime Verification of Crypto APIs: An Empirical Study'
type: journal_article
user_id: '15249'
volume: 49
year: '2023'
...
---
_id: '49439'
abstract:
- lang: eng
  text: <jats:title>Abstract</jats:title><jats:p>The use of static analysis security
    testing (SAST) tools has been increasing in recent years. However, previous studies
    have shown that, when shipped to end users such as development or security teams,
    the findings of these tools are often unsatisfying. Users report high numbers
    of false positives or long analysis times, making the tools unusable in the daily
    workflow. To address this, SAST tool creators provide a wide range of configuration
    options, such as customization of rules through domain-specific languages or specification
    of the application-specific analysis scope. In this paper, we study the configuration
    space of selected existing SAST tools when used within the integrated development
    environment (IDE). We focus on the configuration options that impact three dimensions,
    for which a trade-off is unavoidable, i.e., precision, recall, and analysis runtime.
    We perform a between-subjects user study with 40 users from multiple development
    and security teams - to our knowledge, the largest population for this kind of
    user study in the software engineering community. The results show that users
    who configure SAST tools are more effective in resolving security vulnerabilities
    detected by the tools than those using the default configuration. Based on post-study
    interviews, we identify common strategies that users have while configuring the
    SAST tools to provide further insights for tool creators. Finally, an evaluation
    of the configuration options of two commercial SAST tools, <jats:sc>Fortify</jats:sc>
    and <jats:sc>CheckMarx</jats:sc>, reveals that a quarter of the users do not understand
    the configuration options provided. The configuration options that are found most
    useful relate to the analysis scope.</jats:p>
article_number: '118'
author:
- first_name: Goran
  full_name: Piskachev, Goran
  id: '41936'
  last_name: Piskachev
  orcid: 0000-0003-4424-5838
- first_name: Matthias
  full_name: Becker, Matthias
  id: '4870'
  last_name: Becker
  orcid: https://orcid.org/0000-0003-2465-9347
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Piskachev G, Becker M, Bodden E. Can the configuration of static analyses make
    resolving security vulnerabilities more effective? - A user study. <i>Empirical
    Software Engineering</i>. 2023;28(5). doi:<a href="https://doi.org/10.1007/s10664-023-10354-3">10.1007/s10664-023-10354-3</a>
  apa: Piskachev, G., Becker, M., &#38; Bodden, E. (2023). Can the configuration of
    static analyses make resolving security vulnerabilities more effective? - A user
    study. <i>Empirical Software Engineering</i>, <i>28</i>(5), Article 118. <a href="https://doi.org/10.1007/s10664-023-10354-3">https://doi.org/10.1007/s10664-023-10354-3</a>
  bibtex: '@article{Piskachev_Becker_Bodden_2023, title={Can the configuration of
    static analyses make resolving security vulnerabilities more effective? - A user
    study}, volume={28}, DOI={<a href="https://doi.org/10.1007/s10664-023-10354-3">10.1007/s10664-023-10354-3</a>},
    number={5118}, journal={Empirical Software Engineering}, publisher={Springer Science
    and Business Media LLC}, author={Piskachev, Goran and Becker, Matthias and Bodden,
    Eric}, year={2023} }'
  chicago: Piskachev, Goran, Matthias Becker, and Eric Bodden. “Can the Configuration
    of Static Analyses Make Resolving Security Vulnerabilities More Effective? - A
    User Study.” <i>Empirical Software Engineering</i> 28, no. 5 (2023). <a href="https://doi.org/10.1007/s10664-023-10354-3">https://doi.org/10.1007/s10664-023-10354-3</a>.
  ieee: 'G. Piskachev, M. Becker, and E. Bodden, “Can the configuration of static
    analyses make resolving security vulnerabilities more effective? - A user study,”
    <i>Empirical Software Engineering</i>, vol. 28, no. 5, Art. no. 118, 2023, doi:
    <a href="https://doi.org/10.1007/s10664-023-10354-3">10.1007/s10664-023-10354-3</a>.'
  mla: Piskachev, Goran, et al. “Can the Configuration of Static Analyses Make Resolving
    Security Vulnerabilities More Effective? - A User Study.” <i>Empirical Software
    Engineering</i>, vol. 28, no. 5, 118, Springer Science and Business Media LLC,
    2023, doi:<a href="https://doi.org/10.1007/s10664-023-10354-3">10.1007/s10664-023-10354-3</a>.
  short: G. Piskachev, M. Becker, E. Bodden, Empirical Software Engineering 28 (2023).
date_created: 2023-12-04T11:14:34Z
date_updated: 2023-12-04T11:29:49Z
department:
- _id: '76'
- _id: '662'
doi: 10.1007/s10664-023-10354-3
intvolume: '        28'
issue: '5'
keyword:
- Software
language:
- iso: eng
publication: Empirical Software Engineering
publication_identifier:
  issn:
  - 1382-3256
  - 1573-7616
publication_status: published
publisher: Springer Science and Business Media LLC
status: public
title: Can the configuration of static analyses make resolving security vulnerabilities
  more effective? - A user study
type: journal_article
user_id: '15249'
volume: 28
year: '2023'
...
---
_id: '51770'
abstract:
- lang: eng
  text: <jats:title>Abstract</jats:title><jats:p>Workarounds are goal‐driven deviations
    from the standard operating procedures performed to overcome obstacles constraining
    day‐to‐day work. Despite starting as temporary fixes, they can become established
    across an organisation and trigger the innovation of processes and IT artefacts
    that can resolve misfits permanently. Although prior research has elicited antecedents
    and types of workarounds, it is not known how workarounds diffuse in an organisation
    and, thereby, innovating co‐workers' activities, IT artefacts, and organisational
    structures. The results of our multiple two‐year case study provide unique empirical
    insights into the diffusion of workarounds and how they can act as generative
    mechanisms for bottom‐up process innovation.</jats:p>
article_type: original
author:
- first_name: Christian
  full_name: Bartelheimer, Christian
  id: '49160'
  last_name: Bartelheimer
- first_name: Verena
  full_name: Wolf, Verena
  id: '23633'
  last_name: Wolf
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
citation:
  ama: Bartelheimer C, Wolf V, Beverungen D. Workarounds as generative mechanisms
    for bottom‐up process innovation—Insights from a multiple case study. <i>Information
    Systems Journal</i>. 2023;33(5):1085-1150. doi:<a href="https://doi.org/10.1111/isj.12435">10.1111/isj.12435</a>
  apa: Bartelheimer, C., Wolf, V., &#38; Beverungen, D. (2023). Workarounds as generative
    mechanisms for bottom‐up process innovation—Insights from a multiple case study.
    <i>Information Systems Journal</i>, <i>33</i>(5), 1085–1150. <a href="https://doi.org/10.1111/isj.12435">https://doi.org/10.1111/isj.12435</a>
  bibtex: '@article{Bartelheimer_Wolf_Beverungen_2023, title={Workarounds as generative
    mechanisms for bottom‐up process innovation—Insights from a multiple case study},
    volume={33}, DOI={<a href="https://doi.org/10.1111/isj.12435">10.1111/isj.12435</a>},
    number={5}, journal={Information Systems Journal}, publisher={Wiley}, author={Bartelheimer,
    Christian and Wolf, Verena and Beverungen, Daniel}, year={2023}, pages={1085–1150}
    }'
  chicago: 'Bartelheimer, Christian, Verena Wolf, and Daniel Beverungen. “Workarounds
    as Generative Mechanisms for Bottom‐up Process Innovation—Insights from a Multiple
    Case Study.” <i>Information Systems Journal</i> 33, no. 5 (2023): 1085–1150. <a
    href="https://doi.org/10.1111/isj.12435">https://doi.org/10.1111/isj.12435</a>.'
  ieee: 'C. Bartelheimer, V. Wolf, and D. Beverungen, “Workarounds as generative mechanisms
    for bottom‐up process innovation—Insights from a multiple case study,” <i>Information
    Systems Journal</i>, vol. 33, no. 5, pp. 1085–1150, 2023, doi: <a href="https://doi.org/10.1111/isj.12435">10.1111/isj.12435</a>.'
  mla: Bartelheimer, Christian, et al. “Workarounds as Generative Mechanisms for Bottom‐up
    Process Innovation—Insights from a Multiple Case Study.” <i>Information Systems
    Journal</i>, vol. 33, no. 5, Wiley, 2023, pp. 1085–150, doi:<a href="https://doi.org/10.1111/isj.12435">10.1111/isj.12435</a>.
  short: C. Bartelheimer, V. Wolf, D. Beverungen, Information Systems Journal 33 (2023)
    1085–1150.
date_created: 2024-02-22T15:19:57Z
date_updated: 2024-02-28T09:52:47Z
ddc:
- '330'
department:
- _id: '195'
doi: 10.1111/isj.12435
file:
- access_level: closed
  content_type: application/pdf
  creator: dabe
  date_created: 2024-02-22T15:21:34Z
  date_updated: 2024-02-22T15:21:34Z
  file_id: '51771'
  file_name: Information Systems Journal - 2023 - Bartelheimer - Workarounds as generative
    mechanisms for bottom‐up process innovation.pdf
  file_size: 4520950
  relation: main_file
  success: 1
file_date_updated: 2024-02-22T15:21:34Z
has_accepted_license: '1'
intvolume: '        33'
issue: '5'
keyword:
- Computer Networks and Communications
- Information Systems
- Software
language:
- iso: eng
page: 1085-1150
project:
- _id: '36'
  grant_number: O2K14A22O
  name: 'Digivation: Digitale Prozessinnovationen durch datenbasierte Dienstleistungen '
publication: Information Systems Journal
publication_identifier:
  issn:
  - 1350-1917
  - 1365-2575
publication_status: published
publisher: Wiley
quality_controlled: '1'
status: public
title: Workarounds as generative mechanisms for bottom‐up process innovation—Insights
  from a multiple case study
type: journal_article
user_id: '59677'
volume: 33
year: '2023'
...
---
_id: '52662'
abstract:
- lang: eng
  text: Static analysis tools support developers in detecting potential coding issues,
    such as bugs or vulnerabilities. Research emphasizes technical challenges of such
    tools but also mentions severe usability shortcomings. These shortcomings hinder
    the adoption of static analysis tools, and user dissatisfaction may even lead
    to tool abandonment. To comprehensively assess the state of the art, we present
    the first systematic usability evaluation of a wide range of static analysis tools.
    We derived a set of 36 relevant criteria from the literature and used them to
    evaluate a total of 46 static analysis tools complying with our inclusion and
    exclusion criteria - a representative set of mainly non-proprietary tools. The
    evaluation against the usability criteria in a multiple-raters approach shows
    that two thirds of the considered tools off er poor warning messages, while about
    three-quarters provide hardly any fix support. Furthermore, the integration of
    user knowledge is strongly neglected, which could be used for instance, to improve
    handling of false positives. Finally, issues regarding workflow integration and
    specialized user interfaces are revealed. These findings should prove useful in
    guiding and focusing further research and development in user experience for static
    code analyses.
author:
- first_name: Marcus
  full_name: Nachtigall, Marcus
  id: '41213'
  last_name: Nachtigall
- first_name: Michael
  full_name: Schlichtig, Michael
  id: '32312'
  last_name: Schlichtig
  orcid: 0000-0001-6600-6171
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Nachtigall M, Schlichtig M, Bodden E. Evaluation of Usability Criteria Addressed
    by Static Analysis Tools on a Large Scale. In: <i>Software Engineering 2023</i>.
    Gesellschaft für Informatik e.V.; 2023:95–96.'
  apa: Nachtigall, M., Schlichtig, M., &#38; Bodden, E. (2023). Evaluation of Usability
    Criteria Addressed by Static Analysis Tools on a Large Scale. In <i>Software Engineering
    2023</i> (pp. 95–96). Gesellschaft für Informatik e.V.
  bibtex: '@inbook{Nachtigall_Schlichtig_Bodden_2023, place={Bonn}, title={Evaluation
    of Usability Criteria Addressed by Static Analysis Tools on a Large Scale}, booktitle={Software
    Engineering 2023}, publisher={Gesellschaft für Informatik e.V.}, author={Nachtigall,
    Marcus and Schlichtig, Michael and Bodden, Eric}, year={2023}, pages={95–96} }'
  chicago: 'Nachtigall, Marcus, Michael Schlichtig, and Eric Bodden. “Evaluation of
    Usability Criteria Addressed by Static Analysis Tools on a Large Scale.” In <i>Software
    Engineering 2023</i>, 95–96. Bonn: Gesellschaft für Informatik e.V., 2023.'
  ieee: 'M. Nachtigall, M. Schlichtig, and E. Bodden, “Evaluation of Usability Criteria
    Addressed by Static Analysis Tools on a Large Scale,” in <i>Software Engineering
    2023</i>, Bonn: Gesellschaft für Informatik e.V., 2023, pp. 95–96.'
  mla: Nachtigall, Marcus, et al. “Evaluation of Usability Criteria Addressed by Static
    Analysis Tools on a Large Scale.” <i>Software Engineering 2023</i>, Gesellschaft
    für Informatik e.V., 2023, pp. 95–96.
  short: 'M. Nachtigall, M. Schlichtig, E. Bodden, in: Software Engineering 2023,
    Gesellschaft für Informatik e.V., Bonn, 2023, pp. 95–96.'
date_created: 2024-03-20T09:26:29Z
date_updated: 2024-03-20T09:27:41Z
department:
- _id: '76'
keyword:
- Automated static analysis
- Software usability
language:
- iso: eng
main_file_link:
- url: https://dl.gi.de/items/5afe477f-2f6a-4b3d-b391-f024baf0b7a5
page: 95–96
place: Bonn
publication: Software Engineering 2023
publication_identifier:
  isbn:
  - 978-3-88579-726-5
publisher: Gesellschaft für Informatik e.V.
status: public
title: Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large
  Scale
type: book_chapter
user_id: '32312'
year: '2023'
...
---
_id: '46264'
abstract:
- lang: eng
  text: "System-level interconnects provide the\r\nbackbone for increasingly complex
    systems on a chip. Their\r\nvulnerability to electromigration and crosstalk can
    lead to\r\nserious reliability and safety issues during the system lifetime.\r\nThis
    article presents an approach for periodic in-system testing\r\nwhich maintains
    a reliability profile to detect potential\r\nproblems before they actually cause
    a failure. Relying on a\r\ncommon infrastructure for EM-aware system workload\r\nmanagement
    and test, it minimizes the stress induced by the\r\ntest itself and contributes
    to the self-healing of system-induced\r\nelectromigration degradations. "
article_type: original
author:
- first_name: Somayeh
  full_name: Sadeghi-Kohan, Somayeh
  id: '78614'
  last_name: Sadeghi-Kohan
  orcid: https://orcid.org/0000-0001-7246-0610
- first_name: Sybille
  full_name: Hellebrand, Sybille
  id: '209'
  last_name: Hellebrand
  orcid: 0000-0002-3717-3939
- first_name: Hans-Joachim
  full_name: Wunderlich, Hans-Joachim
  last_name: Wunderlich
citation:
  ama: Sadeghi-Kohan S, Hellebrand S, Wunderlich H-J. Workload-Aware Periodic Interconnect
    BIST. <i>IEEE Design &#38;Test</i>. Published online 2023:1-1. doi:<a href="https://doi.org/10.1109/mdat.2023.3298849">10.1109/mdat.2023.3298849</a>
  apa: Sadeghi-Kohan, S., Hellebrand, S., &#38; Wunderlich, H.-J. (2023). Workload-Aware
    Periodic Interconnect BIST. <i>IEEE Design &#38;Test</i>, 1–1. <a href="https://doi.org/10.1109/mdat.2023.3298849">https://doi.org/10.1109/mdat.2023.3298849</a>
  bibtex: '@article{Sadeghi-Kohan_Hellebrand_Wunderlich_2023, title={Workload-Aware
    Periodic Interconnect BIST}, DOI={<a href="https://doi.org/10.1109/mdat.2023.3298849">10.1109/mdat.2023.3298849</a>},
    journal={IEEE Design &#38;Test}, publisher={Institute of Electrical and Electronics
    Engineers (IEEE)}, author={Sadeghi-Kohan, Somayeh and Hellebrand, Sybille and
    Wunderlich, Hans-Joachim}, year={2023}, pages={1–1} }'
  chicago: Sadeghi-Kohan, Somayeh, Sybille Hellebrand, and Hans-Joachim Wunderlich.
    “Workload-Aware Periodic Interconnect BIST.” <i>IEEE Design &#38;Test</i>, 2023,
    1–1. <a href="https://doi.org/10.1109/mdat.2023.3298849">https://doi.org/10.1109/mdat.2023.3298849</a>.
  ieee: 'S. Sadeghi-Kohan, S. Hellebrand, and H.-J. Wunderlich, “Workload-Aware Periodic
    Interconnect BIST,” <i>IEEE Design &#38;Test</i>, pp. 1–1, 2023, doi: <a href="https://doi.org/10.1109/mdat.2023.3298849">10.1109/mdat.2023.3298849</a>.'
  mla: Sadeghi-Kohan, Somayeh, et al. “Workload-Aware Periodic Interconnect BIST.”
    <i>IEEE Design &#38;Test</i>, Institute of Electrical and Electronics Engineers
    (IEEE), 2023, pp. 1–1, doi:<a href="https://doi.org/10.1109/mdat.2023.3298849">10.1109/mdat.2023.3298849</a>.
  short: S. Sadeghi-Kohan, S. Hellebrand, H.-J. Wunderlich, IEEE Design &#38;Test
    (2023) 1–1.
date_created: 2023-08-02T11:07:43Z
date_updated: 2024-03-22T17:15:10Z
department:
- _id: '48'
doi: 10.1109/mdat.2023.3298849
keyword:
- Electrical and Electronic Engineering
- Hardware and Architecture
- Software
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10194315
page: 1-1
publication: IEEE Design &Test
publication_identifier:
  issn:
  - 2168-2356
  - 2168-2364
publication_status: published
publisher: Institute of Electrical and Electronics Engineers (IEEE)
status: public
title: Workload-Aware Periodic Interconnect BIST
type: journal_article
user_id: '209'
year: '2023'
...
---
_id: '53220'
article_number: '100786'
author:
- first_name: Madjid
  full_name: Tavana, Madjid
  id: '31858'
  last_name: Tavana
- first_name: Arash
  full_name: Khalili Nasr, Arash
  last_name: Khalili Nasr
- first_name: Alireza Barati
  full_name: Ahmadabadi, Alireza Barati
  last_name: Ahmadabadi
- first_name: Alireza Shamekhi
  full_name: Amiri, Alireza Shamekhi
  last_name: Amiri
- first_name: Hassan
  full_name: Mina, Hassan
  last_name: Mina
citation:
  ama: Tavana M, Khalili Nasr A, Ahmadabadi AB, Amiri AS, Mina H. An interval multi-criteria
    decision-making model for evaluating blockchain-IoT technology in supply chain
    networks. <i>Internet of Things</i>. 2023;22. doi:<a href="https://doi.org/10.1016/j.iot.2023.100786">10.1016/j.iot.2023.100786</a>
  apa: Tavana, M., Khalili Nasr, A., Ahmadabadi, A. B., Amiri, A. S., &#38; Mina,
    H. (2023). An interval multi-criteria decision-making model for evaluating blockchain-IoT
    technology in supply chain networks. <i>Internet of Things</i>, <i>22</i>, Article
    100786. <a href="https://doi.org/10.1016/j.iot.2023.100786">https://doi.org/10.1016/j.iot.2023.100786</a>
  bibtex: '@article{Tavana_Khalili Nasr_Ahmadabadi_Amiri_Mina_2023, title={An interval
    multi-criteria decision-making model for evaluating blockchain-IoT technology
    in supply chain networks}, volume={22}, DOI={<a href="https://doi.org/10.1016/j.iot.2023.100786">10.1016/j.iot.2023.100786</a>},
    number={100786}, journal={Internet of Things}, publisher={Elsevier BV}, author={Tavana,
    Madjid and Khalili Nasr, Arash and Ahmadabadi, Alireza Barati and Amiri, Alireza
    Shamekhi and Mina, Hassan}, year={2023} }'
  chicago: Tavana, Madjid, Arash Khalili Nasr, Alireza Barati Ahmadabadi, Alireza
    Shamekhi Amiri, and Hassan Mina. “An Interval Multi-Criteria Decision-Making Model
    for Evaluating Blockchain-IoT Technology in Supply Chain Networks.” <i>Internet
    of Things</i> 22 (2023). <a href="https://doi.org/10.1016/j.iot.2023.100786">https://doi.org/10.1016/j.iot.2023.100786</a>.
  ieee: 'M. Tavana, A. Khalili Nasr, A. B. Ahmadabadi, A. S. Amiri, and H. Mina, “An
    interval multi-criteria decision-making model for evaluating blockchain-IoT technology
    in supply chain networks,” <i>Internet of Things</i>, vol. 22, Art. no. 100786,
    2023, doi: <a href="https://doi.org/10.1016/j.iot.2023.100786">10.1016/j.iot.2023.100786</a>.'
  mla: Tavana, Madjid, et al. “An Interval Multi-Criteria Decision-Making Model for
    Evaluating Blockchain-IoT Technology in Supply Chain Networks.” <i>Internet of
    Things</i>, vol. 22, 100786, Elsevier BV, 2023, doi:<a href="https://doi.org/10.1016/j.iot.2023.100786">10.1016/j.iot.2023.100786</a>.
  short: M. Tavana, A. Khalili Nasr, A.B. Ahmadabadi, A.S. Amiri, H. Mina, Internet
    of Things 22 (2023).
date_created: 2024-04-04T13:49:53Z
date_updated: 2024-04-15T13:10:41Z
department:
- _id: '277'
doi: 10.1016/j.iot.2023.100786
intvolume: '        22'
keyword:
- Management of Technology and Innovation
- Artificial Intelligence
- Computer Science Applications
- Hardware and Architecture
- Engineering (miscellaneous)
- Information Systems
- Computer Science (miscellaneous)
- Software
language:
- iso: eng
publication: Internet of Things
publication_identifier:
  issn:
  - 2542-6605
publication_status: published
publisher: Elsevier BV
status: public
title: An interval multi-criteria decision-making model for evaluating blockchain-IoT
  technology in supply chain networks
type: journal_article
user_id: '51811'
volume: 22
year: '2023'
...
---
_id: '53215'
article_number: '110572'
author:
- first_name: Madjid
  full_name: Tavana, Madjid
  id: '31858'
  last_name: Tavana
- first_name: Mohammad Saeed
  full_name: Heidary, Mohammad Saeed
  last_name: Heidary
- first_name: Hassan
  full_name: Mina, Hassan
  last_name: Mina
citation:
  ama: Tavana M, Heidary MS, Mina H. A fuzzy preference programming and weighted influence
    non-linear gauge system for mission architecture assessment at NASA. <i>Applied
    Soft Computing</i>. 2023;145. doi:<a href="https://doi.org/10.1016/j.asoc.2023.110572">10.1016/j.asoc.2023.110572</a>
  apa: Tavana, M., Heidary, M. S., &#38; Mina, H. (2023). A fuzzy preference programming
    and weighted influence non-linear gauge system for mission architecture assessment
    at NASA. <i>Applied Soft Computing</i>, <i>145</i>, Article 110572. <a href="https://doi.org/10.1016/j.asoc.2023.110572">https://doi.org/10.1016/j.asoc.2023.110572</a>
  bibtex: '@article{Tavana_Heidary_Mina_2023, title={A fuzzy preference programming
    and weighted influence non-linear gauge system for mission architecture assessment
    at NASA}, volume={145}, DOI={<a href="https://doi.org/10.1016/j.asoc.2023.110572">10.1016/j.asoc.2023.110572</a>},
    number={110572}, journal={Applied Soft Computing}, publisher={Elsevier BV}, author={Tavana,
    Madjid and Heidary, Mohammad Saeed and Mina, Hassan}, year={2023} }'
  chicago: Tavana, Madjid, Mohammad Saeed Heidary, and Hassan Mina. “A Fuzzy Preference
    Programming and Weighted Influence Non-Linear Gauge System for Mission Architecture
    Assessment at NASA.” <i>Applied Soft Computing</i> 145 (2023). <a href="https://doi.org/10.1016/j.asoc.2023.110572">https://doi.org/10.1016/j.asoc.2023.110572</a>.
  ieee: 'M. Tavana, M. S. Heidary, and H. Mina, “A fuzzy preference programming and
    weighted influence non-linear gauge system for mission architecture assessment
    at NASA,” <i>Applied Soft Computing</i>, vol. 145, Art. no. 110572, 2023, doi:
    <a href="https://doi.org/10.1016/j.asoc.2023.110572">10.1016/j.asoc.2023.110572</a>.'
  mla: Tavana, Madjid, et al. “A Fuzzy Preference Programming and Weighted Influence
    Non-Linear Gauge System for Mission Architecture Assessment at NASA.” <i>Applied
    Soft Computing</i>, vol. 145, 110572, Elsevier BV, 2023, doi:<a href="https://doi.org/10.1016/j.asoc.2023.110572">10.1016/j.asoc.2023.110572</a>.
  short: M. Tavana, M.S. Heidary, H. Mina, Applied Soft Computing 145 (2023).
date_created: 2024-04-04T13:37:53Z
date_updated: 2024-04-15T13:07:05Z
department:
- _id: '277'
doi: 10.1016/j.asoc.2023.110572
intvolume: '       145'
keyword:
- Software
language:
- iso: eng
publication: Applied Soft Computing
publication_identifier:
  issn:
  - 1568-4946
publication_status: published
publisher: Elsevier BV
status: public
title: A fuzzy preference programming and weighted influence non-linear gauge system
  for mission architecture assessment at NASA
type: journal_article
user_id: '51811'
volume: 145
year: '2023'
...
---
_id: '53230'
author:
- first_name: Hannan Amoozad
  full_name: Mahdiraji, Hannan Amoozad
  last_name: Mahdiraji
- first_name: Madjid
  full_name: Tavana, Madjid
  id: '31858'
  last_name: Tavana
- first_name: Ali
  full_name: Rezayar, Ali
  last_name: Rezayar
citation:
  ama: Mahdiraji HA, Tavana M, Rezayar A. A Game-Theoretic Framework for Analyzing
    the Impact of Social Responsibility and Supply Chain Profitability. <i>Cybernetics
    and Systems</i>. 2023;54(1):104-137. doi:<a href="https://doi.org/10.1080/01969722.2022.2055402">10.1080/01969722.2022.2055402</a>
  apa: Mahdiraji, H. A., Tavana, M., &#38; Rezayar, A. (2023). A Game-Theoretic Framework
    for Analyzing the Impact of Social Responsibility and Supply Chain Profitability.
    <i>Cybernetics and Systems</i>, <i>54</i>(1), 104–137. <a href="https://doi.org/10.1080/01969722.2022.2055402">https://doi.org/10.1080/01969722.2022.2055402</a>
  bibtex: '@article{Mahdiraji_Tavana_Rezayar_2023, title={A Game-Theoretic Framework
    for Analyzing the Impact of Social Responsibility and Supply Chain Profitability},
    volume={54}, DOI={<a href="https://doi.org/10.1080/01969722.2022.2055402">10.1080/01969722.2022.2055402</a>},
    number={1}, journal={Cybernetics and Systems}, publisher={Informa UK Limited},
    author={Mahdiraji, Hannan Amoozad and Tavana, Madjid and Rezayar, Ali}, year={2023},
    pages={104–137} }'
  chicago: 'Mahdiraji, Hannan Amoozad, Madjid Tavana, and Ali Rezayar. “A Game-Theoretic
    Framework for Analyzing the Impact of Social Responsibility and Supply Chain Profitability.”
    <i>Cybernetics and Systems</i> 54, no. 1 (2023): 104–37. <a href="https://doi.org/10.1080/01969722.2022.2055402">https://doi.org/10.1080/01969722.2022.2055402</a>.'
  ieee: 'H. A. Mahdiraji, M. Tavana, and A. Rezayar, “A Game-Theoretic Framework for
    Analyzing the Impact of Social Responsibility and Supply Chain Profitability,”
    <i>Cybernetics and Systems</i>, vol. 54, no. 1, pp. 104–137, 2023, doi: <a href="https://doi.org/10.1080/01969722.2022.2055402">10.1080/01969722.2022.2055402</a>.'
  mla: Mahdiraji, Hannan Amoozad, et al. “A Game-Theoretic Framework for Analyzing
    the Impact of Social Responsibility and Supply Chain Profitability.” <i>Cybernetics
    and Systems</i>, vol. 54, no. 1, Informa UK Limited, 2023, pp. 104–37, doi:<a
    href="https://doi.org/10.1080/01969722.2022.2055402">10.1080/01969722.2022.2055402</a>.
  short: H.A. Mahdiraji, M. Tavana, A. Rezayar, Cybernetics and Systems 54 (2023)
    104–137.
date_created: 2024-04-04T14:01:48Z
date_updated: 2024-04-15T13:15:21Z
department:
- _id: '277'
doi: 10.1080/01969722.2022.2055402
intvolume: '        54'
issue: '1'
keyword:
- Artificial Intelligence
- Information Systems
- Software
language:
- iso: eng
page: 104-137
publication: Cybernetics and Systems
publication_identifier:
  issn:
  - 0196-9722
  - 1087-6553
publication_status: published
publisher: Informa UK Limited
status: public
title: A Game-Theoretic Framework for Analyzing the Impact of Social Responsibility
  and Supply Chain Profitability
type: journal_article
user_id: '51811'
volume: 54
year: '2023'
...
---
_id: '44077'
author:
- first_name: Marten
  full_name: Maack, Marten
  last_name: Maack
citation:
  ama: Maack M. Online load balancing on uniform machines with limited migration.
    <i>Operations Research Letters</i>. 2023;51(3):220-225. doi:<a href="https://doi.org/10.1016/j.orl.2023.02.013">10.1016/j.orl.2023.02.013</a>
  apa: Maack, M. (2023). Online load balancing on uniform machines with limited migration.
    <i>Operations Research Letters</i>, <i>51</i>(3), 220–225. <a href="https://doi.org/10.1016/j.orl.2023.02.013">https://doi.org/10.1016/j.orl.2023.02.013</a>
  bibtex: '@article{Maack_2023, title={Online load balancing on uniform machines with
    limited migration}, volume={51}, DOI={<a href="https://doi.org/10.1016/j.orl.2023.02.013">10.1016/j.orl.2023.02.013</a>},
    number={3}, journal={Operations Research Letters}, publisher={Elsevier BV}, author={Maack,
    Marten}, year={2023}, pages={220–225} }'
  chicago: 'Maack, Marten. “Online Load Balancing on Uniform Machines with Limited
    Migration.” <i>Operations Research Letters</i> 51, no. 3 (2023): 220–25. <a href="https://doi.org/10.1016/j.orl.2023.02.013">https://doi.org/10.1016/j.orl.2023.02.013</a>.'
  ieee: 'M. Maack, “Online load balancing on uniform machines with limited migration,”
    <i>Operations Research Letters</i>, vol. 51, no. 3, pp. 220–225, 2023, doi: <a
    href="https://doi.org/10.1016/j.orl.2023.02.013">10.1016/j.orl.2023.02.013</a>.'
  mla: Maack, Marten. “Online Load Balancing on Uniform Machines with Limited Migration.”
    <i>Operations Research Letters</i>, vol. 51, no. 3, Elsevier BV, 2023, pp. 220–25,
    doi:<a href="https://doi.org/10.1016/j.orl.2023.02.013">10.1016/j.orl.2023.02.013</a>.
  short: M. Maack, Operations Research Letters 51 (2023) 220–225.
date_created: 2023-04-20T08:59:14Z
date_updated: 2023-04-21T07:53:42Z
department:
- _id: '63'
doi: 10.1016/j.orl.2023.02.013
intvolume: '        51'
issue: '3'
keyword:
- Applied Mathematics
- Industrial and Manufacturing Engineering
- Management Science and Operations Research
- Software
language:
- iso: eng
page: 220-225
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
publication: Operations Research Letters
publication_identifier:
  issn:
  - 0167-6377
publisher: Elsevier BV
status: public
title: Online load balancing on uniform machines with limited migration
type: journal_article
user_id: '88252'
volume: 51
year: '2023'
...
---
_id: '44382'
abstract:
- lang: eng
  text: '<jats:p>The success of engineering complex technical systems is determined
    by meeting customer requirements and institutional regulations. One example relevant
    to the automobile industry is the United Nations Economic Commission of Europe
    (UN ECE), which specifies the homologation of automobile series and requires proof
    of traceability. The required traceability can be achieved by modeling system
    artifacts and their relations in a consistent, seamless model—an effect-chain
    model. Currently, no in-depth methodology exists to support engineers in developing
    certification-compliant effect-chain models. For this purpose, a new methodology
    for certification-compliant effect-chain modeling was developed, which includes
    extensions of an existing method, suitable models, and tools to support engineers
    in the modeling process. For evaluation purposes, applicability is proven based
    on the experience of more than 300 workshops at an automotive OEM and an automotive
    supplier. The following case example is chosen to demonstrate applicability: the
    development of a window lifter that has to meet the demands of UN ECE Regulations
    R156 and R21. Results indicate multiple benefits in supporting engineers with
    the certification-compliant modeling of effect chains. Three benefits are goal-oriented
    modeling to reduce the necessary modeling capacity, increasing model quality by
    applying information quality criteria, and the potential to reduce costs through
    automatable effect-chain analyses for technical changes. Further, companies in
    the automotive and other industries will benefit from increased modeling capabilities
    that can be used for architecture modeling and to comply with other regulations
    such as ASPICE or ISO 26262.</jats:p>'
article_number: '154'
author:
- first_name: Iris
  full_name: Gräßler, Iris
  id: '47565'
  last_name: Gräßler
  orcid: 0000-0001-5765-971X
- first_name: Dominik
  full_name: Wiechel, Dominik
  id: '67161'
  last_name: Wiechel
- first_name: Anna-Sophie
  full_name: Koch, Anna-Sophie
  id: '44158'
  last_name: Koch
- first_name: Tim
  full_name: Sturm, Tim
  last_name: Sturm
- first_name: Thomas
  full_name: Markfelder, Thomas
  last_name: Markfelder
citation:
  ama: Gräßler I, Wiechel D, Koch A-S, Sturm T, Markfelder T. Methodology for Certification-Compliant
    Effect-Chain Modeling. <i>Systems</i>. 2023;11(3). doi:<a href="https://doi.org/10.3390/systems11030154">10.3390/systems11030154</a>
  apa: Gräßler, I., Wiechel, D., Koch, A.-S., Sturm, T., &#38; Markfelder, T. (2023).
    Methodology for Certification-Compliant Effect-Chain Modeling. <i>Systems</i>,
    <i>11</i>(3), Article 154. <a href="https://doi.org/10.3390/systems11030154">https://doi.org/10.3390/systems11030154</a>
  bibtex: '@article{Gräßler_Wiechel_Koch_Sturm_Markfelder_2023, title={Methodology
    for Certification-Compliant Effect-Chain Modeling}, volume={11}, DOI={<a href="https://doi.org/10.3390/systems11030154">10.3390/systems11030154</a>},
    number={3154}, journal={Systems}, publisher={MDPI AG}, author={Gräßler, Iris and
    Wiechel, Dominik and Koch, Anna-Sophie and Sturm, Tim and Markfelder, Thomas},
    year={2023} }'
  chicago: Gräßler, Iris, Dominik Wiechel, Anna-Sophie Koch, Tim Sturm, and Thomas
    Markfelder. “Methodology for Certification-Compliant Effect-Chain Modeling.” <i>Systems</i>
    11, no. 3 (2023). <a href="https://doi.org/10.3390/systems11030154">https://doi.org/10.3390/systems11030154</a>.
  ieee: 'I. Gräßler, D. Wiechel, A.-S. Koch, T. Sturm, and T. Markfelder, “Methodology
    for Certification-Compliant Effect-Chain Modeling,” <i>Systems</i>, vol. 11, no.
    3, Art. no. 154, 2023, doi: <a href="https://doi.org/10.3390/systems11030154">10.3390/systems11030154</a>.'
  mla: Gräßler, Iris, et al. “Methodology for Certification-Compliant Effect-Chain
    Modeling.” <i>Systems</i>, vol. 11, no. 3, 154, MDPI AG, 2023, doi:<a href="https://doi.org/10.3390/systems11030154">10.3390/systems11030154</a>.
  short: I. Gräßler, D. Wiechel, A.-S. Koch, T. Sturm, T. Markfelder, Systems 11 (2023).
date_created: 2023-05-03T08:37:36Z
date_updated: 2023-05-03T08:40:22Z
department:
- _id: '152'
doi: 10.3390/systems11030154
intvolume: '        11'
issue: '3'
keyword:
- Information Systems and Management
- Computer Networks and Communications
- Modeling and Simulation
- Control and Systems Engineering
- Software
language:
- iso: eng
publication: Systems
publication_identifier:
  issn:
  - 2079-8954
publication_status: published
publisher: MDPI AG
quality_controlled: '1'
status: public
title: Methodology for Certification-Compliant Effect-Chain Modeling
type: journal_article
user_id: '5905'
volume: 11
year: '2023'
...
---
_id: '45361'
abstract:
- lang: eng
  text: <jats:p> The non-orthogonal local submatrix method applied to electronic structure–based
    molecular dynamics simulations is shown to exceed 1.1 EFLOP/s in FP16/FP32-mixed
    floating-point arithmetic when using 4400 NVIDIA A100 GPUs of the Perlmutter system.
    This is enabled by a modification of the original method that pushes the sustained
    fraction of the peak performance to about 80%. Example calculations are performed
    for SARS-CoV-2 spike proteins with up to 83 million atoms. </jats:p>
article_number: '109434202311776'
article_type: original
author:
- first_name: Robert
  full_name: Schade, Robert
  id: '75963'
  last_name: Schade
  orcid: 0000-0002-6268-539
- first_name: Tobias
  full_name: Kenter, Tobias
  id: '3145'
  last_name: Kenter
- first_name: Hossam
  full_name: Elgabarty, Hossam
  id: '60250'
  last_name: Elgabarty
  orcid: 0000-0002-4945-1481
- first_name: Michael
  full_name: Lass, Michael
  id: '24135'
  last_name: Lass
  orcid: 0000-0002-5708-7632
- first_name: Thomas
  full_name: Kühne, Thomas
  id: '49079'
  last_name: Kühne
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
citation:
  ama: Schade R, Kenter T, Elgabarty H, Lass M, Kühne T, Plessl C. Breaking the exascale
    barrier for the electronic structure problem in ab-initio molecular dynamics.
    <i>The International Journal of High Performance Computing Applications</i>. Published
    online 2023. doi:<a href="https://doi.org/10.1177/10943420231177631">10.1177/10943420231177631</a>
  apa: Schade, R., Kenter, T., Elgabarty, H., Lass, M., Kühne, T., &#38; Plessl, C.
    (2023). Breaking the exascale barrier for the electronic structure problem in
    ab-initio molecular dynamics. <i>The International Journal of High Performance
    Computing Applications</i>, Article 109434202311776. <a href="https://doi.org/10.1177/10943420231177631">https://doi.org/10.1177/10943420231177631</a>
  bibtex: '@article{Schade_Kenter_Elgabarty_Lass_Kühne_Plessl_2023, title={Breaking
    the exascale barrier for the electronic structure problem in ab-initio molecular
    dynamics}, DOI={<a href="https://doi.org/10.1177/10943420231177631">10.1177/10943420231177631</a>},
    number={109434202311776}, journal={The International Journal of High Performance
    Computing Applications}, publisher={SAGE Publications}, author={Schade, Robert
    and Kenter, Tobias and Elgabarty, Hossam and Lass, Michael and Kühne, Thomas and
    Plessl, Christian}, year={2023} }'
  chicago: Schade, Robert, Tobias Kenter, Hossam Elgabarty, Michael Lass, Thomas Kühne,
    and Christian Plessl. “Breaking the Exascale Barrier for the Electronic Structure
    Problem in Ab-Initio Molecular Dynamics.” <i>The International Journal of High
    Performance Computing Applications</i>, 2023. <a href="https://doi.org/10.1177/10943420231177631">https://doi.org/10.1177/10943420231177631</a>.
  ieee: 'R. Schade, T. Kenter, H. Elgabarty, M. Lass, T. Kühne, and C. Plessl, “Breaking
    the exascale barrier for the electronic structure problem in ab-initio molecular
    dynamics,” <i>The International Journal of High Performance Computing Applications</i>,
    Art. no. 109434202311776, 2023, doi: <a href="https://doi.org/10.1177/10943420231177631">10.1177/10943420231177631</a>.'
  mla: Schade, Robert, et al. “Breaking the Exascale Barrier for the Electronic Structure
    Problem in Ab-Initio Molecular Dynamics.” <i>The International Journal of High
    Performance Computing Applications</i>, 109434202311776, SAGE Publications, 2023,
    doi:<a href="https://doi.org/10.1177/10943420231177631">10.1177/10943420231177631</a>.
  short: R. Schade, T. Kenter, H. Elgabarty, M. Lass, T. Kühne, C. Plessl, The International
    Journal of High Performance Computing Applications (2023).
date_created: 2023-05-30T09:19:09Z
date_updated: 2023-08-02T15:04:53Z
department:
- _id: '27'
- _id: '518'
doi: 10.1177/10943420231177631
keyword:
- Hardware and Architecture
- Theoretical Computer Science
- Software
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://journals.sagepub.com/doi/10.1177/10943420231177631
oa: '1'
project:
- _id: '52'
  name: 'PC2: Computing Resources Provided by the Paderborn Center for Parallel Computing'
publication: The International Journal of High Performance Computing Applications
publication_identifier:
  issn:
  - 1094-3420
  - 1741-2846
publication_status: published
publisher: SAGE Publications
quality_controlled: '1'
status: public
title: Breaking the exascale barrier for the electronic structure problem in ab-initio
  molecular dynamics
type: journal_article
user_id: '75963'
year: '2023'
...
---
_id: '50262'
abstract:
- lang: eng
  text: <jats:title>Abstract</jats:title><jats:p>Explainable artificial intelligence
    has mainly focused on static learning scenarios so far. We are interested in dynamic
    scenarios where data is sampled progressively, and learning is done in an incremental
    rather than a batch mode. We seek efficient incremental algorithms for computing
    feature importance (FI). Permutation feature importance (PFI) is a well-established
    model-agnostic measure to obtain global FI based on feature marginalization of
    absent features. We propose an efficient, model-agnostic algorithm called iPFI
    to estimate this measure incrementally and under dynamic modeling conditions including
    concept drift. We prove theoretical guarantees on the approximation quality in
    terms of expectation and variance. To validate our theoretical findings and the
    efficacy of our approaches in incremental scenarios dealing with streaming data
    rather than traditional batch settings, we conduct multiple experimental studies
    on benchmark data with and without concept drift.</jats:p>
author:
- first_name: Fabian
  full_name: Fumagalli, Fabian
  last_name: Fumagalli
- first_name: Maximilian
  full_name: Muschalik, Maximilian
  last_name: Muschalik
- first_name: Eyke
  full_name: Hüllermeier, Eyke
  last_name: Hüllermeier
- first_name: Barbara
  full_name: Hammer, Barbara
  last_name: Hammer
citation:
  ama: 'Fumagalli F, Muschalik M, Hüllermeier E, Hammer B. Incremental permutation
    feature importance (iPFI): towards online explanations on data streams. <i>Machine
    Learning</i>. 2023;112(12):4863-4903. doi:<a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>'
  apa: 'Fumagalli, F., Muschalik, M., Hüllermeier, E., &#38; Hammer, B. (2023). Incremental
    permutation feature importance (iPFI): towards online explanations on data streams.
    <i>Machine Learning</i>, <i>112</i>(12), 4863–4903. <a href="https://doi.org/10.1007/s10994-023-06385-y">https://doi.org/10.1007/s10994-023-06385-y</a>'
  bibtex: '@article{Fumagalli_Muschalik_Hüllermeier_Hammer_2023, title={Incremental
    permutation feature importance (iPFI): towards online explanations on data streams},
    volume={112}, DOI={<a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>},
    number={12}, journal={Machine Learning}, publisher={Springer Science and Business
    Media LLC}, author={Fumagalli, Fabian and Muschalik, Maximilian and Hüllermeier,
    Eyke and Hammer, Barbara}, year={2023}, pages={4863–4903} }'
  chicago: 'Fumagalli, Fabian, Maximilian Muschalik, Eyke Hüllermeier, and Barbara
    Hammer. “Incremental Permutation Feature Importance (IPFI): Towards Online Explanations
    on Data Streams.” <i>Machine Learning</i> 112, no. 12 (2023): 4863–4903. <a href="https://doi.org/10.1007/s10994-023-06385-y">https://doi.org/10.1007/s10994-023-06385-y</a>.'
  ieee: 'F. Fumagalli, M. Muschalik, E. Hüllermeier, and B. Hammer, “Incremental permutation
    feature importance (iPFI): towards online explanations on data streams,” <i>Machine
    Learning</i>, vol. 112, no. 12, pp. 4863–4903, 2023, doi: <a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>.'
  mla: 'Fumagalli, Fabian, et al. “Incremental Permutation Feature Importance (IPFI):
    Towards Online Explanations on Data Streams.” <i>Machine Learning</i>, vol. 112,
    no. 12, Springer Science and Business Media LLC, 2023, pp. 4863–903, doi:<a href="https://doi.org/10.1007/s10994-023-06385-y">10.1007/s10994-023-06385-y</a>.'
  short: F. Fumagalli, M. Muschalik, E. Hüllermeier, B. Hammer, Machine Learning 112
    (2023) 4863–4903.
date_created: 2024-01-05T21:52:28Z
date_updated: 2025-01-16T16:20:12Z
department:
- _id: '660'
doi: 10.1007/s10994-023-06385-y
intvolume: '       112'
issue: '12'
keyword:
- Artificial Intelligence
- Software
language:
- iso: eng
page: 4863-4903
project:
- _id: '126'
  name: 'TRR 318 - C3: TRR 318 - Subproject C3'
- _id: '117'
  name: 'TRR 318 - C: TRR 318 - Project Area C'
- _id: '109'
  grant_number: '438445824'
  name: 'TRR 318: TRR 318 - Erklärbarkeit konstruieren'
publication: Machine Learning
publication_identifier:
  issn:
  - 0885-6125
  - 1573-0565
publication_status: published
publisher: Springer Science and Business Media LLC
status: public
title: 'Incremental permutation feature importance (iPFI): towards online explanations
  on data streams'
type: journal_article
user_id: '93420'
volume: 112
year: '2023'
...
