[{"oa":"1","date_updated":"2023-02-28T11:00:48Z","volume":73,"author":[{"first_name":"Sevag","full_name":"Gharibian, Sevag","id":"71541","last_name":"Gharibian","orcid":"0000-0002-9992-3379"},{"full_name":"Yirka, Justin","last_name":"Yirka","first_name":"Justin"}],"conference":{"location":"Paris, France","name":"12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)"},"doi":"10.4230/LIPIcs.TQC.2017.2","main_file_link":[{"url":"http://drops.dagstuhl.de/opus/frontdoor.php?source_opus=8577","open_access":"1"}],"publication_identifier":{"unknown":["978-3-95977-034-7"]},"publication_status":"published","place":"Dagstuhl, Germany","page":"2:1-2:17","intvolume":"        73","citation":{"ama":"Gharibian S, Yirka J. The Complexity of Simulating Local Measurements on Quantum Systems. In: Wilde M, ed. <i>12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)</i>. Vol 73. Leibniz International Proceedings in Informatics (LIPIcs). Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik; 2018:2:1-2:17. doi:<a href=\"https://doi.org/10.4230/LIPIcs.TQC.2017.2\">10.4230/LIPIcs.TQC.2017.2</a>","chicago":"Gharibian, Sevag, and Justin Yirka. “The Complexity of Simulating Local Measurements on Quantum Systems.” In <i>12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)</i>, edited by Mark Wilde, 73:2:1-2:17. Leibniz International Proceedings in Informatics (LIPIcs). Dagstuhl, Germany: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2018. <a href=\"https://doi.org/10.4230/LIPIcs.TQC.2017.2\">https://doi.org/10.4230/LIPIcs.TQC.2017.2</a>.","ieee":"S. Gharibian and J. Yirka, “The Complexity of Simulating Local Measurements on Quantum Systems,” in <i>12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)</i>, Paris, France, 2018, vol. 73, p. 2:1-2:17, doi: <a href=\"https://doi.org/10.4230/LIPIcs.TQC.2017.2\">10.4230/LIPIcs.TQC.2017.2</a>.","mla":"Gharibian, Sevag, and Justin Yirka. “The Complexity of Simulating Local Measurements on Quantum Systems.” <i>12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)</i>, edited by Mark Wilde, vol. 73, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2018, p. 2:1-2:17, doi:<a href=\"https://doi.org/10.4230/LIPIcs.TQC.2017.2\">10.4230/LIPIcs.TQC.2017.2</a>.","bibtex":"@inproceedings{Gharibian_Yirka_2018, place={Dagstuhl, Germany}, series={Leibniz International Proceedings in Informatics (LIPIcs)}, title={The Complexity of Simulating Local Measurements on Quantum Systems}, volume={73}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.TQC.2017.2\">10.4230/LIPIcs.TQC.2017.2</a>}, booktitle={12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)}, publisher={Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik}, author={Gharibian, Sevag and Yirka, Justin}, editor={Wilde, Mark}, year={2018}, pages={2:1-2:17}, collection={Leibniz International Proceedings in Informatics (LIPIcs)} }","short":"S. Gharibian, J. Yirka, in: M. Wilde (Ed.), 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 2018, p. 2:1-2:17.","apa":"Gharibian, S., &#38; Yirka, J. (2018). The Complexity of Simulating Local Measurements on Quantum Systems. In M. Wilde (Ed.), <i>12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)</i> (Vol. 73, p. 2:1-2:17). Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.TQC.2017.2\">https://doi.org/10.4230/LIPIcs.TQC.2017.2</a>"},"_id":"8160","department":[{"_id":"623"},{"_id":"7"}],"user_id":"71541","series_title":"Leibniz International Proceedings in Informatics (LIPIcs)","type":"conference","editor":[{"first_name":"Mark","last_name":"Wilde","full_name":"Wilde, Mark"}],"status":"public","publisher":"Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik","date_created":"2019-03-01T11:25:27Z","title":"The Complexity of Simulating Local Measurements on Quantum Systems","year":"2018","external_id":{"arxiv":["1606.05626"]},"keyword":["Complexity theory","Quantum Merlin Arthur (QMA)","local Hamiltonian","local measurement","spectral gap"],"language":[{"iso":"eng"}],"publication":"12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017)","abstract":[{"text":"An important task in quantum physics is the estimation of local quantities for ground states of local Hamiltonians. Recently, Ambainis defined the complexity class P^QMA[log], and motivated its study by showing that the physical task of estimating the expectation value of a local observable against the ground state of a local Hamiltonian is P^QMA[log]-complete. In this paper, we continue the study of P^QMA[log], obtaining the following results. The P^QMA[log]-completeness result of Ambainis requires O(log n)-local observ- ables and Hamiltonians. We show that simulating even a single qubit measurement on ground states of 5-local Hamiltonians is P^QMA[log]-complete, resolving an open question of Ambainis. We formalize the complexity theoretic study of estimating two-point correlation functions against ground states, and show that this task is similarly P^QMA[log]-complete. P^QMA[log] is thought of as \"slightly harder\" than QMA. We justify this formally by exploiting the hierarchical voting technique of Beigel, Hemachandra, and Wechsung to show P^QMA[log] \\subseteq PP. This improves the containment QMA \\subseteq PP from Kitaev and Watrous. A central theme of this work is the subtlety involved in the study of oracle classes in which the oracle solves a promise problem. In this vein, we identify a flaw in Ambainis' prior work regarding a P^UQMA[log]-hardness proof for estimating spectral gaps of local Hamiltonians. By introducing a \"query validation\" technique, we build on his prior work to obtain P^UQMA[log]-hardness for estimating spectral gaps under polynomial-time Turing reductions.","lang":"eng"}]},{"title":"Computing subfields of number fields and applications to Galois group computations","publisher":"Elsevier BV","date_created":"2022-12-22T10:52:18Z","year":"2018","keyword":["Computational Mathematics","Algebra and Number Theory"],"language":[{"iso":"eng"}],"external_id":{"arxiv":["1610.06837 "]},"abstract":[{"lang":"eng","text":"A polynomial time algorithm to find generators of the lattice of all subfields of a given number field was given in van Hoeij et al. (2013).\r\n\r\nThis article reports on a massive speedup of this algorithm. This is primary achieved by our new concept of Galois-generating subfields. In general this is a very small set of subfields that determine all other subfields in a group-theoretic way. We compute them by targeted calls to the method from van Hoeij et al. (2013). For an early termination of these calls, we give a list of criteria that imply that further calls will not result in additional subfields.\r\n\r\nFinally, we explain how we use subfields to get a good starting group for the computation of Galois groups."}],"publication":"Journal of Symbolic Computation","doi":"10.1016/j.jsc.2018.04.013","date_updated":"2023-03-06T09:05:51Z","author":[{"first_name":"Andreas-Stephan","full_name":"Elsenhans, Andreas-Stephan","last_name":"Elsenhans"},{"last_name":"Klüners","id":"21202","full_name":"Klüners, Jürgen","first_name":"Jürgen"}],"volume":93,"citation":{"bibtex":"@article{Elsenhans_Klüners_2018, title={Computing subfields of number fields and applications to Galois group computations}, volume={93}, DOI={<a href=\"https://doi.org/10.1016/j.jsc.2018.04.013\">10.1016/j.jsc.2018.04.013</a>}, journal={Journal of Symbolic Computation}, publisher={Elsevier BV}, author={Elsenhans, Andreas-Stephan and Klüners, Jürgen}, year={2018}, pages={1–20} }","short":"A.-S. Elsenhans, J. Klüners, Journal of Symbolic Computation 93 (2018) 1–20.","mla":"Elsenhans, Andreas-Stephan, and Jürgen Klüners. “Computing Subfields of Number Fields and Applications to Galois Group Computations.” <i>Journal of Symbolic Computation</i>, vol. 93, Elsevier BV, 2018, pp. 1–20, doi:<a href=\"https://doi.org/10.1016/j.jsc.2018.04.013\">10.1016/j.jsc.2018.04.013</a>.","apa":"Elsenhans, A.-S., &#38; Klüners, J. (2018). Computing subfields of number fields and applications to Galois group computations. <i>Journal of Symbolic Computation</i>, <i>93</i>, 1–20. <a href=\"https://doi.org/10.1016/j.jsc.2018.04.013\">https://doi.org/10.1016/j.jsc.2018.04.013</a>","chicago":"Elsenhans, Andreas-Stephan, and Jürgen Klüners. “Computing Subfields of Number Fields and Applications to Galois Group Computations.” <i>Journal of Symbolic Computation</i> 93 (2018): 1–20. <a href=\"https://doi.org/10.1016/j.jsc.2018.04.013\">https://doi.org/10.1016/j.jsc.2018.04.013</a>.","ieee":"A.-S. Elsenhans and J. Klüners, “Computing subfields of number fields and applications to Galois group computations,” <i>Journal of Symbolic Computation</i>, vol. 93, pp. 1–20, 2018, doi: <a href=\"https://doi.org/10.1016/j.jsc.2018.04.013\">10.1016/j.jsc.2018.04.013</a>.","ama":"Elsenhans A-S, Klüners J. Computing subfields of number fields and applications to Galois group computations. <i>Journal of Symbolic Computation</i>. 2018;93:1-20. doi:<a href=\"https://doi.org/10.1016/j.jsc.2018.04.013\">10.1016/j.jsc.2018.04.013</a>"},"intvolume":"        93","page":"1-20","publication_status":"published","publication_identifier":{"issn":["0747-7171"]},"_id":"34843","user_id":"93826","department":[{"_id":"102"}],"status":"public","type":"journal_article"},{"abstract":[{"text":"We show that exceptional algebraic groups over number fields do not admit one-class genera of parahoric groups, except in the case G₂ . For the group G₂, we enumerate all such one-class genera for the usual seven-dimensional representation.","lang":"eng"}],"status":"public","type":"journal_article","publication":"Journal de Théorie des Nombres de Bordeaux","keyword":["Algebra and Number Theory"],"language":[{"iso":"eng"}],"extern":"1","_id":"42790","user_id":"93826","department":[{"_id":"102"}],"year":"2018","citation":{"ama":"Kirschmer M. One-class genera of exceptional groups over number fields. <i>Journal de Théorie des Nombres de Bordeaux</i>. 2018;30(3):847-857. doi:<a href=\"https://doi.org/10.5802/jtnb.1052\">10.5802/jtnb.1052</a>","ieee":"M. Kirschmer, “One-class genera of exceptional groups over number fields,” <i>Journal de Théorie des Nombres de Bordeaux</i>, vol. 30, no. 3, pp. 847–857, 2018, doi: <a href=\"https://doi.org/10.5802/jtnb.1052\">10.5802/jtnb.1052</a>.","chicago":"Kirschmer, Markus. “One-Class Genera of Exceptional Groups over Number Fields.” <i>Journal de Théorie Des Nombres de Bordeaux</i> 30, no. 3 (2018): 847–57. <a href=\"https://doi.org/10.5802/jtnb.1052\">https://doi.org/10.5802/jtnb.1052</a>.","bibtex":"@article{Kirschmer_2018, title={One-class genera of exceptional groups over number fields}, volume={30}, DOI={<a href=\"https://doi.org/10.5802/jtnb.1052\">10.5802/jtnb.1052</a>}, number={3}, journal={Journal de Théorie des Nombres de Bordeaux}, publisher={Cellule MathDoc/CEDRAM}, author={Kirschmer, Markus}, year={2018}, pages={847–857} }","mla":"Kirschmer, Markus. “One-Class Genera of Exceptional Groups over Number Fields.” <i>Journal de Théorie Des Nombres de Bordeaux</i>, vol. 30, no. 3, Cellule MathDoc/CEDRAM, 2018, pp. 847–57, doi:<a href=\"https://doi.org/10.5802/jtnb.1052\">10.5802/jtnb.1052</a>.","short":"M. Kirschmer, Journal de Théorie Des Nombres de Bordeaux 30 (2018) 847–857.","apa":"Kirschmer, M. (2018). One-class genera of exceptional groups over number fields. <i>Journal de Théorie Des Nombres de Bordeaux</i>, <i>30</i>(3), 847–857. <a href=\"https://doi.org/10.5802/jtnb.1052\">https://doi.org/10.5802/jtnb.1052</a>"},"page":"847-857","intvolume":"        30","publication_status":"published","publication_identifier":{"issn":["1246-7405","2118-8572"]},"issue":"3","title":"One-class genera of exceptional groups over number fields","doi":"10.5802/jtnb.1052","publisher":"Cellule MathDoc/CEDRAM","date_updated":"2023-04-04T09:07:32Z","date_created":"2023-03-07T08:27:36Z","author":[{"first_name":"Markus","id":"82258","full_name":"Kirschmer, Markus","last_name":"Kirschmer"}],"volume":30},{"external_id":{"arxiv":["1804.07479"]},"keyword":["Hamiltonian boundary value problems","singularities","conformal symplectic geometry","catastrophe theory","conjugate loci"],"ddc":["510"],"language":[{"iso":"eng"}],"publication":"New Zealand Journal of Mathematics","abstract":[{"text":"In this paper we continue our study of bifurcations of solutions of boundary-value problems for symplectic maps arising as Hamiltonian diffeomorphisms. These have been shown to be connected to catastrophe theory via generating functions and ordinary and reversal phase space symmetries have been considered. Here we present a convenient, coordinate free framework to analyse separated Lagrangian boundary value problems which include classical Dirichlet, Neumann and Robin boundary value problems. The framework is then used to prove the existence of obstructions arising from conformal symplectic symmetries on the bifurcation behaviour of solutions to Hamiltonian boundary value problems. Under non-degeneracy conditions, a group action by conformal symplectic symmetries has the effect that the flow map cannot degenerate in a direction which is tangential to the action. This imposes restrictions on which singularities can occur in boundary value problems. Our results generalise classical results about conjugate loci on Riemannian manifolds to a large class of Hamiltonian boundary value problems with, for example, scaling symmetries. ","lang":"eng"}],"file":[{"access_level":"open_access","file_name":"Hamiltonian_Boundary_Value_Problems,_Conformal_Symplectic_Symmetries,_and_Conjugate_Loci.pdf","file_id":"19946","file_size":3126111,"title":"Hamiltonian Boundary Value Problems, Conformal Symplectic Symmetries, and Conjugate Loci","date_created":"2020-10-06T16:49:29Z","creator":"coffen","date_updated":"2020-10-07T14:04:01Z","relation":"main_file","content_type":"application/pdf"}],"date_created":"2020-10-06T16:39:08Z","title":"Hamiltonian boundary value problems, conformal symplectic symmetries, and conjugate loci","quality_controlled":"1","year":"2018","_id":"19943","department":[{"_id":"636"}],"user_id":"85279","article_type":"original","extern":"1","file_date_updated":"2020-10-07T14:04:01Z","type":"journal_article","status":"public","oa":"1","date_updated":"2023-09-21T07:29:24Z","volume":48,"author":[{"first_name":"Robert I","last_name":"McLachlan","full_name":"McLachlan, Robert I"},{"first_name":"Christian","orcid":"https://orcid.org/0000-0002-5940-8057","last_name":"Offen","id":"85279","full_name":"Offen, Christian"}],"doi":"10.53733/34 ","main_file_link":[{"open_access":"1","url":"https://nzjmath.org/index.php/NZJMATH/article/view/34"}],"has_accepted_license":"1","publication_status":"published","page":"83-99","intvolume":"        48","citation":{"ama":"McLachlan RI, Offen C. Hamiltonian boundary value problems, conformal symplectic symmetries, and conjugate loci. <i>New Zealand Journal of Mathematics</i>. 2018;48:83-99. doi:<a href=\"https://doi.org/10.53733/34 \">10.53733/34 </a>","ieee":"R. I. McLachlan and C. Offen, “Hamiltonian boundary value problems, conformal symplectic symmetries, and conjugate loci,” <i>New Zealand Journal of Mathematics</i>, vol. 48, pp. 83–99, 2018, doi: <a href=\"https://doi.org/10.53733/34 \">10.53733/34 </a>.","chicago":"McLachlan, Robert I, and Christian Offen. “Hamiltonian Boundary Value Problems, Conformal Symplectic Symmetries, and Conjugate Loci.” <i>New Zealand Journal of Mathematics</i> 48 (2018): 83–99. <a href=\"https://doi.org/10.53733/34 \">https://doi.org/10.53733/34 </a>.","mla":"McLachlan, Robert I., and Christian Offen. “Hamiltonian Boundary Value Problems, Conformal Symplectic Symmetries, and Conjugate Loci.” <i>New Zealand Journal of Mathematics</i>, vol. 48, 2018, pp. 83–99, doi:<a href=\"https://doi.org/10.53733/34 \">10.53733/34 </a>.","bibtex":"@article{McLachlan_Offen_2018, title={Hamiltonian boundary value problems, conformal symplectic symmetries, and conjugate loci}, volume={48}, DOI={<a href=\"https://doi.org/10.53733/34 \">10.53733/34 </a>}, journal={New Zealand Journal of Mathematics}, author={McLachlan, Robert I and Offen, Christian}, year={2018}, pages={83–99} }","short":"R.I. McLachlan, C. Offen, New Zealand Journal of Mathematics 48 (2018) 83–99.","apa":"McLachlan, R. I., &#38; Offen, C. (2018). Hamiltonian boundary value problems, conformal symplectic symmetries, and conjugate loci. <i>New Zealand Journal of Mathematics</i>, <i>48</i>, 83–99. <a href=\"https://doi.org/10.53733/34 \">https://doi.org/10.53733/34 </a>"}},{"page":"2276-2282","intvolume":"        38","citation":{"short":"A. Lücke, U. Gerstmann, T.D. Kühne, W.G. Schmidt, Journal of Computational Chemistry 38 (2017) 2276–2282.","bibtex":"@article{Lücke_Gerstmann_Kühne_Schmidt_2017, title={Efficient PAW-based bond strength analysis for understanding the In/Si(111)(8 × 2) – (4 × 1) phase transition}, volume={38}, DOI={<a href=\"https://doi.org/10.1002/jcc.24878\">10.1002/jcc.24878</a>}, number={26}, journal={Journal of Computational Chemistry}, author={Lücke, Andreas and Gerstmann, Uwe and Kühne, Thomas D. and Schmidt, Wolf G.}, year={2017}, pages={2276–2282} }","mla":"Lücke, Andreas, et al. “Efficient PAW-Based Bond Strength Analysis for Understanding the In/Si(111)(8 × 2) – (4 × 1) Phase Transition.” <i>Journal of Computational Chemistry</i>, vol. 38, no. 26, 2017, pp. 2276–82, doi:<a href=\"https://doi.org/10.1002/jcc.24878\">10.1002/jcc.24878</a>.","apa":"Lücke, A., Gerstmann, U., Kühne, T. D., &#38; Schmidt, W. G. (2017). Efficient PAW-based bond strength analysis for understanding the In/Si(111)(8 × 2) – (4 × 1) phase transition. <i>Journal of Computational Chemistry</i>, <i>38</i>(26), 2276–2282. <a href=\"https://doi.org/10.1002/jcc.24878\">https://doi.org/10.1002/jcc.24878</a>","chicago":"Lücke, Andreas, Uwe Gerstmann, Thomas D. Kühne, and Wolf G. Schmidt. “Efficient PAW-Based Bond Strength Analysis for Understanding the In/Si(111)(8 × 2) – (4 × 1) Phase Transition.” <i>Journal of Computational Chemistry</i> 38, no. 26 (2017): 2276–82. <a href=\"https://doi.org/10.1002/jcc.24878\">https://doi.org/10.1002/jcc.24878</a>.","ieee":"A. Lücke, U. Gerstmann, T. D. Kühne, and W. G. Schmidt, “Efficient PAW-based bond strength analysis for understanding the In/Si(111)(8 × 2) – (4 × 1) phase transition,” <i>Journal of Computational Chemistry</i>, vol. 38, no. 26, pp. 2276–2282, 2017.","ama":"Lücke A, Gerstmann U, Kühne TD, Schmidt WG. Efficient PAW-based bond strength analysis for understanding the In/Si(111)(8 × 2) – (4 × 1) phase transition. <i>Journal of Computational Chemistry</i>. 2017;38(26):2276-2282. doi:<a href=\"https://doi.org/10.1002/jcc.24878\">10.1002/jcc.24878</a>"},"year":"2017","issue":"26","publication_status":"published","doi":"10.1002/jcc.24878","title":"Efficient PAW-based bond strength analysis for understanding the In/Si(111)(8 × 2) – (4 × 1) phase transition","volume":38,"author":[{"first_name":"Andreas","last_name":"Lücke","full_name":"Lücke, Andreas"},{"first_name":"Uwe","last_name":"Gerstmann","full_name":"Gerstmann, Uwe"},{"first_name":"Thomas D.","full_name":"Kühne, Thomas D.","last_name":"Kühne"},{"first_name":"Wolf G.","full_name":"Schmidt, Wolf G.","last_name":"Schmidt"}],"date_created":"2019-09-16T12:39:15Z","date_updated":"2022-01-06T06:51:31Z","status":"public","abstract":[{"text":"A numerically efficient yet highly accurate implementation of the crystal orbital Hamilton population (COHP) scheme for plane-wave calculations is presented. It is based on the projector-augmented wave (PAW) formalism in combination with norm-conserving pseudopotentials and allows to extract chemical interactions between atoms from band-structure calculations even for large and complex systems. The potential of the present COHP implementation is demonstrated by an in-depth analysis of the intensively investigated metal-insulator transition in atomic-scale indium wires self-assembled on the Si(111) surface. Thereby bond formation between In atoms of adjacent zigzag chains is found to be instrumental for the phase change. © 2017 Wiley Periodicals, Inc.","lang":"eng"}],"publication":"Journal of Computational Chemistry","type":"journal_article","language":[{"iso":"eng"}],"keyword":["density functional theory","bonding","crystal orbital Hamilton population","indium nanowires","phase transition"],"department":[{"_id":"304"}],"user_id":"71692","_id":"13238","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}]},{"title":"Measuring and modeling salience with the theory of visual attention.","date_created":"2018-12-10T07:05:04Z","year":"2017","issue":"6","keyword":["Salience","Visual attention","Bayesian inference","Theory of visual attention","Computational modeling","Inference","Object Recognition","Theories","Visual Perception","Visual Attention","Luminance","Perceptual Orientation","Statistical Probability","Stimulus Salience","Computational Modeling"],"language":[{"iso":"eng"}],"abstract":[{"text":"For almost three decades, the theory of visual attention (TVA) has been successful in mathematically describing and explaining a wide variety of phenomena in visual selection and recognition with high quantitative precision. Interestingly, the influence of feature contrast on attention has been included in TVA only recently, although it has been extensively studied outside the TVA framework. The present approach further develops this extension of TVA’s scope by measuring and modeling salience. An empirical measure of salience is achieved by linking different (orientation and luminance) contrasts to a TVA parameter. In the modeling part, the function relating feature contrasts to salience is described mathematically and tested against alternatives by Bayesian model comparison. This model comparison reveals that the power function is an appropriate model of salience growth in the dimensions of orientation and luminance contrast. Furthermore, if contrasts from the two dimensions are comb","lang":"eng"}],"publication":"Attention, Perception, & Psychophysics","doi":"10.3758/s13414-017-1325-6","date_updated":"2022-06-06T14:08:05Z","volume":79,"author":[{"first_name":"Alexander","last_name":"Krüger","full_name":"Krüger, Alexander"},{"last_name":"Tünnermann","full_name":"Tünnermann, Jan","first_name":"Jan"},{"first_name":"Ingrid","last_name":"Scharlau","orcid":"0000-0003-2364-9489","id":"451","full_name":"Scharlau, Ingrid"}],"intvolume":"        79","page":"1593 - 1614","citation":{"apa":"Krüger, A., Tünnermann, J., &#38; Scharlau, I. (2017). Measuring and modeling salience with the theory of visual attention. <i>Attention, Perception, &#38; Psychophysics</i>, <i>79</i>(6), 1593–1614. <a href=\"https://doi.org/10.3758/s13414-017-1325-6\">https://doi.org/10.3758/s13414-017-1325-6</a>","bibtex":"@article{Krüger_Tünnermann_Scharlau_2017, title={Measuring and modeling salience with the theory of visual attention.}, volume={79}, DOI={<a href=\"https://doi.org/10.3758/s13414-017-1325-6\">10.3758/s13414-017-1325-6</a>}, number={6}, journal={Attention, Perception, &#38; Psychophysics}, author={Krüger, Alexander and Tünnermann, Jan and Scharlau, Ingrid}, year={2017}, pages={1593–1614} }","mla":"Krüger, Alexander, et al. “Measuring and Modeling Salience with the Theory of Visual Attention.” <i>Attention, Perception, &#38; Psychophysics</i>, vol. 79, no. 6, 2017, pp. 1593–614, doi:<a href=\"https://doi.org/10.3758/s13414-017-1325-6\">10.3758/s13414-017-1325-6</a>.","short":"A. Krüger, J. Tünnermann, I. Scharlau, Attention, Perception, &#38; Psychophysics 79 (2017) 1593–1614.","ama":"Krüger A, Tünnermann J, Scharlau I. Measuring and modeling salience with the theory of visual attention. <i>Attention, Perception, &#38; Psychophysics</i>. 2017;79(6):1593-1614. doi:<a href=\"https://doi.org/10.3758/s13414-017-1325-6\">10.3758/s13414-017-1325-6</a>","chicago":"Krüger, Alexander, Jan Tünnermann, and Ingrid Scharlau. “Measuring and Modeling Salience with the Theory of Visual Attention.” <i>Attention, Perception, &#38; Psychophysics</i> 79, no. 6 (2017): 1593–1614. <a href=\"https://doi.org/10.3758/s13414-017-1325-6\">https://doi.org/10.3758/s13414-017-1325-6</a>.","ieee":"A. Krüger, J. Tünnermann, and I. Scharlau, “Measuring and modeling salience with the theory of visual attention.,” <i>Attention, Perception, &#38; Psychophysics</i>, vol. 79, no. 6, pp. 1593–1614, 2017, doi: <a href=\"https://doi.org/10.3758/s13414-017-1325-6\">10.3758/s13414-017-1325-6</a>."},"publication_identifier":{"issn":["1943-3921"]},"publication_status":"published","article_type":"original","_id":"6075","department":[{"_id":"424"}],"user_id":"42165","status":"public","type":"journal_article"},{"abstract":[{"text":"We describe a practical algorithm to solve the constructive membership problem for discrete two-generator subgroups of SL₂(R) or PSL₂(R). This algorithm has been implemented in Magma for groups defined over real algebraic number fields.","lang":"eng"}],"publication":"Journal of Algebra","language":[{"iso":"eng"}],"keyword":["Algebra and Number Theory"],"year":"2017","title":"The constructive membership problem for discrete two-generator subgroups of SL(2,R)","date_created":"2023-03-07T08:28:11Z","publisher":"Elsevier BV","status":"public","type":"journal_article","extern":"1","department":[{"_id":"102"}],"user_id":"93826","_id":"42791","page":"519-548","intvolume":"       480","citation":{"mla":"Kirschmer, Markus, and Marion G. Rüther. “The Constructive Membership Problem for Discrete Two-Generator Subgroups of SL(2,R).” <i>Journal of Algebra</i>, vol. 480, Elsevier BV, 2017, pp. 519–48, doi:<a href=\"https://doi.org/10.1016/j.jalgebra.2017.02.029\">10.1016/j.jalgebra.2017.02.029</a>.","short":"M. Kirschmer, M.G. Rüther, Journal of Algebra 480 (2017) 519–548.","bibtex":"@article{Kirschmer_Rüther_2017, title={The constructive membership problem for discrete two-generator subgroups of SL(2,R)}, volume={480}, DOI={<a href=\"https://doi.org/10.1016/j.jalgebra.2017.02.029\">10.1016/j.jalgebra.2017.02.029</a>}, journal={Journal of Algebra}, publisher={Elsevier BV}, author={Kirschmer, Markus and Rüther, Marion G.}, year={2017}, pages={519–548} }","apa":"Kirschmer, M., &#38; Rüther, M. G. (2017). The constructive membership problem for discrete two-generator subgroups of SL(2,R). <i>Journal of Algebra</i>, <i>480</i>, 519–548. <a href=\"https://doi.org/10.1016/j.jalgebra.2017.02.029\">https://doi.org/10.1016/j.jalgebra.2017.02.029</a>","chicago":"Kirschmer, Markus, and Marion G. Rüther. “The Constructive Membership Problem for Discrete Two-Generator Subgroups of SL(2,R).” <i>Journal of Algebra</i> 480 (2017): 519–48. <a href=\"https://doi.org/10.1016/j.jalgebra.2017.02.029\">https://doi.org/10.1016/j.jalgebra.2017.02.029</a>.","ieee":"M. Kirschmer and M. G. Rüther, “The constructive membership problem for discrete two-generator subgroups of SL(2,R),” <i>Journal of Algebra</i>, vol. 480, pp. 519–548, 2017, doi: <a href=\"https://doi.org/10.1016/j.jalgebra.2017.02.029\">10.1016/j.jalgebra.2017.02.029</a>.","ama":"Kirschmer M, Rüther MG. The constructive membership problem for discrete two-generator subgroups of SL(2,R). <i>Journal of Algebra</i>. 2017;480:519-548. doi:<a href=\"https://doi.org/10.1016/j.jalgebra.2017.02.029\">10.1016/j.jalgebra.2017.02.029</a>"},"publication_identifier":{"issn":["0021-8693"]},"publication_status":"published","doi":"10.1016/j.jalgebra.2017.02.029","volume":480,"author":[{"first_name":"Markus","id":"82258","full_name":"Kirschmer, Markus","last_name":"Kirschmer"},{"first_name":"Marion G.","full_name":"Rüther, Marion G.","last_name":"Rüther"}],"date_updated":"2023-04-04T09:10:14Z"},{"publication_identifier":{"issn":["2196-4726","0044-2305"]},"publication_status":"published","intvolume":"        65","page":"319-337","citation":{"ama":"Freudinger M. <i>Shoulda, Coulda, Woulda</i> – Non-Canonical Forms on the Move? <i>Zeitschrift für Anglistik und Amerikanistik</i>. 2017;65(3):319-337. doi:<a href=\"https://doi.org/10.1515/zaa-2017-0031\">10.1515/zaa-2017-0031</a>","chicago":"Freudinger, Markus. “<i>Shoulda, Coulda, Woulda</i> – Non-Canonical Forms on the Move?” <i>Zeitschrift Für Anglistik Und Amerikanistik</i> 65, no. 3 (2017): 319–37. <a href=\"https://doi.org/10.1515/zaa-2017-0031\">https://doi.org/10.1515/zaa-2017-0031</a>.","ieee":"M. Freudinger, “<i>Shoulda, Coulda, Woulda</i> – Non-Canonical Forms on the Move?,” <i>Zeitschrift für Anglistik und Amerikanistik</i>, vol. 65, no. 3, pp. 319–337, 2017, doi: <a href=\"https://doi.org/10.1515/zaa-2017-0031\">10.1515/zaa-2017-0031</a>.","apa":"Freudinger, M. (2017). <i>Shoulda, Coulda, Woulda</i> – Non-Canonical Forms on the Move? <i>Zeitschrift Für Anglistik Und Amerikanistik</i>, <i>65</i>(3), 319–337. <a href=\"https://doi.org/10.1515/zaa-2017-0031\">https://doi.org/10.1515/zaa-2017-0031</a>","short":"M. Freudinger, Zeitschrift Für Anglistik Und Amerikanistik 65 (2017) 319–337.","bibtex":"@article{Freudinger_2017, title={<i>Shoulda, Coulda, Woulda</i> – Non-Canonical Forms on the Move?}, volume={65}, DOI={<a href=\"https://doi.org/10.1515/zaa-2017-0031\">10.1515/zaa-2017-0031</a>}, number={3}, journal={Zeitschrift für Anglistik und Amerikanistik}, publisher={Walter de Gruyter GmbH}, author={Freudinger, Markus}, year={2017}, pages={319–337} }","mla":"Freudinger, Markus. “<i>Shoulda, Coulda, Woulda</i> – Non-Canonical Forms on the Move?” <i>Zeitschrift Für Anglistik Und Amerikanistik</i>, vol. 65, no. 3, Walter de Gruyter GmbH, 2017, pp. 319–37, doi:<a href=\"https://doi.org/10.1515/zaa-2017-0031\">10.1515/zaa-2017-0031</a>."},"date_updated":"2023-09-20T16:18:39Z","volume":65,"author":[{"last_name":"Freudinger","id":"34058","full_name":"Freudinger, Markus","first_name":"Markus"}],"doi":"10.1515/zaa-2017-0031","type":"journal_article","status":"public","_id":"46141","department":[{"_id":"384"}],"user_id":"14931","issue":"3","year":"2017","publisher":"Walter de Gruyter GmbH","date_created":"2023-07-25T11:22:55Z","title":"<i>Shoulda, Coulda, Woulda</i> – Non-Canonical Forms on the Move?","publication":"Zeitschrift für Anglistik und Amerikanistik","abstract":[{"text":"<jats:title>Abstract</jats:title>\r\n               <jats:p>In this paper, the contractions <jats:italic>shoulda, coulda, woulda</jats:italic> are compared with their respective full forms <jats:italic>should have</jats:italic>, <jats:italic>would have</jats:italic>, and <jats:italic>could have</jats:italic>. Although the full forms are used much more frequently and are, therefore, considered canonical, the non-canonical forms have increased in frequency throughout the better part of the twentieth century. They are predominantly used in American English – in conversation as well as in fictional writing to imitate speech. With respect to their syntactic environment, <jats:italic>shoulda, coulda</jats:italic>, and <jats:italic>woulda</jats:italic> behave differently than their full counterparts since they are often used without subjects and without lexical verbs. Some of these uses can be explained by the fact that <jats:italic>shoulda, coulda</jats:italic>, and <jats:italic>woulda</jats:italic> are not always used as verbal items but also as nouns, adjectives, and interjections. Due to their overall low frequency and their restriction to a particular register, however, it appears they will keep their non-canonical status for the foreseeable future.</jats:p>","lang":"eng"}],"keyword":["Literature and Literary Theory","Linguistics and Language","Language and Linguistics"],"language":[{"iso":"eng"}]},{"main_file_link":[{"url":"https://link.springer.com/content/pdf/10.1007/s10734-017-0173-6.pdf","open_access":"1"}],"doi":"10.1007/s10734-017-0173-6","author":[{"last_name":"Bohndick","full_name":"Bohndick, Carla","first_name":"Carla"},{"first_name":"Tom","full_name":"Rosman, Tom","last_name":"Rosman"},{"full_name":"Kohlmeyer, Susanne","last_name":"Kohlmeyer","first_name":"Susanne"},{"last_name":"Buhl","full_name":"Buhl, Heike M.","id":"27152","first_name":"Heike M."}],"volume":75,"oa":"1","date_updated":"2025-07-16T08:47:02Z","citation":{"chicago":"Bohndick, Carla, Tom Rosman, Susanne Kohlmeyer, and Heike M. Buhl. “The Interplay between Subjective Abilities and Subjective Demands and Its Relationship with Academic Success. An Application of the Person–Environment Fit Theory.” <i>Higher Education</i> 75, no. 5 (2017): 839–54. <a href=\"https://doi.org/10.1007/s10734-017-0173-6\">https://doi.org/10.1007/s10734-017-0173-6</a>.","ieee":"C. Bohndick, T. Rosman, S. Kohlmeyer, and H. M. Buhl, “The interplay between subjective abilities and subjective demands and its relationship with academic success. An application of the person–environment fit theory,” <i>Higher Education</i>, vol. 75, no. 5, pp. 839–854, 2017, doi: <a href=\"https://doi.org/10.1007/s10734-017-0173-6\">10.1007/s10734-017-0173-6</a>.","ama":"Bohndick C, Rosman T, Kohlmeyer S, Buhl HM. The interplay between subjective abilities and subjective demands and its relationship with academic success. An application of the person–environment fit theory. <i>Higher Education</i>. 2017;75(5):839-854. doi:<a href=\"https://doi.org/10.1007/s10734-017-0173-6\">10.1007/s10734-017-0173-6</a>","apa":"Bohndick, C., Rosman, T., Kohlmeyer, S., &#38; Buhl, H. M. (2017). The interplay between subjective abilities and subjective demands and its relationship with academic success. An application of the person–environment fit theory. <i>Higher Education</i>, <i>75</i>(5), 839–854. <a href=\"https://doi.org/10.1007/s10734-017-0173-6\">https://doi.org/10.1007/s10734-017-0173-6</a>","bibtex":"@article{Bohndick_Rosman_Kohlmeyer_Buhl_2017, title={The interplay between subjective abilities and subjective demands and its relationship with academic success. An application of the person–environment fit theory}, volume={75}, DOI={<a href=\"https://doi.org/10.1007/s10734-017-0173-6\">10.1007/s10734-017-0173-6</a>}, number={5}, journal={Higher Education}, publisher={Springer Science and Business Media LLC}, author={Bohndick, Carla and Rosman, Tom and Kohlmeyer, Susanne and Buhl, Heike M.}, year={2017}, pages={839–854} }","mla":"Bohndick, Carla, et al. “The Interplay between Subjective Abilities and Subjective Demands and Its Relationship with Academic Success. An Application of the Person–Environment Fit Theory.” <i>Higher Education</i>, vol. 75, no. 5, Springer Science and Business Media LLC, 2017, pp. 839–54, doi:<a href=\"https://doi.org/10.1007/s10734-017-0173-6\">10.1007/s10734-017-0173-6</a>.","short":"C. Bohndick, T. Rosman, S. Kohlmeyer, H.M. Buhl, Higher Education 75 (2017) 839–854."},"intvolume":"        75","page":"839-854","publication_status":"published","publication_identifier":{"issn":["0018-1560","1573-174X"]},"user_id":"27152","department":[{"_id":"427"}],"project":[{"_id":"377","name":"LehramtsNavi: Weiterentwicklungsorientiertes Self-Assessment am Übergang zum Lehramtsstudium"}],"_id":"32535","status":"public","type":"journal_article","title":"The interplay between subjective abilities and subjective demands and its relationship with academic success. An application of the person–environment fit theory","date_created":"2022-08-03T01:12:49Z","publisher":"Springer Science and Business Media LLC","year":"2017","issue":"5","language":[{"iso":"eng"}],"keyword":["Academic success","Person–environment fit theory","Demands–abilities fit","Higher education"],"abstract":[{"lang":"eng","text":"In this study, we draw on person–environment fit theory to analyze whether academic success is best explained by individual abilities subjectively exceeding situational demands or by abilities matching the demands. Moreover, we disentangled effects of perceived abilities and subjective person–environment (P-E) fit on academic success. All in all, 693 teacher education students participated in an online questionnaire. Students were asked to rate general requirements of their academic programs (e.g., self-discipline) on a 5-point scale in terms of (1) their own abilities and (2) the perceived relevance for their studies. P-E fit was determined by difference scores between abilities and relevance ratings. Academic success was assessed by grades, perceived performance, and study satisfaction. Data were analyzed through structural equation modeling and suggest that academic success is best explained by a match between abilities and demands. Moreover, all three criteria for academic success were more strongly related to subjective fit than to subjective abilities."}],"publication":"Higher Education"},{"_id":"5700","department":[{"_id":"181"}],"user_id":"37741","keyword":["Research","Service theory"],"article_type":"original","language":[{"iso":"eng"}],"publication":"Journal of Service Management","type":"journal_article","abstract":[{"text":"Purpose\r\n– The purpose of this paper is to examine the nature of context and its implications for theory and research in service. \r\n\r\nDesign/methodology/approach\r\n– This is a conceptual paper based on exploring existing research and theory related to context in service research. \r\n\r\nFindings\r\n– The characteristics of service make context both important and challenging, there is great contextual diversity in service research as reflected, for example in ecosystems made up of multiple contextual variables. There is a need to identify the context-specific nature of middle range theory and the contextual logic of general theory. The authors explore the challenges of context for service theory and how we might learn from theory in a particular context and test or adapt it in other contexts. \r\n\r\nOriginality/value\r\n– The findings of this paper are of value to researchers seeking to develop and justify theory in service research (general, middle range or theory in use).","lang":"eng"}],"status":"public","publisher":"Emerald Group Publishing Limited","date_updated":"2022-01-06T07:02:36Z","volume":27,"author":[{"first_name":"Chris","full_name":"Voss, Chris","last_name":"Voss"},{"last_name":"Perks","full_name":"Perks, Helen","first_name":"Helen"},{"first_name":"Rui","last_name":"Sousa","full_name":"Sousa, Rui"},{"first_name":"Lars","last_name":"Witell","full_name":"Witell, Lars"},{"first_name":"Nancy","last_name":"Wünderlich","id":"36392","full_name":"Wünderlich, Nancy"}],"date_created":"2018-11-15T11:19:00Z","title":"Reflections on Context in Service Research.","publication_status":"published","issue":"1","year":"2016","intvolume":"        27","page":"30-36","citation":{"ama":"Voss C, Perks H, Sousa R, Witell L, Wünderlich N. Reflections on Context in Service Research. <i>Journal of Service Management</i>. 2016;27(1):30-36.","ieee":"C. Voss, H. Perks, R. Sousa, L. Witell, and N. Wünderlich, “Reflections on Context in Service Research.,” <i>Journal of Service Management</i>, vol. 27, no. 1, pp. 30–36, 2016.","chicago":"Voss, Chris, Helen Perks, Rui Sousa, Lars Witell, and Nancy Wünderlich. “Reflections on Context in Service Research.” <i>Journal of Service Management</i> 27, no. 1 (2016): 30–36.","apa":"Voss, C., Perks, H., Sousa, R., Witell, L., &#38; Wünderlich, N. (2016). Reflections on Context in Service Research. <i>Journal of Service Management</i>, <i>27</i>(1), 30–36.","mla":"Voss, Chris, et al. “Reflections on Context in Service Research.” <i>Journal of Service Management</i>, vol. 27, no. 1, Emerald Group Publishing Limited, 2016, pp. 30–36.","short":"C. Voss, H. Perks, R. Sousa, L. Witell, N. Wünderlich, Journal of Service Management 27 (2016) 30–36.","bibtex":"@article{Voss_Perks_Sousa_Witell_Wünderlich_2016, title={Reflections on Context in Service Research.}, volume={27}, number={1}, journal={Journal of Service Management}, publisher={Emerald Group Publishing Limited}, author={Voss, Chris and Perks, Helen and Sousa, Rui and Witell, Lars and Wünderlich, Nancy}, year={2016}, pages={30–36} }"}},{"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2019-04-08T06:49:16Z","date_created":"2019-04-08T06:49:16Z","creator":"cjhaake","file_size":516125,"access_level":"closed","file_name":"WP - An Economic Theory of ’Destabilization War'.pdf","file_id":"8838"}],"abstract":[{"lang":"eng","text":"While Islamic State is the most present example, it is a fact that in many places around the globe, throughout history initially small groups have tried to challenge and destabilize or even overthrow governments by means of terrorist and guerrilla strategies. Therefore, we answer two questions. Why does a small group of insurgents believe it can overthrow the government by turning violent, even if the government is clearly superior? And how does a conflict develop into terrorism, a guerilla war, or a major conventional civil war, or is resolved peacefully? We develop a formal model for rebels and government and derive optimal choices. Further, we focus on three elements as important ingredients of a \"destabilization war\". All three of these - large random events, time preference (which we relate to ideology), and choice of duration of fight - are rarely considered in formal conflict theory. We can answer the above two questions using game theory analysis. First, insurgents rise up because they hope to destabilize through permanent challenging attacks. In this context, large randomness is an important ally of rebels. While each individual attack may have a low impact, at some point a large random event could lead to success. Hence, the duration of activities is a constitutive element of this kind of armed conflict. Patience (low time preference), which may reflect rebels' degree of ideological motivation, is crucial. Second, the mode of warfare or the conflict resolutions that develop are generally path-dependent and conditioned on the full set of options (including compromise). Various conditions (level of funding, ease of recruitment, access to weapons) influence different modes of warfare or a peaceful compromise in a complex way."}],"language":[{"iso":"eng"}],"ddc":["040"],"keyword":["terrorism","civil war","conflict duration","game theory","stochastic process","ideology"],"year":"2016","date_created":"2019-04-08T06:45:02Z","title":"An Economic Theory of 'Destabilization War'","type":"working_paper","status":"public","series_title":"Working Papers CIE","user_id":"20801","department":[{"_id":"205"},{"_id":"475"}],"_id":"8836","file_date_updated":"2019-04-08T06:49:16Z","has_accepted_license":"1","jel":["H56","O10","D84","C72","D74"],"citation":{"chicago":"Gries, Thomas, and Claus-Jochen Haake. <i>An Economic Theory of “Destabilization War.”</i> Vol. 95. Working Papers CIE, 2016.","ieee":"T. Gries and C.-J. Haake, <i>An Economic Theory of “Destabilization War,”</i> vol. 95. 2016.","ama":"Gries T, Haake C-J. <i>An Economic Theory of “Destabilization War.”</i> Vol 95.; 2016.","apa":"Gries, T., &#38; Haake, C.-J. (2016). <i>An Economic Theory of “Destabilization War”</i> (Vol. 95).","short":"T. Gries, C.-J. Haake, An Economic Theory of “Destabilization War,” 2016.","bibtex":"@book{Gries_Haake_2016, series={Working Papers CIE}, title={An Economic Theory of “Destabilization War”}, volume={95}, author={Gries, Thomas and Haake, Claus-Jochen}, year={2016}, collection={Working Papers CIE} }","mla":"Gries, Thomas, and Claus-Jochen Haake. <i>An Economic Theory of “Destabilization War.”</i> Vol. 95, 2016."},"intvolume":"        95","author":[{"first_name":"Thomas","full_name":"Gries, Thomas","id":"186","last_name":"Gries"},{"id":"20801","full_name":"Haake, Claus-Jochen","last_name":"Haake","first_name":"Claus-Jochen"}],"volume":95,"date_updated":"2022-01-06T07:04:03Z"},{"publication_status":"published","issue":"15","year":"2016","intvolume":"       116","page":"1160-1165","citation":{"apa":"Partovi-Azar, P., Berg, M., Sanna, S., &#38; Kühne, T. D. (2016). Improved parameterization of the quantum harmonic oscillator model based on localized wannier functions to describe Van der Waals interactions in density functional theory. <i>International Journal of Quantum Chemistry</i>, <i>116</i>(15), 1160–1165. <a href=\"https://doi.org/10.1002/qua.25150\">https://doi.org/10.1002/qua.25150</a>","mla":"Partovi-Azar, Pouya, et al. “Improved Parameterization of the Quantum Harmonic Oscillator Model Based on Localized Wannier Functions to Describe Van Der Waals Interactions in Density Functional Theory.” <i>International Journal of Quantum Chemistry</i>, vol. 116, no. 15, 2016, pp. 1160–65, doi:<a href=\"https://doi.org/10.1002/qua.25150\">10.1002/qua.25150</a>.","short":"P. Partovi-Azar, M. Berg, S. Sanna, T.D. Kühne, International Journal of Quantum Chemistry 116 (2016) 1160–1165.","bibtex":"@article{Partovi-Azar_Berg_Sanna_Kühne_2016, title={Improved parameterization of the quantum harmonic oscillator model based on localized wannier functions to describe Van der Waals interactions in density functional theory}, volume={116}, DOI={<a href=\"https://doi.org/10.1002/qua.25150\">10.1002/qua.25150</a>}, number={15}, journal={International Journal of Quantum Chemistry}, author={Partovi-Azar, Pouya and Berg, Matthias and Sanna, Simone and Kühne, Thomas D.}, year={2016}, pages={1160–1165} }","ama":"Partovi-Azar P, Berg M, Sanna S, Kühne TD. Improved parameterization of the quantum harmonic oscillator model based on localized wannier functions to describe Van der Waals interactions in density functional theory. <i>International Journal of Quantum Chemistry</i>. 2016;116(15):1160-1165. doi:<a href=\"https://doi.org/10.1002/qua.25150\">10.1002/qua.25150</a>","chicago":"Partovi-Azar, Pouya, Matthias Berg, Simone Sanna, and Thomas D. Kühne. “Improved Parameterization of the Quantum Harmonic Oscillator Model Based on Localized Wannier Functions to Describe Van Der Waals Interactions in Density Functional Theory.” <i>International Journal of Quantum Chemistry</i> 116, no. 15 (2016): 1160–65. <a href=\"https://doi.org/10.1002/qua.25150\">https://doi.org/10.1002/qua.25150</a>.","ieee":"P. Partovi-Azar, M. Berg, S. Sanna, and T. D. Kühne, “Improved parameterization of the quantum harmonic oscillator model based on localized wannier functions to describe Van der Waals interactions in density functional theory,” <i>International Journal of Quantum Chemistry</i>, vol. 116, no. 15, pp. 1160–1165, 2016."},"date_updated":"2022-01-06T06:51:31Z","volume":116,"author":[{"full_name":"Partovi-Azar, Pouya","last_name":"Partovi-Azar","first_name":"Pouya"},{"first_name":"Matthias","last_name":"Berg","full_name":"Berg, Matthias"},{"first_name":"Simone","last_name":"Sanna","full_name":"Sanna, Simone"},{"first_name":"Thomas D.","full_name":"Kühne, Thomas D.","last_name":"Kühne"}],"date_created":"2019-09-16T12:52:43Z","title":"Improved parameterization of the quantum harmonic oscillator model based on localized wannier functions to describe Van der Waals interactions in density functional theory","doi":"10.1002/qua.25150","publication":"International Journal of Quantum Chemistry","type":"journal_article","abstract":[{"text":"Recently, the quantum harmonic oscillator model has been combined with maximally localized Wannier functions to account for long-range dispersion interactions in density functional theory calculations (Silvestrelli, J. Chem. Phys. 2013, 139, 054106). Here, we present a new, improved set of values for the three parameters involved in this scheme. To test the new parameter set we have computed the potential energy curves for various systems, including an isolated Ar2 dimer, two N2 dimers interacting within different configurations, and a water molecule physisorbed on pristine graphene. While the original set of parameters generally overestimates the interaction energies and underestimates the equilibrium distances, the new parameterization substantially improves the agreement with experimental and theoretical reference values. © 2016 Wiley Periodicals, Inc.","lang":"eng"}],"status":"public","_id":"13240","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"department":[{"_id":"304"}],"user_id":"71692","keyword":["Wannier orbitals","Van der Waals interactions","density functional theory","quantum harmonic oscillator"],"language":[{"iso":"eng"}]},{"doi":"10.5709/acp-0184-1","main_file_link":[{"url":"http://ac-psych.org/en/download-pdf/volume/12/issue/1/id/185","open_access":"1"}],"volume":12,"author":[{"last_name":"Krüger","full_name":"Krüger, Alexander","first_name":"Alexander"},{"full_name":"Tünnermann, Jan","last_name":"Tünnermann","first_name":"Jan"},{"first_name":"Ingrid","last_name":"Scharlau","orcid":"0000-0003-2364-9489","id":"451","full_name":"Scharlau, Ingrid"}],"date_updated":"2022-06-06T16:21:09Z","oa":"1","page":"20 - 38","intvolume":"        12","citation":{"apa":"Krüger, A., Tünnermann, J., &#38; Scharlau, I. (2016). Fast and conspicuous? Quantifying salience with the theory of visual attention. <i>Advances in Cognitive Psychology</i>, <i>12</i>(1), 20–38. <a href=\"https://doi.org/10.5709/acp-0184-1\">https://doi.org/10.5709/acp-0184-1</a>","short":"A. Krüger, J. Tünnermann, I. Scharlau, Advances in Cognitive Psychology 12 (2016) 20–38.","bibtex":"@article{Krüger_Tünnermann_Scharlau_2016, title={Fast and conspicuous? Quantifying salience with the theory of visual attention.}, volume={12}, DOI={<a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>}, number={1}, journal={Advances in Cognitive Psychology}, author={Krüger, Alexander and Tünnermann, Jan and Scharlau, Ingrid}, year={2016}, pages={20–38} }","mla":"Krüger, Alexander, et al. “Fast and Conspicuous? Quantifying Salience with the Theory of Visual Attention.” <i>Advances in Cognitive Psychology</i>, vol. 12, no. 1, 2016, pp. 20–38, doi:<a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>.","ama":"Krüger A, Tünnermann J, Scharlau I. Fast and conspicuous? Quantifying salience with the theory of visual attention. <i>Advances in Cognitive Psychology</i>. 2016;12(1):20-38. doi:<a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>","ieee":"A. Krüger, J. Tünnermann, and I. Scharlau, “Fast and conspicuous? Quantifying salience with the theory of visual attention.,” <i>Advances in Cognitive Psychology</i>, vol. 12, no. 1, pp. 20–38, 2016, doi: <a href=\"https://doi.org/10.5709/acp-0184-1\">10.5709/acp-0184-1</a>.","chicago":"Krüger, Alexander, Jan Tünnermann, and Ingrid Scharlau. “Fast and Conspicuous? Quantifying Salience with the Theory of Visual Attention.” <i>Advances in Cognitive Psychology</i> 12, no. 1 (2016): 20–38. <a href=\"https://doi.org/10.5709/acp-0184-1\">https://doi.org/10.5709/acp-0184-1</a>."},"publication_identifier":{"issn":["1895-1171"]},"publication_status":"published","funded_apc":"1","department":[{"_id":"424"}],"user_id":"42165","_id":"6071","status":"public","type":"journal_article","title":"Fast and conspicuous? Quantifying salience with the theory of visual attention.","date_created":"2018-12-10T07:04:15Z","year":"2016","issue":"1","language":[{"iso":"eng"}],"keyword":["salience","visual attention","Bayesian inference","theory of visual attention","computational modeling","Visual Attention","Computational Modeling","Inference","Judgment","Statistical Probability"],"abstract":[{"text":"Particular differences between an object and its surrounding cause salience, guide attention, and improve performance in various tasks. While much research has been dedicated to identifying which feature dimensions contribute to salience, much less regard has been paid to the quantitative strength of the salience caused by feature differences. Only a few studies systematically related salience effects to a common salience measure, and they are partly outdated in the light of new findings on the time course of salience effects. We propose Bundesen’s Theory of Visual Attention (TV A) as a theoretical basis for measuring salience and introduce an empirical and modeling approach to link this theory to data retrieved from temporal-order judgments. With this procedure, TV A becomes applicable to a broad range of salience-related stimulus material. Three experiments with orientation pop-out displays demonstrate the feasibility of the method. A 4th experiment substantiates its applicability t","lang":"eng"}],"publication":"Advances in Cognitive Psychology"},{"citation":{"ama":"Tünnermann J, Scharlau I. Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception. <i>Frontiers in Psychology</i>. 2016;7. doi:<a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>","ieee":"J. Tünnermann and I. Scharlau, “Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception.,” <i>Frontiers in Psychology</i>, vol. 7, 2016, doi: <a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>.","chicago":"Tünnermann, Jan, and Ingrid Scharlau. “Peripheral Visual Cues: Their Fate in Processing and Effects on Attention and Temporal-Order Perception.” <i>Frontiers in Psychology</i> 7 (2016). <a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">https://doi.org/10.3389/fpsyg.2016.01442</a>.","apa":"Tünnermann, J., &#38; Scharlau, I. (2016). Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception. <i>Frontiers in Psychology</i>, <i>7</i>. <a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">https://doi.org/10.3389/fpsyg.2016.01442</a>","mla":"Tünnermann, Jan, and Ingrid Scharlau. “Peripheral Visual Cues: Their Fate in Processing and Effects on Attention and Temporal-Order Perception.” <i>Frontiers in Psychology</i>, vol. 7, 2016, doi:<a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>.","bibtex":"@article{Tünnermann_Scharlau_2016, title={Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception.}, volume={7}, DOI={<a href=\"https://doi.org/10.3389/fpsyg.2016.01442\">10.3389/fpsyg.2016.01442</a>}, journal={Frontiers in Psychology}, author={Tünnermann, Jan and Scharlau, Ingrid}, year={2016} }","short":"J. Tünnermann, I. Scharlau, Frontiers in Psychology 7 (2016)."},"intvolume":"         7","year":"2016","publication_status":"published","publication_identifier":{"issn":["1664-1078"]},"main_file_link":[{"open_access":"1","url":"https://www.frontiersin.org/articles/10.3389/fpsyg.2016.01442/full"}],"doi":"10.3389/fpsyg.2016.01442","title":"Peripheral visual cues: Their fate in processing and effects on attention and temporal-order perception.","date_created":"2018-12-10T07:06:09Z","author":[{"full_name":"Tünnermann, Jan","last_name":"Tünnermann","first_name":"Jan"},{"id":"451","full_name":"Scharlau, Ingrid","last_name":"Scharlau","orcid":"0000-0003-2364-9489","first_name":"Ingrid"}],"volume":7,"oa":"1","date_updated":"2022-06-06T16:29:50Z","status":"public","abstract":[{"lang":"eng","text":"Peripheral visual cues lead to large shifts in psychometric distributions of temporal-order judgments. In one view, such shifts are attributed to attention speeding up processing of the cued stimulus, so-called prior entry. However, sometimes these shifts are so large that it is unlikely that they are caused by attention alone. Here we tested the prevalent alternative explanation that the cue is sometimes confused with the target on a perceptual level, bolstering the shift of the psychometric function. We applied a novel model of cued temporal-order judgments, derived from Bundesen’s Theory of Visual Attention.We found that cue–target confusions indeed contribute to shifting psychometric functions. However, cue-induced changes in the processing rates of the target stimuli play an important role, too. At smaller cueing intervals, the cue increased the processing speed of the target. At larger intervals, inhibition of return was predominant. Earlier studies of cued TOJs were insensitive"}],"type":"journal_article","publication":"Frontiers in Psychology","language":[{"iso":"eng"}],"keyword":["cueing","temporal-order judgements","theory of visual attention (TVA)","peripheral cue","processing speed","stimulus encoding","prior entry","Attention","Cues","Face Perception","Judgment"],"user_id":"42165","department":[{"_id":"424"}],"_id":"6080"},{"keyword":["Algebra and Number Theory"],"language":[{"iso":"eng"}],"external_id":{"arxiv":["1509.06883 "]},"abstract":[{"lang":"eng","text":"Let k be a number field, K/k a finite Galois extension with Galois group G, χ a faithful character of G. We prove that the Artin L-function L(s,χ,K/k) determines the Galois closure of K over $\\ℚ$. In the special case $k=\\ℚ$ it also determines the character χ. "}],"publication":"Journal of Number Theory","title":"Are number fields determined by Artin L-functions?","publisher":"Elsevier BV","date_created":"2022-12-22T10:52:47Z","year":"2016","_id":"34844","department":[{"_id":"102"}],"user_id":"93826","status":"public","type":"journal_article","doi":"10.1016/j.jnt.2016.03.023","date_updated":"2023-03-06T10:44:22Z","volume":167,"author":[{"full_name":"Klüners, Jürgen","id":"21202","last_name":"Klüners","first_name":"Jürgen"},{"first_name":"Florin","last_name":"Nicolae","full_name":"Nicolae, Florin"}],"page":"161-168","intvolume":"       167","citation":{"apa":"Klüners, J., &#38; Nicolae, F. (2016). Are number fields determined by Artin L-functions? <i>Journal of Number Theory</i>, <i>167</i>, 161–168. <a href=\"https://doi.org/10.1016/j.jnt.2016.03.023\">https://doi.org/10.1016/j.jnt.2016.03.023</a>","bibtex":"@article{Klüners_Nicolae_2016, title={Are number fields determined by Artin L-functions?}, volume={167}, DOI={<a href=\"https://doi.org/10.1016/j.jnt.2016.03.023\">10.1016/j.jnt.2016.03.023</a>}, journal={Journal of Number Theory}, publisher={Elsevier BV}, author={Klüners, Jürgen and Nicolae, Florin}, year={2016}, pages={161–168} }","mla":"Klüners, Jürgen, and Florin Nicolae. “Are Number Fields Determined by Artin L-Functions?” <i>Journal of Number Theory</i>, vol. 167, Elsevier BV, 2016, pp. 161–68, doi:<a href=\"https://doi.org/10.1016/j.jnt.2016.03.023\">10.1016/j.jnt.2016.03.023</a>.","short":"J. Klüners, F. Nicolae, Journal of Number Theory 167 (2016) 161–168.","ieee":"J. Klüners and F. Nicolae, “Are number fields determined by Artin L-functions?,” <i>Journal of Number Theory</i>, vol. 167, pp. 161–168, 2016, doi: <a href=\"https://doi.org/10.1016/j.jnt.2016.03.023\">10.1016/j.jnt.2016.03.023</a>.","chicago":"Klüners, Jürgen, and Florin Nicolae. “Are Number Fields Determined by Artin L-Functions?” <i>Journal of Number Theory</i> 167 (2016): 161–68. <a href=\"https://doi.org/10.1016/j.jnt.2016.03.023\">https://doi.org/10.1016/j.jnt.2016.03.023</a>.","ama":"Klüners J, Nicolae F. Are number fields determined by Artin L-functions? <i>Journal of Number Theory</i>. 2016;167:161-168. doi:<a href=\"https://doi.org/10.1016/j.jnt.2016.03.023\">10.1016/j.jnt.2016.03.023</a>"},"publication_identifier":{"issn":["0022-314X"]},"publication_status":"published"},{"page":"343-361","intvolume":"       161","citation":{"ama":"Kirschmer M, Lorch D. Ternary quadratic forms over number fields with small class number. <i>Journal of Number Theory</i>. 2016;161:343-361. doi:<a href=\"https://doi.org/10.1016/j.jnt.2014.11.001\">10.1016/j.jnt.2014.11.001</a>","chicago":"Kirschmer, Markus, and David Lorch. “Ternary Quadratic Forms over Number Fields with Small Class Number.” <i>Journal of Number Theory</i> 161 (2016): 343–61. <a href=\"https://doi.org/10.1016/j.jnt.2014.11.001\">https://doi.org/10.1016/j.jnt.2014.11.001</a>.","ieee":"M. Kirschmer and D. Lorch, “Ternary quadratic forms over number fields with small class number,” <i>Journal of Number Theory</i>, vol. 161, pp. 343–361, 2016, doi: <a href=\"https://doi.org/10.1016/j.jnt.2014.11.001\">10.1016/j.jnt.2014.11.001</a>.","apa":"Kirschmer, M., &#38; Lorch, D. (2016). Ternary quadratic forms over number fields with small class number. <i>Journal of Number Theory</i>, <i>161</i>, 343–361. <a href=\"https://doi.org/10.1016/j.jnt.2014.11.001\">https://doi.org/10.1016/j.jnt.2014.11.001</a>","mla":"Kirschmer, Markus, and David Lorch. “Ternary Quadratic Forms over Number Fields with Small Class Number.” <i>Journal of Number Theory</i>, vol. 161, Elsevier BV, 2016, pp. 343–61, doi:<a href=\"https://doi.org/10.1016/j.jnt.2014.11.001\">10.1016/j.jnt.2014.11.001</a>.","bibtex":"@article{Kirschmer_Lorch_2016, title={Ternary quadratic forms over number fields with small class number}, volume={161}, DOI={<a href=\"https://doi.org/10.1016/j.jnt.2014.11.001\">10.1016/j.jnt.2014.11.001</a>}, journal={Journal of Number Theory}, publisher={Elsevier BV}, author={Kirschmer, Markus and Lorch, David}, year={2016}, pages={343–361} }","short":"M. Kirschmer, D. Lorch, Journal of Number Theory 161 (2016) 343–361."},"publication_identifier":{"issn":["0022-314X"]},"publication_status":"published","doi":"10.1016/j.jnt.2014.11.001","volume":161,"author":[{"id":"82258","full_name":"Kirschmer, Markus","last_name":"Kirschmer","first_name":"Markus"},{"full_name":"Lorch, David","last_name":"Lorch","first_name":"David"}],"date_updated":"2023-04-04T09:10:42Z","status":"public","type":"journal_article","extern":"1","department":[{"_id":"102"}],"user_id":"93826","_id":"42792","year":"2016","title":"Ternary quadratic forms over number fields with small class number","date_created":"2023-03-07T08:28:46Z","publisher":"Elsevier BV","abstract":[{"text":"We enumerate all positive definite ternary quadratic forms over number fields with class number at most 2. This is done by constructing all definite quaternion orders of type number at most 2 over number fields. Finally, we list all definite quaternion orders of ideal class number 1 or 2.","lang":"eng"}],"publication":"Journal of Number Theory","language":[{"iso":"eng"}],"keyword":["Algebra and Number Theory"]},{"extern":"1","language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:09:32Z","ddc":["000"],"keyword":["Information Security","Investment","Literature review","Resource-based View","Organi-zational Learning Theory","Multi-theoretical Perspective"],"user_id":"61579","department":[{"_id":"277"}],"_id":"5588","file":[{"date_created":"2018-12-07T11:45:31Z","creator":"hsiemes","date_updated":"2018-12-13T15:09:32Z","file_name":"ICIS PROCEEDINGS PAPER - Security Investments.pdf","file_id":"6038","access_level":"open_access","file_size":958019,"content_type":"application/pdf","relation":"main_file"}],"status":"public","abstract":[{"text":"The protection of information technology (IT) has become and is predicted to remain a key economic challenge for organizations. While research on IT security investment is fast growing, it lacks a theoretical basis for structuring research, explaining economic-technological phenomena and guide future research. We address this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical perspective adopt-ing the Resource-Based View and the Organizational Learning Theory. The joint appli-cation of these theories allows to conceptualize in one theoretical model the organiza-tional learning effects that occur when the protection of organizational resources through IT security countermeasures develops over time. We use this model of IT security invest-ments to synthesize findings of a large body of literature and to derive research gaps. We also discuss managerial implications of (closing) these gaps by providing practical ex-amples.","lang":"eng"}],"type":"conference","publication":"International Conference on Information Systems","title":"A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory","author":[{"full_name":"Weishäupl, Eva","last_name":"Weishäupl","first_name":"Eva"},{"full_name":"Yasasin, Emrah","last_name":"Yasasin","first_name":"Emrah"},{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"}],"date_created":"2018-11-14T11:25:38Z","date_updated":"2022-01-06T07:02:03Z","oa":"1","citation":{"ieee":"E. Weishäupl, E. Yasasin, and G. Schryen, “A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory,” in <i>International Conference on Information Systems</i>, 2015.","chicago":"Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” In <i>International Conference on Information Systems</i>, 2015.","ama":"Weishäupl E, Yasasin E, Schryen G. A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In: <i>International Conference on Information Systems</i>. ; 2015.","bibtex":"@inproceedings{Weishäupl_Yasasin_Schryen_2015, title={A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory}, booktitle={International Conference on Information Systems}, author={Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, year={2015} }","mla":"Weishäupl, Eva, et al. “A Multi-Theoretical Literature Review on Information Security Investments Using the Resource-Based View and the Organizational Learning Theory.” <i>International Conference on Information Systems</i>, 2015.","short":"E. Weishäupl, E. Yasasin, G. Schryen, in: International Conference on Information Systems, 2015.","apa":"Weishäupl, E., Yasasin, E., &#38; Schryen, G. (2015). A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory. In <i>International Conference on Information Systems</i>."},"year":"2015","has_accepted_license":"1"},{"abstract":[{"lang":"eng","text":"Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview."}],"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-12-07T11:46:28Z","creator":"hsiemes","date_updated":"2018-12-13T15:09:54Z","file_id":"6040","access_level":"open_access","file_name":"Towards an Economic Approach to IAMS.PDF","file_size":166015}],"publication":"2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)","type":"conference","keyword":["Identity and Access Management","Economic Decision Making","Information Systems","Information Security Investment","Decision Theory"],"ddc":["000"],"extern":"1","file_date_updated":"2018-12-13T15:09:54Z","language":[{"iso":"eng"}],"_id":"5590","department":[{"_id":"277"}],"user_id":"61579","year":"2015","citation":{"ama":"Weishäupl E, Kunz M, Yasasin E, et al. Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>. ; 2015.","ieee":"E. Weishäupl <i>et al.</i>, “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory,” in <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>, 2015.","chicago":"Weishäupl, Eva, Michael Kunz, Emrah Yasasin, Gerit Wagner, Julian Prester, Guido Schryen, and Günther Pernul. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” In <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","apa":"Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., &#38; Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In <i>2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)</i>.","mla":"Weishäupl, Eva, et al. “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.” <i>2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15)</i>, 2015.","bibtex":"@inproceedings{Weishäupl_Kunz_Yasasin_Wagner_Prester_Schryen_Pernul_2015, title={Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}, booktitle={2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}, author={Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}, year={2015} }","short":"E. Weishäupl, M. Kunz, E. Yasasin, G. Wagner, J. Prester, G. Schryen, G. Pernul, in: 2nd International Workshop on Security in Highly Connected IT Systems (SHCIS?15), 2015."},"has_accepted_license":"1","title":"Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory","oa":"1","date_updated":"2022-01-06T07:02:04Z","date_created":"2018-11-14T11:27:20Z","author":[{"full_name":"Weishäupl, Eva","last_name":"Weishäupl","first_name":"Eva"},{"first_name":"Michael","last_name":"Kunz","full_name":"Kunz, Michael"},{"first_name":"Emrah","last_name":"Yasasin","full_name":"Yasasin, Emrah"},{"first_name":"Gerit","full_name":"Wagner, Gerit","last_name":"Wagner"},{"first_name":"Julian","full_name":"Prester, Julian","last_name":"Prester"},{"full_name":"Schryen, Guido","id":"72850","last_name":"Schryen","first_name":"Guido"},{"full_name":"Pernul, Günther","last_name":"Pernul","first_name":"Günther"}]},{"abstract":[{"lang":"eng","text":"Literature reviews play an important role in the development of knowledge. Yet, we observe a lack of theoretical underpinning of and epistemological insights into how literature reviews can contribute to knowledge creation and have actually contributed in the IS discipline. To address these theoretical and empirical research gaps, we suggest a novel epistemological model of literature reviews. This model allows us to align different contributions of literature reviews with their underlying knowledge conversions - thereby building a bridge between the previously largely unconnected fields of literature reviews and epistemology. We evaluate the appropriateness of the model by conducting an empirical analysis of 173 IS literature reviews which were published in 39 pertinent IS journals between 2000 and 2014. Based on this analysis, we derive an epistemological taxonomy of IS literature reviews, which complements previously suggested typologies."}],"status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_id":"6037","access_level":"open_access","file_name":"ICIS PROCEEDINGS PAPER - Literature Reviews.pdf","file_size":487102,"creator":"hsiemes","date_created":"2018-12-07T11:44:48Z","date_updated":"2018-12-13T15:09:22Z"}],"publication":"International Conference on Information Systems (ICIS)","type":"conference","keyword":["Literature review","Research methods/methodology","Theory of knowledge"],"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-12-13T15:09:22Z","extern":"1","_id":"5618","department":[{"_id":"277"}],"user_id":"61579","year":"2015","citation":{"ieee":"G. Schryen, G. Wagner, and A. Benlian, “Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature,” in <i>International Conference on Information Systems (ICIS)</i>, 2015.","chicago":"Schryen, Guido, Gerit Wagner, and Alexander Benlian. “Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature.” In <i>International Conference on Information Systems (ICIS)</i>, 2015.","ama":"Schryen G, Wagner G, Benlian A. Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature. In: <i>International Conference on Information Systems (ICIS)</i>. ; 2015.","apa":"Schryen, G., Wagner, G., &#38; Benlian, A. (2015). Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature. In <i>International Conference on Information Systems (ICIS)</i>.","mla":"Schryen, Guido, et al. “Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature.” <i>International Conference on Information Systems (ICIS)</i>, 2015.","bibtex":"@inproceedings{Schryen_Wagner_Benlian_2015, title={Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature}, booktitle={International Conference on Information Systems (ICIS)}, author={Schryen, Guido and Wagner, Gerit and Benlian, Alexander}, year={2015} }","short":"G. Schryen, G. Wagner, A. Benlian, in: International Conference on Information Systems (ICIS), 2015."},"has_accepted_license":"1","title":"Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature","date_updated":"2022-01-06T07:02:10Z","oa":"1","date_created":"2018-11-14T14:01:13Z","author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"},{"last_name":"Wagner","full_name":"Wagner, Gerit","first_name":"Gerit"},{"first_name":"Alexander","last_name":"Benlian","full_name":"Benlian, Alexander"}]},{"status":"public","publication":"Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems","type":"conference","language":[{"iso":"eng"}],"extern":"1","keyword":["crowd-sensing","crowdsourcing","data aggregation","game theory","norms","reciprocation","self interested agents","simulation"],"department":[{"_id":"63"},{"_id":"541"}],"series_title":"AAMAS '14","user_id":"83983","_id":"17661","page":"1651-1652","citation":{"ama":"King TC, Liu Q, Polevoy G, et al. Request Driven Social Sensing. In: <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>. AAMAS ’14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems; 2014:1651-1652.","chicago":"King, Thomas C., Qingzhi Liu, Gleb Polevoy, Mathijs de Weerdt, Virginia Dignum, M. Birna van Riemsdijk, and Martijn Warnier. “Request Driven Social Sensing.” In <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>, 1651–52. AAMAS ’14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems, 2014.","ieee":"T. C. King <i>et al.</i>, “Request Driven Social Sensing,” in <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems</i>, 2014, pp. 1651–1652.","apa":"King, T. C., Liu, Q., Polevoy, G., de Weerdt, M., Dignum, V., van Riemsdijk, M. B., &#38; Warnier, M. (2014). Request Driven Social Sensing. In <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems</i> (pp. 1651–1652). Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.","mla":"King, Thomas C., et al. “Request Driven Social Sensing.” <i>Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems</i>, International Foundation for Autonomous Agents and Multiagent Systems, 2014, pp. 1651–52.","short":"T.C. King, Q. Liu, G. Polevoy, M. de Weerdt, V. Dignum, M.B. van Riemsdijk, M. Warnier, in: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems, International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 2014, pp. 1651–1652.","bibtex":"@inproceedings{King_Liu_Polevoy_de Weerdt_Dignum_van Riemsdijk_Warnier_2014, place={Richland, SC}, series={AAMAS ’14}, title={Request Driven Social Sensing}, booktitle={Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems}, publisher={International Foundation for Autonomous Agents and Multiagent Systems}, author={King, Thomas C. and Liu, Qingzhi and Polevoy, Gleb and de Weerdt, Mathijs and Dignum, Virginia and van Riemsdijk, M. Birna and Warnier, Martijn}, year={2014}, pages={1651–1652}, collection={AAMAS ’14} }"},"year":"2014","place":"Richland, SC","publication_identifier":{"isbn":["978-1-4503-2738-1"]},"title":"Request Driven Social Sensing","date_created":"2020-08-06T15:21:45Z","author":[{"first_name":"Thomas C.","last_name":"King","full_name":"King, Thomas C."},{"full_name":"Liu, Qingzhi","last_name":"Liu","first_name":"Qingzhi"},{"first_name":"Gleb","full_name":"Polevoy, Gleb","id":"83983","last_name":"Polevoy"},{"last_name":"de Weerdt","full_name":"de Weerdt, Mathijs","first_name":"Mathijs"},{"first_name":"Virginia","full_name":"Dignum, Virginia","last_name":"Dignum"},{"first_name":"M. Birna","full_name":"van Riemsdijk, M. Birna","last_name":"van Riemsdijk"},{"first_name":"Martijn","full_name":"Warnier, Martijn","last_name":"Warnier"}],"date_updated":"2022-01-06T06:53:16Z","publisher":"International Foundation for Autonomous Agents and Multiagent Systems"}]
