@inbook{20573, author = {{Koldewey, Christian and Reinhold, Jannik and Dumitrescu, Roman}}, booktitle = {{Der Geschäftsmodell-Toolguide}}, editor = {{Buchholz, Birgit and Bürger, Matthias}}, pages = {{138 -- 143}}, publisher = {{Campus Verlag}}, title = {{{Geschäftsmodell-Roadmapping}}}, year = {{2020}}, } @inproceedings{20695, author = {{Boeddeker, Christoph and Nakatani, Tomohiro and Kinoshita, Keisuke and Haeb-Umbach, Reinhold}}, booktitle = {{ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)}}, isbn = {{9781509066315}}, title = {{{Jointly Optimal Dereverberation and Beamforming}}}, doi = {{10.1109/icassp40776.2020.9054393}}, year = {{2020}}, } @inproceedings{20700, author = {{Boeddeker, Christoph and Cord-Landwehr, Tobias and Heitkaemper, Jens and Zorila, Catalin and Hayakawa, Daichi and Li, Mohan and Liu, Min and Doddipatla, Rama and Haeb-Umbach, Reinhold}}, booktitle = {{Proc. CHiME 2020 Workshop on Speech Processing in Everyday Environments}}, title = {{{Towards a speaker diarization system for the CHiME 2020 dinner party transcription}}}, year = {{2020}}, } @book{20705, editor = {{Herzig, Bardo and Klar, Tilman-Mathies and Martin, Alexander and Meister, Dorothee}}, issn = {{1424-3636}}, title = {{{Orientierungen in der digitalen Welt}}}, doi = {{10.21240/mpaed/39.x}}, year = {{2020}}, } @inproceedings{20854, author = {{Camberg, Alan Adam and Tröster, Thomas}}, location = {{Seoul, South Korea}}, title = {{{A simplified method for the evaluation of the layer compression test using one 3D digital image correlation system and considering the material anisotropy by the equibiaxial Lankford parameter}}}, doi = {{10.1088/1757-899X/967/1/012077}}, year = {{2020}}, } @inproceedings{20856, author = {{Camberg, Alan Adam and Erhart, Tobias and Tröster, Thomas}}, location = {{Seoul, South Korea}}, title = {{{Predicting fracture at non-isothermal forming conditions: A temperature dependent extension of the LS-DYNA GISSMO fracture indicator framework}}}, doi = {{10.13140/RG.2.2.23924.17288}}, year = {{2020}}, } @inproceedings{18249, abstract = {{Augmented Reality (AR) has recently found high attention in mobile shopping apps such as in domains like furniture or decoration. Here, the developers of the apps focus on the positioning of atomic 3D objects in the physical environment. With this focus, they neglect the configuration of multi-faceted 3D object composition according to the user needs and environmental constraints. To tackle these challenges, we present a model-based approach to support AR-assisted product con-figuration based on the concept of Dynamic Software Product Lines. Our approach splits products (e.g. table) into parts (e.g. tabletop, ta-ble legs, funnier) with their 3D objects and additional information (e.g. name, price). The possible products, which can be configured out of these parts, are stored in a feature model. At runtime, this feature model can be used to configure 3D object compositions out of the product parts and adapt to user needs and environmental constraints. The benefits of this approach are demonstrated by a case study of configuring modular kitchens with the help of a prototypical mobile-based implementation.}}, author = {{Gottschalk, Sebastian and Yigitbas, Enes and Schmidt, Eugen and Engels, Gregor}}, booktitle = {{Human-Centered Software Engineering. HCSE 2020}}, editor = {{Bernhaupt, Regina and Ardito, Carmelo and Sauer, Stefan}}, keywords = {{Product Configuration, Augmented Reality, Runtime Adaptation, Dynamic Software Product Lines}}, location = {{Eindhoven}}, publisher = {{Springer}}, title = {{{Model-based Product Configuration in Augmented Reality Applications}}}, doi = {{10.1007/978-3-030-64266-2_5}}, volume = {{12481}}, year = {{2020}}, } @misc{18637, author = {{Schürmann, Patrick}}, publisher = {{Universität Paderborn}}, title = {{{A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes}}}, year = {{2020}}, } @article{21819, abstract = {{Many dimensionality and model reduction techniques rely on estimating dominant eigenfunctions of associated dynamical operators from data. Important examples include the Koopman operator and its generator, but also the Schrödinger operator. We propose a kernel-based method for the approximation of differential operators in reproducing kernel Hilbert spaces and show how eigenfunctions can be estimated by solving auxiliary matrix eigenvalue problems. The resulting algorithms are applied to molecular dynamics and quantum chemistry examples. Furthermore, we exploit that, under certain conditions, the Schrödinger operator can be transformed into a Kolmogorov backward operator corresponding to a drift-diffusion process and vice versa. This allows us to apply methods developed for the analysis of high-dimensional stochastic differential equations to quantum mechanical systems.}}, author = {{Klus, Stefan and Nüske, Feliks and Hamzi, Boumediene}}, issn = {{1099-4300}}, journal = {{Entropy}}, title = {{{Kernel-Based Approximation of the Koopman Generator and Schrödinger Operator}}}, doi = {{10.3390/e22070722}}, year = {{2020}}, } @inproceedings{16487, author = {{Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Slamanig, Daniel and Striecks, Christoph}}, booktitle = {{Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),}}, location = {{Taiwan}}, publisher = {{ACM}}, title = {{{Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection}}}, doi = {{10.1145/3320269.3384769}}, year = {{2020}}, } @article{16839, author = {{Sain, Basudeb and Zentgraf, Thomas}}, issn = {{2047-7538}}, journal = {{Light: Science & Applications}}, pages = {{67}}, title = {{{Metasurfaces help lasers to mode-lock}}}, doi = {{10.1038/s41377-020-0312-1}}, volume = {{9}}, year = {{2020}}, } @article{16931, author = {{Zhou, Hongqiang and Sain, Basudeb and Wang, Yongtian and Schlickriede, Christian and Zhao, Ruizhe and Zhang, Xue and Wei, Qunshuo and Li, Xiaowei and Huang, Lingling and Zentgraf, Thomas}}, issn = {{1936-0851}}, journal = {{ACS Nano}}, number = {{5}}, pages = {{5553–5559}}, title = {{{Polarization-Encrypted Orbital Angular Momentum Multiplexed Metasurface Holography}}}, doi = {{10.1021/acsnano.9b09814}}, volume = {{14}}, year = {{2020}}, } @inproceedings{16933, abstract = {{The continuous innovation of its business models is an important task for a company to stay competitive. During this process, the company has to validate various hypotheses about its business models by adapting to uncertain and changing customer needs effectively and efficiently. This adaptation, in turn, can be supported by the concept of Software Product Lines (SPLs). SPLs reduce the time to market by deriving products for customers with changing requirements using a common set of features, structured as a feature model. Analogously, we support the process of business model adaptation by applying the engineering process of SPLs to the structure of the Business Model Canvas (BMC). We call this concept a Business Model Decision Line (BMDL). The BMDL matches business domain knowledge in the form of a feature model with customer needs to derive hypotheses about the business model together with experiments for validation. Our approach is effective by providing a comprehensive overview of possible business model adaptations and efficient by reusing experiments for different hypotheses. We implement our approach in a tool and illustrate the usefulness with an example of developing business models for a mobile application.}}, author = {{Gottschalk, Sebastian and Rittmeier, Florian and Engels, Gregor}}, booktitle = {{Proceedings of the 22nd IEEE International Conference on Business Informatics}}, keywords = {{Business Model Decision Line, Business Model Adaptation, Hypothesis-driven Adaptation, Software Product Line, Feature Model}}, location = {{Antwerp}}, publisher = {{IEEE}}, title = {{{Hypothesis-driven Adaptation of Business Models based on Product Line Engineering}}}, doi = {{10.1109/CBI49978.2020.00022}}, year = {{2020}}, } @inproceedings{16934, abstract = {{To build successful products, the developers have to adapt their product features and business models to uncertain customer needs. This adaptation is part of the research discipline of Hypotheses Engineering (HE) where customer needs can be seen as hypotheses that need to be tested iteratively by conducting experiments together with the customer. So far, modeling support and associated traceability of this iterative process are missing. Both, in turn, are important to document the adaptation to the customer needs and identify experiments that provide most evidence to the customer needs. To target this issue, we introduce a model-based HE approach with a twofold contribution: First, we develop a modeling language that models hypotheses and experiments as interrelated hierarchies together with a mapping between them. While the hypotheses are labeled with a score level of their current evidence, the experiments are labeled with a score level of maximum evidence that can be achieved during conduction. Second, we provide an iterative process to determine experiments that offer the most evidence improvement to the modeled hypotheses. We illustrate the usefulness of the approach with an example of testing the business model of a mobile application.}}, author = {{Gottschalk, Sebastian and Yigitbas, Enes and Engels, Gregor}}, booktitle = {{Business Modeling and Software Design}}, editor = {{Shishkov, Boris}}, keywords = {{Hypothesis Engineering, Model-based, Customer Need Adaptation, Business Model, Product Features}}, location = {{Potsdam}}, pages = {{276--286}}, publisher = {{Springer International Publishing}}, title = {{{Model-based Hypothesis Engineering for Supporting Adaptation to Uncertain Customer Needs}}}, doi = {{10.1007/978-3-030-52306-0_18}}, volume = {{391}}, year = {{2020}}, } @inproceedings{16939, author = {{Triebus, Marcel and Tröster, Thomas}}, booktitle = {{Proceedings 4th International Conference Hybrid Materials & Structures}}, location = {{Web-Conference}}, title = {{{A Holistic Approach to Optimization-Based Design of Hybrid Materials}}}, year = {{2020}}, } @techreport{17019, abstract = {{The scientific impact of research papers is multi-dimensional and can be determined quantitatively by means of citation analysis and qualitatively by means of content analysis. Accounting for the widely acknowledged limitations of pure citation analysis, we adopt a knowledge-based perspective on scientific impact to develop a methodology for content-based citation analysis which allows determining how papers have enabled knowledge development in subsequent research (knowledge impact). As knowledge development differs between research genres, we develop a new knowledgebased citation analysis methodology for the genre of standalone literature reviews (LRs). We apply the suggested methodology to the IS business value domain by manually coding 22 LRs and 1,228 citing papers (CPs) and show that the results challenge the assumption that citations indicate knowledge impact. We derive implications for distinguishing knowledge impact from citation impact in the LR genre. Finally, we develop recommendations for authors of LRs, scientific evaluation committees and editorial boards of journals how to apply and benefit from the suggested methodology, and we discuss its efficiency and automatization.}}, author = {{Schryen, Guido and Wagner, Gerit and Benlian, Alexander}}, keywords = {{Scientific impact, knowledge impact, content-based citation analysis, methodology}}, title = {{{Distinguishing Knowledge Impact from Citation Impact: A Methodology for Analysing Knowledge Impact for the Literature Review Genre}}}, year = {{2020}}, } @inproceedings{17055, abstract = {{Understanding a new literature corpus can be a grueling experience for junior scholars. Nevertheless, corresponding guidelines have not been updated for decades. We contend that the traditional strategy of skimming all papers and reading selected papers afterwards needs to be revised. Therefore, we design a new strategy that guides the overall exploratory process by prioritizing influential papers for initial reading, followed by skimming the remaining papers. Consistent with schemata theory, starting with in-depth reading allows readers to acquire more substantial prior content schemata, which are representa-tive for the literature corpus and useful in the following skimming process. To this end, we develop a prototype that identifies the influential papers from a set of PDFs, which is illustrated in a case study in the IT business value domain. With the new strategy, we envision a more efficient process of exploring unknown literature corpora.}}, author = {{Wagner, Gerit and Empl, Philipp and Schryen, Guido}}, booktitle = {{28th European Conference on Information Systems (ECIS 2020)}}, keywords = {{Reading and skimming, Exploring literature, Review methodology, Design science research, Schemata theory}}, location = {{Marrakesh, Morocco}}, title = {{{Designing a Novel Strategy for Exploring Literature Corpora}}}, year = {{2020}}, } @inproceedings{17089, author = {{Dreiling, Dmitrij and Itner, Dominik Thor and Feldmann, Nadine and Gravenkamp, Hauke and Henning, Bernd}}, location = {{Nürnberg}}, publisher = {{AMA Service GmbH}}, title = {{{Increasing the sensitivity in the determination of material parameters by using arbitrary loads in ultrasonic transmission measurements}}}, doi = {{10.5162/SMSI2020/D1.3}}, year = {{2020}}, } @article{15414, author = {{Schryen, Guido}}, journal = {{Communications of the ACM}}, number = {{9}}, pages = {{35 -- 37}}, title = {{{Integrating Management Science into the HPC Research Ecosystem}}}, volume = {{63}}, year = {{2020}}, } @inproceedings{15490, author = {{Claes, Leander and Baumhögger, Elmar and Rüther, Torben and Gierse, Jan and Tröster, Thomas and Henning, Bernd}}, booktitle = {{Fortschritte der Akustik - DAGA 2020}}, pages = {{1077--1080}}, title = {{{Reduction of systematic measurement deviation in acoustic absorption measurement systems}}}, year = {{2020}}, } @article{15513, abstract = {{This interview is part of the special issue (01/2020) on “High Performance Business Computing” to be published in the journal Business & Information Systems Engineering. The interviewee Utz-Uwe Haus is Senior Research Engineer @ CRAY European Research Lab (CERL)). A bio of him is included at the end of the interview.}}, author = {{Schryen, Guido and Kliewer, Natalia and Fink, Andreas}}, journal = {{Business & Information Systems Engineering}}, number = {{01/2020}}, pages = {{21 -- 23}}, title = {{{Interview with Utz-Uwe Haus on “High Performance Computing in Economic Environments: Opportunities and Challenges"}}}, volume = {{62}}, year = {{2020}}, } @article{15022, author = {{Schryen, Guido}}, journal = {{European Journal of Operational Research}}, number = {{1}}, pages = {{1 -- 18}}, publisher = {{Elsevier}}, title = {{{Parallel computational optimization in operations research: A new integrative framework, literature review and research directions}}}, volume = {{287}}, year = {{2020}}, } @article{16197, abstract = {{Nonlinear Pancharatnam–Berry phase metasurfaces facilitate the nontrivial phase modulation for frequency conversion processes by leveraging photon‐spin dependent nonlinear geometric‐phases. However, plasmonic metasurfaces show some severe limitation for nonlinear frequency conversion due to the intrinsic high ohmic loss and low damage threshold of plasmonic nanostructures. Here, the nonlinear geometric‐phases associated with the third‐harmonic generation process occurring in all‐dielectric metasurfaces is studied systematically, which are composed of silicon nanofins with different in‐plane rotational symmetries. It is found that the wave coupling among different field components of the resonant fundamental field gives rise to the appearance of different nonlinear geometric‐phases of the generated third‐harmonic signals. The experimental observations of the nonlinear beam steering and nonlinear holography realized in this work by all‐dielectric geometric‐phase metasurfaces are well explained with the developed theory. This work offers a new physical picture to understand the nonlinear optical process occurring at nanoscale dielectric resonators and will help in the design of nonlinear metasurfaces with tailored phase properties.}}, author = {{Liu, Bingyi and Sain, Basudeb and Reineke, Bernhard and Zhao, Ruizhe and Meier, Cedrik and Huang, Lingling and Jiang, Yongyuan and Zentgraf, Thomas}}, issn = {{2195-1071}}, journal = {{Advanced Optical Materials}}, number = {{9}}, publisher = {{Wiley}}, title = {{{Nonlinear Wavefront Control by Geometric-Phase Dielectric Metasurfaces: Influence of Mode Field and Rotational Symmetry}}}, doi = {{10.1002/adom.201902050}}, volume = {{8}}, year = {{2020}}, } @inproceedings{16219, abstract = {{Network function virtualization (NFV) proposes to replace physical middleboxes with more flexible virtual network functions (VNFs). To dynamically adjust to everchanging traffic demands, VNFs have to be instantiated and their allocated resources have to be adjusted on demand. Deciding the amount of allocated resources is non-trivial. Existing optimization approaches often assume fixed resource requirements for each VNF instance. However, this can easily lead to either waste of resources or bad service quality if too many or too few resources are allocated. To solve this problem, we train machine learning models on real VNF data, containing measurements of performance and resource requirements. For each VNF, the trained models can then accurately predict the required resources to handle a certain traffic load. We integrate these machine learning models into an algorithm for joint VNF scaling and placement and evaluate their impact on resulting VNF placements. Our evaluation based on real-world data shows that using suitable machine learning models effectively avoids over- and underallocation of resources, leading to up to 12 times lower resource consumption and better service quality with up to 4.5 times lower total delay than using standard fixed resource allocation.}}, author = {{Schneider, Stefan Balthasar and Satheeschandran, Narayanan Puthenpurayil and Peuster, Manuel and Karl, Holger}}, booktitle = {{IEEE Conference on Network Softwarization (NetSoft)}}, location = {{Ghent, Belgium}}, publisher = {{IEEE}}, title = {{{Machine Learning for Dynamic Resource Allocation in Network Function Virtualization}}}, year = {{2020}}, } @article{16249, abstract = {{Timing plays a crucial role in the context of information security investments. We regard timing in two dimensions, namely the time of announcement in relation to the time of investment and the time of announcement in relation to the time of a fundamental security incident. The financial value of information security investments is assessed by examining the relationship between the investment announcements and their stock market reaction focusing on the two time dimensions. Using an event study methodology, we found that both dimensions influence the stock market return of the investing organization. Our results indicate that (1) after fundamental security incidents in a given industry, the stock price will react more positively to a firm’s announcement of actual information security investments than to announcements of the intention to invest; (2) the stock price will react more positively to a firm’s announcements of the intention to invest after the fundamental security incident compared to before; and (3) the stock price will react more positively to a firm’s announcements of actual information security investments after the fundamental security incident compared to before. Overall, the lowest abnormal return can be expected when the intention to invest is announced before a fundamental information security incident and the highest return when actual investing after a fundamental information security incident in the respective industry.}}, author = {{Szubartowicz, Eva and Schryen, Guido}}, journal = {{Journal of Information System Security}}, keywords = {{Event Study, Information Security, Investment Announcements, Stock Price Reaction, Value of Information Security Investments}}, number = {{1}}, pages = {{3 -- 31}}, publisher = {{Information Institute Publishing, Washington DC, USA}}, title = {{{Timing in Information Security: An Event Study on the Impact of Information Security Investment Announcements}}}, volume = {{16}}, year = {{2020}}, } @inproceedings{16285, abstract = {{To decide in which part of town to open stores, high street retailers consult statistical data on customers and cities, but they cannot analyze their customers’ shopping behavior and geospatial features of a city due to missing data. While previous research has proposed recommendation systems and decision aids that address this type of decision problem – including factory location and assortment planning – there currently is no design knowledge available to prescribe the design of city center area recommendation systems (CCARS). We set out to design a software prototype considering local customers’ shopping interests and geospatial data on their shopping trips for retail site selection. With real data on 500 customers and 1,100 shopping trips, we demonstrate and evaluate our IT artifact. Our results illustrate how retailers and public town center managers can use CCARS for spatial location selection, growing retailers’ profits and a city center’s attractiveness for its citizens.}}, author = {{zur Heiden, Philipp and Berendes, Carsten Ingo and Beverungen, Daniel}}, booktitle = {{Proceedings of the 15th International Conference on Wirtschaftsinformatik}}, keywords = {{Town Center Management, High Street Retail, Recommender Systems, Geospatial Recommendations, Design Science Research}}, location = {{Potsdam}}, title = {{{Designing City Center Area Recommendation Systems }}}, doi = {{doi.org/10.30844/wi_2020_e1-heiden}}, year = {{2020}}, } @article{16290, abstract = {{The control of complex systems is of critical importance in many branches of science, engineering, and industry, many of which are governed by nonlinear partial differential equations. Controlling an unsteady fluid flow is particularly important, as flow control is a key enabler for technologies in energy (e.g., wind, tidal, and combustion), transportation (e.g., planes, trains, and automobiles), security (e.g., tracking airborne contamination), and health (e.g., artificial hearts and artificial respiration). However, the high-dimensional, nonlinear, and multi-scale dynamics make real-time feedback control infeasible. Fortunately, these high- dimensional systems exhibit dominant, low-dimensional patterns of activity that can be exploited for effective control in the sense that knowledge of the entire state of a system is not required. Advances in machine learning have the potential to revolutionize flow control given its ability to extract principled, low-rank feature spaces characterizing such complex systems.We present a novel deep learning modelpredictive control framework that exploits low-rank features of the flow in order to achieve considerable improvements to control performance. Instead of predicting the entire fluid state, we use a recurrent neural network (RNN) to accurately predict the control relevant quantities of the system, which are then embedded into an MPC framework to construct a feedback loop. In order to lower the data requirements and to improve the prediction accuracy and thus the control performance, incoming sensor data are used to update the RNN online. The results are validated using varying fluid flow examples of increasing complexity.}}, author = {{Bieker, Katharina and Peitz, Sebastian and Brunton, Steven L. and Kutz, J. Nathan and Dellnitz, Michael}}, issn = {{0935-4964}}, journal = {{Theoretical and Computational Fluid Dynamics}}, pages = {{577–591}}, title = {{{Deep model predictive flow control with limited sensor data and online learning}}}, doi = {{10.1007/s00162-020-00520-4}}, volume = {{34}}, year = {{2020}}, } @techreport{23568, abstract = {{We study the structure of power networks in consideration of local protests against certain power lines (’not-in-my-backyard’). An application of a network formation game is used to determine whether or not such protests arise. We examine the existence of stable networks and their characteristics, when no player wants to make an alteration. Stability within this game is only reached if each player is sufficiently connected to a power source but is not linked to more players than necessary. In addition we introduce an algorithm that creates a stable network.}}, author = {{Block, Lukas}}, keywords = {{Network formation, NIMBY, Power networks, Nash stability}}, title = {{{Network formation with NIMBY constraints}}}, year = {{2020}}, } @misc{30180, author = {{Ficara, Elena and d'Agostini, Franca }}, booktitle = {{La Stampa}}, title = {{{Perché celebrare Hegel? La sua dialettica è un brand, il suo pensiero una febbre benefica}}}, year = {{2020}}, } @article{20143, author = {{Otroshi, Mortaza and Rossel, Moritz and Meschut, Gerson}}, journal = {{Journal of Advanced Joining Processes}}, keywords = {{Self-pierce riveting, Ductile fracture, Damage modeling, GISSMO damage model}}, publisher = {{Elsevier}}, title = {{{Stress state dependent damage modeling of self-pierce riveting process simulation using GISSMO damage model}}}, doi = {{10.1016/j.jajp.2020.100015}}, volume = {{1}}, year = {{2020}}, } @article{11946, abstract = {{Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a lack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1) derive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs that complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs with different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published in 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development achieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant conceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge building activities to achieve their goals with respect to theory.}}, author = {{Schryen, Guido and Wagner, Gerit and Benlian, Alexander and Paré, Guy}}, issn = {{ 1529-3181}}, journal = {{Communications of the AIS}}, keywords = {{Literature review, knowledge development, knowledge building activities, knowledge-based typology, information systems research}}, pages = {{134--186}}, title = {{{A Knowledge Development Perspective on Literature Reviews: Validation of a New Typology in the IS Field}}}, doi = {{10.17705/1CAIS.04607}}, volume = {{46}}, year = {{2020}}, } @article{14985, author = {{Schryen, Guido and Kliewer, Natalia and Fink, Andreas}}, journal = {{Business & Information Systems Engineering}}, number = {{1}}, pages = {{1--3}}, title = {{{High Performance Business Computing}}}, doi = {{10.1007/s12599-019-00622-2}}, volume = {{62}}, year = {{2020}}, } @article{16710, abstract = {{In this work we present a set-oriented path following method for the computation of relative global attractors of parameter-dependent dynamical systems. We start with an initial approximation of the relative global attractor for a fixed parameter λ0 computed by a set-oriented subdivision method. By using previously obtained approximations of the parameter-dependent relative global attractor we can track it with respect to a one-dimensional parameter λ > λ0 without restarting the whole subdivision procedure. We illustrate the feasibility of the set-oriented path following method by exploring the dynamics in low-dimensional models for shear flows during the transition to turbulence and of large-scale atmospheric regime changes . }}, author = {{Gerlach, Raphael and Ziessler, Adrian and Eckhardt, Bruno and Dellnitz, Michael}}, issn = {{1536-0040}}, journal = {{SIAM Journal on Applied Dynamical Systems}}, pages = {{705--723}}, title = {{{A Set-Oriented Path Following Method for the Approximation of Parameter Dependent Attractors}}}, doi = {{10.1137/19m1247139}}, year = {{2020}}, } @book{32425, author = {{Tönsing, Johanna}}, title = {{{Animalische Epistemologie: Tierwahrheiten bei Franz Kafka am Beispiel von "Ein Bericht für eine Akademie"}}}, year = {{2020}}, } @misc{21294, author = {{Hagengruber, Ruth}}, booktitle = {{H-France Net}}, issn = {{ISSN 1553-9172}}, title = {{{Review Hagengruber Le Ru Émilie Du Châtelet Philosophe }}}, volume = {{158}}, year = {{2020}}, } @article{17598, author = {{Nakatani, Tomohiro and Boeddeker, Christoph and Kinoshita, Keisuke and Ikeshita, Rintaro and Delcroix, Marc and Haeb-Umbach, Reinhold}}, journal = {{IEEE/ACM Transactions on Audio, Speech, and Language Processing}}, pages = {{1--1}}, title = {{{Jointly optimal denoising, dereverberation, and source separation}}}, doi = {{10.1109/TASLP.2020.3013118}}, year = {{2020}}, } @inbook{35032, author = {{Süßmann, Johannes}}, booktitle = {{Erinnerungsorte in Belgien. Instrumente lokaler, regionaler und nationaler Sinnstiftung}}, editor = {{Kamp, Hermann and Schmitz, Sabine}}, isbn = {{978-3-8376-4515-6}}, pages = {{113–136}}, publisher = {{transcript}}, title = {{{Albrecht und Isabella in Brüssel. Eine Spurensuche}}}, doi = {{https://doi.org/10.14361/9783839445150-007}}, year = {{2020}}, } @article{27394, abstract = {{Der systematischen Reflexion von Praxiserfahrungen anhand von Theorie wird in der Lehrerinnenbildung ein besonders hoher Stellenwert zugeschrieben. Auf Makroebene wurde durch die Einführung des Praxissemesters in NRW auf der einen Seite ein wichtiger Schritt zur stärkeren Verknüpfung von Schulpraxis und universitärer Ausbildung getan. Auf der anderen Seite bestehen auf der Mirkoebene immer noch Herausforderungen in der Relationierung von Theorie und Praxis für Lehramtsstudierende. Hier heißt es für Dozierende, die Lehramtsstudierende während dieses Langzeitpraktikums in universitären Veranstaltungen begleiten, tragfähige Seminarkonzepte zu entwickeln. Der vorliegende Beitrag stellt eine Methode, die Theoriebasierte Fallreflexion (TFR), mit zwei Umsetzungsvarianten vor. Damit wird eine konkrete Möglichkeit dargelegt, wie in Begleitveranstaltungen zum Praxissemester zum einen eine systematische theoretische Analyse und zum anderen die Generierung individueller Handlungsmöglichkeiten für die konkrete Schulpraxis angeleitet werden kann. Des Weiteren werden insgesamt 410 verschiedene Rückmeldungen zur Methode von insgesamt N = 93 Studierenden, welche die TFR im Rahmen einer halbtägigen Blockveranstaltung durchführten, mittels der qualitativen Inhaltsanalyse nach Mayring (2015) kategorisiert. Die Studierenden betonten in ihren Rückmeldungen besonders das Potential der TFR im Hinblick auf ein tieferes Verständnis von theoretischen Inhalten sowie hinsichtlich der Möglichkeiten zum intensiven Austausch mit Kommilitonen*innen sowie zur individuellen Reflexion schulpraktischer Situationen.}}, author = {{Bonanati, Sabrina and Westphal, Petra and Wiethoff, Christoph}}, journal = {{HLZ - Herausforderungen Lehrer*innenbildung}}, keywords = {{TFR, Theoriebasierte Fallreflexion, Praxissemester, Begleitseminar, Theorie-Praxis-Verzahnung}}, number = {{1}}, pages = {{461–479}}, title = {{{Theoriebasierte Fallreflexion (TFR) im Praxissemester. Didaktische Umsetzung und Evaluation. }}}, doi = {{10.4119/HLZ-3142}}, volume = {{3}}, year = {{2020}}, } @inproceedings{29298, abstract = {{Die Themen „Big Data“, „Künstliche Intelligenz und „Data Science“ werden seit einiger Zeit nicht nur in der breiten Öffentlichkeit kontrovers diskutiert, sondern stellen für die Ausbildung in den IT- und IT-nahen Berufen schon heute neue Herausforderungen dar, die in Zukunft durch die gesellschaftliche und technologische Weiterentwicklung hin zu einer Datengesellschaft noch größer werden. An dieser Stelle stellt sich die Frage, welche Aspekte dieses großen Themenkomplexes für Schule und Ausbildung von Wichtigkeit sind und wie diese Themen sinnstiftend und gewinnbringend in die informatische Ausbildung in verschiedenen Bildungsgängen integriert werden können. Im Rahmen des von uns im Jahr 2017 organisierten Symposiums zum Thema „Data Science“ wurden für die Bildung relevante Aspekte erörtert, wodurch als Kernelemente für den Unterricht Algorithmen der Künstlichen Intelligenz und ihre Anwendung in Industrie und Gesellschaft, Explorationen von Big Data sowie der Umgang mit eigenen Daten in sozialen Netzwerken herausgearbeitet wurden. Ziel ist, aus diesen Themenbereichen sowohl ein umfassendes Curriculum als auch Module für verschiedene Unterrichtsszenarien zu entwickeln und zu erproben. Durch diese Materialien soll es Lehrkräften aus der Informatik, Mathematik oder Technik ermöglicht werden, diese Themen auf Basis des Curriculums und der erprobten Unterrichtskonzepte selbst zu unterrichten. Hierfür wurde im Rahmen des Projekts ProDaBi (Projekt Data Science und Big Data in der Schule, https://www.prodabi.de), initiiert von der Telekom Stiftung, ein experimenteller Projektkurs entwickelt, den wir mit Schüler:innen der Sekundarstufe II an der Universität Paderborn im Schuljahr 2018/19 durchführten. Dieser Kurs enthält neben einem Modul zur Exploration von Big Data und einem weiteren Modul zum Maschinellen Lernen als Teil der Künstlichen Intelligenz auch eine Projektphase, die es in Zusammenarbeit mit lokalen Unternehmen den Schüler:innen ermöglicht, das Erlernte in ein reales Data Science-Projekt einzubringen. Aus den Erfahrungen dieses Projektkurses sowie den parallel durchgeführten Erprobungen einzelner Bausteine auch mit beruflichen Schulen werden ab dem Schuljahr 2019/20 die hierfür verwendeten Materialien weiterentwickelt und weiteren Kooperationspartnern zur Erprobung zur Verfügung gestellt. Damit wurden zum Ende des Projekts nicht nur vollständige Unterrichtsmaterialien, sondern auch ein umfassendes Curriculum entwickelt.}}, author = {{Opel, Simone Anna and Schlichtig, Michael}}, booktitle = {{Sammelband der 27. Fachtagung der BAG Berufliche Bildung}}, editor = {{Vollmer, Thomas and Karges, Torben and Richter, Tim and Schlömer, Britta and Schütt-Sayed, Sören}}, keywords = {{Berufsbildung, vocational education, Ausbildung, training, berufliche Weiterbildung, advanced vocational education, Digitalisierung, digitalization, Unterricht, teaching, Lehrmethode, teaching method, Interdisziplinarität, interdisciplinarity, Fachdidaktik, subject didactics, Curriculum, curriculum, gewerblich-technischer Beruf, vocational/technical occupation, Fachkraft, specialist, Qualifikationsanforderungen, qualification requirements, Kompetenz, competence, Lehrerbildung, teacher training, Bundesrepublik Deutschland, Federal Republic of Germany}}, location = {{Siegen}}, pages = {{176--194}}, publisher = {{wbv Media GmbH & Co. KG}}, title = {{{Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II}}}, doi = {{https://doi.org/10.3278/6004722w}}, volume = {{55}}, year = {{2020}}, } @misc{27371, author = {{Mildorf, Jarmila}}, booktitle = {{Diegesis}}, number = {{2}}, title = {{{Book review: Fictional Dialogue as Poiesis: Elizabeth Alsop’s Making Conversation in Modernist Fiction.}}}, volume = {{9}}, year = {{2020}}, } @inproceedings{29546, author = {{Maslovskaya, Sofya and Caillau, Jean-Baptiste and Djema, Walid and Giraldi, Laetitia and Jean-Luc, Jean-Luc and Pomet, Jean-Baptiste}}, title = {{{The turnpike property in maximization of microbial metabolite production}}}, year = {{2020}}, } @misc{29550, author = {{Schönhärl, Korinna and Buggeln, Marc }}, title = {{{Die Kosten der Rettung Europas: Schulden- und Steuerkulturen in historischer Perspektive}}}, year = {{2020}}, } @inproceedings{31372, author = {{Hoffmann, Max}}, booktitle = {{Beiträge zum Mathematikunterricht 2020}}, editor = {{Siller, Hans-Stefan and Weigel, Wolfgang and Wörler, Jan Franz}}, pages = {{1353--1356}}, publisher = {{WTM-Verlag}}, title = {{{Schnittstellenaktivitäten zum Kongruenzsatz WSW}}}, doi = {{10.17877/DE290R-21368}}, year = {{2020}}, } @article{17086, author = {{Gries, Thomas and Redlin, Margarete}}, issn = {{1612-4804}}, journal = {{International Economics and Economic Policy}}, pages = {{923--944}}, title = {{{Trade and economic development: global causality and development- and openness-related heterogeneity}}}, doi = {{10.1007/s10368-020-00467-1}}, volume = {{17}}, year = {{2020}}, } @article{32559, abstract = {{This investigation concentrates on value similarity between parents and their children during adulthood. The interplay between gender, age, relationship quality, and frequency of contact on value similarity was analyzed. A total of 600 adult German children (53.8% women) and their parents took part in a questionnaire study. Value orientation was measured with a short version of Schwartz’s Portrait Values Questionnaire, and relationship quality with the Network of Relationships Inventory (Furman & Buhrmeister, 1992).Value similarity was higher in mother–daughter dyads compared to mother–son dyads, but in the other dyads, no significant differences were found. Regarding relationship quality, verbal intimacy was not related to value similarity. Parental satisfaction was associated with value similarity in the father–child dyads. Satisfaction, as perceived by adult children, was linked to value similarity in mother–child and father–son dyads. Furthermore, the frequency of contact related to value similarity between mothers and sons.}}, author = {{Hoellger, Christian and Sommer, Sabrina and Albert, Isabelle and Buhl, Heike M.}}, issn = {{0192-513X}}, journal = {{Journal of Family Issues}}, keywords = {{Adult child–parent dyads, value similarity, relationship quality, frequency of contact, parent-child-relationship}}, number = {{6}}, pages = {{1234--1257}}, publisher = {{SAGE Publications}}, title = {{{Intergenerational Value Similarity in Adulthood}}}, doi = {{10.1177/0192513x20943914}}, volume = {{42}}, year = {{2020}}, } @misc{33272, author = {{Nijholt, Eddie and Rink, Bob and Schwenker, Sören}}, booktitle = {{DSWeb}}, number = {{April}}, title = {{{Generalised Symmetry in Network Dynamics}}}, year = {{2020}}, } @techreport{29257, author = {{Steinhardt, Isabel and Fischer, Caroline and Heimstädt, Maximilian and Hirsbrunner, Simon David and Ikiz-Akinci, Dilek and Kressin, Lisa and Kretzer, Susanne and Möllenkamp, Andreas and Portzelt, Maike and Rahal, Rima-Maria and Schimmler, Sonja and Wilke, René and Wünsche, Hannes}}, publisher = {{Weizenbaum Institute for the Networked Society - The German Internet Institu}}, title = {{{Das Öffnen und Teilen von Daten qualitativer Forschung: eine Handreichung}}}, doi = {{https://doi.org/10.34669/wi.ws/}}, volume = {{6}}, year = {{2020}}, } @article{29246, abstract = {{Openness in science and education is increasing in importance within the digital knowledge society. So far, less attention has been paid to teaching Open Science in bachelor’s degrees or in qualitative methods. Therefore, the aim of this article is to use a seminar example to explore what Open Science practices can be taught in qualitative research and how digital tools can be involved. The seminar focused on the following practices: Open data practices, the practice of using the free and open source tool “Collaborative online Interpretation, the practice of participating, cooperating, collaborating and contributing through participatory technologies and in social (based) networks. To learn Open Science practices, the students were involved in a qualitative research project about “Use of digital technologies for the study and habitus of students”. The study shows the practices of Open Data are easy to teach, whereas the use of free and open source tools and participatory technologies for collaboration, participation, cooperation and contribution is more difficult. In addition, a cultural shift would have to take place within German universities to promote Open Science practices in general.}}, author = {{Steinhardt, Isabel}}, issn = {{0167-8329}}, journal = {{Education for Information}}, keywords = {{Open Science, Open Education Practices, Library and Information Sciences, Education, Information Systems}}, number = {{3}}, pages = {{263--279}}, publisher = {{IOS Press}}, title = {{{Learning Open Science by doing Open Science. A reflection of a qualitative research project-based seminar}}}, doi = {{10.3233/efi-190308}}, volume = {{36}}, year = {{2020}}, } @inproceedings{20141, author = {{Heindorf, Stefan and Scholten, Yan and Wachsmuth, Henning and Ngonga Ngomo, Axel-Cyrille and Potthast, Martin}}, booktitle = {{Proceedings of the 28th ACM International Conference on Information and Knowledge Management (CIKM 2020)}}, pages = {{3023--3030}}, title = {{{CauseNet: Towards a Causality Graph Extracted from the Web}}}, doi = {{10.1145/3340531.3412763}}, year = {{2020}}, } @article{13175, abstract = {{Today, organizations must deal with a plethora of IT security threats and to ensure smooth and uninterrupted business operations, firms are challenged to predict the volume of IT security vulnerabilities and allocate resources for fixing them. This challenge requires decision makers to assess which system or software packages are prone to vulnerabilities, how many post-release vulnerabilities can be expected to occur during a certain period of time, and what impact exploits might have. Substantial research has been dedicated to techniques that analyze source code and detect security vulnerabilities. However, only limited research has focused on forecasting security vulnerabilities that are detected and reported after the release of software. To address this shortcoming, we apply established methodologies which are capable of forecasting events exhibiting specific time series characteristics of security vulnerabilities, i.e., rareness of occurrence, volatility, non-stationarity, and seasonality. Based on a dataset taken from the National Vulnerability Database (NVD), we use the Mean Absolute Error (MAE) and Root Mean Square Error (RMSE) to measure the forecasting accuracy of single, double, and triple exponential smoothing methodologies, Croston's methodology, ARIMA, and a neural network-based approach. We analyze the impact of the applied forecasting methodology on the prediction accuracy with regard to its robustness along the dimensions of the examined system and software package "operating systems", "browsers" and "office solutions" and the applied metrics. To the best of our knowledge, this study is the first to analyze the effect of forecasting methodologies and to apply metrics that are suitable in this context. Our results show that the optimal forecasting methodology depends on the software or system package, as some methodologies perform poorly in the context of IT security vulnerabilities, that absolute metrics can cover the actual prediction error precisely, and that the prediction accuracy is robust within the two applied forecasting-error metrics.}}, author = {{Yasasin, Emrah and Prester, Julian and Wagner, Gerit and Schryen, Guido}}, issn = {{0167-4048}}, journal = {{Computers & Security}}, number = {{January}}, title = {{{Forecasting IT Security Vulnerabilities - An Empirical Analysis}}}, volume = {{88}}, year = {{2020}}, }