[{"date_updated":"2022-01-06T07:02:28Z","oa":"1","language":[{"iso":"eng"}],"title":"An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response","department":[{"_id":"277"}],"_id":"5674","intvolume":" 272","issue":"1","page":"352 - 363","year":"2019","citation":{"bibtex":"@article{Rauchecker_Schryen_2019, title={An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response}, volume={272}, number={1}, journal={European Journal of Operational Research}, publisher={Elsevier}, author={Rauchecker, Gerhard and Schryen, Guido}, year={2019}, pages={352–363} }","mla":"Rauchecker, Gerhard, and Guido Schryen. “An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response.” European Journal of Operational Research, vol. 272, no. 1, Elsevier, 2019, pp. 352–63.","chicago":"Rauchecker, Gerhard, and Guido Schryen. “An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response.” European Journal of Operational Research 272, no. 1 (2019): 352–63.","apa":"Rauchecker, G., & Schryen, G. (2019). An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response. European Journal of Operational Research, 272(1), 352–363.","ama":"Rauchecker G, Schryen G. An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response. European Journal of Operational Research. 2019;272(1):352-363.","ieee":"G. Rauchecker and G. Schryen, “An Exact Branch-and-Price Algorithm for Scheduling Rescue Units during Disaster Response,” European Journal of Operational Research, vol. 272, no. 1, pp. 352–363, 2019.","short":"G. Rauchecker, G. Schryen, European Journal of Operational Research 272 (2019) 352–363."},"type":"journal_article","abstract":[{"text":"In disaster operations management, a challenging task for rescue organizations occurs when they have to assign and schedule their rescue units to emerging incidents under time pressure in order to reduce the overall resulting harm. Of particular importance in practical scenarios is the need to consider collaboration of rescue units. This task has hardly been addressed in the literature. We contribute to both modeling and solving this problem by (1) conceptualizing the situation as a type of scheduling problem, (2) modeling it as a binary linear minimization problem, (3) suggesting a branch-and-price algorithm, which can serve as both an exact and heuristic solution procedure, and (4) conducting computational experiments - including a sensitivity analysis of the effects of exogenous model parameters on execution times and objective value improvements over a heuristic suggested in the literature - for different practical disaster scenarios. The results of our computational experiments show that most problem instances of practically feasible size can be solved to optimality within ten minutes. Furthermore, even when our algorithm is terminated once the first feasible solution has been found, this solution is in almost all cases competitive to the optimal solution and substantially better than the solution obtained by the best known algorithm from the literature. This performance of our branch-and-price algorithm enables rescue organizations to apply our procedure in practice, even when the time for decision making is limited to a few minutes. By addressing a very general type of scheduling problem, our approach applies to various scheduling situations.","lang":"eng"}],"ddc":["000"],"user_id":"61579","file_date_updated":"2018-12-13T15:16:37Z","publication":"European Journal of Operational Research","keyword":["OR in disaster relief","disaster operations management","scheduling","branch-and-price"],"publisher":"Elsevier","author":[{"full_name":"Rauchecker, Gerhard","first_name":"Gerhard","last_name":"Rauchecker"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"}],"file":[{"content_type":"application/pdf","date_updated":"2018-12-13T15:16:37Z","relation":"main_file","file_size":1470310,"creator":"hsiemes","file_id":"6019","access_level":"open_access","date_created":"2018-12-07T11:13:12Z","file_name":"JOURNAL VERSION.pdf"}],"volume":272,"date_created":"2018-11-14T15:35:27Z","status":"public","has_accepted_license":"1"},{"doi":"10.1007/978-3-030-11641-5_42","oa":"1","date_updated":"2022-01-06T07:03:38Z","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Business Information Processing","title":"Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes","place":"Cham","publication_status":"published","publication_identifier":{"issn":["1865-1348","1865-1356"],"isbn":["9783030116408","9783030116415"]},"editor":[{"full_name":"Daniel, Florian","first_name":"Florian","last_name":"Daniel"},{"last_name":"Sheng","first_name":" Quan Z.","full_name":"Sheng, Quan Z."},{"first_name":"Hamid","full_name":"Motahari, Hamid","last_name":"Motahari"}],"department":[{"_id":"66"},{"_id":"534"}],"_id":"7430","intvolume":" 342","page":"531-542","year":"2019","type":"book_chapter","citation":{"chicago":"Rittmeier, Florian, Gregor Engels, and Alexander Teetz. “Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes.” In Business Process Management Workshops, edited by Florian Daniel, Quan Z. Sheng, and Hamid Motahari, 342:531–42. Lecture Notes in Business Information Processing. Cham: Springer International Publishing, 2019. https://doi.org/10.1007/978-3-030-11641-5_42.","apa":"Rittmeier, F., Engels, G., & Teetz, A. (2019). Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes. In F. Daniel, Quan Z. Sheng, & H. Motahari (Eds.), Business Process Management Workshops (Vol. 342, pp. 531–542). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-11641-5_42","ama":"Rittmeier F, Engels G, Teetz A. Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes. In: Daniel F, Sheng Quan Z., Motahari H, eds. Business Process Management Workshops. Vol 342. Lecture Notes in Business Information Processing. Cham: Springer International Publishing; 2019:531-542. doi:10.1007/978-3-030-11641-5_42","mla":"Rittmeier, Florian, et al. “Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes.” Business Process Management Workshops, edited by Florian Daniel et al., vol. 342, Springer International Publishing, 2019, pp. 531–42, doi:10.1007/978-3-030-11641-5_42.","bibtex":"@inbook{Rittmeier_Engels_Teetz_2019, place={Cham}, series={Lecture Notes in Business Information Processing}, title={Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes}, volume={342}, DOI={10.1007/978-3-030-11641-5_42}, booktitle={Business Process Management Workshops}, publisher={Springer International Publishing}, author={Rittmeier, Florian and Engels, Gregor and Teetz, Alexander}, editor={Daniel, Florian and Sheng, Quan Z. and Motahari, HamidEditors}, year={2019}, pages={531–542}, collection={Lecture Notes in Business Information Processing} }","short":"F. Rittmeier, G. Engels, A. Teetz, in: F. Daniel, Quan Z. Sheng, H. Motahari (Eds.), Business Process Management Workshops, Springer International Publishing, Cham, 2019, pp. 531–542.","ieee":"F. Rittmeier, G. Engels, and A. Teetz, “Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes,” in Business Process Management Workshops, vol. 342, F. Daniel, Quan Z. Sheng, and H. Motahari, Eds. Cham: Springer International Publishing, 2019, pp. 531–542."},"ddc":["000"],"user_id":"5281","volume":342,"date_created":"2019-02-04T10:49:03Z","status":"public","has_accepted_license":"1","publication":"Business Process Management Workshops","file_date_updated":"2019-06-27T10:59:43Z","publisher":"Springer International Publishing","author":[{"full_name":"Rittmeier, Florian","first_name":"Florian","id":"5281","last_name":"Rittmeier"},{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"full_name":"Teetz, Alexander","first_name":"Alexander","id":"5319","last_name":"Teetz"}],"file":[{"file_name":"PWPfD-REBPM-UPB.pdf","date_created":"2019-06-27T10:55:28Z","access_level":"open_access","file_size":1208839,"title":"Process Weakness Patterns for the Identification of Digitalization Potentials in Business Processes","creator":"floriar","file_id":"10327","content_type":"application/pdf","date_updated":"2019-06-27T10:59:43Z","relation":"main_file"}]},{"citation":{"chicago":"Heindorf, Stefan, Yan Scholten, Gregor Engels, and Martin Potthast. “Debiasing Vandalism Detection Models at Wikidata.” In WWW, 670–80. ACM, 2019. https://doi.org/10.1145/3308558.3313507.","ama":"Heindorf S, Scholten Y, Engels G, Potthast M. Debiasing Vandalism Detection Models at Wikidata. In: WWW. ACM; 2019:670-680. doi:10.1145/3308558.3313507","apa":"Heindorf, S., Scholten, Y., Engels, G., & Potthast, M. (2019). Debiasing Vandalism Detection Models at Wikidata. In WWW (pp. 670–680). San Francisco, USA: ACM. https://doi.org/10.1145/3308558.3313507","mla":"Heindorf, Stefan, et al. “Debiasing Vandalism Detection Models at Wikidata.” WWW, ACM, 2019, pp. 670–80, doi:10.1145/3308558.3313507.","bibtex":"@inproceedings{Heindorf_Scholten_Engels_Potthast_2019, title={Debiasing Vandalism Detection Models at Wikidata}, DOI={10.1145/3308558.3313507}, booktitle={WWW}, publisher={ACM}, author={Heindorf, Stefan and Scholten, Yan and Engels, Gregor and Potthast, Martin}, year={2019}, pages={670–680} }","short":"S. Heindorf, Y. Scholten, G. Engels, M. Potthast, in: WWW, ACM, 2019, pp. 670–680.","ieee":"S. Heindorf, Y. Scholten, G. Engels, and M. Potthast, “Debiasing Vandalism Detection Models at Wikidata,” in WWW, San Francisco, USA, 2019, pp. 670–680."},"year":"2019","type":"conference","page":"670-680","main_file_link":[{"url":"https://groups.uni-paderborn.de/fg-engels/publications_pdfs/Konferenzbeitraege/heindorf2019_WWW.pdf","open_access":"1"}],"_id":"7668","conference":{"location":"San Francisco, USA","start_date":"2019-05-13","name":"2019 World Wide Web Conference (WWW '19)","end_date":"2015-05-17"},"has_accepted_license":"1","status":"public","date_created":"2019-02-13T14:10:36Z","file":[{"content_type":"application/pdf","date_updated":"2019-04-27T06:09:45Z","success":1,"relation":"main_file","file_size":1302648,"creator":"heindorf","file_id":"9518","access_level":"closed","date_created":"2019-04-27T06:09:45Z","file_name":"heindorf2019_WWW.pdf"}],"publisher":"ACM","author":[{"id":"11871","last_name":"Heindorf","orcid":"0000-0002-4525-6865","full_name":"Heindorf, Stefan","first_name":"Stefan"},{"first_name":"Yan","full_name":"Scholten, Yan","last_name":"Scholten"},{"full_name":"Engels, Gregor","first_name":"Gregor","id":"107","last_name":"Engels"},{"full_name":"Potthast, Martin","first_name":"Martin","last_name":"Potthast"}],"publication":"WWW","file_date_updated":"2019-04-27T06:09:45Z","user_id":"11871","ddc":["000"],"language":[{"iso":"eng"}],"oa":"1","doi":"10.1145/3308558.3313507","date_updated":"2022-01-06T07:03:43Z","project":[{"_id":"17","name":"SFB 901 - Subproject C5"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901","_id":"1"}],"publication_identifier":{"unknown":["978-1-4503-6674-8/19/05"]},"department":[{"_id":"66"}],"title":"Debiasing Vandalism Detection Models at Wikidata"},{"citation":{"apa":"Bäumer, F. S., Kersting, J., & Geierhos, M. (2019). Natural Language Processing in OTF Computing: Challenges and the Need for Interactive Approaches. Computers, 8(1). https://doi.org/10.3390/computers8010022","ama":"Bäumer FS, Kersting J, Geierhos M. Natural Language Processing in OTF Computing: Challenges and the Need for Interactive Approaches. Computers. 2019;8(1). doi:10.3390/computers8010022","chicago":"Bäumer, Frederik Simon, Joschka Kersting, and Michaela Geierhos. “Natural Language Processing in OTF Computing: Challenges and the Need for Interactive Approaches.” Computers 8, no. 1 (2019). https://doi.org/10.3390/computers8010022.","bibtex":"@article{Bäumer_Kersting_Geierhos_2019, title={Natural Language Processing in OTF Computing: Challenges and the Need for Interactive Approaches}, volume={8}, DOI={10.3390/computers8010022}, number={122}, journal={Computers}, publisher={MDPI AG, Basel, Switzerland}, author={Bäumer, Frederik Simon and Kersting, Joschka and Geierhos, Michaela}, year={2019} }","mla":"Bäumer, Frederik Simon, et al. “Natural Language Processing in OTF Computing: Challenges and the Need for Interactive Approaches.” Computers, vol. 8, no. 1, 22, MDPI AG, Basel, Switzerland, 2019, doi:10.3390/computers8010022.","short":"F.S. Bäumer, J. Kersting, M. Geierhos, Computers 8 (2019).","ieee":"F. S. Bäumer, J. Kersting, and M. Geierhos, “Natural Language Processing in OTF Computing: Challenges and the Need for Interactive Approaches,” Computers, vol. 8, no. 1, 2019."},"type":"journal_article","year":"2019","main_file_link":[{"open_access":"1","url":"https://www.mdpi.com/2073-431X/8/1/22/pdf"}],"issue":"1","article_number":"22","conference":{"end_date":"2018-10-06","name":"24th International Conference on Information and Software Technologies (ICIST 2018)","start_date":"2018-10-04","location":"Vilnius, Lithuania"},"_id":"8424","intvolume":" 8","date_created":"2019-03-06T14:27:28Z","status":"public","has_accepted_license":"1","volume":8,"file":[{"file_size":3164523,"creator":"jkers","file_id":"19572","date_updated":"2020-09-18T09:23:34Z","content_type":"application/pdf","relation":"main_file","success":1,"file_name":"Bäumer et al. (2019), Baeumer2019.pdf","date_created":"2020-09-18T09:23:34Z","access_level":"closed"}],"keyword":["Inaccuracy Detection","Natural Language Software Requirements","Chat Bot"],"file_date_updated":"2020-09-18T09:23:34Z","publication":"Computers","publisher":"MDPI AG, Basel, Switzerland","author":[{"last_name":"Bäumer","id":"38837","first_name":"Frederik Simon","full_name":"Bäumer, Frederik Simon"},{"last_name":"Kersting","id":"58701","first_name":"Joschka","full_name":"Kersting, Joschka"},{"first_name":"Michaela","full_name":"Geierhos, Michaela","orcid":"0000-0002-8180-5606","last_name":"Geierhos","id":"42496"}],"quality_controlled":"1","user_id":"58701","ddc":["000"],"abstract":[{"text":"The vision of On-the-Fly (OTF) Computing is to compose and provide software services ad hoc, based on requirement descriptions in natural language. Since non-technical users write their software requirements themselves and in unrestricted natural language, deficits occur such as inaccuracy and incompleteness. These deficits are usually met by natural language processing methods, which have to face special challenges in OTF Computing because maximum automation is the goal. In this paper, we present current automatic approaches for solving inaccuracies and incompletenesses in natural language requirement descriptions and elaborate open challenges. In particular, we will discuss the necessity of domain-specific resources and show why, despite far-reaching automation, an intelligent and guided integration of end users into the compensation process is required. In this context, we present our idea of a chat bot that integrates users into the compensation process depending on the given circumstances. ","lang":"eng"}],"article_type":"original","language":[{"iso":"eng"}],"oa":"1","doi":"10.3390/computers8010022","date_updated":"2022-01-06T07:03:55Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"publication_status":"published","publication_identifier":{"issn":["2073-431X"]},"department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"title":"Natural Language Processing in OTF Computing: Challenges and the Need for Interactive Approaches"},{"place":"Frankfurt am Main, Germany","title":"UPB-Annotate: Ein maßgeschneidertes Toolkit für historische Texte","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"project":[{"_id":"39","name":"InterGramm"}],"publication_identifier":{"isbn":["978-3-00-062166-6"]},"publication_status":"published","editor":[{"first_name":"Patrick","full_name":"Sahle, Patrick","last_name":"Sahle"}],"date_updated":"2022-01-06T07:03:56Z","oa":"1","doi":"10.5281/ZENODO.2596094","language":[{"iso":"ger"}],"user_id":"13929","publication":"DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts","publisher":"Zenodo","author":[{"last_name":"Seemann","id":"65408","first_name":"Nina","full_name":"Seemann, Nina"},{"full_name":"Merten, Marie-Luis","first_name":"Marie-Luis","last_name":"Merten"}],"date_created":"2019-03-21T08:39:17Z","status":"public","conference":{"end_date":"2019-03-29","start_date":"2019-03-25","name":"DHd 2019 Digital Humanities: multimedial & multimodal.","location":"Mainz and Frankfurt am Main, Germany"},"_id":"8529","main_file_link":[{"url":"https://zenodo.org/record/2596095/files/2019_DHd_BookOfAbstracts_web.pdf?download=1","open_access":"1"}],"page":"352-353","type":"conference_abstract","citation":{"ama":"Seemann N, Merten M-L. UPB-Annotate: Ein maßgeschneidertes Toolkit für historische Texte. In: Sahle P, ed. DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts. Frankfurt am Main, Germany: Zenodo; 2019:352-353. doi:10.5281/ZENODO.2596094","apa":"Seemann, N., & Merten, M.-L. (2019). UPB-Annotate: Ein maßgeschneidertes Toolkit für historische Texte. In P. Sahle (Ed.), DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts (pp. 352–353). Frankfurt am Main, Germany: Zenodo. https://doi.org/10.5281/ZENODO.2596094","chicago":"Seemann, Nina, and Marie-Luis Merten. “UPB-Annotate: Ein maßgeschneidertes Toolkit für historische Texte.” In DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, edited by Patrick Sahle, 352–53. Frankfurt am Main, Germany: Zenodo, 2019. https://doi.org/10.5281/ZENODO.2596094.","mla":"Seemann, Nina, and Marie-Luis Merten. “UPB-Annotate: Ein maßgeschneidertes Toolkit für historische Texte.” DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, edited by Patrick Sahle, Zenodo, 2019, pp. 352–53, doi:10.5281/ZENODO.2596094.","bibtex":"@inproceedings{Seemann_Merten_2019, place={Frankfurt am Main, Germany}, title={UPB-Annotate: Ein maßgeschneidertes Toolkit für historische Texte}, DOI={10.5281/ZENODO.2596094}, booktitle={DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts}, publisher={Zenodo}, author={Seemann, Nina and Merten, Marie-Luis}, editor={Sahle, PatrickEditor}, year={2019}, pages={352–353} }","short":"N. Seemann, M.-L. Merten, in: P. Sahle (Ed.), DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, Zenodo, Frankfurt am Main, Germany, 2019, pp. 352–353.","ieee":"N. Seemann and M.-L. Merten, “UPB-Annotate: Ein maßgeschneidertes Toolkit für historische Texte,” in DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, Mainz and Frankfurt am Main, Germany, 2019, pp. 352–353."},"year":"2019"},{"date_created":"2019-03-21T09:02:37Z","status":"public","publication":"DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts","author":[{"first_name":"Frederik Simon","full_name":"Bäumer, Frederik Simon","last_name":"Bäumer","id":"38837"},{"last_name":"Buff","full_name":"Buff, Bianca","first_name":"Bianca"},{"id":"42496","last_name":"Geierhos","orcid":"0000-0002-8180-5606","full_name":"Geierhos, Michaela","first_name":"Michaela"}],"publisher":"Zenodo","user_id":"13929","page":"192-193","year":"2019","citation":{"bibtex":"@inproceedings{Bäumer_Buff_Geierhos_2019, place={Frankfurt am Main, Germany}, title={Potentielle Privatsphäreverletzungen aufdecken und automatisiert sichtbar machen}, DOI={10.5281/zenodo.2596095}, booktitle={DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts}, publisher={Zenodo}, author={Bäumer, Frederik Simon and Buff, Bianca and Geierhos, Michaela}, editor={Sahle, PatrickEditor}, year={2019}, pages={192–193} }","mla":"Bäumer, Frederik Simon, et al. “Potentielle Privatsphäreverletzungen aufdecken und automatisiert sichtbar machen.” DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, edited by Patrick Sahle, Zenodo, 2019, pp. 192–93, doi:10.5281/zenodo.2596095.","apa":"Bäumer, F. S., Buff, B., & Geierhos, M. (2019). Potentielle Privatsphäreverletzungen aufdecken und automatisiert sichtbar machen. In P. Sahle (Ed.), DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts (pp. 192–193). Frankfurt am Main, Germany: Zenodo. https://doi.org/10.5281/zenodo.2596095","ama":"Bäumer FS, Buff B, Geierhos M. Potentielle Privatsphäreverletzungen aufdecken und automatisiert sichtbar machen. In: Sahle P, ed. DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts. Frankfurt am Main, Germany: Zenodo; 2019:192-193. doi:10.5281/zenodo.2596095","chicago":"Bäumer, Frederik Simon, Bianca Buff, and Michaela Geierhos. “Potentielle Privatsphäreverletzungen aufdecken und automatisiert sichtbar machen.” In DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, edited by Patrick Sahle, 192–93. Frankfurt am Main, Germany: Zenodo, 2019. https://doi.org/10.5281/zenodo.2596095.","ieee":"F. S. Bäumer, B. Buff, and M. Geierhos, “Potentielle Privatsphäreverletzungen aufdecken und automatisiert sichtbar machen,” in DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, Mainz and Frankfurt am Main, Germany, 2019, pp. 192–193.","short":"F.S. Bäumer, B. Buff, M. Geierhos, in: P. Sahle (Ed.), DHd 2019 Digital Humanities: multimedial & multimodal. Konferenzabstracts, Zenodo, Frankfurt am Main, Germany, 2019, pp. 192–193."},"type":"conference_abstract","main_file_link":[{"url":"https://zenodo.org/record/2596095/files/2019_DHd_BookOfAbstracts_web.pdf?download=1","open_access":"1"}],"conference":{"end_date":"2019-03-29","name":"DHd 2019 Digital Humanities: multimedial & multimodal.","start_date":"2019-03-25","location":"Mainz and Frankfurt am Main, Germany"},"_id":"8532","publication_status":"published","publication_identifier":{"isbn":["978-3-00-062166-6"]},"editor":[{"last_name":"Sahle","full_name":"Sahle, Patrick","first_name":"Patrick"}],"department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"title":"Potentielle Privatsphäreverletzungen aufdecken und automatisiert sichtbar machen","place":"Frankfurt am Main, Germany","language":[{"iso":"ger"}],"oa":"1","doi":"10.5281/zenodo.2596095","date_updated":"2022-01-06T07:03:56Z"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:04:01Z","doi":"10.1109/NETSOFT.2019.8806685","oa":"1","department":[{"_id":"75"}],"project":[{"name":"5G Development and validation platform for global industry-specific network services and Apps","grant_number":"761493","_id":"28"},{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"place":"Paris","title":"Prototyping and Demonstrating 5G Verticals: The Smart Manufacturing Case","main_file_link":[{"url":"https://doi.org/10.1109/NETSOFT.2019.8806685"}],"citation":{"short":"M. Peuster, S.B. Schneider, D. Behnke, M. Müller, P.-B. Bök, H. Karl, in: 5th IEEE International Conference on Network Softwarization (NetSoft 2019), Paris, 2019.","ieee":"M. Peuster, S. B. Schneider, D. Behnke, M. Müller, P.-B. Bök, and H. Karl, “Prototyping and Demonstrating 5G Verticals: The Smart Manufacturing Case,” in 5th IEEE International Conference on Network Softwarization (NetSoft 2019), Paris, 2019.","chicago":"Peuster, Manuel, Stefan Balthasar Schneider, Daniel Behnke, Marcel Müller, Patrick-Benjamin Bök, and Holger Karl. “Prototyping and Demonstrating 5G Verticals: The Smart Manufacturing Case.” In 5th IEEE International Conference on Network Softwarization (NetSoft 2019). Paris, 2019. https://doi.org/10.1109/NETSOFT.2019.8806685.","apa":"Peuster, M., Schneider, S. B., Behnke, D., Müller, M., Bök, P.-B., & Karl, H. (2019). Prototyping and Demonstrating 5G Verticals: The Smart Manufacturing Case. In 5th IEEE International Conference on Network Softwarization (NetSoft 2019). Paris. https://doi.org/10.1109/NETSOFT.2019.8806685","ama":"Peuster M, Schneider SB, Behnke D, Müller M, Bök P-B, Karl H. Prototyping and Demonstrating 5G Verticals: The Smart Manufacturing Case. In: 5th IEEE International Conference on Network Softwarization (NetSoft 2019). Paris; 2019. doi:10.1109/NETSOFT.2019.8806685","mla":"Peuster, Manuel, et al. “Prototyping and Demonstrating 5G Verticals: The Smart Manufacturing Case.” 5th IEEE International Conference on Network Softwarization (NetSoft 2019), 2019, doi:10.1109/NETSOFT.2019.8806685.","bibtex":"@inproceedings{Peuster_Schneider_Behnke_Müller_Bök_Karl_2019, place={Paris}, title={Prototyping and Demonstrating 5G Verticals: The Smart Manufacturing Case}, DOI={10.1109/NETSOFT.2019.8806685}, booktitle={5th IEEE International Conference on Network Softwarization (NetSoft 2019)}, author={Peuster, Manuel and Schneider, Stefan Balthasar and Behnke, Daniel and Müller, Marcel and Bök, Patrick-Benjamin and Karl, Holger}, year={2019} }"},"year":"2019","type":"conference","conference":{"location":"Paris","name":"5th IEEE International Conference on Network Softwarization (NetSoft 2019)","start_date":"2019-06-24","end_date":"2019-06-28"},"_id":"8792","file_date_updated":"2019-04-01T13:46:18Z","publication":"5th IEEE International Conference on Network Softwarization (NetSoft 2019)","author":[{"full_name":"Peuster, Manuel","first_name":"Manuel","id":"13271","last_name":"Peuster"},{"last_name":"Schneider","id":"35343","first_name":"Stefan Balthasar","orcid":"0000-0001-8210-4011","full_name":"Schneider, Stefan Balthasar"},{"last_name":"Behnke","first_name":"Daniel","full_name":"Behnke, Daniel"},{"first_name":"Marcel","full_name":"Müller, Marcel","last_name":"Müller"},{"last_name":"Bök","first_name":"Patrick-Benjamin","full_name":"Bök, Patrick-Benjamin"},{"first_name":"Holger","full_name":"Karl, Holger","last_name":"Karl","id":"126"}],"file":[{"access_level":"open_access","file_name":"main_for_ris.pdf","date_created":"2019-04-01T13:46:18Z","relation":"main_file","date_updated":"2019-04-01T13:46:18Z","content_type":"application/pdf","creator":"peuster","file_id":"8794","file_size":1693793}],"date_created":"2019-04-01T13:37:05Z","has_accepted_license":"1","status":"public","abstract":[{"lang":"eng","text":"5G together with software defined networking (SDN) and network function virtualisation (NFV) will enable a wide variety of vertical use cases. One of them is the smart man- ufacturing case which utilises 5G networks to interconnect production machines, machine parks, and factory sites to enable new possibilities in terms of flexibility, automation, and novel applications (industry 4.0). However, the availability of realistic and practical proof-of-concepts for those smart manufacturing scenarios is still limited.\r\nThis demo fills this gap by not only showing a real-world smart manufacturing application entirely implemented using NFV concepts, but also a lightweight prototyping framework that simplifies the realisation of vertical NFV proof-of-concepts. Dur- ing the demo, we show how an NFV-based smart manufacturing scenario can be specified, on-boarded, and instantiated before we demonstrate how the presented NFV services simplify machine data collection, aggregation, and analysis."}],"ddc":["000"],"user_id":"13271"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:04:01Z","doi":"10.1002/nem.2067","oa":"1","department":[{"_id":"75"}],"publication_status":"published","publication_identifier":{"issn":["1055-7148","1099-1190"]},"project":[{"name":"5G Development and validation platform for global industry-specific network services and Apps","grant_number":"761493","_id":"28"},{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"title":"A flow handover protocol to support state migration in softwarized networks","main_file_link":[{"url":"https://onlinelibrary.wiley.com/doi/abs/10.1002/nem.2067"}],"type":"journal_article","citation":{"apa":"Peuster, M., Küttner, H., & Karl, H. (2019). A flow handover protocol to support state migration in softwarized networks. International Journal of Network Management. https://doi.org/10.1002/nem.2067","ama":"Peuster M, Küttner H, Karl H. A flow handover protocol to support state migration in softwarized networks. International Journal of Network Management. 2019. doi:10.1002/nem.2067","chicago":"Peuster, Manuel, Hannes Küttner, and Holger Karl. “A Flow Handover Protocol to Support State Migration in Softwarized Networks.” International Journal of Network Management, 2019. https://doi.org/10.1002/nem.2067.","bibtex":"@article{Peuster_Küttner_Karl_2019, title={A flow handover protocol to support state migration in softwarized networks}, DOI={10.1002/nem.2067}, number={e2067}, journal={International Journal of Network Management}, author={Peuster, Manuel and Küttner, Hannes and Karl, Holger}, year={2019} }","mla":"Peuster, Manuel, et al. “A Flow Handover Protocol to Support State Migration in Softwarized Networks.” International Journal of Network Management, e2067, 2019, doi:10.1002/nem.2067.","short":"M. Peuster, H. Küttner, H. Karl, International Journal of Network Management (2019).","ieee":"M. Peuster, H. Küttner, and H. Karl, “A flow handover protocol to support state migration in softwarized networks,” International Journal of Network Management, 2019."},"year":"2019","_id":"8795","article_number":"e2067","author":[{"full_name":"Peuster, Manuel","first_name":"Manuel","id":"13271","last_name":"Peuster"},{"first_name":"Hannes","full_name":"Küttner, Hannes","last_name":"Küttner"},{"full_name":"Karl, Holger","first_name":"Holger","id":"126","last_name":"Karl"}],"file_date_updated":"2019-04-01T18:04:14Z","publication":"International Journal of Network Management","file":[{"access_level":"open_access","file_name":"main_for_ris.pdf","date_created":"2019-04-01T18:04:14Z","relation":"main_file","content_type":"application/pdf","date_updated":"2019-04-01T18:04:14Z","creator":"peuster","file_id":"8796","file_size":2571927}],"status":"public","has_accepted_license":"1","date_created":"2019-04-01T17:47:36Z","abstract":[{"lang":"eng","text":"Softwarized networks are the key enabler for elastic, on-demand service deployments of virtualized network functions. They allow to dynamically steer traffic\r\nthrough the network when new network functions are instantiated, or old ones\r\nare terminated. These scenarios become in particular challenging when stateful functions are involved, necessitating state management solutions to migrate\r\nstate between the functions. The problem with existing solutions is that they typically embrace state migration and flow rerouting jointly, imposing a huge set\r\nof requirements on the on-boarded virtualized network functions (VNFs), eg,\r\nsolution-specific state management interfaces.\r\nTo change this, we introduce the seamless handover protocol (SHarP). An\r\neasy-to-use, loss-less, and order-preserving flow rerouting mechanism that is\r\nnot fixed to a single state management approach. Using SHarP, VNF vendors\r\nare empowered to implement or use the state management solution of their\r\nchoice. SHarP supports these solutions with additional information when flows\r\nare migrated. In this paper, we present SHarP's design, its open source prototype\r\nimplementation, and show how SHarP significantly reduces the buffer usage at\r\na central (SDN) controller, which is a typical bottleneck in state-of-the-art solutions. Our experiments show that SHarP uses a constant amount of controller\r\nbuffer, irrespective of the time taken to migrate the VNF state."}],"ddc":["000"],"user_id":"13271"},{"date_updated":"2022-01-06T07:04:02Z","oa":"1","doi":"10.1117/1.ap.1.2.024002","language":[{"iso":"eng"}],"title":"Nonlinear optics in all-dielectric nanoantennas and metasurfaces: a review","department":[{"_id":"15"},{"_id":"230"},{"_id":"429"},{"_id":"289"}],"project":[{"name":"TRR 142","_id":"53"},{"name":"TRR 142 - Subproject C5","_id":"75"},{"_id":"56","name":"TRR 142 - Project Area C"}],"publication_identifier":{"issn":["2577-5421"]},"publication_status":"published","intvolume":" 1","_id":"8797","issue":"2","main_file_link":[{"url":"https://www.spiedigitallibrary.org/journals/Advanced-Photonics/volume-1/issue-02/024002/Nonlinear-optics-in-all-dielectric-nanoantennas-and-metasurfaces--a/10.1117/1.AP.1.2.024002.full","open_access":"1"}],"type":"journal_article","citation":{"chicago":"Sain, Basudeb, Cedrik Meier, and Thomas Zentgraf. “Nonlinear Optics in All-Dielectric Nanoantennas and Metasurfaces: A Review.” Advanced Photonics 1, no. 2 (2019): 024002. https://doi.org/10.1117/1.ap.1.2.024002.","ama":"Sain B, Meier C, Zentgraf T. Nonlinear optics in all-dielectric nanoantennas and metasurfaces: a review. Advanced Photonics. 2019;1(2):024002. doi:10.1117/1.ap.1.2.024002","apa":"Sain, B., Meier, C., & Zentgraf, T. (2019). Nonlinear optics in all-dielectric nanoantennas and metasurfaces: a review. Advanced Photonics, 1(2), 024002. https://doi.org/10.1117/1.ap.1.2.024002","mla":"Sain, Basudeb, et al. “Nonlinear Optics in All-Dielectric Nanoantennas and Metasurfaces: A Review.” Advanced Photonics, vol. 1, no. 2, 2019, p. 024002, doi:10.1117/1.ap.1.2.024002.","bibtex":"@article{Sain_Meier_Zentgraf_2019, title={Nonlinear optics in all-dielectric nanoantennas and metasurfaces: a review}, volume={1}, DOI={10.1117/1.ap.1.2.024002}, number={2}, journal={Advanced Photonics}, author={Sain, Basudeb and Meier, Cedrik and Zentgraf, Thomas}, year={2019}, pages={024002} }","short":"B. Sain, C. Meier, T. Zentgraf, Advanced Photonics 1 (2019) 024002.","ieee":"B. Sain, C. Meier, and T. Zentgraf, “Nonlinear optics in all-dielectric nanoantennas and metasurfaces: a review,” Advanced Photonics, vol. 1, no. 2, p. 024002, 2019."},"year":"2019","page":"024002","article_type":"review","abstract":[{"text":"Free from phase-matching constraints, plasmonic metasurfaces have contributed significantly to the control of optical nonlinearity and enhancement of nonlinear generation efficiency by engineering subwavelength meta-atoms. However, high dissipative losses and inevitable thermal heating limit their applicability in nonlinear nanophotonics. All-dielectric metasurfaces, supporting both electric and magnetic Mie-type resonances in their nanostructures, have appeared as a promising alternative to nonlinear plasmonics. High-index dielectric nanostructures, allowing additional magnetic resonances, can induce magnetic nonlinear effects, which, along with electric nonlinearities, increase the nonlinear conversion efficiency. In addition, low dissipative losses and high damage thresholds provide an extra degree of freedom for operating at high pump intensities, resulting in a considerable enhancement of the nonlinear processes. We discuss the current state of the art in the intensely developing area of all-dielectric nonlinear nanostructures and metasurfaces, including the role of Mie modes, Fano resonances, and anapole moments for harmonic generation, wave mixing, and ultrafast optical switching. Furthermore, we review the recent progress in the nonlinear phase and wavefront control using all-dielectric metasurfaces. We discuss techniques to realize all-dielectric metasurfaces for multifunctional applications and generation of second-order nonlinear processes from complementary metal–oxide–semiconductor-compatible materials.","lang":"eng"}],"user_id":"30525","ddc":["530"],"file":[{"file_size":5275552,"creator":"zentgraf","file_id":"15330","date_updated":"2019-12-14T14:24:36Z","content_type":"application/pdf","success":1,"relation":"main_file","file_name":"AdvPhoton_2019.pdf","date_created":"2019-12-14T14:24:36Z","access_level":"closed"}],"author":[{"first_name":"Basudeb","full_name":"Sain, Basudeb","last_name":"Sain"},{"id":"20798","last_name":"Meier","full_name":"Meier, Cedrik","orcid":"https://orcid.org/0000-0002-3787-3572","first_name":"Cedrik"},{"last_name":"Zentgraf","id":"30525","first_name":"Thomas","orcid":"0000-0002-8662-1101","full_name":"Zentgraf, Thomas"}],"quality_controlled":"1","publication":"Advanced Photonics","file_date_updated":"2019-12-14T14:24:36Z","status":"public","has_accepted_license":"1","date_created":"2019-04-04T06:20:14Z","volume":1},{"file":[{"content_type":"application/pdf","date_updated":"2019-05-16T09:13:40Z","description":"Preprint of original article: M. Peuster et al., \"Introducing Automated Verification and Validation for Virtualized Network Functions and Services,\" in IEEE Communications Magazine, vol. 57, no. 5, pp. 96-102, May 2019.\ndoi: 10.1109/MCOM.2019.1800873\n\n","relation":"main_file","file_size":1735036,"title":"Introducing Automated Verification and Validation for Virtualized Network Functions and Services","creator":"peuster","file_id":"9825","access_level":"open_access","date_created":"2019-05-16T09:13:40Z","file_name":"main_for_ris.pdf"}],"publication":"IEEE Communications Magazine","file_date_updated":"2019-05-16T09:13:40Z","author":[{"full_name":"Peuster, Manuel","first_name":"Manuel","id":"13271","last_name":"Peuster"},{"id":"35343","last_name":"Schneider","full_name":"Schneider, Stefan Balthasar","orcid":"0000-0001-8210-4011","first_name":"Stefan Balthasar"},{"last_name":"Zhao","first_name":"Mengxuan","full_name":"Zhao, Mengxuan"},{"first_name":"George","full_name":"Xilouris, George","last_name":"Xilouris"},{"last_name":"Trakadas","first_name":"Panagiotis","full_name":"Trakadas, Panagiotis"},{"last_name":"Vicens","full_name":"Vicens, Felipe","first_name":"Felipe"},{"first_name":"Wouter","full_name":"Tavernier, Wouter","last_name":"Tavernier"},{"full_name":"Soenen, Thomas","first_name":"Thomas","last_name":"Soenen"},{"last_name":"Vilalta","first_name":"Ricard","full_name":"Vilalta, Ricard"},{"last_name":"Andreou","first_name":"George","full_name":"Andreou, George"},{"last_name":"Kyriazis","first_name":"Dimosthenis","full_name":"Kyriazis, Dimosthenis"},{"first_name":"Holger","full_name":"Karl, Holger","last_name":"Karl","id":"126"}],"date_created":"2019-05-16T09:09:16Z","status":"public","has_accepted_license":"1","user_id":"13271","ddc":["000"],"main_file_link":[{"url":"https://ieeexplore.ieee.org/document/8713807"}],"page":"96-102","type":"journal_article","citation":{"apa":"Peuster, M., Schneider, S. B., Zhao, M., Xilouris, G., Trakadas, P., Vicens, F., … Karl, H. (2019). Introducing Automated Verification and Validation for Virtualized Network Functions and Services. IEEE Communications Magazine, 96–102. https://doi.org/10.1109/mcom.2019.1800873","ama":"Peuster M, Schneider SB, Zhao M, et al. Introducing Automated Verification and Validation for Virtualized Network Functions and Services. IEEE Communications Magazine. 2019:96-102. doi:10.1109/mcom.2019.1800873","chicago":"Peuster, Manuel, Stefan Balthasar Schneider, Mengxuan Zhao, George Xilouris, Panagiotis Trakadas, Felipe Vicens, Wouter Tavernier, et al. “Introducing Automated Verification and Validation for Virtualized Network Functions and Services.” IEEE Communications Magazine, 2019, 96–102. https://doi.org/10.1109/mcom.2019.1800873.","bibtex":"@article{Peuster_Schneider_Zhao_Xilouris_Trakadas_Vicens_Tavernier_Soenen_Vilalta_Andreou_et al._2019, title={Introducing Automated Verification and Validation for Virtualized Network Functions and Services}, DOI={10.1109/mcom.2019.1800873}, journal={IEEE Communications Magazine}, author={Peuster, Manuel and Schneider, Stefan Balthasar and Zhao, Mengxuan and Xilouris, George and Trakadas, Panagiotis and Vicens, Felipe and Tavernier, Wouter and Soenen, Thomas and Vilalta, Ricard and Andreou, George and et al.}, year={2019}, pages={96–102} }","mla":"Peuster, Manuel, et al. “Introducing Automated Verification and Validation for Virtualized Network Functions and Services.” IEEE Communications Magazine, 2019, pp. 96–102, doi:10.1109/mcom.2019.1800873.","short":"M. Peuster, S.B. Schneider, M. Zhao, G. Xilouris, P. Trakadas, F. Vicens, W. Tavernier, T. Soenen, R. Vilalta, G. Andreou, D. Kyriazis, H. Karl, IEEE Communications Magazine (2019) 96–102.","ieee":"M. Peuster et al., “Introducing Automated Verification and Validation for Virtualized Network Functions and Services,” IEEE Communications Magazine, pp. 96–102, 2019."},"year":"2019","_id":"9824","department":[{"_id":"75"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"publication_status":"published","publication_identifier":{"issn":["0163-6804","1558-1896"]},"title":"Introducing Automated Verification and Validation for Virtualized Network Functions and Services","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:04:23Z","oa":"1","doi":"10.1109/mcom.2019.1800873"}]