[{"type":"book","citation":{"short":"R. Schillinger, G. Schryen, Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC, University of Regensburg, 2018.","ieee":"R. Schillinger and G. Schryen, Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC. University of Regensburg, 2018.","chicago":"Schillinger, Rolf, and Guido Schryen. Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC. University of Regensburg, 2018. https://doi.org/10.5283/epub.36264.","ama":"Schillinger R, Schryen G. Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC. University of Regensburg; 2018. doi:10.5283/epub.36264","apa":"Schillinger, R., & Schryen, G. (2018). Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC. University of Regensburg. https://doi.org/10.5283/epub.36264","bibtex":"@book{Schillinger_Schryen_2018, title={Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC}, DOI={10.5283/epub.36264}, publisher={University of Regensburg}, author={Schillinger, Rolf and Schryen, Guido}, year={2018} }","mla":"Schillinger, Rolf, and Guido Schryen. Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC. University of Regensburg, 2018, doi:10.5283/epub.36264."},"year":"2018","_id":"6164","has_accepted_license":"1","status":"public","date_created":"2018-12-11T13:39:45Z","author":[{"last_name":"Schillinger","full_name":"Schillinger, Rolf","first_name":"Rolf"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"}],"publisher":"University of Regensburg","file_date_updated":"2018-12-13T15:21:02Z","file":[{"access_level":"open_access","date_created":"2018-12-11T13:42:43Z","file_name":"PUBLISHED BOOK - Security in Highly Connected IT Systems.pdf","relation":"main_file","date_updated":"2018-12-13T15:21:02Z","content_type":"application/pdf","file_id":"6165","creator":"hsiemes","file_size":1913774}],"ddc":["000"],"user_id":"61579","extern":"1","language":[{"iso":"eng"}],"doi":"10.5283/epub.36264","oa":"1","date_updated":"2022-01-06T07:02:54Z","publication_identifier":{"isbn":["978-3-88246-374-3"]},"department":[{"_id":"277"}],"title":"Security in Highly Connected IT Systems – Results of the Bavarian Research Alliance FORSEC"},{"publication_identifier":{"isbn":["9780998133119"]},"publication_status":"published","title":"Business Intelligence & Analytics Cost Accounting: A Survey on the Perceptions of Stakeholders","place":"Koloa, HI, USA","language":[{"iso":"eng"}],"doi":"10.24251/hicss.2018.095","oa":"1","date_updated":"2022-01-06T07:01:21Z","date_created":"2018-10-18T18:18:44Z","status":"public","publication":"Proceedings of the 51st Hawaii International Conference on System Sciences","publisher":"Hawaii International Conference on System Sciences","author":[{"id":"4481","last_name":"Grytz","full_name":"Grytz, Raphael","first_name":"Raphael"},{"last_name":"Krohn-Grimberghe","first_name":"Artus","full_name":"Krohn-Grimberghe, Artus"}],"user_id":"4481","abstract":[{"lang":"eng","text":"As data driven decision-making using business intelligence and analytics (BI&A) becomes standard in companies, the importance of mitigating the accompanying growth in costs increases. Research shows that increasing transparency to the granularity of individual BI&A artefacts such as reports or analytic applications is a necessary means, but in practice the introduction of said systems is cumbersome and adoption is slow. We address the status quo of BI&A cost accounting for three types of stakeholders: users, developers and managers. The results show in which areas of application a strong need for action exists and we identify major challenges for further research are ahead. Our findings indicate for example that managers at the same time regard cost accounting for BI&A with a higher potential benefit while they also believe they have already established a higher degree of implementation in their enterprises compared to the other stakeholder types. We conclude that BI&A professionals have to consider these different perceptions to run a successful department and gain traction for BI&A cost accounting."}],"type":"conference","year":"2018","citation":{"short":"R. Grytz, A. Krohn-Grimberghe, in: Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii International Conference on System Sciences, Koloa, HI, USA, 2018.","ieee":"R. Grytz and A. Krohn-Grimberghe, “Business Intelligence & Analytics Cost Accounting: A Survey on the Perceptions of Stakeholders,” in Proceedings of the 51st Hawaii International Conference on System Sciences, 2018.","apa":"Grytz, R., & Krohn-Grimberghe, A. (2018). Business Intelligence & Analytics Cost Accounting: A Survey on the Perceptions of Stakeholders. In Proceedings of the 51st Hawaii International Conference on System Sciences. Koloa, HI, USA: Hawaii International Conference on System Sciences. https://doi.org/10.24251/hicss.2018.095","ama":"Grytz R, Krohn-Grimberghe A. Business Intelligence & Analytics Cost Accounting: A Survey on the Perceptions of Stakeholders. In: Proceedings of the 51st Hawaii International Conference on System Sciences. Koloa, HI, USA: Hawaii International Conference on System Sciences; 2018. doi:10.24251/hicss.2018.095","chicago":"Grytz, Raphael, and Artus Krohn-Grimberghe. “Business Intelligence & Analytics Cost Accounting: A Survey on the Perceptions of Stakeholders.” In Proceedings of the 51st Hawaii International Conference on System Sciences. Koloa, HI, USA: Hawaii International Conference on System Sciences, 2018. https://doi.org/10.24251/hicss.2018.095.","bibtex":"@inproceedings{Grytz_Krohn-Grimberghe_2018, place={Koloa, HI, USA}, title={Business Intelligence & Analytics Cost Accounting: A Survey on the Perceptions of Stakeholders}, DOI={10.24251/hicss.2018.095}, booktitle={Proceedings of the 51st Hawaii International Conference on System Sciences}, publisher={Hawaii International Conference on System Sciences}, author={Grytz, Raphael and Krohn-Grimberghe, Artus}, year={2018} }","mla":"Grytz, Raphael, and Artus Krohn-Grimberghe. “Business Intelligence & Analytics Cost Accounting: A Survey on the Perceptions of Stakeholders.” Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii International Conference on System Sciences, 2018, doi:10.24251/hicss.2018.095."},"main_file_link":[{"url":"https://scholarspace.manoa.hawaii.edu/bitstream/10125/49982/1/paper0095.pdf","open_access":"1"}],"_id":"4778"},{"language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T07:01:33Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"7","name":"SFB 901 - Subproject A3"}],"department":[{"_id":"280"},{"_id":"475"}],"title":" Determinants of Equilibrium Selection in Network Formation - An Experiment","year":"2018","citation":{"apa":"Hoyer, B., & Rosenkranz, S. (2018). Determinants of Equilibrium Selection in Network Formation - An Experiment. Games, 9(4).","ama":"Hoyer B, Rosenkranz S. Determinants of Equilibrium Selection in Network Formation - An Experiment. Games. 2018;9(4).","chicago":"Hoyer, Britta, and Stephanie Rosenkranz. “ Determinants of Equilibrium Selection in Network Formation - An Experiment.” Games 9, no. 4 (2018).","mla":"Hoyer, Britta, and Stephanie Rosenkranz. “ Determinants of Equilibrium Selection in Network Formation - An Experiment.” Games, vol. 9, no. 4, 89, MDPI, 2018.","bibtex":"@article{Hoyer_Rosenkranz_2018, title={ Determinants of Equilibrium Selection in Network Formation - An Experiment}, volume={9}, number={489}, journal={Games}, publisher={MDPI}, author={Hoyer, Britta and Rosenkranz, Stephanie}, year={2018} }","short":"B. Hoyer, S. Rosenkranz, Games 9 (2018).","ieee":"B. Hoyer and S. Rosenkranz, “ Determinants of Equilibrium Selection in Network Formation - An Experiment,” Games, vol. 9, no. 4, 2018."},"type":"journal_article","main_file_link":[{"open_access":"1","url":"http://www.mdpi.com/2073-4336/9/4/89/"}],"article_number":"89","issue":"4","intvolume":" 9","_id":"4982","volume":9,"date_created":"2018-10-29T10:27:40Z","status":"public","has_accepted_license":"1","publication":"Games","file_date_updated":"2018-11-02T15:15:21Z","publisher":"MDPI","author":[{"full_name":"Hoyer, Britta","first_name":"Britta","id":"42447","last_name":"Hoyer"},{"full_name":"Rosenkranz, Stephanie","first_name":"Stephanie","last_name":"Rosenkranz"}],"file":[{"date_created":"2018-11-02T15:15:21Z","file_name":"games-09-00089.pdf","access_level":"closed","creator":"ups","file_id":"5296","file_size":492018,"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-11-02T15:15:21Z"}],"ddc":["000"],"user_id":"42447"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:04:00Z","doi":"10.3390/mca23020030","oa":"1","department":[{"_id":"101"}],"publication_status":"published","publication_identifier":{"issn":["2297-8747"]},"title":"A Survey of Recent Trends in Multiobjective Optimal Control—Surrogate Models, Feedback Control and Objective Reduction","main_file_link":[{"url":"https://www.mdpi.com/2297-8747/23/2/30/pdf","open_access":"1"}],"type":"journal_article","year":"2018","citation":{"short":"S. Peitz, M. Dellnitz, Mathematical and Computational Applications 23 (2018).","ieee":"S. Peitz and M. Dellnitz, “A Survey of Recent Trends in Multiobjective Optimal Control—Surrogate Models, Feedback Control and Objective Reduction,” Mathematical and Computational Applications, vol. 23, no. 2, 2018.","ama":"Peitz S, Dellnitz M. A Survey of Recent Trends in Multiobjective Optimal Control—Surrogate Models, Feedback Control and Objective Reduction. Mathematical and Computational Applications. 2018;23(2). doi:10.3390/mca23020030","apa":"Peitz, S., & Dellnitz, M. (2018). A Survey of Recent Trends in Multiobjective Optimal Control—Surrogate Models, Feedback Control and Objective Reduction. Mathematical and Computational Applications, 23(2). https://doi.org/10.3390/mca23020030","chicago":"Peitz, Sebastian, and Michael Dellnitz. “A Survey of Recent Trends in Multiobjective Optimal Control—Surrogate Models, Feedback Control and Objective Reduction.” Mathematical and Computational Applications 23, no. 2 (2018). https://doi.org/10.3390/mca23020030.","bibtex":"@article{Peitz_Dellnitz_2018, title={A Survey of Recent Trends in Multiobjective Optimal Control—Surrogate Models, Feedback Control and Objective Reduction}, volume={23}, DOI={10.3390/mca23020030}, number={2}, journal={Mathematical and Computational Applications}, author={Peitz, Sebastian and Dellnitz, Michael}, year={2018} }","mla":"Peitz, Sebastian, and Michael Dellnitz. “A Survey of Recent Trends in Multiobjective Optimal Control—Surrogate Models, Feedback Control and Objective Reduction.” Mathematical and Computational Applications, vol. 23, no. 2, 2018, doi:10.3390/mca23020030."},"_id":"8751","intvolume":" 23","issue":"2","publication":"Mathematical and Computational Applications","author":[{"full_name":"Peitz, Sebastian","orcid":"https://orcid.org/0000-0002-3389-793X","first_name":"Sebastian","id":"47427","last_name":"Peitz"},{"last_name":"Dellnitz","first_name":"Michael","full_name":"Dellnitz, Michael"}],"volume":23,"date_created":"2019-03-29T13:27:51Z","status":"public","abstract":[{"text":"Multiobjective optimization plays an increasingly important role in modern applications, where several criteria are often of equal importance. The task in multiobjective optimization and multiobjective optimal control is therefore to compute the set of optimal compromises (the Pareto set) between the conflicting objectives. The advances in algorithms and the increasing interest in Pareto-optimal solutions have led to a wide range of new applications related to optimal and feedback control, which results in new challenges such as expensive models or real-time applicability. Since the Pareto set generally consists of an infinite number of solutions, the computational effort can quickly become challenging, which is particularly problematic when the objectives are costly to evaluate or when a solution has to be presented very quickly. This article gives an overview of recent developments in accelerating multiobjective optimal control for complex problems where either PDE constraints are present or where a feedback behavior has to be achieved. In the first case, surrogate models yield significant speed-ups. Besides classical meta-modeling techniques for multiobjective optimization, a promising alternative for control problems is to introduce a surrogate model for the system dynamics. In the case of real-time requirements, various promising model predictive control approaches have been proposed, using either fast online solvers or offline-online decomposition. We also briefly comment on dimension reduction in many-objective optimization problems as another technique for reducing the numerical effort.","lang":"eng"}],"article_type":"review","user_id":"47427"},{"year":"2018","type":"journal_article","citation":{"short":"V. Myroshnychenko, N. Nishio, F.J. García de Abajo, J. Förstner, N. Yamamoto, ACS Nano 12 (2018) 8436–8446.","ieee":"V. Myroshnychenko, N. Nishio, F. J. García de Abajo, J. Förstner, and N. Yamamoto, “Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution,” ACS Nano, vol. 12, no. 8, pp. 8436–8446, 2018.","apa":"Myroshnychenko, V., Nishio, N., García de Abajo, F. J., Förstner, J., & Yamamoto, N. (2018). Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution. ACS Nano, 12(8), 8436–8446. https://doi.org/10.1021/acsnano.8b03926","ama":"Myroshnychenko V, Nishio N, García de Abajo FJ, Förstner J, Yamamoto N. Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution. ACS Nano. 2018;12(8):8436-8446. doi:10.1021/acsnano.8b03926","chicago":"Myroshnychenko, Viktor, Natsuki Nishio, F. Javier García de Abajo, Jens Förstner, and Naoki Yamamoto. “Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution.” ACS Nano 12, no. 8 (2018): 8436–46. https://doi.org/10.1021/acsnano.8b03926.","bibtex":"@article{Myroshnychenko_Nishio_García de Abajo_Förstner_Yamamoto_2018, title={Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution}, volume={12}, DOI={10.1021/acsnano.8b03926}, number={8}, journal={ACS Nano}, publisher={American Chemical Society (ACS)}, author={Myroshnychenko, Viktor and Nishio, Natsuki and García de Abajo, F. Javier and Förstner, Jens and Yamamoto, Naoki}, year={2018}, pages={8436–8446} }","mla":"Myroshnychenko, Viktor, et al. “Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution.” ACS Nano, vol. 12, no. 8, American Chemical Society (ACS), 2018, pp. 8436–46, doi:10.1021/acsnano.8b03926."},"page":"8436-8446","issue":"8","_id":"4165","intvolume":" 12","urn":"41659","volume":12,"status":"public","has_accepted_license":"1","date_created":"2018-08-28T07:44:24Z","author":[{"first_name":"Viktor","full_name":"Myroshnychenko, Viktor","last_name":"Myroshnychenko","id":"46371"},{"last_name":"Nishio","first_name":"Natsuki","full_name":"Nishio, Natsuki"},{"first_name":"F. Javier","full_name":"García de Abajo, F. Javier","last_name":"García de Abajo"},{"id":"158","last_name":"Förstner","full_name":"Förstner, Jens","orcid":"0000-0001-7059-9862","first_name":"Jens"},{"full_name":"Yamamoto, Naoki","first_name":"Naoki","last_name":"Yamamoto"}],"publisher":"American Chemical Society (ACS)","keyword":["tet_topic_plasmonics"],"file_date_updated":"2018-09-03T13:54:21Z","publication":"ACS Nano","file":[{"file_id":"4166","creator":"hclaudia","file_size":4463352,"relation":"main_file","date_updated":"2018-09-03T13:54:21Z","content_type":"application/pdf","date_created":"2018-08-28T07:45:47Z","file_name":"2018 Myroshnychenko,Nishio,Garcia de Abajo,Förstner,Yamamoto_Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution.pdf","access_level":"open_access"}],"ddc":["530"],"user_id":"158","article_type":"original","abstract":[{"lang":"eng","text":"Metal nanoparticles host localized plasmon excitations that allow the manipulation of optical fields at the nanoscale. Despite the availability of several techniques for imaging plasmons, direct access into the symmetries of these excitations remains elusive, thus hindering progress in the development of applications. Here, we present a combination of angle-, polarization-, and space-resolved cathodoluminescence spectroscopy methods to selectively access the symmetry and degeneracy of plasmonic states in lithographically fabricated gold nanoprisms. We experimentally reveal and spatially map degenerate states of multipole plasmon modes with nanometer spatial resolution and further provide recipes for resolving optically dark and out-of-plane modes. Full-wave simulations in conjunction with a simple tight-binding model explain the complex plasmon structure in these particles and reveal intriguing mode-symmetry phenomena. Our approach introduces systematics for a comprehensive symmetry characterization of plasmonic states in high-symmetry nanostructures."}],"language":[{"iso":"eng"}],"doi":"10.1021/acsnano.8b03926","oa":"1","date_updated":"2022-01-06T07:00:27Z","publication_identifier":{"issn":["1936-0851","1936-086X"]},"publication_status":"published","project":[{"name":"TRR 142","_id":"53"},{"name":"TRR 142 - Project Area C","_id":"56"},{"_id":"75","name":"TRR 142 - Subproject C5"}],"department":[{"_id":"61"},{"_id":"230"}],"title":"Unveiling and Imaging Degenerate States in Plasmonic Nanoparticles with Nanometer Resolution"},{"oa":"1","doi":"10.1364/ol.43.003562","date_updated":"2022-01-06T07:00:55Z","language":[{"iso":"eng"}],"title":"Intensity surge and negative polarization of light from compact irregular particles","publication_identifier":{"issn":["0146-9592","1539-4794"]},"publication_status":"published","department":[{"_id":"61"}],"issue":"15","_id":"4324","intvolume":" 43","page":"3562","year":"2018","citation":{"mla":"Grynko, Yevgen, et al. “Intensity Surge and Negative Polarization of Light from Compact Irregular Particles.” Optics Letters, vol. 43, no. 15, The Optical Society, 2018, p. 3562, doi:10.1364/ol.43.003562.","bibtex":"@article{Grynko_Shkuratov_Förstner_2018, title={Intensity surge and negative polarization of light from compact irregular particles}, volume={43}, DOI={10.1364/ol.43.003562}, number={15}, journal={Optics Letters}, publisher={The Optical Society}, author={Grynko, Yevgen and Shkuratov, Yuriy and Förstner, Jens}, year={2018}, pages={3562} }","chicago":"Grynko, Yevgen, Yuriy Shkuratov, and Jens Förstner. “Intensity Surge and Negative Polarization of Light from Compact Irregular Particles.” Optics Letters 43, no. 15 (2018): 3562. https://doi.org/10.1364/ol.43.003562.","apa":"Grynko, Y., Shkuratov, Y., & Förstner, J. (2018). Intensity surge and negative polarization of light from compact irregular particles. Optics Letters, 43(15), 3562. https://doi.org/10.1364/ol.43.003562","ama":"Grynko Y, Shkuratov Y, Förstner J. Intensity surge and negative polarization of light from compact irregular particles. Optics Letters. 2018;43(15):3562. doi:10.1364/ol.43.003562","ieee":"Y. Grynko, Y. Shkuratov, and J. Förstner, “Intensity surge and negative polarization of light from compact irregular particles,” Optics Letters, vol. 43, no. 15, p. 3562, 2018.","short":"Y. Grynko, Y. Shkuratov, J. Förstner, Optics Letters 43 (2018) 3562."},"type":"journal_article","user_id":"158","ddc":["530"],"abstract":[{"lang":"eng","text":"We study the dependence of the intensity and linear polarization of light scattered by isolated particles with the compact\r\nirregular shape on their size using the discontinuous Galerkin time domain numerical method. The size parameter of particles varies in the range of X = 10 to 150, and the complex refractive index is m = 1.5 + 0i. Our results show\r\nthat the backscattering negative polarization branch weakens monotonously, but does not disappear at large sizes, up to the geometrical optics regime, and can be simulated without accounting for wave effects. The intensity backscattering surge becomes narrower with increasing particle size. For X = 150, the surge width is several degrees."}],"article_type":"original","date_created":"2018-08-30T10:17:08Z","status":"public","has_accepted_license":"1","volume":43,"file":[{"relation":"main_file","date_updated":"2021-07-27T21:04:54Z","content_type":"application/pdf","file_id":"4325","creator":"hclaudia","file_size":1797893,"access_level":"open_access","file_name":"2018-07 Grynko,Shkuratov,Förstner_Intensity surge and negative polarization of light from compact irregular particles.pdf","date_created":"2018-08-30T10:18:10Z"}],"publication":"Optics Letters","keyword":["tet_topic_scattering"],"file_date_updated":"2021-07-27T21:04:54Z","publisher":"The Optical Society","author":[{"full_name":"Grynko, Yevgen","first_name":"Yevgen","id":"26059","last_name":"Grynko"},{"last_name":"Shkuratov","full_name":"Shkuratov, Yuriy","first_name":"Yuriy"},{"last_name":"Förstner","id":"158","first_name":"Jens","orcid":"0000-0001-7059-9862","full_name":"Förstner, Jens"}]},{"ddc":["000"],"user_id":"58701","abstract":[{"text":"Physician Review Websites allow users to evaluate their experiences with health services. As these evaluations are regularly contextualized with facts from users’ private lives, they often accidentally disclose personal information on the Web. This poses a serious threat to users’ privacy. In this paper, we report on early work in progress on “Text Broom”, a tool to detect privacy breaches in user-generated texts. For this purpose, we conceptualize a pipeline which combines methods of Natural Language Processing such as Named Entity Recognition, linguistic patterns and domain-specific Machine Learning approaches which have the potential to recognize privacy violations with wide coverage. A prototypical web application is openly accesible.","lang":"eng"}],"volume":2198,"has_accepted_license":"1","status":"public","date_created":"2018-09-03T12:04:24Z","publisher":"CEUR-WS.org","author":[{"full_name":"Bäumer, Frederik Simon","first_name":"Frederik Simon","id":"38837","last_name":"Bäumer"},{"first_name":"Joschka","full_name":"Kersting, Joschka","last_name":"Kersting","id":"58701"},{"id":"72334","last_name":"Orlikowski","full_name":"Orlikowski, Matthias","first_name":"Matthias"},{"orcid":"0000-0002-8180-5606","full_name":"Geierhos, Michaela","first_name":"Michaela","id":"42496","last_name":"Geierhos"}],"keyword":["Detection of Privacy Violations","Physician Reviews"],"file_date_updated":"2020-09-18T09:34:30Z","publication":"Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems co-located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018)","file":[{"access_level":"closed","date_created":"2020-09-18T09:34:30Z","file_name":"Bäumer et al. (2018), Baeumer2018c.pdf","relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2020-09-18T09:34:30Z","creator":"jkers","file_id":"19579","file_size":434664}],"article_number":"97","intvolume":" 2198","_id":"4349","conference":{"start_date":"2018-09-10","name":"14th International Conference on Semantic Systems (SEMANTiCS 2018)","location":"Vienna, Austria","end_date":"2018-09-13"},"year":"2018","citation":{"short":"F.S. Bäumer, J. Kersting, M. Orlikowski, M. Geierhos, in: A. Khalili, M. Koutraki (Eds.), Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems Co-Located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018), CEUR-WS.org, 2018.","ieee":"F. S. Bäumer, J. Kersting, M. Orlikowski, and M. Geierhos, “Towards a Multi-Stage Approach to Detect Privacy Breaches in Physician Reviews,” in Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems co-located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018), Vienna, Austria, 2018, vol. 2198.","ama":"Bäumer FS, Kersting J, Orlikowski M, Geierhos M. Towards a Multi-Stage Approach to Detect Privacy Breaches in Physician Reviews. In: Khalili A, Koutraki M, eds. Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems Co-Located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018). Vol 2198. CEUR Workshop Proceedings. CEUR-WS.org; 2018.","apa":"Bäumer, F. S., Kersting, J., Orlikowski, M., & Geierhos, M. (2018). Towards a Multi-Stage Approach to Detect Privacy Breaches in Physician Reviews. In A. Khalili & M. Koutraki (Eds.), Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems co-located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018) (Vol. 2198). Vienna, Austria: CEUR-WS.org.","chicago":"Bäumer, Frederik Simon, Joschka Kersting, Matthias Orlikowski, and Michaela Geierhos. “Towards a Multi-Stage Approach to Detect Privacy Breaches in Physician Reviews.” In Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems Co-Located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018), edited by Ali Khalili and Maria Koutraki, Vol. 2198. CEUR Workshop Proceedings. CEUR-WS.org, 2018.","bibtex":"@inproceedings{Bäumer_Kersting_Orlikowski_Geierhos_2018, series={CEUR Workshop Proceedings}, title={Towards a Multi-Stage Approach to Detect Privacy Breaches in Physician Reviews}, volume={2198}, number={97}, booktitle={Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems co-located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018)}, publisher={CEUR-WS.org}, author={Bäumer, Frederik Simon and Kersting, Joschka and Orlikowski, Matthias and Geierhos, Michaela}, editor={Khalili, Ali and Koutraki, MariaEditors}, year={2018}, collection={CEUR Workshop Proceedings} }","mla":"Bäumer, Frederik Simon, et al. “Towards a Multi-Stage Approach to Detect Privacy Breaches in Physician Reviews.” Proceedings of the Posters and Demos Track of the 14th International Conference on Semantic Systems Co-Located with the 14th International Conference on Semantic Systems (SEMANTiCS 2018), edited by Ali Khalili and Maria Koutraki, vol. 2198, 97, CEUR-WS.org, 2018."},"type":"conference","main_file_link":[{"open_access":"1","url":"http://ceur-ws.org/Vol-2198/paper_97.pdf"}],"title":"Towards a Multi-Stage Approach to Detect Privacy Breaches in Physician Reviews","editor":[{"last_name":"Khalili","first_name":"Ali","full_name":"Khalili, Ali"},{"last_name":"Koutraki","full_name":"Koutraki, Maria","first_name":"Maria"}],"publication_status":"published","publication_identifier":{"issn":["1613-0073"]},"department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"oa":"1","date_updated":"2022-01-06T07:00:57Z","language":[{"iso":"eng"}],"series_title":"CEUR Workshop Proceedings"},{"conference":{"end_date":"2018-01-06","location":"Big Island, Waikoloa Village","start_date":"2018-01-03","name":"51st Hawaii International Conference on System Sciences (HICSS 2018)"},"_id":"44","page":"5746-5755","type":"conference","year":"2018","citation":{"chicago":"Bäumer, Frederik Simon, and Michaela Geierhos. “Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-Based Configuration of Text Analysis Pipelines.” In Proceedings of the 51st Hawaii International Conference on System Sciences, 5746–55, 2018. https://doi.org/10125/50609.","ama":"Bäumer FS, Geierhos M. Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines. In: Proceedings of the 51st Hawaii International Conference on System Sciences. ; 2018:5746-5755. doi:10125/50609","apa":"Bäumer, F. S., & Geierhos, M. (2018). Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines. In Proceedings of the 51st Hawaii International Conference on System Sciences (pp. 5746–5755). Big Island, Waikoloa Village. https://doi.org/10125/50609","mla":"Bäumer, Frederik Simon, and Michaela Geierhos. “Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-Based Configuration of Text Analysis Pipelines.” Proceedings of the 51st Hawaii International Conference on System Sciences, 2018, pp. 5746–55, doi:10125/50609.","bibtex":"@inproceedings{Bäumer_Geierhos_2018, title={Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines}, DOI={10125/50609}, booktitle={Proceedings of the 51st Hawaii International Conference on System Sciences}, author={Bäumer, Frederik Simon and Geierhos, Michaela}, year={2018}, pages={5746–5755} }","short":"F.S. Bäumer, M. Geierhos, in: Proceedings of the 51st Hawaii International Conference on System Sciences, 2018, pp. 5746–5755.","ieee":"F. S. Bäumer and M. Geierhos, “Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines,” in Proceedings of the 51st Hawaii International Conference on System Sciences, Big Island, Waikoloa Village, 2018, pp. 5746–5755."},"main_file_link":[{"url":"https://scholarspace.manoa.hawaii.edu/bitstream/10125/50609/1/paper0722.pdf","open_access":"1"}],"user_id":"477","ddc":["000"],"abstract":[{"lang":"eng","text":"Natural language software requirements descriptions enable end users to formulate their wishes and expectations for a future software product without much prior knowledge in requirements engineering. However, these descriptions are susceptible to linguistic inaccuracies such as ambiguities and incompleteness that can harm the development process. There is a number of software solutions that can detect deficits in requirements descriptions and partially solve them, but they are often hard to use and not suitable for end users. For this reason, we develop a software system that helps end-users to create unambiguous and complete requirements descriptions by combining existing expert tools and controlling them using automatic compensation strategies. In order to recognize the necessity of individual compensation methods in the descriptions, we have developed linguistic indicators, which we present in this paper. Based on these indicators, the whole text analysis pipeline is ad-hoc configured and thus adapted to the individual circumstances of a requirements description."}],"date_created":"2017-10-17T12:40:59Z","status":"public","has_accepted_license":"1","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-11-02T14:32:35Z","file_id":"5274","creator":"ups","file_size":753693,"access_level":"closed","file_name":"paper0722.pdf","date_created":"2018-11-02T14:32:35Z"}],"file_date_updated":"2018-11-02T14:32:35Z","publication":"Proceedings of the 51st Hawaii International Conference on System Sciences","keyword":["Software Product Lines: Engineering","Services","and Management","Ambiguities","Incompleteness","Natural Language Processing","Software Requirements"],"author":[{"id":"38837","last_name":"Bäumer","full_name":"Bäumer, Frederik Simon","first_name":"Frederik Simon"},{"id":"42496","last_name":"Geierhos","full_name":"Geierhos, Michaela","orcid":"0000-0002-8180-5606","first_name":"Michaela"}],"quality_controlled":"1","oa":"1","doi":"10125/50609","date_updated":"2022-01-06T07:01:01Z","language":[{"iso":"eng"}],"title":"Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"9","name":"SFB 901 - Subproject B1"}],"publication_identifier":{"isbn":["978-0-9981331-1-9"]},"publication_status":"published","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}]},{"_id":"5007","date_updated":"2022-01-06T07:01:34Z","oa":"1","series_title":"WU International Taxation Research Paper Series","main_file_link":[{"url":"https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3114054_code1908122.pdf?abstractid=3114054&mirid=1","open_access":"1"}],"type":"working_paper","year":"2018","citation":{"short":"T. Bornemann, Tax Avoidance and Accounting Conservatism, 2018.","ieee":"T. Bornemann, Tax Avoidance and Accounting Conservatism, vol. No. 2018-04. 2018.","ama":"Bornemann T. Tax Avoidance and Accounting Conservatism. Vol No. 2018-04.; 2018.","apa":"Bornemann, T. (2018). Tax Avoidance and Accounting Conservatism (Vol. No. 2018-04).","chicago":"Bornemann, Tobias. Tax Avoidance and Accounting Conservatism. Vol. No. 2018-04. WU International Taxation Research Paper Series, 2018.","mla":"Bornemann, Tobias. Tax Avoidance and Accounting Conservatism. Vol. No. 2018-04, 2018.","bibtex":"@book{Bornemann_2018, series={WU International Taxation Research Paper Series}, title={Tax Avoidance and Accounting Conservatism}, volume={No. 2018-04}, author={Bornemann, Tobias}, year={2018}, collection={WU International Taxation Research Paper Series} }"},"language":[{"iso":"eng"}],"abstract":[{"text":"This study analyzes the relation between accounting conservatism, future tax rate cuts and countries’ level of book-tax conformity. Firms have an incentive to increase conservatism in financial reporting when a tax rate cut is imminent to shift taxable income into the lower taxed future. Using a panel of firms across 18 countries from 1995 to 2010 I find that conditional conservatism is positively and significantly associated with future tax rate cuts when book-tax conformity is high. This effect is particularly pronounced for firms that concentrate the majority of their operations in the country in which the tax rate is cut. In contrast, there is no significant relation between future tax rate cuts and unconditional conservatism.","lang":"eng"}],"title":"Tax Avoidance and Accounting Conservatism","user_id":"68607","author":[{"first_name":"Tobias","full_name":"Bornemann, Tobias","last_name":"Bornemann"}],"department":[{"_id":"187"}],"volume":"No. 2018-04","status":"public","date_created":"2018-10-30T12:14:40Z"},{"abstract":[{"text":"When analyzing the influence of taxation on agency conflicts between firm owners and managers, one can draw on theoretical principal–agent literature from various research fields. In recent years, this interdisciplinary research has grown significantly covering research with regards to optimal compensation, investment decisions, tax avoidance and transfer pricing while analyzing the effects of corporate income taxes, wage taxes, bonus taxes and shareholder taxes. Our paper provides a comprehensive review of analytical literature that studies the influence of taxation on agency conflicts between firm owners and managers. Above and beyond summarizing research findings, we discuss how taxes are commonly implemented in agency models, derive empirical predictions, and identify research gaps for future tax research.","lang":"eng"}],"title":"Taxation and Agency Conflicts between Firm Owners and Managers: A Review","user_id":"68607","author":[{"full_name":"Bauer, Thomas","first_name":"Thomas","last_name":"Bauer"},{"first_name":"Thomas","full_name":"Kourouxous, Thomas","last_name":"Kourouxous","id":"66936"},{"last_name":"Krenn","full_name":"Krenn, Peter","first_name":"Peter"}],"department":[{"_id":"187"},{"_id":"635"}],"publication":"Business Research","volume":11,"status":"public","date_created":"2018-10-30T12:18:42Z","intvolume":" 11","_id":"5009","date_updated":"2022-01-06T07:01:34Z","oa":"1","issue":"1","main_file_link":[{"open_access":"1","url":"https://link.springer.com/content/pdf/10.1007%2Fs40685-017-0054-y.pdf"}],"type":"journal_article","year":"2018","citation":{"bibtex":"@article{Bauer_Kourouxous_Krenn_2018, title={Taxation and Agency Conflicts between Firm Owners and Managers: A Review}, volume={11}, number={1}, journal={Business Research}, author={Bauer, Thomas and Kourouxous, Thomas and Krenn, Peter}, year={2018}, pages={33–76} }","mla":"Bauer, Thomas, et al. “Taxation and Agency Conflicts between Firm Owners and Managers: A Review.” Business Research, vol. 11, no. 1, 2018, pp. 33–76.","chicago":"Bauer, Thomas, Thomas Kourouxous, and Peter Krenn. “Taxation and Agency Conflicts between Firm Owners and Managers: A Review.” Business Research 11, no. 1 (2018): 33–76.","ama":"Bauer T, Kourouxous T, Krenn P. Taxation and Agency Conflicts between Firm Owners and Managers: A Review. Business Research. 2018;11(1):33-76.","apa":"Bauer, T., Kourouxous, T., & Krenn, P. (2018). Taxation and Agency Conflicts between Firm Owners and Managers: A Review. Business Research, 11(1), 33–76.","ieee":"T. Bauer, T. Kourouxous, and P. Krenn, “Taxation and Agency Conflicts between Firm Owners and Managers: A Review,” Business Research, vol. 11, no. 1, pp. 33–76, 2018.","short":"T. Bauer, T. Kourouxous, P. Krenn, Business Research 11 (2018) 33–76."},"page":"33-76","language":[{"iso":"eng"}]},{"citation":{"bibtex":"@article{Li_Dau_Kabst_2018, title={The more the merrier? Immigrant share and entrepreneurial activities. }, journal={Entrepreneurship Theory and Practice. }, author={Li, C and Dau, L A and Kabst, Rüdiger}, year={2018} }","mla":"Li, C., et al. “The More the Merrier? Immigrant Share and Entrepreneurial Activities. .” Entrepreneurship Theory and Practice. , 2018.","ama":"Li C, Dau LA, Kabst R. The more the merrier? Immigrant share and entrepreneurial activities. . Entrepreneurship Theory and Practice . 2018.","apa":"Li, C., Dau, L. A., & Kabst, R. (2018). The more the merrier? Immigrant share and entrepreneurial activities. . Entrepreneurship Theory and Practice. .","chicago":"Li, C, L A Dau, and Rüdiger Kabst. “The More the Merrier? Immigrant Share and Entrepreneurial Activities. .” Entrepreneurship Theory and Practice. , 2018.","ieee":"C. Li, L. A. Dau, and R. Kabst, “The more the merrier? Immigrant share and entrepreneurial activities. ,” Entrepreneurship Theory and Practice. , 2018.","short":"C. Li, L.A. Dau, R. Kabst, Entrepreneurship Theory and Practice. (2018)."},"year":"2018","type":"journal_article","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1"}],"oa":"1","date_updated":"2022-01-06T07:01:53Z","_id":"5434","date_created":"2018-11-08T12:08:35Z","status":"public","department":[{"_id":"274"}],"publication":"Entrepreneurship Theory and Practice. ","author":[{"last_name":"Li","full_name":"Li, C","first_name":"C"},{"first_name":"L A","full_name":"Dau, L A","last_name":"Dau"},{"first_name":"Rüdiger","full_name":"Kabst, Rüdiger","last_name":"Kabst","id":"42362"}],"title":"The more the merrier? Immigrant share and entrepreneurial activities. ","user_id":"46632"},{"user_id":"46632","title":"Embracing the foreign: Cultural attractiveness and international strategy.","date_created":"2018-11-08T12:32:22Z","status":"public","publication":"Strategic Management Journal.","department":[{"_id":"274"}],"author":[{"last_name":"Li","first_name":"C","full_name":"Li, C"},{"last_name":"Brodbeck","first_name":"F C","full_name":"Brodbeck, F C"},{"last_name":"Shenkar","first_name":"O","full_name":"Shenkar, O"},{"first_name":"L J","full_name":"Ponzi, L J","last_name":"Ponzi"},{"last_name":"Fischer","first_name":"J","full_name":"Fischer, J"}],"oa":"1","date_updated":"2022-01-06T07:01:53Z","_id":"5435","language":[{"iso":"eng"}],"year":"2018","type":"journal_article","citation":{"ieee":"C. Li, F. C. Brodbeck, O. Shenkar, L. J. Ponzi, and J. Fischer, “Embracing the foreign: Cultural attractiveness and international strategy.,” Strategic Management Journal., 2018.","short":"C. Li, F.C. Brodbeck, O. Shenkar, L.J. Ponzi, J. Fischer, Strategic Management Journal. (2018).","bibtex":"@article{Li_Brodbeck_Shenkar_Ponzi_Fischer_2018, title={Embracing the foreign: Cultural attractiveness and international strategy.}, journal={Strategic Management Journal.}, author={Li, C and Brodbeck, F C and Shenkar, O and Ponzi, L J and Fischer, J}, year={2018} }","mla":"Li, C., et al. “Embracing the Foreign: Cultural Attractiveness and International Strategy.” Strategic Management Journal., 2018.","apa":"Li, C., Brodbeck, F. C., Shenkar, O., Ponzi, L. J., & Fischer, J. (2018). Embracing the foreign: Cultural attractiveness and international strategy. Strategic Management Journal.","ama":"Li C, Brodbeck FC, Shenkar O, Ponzi LJ, Fischer J. Embracing the foreign: Cultural attractiveness and international strategy. Strategic Management Journal. 2018.","chicago":"Li, C, F C Brodbeck, O Shenkar, L J Ponzi, and J Fischer. “Embracing the Foreign: Cultural Attractiveness and International Strategy.” Strategic Management Journal., 2018."},"main_file_link":[{"open_access":"1"}]},{"department":[{"_id":"277"}],"title":"Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning","language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T07:02:03Z","date_created":"2018-11-14T11:24:37Z","has_accepted_license":"1","status":"public","volume":77,"file":[{"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:06:10Z","creator":"hsiemes","file_id":"6022","file_size":809490,"access_level":"open_access","date_created":"2018-12-07T11:26:53Z","file_name":"JOURNAL VERSION.pdf"}],"file_date_updated":"2018-12-13T15:06:10Z","publication":"Computers & Security","keyword":["Information Security Investments","Multiple Case Study","Organizations","Single Loop Learning","Double Loop Learning"],"author":[{"last_name":"Weishäupl","first_name":"Eva","full_name":"Weishäupl, Eva"},{"last_name":"Yasasin","full_name":"Yasasin, Emrah","first_name":"Emrah"},{"first_name":"Guido","full_name":"Schryen, Guido","last_name":"Schryen","id":"72850"}],"publisher":"Elsevier","user_id":"61579","ddc":["000"],"abstract":[{"lang":"eng","text":"The need to protect resources against attackers is reflected by huge information security investments of firms worldwide. In the presence of budget constraints and a diverse set of assets to protect, organizations have to decide in which IT security measures to invest, how to evaluate those investment decisions, and how to learn from past decisions to optimize future security investment actions. While the academic literature has provided valuable insights into these issues, there is a lack of empirical contributions. To address this lack, we conduct a theory-based exploratory multiple case study. Our case study reveals that (1) firms? investments in information security are largely driven by external environmental and industry-related factors, (2) firms do not implement standardized decision processes, (3) the security process is perceived to impact the business process in a disturbing way, (4) both the implementation of evaluation processes and the application of metrics are hardly existent and (5) learning activities mainly occur at an ad-hoc basis."}],"extern":"1","page":"807 - 823","year":"2018","citation":{"bibtex":"@article{Weishäupl_Yasasin_Schryen_2018, title={Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning}, volume={77}, journal={Computers & Security}, publisher={Elsevier}, author={Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, year={2018}, pages={807–823} }","mla":"Weishäupl, Eva, et al. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” Computers & Security, vol. 77, Elsevier, 2018, pp. 807–23.","chicago":"Weishäupl, Eva, Emrah Yasasin, and Guido Schryen. “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning.” Computers & Security 77 (2018): 807–23.","ama":"Weishäupl E, Yasasin E, Schryen G. Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. Computers & Security. 2018;77:807-823.","apa":"Weishäupl, E., Yasasin, E., & Schryen, G. (2018). Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning. Computers & Security, 77, 807–823.","ieee":"E. Weishäupl, E. Yasasin, and G. Schryen, “Information Security Investments: An Exploratory Multiple Case Study on Decision-Making, Evaluation and Learning,” Computers & Security, vol. 77, pp. 807–823, 2018.","short":"E. Weishäupl, E. Yasasin, G. Schryen, Computers & Security 77 (2018) 807–823."},"type":"journal_article","_id":"5586","intvolume":" 77"},{"language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T07:02:07Z","department":[{"_id":"277"}],"title":"Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study","place":"San Francisco, CA, USA","citation":{"short":"R. Schuster, G. Wagner, G. Schryen, in: Proceedings of the 2018 International Conference on Information Systems (ICIS 2018), San Francisco, CA, USA, 2018.","ieee":"R. Schuster, G. Wagner, and G. Schryen, “Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study,” in Proceedings of the 2018 International Conference on Information Systems (ICIS 2018), San Francisco, CA, USA, 2018.","chicago":"Schuster, Richard, Gerit Wagner, and Guido Schryen. “Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study.” In Proceedings of the 2018 International Conference on Information Systems (ICIS 2018). San Francisco, CA, USA, 2018.","ama":"Schuster R, Wagner G, Schryen G. Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study. In: Proceedings of the 2018 International Conference on Information Systems (ICIS 2018). San Francisco, CA, USA; 2018.","apa":"Schuster, R., Wagner, G., & Schryen, G. (2018). Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study. In Proceedings of the 2018 International Conference on Information Systems (ICIS 2018). San Francisco, CA, USA.","bibtex":"@inproceedings{Schuster_Wagner_Schryen_2018, place={San Francisco, CA, USA}, title={Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study}, booktitle={Proceedings of the 2018 International Conference on Information Systems (ICIS 2018)}, author={Schuster, Richard and Wagner, Gerit and Schryen, Guido}, year={2018} }","mla":"Schuster, Richard, et al. “Information Systems Design Science Research and Cumulative Knowledge Development: An Exploratory Study.” Proceedings of the 2018 International Conference on Information Systems (ICIS 2018), 2018."},"year":"2018","type":"conference","conference":{"location":"San Francisco, CA, USA","name":"Thirty Ninth International Conference on Information Systems"},"_id":"5600","date_created":"2018-11-14T11:51:38Z","has_accepted_license":"1","status":"public","file":[{"file_name":"paper345.pdf","date_created":"2018-12-07T11:28:03Z","access_level":"open_access","creator":"hsiemes","file_id":"6023","file_size":1080982,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-12-13T15:06:21Z"}],"publication":"Proceedings of the 2018 International Conference on Information Systems (ICIS 2018)","file_date_updated":"2018-12-13T15:06:21Z","author":[{"full_name":"Schuster, Richard","first_name":"Richard","last_name":"Schuster"},{"last_name":"Wagner","first_name":"Gerit","full_name":"Wagner, Gerit"},{"last_name":"Schryen","id":"72850","first_name":"Guido","full_name":"Schryen, Guido"}],"user_id":"61579","ddc":["000"],"extern":"1"},{"language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T07:03:07Z","project":[{"grant_number":"761493","name":"5G Development and validation platform for global industry-specific network services and Apps","_id":"28"},{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"department":[{"_id":"75"}],"title":"A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains","place":"Verona","year":"2018","type":"conference","citation":{"mla":"Peuster, Manuel, et al. “A Prototyping Platform to Validate and Verify Network Service Header-Based Service Chains.” IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp, IEEE, 2018.","bibtex":"@inproceedings{Peuster_Schneider_Christ_Karl_2018, place={Verona}, title={A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains}, booktitle={IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp}, publisher={IEEE}, author={Peuster, Manuel and Schneider, Stefan Balthasar and Christ, Frederic and Karl, Holger}, year={2018} }","chicago":"Peuster, Manuel, Stefan Balthasar Schneider, Frederic Christ, and Holger Karl. “A Prototyping Platform to Validate and Verify Network Service Header-Based Service Chains.” In IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp. Verona: IEEE, 2018.","ama":"Peuster M, Schneider SB, Christ F, Karl H. A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains. In: IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp. Verona: IEEE; 2018.","apa":"Peuster, M., Schneider, S. B., Christ, F., & Karl, H. (2018). A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains. In IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp. Verona: IEEE.","ieee":"M. Peuster, S. B. Schneider, F. Christ, and H. Karl, “A Prototyping Platform to Validate and Verify Network Service Header-based Service Chains,” in IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp, Verona, 2018.","short":"M. Peuster, S.B. Schneider, F. Christ, H. Karl, in: IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp, IEEE, Verona, 2018."},"_id":"6483","conference":{"location":"Verona","name":"IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp","start_date":"2018-11-27","end_date":"2018-11-29"},"has_accepted_license":"1","status":"public","date_created":"2019-01-04T07:47:19Z","publisher":"IEEE","author":[{"full_name":"Peuster, Manuel","first_name":"Manuel","id":"13271","last_name":"Peuster"},{"last_name":"Schneider","id":"35343","first_name":"Stefan Balthasar","full_name":"Schneider, Stefan Balthasar","orcid":"0000-0001-8210-4011"},{"first_name":"Frederic","full_name":"Christ, Frederic","last_name":"Christ"},{"last_name":"Karl","id":"126","first_name":"Holger","full_name":"Karl, Holger"}],"file_date_updated":"2019-01-04T07:46:21Z","publication":"IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp","file":[{"access_level":"open_access","file_name":"main_for_ris.pdf","date_created":"2019-01-04T07:46:21Z","relation":"main_file","content_type":"application/pdf","date_updated":"2019-01-04T07:46:21Z","file_id":"6484","creator":"peuster","file_size":541469}],"ddc":["000"],"user_id":"35343"},{"language":[{"iso":"eng"}],"report_number":"draft-rosa-bmwg-vnfbench","citation":{"mla":"Rosa, Raphael Vicente, et al. Methodology for VNF Benchmarking Automation. IETF.","bibtex":"@book{Rosa_Rothenberg_Peuster_Karl, title={Methodology for VNF Benchmarking Automation}, publisher={IETF}, author={Rosa, Raphael Vicente and Rothenberg, Christian Esteve and Peuster, Manuel and Karl, Holger} }","chicago":"Rosa, Raphael Vicente, Christian Esteve Rothenberg, Manuel Peuster, and Holger Karl. Methodology for VNF Benchmarking Automation. IETF, n.d.","ama":"Rosa RV, Rothenberg CE, Peuster M, Karl H. Methodology for VNF Benchmarking Automation. IETF","apa":"Rosa, R. V., Rothenberg, C. E., Peuster, M., & Karl, H. (n.d.). Methodology for VNF Benchmarking Automation. IETF.","ieee":"R. V. Rosa, C. E. Rothenberg, M. Peuster, and H. Karl, Methodology for VNF Benchmarking Automation. IETF.","short":"R.V. Rosa, C.E. Rothenberg, M. Peuster, H. Karl, Methodology for VNF Benchmarking Automation, IETF, n.d."},"type":"report","year":"2018","main_file_link":[{"url":"https://datatracker.ietf.org/doc/draft-rosa-bmwg-vnfbench/","open_access":"1"}],"oa":"1","date_updated":"2022-01-06T07:03:07Z","_id":"6485","status":"public","project":[{"grant_number":"761493","name":"5G Development and validation platform for global industry-specific network services and Apps","_id":"28"}],"date_created":"2019-01-04T07:53:50Z","publication_status":"draft","author":[{"full_name":"Rosa, Raphael Vicente","first_name":"Raphael Vicente","last_name":"Rosa"},{"first_name":"Christian Esteve","full_name":"Rothenberg, Christian Esteve","last_name":"Rothenberg"},{"id":"13271","last_name":"Peuster","full_name":"Peuster, Manuel","first_name":"Manuel"},{"full_name":"Karl, Holger","first_name":"Holger","id":"126","last_name":"Karl"}],"publisher":"IETF","department":[{"_id":"75"}],"user_id":"13271","title":"Methodology for VNF Benchmarking Automation"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:03:24Z","oa":"1","department":[{"_id":"75"}],"project":[{"_id":"28","name":"5G Development and validation platform for global industry-specific network services and Apps","grant_number":"761493"},{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"title":"Trade-offs in Dynamic Resource Allocation in Network Function Virtualization","year":"2018","citation":{"ama":"Schneider SB, Dräxler S, Karl H. Trade-offs in Dynamic Resource Allocation in Network Function Virtualization. In: IEEE Global Communications Conference (GLOBECOM 2018). IEEE; 2018.","apa":"Schneider, S. B., Dräxler, S., & Karl, H. (2018). Trade-offs in Dynamic Resource Allocation in Network Function Virtualization. In IEEE Global Communications Conference (GLOBECOM 2018). Abu Dhabi, UAE: IEEE.","chicago":"Schneider, Stefan Balthasar, Sevil Dräxler, and Holger Karl. “Trade-Offs in Dynamic Resource Allocation in Network Function Virtualization.” In IEEE Global Communications Conference (GLOBECOM 2018). IEEE, 2018.","mla":"Schneider, Stefan Balthasar, et al. “Trade-Offs in Dynamic Resource Allocation in Network Function Virtualization.” IEEE Global Communications Conference (GLOBECOM 2018), IEEE, 2018.","bibtex":"@inproceedings{Schneider_Dräxler_Karl_2018, title={Trade-offs in Dynamic Resource Allocation in Network Function Virtualization}, booktitle={IEEE Global Communications Conference (GLOBECOM 2018)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Dräxler, Sevil and Karl, Holger}, year={2018} }","short":"S.B. Schneider, S. Dräxler, H. Karl, in: IEEE Global Communications Conference (GLOBECOM 2018), IEEE, 2018.","ieee":"S. B. Schneider, S. Dräxler, and H. Karl, “Trade-offs in Dynamic Resource Allocation in Network Function Virtualization,” in IEEE Global Communications Conference (GLOBECOM 2018), Abu Dhabi, UAE, 2018."},"type":"conference","_id":"6970","conference":{"location":"Abu Dhabi, UAE","name":"IEEE Global Communications Conference (GLOBECOM 2018)"},"publisher":"IEEE","author":[{"full_name":"Schneider, Stefan Balthasar","orcid":"0000-0001-8210-4011","first_name":"Stefan Balthasar","id":"35343","last_name":"Schneider"},{"id":"31764","last_name":"Dräxler","full_name":"Dräxler, Sevil","first_name":"Sevil"},{"full_name":"Karl, Holger","first_name":"Holger","id":"126","last_name":"Karl"}],"file_date_updated":"2019-01-24T13:53:16Z","publication":"IEEE Global Communications Conference (GLOBECOM 2018)","file":[{"content_type":"application/pdf","date_updated":"2019-01-24T13:53:16Z","relation":"main_file","file_size":422196,"creator":"stschn","file_id":"6971","access_level":"open_access","date_created":"2019-01-24T13:53:16Z","file_name":"preprint_ris.pdf"}],"has_accepted_license":"1","status":"public","date_created":"2019-01-24T13:53:22Z","abstract":[{"text":"Dynamic allocation of resources is a key feature in network function virtualization (NFV), enabling flexible adjustment of slices and contained network services to ever-changing service demands. \r\nConsidering resource allocation across the entire network, many authors have proposed approaches to optimize the placement and chaining of virtual network function (VNF) instances and the allocation of resources to these VNF instances. In doing so, various optimization objectives are conceivable, e.g., minimizing certain required resources or the end-to-end delay of the placed services.\r\n\r\nIn this paper, we investigate the relationship between four typical optimization objectives when coordinating the placement and resource allocation of chained VNF instances. We observe an interesting trade-off between minimizing the overhead of starting/stopping VNF instances and all other objectives when adapting to changed service demands.","lang":"eng"}],"ddc":["040"],"user_id":"35343"},{"project":[{"name":"5G Development and validation platform for global industry-specific network services and Apps","grant_number":"761493","_id":"28"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"department":[{"_id":"75"}],"title":"A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms","language":[{"iso":"eng"}],"doi":"10.1109/NFV-SDN.2018.8725795","oa":"1","date_updated":"2022-01-06T07:03:24Z","status":"public","has_accepted_license":"1","date_created":"2019-01-24T14:10:17Z","author":[{"first_name":"Stefan Balthasar","orcid":"0000-0001-8210-4011","full_name":"Schneider, Stefan Balthasar","last_name":"Schneider","id":"35343"},{"first_name":"Manuel","full_name":"Peuster, Manuel","last_name":"Peuster","id":"13271"},{"last_name":"Karl","id":"126","first_name":"Holger","full_name":"Karl, Holger"}],"publisher":"IEEE","file_date_updated":"2019-01-24T14:25:23Z","publication":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)","file":[{"file_size":468396,"creator":"stschn","file_id":"6973","content_type":"application/pdf","date_updated":"2019-01-24T14:25:23Z","relation":"main_file","file_name":"preprint_ris.pdf","date_created":"2019-01-24T14:10:08Z","access_level":"open_access"}],"ddc":["040"],"user_id":"35343","abstract":[{"text":"In recent years, a variety of different approaches\r\nhave been proposed to tackle the problem of scaling and placing\r\nnetwork services, consisting of interconnected virtual network\r\nfunctions (VNFs). This paper presents a placement abstraction\r\nlayer (PAL) that provides a clear and simple northbound interface\r\nfor using such algorithms while hiding their internal\r\nfunctionality and implementation. Through its southbound interface,\r\nPAL can connect to different back ends that evaluate\r\nthe calculated placements, e.g., using simulations, emulations, or\r\ntestbed approaches. As an example for such evaluation back ends,\r\nwe introduce a novel placement emulation framework (PEF)\r\nthat allows executing calculated placements using real, containerbased\r\nVNFs on real-world network topologies. In a case study,\r\nwe show how PAL and PEF facilitate reusing and evaluating\r\nplacement algorithms as well as validating their underlying\r\nmodels and performance claims.","lang":"eng"}],"type":"conference","year":"2018","citation":{"short":"S.B. Schneider, M. Peuster, H. Karl, in: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018.","ieee":"S. B. Schneider, M. Peuster, and H. Karl, “A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms,” in IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), Verona, Italy, 2018.","ama":"Schneider SB, Peuster M, Karl H. A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms. In: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018). IEEE; 2018. doi:10.1109/NFV-SDN.2018.8725795","apa":"Schneider, S. B., Peuster, M., & Karl, H. (2018). A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms. In IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018). Verona, Italy: IEEE. https://doi.org/10.1109/NFV-SDN.2018.8725795","chicago":"Schneider, Stefan Balthasar, Manuel Peuster, and Holger Karl. “A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms.” In IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018). IEEE, 2018. https://doi.org/10.1109/NFV-SDN.2018.8725795.","bibtex":"@inproceedings{Schneider_Peuster_Karl_2018, title={A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms}, DOI={10.1109/NFV-SDN.2018.8725795}, booktitle={IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Peuster, Manuel and Karl, Holger}, year={2018} }","mla":"Schneider, Stefan Balthasar, et al. “A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms.” IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018, doi:10.1109/NFV-SDN.2018.8725795."},"main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8725795"}],"_id":"6972","conference":{"location":"Verona, Italy","name":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)"}},{"language":[{"iso":"eng"}],"oa":"1","doi":"10.1109/NFV-SDN.2018.8725794","date_updated":"2022-01-06T07:03:25Z","project":[{"_id":"28","grant_number":"761493","name":"5G Development and validation platform for global industry-specific network services and Apps"},{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"department":[{"_id":"75"}],"title":"A Fully Integrated Multi-Platform NFV SDK","citation":{"mla":"Schneider, Stefan Balthasar, et al. “A Fully Integrated Multi-Platform NFV SDK.” IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018, doi:10.1109/NFV-SDN.2018.8725794.","bibtex":"@inproceedings{Schneider_Peuster_Tavernier_Karl_2018, title={A Fully Integrated Multi-Platform NFV SDK}, DOI={10.1109/NFV-SDN.2018.8725794}, booktitle={IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Peuster, Manuel and Tavernier, Wouter and Karl, Holger}, year={2018} }","apa":"Schneider, S. B., Peuster, M., Tavernier, W., & Karl, H. (2018). A Fully Integrated Multi-Platform NFV SDK. In IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018). Verona, Italy: IEEE. https://doi.org/10.1109/NFV-SDN.2018.8725794","ama":"Schneider SB, Peuster M, Tavernier W, Karl H. A Fully Integrated Multi-Platform NFV SDK. In: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018). IEEE; 2018. doi:10.1109/NFV-SDN.2018.8725794","chicago":"Schneider, Stefan Balthasar, Manuel Peuster, Wouter Tavernier, and Holger Karl. “A Fully Integrated Multi-Platform NFV SDK.” In IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018). IEEE, 2018. https://doi.org/10.1109/NFV-SDN.2018.8725794.","ieee":"S. B. Schneider, M. Peuster, W. Tavernier, and H. Karl, “A Fully Integrated Multi-Platform NFV SDK,” in IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), Verona, Italy, 2018.","short":"S.B. Schneider, M. Peuster, W. Tavernier, H. Karl, in: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018."},"type":"conference","year":"2018","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8725794"}],"conference":{"location":"Verona, Italy","name":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)"},"_id":"6974","date_created":"2019-01-24T14:17:58Z","has_accepted_license":"1","status":"public","file":[{"file_size":475022,"file_id":"6975","creator":"stschn","date_updated":"2019-01-24T14:26:23Z","content_type":"application/pdf","relation":"main_file","date_created":"2019-01-24T14:17:29Z","file_name":"Pre-print.pdf","access_level":"open_access"}],"file_date_updated":"2019-01-24T14:26:23Z","publication":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018)","author":[{"last_name":"Schneider","id":"35343","first_name":"Stefan Balthasar","full_name":"Schneider, Stefan Balthasar","orcid":"0000-0001-8210-4011"},{"last_name":"Peuster","id":"13271","first_name":"Manuel","full_name":"Peuster, Manuel"},{"last_name":"Tavernier","full_name":"Tavernier, Wouter","first_name":"Wouter"},{"id":"126","last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"}],"publisher":"IEEE","user_id":"35343","ddc":["040"],"abstract":[{"lang":"eng","text":"A key challenge of network function virtualization\r\n(NFV) is the complexity of developing and deploying new\r\nnetwork services. Currently, development requires many manual\r\nsteps that are time-consuming and error-prone (e.g., for creating\r\nservice descriptors). Furthermore, existing management and\r\norchestration (MANO) platforms only offer limited support of\r\nstandardized descriptor models or package formats, limiting the\r\nre-usability of network services.\r\n\r\nTo this end, we introduce a fully integrated, open-source\r\nNFV service development kit (SDK) with multi-MANO platform\r\nsupport. Our SDK simplifies many NFV service development\r\nsteps by offering initial generation of descriptors, advanced\r\nproject management, as well as fully automated packaging and\r\nsubmission for on-boarding. To achieve multi-platform support,\r\nwe present a package format that extends ETSI’s VNF package\r\nformat. In this demonstration, we present the end-to-end workflow\r\nto develop an NFV service that is then packaged for multiple\r\nplatforms, i.e., 5GTANGO and OSM."}]},{"oa":"1","date_updated":"2022-01-06T06:51:08Z","_id":"11760","year":"2018","citation":{"chicago":"Ebbers, Janek, Alexandru Nelus, Rainer Martin, and Reinhold Haeb-Umbach. “Evaluation of Modulation-MFCC Features and DNN Classification for Acoustic Event Detection.” In DAGA 2018, München, 2018.","apa":"Ebbers, J., Nelus, A., Martin, R., & Haeb-Umbach, R. (2018). Evaluation of Modulation-MFCC Features and DNN Classification for Acoustic Event Detection. In DAGA 2018, München.","ama":"Ebbers J, Nelus A, Martin R, Haeb-Umbach R. Evaluation of Modulation-MFCC Features and DNN Classification for Acoustic Event Detection. In: DAGA 2018, München. ; 2018.","mla":"Ebbers, Janek, et al. “Evaluation of Modulation-MFCC Features and DNN Classification for Acoustic Event Detection.” DAGA 2018, München, 2018.","bibtex":"@inproceedings{Ebbers_Nelus_Martin_Haeb-Umbach_2018, title={Evaluation of Modulation-MFCC Features and DNN Classification for Acoustic Event Detection}, booktitle={DAGA 2018, München}, author={Ebbers, Janek and Nelus, Alexandru and Martin, Rainer and Haeb-Umbach, Reinhold}, year={2018} }","short":"J. Ebbers, A. Nelus, R. Martin, R. Haeb-Umbach, in: DAGA 2018, München, 2018.","ieee":"J. Ebbers, A. Nelus, R. Martin, and R. Haeb-Umbach, “Evaluation of Modulation-MFCC Features and DNN Classification for Acoustic Event Detection,” in DAGA 2018, München, 2018."},"type":"conference","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://groups.uni-paderborn.de/nt/pubs/2018/Daga_2018_Ebbers_Paper.pdf"}],"title":"Evaluation of Modulation-MFCC Features and DNN Classification for Acoustic Event Detection","user_id":"44006","abstract":[{"text":"Acoustic event detection, i.e., the task of assigning a human interpretable label to a segment of audio, has only recently attracted increased interest in the research community. Driven by the DCASE challenges and the availability of large-scale audio datasets, the state-of-the-art has progressed rapidly with deep-learning-based classi- fiers dominating the field. Because several potential use cases favor a realization on distributed sensor nodes, e.g. ambient assisted living applications, habitat monitoring or surveillance, we are concerned with two issues here. Firstly the classification performance of such systems and secondly the computing resources required to achieve a certain performance considering node level feature extraction. In this contribution we look at the balance between the two criteria by employing traditional techniques and different deep learning architectures, including convolutional and recurrent models in the context of real life everyday audio recordings in realistic, however challenging, multisource conditions.","lang":"eng"}],"status":"public","date_created":"2019-07-12T05:27:43Z","author":[{"id":"34851","last_name":"Ebbers","full_name":"Ebbers, Janek","first_name":"Janek"},{"last_name":"Nelus","first_name":"Alexandru","full_name":"Nelus, Alexandru"},{"last_name":"Martin","full_name":"Martin, Rainer","first_name":"Rainer"},{"id":"242","last_name":"Haeb-Umbach","full_name":"Haeb-Umbach, Reinhold","first_name":"Reinhold"}],"department":[{"_id":"54"}],"publication":"DAGA 2018, München"}]