@article{33719,
  author       = {{Humpert, Lynn and Röhm, Benjamin and Anacker, Harald and Dumitrescu, Roman and Anderl, Reiner}},
  issn         = {{2212-8271}},
  journal      = {{Procedia CIRP}},
  keywords     = {{General Medicine}},
  pages        = {{215--220}},
  publisher    = {{Elsevier BV}},
  title        = {{{Method for direct end customer integration into the agile product development}}},
  doi          = {{10.1016/j.procir.2022.05.239}},
  volume       = {{109}},
  year         = {{2022}},
}

@inbook{33728,
  author       = {{Bielak, C. R. and Böhnke, M. and Bobbert, M. and Meschut, G.}},
  booktitle    = {{The Minerals, Metals &amp; Materials Series}},
  isbn         = {{9783031062117}},
  issn         = {{2367-1181}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Development of a Numerical 3D Model for Analyzing Clinched Joints in Versatile Process Chains}}},
  doi          = {{10.1007/978-3-031-06212-4_15}},
  year         = {{2022}},
}

@inbook{33742,
  author       = {{Zierau, Cornelia and Kofer, Martina}},
  booktitle    = {{Interkulturelles Lernen mit Kinder- und Jugendliteratur (in Vorbereitung)}},
  editor       = {{Mikota, Jana and Sudermann, Andy and Heise, Ines}},
  title        = {{{Verhandlungen sexueller und kultureller Fremd- und Selbstbestimmungen in Kristina Aamand’s interkulturellem Adoleszenzroman „Wenn Worte meine Waffe wären“}}},
  year         = {{2022}},
}

@inbook{33745,
  author       = {{Zierau, Cornelia}},
  booktitle    = {{Türkisch-deutsche Studien Jahrbuch 2020: Wertorientierungen}},
  editor       = {{Ozil, Seyda and Hofmann, Michael and Laut, Jens-Peter and Dayioglu-Yücel, Yasemin and Zierau, Cornelia and Uca, Didem }},
  pages        = {{69--77}},
  publisher    = {{Universitätsverlag}},
  title        = {{{Wertorientierung und Werteverhandlungen in Emine Sevgi Özdamars Roman „Das Leben ist eine Karawanserei“}}},
  year         = {{2022}},
}

@book{33799,
  editor       = {{Zierau, Cornelia and Ozil, Seyda and Hofmann, Michael and Laut, Jens-Peter and Dayioglu-Yücel, Yasemin and Uca, Didem}},
  publisher    = {{Universitätsverlag}},
  title        = {{{Türkisch-deutsche Studien Jahrbuch 2020: Wertorientierungen}}},
  year         = {{2022}},
}

@article{33810,
  author       = {{Koldewey, Christian and Hobscheidt, Daniela and Pierenkemper, Christoph and Kühn, Arno and Dumitrescu, Roman}},
  journal      = {{Sci}},
  number       = {{4}},
  publisher    = {{MDPI}},
  title        = {{{Increasing Firm Performance through Industry 4.0—A Method to Define and Reach Meaningful Goals}}},
  doi          = {{https://doi.org/10.3390/sci4040039}},
  volume       = {{39}},
  year         = {{2022}},
}

@article{33720,
  author       = {{Göllner, Denis and Rasor, Rik and Anacker, Harald and Dumitrescu, Roman}},
  issn         = {{2212-8271}},
  journal      = {{Procedia CIRP}},
  keywords     = {{General Medicine}},
  pages        = {{1089--1094}},
  publisher    = {{Elsevier BV}},
  title        = {{{Collaborative Modeling of Interoperable Digital Twins in a SoS Context}}},
  doi          = {{10.1016/j.procir.2022.05.113}},
  volume       = {{107}},
  year         = {{2022}},
}

@article{30193,
  abstract     = {{The successful planning of future product generations requires reliable insights into the actual products’ problems and potentials for improvement. A valuable source for these insights is the product use phase. In practice, product planners are often forced to work with assumptions and speculations as insights from the use phase are insufficiently identified and documented. A new opportunity to address this problem arises from the ongoing digitalization that enables products to generate and collect data during their utilization. Analyzing these data could enable their manufacturers to generate and exploit insights concerning product performance and user behavior, revealing problems and potentials for improvement. However, research on analyzing use phase data in product planning of manufacturing companies is scarce. Therefore, we conducted an exploratory interview study with decision-makers of eight manufacturing companies. The result of this paper is a detailed description of the potentials and challenges that the interviewees associated with analyzing use phase data in product planning. The potentials explain the intended purpose and generic application examples. The challenges concern the products, the data, the customers, the implementation, and the employees. By gathering the potentials and challenges through expert interviews, our study structures the topic from the perspective of the potential users and shows the needs for future research.}},
  author       = {{Meyer, Maurice and Fichtler, Timm and Koldewey, Christian and Dumitrescu, Roman}},
  issn         = {{0890-0604}},
  journal      = {{Artificial Intelligence for Engineering Design, Analysis and Manufacturing}},
  keywords     = {{Artificial Intelligence, Industrial and Manufacturing Engineering}},
  publisher    = {{Cambridge University Press (CUP)}},
  title        = {{{Potentials and challenges of analyzing use phase data in product planning of manufacturing companies}}},
  doi          = {{10.1017/s0890060421000408}},
  volume       = {{36}},
  year         = {{2022}},
}

@article{33710,
  abstract     = {{<jats:title>Abstract</jats:title>
               <jats:p>Um global erfolgreich zu bleiben, wird es bald nicht mehr ausreichen, Kriterien wie ein gutes Produktdesign zu erfüllen. Stattdessen muss der Kundennutzen kontinuierlich über den Produktlebenszyklus hinaus gesteigert werden. Tech-Konzerne verzeichnen bereits Erfolge und verkörpern den Wandel schon heute. Vor diesem Hintergrund ist ein neues Leitbild in der Entwicklung und dem Betrieb von zukünftigen, technischen Systemen erforderlich. EngOps soll diesen Bedarf decken und steht für die agile Kollaboration zwischen Engineering und Operations. Alle Teile des Unternehmens sollen ständig miteinander kooperieren, um so beispielsweise wandelbare Produkte auch nach dem Verkauf entwickeln zu können.</jats:p>}},
  author       = {{Anacker, Harald and Dumitrescu, Roman and Michels, Nico and Rasor, Rik}},
  issn         = {{2511-0896}},
  journal      = {{Zeitschrift für wirtschaftlichen Fabrikbetrieb}},
  keywords     = {{Management Science and Operations Research, Strategy and Management, General Engineering}},
  number       = {{6}},
  pages        = {{405--409}},
  publisher    = {{Walter de Gruyter GmbH}},
  title        = {{{EngOps – Ein Leitbild für das agile Zusammenwirken von Engineering und Operations}}},
  doi          = {{10.1515/zwf-2022-1069}},
  volume       = {{117}},
  year         = {{2022}},
}

@article{33833,
  author       = {{Kim, Sanghoon and Pathak, Sachin and Rhim, Sonny H. and Cha, Jongin and Jekal, Soyoung and Hong, Soon Cheol and Lee, Hyun Hwi and Park, Sung‐Hun and Lee, Han‐Koo and Park, Jae‐Hoon and Lee, Soogil and Steinrück, Hans-Georg and Mehta, Apurva and Wang, Shan X. and Hong, Jongill}},
  issn         = {{2198-3844}},
  journal      = {{Advanced Science}},
  keywords     = {{General Physics and Astronomy, General Engineering, Biochemistry, Genetics and Molecular Biology (miscellaneous), General Materials Science, General Chemical Engineering, Medicine (miscellaneous)}},
  number       = {{24}},
  pages        = {{2201749}},
  publisher    = {{Wiley}},
  title        = {{{Giant Orbital Anisotropy with Strong Spin–Orbit Coupling Established at the Pseudomorphic Interface of the Co/Pd Superlattice}}},
  doi          = {{10.1002/advs.202201749}},
  volume       = {{9}},
  year         = {{2022}},
}

@article{33835,
  abstract     = {{<jats:p>
            Nowadays, an increasing number of applications uses deserialization. This technique, based on rebuilding the instance of objects from serialized byte streams, can be dangerous since it can open the application to attacks such as remote code execution (RCE) if the data to deserialize is originating from an untrusted source. Deserialization vulnerabilities are so critical that they are in OWASP’s list of top 10 security risks for web applications. This is mainly caused by faults in the development process of applications and by flaws in their dependencies, i.e., flaws in the libraries used by these applications. No previous work has studied deserialization attacks in-depth: How are they performed? How are weaknesses introduced and patched? And for how long are vulnerabilities present in the codebase? To yield a deeper understanding of this important kind of vulnerability, we perform two main analyses: one on attack gadgets, i.e., exploitable pieces of code, present in Java libraries, and one on vulnerabilities present in Java applications. For the first analysis, we conduct an exploratory large-scale study by running 256 515 experiments in which we vary the versions of libraries for each of the 19 publicly available exploits. Such attacks rely on a combination of
            <jats:italic>gadgets</jats:italic>
            present in one or multiple Java libraries. A gadget is a method which is using objects or fields that can be attacker-controlled. Our goal is to precisely identify library versions containing gadgets and to understand how gadgets have been introduced and how they have been patched. We observe that the modification of one innocent-looking detail in a class – such as making it
            <jats:monospace>public</jats:monospace>
            – can already introduce a gadget. Furthermore, we noticed that among the studied libraries, 37.5% are not patched, leaving gadgets available for future attacks.
          </jats:p>
          <jats:p>For the second analysis, we manually analyze 104 deserialization vulnerabilities CVEs to understand how vulnerabilities are introduced and patched in real-life Java applications. Results indicate that the vulnerabilities are not always completely patched or that a workaround solution is proposed. With a workaround solution, applications are still vulnerable since the code itself is unchanged.</jats:p>}},
  author       = {{Sayar, Imen and Bartel, Alexandre and Bodden, Eric and Le Traon, Yves}},
  issn         = {{1049-331X}},
  journal      = {{ACM Transactions on Software Engineering and Methodology}},
  keywords     = {{Software}},
  publisher    = {{Association for Computing Machinery (ACM)}},
  title        = {{{An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities}}},
  doi          = {{10.1145/3554732}},
  year         = {{2022}},
}

@article{33836,
  author       = {{Piskachev, Goran and Späth, Johannes and Budde, Ingo and Bodden, Eric}},
  journal      = {{Empirical Software Engineering}},
  number       = {{5}},
  pages        = {{1–33}},
  publisher    = {{Springer}},
  title        = {{{Fluently specifying taint-flow queries with fluentTQL}}},
  volume       = {{27}},
  year         = {{2022}},
}

@inproceedings{33838,
  author       = {{Krishnamurthy, Ranjith and Piskachev, Goran and Bodden, Eric}},
  title        = {{{To what extent can we analyze Kotlin programs using existing Java taint analysis tools?}}},
  year         = {{2022}},
}

@inproceedings{33837,
  author       = {{Piskachev, Goran and Dziwok, Stefan and Koch, Thorsten and Merschjohann, Sven and Bodden, Eric}},
  title        = {{{How far are German companies in improving security through static program analysis tools?}}},
  year         = {{2022}},
}

@article{20731,
  abstract     = {{We present a novel algorithm that allows us to gain detailed insight into the effects of sparsity in linear and nonlinear optimization, which is of great importance in many scientific areas such as image and signal processing, medical imaging, compressed sensing, and machine learning (e.g., for the training of neural networks). Sparsity is an important feature to ensure robustness against noisy data, but also to find models that are interpretable and easy to analyze due to the small number of relevant terms. It is common practice to enforce sparsity by adding the ℓ1-norm as a weighted penalty term. In order to gain a better understanding and to allow for an informed model selection, we directly solve the corresponding multiobjective optimization problem (MOP) that arises when we minimize the main objective and the ℓ1-norm simultaneously. As this MOP is in general non-convex for nonlinear objectives, the weighting method will fail to provide all optimal compromises. To avoid this issue, we present a continuation method which is specifically tailored to MOPs with two objective functions one of which is the ℓ1-norm. Our method can be seen as a generalization of well-known homotopy methods for linear regression problems to the nonlinear case. Several numerical examples - including neural network training - demonstrate our theoretical findings and the additional insight that can be gained by this multiobjective approach.}},
  author       = {{Bieker, Katharina and Gebken, Bennet and Peitz, Sebastian}},
  journal      = {{IEEE Transactions on Pattern Analysis and Machine Intelligence}},
  number       = {{11}},
  pages        = {{7797--7808}},
  publisher    = {{IEEE}},
  title        = {{{On the Treatment of Optimization Problems with L1 Penalty Terms via Multiobjective Continuation}}},
  doi          = {{10.1109/TPAMI.2021.3114962}},
  volume       = {{44}},
  year         = {{2022}},
}

@article{23566,
  author       = {{Kundisch, Dennis and Muntermann, J. and Oberländer, A. M. and Rau, D. and Röglinger, M. and Schoormann, T. and Szopinski, Daniel}},
  journal      = {{Business & Information Systems Engineering}},
  number       = {{4}},
  pages        = {{421--439}},
  title        = {{{An update for taxonomy designers: Methodological guidance from information systems research}}},
  volume       = {{64}},
  year         = {{2022}},
}

@book{33842,
  author       = {{Eke, Norbert and Zaimoglu , Feridun}},
  publisher    = {{Königshausen und Neumann}},
  title        = {{{Durchdrungenheit. Texte und Gespräche.}}},
  year         = {{2022}},
}

@article{33859,
  author       = {{Moritzer, Elmar and Elsner, Christian Lennart}},
  journal      = {{Macromolecular Symposia}},
  location     = {{Bukarest}},
  number       = {{1}},
  publisher    = {{Wiley}},
  title        = {{{Investigation and Improvement of Processing Parameters of a Copper-Filled Polymer Filament in Fused Filament Fabrication as a Basis for the Fabrication of Low-Porosity Metal Parts}}},
  doi          = {{https://doi.org/10.1002/masy.202100390}},
  volume       = {{404}},
  year         = {{2022}},
}

@article{33861,
  author       = {{Moritzer, Elmar and Wächter, Julian}},
  journal      = {{Macromolecular Symposia}},
  location     = {{Bukarest}},
  number       = {{1}},
  publisher    = {{Wiley}},
  title        = {{{Development of a Procedure for the Assessment of Material Potentials under Consideration of the Weld Seam Quality for Multi-Material Applications in the FDM Process}}},
  doi          = {{https://doi.org/10.1002/masy.202100389}},
  volume       = {{404}},
  year         = {{2022}},
}

@book{33865,
  abstract     = {{Lightweight materials such as aluminium and ultra-high-strength steel are increasingly being used in modern material mixed design in car body construction. As a fixing method for hybrid joining with structural adhesive, clinching has the advantage over other mechanical joining technologies that different materials can be joined without an auxiliary joining part and pre-hole. Due to the large degree of deformation in the joining partners, strong in-plane and out-of-plane material flows occur during the setting process, which can lead to plastic deformation.
The aim of this work is the further development of shear-clinching for low-deformation of aluminium-steel joints. To gain a basic understanding of the joint deformation, the deformation of the joint partners during the setting process is identified step by step. Based on the knowledge gained, the deformation-related influencing factors are investigated experimentally. Thus, optimisation approaches as well as suggested handling methods for the production of a low-deformation shear-clinching joint are derived. For the realisation of the common narrow flange, which is to be characterised as deformation-sensitive due to a small edge distance, a numerically supported tool modification is carried out and subsequently experimentally validated.
}},
  author       = {{Han, Daxin}},
  title        = {{{Deformationsarme Fügeverbindungen mittels prozessoptimiertem Schneidclinchen}}},
  year         = {{2022}},
}

