@inbook{21345,
  author       = {{Kapidzic, Sanja and Neuberger, Christoph and Stieglitz, Stefan and Mirbabaie, Milad}},
  booktitle    = {{Trust in Media and Journalism: Empirical perspectives on ethics, norms, impacts and populism in Europe}},
  editor       = {{Otto, Kim and Köhler, Andreas}},
  isbn         = {{9783658207649}},
  publisher    = {{Springer}},
  title        = {{{The Quality of Tweets and the Adoption of Journalistic Norms}}},
  doi          = {{10.1007/978-3-658-20765-6_4}},
  year         = {{2018}},
}

@inproceedings{21346,
  author       = {{Mirbabaie, Milad and Youn, S.}},
  booktitle    = {{Proceedings of the 10th Multikonferenz Wirtschaftsinformatik}},
  title        = {{{Exploring Sense-making Activities in Crisis Situations}}},
  year         = {{2018}},
}

@inproceedings{21347,
  author       = {{Mirbabaie, Milad and Potthoff, T. and Lange, C. and Stieglitz, S.}},
  booktitle    = {{Proceedings of the 10th Multikonferenz Wirtschaftsinformatik}},
  title        = {{{Integration von Social-Media-Daten in analytische CRM-Systeme}}},
  year         = {{2018}},
}

@inproceedings{21348,
  author       = {{Stieglitz, S. and Mirbabaie, Milad and Potthoff, T.}},
  booktitle    = {{Proceedings of the 51st Hawaii International Conference on System Sciences}},
  title        = {{{Crisis Communication on Twitter during a Global Crisis of Volkswagen – The Case of “Dieselgate”}}},
  year         = {{2018}},
}

@unpublished{21634,
  abstract     = {{Predictive control of power electronic systems always requires a suitable
model of the plant. Using typical physics-based white box models, a trade-off
between model complexity (i.e. accuracy) and computational burden has to be
made. This is a challenging task with a lot of constraints, since the model
order is directly linked to the number of system states. Even though white-box
models show suitable performance in most cases, parasitic real-world effects
often cannot be modeled satisfactorily with an expedient computational load.
Hence, a Koopman operator-based model reduction technique is presented which
directly links the control action to the system's outputs in a black-box
fashion. The Koopman operator is a linear but infinite-dimensional operator
describing the dynamics of observables of nonlinear autonomous dynamical
systems which can be nicely applied to the switching principle of power
electronic devices. Following this data-driven approach, the model order and
the number of system states are decoupled which allows us to consider more
complex systems. Extensive experimental tests with an automotive-type permanent
magnet synchronous motor fed by an IGBT 2-level inverter prove the feasibility
of the proposed modeling technique in a finite-set model predictive control
application.}},
  author       = {{Hanke, Sören and Peitz, Sebastian and Wallscheid, Oliver and Klus, Stefan and Böcker, Joachim and Dellnitz, Michael}},
  booktitle    = {{arXiv:1804.00854}},
  title        = {{{Koopman Operator-Based Finite-Control-Set Model Predictive Control for  Electrical Drives}}},
  year         = {{2018}},
}

@inbook{17326,
  author       = {{Brennecke, Andreas and Oevel, Gudrun and Strauch, Thomas}},
  booktitle    = {{STUDIOLO. Kooperative Forschungsumgebungen in den eHumanities}},
  editor       = {{Seng, Eva-Maria and Keil, Reinhard and Oevel, Gudrun}},
  pages        = {{67--76}},
  publisher    = {{De Gruyter}},
  title        = {{{Unterstützung des Forschungsprozesses aus infrastruktureller Sicht}}},
  year         = {{2018}},
}

@inproceedings{17345,
  author       = {{Spalazzese, Romina and Platenius, Marie C. and Becker, Steffen and Engels, Gregor}},
  booktitle    = {{2018 IEEE International Conference on Software Architecture Companion (ICSA-C)}},
  isbn         = {{9781538665855}},
  title        = {{{IoT-ASAP 2018: Message from the Chairs}}},
  doi          = {{10.1109/icsa-c.2018.00009}},
  year         = {{2018}},
}

@article{17518,
  author       = {{Hoppe, Thomas and Sturm, Susann and Sureth-Sloane, Caren}},
  journal      = {{Intertax}},
  title        = {{{What are the Drivers of Tax Complexity for MNCs? Global Evidence}}},
  doi          = {{10.2139/ssrn.3469663}},
  year         = {{2018}},
}

@misc{17631,
  author       = {{Mindt, Ilka}},
  title        = {{{Bridging - Fremdsprache und Fachwissenschaft. Digital Learning Map}}},
  year         = {{2018}},
}

@article{1765,
  author       = {{Huang, Lingling and Zhang, Shuang and Zentgraf, Thomas}},
  issn         = {{2192-8614}},
  journal      = {{Nanophotonics}},
  number       = {{6}},
  pages        = {{1169--1190}},
  publisher    = {{Walter de Gruyter GmbH}},
  title        = {{{Metasurface holography: from fundamentals to applications}}},
  doi          = {{10.1515/nanoph-2017-0118}},
  volume       = {{7}},
  year         = {{2018}},
}

@inproceedings{17651,
  abstract     = {{Consider mitigating the effects of denial of service or of malicious traffic in networks by deleting edges. Edge deletion reduces the DoS or the number of the malicious flows, but it also inadvertently removes some of the desired flows. To model this important problem, we formulate two problems: (1) remove all the undesirable flows while minimizing the damage to the desirable ones and (2) balance removing the undesirable flows and not removing too many of the desirable flows. We prove these problems are equivalent to important theoretical problems, thereby being important not only practically but also theoretically, and very hard to approximate in a general network. We employ reductions to nonetheless approximate the problem and also provide a greedy approximation. When the network is a tree, the problems are still MAX SNP-hard, but we provide a greedy-based 2l-approximation algorithm, where l is the longest desirable flow. We also provide an algorithm, approximating the first and the second problem within {\$}{\$}2 {\backslash}sqrt{\{} 2{\backslash}left| E {\backslash}right| {\}}{\$}{\$}and {\$}{\$}2 {\backslash}sqrt{\{}2 ({\backslash}left| E {\backslash}right| + {\backslash}left| {\backslash}text {\{}undesirable flows{\}} {\backslash}right| ){\}}{\$}{\$}, respectively, where E is the set of the edges of the network. We also provide a fixed-parameter tractable (FPT) algorithm. Finally, if the tree has a root such that every flow in the tree flows on the path from the root to a leaf, we solve the problem exactly using dynamic programming.}},
  author       = {{Polevoy, Gleb and Trajanovski, Stojan and Grosso, Paola and de Laat, Cees}},
  booktitle    = {{Combinatorial Optimization and Applications}},
  editor       = {{Kim, Donghyun and Uma, R. N. and Zelikovsky, Alexander}},
  isbn         = {{978-3-030-04651-4}},
  keywords     = {{flow, Red-Blue Set Cover, Positive-Negative Partial Set Cover, approximation, tree, MAX SNP-hard, root, leaf, dynamic programming, FPT}},
  pages        = {{217--232}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Removing Undesirable Flows by Edge Deletion}}},
  year         = {{2018}},
}

@article{17666,
  abstract     = {{Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions.}},
  author       = {{Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}},
  issn         = {{0167-739X}},
  journal      = {{Future Generation Computer Systems}},
  keywords     = {{Software defined networks, Network function virtualization, Cyber attacks, Cyber security, Defense efficiency, Overlay networks}},
  title        = {{{Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}}},
  doi          = {{https://doi.org/10.1016/j.future.2018.08.011}},
  year         = {{2018}},
}

@inbook{17705,
  author       = {{Mindt, Ilka and Bartsch, Sabine}},
  booktitle    = {{Anglistentag 2017 Regensburg. Proceedings}},
  editor       = {{Zwierlein, Anne-Julia and Petzold, Jochen and Boehm, Katharina and Decker, Martin}},
  pages        = {{3--8}},
  publisher    = {{Wissenschaftler Verlag}},
  title        = {{{"Digital Humanitites: The Role of the Digital in English Philology". Sprachwissenschaftliche Sektion beim Anglistentag 2017 in Regensburg}}},
  year         = {{2018}},
}

@unpublished{17713,
  author       = {{Wever, Marcel Dominik and Mohr, Felix and Hüllermeier, Eyke}},
  publisher    = {{Arxiv}},
  title        = {{{Automated Multi-Label Classification based on ML-Plan}}},
  year         = {{2018}},
}

@unpublished{17714,
  author       = {{Mohr, Felix and Wever, Marcel Dominik and Hüllermeier, Eyke}},
  title        = {{{Automated machine learning service composition}}},
  year         = {{2018}},
}

@misc{17718,
  author       = {{Wolff, Birgitta and Sureth-Sloane, Caren and Weissenberger, Barbara}},
  booktitle    = {{Frankfurter Allgemeine Zeitung}},
  number       = {{293}},
  pages        = {{16}},
  title        = {{{BWL greift gesellschaftlichen Wandel auf}}},
  year         = {{2018}},
}

@inbook{17720,
  author       = {{Mindt, Ilka}},
  booktitle    = {{Paderborner Unireden 148}},
  editor       = {{Freese, Peter}},
  publisher    = {{Bonifatius GmbH}},
  title        = {{{Englischer Sprachwandel im Zeitalter von Digitalisierung und Innovation}}},
  volume       = {{148}},
  year         = {{2018}},
}

@inbook{17721,
  author       = {{Bartsch, Sabine and Mindt, Ilka}},
  booktitle    = {{Anglistentag 2017 Regensburg. Proceedings}},
  editor       = {{Zwierlein, Anne-Julia and Petzold, Jochen and Boehm, Katharina and Decker, Martin}},
  pages        = {{3 -- 7}},
  publisher    = {{Wissenschaftler Verlag}},
  title        = {{{Digital Humanities: The Role of the Digital in English Philology}}},
  year         = {{2018}},
}

@article{17835,
  author       = {{Klippstein, Sven Helge and Hassanin, Hany and Diaz De Cerio Sanchez, Alejandro and Zweiri, Yahya and Seneviratne, Lakmal}},
  issn         = {{1438-1656}},
  journal      = {{Advanced Engineering Materials}},
  number       = {{2}},
  title        = {{{Additive Manufacturing of Porous Structures for Unmanned Aerial Vehicles Applications}}},
  doi          = {{10.1002/adem.201800290}},
  volume       = {{20}},
  year         = {{2018}},
}

@book{17916,
  editor       = {{Knaus, T. and Meister, Dorothee M. and Narr, K.}},
  publisher    = {{kopaed}},
  title        = {{{Futurelab Medienpädagogik. Qualitätsentwicklung. Professionalisierung}}},
  volume       = {{54}},
  year         = {{2018}},
}

