[{"doi":"10.1103/physrevb.100.155103","intvolume":" 100","_id":"15739","date_updated":"2022-01-06T06:52:32Z","language":[{"iso":"eng"}],"type":"journal_article","citation":{"mla":"Azadi, Sam, and Thomas D. Kühne. “Unconventional Phase III of High-Pressure Solid Hydrogen.” Physical Review B, vol. 100, 2019, pp. 155103–05, doi:10.1103/physrevb.100.155103.","bibtex":"@article{Azadi_Kühne_2019, title={Unconventional phase III of high-pressure solid hydrogen}, volume={100}, DOI={10.1103/physrevb.100.155103}, journal={Physical Review B}, author={Azadi, Sam and Kühne, Thomas D.}, year={2019}, pages={155103–5} }","ama":"Azadi S, Kühne TD. Unconventional phase III of high-pressure solid hydrogen. Physical Review B. 2019;100:155103-155105. doi:10.1103/physrevb.100.155103","apa":"Azadi, S., & Kühne, T. D. (2019). Unconventional phase III of high-pressure solid hydrogen. Physical Review B, 100, 155103–155105. https://doi.org/10.1103/physrevb.100.155103","chicago":"Azadi, Sam, and Thomas D. Kühne. “Unconventional Phase III of High-Pressure Solid Hydrogen.” Physical Review B 100 (2019): 155103–5. https://doi.org/10.1103/physrevb.100.155103.","ieee":"S. Azadi and T. D. Kühne, “Unconventional phase III of high-pressure solid hydrogen,” Physical Review B, vol. 100, pp. 155103–5, 2019.","short":"S. Azadi, T.D. Kühne, Physical Review B 100 (2019) 155103–5."},"year":"2019","page":"155103-5","user_id":"71692","title":"Unconventional phase III of high-pressure solid hydrogen","status":"public","date_created":"2020-01-30T13:20:33Z","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"publication_identifier":{"issn":["2469-9950","2469-9969"]},"volume":100,"publication_status":"published","author":[{"full_name":"Azadi, Sam","first_name":"Sam","last_name":"Azadi"},{"last_name":"Kühne","full_name":"Kühne, Thomas D.","first_name":"Thomas D."}],"department":[{"_id":"304"}],"publication":"Physical Review B"},{"doi":"10.1021/acs.jpcc.9b08781","date_updated":"2022-01-06T06:52:32Z","_id":"15740","intvolume":" 124","page":"1285-1291","type":"journal_article","year":"2019","citation":{"ieee":"M. Guc et al., “Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations,” The Journal of Physical Chemistry C, vol. 124, pp. 1285–1291, 2019.","short":"M. Guc, T. Kodalle, R. Kormath Madam Raghupathy, H. Mirhosseini, T.D. Kühne, I. Becerril-Romero, A. Pérez-Rodríguez, C.A. Kaufmann, V. Izquierdo-Roca, The Journal of Physical Chemistry C 124 (2019) 1285–1291.","bibtex":"@article{Guc_Kodalle_Kormath Madam Raghupathy_Mirhosseini_Kühne_Becerril-Romero_Pérez-Rodríguez_Kaufmann_Izquierdo-Roca_2019, title={Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations}, volume={124}, DOI={10.1021/acs.jpcc.9b08781}, journal={The Journal of Physical Chemistry C}, author={Guc, Maxim and Kodalle, Tim and Kormath Madam Raghupathy, Ramya and Mirhosseini, Hossein and Kühne, Thomas D. and Becerril-Romero, Ignacio and Pérez-Rodríguez, Alejandro and Kaufmann, Christian A. and Izquierdo-Roca, Victor}, year={2019}, pages={1285–1291} }","mla":"Guc, Maxim, et al. “Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations.” The Journal of Physical Chemistry C, vol. 124, 2019, pp. 1285–91, doi:10.1021/acs.jpcc.9b08781.","ama":"Guc M, Kodalle T, Kormath Madam Raghupathy R, et al. Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations. The Journal of Physical Chemistry C. 2019;124:1285-1291. doi:10.1021/acs.jpcc.9b08781","apa":"Guc, M., Kodalle, T., Kormath Madam Raghupathy, R., Mirhosseini, H., Kühne, T. D., Becerril-Romero, I., … Izquierdo-Roca, V. (2019). Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations. The Journal of Physical Chemistry C, 124, 1285–1291. https://doi.org/10.1021/acs.jpcc.9b08781","chicago":"Guc, Maxim, Tim Kodalle, Ramya Kormath Madam Raghupathy, Hossein Mirhosseini, Thomas D. Kühne, Ignacio Becerril-Romero, Alejandro Pérez-Rodríguez, Christian A. Kaufmann, and Victor Izquierdo-Roca. “Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations.” The Journal of Physical Chemistry C 124 (2019): 1285–91. https://doi.org/10.1021/acs.jpcc.9b08781."},"language":[{"iso":"eng"}],"title":"Vibrational Properties of RbInSe2: Raman Scattering Spectroscopy and First-Principle Calculations","user_id":"71051","volume":124,"publication_identifier":{"issn":["1932-7447","1932-7455"]},"publication_status":"published","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"date_created":"2020-01-30T13:23:09Z","status":"public","department":[{"_id":"304"}],"publication":"The Journal of Physical Chemistry C","author":[{"last_name":"Guc","first_name":"Maxim","full_name":"Guc, Maxim"},{"last_name":"Kodalle","full_name":"Kodalle, Tim","first_name":"Tim"},{"last_name":"Kormath Madam Raghupathy","id":"71692","first_name":"Ramya","orcid":"https://orcid.org/0000-0003-4667-9744","full_name":"Kormath Madam Raghupathy, Ramya"},{"full_name":"Mirhosseini, Hossein","first_name":"Hossein","last_name":"Mirhosseini"},{"last_name":"Kühne","full_name":"Kühne, Thomas D.","first_name":"Thomas D."},{"full_name":"Becerril-Romero, Ignacio","first_name":"Ignacio","last_name":"Becerril-Romero"},{"last_name":"Pérez-Rodríguez","full_name":"Pérez-Rodríguez, Alejandro","first_name":"Alejandro"},{"full_name":"Kaufmann, Christian A.","first_name":"Christian A.","last_name":"Kaufmann"},{"last_name":"Izquierdo-Roca","full_name":"Izquierdo-Roca, Victor","first_name":"Victor"}]},{"date_updated":"2022-01-06T06:52:32Z","doi":"10.1016/j.automatica.2019.108759","language":[{"iso":"eng"}],"title":"Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems","department":[{"_id":"7"},{"_id":"34"},{"_id":"3"},{"_id":"75"},{"_id":"57"}],"publication_identifier":{"issn":["0005-1098"]},"publication_status":"published","project":[{"_id":"24","name":"Netzgewahre Regelung & regelungsgewahre Netze"}],"_id":"15741","article_number":"108759","citation":{"chicago":"Leong, Alex S., Arunselvan Ramaswamy, Daniel E. Quevedo, Holger Karl, and Ling Shi. “Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber–Physical Systems.” Automatica, 2019. https://doi.org/10.1016/j.automatica.2019.108759.","ama":"Leong AS, Ramaswamy A, Quevedo DE, Karl H, Shi L. Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems. Automatica. 2019. doi:10.1016/j.automatica.2019.108759","apa":"Leong, A. S., Ramaswamy, A., Quevedo, D. E., Karl, H., & Shi, L. (2019). Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems. Automatica. https://doi.org/10.1016/j.automatica.2019.108759","bibtex":"@article{Leong_Ramaswamy_Quevedo_Karl_Shi_2019, title={Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems}, DOI={10.1016/j.automatica.2019.108759}, number={108759}, journal={Automatica}, author={Leong, Alex S. and Ramaswamy, Arunselvan and Quevedo, Daniel E. and Karl, Holger and Shi, Ling}, year={2019} }","mla":"Leong, Alex S., et al. “Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber–Physical Systems.” Automatica, 108759, 2019, doi:10.1016/j.automatica.2019.108759.","short":"A.S. Leong, A. Ramaswamy, D.E. Quevedo, H. Karl, L. Shi, Automatica (2019).","ieee":"A. S. Leong, A. Ramaswamy, D. E. Quevedo, H. Karl, and L. Shi, “Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems,” Automatica, 2019."},"type":"journal_article","year":"2019","abstract":[{"lang":"eng","text":"\r\nIn many cyber–physical systems, we encounter the problem of remote state estimation of geo- graphically distributed and remote physical processes. This paper studies the scheduling of sensor transmissions to estimate the states of multiple remote, dynamic processes. Information from the different sensors has to be transmitted to a central gateway over a wireless network for monitoring purposes, where typically fewer wireless channels are available than there are processes to be monitored. For effective estimation at the gateway, the sensors need to be scheduled appropriately, i.e., at each time instant one needs to decide which sensors have network access and which ones do not. To address this scheduling problem, we formulate an associated Markov decision process (MDP). This MDP is then solved using a Deep Q-Network, a recent deep reinforcement learning algorithm that is at once scalable and model-free. We compare our scheduling algorithm to popular scheduling algorithms such as round-robin and reduced-waiting-time, among others. Our algorithm is shown to significantly outperform these algorithms for many example scenario"}],"ddc":["000"],"user_id":"126","file_date_updated":"2020-01-31T15:57:50Z","publication":"Automatica","author":[{"last_name":"Leong","full_name":"Leong, Alex S.","first_name":"Alex S."},{"orcid":"https://orcid.org/ 0000-0001-7547-8111","full_name":"Ramaswamy, Arunselvan","first_name":"Arunselvan","id":"66937","last_name":"Ramaswamy"},{"full_name":"Quevedo, Daniel E.","first_name":"Daniel E.","last_name":"Quevedo"},{"id":"126","last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"},{"full_name":"Shi, Ling","first_name":"Ling","last_name":"Shi"}],"quality_controlled":"1","file":[{"relation":"main_file","success":1,"date_updated":"2020-01-31T15:57:50Z","content_type":"application/pdf","file_id":"15743","creator":"hkarl","file_size":"675382","access_level":"closed","date_created":"2020-01-31T15:57:50Z","file_name":"leoram20a.pdf"}],"date_created":"2020-01-31T15:55:27Z","status":"public","has_accepted_license":"1"},{"_id":"15746","date_updated":"2022-01-06T06:52:32Z","type":"mastersthesis","citation":{"mla":"Otte, Oliver. Outsourced Decryption of Attribute-Based Ciphertexts. 2019.","bibtex":"@book{Otte_2019, title={Outsourced Decryption of Attribute-based Ciphertexts}, author={Otte, Oliver}, year={2019} }","apa":"Otte, O. (2019). Outsourced Decryption of Attribute-based Ciphertexts.","ama":"Otte O. Outsourced Decryption of Attribute-Based Ciphertexts.; 2019.","chicago":"Otte, Oliver. Outsourced Decryption of Attribute-Based Ciphertexts, 2019.","ieee":"O. Otte, Outsourced Decryption of Attribute-based Ciphertexts. 2019.","short":"O. Otte, Outsourced Decryption of Attribute-Based Ciphertexts, 2019."},"year":"2019","language":[{"iso":"eng"}],"title":"Outsourced Decryption of Attribute-based Ciphertexts","user_id":"13703","date_created":"2020-02-03T09:43:19Z","status":"public","department":[{"_id":"64"}],"author":[{"first_name":"Oliver","full_name":"Otte, Oliver","last_name":"Otte"}]},{"type":"bachelorsthesis","year":"2019","citation":{"ieee":"N. C. Wördenweber, On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model. 2019.","short":"N.C. Wördenweber, On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model, 2019.","bibtex":"@book{Wördenweber_2019, title={On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model}, author={Wördenweber, Nico Christof}, year={2019} }","mla":"Wördenweber, Nico Christof. On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model. 2019.","apa":"Wördenweber, N. C. (2019). On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model.","ama":"Wördenweber NC. On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model.; 2019.","chicago":"Wördenweber, Nico Christof. On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model, 2019."},"language":[{"iso":"eng"}],"_id":"15747","date_updated":"2022-01-06T06:52:32Z","date_created":"2020-02-03T09:45:01Z","status":"public","department":[{"_id":"64"}],"author":[{"last_name":"Wördenweber","full_name":"Wördenweber, Nico Christof","first_name":"Nico Christof"}],"title":"On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model","user_id":"13703"},{"project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"department":[{"_id":"54"}],"title":"Improving CTC Using Stimulated Learning for Sequence Modeling","language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T06:52:35Z","has_accepted_license":"1","status":"public","date_created":"2020-02-06T07:22:47Z","author":[{"first_name":"Jahn","full_name":"Heymann, Jahn","last_name":"Heymann"},{"last_name":"Khe Chai Sim","full_name":"Khe Chai Sim, Bo Li","first_name":"Bo Li"}],"publication":"ICASSP 2019, Brighton, UK","file_date_updated":"2020-02-06T07:24:26Z","file":[{"access_level":"open_access","file_name":"ICASSP_2019_Heymann_1_Paper.pdf","date_created":"2020-02-06T07:24:26Z","relation":"main_file","content_type":"application/pdf","date_updated":"2020-02-06T07:24:26Z","creator":"huesera","file_id":"15813","file_size":239665}],"ddc":["000"],"user_id":"59789","abstract":[{"text":"Connectionist temporal classification (CTC) is a sequence-level loss that has been successfully applied to train recurrent neural network (RNN) models for automatic speech recognition. However, one major weakness of CTC is the conditional independence assumption that makes it difficult for the model to learn label dependencies. In this paper, we propose stimulated CTC, which uses stimulated learning to help CTC models learn label dependencies implicitly by using an auxiliary RNN to generate the appropriate stimuli. This stimuli comes in the form of an additional stimulation loss term which encourages the model to learn said label dependencies. The auxiliary network is only used during training and the inference model has the same structure as a standard CTC model. The proposed stimulated CTC model achieves about 35% relative character error rate improvements on a synthetic gesture keyboard recognition task and over 30% relative word error rate improvements on the Librispeech automatic speech recognition tasks over a baseline model trained with CTC only.","lang":"eng"}],"type":"conference","year":"2019","citation":{"chicago":"Heymann, Jahn, and Bo Li Khe Chai Sim. “Improving CTC Using Stimulated Learning for Sequence Modeling.” In ICASSP 2019, Brighton, UK, 2019.","apa":"Heymann, J., & Khe Chai Sim, B. L. (2019). Improving CTC Using Stimulated Learning for Sequence Modeling. In ICASSP 2019, Brighton, UK.","ama":"Heymann J, Khe Chai Sim BL. Improving CTC Using Stimulated Learning for Sequence Modeling. In: ICASSP 2019, Brighton, UK. ; 2019.","mla":"Heymann, Jahn, and Bo Li Khe Chai Sim. “Improving CTC Using Stimulated Learning for Sequence Modeling.” ICASSP 2019, Brighton, UK, 2019.","bibtex":"@inproceedings{Heymann_Khe Chai Sim_2019, title={Improving CTC Using Stimulated Learning for Sequence Modeling}, booktitle={ICASSP 2019, Brighton, UK}, author={Heymann, Jahn and Khe Chai Sim, Bo Li}, year={2019} }","short":"J. Heymann, B.L. Khe Chai Sim, in: ICASSP 2019, Brighton, UK, 2019.","ieee":"J. Heymann and B. L. Khe Chai Sim, “Improving CTC Using Stimulated Learning for Sequence Modeling,” in ICASSP 2019, Brighton, UK, 2019."},"_id":"15812"},{"project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"date_created":"2020-02-06T07:35:08Z","status":"public","has_accepted_license":"1","publication":"ASRU 2019, Sentosa, Singapore","file_date_updated":"2020-02-06T07:42:55Z","department":[{"_id":"54"}],"author":[{"last_name":"Zorila","full_name":"Zorila, Catalin","first_name":"Catalin"},{"id":"40767","last_name":"Boeddeker","full_name":"Boeddeker, Christoph","first_name":"Christoph"},{"last_name":"Doddipatla","full_name":"Doddipatla, Rama","first_name":"Rama"},{"first_name":"Reinhold","full_name":"Haeb-Umbach, Reinhold","last_name":"Haeb-Umbach","id":"242"}],"file":[{"access_level":"open_access","date_created":"2020-02-06T07:42:42Z","file_name":"ASRU_2019_Boeddeker_Paper.pdf","content_type":"application/pdf","date_updated":"2020-02-06T07:42:42Z","relation":"main_file","file_size":200256,"creator":"huesera","file_id":"15817"},{"file_id":"15818","creator":"huesera","file_size":123963,"relation":"main_file","date_updated":"2020-02-06T07:42:55Z","content_type":"application/pdf","file_name":"ASRU_2019_Boeddeker_Poster.pdf","date_created":"2020-02-06T07:42:55Z","access_level":"open_access"}],"ddc":["000"],"title":"An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription","user_id":"59789","abstract":[{"lang":"eng","text":"Despite the strong modeling power of neural network acoustic models, speech enhancement has been shown to deliver additional word error rate improvements if multi-channel data is available. However, there has been a longstanding debate whether enhancement should also be carried out on the ASR training data. In an extensive experimental evaluation on the acoustically very challenging CHiME-5 dinner party data we show that: (i) cleaning up the training data can lead to substantial error rate reductions, and (ii) enhancement in training is advisable as long as enhancement in test is at least as strong as in training. This approach stands in contrast and delivers larger gains than the common strategy reported in the literature to augment the training database with additional artificially degraded speech. Together with an acoustic model topology consisting of initial CNN layers followed by factorized TDNN layers we achieve with 41.6% and 43.2% WER on the DEV and EVAL test sets, respectively, a new single-system state-of-the-art result on the CHiME-5 data. This is a 8% relative improvement compared to the best word error rate published so far for a speech recognizer without system combination."}],"type":"conference","year":"2019","citation":{"apa":"Zorila, C., Boeddeker, C., Doddipatla, R., & Haeb-Umbach, R. (2019). An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription. In ASRU 2019, Sentosa, Singapore.","ama":"Zorila C, Boeddeker C, Doddipatla R, Haeb-Umbach R. An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription. In: ASRU 2019, Sentosa, Singapore. ; 2019.","chicago":"Zorila, Catalin, Christoph Boeddeker, Rama Doddipatla, and Reinhold Haeb-Umbach. “An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription.” In ASRU 2019, Sentosa, Singapore, 2019.","mla":"Zorila, Catalin, et al. “An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription.” ASRU 2019, Sentosa, Singapore, 2019.","bibtex":"@inproceedings{Zorila_Boeddeker_Doddipatla_Haeb-Umbach_2019, title={An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription}, booktitle={ASRU 2019, Sentosa, Singapore}, author={Zorila, Catalin and Boeddeker, Christoph and Doddipatla, Rama and Haeb-Umbach, Reinhold}, year={2019} }","short":"C. Zorila, C. Boeddeker, R. Doddipatla, R. Haeb-Umbach, in: ASRU 2019, Sentosa, Singapore, 2019.","ieee":"C. Zorila, C. Boeddeker, R. Doddipatla, and R. Haeb-Umbach, “An Investigation Into the Effectiveness of Enhancement in ASR Training and Test for Chime-5 Dinner Party Transcription,” in ASRU 2019, Sentosa, Singapore, 2019."},"language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T06:52:37Z","_id":"15816"},{"date_created":"2020-02-06T08:51:51Z","status":"public","department":[{"_id":"64"}],"author":[{"full_name":"Leutnant, Matthias","first_name":"Matthias","last_name":"Leutnant"}],"title":"Experimentelle Untersuchung des SEM-Algorithmus","user_id":"13291","year":"2019","citation":{"mla":"Leutnant, Matthias. Experimentelle Untersuchung Des SEM-Algorithmus. 2019.","bibtex":"@book{Leutnant_2019, title={Experimentelle Untersuchung des SEM-Algorithmus}, author={Leutnant, Matthias}, year={2019} }","apa":"Leutnant, M. (2019). Experimentelle Untersuchung des SEM-Algorithmus.","ama":"Leutnant M. Experimentelle Untersuchung Des SEM-Algorithmus.; 2019.","chicago":"Leutnant, Matthias. Experimentelle Untersuchung Des SEM-Algorithmus, 2019.","ieee":"M. Leutnant, Experimentelle Untersuchung des SEM-Algorithmus. 2019.","short":"M. Leutnant, Experimentelle Untersuchung Des SEM-Algorithmus, 2019."},"type":"bachelorsthesis","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"}],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:37Z","_id":"15819"},{"date_updated":"2022-01-06T06:52:38Z","doi":"10.1109/asew.2019.00019","language":[{"iso":"eng"}],"title":"Android App Merging for Benchmark Speed-Up and Analysis Lift-Up","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"publication_status":"published","publication_identifier":{"isbn":["9781728141367"]},"_id":"15838","citation":{"short":"F. Pauck, S. Zhang, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 2019.","ieee":"F. Pauck and S. Zhang, “Android App Merging for Benchmark Speed-Up and Analysis Lift-Up,” in 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 2019.","apa":"Pauck, F., & Zhang, S. (2019). Android App Merging for Benchmark Speed-Up and Analysis Lift-Up. In 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW). https://doi.org/10.1109/asew.2019.00019","ama":"Pauck F, Zhang S. Android App Merging for Benchmark Speed-Up and Analysis Lift-Up. In: 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW). ; 2019. doi:10.1109/asew.2019.00019","chicago":"Pauck, Felix, and Shikun Zhang. “Android App Merging for Benchmark Speed-Up and Analysis Lift-Up.” In 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 2019. https://doi.org/10.1109/asew.2019.00019.","mla":"Pauck, Felix, and Shikun Zhang. “Android App Merging for Benchmark Speed-Up and Analysis Lift-Up.” 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 2019, doi:10.1109/asew.2019.00019.","bibtex":"@inproceedings{Pauck_Zhang_2019, title={Android App Merging for Benchmark Speed-Up and Analysis Lift-Up}, DOI={10.1109/asew.2019.00019}, booktitle={2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)}, author={Pauck, Felix and Zhang, Shikun}, year={2019} }"},"year":"2019","type":"conference","abstract":[{"lang":"eng","text":"In the field of software analysis a trade-off between scalability and accuracy always exists. In this respect, Android app analysis is no exception, in particular, analyzing large or many apps can be challenging. Dealing with many small apps is a typical challenge when facing micro-benchmarks such as DROIDBENCH or ICC-BENCH. These particular benchmarks are not only used for the evaluation of novel tools but also in continuous integration pipelines of existing mature tools to maintain and guarantee a certain quality-level. Considering this latter usage it becomes very important to be able to achieve benchmark results as fast as possible. Hence, benchmarks have to be optimized for this purpose. One approach to do so is app merging. We implemented the Android Merge Tool (AMT) following this approach and show that its novel aspects can be used to produce scaled up and accurate benchmarks. For such benchmarks Android app analysis tools do not suffer from the scalability-accuracy trade-off anymore. We show this throughout detailed experiments on DROIDBENCH employing three different analysis tools (AMANDROID, ICCTA, FLOWDROID). Benchmark execution times are largely reduced without losing benchmark accuracy. Moreover, we argue why AMT is an advantageous successor of the state-of-the-art app merging tool (APKCOMBINER) in analysis lift-up scenarios."}],"user_id":"477","ddc":["004"],"file":[{"access_level":"closed","date_created":"2020-02-06T17:09:45Z","file_name":"AMT_final.pdf","relation":"main_file","date_updated":"2020-02-06T17:09:45Z","content_type":"application/pdf","creator":"fpauck","file_id":"15839","file_size":644517}],"publication":"2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)","file_date_updated":"2020-02-06T17:09:45Z","keyword":["Program Analysis","Android App Analysis","Taint Analysis","App Merging","Benchmark"],"author":[{"first_name":"Felix","full_name":"Pauck, Felix","last_name":"Pauck","id":"22398"},{"last_name":"Zhang","first_name":"Shikun","full_name":"Zhang, Shikun"}],"date_created":"2020-02-06T17:06:51Z","status":"public","has_accepted_license":"1"},{"language":[{"iso":"eng"}],"page":"012057","citation":{"ieee":"A. A. Camberg, T. Tröster, F. Bohner, and J. Tölle, “Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications,” IOP Conference Series: Materials Science and Engineering, vol. 651, p. 012057, 2019.","short":"A.A. Camberg, T. Tröster, F. Bohner, J. Tölle, IOP Conference Series: Materials Science and Engineering 651 (2019) 012057.","mla":"Camberg, Alan Adam, et al. “Predicting Plasticity and Fracture of Severe Pre-Strained EN AW-5182 by Yld2000 Yield Locus and Hosford-Coulomb Fracture Model in Sheet Forming Applications.” IOP Conference Series: Materials Science and Engineering, vol. 651, 2019, p. 012057, doi:10.1088/1757-899X/651/1/012057.","bibtex":"@article{Camberg_Tröster_Bohner_Tölle_2019, title={Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications}, volume={651}, DOI={10.1088/1757-899X/651/1/012057}, journal={IOP Conference Series: Materials Science and Engineering}, author={Camberg, Alan Adam and Tröster, Thomas and Bohner, F. and Tölle, J.}, year={2019}, pages={012057} }","apa":"Camberg, A. A., Tröster, T., Bohner, F., & Tölle, J. (2019). Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications. IOP Conference Series: Materials Science and Engineering, 651, 012057. https://doi.org/10.1088/1757-899X/651/1/012057","ama":"Camberg AA, Tröster T, Bohner F, Tölle J. Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications. IOP Conference Series: Materials Science and Engineering. 2019;651:012057. doi:10.1088/1757-899X/651/1/012057","chicago":"Camberg, Alan Adam, Thomas Tröster, F. Bohner, and J. Tölle. “Predicting Plasticity and Fracture of Severe Pre-Strained EN AW-5182 by Yld2000 Yield Locus and Hosford-Coulomb Fracture Model in Sheet Forming Applications.” IOP Conference Series: Materials Science and Engineering 651 (2019): 012057. https://doi.org/10.1088/1757-899X/651/1/012057."},"type":"journal_article","year":"2019","doi":"10.1088/1757-899X/651/1/012057","intvolume":" 651","_id":"15875","date_updated":"2022-01-06T06:52:39Z","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"date_created":"2020-02-11T10:21:57Z","status":"public","publication_identifier":{"issn":["1757-899X"]},"volume":651,"publication":"IOP Conference Series: Materials Science and Engineering","department":[{"_id":"9"},{"_id":"321"},{"_id":"149"}],"author":[{"id":"60544","last_name":"Camberg","full_name":"Camberg, Alan Adam","first_name":"Alan Adam"},{"id":"553","last_name":"Tröster","full_name":"Tröster, Thomas","first_name":"Thomas"},{"last_name":"Bohner","full_name":"Bohner, F.","first_name":"F."},{"full_name":"Tölle, J.","first_name":"J.","last_name":"Tölle"}],"user_id":"60544","title":"Predicting plasticity and fracture of severe pre-strained EN AW-5182 by Yld2000 yield locus and Hosford-Coulomb fracture model in sheet forming applications"},{"supervisor":[{"first_name":"Hassan","full_name":"Ghasemzadeh Mohammadi, Hassan","last_name":"Ghasemzadeh Mohammadi","id":"61186"}],"language":[{"iso":"eng"}],"year":"2019","citation":{"chicago":"Kumar Jeyakumar, Shankar. Incremental Learning with Support Vector Machine on Embedded Platforms, 2019.","apa":"Kumar Jeyakumar, S. (2019). Incremental learning with Support Vector Machine on embedded platforms.","ama":"Kumar Jeyakumar S. Incremental Learning with Support Vector Machine on Embedded Platforms.; 2019.","mla":"Kumar Jeyakumar, Shankar. Incremental Learning with Support Vector Machine on Embedded Platforms. 2019.","bibtex":"@book{Kumar Jeyakumar_2019, title={Incremental learning with Support Vector Machine on embedded platforms}, author={Kumar Jeyakumar, Shankar}, year={2019} }","short":"S. Kumar Jeyakumar, Incremental Learning with Support Vector Machine on Embedded Platforms, 2019.","ieee":"S. Kumar Jeyakumar, Incremental learning with Support Vector Machine on embedded platforms. 2019."},"type":"mastersthesis","date_updated":"2022-01-06T06:52:39Z","_id":"15883","department":[{"_id":"78"}],"author":[{"full_name":"Kumar Jeyakumar, Shankar","first_name":"Shankar","last_name":"Kumar Jeyakumar"}],"date_created":"2020-02-11T16:43:38Z","status":"public","user_id":"61186","title":"Incremental learning with Support Vector Machine on embedded platforms"},{"oa":"1","_id":"15908","date_updated":"2022-01-06T06:52:40Z","page":"1011-1028","citation":{"ama":"Müller J, Brinkmann M, Poddebniak D, et al. “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In: 28th {USENIX} Security Symposium ({USENIX} Security 19). Santa Clara, CA: {USENIX} Association; 2019:1011-1028.","apa":"Müller, J., Brinkmann, M., Poddebniak, D., Böck, H., Schinzel, S., Somorovsky, J., & Schwenk, J. (2019). “Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1011–1028). Santa Clara, CA: {USENIX} Association.","chicago":"Müller, Jens, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, and Jörg Schwenk. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails.” In 28th {USENIX} Security Symposium ({USENIX} Security 19), 1011–28. Santa Clara, CA: {USENIX} Association, 2019.","bibtex":"@inproceedings{Müller_Brinkmann_Poddebniak_Böck_Schinzel_Somorovsky_Schwenk_2019, place={Santa Clara, CA}, title={“Johnny, you are fired!” -- Spoofing OpenPGP and S/MIME Signatures in Emails}, booktitle={28th {USENIX} Security Symposium ({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Müller, Jens and Brinkmann, Marcus and Poddebniak, Damian and Böck, Hanno and Schinzel, Sebastian and Somorovsky, Juraj and Schwenk, Jörg}, year={2019}, pages={1011–1028} }","mla":"Müller, Jens, et al. “‘Johnny, You Are Fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails.” 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, 2019, pp. 1011–28.","short":"J. Müller, M. Brinkmann, D. Poddebniak, H. Böck, S. Schinzel, J. Somorovsky, J. Schwenk, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, Santa Clara, CA, 2019, pp. 1011–1028.","ieee":"J. Müller et al., “‘Johnny, you are fired!’ -- Spoofing OpenPGP and S/MIME Signatures in Emails,” in 28th {USENIX} Security Symposium ({USENIX} Security 19), 2019, pp. 1011–1028."},"type":"conference","year":"2019","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://www.usenix.org/conference/usenixsecurity19/presentation/muller"}],"title":"\"Johnny, you are fired!\" -- Spoofing OpenPGP and S/MIME Signatures in Emails","user_id":"83504","place":"Santa Clara, CA","publication_identifier":{"isbn":["978-1-939133-06-9"]},"date_created":"2020-02-15T09:50:57Z","status":"public","publication":"28th {USENIX} Security Symposium ({USENIX} Security 19)","publisher":"{USENIX} Association","author":[{"last_name":"Müller","full_name":"Müller, Jens","first_name":"Jens"},{"last_name":"Brinkmann","full_name":"Brinkmann, Marcus","first_name":"Marcus"},{"first_name":"Damian","full_name":"Poddebniak, Damian","last_name":"Poddebniak"},{"last_name":"Böck","first_name":"Hanno","full_name":"Böck, Hanno"},{"first_name":"Sebastian","full_name":"Schinzel, Sebastian","last_name":"Schinzel"},{"orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","first_name":"Juraj","id":"83504","last_name":"Somorovsky"},{"last_name":"Schwenk","first_name":"Jörg","full_name":"Schwenk, Jörg"}]},{"year":"2019","citation":{"chicago":"Merget, Robert, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, and Yuval Shavitt. “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.” In 28th {USENIX} Security Symposium ({USENIX} Security 19), 1029–46. Santa Clara, CA: {USENIX} Association, 2019.","ama":"Merget R, Somorovsky J, Aviram N, et al. Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In: 28th {USENIX} Security Symposium ({USENIX} Security 19). Santa Clara, CA: {USENIX} Association; 2019:1029-1046.","apa":"Merget, R., Somorovsky, J., Aviram, N., Young, C., Fliegenschmidt, J., Schwenk, J., & Shavitt, Y. (2019). Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 1029–1046). Santa Clara, CA: {USENIX} Association.","mla":"Merget, Robert, et al. “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.” 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, 2019, pp. 1029–46.","bibtex":"@inproceedings{Merget_Somorovsky_Aviram_Young_Fliegenschmidt_Schwenk_Shavitt_2019, place={Santa Clara, CA}, title={Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities}, booktitle={28th {USENIX} Security Symposium ({USENIX} Security 19)}, publisher={{USENIX} Association}, author={Merget, Robert and Somorovsky, Juraj and Aviram, Nimrod and Young, Craig and Fliegenschmidt, Janis and Schwenk, Jörg and Shavitt, Yuval}, year={2019}, pages={1029–1046} }","short":"R. Merget, J. Somorovsky, N. Aviram, C. Young, J. Fliegenschmidt, J. Schwenk, Y. Shavitt, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), {USENIX} Association, Santa Clara, CA, 2019, pp. 1029–1046.","ieee":"R. Merget et al., “Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities,” in 28th {USENIX} Security Symposium ({USENIX} Security 19), 2019, pp. 1029–1046."},"type":"conference","page":"1029-1046","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://www.usenix.org/conference/usenixsecurity19/presentation/merget"}],"oa":"1","date_updated":"2022-01-06T06:52:40Z","_id":"15909","publication_identifier":{"isbn":["978-1-939133-06-9"]},"status":"public","date_created":"2020-02-15T09:51:09Z","author":[{"last_name":"Merget","full_name":"Merget, Robert","first_name":"Robert"},{"last_name":"Somorovsky","id":"83504","first_name":"Juraj","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720"},{"full_name":"Aviram, Nimrod","first_name":"Nimrod","last_name":"Aviram"},{"last_name":"Young","full_name":"Young, Craig","first_name":"Craig"},{"full_name":"Fliegenschmidt, Janis","first_name":"Janis","last_name":"Fliegenschmidt"},{"last_name":"Schwenk","first_name":"Jörg","full_name":"Schwenk, Jörg"},{"last_name":"Shavitt","first_name":"Yuval","full_name":"Shavitt, Yuval"}],"publisher":"{USENIX} Association","publication":"28th {USENIX} Security Symposium ({USENIX} Security 19)","title":"Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities","user_id":"83504","place":"Santa Clara, CA"},{"status":"public","date_created":"2020-02-15T10:01:05Z","editor":[{"first_name":"Heiko","full_name":"Roßnagel, Heiko","last_name":"Roßnagel"},{"last_name":"Wagner","first_name":"Sven","full_name":"Wagner, Sven"},{"last_name":"Hühnlein","first_name":"Detlef","full_name":"Hühnlein, Detlef"}],"publisher":"Gesellschaft für Informatik, Bonn","author":[{"last_name":"Engelbertz","full_name":"Engelbertz, Nils","first_name":"Nils"},{"full_name":"Mladenov, Vladislav","first_name":"Vladislav","last_name":"Mladenov"},{"id":"83504","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720","first_name":"Juraj"},{"full_name":"Herring, David","first_name":"David","last_name":"Herring"},{"last_name":"Erinola","first_name":"Nurullah","full_name":"Erinola, Nurullah"},{"full_name":"Schwenk, Jörg","first_name":"Jörg","last_name":"Schwenk"}],"publication":"Open Identity Summit 2019","user_id":"83504","title":"Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)","language":[{"iso":"eng"}],"year":"2019","citation":{"mla":"Engelbertz, Nils, et al. “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS).” Open Identity Summit 2019, edited by Heiko Roßnagel et al., Gesellschaft für Informatik, Bonn, 2019, pp. 95–106.","bibtex":"@inproceedings{Engelbertz_Mladenov_Somorovsky_Herring_Erinola_Schwenk_2019, title={Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS)}, booktitle={Open Identity Summit 2019}, publisher={Gesellschaft für Informatik, Bonn}, author={Engelbertz, Nils and Mladenov, Vladislav and Somorovsky, Juraj and Herring, David and Erinola, Nurullah and Schwenk, Jörg}, editor={Roßnagel, Heiko and Wagner, Sven and Hühnlein, DetlefEditors}, year={2019}, pages={95–106} }","apa":"Engelbertz, N., Mladenov, V., Somorovsky, J., Herring, D., Erinola, N., & Schwenk, J. (2019). Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In H. Roßnagel, S. Wagner, & D. Hühnlein (Eds.), Open Identity Summit 2019 (pp. 95–106). Gesellschaft für Informatik, Bonn.","ama":"Engelbertz N, Mladenov V, Somorovsky J, Herring D, Erinola N, Schwenk J. Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS). In: Roßnagel H, Wagner S, Hühnlein D, eds. Open Identity Summit 2019. Gesellschaft für Informatik, Bonn; 2019:95-106.","chicago":"Engelbertz, Nils, Vladislav Mladenov, Juraj Somorovsky, David Herring, Nurullah Erinola, and Jörg Schwenk. “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS).” In Open Identity Summit 2019, edited by Heiko Roßnagel, Sven Wagner, and Detlef Hühnlein, 95–106. Gesellschaft für Informatik, Bonn, 2019.","ieee":"N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, and J. Schwenk, “Security Analysis of XAdES Validation in the CEF Digital Signature Services (DSS),” in Open Identity Summit 2019, 2019, pp. 95–106.","short":"N. Engelbertz, V. Mladenov, J. Somorovsky, D. Herring, N. Erinola, J. Schwenk, in: H. Roßnagel, S. Wagner, D. Hühnlein (Eds.), Open Identity Summit 2019, Gesellschaft für Informatik, Bonn, 2019, pp. 95–106."},"type":"conference","page":" 95-106 ","_id":"15910","date_updated":"2022-01-06T06:52:40Z"},{"publisher":"Universität Paderborn","author":[{"first_name":"Monica","full_name":"Keerthipati, Monica","last_name":"Keerthipati"}],"department":[{"_id":"78"}],"status":"public","project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"1","name":"SFB 901"}],"date_created":"2020-02-17T12:03:40Z","abstract":[{"text":"Secure hardware design is the most important aspect to be considered in addition to functional correctness. Achieving hardware security in today’s globalized Integrated Cir- cuit(IC) supply chain is a challenging task. One solution that is widely considered to help achieve secure hardware designs is Information Flow Tracking(IFT). It provides an ap- proach to verify that the systems adhere to security properties either by static verification during design phase or dynamic checking during runtime.\r\nProof-Carrying Hardware(PCH) is an approach to verify a functional design prior to using it in hardware. It is a two-party verification approach, where the target party, the consumer requests new functionalities with pre-defined properties to the producer. In response, the producer designs the IP (Intellectual Property) cores with the requested functionalities that adhere to the consumer-defined properties. The producer provides the IP cores and a proof certificate combined into a proof-carrying bitstream to the consumer to verify it. If the verification is successful, the consumer can use the IP cores in his hardware. In essence, the consumer can only run verified IP cores. Correctly applied, PCH techniques can help consumers to defend against many unintentional modifications and malicious alterations of the modules they receive. There are numerous published examples of how to use PCH to detect any change in the functionality of a circuit, i.e., pairing a PCH approach with functional equivalence checking for combinational or sequential circuits. For non-functional properties, since opening new covert channels to leak secret information from secure circuits is a viable attack vector for hardware trojans, i.e., intentionally added malicious circuitry, IFT technique is employed to make sure that secret/untrusted information never reaches any unclassified/trusted outputs.\r\nThis master thesis aims to explore the possibility of adapting Information Flow Tracking into a Proof-Carrying Hardware scenario. It aims to create a method that combines Infor- mation Flow Tracking(IFT) with a PCH approach at bitstream level enabling consumers to validate the trustworthiness of a module’s information flow without the computational costs of a complete flow analysis.","lang":"eng"}],"user_id":"477","title":"A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking","language":[{"iso":"eng"}],"supervisor":[{"last_name":"Wiersema","id":"3118","first_name":"Tobias","full_name":"Wiersema, Tobias"},{"first_name":"Marco","full_name":"Platzner, Marco","last_name":"Platzner","id":"398"},{"first_name":"Sybille","full_name":"Hellebrand, Sybille","orcid":"0000-0002-3717-3939","last_name":"Hellebrand","id":"209"}],"type":"mastersthesis","year":"2019","citation":{"bibtex":"@book{Keerthipati_2019, title={A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking}, publisher={Universität Paderborn}, author={Keerthipati, Monica}, year={2019} }","mla":"Keerthipati, Monica. A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn, 2019.","ama":"Keerthipati M. A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn; 2019.","apa":"Keerthipati, M. (2019). A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn.","chicago":"Keerthipati, Monica. A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn, 2019.","ieee":"M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking. Universität Paderborn, 2019.","short":"M. Keerthipati, A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking, Universität Paderborn, 2019."},"date_updated":"2022-01-06T06:52:41Z","_id":"15920"},{"user_id":"69382","abstract":[{"text":"Ranking plays a central role in a large number of applications driven by RDF knowledge graphs. Over the last years, many popular RDF knowledge graphs have grown so large that rankings for the facts they contain cannot be computed directly using the currently common 64-bit platforms. In this paper, we tackle two problems:\r\nComputing ranks on such large knowledge bases efficiently and incrementally. First, we present D-HARE, a distributed approach for computing ranks on very large knowledge graphs. D-HARE assumes the random surfer model and relies on data partitioning to compute matrix multiplications and transpositions on disk for matrices of arbitrary size. Moreover, the data partitioning underlying D-HARE allows the execution of most of its steps in parallel.\r\nAs very large knowledge graphs are often updated periodically, we tackle the incremental computation of ranks on large knowledge bases as a second problem. We address this problem by presenting\r\nI-HARE, an approximation technique for calculating the overall ranking scores of a knowledge without the need to recalculate the ranking from scratch at each new revision. We evaluate our approaches by calculating ranks on the 3 × 10^9 and 2.4 × 10^9 triples from Wikidata resp. LinkedGeoData. Our evaluation demonstrates\r\nthat D-HARE is the first holistic approach for computing ranks on very large RDF knowledge graphs. In addition, our incremental approach achieves a root mean squared error of less than 10E−7 in the best case. Both D-HARE\r\n and I-HARE are open-source and are available at: https://github.com/dice-group/incrementalHARE.\r\n","lang":"eng"}],"status":"public","date_created":"2020-02-18T16:39:35Z","publisher":"ACM","author":[{"first_name":"Abdelmoneim Amer","full_name":"Desouki, Abdelmoneim Amer","last_name":"Desouki"},{"last_name":"Röder","full_name":"Röder, Michael","first_name":"Michael"},{"full_name":"Ngonga Ngomo, Axel-Cyrille","first_name":"Axel-Cyrille","last_name":"Ngonga Ngomo"}],"keyword":["Knowledge Graphs","Ranking","RDF"],"publication":"Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT '19","_id":"15921","conference":{"name":"30th ACM Conference on Hypertext and Social Media","start_date":"2019-09-17","end_date":"2019-09-20"},"year":"2019","type":"conference","citation":{"ama":"Desouki AA, Röder M, Ngonga Ngomo A-C. Ranking on Very Large Knowledge Graphs. In: Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT ’19. ACM; 2019:163-171. doi:10.1145/3342220.3343660","apa":"Desouki, A. A., Röder, M., & Ngonga Ngomo, A.-C. (2019). Ranking on Very Large Knowledge Graphs. In Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT ’19 (pp. 163–171). ACM. https://doi.org/10.1145/3342220.3343660","chicago":"Desouki, Abdelmoneim Amer, Michael Röder, and Axel-Cyrille Ngonga Ngomo. “Ranking on Very Large Knowledge Graphs.” In Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT ’19, 163–71. ACM, 2019. https://doi.org/10.1145/3342220.3343660.","mla":"Desouki, Abdelmoneim Amer, et al. “Ranking on Very Large Knowledge Graphs.” Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT ’19, ACM, 2019, pp. 163–71, doi:10.1145/3342220.3343660.","bibtex":"@inproceedings{Desouki_Röder_Ngonga Ngomo_2019, title={Ranking on Very Large Knowledge Graphs}, DOI={10.1145/3342220.3343660}, booktitle={Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT ’19}, publisher={ACM}, author={Desouki, Abdelmoneim Amer and Röder, Michael and Ngonga Ngomo, Axel-Cyrille}, year={2019}, pages={163–171} }","short":"A.A. Desouki, M. Röder, A.-C. Ngonga Ngomo, in: Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT ’19, ACM, 2019, pp. 163–171.","ieee":"A. A. Desouki, M. Röder, and A.-C. Ngonga Ngomo, “Ranking on Very Large Knowledge Graphs,” in Proceedings of the 30th ACM Conference on Hypertext and Social Media - HT ’19, 2019, pp. 163–171."},"page":"163-171","title":"Ranking on Very Large Knowledge Graphs","publication_identifier":{"isbn":["9781450368858"]},"publication_status":"published","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"department":[{"_id":"574"}],"doi":"10.1145/3342220.3343660","date_updated":"2022-01-06T06:52:41Z","language":[{"iso":"eng"}]},{"main_file_link":[{"open_access":"1","url":"https://dl.gi.de/bitstream/handle/20.500.12116/24997/paper3_25.pdf"}],"language":[{"iso":"eng"}],"page":"289-290","type":"conference","year":"2019","citation":{"ieee":"S. Heindorf, Y. Scholten, G. Engels, and M. Potthast, “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract),” in INFORMATIK, 2019, pp. 289–290.","short":"S. Heindorf, Y. Scholten, G. Engels, M. Potthast, in: INFORMATIK, 2019, pp. 289–290.","bibtex":"@inproceedings{Heindorf_Scholten_Engels_Potthast_2019, title={Debiasing Vandalism Detection Models at Wikidata (Extended Abstract)}, DOI={10.18420/inf2019_48}, booktitle={INFORMATIK}, author={Heindorf, Stefan and Scholten, Yan and Engels, Gregor and Potthast, Martin}, year={2019}, pages={289–290} }","mla":"Heindorf, Stefan, et al. “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract).” INFORMATIK, 2019, pp. 289–90, doi:10.18420/inf2019_48.","apa":"Heindorf, S., Scholten, Y., Engels, G., & Potthast, M. (2019). Debiasing Vandalism Detection Models at Wikidata (Extended Abstract). In INFORMATIK (pp. 289–290). https://doi.org/10.18420/inf2019_48","ama":"Heindorf S, Scholten Y, Engels G, Potthast M. Debiasing Vandalism Detection Models at Wikidata (Extended Abstract). In: INFORMATIK. ; 2019:289-290. doi:10.18420/inf2019_48","chicago":"Heindorf, Stefan, Yan Scholten, Gregor Engels, and Martin Potthast. “Debiasing Vandalism Detection Models at Wikidata (Extended Abstract).” In INFORMATIK, 289–90, 2019. https://doi.org/10.18420/inf2019_48."},"date_updated":"2022-01-06T06:52:03Z","_id":"14568","oa":"1","doi":"10.18420/inf2019_48","department":[{"_id":"66"}],"publication":"INFORMATIK","author":[{"first_name":"Stefan","orcid":"0000-0002-4525-6865","full_name":"Heindorf, Stefan","last_name":"Heindorf","id":"11871"},{"first_name":"Yan","full_name":"Scholten, Yan","last_name":"Scholten"},{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"full_name":"Potthast, Martin","first_name":"Martin","last_name":"Potthast"}],"date_created":"2019-11-05T15:48:52Z","status":"public","user_id":"11871","title":"Debiasing Vandalism Detection Models at Wikidata (Extended Abstract)"},{"user_id":"49154","title":"Advances and novel applications of mobile wireless networking","department":[{"_id":"589"}],"publication":"Ad Hoc Networks","author":[{"id":"49154","last_name":"Sommer","orcid":"0000-0002-4336-7350","full_name":"Sommer, Christoph","first_name":"Christoph"},{"last_name":"Basagni","first_name":"Stefano","full_name":"Basagni, Stefano"}],"date_created":"2019-11-05T18:38:44Z","status":"public","publication_identifier":{"issn":["1570-8705"]},"publication_status":"published","date_updated":"2022-01-06T06:52:06Z","_id":"14817","doi":"10.1016/j.adhoc.2019.101975","article_number":"101975","language":[{"iso":"eng"}],"citation":{"ieee":"C. Sommer and S. Basagni, “Advances and novel applications of mobile wireless networking,” Ad Hoc Networks, 2019.","short":"C. Sommer, S. Basagni, Ad Hoc Networks (2019).","bibtex":"@article{Sommer_Basagni_2019, title={Advances and novel applications of mobile wireless networking}, DOI={10.1016/j.adhoc.2019.101975}, number={101975}, journal={Ad Hoc Networks}, author={Sommer, Christoph and Basagni, Stefano}, year={2019} }","mla":"Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of Mobile Wireless Networking.” Ad Hoc Networks, 101975, 2019, doi:10.1016/j.adhoc.2019.101975.","chicago":"Sommer, Christoph, and Stefano Basagni. “Advances and Novel Applications of Mobile Wireless Networking.” Ad Hoc Networks, 2019. https://doi.org/10.1016/j.adhoc.2019.101975.","apa":"Sommer, C., & Basagni, S. (2019). Advances and novel applications of mobile wireless networking. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2019.101975","ama":"Sommer C, Basagni S. Advances and novel applications of mobile wireless networking. Ad Hoc Networks. 2019. doi:10.1016/j.adhoc.2019.101975"},"year":"2019","type":"journal_article"},{"_id":"14819","date_updated":"2022-01-06T06:52:06Z","doi":"10.1109/wowmom.2019.8793008","language":[{"iso":"eng"}],"type":"conference","year":"2019","citation":{"mla":"Heinovski, Julian, et al. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective.” 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019, doi:10.1109/wowmom.2019.8793008.","bibtex":"@inproceedings{Heinovski_Stratmann_Buse_Klingler_Franke_Oczko_Sommer_Scharlau_Dressler_2019, title={Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective}, DOI={10.1109/wowmom.2019.8793008}, booktitle={2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM)}, author={Heinovski, Julian and Stratmann, Lukas and Buse, Dominik S. and Klingler, Florian and Franke, Mario and Oczko, Marie-Christin H. and Sommer, Christoph and Scharlau, Ingrid and Dressler, Falko}, year={2019} }","chicago":"Heinovski, Julian, Lukas Stratmann, Dominik S. Buse, Florian Klingler, Mario Franke, Marie-Christin H. Oczko, Christoph Sommer, Ingrid Scharlau, and Falko Dressler. “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective.” In 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019. https://doi.org/10.1109/wowmom.2019.8793008.","ama":"Heinovski J, Stratmann L, Buse DS, et al. Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective. In: 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM). ; 2019. doi:10.1109/wowmom.2019.8793008","apa":"Heinovski, J., Stratmann, L., Buse, D. S., Klingler, F., Franke, M., Oczko, M.-C. H., … Dressler, F. (2019). Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective. In 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM). https://doi.org/10.1109/wowmom.2019.8793008","ieee":"J. Heinovski et al., “Modeling Cycling Behavior to Improve Bicyclists’ Safety at Intersections - A Networking Perspective,” in 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019.","short":"J. Heinovski, L. Stratmann, D.S. Buse, F. Klingler, M. Franke, M.-C.H. Oczko, C. Sommer, I. Scharlau, F. Dressler, in: 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2019."},"user_id":"49154","title":"Modeling Cycling Behavior to Improve Bicyclists' Safety at Intersections - A Networking Perspective","author":[{"first_name":"Julian","full_name":"Heinovski, Julian","last_name":"Heinovski"},{"full_name":"Stratmann, Lukas","first_name":"Lukas","last_name":"Stratmann"},{"last_name":"Buse","first_name":"Dominik S.","full_name":"Buse, Dominik S."},{"last_name":"Klingler","full_name":"Klingler, Florian","first_name":"Florian"},{"first_name":"Mario","full_name":"Franke, Mario","last_name":"Franke"},{"last_name":"Oczko","full_name":"Oczko, Marie-Christin H.","first_name":"Marie-Christin H."},{"id":"49154","last_name":"Sommer","orcid":"0000-0002-4336-7350","full_name":"Sommer, Christoph","first_name":"Christoph"},{"full_name":"Scharlau, Ingrid","first_name":"Ingrid","last_name":"Scharlau"},{"full_name":"Dressler, Falko","first_name":"Falko","last_name":"Dressler"}],"department":[{"_id":"589"}],"publication":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","status":"public","date_created":"2019-11-05T18:38:48Z","publication_identifier":{"isbn":["9781728102702"]},"publication_status":"published"},{"title":"Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien","user_id":"24239","article_type":"original","publication_identifier":{"isbn":["978-3-96233-182-5"]},"volume":29,"publication_status":"published","date_created":"2019-11-06T08:34:40Z","status":"public","keyword":["Weber","Wien","Zensur"],"publication":"Weberiana","author":[{"first_name":"Agnes Regina","full_name":"Seipelt, Agnes Regina","last_name":"Seipelt","id":"24239"}],"publisher":"Allitera","intvolume":" 29","_id":"14821","date_updated":"2022-01-06T06:52:06Z","page":"107–161","citation":{"short":"A.R. Seipelt, Weberiana 29 (2019) 107–161.","ieee":"A. R. Seipelt, “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien,” Weberiana, vol. 29, pp. 107–161, 2019.","apa":"Seipelt, A. R. (2019). Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien. Weberiana, 29, 107–161.","ama":"Seipelt AR. Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien. Weberiana. 2019;29:107–161.","chicago":"Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” Weberiana 29 (2019): 107–161.","mla":"Seipelt, Agnes Regina. “Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien.” Weberiana, vol. 29, Allitera, 2019, pp. 107–161.","bibtex":"@article{Seipelt_2019, title={Aufführungs- und zensurbedingte Veränderungen im Wiener Manuskript der Freischütz-Erstaufführung 1821 in Wien}, volume={29}, journal={Weberiana}, publisher={Allitera}, author={Seipelt, Agnes Regina}, year={2019}, pages={107–161} }"},"type":"journal_article","year":"2019","language":[{"iso":"ger"}]},{"type":"conference","citation":{"mla":"Heitkaemper, Jens, et al. “A Study on Online Source Extraction in the Presence of Changing Speaker Positions.” International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia, 2019.","bibtex":"@inproceedings{Heitkaemper_Feher_Freitag_Haeb-Umbach_2019, title={A Study on Online Source Extraction in the Presence of Changing Speaker Positions}, booktitle={International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia}, author={Heitkaemper, Jens and Feher, Thomas and Freitag, Michael and Haeb-Umbach, Reinhold}, year={2019} }","chicago":"Heitkaemper, Jens, Thomas Feher, Michael Freitag, and Reinhold Haeb-Umbach. “A Study on Online Source Extraction in the Presence of Changing Speaker Positions.” In International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia, 2019.","apa":"Heitkaemper, J., Feher, T., Freitag, M., & Haeb-Umbach, R. (2019). A Study on Online Source Extraction in the Presence of Changing Speaker Positions. In International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia.","ama":"Heitkaemper J, Feher T, Freitag M, Haeb-Umbach R. A Study on Online Source Extraction in the Presence of Changing Speaker Positions. In: International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia. ; 2019.","ieee":"J. Heitkaemper, T. Feher, M. Freitag, and R. Haeb-Umbach, “A Study on Online Source Extraction in the Presence of Changing Speaker Positions,” in International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia, 2019.","short":"J. Heitkaemper, T. Feher, M. Freitag, R. Haeb-Umbach, in: International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia, 2019."},"year":"2019","_id":"14822","status":"public","has_accepted_license":"1","date_created":"2019-11-06T09:43:03Z","author":[{"id":"27643","last_name":"Heitkaemper","full_name":"Heitkaemper, Jens","first_name":"Jens"},{"full_name":"Feher, Thomas","first_name":"Thomas","last_name":"Feher"},{"first_name":"Michael","full_name":"Freitag, Michael","last_name":"Freitag"},{"first_name":"Reinhold","full_name":"Haeb-Umbach, Reinhold","last_name":"Haeb-Umbach","id":"242"}],"file_date_updated":"2019-11-08T07:47:12Z","publication":"International Conference on Statistical Language and Speech Processing 2019, Ljubljana, Slovenia","file":[{"access_level":"open_access","file_name":"SLSP_2019_Heitkaemper_Paper.pdf","date_created":"2019-11-06T10:02:26Z","date_updated":"2019-11-08T07:47:12Z","content_type":"application/pdf","relation":"main_file","file_size":578595,"file_id":"14823","creator":"huesera"}],"ddc":["006"],"user_id":"59789","abstract":[{"lang":"eng","text":"Multi-talker speech and moving speakers still pose a significant challenge to automatic speech recognition systems. Assuming an enrollment utterance of the target speakeris available, the so-called SpeakerBeam concept has been recently proposed to extract the target speaker from a speech mixture. If multi-channel input is available, spatial properties of the speaker can be exploited to support the source extraction. In this contribution we investigate different approaches to exploit such spatial information. In particular, we are interested in the question, how useful this information is if the target speaker changes his/her position. To this end, we present a SpeakerBeam-based source extraction network that is adapted to work on moving speakers by recursively updating the beamformer coefficients. Experimental results are presented on two data sets, one with articially created room impulse responses, and one with real room impulse responses and noise recorded in a conference room. Interestingly, spatial features turn out to be advantageous even if the speaker position changes."}],"language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T06:52:06Z","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"department":[{"_id":"54"}],"title":"A Study on Online Source Extraction in the Presence of Changing Speaker Positions"},{"file_date_updated":"2019-11-08T07:46:37Z","department":[{"_id":"54"}],"publication":"INTERSPEECH 2019, Graz, Austria","author":[{"full_name":"Martin-Donas, Juan M.","first_name":"Juan M.","last_name":"Martin-Donas"},{"first_name":"Jens","full_name":"Heitkaemper, Jens","last_name":"Heitkaemper","id":"27643"},{"last_name":"Haeb-Umbach","id":"242","first_name":"Reinhold","full_name":"Haeb-Umbach, Reinhold"},{"last_name":"Gomez","first_name":"Angel M.","full_name":"Gomez, Angel M."},{"first_name":"Antonio M.","full_name":"Peinado, Antonio M.","last_name":"Peinado"}],"file":[{"file_name":"INTERSPEECH_2019_Heitkaemper_Paper.pdf","date_created":"2019-11-06T10:07:15Z","access_level":"open_access","file_id":"14825","creator":"huesera","file_size":225689,"relation":"main_file","date_updated":"2019-11-08T07:46:37Z","content_type":"application/pdf"}],"project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"date_created":"2019-11-06T10:04:49Z","status":"public","has_accepted_license":"1","abstract":[{"lang":"eng","text":"This paper deals with multi-channel speech recognition in scenarios with multiple speakers. Recently, the spectral characteristics of a target speaker, extracted from an adaptation utterance, have been used to guide a neural network mask estimator to focus on that speaker. In this work we present two variants of speakeraware neural networks, which exploit both spectral and spatial information to allow better discrimination between target and interfering speakers. Thus, we introduce either a spatial preprocessing prior to the mask estimation or a spatial plus spectral speaker characterization block whose output is directly fed into the neural mask estimator. The target speaker’s spectral and spatial signature is extracted from an adaptation utterance recorded at the beginning of a session. We further adapt the architecture for low-latency processing by means of block-online beamforming that recursively updates the signal statistics. Experimental results show that the additional spatial information clearly improves source extraction, in particular in the same-gender case, and that our proposal achieves state-of-the-art performance in terms of distortion reduction and recognition accuracy."}],"title":"Multi-Channel Block-Online Source Extraction based on Utterance Adaptation","ddc":["000"],"user_id":"59789","type":"conference","citation":{"ieee":"J. M. Martin-Donas, J. Heitkaemper, R. Haeb-Umbach, A. M. Gomez, and A. M. Peinado, “Multi-Channel Block-Online Source Extraction based on Utterance Adaptation,” in INTERSPEECH 2019, Graz, Austria, 2019.","short":"J.M. Martin-Donas, J. Heitkaemper, R. Haeb-Umbach, A.M. Gomez, A.M. Peinado, in: INTERSPEECH 2019, Graz, Austria, 2019.","mla":"Martin-Donas, Juan M., et al. “Multi-Channel Block-Online Source Extraction Based on Utterance Adaptation.” INTERSPEECH 2019, Graz, Austria, 2019.","bibtex":"@inproceedings{Martin-Donas_Heitkaemper_Haeb-Umbach_Gomez_Peinado_2019, title={Multi-Channel Block-Online Source Extraction based on Utterance Adaptation}, booktitle={INTERSPEECH 2019, Graz, Austria}, author={Martin-Donas, Juan M. and Heitkaemper, Jens and Haeb-Umbach, Reinhold and Gomez, Angel M. and Peinado, Antonio M.}, year={2019} }","ama":"Martin-Donas JM, Heitkaemper J, Haeb-Umbach R, Gomez AM, Peinado AM. Multi-Channel Block-Online Source Extraction based on Utterance Adaptation. In: INTERSPEECH 2019, Graz, Austria. ; 2019.","apa":"Martin-Donas, J. M., Heitkaemper, J., Haeb-Umbach, R., Gomez, A. M., & Peinado, A. M. (2019). Multi-Channel Block-Online Source Extraction based on Utterance Adaptation. In INTERSPEECH 2019, Graz, Austria.","chicago":"Martin-Donas, Juan M., Jens Heitkaemper, Reinhold Haeb-Umbach, Angel M. Gomez, and Antonio M. Peinado. “Multi-Channel Block-Online Source Extraction Based on Utterance Adaptation.” In INTERSPEECH 2019, Graz, Austria, 2019."},"year":"2019","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:07Z","_id":"14824","oa":"1"},{"oa":"1","_id":"14826","date_updated":"2022-01-06T06:52:07Z","citation":{"ama":"Kanda N, Boeddeker C, Heitkaemper J, Fujita Y, Horiguchi S, Haeb-Umbach R. Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR. In: INTERSPEECH 2019, Graz, Austria. ; 2019.","apa":"Kanda, N., Boeddeker, C., Heitkaemper, J., Fujita, Y., Horiguchi, S., & Haeb-Umbach, R. (2019). Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR. In INTERSPEECH 2019, Graz, Austria.","chicago":"Kanda, Naoyuki, Christoph Boeddeker, Jens Heitkaemper, Yusuke Fujita, Shota Horiguchi, and Reinhold Haeb-Umbach. “Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR.” In INTERSPEECH 2019, Graz, Austria, 2019.","bibtex":"@inproceedings{Kanda_Boeddeker_Heitkaemper_Fujita_Horiguchi_Haeb-Umbach_2019, title={Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR}, booktitle={INTERSPEECH 2019, Graz, Austria}, author={Kanda, Naoyuki and Boeddeker, Christoph and Heitkaemper, Jens and Fujita, Yusuke and Horiguchi, Shota and Haeb-Umbach, Reinhold}, year={2019} }","mla":"Kanda, Naoyuki, et al. “Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR.” INTERSPEECH 2019, Graz, Austria, 2019.","short":"N. Kanda, C. Boeddeker, J. Heitkaemper, Y. Fujita, S. Horiguchi, R. Haeb-Umbach, in: INTERSPEECH 2019, Graz, Austria, 2019.","ieee":"N. Kanda, C. Boeddeker, J. Heitkaemper, Y. Fujita, S. Horiguchi, and R. Haeb-Umbach, “Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR,” in INTERSPEECH 2019, Graz, Austria, 2019."},"type":"conference","year":"2019","language":[{"iso":"eng"}],"title":"Guided Source Separation Meets a Strong ASR Backend: Hitachi/Paderborn University Joint Investigation for Dinner Party ASR","ddc":["000"],"user_id":"59789","abstract":[{"lang":"eng","text":"In this paper, we present Hitachi and Paderborn University’s joint effort for automatic speech recognition (ASR) in a dinner party scenario. The main challenges of ASR systems for dinner party recordings obtained by multiple microphone arrays are (1) heavy speech overlaps, (2) severe noise and reverberation, (3) very natural onversational content, and possibly (4) insufficient training data. As an example of a dinner party scenario, we have chosen the data presented during the CHiME-5 speech recognition challenge, where the baseline ASR had a 73.3% word error rate (WER), and even the best performing system at the CHiME-5 challenge had a 46.1% WER. We extensively investigated a combination of the guided source separation-based speech enhancement technique and an already proposed strong ASR backend and found that a tight combination of these techniques provided substantial accuracy improvements. Our final system achieved WERs of 39.94% and 41.64% for the development and evaluation data, respectively, both of which are the best published results for the dataset. We also investigated with additional training data on the official small data in the CHiME-5 corpus to assess the intrinsic difficulty of this ASR task."}],"status":"public","has_accepted_license":"1","date_created":"2019-11-06T10:08:49Z","project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"author":[{"last_name":"Kanda","first_name":"Naoyuki","full_name":"Kanda, Naoyuki"},{"id":"40767","last_name":"Boeddeker","full_name":"Boeddeker, Christoph","first_name":"Christoph"},{"last_name":"Heitkaemper","id":"27643","first_name":"Jens","full_name":"Heitkaemper, Jens"},{"first_name":"Yusuke","full_name":"Fujita, Yusuke","last_name":"Fujita"},{"last_name":"Horiguchi","full_name":"Horiguchi, Shota","first_name":"Shota"},{"full_name":"Haeb-Umbach, Reinhold","first_name":"Reinhold","id":"242","last_name":"Haeb-Umbach"}],"file_date_updated":"2019-11-08T07:45:15Z","publication":"INTERSPEECH 2019, Graz, Austria","department":[{"_id":"54"}],"file":[{"relation":"main_file","date_updated":"2019-11-08T07:45:15Z","content_type":"application/pdf","creator":"huesera","file_id":"14827","file_size":216202,"access_level":"open_access","file_name":"INTERSPEECH_2019_Boeddeker_Paper.pdf","date_created":"2019-11-06T10:10:23Z"}]},{"date_created":"2019-11-06T10:36:20Z","status":"public","publication_status":"published","publication_identifier":{"isbn":["978-3-99012-553-3","978-3-99012-554-0"]},"editor":[{"last_name":"Aringer","first_name":" Klaus","full_name":"Aringer, Klaus"},{"first_name":"Christian","full_name":"Utz, Christian","last_name":"Utz"},{"first_name":"Thomas","full_name":"Wozonig, Thomas","last_name":"Wozonig"}],"publication":"Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag","author":[{"id":"24239","last_name":"Seipelt","full_name":"Seipelt, Agnes Regina","first_name":"Agnes Regina"},{"last_name":"Klugseder","first_name":"Robert","full_name":"Klugseder, Robert"}],"publisher":"Hollitzer","user_id":"24239","title":"Digitale Musikanalyse auf Grundlage von MEI-codierten Daten","place":"Wien","language":[{"iso":"ger"}],"page":"69–87","citation":{"bibtex":"@inbook{Seipelt_Klugseder_2019, place={Wien}, title={Digitale Musikanalyse auf Grundlage von MEI-codierten Daten}, booktitle={Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag}, publisher={Hollitzer}, author={Seipelt, Agnes Regina and Klugseder, Robert}, editor={Aringer, Klaus and Utz, Christian and Wozonig, ThomasEditors}, year={2019}, pages={69–87} }","mla":"Seipelt, Agnes Regina, and Robert Klugseder. “Digitale Musikanalyse auf Grundlage von MEI-codierten Daten.” Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag, edited by Klaus Aringer et al., Hollitzer, 2019, pp. 69–87.","ama":"Seipelt AR, Klugseder R. Digitale Musikanalyse auf Grundlage von MEI-codierten Daten. In: Aringer Klaus, Utz C, Wozonig T, eds. Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag. Wien: Hollitzer; 2019:69–87.","apa":"Seipelt, A. R., & Klugseder, R. (2019). Digitale Musikanalyse auf Grundlage von MEI-codierten Daten. In Klaus Aringer, C. Utz, & T. Wozonig (Eds.), Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag (pp. 69–87). Wien: Hollitzer.","chicago":"Seipelt, Agnes Regina, and Robert Klugseder. “Digitale Musikanalyse auf Grundlage von MEI-codierten Daten.” In Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag, edited by Klaus Aringer, Christian Utz, and Thomas Wozonig, 69–87. Wien: Hollitzer, 2019.","ieee":"A. R. Seipelt and R. Klugseder, “Digitale Musikanalyse auf Grundlage von MEI-codierten Daten,” in Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag, Klaus Aringer, C. Utz, and T. Wozonig, Eds. Wien: Hollitzer, 2019, pp. 69–87.","short":"A.R. Seipelt, R. Klugseder, in: Klaus Aringer, C. Utz, T. Wozonig (Eds.), Musik im Zusammenhang: Festschrift Peter Revers zum 65. Geburtstag, Hollitzer, Wien, 2019, pp. 69–87."},"year":"2019","type":"book_chapter","date_updated":"2022-01-06T06:52:07Z","_id":"14828"},{"title":"The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019","user_id":"477","department":[{"_id":"79"}],"publisher":"ACM","publication_identifier":{"isbn":["978-1-4503-6184-2"]},"editor":[{"id":"20792","last_name":"Scheideler","full_name":"Scheideler, Christian","first_name":"Christian"},{"last_name":"Berenbrink","full_name":"Berenbrink, Petra","first_name":"Petra"}],"date_created":"2019-11-06T10:43:41Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"status":"public","date_updated":"2022-01-06T06:52:07Z","_id":"14829","doi":"10.1145/3323165","citation":{"ieee":"C. Scheideler and P. Berenbrink, Eds., The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019. ACM, 2019.","short":"C. Scheideler, P. Berenbrink, eds., The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019, ACM, 2019.","mla":"Scheideler, Christian, and Petra Berenbrink, editors. The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019. ACM, 2019, doi:10.1145/3323165.","bibtex":"@book{Scheideler_Berenbrink_2019, title={The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019}, DOI={10.1145/3323165}, publisher={ACM}, year={2019} }","chicago":"Scheideler, Christian, and Petra Berenbrink, eds. The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019. ACM, 2019. https://doi.org/10.1145/3323165.","ama":"Scheideler C, Berenbrink P, eds. The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019. ACM; 2019. doi:10.1145/3323165","apa":"Scheideler, C., & Berenbrink, P. (Eds.). (2019). The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019. ACM. https://doi.org/10.1145/3323165"},"year":"2019","type":"conference_editor","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"page":"177-199","type":"journal_article","year":"2019","citation":{"chicago":"Gmyr, Robert, Jonas Lefevre, and Christian Scheideler. “Self-Stabilizing Metric Graphs.” Theory Comput. Syst. 63, no. 2 (2019): 177–99. https://doi.org/10.1007/s00224-017-9823-4.","ama":"Gmyr R, Lefevre J, Scheideler C. Self-Stabilizing Metric Graphs. Theory Comput Syst. 2019;63(2):177-199. doi:10.1007/s00224-017-9823-4","apa":"Gmyr, R., Lefevre, J., & Scheideler, C. (2019). Self-Stabilizing Metric Graphs. Theory Comput. Syst., 63(2), 177–199. https://doi.org/10.1007/s00224-017-9823-4","bibtex":"@article{Gmyr_Lefevre_Scheideler_2019, title={Self-Stabilizing Metric Graphs}, volume={63}, DOI={10.1007/s00224-017-9823-4}, number={2}, journal={Theory Comput. Syst.}, author={Gmyr, Robert and Lefevre, Jonas and Scheideler, Christian}, year={2019}, pages={177–199} }","mla":"Gmyr, Robert, et al. “Self-Stabilizing Metric Graphs.” Theory Comput. Syst., vol. 63, no. 2, 2019, pp. 177–99, doi:10.1007/s00224-017-9823-4.","short":"R. Gmyr, J. Lefevre, C. Scheideler, Theory Comput. Syst. 63 (2019) 177–199.","ieee":"R. Gmyr, J. Lefevre, and C. Scheideler, “Self-Stabilizing Metric Graphs,” Theory Comput. Syst., vol. 63, no. 2, pp. 177–199, 2019."},"issue":"2","doi":"10.1007/s00224-017-9823-4","_id":"14830","date_updated":"2022-01-06T06:52:07Z","intvolume":" 63","date_created":"2019-11-06T10:54:58Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"status":"public","volume":63,"publication":"Theory Comput. Syst.","department":[{"_id":"79"}],"author":[{"first_name":"Robert","full_name":"Gmyr, Robert","last_name":"Gmyr"},{"last_name":"Lefevre","full_name":"Lefevre, Jonas","first_name":"Jonas"},{"id":"20792","last_name":"Scheideler","full_name":"Scheideler, Christian","first_name":"Christian"}],"user_id":"15504","title":"Self-Stabilizing Metric Graphs"},{"department":[{"_id":"78"}],"publisher":"Paderborn University","author":[{"first_name":"Nithin S.","full_name":"Sabu, Nithin S.","last_name":"Sabu"}],"date_created":"2019-11-06T12:06:09Z","status":"public","title":"FPGA Acceleration of String Search Techniques in Huge Data Sets","user_id":"3118","citation":{"chicago":"Sabu, Nithin S. FPGA Acceleration of String Search Techniques in Huge Data Sets. Paderborn University, 2019.","ama":"Sabu NS. FPGA Acceleration of String Search Techniques in Huge Data Sets. Paderborn University; 2019.","apa":"Sabu, N. S. (2019). FPGA Acceleration of String Search Techniques in Huge Data Sets. Paderborn University.","bibtex":"@book{Sabu_2019, title={FPGA Acceleration of String Search Techniques in Huge Data Sets}, publisher={Paderborn University}, author={Sabu, Nithin S.}, year={2019} }","mla":"Sabu, Nithin S. FPGA Acceleration of String Search Techniques in Huge Data Sets. Paderborn University, 2019.","short":"N.S. Sabu, FPGA Acceleration of String Search Techniques in Huge Data Sets, Paderborn University, 2019.","ieee":"N. S. Sabu, FPGA Acceleration of String Search Techniques in Huge Data Sets. Paderborn University, 2019."},"year":"2019","type":"mastersthesis","supervisor":[{"first_name":"Marco","full_name":"Platzner, Marco","last_name":"Platzner","id":"398"},{"first_name":"Stefan","full_name":"Böttcher, Stefan","last_name":"Böttcher"},{"id":"3118","last_name":"Wiersema","full_name":"Wiersema, Tobias","first_name":"Tobias"}],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:07Z","_id":"14831"},{"date_created":"2019-11-07T14:13:54Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C2","_id":"14"}],"has_accepted_license":"1","status":"public","department":[{"_id":"518"}],"file_date_updated":"2019-11-07T14:13:14Z","publisher":"Universität Paderborn","author":[{"first_name":"Gavin Francis","full_name":"Vaz, Gavin Francis","last_name":"Vaz","id":"30332"}],"file":[{"file_size":1462659,"creator":"florida","file_id":"14850","content_type":"application/pdf","date_updated":"2019-11-07T14:13:14Z","relation":"main_file","success":1,"date_created":"2019-11-07T14:13:14Z","file_name":"PhDThesis_GavinVaz_2019-07-11.pdf","access_level":"closed"}],"title":"Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems","ddc":["040"],"user_id":"477","type":"dissertation","year":"2019","citation":{"short":"G.F. Vaz, Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems, Universität Paderborn, 2019.","ieee":"G. F. Vaz, Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems. Universität Paderborn, 2019.","chicago":"Vaz, Gavin Francis. Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems. Universität Paderborn, 2019.","ama":"Vaz GF. Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems. Universität Paderborn; 2019.","apa":"Vaz, G. F. (2019). Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems. Universität Paderborn.","mla":"Vaz, Gavin Francis. Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems. Universität Paderborn, 2019.","bibtex":"@book{Vaz_2019, title={Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems}, publisher={Universität Paderborn}, author={Vaz, Gavin Francis}, year={2019} }"},"language":[{"iso":"eng"}],"supervisor":[{"last_name":"Plessl","id":"16153","first_name":"Christian","orcid":"0000-0001-5728-9982","full_name":"Plessl, Christian"}],"date_updated":"2022-01-06T06:52:08Z","_id":"14849"},{"language":[{"iso":"eng"}],"supervisor":[{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"citation":{"mla":"Mäcker, Alexander. On Scheduling with Setup Times. 2019, doi:10.17619/UNIPB/1-828.","bibtex":"@book{Mäcker_2019, place={Universität Paderborn}, title={On Scheduling with Setup Times}, DOI={10.17619/UNIPB/1-828}, author={Mäcker, Alexander}, year={2019} }","apa":"Mäcker, A. (2019). On Scheduling with Setup Times. Universität Paderborn. https://doi.org/10.17619/UNIPB/1-828","ama":"Mäcker A. On Scheduling with Setup Times. Universität Paderborn; 2019. doi:10.17619/UNIPB/1-828","chicago":"Mäcker, Alexander. On Scheduling with Setup Times. Universität Paderborn, 2019. https://doi.org/10.17619/UNIPB/1-828.","ieee":"A. Mäcker, On Scheduling with Setup Times. Universität Paderborn, 2019.","short":"A. Mäcker, On Scheduling with Setup Times, Universität Paderborn, 2019."},"year":"2019","type":"dissertation","doi":"10.17619/UNIPB/1-828","_id":"14851","date_updated":"2022-01-06T06:52:08Z","status":"public","date_created":"2019-11-07T14:17:05Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"16","name":"SFB 901 - Subproject C4"},{"name":"SFB 901 - Project Area C","_id":"4"}],"author":[{"first_name":"Alexander","full_name":"Mäcker, Alexander","last_name":"Mäcker","id":"13536"}],"department":[{"_id":"63"}],"related_material":{"link":[{"url":"https://doi.org/10.17619/UNIPB/1-828","relation":"confirmation"}]},"user_id":"15415","title":"On Scheduling with Setup Times","ddc":["000"],"place":"Universität Paderborn"},{"title":"Atomization of Fluids with Ultrasound","place":"Enschede, The Netherlands","editor":[{"first_name":"Joost","full_name":"Lötters, Joost","last_name":"Lötters"},{"last_name":"Urban","full_name":"Urban, Gerald","first_name":"Gerald"}],"publication_status":"published","department":[{"_id":"151"}],"date_updated":"2022-01-06T06:52:08Z","language":[{"iso":"eng"}],"ddc":["620"],"user_id":"22130","abstract":[{"text":"In a variety of industrial applications, liquids are atomized to produce aerosols for further processing. Example applications are the coating of surfaces with paints, the application of ultra-thin adhesive layers and the atomization of fuels for the production of combustible dispersions. In this publication different atomizing principles (standing-wave, capillary-wave, vibrating-mesh) are examined and discussed. Using an optimized standing-wave system, tough liquids with viscosities of up to about 100 Pas could be successfully atomized.","lang":"eng"}],"has_accepted_license":"1","status":"public","date_created":"2019-11-07T15:25:30Z","quality_controlled":"1","author":[{"first_name":"Paul","full_name":"Dunst, Paul","last_name":"Dunst","id":"22130"},{"first_name":"Peter","full_name":"Bornmann, Peter","last_name":"Bornmann"},{"last_name":"Hemsel","id":"210","first_name":"Tobias","full_name":"Hemsel, Tobias"},{"full_name":"Littmann, Walter ","first_name":"Walter ","last_name":"Littmann"},{"last_name":"Sextro","id":"21220","first_name":"Walter","full_name":"Sextro, Walter"}],"file_date_updated":"2019-11-07T15:22:56Z","publication":"Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019)","keyword":["atomization","ultrasound","standing-wave","capillarywave","vibrating-mesh"],"file":[{"file_size":3850591,"file_id":"14853","creator":"pdunst","content_type":"application/pdf","date_updated":"2019-11-07T15:22:56Z","relation":"main_file","success":1,"file_name":"Dunst_MFHS_2019.pdf","date_created":"2019-11-07T15:22:56Z","access_level":"closed"}],"_id":"14852","conference":{"location":"Enschede, The Netherlands","name":"4th Conference on MicroFluidic Handling Systems","start_date":"2019-10-02","end_date":"2019-10-04"},"citation":{"ama":"Dunst P, Bornmann P, Hemsel T, Littmann W, Sextro W. Atomization of Fluids with Ultrasound. In: Lötters J, Urban G, eds. Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019). Enschede, The Netherlands; 2019:140-143.","apa":"Dunst, P., Bornmann, P., Hemsel, T., Littmann, W., & Sextro, W. (2019). Atomization of Fluids with Ultrasound. In J. Lötters & G. Urban (Eds.), Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019) (pp. 140–143). Enschede, The Netherlands.","chicago":"Dunst, Paul, Peter Bornmann, Tobias Hemsel, Walter Littmann, and Walter Sextro. “Atomization of Fluids with Ultrasound.” In Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019), edited by Joost Lötters and Gerald Urban, 140–43. Enschede, The Netherlands, 2019.","mla":"Dunst, Paul, et al. “Atomization of Fluids with Ultrasound.” Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019), edited by Joost Lötters and Gerald Urban, 2019, pp. 140–43.","bibtex":"@inproceedings{Dunst_Bornmann_Hemsel_Littmann_Sextro_2019, place={Enschede, The Netherlands}, title={Atomization of Fluids with Ultrasound}, booktitle={Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019)}, author={Dunst, Paul and Bornmann, Peter and Hemsel, Tobias and Littmann, Walter and Sextro, Walter}, editor={Lötters, Joost and Urban, GeraldEditors}, year={2019}, pages={140–143} }","short":"P. Dunst, P. Bornmann, T. Hemsel, W. Littmann, W. Sextro, in: J. Lötters, G. Urban (Eds.), Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019), Enschede, The Netherlands, 2019, pp. 140–143.","ieee":"P. Dunst, P. Bornmann, T. Hemsel, W. Littmann, and W. Sextro, “Atomization of Fluids with Ultrasound,” in Conference Proceedings - The 4th Conference on MicroFluidic Handling Systems (MFHS2019), Enschede, The Netherlands, 2019, pp. 140–143."},"year":"2019","type":"conference","page":"140-143"},{"title":"Simultaneous Spectral and Spatial Modulation for Color Printing and Holography Using All-dielectric Metasurfaces","publication_identifier":{"issn":["1530-6984","1530-6992"]},"publication_status":"published","department":[{"_id":"15"},{"_id":"230"},{"_id":"289"}],"doi":"10.1021/acs.nanolett.9b03957","date_updated":"2022-01-06T06:52:09Z","language":[{"iso":"eng"}],"user_id":"30525","article_type":"original","volume":19,"status":"public","date_created":"2019-11-10T10:18:37Z","quality_controlled":"1","author":[{"full_name":"Wei, Qunshuo","first_name":"Qunshuo","last_name":"Wei"},{"full_name":"Sain, Basudeb","first_name":"Basudeb","last_name":"Sain"},{"full_name":"Wang, Yongtian","first_name":"Yongtian","last_name":"Wang"},{"first_name":"Bernhard","full_name":"Reineke, Bernhard","last_name":"Reineke"},{"last_name":"Li","first_name":"Xiaowei","full_name":"Li, Xiaowei"},{"first_name":"Lingling","full_name":"Huang, Lingling","last_name":"Huang"},{"id":"30525","last_name":"Zentgraf","full_name":"Zentgraf, Thomas","orcid":"0000-0002-8662-1101","first_name":"Thomas"}],"publication":"Nano Letters","issue":"12","intvolume":" 19","_id":"14870","citation":{"ieee":"Q. Wei et al., “Simultaneous Spectral and Spatial Modulation for Color Printing and Holography Using All-dielectric Metasurfaces,” Nano Letters, vol. 19, no. 12, pp. 8964–8971, 2019.","short":"Q. Wei, B. Sain, Y. Wang, B. Reineke, X. Li, L. Huang, T. Zentgraf, Nano Letters 19 (2019) 8964–8971.","mla":"Wei, Qunshuo, et al. “Simultaneous Spectral and Spatial Modulation for Color Printing and Holography Using All-Dielectric Metasurfaces.” Nano Letters, vol. 19, no. 12, 2019, pp. 8964–8971, doi:10.1021/acs.nanolett.9b03957.","bibtex":"@article{Wei_Sain_Wang_Reineke_Li_Huang_Zentgraf_2019, title={Simultaneous Spectral and Spatial Modulation for Color Printing and Holography Using All-dielectric Metasurfaces}, volume={19}, DOI={10.1021/acs.nanolett.9b03957}, number={12}, journal={Nano Letters}, author={Wei, Qunshuo and Sain, Basudeb and Wang, Yongtian and Reineke, Bernhard and Li, Xiaowei and Huang, Lingling and Zentgraf, Thomas}, year={2019}, pages={8964–8971} }","ama":"Wei Q, Sain B, Wang Y, et al. Simultaneous Spectral and Spatial Modulation for Color Printing and Holography Using All-dielectric Metasurfaces. Nano Letters. 2019;19(12):8964–8971. doi:10.1021/acs.nanolett.9b03957","apa":"Wei, Q., Sain, B., Wang, Y., Reineke, B., Li, X., Huang, L., & Zentgraf, T. (2019). Simultaneous Spectral and Spatial Modulation for Color Printing and Holography Using All-dielectric Metasurfaces. Nano Letters, 19(12), 8964–8971. https://doi.org/10.1021/acs.nanolett.9b03957","chicago":"Wei, Qunshuo, Basudeb Sain, Yongtian Wang, Bernhard Reineke, Xiaowei Li, Lingling Huang, and Thomas Zentgraf. “Simultaneous Spectral and Spatial Modulation for Color Printing and Holography Using All-Dielectric Metasurfaces.” Nano Letters 19, no. 12 (2019): 8964–8971. https://doi.org/10.1021/acs.nanolett.9b03957."},"year":"2019","type":"journal_article","page":"8964–8971"},{"place":"Cham","title":"Exploiting Counterfactuals for Scalable Stochastic Optimization","user_id":"38910","author":[{"full_name":"Kuhlemann, Stefan","first_name":"Stefan","id":"38910","last_name":"Kuhlemann"},{"first_name":"Meinolf","full_name":"Sellmann, Meinolf","last_name":"Sellmann"},{"last_name":"Tierney","first_name":"Kevin","full_name":"Tierney, Kevin"}],"department":[{"_id":"277"}],"publication":"Lecture Notes in Computer Science","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030300470","9783030300487"]},"status":"public","date_created":"2019-11-12T07:45:53Z","date_updated":"2022-01-06T06:52:09Z","_id":"14890","doi":"10.1007/978-3-030-30048-7_40","year":"2019","type":"book_chapter","citation":{"ieee":"S. Kuhlemann, M. Sellmann, and K. Tierney, “Exploiting Counterfactuals for Scalable Stochastic Optimization,” in Lecture Notes in Computer Science, Cham, 2019.","short":"S. Kuhlemann, M. Sellmann, K. Tierney, in: Lecture Notes in Computer Science, Cham, 2019.","mla":"Kuhlemann, Stefan, et al. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” Lecture Notes in Computer Science, 2019, doi:10.1007/978-3-030-30048-7_40.","bibtex":"@inbook{Kuhlemann_Sellmann_Tierney_2019, place={Cham}, title={Exploiting Counterfactuals for Scalable Stochastic Optimization}, DOI={10.1007/978-3-030-30048-7_40}, booktitle={Lecture Notes in Computer Science}, author={Kuhlemann, Stefan and Sellmann, Meinolf and Tierney, Kevin}, year={2019} }","apa":"Kuhlemann, S., Sellmann, M., & Tierney, K. (2019). Exploiting Counterfactuals for Scalable Stochastic Optimization. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-030-30048-7_40","ama":"Kuhlemann S, Sellmann M, Tierney K. Exploiting Counterfactuals for Scalable Stochastic Optimization. In: Lecture Notes in Computer Science. Cham; 2019. doi:10.1007/978-3-030-30048-7_40","chicago":"Kuhlemann, Stefan, Meinolf Sellmann, and Kevin Tierney. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” In Lecture Notes in Computer Science. Cham, 2019. https://doi.org/10.1007/978-3-030-30048-7_40."},"language":[{"iso":"eng"}]},{"title":"ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules","user_id":"5786","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"publication_status":"published","date_created":"2019-11-12T12:20:56Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"status":"public","publication":"IEEE Transactions on Software Engineering","department":[{"_id":"76"},{"_id":"34"},{"_id":"26"}],"author":[{"full_name":"Dann, Andreas","first_name":"Andreas","last_name":"Dann"},{"orcid":"0000-0001-9848-2017","full_name":"Hermann, Ben","first_name":"Ben","id":"66173","last_name":"Hermann"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"doi":"10.1109/tse.2019.2931331","date_updated":"2022-01-06T06:52:10Z","_id":"14896","page":"1-1","year":"2019","type":"journal_article","citation":{"ieee":"A. Dann, B. Hermann, and E. Bodden, “ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules,” IEEE Transactions on Software Engineering, pp. 1–1, 2019, doi: 10.1109/tse.2019.2931331.","short":"A. Dann, B. Hermann, E. Bodden, IEEE Transactions on Software Engineering (2019) 1–1.","bibtex":"@article{Dann_Hermann_Bodden_2019, title={ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules}, DOI={10.1109/tse.2019.2931331}, journal={IEEE Transactions on Software Engineering}, author={Dann, Andreas and Hermann, Ben and Bodden, Eric}, year={2019}, pages={1–1} }","mla":"Dann, Andreas, et al. “ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules.” IEEE Transactions on Software Engineering, 2019, pp. 1–1, doi:10.1109/tse.2019.2931331.","chicago":"Dann, Andreas, Ben Hermann, and Eric Bodden. “ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules.” IEEE Transactions on Software Engineering, 2019, 1–1. https://doi.org/10.1109/tse.2019.2931331.","ama":"Dann A, Hermann B, Bodden E. ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules. IEEE Transactions on Software Engineering. Published online 2019:1-1. doi:10.1109/tse.2019.2931331","apa":"Dann, A., Hermann, B., & Bodden, E. (2019). ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules. IEEE Transactions on Software Engineering, 1–1. https://doi.org/10.1109/tse.2019.2931331"},"language":[{"iso":"eng"}]},{"main_file_link":[{"url":"https://thewhitespace.de/publications/dhb19-sootdiff.pdf"}],"citation":{"ama":"Dann A, Hermann B, Bodden E. SootDiff: bytecode comparison across different Java compilers. In: Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis - SOAP 2019. ; 2019. doi:10.1145/3315568.3329966","apa":"Dann, A., Hermann, B., & Bodden, E. (2019). SootDiff: bytecode comparison across different Java compilers. Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis - SOAP 2019. https://doi.org/10.1145/3315568.3329966","chicago":"Dann, Andreas, Ben Hermann, and Eric Bodden. “SootDiff: Bytecode Comparison across Different Java Compilers.” In Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis - SOAP 2019, 2019. https://doi.org/10.1145/3315568.3329966.","bibtex":"@inproceedings{Dann_Hermann_Bodden_2019, title={SootDiff: bytecode comparison across different Java compilers}, DOI={10.1145/3315568.3329966}, booktitle={Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis - SOAP 2019}, author={Dann, Andreas and Hermann, Ben and Bodden, Eric}, year={2019} }","mla":"Dann, Andreas, et al. “SootDiff: Bytecode Comparison across Different Java Compilers.” Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis - SOAP 2019, 2019, doi:10.1145/3315568.3329966.","short":"A. Dann, B. Hermann, E. Bodden, in: Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis - SOAP 2019, 2019.","ieee":"A. Dann, B. Hermann, and E. Bodden, “SootDiff: bytecode comparison across different Java compilers,” 2019, doi: 10.1145/3315568.3329966."},"year":"2019","type":"conference","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:10Z","_id":"14897","doi":"10.1145/3315568.3329966","author":[{"full_name":"Dann, Andreas","first_name":"Andreas","last_name":"Dann"},{"id":"66173","last_name":"Hermann","orcid":"0000-0001-9848-2017","full_name":"Hermann, Ben","first_name":"Ben"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"publication":"Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis - SOAP 2019","department":[{"_id":"76"},{"_id":"34"},{"_id":"26"}],"publication_status":"published","publication_identifier":{"isbn":["9781450367202"]},"status":"public","date_created":"2019-11-12T12:21:11Z","title":"SootDiff: bytecode comparison across different Java compilers","user_id":"5786"},{"year":"2019","citation":{"ieee":"S. Kruger and B. Hermann, “Can an Online Service Predict Gender? On the State-of-the-Art in Gender Identification from Texts,” 2019, doi: 10.1109/ge.2019.00012.","short":"S. Kruger, B. Hermann, in: 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE), 2019.","mla":"Kruger, Stefan, and Ben Hermann. “Can an Online Service Predict Gender? On the State-of-the-Art in Gender Identification from Texts.” 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE), 2019, doi:10.1109/ge.2019.00012.","bibtex":"@inproceedings{Kruger_Hermann_2019, title={Can an Online Service Predict Gender? On the State-of-the-Art in Gender Identification from Texts}, DOI={10.1109/ge.2019.00012}, booktitle={2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE)}, author={Kruger, Stefan and Hermann, Ben}, year={2019} }","chicago":"Kruger, Stefan, and Ben Hermann. “Can an Online Service Predict Gender? On the State-of-the-Art in Gender Identification from Texts.” In 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE), 2019. https://doi.org/10.1109/ge.2019.00012.","ama":"Kruger S, Hermann B. Can an Online Service Predict Gender? On the State-of-the-Art in Gender Identification from Texts. In: 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE). ; 2019. doi:10.1109/ge.2019.00012","apa":"Kruger, S., & Hermann, B. (2019). Can an Online Service Predict Gender? On the State-of-the-Art in Gender Identification from Texts. 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE). https://doi.org/10.1109/ge.2019.00012"},"type":"conference","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:10Z","_id":"14899","doi":"10.1109/ge.2019.00012","department":[{"_id":"76"},{"_id":"34"},{"_id":"26"}],"publication":"2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE)","author":[{"last_name":"Kruger","first_name":"Stefan","full_name":"Kruger, Stefan"},{"first_name":"Ben","full_name":"Hermann, Ben","orcid":"0000-0001-9848-2017","last_name":"Hermann","id":"66173"}],"publication_identifier":{"isbn":["9781728122458"]},"publication_status":"published","date_created":"2019-11-12T12:22:48Z","status":"public","title":"Can an Online Service Predict Gender? On the State-of-the-Art in Gender Identification from Texts","user_id":"5786"},{"ddc":["330"],"user_id":"68607","volume":42,"has_accepted_license":"1","status":"public","date_created":"2019-11-13T08:15:09Z","author":[{"last_name":"Mair","full_name":"Mair, Christina","first_name":"Christina"},{"first_name":"Wolfram","full_name":"Scheffler, Wolfram","last_name":"Scheffler"},{"full_name":"Senger, Isabell","first_name":"Isabell","last_name":"Senger"},{"full_name":"Sureth-Sloane, Caren","first_name":"Caren","id":"530","last_name":"Sureth-Sloane"}],"file_date_updated":"2021-03-09T09:35:37Z","file":[{"file_id":"21423","creator":"kschulz2","file_size":1293280,"relation":"main_file","success":1,"date_updated":"2021-03-09T09:35:37Z","content_type":"application/pdf","date_created":"2021-03-09T09:35:37Z","file_name":"TAF Working Paper No. 42.pdf","access_level":"closed"}],"intvolume":" 42","_id":"14902","type":"working_paper","citation":{"chicago":"Mair, Christina, Wolfram Scheffler, Isabell Senger, and Caren Sureth-Sloane. Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern. Vol. 42. TAF Wokring Paper Series, 2019.","ama":"Mair C, Scheffler W, Senger I, Sureth-Sloane C. Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern. Vol 42.; 2019.","apa":"Mair, C., Scheffler, W., Senger, I., & Sureth-Sloane, C. (2019). Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern (Vol. 42).","bibtex":"@book{Mair_Scheffler_Senger_Sureth-Sloane_2019, series={TAF Wokring Paper Series}, title={Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern}, volume={42}, author={Mair, Christina and Scheffler, Wolfram and Senger, Isabell and Sureth-Sloane, Caren}, year={2019}, collection={TAF Wokring Paper Series} }","mla":"Mair, Christina, et al. Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern. Vol. 42, 2019.","short":"C. Mair, W. Scheffler, I. Senger, C. Sureth-Sloane, Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern, 2019.","ieee":"C. Mair, W. Scheffler, I. Senger, and C. Sureth-Sloane, Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern, vol. 42. 2019."},"year":"2019","main_file_link":[{"open_access":"1"}],"title":"Analyse der Veränderung der zwischenstaatlichen Gewinnaufteilung bei Einführung einer standardisierten Gewinnverteilungsmethode am Beispiel des Einsatzes von 3D-Druckern","publication_status":"published","department":[{"_id":"187"},{"_id":"635"}],"oa":"1","date_updated":"2022-01-06T06:52:10Z","language":[{"iso":"ger"}],"series_title":"TAF Wokring Paper Series"},{"title":"Steuerkomplexität im Vergleich zwischen Deutschland und Österreich - Eine Analyse des Status quo","user_id":"68607","abstract":[{"lang":"ger","text":"Die Komplexität von Steuersystemen gewinnt in der Debatte um den internationalen Steuerwettbewerb zunehmend an Bedeutung. Im vorliegenden Beitrag erfolgt, basierend auf den Befragungsdaten, die dem Tax Complexity Index von Hoppe et al. (2019) zugrunde liegen, eine umfassende Gegenüberstellung der Komplexität der Steuersysteme von Deutschland und Österreich unter Berücksichtigung der Mittelwerte aller vom Index abgedeckten Länder. Die Steuergesetze weisen sowohl in Deutschland als auch in Österreich einen verhältnismäßig hohen Grad an Komplexität auf. Bei den steuerlichen Rahmenbedingungen fällt der Grad an Komplexität in beiden Ländern dagegen niedrig\r\naus, wobei Österreich im Durchschnitt weniger komplex ist als Deutschland."},{"text":"The complexity of tax systems is becoming increasingly important in the debate on international tax competition. Based on the underlying survey data of the Tax Complexity Index of Hoppe et al. (2019), this article provides a comprehensive comparison of the complexity of Germany’s and Austria’s tax systems while also taking the mean values of all countries covered by the index into account. In both Germany and Austria, the tax code is characterized by a relatively high degree of complexity. In contrast, the tax framework has a low level of complexity in both countries, with Austria being on average less complex than Germany.","lang":"eng"}],"publication_status":"published","volume":96,"date_created":"2019-11-13T08:28:38Z","status":"public","publication":"Steuer und Wirtschaft","department":[{"_id":"187"}],"author":[{"first_name":"Thomas","full_name":"Hoppe, Thomas","last_name":"Hoppe","id":"22671"},{"last_name":"Rechbauer","first_name":"Martina","full_name":"Rechbauer, Martina"},{"first_name":"Susann","full_name":"Sturm, Susann","last_name":"Sturm"}],"quality_controlled":"1","issue":"4","_id":"14904","date_updated":"2022-01-06T06:52:10Z","intvolume":" 96","page":"397-412","year":"2019","type":"journal_article","citation":{"ama":"Hoppe T, Rechbauer M, Sturm S. Steuerkomplexität im Vergleich zwischen Deutschland und Österreich - Eine Analyse des Status quo. Steuer und Wirtschaft. 2019;96(4):397-412.","apa":"Hoppe, T., Rechbauer, M., & Sturm, S. (2019). Steuerkomplexität im Vergleich zwischen Deutschland und Österreich - Eine Analyse des Status quo. Steuer und Wirtschaft, 96(4), 397–412.","chicago":"Hoppe, Thomas, Martina Rechbauer, and Susann Sturm. “Steuerkomplexität im Vergleich zwischen Deutschland und Österreich - Eine Analyse des Status quo.” Steuer und Wirtschaft 96, no. 4 (2019): 397–412.","bibtex":"@article{Hoppe_Rechbauer_Sturm_2019, title={Steuerkomplexität im Vergleich zwischen Deutschland und Österreich - Eine Analyse des Status quo}, volume={96}, number={4}, journal={Steuer und Wirtschaft}, author={Hoppe, Thomas and Rechbauer, Martina and Sturm, Susann}, year={2019}, pages={397–412} }","mla":"Hoppe, Thomas, et al. “Steuerkomplexität im Vergleich zwischen Deutschland und Österreich - Eine Analyse des Status quo.” Steuer und Wirtschaft, vol. 96, no. 4, 2019, pp. 397–412.","short":"T. Hoppe, M. Rechbauer, S. Sturm, Steuer und Wirtschaft 96 (2019) 397–412.","ieee":"T. Hoppe, M. Rechbauer, and S. Sturm, “Steuerkomplexität im Vergleich zwischen Deutschland und Österreich - Eine Analyse des Status quo,” Steuer und Wirtschaft, vol. 96, no. 4, pp. 397–412, 2019."},"language":[{"iso":"ger"}]},{"_id":"14905","intvolume":" 12","issue":"1","main_file_link":[{"url":"https://link.springer.com/article/10.1007/s40685-019-0093-7"}],"citation":{"ama":"Kourouxous T, Bauer T. Violations of Dominance in Decision-Making. Business Research. 2019;12(1):209-239. doi:10.1007/s40685-019-0093-7","apa":"Kourouxous, T., & Bauer, T. (2019). Violations of Dominance in Decision-Making. Business Research, 12(1), 209–239. https://doi.org/10.1007/s40685-019-0093-7","chicago":"Kourouxous, Thomas, and Thomas Bauer. “Violations of Dominance in Decision-Making.” Business Research 12, no. 1 (2019): 209–39. https://doi.org/10.1007/s40685-019-0093-7.","bibtex":"@article{Kourouxous_Bauer_2019, title={Violations of Dominance in Decision-Making}, volume={12}, DOI={10.1007/s40685-019-0093-7}, number={1}, journal={Business Research}, author={Kourouxous, Thomas and Bauer, Thomas}, year={2019}, pages={209–239} }","mla":"Kourouxous, Thomas, and Thomas Bauer. “Violations of Dominance in Decision-Making.” Business Research, vol. 12, no. 1, 2019, pp. 209–39, doi:10.1007/s40685-019-0093-7.","short":"T. Kourouxous, T. Bauer, Business Research 12 (2019) 209–239.","ieee":"T. Kourouxous and T. Bauer, “Violations of Dominance in Decision-Making,” Business Research, vol. 12, no. 1, pp. 209–239, 2019."},"year":"2019","type":"journal_article","page":"209-239","abstract":[{"text":"A key premise underlying most of the economic literature is that rational decision-makers will choose dominant strategies over dominated alternatives. However, prior literature in various disciplines including business, psychology, and economics document a series of phenomena associated with violations of the dominance principle in decision-making. In this comprehensive review, we discuss conditions under which people violate the dominance principle in decision-making. When presenting violations of dominance in empirical and experimental studies, we differentiate between absolute, statewise, and stochastic (first- and second-order) violations of dominance. Furthermore, we categorize the literature by the leading causes for dominance violations: framing, reference points, certainty effects, bounded rationality, and emotional responses.","lang":"eng"}],"user_id":"68607","author":[{"id":"66936","last_name":"Kourouxous","full_name":"Kourouxous, Thomas","first_name":"Thomas"},{"first_name":"Thomas","full_name":"Bauer, Thomas","last_name":"Bauer"}],"publication":"Business Research","volume":12,"status":"public","date_created":"2019-11-13T08:27:11Z","date_updated":"2022-01-06T06:52:10Z","doi":"10.1007/s40685-019-0093-7","language":[{"iso":"eng"}],"title":"Violations of Dominance in Decision-Making","department":[{"_id":"187"},{"_id":"635"}],"publication_status":"published","publication_identifier":{"issn":["2198-3402","2198-2627"]}},{"_id":"14909","type":"working_paper","year":"2019","citation":{"chicago":"Hoppe, Thomas, Deborah Schanz, Susann Sturm, and Caren Sureth-Sloane. Measuring Tax Complexity Across Countries: A Survey Study on MNCs, 2019. https://doi.org/10.2139/ssrn.3469663.","ama":"Hoppe T, Schanz D, Sturm S, Sureth-Sloane C. Measuring Tax Complexity Across Countries: A Survey Study on MNCs.; 2019. doi:10.2139/ssrn.3469663","apa":"Hoppe, T., Schanz, D., Sturm, S., & Sureth-Sloane, C. (2019). Measuring Tax Complexity Across Countries: A Survey Study on MNCs. https://doi.org/10.2139/ssrn.3469663","bibtex":"@book{Hoppe_Schanz_Sturm_Sureth-Sloane_2019, title={Measuring Tax Complexity Across Countries: A Survey Study on MNCs}, DOI={10.2139/ssrn.3469663}, author={Hoppe, Thomas and Schanz, Deborah and Sturm, Susann and Sureth-Sloane, Caren}, year={2019} }","mla":"Hoppe, Thomas, et al. Measuring Tax Complexity Across Countries: A Survey Study on MNCs. 2019, doi:10.2139/ssrn.3469663.","short":"T. Hoppe, D. Schanz, S. Sturm, C. Sureth-Sloane, Measuring Tax Complexity Across Countries: A Survey Study on MNCs, 2019.","ieee":"T. Hoppe, D. Schanz, S. Sturm, and C. Sureth-Sloane, Measuring Tax Complexity Across Countries: A Survey Study on MNCs. 2019."},"main_file_link":[{"url":"https://ssrn.com/abstract=3469663"}],"ddc":["330"],"user_id":"61801","abstract":[{"lang":"eng","text":"This paper introduces an index that captures the complexity of countries’ corporate income tax systems faced by multinational corporations. It is based on surveys of highly experienced tax consultants of the largest international tax services networks. The index, called the Tax Complexity Index (TCI), is composed of a tax code subindex covering tax regulations and a tax framework subindex covering tax processes and features. For a sample of 100 countries for the year 2016, we find that the level of tax complexity varies considerably across countries, while tax code and framework complexity also vary within countries. From a global perspective, tax complexity is strongly driven by the complexity of both transfer pricing regulations in the tax code and tax audits in the tax framework. When analyzing the associations with other country characteristics, we identify different correlation patterns. For example, tax framework complexity is negatively associated with countries’ governance, suggesting that strongly governed countries tend to have less complex tax frameworks, while tax code complexity is positively associated with the statutory tax rate, indicating that high tax countries tend to have more complex tax codes. However, none of the observed associations are very strong. We conclude that tax complexity represents a distinct country characteristic and propose the use of our TCI and its subindices in future research."}],"jel":["H20","H25","C83","O57"],"date_created":"2019-11-13T08:35:50Z","status":"public","has_accepted_license":"1","keyword":["Tax Complexity","Tax Index","Tax System","Multinational Corporations","Tax Consultants"],"file_date_updated":"2019-11-13T08:38:31Z","author":[{"last_name":"Hoppe","id":"22671","first_name":"Thomas","full_name":"Hoppe, Thomas"},{"first_name":"Deborah","full_name":"Schanz, Deborah","last_name":"Schanz"},{"last_name":"Sturm","full_name":"Sturm, Susann","first_name":"Susann"},{"first_name":"Caren","full_name":"Sureth-Sloane, Caren","last_name":"Sureth-Sloane","id":"530"}],"file":[{"content_type":"application/pdf","date_updated":"2019-11-13T08:38:31Z","relation":"main_file","success":1,"file_size":1187488,"creator":"hoppet","file_id":"14912","access_level":"closed","file_name":"SSRN-id3469663.pdf","date_created":"2019-11-13T08:38:31Z"}],"doi":"10.2139/ssrn.3469663","date_updated":"2022-01-06T06:52:11Z","language":[{"iso":"eng"}],"title":"Measuring Tax Complexity Across Countries: A Survey Study on MNCs","department":[{"_id":"187"},{"_id":"635"}]},{"title":"Using Impact Evaluation to Examine Domestic and International Cooperative Compliance Programs","user_id":"68607","author":[{"first_name":"Alicja","full_name":"Majdanska, Alicja","last_name":"Majdanska"},{"first_name":"Yuchen","full_name":"Wu, Yuchen","last_name":"Wu"}],"publication":"Tax Notes International","department":[{"_id":"187"}],"volume":93,"publication_status":"published","status":"public","date_created":"2019-11-13T08:37:26Z","_id":"14910","intvolume":" 93","date_updated":"2022-01-06T06:52:11Z","issue":"10","year":"2019","citation":{"ieee":"A. Majdanska and Y. Wu, “Using Impact Evaluation to Examine Domestic and International Cooperative Compliance Programs,” Tax Notes International, vol. 93, no. 10, pp. 1045–1065, 2019.","short":"A. Majdanska, Y. Wu, Tax Notes International 93 (2019) 1045–1065.","bibtex":"@article{Majdanska_Wu_2019, title={Using Impact Evaluation to Examine Domestic and International Cooperative Compliance Programs}, volume={93}, number={10}, journal={Tax Notes International}, author={Majdanska, Alicja and Wu, Yuchen}, year={2019}, pages={1045–1065} }","mla":"Majdanska, Alicja, and Yuchen Wu. “Using Impact Evaluation to Examine Domestic and International Cooperative Compliance Programs.” Tax Notes International, vol. 93, no. 10, 2019, pp. 1045–65.","ama":"Majdanska A, Wu Y. Using Impact Evaluation to Examine Domestic and International Cooperative Compliance Programs. Tax Notes International. 2019;93(10):1045-1065.","apa":"Majdanska, A., & Wu, Y. (2019). Using Impact Evaluation to Examine Domestic and International Cooperative Compliance Programs. Tax Notes International, 93(10), 1045–1065.","chicago":"Majdanska, Alicja, and Yuchen Wu. “Using Impact Evaluation to Examine Domestic and International Cooperative Compliance Programs.” Tax Notes International 93, no. 10 (2019): 1045–65."},"type":"journal_article","page":"1045-1065","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:13Z","oa":"1","doi":"10.1364/osac.2.003288","department":[{"_id":"61"},{"_id":"230"}],"project":[{"name":"TRR 142","_id":"53"},{"_id":"56","name":"TRR 142 - Project Area C"},{"_id":"75","name":"TRR 142 - Subproject C5"}],"publication_status":"published","publication_identifier":{"issn":["2578-7519"]},"title":"Coupled microstrip-cavities under oblique incidence of semi-guided waves: a lossless integrated optical add-drop filter","main_file_link":[{"url":"https://www.osapublishing.org/osac/abstract.cfm?uri=osac-2-11-3288","open_access":"1"}],"type":"journal_article","citation":{"short":"L. Ebers, M. Hammer, M.B. Berkemeier, A. Menzel, J. Förstner, OSA Continuum 2 (2019) 3288.","ieee":"L. Ebers, M. Hammer, M. B. Berkemeier, A. Menzel, and J. Förstner, “Coupled microstrip-cavities under oblique incidence of semi-guided waves: a lossless integrated optical add-drop filter,” OSA Continuum, vol. 2, p. 3288, 2019.","chicago":"Ebers, Lena, Manfred Hammer, Manuel B. Berkemeier, Alexander Menzel, and Jens Förstner. “Coupled Microstrip-Cavities under Oblique Incidence of Semi-Guided Waves: A Lossless Integrated Optical Add-Drop Filter.” OSA Continuum 2 (2019): 3288. https://doi.org/10.1364/osac.2.003288.","apa":"Ebers, L., Hammer, M., Berkemeier, M. B., Menzel, A., & Förstner, J. (2019). Coupled microstrip-cavities under oblique incidence of semi-guided waves: a lossless integrated optical add-drop filter. OSA Continuum, 2, 3288. https://doi.org/10.1364/osac.2.003288","ama":"Ebers L, Hammer M, Berkemeier MB, Menzel A, Förstner J. Coupled microstrip-cavities under oblique incidence of semi-guided waves: a lossless integrated optical add-drop filter. OSA Continuum. 2019;2:3288. doi:10.1364/osac.2.003288","mla":"Ebers, Lena, et al. “Coupled Microstrip-Cavities under Oblique Incidence of Semi-Guided Waves: A Lossless Integrated Optical Add-Drop Filter.” OSA Continuum, vol. 2, 2019, p. 3288, doi:10.1364/osac.2.003288.","bibtex":"@article{Ebers_Hammer_Berkemeier_Menzel_Förstner_2019, title={Coupled microstrip-cavities under oblique incidence of semi-guided waves: a lossless integrated optical add-drop filter}, volume={2}, DOI={10.1364/osac.2.003288}, journal={OSA Continuum}, author={Ebers, Lena and Hammer, Manfred and Berkemeier, Manuel B. and Menzel, Alexander and Förstner, Jens}, year={2019}, pages={3288} }"},"year":"2019","page":"3288","intvolume":" 2","_id":"14990","file":[{"date_created":"2019-11-15T15:33:26Z","file_name":"2019-11-12 Ebers - Add Drop Filter - OSA continuum (official version).pdf","access_level":"open_access","creator":"fossie","file_id":"15012","file_size":882779,"relation":"main_file","date_updated":"2019-11-15T15:33:26Z","content_type":"application/pdf"}],"author":[{"first_name":"Lena","full_name":"Ebers, Lena","last_name":"Ebers","id":"40428"},{"id":"48077","last_name":"Hammer","full_name":"Hammer, Manfred","orcid":"0000-0002-6331-9348","first_name":"Manfred"},{"last_name":"Berkemeier","full_name":"Berkemeier, Manuel B.","first_name":"Manuel B."},{"last_name":"Menzel","first_name":"Alexander","full_name":"Menzel, Alexander"},{"last_name":"Förstner","id":"158","first_name":"Jens","orcid":"0000-0001-7059-9862","full_name":"Förstner, Jens"}],"file_date_updated":"2019-11-15T15:33:26Z","publication":"OSA Continuum","keyword":["tet_topic_waveguides"],"status":"public","has_accepted_license":"1","date_created":"2019-11-15T07:21:20Z","volume":2,"abstract":[{"lang":"eng","text":"We investigate optical microresonators consisting of either one or two coupled rectangular strips between upper and lower slab waveguides. The cavities are evanescently excited under oblique angles by thin-film guided, in-plane unguided waves supported by one of the slab waveguides. Beyond a specific incidence angle, losses are fully suppressed. The interaction between the guided mode of the cavity-strip and the incoming slab modes leads to resonant behavior for specific incidence angles and gaps. For a single cavity, at resonance, the input power is equally split among each of the four output ports, while for two cavities an add-drop filter can be realized that, at resonance, routes the incoming power completely to the forward drop waveguide via the cavity. For both applications, the strength of the interaction is controlled by the gaps between cavities and waveguides."}],"user_id":"158","ddc":["530"]},{"user_id":"315","title":"Fuzzy Sets in Data Analysis: From Statistical Foundations to Machine Learning","date_created":"2019-11-15T10:11:37Z","status":"public","publication_status":"published","publication_identifier":{"issn":["1556-603X","1556-6048"]},"department":[{"_id":"34"},{"_id":"355"}],"publication":"IEEE Computational Intelligence Magazine","author":[{"last_name":"Couso","full_name":"Couso, Ines","first_name":"Ines"},{"last_name":"Borgelt","full_name":"Borgelt, Christian","first_name":"Christian"},{"id":"48129","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","first_name":"Eyke"},{"first_name":"Rudolf","full_name":"Kruse, Rudolf","last_name":"Kruse"}],"doi":"10.1109/mci.2018.2881642","date_updated":"2022-01-06T06:52:13Z","_id":"15001","language":[{"iso":"eng"}],"page":"31-44","citation":{"ieee":"I. Couso, C. Borgelt, E. Hüllermeier, and R. Kruse, “Fuzzy Sets in Data Analysis: From Statistical Foundations to Machine Learning,” IEEE Computational Intelligence Magazine, pp. 31–44, 2019.","short":"I. Couso, C. Borgelt, E. Hüllermeier, R. Kruse, IEEE Computational Intelligence Magazine (2019) 31–44.","bibtex":"@article{Couso_Borgelt_Hüllermeier_Kruse_2019, title={Fuzzy Sets in Data Analysis: From Statistical Foundations to Machine Learning}, DOI={10.1109/mci.2018.2881642}, journal={IEEE Computational Intelligence Magazine}, author={Couso, Ines and Borgelt, Christian and Hüllermeier, Eyke and Kruse, Rudolf}, year={2019}, pages={31–44} }","mla":"Couso, Ines, et al. “Fuzzy Sets in Data Analysis: From Statistical Foundations to Machine Learning.” IEEE Computational Intelligence Magazine, 2019, pp. 31–44, doi:10.1109/mci.2018.2881642.","chicago":"Couso, Ines, Christian Borgelt, Eyke Hüllermeier, and Rudolf Kruse. “Fuzzy Sets in Data Analysis: From Statistical Foundations to Machine Learning.” IEEE Computational Intelligence Magazine, 2019, 31–44. https://doi.org/10.1109/mci.2018.2881642.","apa":"Couso, I., Borgelt, C., Hüllermeier, E., & Kruse, R. (2019). Fuzzy Sets in Data Analysis: From Statistical Foundations to Machine Learning. IEEE Computational Intelligence Magazine, 31–44. https://doi.org/10.1109/mci.2018.2881642","ama":"Couso I, Borgelt C, Hüllermeier E, Kruse R. Fuzzy Sets in Data Analysis: From Statistical Foundations to Machine Learning. IEEE Computational Intelligence Magazine. 2019:31-44. doi:10.1109/mci.2018.2881642"},"year":"2019","type":"journal_article"},{"file":[{"file_size":837808,"creator":"lettmann","file_id":"16155","content_type":"application/pdf","date_updated":"2020-02-28T12:45:26Z","relation":"main_file","file_name":"multi-target-prediction.pdf","date_created":"2020-02-28T12:43:39Z","access_level":"open_access"}],"author":[{"full_name":"Waegeman, Willem","first_name":"Willem","last_name":"Waegeman"},{"last_name":"Dembczynski","first_name":"Krzysztof","full_name":"Dembczynski, Krzysztof"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","id":"48129"}],"publication":"Data Mining and Knowledge Discovery","file_date_updated":"2020-02-28T12:45:26Z","status":"public","has_accepted_license":"1","date_created":"2019-11-15T10:16:34Z","volume":33,"abstract":[{"lang":"eng","text":"Many problem settings in machine learning are concerned with the simultaneous prediction of multiple target variables of diverse type. Amongst others, such problem settings arise in multivariate regression, multi-label classification, multi-task learning, dyadic prediction, zero-shot learning, network inference, and matrix completion. These subfields of machine learning are typically studied in isolation, without highlighting or exploring important relationships. In this paper, we present a unifying view on what we call multi-target prediction (MTP) problems and methods. First, we formally discuss commonalities and differences between existing MTP problems. To this end, we introduce a general framework that covers the above subfields as special cases. As a second contribution, we provide a structured overview of MTP methods. This is accomplished by identifying a number of key properties, which distinguish such methods and determine their suitability for different types of problems. Finally, we also discuss a few challenges for future research."}],"user_id":"315","ddc":["000"],"type":"journal_article","citation":{"bibtex":"@article{Waegeman_Dembczynski_Hüllermeier_2019, title={Multi-target prediction: a unifying view on problems and methods}, volume={33}, DOI={10.1007/s10618-018-0595-5}, number={2}, journal={Data Mining and Knowledge Discovery}, author={Waegeman, Willem and Dembczynski, Krzysztof and Hüllermeier, Eyke}, year={2019}, pages={293–324} }","mla":"Waegeman, Willem, et al. “Multi-Target Prediction: A Unifying View on Problems and Methods.” Data Mining and Knowledge Discovery, vol. 33, no. 2, 2019, pp. 293–324, doi:10.1007/s10618-018-0595-5.","chicago":"Waegeman, Willem, Krzysztof Dembczynski, and Eyke Hüllermeier. “Multi-Target Prediction: A Unifying View on Problems and Methods.” Data Mining and Knowledge Discovery 33, no. 2 (2019): 293–324. https://doi.org/10.1007/s10618-018-0595-5.","ama":"Waegeman W, Dembczynski K, Hüllermeier E. Multi-target prediction: a unifying view on problems and methods. Data Mining and Knowledge Discovery. 2019;33(2):293-324. doi:10.1007/s10618-018-0595-5","apa":"Waegeman, W., Dembczynski, K., & Hüllermeier, E. (2019). Multi-target prediction: a unifying view on problems and methods. Data Mining and Knowledge Discovery, 33(2), 293–324. https://doi.org/10.1007/s10618-018-0595-5","ieee":"W. Waegeman, K. Dembczynski, and E. Hüllermeier, “Multi-target prediction: a unifying view on problems and methods,” Data Mining and Knowledge Discovery, vol. 33, no. 2, pp. 293–324, 2019.","short":"W. Waegeman, K. Dembczynski, E. Hüllermeier, Data Mining and Knowledge Discovery 33 (2019) 293–324."},"year":"2019","page":"293-324","intvolume":" 33","_id":"15002","issue":"2","department":[{"_id":"34"},{"_id":"355"}],"publication_identifier":{"issn":["1573-756X"]},"title":"Multi-target prediction: a unifying view on problems and methods","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:14Z","oa":"1","doi":"10.1007/s10618-018-0595-5"},{"user_id":"315","title":"Set-Valued Prediction in Multi-Class Classification","publication":"Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019","department":[{"_id":"34"},{"_id":"355"}],"author":[{"first_name":"Thomas","full_name":"Mortier, Thomas","last_name":"Mortier"},{"last_name":"Wydmuch","full_name":"Wydmuch, Marek","first_name":"Marek"},{"last_name":"Dembczynski","first_name":"Krzysztof","full_name":"Dembczynski, Krzysztof"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","id":"48129"},{"full_name":"Waegeman, Willem","first_name":"Willem","last_name":"Waegeman"}],"date_created":"2019-11-15T10:20:55Z","status":"public","date_updated":"2022-01-06T06:52:14Z","_id":"15003","language":[{"iso":"eng"}],"year":"2019","citation":{"chicago":"Mortier, Thomas, Marek Wydmuch, Krzysztof Dembczynski, Eyke Hüllermeier, and Willem Waegeman. “Set-Valued Prediction in Multi-Class Classification.” In Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019, 2019.","apa":"Mortier, T., Wydmuch, M., Dembczynski, K., Hüllermeier, E., & Waegeman, W. (2019). Set-Valued Prediction in Multi-Class Classification. In Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019.","ama":"Mortier T, Wydmuch M, Dembczynski K, Hüllermeier E, Waegeman W. Set-Valued Prediction in Multi-Class Classification. In: Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019. ; 2019.","mla":"Mortier, Thomas, et al. “Set-Valued Prediction in Multi-Class Classification.” Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019, 2019.","bibtex":"@inproceedings{Mortier_Wydmuch_Dembczynski_Hüllermeier_Waegeman_2019, title={Set-Valued Prediction in Multi-Class Classification}, booktitle={Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019}, author={Mortier, Thomas and Wydmuch, Marek and Dembczynski, Krzysztof and Hüllermeier, Eyke and Waegeman, Willem}, year={2019} }","short":"T. Mortier, M. Wydmuch, K. Dembczynski, E. Hüllermeier, W. Waegeman, in: Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019, 2019.","ieee":"T. Mortier, M. Wydmuch, K. Dembczynski, E. Hüllermeier, and W. Waegeman, “Set-Valued Prediction in Multi-Class Classification,” in Proceedings of the 31st Benelux Conference on Artificial Intelligence {(BNAIC} 2019) and the 28th Belgian Dutch Conference on Machine Learning (Benelearn 2019), Brussels, Belgium, November 6-8, 2019, 2019."},"type":"conference"},{"date_created":"2019-11-15T10:24:45Z","status":"public","publication_status":"published","publication_identifier":{"isbn":["9783030337773","9783030337780"],"issn":["0302-9743","1611-3349"]},"department":[{"_id":"34"},{"_id":"355"}],"publication":"Discovery Science","author":[{"id":"59547","last_name":"Ahmadi Fahandar","full_name":"Ahmadi Fahandar, Mohsen","first_name":"Mohsen"},{"last_name":"Hüllermeier","id":"48129","first_name":"Eyke","full_name":"Hüllermeier, Eyke"}],"user_id":"315","title":"Feature Selection for Analogy-Based Learning to Rank","place":"Cham","language":[{"iso":"eng"}],"citation":{"apa":"Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Feature Selection for Analogy-Based Learning to Rank. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_22","ama":"Ahmadi Fahandar M, Hüllermeier E. Feature Selection for Analogy-Based Learning to Rank. In: Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_22","chicago":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_22.","bibtex":"@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Feature Selection for Analogy-Based Learning to Rank}, DOI={10.1007/978-3-030-33778-0_22}, booktitle={Discovery Science}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }","mla":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” Discovery Science, 2019, doi:10.1007/978-3-030-33778-0_22.","short":"M. Ahmadi Fahandar, E. Hüllermeier, in: Discovery Science, Cham, 2019.","ieee":"M. Ahmadi Fahandar and E. Hüllermeier, “Feature Selection for Analogy-Based Learning to Rank,” in Discovery Science, Cham, 2019."},"year":"2019","type":"book_chapter","doi":"10.1007/978-3-030-33778-0_22","_id":"15004","date_updated":"2022-01-06T06:52:14Z"},{"_id":"15005","date_updated":"2022-01-06T06:52:14Z","doi":"10.1007/978-3-030-30179-8_3","language":[{"iso":"eng"}],"citation":{"ieee":"M. Ahmadi Fahandar and E. Hüllermeier, “Analogy-Based Preference Learning with Kernels,” in KI 2019: Advances in Artificial Intelligence, Cham, 2019.","short":"M. Ahmadi Fahandar, E. Hüllermeier, in: KI 2019: Advances in Artificial Intelligence, Cham, 2019.","bibtex":"@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Analogy-Based Preference Learning with Kernels}, DOI={10.1007/978-3-030-30179-8_3}, booktitle={KI 2019: Advances in Artificial Intelligence}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }","mla":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” KI 2019: Advances in Artificial Intelligence, 2019, doi:10.1007/978-3-030-30179-8_3.","ama":"Ahmadi Fahandar M, Hüllermeier E. Analogy-Based Preference Learning with Kernels. In: KI 2019: Advances in Artificial Intelligence. Cham; 2019. doi:10.1007/978-3-030-30179-8_3","apa":"Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Analogy-Based Preference Learning with Kernels. In KI 2019: Advances in Artificial Intelligence. Cham. https://doi.org/10.1007/978-3-030-30179-8_3","chicago":"Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” In KI 2019: Advances in Artificial Intelligence. Cham, 2019. https://doi.org/10.1007/978-3-030-30179-8_3."},"year":"2019","type":"book_chapter","place":"Cham","user_id":"315","title":"Analogy-Based Preference Learning with Kernels","department":[{"_id":"34"},{"_id":"355"}],"publication":"KI 2019: Advances in Artificial Intelligence","author":[{"full_name":"Ahmadi Fahandar, Mohsen","first_name":"Mohsen","id":"59547","last_name":"Ahmadi Fahandar"},{"full_name":"Hüllermeier, Eyke","first_name":"Eyke","id":"48129","last_name":"Hüllermeier"}],"date_created":"2019-11-15T10:30:10Z","status":"public","publication_status":"published","publication_identifier":{"isbn":["9783030301781","9783030301798"],"issn":["0302-9743","1611-3349"]}},{"citation":{"mla":"Nguyen, Vu-Linh, et al. “Epistemic Uncertainty Sampling.” Discovery Science, 2019, doi:10.1007/978-3-030-33778-0_7.","bibtex":"@inbook{Nguyen_Destercke_Hüllermeier_2019, place={Cham}, title={Epistemic Uncertainty Sampling}, DOI={10.1007/978-3-030-33778-0_7}, booktitle={Discovery Science}, author={Nguyen, Vu-Linh and Destercke, Sébastien and Hüllermeier, Eyke}, year={2019} }","chicago":"Nguyen, Vu-Linh, Sébastien Destercke, and Eyke Hüllermeier. “Epistemic Uncertainty Sampling.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_7.","apa":"Nguyen, V.-L., Destercke, S., & Hüllermeier, E. (2019). Epistemic Uncertainty Sampling. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_7","ama":"Nguyen V-L, Destercke S, Hüllermeier E. Epistemic Uncertainty Sampling. In: Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_7","ieee":"V.-L. Nguyen, S. Destercke, and E. Hüllermeier, “Epistemic Uncertainty Sampling,” in Discovery Science, Cham, 2019.","short":"V.-L. Nguyen, S. Destercke, E. Hüllermeier, in: Discovery Science, Cham, 2019."},"year":"2019","type":"book_chapter","language":[{"iso":"eng"}],"doi":"10.1007/978-3-030-33778-0_7","_id":"15006","date_updated":"2022-01-06T06:52:14Z","publication_identifier":{"isbn":["9783030337773","9783030337780"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","status":"public","date_created":"2019-11-15T10:35:08Z","author":[{"first_name":"Vu-Linh","full_name":"Nguyen, Vu-Linh","last_name":"Nguyen"},{"full_name":"Destercke, Sébastien","first_name":"Sébastien","last_name":"Destercke"},{"first_name":"Eyke","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","id":"48129"}],"department":[{"_id":"34"},{"_id":"355"}],"publication":"Discovery Science","title":"Epistemic Uncertainty Sampling","user_id":"49109","place":"Cham"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:52:14Z","oa":"1","doi":"10.1016/j.jmva.2019.02.017","department":[{"_id":"34"},{"_id":"355"},{"_id":"7"}],"project":[{"_id":"10","name":"SFB 901 - Subproject B2"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901","_id":"1"}],"publication_status":"published","title":"Learning to Aggregate: Tackling the Aggregation/Disaggregation Problem for OWA","type":"conference","citation":{"short":"V. Melnikov, E. Hüllermeier, in: Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101), 2019.","ieee":"V. Melnikov and E. Hüllermeier, “Learning to Aggregate: Tackling the Aggregation/Disaggregation Problem for OWA,” in Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101), 2019.","ama":"Melnikov V, Hüllermeier E. Learning to Aggregate: Tackling the Aggregation/Disaggregation Problem for OWA. In: Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101). ; 2019. doi:10.1016/j.jmva.2019.02.017","apa":"Melnikov, V., & Hüllermeier, E. (2019). Learning to Aggregate: Tackling the Aggregation/Disaggregation Problem for OWA. In Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101). https://doi.org/10.1016/j.jmva.2019.02.017","chicago":"Melnikov, Vitaly, and Eyke Hüllermeier. “Learning to Aggregate: Tackling the Aggregation/Disaggregation Problem for OWA.” In Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101), 2019. https://doi.org/10.1016/j.jmva.2019.02.017.","mla":"Melnikov, Vitaly, and Eyke Hüllermeier. “Learning to Aggregate: Tackling the Aggregation/Disaggregation Problem for OWA.” Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101), 2019, doi:10.1016/j.jmva.2019.02.017.","bibtex":"@inproceedings{Melnikov_Hüllermeier_2019, title={Learning to Aggregate: Tackling the Aggregation/Disaggregation Problem for OWA}, DOI={10.1016/j.jmva.2019.02.017}, booktitle={Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101)}, author={Melnikov, Vitaly and Hüllermeier, Eyke}, year={2019} }"},"year":"2019","_id":"15007","file":[{"access_level":"open_access","file_name":"learning-to-aggregate-owa.pdf","date_created":"2020-02-28T12:47:07Z","content_type":"application/pdf","date_updated":"2020-02-28T12:47:07Z","relation":"main_file","file_size":2331320,"creator":"lettmann","file_id":"16156"}],"author":[{"full_name":"Melnikov, Vitaly","first_name":"Vitaly","id":"58747","last_name":"Melnikov"},{"id":"48129","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","first_name":"Eyke"}],"file_date_updated":"2020-02-28T12:47:07Z","publication":"Proceedings ACML, Asian Conference on Machine Learning (Proceedings of Machine Learning Research, 101)","has_accepted_license":"1","status":"public","date_created":"2019-11-15T10:43:26Z","user_id":"477","ddc":["000"]},{"publication_identifier":{"isbn":["9781728105604"]},"publication_status":"published","status":"public","date_created":"2019-11-15T10:54:04Z","author":[{"last_name":"Epple","full_name":"Epple, Nico","first_name":"Nico"},{"last_name":"Dari","first_name":"Simone","full_name":"Dari, Simone"},{"first_name":"Ludwig","full_name":"Drees, Ludwig","last_name":"Drees"},{"full_name":"Protschky, Valentin","first_name":"Valentin","last_name":"Protschky"},{"last_name":"Riener","first_name":"Andreas","full_name":"Riener, Andreas"}],"publication":"2019 IEEE Intelligent Vehicles Symposium (IV)","department":[{"_id":"34"},{"_id":"355"}],"title":"Influence of Cruise Control on Driver Guidance - a Comparison between System Generations and Countries","user_id":"315","year":"2019","type":"conference","citation":{"ieee":"N. Epple, S. Dari, L. Drees, V. Protschky, and A. Riener, “Influence of Cruise Control on Driver Guidance - a Comparison between System Generations and Countries,” in 2019 IEEE Intelligent Vehicles Symposium (IV), 2019.","short":"N. Epple, S. Dari, L. Drees, V. Protschky, A. Riener, in: 2019 IEEE Intelligent Vehicles Symposium (IV), 2019.","mla":"Epple, Nico, et al. “Influence of Cruise Control on Driver Guidance - a Comparison between System Generations and Countries.” 2019 IEEE Intelligent Vehicles Symposium (IV), 2019, doi:10.1109/ivs.2019.8814100.","bibtex":"@inproceedings{Epple_Dari_Drees_Protschky_Riener_2019, title={Influence of Cruise Control on Driver Guidance - a Comparison between System Generations and Countries}, DOI={10.1109/ivs.2019.8814100}, booktitle={2019 IEEE Intelligent Vehicles Symposium (IV)}, author={Epple, Nico and Dari, Simone and Drees, Ludwig and Protschky, Valentin and Riener, Andreas}, year={2019} }","apa":"Epple, N., Dari, S., Drees, L., Protschky, V., & Riener, A. (2019). Influence of Cruise Control on Driver Guidance - a Comparison between System Generations and Countries. In 2019 IEEE Intelligent Vehicles Symposium (IV). https://doi.org/10.1109/ivs.2019.8814100","ama":"Epple N, Dari S, Drees L, Protschky V, Riener A. Influence of Cruise Control on Driver Guidance - a Comparison between System Generations and Countries. In: 2019 IEEE Intelligent Vehicles Symposium (IV). ; 2019. doi:10.1109/ivs.2019.8814100","chicago":"Epple, Nico, Simone Dari, Ludwig Drees, Valentin Protschky, and Andreas Riener. “Influence of Cruise Control on Driver Guidance - a Comparison between System Generations and Countries.” In 2019 IEEE Intelligent Vehicles Symposium (IV), 2019. https://doi.org/10.1109/ivs.2019.8814100."},"language":[{"iso":"eng"}],"doi":"10.1109/ivs.2019.8814100","date_updated":"2022-01-06T06:52:14Z","_id":"15009"},{"year":"2019","citation":{"mla":"Tornede, Alexander, et al. “Algorithm Selection as Recommendation: From Collaborative Filtering to Dyad Ranking.” Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019, edited by Frank Hoffmann et al., KIT Scientific Publishing, Karlsruhe, 2019, pp. 135–46.","bibtex":"@inproceedings{Tornede_Wever_Hüllermeier_2019, title={Algorithm Selection as Recommendation: From Collaborative Filtering to Dyad Ranking}, booktitle={Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019}, publisher={KIT Scientific Publishing, Karlsruhe}, author={Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}, editor={Hoffmann, Frank and Hüllermeier, Eyke and Mikut, RalfEditors}, year={2019}, pages={135–146} }","apa":"Tornede, A., Wever, M. D., & Hüllermeier, E. (2019). Algorithm Selection as Recommendation: From Collaborative Filtering to Dyad Ranking. In F. Hoffmann, E. Hüllermeier, & R. Mikut (Eds.), Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019 (pp. 135–146). Dortmund: KIT Scientific Publishing, Karlsruhe.","ama":"Tornede A, Wever MD, Hüllermeier E. Algorithm Selection as Recommendation: From Collaborative Filtering to Dyad Ranking. In: Hoffmann F, Hüllermeier E, Mikut R, eds. Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019. KIT Scientific Publishing, Karlsruhe; 2019:135-146.","chicago":"Tornede, Alexander, Marcel Dominik Wever, and Eyke Hüllermeier. “Algorithm Selection as Recommendation: From Collaborative Filtering to Dyad Ranking.” In Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019, edited by Frank Hoffmann, Eyke Hüllermeier, and Ralf Mikut, 135–46. KIT Scientific Publishing, Karlsruhe, 2019.","ieee":"A. Tornede, M. D. Wever, and E. Hüllermeier, “Algorithm Selection as Recommendation: From Collaborative Filtering to Dyad Ranking,” in Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019, Dortmund, 2019, pp. 135–146.","short":"A. Tornede, M.D. Wever, E. Hüllermeier, in: F. Hoffmann, E. Hüllermeier, R. Mikut (Eds.), Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019, KIT Scientific Publishing, Karlsruhe, 2019, pp. 135–146."},"type":"conference","page":"135-146","_id":"15011","conference":{"location":"Dortmund","name":"29. Workshop Computational Intelligence","start_date":"2019-11-28","end_date":"2019-11-29"},"status":"public","has_accepted_license":"1","date_created":"2019-11-15T13:29:25Z","author":[{"id":"38209","last_name":"Tornede","full_name":"Tornede, Alexander","first_name":"Alexander"},{"orcid":" https://orcid.org/0000-0001-9782-6818","full_name":"Wever, Marcel Dominik","first_name":"Marcel Dominik","id":"33176","last_name":"Wever"},{"last_name":"Hüllermeier","id":"48129","first_name":"Eyke","full_name":"Hüllermeier, Eyke"}],"publisher":"KIT Scientific Publishing, Karlsruhe","publication":"Proceedings - 29. Workshop Computational Intelligence, Dortmund, 28. - 29. November 2019","file_date_updated":"2020-05-25T08:01:31Z","file":[{"date_created":"2020-05-25T08:01:31Z","file_name":"ci_workshop_tornede.pdf","access_level":"open_access","file_id":"17060","creator":"ahetzer","file_size":468825,"relation":"main_file","date_updated":"2020-05-25T08:01:31Z","content_type":"application/pdf"}],"ddc":["006"],"user_id":"38209","language":[{"iso":"eng"}],"oa":"1","date_updated":"2022-01-06T06:52:14Z","editor":[{"last_name":"Hoffmann","full_name":"Hoffmann, Frank","first_name":"Frank"},{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","first_name":"Eyke"},{"last_name":"Mikut","full_name":"Mikut, Ralf","first_name":"Ralf"}],"publication_status":"published","publication_identifier":{"isbn":["978-3-7315-0979-0"]},"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B2","_id":"10"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"department":[{"_id":"355"}],"title":"Algorithm Selection as Recommendation: From Collaborative Filtering to Dyad Ranking"}]