@misc{60920,
  author       = {{Schmidt, Rebecca}},
  booktitle    = {{Sozialwissenschaftliche Methodenberatung}},
  title        = {{{Mit KI (Elicit) den Forschungsstand beschreiben – ein kritischer Erfahrungsbericht}}},
  year         = {{2025}},
}

@inbook{59865,
  author       = {{Schmidt, Rebecca}},
  booktitle    = {{Transdisziplinäre Räume in den Kulturwissenschaften}},
  editor       = {{Kornbach, Alina and Lammer, Christina and Magdeburg, Lena}},
  pages        = {{339--363}},
  publisher    = {{Verlag Herder GmbH}},
  title        = {{{Participatory Research with Teachers - A Critical Analysis of Power Dynamics}}},
  volume       = {{3}},
  year         = {{2025}},
}

@inbook{60863,
  author       = {{Peckhaus, Volker}},
  booktitle    = {{Transdisziplinäre Räume in den Kulturwissenschaften}},
  editor       = {{Kornbach, Alina and Lammer, Christina and Magdeburg, Lena }},
  pages        = {{255--288}},
  publisher    = {{wbg Academics}},
  title        = {{{Aufruhr im Raum der Räume: Logik zwischen Philosophie und Mathematik}}},
  volume       = {{3}},
  year         = {{2025}},
}

@misc{58259,
  author       = {{Peckhaus, Volker}},
  booktitle    = {{zbMATH Open, Zbl. 07951350}},
  title        = {{{Eckes, Christophe, “Philosophical and Mathematical Duality in Albert Lautman’s Work”, in: R. Krömer und E. Haffner (Hgg.), Duality in 19th and 20th Century Mathematical Thinking, Cham: Birkhäuser 2024 (Science Networks. Historical Studies; 63), 435–469. }}},
  year         = {{2025}},
}

@misc{60872,
  author       = {{Peckhaus, Volker}},
  booktitle    = {{zbMATH Open, Zbl. 079505172}},
  title        = {{{Krömer, Ralf, “The Historical Development of Pontrjagin Duality”, in: R. Krömer und E. Haffner (Hgg.), Duality in 19th and 20th Century Mathematical Thinking, Cham: Birkhäuser 2024 (Science Networks. Historical Studies; 63), 291–353. }}},
  year         = {{2025}},
}

@misc{59563,
  author       = {{Peckhaus, Volker}},
  booktitle    = {{zbMATH Open, Zbl. 07951348}},
  title        = {{{Krömer, Ralf, “The Historical Development of Pontrjagin Duality”, in: R. Krömer und E. Haffner (Hgg.), Duality in 19th and 20th Century Mathematical Thinking, Cham: Birkhäuser 2024 (Science Networks. Historical Studies; 63), 291–353. }}},
  year         = {{2025}},
}

@misc{60879,
  author       = {{Peckhaus, Volker}},
  booktitle    = {{Mathematical Reviews, MR4769331}},
  title        = {{{Corry, Leo, “Von Neumann and Impossibility, from Gödel to EDVAC”, in: Mastering the History of Pure and Applied Mathematics – Essay in Honor of Jesper Lützen (De Gruyter Proc. Math.), De Gruyter. Berlin 2024, 75–99. }}},
  year         = {{2025}},
}

@misc{60878,
  author       = {{Peckhaus, Volker}},
  booktitle    = {{Mathematical Reviews, MR4740767}},
  title        = {{{Costantini, Filippo, “Definitions by Abstraction and Leibniz’s Notion of Quantity”, Theoria 90 (2024), 240–255.}}},
  year         = {{2025}},
}

@article{59740,
  abstract     = {{<jats:title>ABSTRACT</jats:title><jats:p>In this contribution, we propose an innovative method for determining optimal control sequences for nonlinear systems with partially unknown dynamics, which further expands our previous work. Within the paradigm of model‐based design, the practicality and safety of commissioning feedforward controls and feedback controllers have priority. Our approach leverages probabilistic Gaussian processes to adjust for model inaccuracies from measured system data. This differs from conventional approaches that involve complicated analytical modeling and may entail a substantial time investment to acquire expertise and may prove impractical. Consequently, we address the limitations inherent in traditional design methodologies. Our research focuses on the formulation and solution of the hybrid<jats:sup>1</jats:sup> optimal control problem using probabilistic state predictions and multiple shooting. This ensures adaptability, data efficiency, and resilience against uncertainties in system dynamics. These attributes are empirically substantiated through experimental validation on a chaotic and highly sensitive dynamical system—a double pendulum on a cart. Our methodology unfolds as an iterative learning process, systematically exploring diverse controls, accumulating data within each iteration, and refining the control strategy until the desired task is accomplished. The adoption of the two‐degree‐of‐freedom control structure allows for the distinct consideration of the feedforward and the feedback control signal. For the latter, we employ a time‐variant, linear quadratic regulator (LQR) designed to stabilize the system around its target trajectory. Furthermore, we integrate a probabilistic long‐term prediction through the unscented transform, enabling systematic anticipation of safety‐critical violations. Detailed insights into relevant implementation aspects are provided. To ascertain the real‐world applicability, we present an exemplary application involving a double pendulum on a cart. The objective is to bring the pendulum arms from the lower stable to the upper unstable equilibrium by horizontally moving the cart and subsequently stabilize them. In this scenario, we assume that the centrifugal forces, crucial to the system dynamics, have not been accurately modeled and must be learned from data. Solving the control task took only 5 iterations and 1 h of computation time, which surpasses our previous work [2], where we used the purely data‐driven PILCO framework and required 27 iterations and 57 h of computation time. The time of interaction with the system decreased by  and the computation time is lowered by . It demonstrates significant practical applicability for commissioning control systems.</jats:p>}},
  author       = {{Hesse, Michael and Schwarzer, Luis and Timmermann, Julia and Trächtler, Ansgar}},
  issn         = {{1617-7061}},
  journal      = {{PAMM}},
  number       = {{2}},
  publisher    = {{Wiley}},
  title        = {{{Robust and Efficient Hybrid Optimal Control via Gaussian Process Regression and Multiple Shooting With Experimental Validation on a Double Pendulum on a Cart}}},
  doi          = {{10.1002/pamm.70004}},
  volume       = {{25}},
  year         = {{2025}},
}

@article{61117,
  author       = {{Ratzke, Christian  and Candan, Ayse Beyza}},
  journal      = {{Zeitschrift für christlich-jüdische Begegnung}},
  number       = {{1}},
  title        = {{{Reflexion religionsbezogener Einstellungen im Kontext interreligiöser Bildung anlässlich 80 Jahre nach Auschwitz}}},
  volume       = {{1}},
  year         = {{2025}},
}

@misc{61122,
  author       = {{Peckhaus, Volker}},
  booktitle    = {{zbMATH Open, Zbl. 07963874}},
  title        = {{{Bolzano, Bernard, Miscellanea mathematica 22, hg. v. Jan Berg, besorgt von Edgar Morscher und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2)}}},
  year         = {{2025}},
}

@article{61125,
  author       = {{Biehler, Rolf and Liebendörfer, Michael and Schmitz, Angela and Reich, Birte}},
  journal      = {{Mitteilungen der Deutschen Mathematiker-Vereinigung}},
  number       = {{3}},
  pages        = {{170–171}},
  publisher    = {{De Gruyter}},
  title        = {{{studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar}}},
  volume       = {{33}},
  year         = {{2025}},
}

@article{61126,
  abstract     = {{<jats:p>
            Reusable software libraries, frameworks, and components, such as those provided by open source ecosystems and third-party suppliers, accelerate digital innovation. However, recent years have shown almost exponential growth in attackers leveraging these software artifacts to launch software supply chain attacks. Past well-known software supply chain attacks include the SolarWinds, log4j, and xz utils incidents. Supply chain attacks are considered to have three major attack vectors: through vulnerabilities and malware accidentally or intentionally injected into open source and third-party
            <jats:italic>dependencies/components/containers</jats:italic>
            ; by infiltrating the
            <jats:italic>build infrastructure</jats:italic>
            during the build and deployment processes; and through targeted techniques aimed at the
            <jats:italic>humans</jats:italic>
            involved in software development, such as through social engineering. Plummeting trust in the software supply chain could decelerate digital innovation if the software industry reduces its use of open source and third-party artifacts to reduce risks. This article contains perspectives and knowledge obtained from intentional outreach with practitioners to understand their practical challenges and from extensive research efforts. We then provide an overview of current research efforts to secure the software supply chain. Finally, we propose a future research agenda to close software supply chain attack vectors and support the software industry.
          </jats:p>}},
  author       = {{Williams, Laurie and Benedetti, Giacomo and Hamer, Sivana and Paramitha, Ranindya and Rahman, Imranur and Tamanna, Mahzabin and Tystahl, Greg and Zahan, Nusrat and Morrison, Patrick and Acar, Yasemin and Cukier, Michel and Kästner, Christian and Kapravelos, Alexandros and Wermke, Dominik and Enck, William}},
  issn         = {{1049-331X}},
  journal      = {{ACM Transactions on Software Engineering and Methodology}},
  number       = {{5}},
  pages        = {{1--38}},
  publisher    = {{Association for Computing Machinery (ACM)}},
  title        = {{{Research Directions in Software Supply Chain Security}}},
  doi          = {{10.1145/3714464}},
  volume       = {{34}},
  year         = {{2025}},
}

@inbook{61127,
  author       = {{Haney, Julie M. and Acar, Yasemin and Li, Anna and Haney, Faith}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783031928390}},
  issn         = {{0302-9743}},
  publisher    = {{Springer Nature Switzerland}},
  title        = {{{Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey}}},
  doi          = {{10.1007/978-3-031-92840-6_11}},
  year         = {{2025}},
}

@inproceedings{61129,
  author       = {{Rotthaler, Anna Lena and Ramulu, Harshini Sri and Simko, Lucy and Fahl, Sascha and Acar, Yasemin}},
  booktitle    = {{IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025}},
  editor       = {{Blanton, Marina and Enck, William and Nita-Rotaru, Cristina}},
  pages        = {{2228–2245}},
  publisher    = {{IEEE}},
  title        = {{{"It’s Time. Time for Digital Security.": An End User Study on Actionable Security and Privacy Advice}}},
  doi          = {{10.1109/SP61157.2025.00100}},
  year         = {{2025}},
}

@inproceedings{61128,
  author       = {{Buckmann, Annalina and Nold, Jan Magnus and Acar, Yasemin and Zou, Yixin}},
  booktitle    = {{Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025}},
  editor       = {{Kelley, Patrick Gage and Mondal, Mainack and Vaniea, Kami}},
  pages        = {{455–474}},
  publisher    = {{USENIX Association}},
  title        = {{{More than Usability: Differential Access to Digital Security and Privacy}}},
  year         = {{2025}},
}

@article{61131,
  author       = {{Rahman, Imranur and Acar, Yasemin and Cukier, Michel and Enck, William and Kastner, Christian and Kapravelos, Alexandros and Wermke, Dominik and Williams, Laurie}},
  title        = {{{S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit}}},
  year         = {{2025}},
}

@article{61130,
  author       = {{Miller, Courtney and Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kastner, Christian and Wermke, Dominik and Williams, Laurie}},
  title        = {{{S3C2 Summit 2024-08: Government Secure Supply Chain Summit}}},
  year         = {{2025}},
}

@article{61132,
  author       = {{Busch, Niklas and Klostermeyer, Philip and Klemmer, Jan H. and Acar, Yasemin and Fahl, Sascha}},
  title        = {{{From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange}}},
  year         = {{2025}},
}

@article{61026,
  abstract     = {{In mammals, pregnancy and lactation are marked by calcium stress and bone resorption, leading to reduced bone mineral density. In humans, these periods may partly explain the higher prevalence of osteoporosis in older women compared with men, but lactation patterns in modern humans may reflect cultural influences rather than natural conditions. The extent to which these findings apply to wild-living mammals remains unknown. We measured urinary C-terminal crosslinking telopeptide of Type I collagen (CTX-I) levels, a bone resorption marker, during pregnancy in wild and zoo-housed bonobos (Pan paniscus) and during lactation in wild bonobos. Studying wild-living primates such as bonobos can provide insights into ancestral reproductive adaptations. We found an increase in CTX-I levels towards the end of pregnancy in zoo-housed and primiparous wild females. Contrary to expectations, CTX-I levels during early lactation are lower than in other reproductive phases. This pattern diverges from the assumption that lactation increases bone resorption. Our findings suggest that wild bonobos may use physiological or behavioral strategies to modulate bone metabolism during lactation. These adaptations, shaped in natural environments, provide insight into evolutionary pressures on skeletal health and may inform strategies to mitigate bone loss in humans.}},
  author       = {{Behringer, Verena and Sonnweber, Ruth and Fruth, Barbara and Housman, Genevieve and Douglas, Pamela Heidi and Stevens, Jeroen M. G. and Hohmann, Gottfried and Kivell, Tracy L.}},
  issn         = {{2513-843X}},
  journal      = {{Evolutionary Human Sciences}},
  keywords     = {{Reproductive phase, Hominoid, CTX-I, Bone turnover markers, Pan paniscus, Bone density}},
  number       = {{e27}},
  pages        = {{1--23}},
  publisher    = {{Cambridge University Press (CUP)}},
  title        = {{{Wild bonobos experience unusually low bone resorption during early lactation relative to humans and other mammals}}},
  doi          = {{10.1017/ehs.2025.10013}},
  volume       = {{7}},
  year         = {{2025}},
}

