[{"_id":"61122","oa":"1","date_updated":"2025-09-03T14:10:24Z","user_id":"391","date_created":"2025-09-03T14:06:58Z","author":[{"first_name":"Volker","id":"391","full_name":"Peckhaus, Volker","last_name":"Peckhaus"}],"title":"Bolzano, Bernard, Miscellanea mathematica 22, hg. v. Jan Berg, besorgt von Edgar Morscher und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2)","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://zbmath.org/7963874"}],"publication":"zbMATH Open, Zbl. 07963874","type":"review","year":"2025","status":"public","citation":{"ama":"Peckhaus V. Bolzano, Bernard, Miscellanea mathematica 22, hg. v. Jan Berg, besorgt von Edgar Morscher und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2). <i>zbMATH Open, Zbl 07963874</i>. Published online 2025.","chicago":"Peckhaus, Volker. “Bolzano, Bernard, Miscellanea Mathematica 22, Hg. v. Jan Berg, Besorgt von Edgar Morscher Und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2).” <i>ZbMATH Open, Zbl. 07963874</i>, 2025.","ieee":"V. Peckhaus, “Bolzano, Bernard, Miscellanea mathematica 22, hg. v. Jan Berg, besorgt von Edgar Morscher und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2),” <i>zbMATH Open, Zbl. 07963874</i>. 2025.","bibtex":"@article{Peckhaus_2025, title={Bolzano, Bernard, Miscellanea mathematica 22, hg. v. Jan Berg, besorgt von Edgar Morscher und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2)}, journal={zbMATH Open, Zbl. 07963874}, author={Peckhaus, Volker}, year={2025} }","short":"V. Peckhaus, ZbMATH Open, Zbl. 07963874 (2025).","mla":"Peckhaus, Volker. “Bolzano, Bernard, Miscellanea Mathematica 22, Hg. v. Jan Berg, Besorgt von Edgar Morscher Und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2).” <i>ZbMATH Open, Zbl. 07963874</i>, 2025.","apa":"Peckhaus, V. (2025). Bolzano, Bernard, Miscellanea mathematica 22, hg. v. Jan Berg, besorgt von Edgar Morscher und Otto Neumaier, Frommann-Holzboog: Stuttgart-Bad Cannstatt 2024 (Bernard Bolzano-Gesamtausgabe; II.B.12.2). In <i>zbMATH Open, Zbl. 07963874</i>."}},{"publication_status":"published","issue":"3","year":"2025","citation":{"bibtex":"@article{Biehler_Liebendörfer_Schmitz_Reich_2025, title={studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar}, volume={33}, number={3}, journal={Mitteilungen der Deutschen Mathematiker-Vereinigung}, publisher={De Gruyter}, author={Biehler, Rolf and Liebendörfer, Michael and Schmitz, Angela and Reich, Birte}, year={2025}, pages={170–171} }","mla":"Biehler, Rolf, et al. “studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar.” <i>Mitteilungen der Deutschen Mathematiker-Vereinigung</i>, vol. 33, no. 3, De Gruyter, 2025, pp. 170–171.","short":"R. Biehler, M. Liebendörfer, A. Schmitz, B. Reich, Mitteilungen der Deutschen Mathematiker-Vereinigung 33 (2025) 170–171.","apa":"Biehler, R., Liebendörfer, M., Schmitz, A., &#38; Reich, B. (2025). studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar. <i>Mitteilungen der Deutschen Mathematiker-Vereinigung</i>, <i>33</i>(3), 170–171.","ama":"Biehler R, Liebendörfer M, Schmitz A, Reich B. studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar. <i>Mitteilungen der Deutschen Mathematiker-Vereinigung</i>. 2025;33(3):170–171.","ieee":"R. Biehler, M. Liebendörfer, A. Schmitz, and B. Reich, “studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar,” <i>Mitteilungen der Deutschen Mathematiker-Vereinigung</i>, vol. 33, no. 3, pp. 170–171, 2025.","chicago":"Biehler, Rolf, Michael Liebendörfer, Angela Schmitz, and Birte Reich. “studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar.” <i>Mitteilungen der Deutschen Mathematiker-Vereinigung</i> 33, no. 3 (2025): 170–171."},"intvolume":"        33","page":"170–171","oa":"1","date_updated":"2025-09-04T09:25:03Z","publisher":"De Gruyter","author":[{"full_name":"Biehler, Rolf","id":"16274","last_name":"Biehler","first_name":"Rolf"},{"first_name":"Michael","last_name":"Liebendörfer","full_name":"Liebendörfer, Michael"},{"full_name":"Schmitz, Angela","last_name":"Schmitz","first_name":"Angela"},{"full_name":"Reich, Birte","last_name":"Reich","first_name":"Birte"}],"date_created":"2025-09-04T09:23:47Z","volume":33,"title":"studiVEMINT Mathematik-Online-Vorkurs jetzt mit 300 integrierten Lernvideos frei verfügbar","main_file_link":[{"open_access":"1","url":"https://doi.org/10.1515/dmvm-2025-0053"}],"type":"journal_article","publication":"Mitteilungen der Deutschen Mathematiker-Vereinigung","status":"public","_id":"61125","user_id":"37888","department":[{"_id":"363"}],"language":[{"iso":"ger"}]},{"user_id":"94636","_id":"61126","language":[{"iso":"eng"}],"type":"journal_article","publication":"ACM Transactions on Software Engineering and Methodology","status":"public","abstract":[{"lang":"eng","text":"<jats:p>\n            Reusable software libraries, frameworks, and components, such as those provided by open source ecosystems and third-party suppliers, accelerate digital innovation. However, recent years have shown almost exponential growth in attackers leveraging these software artifacts to launch software supply chain attacks. Past well-known software supply chain attacks include the SolarWinds, log4j, and xz utils incidents. Supply chain attacks are considered to have three major attack vectors: through vulnerabilities and malware accidentally or intentionally injected into open source and third-party\n            <jats:italic>dependencies/components/containers</jats:italic>\n            ; by infiltrating the\n            <jats:italic>build infrastructure</jats:italic>\n            during the build and deployment processes; and through targeted techniques aimed at the\n            <jats:italic>humans</jats:italic>\n            involved in software development, such as through social engineering. Plummeting trust in the software supply chain could decelerate digital innovation if the software industry reduces its use of open source and third-party artifacts to reduce risks. This article contains perspectives and knowledge obtained from intentional outreach with practitioners to understand their practical challenges and from extensive research efforts. We then provide an overview of current research efforts to secure the software supply chain. Finally, we propose a future research agenda to close software supply chain attack vectors and support the software industry.\n          </jats:p>"}],"date_created":"2025-09-04T11:11:26Z","author":[{"full_name":"Williams, Laurie","last_name":"Williams","first_name":"Laurie"},{"last_name":"Benedetti","full_name":"Benedetti, Giacomo","first_name":"Giacomo"},{"first_name":"Sivana","full_name":"Hamer, Sivana","last_name":"Hamer"},{"full_name":"Paramitha, Ranindya","last_name":"Paramitha","first_name":"Ranindya"},{"last_name":"Rahman","full_name":"Rahman, Imranur","first_name":"Imranur"},{"first_name":"Mahzabin","last_name":"Tamanna","full_name":"Tamanna, Mahzabin"},{"first_name":"Greg","full_name":"Tystahl, Greg","last_name":"Tystahl"},{"last_name":"Zahan","full_name":"Zahan, Nusrat","first_name":"Nusrat"},{"last_name":"Morrison","full_name":"Morrison, Patrick","first_name":"Patrick"},{"full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Cukier, Michel","last_name":"Cukier","first_name":"Michel"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"first_name":"Alexandros","last_name":"Kapravelos","full_name":"Kapravelos, Alexandros"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"}],"volume":34,"date_updated":"2025-09-04T11:15:46Z","publisher":"Association for Computing Machinery (ACM)","doi":"10.1145/3714464","title":"Research Directions in Software Supply Chain Security","issue":"5","publication_status":"published","publication_identifier":{"issn":["1049-331X","1557-7392"]},"citation":{"chicago":"Williams, Laurie, Giacomo Benedetti, Sivana Hamer, Ranindya Paramitha, Imranur Rahman, Mahzabin Tamanna, Greg Tystahl, et al. “Research Directions in Software Supply Chain Security.” <i>ACM Transactions on Software Engineering and Methodology</i> 34, no. 5 (2025): 1–38. <a href=\"https://doi.org/10.1145/3714464\">https://doi.org/10.1145/3714464</a>.","ieee":"L. Williams <i>et al.</i>, “Research Directions in Software Supply Chain Security,” <i>ACM Transactions on Software Engineering and Methodology</i>, vol. 34, no. 5, pp. 1–38, 2025, doi: <a href=\"https://doi.org/10.1145/3714464\">10.1145/3714464</a>.","ama":"Williams L, Benedetti G, Hamer S, et al. Research Directions in Software Supply Chain Security. <i>ACM Transactions on Software Engineering and Methodology</i>. 2025;34(5):1-38. doi:<a href=\"https://doi.org/10.1145/3714464\">10.1145/3714464</a>","mla":"Williams, Laurie, et al. “Research Directions in Software Supply Chain Security.” <i>ACM Transactions on Software Engineering and Methodology</i>, vol. 34, no. 5, Association for Computing Machinery (ACM), 2025, pp. 1–38, doi:<a href=\"https://doi.org/10.1145/3714464\">10.1145/3714464</a>.","bibtex":"@article{Williams_Benedetti_Hamer_Paramitha_Rahman_Tamanna_Tystahl_Zahan_Morrison_Acar_et al._2025, title={Research Directions in Software Supply Chain Security}, volume={34}, DOI={<a href=\"https://doi.org/10.1145/3714464\">10.1145/3714464</a>}, number={5}, journal={ACM Transactions on Software Engineering and Methodology}, publisher={Association for Computing Machinery (ACM)}, author={Williams, Laurie and Benedetti, Giacomo and Hamer, Sivana and Paramitha, Ranindya and Rahman, Imranur and Tamanna, Mahzabin and Tystahl, Greg and Zahan, Nusrat and Morrison, Patrick and Acar, Yasemin and et al.}, year={2025}, pages={1–38} }","short":"L. Williams, G. Benedetti, S. Hamer, R. Paramitha, I. Rahman, M. Tamanna, G. Tystahl, N. Zahan, P. Morrison, Y. Acar, M. Cukier, C. Kästner, A. Kapravelos, D. Wermke, W. Enck, ACM Transactions on Software Engineering and Methodology 34 (2025) 1–38.","apa":"Williams, L., Benedetti, G., Hamer, S., Paramitha, R., Rahman, I., Tamanna, M., Tystahl, G., Zahan, N., Morrison, P., Acar, Y., Cukier, M., Kästner, C., Kapravelos, A., Wermke, D., &#38; Enck, W. (2025). Research Directions in Software Supply Chain Security. <i>ACM Transactions on Software Engineering and Methodology</i>, <i>34</i>(5), 1–38. <a href=\"https://doi.org/10.1145/3714464\">https://doi.org/10.1145/3714464</a>"},"page":"1-38","intvolume":"        34","year":"2025"},{"place":"Cham","year":"2025","citation":{"short":"J.M. Haney, Y. Acar, A. Li, F. Haney, in: Lecture Notes in Computer Science, Springer Nature Switzerland, Cham, 2025.","mla":"Haney, Julie M., et al. “Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey.” <i>Lecture Notes in Computer Science</i>, Springer Nature Switzerland, 2025, doi:<a href=\"https://doi.org/10.1007/978-3-031-92840-6_11\">10.1007/978-3-031-92840-6_11</a>.","bibtex":"@inbook{Haney_Acar_Li_Haney_2025, place={Cham}, title={Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-92840-6_11\">10.1007/978-3-031-92840-6_11</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Nature Switzerland}, author={Haney, Julie M. and Acar, Yasemin and Li, Anna and Haney, Faith}, year={2025} }","apa":"Haney, J. M., Acar, Y., Li, A., &#38; Haney, F. (2025). Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey. In <i>Lecture Notes in Computer Science</i>. Springer Nature Switzerland. <a href=\"https://doi.org/10.1007/978-3-031-92840-6_11\">https://doi.org/10.1007/978-3-031-92840-6_11</a>","ama":"Haney JM, Acar Y, Li A, Haney F. Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey. In: <i>Lecture Notes in Computer Science</i>. Springer Nature Switzerland; 2025. doi:<a href=\"https://doi.org/10.1007/978-3-031-92840-6_11\">10.1007/978-3-031-92840-6_11</a>","chicago":"Haney, Julie M., Yasemin Acar, Anna Li, and Faith Haney. “Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey.” In <i>Lecture Notes in Computer Science</i>. Cham: Springer Nature Switzerland, 2025. <a href=\"https://doi.org/10.1007/978-3-031-92840-6_11\">https://doi.org/10.1007/978-3-031-92840-6_11</a>.","ieee":"J. M. Haney, Y. Acar, A. Li, and F. Haney, “Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey,” in <i>Lecture Notes in Computer Science</i>, Cham: Springer Nature Switzerland, 2025."},"publication_identifier":{"isbn":["9783031928390","9783031928406"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","title":"Smart Home Users’ Security and Privacy Perceptions and Actions Differ By Device Category: Results from a U.S. Survey","doi":"10.1007/978-3-031-92840-6_11","publisher":"Springer Nature Switzerland","date_updated":"2025-09-04T11:15:39Z","author":[{"first_name":"Julie M.","last_name":"Haney","full_name":"Haney, Julie M."},{"last_name":"Acar","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"full_name":"Li, Anna","last_name":"Li","first_name":"Anna"},{"first_name":"Faith","last_name":"Haney","full_name":"Haney, Faith"}],"date_created":"2025-09-04T11:11:54Z","status":"public","publication":"Lecture Notes in Computer Science","type":"book_chapter","language":[{"iso":"eng"}],"_id":"61127","user_id":"94636"},{"_id":"61129","user_id":"94636","editor":[{"last_name":"Blanton","full_name":"Blanton, Marina","first_name":"Marina"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"full_name":"Nita-Rotaru, Cristina","last_name":"Nita-Rotaru","first_name":"Cristina"}],"status":"public","publication":"IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025","type":"conference","title":"\"It’s Time. Time for Digital Security.\": An End User Study on Actionable Security and Privacy Advice","doi":"10.1109/SP61157.2025.00100","date_updated":"2025-09-04T11:15:31Z","publisher":"IEEE","date_created":"2025-09-04T11:13:58Z","author":[{"full_name":"Rotthaler, Anna Lena","last_name":"Rotthaler","first_name":"Anna Lena"},{"first_name":"Harshini Sri","last_name":"Ramulu","full_name":"Ramulu, Harshini Sri"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"last_name":"Acar","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"year":"2025","page":"2228–2245","citation":{"ama":"Rotthaler AL, Ramulu HS, Simko L, Fahl S, Acar Y. “It’s Time. Time for Digital Security.”: An End User Study on Actionable Security and Privacy Advice. In: Blanton M, Enck W, Nita-Rotaru C, eds. <i>IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025</i>. IEEE; 2025:2228–2245. doi:<a href=\"https://doi.org/10.1109/SP61157.2025.00100\">10.1109/SP61157.2025.00100</a>","ieee":"A. L. Rotthaler, H. S. Ramulu, L. Simko, S. Fahl, and Y. Acar, “‘It’s Time. Time for Digital Security.’: An End User Study on Actionable Security and Privacy Advice,” in <i>IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025</i>, 2025, pp. 2228–2245, doi: <a href=\"https://doi.org/10.1109/SP61157.2025.00100\">10.1109/SP61157.2025.00100</a>.","chicago":"Rotthaler, Anna Lena, Harshini Sri Ramulu, Lucy Simko, Sascha Fahl, and Yasemin Acar. “‘It’s Time. Time for Digital Security.’: An End User Study on Actionable Security and Privacy Advice.” In <i>IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025</i>, edited by Marina Blanton, William Enck, and Cristina Nita-Rotaru, 2228–2245. IEEE, 2025. <a href=\"https://doi.org/10.1109/SP61157.2025.00100\">https://doi.org/10.1109/SP61157.2025.00100</a>.","mla":"Rotthaler, Anna Lena, et al. “‘It’s Time. Time for Digital Security.’: An End User Study on Actionable Security and Privacy Advice.” <i>IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025</i>, edited by Marina Blanton et al., IEEE, 2025, pp. 2228–2245, doi:<a href=\"https://doi.org/10.1109/SP61157.2025.00100\">10.1109/SP61157.2025.00100</a>.","bibtex":"@inproceedings{Rotthaler_Ramulu_Simko_Fahl_Acar_2025, title={“It’s Time. Time for Digital Security.”: An End User Study on Actionable Security and Privacy Advice}, DOI={<a href=\"https://doi.org/10.1109/SP61157.2025.00100\">10.1109/SP61157.2025.00100</a>}, booktitle={IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025}, publisher={IEEE}, author={Rotthaler, Anna Lena and Ramulu, Harshini Sri and Simko, Lucy and Fahl, Sascha and Acar, Yasemin}, editor={Blanton, Marina and Enck, William and Nita-Rotaru, Cristina}, year={2025}, pages={2228–2245} }","short":"A.L. Rotthaler, H.S. Ramulu, L. Simko, S. Fahl, Y. Acar, in: M. Blanton, W. Enck, C. Nita-Rotaru (Eds.), IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025, IEEE, 2025, pp. 2228–2245.","apa":"Rotthaler, A. L., Ramulu, H. S., Simko, L., Fahl, S., &#38; Acar, Y. (2025). “It’s Time. Time for Digital Security.”: An End User Study on Actionable Security and Privacy Advice. In M. Blanton, W. Enck, &#38; C. Nita-Rotaru (Eds.), <i>IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025</i> (pp. 2228–2245). IEEE. <a href=\"https://doi.org/10.1109/SP61157.2025.00100\">https://doi.org/10.1109/SP61157.2025.00100</a>"}},{"user_id":"94636","_id":"61128","type":"conference","publication":"Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025","status":"public","editor":[{"first_name":"Patrick Gage","last_name":"Kelley","full_name":"Kelley, Patrick Gage"},{"full_name":"Mondal, Mainack","last_name":"Mondal","first_name":"Mainack"},{"first_name":"Kami","last_name":"Vaniea","full_name":"Vaniea, Kami"}],"date_created":"2025-09-04T11:13:04Z","author":[{"first_name":"Annalina","last_name":"Buckmann","full_name":"Buckmann, Annalina"},{"full_name":"Nold, Jan Magnus","last_name":"Nold","first_name":"Jan Magnus"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin"},{"full_name":"Zou, Yixin","last_name":"Zou","first_name":"Yixin"}],"date_updated":"2025-09-04T11:15:35Z","publisher":"USENIX Association","title":"More than Usability: Differential Access to Digital Security and Privacy","citation":{"ama":"Buckmann A, Nold JM, Acar Y, Zou Y. More than Usability: Differential Access to Digital Security and Privacy. In: Kelley PG, Mondal M, Vaniea K, eds. <i>Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025</i>. USENIX Association; 2025:455–474.","chicago":"Buckmann, Annalina, Jan Magnus Nold, Yasemin Acar, and Yixin Zou. “More than Usability: Differential Access to Digital Security and Privacy.” In <i>Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025</i>, edited by Patrick Gage Kelley, Mainack Mondal, and Kami Vaniea, 455–474. USENIX Association, 2025.","ieee":"A. Buckmann, J. M. Nold, Y. Acar, and Y. Zou, “More than Usability: Differential Access to Digital Security and Privacy,” in <i>Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025</i>, 2025, pp. 455–474.","short":"A. Buckmann, J.M. Nold, Y. Acar, Y. Zou, in: P.G. Kelley, M. Mondal, K. Vaniea (Eds.), Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025, USENIX Association, 2025, pp. 455–474.","bibtex":"@inproceedings{Buckmann_Nold_Acar_Zou_2025, title={More than Usability: Differential Access to Digital Security and Privacy}, booktitle={Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025}, publisher={USENIX Association}, author={Buckmann, Annalina and Nold, Jan Magnus and Acar, Yasemin and Zou, Yixin}, editor={Kelley, Patrick Gage and Mondal, Mainack and Vaniea, Kami}, year={2025}, pages={455–474} }","mla":"Buckmann, Annalina, et al. “More than Usability: Differential Access to Digital Security and Privacy.” <i>Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025</i>, edited by Patrick Gage Kelley et al., USENIX Association, 2025, pp. 455–474.","apa":"Buckmann, A., Nold, J. M., Acar, Y., &#38; Zou, Y. (2025). More than Usability: Differential Access to Digital Security and Privacy. In P. G. Kelley, M. Mondal, &#38; K. Vaniea (Eds.), <i>Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025</i> (pp. 455–474). USENIX Association."},"page":"455–474","year":"2025"},{"user_id":"94636","date_created":"2025-09-04T11:14:39Z","author":[{"full_name":"Rahman, Imranur","last_name":"Rahman","first_name":"Imranur"},{"full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Michel","last_name":"Cukier","full_name":"Cukier, Michel"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"first_name":"Christian","last_name":"Kastner","full_name":"Kastner, Christian"},{"last_name":"Kapravelos","full_name":"Kapravelos, Alexandros","first_name":"Alexandros"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"first_name":"Laurie","full_name":"Williams, Laurie","last_name":"Williams"}],"date_updated":"2025-09-04T11:15:25Z","_id":"61131","title":"S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit","type":"journal_article","citation":{"ama":"Rahman I, Acar Y, Cukier M, et al. S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit. Published online 2025.","ieee":"I. Rahman <i>et al.</i>, “S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit,” 2025.","chicago":"Rahman, Imranur, Yasemin Acar, Michel Cukier, William Enck, Christian Kastner, Alexandros Kapravelos, Dominik Wermke, and Laurie Williams. “S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit,” 2025.","apa":"Rahman, I., Acar, Y., Cukier, M., Enck, W., Kastner, C., Kapravelos, A., Wermke, D., &#38; Williams, L. (2025). <i>S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit</i>.","bibtex":"@article{Rahman_Acar_Cukier_Enck_Kastner_Kapravelos_Wermke_Williams_2025, title={S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit}, author={Rahman, Imranur and Acar, Yasemin and Cukier, Michel and Enck, William and Kastner, Christian and Kapravelos, Alexandros and Wermke, Dominik and Williams, Laurie}, year={2025} }","mla":"Rahman, Imranur, et al. <i>S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit</i>. 2025.","short":"I. Rahman, Y. Acar, M. Cukier, W. Enck, C. Kastner, A. Kapravelos, D. Wermke, L. Williams, (2025)."},"status":"public","year":"2025"},{"type":"journal_article","year":"2025","citation":{"ieee":"C. Miller <i>et al.</i>, “S3C2 Summit 2024-08: Government Secure Supply Chain Summit,” 2025.","chicago":"Miller, Courtney, William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kastner, Dominik Wermke, and Laurie Williams. “S3C2 Summit 2024-08: Government Secure Supply Chain Summit,” 2025.","ama":"Miller C, Enck W, Acar Y, et al. S3C2 Summit 2024-08: Government Secure Supply Chain Summit. Published online 2025.","bibtex":"@article{Miller_Enck_Acar_Cukier_Kapravelos_Kastner_Wermke_Williams_2025, title={S3C2 Summit 2024-08: Government Secure Supply Chain Summit}, author={Miller, Courtney and Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kastner, Christian and Wermke, Dominik and Williams, Laurie}, year={2025} }","mla":"Miller, Courtney, et al. <i>S3C2 Summit 2024-08: Government Secure Supply Chain Summit</i>. 2025.","short":"C. Miller, W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kastner, D. Wermke, L. Williams, (2025).","apa":"Miller, C., Enck, W., Acar, Y., Cukier, M., Kapravelos, A., Kastner, C., Wermke, D., &#38; Williams, L. (2025). <i>S3C2 Summit 2024-08: Government Secure Supply Chain Summit</i>."},"status":"public","date_updated":"2025-09-04T11:15:27Z","_id":"61130","user_id":"94636","date_created":"2025-09-04T11:14:26Z","author":[{"full_name":"Miller, Courtney","last_name":"Miller","first_name":"Courtney"},{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Cukier, Michel","last_name":"Cukier","first_name":"Michel"},{"first_name":"Alexandros","full_name":"Kapravelos, Alexandros","last_name":"Kapravelos"},{"first_name":"Christian","last_name":"Kastner","full_name":"Kastner, Christian"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"full_name":"Williams, Laurie","last_name":"Williams","first_name":"Laurie"}],"title":"S3C2 Summit 2024-08: Government Secure Supply Chain Summit"},{"type":"journal_article","status":"public","citation":{"ieee":"N. Busch, P. Klostermeyer, J. H. Klemmer, Y. Acar, and S. Fahl, “From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange,” 2025.","chicago":"Busch, Niklas, Philip Klostermeyer, Jan H. Klemmer, Yasemin Acar, and Sascha Fahl. “From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange,” 2025.","ama":"Busch N, Klostermeyer P, Klemmer JH, Acar Y, Fahl S. From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange. Published online 2025.","short":"N. Busch, P. Klostermeyer, J.H. Klemmer, Y. Acar, S. Fahl, (2025).","bibtex":"@article{Busch_Klostermeyer_Klemmer_Acar_Fahl_2025, title={From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange}, author={Busch, Niklas and Klostermeyer, Philip and Klemmer, Jan H. and Acar, Yasemin and Fahl, Sascha}, year={2025} }","mla":"Busch, Niklas, et al. <i>From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange</i>. 2025.","apa":"Busch, N., Klostermeyer, P., Klemmer, J. H., Acar, Y., &#38; Fahl, S. (2025). <i>From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange</i>."},"year":"2025","author":[{"first_name":"Niklas","full_name":"Busch, Niklas","last_name":"Busch"},{"full_name":"Klostermeyer, Philip","last_name":"Klostermeyer","first_name":"Philip"},{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"first_name":"Yasemin","full_name":"Acar, Yasemin","last_name":"Acar"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2025-09-04T11:14:57Z","user_id":"94636","_id":"61132","date_updated":"2025-09-04T11:15:22Z","title":"From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange"},{"file_date_updated":"2025-09-04T11:39:04Z","_id":"61026","department":[{"_id":"40"}],"user_id":"72311","status":"public","type":"journal_article","doi":"10.1017/ehs.2025.10013","main_file_link":[{"url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/E819AFD9F17034D21F2F39FC9817C35E/S2513843X25100133a.pdf/wild-bonobos-experience-unusually-low-bone-resorption-during-early-lactation-relative-to-humans-and-other-mammals.pdf","open_access":"1"}],"oa":"1","date_updated":"2025-09-04T11:44:28Z","volume":7,"author":[{"first_name":"Verena","full_name":"Behringer, Verena","last_name":"Behringer"},{"first_name":"Ruth","full_name":"Sonnweber, Ruth","last_name":"Sonnweber"},{"first_name":"Barbara","full_name":"Fruth, Barbara","last_name":"Fruth"},{"first_name":"Genevieve","last_name":"Housman","full_name":"Housman, Genevieve"},{"last_name":"Douglas","id":"72311","full_name":"Douglas, Pamela Heidi","first_name":"Pamela Heidi"},{"last_name":"Stevens","full_name":"Stevens, Jeroen M. G.","first_name":"Jeroen M. G."},{"full_name":"Hohmann, Gottfried","last_name":"Hohmann","first_name":"Gottfried"},{"full_name":"Kivell, Tracy L.","last_name":"Kivell","first_name":"Tracy L."}],"page":"1-23","intvolume":"         7","citation":{"apa":"Behringer, V., Sonnweber, R., Fruth, B., Housman, G., Douglas, P. H., Stevens, J. M. G., Hohmann, G., &#38; Kivell, T. L. (2025). Wild bonobos experience unusually low bone resorption during early lactation relative to humans and other mammals. <i>Evolutionary Human Sciences</i>, <i>7</i>(e27), 1–23. <a href=\"https://doi.org/10.1017/ehs.2025.10013\">https://doi.org/10.1017/ehs.2025.10013</a>","mla":"Behringer, Verena, et al. “Wild Bonobos Experience Unusually Low Bone Resorption during Early Lactation Relative to Humans and Other Mammals.” <i>Evolutionary Human Sciences</i>, vol. 7, no. e27, Cambridge University Press (CUP), 2025, pp. 1–23, doi:<a href=\"https://doi.org/10.1017/ehs.2025.10013\">10.1017/ehs.2025.10013</a>.","short":"V. Behringer, R. Sonnweber, B. Fruth, G. Housman, P.H. Douglas, J.M.G. Stevens, G. Hohmann, T.L. Kivell, Evolutionary Human Sciences 7 (2025) 1–23.","bibtex":"@article{Behringer_Sonnweber_Fruth_Housman_Douglas_Stevens_Hohmann_Kivell_2025, title={Wild bonobos experience unusually low bone resorption during early lactation relative to humans and other mammals}, volume={7}, DOI={<a href=\"https://doi.org/10.1017/ehs.2025.10013\">10.1017/ehs.2025.10013</a>}, number={e27}, journal={Evolutionary Human Sciences}, publisher={Cambridge University Press (CUP)}, author={Behringer, Verena and Sonnweber, Ruth and Fruth, Barbara and Housman, Genevieve and Douglas, Pamela Heidi and Stevens, Jeroen M. G. and Hohmann, Gottfried and Kivell, Tracy L.}, year={2025}, pages={1–23} }","ama":"Behringer V, Sonnweber R, Fruth B, et al. Wild bonobos experience unusually low bone resorption during early lactation relative to humans and other mammals. <i>Evolutionary Human Sciences</i>. 2025;7(e27):1-23. doi:<a href=\"https://doi.org/10.1017/ehs.2025.10013\">10.1017/ehs.2025.10013</a>","ieee":"V. Behringer <i>et al.</i>, “Wild bonobos experience unusually low bone resorption during early lactation relative to humans and other mammals,” <i>Evolutionary Human Sciences</i>, vol. 7, no. e27, pp. 1–23, 2025, doi: <a href=\"https://doi.org/10.1017/ehs.2025.10013\">10.1017/ehs.2025.10013</a>.","chicago":"Behringer, Verena, Ruth Sonnweber, Barbara Fruth, Genevieve Housman, Pamela Heidi Douglas, Jeroen M. G. Stevens, Gottfried Hohmann, and Tracy L. Kivell. “Wild Bonobos Experience Unusually Low Bone Resorption during Early Lactation Relative to Humans and Other Mammals.” <i>Evolutionary Human Sciences</i> 7, no. e27 (2025): 1–23. <a href=\"https://doi.org/10.1017/ehs.2025.10013\">https://doi.org/10.1017/ehs.2025.10013</a>."},"publication_identifier":{"issn":["2513-843X"]},"has_accepted_license":"1","publication_status":"published","keyword":["Reproductive phase","Hominoid","CTX-I","Bone turnover markers","Pan paniscus","Bone density"],"ddc":["590"],"language":[{"iso":"eng"}],"abstract":[{"text":"In mammals, pregnancy and lactation are marked by calcium stress and bone resorption, leading to reduced bone mineral density. In humans, these periods may partly explain the higher prevalence of osteoporosis in older women compared with men, but lactation patterns in modern humans may reflect cultural influences rather than natural conditions. The extent to which these findings apply to wild-living mammals remains unknown. We measured urinary C-terminal crosslinking telopeptide of Type I collagen (CTX-I) levels, a bone resorption marker, during pregnancy in wild and zoo-housed bonobos (Pan paniscus) and during lactation in wild bonobos. Studying wild-living primates such as bonobos can provide insights into ancestral reproductive adaptations. We found an increase in CTX-I levels towards the end of pregnancy in zoo-housed and primiparous wild females. Contrary to expectations, CTX-I levels during early lactation are lower than in other reproductive phases. This pattern diverges from the assumption that lactation increases bone resorption. Our findings suggest that wild bonobos may use physiological or behavioral strategies to modulate bone metabolism during lactation. These adaptations, shaped in natural environments, provide insight into evolutionary pressures on skeletal health and may inform strategies to mitigate bone loss in humans.","lang":"eng"}],"file":[{"file_size":1473060,"file_id":"61133","access_level":"open_access","file_name":"Behringer et al - 2025 - Wild-bonobos-experience-unusually-low-bone-resorption-during-early-lactation-relative-to-humans-and-other-mammals.pdf","date_updated":"2025-09-04T11:39:04Z","creator":"hdouglas","date_created":"2025-09-04T11:39:04Z","relation":"main_file","content_type":"application/pdf"}],"publication":"Evolutionary Human Sciences","title":"Wild bonobos experience unusually low bone resorption during early lactation relative to humans and other mammals","publisher":"Cambridge University Press (CUP)","date_created":"2025-08-26T19:28:20Z","year":"2025","issue":"e27"},{"publication_status":"published","has_accepted_license":"1","place":"Bielefeld","citation":{"chicago":"Steinhardt, Isabel. “Doing Gender Reflexionen im Lehramtsstudium.” In <i>Förderung von Genderkompetenz in der Ausbildung von Lehrkräften</i>, edited by Ilke Glockentöger, 203–9. Bielefeld: wbv, 2025.","ieee":"I. Steinhardt, “Doing Gender Reflexionen im Lehramtsstudium,” in <i>Förderung von Genderkompetenz in der Ausbildung von Lehrkräften</i>, I. Glockentöger, Ed. Bielefeld: wbv, 2025, pp. 203–209.","ama":"Steinhardt I. Doing Gender Reflexionen im Lehramtsstudium. In: Glockentöger I, ed. <i>Förderung von Genderkompetenz in der Ausbildung von Lehrkräften</i>. wbv; 2025:203-209.","short":"I. Steinhardt, in: I. Glockentöger (Ed.), Förderung von Genderkompetenz in der Ausbildung von Lehrkräften, wbv, Bielefeld, 2025, pp. 203–209.","mla":"Steinhardt, Isabel. “Doing Gender Reflexionen im Lehramtsstudium.” <i>Förderung von Genderkompetenz in der Ausbildung von Lehrkräften</i>, edited by Ilke Glockentöger, wbv, 2025, pp. 203–09.","bibtex":"@inbook{Steinhardt_2025, place={Bielefeld}, title={Doing Gender Reflexionen im Lehramtsstudium}, booktitle={Förderung von Genderkompetenz in der Ausbildung von Lehrkräften}, publisher={wbv}, author={Steinhardt, Isabel}, editor={Glockentöger, Ilke}, year={2025}, pages={203–209} }","apa":"Steinhardt, I. (2025). Doing Gender Reflexionen im Lehramtsstudium. In I. Glockentöger (Ed.), <i>Förderung von Genderkompetenz in der Ausbildung von Lehrkräften</i> (pp. 203–209). wbv."},"page":"203-209","oa":"1","date_updated":"2025-09-05T13:08:17Z","author":[{"id":"90339","full_name":"Steinhardt, Isabel","orcid":"https://orcid.org/0000-0002-2590-6189","last_name":"Steinhardt","first_name":"Isabel"}],"main_file_link":[{"open_access":"1","url":"https://www.researchgate.net/publication/393163707_Doing_Gender_Reflexionen_im_Lehramtsstudium"}],"type":"book_chapter","editor":[{"last_name":"Glockentöger","full_name":"Glockentöger, Ilke","first_name":"Ilke"}],"status":"public","_id":"60524","user_id":"90339","department":[{"_id":"121"}],"file_date_updated":"2025-07-06T14:27:25Z","quality_controlled":"1","year":"2025","publisher":"wbv","date_created":"2025-07-06T14:27:53Z","title":"Doing Gender Reflexionen im Lehramtsstudium","publication":"Förderung von Genderkompetenz in der Ausbildung von Lehrkräften","abstract":[{"text":"Damit sich Lehramtsstudierende Genderkompetenz im Studium aneignen können, ist es zunächst notwendig, diese zur Reflexion über Gender anzuregen – so die These dieses Beitrags. Kompetenzen entstehen durch die Aneignung von Kenntnissen, Fähigkeiten, Fertigkeiten und Werthaltungen und sind an Sozialisationserfahrungen und damit inkorporierte Handlungsweisen und Normen gebunden Genderkompetenz ist notwendig, um Schülerinnen und Schülern gleiche Entwicklungschancen jenseits geschlechtsspezifischer Zuschreibungen zu ermöglichen und bei angehenden Lehrkräften umfassende Genderkompetenz zu etablieren. Dabei ist Gender sozial konstruiert, was als „doing gender“ bezeichnet wird. Der vorliegende Beitrag stellt ein Seminarkonzept vor, in dem über den Doing-Gender-Ansatz die alltägliche Herstellung von Geschlecht in den Mittelpunkt gerückt wird. Erst wenn – so die Grundannahme des Beitrags – verstanden ist, wie Geschlecht in der Gesellschaft über das Doing Gender (re)produziert wird, kann das Doing durch eigene Verhaltensänderungen verändert werden. Wie dies erreicht werden kann, wird im Folgenden dargestellt. Dazu wird zunächst das Seminarkonzept vorgestellt, in dem durch die Reflexion einer schulischen Situation, in die die Studierenden selbst involviert waren, das Doing Gender aufgedeckt wird. Anschließend wird eine Typologie von Situationen vorgestellt, die auf den Portfolios von fünf Seminaren (WS 21/22bis WS 23/24) basiert. Abschließend wird evaluiert, inwieweit ein Kompetenzerwerb in Bezug auf Gender im Seminar stattgefunden hat.","lang":"ger"}],"file":[{"content_type":"application/pdf","relation":"main_file","creator":"isste","date_created":"2025-07-06T14:27:25Z","date_updated":"2025-07-06T14:27:25Z","access_level":"open_access","file_name":"2025 Steinhardt Doing Gender.pdf","file_id":"60525","file_size":186494}],"ddc":["300"],"keyword":["Doing Gender","Lehramt","Kompetenzen"],"language":[{"iso":"ger"}]},{"type":"journal_article","publication":"Arxiv","abstract":[{"lang":"eng","text":"Prior research shows that social norms can reduce algorithm aversion, but little is known about how such norms become established. Most accounts emphasize technological and individual determinants, yet AI adoption unfolds within organizational social contexts shaped by peers and supervisors. We ask whether the source of the norm-peers or supervisors-shapes AI usage behavior. This question is practically relevant for organizations seeking to promote effective AI adoption. We conducted an online vignette experiment, complemented by qualitative data on participants' feelings and justifications after (counter-)normative behavior. In line with the theory, counter-normative choices elicited higher regret than norm-adherent choices. On average, choosing AI increased regret compared to choosing an human. This aversion was weaker when AI use was presented as the prevailing norm, indicating a statistically significant interaction between AI use and an AI-favoring norm. Participants also attributed less blame to technology than to humans, which increased regret when AI was chosen over human expertise. Both peer and supervisor influence emerged as relevant factors, though contrary to expectations they did not significantly affect regret. Our findings suggest that regret aversion, embedded in social norms, is a central mechanism driving imitation in AI-related decision-making."}],"status":"public","project":[{"_id":"125","name":"TRR 318 - Subproject C2"}],"_id":"61137","user_id":"72497","department":[{"_id":"178"},{"_id":"184"}],"language":[{"iso":"eng"}],"year":"2025","citation":{"ieee":"J. Kornowicz, M. Pape, and K. Thommes, “Would I regret being different? The influence of social norms on attitudes toward AI usage,” <i>Arxiv</i>, 2025, doi: <a href=\"https://doi.org/10.48550/ARXIV.2509.04241\">10.48550/ARXIV.2509.04241</a>.","chicago":"Kornowicz, Jaroslaw, Maurice Pape, and Kirsten Thommes. “Would I Regret Being Different? The Influence of Social Norms on Attitudes toward AI Usage.” <i>Arxiv</i>, 2025. <a href=\"https://doi.org/10.48550/ARXIV.2509.04241\">https://doi.org/10.48550/ARXIV.2509.04241</a>.","ama":"Kornowicz J, Pape M, Thommes K. Would I regret being different? The influence of social norms on attitudes toward AI usage. <i>Arxiv</i>. Published online 2025. doi:<a href=\"https://doi.org/10.48550/ARXIV.2509.04241\">10.48550/ARXIV.2509.04241</a>","apa":"Kornowicz, J., Pape, M., &#38; Thommes, K. (2025). Would I regret being different? The influence of social norms on attitudes toward AI usage. <i>Arxiv</i>. <a href=\"https://doi.org/10.48550/ARXIV.2509.04241\">https://doi.org/10.48550/ARXIV.2509.04241</a>","mla":"Kornowicz, Jaroslaw, et al. “Would I Regret Being Different? The Influence of Social Norms on Attitudes toward AI Usage.” <i>Arxiv</i>, 2025, doi:<a href=\"https://doi.org/10.48550/ARXIV.2509.04241\">10.48550/ARXIV.2509.04241</a>.","bibtex":"@article{Kornowicz_Pape_Thommes_2025, title={Would I regret being different? The influence of social norms on attitudes toward AI usage}, DOI={<a href=\"https://doi.org/10.48550/ARXIV.2509.04241\">10.48550/ARXIV.2509.04241</a>}, journal={Arxiv}, author={Kornowicz, Jaroslaw and Pape, Maurice and Thommes, Kirsten}, year={2025} }","short":"J. Kornowicz, M. Pape, K. Thommes, Arxiv (2025)."},"date_updated":"2025-09-05T06:45:01Z","author":[{"full_name":"Kornowicz, Jaroslaw","id":"44029","orcid":"0000-0002-5654-9911","last_name":"Kornowicz","first_name":"Jaroslaw"},{"last_name":"Pape","full_name":"Pape, Maurice","first_name":"Maurice"},{"first_name":"Kirsten","last_name":"Thommes","full_name":"Thommes, Kirsten","id":"72497"}],"date_created":"2025-09-05T06:42:48Z","title":"Would I regret being different? The influence of social norms on attitudes toward AI usage","doi":"10.48550/ARXIV.2509.04241"},{"intvolume":"       945","citation":{"short":"N. Pfeffer, M.A. Kaiser, W. Feix, N. Kälble, M. Merten, A. Stark, A. Haufe, T. Meyer, T. Tröster, H.W. Höppel, Materials Science and Engineering: A 945 (2025).","mla":"Pfeffer, Nina, et al. “Energy- and Material-Efficient Ti-6Al-4V Sheet Part Fabrication by the Novel TISTRAQ-Process, Including Resistance Heating and Tool-Based Quenching: Insights into Test Stand Design and Material Potential.” <i>Materials Science and Engineering: A</i>, vol. 945, 149015, Elsevier BV, 2025, doi:<a href=\"https://doi.org/10.1016/j.msea.2025.149015\">10.1016/j.msea.2025.149015</a>.","bibtex":"@article{Pfeffer_Kaiser_Feix_Kälble_Merten_Stark_Haufe_Meyer_Tröster_Höppel_2025, title={Energy- and material-efficient Ti-6Al-4V sheet part fabrication by the novel TISTRAQ-process, including resistance heating and tool-based quenching: Insights into test stand design and material potential}, volume={945}, DOI={<a href=\"https://doi.org/10.1016/j.msea.2025.149015\">10.1016/j.msea.2025.149015</a>}, number={149015}, journal={Materials Science and Engineering: A}, publisher={Elsevier BV}, author={Pfeffer, Nina and Kaiser, Maximilian Alexander and Feix, Werner and Kälble, Nils and Merten, Mathias and Stark, Andreas and Haufe, Andre and Meyer, Thomas and Tröster, Thomas and Höppel, Heinz Werner}, year={2025} }","apa":"Pfeffer, N., Kaiser, M. A., Feix, W., Kälble, N., Merten, M., Stark, A., Haufe, A., Meyer, T., Tröster, T., &#38; Höppel, H. W. (2025). Energy- and material-efficient Ti-6Al-4V sheet part fabrication by the novel TISTRAQ-process, including resistance heating and tool-based quenching: Insights into test stand design and material potential. <i>Materials Science and Engineering: A</i>, <i>945</i>, Article 149015. <a href=\"https://doi.org/10.1016/j.msea.2025.149015\">https://doi.org/10.1016/j.msea.2025.149015</a>","ieee":"N. Pfeffer <i>et al.</i>, “Energy- and material-efficient Ti-6Al-4V sheet part fabrication by the novel TISTRAQ-process, including resistance heating and tool-based quenching: Insights into test stand design and material potential,” <i>Materials Science and Engineering: A</i>, vol. 945, Art. no. 149015, 2025, doi: <a href=\"https://doi.org/10.1016/j.msea.2025.149015\">10.1016/j.msea.2025.149015</a>.","chicago":"Pfeffer, Nina, Maximilian Alexander Kaiser, Werner Feix, Nils Kälble, Mathias Merten, Andreas Stark, Andre Haufe, Thomas Meyer, Thomas Tröster, and Heinz Werner Höppel. “Energy- and Material-Efficient Ti-6Al-4V Sheet Part Fabrication by the Novel TISTRAQ-Process, Including Resistance Heating and Tool-Based Quenching: Insights into Test Stand Design and Material Potential.” <i>Materials Science and Engineering: A</i> 945 (2025). <a href=\"https://doi.org/10.1016/j.msea.2025.149015\">https://doi.org/10.1016/j.msea.2025.149015</a>.","ama":"Pfeffer N, Kaiser MA, Feix W, et al. Energy- and material-efficient Ti-6Al-4V sheet part fabrication by the novel TISTRAQ-process, including resistance heating and tool-based quenching: Insights into test stand design and material potential. <i>Materials Science and Engineering: A</i>. 2025;945. doi:<a href=\"https://doi.org/10.1016/j.msea.2025.149015\">10.1016/j.msea.2025.149015</a>"},"year":"2025","publication_identifier":{"issn":["0921-5093"]},"publication_status":"published","doi":"10.1016/j.msea.2025.149015","title":"Energy- and material-efficient Ti-6Al-4V sheet part fabrication by the novel TISTRAQ-process, including resistance heating and tool-based quenching: Insights into test stand design and material potential","volume":945,"author":[{"first_name":"Nina","last_name":"Pfeffer","full_name":"Pfeffer, Nina"},{"last_name":"Kaiser","orcid":"0009-0008-1333-3396","full_name":"Kaiser, Maximilian Alexander","id":"72351","first_name":"Maximilian Alexander"},{"first_name":"Werner","full_name":"Feix, Werner","last_name":"Feix"},{"first_name":"Nils","last_name":"Kälble","full_name":"Kälble, Nils"},{"last_name":"Merten","full_name":"Merten, Mathias","first_name":"Mathias"},{"first_name":"Andreas","last_name":"Stark","full_name":"Stark, Andreas"},{"first_name":"Andre","full_name":"Haufe, Andre","last_name":"Haufe"},{"first_name":"Thomas","full_name":"Meyer, Thomas","last_name":"Meyer"},{"first_name":"Thomas","full_name":"Tröster, Thomas","id":"553","last_name":"Tröster"},{"full_name":"Höppel, Heinz Werner","last_name":"Höppel","first_name":"Heinz Werner"}],"date_created":"2025-09-06T06:41:08Z","date_updated":"2025-09-07T10:37:00Z","publisher":"Elsevier BV","status":"public","publication":"Materials Science and Engineering: A","type":"journal_article","language":[{"iso":"eng"}],"article_number":"149015","department":[{"_id":"9"},{"_id":"321"},{"_id":"149"}],"user_id":"72351","_id":"61139"},{"year":"2025","intvolume":"       311","citation":{"chicago":"Rezat, Sara, and Kirsten Schindler, eds. <i>KI und Schreiben.</i> <i>Praxis Deutsch</i>. Vol. 311, 2025.","ieee":"S. Rezat and K. Schindler, Eds., <i>KI und Schreiben.</i>, vol. 311. 2025.","ama":"Rezat S, Schindler K, eds. <i>KI und Schreiben.</i> Vol 311.; 2025.","apa":"KI und Schreiben. (2025). In S. Rezat &#38; K. Schindler (Eds.), <i>Praxis Deutsch</i> (Vol. 311).","bibtex":"@book{Rezat_Schindler_2025, title={KI und Schreiben.}, volume={311}, journal={Praxis Deutsch}, year={2025} }","short":"S. Rezat, K. Schindler, eds., KI und Schreiben., 2025.","mla":"Rezat, Sara, and Kirsten Schindler, editors. “KI und Schreiben.” <i>Praxis Deutsch</i>, vol. 311, 2025."},"quality_controlled":"1","publication_status":"published","title":"KI und Schreiben.","date_updated":"2025-09-04T13:11:28Z","volume":311,"date_created":"2025-07-21T06:38:58Z","editor":[{"id":"58338","full_name":"Rezat, Sara","last_name":"Rezat","first_name":"Sara"},{"first_name":"Kirsten","last_name":"Schindler","full_name":"Schindler, Kirsten"}],"status":"public","publication":"Praxis Deutsch","type":"journal_editor","language":[{"iso":"ger"}],"_id":"60678","user_id":"58338"},{"doi":"10.1016/j.ultras.2025.107799","title":"Dynamic interface behavior in coupled plates: Investigating Lamb wave mode repulsion with a spring-based model","author":[{"first_name":"Marcel","last_name":"Nicolai","full_name":"Nicolai, Marcel"},{"first_name":"Jannis","last_name":"Bulling","full_name":"Bulling, Jannis"},{"first_name":"M.M.","last_name":"Narayanan","full_name":"Narayanan, M.M."},{"full_name":"Zeipert, Henning","id":"32580","last_name":"Zeipert","first_name":"Henning"},{"last_name":"Prager","full_name":"Prager, Jens","first_name":"Jens"},{"first_name":"Bernd","last_name":"Henning","id":"213","full_name":"Henning, Bernd"}],"date_created":"2025-09-08T06:50:08Z","volume":158,"publisher":"Elsevier BV","date_updated":"2025-09-08T06:51:16Z","citation":{"mla":"Nicolai, Marcel, et al. “Dynamic Interface Behavior in Coupled Plates: Investigating Lamb Wave Mode Repulsion with a Spring-Based Model.” <i>Ultrasonics</i>, vol. 158, 107799, Elsevier BV, 2025, doi:<a href=\"https://doi.org/10.1016/j.ultras.2025.107799\">10.1016/j.ultras.2025.107799</a>.","bibtex":"@article{Nicolai_Bulling_Narayanan_Zeipert_Prager_Henning_2025, title={Dynamic interface behavior in coupled plates: Investigating Lamb wave mode repulsion with a spring-based model}, volume={158}, DOI={<a href=\"https://doi.org/10.1016/j.ultras.2025.107799\">10.1016/j.ultras.2025.107799</a>}, number={107799}, journal={Ultrasonics}, publisher={Elsevier BV}, author={Nicolai, Marcel and Bulling, Jannis and Narayanan, M.M. and Zeipert, Henning and Prager, Jens and Henning, Bernd}, year={2025} }","short":"M. Nicolai, J. Bulling, M.M. Narayanan, H. Zeipert, J. Prager, B. Henning, Ultrasonics 158 (2025).","apa":"Nicolai, M., Bulling, J., Narayanan, M. M., Zeipert, H., Prager, J., &#38; Henning, B. (2025). Dynamic interface behavior in coupled plates: Investigating Lamb wave mode repulsion with a spring-based model. <i>Ultrasonics</i>, <i>158</i>, Article 107799. <a href=\"https://doi.org/10.1016/j.ultras.2025.107799\">https://doi.org/10.1016/j.ultras.2025.107799</a>","chicago":"Nicolai, Marcel, Jannis Bulling, M.M. Narayanan, Henning Zeipert, Jens Prager, and Bernd Henning. “Dynamic Interface Behavior in Coupled Plates: Investigating Lamb Wave Mode Repulsion with a Spring-Based Model.” <i>Ultrasonics</i> 158 (2025). <a href=\"https://doi.org/10.1016/j.ultras.2025.107799\">https://doi.org/10.1016/j.ultras.2025.107799</a>.","ieee":"M. Nicolai, J. Bulling, M. M. Narayanan, H. Zeipert, J. Prager, and B. Henning, “Dynamic interface behavior in coupled plates: Investigating Lamb wave mode repulsion with a spring-based model,” <i>Ultrasonics</i>, vol. 158, Art. no. 107799, 2025, doi: <a href=\"https://doi.org/10.1016/j.ultras.2025.107799\">10.1016/j.ultras.2025.107799</a>.","ama":"Nicolai M, Bulling J, Narayanan MM, Zeipert H, Prager J, Henning B. Dynamic interface behavior in coupled plates: Investigating Lamb wave mode repulsion with a spring-based model. <i>Ultrasonics</i>. 2025;158. doi:<a href=\"https://doi.org/10.1016/j.ultras.2025.107799\">10.1016/j.ultras.2025.107799</a>"},"intvolume":"       158","year":"2025","publication_status":"published","publication_identifier":{"issn":["0041-624X"]},"language":[{"iso":"eng"}],"article_number":"107799","user_id":"32580","department":[{"_id":"49"}],"project":[{"name":"Vermiedene Kreuzungen von Lamb-Wellenmoden in mehrlagigen Strukturen","_id":"105"}],"_id":"61140","status":"public","type":"journal_article","publication":"Ultrasonics"},{"year":"2025","page":"155-184","citation":{"apa":"Kremer, H.-H., Otto, F., &#38; Volgmann, S. (2025). „Dagegen haben unsere I-Schüler:innen keine Probleme sich darzustellen!“ Selbstinszenierungspraktiken von Schüler:innen mit dem Förderschwerpunkt geistige Entwicklung. In H.-H. Kremer, P. Frehe-Halliwell, D. Laubenstein, &#38; H. Kundisch (Eds.), <i>Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher</i> (pp. 155–184).","short":"H.-H. Kremer, F. Otto, S. Volgmann, in: H.-H. Kremer, P. Frehe-Halliwell, D. Laubenstein, H. Kundisch (Eds.), Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher, 2025, pp. 155–184.","mla":"Kremer, H. Hugo, et al. “„Dagegen Haben Unsere I-Schüler:Innen Keine Probleme Sich Darzustellen!“ Selbstinszenierungspraktiken von Schüler:Innen Mit Dem Förderschwerpunkt Geistige Entwicklung.” <i>Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher</i>, edited by H.-Hugo Kremer et al., 2025, pp. 155–84.","bibtex":"@inbook{Kremer_Otto_Volgmann_2025, title={„Dagegen haben unsere I-Schüler:innen keine Probleme sich darzustellen!“ Selbstinszenierungspraktiken von Schüler:innen mit dem Förderschwerpunkt geistige Entwicklung}, booktitle={Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher}, author={Kremer, H.-Hugo and Otto, Franziska and Volgmann, Simone}, editor={Kremer, H.-Hugo and Frehe-Halliwell, Petra and Laubenstein, Désirée and Kundisch, Heike}, year={2025}, pages={155–184} }","ama":"Kremer H-H, Otto F, Volgmann S. „Dagegen haben unsere I-Schüler:innen keine Probleme sich darzustellen!“ Selbstinszenierungspraktiken von Schüler:innen mit dem Förderschwerpunkt geistige Entwicklung. In: Kremer H-H, Frehe-Halliwell P, Laubenstein D, Kundisch H, eds. <i>Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher</i>. ; 2025:155-184.","ieee":"H.-H. Kremer, F. Otto, and S. Volgmann, “„Dagegen haben unsere I-Schüler:innen keine Probleme sich darzustellen!“ Selbstinszenierungspraktiken von Schüler:innen mit dem Förderschwerpunkt geistige Entwicklung,” in <i>Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher</i>, H.-H. Kremer, P. Frehe-Halliwell, D. Laubenstein, and H. Kundisch, Eds. 2025, pp. 155–184.","chicago":"Kremer, H.-Hugo, Franziska Otto, and Simone Volgmann. “„Dagegen Haben Unsere I-Schüler:Innen Keine Probleme Sich Darzustellen!“ Selbstinszenierungspraktiken von Schüler:Innen Mit Dem Förderschwerpunkt Geistige Entwicklung.” In <i>Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher</i>, edited by H.-Hugo Kremer, Petra Frehe-Halliwell, Désirée Laubenstein, and Heike Kundisch, 155–84, 2025."},"date_updated":"2025-09-08T09:12:42Z","date_created":"2025-09-08T09:12:34Z","author":[{"first_name":"H.-Hugo","full_name":"Kremer, H.-Hugo","id":"15280","last_name":"Kremer"},{"full_name":"Otto, Franziska","id":"69495","last_name":"Otto","first_name":"Franziska"},{"id":"9856","full_name":"Volgmann, Simone","last_name":"Volgmann","first_name":"Simone"}],"title":"„Dagegen haben unsere I-Schüler:innen keine Probleme sich darzustellen!“ Selbstinszenierungspraktiken von Schüler:innen mit dem Förderschwerpunkt geistige Entwicklung","publication":"Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher","type":"book_chapter","editor":[{"last_name":"Kremer","full_name":"Kremer, H.-Hugo","first_name":"H.-Hugo"},{"first_name":"Petra","last_name":"Frehe-Halliwell","full_name":"Frehe-Halliwell, Petra"},{"first_name":"Désirée","full_name":"Laubenstein, Désirée","last_name":"Laubenstein"},{"first_name":"Heike","full_name":"Kundisch, Heike","last_name":"Kundisch"}],"status":"public","_id":"61146","user_id":"9856","language":[{"iso":"eng"}]},{"citation":{"short":"E. Kablo, M. Kleber, P. Arias Cabarcos, in: 34th USENIX Security Symposium (USENIX Security 25), 2025, pp. 1531–1548.","bibtex":"@inproceedings{Kablo_Kleber_Arias Cabarcos_2025, title={PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity}, booktitle={34th USENIX Security Symposium (USENIX Security 25)}, author={Kablo, Emiram and Kleber, Melina and Arias Cabarcos, Patricia}, year={2025}, pages={1531–1548} }","mla":"Kablo, Emiram, et al. “PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity.” <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 2025, pp. 1531–1548.","apa":"Kablo, E., Kleber, M., &#38; Arias Cabarcos, P. (2025). PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity. <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 1531–1548.","ieee":"E. Kablo, M. Kleber, and P. Arias Cabarcos, “PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity,” in <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 2025, pp. 1531–1548.","chicago":"Kablo, Emiram, Melina Kleber, and Patricia Arias Cabarcos. “PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity.” In <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 1531–1548, 2025.","ama":"Kablo E, Kleber M, Arias Cabarcos P. PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity. In: <i>34th USENIX Security Symposium (USENIX Security 25)</i>. ; 2025:1531–1548."},"page":"1531–1548","year":"2025","main_file_link":[{"open_access":"1","url":"https://www.usenix.org/conference/usenixsecurity25/presentation/kablo"}],"title":"PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity","author":[{"last_name":"Kablo","id":"46433","full_name":"Kablo, Emiram","first_name":"Emiram"},{"last_name":"Kleber","full_name":"Kleber, Melina","first_name":"Melina"},{"id":"92804","full_name":"Arias Cabarcos, Patricia","last_name":"Arias Cabarcos","first_name":"Patricia"}],"date_created":"2025-09-08T08:45:30Z","oa":"1","date_updated":"2025-09-08T08:48:37Z","status":"public","type":"conference","publication":"34th USENIX Security Symposium (USENIX Security 25)","language":[{"iso":"eng"}],"user_id":"46433","department":[{"_id":"679"}],"_id":"61144"},{"page":"185-206","citation":{"apa":"Volgmann, S. (2025). Erlebnisorientiert Lehren und Lernen. In H.-H. Kremer, P. Frehe-Halliwell, D. Laubenstein, &#38; H. Kundisch (Eds.), <i>Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher</i> (pp. 185–206).","bibtex":"@inbook{Volgmann_2025, title={Erlebnisorientiert Lehren und Lernen}, booktitle={Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher}, author={Volgmann, Simone}, editor={Kremer, H.-Hugo and Frehe-Halliwell, Petra and Laubenstein, Désirée  and Kundisch, Heike}, year={2025}, pages={185–206} }","short":"S. Volgmann, in: H.-H. Kremer, P. Frehe-Halliwell, D. Laubenstein, H. Kundisch (Eds.), Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher, 2025, pp. 185–206.","mla":"Volgmann, Simone. “Erlebnisorientiert Lehren Und Lernen.” <i>Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher</i>, edited by H.-Hugo Kremer et al., 2025, pp. 185–206.","ama":"Volgmann S. Erlebnisorientiert Lehren und Lernen. In: Kremer H-H, Frehe-Halliwell P, Laubenstein D, Kundisch H, eds. <i>Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher</i>. ; 2025:185-206.","chicago":"Volgmann, Simone. “Erlebnisorientiert Lehren Und Lernen.” In <i>Didaktik in Der Ausbildungsvorbereitung. Selbstinszenierungspraktiken Als Subjektorientierter Zugang (Aus-)Bildungsbenachteiligter Jugendlicher</i>, edited by H.-Hugo Kremer, Petra Frehe-Halliwell, Désirée  Laubenstein, and Heike Kundisch, 185–206, 2025.","ieee":"S. Volgmann, “Erlebnisorientiert Lehren und Lernen,” in <i>Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher</i>, H.-H. Kremer, P. Frehe-Halliwell, D. Laubenstein, and H. Kundisch, Eds. 2025, pp. 185–206."},"year":"2025","publication_identifier":{"isbn":["9783763978120"]},"title":"Erlebnisorientiert Lehren und Lernen","date_created":"2025-09-08T09:07:23Z","author":[{"full_name":"Volgmann, Simone","id":"9856","last_name":"Volgmann","first_name":"Simone"}],"date_updated":"2025-09-08T09:08:08Z","status":"public","editor":[{"last_name":"Kremer","full_name":"Kremer, H.-Hugo","first_name":"H.-Hugo"},{"first_name":"Petra","last_name":"Frehe-Halliwell","full_name":"Frehe-Halliwell, Petra"},{"full_name":"Laubenstein, Désirée ","last_name":"Laubenstein","first_name":"Désirée "},{"first_name":"Heike","last_name":"Kundisch","full_name":"Kundisch, Heike"}],"publication":"Didaktik in der Ausbildungsvorbereitung. Selbstinszenierungspraktiken als subjektorientierter Zugang (aus-)bildungsbenachteiligter Jugendlicher","type":"book_chapter","language":[{"iso":"eng"}],"user_id":"9856","_id":"61145"},{"publication_status":"submitted","year":"2025","citation":{"apa":"Umuroglu, Y., Berganski, C., Jentzsch, F., Danilowicz, M., Kryjak, T., Bezaitis, C., Sjalander, M., Colbert, I., Preusser, T., Petri-Koenig, J., &#38; Blott, M. (n.d.). <i>SIRA: Scaled-Integer Range Analysis for Optimizing FPGA Dataflow Neural Network Accelerators</i>.","mla":"Umuroglu, Yaman, et al. <i>SIRA: Scaled-Integer Range Analysis for Optimizing FPGA Dataflow Neural Network Accelerators</i>.","short":"Y. Umuroglu, C. Berganski, F. Jentzsch, M. Danilowicz, T. Kryjak, C. Bezaitis, M. Sjalander, I. Colbert, T. Preusser, J. Petri-Koenig, M. Blott, (n.d.).","bibtex":"@article{Umuroglu_Berganski_Jentzsch_Danilowicz_Kryjak_Bezaitis_Sjalander_Colbert_Preusser_Petri-Koenig_et al., title={SIRA: Scaled-Integer Range Analysis for Optimizing FPGA Dataflow Neural Network Accelerators}, author={Umuroglu, Yaman and Berganski, Christoph and Jentzsch, Felix and Danilowicz, Michal and Kryjak, Tomasz and Bezaitis, Charalampos and Sjalander, Magnus and Colbert, Ian and Preusser, Thomas and Petri-Koenig, Jakoba and et al.} }","ama":"Umuroglu Y, Berganski C, Jentzsch F, et al. SIRA: Scaled-Integer Range Analysis for Optimizing FPGA Dataflow Neural Network Accelerators.","ieee":"Y. Umuroglu <i>et al.</i>, “SIRA: Scaled-Integer Range Analysis for Optimizing FPGA Dataflow Neural Network Accelerators.” .","chicago":"Umuroglu, Yaman, Christoph Berganski, Felix Jentzsch, Michal Danilowicz, Tomasz Kryjak, Charalampos Bezaitis, Magnus Sjalander, et al. “SIRA: Scaled-Integer Range Analysis for Optimizing FPGA Dataflow Neural Network Accelerators,” n.d."},"date_updated":"2025-09-08T14:13:47Z","date_created":"2025-09-08T14:10:39Z","author":[{"first_name":"Yaman","full_name":"Umuroglu, Yaman","last_name":"Umuroglu"},{"first_name":"Christoph","last_name":"Berganski","full_name":"Berganski, Christoph","id":"98854"},{"first_name":"Felix","last_name":"Jentzsch","orcid":"0000-0003-4987-5708","full_name":"Jentzsch, Felix","id":"55631"},{"last_name":"Danilowicz","full_name":"Danilowicz, Michal","first_name":"Michal"},{"last_name":"Kryjak","full_name":"Kryjak, Tomasz","first_name":"Tomasz"},{"first_name":"Charalampos","full_name":"Bezaitis, Charalampos","last_name":"Bezaitis"},{"first_name":"Magnus","last_name":"Sjalander","full_name":"Sjalander, Magnus"},{"first_name":"Ian","last_name":"Colbert","full_name":"Colbert, Ian"},{"first_name":"Thomas","full_name":"Preusser, Thomas","last_name":"Preusser"},{"first_name":"Jakoba","full_name":"Petri-Koenig, Jakoba","last_name":"Petri-Koenig"},{"first_name":"Michaela","last_name":"Blott","full_name":"Blott, Michaela"}],"title":"SIRA: Scaled-Integer Range Analysis for Optimizing FPGA Dataflow Neural Network Accelerators","type":"preprint","abstract":[{"lang":"eng","text":"While neural network quantization effectively reduces the cost of matrix multiplications, aggressive quantization can expose non-matrix-multiply operations as significant performance and resource bottlenecks on embedded systems. Addressing such bottlenecks requires a comprehensive approach to tailoring the precision across operations in the inference computation. To this end, we introduce scaled-integer range analysis (SIRA), a static analysis technique employing interval arithmetic to determine the range, scale, and bias for tensors in quantized neural networks. We show how this information can be exploited to reduce the resource footprint of FPGA dataflow neural network accelerators via tailored bitwidth adaptation for accumulators and downstream operations, aggregation of scales and biases, and conversion of consecutive elementwise operations to thresholding operations. We integrate SIRA-driven optimizations into the open-source FINN framework, then evaluate their effectiveness across a range of quantized neural network workloads and compare implementation alternatives for non-matrix-multiply operations. We demonstrate an average reduction of 17% for LUTs, 66% for DSPs, and 22% for accumulator bitwidths with SIRA optimizations, providing detailed benchmark analysis and analytical models to guide the implementation style for non-matrix layers. Finally, we open-source SIRA to facilitate community exploration of its benefits across various applications and hardware platforms."}],"status":"public","_id":"61152","user_id":"55631","department":[{"_id":"78"}],"language":[{"iso":"eng"}]},{"publication_status":"published","publication_identifier":{"issn":["0892-1997"]},"citation":{"apa":"Wiechmann, J., &#38; Wagner, P. (2025). Challenges and Limits in Explaining and Acoustic Modeling of Voice Characteristics. <i>Journal of Voice</i>. <a href=\"https://doi.org/10.1016/j.jvoice.2025.07.036\">https://doi.org/10.1016/j.jvoice.2025.07.036</a>","mla":"Wiechmann, Jana, and Petra Wagner. “Challenges and Limits in Explaining and Acoustic Modeling of Voice Characteristics.” <i>Journal of Voice</i>, Elsevier BV, 2025, doi:<a href=\"https://doi.org/10.1016/j.jvoice.2025.07.036\">10.1016/j.jvoice.2025.07.036</a>.","bibtex":"@article{Wiechmann_Wagner_2025, title={Challenges and Limits in Explaining and Acoustic Modeling of Voice Characteristics}, DOI={<a href=\"https://doi.org/10.1016/j.jvoice.2025.07.036\">10.1016/j.jvoice.2025.07.036</a>}, journal={Journal of Voice}, publisher={Elsevier BV}, author={Wiechmann, Jana and Wagner, Petra}, year={2025} }","short":"J. Wiechmann, P. Wagner, Journal of Voice (2025).","ieee":"J. Wiechmann and P. Wagner, “Challenges and Limits in Explaining and Acoustic Modeling of Voice Characteristics,” <i>Journal of Voice</i>, 2025, doi: <a href=\"https://doi.org/10.1016/j.jvoice.2025.07.036\">10.1016/j.jvoice.2025.07.036</a>.","chicago":"Wiechmann, Jana, and Petra Wagner. “Challenges and Limits in Explaining and Acoustic Modeling of Voice Characteristics.” <i>Journal of Voice</i>, 2025. <a href=\"https://doi.org/10.1016/j.jvoice.2025.07.036\">https://doi.org/10.1016/j.jvoice.2025.07.036</a>.","ama":"Wiechmann J, Wagner P. Challenges and Limits in Explaining and Acoustic Modeling of Voice Characteristics. <i>Journal of Voice</i>. Published online 2025. doi:<a href=\"https://doi.org/10.1016/j.jvoice.2025.07.036\">10.1016/j.jvoice.2025.07.036</a>"},"year":"2025","date_created":"2025-09-08T09:33:19Z","author":[{"last_name":"Wiechmann","full_name":"Wiechmann, Jana","first_name":"Jana"},{"first_name":"Petra","full_name":"Wagner, Petra","last_name":"Wagner"}],"publisher":"Elsevier BV","date_updated":"2025-09-08T11:55:41Z","doi":"10.1016/j.jvoice.2025.07.036","title":"Challenges and Limits in Explaining and Acoustic Modeling of Voice Characteristics","type":"journal_article","publication":"Journal of Voice","status":"public","user_id":"93074","project":[{"name":"TRR 318; TP C06: Technisch unterstütztes Erklären von Stimmcharakteristika","_id":"129"}],"_id":"61147","language":[{"iso":"eng"}]}]
