[{"department":[{"_id":"153"}],"publication_status":"published","citation":{"short":"K. Malena, C. Link, S. Gausemeier, A. Trächtler, in: 2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC), IEEE, 2025.","bibtex":"@inproceedings{Malena_Link_Gausemeier_Trächtler_2025, title={Implementation and Results of a Multi-Stage Model Predictive Traffic Light Control System}, volume={27}, DOI={<a href=\"https://doi.org/10.1109/itsc58415.2024.10919569\">10.1109/itsc58415.2024.10919569</a>}, booktitle={2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC)}, publisher={IEEE}, author={Malena, Kevin and Link, Christopher and Gausemeier, Sandra and Trächtler, Ansgar}, year={2025} }","mla":"Malena, Kevin, et al. “Implementation and Results of a Multi-Stage Model Predictive Traffic Light Control System.” <i>2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC)</i>, vol. 27, IEEE, 2025, doi:<a href=\"https://doi.org/10.1109/itsc58415.2024.10919569\">10.1109/itsc58415.2024.10919569</a>.","ieee":"K. Malena, C. Link, S. Gausemeier, and A. Trächtler, “Implementation and Results of a Multi-Stage Model Predictive Traffic Light Control System,” in <i>2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC)</i>, Edmonton (Canada), 2025, vol. 27, doi: <a href=\"https://doi.org/10.1109/itsc58415.2024.10919569\">10.1109/itsc58415.2024.10919569</a>.","chicago":"Malena, Kevin, Christopher Link, Sandra Gausemeier, and Ansgar Trächtler. “Implementation and Results of a Multi-Stage Model Predictive Traffic Light Control System.” In <i>2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC)</i>, Vol. 27. IEEE, 2025. <a href=\"https://doi.org/10.1109/itsc58415.2024.10919569\">https://doi.org/10.1109/itsc58415.2024.10919569</a>.","ama":"Malena K, Link C, Gausemeier S, Trächtler A. Implementation and Results of a Multi-Stage Model Predictive Traffic Light Control System. In: <i>2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC)</i>. Vol 27. IEEE; 2025. doi:<a href=\"https://doi.org/10.1109/itsc58415.2024.10919569\">10.1109/itsc58415.2024.10919569</a>","apa":"Malena, K., Link, C., Gausemeier, S., &#38; Trächtler, A. (2025). Implementation and Results of a Multi-Stage Model Predictive Traffic Light Control System. <i>2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC)</i>, <i>27</i>. <a href=\"https://doi.org/10.1109/itsc58415.2024.10919569\">https://doi.org/10.1109/itsc58415.2024.10919569</a>"},"intvolume":"        27","author":[{"orcid":"0000-0003-1183-4679","id":"36303","last_name":"Malena","first_name":"Kevin","full_name":"Malena, Kevin"},{"full_name":"Link, Christopher","first_name":"Christopher","last_name":"Link","id":"38249"},{"id":"17793","last_name":"Gausemeier","first_name":"Sandra","full_name":"Gausemeier, Sandra"},{"last_name":"Trächtler","id":"552","first_name":"Ansgar","full_name":"Trächtler, Ansgar"}],"conference":{"end_date":"2024-09-27","location":"Edmonton (Canada)","start_date":"2024-09-24","name":"27th International Conference on Intelligent Transportation Systems (ITSC)"},"date_updated":"2026-04-29T08:49:46Z","_id":"59088","status":"public","language":[{"iso":"eng"}],"year":"2025","publication_identifier":{"issn":["2153-0017"]},"publisher":"IEEE","related_material":{"link":[{"url":"https://ieeexplore.ieee.org/document/10919569","relation":"confirmation"}]},"date_created":"2025-03-24T08:57:08Z","keyword":["MPC"],"user_id":"36303","doi":"10.1109/itsc58415.2024.10919569","abstract":[{"lang":"eng","text":"This paper deals with the implementation and results of the application of a multi-stage traffic light control system which includes a simulation-based traffic estimation and model predictive control.\r\nThe traffic light control system incorporates a fuzzy system for traffic light phase preselection, followed by a model predictive control to optimise phase combinations and switching times. Predefined phases are selected without restrictions in the order according to a multi-objective optimisation to adapt to the traffic as freely as possible. Initially, the system is tested in simulations and compared with existing methods and analysed afterwards for its effectiveness in a prototype commissioning in field tests. Results indicate high potentials for reducing emissions and waiting times, highlighting the system's value. However, further refinement is necessary for standard implementation. This comprehensive approach demonstrates advancements in traffic management technology, showcasing the potential for enhancing urban mobility and reducing environmental impact."}],"title":"Implementation and Results of a Multi-Stage Model Predictive Traffic Light Control System","volume":27,"type":"conference","quality_controlled":"1","publication":"2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC)"},{"user_id":"98531","series_title":"Schattenwirtschaft – Schattenpolitik. Scheitert die Transformation?","citation":{"chicago":"Rossmann, Felix. “Zum Verhältnis von Nachhaltigkeitsbezogener Transparenz Und Strategischem Sichtbarkeitsmanagement.” In <i>Jahrbuch Normative Und Institutionelle Grundfragen Der Ökonomik</i>, edited by Richard Sturn and Ulrich Klüh, 22nd ed., 15 pp. Schattenwirtschaft – Schattenpolitik. Scheitert Die Transformation? Metropolis, 2025.","ieee":"F. Rossmann, “Zum Verhältnis von nachhaltigkeitsbezogener Transparenz und strategischem Sichtbarkeitsmanagement,” in <i>Jahrbuch Normative und institutionelle Grundfragen der Ökonomik</i>, 22nd ed., R. Sturn and U. Klüh, Eds. Metropolis, 2025, p. 15 pp.","apa":"Rossmann, F. (2025). Zum Verhältnis von nachhaltigkeitsbezogener Transparenz und strategischem Sichtbarkeitsmanagement. In R. Sturn &#38; U. Klüh (Eds.), <i>Jahrbuch Normative und institutionelle Grundfragen der Ökonomik</i> (22nd ed., p. 15 pp.). Metropolis.","ama":"Rossmann F. Zum Verhältnis von nachhaltigkeitsbezogener Transparenz und strategischem Sichtbarkeitsmanagement. In: Sturn R, Klüh U, eds. <i>Jahrbuch Normative Und Institutionelle Grundfragen Der Ökonomik</i>. 22nd ed. Schattenwirtschaft – Schattenpolitik. Scheitert die Transformation? Metropolis; 2025:15 pp.","short":"F. Rossmann, in: R. Sturn, U. Klüh (Eds.), Jahrbuch Normative Und Institutionelle Grundfragen Der Ökonomik, 22nd ed., Metropolis, 2025, p. 15 pp.","mla":"Rossmann, Felix. “Zum Verhältnis von Nachhaltigkeitsbezogener Transparenz Und Strategischem Sichtbarkeitsmanagement.” <i>Jahrbuch Normative Und Institutionelle Grundfragen Der Ökonomik</i>, edited by Richard Sturn and Ulrich Klüh, 22nd ed., Metropolis, 2025, p. 15 pp.","bibtex":"@inbook{Rossmann_2025, edition={22}, series={Schattenwirtschaft – Schattenpolitik. Scheitert die Transformation?}, title={Zum Verhältnis von nachhaltigkeitsbezogener Transparenz und strategischem Sichtbarkeitsmanagement}, booktitle={Jahrbuch Normative und institutionelle Grundfragen der Ökonomik}, publisher={Metropolis}, author={Rossmann, Felix}, editor={Sturn, Richard and Klüh, Ulrich}, year={2025}, pages={15 pp.}, collection={Schattenwirtschaft – Schattenpolitik. Scheitert die Transformation?} }"},"editor":[{"full_name":"Sturn, Richard","first_name":"Richard","last_name":"Sturn"},{"first_name":"Ulrich","full_name":"Klüh, Ulrich","last_name":"Klüh"}],"author":[{"full_name":"Rossmann, Felix","first_name":"Felix","last_name":"Rossmann","id":"98531"}],"title":"Zum Verhältnis von nachhaltigkeitsbezogener Transparenz und strategischem Sichtbarkeitsmanagement","_id":"65510","page":"15 pp.","date_updated":"2026-04-29T07:28:53Z","edition":"22","publisher":"Metropolis","publication":"Jahrbuch Normative und institutionelle Grundfragen der Ökonomik","date_created":"2026-04-29T07:28:39Z","status":"public","type":"book_chapter","publication_identifier":{"unknown":["978-3-7316-1623-8"]},"year":"2025","language":[{"iso":"eng"}]},{"citation":{"chicago":"Rossmann, Felix Konstantin. “Forschungsperspektiven Zu Sustainable Finance in Kleinen Und Mittleren Unternehmen.” <i>ZfKE – Zeitschrift Für KMU Und Entrepreneurship</i> 72, no. 3–4 (2025): 251–56. <a href=\"https://doi.org/10.3790/zfke.2024.1465308\">https://doi.org/10.3790/zfke.2024.1465308</a>.","ieee":"F. K. Rossmann, “Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen,” <i>ZfKE – Zeitschrift für KMU und Entrepreneurship</i>, vol. 72, no. 3–4, pp. 251–256, 2025, doi: <a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>.","ama":"Rossmann FK. Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen. <i>ZfKE – Zeitschrift für KMU und Entrepreneurship</i>. 2025;72(3–4):251-256. doi:<a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>","apa":"Rossmann, F. K. (2025). Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen. <i>ZfKE – Zeitschrift Für KMU Und Entrepreneurship</i>, <i>72</i>(3–4), 251–256. <a href=\"https://doi.org/10.3790/zfke.2024.1465308\">https://doi.org/10.3790/zfke.2024.1465308</a>","short":"F.K. Rossmann, ZfKE – Zeitschrift Für KMU Und Entrepreneurship 72 (2025) 251–256.","mla":"Rossmann, Felix Konstantin. “Forschungsperspektiven Zu Sustainable Finance in Kleinen Und Mittleren Unternehmen.” <i>ZfKE – Zeitschrift Für KMU Und Entrepreneurship</i>, vol. 72, no. 3–4, Duncker &#38; Humblot GmbH, 2025, pp. 251–56, doi:<a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>.","bibtex":"@article{Rossmann_2025, title={Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen}, volume={72}, DOI={<a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>}, number={3–4}, journal={ZfKE – Zeitschrift für KMU und Entrepreneurship}, publisher={Duncker &#38; Humblot GmbH}, author={Rossmann, Felix Konstantin}, year={2025}, pages={251–256} }"},"user_id":"98531","publication_status":"published","title":"Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen","author":[{"first_name":"Felix Konstantin","full_name":"Rossmann, Felix Konstantin","last_name":"Rossmann"}],"doi":"10.3790/zfke.2024.1465308","intvolume":"        72","page":"251-256","_id":"65509","volume":72,"date_updated":"2026-04-29T07:28:58Z","issue":"3–4","publication":"ZfKE – Zeitschrift für KMU und Entrepreneurship","date_created":"2026-04-29T07:23:39Z","publisher":"Duncker & Humblot GmbH","year":"2025","publication_identifier":{"issn":["1865-5114","1860-4633"]},"type":"journal_article","status":"public"},{"user_id":"110924","publication_status":"published","citation":{"short":"A.H. Hadipour, A. Jafari, M. Awais, M. Platzner, in: 2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), IEEE, 2025.","bibtex":"@inproceedings{Hadipour_Jafari_Awais_Platzner_2025, title={A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation}, DOI={<a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>}, booktitle={2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)}, publisher={IEEE}, author={Hadipour, Amir Hossein and Jafari, Atousa and Awais, Muhammad and Platzner, Marco}, year={2025} }","mla":"Hadipour, Amir Hossein, et al. “A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation.” <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>, IEEE, 2025, doi:<a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>.","ieee":"A. H. Hadipour, A. Jafari, M. Awais, and M. Platzner, “A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation,” 2025, doi: <a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>.","chicago":"Hadipour, Amir Hossein, Atousa Jafari, Muhammad Awais, and Marco Platzner. “A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation.” In <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>. IEEE, 2025. <a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">https://doi.org/10.1109/ddecs63720.2025.11006769</a>.","apa":"Hadipour, A. H., Jafari, A., Awais, M., &#38; Platzner, M. (2025). A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation. <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>. <a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">https://doi.org/10.1109/ddecs63720.2025.11006769</a>","ama":"Hadipour AH, Jafari A, Awais M, Platzner M. A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation. In: <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>. IEEE; 2025. doi:<a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>"},"doi":"10.1109/ddecs63720.2025.11006769","author":[{"first_name":"Amir Hossein","full_name":"Hadipour, Amir Hossein","id":"110924","last_name":"Hadipour"},{"id":"99966","last_name":"Jafari","first_name":"Atousa","full_name":"Jafari, Atousa"},{"id":"64665","last_name":"Awais","full_name":"Awais, Muhammad","first_name":"Muhammad","orcid":"https://orcid.org/0000-0003-4148-2969"},{"id":"398","last_name":"Platzner","first_name":"Marco","full_name":"Platzner, Marco"}],"title":"A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation","date_updated":"2026-04-29T13:13:41Z","_id":"64610","status":"public","year":"2025","type":"conference","language":[{"iso":"eng"}],"publisher":"IEEE","publication":"2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)","date_created":"2026-02-24T11:50:01Z"},{"date_updated":"2026-04-29T14:27:08Z","_id":"59895","status":"public","year":"2025","type":"conference","language":[{"iso":"eng"}],"publisher":"PhotonIcs and Electromagnetics Research Symposium (PIERS)","publication":"PIERS Proceedings ","date_created":"2025-05-14T09:59:50Z","department":[{"_id":"58"},{"_id":"623"}],"user_id":"13256","publication_status":"accepted","citation":{"bibtex":"@inproceedings{Kress_Mihaylov_Schwabe_Silberhorn_Scheytt, title={Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source}, DOI={<a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>}, booktitle={PIERS Proceedings }, publisher={PhotonIcs and Electromagnetics Research Symposium (PIERS)}, author={Kress, Christian and Mihaylov, Martin Miroslavov and Schwabe, Tobias and Silberhorn, Christine and Scheytt, J. Christoph} }","mla":"Kress, Christian, et al. “Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source.” <i>PIERS Proceedings </i>, PhotonIcs and Electromagnetics Research Symposium (PIERS), doi:<a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>.","short":"C. Kress, M.M. Mihaylov, T. Schwabe, C. Silberhorn, J.C. Scheytt, in: PIERS Proceedings , PhotonIcs and Electromagnetics Research Symposium (PIERS), n.d.","apa":"Kress, C., Mihaylov, M. M., Schwabe, T., Silberhorn, C., &#38; Scheytt, J. C. (n.d.). Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source. <i>PIERS Proceedings </i>. PhotonIcs and Electromagnetics Research Symposium (PIERS), Abu Dhabi. <a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">https://doi.org/10.1109/PIERS-Spring66516.2025.11276835</a>","ama":"Kress C, Mihaylov MM, Schwabe T, Silberhorn C, Scheytt JC. Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source. In: <i>PIERS Proceedings </i>. PhotonIcs and Electromagnetics Research Symposium (PIERS). doi:<a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>","ieee":"C. Kress, M. M. Mihaylov, T. Schwabe, C. Silberhorn, and J. C. Scheytt, “Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source,” presented at the PhotonIcs and Electromagnetics Research Symposium (PIERS), Abu Dhabi, doi: <a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>.","chicago":"Kress, Christian, Martin Miroslavov Mihaylov, Tobias Schwabe, Christine Silberhorn, and J. Christoph Scheytt. “Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source.” In <i>PIERS Proceedings </i>. PhotonIcs and Electromagnetics Research Symposium (PIERS), n.d. <a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">https://doi.org/10.1109/PIERS-Spring66516.2025.11276835</a>."},"abstract":[{"lang":"eng","text":"The generation of optically broadband Nyquist pulse sequences using an integrated Mach-Zehnder modulator (MZM) in a thin-film lithium-niobate (TFLN) platform with repetition rates of 5 to 32 GHz and optical bandwidths of up to 160 GHz is demonstrated. Nyquist pulse sequences with high optical bandwidth can be used as synchronization and control signals in quantum sources based on photon pair generation."}],"doi":"10.1109/PIERS-Spring66516.2025.11276835","project":[{"_id":"302","name":"PONyDAC: SPP 2111 - PONyDAC II - Präziser Optischer Nyquist-Puls-Synthesizer DAC"},{"_id":"175","name":"TRR 142 - C11: TRR 142 - Kompakte Photonenpaar-Quelle mit ultraschnellen Modulatoren auf Basis von CMOS und LNOI (C11*)"}],"author":[{"orcid":"0000-0002-4403-2237","id":"13256","last_name":"Kress","full_name":"Kress, Christian","first_name":"Christian"},{"last_name":"Mihaylov","id":"42449","first_name":"Martin Miroslavov","full_name":"Mihaylov, Martin Miroslavov"},{"last_name":"Schwabe","id":"39217","full_name":"Schwabe, Tobias","first_name":"Tobias"},{"id":"26263","last_name":"Silberhorn","full_name":"Silberhorn, Christine","first_name":"Christine"},{"orcid":"0000-0002-5950-6618 ","full_name":"Scheytt, J. Christoph","first_name":"J. Christoph","last_name":"Scheytt","id":"37144"}],"conference":{"start_date":"2025-05-03","location":"Abu Dhabi","name":"PhotonIcs and Electromagnetics Research Symposium (PIERS)","end_date":"2025-05-09"},"title":"Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source"},{"citation":{"short":"E. Reckmann, K. Temmen, in: 2025.","mla":"Reckmann, Eileen, and Katrin Temmen. <i>Beforschung Eines MINT Clusters – Erste Ergebnisse Und Weitere Schritte</i>. 2025.","bibtex":"@inproceedings{Reckmann_Temmen_2025, title={Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte}, author={Reckmann, Eileen and Temmen, Katrin}, year={2025} }","chicago":"Reckmann, Eileen, and Katrin Temmen. “Beforschung Eines MINT Clusters – Erste Ergebnisse Und Weitere Schritte,” 2025.","ieee":"E. Reckmann and K. Temmen, “Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte,” presented at the 20. LeLa-Jahrestagung, Oldenburg, 2025.","apa":"Reckmann, E., &#38; Temmen, K. (2025). <i>Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte</i>. 20. LeLa-Jahrestagung, Oldenburg.","ama":"Reckmann E, Temmen K. Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte. In: ; 2025."},"user_id":"101166","conference":{"location":"Oldenburg","start_date":"2025-03-09","name":"20. LeLa-Jahrestagung","end_date":"2025-03-11"},"title":"Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte","author":[{"id":"101166","last_name":"Reckmann","first_name":"Eileen","full_name":"Reckmann, Eileen"},{"full_name":"Temmen, Katrin","first_name":"Katrin","last_name":"Temmen","id":"30086"}],"date_updated":"2026-04-30T08:19:21Z","_id":"65525","type":"conference_abstract","year":"2025","language":[{"iso":"eng"}],"status":"public","date_created":"2026-04-30T08:19:03Z"},{"citation":{"apa":"Janovsky, A., Chmielewski, Ł., Svenda, P., Jancar, J., &#38; Matyas, V. (2025). Revisiting the analysis of references among Common Criteria certified products. <i>Computers &#38;amp; Security</i>, <i>152</i>, Article 104362. <a href=\"https://doi.org/10.1016/j.cose.2025.104362\">https://doi.org/10.1016/j.cose.2025.104362</a>","ama":"Janovsky A, Chmielewski Ł, Svenda P, Jancar J, Matyas V. Revisiting the analysis of references among Common Criteria certified products. <i>Computers &#38;amp; Security</i>. 2025;152. doi:<a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>","chicago":"Janovsky, Adam, Łukasz Chmielewski, Petr Svenda, Jan Jancar, and Vashek Matyas. “Revisiting the Analysis of References among Common Criteria Certified Products.” <i>Computers &#38;amp; Security</i> 152 (2025). <a href=\"https://doi.org/10.1016/j.cose.2025.104362\">https://doi.org/10.1016/j.cose.2025.104362</a>.","ieee":"A. Janovsky, Ł. Chmielewski, P. Svenda, J. Jancar, and V. Matyas, “Revisiting the analysis of references among Common Criteria certified products,” <i>Computers &#38;amp; Security</i>, vol. 152, Art. no. 104362, 2025, doi: <a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>.","mla":"Janovsky, Adam, et al. “Revisiting the Analysis of References among Common Criteria Certified Products.” <i>Computers &#38;amp; Security</i>, vol. 152, 104362, Elsevier BV, 2025, doi:<a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>.","bibtex":"@article{Janovsky_Chmielewski_Svenda_Jancar_Matyas_2025, title={Revisiting the analysis of references among Common Criteria certified products}, volume={152}, DOI={<a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>}, number={104362}, journal={Computers &#38;amp; Security}, publisher={Elsevier BV}, author={Janovsky, Adam and Chmielewski, Łukasz and Svenda, Petr and Jancar, Jan and Matyas, Vashek}, year={2025} }","short":"A. Janovsky, Ł. Chmielewski, P. Svenda, J. Jancar, V. Matyas, Computers &#38;amp; Security 152 (2025)."},"user_id":"125442","publication_status":"published","title":"Revisiting the analysis of references among Common Criteria certified products","author":[{"full_name":"Janovsky, Adam","first_name":"Adam","last_name":"Janovsky"},{"first_name":"Łukasz","full_name":"Chmielewski, Łukasz","last_name":"Chmielewski"},{"full_name":"Svenda, Petr","first_name":"Petr","last_name":"Svenda"},{"last_name":"Jancar","first_name":"Jan","full_name":"Jancar, Jan"},{"last_name":"Matyas","full_name":"Matyas, Vashek","first_name":"Vashek"}],"intvolume":"       152","doi":"10.1016/j.cose.2025.104362","_id":"65528","volume":152,"article_number":"104362","date_updated":"2026-04-30T09:32:20Z","publication":"Computers &amp; Security","date_created":"2026-04-30T09:26:42Z","publisher":"Elsevier BV","year":"2025","type":"journal_article","publication_identifier":{"issn":["0167-4048"]},"language":[{"iso":"eng"}],"status":"public"},{"title":"ROCA and Minerva Vulnerabilities","author":[{"full_name":"JANCAR, Jan","first_name":"Jan","last_name":"JANCAR"},{"last_name":"SVENDA","full_name":"SVENDA, Petr","first_name":"Petr"},{"full_name":"SYS, Marek","first_name":"Marek","last_name":"SYS"}],"doi":"10.1002/9781394351930.ch10","citation":{"chicago":"JANCAR, Jan, Petr SVENDA, and Marek SYS. “ROCA and Minerva Vulnerabilities.” In <i>Embedded Cryptography 3</i>. Wiley, 2025. <a href=\"https://doi.org/10.1002/9781394351930.ch10\">https://doi.org/10.1002/9781394351930.ch10</a>.","ieee":"J. JANCAR, P. SVENDA, and M. SYS, “ROCA and Minerva Vulnerabilities,” in <i>Embedded Cryptography 3</i>, Wiley, 2025.","ama":"JANCAR J, SVENDA P, SYS M. ROCA and Minerva Vulnerabilities. In: <i>Embedded Cryptography 3</i>. Wiley; 2025. doi:<a href=\"https://doi.org/10.1002/9781394351930.ch10\">10.1002/9781394351930.ch10</a>","apa":"JANCAR, J., SVENDA, P., &#38; SYS, M. (2025). ROCA and Minerva Vulnerabilities. In <i>Embedded Cryptography 3</i>. Wiley. <a href=\"https://doi.org/10.1002/9781394351930.ch10\">https://doi.org/10.1002/9781394351930.ch10</a>","short":"J. JANCAR, P. SVENDA, M. SYS, in: Embedded Cryptography 3, Wiley, 2025.","mla":"JANCAR, Jan, et al. “ROCA and Minerva Vulnerabilities.” <i>Embedded Cryptography 3</i>, Wiley, 2025, doi:<a href=\"https://doi.org/10.1002/9781394351930.ch10\">10.1002/9781394351930.ch10</a>.","bibtex":"@inbook{JANCAR_SVENDA_SYS_2025, title={ROCA and Minerva Vulnerabilities}, DOI={<a href=\"https://doi.org/10.1002/9781394351930.ch10\">10.1002/9781394351930.ch10</a>}, booktitle={Embedded Cryptography 3}, publisher={Wiley}, author={JANCAR, Jan and SVENDA, Petr and SYS, Marek}, year={2025} }"},"publication_status":"published","user_id":"125442","date_created":"2026-04-30T09:26:23Z","publication":"Embedded Cryptography 3","publisher":"Wiley","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9781789452150","9781394351930"]},"type":"book_chapter","year":"2025","status":"public","_id":"65526","date_updated":"2026-04-30T09:32:17Z"},{"doi":"10.46586/tches.v2025.i3.644-667","intvolume":"      2025","abstract":[{"text":"<jats:p>It is a widely accepted standard practice to implement cryptographic software so that secret inputs do not influence the cycle count. Software following this paradigm is often referred to as “constant-time” software and typically involves following three rules: 1) never branch on a secret-dependent condition, 2) never access memory at a secret-dependent location, and 3) avoid variable-time arithmetic operations on secret data. The third rule requires knowledge about such variable-time arithmetic instructions, or vice versa, which operations are safe to use on secret inputs. For a long time, this knowledge was based on either documentation or microbenchmarks, but critically, there were never any guarantees for future microarchitectures. This changed with the introduction of the data-operand-independent-timing (DOIT) mode on Intel CPUs and, to some extent, the data-independent-timing (DIT) mode on Arm CPUs. Both Intel and Arm document a subset of their respective instruction sets that are intended to leak no information about their inputs through timing, even on future microarchitectures if the CPU is set to run in a dedicated DOIT (or DIT) mode.In this paper, we present a principled solution that leverages DOIT to enable cryptographic software that is future-proof constant-time, in the sense that it ensures that only instructions from the DOIT subset are used to operate on secret data, even during speculative execution after a mispredicted branch or function return location. For this solution, we build on top of existing security type systems in the Jasmin framework for high-assurance cryptography.We then use our solution to evaluate the extent to which existing cryptographic software built to be “constant-time” is already secure in this stricter paradigm implied by DOIT and what the performance impact is to move from constant-time to future-proof constant-time.</jats:p>","lang":"eng"}],"title":"Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code","author":[{"last_name":"Arranz-Olmos","full_name":"Arranz-Olmos, Santiago","first_name":"Santiago"},{"last_name":"Barthe","full_name":"Barthe, Gilles","first_name":"Gilles"},{"first_name":"Benjamin","full_name":"Grégoire, Benjamin","last_name":"Grégoire"},{"last_name":"Jancar","full_name":"Jancar, Jan","first_name":"Jan"},{"last_name":"Laporte","first_name":"Vincent","full_name":"Laporte, Vincent"},{"full_name":"Oliveira, Tiago","first_name":"Tiago","last_name":"Oliveira"},{"full_name":"Schwabe, Peter","first_name":"Peter","last_name":"Schwabe"}],"citation":{"ama":"Arranz-Olmos S, Barthe G, Grégoire B, et al. Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>. 2025;2025(3):644-667. doi:<a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>","apa":"Arranz-Olmos, S., Barthe, G., Grégoire, B., Jancar, J., Laporte, V., Oliveira, T., &#38; Schwabe, P. (2025). Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, <i>2025</i>(3), 644–667. <a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">https://doi.org/10.46586/tches.v2025.i3.644-667</a>","ieee":"S. Arranz-Olmos <i>et al.</i>, “Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code,” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 3, pp. 644–667, 2025, doi: <a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>.","chicago":"Arranz-Olmos, Santiago, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, and Peter Schwabe. “Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i> 2025, no. 3 (2025): 644–67. <a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">https://doi.org/10.46586/tches.v2025.i3.644-667</a>.","bibtex":"@article{Arranz-Olmos_Barthe_Grégoire_Jancar_Laporte_Oliveira_Schwabe_2025, title={Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code}, volume={2025}, DOI={<a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>}, number={3}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, publisher={Universitatsbibliothek der Ruhr-Universitat Bochum}, author={Arranz-Olmos, Santiago and Barthe, Gilles and Grégoire, Benjamin and Jancar, Jan and Laporte, Vincent and Oliveira, Tiago and Schwabe, Peter}, year={2025}, pages={644–667} }","mla":"Arranz-Olmos, Santiago, et al. “Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 3, Universitatsbibliothek der Ruhr-Universitat Bochum, 2025, pp. 644–67, doi:<a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>.","short":"S. Arranz-Olmos, G. Barthe, B. Grégoire, J. Jancar, V. Laporte, T. Oliveira, P. Schwabe, IACR Transactions on Cryptographic Hardware and Embedded Systems 2025 (2025) 644–667."},"publication_status":"published","user_id":"125442","year":"2025","publication_identifier":{"issn":["2569-2925"]},"type":"journal_article","status":"public","date_created":"2026-04-30T09:31:53Z","publication":"IACR Transactions on Cryptographic Hardware and Embedded Systems","publisher":"Universitatsbibliothek der Ruhr-Universitat Bochum","issue":"3","date_updated":"2026-04-30T09:32:27Z","_id":"65537","page":"644-667","volume":2025},{"page":"290-316","_id":"65538","volume":2025,"issue":"4","date_updated":"2026-04-30T09:32:25Z","date_created":"2026-04-30T09:31:59Z","publication":"IACR Transactions on Cryptographic Hardware and Embedded Systems","publisher":"Universitatsbibliothek der Ruhr-Universitat Bochum","publication_identifier":{"issn":["2569-2925"]},"year":"2025","type":"journal_article","status":"public","citation":{"ieee":"V. Suchanek, J. Jancar, J. Kvapil, P. Svenda, and Ł. Chmielewski, “ECTester: Reverse-engineering side-channel countermeasures of ECC implementations,” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 4, pp. 290–316, 2025, doi: <a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>.","chicago":"Suchanek, Vojtech, Jan Jancar, Jan Kvapil, Petr Svenda, and Łukasz Chmielewski. “ECTester: Reverse-Engineering Side-Channel Countermeasures of ECC Implementations.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i> 2025, no. 4 (2025): 290–316. <a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">https://doi.org/10.46586/tches.v2025.i4.290-316</a>.","apa":"Suchanek, V., Jancar, J., Kvapil, J., Svenda, P., &#38; Chmielewski, Ł. (2025). ECTester: Reverse-engineering side-channel countermeasures of ECC implementations. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, <i>2025</i>(4), 290–316. <a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">https://doi.org/10.46586/tches.v2025.i4.290-316</a>","ama":"Suchanek V, Jancar J, Kvapil J, Svenda P, Chmielewski Ł. ECTester: Reverse-engineering side-channel countermeasures of ECC implementations. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>. 2025;2025(4):290-316. doi:<a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>","short":"V. Suchanek, J. Jancar, J. Kvapil, P. Svenda, Ł. Chmielewski, IACR Transactions on Cryptographic Hardware and Embedded Systems 2025 (2025) 290–316.","bibtex":"@article{Suchanek_Jancar_Kvapil_Svenda_Chmielewski_2025, title={ECTester: Reverse-engineering side-channel countermeasures of ECC implementations}, volume={2025}, DOI={<a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>}, number={4}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, publisher={Universitatsbibliothek der Ruhr-Universitat Bochum}, author={Suchanek, Vojtech and Jancar, Jan and Kvapil, Jan and Svenda, Petr and Chmielewski, Łukasz}, year={2025}, pages={290–316} }","mla":"Suchanek, Vojtech, et al. “ECTester: Reverse-Engineering Side-Channel Countermeasures of ECC Implementations.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 4, Universitatsbibliothek der Ruhr-Universitat Bochum, 2025, pp. 290–316, doi:<a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>."},"publication_status":"published","user_id":"125442","title":"ECTester: Reverse-engineering side-channel countermeasures of ECC implementations","author":[{"first_name":"Vojtech","full_name":"Suchanek, Vojtech","last_name":"Suchanek"},{"first_name":"Jan","full_name":"Jancar, Jan","last_name":"Jancar"},{"last_name":"Kvapil","full_name":"Kvapil, Jan","first_name":"Jan"},{"full_name":"Svenda, Petr","first_name":"Petr","last_name":"Svenda"},{"first_name":"Łukasz","full_name":"Chmielewski, Łukasz","last_name":"Chmielewski"}],"doi":"10.46586/tches.v2025.i4.290-316","intvolume":"      2025","abstract":[{"text":"<jats:p>Developers implementing elliptic curve cryptography (ECC) face a wide range of implementation choices created by decades of research into elliptic curves. The literature on elliptic curves offers a plethora of curve models, scalar multipliers, and addition formulas, but this comes with the price of enabling attacks to also use the rich structure of these techniques. Navigating through this area is not an easy task and developers often obscure their choices, especially in black-box hardware implementations. Since side-channel attackers rely on the knowledge of the implementation details, reverse engineering becomes a crucial part of attacks.This work presents ECTester – a tool for testing black-box ECC implementations. Through various test suites, ECTester observes the behavior of the target implementation against known attacks but also non-standard inputs and elliptic curve parameters. We analyze popular ECC libraries and smartcards and show that some libraries and most smartcards do not check the order of the input points and improperly handle the infinity point. Based on these observations, we design new techniques for reverse engineering scalar randomization countermeasures that are able to distinguish between group scalar randomization, additive, multiplicative or Euclidean splitting. Our techniques do not require side-channel measurements; they only require the ability to set custom domain parameters, and are able to extract not only the size but also the exact value of the random mask used. Using the techniques, we successfully reverse-engineered the countermeasures on 13 cryptographic smartcards from 5 major manufacturers – all but one we tested on. Finally, we discuss what mitigations can be applied to prevent such reverse engineering, and whether it is possible at all.</jats:p>","lang":"eng"}]},{"external_id":{"arxiv":["2401.02368"]},"citation":{"mla":"Rudolph, Dorian, et al. “Quantum 2-SAT on Low Dimensional Systems Is $\\mathsf{QMA}_1$-Complete:  Direct Embeddings and Black-Box Simulation.” <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, vol. 325, no. 85, 2025, pp. 1–24, doi:<a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>.","bibtex":"@inproceedings{Rudolph_Gharibian_Nagaj_2025, title={Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation}, volume={325}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>}, number={85}, booktitle={16th Innovations in Theoretical Computer Science (ITCS)}, author={Rudolph, Dorian and Gharibian, Sevag and Nagaj, Daniel}, year={2025}, pages={1–24} }","short":"D. Rudolph, S. Gharibian, D. Nagaj, in: 16th Innovations in Theoretical Computer Science (ITCS), 2025, pp. 1–24.","apa":"Rudolph, D., Gharibian, S., &#38; Nagaj, D. (2025). Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation. <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, <i>325</i>(85), 1–24. <a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">https://doi.org/10.4230/LIPIcs.ITCS.2025.85</a>","ama":"Rudolph D, Gharibian S, Nagaj D. Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation. In: <i>16th Innovations in Theoretical Computer Science (ITCS)</i>. Vol 325. ; 2025:1-24. doi:<a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>","chicago":"Rudolph, Dorian, Sevag Gharibian, and Daniel Nagaj. “Quantum 2-SAT on Low Dimensional Systems Is $\\mathsf{QMA}_1$-Complete:  Direct Embeddings and Black-Box Simulation.” In <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, 325:1–24, 2025. <a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">https://doi.org/10.4230/LIPIcs.ITCS.2025.85</a>.","ieee":"D. Rudolph, S. Gharibian, and D. Nagaj, “Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation,” in <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, 2025, vol. 325, no. 85, pp. 1–24, doi: <a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>."},"publication_status":"published","user_id":"71541","doi":"10.4230/LIPIcs.ITCS.2025.85","abstract":[{"text":"Despite the fundamental role the Quantum Satisfiability (QSAT) problem has\r\nplayed in quantum complexity theory, a central question remains open: At which\r\nlocal dimension does the complexity of QSAT transition from \"easy\" to \"hard\"?\r\nHere, we study QSAT with each constraint acting on a $k$-dimensional and\r\n$l$-dimensional qudit pair, denoted $(k,l)$-QSAT. Our first main result shows\r\nthat, surprisingly, QSAT on qubits can remain $\\mathsf{QMA}_1$-hard, in that\r\n$(2,5)$-QSAT is $\\mathsf{QMA}_1$-complete. In contrast, $2$-SAT on qubits is\r\nwell-known to be poly-time solvable [Bravyi, 2006]. Our second main result\r\nproves that $(3,d)$-QSAT on the 1D line with $d\\in O(1)$ is also\r\n$\\mathsf{QMA}_1$-hard. Finally, we initiate the study of 1D $(2,d)$-QSAT by\r\ngiving a frustration-free 1D Hamiltonian with a unique, entangled ground state.\r\n  Our first result uses a direct embedding, combining a novel clock\r\nconstruction with the 2D circuit-to-Hamiltonian construction of [Gosset, Nagaj,\r\n2013]. Of note is a new simplified and analytic proof for the latter (as\r\nopposed to a partially numeric proof in [GN13]). This exploits Unitary Labelled\r\nGraphs [Bausch, Cubitt, Ozols, 2017] together with a new \"Nullspace Connection\r\nLemma\", allowing us to break low energy analyses into small patches of\r\nprojectors, and to improve the soundness analysis of [GN13] from\r\n$\\Omega(1/T^6)$ to $\\Omega(1/T^2)$, for $T$ the number of gates. Our second\r\nresult goes via black-box reduction: Given an arbitrary 1D Hamiltonian $H$ on\r\n$d'$-dimensional qudits, we show how to embed it into an effective null-space\r\nof a 1D $(3,d)$-QSAT instance, for $d\\in O(1)$. Our approach may be viewed as a\r\nweaker notion of \"simulation\" (\\`a la [Bravyi, Hastings 2017], [Cubitt,\r\nMontanaro, Piddock 2018]). As far as we are aware, this gives the first\r\n\"black-box simulation\"-based $\\mathsf{QMA}_1$-hardness result, i.e. for\r\nfrustration-free Hamiltonians.","lang":"eng"}],"intvolume":"       325","title":"Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation","author":[{"last_name":"Rudolph","id":"57863","first_name":"Dorian","full_name":"Rudolph, Dorian"},{"last_name":"Gharibian","id":"71541","full_name":"Gharibian, Sevag","first_name":"Sevag","orcid":"0000-0002-9992-3379"},{"first_name":"Daniel","full_name":"Nagaj, Daniel","last_name":"Nagaj"}],"issue":"85","date_updated":"2026-04-30T14:10:03Z","_id":"50272","page":"1-24","volume":325,"language":[{"iso":"eng"}],"type":"conference","year":"2025","status":"public","date_created":"2024-01-07T20:09:13Z","publication":"16th Innovations in Theoretical Computer Science (ITCS)"},{"year":"2025","type":"preprint","language":[{"iso":"eng"}],"status":"public","publication":"arXiv:2510.08545","date_created":"2025-10-10T13:44:52Z","date_updated":"2026-04-30T14:08:24Z","_id":"61776","abstract":[{"lang":"eng","text":"We investigate the role of energy, i.e. average photon number, as a resource\r\nin the computational complexity of bosonic systems. We show three sets of\r\nresults: (1. Energy growth rates) There exist bosonic gate sets which increase\r\nenergy incredibly rapidly, obtaining e.g. infinite energy in finite/constant\r\ntime. We prove these high energies can make computing properties of bosonic\r\ncomputations, such as deciding whether a given computation will attain infinite\r\nenergy, extremely difficult, formally undecidable. (2. Lower bounds on\r\ncomputational power) More energy ``='' more computational power. For example,\r\ncertain gate sets allow poly-time bosonic computations to simulate PTOWER, the\r\nset of deterministic computations whose runtime scales as a tower of\r\nexponentials with polynomial height. Even just exponential energy and $O(1)$\r\nmodes suffice to simulate NP, which, importantly, is a setup similar to that of\r\nthe recent bosonic factoring algorithm of [Brenner, Caha, Coiteux-Roy and\r\nKoenig (2024)]. For simpler gate sets, we show an energy hierarchy theorem. (3.\r\nUpper bounds on computational power) Bosonic computations with polynomial\r\nenergy can be simulated in BQP, ``physical'' bosonic computations with\r\narbitrary finite energy are decidable, and the gate set consisting of Gaussian\r\ngates and the cubic phase gate can be simulated in PP, with exponential bound\r\non energy, improving upon the previous PSPACE upper bound. Finally, combining\r\nupper and lower bounds yields no-go theorems for a continuous-variable\r\nSolovay--Kitaev theorem for gate sets such as the Gaussian and cubic phase\r\ngates."}],"title":"Energy, Bosons and Computational Complexity","author":[{"full_name":"Chabaud, Ulysse","first_name":"Ulysse","last_name":"Chabaud"},{"first_name":"Sevag","full_name":"Gharibian, Sevag","id":"71541","last_name":"Gharibian","orcid":"0000-0002-9992-3379"},{"full_name":"Mehraban, Saeed","first_name":"Saeed","last_name":"Mehraban"},{"first_name":"Arsalan","full_name":"Motamedi, Arsalan","last_name":"Motamedi"},{"last_name":"Naeij","full_name":"Naeij, Hamid Reza","first_name":"Hamid Reza"},{"last_name":"Rudolph","id":"57863","full_name":"Rudolph, Dorian","first_name":"Dorian"},{"last_name":"Sambrani","full_name":"Sambrani, Dhruva","first_name":"Dhruva"}],"external_id":{"arxiv":["2510.08545"]},"citation":{"mla":"Chabaud, Ulysse, et al. “Energy, Bosons and Computational Complexity.” <i>ArXiv:2510.08545</i>, 2025.","bibtex":"@article{Chabaud_Gharibian_Mehraban_Motamedi_Naeij_Rudolph_Sambrani_2025, title={Energy, Bosons and Computational Complexity}, journal={arXiv:2510.08545}, author={Chabaud, Ulysse and Gharibian, Sevag and Mehraban, Saeed and Motamedi, Arsalan and Naeij, Hamid Reza and Rudolph, Dorian and Sambrani, Dhruva}, year={2025} }","short":"U. Chabaud, S. Gharibian, S. Mehraban, A. Motamedi, H.R. Naeij, D. Rudolph, D. Sambrani, ArXiv:2510.08545 (2025).","apa":"Chabaud, U., Gharibian, S., Mehraban, S., Motamedi, A., Naeij, H. R., Rudolph, D., &#38; Sambrani, D. (2025). Energy, Bosons and Computational Complexity. In <i>arXiv:2510.08545</i>.","ama":"Chabaud U, Gharibian S, Mehraban S, et al. Energy, Bosons and Computational Complexity. <i>arXiv:251008545</i>. Published online 2025.","chicago":"Chabaud, Ulysse, Sevag Gharibian, Saeed Mehraban, Arsalan Motamedi, Hamid Reza Naeij, Dorian Rudolph, and Dhruva Sambrani. “Energy, Bosons and Computational Complexity.” <i>ArXiv:2510.08545</i>, 2025.","ieee":"U. Chabaud <i>et al.</i>, “Energy, Bosons and Computational Complexity,” <i>arXiv:2510.08545</i>. 2025."},"user_id":"71541"},{"department":[{"_id":"7"},{"_id":"623"}],"external_id":{"arxiv":["2510.06796"]},"citation":{"chicago":"Gharibian, Sevag, and Jonas Kamminga. “On the Complexity of Estimating Ground State Entanglement and Free  Energy.” <i>ArXiv:2510.06796</i>, 2025.","ieee":"S. Gharibian and J. Kamminga, “On the complexity of estimating ground state entanglement and free  energy,” <i>arXiv:2510.06796</i>. 2025.","ama":"Gharibian S, Kamminga J. On the complexity of estimating ground state entanglement and free  energy. <i>arXiv:251006796</i>. Published online 2025.","apa":"Gharibian, S., &#38; Kamminga, J. (2025). On the complexity of estimating ground state entanglement and free  energy. In <i>arXiv:2510.06796</i>.","short":"S. Gharibian, J. Kamminga, ArXiv:2510.06796 (2025).","mla":"Gharibian, Sevag, and Jonas Kamminga. “On the Complexity of Estimating Ground State Entanglement and Free  Energy.” <i>ArXiv:2510.06796</i>, 2025.","bibtex":"@article{Gharibian_Kamminga_2025, title={On the complexity of estimating ground state entanglement and free  energy}, journal={arXiv:2510.06796}, author={Gharibian, Sevag and Kamminga, Jonas}, year={2025} }"},"user_id":"71541","abstract":[{"lang":"eng","text":"Understanding the entanglement structure of local Hamiltonian ground spaces\r\nis a physically motivated problem, with applications ranging from tensor\r\nnetwork design to quantum error-correcting codes. To this end, we study the\r\ncomplexity of estimating ground state entanglement, and more generally entropy\r\nestimation for low energy states and Gibbs states. We find, in particular, that\r\nthe classes qq-QAM [Kobayashi, le Gall, Nishimura, SICOMP 2019] (a quantum\r\nanalogue of public-coin AM) and QMA(2) (QMA with unentangled proofs) play a\r\ncrucial role for such problems, showing: (1) Detecting a high-entanglement\r\nground state is qq-QAM-complete, (2) computing an additive error approximation\r\nto the Helmholtz free energy (equivalently, a multiplicative error\r\napproximation to the partition function) is in qq-QAM, (3) detecting a\r\nlow-entanglement ground state is QMA(2)-hard, and (4) detecting low energy\r\nstates which are close to product states can range from QMA-complete to\r\nQMA(2)-complete. Our results make progress on an open question of [Bravyi,\r\nChowdhury, Gosset and Wocjan, Nature Physics 2022] on free energy, and yield\r\nthe first QMA(2)-complete Hamiltonian problem using local Hamiltonians (cf. the\r\nsparse QMA(2)-complete Hamiltonian problem of [Chailloux, Sattath, CCC 2012])."}],"title":"On the complexity of estimating ground state entanglement and free  energy","author":[{"first_name":"Sevag","full_name":"Gharibian, Sevag","id":"71541","last_name":"Gharibian","orcid":"0000-0002-9992-3379"},{"last_name":"Kamminga","first_name":"Jonas","full_name":"Kamminga, Jonas"}],"date_updated":"2026-04-30T14:08:44Z","_id":"61778","language":[{"iso":"eng"}],"year":"2025","type":"preprint","status":"public","date_created":"2025-10-10T13:45:28Z","publication":"arXiv:2510.06796"},{"author":[{"last_name":"Karsten","first_name":"Andrea","full_name":"Karsten, Andrea"}],"title":"Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride","intvolume":"         4","abstract":[{"lang":"eng","text":"<jats:p>Building on and methodologically extending conceptual metaphor theory, the article examines how personal agency as a discursively produced sociopsychological phenomenon can be studied in elicited metaphors through a discourse-analytical approach. More concretely, the study illustrates how early-career researchers experience and express their agency in research writing through personal metaphors of academic writing such as riding a roller coaster or baking a wedding cake. A two-step discursive analysis adapts Hopper and Thompson's multidimensional approach to linguistic transitivity to study agency in language. The analytical approach involves both an in-depth parametrized analysis of all metaphors in the sample and a qualitative cross-analysis of the data. The results show that the participants' metaphors reflect both nuanced personal experiences and cultural expectations of academic writing, the writer, and the text. This emphasizes that research writing is not only a highly subjective practice but also one that is socially and culturally influenced. The article argues that research on agency thus needs elaborate methodological tools to trace discursive and sociopsychological trajectories of complex socio-cognitive practices like academic writing. This has implications not only for the nexus of research writing, identity, and academic enculturation but also for other fields focusing on agency in language.</jats:p>"}],"doi":"10.3389/flang.2025.1567498","publication_status":"published","user_id":"53917","citation":{"apa":"Karsten, A. (2025). Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>, <i>4</i>, Article 1567498. <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>","ama":"Karsten A. Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>. 2025;4. doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>","chicago":"Karsten, Andrea. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i> 4 (2025). <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>.","ieee":"A. Karsten, “Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride,” <i>Frontiers in Language Sciences</i>, vol. 4, Art. no. 1567498, 2025, doi: <a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>.","mla":"Karsten, Andrea. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i>, vol. 4, 1567498, Frontiers Media SA, 2025, doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>.","bibtex":"@article{Karsten_2025, title={Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride}, volume={4}, DOI={<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>}, number={1567498}, journal={Frontiers in Language Sciences}, publisher={Frontiers Media SA}, author={Karsten, Andrea}, year={2025} }","short":"A. Karsten, Frontiers in Language Sciences 4 (2025)."},"publisher":"Frontiers Media SA","date_created":"2025-09-10T10:50:30Z","publication":"Frontiers in Language Sciences","status":"public","year":"2025","type":"journal_article","publication_identifier":{"issn":["2813-4605"]},"volume":4,"_id":"61164","date_updated":"2026-05-06T08:37:28Z","article_number":"1567498"},{"date_created":"2026-05-05T14:09:18Z","publisher":"LibreCat University","language":[{"iso":"eng"}],"year":"2025","type":"misc","status":"public","_id":"65564","date_updated":"2026-05-05T14:18:35Z","title":"Annotation Schemes Project A02 \"Monitoring the understanding of explanations\"","author":[{"id":"90345","last_name":"Lazarov","full_name":"Lazarov, Stefan Teodorov","first_name":"Stefan Teodorov","orcid":"0009-0009-0892-9483"},{"full_name":"Türk, Olcay","first_name":"Olcay","last_name":"Türk"},{"id":"57578","last_name":"Grimminger","full_name":"Grimminger, Angela","first_name":"Angela"},{"full_name":"Wagner, Petra ","first_name":"Petra ","last_name":"Wagner"},{"first_name":"Hendrik","full_name":"Buschmeier, Hendrik","last_name":"Buschmeier"}],"project":[{"name":"TRR 318; TP A02: Verstehensprozess einer Erklärung beobachten und auswerten","_id":"112"}],"doi":"10.17605/OSF.IO/J2DHA","citation":{"short":"S.T. Lazarov, O. Türk, A. Grimminger, P. Wagner, H. Buschmeier, Annotation Schemes Project A02 “Monitoring the Understanding of Explanations,” LibreCat University, 2025.","mla":"Lazarov, Stefan Teodorov, et al. <i>Annotation Schemes Project A02 “Monitoring the Understanding of Explanations.”</i> LibreCat University, 2025, doi:<a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">10.17605/OSF.IO/J2DHA</a>.","bibtex":"@book{Lazarov_Türk_Grimminger_Wagner_Buschmeier_2025, title={Annotation Schemes Project A02 “Monitoring the understanding of explanations”}, DOI={<a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">10.17605/OSF.IO/J2DHA</a>}, publisher={LibreCat University}, author={Lazarov, Stefan Teodorov and Türk, Olcay and Grimminger, Angela and Wagner, Petra  and Buschmeier, Hendrik}, year={2025} }","chicago":"Lazarov, Stefan Teodorov, Olcay Türk, Angela Grimminger, Petra  Wagner, and Hendrik Buschmeier. <i>Annotation Schemes Project A02 “Monitoring the Understanding of Explanations.”</i> LibreCat University, 2025. <a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">https://doi.org/10.17605/OSF.IO/J2DHA</a>.","ieee":"S. T. Lazarov, O. Türk, A. Grimminger, P. Wagner, and H. Buschmeier, <i>Annotation Schemes Project A02 “Monitoring the understanding of explanations.”</i> LibreCat University, 2025.","ama":"Lazarov ST, Türk O, Grimminger A, Wagner P, Buschmeier H. <i>Annotation Schemes Project A02 “Monitoring the Understanding of Explanations.”</i> LibreCat University; 2025. doi:<a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">10.17605/OSF.IO/J2DHA</a>","apa":"Lazarov, S. T., Türk, O., Grimminger, A., Wagner, P., &#38; Buschmeier, H. (2025). <i>Annotation Schemes Project A02 “Monitoring the understanding of explanations.”</i> LibreCat University. <a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">https://doi.org/10.17605/OSF.IO/J2DHA</a>"},"publication_status":"published","user_id":"90345"},{"title":"Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride","author":[{"orcid":"0000-0003-0194-2000","last_name":"Karsten","id":"53917","full_name":"Karsten, Andrea Ramona","first_name":"Andrea Ramona"}],"project":[{"name":"TRR 318: Project Area RTG - Integriertes Graduiertenkolleg","_id":"120"}],"doi":"10.3389/flang.2025.1567498","abstract":[{"lang":"eng","text":"<jats:p>Building on and methodologically extending conceptual metaphor theory, the article examines how personal agency as a discursively produced sociopsychological phenomenon can be studied in elicited metaphors through a discourse-analytical approach. More concretely, the study illustrates how early-career researchers experience and express their agency in research writing through personal metaphors of academic writing such as riding a roller coaster or baking a wedding cake. A two-step discursive analysis adapts Hopper and Thompson's multidimensional approach to linguistic transitivity to study agency in language. The analytical approach involves both an in-depth parametrized analysis of all metaphors in the sample and a qualitative cross-analysis of the data. The results show that the participants' metaphors reflect both nuanced personal experiences and cultural expectations of academic writing, the writer, and the text. This emphasizes that research writing is not only a highly subjective practice but also one that is socially and culturally influenced. The article argues that research on agency thus needs elaborate methodological tools to trace discursive and sociopsychological trajectories of complex socio-cognitive practices like academic writing. This has implications not only for the nexus of research writing, identity, and academic enculturation but also for other fields focusing on agency in language.</jats:p>"}],"intvolume":"         4","citation":{"ama":"Karsten AR. Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>. 2025;4. doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>","apa":"Karsten, A. R. (2025). Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>, <i>4</i>, Article 1567498. <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>","chicago":"Karsten, Andrea Ramona. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i> 4 (2025). <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>.","ieee":"A. R. Karsten, “Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride,” <i>Frontiers in Language Sciences</i>, vol. 4, Art. no. 1567498, 2025, doi: <a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>.","mla":"Karsten, Andrea Ramona. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i>, vol. 4, 1567498, Frontiers Media SA, 2025, doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>.","bibtex":"@article{Karsten_2025, title={Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride}, volume={4}, DOI={<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>}, number={1567498}, journal={Frontiers in Language Sciences}, publisher={Frontiers Media SA}, author={Karsten, Andrea Ramona}, year={2025} }","short":"A.R. Karsten, Frontiers in Language Sciences 4 (2025)."},"publication_status":"published","user_id":"53917","related_material":{"link":[{"url":"https://www.frontiersin.org/articles/10.3389/flang.2025.1567498/full#supplementary-material","relation":"confirmation"}]},"date_created":"2025-09-10T10:51:29Z","publication":"Frontiers in Language Sciences","publisher":"Frontiers Media SA","language":[{"iso":"eng"}],"year":"2025","type":"journal_article","publication_identifier":{"issn":["2813-4605"]},"status":"public","_id":"61165","volume":4,"article_number":"1567498","date_updated":"2026-05-06T08:42:08Z"},{"oa":"1","user_id":"114764","main_file_link":[{"url":"https://www.researchgate.net/publication/395593556_LOCAL_DEFORMATION_AND_FAILURE_OF_COMPOSITES_DURING_SELF-PIERCING_RIVETING_A_CT_BASED_MICROSTRUCTURE_INVESTIGATION","open_access":"1"}],"keyword":["self-piercing riveting","computed tomography","thermoplastic composites","process-structure-interaction"],"project":[{"name":"TRR 285 - Project Area C","_id":"133"},{"_id":"148","name":"TRR 285 - Subproject C04"},{"_id":"130","name":"TRR 285:  Methodenentwicklung zur mechanischen Fügbarkeit in wandlungsfähigen Prozessketten"},{"name":"TRR 285 - Project Area A","_id":"131"},{"name":"TRR 285 - Subproject A03","_id":"137"},{"_id":"135","name":"TRR 285 - Subproject A01"}],"abstract":[{"lang":"eng","text":"The use of continuous fiber-reinforced thermoplastics (FRTP) in automotive industry increases due to their excellent material properties and possibility of rapid processing. The scale spanning heterogeneity of their material structure and its influence on the material behavior, however, presents significant challenges for most joining technologies, such as self-piercing riveting (SPR). During mechanical joining, the material structure is significantly altered within and around the joining zone, heavily influencing the material behavior. A comprehensive understanding of the underlying phenomena of material alteration during the SPR process is essential as basis for validating numerical simulations. This study examines the material structure at ten stages of a step-setting test of SPR with two FRTP sheets with glass-fiber reinforcement. Utilizing X-ray computed tomography (CT), the damage phenomena within different areas of the setting test are analyzed three-dimensionally and key parameters are quantified. Dominating phenomena during the penetration of the rivet into the laminate are fiber failure (FF), interfiber failure (IFF) and fiber bending, while delamination, fiber kinking and roving splitting are also observed. At the final stages, the bottom layers of the second sheet collapse and form a bulge into the cavity of the die."}],"doi":"10.24840/978-972-752-323-8","title":"Local Deformation and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation","type":"conference","publication":"Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)","citation":{"ama":"Dargel A, Gröger B, Schlichter MC, et al. Local Deformation and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation. In: Gomes JFS, Meguid SA, eds. <i>Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)</i>. FEUP; 2025. doi:<a href=\"https://doi.org/10.24840/978-972-752-323-8\">10.24840/978-972-752-323-8</a>","apa":"Dargel, A., Gröger, B., Schlichter, M. C., Gerritzen, J., Köhler, D., Meschut, G., Gude, M., &#38; Kupfer, R. (2025). Local Deformation and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation. In J. F. S. Gomes &#38; S. A. Meguid (Eds.), <i>Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)</i>. FEUP. <a href=\"https://doi.org/10.24840/978-972-752-323-8\">https://doi.org/10.24840/978-972-752-323-8</a>","ieee":"A. Dargel <i>et al.</i>, “Local Deformation and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation,” in <i>Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)</i>, Porto, 2025, doi: <a href=\"https://doi.org/10.24840/978-972-752-323-8\">10.24840/978-972-752-323-8</a>.","chicago":"Dargel, Alrik, Benjamin Gröger, Malte Christian Schlichter, Johannes Gerritzen, Daniel Köhler, Gerson Meschut, Maik Gude, and Robert Kupfer. “Local Deformation and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation.” In <i>Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)</i>, edited by J.F. Silva Gomes and Shaker A. Meguid. Porto: FEUP, 2025. <a href=\"https://doi.org/10.24840/978-972-752-323-8\">https://doi.org/10.24840/978-972-752-323-8</a>.","bibtex":"@inproceedings{Dargel_Gröger_Schlichter_Gerritzen_Köhler_Meschut_Gude_Kupfer_2025, place={Porto}, title={Local Deformation and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation}, DOI={<a href=\"https://doi.org/10.24840/978-972-752-323-8\">10.24840/978-972-752-323-8</a>}, booktitle={Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)}, publisher={FEUP}, author={Dargel, Alrik and Gröger, Benjamin and Schlichter, Malte Christian and Gerritzen, Johannes and Köhler, Daniel and Meschut, Gerson and Gude, Maik and Kupfer, Robert}, editor={Gomes, J.F. Silva and Meguid, Shaker A.}, year={2025} }","mla":"Dargel, Alrik, et al. “Local Deformation and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation.” <i>Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)</i>, edited by J.F. Silva Gomes and Shaker A. Meguid, FEUP, 2025, doi:<a href=\"https://doi.org/10.24840/978-972-752-323-8\">10.24840/978-972-752-323-8</a>.","short":"A. Dargel, B. Gröger, M.C. Schlichter, J. Gerritzen, D. Köhler, G. Meschut, M. Gude, R. Kupfer, in: J.F.S. Gomes, S.A. Meguid (Eds.), Proceedings of the 8th International Conference on Integrity-Reliability-Failure (IRF2025), FEUP, Porto, 2025."},"publication_status":"published","place":"Porto","conference":{"end_date":"2025-07-18","name":"8th International Conference on Integrity-Reliability-Failure (IRF2025)","location":"Porto","start_date":"2025-07-15"},"editor":[{"full_name":"Gomes, J.F. Silva","first_name":"J.F. Silva","last_name":"Gomes"},{"last_name":"Meguid","first_name":"Shaker A.","full_name":"Meguid, Shaker A."}],"author":[{"last_name":"Dargel","id":"114764","full_name":"Dargel, Alrik","first_name":"Alrik"},{"full_name":"Gröger, Benjamin","first_name":"Benjamin","last_name":"Gröger"},{"full_name":"Schlichter, Malte Christian","first_name":"Malte Christian","last_name":"Schlichter","id":"61977"},{"id":"105344","last_name":"Gerritzen","first_name":"Johannes","full_name":"Gerritzen, Johannes","orcid":"0000-0002-0169-8602"},{"full_name":"Köhler, Daniel","first_name":"Daniel","id":"83408","last_name":"Köhler"},{"orcid":"0000-0002-2763-1246","last_name":"Meschut","id":"32056","first_name":"Gerson","full_name":"Meschut, Gerson"},{"first_name":"Maik","full_name":"Gude, Maik","last_name":"Gude"},{"last_name":"Kupfer","full_name":"Kupfer, Robert","first_name":"Robert"}],"date_updated":"2026-05-07T08:40:51Z","_id":"61149","publication_identifier":{"isbn":["9789727523238"]},"year":"2025","language":[{"iso":"eng"}],"status":"public","date_created":"2025-09-08T11:52:45Z","publisher":"FEUP"},{"department":[{"_id":"58"}],"citation":{"short":"L. Luchterhandt, V. Govindasamy, Y. Wang, C. Scheytt, W. Mueller, R. Dömer, in: 2025 Forum on Specification &#38; Design Languages (FDL), IEEE, 2025.","bibtex":"@inproceedings{Luchterhandt_Govindasamy_Wang_Scheytt_Mueller_Dömer_2025, title={A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor Grids}, DOI={<a href=\"https://doi.org/10.1109/fdl68117.2025.11165408\">10.1109/fdl68117.2025.11165408</a>}, booktitle={2025 Forum on Specification &#38; Design Languages (FDL)}, publisher={IEEE}, author={Luchterhandt, Lars and Govindasamy, Vivek and Wang, Yutong and Scheytt, Christoph and Mueller, Wolfgang and Dömer, Rainer}, year={2025} }","mla":"Luchterhandt, Lars, et al. “A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor Grids.” <i>2025 Forum on Specification &#38; Design Languages (FDL)</i>, IEEE, 2025, doi:<a href=\"https://doi.org/10.1109/fdl68117.2025.11165408\">10.1109/fdl68117.2025.11165408</a>.","ieee":"L. Luchterhandt, V. Govindasamy, Y. Wang, C. Scheytt, W. Mueller, and R. Dömer, “A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor Grids,” 2025, doi: <a href=\"https://doi.org/10.1109/fdl68117.2025.11165408\">10.1109/fdl68117.2025.11165408</a>.","chicago":"Luchterhandt, Lars, Vivek Govindasamy, Yutong Wang, Christoph Scheytt, Wolfgang Mueller, and Rainer Dömer. “A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor Grids.” In <i>2025 Forum on Specification &#38; Design Languages (FDL)</i>. IEEE, 2025. <a href=\"https://doi.org/10.1109/fdl68117.2025.11165408\">https://doi.org/10.1109/fdl68117.2025.11165408</a>.","ama":"Luchterhandt L, Govindasamy V, Wang Y, Scheytt C, Mueller W, Dömer R. A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor Grids. In: <i>2025 Forum on Specification &#38; Design Languages (FDL)</i>. IEEE; 2025. doi:<a href=\"https://doi.org/10.1109/fdl68117.2025.11165408\">10.1109/fdl68117.2025.11165408</a>","apa":"Luchterhandt, L., Govindasamy, V., Wang, Y., Scheytt, C., Mueller, W., &#38; Dömer, R. (2025). A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor Grids. <i>2025 Forum on Specification &#38; Design Languages (FDL)</i>. <a href=\"https://doi.org/10.1109/fdl68117.2025.11165408\">https://doi.org/10.1109/fdl68117.2025.11165408</a>"},"user_id":"16243","publication_status":"published","doi":"10.1109/fdl68117.2025.11165408","title":"A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor Grids","author":[{"first_name":"Lars","full_name":"Luchterhandt, Lars","last_name":"Luchterhandt"},{"last_name":"Govindasamy","full_name":"Govindasamy, Vivek","first_name":"Vivek"},{"last_name":"Wang","first_name":"Yutong","full_name":"Wang, Yutong"},{"first_name":"Christoph","full_name":"Scheytt, Christoph","last_name":"Scheytt"},{"last_name":"Mueller","full_name":"Mueller, Wolfgang","first_name":"Wolfgang"},{"last_name":"Dömer","full_name":"Dömer, Rainer","first_name":"Rainer"}],"date_updated":"2026-05-08T09:12:31Z","_id":"62108","type":"conference","year":"2025","language":[{"iso":"eng"}],"status":"public","publication":"2025 Forum on Specification & Design Languages (FDL)","date_created":"2025-11-06T09:47:40Z","publisher":"IEEE"},{"main_file_link":[{"url":"https://www.waxmann.com/shop/download?tx_p2waxmann_download%5Baction%5D=download&tx_p2waxmann_download%5Bcontroller%5D=Zeitschrift&tx_p2waxmann_download%5Bid_artikel%5D=ART106580&tx_p2waxmann_download%5Buid%5D=frei&cHash=8bebe3e88a1eab177e7c65196dbb1715","open_access":"1"}],"keyword":["Tertium Comparationis","Land","Nation","Vergleichende Erziehungswissenschaft","Diskurse"],"oa":"1","user_id":"10831","title":"Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis","abstract":[{"lang":"ger","text":"Dieser Artikel spiegelt die dreißigjährige Geschichte der Zeitschrift Tertium Comparationis, indem er eine der zentralen Vergleichseinheiten Vergleichender Erziehungswissenschaft in den Blick nimmt. Themenhefte und Einzelbeiträge der Zeitschrift Tertium Comparationis haben über die Jahrzehnte immer wieder reflexive Blicke auf die Vergleichseinheit Land und/oder Nation geworfen, aber auch – ohne Bezüge zu solchen Diskursen – Länder- und Nationenvergleiche in unterschiedlichen Vorgehensweisen präsentiert. Bei der intensiven und analytischen Lektüre der Themen und Inhalte ergeben sich Cluster der Perspektivsetzungen und damit verbundene Diskurse, von denen einige aufgrund ihrer Häufigkeit und Intensität besonders relevant erscheinen. Die aufzufindenden Diskurse und Cluster werden im Beitrag präsentiert und anhand normativer, kritischer und innovativer Beiträge verifiziert. Trotz konstant wiederholter Kritik und konzeptueller Änderungen, bleiben Land und Nation zentrale Kategorien Vergleichender Erziehungswissenschaft."}],"doi":"10.31244/tc.2025.02.02","volume":31,"page":"156-167","issue":"2","publication":"Tertium Comparationis","type":"journal_article","publication_status":"published","citation":{"bibtex":"@article{Freitag_2025, title={Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis}, volume={31}, DOI={<a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>}, number={2}, journal={Tertium Comparationis}, publisher={Waxmann}, author={Freitag, Christine}, year={2025}, pages={156–167} }","mla":"Freitag, Christine. “Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis.” <i>Tertium Comparationis</i>, vol. 31, no. 2, Waxmann, 2025, pp. 156–67, doi:<a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>.","short":"C. Freitag, Tertium Comparationis 31 (2025) 156–167.","ama":"Freitag C. Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis. <i>Tertium Comparationis</i>. 2025;31(2):156-167. doi:<a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>","apa":"Freitag, C. (2025). Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis. <i>Tertium Comparationis</i>, <i>31</i>(2), 156–167. <a href=\"https://doi.org/10.31244/tc.2025.02.02\">https://doi.org/10.31244/tc.2025.02.02</a>","ieee":"C. Freitag, “Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis,” <i>Tertium Comparationis</i>, vol. 31, no. 2, pp. 156–167, 2025, doi: <a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>.","chicago":"Freitag, Christine. “Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis.” <i>Tertium Comparationis</i> 31, no. 2 (2025): 156–67. <a href=\"https://doi.org/10.31244/tc.2025.02.02\">https://doi.org/10.31244/tc.2025.02.02</a>."},"department":[{"_id":"453"}],"author":[{"id":"20560","last_name":"Freitag","first_name":"Christine","full_name":"Freitag, Christine"}],"intvolume":"        31","_id":"65559","date_updated":"2026-05-08T11:47:40Z","publisher":"Waxmann","date_created":"2026-05-05T12:12:35Z","status":"public","language":[{"iso":"ger"}],"year":"2025","publication_identifier":{"issn":["0947-9732","1434-1697"]}},{"place":"Paderborn","title":"Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog","author":[{"orcid":"0000-0002-0545-9799","full_name":"Abdelrahem, Mohammed","first_name":"Mohammed","last_name":"Abdelrahem","id":"95179"}],"department":[{"_id":"469"}],"citation":{"short":"M. Abdelrahem, Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog, Zekk-Bolg, Paderborn, 2025.","mla":"Abdelrahem, Mohammed. <i>Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog</i>. Zekk-Bolg, 2025.","bibtex":"@book{Abdelrahem_2025, place={Paderborn}, title={Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog}, publisher={Zekk-Bolg}, author={Abdelrahem, Mohammed}, year={2025} }","chicago":"Abdelrahem, Mohammed. <i>Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog</i>. Paderborn: Zekk-Bolg, 2025.","ieee":"M. Abdelrahem, <i>Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog</i>. Paderborn: Zekk-Bolg, 2025.","ama":"Abdelrahem M. <i>Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog</i>. Zekk-Bolg; 2025.","apa":"Abdelrahem, M. (2025). <i>Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog</i>. Zekk-Bolg."},"user_id":"95179","main_file_link":[{"url":"https://blogs.uni-paderborn.de/zekkblog/2025/04/18/die-menschheitsfamilie-und-der-begriff-der-umma-islamische-perspektiven-im-interreligioesen-dialog/"}],"year":"2025","type":"misc","language":[{"iso":"ger"}],"status":"public","date_created":"2025-04-25T00:06:45Z","publisher":"Zekk-Bolg","date_updated":"2026-05-08T13:34:20Z","_id":"59671"}]
