@unpublished{HippLeumannSchober2024, author = {Hipp, Lena and Leumann, Sandra and Schober, Pia S.}, title = {Partnership penalties for working in gender-atypical occupations?}, doi = {10.31235/osf.io/ydurp}, pages = {35}, year = {2024}, abstract = {Does working in a gender-atypical occupation reduce individuals' likelihood of finding a different-sex romantic partner, and do such occupational partnership penalties contribute to occupational gender segregation? To answer this question, we theorized partnership penalties for working in gender-atypical occupations by drawing on insights from evolutionary psychology, social constructivism, and rational choice theory and exploited the stability of occupational pathways in Germany. In Study 1, we analyzed observational data from a national probability sample (N= 1,634,944) to assess whether individuals in gender-atypical occupations were less likely to be partnered than individuals who worked in gender typical occupations. To assess whether the observed partnership gaps found in Study 1 were causally related to the gender typicality of men's and women's occupations, we conducted a field experiment on a dating app (N = 6,778). Because the findings from Study 2 suggested that young women and men indeed experienced penalties for working in a gender-atypical occupation (at least when they were not highly attractive), we employed a choice-experimental design in Study 3 (N = 1,250) to assess whether women and men were aware of occupational partnership penalties and showed that anticipating occupational partnership penalties may keep young and highly educated women from working in gender-atypical occupations. Our main conclusion therefore is that that observed penalties and their anticipation seem to be driven by unconscious rather than conscious processes.}, language = {en} } @unpublished{EcksteinHurley2020, author = {Eckstein, Lars and Hurley, Andrew Wright}, title = {German-Australian Colonial Entanglements}, doi = {10.25932/publishup-44449}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-444490}, pages = {30}, year = {2020}, abstract = {Remembering German-Australian Colonial Entanglements emphatically promotes a critical and nuanced understanding of the complex entanglement of German colonial actors and activities within Australian colonial institutions and different imperial ideologies. Case studies ranging from the German reception of James Cook's voyages through to the legacies of 19th- and 20th-century settler colonialism foreground the highly ambiguous roles played by explorers, missionaries, intellectuals and other individuals, as well as by objects and things that travelled between worlds - ancestral human remains, rare animal skins, songs, and even military tanks. The chapters foreground the complex relationship between science, religion, art and exploitation, displacement and annihilation.}, language = {en} } @unpublished{Hartmann2019, author = {Hartmann, Niklas K.}, title = {Personenbezogene Forschungsdaten in unverd{\"a}chtigen Disziplinen}, doi = {10.5281/zenodo.3460439}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-445061}, pages = {19}, year = {2019}, abstract = {Am Beispiel der Erd- und Umweltwissenschaften (einschließlich der landschafts- und standortbezogenen Teilgebiete der Agrarwissenschaften) zeigt dieser Beitrag, dass auch in scheinbar „unverd{\"a}chtigen" Disziplinen personenbezogene Forschungsdaten vorkommen. Eine Auswertung der Literatur zeigt, dass allgemeine Handreichungen zum Datenschutz in der Forschung kaum Unterst{\"u}tzung bei der Arbeit mit den f{\"u}r diese Disziplinen besonders relevanten F{\"a}llen bieten. F{\"u}r die in den Erd- und Umweltwissenschaften besonders relevanten raumbezogenen Daten kommt hinzu, dass selbst unter Fachjuristinnen Uneinigkeit {\"u}ber die datenschutzrechtliche Bewertung herrscht. Die Ergebnisse einer empirischen Vorstudie zeigen eine ganze Reihe verschiedener Arten personenbezogener Forschungsdaten auf, die in der Forschungspraxis der Erd- und Umweltwissenschaften eine Rolle spielen. Sie legen außerdem nahe, dass der Umgang mit personenbezogenen Daten in der Forschungspraxis der Erd- und Umweltwissenschaften auf Grund der mangelnden Vertrautheit mit dem Datenschutz nicht immer den rechtlichen Anforderungen entspricht. Auch Unterst{\"u}tzung durch Fachgesellschaften und Infrastruktureinrichtungen - etwa in Form disziplinspezifischer Handreichungen, qualifizierter Beratung oder institutionalisierten M{\"o}glichkeiten, Daten sicher zu archivieren und ggf. zugangsbeschr{\"a}nkt zu publizieren - bestehen kaum. Aus dieser Situation ergeben sich Herausforderungen an die Weiterentwicklung der disziplin{\"a}ren Datenkultur und Dateninfrastruktur, beispielsweise im Rahmen des Prozesses zum Aufbau einer Nationalen Forschungsdateninfrastruktur (NFDI). Zu den M{\"o}glichkeiten f{\"u}r Infrastruktureinrichtungen, diese Weiterentwicklung zu unterst{\"u}tzen, zeigt dieser Beitrag Handlungsoptionen auf.}, language = {de} } @unpublished{FedchenkoTarkhanov2017, author = {Fedchenko, Dmitry and Tarkhanov, Nikolai Nikolaevich}, title = {A Rad{\´o} Theorem for the Porous Medium Equation}, series = {Preprints des Instituts f{\"u}r Mathematik der Universit{\"a}t Potsdam}, volume = {6}, journal = {Preprints des Instituts f{\"u}r Mathematik der Universit{\"a}t Potsdam}, number = {1}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-102735}, pages = {12}, year = {2017}, abstract = {We prove that each locally Lipschitz continuous function satisfying the porous medium equation away from the set of its zeroes is actually a weak solution of this equation in the whole domain.}, language = {en} } @unpublished{ShlapunovTarkhanov2017, author = {Shlapunov, Alexander and Tarkhanov, Nikolai Nikolaevich}, title = {Golusin-Krylov Formulas in Complex Analysis}, series = {Preprints des Instituts f{\"u}r Mathematik der Universit{\"a}t Potsdam}, volume = {6}, journal = {Preprints des Instituts f{\"u}r Mathematik der Universit{\"a}t Potsdam}, number = {2}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-102774}, pages = {25}, year = {2017}, abstract = {This is a brief survey of a constructive technique of analytic continuation related to an explicit integral formula of Golusin and Krylov (1933). It goes far beyond complex analysis and applies to the Cauchy problem for elliptic partial differential equations as well. As started in the classical papers, the technique is elaborated in generalised Hardy spaces also called Hardy-Smirnov spaces.}, language = {en} } @unpublished{PolkovnikovTarkhanov2017, author = {Polkovnikov, Alexander and Tarkhanov, Nikolai Nikolaevich}, title = {A Riemann-Hilbert problem for the Moisil-Teodorescu system}, volume = {6}, number = {3}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-397036}, pages = {31}, year = {2017}, abstract = {In a bounded domain with smooth boundary in R^3 we consider the stationary Maxwell equations for a function u with values in R^3 subject to a nonhomogeneous condition (u,v)_x = u_0 on the boundary, where v is a given vector field and u_0 a function on the boundary. We specify this problem within the framework of the Riemann-Hilbert boundary value problems for the Moisil-Teodorescu system. This latter is proved to satisfy the Shapiro-Lopaniskij condition if an only if the vector v is at no point tangent to the boundary. The Riemann-Hilbert problem for the Moisil-Teodorescu system fails to possess an adjoint boundary value problem with respect to the Green formula, which satisfies the Shapiro-Lopatinskij condition. We develop the construction of Green formula to get a proper concept of adjoint boundary value problem.}, language = {en} } @unpublished{Eckstein2017, author = {Eckstein, Lars}, title = {Sam Selvon, The Lonely Londoners (1956)}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-103285}, pages = {21}, year = {2017}, abstract = {This essay reads Sam Selvon's novel The Lonely Londoners (1956) as a milestone in the decolonisation of British fiction. After an introduction to Selvon and the core composition of the novel, it discusses the ways in which the narrative takes on issues of race and racism, how it in the tradition of the Trinidadian carnival confronts audiences with sexual profanation and black masculine swagger, and not least how the novel, especially through its elaborate use of creole Englishes, reimagines London as a West Indian metropolis. The essay then turns more systematically to the ways in which Selvon translates Western literary models and their isolated subject positions into collective modes of narrative performance taken from Caribbean orature and the calypsonian tradition. The Lonely Londoners breathes entirely new life into the ossified conventions of the English novel, and imbues it with unforeseen aesthetic, ethical, political and epistemological possibilities.}, language = {en} } @unpublished{ShlapunovTarkhanov2016, author = {Shlapunov, Alexander and Tarkhanov, Nikolai Nikolaevich}, title = {An open mapping theorem for the Navier-Stokes equations}, volume = {5}, number = {10}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, issn = {2193-6943}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-98687}, pages = {80}, year = {2016}, abstract = {We consider the Navier-Stokes equations in the layer R^n x [0,T] over R^n with finite T > 0. Using the standard fundamental solutions of the Laplace operator and the heat operator, we reduce the Navier-Stokes equations to a nonlinear Fredholm equation of the form (I+K) u = f, where K is a compact continuous operator in anisotropic normed H{\"o}lder spaces weighted at the point at infinity with respect to the space variables. Actually, the weight function is included to provide a finite energy estimate for solutions to the Navier-Stokes equations for all t in [0,T]. On using the particular properties of the de Rham complex we conclude that the Fr{\´e}chet derivative (I+K)' is continuously invertible at each point of the Banach space under consideration and the map I+K is open and injective in the space. In this way the Navier-Stokes equations prove to induce an open one-to-one mapping in the scale of H{\"o}lder spaces.}, language = {en} } @unpublished{BlanchardKraemer2016, author = {Blanchard, Gilles and Kr{\"a}mer, Nicole}, title = {Convergence rates of kernel conjugate gradient for random design regression}, volume = {5}, number = {8}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, issn = {2193-6943}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-94195}, pages = {31}, year = {2016}, abstract = {We prove statistical rates of convergence for kernel-based least squares regression from i.i.d. data using a conjugate gradient algorithm, where regularization against overfitting is obtained by early stopping. This method is related to Kernel Partial Least Squares, a regression method that combines supervised dimensionality reduction with least squares projection. Following the setting introduced in earlier related literature, we study so-called "fast convergence rates" depending on the regularity of the target regression function (measured by a source condition in terms of the kernel integral operator) and on the effective dimensionality of the data mapped into the kernel space. We obtain upper bounds, essentially matching known minimax lower bounds, for the L^2 (prediction) norm as well as for the stronger Hilbert norm, if the true regression function belongs to the reproducing kernel Hilbert space. If the latter assumption is not fulfilled, we obtain similar convergence rates for appropriate norms, provided additional unlabeled data are available.}, language = {en} } @unpublished{PrasseGrubenMachlikaetal.2016, author = {Prasse, Paul and Gruben, Gerrit and Machlika, Lukas and Pevny, Tomas and Sofka, Michal and Scheffer, Tobias}, title = {Malware Detection by HTTPS Traffic Analysis}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-100942}, pages = {10}, year = {2016}, abstract = {In order to evade detection by network-traffic analysis, a growing proportion of malware uses the encrypted HTTPS protocol. We explore the problem of detecting malware on client computers based on HTTPS traffic analysis. In this setting, malware has to be detected based on the host IP address, ports, timestamp, and data volume information of TCP/IP packets that are sent and received by all the applications on the client. We develop a scalable protocol that allows us to collect network flows of known malicious and benign applications as training data and derive a malware-detection method based on a neural networks and sequence classification. We study the method's ability to detect known and new, unknown malware in a large-scale empirical study.}, language = {en} }