@misc{LouposDamigosTsertouetal.2019, author = {Loupos, Konstantinos and Damigos, Yannis and Tsertou, Athanasisa and Amditis, Angelos and Lenas, Sotiris-Angelos and Chatziandreoglou, Chistos and Malliou, Christina and Tsaoussidis, Vassilis and Gerhard, Reimund and Rychkov, Dmitry and Wirges, Werner and Frankenstein, Bernd and Camarinopoulos, Stephanos and Kalidromitis, Vassilis and Sanna, C. and Maier, Stephanos and Gordt, A. and Panetsos, P.}, title = {Innovative soft-material sensor, wireless network and assessment software for bridge life-cycle assessment}, series = {Life-cycle analysis and assessmanet in civil engineering : towards an integrated vision}, journal = {Life-cycle analysis and assessmanet in civil engineering : towards an integrated vision}, publisher = {CRC Press, Taylor \& Francis Group}, address = {Boca Raton}, isbn = {978-1-315-22891-4}, pages = {2085 -- 2092}, year = {2019}, abstract = {Nowadays, structural health monitoring of critical infrastructures is considered as of primal importance especially for managing transport infrastructure however most current SHM methodologies are based on point-sensors that show various limitations relating to their spatial positioning capabilities, cost of development and measurement range. This publication describes the progress in the SENSKIN EC co-funded research project that is developing a dielectric-elastomer sensor, formed from a large highly extensible capacitance sensing membrane and is supported by an advanced micro-electronic circuitry, for monitoring transport infrastructure bridges. The sensor under development provides spatial measurements of strain in excess of 10\%, while the sensing system is being designed to be easy to install, require low power in operation concepts, require simple signal processing, and have the ability to self-monitor and report. An appropriate wireless sensor network is also being designed and developed supported by local gateways for the required data collection and exploitation. SENSKIN also develops a Decision-Support-System (DSS) for proactive condition-based structural interventions under normal operating conditions and reactive emergency intervention following an extreme event. The latter is supported by a life-cycle-costing (LCC) and life-cycle-assessment (LCA) module responsible for the total internal and external costs for the identified bridge rehabilitation, analysis of options, yielding figures for the assessment of the economic implications of the bridge rehabilitation work and the environmental impacts of the bridge rehabilitation options and of the associated secondary effects respectively. The overall monitoring system will be evaluated and benchmarked on actual bridges of Egnatia Highway (Greece) and Bosporus Bridge (Turkey).}, language = {en} } @misc{NiskanenFondellSahleetal.2019, author = {Niskanen, Johannes and Fondell, Mattis and Sahle, Christoph J. and Eckert, Sebastian and Jay, Raphael Martin and Gilmore, Keith and Pietzsch, Annette and Dantz, Marcus and Lu, Xingye and McNally, Daniel E. and Schmitt, Thorsten and Vaz da Cruz, Vinicius and Kimberg, Victor and F{\"o}hlisch, Alexander}, title = {Reply to Pettersson et al.: Why X-ray spectral features are compatible to continuous distribution models in ambient water}, series = {Proceedings of the National Academy of Sciences of the United States of America}, volume = {116}, journal = {Proceedings of the National Academy of Sciences of the United States of America}, number = {35}, publisher = {National Acad. of Sciences}, address = {Washington}, issn = {0027-8424}, doi = {10.1073/pnas.1909551116}, pages = {17158 -- 17159}, year = {2019}, language = {en} } @misc{HesseMatthiesSinzigetal.2019, author = {Hesse, G{\"u}nter and Matthies, Christoph and Sinzig, Werner and Uflacker, Matthias}, title = {Adding Value by Combining Business and Sensor Data}, series = {Database Systems for Advanced Applications}, volume = {11448}, journal = {Database Systems for Advanced Applications}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-18590-9}, issn = {0302-9743}, doi = {10.1007/978-3-030-18590-9_80}, pages = {528 -- 532}, year = {2019}, abstract = {Industry 4.0 and the Internet of Things are recent developments that have lead to the creation of new kinds of manufacturing data. Linking this new kind of sensor data to traditional business information is crucial for enterprises to take advantage of the data's full potential. In this paper, we present a demo which allows experiencing this data integration, both vertically between technical and business contexts and horizontally along the value chain. The tool simulates a manufacturing company, continuously producing both business and sensor data, and supports issuing ad-hoc queries that answer specific questions related to the business. In order to adapt to different environments, users can configure sensor characteristics to their needs.}, language = {en} } @misc{SianiparWillemsMeinel2019, author = {Sianipar, Johannes Harungguan and Willems, Christian and Meinel, Christoph}, title = {Virtual machine integrity verification in Crowd-Resourcing Virtual Laboratory}, series = {2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA)}, journal = {2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-9133-5}, issn = {2163-2871}, doi = {10.1109/SOCA.2018.00032}, pages = {169 -- 176}, year = {2019}, abstract = {In cloud computing, users are able to use their own operating system (OS) image to run a virtual machine (VM) on a remote host. The virtual machine OS is started by the user using some interfaces provided by a cloud provider in public or private cloud. In peer to peer cloud, the VM is started by the host admin. After the VM is running, the user could get a remote access to the VM to install, configure, and run services. For the security reasons, the user needs to verify the integrity of the running VM, because a malicious host admin could modify the image or even replace the image with a similar image, to be able to get sensitive data from the VM. We propose an approach to verify the integrity of a running VM on a remote host, without using any specific hardware such as Trusted Platform Module (TPM). Our approach is implemented on a Linux platform where the kernel files (vmlinuz and initrd) could be replaced with new files, while the VM is running. kexec is used to reboot the VM with the new kernel files. The new kernel has secret codes that will be used to verify whether the VM was started using the new kernel files. The new kernel is used to further measuring the integrity of the running VM.}, language = {en} } @misc{PodlesnyKayemMeinel2019, author = {Podlesny, Nikolai Jannik and Kayem, Anne V. D. M. and Meinel, Christoph}, title = {Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymisation}, series = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy}, journal = {Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy}, publisher = {Association for Computing Machinery}, address = {New York}, isbn = {978-1-4503-6099-9}, doi = {10.1145/3292006.3300019}, pages = {109 -- 119}, year = {2019}, abstract = {High-dimensional data is particularly useful for data analytics research. In the healthcare domain, for instance, high-dimensional data analytics has been used successfully for drug discovery. Yet, in order to adhere to privacy legislation, data analytics service providers must guarantee anonymity for data owners. In the context of high-dimensional data, ensuring privacy is challenging because increased data dimensionality must be matched by an exponential growth in the size of the data to avoid sparse datasets. Syntactically, anonymising sparse datasets with methods that rely of statistical significance, makes obtaining sound and reliable results, a challenge. As such, strong privacy is only achievable at the cost of high information loss, rendering the data unusable for data analytics. In this paper, we make two contributions to addressing this problem from both the privacy and information loss perspectives. First, we show that by identifying dependencies between attribute subsets we can eliminate privacy violating attributes from the anonymised dataset. Second, to minimise information loss, we employ a greedy search algorithm to determine and eliminate maximal partial unique attribute combinations. Thus, one only needs to find the minimal set of identifying attributes to prevent re-identification. Experiments on a health cloud based on the SAP HANA platform using a semi-synthetic medical history dataset comprised of 109 attributes, demonstrate the effectiveness of our approach.}, language = {en} } @misc{SeidelKrentzMeinel2019, author = {Seidel, Felix and Krentz, Konrad-Felix and Meinel, Christoph}, title = {Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers}, series = {2019 IEEE 5th World Forum on Internet of Things (WF-IoT)}, journal = {2019 IEEE 5th World Forum on Internet of Things (WF-IoT)}, publisher = {Institute of Electrical and Electronics Engineers}, address = {New York}, isbn = {978-1-5386-4980-0}, doi = {10.1109/WF-IoT.2019.8767262}, pages = {201 -- 206}, year = {2019}, abstract = {Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at depriving victim devices of entering low-power sleep modes. For example, a denial-of-sleep attack against an IoT device that runs a CoAP server is to send plenty of CoAP messages to it, thereby forcing the IoT device to expend energy for receiving and processing these CoAP messages. All current security solutions for CoAP, namely Datagram Transport Layer Security (DTLS), IPsec, and OSCORE, fail to prevent such attacks. To fill this gap, Seitz et al. proposed a method for filtering out inauthentic and replayed CoAP messages "en-route" on 6LoWPAN border routers. In this paper, we expand on Seitz et al.'s proposal in two ways. First, we revise Seitz et al.'s software architecture so that 6LoWPAN border routers can not only check the authenticity and freshness of CoAP messages, but can also perform a wide range of further checks. Second, we propose a couple of such further checks, which, as compared to Seitz et al.'s original checks, more reliably protect IoT devices that run CoAP servers from remote denial-of-sleep attacks, as well as from remote exploits. We prototyped our solution and successfully tested its compatibility with Contiki-NG's CoAP implementation.}, language = {en} } @misc{BartzYangBethgeetal.2019, author = {Bartz, Christian and Yang, Haojin and Bethge, Joseph and Meinel, Christoph}, title = {LoANs}, series = {Computer Vision - ACCV 2018 Workshops}, volume = {11367}, journal = {Computer Vision - ACCV 2018 Workshops}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-21074-8}, issn = {0302-9743}, doi = {10.1007/978-3-030-21074-8_29}, pages = {341 -- 356}, year = {2019}, abstract = {Recently, deep neural networks have achieved remarkable performance on the task of object detection and recognition. The reason for this success is mainly grounded in the availability of large scale, fully annotated datasets, but the creation of such a dataset is a complicated and costly task. In this paper, we propose a novel method for weakly supervised object detection that simplifies the process of gathering data for training an object detector. We train an ensemble of two models that work together in a student-teacher fashion. Our student (localizer) is a model that learns to localize an object, the teacher (assessor) assesses the quality of the localization and provides feedback to the student. The student uses this feedback to learn how to localize objects and is thus entirely supervised by the teacher, as we are using no labels for training the localizer. In our experiments, we show that our model is very robust to noise and reaches competitive performance compared to a state-of-the-art fully supervised approach. We also show the simplicity of creating a new dataset, based on a few videos (e.g. downloaded from YouTube) and artificially generated data.}, language = {en} } @misc{SukmanaTorkuraGraupneretal.2019, author = {Sukmana, Muhammad Ihsan Haikal and Torkura, Kennedy A. and Graupner, Hendrik and Cheng, Feng and Meinel, Christoph}, title = {Unified Cloud Access Control Model for Cloud Storage Broker}, series = {33rd International Conference on Information Networking (ICOIN 2019)}, journal = {33rd International Conference on Information Networking (ICOIN 2019)}, publisher = {IEEE}, address = {Los Alamitos}, isbn = {978-1-5386-8350-7}, issn = {1976-7684}, doi = {10.1109/ICOIN.2019.8717982}, pages = {60 -- 65}, year = {2019}, abstract = {Cloud Storage Broker (CSB) provides value-added cloud storage service for enterprise usage by leveraging multi-cloud storage architecture. However, it raises several challenges for managing resources and its access control in multiple Cloud Service Providers (CSPs) for authorized CSB stakeholders. In this paper we propose unified cloud access control model that provides the abstraction of CSP's services for centralized and automated cloud resource and access control management in multiple CSPs. Our proposal offers role-based access control for CSB stakeholders to access cloud resources by assigning necessary privileges and access control list for cloud resources and CSB stakeholders, respectively, following privilege separation concept and least privilege principle. We implement our unified model in a CSB system called CloudRAID for Business (CfB) with the evaluation result shows it provides system-and-cloud level security service for cfB and centralized resource and access control management in multiple CSPs.}, language = {en} } @misc{BockMatysikKrentzetal.2019, author = {Bock, Benedikt and Matysik, Jan-Tobias and Krentz, Konrad-Felix and Meinel, Christoph}, title = {Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme}, series = {2019 IEEE 5TH World Forum on internet of things (WF-IOT)}, journal = {2019 IEEE 5TH World Forum on internet of things (WF-IOT)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-4980-0}, doi = {10.1109/WF-IoT.2019.8767211}, pages = {374 -- 379}, year = {2019}, abstract = {While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap.}, language = {en} } @misc{AlhosseiniAlmodarresiYasinBinTareafNajafietal.2019, author = {Alhosseini Almodarresi Yasin, Seyed Ali and Bin Tareaf, Raad and Najafi, Pejman and Meinel, Christoph}, title = {Detect me if you can}, series = {Companion Proceedings of The 2019 World Wide Web Conference}, journal = {Companion Proceedings of The 2019 World Wide Web Conference}, publisher = {Association for Computing Machinery}, address = {New York}, isbn = {978-1-4503-6675-5}, doi = {10.1145/3308560.3316504}, pages = {148 -- 153}, year = {2019}, abstract = {Spam Bots have become a threat to online social networks with their malicious behavior, posting misinformation messages and influencing online platforms to fulfill their motives. As spam bots have become more advanced over time, creating algorithms to identify bots remains an open challenge. Learning low-dimensional embeddings for nodes in graph structured data has proven to be useful in various domains. In this paper, we propose a model based on graph convolutional neural networks (GCNN) for spam bot detection. Our hypothesis is that to better detect spam bots, in addition to defining a features set, the social graph must also be taken into consideration. GCNNs are able to leverage both the features of a node and aggregate the features of a node's neighborhood. We compare our approach, with two methods that work solely on a features set and on the structure of the graph. To our knowledge, this work is the first attempt of using graph convolutional neural networks in spam bot detection.}, language = {en} } @misc{StaubitzMeinel2019, author = {Staubitz, Thomas and Meinel, Christoph}, title = {Graded Team Assignments in MOOCs}, series = {SCALE}, journal = {SCALE}, publisher = {Association for Computing Machinery}, address = {New York}, isbn = {978-1-4503-6804-9}, doi = {10.1145/3330430.3333619}, pages = {10}, year = {2019}, abstract = {The ability to work in teams is an important skill in today's work environments. In MOOCs, however, team work, team tasks, and graded team-based assignments play only a marginal role. To close this gap, we have been exploring ways to integrate graded team-based assignments in MOOCs. Some goals of our work are to determine simple criteria to match teams in a volatile environment and to enable a frictionless online collaboration for the participants within our MOOC platform. The high dropout rates in MOOCs pose particular challenges for team work in this context. By now, we have conducted 15 MOOCs containing graded team-based assignments in a variety of topics. The paper at hand presents a study that aims to establish a solid understanding of the participants in the team tasks. Furthermore, we attempt to determine which team compositions are particularly successful. Finally, we examine how several modifications to our platform's collaborative toolset have affected the dropout rates and performance of the teams.}, language = {en} } @misc{RenzMeinel2019, author = {Renz, Jan and Meinel, Christoph}, title = {The "Bachelor Project"}, series = {2019 IEEE Global Engineering Education Conference (EDUCON)}, journal = {2019 IEEE Global Engineering Education Conference (EDUCON)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-9506-7}, issn = {2165-9567}, doi = {10.1109/EDUCON.2019.8725140}, pages = {580 -- 587}, year = {2019}, abstract = {One of the challenges of educating the next generation of computer scientists is to teach them to become team players, that are able to communicate and interact not only with different IT systems, but also with coworkers and customers with a non-it background. The "bachelor project" is a project based on team work and a close collaboration with selected industry partners. The authors hosted some of the teams since spring term 2014/15. In the paper at hand we explain and discuss this concept and evaluate its success based on students' evaluation and reports. Furthermore, the technology-stack that has been used by the teams is evaluated to understand how self-organized students in IT-related projects work. We will show that and why the bachelor is the most successful educational format in the perception of the students and how this positive results can be improved by the mentors.}, language = {en} } @misc{StaubitzTeusnerMeinel2019, author = {Staubitz, Thomas and Teusner, Ralf and Meinel, Christoph}, title = {MOOCs in Secondary Education}, series = {2019 IEEE Global Engineering Education Conference (EDUCON)}, journal = {2019 IEEE Global Engineering Education Conference (EDUCON)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-9506-7}, issn = {2165-9567}, doi = {10.1109/EDUCON.2019.8725138}, pages = {173 -- 182}, year = {2019}, abstract = {Computer science education in German schools is often less than optimal. It is only mandatory in a few of the federal states and there is a lack of qualified teachers. As a MOOC (Massive Open Online Course) provider with a German background, we developed the idea to implement a MOOC addressing pupils in secondary schools to fill this gap. The course targeted high school pupils and enabled them to learn the Python programming language. In 2014, we successfully conducted the first iteration of this MOOC with more than 7000 participants. However, the share of pupils in the course was not quite satisfactory. So we conducted several workshops with teachers to find out why they had not used the course to the extent that we had imagined. The paper at hand explores and discusses the steps we have taken in the following years as a result of these workshops.}, language = {en} } @misc{SianiparSukmanaMeinel2019, author = {Sianipar, Johannes Harungguan and Sukmana, Muhammad Ihsan Haikal and Meinel, Christoph}, title = {Moving sensitive data against live memory dumping, spectre and meltdown attacks}, series = {26th International Conference on Systems Engineering (ICSEng)}, journal = {26th International Conference on Systems Engineering (ICSEng)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-7834-3}, pages = {8}, year = {2019}, abstract = {The emergence of cloud computing allows users to easily host their Virtual Machines with no up-front investment and the guarantee of always available anytime anywhere. But with the Virtual Machine (VM) is hosted outside of user's premise, the user loses the physical control of the VM as it could be running on untrusted host machines in the cloud. Malicious host administrator could launch live memory dumping, Spectre, or Meltdown attacks in order to extract sensitive information from the VM's memory, e.g. passwords or cryptographic keys of applications running in the VM. In this paper, inspired by the moving target defense (MTD) scheme, we propose a novel approach to increase the security of application's sensitive data in the VM by continuously moving the sensitive data among several memory allocations (blocks) in Random Access Memory (RAM). A movement function is added into the application source code in order for the function to be running concurrently with the application's main function. Our approach could reduce the possibility of VM's sensitive data in the memory to be leaked into memory dump file by 2 5\% and secure the sensitive data from Spectre and Meltdown attacks. Our approach's overhead depends on the number and the size of the sensitive data.}, language = {en} } @misc{PerscheidUflacker2019, author = {Perscheid, Cindy and Uflacker, Matthias}, title = {Integrating Biological Context into the Analysis of Gene Expression Data}, series = {Distributed Computing and Artificial Intelligence, Special Sessions, 15th International Conference}, volume = {801}, journal = {Distributed Computing and Artificial Intelligence, Special Sessions, 15th International Conference}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-99608-0}, issn = {2194-5357}, doi = {10.1007/978-3-319-99608-0_41}, pages = {339 -- 343}, year = {2019}, abstract = {High-throughput RNA sequencing produces large gene expression datasets whose analysis leads to a better understanding of diseases like cancer. The nature of RNA-Seq data poses challenges to its analysis in terms of its high dimensionality, noise, and complexity of the underlying biological processes. Researchers apply traditional machine learning approaches, e. g. hierarchical clustering, to analyze this data. Until it comes to validation of the results, the analysis is based on the provided data only and completely misses the biological context. However, gene expression data follows particular patterns - the underlying biological processes. In our research, we aim to integrate the available biological knowledge earlier in the analysis process. We want to adapt state-of-the-art data mining algorithms to consider the biological context in their computations and deliver meaningful results for researchers.}, language = {en} } @misc{NakatenKempka2019, author = {Nakaten, Natalie Christine and Kempka, Thomas}, title = {Retraction: Techno-Economic Comparison of Onshore and Offshore Underground Coal Gasification End-Product Competitiveness. (Retraction of Vol 10, art no 1643, 2017)}, series = {Energies : open-access journal of related scientific research, technology development and studies in policy and management}, volume = {12}, journal = {Energies : open-access journal of related scientific research, technology development and studies in policy and management}, number = {17}, publisher = {MDPI}, address = {Basel}, issn = {1996-1073}, doi = {10.3390/en12173253}, pages = {1}, year = {2019}, language = {en} } @misc{deVeraAlawiBackhausetal.2019, author = {de Vera, Jean-Pierre Paul and Alawi, Mashal and Backhaus, Theresa and Baque, Mickael and Billi, Daniela and Boettger, Ute and Berger, Thomas and Bohmeier, Maria and Cockell, Charles and Demets, Rene and de la Torre Noetzel, Rosa and Edwards, Howell and Elsaesser, Andreas and Fagliarone, Claudia and Fiedler, Annelie and Foing, Bernard and Foucher, Frederic and Fritz, J{\"o}rg and Hanke, Franziska and Herzog, Thomas and Horneck, Gerda and H{\"u}bers, Heinz-Wilhelm and Huwe, Bj{\"o}rn and Joshi, Jasmin Radha and Kozyrovska, Natalia and Kruchten, Martha and Lasch, Peter and Lee, Natuschka and Leuko, Stefan and Leya, Thomas and Lorek, Andreas and Martinez-Frias, Jesus and Meessen, Joachim and Moritz, Sophie and Moeller, Ralf and Olsson-Francis, Karen and Onofri, Silvano and Ott, Sieglinde and Pacelli, Claudia and Podolich, Olga and Rabbow, Elke and Reitz, G{\"u}nther and Rettberg, Petra and Reva, Oleg and Rothschild, Lynn and Garcia Sancho, Leo and Schulze-Makuch, Dirk and Selbmann, Laura and Serrano, Paloma and Szewzyk, Ulrich and Verseux, Cyprien and Wadsworth, Jennifer and Wagner, Dirk and Westall, Frances and Wolter, David and Zucconi, Laura}, title = {Limits of life and the habitability of Mars}, series = {Astrobiology}, volume = {19}, journal = {Astrobiology}, number = {2}, publisher = {Liebert}, address = {New Rochelle}, issn = {1531-1074}, doi = {10.1089/ast.2018.1897}, pages = {145 -- 157}, year = {2019}, abstract = {BIOMEX (BIOlogy and Mars EXperiment) is an ESA/Roscosmos space exposure experiment housed within the exposure facility EXPOSE-R2 outside the Zvezda module on the International Space Station (ISS). The design of the multiuser facility supports-among others-the BIOMEX investigations into the stability and level of degradation of space-exposed biosignatures such as pigments, secondary metabolites, and cell surfaces in contact with a terrestrial and Mars analog mineral environment. In parallel, analysis on the viability of the investigated organisms has provided relevant data for evaluation of the habitability of Mars, for the limits of life, and for the likelihood of an interplanetary transfer of life (theory of lithopanspermia). In this project, lichens, archaea, bacteria, cyanobacteria, snow/permafrost algae, meristematic black fungi, and bryophytes from alpine and polar habitats were embedded, grown, and cultured on a mixture of martian and lunar regolith analogs or other terrestrial minerals. The organisms and regolith analogs and terrestrial mineral mixtures were then exposed to space and to simulated Mars-like conditions by way of the EXPOSE-R2 facility. In this special issue, we present the first set of data obtained in reference to our investigation into the habitability of Mars and limits of life. This project was initiated and implemented by the BIOMEX group, an international and interdisciplinary consortium of 30 institutes in 12 countries on 3 continents. Preflight tests for sample selection, results from ground-based simulation experiments, and the space experiments themselves are presented and include a complete overview of the scientific processes required for this space experiment and postflight analysis. The presented BIOMEX concept could be scaled up to future exposure experiments on the Moon and will serve as a pretest in low Earth orbit.}, language = {en} } @misc{WellenbergWeidesBornhorstetal.2019, author = {Wellenberg, Anna and Weides, L. and Bornhorst, Julia and Crone, Barbara and Karst, U. and Fritz, G. and Honnen, S.}, title = {Molecular and electrophysiological analysis of platinum-induced neurotoxicity using the model organism C. elegans}, series = {Naunyn-Schmiedeberg's archives of pharmacology}, volume = {392}, journal = {Naunyn-Schmiedeberg's archives of pharmacology}, publisher = {Springer}, address = {New York}, issn = {0028-1298}, doi = {10.1007/s00210-019-01621-6}, pages = {S63 -- S63}, year = {2019}, language = {en} } @misc{BragadeCarvalhoBrosinskyetal.2019, author = {Braga, Brennda and de Carvalho, Thayslan and Brosinsky, Arlena and F{\"o}rster, Saskia and Medeiros, Pedro Henrique Augusto}, title = {Corrigendum to: From waste to resource: cost-benefit analysis of reservoir sediment reuse for soil fertilization in a semiarid catchment (The science of the total environment : an international journal for scientific research into the environment and its relationship with man. - 670 (2019), 20, S. 158 - 169)}, series = {The science of the total environment : an international journal for scientific research into the environment and its relationship with man}, volume = {696}, journal = {The science of the total environment : an international journal for scientific research into the environment and its relationship with man}, publisher = {Elsevier}, address = {Amsterdam}, issn = {0048-9697}, doi = {10.1016/j.scitotenv.2019.133844}, pages = {1}, year = {2019}, language = {en} } @misc{BohdanNiemiecKobzaretal.2019, author = {Bohdan, Artem and Niemiec, Jacek and Kobzar, Oleh and Pohl, Martin}, title = {Erratum: Electron Pre-acceleration at Nonrelativistic High-Mach-number Perpendicular Shocks (The astrophysical journal : an international review of spectroscopy and astronomical physics. - Vol 847, 2017, 71)}, series = {The astrophysical journal : an international review of spectroscopy and astronomical physics}, volume = {880}, journal = {The astrophysical journal : an international review of spectroscopy and astronomical physics}, number = {1}, publisher = {IOP Publ. Ltd.}, address = {Bristol}, issn = {0004-637X}, doi = {10.3847/1538-4357/ab2f89}, pages = {1}, year = {2019}, language = {en} } @misc{DekaPohlVafinetal.2019, author = {Deka, Pranab Jyoti and Pohl, Martin and Vafin, Sergei and Bohdan, Artem}, title = {Erratum: Revisit of Nonlinear Landau Damping for Electrostatic Instability Driven by Blazar-induced Pair Beams (The astrophysical journal. - 873 (2019), pg 10)}, series = {The astrophysical journal : an international review of spectroscopy and astronomical physics}, volume = {883}, journal = {The astrophysical journal : an international review of spectroscopy and astronomical physics}, number = {2}, publisher = {IOP Publ. Ltd.}, address = {Bristol}, issn = {0004-637X}, doi = {10.3847/1538-4357/ab4593}, pages = {2}, year = {2019}, language = {en} } @misc{OPUS4-48290, title = {Hydrology Day 2020: March 31 to April 1, 2020 in Potsdam : "Hydrology: Linking the Environmental Phases and -Disciplines"}, series = {Hydrologie und Wasserbewirtschaftung}, volume = {63}, journal = {Hydrologie und Wasserbewirtschaftung}, number = {6}, publisher = {Bundesanstalt f{\"u}r Gew{\"a}sserkunde}, address = {Koblenz}, issn = {1439-1783}, pages = {356 -- 356}, year = {2019}, language = {de} } @misc{LopezTarazonBronstertThiekenetal.2019, author = {Lopez Tarazon, Jos{\´e} Andr{\´e}s and Bronstert, Axel and Thieken, Annegret and Petrow, Theresia}, title = {The effects of global change on floods, fluvial geomorphology and related hazards in mountainous rivers}, series = {The science of the total environment : an international journal for scientific research into the environment and its relationship with man}, volume = {669}, journal = {The science of the total environment : an international journal for scientific research into the environment and its relationship with man}, publisher = {Elsevier}, address = {Amsterdam}, issn = {0048-9697}, doi = {10.1016/j.scitotenv.2019.03.026}, pages = {7 -- 10}, year = {2019}, language = {en} } @misc{PetrukKuzyoOrlandoetal.2019, author = {Petruk, Oleh and Kuzyo, T. and Orlando, S. and Pohl, Martin and Miceli, M. and Bocchino, F. and Beshley, V. and Brose, Robert}, title = {Erratum: Post-adiabatic supernova remnants in an interstellar magnetic field: oblique shocks and non-uniform environment. - (Monthly notices of the Royal Astronomical Society. - 479, (2018), pg. 4253 - 4270)}, series = {Monthly notices of the Royal Astronomical Society}, volume = {482}, journal = {Monthly notices of the Royal Astronomical Society}, number = {2}, publisher = {Oxford Univ. Press}, address = {Oxford}, issn = {0035-8711}, doi = {10.1093/mnras/sty2861}, pages = {1979 -- 1980}, year = {2019}, abstract = {This is a correction notice for 'Post-adiabatic supernova remnants in an interstellar magnetic field: oblique shocks and non-uniform environment' (DOI: https://doi.org/10.1093/mnras/sty1750), which was published in MNRAS 479, 4253-4270 (2018). The publisher regrets to inform that the colour was missing from the colour scales in Figs 8(a)-(d) and Figs 9(a) and (b). This has now been corrected online. The publisher apologizes for this error.}, language = {en} } @misc{Wagner2019, author = {Wagner, Dieter}, title = {Editorial}, series = {Journal of East European management studies : JEEMS}, volume = {24}, journal = {Journal of East European management studies : JEEMS}, number = {1}, publisher = {Nomos}, address = {Baden-Baden}, issn = {0949-6181}, doi = {10.5771/0949-6181-2019-1-3}, pages = {3 -- 3}, year = {2019}, language = {en} } @misc{AndjelkovicBabicLietal.2019, author = {Andjelkovic, Marko and Babic, Milan and Li, Yuanqing and Schrape, Oliver and Krstić, Miloš and Kraemer, Rolf}, title = {Use of decoupling cells for mitigation of SET effects in CMOS combinational gates}, series = {2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS)}, journal = {2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-9562-3}, doi = {10.1109/ICECS.2018.8617996}, pages = {361 -- 364}, year = {2019}, abstract = {This paper investigates the applicability of CMOS decoupling cells for mitigating the Single Event Transient (SET) effects in standard combinational gates. The concept is based on the insertion of two decoupling cells between the gate's output and the power/ground terminals. To verify the proposed hardening approach, extensive SPICE simulations have been performed with standard combinational cells designed in IHP's 130 nm bulk CMOS technology. Obtained simulation results have shown that the insertion of decoupling cells results in the increase of the gate's critical charge, thus reducing the gate's soft error rate (SER). Moreover, the decoupling cells facilitate the suppression of SET pulses propagating through the gate. It has been shown that the decoupling cells may be a competitive alternative to gate upsizing and gate duplication for hardening the gates with lower critical charge and multiple (3 or 4) inputs, as well as for filtering the short SET pulses induced by low-LET particles.}, language = {en} } @misc{NumbergerDreierVullioudetal.2019, author = {Numberger, Daniela and Dreier, Carola and Vullioud, Colin and Gabriel, Guelsah and Greenwood, Alex D. and Grossart, Hans-Peter}, title = {Correction: Recovery of influenza A viruses from lake water and sediments by experimental inoculation (vol 14, e0216880, 2019)}, series = {PLoS one}, volume = {14}, journal = {PLoS one}, number = {6}, publisher = {PLoS}, address = {San Fransisco}, issn = {1932-6203}, doi = {10.1371/journal.pone.0218882}, pages = {1}, year = {2019}, language = {en} } @misc{CabalarFandinoSchaubetal.2019, author = {Cabalar, Pedro and Fandi{\~n}o, Jorge and Schaub, Torsten and Schellhorn, Sebastian}, title = {Lower Bound Founded Logic of Here-and-There}, series = {Logics in Artificial Intelligence}, volume = {11468}, journal = {Logics in Artificial Intelligence}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-19570-0}, issn = {0302-9743}, doi = {10.1007/978-3-030-19570-0_34}, pages = {509 -- 525}, year = {2019}, abstract = {A distinguishing feature of Answer Set Programming is that all atoms belonging to a stable model must be founded. That is, an atom must not only be true but provably true. This can be made precise by means of the constructive logic of Here-and-There, whose equilibrium models correspond to stable models. One way of looking at foundedness is to regard Boolean truth values as ordered by letting true be greater than false. Then, each Boolean variable takes the smallest truth value that can be proven for it. This idea was generalized by Aziz to ordered domains and applied to constraint satisfaction problems. As before, the idea is that a, say integer, variable gets only assigned to the smallest integer that can be justified. In this paper, we present a logical reconstruction of Aziz' idea in the setting of the logic of Here-and-There. More precisely, we start by defining the logic of Here-and-There with lower bound founded variables along with its equilibrium models and elaborate upon its formal properties. Finally, we compare our approach with related ones and sketch future work.}, language = {en} } @misc{BraunAldeiasArcheretal.2019, author = {Braun, David R. and Aldeias, Vera and Archer, Will and Arrowsmith, J. Ramon and Baraki, Niguss and Campisano, Christopher J. and Deino, Alan L. and DiMaggio, Erin N. and Dupont-Nivet, Guillaume and Engda, Blade and Feary, David A. and Garello, Dominique I. and Kerfelew, Zenash and McPherron, Shannon P. and Patterson, David B. and Reeves, Jonathan S. and Thompson, Jessica C. and Reed, Kaye E.}, title = {Reply to Sahle and Gossa: Technology and geochronology at the earliest known Oldowan site at Ledi-Geraru, Ethiopia}, series = {Proceedings of the National Academy of Sciences of the United States of America}, volume = {116}, journal = {Proceedings of the National Academy of Sciences of the United States of America}, number = {41}, publisher = {National Acad. of Sciences}, address = {Washington}, issn = {0027-8424}, doi = {10.1073/pnas.1911952116}, pages = {20261 -- 20262}, year = {2019}, language = {en} } @misc{KubatovaHamannKubatetal.2019, author = {Kubatova, Brankica and Hamann, Wolf-Rainer and Kubat, Jiri and Oskinova, Lidia M.}, title = {3D Monte Carlo Radiative Transfer in Inhomogeneous Massive Star Winds}, series = {Radiative signatures from the cosmos}, volume = {519}, journal = {Radiative signatures from the cosmos}, publisher = {Astronomical soc pacific}, address = {San Fransisco}, isbn = {978-1-58381-925-8}, issn = {1050-3390}, pages = {209 -- 212}, year = {2019}, abstract = {Already for decades it has been known that the winds of massive stars are inhomogeneous (i.e. clumped). To properly model observed spectra of massive star winds it is necessary to incorporate the 3-D nature of clumping into radiative transfer calculations. In this paper we present our full 3-D Monte Carlo radiative transfer code for inhomogeneous expanding stellar winds. We use a set of parameters to describe dense as well as the rarefied wind components. At the same time, we account for non-monotonic velocity fields. We show how the 3-D density and velocity wind inhomogeneities strongly affect the resonance line formation. We also show how wind clumping can solve the discrepancy between P v and H alpha mass-loss rate diagnostics.}, language = {en} } @misc{MuellerSchoellKloppSchulzeHuisingaetal.2019, author = {M{\"u}ller-Sch{\"o}ll, A. and Klopp-Schulze, Lena and Huisinga, Wilhelm and J{\"o}rger, M. and Neven, P. and Koolen, S. L. and Mathijssen, R. H. J. and Schmidt, S. and Kloft, Charlotte}, title = {Patient-tailored tamoxifen dosing based on an increased quantitative understanding of its complex pharmacokinetics: A novel integrative modelling approach}, series = {Annals of Oncology}, volume = {30}, journal = {Annals of Oncology}, publisher = {Oxford Univ. Press}, address = {Oxford}, issn = {0923-7534}, pages = {1}, year = {2019}, language = {en} } @misc{KrauseKloftHuisingaetal.2019, author = {Krause, Andreas and Kloft, Charlotte and Huisinga, Wilhelm and Karlsson, Mats and Pinheiro, Jos{\´e} and Bies, Robert and Rogers, James and Mentr{\´e}, France and Musser, Bret J.}, title = {Comment on Jaki et al., A proposal for a new PhD level curriculum on quantitative methods for drug development}, series = {Pharmaceutical statistics : the journal of applied statistics in the pharmaceutical industry}, volume = {18}, journal = {Pharmaceutical statistics : the journal of applied statistics in the pharmaceutical industry}, number = {3}, publisher = {Wiley}, address = {Hoboken}, organization = {ASA Special Interest Grp Stat Phar ASA Special Interest Grp Stat Phar}, issn = {1539-1604}, pages = {278 -- 281}, year = {2019}, language = {en} } @misc{BresselHerzogReich2019, author = {Bressel, Lena and Herzog, Bernd and Reich, Oliver}, title = {Monte-Carlo simulations of light transport in dense materials}, series = {Diffuse Optical Spectroscopy and Imaging}, volume = {11074}, journal = {Diffuse Optical Spectroscopy and Imaging}, publisher = {SPIE}, address = {Bellingham}, isbn = {978-1-5106-2841-0}, issn = {0277-786X}, doi = {10.1117/12.2527076}, pages = {3}, year = {2019}, abstract = {Monte-Carlo calculations are carried out to simulate the light transport in dense materials. Focus lies on the calculation of diffuse light transmission through films of scattering and absorbing media considering additionally the effect of dependent scattering. Different influences like interaction type between particles, particle size, composition etc. can be studied by this program. Simulations in this study show major influences on the diffuse transmission. Further simulations are carried out to model a sunscreen film and study best compositions of this film and will be presented.}, language = {en} } @misc{KleinpeterShainyan2019, author = {Kleinpeter, Erich and Shainyan, Bagrat A.}, title = {Very low-temperature dynamic Si-29 NMR study of the conformational equilibrium of (1,1-phenyl-1,1-silacyclohex-1-yl)disiloxane}, series = {Magnetic resonance in chemistry}, volume = {57}, journal = {Magnetic resonance in chemistry}, number = {6}, publisher = {Wiley}, address = {Hoboken}, issn = {0749-1581}, doi = {10.1002/mrc.4870}, pages = {317 -- 319}, year = {2019}, language = {en} } @misc{PerezChaparroMayerBeckendorf2019, author = {P{\´e}rez Chaparro, Camilo Germ{\´a}n Alberto and Mayer, Frank and Beckendorf, Claudia}, title = {Cardiovascular drift response over two different constant-load exercises in healthy non-athletes}, series = {Medicine and science in sports and exercise : official journal of the American College of Sports Medicine}, volume = {51}, journal = {Medicine and science in sports and exercise : official journal of the American College of Sports Medicine}, number = {6}, publisher = {Lippincott Williams \& Wilkins}, address = {Philadelphia}, issn = {0195-9131}, doi = {10.1249/01.mss.0000561495.15163.50}, pages = {329 -- 329}, year = {2019}, abstract = {Cardiovascular drift (CV-d) is a steady increase in heart rate (HR) over time while performing constant load moderate intensity exercise (CME) > 20 min. CV-d presents problems for the prescription of exercise intensity by means of HR, because the work rate (WR) during exercise must be adjusted to maintain target HR, thus disturbing the intended effect of the exercise intervention. It has been shown that the increase in HR during CME is due to changes in WR and not to CV-d.}, language = {en} } @misc{ThomasSabbahRappetal.2019, author = {Thomas, Christine and Sabbah, Patricia and Rapp, Michael A. and Eschweiler, Gerhard}, title = {The Perioperative Care of Older Patients}, series = {Deutsches {\"A}rzteblatt international : a weekly online journal of clinical medicine and public health}, volume = {116}, journal = {Deutsches {\"A}rzteblatt international : a weekly online journal of clinical medicine and public health}, number = {21}, publisher = {Dt. {\"A}rzte-Verl.}, address = {Cologne}, issn = {1866-0452}, doi = {10.3238/arztebl.2019.0373a}, pages = {373 -- 373}, year = {2019}, language = {en} } @misc{AwasthiKaminskiRappetal.2019, author = {Awasthi, Swapnil and Kaminski, Jakob and Rapp, Michael A. and Schlagenhauf, Florian and Walter, Henrik and Ruggeri, Barbara and Ripke, Stephan and Schumann, Gunter and Heinz, Andreas}, title = {A neural signature of malleability}, series = {European neuropsychopharmacology : the journal of the European College of Neuropsychopharmacology}, volume = {29}, journal = {European neuropsychopharmacology : the journal of the European College of Neuropsychopharmacology}, publisher = {Elsevier}, address = {Amsterdam}, issn = {0924-977X}, doi = {10.1016/j.euroneuro.2017.08.139}, pages = {S858 -- S859}, year = {2019}, abstract = {General intelligence has a substantial genetic background in children, adolescents, and adults, but environmental factors also strongly correlate with cognitive performance as evidenced by a strong (up to one SD) increase in average intelligence test results in the second half of the previous century. This change occurred in a period apparently too short to accommodate radical genetic changes. It is highly suggestive that environmental factors interact with genotype by possible modification of epigenetic factors that regulate gene expression and thus contribute to individual malleability. This modification might as well be reflected in recent observations of an association between dopamine-dependent encoding of reward prediction errors and cognitive capacity, which was modulated by adverse life events.}, language = {en} } @misc{Richly2019, author = {Richly, Keven}, title = {Leveraging spatio-temporal soccer data to define a graphical query language for game recordings}, series = {IEEE International Conference on Big Data (Big Data)}, journal = {IEEE International Conference on Big Data (Big Data)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-5035-6}, issn = {2639-1589}, doi = {10.1109/BigData.2018.8622159}, pages = {3456 -- 3463}, year = {2019}, abstract = {For professional soccer clubs, performance and video analysis are an integral part of the preparation and post-processing of games. Coaches, scouts, and video analysts extract information about strengths and weaknesses of their team as well as opponents by manually analyzing video recordings of past games. Since video recordings are an unstructured data source, it is a complex and time-intensive task to find specific game situations and identify similar patterns. In this paper, we present a novel approach to detect patterns and situations (e.g., playmaking and ball passing of midfielders) based on trajectory data. The application uses the metaphor of a tactic board to offer a graphical query language. With this interactive tactic board, the user can model a game situation or mark a specific situation in the video recording for which all matching occurrences in various games are immediately displayed, and the user can directly jump to the corresponding game scene. Through the additional visualization of key performance indicators (e.g.,the physical load of the players), the user can get a better overall assessment of situations. With the capabilities to find specific game situations and complex patterns in video recordings, the interactive tactic board serves as a useful tool to improve the video analysis process of professional sports teams.}, language = {en} } @misc{Richly2019, author = {Richly, Keven}, title = {A survey on trajectory data management for hybrid transactional and analytical workloads}, series = {IEEE International Conference on Big Data (Big Data)}, journal = {IEEE International Conference on Big Data (Big Data)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-5035-6}, issn = {2639-1589}, doi = {10.1109/BigData.2018.8622394}, pages = {562 -- 569}, year = {2019}, abstract = {Rapid advances in location-acquisition technologies have led to large amounts of trajectory data. This data is the foundation for a broad spectrum of services driven and improved by trajectory data mining. However, for hybrid transactional and analytical workloads, the storing and processing of rapidly accumulated trajectory data is a non-trivial task. In this paper, we present a detailed survey about state-of-the-art trajectory data management systems. To determine the relevant aspects and requirements for such systems, we developed a trajectory data mining framework, which summarizes the different steps in the trajectory data mining process. Based on the derived requirements, we analyze different concepts to store, compress, index, and process spatio-temporal data. There are various trajectory management systems, which are optimized for scalability, data footprint reduction, elasticity, or query performance. To get a comprehensive overview, we describe and compare different exciting systems. Additionally, the observed similarities in the general structure of different systems are consolidated in a general blueprint of trajectory management systems.}, language = {en} } @misc{WippertBlockMansuyetal.2019, author = {Wippert, Pia-Maria and Block, Andrea and Mansuy, Isabelle M. and Peters, Eva M. J. and Rose, Matthias and Rapp, Michael A. and Huppertz, Alexander and W{\"u}rtz-Kozak, Karin}, title = {Alterations in Bone Homeostasis and Microstructure Related to Depression and Allostatic Load}, series = {Psychotherapy and Psychosomatics}, volume = {88}, journal = {Psychotherapy and Psychosomatics}, number = {6}, publisher = {Karger}, address = {Basel}, issn = {0033-3190}, doi = {10.1159/000503640}, pages = {383 -- 385}, year = {2019}, language = {en} } @misc{HugenschmidtGiannopoulosTronicke2019, author = {Hugenschmidt, Johannes and Giannopoulos, Antonios and Tronicke, Jens}, title = {Foreword}, series = {Near surface geophysics}, volume = {17}, journal = {Near surface geophysics}, number = {3}, publisher = {Wiley}, address = {Oxford}, issn = {1569-4445}, doi = {10.1002/nsg.12050}, pages = {199 -- 200}, year = {2019}, language = {en} } @misc{LozadaGobilard2019, author = {Lozada Gobilard, Sissi Donna}, title = {K{\"o}nnen auch Pflanzen zwischen den S{\"o}llen "wandern"}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {30 -- 31}, year = {2019}, language = {de} } @misc{LitwinColangeli2019, author = {Litwin, Magdalena and Colangeli, Pierluigi}, title = {Wie und wohin reisen Wasserfl{\"o}he?}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {28 -- 29}, year = {2019}, language = {de} } @misc{Raatz2019, author = {Raatz, Larissa}, title = {Wirtschaften in einer reich strukturierten Landschaft - geht das ?}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {32 -- 33}, year = {2019}, language = {de} } @misc{Wiebke2019, author = {Wiebke, Ullmann}, title = {Warum hat Bayern mehr Feldhasen als Brandenburg?}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {46 -- 47}, year = {2019}, language = {de} } @misc{Kowalski2019, author = {Kowalski, Gabriele Joanna}, title = {Auf dem Sprung}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {41 -- 42}, year = {2019}, language = {de} } @misc{Teckentrup2019, author = {Teckentrup, Lisa}, title = {Gefahr an jeder Ecke}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {54 -- 55}, year = {2019}, language = {de} } @misc{Maass2019, author = {Maaß, Stefanie}, title = {Blick in die Zukunft}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {24 -- 25}, year = {2019}, language = {de} } @misc{OPUS4-62367, title = {Vielfalt in der Uckermark}, editor = {Berlin-Brandenburgisches Institut f{\"u}r Biodiverst{\"a}tsforschung,}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {62}, year = {2019}, language = {de} } @misc{Schaefer2019, author = {Sch{\"a}fer, Merlin}, title = {Mut macht einsam}, series = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, journal = {Vielfalt in der Uckermark : Forschungsprojekte 2015 - 2018}, publisher = {oerding print GmbH}, address = {Braunschweig}, pages = {52 -- 53}, year = {2019}, language = {de} }