@article{Bordihn2004, author = {Bordihn, Henning}, title = {Context-freeness of the power of context-free languages is undecidable}, issn = {0304-3975}, year = {2004}, abstract = {The power of a language L is the set of all powers of the words in L. In this paper, the following decision problem is investigated. Given a context-free language L, is the power of L context-free? We show that this problem is decidable for languages over unary alphabets, but it is undecidable whenever languages over alphabets with at least two letters are considered. (C) 2003 Elsevier B.V. All rights reserved}, language = {en} } @article{BorchertAngerSchaubetal.2004, author = {Borchert, P. and Anger, Christian and Schaub, Torsten and Truszczynski, M.}, title = {Towards systematic benchmarking in answer set programming : the dagstuhl initiative}, isbn = {3-540- 20721-x}, year = {2004}, language = {en} } @article{BogueJuergensenGoessel1994, author = {Bogue, Ted and J{\"u}rgensen, Helmut and G{\"o}ssel, Michael}, title = {Design of cover circuits for monitoring the output of a MISR}, isbn = {0-8186-6307-3 , 0-8186-6306-5}, year = {1994}, language = {en} } @article{BogueJuergensenGoessel1995, author = {Bogue, Ted and J{\"u}rgensen, Helmut and G{\"o}ssel, Michael}, title = {BIST with negligible aliasing through random cover circuits}, year = {1995}, language = {en} } @article{BogueGoesselJuergensenetal.1998, author = {Bogue, Ted and G{\"o}ssel, Michael and J{\"u}rgensen, Helmut and Zorian, Yervant}, title = {Built-in self-Test with an alternating output}, isbn = {0-8186-8359-7}, year = {1998}, language = {en} } @article{BoeselLinkeSchaub2004, author = {Boesel, Andreas and Linke, Thomas and Schaub, Torsten}, title = {Profiling answer set programming : the visualization component of the noMoRe System}, isbn = {3-540-23242-7}, year = {2004}, language = {en} } @article{BoernerBulatovChenetal.2009, author = {Boerner, Ferdinand and Bulatov, Andrei and Chen, Hubie and Jeavons, Peter and Krokhin, Andrei}, title = {The complexity of constraint satisfaction games and QCSP}, issn = {0890-5401}, doi = {10.1016/J.Ic.2009.05.003}, year = {2009}, abstract = {We study the complexity of two-person constraint satisfaction games. An instance of such a game is given by a collection of constraints on overlapping sets of variables, and the two players alternately make moves assigning values from a finite domain to the variables, in a specified order. The first player tries to satisfy all constraints, while the other tries to break at least one constraint: the goal is to decide whether the first player has a winning strategy. We show that such games can be conveniently represented by a logical form of quantified constraint satisfaction, where an instance is given by a first-order sentence in which quantifiers alternate and the quantifier-free part is a conjunction of (positive) atomic formulas; the goal is to decide whether the sentence is true. While the problem of deciding such a game is PSPACE-complete in general, by restricting the set of allowed constraint predicates, one can obtain infinite classes of constraint satisfaction games of lower complexity. We use the quantified constraint satisfaction framework to study how the complexity of deciding such a game depends on the parameter set of allowed predicates. With every predicate. one can associate certain predicate-preserving operations, called polymorphisms. We show that the complexity of our games is determined by the surjective polymorphisms of the constraint predicates. We illustrate how this result can be used by identifying the complexity of a wide variety of constraint satisfaction games.}, language = {en} } @article{Bobda2009, author = {Bobda, Christophe}, title = {Special issue on ReCoSoC 2007 : editorial}, issn = {0141-9331}, doi = {10.1016/j.micpro.2009.01.001}, year = {2009}, language = {en} } @article{BlumBoldeaMagedanzetal.2010, author = {Blum, Niklas and Boldea, Irina and Magedanz, Thomas and Margaria, Tiziana}, title = {Service-oriented access to next generation networks : from service creation to execution}, issn = {1383-469X}, doi = {10.1007/s11036-010-0222-1}, year = {2010}, abstract = {Existing telecommunication networks and classical roles of operators are subject to fundamental change. Many network operators are currently seeking for new sources to generate revenue by exposing network capabilities to 3rd party service providers. At the same time we can observe that services on the World Wide Web (WWW) are becoming mature in terms of the definition of APIs that are offered towards other services. The combinations of those services are commonly referred to as Web 2.0 mash-ups. Rapid service design and creation becomes therefore important to meet the requirements in a changing technology and competitive market environment. This report describes our approach to include Next Generation Networks (NGN)-based telecommunications application enabler into complex services by defining a service broker that mediates between 3rd party applications and NGN service enablers. It provides policy-driven orchestration mechanisms for service enablers, a service authorization functionality, and a service discovery interface for Service Creation Environments. The work has been implemented as part of the Open SOA Telco Playground testbed at Fraunhofer FOKUS.}, language = {en} } @article{BlankertzMuellerKrusienskietal.2006, author = {Blankertz, Benjamin and M{\"u}ller, Klaus-Robert and Krusienski, Dean and Schalk, Gerwin and Wolpaw, Jonathan R. and Schl{\"o}gl, Alois and Pfurtscheller, Gert and Millan, Jos{\´e} del R. and Schr{\"o}der, Michael and Birbaumer, Niels}, title = {The BCI competition III : validating alternative approaches to actual BCI problems}, issn = {1534-4320}, doi = {10.1109/Tnsre.2006.875642}, year = {2006}, abstract = {A brain-computer interface (BCI) is a system that allows its users to control external devices with brain activity. Although the proof-of-concept was given decades ago, the reliable translation of user intent into device control commands is still a major challenge. Success requires the effective interaction of two adaptive controllers: the user's brain, which produces brain activity that encodes intent, and the BCI system, which translates that activity into device control commands. In order to facilitate this interaction, many laboratories are exploring a variety of signal analysis techniques to improve the adaptation of the BCI system to the user. In the literature, many machine learning and pattern classification algorithms have been reported to give impressive results when applied to BCI data in offline analyses. However, it is more difficult to evaluate their relative value for actual online use. BCI data competitions have been organized to provide objective formal evaluations of alternative methods. Prompted by the great interest in the first two BCI Competitions, we organized the third BCI Competition to address several of the most difficult and important analysis problems in BCI research. The paper describes the data sets that were provided to the competitors and gives an overview of the results.}, language = {en} } @article{BlankertzMuellerCurioetal.2004, author = {Blankertz, Benjamin and M{\"u}ller, Klaus-Robert and Curio, Gabriel and Vaughan, Theresa M. and Schalk, Gerwin and Wolpaw, Jonathan R. and Schlogl, Alois and Neuper, Christa and Pfurtscheller, Gert and Hinterberger, Thilo and Schroder, Michael and Birbaumer, Niels}, title = {The BCI competition 2003 : Progress and perspectives in detection and discrimination of EEG single trials}, issn = {0018-9294}, year = {2004}, abstract = {Interest in developing a new method of man-to-machine communication-a brain-computer interface (BCI)-has grown steadily over the past few decades. BCIs create a new communication channel between the brain and an output device by bypassing conventional motor output pathways of nerves and muscles. These systems use signals recorded from the scalp, the surface of the cortex, or from inside the brain to enable users to control a variety of applications including simple word-processing software and orthotics. BCI technology could therefore provide a new communication and control option for individuals who cannot otherwise express their wishes to the outside world. Signal processing and classification methods are essential tools in the development of improved BCI technology. We organized the BCI Competition 2003 to evaluate the current state of the art of these tools. Four laboratories well versed in EEG-based BCI research provided six data sets in a documented format. We made these data sets (i.e., labeled training sets and unlabeled test sets) and their descriptions available on the Internet. The goal in the competition was to maximize the performance measure for the test labels. Researchers worldwide tested their algorithms and competed for the best classification results. This paper describes the six data sets and the results and function of the most successful algorithms}, language = {en} } @article{BlankertzDornhegeKrauledatetal.2006, author = {Blankertz, Benjamin and Dornhege, Guido and Krauledat, Matthias and M{\"u}ller, Klaus-Robert and Kunzmann, Volker and Losch, Florian and Curio, Gabriel}, title = {The Berlin brain-computer interface : EEG-based communication without subject training}, issn = {1534-4320}, doi = {10.1109/Tnsre.2006.875557}, year = {2006}, abstract = {The Berlin Brain-Computer Interface (BBCI) project develops a noninvasive BCI system whose key features are 1) the use of well-established motor competences as control paradigms, 2) high-dimensional features from 128-channel electroencephalogram (EEG), and 3) advanced machine learning techniques. As reported earlier, our experiments demonstrate that very high information transfer rates can be achieved using the readiness potential (RP) when predicting the laterality of upcoming left-versus right-hand movements in healthy subjects. A more recent study showed that the RP similarily accompanies phantom movements in arm amputees, but the signal strength decreases with longer loss of the limb. In a complementary approach, oscillatory features are used to discriminate imagined movements (left hand versus right hand versus foot). In a recent feedback study with six healthy subjects with no or very little experience with BCI control, three subjects achieved an information transfer rate above 35 bits per minute (bpm), and further two subjects above 24 and 15 bpm, while one subject could not achieve any BCI control. These results are encouraging for an EEG-based BCI system in untrained subjects that is independent of peripheral nervous system activity and does not rely on evoked potentials even when compared to results with very well-trained subjects operating other BCI systems}, language = {en} } @article{Blaese2014, author = {Blaese, Leif}, title = {Data mining for unidentified protein squences}, series = {Process design for natural scientists: an agile model-driven approach}, journal = {Process design for natural scientists: an agile model-driven approach}, number = {500}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-662-45005-5}, issn = {1865-0929}, pages = {73 -- 87}, year = {2014}, abstract = {Through the use of next generation sequencing (NGS) technology, a lot of newly sequenced organisms are now available. Annotating those genes is one of the most challenging tasks in sequence biology. Here, we present an automated workflow to find homologue proteins, annotate sequences according to function and create a three-dimensional model.}, language = {en} } @article{BickelBruecknerScheffer2009, author = {Bickel, Steffen and Br{\"u}ckner, Michael and Scheffer, Tobias}, title = {Discriminative learning under covariate shift}, issn = {1532-4435}, year = {2009}, abstract = {We address classification problems for which the training instances are governed by an input distribution that is allowed to differ arbitrarily from the test distribution-problems also referred to as classification under covariate shift. We derive a solution that is purely discriminative: neither training nor test distribution are modeled explicitly. The problem of learning under covariate shift can be written as an integrated optimization problem. Instantiating the general optimization problem leads to a kernel logistic regression and an exponential model classifier for covariate shift. The optimization problem is convex under certain conditions; our findings also clarify the relationship to the known kernel mean matching procedure. We report on experiments on problems of spam filtering, text classification, and landmine detection.}, language = {en} } @article{BickelBruecknerScheffer2009, author = {Bickel, Steffen and Brueckner, Michael and Scheffer, Tobias}, title = {Discriminative learning under covariate shift}, issn = {1532-4435}, year = {2009}, abstract = {We address classification problems for which the training instances are governed by an input distribution that is allowed to differ arbitrarily from the test distribution-problems also referred to as classification under covariate shift. We derive a solution that is purely discriminative: neither training nor test distribution are modeled explicitly. The problem of learning under covariate shift can be written as an integrated optimization problem. Instantiating the general optimization problem leads to a kernel logistic regression and an exponential model classifier for covariate shift. The optimization problem is convex under certain conditions; our findings also clarify the relationship to the known kernel mean matching procedure. We report on experiments on problems of spam filtering, text classification, and landmine detection.}, language = {en} } @article{BibelBrueningOttenetal.1998, author = {Bibel, Wolfgang and Br{\"u}ning, Stefan and Otten, Jens and Rath, Thomas and Schaub, Torsten}, title = {Compressions and extensions}, year = {1998}, language = {en} } @article{BhattacharyaDimitrievGoessel2000, author = {Bhattacharya, M. K. and Dimitriev, Alexej and G{\"o}ssel, Michael}, title = {Zero-aliasing space compresion using a single periodic output and its application to testing of embedded}, year = {2000}, language = {en} } @article{BesnardSchaubTompitsetal.2003, author = {Besnard, Philippe and Schaub, Torsten and Tompits, Hans and Woltran, Stefan}, title = {Paraconsistent reasoning via quantified boolean formulas : Part II: Circumscribing inconsistent theories}, isbn = {3-540- 409494-5}, year = {2003}, language = {en} } @article{BesnardSchaubTompitsetal.2002, author = {Besnard, Philippe and Schaub, Torsten and Tompits, Hans and Woltran, Stefan}, title = {Paraconsistent reasoning via quantified boolean formulas}, isbn = {3-540-44190-5}, year = {2002}, language = {en} } @article{BesnardSchaub1995, author = {Besnard, Philippe and Schaub, Torsten}, title = {An approach to context-based default reasoning}, issn = {0169-2968}, year = {1995}, language = {en} } @article{BesnardSchaub1998, author = {Besnard, Philippe and Schaub, Torsten}, title = {Characterization of non-monotone non-constructive systems}, issn = {1012-2443}, year = {1998}, language = {en} } @article{BesnardSchaub1998, author = {Besnard, Philippe and Schaub, Torsten}, title = {Signed systems for paraconsistent reasoning}, issn = {0168-7433}, year = {1998}, language = {en} } @article{BesnardSchaub1998, author = {Besnard, Philippe and Schaub, Torsten}, title = {Signed systems for paraconsistent reasoning}, year = {1998}, language = {en} } @article{BesnardSchaub1993, author = {Besnard, Philippe and Schaub, Torsten}, title = {A context-based framework for default logics}, isbn = {0-262-51071-5}, year = {1993}, language = {en} } @article{BesnardSchaub2000, author = {Besnard, Philippe and Schaub, Torsten}, title = {Significant inferences}, isbn = {1-55860-690-4}, year = {2000}, language = {en} } @article{BesnardSchaub2000, author = {Besnard, Philippe and Schaub, Torsten}, title = {What is a (non-constructive) non-monotone logical system?}, issn = {0304-3975}, year = {2000}, language = {en} } @article{BesnardSchaub1997, author = {Besnard, Philippe and Schaub, Torsten}, title = {Circumscribing inconsistency}, isbn = {1-558-60480-4}, issn = {1045-0823}, year = {1997}, language = {en} } @article{BesnardSchaub1996, author = {Besnard, Philippe and Schaub, Torsten}, title = {A simple signed system for paraconsistent reasoning}, isbn = {3-540-61630-6}, year = {1996}, language = {en} } @article{BesnardMercerSchaub2002, author = {Besnard, Philippe and Mercer, Robert E. and Schaub, Torsten}, title = {Optimality Theory via Default Logic}, year = {2002}, language = {en} } @article{BesnardMercerSchaub2003, author = {Besnard, Philippe and Mercer, Robert E. and Schaub, Torsten}, title = {Optimality theory throught default logic}, isbn = {3-540-20059-2}, year = {2003}, language = {en} } @article{BesnardLang2000, author = {Besnard, Philippe and Lang, Jerome}, title = {Graded paraconsistency}, isbn = {0-86380-253-2}, year = {2000}, language = {en} } @article{BesnardHunter2001, author = {Besnard, Philippe and Hunter, Anthony}, title = {A logic-based theory of deductive arguments}, issn = {0004-3702}, year = {2001}, language = {en} } @article{BesnardHunter2000, author = {Besnard, Philippe and Hunter, Anthony}, title = {Towards a logic-based theory of argumentation}, isbn = {0-262-51112-6}, year = {2000}, language = {en} } @article{BesnardFanselowSchaub2002, author = {Besnard, Philippe and Fanselow, Gisbert and Schaub, Torsten}, title = {Optimality theory as a family of cumulative logics}, year = {2002}, language = {en} } @article{BenschBordihnHolzeretal.2009, author = {Bensch, Suna and Bordihn, Henning and Holzer, Markus and Kutrib, Martin}, title = {On input-revolving deterministic and nondeterministic finite automata}, issn = {0890-5401}, doi = {10.1016/J.Ic.2009.03.002}, year = {2009}, abstract = {We introduce and investigate input-revolving finite automata, which are (nondeterministic) finite state automata with the additional ability to shift the remaining part of the input. Three different modes of shifting are considered, namely revolving to the left, revolving to the right, and circular-interchanging. We investigate the computational capacities of these three types of automata and their deterministic variants, comparing any of the six classes of automata with each other and with further classes of well-known automata. In particular, it is shown that nondeterminism is better than determinism, that is, for all three modes of shifting there is a language accepted by the nondeterministic model but not accepted by any deterministic automaton of the same type. Concerning the closure properties most of the deterministic language families studied are not closed under standard operations. For example, we show that the family of languages accepted by deterministic right-revolving finite automata is an anti-AFL which is not closed under reversal and intersection.}, language = {en} } @article{BenhammadiNicolasSchaub1998, author = {Benhammadi, Farid and Nicolas, Pascal and Schaub, Torsten}, title = {Extension calculus and query answering in prioritized default logic}, isbn = {3-540- 64993-X}, year = {1998}, language = {en} } @article{BenhammadiNicolasSchaub1998, author = {Benhammadi, Farid and Nicolas, Pascal and Schaub, Torsten}, title = {Extension calculus and query answering in prioritized default logic}, isbn = {3-540-64993-X}, year = {1998}, language = {en} } @article{BenhammadiNicolasSchaub1999, author = {Benhammadi, Farid and Nicolas, Pascal and Schaub, Torsten}, title = {Query-answering in prioritized default logic}, isbn = {3-540-66131-X}, year = {1999}, language = {en} } @article{BenhammadiNicolasSchaub1999, author = {Benhammadi, Farid and Nicolas, Pascal and Schaub, Torsten}, title = {Query-answering in prioritized default logic}, isbn = {3-540-66131-X}, year = {1999}, language = {en} } @article{BeerenwinkelSingLengaueretal.2005, author = {Beerenwinkel, Niko and Sing, Tobias and Lengauer, Thomas and Rahnenfuhrer, Joerg and Roomp, Kirsten and Savenkov, Igor and Fischer, Roman and Hoffmann, Daniel and Selbig, Joachim and Korn, Klaus and Walter, Hauke and Berg, Thomas and Braun, Patrick and Faetkenheuer, Gerd and Oette, Mark and Rockstroh, Juergen and Kupfer, Bernd and Kaiser, Rolf and Daeumer, Martin}, title = {Computational methods for the design of effective therapies against drug resistant HIV strains}, year = {2005}, abstract = {The development of drug resistance is a major obstacle to successful treatment of HIV infection. The extraordinary replication dynamics of HIV facilitates its escape from selective pressure exerted by the human immune system and by combination drug therapy. We have developed several computational methods whose combined use can support the design of optimal antiretroviral therapies based on viral genomic data}, language = {en} } @article{BauerHerwigLienhardetal.2021, author = {Bauer, Chris and Herwig, Ralf and Lienhard, Matthias and Prasse, Paul and Scheffer, Tobias and Schuchhardt, Johannes}, title = {Large-scale literature mining to assess the relation between anti-cancer drugs and cancer types}, series = {Journal of translational medicine}, volume = {19}, journal = {Journal of translational medicine}, number = {1}, publisher = {BioMed Central}, address = {London}, issn = {1479-5876}, doi = {10.1186/s12967-021-02941-z}, pages = {13}, year = {2021}, abstract = {Background: There is a huge body of scientific literature describing the relation between tumor types and anti-cancer drugs. The vast amount of scientific literature makes it impossible for researchers and physicians to extract all relevant information manually. Methods: In order to cope with the large amount of literature we applied an automated text mining approach to assess the relations between 30 most frequent cancer types and 270 anti-cancer drugs. We applied two different approaches, a classical text mining based on named entity recognition and an AI-based approach employing word embeddings. The consistency of literature mining results was validated with 3 independent methods: first, using data from FDA approvals, second, using experimentally measured IC-50 cell line data and third, using clinical patient survival data. Results: We demonstrated that the automated text mining was able to successfully assess the relation between cancer types and anti-cancer drugs. All validation methods showed a good correspondence between the results from literature mining and independent confirmatory approaches. The relation between most frequent cancer types and drugs employed for their treatment were visualized in a large heatmap. All results are accessible in an interactive web-based knowledge base using the following link: . Conclusions: Our approach is able to assess the relations between compounds and cancer types in an automated manner. Both, cancer types and compounds could be grouped into different clusters. Researchers can use the interactive knowledge base to inspect the presented results and follow their own research questions, for example the identification of novel indication areas for known drugs.}, language = {en} } @article{BarnesKennewell2015, author = {Barnes, Jan and Kennewell, Steve}, title = {Teacher Perceptions of Key Competencies in ICT}, series = {KEYCIT 2014 - Key Competencies in Informatics and ICT}, journal = {KEYCIT 2014 - Key Competencies in Informatics and ICT}, number = {7}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, issn = {1868-0844}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-82604}, pages = {61 -- 75}, year = {2015}, abstract = {Regardless of what is intended by government curriculum specifications and advised by educational experts, the competencies taught and learned in and out of classrooms can vary considerably. In this paper, we discuss in particular how we can investigate the perceptions that individual teachers have of competencies in ICT, and how these and other factors may influence students' learning. We report case study research which identifies contradictions within the teaching of ICT competencies as an activity system, highlighting issues concerning the object of the curriculum, the roles of the participants and the school cultures. In a particular case, contradictions in the learning objectives between higher order skills and the use of application tools have been resolved by a change in the teacher's perceptions which have not led to changes in other aspects of the activity system. We look forward to further investigation of the effects of these contradictions in other case studies and on forthcoming curriculum change.}, language = {en} } @article{BandyopadhyaySarkarMandaletal.2022, author = {Bandyopadhyay, Soumyadip and Sarkar, Dipankar and Mandal, Chittaranjan and Giese, Holger}, title = {Translation validation of coloured Petri net models of programs on integers}, series = {Acta informatica}, volume = {59}, journal = {Acta informatica}, number = {6}, publisher = {Springer}, address = {New York}, issn = {0001-5903}, doi = {10.1007/s00236-022-00419-z}, pages = {725 -- 759}, year = {2022}, abstract = {Programs are often subjected to significant optimizing and parallelizing transformations based on extensive dependence analysis. Formal validation of such transformations needs modelling paradigms which can capture both control and data dependences in the program vividly. Being value-based with an inherent scope of capturing parallelism, the untimed coloured Petri net (CPN) models, reported in the literature, fit the bill well; accordingly, they are likely to be more convenient as the intermediate representations (IRs) of both the source and the transformed codes for translation validation than strictly sequential variable-based IRs like sequential control flow graphs (CFGs). In this work, an efficient path-based equivalence checking method for CPN models of programs on integers is presented. Extensive experimentation has been carried out on several sequential and parallel examples. Complexity and correctness issues have been treated rigorously for the method.}, language = {en} } @article{BanbaraSohTamuraetal.2013, author = {Banbara, Mutsunori and Soh, Takehide and Tamura, Naoyuki and Inoue, Katsumi and Schaub, Torsten}, title = {Answer set programming as a modeling language for course timetabling}, series = {Theory and practice of logic programming}, volume = {13}, journal = {Theory and practice of logic programming}, number = {2}, publisher = {Cambridge Univ. Press}, address = {New York}, issn = {1471-0684}, doi = {10.1017/S1471068413000495}, pages = {783 -- 798}, year = {2013}, abstract = {The course timetabling problem can be generally defined as the task of assigning a number of lectures to a limited set of timeslots and rooms, subject to a given set of hard and soft constraints. The modeling language for course timetabling is required to be expressive enough to specify a wide variety of soft constraints and objective functions. Furthermore, the resulting encoding is required to be extensible for capturing new constraints and for switching them between hard and soft, and to be flexible enough to deal with different formulations. In this paper, we propose to make effective use of ASP as a modeling language for course timetabling. We show that our ASP-based approach can naturally satisfy the above requirements, through an ASP encoding of the curriculum-based course timetabling problem proposed in the third track of the second international timetabling competition (ITC-2007). Our encoding is compact and human-readable, since each constraint is individually expressed by either one or two rules. Each hard constraint is expressed by using integrity constraints and aggregates of ASP. Each soft constraint S is expressed by rules in which the head is the form of penalty (S, V, C), and a violation V and its penalty cost C are detected and calculated respectively in the body. We carried out experiments on four different benchmark sets with five different formulations. We succeeded either in improving the bounds or producing the same bounds for many combinations of problem instances and formulations, compared with the previous best known bounds.}, language = {en} } @article{BanbaraInoueKaufmannetal.2018, author = {Banbara, Mutsunori and Inoue, Katsumi and Kaufmann, Benjamin and Okimoto, Tenda and Schaub, Torsten and Soh, Takehide and Tamura, Naoyuki and Wanko, Philipp}, title = {teaspoon}, series = {Annals of operation research}, volume = {275}, journal = {Annals of operation research}, number = {1}, publisher = {Springer}, address = {Dordrecht}, issn = {0254-5330}, doi = {10.1007/s10479-018-2757-7}, pages = {3 -- 37}, year = {2018}, abstract = {Answer Set Programming (ASP) is an approach to declarative problem solving, combining a rich yet simple modeling language with high performance solving capacities. We here develop an ASP-based approach to curriculum-based course timetabling (CB-CTT), one of the most widely studied course timetabling problems. The resulting teaspoon system reads a CB-CTT instance of a standard input format and converts it into a set of ASP facts. In turn, these facts are combined with a first-order encoding for CB-CTT solving, which can subsequently be solved by any off-the-shelf ASP systems. We establish the competitiveness of our approach by empirically contrasting it to the best known bounds obtained so far via dedicated implementations. Furthermore, we extend the teaspoon system to multi-objective course timetabling and consider minimal perturbation problems.}, language = {en} } @article{BakeraMargariaRenneretal.2011, author = {Bakera, Marco and Margaria, Tiziana and Renner, Clemens D. and Steffen, Bernhard}, title = {Game-Based model checking for reliable autonomy in space}, series = {Journal of aerospace computing, information, and communication}, volume = {8}, journal = {Journal of aerospace computing, information, and communication}, number = {4}, publisher = {American Institute of Aeronautics and Astronautics}, address = {Reston}, issn = {1940-3151}, doi = {10.2514/1.32013}, pages = {100 -- 114}, year = {2011}, abstract = {Autonomy is an emerging paradigm for the design and implementation of managed services and systems. Self-managed aspects frequently concern the communication of systems with their environment. Self-management subsystems are critical, they should thus be designed and implemented as high-assurance components. Here, we propose to use GEAR, a game-based model checker for the full modal mu-calculus, and derived, more user-oriented logics, as a user friendly tool that can offer automatic proofs of critical properties of such systems. Designers and engineers can interactively investigate automatically generated winning strategies resulting from the games, this way exploring the connection between the property, the system, and the proof. The benefits of the approach are illustrated on a case study that concerns the ExoMars Rover.}, language = {en} } @article{BailisDillahuntMuelleretal.2017, author = {Bailis, Peter and Dillahunt, Tawanna and M{\"u}ller, Stefanie and Baudisch, Patrick}, title = {Research for Practice: Technology for Underserved Communities; Personal Fabrication}, series = {Communications of the ACM / Association for Computing Machinery}, volume = {60}, journal = {Communications of the ACM / Association for Computing Machinery}, publisher = {Association for Computing Machinery}, address = {New York}, issn = {0001-0782}, doi = {10.1145/3080188}, pages = {46 -- 49}, year = {2017}, abstract = {THIS INSTALLMENT OF Research for Practice provides curated reading guides to technology for underserved communities and to new developments in personal fabrication. First, Tawanna Dillahunt describes design considerations and technology for underserved and impoverished communities. Designing for the more than 1.6 billion impoverished individuals worldwide requires special consideration of community needs, constraints, and context. Her selections span protocols for poor-quality communication networks, community-driven content generation, and resource and public service discovery. Second, Stefanie Mueller and Patrick Baudisch provide an overview of recent advances in personal fabrication (for example, 3D printers).}, language = {en} } @article{BaierMendlingWeske2014, author = {Baier, Thomas and Mendling, Jan and Weske, Mathias}, title = {Bridging abstraction layers in process mining}, series = {Information systems}, volume = {46}, journal = {Information systems}, publisher = {Elsevier}, address = {Oxford}, issn = {0306-4379}, doi = {10.1016/j.is.2014.04.004}, pages = {123 -- 139}, year = {2014}, abstract = {While the maturity of process mining algorithms increases and more process mining tools enter the market, process mining projects still face the problem of different levels of abstraction when comparing events with modeled business activities. Current approaches for event log abstraction try to abstract from the events in an automated way that does not capture the required domain knowledge to fit business activities. This can lead to misinterpretation of discovered process models. We developed an approach that aims to abstract an event log to the same abstraction level that is needed by the business. We use domain knowledge extracted from existing process documentation to semi-automatically match events and activities. Our abstraction approach is able to deal with n:m relations between events and activities and also supports concurrency. We evaluated our approach in two case studies with a German IT outsourcing company. (C) 2014 Elsevier Ltd. All rights reserved.}, language = {en} } @article{BaierDiCiccioMendlingetal.2018, author = {Baier, Thomas and Di Ciccio, Claudio and Mendling, Jan and Weske, Mathias}, title = {Matching events and activities by integrating behavioral aspects and label analysis}, series = {Software and systems modeling}, volume = {17}, journal = {Software and systems modeling}, number = {2}, publisher = {Springer}, address = {Heidelberg}, issn = {1619-1366}, doi = {10.1007/s10270-017-0603-z}, pages = {573 -- 598}, year = {2018}, abstract = {Nowadays, business processes are increasingly supported by IT services that produce massive amounts of event data during the execution of a process. These event data can be used to analyze the process using process mining techniques to discover the real process, measure conformance to a given process model, or to enhance existing models with performance information. Mapping the produced events to activities of a given process model is essential for conformance checking, annotation and understanding of process mining results. In order to accomplish this mapping with low manual effort, we developed a semi-automatic approach that maps events to activities using insights from behavioral analysis and label analysis. The approach extracts Declare constraints from both the log and the model to build matching constraints to efficiently reduce the number of possible mappings. These mappings are further reduced using techniques from natural language processing, which allow for a matching based on labels and external knowledge sources. The evaluation with synthetic and real-life data demonstrates the effectiveness of the approach and its robustness toward non-conforming execution logs.}, language = {en} } @article{BaedkeSchoettler2017, author = {Baedke, Jan and Sch{\"o}ttler, Tobias}, title = {Visual Metaphors in the Sciences}, series = {Journal for General Philosophy of Science}, volume = {48}, journal = {Journal for General Philosophy of Science}, publisher = {Springer}, address = {Dordrecht}, issn = {0925-4560}, doi = {10.1007/s10838-016-9353-9}, pages = {173 -- 194}, year = {2017}, abstract = {Recent philosophical analyses of the epistemic dimension of images in the sciences show a certain trend in acknowledging potential roles of these images beyond their merely decorative or pedagogical functions. We argue, however, that this new debate has yet paid little attention to a special type of pictures, we call 'visual metaphor', and its versatile heuristic potential in organizing data, supporting communication, and guiding research, modeling, and theory formation. Based on a case study of Conrad Hal Waddington's epigenetic landscape images in biology, we develop a descriptive framework applicable to heuristic roles of various visual metaphors in the sciences.}, language = {en} }