TY - GEN A1 - Butuzov, Valentin F. A1 - Nefedov, N. N. A1 - Recke, Lutz A1 - Omel'chenko, Oleh T1 - Partly dissipative system with multizonal initial and boundary layers T2 - Journal of Physics: Conference Series N2 - For a singularly perturbed parabolic - ODE system we construct the asymptotic expansion in the small parameter in the case, when the degenerate equation has a double root. Such systems, which are called partly dissipative reaction-diffusion systems, are used to model various natural processes, including the signal transmission along axons, solid combustion and the kinetics of some chemical reactions. It turns out that the algorithm of the construction of the boundary layer functions and the behavior of the solution in the boundary layers essentially differ from that ones in case of a simple root. The multizonal initial and boundary layers behaviour was stated. Y1 - 2019 U6 - https://doi.org/10.1088/1742-6596/1205/1/012009 SN - 1742-6588 SN - 1742-6596 VL - 1205 PB - IOP Publ. CY - Bristol ER - TY - GEN A1 - Bruechner, Dominik A1 - Renz, Jan A1 - Klingbeil, Mandy T1 - Creating a Framework for User-Centered Development and Improvement of Digital Education T2 - Scale N2 - We investigate how the technology acceptance and learning experience of the digital education platform HPI Schul-Cloud (HPI School Cloud) for German secondary school teachers can be improved by proposing a user-centered research and development framework. We highlight the importance of developing digital learning technologies in a user-centered way to take differences in the requirements of educators and students into account. We suggest applying qualitative and quantitative methods to build a solid understanding of a learning platform's users, their needs, requirements, and their context of use. After concept development and idea generation of features and areas of opportunity based on the user research, we emphasize on the application of a multi-attribute utility analysis decision-making framework to prioritize ideas rationally, taking results of user research into account. Afterward, we recommend applying the principle build-learn-iterate to build prototypes in different resolutions while learning from user tests and improving the selected opportunities. Last but not least, we propose an approach for continuous short- and long-term user experience controlling and monitoring, extending existing web- and learning analytics metrics. KW - learning platform KW - user experience KW - evaluation KW - HPI Schul-Cloud KW - user research framework KW - user-centered design Y1 - 2019 SN - 978-1-4503-6804-9 U6 - https://doi.org/10.1145/3330430.3333644 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Brinkmann, Maik A1 - Heine, Moreen T1 - Can Blockchain Leverage for New Public Governance? BT - a Conceptual Analysis on Process Level T2 - Proceedings of the 12th International Conference on Theory and Practice of Electronic Governance N2 - New Public Governance (NPG) as a paradigm for collaborative forms of public service delivery and Blockchain governance are trending topics for researchers and practitioners alike. Thus far, each topic has, on the whole, been discussed separately. This paper presents the preliminary results of ongoing research which aims to shed light on the more concrete benefits of Blockchain for the purpose of NPG. For the first time, a conceptual analysis is conducted on process level to spot benefits and limitations of Blockchain-based governance. Per process element, Blockchain key characteristics are mapped to functional aspects of NPG from a governance perspective. The preliminary results show that Blockchain offers valuable support for governments seeking methods to effectively coordinate co-producing networks. However, the extent of benefits of Blockchain varies across the process elements. It becomes evident that there is a need for off-chain processes. It is, therefore, argued in favour of intensifying research on off-chain governance processes to better understand the implications for and influences on on-chain governance. KW - Blockchain KW - New Public Governance KW - Blockchain Governance KW - Co-production KW - Conceptual Fit KW - Blockchain-enabled Governance Y1 - 2019 SN - 978-1-4503-6644-1 U6 - https://doi.org/10.1145/3326365.3326409 SP - 338 EP - 341 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Brilmyer, S. Pearl A1 - Trentin, Filippo A1 - Xiang, Zairong T1 - Introduction: The Ontology of the Couple T2 - GLQ : a journal of lesbian and gay studies Y1 - 2019 U6 - https://doi.org/10.1215/10642684-7367703 SN - 1064-2684 SN - 1527-9375 VL - 25 IS - 2 SP - 217 EP - 221 PB - Duke University Press CY - Durham ER - TY - GEN A1 - Bressel, Lena A1 - Herzog, Bernd A1 - Reich, Oliver T1 - Monte-Carlo simulations of light transport in dense materials BT - dependent scattering and influence on sunscreen formulations T2 - Diffuse Optical Spectroscopy and Imaging N2 - Monte-Carlo calculations are carried out to simulate the light transport in dense materials. Focus lies on the calculation of diffuse light transmission through films of scattering and absorbing media considering additionally the effect of dependent scattering. Different influences like interaction type between particles, particle size, composition etc. can be studied by this program. Simulations in this study show major influences on the diffuse transmission. Further simulations are carried out to model a sunscreen film and study best compositions of this film and will be presented. KW - Monte-Carlo simulations KW - dependent scattering KW - sunscreen KW - light scattering KW - high concentrations Y1 - 2019 SN - 978-1-5106-2841-0 SN - 978-1-5106-2842-7 U6 - https://doi.org/10.1117/12.2527076 SN - 0277-786X SN - 1996-756X VL - 11074 PB - SPIE CY - Bellingham ER - TY - GEN A1 - Brechenmacher, Thomas T1 - Peace orders of modern times BT - introduction to the overall theme T2 - Historisches Jahrbuch Y1 - 2019 SN - 978-3-451-38586-5 SN - 0018-2621 VL - 139 SP - 3 EP - 6 PB - Herder CY - Freiburg Breisgau ER - TY - GEN A1 - Braun, David R. A1 - Aldeias, Vera A1 - Archer, Will A1 - Arrowsmith, J. Ramon A1 - Baraki, Niguss A1 - Campisano, Christopher J. A1 - Deino, Alan L. A1 - DiMaggio, Erin N. A1 - Dupont-Nivet, Guillaume A1 - Engda, Blade A1 - Feary, David A. A1 - Garello, Dominique I. A1 - Kerfelew, Zenash A1 - McPherron, Shannon P. A1 - Patterson, David B. A1 - Reeves, Jonathan S. A1 - Thompson, Jessica C. A1 - Reed, Kaye E. T1 - Reply to Sahle and Gossa: Technology and geochronology at the earliest known Oldowan site at Ledi-Geraru, Ethiopia T2 - Proceedings of the National Academy of Sciences of the United States of America Y1 - 2019 U6 - https://doi.org/10.1073/pnas.1911952116 SN - 0027-8424 N1 - Letter VL - 116 IS - 41 SP - 20261 EP - 20262 PB - National Acad. of Sciences CY - Washington ER - TY - GEN A1 - Brand, Thomas A1 - Giese, Holger Burkhard T1 - Towards Generic Adaptive Monitoring T2 - 2018 IEEE 12th International Conference on Self-Adaptive and Self-Organizing Systems (SASO) N2 - Monitoring is a key prerequisite for self-adaptive software and many other forms of operating software. Monitoring relevant lower level phenomena like the occurrences of exceptions and diagnosis data requires to carefully examine which detailed information is really necessary and feasible to monitor. Adaptive monitoring permits observing a greater variety of details with less overhead, if most of the time the MAPE-K loop can operate using only a small subset of all those details. However, engineering such an adaptive monitoring is a major engineering effort on its own that further complicates the development of self-adaptive software. The proposed approach overcomes the outlined problems by providing generic adaptive monitoring via runtime models. It reduces the effort to introduce and apply adaptive monitoring by avoiding additional development effort for controlling the monitoring adaptation. Although the generic approach is independent from the monitoring purpose, it still allows for substantial savings regarding the monitoring resource consumption as demonstrated by an example. Y1 - 2019 SN - 978-1-5386-5172-8 U6 - https://doi.org/10.1109/SASO.2018.00027 SN - 1949-3673 SP - 156 EP - 161 PB - IEEE CY - New York ER - TY - GEN A1 - Brand, Thomas A1 - Giese, Holger T1 - Generic adaptive monitoring based on executed architecture runtime model queries and events T2 - IEEE Xplore N2 - Monitoring is a key functionality for automated decision making as it is performed by self-adaptive systems, too. Effective monitoring provides the relevant information on time. This can be achieved with exhaustive monitoring causing a high overhead consumption of economical and ecological resources. In contrast, our generic adaptive monitoring approach supports effectiveness with increased efficiency. Also, it adapts to changes regarding the information demand and the monitored system without additional configuration and software implementation effort. The approach observes the executions of runtime model queries and processes change events to determine the currently required monitoring configuration. In this paper we explicate different possibilities to use the approach and evaluate their characteristics regarding the phenomenon detection time and the monitoring effort. Our approach allows balancing between those two characteristics. This makes it an interesting option for the monitoring function of self-adaptive systems because for them usually very short-lived phenomena are not relevant. Y1 - 2019 SN - 978-1-7281-2731-6 U6 - https://doi.org/10.1109/SASO.2019.00012 SN - 1949-3673 SP - 17 EP - 22 PB - IEEE CY - New York ER - TY - GEN A1 - Braga, Brennda A1 - de Carvalho, Thayslan A1 - Brosinsky, Arlena A1 - Förster, Saskia A1 - Medeiros, Pedro Henrique Augusto T1 - Corrigendum to: From waste to resource: cost-benefit analysis of reservoir sediment reuse for soil fertilization in a semiarid catchment (The science of the total environment : an international journal for scientific research into the environment and its relationship with man. - 670 (2019), 20, S. 158 - 169) T2 - The science of the total environment : an international journal for scientific research into the environment and its relationship with man Y1 - 2019 U6 - https://doi.org/10.1016/j.scitotenv.2019.133844 SN - 0048-9697 SN - 1879-1026 VL - 696 PB - Elsevier CY - Amsterdam ER - TY - GEN A1 - Bohdan, Artem A1 - Niemiec, Jacek A1 - Kobzar, Oleh A1 - Pohl, Martin T1 - Erratum: Electron Pre-acceleration at Nonrelativistic High-Mach-number Perpendicular Shocks (The astrophysical journal : an international review of spectroscopy and astronomical physics. - Vol 847, 2017, 71) T2 - The astrophysical journal : an international review of spectroscopy and astronomical physics Y1 - 2019 U6 - https://doi.org/10.3847/1538-4357/ab2f89 SN - 0004-637X SN - 1538-4357 VL - 880 IS - 1 PB - IOP Publ. Ltd. CY - Bristol ER - TY - GEN A1 - Bock, Benedikt A1 - Matysik, Jan-Tobias A1 - Krentz, Konrad-Felix A1 - Meinel, Christoph T1 - Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme T2 - 2019 IEEE 5TH World Forum on internet of things (WF-IOT) N2 - While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap. KW - IEEE 802.15.4 KW - key management KW - key establishment KW - key revocation KW - rekeying KW - link layer security KW - MAC security Y1 - 2019 SN - 978-1-5386-4980-0 U6 - https://doi.org/10.1109/WF-IoT.2019.8767211 SP - 374 EP - 379 PB - IEEE CY - New York ER - TY - GEN A1 - Bobos, Iuliu A1 - Goncalves, Ana A1 - Lima, Luis A1 - Noronha, Fernando A1 - Sudo, Masafumi T1 - Micas Ar-40/Ar-39 dating of hydrothermal events related with the post-orogenic W (+/- Sn), (Cu, Mo) mineralization from Borralha, Northern Portugal T2 - Life with Ore Deposits on Earth – 15th SGA Biennial Meeting 2019, N2 - Secondary mica minerals collected from the Santa Helena (W- (Cu) mineralization) and Venise (W-Mo mineralization) endogenic breccia structures were Ar-40/Ar-39 dated. The muscovite Ar-40/Ar-39 data yielded 286.8 +/- 1.2 (+/- 1 sigma) Ma (samples 6Ha and 11Ha) which reflect the age of secondary muscovite formation probably from magmatic biotite or feldspar alteration. Sericite Ar-40/Ar-39 data yielded 280.9 +/- 1.2 (+/- 1 sigma) Ma to 279.0 +/- 1.1 (+/- 1 sigma) Ma (samples 6Hb and 11Hb) reflecting the age of greisen alteration (T similar to 300 degrees C) where the W- disseminated mineralization occurs. The muscovite 40Ar/39Ar data of 277.3 +/- 1.3 (+/- 1 sigma) Ma and 281.3 +/- 1.2 (+/- 1 sigma) Ma (samples 5 and 6) also reflect the age of muscovite (selvage) crystallized adjacent to molybdenite veins within the Venise breccia. Geochronological data obtained confirmed that the W mineralization at Santa Helena breccia is older than Mo-mineralization at Venise breccia. Also, the timing of hydrothermal circulation and the cooling history for the W-stage deposition was no longer than 7 Ma and 4 Ma for Mo-deposition. Y1 - 2019 UR - https://www.researchgate.net/publication/337901420_Micas_40_Ar_39_Ar_dating_of_hydrothermal_events_related_with_the_post-orogenic_W_Sn_Cu_Mo_mineralization_from_Borralha_Northern_Portugal IS - 1 SP - 353 EP - 356 PB - SGA Soc Geology Applied mineral depositis CY - Geneva ER - TY - GEN A1 - Björk, Jennie A1 - Hölze, Katharina T1 - Editorial T2 - Creativity and innovation management Y1 - 2019 U6 - https://doi.org/10.1111/caim.12336 SN - 0963-1690 SN - 1467-8691 VL - 28 IS - 3 SP - 289 EP - 290 PB - Wiley CY - Hoboken ER - TY - GEN A1 - Bin Tareaf, Raad A1 - Berger, Philipp A1 - Hennig, Patrick A1 - Meinel, Christoph T1 - Personality exploration system for online social networks BT - Facebook brands as a use case T2 - 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI) N2 - User-generated content on social media platforms is a rich source of latent information about individual variables. Crawling and analyzing this content provides a new approach for enterprises to personalize services and put forward product recommendations. In the past few years, brands made a gradual appearance on social media platforms for advertisement, customers support and public relation purposes and by now it became a necessity throughout all branches. This online identity can be represented as a brand personality that reflects how a brand is perceived by its customers. We exploited recent research in text analysis and personality detection to build an automatic brand personality prediction model on top of the (Five-Factor Model) and (Linguistic Inquiry and Word Count) features extracted from publicly available benchmarks. The proposed model reported significant accuracy in predicting specific personality traits form brands. For evaluating our prediction results on actual brands, we crawled the Facebook API for 100k posts from the most valuable brands' pages in the USA and we visualize exemplars of comparison results and present suggestions for future directions. KW - Big Five Model KW - Brand Personality KW - Personality Prediction KW - Machine Learning KW - Social Media Analysis Y1 - 2019 SN - 978-1-5386-7325-6 U6 - https://doi.org/10.1109/WI.2018.00-76 SP - 301 EP - 309 PB - IEEE CY - New York ER - TY - GEN A1 - Bilo, Davide A1 - Friedrich, Tobias A1 - Lenzner, Pascal A1 - Melnichenko, Anna T1 - Geometric Network Creation Games T2 - SPAA '19: The 31st ACM Symposium on Parallelism in Algorithms and Architectures N2 - Network Creation Games are a well-known approach for explaining and analyzing the structure, quality and dynamics of real-world networks like the Internet and other infrastructure networks which evolved via the interaction of selfish agents without a central authority. In these games selfish agents which correspond to nodes in a network strategically buy incident edges to improve their centrality. However, past research on these games has only considered the creation of networks with unit-weight edges. In practice, e.g. when constructing a fiber-optic network, the choice of which nodes to connect and also the induced price for a link crucially depends on the distance between the involved nodes and such settings can be modeled via edge-weighted graphs. We incorporate arbitrary edge weights by generalizing the well-known model by Fabrikant et al. [PODC'03] to edge-weighted host graphs and focus on the geometric setting where the weights are induced by the distances in some metric space. In stark contrast to the state-of-the-art for the unit-weight version, where the Price of Anarchy is conjectured to be constant and where resolving this is a major open problem, we prove a tight non-constant bound on the Price of Anarchy for the metric version and a slightly weaker upper bound for the non-metric case. Moreover, we analyze the existence of equilibria, the computational hardness and the game dynamics for several natural metrics. The model we propose can be seen as the game-theoretic analogue of a variant of the classical Network Design Problem. Thus, low-cost equilibria of our game correspond to decentralized and stable approximations of the optimum network design. KW - Network creation games KW - edge-weighted networks KW - price of anarchy KW - Nash equilibrium KW - game dynamics KW - computational hardness Y1 - 2019 SN - 978-1-4503-6184-2 U6 - https://doi.org/10.1145/3323165.3323199 SP - 323 EP - 332 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Bender, Benedict A1 - Grum, Marcus A1 - Gronau, Norbert A1 - Alfa, Attahiru A1 - Maharaj, B. T. T1 - Design of a worldwide simulation system for distributed cyber-physical production networks T2 - 2019 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC) N2 - Modern production infrastructures of globally operating companies usually consist of multiple distributed production sites. While the organization of individual sites consisting of Industry 4.0 components itself is demanding, new questions regarding the organization and allocation of resources emerge considering the total production network. In an attempt to face the challenge of efficient distribution and processing both within and across sites, we aim to provide a hybrid simulation approach as a first step towards optimization. Using hybrid simulation allows us to include real and simulated concepts and thereby benchmark different approaches with reasonable effort. A simulation concept is conceptualized and demonstrated qualitatively using a global multi-site example. KW - production networks KW - geographical distribution KW - task realization strategies KW - Industry 4.0 KW - simulation KW - evaluation Y1 - 2019 SN - 978-1-7281-3401-7 SN - 978-1-7281-3402-4 U6 - https://doi.org/10.1109/ICE.2019.8792609 SN - 2334-315X PB - IEEE CY - New York ER - TY - GEN A1 - Beierle, Christoph A1 - Berndt, Jan Ole A1 - Gronau, Norbert A1 - Timm, Ingo J. T1 - Intentional Forgetting: A Huge Potential for Organizations BT - Interview with Prof. Norbert Gronau, University of Potsdam T2 - Künstliche Intelligenz Y1 - 2019 U6 - https://doi.org/10.1007/s13218-018-00573-y SN - 0933-1875 SN - 1610-1987 VL - 33 IS - 1 SP - 85 EP - 87 PB - Springer CY - Heidelberg ER - TY - GEN A1 - Beckus, Siegfried A1 - Bellissard, Jean A1 - De Nittis, Giuseppe T1 - Corrigendum to: Spectral continuity for aperiodic quantum systems I. General theory. - [Journal of functional analysis. - 275 (2018), 11, S. 2917 – 2977] T2 - Journal of functional analysis N2 - A correct statement of Theorem 4 in [1] is provided. The change does not affect the main results. KW - Haar system Y1 - 2019 U6 - https://doi.org/10.1016/j.jfa.2019.06.001 SN - 0022-1236 SN - 1096-0783 VL - 277 IS - 9 SP - 3351 EP - 3353 PB - Elsevier CY - San Diego ER - TY - GEN A1 - Bartz, Christian A1 - Yang, Haojin A1 - Bethge, Joseph A1 - Meinel, Christoph T1 - LoANs BT - Weakly Supervised Object Detection with Localizer Assessor Networks T2 - Computer Vision – ACCV 2018 Workshops N2 - Recently, deep neural networks have achieved remarkable performance on the task of object detection and recognition. The reason for this success is mainly grounded in the availability of large scale, fully annotated datasets, but the creation of such a dataset is a complicated and costly task. In this paper, we propose a novel method for weakly supervised object detection that simplifies the process of gathering data for training an object detector. We train an ensemble of two models that work together in a student-teacher fashion. Our student (localizer) is a model that learns to localize an object, the teacher (assessor) assesses the quality of the localization and provides feedback to the student. The student uses this feedback to learn how to localize objects and is thus entirely supervised by the teacher, as we are using no labels for training the localizer. In our experiments, we show that our model is very robust to noise and reaches competitive performance compared to a state-of-the-art fully supervised approach. We also show the simplicity of creating a new dataset, based on a few videos (e.g. downloaded from YouTube) and artificially generated data. Y1 - 2019 SN - 978-3-030-21074-8 SN - 978-3-030-21073-1 U6 - https://doi.org/10.1007/978-3-030-21074-8_29 SN - 0302-9743 SN - 1611-3349 VL - 11367 SP - 341 EP - 356 PB - Springer CY - Cham ER -