TY - GEN A1 - Krawietz, Marian A1 - Goebel, Jan A1 - Albrecht, Sophia A1 - Class, Fabian A1 - Kohler, Ulrich T1 - Leben in der ehemaligen DDR BT - Zusatzfragebogen im Rahmen der Befragung "Leben in Deutschland 2018" / Living in the GDR Y1 - 2019 U6 - https://doi.org/10.5684/soep.ddr18 PB - German Institute for Economic Research (DIW Berlin) CY - Berlin ER - TY - GEN A1 - Bin Tareaf, Raad A1 - Berger, Philipp A1 - Hennig, Patrick A1 - Meinel, Christoph T1 - Personality exploration system for online social networks BT - Facebook brands as a use case T2 - 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI) N2 - User-generated content on social media platforms is a rich source of latent information about individual variables. Crawling and analyzing this content provides a new approach for enterprises to personalize services and put forward product recommendations. In the past few years, brands made a gradual appearance on social media platforms for advertisement, customers support and public relation purposes and by now it became a necessity throughout all branches. This online identity can be represented as a brand personality that reflects how a brand is perceived by its customers. We exploited recent research in text analysis and personality detection to build an automatic brand personality prediction model on top of the (Five-Factor Model) and (Linguistic Inquiry and Word Count) features extracted from publicly available benchmarks. The proposed model reported significant accuracy in predicting specific personality traits form brands. For evaluating our prediction results on actual brands, we crawled the Facebook API for 100k posts from the most valuable brands' pages in the USA and we visualize exemplars of comparison results and present suggestions for future directions. KW - Big Five Model KW - Brand Personality KW - Personality Prediction KW - Machine Learning KW - Social Media Analysis Y1 - 2019 SN - 978-1-5386-7325-6 U6 - https://doi.org/10.1109/WI.2018.00-76 SP - 301 EP - 309 PB - IEEE CY - New York ER - TY - GEN A1 - Andjelkovic, Marko A1 - Babic, Milan A1 - Li, Yuanqing A1 - Schrape, Oliver A1 - Krstić, Miloš A1 - Kraemer, Rolf T1 - Use of decoupling cells for mitigation of SET effects in CMOS combinational gates T2 - 2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS) N2 - This paper investigates the applicability of CMOS decoupling cells for mitigating the Single Event Transient (SET) effects in standard combinational gates. The concept is based on the insertion of two decoupling cells between the gate's output and the power/ground terminals. To verify the proposed hardening approach, extensive SPICE simulations have been performed with standard combinational cells designed in IHP's 130 nm bulk CMOS technology. Obtained simulation results have shown that the insertion of decoupling cells results in the increase of the gate's critical charge, thus reducing the gate's soft error rate (SER). Moreover, the decoupling cells facilitate the suppression of SET pulses propagating through the gate. It has been shown that the decoupling cells may be a competitive alternative to gate upsizing and gate duplication for hardening the gates with lower critical charge and multiple (3 or 4) inputs, as well as for filtering the short SET pulses induced by low-LET particles. KW - decoupling cells KW - radiation hardening KW - SET effects KW - CMOS technology KW - combinational logic Y1 - 2019 SN - 978-1-5386-9562-3 U6 - https://doi.org/10.1109/ICECS.2018.8617996 SP - 361 EP - 364 PB - IEEE CY - New York ER - TY - GEN A1 - Sianipar, Johannes Harungguan A1 - Willems, Christian A1 - Meinel, Christoph T1 - Virtual machine integrity verification in Crowd-Resourcing Virtual Laboratory T2 - 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA) N2 - In cloud computing, users are able to use their own operating system (OS) image to run a virtual machine (VM) on a remote host. The virtual machine OS is started by the user using some interfaces provided by a cloud provider in public or private cloud. In peer to peer cloud, the VM is started by the host admin. After the VM is running, the user could get a remote access to the VM to install, configure, and run services. For the security reasons, the user needs to verify the integrity of the running VM, because a malicious host admin could modify the image or even replace the image with a similar image, to be able to get sensitive data from the VM. We propose an approach to verify the integrity of a running VM on a remote host, without using any specific hardware such as Trusted Platform Module (TPM). Our approach is implemented on a Linux platform where the kernel files (vmlinuz and initrd) could be replaced with new files, while the VM is running. kexec is used to reboot the VM with the new kernel files. The new kernel has secret codes that will be used to verify whether the VM was started using the new kernel files. The new kernel is used to further measuring the integrity of the running VM. KW - Virtual Machine KW - Integrity Verification KW - Crowd-Resourcing KW - Cloud Computing Y1 - 2019 SN - 978-1-5386-9133-5 U6 - https://doi.org/10.1109/SOCA.2018.00032 SN - 2163-2871 SP - 169 EP - 176 PB - IEEE CY - New York ER - TY - GEN A1 - Brand, Thomas A1 - Giese, Holger Burkhard T1 - Towards Generic Adaptive Monitoring T2 - 2018 IEEE 12th International Conference on Self-Adaptive and Self-Organizing Systems (SASO) N2 - Monitoring is a key prerequisite for self-adaptive software and many other forms of operating software. Monitoring relevant lower level phenomena like the occurrences of exceptions and diagnosis data requires to carefully examine which detailed information is really necessary and feasible to monitor. Adaptive monitoring permits observing a greater variety of details with less overhead, if most of the time the MAPE-K loop can operate using only a small subset of all those details. However, engineering such an adaptive monitoring is a major engineering effort on its own that further complicates the development of self-adaptive software. The proposed approach overcomes the outlined problems by providing generic adaptive monitoring via runtime models. It reduces the effort to introduce and apply adaptive monitoring by avoiding additional development effort for controlling the monitoring adaptation. Although the generic approach is independent from the monitoring purpose, it still allows for substantial savings regarding the monitoring resource consumption as demonstrated by an example. Y1 - 2019 SN - 978-1-5386-5172-8 U6 - https://doi.org/10.1109/SASO.2018.00027 SN - 1949-3673 SP - 156 EP - 161 PB - IEEE CY - New York ER - TY - GEN A1 - Sianipar, Johannes Harungguan A1 - Sukmana, Muhammad Ihsan Haikal A1 - Meinel, Christoph T1 - Moving sensitive data against live memory dumping, spectre and meltdown attacks T2 - 26th International Conference on Systems Engineering (ICSEng) N2 - The emergence of cloud computing allows users to easily host their Virtual Machines with no up-front investment and the guarantee of always available anytime anywhere. But with the Virtual Machine (VM) is hosted outside of user's premise, the user loses the physical control of the VM as it could be running on untrusted host machines in the cloud. Malicious host administrator could launch live memory dumping, Spectre, or Meltdown attacks in order to extract sensitive information from the VM's memory, e.g. passwords or cryptographic keys of applications running in the VM. In this paper, inspired by the moving target defense (MTD) scheme, we propose a novel approach to increase the security of application's sensitive data in the VM by continuously moving the sensitive data among several memory allocations (blocks) in Random Access Memory (RAM). A movement function is added into the application source code in order for the function to be running concurrently with the application's main function. Our approach could reduce the possibility of VM's sensitive data in the memory to be leaked into memory dump file by 2 5% and secure the sensitive data from Spectre and Meltdown attacks. Our approach's overhead depends on the number and the size of the sensitive data. KW - Virtual Machine KW - Memory Dumping KW - Security KW - Cloud Computing KW - Spectre KW - Meltdown Y1 - 2019 SN - 978-1-5386-7834-3 PB - IEEE CY - New York ER - TY - GEN A1 - Richly, Keven T1 - Leveraging spatio-temporal soccer data to define a graphical query language for game recordings T2 - IEEE International Conference on Big Data (Big Data) N2 - For professional soccer clubs, performance and video analysis are an integral part of the preparation and post-processing of games. Coaches, scouts, and video analysts extract information about strengths and weaknesses of their team as well as opponents by manually analyzing video recordings of past games. Since video recordings are an unstructured data source, it is a complex and time-intensive task to find specific game situations and identify similar patterns. In this paper, we present a novel approach to detect patterns and situations (e.g., playmaking and ball passing of midfielders) based on trajectory data. The application uses the metaphor of a tactic board to offer a graphical query language. With this interactive tactic board, the user can model a game situation or mark a specific situation in the video recording for which all matching occurrences in various games are immediately displayed, and the user can directly jump to the corresponding game scene. Through the additional visualization of key performance indicators (e.g.,the physical load of the players), the user can get a better overall assessment of situations. With the capabilities to find specific game situations and complex patterns in video recordings, the interactive tactic board serves as a useful tool to improve the video analysis process of professional sports teams. KW - Spatio-temporal data analysis KW - soccer analytics KW - graphical query language Y1 - 2019 SN - 978-1-5386-5035-6 U6 - https://doi.org/10.1109/BigData.2018.8622159 SN - 2639-1589 SP - 3456 EP - 3463 PB - IEEE CY - New York ER - TY - GEN A1 - Richly, Keven T1 - A survey on trajectory data management for hybrid transactional and analytical workloads T2 - IEEE International Conference on Big Data (Big Data) N2 - Rapid advances in location-acquisition technologies have led to large amounts of trajectory data. This data is the foundation for a broad spectrum of services driven and improved by trajectory data mining. However, for hybrid transactional and analytical workloads, the storing and processing of rapidly accumulated trajectory data is a non-trivial task. In this paper, we present a detailed survey about state-of-the-art trajectory data management systems. To determine the relevant aspects and requirements for such systems, we developed a trajectory data mining framework, which summarizes the different steps in the trajectory data mining process. Based on the derived requirements, we analyze different concepts to store, compress, index, and process spatio-temporal data. There are various trajectory management systems, which are optimized for scalability, data footprint reduction, elasticity, or query performance. To get a comprehensive overview, we describe and compare different exciting systems. Additionally, the observed similarities in the general structure of different systems are consolidated in a general blueprint of trajectory management systems. KW - Trajectory Data Management KW - Spatio-Temporal Data KW - Survey Y1 - 2019 SN - 978-1-5386-5035-6 U6 - https://doi.org/10.1109/BigData.2018.8622394 SN - 2639-1589 SP - 562 EP - 569 PB - IEEE CY - New York ER - TY - GEN A1 - Zarriess, Sina A1 - Schlangen, David T1 - Objects of Unknown Categories T2 - The 57th Annual Meeting of the Association for Computational Linguistics N2 - Zero-shot learning in Language & Vision is the task of correctly labelling (or naming) objects of novel categories. Another strand of work in L&V aims at pragmatically informative rather than "correct" object descriptions, e.g. in reference games. We combine these lines of research and model zero-shot reference games, where a speaker needs to successfully refer to a novel object in an image. Inspired by models of "rational speech acts", we extend a neural generator to become a pragmatic speaker reasoning about uncertain object categories. As a result of this reasoning, the generator produces fewer nouns and names of distractor categories as compared to a literal speaker. We show that this conversational strategy for dealing with novel objects often improves communicative success, in terms of resolution accuracy of an automatic listener. Y1 - 2019 SN - 978-1-950737-48-2 SP - 654 EP - 659 PB - Association for Computational Linguistics CY - Stroudsburg ER - TY - GEN A1 - Finch, Nicolle L. A1 - Braker, I. P. A1 - Reindl, Nicole A1 - Barstow, Martin A. A1 - Casewell, Sarah L. A1 - Burleigh, M. A1 - Kupfer, Thomas A1 - Kilkenny, D. A1 - Geier, Stephan Alfred A1 - Schaffenroth, Veronika A1 - Bertolami Miller, Marcelo Miguel A1 - Taubenberger, Stefan A1 - Freudenthal, Joseph T1 - Spectral Analysis of Binary Pre-white Dwarf Systems T2 - Radiative signatures from the cosmos N2 - Short period double degenerate white dwarf (WD) binaries with periods of less than similar to 1 day are considered to be one of the likely progenitors of type Ia supernovae. These binaries have undergone a period of common envelope evolution. If the core ignites helium before the envelope is ejected, then a hot subdwarf remains prior to contracting into a WD. Here we present a comparison of two very rare systems that contain two hot subdwarfs in short period orbits. We provide a quantitative spectroscopic analysis of the systems using synthetic spectra from state-of-the-art non-LTE models to constrain the atmospheric parameters of the stars. We also use these models to determine the radial velocities, and thus calculate dynamical masses for the stars in each system. Y1 - 2019 SN - 978-1-58381-925-8 SN - 1050-3390 VL - 519 SP - 231 EP - 238 PB - Astronomical soc pacific CY - San Fransisco ER - TY - GEN A1 - Kubatova, Brankica A1 - Hamann, Wolf-Rainer A1 - Kubat, Jiri A1 - Oskinova, Lida T1 - 3D Monte Carlo Radiative Transfer in Inhomogeneous Massive Star Winds BT - Application to Resonance Line Formation T2 - Radiative signatures from the cosmos N2 - Already for decades it has been known that the winds of massive stars are inhomogeneous (i.e. clumped). To properly model observed spectra of massive star winds it is necessary to incorporate the 3-D nature of clumping into radiative transfer calculations. In this paper we present our full 3-D Monte Carlo radiative transfer code for inhomogeneous expanding stellar winds. We use a set of parameters to describe dense as well as the rarefied wind components. At the same time, we account for non-monotonic velocity fields. We show how the 3-D density and velocity wind inhomogeneities strongly affect the resonance line formation. We also show how wind clumping can solve the discrepancy between P v and H alpha mass-loss rate diagnostics. Y1 - 2019 SN - 978-1-58381-925-8 SN - 1050-3390 VL - 519 SP - 209 EP - 212 PB - Astronomical soc pacific CY - San Fransisco ER - TY - GEN A1 - Dolezalova, Barbora A1 - Kubatova, Brankica A1 - Kubat, Jiri A1 - Hamann, Wolf-Rainer T1 - The Quasi-WR Star HD 45166 Revisited T2 - Radiative signatures from the cosmos N2 - We studied the wind of the quasi Wolf-Rayet (qWR) star HD 45166. As a first step we modeled the observed UV spectra of this star by means of the state-of-the-art Potsdam Wolf-Rayet (PoWR) atmosphere code. We inferred the wind parameters and compared them with previous findings. Y1 - 2019 SN - 978-1-58381-925-8 SN - 1050-3390 VL - 519 SP - 197 EP - 200 PB - Astronomical soc pacific CY - San Fransisco ER - TY - GEN A1 - Staubitz, Thomas A1 - Meinel, Christoph T1 - Graded Team Assignments in MOOCs BT - Effects of Team Composition and Further Factors on Team Dropout Rates and Performance T2 - SCALE N2 - The ability to work in teams is an important skill in today's work environments. In MOOCs, however, team work, team tasks, and graded team-based assignments play only a marginal role. To close this gap, we have been exploring ways to integrate graded team-based assignments in MOOCs. Some goals of our work are to determine simple criteria to match teams in a volatile environment and to enable a frictionless online collaboration for the participants within our MOOC platform. The high dropout rates in MOOCs pose particular challenges for team work in this context. By now, we have conducted 15 MOOCs containing graded team-based assignments in a variety of topics. The paper at hand presents a study that aims to establish a solid understanding of the participants in the team tasks. Furthermore, we attempt to determine which team compositions are particularly successful. Finally, we examine how several modifications to our platform's collaborative toolset have affected the dropout rates and performance of the teams. KW - Teamwork KW - MOOCs KW - Team-based Learning KW - Team Assessment KW - Peer Assessment KW - Project-based learning Y1 - 2019 SN - 978-1-4503-6804-9 U6 - https://doi.org/10.1145/3330430.3333619 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Bock, Benedikt A1 - Matysik, Jan-Tobias A1 - Krentz, Konrad-Felix A1 - Meinel, Christoph T1 - Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme T2 - 2019 IEEE 5TH World Forum on internet of things (WF-IOT) N2 - While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap. KW - IEEE 802.15.4 KW - key management KW - key establishment KW - key revocation KW - rekeying KW - link layer security KW - MAC security Y1 - 2019 SN - 978-1-5386-4980-0 U6 - https://doi.org/10.1109/WF-IoT.2019.8767211 SP - 374 EP - 379 PB - IEEE CY - New York ER - TY - GEN A1 - Fischer, Martin H. A1 - Shaki, Samuel T1 - How to make talks less boring T2 - Nature : the international weekly journal of science Y1 - 2019 U6 - https://doi.org/10.1038/d41586-019-00153-6 SN - 0028-0836 SN - 1476-4687 VL - 565 IS - 7739 SP - 294 EP - 294 PB - Nature Publ. Group CY - London ER - TY - GEN A1 - Nitze, Ingmar A1 - Grosse, Guido A1 - Jones, B. M. A1 - Romanovsky, Vladimir E. A1 - Boike, Julia T1 - Author Correction: Nitze, I; Grosse, G; Jones, B.M.; Romanovsky, V.E.; Boike, J.: Remote sensing quantifies widespread abundance of permafrost region disturbances across the Arctic and Subarctic. - Nature Communications. - 9 (2018), 5423 T2 - Nature Communications Y1 - 2019 U6 - https://doi.org/10.1038/s41467-019-08375-y SN - 2041-1723 VL - 10 PB - Nature Publ. Group CY - London ER - TY - GEN A1 - Ponce, Carol Barahona A1 - Scherer, Dominique A1 - Boekstegers, Felix A1 - Garate-Calderon, Valentina A1 - Jenab, Mazda A1 - Aleksandrova, Krasimira A1 - Katzke, Verena A1 - Weiderpass, Elisabete A1 - Bonet, Catalina A1 - Moradi, Tahereh A1 - Fischer, Krista A1 - Bossers, Willem A1 - Brenner, Hermann A1 - Schöttker, Ben A1 - Holleczek, Bernd A1 - Hveem, Kristian A1 - Eklund, Niina A1 - Voelker, Uwe A1 - Waldenberger, Melanie A1 - Bermejo, Justo Lorenzo T1 - Arsenic and gallbladder cancer risk BT - Mendelian randomization analysis of European prospective data T2 - International journal of cancer KW - arsenic KW - gallbladder cancer KW - Mendelian randomization Y1 - 2019 U6 - https://doi.org/10.1002/ijc.32837 SN - 0020-7136 SN - 1097-0215 VL - 146 IS - 9 SP - 2648 EP - 2650 PB - Wiley CY - Hoboken ER - TY - GEN A1 - Petruk, Oleh A1 - Kuzyo, T. A1 - Orlando, S. A1 - Pohl, Martin A1 - Miceli, M. A1 - Bocchino, F. A1 - Beshley, V. A1 - Brose, Robert T1 - Erratum: Post-adiabatic supernova remnants in an interstellar magnetic field: oblique shocks and non-uniform environment. - (Monthly notices of the Royal Astronomical Society. - 479, (2018), pg. 4253 - 4270) T2 - Monthly notices of the Royal Astronomical Society N2 - This is a correction notice for ‘Post-adiabatic supernova remnants in an interstellar magnetic field: oblique shocks and non-uniform environment’ (DOI: https://doi.org/10.1093/mnras/sty1750), which was published in MNRAS 479, 4253–4270 (2018). The publisher regrets to inform that the colour was missing from the colour scales in Figs 8(a)–(d) and Figs 9(a) and (b). This has now been corrected online. The publisher apologizes for this error. KW - errata KW - addenda KW - shock waves KW - ISM: magnetic fields KW - ISM: supernova remnants Y1 - 2018 U6 - https://doi.org/10.1093/mnras/sty2861 SN - 0035-8711 SN - 1365-2966 VL - 482 IS - 2 SP - 1979 EP - 1980 PB - Oxford Univ. Press CY - Oxford ER - TY - GEN A1 - Wagner, Dieter T1 - Editorial T2 - Journal of East European management studies : JEEMS Y1 - 2019 U6 - https://doi.org/10.5771/0949-6181-2019-1-3 SN - 0949-6181 SN - 1862-0019 VL - 24 IS - 1 SP - 3 EP - 3 PB - Nomos CY - Baden-Baden ER - TY - GEN A1 - Hickmann, Thomas A1 - Partzsch, Lena A1 - Pattberg, Philipp H. A1 - Weiland, Sabine T1 - Introduction BT - A political science perspective on the Anthropocene T2 - The Anthropocene Debate and Political Science N2 - Over the past decades, it has become more and more obvious that ongoing globalisation processes have substantial impacts on the natural environment. Studies reveal that intensified global economic relations have caused or accelerated dramatic changes in the Earth system, defined as the sum of our planet’s interacting physical, chemical, biological and human processes (Schellnhuber et al. 2004). Climate change, biodiversity loss, disrupted biogeochemical cycles, and land degradation are often cited as emblematic problems of global environmental change (Rockström et al. 2009; Steffen et al. 2015). In this context, the term Anthropocene has lately received widespread attention and gained some prominence in the academic literature Y1 - 2019 SN - 978-1-351-17412-1 SN - 978-0-8153-8614-8 U6 - https://doi.org/10.4324/9781351174121 IS - 1 SP - 1 EP - 12 PB - Routledge CY - London ER -