TY - GEN A1 - Krawietz, Marian A1 - Goebel, Jan A1 - Albrecht, Sophia A1 - Class, Fabian A1 - Kohler, Ulrich T1 - Leben in der ehemaligen DDR BT - Zusatzfragebogen im Rahmen der Befragung "Leben in Deutschland 2018" / Living in the GDR Y1 - 2019 U6 - https://doi.org/10.5684/soep.ddr18 PB - German Institute for Economic Research (DIW Berlin) CY - Berlin ER - TY - GEN A1 - Bin Tareaf, Raad A1 - Berger, Philipp A1 - Hennig, Patrick A1 - Meinel, Christoph T1 - Personality exploration system for online social networks BT - Facebook brands as a use case T2 - 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI) N2 - User-generated content on social media platforms is a rich source of latent information about individual variables. Crawling and analyzing this content provides a new approach for enterprises to personalize services and put forward product recommendations. In the past few years, brands made a gradual appearance on social media platforms for advertisement, customers support and public relation purposes and by now it became a necessity throughout all branches. This online identity can be represented as a brand personality that reflects how a brand is perceived by its customers. We exploited recent research in text analysis and personality detection to build an automatic brand personality prediction model on top of the (Five-Factor Model) and (Linguistic Inquiry and Word Count) features extracted from publicly available benchmarks. The proposed model reported significant accuracy in predicting specific personality traits form brands. For evaluating our prediction results on actual brands, we crawled the Facebook API for 100k posts from the most valuable brands' pages in the USA and we visualize exemplars of comparison results and present suggestions for future directions. KW - Big Five Model KW - Brand Personality KW - Personality Prediction KW - Machine Learning KW - Social Media Analysis Y1 - 2019 SN - 978-1-5386-7325-6 U6 - https://doi.org/10.1109/WI.2018.00-76 SP - 301 EP - 309 PB - IEEE CY - New York ER - TY - GEN A1 - Andjelkovic, Marko A1 - Babic, Milan A1 - Li, Yuanqing A1 - Schrape, Oliver A1 - Krstić, Miloš A1 - Kraemer, Rolf T1 - Use of decoupling cells for mitigation of SET effects in CMOS combinational gates T2 - 2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS) N2 - This paper investigates the applicability of CMOS decoupling cells for mitigating the Single Event Transient (SET) effects in standard combinational gates. The concept is based on the insertion of two decoupling cells between the gate's output and the power/ground terminals. To verify the proposed hardening approach, extensive SPICE simulations have been performed with standard combinational cells designed in IHP's 130 nm bulk CMOS technology. Obtained simulation results have shown that the insertion of decoupling cells results in the increase of the gate's critical charge, thus reducing the gate's soft error rate (SER). Moreover, the decoupling cells facilitate the suppression of SET pulses propagating through the gate. It has been shown that the decoupling cells may be a competitive alternative to gate upsizing and gate duplication for hardening the gates with lower critical charge and multiple (3 or 4) inputs, as well as for filtering the short SET pulses induced by low-LET particles. KW - decoupling cells KW - radiation hardening KW - SET effects KW - CMOS technology KW - combinational logic Y1 - 2019 SN - 978-1-5386-9562-3 U6 - https://doi.org/10.1109/ICECS.2018.8617996 SP - 361 EP - 364 PB - IEEE CY - New York ER - TY - GEN A1 - Sianipar, Johannes Harungguan A1 - Willems, Christian A1 - Meinel, Christoph T1 - Virtual machine integrity verification in Crowd-Resourcing Virtual Laboratory T2 - 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA) N2 - In cloud computing, users are able to use their own operating system (OS) image to run a virtual machine (VM) on a remote host. The virtual machine OS is started by the user using some interfaces provided by a cloud provider in public or private cloud. In peer to peer cloud, the VM is started by the host admin. After the VM is running, the user could get a remote access to the VM to install, configure, and run services. For the security reasons, the user needs to verify the integrity of the running VM, because a malicious host admin could modify the image or even replace the image with a similar image, to be able to get sensitive data from the VM. We propose an approach to verify the integrity of a running VM on a remote host, without using any specific hardware such as Trusted Platform Module (TPM). Our approach is implemented on a Linux platform where the kernel files (vmlinuz and initrd) could be replaced with new files, while the VM is running. kexec is used to reboot the VM with the new kernel files. The new kernel has secret codes that will be used to verify whether the VM was started using the new kernel files. The new kernel is used to further measuring the integrity of the running VM. KW - Virtual Machine KW - Integrity Verification KW - Crowd-Resourcing KW - Cloud Computing Y1 - 2019 SN - 978-1-5386-9133-5 U6 - https://doi.org/10.1109/SOCA.2018.00032 SN - 2163-2871 SP - 169 EP - 176 PB - IEEE CY - New York ER - TY - GEN A1 - Brand, Thomas A1 - Giese, Holger Burkhard T1 - Towards Generic Adaptive Monitoring T2 - 2018 IEEE 12th International Conference on Self-Adaptive and Self-Organizing Systems (SASO) N2 - Monitoring is a key prerequisite for self-adaptive software and many other forms of operating software. Monitoring relevant lower level phenomena like the occurrences of exceptions and diagnosis data requires to carefully examine which detailed information is really necessary and feasible to monitor. Adaptive monitoring permits observing a greater variety of details with less overhead, if most of the time the MAPE-K loop can operate using only a small subset of all those details. However, engineering such an adaptive monitoring is a major engineering effort on its own that further complicates the development of self-adaptive software. The proposed approach overcomes the outlined problems by providing generic adaptive monitoring via runtime models. It reduces the effort to introduce and apply adaptive monitoring by avoiding additional development effort for controlling the monitoring adaptation. Although the generic approach is independent from the monitoring purpose, it still allows for substantial savings regarding the monitoring resource consumption as demonstrated by an example. Y1 - 2019 SN - 978-1-5386-5172-8 U6 - https://doi.org/10.1109/SASO.2018.00027 SN - 1949-3673 SP - 156 EP - 161 PB - IEEE CY - New York ER - TY - GEN A1 - Sianipar, Johannes Harungguan A1 - Sukmana, Muhammad Ihsan Haikal A1 - Meinel, Christoph T1 - Moving sensitive data against live memory dumping, spectre and meltdown attacks T2 - 26th International Conference on Systems Engineering (ICSEng) N2 - The emergence of cloud computing allows users to easily host their Virtual Machines with no up-front investment and the guarantee of always available anytime anywhere. But with the Virtual Machine (VM) is hosted outside of user's premise, the user loses the physical control of the VM as it could be running on untrusted host machines in the cloud. Malicious host administrator could launch live memory dumping, Spectre, or Meltdown attacks in order to extract sensitive information from the VM's memory, e.g. passwords or cryptographic keys of applications running in the VM. In this paper, inspired by the moving target defense (MTD) scheme, we propose a novel approach to increase the security of application's sensitive data in the VM by continuously moving the sensitive data among several memory allocations (blocks) in Random Access Memory (RAM). A movement function is added into the application source code in order for the function to be running concurrently with the application's main function. Our approach could reduce the possibility of VM's sensitive data in the memory to be leaked into memory dump file by 2 5% and secure the sensitive data from Spectre and Meltdown attacks. Our approach's overhead depends on the number and the size of the sensitive data. KW - Virtual Machine KW - Memory Dumping KW - Security KW - Cloud Computing KW - Spectre KW - Meltdown Y1 - 2019 SN - 978-1-5386-7834-3 PB - IEEE CY - New York ER - TY - GEN A1 - Richly, Keven T1 - Leveraging spatio-temporal soccer data to define a graphical query language for game recordings T2 - IEEE International Conference on Big Data (Big Data) N2 - For professional soccer clubs, performance and video analysis are an integral part of the preparation and post-processing of games. Coaches, scouts, and video analysts extract information about strengths and weaknesses of their team as well as opponents by manually analyzing video recordings of past games. Since video recordings are an unstructured data source, it is a complex and time-intensive task to find specific game situations and identify similar patterns. In this paper, we present a novel approach to detect patterns and situations (e.g., playmaking and ball passing of midfielders) based on trajectory data. The application uses the metaphor of a tactic board to offer a graphical query language. With this interactive tactic board, the user can model a game situation or mark a specific situation in the video recording for which all matching occurrences in various games are immediately displayed, and the user can directly jump to the corresponding game scene. Through the additional visualization of key performance indicators (e.g.,the physical load of the players), the user can get a better overall assessment of situations. With the capabilities to find specific game situations and complex patterns in video recordings, the interactive tactic board serves as a useful tool to improve the video analysis process of professional sports teams. KW - Spatio-temporal data analysis KW - soccer analytics KW - graphical query language Y1 - 2019 SN - 978-1-5386-5035-6 U6 - https://doi.org/10.1109/BigData.2018.8622159 SN - 2639-1589 SP - 3456 EP - 3463 PB - IEEE CY - New York ER - TY - GEN A1 - Richly, Keven T1 - A survey on trajectory data management for hybrid transactional and analytical workloads T2 - IEEE International Conference on Big Data (Big Data) N2 - Rapid advances in location-acquisition technologies have led to large amounts of trajectory data. This data is the foundation for a broad spectrum of services driven and improved by trajectory data mining. However, for hybrid transactional and analytical workloads, the storing and processing of rapidly accumulated trajectory data is a non-trivial task. In this paper, we present a detailed survey about state-of-the-art trajectory data management systems. To determine the relevant aspects and requirements for such systems, we developed a trajectory data mining framework, which summarizes the different steps in the trajectory data mining process. Based on the derived requirements, we analyze different concepts to store, compress, index, and process spatio-temporal data. There are various trajectory management systems, which are optimized for scalability, data footprint reduction, elasticity, or query performance. To get a comprehensive overview, we describe and compare different exciting systems. Additionally, the observed similarities in the general structure of different systems are consolidated in a general blueprint of trajectory management systems. KW - Trajectory Data Management KW - Spatio-Temporal Data KW - Survey Y1 - 2019 SN - 978-1-5386-5035-6 U6 - https://doi.org/10.1109/BigData.2018.8622394 SN - 2639-1589 SP - 562 EP - 569 PB - IEEE CY - New York ER - TY - GEN A1 - Zarriess, Sina A1 - Schlangen, David T1 - Objects of Unknown Categories T2 - The 57th Annual Meeting of the Association for Computational Linguistics N2 - Zero-shot learning in Language & Vision is the task of correctly labelling (or naming) objects of novel categories. Another strand of work in L&V aims at pragmatically informative rather than "correct" object descriptions, e.g. in reference games. We combine these lines of research and model zero-shot reference games, where a speaker needs to successfully refer to a novel object in an image. Inspired by models of "rational speech acts", we extend a neural generator to become a pragmatic speaker reasoning about uncertain object categories. As a result of this reasoning, the generator produces fewer nouns and names of distractor categories as compared to a literal speaker. We show that this conversational strategy for dealing with novel objects often improves communicative success, in terms of resolution accuracy of an automatic listener. Y1 - 2019 SN - 978-1-950737-48-2 SP - 654 EP - 659 PB - Association for Computational Linguistics CY - Stroudsburg ER - TY - GEN A1 - Finch, Nicolle L. A1 - Braker, I. P. A1 - Reindl, Nicole A1 - Barstow, Martin A. A1 - Casewell, Sarah L. A1 - Burleigh, M. A1 - Kupfer, Thomas A1 - Kilkenny, D. A1 - Geier, Stephan Alfred A1 - Schaffenroth, Veronika A1 - Bertolami Miller, Marcelo Miguel A1 - Taubenberger, Stefan A1 - Freudenthal, Joseph T1 - Spectral Analysis of Binary Pre-white Dwarf Systems T2 - Radiative signatures from the cosmos N2 - Short period double degenerate white dwarf (WD) binaries with periods of less than similar to 1 day are considered to be one of the likely progenitors of type Ia supernovae. These binaries have undergone a period of common envelope evolution. If the core ignites helium before the envelope is ejected, then a hot subdwarf remains prior to contracting into a WD. Here we present a comparison of two very rare systems that contain two hot subdwarfs in short period orbits. We provide a quantitative spectroscopic analysis of the systems using synthetic spectra from state-of-the-art non-LTE models to constrain the atmospheric parameters of the stars. We also use these models to determine the radial velocities, and thus calculate dynamical masses for the stars in each system. Y1 - 2019 SN - 978-1-58381-925-8 SN - 1050-3390 VL - 519 SP - 231 EP - 238 PB - Astronomical soc pacific CY - San Fransisco ER - TY - GEN A1 - Kubatova, Brankica A1 - Hamann, Wolf-Rainer A1 - Kubat, Jiri A1 - Oskinova, Lida T1 - 3D Monte Carlo Radiative Transfer in Inhomogeneous Massive Star Winds BT - Application to Resonance Line Formation T2 - Radiative signatures from the cosmos N2 - Already for decades it has been known that the winds of massive stars are inhomogeneous (i.e. clumped). To properly model observed spectra of massive star winds it is necessary to incorporate the 3-D nature of clumping into radiative transfer calculations. In this paper we present our full 3-D Monte Carlo radiative transfer code for inhomogeneous expanding stellar winds. We use a set of parameters to describe dense as well as the rarefied wind components. At the same time, we account for non-monotonic velocity fields. We show how the 3-D density and velocity wind inhomogeneities strongly affect the resonance line formation. We also show how wind clumping can solve the discrepancy between P v and H alpha mass-loss rate diagnostics. Y1 - 2019 SN - 978-1-58381-925-8 SN - 1050-3390 VL - 519 SP - 209 EP - 212 PB - Astronomical soc pacific CY - San Fransisco ER - TY - GEN A1 - Dolezalova, Barbora A1 - Kubatova, Brankica A1 - Kubat, Jiri A1 - Hamann, Wolf-Rainer T1 - The Quasi-WR Star HD 45166 Revisited T2 - Radiative signatures from the cosmos N2 - We studied the wind of the quasi Wolf-Rayet (qWR) star HD 45166. As a first step we modeled the observed UV spectra of this star by means of the state-of-the-art Potsdam Wolf-Rayet (PoWR) atmosphere code. We inferred the wind parameters and compared them with previous findings. Y1 - 2019 SN - 978-1-58381-925-8 SN - 1050-3390 VL - 519 SP - 197 EP - 200 PB - Astronomical soc pacific CY - San Fransisco ER - TY - GEN A1 - Staubitz, Thomas A1 - Meinel, Christoph T1 - Graded Team Assignments in MOOCs BT - Effects of Team Composition and Further Factors on Team Dropout Rates and Performance T2 - SCALE N2 - The ability to work in teams is an important skill in today's work environments. In MOOCs, however, team work, team tasks, and graded team-based assignments play only a marginal role. To close this gap, we have been exploring ways to integrate graded team-based assignments in MOOCs. Some goals of our work are to determine simple criteria to match teams in a volatile environment and to enable a frictionless online collaboration for the participants within our MOOC platform. The high dropout rates in MOOCs pose particular challenges for team work in this context. By now, we have conducted 15 MOOCs containing graded team-based assignments in a variety of topics. The paper at hand presents a study that aims to establish a solid understanding of the participants in the team tasks. Furthermore, we attempt to determine which team compositions are particularly successful. Finally, we examine how several modifications to our platform's collaborative toolset have affected the dropout rates and performance of the teams. KW - Teamwork KW - MOOCs KW - Team-based Learning KW - Team Assessment KW - Peer Assessment KW - Project-based learning Y1 - 2019 SN - 978-1-4503-6804-9 U6 - https://doi.org/10.1145/3330430.3333619 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Bock, Benedikt A1 - Matysik, Jan-Tobias A1 - Krentz, Konrad-Felix A1 - Meinel, Christoph T1 - Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme T2 - 2019 IEEE 5TH World Forum on internet of things (WF-IOT) N2 - While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap. KW - IEEE 802.15.4 KW - key management KW - key establishment KW - key revocation KW - rekeying KW - link layer security KW - MAC security Y1 - 2019 SN - 978-1-5386-4980-0 U6 - https://doi.org/10.1109/WF-IoT.2019.8767211 SP - 374 EP - 379 PB - IEEE CY - New York ER - TY - GEN A1 - Fischer, Martin H. A1 - Shaki, Samuel T1 - How to make talks less boring T2 - Nature : the international weekly journal of science Y1 - 2019 U6 - https://doi.org/10.1038/d41586-019-00153-6 SN - 0028-0836 SN - 1476-4687 VL - 565 IS - 7739 SP - 294 EP - 294 PB - Nature Publ. Group CY - London ER - TY - GEN A1 - Nitze, Ingmar A1 - Grosse, Guido A1 - Jones, B. M. A1 - Romanovsky, Vladimir E. A1 - Boike, Julia T1 - Author Correction: Nitze, I; Grosse, G; Jones, B.M.; Romanovsky, V.E.; Boike, J.: Remote sensing quantifies widespread abundance of permafrost region disturbances across the Arctic and Subarctic. - Nature Communications. - 9 (2018), 5423 T2 - Nature Communications Y1 - 2019 U6 - https://doi.org/10.1038/s41467-019-08375-y SN - 2041-1723 VL - 10 PB - Nature Publ. Group CY - London ER - TY - GEN A1 - Ponce, Carol Barahona A1 - Scherer, Dominique A1 - Boekstegers, Felix A1 - Garate-Calderon, Valentina A1 - Jenab, Mazda A1 - Aleksandrova, Krasimira A1 - Katzke, Verena A1 - Weiderpass, Elisabete A1 - Bonet, Catalina A1 - Moradi, Tahereh A1 - Fischer, Krista A1 - Bossers, Willem A1 - Brenner, Hermann A1 - Schöttker, Ben A1 - Holleczek, Bernd A1 - Hveem, Kristian A1 - Eklund, Niina A1 - Voelker, Uwe A1 - Waldenberger, Melanie A1 - Bermejo, Justo Lorenzo T1 - Arsenic and gallbladder cancer risk BT - Mendelian randomization analysis of European prospective data T2 - International journal of cancer KW - arsenic KW - gallbladder cancer KW - Mendelian randomization Y1 - 2019 U6 - https://doi.org/10.1002/ijc.32837 SN - 0020-7136 SN - 1097-0215 VL - 146 IS - 9 SP - 2648 EP - 2650 PB - Wiley CY - Hoboken ER - TY - GEN A1 - Petruk, Oleh A1 - Kuzyo, T. A1 - Orlando, S. A1 - Pohl, Martin A1 - Miceli, M. A1 - Bocchino, F. A1 - Beshley, V. A1 - Brose, Robert T1 - Erratum: Post-adiabatic supernova remnants in an interstellar magnetic field: oblique shocks and non-uniform environment. - (Monthly notices of the Royal Astronomical Society. - 479, (2018), pg. 4253 - 4270) T2 - Monthly notices of the Royal Astronomical Society N2 - This is a correction notice for ‘Post-adiabatic supernova remnants in an interstellar magnetic field: oblique shocks and non-uniform environment’ (DOI: https://doi.org/10.1093/mnras/sty1750), which was published in MNRAS 479, 4253–4270 (2018). The publisher regrets to inform that the colour was missing from the colour scales in Figs 8(a)–(d) and Figs 9(a) and (b). This has now been corrected online. The publisher apologizes for this error. KW - errata KW - addenda KW - shock waves KW - ISM: magnetic fields KW - ISM: supernova remnants Y1 - 2018 U6 - https://doi.org/10.1093/mnras/sty2861 SN - 0035-8711 SN - 1365-2966 VL - 482 IS - 2 SP - 1979 EP - 1980 PB - Oxford Univ. Press CY - Oxford ER - TY - GEN A1 - Wagner, Dieter T1 - Editorial T2 - Journal of East European management studies : JEEMS Y1 - 2019 U6 - https://doi.org/10.5771/0949-6181-2019-1-3 SN - 0949-6181 SN - 1862-0019 VL - 24 IS - 1 SP - 3 EP - 3 PB - Nomos CY - Baden-Baden ER - TY - GEN A1 - Hickmann, Thomas A1 - Partzsch, Lena A1 - Pattberg, Philipp H. A1 - Weiland, Sabine T1 - Introduction BT - A political science perspective on the Anthropocene T2 - The Anthropocene Debate and Political Science N2 - Over the past decades, it has become more and more obvious that ongoing globalisation processes have substantial impacts on the natural environment. Studies reveal that intensified global economic relations have caused or accelerated dramatic changes in the Earth system, defined as the sum of our planet’s interacting physical, chemical, biological and human processes (Schellnhuber et al. 2004). Climate change, biodiversity loss, disrupted biogeochemical cycles, and land degradation are often cited as emblematic problems of global environmental change (Rockström et al. 2009; Steffen et al. 2015). In this context, the term Anthropocene has lately received widespread attention and gained some prominence in the academic literature Y1 - 2019 SN - 978-1-351-17412-1 SN - 978-0-8153-8614-8 U6 - https://doi.org/10.4324/9781351174121 IS - 1 SP - 1 EP - 12 PB - Routledge CY - London ER - TY - GEN A1 - Ette, Ottmar T1 - Alexander von Humboldt y América Latina BT - Introducción T2 - Iberoamericana N2 - Basándose en el conjunto de la obra humboldtiana, desde sus comienzos hasta el Cosmos, este dossier trata de destacar la orientación cosmopolita del sabio prusiano así como, sobre todo, el fundamento americano de sus enfoques. El continente americano, para Humboldt, representa la diversidad de lo pensable y la multirrelacionalidad de lo imaginable: la llave para entender su cosmovisión. Y1 - 2019 U6 - https://doi.org/10.18441/ibam.19.2019.70.7-8 SN - 1577-3388 SN - 2255-520X VL - 19 IS - 70 SP - 7 EP - 8 PB - Vervuert CY - Frankfurt am Main ER - TY - GEN A1 - Awasthi, Swapnil A1 - Kaminski, Jakob A1 - Rapp, Michael Armin A1 - Schlagenhauf, Florian A1 - Walter, Henrik A1 - Ruggeri, Barbara A1 - Ripke, Stephan A1 - Schumann, Gunter A1 - Heinz, Andreas T1 - A neural signature of malleability BT - general intelligence correlates with ventral striatal activation and epigenetic makers of dopamine neurotransmission T2 - European neuropsychopharmacology : the journal of the European College of Neuropsychopharmacology N2 - General intelligence has a substantial genetic background in children, adolescents, and adults, but environmental factors also strongly correlate with cognitive performance as evidenced by a strong (up to one SD) increase in average intelligence test results in the second half of the previous century. This change occurred in a period apparently too short to accommodate radical genetic changes. It is highly suggestive that environmental factors interact with genotype by possible modification of epigenetic factors that regulate gene expression and thus contribute to individual malleability. This modification might as well be reflected in recent observations of an association between dopamine-dependent encoding of reward prediction errors and cognitive capacity, which was modulated by adverse life events. Y1 - 2019 U6 - https://doi.org/10.1016/j.euroneuro.2017.08.139 SN - 0924-977X SN - 1873-7862 VL - 29 SP - S858 EP - S859 PB - Elsevier CY - Amsterdam ER - TY - GEN A1 - Ullrich, Andre A1 - Enke, Judith A1 - Teichmann, Malte A1 - Kress, Antonio A1 - Gronau, Norbert T1 - Audit - and then what? BT - a roadmap for digitization of learning factories T2 - Procedia Manufacturing N2 - Current trends such as digital transformation, Internet of Things, or Industry 4.0 are challenging the majority of learning factories. Regardless of whether a conventional learning factory, a model factory, or a digital learning factory, traditional approaches such as the monotonous execution of specific instructions don‘t suffice the learner’s needs, market requirements as well as especially current technological developments. Contemporary teaching environments need a clear strategy, a road to follow for being able to successfully cope with the changes and develop towards digitized learning factories. This demand driven necessity of transformation leads to another obstacle: Assessing the status quo and developing and implementing adequate action plans. Within this paper, details of a maturity-based audit of the hybrid learning factory in the Research and Application Centre Industry 4.0 and a thereof derived roadmap for the digitization of a learning factory are presented. KW - Audit KW - Digitization KW - Learning Factory KW - Roadmap Y1 - 2019 U6 - https://doi.org/10.1016/j.promfg.2019.03.025 SN - 2351-9789 VL - 31 SP - 162 EP - 168 PB - Elsevier CY - Amsterdam ER - TY - GEN A1 - Teichmann, Malte A1 - Ullrich, Andre A1 - Gronau, Norbert T1 - Subject-oriented learning BT - a new perspective for vocational training in learning factories T2 - Procedia Manufacturing N2 - The transformation to a digitized company changes not only the work but also social context for the employees and requires inter alia new knowledge and skills from them. Additionally, individual action problems arise. This contribution proposes the subject-oriented learning theory, in which the employees´ action problems are the starting point of training activities in learning factories. In this contribution, the subject-oriented learning theory is exemplified and respective advantages for vocational training in learning factories are pointed out both theoretically and practically. Thereby, especially the individual action problems of learners and the infrastructure are emphasized as starting point for learning processes and competence development. KW - Subject-oriented learning KW - action problems KW - vocational training KW - learning factories Y1 - 2019 U6 - https://doi.org/10.1016/j.promfg.2019.03.012 SN - 2351-9789 VL - 31 SP - 72 EP - 78 PB - Elsevier CY - Amsterdam ER - TY - GEN A1 - Podlesny, Nikolai Jannik A1 - Kayem, Anne V. D. M. A1 - Meinel, Christoph T1 - Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymisation T2 - Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy N2 - High-dimensional data is particularly useful for data analytics research. In the healthcare domain, for instance, high-dimensional data analytics has been used successfully for drug discovery. Yet, in order to adhere to privacy legislation, data analytics service providers must guarantee anonymity for data owners. In the context of high-dimensional data, ensuring privacy is challenging because increased data dimensionality must be matched by an exponential growth in the size of the data to avoid sparse datasets. Syntactically, anonymising sparse datasets with methods that rely of statistical significance, makes obtaining sound and reliable results, a challenge. As such, strong privacy is only achievable at the cost of high information loss, rendering the data unusable for data analytics. In this paper, we make two contributions to addressing this problem from both the privacy and information loss perspectives. First, we show that by identifying dependencies between attribute subsets we can eliminate privacy violating attributes from the anonymised dataset. Second, to minimise information loss, we employ a greedy search algorithm to determine and eliminate maximal partial unique attribute combinations. Thus, one only needs to find the minimal set of identifying attributes to prevent re-identification. Experiments on a health cloud based on the SAP HANA platform using a semi-synthetic medical history dataset comprised of 109 attributes, demonstrate the effectiveness of our approach. Y1 - 2019 SN - 978-1-4503-6099-9 U6 - https://doi.org/10.1145/3292006.3300019 SP - 109 EP - 119 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Loupos, Konstantinos A1 - Damigos, Yannis A1 - Tsertou, Athanasisa A1 - Amditis, Angelos A1 - Lenas, Sotiris-Angelos A1 - Chatziandreoglou, Chistos A1 - Malliou, Christina A1 - Tsaoussidis, Vassilis A1 - Gerhard, Reimund A1 - Rychkov, Dmitry A1 - Wirges, Werner A1 - Frankenstein, Bernd A1 - Camarinopoulos, Stephanos A1 - Kalidromitis, Vassilis A1 - Sanna, C. A1 - Maier, Stephanos A1 - Gordt, A. A1 - Panetsos, P. T1 - Innovative soft-material sensor, wireless network and assessment software for bridge life-cycle assessment T2 - Life-cycle analysis and assessmanet in civil engineering : towards an integrated vision N2 - Nowadays, structural health monitoring of critical infrastructures is considered as of primal importance especially for managing transport infrastructure however most current SHM methodologies are based on point-sensors that show various limitations relating to their spatial positioning capabilities, cost of development and measurement range. This publication describes the progress in the SENSKIN EC co-funded research project that is developing a dielectric-elastomer sensor, formed from a large highly extensible capacitance sensing membrane and is supported by an advanced micro-electronic circuitry, for monitoring transport infrastructure bridges. The sensor under development provides spatial measurements of strain in excess of 10%, while the sensing system is being designed to be easy to install, require low power in operation concepts, require simple signal processing, and have the ability to self-monitor and report. An appropriate wireless sensor network is also being designed and developed supported by local gateways for the required data collection and exploitation. SENSKIN also develops a Decision-Support-System (DSS) for proactive condition-based structural interventions under normal operating conditions and reactive emergency intervention following an extreme event. The latter is supported by a life-cycle-costing (LCC) and life-cycle-assessment (LCA) module responsible for the total internal and external costs for the identified bridge rehabilitation, analysis of options, yielding figures for the assessment of the economic implications of the bridge rehabilitation work and the environmental impacts of the bridge rehabilitation options and of the associated secondary effects respectively. The overall monitoring system will be evaluated and benchmarked on actual bridges of Egnatia Highway (Greece) and Bosporus Bridge (Turkey). Y1 - 2019 SN - 978-1-315-22891-4 SN - 978-1-138-62633-1 SP - 2085 EP - 2092 PB - CRC Press, Taylor & Francis Group CY - Boca Raton ER - TY - GEN A1 - Bucholtz, Erika A1 - Nachama, Andreas A1 - Schueler-Springorum, Stefanie A1 - Wyrwa, Ulrich T1 - Editorial T2 - Deutsche Zeitschrift für Geschichtswissenschaft Y1 - 2019 SN - 0044-2828 VL - 67 IS - 5 SP - 393 EP - 394 PB - Metropol-Verl. CY - Berlin ER - TY - GEN A1 - Friedrich, Tobias T1 - From graph theory to network science BT - the natural emergence of hyperbolicity (Tutorial) T2 - 36th International Symposium on Theoretical Aspects of Computer Science (STACS 2019) N2 - Network science is driven by the question which properties large real-world networks have and how we can exploit them algorithmically. In the past few years, hyperbolic graphs have emerged as a very promising model for scale-free networks. The connection between hyperbolic geometry and complex networks gives insights in both directions: (1) Hyperbolic geometry forms the basis of a natural and explanatory model for real-world networks. Hyperbolic random graphs are obtained by choosing random points in the hyperbolic plane and connecting pairs of points that are geometrically close. The resulting networks share many structural properties for example with online social networks like Facebook or Twitter. They are thus well suited for algorithmic analyses in a more realistic setting. (2) Starting with a real-world network, hyperbolic geometry is well-suited for metric embeddings. The vertices of a network can be mapped to points in this geometry, such that geometric distances are similar to graph distances. Such embeddings have a variety of algorithmic applications ranging from approximations based on efficient geometric algorithms to greedy routing solely using hyperbolic coordinates for navigation decisions. KW - Graph Theory KW - Graph Algorithms KW - Network Science KW - Hyperbolic Geometry Y1 - 2019 SN - 978-3-95977-100-9 U6 - https://doi.org/10.4230/LIPIcs.STACS.2019.5 VL - 126 PB - Schloss Dagstuhl-Leibniz-Zentrum für Informatik CY - Dragstuhl ER - TY - GEN A1 - Welearegai, Gebrehiwet B. A1 - Schlueter, Max A1 - Hammer, Christian T1 - Static security evaluation of an industrial web application T2 - Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing N2 - JavaScript is the most popular programming language for web applications. Static analysis of JavaScript applications is highly challenging due to its dynamic language constructs and event-driven asynchronous executions, which also give rise to many security-related bugs. Several static analysis tools to detect such bugs exist, however, research has not yet reported much on the precision and scalability trade-off of these analyzers. As a further obstacle, JavaScript programs structured in Node. js modules need to be collected for analysis, but existing bundlers are either specific to their respective analysis tools or not particularly suitable for static analysis. KW - JavaScript KW - WALA KW - SAFE KW - comparison Y1 - 2019 SN - 978-1-4503-5933-7 U6 - https://doi.org/10.1145/3297280.3297471 SP - 1952 EP - 1961 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Chakraborty, Dhiman A1 - Hammer, Christian A1 - Bugiel, Sven T1 - Secure Multi-Execution in Android T2 - Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing N2 - Mobile operating systems, such as Google's Android, have become a fixed part of our daily lives and are entrusted with a plethora of private information. Congruously, their data protection mechanisms have been improved steadily over the last decade and, in particular, for Android, the research community has explored various enhancements and extensions to the access control model. However, the vast majority of those solutions has been concerned with controlling the access to data, but equally important is the question of how to control the flow of data once released. Ignoring control over the dissemination of data between applications or between components of the same app, opens the door for attacks, such as permission re-delegation or privacy-violating third-party libraries. Controlling information flows is a long-standing problem, and one of the most recent and practical-oriented approaches to information flow control is secure multi-execution. In this paper, we present Ariel, the design and implementation of an IFC architecture for Android based on the secure multi-execution of apps. Ariel demonstrably extends Android's system with support for executing multiple instances of apps, and it is equipped with a policy lattice derived from the protection levels of Android's permissions as well as an I/O scheduler to achieve control over data flows between application instances. We demonstrate how secure multi-execution with Ariel can help to mitigate two prominent attacks on Android, permission re-delegations and malicious advertisement libraries. KW - Android KW - Information flow control KW - secure multi-execution Y1 - 2019 SN - 978-1-4503-5933-7 U6 - https://doi.org/10.1145/3297280.3297469 SP - 1934 EP - 1943 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Alhosseini Almodarresi Yasin, Seyed Ali A1 - Bin Tareaf, Raad A1 - Najafi, Pejman A1 - Meinel, Christoph T1 - Detect me if you can BT - Spam Bot Detection Using Inductive Representation Learning T2 - Companion Proceedings of The 2019 World Wide Web Conference N2 - Spam Bots have become a threat to online social networks with their malicious behavior, posting misinformation messages and influencing online platforms to fulfill their motives. As spam bots have become more advanced over time, creating algorithms to identify bots remains an open challenge. Learning low-dimensional embeddings for nodes in graph structured data has proven to be useful in various domains. In this paper, we propose a model based on graph convolutional neural networks (GCNN) for spam bot detection. Our hypothesis is that to better detect spam bots, in addition to defining a features set, the social graph must also be taken into consideration. GCNNs are able to leverage both the features of a node and aggregate the features of a node’s neighborhood. We compare our approach, with two methods that work solely on a features set and on the structure of the graph. To our knowledge, this work is the first attempt of using graph convolutional neural networks in spam bot detection. KW - Social Media Analysis KW - Bot Detection KW - Graph Embedding KW - Graph Convolutional Neural Networks Y1 - 2019 SN - 978-1-4503-6675-5 U6 - https://doi.org/10.1145/3308560.3316504 SP - 148 EP - 153 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Renz, Jan A1 - Meinel, Christoph T1 - The "Bachelor Project" BT - Project Based Computer Science Education T2 - 2019 IEEE Global Engineering Education Conference (EDUCON) N2 - One of the challenges of educating the next generation of computer scientists is to teach them to become team players, that are able to communicate and interact not only with different IT systems, but also with coworkers and customers with a non-it background. The “bachelor project” is a project based on team work and a close collaboration with selected industry partners. The authors hosted some of the teams since spring term 2014/15. In the paper at hand we explain and discuss this concept and evaluate its success based on students' evaluation and reports. Furthermore, the technology-stack that has been used by the teams is evaluated to understand how self-organized students in IT-related projects work. We will show that and why the bachelor is the most successful educational format in the perception of the students and how this positive results can be improved by the mentors. KW - computer science education KW - project based learning KW - bachelor project Y1 - 2019 SN - 978-1-5386-9506-7 U6 - https://doi.org/10.1109/EDUCON.2019.8725140 SN - 2165-9567 SP - 580 EP - 587 PB - IEEE CY - New York ER - TY - GEN A1 - Giese, Holger Burkhard T1 - Software Engineering for Smart Cyber-Physical Systems BT - Challenges and Opportunities T2 - Proceedings of the 12th Innovations on Software Engineering Conference N2 - Currently, a transformation of our technical world into a networked technical world where besides the embedded systems with their interaction with the physical world the interconnection of these nodes in the cyber world becomes a reality can be observed. In parallel nowadays there is a strong trend to employ artificial intelligence techniques and in particular machine learning to make software behave smart. Often cyber-physical systems must be self-adaptive at the level of the individual systems to operate as elements in open, dynamic, and deviating overall structures and to adapt to open and dynamic contexts while being developed, operated, evolved, and governed independently. In this presentation, we will first discuss the envisioned future scenarios for cyber-physical systems with an emphasis on the synergies networking can offer and then characterize which challenges for the design, production, and operation of these systems result. We will then discuss to what extent our current capabilities, in particular concerning software engineering match these challenges and where substantial improvements for the software engineering are crucial. In today's software engineering for embedded systems models are used to plan systems upfront to maximize envisioned properties on the one hand and minimize cost on the other hand. When applying the same ideas to software for smart cyber-physical systems, it soon turned out that for these systems often somehow more subtle links between the involved models and the requirements, users, and environment exist. Self-adaptation and runtime models have been advocated as concepts to covers the demands that result from these subtler links. Lately, both trends have been brought together more thoroughly by the notion of self-aware computing systems. We will review the underlying causes, discuss some our work in this direction, and outline related open challenges and potential for future approaches to software engineering for smart cyber-physical systems. KW - Software Engineering KW - Cyber-Physical Systems KW - Self-aware computing systems Y1 - 2019 SN - 978-1-4503-6215-3 U6 - https://doi.org/10.1145/3299771.3301650 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Staubitz, Thomas A1 - Teusner, Ralf A1 - Meinel, Christoph T1 - MOOCs in Secondary Education BT - Experiments and Observations from German Classrooms T2 - 2019 IEEE Global Engineering Education Conference (EDUCON) N2 - Computer science education in German schools is often less than optimal. It is only mandatory in a few of the federal states and there is a lack of qualified teachers. As a MOOC (Massive Open Online Course) provider with a German background, we developed the idea to implement a MOOC addressing pupils in secondary schools to fill this gap. The course targeted high school pupils and enabled them to learn the Python programming language. In 2014, we successfully conducted the first iteration of this MOOC with more than 7000 participants. However, the share of pupils in the course was not quite satisfactory. So we conducted several workshops with teachers to find out why they had not used the course to the extent that we had imagined. The paper at hand explores and discusses the steps we have taken in the following years as a result of these workshops. KW - MOOC KW - Secondary Education KW - School KW - Teamwork KW - K-12 KW - Programming course KW - Java KW - Python Y1 - 2019 SN - 978-1-5386-9506-7 U6 - https://doi.org/10.1109/EDUCON.2019.8725138 SN - 2165-9567 SP - 173 EP - 182 PB - IEEE CY - New York ER - TY - GEN A1 - Grote, Jürgen R. A1 - Wagemann, Claudius T1 - Preface T2 - Social Movements and Organized Labour. Passions and Interests Y1 - 2019 SN - 978-1-315-60955-3 SN - 978-1-4724-7204-5 SP - X EP - XII PB - Routledge CY - Abingdon ER - TY - GEN A1 - Sukmana, Muhammad Ihsan Haikal A1 - Torkura, Kennedy A. A1 - Graupner, Hendrik A1 - Cheng, Feng A1 - Meinel, Christoph T1 - Unified Cloud Access Control Model for Cloud Storage Broker T2 - 33rd International Conference on Information Networking (ICOIN 2019) N2 - Cloud Storage Broker (CSB) provides value-added cloud storage service for enterprise usage by leveraging multi-cloud storage architecture. However, it raises several challenges for managing resources and its access control in multiple Cloud Service Providers (CSPs) for authorized CSB stakeholders. In this paper we propose unified cloud access control model that provides the abstraction of CSP's services for centralized and automated cloud resource and access control management in multiple CSPs. Our proposal offers role-based access control for CSB stakeholders to access cloud resources by assigning necessary privileges and access control list for cloud resources and CSB stakeholders, respectively, following privilege separation concept and least privilege principle. We implement our unified model in a CSB system called CloudRAID for Business (CfB) with the evaluation result shows it provides system-and-cloud level security service for cfB and centralized resource and access control management in multiple CSPs. KW - Cloud Storage Broker KW - Cloud access control and resource management KW - Unified cloud model KW - Privilege separation concept KW - Least privilege principle KW - Role-based access control Y1 - 2019 SN - 978-1-5386-8350-7 U6 - https://doi.org/10.1109/ICOIN.2019.8717982 SN - 1976-7684 SP - 60 EP - 65 PB - IEEE CY - Los Alamitos ER - TY - GEN A1 - Halfpap, Stefan A1 - Schlosser, Rainer T1 - A Comparison of Allocation Algorithms for Partially Replicated Databases T2 - 2019 IEEE 35th International Conference on Data Engineering (ICDE) N2 - Increasing demand for analytical processing capabilities can be managed by replication approaches. However, to evenly balance the replicas' workload shares while at the same time minimizing the data replication factor is a highly challenging allocation problem. As optimal solutions are only applicable for small problem instances, effective heuristics are indispensable. In this paper, we test and compare state-of-the-art allocation algorithms for partial replication. By visualizing and exploring their (heuristic) solutions for different benchmark workloads, we are able to derive structural insights and to detect an algorithm's strengths as well as its potential for improvement. Further, our application enables end-to-end evaluations of different allocations to verify their theoretical performance. Y1 - 2019 SN - 978-1-5386-7474-1 SN - 978-1-5386-7475-8 U6 - https://doi.org/10.1109/ICDE.2019.00226 SN - 1084-4627 SN - 2375-026X SN - 1063-6382 SP - 2008 EP - 2011 PB - IEEE CY - New York ER - TY - GEN A1 - Halfpap, Stefan A1 - Schlosser, Rainer T1 - Workload-Driven Fragment Allocation for Partially Replicated Databases Using Linear Programming T2 - 2019 IEEE 35th International Conference on Data Engineering (ICDE) N2 - In replication schemes, replica nodes can process read-only queries on snapshots of the master node without violating transactional consistency. By analyzing the workload, we can identify query access patterns and replicate data depending to its access frequency. In this paper, we define a linear programming (LP) model to calculate the set of partial replicas with the lowest overall memory capacity while evenly balancing the query load. Furthermore, we propose a scalable decomposition heuristic to calculate solutions for larger problem sizes. While guaranteeing the same performance as state-of-the-art heuristics, our decomposition approach calculates allocations with up to 23% lower memory footprint for the TPC-H benchmark. KW - database replication KW - allocation problem KW - linear programming Y1 - 2019 SN - 978-1-5386-7474-1 SN - 978-1-5386-7475-8 U6 - https://doi.org/10.1109/ICDE.2019.00188 SN - 1084-4627 SN - 2375-026X SN - 1063-6382 SP - 1746 EP - 1749 PB - IEEE CY - New York ER - TY - GEN A1 - Kruse, Sebastian A1 - Kaoudi, Zoi A1 - Quiane-Ruiz, Jorge-Arnulfo A1 - Chawla, Sanjay A1 - Naumann, Felix A1 - Contreras-Rojas, Bertty T1 - Optimizing Cross-Platform Data Movement T2 - 2019 IEEE 35th International Conference on Data Engineering (ICDE) N2 - Data analytics are moving beyond the limits of a single data processing platform. A cross-platform query optimizer is necessary to enable applications to run their tasks over multiple platforms efficiently and in a platform-agnostic manner. For the optimizer to be effective, it must consider data movement costs across different data processing platforms. In this paper, we present the graph-based data movement strategy used by RHEEM, our open-source cross-platform system. In particular, we (i) model the data movement problem as a new graph problem, which we prove to be NP-hard, and (ii) propose a novel graph exploration algorithm, which allows RHEEM to discover multiple hidden opportunities for cross-platform data processing. Y1 - 2019 SN - 978-1-5386-7474-1 SN - 978-1-5386-7475-8 U6 - https://doi.org/10.1109/ICDE.2019.00162 SN - 1084-4627 SN - 1063-6382 SP - 1642 EP - 1645 PB - IEEE CY - New York ER - TY - GEN A1 - Schlosser, Rainer A1 - Kossmann, Jan A1 - Boissier, Martin T1 - Efficient Scalable Multi-Attribute Index Selection Using Recursive Strategies T2 - 2019 IEEE 35th International Conference on Data Engineering (ICDE) N2 - An efficient selection of indexes is indispensable for database performance. For large problem instances with hundreds of tables, existing approaches are not suitable: They either exhibit prohibitive runtimes or yield far from optimal index configurations by strongly limiting the set of index candidates or not handling index interaction explicitly. We introduce a novel recursive strategy that does not exclude index candidates in advance and effectively accounts for index interaction. Using large real-world workloads, we demonstrate the applicability of our approach. Further, we evaluate our solution end to end with a commercial database system using a reproducible setup. We show that our solutions are near-optimal for small index selection problems. For larger problems, our strategy outperforms state-of-the-art approaches in both scalability and solution quality. Y1 - 2019 SN - 978-1-5386-7474-1 U6 - https://doi.org/10.1109/ICDE.2019.00113 SN - 1084-4627 SP - 1238 EP - 1249 PB - IEEE CY - New York ER - TY - GEN A1 - Butuzov, Valentin F. A1 - Nefedov, N. N. A1 - Recke, Lutz A1 - Omel'chenko, Oleh T1 - Partly dissipative system with multizonal initial and boundary layers T2 - Journal of Physics: Conference Series N2 - For a singularly perturbed parabolic - ODE system we construct the asymptotic expansion in the small parameter in the case, when the degenerate equation has a double root. Such systems, which are called partly dissipative reaction-diffusion systems, are used to model various natural processes, including the signal transmission along axons, solid combustion and the kinetics of some chemical reactions. It turns out that the algorithm of the construction of the boundary layer functions and the behavior of the solution in the boundary layers essentially differ from that ones in case of a simple root. The multizonal initial and boundary layers behaviour was stated. Y1 - 2019 U6 - https://doi.org/10.1088/1742-6596/1205/1/012009 SN - 1742-6588 SN - 1742-6596 VL - 1205 PB - IOP Publ. CY - Bristol ER - TY - GEN A1 - Brinkmann, Maik A1 - Heine, Moreen T1 - Can Blockchain Leverage for New Public Governance? BT - a Conceptual Analysis on Process Level T2 - Proceedings of the 12th International Conference on Theory and Practice of Electronic Governance N2 - New Public Governance (NPG) as a paradigm for collaborative forms of public service delivery and Blockchain governance are trending topics for researchers and practitioners alike. Thus far, each topic has, on the whole, been discussed separately. This paper presents the preliminary results of ongoing research which aims to shed light on the more concrete benefits of Blockchain for the purpose of NPG. For the first time, a conceptual analysis is conducted on process level to spot benefits and limitations of Blockchain-based governance. Per process element, Blockchain key characteristics are mapped to functional aspects of NPG from a governance perspective. The preliminary results show that Blockchain offers valuable support for governments seeking methods to effectively coordinate co-producing networks. However, the extent of benefits of Blockchain varies across the process elements. It becomes evident that there is a need for off-chain processes. It is, therefore, argued in favour of intensifying research on off-chain governance processes to better understand the implications for and influences on on-chain governance. KW - Blockchain KW - New Public Governance KW - Blockchain Governance KW - Co-production KW - Conceptual Fit KW - Blockchain-enabled Governance Y1 - 2019 SN - 978-1-4503-6644-1 U6 - https://doi.org/10.1145/3326365.3326409 SP - 338 EP - 341 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Kovacs, Robert A1 - Ion, Alexandra A1 - Lopes, Pedro A1 - Oesterreich, Tim A1 - Filter, Johannes A1 - Otto, Philip A1 - Arndt, Tobias A1 - Ring, Nico A1 - Witte, Melvin A1 - Synytsia, Anton A1 - Baudisch, Patrick T1 - TrussFormer BT - 3D Printing Large Kinetic Structures T2 - The 31st Annual ACM Symposium on User Interface Software and Technology N2 - We present TrussFormer, an integrated end-to-end system that allows users to 3D print large-scale kinetic structures, i.e., structures that involve motion and deal with dynamic forces. TrussFormer builds on TrussFab, from which it inherits the ability to create static large-scale truss structures from 3D printed connectors and PET bottles. TrussFormer adds movement to these structures by placing linear actuators into them: either manually, wrapped in reusable components called assets, or by demonstrating the intended movement. TrussFormer verifies that the resulting structure is mechanically sound and will withstand the dynamic forces resulting from the motion. To fabricate the design, TrussFormer generates the underlying hinge system that can be printed on standard desktop 3D printers. We demonstrate TrussFormer with several example objects, including a 6-legged walking robot and a 4m-tall animatronics dinosaur with 5 degrees of freedom. KW - fabrication KW - 3D printing KW - variable geometry truss KW - large-scale mechanism Y1 - 2019 SN - 978-1-4503-5971-9 U6 - https://doi.org/10.1145/3290607.3311766 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Hernandez, Netzahualcoyotl A1 - Demiray, Burcu A1 - Arnrich, Bert A1 - Favela, Jesus T1 - An Exploratory Study to Detect Temporal Orientation Using Bluetooth's sensor T2 - PervasiveHealth'19: Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare N2 - Mobile sensing technology allows us to investigate human behaviour on a daily basis. In the study, we examined temporal orientation, which refers to the capacity of thinking or talking about personal events in the past and future. We utilise the mksense platform that allows us to use the experience-sampling method. Individual's thoughts and their relationship with smartphone's Bluetooth data is analysed to understand in which contexts people are influenced by social environments, such as the people they spend the most time with. As an exploratory study, we analyse social condition influence through a collection of Bluetooth data and survey information from participant's smartphones. Preliminary results show that people are likely to focus on past events when interacting with close-related people, and focus on future planning when interacting with strangers. Similarly, people experience present temporal orientation when accompanied by known people. We believe that these findings are linked to emotions since, in its most basic state, emotion is a state of physiological arousal combined with an appropriated cognition. In this contribution, we envision a smartphone application for automatically inferring human emotions based on user's temporal orientation by using Bluetooth sensors, we briefly elaborate on the influential factor of temporal orientation episodes and conclude with a discussion and lessons learned. KW - Mobile sensing KW - Temporal orientation KW - Social environment KW - Human behaviour KW - Bluetooth Y1 - 2019 SN - 978-1-4503-6126-2 U6 - https://doi.org/10.1145/3329189.3329223 SN - 2153-1633 SP - 292 EP - 297 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Fichte, Johannes Klaus A1 - Hecher, Markus A1 - Meier, Arne T1 - Counting Complexity for Reasoning in Abstract Argumentation T2 - The Thirty-Third AAAI Conference on Artificial Intelligence, the Thirty-First Innovative Applications of Artificial Intelligence Conference, the Ninth AAAI Symposium on Educational Advances in Artificial Intelligence N2 - In this paper, we consider counting and projected model counting of extensions in abstract argumentation for various semantics. When asking for projected counts we are interested in counting the number of extensions of a given argumentation framework while multiple extensions that are identical when restricted to the projected arguments count as only one projected extension. We establish classical complexity results and parameterized complexity results when the problems are parameterized by treewidth of the undirected argumentation graph. To obtain upper bounds for counting projected extensions, we introduce novel algorithms that exploit small treewidth of the undirected argumentation graph of the input instance by dynamic programming (DP). Our algorithms run in time double or triple exponential in the treewidth depending on the considered semantics. Finally, we take the exponential time hypothesis (ETH) into account and establish lower bounds of bounded treewidth algorithms for counting extensions and projected extension. Y1 - 2019 SN - 978-1-57735-809-1 SP - 2827 EP - 2834 PB - AAAI Press CY - Palo Alto ER - TY - GEN A1 - Perscheid, Cindy A1 - Uflacker, Matthias T1 - Integrating Biological Context into the Analysis of Gene Expression Data T2 - Distributed Computing and Artificial Intelligence, Special Sessions, 15th International Conference N2 - High-throughput RNA sequencing produces large gene expression datasets whose analysis leads to a better understanding of diseases like cancer. The nature of RNA-Seq data poses challenges to its analysis in terms of its high dimensionality, noise, and complexity of the underlying biological processes. Researchers apply traditional machine learning approaches, e. g. hierarchical clustering, to analyze this data. Until it comes to validation of the results, the analysis is based on the provided data only and completely misses the biological context. However, gene expression data follows particular patterns - the underlying biological processes. In our research, we aim to integrate the available biological knowledge earlier in the analysis process. We want to adapt state-of-the-art data mining algorithms to consider the biological context in their computations and deliver meaningful results for researchers. KW - Gene expression KW - Machine learning KW - Feature selection KW - Association rule mining KW - Biclustering KW - Knowledge bases Y1 - 2019 SN - 978-3-319-99608-0 SN - 978-3-319-99607-3 U6 - https://doi.org/10.1007/978-3-319-99608-0_41 SN - 2194-5357 SN - 2194-5365 VL - 801 SP - 339 EP - 343 PB - Springer CY - Cham ER - TY - GEN A1 - Lewis, Alison A1 - Glajar, Valentina A1 - Petrescu, Corina L. T1 - Introduction T2 - Cold War Spy Stories from Eastern Europe Y1 - 2019 SN - 978-1-64012-200-0 SN - 978-1-64012-187-4 SP - 1 EP - 26 PB - University of Nebraska Press CY - Lincoln ER - TY - GEN A1 - Hesse, Günter A1 - Matthies, Christoph A1 - Sinzig, Werner A1 - Uflacker, Matthias T1 - Adding Value by Combining Business and Sensor Data BT - an Industry 4.0 Use Case T2 - Database Systems for Advanced Applications N2 - Industry 4.0 and the Internet of Things are recent developments that have lead to the creation of new kinds of manufacturing data. Linking this new kind of sensor data to traditional business information is crucial for enterprises to take advantage of the data’s full potential. In this paper, we present a demo which allows experiencing this data integration, both vertically between technical and business contexts and horizontally along the value chain. The tool simulates a manufacturing company, continuously producing both business and sensor data, and supports issuing ad-hoc queries that answer specific questions related to the business. In order to adapt to different environments, users can configure sensor characteristics to their needs. KW - Industry 4.0 KW - Internet of Things KW - Data integration Y1 - 2019 SN - 978-3-030-18590-9 SN - 978-3-030-18589-3 U6 - https://doi.org/10.1007/978-3-030-18590-9_80 SN - 0302-9743 SN - 1611-3349 VL - 11448 SP - 528 EP - 532 PB - Springer CY - Cham ER - TY - GEN A1 - Turner, Bryan S. A1 - Contreras-Vejar, Yuri T1 - Introduction BT - Reflections on regimes of happiness T2 - Regimes of happiness : comparative and historical studies N2 - This book started as a conversation about successful societies and human development. It was originally based on a simple idea— it would be unusual if, in a society that might be reasonably deemed as successful, its citizens were deeply unhappy. This combination— successful societies and happy citizens— raised immediate and obvious problems. How might one define “success” when dealing, for example, with a society as large and as complex as the United States? We ran into equally major problems when trying to understand “happiness.” Yet one constantly hears political analysts talking about the success or failure of various democratic institutions. In ordinary conversations one constantly hears people talking about being happy or unhappy. In the everyday world, conversations about living in a successful society or about being happy do not appear to cause bewilderment or confusion. “Ordinary people” do not appear to find questions like— is your school successful or are you happily married?— meaningless or absurd. Yet, in the social sciences, both “successful societies” and “happy lives” are seen to be troublesome. As our research into happiness and success unfolded, the conundrums we discussed were threefold: societal conditions, measurements and concepts. What are the key social factors that are indispensable for the social and political stability of any given society? Is it possible to develop precise measures of social success that would give us reliable data? There are a range of economic indicators that might be associated with success, such as labor productivity, economic growth rates, low inflation and a robust GDP. Are there equally reliable political and social measures of a successful society and human happiness? For example, rule of law and the absence of large- scale corruption might be relevant to the assessment of societal happiness. These questions about success led us inexorably to what seems to be a futile notion: happiness. Economic variables such as income or psychological measures of well- being in terms of mental health could be easily analyzed; however, happiness is a dimension that has been elusive to the social sciences. In our unfolding conversation, there was also another stream of thought, namely that the social sciences appeared to be more open to the study of human unhappiness rather than happiness. Y1 - 2019 SN - 978-1-78308-886-7 SN - 978-1-78308-885-0 SP - 1 EP - 8 PB - Anthem Press CY - London ER - TY - GEN A1 - Stich, Michael A1 - Beta, Carsten T1 - Time-Delay Feedback Control of an Oscillatory Medium T2 - Biological Systems: Nonlinear Dynamics Approach N2 - The supercritical Hopf bifurcation is one of the simplest ways in which a stationary state of a nonlinear system can undergo a transition to stable self-sustained oscillations. At the bifurcation point, a small-amplitude limit cycle is born, which already at onset displays a finite frequency. If we consider a reaction-diffusion system that undergoes a supercritical Hopf bifurcation, its dynamics is described by the complex Ginzburg-Landau equation (CGLE). Here, we study such a system in the parameter regime where the CGLE shows spatio-temporal chaos. We review a type of time-delay feedback methods which is suitable to suppress chaos and replace it by other spatio-temporal solutions such as uniform oscillations, plane waves, standing waves, and the stationary state. Y1 - 2019 SN - 978-3-030-16585-7 SN - 978-3-030-16584-0 U6 - https://doi.org/10.1007/978-3-030-16585-7_1 SN - 2199-3041 SN - 2199-305X VL - 20 SP - 1 EP - 17 PB - Springer CY - Cham ER - TY - GEN A1 - Gonzalez-Lopez, Fernanda A1 - Pufahl, Luise T1 - A Landscape for Case Models T2 - Enterprise, Business-Process and Information Systems Modeling N2 - Case Management is a paradigm to support knowledge-intensive processes. The different approaches developed for modeling these types of processes tend to result in scattered models due to the low abstraction level at which the inherently complex processes are therein represented. Thus, readability and understandability is more challenging than that of traditional process models. By reviewing existing proposals in the field of process overviews and case models, this paper extends a case modeling language - the fragment-based Case Management (fCM) language - with the goal of modeling knowledge-intensive processes from a higher abstraction level - to generate a so-called fCM landscape. This proposal is empirically evaluated via an online experiment. Results indicate that interpreting an fCM landscape might be more effective and efficient than interpreting an informationally equivalent case model. KW - Case Management KW - Process landscape KW - Process map KW - Process architecture KW - Process model Y1 - 2019 SN - 978-3-030-20618-5 SN - 978-3-030-20617-8 U6 - https://doi.org/10.1007/978-3-030-20618-5_6 SN - 1865-1348 VL - 352 SP - 87 EP - 102 PB - Springer CY - Berlin ER - TY - GEN A1 - Bartz, Christian A1 - Yang, Haojin A1 - Bethge, Joseph A1 - Meinel, Christoph T1 - LoANs BT - Weakly Supervised Object Detection with Localizer Assessor Networks T2 - Computer Vision – ACCV 2018 Workshops N2 - Recently, deep neural networks have achieved remarkable performance on the task of object detection and recognition. The reason for this success is mainly grounded in the availability of large scale, fully annotated datasets, but the creation of such a dataset is a complicated and costly task. In this paper, we propose a novel method for weakly supervised object detection that simplifies the process of gathering data for training an object detector. We train an ensemble of two models that work together in a student-teacher fashion. Our student (localizer) is a model that learns to localize an object, the teacher (assessor) assesses the quality of the localization and provides feedback to the student. The student uses this feedback to learn how to localize objects and is thus entirely supervised by the teacher, as we are using no labels for training the localizer. In our experiments, we show that our model is very robust to noise and reaches competitive performance compared to a state-of-the-art fully supervised approach. We also show the simplicity of creating a new dataset, based on a few videos (e.g. downloaded from YouTube) and artificially generated data. Y1 - 2019 SN - 978-3-030-21074-8 SN - 978-3-030-21073-1 U6 - https://doi.org/10.1007/978-3-030-21074-8_29 SN - 0302-9743 SN - 1611-3349 VL - 11367 SP - 341 EP - 356 PB - Springer CY - Cham ER - TY - GEN A1 - Seidel, Felix A1 - Krentz, Konrad-Felix A1 - Meinel, Christoph T1 - Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers T2 - 2019 IEEE 5th World Forum on Internet of Things (WF-IoT) N2 - Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at depriving victim devices of entering low-power sleep modes. For example, a denial-of-sleep attack against an IoT device that runs a CoAP server is to send plenty of CoAP messages to it, thereby forcing the IoT device to expend energy for receiving and processing these CoAP messages. All current security solutions for CoAP, namely Datagram Transport Layer Security (DTLS), IPsec, and OSCORE, fail to prevent such attacks. To fill this gap, Seitz et al. proposed a method for filtering out inauthentic and replayed CoAP messages "en-route" on 6LoWPAN border routers. In this paper, we expand on Seitz et al.'s proposal in two ways. First, we revise Seitz et al.'s software architecture so that 6LoWPAN border routers can not only check the authenticity and freshness of CoAP messages, but can also perform a wide range of further checks. Second, we propose a couple of such further checks, which, as compared to Seitz et al.'s original checks, more reliably protect IoT devices that run CoAP servers from remote denial-of-sleep attacks, as well as from remote exploits. We prototyped our solution and successfully tested its compatibility with Contiki-NG's CoAP implementation. Y1 - 2019 SN - 978-1-5386-4980-0 SN - 978-1-5386-4981-7 U6 - https://doi.org/10.1109/WF-IoT.2019.8767262 SP - 201 EP - 206 PB - Institute of Electrical and Electronics Engineers CY - New York ER - TY - GEN A1 - Cabalar, Pedro A1 - Fandinno, Jorge A1 - Schaub, Torsten H. A1 - Schellhorn, Sebastian T1 - Lower Bound Founded Logic of Here-and-There T2 - Logics in Artificial Intelligence N2 - A distinguishing feature of Answer Set Programming is that all atoms belonging to a stable model must be founded. That is, an atom must not only be true but provably true. This can be made precise by means of the constructive logic of Here-and-There, whose equilibrium models correspond to stable models. One way of looking at foundedness is to regard Boolean truth values as ordered by letting true be greater than false. Then, each Boolean variable takes the smallest truth value that can be proven for it. This idea was generalized by Aziz to ordered domains and applied to constraint satisfaction problems. As before, the idea is that a, say integer, variable gets only assigned to the smallest integer that can be justified. In this paper, we present a logical reconstruction of Aziz’ idea in the setting of the logic of Here-and-There. More precisely, we start by defining the logic of Here-and-There with lower bound founded variables along with its equilibrium models and elaborate upon its formal properties. Finally, we compare our approach with related ones and sketch future work. Y1 - 2019 SN - 978-3-030-19570-0 SN - 978-3-030-19569-4 U6 - https://doi.org/10.1007/978-3-030-19570-0_34 SN - 0302-9743 SN - 1611-3349 VL - 11468 SP - 509 EP - 525 PB - Springer CY - Cham ER - TY - GEN A1 - Nguyen, Quyet Doan A1 - Wang, Jingwen A1 - Rychkov, Dmitry A1 - Gerhard, Reimund T1 - Depth Profile and Transport of Positive and Negative Charge in Surface (2-D) and Bulk (3-D) Nanocomposite Films T2 - 2nd International Conference on Electrical Materials and Power Equipment (ICEMPE 2019) N2 - In the present study, the charge distribution and the charge transport across the thickness of 2- and 3-dimensional polymer nanodielectrics was investigated. Chemically surface-treated polypropylene (PP) films and low-density polyethylene nanocomposite films with 3 wt % of magnesium oxide (LDPE/MgO) served as examples of 2-D and 3-D nanodielectrics, respectively. Surface charges were deposited onto the non-metallized surfaces of the one-side metallized polymer films and found to broaden and to thus enter the bulk of the films upon thermal stimulation at suitable elevated temperatures. The resulting space-charge profiles in the thickness direction were probed by means of Piezoelectrically-generated Pressure Steps (PPSs). It was observed that the chemical surface treatment of PP which led to the formation of nano-structures or the use of bulk nanoparticles from LDPE/MgO nanocomposites enhance charge trapping on or in the respective polymer films and also reduce charge transport inside the respective samples. KW - LDPE nanocomposites KW - MgO nanoparticles KW - Space charge KW - Charge transport KW - Charge stability KW - Acoustic probing of electric-field profiles KW - Piezoelectrically generated Pressure Steps (PPSs) Y1 - 2019 SN - 978-1-5386-8434-4 SN - 978-1-5386-8435-1 U6 - https://doi.org/10.1109/ICEMPE.2019.8727256 SP - 298 EP - 300 PB - IEEE CY - New York ER - TY - GEN A1 - Gerhard, Reimund T1 - Dielectric materials for electro-active (electret) and/or electro-passive (insulation) applications T2 - 2nd International Conference on Electrical Materials and Power Equipment (ICEMPE 2019) N2 - Dielectric materials for electret applications usually have to contain a quasi-permanent space charge or dipole polarization that is stable over large temperature ranges and time periods. For electrical-insulation applications, on the other hand, a quasi-permanent space charge or dipole polarization is usually considered detrimental. In recent years, however, with the advent of high-voltage direct-current (HVDC) transmission and high-voltage capacitors for energy storage, new possibilities are being explored in the area of high-voltage dielectrics. Stable charge trapping (as e.g. found in nano-dielectrics) or large dipole polarizations (as e.g. found in relaxor ferroelectrics and high-permittivity dielectrics) are no longer considered to be necessarily detrimental in electrical-insulation materials. On the other hand, recent developments in electro-electrets (dielectric elastomers), i.e. very soft dielectrics with large actuation strains and high breakdown fields, and in ferroelectrets, i.e. polymers with electrically charged cavities, have resulted in new electret materials that may also be useful for HVDC insulation systems. Furthermore, 2-dimensional (nano-particles on surfaces or interfaces) and 3-dimensional (nano-particles in the bulk) nano-dielectrics have been found to provide very good charge-trapping properties that may not only be used for more stable electrets and ferroelectrets, but also for better HVDC electrical-insulation materials with the possibility to optimize charge-transport and field-gradient behavior. In view of these and other recent developments, a first attempt will be made to review a small selection of electro-active (i.e. electret) and electro-passive (i.e. insulation) dielectrics in direct comparison. Such a comparative approach may lead to synergies in materials concepts and research methods that will benefit both areas. Furthermore, electrets may be very useful for sensing and monitoring applications in electrical-insulation systems, while high-voltage technology is essential for more efficient charging and poling of electret materials. KW - Dielectric materials KW - Electrets KW - Electrical insulation KW - Electro-active and electro-passive dielectrics KW - Nano-dielectrics KW - Charging or poling KW - Charge storage and transport Y1 - 2019 SN - 978-1-5386-8434-4 SN - 978-1-5386-8435-1 U6 - https://doi.org/10.1109/ICEMPE.2019.8727276 SP - 91 EP - 96 PB - IEEE CY - New York ER - TY - GEN A1 - Han van der, Aa A1 - Di Ciccio, Claudio A1 - Leopold, Henrik A1 - Reijers, Hajo A. T1 - Extracting Declarative Process Models from Natural Language T2 - Advanced Information Systems Engineering (CAISE 2019) N2 - Process models are an important means to capture information on organizational operations and often represent the starting point for process analysis and improvement. Since the manual elicitation and creation of process models is a time-intensive endeavor, a variety of techniques have been developed that automatically derive process models from textual process descriptions. However, these techniques, so far, only focus on the extraction of traditional, imperative process models. The extraction of declarative process models, which allow to effectively capture complex process behavior in a compact fashion, has not been addressed. In this paper we close this gap by presenting the first automated approach for the extraction of declarative process models from natural language. To achieve this, we developed tailored Natural Language Processing techniques that identify activities and their inter-relations from textual constraint descriptions. A quantitative evaluation shows that our approach is able to generate constraints that closely resemble those established by humans. Therefore, our approach provides automated support for an otherwise tedious and complex manual endeavor. KW - Declarative modelling KW - Natural language processing KW - Model extraction Y1 - 2019 SN - 978-3-030-21290-2 SN - 978-3-030-21289-6 U6 - https://doi.org/10.1007/978-3-030-21290-2_23 SN - 0302-9743 SN - 1611-3349 VL - 11483 SP - 365 EP - 382 PB - Springer CY - Cham ER - TY - GEN A1 - Liedhegener, Antonius A1 - Kösters, Christoph A1 - Brechenmacher, Thomas T1 - Catholicism BT - On the Past, Present, and Future of its modern Notion T2 - Historisches Jahrbuch Y1 - 2019 SN - 0018-2621 VL - 139 SP - 601 EP - 618 PB - Herder CY - Freiburg Breisgau ER - TY - GEN A1 - Brechenmacher, Thomas T1 - Peace orders of modern times BT - introduction to the overall theme T2 - Historisches Jahrbuch Y1 - 2019 SN - 978-3-451-38586-5 SN - 0018-2621 VL - 139 SP - 3 EP - 6 PB - Herder CY - Freiburg Breisgau ER - TY - GEN A1 - Bender, Benedict A1 - Grum, Marcus A1 - Gronau, Norbert A1 - Alfa, Attahiru A1 - Maharaj, B. T. T1 - Design of a worldwide simulation system for distributed cyber-physical production networks T2 - 2019 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC) N2 - Modern production infrastructures of globally operating companies usually consist of multiple distributed production sites. While the organization of individual sites consisting of Industry 4.0 components itself is demanding, new questions regarding the organization and allocation of resources emerge considering the total production network. In an attempt to face the challenge of efficient distribution and processing both within and across sites, we aim to provide a hybrid simulation approach as a first step towards optimization. Using hybrid simulation allows us to include real and simulated concepts and thereby benchmark different approaches with reasonable effort. A simulation concept is conceptualized and demonstrated qualitatively using a global multi-site example. KW - production networks KW - geographical distribution KW - task realization strategies KW - Industry 4.0 KW - simulation KW - evaluation Y1 - 2019 SN - 978-1-7281-3401-7 SN - 978-1-7281-3402-4 U6 - https://doi.org/10.1109/ICE.2019.8792609 SN - 2334-315X PB - IEEE CY - New York ER - TY - GEN A1 - Dierschke, Hartmut A1 - Heinken, Thilo T1 - Vorwort T2 - Tuexenia : Mitteilungen der Floristisch-Soziologischen Arbeitsgemeinschaft Y1 - 2019 UR - https://www.tuexenia.de/publications/tuexenia/Tuexenia_2019_NS_039_0007-0007.pdf SN - 0722-494X IS - 39 SP - 7 EP - 7 PB - Floristisch-Soziologische Arbeitsgemeinschaft CY - Göttingen ER - TY - GEN A1 - Ofner, Andre A1 - Stober, Sebastian T1 - Hybrid variational predictive coding as a bridge between human and artificial cognition T2 - ALIFE 2019: The 2019 Conference on Artificial Life N2 - Predictive coding and its generalization to active inference offer a unified theory of brain function. The underlying predictive processing paradigmhas gained significant attention in artificial intelligence research for its representation learning and predictive capacity. Here, we suggest that it is possible to integrate human and artificial generative models with a predictive coding network that processes sensations simultaneously with the signature of predictive coding found in human neuroimaging data. We propose a recurrent hierarchical predictive coding model that predicts low-dimensional representations of stimuli, electroencephalogram and physiological signals with variational inference. We suggest that in a shared environment, such hybrid predictive coding networks learn to incorporate the human predictive model in order to reduce prediction error. We evaluate the model on a publicly available EEG dataset of subjects watching one-minute long video excerpts. Our initial results indicate that the model can be trained to predict visual properties such as the amount, distance and motion of human subjects in videos. Y1 - 2019 SP - 68 EP - 69 PB - MIT Press CY - Cambridge ER - TY - GEN A1 - Hermanussen, Michael A1 - Scheffler, Christiane A1 - Groth, Detlef A1 - Bogin, Barry T1 - Student work on trends in infant and child growth BT - an editorial T2 - Journal of biological and clinical anthropology : Anthropologischer Anzeiger : Mitteilungsorgan der Gesellschaft für Anthropologie KW - nutrition KW - impact on growth KW - geographic neighborhood KW - mortality bias KW - limb disproportions KW - physical activity KW - socioeconomic status KW - parental age KW - statistical tools Y1 - 2019 U6 - https://doi.org/10.1127/anthranz/2019/1052 SN - 0003-5548 VL - 76 IS - 5 SP - 363 EP - 364 PB - Schweizerbart CY - Stuttgart ER - TY - GEN A1 - Brand, Thomas A1 - Giese, Holger T1 - Generic adaptive monitoring based on executed architecture runtime model queries and events T2 - IEEE Xplore N2 - Monitoring is a key functionality for automated decision making as it is performed by self-adaptive systems, too. Effective monitoring provides the relevant information on time. This can be achieved with exhaustive monitoring causing a high overhead consumption of economical and ecological resources. In contrast, our generic adaptive monitoring approach supports effectiveness with increased efficiency. Also, it adapts to changes regarding the information demand and the monitored system without additional configuration and software implementation effort. The approach observes the executions of runtime model queries and processes change events to determine the currently required monitoring configuration. In this paper we explicate different possibilities to use the approach and evaluate their characteristics regarding the phenomenon detection time and the monitoring effort. Our approach allows balancing between those two characteristics. This makes it an interesting option for the monitoring function of self-adaptive systems because for them usually very short-lived phenomena are not relevant. Y1 - 2019 SN - 978-1-7281-2731-6 U6 - https://doi.org/10.1109/SASO.2019.00012 SN - 1949-3673 SP - 17 EP - 22 PB - IEEE CY - New York ER - TY - GEN A1 - Matthies, Christoph T1 - Agile process improvement in retrospectives T2 - 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) N2 - Working in iterations and repeatedly improving team workflows based on collected feedback is fundamental to agile software development processes. Scrum, the most popular agile method, provides dedicated retrospective meetings to reflect on the last development iteration and to decide on process improvement actions. However, agile methods do not prescribe how these improvement actions should be identified, managed or tracked in detail. The approaches to detect and remove problems in software development processes are therefore often based on intuition and prior experiences and perceptions of team members. Previous research in this area has focused on approaches to elicit a team's improvement opportunities as well as measurements regarding the work performed in an iteration, e.g. Scrum burn-down charts. Little research deals with the quality and nature of identified problems or how progress towards removing issues is measured. In this research, we investigate how agile development teams in the professional software industry organize their feedback and process improvement approaches. In particular, we focus on the structure and content of improvement and reflection meetings, i.e. retrospectives, and their outcomes. Researching how the vital mechanism of process improvement is implemented in practice in modern software development leads to a more complete picture of agile process improvement. KW - Agile KW - Scrum KW - software process improvement KW - retrospective Y1 - 2019 SN - 978-1-7281-1764-5 SN - 978-1-7281-1765-2 U6 - https://doi.org/10.1109/ICSE-Companion.2019.00063 SN - 2574-1934 SN - 2574-1926 SP - 150 EP - 152 PB - IEEE CY - New York ER - TY - GEN A1 - Matthies, Christoph T1 - Feedback in Scrum BT - Data-Informed Retrospectives T2 - 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) N2 - Improving the way that teams work together by reflecting and improving the executed process is at the heart of agile processes. The idea of iterative process improvement takes various forms in different agile development methodologies, e.g. Scrum Retrospectives. However, these methods do not prescribe how improvement steps should be conducted in detail. In this research we investigate how agile software teams can use their development data, such as commits or tickets, created during regular development activities, to drive and track process improvement steps. Our previous research focused on data-informed process improvement in the context of student teams, where controlled circumstances and deep domain knowledge allowed creation and usage of specific process measures. Encouraged by positive results in this area, we investigate the process improvement approaches employed in industry teams. Researching how the vital mechanism of process improvement is implemented and how development data is already being used in practice in modern software development leads to a more complete picture of agile process improvement. It is the first step in enabling a data-informed feedback and improvement process, tailored to a team's context and based on the development data of individual teams. KW - agile KW - software development KW - Scrum KW - retrospective KW - software process improvement Y1 - 2019 SN - 978-1-7281-1764-5 SN - 978-1-7281-1765-2 U6 - https://doi.org/10.1109/ICSE-Companion.2019.00081 SN - 2574-1934 SN - 2574-1926 SP - 198 EP - 201 PB - IEEE CY - New York ER - TY - GEN A1 - Heinicker, Paul A1 - Likavcan, Lukas A1 - Lin, Qiao T1 - alt'ai: designing machine-to-machine interfaces for automated landscapes N2 - alt'ai is an agent-based simulation inspired by aesthetics, culture and environmental conditions of the Altai mountain region on the borders between Russia, Kazakhstan, China and Mongolia. It is set into a scenario of a remote automated landscape populated by sentient machines, where biological species, machines and environments autonomously interact to produce unforeseeable visual outputs. It poses a question of designing future machine-to-machine authentication protocols that are based on the use of images encoding agent behavior. Also, the simulation provides rich visual perspective on this challenge. The project pleads for a heavily aestheticized approach to design practice and highlights the importance of productively inefficient and information redundant systems. Y1 - 2019 SN - 978-1-4503-6311-2 U6 - https://doi.org/10.1145/3306211.3320146 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Stoltnow, Malte A1 - Seifert, Thomas A1 - Jeske, Tilman J. A1 - Gilbricht, Sabine A1 - Krause, Joachim T1 - Contributions to the mineralogical and geochemical characterization of Fe-Sn-Zn-Cu-In skarn-type mineralization in the Schwarzenberg mining district, Germany T2 - Life with Ore Deposits on Earth – 15th SGA Biennial Meeting 2019 N2 - The Schwarzenberg mining district in the western Erzgebirge hosts numerous skarn-hosted tin-polymetallic deposits, such as Breitenbrunn. The St. Christoph mine is located in the Breitenbrunn deposit and is the locus typicus of christophite, an iron-rich sphalerite variety, which can be associated with indium enrichment. This study presents a revision of the paragenetic scheme, a contribution to the indium behavior and potential, and discussion on the origin of the sulfur. This was achieved through reflected light microscopy, SEM-based MLA, EPMA, and bulk mineral sulfur isotope analysis on 37 sulfide-rich skarn samples from a mineral collection. The paragenetic scheme includes: a pre-mineralization stage of anhydrous calc-silicates and hydrous minerals; an oxide stage, dominated by magnetite; a sulfide stage of predominantly sphalerite, minor pyrite, chalcopyrite, arsenopyrite, and galena. Some sphalerite samples present elevated indium contents of up to 0.44 wt%. Elevated iron contents (4-10 wt%) in sphalerite can be tentatively linked to increased indium incorporation, but further analyses are required. Analyzed sulfides exhibit homogeneous delta S-34 values (-1 to +2 parts per thousand VCDT), assumed to be post-magmatic. They correlate with other Fe-Sn-Zn-Cu-In skarn deposits in the western Erzgebirge, and Permian vein-hosted associations throughout the Erzgebirge region. Y1 - 2019 SP - 1089 EP - 1092 PB - SGA Soc Geology Applied mineral depositis CY - Geneva ER - TY - GEN A1 - Bobos, Iuliu A1 - Goncalves, Ana A1 - Lima, Luis A1 - Noronha, Fernando A1 - Sudo, Masafumi T1 - Micas Ar-40/Ar-39 dating of hydrothermal events related with the post-orogenic W (+/- Sn), (Cu, Mo) mineralization from Borralha, Northern Portugal T2 - Life with Ore Deposits on Earth – 15th SGA Biennial Meeting 2019, N2 - Secondary mica minerals collected from the Santa Helena (W- (Cu) mineralization) and Venise (W-Mo mineralization) endogenic breccia structures were Ar-40/Ar-39 dated. The muscovite Ar-40/Ar-39 data yielded 286.8 +/- 1.2 (+/- 1 sigma) Ma (samples 6Ha and 11Ha) which reflect the age of secondary muscovite formation probably from magmatic biotite or feldspar alteration. Sericite Ar-40/Ar-39 data yielded 280.9 +/- 1.2 (+/- 1 sigma) Ma to 279.0 +/- 1.1 (+/- 1 sigma) Ma (samples 6Hb and 11Hb) reflecting the age of greisen alteration (T similar to 300 degrees C) where the W- disseminated mineralization occurs. The muscovite 40Ar/39Ar data of 277.3 +/- 1.3 (+/- 1 sigma) Ma and 281.3 +/- 1.2 (+/- 1 sigma) Ma (samples 5 and 6) also reflect the age of muscovite (selvage) crystallized adjacent to molybdenite veins within the Venise breccia. Geochronological data obtained confirmed that the W mineralization at Santa Helena breccia is older than Mo-mineralization at Venise breccia. Also, the timing of hydrothermal circulation and the cooling history for the W-stage deposition was no longer than 7 Ma and 4 Ma for Mo-deposition. Y1 - 2019 UR - https://www.researchgate.net/publication/337901420_Micas_40_Ar_39_Ar_dating_of_hydrothermal_events_related_with_the_post-orogenic_W_Sn_Cu_Mo_mineralization_from_Borralha_Northern_Portugal IS - 1 SP - 353 EP - 356 PB - SGA Soc Geology Applied mineral depositis CY - Geneva ER - TY - GEN A1 - Rastogi, Abhishake T1 - Tikhonov regularization with oversmoothing penalty for linear statistical inverse learning problems T2 - AIP Conference Proceedings : third international Conference of mathematical sciences (ICMS 2019) N2 - In this paper, we consider the linear ill-posed inverse problem with noisy data in the statistical learning setting. The Tikhonov regularization scheme in Hilbert scales is considered in the reproducing kernel Hilbert space framework to reconstruct the estimator from the random noisy data. We discuss the rates of convergence for the regularized solution under the prior assumptions and link condition. For regression functions with smoothness given in terms of source conditions the error bound can explicitly be established. KW - Statistical inverse problem KW - Tikhonov regularization KW - Hilbert Scales KW - Reproducing kernel Hilbert space KW - Minimax convergence rates Y1 - 2019 SN - 978-0-7354-1930-8 U6 - https://doi.org/10.1063/1.5136221 SN - 0094-243X VL - 2183 PB - American Institute of Physics CY - Melville ER - TY - GEN A1 - Bilo, Davide A1 - Friedrich, Tobias A1 - Lenzner, Pascal A1 - Melnichenko, Anna T1 - Geometric Network Creation Games T2 - SPAA '19: The 31st ACM Symposium on Parallelism in Algorithms and Architectures N2 - Network Creation Games are a well-known approach for explaining and analyzing the structure, quality and dynamics of real-world networks like the Internet and other infrastructure networks which evolved via the interaction of selfish agents without a central authority. In these games selfish agents which correspond to nodes in a network strategically buy incident edges to improve their centrality. However, past research on these games has only considered the creation of networks with unit-weight edges. In practice, e.g. when constructing a fiber-optic network, the choice of which nodes to connect and also the induced price for a link crucially depends on the distance between the involved nodes and such settings can be modeled via edge-weighted graphs. We incorporate arbitrary edge weights by generalizing the well-known model by Fabrikant et al. [PODC'03] to edge-weighted host graphs and focus on the geometric setting where the weights are induced by the distances in some metric space. In stark contrast to the state-of-the-art for the unit-weight version, where the Price of Anarchy is conjectured to be constant and where resolving this is a major open problem, we prove a tight non-constant bound on the Price of Anarchy for the metric version and a slightly weaker upper bound for the non-metric case. Moreover, we analyze the existence of equilibria, the computational hardness and the game dynamics for several natural metrics. The model we propose can be seen as the game-theoretic analogue of a variant of the classical Network Design Problem. Thus, low-cost equilibria of our game correspond to decentralized and stable approximations of the optimum network design. KW - Network creation games KW - edge-weighted networks KW - price of anarchy KW - Nash equilibrium KW - game dynamics KW - computational hardness Y1 - 2019 SN - 978-1-4503-6184-2 U6 - https://doi.org/10.1145/3323165.3323199 SP - 323 EP - 332 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Real-time Screen-space Geometry Draping for 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - A fundamental task in 3D geovisualization and GIS applications is the visualization of vector data that can represent features such as transportation networks or land use coverage. Mapping or draping vector data represented by geometric primitives (e.g., polylines or polygons) to 3D digital elevation or 3D digital terrain models is a challenging task. We present an interactive GPU-based approach that performs geometry-based draping of vector data on per-frame basis using an image-based representation of a 3D digital elevation or terrain model only. KW - Geometry Draping KW - Geovisualization KW - GPU-based Real-time Rendering Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00054 SN - 2375-0138 SN - 1550-6037 SP - 281 EP - 286 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Florio, Alessandro A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Semantic-driven Visualization Techniques for Interactive Exploration of 3D Indoor Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - The availability of detailed virtual 3D building models including representations of indoor elements, allows for a wide number of applications requiring effective exploration and navigation functionality. Depending on the application context, users should be enabled to focus on specific Objects-of-Interests (OOIs) or important building elements. This requires approaches to filtering building parts as well as techniques to visualize important building objects and their relations. For it, this paper explores the application and combination of interactive rendering techniques as well as their semanticallydriven configuration in the context of 3D indoor models. KW - Building Information Models KW - BIM KW - Industry Foundation Classes KW - IFC KW - Interactive Visualization KW - Real-time Rendering Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00014 SN - 2375-0138 SN - 1550-6037 SP - 25 EP - 30 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich ED - Banissi, E Ursyn T1 - Interactive Close-Up Rendering for Detail plus Overview Visualization of 3D Digital Terrain Models T2 - 2019 23rd International Conference Information Visualisation (IV) N2 - This paper presents an interactive rendering technique for detail+overview visualization of 3D digital terrain models using interactive close-ups. A close-up is an alternative presentation of input data varying with respect to geometrical scale, mapping, appearance, as well as Level-of-Detail (LOD) and Level-of-Abstraction (LOA) used. The presented 3D close-up approach enables in-situ comparison of multiple Regionof-Interests (ROIs) simultaneously. We describe a GPU-based rendering technique for the image-synthesis of multiple close-ups in real-time. KW - Terrain Visualization KW - Detail plus Overview KW - Close-Up KW - Coordinated and Multiple Views Y1 - 2019 SN - 978-1-7281-2838-2 SN - 978-1-7281-2839-9 U6 - https://doi.org/10.1109/IV.2019.00053 SN - 2375-0138 SN - 1550-6037 SP - 275 EP - 280 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - GEN A1 - Bruechner, Dominik A1 - Renz, Jan A1 - Klingbeil, Mandy T1 - Creating a Framework for User-Centered Development and Improvement of Digital Education T2 - Scale N2 - We investigate how the technology acceptance and learning experience of the digital education platform HPI Schul-Cloud (HPI School Cloud) for German secondary school teachers can be improved by proposing a user-centered research and development framework. We highlight the importance of developing digital learning technologies in a user-centered way to take differences in the requirements of educators and students into account. We suggest applying qualitative and quantitative methods to build a solid understanding of a learning platform's users, their needs, requirements, and their context of use. After concept development and idea generation of features and areas of opportunity based on the user research, we emphasize on the application of a multi-attribute utility analysis decision-making framework to prioritize ideas rationally, taking results of user research into account. Afterward, we recommend applying the principle build-learn-iterate to build prototypes in different resolutions while learning from user tests and improving the selected opportunities. Last but not least, we propose an approach for continuous short- and long-term user experience controlling and monitoring, extending existing web- and learning analytics metrics. KW - learning platform KW - user experience KW - evaluation KW - HPI Schul-Cloud KW - user research framework KW - user-centered design Y1 - 2019 SN - 978-1-4503-6804-9 U6 - https://doi.org/10.1145/3330430.3333644 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Herzog, Benedict A1 - Hönig, Timo A1 - Schröder-Preikschat, Wolfgang A1 - Plauth, Max A1 - Köhler, Sven A1 - Polze, Andreas T1 - Bridging the Gap BT - Energy-efficient Execution of Software Workloads on Heterogeneous Hardware Components T2 - e-Energy '19: Proceedings of the Tenth ACM International Conference on Future Energy Systems N2 - The recent restructuring of the electricity grid (i.e., smart grid) introduces a number of challenges for today's large-scale computing systems. To operate reliable and efficient, computing systems must adhere not only to technical limits (i.e., thermal constraints) but they must also reduce operating costs, for example, by increasing their energy efficiency. Efforts to improve the energy efficiency, however, are often hampered by inflexible software components that hardly adapt to underlying hardware characteristics. In this paper, we propose an approach to bridge the gap between inflexible software and heterogeneous hardware architectures. Our proposal introduces adaptive software components that dynamically adapt to heterogeneous processing units (i.e., accelerators) during runtime to improve the energy efficiency of computing systems. Y1 - 2019 SN - 978-1-4503-6671-7 U6 - https://doi.org/10.1145/3307772.3330176 SP - 428 EP - 430 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Schorsch, Jonathan T1 - Olive Oil, Anointing, Ecstasy, and Ecology T2 - Ritual Dynamics in Jewish and Christian Contexts : Between Bible and Liturgy Y1 - 2019 SN - 978-90-04-40595-0 SN - 978-90-04-40092-4 U6 - https://doi.org/10.1163/9789004405950_012 SN - 1388-2074 VL - 34 SP - 215 EP - 236 PB - Brill CY - Leiden ER - TY - GEN A1 - Bressel, Lena A1 - Herzog, Bernd A1 - Reich, Oliver T1 - Monte-Carlo simulations of light transport in dense materials BT - dependent scattering and influence on sunscreen formulations T2 - Diffuse Optical Spectroscopy and Imaging N2 - Monte-Carlo calculations are carried out to simulate the light transport in dense materials. Focus lies on the calculation of diffuse light transmission through films of scattering and absorbing media considering additionally the effect of dependent scattering. Different influences like interaction type between particles, particle size, composition etc. can be studied by this program. Simulations in this study show major influences on the diffuse transmission. Further simulations are carried out to model a sunscreen film and study best compositions of this film and will be presented. KW - Monte-Carlo simulations KW - dependent scattering KW - sunscreen KW - light scattering KW - high concentrations Y1 - 2019 SN - 978-1-5106-2841-0 SN - 978-1-5106-2842-7 U6 - https://doi.org/10.1117/12.2527076 SN - 0277-786X SN - 1996-756X VL - 11074 PB - SPIE CY - Bellingham ER - TY - GEN A1 - Marwecki, Sebastian A1 - Wilson, Andrew D. A1 - Ofek, Eyal A1 - Franco, Mar Gonzalez A1 - Holz, Christian T1 - Mise-Unseen BT - Using Eye-Tracking to Hide Virtual Reality Scene Changes in Plain Sight T2 - UIST '19: Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology N2 - Creating or arranging objects at runtime is needed in many virtual reality applications, but such changes are noticed when they occur inside the user's field of view. We present Mise-Unseen, a software system that applies such scene changes covertly inside the user's field of view. Mise-Unseen leverages gaze tracking to create models of user attention, intention, and spatial memory to determine if and when to inject a change. We present seven applications of Mise-Unseen to unnoticeably modify the scene within view (i) to hide that task difficulty is adapted to the user, (ii) to adapt the experience to the user's preferences, (iii) to time the use of low fidelity effects, (iv) to detect user choice for passive haptics even when lacking physical props, (v) to sustain physical locomotion despite a lack of physical space, (vi) to reduce motion sickness during virtual locomotion, and (vii) to verify user understanding during story progression. We evaluated Mise-Unseen and our applications in a user study with 15 participants and find that while gaze data indeed supports obfuscating changes inside the field of view, a change is rendered unnoticeably by using gaze in combination with common masking techniques. KW - Eye-tracking KW - virtual reality KW - change blindness KW - inattentional blindness KW - staging Y1 - 2019 SN - 978-1-4503-6816-2 U6 - https://doi.org/10.1145/3332165.3347919 SP - 777 EP - 789 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Fischer, Stefanie A1 - Riemer, Nathanael A1 - Schüler-Springorum, Stefanie T1 - Vorwort T2 - Juden und Nichtjuden nach der Shoah: Begegnungen in Deutschland Y1 - 2019 SN - 978-3-11-057008-3 SN - 978-3-11-056729-8 SN - 978-3-11-073681-6 U6 - https://doi.org/10.1515/9783110570083-001 SP - VII EP - VIII PB - De Gruyter CY - Berlin ER - TY - GEN A1 - Roumen, Thijs A1 - Shigeyama, Jotaro A1 - Rudolph, Julius Cosmo Romeo A1 - Grzelka, Felix A1 - Baudisch, Patrick T1 - SpringFit BT - Joints and mounts that fabricate on any laser cutter T2 - User Interface Software and Technology N2 - Joints are crucial to laser cutting as they allow making three-dimensional objects; mounts are crucial because they allow embedding technical components, such as motors. Unfortunately, mounts and joints tend to fail when trying to fabricate a model on a different laser cutter or from a different material. The reason for this lies in the way mounts and joints hold objects in place, which is by forcing them into slightly smaller openings. Such "press fit" mechanisms unfortunately are susceptible to the small changes in diameter that occur when switching to a machine that removes more or less material ("kerf"), as well as to changes in stiffness, as they occur when switching to a different material. We present a software tool called springFit that resolves this problem by replacing the problematic press fit-based mounts and joints with what we call cantilever-based mounts and joints. A cantilever spring is simply a long thin piece of material that pushes against the object to be held. Unlike press fits, cantilever springs are robust against variations in kerf and material; they can even handle very high variations, simply by using longer springs. SpringFit converts models in the form of 2D cutting plans by replacing all contained mounts, notch joints, finger joints, and t-joints. In our technical evaluation, we used springFit to convert 14 models downloaded from the web. KW - Laser cutting KW - fabrication KW - portability KW - reuse Y1 - 2019 SN - 978-1-4503-6816-2 U6 - https://doi.org/10.1145/3332165.3347930 SP - 727 EP - 738 PB - Association for Computing Machinery CY - New York ER - TY - GEN A1 - Reinert, Bastian A1 - Götze, Clemens T1 - Einleitung: Intertextualität – Korrelationen – Korrespondenzen T1 - Introduction: Intertextuality - Correlations - Correspondences T2 - Elfriede Jelinek und Thomas Bernhard : Intertextualität – Korrelationen – Korrespondenzen Y1 - 2019 SN - 978-3-11-063267-5 SN - 978-3-11-062697-1 SN - 978-3-11-073672-4 U6 - https://doi.org/10.1515/9783110632675-001 VL - 154 SP - 1 EP - 9 PB - De Gruyter CY - Berlin ER - TY - GEN A1 - Lohse, Karoline A1 - Sixtus, Elena A1 - Lonnemann, Jan T1 - Thinking about time and number BT - an application of the dual-systems approach to numerical cognition T2 - Behavioral and brain sciences : an international journal of current research and theory with open peer commentary N2 - Based on the notion that time, space, and number are part of a generalized magnitude system, we assume that the dual-systems approach to temporal cognition also applies to numerical cognition. Referring to theoretical models of the development of numerical concepts, we propose that children's early skills in processing numbers can be described analogously to temporal updating and temporal reasoning. Y1 - 2019 U6 - https://doi.org/10.1017/S0140525X19000475 SN - 0140-525X SN - 1469-1825 VL - 42 PB - Cambridge Univ. Press CY - New York ER - TY - GEN A1 - Ghahremani, Sona A1 - Giese, Holger T1 - Performance evaluation for self-healing systems BT - Current Practice & Open Issues T2 - 2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W) N2 - Evaluating the performance of self-adaptive systems (SAS) is challenging due to their complexity and interaction with the often highly dynamic environment. In the context of self-healing systems (SHS), employing simulators has been shown to be the most dominant means for performance evaluation. Simulating a SHS also requires realistic fault injection scenarios. We study the state of the practice for evaluating the performance of SHS by means of a systematic literature review. We present the current practice and point out that a more thorough and careful treatment in evaluating the performance of SHS is required. KW - self-healing KW - failure profile KW - evaluation KW - simulator KW - performance Y1 - 2019 SN - 978-1-7281-2406-3 U6 - https://doi.org/10.1109/FAS-W.2019.00039 SP - 116 EP - 119 PB - IEEE CY - New York ER - TY - GEN A1 - Wellenberg, Anna A1 - Weides, L. A1 - Bornhorst, Julia A1 - Crone, Barbara A1 - Karst, U. A1 - Fritz, G. A1 - Honnen, S. T1 - Molecular and electrophysiological analysis of platinum-induced neurotoxicity using the model organism C. elegans T2 - Naunyn-Schmiedeberg's archives of pharmacology Y1 - 2019 UR - https://link.springer.com/content/pdf/10.1007%2Fs00210-019-01621-6.pdf U6 - https://doi.org/10.1007/s00210-019-01621-6 SN - 0028-1298 SN - 1432-1912 VL - 392 SP - S63 EP - S63 PB - Springer CY - New York ER - TY - GEN A1 - de Vera, Jean-Pierre Paul A1 - Alawi, Mashal A1 - Backhaus, Theresa A1 - Baque, Mickael A1 - Billi, Daniela A1 - Boettger, Ute A1 - Berger, Thomas A1 - Bohmeier, Maria A1 - Cockell, Charles A1 - Demets, Rene A1 - de la Torre Noetzel, Rosa A1 - Edwards, Howell A1 - Elsaesser, Andreas A1 - Fagliarone, Claudia A1 - Fiedler, Annelie A1 - Foing, Bernard A1 - Foucher, Frederic A1 - Fritz, Jörg A1 - Hanke, Franziska A1 - Herzog, Thomas A1 - Horneck, Gerda A1 - Hübers, Heinz-Wilhelm A1 - Huwe, Björn A1 - Joshi, Jasmin Radha A1 - Kozyrovska, Natalia A1 - Kruchten, Martha A1 - Lasch, Peter A1 - Lee, Natuschka A1 - Leuko, Stefan A1 - Leya, Thomas A1 - Lorek, Andreas A1 - Martinez-Frias, Jesus A1 - Meessen, Joachim A1 - Moritz, Sophie A1 - Moeller, Ralf A1 - Olsson-Francis, Karen A1 - Onofri, Silvano A1 - Ott, Sieglinde A1 - Pacelli, Claudia A1 - Podolich, Olga A1 - Rabbow, Elke A1 - Reitz, Günther A1 - Rettberg, Petra A1 - Reva, Oleg A1 - Rothschild, Lynn A1 - Garcia Sancho, Leo A1 - Schulze-Makuch, Dirk A1 - Selbmann, Laura A1 - Serrano, Paloma A1 - Szewzyk, Ulrich A1 - Verseux, Cyprien A1 - Wadsworth, Jennifer A1 - Wagner, Dirk A1 - Westall, Frances A1 - Wolter, David A1 - Zucconi, Laura T1 - Limits of life and the habitability of Mars BT - the ESA space experiment BIOMEX on the ISS T2 - Astrobiology N2 - BIOMEX (BIOlogy and Mars EXperiment) is an ESA/Roscosmos space exposure experiment housed within the exposure facility EXPOSE-R2 outside the Zvezda module on the International Space Station (ISS). The design of the multiuser facility supports-among others-the BIOMEX investigations into the stability and level of degradation of space-exposed biosignatures such as pigments, secondary metabolites, and cell surfaces in contact with a terrestrial and Mars analog mineral environment. In parallel, analysis on the viability of the investigated organisms has provided relevant data for evaluation of the habitability of Mars, for the limits of life, and for the likelihood of an interplanetary transfer of life (theory of lithopanspermia). In this project, lichens, archaea, bacteria, cyanobacteria, snow/permafrost algae, meristematic black fungi, and bryophytes from alpine and polar habitats were embedded, grown, and cultured on a mixture of martian and lunar regolith analogs or other terrestrial minerals. The organisms and regolith analogs and terrestrial mineral mixtures were then exposed to space and to simulated Mars-like conditions by way of the EXPOSE-R2 facility. In this special issue, we present the first set of data obtained in reference to our investigation into the habitability of Mars and limits of life. This project was initiated and implemented by the BIOMEX group, an international and interdisciplinary consortium of 30 institutes in 12 countries on 3 continents. Preflight tests for sample selection, results from ground-based simulation experiments, and the space experiments themselves are presented and include a complete overview of the scientific processes required for this space experiment and postflight analysis. The presented BIOMEX concept could be scaled up to future exposure experiments on the Moon and will serve as a pretest in low Earth orbit. KW - EXPOSE-R2 KW - BIOMEX KW - Habitability KW - Limits of life KW - Extremophiles KW - Mars Y1 - 2019 U6 - https://doi.org/10.1089/ast.2018.1897 SN - 1531-1074 SN - 1557-8070 VL - 19 IS - 2 SP - 145 EP - 157 PB - Liebert CY - New Rochelle ER - TY - GEN A1 - Sowemimo, Oluwakemi A1 - Borcherds, Wade A1 - Knox-Brown, Patrick A1 - Rindfleisch, Tobias A1 - Thalhammer, Anja A1 - Daughdrill, Gary T1 - Evolution of Transient Helicity and Disorder in Late Embryogenesis Abundant Protein COR15A T2 - Biophysical journal N2 - Cold regulated protein 15A (COR15A) is a nuclear encoded, intrinsically disordered protein that is found in Arabidopsis thaliana. It belongs to the Late Embryogenesis Abundant (LEA) family of proteins and is responsible for increased freezing tolerance in plants. COR15A is intrinsically disordered in dilute solutions and adopts a helical structure upon dehydration or in the presence of co-solutes such as TFE and ethylene glycol. This helical structure is thought to be important for protecting plants from dehydration induced by freezing. Multiple protein sequence alignments revealed the presence of several conserved glycine residues that we hypothesize keeps COR15A from becoming helical in dilute solutions. Using AGADIR, the change in helical content of COR15A when these conserved glycine residues were mutated to alanine residues was predicted. Based on the predictions, glycine to alanine mutants were made at position 68, and 54,68,81, and 84. Labeled samples of wildtype COR15A and mutant proteins were purified and NMR experiments were performed to examine any structural changes induced by the mutations. To test the effects of dehydration on the structure of COR15A, trifluoroethanol, an alcohol based co solvent that is proposed to induce/stabilize helical structure in peptides was added to the NMR samples, and the results of the experiment showed an increase in helical content, compared to the samples without TFE. To test the functional differences between wild type and the mutants, liposome leakage assays were performed. The results from these assays suggest the more helical mutants may augment membrane stability. Y1 - 2019 U6 - https://doi.org/10.1016/j.bpj.2018.11.2553 SN - 0006-3495 SN - 1542-0086 VL - 116 IS - 3 SP - 473A EP - 473A PB - Cell Press CY - Cambridge ER - TY - GEN A1 - Lepro, Valentino A1 - Nagel, Oliver A1 - Klumpp, Stefan A1 - Lipowsky, Reinhard A1 - Beta, Carsten T1 - Cooperative Transport by Amoeboid Cells BT - a Cellular Tug-of-War T2 - Biophysical journal Y1 - 2019 U6 - https://doi.org/10.1016/j.bpj.2018.11.682 SN - 0006-3495 SN - 1542-0086 VL - 116 IS - 3 SP - 122A EP - 122A PB - Cell Press CY - Cambridge ER - TY - GEN A1 - Gerhard, Reimund A1 - Kaltenbrunner, Martin T1 - In Memoriam Siegfried Bauer T2 - IEEE electrical insulation magazine N2 - Siegfried Bauer, an internationally renowned, very creative applied physicist, who also was a prolific materials scientist and engineer, died on December 30, 2018, in Linz, Austria, after a one-year battle with cancer. He was full professor of soft-matter physics at the Johannes Kepler University Linz, Austria, and a scientific leader and innovator across the fields but mainly in the areas of electro-active materials (including electrets) and stretchable and imperceptible electronics. Y1 - 2019 U6 - https://doi.org/10.1109/MEI.2019.8636175 SN - 0883-7554 SN - 1558-4402 VL - 35 IS - 2 SP - 76 EP - 78 PB - IEEE CY - Piscataway ER - TY - GEN A1 - Hölzle, Katharina A1 - Björk, Jennie A1 - Visscher, Klaasjan T1 - Editorial T2 - Creativity and innovation management N2 - The new year starts and many of us have right away been burdened with conference datelines, grant proposal datelines, teaching obligations, paper revisions and many other things. While being more or less successful in fulfilling To‐Do lists and ticking of urgent (and sometimes even important) things, we often feel that our ability to be truly creative or innovative is rather restrained by this (external pressure). With this, we are not alone. Many studies have shown that stress does influence overall work performance and satisfaction. Furthermore, more and more students and entry‐levels look for work‐life balance and search for employers that offer a surrounding and organization considering these needs. High‐Tech and start‐up companies praise themselves for their “Feel‐Good managers” or Yoga programs. But is this really helpful? Is there indeed a relationship between stress, adverse work environment and creativity or innovation? What are the supporting factors in a work environment that lets employees be more creative? What kind of leadership do we need for innovative behaviour and to what extent can an organization create support structures that reduce the stress we feel? The first issue of Creativity and Innovation Management in 2019 gives some first answers to these questions and hopefully some food for thought. The first paper written by Dirk De Clercq, and Imanol Belausteguigoitia starts with the question which impact work overload has on creative behaviour. The authors look at how employees' perceptions of work overload reduces their creative behaviour. While they find empirical proof for this relationship, they can also show that the effect is weaker with higher levels of passion for work, emotion sharing, and organizational commitment. The buffering effects of emotion sharing and organizational commitment are particularly strong when they are combined with high levels of passion for work. Their findings give first empirical proof that organizations can and should take an active role in helping their employees reducing the effects of adverse work conditions in order to become or stay creative. However, not only work overload is harming creative behaviour, also the fear of losing one's job has detrimental effects on innovative work behaviour. Anahi van Hootegem, Wendy Niesen and Hans de Witte verify that stress and adverse environmental conditions shape our perception of work. Using threat rigidity theory and an empirical study of 394 employees, they show that the threat of job loss impairs employees' innovativeness through increased irritation and decreased concentration. Organizations can help their employees coping better with this insecurity by communicating more openly and providing different support structures. Support often comes from leadership and the support of the supervisor can clearly shape an employee's motivation to show creative behaviour. Wenjing Cai, Evgenia Lysova, Bart A. G. Bossink, Svetlana N. Khapova and Weidong Wang report empirical findings from a large‐scale survey in China where they find that supervisor support for creativity and job characteristics effectively activate individual psychological capital associated with employee creativity. On a slight different notion, Gisela Bäcklander looks at agile practices in a very well‐known High Tech firm. In “Doing Complexity Leadership Theory: How agile coaches at Spotify practice enabling leadership”, she researches the role of agile coaches and how they practice enabling leadership, a key balancing force in complexity leadership. She finds that the active involvement of coaches in observing group dynamics, surfacing conflict and facilitating and encouraging constructive dialogue leads to a positive working environment and the well‐being of employees. Quotes from the interviews suggest that the flexible structure provided by the coaches may prove a fruitful way to navigate and balance autonomy and alignment in organizations. The fifth paper of Frederik Anseel, Michael Vandamme, Wouter Duyck and Eric Rietzchel goes a little further down this road and researches how groups can be motivated better to select truly creative ideas. We know from former studies that groups often perform rather poorly when it comes to selecting creative ideas for implementation. The authors find in an extensive field experiment that under conditions of high epistemic motivation, proself motivated groups select significantly more creative and original ideas than prosocial groups. They conclude however, that more research is needed to understand better why these differences occur. The prosocial behaviour of groups is also the theme of Karin Moser, Jeremy F. Dawson and Michael A. West's paper on “Antecedents of team innovation in health care teams”. They look at team‐level motivation and how a prosocial team environment, indicated by the level of helping behaviour and information‐sharing, may foster innovation. Their results support the hypotheses of both information‐sharing and helping behaviour on team innovation. They suggest that both factors may actually act as buffer against constraints in team work, such as large team size or high occupational diversity in cross‐functional health care teams, and potentially turn these into resources supporting team innovation rather than acting as barriers. Away from teams and onto designing favourable work environments, the seventh paper of Ferney Osorio, Laurent Dupont, Mauricio Camargo, Pedro Palominos, Jose Ismael Pena and Miguel Alfaro looks into innovation laboratories. Although several studies have tackled the problem of design, development and sustainability of these spaces for innovation, there is still a gap in understanding how the capabilities and performance of these environments are affected by the strategic intentions at the early stages of their design and functioning. The authors analyse and compare eight existing frameworks from literature and propose a new framework for researchers and practitioners aiming to assess or to adapt innovation laboratories. They test their framework in an exploratory study with fifteen laboratories from five different countries and give recommendations for the future design of these laboratories. From design to design thinking goes our last paper from Rama Krishna Reddy Kummitha on “Design Thinking in Social Organisations: Understanding the role of user engagement” where she studies how users persuade social organisations to adopt design thinking. Looking at four social organisations in India during 2008 to 2013, she finds that the designer roles are blurred when social organisations adopt design thinking, while users in the form of interconnecting agencies reduce the gap between designers and communities. The last two articles were developed from papers presented at the 17th International CINet conference organized in Turin in 2016 by Paolo Neirotti and his colleagues. In the first article, Fábio Gama, Johan Frishammar and Vinit Parida focus on ideation and open innovation in small‐ and medium‐sized enterprises. They investigate the relationship between systematic idea generation and performance and the moderating role of market‐based partnerships. Based on a survey among manufacturing SMEs, they conclude that higher levels of performance are reached and that collaboration with customers and suppliers pays off most when idea generation is done in a highly systematic way. The second article, by Anna Holmquist, Mats Magnusson and Mona Livholts, resonates the theme of the CINet conference ‘Innovation and Tradition; combining the old and the new’. They explore how tradition is used in craft‐based design practices to create new meaning. Applying a narrative ‘research through design’ approach they uncover important design elements, and tensions between them. Please enjoy this first issue of CIM in 2019 and we wish you creativity and innovation without too much stress in the months to come. Y1 - 2019 U6 - https://doi.org/10.1111/caim.12307 SN - 0963-1690 SN - 1467-8691 VL - 28 IS - 1 SP - 3 EP - 4 PB - Wiley CY - Hoboken ER - TY - GEN A1 - Shaki, Samuel A1 - Fischer, Martin H. T1 - Commentary on: E. H. Toomarian ; E. M. Hubbard, On the genesis of spatial-numerical associations: Evolutionary and cultural factors co-construct the mental number line. - (Neuroscience & Biobehavioral Reviews. - vol 95, 2018, pg 189 - 190) T2 - Neuroscience & biobehavioral reviews : official journal of the International Behavioral Neuroscience Society Y1 - 2019 U6 - https://doi.org/10.1016/j.neubiorev.2018.12.018 SN - 0149-7634 SN - 1873-7528 VL - 98 SP - 335 EP - 335 PB - Elsevier CY - Oxford ER - TY - GEN A1 - Beierle, Christoph A1 - Berndt, Jan Ole A1 - Gronau, Norbert A1 - Timm, Ingo J. T1 - Intentional Forgetting: A Huge Potential for Organizations BT - Interview with Prof. Norbert Gronau, University of Potsdam T2 - Künstliche Intelligenz Y1 - 2019 U6 - https://doi.org/10.1007/s13218-018-00573-y SN - 0933-1875 SN - 1610-1987 VL - 33 IS - 1 SP - 85 EP - 87 PB - Springer CY - Heidelberg ER - TY - GEN A1 - Haag, Johannes A1 - Hoeppner, Till T1 - Errata zu: Denken und Welt – Wege kritischer Metaphysik. dzph. Band 67, 2019, Heft 1, S. 76–97 T2 - Deutsche Zeitschrift für Philosophie : Zweimonatsschrift der internationalen philosophischen Forschung N2 - We begin by considering two common ways of conceiving critical metaphysics. According to the first (and polemical) conception, critical metaphysics analyzes nothing more than the form of thought and thereby misses the proper point of metaphysics, namely to investigate the form of reality. According to the second (and affirmative) conception, critical metaphysics starts from the supposed insight that the form of reality can’t be other than the form of thought and is thus not required to analyze anything but that form. We argue that the first conception is too weak while the second is too strong. Then we sketch an alternative conception of critical metaphysics, a conception we find expressed both in Kant’s B-Deduction and in the way Barry Stroud has recently investigated the possibility of metaphysics. According to such a conception, a properly critical metaphysics needs to proceed in two steps: first, it needs to analyze the most general and necessary form of any thought that is about an objective reality at all; second, it needs to investigate how that form of thought relates to the reality it purports to represent. But unlike Kant, Stroud remains sceptical regarding the possibility of a satisfying transition from thought to reality in metaphysics. We argue that this dissatisfaction can be traced back to a notion of objectivity and reality in terms of complete mind-independence. Then we sketch an alternative notion of objectivity and reality in terms of distinctness from subjects and acts of thinking, and argue that it is that notion that allows Kant, with his Transcendental Idealism, to make the transition required for any satisfying metaphysics, namely that from the form of thought to reality. T2 - Thought and the World - Paths of critical Metaphysics (vol 67, 2019, H. 1, pg 76-97) Y1 - 2019 U6 - https://doi.org/10.1515/dzph-2019-0888 SN - 0012-1045 SN - 2192-1482 VL - 67 IS - 2 SP - 326 EP - 327 PB - De Gruyter CY - Berlin ER - TY - GEN A1 - Lewandowsky, Stephan A1 - Cowtan, Kevin A1 - Risbey, James S. A1 - Mann, Michael E. A1 - Steinman, Byron A. A1 - Oreskes, Naomi A1 - Rahmstorf, Stefan T1 - Erratum: The 'pause' in global warming in historical context: II. Comparing models to observations (Environmental research letters. - Vol 13, (2018) 123007) T2 - Environmental research letters N2 - We review the evidence for a putative early 21st-century divergence between global mean surface temperature (GMST) and Coupled Model Intercomparison Project Phase 5 (CMIP5) projections. We provide a systematic comparison between temperatures and projections using historical versions of GMST products and historical versions of model projections that existed at the times when claims about a divergence were made. The comparisons are conducted with a variety of statistical techniques that correct for problems in previous work, including using continuous trends and a Monte Carlo approach to simulate internal variability. The results show that there is no robust statistical evidence for a divergence between models and observations. The impression of a divergence early in the 21st century was caused by various biases in model interpretation and in the observations, and was unsupported by robust statistics. Y1 - 2019 U6 - https://doi.org/10.1088/1748-9326/aafbb7 SN - 1748-9326 VL - 14 IS - 4 PB - IOP Publ. Ltd. CY - Bristol ER - TY - GEN A1 - Schwetlick, Lisa A1 - Trukenbrod, Hans Arne A1 - Engbert, Ralf T1 - The Influence of Visual Long Term Memory on Eye Movements During Scene Viewing T2 - Perception Y1 - 2019 SN - 0301-0066 SN - 1468-4233 VL - 48 IS - S1 SP - 138 EP - 138 PB - Sage Publ. CY - London ER - TY - GEN A1 - Brilmyer, S. Pearl A1 - Trentin, Filippo A1 - Xiang, Zairong T1 - Introduction: The Ontology of the Couple T2 - GLQ : a journal of lesbian and gay studies Y1 - 2019 U6 - https://doi.org/10.1215/10642684-7367703 SN - 1064-2684 SN - 1527-9375 VL - 25 IS - 2 SP - 217 EP - 221 PB - Duke University Press CY - Durham ER - TY - GEN A1 - Geissman, John A1 - Jolivet, Laurent A1 - Rusmore, Margi A1 - Niemi, Nathan A1 - Schildgen, Taylor F. T1 - Thank you to our 2018 peer reviewers T2 - Tectonics N2 - An essential, respected, and critical aspect of the modern practice of science and scientific publishing is peer review. The process of peer review facilitates best practices in scientific conduct and communication, ensuring that manuscripts published are as accurate, valuable, and clearly communicated. The over 216 papers published in Tectonics in 2018 benefit from the time, effort, and expertise of our reviewers who have provided thoughtfully considered advice on each manuscript. This role is critical to advancing our understanding of the evolution of the continents and their margins, as these reviews lead to even clearer and higher-quality papers. In 2018, the over 443 papers submitted to Tectonics were the beneficiaries of more than 1,010 reviews provided by 668 members of the tectonics community and related disciplines. To everyone who has volunteered their time and intellect to peer reviewing, thank you for helping Tectonics and all other AGU Publications provide the best science possible. Y1 - 2019 U6 - https://doi.org/10.1029/2019TC005595 SN - 0278-7407 SN - 1944-9194 VL - 38 IS - 4 SP - 1159 EP - 1163 PB - Hoboken CY - Wiley ER - TY - GEN A1 - Schütt, Heiko Herbert A1 - Rothkegel, Lars Oliver Martin A1 - Trukenbrod, Hans Arne A1 - Engbert, Ralf A1 - Wichmann, Felix A. T1 - Predicting fixation densities over time from early visual processing T2 - Perception N2 - Bottom-up saliency is often cited as a factor driving the choice of fixation locations of human observers, based on the (partial) success of saliency models to predict fixation densities in free viewing. However, these observations are only weak evidence for a causal role of bottom-up saliency in natural viewing behaviour. To test bottom-up saliency more directly, we analyse the performance of a number of saliency models---including our own saliency model based on our recently published model of early visual processing (Schütt & Wichmann, 2017, JoV)---as well as the theoretical limits for predictions over time. On free viewing data our model performs better than classical bottom-up saliency models, but worse than the current deep learning based saliency models incorporating higher-level information like knowledge about objects. However, on search data all saliency models perform worse than the optimal image independent prediction. We observe that the fixation density in free viewing is not stationary over time, but changes over the course of a trial. It starts with a pronounced central fixation bias on the first chosen fixation, which is nonetheless influenced by image content. Starting with the 2nd to 3rd fixation, the fixation density is already well predicted by later densities, but more concentrated. From there the fixation distribution broadens until it reaches a stationary distribution around the 10th fixation. Taken together these observations argue against bottom-up saliency as a mechanistic explanation for eye movement control after the initial orienting reaction in the first one to two saccades, although we confirm the predictive value of early visual representations for fixation locations. The fixation distribution is, first, not well described by any stationary density, second, is predicted better when including object information and, third, is badly predicted by any saliency model in a search task. Y1 - 2019 SN - 0301-0066 SN - 1468-4233 VL - 48 SP - 64 EP - 65 PB - Sage Publ. CY - London ER - TY - GEN A1 - Plank, Roswitha A1 - Yealland, Guy A1 - Miceli, Enrico A1 - Cunha, Dulce Lima A1 - Graff, Patrick A1 - Thomforde, Sari A1 - Gruber, Robert A1 - Moosbrugger-Martinz, Verena A1 - Eckl, Katja A1 - Calderon, Marcelo A1 - Hennies, Hans Christian A1 - Hedtrich, Sarah T1 - Transglutaminase 1 Replacement Therapy Successfully Mitigates the Autosomal Recessive Congenital Ichthyosis Phenotype in Full-Thickness Skin Disease Equivalents T2 - The journal of investigative dermatology Y1 - 2019 U6 - https://doi.org/10.1016/j.jid.2018.11.002 SN - 0022-202X SN - 1523-1747 VL - 139 IS - 5 SP - 1191 EP - 1195 PB - Elsevier CY - New York ER - TY - GEN A1 - Krause, Andreas A1 - Kloft, Charlotte A1 - Huisinga, Wilhelm A1 - Karlsson, Mats A1 - Pinheiro, José A1 - Bies, Robert A1 - Rogers, James A1 - Mentré, France A1 - Musser, Bret J. T1 - Comment on Jaki et al., A proposal for a new PhD level curriculum on quantitative methods for drug development T2 - Pharmaceutical statistics : the journal of applied statistics in the pharmaceutical industry Y1 - 2019 SN - 1539-1604 SN - 1539-1612 VL - 18 IS - 3 SP - 278 EP - 281 PB - Wiley CY - Hoboken ER -