004 Datenverarbeitung; Informatik
Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (44)
- Monographie/Sammelband (39)
- Dissertation (35)
- Postprint (5)
- Konferenzveröffentlichung (2)
- Teil eines Buches (Kapitel) (1)
- Sonstiges (1)
Schlagworte
- machine learning (8)
- Smalltalk (5)
- maschinelles Lernen (5)
- cyber-physical systems (4)
- digital education (4)
- openHPI (4)
- probabilistic timed systems (4)
- qualitative Analyse (4)
- qualitative analysis (4)
- quantitative Analyse (4)
- quantitative analysis (4)
- Cloud Computing (3)
- Digitalisierung (3)
- Forschungsprojekte (3)
- Future SOC Lab (3)
- Hasso Plattner Institute (3)
- Hasso-Plattner-Institut (3)
- In-Memory Technologie (3)
- MOOC (3)
- Multicore Architekturen (3)
- artifical intelligence (3)
- blockchain (3)
- business process management (3)
- cloud (3)
- cloud computing (3)
- digitale Bildung (3)
- digitalization (3)
- multicore architectures (3)
- research projects (3)
- smart contracts (3)
- 3D visualization (2)
- 3D-Visualisierung (2)
- Anomalieerkennung (2)
- Bounded Model Checking (2)
- Datenaufbereitung (2)
- Datenbanksysteme (2)
- Design Thinking (2)
- European Union (2)
- Europäische Union (2)
- Forschungskolleg (2)
- Graphentransformationssysteme (2)
- HPI Schul-Cloud (2)
- Identitätsmanagement (2)
- In-Memory (2)
- In-Memory technology (2)
- Innovation (2)
- Klausurtagung (2)
- MERLOT (2)
- Modellprüfung (2)
- Ph.D. retreat (2)
- Programmieren (2)
- Service-oriented Systems Engineering (2)
- Sicherheit (2)
- Versionsverwaltung (2)
- Werkzeuge (2)
- anomaly detection (2)
- bounded model checking (2)
- business processes (2)
- causal discovery (2)
- causal structure learning (2)
- classification (2)
- clustering (2)
- computer vision (2)
- cyber-physische Systeme (2)
- data preparation (2)
- database systems (2)
- deep learning (2)
- deferred choice (2)
- digital enlightenment (2)
- digital learning platform (2)
- digital sovereignty (2)
- digitale Aufklärung (2)
- digitale Lernplattform (2)
- digitale Souveränität (2)
- formal semantics (2)
- functional dependencies (2)
- funktionale Abhängigkeiten (2)
- geospatial data (2)
- graph transformation systems (2)
- identity management (2)
- inclusion dependencies (2)
- index selection (2)
- innovation (2)
- intrusion detection (2)
- kausale Entdeckung (2)
- kausales Strukturlernen (2)
- künstliche Intelligenz (2)
- lebenslanges Lernen (2)
- lifelong learning (2)
- liveness (2)
- maschinelles Sehen (2)
- memory (2)
- mobile mapping (2)
- model checking (2)
- nested graph conditions (2)
- oracles (2)
- outlier detection (2)
- probabilistische gezeitete Systeme (2)
- probabilistische zeitgesteuerte Systeme (2)
- programming (2)
- research school (2)
- security (2)
- self-sovereign identity (2)
- service-oriented systems engineering (2)
- tiefes Lernen (2)
- typed attributed graphs (2)
- user interaction (2)
- user-generated content (2)
- version control (2)
- workflow patterns (2)
- 0-day (1)
- 3D city model (1)
- 3D geovisualization (1)
- 3D point cloud (1)
- 3D point clouds (1)
- 3D portrayal (1)
- 3D-Geovisualisierung (1)
- 3D-Punktwolke (1)
- 3D-Punktwolken (1)
- 3D-Rendering (1)
- 3D-Stadtmodell (1)
- ACINQ (1)
- APT (1)
- ASIC (1)
- Activity-oriented Optimization (1)
- Advanced Persistent Threats (1)
- Agile (1)
- Agilität (1)
- Aktivitäten (1)
- Algebraic methods (1)
- Ambiguity (1)
- Ambiguität (1)
- Analog-zu-Digital-Konvertierung (1)
- Anfrageoptimierung (1)
- Angriffserkennung (1)
- Architekturadaptation (1)
- Archivanalyse (1)
- Arzt-Patient-Beziehung (1)
- Attributsicherung (1)
- Ausreißererkennung (1)
- Australian securities exchange (1)
- Auswirkungen (1)
- BCCC (1)
- BPMN (1)
- BTC (1)
- Bahnwesen (1)
- Bedrohungserkennung (1)
- Behavior change (1)
- Benutzerinteraktion (1)
- Betriebssysteme (1)
- Big Data (1)
- Big Five model (1)
- Bildverarbeitung (1)
- BitShares (1)
- Bitcoin Core (1)
- Blockchain (1)
- Blockchain Auth (1)
- Blockchain-Konsortium R3 (1)
- Blockkette (1)
- Blockstack (1)
- Blockstack ID (1)
- Blumix-Plattform (1)
- Blöcke (1)
- Bounded Backward Model Checking (1)
- Business Process Management (1)
- Business process modeling (1)
- Byzantine Agreement (1)
- CityGML (1)
- Clinical predictive modeling (1)
- Cloud (1)
- Clusteranalyse (1)
- Clustering (1)
- Colored Coins (1)
- Commonsense reasoning (1)
- Complexity (1)
- Compound Values (1)
- Computational Photography (1)
- Computing (1)
- Conceptual modeling (1)
- Creative (1)
- Cyber-Sicherheit (1)
- Cyber-physikalische Systeme (1)
- DAO (1)
- DBMS (1)
- DPoS (1)
- Data Profiling (1)
- Data Structure Optimization (1)
- Data modeling (1)
- Data profiling (1)
- Data warehouse (1)
- Data-Mining (1)
- Data-Science (1)
- Dateistruktur (1)
- Datenanalyse (1)
- Datenbank (1)
- Datenintegration (1)
- Datenmodelle (1)
- Datenqualität (1)
- Datensatz (1)
- Datenschutz-sicherer Einsatz in der Schule (1)
- Datenstrukturoptimierung (1)
- Datensynthese (1)
- Datentransformation (1)
- Datenvisualisierung (1)
- Debugging (1)
- Decision support (1)
- Dekubitus (1)
- Delegated Proof-of-Stake (1)
- Denkweise (1)
- Design-Forschung (1)
- Digital Engineering (1)
- Direkte Manipulation (1)
- Distributed Proof-of-Research (1)
- Distributed-Ledger-Technologie (DLT) (1)
- Domänenspezifische Modellierung (1)
- Dubletten (1)
- Duplikaterkennung (1)
- E-Learning (1)
- E-Wallet (1)
- ECDSA (1)
- Echtzeit (1)
- Echtzeit-Rendering (1)
- Einbruchserkennung (1)
- Endpunktsicherheit (1)
- Entitätsverknüpfung (1)
- Entscheidungsfindung (1)
- Entscheidungsmanagement (1)
- Entscheidungsmodelle (1)
- Enumeration algorithm (1)
- Eris (1)
- Erkennung von Metadaten (1)
- Ether (1)
- Ethereum (1)
- Evaluation (1)
- Exploration (1)
- Feature selection (1)
- Federated Byzantine Agreement (1)
- Fehlertoleranz (1)
- Fernerkundung (1)
- Fertigung (1)
- FollowMyVote (1)
- Fork (1)
- Formal modelling (1)
- GPU (1)
- GPU acceleration (1)
- GPU-Beschleunigung (1)
- Gaussian process state-space models (1)
- Gaussian processes (1)
- Gauß-Prozess Zustandsraummodelle (1)
- Gauß-Prozesse (1)
- Gene expression (1)
- General Earth and Planetary Sciences (1)
- Generalized Discrimination Networks (1)
- Geodaten (1)
- Geography, Planning and Development (1)
- German schools (1)
- Geschäftsprozessarchitekturen (1)
- Geschäftsprozessmanagement (1)
- Gewinnung benannter Entitäten (1)
- GitHub (1)
- GraalVM (1)
- Graph logic (1)
- Graph-Mining (1)
- Graphableitung (1)
- Graphreparatur (1)
- Gridcoin (1)
- Hard Fork (1)
- Hashed Timelock Contracts (1)
- Hasserkennung (1)
- Heuristiken (1)
- Hyrise (1)
- Häkeln (1)
- IDS (1)
- IT-Infrastruktur (1)
- IT-infrastructure (1)
- Ideation (1)
- Ideenfindung (1)
- Identität (1)
- Impact (1)
- Implementation in Organizations (1)
- Implementierung in Organisationen (1)
- Indexauswahl (1)
- Informationsextraktion (1)
- Inklusionsabhängigkeiten (1)
- Interdisciplinary Teams (1)
- Internet der Dinge (1)
- Internet of Things (1)
- Interpretability (1)
- Interpreter (1)
- Interval Timed Automata (1)
- IoT (1)
- Japanese Blockchain Consortium (1)
- Japanisches Blockchain-Konsortium (1)
- Java (1)
- Karten (1)
- Kausalität (1)
- Kette (1)
- Klassifikation (1)
- Klassifizierung (1)
- Konsensalgorithmus (1)
- Konsensprotokoll (1)
- Konsensprotokolle (1)
- Konsistenzrestauration (1)
- Kreativität (1)
- Kunstanalyse (1)
- Künstliche Intelligenz (1)
- Laserscanning (1)
- Lastverteilung (1)
- Laufzeitmodelle (1)
- Learning Analytics (1)
- Lebendigkeit (1)
- Leistungsmodelle von virtuellen Maschinen (1)
- LiDAR (1)
- Lightning Network (1)
- Live-Migration (1)
- Live-Programmierung (1)
- Lively Kernel (1)
- Liveness (1)
- Lock-Time-Parameter (1)
- Lösungsraum (1)
- MOOCs (1)
- Machine-Learning (1)
- Machinelles Lernen (1)
- Maschinelles Lernen (1)
- Maschinen (1)
- Measurement (1)
- Messung (1)
- Metacrate (1)
- Metadaten (1)
- Micropayment-Kanäle (1)
- Microsoft Azur (1)
- Mindset (1)
- Minimal hitting set (1)
- Mobile Mapping (1)
- Mobile-Mapping (1)
- Modelle mit mehreren Versionen (1)
- Modellreparatur (1)
- Multidisciplinary Teams (1)
- NASDAQ (1)
- NameID (1)
- Namecoin (1)
- Nephrology (1)
- Netzwerkprotokolle (1)
- Non-photorealistic Rendering (1)
- Nutzerinteraktion (1)
- Objects (1)
- Objekte (1)
- Off-Chain-Transaktionen (1)
- Onename (1)
- Online Learning Environments (1)
- OpenBazaar (1)
- Opinion mining (1)
- OptoGait (1)
- Oracles (1)
- Ordinances (1)
- Orphan Block (1)
- P2P (1)
- Patientenermündigung (1)
- Peer-to-Peer Netz (1)
- Peercoin (1)
- PoB (1)
- PoS (1)
- PoW (1)
- Popular matching (1)
- Posenabschätzung (1)
- Prior knowledge (1)
- Privatsphäre (1)
- Problem Solving (1)
- Problemlösung (1)
- Process (1)
- Process Execution (1)
- Programmiererlebnis (1)
- Programmierwerkzeuge (1)
- Proof-of-Burn (1)
- Proof-of-Stake (1)
- Proof-of-Work (1)
- Prototyping (1)
- Prozess (1)
- Prozessmodelle (1)
- Psychotherapie (1)
- Python (1)
- Quanten-Computing (1)
- Query-Optimierung (1)
- RL (1)
- Regressionstests (1)
- Reproducible benchmarking (1)
- Resource Allocation (1)
- Resource Management (1)
- Reverse Engineering (1)
- Ripple (1)
- Ruby (1)
- Runtime-monitoring (1)
- SCP (1)
- SHA (1)
- SIEM (1)
- SPV (1)
- SWIRL (1)
- Savanne (1)
- Schriftartgestaltung (1)
- Schriftrendering (1)
- Schule (1)
- Schwierigkeitsgrad (1)
- Scrollytelling (1)
- Selbst-Adaptive Software (1)
- Self-Regulated Learning (1)
- Sequenzeigenschaften (1)
- Serialisierung (1)
- Service-Oriented Architecture (1)
- Sicherheitsanalyse (1)
- Simplified Payment Verification (1)
- Situationsbewusstsein (1)
- Skalierbarkeit der Blockchain (1)
- Skriptsprachen (1)
- Slock.it (1)
- Smart cities (1)
- Social (1)
- Soft Fork (1)
- Software-Evolution (1)
- Software/Hardware Co-Design (1)
- Solution Space (1)
- Soziale Medien (1)
- Specification (1)
- Spezifikation von gezeiteten Graph Transformationen (1)
- Sprachlernen im Limes (1)
- Squeak (1)
- Squeak/Smalltalk (1)
- Stable marriage (1)
- Stable matching (1)
- Standardisierung (1)
- Steemit (1)
- Stellar Consensus Protocol (1)
- Storj (1)
- Suchtberatung und -therapie (1)
- Telemedizin (1)
- Temporallogik (1)
- Testergebnisse (1)
- Testpriorisierungs (1)
- Text mining (1)
- Texterkennung (1)
- Textklassifikation (1)
- The Bitfury Group (1)
- The DAO (1)
- Timed Automata (1)
- Tools (1)
- Trajektorien (1)
- Transaktion (1)
- Transversal hypergraph (1)
- Tripel-Graph-Grammatiken (1)
- Two-Way-Peg (1)
- Unique column combination (1)
- Unspent Transaction Output (1)
- Unterricht mit digitalen Medien (1)
- User Experience (1)
- VUCA-World (1)
- Validation (1)
- Verbundwerte (1)
- Verhaltensänderung (1)
- Verlässlichkeit (1)
- Vertrauen (1)
- Verträge (1)
- Veränderungsanalyse (1)
- Virtual Machines (1)
- Virtuelle Maschinen (1)
- Visualisierungskonzept-Exploration (1)
- Vorhersage (1)
- W[3]-Completeness (1)
- Water Science and Technology (1)
- Watson IoT (1)
- Wearable (1)
- Werkzeugbau (1)
- Wicked Problems (1)
- Wolke (1)
- Wüstenbildung (1)
- Zebris (1)
- Zielvorgabe (1)
- Zookos Dreieck (1)
- Zookos triangle (1)
- acyclic preferences (1)
- addiction care (1)
- advanced persistent threat (1)
- advanced threats (1)
- agil (1)
- altchain (1)
- alternative chain (1)
- analog-to-digital conversion (1)
- apt (1)
- architectural adaptation (1)
- archive analysis (1)
- art analysis (1)
- asset management (1)
- atomic swap (1)
- attribute assurance (1)
- autonomous (1)
- behaviourally correct learning (1)
- benutzergenerierte Inhalte (1)
- bidirectional payment channels (1)
- bildbasiertes Rendering (1)
- bitcoins (1)
- blockchain consortium (1)
- blockchain-übergreifend (1)
- blocks (1)
- blumix platform (1)
- bounded backward model checking (1)
- brand personality (1)
- business process architectures (1)
- categories (1)
- causal AI (1)
- causal reasoning (1)
- causality (1)
- chain (1)
- change detection (1)
- code generation (1)
- compositional analysis (1)
- computational photography (1)
- computer-aided design (1)
- computer-mediated therapy (1)
- computervermittelte Therapie (1)
- computing (1)
- confirmation period (1)
- confluence (1)
- consensus algorithm (1)
- consensus protocol (1)
- consensus protocols (1)
- consistency restoration (1)
- consistent learning (1)
- contest period (1)
- continuous integration (1)
- contracts (1)
- convolutional neural networks (1)
- creativity (1)
- crochet (1)
- cross-chain (1)
- cultural heritage (1)
- cumulative culture (1)
- cyber-physikalische Systeme (1)
- cybersecurity (1)
- data analytics (1)
- data dependencies (1)
- data integration (1)
- data mining (1)
- data models (1)
- data pipeline (1)
- data profiling (1)
- data quality (1)
- data science (1)
- data set (1)
- data synthesis (1)
- data visualization (1)
- data wrangling (1)
- data-driven (1)
- database (1)
- database optimization (1)
- datengetrieben (1)
- debugging (1)
- decentral identities (1)
- decentralized autonomous organization (1)
- decision management (1)
- decision mining (1)
- decision models (1)
- decubitus (1)
- deduplication (1)
- deep Gaussian processes (1)
- demografische Informationen (1)
- demographic information (1)
- dependability (1)
- desertification (1)
- design research (1)
- dezentrale Identitäten (1)
- dezentrale autonome Organisation (1)
- difficulty (1)
- difficulty target (1)
- digital picture archive (1)
- digital unterstützter Unterricht (1)
- digital whiteboard (1)
- digitale Infrastruktur für den Schulunterricht (1)
- digitales Bildarchiv (1)
- digitales Whiteboard (1)
- direct manipulation (1)
- discrete-event model (1)
- diskretes Ereignismodell (1)
- distributed computation (1)
- distributed performance monitoring (1)
- distributed systems (1)
- doctor-patient relationship (1)
- domain-specific modeling (1)
- doppelter Hashwert (1)
- double hashing (1)
- drift theory (1)
- duplicate detection (1)
- dynamic systems (1)
- dynamische Systeme (1)
- e-learning (1)
- electrical muscle stimulation (1)
- elektrische Muskelstimulation (1)
- endpoint security (1)
- entity linking (1)
- entity resolution (1)
- erzeugende gegnerische Netzwerke (1)
- evaluation (1)
- evolutionary computation (1)
- experience (1)
- exploration (1)
- exploratives Programmieren (1)
- exploratory programming (1)
- extend (1)
- fault tolerance (1)
- federated voting (1)
- file structure (1)
- font engineering (1)
- font rendering (1)
- fortschrittliche Angriffe (1)
- gait analysis algorithm (1)
- ganzzahlige lineare Optimierung (1)
- gefaltete neuronale Netze (1)
- gemischte Daten (1)
- generalized discrimination networks (1)
- generative adversarial networks (1)
- geschichtsbewusste Laufzeit-Modelle (1)
- getypte Attributierte Graphen (1)
- global model management (1)
- globales Modellmanagement (1)
- grammars (1)
- graph inference (1)
- graph mining (1)
- graph repair (1)
- graph-transformations (1)
- hashrate (1)
- hate speech detection (1)
- heuristics (1)
- higher education (1)
- history-aware runtime models (1)
- human-centered (1)
- hybrid systems (1)
- identity (1)
- image processing (1)
- image stylization (1)
- image-based rendering (1)
- immediacy (1)
- in-memory (1)
- in-memory technology (1)
- incremental graph query evaluation (1)
- inertial measurement unit (1)
- information extraction (1)
- inkrementelle Ausführung von Graphanfragen (1)
- integer linear programming (1)
- integrated development environments (1)
- integrierte Entwicklungsumgebungen (1)
- intelligente Verträge (1)
- inter-chain (1)
- interactive media (1)
- interaktive Medien (1)
- interdisziplinäre Teams (1)
- interpreters (1)
- interval probabilistic timed systems (1)
- interval probabilistische zeitgesteuerte Systeme (1)
- interval timed automata (1)
- intransitivity (1)
- intuitive Benutzeroberflächen (1)
- intuitive interfaces (1)
- invention (1)
- invention mechanism (1)
- juridical recording (1)
- k-inductive invariant checking (1)
- k-induktive Invariantenprüfung (1)
- kausale KI (1)
- kausale Schlussfolgerung (1)
- kompositionale Analyse (1)
- konsistentes Lernen (1)
- kontinuierliche Integration (1)
- kulturelles Erbe (1)
- language learning in the limit (1)
- laserscanning (1)
- learning (1)
- lebenszentriert (1)
- ledger assets (1)
- left recursion (1)
- level-replacement systems (1)
- life-centered (1)
- live migration (1)
- live programming (1)
- load balancing (1)
- machine (1)
- machines (1)
- manufacturing (1)
- maps (1)
- maschinelle Verarbeitung natürlicher Sprache (1)
- media (1)
- medical documentation (1)
- medizinische Dokumentation (1)
- mehrsprachige Ausführungsumgebungen (1)
- menschenzentriert (1)
- merged mining (1)
- merkle root (1)
- metacrate (1)
- metadata (1)
- metadata detection (1)
- methods (1)
- metric temporal logic (1)
- metric termporal graph logic (1)
- metrisch temporale Graph Logic (1)
- metrische Temporallogik (1)
- microcredential (1)
- micropayment (1)
- micropayment channels (1)
- miner (1)
- mining (1)
- mining hardware (1)
- minting (1)
- mixed data (1)
- model (1)
- model repair (1)
- model-driven engineering (1)
- model-driven software engineering (1)
- modellgetriebene Entwicklung (1)
- modellgetriebene Softwaretechnik (1)
- multi-version models (1)
- multidisziplinäre Teams (1)
- named entity mining (1)
- natural language processing (1)
- network protocols (1)
- nicht-parametrische bedingte Unabhängigkeitstests (1)
- non-parametric conditional independence testing (1)
- non-photorealistic rendering (1)
- nonce (1)
- novelty detection (1)
- nutzergenerierte Inhalte (1)
- object-oriented programming (1)
- objektorientiertes Programmieren (1)
- off-chain transaction (1)
- online course creation (1)
- online course design (1)
- open innovation (1)
- operating systems (1)
- optical character recognition (1)
- order dependencies (1)
- packrat parsing (1)
- parallel and sequential independence (1)
- parallel processing (1)
- parallele Verarbeitung (1)
- parallele und Sequentielle Unabhängigkeit (1)
- parsing expression grammars (1)
- partial replication (1)
- partielle Replikation (1)
- patent (1)
- patient empowerment (1)
- peer-to-peer network (1)
- pegged sidechains (1)
- performance models of virtual machines (1)
- personality prediction (1)
- polyglot execution environments (1)
- polyglot programming (1)
- polyglottes Programmieren (1)
- pose estimation (1)
- poset (1)
- prediction (1)
- privacy (1)
- probabilistic machine learning (1)
- probabilistisches maschinelles Lernen (1)
- process mining (1)
- process models (1)
- programming experience (1)
- programming tools (1)
- programs (1)
- prototyping (1)
- psychotherapy (1)
- public dataset (1)
- qualitative model (1)
- qualitatives Modell (1)
- quantum computing (1)
- query optimization (1)
- quorum slices (1)
- railways (1)
- real-time (1)
- real-time rendering (1)
- rechnerunterstütztes Konstruieren (1)
- reconfigurable systems (1)
- regression testing (1)
- reinforcement learning (1)
- remote sensing (1)
- reverse engineering (1)
- rootstock (1)
- runtime models (1)
- runtime monitoring (1)
- räumliche Geodaten (1)
- savanna (1)
- scalability of blockchain (1)
- scarce tokens (1)
- schwach überwachtes maschinelles Lernen (1)
- scripting languages (1)
- scrollytelling (1)
- security analytics (1)
- selbst-souveräne Identitäten (1)
- selbstbestimmte Identitäten (1)
- self-adaptive software (1)
- self-driving (1)
- semantic classification (1)
- semantische Klassifizierung (1)
- sequence properties (1)
- serialization (1)
- serverseitiges 3D-Rendering (1)
- serverside 3D rendering (1)
- service-oriented architectures (1)
- serviceorientierte Architekturen (1)
- sidechain (1)
- simulation (1)
- situational awareness (1)
- small talk (1)
- smalltalk (1)
- social media (1)
- social media analysis (1)
- software evolution (1)
- software/hardware co-design (1)
- specification of timed graph transformations (1)
- squeak (1)
- stable matching (1)
- standardization (1)
- stark verhaltenskorrekt sperrend (1)
- static source-code analysis (1)
- statische Quellcodeanalyse (1)
- stochastic process (1)
- strongly behaviourally correct locking (1)
- strongly stable matching (1)
- super stable matching (1)
- symbolic analysis (1)
- symbolic graphs (1)
- symbolische Analyse (1)
- symbolische Graphen (1)
- synchronization (1)
- tabellarische Dateien (1)
- tabular data (1)
- technology (1)
- telemedicine (1)
- temporal graph queries (1)
- temporal logic (1)
- temporale Graphanfragen (1)
- test case prioritization (1)
- test results (1)
- text classification (1)
- text mining (1)
- threat detection (1)
- tiefe Gauß-Prozesse (1)
- timed automata (1)
- tool building (1)
- tools (1)
- trajectories (1)
- transaction (1)
- triple graph grammars (1)
- trust (1)
- typisierte attributierte Graphen (1)
- unique column combinations (1)
- unsupervised (1)
- user experience (1)
- variational inference (1)
- variationelle Inferenz (1)
- verhaltenskorrektes Lernen (1)
- verifiable credentials (1)
- verschachtelte Anwendungsbedingungen (1)
- verschachtelte Graphbedingungen (1)
- verteilte Berechnung (1)
- verteilte Leistungsüberwachung (1)
- verzwickte Probleme (1)
- virtual (1)
- virtual machines (1)
- virtual reality (1)
- virtuell (1)
- virtuelle Maschinen (1)
- virtuelle Realität (1)
- visual language (1)
- visual languages (1)
- visualization concept exploration (1)
- visuelle Sprache (1)
- visuelle Sprachen (1)
- weak supervision (1)
- weakly (1)
- wearables (1)
- web-based development (1)
- web-based development environment (1)
- web-basierte Entwicklungsumgebung (1)
- webbasierte Entwicklung (1)
- zero-day (1)
- überprüfbare Nachweise (1)
Institut
- Hasso-Plattner-Institut für Digital Engineering GmbH (127) (entfernen)
Knowledge about causal structures is crucial for decision support in various domains. For example, in discrete manufacturing, identifying the root causes of failures and quality deviations that interrupt the highly automated production process requires causal structural knowledge. However, in practice, root cause analysis is usually built upon individual expert knowledge about associative relationships. But, "correlation does not imply causation", and misinterpreting associations often leads to incorrect conclusions. Recent developments in methods for causal discovery from observational data have opened the opportunity for a data-driven examination. Despite its potential for data-driven decision support, omnipresent challenges impede causal discovery in real-world scenarios. In this thesis, we make a threefold contribution to improving causal discovery in practice.
(1) The growing interest in causal discovery has led to a broad spectrum of methods with specific assumptions on the data and various implementations. Hence, application in practice requires careful consideration of existing methods, which becomes laborious when dealing with various parameters, assumptions, and implementations in different programming languages. Additionally, evaluation is challenging due to the lack of ground truth in practice and limited benchmark data that reflect real-world data characteristics.
To address these issues, we present a platform-independent modular pipeline for causal discovery and a ground truth framework for synthetic data generation that provides comprehensive evaluation opportunities, e.g., to examine the accuracy of causal discovery methods in case of inappropriate assumptions.
(2) Applying constraint-based methods for causal discovery requires selecting a conditional independence (CI) test, which is particularly challenging in mixed discrete-continuous data omnipresent in many real-world scenarios. In this context, inappropriate assumptions on the data or the commonly applied discretization of continuous variables reduce the accuracy of CI decisions, leading to incorrect causal structures.
Therefore, we contribute a non-parametric CI test leveraging k-nearest neighbors methods and prove its statistical validity and power in mixed discrete-continuous data, as well as the asymptotic consistency when used in constraint-based causal discovery. An extensive evaluation of synthetic and real-world data shows that the proposed CI test outperforms state-of-the-art approaches in the accuracy of CI testing and causal discovery, particularly in settings with low sample sizes.
(3) To show the applicability and opportunities of causal discovery in practice, we examine our contributions in real-world discrete manufacturing use cases. For example, we showcase how causal structural knowledge helps to understand unforeseen production downtimes or adds decision support in case of failures and quality deviations in automotive body shop assembly lines.
We study the classical, two-sided stable marriage problem under pairwise preferences. In the most general setting, agents are allowed to express their preferences as comparisons of any two of their edges, and they also have the right to declare a draw or even withdraw from such a comparison. This freedom is then gradually restricted as we specify six stages of orderedness in the preferences, ending with the classical case of strictly ordered lists. We study all cases occurring when combining the three known notions of stability-weak, strong, and super-stability-under the assumption that each side of the bipartite market obtains one of the six degrees of orderedness. By designing three polynomial algorithms and two NP-completeness proofs, we determine the complexity of all cases not yet known and thus give an exact boundary in terms of preference structure between tractable and intractable cases.
Our input is a complete graph G on n vertices where each vertex has a strict ranking of all other vertices in G. The goal is to construct a matching in G that is popular. A matching M is popular if M does not lose a head-to-head election against any matching M ': here each vertex casts a vote for the matching in {M,M '} in which it gets a better assignment. Popular matchings need not exist in the given instance G and the popular matching problem is to decide whether one exists or not. The popular matching problem in G is easy to solve for odd n. Surprisingly, the problem becomes NP-complete for even n, as we show here. This is one of the few graph theoretic problems efficiently solvable when n has one parity and NP-complete when n has the other parity.
Local laws on urban policy, i.e., ordinances directly affect our daily life in various ways (health, business etc.), yet in practice, for many citizens they remain impervious and complex. This article focuses on an approach to make urban policy more accessible and comprehensible to the general public and to government officials, while also addressing pertinent social media postings. Due to the intricacies of the natural language, ranging from complex legalese in ordinances to informal lingo in tweets, it is practical to harness human judgment here. To this end, we mine ordinances and tweets via reasoning based on commonsense knowledge so as to better account for pragmatics and semantics in the text. Ours is pioneering work in ordinance mining, and thus there is no prior labeled training data available for learning. This gap is filled by commonsense knowledge, a prudent choice in situations involving a lack of adequate training data. The ordinance mining can be beneficial to the public in fathoming policies and to officials in assessing policy effectiveness based on public reactions. This work contributes to smart governance, leveraging transparency in governing processes via public involvement. We focus significantly on ordinances contributing to smart cities, hence an important goal is to assess how well an urban region heads towards a smart city as per its policies mapping with smart city characteristics, and the corresponding public satisfaction.
VLDB 2021
(2021)
The 47th International Conference on Very Large Databases (VLDB'21) was held on August 16-20, 2021 as a hybrid conference. It attracted 180 in-person attendees in Copenhagen and 840 remote attendees. In this paper, we describe our key decisions as general chairs and program committee chairs and share the lessons we learned.
Column-oriented database systems can efficiently process transactional and analytical queries on a single node. However, increasing or peak analytical loads can quickly saturate single-node database systems. Then, a common scale-out option is using a database cluster with a single primary node for transaction processing and read-only replicas. Using (the naive) full replication, queries are distributed among nodes independently of the accessed data. This approach is relatively expensive because all nodes must store all data and apply all data modifications caused by inserts, deletes, or updates.
In contrast to full replication, partial replication is a more cost-efficient implementation: Instead of duplicating all data to all replica nodes, partial replicas store only a subset of the data while being able to process a large workload share. Besides lower storage costs, partial replicas enable (i) better scaling because replicas must potentially synchronize only subsets of the data modifications and thus have more capacity for read-only queries and (ii) better elasticity because replicas have to load less data and can be set up faster. However, splitting the overall workload evenly among the replica nodes while optimizing the data allocation is a challenging assignment problem.
The calculation of optimized data allocations in a partially replicated database cluster can be modeled using integer linear programming (ILP). ILP is a common approach for solving assignment problems, also in the context of database systems. Because ILP is not scalable, existing approaches (also for calculating partial allocations) often fall back to simple (e.g., greedy) heuristics for larger problem instances. Simple heuristics may work well but can lose optimization potential.
In this thesis, we present optimal and ILP-based heuristic programming models for calculating data fragment allocations for partially replicated database clusters. Using ILP, we are flexible to extend our models to (i) consider data modifications and reallocations and (ii) increase the robustness of allocations to compensate for node failures and workload uncertainty. We evaluate our approaches for TPC-H, TPC-DS, and a real-world accounting workload and compare the results to state-of-the-art allocation approaches. Our evaluations show significant improvements for varied allocation’s properties: Compared to existing approaches, we can, for example, (i) almost halve the amount of allocated data, (ii) improve the throughput in case of node failures and workload uncertainty while using even less memory, (iii) halve the costs of data modifications, and (iv) reallocate less than 90% of data when adding a node to the cluster. Importantly, we can calculate the corresponding ILP-based heuristic solutions within a few seconds. Finally, we demonstrate that the ideas of our ILP-based heuristics are also applicable to the index selection problem.
The transversal hypergraph problem asks to enumerate the minimal hitting sets of a hypergraph. If the solutions have bounded size, Eiter and Gottlob [SICOMP'95] gave an algorithm running in output-polynomial time, but whose space requirement also scales with the output. We improve this to polynomial delay and space. Central to our approach is the extension problem, deciding for a set X of vertices whether it is contained in any minimal hitting set. We show that this is one of the first natural problems to be W[3]-complete. We give an algorithm for the extension problem running in time O(m(vertical bar X vertical bar+1) n) and prove a SETH-lower bound showing that this is close to optimal. We apply our enumeration method to the discovery problem of minimal unique column combinations from data profiling. Our empirical evaluation suggests that the algorithm outperforms its worst-case guarantees on hypergraphs stemming from real-world databases.
Viper
(2021)
Key-value stores (KVSs) have found wide application in modern software systems. For persistence, their data resides in slow secondary storage, which requires KVSs to employ various techniques to increase their read and write performance from and to the underlying medium. Emerging persistent memory (PMem) technologies offer data persistence at close-to-DRAM speed, making them a promising alternative to classical disk-based storage. However, simply drop-in replacing existing storage with PMem does not yield good results, as block-based access behaves differently in PMem than on disk and ignores PMem's byte addressability, layout, and unique performance characteristics. In this paper, we propose three PMem-specific access patterns and implement them in a hybrid PMem-DRAM KVS called Viper. We employ a DRAM-based hash index and a PMem-aware storage layout to utilize the random-write speed of DRAM and efficient sequential-write performance PMem. Our evaluation shows that Viper significantly outperforms existing KVSs for core KVS operations while providing full data persistence. Moreover, Viper outperforms existing PMem-only, hybrid, and disk-based KVSs by 4-18x for write workloads, while matching or surpassing their get performance.
Invention
(2023)
This entry addresses invention from five different perspectives: (i) definition of the term, (ii) mechanisms underlying invention processes, (iii) (pre-)history of human inventions, (iv) intellectual property protection vs open innovation, and (v) case studies of great inventors. Regarding the definition, an invention is the outcome of a creative process taking place within a technological milieu, which is recognized as successful in terms of its effectiveness as an original technology. In the process of invention, a technological possibility becomes realized. Inventions are distinct from either discovery or innovation. In human creative processes, seven mechanisms of invention can be observed, yielding characteristic outcomes: (1) basic inventions, (2) invention branches, (3) invention combinations, (4) invention toolkits, (5) invention exaptations, (6) invention values, and (7) game-changing inventions. The development of humanity has been strongly shaped by inventions ever since early stone tools and the conception of agriculture. An “explosion of creativity” has been associated with Homo sapiens, and inventions in all fields of human endeavor have followed suit, engendering an exponential growth of cumulative culture. This culture development emerges essentially through a reuse of previous inventions, their revision, amendment and rededication. In sociocultural terms, humans have increasingly regulated processes of invention and invention-reuse through concepts such as intellectual property, patents, open innovation and licensing methods. Finally, three case studies of great inventors are considered: Edison, Marconi, and Montessori, next to a discussion of human invention processes as collaborative endeavors.
CovRadar
(2022)
The ongoing pandemic caused by SARS-CoV-2 emphasizes the importance of genomic surveillance to understand the evolution of the virus, to monitor the viral population, and plan epidemiological responses. Detailed analysis, easy visualization and intuitive filtering of the latest viral sequences are powerful for this purpose. We present CovRadar, a tool for genomic surveillance of the SARS-CoV-2 Spike protein. CovRadar consists of an analytical pipeline and a web application that enable the analysis and visualization of hundreds of thousand sequences. First, CovRadar extracts the regions of interest using local alignment, then builds a multiple sequence alignment, infers variants and consensus and finally presents the results in an interactive app, making accessing and reporting simple, flexible and fast.