Refine
Has Fulltext
- no (231) (remove)
Year of publication
Document Type
- Article (186)
- Other (30)
- Monograph/Edited Volume (5)
- Preprint (3)
- Conference Proceeding (2)
- Doctoral Thesis (2)
- Review (2)
- Part of a Book (1)
Is part of the Bibliography
- yes (231)
Keywords
- machine learning (5)
- COVID-19 (4)
- Visualization (4)
- performance (4)
- 3D point clouds (3)
- Security (3)
- data profiling (3)
- digital health (3)
- duplicate detection (3)
- heuristics (3)
- run time analysis (3)
- self-healing (3)
- similarity measures (3)
- theory (3)
- 3D city models (2)
- BIM (2)
- BPMN (2)
- Blockchain (2)
- Case management (2)
- Classification (2)
- Competition (2)
- Compliance checking (2)
- Data integration (2)
- Data profiling (2)
- Event processing (2)
- Functional dependencies (2)
- JavaScript (2)
- Machine (2)
- Machine learning (2)
- Nested graph conditions (2)
- Point-based rendering (2)
- Process modeling (2)
- Runtime analysis (2)
- SQL (2)
- Virtualization (2)
- cartographic design (2)
- clinical (2)
- data integration (2)
- data matching (2)
- data quality (2)
- data wrangling (2)
- databases (2)
- dialysis (2)
- digital identity (2)
- dynamic (2)
- dynamic programming (2)
- entity resolution (2)
- evaluation (2)
- fabrication (2)
- genetic programming (2)
- prediction (2)
- programming (2)
- real-time rendering (2)
- record linkage (2)
- risk aversion (2)
- scalability (2)
- self-sovereign identity (2)
- 2.5D Treemaps (1)
- 3D (1)
- 3D Point Clouds (1)
- 3D Point clouds (1)
- 3D geovirtual environments (1)
- 3D geovisualization (1)
- 3D information visualization (1)
- 3D semiotic model (1)
- AKI (1)
- APX-hardness (1)
- Aaron Wildavsky (1)
- Accounting (1)
- Actor (1)
- Actor model (1)
- Address matching (1)
- Algorithms (1)
- Anomaly detection (1)
- Anti-patterns (1)
- Application (1)
- Approximation algorithms (1)
- Artificial neural networks (1)
- Association rule mining (1)
- Attention span (1)
- Attribute aggregation (1)
- Attributed graph transformation (1)
- Attributed graphs (1)
- Authentication (1)
- B2B process integration (1)
- BPMN-Q (1)
- Behavior equivalence (1)
- Behavioral querying (1)
- Behavioural Abstraction (1)
- Behavioural analysis (1)
- Benchmarking (1)
- Biclustering (1)
- Bidirectional order dependencies (1)
- Big Data (1)
- Billing (1)
- Biomedicine (1)
- Bitcoin (1)
- Blockchains (1)
- Bluetooth (1)
- Body sensor networks (1)
- Building Information Models (1)
- Business Process Modeling Notation (1)
- Business process diagram (1)
- Business process management (1)
- Business process model (1)
- Business process modeling (1)
- Business processes (1)
- CCS Concepts (1)
- Cake cutting (1)
- Causal Behavioural Profiles (1)
- Causality (1)
- Change propagation (1)
- Charging (1)
- Choreographies (1)
- Chronic heart failure (1)
- Climate change (1)
- Close-Up (1)
- Cloud Computing (1)
- Cloud Native Applications (1)
- Cloud Storage Broker (1)
- Cloud access control and resource management (1)
- Cloud-Security (1)
- CoExist (1)
- Communication systems (1)
- Commute pattern (1)
- Commute process (1)
- Complexity theory (1)
- Compliance measurement (1)
- Computational modeling (1)
- Computational photography (1)
- Computer (1)
- Computer crime (1)
- Concurrency (1)
- Consistency (1)
- Consistency perception (1)
- Context-oriented programming (1)
- ContextJS (1)
- Convolution (1)
- Coordinated and Multiple Views (1)
- CorMID (1)
- Correlation (1)
- Critical pairs (1)
- Crowd-Resourcing (1)
- Cryptography (1)
- Cultural theory (1)
- Currencies (1)
- Cyber-Physical Systems (1)
- Data (1)
- Data dependencies (1)
- Data exchange (1)
- Data mining (1)
- Data modeling (1)
- Data models (1)
- Data-centric (1)
- Deep learning (1)
- Delphi study (1)
- Delta preservation (1)
- Dependency discovery (1)
- Design (1)
- Detail plus Overview (1)
- Distributed (1)
- Distributed 3D geovisualization (1)
- Distributed computing (1)
- Distributed debugging (1)
- Distributed programming (1)
- DoS (1)
- Duration prediction (1)
- Dynamic Data Structures (1)
- Dynamic Pricing (1)
- Dynamic adaptation (1)
- Dynamic analysis (1)
- Dynamic pricing (1)
- Dynamic pricing and advertising (1)
- E-commerce (1)
- EHR (1)
- Ecosystems (1)
- Electrocardiography (1)
- Electronic prescription (1)
- Energy-aware (1)
- Entity resolution (1)
- Estimation-of-distribution algorithm (1)
- Event normalization (1)
- Events (1)
- Evolutionary algorithms (1)
- Evolutionary computation (1)
- Exception handling (1)
- Exclusiveness (1)
- Experimentation (1)
- Eye-tracking (1)
- Facial mimicry (1)
- Feature extraction (1)
- Feature selection (1)
- Federated learning (1)
- Feedback heuristics (1)
- Finite horizon (1)
- First hitting time (1)
- Fitness level method (1)
- Fitness-distance correlation (1)
- Flexible Resource Manager (1)
- Flexible processes; (1)
- Formal Methods (1)
- GPU-based Real-time Rendering (1)
- Gamification (1)
- Gender Inequality (1)
- Gene expression (1)
- General Earth and Planetary Sciences (1)
- Geography, Planning and Development (1)
- Geometry Draping (1)
- Geovisualization (1)
- Graph databases (1)
- Graph homomorphisms (1)
- Graph queries (1)
- Graph repair (1)
- Graph rewriting (1)
- Graph transformation (1)
- HITS (1)
- HMM (1)
- Haptics (1)
- HiGHmed (1)
- Hidden Markov models (1)
- Hospitalisation (1)
- Human behaviour (1)
- IDS (1)
- IDS management (1)
- IFC (1)
- IMD (1)
- IMU (1)
- IOPS (1)
- Identity management systems (1)
- Image (1)
- Image filtering (1)
- Image-based rendering (1)
- In-memory (1)
- Inclusion dependencies (1)
- Indoor Models (1)
- Industries (1)
- Industry 4.0 (1)
- Industry Foundation Classes (1)
- Information Visualization (1)
- Initial conflicts (1)
- Integrity Verification (1)
- Interaction (1)
- Interaction modeling (1)
- Interactive Visualization (1)
- Internet of Things (1)
- Interviews (1)
- Introspection (1)
- Intrusion detection (1)
- Inventory holding costs (1)
- Inventory systems (1)
- JIT compilers (1)
- Java (1)
- Knowledge bases (1)
- Knowledge-intensive processes (1)
- LIDAR (1)
- LSTM (1)
- Label analysis (1)
- Lakes (1)
- Languages (1)
- Languages Model-driven engineering (1)
- Laser cutting (1)
- Learning (1)
- Learning behavior (1)
- Least privilege principle (1)
- Lecture video recording (1)
- Level of abstraction (1)
- Licenses (1)
- Live forensics (1)
- Lively Kernel (1)
- Location-based services (1)
- Log conformance (1)
- M-adhesive categories (1)
- M-adhesive transformation systems (1)
- MOOC (1)
- Markov decision process (1)
- Markov decision process; (1)
- Markov model (1)
- Mary Douglas (1)
- Massive Open Online Courses (1)
- Matroids (1)
- Measurement (1)
- Memory management (1)
- Metamaterials (1)
- Mixed workload (1)
- Mobile device (1)
- Mobile sensing (1)
- Model equivalence (1)
- Model generation (1)
- Model refinement (1)
- Model repair (1)
- Model synchronisation (1)
- Model transformation (1)
- Model verification (1)
- Model-Driven Engineering (1)
- Model-driven (1)
- Modular decomposition (1)
- Monitoring language (1)
- Multi-objective optimization (1)
- Multi-perspective Views (1)
- Multimedia retrieval (1)
- Multiscale modeling (1)
- Mutation operators (1)
- N-of-1 trial (1)
- NP-completeness (1)
- Natural language (1)
- Natural language processing (1)
- Network graph (1)
- Network monitoring (1)
- Network topology (1)
- Neural Networks (1)
- Nigeria (1)
- O (1)
- OLTP (1)
- Object Versioning (1)
- Open implementations (1)
- Operational reporting (1)
- Optimal Control (1)
- Optimal stochastic and deterministic (1)
- Optionality (1)
- Order Relations (1)
- Order dependencies (1)
- Out-of-core (1)
- Outlier detection (1)
- Overview plus Detail (1)
- PPMI (parkinson's progression markers initiative) (1)
- Parallel programming (1)
- Parallelization (1)
- Performance (1)
- Performance analysis (1)
- Personal fabrication (1)
- Petri net unfolding (1)
- Plugs (1)
- Prediction (1)
- Price Cycles (1)
- Price collusion (1)
- Privacy (1)
- Privilege separation concept (1)
- Process Monitoring (1)
- Process choreographies (1)
- Process compliance (1)
- Process mining (1)
- Process model (1)
- Process model alignment (1)
- Process model consistency (1)
- Process model repositories (1)
- Process model search (1)
- Processing strategies (1)
- Programming (1)
- Programming Environments (1)
- Property paths (1)
- Protocols (1)
- QRS detection (1)
- Quality of service (1)
- Query execution (1)
- Query optimization (1)
- Question answering (1)
- R Shiny (1)
- R package (1)
- Racket (1)
- Random graphs (1)
- Reaction Time (1)
- Real-time Rendering (1)
- Record and refinement (1)
- Record and replay (1)
- Record linkage (1)
- Reinforcement learning (1)
- Relational data (1)
- Remote patient management (1)
- Resource description framework (1)
- Resource management (1)
- Response Strategies (1)
- Risk control (1)
- Robust optimization (1)
- Role-based access control (1)
- Root cause analysis (1)
- Run time analysis (1)
- Runtime WCET Analysis (1)
- SAP HANA (1)
- SCED (1)
- SPARQL (1)
- Safety Critical Systems (1)
- Satisfiability (1)
- Scientific Publication Indicators (1)
- Scope (1)
- Security-as-a-Service (1)
- Self-aware computing systems (1)
- Self-configuration (1)
- Semantics (1)
- Sequential anomaly (1)
- Service composition (1)
- Service detection (1)
- Service orchestration (1)
- Service-Oriented (1)
- Service-oriented computing (1)
- Sexism (1)
- Signal-to-noise ratio (1)
- Smalltalk (1)
- Social environment (1)
- Software (1)
- Software Engineering (1)
- Squeak (1)
- Stochastic Petri nets (1)
- Structural Decomposition (1)
- Structured modeling (1)
- Structuring (1)
- Submodular function (1)
- Submodular functions (1)
- Subset selection (1)
- System architecture (1)
- TRIPOD (1)
- Tableau method (1)
- Task analysis (1)
- Telemonitoring (1)
- Temporal orientation (1)
- Terrain Visualization (1)
- Texturing (1)
- Theory (1)
- Three-dimensional displays (1)
- Time series (1)
- Tool survey (1)
- Trace inclusion (1)
- Transformation tool contest (1)
- Treemaps (1)
- Two dimensional displays (1)
- Ubiquitous computing (1)
- Unified cloud model (1)
- Unique column combination (1)
- Unique column combinations (1)
- Video OCR (1)
- Video classification (1)
- Video indexing (1)
- View navigation (1)
- Virtual 3D city model (1)
- Virtual 3D scenes (1)
- Virtual Machine (1)
- Virtual camera control (1)
- Visual modeling (1)
- Vocabulary (1)
- Vulnerability Assessment (1)
- W[3]-completeness (1)
- Water Science and Technology (1)
- Web browsers (1)
- Web navigational language (1)
- Web safeness (1)
- Web-based rendering (1)
- abdominal imaging (1)
- abundance (1)
- accessibility (1)
- accounting (1)
- action recognition (1)
- activity recognition (1)
- acute renal failure (1)
- adaptation rules (1)
- address normalization (1)
- address parsing (1)
- adolescent (1)
- affective interfaces (1)
- algorithm (EDA) (1)
- algorithmic (1)
- analysis (1)
- anniversary (1)
- app (1)
- application (1)
- approximation (1)
- architecture recovery (1)
- architecture-based adaptation (1)
- architectures (1)
- argumentation research (1)
- artificial intelligence (1)
- atmospheric pressure chemical ionization (1)
- attack graph (1)
- attacks (1)
- attention mechanism (1)
- attribute assurance (1)
- authentication (1)
- authentication protocol (1)
- back pain (1)
- battery (1)
- battery-depletion attack (1)
- behaviour compatibility (1)
- behaviour equivalence (1)
- behavioural models (1)
- benchmark testing (1)
- bibliometrics (1)
- bidirectional shortest path (1)
- big data (1)
- billing (1)
- biomarker detection (1)
- biomechanics (1)
- blind (1)
- bloat control (1)
- bridge management systems (1)
- building information modeling (1)
- business process management (1)
- cancer therapy (1)
- cartography-oriented visualization (1)
- center dot Computing (1)
- change blindness (1)
- charging (1)
- child (1)
- chronic dialysis (1)
- clinical nephrology (1)
- cloud security (1)
- cluster resource management (1)
- clustering (1)
- co-location (1)
- cognition (1)
- cognitive (1)
- cohort (1)
- collaboration (1)
- collaborative tagging (1)
- color palettes (1)
- communication network (1)
- complex emotions (1)
- complexity (1)
- complexity dichotomy (1)
- comprehension (1)
- computational design (1)
- computer vision (1)
- conceptualization (1)
- concurrent graph rewriting (1)
- conditional functional dependencies (1)
- conditions (1)
- confidentiality (1)
- conflicts and dependencies in (1)
- contract (1)
- contracts (1)
- control (1)
- coronavirus 2019 (1)
- corporate takeovers (1)
- cost-effectiveness (1)
- cost-utility analysis (1)
- creativity and innovation management (1)
- critical pairs (1)
- cryptocurrency exchanges (1)
- cyber (1)
- cyber humanistic (1)
- cyber threat intelligence (1)
- damage detection (1)
- data analysis (1)
- data cleaning (1)
- data cleansing (1)
- data migration (1)
- data preparation (1)
- data transformation (1)
- data-driven demand (1)
- database systems (1)
- datasets (1)
- deduplication (1)
- deep learning (1)
- denial-of-service attack (1)
- dependency (1)
- dependency discovery (1)
- design (1)
- design thinking (1)
- deterministic properties (1)
- deterministic random walk (1)
- diabetes (1)
- differential (1)
- digital health app (1)
- digital interventions (1)
- digital startup (1)
- digital therapy (1)
- distributed computing (1)
- distributed data-parallel processing (1)
- distributed ledger technology (1)
- distributed systems (1)
- dynamic pricing (1)
- e-Learning (1)
- e-learning (1)
- e-lecture (1)
- eHealth (1)
- ePA (1)
- ecological momentary assessment (1)
- ecosystems (1)
- electronic health record (1)
- electronic health records (1)
- electronic mail (1)
- embedding (1)
- emotional (1)
- empathy (1)
- end-stage kidney disease (1)
- endogenous (1)
- engine (1)
- engineering (1)
- enrichment calculation (1)
- enumeration complexity (1)
- epistasis (1)
- estimation-of-distribution (1)
- estimation-of-distribution algorithm (1)
- ethics (1)
- event log (1)
- exact exponential-time algorithms (1)
- experimental design (1)
- experiments (1)
- expertise (1)
- explainability (1)
- explainability-accuracy trade-off (1)
- explainable AI (1)
- exploratory programming (1)
- expression (1)
- external knowledge bases (1)
- factual (1)
- failure model (1)
- failure profile (1)
- failure profile model (1)
- fair division (1)
- feature selection (1)
- feedback loops (1)
- flux (1)
- focus plus context visualization (1)
- folksonomy (1)
- force-feedback (1)
- forensics (1)
- fully concurrent bisimulation (1)
- functional dependencies (1)
- functional dependency (1)
- functional languages (1)
- game theory (1)
- gaming (1)
- gene (1)
- gene selection (1)
- generative multi-discriminative networks (1)
- genetic algorithms (1)
- geocoding (1)
- geographic information systems (1)
- geospatial artificial intelligence (1)
- geospatial digital twins (1)
- grammar-based compression (1)
- graph languages (1)
- graph pattern matching (1)
- graph replacement categories (1)
- graph transformation (1)
- health apps (1)
- health information privacy concern (1)
- health personnel (1)
- healthcare (1)
- heuristic algorithms (1)
- history (1)
- home-based studies (1)
- hospital (1)
- human immunodeficiency virus (1)
- hyperbolic geometry (1)
- identity broker (1)
- identity management (1)
- image captioning (1)
- image-based representation (1)
- imbalanced learning (1)
- implantable medical device (1)
- implants (1)
- inattentional blindness (1)
- inclusion (1)
- informatics (1)
- information storage and (1)
- interactive editing (1)
- interpretable machine learning (1)
- job (1)
- knowledge building (1)
- knowledge management (1)
- label-free (1)
- languages (1)
- laser cutting (1)
- law (1)
- layered architecture (1)
- lazy transformation (1)
- lean startup approach (1)
- learning (1)
- local confluence (1)
- logic (1)
- low back pain (1)
- low-code development approaches (1)
- lower bound (1)
- mHealth (1)
- mass isotopologue distribution (1)
- matching dependencies (1)
- maximal structuring (1)
- mean-variance optimization (1)
- medical (1)
- medical identity theft (1)
- medical malpractice (1)
- memory-based clustering (1)
- memory-based correlation (1)
- memory-based databases (1)
- mental disorders (1)
- mental health (1)
- methodologie (1)
- metric learning (1)
- mixed-methods (1)
- mobile application (1)
- mobile health (1)
- mobile phone (1)
- model interpreter (1)
- model transformation (1)
- model verification (1)
- modeling language (1)
- models at runtime (1)
- modular counting (1)
- modularity (1)
- molecular tumor board (1)
- mortality (1)
- motion analysis (1)
- motion capture (1)
- motivations (1)
- multi-core (1)
- multi-perspective visualization (1)
- multi-product pricing (1)
- multilevel systems (1)
- multimodal representations (1)
- multimodal sensing (1)
- multiview classification (1)
- mutation (1)
- mutli-task learning (1)
- nested application conditions (1)
- network creation games (1)
- networks (1)
- neural (1)
- non-repudiation (1)
- one-time password (1)
- organizations (1)
- orthopedic (1)
- orthopedic; (1)
- ownership (1)
- pain management (1)
- panorama (1)
- parameterized complexity (1)
- parkinson's disease (1)
- parsimonious reduction (1)
- personal electronic health records (1)
- personal satisfaction (1)
- personalized medicine (1)
- phishing (1)
- physical activity assessment (1)
- point clouds (1)
- portability (1)
- power-law (1)
- prevention (1)
- price of anarchy (1)
- pricing (1)
- prior knowledge (1)
- privacy (1)
- probabilistic (1)
- process mining (1)
- process modeling (1)
- process scheduling (1)
- process-aware digital twin cockpit (1)
- process-awareness (1)
- processes (1)
- processing (1)
- program (1)
- programs (1)
- proportional division (1)
- proteomics (1)
- protocols (1)
- prototypes (1)
- public health medicine (1)
- query optimisation (1)
- query rewriting (1)
- random I (1)
- random forest (1)
- random graphs (1)
- ranking (1)
- recursive tuning (1)
- reinforcement learning (1)
- reliability (1)
- remodularization (1)
- remote monitoring (1)
- requirements (1)
- requirements engineering (1)
- research challenges (1)
- resilient architectures (1)
- restoration (1)
- restricted edges (1)
- retrieval (1)
- reuse (1)
- reward (1)
- robustness (1)
- rotor-router model (1)
- runtime analysis (1)
- scale-free networks (1)
- school (environment) (1)
- science mapping (1)
- search plan generation (1)
- security (1)
- security chaos engineering (1)
- security risk assessment (1)
- segmentation (1)
- self-adaptive software (1)
- self-driving (1)
- self-learning scheduler (1)
- semantic (1)
- sensor (1)
- sensor data (1)
- separation of concerns (1)
- service-oriented architecture (1)
- severe acute respiratory (1)
- similarity learning (1)
- simulation (1)
- simulator (1)
- single vertex discrepancy (1)
- single-case experimental design (1)
- small files (1)
- smallest grammar problem (1)
- smart card (1)
- sociology (1)
- software (1)
- software engineering (1)
- software evolution (1)
- software reference architecture (1)
- software/instrumentation (1)
- spamming (1)
- spatial data infrastructure (1)
- stable matchings (1)
- staging (1)
- standardization (1)
- statistics (1)
- statutes and laws (1)
- steganography (1)
- straight-line (1)
- structured process model (1)
- style description languages (1)
- substitution effects (1)
- supervised machine learning (1)
- surveillance (1)
- symbolic graph transformation (1)
- syndrome coronavirus 2 (1)
- systems (1)
- teamwork (1)
- technology adoption (1)
- technology pivot (1)
- tools (1)
- tort law (1)
- traceability (1)
- tracing (1)
- transfer learning (1)
- transversal hypergraph (1)
- tree conjecture (1)
- trust (1)
- trust model (1)
- typography (1)
- unequal shares (1)
- use-cases (1)
- user interaction (1)
- utility (1)
- virtual groups (1)
- virtual reality (1)
- visually impaired (1)
- vulnerabilities (1)
- wearable movement sensor (1)
- web application (1)
- weight (1)
- word clouds (1)
- workflow (1)
- workload prediction (1)
- zero-power defense (1)
Institute
- Hasso-Plattner-Institut für Digital Engineering gGmbH (231) (remove)
There is an increasing interest in fusing data from heterogeneous sources. Combining data sources increases the utility of existing datasets, generating new information and creating services of higher quality. A central issue in working with heterogeneous sources is data migration: In order to share and process data in different engines, resource intensive and complex movements and transformations between computing engines, services, and stores are necessary.
Muses is a distributed, high-performance data migration engine that is able to interconnect distributed data stores by forwarding, transforming, repartitioning, or broadcasting data among distributed engines' instances in a resource-, cost-, and performance-adaptive manner. As such, it performs seamless information sharing across all participating resources in a standard, modular manner. We show an overall improvement of 30 % for pipelining jobs across multiple engines, even when we count the overhead of Muses in the execution time. This performance gain implies that Muses can be used to optimise large pipelines that leverage multiple engines.
The investigation of metabolic fluxes and metabolite distributions within cells by means of tracer molecules is a valuable tool to unravel the complexity of biological systems. Technological advances in mass spectrometry (MS) technology such as atmospheric pressure chemical ionization (APCI) coupled with high resolution (HR), not only allows for highly sensitive analyses but also broadens the usefulness of tracer-based experiments, as interesting signals can be annotated de novo when not yet present in a compound library. However, several effects in the APCI ion source, i.e., fragmentation and rearrangement, lead to superimposed mass isotopologue distributions (MID) within the mass spectra, which need to be corrected during data evaluation as they will impair enrichment calculation otherwise. Here, we present and evaluate a novel software tool to automatically perform such corrections. We discuss the different effects, explain the implemented algorithm, and show its application on several experimental datasets. This adjustable tool is available as an R package from CRAN.
Text displayed in a video is an essential part for the high-level semantic information of the video content. Therefore, video text can be used as a valuable source for automated video indexing in digital video libraries. In this paper, we propose a workflow for video text detection and recognition. In the text detection stage, we have developed a fast localization-verification scheme, in which an edge-based multi-scale text detector first identifies potential text candidates with high recall rate. Then, detected candidate text lines are refined by using an image entropy-based filter. Finally, Stroke Width Transform (SWT)- and Support Vector Machine (SVM)-based verification procedures are applied to eliminate the false alarms. For text recognition, we have developed a novel skeleton-based binarization method in order to separate text from complex backgrounds to make it processible for standard OCR (Optical Character Recognition) software. Operability and accuracy of proposed text detection and binarization methods have been evaluated by using publicly available test data sets.
We introduce a logic-based incremental approach to graph repair, generating a sound and complete (upon termination) overview of least-changing graph repairs from which a user may select a graph repair based on non-formalized further requirements. This incremental approach features delta preservation as it allows to restrict the generation of graph repairs to delta-preserving graph repairs, which do not revert the additions and deletions of the most recent consistency-violating graph update. We specify consistency of graphs using the logic of nested graph conditions, which is equivalent to first-order logic on graphs. Technically, the incremental approach encodes if and how the graph under repair satisfies a graph condition using the novel data structure of satisfaction trees, which are adapted incrementally according to the graph updates applied. In addition to the incremental approach, we also present two state-based graph repair algorithms, which restore consistency of a graph independent of the most recent graph update and which generate additional graph repairs using a global perspective on the graph under repair. We evaluate the developed algorithms using our prototypical implementation in the tool AutoGraph and illustrate our incremental approach using a case study from the graph database domain.
The importance of reporting is ever increasing in today's fast-paced market environments and the availability of up-to-date information for reporting has become indispensable. Current reporting systems are separated from the online transaction processing systems (OLTP) with periodic updates pushed in. A pre-defined and aggregated subset of the OLTP data, however, does not provide the flexibility, detail, and timeliness needed for today's operational reporting. As technology advances, this separation has to be re-evaluated and means to study and evaluate new trends in data storage management have to be provided. This article proposes a benchmark for combined OLTP and operational reporting, providing means to evaluate the performance of enterprise data management systems for mixed workloads of OLTP and operational reporting queries. Such systems offer up-to-date information and the flexibility of the entire data set for reporting. We describe how the benchmark provokes the conflicts that are the reason for separating the two workloads on different systems. In this article, we introduce the concepts, logical data schema, transactions and queries of the benchmark, which are entirely based on the original data sets and real workloads of existing, globally operating enterprises.
The rapid digitalization of the Facility Management (FM) sector has increased the demand for mobile, interactive analytics approaches concerning the operational state of a building. These approaches provide the key to increasing stakeholder engagement associated with Operation and Maintenance (O&M) procedures of living and working areas, buildings, and other built environment spaces. We present a generic and fast approach to process and analyze given 3D point clouds of typical indoor office spaces to create corresponding up-to-date approximations of classified segments and object-based 3D models that can be used to analyze, record and highlight changes of spatial configurations. The approach is based on machine-learning methods used to classify the scanned 3D point cloud data using 2D images. This approach can be used to primarily track changes of objects over time for comparison, allowing for routine classification, and presentation of results used for decision making. We specifically focus on classification, segmentation, and reconstruction of multiple different object types in a 3D point-cloud scene. We present our current research and describe the implementation of these technologies as a web-based application using a services-oriented methodology.
Modern communication systems are becoming increasingly dynamic and complex. In this article a novel mechanism for next generation charging and billing is presented that enables self-configurability for accounting systems consisting of heterogeneous components. The mechanism is required to be simple, effective, efficient, scalable and fault-tolerant. Based on simulation results it is shown that the proposed simple distributed mechanism is competitive with usual cost-based or random mechanisms under realistic assumptions and up to non-extreme workload situations as well as fulfilling the posed requirements.
A simplified run time analysis of the univariate marginal distribution algorithm on LeadingOnes
(2021)
With elementary means, we prove a stronger run time guarantee for the univariate marginal distribution algorithm (UMDA) optimizing the LEADINGONES benchmark function in the desirable regime with low genetic drift. If the population size is at least quasilinear, then, with high probability, the UMDA samples the optimum in a number of iterations that is linear in the problem size divided by the logarithm of the UMDA's selection rate. This improves over the previous guarantee, obtained by Dang and Lehre (2015) via the deep level-based population method, both in terms of the run time and by demonstrating further run time gains from small selection rates. Under similar assumptions, we prove a lower bound that matches our upper bound up to constant factors.