{"9476f0e87d0e0df38758c1614b0c8dadcgregucci":{"DOI":"10.1007/978-3-031-43458-7_44","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-3-031-43458-7_44","abstract":"","annote":"","author":[{"family":"Gregucci","given":"Cosimo"}],"citation-label":"DBLP:conf/esws/Gregucci23","collection-editor":[{"family":"Pesquita","given":"Catia"},{"family":"Skaf-Molli","given":"Hala"},{"family":"Efthymiou","given":"Vasilis"},{"family":"Kirrane","given":"Sabrina"},{"family":"Ngonga","given":"Axel"},{"family":"Collarana","given":"Diego"},{"family":"Cerqueira","given":"Renato"},{"family":"Alam","given":"Mehwish"},{"family":"Trojahn","given":"Cássia"},{"family":"Hertling","given":"Sven"}],"collection-title":"Lecture Notes in Computer Science","container-author":[{"family":"Pesquita","given":"Catia"},{"family":"Skaf-Molli","given":"Hala"},{"family":"Efthymiou","given":"Vasilis"},{"family":"Kirrane","given":"Sabrina"},{"family":"Ngonga","given":"Axel"},{"family":"Collarana","given":"Diego"},{"family":"Cerqueira","given":"Renato"},{"family":"Alam","given":"Mehwish"},{"family":"Trojahn","given":"Cássia"},{"family":"Hertling","given":"Sven"}],"container-title":"The Semantic Web: ESWC 2023 Satellite Events - Hersonissos, Crete, Greece, May 28 - June 1, 2023, Proceedings","documents":[],"edition":"","editor":[{"family":"Pesquita","given":"Catia"},{"family":"Skaf-Molli","given":"Hala"},{"family":"Efthymiou","given":"Vasilis"},{"family":"Kirrane","given":"Sabrina"},{"family":"Ngonga","given":"Axel"},{"family":"Collarana","given":"Diego"},{"family":"Cerqueira","given":"Renato"},{"family":"Alam","given":"Mehwish"},{"family":"Trojahn","given":"Cássia"},{"family":"Hertling","given":"Sven"}],"event-date":{"date-parts":[["2023"]],"literal":"2023"},"event-place":"","id":"9476f0e87d0e0df38758c1614b0c8dadcgregucci","interhash":"5f0eb3dbd493221fad6153bbe2b27d51","intrahash":"9476f0e87d0e0df38758c1614b0c8dad","issue":"","issued":{"date-parts":[["2023"]],"literal":"2023"},"keyword":"unibibliografie myown @ANALYTICCOMP ki ac-knowgraphs","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-3-031-43458-7_44"},"note":"","number":"","number-of-pages":"10","page":"255--265","page-first":"255","publisher":"Springer","publisher-place":"","status":"","title":"Query Answering over the Polymorphic Web of Data","type":"paper-conference","username":"cgregucci","version":"","volume":"13998"},"552fc9ceeb2080cf21297026068d53dbanalyticcomp":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2001.08132","abstract":"","annote":"","author":[{"family":"Sun","given":"Jun"},{"family":"Medo","given":"Matús"},{"family":"Staab","given":"Steffen"}],"citation-label":"sun2020timeinvariant","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Physical Review E","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020","02"]],"literal":"2020"},"event-place":"","id":"552fc9ceeb2080cf21297026068d53dbanalyticcomp","interhash":"372bac9a6c4878ee7e2048cdb43fc109","intrahash":"552fc9ceeb2080cf21297026068d53db","issue":"2","issued":{"date-parts":[["2020","02"]],"literal":"2020"},"keyword":"imported myown AnalyticComputing from:staab @AnalyticComp","misc":{"eprint":"2001.08132","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"2","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Time-invariant degree growth in preferential attachment network models","type":"article-journal","username":"analyticcomp","version":"","volume":"101 (2)"},"2856acbb53ab24e90ed0b6ec382dd519lschmelzeisen":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2003.02320","abstract":"In this paper we provide a comprehensive introduction to knowledge graphs, which have recently garnered significant attention from both industry and academia in scenarios that require exploiting diverse, dynamic, large-scale collections of data. After a general introduction, we motivate and contrast various graph-based data models and query languages that are used for knowledge graphs. We discuss the roles of schema, identity, and context in knowledge graphs. We explain how knowledge can be represented and extracted using a combination of deductive and inductive techniques. We summarise methods for the creation, enrichment, quality assessment, refinement, and publication of knowledge graphs. We provide an overview of prominent open knowledge graphs and enterprise knowledge graphs, their applications, and how they use the aforementioned techniques. We conclude with high-level future research directions for knowledge graphs.","annote":"","author":[{"family":"Hogan","given":"Aidan"},{"family":"Blomqvist","given":"Eva"},{"family":"Cochez","given":"Michael"},{"family":"d'Amato","given":"Claudia"},{"family":"de Melo","given":"Gerard"},{"family":"Gutierrez","given":"Claudio"},{"family":"Gayo","given":"José Emilio Labra"},{"family":"Kirrane","given":"Sabrina"},{"family":"Neumaier","given":"Sebastian"},{"family":"Polleres","given":"Axel"},{"family":"Navigli","given":"Roberto"},{"family":"Ngomo","given":"Axel-Cyrille Ngonga"},{"family":"Rashid","given":"Sabbir M."},{"family":"Rula","given":"Anisa"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Sequeda","given":"Juan F."},{"family":"Staab","given":"Steffen"},{"family":"Zimmermann","given":"Antoine"}],"citation-label":"journals/corr/abs-2003-02320","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020","03"]],"literal":"2020"},"event-place":"","id":"2856acbb53ab24e90ed0b6ec382dd519lschmelzeisen","interhash":"937ebb9057ebdd6fa997a18741b79755","intrahash":"2856acbb53ab24e90ed0b6ec382dd519","issue":"","issued":{"date-parts":[["2020","03"]],"literal":"2020"},"keyword":"myown AnalyticComputing @AnalyticComp dblp","misc":{"language":"English","eprint":"2003.02320","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Knowledge Graphs","type":"article-journal","username":"lschmelzeisen","version":"","volume":"abs/2003.02320"},"f7dbf0a622ff3e694c009ec93060c47flschmelzeisen":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/1902.02169","abstract":"Taxonomies are semantic hierarchies of concepts. One limitation of current taxonomy learning systems is that they define concepts as single words. This position paper argues that contextualized word representations, which recently achieved state-of-the-art results on many competitive NLP tasks, are a promising method to address this limitation. We outline a novel approach for taxonomy learning that (1) defines concepts as synsets, (2) learns density-based approximations of contextualized word representations, and (3) can measure similarity and hypernymy among them.","annote":"","author":[{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"journals/corr/abs-1902-02169","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019","01"]],"literal":"2019"},"event-place":"","id":"f7dbf0a622ff3e694c009ec93060c47flschmelzeisen","interhash":"61c25eacd5f7a0ba141e22543fe91a8e","intrahash":"f7dbf0a622ff3e694c009ec93060c47f","issue":"","issued":{"date-parts":[["2019","01"]],"literal":"2019"},"keyword":"myown AnalyticComputing @AnalyticComp dblp","misc":{"ee":"http://arxiv.org/abs/1902.02169","language":"English"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Learning Taxonomies of Concepts and not Words using Contextualized Word Representations: A Position Paper.","type":"article-journal","username":"lschmelzeisen","version":"","volume":"abs/1902.02169"},"b05149be0c2e6b80ac4e4d2ab3dfd193lschmelzeisen":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/1904.03084","abstract":"This paper describes our submission to SemEval-2019 Task 7: RumourEval: Determining Rumor Veracity and Support for Rumors. We participated in both subtasks. The goal of subtask A is to classify the type of interaction between a rumorous social media post and a reply post as support, query, deny, or comment. The goal of subtask B is to predict the veracity of a given rumor. For subtask A, we implement a CNN-based neural architecture using ELMo embeddings of post text combined with auxiliary features and achieve a F1-score of 44.6%. For subtask B, we employ a MLP neural network leveraging our estimates for subtask A and achieve a F1-score of 30.1% (second place in the competition). We provide results and analysis of our system performance and present ablation experiments.","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"journals/corr/abs-1904-03084","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019","04"]],"literal":"2019"},"event-place":"","id":"b05149be0c2e6b80ac4e4d2ab3dfd193lschmelzeisen","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"b05149be0c2e6b80ac4e4d2ab3dfd193","issue":"","issued":{"date-parts":[["2019","04"]],"literal":"2019"},"keyword":"myown AnalyticComputing @AnalyticComp dblp","misc":{"ee":"http://arxiv.org/abs/1904.03084","language":"English"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors.","type":"article-journal","username":"lschmelzeisen","version":"","volume":"abs/1904.03084"},"42f0d00808b61a6cc0a7d69aa701b464lschmelzeisen":{"DOI":"10.18653/v1/s19-2193","ISBN":"978-1-950737-06-2","ISSN":"","URL":"https://www.aclweb.org/anthology/S19-2193/","abstract":"This paper describes our submission to SemEval-2019 Task 7: RumourEval: Determining Rumor Veracity and Support for Rumors. We participated in both subtasks. The goal of subtask A is to classify the type of interaction between a rumorous social media post and a reply post as support, query, deny, or comment. The goal of subtask B is to predict the veracity of a given rumor. For subtask A, we implement a CNN-based neural architecture using ELMo embeddings of post text combined with auxiliary features and achieve a F1-score of 44.6%. For subtask B, we employ a MLP neural network leveraging our estimates for subtask A and achieve a F1-score of 30.1% (second place in the competition). We provide results and analysis of our system performance and present ablation experiments.","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"conf/semeval/BarisSS19","collection-editor":[{"family":"May","given":"Jonathan"},{"family":"Shutova","given":"Ekaterina"},{"family":"Herbelot","given":"Aurélie"},{"family":"Zhu","given":"Xiaodan"},{"family":"Apidianaki","given":"Marianna"},{"family":"Mohammad","given":"Saif M."}],"collection-title":"","container-author":[{"family":"May","given":"Jonathan"},{"family":"Shutova","given":"Ekaterina"},{"family":"Herbelot","given":"Aurélie"},{"family":"Zhu","given":"Xiaodan"},{"family":"Apidianaki","given":"Marianna"},{"family":"Mohammad","given":"Saif M."}],"container-title":"SemEval@NAACL-HLT","documents":[],"edition":"","editor":[{"family":"May","given":"Jonathan"},{"family":"Shutova","given":"Ekaterina"},{"family":"Herbelot","given":"Aurélie"},{"family":"Zhu","given":"Xiaodan"},{"family":"Apidianaki","given":"Marianna"},{"family":"Mohammad","given":"Saif M."}],"event-date":{"date-parts":[["2019","06"]],"literal":"2019"},"event-place":"","id":"42f0d00808b61a6cc0a7d69aa701b464lschmelzeisen","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"42f0d00808b61a6cc0a7d69aa701b464","issue":"","issued":{"date-parts":[["2019","06"]],"literal":"2019"},"keyword":"myown AnalyticComputing @AnalyticComp dblp","misc":{"ee":"https://www.aclweb.org/anthology/S19-2193/","isbn":"978-1-950737-06-2","language":"English","doi":"10.18653/v1/s19-2193"},"note":"","number":"","number-of-pages":"4","page":"1105-1109","page-first":"1105","publisher":"Association for Computational Linguistics","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors.","type":"paper-conference","username":"lschmelzeisen","version":"","volume":""},"a558f0637eff7298fea482eef69e3803staab":{"DOI":"10.1002/widm.1356","ISBN":"","ISSN":"","URL":"https://doi.org/10.1002/widm.1356","abstract":"","annote":"","author":[{"family":"Ntoutsi","given":"Eirini"},{"family":"Fafalios","given":"Pavlos"},{"family":"Gadiraju","given":"Ujwal"},{"family":"Iosifidis","given":"Vasileios"},{"family":"Nejdl","given":"Wolfgang"},{"family":"Vidal","given":"Maria-Esther"},{"family":"Ruggieri","given":"Salvatore"},{"family":"Turini","given":"Franco"},{"family":"Papadopoulos","given":"Symeon"},{"family":"Krasanakis","given":"Emmanouil"},{"family":"Kompatsiaris","given":"Ioannis"},{"family":"Kinder-Kurlanda","given":"Katharina"},{"family":"Wagner","given":"Claudia"},{"family":"Karimi","given":"Fariba"},{"family":"Fernández","given":"Miriam"},{"family":"Alani","given":"Harith"},{"family":"Berendt","given":"Bettina"},{"family":"Kruegel","given":"Tina"},{"family":"Heinze","given":"Christian"},{"family":"Broelemann","given":"Klaus"},{"family":"Kasneci","given":"Gjergji"},{"family":"Tiropanis","given":"Thanassis"},{"family":"Staab","given":"Steffen"}],"citation-label":"ntoutsi2020datadriven","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov.","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"a558f0637eff7298fea482eef69e3803staab","interhash":"7eea4766ca75a2ce0e4cfd9cf4752bf8","intrahash":"a558f0637eff7298fea482eef69e3803","issue":"3","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1002/widm.1356"},"note":"","number":"3","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Bias in data-driven artificial intelligence systems - An introductory\n               survey","type":"article-journal","username":"staab","version":"","volume":"10"},"c1ad878894ac5d8498e634da9a1c9218staab":{"DOI":"10.1145/3379157.3391984","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3379157.3391984","abstract":"","annote":"","author":[{"family":"Hedeshy","given":"Ramin"},{"family":"Kumar","given":"Chandan"},{"family":"Menges","given":"Raphael"},{"family":"Staab","given":"Steffen"}],"citation-label":"hedeshy2020giuplayer","collection-editor":[],"collection-title":"","container-author":[],"container-title":"ETRA '20 Adjunct: 2020 Symposium on Eye Tracking Research and Applications,\n               Stuttgart, Germany, June 2-5, 2020, Adjunct Volume","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"c1ad878894ac5d8498e634da9a1c9218staab","interhash":"b6d590eb807b9d4a7a2861182f5d6fbc","intrahash":"c1ad878894ac5d8498e634da9a1c9218","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3379157.3391984"},"note":"","number":"","page":"1:1--1:3","page-first":"1","publisher":"","publisher-place":"","status":"","title":"GIUPlayer: A Gaze Immersive YouTube Player Enabling Eye Control\n               and Attention Analysis","type":"paper-conference","username":"staab","version":"","volume":""},"93fef8d54d309836b91b440a4ca6eb1dstaab":{"DOI":"10.1145/3317956.3318152","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3317956.3318152","abstract":"","annote":"","author":[{"family":"Sengupta","given":"Korok"},{"family":"Menges","given":"Raphael"},{"family":"Kumar","given":"Chandan"},{"family":"Staab","given":"Steffen"}],"citation-label":"sengupta2019impact","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the 11th ACM Symposium on Eye Tracking Research &\n               Applications, ETRA 2019, Denver , CO, USA, June 25-28, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"93fef8d54d309836b91b440a4ca6eb1dstaab","interhash":"61ec86b198e4ce082dfdab7023e926b1","intrahash":"93fef8d54d309836b91b440a4ca6eb1d","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3317956.3318152"},"note":"","number":"","page":"74:1--74:9","page-first":"74","publisher":"","publisher-place":"","status":"","title":"Impact of variable positioning of text prediction in gaze-based text\n               entry","type":"paper-conference","username":"staab","version":"","volume":""},"aefdd9524e3f039c6444bd7cc334685cstaab":{"DOI":"10.1007/978-1-4939-7131-2\\_114","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-1-4939-7131-2\\_114","abstract":"","annote":"","author":[{"family":"Gottron","given":"Thomas"},{"family":"Staab","given":"Steffen"}],"citation-label":"gottron2018","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Encyclopedia of Social Network Analysis and Mining, 2nd Edition","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"aefdd9524e3f039c6444bd7cc334685cstaab","interhash":"9f106041321fe3988b26b6b9d246863c","intrahash":"aefdd9524e3f039c6444bd7cc334685c","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-1-4939-7131-2\\_114"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"RDF","type":"chapter","username":"staab","version":"","volume":""},"868f59586a73e49a5b0cedb12f61cf75staab":{"DOI":"10.1145/3194770.3194775","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3194770.3194775","abstract":"","annote":"","author":[{"family":"Ramadan","given":"Qusai"},{"family":"Ahmadian","given":"Amir Shayan"},{"family":"Strüber","given":"Daniel"},{"family":"Jürjens","given":"Jan"},{"family":"Staab","given":"Steffen"}],"citation-label":"ramadan2018modelbased","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the International Workshop on Software Fairness, FairWare@ICSE\n               2018, Gothenburg, Sweden, May 29, 2018","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"868f59586a73e49a5b0cedb12f61cf75staab","interhash":"0c10c15509bbf1d1399d8e92bf0da06c","intrahash":"868f59586a73e49a5b0cedb12f61cf75","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3194770.3194775"},"note":"","number":"","number-of-pages":"6","page":"22--28","page-first":"22","publisher":"","publisher-place":"","status":"","title":"Model-based discrimination analysis: a position paper","type":"paper-conference","username":"staab","version":"","volume":""},"38fe1f0c81936b90d91f3a6c6e83d162staab":{"DOI":"10.1145/3338844","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3338844","abstract":"","annote":"","author":[{"family":"Menges","given":"Raphael"},{"family":"Kumar","given":"Chandan"},{"family":"Staab","given":"Steffen"}],"citation-label":"menges2019improving","collection-editor":[],"collection-title":"","container-author":[],"container-title":"ACM Trans. Comput. Hum. Interact.","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"38fe1f0c81936b90d91f3a6c6e83d162staab","interhash":"35320a23323632151b9fca248dbd4ea4","intrahash":"38fe1f0c81936b90d91f3a6c6e83d162","issue":"6","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3338844"},"note":"","number":"6","page":"37:1--37:46","page-first":"37","publisher":"","publisher-place":"","status":"","title":"Improving User Experience of Eye Tracking-Based Interaction: Introspecting\n               and Adapting Interfaces","type":"article-journal","username":"staab","version":"","volume":"26"},"bc96d1ea407e285e5bc292c56ea80a4bstaab":{"DOI":"10.1145/3391274.3393633","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3391274.3393633","abstract":"","annote":"","author":[{"family":"Janke","given":"Daniel"},{"family":"Staab","given":"Steffen"},{"family":"Leinberger","given":"Martin"}],"citation-label":"janke2020placement","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of The International Workshop on Semantic Big Data, SBD@SIGMOD\n               2020, Portland, Oregon, USA, June 19, 2020","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"bc96d1ea407e285e5bc292c56ea80a4bstaab","interhash":"c5646807d6a8431d152140d509379c0e","intrahash":"bc96d1ea407e285e5bc292c56ea80a4b","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3391274.3393633"},"note":"","number":"","page":"2:1--2:6","page-first":"2","publisher":"","publisher-place":"","status":"","title":"Data placement strategies that speed-up distributed graph query processing","type":"paper-conference","username":"staab","version":"","volume":""},"6c94dbde55f4407863d2134a608077d7staab":{"DOI":"","ISBN":"","ISSN":"","URL":"http://arxiv.org/abs/1904.03084","abstract":"","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"baris2019clearumor","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"6c94dbde55f4407863d2134a608077d7staab","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"6c94dbde55f4407863d2134a608077d7","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"eprint":"1904.03084","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors","type":"article-journal","username":"staab","version":"","volume":"abs/1904.03084"},"5b5039a7852f72105d355b94ccb3bbb4staab":{"DOI":"","ISBN":"","ISSN":"","URL":"https://www.aclweb.org/anthology/2020.lrec-1.583/","abstract":"","annote":"","author":[{"family":"Schneider","given":"Rudolf"},{"family":"Oberhauser","given":"Tom"},{"family":"Grundmann","given":"Paul"},{"family":"Gers","given":"Felix A."},{"family":"Löser","given":"Alexander"},{"family":"Staab","given":"Steffen"}],"citation-label":"schneider2020language","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of The 12th Language Resources and Evaluation Conference,\n               LREC 2020, Marseille, France, May 11-16, 2020","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"5b5039a7852f72105d355b94ccb3bbb4staab","interhash":"92455ce1e7d1d8e4b901f9b61c1b402a","intrahash":"5b5039a7852f72105d355b94ccb3bbb4","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org"},"note":"","number":"","number-of-pages":"9","page":"4739--4748","page-first":"4739","publisher":"","publisher-place":"","status":"","title":"Is Language Modeling Enough? Evaluating Effective Embedding Combinations","type":"paper-conference","username":"staab","version":"","volume":""},"b4f00532ba18d07e4373ea9dc3fa591astaab":{"DOI":"10.1109/Blockchain.2019.00072","ISBN":"","ISSN":"","URL":"https://doi.org/10.1109/Blockchain.2019.00072","abstract":"","annote":"","author":[{"family":"Lohr","given":"Matthias"},{"family":"Hund","given":"Jonathan"},{"family":"Jürjens","given":"Jan"},{"family":"Staab","given":"Steffen"}],"citation-label":"lohr2019ensuring","collection-editor":[],"collection-title":"","container-author":[],"container-title":"IEEE International Conference on Blockchain, Blockchain 2019, Atlanta,\n               GA, USA, July 14-17, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"b4f00532ba18d07e4373ea9dc3fa591astaab","interhash":"b21e03904d980af906ce5c041ab61042","intrahash":"b4f00532ba18d07e4373ea9dc3fa591a","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1109/Blockchain.2019.00072"},"note":"","number":"","number-of-pages":"5","page":"477--482","page-first":"477","publisher":"","publisher-place":"","status":"","title":"Ensuring Genuineness for Selectively Disclosed Confidential Data Using\n               Distributed Ledgers: Applications to Rail Wayside Monitoring","type":"paper-conference","username":"staab","version":"","volume":""},"7352b75474f656e89aedb8f5b58b6caestaab":{"DOI":"10.1007/978-3-030-00111-7\\_30","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-3-030-00111-7\\_30","abstract":"","annote":"","author":[{"family":"Timm","given":"Ingo J."},{"family":"Staab","given":"Steffen"},{"family":"Siebers","given":"Michael"},{"family":"Schon","given":"Claudia"},{"family":"Schmid","given":"Ute"},{"family":"Sauerwald","given":"Kai"},{"family":"Reuter","given":"Lukas"},{"family":"Ragni","given":"Marco"},{"family":"Niederée","given":"Claudia"},{"family":"Maus","given":"Heiko"},{"family":"Kern-Isberner","given":"Gabriele"},{"family":"Jilek","given":"Christian"},{"family":"Friemann","given":"Paulina"},{"family":"Eiter","given":"Thomas"},{"family":"Dengel","given":"Andreas"},{"family":"Dames","given":"Hannah"},{"family":"Bock","given":"Tanja"},{"family":"Berndt","given":"Jan Ole"},{"family":"Beierle","given":"Christoph"}],"citation-label":"timm2018intentional","collection-editor":[],"collection-title":"","container-author":[],"container-title":"KI 2018: Advances in Artificial Intelligence - 41st German Conference\n               on AI, Berlin, Germany, September 24-28, 2018, Proceedings","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"7352b75474f656e89aedb8f5b58b6caestaab","interhash":"ee1920cee453167377d90c2038720383","intrahash":"7352b75474f656e89aedb8f5b58b6cae","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-3-030-00111-7\\_30"},"note":"","number":"","number-of-pages":"8","page":"357--365","page-first":"357","publisher":"","publisher-place":"","status":"","title":"Intentional Forgetting in Artificial Intelligence Systems: Perspectives\n               and Challenges","type":"paper-conference","username":"staab","version":"","volume":""},"175ce2bd175f425378a9e8335022454dstaab":{"DOI":"","ISBN":"","ISSN":"","URL":"http://arxiv.org/abs/1902.02169","abstract":"","annote":"","author":[{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"schmelzeisen2019learning","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"175ce2bd175f425378a9e8335022454dstaab","interhash":"61c25eacd5f7a0ba141e22543fe91a8e","intrahash":"175ce2bd175f425378a9e8335022454d","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"eprint":"1902.02169","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Learning Taxonomies of Concepts and not Words using Contextualized\n               Word Representations: A Position Paper","type":"article-journal","username":"staab","version":"","volume":"abs/1902.02169"},"2856acbb53ab24e90ed0b6ec382dd519staab":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2003.02320","abstract":"","annote":"","author":[{"family":"Hogan","given":"Aidan"},{"family":"Blomqvist","given":"Eva"},{"family":"Cochez","given":"Michael"},{"family":"d'Amato","given":"Claudia"},{"family":"de Melo","given":"Gerard"},{"family":"Gutierrez","given":"Claudio"},{"family":"Gayo","given":"José Emilio Labra"},{"family":"Kirrane","given":"Sabrina"},{"family":"Neumaier","given":"Sebastian"},{"family":"Polleres","given":"Axel"},{"family":"Navigli","given":"Roberto"},{"family":"Ngomo","given":"Axel-Cyrille Ngonga"},{"family":"Rashid","given":"Sabbir M."},{"family":"Rula","given":"Anisa"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Sequeda","given":"Juan F."},{"family":"Staab","given":"Steffen"},{"family":"Zimmermann","given":"Antoine"}],"citation-label":"hogan2020knowledge","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"2856acbb53ab24e90ed0b6ec382dd519staab","interhash":"937ebb9057ebdd6fa997a18741b79755","intrahash":"2856acbb53ab24e90ed0b6ec382dd519","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"eprint":"2003.02320","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Knowledge Graphs","type":"article-journal","username":"staab","version":"","volume":"abs/2003.02320"},"cee48e247952ccce7cdd2167c34802c3staab":{"DOI":"10.3390/e22040394","ISBN":"","ISSN":"","URL":"https://doi.org/10.3390/e22040394","abstract":"","annote":"","author":[{"family":"Koltcov","given":"Sergei"},{"family":"Ignatenko","given":"Vera"},{"family":"Boukhers","given":"Zeyd"},{"family":"Staab","given":"Steffen"}],"citation-label":"koltcov2020analyzing","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Entropy","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"cee48e247952ccce7cdd2167c34802c3staab","interhash":"6fb63ce6e9d8899b56e7c9c22aa7708f","intrahash":"cee48e247952ccce7cdd2167c34802c3","issue":"4","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"imported AnalyticComputing @AnalyticComp","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.3390/e22040394"},"note":"","number":"4","page":"394","page-first":"394","publisher":"","publisher-place":"","status":"","title":"Analyzing the Influence of Hyper-parameters and Regularizers of Topic\n               Modeling in Terms of Renyi Entropy","type":"article-journal","username":"staab","version":"","volume":"22"}}