{"552fc9ceeb2080cf21297026068d53dbanalyticcomp":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2001.08132","abstract":"","annote":"","author":[{"family":"Sun","given":"Jun"},{"family":"Medo","given":"Matús"},{"family":"Staab","given":"Steffen"}],"citation-label":"sun2020timeinvariant","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Physical Review E","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020","February"]],"literal":"2020"},"event-place":"","id":"552fc9ceeb2080cf21297026068d53dbanalyticcomp","interhash":"372bac9a6c4878ee7e2048cdb43fc109","intrahash":"552fc9ceeb2080cf21297026068d53db","issue":"2","issued":{"date-parts":[["2020","February"]],"literal":"2020"},"keyword":"imported myown AnalyticComputing from:staab @AnalyticComp","misc":{"eprint":"2001.08132","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"2","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Time-invariant degree growth in preferential attachment network models","type":"article-journal","username":"analyticcomp","version":"","volume":"101 (2)"},"2856acbb53ab24e90ed0b6ec382dd519lschmelzeisen":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2003.02320","abstract":"In this paper we provide a comprehensive introduction to knowledge graphs, which have recently garnered significant attention from both industry and academia in scenarios that require exploiting diverse, dynamic, large-scale collections of data. After a general introduction, we motivate and contrast various graph-based data models and query languages that are used for knowledge graphs. We discuss the roles of schema, identity, and context in knowledge graphs. We explain how knowledge can be represented and extracted using a combination of deductive and inductive techniques. We summarise methods for the creation, enrichment, quality assessment, refinement, and publication of knowledge graphs. We provide an overview of prominent open knowledge graphs and enterprise knowledge graphs, their applications, and how they use the aforementioned techniques. We conclude with high-level future research directions for knowledge graphs.","annote":"","author":[{"family":"Hogan","given":"Aidan"},{"family":"Blomqvist","given":"Eva"},{"family":"Cochez","given":"Michael"},{"family":"d'Amato","given":"Claudia"},{"family":"de Melo","given":"Gerard"},{"family":"Gutierrez","given":"Claudio"},{"family":"Gayo","given":"José Emilio Labra"},{"family":"Kirrane","given":"Sabrina"},{"family":"Neumaier","given":"Sebastian"},{"family":"Polleres","given":"Axel"},{"family":"Navigli","given":"Roberto"},{"family":"Ngomo","given":"Axel-Cyrille Ngonga"},{"family":"Rashid","given":"Sabbir M."},{"family":"Rula","given":"Anisa"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Sequeda","given":"Juan F."},{"family":"Staab","given":"Steffen"},{"family":"Zimmermann","given":"Antoine"}],"citation-label":"journals/corr/abs-2003-02320","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020","mar"]],"literal":"2020"},"event-place":"","id":"2856acbb53ab24e90ed0b6ec382dd519lschmelzeisen","interhash":"937ebb9057ebdd6fa997a18741b79755","intrahash":"2856acbb53ab24e90ed0b6ec382dd519","issue":"","issued":{"date-parts":[["2020","mar"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing dblp myown","misc":{"language":"English","eprint":"2003.02320","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Knowledge Graphs","type":"article-journal","username":"lschmelzeisen","version":"","volume":"abs/2003.02320"},"f7dbf0a622ff3e694c009ec93060c47flschmelzeisen":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/1902.02169","abstract":"Taxonomies are semantic hierarchies of concepts. One limitation of current taxonomy learning systems is that they define concepts as single words. This position paper argues that contextualized word representations, which recently achieved state-of-the-art results on many competitive NLP tasks, are a promising method to address this limitation. We outline a novel approach for taxonomy learning that (1) defines concepts as synsets, (2) learns density-based approximations of contextualized word representations, and (3) can measure similarity and hypernymy among them.","annote":"","author":[{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"journals/corr/abs-1902-02169","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019","jan"]],"literal":"2019"},"event-place":"","id":"f7dbf0a622ff3e694c009ec93060c47flschmelzeisen","interhash":"61c25eacd5f7a0ba141e22543fe91a8e","intrahash":"f7dbf0a622ff3e694c009ec93060c47f","issue":"","issued":{"date-parts":[["2019","jan"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing dblp myown","misc":{"ee":"http://arxiv.org/abs/1902.02169","language":"English"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Learning Taxonomies of Concepts and not Words using Contextualized Word Representations: A Position Paper.","type":"article-journal","username":"lschmelzeisen","version":"","volume":"abs/1902.02169"},"b05149be0c2e6b80ac4e4d2ab3dfd193lschmelzeisen":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/1904.03084","abstract":"This paper describes our submission to SemEval-2019 Task 7: RumourEval: Determining Rumor Veracity and Support for Rumors. We participated in both subtasks. The goal of subtask A is to classify the type of interaction between a rumorous social media post and a reply post as support, query, deny, or comment. The goal of subtask B is to predict the veracity of a given rumor. For subtask A, we implement a CNN-based neural architecture using ELMo embeddings of post text combined with auxiliary features and achieve a F1-score of 44.6%. For subtask B, we employ a MLP neural network leveraging our estimates for subtask A and achieve a F1-score of 30.1% (second place in the competition). We provide results and analysis of our system performance and present ablation experiments.","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"journals/corr/abs-1904-03084","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019","apr"]],"literal":"2019"},"event-place":"","id":"b05149be0c2e6b80ac4e4d2ab3dfd193lschmelzeisen","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"b05149be0c2e6b80ac4e4d2ab3dfd193","issue":"","issued":{"date-parts":[["2019","apr"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing dblp myown","misc":{"ee":"http://arxiv.org/abs/1904.03084","language":"English"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors.","type":"article-journal","username":"lschmelzeisen","version":"","volume":"abs/1904.03084"},"42f0d00808b61a6cc0a7d69aa701b464lschmelzeisen":{"DOI":"10.18653/v1/s19-2193","ISBN":"978-1-950737-06-2","ISSN":"","URL":"https://www.aclweb.org/anthology/S19-2193/","abstract":"This paper describes our submission to SemEval-2019 Task 7: RumourEval: Determining Rumor Veracity and Support for Rumors. We participated in both subtasks. The goal of subtask A is to classify the type of interaction between a rumorous social media post and a reply post as support, query, deny, or comment. The goal of subtask B is to predict the veracity of a given rumor. For subtask A, we implement a CNN-based neural architecture using ELMo embeddings of post text combined with auxiliary features and achieve a F1-score of 44.6%. For subtask B, we employ a MLP neural network leveraging our estimates for subtask A and achieve a F1-score of 30.1% (second place in the competition). We provide results and analysis of our system performance and present ablation experiments.","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"conf/semeval/BarisSS19","collection-editor":[{"family":"May","given":"Jonathan"},{"family":"Shutova","given":"Ekaterina"},{"family":"Herbelot","given":"Aurélie"},{"family":"Zhu","given":"Xiaodan"},{"family":"Apidianaki","given":"Marianna"},{"family":"Mohammad","given":"Saif M."}],"collection-title":"","container-author":[{"family":"May","given":"Jonathan"},{"family":"Shutova","given":"Ekaterina"},{"family":"Herbelot","given":"Aurélie"},{"family":"Zhu","given":"Xiaodan"},{"family":"Apidianaki","given":"Marianna"},{"family":"Mohammad","given":"Saif M."}],"container-title":"SemEval@NAACL-HLT","documents":[],"edition":"","editor":[{"family":"May","given":"Jonathan"},{"family":"Shutova","given":"Ekaterina"},{"family":"Herbelot","given":"Aurélie"},{"family":"Zhu","given":"Xiaodan"},{"family":"Apidianaki","given":"Marianna"},{"family":"Mohammad","given":"Saif M."}],"event-date":{"date-parts":[["2019","jun"]],"literal":"2019"},"event-place":"","id":"42f0d00808b61a6cc0a7d69aa701b464lschmelzeisen","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"42f0d00808b61a6cc0a7d69aa701b464","issue":"","issued":{"date-parts":[["2019","jun"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing dblp myown","misc":{"ee":"https://www.aclweb.org/anthology/S19-2193/","isbn":"978-1-950737-06-2","language":"English","doi":"10.18653/v1/s19-2193"},"note":"","number":"","number-of-pages":"4","page":"1105-1109","page-first":"1105","publisher":"Association for Computational Linguistics","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors.","type":"paper-conference","username":"lschmelzeisen","version":"","volume":""},"ff178826b54a11e05a960bb5faf8d8cdstaab":{"DOI":"10.1145/3313831.3376579","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3313831.3376579","abstract":"","annote":"","author":[{"family":"Sengupta","given":"Korok"},{"family":"Bhattarai","given":"Sabin"},{"family":"Sarcar","given":"Sayan"},{"family":"MacKenzie","given":"I. Scott"},{"family":"Staab","given":"Steffen"}],"citation-label":"sengupta2020leveraging","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CHI '20: CHI Conference on Human Factors in Computing Systems,               Honolulu, HI, USA, April 25-30, 2020","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"ff178826b54a11e05a960bb5faf8d8cdstaab","interhash":"266b047b93da50db4804e5b48062926b","intrahash":"ff178826b54a11e05a960bb5faf8d8cd","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing myown","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3313831.3376579"},"note":"","number":"","number-of-pages":"10","page":"1--11","page-first":"1","publisher":"","publisher-place":"","status":"","title":"Leveraging Error Correction in Voice-based Text Entry by Talk-and-Gaze","type":"paper-conference","username":"staab","version":"","volume":""},"552fc9ceeb2080cf21297026068d53dbstaab":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2001.08132","abstract":"","annote":"","author":[{"family":"Sun","given":"Jun"},{"family":"Medo","given":"Matús"},{"family":"Staab","given":"Steffen"}],"citation-label":"sun2020timeinvariant","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Physical Review E","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020","February"]],"literal":"2020"},"event-place":"","id":"552fc9ceeb2080cf21297026068d53dbstaab","interhash":"372bac9a6c4878ee7e2048cdb43fc109","intrahash":"552fc9ceeb2080cf21297026068d53db","issue":"2","issued":{"date-parts":[["2020","February"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported myown","misc":{"eprint":"2001.08132","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"2","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Time-invariant degree growth in preferential attachment network models","type":"article-journal","username":"staab","version":"","volume":"101 (2)"},"99dde27b2df3ec83146b58e7efce9dc3staab":{"DOI":"10.1145/3379156.3391831","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3379156.3391831","abstract":"","annote":"","author":[{"family":"Menges","given":"Raphael"},{"family":"Kramer","given":"Sophia"},{"family":"Hill","given":"Stefan"},{"family":"Nisslmueller","given":"Marius"},{"family":"Kumar","given":"Chandan"},{"family":"Staab","given":"Steffen"}],"citation-label":"menges2020visualization","collection-editor":[],"collection-title":"","container-author":[],"container-title":"ETRA '20: 2020 Symposium on Eye Tracking Research and Applications,\n               Short Papers, Stuttgart, Germany, June 2-5, 2020","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"99dde27b2df3ec83146b58e7efce9dc3staab","interhash":"750e7d268c97e18a30ed6af51796225b","intrahash":"99dde27b2df3ec83146b58e7efce9dc3","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported myown","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3379156.3391831"},"note":"","number":"","page":"46:1--46:5","page-first":"46","publisher":"","publisher-place":"","status":"","title":"A Visualization Tool for Eye Tracking Data Analysis in the Web","type":"paper-conference","username":"staab","version":"","volume":""},"6c94dbde55f4407863d2134a608077d7staab":{"DOI":"","ISBN":"","ISSN":"","URL":"http://arxiv.org/abs/1904.03084","abstract":"","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"baris2019clearumor","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"6c94dbde55f4407863d2134a608077d7staab","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"6c94dbde55f4407863d2134a608077d7","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"eprint":"1904.03084","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors","type":"article-journal","username":"staab","version":"","volume":"abs/1904.03084"},"bc96d1ea407e285e5bc292c56ea80a4bstaab":{"DOI":"10.1145/3391274.3393633","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3391274.3393633","abstract":"","annote":"","author":[{"family":"Janke","given":"Daniel"},{"family":"Staab","given":"Steffen"},{"family":"Leinberger","given":"Martin"}],"citation-label":"janke2020placement","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of The International Workshop on Semantic Big Data, SBD@SIGMOD\n               2020, Portland, Oregon, USA, June 19, 2020","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"bc96d1ea407e285e5bc292c56ea80a4bstaab","interhash":"c5646807d6a8431d152140d509379c0e","intrahash":"bc96d1ea407e285e5bc292c56ea80a4b","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3391274.3393633"},"note":"","number":"","page":"2:1--2:6","page-first":"2","publisher":"","publisher-place":"","status":"","title":"Data placement strategies that speed-up distributed graph query processing","type":"paper-conference","username":"staab","version":"","volume":""},"3744a1c5639c02c29cc82b0b4c4676a5staab":{"DOI":"10.18653/v1/s19-2193","ISBN":"","ISSN":"","URL":"https://doi.org/10.18653/v1/s19-2193","abstract":"","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"baris2019clearumor","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the 13th International Workshop on Semantic Evaluation,\n               SemEval@NAACL-HLT 2019, Minneapolis, MN, USA, June 6-7, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"3744a1c5639c02c29cc82b0b4c4676a5staab","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"3744a1c5639c02c29cc82b0b4c4676a5","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.18653/v1/s19-2193"},"note":"","number":"","number-of-pages":"4","page":"1105--1109","page-first":"1105","publisher":"","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors","type":"paper-conference","username":"staab","version":"","volume":""},"2e25b46b593b19b3f11d41caf2a81851staab":{"DOI":"10.1145/3204493.3208338","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3204493.3208338","abstract":"","annote":"","author":[{"family":"Sengupta","given":"Korok"},{"family":"Ke","given":"Min"},{"family":"Menges","given":"Raphael"},{"family":"Kumar","given":"Chandan"},{"family":"Staab","given":"Steffen"}],"citation-label":"sengupta2018handsfree","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the 2018 ACM Symposium on Eye Tracking Research &\n               Applications, ETRA 2018, Warsaw, Poland, June 14-17, 2018","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"2e25b46b593b19b3f11d41caf2a81851staab","interhash":"ecc3393156d15fb0f185c1be11a89a31","intrahash":"2e25b46b593b19b3f11d41caf2a81851","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3204493.3208338"},"note":"","number":"","page":"88:1--88:3","page-first":"88","publisher":"","publisher-place":"","status":"","title":"Hands-free web browsing: enriching the user experience with gaze and\n               voice modality","type":"paper-conference","username":"staab","version":"","volume":""},"cc2f73ee24901a1de04294999268e75bstaab":{"DOI":"10.1109/JCDL.2019.00035","ISBN":"","ISSN":"","URL":"https://doi.org/10.1109/JCDL.2019.00035","abstract":"","annote":"","author":[{"family":"Boukhers","given":"Zeyd"},{"family":"Ambhore","given":"Shriharsh"},{"family":"Staab","given":"Steffen"}],"citation-label":"boukhers2019endtoend","collection-editor":[],"collection-title":"","container-author":[],"container-title":"19th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2019,\n               Champaign, IL, USA, June 2-6, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"cc2f73ee24901a1de04294999268e75bstaab","interhash":"e69e724c88d2684521b1455995f5a7bd","intrahash":"cc2f73ee24901a1de04294999268e75b","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1109/JCDL.2019.00035"},"note":"","number":"","number-of-pages":"9","page":"186--195","page-first":"186","publisher":"","publisher-place":"","status":"","title":"An End-to-End Approach for Extracting and Segmenting High-Variance\n               References from PDF Documents","type":"paper-conference","username":"staab","version":"","volume":""},"7137d8e816aa4fb8cd88bd1a40b48dd4staab":{"DOI":"10.22152/programming-journal.org/2019/3/13","ISBN":"","ISSN":"","URL":"https://doi.org/10.22152/programming-journal.org/2019/3/13","abstract":"","annote":"","author":[{"family":"Seifer","given":"Philipp"},{"family":"Leinberger","given":"Martin"},{"family":"Lämmel","given":"Ralf"},{"family":"Staab","given":"Steffen"}],"citation-label":"seifer2019semantic","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Programming Journal","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"7137d8e816aa4fb8cd88bd1a40b48dd4staab","interhash":"d0596cdf6b7ec2aaae523c24578a7b2b","intrahash":"7137d8e816aa4fb8cd88bd1a40b48dd4","issue":"3","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.22152/programming-journal.org/2019/3/13"},"note":"","number":"3","page":"13","page-first":"13","publisher":"","publisher-place":"","status":"","title":"Semantic Query Integration With Reason","type":"article-journal","username":"staab","version":"","volume":"3"},"59084f7abc717b73756cb489d65e6d37staab":{"DOI":"10.1109/MC.2018.2701640","ISBN":"","ISSN":"","URL":"https://doi.org/10.1109/MC.2018.2701640","abstract":"","annote":"","author":[{"family":"Sun","given":"Jun"},{"family":"Staab","given":"Steffen"},{"family":"Kunegis","given":"Jérôme"}],"citation-label":"sun2018understanding","collection-editor":[],"collection-title":"","container-author":[],"container-title":"IEEE Computer","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"59084f7abc717b73756cb489d65e6d37staab","interhash":"3fc4b08f0c67bd31a7c3da96604eb5df","intrahash":"59084f7abc717b73756cb489d65e6d37","issue":"6","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1109/MC.2018.2701640"},"note":"","number":"6","number-of-pages":"8","page":"52--60","page-first":"52","publisher":"","publisher-place":"","status":"","title":"Understanding Social Networks Using Transfer Learning","type":"article-journal","username":"staab","version":"","volume":"51"},"0f2ba8b131414db5c36831405ae65a96staab":{"DOI":"10.1007/978-1-4939-7131-2\\_111","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-1-4939-7131-2\\_111","abstract":"","annote":"","author":[{"family":"Gottron","given":"Thomas"},{"family":"Staab","given":"Steffen"}],"citation-label":"gottron2018linked","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Encyclopedia of Social Network Analysis and Mining, 2nd Edition","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"0f2ba8b131414db5c36831405ae65a96staab","interhash":"00e9e13ab60a0dc335dd1b422b7efac2","intrahash":"0f2ba8b131414db5c36831405ae65a96","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-1-4939-7131-2\\_111"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Linked Open Data","type":"chapter","username":"staab","version":"","volume":""},"cfe7d08fd390ad5dc7b6ee6fb9397f36staab":{"DOI":"","ISBN":"","ISSN":"","URL":"http://arxiv.org/abs/1907.00855","abstract":"","annote":"","author":[{"family":"Leinberger","given":"Martin"},{"family":"Seifer","given":"Philipp"},{"family":"Schon","given":"Claudia"},{"family":"Lämmel","given":"Ralf"},{"family":"Staab","given":"Steffen"}],"citation-label":"leinberger2019checking","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"cfe7d08fd390ad5dc7b6ee6fb9397f36staab","interhash":"3238ba728de3020c0d59b24d231ed6e8","intrahash":"cfe7d08fd390ad5dc7b6ee6fb9397f36","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"eprint":"1907.00855","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Type Checking Program Code using SHACL (Extended Version)","type":"article-journal","username":"staab","version":"","volume":"abs/1907.00855"},"8169be02bc69350394eb4669417bcb27staab":{"DOI":"10.1145/3340555.3353734","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3340555.3353734","abstract":"","annote":"","author":[{"family":"Kumar","given":"Chandan"},{"family":"Akbari","given":"Daniyal"},{"family":"Menges","given":"Raphael"},{"family":"MacKenzie","given":"I. Scott"},{"family":"Staab","given":"Steffen"}],"citation-label":"kumar2019touchgazepath","collection-editor":[],"collection-title":"","container-author":[],"container-title":"International Conference on Multimodal Interaction, ICMI 2019, Suzhou,\n               China, October 14-18, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"8169be02bc69350394eb4669417bcb27staab","interhash":"8e42614f4db20dd46a8ab044b4fb5b84","intrahash":"8169be02bc69350394eb4669417bcb27","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3340555.3353734"},"note":"","number":"","number-of-pages":"9","page":"329--338","page-first":"329","publisher":"","publisher-place":"","status":"","title":"TouchGazePath: Multimodal Interaction with Touch and Gaze Path for\n               Secure Yet Efficient PIN Entry","type":"paper-conference","username":"staab","version":"","volume":""},"868f59586a73e49a5b0cedb12f61cf75staab":{"DOI":"10.1145/3194770.3194775","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3194770.3194775","abstract":"","annote":"","author":[{"family":"Ramadan","given":"Qusai"},{"family":"Ahmadian","given":"Amir Shayan"},{"family":"Strüber","given":"Daniel"},{"family":"Jürjens","given":"Jan"},{"family":"Staab","given":"Steffen"}],"citation-label":"ramadan2018modelbased","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the International Workshop on Software Fairness, FairWare@ICSE\n               2018, Gothenburg, Sweden, May 29, 2018","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"868f59586a73e49a5b0cedb12f61cf75staab","interhash":"0c10c15509bbf1d1399d8e92bf0da06c","intrahash":"868f59586a73e49a5b0cedb12f61cf75","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3194770.3194775"},"note":"","number":"","number-of-pages":"6","page":"22--28","page-first":"22","publisher":"","publisher-place":"","status":"","title":"Model-based discrimination analysis: a position paper","type":"paper-conference","username":"staab","version":"","volume":""},"2856acbb53ab24e90ed0b6ec382dd519staab":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2003.02320","abstract":"","annote":"","author":[{"family":"Hogan","given":"Aidan"},{"family":"Blomqvist","given":"Eva"},{"family":"Cochez","given":"Michael"},{"family":"d'Amato","given":"Claudia"},{"family":"de Melo","given":"Gerard"},{"family":"Gutierrez","given":"Claudio"},{"family":"Gayo","given":"José Emilio Labra"},{"family":"Kirrane","given":"Sabrina"},{"family":"Neumaier","given":"Sebastian"},{"family":"Polleres","given":"Axel"},{"family":"Navigli","given":"Roberto"},{"family":"Ngomo","given":"Axel-Cyrille Ngonga"},{"family":"Rashid","given":"Sabbir M."},{"family":"Rula","given":"Anisa"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Sequeda","given":"Juan F."},{"family":"Staab","given":"Steffen"},{"family":"Zimmermann","given":"Antoine"}],"citation-label":"hogan2020knowledge","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"2856acbb53ab24e90ed0b6ec382dd519staab","interhash":"937ebb9057ebdd6fa997a18741b79755","intrahash":"2856acbb53ab24e90ed0b6ec382dd519","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"eprint":"2003.02320","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Knowledge Graphs","type":"article-journal","username":"staab","version":"","volume":"abs/2003.02320"}}