{"552fc9ceeb2080cf21297026068d53dbanalyticcomp":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2001.08132","abstract":"","annote":"","author":[{"family":"Sun","given":"Jun"},{"family":"Medo","given":"Matús"},{"family":"Staab","given":"Steffen"}],"citation-label":"sun2020timeinvariant","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Physical Review E","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020","February"]],"literal":"2020"},"event-place":"","id":"552fc9ceeb2080cf21297026068d53dbanalyticcomp","interhash":"372bac9a6c4878ee7e2048cdb43fc109","intrahash":"552fc9ceeb2080cf21297026068d53db","issue":"2","issued":{"date-parts":[["2020","February"]],"literal":"2020"},"keyword":"imported myown AnalyticComputing from:staab @AnalyticComp","misc":{"eprint":"2001.08132","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"2","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Time-invariant degree growth in preferential attachment network models","type":"article-journal","username":"analyticcomp","version":"","volume":"101 (2)"},"552fc9ceeb2080cf21297026068d53dbstaab":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2001.08132","abstract":"","annote":"","author":[{"family":"Sun","given":"Jun"},{"family":"Medo","given":"Matús"},{"family":"Staab","given":"Steffen"}],"citation-label":"sun2020timeinvariant","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Physical Review E","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020","February"]],"literal":"2020"},"event-place":"","id":"552fc9ceeb2080cf21297026068d53dbstaab","interhash":"372bac9a6c4878ee7e2048cdb43fc109","intrahash":"552fc9ceeb2080cf21297026068d53db","issue":"2","issued":{"date-parts":[["2020","February"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported myown","misc":{"eprint":"2001.08132","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"2","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Time-invariant degree growth in preferential attachment network models","type":"article-journal","username":"staab","version":"","volume":"101 (2)"},"99dde27b2df3ec83146b58e7efce9dc3staab":{"DOI":"10.1145/3379156.3391831","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3379156.3391831","abstract":"","annote":"","author":[{"family":"Menges","given":"Raphael"},{"family":"Kramer","given":"Sophia"},{"family":"Hill","given":"Stefan"},{"family":"Nisslmueller","given":"Marius"},{"family":"Kumar","given":"Chandan"},{"family":"Staab","given":"Steffen"}],"citation-label":"menges2020visualization","collection-editor":[],"collection-title":"","container-author":[],"container-title":"ETRA '20: 2020 Symposium on Eye Tracking Research and Applications,\n               Short Papers, Stuttgart, Germany, June 2-5, 2020","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"99dde27b2df3ec83146b58e7efce9dc3staab","interhash":"750e7d268c97e18a30ed6af51796225b","intrahash":"99dde27b2df3ec83146b58e7efce9dc3","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported myown","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3379156.3391831"},"note":"","number":"","page":"46:1--46:5","page-first":"46","publisher":"","publisher-place":"","status":"","title":"A Visualization Tool for Eye Tracking Data Analysis in the Web","type":"paper-conference","username":"staab","version":"","volume":""},"6c94dbde55f4407863d2134a608077d7staab":{"DOI":"","ISBN":"","ISSN":"","URL":"http://arxiv.org/abs/1904.03084","abstract":"","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"baris2019clearumor","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"6c94dbde55f4407863d2134a608077d7staab","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"6c94dbde55f4407863d2134a608077d7","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"eprint":"1904.03084","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors","type":"article-journal","username":"staab","version":"","volume":"abs/1904.03084"},"bc96d1ea407e285e5bc292c56ea80a4bstaab":{"DOI":"10.1145/3391274.3393633","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3391274.3393633","abstract":"","annote":"","author":[{"family":"Janke","given":"Daniel"},{"family":"Staab","given":"Steffen"},{"family":"Leinberger","given":"Martin"}],"citation-label":"janke2020placement","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of The International Workshop on Semantic Big Data, SBD@SIGMOD\n               2020, Portland, Oregon, USA, June 19, 2020","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"bc96d1ea407e285e5bc292c56ea80a4bstaab","interhash":"c5646807d6a8431d152140d509379c0e","intrahash":"bc96d1ea407e285e5bc292c56ea80a4b","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3391274.3393633"},"note":"","number":"","page":"2:1--2:6","page-first":"2","publisher":"","publisher-place":"","status":"","title":"Data placement strategies that speed-up distributed graph query processing","type":"paper-conference","username":"staab","version":"","volume":""},"3744a1c5639c02c29cc82b0b4c4676a5staab":{"DOI":"10.18653/v1/s19-2193","ISBN":"","ISSN":"","URL":"https://doi.org/10.18653/v1/s19-2193","abstract":"","annote":"","author":[{"family":"Baris","given":"Ipek"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"baris2019clearumor","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the 13th International Workshop on Semantic Evaluation,\n               SemEval@NAACL-HLT 2019, Minneapolis, MN, USA, June 6-7, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"3744a1c5639c02c29cc82b0b4c4676a5staab","interhash":"8ecf60543c716db98189eb98c772be4f","intrahash":"3744a1c5639c02c29cc82b0b4c4676a5","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.18653/v1/s19-2193"},"note":"","number":"","number-of-pages":"4","page":"1105--1109","page-first":"1105","publisher":"","publisher-place":"","status":"","title":"CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo Against Rumors","type":"paper-conference","username":"staab","version":"","volume":""},"2e25b46b593b19b3f11d41caf2a81851staab":{"DOI":"10.1145/3204493.3208338","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3204493.3208338","abstract":"","annote":"","author":[{"family":"Sengupta","given":"Korok"},{"family":"Ke","given":"Min"},{"family":"Menges","given":"Raphael"},{"family":"Kumar","given":"Chandan"},{"family":"Staab","given":"Steffen"}],"citation-label":"sengupta2018handsfree","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the 2018 ACM Symposium on Eye Tracking Research &\n               Applications, ETRA 2018, Warsaw, Poland, June 14-17, 2018","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"2e25b46b593b19b3f11d41caf2a81851staab","interhash":"ecc3393156d15fb0f185c1be11a89a31","intrahash":"2e25b46b593b19b3f11d41caf2a81851","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3204493.3208338"},"note":"","number":"","page":"88:1--88:3","page-first":"88","publisher":"","publisher-place":"","status":"","title":"Hands-free web browsing: enriching the user experience with gaze and\n               voice modality","type":"paper-conference","username":"staab","version":"","volume":""},"cc2f73ee24901a1de04294999268e75bstaab":{"DOI":"10.1109/JCDL.2019.00035","ISBN":"","ISSN":"","URL":"https://doi.org/10.1109/JCDL.2019.00035","abstract":"","annote":"","author":[{"family":"Boukhers","given":"Zeyd"},{"family":"Ambhore","given":"Shriharsh"},{"family":"Staab","given":"Steffen"}],"citation-label":"boukhers2019endtoend","collection-editor":[],"collection-title":"","container-author":[],"container-title":"19th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2019,\n               Champaign, IL, USA, June 2-6, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"cc2f73ee24901a1de04294999268e75bstaab","interhash":"e69e724c88d2684521b1455995f5a7bd","intrahash":"cc2f73ee24901a1de04294999268e75b","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1109/JCDL.2019.00035"},"note":"","number":"","number-of-pages":"9","page":"186--195","page-first":"186","publisher":"","publisher-place":"","status":"","title":"An End-to-End Approach for Extracting and Segmenting High-Variance\n               References from PDF Documents","type":"paper-conference","username":"staab","version":"","volume":""},"7137d8e816aa4fb8cd88bd1a40b48dd4staab":{"DOI":"10.22152/programming-journal.org/2019/3/13","ISBN":"","ISSN":"","URL":"https://doi.org/10.22152/programming-journal.org/2019/3/13","abstract":"","annote":"","author":[{"family":"Seifer","given":"Philipp"},{"family":"Leinberger","given":"Martin"},{"family":"Lämmel","given":"Ralf"},{"family":"Staab","given":"Steffen"}],"citation-label":"seifer2019semantic","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Programming Journal","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"7137d8e816aa4fb8cd88bd1a40b48dd4staab","interhash":"d0596cdf6b7ec2aaae523c24578a7b2b","intrahash":"7137d8e816aa4fb8cd88bd1a40b48dd4","issue":"3","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.22152/programming-journal.org/2019/3/13"},"note":"","number":"3","page":"13","page-first":"13","publisher":"","publisher-place":"","status":"","title":"Semantic Query Integration With Reason","type":"article-journal","username":"staab","version":"","volume":"3"},"59084f7abc717b73756cb489d65e6d37staab":{"DOI":"10.1109/MC.2018.2701640","ISBN":"","ISSN":"","URL":"https://doi.org/10.1109/MC.2018.2701640","abstract":"","annote":"","author":[{"family":"Sun","given":"Jun"},{"family":"Staab","given":"Steffen"},{"family":"Kunegis","given":"Jérôme"}],"citation-label":"sun2018understanding","collection-editor":[],"collection-title":"","container-author":[],"container-title":"IEEE Computer","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"59084f7abc717b73756cb489d65e6d37staab","interhash":"3fc4b08f0c67bd31a7c3da96604eb5df","intrahash":"59084f7abc717b73756cb489d65e6d37","issue":"6","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1109/MC.2018.2701640"},"note":"","number":"6","number-of-pages":"8","page":"52--60","page-first":"52","publisher":"","publisher-place":"","status":"","title":"Understanding Social Networks Using Transfer Learning","type":"article-journal","username":"staab","version":"","volume":"51"},"0f2ba8b131414db5c36831405ae65a96staab":{"DOI":"10.1007/978-1-4939-7131-2\\_111","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-1-4939-7131-2\\_111","abstract":"","annote":"","author":[{"family":"Gottron","given":"Thomas"},{"family":"Staab","given":"Steffen"}],"citation-label":"gottron2018linked","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Encyclopedia of Social Network Analysis and Mining, 2nd Edition","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"0f2ba8b131414db5c36831405ae65a96staab","interhash":"00e9e13ab60a0dc335dd1b422b7efac2","intrahash":"0f2ba8b131414db5c36831405ae65a96","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-1-4939-7131-2\\_111"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Linked Open Data","type":"chapter","username":"staab","version":"","volume":""},"cfe7d08fd390ad5dc7b6ee6fb9397f36staab":{"DOI":"","ISBN":"","ISSN":"","URL":"http://arxiv.org/abs/1907.00855","abstract":"","annote":"","author":[{"family":"Leinberger","given":"Martin"},{"family":"Seifer","given":"Philipp"},{"family":"Schon","given":"Claudia"},{"family":"Lämmel","given":"Ralf"},{"family":"Staab","given":"Steffen"}],"citation-label":"leinberger2019checking","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"cfe7d08fd390ad5dc7b6ee6fb9397f36staab","interhash":"3238ba728de3020c0d59b24d231ed6e8","intrahash":"cfe7d08fd390ad5dc7b6ee6fb9397f36","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"eprint":"1907.00855","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Type Checking Program Code using SHACL (Extended Version)","type":"article-journal","username":"staab","version":"","volume":"abs/1907.00855"},"8169be02bc69350394eb4669417bcb27staab":{"DOI":"10.1145/3340555.3353734","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3340555.3353734","abstract":"","annote":"","author":[{"family":"Kumar","given":"Chandan"},{"family":"Akbari","given":"Daniyal"},{"family":"Menges","given":"Raphael"},{"family":"MacKenzie","given":"I. Scott"},{"family":"Staab","given":"Steffen"}],"citation-label":"kumar2019touchgazepath","collection-editor":[],"collection-title":"","container-author":[],"container-title":"International Conference on Multimodal Interaction, ICMI 2019, Suzhou,\n               China, October 14-18, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"8169be02bc69350394eb4669417bcb27staab","interhash":"8e42614f4db20dd46a8ab044b4fb5b84","intrahash":"8169be02bc69350394eb4669417bcb27","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3340555.3353734"},"note":"","number":"","number-of-pages":"9","page":"329--338","page-first":"329","publisher":"","publisher-place":"","status":"","title":"TouchGazePath: Multimodal Interaction with Touch and Gaze Path for\n               Secure Yet Efficient PIN Entry","type":"paper-conference","username":"staab","version":"","volume":""},"868f59586a73e49a5b0cedb12f61cf75staab":{"DOI":"10.1145/3194770.3194775","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3194770.3194775","abstract":"","annote":"","author":[{"family":"Ramadan","given":"Qusai"},{"family":"Ahmadian","given":"Amir Shayan"},{"family":"Strüber","given":"Daniel"},{"family":"Jürjens","given":"Jan"},{"family":"Staab","given":"Steffen"}],"citation-label":"ramadan2018modelbased","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the International Workshop on Software Fairness, FairWare@ICSE\n               2018, Gothenburg, Sweden, May 29, 2018","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"868f59586a73e49a5b0cedb12f61cf75staab","interhash":"0c10c15509bbf1d1399d8e92bf0da06c","intrahash":"868f59586a73e49a5b0cedb12f61cf75","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3194770.3194775"},"note":"","number":"","number-of-pages":"6","page":"22--28","page-first":"22","publisher":"","publisher-place":"","status":"","title":"Model-based discrimination analysis: a position paper","type":"paper-conference","username":"staab","version":"","volume":""},"2856acbb53ab24e90ed0b6ec382dd519staab":{"DOI":"","ISBN":"","ISSN":"","URL":"https://arxiv.org/abs/2003.02320","abstract":"","annote":"","author":[{"family":"Hogan","given":"Aidan"},{"family":"Blomqvist","given":"Eva"},{"family":"Cochez","given":"Michael"},{"family":"d'Amato","given":"Claudia"},{"family":"de Melo","given":"Gerard"},{"family":"Gutierrez","given":"Claudio"},{"family":"Gayo","given":"José Emilio Labra"},{"family":"Kirrane","given":"Sabrina"},{"family":"Neumaier","given":"Sebastian"},{"family":"Polleres","given":"Axel"},{"family":"Navigli","given":"Roberto"},{"family":"Ngomo","given":"Axel-Cyrille Ngonga"},{"family":"Rashid","given":"Sabbir M."},{"family":"Rula","given":"Anisa"},{"family":"Schmelzeisen","given":"Lukas"},{"family":"Sequeda","given":"Juan F."},{"family":"Staab","given":"Steffen"},{"family":"Zimmermann","given":"Antoine"}],"citation-label":"hogan2020knowledge","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2020"]],"literal":"2020"},"event-place":"","id":"2856acbb53ab24e90ed0b6ec382dd519staab","interhash":"937ebb9057ebdd6fa997a18741b79755","intrahash":"2856acbb53ab24e90ed0b6ec382dd519","issue":"","issued":{"date-parts":[["2020"]],"literal":"2020"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"eprint":"2003.02320","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Knowledge Graphs","type":"article-journal","username":"staab","version":"","volume":"abs/2003.02320"},"175ce2bd175f425378a9e8335022454dstaab":{"DOI":"","ISBN":"","ISSN":"","URL":"http://arxiv.org/abs/1902.02169","abstract":"","annote":"","author":[{"family":"Schmelzeisen","given":"Lukas"},{"family":"Staab","given":"Steffen"}],"citation-label":"schmelzeisen2019learning","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"175ce2bd175f425378a9e8335022454dstaab","interhash":"61c25eacd5f7a0ba141e22543fe91a8e","intrahash":"175ce2bd175f425378a9e8335022454d","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"eprint":"1902.02169","bibsource":"dblp computer science bibliography, https://dblp.org","archiveprefix":"arXiv"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Learning Taxonomies of Concepts and not Words using Contextualized\n               Word Representations: A Position Paper","type":"article-journal","username":"staab","version":"","volume":"abs/1902.02169"},"7352b75474f656e89aedb8f5b58b6caestaab":{"DOI":"10.1007/978-3-030-00111-7\\_30","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-3-030-00111-7\\_30","abstract":"","annote":"","author":[{"family":"Timm","given":"Ingo J."},{"family":"Staab","given":"Steffen"},{"family":"Siebers","given":"Michael"},{"family":"Schon","given":"Claudia"},{"family":"Schmid","given":"Ute"},{"family":"Sauerwald","given":"Kai"},{"family":"Reuter","given":"Lukas"},{"family":"Ragni","given":"Marco"},{"family":"Niederée","given":"Claudia"},{"family":"Maus","given":"Heiko"},{"family":"Kern-Isberner","given":"Gabriele"},{"family":"Jilek","given":"Christian"},{"family":"Friemann","given":"Paulina"},{"family":"Eiter","given":"Thomas"},{"family":"Dengel","given":"Andreas"},{"family":"Dames","given":"Hannah"},{"family":"Bock","given":"Tanja"},{"family":"Berndt","given":"Jan Ole"},{"family":"Beierle","given":"Christoph"}],"citation-label":"timm2018intentional","collection-editor":[],"collection-title":"","container-author":[],"container-title":"KI 2018: Advances in Artificial Intelligence - 41st German Conference\n               on AI, Berlin, Germany, September 24-28, 2018, Proceedings","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"7352b75474f656e89aedb8f5b58b6caestaab","interhash":"ee1920cee453167377d90c2038720383","intrahash":"7352b75474f656e89aedb8f5b58b6cae","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-3-030-00111-7\\_30"},"note":"","number":"","number-of-pages":"8","page":"357--365","page-first":"357","publisher":"","publisher-place":"","status":"","title":"Intentional Forgetting in Artificial Intelligence Systems: Perspectives\n               and Challenges","type":"paper-conference","username":"staab","version":"","volume":""},"6941ea9abdf6acf80aa4791d0b9c932astaab":{"DOI":"","ISBN":"","ISSN":"","URL":"","abstract":"","annote":"","author":[{"family":"Staab","given":"Steffen"}],"citation-label":"staab2019eyeing","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Proceedings of the 15th International Conference on Web Information\n               Systems and Technologies, WEBIST 2019, Vienna, Austria, September\n               18-20, 2019","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"6941ea9abdf6acf80aa4791d0b9c932astaab","interhash":"18bb0ddb0acc074e0894c1fefff2b395","intrahash":"6941ea9abdf6acf80aa4791d0b9c932a","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org"},"note":"","number":"","page":"5","page-first":"5","publisher":"","publisher-place":"","status":"","title":"Eyeing the Web","type":"paper-conference","username":"staab","version":"","volume":""},"483bf1daf5e6f7559ec0d1abc0ca47acstaab":{"DOI":"10.1007/978-3-030-00338-8\\_7","ISBN":"","ISSN":"","URL":"https://doi.org/10.1007/978-3-030-00338-8\\_7","abstract":"","annote":"","author":[{"family":"Janke","given":"Daniel"},{"family":"Staab","given":"Steffen"}],"citation-label":"janke2018storing","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Reasoning Web. Learning, Uncertainty, Streaming, and Scalability -\n               14th International Summer School 2018, Esch-sur-Alzette, Luxembourg,\n               September 22-26, 2018, Tutorial Lectures","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"483bf1daf5e6f7559ec0d1abc0ca47acstaab","interhash":"e7818c600bad2d9d304fb85a5090e9d8","intrahash":"483bf1daf5e6f7559ec0d1abc0ca47ac","issue":"","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1007/978-3-030-00338-8\\_7"},"note":"","number":"","number-of-pages":"49","page":"173--222","page-first":"173","publisher":"","publisher-place":"","status":"","title":"Storing and Querying Semantic Data in the Cloud","type":"paper-conference","username":"staab","version":"","volume":""},"38fe1f0c81936b90d91f3a6c6e83d162staab":{"DOI":"10.1145/3338844","ISBN":"","ISSN":"","URL":"https://doi.org/10.1145/3338844","abstract":"","annote":"","author":[{"family":"Menges","given":"Raphael"},{"family":"Kumar","given":"Chandan"},{"family":"Staab","given":"Steffen"}],"citation-label":"menges2019improving","collection-editor":[],"collection-title":"","container-author":[],"container-title":"ACM Trans. Comput. Hum. Interact.","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"38fe1f0c81936b90d91f3a6c6e83d162staab","interhash":"35320a23323632151b9fca248dbd4ea4","intrahash":"38fe1f0c81936b90d91f3a6c6e83d162","issue":"6","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"@AnalyticComp AnalyticComputing imported","misc":{"bibsource":"dblp computer science bibliography, https://dblp.org","doi":"10.1145/3338844"},"note":"","number":"6","page":"37:1--37:46","page-first":"37","publisher":"","publisher-place":"","status":"","title":"Improving User Experience of Eye Tracking-Based Interaction: Introspecting\n               and Adapting Interfaces","type":"article-journal","username":"staab","version":"","volume":"26"}}