PUMA publications for /user/jaeschke/computerhttps://puma.uni-kassel.de/user/jaeschke/computerPUMA RSS feed for /user/jaeschke/computer2024-03-29T15:39:07+01:00DBLP: some lessons learnedhttps://puma.uni-kassel.de/bibtex/2bb968ff4ba9ae93bc80ba05d16a98ff4/jaeschkejaeschke2012-11-12T08:40:42+01:00analysis author bibliography citation computer dblp entity extraction identification ie information named resolution science <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Michael Ley" itemprop="url" href="/author/Michael%20Ley"><span itemprop="name">M. Ley</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Proceedings of the VLDB Endowment</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">2 </span></span>(<span itemprop="issueNumber">2</span>):
<span itemprop="pagination">1493--1500</span></em> </span>(<em><span>August 2009<meta content="August 2009" itemprop="datePublished"/></span></em>)Mon Nov 12 08:40:42 CET 2012Proceedings of the VLDB Endowmentaug21493--1500DBLP: some lessons learned22009analysis author bibliography citation computer dblp entity extraction identification ie information named resolution science The DBLP Computer Science Bibliography evolved from an early small experimental Web server to a popular service for the computer science community. Many design decisions and details of the public XML-records behind DBLP never were documented. This paper is a review of the evolution of DBLP. The main perspective is data modeling. In DBLP persons play a central role, our discussion of person names may be applicable to many other data bases. All DBLP data are available for your own experiments. You may either download the complete set, or use a simple XML-based API described in an online appendix.Development of computer science disciplines: a social network analysis approachhttps://puma.uni-kassel.de/bibtex/28ae08cacda75da80bfa5604cfce48449/jaeschkejaeschke2012-06-28T14:41:21+02:00analysis computer network science scientometrics sna social <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Manh Pham" itemprop="url" href="/author/Manh%20Pham"><span itemprop="name">M. Pham</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Ralf Klamma" itemprop="url" href="/author/Ralf%20Klamma"><span itemprop="name">R. Klamma</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Matthias Jarke" itemprop="url" href="/author/Matthias%20Jarke"><span itemprop="name">M. Jarke</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Social Network Analysis and Mining</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">1 </span></span>(<span itemprop="issueNumber">4</span>):
<span itemprop="pagination">321--340</span></em> </span>(<em><span>2011<meta content="2011" itemprop="datePublished"/></span></em>)Thu Jun 28 14:41:21 CEST 2012WienSocial Network Analysis and Mining4321--340Development of computer science disciplines: a social network analysis approach12011analysis computer network science scientometrics sna social In contrast to many other scientific disciplines, computer science considers conference publications. Conferences have the advantage of providing fast publication of papers and of bringing researchers together to present and discuss the paper with peers. Previous work on knowledge mapping focused on the map of all sciences or a particular domain based on ISI published Journal Citation Report (JCR). Although this data cover most of the important journals, it lacks computer science conference and workshop proceedings, which results in an imprecise and incomplete analysis of the computer science knowledge. This paper presents an analysis on the computer science knowledge network constructed from all types of publications, aiming at providing a complete view of computer science research. Based on the combination of two important digital libraries (DBLP and CiteSeerX), we study the knowledge network created at journal/conference level using citation linkage, to identify the development of sub-disciplines. We investigate the collaborative and citation behavior of journals/conferences by analyzing the properties of their co-authorship and citation subgraphs. The paper draws several important conclusions. First, conferences constitute social structures that shape the computer science knowledge. Second, computer science is becoming more interdisciplinary. Third, experts are the key success factor for sustainability of journals/conferences.Computing Machinery and Intelligencehttps://puma.uni-kassel.de/bibtex/2c6b8db241dec2cec3477ce771abebb8f/jaeschkejaeschke2012-06-19T15:41:05+02:00ai computer intelligence mind turing <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="A. M. Turing" itemprop="url" href="/author/A.%20M.%20Turing"><span itemprop="name">A. Turing</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Mind</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">59 </span></span>(<span itemprop="issueNumber">236</span>):
<span itemprop="pagination">433--460</span></em> </span>(<em><span>1950<meta content="1950" itemprop="datePublished"/></span></em>)Tue Jun 19 15:41:05 CEST 2012Mind236433--460New SeriesComputing Machinery and Intelligence591950ai computer intelligence mind turing Mapping Community Engagement with Urban Crowd-Sourcinghttps://puma.uni-kassel.de/bibtex/2f0a69ac56b94a471b470ebd56545fafd/jaeschkejaeschke2012-04-26T11:35:36+02:00community computer crowdsourcing sensing social urban <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Desislava Hristova" itemprop="url" href="/author/Desislava%20Hristova"><span itemprop="name">D. Hristova</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Afra Mashhadi" itemprop="url" href="/author/Afra%20Mashhadi"><span itemprop="name">A. Mashhadi</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Giovanni Quattrone" itemprop="url" href="/author/Giovanni%20Quattrone"><span itemprop="name">G. Quattrone</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Licia Capra" itemprop="url" href="/author/Licia%20Capra"><span itemprop="name">L. Capra</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Proc. When the City Meets the Citizen Workshop (WCMCW)</span>, </em></span>(<em><span>Juni 2012<meta content="Juni 2012" itemprop="datePublished"/></span></em>)Thu Apr 26 11:35:36 CEST 2012Proc. When the City Meets the Citizen Workshop (WCMCW)junMapping Community Engagement with Urban Crowd-Sourcing2012community computer crowdsourcing sensing social urban Communities of people are better mappers if they are spatially clustered, as revealed in an interesting new paper by Hristova, Mashhadi, Quattrone and Capra from UCL. "This preliminary analysis inspires further inquiry because it shows a clear correlation between spatial affiliation, the internal community structure and the community’s engagement in terms of coverage", according to the authors. They have studied the similarity patterns among eight hundred contributors to OpenStreetMap, the well-known crowdmapping project and detected the hidden community structure. It is a very promising field of research, coupling a social network analysis of crowdsourced data. Participants to such projects are rarely independent individuals: in most cases, they involve communities more than single participants and it would be crucial to uncover how the underlying social structure reflects on the quantity and the quality of the collected data. It has the greatest relevance for citizen science projects, as data quality is often the key issue determining the success or the failure of the collective effort. Combinatorial Algorithmshttps://puma.uni-kassel.de/bibtex/2481baec64f095b2555e780614e5c8f13/jaeschkejaeschke2011-03-10T11:45:32+01:00algorithm combinatorics computer knuth programming taocp <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Donald E. Knuth" itemprop="url" href="/author/Donald%20E.%20Knuth"><span itemprop="name">D. Knuth</span></a></span>. </span><em>The Art of Computer Programming </em><em><span itemprop="publisher">Addison-Wesley Professional</span>, </em>(<em><span>Januar 2011<meta content="Januar 2011" itemprop="datePublished"/></span></em>)Thu Mar 10 11:45:32 CET 2011janThe Art of Computer ProgrammingCombinatorial Algorithms4A2011algorithm combinatorics computer knuth programming taocp Concrete Mathematics: A Foundation for Computer Sciencehttps://puma.uni-kassel.de/bibtex/2ccef670ef39186763ecd379d2cca1e0a/jaeschkejaeschke2008-04-23T10:18:06+02:00computer knuth latex math science <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Ronald L. Graham" itemprop="url" href="/author/Ronald%20L.%20Graham"><span itemprop="name">R. Graham</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Donald E. Knuth" itemprop="url" href="/author/Donald%20E.%20Knuth"><span itemprop="name">D. Knuth</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Oren Patashnik" itemprop="url" href="/author/Oren%20Patashnik"><span itemprop="name">O. Patashnik</span></a></span>. </span><em><span itemprop="publisher">Addison-Wesley</span>, </em><em>Reading, </em>(<em><span>1989<meta content="1989" itemprop="datePublished"/></span></em>)Wed Apr 23 10:18:06 CEST 2008ReadingConcrete Mathematics: A Foundation for Computer Science1989computer knuth latex math science Mechanizing Proof:
Computing, Risk, and Trusthttps://puma.uni-kassel.de/bibtex/23ea6b663f1ba9a440b352c887e1173cf/jaeschkejaeschke2007-07-20T11:25:34+02:00computer computing history math proof risk toread trust <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Donald MacKenzie" itemprop="url" href="/author/Donald%20MacKenzie"><span itemprop="name">D. MacKenzie</span></a></span>. </span><em><span itemprop="publisher">The MIT Press</span>, </em>(<em><span>Oktober 2001<meta content="Oktober 2001" itemprop="datePublished"/></span></em>)Fri Jul 20 11:25:34 CEST 2007OctoberMechanizing Proof:
Computing, Risk, and Trust2001computer computing history math proof risk toread trust Most aspects of our private and social lives -- our safety, the integrity of the financial system, the functioning of utilities and other services, and national security -- now depend on computing. But how can we know that this computing is trustworthy? In Mechanizing Proof, Donald MacKenzie addresses this key issue by investigating the interrelations of computing, risk, and mathematical proof over the last half century from the perspectives of history and sociology. His discussion draws on the technical literature of computer science and artificial intelligence and on extensive interviews with participants.
MacKenzie argues that our culture now contains two ideals of proof: proof as traditionally conducted by human mathematicians, and formal, mechanized proof. He describes the systems constructed by those committed to the latter ideal and the many questions those systems raise about the nature of proof. He looks at the primary social influence on the development of automated proof -- the need to predict the behavior of the computer systems upon which human life and security depend -- and explores the involvement of powerful organizations such as the National Security Agency. He concludes that in mechanizing proof, and in pursuing dependable computer systems, we do not obviate the need for trust in our collective human judgment.social history of computer based proof