scispace - formally typeset
Search or ask a question
Institution

Technische Universität Darmstadt

EducationDarmstadt, Germany
About: Technische Universität Darmstadt is a education organization based out in Darmstadt, Germany. It is known for research contribution in the topics: Computer science & Context (language use). The organization has 17316 authors who have published 40619 publications receiving 937916 citations. The organization is also known as: Darmstadt University of Technology & University of Darmstadt.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors investigated several models in the literature for near-incompressibility based on invariants in terms of polyconvexity and coerciveness inequality, which are sufficient to guarantee the existence of a solution.

321 citations

Journal ArticleDOI
TL;DR: In this paper, a systematic literature review shows that many highly cited sensitivity analysis methods fail to properly explore the space of the input factors, leading to a worrying lack of standards and recognized good practices.
Abstract: Sensitivity analysis provides information on the relative importance of model input parameters and assumptions. It is distinct from uncertainty analysis, which addresses the question ‘How uncertain is the prediction?’ Uncertainty analysis needs to map what a model does when selected input assumptions and parameters are left free to vary over their range of existence, and this is equally true of a sensitivity analysis. Despite this, many uncertainty and sensitivity analyses still explore the input space moving along one-dimensional corridors leaving space of the input factors mostly unexplored. Our extensive systematic literature review shows that many highly cited papers (42% in the present analysis) fail the elementary requirement to properly explore the space of the input factors. The results, while discipline-dependent, point to a worrying lack of standards and recognized good practices. We end by exploring possible reasons for this problem, and suggest some guidelines for proper use of the methods.

321 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide an answer to the question "How Were the Elements from Iron to Uranium Made?" (Abridged) by combining new results and important breakthroughs in the related nuclear, atomic and astronomical fields of science.
Abstract: The production of about half of the heavy elements found in nature is assigned to a specific astrophysical nucleosynthesis process: the rapid neutron capture process (r-process). Although this idea has been postulated more than six decades ago, the full understanding faces two types of uncertainties/open questions: (a) The nucleosynthesis path in the nuclear chart runs close to the neutron-drip line, where presently only limited experimental information is available, and one has to rely strongly on theoretical predictions for nuclear properties. (b) While for many years the occurrence of the r-process has been associated with supernovae, more recent studies have cast substantial doubts on this environment. Alternative scenarios include the mergers of neutron stars, neutron-star black hole mergers, but possibly also rare classes of supernovae as well as hypernovae/collapsars with polar jet ejecta and also accretion disk outflows related to the collapse of fast rotating massive stars with high magnetic fields. Stellar r-process abundance observations, have provided insights into, and constraints on the frequency of and conditions in the responsible stellar production sites. One of them, neutron star mergers, was just identified and related to the Gravitational Wave event GW170817. High resolution observations, increasingly more precise due to improved experimental atomic data, have been particularly important in defining the heavy element abundance patterns of the old halo stars, and thus determining the extent, and nature, of the earliest nucleosynthesis in our Galaxy. Combining new results and important breakthroughs in the related nuclear, atomic and astronomical fields of science, this review attempts to provide an answer to the question "How Were the Elements from Iron to Uranium Made?" (Abridged)

321 citations

Journal ArticleDOI
01 Apr 2002
TL;DR: In this paper, the authors demonstrate the feasibility of quantification of the ferrous/ferric ratio in minerals by analyzing the Fe L====== 23====== ELNES as a function of the Ferric iron concentration.
Abstract: Determination of Fe3+/ΣFe in minerals at submicrometre scale has been a long-standing objective in analytical mineralogy. Detailed analysis of energy-loss near-edge structures (ELNES) of the Fe L 23 core-loss edges recorded in a transmission electron microscope (TEM) provides chemical information about the iron oxidation state. The valence-specific multiplet structures are used as valence fingerprints. Systematic investigations on the Fe L 23 ELNES of mono and mixed-valence Fe-bearing natural minerals and synthetic solid solutions of garnets (almandine-skiagite and andradite-skiagite), pyroxenes (acmite-hedenbergite) and spinels (magnetite-hercynite) are presented where the presence of multiple valence states is distinguished by a splitting of the Fe L 3 edge. We demonstrate the feasibility of quantification of the ferrous/ferric ratio in minerals by analyzing the Fe L 23 ELNES as a function of the ferric iron concentration resulting in three independent methods: (1) The method of the modified integral intensity ratio of the Fe L 23 white lines employs two 2-eV-wide integration windows centring around both the Fe L 3 maximum for Fe3+ and the Fe L 2 maximum for Fe2+. This refined routine, compared to the previously published quantification method of the ferrous/ferric ratio in minerals, leads to an improved universal curve with acceptable absolute errors of about ±0.03 to ±0.04 for Fe3+/ΣFe ratios. (2) The second method uses a simple mathematical description of the valence-dependent splitting of Fe L 3 ELNES by fitting several Gaussian functions and an arctan function. The systematic analysis of the integral portions of the individual Gaussian curves for different mineral groups provides a further Fe3+/ΣFe quantification method with an absolute error of about ±0.02 to ±0.03. (3) The Fe L 3 ELNES can also be modelled with the help of reference spectra, whereby the Fe3+/ΣFe ratio can be determined with an absolute error of ca. ±0.02.

321 citations

Proceedings Article
20 Aug 2014
TL;DR: This paper provides the first comprehensive security analysis of various CFI solutions, and shows that with bare minimum assumptions, turing-complete and real-world ROP attacks can still be launched even when the strictest of enforcement policies is in use.
Abstract: Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been extensively used to exploit bugs in modern software programs (eg, web browsers and PDF readers) ROP attacks require no code injection, and have already been shown to be powerful enough to bypass fine-grained memory randomization (ASLR) defenses To counter this ingenious attack strategy, several proposals for enforcement of (coarse-grained) control-flow integrity (CFI) have emerged The key argument put forth by these works is that coarse-grained CFI policies are sufficient to prevent ROP attacks As this reasoning has gained traction, ideas put forth in these proposals have even been incorporated into coarse-grained CFI defenses in widely adopted tools (eg, Microsoft's EMET framework) In this paper, we provide the first comprehensive security analysis of various CFI solutions (covering kBouncer, ROPecker, CFI for COTS binaries, ROP-Guard, and Microsoft EMET 41) A key contribution is in demonstrating that these techniques can be effectively undermined, even under weak adversarial assumptions More specifically, we show that with bare minimum assumptions, turing-complete and real-world ROP attacks can still be launched even when the strictest of enforcement policies is in use To do so, we introduce several new ROP attack primitives, and demonstrate the practicality of our approach by transforming existing real-world exploits into more stealthy attacks that bypass coarse-grained CFI defenses

320 citations


Authors

Showing all 17627 results

NameH-indexPapersCitations
Yang Gao1682047146301
Herbert A. Simon157745194597
Stephen Boyd138822151205
Jun Chen136185677368
Harold A. Mooney135450100404
Bernt Schiele13056870032
Sascha Mehlhase12685870601
Yuri S. Kivshar126184579415
Michael Wagner12435154251
Wolf Singer12458072591
Tasawar Hayat116236484041
Edouard Boos11675764488
Martin Knapp106106748518
T. Kuhl10176140812
Peter Braun-Munzinger10052734108
Network Information
Related Institutions (5)
Karlsruhe Institute of Technology
82.1K papers, 2.1M citations

96% related

École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

94% related

RWTH Aachen University
96.2K papers, 2.5M citations

94% related

ETH Zurich
122.4K papers, 5.1M citations

94% related

Georgia Institute of Technology
119K papers, 4.6M citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023135
2022624
20212,462
20202,585
20192,609
20182,493