Katharina Anna Zweig

Katharina Anna Zweig
  • Prof. Dr.
  • Professor at Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau

About

148
Publications
33,831
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,701
Citations
Current institution
Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau
Current position
  • Professor
Additional affiliations
January 2003 - April 2008
University of Tübingen
Position
  • Doctorand
April 2012 - present
Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau
Position
  • Professor
September 2009 - April 2012
Heidelberg University
Position
  • Independent junior research scientist
Education
January 2003 - August 2007
University of Tübingen
Field of study
  • Theoretical Computer Science
October 1998 - October 2006
University of Tübingen
Field of study
  • Bioinformatics
April 1996 - August 2001
University of Tübingen
Field of study
  • Biochemistry

Publications

Publications (148)
Chapter
AI is a complex, multifaceted concept and is therefore hard to define because AI can refer to technological artifacts, certain methods or a scientific field that is split into many subfields and that is continuously changing and evolving. AI systems can therefore be seen as digital artifacts that require hardware and software components and that co...
Article
Full-text available
Algorithmic systems are increasingly used by state agencies to inform decisions about humans. They produce scores on risks of recidivism in criminal justice, indicate the probability for a job seeker to find a job in the labor market, or calculate whether an applicant should get access to a certain university program. In this contribution, we take...
Article
Full-text available
When considering complex systems, identifying the most important actors is often of relevance. When the system is modeled as a network, centrality measures are used which assign each node a value due to its position in the network. It is often disregarded that they implicitly assume a network process flowing through a network, and also make assumpt...
Presentation
Full-text available
Der auf dem Fachsymposium vorgestellte Abschlussbericht „ExamAI – KI Testing und Auditing. Herausforderungen, Lösungsansätze und Handlungsempfehlungen für das Testen, Auditieren und Zertifizieren von KI“ fasst die zentralen Projektergebnisse und Empfehlungen übersichtlich zusammen. Neben einer kompakten Übersicht zu den Kernaussagen aus den einzeln...
Chapter
To hold software service and platform providers accountable, it is necessary to create trustworthy, quantified evidence of problematic algorithmic decisions, e.g., by large-scale black box analyses. In this article, we summarize typical and general challenges that arise when such studies are conducted. Those challenges were encountered in multiple...
Article
Full-text available
News diversity in the media has for a long time been a foundational and uncontested basis for ensuring that the communicative needs of individuals and society at large are met. Today, people increasingly rely on online content and recommender systems to consume information challenging the traditional concept of news diversity. In addition, the very...
Technical Report
Full-text available
Anwendungsszenarien KI-Systeme im Personal- und Talentmanagement. Online unter: https://testing-ai.gi.de/fileadmin/PR/Testing-AI/ExamAI_Publikation_Anwendungsszenarien_KI_HR.pdf
Article
Full-text available
Algorithmic decision‐making (ADM) systems have come to support, pre‐empt or substitute for human decisions in manifold areas, with potentially significant impacts on individuals' lives. Achieving transparency and accountability has been formulated as a general goal regarding the use of these systems. However, concrete applications differ widely in...
Chapter
Concerns about social networks manipulating the (general) public opinion have become a recurring theme in recent years. Whether such an impact actually exists could so far only be tested to a very limited extent. Yet to guarantee the accountability of recommendation and information filtering systems, society needs to be able to determine whether th...
Preprint
Full-text available
News diversity in the media has for a long time been a foundational and uncontested basis for ensuring that the communicative needs of individuals and society at large are met. Today, people increasingly rely on online content and recommender systems to consume information challenging the traditional concept of news diversity. In addition, the very...
Preprint
Full-text available
News diversity in the media has for a long time been a foundational and uncontested basis for ensuring that the communicative needs of individuals and society at large are met. Today, people increasingly rely on online content and recommender systems to consume information challenging the traditional concept of news diversity. In addition, the very...
Article
Full-text available
Since the h-index has been invented, it is the most frequently discussed bibliometric value and one of the most commonly used metrics to quantify a researcher’s scientific output. The more it is increasingly gaining popularity to use the metric as an indication of the quality of a job applicant or an employee the more important it is to assure its...
Chapter
A network representation is a powerful abstraction of a complex system, on which a full range of readily available methods from network analysis can be applied. A network representation is suitable if indirect effects are of interest: if A has an impact on B and B has an impact on C, it is assumed that also A has an impact on C. This implies that s...
Article
As people increasingly rely on online media and recommender systems to consume information, engage in debates and form their political opinions, the design goals of online media and news recommenders have wide implications for the political and social processes that take place online and offline. Current recommender systems have been observed to pr...
Article
Full-text available
In this paper we present the results of the project “#Datenspende” where during the German election in 2017 more than 4000 people contributed their search results regarding keywords connected to the German election campaign. Analyzing the donated result lists we prove, that the room for personalization of the search results is very small. Thus the...
Chapter
Online social networks (OSNs) have become the main medium for connecting people, sharing knowledge and information, and for communication. The social connections between people using these OSNs are formed as virtual links (e.g., friendship and following connections) that connect people. These links are the heart of today’s OSNs as they facilitate a...
Article
Full-text available
Currently about 2.71 billion humans use a smartphone worldwide. Although smartphone technology has brought many advances, a growing number of scientists discuss potential detrimental effects due to excessive smartphone use. Of importance, the likely culprit to understand over-usage is not the smartphone itself, but the excessive use of applications...
Preprint
Full-text available
The field of collaborative interactive learning (CIL) aims at developing and investigating the technological foundations for a new generation of smart systems that support humans in their everyday life. While the concept of CIL has already been carved out in detail (including the fields of dedicated CIL and opportunistic CIL) and many research obje...
Chapter
Soziale Netzwerkanalyse in den späten 1960ern und frühen 1970ern beschäftigte sich unter anderem mit der Frage, in welcher Art von Kommunikationsnetzwerken eine informelle soziale Kontrolle effektiv durchgeführt wird. In seinem Artikel geht Friedkin der Frage nach, unter welchen Umständen eine solche informelle, soziale Kontrolle überhaupt durchgef...
Chapter
Ein wichtiger Teil der Netzwerkanalyse beschäftigt sich mit der Quantifizierung von Netzwerkstrukturen in großen Netzwerken, die nicht notwendigerweise soziale Netzwerke sind, sondern zum größeren Teil zu den » komplexen Netzwerke « gehören. Dabei sind die absoluten Zahlen oft wenig aussagekräftig, solange fast jeder Graph mit ähnlichen Eigenschaft...
Chapter
Handyspiele sind beliebt bei Kindern und Jugendlichen. Viele davon enthalten jedoch Mechanismen, die ganz gezielt eingesetzt werden, um die Spielzeit oder Spielhäufigkeit zu erhöhen („Aufmerksamkeitsheischer“). Andere Mechanismen erhöhen die Bereitschaft zu ‚in-App-Käufen‘ („Geldzieher“). Hier zeigen wir an zwei bekannten Handyspielen den Einsatz e...
Preprint
Full-text available
This report analyzes the Google search results from more than 1,500 volunteer data donors who, in the five weeks leading up to the federal election on September 24th, 2017, automatically searched Google for 16 predefined names of political parties and politicians every four hours. It is based on an adjusted database consisting of more than 8,000,00...
Article
Full-text available
Recently, various decisions in security-related processes are assisted by so-called algorithmic decision making (ADM) systems, e.g., for predicting recidivism rates of criminals, for assessing the risk of a person being a terrorist, or the prediction of future criminal acts (predictive policing). However, the quality of such risk assessment is depe...
Chapter
In network analysis, it is often desired to determine the most central node of a network, for example, for identifying the most influential individual in a social network. Borgatti states that almost all centrality measures assume that there exists a process moving through the network from node to node (Borgatti, Soc Netw 27(1):55–71, 2005). A node...
Conference Paper
Assessing the quality of a learner's solution for a given task is an essential step in analyzing a learner's performance. For a well-defined sequential problem, correctness and optimality of the solution as well as its length provide first simple and reasonable metrics. However, this ignores the fact that there are conceptually different errors tha...
Conference Paper
Full-text available
The academic success of individual students differs widely and it depends on various factors, ranging from financial to social and to health aspects. In this article, we propose a concept for a novel productivity tracking system that provides the basis for a self-assessment of academic behaviour and that can be used by students to support their aca...
Technical Report
Full-text available
Unser erster Zwischenbericht hat gezeigt, dass unsere Datenspenderinnen und -spender auf Googles allgemeiner Suchmaschine im Durchschnitt sehr viele Links gemeinsam in ihren Suchergebnissen sehen. Wir kamen daher zu dem Schluss, dass für eine algorithmisch erzeugte oder vertiefende „Filterblase“ nach Eli Parisers Theorie nicht viel Raum sei. Die Th...
Research
Full-text available
Dieses Arbeitspapier erklärt, wie algorithmische Entscheidungssysteme entwickelt und in einen gesellschaftlichen Kontext eingebettet werden, und zeigt dabei potenziell auftauchende Fehlerquellen auf. Nach einem einleitenden Teil, in dem die Begriffe Algorithmus und Entscheidungssystem näher definiert werden, beschreibt das Papier den Entwicklungs-...
Conference Paper
While network analysis is more than 70 years old, the analysis of paths in complex networks is yet almost negligible. Here, we introduce different measures of computing the pairwise similarity of paths, either simply based on the elements in the paths, their sequence, on the graph in which they are embedded, or incorporating all three features. Bas...
Conference Paper
In many networks, different centrality indices reveal conflicting rankings of the nodes. The problem is worsened, if the same nodes occur in different but related network layers, i.e., in multiplex networks. The main concern in the analysis of multiplex networks is maintaining the inherent nature of multiple layers in the explorations. Therefore, i...
Article
In the age of data deluge, more data is generated at every moment than can be processed. It is a core challenge of tomorrow’s data centers to manage the floods of post or news in social media, products in online shops, or videos posted on video platforms. Besides classic search algorithms, recommendation systems are one promising approach for pre-s...
Technical Report
Full-text available
Google-Suchergebnislisten zu prominenten Politikern weisen im Wesentlichen sehr hohe Ähnlichkeit auf. Im Durchschnitt 7 bis 8 der Ergebnisse von im Mittel 9 der sogenannten organischen Suchergebnisse unterscheiden sich unter den Nutzern des Datenspendeprojekts nicht. Das ist ein Hinweis darauf, dass Personalisierung durch Suchmaschinen eine geri...
Article
Full-text available
Online social networks (OSNs) have become the main medium for connecting people, sharing knowledge and information, and for communication. The social connections between people using these OSNs are formed as virtual links (e.g., friendship and following connections) that connect people. These links are the heart of today's OSNs as they facilitate a...
Article
Die Wahl des Präsidenten der Vereinigten Staaten von Amerika im Jahr 2016 wurde von hitzigen Diskussionen um mögliche Manipulationen der Bevölkerung und ihrer Meinungsbildung begleitet. Insbesondere wendeten sich diese Manipulationsvorwürfe gegen die sozialen Medien und auch gegen Google: Vor der Wahl wurden viele Stimmen laut, die behaupteten: ,,G...
Article
In diesem Artikel geben wir eine grundlegende Einführung in die algorithmischen Empfehlungssysteme und wie sie – unter Umständen – Filterblasen und Echokammern in sozialen Medien erzeugen könnten. Der Term Filterblase beschreibt dabei das Phänomen, dass wir von Algorithmen hauptsächlich solche Themen wieder vorgeschlagen bekommen, die wir schon mög...
Conference Paper
Centrality rankings are classically used to analyze the influence of nodes in different types of networks. However, since most centrality indices are very sensitive to missing or additional edges and since most complex networks are based on faulty data, a precise ranking is quite unlikely to be obtained. Thus, in this paper we propose to use an ass...
Article
Full-text available
Forest fragmentation and climate change are among the most severe and pervasive forms of human impact. Yet, their combined effects on plant–insect herbivore interaction networks, essential components of forest ecosystems with respect to biodiversity and functioning, are still poorly investigated, particularly in temperate forests. We addressed this...
Conference Paper
Full-text available
The dynamics of online social networks (OSNs) involves a complicated mixture of growth and decay. In the last decade, many online social networks, like MySpace and Orkut, suffered from decay until they were too small to sustain themselves. Thus, understanding this decay process is crucial for many scenarios that include: (1) Engineering a resilient...
Article
Der große wissenschaftliche Reiz an Big Data ist zum einen die bis dahin nicht vorhandene Möglichkeit einer umfassenden Beschreibung aller möglichen sozio-technischen Strukturen und gesellschaftlichen Prozesse (Chandler 2015). Zum anderen ist, über die bloße Beschreibung hinaus, gerade die Aussicht auf die Ermittlung von Zusammenhängen zwischen die...
Chapter
Network analysis relies strongly on network models for several reasons: they show that a certain structure can be generated by a set of simple rules, they predict certain behaviors and functions, and they can be used as null-models. In this chapter, the question discussed is whether the classic network models are likely to be explanatory network mo...
Chapter
This chapter discusses ethical aspects of network analysis and the connection to network analysis literacy.
Chapter
In this chapter, I mainly discuss the hypothesis-driven approach of network analysis in which a hypothesis about the function and behavior of a complex system is tested by analyzing the structure of a complex network derived from the complex system of interest. This requires a meaningful, context-related interpretation of the values of structural m...
Chapter
The last chapter has shown that there are different problems concerning the data itself and the definition of the set of entities represented in the network. In this chapter various fallacies with respect to the relations represented in a network are discussed.
Chapter
Given a graph G, there are a number of global statistics besides the number n of nodes and the number m of edges whose values are classically reported to provide readers with a first impression of the structure of the graph. In this chapter various measures are described, such as the average clustering coefficient, reciprocity and transitivity, con...
Chapter
Chapter 5 (“Network representations of complex systems”) summarized general aspects of how to represent a set of nodes and relationships in a complex network. In this and the following chapters, various fallacies in this process are discussed, which impair the interpretability of the results. This chapter concentrates on general problems with the d...
Chapter
Network analysis provides a versatile framework for modeling complex systems and because of its universal applicability it has been invented and rediscovered in many different disciplines. Each of these disciplines enriches the field by providing its own perspective and its own approaches; the three most prominent disciplines in the area are sociol...
Chapter
The goal of any network representation of complex relational data is to apply measures to the resulting graph whose results can then be used to identify significant patterns in the data. While many software tools make these methods readily available to apply them to any given graph, it is important to understand the mathematical equations computed...
Chapter
In the last chapter, a qualitative comparison of various real-world structures with classic random graph models revealed that complex networks are non-random in many aspects. This chapter focuses on the question of how to quantify the statistical significance of an observed network structure with respect to a given random graph model. The chapter s...
Chapter
Network analysis starts with the available data on relationships between entities of the complex system to observe. In this chapter, the main modeling decisions to turn a raw data set into a complex network are discussed.
Chapter
Centrality indices quantify the importance of a node in a given network, which is often identified with the importance of the corresponding entity in the complex system modeled by the network. As the perceived importance is dependent on the kind of network to be analyzed, different centrality indices have been proposed over the years. This chapter...
Chapter
One of the most important concepts in network analysis is to understand the structure of a given graph with respect to a set of suitably randomized graphs, a so-called random graph model. Structures which are found to be significantly different from those expected in the random graph model require a new random graph model which exemplifies how the...
Chapter
This chapter provides all necessary definitions to understand network analytic methods. This chapter can be used as a glossary whenever a term is unclear in the main text; as the readership is intended to be very diverse, here all necessary definitions are discussed in detail. It may thus be skipped upon first reading and referred to if basic notio...
Chapter
The last chapter has shown that “smallness” of a network is eventually a rather unsurprising feature that can be generated by very different network generating mechanisms—actually, smallness is hard to avoid. In that light, “largeness” as a much more surprising feature can be expected to be either functional or caused by constraints that are import...
Chapter
The first chapter of the book gives a short overview of what network analysis does and why it is considered to be a vital part of complex system science : the network analytic framework allows to represent the interaction structure of a complex system as a complex network. The network’s structure can then be analyzed by the application of several s...
Article
Full-text available
Real-world network data is often very noisy and contains erroneous or missing edges. These superfluous and missing edges can be identified statistically by assessing the number of common neighbors of the two incident nodes. To evaluate whether this number of common neighbors, the so-called co-occurrence, is statistically significant, a comparison w...
Article
Full-text available
Online social networks represent a main source of communication and information exchange in today's life. They facilitate exquisitely news sharing, knowledge elicitation, and forming groups of same interests. Researchers in the last two decades studied the growth dynamics of the online social networks extensively questing a clear understanding of t...
Conference Paper
To understand a node's centrality in a multiplex network, its centrality values in all the layers of the network can be aggregated. This requires a normalization of the values, to allow their meaningful comparison and aggregation over networks with different sizes and orders. The concrete choices of such preprocessing steps like normalization and a...
Article
Full-text available
To identify so-called network motifs, the fixed degree sequence model (fdsm) is usually used. For any real-world network, the fdsm is defined as the set of all graphs with the same degree sequence that do not have multiple edges between nodes or self-loops. A subgraph is called a network motif if it occurs statistically significantly often compared...
Article
Full-text available
To understand a node's centrality in a multiplex network, its centrality values in all the layers of the network can be aggregated. This requires a normalization of the values, to allow their meaningful comparison and aggregation over networks with different sizes and orders. The concrete choices of such preprocessing steps like normalization and a...
Article
Full-text available
Many large network data sets are noisy and contain links representing low-intensity relationships that are difficult to differentiate from random interactions. This is especially relevant for high-throughput data from systems biology, large-scale ecological data, but also for Web 2.0 data on human interactions. In these networks with missing and sp...
Article
This article discusses the question of whether word-adjacency relationships are well-represented by a complex network. The main hypothesis of this work is that network representations are best suited to analyze indirect effects. For an indirect effect to occur in a network, a network process needs to exist that uses the network to exert an indirect...
Book
This book presents a perspective of network analysis as a tool to find and quantify significant structures in the interaction patterns between different types of entities. Moreover, network analysis provides the basic means to relate these structures to properties of the entities. It has proven itself to be useful for the analysis of biological and...
Conference Paper
Full-text available
Active learning (AL) is a machine learning paradigm where an active learner has to train a model (e.g., a classifier) which is in principle trained in a supervised way. AL has to be done by means of a data set where a low fraction of samples (also termed data points or observations) are labeled. To obtain labels for the unlabeled samples, the activ...
Book
The aim of this book is to collect and to cluster research areas in the field of serious games and entertainment computing. It provides an introduction and gives guidance for the next generation of researchers in this field. The 18 papers presented in this volume, together with an introduction, are the outcome of a GI-Dagstuhl seminar which was hel...
Conference Paper
This paper focuses on the suitability of three different null-models to motif analysis that all get as an input a desired degree sequence. A graph theoretic null-model is defined as a set of graphs together with a probability function. Here we discuss the configuration model, as the simplest model; a variant of the configuration model where multi-e...
Conference Paper
Real-world network data is often very noisy and contains erroneous or missing edges. These superfluous and missing edges can be identified statistically by assessing the number of common neighbors of the two incident nodes. To evaluate whether this number of common neighbors, the so called co-occurrence, is statistically significant, a comparison w...
Article
Full-text available
Chat-log data that contains information about sender and receiver of the statements sent around in the chat can be readily turned into a directed temporal multi-network representation. In the resulting network, the activity of a chat member can, for example, be operationalized as his degree (number of distinct interaction partners) or his strength...
Conference Paper
Complex graphs are at the heart of today’s big data chal- lenges like recommendation systems, customer behavior mod- eling, or incident detection systems. One reoccurring task in these fields is the extraction of network motifs, reoccur- ring and statistically significant subgraphs. In this work we propose a precisely tailored embedded architecture...
Article
When a structural characteristic of a network is measured, the observed value needs to be compared to its expected value in a random graph model to assess the statistical significance of its occurrence. The random graph model with which the observed graph is compared is chosen to be structurally similar to the real-world network in some aspects and...
Article
Full-text available
Die Gesellschaft für Informatik e. V. (GI) hat sich in den letzten Jahren gewandelt und viele der neuen Aktionen haben positive Resonanz bei Mitgliedern und auch außerhalb der GI erzeugt. Nun wird es Zeit, dass die GI das Potenzial an Mitgliedern nutzt, das in Deutschland zur Verfügung steht. 20.000 derzeitige Mitglieder sind nicht wenig, aber nur...
Conference Paper
We report on the current state of the art of social network analysis based on the enormous datasets that exist in massive multiplayer online games and multiplayer online arena games. At least since the rise of World Of Warcraft as a massive multiplayer online game, the online gaming world is slowly becoming a center of attention for game developers...
Conference Paper
Serious Games research has become an active research topic in the recent years. In order to design Serious Games with an appropriate degree of complexity such that the games are neither boring nor frustrating, it is necessary to have a good understanding of the factors that determine the difficulty of a game. The present work is based on the idea t...
Conference Paper
Complex graphs are at the heart of today’s big data chal- lenges like recommendation systems, customer behavior mod- eling, or incident detection systems. One reoccurring task in these fields is the extraction of network motifs, reoccur- ring and statistically significant subgraphs. In this work we propose a precisely tailored embedded architecture...
Conference Paper
Full-text available
Many complex network systems suffer from noise that disguises the structure of the network and hinders an accurate analysis of these systems. Link assessment is the process of identifying and eliminating the noise from network systems in order to better understand these systems. In this paper, we address the link assessment problem in social networ...
Conference Paper
Full-text available
Chat-log data is a little used resource for analyzing human communication in social networks. Some statements in this data do not include the intended username of a receiver or any variant of it, and thus are termed " misaddressed statements ". Constructing social networks from such a semi-structured data and subsequent analyzing require a reliable...
Article
Complex network analysis is concerned with identifying statistically significant patterns in large and complex networks. A complex network is an abstract model of a complex system; it represents a well-chosen set of entities as nodes and one or more types of relationships between them as edges. Methods from complex network analysis have been used t...
Book
Socioinformatics is a new scientific approach to study the interactions between humans and IT. These proceedings are a collection of the contributions during a workshop of the Gesellschaft für Informatik (GI). Researchers in this emerging field discuss the main aspects of interactions between IT and humans with respect to; social connections, socia...
Article
A bipartite structure is a common property of many real-world network data sets such as agents which are affiliated with societies, customers who buy, rent, or rate products, and authors who write scientific papers. The one-mode projection of these networks onto either set of entities (e.g., societies, products, and articles) is a well-established...
Article
Full-text available
Recent development of high-throughput, multiplexing technology has initiated projects that systematically investigate interactions between two types of components in biological networks, for instance transcription factors and promoter sequences, or microRNAs (miRNAs) and mRNAs. In terms of network biology, such screening approaches primarily attemp...
Article
Full-text available
Interactions between various types of molecules that regulate crucial cellular processes are extensively investigated by high-throughput experiments and require dedicated computational methods for the analysis of the resulting data. In many cases, this data can be represented as a bipartite graph because it describes interactions between elements o...
Article
The question of how humans learn to navigate in a new environment has mainly been studied in geographically embedded environments. Next to navigation in these concrete networks, people also need to understand and navigate abstract networks like those which connect concepts with each other. With a simple game the author and colleagues analyzed how h...
Chapter
Could online social networks like Facebook be used to infer relationships between non-members? We show that the combination of relationships between members and their e-mail contacts to non-members provides enough information to deduce a substantial proportion of the relationships between non-members. Using structural features we are able to predic...
Conference Paper
The recent interest in network analysis is caused by the unprecedented accessibility to large datasets: there are huge, publicly available databases on protein-protein-interactions, air transportation, and street maps which easily lend themselves to a network representation. Once a network is created, all types of path-based network analytic measur...
Conference Paper
Several important social network data sets have an inherent bipartite structure: for example, agents are affiliated with societies, authors write articles, customers buy, rent, or rate products. One commonly used network analytic approach to their analysis involves projecting them, i.e., deducing relations between actors of the same type (e.g. soci...
Article
Full-text available
In this article we show that it can be easily inferred whether two NON-members of a social network platform are related to each other if they have enough friends on the platform that open their email-address book to the platform.
Article
Full-text available
Members of social network platforms often choose to reveal private information, and thus sacrifice some of their privacy, in exchange for the manifold opportunities and amenities offered by such platforms. In this article, we show that the seemingly innocuous combination of knowledge of confirmed contacts between members on the one hand and their e...
Article
Full-text available
The EGFR-driven cell-cycle pathway has been extensively studied due to its pivotal role in breast cancer proliferation and pathogenesis. Although several studies reported regulation of individual pathway components by microRNAs (miRNAs), little is known about how miRNAs coordinate the EGFR protein network on a global miRNA (miRNome) level. Here, we...
Article
We have considered a simple word game called the word-morph. After making our participants play a stipulated number of word-morph games, we have analyzed the experimental data. We have given a detailed analysis of the learning involved in solving this word game. We propose that people are inclined to learn landmarks when they are asked to navigate...
Article
"Campus-Report" heißt die Radiosendung der Universitäten Heidelberg, Mannheim, Karlsruhe und Freiburg. Die Reportagen über aktuelle Themen aus Forschung und Wissenschaft werden montags bis freitags jeweils um ca. 19.10h im Programm von Radio Regenbogen gesendet. (Empfang in Nordbaden: UKW 102,8. In Mittelbaden: 100,4 und in Südbaden: 101,1) Uni-Rad...
Article
"Campus-Report" heißt die Radiosendung der Universitäten Heidelberg, Mannheim, Karlsruhe und Freiburg. Die Reportagen über aktuelle Themen aus Forschung und Wissenschaft werden montags bis freitags jeweils um ca. 19.10h im Programm von Radio Regenbogen gesendet. (Empfang in Nordbaden: UKW 102,8. In Mittelbaden: 100,4 und in Südbaden: 101,1) Uni-Rad...
Article
"Campus-Report" heißt die Radiosendung der Universitäten Heidelberg, Mannheim, Karlsruhe und Freiburg. Die Reportagen über aktuelle Themen aus Forschung und Wissenschaft werden montags bis freitags jeweils um ca. 19.10h im Programm von Radio Regenbogen gesendet. (Empfang in Nordbaden: UKW 102,8. In Mittelbaden: 100,4 und in Südbaden: 101,1) Uni-Rad...

Questions

Questions (2)
Question
I actually think that the answer is yes more often than it is not and I would love to hear your stories. I am especially thinking of "data analysis" with mathematical tools like statistics or network analysis. While the mathematics itself is clearly objective, I argue that often the CHOICE of a mathematical framework, a statistical test, a chosen normalization factor, or similar is where subjectivity comes into play. For statistics, this is a well known fact, with many publications like the famous book by Darrell Huff: "How to lie with statistics". Another point where subjectivity is a big part is in data preparation: what exactly was observed, what is taken into the (data) model, is there a threshold applied to the data to remove spurious data, etc. So, pure mathematic like number theory or graph theory is certainly as objective as it can be. Where is the border line? Tell us your stories of "Subjective math in research".
Question
There are some complicated algorithms for the all-pairs shortest-paths problem, and I am looking for a recent review on everything there is or pointers to "recent" papers on that. I have found some from the 90s that seemed to be quite complicated. Any hints?

Network

Cited By