Isenberg, Tobias. “Incremental Inductive Verification of Parameterized Timed Systems.” Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD), 2015, pp. 1–9, doi:10.1109/ACSD.2015.13.
Wette, Philip, and Holger Karl. “HybridTE: Traffic Engineering for Very Low-Cost Software-Defined Data-Center Networks.” Proceedings of the 4th European Workshop on Software Defined Networks (EWSDN 2015), 2015, pp. 1--7, doi:10.1109/EWSDN.2015.57.
Scheideler, Christian, et al. “Towards Establishing Monotonic Searchability in Self-Stabilizing Data Structures.” Proceedings of the 19th International Conference on Principles of Distributed Systems (OPODIS), 2015, doi:10.4230/LIPIcs.OPODIS.2015.24.
Koutsopoulos, Andreas, et al. “Towards a Universal Approach for the Finite Departure Problem in Overlay Networks.” Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2015, pp. 201–16, doi:10.1007/978-3-319-21741-3_14.
Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed Locally Self-Adjusting Binary Search Trees.” Proceedings of the 9th International Workshop on Algorithms and Computation (WALCOM), 2015, pp. 175--186, doi:10.1007/978-3-319-15612-5_16.
Monien, Burkhard, and Marios Mavronicolas. “The Complexity of Pure Equilibria in Mix-Weighted Congestion Games on Parallel Links.” Information Processing Letters, vol. 115, no. 12, Elsevier, 2015, pp. 927–31, doi:10.1016/j.ipl.2015.07.012.
Becker, Matthias, et al. “Systematically Deriving Quality Metrics for Cloud Computing Systems.” Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, 2015, pp. 169--174, doi:10.1145/2668930.2688043.
Schwabe, Arne, and Holger Karl. “SynRace: Decentralized Load-Adaptive Multi-Path Routing without Collecting Statistics.” Proceedings of the 4th European Workshop on Software Defined Networks (EWSDN 2015), 2015, pp. 37–42, doi:10.1109/EWSDN.2015.58.
Gutt, Dominik, and Dennis Kundisch. “Rating Aggregation in Multi-Dimensional Rating Systems: How Do Reviewers Form Overall Ratings?” INFORMS Annual Meeting, 2015.
Brosig, Fabian, et al. “Quantitative Evaluation of Model-Driven Performance Analysis and Simulation of Component-Based Architectures.” Transactions on Software Engineering, no. 2, IEEE, 2015, pp. 157--175, doi:10.1109/TSE.2014.2362755.
Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs of Predicated Dataflow Analyses.” Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015, pp. 1729–36, doi:10.1145/2695664.2695690.
Hallmann, Corinna, and Leena Suhl. “Optimizing Water Tanks in Water Distribution Systems by Combining Network Reduction, Mathematical Optimization and Hydraulic Simulation.” OR Spectrum, Springer, 2015, pp. 1–19, doi:10.1007/s00291-015-0403-1.
Markarian, Christine, and Friedhelm Meyer auf der Heide. “Online Resource Leasing.” Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 2015, pp. 343–44, doi:10.1145/2767386.2767454.
Wiersema, Tobias, et al. “On-The-Fly Verification of Reconfigurable Image Processing Modules Based on a Proof-Carrying Hardware Approach.” Proceedings of the International Symposium in Reconfigurable Computing (ARC), 2015, pp. 365--372, doi:10.1007/978-3-319-16214-0_32.
Caragiannis, Ioannis, et al. “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure.” Transactions on Economics and Computation, vol. 3, no. 1, 2, ACM, 2015, doi:10.1145/2614687.
Blömer, Johannes, et al. “Anonymous and Publicly Linkable Reputation Systems.” Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488, doi:10.1007/978-3-662-47854-7_29.
Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” Journal of Internet Services and Applications, no. 1, Springer, 2015, pp. 1–18, doi:10.1186/s13174-015-0022-8.
Mohr, Felix. “A Metric for Functional Reusability of Services.” Proceedings of the 14th International Conference on Software Reuse (ICSR), 2015, pp. 298--313, doi:10.1007/978-3-319-14130-5_21.
Bubeck, Uwe, and Hans Kleine Büning. “Learning Boolean Specifications.” Artificial Intelligence, Elsevier, 2015, pp. 246–57, doi:10.1016/j.artint.2015.09.003.
Cox, Joe, and Daniel Kaimann. “How Do Reviews from Professional Critics Interact with Other Signals of Product Quality? Evidence from the Video Game Industry.” Journal of Consumer Behaviour, vol. 14, no. 6, Wiley Online Library, 2015, pp. 366–77, doi:10.1002/cb.1553.
Herrmann, Philipp, et al. “How Do Different Sources of the Variance of Consumer Ratings Matter?” Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, 2015.
Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, Elsevier, 2015, pp. 116–38, doi:10.1016/j.cl.2015.05.003.
Geierhos, Michaela, et al. “Filtering Reviews by Random Individual Error.” Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015), edited by Moonis Ali et al., vol. 9101, Springer, 2015, pp. 305–15, doi:10.1007/978-3-319-19066-2_30.
Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977, doi:10.1145/2786805.2803181.
Jungmann, Alexander, et al. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
Mohr, Felix, et al. “Automated Online Service Composition.” Proceedings of the 12th IEEE International Conference on Services Computing (SCC), 2015, pp. 57--64, doi:10.1109/SCC.2015.18.
Drees, Maximilian, et al. “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games.” Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT), 2015, pp. 178–89, doi:10.1007/978-3-662-48433-3_14.
Jungmann, Alexander. “On Adaptivity for Automated Composition of Service Functionality.” Proceedings of the IEEE 11th World Congress on Services (SERVICES), 2015, pp. 329--332, doi:10.1109/SERVICES.2015.57.
Mäcker, Alexander, et al. “Non-Preemptive Scheduling on Machines with Setup Times.” Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings, edited by Frank Dehne et al., 2015, pp. 542--553, doi:10.1007/978-3-319-21840-3_45.
Cord-Landwehr, Andreas, and Pascal Lenzner. “Network Creation Games: Think Global - Act Local.” Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS), 2015, pp. 248--260, doi:10.1007/978-3-662-48054-0_21.
Platenius, Marie Christin, et al. “MatchBox: A Framework for Dynamic Configuration of Service Matching Processes.” Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15), 2015, pp. 75–84, doi:10.1145/2737166.2737174.
Heindorf, Stefan, et al. “Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis.” Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15), 2015, pp. 831--834, doi:10.1145/2766462.2767804.
Li, Shouwei, et al. “Towards Flexible Demands in Online Leasing Problems.” Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON), 2015, pp. 277--288, doi:10.1007/978-3-319-21398-9_22.
Fahr, Rene, and Behnud Mir Djawadi. “‘…and They Are Really Lying’: Clean Evidence on the Pervasiveness of Cheating in Professional Contexts from a Field Experiment.” Journal of Economic Psychology, Elsevier, 2015, pp. 48–59, doi:10.1016/j.joep.2015.03.002.
John, Thomas, and Dennis Kundisch. “Why Fit Leads to Surprise: An Extension of Cognitive Fit Theory to Creative Problems.” Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, USA, 2015.
Geierhos, Michaela, et al. “What Did You Mean? Facing the Challenges of User-Generated Software Requirements.” Proceedings of the 7th International Conference on Agents and Artificial Intelligence (ICAART), Special Session on Partiality, Underspecification, and Natural Language Processing (PUaNLP 2015), edited by Stephane Loiseau et al., SciTePress - Science and Technology Publications, 2015, pp. 277–83, doi:10.5220/0005346002770283.
Monien, Burkhard, et al. “Weighted Boolean Formula Games.” The ´Festschrift´ Algorithms, Probability, Networks, and Games: Scientific Papers and Essays Dedicated to Paul G. Spirakis on the Occasion of His 60th Birthday, 2015, pp. 49–86, doi:10.1007/978-3-319-24024-4_6.
Senge, Robin, and Eyke Hüllermeier. “Fast Fuzzy Pattern Tree Learning for Classification.” IEEE Transactions on Fuzzy Systems, vol. 23, no. 6, Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 2024–33, doi:10.1109/tfuzz.2015.2396078.
Buechel, Berno, and Nils Röhl. “Robust Equilibria in Location Games.” European Journal of Operational Research, vol. 240, no. 2, Elsevier, 2015, pp. 505–17, doi:10.1016/j.ejor.2014.07.019.
Schwabe, Arne, and Holger Karl. “Topology Model to Generate Realistic Latency for Simulations.” 2015 IEEE International Conference on Communications, ICC 2015, London, United Kingdom, June 8-12, 2015, 2015, pp. 6122--6127, doi:10.1109/ICC.2015.7249298.
Peuster, Manuel, and Holger Karl. “An Architecture for Energy-Aware On-Demand Mobile Network Management.” Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges, 2015.
Monien, Burkhard, and Marios Mavronicolas. “Minimizing Expectation Plus Variance.” Theory of Computing Systems, vol. 57, no. 3, Springer, 2015, pp. 617–54, doi:10.1007/s00224-014-9542-z.
Li, Li, et al. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” 2015 International Conference on Software Engineering (ICSE), 2015, pp. 280–91.
Kenter, Tobias, et al. “Exploring Tradeoffs between Specialized Kernels and a Reusable Overlay in a Stereo-Matching Case Study.” International Journal of Reconfigurable Computing (IJRC), vol. 2015, 859425, Hindawi, 2015, doi:10.1155/2015/859425.
Damschen, Marvin, and Christian Plessl. “Easy-to-Use On-The-Fly Binary Program Acceleration on Many-Cores.” Proceedings of the 5th International Workshop on Adaptive Self-Tuning Computing Systems (ADAPT), 2015.
Damschen, Marvin, et al. “Transparent Offloading of Computational Hotspots from Binary Code to Xeon Phi.” Proceedings of the 2015 Conference on Design, Automation and Test in Europe (DATE), EDA Consortium / IEEE, 2015, pp. 1078–83, doi:10.7873/DATE.2015.1124.
Wette, Philip, et al. “MaxiNet: Distributed Emulation of Software-Defined Networks.” Proceedings of the 2014 IFIP Networking Conference (Networking 2014), 2014, pp. 1–9, doi:10.1109/IFIPNetworking.2014.6857078.
Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), edited by Ivan Lanese and Eric Madelaine, 2014, pp. 31–48, doi:10.1007/978-3-319-15317-9_3.
Wette, Philip, and Holger Karl. “Using Application Layer Knowledge in Routing and Wavelength Assignment Algorithms.” Proceedings of the IEEE International Conference on Communications 2014, 2014, pp. 3270–76, doi:10.1109/ICC.2014.6883825.
Becker, Matthias, et al. “Towards Systematic Configuration for Architecture Validation.” Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.
Jungmann, Alexander, and Bernd Kleinjohann. “Towards Context-Sensitive Service Composition for Service-Oriented Image Processing.” Proceedings of the 6th International Conference on Cloud Computing Technology and Science (CloudCom), 2014, pp. 755–58, doi:10.1109/CloudCom.2014.154.
Brangewitz, Sonja, et al. “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.” Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
Meisner, Sebastian, and Marco Platzner. “Thread Shadowing: Using Dynamic Redundancy on Hybrid Multi-Cores for Error Detection.” Proceedings of the 10th International Symposium on Applied Reconfigurable Computing (ARC), edited by Diana Goehringer et al., Springer, 2014, pp. 283–90, doi:10.1007/978-3-319-05960-0_30.
Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203, doi:10.1007/978-3-319-14130-5_14.
Keller, Matthias, et al. “Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds.” Proceedings of 7th International Conference on Utility and Cloud Computing (UCC), 2014, pp. 387--395, doi:10.1109/UCC.2014.49.
Blömer, Johannes, et al. “Tampering Attacks in Pairing-Based Cryptography.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7, doi:10.1109/FDTC.2014.10.
Blazovics, Laszlo, et al. “Surrounding Robots -- A Discrete Localized Solution for the Intruder Problem.” Journal of Advanced Computational Intelligence and Intelligent Informatics, no. 3, Fuji Technology Press Ltd., 2014, pp. 315--319, doi:10.20965/jaciii.2014.p0315.
Dräxler, Sevil, et al. “Specifying and Placing Chains of Virtual Network Functions.” Proceedings of the 3rd International Conference on Cloud Networking (CloudNet), 2014, pp. 7–13, doi:10.1109/CloudNet.2014.6968961.
Arifulina, Svetlana, et al. “SeSAME: Modeling and Analyzing High-Quality Service Compositions.” Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014), 2014, pp. 839–42, doi:10.1145/2642937.2648621.
Petrlic, Ronald, et al. “Security and Privacy Challenges in On-The-Fly Computing.” Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–42.
Janiuk, Jens, et al. “Secure Distributed Data Structures for Peer-to-Peer-Based Social Networks.” Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), 2014, pp. 396–405, doi:10.1109/CTS.2014.6867595.
Brinkmann, Andre, et al. “Scheduling Shared Continuous Resources on Many-Cores.” Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2014, pp. 128–37, doi:10.1145/2612669.2612698.
Harks, Tobias, et al. “Routing Games with Progressive Filling.” Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM’14), 2014, pp. 352–60, doi:10.1109/TNET.2015.2468571.
Scheideler, Christian, et al. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122, doi:10.1007/978-3-319-14472-6_8.
Keller, Matthias, and Holger Karl. “Response Time-Optimized Distributed Cloud Resource Allocation.” Proceedings of the SIGCOMM Workshop on Distributed Cloud Computing, 2014, pp. 47--52, doi:10.1145/2627566.2627570.
Wold, Alexander, et al. “Relocatable Hardware Threads in Run-Time Reconfigurable Systems.” Proceedings of the 10th International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications, edited by Diana Goehringer et al., 2014, pp. 61–72, doi:10.1007/978-3-319-05960-0_6.
von Detten, Markus, et al. “Reengineering Component-Based Software Systems with Archimetrix.” Journal of Software and Systems Modeling, no. 4, Springer, 2014, pp. 1239--1268, doi:10.1007/s10270-013-0341-9.
Kniesburges, Sebastian, et al. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” Theory of Computing Systems, no. 3, Springer, 2014, pp. 591–612, doi:10.1007/s00224-012-9431-2.
Abshoff, Sebastian, et al. “Randomized Online Algorithms for Set Cover Leasing Problems.” Proceedings of the 8th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2014, pp. 25–34, doi:10.1007/978-3-319-12691-3_3.
Cord-Landwehr, Andreas, et al. “Quality of Service in Network Creation Games.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 423–28, doi:10.1007/978-3-319-13129-0_34.
Künsemöller, Jörn, et al. “Provider Competition in Infrastructure-as-a-Service.” Proceedings of the 2014 IEEE International Conference on Services Computing (SCC), 2014, pp. 203–10, doi:10.1109/SCC.2014.35.
Petrlic, Ronald, et al. “Privacy-Preserving Reputation Management.” Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–18, doi:10.1145/2554850.2554881.
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5, doi:10.1109/NTMS.2014.6814044.
Awerbuch, Baruch, et al. “Principles of Robust Medium Access and an Application to Leader Election.” Transactions on Algorithms, no. 4, ACM, 2014, doi:10.1145/2635818.
Huma, Zille, et al. “On-the-Fly Computing: Automatic Service Discovery and Composition in Heterogeneous Domains.” Computer Science - Research and Development, no. 3–4, Springer, 2014, pp. 333–61, doi:10.1007/s00450-014-0254-z.
Sorge, Christoph, and Ronald Petrlic. “Datenschutz Im Future Internet: Rechtliche Aspekte Und Technische Maßnahmen.” Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
Mir Djawadi, Behnud, et al. “Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change.” Value in Health, no. 8, Elsevier, 2014, pp. 814–22, doi:10.1016/j.jval.2014.08.2669.
Brangewitz, Sonja, and Jan-Philip Gamp. “Competitive Outcomes and the Inner Core of NTU Market Games.” Economic Theory, no. 3, Springer, 2014, pp. 529–54, doi:10.1007/s00199-014-0846-7.
Ogierman, Adrian, et al. “Competitive MAC under Adversarial SINR.” Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759, doi:10.1109/INFOCOM.2014.6848224.
Jungmann, Alexander, et al. “Combining Automatic Service Composition with Adaptive Service Recommendation for Dynamic Markets of Services.” Proceedings of the 10th World Congress on Services (SERVICES), 2014, pp. 346–53, doi:10.1109/SERVICES.2014.68.
Becker, Matthias, et al. “Cloud Computing Reduces Uncertainties in Quality-of-Service Matching!” Proceedings of the 2nd International Workshop on Cloud Service Brokerage (CSB), 2014, pp. 153–59, doi:10.1007/978-3-319-14886-1_15.
Jakobs, Marie-Christine, and Heike Wehrheim. “Certification for Configurable Program Analysis.” Proceedings of the 21st International Symposium on Model Checking of Software (SPIN), 2014, pp. 30–39, doi:10.1145/2632362.2632372.
Drees, Maximilian, et al. “Budget-Restricted Utility Games with Ordered Strategic Decisions.” Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), edited by Ron Lavi, 2014, pp. 110–21, doi:10.1007/978-3-662-44803-8_10.
Abshoff, Sebastian, et al. “Brief Announcement: A Model for Multilevel Network Games.” Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), edited by Ron Lavi, 2014, p. 294.
Feldotto, Matthias, et al. “Bounding the Potential Function in Congestion Games and Approximate Pure Nash Equilibria.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 30–43, doi:10.1007/978-3-319-13129-0_3.
Hansknecht, Christoph, et al. “Approximate Pure Nash Equilibria in Weighted Congestion Games.” Proceedings of the 17th. International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), 2014, pp. 242–57, doi:10.4230/LIPIcs.APPROX-RANDOM.2014.242.
Gairing, Martin, et al. “Approximate Pure Nash Equilibria in Social Context Congestion Games.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 480–85, doi:10.1007/978-3-319-13129-0_43.
Jungmann, Alexander, et al. “Applying Reinforcement Learning for Resolving Ambiguity in Service Composition.” Proceedings of the 7th International Conference on Service Oriented Computing and Applications (SOCA), 2014, pp. 105–12, doi:10.1109/SOCA.2014.48.
Kniesburges, Sebastian, et al. “Algorithmic Aspects of Resource Management in the Cloud.” Proceedings of the 21st International Colloquium on Structural Information and Communication Complexity (SIROCCO), 2014, pp. 1–13, doi:10.1007/978-3-319-09620-9_1.
Feldotto, Matthias, and Alexander Skopalik. “A Simulation Framework for Analyzing Complex Infinitely Repeated Games.” Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2014), 2014, pp. 625–30, doi:10.5220/0005110406250630.
Blömer, Johannes, et al. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136, doi:10.1109/FDTC.2014.22.
Gall, Dominik, et al. “A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization.” Theory of Computing Systems, no. 1, Springer, 2014, pp. 110–35, doi:10.1007/s00224-013-9504-x.
Künsemöller, Jörn, and Holger Karl. “A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service.” Future Generation Computer Systems, Elsevier, 2014, pp. 44--52, doi:10.1016/j.future.2014.03.005.
Schwabe, Arne, and Holger Karl. “Using MAC Addresses as Efficient Routing Labels in Data Centers.” Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN ’14, Chicago, Illinois, USA, August 22, 2014, 2014, pp. 115--120, doi:10.1145/2620728.2620730.
Foreback, Dianne, et al. “On Stabilizing Departures in Overlay Networks.” Proceedings of the 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2014, pp. 48--62, doi:10.1007/978-3-319-11764-5_4.
Schwichtenberg, Simon, et al. “Normalizing Heterogeneous Service Description Models with Generated QVT Transformations.” Proceedings of the 10th European Conference on Modelling Foundations and Applications (ECMFA), 2014, pp. 180–95, doi:10.1007/978-3-319-09195-2_12.
Abshoff, Sebastian, et al. “Multilevel Network Games.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 435–40, doi:10.1007/978-3-319-13129-0_36.
Scheideler, Christian, et al. “Minimum Linear Arrangement of Series-Parallel Graphs.” Proceedings of the 12th Workshop on Approximation and Online Algorithms (WAOA), 2014, pp. 168--180.
Wiersema, Tobias, et al. “Memory Security in Reconfigurable Computers: Combining Formal Verification with Monitoring.” Proceedings of the International Conference on Field-Programmable Technology (FPT), 2014, pp. 167–74, doi:10.1109/FPT.2014.7082771.
Platenius, Marie Christin, et al. “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.” Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17, doi:10.1007/978-3-319-14886-1_2.
Arifulina, Svetlana, et al. “Market-Optimized Service Specification and Matching.” Proceedings of the 12th International Conference on Service Oriented Computing (ICSOC 2014), edited by Xavier Franch et al., 2014, pp. 543–50, doi:10.1007/978-3-662-45391-9_47.
Mohr, Felix. “Issues of Automated Software Composition in AI Planning.” Proceedings of the 29th International Conference on Automated Software Engineering (ASE), 2014, pp. 895--898, doi:10.1145/2642937.2653470.
Jakobs, Marie-Christine, et al. “Integrating Software and Hardware Verification.” Proceedings of the 11th International Conference on Integrated Formal Methods (IFM), edited by Elvira Albert and Emil Sekerinski, 2014, pp. 307–22, doi:10.1007/978-3-319-10181-1_19.
Platenius, Marie Christin, et al. “Integrating Service Matchers into a Service Market Architecture.” Proceedings of the 8th European Conference on Software Architecture (ECSA 2014), edited by Paris Avgeriou and Uwe Zdun, 2014, pp. 210–17, doi:10.1007/978-3-319-09970-5_19.
Jungmann, Alexander, et al. “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.” International Journal On Advances in Intelligent Systems (IntSys), vol. 7, no. 3&4, IARIA, 2014, pp. 572--594.
Feldotto, Matthias, et al. “HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous Bandwidths.” Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing (P2P), 2014, pp. 1–10, doi:10.1109/P2P.2014.6934300.
Besova, Galina, et al. “Grammar-Based Model Transformations.” Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD), 2014, pp. 1601–10, doi:10.1016/j.cl.2015.05.003.
Jungmann, Alexander, et al. “Evaluation of Color Spaces for Robust Image Segmentation.” Proceedings of the 9th International Conference on Computer Vision Theory and Applications (VISAPP), 2014, pp. 648–55.
Mohr, Felix. “Estimating Functional Reusability of Services.” Proceedings of the 12th International Conference on Service Oriented Computing (ICSOC), 2014, pp. 411–18.
Wiersema, Tobias, et al. “Embedding FPGA Overlays into Configurable Systems-on-Chip: ReconOS Meets ZUMA.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), 2014, pp. 1–6, doi:10.1109/ReConFig.2014.7032514.
Antoniadis, Antonios, et al. “Efficient Computation of Optimal Energy and Fractional Weighted Flow Trade-off Schedules.” Proceedings of the 31st Symposium on Theoretical Aspects of Computer Science (STACS), 2014, pp. 63--74, doi:10.4230/LIPIcs.STACS.2014.63.
Arzt, Steven, et al. “FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps.” Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI ’14, ACM Press, 2014, doi:10.1145/2594291.2594299.
Arzt, Steven, et al. “DroidForce: Enforcing Complex, Data-Centric, System-Wide Policies in Android.” International Conference on Availability, Reliability and Security (ARES 2014), IEEE, 2014, pp. 40–49.
Platzner, Marco, and Christian Plessl. “Verschiebungen an der Grenze zwischen Hardware und Software.” Logiken strukturbildender Prozesse: Automatismen, edited by Jörn Künsemöller et al., Wilhelm Fink, 2014, pp. 123–44.
Kenter, Tobias, et al. “Partitioning and Vectorizing Binary Applications for a Reconfigurable Vector Computer.” Proceedings of the International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications (ARC), vol. 8405, Springer International Publishing, 2014, pp. 144–55, doi:10.1007/978-3-319-05960-0_13.
Agne, Andreas, et al. “Seven Recipes for Setting Your FPGA on Fire – A Cookbook on Heat Generators.” Microprocessors and Microsystems, vol. 38, no. 8, Part B, Elsevier, 2014, pp. 911–19, doi:10.1016/j.micpro.2013.12.001.
Riebler, Heinrich, et al. “Reconstructing AES Key Schedules from Decayed Memory with FPGAs.” Proceedings of Field-Programmable Custom Computing Machines (FCCM), IEEE, 2014, pp. 222–29, doi:10.1109/FCCM.2014.67.
Agne, Andreas, et al. “Self-Awareness as a Model for Designing and Operating Heterogeneous Multicores.” ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 7, no. 2, 13, ACM, 2014, doi:10.1145/2617596.
Agne, Andreas, et al. “ReconOS - An Operating System Approach for Reconfigurable Computing.” IEEE Micro, vol. 34, no. 1, IEEE, 2014, pp. 60–71, doi:10.1109/MM.2013.110.
Vaz, Gavin Francis, et al. “Deferring Accelerator Offloading Decisions to Application Runtime.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2014, pp. 1–8, doi:10.1109/ReConFig.2014.7032509.
Kenter, Tobias, et al. “Kernel-Centric Acceleration of High Accuracy Stereo-Matching.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2014, pp. 1–8, doi:10.1109/ReConFig.2014.7032535.
Wonisch, Daniel, et al. “Zero Overhead Runtime Monitoring.” Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–58, doi:10.1007/978-3-642-40561-7_17.
Wette, Philip, and Holger Karl. “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow.” Proceedings of the ACM SIGCOMM ’13, 2013, pp. 541–42, doi:10.1145/2486001.2491710.
Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:10.1007/978-3-642-39256-6_21.
Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–64, doi:10.1109/CCNC.2013.6488456.
Kolman, Petr, and Christian Scheideler. “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing.” Theory of Computing Systems, no. 2, Springer, 2013, pp. 341–63, doi:10.1007/s00224-013-9454-3.
Abshoff, Sebastian, et al. “Token Dissemination in Geometric Dynamic Networks.” Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers, 2013, pp. 22–34, doi:10.1007/978-3-642-45346-5_3.
Frick, Bernd, and Robert Simmons. “The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley.” Journal of Business Economics, vol. 83, no. 2, Springer, 2013, pp. 101–19, doi:10.1007/s11573-013-0652-x.
Graffi, Kalman, and Lars Bremer. “Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case.” Proceedings of the International Conference on Communications (ICC’13), 2013, pp. 3444–49, doi:10.1109/ICC.2013.6655082.
Becker, Matthias, et al. “SimuLizar: Design-Time Modeling and Performance Analysis of Self-Adaptive Systems.” Proceedings of the Software Engineering Conference (SE), 2013, pp. 71–84.
Platenius, Marie Christin, et al. “Service Matching under Consideration of Explicitly Specified Service Variants.” IEEE 20th International Conference on Web Services (ICWS 2013), 2013, pp. 613–14, doi:10.1109/ICWS.2013.98.
Mohr, Felix, and Hans Kleine Büning. “Semi-Automated Software Composition Through Generated Components.” Proceedings of the 15th International Conference on Information Integration and Web-Based Applications & Services (IiWAS), 2013, pp. 676–80, doi:10.1145/2539150.2539235.
Blömer, Johannes, et al. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
Mohr, Felix, et al. “Reducing Nondeterminism in Automated Service Composition.” Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA), 2013, pp. 154–61, doi:10.1109/SOCA.2013.25.
Benter, Markus, et al. “Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks.” Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), 2013, pp. 2193–201, doi:10.1109/INFCOM.2013.6567022.
Wonisch, Daniel, et al. “Programs from Proofs – A PCC Alternative.” Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–27, doi:10.1007/978-3-642-39799-8_65.
Kling, Peter, and Peter Pietrzyk. “Profitable Scheduling on Multiple Speed-Scalable Processors.” Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 251–60, doi:10.1145/2486159.2486183.
Becker, Matthias, et al. “Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time.” Proceedings of the 9th ACM SigSoft International Conference on Quality of Software Architectures (QoSA’13), 2013, pp. 43–52, doi:10.1145/2465478.2465489.
Engels, Gregor. “On-The-Fly Computing -- Das Entwicklungs- Und Betriebsparadigma FürSoftwaresysteme Der Zukunft.” Proceedings of the Multikonferenz Sofware Engineering 2013 (SE 2013), 2013, pp. 17–18.
Abshoff, Sebastian, et al. “On Two-Party Communication Through Dynamic Networks.” Proceedings of the 17th International Conference on Principles of Distributed Systems (OPODIS), 2013, pp. 11–22, doi:10.1007/978-3-319-03850-6_2.
Wette, Philip, and Holger Karl. “On the Quality of Selfish Virtual Topology Reconfiguration in IP-over-WDM Networks.” Proceedings of the 19th IEEE International Workshop on Local and Metropolitan Area Networks (IEEE LANMAN), 2013, pp. 1–6, doi:10.1109/LANMAN.2013.6528271.
Autenrieth, Marcus, and Hannes Frey. “On Greedy Routing in Degree-Bounded Graphs over d-Dimensional Internet Coordinate Embeddings.” Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 126–31, doi:10.1109/NetSys.2013.10.
Avin, Chen, et al. “Locally Self-Adjusting Tree Networks.” Proceedings of the 27th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2013, pp. 395–406, doi:10.1109/IPDPS.2013.40.
Brangewitz, Sonja, and Claus-Jochen Haake. Cooperative Transfer Price Negotiations under Incomplete Information. Vol. 64, CIE Working Paper Series, Paderborn University, 2013.
Jungmann, Alexander, et al. “Learning Service Recommendations.” International Journal of Business Process Integration and Management, no. 4, InderScience, 2013, pp. 284–97, doi:10.1504/IJBPIM.2013.059135.
Jungmann, Alexander, and Bernd Kleinjohann. “Learning Recommendation System for Automated Service Composition.” Proceedings of the 10th IEEE International Conference on Services Computing (SCC), 2013, pp. 97–104, doi:10.1109/SCC.2013.66.
Walther, Sven, and Heike Wehrheim. “Knowledge-Based Verification of Service Compositions - An SMT Approach.” Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2013, pp. 24–32, doi:10.1109/ICECCS.2013.14.
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS-Attacks.” Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–29, doi:10.1145/2486159.2486186.
Wette, Philip, and Holger Karl. “Incorporating Feedback from Application Layer into Routing and Wavelength Assignment Algorithms.” Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), 2013, pp. 51–52, doi:10.1109/INFCOMW.2013.6970733.
Christin Platenius, Marie. “Fuzzy Service Matching in On-The-Fly Computing.” Proceedings of the Doctoral Symposium of the 9th Joint Meeting of the European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 2013, pp. 715–18, doi:10.1145/2491411.2492405.
Heinzemann, Christian, and Steffen Becker. “Executing Reconfigurations in Hierarchical Component Architectures.” Proceedings of the 16th International ACM SigSoft Symposium on Component-Based Software Engineering (CBSE), 2013, pp. 3–12, doi:10.1145/2465449.2465452.
Blömer, Johannes, and Gennadij Liske. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. Universität Paderborn, 2013.
Graffi, Kalman, and Vitaly Rapp. “Continuous Gossip-Based Aggregation through Dynamic Information Aging.” Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13), 2013, pp. 1–7, doi:10.1109/ICCCN.2013.6614118.
Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–49, doi:10.1007/978-3-642-41527-2_37.
Feldotto, Matthias, and Kalman Graffi. “Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM.” Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13), 2013, pp. 99–106, doi:10.1109/HPCSim.2013.6641399.
Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34, doi:10.1109/NetSys.2013.11.
Graffi, Kalman, and Timo Klerx. “Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks.” Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13), 2013, pp. 1–5, doi:10.1109/P2P.2013.6688720.
Huma, Zille, et al. “Automated Service Composition for On-the-Fly SOAs.” Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13), 2013, pp. 524--532, doi:10.1007/978-3-642-45005-1_42.
Hallmann, Corinna. An Approach for a Decision Support Systems to Optimize Water Tanks in Water Supply Systems by Combining Network Reduction, Optimization and Simulation. Universität Paderborn, 2013.
Flocchini, Paola, et al., editors. Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics. Vol. 8243, Springer, 2013, doi:10.1007/978-3-642-45346-5.
Wette, Philip, and Kalman Graffi. “Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables.” Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 35–42, doi:10.1109/NetSys.2013.9.
Platenius, Marie, et al. “A Survey of Fuzzy Service Matching Approaches in the Context of On-The-Fly Computing.” Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based Software Engineering, 2013, pp. 143–52, doi:10.1145/2465449.2465454.
Petrlic, Ronald, et al. “A Privacy-Friendly Architecture for Future Cloud Computing.” International Journal of Grid and Utility Computing, no. 4, InderScience, 2013, pp. 265–77, doi:10.1504/IJGUC.2013.057120.
Keller, Matthias, et al. “A Local Heuristic for Latency-Optimized Distributed Cloud Deployment.” Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud Computing, 2013, pp. 429–34, doi:10.1109/UCC.2013.85.
Markarian, Christine, et al. “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.” Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–27, doi:10.1007/978-3-642-45346-5_16.
Kniesburges, Sebastian, et al. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO), 2013, pp. 165–76, doi:10.1007/978-3-319-03578-9_14.
Riebler, Heinrich, et al. “FPGA-Accelerated Key Search for Cold-Boot Attacks against AES.” Proceedings of the International Conference on Field-Programmable Technology (FPT), IEEE, 2013, pp. 386–89, doi:10.1109/FPT.2013.6718394.
Happe, Markus, et al. “On-The-Fly Computing: A Novel Paradigm for Individualized IT Services.” Proceedings of the 9th IEEE Workshop on Software Technology for Future Embedded and Ubiquitous Systems (SEUS), IEEE, 2013, doi:10.1109/ISORC.2013.6913232.
Haake, Claus-Jochen, and Jan Thomas Martini. “Negotiating Transfer Prices.” Group Decision and Negotiation, vol. 22, no. 4, Springer Nature, 2012, pp. 657–80, doi:10.1007/s10726-012-9286-6.
Haake, Claus-Jochen, et al. “On the Institutional Design of Burden Sharing When Financing External Border Enforcement in the EU.” International Economics and Economic Policy, vol. 10, no. 4, Springer Nature, 2012, pp. 583–612, doi:10.1007/s10368-012-0226-3.
Jungmann, Alexander, and Bernd Kleinjohann. “Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition.” Proceedings of the 9th IEEE International Conference on Service Computing (SCC), 2012, pp. 701–02, doi:10.1109/SCC.2012.76.
Becker, Steffen, et al. “Towards Modeling Reconfiguration in Hierarchical Component Architectures.” Proceedings of the 15th ACM SigSoft International Symposium on Component-Based Software Engineering (CBSE), 2012, pp. 23--28, doi:10.1145/2304736.2304742.
Jungmann, Alexander, and Bernd Kleinjohann. “Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition.” Proceedings of the 4th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2012, pp. 43–47.
Huma, Zille, et al. “Towards an Automatic Service Discovery for UML-Based Rich Service Descriptions.” Proceedings of the ACM/IEEE 15th International Conference on Model Driven Engineering Languages and Systems (MoDELS), 2012, pp. 709--725, doi:10.1007/978-3-642-33666-9_45.
Arifulina, Svetlana. “Towards a Framework for the Integration of Modeling Languages.” Proceedings of the Doctoral Symposium of the 5th International Conference on Software Language Engineering 2012, Dresden, Germany (SLE (Doctoral Symposium)), edited by Ulrich W. Eisenecker and Christian Bucholdt, 2012, pp. 23--26.
Clouser, Thomas, et al. “Tiara: A Self-Stabilizing Deterministic Skip List and Skip Graph.” Theoretical Computer Science, Elsevier, 2012, pp. 18–35, doi:10.1016/j.tcs.2011.12.079.
Damerow, Valentina, et al. “Smoothed Analysis of Left-to-Right Maxima with Applications.” Transactions on Algorithms, no. 3, ACM, 2012, p. 30, doi:10.1145/2229163.2229174.