Amedick, Michaela. Informationsasymmetrien auf dem Spendenmarkt und Möglichkeiten ihrer Reduktion: Eine Prinzipal-Agenten-Perspektive von Online Spenden. Universität Paderborn, 2016.
Melnikov, Vitalik, et al. “Pairwise versus Pointwise Ranking: A Case Study.” Schedae Informaticae, vol. 25, Uniwersytet Jagiellonski - Wydawnictwo Uniwersytetu Jagiellonskiego, 2016, doi:10.4467/20838476si.16.006.6187.
Beringer, Steffen, and Heike Wehrheim. “Verification of AUTOSAR Software Architectures with Timed Automata.” Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings, edited by Maurice H. ter Beek et al., 2016, pp. 189--204, doi:10.1007/978-3-319-45943-1_13.
Brangewitz, Sonja, and Jochen Manegold. “Competition of Intermediaries in a Differentiated Duopoly.” Theoretical Economics Letters, vol. 6, no. 6, Scientific Research Publishing (SCIRP), 2016, pp. 1341–62, doi:10.4236/tel.2016.66124.
Drees, Maximilian, et al. “Churn- and DoS-Resistant Overlay Networks Based on Network Reconfiguration.” Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427, doi:10.1145/2935764.2935783.
von Rechenberg, Tobias, and Dominik Gutt. “Challenge Accepted! - The Impcat of Goal Achievement on Subsequent User Effort and Implications of a Goal’s Difficulty.” Proceedings of the 24th Conference on Information Systems (ECIS), Istanbul, 2016.
Walther, Sven, and Heike Wehrheim. “On-The-Fly Construction of Provably Correct Service Compositions - Templates and Proofs.” Science of Computer Programming, Elsevier, 2016, pp. 2--23, doi:10.1016/j.scico.2016.04.002.
Dollmann, Markus, and Michaela Geierhos. “On- and Off-Topic Classification and Semantic Annotation of User-Generated Software Requirements.” Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing (EMNLP), Association for Computational Linguistics (ACL), 2016, pp. 1807–16.
Abu-Khzam, Faisal N., et al. “On the Parameterized Parallel Complexity and the Vertex Cover Problem.” Proceedings of the 10th International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 477–88, doi:10.1007/978-3-319-48749-6_35.
Meyer auf der Heide, Friedhelm, editor. “Introduction to the Special Issue on SPAA 2014.” Transactions on Parallel Computing (TOPC), no. 1, 2016, doi:10.1145/2936716.
Platenius, Marie Christin, et al. “Imprecise Matching of Requirements Specifications for Software Services Using Fuzzy Logic.” IEEE Transactions on Software Engineering (TSE), Presented at ICSE 2017, no. 8, IEEE, 2016, pp. 739–59, doi:10.1109/TSE.2016.2632115.
Geierhos, Michaela, and Frederik Simon Bäumer. “How to Complete Customer Requirements: Using Concept Expansion for Requirement Refinement.” Proceedings of the 21st International Conference on Applications of Natural Language to Information Systems (NLDB), edited by Elisabeth Métais et al., vol. 9612, Springer, 2016, pp. 37–47, doi:10.1007/978-3-319-41754-7_4.
von Rechenberg, Tobias, et al. “Goals as Reference Points: Empirical Evidence from a Virtual Reward System.” Decision Analysis, no. 2, INFORMS, 2016, pp. 153--171, doi:10.1287/deca.2016.0331.
Brangewitz, Sonja, and Simon Hoof. “Economic Aspects of Service Composition: Price Negotiations and Quality Investments.” Service-Oriented and Cloud Computing: 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings, edited by Schahram Dustdar Marco Aiello, Einar Broch Johnsen and Ilche Georgievski, 2016, pp. 201–15, doi:10.1007/978-3-319-44482-6_13.
Herrmann, Philipp, et al. “Crowd-Driven Competitive Intelligence: Understanding the Relationship between Local Market Structure and Online Rating Distributions.” INFORMS Annual Meeting, 2016.
Herrmann, Philipp, et al. “Crowd-Driven Competitive Intelligence: Understanding the Relationship between Local Market Structure and Online Rating Distributions.” NBER Summer Institute on the Economics of Information Technology and Digitization, 2016.
Mäcker, Alexander, et al. “Cost-Efficient Scheduling on Machines from the Cloud.” Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 578--592, doi:10.1007/978-3-319-48749-6_42.
Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” Proceedings of the CT-RSA 2016, 2016, pp. 431–47, doi:10.1007/978-3-319-29485-8_25.
Feldotto, Matthias, et al. “Congestion Games with Mixed Objectives.” Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 655--669, doi:10.1007/978-3-319-48749-6_47.
Gutt, Dominik, and Dennis Kundisch. “Money Talks (Even) in the Sharing Economy: Empirical Evidence for Price Effects in Online Ratings as Quality Signals.” Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland, 2016.
Melnikov, Vitaly, and Eyke Hüllermeier. “Learning to Aggregate Using Uninorms.” Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML/PKDD 2016), 2016, pp. 756–71, doi:10.1007/978-3-319-46227-1_47.
Platenius, Marie Christin, et al. An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3). Universität Paderborn, 2016.
Wiersema, Tobias, et al. “An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip.” Computers & Electrical Engineering, Elsevier, 2016, pp. 112--122, doi:10.1016/j.compeleceng.2016.04.005.
Krämer, Julia, and Heike Wehrheim. “A Short Survey on Using Software Error Localization for Service Compositions.” Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016), 2016, pp. 248--262, doi:10.1007/978-3-319-44482-6_16.
Jungmann, Alexander, and Bernd Kleinjohann. “A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality.” Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2016, pp. 1--8, doi:10.1109/ETFA.2016.7733522.
Krämer, Julia, and Heike Wehrheim. “A Formal Approach to Error Localization and Correction in Service Compositions.” Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016), 2016, pp. 445--457, doi:10.1007/978-3-319-50230-4_35.
Töws, Manuel, and Heike Wehrheim. “A CEGAR Scheme for Information Flow Analysis.” Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016), 2016, pp. 466--483, doi:10.1007/978-3-319-47846-3_29.
Hesso, Aref. Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen. Universität Paderborn, 2016.
Schwichtenberg, Simon. “Automatized Derivation of Comprehensive Specifications for Black-Box Services.” Proceedings of the 38th International Conference on Software Engineering Companion (ICSE), 2016, pp. 815–18, doi:10.1145/2889160.2889271.
Jungmann, Alexander, and Bernd Kleinjohann. “Automatic Composition of Service-Based Image Processing Applications.” Proceedings of the 13th IEEE International Conference on Services Computing (SCC), 2016, pp. 106--113, doi:10.1109/SCC.2016.21.
Jazayeri, Bahar. “Architectural Management of On-The-Fly Computing Markets.” Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops), ACM, 2016, p. 42, doi:10.1145/2993412.3010821.
Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree.” Journal of Graph Algorithms and Applications, vol. 20, no. 1, Journal of Graph Algorithms and Applications, 2016, pp. 79–100, doi:10.7155/jgaa.00385.
Wette, Philip, and Holger Karl. “DCT2Gen: A Traffic Generator for Data Centers.” Computer Communications, 2016, pp. 45--58, doi:10.1016/j.comcom.2015.12.001.
Peuster, Manuel, and Holger Karl. “Understand Your Chains: Towards Performance Profile-Based Network Service Management.” Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016, 2016, pp. 7--12, doi:10.1109/EWSDN.2016.9.
Peuster, Manuel, et al. “Demonstrating On-Demand Cell Switching with a Two-Layer Mobile Network Testbed.” IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016, 2016, pp. 1015--1016, doi:10.1109/INFCOMW.2016.7562232.
Peuster, Manuel, et al. “MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments.” IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016, doi:10.1109/NFV-SDN.2016.7919490.
Zimmermann, Steffen, et al. “How Do Different Sources of the Variance of Online Consumer Ratings Matter?” Workshop on IS Design and Economic Behavior (ISDEB), 2016.
Späth, Johannes, et al. “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” European Conference on Object-Oriented Programming (ECOOP), 2016.
Tölke, Christian. Sicherheit von Hybriden FPGA-Systemen in Der Industriellen Automatisierungstechnik -- Anforderungen Und Umsetzung. Universität Paderborn, 2016.
Dräxler, Sevil, and Holger Karl. “Placement of Services with Flexible Structures Specified by a YANG Data Model.” Proceedings of the 2nd International IEEE Conference on Network Softwarization (NetSoft), 2016, pp. 184--192, doi:10.1109/NETSOFT.2016.7502412.
Kühne, Thomas, et al. “Patterns for Constructing Mutation Operators: Limiting the Search Space in a Software Engineering Application.” Proceedings of the 19th European Conference on Genetic Programming (EuroGP 2016), 2016, pp. 278--293, doi:10.1007/978-3-319-30668-1_18.
Jakobs, Marie-Christine, et al. “PAndA 2 : Analyzing Permission Use and Interplay in Android Apps (Tool Paper).” Workshop on Formal and Model-Driven Techniques for Developing Trustworthy Systems, edited by Troubitsyna E Ishikawa F, Romanovsky A, 2016.
Stapel, Florian. Ontology-Based Representation of Abstract Optimization Models for Model Formulation and System Generation. Universität Paderborn, 2016.
Bernhardt, Katharina. Zertifikate als Qualitätssignal – Wie die Zertifizierung von Produkten und Verkäufern das Vertrauen von Kunden im Onlinehandel beeinflussen. Universität Paderborn, 2016.
Schmidt, Alexander. Wie entsteht Kreativität? Ein Überblick über vergleichende Studien zu verschiedenen Formen des Brainstormings. Universität Paderborn, 2016.
Gmyr, Robert, et al. “Self-Stabilizing Metric Graphs.” Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2016, pp. 248--262, doi:10.1007/978-3-319-49259-9_20.
König, Jürgen, et al. “Scheduling with Interjob Communication on Parallel Processors.” Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 563--577, doi:10.1007/978-3-319-48749-6_41.
Bäumer, Frederik Simon, and Michaela Geierhos. “Running out of Words: How Similar User Stories Can Help to Elaborate Individual Natural Language Requirement Descriptions.” Proceedings of the 22nd International Conference on Information and Software Technologies (ICIST), edited by Giedre Dregvaite and Robertas Damasevicius, vol. 639, Springer, 2016, pp. 549–58, doi:10.1007/978-3-319-46254-7_44.
Harks, Tobias, et al. “Routing Games With Progressive Filling.” IEEE/ACM Transactions on Networking, no. 4, IEEE, 2016, pp. 2553–62, doi:10.1109/TNET.2015.2468571.
John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas: A Design Theory.” Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland, 2016.
Drees, Maximilian, et al. “Strategic Online Facility Location.” Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 593--607, doi:10.1007/978-3-319-48749-6_43.
Berhörster, Jan. Software-gestützte Entwicklung von Geschäftsmodellideen: Theoretische Grundlagen und prototypische Implementierung. Universität Paderborn, 2016.
van Rooijen, Lorijn, and Heiko Hamann. “Requirements Specification-by-Example Using a Multi-Objective Evolutionary Algorithm.” Proceedings of 24th IEEE International Requirements Engineering Conference (RE 2016), 2016, pp. 3--9, doi:10.1109/REW.2016.015.
Dressler, Falko, and Friedhelm Meyer auf der Heide, editors. Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). ACM, 2016, doi:10.1145/2942358.
Abshoff, Sebastian, et al. “Towards the Price of Leasing Online.” Journal of Combinatorial Optimization, no. 4, Springer, 2016, pp. 1197--1216, doi:10.1007/s10878-015-9915-5.
Scheideler, Christian, et al. “Towards a Universal Approach for Monotonic Searchability in Self-Stabilizing Overlay Networks.” Proceedings of the 30th International Symposium on Distributed Computing (DISC), 2016, pp. 71--84, doi:10.1007/978-3-662-53426-7_6.
Abu-Khzam, Faisal N., et al. “The Monotone Circuit Value Problem with Bounded Genus Is in NC.” Proceedings of the 22nd International Conference on Computing and Combinatorics (COCOON), 2016, pp. 92–102, doi:10.1007/978-3-319-42634-1_8.
Monien, Burkhard, and Marios Mavronicolas. “The Complexity of Equilibria for Risk-Modeling Valuations.” Theoretical Computer Science, vol. 634, Elsevier, 2016, pp. 67–96, doi:10.1016/j.tcs.2016.04.013.
Feldotto, Matthias, and Kalman Graffi. “Systematic Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM.” Concurrency and Computation: Practice and Experience, vol. 28, no. 5, Wiley Online Library, 2016, pp. 1655–77, doi:10.1002/cpe.3716.
Holzmann, Annabel. Wenn 1+1 nicht 2 ergibt – Gestaltungsmöglichkeiten Einzelbewertungen in Reputationssystemen zu Gesamtbewertungen zu aggregieren. Universität Paderborn, 2016.
Wiersema, Tobias, and Marco Platzner. “Verifying Worst-Case Completion Times for Reconfigurable Hardware Modules Using Proof-Carrying Hardware.” Proceedings of the 11th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC 2016), 2016, pp. 1--8, doi:10.1109/ReCoSoC.2016.7533910.
Strotmeyer, Sebastian, et al. “Vergleichende Betrachtung von Software-Werkzeugen Zur Geschäftsmodellentwicklung.” Multikonferenz Wirtschaftsinformatik (MKWI), 2016.
N, N. Wie Wertvoll Ist Der Einzelne Für Das Team? - Performancemessung Der Bundesligaspieler Anhand Der Kooperativen Spieltheorie Der Saison 2014/2015. Universität Paderborn, 2016.
N, N. Automatisiertes Matching von Angebot Und Nachfrage in Der Kunststoffindustrie Ein Fallbeispiel in Kooperation Mit Der PINPOOLS GmbH. Universität Paderborn, 2016.
Heindorf, Stefan, et al. “Vandalism Detection in Wikidata.” Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016), 2016, pp. 327--336, doi:10.1145/2983323.2983740.
Riebler, Heinrich, et al. “Using Just-in-Time Code Generation for Transparent Resource Management in Heterogeneous Systems.” Proc. HiPEAC Workshop on Reonfigurable Computing (WRC), 2016.
Kenter, Tobias, and Christian Plessl. “Microdisk Cavity FDTD Simulation on FPGA Using OpenCL.” Proc. Workshop on Heterogeneous High-Performance Reconfigurable Computing (H2RC), 2016.
Riebler, Heinrich, et al. “Using Just-in-Time Code Generation for Transparent Resource Management in Heterogeneous Systems.” Proceedings of International Forum on Research and Technologies for Society and Industry (RTSI), IEEE, 2016, pp. 1–5, doi:10.1109/RTSI.2016.7740545.
Vaz, Gavin Francis, et al. “Potential and Methods for Embedding Dynamic Offloading Decisions into Application Code.” Computers and Electrical Engineering, vol. 55, Elsevier, 2016, pp. 91–111, doi:10.1016/j.compeleceng.2016.04.021.
Lösch, Achim, et al. “Performance-Centric Scheduling with Task Migration for a Heterogeneous Compute Node in the Data Center.” Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), EDA Consortium / IEEE, 2016, pp. 912–17.
Kenter, Tobias, et al. “Opportunities for Deferring Application Partitioning and Accelerator Synthesis to Runtime (Extended Abstract).” Workshop on Reconfigurable Computing (WRC), 2016.
John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas - Towards a Design Theory.” AIS SIGPRAG Pre-ICIS Workshop: Practice-Based Design and Innovation of Digital Artifacts, 2015.
Jakobs, Marie-Christine. “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning.” Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM), 2015, pp. 159--174, doi:10.1007/978-3-319-22969-0_12.
Blömer, Johannes, et al. “Short Group Signatures with Distributed Traceability.” Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–80, doi:10.1007/978-3-319-32859-1_14.
Gutt, Dominik, and Philipp Herrmann. “Sharing Means Caring? Hosts’ Price Reactions to Rating Visibility.” Proceedings of the 23rd European Conference on Information Systems (ECIS), Münster, 2015.
Trykacz, Matthias. Share Economy - Identifikation von konstituierenden Merkmalen anhand einer vergleichenden Betrachtung von Geschäftsmodellen. Universität Paderborn, 2015.
Arifulina, Svetlana, et al. “Market-Specific Service Compositions: Specification and Matching.” Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet, 2015, pp. 333--340, doi:10.1109/SERVICES.2015.58.
Kirsch, Michelle. Koordinierter Patentschutz in einer globalisierten Welt - Effizienz- und Anreizwirkungen auf die Arzneimittelversorgung in Entwicklungsländern. Universität Paderborn, 2015.
Czech, Mike, et al. “Just Test What You Cannot Verify!” Fundamental Approaches to Software Engineering, edited by Alexander Egyed and Ina Schaefer, 2015, pp. 100–14, doi:10.1007/978-3-662-46675-9_7.
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS Attacks.” Transactions on Parallel Computing, no. 3, ACM, 2015, pp. 18:1--18:33, doi:10.1145/2809806.
Isenberg, Tobias. “Incremental Inductive Verification of Parameterized Timed Systems.” Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD), 2015, pp. 1–9, doi:10.1109/ACSD.2015.13.
Wette, Philip, and Holger Karl. “HybridTE: Traffic Engineering for Very Low-Cost Software-Defined Data-Center Networks.” Proceedings of the 4th European Workshop on Software Defined Networks (EWSDN 2015), 2015, pp. 1--7, doi:10.1109/EWSDN.2015.57.
Scheideler, Christian, et al. “Towards Establishing Monotonic Searchability in Self-Stabilizing Data Structures.” Proceedings of the 19th International Conference on Principles of Distributed Systems (OPODIS), 2015, doi:10.4230/LIPIcs.OPODIS.2015.24.
Koutsopoulos, Andreas, et al. “Towards a Universal Approach for the Finite Departure Problem in Overlay Networks.” Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2015, pp. 201–16, doi:10.1007/978-3-319-21741-3_14.
Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed Locally Self-Adjusting Binary Search Trees.” Proceedings of the 9th International Workshop on Algorithms and Computation (WALCOM), 2015, pp. 175--186, doi:10.1007/978-3-319-15612-5_16.
Monien, Burkhard, and Marios Mavronicolas. “The Complexity of Pure Equilibria in Mix-Weighted Congestion Games on Parallel Links.” Information Processing Letters, vol. 115, no. 12, Elsevier, 2015, pp. 927–31, doi:10.1016/j.ipl.2015.07.012.
Becker, Matthias, et al. “Systematically Deriving Quality Metrics for Cloud Computing Systems.” Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, 2015, pp. 169--174, doi:10.1145/2668930.2688043.
Schwabe, Arne, and Holger Karl. “SynRace: Decentralized Load-Adaptive Multi-Path Routing without Collecting Statistics.” Proceedings of the 4th European Workshop on Software Defined Networks (EWSDN 2015), 2015, pp. 37–42, doi:10.1109/EWSDN.2015.58.
Gutt, Dominik, and Dennis Kundisch. “Rating Aggregation in Multi-Dimensional Rating Systems: How Do Reviewers Form Overall Ratings?” INFORMS Annual Meeting, 2015.
Brosig, Fabian, et al. “Quantitative Evaluation of Model-Driven Performance Analysis and Simulation of Component-Based Architectures.” Transactions on Software Engineering, no. 2, IEEE, 2015, pp. 157--175, doi:10.1109/TSE.2014.2362755.
Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs of Predicated Dataflow Analyses.” Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015, pp. 1729–36, doi:10.1145/2695664.2695690.
Hallmann, Corinna, and Leena Suhl. “Optimizing Water Tanks in Water Distribution Systems by Combining Network Reduction, Mathematical Optimization and Hydraulic Simulation.” OR Spectrum, Springer, 2015, pp. 1–19, doi:10.1007/s00291-015-0403-1.
Hallmann, Corinna. Optimierung von Wasserbehältern in einem Wasserversorgungssystem mittels einer Kombination aus Netzreduktion, mathematischer Optimierung und hydraulischer Simulation. Universität Paderborn, 2015.
Markarian, Christine, and Friedhelm Meyer auf der Heide. “Online Resource Leasing.” Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 2015, pp. 343–44, doi:10.1145/2767386.2767454.
Wiersema, Tobias, et al. “On-The-Fly Verification of Reconfigurable Image Processing Modules Based on a Proof-Carrying Hardware Approach.” Proceedings of the International Symposium in Reconfigurable Computing (ARC), 2015, pp. 365--372, doi:10.1007/978-3-319-16214-0_32.
Caragiannis, Ioannis, et al. “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure.” Transactions on Economics and Computation, vol. 3, no. 1, 2, ACM, 2015, doi:10.1145/2614687.
Blömer, Johannes, et al. “Anonymous and Publicly Linkable Reputation Systems.” Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488, doi:10.1007/978-3-662-47854-7_29.
Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” Journal of Internet Services and Applications, no. 1, Springer, 2015, pp. 1–18, doi:10.1186/s13174-015-0022-8.
Mohr, Felix. “A Metric for Functional Reusability of Services.” Proceedings of the 14th International Conference on Software Reuse (ICSR), 2015, pp. 298--313, doi:10.1007/978-3-319-14130-5_21.
Fanasch, Patrizia. Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg. Universität Paderborn, 2015.
Bubeck, Uwe, and Hans Kleine Büning. “Learning Boolean Specifications.” Artificial Intelligence, Elsevier, 2015, pp. 246–57, doi:10.1016/j.artint.2015.09.003.
Cox, Joe, and Daniel Kaimann. “How Do Reviews from Professional Critics Interact with Other Signals of Product Quality? Evidence from the Video Game Industry.” Journal of Consumer Behaviour, vol. 14, no. 6, Wiley Online Library, 2015, pp. 366–77, doi:10.1002/cb.1553.
Herrmann, Philipp, et al. “How Do Different Sources of the Variance of Consumer Ratings Matter?” Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, 2015.
Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, Elsevier, 2015, pp. 116–38, doi:10.1016/j.cl.2015.05.003.
Geierhos, Michaela, et al. “Filtering Reviews by Random Individual Error.” Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015), edited by Moonis Ali et al., vol. 9101, Springer, 2015, pp. 305–15, doi:10.1007/978-3-319-19066-2_30.
Plonka, Dennis. Entwicklung von Ablösesummen und Gehälter in der Fußball-Bundesliga - Salary Caps als mögliches Modell der Chancengleichheit. Universität Paderborn, 2015.
Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977, doi:10.1145/2786805.2803181.
Jungmann, Alexander, et al. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
Mohr, Felix, et al. “Automated Online Service Composition.” Proceedings of the 12th IEEE International Conference on Services Computing (SCC), 2015, pp. 57--64, doi:10.1109/SCC.2015.18.
Drees, Maximilian, et al. “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games.” Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT), 2015, pp. 178–89, doi:10.1007/978-3-662-48433-3_14.
Jungmann, Alexander. “On Adaptivity for Automated Composition of Service Functionality.” Proceedings of the IEEE 11th World Congress on Services (SERVICES), 2015, pp. 329--332, doi:10.1109/SERVICES.2015.57.
Mäcker, Alexander, et al. “Non-Preemptive Scheduling on Machines with Setup Times.” Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings, edited by Frank Dehne et al., 2015, pp. 542--553, doi:10.1007/978-3-319-21840-3_45.
Cord-Landwehr, Andreas, and Pascal Lenzner. “Network Creation Games: Think Global - Act Local.” Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS), 2015, pp. 248--260, doi:10.1007/978-3-662-48054-0_21.
Platenius, Marie Christin, et al. “MatchBox: A Framework for Dynamic Configuration of Service Matching Processes.” Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15), 2015, pp. 75–84, doi:10.1145/2737166.2737174.
Menne, Maria Reinhild. Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG. Universität Paderborn, 2015.
Neumann, Daniel. Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich. Universität Paderborn, 2015.
Ochlast, Kerstin. Trust Me, I Am Certified - Wie Die Zertifizierung von Produkten Und Verkäufern Das Vertrauen von Kunden Im Onlinehandel Beeinflussen. Universität Paderborn, 2015.
Heindorf, Stefan, et al. “Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis.” Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15), 2015, pp. 831--834, doi:10.1145/2766462.2767804.
Li, Shouwei, et al. “Towards Flexible Demands in Online Leasing Problems.” Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON), 2015, pp. 277--288, doi:10.1007/978-3-319-21398-9_22.
Fahr, Rene, and Behnud Mir Djawadi. “‘…and They Are Really Lying’: Clean Evidence on the Pervasiveness of Cheating in Professional Contexts from a Field Experiment.” Journal of Economic Psychology, Elsevier, 2015, pp. 48–59, doi:10.1016/j.joep.2015.03.002.
John, Thomas, and Dennis Kundisch. “Why Fit Leads to Surprise: An Extension of Cognitive Fit Theory to Creative Problems.” Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, USA, 2015.
Geierhos, Michaela, et al. “What Did You Mean? Facing the Challenges of User-Generated Software Requirements.” Proceedings of the 7th International Conference on Agents and Artificial Intelligence (ICAART), Special Session on Partiality, Underspecification, and Natural Language Processing (PUaNLP 2015), edited by Stephane Loiseau et al., SciTePress - Science and Technology Publications, 2015, pp. 277–83, doi:10.5220/0005346002770283.
Monien, Burkhard, et al. “Weighted Boolean Formula Games.” The ´Festschrift´ Algorithms, Probability, Networks, and Games: Scientific Papers and Essays Dedicated to Paul G. Spirakis on the Occasion of His 60th Birthday, 2015, pp. 49–86, doi:10.1007/978-3-319-24024-4_6.
Senge, Robin, and Eyke Hüllermeier. “Fast Fuzzy Pattern Tree Learning for Classification.” IEEE Transactions on Fuzzy Systems, vol. 23, no. 6, Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 2024–33, doi:10.1109/tfuzz.2015.2396078.
Buechel, Berno, and Nils Röhl. “Robust Equilibria in Location Games.” European Journal of Operational Research, vol. 240, no. 2, Elsevier, 2015, pp. 505–17, doi:10.1016/j.ejor.2014.07.019.
Schwabe, Arne, and Holger Karl. “Topology Model to Generate Realistic Latency for Simulations.” 2015 IEEE International Conference on Communications, ICC 2015, London, United Kingdom, June 8-12, 2015, 2015, pp. 6122--6127, doi:10.1109/ICC.2015.7249298.
Peuster, Manuel, and Holger Karl. “An Architecture for Energy-Aware On-Demand Mobile Network Management.” Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges, 2015.
Monien, Burkhard, and Marios Mavronicolas. “Minimizing Expectation Plus Variance.” Theory of Computing Systems, vol. 57, no. 3, Springer, 2015, pp. 617–54, doi:10.1007/s00224-014-9542-z.
Li, Li, et al. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” 2015 International Conference on Software Engineering (ICSE), 2015, pp. 280–91.
Funke, Lukas. An LLVM Based Toolchain for Transparent Acceleration of Digital Image Processing Applications Using FPGA Overlay Architectures. Universität Paderborn, 2015.
Kenter, Tobias, et al. “Exploring Tradeoffs between Specialized Kernels and a Reusable Overlay in a Stereo-Matching Case Study.” International Journal of Reconfigurable Computing (IJRC), vol. 2015, 859425, Hindawi, 2015, doi:10.1155/2015/859425.
Damschen, Marvin, and Christian Plessl. “Easy-to-Use On-The-Fly Binary Program Acceleration on Many-Cores.” Proceedings of the 5th International Workshop on Adaptive Self-Tuning Computing Systems (ADAPT), 2015.
Damschen, Marvin, et al. “Transparent Offloading of Computational Hotspots from Binary Code to Xeon Phi.” Proceedings of the 2015 Conference on Design, Automation and Test in Europe (DATE), EDA Consortium / IEEE, 2015, pp. 1078–83, doi:10.7873/DATE.2015.1124.
Wette, Philip, et al. “MaxiNet: Distributed Emulation of Software-Defined Networks.” Proceedings of the 2014 IFIP Networking Conference (Networking 2014), 2014, pp. 1–9, doi:10.1109/IFIPNetworking.2014.6857078.
Lange, Maximilian. Was tun um Kunden von der Qualität seiner Produkte zu überzeugen - Möglichkeiten der Zertifizierung und von Reputationssystemen auf Onlinemärkten. Universität Paderborn, 2014.
Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), edited by Ivan Lanese and Eric Madelaine, 2014, pp. 31–48, doi:10.1007/978-3-319-15317-9_3.
Wette, Philip, and Holger Karl. “Using Application Layer Knowledge in Routing and Wavelength Assignment Algorithms.” Proceedings of the IEEE International Conference on Communications 2014, 2014, pp. 3270–76, doi:10.1109/ICC.2014.6883825.
Becker, Matthias, et al. “Towards Systematic Configuration for Architecture Validation.” Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.
Jungmann, Alexander, and Bernd Kleinjohann. “Towards Context-Sensitive Service Composition for Service-Oriented Image Processing.” Proceedings of the 6th International Conference on Cloud Computing Technology and Science (CloudCom), 2014, pp. 755–58, doi:10.1109/CloudCom.2014.154.
Brangewitz, Sonja, et al. “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.” Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
Meisner, Sebastian, and Marco Platzner. “Thread Shadowing: Using Dynamic Redundancy on Hybrid Multi-Cores for Error Detection.” Proceedings of the 10th International Symposium on Applied Reconfigurable Computing (ARC), edited by Diana Goehringer et al., Springer, 2014, pp. 283–90, doi:10.1007/978-3-319-05960-0_30.
Scheel, Friedrich. The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments. Universität Paderborn, 2014.
Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203, doi:10.1007/978-3-319-14130-5_14.
Keller, Matthias, et al. “Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds.” Proceedings of 7th International Conference on Utility and Cloud Computing (UCC), 2014, pp. 387--395, doi:10.1109/UCC.2014.49.
Blömer, Johannes, et al. “Tampering Attacks in Pairing-Based Cryptography.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7, doi:10.1109/FDTC.2014.10.
Blazovics, Laszlo, et al. “Surrounding Robots -- A Discrete Localized Solution for the Intruder Problem.” Journal of Advanced Computational Intelligence and Intelligent Informatics, no. 3, Fuji Technology Press Ltd., 2014, pp. 315--319, doi:10.20965/jaciii.2014.p0315.
Dräxler, Sevil, et al. “Specifying and Placing Chains of Virtual Network Functions.” Proceedings of the 3rd International Conference on Cloud Networking (CloudNet), 2014, pp. 7–13, doi:10.1109/CloudNet.2014.6968961.
Arifulina, Svetlana, et al. “SeSAME: Modeling and Analyzing High-Quality Service Compositions.” Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014), 2014, pp. 839–42, doi:10.1145/2642937.2648621.
Petrlic, Ronald, et al. “Security and Privacy Challenges in On-The-Fly Computing.” Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–42.
Janiuk, Jens, et al. “Secure Distributed Data Structures for Peer-to-Peer-Based Social Networks.” Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), 2014, pp. 396–405, doi:10.1109/CTS.2014.6867595.
Brinkmann, Andre, et al. “Scheduling Shared Continuous Resources on Many-Cores.” Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2014, pp. 128–37, doi:10.1145/2612669.2612698.
Harks, Tobias, et al. “Routing Games with Progressive Filling.” Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM’14), 2014, pp. 352–60, doi:10.1109/TNET.2015.2468571.
Scheideler, Christian, et al. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122, doi:10.1007/978-3-319-14472-6_8.
Keller, Matthias, and Holger Karl. “Response Time-Optimized Distributed Cloud Resource Allocation.” Proceedings of the SIGCOMM Workshop on Distributed Cloud Computing, 2014, pp. 47--52, doi:10.1145/2627566.2627570.
Wold, Alexander, et al. “Relocatable Hardware Threads in Run-Time Reconfigurable Systems.” Proceedings of the 10th International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications, edited by Diana Goehringer et al., 2014, pp. 61–72, doi:10.1007/978-3-319-05960-0_6.
von Detten, Markus, et al. “Reengineering Component-Based Software Systems with Archimetrix.” Journal of Software and Systems Modeling, no. 4, Springer, 2014, pp. 1239--1268, doi:10.1007/s10270-013-0341-9.
Kniesburges, Sebastian, et al. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” Theory of Computing Systems, no. 3, Springer, 2014, pp. 591–612, doi:10.1007/s00224-012-9431-2.
Abshoff, Sebastian, et al. “Randomized Online Algorithms for Set Cover Leasing Problems.” Proceedings of the 8th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2014, pp. 25–34, doi:10.1007/978-3-319-12691-3_3.
Cord-Landwehr, Andreas, et al. “Quality of Service in Network Creation Games.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 423–28, doi:10.1007/978-3-319-13129-0_34.
Künsemöller, Jörn, et al. “Provider Competition in Infrastructure-as-a-Service.” Proceedings of the 2014 IEEE International Conference on Services Computing (SCC), 2014, pp. 203–10, doi:10.1109/SCC.2014.35.
Petrlic, Ronald, et al. “Privacy-Preserving Reputation Management.” Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–18, doi:10.1145/2554850.2554881.
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5, doi:10.1109/NTMS.2014.6814044.