Strotmeyer, Sebastian, et al. “Vergleichende Betrachtung von Software-Werkzeugen Zur Geschäftsmodellentwicklung.” Multikonferenz Wirtschaftsinformatik (MKWI), 2016.
N, N. Wie Wertvoll Ist Der Einzelne Für Das Team? - Performancemessung Der Bundesligaspieler Anhand Der Kooperativen Spieltheorie Der Saison 2014/2015. Universität Paderborn, 2016.
N, N. Automatisiertes Matching von Angebot Und Nachfrage in Der Kunststoffindustrie Ein Fallbeispiel in Kooperation Mit Der PINPOOLS GmbH. Universität Paderborn, 2016.
Heindorf, Stefan, et al. “Vandalism Detection in Wikidata.” Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016), 2016, pp. 327--336, doi:10.1145/2983323.2983740.
Riebler, Heinrich, et al. “Using Just-in-Time Code Generation for Transparent Resource Management in Heterogeneous Systems.” Proc. HiPEAC Workshop on Reonfigurable Computing (WRC), 2016.
Kenter, Tobias, and Christian Plessl. “Microdisk Cavity FDTD Simulation on FPGA Using OpenCL.” Proc. Workshop on Heterogeneous High-Performance Reconfigurable Computing (H2RC), 2016.
Riebler, Heinrich, et al. “Using Just-in-Time Code Generation for Transparent Resource Management in Heterogeneous Systems.” Proceedings of International Forum on Research and Technologies for Society and Industry (RTSI), IEEE, 2016, pp. 1–5, doi:10.1109/RTSI.2016.7740545.
Vaz, Gavin Francis, et al. “Potential and Methods for Embedding Dynamic Offloading Decisions into Application Code.” Computers and Electrical Engineering, vol. 55, Elsevier, 2016, pp. 91–111, doi:10.1016/j.compeleceng.2016.04.021.
Lösch, Achim, et al. “Performance-Centric Scheduling with Task Migration for a Heterogeneous Compute Node in the Data Center.” Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), EDA Consortium / IEEE, 2016, pp. 912–17.
Kenter, Tobias, et al. “Opportunities for Deferring Application Partitioning and Accelerator Synthesis to Runtime (Extended Abstract).” Workshop on Reconfigurable Computing (WRC), 2016.
John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas - Towards a Design Theory.” AIS SIGPRAG Pre-ICIS Workshop: Practice-Based Design and Innovation of Digital Artifacts, 2015.
Jakobs, Marie-Christine. “Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioning.” Proceedings of the 13th International Conference on Software Engineering and Formal Methods (SEFM), 2015, pp. 159--174, doi:10.1007/978-3-319-22969-0_12.
Blömer, Johannes, et al. “Short Group Signatures with Distributed Traceability.” Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–80, doi:10.1007/978-3-319-32859-1_14.
Gutt, Dominik, and Philipp Herrmann. “Sharing Means Caring? Hosts’ Price Reactions to Rating Visibility.” Proceedings of the 23rd European Conference on Information Systems (ECIS), Münster, 2015.
Trykacz, Matthias. Share Economy - Identifikation von konstituierenden Merkmalen anhand einer vergleichenden Betrachtung von Geschäftsmodellen. Universität Paderborn, 2015.
Arifulina, Svetlana, et al. “Market-Specific Service Compositions: Specification and Matching.” Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet, 2015, pp. 333--340, doi:10.1109/SERVICES.2015.58.
Kirsch, Michelle. Koordinierter Patentschutz in einer globalisierten Welt - Effizienz- und Anreizwirkungen auf die Arzneimittelversorgung in Entwicklungsländern. Universität Paderborn, 2015.
Czech, Mike, et al. “Just Test What You Cannot Verify!” Fundamental Approaches to Software Engineering, edited by Alexander Egyed and Ina Schaefer, 2015, pp. 100–14, doi:10.1007/978-3-662-46675-9_7.
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS Attacks.” Transactions on Parallel Computing, no. 3, ACM, 2015, pp. 18:1--18:33, doi:10.1145/2809806.
Isenberg, Tobias. “Incremental Inductive Verification of Parameterized Timed Systems.” Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD), 2015, pp. 1–9, doi:10.1109/ACSD.2015.13.
Wette, Philip, and Holger Karl. “HybridTE: Traffic Engineering for Very Low-Cost Software-Defined Data-Center Networks.” Proceedings of the 4th European Workshop on Software Defined Networks (EWSDN 2015), 2015, pp. 1--7, doi:10.1109/EWSDN.2015.57.
Scheideler, Christian, et al. “Towards Establishing Monotonic Searchability in Self-Stabilizing Data Structures.” Proceedings of the 19th International Conference on Principles of Distributed Systems (OPODIS), 2015, doi:10.4230/LIPIcs.OPODIS.2015.24.
Koutsopoulos, Andreas, et al. “Towards a Universal Approach for the Finite Departure Problem in Overlay Networks.” Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2015, pp. 201–16, doi:10.1007/978-3-319-21741-3_14.
Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed Locally Self-Adjusting Binary Search Trees.” Proceedings of the 9th International Workshop on Algorithms and Computation (WALCOM), 2015, pp. 175--186, doi:10.1007/978-3-319-15612-5_16.
Monien, Burkhard, and Marios Mavronicolas. “The Complexity of Pure Equilibria in Mix-Weighted Congestion Games on Parallel Links.” Information Processing Letters, vol. 115, no. 12, Elsevier, 2015, pp. 927–31, doi:10.1016/j.ipl.2015.07.012.
Becker, Matthias, et al. “Systematically Deriving Quality Metrics for Cloud Computing Systems.” Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, 2015, pp. 169--174, doi:10.1145/2668930.2688043.
Schwabe, Arne, and Holger Karl. “SynRace: Decentralized Load-Adaptive Multi-Path Routing without Collecting Statistics.” Proceedings of the 4th European Workshop on Software Defined Networks (EWSDN 2015), 2015, pp. 37–42, doi:10.1109/EWSDN.2015.58.
Gutt, Dominik, and Dennis Kundisch. “Rating Aggregation in Multi-Dimensional Rating Systems: How Do Reviewers Form Overall Ratings?” INFORMS Annual Meeting, 2015.
Brosig, Fabian, et al. “Quantitative Evaluation of Model-Driven Performance Analysis and Simulation of Component-Based Architectures.” Transactions on Software Engineering, no. 2, IEEE, 2015, pp. 157--175, doi:10.1109/TSE.2014.2362755.
Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs of Predicated Dataflow Analyses.” Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015, pp. 1729–36, doi:10.1145/2695664.2695690.
Hallmann, Corinna, and Leena Suhl. “Optimizing Water Tanks in Water Distribution Systems by Combining Network Reduction, Mathematical Optimization and Hydraulic Simulation.” OR Spectrum, Springer, 2015, pp. 1–19, doi:10.1007/s00291-015-0403-1.
Hallmann, Corinna. Optimierung von Wasserbehältern in einem Wasserversorgungssystem mittels einer Kombination aus Netzreduktion, mathematischer Optimierung und hydraulischer Simulation. Universität Paderborn, 2015.
Markarian, Christine, and Friedhelm Meyer auf der Heide. “Online Resource Leasing.” Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 2015, pp. 343–44, doi:10.1145/2767386.2767454.
Wiersema, Tobias, et al. “On-The-Fly Verification of Reconfigurable Image Processing Modules Based on a Proof-Carrying Hardware Approach.” Proceedings of the International Symposium in Reconfigurable Computing (ARC), 2015, pp. 365--372, doi:10.1007/978-3-319-16214-0_32.
Caragiannis, Ioannis, et al. “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure.” Transactions on Economics and Computation, vol. 3, no. 1, 2, ACM, 2015, doi:10.1145/2614687.
Blömer, Johannes, et al. “Anonymous and Publicly Linkable Reputation Systems.” Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488, doi:10.1007/978-3-662-47854-7_29.
Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” Journal of Internet Services and Applications, no. 1, Springer, 2015, pp. 1–18, doi:10.1186/s13174-015-0022-8.
Mohr, Felix. “A Metric for Functional Reusability of Services.” Proceedings of the 14th International Conference on Software Reuse (ICSR), 2015, pp. 298--313, doi:10.1007/978-3-319-14130-5_21.
Fanasch, Patrizia. Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg. Universität Paderborn, 2015.
Bubeck, Uwe, and Hans Kleine Büning. “Learning Boolean Specifications.” Artificial Intelligence, Elsevier, 2015, pp. 246–57, doi:10.1016/j.artint.2015.09.003.
Cox, Joe, and Daniel Kaimann. “How Do Reviews from Professional Critics Interact with Other Signals of Product Quality? Evidence from the Video Game Industry.” Journal of Consumer Behaviour, vol. 14, no. 6, Wiley Online Library, 2015, pp. 366–77, doi:10.1002/cb.1553.
Herrmann, Philipp, et al. “How Do Different Sources of the Variance of Consumer Ratings Matter?” Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, 2015.
Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” Computer Languages, Systems & Structures, Elsevier, 2015, pp. 116–38, doi:10.1016/j.cl.2015.05.003.
Geierhos, Michaela, et al. “Filtering Reviews by Random Individual Error.” Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015), edited by Moonis Ali et al., vol. 9101, Springer, 2015, pp. 305–15, doi:10.1007/978-3-319-19066-2_30.
Plonka, Dennis. Entwicklung von Ablösesummen und Gehälter in der Fußball-Bundesliga - Salary Caps als mögliches Modell der Chancengleichheit. Universität Paderborn, 2015.
Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977, doi:10.1145/2786805.2803181.
Jungmann, Alexander, et al. “Combining Service-Oriented Computing with Embedded Systems - A Robotics Case Study.” Proceedings of the 5th IFIP International Embedded Systems Symposium, 2015.
Mohr, Felix, et al. “Automated Online Service Composition.” Proceedings of the 12th IEEE International Conference on Services Computing (SCC), 2015, pp. 57--64, doi:10.1109/SCC.2015.18.
Drees, Maximilian, et al. “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games.” Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT), 2015, pp. 178–89, doi:10.1007/978-3-662-48433-3_14.
Jungmann, Alexander. “On Adaptivity for Automated Composition of Service Functionality.” Proceedings of the IEEE 11th World Congress on Services (SERVICES), 2015, pp. 329--332, doi:10.1109/SERVICES.2015.57.
Mäcker, Alexander, et al. “Non-Preemptive Scheduling on Machines with Setup Times.” Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings, edited by Frank Dehne et al., 2015, pp. 542--553, doi:10.1007/978-3-319-21840-3_45.
Cord-Landwehr, Andreas, and Pascal Lenzner. “Network Creation Games: Think Global - Act Local.” Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS), 2015, pp. 248--260, doi:10.1007/978-3-662-48054-0_21.
Platenius, Marie Christin, et al. “MatchBox: A Framework for Dynamic Configuration of Service Matching Processes.” Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15), 2015, pp. 75–84, doi:10.1145/2737166.2737174.
Menne, Maria Reinhild. Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG. Universität Paderborn, 2015.
Neumann, Daniel. Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich. Universität Paderborn, 2015.
Ochlast, Kerstin. Trust Me, I Am Certified - Wie Die Zertifizierung von Produkten Und Verkäufern Das Vertrauen von Kunden Im Onlinehandel Beeinflussen. Universität Paderborn, 2015.
Heindorf, Stefan, et al. “Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis.” Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15), 2015, pp. 831--834, doi:10.1145/2766462.2767804.
Li, Shouwei, et al. “Towards Flexible Demands in Online Leasing Problems.” Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON), 2015, pp. 277--288, doi:10.1007/978-3-319-21398-9_22.
Fahr, Rene, and Behnud Mir Djawadi. “‘…and They Are Really Lying’: Clean Evidence on the Pervasiveness of Cheating in Professional Contexts from a Field Experiment.” Journal of Economic Psychology, Elsevier, 2015, pp. 48–59, doi:10.1016/j.joep.2015.03.002.
John, Thomas, and Dennis Kundisch. “Why Fit Leads to Surprise: An Extension of Cognitive Fit Theory to Creative Problems.” Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, USA, 2015.
Geierhos, Michaela, et al. “What Did You Mean? Facing the Challenges of User-Generated Software Requirements.” Proceedings of the 7th International Conference on Agents and Artificial Intelligence (ICAART), Special Session on Partiality, Underspecification, and Natural Language Processing (PUaNLP 2015), edited by Stephane Loiseau et al., SciTePress - Science and Technology Publications, 2015, pp. 277–83, doi:10.5220/0005346002770283.
Monien, Burkhard, et al. “Weighted Boolean Formula Games.” The ´Festschrift´ Algorithms, Probability, Networks, and Games: Scientific Papers and Essays Dedicated to Paul G. Spirakis on the Occasion of His 60th Birthday, 2015, pp. 49–86, doi:10.1007/978-3-319-24024-4_6.
Senge, Robin, and Eyke Hüllermeier. “Fast Fuzzy Pattern Tree Learning for Classification.” IEEE Transactions on Fuzzy Systems, vol. 23, no. 6, Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 2024–33, doi:10.1109/tfuzz.2015.2396078.
Buechel, Berno, and Nils Röhl. “Robust Equilibria in Location Games.” European Journal of Operational Research, vol. 240, no. 2, Elsevier, 2015, pp. 505–17, doi:10.1016/j.ejor.2014.07.019.
Schwabe, Arne, and Holger Karl. “Topology Model to Generate Realistic Latency for Simulations.” 2015 IEEE International Conference on Communications, ICC 2015, London, United Kingdom, June 8-12, 2015, 2015, pp. 6122--6127, doi:10.1109/ICC.2015.7249298.
Peuster, Manuel, and Holger Karl. “An Architecture for Energy-Aware On-Demand Mobile Network Management.” Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges, 2015.
Monien, Burkhard, and Marios Mavronicolas. “Minimizing Expectation Plus Variance.” Theory of Computing Systems, vol. 57, no. 3, Springer, 2015, pp. 617–54, doi:10.1007/s00224-014-9542-z.
Li, Li, et al. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” 2015 International Conference on Software Engineering (ICSE), 2015, pp. 280–91.
Funke, Lukas. An LLVM Based Toolchain for Transparent Acceleration of Digital Image Processing Applications Using FPGA Overlay Architectures. Universität Paderborn, 2015.
Kenter, Tobias, et al. “Exploring Tradeoffs between Specialized Kernels and a Reusable Overlay in a Stereo-Matching Case Study.” International Journal of Reconfigurable Computing (IJRC), vol. 2015, 859425, Hindawi, 2015, doi:10.1155/2015/859425.
Damschen, Marvin, and Christian Plessl. “Easy-to-Use On-The-Fly Binary Program Acceleration on Many-Cores.” Proceedings of the 5th International Workshop on Adaptive Self-Tuning Computing Systems (ADAPT), 2015.
Damschen, Marvin, et al. “Transparent Offloading of Computational Hotspots from Binary Code to Xeon Phi.” Proceedings of the 2015 Conference on Design, Automation and Test in Europe (DATE), EDA Consortium / IEEE, 2015, pp. 1078–83, doi:10.7873/DATE.2015.1124.
Wette, Philip, et al. “MaxiNet: Distributed Emulation of Software-Defined Networks.” Proceedings of the 2014 IFIP Networking Conference (Networking 2014), 2014, pp. 1–9, doi:10.1109/IFIPNetworking.2014.6857078.
Lange, Maximilian. Was tun um Kunden von der Qualität seiner Produkte zu überzeugen - Möglichkeiten der Zertifizierung und von Reputationssystemen auf Onlinemärkten. Universität Paderborn, 2014.
Walther, Sven, and Heike Wehrheim. “Verified Service Compositions by Template-Based Construction.” Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), edited by Ivan Lanese and Eric Madelaine, 2014, pp. 31–48, doi:10.1007/978-3-319-15317-9_3.
Wette, Philip, and Holger Karl. “Using Application Layer Knowledge in Routing and Wavelength Assignment Algorithms.” Proceedings of the IEEE International Conference on Communications 2014, 2014, pp. 3270–76, doi:10.1109/ICC.2014.6883825.
Becker, Matthias, et al. “Towards Systematic Configuration for Architecture Validation.” Proceedings of the 40th Euromicro Conference on Software Engineering and Advanced Applications (Work in Progress Session), 2014.
Jungmann, Alexander, and Bernd Kleinjohann. “Towards Context-Sensitive Service Composition for Service-Oriented Image Processing.” Proceedings of the 6th International Conference on Cloud Computing Technology and Science (CloudCom), 2014, pp. 755–58, doi:10.1109/CloudCom.2014.154.
Brangewitz, Sonja, et al. “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.” Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
Meisner, Sebastian, and Marco Platzner. “Thread Shadowing: Using Dynamic Redundancy on Hybrid Multi-Cores for Error Detection.” Proceedings of the 10th International Symposium on Applied Reconfigurable Computing (ARC), edited by Diana Goehringer et al., Springer, 2014, pp. 283–90, doi:10.1007/978-3-319-05960-0_30.
Scheel, Friedrich. The Economics of Individual Behavior in Competitive Environments: Empirical Evidence from Real-Life Tournaments. Universität Paderborn, 2014.
Mohr, Felix, and Sven Walther. “Template-Based Generation of Semantic Services.” Proceedings of the 14th International Conference on Software Reuse (ICSR), 2014, pp. 188–203, doi:10.1007/978-3-319-14130-5_14.
Keller, Matthias, et al. “Template Embedding: Using Application Architecture to Allocate Resources in Distributed Clouds.” Proceedings of 7th International Conference on Utility and Cloud Computing (UCC), 2014, pp. 387--395, doi:10.1109/UCC.2014.49.
Blömer, Johannes, et al. “Tampering Attacks in Pairing-Based Cryptography.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7, doi:10.1109/FDTC.2014.10.
Blazovics, Laszlo, et al. “Surrounding Robots -- A Discrete Localized Solution for the Intruder Problem.” Journal of Advanced Computational Intelligence and Intelligent Informatics, no. 3, Fuji Technology Press Ltd., 2014, pp. 315--319, doi:10.20965/jaciii.2014.p0315.
Dräxler, Sevil, et al. “Specifying and Placing Chains of Virtual Network Functions.” Proceedings of the 3rd International Conference on Cloud Networking (CloudNet), 2014, pp. 7–13, doi:10.1109/CloudNet.2014.6968961.
Arifulina, Svetlana, et al. “SeSAME: Modeling and Analyzing High-Quality Service Compositions.” Proceedings of the 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014), 2014, pp. 839–42, doi:10.1145/2642937.2648621.
Petrlic, Ronald, et al. “Security and Privacy Challenges in On-The-Fly Computing.” Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–42.
Janiuk, Jens, et al. “Secure Distributed Data Structures for Peer-to-Peer-Based Social Networks.” Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), 2014, pp. 396–405, doi:10.1109/CTS.2014.6867595.
Brinkmann, Andre, et al. “Scheduling Shared Continuous Resources on Many-Cores.” Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2014, pp. 128–37, doi:10.1145/2612669.2612698.
Harks, Tobias, et al. “Routing Games with Progressive Filling.” Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM’14), 2014, pp. 352–60, doi:10.1109/TNET.2015.2468571.
Scheideler, Christian, et al. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122, doi:10.1007/978-3-319-14472-6_8.
Keller, Matthias, and Holger Karl. “Response Time-Optimized Distributed Cloud Resource Allocation.” Proceedings of the SIGCOMM Workshop on Distributed Cloud Computing, 2014, pp. 47--52, doi:10.1145/2627566.2627570.
Wold, Alexander, et al. “Relocatable Hardware Threads in Run-Time Reconfigurable Systems.” Proceedings of the 10th International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications, edited by Diana Goehringer et al., 2014, pp. 61–72, doi:10.1007/978-3-319-05960-0_6.
von Detten, Markus, et al. “Reengineering Component-Based Software Systems with Archimetrix.” Journal of Software and Systems Modeling, no. 4, Springer, 2014, pp. 1239--1268, doi:10.1007/s10270-013-0341-9.
Kniesburges, Sebastian, et al. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” Theory of Computing Systems, no. 3, Springer, 2014, pp. 591–612, doi:10.1007/s00224-012-9431-2.
Abshoff, Sebastian, et al. “Randomized Online Algorithms for Set Cover Leasing Problems.” Proceedings of the 8th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2014, pp. 25–34, doi:10.1007/978-3-319-12691-3_3.
Cord-Landwehr, Andreas, et al. “Quality of Service in Network Creation Games.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 423–28, doi:10.1007/978-3-319-13129-0_34.
Künsemöller, Jörn, et al. “Provider Competition in Infrastructure-as-a-Service.” Proceedings of the 2014 IEEE International Conference on Services Computing (SCC), 2014, pp. 203–10, doi:10.1109/SCC.2014.35.
Petrlic, Ronald, et al. “Privacy-Preserving Reputation Management.” Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–18, doi:10.1145/2554850.2554881.
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5, doi:10.1109/NTMS.2014.6814044.
Awerbuch, Baruch, et al. “Principles of Robust Medium Access and an Application to Leader Election.” Transactions on Algorithms, no. 4, ACM, 2014, doi:10.1145/2635818.
Huma, Zille, et al. “On-the-Fly Computing: Automatic Service Discovery and Composition in Heterogeneous Domains.” Computer Science - Research and Development, no. 3–4, Springer, 2014, pp. 333–61, doi:10.1007/s00450-014-0254-z.
Sorge, Christoph, and Ronald Petrlic. “Datenschutz Im Future Internet: Rechtliche Aspekte Und Technische Maßnahmen.” Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
Mir Djawadi, Behnud, et al. “Conceptual Model and Economic Experiments to Explain Nonpersistence and Enable Mechanism Designs Fosterin Behavioral Change.” Value in Health, no. 8, Elsevier, 2014, pp. 814–22, doi:10.1016/j.jval.2014.08.2669.
Brangewitz, Sonja, and Jan-Philip Gamp. “Competitive Outcomes and the Inner Core of NTU Market Games.” Economic Theory, no. 3, Springer, 2014, pp. 529–54, doi:10.1007/s00199-014-0846-7.
Ogierman, Adrian, et al. “Competitive MAC under Adversarial SINR.” Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759, doi:10.1109/INFOCOM.2014.6848224.
Jungmann, Alexander, et al. “Combining Automatic Service Composition with Adaptive Service Recommendation for Dynamic Markets of Services.” Proceedings of the 10th World Congress on Services (SERVICES), 2014, pp. 346–53, doi:10.1109/SERVICES.2014.68.
Becker, Matthias, et al. “Cloud Computing Reduces Uncertainties in Quality-of-Service Matching!” Proceedings of the 2nd International Workshop on Cloud Service Brokerage (CSB), 2014, pp. 153–59, doi:10.1007/978-3-319-14886-1_15.
Jakobs, Marie-Christine, and Heike Wehrheim. “Certification for Configurable Program Analysis.” Proceedings of the 21st International Symposium on Model Checking of Software (SPIN), 2014, pp. 30–39, doi:10.1145/2632362.2632372.
Drees, Maximilian, et al. “Budget-Restricted Utility Games with Ordered Strategic Decisions.” Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), edited by Ron Lavi, 2014, pp. 110–21, doi:10.1007/978-3-662-44803-8_10.
Abshoff, Sebastian, et al. “Brief Announcement: A Model for Multilevel Network Games.” Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), edited by Ron Lavi, 2014, p. 294.
Feldotto, Matthias, et al. “Bounding the Potential Function in Congestion Games and Approximate Pure Nash Equilibria.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 30–43, doi:10.1007/978-3-319-13129-0_3.
Hansknecht, Christoph, et al. “Approximate Pure Nash Equilibria in Weighted Congestion Games.” Proceedings of the 17th. International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), 2014, pp. 242–57, doi:10.4230/LIPIcs.APPROX-RANDOM.2014.242.
Gairing, Martin, et al. “Approximate Pure Nash Equilibria in Social Context Congestion Games.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 480–85, doi:10.1007/978-3-319-13129-0_43.
Jungmann, Alexander, et al. “Applying Reinforcement Learning for Resolving Ambiguity in Service Composition.” Proceedings of the 7th International Conference on Service Oriented Computing and Applications (SOCA), 2014, pp. 105–12, doi:10.1109/SOCA.2014.48.
Kniesburges, Sebastian, et al. “Algorithmic Aspects of Resource Management in the Cloud.” Proceedings of the 21st International Colloquium on Structural Information and Communication Complexity (SIROCCO), 2014, pp. 1–13, doi:10.1007/978-3-319-09620-9_1.
Feldotto, Matthias, and Alexander Skopalik. “A Simulation Framework for Analyzing Complex Infinitely Repeated Games.” Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2014), 2014, pp. 625–30, doi:10.5220/0005110406250630.
Blömer, Johannes, et al. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136, doi:10.1109/FDTC.2014.22.
Gall, Dominik, et al. “A Note on the Parallel Runtime of Self-Stabilizing Graph Linearization.” Theory of Computing Systems, no. 1, Springer, 2014, pp. 110–35, doi:10.1007/s00224-013-9504-x.
Künsemöller, Jörn, and Holger Karl. “A Game-Theoretic Approach to the Financial Benefits of Infrastructure-as-a-Service.” Future Generation Computer Systems, Elsevier, 2014, pp. 44--52, doi:10.1016/j.future.2014.03.005.
Schwabe, Arne, and Holger Karl. “Using MAC Addresses as Efficient Routing Labels in Data Centers.” Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN ’14, Chicago, Illinois, USA, August 22, 2014, 2014, pp. 115--120, doi:10.1145/2620728.2620730.
Foreback, Dianne, et al. “On Stabilizing Departures in Overlay Networks.” Proceedings of the 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2014, pp. 48--62, doi:10.1007/978-3-319-11764-5_4.
Schwichtenberg, Simon, et al. “Normalizing Heterogeneous Service Description Models with Generated QVT Transformations.” Proceedings of the 10th European Conference on Modelling Foundations and Applications (ECMFA), 2014, pp. 180–95, doi:10.1007/978-3-319-09195-2_12.
Abshoff, Sebastian, et al. “Multilevel Network Games.” Proceedings of the 10th International Conference on Web and Internet Economics (WINE), 2014, pp. 435–40, doi:10.1007/978-3-319-13129-0_36.
Scheideler, Christian, et al. “Minimum Linear Arrangement of Series-Parallel Graphs.” Proceedings of the 12th Workshop on Approximation and Online Algorithms (WAOA), 2014, pp. 168--180.
Wiersema, Tobias, et al. “Memory Security in Reconfigurable Computers: Combining Formal Verification with Monitoring.” Proceedings of the International Conference on Field-Programmable Technology (FPT), 2014, pp. 167–74, doi:10.1109/FPT.2014.7082771.
Platenius, Marie Christin, et al. “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.” Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17, doi:10.1007/978-3-319-14886-1_2.
Arifulina, Svetlana, et al. “Market-Optimized Service Specification and Matching.” Proceedings of the 12th International Conference on Service Oriented Computing (ICSOC 2014), edited by Xavier Franch et al., 2014, pp. 543–50, doi:10.1007/978-3-662-45391-9_47.
Mohr, Felix. “Issues of Automated Software Composition in AI Planning.” Proceedings of the 29th International Conference on Automated Software Engineering (ASE), 2014, pp. 895--898, doi:10.1145/2642937.2653470.
Jakobs, Marie-Christine, et al. “Integrating Software and Hardware Verification.” Proceedings of the 11th International Conference on Integrated Formal Methods (IFM), edited by Elvira Albert and Emil Sekerinski, 2014, pp. 307–22, doi:10.1007/978-3-319-10181-1_19.
Platenius, Marie Christin, et al. “Integrating Service Matchers into a Service Market Architecture.” Proceedings of the 8th European Conference on Software Architecture (ECSA 2014), edited by Paris Avgeriou and Uwe Zdun, 2014, pp. 210–17, doi:10.1007/978-3-319-09970-5_19.
Jungmann, Alexander, et al. “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.” International Journal On Advances in Intelligent Systems (IntSys), vol. 7, no. 3&4, IARIA, 2014, pp. 572--594.
Feldotto, Matthias, et al. “HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous Bandwidths.” Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing (P2P), 2014, pp. 1–10, doi:10.1109/P2P.2014.6934300.
Besova, Galina, et al. “Grammar-Based Model Transformations.” Proceedings 3rd Workshop on Model Driven Approaches in System Development (MDASD), 2014, pp. 1601–10, doi:10.1016/j.cl.2015.05.003.
Jungmann, Alexander, et al. “Evaluation of Color Spaces for Robust Image Segmentation.” Proceedings of the 9th International Conference on Computer Vision Theory and Applications (VISAPP), 2014, pp. 648–55.
Mohr, Felix. “Estimating Functional Reusability of Services.” Proceedings of the 12th International Conference on Service Oriented Computing (ICSOC), 2014, pp. 411–18.
Wiersema, Tobias, et al. “Embedding FPGA Overlays into Configurable Systems-on-Chip: ReconOS Meets ZUMA.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), 2014, pp. 1–6, doi:10.1109/ReConFig.2014.7032514.
Antoniadis, Antonios, et al. “Efficient Computation of Optimal Energy and Fractional Weighted Flow Trade-off Schedules.” Proceedings of the 31st Symposium on Theoretical Aspects of Computer Science (STACS), 2014, pp. 63--74, doi:10.4230/LIPIcs.STACS.2014.63.
Kaimann, Daniel. Decision Making under Asymmetric Information in Markets for Experience Goods: Empirical Evidence of Signaling Effects on Consumer Perceptions. Universität Paderborn, 2014.
Arzt, Steven, et al. “FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps.” Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI ’14, ACM Press, 2014, doi:10.1145/2594291.2594299.
Arzt, Steven, et al. “DroidForce: Enforcing Complex, Data-Centric, System-Wide Policies in Android.” International Conference on Availability, Reliability and Security (ARES 2014), IEEE, 2014, pp. 40–49.
Platzner, Marco, and Christian Plessl. “Verschiebungen an der Grenze zwischen Hardware und Software.” Logiken strukturbildender Prozesse: Automatismen, edited by Jörn Künsemöller et al., Wilhelm Fink, 2014, pp. 123–44.
Kenter, Tobias, et al. “Partitioning and Vectorizing Binary Applications for a Reconfigurable Vector Computer.” Proceedings of the International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications (ARC), vol. 8405, Springer International Publishing, 2014, pp. 144–55, doi:10.1007/978-3-319-05960-0_13.
Agne, Andreas, et al. “Seven Recipes for Setting Your FPGA on Fire – A Cookbook on Heat Generators.” Microprocessors and Microsystems, vol. 38, no. 8, Part B, Elsevier, 2014, pp. 911–19, doi:10.1016/j.micpro.2013.12.001.
Riebler, Heinrich, et al. “Reconstructing AES Key Schedules from Decayed Memory with FPGAs.” Proceedings of Field-Programmable Custom Computing Machines (FCCM), IEEE, 2014, pp. 222–29, doi:10.1109/FCCM.2014.67.
Agne, Andreas, et al. “Self-Awareness as a Model for Designing and Operating Heterogeneous Multicores.” ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 7, no. 2, 13, ACM, 2014, doi:10.1145/2617596.
Agne, Andreas, et al. “ReconOS - An Operating System Approach for Reconfigurable Computing.” IEEE Micro, vol. 34, no. 1, IEEE, 2014, pp. 60–71, doi:10.1109/MM.2013.110.
Vaz, Gavin Francis, et al. “Deferring Accelerator Offloading Decisions to Application Runtime.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2014, pp. 1–8, doi:10.1109/ReConFig.2014.7032509.
Kenter, Tobias, et al. “Kernel-Centric Acceleration of High Accuracy Stereo-Matching.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2014, pp. 1–8, doi:10.1109/ReConFig.2014.7032535.
Wonisch, Daniel, et al. “Zero Overhead Runtime Monitoring.” Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM), 2013, pp. 244–58, doi:10.1007/978-3-642-40561-7_17.
Wette, Philip, and Holger Karl. “Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow.” Proceedings of the ACM SIGCOMM ’13, 2013, pp. 541–42, doi:10.1145/2486001.2491710.
Tezer, Alina. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.
Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:10.1007/978-3-642-39256-6_21.
Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–64, doi:10.1109/CCNC.2013.6488456.
Kolman, Petr, and Christian Scheideler. “Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing.” Theory of Computing Systems, no. 2, Springer, 2013, pp. 341–63, doi:10.1007/s00224-013-9454-3.