Abshoff, S., Benter, M., Cord-Landwehr, A., Malatyali, M., & Meyer auf der Heide, F. (2013). Token Dissemination in Geometric Dynamic Networks. In Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers (pp. 22–34). https://doi.org/10.1007/978-3-642-45346-5_3
Frick, B., & Simmons, R. (2013). The Impact of Individual and Collective Reputation on Wine Prices: Empirical Evidence from the Mosel Valley. Journal of Business Economics, 83(2), 101–119. https://doi.org/10.1007/s11573-013-0652-x
Graffi, K., & Bremer, L. (2013). Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case. In Proceedings of the International Conference on Communications (ICC’13) (pp. 3444–3449). https://doi.org/10.1109/ICC.2013.6655082
Becker, M., Becker, S., & Meyer, J. (2013). SimuLizar: Design-Time modeling and Performance Analysis of Self-Adaptive Systems. In Proceedings of the Software Engineering Conference (SE) (pp. 71–84).
Platenius, M. C., von Detten, M., Gerth, C., Schäfer, W., & Engels, G. (2013). Service Matching under Consideration of Explicitly Specified Service Variants. In IEEE 20th International Conference on Web Services (ICWS 2013) (pp. 613–614). https://doi.org/10.1109/ICWS.2013.98
Mohr, F., & Kleine Büning, H. (2013). Semi-Automated Software Composition Through Generated Components. In Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS) (pp. 676–680). https://doi.org/10.1145/2539150.2539235
Blömer, J., Günther, P., & Krummel, V. (2013). Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 98–105).
Terentjew, A. (2013). Reputationssysteme und Gerichtsverfahren als Wekzeuge zur Sicherstellung von Qualitätsstandards in Transaktionen. Universität Paderborn.
Mohr, F., Lettmann, T., & Kleine Büning, H. (2013). Reducing Nondeterminism in Automated Service Composition. In Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA) (pp. 154–161). https://doi.org/10.1109/SOCA.2013.25
Benter, M., Neumann, F., & Frey, H. (2013). Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks. In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM) (pp. 2193–2201). https://doi.org/10.1109/INFCOM.2013.6567022
Wonisch, D., Schremmer, A., & Wehrheim, H. (2013). Programs from Proofs – A PCC Alternative. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV) (pp. 912–927). https://doi.org/10.1007/978-3-642-39799-8_65
Kling, P., & Pietrzyk, P. (2013). Profitable Scheduling on Multiple Speed-Scalable Processors. In Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (pp. 251–260). https://doi.org/10.1145/2486159.2486183
Becker, M., Luckey, M., & Becker, S. (2013). Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time. In Proceedings of the 9th ACM SigSoft International Conference on Quality of Software Architectures (QoSA’13) (pp. 43–52). https://doi.org/10.1145/2465478.2465489
Engels, G. (2013). On-The-Fly Computing -- Das Entwicklungs- und Betriebsparadigma fürSoftwaresysteme der Zukunft. In Proceedings of the Multikonferenz Sofware Engineering 2013 (SE 2013) (pp. 17–18).
Abshoff, S., Benter, M., Malatyali, M., & Meyer auf der Heide, F. (2013). On Two-Party Communication Through Dynamic Networks. In Proceedings of the 17th International Conference on Principles of Distributed Systems (OPODIS) (pp. 11–22). https://doi.org/10.1007/978-3-319-03850-6_2
Wette, P., & Karl, H. (2013). On the Quality of Selfish Virtual Topology Reconfiguration in IP-over-WDM Networks. In Proceedings of the 19th IEEE International Workshop on Local and Metropolitan Area Networks (IEEE LANMAN) (pp. 1–6). https://doi.org/10.1109/LANMAN.2013.6528271
Autenrieth, M., & Frey, H. (2013). On Greedy Routing in Degree-bounded Graphs over d-Dimensional Internet Coordinate Embeddings. In Proceedings of the Conference on Networked Systems (NetSys) (pp. 126–131). https://doi.org/10.1109/NetSys.2013.10
Avin, C., Häupler, B., Lotker, Z., Scheideler, C., & Schmid, S. (2013). Locally Self-Adjusting Tree Networks. In Proceedings of the 27th IEEE International Parallel and Distributed Processing Symposium (IPDPS) (pp. 395–406). https://doi.org/10.1109/IPDPS.2013.40
Brangewitz, S., & Haake, C.-J. (2013). Cooperative Transfer Price Negotiations under Incomplete Information (Vol. 64). CIE Working Paper Series, Paderborn University.
Jungmann, A., Kleinjohann, B., & Kleinjohann, E. (2013). Learning Service Recommendations. International Journal of Business Process Integration and Management, (4), 284–297. https://doi.org/10.1504/IJBPIM.2013.059135
Jungmann, A., & Kleinjohann, B. (2013). Learning Recommendation System for Automated Service Composition. In Proceedings of the 10th IEEE International Conference on Services Computing (SCC) (pp. 97–104). https://doi.org/10.1109/SCC.2013.66
Walther, S., & Wehrheim, H. (2013). Knowledge-Based Verification of Service Compositions - An SMT approach. In Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS) (pp. 24–32). https://doi.org/10.1109/ICECCS.2013.14
Eikel, M., & Scheideler, C. (2013). IRIS: A Robust Information System Against Insider DoS-Attacks. In Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (pp. 119–129). https://doi.org/10.1145/2486159.2486186
Wette, P., & Karl, H. (2013). Incorporating feedback from application layer into routing and wavelength assignment algorithms. In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM) (pp. 51–52). https://doi.org/10.1109/INFCOMW.2013.6970733
Mavronicolas, M., Monien, B., & Papadopoulou Lesta, V. (2013). How many attackers can selfish defenders catch? Discrete Applied Mathematics, 161(16–17), 2563–2586. https://doi.org/10.1016/j.dam.2013.05.022
Christin Platenius, M. (2013). Fuzzy Service Matching in On-The-Fly Computing. In Proceedings of the Doctoral Symposium of the 9th joint meeting of the European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE) (pp. 715–718). https://doi.org/10.1145/2491411.2492405
Heinzemann, C., & Becker, S. (2013). Executing Reconfigurations in Hierarchical Component Architectures. In Proceedings of the 16th International ACM SigSoft Symposium on Component-Based Software Engineering (CBSE) (pp. 3–12). https://doi.org/10.1145/2465449.2465452
Graffi, K., & Rapp, V. (2013). Continuous Gossip-based Aggregation through Dynamic Information Aging. In Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13) (pp. 1–7). https://doi.org/10.1109/ICCCN.2013.6614118
Kniesburges, S., Koutsopoulos, A., & Scheideler, C. (2013). CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system. In Proceedings of the 27th International Symposium on Distributed Computing (DISC) (pp. 537–549). https://doi.org/10.1007/978-3-642-41527-2_37
Feldotto, M., & Graffi, K. (2013). Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM. In Proceedings of the International Conference on High Performance Computing and Simulation (HPCS’13) (pp. 99–106). https://doi.org/10.1109/HPCSim.2013.6641399
Graffi, K., Benter, M., Divband, M., Kniesburges, S., & Koutsopoulos, A. (2013). Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network. In Proceedings of the Conference on Networked Systems (NetSys) (pp. 27–34). https://doi.org/10.1109/NetSys.2013.11
Graffi, K., & Klerx, T. (2013). Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured Peer-to-Peer Networks. In Proceedings of the International Conference on Peer-to-Peer Computing (P2P’13) (pp. 1–5). https://doi.org/10.1109/P2P.2013.6688720
Huma, Z., Gerth, C., Engels, G., & Juwig, O. (2013). Automated Service Composition for On-the-Fly SOAs. In Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC’13) (pp. 524--532). https://doi.org/10.1007/978-3-642-45005-1_42
Kohn, K. (2013). Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn.
Hallmann, C. (2013). An Approach for a Decision Support Systems to optimize Water Tanks in Water Supply Systems by combining Network Reduction, Optimization and Simulation. Universität Paderborn.
Flocchini, P., Gao, J., Kranakis, E., & Meyer auf der Heide, F. (Eds.). (2013). Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (Vol. 8243). Presented at the ALGOSENSORS 2013, Sophia Antipolis, France: Springer. https://doi.org/10.1007/978-3-642-45346-5
Wette, P., & Graffi, K. (2013). Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables. In Proceedings of the Conference on Networked Systems (NetSys) (pp. 35–42). https://doi.org/10.1109/NetSys.2013.9
Platenius, M., von Detten, M., Becker, S., Schäfer, W., & Engels, G. (2013). A Survey of Fuzzy Service Matching Approaches in the Context of On-The-Fly Computing. In Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based Software Engineering (pp. 143–152). https://doi.org/10.1145/2465449.2465454
Petrlic, R., Sekula, S., & Sorge, C. (2013). A privacy-friendly Architecture for future Cloud Computing. International Journal of Grid and Utility Computing, (4), 265–277. https://doi.org/10.1504/IJGUC.2013.057120
Keller, M., Pawlik, S., Pietrzyk, P., & Karl, H. (2013). A Local Heuristic for Latency-Optimized Distributed Cloud Deployment. In Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing (pp. 429–434). https://doi.org/10.1109/UCC.2013.85
Markarian, C., Meyer auf der Heide, F., & Schubert, M. (2013). A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks. In Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS) (pp. 217–227). https://doi.org/10.1007/978-3-642-45346-5_16
Kniesburges, S., Koutsopoulos, A., & Scheideler, C. (2013). A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery. In Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO) (pp. 165–176). https://doi.org/10.1007/978-3-319-03578-9_14
Riebler, H., Kenter, T., Sorge, C., & Plessl, C. (2013). FPGA-accelerated Key Search for Cold-Boot Attacks against AES. Proceedings of the International Conference on Field-Programmable Technology (FPT), 386–389. https://doi.org/10.1109/FPT.2013.6718394
Happe, M., Kling, P., Plessl, C., Platzner, M., & Meyer auf der Heide, F. (2013). On-The-Fly Computing: A Novel Paradigm for Individualized IT Services. Proceedings of the 9th IEEE Workshop on Software Technology for Future Embedded and Ubiquitous Systems (SEUS). https://doi.org/10.1109/ISORC.2013.6913232
Haake, C.-J., Krieger, T., & Minter, S. (2012). On the institutional design of burden sharing when financing external border enforcement in the EU. International Economics and Economic Policy, 10(4), 583–612. https://doi.org/10.1007/s10368-012-0226-3
Jungmann, A., & Kleinjohann, B. (2012). Towards the Application of Reinforcement Learning Techniques for Quality-Based Service Selection in Automated Service Composition. In Proceedings of the 9th IEEE International Conference on Service Computing (SCC) (pp. 701–702). https://doi.org/10.1109/SCC.2012.76
Becker, S., Heinzemann, C., & Priesterjahn, C. (2012). Towards Modeling Reconfiguration in Hierarchical Component Architectures. In Proceedings of the 15th ACM SigSoft International Symposium on Component-Based Software Engineering (CBSE) (pp. 23--28). https://doi.org/10.1145/2304736.2304742
Jacob, R., Ritscher, S., Scheideler, C., & Schmid, S. (2012). Towards higher-dimensional topological self-stabilization: A distributed algorithm for Delaunay graphs. Theoretical Computer Science, 137–148. https://doi.org/10.1016/j.tcs.2012.07.029
Jungmann, A., & Kleinjohann, B. (2012). Towards an Integrated Service Rating and Ranking Methodology for Quality Based Service Selection in Automatic Service Composition. In Proceedings of the 4th International Conferences on Advanced Service Computing (SERVICE COMPUTATION) (pp. 43–47).
Huma, Z., Gerth, C., Engels, G., & Juwig, O. (2012). Towards an Automatic Service Discovery for UML-based Rich Service Descriptions. In Proceedings of the ACM/IEEE 15th International Conference on Model Driven Engineering Languages and Systems (MoDELS) (pp. 709--725). https://doi.org/10.1007/978-3-642-33666-9_45
Arifulina, S. (2012). Towards a Framework for the Integration of Modeling Languages. In U. W. Eisenecker & C. Bucholdt (Eds.), Proceedings of the Doctoral Symposium of the 5th International Conference on Software Language Engineering 2012, Dresden, Germany (SLE (Doctoral Symposium)) (pp. 23--26).
Clouser, T., Nesterenko, M., & Scheideler, C. (2012). Tiara: A self-stabilizing deterministic skip list and skip graph. Theoretical Computer Science, 18–35. https://doi.org/10.1016/j.tcs.2011.12.079
Richa, A. W., & Scheideler, C. (Eds.). (2012). Stabilization, Safety, and Security of Distributed Systems. Presented at the Stabilization, Safety, and Security of Distributed Systems (SSS), Paderborn, Germany. https://doi.org/10.1007/978-3-642-33536-5
Damerow, V., Manthey, B., Meyer auf der Heide, F., Räcke, H., Scheideler, C., Sohler, C., & Tantau, T. (2012). Smoothed analysis of left-to-right maxima with applications. Transactions on Algorithms, (3), 30. https://doi.org/10.1145/2229163.2229174
Cord-Landwehr, A., Kling, P., & Mallmann Trenn, F. (2012). Slow Down & Sleep for Profit in Online Deadline Scheduling. In G. Even & D. Rawitz (Eds.), Proceedings of the 1st Mediterranean Conference on Algorithms (MedAlg) (pp. 218–231). https://doi.org/10.1007/978-3-642-34862-4_17
Drees, M., Hüllmann (married name: Eikel), M., Koutsopoulos, A., & Scheideler, C. (2012). Self-Organizing Particle Systems. In Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS) (pp. 1272–1283). https://doi.org/10.1109/IPDPS.2012.116
Petrlic, R. (2012). Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme. In Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS) (pp. 194–211). https://doi.org/10.1007/978-3-642-35362-8_16
Plessl, C., Platzner, M., Agne, A., Happe, M., & Lübbers, E. (2012). Programming models for reconfigurable heterogeneous multi-cores. Awareness Magazine.
Petrlic, R., & Sorge, C. (2012). Privacy-Preserving DRM for Cloud Computing. In Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA) (pp. 1286–1291). https://doi.org/10.1109/WAINA.2012.92
Petrlic, R. (2012). Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 958–963). https://doi.org/10.1109/TrustCom.2012.225
Wonisch, D., & Wehrheim, H. (2012). Predicate Analysis with Block-Abstraction Memoization. In Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) (pp. 332–347). https://doi.org/10.1007/978-3-642-34281-3_24
Becker, M., Luckey, M., & Becker, S. (2012). Model-Driven Performance Engineering of Self-Adaptive Systems: A Survey. In Proceedings of the 8th ACM SigSoft International Conference on Quality of Software Architectures (QoSA’12) (pp. 117–122). https://doi.org/10.1145/2304696.2304716
Mavronicolas, M., & Monien, B. (2012). Minimizing Expectation Plus Variance. In Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT) (pp. 239–250). https://doi.org/10.1007/978-3-642-33996-7_21
Wette, P., & Karl, H. (2012). Introducing feedback to preemptive routing and wavelength assignment algorithms for dynamic traffic scenarios. Universität Paderborn.
Seier, H. (2012). Implementierung eines Branch-and-Bound-Algorithmus für nichtkonvexe gemischt-ganzzahlige Optimierungsprobleme mit quadratischen Nebenbedingungen. Universität Paderborn.
Isenberg, F. (2012). Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung. Universität Paderborn.
Löken, N. (2012). Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn.
Timm, N., Wehrheim, H., & Czech, M. (2012). Heuristic-Guided Abstraction Refinement for Concurrent Systems. In Proceedings of the 14th International Conference on Formal Engineering Methods (ICFEM) (pp. 348–363). https://doi.org/10.1007/978-3-642-34281-3_25
Wohlfarth, S. (2012). Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens. Universität Paderborn.
Jungmann, A., Kleinjohann, B., Kleinjohann, E., & Bieshaar, M. (2012). Efficient Color-Based Image Segmentation and Feature Classification for Image Processing in Embedded Systems. In Proceedings of the Fourth International Conference on Resource Intensive Applications and Services (INTENSIVE) (pp. 22–29).
Brandes, P., & Meyer auf der Heide, F. (2012). Distributed Computing in Fault-Prone Dynamic Networks. In Proceedings of the 4th Workshop on Theoretical Aspects of Dynamic Distributed Systems (TADDS) (pp. 9–14). https://doi.org/10.1145/2414815.2414818
Arifulina, S., Engels, G., & Soltenborn, C. (2012). Coverage Criteria for Testing DMM Specifications. In Proceedings of the 11th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT). https://doi.org/10.14279/tuj.eceasst.47.718
Richa, A. W., Scheideler, C., Schmid, S., & Zhang, J. (2012). Competitive and fair throughput for co-existing networks under adversarial interference. In Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC) (pp. 291–300). https://doi.org/10.1145/2332432.2332488
Schmid, S., Avin, C., Scheideler, C., Häupler, B., & Lotker, Z. (2012). Brief Announcement: SplayNets - Towards Self-Adjusting Distributed Data Structures. In Proceedings of the 26th International Symposium on Distributed Computing (DISC) (pp. 439–440). https://doi.org/10.1007/978-3-642-33651-5_47
Kniesburges, S., & Scheideler, C. (2012). Brief Announcement: Hashed Predecessor Patricia Trie - A Data Structure for Efficient Predecessor Queries in Peer-to-Peer Systems. In Proceedings of the 26th International Symposium on Distributed Computing (DISC) (pp. 435–436). https://doi.org/10.1007/978-3-642-33651-5_45
Wonisch, D. (2012). Block Abstraction Memoization for CPAchecker. In Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) (pp. 531–533). https://doi.org/10.1007/978-3-642-28756-5_41
Cord-Landwehr, A., Huellmann (married name: Eikel), M., Kling, P., & Setzer, A. (2012). Basic Network Creation Games with Communication Interests. In Proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT) (pp. 72--83). https://doi.org/10.1007/978-3-642-33996-7_7
Platenius, M. C., von Detten, M., & Becker, S. (2012). Archimetrix: Improved Software Architecture Recovery in the Presence of Design Deficiencies. In Proceedings of the 16th European Conference on Software Maintenance and Reengineering (CSMR) (pp. 255–264). https://doi.org/10.1109/CSMR.2012.33
von Detten, M. (2012). Archimetrix: A Tool for Deficiency-Aware Software Architecture Reconstruction. In Proceedings of the 19th Working Conference on Reverse Engineering (WCRE) (pp. 503–504). https://doi.org/10.1109/WCRE.2012.61
Kolman, P., & Scheideler, C. (2012). Approximate Duality of Multicommodity Multiroute Flows and Cuts: Single Source Case. In Proceedings of the 23th ACM SIAM Symposium on Discrete Algorithms (SODA) (pp. 800–810). https://doi.org/10.1137/1.9781611973099.64
Dohle (married name: Hallmann) , C., & Suhl, L. (2012). An Optimization Model for the optimal Usage of Water Tanks in Water Supply Systems. In Proceedings of the International Conference on Applied Mathematical Optimization and Modelling (APMOD) (pp. 404–408).
Meyer auf der Heide, F., Pietrzyk, P., & Kling, P. (2012). An Algorithm for Facility Leasing. In Proceedings of the 19th International Colloquium on Structural Information & Communication Complexity (SIROCCO) (pp. 61–72). https://doi.org/10.1007/978-3-642-31104-8_6
Huma, Z., Gerth, C., Engels, G., & Juwig, O. (2012). A UML-based Rich Service Description for Automatic Service Discovery. In Proceedings of the Forum at the CAiSE’12 Conference on Advanced Information Systems Engineering (pp. 90--97).
Kniesburges, S., Koutsopoulos, A., & Scheideler, C. (2012). A Self-Stabilization Process for Small-World Networks. In Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS) (pp. 1261--1271). https://doi.org/10.1109/IPDPS.2012.115
Bodden, E., Lam, P., & Hendren, L. (2012). Partially Evaluating Finite-State Runtime Monitors Ahead of Time. ACM Transactions on Programming Languages and Systems, 34(2), 1–52. https://doi.org/10.1145/2220365.2220366
Besova, G., Walther, S., Wehrheim, H., & Becker, S. (2012). Weaving-based configuration and modular transformation of multi-layer systems. In Proceedings of the 15th International Conference on Model Driven Engineering Languages & Systems (MoDELS) (pp. 776–792). https://doi.org/10.1007/978-3-642-33666-9_49
Happe, M., Hangmann, H., Agne, A., & Plessl, C. (2012). Eight Ways to put your FPGA on Fire – A Systematic Study of Heat Generators. Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig), 1–8. https://doi.org/10.1109/ReConFig.2012.6416745
Kenter, T., Plessl, C., & Schmitz, H. (2012). Pragma based parallelization - Trading hardware efficiency for ease of use? Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), 1–8. https://doi.org/10.1109/ReConFig.2012.6416773
Happe, M., Agne, A., Plessl, C., & Platzner, M. (2012). Hardware/Software Platform for Self-aware Compute Nodes. Proceedings of the Workshop on Self-Awareness in Reconfigurable Computing Systems (SRCS), 8–9.
Barrio, P., Carreras, C., Sierra, R., Kenter, T., & Plessl, C. (2012). Turning control flow graphs into function calls: Code generation for heterogeneous architectures. Proceedings of the International Conference on High Performance Computing and Simulation (HPCS), 559–565. https://doi.org/10.1109/HPCSim.2012.6266973
Rüthing, C., Happe, M., Agne, A., & Plessl, C. (2012). Exploration of Ring Oscillator Design Space for Temperature Measurements on FPGAs. Proceedings of the International Conference on Field Programmable Logic and Applications (FPL), 559–562. https://doi.org/10.1109/FPL.2012.6339370
Dimitrov, D., & Haake, C.-J. (2011). Proportionality and the power of unequal parties. International Journal of Economic Theory, 7(2), 189–200. https://doi.org/10.1111/j.1742-7363.2011.00158.x
von Detten, M. (2011). Towards Systematic, Comprehensive Trace Generation for Behavioral Pattern Detection through Symbolic Execution. In Proceedings of the 10th ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE) (pp. 17–20). https://doi.org/10.1145/2024569.2024573
Doerr, B., Goldberg, L. A., Minder, L., Sauerwald, T., & Scheideler, C. (2011). Stabilizing consensus with the power of two choices. In Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (pp. 149–158). https://doi.org/10.1145/1989493.1989516
Richa, A. W., & Scheideler, C. (2011). Self-Stabilizing DeBruijn Networks. In Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS) (pp. 416–430). https://doi.org/10.1007/978-3-642-24550-3_31
Leuschel, M., & Wehrheim, H. (2011). Selected papers on Integrated Formal Methods (iFM09). Science of Computer Programming, (10), 835--836. https://doi.org/10.1016/j.scico.2011.01.009
Gerth, C., Luckey, M., Küster, J., & Engels, G. (2011). Precise Mappings between Business Process Models in Versioning Scenarios. In Proceedings of the IEEE 8th International Conference on Service Computingt (SCC) (pp. 218--225). https://doi.org/10.1109/SCC.2011.65
Lehrig, S., & Zolynski, T. (2011). Performance Prototyping with ProtoCom in a Virtualised Environment: A Case Study. In Proceedings of the Palladio Days 2011 (pp. 15–22). https://doi.org/10.5445/IR/1000025188
Graffi, K. (2011). PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned. In Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP) (pp. 154–155). https://doi.org/10.1109/P2P.2011.6038673
Meyer, J. (2011). Modellgetriebene Skalierbarkeitsanalyse von selbst-adaptiven Komponentenbasierten Softwaresystemen in der Cloud. Universität Paderborn.
Abshoff, S., Cord-Landwehr, A., Degener, B., Kempkes, B., & Pietrzyk, P. (2011). Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks. In Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS) (pp. 13–27). https://doi.org/10.1007/978-3-642-28209-6_3
Nesterenko, M., Mohd, R., & Scheideler, C. (2011). Corona: A Stabilizing Deterministic Message-Passing Skip List. In Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS) (pp. 356--370). https://doi.org/10.1007/978-3-642-24550-3_27
Gehweiler, J., Kling, P., & Meyer auf der Heide, F. (2011). An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment. In Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM) (pp. 31--40). https://doi.org/10.1007/978-3-642-31500-8_4
Drzevitzky, S., & Platzner, M. (2011). Achieving Hardware Security for Reconfigurable Systems on Chip by a Proof-Carrying Code Approach. In Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC) (pp. 58–65). https://doi.org/10.1109/ReCoSoC.2011.5981499
Meyer auf der Heide, F., & Rajaraman, R. (Eds.). (2011). 23rd Annual ACM Symposium on Parallelism in Algorithms and Architectures. https://doi.org/10.1145/1989493
Happe, M., Agne, A., & Plessl, C. (2011). Measuring and Predicting Temperature Distributions on FPGAs at Run-Time. Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), 55–60. https://doi.org/10.1109/ReConFig.2011.59