Riebler, Heinrich. Efficient Parallel Branch-and-Bound Search on FPGAs Using Work Stealing and Instance-Specific Designs. 2019, doi:10.17619/UNIPB/1-830.
Blömer, Johannes, et al. “Updatable Anonymous Credentials and Applications to Incentive Systems.” Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019, doi:10.1145/3319535.3354223.
Dräxler, Sevil, et al. “Generating Resource and Performance Models for Service Function Chains: The Video Streaming Case.” 4th IEEE International Conference on Network Softwarization (NetSoft 2018), IEEE, 2018, pp. 318--322, doi:10.1109/NETSOFT.2018.8460029.
Dräxler, Sevil, et al. “ Scaling and Placing Bidirectional Services with Stateful Virtual and Physical Network Functions.” 4th IEEE International Conference on Network Softwarization (NetSoft 2018), IEEE, 2018, pp. 123--131.
Feldkord, Björn, et al. “Fully-Dynamic Bin Packing with Little Repacking.” 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018), edited by Ioannis Chatzigiannakis et al., vol. 107, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, pp. 51:1-51:24, doi:10.4230/LIPIcs.ICALP.2018.51.
Szopinski, Daniel, and Dennis Kundisch. “Business Model Idea Generation: An Exploratory Study on Changing Perspectives.” 2nd Business Model Conference, 2018.
Blömer, Johannes, et al. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, 2018, pp. 470–90, doi:10.1007/978-3-319-76953-0_25.
Auroux, Sébastien, and Holger Karl. Distributed Placement of Virtualized Control Applications in Mobile Backhaul Networks. Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2018, doi: 10.1109/WCNC.2018.8377335.
Görzen, Thomas, and Florian Laux. “Extracting the Wisdom from the Crowd: A Comparison of Approaches to Aggregating Collective Intelligence.” Tagungsband Multikonferenz Wirtschaftsinformatik 2018 (MKWI), 2018.
Blömer, Johannes, and Kathlén Kohn. “Voronoi Cells of Lattices with Respect to Arbitrary Norms.” SIAM Journal on Applied Algebra and Geometry., vol. 2, no. 2, 2018, pp. 314–38, doi:10.1137/17M1132045.
Bemmann, Kai, et al. “Fully-Featured Anonymous Credentials with Reputation System.” Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, doi:10.1145/3230833.3234517.
Peuster, Manuel, et al. “ Let the State Follow Its Flows: An SDN-Based Flow Handover Protocol to Support State Migration.” 4th IEEE International Conference on Network Softwarization (NetSoft 2018), doi:10.1109/NETSOFT.2018.8460007.
Peuster, Manuel, et al. “Containernet 2.0: A Rapid Prototyping Platform for Hybrid Service Function Chains.” 4th IEEE International Conference on Network Softwarization (NetSoft 2018), doi:10.1109/NETSOFT.2018.8459905.
Peuster, Manuel, et al. “Emulation-Based Smoke Testing of NFV Orchestrators in Large Multi-PoP Environments.” European Conference on Networks and Communications (EuCNC), doi:10.1109/EuCNC.2018.8442701.
Lösch, Achim, et al. “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes.” Proceedings of the International Conference on Architecture of Computing Systems (ARCS), vol. 10793, Springer International Publishing, 2018, pp. 73–84, doi:10.1007/978-3-319-77610-1_6.
Robinson, Peter, et al. “Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.” Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), doi:10.1145/3210377.3210399.
Jazayeri, Bahar, et al. “Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions.” Proceeding of International Symposium on Business Modeling and Software Design, vol. 319, Springer, 2018, pp. 390–400, doi:10.1007/978-3-319-94214-8_30.
König, Jürgen, et al. “Scheduling with Interjob Communication on Parallel Processors.” Journal of Combinatorial Optimization, vol. 36, no. 4, 2018, pp. 1356–79, doi:10.1007/s10878-018-0325-3.
Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, ACM, pp. 25:1--25:10, doi:10.1145/3230833.3230853.
Dräxler, Sevil, et al. “JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services.” IEEE Transactions on Network and Service Management, IEEE, 2018, doi:10.1109/TNSM.2018.2846572.
Funke, Lars Christian. Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM. 2018.
Scheideler, Christian. “Relays: Towards a Link Layer for Robust and Secure Fog Computing.” Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 2018, pp. 1–2, doi:10.1145/3229774.3229781.
Peuster, Manuel, and Holger Karl. “Understand Your Chains and Keep Your Deadlines: Introducing Time-Constrained Profiling for NFV.” IEEE/IFIP 14th International Conference on Network and Service Management (CNSM), IEEE/IFIP.
Bohn, Nicolai, and Dennis Kundisch. “An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model.” Proceedings of the 39th International Conference on Information Systems (ICIS), 2018.
Szopinski, Daniel. “Towards Software-Based Tools for Business Model Development: Using External Stimuli for Business Model Idea Generation.” Bosch Business Model Innovation Summit 2018, 2018.
Scheideler, Christian, and Alexander Setzer. “Relays: A New Approach for the Finite Departure Problem in Overlay Networks.” Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), 2018, doi:10.1007/978-3-030-03232-6_16.
Jazayeri, Bahar, et al. “Patterns of Store-Oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options.” The Latin American Conference on Pattern Languages of Programs (SLPLoP), ACM. To appear, 2018.
Lösch, Achim, and Marco Platzner. “A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes.” 2018 IEEE 29th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), IEEE, 2018, doi:10.1109/asap.2018.8445098.
Peuster, Manuel, et al. “A Prototyping Platform to Validate and Verify Network Service Header-Based Service Chains.” IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN) 5GNetApp, IEEE, 2018.
Schneider, Stefan Balthasar, et al. “Trade-Offs in Dynamic Resource Allocation in Network Function Virtualization.” IEEE Global Communications Conference (GLOBECOM 2018), IEEE, 2018.
Schneider, Stefan Balthasar, et al. “A Generic Emulation Framework for Reusing and Evaluating VNF Placement Algorithms.” IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018, doi:10.1109/NFV-SDN.2018.8725795.
Schneider, Stefan Balthasar, et al. “A Fully Integrated Multi-Platform NFV SDK.” IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2018), IEEE, 2018, doi:10.1109/NFV-SDN.2018.8725794.
John, Thomas, and Daniel Szopinski. “Towards Explaining the Popularity of the Business Model Canvas: A Dual Coding Approach.” Proceedings of the Multikonferenz Wirtschaftsinformatik 2018 (MKWI), Lüneburg, Germany, 2018.
Valentin, Andreas. Zweiseitige Märkte und Plattformökonomie in der Information Systems-Forschung - Ein klassifizierender Literaturüberblick. Universität Paderborn, 2018.
Blömer, Johannes, et al. “Enhanced Security of Attribute-Based Signatures.” The International Conference on Cryptology And Network Security (CANS), vol. 11124, Springer, 2018, pp. 235–55, doi:10.1007/978-3-030-00434-7_12.
Kenter, Tobias, et al. “OpenCL-Based FPGA Design to Accelerate the Nodal Discontinuous Galerkin Method for Unstructured Meshes.” Proc. Int. Symp. on Field-Programmable Custom Computing Machines (FCCM), IEEE, 2018, doi:10.1109/FCCM.2018.00037.
Riebler, Heinrich, et al. “Automated Code Acceleration Targeting Heterogeneous OpenCL Devices.” Proc. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), ACM, 2018, doi:10.1145/3178487.3178534.
Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:10.1007/978-3-319-72453-9_35.
Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” Foundations and Practice of Security, Springer International Publishing, 2017, pp. 3–17, doi:10.1007/978-3-319-75650-9_1.
Szopinski, Daniel, et al. “How Software Can Support Innovating Business Models: A Taxonomy of Functions of Business Model Development Tools.” Proceedings of the 23rd Americas Conference on Information Systems (AMCIS), 2017.
Szopinski, Daniel, et al. “How Software Can Support Innovating Business Models: A Taxonomy of Functions of Business Model Development Tools.” Bosch Business Model Innovation Summit 2017, 2017.
Kundisch, Dennis, and Thomas John. “Geschäftsmodell-Modellierungssprache/Business Model Modeling Language.” Enzyklopädie der Wirtschaftsinformatik, GITO, 2017.
Szopinski, Daniel, et al. “On-The-Fly Computing: Ein Referenzmodell Für Individualisierte IT-Dienstleistungen in Dynamischen Märkten.” Proceedings of the Workshop Enterprise Architecture Management in Forschung Und Praxis, INFORMATIK 2017, Chemnitz, Germany, GI, 2017, pp. 2059–66.
Jazayeri, Bahar, and Simon Schwichtenberg. “On-The-Fly Computing Meets IoT Markets - Towards a Reference Architecture.” Proceedings of the International Conference on Software Architecture (ICSA) IoT-ASAP Workshop, IEEE, 2017, pp. 120--127, doi:10.1109/ICSAW.2017.59.
Mäcker, Alexander, et al. “Non-Clairvoyant Scheduling to Minimize Max Flow Time on a Machine with Setup Times.” Proceedings of the 15th Workshop on Approximation and Online Algorithms (WAOA), vol. 10787, Springer, 2017, pp. 207–22, doi:10.1007/978-3-319-89441-6.
Jazayeri, Bahar, and Simon Schwichtenberg. “On the Necessity of an Architecture Framework for On-The-Fly Computing.” Proceedings of Softwaretechnik-Trends Workshops, vol. 37, 2, Gesellschaft für Informatik eV, Fachgruppe PARS, 2017.
Dräxler, Sevil, and Holger Karl. “Specification, Composition, and Placement of Network Services with Flexible Structures.” International Journal of Network Management, no. 2, Wiley Online Library, 2017, pp. 1--16, doi:10.1002/nem.1963.
Kling, Peter, et al. “Sharing Is Caring: Multiprocessor Scheduling with a Sharable Resource.” Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2017, pp. 123--132, doi:10.1145/3087556.3087578.
Keller, Matthias, and Holger Karl. “Response-Time-Optimised Service Deployment: MILP Formulations of Piece-Wise Linear Functions Approximating Non-Linear Bivariate Mixed-Integer Functions.” IEEE Transactions on Network and Service Management, no. 1, IEEE, 2017, pp. 121--135, doi:10.1109/TNSM.2016.2611590.
John, Thomas, et al. “Visual Languages for Modeling Business Models: A Critical Review and Future Research Directions.” Proceedings of the 38th International Conference on Information Systems (ICIS), Seoul, South Korea, 2017.
Mäcker, Alexander, et al. “Cost-Efficient Scheduling on Machines from the Cloud.” Journal of Combinatorial Optimization, vol. 36, no. 4, Springer, 2017, pp. 1168–94, doi:10.1007/s10878-017-0198-x.
Dräxler, Sevil, et al. “SONATA: Service Programming and Orchestration for Virtualized Software Networks.” 2017 IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, 2017, doi:10.1109/iccw.2017.7962785.
Dräxler, Sevil, et al. “Joint Optimization of Scaling and Placement of Virtual Network Services.” Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017), 2017, doi:10.1109/CCGRID.2017.25.
Peuster, Manuel, and Holger Karl. “Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments.” IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN), 2017, doi:10.1109/NFV-SDN.2017.8169826.
John, Thomas, and Daniel Szopinski. “Towards Explaining the Popularity of the Business Model Canvas: A Dual-Coding Approach.” 1st Business Model Conference, 2017.
Lösch, Achim, and Marco Platzner. “ReMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements.” Proceedings of the 28th Annual IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP), 2017, doi:10.1109/ASAP.2017.7995272.
Drees, Maximilian, et al. “Pure Nash Equilibria in Restricted Budget Games.” Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON), 2017, pp. 175--187, doi:10.1007/978-3-319-62389-4_15.
Antoniadis, Antonios, et al. “Continuous Speed Scaling with Variability: A Simple and Direct Approach.” Theoretical Computer Science, Elsevier, 2017, pp. 1–13, doi:10.1016/j.tcs.2017.03.021.
Jazayeri, Bahar, et al. A Variability Model for Store-Oriented Software Ecosystems: An Enterprise Perspective (Supplementary Material). Universität Paderborn, 2017.
Jazayeri, Bahar, et al. “A Variability Model for Store-Oriented Software Ecosystems: An Enterprise Perspective.” Proceedings of the 15th International Conference on Service Oriented Computing (ICSOC), vol. 10601, Springer, 2017, doi:10.1007/978-3-319-69035-3_42.
Rehmer, Lennart. Erweiterung eines kontextsensitiven Autovervollständigungstools zur natürlichsprachlichen Softwarespezifikation. Universität Paderborn, 2017.
Riebler, Heinrich, et al. “Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific Designs.” ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 10, no. 3, Association for Computing Machinery (ACM), 2017, p. 24:1-24:23, doi:10.1145/3053687.
Kenter, Tobias, et al. “Flexible FPGA Design for FDTD Using OpenCL.” Proc. Int. Conf. on Field Programmable Logic and Applications (FPL), IEEE, 2017, doi:10.23919/FPL.2017.8056844.
Jazayeri, Bahar, et al. “Features of IT Service Markets: A Systematic Literature Review.” Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC), vol. 9936, Springer, 2016, pp. 301–16, doi:10.1007/978-3-319-46295-0_19.
Drees, Maximilian, et al. “Churn- and DoS-Resistant Overlay Networks Based on Network Reconfiguration.” Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427, doi:10.1145/2935764.2935783.
Mäcker, Alexander, et al. “Cost-Efficient Scheduling on Machines from the Cloud.” Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 578--592, doi:10.1007/978-3-319-48749-6_42.
Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” Proceedings of the CT-RSA 2016, 2016, pp. 431–47, doi:10.1007/978-3-319-29485-8_25.
Jazayeri, Bahar. “Architectural Management of On-The-Fly Computing Markets.” Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops), ACM, 2016, p. 42, doi:10.1145/2993412.3010821.
Wette, Philip, and Holger Karl. “DCT2Gen: A Traffic Generator for Data Centers.” Computer Communications, 2016, pp. 45--58, doi:10.1016/j.comcom.2015.12.001.
Peuster, Manuel, and Holger Karl. “Understand Your Chains: Towards Performance Profile-Based Network Service Management.” Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016, 2016, pp. 7--12, doi:10.1109/EWSDN.2016.9.
Peuster, Manuel, et al. “Demonstrating On-Demand Cell Switching with a Two-Layer Mobile Network Testbed.” IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016, 2016, pp. 1015--1016, doi:10.1109/INFCOMW.2016.7562232.
Peuster, Manuel, et al. “MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments.” IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016, doi:10.1109/NFV-SDN.2016.7919490.
Tölke, Christian. Sicherheit von Hybriden FPGA-Systemen in Der Industriellen Automatisierungstechnik -- Anforderungen Und Umsetzung. Universität Paderborn, 2016.
Dräxler, Sevil, and Holger Karl. “Placement of Services with Flexible Structures Specified by a YANG Data Model.” Proceedings of the 2nd International IEEE Conference on Network Softwarization (NetSoft), 2016, pp. 184--192, doi:10.1109/NETSOFT.2016.7502412.
Stapel, Florian. Ontology-Based Representation of Abstract Optimization Models for Model Formulation and System Generation. Universität Paderborn, 2016.
Schmidt, Alexander. Wie entsteht Kreativität? Ein Überblick über vergleichende Studien zu verschiedenen Formen des Brainstormings. Universität Paderborn, 2016.
Gmyr, Robert, et al. “Self-Stabilizing Metric Graphs.” Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2016, pp. 248--262, doi:10.1007/978-3-319-49259-9_20.
König, Jürgen, et al. “Scheduling with Interjob Communication on Parallel Processors.” Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA), 2016, pp. 563--577, doi:10.1007/978-3-319-48749-6_41.
John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas: A Design Theory.” Proceedings of the 37th International Conference on Information Systems (ICIS), Dublin, Ireland, 2016.
Berhörster, Jan. Software-gestützte Entwicklung von Geschäftsmodellideen: Theoretische Grundlagen und prototypische Implementierung. Universität Paderborn, 2016.
Dressler, Falko, and Friedhelm Meyer auf der Heide, editors. Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). ACM, 2016, doi:10.1145/2942358.
Abshoff, Sebastian, et al. “Towards the Price of Leasing Online.” Journal of Combinatorial Optimization, no. 4, Springer, 2016, pp. 1197--1216, doi:10.1007/s10878-015-9915-5.
Strotmeyer, Sebastian, et al. “Vergleichende Betrachtung von Software-Werkzeugen Zur Geschäftsmodellentwicklung.” Multikonferenz Wirtschaftsinformatik (MKWI), 2016.
Heindorf, Stefan, et al. “Vandalism Detection in Wikidata.” Proceedings of the 25th International Conference on Information and Knowledge Management (CIKM 2016), 2016, pp. 327--336, doi:10.1145/2983323.2983740.
Riebler, Heinrich, et al. “Using Just-in-Time Code Generation for Transparent Resource Management in Heterogeneous Systems.” Proc. HiPEAC Workshop on Reonfigurable Computing (WRC), 2016.
Kenter, Tobias, and Christian Plessl. “Microdisk Cavity FDTD Simulation on FPGA Using OpenCL.” Proc. Workshop on Heterogeneous High-Performance Reconfigurable Computing (H2RC), 2016.
Riebler, Heinrich, et al. “Using Just-in-Time Code Generation for Transparent Resource Management in Heterogeneous Systems.” Proceedings of International Forum on Research and Technologies for Society and Industry (RTSI), IEEE, 2016, pp. 1–5, doi:10.1109/RTSI.2016.7740545.
Vaz, Gavin Francis, et al. “Potential and Methods for Embedding Dynamic Offloading Decisions into Application Code.” Computers and Electrical Engineering, vol. 55, Elsevier, 2016, pp. 91–111, doi:10.1016/j.compeleceng.2016.04.021.
Lösch, Achim, et al. “Performance-Centric Scheduling with Task Migration for a Heterogeneous Compute Node in the Data Center.” Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), EDA Consortium / IEEE, 2016, pp. 912–17.
Kenter, Tobias, et al. “Opportunities for Deferring Application Partitioning and Accelerator Synthesis to Runtime (Extended Abstract).” Workshop on Reconfigurable Computing (WRC), 2016.
John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas - Towards a Design Theory.” AIS SIGPRAG Pre-ICIS Workshop: Practice-Based Design and Innovation of Digital Artifacts, 2015.
Blömer, Johannes, et al. “Short Group Signatures with Distributed Traceability.” Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–80, doi:10.1007/978-3-319-32859-1_14.
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS Attacks.” Transactions on Parallel Computing, no. 3, ACM, 2015, pp. 18:1--18:33, doi:10.1145/2809806.
Hallmann, Corinna, and Leena Suhl. “Optimizing Water Tanks in Water Distribution Systems by Combining Network Reduction, Mathematical Optimization and Hydraulic Simulation.” OR Spectrum, Springer, 2015, pp. 1–19, doi:10.1007/s00291-015-0403-1.
Hallmann, Corinna. Optimierung von Wasserbehältern in einem Wasserversorgungssystem mittels einer Kombination aus Netzreduktion, mathematischer Optimierung und hydraulischer Simulation. Universität Paderborn, 2015.
Markarian, Christine, and Friedhelm Meyer auf der Heide. “Online Resource Leasing.” Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), 2015, pp. 343–44, doi:10.1145/2767386.2767454.
Blömer, Johannes, et al. “Anonymous and Publicly Linkable Reputation Systems.” Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488, doi:10.1007/978-3-662-47854-7_29.
Drees, Maximilian, et al. “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games.” Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT), 2015, pp. 178–89, doi:10.1007/978-3-662-48433-3_14.
Mäcker, Alexander, et al. “Non-Preemptive Scheduling on Machines with Setup Times.” Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings, edited by Frank Dehne et al., 2015, pp. 542--553, doi:10.1007/978-3-319-21840-3_45.
Neumann, Daniel. Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich. Universität Paderborn, 2015.
Heindorf, Stefan, et al. “Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis.” Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15), 2015, pp. 831--834, doi:10.1145/2766462.2767804.
Li, Shouwei, et al. “Towards Flexible Demands in Online Leasing Problems.” Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON), 2015, pp. 277--288, doi:10.1007/978-3-319-21398-9_22.
John, Thomas, and Dennis Kundisch. “Why Fit Leads to Surprise: An Extension of Cognitive Fit Theory to Creative Problems.” Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, USA, 2015.
Peuster, Manuel, and Holger Karl. “An Architecture for Energy-Aware On-Demand Mobile Network Management.” Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges, 2015.
Funke, Lukas. An LLVM Based Toolchain for Transparent Acceleration of Digital Image Processing Applications Using FPGA Overlay Architectures. Universität Paderborn, 2015.
Kenter, Tobias, et al. “Exploring Tradeoffs between Specialized Kernels and a Reusable Overlay in a Stereo-Matching Case Study.” International Journal of Reconfigurable Computing (IJRC), vol. 2015, 859425, Hindawi, 2015, doi:10.1155/2015/859425.
Damschen, Marvin, and Christian Plessl. “Easy-to-Use On-The-Fly Binary Program Acceleration on Many-Cores.” Proceedings of the 5th International Workshop on Adaptive Self-Tuning Computing Systems (ADAPT), 2015.
Damschen, Marvin, et al. “Transparent Offloading of Computational Hotspots from Binary Code to Xeon Phi.” Proceedings of the 2015 Conference on Design, Automation and Test in Europe (DATE), EDA Consortium / IEEE, 2015, pp. 1078–83, doi:10.7873/DATE.2015.1124.
Brangewitz, Sonja, et al. “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services.” Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
Meisner, Sebastian, and Marco Platzner. “Thread Shadowing: Using Dynamic Redundancy on Hybrid Multi-Cores for Error Detection.” Proceedings of the 10th International Symposium on Applied Reconfigurable Computing (ARC), edited by Diana Goehringer et al., Springer, 2014, pp. 283–90, doi:10.1007/978-3-319-05960-0_30.
Blömer, Johannes, et al. “Tampering Attacks in Pairing-Based Cryptography.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7, doi:10.1109/FDTC.2014.10.
Petrlic, Ronald, et al. “Security and Privacy Challenges in On-The-Fly Computing.” Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–42.
Brinkmann, Andre, et al. “Scheduling Shared Continuous Resources on Many-Cores.” Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2014, pp. 128–37, doi:10.1145/2612669.2612698.
Scheideler, Christian, et al. “RoBuSt: A Crash-Failure-Resistant Distributed Storage System.” Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122, doi:10.1007/978-3-319-14472-6_8.
Wold, Alexander, et al. “Relocatable Hardware Threads in Run-Time Reconfigurable Systems.” Proceedings of the 10th International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications, edited by Diana Goehringer et al., 2014, pp. 61–72, doi:10.1007/978-3-319-05960-0_6.
Kniesburges, Sebastian, et al. “Re-Chord: A Self-Stabilizing Chord Overlay Network.” Theory of Computing Systems, no. 3, Springer, 2014, pp. 591–612, doi:10.1007/s00224-012-9431-2.
Petrlic, Ronald, et al. “Privacy-Preserving Reputation Management.” Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–18, doi:10.1145/2554850.2554881.
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving Digital Rights Management Based on Attribute-Based Encryption.” Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5, doi:10.1109/NTMS.2014.6814044.
Awerbuch, Baruch, et al. “Principles of Robust Medium Access and an Application to Leader Election.” Transactions on Algorithms, no. 4, ACM, 2014, doi:10.1145/2635818.
Sorge, Christoph, and Ronald Petrlic. “Datenschutz Im Future Internet: Rechtliche Aspekte Und Technische Maßnahmen.” Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
Ogierman, Adrian, et al. “Competitive MAC under Adversarial SINR.” Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759, doi:10.1109/INFOCOM.2014.6848224.
Drees, Maximilian, et al. “Budget-Restricted Utility Games with Ordered Strategic Decisions.” Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), edited by Ron Lavi, 2014, pp. 110–21, doi:10.1007/978-3-662-44803-8_10.
Blömer, Johannes, et al. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136, doi:10.1109/FDTC.2014.22.
Platenius, Marie Christin, et al. “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching.” Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17, doi:10.1007/978-3-319-14886-1_2.
Jungmann, Alexander, et al. “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services.” International Journal On Advances in Intelligent Systems (IntSys), vol. 7, no. 3&4, IARIA, 2014, pp. 572--594.
Antoniadis, Antonios, et al. “Efficient Computation of Optimal Energy and Fractional Weighted Flow Trade-off Schedules.” Proceedings of the 31st Symposium on Theoretical Aspects of Computer Science (STACS), 2014, pp. 63--74, doi:10.4230/LIPIcs.STACS.2014.63.
Platzner, Marco, and Christian Plessl. “Verschiebungen an der Grenze zwischen Hardware und Software.” Logiken strukturbildender Prozesse: Automatismen, edited by Jörn Künsemöller et al., Wilhelm Fink, 2014, pp. 123–44.
Kenter, Tobias, et al. “Partitioning and Vectorizing Binary Applications for a Reconfigurable Vector Computer.” Proceedings of the International Symposium on Reconfigurable Computing: Architectures, Tools, and Applications (ARC), vol. 8405, Springer International Publishing, 2014, pp. 144–55, doi:10.1007/978-3-319-05960-0_13.
Agne, Andreas, et al. “Seven Recipes for Setting Your FPGA on Fire – A Cookbook on Heat Generators.” Microprocessors and Microsystems, vol. 38, no. 8, Part B, Elsevier, 2014, pp. 911–19, doi:10.1016/j.micpro.2013.12.001.
Riebler, Heinrich, et al. “Reconstructing AES Key Schedules from Decayed Memory with FPGAs.” Proceedings of Field-Programmable Custom Computing Machines (FCCM), IEEE, 2014, pp. 222–29, doi:10.1109/FCCM.2014.67.
Agne, Andreas, et al. “Self-Awareness as a Model for Designing and Operating Heterogeneous Multicores.” ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 7, no. 2, 13, ACM, 2014, doi:10.1145/2617596.
Agne, Andreas, et al. “ReconOS - An Operating System Approach for Reconfigurable Computing.” IEEE Micro, vol. 34, no. 1, IEEE, 2014, pp. 60–71, doi:10.1109/MM.2013.110.
Vaz, Gavin Francis, et al. “Deferring Accelerator Offloading Decisions to Application Runtime.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2014, pp. 1–8, doi:10.1109/ReConFig.2014.7032509.
Kenter, Tobias, et al. “Kernel-Centric Acceleration of High Accuracy Stereo-Matching.” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2014, pp. 1–8, doi:10.1109/ReConFig.2014.7032535.
Tezer, Alina. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.
Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:10.1007/978-3-642-39256-6_21.
Joshi, Nakul, and Ronald Petrlic. “Towards Practical Privacy-Preserving Digital Rights Management for Cloud Computing.” Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–64, doi:10.1109/CCNC.2013.6488456.
Blömer, Johannes, et al. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
Kling, Peter, and Peter Pietrzyk. “Profitable Scheduling on Multiple Speed-Scalable Processors.” Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 251–60, doi:10.1145/2486159.2486183.
Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System Against Insider DoS-Attacks.” Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–29, doi:10.1145/2486159.2486186.
Hilleckes, Hendrik. Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme. Universität Paderborn, 2013.
Blömer, Johannes, and Gennadij Liske. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. Universität Paderborn, 2013.
Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage System.” Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–49, doi:10.1007/978-3-642-41527-2_37.
Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord Overlay Network.” Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34, doi:10.1109/NetSys.2013.11.
Hallmann, Corinna. An Approach for a Decision Support Systems to Optimize Water Tanks in Water Supply Systems by Combining Network Reduction, Optimization and Simulation. Universität Paderborn, 2013.
Petrlic, Ronald, et al. “A Privacy-Friendly Architecture for Future Cloud Computing.” International Journal of Grid and Utility Computing, no. 4, InderScience, 2013, pp. 265–77, doi:10.1504/IJGUC.2013.057120.
Riebler, Heinrich, et al. “FPGA-Accelerated Key Search for Cold-Boot Attacks against AES.” Proceedings of the International Conference on Field-Programmable Technology (FPT), IEEE, 2013, pp. 386–89, doi:10.1109/FPT.2013.6718394.
Happe, Markus, et al. “On-The-Fly Computing: A Novel Paradigm for Individualized IT Services.” Proceedings of the 9th IEEE Workshop on Software Technology for Future Embedded and Ubiquitous Systems (SEUS), IEEE, 2013, doi:10.1109/ISORC.2013.6913232.
Cord-Landwehr, Andreas, et al. “Slow Down & Sleep for Profit in Online Deadline Scheduling.” Proceedings of the 1st Mediterranean Conference on Algorithms (MedAlg), edited by Guy Even and Dror Rawitz, 2012, pp. 218–31, doi:10.1007/978-3-642-34862-4_17.
Drees, Maximilian, et al. “Self-Organizing Particle Systems.” Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2012, pp. 1272–83, doi:10.1109/IPDPS.2012.116.
Petrlic, Ronald. “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme.” Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 2012, pp. 194–211, doi:10.1007/978-3-642-35362-8_16.
Petrlic, Ronald, and Christoph Sorge. “Privacy-Preserving DRM for Cloud Computing.” Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–91, doi:10.1109/WAINA.2012.92.
Petrlic, Ronald. “Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment.” Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 958–63, doi:10.1109/TrustCom.2012.225.
Seier, Henrik. Implementierung eines Branch-and-Bound-Algorithmus für nichtkonvexe gemischt-ganzzahlige Optimierungsprobleme mit quadratischen Nebenbedingungen. Universität Paderborn, 2012.
Isenberg, Florian. Implementierung eines adaptiven Verfahrens zur Linearisierung von nicht-konvexen, nichtlinearen Wassernetzmodellen mit Hilfe einer Fehlerabschätzung. Universität Paderborn, 2012.
Löken, Nils. Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn, 2012.
Wohlfarth, Stefan. Erweiterung von d3fact um die Domäne Wasserversorgung in Verbindung mit der Analyse und Implementierung eines hydraulischen Simulationsverfahrens. Universität Paderborn, 2012.
Richa, Andrea W., et al. “Competitive and Fair Throughput for Co-Existing Networks under Adversarial Interference.” Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC), 2012, pp. 291–300, doi:10.1145/2332432.2332488.
Dohle (married name: Hallmann) , Corinna, and Leena Suhl. “An Optimization Model for the Optimal Usage of Water Tanks in Water Supply Systems.” Proceedings of the International Conference on Applied Mathematical Optimization and Modelling (APMOD), 2012, pp. 404–08.
Happe, Markus, et al. “Eight Ways to Put Your FPGA on Fire – A Systematic Study of Heat Generators.” Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig), IEEE, 2012, pp. 1–8, doi:10.1109/ReConFig.2012.6416745.
Kenter, Tobias, et al. “Pragma Based Parallelization - Trading Hardware Efficiency for Ease of Use?” Proceedings of the International Conference on ReConFigurable Computing and FPGAs (ReConFig), IEEE, 2012, pp. 1–8, doi:10.1109/ReConFig.2012.6416773.
Happe, Markus, et al. “Hardware/Software Platform for Self-Aware Compute Nodes.” Proceedings of the Workshop on Self-Awareness in Reconfigurable Computing Systems (SRCS), 2012, pp. 8–9.
Barrio, Pablo, et al. “Turning Control Flow Graphs into Function Calls: Code Generation for Heterogeneous Architectures.” Proceedings of the International Conference on High Performance Computing and Simulation (HPCS), IEEE, 2012, pp. 559–65, doi:10.1109/HPCSim.2012.6266973.
Rüthing, Christoph, et al. “Exploration of Ring Oscillator Design Space for Temperature Measurements on FPGAs.” Proceedings of the International Conference on Field Programmable Logic and Applications (FPL), IEEE, 2012, pp. 559–62, doi:10.1109/FPL.2012.6339370.
Doerr, Benjamin, et al. “Stabilizing Consensus with the Power of Two Choices.” Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2011, pp. 149–58, doi:10.1145/1989493.1989516.
Richa, Andrea W., and Christian Scheideler. “Self-Stabilizing DeBruijn Networks.” Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp. 416–30, doi:10.1007/978-3-642-24550-3_31.
Gehweiler, Joachim, et al. “An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment.” Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM), 2011, pp. 31--40, doi:10.1007/978-3-642-31500-8_4.
Happe, Markus, et al. “Measuring and Predicting Temperature Distributions on FPGAs at Run-Time.” Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), IEEE, 2011, pp. 55–60, doi:10.1109/ReConFig.2011.59.