@inproceedings{5205,
  author       = {{Späth, Johannes and Nguyen Quang Do, Lisa and Ali, Karim and Bodden, Eric}},
  booktitle    = {{European Conference on Object-Oriented Programming (ECOOP)}},
  keywords     = {{ATTRACT, ITSECWEBSITE}},
  title        = {{{Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java}}},
  year         = {{2016}},
}

@misc{5407,
  author       = {{Koepe, Jörn}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Price-Based Allocation Games}}},
  year         = {{2016}},
}

@misc{5418,
  author       = {{Tölke, Christian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Sicherheit von hybriden FPGA-Systemen in der industriellen Automatisierungstechnik -- Anforderungen und Umsetzung}}},
  year         = {{2016}},
}

@misc{5420,
  author       = {{Wüllrich, Gunnar}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Dynamic OpenCL Task Scheduling for Energy and Performance in a Heterogeneous Environment}}},
  year         = {{2016}},
}

@misc{688,
  author       = {{Kutzias, Damian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Friendship Processes in Network Creation Games}}},
  year         = {{2016}},
}

@misc{689,
  author       = {{Schaefer, Johannes Sebastian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Routing Algorithms on Delayed Networks for Disaster Management Support}}},
  year         = {{2016}},
}

@inproceedings{166,
  abstract     = {{Network function virtualization and software-defined networking allow services consisting of virtual network functions to be designed and implemented with great flexibility by facilitating automatic deployments, migrations, and reconfigurations for services and their components. For extended flexibility, we go beyond seeing services as a fixed chain of functions. We present a YANG model for describing the service structure in deployment requests in a flexible way that enables changing the order of functions in case the order of traversing them does not affect the functionality of the service. Upon receiving such requests, the network orchestration system can choose the optimal composition of service components that gives the best results for placement of services in the network. This introduces new complexities to the placement problem by greatly increasing the number of possible ways a service can be composed. In this paper, we describe a heuristic solution that selects a Pareto set of the possible compositions of a service as well as possible combinations of different services, with respect to different resource requirements of the services. Our evaluations show that the selected combinations consist of representative samples of possible structures and requirements and therefore, can result in optimal or close-to-optimal placement results.}},
  author       = {{Dräxler, Sevil and Karl, Holger}},
  booktitle    = {{Proceedings of the 2nd International IEEE Conference on Network Softwarization (NetSoft)}},
  pages        = {{184----192}},
  title        = {{{Placement of Services with Flexible Structures Specified by a YANG Data Model}}},
  doi          = {{10.1109/NETSOFT.2016.7502412}},
  year         = {{2016}},
}

@phdthesis{167,
  author       = {{Günther, Peter}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Physical attacks on pairing-based cryptography}}},
  year         = {{2016}},
}

@inproceedings{169,
  abstract     = {{We apply methods of genetic programming to a general problem from software engineering, namely example-based generation of specifications. In particular, we focus on model transformation by example. The definition and implementation of model transformations is a task frequently carried out by domain experts, hence, a (semi-)automatic approach is desirable. This application is challenging because the underlying search space has rich semantics, is high-dimensional, and unstructured. Hence, a computationally brute-force approach would be unscalable and potentially infeasible. To address that problem, we develop a sophisticated approach of designing complex mutation operators. We define ‘patterns’ for constructing mutation operators and report a successful case study. Furthermore, the code of the evolved model transformation is required to have high maintainability and extensibility, that is, the code should be easily readable by domain experts. We report an evaluation of this approach in a software engineering case study.}},
  author       = {{Kühne, Thomas and Hamann, Heiko and Arifulina, Svetlana and Engels, Gregor}},
  booktitle    = {{Proceedings of the 19th European Conference on Genetic Programming (EuroGP 2016)}},
  pages        = {{278----293}},
  title        = {{{Patterns for Constructing Mutation Operators: Limiting the Search Space in a Software Engineering Application}}},
  doi          = {{10.1007/978-3-319-30668-1_18}},
  year         = {{2016}},
}

@inproceedings{170,
  abstract     = {{We present PAndA2, an extendable, static analysis tool for Android  apps  which  examines  permission  related security  threats  like overprivilege, existence of permission redelegation and permission flows. PAndA2 comes along with a textual and graphical visualization of the analysis result and even supports the comparison of analysis results for different android app versions.}},
  author       = {{Jakobs, Marie-Christine and Töws, Manuel and Pauck, Felix}},
  booktitle    = {{Workshop on Formal and Model-Driven Techniques for Developing Trustworthy Systems}},
  editor       = {{Ishikawa F, Romanovsky A, Troubitsyna E}},
  title        = {{{PAndA 2 : Analyzing Permission Use and Interplay in Android Apps (Tool Paper)}}},
  year         = {{2016}},
}

@phdthesis{172,
  author       = {{Stapel, Florian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Ontology-based representation of abstract optimization models for model formulation and system generation}}},
  year         = {{2016}},
}

@misc{1082,
  author       = {{Handirk, Tobias}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Über die Rolle von Informationen in Verkehrsnetzwerken}}},
  year         = {{2016}},
}

@phdthesis{1190,
  author       = {{Isenberg, Tobias}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Induction-based Verification of Timed Systems}}},
  year         = {{2016}},
}

@misc{128,
  author       = {{Bernhardt, Katharina}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Zertifikate als Qualitätssignal – Wie die Zertifizierung von Produkten und Verkäufern das Vertrauen von Kunden im Onlinehandel beeinflussen}}},
  year         = {{2016}},
}

@misc{129,
  author       = {{Schmidt, Alexander}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Wie entsteht Kreativität? Ein Überblick über vergleichende Studien zu verschiedenen Formen des Brainstormings}}},
  year         = {{2016}},
}

@misc{130,
  author       = {{Kaczorkowski, Jessica}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Wettbewerb im Internet - Eine wettbewerbspolitische Analyse des E-Commerce}}},
  year         = {{2016}},
}

@misc{153,
  author       = {{König, Jürgen}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Shared Resource Scheduling with Interconnected Services}}},
  year         = {{2016}},
}

@phdthesis{154,
  author       = {{Cord-Landwehr, Andreas}},
  isbn         = {{978-3-942647-72-4}},
  publisher    = {{Verlagsschriftenreihe des Heinz Nixdorf Instituts, Paderborn}},
  title        = {{{Selfish Network Creation - On Variants of Network Creation Games}}},
  volume       = {{353}},
  year         = {{2016}},
}

@inproceedings{155,
  abstract     = {{We present a self-stabilizing algorithm for overlay networks that, for an arbitrary metric given by a distance oracle, constructs the graph representing that metric. The graph representing a metric is the unique minimal undirected graph such that for any pair of nodes the length of a shortest path between the nodes corresponds to the distance between the nodes according to the metric. The algorithm works under both an asynchronous and a synchronous daemon. In the synchronous case, the algorithm stablizes in time O(n) and it is almost silent in that after stabilization a node sends and receives a constant number of messages per round.}},
  author       = {{Gmyr, Robert and Lefèvre, Jonas and Scheideler, Christian}},
  booktitle    = {{Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}},
  pages        = {{248----262}},
  title        = {{{Self-stabilizing Metric Graphs}}},
  doi          = {{10.1007/978-3-319-49259-9_20}},
  year         = {{2016}},
}

@inproceedings{157,
  abstract     = {{Consider a scheduling problem in which a set of jobs with interjob communication, canonically represented by a weighted tree, needs to be scheduled on m parallel processors interconnected by a shared communication channel. In each time step, we may allow any processed job to use a certain capacity of the channel in order to satisfy (parts of) its communication demands to adjacent jobs processed in parallel. The goal is to find a schedule that minimizes the makespan and in which communication demands of all jobs are satisfied.We show that this problem is NP-hard in the strong sense even if the number of processors and the maximum degree of the underlying tree is constant.Consequently, we design and analyze simple approximation algorithms with asymptotic approximation ratio 2-2/m in case of paths and a ratio of 5/2 in case of arbitrary trees.}},
  author       = {{König, Jürgen and Mäcker, Alexander and Meyer auf der Heide, Friedhelm and Riechers, Sören}},
  booktitle    = {{Proceedings of the 10th Annual International Conference on Combinatorial Optimization and Applications (COCOA)}},
  pages        = {{563----577}},
  title        = {{{Scheduling with Interjob Communication on Parallel Processors}}},
  doi          = {{10.1007/978-3-319-48749-6_41}},
  year         = {{2016}},
}

