@phdthesis{20240,
  author       = {{Hoof, Simon}},
  title        = {{{Essays on Cooperation in Differential Games}}},
  doi          = {{	10.17619/UNIPB/1-1047}},
  year         = {{2020}},
}

@article{2834,
  author       = {{Gutt, Dominik and von Rechenberg, Tobias and Kundisch, Dennis}},
  journal      = {{Journal of Business Research}},
  pages        = {{277--287}},
  publisher    = {{Elsevier}},
  title        = {{{Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty}}},
  doi          = {{10.1016/j.jbusres.2018.06.019}},
  volume       = {{106}},
  year         = {{2020}},
}

@phdthesis{24710,
  author       = {{Kurek, Rafael}},
  title        = {{{Efficient Cryptographic Constructions with Strong Security Guarantees}}},
  year         = {{2020}},
}

@article{21287,
  abstract     = {{<jats:p>Peer-to-peer markets are especially suitable for the analysis of online ratings as they represent two-sided markets that match buyers to sellers and thus lead to reduced scope for opportunistic behavior. We decompose the online ratings by focusing on the customer’s decision-making process in a leading peer-to-peer ridesharing platform. Using data from the leading peer-to-peer ridesharing platform BlaBlaCar, we analyze 17,584 users registered between 2004 and 2014 and their online ratings focusing on the decomposition of the explicit determinants reflecting the variance of online ratings. We find clear evidence to suggest that a driver’s attitude towards music, pets, smoking, and conversation has a significantly positive influence on his received online ratings. However, we also show that the interaction of female drivers and their attitude towards pets has a significantly negative effect on average ratings.</jats:p>}},
  author       = {{Kaimann, Daniel}},
  issn         = {{2071-1050}},
  journal      = {{Sustainability}},
  number       = {{15}},
  title        = {{{Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets}}},
  doi          = {{10.3390/su12156185}},
  volume       = {{12}},
  year         = {{2020}},
}

@inbook{21396,
  abstract     = {{Verifiable random functions (VRFs) are essentially digital signatures with additional properties, namely verifiable uniqueness and pseudorandomness, which make VRFs a useful tool, e.g., to prevent enumeration in DNSSEC Authenticated Denial of Existence and the CONIKS key management system, or in the random committee selection of the Algorand blockchain.

Most standard-model VRFs rely on admissible hash functions (AHFs) to achieve security against adaptive attacks in the standard model. Known AHF constructions are based on error-correcting codes, which yield asymptotically efficient constructions. However, previous works do not clarify how the code should be instantiated concretely in the real world. The rate and the minimal distance of the selected code have significant impact on the efficiency of the resulting cryptosystem, therefore it is unclear if and how the aforementioned constructions can be used in practice.

First, we explain inherent limitations of code-based AHFs. Concretely, we assume that even if we were given codes that achieve the well-known Gilbert-Varshamov or McEliece-Rodemich-Rumsey-Welch bounds, existing AHF-based constructions of verifiable random functions (VRFs) can only be instantiated quite inefficiently. Then we introduce and construct computational AHFs (cAHFs). While classical AHFs are information-theoretic, and therefore work even in presence of computationally unbounded adversaries, cAHFs provide only security against computationally bounded adversaries. However, we show that cAHFs can be instantiated significantly more efficiently. Finally, we use our cAHF to construct the currently most efficient verifiable random function with full adaptive security in the standard model.}},
  author       = {{Jager, Tibor and Niehues, David}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783030384708}},
  issn         = {{0302-9743}},
  keywords     = {{Admissible hash functions, Verifiable random functions, Error-correcting codes, Provable security}},
  location     = {{Waterloo, Canada}},
  title        = {{{On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions}}},
  doi          = {{10.1007/978-3-030-38471-5_13}},
  year         = {{2020}},
}

@inbook{17347,
  abstract     = {{Peer-to-Peer news portals allow Internet users to write news articles and make them available online to interested readers. Despite the fact that authors are free in their choice of topics, there are a number of quality characteristics that an article must meet before it is published. In addition to meaningful titles, comprehensibly written texts and meaning- ful images, relevant tags are an important criteria for the quality of such news. In this case study, we discuss the challenges and common mistakes that Peer-to-Peer reporters face when tagging news and how incorrect information can be corrected through the orchestration of existing Natu- ral Language Processing services. Lastly, we use this illustrative example to give insight into the challenges of dealing with bottom-up taxonomies.}},
  author       = {{Bäumer, Frederik Simon and Kersting, Joschka and Buff, Bianca and Geierhos, Michaela}},
  booktitle    = {{Information and Software Technologies}},
  editor       = {{Audrius, Lopata and Rita, Butkienė and Daina, Gudonienė and Vilma, Sukackė}},
  location     = {{Kaunas, Litauen}},
  pages        = {{368----382}},
  publisher    = {{Springer}},
  title        = {{{Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging}}},
  doi          = {{https://doi.org/10.1007/978-3-030-59506-7_30}},
  volume       = {{1283}},
  year         = {{2020}},
}

@article{17358,
  abstract     = {{Approximate circuits trade-off computational accuracy against improvements in hardware area, delay, or energy consumption. IP core vendors who wish to create such circuits need to convince consumers of the resulting approximation quality. As a solution we propose proof-carrying approximate circuits: The vendor creates an approximate IP core together with a certificate that proves the approximation quality. The proof certificate is bundled with the approximate IP core and sent off to the consumer. The consumer can formally verify the approximation quality of the IP core at a fraction of the typical computational cost for formal verification. In this paper, we first make the case for proof-carrying approximate circuits and then demonstrate the feasibility of the approach by a set of synthesis experiments using an exemplary approximation framework.}},
  author       = {{Witschen, Linus Matthias and Wiersema, Tobias and Platzner, Marco}},
  issn         = {{1557-9999}},
  journal      = {{IEEE Transactions On Very Large Scale Integration Systems}},
  keywords     = {{Approximate circuit synthesis, approximate computing, error metrics, formal verification, proof-carrying hardware}},
  number       = {{9}},
  pages        = {{2084 -- 2088}},
  publisher    = {{IEEE}},
  title        = {{{Proof-carrying Approximate Circuits}}},
  doi          = {{10.1109/TVLSI.2020.3008061}},
  volume       = {{28}},
  year         = {{2020}},
}

@inproceedings{17368,
  author       = {{Vorbohle, Christian and Szopinski, Daniel and Kundisch, Dennis}},
  editor       = {{Shishkov, B.}},
  isbn         = {{978-3-030-52305-3}},
  location     = {{Potsdam, Germany}},
  publisher    = {{Springer}},
  title        = {{{Business Model Dependencies: Towards conceptualizing dependencies for extending modeling languages for business models}}},
  volume       = {{391}},
  year         = {{2020}},
}

@inproceedings{17370,
  abstract     = {{ We consider a natural extension to the metric uncapacitated Facility Location Problem (FLP) in which requests ask for different commodities out of a finite set \( S \) of commodities.
  Ravi and Sinha (SODA 2004) introduced the model as the \emph{Multi-Commodity Facility Location Problem} (MFLP) and considered it an offline optimization problem.
  The model itself is similar to the FLP: i.e., requests are located at points of a finite metric space and the task of an algorithm is to construct facilities and assign requests to facilities while minimizing the construction cost and the sum over all assignment distances.
  In addition, requests and facilities are heterogeneous; they request or offer multiple commodities out of $S$.
  A request has to be connected to a set of facilities jointly offering the commodities demanded by it.
  In comparison to the FLP, an algorithm has to decide not only if and where to place facilities, but also which commodities to offer at each.

  To the best of our knowledge we are the first to study the problem in its online variant in which requests, their positions and their commodities are not known beforehand but revealed over time.
  We present results regarding the competitive ratio.
  On the one hand, we show that heterogeneity influences the competitive ratio by developing a lower bound on the competitive ratio for any randomized online algorithm of \( \Omega (  \sqrt{|S|} + \frac{\log n}{\log \log n}  ) \) that already holds for simple line metrics.
  Here, \( n \) is the number of requests.
  On the other side, we establish a deterministic \( \mathcal{O}(\sqrt{|S|} \cdot \log n) \)-competitive algorithm and a randomized \( \mathcal{O}(\sqrt{|S|} \cdot \frac{\log n}{\log \log n} ) \)-competitive algorithm.
  Further, we show that when considering a more special class of cost functions for the construction cost of a facility, the competitive ratio decreases given by our deterministic algorithm depending on the function.}},
  author       = {{Castenow, Jannik and Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}},
  booktitle    = {{Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures}},
  isbn         = {{9781450369350}},
  keywords     = {{Online Multi-Commodity Facility Location, Competitive Ratio, Online Optimization, Facility Location Problem}},
  title        = {{{The Online Multi-Commodity Facility Location Problem}}},
  doi          = {{10.1145/3350755.3400281}},
  year         = {{2020}},
}

@inproceedings{17407,
  author       = {{Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}},
  booktitle    = {{Discovery Science}},
  title        = {{{Extreme Algorithm Selection with Dyadic Feature Representation}}},
  year         = {{2020}},
}

@inproceedings{17408,
  author       = {{Hanselle, Jonas Manuel and Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}},
  booktitle    = {{KI 2020: Advances in Artificial Intelligence}},
  title        = {{{Hybrid Ranking and Regression for Algorithm Selection}}},
  year         = {{2020}},
}

@inproceedings{17424,
  author       = {{Tornede, Tanja and Tornede, Alexander and Wever, Marcel Dominik and Mohr, Felix and Hüllermeier, Eyke}},
  booktitle    = {{Proceedings of the ECMLPKDD 2020}},
  title        = {{{AutoML for Predictive Maintenance: One Tool to RUL Them All}}},
  doi          = {{10.1007/978-3-030-66770-2_8}},
  year         = {{2020}},
}

@proceedings{17836,
  editor       = {{Werneck Richa, Andrea and Scheideler, Christian}},
  isbn         = {{978-3-030-54920-6}},
  publisher    = {{Springer}},
  title        = {{{Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings}}},
  doi          = {{10.1007/978-3-030-54921-3}},
  volume       = {{12156}},
  year         = {{2020}},
}

@proceedings{17839,
  editor       = {{Scheideler, Christian and Spear, Michael}},
  isbn         = {{978-1-4503-6935-0}},
  publisher    = {{ACM}},
  title        = {{{SPAA '20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020}}},
  doi          = {{10.1145/3350755}},
  year         = {{2020}},
}

@inproceedings{18686,
  author       = {{Kersting, Joschka and Bäumer, Frederik Simon}},
  booktitle    = {{PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020}},
  keywords     = {{Software Requirements, Natural Language Processing, Transfer Learning, On-The-Fly Computing}},
  location     = {{Lisbon, Portugal}},
  pages        = {{119----123}},
  publisher    = {{IADIS}},
  title        = {{{SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH}}},
  year         = {{2020}},
}

@inproceedings{20306,
  author       = {{Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}},
  booktitle    = {{Workshop MetaLearn 2020 @ NeurIPS 2020}},
  location     = {{Online}},
  title        = {{{Towards Meta-Algorithm Selection}}},
  year         = {{2020}},
}

@misc{20495,
  author       = {{Jochmaring, Moritz}},
  title        = {{{A self stabilizing protocol for well-formed trees in hybrid networks}}},
  year         = {{2020}},
}

@techreport{20712,
  author       = {{Schubert, Philipp and Bodden, Eric and Hermann, Ben}},
  title        = {{{Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries}}},
  year         = {{2020}},
}

@unpublished{20748,
  abstract     = {{On the circuit level, the design paradigm Approximate Computing seeks to trade off computational accuracy against a target metric, e.g., energy consumption. This trade-off is possible for many applications due to their inherent resiliency against inaccuracies.
In the past, several automated approximation frameworks have been presented, which either utilize designated approximation techniques or libraries to replace approximable circuit parts with inaccurate versions. The frameworks invoke a search algorithm to iteratively explore the search space of performance degraded circuits, and validate their quality individually. 
In this paper, we propose to reverse this procedure. Rather than exploring the search space, we delineate the approximate parts of the search space which are guaranteed to lead to valid approximate circuits. Our methodology is supported by formal verification and independent of approximation techniques. Eventually, the user is provided with quality bounds of the individual approximable circuit parts. Consequently, our approach guarantees that any approximate circuit which implements these parts within the determined quality constraints satisfies the global quality constraints, superseding a subsequent quality verification.
In our experimental results, we present the runtimes of our approach.}},
  author       = {{Witschen, Linus Matthias and Wiersema, Tobias and Platzner, Marco}},
  booktitle    = {{Fifth Workshop on Approximate Computing (AxC 2020)}},
  pages        = {{2}},
  title        = {{{Search Space Characterization for AxC Synthesis}}},
  year         = {{2020}},
}

@inproceedings{20755,
  abstract     = {{We consider the problem of computing shortest paths in \emph{hybrid networks}, in which nodes can make use of different communication modes. For example, mobile phones may use ad-hoc connections via Bluetooth or Wi-Fi in addition to the cellular network to solve tasks more efficiently. Like in this case, the different communication modes may differ considerably in range, bandwidth, and flexibility. We build upon the model of Augustine et al. [SODA '20], which captures these differences by a \emph{local} and a \emph{global} mode. Specifically, the local edges model a fixed communication network in which $O(1)$ messages of size $O(\log n)$ can be sent over every edge in each synchronous round. The global edges form a clique, but nodes are only allowed to send and receive a total of at most $O(\log n)$ messages over global edges, which restricts the nodes to use these edges only very sparsely.

We demonstrate the power of hybrid networks by presenting algorithms to compute Single-Source Shortest Paths and the diameter very efficiently in \emph{sparse graphs}. Specifically, we present exact $O(\log n)$ time algorithms for cactus graphs (i.e., graphs in which each edge is contained in at most one cycle), and $3$-approximations for graphs that have at most $n + O(n^{1/3})$ edges and arboricity $O(\log n)$. For these graph classes, our algorithms provide exponentially faster solutions than the best known algorithms for general graphs in this model.
Beyond shortest paths, we also provide a variety of useful tools and techniques for hybrid networks, which may be of independent interest.
}},
  author       = {{Feldmann, Michael and Hinnenthal, Kristian and Scheideler, Christian}},
  booktitle    = {{Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)}},
  publisher    = {{Schloss Dagstuhl - Leibniz-Zentrum für Informatik}},
  title        = {{{Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs}}},
  doi          = {{10.4230/LIPIcs.OPODIS.2020.31}},
  year         = {{2020}},
}

