@article{3936,
  author       = {{Gutt, Dominik and Herrmann, Philipp and Rahman, Mohammad}},
  journal      = {{Information Systems Research}},
  number       = {{3}},
  pages        = {{980--994}},
  title        = {{{Crowd-Driven Competitive Intelligence: Understanding the Relationship between Local Market Competition and Online Rating Distributions}}},
  volume       = {{30}},
  year         = {{2019}},
}

@inproceedings{5471,
  abstract     = {{We characterise the set of dominant strategy incentive compatible (DSIC), strongly budget balanced (SBB), and ex-post individually rational (IR) mechanisms for the multi-unit bilateral trade setting. In such a setting there is a single buyer and a single seller who holds a finite number k of identical items. The mechanism has to decide how many units of the item are transferred from the seller to the buyer and how much money is transferred from the buyer to the seller. We consider two classes of valuation functions for the buyer and seller: Valuations that are increasing in the number of units in possession, and the more specific class of valuations that are increasing and submodular. 
Furthermore, we present some approximation results about the performance of certain such mechanisms, in terms of social welfare: For increasing submodular valuation functions, we show the existence of a deterministic 2-approximation mechanism and a randomised e/(1-e) approximation mechanism, matching the best known bounds for the single-item setting.}},
  author       = {{Lazos, Philip and Goldberg, Paul and Skopalik, Alexander and Gerstgrasser, Matthias and de Keijzer, Bart}},
  booktitle    = {{Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)}},
  location     = {{Honolulu, Hawaii, USA}},
  title        = {{{ Multi-unit Bilateral Trade}}},
  doi          = {{10.1609/aaai.v33i01.33011973}},
  year         = {{2019}},
}

@misc{6628,
  author       = {{Seutter, Janina}},
  title        = {{{Bewertung von Maschinen-generierten Geschäftsmodell-Ideen: Eine experimentelle Untersuchung}}},
  year         = {{2019}},
}

@inproceedings{6856,
  author       = {{Müller, Michelle and Gutt, Dominik}},
  booktitle    = {{Wirtschaftsinformatik Proceedings 2019}},
  location     = {{Siegen, Germany}},
  title        = {{{Heart over Heels? An Empirical Analysis of the Relationship between Emotions and Review Helpfulness for Experience and Credence Goods}}},
  year         = {{2019}},
}

@inproceedings{6857,
  author       = {{Poniatowski, Martin and Neumann, Jürgen and Görzen, Thomas and Kundisch, Dennis}},
  booktitle    = {{Wirtschaftsinformatik Proceedings 2019}},
  location     = {{Siegen, Germany}},
  title        = {{{A Semi-Automated Approach for Generating Online Review Templates, }}},
  year         = {{2019}},
}

@inproceedings{6976,
  abstract     = {{We investigate the maintenance of overlay networks under massive churn, i.e.
nodes joining and leaving the network. We assume an adversary that may churn a
constant fraction $\alpha n$ of nodes over the course of $\mathcal{O}(\log n)$
rounds. In particular, the adversary has an almost up-to-date information of
the network topology as it can observe an only slightly outdated topology that
is at least $2$ rounds old. Other than that, we only have the provably minimal
restriction that new nodes can only join the network via nodes that have taken
part in the network for at least one round.
  Our contributions are as follows: First, we show that it is impossible to
maintain a connected topology if adversary has up-to-date information about the
nodes' connections. Further, we show that our restriction concerning the join
is also necessary. As our main result present an algorithm that constructs a
new overlay- completely independent of all previous overlays - every $2$
rounds. Furthermore, each node sends and receives only $\mathcal{O}(\log^3 n)$
messages each round. As part of our solution we propose the Linearized DeBruijn
Swarm (LDS), a highly churn resistant overlay, which will be maintained by the
algorithm. However, our approaches can be transferred to a variety of classical
P2P Topologies where nodes are mapped into the $[0,1)$-interval.}},
  author       = {{Götte, Thorsten and Vijayalakshmi, Vipin Ravindran and Scheideler, Christian}},
  booktitle    = {{Proceedings of the 2019 IEEE 33rd International Parallel  and Distributed Processing Symposium (IPDPS '19)}},
  location     = {{Rio de Janeiro, Brazil}},
  publisher    = {{IEEE}},
  title        = {{{Always be Two Steps Ahead of Your Enemy - Maintaining a Routable Overlay under Massive Churn with an Almost Up-to-date Adversary}}},
  year         = {{2019}},
}

@inproceedings{10586,
  abstract     = {{We consider the problem of transforming a given graph G_s into a desired graph G_t by applying a minimum number of primitives from a particular set of local graph transformation primitives. These primitives are local in the sense that each node can apply them based on local knowledge and by affecting only its 1-neighborhood. Although the specific set of primitives we consider makes it possible to transform any (weakly) connected graph into any other (weakly) connected graph consisting of the same nodes, they cannot disconnect the graph or introduce new nodes into the graph, making them ideal in the context of supervised overlay network transformations. We prove that computing a minimum sequence of primitive applications (even centralized) for arbitrary G_s and G_t is NP-hard, which we conjecture to hold for any set of local graph transformation primitives satisfying the aforementioned properties. On the other hand, we show that this problem admits a polynomial time algorithm with a constant approximation ratio.}},
  author       = {{Scheideler, Christian and Setzer, Alexander}},
  booktitle    = {{Proceedings of the 46th International Colloquium on Automata, Languages, and Programming}},
  keywords     = {{Graphs transformations, NP-hardness, approximation algorithms}},
  location     = {{Patras, Greece}},
  pages        = {{150:1----150:14}},
  publisher    = {{Dagstuhl Publishing}},
  title        = {{{On the Complexity of Local Graph Transformations}}},
  doi          = {{10.4230/LIPICS.ICALP.2019.150}},
  volume       = {{132}},
  year         = {{2019}},
}

@inproceedings{12870,
  author       = {{Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}},
  booktitle    = {{Proceedings of the 17th Workshop on Approximation and Online Algorithms (WAOA)}},
  pages        = {{120 -- 137}},
  publisher    = {{Springer}},
  title        = {{{Managing Multiple Mobile Resources}}},
  doi          = {{10.1007/978-3-030-39479-0_9}},
  year         = {{2019}},
}

@inproceedings{12912,
  author       = {{Razzaghi Kouchaksaraei, Hadi and Karl, Holger}},
  booktitle    = {{15th International Conference on Network and Service Management (CNSM)}},
  location     = {{Halifax, Canada}},
  title        = {{{Quantitative Analysis of Dynamically Provisioned Heterogeneous Network Services}}},
  year         = {{2019}},
}

@phdthesis{15333,
  author       = {{Heindorf, Stefan}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Vandalism Detection in Crowdsourced Knowledge Bases}}},
  year         = {{2019}},
}

@inproceedings{15369,
  author       = {{Müller, Marcel and Behnke, Daniel and Bök, Patrick-Benjamin and Peuster, Manuel and Schneider, Stefan Balthasar and Karl, Holger}},
  booktitle    = {{IEEE 17th International Conference on Industrial Informatics (IEEE-INDIN)}},
  publisher    = {{IEEE}},
  title        = {{{5G as Key Technology for Networked Factories: Application of Vertical-specific Network Services for Enabling Flexible Smart Manufacturing}}},
  year         = {{2019}},
}

@inproceedings{15371,
  abstract     = {{More and more management and orchestration approaches for (software) networks are based on machine learning paradigms and solutions. These approaches depend not only on their program code to operate properly, but also require enough input data to train their internal models. However, such training data is barely available for the software networking domain and most presented solutions rely on their own, sometimes not even published, data sets. This makes it hard, or even infeasible, to reproduce and compare many of the existing solutions. As a result, it ultimately slows down the adoption of machine learning approaches in softwarised networks. To this end, we introduce the "softwarised network data zoo" (SNDZoo), an open collection of software networking data sets aiming to streamline and ease machine learning research in the software networking domain. We present a general methodology to collect, archive, and publish those data sets for use by other researches and, as an example, eight initial data sets, focusing on the performance of virtualised network functions.
}},
  author       = {{Peuster, Manuel and Schneider, Stefan Balthasar and Karl, Holger}},
  booktitle    = {{IEEE/IFIP 15th International Conference on Network and Service Management (CNSM)}},
  publisher    = {{IEEE/IFIP}},
  title        = {{{The Softwarised Network Data Zoo}}},
  year         = {{2019}},
}

@inproceedings{15373,
  abstract     = {{Offloading packet processing tasks to programmable switches and/or to programmable network interfaces, so called “SmartNICs”, is one of the key concepts to prepare softwarized networks for the high traffic demands of the future. However, implementing network functions that make use of those offload- ing technologies is still challenging and usually requires the availability of specialized hardware. It becomes even harder if heterogeneous services, making use of different offloading and network virtualization technologies, should be developed.
In this paper, we introduce FOP4 (Function Offloading Pro- totyping with P4), a novel prototyping platform that allows to prototype heterogeneous software network scenarios, including container-based, P4-switch-based, and SmartNIC-based network functions. The presented work substantially extends our existing Containernet platform with the means to prototype offloading scenarios. Besides presenting the platform’s system design, we evaluate its scalability and show that it can run scenarios with more than 64 P4 switch or SmartNIC nodes on a single laptop. Finally, we presented a case study in which we use the presented platform to prototype an extended in-band network telemetry use case.}},
  author       = {{Moro, Daniele and Peuster, Manuel and Karl, Holger and Capone, Antonio}},
  booktitle    = {{IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)}},
  publisher    = {{IEEE}},
  title        = {{{FOP4: Function Offloading Prototyping in Heterogeneous and Programmable Network Scenarios}}},
  year         = {{2019}},
}

@inproceedings{15374,
  abstract     = {{Emulation platforms supporting Virtual Network Functions (VNFs) allow developers to rapidly prototype network services. None of the available platforms, however, supports experimenting with programmable data planes to enable VNF offloading. In this demonstration, we show FOP4, a flexible platform that provides support for Docker-based VNFs, and VNF offloading, by means of P4-enabled switches. The platform provides interfaces to program the P4 devices and to deploy network functions. We demonstrate FOP4 with two complex example scenarios, demonstrating how developers can exploit data plane programmability to implement network functions.}},
  author       = {{Moro, Daniele and Peuster, Manuel and Karl, Holger and Capone, Antonio}},
  booktitle    = {{IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)}},
  publisher    = {{IEEE}},
  title        = {{{Demonstrating FOP4: A Flexible Platform to Prototype NFV Offloading Scenarios}}},
  year         = {{2019}},
}

@inproceedings{15627,
  author       = {{Augustine, John and Hinnenthal, Kristian and Kuhn, Fabian and Scheideler, Christian and Schneider, Philipp}},
  booktitle    = {{Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms}},
  isbn         = {{9781611975994}},
  pages        = {{1280--1299}},
  title        = {{{Shortest Paths in a Hybrid Network Model}}},
  doi          = {{10.1137/1.9781611975994.78}},
  year         = {{2019}},
}

@inproceedings{15838,
  abstract     = {{In the field of software analysis a trade-off between scalability and accuracy always exists. In this respect, Android app analysis is no exception, in particular, analyzing large or many apps can be challenging. Dealing with many small apps is a typical challenge when facing micro-benchmarks such as DROIDBENCH or ICC-BENCH. These particular benchmarks are not only used for the evaluation of novel tools but also in continuous integration pipelines of existing mature tools to maintain and guarantee a certain quality-level. Considering this latter usage it becomes very important to be able to achieve benchmark results as fast as possible. Hence, benchmarks have to be optimized for this purpose. One approach to do so is app merging. We implemented the Android Merge Tool (AMT) following this approach and show that its novel aspects can be used to produce scaled up and accurate benchmarks. For such benchmarks Android app analysis tools do not suffer from the scalability-accuracy trade-off anymore. We show this throughout detailed experiments on DROIDBENCH employing three different analysis tools (AMANDROID, ICCTA, FLOWDROID). Benchmark execution times are largely reduced without losing benchmark accuracy. Moreover, we argue why AMT is an advantageous successor of the state-of-the-art app merging tool (APKCOMBINER) in analysis lift-up scenarios.}},
  author       = {{Pauck, Felix and Zhang, Shikun}},
  booktitle    = {{2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW)}},
  isbn         = {{9781728141367}},
  keywords     = {{Program Analysis, Android App Analysis, Taint Analysis, App Merging, Benchmark}},
  title        = {{{Android App Merging for Benchmark Speed-Up and Analysis Lift-Up}}},
  doi          = {{10.1109/asew.2019.00019}},
  year         = {{2019}},
}

@misc{15920,
  abstract     = {{Secure hardware design is the most important aspect to be considered in addition to functional correctness. Achieving hardware security in today’s globalized Integrated Cir- cuit(IC) supply chain is a challenging task. One solution that is widely considered to help achieve secure hardware designs is Information Flow Tracking(IFT). It provides an ap- proach to verify that the systems adhere to security properties either by static verification during design phase or dynamic checking during runtime.
Proof-Carrying Hardware(PCH) is an approach to verify a functional design prior to using it in hardware. It is a two-party verification approach, where the target party, the consumer requests new functionalities with pre-defined properties to the producer. In response, the producer designs the IP (Intellectual Property) cores with the requested functionalities that adhere to the consumer-defined properties. The producer provides the IP cores and a proof certificate combined into a proof-carrying bitstream to the consumer to verify it. If the verification is successful, the consumer can use the IP cores in his hardware. In essence, the consumer can only run verified IP cores. Correctly applied, PCH techniques can help consumers to defend against many unintentional modifications and malicious alterations of the modules they receive. There are numerous published examples of how to use PCH to detect any change in the functionality of a circuit, i.e., pairing a PCH approach with functional equivalence checking for combinational or sequential circuits. For non-functional properties, since opening new covert channels to leak secret information from secure circuits is a viable attack vector for hardware trojans, i.e., intentionally added malicious circuitry, IFT technique is employed to make sure that secret/untrusted information never reaches any unclassified/trusted outputs.
This master thesis aims to explore the possibility of adapting Information Flow Tracking into a Proof-Carrying Hardware scenario. It aims to create a method that combines Infor- mation Flow Tracking(IFT) with a PCH approach at bitstream level enabling consumers to validate the trustworthiness of a module’s information flow without the computational costs of a complete flow analysis.}},
  author       = {{Keerthipati, Monica}},
  publisher    = {{Universität Paderborn}},
  title        = {{{A Bitstream-Level Proof-Carrying Hardware Technique for Information Flow Tracking}}},
  year         = {{2019}},
}

@proceedings{14829,
  editor       = {{Scheideler, Christian and Berenbrink, Petra}},
  isbn         = {{978-1-4503-6184-2}},
  publisher    = {{ACM}},
  title        = {{{The 31st ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2019, Phoenix, AZ, USA, June 22-24, 2019}}},
  doi          = {{10.1145/3323165}},
  year         = {{2019}},
}

@article{14830,
  author       = {{Gmyr, Robert and Lefevre, Jonas and Scheideler, Christian}},
  journal      = {{Theory Comput. Syst.}},
  number       = {{2}},
  pages        = {{177--199}},
  title        = {{{Self-Stabilizing Metric Graphs}}},
  doi          = {{10.1007/s00224-017-9823-4}},
  volume       = {{63}},
  year         = {{2019}},
}

@phdthesis{14849,
  author       = {{Vaz, Gavin Francis}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Using Just-in-Time Code Generation to Transparently Accelerate Applications in Heterogeneous Systems}}},
  year         = {{2019}},
}

