[{"publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:28Z","status":"public","type":"bachelorsthesis","year":"2016","language":[{"iso":"ger"}],"_id":"185","date_updated":"2022-01-06T06:53:36Z","author":[{"last_name":"Schmidt","full_name":"Schmidt, Christopher","first_name":"Christopher"}],"title":"Kundenbewertungen im Online-Handel – Alles Betrug?","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A4","_id":"8"},{"_id":"2","name":"SFB 901 - Project Area A"}],"user_id":"477","citation":{"ama":"Schmidt C. <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i> Universität Paderborn; 2016.","apa":"Schmidt, C. (2016). <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i> Universität Paderborn.","ieee":"C. Schmidt, <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i> Universität Paderborn, 2016.","chicago":"Schmidt, Christopher. <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i> Universität Paderborn, 2016.","bibtex":"@book{Schmidt_2016, title={Kundenbewertungen im Online-Handel – Alles Betrug?}, publisher={Universität Paderborn}, author={Schmidt, Christopher}, year={2016} }","mla":"Schmidt, Christopher. <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i> Universität Paderborn, 2016.","short":"C. Schmidt, Kundenbewertungen im Online-Handel – Alles Betrug?, Universität Paderborn, 2016."}},{"series_title":"Lecture Notes in Informatics","citation":{"bibtex":"@inproceedings{Czech_Jakobs_Wehrheim_2016, series={Lecture Notes in Informatics}, title={Just test what you cannot verify!}, booktitle={Software Engineering 2016}, author={Czech, Mike and Jakobs, Marie-Christine and Wehrheim, Heike}, editor={Jens Knoop, Uwe ZdunEditor}, year={2016}, pages={17–18}, collection={Lecture Notes in Informatics} }","mla":"Czech, Mike, et al. “Just Test What You Cannot Verify!” <i>Software Engineering 2016</i>, edited by Uwe Zdun Jens Knoop, 2016, pp. 17–18.","short":"M. Czech, M.-C. Jakobs, H. Wehrheim, in: U.Z. Jens Knoop (Ed.), Software Engineering 2016, 2016, pp. 17–18.","apa":"Czech, M., Jakobs, M.-C., &#38; Wehrheim, H. (2016). Just test what you cannot verify! In U. Z. Jens Knoop (Ed.), <i>Software Engineering 2016</i> (pp. 17–18).","ama":"Czech M, Jakobs M-C, Wehrheim H. Just test what you cannot verify! In: Jens Knoop UZ, ed. <i>Software Engineering 2016</i>. Lecture Notes in Informatics. ; 2016:17-18.","ieee":"M. Czech, M.-C. Jakobs, and H. Wehrheim, “Just test what you cannot verify!,” in <i>Software Engineering 2016</i>, 2016, pp. 17–18.","chicago":"Czech, Mike, Marie-Christine Jakobs, and Heike Wehrheim. “Just Test What You Cannot Verify!” In <i>Software Engineering 2016</i>, edited by Uwe Zdun Jens Knoop, 17–18. Lecture Notes in Informatics, 2016."},"department":[{"_id":"77"}],"author":[{"last_name":"Czech","full_name":"Czech, Mike","first_name":"Mike"},{"last_name":"Jakobs","first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"editor":[{"last_name":"Jens Knoop","full_name":"Jens Knoop, Uwe Zdun","first_name":"Uwe Zdun"}],"_id":"186","file_date_updated":"2018-03-21T12:32:11Z","date_updated":"2022-01-06T06:53:43Z","date_created":"2017-10-17T12:41:28Z","status":"public","year":"2016","language":[{"iso":"eng"}],"user_id":"477","file":[{"creator":"florida","file_size":55775,"file_name":"186-SEsubmission8.pdf","access_level":"closed","content_type":"application/pdf","file_id":"1532","date_created":"2018-03-21T12:32:11Z","date_updated":"2018-03-21T12:32:11Z","relation":"main_file","success":1}],"title":"Just test what you cannot verify!","abstract":[{"lang":"eng","text":"Software verification is an established method to ensure software safety. Nevertheless, verification still often fails, either because it consumes too much resources, e.g., time or memory, or the technique is not mature enough to verify the property. Often then discarding the partial verification, the validation process proceeds with techniques like testing.To enable standard testing to profit from previous, partial verification, we use a summary of the verification effort to simplify the program for subsequent testing. Our techniques use this summary to construct a residual program which only contains program paths with unproven assertions. Afterwards, the residual program can be used with standard testing tools.Our first experiments show that testing profits from the partial verification.The test effort is reduced and combined verification and testing is faster than a complete verification."}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"page":"17-18","ddc":["040"],"publication":"Software Engineering 2016","type":"conference"},{"ddc":["040"],"date_created":"2017-10-17T12:41:35Z","publisher":"Universität Paderborn","year":"2016","type":"report","language":[{"iso":"eng"}],"status":"public","file_date_updated":"2018-03-21T10:36:37Z","_id":"221","date_updated":"2022-01-06T06:55:25Z","title":"An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)","file":[{"creator":"florida","file_size":6498677,"file_name":"221-SFB_SSL_Techreport.pdf","file_id":"1512","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T10:36:37Z","relation":"main_file","date_updated":"2018-03-21T10:36:37Z","success":1}],"author":[{"last_name":"Platenius","first_name":"Marie Christin","full_name":"Platenius, Marie Christin"},{"full_name":"Josifovska, Klementina","first_name":"Klementina","last_name":"Josifovska"},{"full_name":"van Rooijen, Lorijn","first_name":"Lorijn","id":"58843","last_name":"van Rooijen"},{"last_name":"Arifulina","full_name":"Arifulina, Svetlana","first_name":"Svetlana"},{"full_name":"Becker, Matthias","first_name":"Matthias","last_name":"Becker"},{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"first_name":"Wilhelm","full_name":"Schäfer, Wilhelm","last_name":"Schäfer"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"_id":"11","name":"SFB 901 - Subproject B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"has_accepted_license":"1","citation":{"ieee":"M. C. Platenius <i>et al.</i>, <i>An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn, 2016.","chicago":"Platenius, Marie Christin, Klementina Josifovska, Lorijn van Rooijen, Svetlana Arifulina, Matthias Becker, Gregor Engels, and Wilhelm Schäfer. <i>An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn, 2016.","apa":"Platenius, M. C., Josifovska, K., van Rooijen, L., Arifulina, S., Becker, M., Engels, G., &#38; Schäfer, W. (2016). <i>An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn.","ama":"Platenius MC, Josifovska K, van Rooijen L, et al. <i>An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn; 2016.","short":"M.C. Platenius, K. Josifovska, L. van Rooijen, S. Arifulina, M. Becker, G. Engels, W. Schäfer, An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3), Universität Paderborn, 2016.","bibtex":"@book{Platenius_Josifovska_van Rooijen_Arifulina_Becker_Engels_Schäfer_2016, title={An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)}, publisher={Universität Paderborn}, author={Platenius, Marie Christin and Josifovska, Klementina and van Rooijen, Lorijn and Arifulina, Svetlana and Becker, Matthias and Engels, Gregor and Schäfer, Wilhelm}, year={2016} }","mla":"Platenius, Marie Christin, et al. <i>An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn, 2016."},"user_id":"477","department":[{"_id":"66"},{"_id":"76"}]},{"page":"112--122","publication":"Computers & Electrical Engineering","ddc":["040"],"type":"journal_article","user_id":"477","file":[{"success":1,"date_updated":"2018-03-21T10:36:08Z","relation":"main_file","date_created":"2018-03-21T10:36:08Z","access_level":"closed","content_type":"application/pdf","file_id":"1511","file_size":931048,"file_name":"222-1-s2.0-S0045790616300684-main.pdf","creator":"florida"}],"title":"An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip","abstract":[{"lang":"eng","text":"Virtual field programmable gate arrays (FPGA) are overlay architectures realized on top of physical FPGAs. They are proposed to enhance or abstract away from the physical FPGA for experimenting with novel architectures and design tool flows. In this paper, we present an embedding of a ZUMA-based virtual FPGA fabric into a complete configurable system-on-chip. Such an embedding is required to fully harness the potential of virtual FPGAs, in particular to give the virtual circuits access to main memory and operating system services, and to enable a concurrent operation of virtualized and non-virtualized circuitry. We discuss our extension to ZUMA and its embedding into the ReconOS operating system for hardware/software systems. Furthermore, we present an open source tool flow to synthesize configurations for the virtual FPGA, along with an analysis of the area and delay overheads involved."}],"doi":"10.1016/j.compeleceng.2016.04.005","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"}],"file_date_updated":"2018-03-21T10:36:08Z","_id":"222","date_updated":"2022-01-06T06:55:29Z","publisher":"Elsevier","date_created":"2017-10-17T12:41:35Z","status":"public","year":"2016","language":[{"iso":"eng"}],"citation":{"apa":"Wiersema, T., Bockhorn, A., &#38; Platzner, M. (2016). An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip. <i>Computers &#38; Electrical Engineering</i>, 112--122. <a href=\"https://doi.org/10.1016/j.compeleceng.2016.04.005\">https://doi.org/10.1016/j.compeleceng.2016.04.005</a>","ama":"Wiersema T, Bockhorn A, Platzner M. An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip. <i>Computers &#38; Electrical Engineering</i>. 2016:112--122. doi:<a href=\"https://doi.org/10.1016/j.compeleceng.2016.04.005\">10.1016/j.compeleceng.2016.04.005</a>","ieee":"T. Wiersema, A. Bockhorn, and M. Platzner, “An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip,” <i>Computers &#38; Electrical Engineering</i>, pp. 112--122, 2016.","chicago":"Wiersema, Tobias, Arne Bockhorn, and Marco Platzner. “An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip.” <i>Computers &#38; Electrical Engineering</i>, 2016, 112--122. <a href=\"https://doi.org/10.1016/j.compeleceng.2016.04.005\">https://doi.org/10.1016/j.compeleceng.2016.04.005</a>.","bibtex":"@article{Wiersema_Bockhorn_Platzner_2016, title={An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip}, DOI={<a href=\"https://doi.org/10.1016/j.compeleceng.2016.04.005\">10.1016/j.compeleceng.2016.04.005</a>}, journal={Computers &#38; Electrical Engineering}, publisher={Elsevier}, author={Wiersema, Tobias and Bockhorn, Arne and Platzner, Marco}, year={2016}, pages={112--122} }","mla":"Wiersema, Tobias, et al. “An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip.” <i>Computers &#38; Electrical Engineering</i>, Elsevier, 2016, pp. 112--122, doi:<a href=\"https://doi.org/10.1016/j.compeleceng.2016.04.005\">10.1016/j.compeleceng.2016.04.005</a>.","short":"T. Wiersema, A. Bockhorn, M. Platzner, Computers &#38; Electrical Engineering (2016) 112--122."},"department":[{"_id":"78"}],"author":[{"last_name":"Wiersema","id":"3118","full_name":"Wiersema, Tobias","first_name":"Tobias"},{"last_name":"Bockhorn","first_name":"Arne","full_name":"Bockhorn, Arne"},{"full_name":"Platzner, Marco","first_name":"Marco","id":"398","last_name":"Platzner"}]},{"publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:35Z","ddc":["040"],"status":"public","language":[{"iso":"eng"}],"year":"2016","type":"mastersthesis","file_date_updated":"2018-03-21T10:35:39Z","_id":"223","date_updated":"2022-01-06T06:55:30Z","file":[{"relation":"main_file","date_updated":"2018-03-21T10:35:39Z","success":1,"creator":"florida","file_size":1127144,"file_name":"223-MasterarbeitHinnenthal.pdf","access_level":"closed","file_id":"1510","content_type":"application/pdf","date_created":"2018-03-21T10:35:39Z"}],"author":[{"last_name":"Hinnenthal","id":"32229","full_name":"Hinnenthal, Kristian","first_name":"Kristian"}],"title":"Aggregation in Overlay Networks","abstract":[{"text":"We consider the problem of aggregation in overlay networks. We use a synchronous time model in which each node has polylogarithmic memory and can send at most a polylogarithmic number of messages per round. We investigate how to quickly compute the result of an aggregate functionf over elements that are distributed among the nodes of the network such that the result is eventually known by a selected root node. We show how to compute distributive aggregate functions such as SUM, MAX, and OR in time $O(\\log n / \\log\\log n)$ using a tree that is created in a pre-processing phase. If only a polylogarithmic number of data items need to be aggregated, we show how to compute the result in time $O(\\sqrt{\\log n / \\log\\log n})$. Furthermore, we show how to compute holistic aggregate functions such as DISTINCT, SMALLEST(k) and MODE(k) in time $O(\\log n / \\log\\log n)$. Finally, we show a lower bound of $\\Omega(\\sqrt{\\log n / \\log\\log n})$ for deterministic algorithms that compute any of the aggregate functions in the scope of the thesis.","lang":"eng"}],"has_accepted_license":"1","supervisor":[{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"user_id":"15504","citation":{"short":"K. Hinnenthal, Aggregation in Overlay Networks, Universität Paderborn, 2016.","bibtex":"@book{Hinnenthal_2016, title={Aggregation in Overlay Networks}, publisher={Universität Paderborn}, author={Hinnenthal, Kristian}, year={2016} }","mla":"Hinnenthal, Kristian. <i>Aggregation in Overlay Networks</i>. Universität Paderborn, 2016.","ieee":"K. Hinnenthal, <i>Aggregation in Overlay Networks</i>. Universität Paderborn, 2016.","chicago":"Hinnenthal, Kristian. <i>Aggregation in Overlay Networks</i>. Universität Paderborn, 2016.","apa":"Hinnenthal, K. (2016). <i>Aggregation in Overlay Networks</i>. Universität Paderborn.","ama":"Hinnenthal K. <i>Aggregation in Overlay Networks</i>. Universität Paderborn; 2016."},"department":[{"_id":"79"}]},{"user_id":"477","abstract":[{"text":"In modern software development, paradigms like component-based software engineering (CBSE) and service-oriented architectures (SOA) emphasize the construction of large software systems out of existing components or services. Therein, a service is a self-contained piece of software, which adheres to a specified interface. In a model-based software design, this interface constitutes our sole knowledge of the service at design time, while service implementations are not available. Therefore, correctness checks or detection of potential errors in service compositions has to be carried out without the possibility of executing services. This challenges the usage of standard software error localization techniques for service compositions. In this paper, we review state-of-the-art approaches for error localization of software and discuss their applicability to service compositions.","lang":"eng"}],"doi":"10.1007/978-3-319-44482-6_16","has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"file":[{"success":1,"relation":"main_file","date_updated":"2018-03-21T10:35:04Z","date_created":"2018-03-21T10:35:04Z","content_type":"application/pdf","access_level":"closed","file_id":"1509","file_name":"224-chp_3A10.1007_2F978-3-319-44482-6_16.pdf","file_size":389042,"creator":"florida"}],"title":"A short survey on using software error localization for service compositions","page":"248--262","type":"conference","publication":"Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)","ddc":["040"],"department":[{"_id":"77"}],"citation":{"ama":"Krämer J, Wehrheim H. A short survey on using software error localization for service compositions. In: <i>Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)</i>. LNCS. ; 2016:248--262. doi:<a href=\"https://doi.org/10.1007/978-3-319-44482-6_16\">10.1007/978-3-319-44482-6_16</a>","apa":"Krämer, J., &#38; Wehrheim, H. (2016). A short survey on using software error localization for service compositions. In <i>Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)</i> (pp. 248--262). <a href=\"https://doi.org/10.1007/978-3-319-44482-6_16\">https://doi.org/10.1007/978-3-319-44482-6_16</a>","ieee":"J. Krämer and H. Wehrheim, “A short survey on using software error localization for service compositions,” in <i>Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)</i>, 2016, pp. 248--262.","chicago":"Krämer, Julia, and Heike Wehrheim. “A Short Survey on Using Software Error Localization for Service Compositions.” In <i>Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)</i>, 248--262. LNCS, 2016. <a href=\"https://doi.org/10.1007/978-3-319-44482-6_16\">https://doi.org/10.1007/978-3-319-44482-6_16</a>.","bibtex":"@inproceedings{Krämer_Wehrheim_2016, series={LNCS}, title={A short survey on using software error localization for service compositions}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-44482-6_16\">10.1007/978-3-319-44482-6_16</a>}, booktitle={Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)}, author={Krämer, Julia and Wehrheim, Heike}, year={2016}, pages={248--262}, collection={LNCS} }","mla":"Krämer, Julia, and Heike Wehrheim. “A Short Survey on Using Software Error Localization for Service Compositions.” <i>Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)</i>, 2016, pp. 248--262, doi:<a href=\"https://doi.org/10.1007/978-3-319-44482-6_16\">10.1007/978-3-319-44482-6_16</a>.","short":"J. Krämer, H. Wehrheim, in: Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016), 2016, pp. 248--262."},"series_title":"LNCS","author":[{"first_name":"Julia","full_name":"Krämer, Julia","last_name":"Krämer"},{"id":"573","last_name":"Wehrheim","first_name":"Heike","full_name":"Wehrheim, Heike"}],"date_updated":"2022-01-06T06:55:32Z","file_date_updated":"2018-03-21T10:35:04Z","_id":"224","status":"public","language":[{"iso":"eng"}],"year":"2016","date_created":"2017-10-17T12:41:35Z"},{"date_created":"2017-10-17T12:41:35Z","publication":"Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","ddc":["040"],"year":"2016","type":"conference","status":"public","_id":"225","file_date_updated":"2018-03-21T10:34:35Z","page":"1--8","date_updated":"2022-01-06T06:55:34Z","title":"A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality","author":[{"last_name":"Jungmann","first_name":"Alexander","full_name":"Jungmann, Alexander"},{"full_name":"Kleinjohann, Bernd","first_name":"Bernd","last_name":"Kleinjohann"}],"file":[{"file_id":"1508","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T10:34:35Z","creator":"florida","file_name":"225-07733522.pdf","file_size":1323587,"success":1,"relation":"main_file","date_updated":"2018-03-21T10:34:35Z"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"_id":"3","name":"SFB 901 - Project Area B"}],"abstract":[{"text":"Image Processing is fundamental for any camera-based vision system. In order to automate the prototyping process of image processing solutions to some extend, we propose a holistic, adaptive approach that comprises concepts for specification, composition, recommendation, execution, and rating of image processing functionality. The fundamental idea is to realize image processing applications according to Service-oriented Computing design principles. That is, distinct image processing functionality is encapsulated in terms of stateless services. Services are then used as building blocks for more complex image processing functionality. To automatically compose complex image processing functionality, our proposed approach incorporates a flexible, Artificial Intelligence planning-based forward search algorithm. Decision-making between alternative composition steps is supported by a learning recommendation system, which keeps track of valid composition steps by automatically constructing a composition grammar. In addition, it adapts to solutions of high quality by means of feedback-based Reinforcement Learning techniques. A concrete use case serves as proof of concept and demonstrates the feasibility of our holistic, adaptive approach.","lang":"eng"}],"doi":"10.1109/ETFA.2016.7733522","has_accepted_license":"1","citation":{"short":"A. Jungmann, B. Kleinjohann, in: Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2016, pp. 1--8.","bibtex":"@inproceedings{Jungmann_Kleinjohann_2016, title={A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality}, DOI={<a href=\"https://doi.org/10.1109/ETFA.2016.7733522\">10.1109/ETFA.2016.7733522</a>}, booktitle={Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}, author={Jungmann, Alexander and Kleinjohann, Bernd}, year={2016}, pages={1--8} }","mla":"Jungmann, Alexander, and Bernd Kleinjohann. “A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality.” <i>Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, 2016, pp. 1--8, doi:<a href=\"https://doi.org/10.1109/ETFA.2016.7733522\">10.1109/ETFA.2016.7733522</a>.","ieee":"A. Jungmann and B. Kleinjohann, “A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality,” in <i>Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, 2016, pp. 1--8.","chicago":"Jungmann, Alexander, and Bernd Kleinjohann. “A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality.” In <i>Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, 1--8, 2016. <a href=\"https://doi.org/10.1109/ETFA.2016.7733522\">https://doi.org/10.1109/ETFA.2016.7733522</a>.","apa":"Jungmann, A., &#38; Kleinjohann, B. (2016). A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality. In <i>Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i> (pp. 1--8). <a href=\"https://doi.org/10.1109/ETFA.2016.7733522\">https://doi.org/10.1109/ETFA.2016.7733522</a>","ama":"Jungmann A, Kleinjohann B. A Holistic and Adaptive Approach for Automated Prototyping of Image Processing Functionality. In: <i>Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)</i>. ; 2016:1--8. doi:<a href=\"https://doi.org/10.1109/ETFA.2016.7733522\">10.1109/ETFA.2016.7733522</a>"},"user_id":"15504"},{"author":[{"last_name":"Krämer","full_name":"Krämer, Julia","first_name":"Julia"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"citation":{"chicago":"Krämer, Julia, and Heike Wehrheim. “A Formal Approach to Error Localization and Correction in Service Compositions.” In <i>Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)</i>, 445--457. LNCS, 2016. <a href=\"https://doi.org/10.1007/978-3-319-50230-4_35\">https://doi.org/10.1007/978-3-319-50230-4_35</a>.","ieee":"J. Krämer and H. Wehrheim, “A Formal Approach to Error Localization and Correction in Service Compositions,” in <i>Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)</i>, 2016, pp. 445--457.","ama":"Krämer J, Wehrheim H. A Formal Approach to Error Localization and Correction in Service Compositions. In: <i>Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)</i>. LNCS. ; 2016:445--457. doi:<a href=\"https://doi.org/10.1007/978-3-319-50230-4_35\">10.1007/978-3-319-50230-4_35</a>","apa":"Krämer, J., &#38; Wehrheim, H. (2016). A Formal Approach to Error Localization and Correction in Service Compositions. In <i>Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)</i> (pp. 445--457). <a href=\"https://doi.org/10.1007/978-3-319-50230-4_35\">https://doi.org/10.1007/978-3-319-50230-4_35</a>","short":"J. Krämer, H. Wehrheim, in: Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016), 2016, pp. 445--457.","mla":"Krämer, Julia, and Heike Wehrheim. “A Formal Approach to Error Localization and Correction in Service Compositions.” <i>Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)</i>, 2016, pp. 445--457, doi:<a href=\"https://doi.org/10.1007/978-3-319-50230-4_35\">10.1007/978-3-319-50230-4_35</a>.","bibtex":"@inproceedings{Krämer_Wehrheim_2016, series={LNCS}, title={A Formal Approach to Error Localization and Correction in Service Compositions}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-50230-4_35\">10.1007/978-3-319-50230-4_35</a>}, booktitle={Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)}, author={Krämer, Julia and Wehrheim, Heike}, year={2016}, pages={445--457}, collection={LNCS} }"},"series_title":"LNCS","department":[{"_id":"77"}],"date_created":"2017-10-17T12:41:36Z","status":"public","language":[{"iso":"eng"}],"year":"2016","_id":"226","file_date_updated":"2018-03-21T10:34:08Z","date_updated":"2022-01-06T06:55:37Z","file":[{"file_size":492018,"file_name":"226-chp_3A10.1007_2F978-3-319-50230-4_35.pdf","creator":"florida","date_created":"2018-03-21T10:34:08Z","access_level":"closed","content_type":"application/pdf","file_id":"1507","date_updated":"2018-03-21T10:34:08Z","relation":"main_file","success":1}],"title":"A Formal Approach to Error Localization and Correction in Service Compositions","abstract":[{"lang":"eng","text":"Error detection, localization and correction are time-intensive tasks in software development, but crucial to deliver functionally correct products. Thus, automated approaches to these tasks have been intensively studied for standard software systems. For model-based software systems, the situation is different. While error detection is still well-studied, error localization and correction is a less-studied domain. In this paper, we examine error localization and correction for models of service compositions. Based on formal definitions of error and correction in this context, we show that the classical approach of error localization and correction, i.e. first determining a set of suspicious statements and then proposing changes to these statements, is ineffective in our context. In fact, it lessens the chance to succeed in finding a correction at all.In this paper, we introduce correction proposal as a novel approach on error correction in service compositions integrating error localization and correction in one combined step. In addition, we provide an algorithm to compute such correction proposals automatically."}],"doi":"10.1007/978-3-319-50230-4_35","has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"user_id":"477","publication":"Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)","ddc":["040"],"type":"conference","page":"445--457"},{"_id":"227","file_date_updated":"2018-03-21T10:33:38Z","date_updated":"2022-01-06T06:55:39Z","date_created":"2017-10-17T12:41:36Z","language":[{"iso":"eng"}],"year":"2016","status":"public","citation":{"short":"M. Töws, H. Wehrheim, in: Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016), 2016, pp. 466--483.","bibtex":"@inproceedings{Töws_Wehrheim_2016, series={LNCS}, title={A CEGAR Scheme for Information Flow Analysis}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-47846-3_29\">10.1007/978-3-319-47846-3_29</a>}, booktitle={Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)}, author={Töws, Manuel and Wehrheim, Heike}, year={2016}, pages={466--483}, collection={LNCS} }","mla":"Töws, Manuel, and Heike Wehrheim. “A CEGAR Scheme for Information Flow Analysis.” <i>Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)</i>, 2016, pp. 466--483, doi:<a href=\"https://doi.org/10.1007/978-3-319-47846-3_29\">10.1007/978-3-319-47846-3_29</a>.","ieee":"M. Töws and H. Wehrheim, “A CEGAR Scheme for Information Flow Analysis,” in <i>Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)</i>, 2016, pp. 466--483.","chicago":"Töws, Manuel, and Heike Wehrheim. “A CEGAR Scheme for Information Flow Analysis.” In <i>Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)</i>, 466--483. LNCS, 2016. <a href=\"https://doi.org/10.1007/978-3-319-47846-3_29\">https://doi.org/10.1007/978-3-319-47846-3_29</a>.","apa":"Töws, M., &#38; Wehrheim, H. (2016). A CEGAR Scheme for Information Flow Analysis. In <i>Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)</i> (pp. 466--483). <a href=\"https://doi.org/10.1007/978-3-319-47846-3_29\">https://doi.org/10.1007/978-3-319-47846-3_29</a>","ama":"Töws M, Wehrheim H. A CEGAR Scheme for Information Flow Analysis. In: <i>Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)</i>. LNCS. ; 2016:466--483. doi:<a href=\"https://doi.org/10.1007/978-3-319-47846-3_29\">10.1007/978-3-319-47846-3_29</a>"},"series_title":"LNCS","department":[{"_id":"77"}],"author":[{"last_name":"Töws","id":"11315","full_name":"Töws, Manuel","first_name":"Manuel"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"page":"466--483","ddc":["040"],"publication":"Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)","type":"conference","user_id":"477","title":"A CEGAR Scheme for Information Flow Analysis","file":[{"success":1,"date_updated":"2018-03-21T10:33:38Z","relation":"main_file","date_created":"2018-03-21T10:33:38Z","content_type":"application/pdf","file_id":"1506","access_level":"closed","file_name":"227-chp_3A10.1007_2F978-3-319-47846-3_29.pdf","file_size":682849,"creator":"florida"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"doi":"10.1007/978-3-319-47846-3_29","abstract":[{"lang":"eng","text":"Information flow analysis studies the flow of data between program entities (e.g. variables), where the allowed flow is specified via security policies. Typical information flow analyses compute a conservative (over-)approximation of the flows in a program. Such an analysis may thus signal non-existing violations of the security policy.In this paper, we propose a new technique for inspecting the reported violations (counterexamples) for spuriousity. Similar to counterexample-guided-abstraction-refinement (CEGAR) in software verification, we use the result of this inspection to improve the next round of the analysis. We prove soundness of this scheme."}],"has_accepted_license":"1"},{"_id":"2271","date_updated":"2022-01-06T06:55:39Z","publisher":"Universität Paderborn","date_created":"2018-04-10T09:56:14Z","status":"public","language":[{"iso":"ger"}],"year":"2016","type":"mastersthesis","user_id":"477","citation":{"short":"A. Hesso, Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen, Universität Paderborn, 2016.","mla":"Hesso, Aref. <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität Paderborn, 2016.","bibtex":"@book{Hesso_2016, title={Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen}, publisher={Universität Paderborn}, author={Hesso, Aref}, year={2016} }","chicago":"Hesso, Aref. <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität Paderborn, 2016.","ieee":"A. Hesso, <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität Paderborn, 2016.","ama":"Hesso A. <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität Paderborn; 2016.","apa":"Hesso, A. (2016). <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität Paderborn."},"department":[{"_id":"19"}],"author":[{"full_name":"Hesso, Aref","first_name":"Aref","last_name":"Hesso"}],"title":"Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"8","name":"SFB 901 - Subproject A4"}]},{"file_date_updated":"2018-03-21T10:39:14Z","_id":"217","date_updated":"2022-01-06T06:55:11Z","date_created":"2017-10-17T12:41:34Z","year":"2016","language":[{"iso":"eng"}],"status":"public","citation":{"ama":"Schwichtenberg S. Automatized Derivation of Comprehensive Specifications for Black-box Services. In: <i>Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)</i>. ; 2016:815-818. doi:<a href=\"https://doi.org/10.1145/2889160.2889271\">10.1145/2889160.2889271</a>","apa":"Schwichtenberg, S. (2016). Automatized Derivation of Comprehensive Specifications for Black-box Services. In <i>Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)</i> (pp. 815–818). <a href=\"https://doi.org/10.1145/2889160.2889271\">https://doi.org/10.1145/2889160.2889271</a>","chicago":"Schwichtenberg, Simon. “Automatized Derivation of Comprehensive Specifications for Black-Box Services.” In <i>Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)</i>, 815–18, 2016. <a href=\"https://doi.org/10.1145/2889160.2889271\">https://doi.org/10.1145/2889160.2889271</a>.","ieee":"S. Schwichtenberg, “Automatized Derivation of Comprehensive Specifications for Black-box Services,” in <i>Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)</i>, 2016, pp. 815–818.","mla":"Schwichtenberg, Simon. “Automatized Derivation of Comprehensive Specifications for Black-Box Services.” <i>Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)</i>, 2016, pp. 815–18, doi:<a href=\"https://doi.org/10.1145/2889160.2889271\">10.1145/2889160.2889271</a>.","bibtex":"@inproceedings{Schwichtenberg_2016, title={Automatized Derivation of Comprehensive Specifications for Black-box Services}, DOI={<a href=\"https://doi.org/10.1145/2889160.2889271\">10.1145/2889160.2889271</a>}, booktitle={Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)}, author={Schwichtenberg, Simon}, year={2016}, pages={815–818} }","short":"S. Schwichtenberg, in: Proceedings of the 38th International Conference on Software Engineering Companion (ICSE), 2016, pp. 815–818."},"department":[{"_id":"66"}],"author":[{"full_name":"Schwichtenberg, Simon","first_name":"Simon","id":"13235","last_name":"Schwichtenberg"}],"page":"815-818","publication":"Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)","ddc":["040"],"type":"conference","user_id":"477","title":"Automatized Derivation of Comprehensive Specifications for Black-box Services","file":[{"date_updated":"2018-03-21T10:39:14Z","relation":"main_file","success":1,"file_size":691294,"file_name":"217-sig-alternate.pdf","creator":"florida","date_created":"2018-03-21T10:39:14Z","file_id":"1516","access_level":"closed","content_type":"application/pdf"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Project Area B","_id":"3"}],"has_accepted_license":"1","abstract":[{"lang":"eng","text":"Today, cloud vendors host third party black-box services, whose developers usually provide only textual descriptions or purely syntactical interface specifications. Cloud vendors that give substantial support to other third party developers to integrate hosted services into new software solutions would have a unique selling feature over their competitors. However, to reliably determine if a service is reusable, comprehensive service specifications are needed. Characteristic for comprehensive in contrast to syntactical specifications are the formalization of ontological and behavioral semantics, homogeneity according to a global ontology, and a service grounding that links the abstract service description and its technical realization. Homogeneous, semantical specifications enable to reliably identify reusable services, whereas the service grounding is needed for the technical service integration. In general, comprehensive specifications are not availableand have to be derived. Existing automatized approaches are restricted to certain characteristics of comprehensiveness. In my PhD, I consider an automatized approach to derive fully-fledged comprehensive specifications for black-box services. Ontological semantics are derived from syntactical interface specifications. Behavioral semantics are mined from call logs that cloud vendors create to monitor the hosted services. The specifications are harmonized over a global ontology. The service grounding is established using traceability information. The approach enables third party developers to compose services into complex systems and creates new sales channels for cloud and service providers."}],"doi":"10.1145/2889160.2889271"},{"citation":{"ieee":"A. Jungmann and B. Kleinjohann, “Automatic Composition of Service-based Image Processing Applications,” in <i>Proceedings of the 13th IEEE International Conference on Services Computing (SCC)</i>, 2016, pp. 106--113.","chicago":"Jungmann, Alexander, and Bernd Kleinjohann. “Automatic Composition of Service-Based Image Processing Applications.” In <i>Proceedings of the 13th IEEE International Conference on Services Computing (SCC)</i>, 106--113, 2016. <a href=\"https://doi.org/10.1109/SCC.2016.21\">https://doi.org/10.1109/SCC.2016.21</a>.","apa":"Jungmann, A., &#38; Kleinjohann, B. (2016). Automatic Composition of Service-based Image Processing Applications. In <i>Proceedings of the 13th IEEE International Conference on Services Computing (SCC)</i> (pp. 106--113). <a href=\"https://doi.org/10.1109/SCC.2016.21\">https://doi.org/10.1109/SCC.2016.21</a>","ama":"Jungmann A, Kleinjohann B. Automatic Composition of Service-based Image Processing Applications. In: <i>Proceedings of the 13th IEEE International Conference on Services Computing (SCC)</i>. ; 2016:106--113. doi:<a href=\"https://doi.org/10.1109/SCC.2016.21\">10.1109/SCC.2016.21</a>","short":"A. Jungmann, B. Kleinjohann, in: Proceedings of the 13th IEEE International Conference on Services Computing (SCC), 2016, pp. 106--113.","bibtex":"@inproceedings{Jungmann_Kleinjohann_2016, title={Automatic Composition of Service-based Image Processing Applications}, DOI={<a href=\"https://doi.org/10.1109/SCC.2016.21\">10.1109/SCC.2016.21</a>}, booktitle={Proceedings of the 13th IEEE International Conference on Services Computing (SCC)}, author={Jungmann, Alexander and Kleinjohann, Bernd}, year={2016}, pages={106--113} }","mla":"Jungmann, Alexander, and Bernd Kleinjohann. “Automatic Composition of Service-Based Image Processing Applications.” <i>Proceedings of the 13th IEEE International Conference on Services Computing (SCC)</i>, 2016, pp. 106--113, doi:<a href=\"https://doi.org/10.1109/SCC.2016.21\">10.1109/SCC.2016.21</a>."},"user_id":"15504","title":"Automatic Composition of Service-based Image Processing Applications","file":[{"date_created":"2018-03-21T10:38:44Z","content_type":"application/pdf","file_id":"1515","access_level":"closed","file_size":836658,"file_name":"218-07557442.pdf","creator":"florida","success":1,"relation":"main_file","date_updated":"2018-03-21T10:38:44Z"}],"author":[{"last_name":"Jungmann","full_name":"Jungmann, Alexander","first_name":"Alexander"},{"first_name":"Bernd","full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"_id":"3","name":"SFB 901 - Project Area B"}],"abstract":[{"text":"In the Image Processing domain, automated generation of complex Image Processing functionality is highly desirable; e.g., for rapid prototyping. Service composition techniques, in turn, facilitate automated generation of complex functionality based on building blocks in terms of services. For that reason, we aim for transferring the Service Composition paradigm into the Image Processing domain. In this paper, we present our symbolic composition approach that enables us to automatically generate Image Processing applications. Functionality of Image Processing services is described by means of a variant of first-order logic, which grounds on domain knowledge operationalized in terms of ontologies. A Petri-net formalism serves as basis for modeling data-flow of services and composed services. A planning-based composition algorithm automatically composes complex data-flow for a required functionality. A brief evaluation serves as proof of concept.","lang":"eng"}],"has_accepted_license":"1","doi":"10.1109/SCC.2016.21","_id":"218","file_date_updated":"2018-03-21T10:38:44Z","page":"106--113","date_updated":"2022-01-06T06:55:14Z","ddc":["040"],"publication":"Proceedings of the 13th IEEE International Conference on Services Computing (SCC)","date_created":"2017-10-17T12:41:34Z","year":"2016","type":"conference","status":"public"},{"user_id":"36399","file":[{"creator":"florida","file_size":169229,"file_name":"219-a42-jazayeri.pdf","access_level":"closed","file_id":"1514","content_type":"application/pdf","date_created":"2018-03-21T10:38:17Z","relation":"main_file","date_updated":"2018-03-21T10:38:17Z","success":1}],"title":"Architectural Management of On-The-Fly Computing Markets","doi":"10.1145/2993412.3010821","abstract":[{"text":"Existing software markets like Google Play allow users to search among available Apps and select one based on the description provided for the App or based on its rating. Future software markets facilitate on-the-fly composition of such Apps based on users’ individual wishes. Realizing such On-The-Fly Computing (OTF) markets requires support of sophisticated software features. In addition, suitable orchestration among such features needs to ensure well-alignment of business and IT aspects in case of run-time changes like market dynamics. However, all these introduce new architectural and management complexities, which are specific to such markets. An architecture framework for OTF markets will include design solutions to overcome these complexities. In my PhD, I aim at identifying an architecture framework for OTF markets including main architectural building blocks and a systematic development process. Such an architecture framework enables the development of OTF markets in the future. Furthermore, this knowledge can be used as a basis to improve existing software markets by integrating missing functionalities.","lang":"eng"}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"name":"SFB 901 - Project Area C","_id":"4"}],"page":"42","ddc":["040"],"publication":"Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)","type":"conference","citation":{"chicago":"Jazayeri, Bahar. “Architectural Management of On-The-Fly Computing Markets.” In <i>Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)</i>, 42. Copenhagen, Denmark: ACM, 2016. <a href=\"https://doi.org/10.1145/2993412.3010821\">https://doi.org/10.1145/2993412.3010821</a>.","ieee":"B. Jazayeri, “Architectural Management of On-The-Fly Computing Markets,” in <i>Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)</i>, 2016, p. 42.","apa":"Jazayeri, B. (2016). Architectural Management of On-The-Fly Computing Markets. In <i>Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)</i> (p. 42). Copenhagen, Denmark: ACM. <a href=\"https://doi.org/10.1145/2993412.3010821\">https://doi.org/10.1145/2993412.3010821</a>","ama":"Jazayeri B. Architectural Management of On-The-Fly Computing Markets. In: <i>Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)</i>. Copenhagen, Denmark: ACM; 2016:42. doi:<a href=\"https://doi.org/10.1145/2993412.3010821\">10.1145/2993412.3010821</a>","short":"B. Jazayeri, in: Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops), ACM, Copenhagen, Denmark, 2016, p. 42.","mla":"Jazayeri, Bahar. “Architectural Management of On-The-Fly Computing Markets.” <i>Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)</i>, ACM, 2016, p. 42, doi:<a href=\"https://doi.org/10.1145/2993412.3010821\">10.1145/2993412.3010821</a>.","bibtex":"@inproceedings{Jazayeri_2016, place={Copenhagen, Denmark}, title={Architectural Management of On-The-Fly Computing Markets}, DOI={<a href=\"https://doi.org/10.1145/2993412.3010821\">10.1145/2993412.3010821</a>}, booktitle={Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)}, publisher={ACM}, author={Jazayeri, Bahar}, year={2016}, pages={42} }"},"department":[{"_id":"66"}],"author":[{"id":"36399","last_name":"Jazayeri","full_name":"Jazayeri, Bahar","first_name":"Bahar"}],"place":"Copenhagen, Denmark","_id":"219","file_date_updated":"2018-03-21T10:38:17Z","date_updated":"2022-01-06T06:55:19Z","publisher":"ACM","date_created":"2017-10-17T12:41:34Z","status":"public","language":[{"iso":"eng"}],"year":"2016"},{"status":"public","type":"dissertation","year":"2016","publisher":"Universität Paderborn","ddc":["040"],"date_created":"2017-10-17T12:41:34Z","date_updated":"2022-01-06T06:55:22Z","file_date_updated":"2018-03-21T10:37:11Z","_id":"220","supervisor":[{"full_name":"Karl, Holger","first_name":"Holger","last_name":"Karl","id":"126"}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"_id":"16","name":"SFB 901 - Subprojekt C4"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Project Area C","_id":"4"}],"file":[{"success":1,"relation":"main_file","date_updated":"2018-03-21T10:37:11Z","date_created":"2018-03-21T10:37:11Z","file_id":"1513","access_level":"closed","content_type":"application/pdf","file_name":"220-Keller_PhD-Theses_01.pdf","file_size":7467820,"creator":"florida"}],"author":[{"first_name":"Matthias","full_name":"Keller, Matthias","last_name":"Keller"}],"title":"Application Deployment at Distributed Clouds","department":[{"_id":"75"}],"user_id":"477","citation":{"short":"M. Keller, Application Deployment at Distributed Clouds, Universität Paderborn, 2016.","bibtex":"@book{Keller_2016, title={Application Deployment at Distributed Clouds}, publisher={Universität Paderborn}, author={Keller, Matthias}, year={2016} }","mla":"Keller, Matthias. <i>Application Deployment at Distributed Clouds</i>. Universität Paderborn, 2016.","ieee":"M. Keller, <i>Application Deployment at Distributed Clouds</i>. Universität Paderborn, 2016.","chicago":"Keller, Matthias. <i>Application Deployment at Distributed Clouds</i>. Universität Paderborn, 2016.","apa":"Keller, M. (2016). <i>Application Deployment at Distributed Clouds</i>. Universität Paderborn.","ama":"Keller M. <i>Application Deployment at Distributed Clouds</i>. Universität Paderborn; 2016."}},{"year":"2016","publication_identifier":{"issn":["1526-1719"]},"language":[{"iso":"eng"}],"status":"public","date_created":"2018-11-19T15:33:50Z","publisher":"Journal of Graph Algorithms and Applications","date_updated":"2022-01-06T07:02:38Z","file_date_updated":"2018-11-27T11:58:08Z","_id":"5762","intvolume":"        20","author":[{"id":"11319","last_name":"Strothmann","first_name":"Thim Frederik","full_name":"Strothmann, Thim Frederik"}],"department":[{"_id":"79"}],"citation":{"short":"T.F. Strothmann, Journal of Graph Algorithms and Applications 20 (2016) 79–100.","mla":"Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree.” <i>Journal of Graph Algorithms and Applications</i>, vol. 20, no. 1, Journal of Graph Algorithms and Applications, 2016, pp. 79–100, doi:<a href=\"https://doi.org/10.7155/jgaa.00385\">10.7155/jgaa.00385</a>.","bibtex":"@article{Strothmann_2016, title={The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree}, volume={20}, DOI={<a href=\"https://doi.org/10.7155/jgaa.00385\">10.7155/jgaa.00385</a>}, number={1}, journal={Journal of Graph Algorithms and Applications}, publisher={Journal of Graph Algorithms and Applications}, author={Strothmann, Thim Frederik}, year={2016}, pages={79–100} }","chicago":"Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree.” <i>Journal of Graph Algorithms and Applications</i> 20, no. 1 (2016): 79–100. <a href=\"https://doi.org/10.7155/jgaa.00385\">https://doi.org/10.7155/jgaa.00385</a>.","ieee":"T. F. Strothmann, “The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree,” <i>Journal of Graph Algorithms and Applications</i>, vol. 20, no. 1, pp. 79–100, 2016.","apa":"Strothmann, T. F. (2016). The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree. <i>Journal of Graph Algorithms and Applications</i>, <i>20</i>(1), 79–100. <a href=\"https://doi.org/10.7155/jgaa.00385\">https://doi.org/10.7155/jgaa.00385</a>","ama":"Strothmann TF. The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree. <i>Journal of Graph Algorithms and Applications</i>. 2016;20(1):79-100. doi:<a href=\"https://doi.org/10.7155/jgaa.00385\">10.7155/jgaa.00385</a>"},"publication_status":"published","type":"journal_article","quality_controlled":"1","publication":"Journal of Graph Algorithms and Applications","ddc":["040"],"issue":"1","page":"79-100","volume":20,"project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"doi":"10.7155/jgaa.00385","abstract":[{"text":"This paper introduces the problem of communication pattern adaption for a distributed self-adjusting binary search tree. We propose a simple local algorithm that is closely related to the over thirty-year-old idea of splay trees and evaluate its adaption performance in the distributed scenario if different communication patterns are provided. \r\nTo do so, the process of self-adjustment is modeled similarly to a basic network creation game in which the nodes want to communicate with only a certain subset of all nodes. \r\nWe show that, in general, the game (i.e., the process of local adjustments) does not converge, and that convergence is related to certain structures of the communication interests, which we call conflicts. \r\nWe classify conflicts and show that for two communication scenarios in which convergence is guaranteed, the self-adjusting tree performs well. \r\nFurthermore, we investigate the different classes of conflicts separately and show that, for a certain class of conflicts, the performance of the tree network is asymptotically as good as the performance for converging instances.\r\nHowever, for the other conflict classes, a distributed self-adjusting binary search tree adapts poorly.","lang":"eng"}],"has_accepted_license":"1","title":"The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search Tree","file":[{"success":1,"date_updated":"2018-11-27T11:58:08Z","relation":"main_file","file_id":"5912","content_type":"application/pdf","access_level":"closed","date_created":"2018-11-27T11:58:08Z","creator":"thim","file_size":2324066,"file_name":"Strothmann2016.20.1.pdf"}],"user_id":"477"},{"citation":{"bibtex":"@article{Wette_Karl_2016, title={DCT<sup>2</sup>Gen: A traffic generator for data centers}, DOI={<a href=\"https://doi.org/10.1016/j.comcom.2015.12.001\">10.1016/j.comcom.2015.12.001</a>}, journal={Computer Communications}, author={Wette, Philip and Karl, Holger}, year={2016}, pages={45--58} }","mla":"Wette, Philip, and Holger Karl. “DCT<sup>2</sup>Gen: A Traffic Generator for Data Centers.” <i>Computer Communications</i>, 2016, pp. 45--58, doi:<a href=\"https://doi.org/10.1016/j.comcom.2015.12.001\">10.1016/j.comcom.2015.12.001</a>.","short":"P. Wette, H. Karl, Computer Communications (2016) 45--58.","ama":"Wette P, Karl H. DCT<sup>2</sup>Gen: A traffic generator for data centers. <i>Computer Communications</i>. 2016:45--58. doi:<a href=\"https://doi.org/10.1016/j.comcom.2015.12.001\">10.1016/j.comcom.2015.12.001</a>","apa":"Wette, P., &#38; Karl, H. (2016). DCT<sup>2</sup>Gen: A traffic generator for data centers. <i>Computer Communications</i>, 45--58. <a href=\"https://doi.org/10.1016/j.comcom.2015.12.001\">https://doi.org/10.1016/j.comcom.2015.12.001</a>","ieee":"P. Wette and H. Karl, “DCT<sup>2</sup>Gen: A traffic generator for data centers,” <i>Computer Communications</i>, pp. 45--58, 2016.","chicago":"Wette, Philip, and Holger Karl. “DCT<sup>2</sup>Gen: A Traffic Generator for Data Centers.” <i>Computer Communications</i>, 2016, 45--58. <a href=\"https://doi.org/10.1016/j.comcom.2015.12.001\">https://doi.org/10.1016/j.comcom.2015.12.001</a>."},"user_id":"477","department":[{"_id":"75"}],"title":"DCT²Gen: A traffic generator for data centers","file":[{"file_name":"WetteKarl.pdf","file_size":1671431,"creator":"ups","date_created":"2018-11-02T15:59:29Z","content_type":"application/pdf","access_level":"closed","file_id":"5319","relation":"main_file","date_updated":"2018-11-02T15:59:29Z","success":1}],"author":[{"last_name":"Wette","full_name":"Wette, Philip","first_name":"Philip"},{"last_name":"Karl","id":"126","first_name":"Holger","full_name":"Karl, Holger"}],"project":[{"name":"SFB 901 - Subproject C4","_id":"16"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"}],"doi":"10.1016/j.comcom.2015.12.001","has_accepted_license":"1","page":"45--58","_id":"726","file_date_updated":"2018-11-02T15:59:29Z","date_updated":"2022-01-06T07:03:31Z","ddc":["000"],"publication":"Computer Communications","date_created":"2017-11-27T10:22:25Z","year":"2016","type":"journal_article","language":[{"iso":"eng"}],"status":"public"},{"status":"public","language":[{"iso":"eng"}],"year":"2016","date_created":"2017-11-27T10:22:25Z","date_updated":"2022-01-06T07:03:33Z","_id":"730","file_date_updated":"2018-06-25T13:16:56Z","author":[{"id":"13271","last_name":"Peuster","first_name":"Manuel","full_name":"Peuster, Manuel"},{"last_name":"Karl","id":"126","full_name":"Karl, Holger","first_name":"Holger"}],"urn":"7309","conference":{"name":"Fifth European Workshop on Software-Defined Networks (EWSDN","location":"Den Haag"},"department":[{"_id":"75"}],"publication_status":"published","citation":{"chicago":"Peuster, Manuel, and Holger Karl. “Understand Your Chains: Towards Performance Profile-Based Network Service Management.” In <i>Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>, 7--12, 2016. <a href=\"https://doi.org/10.1109/EWSDN.2016.9\">https://doi.org/10.1109/EWSDN.2016.9</a>.","ieee":"M. Peuster and H. Karl, “Understand Your Chains: Towards Performance Profile-Based Network Service Management,” in <i>Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>, Den Haag, 2016, pp. 7--12.","apa":"Peuster, M., &#38; Karl, H. (2016). Understand Your Chains: Towards Performance Profile-Based Network Service Management. In <i>Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i> (pp. 7--12). Den Haag. <a href=\"https://doi.org/10.1109/EWSDN.2016.9\">https://doi.org/10.1109/EWSDN.2016.9</a>","ama":"Peuster M, Karl H. Understand Your Chains: Towards Performance Profile-Based Network Service Management. In: <i>Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>. ; 2016:7--12. doi:<a href=\"https://doi.org/10.1109/EWSDN.2016.9\">10.1109/EWSDN.2016.9</a>","short":"M. Peuster, H. Karl, in: Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016, 2016, pp. 7--12.","mla":"Peuster, Manuel, and Holger Karl. “Understand Your Chains: Towards Performance Profile-Based Network Service Management.” <i>Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>, 2016, pp. 7--12, doi:<a href=\"https://doi.org/10.1109/EWSDN.2016.9\">10.1109/EWSDN.2016.9</a>.","bibtex":"@inproceedings{Peuster_Karl_2016, title={Understand Your Chains: Towards Performance Profile-Based Network Service Management}, DOI={<a href=\"https://doi.org/10.1109/EWSDN.2016.9\">10.1109/EWSDN.2016.9</a>}, booktitle={Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016}, author={Peuster, Manuel and Karl, Holger}, year={2016}, pages={7--12} }"},"type":"conference","publication":"Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016","ddc":["000"],"page":"7--12","abstract":[{"lang":"eng","text":"Allocating resources to virtualized network functions and services to meet service level agreements is a challenging task for NFV management and orchestration systems. This becomes even more challenging when agile development methodologies, like DevOps, are applied. In such scenarios, management and orchestration systems are continuously facing new versions of functions and services which makes it hard to decide how much resources have to be allocated to them to provide the expected service performance. \r\nOne solution for this problem is to support resource allocation decisions with performance behavior information obtained by profiling techniques applied to such network functions and services.\r\n\r\nIn this position paper, we analyze and discuss the components needed to generate such performance behavior information within the NFV DevOps workflow. We also outline research questions that identify open issues and missing pieces for a fully integrated NFV profiling solution. Further, we introduce a novel profiling mechanism that is able to profile virtualized network functions and entire network service chains under different resource constraints before they are deployed on production infrastructure."}],"doi":"10.1109/EWSDN.2016.9","has_accepted_license":"1","project":[{"_id":"25","name":"SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized Networks","call_identifier":"5G PPP Phase 1","grant_number":"671517"},{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"file":[{"content_type":"application/pdf","access_level":"open_access","file_id":"3353","date_created":"2018-06-25T13:10:10Z","creator":"peuster","file_name":"main_ris.pdf","file_size":966702,"relation":"main_file","date_updated":"2018-06-25T13:16:56Z"}],"title":"Understand Your Chains: Towards Performance Profile-Based Network Service Management","main_file_link":[{"url":"http://ieeexplore.ieee.org/document/7956044/"}],"user_id":"13271","oa":"1"},{"citation":{"apa":"Peuster, M., Karl, H., Enrico Redondi, A., &#38; Capone, A. (2016). Demonstrating on-demand cell switching with a two-layer mobile network testbed. In <i>IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016</i> (pp. 1015--1016). San Francisco. <a href=\"https://doi.org/10.1109/INFCOMW.2016.7562232\">https://doi.org/10.1109/INFCOMW.2016.7562232</a>","ama":"Peuster M, Karl H, Enrico Redondi A, Capone A. Demonstrating on-demand cell switching with a two-layer mobile network testbed. In: <i>IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016</i>. ; 2016:1015--1016. doi:<a href=\"https://doi.org/10.1109/INFCOMW.2016.7562232\">10.1109/INFCOMW.2016.7562232</a>","ieee":"M. Peuster, H. Karl, A. Enrico Redondi, and A. Capone, “Demonstrating on-demand cell switching with a two-layer mobile network testbed,” in <i>IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016</i>, San Francisco, 2016, pp. 1015--1016.","chicago":"Peuster, Manuel, Holger Karl, Alessandro Enrico Redondi, and Antonio Capone. “Demonstrating On-Demand Cell Switching with a Two-Layer Mobile Network Testbed.” In <i>IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016</i>, 1015--1016, 2016. <a href=\"https://doi.org/10.1109/INFCOMW.2016.7562232\">https://doi.org/10.1109/INFCOMW.2016.7562232</a>.","bibtex":"@inproceedings{Peuster_Karl_Enrico Redondi_Capone_2016, title={Demonstrating on-demand cell switching with a two-layer mobile network testbed}, DOI={<a href=\"https://doi.org/10.1109/INFCOMW.2016.7562232\">10.1109/INFCOMW.2016.7562232</a>}, booktitle={IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016}, author={Peuster, Manuel and Karl, Holger and Enrico Redondi, Alessandro and Capone, Antonio}, year={2016}, pages={1015--1016} }","mla":"Peuster, Manuel, et al. “Demonstrating On-Demand Cell Switching with a Two-Layer Mobile Network Testbed.” <i>IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016</i>, 2016, pp. 1015--1016, doi:<a href=\"https://doi.org/10.1109/INFCOMW.2016.7562232\">10.1109/INFCOMW.2016.7562232</a>.","short":"M. Peuster, H. Karl, A. Enrico Redondi, A. Capone, in: IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016, 2016, pp. 1015--1016."},"publication_status":"published","department":[{"_id":"75"}],"conference":{"name":"IEEE Conference on Computer Communications Workshops, INFOCOM","location":"San Francisco"},"author":[{"full_name":"Peuster, Manuel","first_name":"Manuel","id":"13271","last_name":"Peuster"},{"id":"126","last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"},{"last_name":"Enrico Redondi","first_name":"Alessandro","full_name":"Enrico Redondi, Alessandro"},{"first_name":"Antonio","full_name":"Capone, Antonio","last_name":"Capone"}],"_id":"731","file_date_updated":"2018-11-02T14:11:50Z","date_updated":"2022-01-06T07:03:34Z","date_created":"2017-11-27T10:22:25Z","language":[{"iso":"eng"}],"year":"2016","status":"public","main_file_link":[{"url":"http://ieeexplore.ieee.org/document/7562232/"}],"user_id":"477","title":"Demonstrating on-demand cell switching with a two-layer mobile network testbed","file":[{"file_name":"07562232.pdf","file_size":2080026,"creator":"ups","date_created":"2018-11-02T14:11:50Z","access_level":"closed","file_id":"5264","content_type":"application/pdf","relation":"main_file","date_updated":"2018-11-02T14:11:50Z","success":1}],"project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"doi":"10.1109/INFCOMW.2016.7562232","has_accepted_license":"1","abstract":[{"text":"Traditional cellular networks are forced to remain active regardless of the actual amount of traffic that is currently produced/requested, with a clear waste of energy. Two-layer mobile networks with separated signalling and data layers have been recently proposed for energy savings in future implementations. These networks are able to switch off unneeded data cells completely while maintaining full coverage with their signalling cells, thus saving energy. In this demonstration, we showcase a testbed that uses Wi-Fi access points to emulate small cells of the data layer and a publicly available cellular connection as the signalling layer. We use off-the-shelf Android smartphones with an ad-hoc networking management module and a MultiPath TCP-enabled kernel to manage the Wi-Fi and cellular interfaces simultaneously.\r\nThe testbed is used to demonstrate the general feasibility of this layered architecture and to facilitate experiments with network-wide resource optimization. ","lang":"eng"}],"page":"1015--1016","publication":"IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016","ddc":["000"],"type":"conference"},{"date_created":"2017-11-27T10:22:25Z","language":[{"iso":"eng"}],"year":"2016","status":"public","_id":"738","file_date_updated":"2018-06-25T13:17:34Z","date_updated":"2022-01-06T07:03:36Z","urn":"7384","conference":{"name":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","location":"Palo Alto"},"author":[{"id":"13271","last_name":"Peuster","first_name":"Manuel","full_name":"Peuster, Manuel"},{"id":"126","last_name":"Karl","first_name":"Holger","full_name":"Karl, Holger"},{"first_name":"Steven","full_name":"van Rossem, Steven","last_name":"van Rossem"}],"citation":{"short":"M. Peuster, H. Karl, S. van Rossem, in: IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016.","bibtex":"@inproceedings{Peuster_Karl_van Rossem_2016, title={MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments}, DOI={<a href=\"https://doi.org/10.1109/NFV-SDN.2016.7919490\">10.1109/NFV-SDN.2016.7919490</a>}, booktitle={IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)}, author={Peuster, Manuel and Karl, Holger and van Rossem, Steven}, year={2016} }","mla":"Peuster, Manuel, et al. “MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments.” <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)</i>, 2016, doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2016.7919490\">10.1109/NFV-SDN.2016.7919490</a>.","ieee":"M. Peuster, H. Karl, and S. van Rossem, “MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments,” in <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)</i>, Palo Alto, 2016.","chicago":"Peuster, Manuel, Holger Karl, and Steven van Rossem. “MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments.” In <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)</i>, 2016. <a href=\"https://doi.org/10.1109/NFV-SDN.2016.7919490\">https://doi.org/10.1109/NFV-SDN.2016.7919490</a>.","ama":"Peuster M, Karl H, van Rossem S. MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments. In: <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)</i>. ; 2016. doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2016.7919490\">10.1109/NFV-SDN.2016.7919490</a>","apa":"Peuster, M., Karl, H., &#38; van Rossem, S. (2016). MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments. In <i>IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)</i>. Palo Alto. <a href=\"https://doi.org/10.1109/NFV-SDN.2016.7919490\">https://doi.org/10.1109/NFV-SDN.2016.7919490</a>"},"publication_status":"published","department":[{"_id":"75"}],"ddc":["000"],"publication":"IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","type":"conference","title":"MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments","file":[{"file_size":848438,"file_name":"main_ris.pdf","creator":"peuster","date_created":"2018-06-25T13:06:47Z","file_id":"3349","access_level":"open_access","content_type":"application/pdf","relation":"main_file","date_updated":"2018-06-25T13:17:34Z"}],"project":[{"call_identifier":"5G PPP Phase 1","grant_number":"671517","name":"SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized Networks","_id":"25"},{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"has_accepted_license":"1","abstract":[{"lang":"eng","text":"Virtualized network services consisting of multiple individual network functions are already today deployed across multiple sites, so called multi-PoP (points of presence) environments. This allows to improve service performance by optimizing its placement in the network. But prototyping and testing of these complex distributed software systems becomes extremely challenging. The reason is that not only the network service as such has to be tested but also its integration with management and orchestration systems. Existing solutions, like simulators, basic network emulators, or local cloud testbeds, do not support all aspects of these tasks.\r\n\r\nTo this end, we introduce MeDICINE, a novel NFV prototyping platform that is able to execute production-ready network functions, provided as software containers, in an emulated multi-PoP environment. These network functions can be controlled by any third-party management and orchestration system that connects to our platform through standard interfaces. Based on this, a developer can use our platform to prototype and test complex network services in a realistic environment running on his laptop.\r\n"}],"doi":"10.1109/NFV-SDN.2016.7919490","main_file_link":[{"url":"https://arxiv.org/pdf/1606.05995.pdf"}],"oa":"1","user_id":"13271"},{"user_id":"477","citation":{"short":"S. Zimmermann, P. Herrmann, D. Kundisch, B. Nault, in: Workshop on IS Design and Economic Behavior (ISDEB), 2016.","bibtex":"@inproceedings{Zimmermann_Herrmann_Kundisch_Nault_2016, title={How do different Sources of the Variance of Online Consumer Ratings matter?}, booktitle={Workshop on IS Design and Economic Behavior (ISDEB)}, author={Zimmermann, Steffen and Herrmann, Philipp and Kundisch, Dennis and Nault, Barrie}, year={2016} }","mla":"Zimmermann, Steffen, et al. “How Do Different Sources of the Variance of Online Consumer Ratings Matter?” <i>Workshop on IS Design and Economic Behavior (ISDEB)</i>, 2016.","ieee":"S. Zimmermann, P. Herrmann, D. Kundisch, and B. Nault, “How do different Sources of the Variance of Online Consumer Ratings matter?,” in <i>Workshop on IS Design and Economic Behavior (ISDEB)</i>, Ilmenau, Germany, 2016.","chicago":"Zimmermann, Steffen, Philipp Herrmann, Dennis Kundisch, and Barrie Nault. “How Do Different Sources of the Variance of Online Consumer Ratings Matter?” In <i>Workshop on IS Design and Economic Behavior (ISDEB)</i>, 2016.","ama":"Zimmermann S, Herrmann P, Kundisch D, Nault B. How do different Sources of the Variance of Online Consumer Ratings matter? In: <i>Workshop on IS Design and Economic Behavior (ISDEB)</i>. ; 2016.","apa":"Zimmermann, S., Herrmann, P., Kundisch, D., &#38; Nault, B. (2016). How do different Sources of the Variance of Online Consumer Ratings matter? In <i>Workshop on IS Design and Economic Behavior (ISDEB)</i>. Ilmenau, Germany."},"department":[{"_id":"276"}],"file":[{"date_created":"2019-01-29T14:38:25Z","content_type":"application/pdf","file_id":"7242","access_level":"closed","file_name":"Rating Variance_CIST_Abstract.pdf","file_size":83968,"creator":"abursig","success":1,"relation":"main_file","date_updated":"2019-01-29T14:38:25Z"}],"author":[{"last_name":"Zimmermann","first_name":"Steffen","full_name":"Zimmermann, Steffen"},{"last_name":"Herrmann","first_name":"Philipp","full_name":"Herrmann, Philipp"},{"id":"21117","last_name":"Kundisch","first_name":"Dennis","full_name":"Kundisch, Dennis"},{"first_name":"Barrie","full_name":"Nault, Barrie","last_name":"Nault"}],"title":"How do different Sources of the Variance of Online Consumer Ratings matter?","conference":{"location":"Ilmenau, Germany","name":"Workshop on IS Design and Economic Behavior (ISDEB)"},"has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"8","name":"SFB 901 - Subproject A4"}],"file_date_updated":"2019-01-29T14:38:25Z","_id":"4374","date_updated":"2022-01-06T07:00:59Z","date_created":"2018-09-10T13:02:44Z","quality_controlled":"1","publication":"Workshop on IS Design and Economic Behavior (ISDEB)","ddc":["330"],"status":"public","language":[{"iso":"eng"}],"type":"conference_abstract","year":"2016"}]
