[{"status":"public","year":"2015","language":[{"iso":"eng"}],"date_created":"2017-10-17T12:41:44Z","date_updated":"2022-01-06T06:57:30Z","_id":"269","file_date_updated":"2018-03-21T09:32:42Z","author":[{"last_name":"Wiersema","id":"3118","first_name":"Tobias","full_name":"Wiersema, Tobias"},{"first_name":"Sen","full_name":"Wu, Sen","last_name":"Wu"},{"id":"398","last_name":"Platzner","full_name":"Platzner, Marco","first_name":"Marco"}],"department":[{"_id":"78"}],"series_title":"LNCS","citation":{"short":"T. Wiersema, S. Wu, M. Platzner, in: Proceedings of the International Symposium in Reconfigurable Computing (ARC), 2015, pp. 365--372.","mla":"Wiersema, Tobias, et al. “On-The-Fly Verification of Reconfigurable Image Processing Modules Based on a Proof-Carrying Hardware Approach.” <i>Proceedings of the International Symposium in Reconfigurable Computing (ARC)</i>, 2015, pp. 365--372, doi:<a href=\"https://doi.org/10.1007/978-3-319-16214-0_32\">10.1007/978-3-319-16214-0_32</a>.","bibtex":"@inproceedings{Wiersema_Wu_Platzner_2015, series={LNCS}, title={On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-16214-0_32\">10.1007/978-3-319-16214-0_32</a>}, booktitle={Proceedings of the International Symposium in Reconfigurable Computing (ARC)}, author={Wiersema, Tobias and Wu, Sen and Platzner, Marco}, year={2015}, pages={365--372}, collection={LNCS} }","chicago":"Wiersema, Tobias, Sen Wu, and Marco Platzner. “On-The-Fly Verification of Reconfigurable Image Processing Modules Based on a Proof-Carrying Hardware Approach.” In <i>Proceedings of the International Symposium in Reconfigurable Computing (ARC)</i>, 365--372. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-319-16214-0_32\">https://doi.org/10.1007/978-3-319-16214-0_32</a>.","ieee":"T. Wiersema, S. Wu, and M. Platzner, “On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach,” in <i>Proceedings of the International Symposium in Reconfigurable Computing (ARC)</i>, 2015, pp. 365--372.","ama":"Wiersema T, Wu S, Platzner M. On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach. In: <i>Proceedings of the International Symposium in Reconfigurable Computing (ARC)</i>. LNCS. ; 2015:365--372. doi:<a href=\"https://doi.org/10.1007/978-3-319-16214-0_32\">10.1007/978-3-319-16214-0_32</a>","apa":"Wiersema, T., Wu, S., &#38; Platzner, M. (2015). On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach. In <i>Proceedings of the International Symposium in Reconfigurable Computing (ARC)</i> (pp. 365--372). <a href=\"https://doi.org/10.1007/978-3-319-16214-0_32\">https://doi.org/10.1007/978-3-319-16214-0_32</a>"},"type":"conference","publication":"Proceedings of the International Symposium in Reconfigurable Computing (ARC)","ddc":["040"],"page":"365--372","doi":"10.1007/978-3-319-16214-0_32","has_accepted_license":"1","abstract":[{"text":"Proof-carrying hardware is an approach that has recently been proposed for the efficient verification of reconfigurable modules. We present an application of proof-carrying hardware to guarantee the correct functionality of dynamically reconfigured image processing modules. Our prototype comprises a reconfigurable-system-on-chip with an embedded virtual FPGA fabric. This setup allows us to leverage open source FPGA synthesis and backend tools to produce FPGA configuration bitstreams with an open format and, thus, to demonstrate and experimentally evaluate proof-carrying hardware at the bitstream level.","lang":"eng"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"file":[{"relation":"main_file","date_updated":"2018-03-21T09:32:42Z","success":1,"file_name":"269-paper_53.pdf","file_size":344309,"creator":"florida","date_created":"2018-03-21T09:32:42Z","access_level":"closed","content_type":"application/pdf","file_id":"1477"}],"title":"On-The-Fly Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach","user_id":"477"},{"user_id":"477","has_accepted_license":"1","abstract":[{"text":"We consider structural and algorithmic questions related to the Nash dynamics of weighted congestion games. In weighted congestion games with linear latency functions, the existence of pure Nash equilibria is guaranteed by a potential function argument. Unfortunately, this proof of existence is inefficient and computing pure Nash equilibria in such games is a PLS-hard problem even when all players have unit weights. The situation gets worse when superlinear (e.g., quadratic) latency functions come into play; in this case, the Nash dynamics of the game may contain cycles and pure Nash equilibria may not even exist. Given these obstacles, we consider approximate pure Nash equilibria as alternative solution concepts. A ρ--approximate pure Nash equilibrium is a state of a (weighted congestion) game from which no player has any incentive to deviate in order to improve her cost by a multiplicative factor higher than ρ. Do such equilibria exist for small values of ρ? And if so, can we compute them efficiently?We provide positive answers to both questions for weighted congestion games with polynomial latency functions by exploiting an “approximation” of such games by a new class of potential games that we call Ψ-games. This allows us to show that these games have d!-approximate pure Nash equilibria, where d is the maximum degree of the latency functions. Our main technical contribution is an efficient algorithm for computing O(1)-approximate pure Nash equilibria when d is a constant. For games with linear latency functions, the approximation guarantee is 3+√5/2 + Oγ for arbitrarily small γ > 0; for latency functions with maximum degree d≥ 2, it is d2d+o(d). The running time is polynomial in the number of bits in the representation of the game and 1/γ. As a byproduct of our techniques, we also show the following interesting structural statement for weighted congestion games with polynomial latency functions of maximum degree d ≥ 2: polynomially-long sequences of best-response moves from any initial state to a dO(d2)-approximate pure Nash equilibrium exist and can be efficiently identified in such games as long as d is a constant.To the best of our knowledge, these are the first positive algorithmic results for approximate pure Nash equilibria in weighted congestion games. Our techniques significantly extend our recent work on unweighted congestion games through the use of Ψ-games. The concept of approximating nonpotential games by potential ones is interesting in itself and might have further applications.","lang":"eng"}],"doi":"10.1145/2614687","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"file":[{"file_name":"320-a2-caragiannis.pdf","file_size":260503,"creator":"florida","date_created":"2018-03-20T07:40:55Z","content_type":"application/pdf","access_level":"closed","file_id":"1433","relation":"main_file","date_updated":"2018-03-20T07:40:55Z","success":1}],"title":"Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure","issue":"1","article_number":"2","volume":3,"type":"journal_article","ddc":["040"],"publication":"Transactions on Economics and Computation","department":[{"_id":"63"},{"_id":"541"}],"citation":{"apa":"Caragiannis, I., Fanelli, A., Gravin, N., &#38; Skopalik, A. (2015). Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure. <i>Transactions on Economics and Computation</i>, <i>3</i>(1). <a href=\"https://doi.org/10.1145/2614687\">https://doi.org/10.1145/2614687</a>","ama":"Caragiannis I, Fanelli A, Gravin N, Skopalik A. Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure. <i>Transactions on Economics and Computation</i>. 2015;3(1). doi:<a href=\"https://doi.org/10.1145/2614687\">10.1145/2614687</a>","chicago":"Caragiannis, Ioannis, Angelo Fanelli, Nick Gravin, and Alexander Skopalik. “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure.” <i>Transactions on Economics and Computation</i> 3, no. 1 (2015). <a href=\"https://doi.org/10.1145/2614687\">https://doi.org/10.1145/2614687</a>.","ieee":"I. Caragiannis, A. Fanelli, N. Gravin, and A. Skopalik, “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure,” <i>Transactions on Economics and Computation</i>, vol. 3, no. 1, 2015.","mla":"Caragiannis, Ioannis, et al. “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure.” <i>Transactions on Economics and Computation</i>, vol. 3, no. 1, 2, ACM, 2015, doi:<a href=\"https://doi.org/10.1145/2614687\">10.1145/2614687</a>.","bibtex":"@article{Caragiannis_Fanelli_Gravin_Skopalik_2015, title={Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation, and Structure}, volume={3}, DOI={<a href=\"https://doi.org/10.1145/2614687\">10.1145/2614687</a>}, number={12}, journal={Transactions on Economics and Computation}, publisher={ACM}, author={Caragiannis, Ioannis and Fanelli, Angelo and Gravin, Nick and Skopalik, Alexander}, year={2015} }","short":"I. Caragiannis, A. Fanelli, N. Gravin, A. Skopalik, Transactions on Economics and Computation 3 (2015)."},"intvolume":"         3","author":[{"first_name":"Ioannis","full_name":"Caragiannis, Ioannis","last_name":"Caragiannis"},{"full_name":"Fanelli, Angelo","first_name":"Angelo","last_name":"Fanelli"},{"first_name":"Nick","full_name":"Gravin, Nick","last_name":"Gravin"},{"first_name":"Alexander","full_name":"Skopalik, Alexander","id":"40384","last_name":"Skopalik"}],"date_updated":"2022-01-06T06:59:04Z","file_date_updated":"2018-03-20T07:40:55Z","_id":"320","status":"public","language":[{"iso":"eng"}],"year":"2015","publisher":"ACM","date_created":"2017-10-17T12:41:54Z"},{"user_id":"477","citation":{"ieee":"F. Eidens, <i>Anonymous credential system based on q-Strong Diffie-Hellman Assumption</i>. Universität Paderborn, 2015.","chicago":"Eidens, Fabian. <i>Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption</i>. Universität Paderborn, 2015.","ama":"Eidens F. <i>Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption</i>. Universität Paderborn; 2015.","apa":"Eidens, F. (2015). <i>Anonymous credential system based on q-Strong Diffie-Hellman Assumption</i>. Universität Paderborn.","short":"F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.","bibtex":"@book{Eidens_2015, title={Anonymous credential system based on q-Strong Diffie-Hellman Assumption}, publisher={Universität Paderborn}, author={Eidens, Fabian}, year={2015} }","mla":"Eidens, Fabian. <i>Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption</i>. Universität Paderborn, 2015."},"department":[{"_id":"64"}],"author":[{"last_name":"Eidens","id":"25078","full_name":"Eidens, Fabian","first_name":"Fabian"}],"file":[{"file_size":879285,"file_name":"321-eidens_masterthesis_01.pdf","creator":"florida","date_created":"2018-03-20T07:40:22Z","file_id":"1432","access_level":"closed","content_type":"application/pdf","relation":"main_file","date_updated":"2018-03-20T07:40:22Z","success":1}],"title":"Anonymous credential system based on q-Strong Diffie-Hellman Assumption","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"file_date_updated":"2018-03-20T07:40:22Z","_id":"321","date_updated":"2022-01-06T06:59:05Z","publisher":"Universität Paderborn","ddc":["040"],"date_created":"2017-10-17T12:41:54Z","status":"public","year":"2015","type":"mastersthesis"},{"type":"conference","ddc":["040"],"publication":"Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)","page":"478--488","doi":"10.1007/978-3-662-47854-7_29","has_accepted_license":"1","abstract":[{"text":"Reputation systems are used to compute and publish reputation scores for services or products. We consider reputation systems where users are allowed to rate products that they purchased previously. To obtain trustworthy reputations, they are allowed to rate these products only once. As long as users rate products once, they stay anonymous. Everybody is able to detect users deviating from the rate-products-only-once policy and the anonymity of such dishonest users can be revoked by a system manager. In this paper we present formal models for such reputation systems and their security. Based on group signatures presented by Boneh, Boyen, and Shacham we design an efficient reputation system that meets all our requirements.","lang":"eng"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"file":[{"success":1,"date_updated":"2018-03-20T07:39:54Z","relation":"main_file","date_created":"2018-03-20T07:39:54Z","access_level":"closed","file_id":"1431","content_type":"application/pdf","file_size":499568,"file_name":"322-546_01.pdf","creator":"florida"}],"title":"Anonymous and Publicly Linkable Reputation Systems","oa":"1","user_id":"48090","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2014/546"}],"status":"public","year":"2015","date_created":"2017-10-17T12:41:54Z","date_updated":"2022-01-06T06:59:05Z","_id":"322","file_date_updated":"2018-03-20T07:39:54Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"last_name":"Juhnke","id":"48090","first_name":"Jakob","full_name":"Juhnke, Jakob"},{"first_name":"Christina","full_name":"Kolb, Christina","last_name":"Kolb","id":"43647"}],"department":[{"_id":"64"}],"series_title":"LNCS","citation":{"short":"J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.","mla":"Blömer, Johannes, et al. “Anonymous and Publicly Linkable Reputation Systems.” <i>Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)</i>, 2015, pp. 478--488, doi:<a href=\"https://doi.org/10.1007/978-3-662-47854-7_29\">10.1007/978-3-662-47854-7_29</a>.","bibtex":"@inproceedings{Blömer_Juhnke_Kolb_2015, series={LNCS}, title={Anonymous and Publicly Linkable Reputation Systems}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-47854-7_29\">10.1007/978-3-662-47854-7_29</a>}, booktitle={Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)}, author={Blömer, Johannes and Juhnke, Jakob and Kolb, Christina}, year={2015}, pages={478--488}, collection={LNCS} }","chicago":"Blömer, Johannes, Jakob Juhnke, and Christina Kolb. “Anonymous and Publicly Linkable Reputation Systems.” In <i>Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)</i>, 478--488. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-662-47854-7_29\">https://doi.org/10.1007/978-3-662-47854-7_29</a>.","ieee":"J. Blömer, J. Juhnke, and C. Kolb, “Anonymous and Publicly Linkable Reputation Systems,” in <i>Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)</i>, 2015, pp. 478--488.","ama":"Blömer J, Juhnke J, Kolb C. Anonymous and Publicly Linkable Reputation Systems. In: <i>Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)</i>. LNCS. ; 2015:478--488. doi:<a href=\"https://doi.org/10.1007/978-3-662-47854-7_29\">10.1007/978-3-662-47854-7_29</a>","apa":"Blömer, J., Juhnke, J., &#38; Kolb, C. (2015). Anonymous and Publicly Linkable Reputation Systems. In <i>Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)</i> (pp. 478--488). <a href=\"https://doi.org/10.1007/978-3-662-47854-7_29\">https://doi.org/10.1007/978-3-662-47854-7_29</a>"}},{"user_id":"477","project":[{"_id":"1","name":"SFB 901"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"name":"SFB 901 - Project Area B","_id":"3"}],"doi":"10.1186/s13174-015-0022-8","has_accepted_license":"1","abstract":[{"text":"On-the-fly composition of service-based software solutions is still a challenging task. Even more challenges emerge when facing automatic service composition in markets of composed services for end users. In this paper, we focus on the functional discrepancy between “what a user wants” specified in terms of a request and “what a user gets” when executing a composed service. To meet the challenge of functional discrepancy, we propose the combination of existing symbolic composition approaches with machine learning techniques. We developed a learning recommendation system that expands the capabilities of existing composition algorithms to facilitate adaptivity and consequently reduces functional discrepancy. As a representative of symbolic techniques, an Artificial Intelligence planning based approach produces solutions that are correct with respect to formal specifications. Our learning recommendation system supports the symbolic approach in decision-making. Reinforcement Learning techniques enable the recommendation system to adjust its recommendation strategy over time based on user ratings. We implemented the proposed functionality in terms of a prototypical composition framework. Preliminary results from experiments conducted in the image processing domain illustrate the benefit of combining both complementary techniques.","lang":"eng"}],"title":"An approach towards adaptive service composition in markets of composed services","file":[{"relation":"main_file","date_updated":"2018-03-20T07:39:17Z","success":1,"file_size":2842281,"file_name":"323-An_approach_towards_adaptive_service_composition_in_markets_of_composed_services.pdf","creator":"florida","date_created":"2018-03-20T07:39:17Z","file_id":"1429","content_type":"application/pdf","access_level":"closed"}],"issue":"1","page":"1-18","type":"journal_article","ddc":["040"],"publication":"Journal of Internet Services and Applications","department":[{"_id":"355"}],"citation":{"short":"A. Jungmann, F. Mohr, Journal of Internet Services and Applications (2015) 1–18.","mla":"Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” <i>Journal of Internet Services and Applications</i>, no. 1, Springer, 2015, pp. 1–18, doi:<a href=\"https://doi.org/10.1186/s13174-015-0022-8\">10.1186/s13174-015-0022-8</a>.","bibtex":"@article{Jungmann_Mohr_2015, title={An approach towards adaptive service composition in markets of composed services}, DOI={<a href=\"https://doi.org/10.1186/s13174-015-0022-8\">10.1186/s13174-015-0022-8</a>}, number={1}, journal={Journal of Internet Services and Applications}, publisher={Springer}, author={Jungmann, Alexander and Mohr, Felix}, year={2015}, pages={1–18} }","chicago":"Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service Composition in Markets of Composed Services.” <i>Journal of Internet Services and Applications</i>, no. 1 (2015): 1–18. <a href=\"https://doi.org/10.1186/s13174-015-0022-8\">https://doi.org/10.1186/s13174-015-0022-8</a>.","ieee":"A. Jungmann and F. Mohr, “An approach towards adaptive service composition in markets of composed services,” <i>Journal of Internet Services and Applications</i>, no. 1, pp. 1–18, 2015.","apa":"Jungmann, A., &#38; Mohr, F. (2015). An approach towards adaptive service composition in markets of composed services. <i>Journal of Internet Services and Applications</i>, (1), 1–18. <a href=\"https://doi.org/10.1186/s13174-015-0022-8\">https://doi.org/10.1186/s13174-015-0022-8</a>","ama":"Jungmann A, Mohr F. An approach towards adaptive service composition in markets of composed services. <i>Journal of Internet Services and Applications</i>. 2015;(1):1-18. doi:<a href=\"https://doi.org/10.1186/s13174-015-0022-8\">10.1186/s13174-015-0022-8</a>"},"author":[{"last_name":"Jungmann","first_name":"Alexander","full_name":"Jungmann, Alexander"},{"first_name":"Felix","full_name":"Mohr, Felix","last_name":"Mohr"}],"date_updated":"2022-01-06T06:59:06Z","file_date_updated":"2018-03-20T07:39:17Z","_id":"323","year":"2015","language":[{"iso":"eng"}],"status":"public","date_created":"2017-10-17T12:41:55Z","publisher":"Springer"},{"department":[{"_id":"355"}],"citation":{"short":"F. Mohr, in: Proceedings of the 14th International Conference on Software Reuse (ICSR), 2015, pp. 298--313.","mla":"Mohr, Felix. “A Metric for Functional Reusability of Services.” <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 2015, pp. 298--313, doi:<a href=\"https://doi.org/10.1007/978-3-319-14130-5_21\">10.1007/978-3-319-14130-5_21</a>.","bibtex":"@inproceedings{Mohr_2015, series={LNCS}, title={A Metric for Functional Reusability of Services}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-14130-5_21\">10.1007/978-3-319-14130-5_21</a>}, booktitle={Proceedings of the 14th International Conference on Software Reuse (ICSR)}, author={Mohr, Felix}, year={2015}, pages={298--313}, collection={LNCS} }","chicago":"Mohr, Felix. “A Metric for Functional Reusability of Services.” In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 298--313. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-319-14130-5_21\">https://doi.org/10.1007/978-3-319-14130-5_21</a>.","ieee":"F. Mohr, “A Metric for Functional Reusability of Services,” in <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>, 2015, pp. 298--313.","ama":"Mohr F. A Metric for Functional Reusability of Services. In: <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i>. LNCS. ; 2015:298--313. doi:<a href=\"https://doi.org/10.1007/978-3-319-14130-5_21\">10.1007/978-3-319-14130-5_21</a>","apa":"Mohr, F. (2015). A Metric for Functional Reusability of Services. In <i>Proceedings of the 14th International Conference on Software Reuse (ICSR)</i> (pp. 298--313). <a href=\"https://doi.org/10.1007/978-3-319-14130-5_21\">https://doi.org/10.1007/978-3-319-14130-5_21</a>"},"series_title":"LNCS","author":[{"full_name":"Mohr, Felix","first_name":"Felix","last_name":"Mohr"}],"date_updated":"2022-01-06T06:59:07Z","_id":"324","file_date_updated":"2018-03-20T07:38:44Z","language":[{"iso":"eng"}],"year":"2015","status":"public","date_created":"2017-10-17T12:41:55Z","user_id":"477","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"_id":"3","name":"SFB 901 - Project Area B"}],"doi":"10.1007/978-3-319-14130-5_21","abstract":[{"text":"Services are self-contained software components that can beused platform independent and that aim at maximizing software reuse. Abasic concern in service oriented architectures is to measure the reusabilityof services. One of the most important qualities is the functionalreusability, which indicates how relevant the task is that a service solves.Current metrics for functional reusability of software, however, have verylittle explanatory power and do not accomplish this goal.This paper presents a new approach to estimate the functional reusabilityof services based on their relevance. To this end, it denes the degreeto which a service enables the execution of other services as its contri-bution. Based on the contribution, relevance of services is dened as anestimation for their functional reusability. Explanatory power is obtainedby normalizing relevance values with a reference service. The applicationof the metric to a service test set conrms its supposed capabilities.","lang":"eng"}],"has_accepted_license":"1","title":"A Metric for Functional Reusability of Services","file":[{"date_created":"2018-03-20T07:38:44Z","content_type":"application/pdf","access_level":"closed","file_id":"1428","file_size":569475,"file_name":"324-ICSR-Mohr-15.pdf","creator":"florida","success":1,"relation":"main_file","date_updated":"2018-03-20T07:38:44Z"}],"page":"298--313","type":"conference","ddc":["040"],"publication":"Proceedings of the 14th International Conference on Software Reuse (ICSR)"},{"supervisor":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"author":[{"id":"13703","last_name":"Löken","full_name":"Löken, Nils","first_name":"Nils"}],"title":"A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption","department":[{"_id":"64"}],"user_id":"477","citation":{"ama":"Löken N. <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn; 2015.","apa":"Löken, N. (2015). <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn.","ieee":"N. Löken, <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn, 2015.","chicago":"Löken, Nils. <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn, 2015.","bibtex":"@book{Löken_2015, title={A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption}, publisher={Universität Paderborn}, author={Löken, Nils}, year={2015} }","mla":"Löken, Nils. <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn, 2015.","short":"N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015."},"status":"public","type":"mastersthesis","year":"2015","publisher":"Universität Paderborn","related_material":{"record":[{"id":"253","status":"public","relation":"other"}]},"date_created":"2017-10-17T12:41:55Z","date_updated":"2022-01-06T06:59:07Z","_id":"325"},{"department":[{"_id":"64"}],"user_id":"477","citation":{"short":"F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.","bibtex":"@book{Heihoff_2015, title={A group signature scheme based on the LSRW assumption}, publisher={Universität Paderborn}, author={Heihoff, Frederic}, year={2015} }","mla":"Heihoff, Frederic. <i>A Group Signature Scheme Based on the LSRW Assumption</i>. Universität Paderborn, 2015.","ieee":"F. Heihoff, <i>A group signature scheme based on the LSRW assumption</i>. Universität Paderborn, 2015.","chicago":"Heihoff, Frederic. <i>A Group Signature Scheme Based on the LSRW Assumption</i>. Universität Paderborn, 2015.","ama":"Heihoff F. <i>A Group Signature Scheme Based on the LSRW Assumption</i>. Universität Paderborn; 2015.","apa":"Heihoff, F. (2015). <i>A group signature scheme based on the LSRW assumption</i>. Universität Paderborn."},"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"author":[{"full_name":"Heihoff, Frederic","first_name":"Frederic","last_name":"Heihoff"}],"title":"A group signature scheme based on the LSRW assumption","date_updated":"2022-01-06T06:59:07Z","_id":"326","status":"public","year":"2015","type":"bachelorsthesis","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:55Z"},{"author":[{"full_name":"Kniesburges, Sebastian","first_name":"Sebastian","last_name":"Kniesburges"},{"last_name":"Koutsopoulos","full_name":"Koutsopoulos, Andreas","first_name":"Andreas"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"citation":{"chicago":"Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” <i>Theoretical Computer Science</i>, 2015, 67–79. <a href=\"https://doi.org/10.1016/j.tcs.2014.11.027\">https://doi.org/10.1016/j.tcs.2014.11.027</a>.","ieee":"S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “A deterministic worst-case message complexity optimal solution for resource discovery,” <i>Theoretical Computer Science</i>, pp. 67–79, 2015.","ama":"Kniesburges S, Koutsopoulos A, Scheideler C. A deterministic worst-case message complexity optimal solution for resource discovery. <i>Theoretical Computer Science</i>. 2015:67-79. doi:<a href=\"https://doi.org/10.1016/j.tcs.2014.11.027\">10.1016/j.tcs.2014.11.027</a>","apa":"Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2015). A deterministic worst-case message complexity optimal solution for resource discovery. <i>Theoretical Computer Science</i>, 67–79. <a href=\"https://doi.org/10.1016/j.tcs.2014.11.027\">https://doi.org/10.1016/j.tcs.2014.11.027</a>","short":"S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theoretical Computer Science (2015) 67–79.","mla":"Kniesburges, Sebastian, et al. “A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery.” <i>Theoretical Computer Science</i>, Elsevier, 2015, pp. 67–79, doi:<a href=\"https://doi.org/10.1016/j.tcs.2014.11.027\">10.1016/j.tcs.2014.11.027</a>.","bibtex":"@article{Kniesburges_Koutsopoulos_Scheideler_2015, title={A deterministic worst-case message complexity optimal solution for resource discovery}, DOI={<a href=\"https://doi.org/10.1016/j.tcs.2014.11.027\">10.1016/j.tcs.2014.11.027</a>}, journal={Theoretical Computer Science}, publisher={Elsevier}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler, Christian}, year={2015}, pages={67–79} }"},"department":[{"_id":"79"}],"date_created":"2017-10-17T12:41:55Z","publisher":"Elsevier","year":"2015","status":"public","_id":"327","file_date_updated":"2018-03-20T07:38:02Z","date_updated":"2022-01-06T06:59:08Z","title":"A deterministic worst-case message complexity optimal solution for resource discovery","file":[{"date_updated":"2018-03-20T07:38:02Z","relation":"main_file","success":1,"file_size":398044,"file_name":"327-KKS15-TOCS_01.pdf","creator":"florida","date_created":"2018-03-20T07:38:02Z","access_level":"closed","content_type":"application/pdf","file_id":"1427"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"doi":"10.1016/j.tcs.2014.11.027","abstract":[{"text":"We consider the problem of resource discovery in distributed systems. In particular we give an algorithm, such that each node in a network discovers the address of any other node in the network. We model the knowledge of the nodes as a virtual overlay network given by a directed graph such that complete knowledge of all nodes corresponds to a complete graph in the overlay network. Although there are several solutions for resource discovery, our solution is the first that achieves worst-case optimal work for each node, i.e. the number of addresses (O(n)O(n)) or bits (O(nlog⁡n)O(nlog⁡n)) a node receives or sends coincides with the lower bound, while ensuring only a linear runtime (O(n)O(n)) on the number of rounds.","lang":"eng"}],"has_accepted_license":"1","user_id":"477","publication":"Theoretical Computer Science","ddc":["040"],"type":"journal_article","page":"67-79"},{"status":"public","language":[{"iso":"ger"}],"year":"2015","type":"mastersthesis","publisher":"Universität Paderborn","date_created":"2018-06-22T11:57:31Z","date_updated":"2022-01-06T06:59:10Z","_id":"3309","supervisor":[{"last_name":"Frick","first_name":"Bernd","full_name":"Frick, Bernd"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A4","_id":"8"}],"author":[{"full_name":"Fanasch, Patrizia","first_name":"Patrizia","last_name":"Fanasch"}],"title":"Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg","department":[{"_id":"183"}],"user_id":"477","citation":{"apa":"Fanasch, P. (2015). <i>Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg</i>. Universität Paderborn.","ama":"Fanasch P. <i>Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg</i>. Universität Paderborn; 2015.","ieee":"P. Fanasch, <i>Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg</i>. Universität Paderborn, 2015.","chicago":"Fanasch, Patrizia. <i>Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg</i>. Universität Paderborn, 2015.","bibtex":"@book{Fanasch_2015, title={Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg}, publisher={Universität Paderborn}, author={Fanasch, Patrizia}, year={2015} }","mla":"Fanasch, Patrizia. <i>Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg</i>. Universität Paderborn, 2015.","short":"P. Fanasch, Erfolg durch Persönlichkeit? Der Einfluss der Markenpersönlichkeit auf den Zusammenhang von Reputation und Unternehmenserfolg, Universität Paderborn, 2015."}},{"publisher":"Universität Paderborn","date_created":"2018-06-22T11:59:36Z","status":"public","year":"2015","type":"bachelorsthesis","language":[{"iso":"ger"}],"_id":"3310","date_updated":"2022-01-06T06:59:10Z","author":[{"last_name":"Walczok","full_name":"Walczok, Gregor Paul","first_name":"Gregor Paul"}],"title":"Die Veränderung des Mobilfunkmarktes durch die Discountanbieter","supervisor":[{"first_name":"Bernd","full_name":"Frick, Bernd","last_name":"Frick"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"8","name":"SFB 901 - Subproject A4"}],"user_id":"477","citation":{"ieee":"G. P. Walczok, <i>Die Veränderung des Mobilfunkmarktes durch die Discountanbieter</i>. Universität Paderborn, 2015.","chicago":"Walczok, Gregor Paul. <i>Die Veränderung des Mobilfunkmarktes durch die Discountanbieter</i>. Universität Paderborn, 2015.","ama":"Walczok GP. <i>Die Veränderung des Mobilfunkmarktes durch die Discountanbieter</i>. Universität Paderborn; 2015.","apa":"Walczok, G. P. (2015). <i>Die Veränderung des Mobilfunkmarktes durch die Discountanbieter</i>. Universität Paderborn.","short":"G.P. Walczok, Die Veränderung des Mobilfunkmarktes durch die Discountanbieter, Universität Paderborn, 2015.","bibtex":"@book{Walczok_2015, title={Die Veränderung des Mobilfunkmarktes durch die Discountanbieter}, publisher={Universität Paderborn}, author={Walczok, Gregor Paul}, year={2015} }","mla":"Walczok, Gregor Paul. <i>Die Veränderung des Mobilfunkmarktes durch die Discountanbieter</i>. Universität Paderborn, 2015."},"department":[{"_id":"183"}]},{"ddc":["000"],"publication":"Artificial Intelligence","type":"journal_article","page":"246 - 257","title":"Learning Boolean Specifications","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"doi":"10.1016/j.artint.2015.09.003","abstract":[{"text":"In this paper we consider an extended variant of query learning where the hidden concept is embedded in some Boolean circuit. This additional processing layer modifies query arguments and answers by fixed transformation functions which are known to the learner. For this scenario, we provide a characterization of the solution space and an ordering on it. We give a compact representation of the minimal and maximal solutions as quantified Boolean formulas and we adapt the original algorithms for exact learning of specific classes of propositional formulas.","lang":"eng"}],"user_id":"315","keyword":["Query learning","Propositional logic"],"date_created":"2018-06-25T10:43:19Z","publisher":"Elsevier","year":"2015","publication_identifier":{"issn":["0004-3702"]},"language":[{"iso":"eng"}],"status":"public","_id":"3343","date_updated":"2022-01-06T06:59:10Z","author":[{"first_name":"Uwe","full_name":"Bubeck, Uwe","last_name":"Bubeck"},{"full_name":"Kleine Büning, Hans","first_name":"Hans","last_name":"Kleine Büning"}],"citation":{"ieee":"U. Bubeck and H. Kleine Büning, “Learning Boolean Specifications,” <i>Artificial Intelligence</i>, pp. 246–257, 2015.","chicago":"Bubeck, Uwe, and Hans Kleine Büning. “Learning Boolean Specifications.” <i>Artificial Intelligence</i>, 2015, 246–57. <a href=\"https://doi.org/10.1016/j.artint.2015.09.003\">https://doi.org/10.1016/j.artint.2015.09.003</a>.","ama":"Bubeck U, Kleine Büning H. Learning Boolean Specifications. <i>Artificial Intelligence</i>. 2015:246-257. doi:<a href=\"https://doi.org/10.1016/j.artint.2015.09.003\">10.1016/j.artint.2015.09.003</a>","apa":"Bubeck, U., &#38; Kleine Büning, H. (2015). Learning Boolean Specifications. <i>Artificial Intelligence</i>, 246–257. <a href=\"https://doi.org/10.1016/j.artint.2015.09.003\">https://doi.org/10.1016/j.artint.2015.09.003</a>","short":"U. Bubeck, H. Kleine Büning, Artificial Intelligence (2015) 246–257.","bibtex":"@article{Bubeck_Kleine Büning_2015, title={Learning Boolean Specifications}, DOI={<a href=\"https://doi.org/10.1016/j.artint.2015.09.003\">10.1016/j.artint.2015.09.003</a>}, journal={Artificial Intelligence}, publisher={Elsevier}, author={Bubeck, Uwe and Kleine Büning, Hans}, year={2015}, pages={246–257} }","mla":"Bubeck, Uwe, and Hans Kleine Büning. “Learning Boolean Specifications.” <i>Artificial Intelligence</i>, Elsevier, 2015, pp. 246–57, doi:<a href=\"https://doi.org/10.1016/j.artint.2015.09.003\">10.1016/j.artint.2015.09.003</a>."},"department":[{"_id":"34"}]},{"_id":"3364","date_updated":"2022-01-06T06:59:13Z","publisher":"Universität Paderborn","date_created":"2018-06-26T14:06:07Z","status":"public","language":[{"iso":"ger"}],"year":"2015","type":"bachelorsthesis","user_id":"477","citation":{"bibtex":"@book{Knorr_2015, title={Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten}, publisher={Universität Paderborn}, author={Knorr, Christoph}, year={2015} }","mla":"Knorr, Christoph. <i>Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten</i>. Universität Paderborn, 2015.","short":"C. Knorr, Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten, Universität Paderborn, 2015.","ama":"Knorr C. <i>Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten</i>. Universität Paderborn; 2015.","apa":"Knorr, C. (2015). <i>Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten</i>. Universität Paderborn.","ieee":"C. Knorr, <i>Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten</i>. Universität Paderborn, 2015.","chicago":"Knorr, Christoph. <i>Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten</i>. Universität Paderborn, 2015."},"department":[{"_id":"78"}],"author":[{"first_name":"Christoph","full_name":"Knorr, Christoph","last_name":"Knorr"}],"title":"Evaluation von Bildverarbeitungsalgorithmen in heterogenen Rechenknoten","supervisor":[{"first_name":"Achim","full_name":"Lösch, Achim","id":"43646","last_name":"Lösch"},{"first_name":"Marco","full_name":"Platzner, Marco","id":"398","last_name":"Platzner"}],"project":[{"_id":"14","name":"SFB 901 - Subproject C2"},{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"}]},{"user_id":"18949","abstract":[{"lang":"eng","text":"Experience goods are characterised by information asymmetry and a lack of ex ante knowledge of product quality, such that reliable external signals of quality are likely to be highly valued. Two potentially credible sources of such information are reviews from professional critics and ‘word of mouth’ from other consumers. This paper makes a direct comparison between the relative influences and interactions of reviews from both of these sources on the sales performance of video game software. In order to empirically estimate and separate the effects of the two signals, we analyze a sample of 1480 video games and their sales figures between 2004 and 2010. We find evidence to suggest that even after taking steps to control for endogeneity, reviews from professional critics have a significantly positive influence on sales which outweighs that from consumer reviews. We also find evidence to suggest that reviews from professional critics also interact significantly with other signals of product quality. Consequently, we contend that professional critics adopt the role of an influencer, whereas word-of-mouth opinion acts more as a predictor of sales in the market for video games."}],"has_accepted_license":"1","doi":"10.1002/cb.1553","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A4","_id":"8"},{"name":"SFB 901 - Project Area A","_id":"2"}],"file":[{"content_type":"application/pdf","access_level":"closed","file_id":"1467","date_created":"2018-03-21T09:24:24Z","creator":"florida","file_name":"288-Cox_et_al-2015-Journal_of_Consumer_Behaviour.pdf","file_size":386704,"success":1,"relation":"main_file","date_updated":"2018-03-21T09:24:24Z"}],"title":"How do reviews from professional critics interact with other signals of product quality? Evidence from the video game industry","issue":"6","volume":14,"page":"366-377","type":"journal_article","ddc":["040"],"publication":"Journal of Consumer Behaviour","department":[{"_id":"183"}],"citation":{"mla":"Cox, Joe, and Daniel Kaimann. “How Do Reviews from Professional Critics Interact with Other Signals of Product Quality? Evidence from the Video Game Industry.” <i>Journal of Consumer Behaviour</i>, vol. 14, no. 6, Wiley Online Library, 2015, pp. 366–77, doi:<a href=\"https://doi.org/10.1002/cb.1553\">10.1002/cb.1553</a>.","bibtex":"@article{Cox_Kaimann_2015, title={How do reviews from professional critics interact with other signals of product quality? Evidence from the video game industry}, volume={14}, DOI={<a href=\"https://doi.org/10.1002/cb.1553\">10.1002/cb.1553</a>}, number={6}, journal={Journal of Consumer Behaviour}, publisher={Wiley Online Library}, author={Cox, Joe and Kaimann, Daniel}, year={2015}, pages={366–377} }","short":"J. Cox, D. Kaimann, Journal of Consumer Behaviour 14 (2015) 366–377.","apa":"Cox, J., &#38; Kaimann, D. (2015). How do reviews from professional critics interact with other signals of product quality? Evidence from the video game industry. <i>Journal of Consumer Behaviour</i>, <i>14</i>(6), 366–377. <a href=\"https://doi.org/10.1002/cb.1553\">https://doi.org/10.1002/cb.1553</a>","ama":"Cox J, Kaimann D. How do reviews from professional critics interact with other signals of product quality? Evidence from the video game industry. <i>Journal of Consumer Behaviour</i>. 2015;14(6):366-377. doi:<a href=\"https://doi.org/10.1002/cb.1553\">10.1002/cb.1553</a>","chicago":"Cox, Joe, and Daniel Kaimann. “How Do Reviews from Professional Critics Interact with Other Signals of Product Quality? Evidence from the Video Game Industry.” <i>Journal of Consumer Behaviour</i> 14, no. 6 (2015): 366–77. <a href=\"https://doi.org/10.1002/cb.1553\">https://doi.org/10.1002/cb.1553</a>.","ieee":"J. Cox and D. Kaimann, “How do reviews from professional critics interact with other signals of product quality? Evidence from the video game industry,” <i>Journal of Consumer Behaviour</i>, vol. 14, no. 6, pp. 366–377, 2015."},"intvolume":"        14","author":[{"first_name":"Joe","full_name":"Cox, Joe","last_name":"Cox"},{"id":"18949","last_name":"Kaimann","first_name":"Daniel","full_name":"Kaimann, Daniel"}],"date_updated":"2022-01-06T06:58:25Z","file_date_updated":"2018-03-21T09:24:24Z","_id":"288","status":"public","language":[{"iso":"eng"}],"year":"2015","publisher":"Wiley Online Library","date_created":"2017-10-17T12:41:48Z"},{"department":[{"_id":"276"}],"citation":{"bibtex":"@inproceedings{Herrmann_Kundisch_Zimmermann_Nault_2015, title={How do Different Sources of the Variance of Consumer Ratings Matter?}, booktitle={Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth}, author={Herrmann, Philipp and Kundisch, Dennis and Zimmermann, Steffen and Nault, Barry}, year={2015} }","mla":"Herrmann, Philipp, et al. “How Do Different Sources of the Variance of Consumer Ratings Matter?” <i>Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth</i>, 2015.","short":"P. Herrmann, D. Kundisch, S. Zimmermann, B. Nault, in: Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, 2015.","ama":"Herrmann P, Kundisch D, Zimmermann S, Nault B. How do Different Sources of the Variance of Consumer Ratings Matter? In: <i>Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth</i>. ; 2015.","apa":"Herrmann, P., Kundisch, D., Zimmermann, S., &#38; Nault, B. (2015). How do Different Sources of the Variance of Consumer Ratings Matter? In <i>Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth</i>. Forth Worth, USA.","ieee":"P. Herrmann, D. Kundisch, S. Zimmermann, and B. Nault, “How do Different Sources of the Variance of Consumer Ratings Matter?,” in <i>Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth</i>, Forth Worth, USA, 2015.","chicago":"Herrmann, Philipp, Dennis Kundisch, Steffen Zimmermann, and Barry Nault. “How Do Different Sources of the Variance of Consumer Ratings Matter?” In <i>Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth</i>, 2015."},"conference":{"name":"36th International Conference on Information Systems (ICIS)","location":"Forth Worth, USA"},"author":[{"last_name":"Herrmann","first_name":"Philipp","full_name":"Herrmann, Philipp"},{"first_name":"Dennis","full_name":"Kundisch, Dennis","last_name":"Kundisch","id":"21117"},{"last_name":"Zimmermann","first_name":"Steffen","full_name":"Zimmermann, Steffen"},{"last_name":"Nault","first_name":"Barry","full_name":"Nault, Barry"}],"date_updated":"2022-01-06T06:58:40Z","file_date_updated":"2018-03-21T09:22:36Z","_id":"289","year":"2015","language":[{"iso":"eng"}],"status":"public","date_created":"2017-10-17T12:41:48Z","user_id":"16205","project":[{"name":"SFB 901","_id":"1"},{"_id":"8","name":"SFB 901 - Subprojekt A4"},{"name":"SFB 901 - Project Area A","_id":"2"}],"abstract":[{"text":"We examine the effect of the variance of consumer ratings on product pricing and sales using an analytical model, which considers goods that are characterized by experience attributes and informed search attributes (i.e., experience attributes that were transformed in search attributes by consumer ratings). For pure informed search goods, equilibrium price increases and demand decreases in variance. For pure experience goods, equilibrium price and demand decrease in variance. For hybrid goods with low total variance, equilibrium price and demand increase with an increasing relative share of variance caused by informed search attributes when the average rating and total variance of ratings are held constant. Hence, risk-averse consumers may prefer a more expensive good with a higher variance of ratings out of two similar goods with the same average rating. Moreover, our analytical model provides a theoretical foundation for the empirically observed j-shaped distribution of consumer ratings in electronic commerce.","lang":"eng"}],"has_accepted_license":"1","title":"How do Different Sources of the Variance of Consumer Ratings Matter?","file":[{"success":1,"date_updated":"2018-03-21T09:22:36Z","relation":"main_file","date_created":"2018-03-21T09:22:36Z","content_type":"application/pdf","file_id":"1465","access_level":"closed","file_name":"289-How_do_Different_Sources_of_the_Variance_of_Consumer_Ratings_Matt.pdf","file_size":349683,"creator":"florida"}],"type":"conference","publication":"Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth","ddc":["040"]},{"date_updated":"2022-01-06T06:58:43Z","_id":"290","file_date_updated":"2018-03-21T09:22:03Z","year":"2015","language":[{"iso":"eng"}],"status":"public","date_created":"2017-10-17T12:41:48Z","publisher":"Elsevier","department":[{"_id":"77"}],"citation":{"ieee":"G. Besova, D. Steenken, and H. Wehrheim, “Grammar-based model transformations: Definition, execution, and quality properties,” <i>Computer Languages, Systems &#38; Structures</i>, pp. 116–138, 2015.","chicago":"Besova, Galina, Dominik Steenken, and Heike Wehrheim. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” <i>Computer Languages, Systems &#38; Structures</i>, 2015, 116–38. <a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">https://doi.org/10.1016/j.cl.2015.05.003</a>.","ama":"Besova G, Steenken D, Wehrheim H. Grammar-based model transformations: Definition, execution, and quality properties. <i>Computer Languages, Systems &#38; Structures</i>. 2015:116-138. doi:<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>","apa":"Besova, G., Steenken, D., &#38; Wehrheim, H. (2015). Grammar-based model transformations: Definition, execution, and quality properties. <i>Computer Languages, Systems &#38; Structures</i>, 116–138. <a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">https://doi.org/10.1016/j.cl.2015.05.003</a>","short":"G. Besova, D. Steenken, H. Wehrheim, Computer Languages, Systems &#38; Structures (2015) 116–138.","bibtex":"@article{Besova_Steenken_Wehrheim_2015, title={Grammar-based model transformations: Definition, execution, and quality properties}, DOI={<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>}, journal={Computer Languages, Systems &#38; Structures}, publisher={Elsevier}, author={Besova, Galina and Steenken, Dominik and Wehrheim, Heike}, year={2015}, pages={116–138} }","mla":"Besova, Galina, et al. “Grammar-Based Model Transformations: Definition, Execution, and Quality Properties.” <i>Computer Languages, Systems &#38; Structures</i>, Elsevier, 2015, pp. 116–38, doi:<a href=\"https://doi.org/10.1016/j.cl.2015.05.003\">10.1016/j.cl.2015.05.003</a>."},"author":[{"first_name":"Galina","full_name":"Besova, Galina","last_name":"Besova"},{"last_name":"Steenken","full_name":"Steenken, Dominik","first_name":"Dominik"},{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim","id":"573"}],"page":"116-138","type":"journal_article","ddc":["040"],"publication":"Computer Languages, Systems & Structures","user_id":"477","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"_id":"3","name":"SFB 901 - Project Area B"}],"has_accepted_license":"1","abstract":[{"lang":"eng","text":"Model transformation is a key concept in model-driven software engineering. The definition of model transformations is usually based on meta-models describing the abstract syntax of languages. While meta-models are thereby able to abstract from uperfluous details of concrete syntax, they often loose structural information inherent in languages, like information on model elements always occurring together in particular shapes. As a consequence, model transformations cannot naturally re-use language structures, thus leading to unnecessary complexity in their development as well as in quality assurance.In this paper, we propose a new approach to model transformation development which allows to simplify the developed transformations and improve their quality via the exploitation of the languages׳ structures. The approach is based on context-free graph grammars and transformations defined by pairing productions of source and target grammars. We show that such transformations have important properties: they terminate and are sound, complete, and deterministic."}],"doi":"10.1016/j.cl.2015.05.003","title":"Grammar-based model transformations: Definition, execution, and quality properties","file":[{"date_updated":"2018-03-21T09:22:03Z","relation":"main_file","success":1,"creator":"florida","file_name":"290-BSW15-main.pdf","file_size":1329478,"access_level":"closed","file_id":"1464","content_type":"application/pdf","date_created":"2018-03-21T09:22:03Z"}]},{"citation":{"chicago":"Börding, Paul. <i>Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen</i>. Universität Paderborn, 2015.","ieee":"P. Börding, <i>Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen</i>. Universität Paderborn, 2015.","apa":"Börding, P. (2015). <i>Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen</i>. Universität Paderborn.","ama":"Börding P. <i>Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen</i>. Universität Paderborn; 2015.","short":"P. Börding, Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen, Universität Paderborn, 2015.","mla":"Börding, Paul. <i>Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen</i>. Universität Paderborn, 2015.","bibtex":"@book{Börding_2015, title={Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen}, publisher={Universität Paderborn}, author={Börding, Paul}, year={2015} }"},"user_id":"477","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Project Area B","_id":"3"}],"title":"Fuzzy Matching von Vor- und Nachbedingungen in Servicespezikationen","author":[{"last_name":"Börding","full_name":"Börding, Paul","first_name":"Paul"}],"date_updated":"2022-01-06T06:58:46Z","_id":"291","language":[{"iso":"ger"}],"type":"bachelorsthesis","year":"2015","status":"public","date_created":"2017-10-17T12:41:48Z","publisher":"Universität Paderborn"},{"_id":"292","date_updated":"2022-01-06T06:58:47Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:49Z","status":"public","type":"mastersthesis","year":"2015","language":[{"iso":"ger"}],"user_id":"477","citation":{"short":"C. Osburg, Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen, Universität Paderborn, 2015.","mla":"Osburg, Christina. <i>Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen</i>. Universität Paderborn, 2015.","bibtex":"@book{Osburg_2015, title={Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen}, publisher={Universität Paderborn}, author={Osburg, Christina}, year={2015} }","chicago":"Osburg, Christina. <i>Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen</i>. Universität Paderborn, 2015.","ieee":"C. Osburg, <i>Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen</i>. Universität Paderborn, 2015.","ama":"Osburg C. <i>Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen</i>. Universität Paderborn; 2015.","apa":"Osburg, C. (2015). <i>Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen</i>. Universität Paderborn."},"department":[{"_id":"280"}],"author":[{"first_name":"Christina","full_name":"Osburg, Christina","last_name":"Osburg"}],"title":"Fusionen von gesetzlichen Krankenversicherungen zu den Effizienz- und Wechselwirkungen","supervisor":[{"full_name":"Hehenkamp, Burkhard","first_name":"Burkhard","last_name":"Hehenkamp","id":"37339"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"name":"SFB 901 - Project Area A","_id":"2"}]},{"conference":{"name":"28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)","location":"Seoul, South Korea","start_date":"2015-06-10","end_date":"2015-06-12"},"author":[{"last_name":"Geierhos","id":"42496","full_name":"Geierhos, Michaela","first_name":"Michaela","orcid":"0000-0002-8180-5606"},{"id":"38837","last_name":"Bäumer","first_name":"Frederik Simon","full_name":"Bäumer, Frederik Simon"},{"first_name":"Sabine","full_name":"Schulze, Sabine","last_name":"Schulze"},{"last_name":"Stuß","first_name":"Valentina","full_name":"Stuß, Valentina"}],"editor":[{"last_name":"Ali","full_name":"Ali, Moonis ","first_name":"Moonis "},{"first_name":"Young Sig","full_name":"Kwon, Young Sig","last_name":"Kwon"},{"last_name":"Lee","full_name":"Lee, Chang-Hwan","first_name":"Chang-Hwan"},{"last_name":"Kim","first_name":"Juntae ","full_name":"Kim, Juntae "},{"full_name":"Kim, Yongdai ","first_name":"Yongdai ","last_name":"Kim"}],"place":"Cham, Switzerland","intvolume":"      9101","citation":{"short":"M. Geierhos, F.S. Bäumer, S. Schulze, V. Stuß, in: M. Ali, Y.S. Kwon, C.-H. Lee, J. Kim, Y. Kim (Eds.), Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015), Springer, Cham, Switzerland, 2015, pp. 305–315.","mla":"Geierhos, Michaela, et al. “Filtering Reviews by Random Individual Error.” <i>Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)</i>, edited by Moonis  Ali et al., vol. 9101, Springer, 2015, pp. 305–15, doi:<a href=\"https://doi.org/10.1007/978-3-319-19066-2_30\">10.1007/978-3-319-19066-2_30</a>.","bibtex":"@inbook{Geierhos_Bäumer_Schulze_Stuß_2015, place={Cham, Switzerland}, series={Lecture Notes in Artificial Intelligence}, title={Filtering Reviews by Random Individual Error}, volume={9101}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-19066-2_30\">10.1007/978-3-319-19066-2_30</a>}, booktitle={Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)}, publisher={Springer}, author={Geierhos, Michaela and Bäumer, Frederik Simon and Schulze, Sabine and Stuß, Valentina}, editor={Ali, Moonis  and Kwon, Young Sig and Lee, Chang-Hwan and Kim, Juntae  and Kim, Yongdai Editors}, year={2015}, pages={305–315}, collection={Lecture Notes in Artificial Intelligence} }","chicago":"Geierhos, Michaela, Frederik Simon Bäumer, Sabine Schulze, and Valentina Stuß. “Filtering Reviews by Random Individual Error.” In <i>Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)</i>, edited by Moonis  Ali, Young Sig Kwon, Chang-Hwan Lee, Juntae  Kim, and Yongdai  Kim, 9101:305–15. Lecture Notes in Artificial Intelligence. Cham, Switzerland: Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-319-19066-2_30\">https://doi.org/10.1007/978-3-319-19066-2_30</a>.","ieee":"M. Geierhos, F. S. Bäumer, S. Schulze, and V. Stuß, “Filtering Reviews by Random Individual Error,” in <i>Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)</i>, vol. 9101, M. Ali, Y. S. Kwon, C.-H. Lee, J. Kim, and Y. Kim, Eds. Cham, Switzerland: Springer, 2015, pp. 305–315.","apa":"Geierhos, M., Bäumer, F. S., Schulze, S., &#38; Stuß, V. (2015). Filtering Reviews by Random Individual Error. In M. Ali, Y. S. Kwon, C.-H. Lee, J. Kim, &#38; Y. Kim (Eds.), <i>Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)</i> (Vol. 9101, pp. 305–315). Cham, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-19066-2_30\">https://doi.org/10.1007/978-3-319-19066-2_30</a>","ama":"Geierhos M, Bäumer FS, Schulze S, Stuß V. Filtering Reviews by Random Individual Error. In: Ali M, Kwon YS, Lee C-H, Kim J, Kim Y, eds. <i>Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)</i>. Vol 9101. Lecture Notes in Artificial Intelligence. Cham, Switzerland: Springer; 2015:305-315. doi:<a href=\"https://doi.org/10.1007/978-3-319-19066-2_30\">10.1007/978-3-319-19066-2_30</a>"},"series_title":"Lecture Notes in Artificial Intelligence","publication_status":"published","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"date_created":"2017-10-17T12:41:49Z","publisher":"Springer","language":[{"iso":"eng"}],"year":"2015","publication_identifier":{"isbn":["978-3-319-19065-5"],"eisbn":["978-3-319-19066-2"]},"status":"public","_id":"293","file_date_updated":"2018-03-21T09:21:30Z","date_updated":"2022-01-06T06:58:47Z","title":"Filtering Reviews by Random Individual Error","file":[{"creator":"florida","file_name":"293-IEA_AIE2015.pdf","file_size":292847,"file_id":"1463","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T09:21:30Z","relation":"main_file","date_updated":"2018-03-21T09:21:30Z","success":1}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"has_accepted_license":"1","abstract":[{"lang":"eng","text":"Opinion mining from physician rating websites depends on the quality of the extracted information. Sometimes reviews are user-error prone and the assigned stars or grades contradict the associated content. We therefore aim at detecting random individual error within reviews. Such errors comprise the disagreement in polarity of review texts and the respective ratings. The challenges that thereby arise are (1) the content and sentiment analysis of the review texts and (2) the removal of the random individual errors contained therein. To solve these tasks, we assign polarities to automatically recognized opinion phrases in reviews and then check for divergence in rating and text polarity. The novelty of our approach is that we improve user-generated data quality by excluding error-prone reviews on German physician websites from average ratings."}],"doi":"10.1007/978-3-319-19066-2_30","user_id":"42496","quality_controlled":"1","ddc":["040"],"publication":"Proceedings of the 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE 2015)","type":"book_chapter","page":"305-315","volume":9101},{"date_updated":"2022-01-06T06:58:48Z","_id":"294","status":"public","language":[{"iso":"ger"}],"year":"2015","type":"bachelorsthesis","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:49Z","department":[{"_id":"280"}],"user_id":"42447","citation":{"mla":"Materna, GinaJoanna. <i>Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik</i>. Universität Paderborn, 2015.","bibtex":"@book{Materna_2015, title={Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik}, publisher={Universität Paderborn}, author={Materna, GinaJoanna}, year={2015} }","short":"G. Materna, Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik, Universität Paderborn, 2015.","apa":"Materna, G. (2015). <i>Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik</i>. Universität Paderborn.","ama":"Materna G. <i>Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik</i>. Universität Paderborn; 2015.","chicago":"Materna, GinaJoanna. <i>Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik</i>. Universität Paderborn, 2015.","ieee":"G. Materna, <i>Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik</i>. Universität Paderborn, 2015."},"supervisor":[{"full_name":"Hehenkamp, Burkhard","first_name":"Burkhard","id":"37339","last_name":"Hehenkamp"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"author":[{"full_name":"Materna, GinaJoanna","first_name":"GinaJoanna","last_name":"Materna"}],"title":"Fair Trade - Eine neue Perspektive in der internationalen Handelspolitik"}]
