[{"type":"conference","ddc":["040"],"publication":"Proceedings of the 12th IEEE International Conference on Services Computing (SCC)","page":"57--64","has_accepted_license":"1","doi":"10.1109/SCC.2015.18","abstract":[{"lang":"eng","text":"Services are self-contained and platform independent software components that aim at maximizing software reuse. The automated composition of services to a target software artifact has been tackled with many AI techniques, but existing approaches make unreasonably strong assumptions such as a predefined data flow, are limited to tiny problem sizes, ignore non-functional properties, or assume offline service repositories. This paper presents an algorithm that automatically composes services without making such assumptions. We employ a backward search algorithm that starts from an empty composition and prepends service calls to already discovered candidates until a solution is found. Available services are determined during the search process. We implemented our algorithm, performed an experimental evaluation, and compared it to other approaches."}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"name":"SFB 901 - Project Area B","_id":"3"}],"file":[{"success":1,"date_updated":"2018-03-20T07:42:03Z","relation":"main_file","access_level":"closed","content_type":"application/pdf","file_id":"1434","date_created":"2018-03-20T07:42:03Z","creator":"florida","file_name":"319-07207336.pdf","file_size":345742}],"title":"Automated Online Service Composition","user_id":"477","status":"public","language":[{"iso":"eng"}],"year":"2015","date_created":"2017-10-17T12:41:54Z","date_updated":"2022-01-06T06:59:04Z","_id":"319","file_date_updated":"2018-03-20T07:42:03Z","author":[{"full_name":"Mohr, Felix","first_name":"Felix","last_name":"Mohr"},{"full_name":"Jungmann, Alexander","first_name":"Alexander","last_name":"Jungmann"},{"first_name":"Hans","full_name":"Kleine Büning, Hans","last_name":"Kleine Büning"}],"department":[{"_id":"355"}],"citation":{"mla":"Mohr, Felix, et al. “Automated Online Service Composition.” <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>, 2015, pp. 57--64, doi:<a href=\"https://doi.org/10.1109/SCC.2015.18\">10.1109/SCC.2015.18</a>.","bibtex":"@inproceedings{Mohr_Jungmann_Kleine Büning_2015, title={Automated Online Service Composition}, DOI={<a href=\"https://doi.org/10.1109/SCC.2015.18\">10.1109/SCC.2015.18</a>}, booktitle={Proceedings of the 12th IEEE International Conference on Services Computing (SCC)}, author={Mohr, Felix and Jungmann, Alexander and Kleine Büning, Hans}, year={2015}, pages={57--64} }","short":"F. Mohr, A. Jungmann, H. Kleine Büning, in: Proceedings of the 12th IEEE International Conference on Services Computing (SCC), 2015, pp. 57--64.","ama":"Mohr F, Jungmann A, Kleine Büning H. Automated Online Service Composition. In: <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>. ; 2015:57--64. doi:<a href=\"https://doi.org/10.1109/SCC.2015.18\">10.1109/SCC.2015.18</a>","apa":"Mohr, F., Jungmann, A., &#38; Kleine Büning, H. (2015). Automated Online Service Composition. In <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i> (pp. 57--64). <a href=\"https://doi.org/10.1109/SCC.2015.18\">https://doi.org/10.1109/SCC.2015.18</a>","chicago":"Mohr, Felix, Alexander Jungmann, and Hans Kleine Büning. “Automated Online Service Composition.” In <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>, 57--64, 2015. <a href=\"https://doi.org/10.1109/SCC.2015.18\">https://doi.org/10.1109/SCC.2015.18</a>.","ieee":"F. Mohr, A. Jungmann, and H. Kleine Büning, “Automated Online Service Composition,” in <i>Proceedings of the 12th IEEE International Conference on Services Computing (SCC)</i>, 2015, pp. 57--64."}},{"department":[{"_id":"63"}],"citation":{"short":"S. Abshoff, On the Complexity of Fundamental Problems in Dynamic Ad-Hoc Networks, Universität Paderborn, 2015.","mla":"Abshoff, Sebastian. <i>On the Complexity of Fundamental Problems in Dynamic Ad-Hoc Networks</i>. Universität Paderborn, 2015.","bibtex":"@book{Abshoff_2015, title={On the Complexity of Fundamental Problems in Dynamic Ad-hoc Networks}, publisher={Universität Paderborn}, author={Abshoff, Sebastian}, year={2015} }","chicago":"Abshoff, Sebastian. <i>On the Complexity of Fundamental Problems in Dynamic Ad-Hoc Networks</i>. Universität Paderborn, 2015.","ieee":"S. Abshoff, <i>On the Complexity of Fundamental Problems in Dynamic Ad-hoc Networks</i>. Universität Paderborn, 2015.","apa":"Abshoff, S. (2015). <i>On the Complexity of Fundamental Problems in Dynamic Ad-hoc Networks</i>. Universität Paderborn.","ama":"Abshoff S. <i>On the Complexity of Fundamental Problems in Dynamic Ad-Hoc Networks</i>. Universität Paderborn; 2015."},"user_id":"477","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"supervisor":[{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","last_name":"Meyer auf der Heide","id":"15523"}],"has_accepted_license":"1","title":"On the Complexity of Fundamental Problems in Dynamic Ad-hoc Networks","author":[{"last_name":"Abshoff","full_name":"Abshoff, Sebastian","first_name":"Sebastian"}],"file":[{"date_created":"2018-03-21T09:30:02Z","file_id":"1476","access_level":"closed","content_type":"application/pdf","file_name":"270-Dissertation_-_Abshoff.pdf","file_size":448614,"creator":"florida","success":1,"date_updated":"2018-03-21T09:30:02Z","relation":"main_file"}],"date_updated":"2022-01-06T06:57:32Z","_id":"270","file_date_updated":"2018-03-21T09:30:02Z","year":"2015","type":"dissertation","status":"public","ddc":["040"],"date_created":"2017-10-17T12:41:44Z","publisher":"Universität Paderborn"},{"user_id":"14052","external_id":{"arxiv":["1507.02908"]},"title":"On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games","file":[{"file_size":256718,"file_name":"271-chp_3A10.1007_2F978-3-662-48433-3_14.pdf","creator":"florida","date_created":"2018-03-21T09:29:34Z","access_level":"closed","content_type":"application/pdf","file_id":"1475","date_updated":"2018-03-21T09:29:34Z","relation":"main_file","success":1}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"_id":"16","name":"SFB 901 - Subproject C4"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Project Area C","_id":"4"}],"has_accepted_license":"1","doi":"10.1007/978-3-662-48433-3_14","abstract":[{"text":"In \\emph{bandwidth allocation games} (BAGs), the strategy of a player consists of various demands on different resources. The player's utility is at most the sum of these demands, provided they are fully satisfied. Every resource has a limited capacity and if it is exceeded by the total demand, it has to be split between the players. Since these games generally do not have pure Nash equilibria, we consider approximate pure Nash equilibria, in which no player can improve her utility by more than some fixed factor $\\alpha$ through unilateral strategy changes. There is a threshold $\\alpha_\\delta$ (where $\\delta$ is a parameter that limits the demand of each player on a specific resource) such that $\\alpha$-approximate pure Nash equilibria always exist for $\\alpha \\geq \\alpha_\\delta$, but not for $\\alpha < \\alpha_\\delta$. We give both upper and lower bounds on this threshold $\\alpha_\\delta$ and show that the corresponding decision problem is ${\\sf NP}$-hard. We also show that the $\\alpha$-approximate price of anarchy for BAGs is $\\alpha+1$. For a restricted version of the game, where demands of players only differ slightly from each other (e.g. symmetric games), we show that approximate Nash equilibria can be reached (and thus also be computed) in polynomial time using the best-response dynamic. Finally, we show that a broader class of utility-maximization games (which includes BAGs) converges quickly towards states whose social welfare is close to the optimum.","lang":"eng"}],"page":"178-189","ddc":["040"],"publication":"Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)","type":"conference","citation":{"short":"M. Drees, M. Feldotto, S. Riechers, A. Skopalik, in: Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT), 2015, pp. 178–189.","bibtex":"@inproceedings{Drees_Feldotto_Riechers_Skopalik_2015, series={Lecture Notes in Computer Science}, title={On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-48433-3_14\">10.1007/978-3-662-48433-3_14</a>}, booktitle={Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)}, author={Drees, Maximilian and Feldotto, Matthias and Riechers, Sören and Skopalik, Alexander}, year={2015}, pages={178–189}, collection={Lecture Notes in Computer Science} }","mla":"Drees, Maximilian, et al. “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games.” <i>Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)</i>, 2015, pp. 178–89, doi:<a href=\"https://doi.org/10.1007/978-3-662-48433-3_14\">10.1007/978-3-662-48433-3_14</a>.","ieee":"M. Drees, M. Feldotto, S. Riechers, and A. Skopalik, “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games,” in <i>Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)</i>, 2015, pp. 178–189.","chicago":"Drees, Maximilian, Matthias Feldotto, Sören Riechers, and Alexander Skopalik. “On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games.” In <i>Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)</i>, 178–89. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-662-48433-3_14\">https://doi.org/10.1007/978-3-662-48433-3_14</a>.","ama":"Drees M, Feldotto M, Riechers S, Skopalik A. On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games. In: <i>Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)</i>. Lecture Notes in Computer Science. ; 2015:178-189. doi:<a href=\"https://doi.org/10.1007/978-3-662-48433-3_14\">10.1007/978-3-662-48433-3_14</a>","apa":"Drees, M., Feldotto, M., Riechers, S., &#38; Skopalik, A. (2015). On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games. In <i>Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)</i> (pp. 178–189). <a href=\"https://doi.org/10.1007/978-3-662-48433-3_14\">https://doi.org/10.1007/978-3-662-48433-3_14</a>"},"series_title":"Lecture Notes in Computer Science","department":[{"_id":"63"},{"_id":"541"}],"author":[{"last_name":"Drees","first_name":"Maximilian","full_name":"Drees, Maximilian"},{"orcid":"0000-0003-1348-6516","first_name":"Matthias","full_name":"Feldotto, Matthias","last_name":"Feldotto","id":"14052"},{"full_name":"Riechers, Sören","first_name":"Sören","last_name":"Riechers"},{"id":"40384","last_name":"Skopalik","full_name":"Skopalik, Alexander","first_name":"Alexander"}],"_id":"271","file_date_updated":"2018-03-21T09:29:34Z","date_updated":"2022-01-06T06:57:34Z","date_created":"2017-10-17T12:41:45Z","year":"2015","status":"public"},{"title":"On Adaptivity for Automated Composition of Service Functionality","file":[{"file_id":"1474","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T09:29:05Z","creator":"florida","file_size":163452,"file_name":"272-07196545.pdf","success":1,"date_updated":"2018-03-21T09:29:05Z","relation":"main_file"}],"author":[{"last_name":"Jungmann","full_name":"Jungmann, Alexander","first_name":"Alexander"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"10","name":"SFB 901 - Subprojekt B2"},{"name":"SFB 901 - Project Area B","_id":"3"}],"has_accepted_license":"1","abstract":[{"text":"Automated service composition aims at automatically generating software solutions based on services to provide more complex functionality. In this paper, we give an initial overview about why adaptivity becomes increasingly important when aiming for automated composition of service functionality in dynamic and freely accessible environments such as service markets. We systematically derive dependencies among crucial processes such as service composition and service execution in a holistic view. Furthermore, we briefly discuss the influences and effects of changes in the environment according to the derived dependencies, and derive possible future research directions. ","lang":"eng"}],"doi":"10.1109/SERVICES.2015.57","citation":{"short":"A. Jungmann, in: Proceedings of the IEEE 11th World Congress on Services (SERVICES), 2015, pp. 329--332.","bibtex":"@inproceedings{Jungmann_2015, title={On Adaptivity for Automated Composition of Service Functionality}, DOI={<a href=\"https://doi.org/10.1109/SERVICES.2015.57\">10.1109/SERVICES.2015.57</a>}, booktitle={Proceedings of the IEEE 11th World Congress on Services (SERVICES)}, author={Jungmann, Alexander}, year={2015}, pages={329--332} }","mla":"Jungmann, Alexander. “On Adaptivity for Automated Composition of Service Functionality.” <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>, 2015, pp. 329--332, doi:<a href=\"https://doi.org/10.1109/SERVICES.2015.57\">10.1109/SERVICES.2015.57</a>.","ieee":"A. Jungmann, “On Adaptivity for Automated Composition of Service Functionality,” in <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>, 2015, pp. 329--332.","chicago":"Jungmann, Alexander. “On Adaptivity for Automated Composition of Service Functionality.” In <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>, 329--332, 2015. <a href=\"https://doi.org/10.1109/SERVICES.2015.57\">https://doi.org/10.1109/SERVICES.2015.57</a>.","ama":"Jungmann A. On Adaptivity for Automated Composition of Service Functionality. In: <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i>. ; 2015:329--332. doi:<a href=\"https://doi.org/10.1109/SERVICES.2015.57\">10.1109/SERVICES.2015.57</a>","apa":"Jungmann, A. (2015). On Adaptivity for Automated Composition of Service Functionality. In <i>Proceedings of the IEEE 11th World Congress on Services (SERVICES)</i> (pp. 329--332). <a href=\"https://doi.org/10.1109/SERVICES.2015.57\">https://doi.org/10.1109/SERVICES.2015.57</a>"},"user_id":"15504","date_created":"2017-10-17T12:41:45Z","ddc":["040"],"publication":"Proceedings of the IEEE 11th World Congress on Services (SERVICES)","year":"2015","type":"conference","status":"public","_id":"272","page":"329--332","file_date_updated":"2018-03-21T09:29:05Z","date_updated":"2022-01-06T06:57:36Z"},{"_id":"273","date_updated":"2022-01-06T06:57:37Z","date_created":"2017-10-17T12:41:45Z","publisher":"Universität Paderborn","type":"mastersthesis","year":"2015","status":"public","citation":{"short":"K. Kohn, Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.","bibtex":"@book{Kohn_2015, title={Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms}, publisher={Universität Paderborn}, author={Kohn, Kathlén}, year={2015} }","mla":"Kohn, Kathlén. <i>Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms</i>. Universität Paderborn, 2015.","ieee":"K. Kohn, <i>Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms</i>. Universität Paderborn, 2015.","chicago":"Kohn, Kathlén. <i>Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms</i>. Universität Paderborn, 2015.","apa":"Kohn, K. (2015). <i>Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms</i>. Universität Paderborn.","ama":"Kohn K. <i>Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms</i>. Universität Paderborn; 2015."},"user_id":"477","department":[{"_id":"64"}],"title":"Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms","author":[{"first_name":"Kathlén","full_name":"Kohn, Kathlén","last_name":"Kohn"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}]},{"department":[{"_id":"63"}],"citation":{"short":"A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, in: F. Dehne, J.R. Sack, U. Stege (Eds.), Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings, 2015, pp. 542--553.","bibtex":"@inproceedings{Mäcker_Malatyali_Meyer auf der Heide_Riechers_2015, series={Lecture Notes in Computer Science}, title={Non-preemptive Scheduling on Machines with Setup Times}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-21840-3_45\">10.1007/978-3-319-21840-3_45</a>}, booktitle={Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings}, author={Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and Riechers, Sören}, editor={Dehne, Frank and Sack, Jörg Rüdiger and Stege, UlrikeEditors}, year={2015}, pages={542--553}, collection={Lecture Notes in Computer Science} }","mla":"Mäcker, Alexander, et al. “Non-Preemptive Scheduling on Machines with Setup Times.” <i>Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings</i>, edited by Frank Dehne et al., 2015, pp. 542--553, doi:<a href=\"https://doi.org/10.1007/978-3-319-21840-3_45\">10.1007/978-3-319-21840-3_45</a>.","ieee":"A. Mäcker, M. Malatyali, F. Meyer auf der Heide, and S. Riechers, “Non-preemptive Scheduling on Machines with Setup Times,” in <i>Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings</i>, 2015, pp. 542--553.","chicago":"Mäcker, Alexander, Manuel Malatyali, Friedhelm Meyer auf der Heide, and Sören Riechers. “Non-Preemptive Scheduling on Machines with Setup Times.” In <i>Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings</i>, edited by Frank Dehne, Jörg Rüdiger Sack, and Ulrike Stege, 542--553. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-21840-3_45\">https://doi.org/10.1007/978-3-319-21840-3_45</a>.","ama":"Mäcker A, Malatyali M, Meyer auf der Heide F, Riechers S. Non-preemptive Scheduling on Machines with Setup Times. In: Dehne F, Sack JR, Stege U, eds. <i>Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings</i>. Lecture Notes in Computer Science. ; 2015:542--553. doi:<a href=\"https://doi.org/10.1007/978-3-319-21840-3_45\">10.1007/978-3-319-21840-3_45</a>","apa":"Mäcker, A., Malatyali, M., Meyer auf der Heide, F., &#38; Riechers, S. (2015). Non-preemptive Scheduling on Machines with Setup Times. In F. Dehne, J. R. Sack, &#38; U. Stege (Eds.), <i>Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings</i> (pp. 542--553). <a href=\"https://doi.org/10.1007/978-3-319-21840-3_45\">https://doi.org/10.1007/978-3-319-21840-3_45</a>"},"series_title":"Lecture Notes in Computer Science","author":[{"last_name":"Mäcker","id":"13536","full_name":"Mäcker, Alexander","first_name":"Alexander"},{"last_name":"Malatyali","full_name":"Malatyali, Manuel","first_name":"Manuel"},{"last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"},{"last_name":"Riechers","first_name":"Sören","full_name":"Riechers, Sören"}],"editor":[{"full_name":"Dehne, Frank","first_name":"Frank","last_name":"Dehne"},{"full_name":"Sack, Jörg Rüdiger","first_name":"Jörg Rüdiger","last_name":"Sack"},{"full_name":"Stege, Ulrike","first_name":"Ulrike","last_name":"Stege"}],"date_updated":"2022-01-06T06:57:39Z","_id":"274","file_date_updated":"2018-03-21T09:28:34Z","status":"public","year":"2015","date_created":"2017-10-17T12:41:45Z","user_id":"15504","abstract":[{"lang":"eng","text":"Consider the problem in which n jobs that are classified into k types are to be scheduled on m identical machines without preemption. A machine requires a proper setup taking s time units before processing jobs of a given type. The objective is to minimize the makespan of the resulting schedule. We design and analyze an approximation algorithm that runs in time polynomial in n,m and k and computes a solution with an approximation factor that can be made arbitrarily close to 3/2."}],"doi":"10.1007/978-3-319-21840-3_45","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C4","_id":"16"},{"name":"SFB 901 - Project Area C","_id":"4"}],"file":[{"success":1,"relation":"main_file","date_updated":"2018-03-21T09:28:34Z","date_created":"2018-03-21T09:28:34Z","access_level":"closed","file_id":"1473","content_type":"application/pdf","file_size":215498,"file_name":"274-chp_3A10.1007_2F978-3-319-21840-3_45.pdf","creator":"florida"}],"title":"Non-preemptive Scheduling on Machines with Setup Times","page":"542--553","type":"conference","publication":"Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings","ddc":["040"]},{"type":"conference","ddc":["040"],"publication":"Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS)","page":"248--260","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"abstract":[{"lang":"eng","text":"We investigate a non-cooperative game-theoretic model for the formation of communication networks by selfish agents. Each agent aims for a central position at minimum cost for creating edges. In particular, the general model (Fabrikant et al., PODC'03) became popular for studying the structure of the Internet or social networks. Despite its significance, locality in this game was first studied only recently (Bilò et al., SPAA'14), where a worst case locality model was presented, which came with a high efficiency loss in terms of quality of equilibria. Our main contribution is a new and more optimistic view on locality: agents are limited in their knowledge and actions to their local view ranges, but can probe different strategies and finally choose the best. We study the influence of our locality notion on the hardness of computing best responses, convergence to equilibria, and quality of equilibria. Moreover, we compare the strength of local versus non-local strategy changes. Our results address the gap between the original model and the worst case locality variant. On the bright side, our efficiency results are in line with observations from the original model, yet we have a non-constant lower bound on the Price of Anarchy."}],"doi":"10.1007/978-3-662-48054-0_21","has_accepted_license":"1","title":"Network Creation Games: Think Global - Act Local","file":[{"file_id":"1472","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T09:27:12Z","creator":"florida","file_size":279995,"file_name":"275-978-3-662-48054-0_21.pdf","success":1,"date_updated":"2018-03-21T09:27:12Z","relation":"main_file"}],"user_id":"477","year":"2015","language":[{"iso":"eng"}],"status":"public","date_created":"2017-10-17T12:41:45Z","date_updated":"2022-01-06T06:57:40Z","_id":"275","file_date_updated":"2018-03-21T09:27:12Z","author":[{"last_name":"Cord-Landwehr","full_name":"Cord-Landwehr, Andreas","first_name":"Andreas"},{"last_name":"Lenzner","full_name":"Lenzner, Pascal","first_name":"Pascal"}],"department":[{"_id":"63"}],"series_title":"LNCS","citation":{"ama":"Cord-Landwehr A, Lenzner P. Network Creation Games: Think Global - Act Local. In: <i>Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS)</i>. LNCS. ; 2015:248--260. doi:<a href=\"https://doi.org/10.1007/978-3-662-48054-0_21\">10.1007/978-3-662-48054-0_21</a>","apa":"Cord-Landwehr, A., &#38; Lenzner, P. (2015). Network Creation Games: Think Global - Act Local. In <i>Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS)</i> (pp. 248--260). <a href=\"https://doi.org/10.1007/978-3-662-48054-0_21\">https://doi.org/10.1007/978-3-662-48054-0_21</a>","chicago":"Cord-Landwehr, Andreas, and Pascal Lenzner. “Network Creation Games: Think Global - Act Local.” In <i>Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS)</i>, 248--260. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-662-48054-0_21\">https://doi.org/10.1007/978-3-662-48054-0_21</a>.","ieee":"A. Cord-Landwehr and P. Lenzner, “Network Creation Games: Think Global - Act Local,” in <i>Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS)</i>, 2015, pp. 248--260.","mla":"Cord-Landwehr, Andreas, and Pascal Lenzner. “Network Creation Games: Think Global - Act Local.” <i>Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS)</i>, 2015, pp. 248--260, doi:<a href=\"https://doi.org/10.1007/978-3-662-48054-0_21\">10.1007/978-3-662-48054-0_21</a>.","bibtex":"@inproceedings{Cord-Landwehr_Lenzner_2015, series={LNCS}, title={Network Creation Games: Think Global - Act Local}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-48054-0_21\">10.1007/978-3-662-48054-0_21</a>}, booktitle={Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS)}, author={Cord-Landwehr, Andreas and Lenzner, Pascal}, year={2015}, pages={248--260}, collection={LNCS} }","short":"A. Cord-Landwehr, P. Lenzner, in: Proceedings of the 40th Conference on Mathematical Foundations of Computer Science (MFCS), 2015, pp. 248--260."}},{"_id":"276","date_updated":"2022-01-06T06:57:43Z","date_created":"2017-10-17T12:41:45Z","publisher":"Universität Paderborn","type":"mastersthesis","year":"2015","status":"public","citation":{"chicago":"Hohenberger, Till. <i>Network Creation Games with Interest Groups</i>. Universität Paderborn, 2015.","ieee":"T. Hohenberger, <i>Network Creation Games with Interest Groups</i>. Universität Paderborn, 2015.","apa":"Hohenberger, T. (2015). <i>Network Creation Games with Interest Groups</i>. Universität Paderborn.","ama":"Hohenberger T. <i>Network Creation Games with Interest Groups</i>. Universität Paderborn; 2015.","short":"T. Hohenberger, Network Creation Games with Interest Groups, Universität Paderborn, 2015.","mla":"Hohenberger, Till. <i>Network Creation Games with Interest Groups</i>. Universität Paderborn, 2015.","bibtex":"@book{Hohenberger_2015, title={Network Creation Games with Interest Groups}, publisher={Universität Paderborn}, author={Hohenberger, Till}, year={2015} }"},"user_id":"477","title":"Network Creation Games with Interest Groups","author":[{"last_name":"Hohenberger","first_name":"Till","full_name":"Hohenberger, Till"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}]},{"_id":"277","date_updated":"2022-01-06T06:57:44Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:46Z","status":"public","year":"2015","type":"bachelorsthesis","language":[{"iso":"ger"}],"user_id":"14052","citation":{"mla":"Kothe, Nils. <i>Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk</i>. Universität Paderborn, 2015.","bibtex":"@book{Kothe_2015, title={Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk}, publisher={Universität Paderborn}, author={Kothe, Nils}, year={2015} }","short":"N. Kothe, Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk, Universität Paderborn, 2015.","apa":"Kothe, N. (2015). <i>Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk</i>. Universität Paderborn.","ama":"Kothe N. <i>Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk</i>. Universität Paderborn; 2015.","chicago":"Kothe, Nils. <i>Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk</i>. Universität Paderborn, 2015.","ieee":"N. Kothe, <i>Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk</i>. Universität Paderborn, 2015."},"department":[{"_id":"63"},{"_id":"541"}],"author":[{"first_name":"Nils","full_name":"Kothe, Nils","last_name":"Kothe"}],"title":"Multilevel Netzwerk Spiele mit konstanten Entfernungen im Highspeed-Netzwerk","supervisor":[{"full_name":"Skopalik, Alexander","first_name":"Alexander","id":"40384","last_name":"Skopalik"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"7","name":"SFB 901 - Subproject A3"}]},{"department":[{"_id":"79"}],"user_id":"477","citation":{"apa":"Feldmann, M. (2015). <i>Monotonic Searchability for distributed sorted Lists and De Bruijn Graphs</i>. Universität Paderborn.","ama":"Feldmann M. <i>Monotonic Searchability for Distributed Sorted Lists and De Bruijn Graphs</i>. Universität Paderborn; 2015.","chicago":"Feldmann, Michael. <i>Monotonic Searchability for Distributed Sorted Lists and De Bruijn Graphs</i>. Universität Paderborn, 2015.","ieee":"M. Feldmann, <i>Monotonic Searchability for distributed sorted Lists and De Bruijn Graphs</i>. Universität Paderborn, 2015.","mla":"Feldmann, Michael. <i>Monotonic Searchability for Distributed Sorted Lists and De Bruijn Graphs</i>. Universität Paderborn, 2015.","bibtex":"@book{Feldmann_2015, title={Monotonic Searchability for distributed sorted Lists and De Bruijn Graphs}, publisher={Universität Paderborn}, author={Feldmann, Michael}, year={2015} }","short":"M. Feldmann, Monotonic Searchability for Distributed Sorted Lists and De Bruijn Graphs, Universität Paderborn, 2015."},"supervisor":[{"full_name":"Scheideler, Christian","first_name":"Christian","last_name":"Scheideler","id":"20792"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"author":[{"id":"23538","last_name":"Feldmann","full_name":"Feldmann, Michael","first_name":"Michael"}],"title":"Monotonic Searchability for distributed sorted Lists and De Bruijn Graphs","date_updated":"2022-01-06T06:57:45Z","_id":"278","status":"public","language":[{"iso":"eng"}],"type":"mastersthesis","year":"2015","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:46Z"},{"department":[{"_id":"76"},{"_id":"66"}],"citation":{"bibtex":"@inproceedings{Platenius_Arifulina_Schäfer_2015, title={MatchBox: A Framework for Dynamic Configuration of Service Matching Processes}, DOI={<a href=\"https://doi.org/10.1145/2737166.2737174\">10.1145/2737166.2737174</a>}, booktitle={Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15)}, author={Platenius, Marie Christin and Arifulina, Svetlana and Schäfer, Wilhelm}, year={2015}, pages={75–84} }","mla":"Platenius, Marie Christin, et al. “MatchBox: A Framework for Dynamic Configuration of Service Matching Processes.” <i>Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15)</i>, 2015, pp. 75–84, doi:<a href=\"https://doi.org/10.1145/2737166.2737174\">10.1145/2737166.2737174</a>.","short":"M.C. Platenius, S. Arifulina, W. Schäfer, in: Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15), 2015, pp. 75–84.","ama":"Platenius MC, Arifulina S, Schäfer W. MatchBox: A Framework for Dynamic Configuration of Service Matching Processes. In: <i>Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15)</i>. ; 2015:75-84. doi:<a href=\"https://doi.org/10.1145/2737166.2737174\">10.1145/2737166.2737174</a>","apa":"Platenius, M. C., Arifulina, S., &#38; Schäfer, W. (2015). MatchBox: A Framework for Dynamic Configuration of Service Matching Processes. In <i>Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15)</i> (pp. 75–84). <a href=\"https://doi.org/10.1145/2737166.2737174\">https://doi.org/10.1145/2737166.2737174</a>","ieee":"M. C. Platenius, S. Arifulina, and W. Schäfer, “MatchBox: A Framework for Dynamic Configuration of Service Matching Processes,” in <i>Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15)</i>, 2015, pp. 75–84.","chicago":"Platenius, Marie Christin, Svetlana Arifulina, and Wilhelm Schäfer. “MatchBox: A Framework for Dynamic Configuration of Service Matching Processes.” In <i>Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE’15)</i>, 75–84, 2015. <a href=\"https://doi.org/10.1145/2737166.2737174\">https://doi.org/10.1145/2737166.2737174</a>."},"author":[{"first_name":"Marie Christin","full_name":"Platenius, Marie Christin","last_name":"Platenius"},{"full_name":"Arifulina, Svetlana","first_name":"Svetlana","last_name":"Arifulina"},{"last_name":"Schäfer","full_name":"Schäfer, Wilhelm","first_name":"Wilhelm"}],"date_updated":"2022-01-06T06:57:48Z","_id":"279","file_date_updated":"2018-03-21T09:26:40Z","status":"public","year":"2015","language":[{"iso":"eng"}],"date_created":"2017-10-17T12:41:46Z","user_id":"477","has_accepted_license":"1","abstract":[{"text":"Service discovery in global software markets is performed by brokers who act as intermediaries between service consumers and service providers.In order to discover services, brokers apply service matching for determining whether the specification of a provided service satisfies the consumer's requirements.Brokers can already choose between a lot of different service matching approaches considering different service properties (structural, behavioral, and non-functional properties).Different matching approaches can be combined into configurable matching processes leading to a high matching quality (e.g., accurate matching results). However, this combination and configuration is a manual procedure and has to be repeated for different consumers' or market requirements regarding matching quality. In this paper, we propose our framework MatchBox, which supports a broker in reusing existing matching approaches and combining them in a model-driven way based on a reconfigurable model of the matching process.Using this reconfigurable model, MatchBox takes care of control and data flow between matching approaches and executes the modeled processes automatically.As a case study, we integrated eleven matchers into MatchBox to demonstrate that it remains flexibility and reduces effort for a broker at the same time.","lang":"eng"}],"doi":"10.1145/2737166.2737174","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"9","name":"SFB 901 - Subproject B1"}],"file":[{"creator":"florida","file_size":2090964,"file_name":"279-p75-platenius.pdf","file_id":"1471","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T09:26:40Z","relation":"main_file","date_updated":"2018-03-21T09:26:40Z","success":1}],"title":"MatchBox: A Framework for Dynamic Configuration of Service Matching Processes","page":"75-84","type":"conference","publication":"Proceedings of the 18th International ACM Sigsoft Symposium on Component-Based Software Engineering (CBSE'15)","ddc":["040"]},{"page":"18-20","volume":48,"issue":"7","publication":"IEEE Computer","ddc":["000"],"type":"journal_article","user_id":"16153","keyword":["self-awareness","self-expression"],"title":"Self-Aware and Self-Expressive Systems – Guest Editor's Introduction","file":[{"file_size":5605009,"file_name":"07163237.pdf","creator":"ups","date_created":"2018-11-02T15:47:45Z","file_id":"5313","access_level":"closed","content_type":"application/pdf","relation":"main_file","date_updated":"2018-11-02T15:47:45Z","success":1}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"14","name":"SFB 901 - Subproject C2"},{"grant_number":"610996","_id":"34","name":"Self-Adaptive Virtualisation-Aware High-Performance/Low-Energy Heterogeneous System Architectures"}],"has_accepted_license":"1","doi":"10.1109/MC.2015.205","file_date_updated":"2018-11-02T15:47:45Z","_id":"1772","date_updated":"2022-01-06T06:53:19Z","date_created":"2018-03-23T14:06:12Z","publisher":"IEEE Computer Society","year":"2015","language":[{"iso":"eng"}],"status":"public","citation":{"ama":"Torresen J, Plessl C, Yao X. Self-Aware and Self-Expressive Systems – Guest Editor’s Introduction. <i>IEEE Computer</i>. 2015;48(7):18-20. doi:<a href=\"https://doi.org/10.1109/MC.2015.205\">10.1109/MC.2015.205</a>","apa":"Torresen, J., Plessl, C., &#38; Yao, X. (2015). Self-Aware and Self-Expressive Systems – Guest Editor’s Introduction. <i>IEEE Computer</i>, <i>48</i>(7), 18–20. <a href=\"https://doi.org/10.1109/MC.2015.205\">https://doi.org/10.1109/MC.2015.205</a>","chicago":"Torresen, Jim, Christian Plessl, and Xin Yao. “Self-Aware and Self-Expressive Systems – Guest Editor’s Introduction.” <i>IEEE Computer</i> 48, no. 7 (2015): 18–20. <a href=\"https://doi.org/10.1109/MC.2015.205\">https://doi.org/10.1109/MC.2015.205</a>.","ieee":"J. Torresen, C. Plessl, and X. Yao, “Self-Aware and Self-Expressive Systems – Guest Editor’s Introduction,” <i>IEEE Computer</i>, vol. 48, no. 7, pp. 18–20, 2015.","mla":"Torresen, Jim, et al. “Self-Aware and Self-Expressive Systems – Guest Editor’s Introduction.” <i>IEEE Computer</i>, vol. 48, no. 7, IEEE Computer Society, 2015, pp. 18–20, doi:<a href=\"https://doi.org/10.1109/MC.2015.205\">10.1109/MC.2015.205</a>.","bibtex":"@article{Torresen_Plessl_Yao_2015, title={Self-Aware and Self-Expressive Systems – Guest Editor’s Introduction}, volume={48}, DOI={<a href=\"https://doi.org/10.1109/MC.2015.205\">10.1109/MC.2015.205</a>}, number={7}, journal={IEEE Computer}, publisher={IEEE Computer Society}, author={Torresen, Jim and Plessl, Christian and Yao, Xin}, year={2015}, pages={18–20} }","short":"J. Torresen, C. Plessl, X. Yao, IEEE Computer 48 (2015) 18–20."},"department":[{"_id":"27"},{"_id":"518"},{"_id":"78"}],"author":[{"last_name":"Torresen","full_name":"Torresen, Jim","first_name":"Jim"},{"id":"16153","last_name":"Plessl","first_name":"Christian","full_name":"Plessl, Christian","orcid":"0000-0001-5728-9982"},{"last_name":"Yao","first_name":"Xin","full_name":"Yao, Xin"}],"intvolume":"        48"},{"title":"Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG","author":[{"full_name":"Menne, Maria Reinhild","first_name":"Maria Reinhild","last_name":"Menne"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A3","_id":"7"},{"_id":"2","name":"SFB 901 - Project Area A"}],"supervisor":[{"last_name":"Hehenkamp","id":"37339","first_name":"Burkhard","full_name":"Hehenkamp, Burkhard"}],"citation":{"mla":"Menne, Maria Reinhild. <i>Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG</i>. Universität Paderborn, 2015.","bibtex":"@book{Menne_2015, title={Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG}, publisher={Universität Paderborn}, author={Menne, Maria Reinhild}, year={2015} }","short":"M.R. Menne, Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG, Universität Paderborn, 2015.","ama":"Menne MR. <i>Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG</i>. Universität Paderborn; 2015.","apa":"Menne, M. R. (2015). <i>Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG</i>. Universität Paderborn.","chicago":"Menne, Maria Reinhild. <i>Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG</i>. Universität Paderborn, 2015.","ieee":"M. R. Menne, <i>Verkaufsbeschränkungen auf Onlinemarktplätzen - Eine wettbewerbspolitische Analyse am Fallbeispiel der Adidas AG</i>. Universität Paderborn, 2015."},"user_id":"42447","department":[{"_id":"280"}],"date_created":"2017-10-17T12:41:37Z","publisher":"Universität Paderborn","type":"bachelorsthesis","year":"2015","language":[{"iso":"ger"}],"status":"public","_id":"234","date_updated":"2022-01-06T06:55:52Z"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"_id":"4","name":"SFB 901 - Project Area C"}],"title":"Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung","author":[{"last_name":"Strotmeyer","full_name":"Strotmeyer, Sebastian","first_name":"Sebastian"}],"citation":{"bibtex":"@book{Strotmeyer_2015, title={Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung}, publisher={Universität Paderborn}, author={Strotmeyer, Sebastian}, year={2015} }","mla":"Strotmeyer, Sebastian. <i>Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung</i>. Universität Paderborn, 2015.","short":"S. Strotmeyer, Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung, Universität Paderborn, 2015.","ama":"Strotmeyer S. <i>Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung</i>. Universität Paderborn; 2015.","apa":"Strotmeyer, S. (2015). <i>Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung</i>. Universität Paderborn.","ieee":"S. Strotmeyer, <i>Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung</i>. Universität Paderborn, 2015.","chicago":"Strotmeyer, Sebastian. <i>Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung</i>. Universität Paderborn, 2015."},"user_id":"16205","language":[{"iso":"ger"}],"year":"2015","type":"bachelorsthesis","status":"public","date_created":"2017-10-17T12:41:37Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:55:56Z","_id":"235"},{"_id":"236","date_updated":"2022-01-06T06:55:57Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:38Z","status":"public","year":"2015","type":"mastersthesis","language":[{"iso":"ger"}],"user_id":"16205","citation":{"short":"D. Neumann, Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich, Universität Paderborn, 2015.","mla":"Neumann, Daniel. <i>Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich</i>. Universität Paderborn, 2015.","bibtex":"@book{Neumann_2015, title={Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich}, publisher={Universität Paderborn}, author={Neumann, Daniel}, year={2015} }","chicago":"Neumann, Daniel. <i>Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich</i>. Universität Paderborn, 2015.","ieee":"D. Neumann, <i>Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich</i>. Universität Paderborn, 2015.","apa":"Neumann, D. (2015). <i>Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich</i>. Universität Paderborn.","ama":"Neumann D. <i>Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich</i>. Universität Paderborn; 2015."},"author":[{"first_name":"Daniel","full_name":"Neumann, Daniel","last_name":"Neumann"}],"title":"Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich","project":[{"name":"SFB 901","_id":"1"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"name":"SFB 901 - Project Area C","_id":"4"}]},{"user_id":"477","citation":{"chicago":"Ochlast, Kerstin. <i>Trust Me, I Am Certified - Wie Die Zertifizierung von Produkten Und Verkäufern Das Vertrauen von Kunden Im Onlinehandel Beeinflussen</i>. Universität Paderborn, 2015.","ieee":"K. Ochlast, <i>Trust Me, I am Certified - Wie die Zertifizierung von Produkten und Verkäufern das Vertrauen von Kunden im Onlinehandel beeinflussen</i>. Universität Paderborn, 2015.","ama":"Ochlast K. <i>Trust Me, I Am Certified - Wie Die Zertifizierung von Produkten Und Verkäufern Das Vertrauen von Kunden Im Onlinehandel Beeinflussen</i>. Universität Paderborn; 2015.","apa":"Ochlast, K. (2015). <i>Trust Me, I am Certified - Wie die Zertifizierung von Produkten und Verkäufern das Vertrauen von Kunden im Onlinehandel beeinflussen</i>. Universität Paderborn.","short":"K. Ochlast, Trust Me, I Am Certified - Wie Die Zertifizierung von Produkten Und Verkäufern Das Vertrauen von Kunden Im Onlinehandel Beeinflussen, Universität Paderborn, 2015.","mla":"Ochlast, Kerstin. <i>Trust Me, I Am Certified - Wie Die Zertifizierung von Produkten Und Verkäufern Das Vertrauen von Kunden Im Onlinehandel Beeinflussen</i>. Universität Paderborn, 2015.","bibtex":"@book{Ochlast_2015, title={Trust Me, I am Certified - Wie die Zertifizierung von Produkten und Verkäufern das Vertrauen von Kunden im Onlinehandel beeinflussen}, publisher={Universität Paderborn}, author={Ochlast, Kerstin}, year={2015} }"},"author":[{"last_name":"Ochlast","full_name":"Ochlast, Kerstin","first_name":"Kerstin"}],"title":"Trust Me, I am Certified - Wie die Zertifizierung von Produkten und Verkäufern das Vertrauen von Kunden im Onlinehandel beeinflussen","project":[{"_id":"1","name":"SFB 901"},{"_id":"8","name":"SFB 901 - Subprojekt A4"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"237","date_updated":"2022-01-06T06:55:58Z","publisher":"Universität Paderborn","date_created":"2017-10-17T12:41:38Z","status":"public","type":"bachelorsthesis","year":"2015","language":[{"iso":"eng"}]},{"citation":{"ama":"Heindorf S, Potthast M, Stein B, Engels G. Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis. In: <i>Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)</i>. ; 2015:831--834. doi:<a href=\"https://doi.org/10.1145/2766462.2767804\">10.1145/2766462.2767804</a>","apa":"Heindorf, S., Potthast, M., Stein, B., &#38; Engels, G. (2015). Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis. In <i>Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)</i> (pp. 831--834). <a href=\"https://doi.org/10.1145/2766462.2767804\">https://doi.org/10.1145/2766462.2767804</a>","ieee":"S. Heindorf, M. Potthast, B. Stein, and G. Engels, “Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis,” in <i>Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)</i>, 2015, pp. 831--834.","chicago":"Heindorf, Stefan, Martin Potthast, Benno Stein, and Gregor Engels. “Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis.” In <i>Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)</i>, 831--834, 2015. <a href=\"https://doi.org/10.1145/2766462.2767804\">https://doi.org/10.1145/2766462.2767804</a>.","bibtex":"@inproceedings{Heindorf_Potthast_Stein_Engels_2015, title={Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis}, DOI={<a href=\"https://doi.org/10.1145/2766462.2767804\">10.1145/2766462.2767804</a>}, booktitle={Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)}, author={Heindorf, Stefan and Potthast, Martin and Stein, Benno and Engels, Gregor}, year={2015}, pages={831--834} }","mla":"Heindorf, Stefan, et al. “Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis.” <i>Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)</i>, 2015, pp. 831--834, doi:<a href=\"https://doi.org/10.1145/2766462.2767804\">10.1145/2766462.2767804</a>.","short":"S. Heindorf, M. Potthast, B. Stein, G. Engels, in: Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15), 2015, pp. 831--834."},"department":[{"_id":"66"}],"author":[{"last_name":"Heindorf","first_name":"Stefan","full_name":"Heindorf, Stefan"},{"last_name":"Potthast","first_name":"Martin","full_name":"Potthast, Martin"},{"full_name":"Stein, Benno","first_name":"Benno","last_name":"Stein"},{"id":"107","last_name":"Engels","first_name":"Gregor","full_name":"Engels, Gregor"}],"_id":"239","file_date_updated":"2018-03-21T10:29:18Z","date_updated":"2022-01-06T06:56:04Z","date_created":"2017-10-17T12:41:38Z","status":"public","language":[{"iso":"eng"}],"year":"2015","user_id":"477","file":[{"file_id":"1499","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T10:29:18Z","creator":"florida","file_size":735898,"file_name":"239-p831-heindorf.pdf","success":1,"date_updated":"2018-03-21T10:29:18Z","relation":"main_file"}],"title":"Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis","doi":"10.1145/2766462.2767804","has_accepted_license":"1","abstract":[{"lang":"eng","text":"We report on the construction of the Wikidata Vandalism Corpus WDVC-2015, the first corpus for vandalism in knowledge bases. Our corpus is based on the entire revision history of Wikidata, the knowledge base underlying Wikipedia. Among Wikidata's 24 million manual revisions, we have identified more than 100,000 cases of vandalism. An in-depth corpus analysis lays the groundwork for research and development on automatic vandalism detection in public knowledge bases. Our analysis shows that 58% of the vandalism revisions can be found in the textual portions of Wikidata, and the remainder in structural content, e.g., subject-predicate-object triples. Moreover, we find that some vandals also target Wikidata content whose manipulation may impact content displayed on Wikipedia, revealing potential vulnerabilities. Given today's importance of knowledge bases for information systems, this shows that public knowledge bases must be used with caution."}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"name":"SFB 901 - Project Area C","_id":"4"}],"page":"831--834","publication":"Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)","ddc":["040"],"type":"conference"},{"status":"public","year":"2015","date_created":"2017-10-17T12:41:38Z","date_updated":"2022-01-06T06:56:05Z","_id":"240","file_date_updated":"2018-03-21T10:28:50Z","author":[{"first_name":"Shouwei","full_name":"Li, Shouwei","last_name":"Li"},{"last_name":"Mäcker","id":"13536","first_name":"Alexander","full_name":"Mäcker, Alexander"},{"last_name":"Markarian","id":"37612","full_name":"Markarian, Christine","first_name":"Christine"},{"id":"15523","last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"},{"last_name":"Riechers","full_name":"Riechers, Sören","first_name":"Sören"}],"department":[{"_id":"63"}],"series_title":"Lecture Notes in Computer Science","citation":{"apa":"Li, S., Mäcker, A., Markarian, C., Meyer auf der Heide, F., &#38; Riechers, S. (2015). Towards Flexible Demands in Online Leasing Problems. In <i>Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)</i> (pp. 277--288). <a href=\"https://doi.org/10.1007/978-3-319-21398-9_22\">https://doi.org/10.1007/978-3-319-21398-9_22</a>","ama":"Li S, Mäcker A, Markarian C, Meyer auf der Heide F, Riechers S. Towards Flexible Demands in Online Leasing Problems. In: <i>Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)</i>. Lecture Notes in Computer Science. ; 2015:277--288. doi:<a href=\"https://doi.org/10.1007/978-3-319-21398-9_22\">10.1007/978-3-319-21398-9_22</a>","chicago":"Li, Shouwei, Alexander Mäcker, Christine Markarian, Friedhelm Meyer auf der Heide, and Sören Riechers. “Towards Flexible Demands in Online Leasing Problems.” In <i>Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)</i>, 277--288. Lecture Notes in Computer Science, 2015. <a href=\"https://doi.org/10.1007/978-3-319-21398-9_22\">https://doi.org/10.1007/978-3-319-21398-9_22</a>.","ieee":"S. Li, A. Mäcker, C. Markarian, F. Meyer auf der Heide, and S. Riechers, “Towards Flexible Demands in Online Leasing Problems,” in <i>Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)</i>, 2015, pp. 277--288.","mla":"Li, Shouwei, et al. “Towards Flexible Demands in Online Leasing Problems.” <i>Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)</i>, 2015, pp. 277--288, doi:<a href=\"https://doi.org/10.1007/978-3-319-21398-9_22\">10.1007/978-3-319-21398-9_22</a>.","bibtex":"@inproceedings{Li_Mäcker_Markarian_Meyer auf der Heide_Riechers_2015, series={Lecture Notes in Computer Science}, title={Towards Flexible Demands in Online Leasing Problems}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-21398-9_22\">10.1007/978-3-319-21398-9_22</a>}, booktitle={Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)}, author={Li, Shouwei and Mäcker, Alexander and Markarian, Christine and Meyer auf der Heide, Friedhelm and Riechers, Sören}, year={2015}, pages={277--288}, collection={Lecture Notes in Computer Science} }","short":"S. Li, A. Mäcker, C. Markarian, F. Meyer auf der Heide, S. Riechers, in: Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON), 2015, pp. 277--288."},"type":"conference","publication":"Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)","ddc":["040"],"page":"277--288","has_accepted_license":"1","doi":"10.1007/978-3-319-21398-9_22","abstract":[{"lang":"eng","text":"We consider online leasing problems in which demands arrive over time and need to be served by leasing resources. We introduce a new model for these problems such that a resource can be leased for K different durations each incurring a different cost (longer leases cost less per time unit). Each demand i can be served anytime between its arrival ai and its deadline ai+di by a leased resource. The objective is to meet all deadlines while minimizing the total leasing costs. This model is a natural generalization of Meyerson’s ParkingPermitProblem (FOCS 2005) in which di=0 for all i. We propose an online algorithm that is Θ(K+dmaxlmin)-competitive where dmax and lmin denote the largest di and the shortest available lease length, respectively. We also extend the SetCoverLeasing problem by deadlines and give a competitive online algorithm which also improves on existing solutions for the original SetCoverLeasing problem."}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"16","name":"SFB 901 - Subprojekt C4"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"file":[{"relation":"main_file","date_updated":"2018-03-21T10:28:50Z","success":1,"creator":"florida","file_name":"240-chp_3A10.1007_2F978-3-319-21398-9_22.pdf","file_size":264482,"file_id":"1498","content_type":"application/pdf","access_level":"closed","date_created":"2018-03-21T10:28:50Z"}],"title":"Towards Flexible Demands in Online Leasing Problems","user_id":"15504"},{"date_updated":"2022-01-06T06:53:25Z","_id":"18003","type":"bachelorsthesis","year":"2015","language":[{"iso":"eng"}],"status":"public","date_created":"2020-08-17T08:18:04Z","publisher":"Universität Paderborn","department":[{"_id":"79"}],"citation":{"apa":"Götte, T. (2015). <i>Covering and Bridging im selbstorganisierenden Partikelsystem Amoebabot</i>. Universität Paderborn.","ama":"Götte T. <i>Covering and Bridging Im Selbstorganisierenden Partikelsystem Amoebabot</i>. Universität Paderborn; 2015.","ieee":"T. Götte, <i>Covering and Bridging im selbstorganisierenden Partikelsystem Amoebabot</i>. Universität Paderborn, 2015.","chicago":"Götte, Thorsten. <i>Covering and Bridging Im Selbstorganisierenden Partikelsystem Amoebabot</i>. Universität Paderborn, 2015.","bibtex":"@book{Götte_2015, title={Covering and Bridging im selbstorganisierenden Partikelsystem Amoebabot}, publisher={Universität Paderborn}, author={Götte, Thorsten}, year={2015} }","mla":"Götte, Thorsten. <i>Covering and Bridging Im Selbstorganisierenden Partikelsystem Amoebabot</i>. Universität Paderborn, 2015.","short":"T. Götte, Covering and Bridging Im Selbstorganisierenden Partikelsystem Amoebabot, Universität Paderborn, 2015."},"user_id":"477","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"supervisor":[{"full_name":"Scheideler, Christian","first_name":"Christian","id":"20792","last_name":"Scheideler"}],"title":"Covering and Bridging im selbstorganisierenden Partikelsystem Amoebabot","author":[{"last_name":"Götte","id":"34727","first_name":"Thorsten","full_name":"Götte, Thorsten"}]},{"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"supervisor":[{"id":"20792","last_name":"Scheideler","first_name":"Christian","full_name":"Scheideler, Christian"}],"title":"Implementierung und Analyse von Cone-DHT","author":[{"last_name":"Korfmacher","first_name":"Christian","full_name":"Korfmacher, Christian"}],"department":[{"_id":"79"}],"citation":{"chicago":"Korfmacher, Christian. <i>Implementierung Und Analyse von Cone-DHT</i>. Universität Paderborn, 2015.","ieee":"C. Korfmacher, <i>Implementierung und Analyse von Cone-DHT</i>. Universität Paderborn, 2015.","apa":"Korfmacher, C. (2015). <i>Implementierung und Analyse von Cone-DHT</i>. Universität Paderborn.","ama":"Korfmacher C. <i>Implementierung Und Analyse von Cone-DHT</i>. Universität Paderborn; 2015.","short":"C. Korfmacher, Implementierung Und Analyse von Cone-DHT, Universität Paderborn, 2015.","mla":"Korfmacher, Christian. <i>Implementierung Und Analyse von Cone-DHT</i>. Universität Paderborn, 2015.","bibtex":"@book{Korfmacher_2015, title={Implementierung und Analyse von Cone-DHT}, publisher={Universität Paderborn}, author={Korfmacher, Christian}, year={2015} }"},"user_id":"477","language":[{"iso":"eng"}],"year":"2015","type":"bachelorsthesis","status":"public","date_created":"2020-08-17T08:19:47Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:53:25Z","_id":"18005"}]
