[{"title":"MLCHECK–Property-Driven Testing of Machine Learning Classifiers","publisher":"IEEE","date_updated":"2022-01-06T06:58:02Z","date_created":"2021-12-07T11:11:36Z","author":[{"first_name":"Arnab","full_name":"Sharma, Arnab","id":"67200","last_name":"Sharma"},{"first_name":"Caglar","id":"43817","full_name":"Demir, Caglar","last_name":"Demir"},{"last_name":"Ngonga Ngomo","full_name":"Ngonga Ngomo, Axel-Cyrille","id":"65716","first_name":"Axel-Cyrille"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"year":"2021","citation":{"bibtex":"@inproceedings{Sharma_Demir_Ngonga Ngomo_Wehrheim, title={MLCHECK–Property-Driven Testing of Machine Learning Classifiers}, booktitle={Proceedings of the 20th IEEE International Conference on Machine Learning and Applications (ICMLA)}, publisher={IEEE}, author={Sharma, Arnab and Demir, Caglar and Ngonga Ngomo, Axel-Cyrille and Wehrheim, Heike} }","short":"A. Sharma, C. Demir, A.-C. Ngonga Ngomo, H. Wehrheim, in: Proceedings of the 20th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, n.d.","mla":"Sharma, Arnab, et al. “MLCHECK–Property-Driven Testing of Machine Learning Classifiers.” <i>Proceedings of the 20th IEEE International Conference on Machine Learning and Applications (ICMLA)</i>, IEEE.","apa":"Sharma, A., Demir, C., Ngonga Ngomo, A.-C., &#38; Wehrheim, H. (n.d.). MLCHECK–Property-Driven Testing of Machine Learning Classifiers. <i>Proceedings of the 20th IEEE International Conference on Machine Learning and Applications (ICMLA)</i>.","ama":"Sharma A, Demir C, Ngonga Ngomo A-C, Wehrheim H. MLCHECK–Property-Driven Testing of Machine Learning Classifiers. In: <i>Proceedings of the 20th IEEE International Conference on Machine Learning and Applications (ICMLA)</i>. IEEE.","ieee":"A. Sharma, C. Demir, A.-C. Ngonga Ngomo, and H. Wehrheim, “MLCHECK–Property-Driven Testing of Machine Learning Classifiers.”","chicago":"Sharma, Arnab, Caglar Demir, Axel-Cyrille Ngonga Ngomo, and Heike Wehrheim. “MLCHECK–Property-Driven Testing of Machine Learning Classifiers.” In <i>Proceedings of the 20th IEEE International Conference on Machine Learning and Applications (ICMLA)</i>. IEEE, n.d."},"publication_status":"accepted","language":[{"iso":"eng"}],"_id":"28350","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B3","_id":"11"},{"_id":"10","name":"SFB 901 - Subproject B2"}],"department":[{"_id":"7"},{"_id":"77"},{"_id":"574"}],"user_id":"477","abstract":[{"text":"In recent years, we observe an increasing amount of software with machine learning components being deployed. This poses the question of quality assurance for such components: how can we validate whether specified requirements are fulfilled by a machine learned software? Current testing and verification approaches either focus on a single requirement (e.g., fairness) or specialize on a single type of machine learning model (e.g., neural networks).\r\nIn this paper, we propose property-driven testing of machine learning models. Our approach MLCheck encompasses (1) a language for property specification, and (2) a technique for systematic test case generation. The specification language is comparable to property-based testing languages. Test case generation employs advanced verification technology for a systematic, property dependent construction of test suites, without additional user supplied generator functions. We evaluate MLCheck using requirements and data sets from three different application areas (software\r\ndiscrimination, learning on knowledge graphs and security). Our evaluation shows that despite its generality MLCheck can even outperform specialised testing approaches while having a comparable runtime","lang":"eng"}],"status":"public","publication":"Proceedings of the 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","type":"conference"},{"type":"conference","publication":"PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021","abstract":[{"lang":"eng","text":"Content is the new oil. Users consume billions of terabytes a day while surfing on news sites or blogs, posting on social media sites, and sending chat messages around the globe. While content is heterogeneous, the dominant form of web content is text. There are situations where more diversity needs to be introduced into text content, for example, to reuse it on websites or to allow a chatbot to base its models on the information conveyed rather than of the language used. In order to achieve this, paraphrasing techniques have been developed: One example is Text spinning, a technique that automatically paraphrases text while leaving the intent intact. This makes it easier to reuse content, or to change the language generated by the bot more human. One method for modifying texts is a combination of translation and back-translation. This paper presents NATTS, a naive approach that uses transformer-based translation models to create diversified text, combining translation steps in one model. An advantage of this approach is that it can be fine-tuned and handle technical language."}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2021-10-15T15:54:41Z","creator":"jkers","date_created":"2021-10-15T15:54:41Z","file_size":411667,"access_level":"closed","file_id":"26282","file_name":"Bäumer et al. (2021), Baeumer2021.pdf"}],"status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"_id":"26049","user_id":"58701","ddc":["000"],"keyword":["Software Requirements","Natural Language Processing","Transfer Learning","On-The-Fly Computing"],"language":[{"iso":"eng"}],"file_date_updated":"2021-10-15T15:54:41Z","has_accepted_license":"1","year":"2021","citation":{"ama":"Bäumer FS, Kersting J, Denisov S, Geierhos M. IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING. In: <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>. IADIS; 2021:221--225.","ieee":"F. S. Bäumer, J. Kersting, S. Denisov, and M. Geierhos, “IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING,” in <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, Lisbon, Portugal, 2021, pp. 221--225.","chicago":"Bäumer, Frederik Simon, Joschka Kersting, Sergej Denisov, and Michaela Geierhos. “IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING.” In <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, 221--225. IADIS, 2021.","apa":"Bäumer, F. S., Kersting, J., Denisov, S., &#38; Geierhos, M. (2021). IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING. <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, 221--225.","short":"F.S. Bäumer, J. Kersting, S. Denisov, M. Geierhos, in: PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021, IADIS, 2021, pp. 221--225.","mla":"Bäumer, Frederik Simon, et al. “IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING.” <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021</i>, IADIS, 2021, pp. 221--225.","bibtex":"@inproceedings{Bäumer_Kersting_Denisov_Geierhos_2021, title={IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING}, booktitle={PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON WWW/INTERNET 2021 AND APPLIED COMPUTING 2021}, publisher={IADIS}, author={Bäumer, Frederik Simon and Kersting, Joschka and Denisov, Sergej and Geierhos, Michaela}, year={2021}, pages={221--225} }"},"page":"221--225","date_updated":"2022-01-06T06:57:16Z","publisher":"IADIS","author":[{"first_name":"Frederik Simon","last_name":"Bäumer","full_name":"Bäumer, Frederik Simon"},{"id":"58701","full_name":"Kersting, Joschka","last_name":"Kersting","first_name":"Joschka"},{"full_name":"Denisov, Sergej","last_name":"Denisov","first_name":"Sergej"},{"first_name":"Michaela","orcid":"0000-0002-8180-5606","last_name":"Geierhos","full_name":"Geierhos, Michaela","id":"42496"}],"date_created":"2021-10-11T15:26:58Z","title":"IN OTHER WORDS: A NAIVE APPROACH TO TEXT SPINNING","conference":{"end_date":"15.10.2021","location":"Lisbon, Portugal","name":"18th International Conference on Applied Computing","start_date":"13.10.2021"}},{"year":"2021","title":"Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware","publisher":"Paderborn University","date_created":"2021-10-25T06:35:41Z","abstract":[{"text":"Previous research in proof-carrying hardware has established the feasibility and utility of the approach, and provided a concrete solution for employing it for the certification of functional equivalence checking against a specification, but fell short in connecting it to state-of-the-art formal verification insights, methods and tools. Due to the immense complexity of modern circuits, and verification challenges such as the state explosion problem for sequential circuits, this restriction of readily-available verification solutions severely limited the applicability of the approach in wider contexts.\r\n\r\nThis thesis closes the gap between the PCH approach and current advances in formal hardware verification, provides methods and tools to express and certify a wide range of circuit properties, both functional and non-functional, and presents for the first time prototypes in which circuits that are implemented on actual reconfigurable hardware are verified with PCH methods. Using these results, designers can now apply PCH to establish trust in more complex circuits, by using more diverse properties which they can express using modern, efficient property specification techniques.","lang":"eng"},{"text":"Die bisherige Forschung zu Proof-Carrying Hardware (PCH) hat dessen Machbarkeit und Nützlichkeit gezeigt und einen Ansatz zur Zertifizierung der funktionalen Äquivalenz zu einer Spezifikation geliefert, jedoch ohne PCH mit aktuellen Erkenntnissen, Methoden oder Werkzeugen formaler Hardwareverifikation zu verknüpfen. Aufgrund der Komplexität moderner Schaltungen und Verifikationsherausforderungen wie der Zustandsexplosion bei sequentiellen Schaltungen, limitiert diese Einschränkung sofort verfügbarer Verifikationslösungen die Anwendbarkeit des Ansatzes in einem größeren Kontext signifikant.\r\n\r\nDiese Dissertation schließt die Lücke zwischen PCH und modernen Entwicklungen in der Schaltungsverifikation und stellt Methoden und Werkzeuge zur Verfügung, welche die Zertifizierung einer großen Bandbreite von Schaltungseigenschaften ermöglicht; sowohl funktionale, als auch nicht-funktionale. Überdies werden erstmals Prototypen vorgestellt in welchen Schaltungen mittels PCH verifiziert werden, die auf tatsächlicher rekonfigurierbarer Hardware realisiert sind. Dank dieser Ergebnisse können Entwickler PCH zur Herstellung von Vertrauen in weit komplexere Schaltungen verwenden, unter Zuhilfenahme einer größeren Vielfalt von Eigenschaften, welche durch moderne, effiziente Spezifikationstechniken ausgedrückt werden können.","lang":"ger"}],"keyword":["Proof-Carrying Hardware","Formal Verification","Sequential Circuits","Non-Functional Properties","Functional Properties"],"ddc":["006"],"language":[{"iso":"eng"}],"place":"Paderborn","page":"293","citation":{"ama":"Wiersema T. <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn University; 2021.","chicago":"Wiersema, Tobias. <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn: Paderborn University, 2021.","ieee":"T. Wiersema, <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn: Paderborn University, 2021.","mla":"Wiersema, Tobias. <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn University, 2021.","bibtex":"@book{Wiersema_2021, place={Paderborn}, title={Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware}, publisher={Paderborn University}, author={Wiersema, Tobias}, year={2021} }","short":"T. Wiersema, Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware, Paderborn University, Paderborn, 2021.","apa":"Wiersema, T. (2021). <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn University."},"publication_status":"published","main_file_link":[{"open_access":"1","url":"https://nbn-resolving.de/urn:nbn:de:hbz:466:2-39800"}],"oa":"1","date_updated":"2022-01-06T06:57:26Z","author":[{"full_name":"Wiersema, Tobias","id":"3118","last_name":"Wiersema","first_name":"Tobias"}],"supervisor":[{"first_name":"Marco","id":"398","full_name":"Platzner, Marco","last_name":"Platzner"}],"status":"public","type":"dissertation","_id":"26746","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"department":[{"_id":"78"}],"user_id":"3118"},{"year":"2021","citation":{"ama":"Suermann D. <i>Schutz Und Stabilisierung von Overlay-Netzwerken Mithilfe Des Relay-Layers</i>.; 2021.","chicago":"Suermann, Dennis. <i>Schutz Und Stabilisierung von Overlay-Netzwerken Mithilfe Des Relay-Layers</i>, 2021.","ieee":"D. Suermann, <i>Schutz und Stabilisierung von Overlay-Netzwerken mithilfe des Relay-Layers</i>. 2021.","mla":"Suermann, Dennis. <i>Schutz Und Stabilisierung von Overlay-Netzwerken Mithilfe Des Relay-Layers</i>. 2021.","short":"D. Suermann, Schutz Und Stabilisierung von Overlay-Netzwerken Mithilfe Des Relay-Layers, 2021.","bibtex":"@book{Suermann_2021, title={Schutz und Stabilisierung von Overlay-Netzwerken mithilfe des Relay-Layers}, author={Suermann, Dennis}, year={2021} }","apa":"Suermann, D. (2021). <i>Schutz und Stabilisierung von Overlay-Netzwerken mithilfe des Relay-Layers</i>."},"date_updated":"2022-01-06T06:58:43Z","supervisor":[{"first_name":"Christian","last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian"}],"author":[{"last_name":"Suermann","full_name":"Suermann, Dennis","first_name":"Dennis"}],"date_created":"2021-12-16T06:41:25Z","title":"Schutz und Stabilisierung von Overlay-Netzwerken mithilfe des Relay-Layers","type":"bachelorsthesis","status":"public","_id":"28998","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"79"}],"user_id":"15504","language":[{"iso":"eng"}]},{"place":"Paderborn","year":"2021","citation":{"ama":"Kashikar C. <i>A Comparison of Machine Learning Techniques for the On-Line Characterization of Tasks Executed on Heterogeneous Compute Nodes</i>. Paderborn University; 2021.","ieee":"C. Kashikar, <i>A Comparison of Machine Learning Techniques for the On-line Characterization of Tasks Executed on Heterogeneous Compute Nodes</i>. Paderborn: Paderborn University, 2021.","chicago":"Kashikar, Chinmay. <i>A Comparison of Machine Learning Techniques for the On-Line Characterization of Tasks Executed on Heterogeneous Compute Nodes</i>. Paderborn: Paderborn University, 2021.","apa":"Kashikar, C. (2021). <i>A Comparison of Machine Learning Techniques for the On-line Characterization of Tasks Executed on Heterogeneous Compute Nodes</i>. Paderborn University.","bibtex":"@book{Kashikar_2021, place={Paderborn}, title={A Comparison of Machine Learning Techniques for the On-line Characterization of Tasks Executed on Heterogeneous Compute Nodes}, publisher={Paderborn University}, author={Kashikar, Chinmay}, year={2021} }","short":"C. Kashikar, A Comparison of Machine Learning Techniques for the On-Line Characterization of Tasks Executed on Heterogeneous Compute Nodes, Paderborn University, Paderborn, 2021.","mla":"Kashikar, Chinmay. <i>A Comparison of Machine Learning Techniques for the On-Line Characterization of Tasks Executed on Heterogeneous Compute Nodes</i>. Paderborn University, 2021."},"title":"A Comparison of Machine Learning Techniques for the On-line Characterization of Tasks Executed on Heterogeneous Compute Nodes","publisher":"Paderborn University","date_updated":"2022-01-06T06:58:46Z","author":[{"last_name":"Kashikar","full_name":"Kashikar, Chinmay","first_name":"Chinmay"}],"supervisor":[{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"},{"first_name":"Tim","id":"49992","full_name":"Hansmeier, Tim","orcid":"0000-0003-1377-3339","last_name":"Hansmeier"}],"date_created":"2022-01-04T09:24:52Z","abstract":[{"text":"Automation becomes a vital part in the High-Performance computing system in situational dynamics to take the decisions on the fly. Heterogeneous compute nodes consist of computing resources such as CPU, GPU and FPGA and are the important components of the high-performance computing system that can adapt the automation to achieve the given goal. While implanting automation in the computing resources, management of the resources is one of the essential aspects that need to be taken care of. Tasks are continuously executed on the resources using its unique characteristics. Effective scheduling is essential to make the best use of the characteristics provided by each resource. Scheduling enables the execution of each task by allocating resources so that they take advantage of all the characteristics of the compute resources. Various scheduling heuristics can be used to create effective scheduling, which might require the execution time to schedule the task efficiently. Providing actual execution time is not possible in many cases; hence we can provide the estimations for the actual execution time . The purpose of this master's thesis is to design a predictive model or system that estimates the execution time required to execute tasks using historical execution time data on the heterogeneous compute nodes. In this thesis, regression techniques(SGD Regressor, Passive-Aggressive Regressor, MLP Regressor, and XCSF Regressor) are compared in terms of their prediction accuracy in order to determine which technique produces reliable predictions for the execution time. These estimations must be generated in an online learning environment in which data points arrive in any sequence, one by one, and the regression model must learn from them. After evaluating the regression algorithms, it is seen that the XCSF regressor provides the highest overall prediction accuracy for the supplied data sets. The regression technique's parameters also play a significant role in achieving an acceptable prediction accuracy. As a remark, when using online learning in regression analysis, the accuracy depends upon both the order of sequential data points that are coming to train the model and the parameter configuration for each regression technique.","lang":"eng"}],"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"29151","project":[{"name":"SFB 901 - Subproject C2","_id":"14"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901","_id":"1"}],"department":[{"_id":"78"}],"user_id":"49992"},{"title":"TaintBench: Automatic real-world malware benchmarking of Android taint analyses","doi":"10.1007/s10664-021-10013-5","main_file_link":[{"open_access":"1","url":"https://link.springer.com/content/pdf/10.1007/s10664-021-10013-5.pdf"}],"oa":"1","date_updated":"2022-01-06T06:57:32Z","date_created":"2021-11-02T05:13:49Z","author":[{"last_name":"Luo","full_name":"Luo, Linghui","first_name":"Linghui"},{"id":"22398","full_name":"Pauck, Felix","last_name":"Pauck","first_name":"Felix"},{"first_name":"Goran","id":"41936","full_name":"Piskachev, Goran","last_name":"Piskachev","orcid":"0000-0003-4424-5838"},{"last_name":"Benz","full_name":"Benz, Manuel","first_name":"Manuel"},{"full_name":"Pashchenko, Ivan","last_name":"Pashchenko","first_name":"Ivan"},{"first_name":"Martin","last_name":"Mory","orcid":"0000-0001-5609-0031","full_name":"Mory, Martin","id":"65667"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"},{"first_name":"Ben","full_name":"Hermann, Ben","id":"66173","last_name":"Hermann","orcid":"0000-0001-9848-2017"},{"full_name":"Massacci, Fabio","last_name":"Massacci","first_name":"Fabio"}],"year":"2021","citation":{"short":"L. Luo, F. Pauck, G. Piskachev, M. Benz, I. Pashchenko, M. Mory, E. Bodden, B. Hermann, F. Massacci, Empirical Software Engineering (2021).","bibtex":"@article{Luo_Pauck_Piskachev_Benz_Pashchenko_Mory_Bodden_Hermann_Massacci_2021, title={TaintBench: Automatic real-world malware benchmarking of Android taint analyses}, DOI={<a href=\"https://doi.org/10.1007/s10664-021-10013-5\">10.1007/s10664-021-10013-5</a>}, journal={Empirical Software Engineering}, author={Luo, Linghui and Pauck, Felix and Piskachev, Goran and Benz, Manuel and Pashchenko, Ivan and Mory, Martin and Bodden, Eric and Hermann, Ben and Massacci, Fabio}, year={2021} }","mla":"Luo, Linghui, et al. “TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses.” <i>Empirical Software Engineering</i>, 2021, doi:<a href=\"https://doi.org/10.1007/s10664-021-10013-5\">10.1007/s10664-021-10013-5</a>.","apa":"Luo, L., Pauck, F., Piskachev, G., Benz, M., Pashchenko, I., Mory, M., Bodden, E., Hermann, B., &#38; Massacci, F. (2021). TaintBench: Automatic real-world malware benchmarking of Android taint analyses. <i>Empirical Software Engineering</i>. <a href=\"https://doi.org/10.1007/s10664-021-10013-5\">https://doi.org/10.1007/s10664-021-10013-5</a>","ieee":"L. Luo <i>et al.</i>, “TaintBench: Automatic real-world malware benchmarking of Android taint analyses,” <i>Empirical Software Engineering</i>, 2021, doi: <a href=\"https://doi.org/10.1007/s10664-021-10013-5\">10.1007/s10664-021-10013-5</a>.","chicago":"Luo, Linghui, Felix Pauck, Goran Piskachev, Manuel Benz, Ivan Pashchenko, Martin Mory, Eric Bodden, Ben Hermann, and Fabio Massacci. “TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses.” <i>Empirical Software Engineering</i>, 2021. <a href=\"https://doi.org/10.1007/s10664-021-10013-5\">https://doi.org/10.1007/s10664-021-10013-5</a>.","ama":"Luo L, Pauck F, Piskachev G, et al. TaintBench: Automatic real-world malware benchmarking of Android taint analyses. <i>Empirical Software Engineering</i>. Published online 2021. doi:<a href=\"https://doi.org/10.1007/s10664-021-10013-5\">10.1007/s10664-021-10013-5</a>"},"publication_identifier":{"issn":["1382-3256","1573-7616"]},"publication_status":"published","ddc":["000"],"language":[{"iso":"eng"}],"_id":"27045","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"department":[{"_id":"77"},{"_id":"76"}],"user_id":"15249","abstract":[{"lang":"eng","text":"Due to the lack of established real-world benchmark suites for static taint analyses of Android applications, evaluations of these analyses are often restricted and hard to compare. Even in evaluations that do use real-world apps, details about the ground truth in those apps are rarely documented, which makes it difficult to compare and reproduce the results. To push Android taint analysis research forward, this paper thus recommends criteria for constructing real-world benchmark suites for this specific domain, and presents TaintBench, the first real-world malware benchmark suite with documented taint flows. TaintBench benchmark apps include taint flows with complex structures, and addresses static challenges that are commonly agreed on by the community. Together with the TaintBench suite, we introduce the TaintBench framework, whose goal is to simplify real-world benchmarking of Android taint analyses. First, a usability test shows that the framework improves experts’ performance and perceived usability when documenting and inspecting taint flows. Second, experiments using TaintBench reveal new insights for the taint analysis tools Amandroid and FlowDroid: (i) They are less effective on real-world malware apps than on synthetic benchmark apps. (ii) Predefined lists of sources and sinks heavily impact the tools’ accuracy. (iii) Surprisingly, up-to-date versions of both tools are less accurate than their predecessors."}],"status":"public","publication":"Empirical Software Engineering","type":"journal_article"},{"date_created":"2021-11-02T10:13:51Z","supervisor":[{"first_name":"Christian","last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792"}],"author":[{"full_name":"Everling, Leon","last_name":"Everling","first_name":"Leon"}],"date_updated":"2022-01-06T06:57:33Z","title":"Selbststabilisierender Bakery Algorithmus für verteilte Systeme","citation":{"short":"L. Everling, Selbststabilisierender Bakery Algorithmus Für Verteilte Systeme, 2021.","mla":"Everling, Leon. <i>Selbststabilisierender Bakery Algorithmus Für Verteilte Systeme</i>. 2021.","bibtex":"@book{Everling_2021, title={Selbststabilisierender Bakery Algorithmus für verteilte Systeme}, author={Everling, Leon}, year={2021} }","apa":"Everling, L. (2021). <i>Selbststabilisierender Bakery Algorithmus für verteilte Systeme</i>.","ieee":"L. Everling, <i>Selbststabilisierender Bakery Algorithmus für verteilte Systeme</i>. 2021.","chicago":"Everling, Leon. <i>Selbststabilisierender Bakery Algorithmus Für Verteilte Systeme</i>, 2021.","ama":"Everling L. <i>Selbststabilisierender Bakery Algorithmus Für Verteilte Systeme</i>.; 2021."},"year":"2021","department":[{"_id":"79"}],"user_id":"15504","_id":"27053","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"type":"mastersthesis","status":"public","user_id":"15504","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A1","_id":"5"}],"_id":"27072","language":[{"iso":"eng"}],"citation":{"bibtex":"@book{Adsul_2021, title={Peer-to-Peer Matching for Distributed Systems}, author={Adsul, Vaibhav}, year={2021} }","mla":"Adsul, Vaibhav. <i>Peer-to-Peer Matching for Distributed Systems</i>. 2021.","short":"V. Adsul, Peer-to-Peer Matching for Distributed Systems, 2021.","apa":"Adsul, V. (2021). <i>Peer-to-Peer Matching for Distributed Systems</i>.","ama":"Adsul V. <i>Peer-to-Peer Matching for Distributed Systems</i>.; 2021.","chicago":"Adsul, Vaibhav. <i>Peer-to-Peer Matching for Distributed Systems</i>, 2021.","ieee":"V. Adsul, <i>Peer-to-Peer Matching for Distributed Systems</i>. 2021."},"year":"2021","author":[{"last_name":"Adsul","full_name":"Adsul, Vaibhav","first_name":"Vaibhav"}],"supervisor":[{"first_name":"Christian","last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian"}],"date_created":"2021-11-03T06:12:47Z","date_updated":"2022-01-06T06:57:33Z","title":"Peer-to-Peer Matching for Distributed Systems"},{"supervisor":[{"last_name":"Karl","full_name":"Karl, Holger","first_name":"Holger"}],"date_created":"2021-11-16T13:05:12Z","author":[{"first_name":"Asif","full_name":"Hasnain, Asif","last_name":"Hasnain"}],"date_updated":"2022-01-06T06:57:40Z","doi":"10.17619/UNIPB/1-1241 ","title":"Automating Network Resource Allocation for Coflows with Deadlines","citation":{"apa":"Hasnain, A. (2021). <i>Automating Network Resource Allocation for Coflows with Deadlines</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1241 \">https://doi.org/10.17619/UNIPB/1-1241 </a>","bibtex":"@book{Hasnain_2021, title={Automating Network Resource Allocation for Coflows with Deadlines}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1241 \">10.17619/UNIPB/1-1241 </a>}, author={Hasnain, Asif}, year={2021} }","mla":"Hasnain, Asif. <i>Automating Network Resource Allocation for Coflows with Deadlines</i>. 2021, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1241 \">10.17619/UNIPB/1-1241 </a>.","short":"A. Hasnain, Automating Network Resource Allocation for Coflows with Deadlines, 2021.","ieee":"A. Hasnain, <i>Automating Network Resource Allocation for Coflows with Deadlines</i>. 2021.","chicago":"Hasnain, Asif. <i>Automating Network Resource Allocation for Coflows with Deadlines</i>, 2021. <a href=\"https://doi.org/10.17619/UNIPB/1-1241 \">https://doi.org/10.17619/UNIPB/1-1241 </a>.","ama":"Hasnain A. <i>Automating Network Resource Allocation for Coflows with Deadlines</i>.; 2021. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1241 \">10.17619/UNIPB/1-1241 </a>"},"year":"2021","department":[{"_id":"75"}],"user_id":"15504","_id":"27503","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"language":[{"iso":"eng"}],"type":"dissertation","status":"public"},{"date_updated":"2022-01-06T06:54:42Z","author":[{"full_name":"Wever, Marcel Dominik","id":"33176","orcid":" https://orcid.org/0000-0001-9782-6818","last_name":"Wever","first_name":"Marcel Dominik"},{"first_name":"Alexander","id":"38209","full_name":"Tornede, Alexander","last_name":"Tornede"},{"full_name":"Mohr, Felix","last_name":"Mohr","first_name":"Felix"},{"first_name":"Eyke","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129"}],"date_created":"2021-01-16T14:48:13Z","title":"AutoML for Multi-Label Classification: Overview and Empirical Evaluation","doi":"10.1109/tpami.2021.3051276","publication_status":"published","publication_identifier":{"issn":["0162-8828","2160-9292","1939-3539"]},"year":"2021","citation":{"apa":"Wever, M. D., Tornede, A., Mohr, F., &#38; Hüllermeier, E. (2021). AutoML for Multi-Label Classification: Overview and Empirical Evaluation. <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>, 1–1. <a href=\"https://doi.org/10.1109/tpami.2021.3051276\">https://doi.org/10.1109/tpami.2021.3051276</a>","mla":"Wever, Marcel Dominik, et al. “AutoML for Multi-Label Classification: Overview and Empirical Evaluation.” <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>, 2021, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tpami.2021.3051276\">10.1109/tpami.2021.3051276</a>.","bibtex":"@article{Wever_Tornede_Mohr_Hüllermeier_2021, title={AutoML for Multi-Label Classification: Overview and Empirical Evaluation}, DOI={<a href=\"https://doi.org/10.1109/tpami.2021.3051276\">10.1109/tpami.2021.3051276</a>}, journal={IEEE Transactions on Pattern Analysis and Machine Intelligence}, author={Wever, Marcel Dominik and Tornede, Alexander and Mohr, Felix and Hüllermeier, Eyke}, year={2021}, pages={1–1} }","short":"M.D. Wever, A. Tornede, F. Mohr, E. Hüllermeier, IEEE Transactions on Pattern Analysis and Machine Intelligence (2021) 1–1.","chicago":"Wever, Marcel Dominik, Alexander Tornede, Felix Mohr, and Eyke Hüllermeier. “AutoML for Multi-Label Classification: Overview and Empirical Evaluation.” <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>, 2021, 1–1. <a href=\"https://doi.org/10.1109/tpami.2021.3051276\">https://doi.org/10.1109/tpami.2021.3051276</a>.","ieee":"M. D. Wever, A. Tornede, F. Mohr, and E. Hüllermeier, “AutoML for Multi-Label Classification: Overview and Empirical Evaluation,” <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>, pp. 1–1, 2021, doi: <a href=\"https://doi.org/10.1109/tpami.2021.3051276\">10.1109/tpami.2021.3051276</a>.","ama":"Wever MD, Tornede A, Mohr F, Hüllermeier E. AutoML for Multi-Label Classification: Overview and Empirical Evaluation. <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>. Published online 2021:1-1. doi:<a href=\"https://doi.org/10.1109/tpami.2021.3051276\">10.1109/tpami.2021.3051276</a>"},"page":"1-1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B2","_id":"10"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"_id":"21004","user_id":"5786","department":[{"_id":"34"},{"_id":"355"},{"_id":"26"}],"keyword":["Automated Machine Learning","Multi Label Classification","Hierarchical Planning","Bayesian Optimization"],"language":[{"iso":"eng"}],"type":"journal_article","publication":"IEEE Transactions on Pattern Analysis and Machine Intelligence","abstract":[{"text":"Automated machine learning (AutoML) supports the algorithmic construction and data-specific customization of machine learning pipelines, including the selection, combination, and parametrization of machine learning algorithms as main constituents. Generally speaking, AutoML approaches comprise two major components: a search space model and an optimizer for traversing the space. Recent approaches have shown impressive results in the realm of supervised learning, most notably (single-label) classification (SLC). Moreover, first attempts at extending these approaches towards multi-label classification (MLC) have been made. While the space of candidate pipelines is already huge in SLC, the complexity of the search space is raised to an even higher power in MLC. One may wonder, therefore, whether and to what extent optimizers established for SLC can scale to this increased complexity, and how they compare to each other. This paper makes the following contributions: First, we survey existing approaches to AutoML for MLC. Second, we augment these approaches with optimizers not previously tried for MLC. Third, we propose a benchmarking framework that supports a fair and systematic comparison. Fourth, we conduct an extensive experimental study, evaluating the methods on a suite of MLC problems. We find a grammar-based best-first search to compare favorably to other optimizers.","lang":"eng"}],"status":"public"},{"title":"Learning Coflow Admissions","date_created":"2021-01-16T18:24:19Z","publisher":"IEEE Communications Society","year":"2021","language":[{"iso":"eng"}],"keyword":["Coflow scheduling","Reinforcement learning","Deadlines"],"ddc":["000"],"abstract":[{"text":"Data-parallel applications are developed using different data programming models, e.g., MapReduce, partition/aggregate. These models represent diverse resource requirements of application in a datacenter network, which can be represented by the coflow abstraction. The conventional method of creating hand-crafted coflow heuristics for admission or scheduling for different workloads is practically infeasible. In this paper, we propose a deep reinforcement learning (DRL)-based coflow admission scheme -- LCS -- that can learn an admission policy for a higher-level performance objective, i.e., maximize successful coflow admissions, without manual feature engineering.  LCS is trained on a production trace, which has online coflow arrivals. The evaluation results show that LCS is able to learn a reasonable admission policy that admits more coflows than state-of-the-art Varys heuristic while meeting their deadlines.","lang":"eng"}],"publication":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","conference":{"start_date":"2021-05-10","name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","location":"Vancouver BC Canada","end_date":"2021-05-13"},"doi":"10.1109/INFOCOMWKSHPS51825.2021.9484599","main_file_link":[{"url":"https://ieeexplore.ieee.org/document/9484599"}],"author":[{"last_name":"Hasnain","id":"63288","full_name":"Hasnain, Asif","first_name":"Asif"},{"full_name":"Karl, Holger","id":"126","last_name":"Karl","first_name":"Holger"}],"date_updated":"2022-01-06T06:54:42Z","citation":{"ama":"Hasnain A, Karl H. Learning Coflow Admissions. In: <i>IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</i>. IEEE Communications Society. doi:<a href=\"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484599\">10.1109/INFOCOMWKSHPS51825.2021.9484599</a>","ieee":"A. Hasnain and H. Karl, “Learning Coflow Admissions,” in <i>IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</i>, Vancouver BC Canada.","chicago":"Hasnain, Asif, and Holger Karl. “Learning Coflow Admissions.” In <i>IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</i>. IEEE Communications Society, n.d. <a href=\"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484599\">https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484599</a>.","bibtex":"@inproceedings{Hasnain_Karl, title={Learning Coflow Admissions}, DOI={<a href=\"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484599\">10.1109/INFOCOMWKSHPS51825.2021.9484599</a>}, booktitle={IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)}, publisher={IEEE Communications Society}, author={Hasnain, Asif and Karl, Holger} }","short":"A. Hasnain, H. Karl, in: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Communications Society, n.d.","mla":"Hasnain, Asif, and Holger Karl. “Learning Coflow Admissions.” <i>IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</i>, IEEE Communications Society, doi:<a href=\"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484599\">10.1109/INFOCOMWKSHPS51825.2021.9484599</a>.","apa":"Hasnain, A., &#38; Karl, H. (n.d.). Learning Coflow Admissions. In <i>IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</i>. Vancouver BC Canada: IEEE Communications Society. <a href=\"https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484599\">https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484599</a>"},"related_material":{"link":[{"url":"https://ieeexplore.ieee.org/document/9484599","relation":"confirmation"}]},"publication_status":"accepted","department":[{"_id":"75"}],"user_id":"63288","_id":"21005","project":[{"name":"SFB 901 - Subproject C4","_id":"16"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"1","name":"SFB 901"}],"status":"public","type":"conference"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"_id":"21084","user_id":"15504","department":[{"_id":"79"}],"language":[{"iso":"eng"}],"type":"mastersthesis","status":"public","date_updated":"2022-01-06T06:54:44Z","supervisor":[{"first_name":"Christian","id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler"}],"date_created":"2021-01-26T13:58:14Z","author":[{"full_name":"Werthmann, Julian","id":"50024","last_name":"Werthmann","first_name":"Julian"}],"title":"Derandomization and Local Graph Problems in the Node-Capacitated Clique","year":"2021","citation":{"bibtex":"@book{Werthmann_2021, title={Derandomization and Local Graph Problems in the Node-Capacitated Clique}, author={Werthmann, Julian}, year={2021} }","mla":"Werthmann, Julian. <i>Derandomization and Local Graph Problems in the Node-Capacitated Clique</i>. 2021.","short":"J. Werthmann, Derandomization and Local Graph Problems in the Node-Capacitated Clique, 2021.","apa":"Werthmann, J. (2021). <i>Derandomization and Local Graph Problems in the Node-Capacitated Clique</i>.","chicago":"Werthmann, Julian. <i>Derandomization and Local Graph Problems in the Node-Capacitated Clique</i>, 2021.","ieee":"J. Werthmann, <i>Derandomization and Local Graph Problems in the Node-Capacitated Clique</i>. 2021.","ama":"Werthmann J. <i>Derandomization and Local Graph Problems in the Node-Capacitated Clique</i>.; 2021."}},{"date_updated":"2022-01-06T06:54:45Z","publisher":"IEEE","author":[{"first_name":"Felix","full_name":"Mohr, Felix","last_name":"Mohr"},{"first_name":"Marcel Dominik","orcid":" https://orcid.org/0000-0001-9782-6818","last_name":"Wever","full_name":"Wever, Marcel Dominik","id":"33176"},{"first_name":"Alexander","last_name":"Tornede","id":"38209","full_name":"Tornede, Alexander"},{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129","first_name":"Eyke"}],"date_created":"2021-01-27T13:45:52Z","title":"Predicting Machine Learning Pipeline Runtimes in the Context of Automated Machine Learning","publication_status":"accepted","year":"2021","citation":{"ieee":"F. Mohr, M. D. Wever, A. Tornede, and E. Hüllermeier, “Predicting Machine Learning Pipeline Runtimes in the Context of Automated Machine Learning,” <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>.","chicago":"Mohr, Felix, Marcel Dominik Wever, Alexander Tornede, and Eyke Hüllermeier. “Predicting Machine Learning Pipeline Runtimes in the Context of Automated Machine Learning.” <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>, n.d.","ama":"Mohr F, Wever MD, Tornede A, Hüllermeier E. Predicting Machine Learning Pipeline Runtimes in the Context of Automated Machine Learning. <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>.","apa":"Mohr, F., Wever, M. D., Tornede, A., &#38; Hüllermeier, E. (n.d.). Predicting Machine Learning Pipeline Runtimes in the Context of Automated Machine Learning. <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>.","mla":"Mohr, Felix, et al. “Predicting Machine Learning Pipeline Runtimes in the Context of Automated Machine Learning.” <i>IEEE Transactions on Pattern Analysis and Machine Intelligence</i>, IEEE.","short":"F. Mohr, M.D. Wever, A. Tornede, E. Hüllermeier, IEEE Transactions on Pattern Analysis and Machine Intelligence (n.d.).","bibtex":"@article{Mohr_Wever_Tornede_Hüllermeier, title={Predicting Machine Learning Pipeline Runtimes in the Context of Automated Machine Learning}, journal={IEEE Transactions on Pattern Analysis and Machine Intelligence}, publisher={IEEE}, author={Mohr, Felix and Wever, Marcel Dominik and Tornede, Alexander and Hüllermeier, Eyke} }"},"_id":"21092","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"10","name":"SFB 901 - Subproject B2"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"department":[{"_id":"34"},{"_id":"355"},{"_id":"26"}],"user_id":"5786","language":[{"iso":"eng"}],"publication":"IEEE Transactions on Pattern Analysis and Machine Intelligence","type":"journal_article","abstract":[{"text":"Automated Machine Learning (AutoML) seeks to automatically find so-called machine learning pipelines that maximize the prediction performance when being used to train a model on a given dataset. One of the main and yet open challenges in AutoML is an effective use of computational resources: An AutoML process involves the evaluation of many candidate pipelines, which   are costly but often ineffective because they are canceled due to a timeout.\r\nIn this paper, we present an approach to predict the runtime of two-step machine learning pipelines with up to one pre-processor, which can be used to anticipate whether or not a pipeline will time out. Separate runtime models are trained offline for each algorithm that may be used in a pipeline, and an overall prediction is derived from these models. We empirically show that the approach increases successful evaluations made by an AutoML tool while preserving or even improving on the previously best solutions.","lang":"eng"}],"status":"public"},{"language":[{"iso":"eng"}],"department":[{"_id":"79"}],"user_id":"15504","_id":"21197","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject A1","_id":"5"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"status":"public","type":"bachelorsthesis","title":"Self-stabilizing Arrow Protocol on Spanning Trees with a Low Diameter","date_created":"2021-02-09T07:09:22Z","supervisor":[{"full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler","first_name":"Christian"}],"author":[{"first_name":"Ma","last_name":"Mengshi","full_name":"Mengshi, Ma"}],"date_updated":"2022-01-06T06:54:49Z","citation":{"ama":"Mengshi M. <i>Self-Stabilizing Arrow Protocol on Spanning Trees with a Low Diameter</i>.; 2021.","chicago":"Mengshi, Ma. <i>Self-Stabilizing Arrow Protocol on Spanning Trees with a Low Diameter</i>, 2021.","ieee":"M. Mengshi, <i>Self-stabilizing Arrow Protocol on Spanning Trees with a Low Diameter</i>. 2021.","bibtex":"@book{Mengshi_2021, title={Self-stabilizing Arrow Protocol on Spanning Trees with a Low Diameter}, author={Mengshi, Ma}, year={2021} }","mla":"Mengshi, Ma. <i>Self-Stabilizing Arrow Protocol on Spanning Trees with a Low Diameter</i>. 2021.","short":"M. Mengshi, Self-Stabilizing Arrow Protocol on Spanning Trees with a Low Diameter, 2021.","apa":"Mengshi, M. (2021). <i>Self-stabilizing Arrow Protocol on Spanning Trees with a Low Diameter</i>."},"year":"2021"},{"publication_status":"published","issue":"2","year":"2021","page":"120-131","intvolume":"        13","citation":{"ama":"Lüttenberg H, Beverungen D, Poniatowski M, Kundisch D, Wünderlich N. Drei Strategien zur Etablierung digitaler Plattformen in der Industrie. <i>Wirtschaftsinformatik &#38; Management</i>. 2021;13(2):120-131.","ieee":"H. Lüttenberg, D. Beverungen, M. Poniatowski, D. Kundisch, and N. Wünderlich, “Drei Strategien zur Etablierung digitaler Plattformen in der Industrie,” <i>Wirtschaftsinformatik &#38; Management</i>, vol. 13, no. 2, pp. 120–131, 2021.","chicago":"Lüttenberg, Hedda, Daniel Beverungen, Martin Poniatowski, Dennis Kundisch, and Nancy Wünderlich. “Drei Strategien zur Etablierung digitaler Plattformen in der Industrie.” <i>Wirtschaftsinformatik &#38; Management</i> 13, no. 2 (2021): 120–31.","apa":"Lüttenberg, H., Beverungen, D., Poniatowski, M., Kundisch, D., &#38; Wünderlich, N. (2021). Drei Strategien zur Etablierung digitaler Plattformen in der Industrie. <i>Wirtschaftsinformatik &#38; Management</i>, <i>13</i>(2), 120–131.","short":"H. Lüttenberg, D. Beverungen, M. Poniatowski, D. Kundisch, N. Wünderlich, Wirtschaftsinformatik &#38; Management 13 (2021) 120–131.","bibtex":"@article{Lüttenberg_Beverungen_Poniatowski_Kundisch_Wünderlich_2021, title={Drei Strategien zur Etablierung digitaler Plattformen in der Industrie}, volume={13}, number={2}, journal={Wirtschaftsinformatik &#38; Management}, author={Lüttenberg, Hedda and Beverungen, Daniel and Poniatowski, Martin and Kundisch, Dennis and Wünderlich, Nancy}, year={2021}, pages={120–131} }","mla":"Lüttenberg, Hedda, et al. “Drei Strategien zur Etablierung digitaler Plattformen in der Industrie.” <i>Wirtschaftsinformatik &#38; Management</i>, vol. 13, no. 2, 2021, pp. 120–31."},"date_updated":"2022-01-06T06:54:51Z","volume":13,"date_created":"2021-02-16T13:33:57Z","author":[{"first_name":"Hedda","full_name":"Lüttenberg, Hedda","id":"60612","last_name":"Lüttenberg"},{"first_name":"Daniel","last_name":"Beverungen","id":"59677","full_name":"Beverungen, Daniel"},{"first_name":"Martin","last_name":"Poniatowski","full_name":"Poniatowski, Martin","id":"32441"},{"first_name":"Dennis","last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis"},{"first_name":"Nancy","full_name":"Wünderlich, Nancy","id":"36392","last_name":"Wünderlich"}],"title":"Drei Strategien zur Etablierung digitaler Plattformen in der Industrie","publication":"Wirtschaftsinformatik & Management","type":"journal_article","status":"public","_id":"21242","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"},{"_id":"97","name":"its OWL - Digital Business"}],"department":[{"_id":"276"}],"user_id":"477","language":[{"iso":"ger"}]},{"author":[{"first_name":"Dominik","last_name":"Gutt","full_name":"Gutt, Dominik"},{"last_name":"Neumann","id":"32456","full_name":"Neumann, Jürgen","first_name":"Jürgen"},{"full_name":"Jabr, Wael","last_name":"Jabr","first_name":"Wael"},{"id":"21117","full_name":"Kundisch, Dennis","last_name":"Kundisch","first_name":"Dennis"}],"date_created":"2021-03-17T13:11:24Z","date_updated":"2022-01-06T06:55:03Z","conference":{"location":"Virtual Conference/Workshop","name":"Sixth Workshop on Information System Design and Economic Behavior (ISDEB 2021)"},"title":"The Fate of the App: Economic Implications of Updating under Reputation Resetting","citation":{"ama":"Gutt D, Neumann J, Jabr W, Kundisch D. The Fate of the App: Economic Implications of Updating under Reputation Resetting. In: ; 2021.","ieee":"D. Gutt, J. Neumann, W. Jabr, and D. Kundisch, “The Fate of the App: Economic Implications of Updating under Reputation Resetting,” presented at the Sixth Workshop on Information System Design and Economic Behavior (ISDEB 2021), Virtual Conference/Workshop, 2021.","chicago":"Gutt, Dominik, Jürgen Neumann, Wael Jabr, and Dennis Kundisch. “The Fate of the App: Economic Implications of Updating under Reputation Resetting,” 2021.","bibtex":"@inproceedings{Gutt_Neumann_Jabr_Kundisch_2021, title={The Fate of the App: Economic Implications of Updating under Reputation Resetting}, author={Gutt, Dominik and Neumann, Jürgen and Jabr, Wael and Kundisch, Dennis}, year={2021} }","short":"D. Gutt, J. Neumann, W. Jabr, D. Kundisch, in: 2021.","mla":"Gutt, Dominik, et al. <i>The Fate of the App: Economic Implications of Updating under Reputation Resetting</i>. 2021.","apa":"Gutt, D., Neumann, J., Jabr, W., &#38; Kundisch, D. (2021). The Fate of the App: Economic Implications of Updating under Reputation Resetting. Presented at the Sixth Workshop on Information System Design and Economic Behavior (ISDEB 2021), Virtual Conference/Workshop."},"year":"2021","department":[{"_id":"276"}],"user_id":"477","_id":"21525","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A4","_id":"8"}],"language":[{"iso":"eng"}],"type":"conference","status":"public"},{"type":"conference","status":"public","_id":"21543","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"department":[{"_id":"75"}],"user_id":"35343","file_date_updated":"2021-03-18T17:12:56Z","has_accepted_license":"1","related_material":{"link":[{"url":"https://github.com/ RealVNF/distributed-drl-coordination","relation":"software"}]},"citation":{"apa":"Schneider, S. B., Qarawlus, H., &#38; Karl, H. (2021). Distributed Online Service Coordination Using Deep Reinforcement Learning. In <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>. Washington, DC, USA: IEEE.","short":"S.B. Schneider, H. Qarawlus, H. Karl, in: IEEE International Conference on Distributed Computing Systems (ICDCS), IEEE, 2021.","bibtex":"@inproceedings{Schneider_Qarawlus_Karl_2021, title={Distributed Online Service Coordination Using Deep Reinforcement Learning}, booktitle={IEEE International Conference on Distributed Computing Systems (ICDCS)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Qarawlus, Haydar and Karl, Holger}, year={2021} }","mla":"Schneider, Stefan Balthasar, et al. “Distributed Online Service Coordination Using Deep Reinforcement Learning.” <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>, IEEE, 2021.","chicago":"Schneider, Stefan Balthasar, Haydar Qarawlus, and Holger Karl. “Distributed Online Service Coordination Using Deep Reinforcement Learning.” In <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>. IEEE, 2021.","ieee":"S. B. Schneider, H. Qarawlus, and H. Karl, “Distributed Online Service Coordination Using Deep Reinforcement Learning,” in <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>, Washington, DC, USA, 2021.","ama":"Schneider SB, Qarawlus H, Karl H. Distributed Online Service Coordination Using Deep Reinforcement Learning. In: <i>IEEE International Conference on Distributed Computing Systems (ICDCS)</i>. IEEE; 2021."},"date_updated":"2022-01-06T06:55:04Z","oa":"1","author":[{"last_name":"Schneider","orcid":"0000-0001-8210-4011","id":"35343","full_name":"Schneider, Stefan Balthasar","first_name":"Stefan Balthasar"},{"first_name":"Haydar","last_name":"Qarawlus","full_name":"Qarawlus, Haydar"},{"full_name":"Karl, Holger","id":"126","last_name":"Karl","first_name":"Holger"}],"conference":{"location":"Washington, DC, USA","name":"IEEE International Conference on Distributed Computing Systems (ICDCS)"},"publication":"IEEE International Conference on Distributed Computing Systems (ICDCS)","abstract":[{"text":"Services often consist of multiple chained components such as microservices in a service mesh, or machine learning functions in a pipeline. Providing these services requires online coordination including scaling the service, placing instance of all components in the network, scheduling traffic to these instances, and routing traffic through the network. Optimized service coordination is still a hard problem due to many influencing factors such as rapidly arriving user demands and limited node and link capacity. Existing approaches to solve the problem are often built on rigid models and assumptions, tailored to specific scenarios. If the scenario changes and the assumptions no longer hold, they easily break and require manual adjustments by experts. Novel self-learning approaches using deep reinforcement learning (DRL) are promising but still have limitations as they only address simplified versions of the problem and are typically centralized and thus do not scale to practical large-scale networks.\r\n\r\nTo address these issues, we propose a distributed self-learning service coordination approach using DRL. After centralized training, we deploy a distributed DRL agent at each node in the network, making fast coordination decisions locally in parallel with the other nodes. Each agent only observes its direct neighbors and does not need global knowledge. Hence, our approach scales independently from the size of the network. In our extensive evaluation using real-world network topologies and traffic traces, we show that our proposed approach outperforms a state-of-the-art conventional heuristic as well as a centralized DRL approach (60% higher throughput on average) while requiring less time per online decision (1 ms).","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_id":"21544","file_name":"public_author_version.pdf","access_level":"open_access","file_size":606321,"title":"Distributed Online Service Coordination Using Deep Reinforcement Learning","date_created":"2021-03-18T17:12:56Z","creator":"stschn","date_updated":"2021-03-18T17:12:56Z"}],"keyword":["network management","service management","coordination","reinforcement learning","distributed"],"ddc":["000"],"language":[{"iso":"eng"}],"year":"2021","publisher":"IEEE","date_created":"2021-03-18T17:15:47Z","title":"Distributed Online Service Coordination Using Deep Reinforcement Learning"},{"year":"2021","citation":{"chicago":"Gottschalk, Sebastian, and Enes Yigitbas. <i>Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung</i>. Vol. 1. WI-MAW-Rundbrief. Gesellschaft für Informatik, 2021.","ieee":"S. Gottschalk and E. Yigitbas, <i>Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung</i>, vol. 1. Gesellschaft für Informatik, 2021.","ama":"Gottschalk S, Yigitbas E. <i>Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung</i>. Vol 1. Gesellschaft für Informatik; 2021.","short":"S. Gottschalk, E. Yigitbas, Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung, Gesellschaft für Informatik, 2021.","bibtex":"@book{Gottschalk_Yigitbas_2021, series={WI-MAW-Rundbrief}, title={Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung}, volume={1}, publisher={Gesellschaft für Informatik}, author={Gottschalk, Sebastian and Yigitbas, Enes}, year={2021}, collection={WI-MAW-Rundbrief} }","mla":"Gottschalk, Sebastian, and Enes Yigitbas. <i>Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung</i>. Vol. 1, Gesellschaft für Informatik, 2021.","apa":"Gottschalk, S., &#38; Yigitbas, E. (2021). <i>Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung</i> (Vol. 1). Gesellschaft für Informatik."},"intvolume":"         1","publication_identifier":{"unknown":["1610-5753"]},"title":"Von datenbasierter zu datengetriebener Geschäftsmodellentwicklung: Ein Überblick über Software-Tools  und deren Datennutzung","main_file_link":[{"url":"https://fa-wi-maw.gi.de/fileadmin/FA/WI-MAW/Rundbriefe/3037624_GI_45_Rundbrief_JG27.pdf","open_access":"1"}],"oa":"1","publisher":"Gesellschaft für Informatik","date_updated":"2022-01-06T06:55:06Z","date_created":"2021-03-25T10:02:18Z","author":[{"last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208","first_name":"Sebastian"},{"full_name":"Yigitbas, Enes","id":"8447","orcid":"0000-0002-5967-833X","last_name":"Yigitbas","first_name":"Enes"}],"volume":1,"abstract":[{"text":"Die kontinuierliche Weiterentwicklung des eigenen Geschäftsmodells ist für eine Organisation von entscheidender Bedeutung, um wettbewerbsfähig und somit nachhaltig erfolgreich zu bleiben. Während für die Entwicklung neuer Geschäftsmodelle häufig Workshops und einfache Software-Tools zur Visualisierung genutzt werden, wurden in der Forschung bereits erste Ansätze von datengetriebener Geschäftsmodellentwicklung (GME) vorgestellt. Diese Ansätze nutzen dabei Daten, Informationen oder auch Wissen aus internen und externen Unternehmensquellen, um den GME-Prozess zu unterstützen. Innerhalb dieses Beitrags zeigen wir einige Ansätze aus der aktuellen Literatur und analysieren wie ihre Datennutzung den GME-Prozess unterstützt. Weiterhin stellen wir mit dem BMDL Feature Modeler ein Tool vor, welches den GME-Prozess mit Expertenwissen unterstützt.","lang":"eng"}],"status":"public","type":"report","language":[{"iso":"ger"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"21569","series_title":"WI-MAW-Rundbrief","user_id":"47208","department":[{"_id":"66"},{"_id":"534"}]},{"user_id":"5786","department":[{"_id":"34"},{"_id":"355"},{"_id":"26"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"10","name":"SFB 901 - Subproject B2"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"_id":"21570","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the Genetic and Evolutionary Computation Conference","status":"public","author":[{"first_name":"Tanja","last_name":"Tornede","id":"40795","full_name":"Tornede, Tanja"},{"first_name":"Alexander","id":"38209","full_name":"Tornede, Alexander","last_name":"Tornede"},{"first_name":"Marcel Dominik","last_name":"Wever","orcid":" https://orcid.org/0000-0001-9782-6818","full_name":"Wever, Marcel Dominik","id":"33176"},{"first_name":"Eyke","id":"48129","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier"}],"date_created":"2021-03-26T09:14:19Z","date_updated":"2022-01-06T06:55:06Z","conference":{"end_date":"2021-07-14","name":"Genetic and Evolutionary Computation Conference","start_date":"2021-07-10"},"title":"Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance","citation":{"bibtex":"@inproceedings{Tornede_Tornede_Wever_Hüllermeier_2021, title={Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference}, author={Tornede, Tanja and Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}, year={2021} }","short":"T. Tornede, A. Tornede, M.D. Wever, E. Hüllermeier, in: Proceedings of the Genetic and Evolutionary Computation Conference, 2021.","mla":"Tornede, Tanja, et al. “Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance.” <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>, 2021.","apa":"Tornede, T., Tornede, A., Wever, M. D., &#38; Hüllermeier, E. (2021). Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance. <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>. Genetic and Evolutionary Computation Conference.","ieee":"T. Tornede, A. Tornede, M. D. Wever, and E. Hüllermeier, “Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance,” presented at the Genetic and Evolutionary Computation Conference, 2021.","chicago":"Tornede, Tanja, Alexander Tornede, Marcel Dominik Wever, and Eyke Hüllermeier. “Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>, 2021.","ama":"Tornede T, Tornede A, Wever MD, Hüllermeier E. Coevolution of Remaining Useful Lifetime Estimation Pipelines for Automated Predictive Maintenance. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference</i>. ; 2021."},"year":"2021"},{"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"_id":"21628","user_id":"23538","department":[{"_id":"79"}],"ddc":["006"],"file_date_updated":"2021-04-15T08:21:15Z","language":[{"iso":"eng"}],"type":"dissertation","abstract":[{"lang":"eng","text":"This thesis considers the realization of distributed data structures and the construction of distributed protocols for self-stabilizing overlay networks.\r\n\r\nIn the first part of this thesis, we provide distributed protocols for queues, stacks and priority queues that serve the insertion and deletion of elements within a logarithmic amount of rounds.\r\nOur protocols respect semantic constraints such as sequential consistency or serializability and the individual semantic constraints given by the type (queue, stack, priority queue) of the data structure.\r\nWe furthermore provide a protocol that handles joining and leaving nodes.\r\nAs an important side product, we present a novel protocol solving the distributed $k$-selection problem in a logarithmic amount of rounds, that is, to find the $k$-smallest elements among a polynomial number of elements spread among $n$ nodes.\r\n\t\r\nThe second part of this thesis is devoted to the construction of protocols for self-stabilizing overlay networks, i.e., distributed protocols that transform an overlay network from any initial (potentially illegitimate) state into a legitimate state in finite time.\r\nWe present protocols for self-stabilizing generalized De Bruijn graphs, self-stabilizing quadtrees and self-stabilizing supervised skip rings.\r\nEach of those protocols comes with unique properties that makes it interesting for certain distributed applications.\r\nGeneralized De Bruijn networks provide routing within a constant amount of hops, thus serving the interest in networks that require a low latency for requests.\r\nThe protocol for the quadtree guarantees monotonic searchability as well as a geometric variant of monotonic searchability, making it interesting for wireless networks or applications needed in the area of computational geometry.\r\nThe supervised skip ring can be used to construct a self-stabilizing publish-subscribe system.\r\n"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2021-04-15T08:21:15Z","creator":"mfeldma2","date_updated":"2021-04-15T08:21:15Z","file_name":"Dissertation_Michael_Feldmann.pdf","access_level":"closed","file_id":"21629","file_size":2617069}],"status":"public","date_updated":"2022-01-06T06:55:08Z","date_created":"2021-04-15T08:23:52Z","supervisor":[{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"author":[{"first_name":"Michael","id":"23538","full_name":"Feldmann, Michael","last_name":"Feldmann"}],"title":"Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks","doi":"10.17619/UNIPB/1-1113","has_accepted_license":"1","year":"2021","citation":{"apa":"Feldmann, M. (2021). <i>Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1113\">https://doi.org/10.17619/UNIPB/1-1113</a>","mla":"Feldmann, Michael. <i>Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks</i>. 2021, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1113\">10.17619/UNIPB/1-1113</a>.","bibtex":"@book{Feldmann_2021, title={Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1113\">10.17619/UNIPB/1-1113</a>}, author={Feldmann, Michael}, year={2021} }","short":"M. Feldmann, Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks, 2021.","chicago":"Feldmann, Michael. <i>Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks</i>, 2021. <a href=\"https://doi.org/10.17619/UNIPB/1-1113\">https://doi.org/10.17619/UNIPB/1-1113</a>.","ieee":"M. Feldmann, <i>Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks</i>. 2021.","ama":"Feldmann M. <i>Algorithms for Distributed Data Structures and Self-Stabilizing Overlay Networks</i>.; 2021. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1113\">10.17619/UNIPB/1-1113</a>"}}]
