[{"title":"Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump","date_updated":"2023-07-05T07:32:18Z","date_created":"2023-06-27T12:54:30Z","author":[{"last_name":"Bülling","full_name":"Bülling, Jonas","first_name":"Jonas"}],"supervisor":[{"full_name":"Wachsmuth, Henning","id":"3900","last_name":"Wachsmuth","first_name":"Henning"}],"year":"2021","citation":{"chicago":"Bülling, Jonas. <i>Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump</i>, 2021.","ieee":"J. Bülling, <i>Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump</i>. 2021.","ama":"Bülling J. <i>Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump</i>.; 2021.","mla":"Bülling, Jonas. <i>Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump</i>. 2021.","short":"J. Bülling, Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump, 2021.","bibtex":"@book{Bülling_2021, title={Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump}, author={Bülling, Jonas}, year={2021} }","apa":"Bülling, J. (2021). <i>Political Speaker Transfer: Learning to Generate Text in the Styles of Barack Obama and Donald Trump</i>."},"language":[{"iso":"eng"}],"project":[{"grant_number":"160364472","name":"SFB 901 - B1: SFB 901 - Parametrisierte Servicespezifikation (Subproject B1)","_id":"9"},{"name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","_id":"1","grant_number":"160364472"},{"name":"SFB 901 - B: SFB 901 - Project Area B","_id":"3"}],"_id":"45788","user_id":"477","department":[{"_id":"600"}],"status":"public","type":"mastersthesis"},{"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"45787","project":[{"grant_number":"160364472","_id":"9","name":"SFB 901 - B1: SFB 901 - Parametrisierte Servicespezifikation (Subproject B1)"},{"grant_number":"160364472","_id":"1","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten "},{"name":"SFB 901 - B: SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"600"}],"user_id":"477","year":"2021","citation":{"ama":"Mishra A. <i>Computational Text Professionalization Using Neural Sequence-to-Sequence Models</i>.; 2021.","chicago":"Mishra, Avishek. <i>Computational Text Professionalization Using Neural Sequence-to-Sequence Models</i>, 2021.","ieee":"A. Mishra, <i>Computational Text Professionalization using Neural Sequence-to-Sequence Models</i>. 2021.","apa":"Mishra, A. (2021). <i>Computational Text Professionalization using Neural Sequence-to-Sequence Models</i>.","bibtex":"@book{Mishra_2021, title={Computational Text Professionalization using Neural Sequence-to-Sequence Models}, author={Mishra, Avishek}, year={2021} }","mla":"Mishra, Avishek. <i>Computational Text Professionalization Using Neural Sequence-to-Sequence Models</i>. 2021.","short":"A. Mishra, Computational Text Professionalization Using Neural Sequence-to-Sequence Models, 2021."},"title":"Computational Text Professionalization using Neural Sequence-to-Sequence Models","date_updated":"2023-07-05T07:32:50Z","date_created":"2023-06-27T12:51:08Z","supervisor":[{"last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","id":"3900","first_name":"Henning"}],"author":[{"last_name":"Mishra","full_name":"Mishra, Avishek","first_name":"Avishek"}]},{"doi":"10.1145/3468044.3468056","title":"ReconOS64: High-Performance Embedded Computing for Industrial Analytics on a Reconfigurable System-on-Chip","author":[{"first_name":"Lennart","id":"74287","full_name":"Clausing, Lennart","orcid":"0000-0003-3789-6034","last_name":"Clausing"}],"date_created":"2022-04-18T10:17:47Z","date_updated":"2023-07-09T13:09:11Z","publisher":"ACM","citation":{"chicago":"Clausing, Lennart. “ReconOS64: High-Performance Embedded Computing for Industrial Analytics on a Reconfigurable System-on-Chip.” In <i>Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies</i>. ACM, 2021. <a href=\"https://doi.org/10.1145/3468044.3468056\">https://doi.org/10.1145/3468044.3468056</a>.","ieee":"L. Clausing, “ReconOS64: High-Performance Embedded Computing for Industrial Analytics on a Reconfigurable System-on-Chip,” 2021, doi: <a href=\"https://doi.org/10.1145/3468044.3468056\">10.1145/3468044.3468056</a>.","ama":"Clausing L. ReconOS64: High-Performance Embedded Computing for Industrial Analytics on a Reconfigurable System-on-Chip. In: <i>Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies</i>. ACM; 2021. doi:<a href=\"https://doi.org/10.1145/3468044.3468056\">10.1145/3468044.3468056</a>","apa":"Clausing, L. (2021). ReconOS64: High-Performance Embedded Computing for Industrial Analytics on a Reconfigurable System-on-Chip. <i>Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies</i>. <a href=\"https://doi.org/10.1145/3468044.3468056\">https://doi.org/10.1145/3468044.3468056</a>","bibtex":"@inproceedings{Clausing_2021, title={ReconOS64: High-Performance Embedded Computing for Industrial Analytics on a Reconfigurable System-on-Chip}, DOI={<a href=\"https://doi.org/10.1145/3468044.3468056\">10.1145/3468044.3468056</a>}, booktitle={Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies}, publisher={ACM}, author={Clausing, Lennart}, year={2021} }","short":"L. Clausing, in: Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies, ACM, 2021.","mla":"Clausing, Lennart. “ReconOS64: High-Performance Embedded Computing for Industrial Analytics on a Reconfigurable System-on-Chip.” <i>Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies</i>, ACM, 2021, doi:<a href=\"https://doi.org/10.1145/3468044.3468056\">10.1145/3468044.3468056</a>."},"year":"2021","publication_status":"published","language":[{"iso":"eng"}],"user_id":"398","department":[{"_id":"78"}],"project":[{"_id":"83","name":"SFB 901 - T1: SFB 901 -Subproject T1"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"},{"grant_number":"160364472","_id":"1","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten "}],"_id":"30909","status":"public","type":"conference","publication":"Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies"},{"date_updated":"2023-09-15T15:09:07Z","publisher":"Springer","author":[{"first_name":"Hassan","last_name":"Ghasemzadeh Mohammadi","full_name":"Ghasemzadeh Mohammadi, Hassan","id":"61186"},{"first_name":"Felix","orcid":"0000-0003-4987-5708","last_name":"Jentzsch","full_name":"Jentzsch, Felix","id":"55631"},{"last_name":"Kuschel","full_name":"Kuschel, Maurice","first_name":"Maurice"},{"last_name":"Arshad","full_name":"Arshad, Rahil ","first_name":"Rahil "},{"last_name":"Rautmare","full_name":"Rautmare, Sneha","first_name":"Sneha"},{"first_name":"Suraj","full_name":"Manjunatha, Suraj","last_name":"Manjunatha"},{"last_name":"Platzner","full_name":"Platzner, Marco","id":"398","first_name":"Marco"},{"first_name":"Alexander","full_name":"Boschmann, Alexander","last_name":"Boschmann"},{"first_name":"Dirk ","last_name":"Schollbach","full_name":"Schollbach, Dirk "}],"date_created":"2022-04-18T10:16:55Z","title":"FLight: FPGA Acceleration of Lightweight DNN Model Inference in Industrial Analytics","doi":"https://doi.org/10.1007/978-3-030-93736-2_27","year":"2021","citation":{"ama":"Ghasemzadeh Mohammadi H, Jentzsch F, Kuschel M, et al. FLight: FPGA Acceleration of Lightweight DNN Model Inference in Industrial Analytics. In: <i> Machine Learning and Principles and Practice of Knowledge Discovery in Databases</i>. Springer; 2021. doi:<a href=\"https://doi.org/10.1007/978-3-030-93736-2_27\">https://doi.org/10.1007/978-3-030-93736-2_27</a>","ieee":"H. Ghasemzadeh Mohammadi <i>et al.</i>, “FLight: FPGA Acceleration of Lightweight DNN Model Inference in Industrial Analytics,” 2021, doi: <a href=\"https://doi.org/10.1007/978-3-030-93736-2_27\">https://doi.org/10.1007/978-3-030-93736-2_27</a>.","chicago":"Ghasemzadeh Mohammadi, Hassan, Felix Jentzsch, Maurice Kuschel, Rahil  Arshad, Sneha Rautmare, Suraj Manjunatha, Marco Platzner, Alexander Boschmann, and Dirk  Schollbach. “FLight: FPGA Acceleration of Lightweight DNN Model Inference in Industrial Analytics.” In <i> Machine Learning and Principles and Practice of Knowledge Discovery in Databases</i>. Springer, 2021. <a href=\"https://doi.org/10.1007/978-3-030-93736-2_27\">https://doi.org/10.1007/978-3-030-93736-2_27</a>.","mla":"Ghasemzadeh Mohammadi, Hassan, et al. “FLight: FPGA Acceleration of Lightweight DNN Model Inference in Industrial Analytics.” <i> Machine Learning and Principles and Practice of Knowledge Discovery in Databases</i>, Springer, 2021, doi:<a href=\"https://doi.org/10.1007/978-3-030-93736-2_27\">https://doi.org/10.1007/978-3-030-93736-2_27</a>.","bibtex":"@inproceedings{Ghasemzadeh Mohammadi_Jentzsch_Kuschel_Arshad_Rautmare_Manjunatha_Platzner_Boschmann_Schollbach_2021, title={FLight: FPGA Acceleration of Lightweight DNN Model Inference in Industrial Analytics}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-93736-2_27\">https://doi.org/10.1007/978-3-030-93736-2_27</a>}, booktitle={ Machine Learning and Principles and Practice of Knowledge Discovery in Databases}, publisher={Springer}, author={Ghasemzadeh Mohammadi, Hassan and Jentzsch, Felix and Kuschel, Maurice and Arshad, Rahil  and Rautmare, Sneha and Manjunatha, Suraj and Platzner, Marco and Boschmann, Alexander and Schollbach, Dirk }, year={2021} }","short":"H. Ghasemzadeh Mohammadi, F. Jentzsch, M. Kuschel, R. Arshad, S. Rautmare, S. Manjunatha, M. Platzner, A. Boschmann, D. Schollbach, in:  Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Springer, 2021.","apa":"Ghasemzadeh Mohammadi, H., Jentzsch, F., Kuschel, M., Arshad, R., Rautmare, S., Manjunatha, S., Platzner, M., Boschmann, A., &#38; Schollbach, D. (2021). FLight: FPGA Acceleration of Lightweight DNN Model Inference in Industrial Analytics. <i> Machine Learning and Principles and Practice of Knowledge Discovery in Databases</i>. <a href=\"https://doi.org/10.1007/978-3-030-93736-2_27\">https://doi.org/10.1007/978-3-030-93736-2_27</a>"},"project":[{"_id":"83","name":"SFB 901 - T1: SFB 901 -Subproject T1"},{"name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","_id":"1","grant_number":"160364472"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"}],"_id":"30908","user_id":"477","department":[{"_id":"78"}],"language":[{"iso":"eng"}],"type":"conference","publication":" Machine Learning and Principles and Practice of Knowledge Discovery in Databases","status":"public"},{"citation":{"ieee":"M. Alshomary, W.-F. Chen, T. Gurcke, and H. Wachsmuth, “Belief-based Generation of Argumentative Claims,” in <i>Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume</i>, Online, 2021, pp. 224–233, doi: <a href=\"https://doi.org/10.18653/v1/2021.eacl-main.17\">10.18653/v1/2021.eacl-main.17</a>.","chicago":"Alshomary, Milad, Wei-Fan Chen, Timon Gurcke, and Henning Wachsmuth. “Belief-Based Generation of Argumentative Claims.” In <i>Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume</i>, 224–33. Association for Computational Linguistics, 2021. <a href=\"https://doi.org/10.18653/v1/2021.eacl-main.17\">https://doi.org/10.18653/v1/2021.eacl-main.17</a>.","ama":"Alshomary M, Chen W-F, Gurcke T, Wachsmuth H. Belief-based Generation of Argumentative Claims. In: <i>Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume</i>. Association for Computational Linguistics; 2021:224-233. doi:<a href=\"https://doi.org/10.18653/v1/2021.eacl-main.17\">10.18653/v1/2021.eacl-main.17</a>","bibtex":"@inproceedings{Alshomary_Chen_Gurcke_Wachsmuth_2021, title={Belief-based Generation of Argumentative Claims}, DOI={<a href=\"https://doi.org/10.18653/v1/2021.eacl-main.17\">10.18653/v1/2021.eacl-main.17</a>}, booktitle={Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume}, publisher={Association for Computational Linguistics}, author={Alshomary, Milad and Chen, Wei-Fan and Gurcke, Timon and Wachsmuth, Henning}, year={2021}, pages={224–233} }","short":"M. Alshomary, W.-F. Chen, T. Gurcke, H. Wachsmuth, in: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, Association for Computational Linguistics, 2021, pp. 224–233.","mla":"Alshomary, Milad, et al. “Belief-Based Generation of Argumentative Claims.” <i>Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume</i>, Association for Computational Linguistics, 2021, pp. 224–33, doi:<a href=\"https://doi.org/10.18653/v1/2021.eacl-main.17\">10.18653/v1/2021.eacl-main.17</a>.","apa":"Alshomary, M., Chen, W.-F., Gurcke, T., &#38; Wachsmuth, H. (2021). Belief-based Generation of Argumentative Claims. <i>Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume</i>, 224–233. <a href=\"https://doi.org/10.18653/v1/2021.eacl-main.17\">https://doi.org/10.18653/v1/2021.eacl-main.17</a>"},"page":"224-233","year":"2021","main_file_link":[{"url":"https://www.aclweb.org/anthology/2021.eacl-main.17"}],"doi":"10.18653/v1/2021.eacl-main.17","conference":{"location":"Online","name":"Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume"},"title":"Belief-based Generation of Argumentative Claims","date_created":"2021-02-05T08:00:07Z","author":[{"last_name":"Alshomary","id":"73059","full_name":"Alshomary, Milad","first_name":"Milad"},{"last_name":"Chen","full_name":"Chen, Wei-Fan","id":"82920","first_name":"Wei-Fan"},{"full_name":"Gurcke, Timon","id":"52174","last_name":"Gurcke","first_name":"Timon"},{"last_name":"Wachsmuth","full_name":"Wachsmuth, Henning","id":"3900","first_name":"Henning"}],"publisher":"Association for Computational Linguistics","date_updated":"2026-02-23T16:06:41Z","status":"public","abstract":[{"lang":"eng","text":"When engaging in argumentative discourse, skilled human debaters tailor\r\nclaims to the beliefs of the audience, to construct effective arguments.\r\nRecently, the field of computational argumentation witnessed extensive effort\r\nto address the automatic generation of arguments. However, existing approaches\r\ndo not perform any audience-specific adaptation. In this work, we aim to bridge\r\nthis gap by studying the task of belief-based claim generation: Given a\r\ncontroversial topic and a set of beliefs, generate an argumentative claim\r\ntailored to the beliefs. To tackle this task, we model the people's prior\r\nbeliefs through their stances on controversial topics and extend\r\nstate-of-the-art text generation models to generate claims conditioned on the\r\nbeliefs. Our automatic evaluation confirms the ability of our approach to adapt\r\nclaims to a set of given beliefs. In a manual study, we additionally evaluate\r\nthe generated claims in terms of informativeness and their likelihood to be\r\nuttered by someone with a respective belief. Our results reveal the limitations\r\nof modeling users' beliefs based on their stances, but demonstrate the\r\npotential of encoding beliefs into argumentative texts, laying the ground for\r\nfuture exploration of audience reach."}],"type":"conference","publication":"Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume","language":[{"iso":"eng"}],"user_id":"14972","department":[{"_id":"600"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - B: SFB 901 - Project Area B","_id":"3"},{"_id":"9","name":"SFB 901 - B1: SFB 901 - Subproject B1"}],"_id":"21178"},{"_id":"22014","project":[{"grant_number":"160364472","name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"grant_number":"160364472","name":"SFB 901 - Subproject A4","_id":"8"}],"department":[{"_id":"276"}],"user_id":"50286","language":[{"iso":"eng"}],"type":"conference_abstract","status":"public","publisher":"Proceedings of the International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021)","date_updated":"2024-12-03T12:23:06Z","author":[{"first_name":"Janina","id":"64464","full_name":"Seutter, Janina","last_name":"Seutter"},{"first_name":"Michelle","last_name":"Müller","id":"50286","full_name":"Müller, Michelle"},{"full_name":"Neumann, Jürgen","id":"32456","last_name":"Neumann","first_name":"Jürgen"},{"first_name":"Dennis","last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis"}],"date_created":"2021-05-07T09:59:29Z","title":"Do Smart Product Service Systems Crowd Out Interactions in Online Communities? – Empirical Evidence from a Cooking Community","conference":{"name":"International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021)","location":"Virtual Conference/Workshop"},"publication_status":"accepted","year":"2021","citation":{"ama":"Seutter J, Müller M, Neumann J, Kundisch D. Do Smart Product Service Systems Crowd Out Interactions in Online Communities? – Empirical Evidence from a Cooking Community. In: Proceedings of the International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021).","chicago":"Seutter, Janina, Michelle Müller, Jürgen Neumann, and Dennis Kundisch. “Do Smart Product Service Systems Crowd Out Interactions in Online Communities? – Empirical Evidence from a Cooking Community.” Proceedings of the International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021), n.d.","ieee":"J. Seutter, M. Müller, J. Neumann, and D. Kundisch, “Do Smart Product Service Systems Crowd Out Interactions in Online Communities? – Empirical Evidence from a Cooking Community,” presented at the International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021), Virtual Conference/Workshop.","mla":"Seutter, Janina, et al. <i>Do Smart Product Service Systems Crowd Out Interactions in Online Communities? – Empirical Evidence from a Cooking Community</i>. Proceedings of the International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021).","bibtex":"@inproceedings{Seutter_Müller_Neumann_Kundisch, title={Do Smart Product Service Systems Crowd Out Interactions in Online Communities? – Empirical Evidence from a Cooking Community}, publisher={Proceedings of the International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021)}, author={Seutter, Janina and Müller, Michelle and Neumann, Jürgen and Kundisch, Dennis} }","short":"J. Seutter, M. Müller, J. Neumann, D. Kundisch, in: Proceedings of the International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021), n.d.","apa":"Seutter, J., Müller, M., Neumann, J., &#38; Kundisch, D. (n.d.). <i>Do Smart Product Service Systems Crowd Out Interactions in Online Communities? – Empirical Evidence from a Cooking Community</i>. International Conference on Challenges in Managing Smart Products and Services (CHIMSPAS 2021), Virtual Conference/Workshop."}},{"status":"public","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"276"}],"user_id":"50286","_id":"23411","project":[{"grant_number":"160364472","_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A4","_id":"8","grant_number":"160364472"}],"citation":{"ieee":"M. Müller, J. Neumann, and D. Kundisch, “Toss a Coin to Your Host? – Why Guests Do Not Always End Up Paying for the Cost of Regulatory Policies,” presented at the Conference on Information Systems and Technology (CIST), Newport Beach, California, USA.","chicago":"Müller, Michelle, Jürgen Neumann, and Dennis Kundisch. “Toss a Coin to Your Host? – Why Guests Do Not Always End Up Paying for the Cost of Regulatory Policies,” n.d.","ama":"Müller M, Neumann J, Kundisch D. Toss a Coin to Your Host? – Why Guests Do Not Always End Up Paying for the Cost of Regulatory Policies.","apa":"Müller, M., Neumann, J., &#38; Kundisch, D. (n.d.). <i>Toss a Coin to Your Host? – Why Guests Do Not Always End Up Paying for the Cost of Regulatory Policies</i>. Conference on Information Systems and Technology (CIST), Newport Beach, California, USA.","mla":"Müller, Michelle, et al. <i>Toss a Coin to Your Host? – Why Guests Do Not Always End Up Paying for the Cost of Regulatory Policies</i>.","short":"M. Müller, J. Neumann, D. Kundisch, in: n.d.","bibtex":"@inproceedings{Müller_Neumann_Kundisch, title={Toss a Coin to Your Host? – Why Guests Do Not Always End Up Paying for the Cost of Regulatory Policies}, author={Müller, Michelle and Neumann, Jürgen and Kundisch, Dennis} }"},"year":"2021","publication_status":"accepted","conference":{"name":"Conference on Information Systems and Technology (CIST)","start_date":"2021-10-23","end_date":"2021-10-24","location":"Newport Beach, California, USA"},"title":"Toss a Coin to Your Host? – Why Guests Do Not Always End Up Paying for the Cost of Regulatory Policies","author":[{"first_name":"Michelle","id":"50286","full_name":"Müller, Michelle","last_name":"Müller"},{"first_name":"Jürgen","last_name":"Neumann","id":"32456","full_name":"Neumann, Jürgen"},{"first_name":"Dennis","full_name":"Kundisch, Dennis","id":"21117","last_name":"Kundisch"}],"date_created":"2021-08-16T08:20:23Z","date_updated":"2024-12-03T12:32:21Z"},{"_id":"31132","project":[{"name":"Reaktor: SFB 901 - Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten (Hektor) (Transferproject T3)","_id":"107"},{"_id":"1","name":"SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten"},{"_id":"82","name":"SFB 901; Projektbereich T: Transferprojekte des Sonderforschungsbereichs"},{"name":"SFB 901; TP T3: Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten (Hektor)","_id":"107"}],"department":[{"_id":"76"}],"user_id":"477","keyword":["Software"],"language":[{"iso":"eng"}],"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public","date_updated":"2025-11-11T14:28:46Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_created":"2022-05-09T13:02:35Z","author":[{"first_name":"Andreas Peter","last_name":"Dann","full_name":"Dann, Andreas Peter","id":"26886"},{"last_name":"Plate","full_name":"Plate, Henrik","first_name":"Henrik"},{"first_name":"Ben","last_name":"Hermann","orcid":"0000-0001-9848-2017","id":"66173","full_name":"Hermann, Ben"},{"first_name":"Serena Elisa","last_name":"Ponta","full_name":"Ponta, Serena Elisa"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"title":"Identifying Challenges for OSS Vulnerability Scanners - A Study &amp; Test Suite","doi":"10.1109/tse.2021.3101739","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"publication_status":"published","year":"2021","page":"1-1","citation":{"ieee":"A. P. Dann, H. Plate, B. Hermann, S. E. Ponta, and E. Bodden, “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2021, doi: <a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>.","chicago":"Dann, Andreas Peter, Henrik Plate, Ben Hermann, Serena Elisa Ponta, and Eric Bodden. “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>, 2021, 1–1. <a href=\"https://doi.org/10.1109/tse.2021.3101739\">https://doi.org/10.1109/tse.2021.3101739</a>.","ama":"Dann AP, Plate H, Hermann B, Ponta SE, Bodden E. Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite. <i>IEEE Transactions on Software Engineering</i>. Published online 2021:1-1. doi:<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>","mla":"Dann, Andreas Peter, et al. “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>, Institute of Electrical and Electronics Engineers (IEEE), 2021, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>.","short":"A.P. Dann, H. Plate, B. Hermann, S.E. Ponta, E. Bodden, IEEE Transactions on Software Engineering (2021) 1–1.","bibtex":"@article{Dann_Plate_Hermann_Ponta_Bodden_2021, title={Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite}, DOI={<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>}, journal={IEEE Transactions on Software Engineering}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Dann, Andreas Peter and Plate, Henrik and Hermann, Ben and Ponta, Serena Elisa and Bodden, Eric}, year={2021}, pages={1–1} }","apa":"Dann, A. P., Plate, H., Hermann, B., Ponta, S. E., &#38; Bodden, E. (2021). Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/tse.2021.3101739\">https://doi.org/10.1109/tse.2021.3101739</a>"}},{"citation":{"ama":"Schubert P, Sattler F, Schiebel FB, Hermann B, Bodden E. Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++. In: <i>2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)</i>. ; 2021.","ieee":"P. Schubert, F. Sattler, F. B. Schiebel, B. Hermann, and E. Bodden, “Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++,” 2021.","chicago":"Schubert, Philipp, Florian Sattler, Fabian Benedikt Schiebel, Ben Hermann, and Eric Bodden. “Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++.” In <i>2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)</i>, 2021.","bibtex":"@inproceedings{Schubert_Sattler_Schiebel_Hermann_Bodden_2021, title={Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++}, booktitle={2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)}, author={Schubert, Philipp and Sattler, Florian and Schiebel, Fabian Benedikt and Hermann, Ben and Bodden, Eric}, year={2021} }","mla":"Schubert, Philipp, et al. “Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++.” <i>2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)</i>, 2021.","short":"P. Schubert, F. Sattler, F.B. Schiebel, B. Hermann, E. Bodden, in: 2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM), 2021.","apa":"Schubert, P., Sattler, F., Schiebel, F. B., Hermann, B., &#38; Bodden, E. (2021). Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++. <i>2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)</i>."},"year":"2021","author":[{"first_name":"Philipp","orcid":"0000-0002-8674-1859","last_name":"Schubert","id":"60543","full_name":"Schubert, Philipp"},{"first_name":"Florian","last_name":"Sattler","full_name":"Sattler, Florian"},{"first_name":"Fabian Benedikt","id":"55745","full_name":"Schiebel, Fabian Benedikt","orcid":"0009-0008-6867-9802","last_name":"Schiebel"},{"first_name":"Ben","id":"66173","full_name":"Hermann, Ben","orcid":"0000-0001-9848-2017","last_name":"Hermann"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2021-10-18T12:50:35Z","date_updated":"2025-12-04T10:43:01Z","title":"Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++","publication":"2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)","type":"conference","status":"public","department":[{"_id":"76"}],"user_id":"15249","_id":"26405","project":[{"_id":"12","name":"SFB 901 - B4: SFB 901 - Subproject B4"},{"name":"SFB 901 - B: SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","_id":"1"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"_id":"19551","series_title":"Lecture Notes in Computer Science","user_id":"15504","editor":[{"first_name":"Joseph","full_name":"K. Liu, Joseph","last_name":"K. Liu"},{"first_name":"Hui","full_name":"Cui, Hui","last_name":"Cui"}],"status":"public","type":"conference","publication":"Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings","title":"Efficient Forward-Secure Threshold Public Key Encryption","doi":"10.1007/978-3-030-55304-3\\_17","publisher":"Springer","date_updated":"2022-01-06T06:54:07Z","author":[{"last_name":"Kurek","full_name":"Kurek, Rafael","first_name":"Rafael"}],"date_created":"2020-09-18T05:59:11Z","volume":12248,"year":"2020","citation":{"apa":"Kurek, R. (2020). Efficient Forward-Secure Threshold Public Key Encryption. In J. K. Liu &#38; H. Cui (Eds.), <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i> (Vol. 12248, pp. 330–349). Springer. <a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">https://doi.org/10.1007/978-3-030-55304-3\\_17</a>","short":"R. Kurek, in: J. K. Liu, H. Cui (Eds.), Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, Springer, 2020, pp. 330–349.","bibtex":"@inproceedings{Kurek_2020, series={Lecture Notes in Computer Science}, title={Efficient Forward-Secure Threshold Public Key Encryption}, volume={12248}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">10.1007/978-3-030-55304-3\\_17</a>}, booktitle={Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, publisher={Springer}, author={Kurek, Rafael}, editor={K. Liu, Joseph and Cui, HuiEditors}, year={2020}, pages={330–349}, collection={Lecture Notes in Computer Science} }","mla":"Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.” <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, edited by Joseph K. Liu and Hui Cui, vol. 12248, Springer, 2020, pp. 330–49, doi:<a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">10.1007/978-3-030-55304-3\\_17</a>.","ama":"Kurek R. Efficient Forward-Secure Threshold Public Key Encryption. In: K. Liu J, Cui H, eds. <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>. Vol 12248. Lecture Notes in Computer Science. Springer; 2020:330-349. doi:<a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">10.1007/978-3-030-55304-3\\_17</a>","chicago":"Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.” In <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, edited by Joseph K. Liu and Hui Cui, 12248:330–49. Lecture Notes in Computer Science. Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">https://doi.org/10.1007/978-3-030-55304-3\\_17</a>.","ieee":"R. Kurek, “Efficient Forward-Secure Threshold Public Key Encryption,” in <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, 2020, vol. 12248, pp. 330–349."},"page":"330-349","intvolume":"     12248"},{"year":"2020","citation":{"apa":"Kurek, R. (2020). Efficient Forward-Secure Threshold Signatures. In K. Aoki &#38; A. Kanaoka (Eds.), <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i> (Vol. 12231, pp. 239–260). Springer. <a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">https://doi.org/10.1007/978-3-030-58208-1\\_14</a>","short":"R. Kurek, in: K. Aoki, A. Kanaoka (Eds.), Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, Springer, 2020, pp. 239–260.","bibtex":"@inproceedings{Kurek_2020, series={Lecture Notes in Computer Science}, title={Efficient Forward-Secure Threshold Signatures}, volume={12231}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">10.1007/978-3-030-58208-1\\_14</a>}, booktitle={Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, publisher={Springer}, author={Kurek, Rafael}, editor={Aoki, Kazumaro and Kanaoka, AkiraEditors}, year={2020}, pages={239–260}, collection={Lecture Notes in Computer Science} }","mla":"Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, edited by Kazumaro Aoki and Akira Kanaoka, vol. 12231, Springer, 2020, pp. 239–60, doi:<a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">10.1007/978-3-030-58208-1\\_14</a>.","ieee":"R. Kurek, “Efficient Forward-Secure Threshold Signatures,” in <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, 2020, vol. 12231, pp. 239–260.","chicago":"Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” In <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, edited by Kazumaro Aoki and Akira Kanaoka, 12231:239–60. Lecture Notes in Computer Science. Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">https://doi.org/10.1007/978-3-030-58208-1\\_14</a>.","ama":"Kurek R. Efficient Forward-Secure Threshold Signatures. In: Aoki K, Kanaoka A, eds. <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>. Vol 12231. Lecture Notes in Computer Science. Springer; 2020:239-260. doi:<a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">10.1007/978-3-030-58208-1\\_14</a>"},"intvolume":"     12231","page":"239-260","publisher":"Springer","date_updated":"2022-01-06T06:54:07Z","date_created":"2020-09-18T06:00:42Z","author":[{"first_name":"Rafael","last_name":"Kurek","full_name":"Kurek, Rafael"}],"volume":12231,"title":"Efficient Forward-Secure Threshold Signatures","doi":"10.1007/978-3-030-58208-1\\_14","type":"conference","publication":"Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings","editor":[{"first_name":"Kazumaro","last_name":"Aoki","full_name":"Aoki, Kazumaro"},{"first_name":"Akira","last_name":"Kanaoka","full_name":"Kanaoka, Akira"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"19553","user_id":"15504","series_title":"Lecture Notes in Computer Science","language":[{"iso":"eng"}]},{"has_accepted_license":"1","citation":{"mla":"Gottschalk, Sebastian, et al. “ProConAR: A Tool Support for Model-Based AR Product Configuration.” <i>Human-Centered Software Engineering. HCSE 2020</i>, edited by Regina Bernhaupt et al., vol. 12481, Springer, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">10.1007/978-3-030-64266-2_14</a>.","bibtex":"@inproceedings{Gottschalk_Yigitbas_Schmidt_Engels_2020, place={Cham}, series={Lecture Notes in Computer Science}, title={ProConAR: A Tool Support for Model-based AR Product Configuration}, volume={12481}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">10.1007/978-3-030-64266-2_14</a>}, booktitle={Human-Centered Software Engineering. HCSE 2020}, publisher={Springer}, author={Gottschalk, Sebastian and Yigitbas, Enes and Schmidt, Eugen and Engels, Gregor}, editor={Bernhaupt, Regina and Ardito, Carmelo and Sauer, StefanEditors}, year={2020}, collection={Lecture Notes in Computer Science} }","short":"S. Gottschalk, E. Yigitbas, E. Schmidt, G. Engels, in: R. Bernhaupt, C. Ardito, S. Sauer (Eds.), Human-Centered Software Engineering. HCSE 2020, Springer, Cham, 2020.","apa":"Gottschalk, S., Yigitbas, E., Schmidt, E., &#38; Engels, G. (2020). ProConAR: A Tool Support for Model-based AR Product Configuration. In R. Bernhaupt, C. Ardito, &#38; S. Sauer (Eds.), <i>Human-Centered Software Engineering. HCSE 2020</i> (Vol. 12481). Cham: Springer. <a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">https://doi.org/10.1007/978-3-030-64266-2_14</a>","ama":"Gottschalk S, Yigitbas E, Schmidt E, Engels G. ProConAR: A Tool Support for Model-based AR Product Configuration. In: Bernhaupt R, Ardito C, Sauer S, eds. <i>Human-Centered Software Engineering. HCSE 2020</i>. Vol 12481. Lecture Notes in Computer Science. Cham: Springer; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">10.1007/978-3-030-64266-2_14</a>","chicago":"Gottschalk, Sebastian, Enes Yigitbas, Eugen Schmidt, and Gregor Engels. “ProConAR: A Tool Support for Model-Based AR Product Configuration.” In <i>Human-Centered Software Engineering. HCSE 2020</i>, edited by Regina Bernhaupt, Carmelo Ardito, and Stefan Sauer, Vol. 12481. Lecture Notes in Computer Science. Cham: Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">https://doi.org/10.1007/978-3-030-64266-2_14</a>.","ieee":"S. Gottschalk, E. Yigitbas, E. Schmidt, and G. Engels, “ProConAR: A Tool Support for Model-based AR Product Configuration,” in <i>Human-Centered Software Engineering. HCSE 2020</i>, Eindhoven, 2020, vol. 12481."},"intvolume":"     12481","place":"Cham","author":[{"last_name":"Gottschalk","id":"47208","full_name":"Gottschalk, Sebastian","first_name":"Sebastian"},{"full_name":"Yigitbas, Enes","id":"8447","last_name":"Yigitbas","orcid":"0000-0002-5967-833X","first_name":"Enes"},{"last_name":"Schmidt","full_name":"Schmidt, Eugen","first_name":"Eugen"},{"first_name":"Gregor","id":"107","full_name":"Engels, Gregor","last_name":"Engels"}],"volume":12481,"date_updated":"2022-01-06T06:54:07Z","oa":"1","conference":{"location":"Eindhoven","end_date":"2020-12-02","start_date":"2020-11-30","name":"8th International Working Conference on Human-Centered Software Engineering (HCSE'20)"},"doi":"10.1007/978-3-030-64266-2_14","type":"conference","status":"public","editor":[{"full_name":"Bernhaupt, Regina","last_name":"Bernhaupt","first_name":"Regina"},{"full_name":"Ardito, Carmelo","last_name":"Ardito","first_name":"Carmelo"},{"full_name":"Sauer, Stefan","last_name":"Sauer","first_name":"Stefan"}],"series_title":"Lecture Notes in Computer Science","user_id":"47208","department":[{"_id":"66"},{"_id":"534"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"_id":"19606","file_date_updated":"2020-11-30T08:39:18Z","year":"2020","date_created":"2020-09-21T17:01:11Z","publisher":"Springer","title":"ProConAR: A Tool Support for Model-based AR Product Configuration","publication":"Human-Centered Software Engineering. HCSE 2020","file":[{"file_size":3913885,"access_level":"open_access","file_name":"HCSE20_demo.pdf","file_id":"20542","date_updated":"2020-11-30T08:39:18Z","date_created":"2020-11-30T08:39:18Z","creator":"sego","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"Mobile shopping apps have been using Augmented Reality (AR) in the last years to place their products in the environment of the customer. While this is possible with atomic 3D objects, there is is still a lack in the runtime conﬁguration of 3D object compositions based on user needs and environmental constraints. For this, we previously developed an approach for model-based AR-assisted product conﬁguration based on the concept of Dynamic Software Product Lines. In this demonstration paper, we present the corresponding tool support ProConAR in the form of a Product Modeler and a Product Conﬁgurator. While the Product Modeler is an Angular web app that splits products (e.g. table) up into atomic parts (e.g. tabletop, table legs, funnier) and saves it within a conﬁguration model, the Product Conﬁgurator is an Android client that uses the conﬁguration model to place diﬀerent product conﬁgurations within the environment of the customer. We show technical details of our ready to use tool-chain ProConAR by describing its implementation and usage as well as pointing out future research directions.","lang":"eng"}],"language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Product Configuration","Augmented Reality","Model-based","Tool Support"]},{"publication":"IEEE International Conference on Network and Service Management (CNSM)","file":[{"date_created":"2020-09-22T06:25:57Z","creator":"stschn","date_updated":"2020-09-22T06:36:25Z","access_level":"open_access","file_id":"19608","file_name":"ris_with_copyright.pdf","file_size":500948,"content_type":"application/pdf","relation":"main_file"}],"abstract":[{"lang":"eng","text":"Modern services consist of modular, interconnected\r\ncomponents, e.g., microservices forming a service mesh. To\r\ndynamically adjust to ever-changing service demands, service\r\ncomponents have to be instantiated on nodes across the network.\r\nIncoming flows requesting a service then need to be routed\r\nthrough the deployed instances while considering node and link\r\ncapacities. Ultimately, the goal is to maximize the successfully\r\nserved flows and Quality of Service (QoS) through online service\r\ncoordination. Current approaches for service coordination are\r\nusually centralized, assuming up-to-date global knowledge and\r\nmaking global decisions for all nodes in the network. Such global\r\nknowledge and centralized decisions are not realistic in practical\r\nlarge-scale networks.\r\n\r\nTo solve this problem, we propose two algorithms for fully\r\ndistributed service coordination. The proposed algorithms can be\r\nexecuted individually at each node in parallel and require only\r\nvery limited global knowledge. We compare and evaluate both\r\nalgorithms with a state-of-the-art centralized approach in extensive\r\nsimulations on a large-scale, real-world network topology.\r\nOur results indicate that the two algorithms can compete with\r\ncentralized approaches in terms of solution quality but require\r\nless global knowledge and are magnitudes faster (more than\r\n100x)."}],"language":[{"iso":"eng"}],"ddc":["006"],"keyword":["distributed management","service coordination","network coordination","nfv","softwarization","orchestration"],"year":"2020","date_created":"2020-09-22T06:23:40Z","publisher":"IEEE","title":"Every Node for Itself: Fully Distributed Service Coordination","type":"conference","status":"public","user_id":"35343","department":[{"_id":"75"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"_id":"19607","file_date_updated":"2020-09-22T06:36:25Z","has_accepted_license":"1","citation":{"bibtex":"@inproceedings{Schneider_Klenner_Karl_2020, title={Every Node for Itself: Fully Distributed Service Coordination}, booktitle={IEEE International Conference on Network and Service Management (CNSM)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Klenner, Lars Dietrich and Karl, Holger}, year={2020} }","short":"S.B. Schneider, L.D. Klenner, H. Karl, in: IEEE International Conference on Network and Service Management (CNSM), IEEE, 2020.","mla":"Schneider, Stefan Balthasar, et al. “Every Node for Itself: Fully Distributed Service Coordination.” <i>IEEE International Conference on Network and Service Management (CNSM)</i>, IEEE, 2020.","apa":"Schneider, S. B., Klenner, L. D., &#38; Karl, H. (2020). Every Node for Itself: Fully Distributed Service Coordination. In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE.","ieee":"S. B. Schneider, L. D. Klenner, and H. Karl, “Every Node for Itself: Fully Distributed Service Coordination,” in <i>IEEE International Conference on Network and Service Management (CNSM)</i>, 2020.","chicago":"Schneider, Stefan Balthasar, Lars Dietrich Klenner, and Holger Karl. “Every Node for Itself: Fully Distributed Service Coordination.” In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE, 2020.","ama":"Schneider SB, Klenner LD, Karl H. Every Node for Itself: Fully Distributed Service Coordination. In: <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE; 2020."},"author":[{"id":"35343","full_name":"Schneider, Stefan Balthasar","last_name":"Schneider","orcid":"0000-0001-8210-4011","first_name":"Stefan Balthasar"},{"first_name":"Lars Dietrich","full_name":"Klenner, Lars Dietrich","last_name":"Klenner"},{"full_name":"Karl, Holger","id":"126","last_name":"Karl","first_name":"Holger"}],"date_updated":"2022-01-06T06:54:08Z","oa":"1"},{"title":"Self-Driving Network and Service Coordination Using Deep Reinforcement Learning","publisher":"IEEE","date_created":"2020-09-22T06:28:22Z","year":"2020","keyword":["self-driving networks","self-learning","network coordination","service coordination","reinforcement learning","deep learning","nfv"],"ddc":["006"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Modern services comprise interconnected components,\r\ne.g., microservices in a service mesh, that can scale and\r\nrun on multiple nodes across the network on demand. To process\r\nincoming traffic, service components have to be instantiated and\r\ntraffic assigned to these instances, taking capacities and changing\r\ndemands into account. This challenge is usually solved with\r\ncustom approaches designed by experts. While this typically\r\nworks well for the considered scenario, the models often rely\r\non unrealistic assumptions or on knowledge that is not available\r\nin practice (e.g., a priori knowledge).\r\n\r\nWe propose a novel deep reinforcement learning approach that\r\nlearns how to best coordinate services and is geared towards\r\nrealistic assumptions. It interacts with the network and relies on\r\navailable, possibly delayed monitoring information. Rather than\r\ndefining a complex model or an algorithm how to achieve an\r\nobjective, our model-free approach adapts to various objectives\r\nand traffic patterns. An agent is trained offline without expert\r\nknowledge and then applied online with minimal overhead. Compared\r\nto a state-of-the-art heuristic, it significantly improves flow\r\nthroughput and overall network utility on real-world network\r\ntopologies and traffic traces. It also learns to optimize different\r\nobjectives, generalizes to scenarios with unseen, stochastic traffic\r\npatterns, and scales to large real-world networks."}],"file":[{"date_updated":"2020-09-22T06:36:00Z","date_created":"2020-09-22T06:29:16Z","creator":"stschn","file_size":642999,"file_name":"ris_with_copyright.pdf","file_id":"19610","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"publication":"IEEE International Conference on Network and Service Management (CNSM)","oa":"1","date_updated":"2022-01-06T06:54:08Z","author":[{"first_name":"Stefan Balthasar","id":"35343","full_name":"Schneider, Stefan Balthasar","last_name":"Schneider","orcid":"0000-0001-8210-4011"},{"full_name":"Manzoor, Adnan","last_name":"Manzoor","first_name":"Adnan"},{"full_name":"Qarawlus, Haydar","last_name":"Qarawlus","first_name":"Haydar"},{"first_name":"Rafael","last_name":"Schellenberg","full_name":"Schellenberg, Rafael"},{"last_name":"Karl","id":"126","full_name":"Karl, Holger","first_name":"Holger"},{"last_name":"Khalili","full_name":"Khalili, Ramin","first_name":"Ramin"},{"first_name":"Artur","last_name":"Hecker","full_name":"Hecker, Artur"}],"citation":{"ama":"Schneider SB, Manzoor A, Qarawlus H, et al. Self-Driving Network and Service Coordination Using Deep Reinforcement Learning. In: <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE; 2020.","ieee":"S. B. Schneider <i>et al.</i>, “Self-Driving Network and Service Coordination Using Deep Reinforcement Learning,” in <i>IEEE International Conference on Network and Service Management (CNSM)</i>, 2020.","chicago":"Schneider, Stefan Balthasar, Adnan Manzoor, Haydar Qarawlus, Rafael Schellenberg, Holger Karl, Ramin Khalili, and Artur Hecker. “Self-Driving Network and Service Coordination Using Deep Reinforcement Learning.” In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE, 2020.","mla":"Schneider, Stefan Balthasar, et al. “Self-Driving Network and Service Coordination Using Deep Reinforcement Learning.” <i>IEEE International Conference on Network and Service Management (CNSM)</i>, IEEE, 2020.","short":"S.B. Schneider, A. Manzoor, H. Qarawlus, R. Schellenberg, H. Karl, R. Khalili, A. Hecker, in: IEEE International Conference on Network and Service Management (CNSM), IEEE, 2020.","bibtex":"@inproceedings{Schneider_Manzoor_Qarawlus_Schellenberg_Karl_Khalili_Hecker_2020, title={Self-Driving Network and Service Coordination Using Deep Reinforcement Learning}, booktitle={IEEE International Conference on Network and Service Management (CNSM)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Manzoor, Adnan and Qarawlus, Haydar and Schellenberg, Rafael and Karl, Holger and Khalili, Ramin and Hecker, Artur}, year={2020} }","apa":"Schneider, S. B., Manzoor, A., Qarawlus, H., Schellenberg, R., Karl, H., Khalili, R., &#38; Hecker, A. (2020). Self-Driving Network and Service Coordination Using Deep Reinforcement Learning. In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE."},"has_accepted_license":"1","file_date_updated":"2020-09-22T06:36:00Z","_id":"19609","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"department":[{"_id":"75"}],"user_id":"35343","status":"public","type":"conference"},{"_id":"19656","project":[{"_id":"1","name":"SFB 901"},{"_id":"11","name":"SFB 901 - Subproject B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"7"},{"_id":"77"}],"series_title":"LNCS","user_id":"477","language":[{"iso":"eng"}],"publication":"Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS)","type":"conference","status":"public","date_updated":"2022-01-06T06:54:09Z","publisher":"Springer","author":[{"first_name":"Arnab","full_name":"Sharma, Arnab","id":"67200","last_name":"Sharma"},{"last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike","first_name":"Heike"}],"date_created":"2020-09-24T12:53:02Z","title":"Automatic Fairness Testing of Machine Learning Models","publication_status":"accepted","year":"2020","citation":{"bibtex":"@inproceedings{Sharma_Wehrheim, series={LNCS}, title={Automatic Fairness Testing of Machine Learning Models}, booktitle={Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS)}, publisher={Springer}, author={Sharma, Arnab and Wehrheim, Heike}, collection={LNCS} }","short":"A. Sharma, H. Wehrheim, in: Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS), Springer, n.d.","mla":"Sharma, Arnab, and Heike Wehrheim. “Automatic Fairness Testing of Machine Learning Models.” <i>Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS)</i>, Springer.","apa":"Sharma, A., &#38; Wehrheim, H. (n.d.). Automatic Fairness Testing of Machine Learning Models. In <i>Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS)</i>. Springer.","chicago":"Sharma, Arnab, and Heike Wehrheim. “Automatic Fairness Testing of Machine Learning Models.” In <i>Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS)</i>. LNCS. Springer, n.d.","ieee":"A. Sharma and H. Wehrheim, “Automatic Fairness Testing of Machine Learning Models,” in <i>Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS)</i>.","ama":"Sharma A, Wehrheim H. Automatic Fairness Testing of Machine Learning Models. In: <i>Proceedings of the 32th IFIP International Conference on Testing Software and Systems (ICTSS)</i>. LNCS. Springer."}},{"title":"Active Business Model Development Tools: Design Requirements","conference":{"name":"15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)","location":"Virtual Conference/Workshop"},"date_updated":"2022-01-06T06:54:11Z","date_created":"2020-09-28T14:23:55Z","author":[{"last_name":"Szopinski","full_name":"Szopinski, Daniel","id":"36372","first_name":"Daniel"}],"year":"2020","citation":{"bibtex":"@inproceedings{Szopinski_2020, title={Active Business Model Development Tools: Design Requirements}, booktitle={Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)}, author={Szopinski, Daniel}, year={2020} }","short":"D. Szopinski, in: Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST), 2020.","mla":"Szopinski, Daniel. “Active Business Model Development Tools: Design Requirements.” <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>, 2020.","apa":"Szopinski, D. (2020). Active Business Model Development Tools: Design Requirements. In <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>. Virtual Conference/Workshop.","chicago":"Szopinski, Daniel. “Active Business Model Development Tools: Design Requirements.” In <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>, 2020.","ieee":"D. Szopinski, “Active Business Model Development Tools: Design Requirements,” in <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>, Virtual Conference/Workshop, 2020.","ama":"Szopinski D. Active Business Model Development Tools: Design Requirements. In: <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>. ; 2020."},"has_accepted_license":"1","ddc":["040"],"file_date_updated":"2020-09-29T07:46:30Z","language":[{"iso":"eng"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"19739","user_id":"16205","department":[{"_id":"276"}],"file":[{"file_size":194137,"access_level":"closed","file_id":"19762","file_name":"DESRIST2020_ABMDT_REVISED.pdf","date_updated":"2020-09-29T07:46:30Z","creator":"dsz","date_created":"2020-09-29T07:46:30Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","type":"conference","publication":"Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)"},{"citation":{"apa":"Szopinski, D. (2020). Exploring design principles for stimuli in business model development tools. In <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>. Virtual Conference/Workshop.","bibtex":"@inproceedings{Szopinski_2020, title={Exploring design principles for stimuli in business model development tools}, booktitle={Proceedings of the 41st International Conference on Information Systems (ICIS)}, author={Szopinski, Daniel}, year={2020} }","mla":"Szopinski, Daniel. “Exploring Design Principles for Stimuli in Business Model Development Tools.” <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>, 2020.","short":"D. Szopinski, in: Proceedings of the 41st International Conference on Information Systems (ICIS), 2020.","chicago":"Szopinski, Daniel. “Exploring Design Principles for Stimuli in Business Model Development Tools.” In <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>, 2020.","ieee":"D. Szopinski, “Exploring design principles for stimuli in business model development tools,” in <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>, Virtual Conference/Workshop, 2020.","ama":"Szopinski D. Exploring design principles for stimuli in business model development tools. In: <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>. ; 2020."},"year":"2020","has_accepted_license":"1","conference":{"location":"Virtual Conference/Workshop","name":"41st International Conference on Information Systems (ICIS)"},"title":"Exploring design principles for stimuli in business model development tools","author":[{"first_name":"Daniel","last_name":"Szopinski","id":"36372","full_name":"Szopinski, Daniel"}],"date_created":"2020-09-28T14:28:27Z","date_updated":"2022-01-06T06:54:12Z","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"20216","file_name":"ICIS2020_BMDT_ShortPaper_RevisedManuscript_final.pdf","access_level":"closed","file_size":292196,"date_created":"2020-10-27T15:05:49Z","creator":"dsz","date_updated":"2020-10-27T15:05:49Z"}],"status":"public","type":"conference","publication":"Proceedings of the 41st International Conference on Information Systems (ICIS)","language":[{"iso":"eng"}],"file_date_updated":"2020-10-27T15:05:49Z","ddc":["040"],"user_id":"16205","department":[{"_id":"276"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"19741"},{"language":[{"iso":"eng"}],"department":[{"_id":"276"}],"user_id":"16205","_id":"19782","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"8","name":"SFB 901 - Subproject A4"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"status":"public","publication":"Proceedings of the 41th International Conference on Information Systems (ICIS)","type":"conference","conference":{"name":"41th International Conference on Information Systems (ICIS)","location":"Virtual Conference/Workshop"},"title":"Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies","date_created":"2020-09-30T09:08:41Z","author":[{"first_name":"Michelle","id":"50286","full_name":"Müller, Michelle","last_name":"Müller"},{"first_name":"Jürgen","id":"32456","full_name":"Neumann, Jürgen","last_name":"Neumann"},{"last_name":"Gutt","full_name":"Gutt, Dominik","id":"14368","first_name":"Dominik"},{"full_name":"Kundisch, Dennis","id":"21117","last_name":"Kundisch","first_name":"Dennis"}],"date_updated":"2022-01-06T06:54:12Z","citation":{"apa":"Müller, M., Neumann, J., Gutt, D., &#38; Kundisch, D. (2020). Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies. In <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>. Virtual Conference/Workshop.","bibtex":"@inproceedings{Müller_Neumann_Gutt_Kundisch_2020, title={Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies}, booktitle={Proceedings of the 41th International Conference on Information Systems (ICIS)}, author={Müller, Michelle and Neumann, Jürgen and Gutt, Dominik and Kundisch, Dennis}, year={2020} }","mla":"Müller, Michelle, et al. “Toss a Coin to Your Host - How Guests End up Paying for the Cost of Regulatory Policies.” <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>, 2020.","short":"M. Müller, J. Neumann, D. Gutt, D. Kundisch, in: Proceedings of the 41th International Conference on Information Systems (ICIS), 2020.","ieee":"M. Müller, J. Neumann, D. Gutt, and D. Kundisch, “Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies,” in <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>, Virtual Conference/Workshop, 2020.","chicago":"Müller, Michelle, Jürgen Neumann, Dominik Gutt, and Dennis Kundisch. “Toss a Coin to Your Host - How Guests End up Paying for the Cost of Regulatory Policies.” In <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>, 2020.","ama":"Müller M, Neumann J, Gutt D, Kundisch D. Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies. In: <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>. ; 2020."},"year":"2020"},{"date_updated":"2022-01-06T06:54:18Z","publisher":"Universität Paderborn","date_created":"2020-10-15T05:15:46Z","supervisor":[{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"author":[{"full_name":"Mayer, Stefan","last_name":"Mayer","first_name":"Stefan"}],"title":"Optimierung von JMCTest beim Testen von Inter Method Contracts","year":"2020","citation":{"ama":"Mayer S. <i>Optimierung von JMCTest Beim Testen von Inter Method Contracts</i>. Universität Paderborn; 2020.","ieee":"S. Mayer, <i>Optimierung von JMCTest beim Testen von Inter Method Contracts</i>. Universität Paderborn, 2020.","chicago":"Mayer, Stefan. <i>Optimierung von JMCTest Beim Testen von Inter Method Contracts</i>. Universität Paderborn, 2020.","mla":"Mayer, Stefan. <i>Optimierung von JMCTest Beim Testen von Inter Method Contracts</i>. Universität Paderborn, 2020.","bibtex":"@book{Mayer_2020, title={Optimierung von JMCTest beim Testen von Inter Method Contracts}, publisher={Universität Paderborn}, author={Mayer, Stefan}, year={2020} }","short":"S. Mayer, Optimierung von JMCTest Beim Testen von Inter Method Contracts, Universität Paderborn, 2020.","apa":"Mayer, S. (2020). <i>Optimierung von JMCTest beim Testen von Inter Method Contracts</i>. Universität Paderborn."},"_id":"19999","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"11","name":"SFB 901 - Subproject B3"}],"department":[{"_id":"7"},{"_id":"77"}],"user_id":"477","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"user_id":"15504","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"_id":"20221","citation":{"mla":"Yeole, Paresh Kishor. <i>Plurality Consensus in Hybrid Networks</i>. 2020.","short":"P.K. Yeole, Plurality Consensus in Hybrid Networks, 2020.","bibtex":"@book{Yeole_2020, title={Plurality Consensus in Hybrid Networks}, author={Yeole, Paresh Kishor}, year={2020} }","apa":"Yeole, P. K. (2020). <i>Plurality Consensus in Hybrid Networks</i>.","ieee":"P. K. Yeole, <i>Plurality Consensus in Hybrid Networks</i>. 2020.","chicago":"Yeole, Paresh Kishor. <i>Plurality Consensus in Hybrid Networks</i>, 2020.","ama":"Yeole PK. <i>Plurality Consensus in Hybrid Networks</i>.; 2020."},"year":"2020","title":"Plurality Consensus in Hybrid Networks","date_created":"2020-10-29T07:45:57Z","supervisor":[{"first_name":"Christian","last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792"}],"author":[{"last_name":"Yeole","full_name":"Yeole, Paresh Kishor","first_name":"Paresh Kishor"}],"date_updated":"2022-01-06T06:54:23Z"}]
