[{"type":"dissertation","status":"public","department":[{"_id":"205"}],"user_id":"15504","_id":"20240","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"name":"SFB 901 - Subproject A3","_id":"7"}],"language":[{"iso":"eng"}],"citation":{"ama":"Hoof S. <i>Essays on Cooperation in Differential Games</i>.; 2020. doi:<a href=\"https://doi.org/\t10.17619/UNIPB/1-1047\">\t10.17619/UNIPB/1-1047</a>","chicago":"Hoof, Simon. <i>Essays on Cooperation in Differential Games</i>, 2020. <a href=\"https://doi.org/\t10.17619/UNIPB/1-1047\">https://doi.org/\t10.17619/UNIPB/1-1047</a>.","ieee":"S. Hoof, <i>Essays on Cooperation in Differential Games</i>. 2020.","bibtex":"@book{Hoof_2020, title={Essays on Cooperation in Differential Games}, DOI={<a href=\"https://doi.org/\t10.17619/UNIPB/1-1047\">\t10.17619/UNIPB/1-1047</a>}, author={Hoof, Simon}, year={2020} }","mla":"Hoof, Simon. <i>Essays on Cooperation in Differential Games</i>. 2020, doi:<a href=\"https://doi.org/\t10.17619/UNIPB/1-1047\">\t10.17619/UNIPB/1-1047</a>.","short":"S. Hoof, Essays on Cooperation in Differential Games, 2020.","apa":"Hoof, S. (2020). <i>Essays on Cooperation in Differential Games</i>. <a href=\"https://doi.org/\t10.17619/UNIPB/1-1047\">https://doi.org/\t10.17619/UNIPB/1-1047</a>"},"year":"2020","date_created":"2020-11-02T09:56:14Z","supervisor":[{"full_name":"Haake, Claus-Jochen","id":"20801","last_name":"Haake","first_name":"Claus-Jochen"}],"author":[{"first_name":"Simon","id":"59676","full_name":"Hoof, Simon","last_name":"Hoof"}],"date_updated":"2022-01-06T06:54:24Z","doi":"\t10.17619/UNIPB/1-1047","title":"Essays on Cooperation in Differential Games"},{"user_id":"16205","department":[{"_id":"276"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"8","name":"SFB 901 - Subproject A4"}],"_id":"2834","language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T15:29:22Z","ddc":["000"],"type":"journal_article","publication":"Journal of Business Research","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"gutt-main.pdf","access_level":"closed","file_id":"5304","file_size":572670,"creator":"ups","date_created":"2018-11-02T15:29:22Z","date_updated":"2018-11-02T15:29:22Z"}],"status":"public","author":[{"last_name":"Gutt","full_name":"Gutt, Dominik","id":"14368","first_name":"Dominik"},{"full_name":"von Rechenberg, Tobias","last_name":"von Rechenberg","first_name":"Tobias"},{"first_name":"Dennis","last_name":"Kundisch","full_name":"Kundisch, Dennis","id":"21117"}],"date_created":"2018-05-23T15:08:23Z","volume":106,"date_updated":"2022-01-06T06:58:02Z","publisher":"Elsevier","doi":"10.1016/j.jbusres.2018.06.019","title":"Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty","publication_status":"epub_ahead","has_accepted_license":"1","citation":{"chicago":"Gutt, Dominik, Tobias von Rechenberg, and Dennis Kundisch. “Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty.” <i>Journal of Business Research</i> 106 (2020): 277–87. <a href=\"https://doi.org/10.1016/j.jbusres.2018.06.019\">https://doi.org/10.1016/j.jbusres.2018.06.019</a>.","ieee":"D. Gutt, T. von Rechenberg, and D. Kundisch, “Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty,” <i>Journal of Business Research</i>, vol. 106, pp. 277–287, 2020.","ama":"Gutt D, von Rechenberg T, Kundisch D. Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty. <i>Journal of Business Research</i>. 2020;106:277-287. doi:<a href=\"https://doi.org/10.1016/j.jbusres.2018.06.019\">10.1016/j.jbusres.2018.06.019</a>","apa":"Gutt, D., von Rechenberg, T., &#38; Kundisch, D. (2020). Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty. <i>Journal of Business Research</i>, <i>106</i>, 277–287. <a href=\"https://doi.org/10.1016/j.jbusres.2018.06.019\">https://doi.org/10.1016/j.jbusres.2018.06.019</a>","bibtex":"@article{Gutt_von Rechenberg_Kundisch_2020, title={Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty}, volume={106}, DOI={<a href=\"https://doi.org/10.1016/j.jbusres.2018.06.019\">10.1016/j.jbusres.2018.06.019</a>}, journal={Journal of Business Research}, publisher={Elsevier}, author={Gutt, Dominik and von Rechenberg, Tobias and Kundisch, Dennis}, year={2020}, pages={277–287} }","mla":"Gutt, Dominik, et al. “Goal Achievement, Subsequent User Effort and the Moderating Role of Goal Difficulty.” <i>Journal of Business Research</i>, vol. 106, Elsevier, 2020, pp. 277–87, doi:<a href=\"https://doi.org/10.1016/j.jbusres.2018.06.019\">10.1016/j.jbusres.2018.06.019</a>.","short":"D. Gutt, T. von Rechenberg, D. Kundisch, Journal of Business Research 106 (2020) 277–287."},"intvolume":"       106","page":"277-287","year":"2020"},{"type":"dissertation","status":"public","file":[{"access_level":"closed","file_id":"24711","file_name":"DissertationKurek.pdf","file_size":973756,"creator":"florida","date_created":"2021-09-20T11:40:38Z","date_updated":"2021-09-20T11:40:38Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"_id":"24710","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"user_id":"15504","ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2021-09-20T11:40:38Z","has_accepted_license":"1","year":"2020","citation":{"chicago":"Kurek, Rafael. <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>, 2020.","ieee":"R. Kurek, <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>. 2020.","ama":"Kurek R. <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>.; 2020.","apa":"Kurek, R. (2020). <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>.","bibtex":"@book{Kurek_2020, title={Efficient Cryptographic Constructions with Strong Security Guarantees}, author={Kurek, Rafael}, year={2020} }","mla":"Kurek, Rafael. <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>. 2020.","short":"R. Kurek, Efficient Cryptographic Constructions with Strong Security Guarantees, 2020."},"date_updated":"2022-01-06T06:56:32Z","date_created":"2021-09-20T11:40:56Z","supervisor":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"}],"author":[{"last_name":"Kurek","full_name":"Kurek, Rafael","first_name":"Rafael"}],"title":"Efficient Cryptographic Constructions with Strong Security Guarantees"},{"title":"Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets","doi":"10.3390/su12156185","date_updated":"2022-01-06T06:54:52Z","date_created":"2021-02-26T13:15:09Z","author":[{"first_name":"Daniel","full_name":"Kaimann, Daniel","id":"18949","last_name":"Kaimann"}],"volume":12,"year":"2020","citation":{"short":"D. Kaimann, Sustainability 12 (2020).","bibtex":"@article{Kaimann_2020, title={Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets}, volume={12}, DOI={<a href=\"https://doi.org/10.3390/su12156185\">10.3390/su12156185</a>}, number={156185}, journal={Sustainability}, author={Kaimann, Daniel}, year={2020} }","mla":"Kaimann, Daniel. “Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets.” <i>Sustainability</i>, vol. 12, no. 15, 6185, 2020, doi:<a href=\"https://doi.org/10.3390/su12156185\">10.3390/su12156185</a>.","apa":"Kaimann, D. (2020). Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets. <i>Sustainability</i>, <i>12</i>(15). <a href=\"https://doi.org/10.3390/su12156185\">https://doi.org/10.3390/su12156185</a>","ieee":"D. Kaimann, “Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets,” <i>Sustainability</i>, vol. 12, no. 15, 2020.","chicago":"Kaimann, Daniel. “Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets.” <i>Sustainability</i> 12, no. 15 (2020). <a href=\"https://doi.org/10.3390/su12156185\">https://doi.org/10.3390/su12156185</a>.","ama":"Kaimann D. Behind the Review Curtain: Decomposition of Online Consumer Ratings in Peer-to-Peer Markets. <i>Sustainability</i>. 2020;12(15). doi:<a href=\"https://doi.org/10.3390/su12156185\">10.3390/su12156185</a>"},"intvolume":"        12","publication_status":"published","publication_identifier":{"issn":["2071-1050"]},"issue":"15","article_number":"6185","language":[{"iso":"eng"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"8","name":"SFB 901 - Subproject A4"}],"_id":"21287","user_id":"18949","department":[{"_id":"183"}],"abstract":[{"lang":"eng","text":"<jats:p>Peer-to-peer markets are especially suitable for the analysis of online ratings as they represent two-sided markets that match buyers to sellers and thus lead to reduced scope for opportunistic behavior. We decompose the online ratings by focusing on the customer’s decision-making process in a leading peer-to-peer ridesharing platform. Using data from the leading peer-to-peer ridesharing platform BlaBlaCar, we analyze 17,584 users registered between 2004 and 2014 and their online ratings focusing on the decomposition of the explicit determinants reflecting the variance of online ratings. We find clear evidence to suggest that a driver’s attitude towards music, pets, smoking, and conversation has a significantly positive influence on his received online ratings. However, we also show that the interaction of female drivers and their attitude towards pets has a significantly negative effect on average ratings.</jats:p>"}],"status":"public","type":"journal_article","publication":"Sustainability"},{"date_updated":"2022-01-06T06:54:58Z","author":[{"last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"David","full_name":"Niehues, David","id":"36113","last_name":"Niehues"}],"conference":{"location":"Waterloo, Canada","end_date":"2019-08-16","start_date":"2019-08-12","name":"Selected Areas in Cryptography"},"doi":"10.1007/978-3-030-38471-5_13","main_file_link":[{"url":"https://link.springer.com/content/pdf/10.1007%252F978-3-030-38471-5_13.pdf"}],"publication_identifier":{"isbn":["9783030384708","9783030384715"],"issn":["0302-9743","1611-3349"]},"has_accepted_license":"1","publication_status":"published","related_material":{"link":[{"relation":"later_version","url":"https://eprint.iacr.org/2019/1335.pdf"}]},"place":"Cham","citation":{"short":"T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.","bibtex":"@inbook{Jager_Niehues_2020, place={Cham}, title={On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>}, booktitle={Lecture Notes in Computer Science}, author={Jager, Tibor and Niehues, David}, year={2020} }","mla":"Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” <i>Lecture Notes in Computer Science</i>, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>.","apa":"Jager, T., &#38; Niehues, D. (2020). On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">https://doi.org/10.1007/978-3-030-38471-5_13</a>","ieee":"T. Jager and D. Niehues, “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions,” in <i>Lecture Notes in Computer Science</i>, Cham, 2020.","chicago":"Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” In <i>Lecture Notes in Computer Science</i>. Cham, 2020. <a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">https://doi.org/10.1007/978-3-030-38471-5_13</a>.","ama":"Jager T, Niehues D. On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In: <i>Lecture Notes in Computer Science</i>. Cham; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>"},"_id":"21396","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"558"}],"user_id":"36113","file_date_updated":"2021-03-08T17:02:37Z","type":"book_chapter","status":"public","date_created":"2021-03-08T16:50:31Z","title":"On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions","quality_controlled":"1","year":"2020","keyword":["Admissible hash functions","Verifiable random functions","Error-correcting codes","Provable security"],"ddc":["000"],"language":[{"iso":"eng"}],"publication":"Lecture Notes in Computer Science","abstract":[{"lang":"eng","text":"Verifiable random functions (VRFs) are essentially digital signatures with additional properties, namely verifiable uniqueness and pseudorandomness, which make VRFs a useful tool, e.g., to prevent enumeration in DNSSEC Authenticated Denial of Existence and the CONIKS key management system, or in the random committee selection of the Algorand blockchain.\r\n\r\nMost standard-model VRFs rely on admissible hash functions (AHFs) to achieve security against adaptive attacks in the standard model. Known AHF constructions are based on error-correcting codes, which yield asymptotically efficient constructions. However, previous works do not clarify how the code should be instantiated concretely in the real world. The rate and the minimal distance of the selected code have significant impact on the efficiency of the resulting cryptosystem, therefore it is unclear if and how the aforementioned constructions can be used in practice.\r\n\r\nFirst, we explain inherent limitations of code-based AHFs. Concretely, we assume that even if we were given codes that achieve the well-known Gilbert-Varshamov or McEliece-Rodemich-Rumsey-Welch bounds, existing AHF-based constructions of verifiable random functions (VRFs) can only be instantiated quite inefficiently. Then we introduce and construct computational AHFs (cAHFs). While classical AHFs are information-theoretic, and therefore work even in presence of computationally unbounded adversaries, cAHFs provide only security against computationally bounded adversaries. However, we show that cAHFs can be instantiated significantly more efficiently. Finally, we use our cAHF to construct the currently most efficient verifiable random function with full adaptive security in the standard model."}],"file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2021-03-08T17:02:37Z","creator":"davnie","date_created":"2021-03-08T17:02:37Z","file_size":706743,"access_level":"closed","file_id":"21399","file_name":"Jager und Niehues - 2020 - On the Real-World Instantiability of Admissible Ha.pdf"}]},{"_id":"17347","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"department":[{"_id":"579"},{"_id":"1"},{"_id":"36"}],"user_id":"58701","series_title":"Communications in Computer and Information Science","file_date_updated":"2020-11-07T19:47:30Z","type":"book_chapter","editor":[{"first_name":"Lopata","full_name":"Audrius, Lopata","last_name":"Audrius"},{"last_name":"Rita","full_name":"Rita, Butkienė","first_name":"Butkienė"},{"full_name":"Daina, Gudonienė","last_name":"Daina","first_name":"Gudonienė"},{"last_name":"Vilma","full_name":"Vilma, Sukackė","first_name":"Sukackė"}],"status":"public","date_updated":"2022-01-06T06:53:08Z","volume":1283,"author":[{"first_name":"Frederik Simon","last_name":"Bäumer","id":"38837","full_name":"Bäumer, Frederik Simon"},{"last_name":"Kersting","id":"58701","full_name":"Kersting, Joschka","first_name":"Joschka"},{"first_name":"Bianca","full_name":"Buff, Bianca","last_name":"Buff"},{"last_name":"Geierhos","orcid":"0000-0002-8180-5606","id":"42496","full_name":"Geierhos, Michaela","first_name":"Michaela"}],"doi":"https://doi.org/10.1007/978-3-030-59506-7_30","conference":{"end_date":"2020-10-17","location":"Kaunas, Litauen","name":"26th International Conference on Information and Software Technologies (ICIST 2020)","start_date":"2020-10-15"},"has_accepted_license":"1","publication_status":"published","page":"368--382","intvolume":"      1283","citation":{"ama":"Bäumer FS, Kersting J, Buff B, Geierhos M. Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging. In: Audrius L, Rita B, Daina G, Vilma S, eds. <i>Information and Software Technologies</i>. Vol 1283. Communications in Computer and Information Science. Springer; 2020:368--382. doi:<a href=\"https://doi.org/10.1007/978-3-030-59506-7_30\">https://doi.org/10.1007/978-3-030-59506-7_30</a>","chicago":"Bäumer, Frederik Simon, Joschka Kersting, Bianca Buff, and Michaela Geierhos. “Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging.” In <i>Information and Software Technologies</i>, edited by Lopata Audrius, Butkienė Rita, Gudonienė Daina, and Sukackė Vilma, 1283:368--382. Communications in Computer and Information Science. Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-59506-7_30\">https://doi.org/10.1007/978-3-030-59506-7_30</a>.","ieee":"F. S. Bäumer, J. Kersting, B. Buff, and M. Geierhos, “Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging,” in <i>Information and Software Technologies</i>, vol. 1283, L. Audrius, B. Rita, G. Daina, and S. Vilma, Eds. Springer, 2020, pp. 368--382.","apa":"Bäumer, F. S., Kersting, J., Buff, B., &#38; Geierhos, M. (2020). Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging. In L. Audrius, B. Rita, G. Daina, &#38; S. Vilma (Eds.), <i>Information and Software Technologies</i> (Vol. 1283, pp. 368--382). Kaunas, Litauen: Springer. <a href=\"https://doi.org/10.1007/978-3-030-59506-7_30\">https://doi.org/10.1007/978-3-030-59506-7_30</a>","bibtex":"@inbook{Bäumer_Kersting_Buff_Geierhos_2020, series={Communications in Computer and Information Science}, title={Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging}, volume={1283}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-59506-7_30\">https://doi.org/10.1007/978-3-030-59506-7_30</a>}, booktitle={Information and Software Technologies}, publisher={Springer}, author={Bäumer, Frederik Simon and Kersting, Joschka and Buff, Bianca and Geierhos, Michaela}, editor={Audrius, Lopata and Rita, Butkienė and Daina, Gudonienė and Vilma, SukackėEditors}, year={2020}, pages={368--382}, collection={Communications in Computer and Information Science} }","short":"F.S. Bäumer, J. Kersting, B. Buff, M. Geierhos, in: L. Audrius, B. Rita, G. Daina, S. Vilma (Eds.), Information and Software Technologies, Springer, 2020, pp. 368--382.","mla":"Bäumer, Frederik Simon, et al. “Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging.” <i>Information and Software Technologies</i>, edited by Lopata Audrius et al., vol. 1283, Springer, 2020, pp. 368--382, doi:<a href=\"https://doi.org/10.1007/978-3-030-59506-7_30\">https://doi.org/10.1007/978-3-030-59506-7_30</a>."},"ddc":["004"],"language":[{"iso":"eng"}],"publication":"Information and Software Technologies","abstract":[{"lang":"eng","text":"Peer-to-Peer news portals allow Internet users to write news articles and make them available online to interested readers. Despite the fact that authors are free in their choice of topics, there are a number of quality characteristics that an article must meet before it is published. In addition to meaningful titles, comprehensibly written texts and meaning- ful images, relevant tags are an important criteria for the quality of such news. In this case study, we discuss the challenges and common mistakes that Peer-to-Peer reporters face when tagging news and how incorrect information can be corrected through the orchestration of existing Natu- ral Language Processing services. Lastly, we use this illustrative example to give insight into the challenges of dealing with bottom-up taxonomies."}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"20309","access_level":"closed","file_name":"Bäumer et al. (2020), Baeumer2020.pdf .pdf","file_size":599881,"date_created":"2020-11-07T19:47:30Z","creator":"jkers","date_updated":"2020-11-07T19:47:30Z"}],"publisher":"Springer","date_created":"2020-06-26T14:23:52Z","title":"Tag Me If You Can: Insights into the Challenges of Supporting Unrestricted P2P News Tagging","year":"2020"},{"publication_identifier":{"eissn":["1557-9999"],"issn":["1063-8210"]},"publication_status":"published","page":"2084 - 2088","intvolume":"        28","citation":{"chicago":"Witschen, Linus Matthias, Tobias Wiersema, and Marco Platzner. “Proof-Carrying Approximate Circuits.” <i>IEEE Transactions On Very Large Scale Integration Systems</i> 28, no. 9 (2020): 2084–88. <a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">https://doi.org/10.1109/TVLSI.2020.3008061</a>.","ieee":"L. M. Witschen, T. Wiersema, and M. Platzner, “Proof-carrying Approximate Circuits,” <i>IEEE Transactions On Very Large Scale Integration Systems</i>, vol. 28, no. 9, pp. 2084–2088, 2020.","ama":"Witschen LM, Wiersema T, Platzner M. Proof-carrying Approximate Circuits. <i>IEEE Transactions On Very Large Scale Integration Systems</i>. 2020;28(9):2084-2088. doi:<a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">10.1109/TVLSI.2020.3008061</a>","apa":"Witschen, L. M., Wiersema, T., &#38; Platzner, M. (2020). Proof-carrying Approximate Circuits. <i>IEEE Transactions On Very Large Scale Integration Systems</i>, <i>28</i>(9), 2084–2088. <a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">https://doi.org/10.1109/TVLSI.2020.3008061</a>","mla":"Witschen, Linus Matthias, et al. “Proof-Carrying Approximate Circuits.” <i>IEEE Transactions On Very Large Scale Integration Systems</i>, vol. 28, no. 9, IEEE, 2020, pp. 2084–88, doi:<a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">10.1109/TVLSI.2020.3008061</a>.","bibtex":"@article{Witschen_Wiersema_Platzner_2020, title={Proof-carrying Approximate Circuits}, volume={28}, DOI={<a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">10.1109/TVLSI.2020.3008061</a>}, number={9}, journal={IEEE Transactions On Very Large Scale Integration Systems}, publisher={IEEE}, author={Witschen, Linus Matthias and Wiersema, Tobias and Platzner, Marco}, year={2020}, pages={2084–2088} }","short":"L.M. Witschen, T. Wiersema, M. Platzner, IEEE Transactions On Very Large Scale Integration Systems 28 (2020) 2084–2088."},"volume":28,"author":[{"last_name":"Witschen","full_name":"Witschen, Linus Matthias","id":"49051","first_name":"Linus Matthias"},{"last_name":"Wiersema","id":"3118","full_name":"Wiersema, Tobias","first_name":"Tobias"},{"first_name":"Marco","full_name":"Platzner, Marco","id":"398","last_name":"Platzner"}],"date_updated":"2022-01-06T06:53:09Z","doi":"10.1109/TVLSI.2020.3008061","type":"journal_article","status":"public","department":[{"_id":"78"}],"user_id":"49051","_id":"17358","project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901","_id":"1"}],"funded_apc":"1","article_type":"original","issue":"9","quality_controlled":"1","year":"2020","date_created":"2020-07-06T11:21:30Z","publisher":"IEEE","title":"Proof-carrying Approximate Circuits","publication":"IEEE Transactions On Very Large Scale Integration Systems","abstract":[{"text":"Approximate circuits trade-off computational accuracy against improvements in hardware area, delay, or energy consumption. IP core vendors who wish to create such circuits need to convince consumers of the resulting approximation quality. As a solution we propose proof-carrying approximate circuits: The vendor creates an approximate IP core together with a certificate that proves the approximation quality. The proof certificate is bundled with the approximate IP core and sent off to the consumer. The consumer can formally verify the approximation quality of the IP core at a fraction of the typical computational cost for formal verification. In this paper, we first make the case for proof-carrying approximate circuits and then demonstrate the feasibility of the approach by a set of synthesis experiments using an exemplary approximation framework.","lang":"eng"}],"language":[{"iso":"eng"}],"keyword":["Approximate circuit synthesis","approximate computing","error metrics","formal verification","proof-carrying hardware"]},{"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"17368","user_id":"36372","series_title":"Lecture Notes in Business Information Processing","department":[{"_id":"276"}],"file_date_updated":"2020-09-29T07:47:23Z","type":"conference","editor":[{"full_name":"Shishkov, B.","last_name":"Shishkov","first_name":"B."}],"status":"public","date_updated":"2022-01-06T06:53:09Z","author":[{"last_name":"Vorbohle","full_name":"Vorbohle, Christian","id":"29951","first_name":"Christian"},{"id":"36372","full_name":"Szopinski, Daniel","last_name":"Szopinski","first_name":"Daniel"},{"first_name":"Dennis","full_name":"Kundisch, Dennis","id":"21117","last_name":"Kundisch"}],"volume":391,"conference":{"end_date":"2020-07-08","location":"Potsdam, Germany","name":"10th International Symposium on Business Modeling and Software Design (BMSD)","start_date":"2020-07-06"},"publication_status":"published","publication_identifier":{"isbn":["978-3-030-52305-3"]},"has_accepted_license":"1","citation":{"ama":"Vorbohle C, Szopinski D, Kundisch D. Business Model Dependencies: Towards conceptualizing dependencies for extending modeling languages for business models. Shishkov B, ed. 2020;391.","chicago":"Vorbohle, Christian, Daniel Szopinski, and Dennis Kundisch. “Business Model Dependencies: Towards Conceptualizing Dependencies for Extending Modeling Languages for Business Models.” Edited by B. Shishkov. Lecture Notes in Business Information Processing. Springer, 2020.","ieee":"C. Vorbohle, D. Szopinski, and D. Kundisch, “Business Model Dependencies: Towards conceptualizing dependencies for extending modeling languages for business models,” vol. 391. Springer, 2020.","bibtex":"@article{Vorbohle_Szopinski_Kundisch_2020, series={Lecture Notes in Business Information Processing}, title={Business Model Dependencies: Towards conceptualizing dependencies for extending modeling languages for business models}, volume={391}, publisher={Springer}, author={Vorbohle, Christian and Szopinski, Daniel and Kundisch, Dennis}, editor={Shishkov, B.Editor}, year={2020}, collection={Lecture Notes in Business Information Processing} }","short":"C. Vorbohle, D. Szopinski, D. Kundisch, 391 (2020).","mla":"Vorbohle, Christian, et al. <i>Business Model Dependencies: Towards Conceptualizing Dependencies for Extending Modeling Languages for Business Models</i>. Edited by B. Shishkov, vol. 391, Springer, 2020.","apa":"Vorbohle, C., Szopinski, D., &#38; Kundisch, D. (2020). Business Model Dependencies: Towards conceptualizing dependencies for extending modeling languages for business models. (B. Shishkov, Ed.). Presented at the 10th International Symposium on Business Modeling and Software Design (BMSD), Potsdam, Germany: Springer."},"intvolume":"       391","ddc":["040"],"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2020-09-29T07:47:23Z","creator":"dsz","date_updated":"2020-09-29T07:47:23Z","access_level":"closed","file_id":"19763","file_name":"BMSD2020_Springer_BMD.pdf","file_size":293783}],"publisher":"Springer","date_created":"2020-07-09T17:46:18Z","title":"Business Model Dependencies: Towards conceptualizing dependencies for extending modeling languages for business models","year":"2020"},{"citation":{"apa":"Castenow, J., Feldkord, B., Knollmann, T., Malatyali, M., &#38; Meyer auf der Heide, F. (2020). The Online Multi-Commodity Facility Location Problem. In <i>Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures</i>. <a href=\"https://doi.org/10.1145/3350755.3400281\">https://doi.org/10.1145/3350755.3400281</a>","mla":"Castenow, Jannik, et al. “The Online Multi-Commodity Facility Location Problem.” <i>Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures</i>, 2020, doi:<a href=\"https://doi.org/10.1145/3350755.3400281\">10.1145/3350755.3400281</a>.","bibtex":"@inproceedings{Castenow_Feldkord_Knollmann_Malatyali_Meyer auf der Heide_2020, title={The Online Multi-Commodity Facility Location Problem}, DOI={<a href=\"https://doi.org/10.1145/3350755.3400281\">10.1145/3350755.3400281</a>}, booktitle={Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures}, author={Castenow, Jannik and Feldkord, Björn and Knollmann, Till and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}, year={2020} }","short":"J. Castenow, B. Feldkord, T. Knollmann, M. Malatyali, F. Meyer auf der Heide, in: Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures, 2020.","ama":"Castenow J, Feldkord B, Knollmann T, Malatyali M, Meyer auf der Heide F. The Online Multi-Commodity Facility Location Problem. In: <i>Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures</i>. ; 2020. doi:<a href=\"https://doi.org/10.1145/3350755.3400281\">10.1145/3350755.3400281</a>","ieee":"J. Castenow, B. Feldkord, T. Knollmann, M. Malatyali, and F. Meyer auf der Heide, “The Online Multi-Commodity Facility Location Problem,” in <i>Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures</i>, 2020.","chicago":"Castenow, Jannik, Björn Feldkord, Till Knollmann, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “The Online Multi-Commodity Facility Location Problem.” In <i>Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures</i>, 2020. <a href=\"https://doi.org/10.1145/3350755.3400281\">https://doi.org/10.1145/3350755.3400281</a>."},"publication_identifier":{"isbn":["9781450369350"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1145/3350755.3400281","author":[{"first_name":"Jannik","id":"38705","full_name":"Castenow, Jannik","last_name":"Castenow"},{"first_name":"Björn","full_name":"Feldkord, Björn","id":"22704","last_name":"Feldkord"},{"first_name":"Till","last_name":"Knollmann","orcid":"0000-0003-2014-4696","id":"39241","full_name":"Knollmann, Till"},{"full_name":"Malatyali, Manuel","last_name":"Malatyali","first_name":"Manuel"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_updated":"2022-01-06T06:53:10Z","status":"public","type":"conference","file_date_updated":"2020-07-14T07:56:52Z","department":[{"_id":"63"}],"user_id":"39241","_id":"17370","project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"year":"2020","title":"The Online Multi-Commodity Facility Location Problem","date_created":"2020-07-14T07:53:20Z","file":[{"date_updated":"2020-07-14T07:56:52Z","date_created":"2020-07-14T07:56:52Z","creator":"tillk","file_size":1271416,"file_id":"17373","file_name":"3350755.3400281.pdf","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"abstract":[{"lang":"eng","text":" We consider a natural extension to the metric uncapacitated Facility Location Problem (FLP) in which requests ask for different commodities out of a finite set \\( S \\) of commodities.\r\n  Ravi and Sinha (SODA 2004) introduced the model as the \\emph{Multi-Commodity Facility Location Problem} (MFLP) and considered it an offline optimization problem.\r\n  The model itself is similar to the FLP: i.e., requests are located at points of a finite metric space and the task of an algorithm is to construct facilities and assign requests to facilities while minimizing the construction cost and the sum over all assignment distances.\r\n  In addition, requests and facilities are heterogeneous; they request or offer multiple commodities out of $S$.\r\n  A request has to be connected to a set of facilities jointly offering the commodities demanded by it.\r\n  In comparison to the FLP, an algorithm has to decide not only if and where to place facilities, but also which commodities to offer at each.\r\n\r\n  To the best of our knowledge we are the first to study the problem in its online variant in which requests, their positions and their commodities are not known beforehand but revealed over time.\r\n  We present results regarding the competitive ratio.\r\n  On the one hand, we show that heterogeneity influences the competitive ratio by developing a lower bound on the competitive ratio for any randomized online algorithm of \\( \\Omega (  \\sqrt{|S|} + \\frac{\\log n}{\\log \\log n}  ) \\) that already holds for simple line metrics.\r\n  Here, \\( n \\) is the number of requests.\r\n  On the other side, we establish a deterministic \\( \\mathcal{O}(\\sqrt{|S|} \\cdot \\log n) \\)-competitive algorithm and a randomized \\( \\mathcal{O}(\\sqrt{|S|} \\cdot \\frac{\\log n}{\\log \\log n} ) \\)-competitive algorithm.\r\n  Further, we show that when considering a more special class of cost functions for the construction cost of a facility, the competitive ratio decreases given by our deterministic algorithm depending on the function."}],"publication":"Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures","language":[{"iso":"eng"}],"keyword":["Online Multi-Commodity Facility Location","Competitive Ratio","Online Optimization","Facility Location Problem"],"ddc":["000"],"external_id":{"arxiv":["2005.08391"]}},{"language":[{"iso":"eng"}],"_id":"17407","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"10","name":"SFB 901 - Subproject B2"},{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"department":[{"_id":"34"},{"_id":"355"},{"_id":"26"}],"user_id":"5786","status":"public","publication":"Discovery Science","type":"conference","title":"Extreme Algorithm Selection with Dyadic Feature Representation","conference":{"name":"Discovery Science 2020"},"date_updated":"2022-01-06T06:53:10Z","date_created":"2020-07-21T10:06:51Z","author":[{"first_name":"Alexander","last_name":"Tornede","id":"38209","full_name":"Tornede, Alexander"},{"last_name":"Wever","orcid":" https://orcid.org/0000-0001-9782-6818","full_name":"Wever, Marcel Dominik","id":"33176","first_name":"Marcel Dominik"},{"id":"48129","full_name":"Hüllermeier, Eyke","last_name":"Hüllermeier","first_name":"Eyke"}],"year":"2020","citation":{"chicago":"Tornede, Alexander, Marcel Dominik Wever, and Eyke Hüllermeier. “Extreme Algorithm Selection with Dyadic Feature Representation.” In <i>Discovery Science</i>, 2020.","ieee":"A. Tornede, M. D. Wever, and E. Hüllermeier, “Extreme Algorithm Selection with Dyadic Feature Representation,” presented at the Discovery Science 2020, 2020.","ama":"Tornede A, Wever MD, Hüllermeier E. Extreme Algorithm Selection with Dyadic Feature Representation. In: <i>Discovery Science</i>. ; 2020.","mla":"Tornede, Alexander, et al. “Extreme Algorithm Selection with Dyadic Feature Representation.” <i>Discovery Science</i>, 2020.","short":"A. Tornede, M.D. Wever, E. Hüllermeier, in: Discovery Science, 2020.","bibtex":"@inproceedings{Tornede_Wever_Hüllermeier_2020, title={Extreme Algorithm Selection with Dyadic Feature Representation}, booktitle={Discovery Science}, author={Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}, year={2020} }","apa":"Tornede, A., Wever, M. D., &#38; Hüllermeier, E. (2020). Extreme Algorithm Selection with Dyadic Feature Representation. <i>Discovery Science</i>. Discovery Science 2020."}},{"publication":"KI 2020: Advances in Artificial Intelligence","type":"conference","status":"public","department":[{"_id":"34"},{"_id":"355"},{"_id":"26"}],"user_id":"5786","_id":"17408","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B2","_id":"10"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"language":[{"iso":"eng"}],"citation":{"chicago":"Hanselle, Jonas Manuel, Alexander Tornede, Marcel Dominik Wever, and Eyke Hüllermeier. “Hybrid Ranking and Regression for Algorithm Selection.” In <i>KI 2020: Advances in Artificial Intelligence</i>, 2020.","ieee":"J. M. Hanselle, A. Tornede, M. D. Wever, and E. Hüllermeier, “Hybrid Ranking and Regression for Algorithm Selection,” presented at the 43rd German Conference on Artificial Intelligence, 2020.","ama":"Hanselle JM, Tornede A, Wever MD, Hüllermeier E. Hybrid Ranking and Regression for Algorithm Selection. In: <i>KI 2020: Advances in Artificial Intelligence</i>. ; 2020.","apa":"Hanselle, J. M., Tornede, A., Wever, M. D., &#38; Hüllermeier, E. (2020). Hybrid Ranking and Regression for Algorithm Selection. <i>KI 2020: Advances in Artificial Intelligence</i>. 43rd German Conference on Artificial Intelligence.","short":"J.M. Hanselle, A. Tornede, M.D. Wever, E. Hüllermeier, in: KI 2020: Advances in Artificial Intelligence, 2020.","mla":"Hanselle, Jonas Manuel, et al. “Hybrid Ranking and Regression for Algorithm Selection.” <i>KI 2020: Advances in Artificial Intelligence</i>, 2020.","bibtex":"@inproceedings{Hanselle_Tornede_Wever_Hüllermeier_2020, title={Hybrid Ranking and Regression for Algorithm Selection}, booktitle={KI 2020: Advances in Artificial Intelligence}, author={Hanselle, Jonas Manuel and Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}, year={2020} }"},"year":"2020","author":[{"first_name":"Jonas Manuel","id":"43980","full_name":"Hanselle, Jonas Manuel","orcid":"0000-0002-1231-4985","last_name":"Hanselle"},{"first_name":"Alexander","last_name":"Tornede","full_name":"Tornede, Alexander","id":"38209"},{"orcid":" https://orcid.org/0000-0001-9782-6818","last_name":"Wever","id":"33176","full_name":"Wever, Marcel Dominik","first_name":"Marcel Dominik"},{"full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier","first_name":"Eyke"}],"date_created":"2020-07-21T10:21:09Z","date_updated":"2022-01-06T06:53:10Z","conference":{"name":"43rd German Conference on Artificial Intelligence"},"title":"Hybrid Ranking and Regression for Algorithm Selection"},{"department":[{"_id":"34"},{"_id":"355"},{"_id":"26"}],"user_id":"5786","_id":"17424","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B2","_id":"10"},{"name":"SFB 901","_id":"1"},{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"language":[{"iso":"eng"}],"publication":"Proceedings of the ECMLPKDD 2020","type":"conference","status":"public","date_created":"2020-07-28T09:17:41Z","author":[{"full_name":"Tornede, Tanja","id":"40795","last_name":"Tornede","first_name":"Tanja"},{"last_name":"Tornede","id":"38209","full_name":"Tornede, Alexander","first_name":"Alexander"},{"id":"33176","full_name":"Wever, Marcel Dominik","last_name":"Wever","orcid":" https://orcid.org/0000-0001-9782-6818","first_name":"Marcel Dominik"},{"first_name":"Felix","full_name":"Mohr, Felix","last_name":"Mohr"},{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129","first_name":"Eyke"}],"date_updated":"2022-01-06T06:53:11Z","conference":{"name":"IOTStream Workshop @ ECMLPKDD 2020"},"doi":"10.1007/978-3-030-66770-2_8","title":"AutoML for Predictive Maintenance: One Tool to RUL Them All","citation":{"chicago":"Tornede, Tanja, Alexander Tornede, Marcel Dominik Wever, Felix Mohr, and Eyke Hüllermeier. “AutoML for Predictive Maintenance: One Tool to RUL Them All.” In <i>Proceedings of the ECMLPKDD 2020</i>, 2020. <a href=\"https://doi.org/10.1007/978-3-030-66770-2_8\">https://doi.org/10.1007/978-3-030-66770-2_8</a>.","ieee":"T. Tornede, A. Tornede, M. D. Wever, F. Mohr, and E. Hüllermeier, “AutoML for Predictive Maintenance: One Tool to RUL Them All,” presented at the IOTStream Workshop @ ECMLPKDD 2020, 2020, doi: <a href=\"https://doi.org/10.1007/978-3-030-66770-2_8\">10.1007/978-3-030-66770-2_8</a>.","ama":"Tornede T, Tornede A, Wever MD, Mohr F, Hüllermeier E. AutoML for Predictive Maintenance: One Tool to RUL Them All. In: <i>Proceedings of the ECMLPKDD 2020</i>. ; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-66770-2_8\">10.1007/978-3-030-66770-2_8</a>","apa":"Tornede, T., Tornede, A., Wever, M. D., Mohr, F., &#38; Hüllermeier, E. (2020). AutoML for Predictive Maintenance: One Tool to RUL Them All. <i>Proceedings of the ECMLPKDD 2020</i>. IOTStream Workshop @ ECMLPKDD 2020. <a href=\"https://doi.org/10.1007/978-3-030-66770-2_8\">https://doi.org/10.1007/978-3-030-66770-2_8</a>","short":"T. Tornede, A. Tornede, M.D. Wever, F. Mohr, E. Hüllermeier, in: Proceedings of the ECMLPKDD 2020, 2020.","mla":"Tornede, Tanja, et al. “AutoML for Predictive Maintenance: One Tool to RUL Them All.” <i>Proceedings of the ECMLPKDD 2020</i>, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-66770-2_8\">10.1007/978-3-030-66770-2_8</a>.","bibtex":"@inproceedings{Tornede_Tornede_Wever_Mohr_Hüllermeier_2020, title={AutoML for Predictive Maintenance: One Tool to RUL Them All}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-66770-2_8\">10.1007/978-3-030-66770-2_8</a>}, booktitle={Proceedings of the ECMLPKDD 2020}, author={Tornede, Tanja and Tornede, Alexander and Wever, Marcel Dominik and Mohr, Felix and Hüllermeier, Eyke}, year={2020} }"},"year":"2020"},{"publisher":"Springer","date_updated":"2022-01-06T06:53:20Z","volume":12156,"date_created":"2020-08-12T07:54:22Z","title":"Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings","doi":"10.1007/978-3-030-54921-3","publication_identifier":{"isbn":["978-3-030-54920-6"]},"year":"2020","intvolume":"     12156","citation":{"ama":"Werneck Richa A, Scheideler C, eds. <i>Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings</i>. Vol 12156. Springer; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-54921-3\">10.1007/978-3-030-54921-3</a>","ieee":"A. Werneck Richa and C. Scheideler, Eds., <i>Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings</i>, vol. 12156. Springer, 2020.","chicago":"Werneck Richa, Andrea, and Christian Scheideler, eds. <i>Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings</i>. Vol. 12156. Lecture Notes in Computer Science. Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-54921-3\">https://doi.org/10.1007/978-3-030-54921-3</a>.","mla":"Werneck Richa, Andrea, and Christian Scheideler, editors. <i>Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings</i>. Vol. 12156, Springer, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-54921-3\">10.1007/978-3-030-54921-3</a>.","bibtex":"@book{Werneck Richa_Scheideler_2020, series={Lecture Notes in Computer Science}, title={Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings}, volume={12156}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-54921-3\">10.1007/978-3-030-54921-3</a>}, publisher={Springer}, year={2020}, collection={Lecture Notes in Computer Science} }","short":"A. Werneck Richa, C. Scheideler, eds., Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings, Springer, 2020.","apa":"Werneck Richa, A., &#38; Scheideler, C. (Eds.). (2020). <i>Structural Information and Communication Complexity - 27th International Colloquium, SIROCCO 2020, Paderborn, Germany, June 29 - July 1, 2020, Proceedings</i> (Vol. 12156). Springer. <a href=\"https://doi.org/10.1007/978-3-030-54921-3\">https://doi.org/10.1007/978-3-030-54921-3</a>"},"_id":"17836","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subproject A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"79"}],"user_id":"15504","series_title":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"type":"conference_editor","editor":[{"first_name":"Andrea","last_name":"Werneck Richa","full_name":"Werneck Richa, Andrea"},{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"}],"status":"public"},{"doi":"10.1145/3350755","title":"SPAA '20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020","date_created":"2020-08-12T07:57:10Z","publisher":"ACM","date_updated":"2022-01-06T06:53:20Z","citation":{"apa":"Scheideler, C., &#38; Spear, M. (Eds.). (2020). <i>SPAA ’20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020</i>. ACM. <a href=\"https://doi.org/10.1145/3350755\">https://doi.org/10.1145/3350755</a>","mla":"Scheideler, Christian, and Michael Spear, editors. <i>SPAA ’20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020</i>. ACM, 2020, doi:<a href=\"https://doi.org/10.1145/3350755\">10.1145/3350755</a>.","short":"C. Scheideler, M. Spear, eds., SPAA ’20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020, ACM, 2020.","bibtex":"@book{Scheideler_Spear_2020, title={SPAA ’20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020}, DOI={<a href=\"https://doi.org/10.1145/3350755\">10.1145/3350755</a>}, publisher={ACM}, year={2020} }","ama":"Scheideler C, Spear M, eds. <i>SPAA ’20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020</i>. ACM; 2020. doi:<a href=\"https://doi.org/10.1145/3350755\">10.1145/3350755</a>","chicago":"Scheideler, Christian, and Michael Spear, eds. <i>SPAA ’20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020</i>. ACM, 2020. <a href=\"https://doi.org/10.1145/3350755\">https://doi.org/10.1145/3350755</a>.","ieee":"C. Scheideler and M. Spear, Eds., <i>SPAA ’20: 32nd ACM Symposium on Parallelism in Algorithms and Architectures, Virtual Event, USA, July 15-17, 2020</i>. ACM, 2020."},"year":"2020","publication_identifier":{"isbn":["978-1-4503-6935-0"]},"language":[{"iso":"eng"}],"user_id":"15504","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"_id":"17839","status":"public","editor":[{"first_name":"Christian","last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian"},{"first_name":"Michael","last_name":"Spear","full_name":"Spear, Michael"}],"type":"conference_editor"},{"user_id":"58701","department":[{"_id":"579"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"9","name":"SFB 901 - Subproject B1"}],"_id":"18686","file_date_updated":"2020-11-19T17:29:03Z","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Software Requirements","Natural Language Processing","Transfer Learning","On-The-Fly Computing"],"type":"conference","publication":"PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1064877,"file_id":"20443","access_level":"closed","file_name":"Kersting & Bäumer (2020), Kersting2020d.pdf","date_updated":"2020-11-19T17:29:03Z","date_created":"2020-11-19T17:29:03Z","creator":"jkers"}],"status":"public","author":[{"last_name":"Kersting","id":"58701","full_name":"Kersting, Joschka","first_name":"Joschka"},{"full_name":"Bäumer, Frederik Simon","id":"38837","last_name":"Bäumer","first_name":"Frederik Simon"}],"date_created":"2020-08-31T10:59:54Z","date_updated":"2022-01-06T06:53:51Z","publisher":"IADIS","conference":{"name":"17th International Conference on Applied Computing","start_date":"18.11.2020","end_date":"20.11.2020","location":"Lisbon, Portugal"},"title":"SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH","has_accepted_license":"1","citation":{"apa":"Kersting, J., &#38; Bäumer, F. S. (2020). SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH. <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, 119--123.","bibtex":"@inproceedings{Kersting_Bäumer_2020, title={SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH}, booktitle={PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020}, publisher={IADIS}, author={Kersting, Joschka and Bäumer, Frederik Simon}, year={2020}, pages={119--123} }","short":"J. Kersting, F.S. Bäumer, in: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020, IADIS, 2020, pp. 119--123.","mla":"Kersting, Joschka, and Frederik Simon Bäumer. “SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH.” <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, IADIS, 2020, pp. 119--123.","ama":"Kersting J, Bäumer FS. SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH. In: <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>. IADIS; 2020:119--123.","ieee":"J. Kersting and F. S. Bäumer, “SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH,” in <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, Lisbon, Portugal, 2020, pp. 119--123.","chicago":"Kersting, Joschka, and Frederik Simon Bäumer. “SEMANTIC TAGGING OF REQUIREMENT DESCRIPTIONS: A TRANSFORMER-BASED APPROACH.” In <i>PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED COMPUTING 2020</i>, 119--123. IADIS, 2020."},"page":"119--123","year":"2020"},{"author":[{"full_name":"Tornede, Alexander","id":"38209","last_name":"Tornede","first_name":"Alexander"},{"id":"33176","full_name":"Wever, Marcel Dominik","orcid":" https://orcid.org/0000-0001-9782-6818","last_name":"Wever","first_name":"Marcel Dominik"},{"first_name":"Eyke","last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129"}],"date_created":"2020-11-06T09:42:27Z","date_updated":"2022-01-06T06:54:26Z","conference":{"name":"Workshop MetaLearn 2020 @ NeurIPS 2020","location":"Online"},"title":"Towards Meta-Algorithm Selection","citation":{"apa":"Tornede, A., Wever, M. D., &#38; Hüllermeier, E. (2020). Towards Meta-Algorithm Selection. <i>Workshop MetaLearn 2020 @ NeurIPS 2020</i>. Workshop MetaLearn 2020 @ NeurIPS 2020, Online.","bibtex":"@inproceedings{Tornede_Wever_Hüllermeier_2020, title={Towards Meta-Algorithm Selection}, booktitle={Workshop MetaLearn 2020 @ NeurIPS 2020}, author={Tornede, Alexander and Wever, Marcel Dominik and Hüllermeier, Eyke}, year={2020} }","mla":"Tornede, Alexander, et al. “Towards Meta-Algorithm Selection.” <i>Workshop MetaLearn 2020 @ NeurIPS 2020</i>, 2020.","short":"A. Tornede, M.D. Wever, E. Hüllermeier, in: Workshop MetaLearn 2020 @ NeurIPS 2020, 2020.","ama":"Tornede A, Wever MD, Hüllermeier E. Towards Meta-Algorithm Selection. In: <i>Workshop MetaLearn 2020 @ NeurIPS 2020</i>. ; 2020.","chicago":"Tornede, Alexander, Marcel Dominik Wever, and Eyke Hüllermeier. “Towards Meta-Algorithm Selection.” In <i>Workshop MetaLearn 2020 @ NeurIPS 2020</i>, 2020.","ieee":"A. Tornede, M. D. Wever, and E. Hüllermeier, “Towards Meta-Algorithm Selection,” presented at the Workshop MetaLearn 2020 @ NeurIPS 2020, Online, 2020."},"year":"2020","department":[{"_id":"34"},{"_id":"355"},{"_id":"26"}],"user_id":"5786","_id":"20306","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B2","_id":"10"},{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"language":[{"iso":"eng"}],"publication":"Workshop MetaLearn 2020 @ NeurIPS 2020","type":"conference","status":"public"},{"year":"2020","citation":{"mla":"Jochmaring, Moritz. <i>A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks</i>. 2020.","short":"M. Jochmaring, A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks, 2020.","bibtex":"@book{Jochmaring_2020, title={A self stabilizing protocol for well-formed trees in hybrid networks}, author={Jochmaring, Moritz}, year={2020} }","apa":"Jochmaring, M. (2020). <i>A self stabilizing protocol for well-formed trees in hybrid networks</i>.","chicago":"Jochmaring, Moritz. <i>A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks</i>, 2020.","ieee":"M. Jochmaring, <i>A self stabilizing protocol for well-formed trees in hybrid networks</i>. 2020.","ama":"Jochmaring M. <i>A Self Stabilizing Protocol for Well-Formed Trees in Hybrid Networks</i>.; 2020."},"title":"A self stabilizing protocol for well-formed trees in hybrid networks","date_updated":"2022-01-06T06:54:27Z","supervisor":[{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"date_created":"2020-11-25T07:03:16Z","author":[{"last_name":"Jochmaring","full_name":"Jochmaring, Moritz","first_name":"Moritz"}],"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"20495","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"79"}],"user_id":"15504"},{"project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"_id":"20712","user_id":"477","department":[{"_id":"76"}],"ddc":["000"],"file_date_updated":"2020-12-14T07:39:07Z","language":[{"iso":"eng"}],"type":"report","file":[{"file_size":683576,"file_name":"main.pdf","file_id":"20713","access_level":"closed","date_updated":"2020-12-14T07:39:07Z","date_created":"2020-12-14T07:39:07Z","creator":"pdschbrt","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","date_updated":"2022-01-06T06:54:34Z","author":[{"full_name":"Schubert, Philipp","id":"60543","orcid":"0000-0002-8674-1859","last_name":"Schubert","first_name":"Philipp"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"id":"66173","full_name":"Hermann, Ben","orcid":"0000-0001-9848-2017","last_name":"Hermann","first_name":"Ben"}],"date_created":"2020-12-14T07:44:11Z","title":"Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries","has_accepted_license":"1","year":"2020","citation":{"apa":"Schubert, P., Bodden, E., &#38; Hermann, B. (2020). <i>Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>.","mla":"Schubert, Philipp, et al. <i>Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>. 2020.","bibtex":"@book{Schubert_Bodden_Hermann_2020, title={Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries}, author={Schubert, Philipp and Bodden, Eric and Hermann, Ben}, year={2020} }","short":"P. Schubert, E. Bodden, B. Hermann, Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries, 2020.","ama":"Schubert P, Bodden E, Hermann B. <i>Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>.; 2020.","chicago":"Schubert, Philipp, Eric Bodden, and Ben Hermann. <i>Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>, 2020.","ieee":"P. Schubert, E. Bodden, and B. Hermann, <i>Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>. 2020."}},{"citation":{"apa":"Witschen, L. M., Wiersema, T., &#38; Platzner, M. (n.d.). Search Space Characterization for AxC Synthesis. <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>.","mla":"Witschen, Linus Matthias, et al. “Search Space Characterization for AxC Synthesis.” <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>.","bibtex":"@article{Witschen_Wiersema_Platzner, title={Search Space Characterization for AxC Synthesis}, journal={Fifth Workshop on Approximate Computing (AxC 2020)}, author={Witschen, Linus Matthias and Wiersema, Tobias and Platzner, Marco} }","short":"L.M. Witschen, T. Wiersema, M. Platzner, Fifth Workshop on Approximate Computing (AxC 2020) (n.d.).","ieee":"L. M. Witschen, T. Wiersema, and M. Platzner, “Search Space Characterization for AxC Synthesis,” <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>. .","chicago":"Witschen, Linus Matthias, Tobias Wiersema, and Marco Platzner. “Search Space Characterization for AxC Synthesis.” <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>, n.d.","ama":"Witschen LM, Wiersema T, Platzner M. Search Space Characterization for AxC Synthesis. <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>."},"page":"2","year":"2020","publication_status":"accepted","has_accepted_license":"1","title":"Search Space Characterization for AxC Synthesis","date_created":"2020-12-15T15:13:49Z","author":[{"first_name":"Linus Matthias","last_name":"Witschen","id":"49051","full_name":"Witschen, Linus Matthias"},{"id":"3118","full_name":"Wiersema, Tobias","last_name":"Wiersema","first_name":"Tobias"},{"id":"398","full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"}],"date_updated":"2022-01-06T06:54:35Z","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2020-12-15T15:11:06Z","creator":"witschen","date_created":"2020-12-15T15:11:06Z","file_size":250870,"access_level":"closed","file_id":"20749","file_name":"witschen20_axc.pdf"}],"status":"public","abstract":[{"text":"On the circuit level, the design paradigm Approximate Computing seeks to trade off computational accuracy against a target metric, e.g., energy consumption. This trade-off is possible for many applications due to their inherent resiliency against inaccuracies.\r\nIn the past, several automated approximation frameworks have been presented, which either utilize designated approximation techniques or libraries to replace approximable circuit parts with inaccurate versions. The frameworks invoke a search algorithm to iteratively explore the search space of performance degraded circuits, and validate their quality individually. \r\nIn this paper, we propose to reverse this procedure. Rather than exploring the search space, we delineate the approximate parts of the search space which are guaranteed to lead to valid approximate circuits. Our methodology is supported by formal verification and independent of approximation techniques. Eventually, the user is provided with quality bounds of the individual approximable circuit parts. Consequently, our approach guarantees that any approximate circuit which implements these parts within the determined quality constraints satisfies the global quality constraints, superseding a subsequent quality verification.\r\nIn our experimental results, we present the runtimes of our approach.","lang":"eng"}],"type":"preprint","publication":"Fifth Workshop on Approximate Computing (AxC 2020)","file_date_updated":"2020-12-15T15:11:06Z","language":[{"iso":"eng"}],"ddc":["000"],"user_id":"3118","department":[{"_id":"78"}],"project":[{"name":"SFB 901 - Subproject B4","_id":"12"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901","_id":"1"}],"_id":"20748"},{"status":"public","type":"conference","file_date_updated":"2020-12-16T10:18:50Z","user_id":"23538","department":[{"_id":"79"}],"project":[{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"5","name":"SFB 901 - Subproject A1"},{"_id":"1","name":"SFB 901"}],"_id":"20755","citation":{"ieee":"M. Feldmann, K. Hinnenthal, and C. Scheideler, “Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs,” in <i>Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)</i>, 2020.","chicago":"Feldmann, Michael, Kristian Hinnenthal, and Christian Scheideler. “Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs.” In <i>Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)</i>. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. <a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2020.31\">https://doi.org/10.4230/LIPIcs.OPODIS.2020.31</a>.","ama":"Feldmann M, Hinnenthal K, Scheideler C. Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs. In: <i>Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)</i>. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2020. doi:<a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2020.31\">10.4230/LIPIcs.OPODIS.2020.31</a>","short":"M. Feldmann, K. Hinnenthal, C. Scheideler, in: Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.","bibtex":"@inproceedings{Feldmann_Hinnenthal_Scheideler_2020, title={Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2020.31\">10.4230/LIPIcs.OPODIS.2020.31</a>}, booktitle={Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)}, publisher={Schloss Dagstuhl - Leibniz-Zentrum für Informatik}, author={Feldmann, Michael and Hinnenthal, Kristian and Scheideler, Christian}, year={2020} }","mla":"Feldmann, Michael, et al. “Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs.” <i>Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)</i>, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020, doi:<a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2020.31\">10.4230/LIPIcs.OPODIS.2020.31</a>.","apa":"Feldmann, M., Hinnenthal, K., &#38; Scheideler, C. (2020). Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs. In <i>Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)</i>. Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.OPODIS.2020.31\">https://doi.org/10.4230/LIPIcs.OPODIS.2020.31</a>"},"has_accepted_license":"1","doi":"10.4230/LIPIcs.OPODIS.2020.31","author":[{"last_name":"Feldmann","full_name":"Feldmann, Michael","id":"23538","first_name":"Michael"},{"first_name":"Kristian","full_name":"Hinnenthal, Kristian","id":"32229","last_name":"Hinnenthal"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"date_updated":"2022-01-06T06:54:36Z","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2020-12-16T10:18:50Z","date_created":"2020-12-16T10:18:50Z","creator":"mfeldma2","file_size":867373,"access_level":"closed","file_id":"20756","file_name":"Fast_Hybrid_Network_Algorithms_for_Shortest_Paths_in_Sparse_Graphs.pdf"}],"abstract":[{"lang":"eng","text":"We consider the problem of computing shortest paths in \\emph{hybrid networks}, in which nodes can make use of different communication modes. For example, mobile phones may use ad-hoc connections via Bluetooth or Wi-Fi in addition to the cellular network to solve tasks more efficiently. Like in this case, the different communication modes may differ considerably in range, bandwidth, and flexibility. We build upon the model of Augustine et al. [SODA '20], which captures these differences by a \\emph{local} and a \\emph{global} mode. Specifically, the local edges model a fixed communication network in which $O(1)$ messages of size $O(\\log n)$ can be sent over every edge in each synchronous round. The global edges form a clique, but nodes are only allowed to send and receive a total of at most $O(\\log n)$ messages over global edges, which restricts the nodes to use these edges only very sparsely.\r\n\r\nWe demonstrate the power of hybrid networks by presenting algorithms to compute Single-Source Shortest Paths and the diameter very efficiently in \\emph{sparse graphs}. Specifically, we present exact $O(\\log n)$ time algorithms for cactus graphs (i.e., graphs in which each edge is contained in at most one cycle), and $3$-approximations for graphs that have at most $n + O(n^{1/3})$ edges and arboricity $O(\\log n)$. For these graph classes, our algorithms provide exponentially faster solutions than the best known algorithms for general graphs in this model.\r\nBeyond shortest paths, we also provide a variety of useful tools and techniques for hybrid networks, which may be of independent interest.\r\n"}],"publication":"Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS)","language":[{"iso":"eng"}],"ddc":["000"],"external_id":{"arxiv":["2007.01191"]},"year":"2020","title":"Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs","date_created":"2020-12-16T10:20:18Z","publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik"}]
