[{"type":"mastersthesis","year":"2017","language":[{"iso":"ger"}],"status":"public","date_created":"2017-10-17T12:41:01Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:37Z","_id":"51","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Project Area A","_id":"2"}],"supervisor":[{"first_name":"Burkhard","full_name":"Hehenkamp, Burkhard","last_name":"Hehenkamp","id":"37339"}],"title":"Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse","author":[{"last_name":"Winkelhake","full_name":"Winkelhake, Nikolai","first_name":"Nikolai"}],"department":[{"_id":"280"}],"citation":{"mla":"Winkelhake, Nikolai. <i>Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse</i>. Universität Paderborn, 2017.","bibtex":"@book{Winkelhake_2017, title={Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse}, publisher={Universität Paderborn}, author={Winkelhake, Nikolai}, year={2017} }","short":"N. Winkelhake, Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse, Universität Paderborn, 2017.","apa":"Winkelhake, N. (2017). <i>Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse</i>. Universität Paderborn.","ama":"Winkelhake N. <i>Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse</i>. Universität Paderborn; 2017.","chicago":"Winkelhake, Nikolai. <i>Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse</i>. Universität Paderborn, 2017.","ieee":"N. Winkelhake, <i>Tying und Bundling in digitalen Märkten - eine wettbewerbspolitische Analyse</i>. Universität Paderborn, 2017."},"user_id":"42447"},{"file_date_updated":"2018-11-12T13:23:53Z","_id":"52","date_updated":"2022-01-06T07:01:43Z","publication":"1st Business Model Conference","ddc":["040"],"date_created":"2017-10-17T12:41:01Z","type":"conference_abstract","year":"2017","language":[{"iso":"eng"}],"status":"public","citation":{"chicago":"John, Thomas, and Daniel Szopinski. “Towards Explaining the Popularity of the Business Model Canvas: A Dual-Coding Approach.” In <i>1st Business Model Conference</i>, 2017.","ieee":"T. John and D. Szopinski, “Towards Explaining the Popularity of the Business Model Canvas: A Dual-coding Approach,” in <i>1st Business Model Conference</i>, Venice, Italy, 2017.","ama":"John T, Szopinski D. Towards Explaining the Popularity of the Business Model Canvas: A Dual-coding Approach. In: <i>1st Business Model Conference</i>. ; 2017.","apa":"John, T., &#38; Szopinski, D. (2017). Towards Explaining the Popularity of the Business Model Canvas: A Dual-coding Approach. In <i>1st Business Model Conference</i>. Venice, Italy.","short":"T. John, D. Szopinski, in: 1st Business Model Conference, 2017.","mla":"John, Thomas, and Daniel Szopinski. “Towards Explaining the Popularity of the Business Model Canvas: A Dual-Coding Approach.” <i>1st Business Model Conference</i>, 2017.","bibtex":"@inproceedings{John_Szopinski_2017, title={Towards Explaining the Popularity of the Business Model Canvas: A Dual-coding Approach}, booktitle={1st Business Model Conference}, author={John, Thomas and Szopinski, Daniel}, year={2017} }"},"user_id":"477","department":[{"_id":"276"}],"conference":{"name":"1st Business Model Conference","location":"Venice, Italy"},"title":"Towards Explaining the Popularity of the Business Model Canvas: A Dual-coding Approach","file":[{"file_size":675134,"file_name":"BuMoCo2017_Memorizing.pdf","creator":"dsz","date_created":"2018-11-12T13:23:53Z","access_level":"closed","file_id":"5504","content_type":"application/pdf","relation":"main_file","date_updated":"2018-11-12T13:23:53Z","success":1}],"author":[{"first_name":"Thomas","full_name":"John, Thomas","id":"3952","last_name":"John"},{"full_name":"Szopinski, Daniel","first_name":"Daniel","id":"36372","last_name":"Szopinski"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C5","_id":"17"},{"name":"SFB 901 - Project Area C","_id":"4"}],"has_accepted_license":"1"},{"ddc":["000"],"publication":"2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)","type":"conference","file":[{"success":1,"date_updated":"2018-11-02T14:28:13Z","relation":"main_file","file_id":"5273","access_level":"closed","content_type":"application/pdf","date_created":"2018-11-02T14:28:13Z","creator":"ups","file_size":1021251,"file_name":"sab17ideal.pdf"}],"title":"IDEal: Efficient and Precise Alias-aware Dataflow Analysis","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"user_id":"477","main_file_link":[{"url":" http://bodden.de/pubs/sab17ideal.pdf"}],"keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"publisher":"ACM Press","date_created":"2018-10-31T12:46:50Z","status":"public","year":"2017","language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T14:28:13Z","_id":"5204","date_updated":"2022-01-06T07:01:44Z","author":[{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"full_name":"Ali, Karim","first_name":"Karim","last_name":"Ali"},{"orcid":"0000-0003-3470-3647","first_name":"Eric","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"citation":{"short":"J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.","mla":"Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.","bibtex":"@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017.","ieee":"J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, 2017.","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.","ama":"Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In: <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017."},"department":[{"_id":"76"}]},{"status":"public","language":[{"iso":"eng"}],"type":"journal_article","year":"2017","date_created":"2018-10-31T13:12:32Z","publication":"CoRR","ddc":["000"],"date_updated":"2022-01-06T07:01:46Z","volume":"abs/1710.00390","_id":"5209","file_date_updated":"2018-11-02T16:03:01Z","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"author":[{"first_name":"Andreas","full_name":"Fischer, Andreas","last_name":"Fischer"},{"last_name":"Fuhry","first_name":"Benny","full_name":"Fuhry, Benny"},{"last_name":"Kerschbaum","first_name":"Florian","full_name":"Kerschbaum, Florian"},{"id":"59256","last_name":"Bodden","first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647"}],"file":[{"success":1,"relation":"main_file","date_updated":"2018-11-02T16:03:01Z","date_created":"2018-11-02T16:03:01Z","content_type":"application/pdf","file_id":"5321","access_level":"closed","file_size":2339380,"file_name":"1710.00390.pdf","creator":"ups"}],"title":"Computation on Encrypted Data using Data Flow Authentication","department":[{"_id":"76"}],"main_file_link":[{"url":"https://arxiv.org/pdf/1710.00390.pdf"}],"user_id":"477","citation":{"mla":"Fischer, Andreas, et al. “Computation on Encrypted Data Using Data Flow Authentication.” <i>CoRR</i>, vol. abs/1710.00390, 2017.","bibtex":"@article{Fischer_Fuhry_Kerschbaum_Bodden_2017, title={Computation on Encrypted Data using Data Flow Authentication}, volume={abs/1710.00390}, journal={CoRR}, author={Fischer, Andreas and Fuhry, Benny and Kerschbaum, Florian and Bodden, Eric}, year={2017} }","short":"A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, CoRR abs/1710.00390 (2017).","apa":"Fischer, A., Fuhry, B., Kerschbaum, F., &#38; Bodden, E. (2017). Computation on Encrypted Data using Data Flow Authentication. <i>CoRR</i>, <i>abs/1710.00390</i>.","ama":"Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data using Data Flow Authentication. <i>CoRR</i>. 2017;abs/1710.00390.","chicago":"Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation on Encrypted Data Using Data Flow Authentication.” <i>CoRR</i> abs/1710.00390 (2017).","ieee":"A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted Data using Data Flow Authentication,” <i>CoRR</i>, vol. abs/1710.00390, 2017."}},{"date_updated":"2022-01-06T07:01:49Z","file_date_updated":"2018-11-12T10:30:59Z","_id":"53","language":[{"iso":"eng"}],"year":"2017","type":"conference","status":"public","date_created":"2017-10-17T12:41:01Z","ddc":["330"],"publication":"Proceedings of the 38th International Conference on Information Systems (ICIS)","department":[{"_id":"276"}],"citation":{"short":"J. Neumann, D. Gutt, D. Kundisch, in: Proceedings of the 38th International Conference on Information Systems (ICIS), 2017.","bibtex":"@inproceedings{Neumann_Gutt_Kundisch_2017, title={The Traveling Reviewer Problem – Exploring the Relationship Between Offline Locations and Online Rating Behavior}, booktitle={Proceedings of the 38th International Conference on Information Systems (ICIS)}, author={Neumann, Jürgen and Gutt, Dominik and Kundisch, Dennis}, year={2017} }","mla":"Neumann, Jürgen, et al. “The Traveling Reviewer Problem – Exploring the Relationship Between Offline Locations and Online Rating Behavior.” <i>Proceedings of the 38th International Conference on Information Systems (ICIS)</i>, 2017.","ieee":"J. Neumann, D. Gutt, and D. Kundisch, “The Traveling Reviewer Problem – Exploring the Relationship Between Offline Locations and Online Rating Behavior,” in <i>Proceedings of the 38th International Conference on Information Systems (ICIS)</i>, Seoul, South Korea, 2017.","chicago":"Neumann, Jürgen, Dominik Gutt, and Dennis Kundisch. “The Traveling Reviewer Problem – Exploring the Relationship Between Offline Locations and Online Rating Behavior.” In <i>Proceedings of the 38th International Conference on Information Systems (ICIS)</i>, 2017.","ama":"Neumann J, Gutt D, Kundisch D. The Traveling Reviewer Problem – Exploring the Relationship Between Offline Locations and Online Rating Behavior. In: <i>Proceedings of the 38th International Conference on Information Systems (ICIS)</i>. ; 2017.","apa":"Neumann, J., Gutt, D., &#38; Kundisch, D. (2017). The Traveling Reviewer Problem – Exploring the Relationship Between Offline Locations and Online Rating Behavior. In <i>Proceedings of the 38th International Conference on Information Systems (ICIS)</i>. Seoul, South Korea."},"user_id":"16205","project":[{"_id":"1","name":"SFB 901"},{"_id":"8","name":"SFB 901 - Subprojekt A4"},{"name":"SFB 901 - Project Area A","_id":"2"}],"abstract":[{"lang":"eng","text":"Amongst the growing body of literature on the drivers of online ratings, the influence of\r\ncustomers’ local offline environment on their ratings has largely been neglected. This\r\nstudy examines the relationship between ratings made outside of a customer’s home area\r\nand the magnitude of online ratings. We employ a data-driven identification of a\r\ncustomer’s geographic home area and use variation in this variable to identify the\r\nconsequences for the magnitude of ratings. In line with our theory, we find that customers\r\nwho rate while traveling give, on average, higher ratings than locals. However, this\r\nrelationship is moderated by the posting time of a review relative to consumption, as\r\ntravelers post more negative ratings during or shortly after consumption. These\r\nrelationships are most pronounced for customers who travel and rate less frequently. Our\r\nresults come with substantial implications for a business’s average rating and for\r\ncustomer decision making. "}],"has_accepted_license":"1","title":"The Traveling Reviewer Problem – Exploring the Relationship Between Offline Locations and Online Rating Behavior","conference":{"end_date":"2017-12-13","location":"Seoul, South Korea","start_date":"2017-12-10","name":"38th International Conference on Information Systems (ICIS)"},"file":[{"relation":"main_file","date_updated":"2018-11-12T10:30:59Z","success":1,"creator":"d0mi","file_name":"viewcontent.pdf","file_size":532659,"access_level":"closed","content_type":"application/pdf","file_id":"5486","date_created":"2018-11-12T10:30:59Z"}],"author":[{"full_name":"Neumann, Jürgen","first_name":"Jürgen","last_name":"Neumann","id":"32456"},{"last_name":"Gutt","id":"14368","first_name":"Dominik","full_name":"Gutt, Dominik"},{"last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis","first_name":"Dennis"}]},{"has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"_id":"8","name":"SFB 901 - Subprojekt A4"},{"_id":"2","name":"SFB 901 - Project Area A"}],"author":[{"first_name":"Jürgen","full_name":"Neumann, Jürgen","id":"32456","last_name":"Neumann"},{"full_name":"Gutt, Dominik","first_name":"Dominik","last_name":"Gutt","id":"14368"},{"id":"21117","last_name":"Kundisch","first_name":"Dennis","full_name":"Kundisch, Dennis"}],"file":[{"creator":"d0mi","file_size":694342,"file_name":"WP_TRP.pdf","file_id":"5493","content_type":"application/pdf","access_level":"closed","date_created":"2018-11-12T10:38:39Z","relation":"main_file","date_updated":"2018-11-12T10:38:39Z","success":1}],"conference":{"name":"INFORMS Annual Meeting","location":"Houston, USA"},"title":"The Traveling Reviewer Problem – Exploring the Relationship between Offline Locations and Online Rating Behavior","department":[{"_id":"276"}],"user_id":"477","citation":{"apa":"Neumann, J., Gutt, D., &#38; Kundisch, D. (2017). The Traveling Reviewer Problem – Exploring the Relationship between Offline Locations and Online Rating Behavior. In <i>INFORMS Annual Meeting</i>. Houston, USA.","ama":"Neumann J, Gutt D, Kundisch D. The Traveling Reviewer Problem – Exploring the Relationship between Offline Locations and Online Rating Behavior. In: <i>INFORMS Annual Meeting</i>. ; 2017.","chicago":"Neumann, Jürgen, Dominik Gutt, and Dennis Kundisch. “The Traveling Reviewer Problem – Exploring the Relationship between Offline Locations and Online Rating Behavior.” In <i>INFORMS Annual Meeting</i>, 2017.","ieee":"J. Neumann, D. Gutt, and D. Kundisch, “The Traveling Reviewer Problem – Exploring the Relationship between Offline Locations and Online Rating Behavior,” in <i>INFORMS Annual Meeting</i>, Houston, USA, 2017.","mla":"Neumann, Jürgen, et al. “The Traveling Reviewer Problem – Exploring the Relationship between Offline Locations and Online Rating Behavior.” <i>INFORMS Annual Meeting</i>, 2017.","bibtex":"@inproceedings{Neumann_Gutt_Kundisch_2017, title={The Traveling Reviewer Problem – Exploring the Relationship between Offline Locations and Online Rating Behavior}, booktitle={INFORMS Annual Meeting}, author={Neumann, Jürgen and Gutt, Dominik and Kundisch, Dennis}, year={2017} }","short":"J. Neumann, D. Gutt, D. Kundisch, in: INFORMS Annual Meeting, 2017."},"status":"public","year":"2017","type":"conference_abstract","language":[{"iso":"eng"}],"publication":"INFORMS Annual Meeting","ddc":["330"],"date_created":"2017-10-17T12:41:01Z","date_updated":"2022-01-06T07:01:51Z","_id":"54","file_date_updated":"2018-11-12T10:38:39Z"},{"project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"has_accepted_license":"1","abstract":[{"text":"We introduce the mobile server problem, inspired by current trends to move computational tasks from cloud structures to multiple devices close to the end user. An example for this are embedded systems in autonomous cars that communicate in order to coordinate their actions. Our model is a variant of the classical Page Migration Problem. Moreformally, we consider a mobile server holding a data page.The server can move in the Euclidean space (of arbitrary dimension). In every round, requests for data items from the page pop up at arbitrary points in the space. The requests are served, each at a cost of the distance from the requesting point and the server, and the mobile server may move, at a cost D times the distance traveled for some constant D . We assume a maximum distance m the server is allowed to move per round. We show that no online algorithm can achieve a competitive ratio independent of the length of the input sequence in this setting. Hence we augment the maximum movement distance of the online algorithms to ( 1 + δ) times the maximum distance of the offline solution. We provide a deterministic algorithm which is simple to describe and works for multiple variants of our problem. The algorithm achieves almost tight competitive ratios independent of the length of the input sequence.","lang":"eng"}],"doi":"10.1145/3087556.3087575","title":"The Mobile Server Problem","file":[{"date_created":"2018-11-02T14:55:10Z","content_type":"application/pdf","file_id":"5288","access_level":"closed","file_size":691691,"file_name":"p313-feldkord.pdf","creator":"ups","success":1,"relation":"main_file","date_updated":"2018-11-02T14:55:10Z"}],"user_id":"477","type":"conference","publication":"Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","ddc":["000"],"page":"313-319","author":[{"full_name":"Feldkord, Björn","first_name":"Björn","last_name":"Feldkord","id":"22704"},{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","id":"15523","last_name":"Meyer auf der Heide"}],"department":[{"_id":"63"}],"citation":{"apa":"Feldkord, B., &#38; Meyer auf der Heide, F. (2017). The Mobile Server Problem. In <i>Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i> (pp. 313–319). <a href=\"https://doi.org/10.1145/3087556.3087575\">https://doi.org/10.1145/3087556.3087575</a>","ama":"Feldkord B, Meyer auf der Heide F. The Mobile Server Problem. In: <i>Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. ; 2017:313-319. doi:<a href=\"https://doi.org/10.1145/3087556.3087575\">10.1145/3087556.3087575</a>","ieee":"B. Feldkord and F. Meyer auf der Heide, “The Mobile Server Problem,” in <i>Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2017, pp. 313–319.","chicago":"Feldkord, Björn, and Friedhelm Meyer auf der Heide. “The Mobile Server Problem.” In <i>Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 313–19, 2017. <a href=\"https://doi.org/10.1145/3087556.3087575\">https://doi.org/10.1145/3087556.3087575</a>.","bibtex":"@inproceedings{Feldkord_Meyer auf der Heide_2017, title={The Mobile Server Problem}, DOI={<a href=\"https://doi.org/10.1145/3087556.3087575\">10.1145/3087556.3087575</a>}, booktitle={Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}, author={Feldkord, Björn and Meyer auf der Heide, Friedhelm}, year={2017}, pages={313–319} }","mla":"Feldkord, Björn, and Friedhelm Meyer auf der Heide. “The Mobile Server Problem.” <i>Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2017, pp. 313–19, doi:<a href=\"https://doi.org/10.1145/3087556.3087575\">10.1145/3087556.3087575</a>.","short":"B. Feldkord, F. Meyer auf der Heide, in: Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2017, pp. 313–319."},"language":[{"iso":"eng"}],"year":"2017","status":"public","date_created":"2017-10-17T12:41:02Z","date_updated":"2022-01-06T07:01:56Z","file_date_updated":"2018-11-02T14:55:10Z","_id":"55"},{"date_updated":"2022-01-06T07:02:06Z","_id":"56","file_date_updated":"2018-12-03T15:37:06Z","language":[{"iso":"eng"}],"type":"conference_abstract","year":"2017","status":"public","date_created":"2017-10-17T12:41:02Z","publication":"1st Business Model Conference","ddc":["040"],"department":[{"_id":"276"}],"citation":{"mla":"John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas: A Design Theory.” <i>1st Business Model Conference</i>, 2017.","bibtex":"@inproceedings{John_2017, title={Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory}, booktitle={1st Business Model Conference}, author={John, Thomas}, year={2017} }","short":"T. John, in: 1st Business Model Conference, 2017.","apa":"John, T. (2017). Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory. In <i>1st Business Model Conference</i>. Venice, Italy.","ama":"John T. Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory. In: <i>1st Business Model Conference</i>. ; 2017.","chicago":"John, Thomas. “Supporting Business Model Idea Generation Through Machine-Generated Ideas: A Design Theory.” In <i>1st Business Model Conference</i>, 2017.","ieee":"T. John, “Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory,” in <i>1st Business Model Conference</i>, Venice, Italy, 2017."},"user_id":"477","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"has_accepted_license":"1","title":"Supporting Business Model Idea Generation Through Machine-generated Ideas: A Design Theory","conference":{"name":"1st Business Model Conference","location":"Venice, Italy"},"file":[{"file_name":"BuMoCo2017_Ideagenerator.pdf","file_size":347981,"creator":"abursig","date_created":"2018-12-03T15:37:06Z","content_type":"application/pdf","file_id":"5992","access_level":"closed","date_updated":"2018-12-03T15:37:06Z","relation":"main_file","success":1}],"author":[{"id":"3952","last_name":"John","full_name":"John, Thomas","first_name":"Thomas"}]},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"14","name":"SFB 901 - Subprojekt C2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"abstract":[{"text":"Heterogeneous compute nodes in form of CPUs with attached GPU and FPGA accelerators have strongly gained interested in the last years. Applications differ in their execution characteristics and can therefore benefit from such heterogeneous resources in terms of performance or energy consumption. While performance optimization has been the only goal for a long time, nowadays research is more and more focusing on techniques to minimize energy consumption due to rising electricity costs.This paper presents reMinMin, a novel static list scheduling approach for optimizing the total energy consumption for a set of tasks executed on a heterogeneous compute node. reMinMin bases on a new energy model that differentiates between static and dynamic energy components and covers effects of accelerator tasks on the host CPU. The required energy values are retrieved by measurements on the real computing system. In order to evaluate reMinMin, we compare it with two reference implementations on three task sets with different degrees of heterogeneity. In our experiments, MinMin is consistently better than a scheduler optimizing for dynamic energy only, which requires up to 19.43% more energy, and very close to optimal schedules.","lang":"eng"}],"has_accepted_license":"1","doi":"10.1109/ASAP.2017.7995272","title":"reMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements","file":[{"file_name":"loesch_asap2017.pdf","file_size":467545,"creator":"aloesch","date_created":"2018-11-14T09:37:55Z","content_type":"application/pdf","access_level":"closed","file_id":"5550","date_updated":"2018-11-14T09:37:55Z","relation":"main_file","success":1}],"author":[{"first_name":"Achim","full_name":"Lösch, Achim","last_name":"Lösch","id":"43646"},{"full_name":"Platzner, Marco","first_name":"Marco","id":"398","last_name":"Platzner"}],"department":[{"_id":"78"}],"citation":{"mla":"Lösch, Achim, and Marco Platzner. “ReMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements.” <i>Proceedings of the 28th Annual IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP)</i>, 2017, doi:<a href=\"https://doi.org/10.1109/ASAP.2017.7995272\">10.1109/ASAP.2017.7995272</a>.","bibtex":"@inproceedings{Lösch_Platzner_2017, title={reMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements}, DOI={<a href=\"https://doi.org/10.1109/ASAP.2017.7995272\">10.1109/ASAP.2017.7995272</a>}, booktitle={Proceedings of the 28th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)}, author={Lösch, Achim and Platzner, Marco}, year={2017} }","short":"A. Lösch, M. Platzner, in: Proceedings of the 28th Annual IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP), 2017.","ama":"Lösch A, Platzner M. reMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements. In: <i>Proceedings of the 28th Annual IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1109/ASAP.2017.7995272\">10.1109/ASAP.2017.7995272</a>","apa":"Lösch, A., &#38; Platzner, M. (2017). reMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements. In <i>Proceedings of the 28th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)</i>. <a href=\"https://doi.org/10.1109/ASAP.2017.7995272\">https://doi.org/10.1109/ASAP.2017.7995272</a>","chicago":"Lösch, Achim, and Marco Platzner. “ReMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements.” In <i>Proceedings of the 28th Annual IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP)</i>, 2017. <a href=\"https://doi.org/10.1109/ASAP.2017.7995272\">https://doi.org/10.1109/ASAP.2017.7995272</a>.","ieee":"A. Lösch and M. Platzner, “reMinMin: A Novel Static Energy-Centric List Scheduling Approach Based on Real Measurements,” in <i>Proceedings of the 28th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)</i>, 2017."},"user_id":"477","year":"2017","type":"conference","language":[{"iso":"eng"}],"status":"public","publication":"Proceedings of the 28th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)","ddc":["040"],"date_created":"2017-10-17T12:41:04Z","date_updated":"2022-01-06T07:03:08Z","file_date_updated":"2018-11-14T09:37:55Z","_id":"65"},{"author":[{"first_name":"Maximilian","full_name":"Drees, Maximilian","last_name":"Drees"},{"orcid":"0000-0003-1348-6516","id":"14052","last_name":"Feldotto","full_name":"Feldotto, Matthias","first_name":"Matthias"},{"last_name":"Riechers","first_name":"Sören","full_name":"Riechers, Sören"},{"id":"40384","last_name":"Skopalik","first_name":"Alexander","full_name":"Skopalik, Alexander"}],"citation":{"ama":"Drees M, Feldotto M, Riechers S, Skopalik A. Pure Nash Equilibria in Restricted Budget Games. In: <i>Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)</i>. LNCS. ; 2017:175--187. doi:<a href=\"https://doi.org/10.1007/978-3-319-62389-4_15\">10.1007/978-3-319-62389-4_15</a>","apa":"Drees, M., Feldotto, M., Riechers, S., &#38; Skopalik, A. (2017). Pure Nash Equilibria in Restricted Budget Games. In <i>Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)</i> (pp. 175--187). <a href=\"https://doi.org/10.1007/978-3-319-62389-4_15\">https://doi.org/10.1007/978-3-319-62389-4_15</a>","chicago":"Drees, Maximilian, Matthias Feldotto, Sören Riechers, and Alexander Skopalik. “Pure Nash Equilibria in Restricted Budget Games.” In <i>Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)</i>, 175--187. LNCS, 2017. <a href=\"https://doi.org/10.1007/978-3-319-62389-4_15\">https://doi.org/10.1007/978-3-319-62389-4_15</a>.","ieee":"M. Drees, M. Feldotto, S. Riechers, and A. Skopalik, “Pure Nash Equilibria in Restricted Budget Games,” in <i>Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)</i>, 2017, pp. 175--187.","mla":"Drees, Maximilian, et al. “Pure Nash Equilibria in Restricted Budget Games.” <i>Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)</i>, 2017, pp. 175--187, doi:<a href=\"https://doi.org/10.1007/978-3-319-62389-4_15\">10.1007/978-3-319-62389-4_15</a>.","bibtex":"@inproceedings{Drees_Feldotto_Riechers_Skopalik_2017, series={LNCS}, title={Pure Nash Equilibria in Restricted Budget Games}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-62389-4_15\">10.1007/978-3-319-62389-4_15</a>}, booktitle={Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)}, author={Drees, Maximilian and Feldotto, Matthias and Riechers, Sören and Skopalik, Alexander}, year={2017}, pages={175--187}, collection={LNCS} }","short":"M. Drees, M. Feldotto, S. Riechers, A. Skopalik, in: Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON), 2017, pp. 175--187."},"series_title":"LNCS","department":[{"_id":"541"},{"_id":"63"}],"date_created":"2017-10-17T12:41:04Z","status":"public","language":[{"iso":"eng"}],"year":"2017","_id":"66","file_date_updated":"2018-10-31T16:58:42Z","date_updated":"2022-01-06T07:03:13Z","file":[{"relation":"main_file","date_updated":"2018-10-31T16:58:42Z","success":1,"file_name":"Drees2017_Chapter_PureNashEquilibriaInRestricted.pdf","file_size":346390,"creator":"feldi","date_created":"2018-10-31T16:58:42Z","access_level":"closed","file_id":"5228","content_type":"application/pdf"}],"title":"Pure Nash Equilibria in Restricted Budget Games","doi":"10.1007/978-3-319-62389-4_15","abstract":[{"text":"In budget games, players compete over resources with finite budgets. For every resource, a player has a specific demand and as a strategy, he chooses a subset of resources. If the total demand on a resource does not exceed its budget, the utility of each player who chose that resource equals his demand. Otherwise, the budget is shared proportionally. In the general case, pure Nash equilibria (NE) do not exist for such games. In this paper, we consider the natural classes of singleton and matroid budget games with additional constraints and show that for each, pure NE can be guaranteed. In addition, we introduce a lexicographical potential function to prove that every matroid budget game has an approximate pure NE which depends on the largest ratio between the different demands of each individual player.","lang":"eng"}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"7","name":"SFB 901 - Subprojekt A3"},{"name":"SFB 901 - Subproject C4","_id":"16"},{"name":"SFB 901 - Project Area A","_id":"2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"user_id":"14052","publication":"Proceedings of the 23rd International Computing and Combinatorics Conference (COCOON)","ddc":["000"],"type":"conference","page":"175--187"},{"_id":"67","date_updated":"2022-01-06T07:03:15Z","date_created":"2017-10-17T12:41:04Z","publisher":"Universität Paderborn","year":"2017","type":"bachelorsthesis","status":"public","citation":{"short":"M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications, Universität Paderborn, 2017.","bibtex":"@book{Jürgens_2017, title={Provably Secure Key-Derivation-Functions for Certain Types of Applications}, publisher={Universität Paderborn}, author={Jürgens, Mirko}, year={2017} }","mla":"Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","ieee":"M. Jürgens, <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","chicago":"Jürgens, Mirko. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn, 2017.","ama":"Jürgens M. <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn; 2017.","apa":"Jürgens, M. (2017). <i>Provably Secure Key-Derivation-Functions for Certain Types of Applications</i>. Universität Paderborn."},"user_id":"477","department":[{"_id":"64"}],"title":"Provably Secure Key-Derivation-Functions for Certain Types of Applications","author":[{"first_name":"Mirko","full_name":"Jürgens, Mirko","last_name":"Jürgens"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}]},{"file":[{"success":1,"date_updated":"2018-11-02T16:08:17Z","relation":"main_file","content_type":"application/pdf","file_id":"5324","access_level":"closed","date_created":"2018-11-02T16:08:17Z","creator":"ups","file_name":"a61-isenberg.pdf","file_size":806356}],"title":"Proof-Carrying Hardware via Inductive Invariants","has_accepted_license":"1","abstract":[{"lang":"eng","text":"Proof-carrying hardware (PCH) is a principle for achieving safety for dynamically reconfigurable hardware systems. The producer of a hardware module spends huge effort when creating a proof for a safety policy. The proof is then transferred as a certificate together with the configuration bitstream to the consumer of the hardware module, who can quickly verify the given proof. Previous work utilized SAT solvers and resolution traces to set up a PCH technology and corresponding tool flows. In this article, we present a novel technology for PCH based on inductive invariants. For sequential circuits, our approach is fundamentally stronger than the previous SAT-based one since we avoid the limitations of bounded unrolling. We contrast our technology to existing ones and show that it fits into previously proposed tool flows. We conduct experiments with four categories of benchmark circuits and report consumer and producer runtime and peak memory consumption, as well as the size of the certificates and the distribution of the workload between producer and consumer. Experiments clearly show that our new induction-based technology is superior for sequential circuits, whereas the previous SAT-based technology is the better choice for combinational circuits."}],"doi":"10.1145/3054743","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"user_id":"3118","ddc":["000"],"publication":"ACM Transactions on Design Automation of Electronic Systems","type":"journal_article","page":"61:1--61:23","issue":"4","author":[{"last_name":"Isenberg","first_name":"Tobias","full_name":"Isenberg, Tobias"},{"id":"398","last_name":"Platzner","first_name":"Marco","full_name":"Platzner, Marco"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"},{"last_name":"Wiersema","id":"3118","full_name":"Wiersema, Tobias","first_name":"Tobias"}],"citation":{"short":"T. Isenberg, M. Platzner, H. Wehrheim, T. Wiersema, ACM Transactions on Design Automation of Electronic Systems (2017) 61:1--61:23.","bibtex":"@article{Isenberg_Platzner_Wehrheim_Wiersema_2017, title={Proof-Carrying Hardware via Inductive Invariants}, DOI={<a href=\"https://doi.org/10.1145/3054743\">10.1145/3054743</a>}, number={4}, journal={ACM Transactions on Design Automation of Electronic Systems}, publisher={ACM}, author={Isenberg, Tobias and Platzner, Marco and Wehrheim, Heike and Wiersema, Tobias}, year={2017}, pages={61:1--61:23} }","mla":"Isenberg, Tobias, et al. “Proof-Carrying Hardware via Inductive Invariants.” <i>ACM Transactions on Design Automation of Electronic Systems</i>, no. 4, ACM, 2017, pp. 61:1--61:23, doi:<a href=\"https://doi.org/10.1145/3054743\">10.1145/3054743</a>.","ieee":"T. Isenberg, M. Platzner, H. Wehrheim, and T. Wiersema, “Proof-Carrying Hardware via Inductive Invariants,” <i>ACM Transactions on Design Automation of Electronic Systems</i>, no. 4, pp. 61:1--61:23, 2017.","chicago":"Isenberg, Tobias, Marco Platzner, Heike Wehrheim, and Tobias Wiersema. “Proof-Carrying Hardware via Inductive Invariants.” <i>ACM Transactions on Design Automation of Electronic Systems</i>, no. 4 (2017): 61:1--61:23. <a href=\"https://doi.org/10.1145/3054743\">https://doi.org/10.1145/3054743</a>.","ama":"Isenberg T, Platzner M, Wehrheim H, Wiersema T. Proof-Carrying Hardware via Inductive Invariants. <i>ACM Transactions on Design Automation of Electronic Systems</i>. 2017;(4):61:1--61:23. doi:<a href=\"https://doi.org/10.1145/3054743\">10.1145/3054743</a>","apa":"Isenberg, T., Platzner, M., Wehrheim, H., &#38; Wiersema, T. (2017). Proof-Carrying Hardware via Inductive Invariants. <i>ACM Transactions on Design Automation of Electronic Systems</i>, (4), 61:1--61:23. <a href=\"https://doi.org/10.1145/3054743\">https://doi.org/10.1145/3054743</a>"},"department":[{"_id":"77"},{"_id":"78"}],"publisher":"ACM","date_created":"2017-10-17T12:41:04Z","status":"public","language":[{"iso":"eng"}],"year":"2017","_id":"68","file_date_updated":"2018-11-02T16:08:17Z","date_updated":"2022-01-06T07:03:20Z"},{"year":"2017","type":"dissertation","status":"public","ddc":["040"],"date_created":"2017-11-13T08:13:29Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:22Z","file_date_updated":"2018-03-14T12:26:52Z","_id":"685","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"supervisor":[{"full_name":"Wehrheim, Heike","first_name":"Heike","id":"573","last_name":"Wehrheim"}],"doi":"10.17619/UNIPB/1-104","has_accepted_license":"1","title":"On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring","author":[{"last_name":"Jakobs","full_name":"Jakobs, Marie-Christine","first_name":"Marie-Christine"}],"file":[{"relation":"main_file","date_updated":"2018-03-14T12:26:52Z","success":1,"file_size":11828624,"file_name":"685-Dissertation-Jakobs.pdf","creator":"florida","date_created":"2018-03-14T12:26:52Z","file_id":"1211","access_level":"closed","content_type":"application/pdf"}],"department":[{"_id":"77"}],"citation":{"short":"M.-C. Jakobs, On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring, Universität Paderborn, 2017.","bibtex":"@book{Jakobs_2017, title={On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-104\">10.17619/UNIPB/1-104</a>}, publisher={Universität Paderborn}, author={Jakobs, Marie-Christine}, year={2017} }","mla":"Jakobs, Marie-Christine. <i>On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-104\">10.17619/UNIPB/1-104</a>.","ieee":"M.-C. Jakobs, <i>On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring</i>. Universität Paderborn, 2017.","chicago":"Jakobs, Marie-Christine. <i>On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-104\">https://doi.org/10.17619/UNIPB/1-104</a>.","apa":"Jakobs, M.-C. (2017). <i>On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-104\">https://doi.org/10.17619/UNIPB/1-104</a>","ama":"Jakobs M-C. <i>On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-104\">10.17619/UNIPB/1-104</a>"},"user_id":"477"},{"author":[{"last_name":"Jakobs","first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine"},{"id":"573","last_name":"Wehrheim","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"citation":{"short":"M.-C. Jakobs, H. Wehrheim, ACM Transactions on Programming Languages and Systems (2017) 7:1-7:56.","mla":"Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs: A Framework for the Safe Execution of Untrusted Software.” <i>ACM Transactions on Programming Languages and Systems</i>, no. 2, ACM, 2017, pp. 7:1-7:56, doi:<a href=\"https://doi.org/10.1145/3014427\">10.1145/3014427</a>.","bibtex":"@article{Jakobs_Wehrheim_2017, title={Programs from Proofs: A Framework for the Safe Execution of Untrusted Software}, DOI={<a href=\"https://doi.org/10.1145/3014427\">10.1145/3014427</a>}, number={2}, journal={ACM Transactions on Programming Languages and Systems}, publisher={ACM}, author={Jakobs, Marie-Christine and Wehrheim, Heike}, year={2017}, pages={7:1-7:56} }","chicago":"Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs: A Framework for the Safe Execution of Untrusted Software.” <i>ACM Transactions on Programming Languages and Systems</i>, no. 2 (2017): 7:1-7:56. <a href=\"https://doi.org/10.1145/3014427\">https://doi.org/10.1145/3014427</a>.","ieee":"M.-C. Jakobs and H. Wehrheim, “Programs from Proofs: A Framework for the Safe Execution of Untrusted Software,” <i>ACM Transactions on Programming Languages and Systems</i>, no. 2, pp. 7:1-7:56, 2017.","ama":"Jakobs M-C, Wehrheim H. Programs from Proofs: A Framework for the Safe Execution of Untrusted Software. <i>ACM Transactions on Programming Languages and Systems</i>. 2017;(2):7:1-7:56. doi:<a href=\"https://doi.org/10.1145/3014427\">10.1145/3014427</a>","apa":"Jakobs, M.-C., &#38; Wehrheim, H. (2017). Programs from Proofs: A Framework for the Safe Execution of Untrusted Software. <i>ACM Transactions on Programming Languages and Systems</i>, (2), 7:1-7:56. <a href=\"https://doi.org/10.1145/3014427\">https://doi.org/10.1145/3014427</a>"},"status":"public","language":[{"iso":"eng"}],"year":"2017","publisher":"ACM","date_created":"2017-10-17T12:41:04Z","date_updated":"2022-01-06T07:03:23Z","_id":"69","file_date_updated":"2018-03-21T13:15:09Z","doi":"10.1145/3014427","abstract":[{"lang":"eng","text":"Today, software is traded worldwide on global markets, with apps being downloaded to smartphones within minutes or seconds. This poses, more than ever, the challenge of ensuring safety of software in the face of (1) unknown or untrusted software providers together with (2) resource-limited software consumers. The concept of Proof-Carrying Code (PCC), years ago suggested by Necula, provides one framework for securing the execution of untrusted code. PCC techniques attach safety proofs, constructed by software producers, to code. Based on the assumption that checking proofs is usually much simpler than constructing proofs, software consumers should thus be able to quickly check the safety of software. However, PCC techniques often suffer from the size of certificates (i.e., the attached proofs), making PCC techniques inefficient in practice.In this article, we introduce a new framework for the safe execution of untrusted code called Programs from Proofs (PfP). The basic assumption underlying the PfP technique is the fact that the structure of programs significantly influences the complexity of checking a specific safety property. Instead of attaching proofs to program code, the PfP technique transforms the program into an efficiently checkable form, thus guaranteeing quick safety checks for software consumers. For this transformation, the technique also uses a producer-side automatic proof of safety. More specifically, safety proving for the software producer proceeds via the construction of an abstract reachability graph (ARG) unfolding the control-flow automaton (CFA) up to the degree necessary for simple checking. To this end, we combine different sorts of software analysis: expensive analyses incrementally determining the degree of unfolding, and cheap analyses responsible for safety checking. Out of the abstract reachability graph we generate the new program. In its CFA structure, it is isomorphic to the graph and hence another, this time consumer-side, cheap analysis can quickly determine its safety.Like PCC, Programs from Proofs is a general framework instantiable with different sorts of (expensive and cheap) analysis. Here, we present the general framework and exemplify it by some concrete examples. We have implemented different instantiations on top of the configurable program analysis tool CPAchecker and report on experiments, in particular on comparisons with PCC techniques."}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"}],"file":[{"success":1,"date_updated":"2018-03-21T13:15:09Z","relation":"main_file","access_level":"closed","file_id":"1575","content_type":"application/pdf","date_created":"2018-03-21T13:15:09Z","creator":"florida","file_name":"69-a7-jakobs.pdf","file_size":1215139}],"title":"Programs from Proofs: A Framework for the Safe Execution of Untrusted Software","user_id":"477","type":"journal_article","publication":"ACM Transactions on Programming Languages and Systems","ddc":["040"],"issue":"2","page":"7:1-7:56"},{"publisher":"Universität Paderborn","date_created":"2017-11-14T06:58:39Z","status":"public","language":[{"iso":"ger"}],"type":"bachelorsthesis","year":"2017","_id":"696","date_updated":"2022-01-06T07:03:24Z","author":[{"first_name":"Lennart","full_name":"Wachowiak, Lennart","last_name":"Wachowiak"}],"title":"Das Mobile Server Problem in Netzwerken","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"user_id":"477","citation":{"bibtex":"@book{Wachowiak_2017, title={Das Mobile Server Problem in Netzwerken}, publisher={Universität Paderborn}, author={Wachowiak, Lennart}, year={2017} }","mla":"Wachowiak, Lennart. <i>Das Mobile Server Problem in Netzwerken</i>. Universität Paderborn, 2017.","short":"L. Wachowiak, Das Mobile Server Problem in Netzwerken, Universität Paderborn, 2017.","apa":"Wachowiak, L. (2017). <i>Das Mobile Server Problem in Netzwerken</i>. Universität Paderborn.","ama":"Wachowiak L. <i>Das Mobile Server Problem in Netzwerken</i>. Universität Paderborn; 2017.","ieee":"L. Wachowiak, <i>Das Mobile Server Problem in Netzwerken</i>. Universität Paderborn, 2017.","chicago":"Wachowiak, Lennart. <i>Das Mobile Server Problem in Netzwerken</i>. Universität Paderborn, 2017."}},{"project":[{"name":"SFB 901","_id":"1"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"author":[{"last_name":"Burkhardt","first_name":"Michel","full_name":"Burkhardt, Michel"}],"title":"Untersuchungen zum Cone-Hashing","user_id":"477","citation":{"chicago":"Burkhardt, Michel. <i>Untersuchungen zum Cone-Hashing</i>. Universität Paderborn, 2017.","ieee":"M. Burkhardt, <i>Untersuchungen zum Cone-Hashing</i>. Universität Paderborn, 2017.","ama":"Burkhardt M. <i>Untersuchungen zum Cone-Hashing</i>. Universität Paderborn; 2017.","apa":"Burkhardt, M. (2017). <i>Untersuchungen zum Cone-Hashing</i>. Universität Paderborn.","short":"M. Burkhardt, Untersuchungen zum Cone-Hashing, Universität Paderborn, 2017.","mla":"Burkhardt, Michel. <i>Untersuchungen zum Cone-Hashing</i>. Universität Paderborn, 2017.","bibtex":"@book{Burkhardt_2017, title={Untersuchungen zum Cone-Hashing}, publisher={Universität Paderborn}, author={Burkhardt, Michel}, year={2017} }"},"status":"public","language":[{"iso":"ger"}],"type":"bachelorsthesis","year":"2017","publisher":"Universität Paderborn","date_created":"2017-11-14T08:01:41Z","date_updated":"2022-01-06T07:03:24Z","_id":"697"},{"citation":{"chicago":"Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","ieee":"D. Diemert, <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","ama":"Diemert D. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn; 2017.","apa":"Diemert, D. (2017). <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn.","short":"D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers, Universität Paderborn, 2017.","mla":"Diemert, Denis. <i>EAX - An Authenticated Encryption Mode for Block Ciphers</i>. Universität Paderborn, 2017.","bibtex":"@book{Diemert_2017, title={EAX - An Authenticated Encryption Mode for Block Ciphers}, publisher={Universität Paderborn}, author={Diemert, Denis}, year={2017} }"},"user_id":"477","department":[{"_id":"64"}],"title":"EAX - An Authenticated Encryption Mode for Block Ciphers","author":[{"last_name":"Diemert","first_name":"Denis","full_name":"Diemert, Denis"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"supervisor":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"}],"_id":"104","date_updated":"2022-01-06T06:50:38Z","date_created":"2017-10-17T12:41:11Z","publisher":"Universität Paderborn","year":"2017","type":"bachelorsthesis","status":"public"},{"user_id":"477","citation":{"ama":"Schenk A. <i>Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen</i>. Universität Paderborn; 2017.","apa":"Schenk, A. (2017). <i>Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen</i>. Universität Paderborn.","ieee":"A. Schenk, <i>Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen</i>. Universität Paderborn, 2017.","chicago":"Schenk, Andreas. <i>Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen</i>. Universität Paderborn, 2017.","bibtex":"@book{Schenk_2017, title={Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen}, publisher={Universität Paderborn}, author={Schenk, Andreas}, year={2017} }","mla":"Schenk, Andreas. <i>Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen</i>. Universität Paderborn, 2017.","short":"A. Schenk, Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen, Universität Paderborn, 2017."},"project":[{"name":"SFB 901","_id":"1"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"author":[{"first_name":"Andreas","full_name":"Schenk, Andreas","last_name":"Schenk"}],"title":"Monotone Suchbarkeit in mehrdimensionalen verteilten Datenstrukturen","date_updated":"2022-01-06T06:50:41Z","_id":"1048","status":"public","year":"2017","type":"bachelorsthesis","language":[{"iso":"ger"}],"publisher":"Universität Paderborn","date_created":"2017-12-13T10:14:30Z"},{"user_id":"477","citation":{"ieee":"B. Beckendorfer, <i>Visualisierung zu Algorithmen verteilter Netzwerksysteme</i>. Universität Paderborn, 2017.","chicago":"Beckendorfer, Björn. <i>Visualisierung zu Algorithmen verteilter Netzwerksysteme</i>. Universität Paderborn, 2017.","apa":"Beckendorfer, B. (2017). <i>Visualisierung zu Algorithmen verteilter Netzwerksysteme</i>. Universität Paderborn.","ama":"Beckendorfer B. <i>Visualisierung zu Algorithmen verteilter Netzwerksysteme</i>. Universität Paderborn; 2017.","short":"B. Beckendorfer, Visualisierung zu Algorithmen verteilter Netzwerksysteme, Universität Paderborn, 2017.","bibtex":"@book{Beckendorfer_2017, title={Visualisierung zu Algorithmen verteilter Netzwerksysteme}, publisher={Universität Paderborn}, author={Beckendorfer, Björn}, year={2017} }","mla":"Beckendorfer, Björn. <i>Visualisierung zu Algorithmen verteilter Netzwerksysteme</i>. Universität Paderborn, 2017."},"author":[{"last_name":"Beckendorfer","full_name":"Beckendorfer, Björn","first_name":"Björn"}],"title":"Visualisierung zu Algorithmen verteilter Netzwerksysteme","project":[{"_id":"1","name":"SFB 901"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A1","_id":"5"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"1049","date_updated":"2022-01-06T06:50:42Z","publisher":"Universität Paderborn","date_created":"2017-12-13T10:17:43Z","status":"public","language":[{"iso":"ger"}],"year":"2017","type":"bachelorsthesis"},{"language":[{"iso":"eng"}],"year":"2017","status":"public","date_created":"2017-10-17T12:41:12Z","date_updated":"2022-01-06T06:50:42Z","_id":"105","file_date_updated":"2018-03-13T09:23:11Z","author":[{"last_name":"Gmyr","full_name":"Gmyr, Robert","first_name":"Robert"},{"first_name":"Kristian","full_name":"Hinnenthal, Kristian","last_name":"Hinnenthal","id":"32229"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"},{"last_name":"Sohler","full_name":"Sohler, Christian","first_name":"Christian"}],"department":[{"_id":"79"}],"citation":{"apa":"Gmyr, R., Hinnenthal, K., Scheideler, C., &#38; Sohler, C. (2017). Distributed Monitoring of Network Properties: The Power of Hybrid Networks. In <i>Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP)</i> (pp. 137:1--137:15). <a href=\"https://doi.org/10.4230/LIPIcs.ICALP.2017.137\">https://doi.org/10.4230/LIPIcs.ICALP.2017.137</a>","ama":"Gmyr R, Hinnenthal K, Scheideler C, Sohler C. Distributed Monitoring of Network Properties: The Power of Hybrid Networks. In: <i>Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP)</i>. Leibniz International Proceedings in Informatics (LIPIcs). ; 2017:137:1--137:15. doi:<a href=\"https://doi.org/10.4230/LIPIcs.ICALP.2017.137\">10.4230/LIPIcs.ICALP.2017.137</a>","chicago":"Gmyr, Robert, Kristian Hinnenthal, Christian Scheideler, and Christian Sohler. “Distributed Monitoring of Network Properties: The Power of Hybrid Networks.” In <i>Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP)</i>, 137:1--137:15. Leibniz International Proceedings in Informatics (LIPIcs), 2017. <a href=\"https://doi.org/10.4230/LIPIcs.ICALP.2017.137\">https://doi.org/10.4230/LIPIcs.ICALP.2017.137</a>.","ieee":"R. Gmyr, K. Hinnenthal, C. Scheideler, and C. Sohler, “Distributed Monitoring of Network Properties: The Power of Hybrid Networks,” in <i>Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP)</i>, 2017, pp. 137:1--137:15.","mla":"Gmyr, Robert, et al. “Distributed Monitoring of Network Properties: The Power of Hybrid Networks.” <i>Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP)</i>, 2017, pp. 137:1--137:15, doi:<a href=\"https://doi.org/10.4230/LIPIcs.ICALP.2017.137\">10.4230/LIPIcs.ICALP.2017.137</a>.","bibtex":"@inproceedings{Gmyr_Hinnenthal_Scheideler_Sohler_2017, series={Leibniz International Proceedings in Informatics (LIPIcs)}, title={Distributed Monitoring of Network Properties: The Power of Hybrid Networks}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.ICALP.2017.137\">10.4230/LIPIcs.ICALP.2017.137</a>}, booktitle={Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP)}, author={Gmyr, Robert and Hinnenthal, Kristian and Scheideler, Christian and Sohler, Christian}, year={2017}, pages={137:1--137:15}, collection={Leibniz International Proceedings in Informatics (LIPIcs)} }","short":"R. Gmyr, K. Hinnenthal, C. Scheideler, C. Sohler, in: Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP), 2017, pp. 137:1--137:15."},"series_title":"Leibniz International Proceedings in Informatics (LIPIcs)","type":"conference","publication":"Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP)","ddc":["040"],"page":"137:1--137:15","project":[{"_id":"1","name":"SFB 901"},{"_id":"2","name":"SFB 901 - Project Area A"},{"_id":"5","name":"SFB 901 - Subproject A1"}],"has_accepted_license":"1","doi":"10.4230/LIPIcs.ICALP.2017.137","abstract":[{"text":"We initiate the study of network monitoring algorithms in a class of hybrid networks in which the nodes are connected by an external network and an internal network (as a short form for externally and internally controlled network). While the external network lies outside of the control of the nodes (or in our case, the monitoring protocol running in them) and might be exposed to continuous changes, the internal network is fully under the control of the nodes. As an example, consider a group of users with mobile devices having access to the cell phone infrastructure. While the network formed by the WiFi connections of the devices is an external network (as its structure is not necessarily under the control of the monitoring protocol), the connections between the devices via the cell phone infrastructure represent an internal network (as it can be controlled by the monitoring protocol). Our goal is to continuously monitor properties of the external network with the help of the internal network. We present scalable distributed algorithms that efficiently monitor the number of edges, the average node degree, the clustering coefficient, the bipartiteness, and the weight of a minimum spanning tree. Their performance bounds demonstrate that monitoring the external network state with the help of an internal network can be done much more efficiently than just using the external network, as is usually done in the literature.","lang":"eng"}],"title":"Distributed Monitoring of Network Properties: The Power of Hybrid Networks","file":[{"file_id":"1207","access_level":"closed","content_type":"application/pdf","date_created":"2018-03-13T09:23:11Z","creator":"florida","file_size":504161,"file_name":"105-ICALP17-GHSS.pdf","success":1,"relation":"main_file","date_updated":"2018-03-13T09:23:11Z"}],"user_id":"20792"}]
