---
_id: '185'
author:
- first_name: Christopher
  full_name: Schmidt, Christopher
  last_name: Schmidt
citation:
  ama: Schmidt C. <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i> Universität
    Paderborn; 2016.
  apa: Schmidt, C. (2016). <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i>
    Universität Paderborn.
  bibtex: '@book{Schmidt_2016, title={Kundenbewertungen im Online-Handel – Alles Betrug?},
    publisher={Universität Paderborn}, author={Schmidt, Christopher}, year={2016}
    }'
  chicago: Schmidt, Christopher. <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i>
    Universität Paderborn, 2016.
  ieee: C. Schmidt, <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i> Universität
    Paderborn, 2016.
  mla: Schmidt, Christopher. <i>Kundenbewertungen im Online-Handel – Alles Betrug?</i>
    Universität Paderborn, 2016.
  short: C. Schmidt, Kundenbewertungen im Online-Handel – Alles Betrug?, Universität
    Paderborn, 2016.
date_created: 2017-10-17T12:41:28Z
date_updated: 2022-01-06T06:53:36Z
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '8'
  name: SFB 901 - Subprojekt A4
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Kundenbewertungen im Online-Handel – Alles Betrug?
type: bachelorsthesis
user_id: '477'
year: '2016'
...
---
_id: '186'
abstract:
- lang: eng
  text: Software verification is an established method to ensure software safety.
    Nevertheless, verification still often fails, either because it consumes too much
    resources, e.g., time or memory, or the technique is not mature enough to verify
    the property. Often then discarding the partial verification, the validation process
    proceeds with techniques like testing.To enable standard testing to profit from
    previous, partial verification, we use a summary of the verification effort to
    simplify the program for subsequent testing. Our techniques use this summary to
    construct a residual program which only contains program paths with unproven assertions.
    Afterwards, the residual program can be used with standard testing tools.Our first
    experiments show that testing profits from the partial verification.The test effort
    is reduced and combined verification and testing is faster than a complete verification.
author:
- first_name: Mike
  full_name: Czech, Mike
  last_name: Czech
- first_name: Marie-Christine
  full_name: Jakobs, Marie-Christine
  last_name: Jakobs
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Czech M, Jakobs M-C, Wehrheim H. Just test what you cannot verify! In: Jens
    Knoop UZ, ed. <i>Software Engineering 2016</i>. Lecture Notes in Informatics.
    ; 2016:17-18.'
  apa: Czech, M., Jakobs, M.-C., &#38; Wehrheim, H. (2016). Just test what you cannot
    verify! In U. Z. Jens Knoop (Ed.), <i>Software Engineering 2016</i> (pp. 17–18).
  bibtex: '@inproceedings{Czech_Jakobs_Wehrheim_2016, series={Lecture Notes in Informatics},
    title={Just test what you cannot verify!}, booktitle={Software Engineering 2016},
    author={Czech, Mike and Jakobs, Marie-Christine and Wehrheim, Heike}, editor={Jens
    Knoop, Uwe ZdunEditor}, year={2016}, pages={17–18}, collection={Lecture Notes
    in Informatics} }'
  chicago: Czech, Mike, Marie-Christine Jakobs, and Heike Wehrheim. “Just Test What
    You Cannot Verify!” In <i>Software Engineering 2016</i>, edited by Uwe Zdun Jens
    Knoop, 17–18. Lecture Notes in Informatics, 2016.
  ieee: M. Czech, M.-C. Jakobs, and H. Wehrheim, “Just test what you cannot verify!,”
    in <i>Software Engineering 2016</i>, 2016, pp. 17–18.
  mla: Czech, Mike, et al. “Just Test What You Cannot Verify!” <i>Software Engineering
    2016</i>, edited by Uwe Zdun Jens Knoop, 2016, pp. 17–18.
  short: 'M. Czech, M.-C. Jakobs, H. Wehrheim, in: U.Z. Jens Knoop (Ed.), Software
    Engineering 2016, 2016, pp. 17–18.'
date_created: 2017-10-17T12:41:28Z
date_updated: 2022-01-06T06:53:43Z
ddc:
- '040'
department:
- _id: '77'
editor:
- first_name: Uwe Zdun
  full_name: Jens Knoop, Uwe Zdun
  last_name: Jens Knoop
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T12:32:11Z
  date_updated: 2018-03-21T12:32:11Z
  file_id: '1532'
  file_name: 186-SEsubmission8.pdf
  file_size: 55775
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T12:32:11Z
has_accepted_license: '1'
language:
- iso: eng
page: 17-18
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publication: Software Engineering 2016
series_title: Lecture Notes in Informatics
status: public
title: Just test what you cannot verify!
type: conference
user_id: '477'
year: '2016'
...
---
_id: '221'
author:
- first_name: Marie Christin
  full_name: Platenius, Marie Christin
  last_name: Platenius
- first_name: Klementina
  full_name: Josifovska, Klementina
  last_name: Josifovska
- first_name: Lorijn
  full_name: van Rooijen, Lorijn
  id: '58843'
  last_name: van Rooijen
- first_name: Svetlana
  full_name: Arifulina, Svetlana
  last_name: Arifulina
- first_name: Matthias
  full_name: Becker, Matthias
  last_name: Becker
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Wilhelm
  full_name: Schäfer, Wilhelm
  last_name: Schäfer
citation:
  ama: Platenius MC, Josifovska K, van Rooijen L, et al. <i>An Overview of Service
    Specification Language and Matching in On-The-Fly Computing (v0.3)</i>. Universität
    Paderborn; 2016.
  apa: Platenius, M. C., Josifovska, K., van Rooijen, L., Arifulina, S., Becker, M.,
    Engels, G., &#38; Schäfer, W. (2016). <i>An Overview of Service Specification
    Language and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn.
  bibtex: '@book{Platenius_Josifovska_van Rooijen_Arifulina_Becker_Engels_Schäfer_2016,
    title={An Overview of Service Specification Language and Matching in On-The-Fly
    Computing (v0.3)}, publisher={Universität Paderborn}, author={Platenius, Marie
    Christin and Josifovska, Klementina and van Rooijen, Lorijn and Arifulina, Svetlana
    and Becker, Matthias and Engels, Gregor and Schäfer, Wilhelm}, year={2016} }'
  chicago: Platenius, Marie Christin, Klementina Josifovska, Lorijn van Rooijen, Svetlana
    Arifulina, Matthias Becker, Gregor Engels, and Wilhelm Schäfer. <i>An Overview
    of Service Specification Language and Matching in On-The-Fly Computing (v0.3)</i>.
    Universität Paderborn, 2016.
  ieee: M. C. Platenius <i>et al.</i>, <i>An Overview of Service Specification Language
    and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn, 2016.
  mla: Platenius, Marie Christin, et al. <i>An Overview of Service Specification Language
    and Matching in On-The-Fly Computing (v0.3)</i>. Universität Paderborn, 2016.
  short: M.C. Platenius, K. Josifovska, L. van Rooijen, S. Arifulina, M. Becker, G.
    Engels, W. Schäfer, An Overview of Service Specification Language and Matching
    in On-The-Fly Computing (v0.3), Universität Paderborn, 2016.
date_created: 2017-10-17T12:41:35Z
date_updated: 2022-01-06T06:55:25Z
ddc:
- '040'
department:
- _id: '66'
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:36:37Z
  date_updated: 2018-03-21T10:36:37Z
  file_id: '1512'
  file_name: 221-SFB_SSL_Techreport.pdf
  file_size: 6498677
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:36:37Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '11'
  name: SFB 901 - Subproject B3
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
title: An Overview of Service Specification Language and Matching in On-The-Fly Computing
  (v0.3)
type: report
user_id: '477'
year: '2016'
...
---
_id: '222'
abstract:
- lang: eng
  text: Virtual field programmable gate arrays (FPGA) are overlay architectures realized
    on top of physical FPGAs. They are proposed to enhance or abstract away from the
    physical FPGA for experimenting with novel architectures and design tool flows.
    In this paper, we present an embedding of a ZUMA-based virtual FPGA fabric into
    a complete configurable system-on-chip. Such an embedding is required to fully
    harness the potential of virtual FPGAs, in particular to give the virtual circuits
    access to main memory and operating system services, and to enable a concurrent
    operation of virtualized and non-virtualized circuitry. We discuss our extension
    to ZUMA and its embedding into the ReconOS operating system for hardware/software
    systems. Furthermore, we present an open source tool flow to synthesize configurations
    for the virtual FPGA, along with an analysis of the area and delay overheads involved.
author:
- first_name: Tobias
  full_name: Wiersema, Tobias
  id: '3118'
  last_name: Wiersema
- first_name: Arne
  full_name: Bockhorn, Arne
  last_name: Bockhorn
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: Wiersema T, Bockhorn A, Platzner M. An Architecture and Design Tool Flow for
    Embedding a Virtual FPGA into a Reconfigurable System-on-Chip. <i>Computers &#38;
    Electrical Engineering</i>. 2016:112--122. doi:<a href="https://doi.org/10.1016/j.compeleceng.2016.04.005">10.1016/j.compeleceng.2016.04.005</a>
  apa: Wiersema, T., Bockhorn, A., &#38; Platzner, M. (2016). An Architecture and
    Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip.
    <i>Computers &#38; Electrical Engineering</i>, 112--122. <a href="https://doi.org/10.1016/j.compeleceng.2016.04.005">https://doi.org/10.1016/j.compeleceng.2016.04.005</a>
  bibtex: '@article{Wiersema_Bockhorn_Platzner_2016, title={An Architecture and Design
    Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip},
    DOI={<a href="https://doi.org/10.1016/j.compeleceng.2016.04.005">10.1016/j.compeleceng.2016.04.005</a>},
    journal={Computers &#38; Electrical Engineering}, publisher={Elsevier}, author={Wiersema,
    Tobias and Bockhorn, Arne and Platzner, Marco}, year={2016}, pages={112--122}
    }'
  chicago: Wiersema, Tobias, Arne Bockhorn, and Marco Platzner. “An Architecture and
    Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip.”
    <i>Computers &#38; Electrical Engineering</i>, 2016, 112--122. <a href="https://doi.org/10.1016/j.compeleceng.2016.04.005">https://doi.org/10.1016/j.compeleceng.2016.04.005</a>.
  ieee: T. Wiersema, A. Bockhorn, and M. Platzner, “An Architecture and Design Tool
    Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip,” <i>Computers
    &#38; Electrical Engineering</i>, pp. 112--122, 2016.
  mla: Wiersema, Tobias, et al. “An Architecture and Design Tool Flow for Embedding
    a Virtual FPGA into a Reconfigurable System-on-Chip.” <i>Computers &#38; Electrical
    Engineering</i>, Elsevier, 2016, pp. 112--122, doi:<a href="https://doi.org/10.1016/j.compeleceng.2016.04.005">10.1016/j.compeleceng.2016.04.005</a>.
  short: T. Wiersema, A. Bockhorn, M. Platzner, Computers &#38; Electrical Engineering
    (2016) 112--122.
date_created: 2017-10-17T12:41:35Z
date_updated: 2022-01-06T06:55:29Z
ddc:
- '040'
department:
- _id: '78'
doi: 10.1016/j.compeleceng.2016.04.005
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:36:08Z
  date_updated: 2018-03-21T10:36:08Z
  file_id: '1511'
  file_name: 222-1-s2.0-S0045790616300684-main.pdf
  file_size: 931048
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:36:08Z
has_accepted_license: '1'
language:
- iso: eng
page: 112--122
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publication: Computers & Electrical Engineering
publisher: Elsevier
status: public
title: An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable
  System-on-Chip
type: journal_article
user_id: '477'
year: '2016'
...
---
_id: '223'
abstract:
- lang: eng
  text: We consider the problem of aggregation in overlay networks. We use a synchronous
    time model in which each node has polylogarithmic memory and can send at most
    a polylogarithmic number of messages per round. We investigate how to quickly
    compute the result of an aggregate functionf over elements that are distributed
    among the nodes of the network such that the result is eventually known by a selected
    root node. We show how to compute distributive aggregate functions such as SUM,
    MAX, and OR in time $O(\log n / \log\log n)$ using a tree that is created in a
    pre-processing phase. If only a polylogarithmic number of data items need to be
    aggregated, we show how to compute the result in time $O(\sqrt{\log n / \log\log
    n})$. Furthermore, we show how to compute holistic aggregate functions such as
    DISTINCT, SMALLEST(k) and MODE(k) in time $O(\log n / \log\log n)$. Finally, we
    show a lower bound of $\Omega(\sqrt{\log n / \log\log n})$ for deterministic algorithms
    that compute any of the aggregate functions in the scope of the thesis.
author:
- first_name: Kristian
  full_name: Hinnenthal, Kristian
  id: '32229'
  last_name: Hinnenthal
citation:
  ama: Hinnenthal K. <i>Aggregation in Overlay Networks</i>. Universität Paderborn;
    2016.
  apa: Hinnenthal, K. (2016). <i>Aggregation in Overlay Networks</i>. Universität
    Paderborn.
  bibtex: '@book{Hinnenthal_2016, title={Aggregation in Overlay Networks}, publisher={Universität
    Paderborn}, author={Hinnenthal, Kristian}, year={2016} }'
  chicago: Hinnenthal, Kristian. <i>Aggregation in Overlay Networks</i>. Universität
    Paderborn, 2016.
  ieee: K. Hinnenthal, <i>Aggregation in Overlay Networks</i>. Universität Paderborn,
    2016.
  mla: Hinnenthal, Kristian. <i>Aggregation in Overlay Networks</i>. Universität Paderborn,
    2016.
  short: K. Hinnenthal, Aggregation in Overlay Networks, Universität Paderborn, 2016.
date_created: 2017-10-17T12:41:35Z
date_updated: 2022-01-06T06:55:30Z
ddc:
- '040'
department:
- _id: '79'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:35:39Z
  date_updated: 2018-03-21T10:35:39Z
  file_id: '1510'
  file_name: 223-MasterarbeitHinnenthal.pdf
  file_size: 1127144
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:35:39Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: Aggregation in Overlay Networks
type: mastersthesis
user_id: '15504'
year: '2016'
...
---
_id: '224'
abstract:
- lang: eng
  text: In modern software development, paradigms like component-based software engineering
    (CBSE) and service-oriented architectures (SOA) emphasize the construction of
    large software systems out of existing components or services. Therein, a service
    is a self-contained piece of software, which adheres to a specified interface.
    In a model-based software design, this interface constitutes our sole knowledge
    of the service at design time, while service implementations are not available.
    Therefore, correctness checks or detection of potential errors in service compositions
    has to be carried out without the possibility of executing services. This challenges
    the usage of standard software error localization techniques for service compositions.
    In this paper, we review state-of-the-art approaches for error localization of
    software and discuss their applicability to service compositions.
author:
- first_name: Julia
  full_name: Krämer, Julia
  last_name: Krämer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Krämer J, Wehrheim H. A short survey on using software error localization
    for service compositions. In: <i>Proceedings of the 5th European Conference on
    Service-Oriented and Cloud Computing (ESOCC 2016)</i>. LNCS. ; 2016:248--262.
    doi:<a href="https://doi.org/10.1007/978-3-319-44482-6_16">10.1007/978-3-319-44482-6_16</a>'
  apa: Krämer, J., &#38; Wehrheim, H. (2016). A short survey on using software error
    localization for service compositions. In <i>Proceedings of the 5th European Conference
    on Service-Oriented and Cloud Computing (ESOCC 2016)</i> (pp. 248--262). <a href="https://doi.org/10.1007/978-3-319-44482-6_16">https://doi.org/10.1007/978-3-319-44482-6_16</a>
  bibtex: '@inproceedings{Krämer_Wehrheim_2016, series={LNCS}, title={A short survey
    on using software error localization for service compositions}, DOI={<a href="https://doi.org/10.1007/978-3-319-44482-6_16">10.1007/978-3-319-44482-6_16</a>},
    booktitle={Proceedings of the 5th European Conference on Service-Oriented and
    Cloud Computing (ESOCC 2016)}, author={Krämer, Julia and Wehrheim, Heike}, year={2016},
    pages={248--262}, collection={LNCS} }'
  chicago: Krämer, Julia, and Heike Wehrheim. “A Short Survey on Using Software Error
    Localization for Service Compositions.” In <i>Proceedings of the 5th European
    Conference on Service-Oriented and Cloud Computing (ESOCC 2016)</i>, 248--262.
    LNCS, 2016. <a href="https://doi.org/10.1007/978-3-319-44482-6_16">https://doi.org/10.1007/978-3-319-44482-6_16</a>.
  ieee: J. Krämer and H. Wehrheim, “A short survey on using software error localization
    for service compositions,” in <i>Proceedings of the 5th European Conference on
    Service-Oriented and Cloud Computing (ESOCC 2016)</i>, 2016, pp. 248--262.
  mla: Krämer, Julia, and Heike Wehrheim. “A Short Survey on Using Software Error
    Localization for Service Compositions.” <i>Proceedings of the 5th European Conference
    on Service-Oriented and Cloud Computing (ESOCC 2016)</i>, 2016, pp. 248--262,
    doi:<a href="https://doi.org/10.1007/978-3-319-44482-6_16">10.1007/978-3-319-44482-6_16</a>.
  short: 'J. Krämer, H. Wehrheim, in: Proceedings of the 5th European Conference on
    Service-Oriented and Cloud Computing (ESOCC 2016), 2016, pp. 248--262.'
date_created: 2017-10-17T12:41:35Z
date_updated: 2022-01-06T06:55:32Z
ddc:
- '040'
department:
- _id: '77'
doi: 10.1007/978-3-319-44482-6_16
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:35:04Z
  date_updated: 2018-03-21T10:35:04Z
  file_id: '1509'
  file_name: 224-chp_3A10.1007_2F978-3-319-44482-6_16.pdf
  file_size: 389042
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:35:04Z
has_accepted_license: '1'
language:
- iso: eng
page: 248--262
project:
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subprojekt B3
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 5th European Conference on Service-Oriented and Cloud
  Computing (ESOCC 2016)
series_title: LNCS
status: public
title: A short survey on using software error localization for service compositions
type: conference
user_id: '477'
year: '2016'
...
---
_id: '225'
abstract:
- lang: eng
  text: Image Processing is fundamental for any camera-based vision system. In order
    to automate the prototyping process of image processing solutions to some extend,
    we propose a holistic, adaptive approach that comprises concepts for specification,
    composition, recommendation, execution, and rating of image processing functionality.
    The fundamental idea is to realize image processing applications according to
    Service-oriented Computing design principles. That is, distinct image processing
    functionality is encapsulated in terms of stateless services. Services are then
    used as building blocks for more complex image processing functionality. To automatically
    compose complex image processing functionality, our proposed approach incorporates
    a flexible, Artificial Intelligence planning-based forward search algorithm. Decision-making
    between alternative composition steps is supported by a learning recommendation
    system, which keeps track of valid composition steps by automatically constructing
    a composition grammar. In addition, it adapts to solutions of high quality by
    means of feedback-based Reinforcement Learning techniques. A concrete use case
    serves as proof of concept and demonstrates the feasibility of our holistic, adaptive
    approach.
author:
- first_name: Alexander
  full_name: Jungmann, Alexander
  last_name: Jungmann
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
citation:
  ama: 'Jungmann A, Kleinjohann B. A Holistic and Adaptive Approach for Automated
    Prototyping of Image Processing Functionality. In: <i>Proceedings of the 21st
    IEEE International Conference on Emerging Technologies and Factory Automation
    (ETFA)</i>. ; 2016:1--8. doi:<a href="https://doi.org/10.1109/ETFA.2016.7733522">10.1109/ETFA.2016.7733522</a>'
  apa: Jungmann, A., &#38; Kleinjohann, B. (2016). A Holistic and Adaptive Approach
    for Automated Prototyping of Image Processing Functionality. In <i>Proceedings
    of the 21st IEEE International Conference on Emerging Technologies and Factory
    Automation (ETFA)</i> (pp. 1--8). <a href="https://doi.org/10.1109/ETFA.2016.7733522">https://doi.org/10.1109/ETFA.2016.7733522</a>
  bibtex: '@inproceedings{Jungmann_Kleinjohann_2016, title={A Holistic and Adaptive
    Approach for Automated Prototyping of Image Processing Functionality}, DOI={<a
    href="https://doi.org/10.1109/ETFA.2016.7733522">10.1109/ETFA.2016.7733522</a>},
    booktitle={Proceedings of the 21st IEEE International Conference on Emerging Technologies
    and Factory Automation (ETFA)}, author={Jungmann, Alexander and Kleinjohann, Bernd},
    year={2016}, pages={1--8} }'
  chicago: Jungmann, Alexander, and Bernd Kleinjohann. “A Holistic and Adaptive Approach
    for Automated Prototyping of Image Processing Functionality.” In <i>Proceedings
    of the 21st IEEE International Conference on Emerging Technologies and Factory
    Automation (ETFA)</i>, 1--8, 2016. <a href="https://doi.org/10.1109/ETFA.2016.7733522">https://doi.org/10.1109/ETFA.2016.7733522</a>.
  ieee: A. Jungmann and B. Kleinjohann, “A Holistic and Adaptive Approach for Automated
    Prototyping of Image Processing Functionality,” in <i>Proceedings of the 21st
    IEEE International Conference on Emerging Technologies and Factory Automation
    (ETFA)</i>, 2016, pp. 1--8.
  mla: Jungmann, Alexander, and Bernd Kleinjohann. “A Holistic and Adaptive Approach
    for Automated Prototyping of Image Processing Functionality.” <i>Proceedings of
    the 21st IEEE International Conference on Emerging Technologies and Factory Automation
    (ETFA)</i>, 2016, pp. 1--8, doi:<a href="https://doi.org/10.1109/ETFA.2016.7733522">10.1109/ETFA.2016.7733522</a>.
  short: 'A. Jungmann, B. Kleinjohann, in: Proceedings of the 21st IEEE International
    Conference on Emerging Technologies and Factory Automation (ETFA), 2016, pp. 1--8.'
date_created: 2017-10-17T12:41:35Z
date_updated: 2022-01-06T06:55:34Z
ddc:
- '040'
doi: 10.1109/ETFA.2016.7733522
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:34:35Z
  date_updated: 2018-03-21T10:34:35Z
  file_id: '1508'
  file_name: 225-07733522.pdf
  file_size: 1323587
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:34:35Z
has_accepted_license: '1'
page: 1--8
project:
- _id: '1'
  name: SFB 901
- _id: '10'
  name: SFB 901 - Subprojekt B2
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 21st IEEE International Conference on Emerging Technologies
  and Factory Automation (ETFA)
status: public
title: A Holistic and Adaptive Approach for Automated Prototyping of Image Processing
  Functionality
type: conference
user_id: '15504'
year: '2016'
...
---
_id: '226'
abstract:
- lang: eng
  text: Error detection, localization and correction are time-intensive tasks in software
    development, but crucial to deliver functionally correct products. Thus, automated
    approaches to these tasks have been intensively studied for standard software
    systems. For model-based software systems, the situation is different. While error
    detection is still well-studied, error localization and correction is a less-studied
    domain. In this paper, we examine error localization and correction for models
    of service compositions. Based on formal definitions of error and correction in
    this context, we show that the classical approach of error localization and correction,
    i.e. first determining a set of suspicious statements and then proposing changes
    to these statements, is ineffective in our context. In fact, it lessens the chance
    to succeed in finding a correction at all.In this paper, we introduce correction
    proposal as a novel approach on error correction in service compositions integrating
    error localization and correction in one combined step. In addition, we provide
    an algorithm to compute such correction proposals automatically.
author:
- first_name: Julia
  full_name: Krämer, Julia
  last_name: Krämer
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Krämer J, Wehrheim H. A Formal Approach to Error Localization and Correction
    in Service Compositions. In: <i>Proceedings of the 1st International Workshop
    on Formal to Practical Software Verification and Composition (VeryComp 2016)</i>.
    LNCS. ; 2016:445--457. doi:<a href="https://doi.org/10.1007/978-3-319-50230-4_35">10.1007/978-3-319-50230-4_35</a>'
  apa: Krämer, J., &#38; Wehrheim, H. (2016). A Formal Approach to Error Localization
    and Correction in Service Compositions. In <i>Proceedings of the 1st International
    Workshop on Formal to Practical Software Verification and Composition (VeryComp
    2016)</i> (pp. 445--457). <a href="https://doi.org/10.1007/978-3-319-50230-4_35">https://doi.org/10.1007/978-3-319-50230-4_35</a>
  bibtex: '@inproceedings{Krämer_Wehrheim_2016, series={LNCS}, title={A Formal Approach
    to Error Localization and Correction in Service Compositions}, DOI={<a href="https://doi.org/10.1007/978-3-319-50230-4_35">10.1007/978-3-319-50230-4_35</a>},
    booktitle={Proceedings of the 1st International Workshop on Formal to Practical
    Software Verification and Composition (VeryComp 2016)}, author={Krämer, Julia
    and Wehrheim, Heike}, year={2016}, pages={445--457}, collection={LNCS} }'
  chicago: Krämer, Julia, and Heike Wehrheim. “A Formal Approach to Error Localization
    and Correction in Service Compositions.” In <i>Proceedings of the 1st International
    Workshop on Formal to Practical Software Verification and Composition (VeryComp
    2016)</i>, 445--457. LNCS, 2016. <a href="https://doi.org/10.1007/978-3-319-50230-4_35">https://doi.org/10.1007/978-3-319-50230-4_35</a>.
  ieee: J. Krämer and H. Wehrheim, “A Formal Approach to Error Localization and Correction
    in Service Compositions,” in <i>Proceedings of the 1st International Workshop
    on Formal to Practical Software Verification and Composition (VeryComp 2016)</i>,
    2016, pp. 445--457.
  mla: Krämer, Julia, and Heike Wehrheim. “A Formal Approach to Error Localization
    and Correction in Service Compositions.” <i>Proceedings of the 1st International
    Workshop on Formal to Practical Software Verification and Composition (VeryComp
    2016)</i>, 2016, pp. 445--457, doi:<a href="https://doi.org/10.1007/978-3-319-50230-4_35">10.1007/978-3-319-50230-4_35</a>.
  short: 'J. Krämer, H. Wehrheim, in: Proceedings of the 1st International Workshop
    on Formal to Practical Software Verification and Composition (VeryComp 2016),
    2016, pp. 445--457.'
date_created: 2017-10-17T12:41:36Z
date_updated: 2022-01-06T06:55:37Z
ddc:
- '040'
department:
- _id: '77'
doi: 10.1007/978-3-319-50230-4_35
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:34:08Z
  date_updated: 2018-03-21T10:34:08Z
  file_id: '1507'
  file_name: 226-chp_3A10.1007_2F978-3-319-50230-4_35.pdf
  file_size: 492018
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:34:08Z
has_accepted_license: '1'
language:
- iso: eng
page: 445--457
project:
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subprojekt B3
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 1st International Workshop on Formal to Practical
  Software Verification and Composition (VeryComp 2016)
series_title: LNCS
status: public
title: A Formal Approach to Error Localization and Correction in Service Compositions
type: conference
user_id: '477'
year: '2016'
...
---
_id: '227'
abstract:
- lang: eng
  text: Information flow analysis studies the flow of data between program entities
    (e.g. variables), where the allowed flow is specified via security policies. Typical
    information flow analyses compute a conservative (over-)approximation of the flows
    in a program. Such an analysis may thus signal non-existing violations of the
    security policy.In this paper, we propose a new technique for inspecting the reported
    violations (counterexamples) for spuriousity. Similar to counterexample-guided-abstraction-refinement
    (CEGAR) in software verification, we use the result of this inspection to improve
    the next round of the analysis. We prove soundness of this scheme.
author:
- first_name: Manuel
  full_name: Töws, Manuel
  id: '11315'
  last_name: Töws
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Töws M, Wehrheim H. A CEGAR Scheme for Information Flow Analysis. In: <i>Proceedings
    of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)</i>.
    LNCS. ; 2016:466--483. doi:<a href="https://doi.org/10.1007/978-3-319-47846-3_29">10.1007/978-3-319-47846-3_29</a>'
  apa: Töws, M., &#38; Wehrheim, H. (2016). A CEGAR Scheme for Information Flow Analysis.
    In <i>Proceedings of the 18th International Conference on Formal Engineering Methods
    (ICFEM 2016)</i> (pp. 466--483). <a href="https://doi.org/10.1007/978-3-319-47846-3_29">https://doi.org/10.1007/978-3-319-47846-3_29</a>
  bibtex: '@inproceedings{Töws_Wehrheim_2016, series={LNCS}, title={A CEGAR Scheme
    for Information Flow Analysis}, DOI={<a href="https://doi.org/10.1007/978-3-319-47846-3_29">10.1007/978-3-319-47846-3_29</a>},
    booktitle={Proceedings of the 18th International Conference on Formal Engineering
    Methods (ICFEM 2016)}, author={Töws, Manuel and Wehrheim, Heike}, year={2016},
    pages={466--483}, collection={LNCS} }'
  chicago: Töws, Manuel, and Heike Wehrheim. “A CEGAR Scheme for Information Flow
    Analysis.” In <i>Proceedings of the 18th International Conference on Formal Engineering
    Methods (ICFEM 2016)</i>, 466--483. LNCS, 2016. <a href="https://doi.org/10.1007/978-3-319-47846-3_29">https://doi.org/10.1007/978-3-319-47846-3_29</a>.
  ieee: M. Töws and H. Wehrheim, “A CEGAR Scheme for Information Flow Analysis,” in
    <i>Proceedings of the 18th International Conference on Formal Engineering Methods
    (ICFEM 2016)</i>, 2016, pp. 466--483.
  mla: Töws, Manuel, and Heike Wehrheim. “A CEGAR Scheme for Information Flow Analysis.”
    <i>Proceedings of the 18th International Conference on Formal Engineering Methods
    (ICFEM 2016)</i>, 2016, pp. 466--483, doi:<a href="https://doi.org/10.1007/978-3-319-47846-3_29">10.1007/978-3-319-47846-3_29</a>.
  short: 'M. Töws, H. Wehrheim, in: Proceedings of the 18th International Conference
    on Formal Engineering Methods (ICFEM 2016), 2016, pp. 466--483.'
date_created: 2017-10-17T12:41:36Z
date_updated: 2022-01-06T06:55:39Z
ddc:
- '040'
department:
- _id: '77'
doi: 10.1007/978-3-319-47846-3_29
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:33:38Z
  date_updated: 2018-03-21T10:33:38Z
  file_id: '1506'
  file_name: 227-chp_3A10.1007_2F978-3-319-47846-3_29.pdf
  file_size: 682849
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:33:38Z
has_accepted_license: '1'
language:
- iso: eng
page: 466--483
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 18th International Conference on Formal Engineering
  Methods (ICFEM 2016)
series_title: LNCS
status: public
title: A CEGAR Scheme for Information Flow Analysis
type: conference
user_id: '477'
year: '2016'
...
---
_id: '2271'
author:
- first_name: Aref
  full_name: Hesso, Aref
  last_name: Hesso
citation:
  ama: 'Hesso A. <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung
    und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität
    Paderborn; 2016.'
  apa: 'Hesso, A. (2016). <i>Die Rolle der Reputation: Die Entstehung, der Aufbau,
    die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>.
    Universität Paderborn.'
  bibtex: '@book{Hesso_2016, title={Die Rolle der Reputation: Die Entstehung, der
    Aufbau, die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen},
    publisher={Universität Paderborn}, author={Hesso, Aref}, year={2016} }'
  chicago: 'Hesso, Aref. <i>Die Rolle der Reputation: Die Entstehung, der Aufbau,
    die Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>.
    Universität Paderborn, 2016.'
  ieee: 'A. Hesso, <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung
    und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität
    Paderborn, 2016.'
  mla: 'Hesso, Aref. <i>Die Rolle der Reputation: Die Entstehung, der Aufbau, die
    Messung und die Auswirkung der Reputation auf Kunden und Unternehmen</i>. Universität
    Paderborn, 2016.'
  short: 'A. Hesso, Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung
    und die Auswirkung der Reputation auf Kunden und Unternehmen, Universität Paderborn,
    2016.'
date_created: 2018-04-10T09:56:14Z
date_updated: 2022-01-06T06:55:39Z
department:
- _id: '19'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '8'
  name: SFB 901 - Subproject A4
publisher: Universität Paderborn
status: public
title: 'Die Rolle der Reputation: Die Entstehung, der Aufbau, die Messung und die
  Auswirkung der Reputation auf Kunden und Unternehmen'
type: mastersthesis
user_id: '477'
year: '2016'
...
---
_id: '217'
abstract:
- lang: eng
  text: Today, cloud vendors host third party black-box services, whose developers
    usually provide only textual descriptions or purely syntactical interface specifications.
    Cloud vendors that give substantial support to other third party developers to
    integrate hosted services into new software solutions would have a unique selling
    feature over their competitors. However, to reliably determine if a service is
    reusable, comprehensive service specifications are needed. Characteristic for
    comprehensive in contrast to syntactical specifications are the formalization
    of ontological and behavioral semantics, homogeneity according to a global ontology,
    and a service grounding that links the abstract service description and its technical
    realization. Homogeneous, semantical specifications enable to reliably identify
    reusable services, whereas the service grounding is needed for the technical service
    integration. In general, comprehensive specifications are not availableand have
    to be derived. Existing automatized approaches are restricted to certain characteristics
    of comprehensiveness. In my PhD, I consider an automatized approach to derive
    fully-fledged comprehensive specifications for black-box services. Ontological
    semantics are derived from syntactical interface specifications. Behavioral semantics
    are mined from call logs that cloud vendors create to monitor the hosted services.
    The specifications are harmonized over a global ontology. The service grounding
    is established using traceability information. The approach enables third party
    developers to compose services into complex systems and creates new sales channels
    for cloud and service providers.
author:
- first_name: Simon
  full_name: Schwichtenberg, Simon
  id: '13235'
  last_name: Schwichtenberg
citation:
  ama: 'Schwichtenberg S. Automatized Derivation of Comprehensive Specifications for
    Black-box Services. In: <i>Proceedings of the 38th International Conference on
    Software Engineering Companion (ICSE)</i>. ; 2016:815-818. doi:<a href="https://doi.org/10.1145/2889160.2889271">10.1145/2889160.2889271</a>'
  apa: Schwichtenberg, S. (2016). Automatized Derivation of Comprehensive Specifications
    for Black-box Services. In <i>Proceedings of the 38th International Conference
    on Software Engineering Companion (ICSE)</i> (pp. 815–818). <a href="https://doi.org/10.1145/2889160.2889271">https://doi.org/10.1145/2889160.2889271</a>
  bibtex: '@inproceedings{Schwichtenberg_2016, title={Automatized Derivation of Comprehensive
    Specifications for Black-box Services}, DOI={<a href="https://doi.org/10.1145/2889160.2889271">10.1145/2889160.2889271</a>},
    booktitle={Proceedings of the 38th International Conference on Software Engineering
    Companion (ICSE)}, author={Schwichtenberg, Simon}, year={2016}, pages={815–818}
    }'
  chicago: Schwichtenberg, Simon. “Automatized Derivation of Comprehensive Specifications
    for Black-Box Services.” In <i>Proceedings of the 38th International Conference
    on Software Engineering Companion (ICSE)</i>, 815–18, 2016. <a href="https://doi.org/10.1145/2889160.2889271">https://doi.org/10.1145/2889160.2889271</a>.
  ieee: S. Schwichtenberg, “Automatized Derivation of Comprehensive Specifications
    for Black-box Services,” in <i>Proceedings of the 38th International Conference
    on Software Engineering Companion (ICSE)</i>, 2016, pp. 815–818.
  mla: Schwichtenberg, Simon. “Automatized Derivation of Comprehensive Specifications
    for Black-Box Services.” <i>Proceedings of the 38th International Conference on
    Software Engineering Companion (ICSE)</i>, 2016, pp. 815–18, doi:<a href="https://doi.org/10.1145/2889160.2889271">10.1145/2889160.2889271</a>.
  short: 'S. Schwichtenberg, in: Proceedings of the 38th International Conference
    on Software Engineering Companion (ICSE), 2016, pp. 815–818.'
date_created: 2017-10-17T12:41:34Z
date_updated: 2022-01-06T06:55:11Z
ddc:
- '040'
department:
- _id: '66'
doi: 10.1145/2889160.2889271
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:39:14Z
  date_updated: 2018-03-21T10:39:14Z
  file_id: '1516'
  file_name: 217-sig-alternate.pdf
  file_size: 691294
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:39:14Z
has_accepted_license: '1'
language:
- iso: eng
page: 815-818
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 38th International Conference on Software Engineering
  Companion (ICSE)
status: public
title: Automatized Derivation of Comprehensive Specifications for Black-box Services
type: conference
user_id: '477'
year: '2016'
...
---
_id: '218'
abstract:
- lang: eng
  text: In the Image Processing domain, automated generation of complex Image Processing
    functionality is highly desirable; e.g., for rapid prototyping. Service composition
    techniques, in turn, facilitate automated generation of complex functionality
    based on building blocks in terms of services. For that reason, we aim for transferring
    the Service Composition paradigm into the Image Processing domain. In this paper,
    we present our symbolic composition approach that enables us to automatically
    generate Image Processing applications. Functionality of Image Processing services
    is described by means of a variant of first-order logic, which grounds on domain
    knowledge operationalized in terms of ontologies. A Petri-net formalism serves
    as basis for modeling data-flow of services and composed services. A planning-based
    composition algorithm automatically composes complex data-flow for a required
    functionality. A brief evaluation serves as proof of concept.
author:
- first_name: Alexander
  full_name: Jungmann, Alexander
  last_name: Jungmann
- first_name: Bernd
  full_name: Kleinjohann, Bernd
  last_name: Kleinjohann
citation:
  ama: 'Jungmann A, Kleinjohann B. Automatic Composition of Service-based Image Processing
    Applications. In: <i>Proceedings of the 13th IEEE International Conference on
    Services Computing (SCC)</i>. ; 2016:106--113. doi:<a href="https://doi.org/10.1109/SCC.2016.21">10.1109/SCC.2016.21</a>'
  apa: Jungmann, A., &#38; Kleinjohann, B. (2016). Automatic Composition of Service-based
    Image Processing Applications. In <i>Proceedings of the 13th IEEE International
    Conference on Services Computing (SCC)</i> (pp. 106--113). <a href="https://doi.org/10.1109/SCC.2016.21">https://doi.org/10.1109/SCC.2016.21</a>
  bibtex: '@inproceedings{Jungmann_Kleinjohann_2016, title={Automatic Composition
    of Service-based Image Processing Applications}, DOI={<a href="https://doi.org/10.1109/SCC.2016.21">10.1109/SCC.2016.21</a>},
    booktitle={Proceedings of the 13th IEEE International Conference on Services Computing
    (SCC)}, author={Jungmann, Alexander and Kleinjohann, Bernd}, year={2016}, pages={106--113}
    }'
  chicago: Jungmann, Alexander, and Bernd Kleinjohann. “Automatic Composition of Service-Based
    Image Processing Applications.” In <i>Proceedings of the 13th IEEE International
    Conference on Services Computing (SCC)</i>, 106--113, 2016. <a href="https://doi.org/10.1109/SCC.2016.21">https://doi.org/10.1109/SCC.2016.21</a>.
  ieee: A. Jungmann and B. Kleinjohann, “Automatic Composition of Service-based Image
    Processing Applications,” in <i>Proceedings of the 13th IEEE International Conference
    on Services Computing (SCC)</i>, 2016, pp. 106--113.
  mla: Jungmann, Alexander, and Bernd Kleinjohann. “Automatic Composition of Service-Based
    Image Processing Applications.” <i>Proceedings of the 13th IEEE International
    Conference on Services Computing (SCC)</i>, 2016, pp. 106--113, doi:<a href="https://doi.org/10.1109/SCC.2016.21">10.1109/SCC.2016.21</a>.
  short: 'A. Jungmann, B. Kleinjohann, in: Proceedings of the 13th IEEE International
    Conference on Services Computing (SCC), 2016, pp. 106--113.'
date_created: 2017-10-17T12:41:34Z
date_updated: 2022-01-06T06:55:14Z
ddc:
- '040'
doi: 10.1109/SCC.2016.21
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:38:44Z
  date_updated: 2018-03-21T10:38:44Z
  file_id: '1515'
  file_name: 218-07557442.pdf
  file_size: 836658
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:38:44Z
has_accepted_license: '1'
page: 106--113
project:
- _id: '1'
  name: SFB 901
- _id: '10'
  name: SFB 901 - Subprojekt B2
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 13th IEEE International Conference on Services Computing
  (SCC)
status: public
title: Automatic Composition of Service-based Image Processing Applications
type: conference
user_id: '15504'
year: '2016'
...
---
_id: '219'
abstract:
- lang: eng
  text: Existing software markets like Google Play allow users to search among available
    Apps and select one based on the description provided for the App or based on
    its rating. Future software markets facilitate on-the-fly composition of such
    Apps based on users’ individual wishes. Realizing such On-The-Fly Computing (OTF)
    markets requires support of sophisticated software features. In addition, suitable
    orchestration among such features needs to ensure well-alignment of business and
    IT aspects in case of run-time changes like market dynamics. However, all these
    introduce new architectural and management complexities, which are specific to
    such markets. An architecture framework for OTF markets will include design solutions
    to overcome these complexities. In my PhD, I aim at identifying an architecture
    framework for OTF markets including main architectural building blocks and a systematic
    development process. Such an architecture framework enables the development of
    OTF markets in the future. Furthermore, this knowledge can be used as a basis
    to improve existing software markets by integrating missing functionalities.
author:
- first_name: Bahar
  full_name: Jazayeri, Bahar
  id: '36399'
  last_name: Jazayeri
citation:
  ama: 'Jazayeri B. Architectural Management of On-The-Fly Computing Markets. In:
    <i>Proceedings of the 10th European Conference on Software Architecture (ECSA
    Workshops)</i>. Copenhagen, Denmark: ACM; 2016:42. doi:<a href="https://doi.org/10.1145/2993412.3010821">10.1145/2993412.3010821</a>'
  apa: 'Jazayeri, B. (2016). Architectural Management of On-The-Fly Computing Markets.
    In <i>Proceedings of the 10th European Conference on Software Architecture (ECSA
    Workshops)</i> (p. 42). Copenhagen, Denmark: ACM. <a href="https://doi.org/10.1145/2993412.3010821">https://doi.org/10.1145/2993412.3010821</a>'
  bibtex: '@inproceedings{Jazayeri_2016, place={Copenhagen, Denmark}, title={Architectural
    Management of On-The-Fly Computing Markets}, DOI={<a href="https://doi.org/10.1145/2993412.3010821">10.1145/2993412.3010821</a>},
    booktitle={Proceedings of the 10th European Conference on Software Architecture
    (ECSA Workshops)}, publisher={ACM}, author={Jazayeri, Bahar}, year={2016}, pages={42}
    }'
  chicago: 'Jazayeri, Bahar. “Architectural Management of On-The-Fly Computing Markets.”
    In <i>Proceedings of the 10th European Conference on Software Architecture (ECSA
    Workshops)</i>, 42. Copenhagen, Denmark: ACM, 2016. <a href="https://doi.org/10.1145/2993412.3010821">https://doi.org/10.1145/2993412.3010821</a>.'
  ieee: B. Jazayeri, “Architectural Management of On-The-Fly Computing Markets,” in
    <i>Proceedings of the 10th European Conference on Software Architecture (ECSA
    Workshops)</i>, 2016, p. 42.
  mla: Jazayeri, Bahar. “Architectural Management of On-The-Fly Computing Markets.”
    <i>Proceedings of the 10th European Conference on Software Architecture (ECSA
    Workshops)</i>, ACM, 2016, p. 42, doi:<a href="https://doi.org/10.1145/2993412.3010821">10.1145/2993412.3010821</a>.
  short: 'B. Jazayeri, in: Proceedings of the 10th European Conference on Software
    Architecture (ECSA Workshops), ACM, Copenhagen, Denmark, 2016, p. 42.'
date_created: 2017-10-17T12:41:34Z
date_updated: 2022-01-06T06:55:19Z
ddc:
- '040'
department:
- _id: '66'
doi: 10.1145/2993412.3010821
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:38:17Z
  date_updated: 2018-03-21T10:38:17Z
  file_id: '1514'
  file_name: 219-a42-jazayeri.pdf
  file_size: 169229
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:38:17Z
has_accepted_license: '1'
language:
- iso: eng
page: '42'
place: Copenhagen, Denmark
project:
- _id: '1'
  name: SFB 901
- _id: '17'
  name: SFB 901 - Subprojekt C5
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 10th European Conference on Software Architecture
  (ECSA Workshops)
publisher: ACM
status: public
title: Architectural Management of On-The-Fly Computing Markets
type: conference
user_id: '36399'
year: '2016'
...
---
_id: '220'
author:
- first_name: Matthias
  full_name: Keller, Matthias
  last_name: Keller
citation:
  ama: Keller M. <i>Application Deployment at Distributed Clouds</i>. Universität
    Paderborn; 2016.
  apa: Keller, M. (2016). <i>Application Deployment at Distributed Clouds</i>. Universität
    Paderborn.
  bibtex: '@book{Keller_2016, title={Application Deployment at Distributed Clouds},
    publisher={Universität Paderborn}, author={Keller, Matthias}, year={2016} }'
  chicago: Keller, Matthias. <i>Application Deployment at Distributed Clouds</i>.
    Universität Paderborn, 2016.
  ieee: M. Keller, <i>Application Deployment at Distributed Clouds</i>. Universität
    Paderborn, 2016.
  mla: Keller, Matthias. <i>Application Deployment at Distributed Clouds</i>. Universität
    Paderborn, 2016.
  short: M. Keller, Application Deployment at Distributed Clouds, Universität Paderborn,
    2016.
date_created: 2017-10-17T12:41:34Z
date_updated: 2022-01-06T06:55:22Z
ddc:
- '040'
department:
- _id: '75'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T10:37:11Z
  date_updated: 2018-03-21T10:37:11Z
  file_id: '1513'
  file_name: 220-Keller_PhD-Theses_01.pdf
  file_size: 7467820
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T10:37:11Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '16'
  name: SFB 901 - Subprojekt C4
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
title: Application Deployment at Distributed Clouds
type: dissertation
user_id: '477'
year: '2016'
...
---
_id: '5762'
abstract:
- lang: eng
  text: "This paper introduces the problem of communication pattern adaption for a
    distributed self-adjusting binary search tree. We propose a simple local algorithm
    that is closely related to the over thirty-year-old idea of splay trees and evaluate
    its adaption performance in the distributed scenario if different communication
    patterns are provided. \r\nTo do so, the process of self-adjustment is modeled
    similarly to a basic network creation game in which the nodes want to communicate
    with only a certain subset of all nodes. \r\nWe show that, in general, the game
    (i.e., the process of local adjustments) does not converge, and that convergence
    is related to certain structures of the communication interests, which we call
    conflicts. \r\nWe classify conflicts and show that for two communication scenarios
    in which convergence is guaranteed, the self-adjusting tree performs well. \r\nFurthermore,
    we investigate the different classes of conflicts separately and show that, for
    a certain class of conflicts, the performance of the tree network is asymptotically
    as good as the performance for converging instances.\r\nHowever, for the other
    conflict classes, a distributed self-adjusting binary search tree adapts poorly."
author:
- first_name: Thim Frederik
  full_name: Strothmann, Thim Frederik
  id: '11319'
  last_name: Strothmann
citation:
  ama: Strothmann TF. The Impact of Communication Patterns on Distributed Self-Adjusting
    Binary Search Tree. <i>Journal of Graph Algorithms and Applications</i>. 2016;20(1):79-100.
    doi:<a href="https://doi.org/10.7155/jgaa.00385">10.7155/jgaa.00385</a>
  apa: Strothmann, T. F. (2016). The Impact of Communication Patterns on Distributed
    Self-Adjusting Binary Search Tree. <i>Journal of Graph Algorithms and Applications</i>,
    <i>20</i>(1), 79–100. <a href="https://doi.org/10.7155/jgaa.00385">https://doi.org/10.7155/jgaa.00385</a>
  bibtex: '@article{Strothmann_2016, title={The Impact of Communication Patterns on
    Distributed Self-Adjusting Binary Search Tree}, volume={20}, DOI={<a href="https://doi.org/10.7155/jgaa.00385">10.7155/jgaa.00385</a>},
    number={1}, journal={Journal of Graph Algorithms and Applications}, publisher={Journal
    of Graph Algorithms and Applications}, author={Strothmann, Thim Frederik}, year={2016},
    pages={79–100} }'
  chicago: 'Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed
    Self-Adjusting Binary Search Tree.” <i>Journal of Graph Algorithms and Applications</i>
    20, no. 1 (2016): 79–100. <a href="https://doi.org/10.7155/jgaa.00385">https://doi.org/10.7155/jgaa.00385</a>.'
  ieee: T. F. Strothmann, “The Impact of Communication Patterns on Distributed Self-Adjusting
    Binary Search Tree,” <i>Journal of Graph Algorithms and Applications</i>, vol.
    20, no. 1, pp. 79–100, 2016.
  mla: Strothmann, Thim Frederik. “The Impact of Communication Patterns on Distributed
    Self-Adjusting Binary Search Tree.” <i>Journal of Graph Algorithms and Applications</i>,
    vol. 20, no. 1, Journal of Graph Algorithms and Applications, 2016, pp. 79–100,
    doi:<a href="https://doi.org/10.7155/jgaa.00385">10.7155/jgaa.00385</a>.
  short: T.F. Strothmann, Journal of Graph Algorithms and Applications 20 (2016) 79–100.
date_created: 2018-11-19T15:33:50Z
date_updated: 2022-01-06T07:02:38Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.7155/jgaa.00385
file:
- access_level: closed
  content_type: application/pdf
  creator: thim
  date_created: 2018-11-27T11:58:08Z
  date_updated: 2018-11-27T11:58:08Z
  file_id: '5912'
  file_name: Strothmann2016.20.1.pdf
  file_size: 2324066
  relation: main_file
  success: 1
file_date_updated: 2018-11-27T11:58:08Z
has_accepted_license: '1'
intvolume: '        20'
issue: '1'
language:
- iso: eng
page: 79-100
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '5'
  name: SFB 901 - Subproject A1
publication: Journal of Graph Algorithms and Applications
publication_identifier:
  issn:
  - 1526-1719
publication_status: published
publisher: Journal of Graph Algorithms and Applications
quality_controlled: '1'
status: public
title: The Impact of Communication Patterns on Distributed Self-Adjusting Binary Search
  Tree
type: journal_article
user_id: '477'
volume: 20
year: '2016'
...
---
_id: '726'
author:
- first_name: Philip
  full_name: Wette, Philip
  last_name: Wette
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Wette P, Karl H. DCT<sup>2</sup>Gen: A traffic generator for data centers.
    <i>Computer Communications</i>. 2016:45--58. doi:<a href="https://doi.org/10.1016/j.comcom.2015.12.001">10.1016/j.comcom.2015.12.001</a>'
  apa: 'Wette, P., &#38; Karl, H. (2016). DCT<sup>2</sup>Gen: A traffic generator
    for data centers. <i>Computer Communications</i>, 45--58. <a href="https://doi.org/10.1016/j.comcom.2015.12.001">https://doi.org/10.1016/j.comcom.2015.12.001</a>'
  bibtex: '@article{Wette_Karl_2016, title={DCT<sup>2</sup>Gen: A traffic generator
    for data centers}, DOI={<a href="https://doi.org/10.1016/j.comcom.2015.12.001">10.1016/j.comcom.2015.12.001</a>},
    journal={Computer Communications}, author={Wette, Philip and Karl, Holger}, year={2016},
    pages={45--58} }'
  chicago: 'Wette, Philip, and Holger Karl. “DCT<sup>2</sup>Gen: A Traffic Generator
    for Data Centers.” <i>Computer Communications</i>, 2016, 45--58. <a href="https://doi.org/10.1016/j.comcom.2015.12.001">https://doi.org/10.1016/j.comcom.2015.12.001</a>.'
  ieee: 'P. Wette and H. Karl, “DCT<sup>2</sup>Gen: A traffic generator for data centers,”
    <i>Computer Communications</i>, pp. 45--58, 2016.'
  mla: 'Wette, Philip, and Holger Karl. “DCT<sup>2</sup>Gen: A Traffic Generator for
    Data Centers.” <i>Computer Communications</i>, 2016, pp. 45--58, doi:<a href="https://doi.org/10.1016/j.comcom.2015.12.001">10.1016/j.comcom.2015.12.001</a>.'
  short: P. Wette, H. Karl, Computer Communications (2016) 45--58.
date_created: 2017-11-27T10:22:25Z
date_updated: 2022-01-06T07:03:31Z
ddc:
- '000'
department:
- _id: '75'
doi: 10.1016/j.comcom.2015.12.001
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T15:59:29Z
  date_updated: 2018-11-02T15:59:29Z
  file_id: '5319'
  file_name: WetteKarl.pdf
  file_size: 1671431
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T15:59:29Z
has_accepted_license: '1'
language:
- iso: eng
page: 45--58
project:
- _id: '16'
  name: SFB 901 - Subproject C4
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
publication: Computer Communications
status: public
title: 'DCT²Gen: A traffic generator for data centers'
type: journal_article
user_id: '477'
year: '2016'
...
---
_id: '730'
abstract:
- lang: eng
  text: "Allocating resources to virtualized network functions and services to meet
    service level agreements is a challenging task for NFV management and orchestration
    systems. This becomes even more challenging when agile development methodologies,
    like DevOps, are applied. In such scenarios, management and orchestration systems
    are continuously facing new versions of functions and services which makes it
    hard to decide how much resources have to be allocated to them to provide the
    expected service performance. \r\nOne solution for this problem is to support
    resource allocation decisions with performance behavior information obtained by
    profiling techniques applied to such network functions and services.\r\n\r\nIn
    this position paper, we analyze and discuss the components needed to generate
    such performance behavior information within the NFV DevOps workflow. We also
    outline research questions that identify open issues and missing pieces for a
    fully integrated NFV profiling solution. Further, we introduce a novel profiling
    mechanism that is able to profile virtualized network functions and entire network
    service chains under different resource constraints before they are deployed on
    production infrastructure."
author:
- first_name: Manuel
  full_name: Peuster, Manuel
  id: '13271'
  last_name: Peuster
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Peuster M, Karl H. Understand Your Chains: Towards Performance Profile-Based
    Network Service Management. In: <i>Fifth European Workshop on Software-Defined
    Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>. ; 2016:7--12.
    doi:<a href="https://doi.org/10.1109/EWSDN.2016.9">10.1109/EWSDN.2016.9</a>'
  apa: 'Peuster, M., &#38; Karl, H. (2016). Understand Your Chains: Towards Performance
    Profile-Based Network Service Management. In <i>Fifth European Workshop on Software-Defined
    Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i> (pp.
    7--12). Den Haag. <a href="https://doi.org/10.1109/EWSDN.2016.9">https://doi.org/10.1109/EWSDN.2016.9</a>'
  bibtex: '@inproceedings{Peuster_Karl_2016, title={Understand Your Chains: Towards
    Performance Profile-Based Network Service Management}, DOI={<a href="https://doi.org/10.1109/EWSDN.2016.9">10.1109/EWSDN.2016.9</a>},
    booktitle={Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den
    Haag, The Netherlands, October 10-11, 2016}, author={Peuster, Manuel and Karl,
    Holger}, year={2016}, pages={7--12} }'
  chicago: 'Peuster, Manuel, and Holger Karl. “Understand Your Chains: Towards Performance
    Profile-Based Network Service Management.” In <i>Fifth European Workshop on Software-Defined
    Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>, 7--12,
    2016. <a href="https://doi.org/10.1109/EWSDN.2016.9">https://doi.org/10.1109/EWSDN.2016.9</a>.'
  ieee: 'M. Peuster and H. Karl, “Understand Your Chains: Towards Performance Profile-Based
    Network Service Management,” in <i>Fifth European Workshop on Software-Defined
    Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>, Den
    Haag, 2016, pp. 7--12.'
  mla: 'Peuster, Manuel, and Holger Karl. “Understand Your Chains: Towards Performance
    Profile-Based Network Service Management.” <i>Fifth European Workshop on Software-Defined
    Networks, EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016</i>, 2016,
    pp. 7--12, doi:<a href="https://doi.org/10.1109/EWSDN.2016.9">10.1109/EWSDN.2016.9</a>.'
  short: 'M. Peuster, H. Karl, in: Fifth European Workshop on Software-Defined Networks,
    EWSDN 2016, Den Haag, The Netherlands, October 10-11, 2016, 2016, pp. 7--12.'
conference:
  location: Den Haag
  name: Fifth European Workshop on Software-Defined Networks (EWSDN
date_created: 2017-11-27T10:22:25Z
date_updated: 2022-01-06T07:03:33Z
ddc:
- '000'
department:
- _id: '75'
doi: 10.1109/EWSDN.2016.9
file:
- access_level: open_access
  content_type: application/pdf
  creator: peuster
  date_created: 2018-06-25T13:10:10Z
  date_updated: 2018-06-25T13:16:56Z
  file_id: '3353'
  file_name: main_ris.pdf
  file_size: 966702
  relation: main_file
file_date_updated: 2018-06-25T13:16:56Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: http://ieeexplore.ieee.org/document/7956044/
oa: '1'
page: 7--12
project:
- _id: '25'
  call_identifier: 5G PPP Phase 1
  grant_number: '671517'
  name: 'SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized
    Networks'
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: Fifth European Workshop on Software-Defined Networks, EWSDN 2016, Den
  Haag, The Netherlands, October 10-11, 2016
publication_status: published
status: public
title: 'Understand Your Chains: Towards Performance Profile-Based Network Service
  Management'
type: conference
urn: '7309'
user_id: '13271'
year: '2016'
...
---
_id: '731'
abstract:
- lang: eng
  text: "Traditional cellular networks are forced to remain active regardless of the
    actual amount of traffic that is currently produced/requested, with a clear waste
    of energy. Two-layer mobile networks with separated signalling and data layers
    have been recently proposed for energy savings in future implementations. These
    networks are able to switch off unneeded data cells completely while maintaining
    full coverage with their signalling cells, thus saving energy. In this demonstration,
    we showcase a testbed that uses Wi-Fi access points to emulate small cells of
    the data layer and a publicly available cellular connection as the signalling
    layer. We use off-the-shelf Android smartphones with an ad-hoc networking management
    module and a MultiPath TCP-enabled kernel to manage the Wi-Fi and cellular interfaces
    simultaneously.\r\nThe testbed is used to demonstrate the general feasibility
    of this layered architecture and to facilitate experiments with network-wide resource
    optimization. "
author:
- first_name: Manuel
  full_name: Peuster, Manuel
  id: '13271'
  last_name: Peuster
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
- first_name: Alessandro
  full_name: Enrico Redondi, Alessandro
  last_name: Enrico Redondi
- first_name: Antonio
  full_name: Capone, Antonio
  last_name: Capone
citation:
  ama: 'Peuster M, Karl H, Enrico Redondi A, Capone A. Demonstrating on-demand cell
    switching with a two-layer mobile network testbed. In: <i>IEEE Conference on Computer
    Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April
    10-14, 2016</i>. ; 2016:1015--1016. doi:<a href="https://doi.org/10.1109/INFCOMW.2016.7562232">10.1109/INFCOMW.2016.7562232</a>'
  apa: Peuster, M., Karl, H., Enrico Redondi, A., &#38; Capone, A. (2016). Demonstrating
    on-demand cell switching with a two-layer mobile network testbed. In <i>IEEE Conference
    on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA,
    USA, April 10-14, 2016</i> (pp. 1015--1016). San Francisco. <a href="https://doi.org/10.1109/INFCOMW.2016.7562232">https://doi.org/10.1109/INFCOMW.2016.7562232</a>
  bibtex: '@inproceedings{Peuster_Karl_Enrico Redondi_Capone_2016, title={Demonstrating
    on-demand cell switching with a two-layer mobile network testbed}, DOI={<a href="https://doi.org/10.1109/INFCOMW.2016.7562232">10.1109/INFCOMW.2016.7562232</a>},
    booktitle={IEEE Conference on Computer Communications Workshops, INFOCOM Workshops
    2016, San Francisco, CA, USA, April 10-14, 2016}, author={Peuster, Manuel and
    Karl, Holger and Enrico Redondi, Alessandro and Capone, Antonio}, year={2016},
    pages={1015--1016} }'
  chicago: Peuster, Manuel, Holger Karl, Alessandro Enrico Redondi, and Antonio Capone.
    “Demonstrating On-Demand Cell Switching with a Two-Layer Mobile Network Testbed.”
    In <i>IEEE Conference on Computer Communications Workshops, INFOCOM Workshops
    2016, San Francisco, CA, USA, April 10-14, 2016</i>, 1015--1016, 2016. <a href="https://doi.org/10.1109/INFCOMW.2016.7562232">https://doi.org/10.1109/INFCOMW.2016.7562232</a>.
  ieee: M. Peuster, H. Karl, A. Enrico Redondi, and A. Capone, “Demonstrating on-demand
    cell switching with a two-layer mobile network testbed,” in <i>IEEE Conference
    on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA,
    USA, April 10-14, 2016</i>, San Francisco, 2016, pp. 1015--1016.
  mla: Peuster, Manuel, et al. “Demonstrating On-Demand Cell Switching with a Two-Layer
    Mobile Network Testbed.” <i>IEEE Conference on Computer Communications Workshops,
    INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016</i>, 2016, pp.
    1015--1016, doi:<a href="https://doi.org/10.1109/INFCOMW.2016.7562232">10.1109/INFCOMW.2016.7562232</a>.
  short: 'M. Peuster, H. Karl, A. Enrico Redondi, A. Capone, in: IEEE Conference on
    Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA,
    USA, April 10-14, 2016, 2016, pp. 1015--1016.'
conference:
  location: San Francisco
  name: IEEE Conference on Computer Communications Workshops, INFOCOM
date_created: 2017-11-27T10:22:25Z
date_updated: 2022-01-06T07:03:34Z
ddc:
- '000'
department:
- _id: '75'
doi: 10.1109/INFCOMW.2016.7562232
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T14:11:50Z
  date_updated: 2018-11-02T14:11:50Z
  file_id: '5264'
  file_name: 07562232.pdf
  file_size: 2080026
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T14:11:50Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: http://ieeexplore.ieee.org/document/7562232/
page: 1015--1016
project:
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '1'
  name: SFB 901
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE Conference on Computer Communications Workshops, INFOCOM Workshops
  2016, San Francisco, CA, USA, April 10-14, 2016
publication_status: published
status: public
title: Demonstrating on-demand cell switching with a two-layer mobile network testbed
type: conference
user_id: '477'
year: '2016'
...
---
_id: '738'
abstract:
- lang: eng
  text: "Virtualized network services consisting of multiple individual network functions
    are already today deployed across multiple sites, so called multi-PoP (points
    of presence) environments. This allows to improve service performance by optimizing
    its placement in the network. But prototyping and testing of these complex distributed
    software systems becomes extremely challenging. The reason is that not only the
    network service as such has to be tested but also its integration with management
    and orchestration systems. Existing solutions, like simulators, basic network
    emulators, or local cloud testbeds, do not support all aspects of these tasks.\r\n\r\nTo
    this end, we introduce MeDICINE, a novel NFV prototyping platform that is able
    to execute production-ready network functions, provided as software containers,
    in an emulated multi-PoP environment. These network functions can be controlled
    by any third-party management and orchestration system that connects to our platform
    through standard interfaces. Based on this, a developer can use our platform to
    prototype and test complex network services in a realistic environment running
    on his laptop.\r\n"
author:
- first_name: Manuel
  full_name: Peuster, Manuel
  id: '13271'
  last_name: Peuster
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
- first_name: Steven
  full_name: van Rossem, Steven
  last_name: van Rossem
citation:
  ama: 'Peuster M, Karl H, van Rossem S. MeDICINE: Rapid Prototyping of Production-Ready
    Network Services in Multi-PoP Environments. In: <i>IEEE Conference on Network
    Function Virtualization and Software Defined Networks (NFV-SDN)</i>. ; 2016. doi:<a
    href="https://doi.org/10.1109/NFV-SDN.2016.7919490">10.1109/NFV-SDN.2016.7919490</a>'
  apa: 'Peuster, M., Karl, H., &#38; van Rossem, S. (2016). MeDICINE: Rapid Prototyping
    of Production-Ready Network Services in Multi-PoP Environments. In <i>IEEE Conference
    on Network Function Virtualization and Software Defined Networks (NFV-SDN)</i>.
    Palo Alto. <a href="https://doi.org/10.1109/NFV-SDN.2016.7919490">https://doi.org/10.1109/NFV-SDN.2016.7919490</a>'
  bibtex: '@inproceedings{Peuster_Karl_van Rossem_2016, title={MeDICINE: Rapid Prototyping
    of Production-Ready Network Services in Multi-PoP Environments}, DOI={<a href="https://doi.org/10.1109/NFV-SDN.2016.7919490">10.1109/NFV-SDN.2016.7919490</a>},
    booktitle={IEEE Conference on Network Function Virtualization and Software Defined
    Networks (NFV-SDN)}, author={Peuster, Manuel and Karl, Holger and van Rossem,
    Steven}, year={2016} }'
  chicago: 'Peuster, Manuel, Holger Karl, and Steven van Rossem. “MeDICINE: Rapid
    Prototyping of Production-Ready Network Services in Multi-PoP Environments.” In
    <i>IEEE Conference on Network Function Virtualization and Software Defined Networks
    (NFV-SDN)</i>, 2016. <a href="https://doi.org/10.1109/NFV-SDN.2016.7919490">https://doi.org/10.1109/NFV-SDN.2016.7919490</a>.'
  ieee: 'M. Peuster, H. Karl, and S. van Rossem, “MeDICINE: Rapid Prototyping of Production-Ready
    Network Services in Multi-PoP Environments,” in <i>IEEE Conference on Network
    Function Virtualization and Software Defined Networks (NFV-SDN)</i>, Palo Alto,
    2016.'
  mla: 'Peuster, Manuel, et al. “MeDICINE: Rapid Prototyping of Production-Ready Network
    Services in Multi-PoP Environments.” <i>IEEE Conference on Network Function Virtualization
    and Software Defined Networks (NFV-SDN)</i>, 2016, doi:<a href="https://doi.org/10.1109/NFV-SDN.2016.7919490">10.1109/NFV-SDN.2016.7919490</a>.'
  short: 'M. Peuster, H. Karl, S. van Rossem, in: IEEE Conference on Network Function
    Virtualization and Software Defined Networks (NFV-SDN), 2016.'
conference:
  location: Palo Alto
  name: IEEE Conference on Network Function Virtualization and Software Defined Networks
    (NFV-SDN)
date_created: 2017-11-27T10:22:25Z
date_updated: 2022-01-06T07:03:36Z
ddc:
- '000'
department:
- _id: '75'
doi: 10.1109/NFV-SDN.2016.7919490
file:
- access_level: open_access
  content_type: application/pdf
  creator: peuster
  date_created: 2018-06-25T13:06:47Z
  date_updated: 2018-06-25T13:17:34Z
  file_id: '3349'
  file_name: main_ris.pdf
  file_size: 848438
  relation: main_file
file_date_updated: 2018-06-25T13:17:34Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: https://arxiv.org/pdf/1606.05995.pdf
oa: '1'
project:
- _id: '25'
  call_identifier: 5G PPP Phase 1
  grant_number: '671517'
  name: 'SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized
    Networks'
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE Conference on Network Function Virtualization and Software Defined
  Networks (NFV-SDN)
publication_status: published
status: public
title: 'MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP
  Environments'
type: conference
urn: '7384'
user_id: '13271'
year: '2016'
...
---
_id: '4374'
author:
- first_name: Steffen
  full_name: Zimmermann, Steffen
  last_name: Zimmermann
- first_name: Philipp
  full_name: Herrmann, Philipp
  last_name: Herrmann
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
- first_name: Barrie
  full_name: Nault, Barrie
  last_name: Nault
citation:
  ama: 'Zimmermann S, Herrmann P, Kundisch D, Nault B. How do different Sources of
    the Variance of Online Consumer Ratings matter? In: <i>Workshop on IS Design and
    Economic Behavior (ISDEB)</i>. ; 2016.'
  apa: Zimmermann, S., Herrmann, P., Kundisch, D., &#38; Nault, B. (2016). How do
    different Sources of the Variance of Online Consumer Ratings matter? In <i>Workshop
    on IS Design and Economic Behavior (ISDEB)</i>. Ilmenau, Germany.
  bibtex: '@inproceedings{Zimmermann_Herrmann_Kundisch_Nault_2016, title={How do different
    Sources of the Variance of Online Consumer Ratings matter?}, booktitle={Workshop
    on IS Design and Economic Behavior (ISDEB)}, author={Zimmermann, Steffen and Herrmann,
    Philipp and Kundisch, Dennis and Nault, Barrie}, year={2016} }'
  chicago: Zimmermann, Steffen, Philipp Herrmann, Dennis Kundisch, and Barrie Nault.
    “How Do Different Sources of the Variance of Online Consumer Ratings Matter?”
    In <i>Workshop on IS Design and Economic Behavior (ISDEB)</i>, 2016.
  ieee: S. Zimmermann, P. Herrmann, D. Kundisch, and B. Nault, “How do different Sources
    of the Variance of Online Consumer Ratings matter?,” in <i>Workshop on IS Design
    and Economic Behavior (ISDEB)</i>, Ilmenau, Germany, 2016.
  mla: Zimmermann, Steffen, et al. “How Do Different Sources of the Variance of Online
    Consumer Ratings Matter?” <i>Workshop on IS Design and Economic Behavior (ISDEB)</i>,
    2016.
  short: 'S. Zimmermann, P. Herrmann, D. Kundisch, B. Nault, in: Workshop on IS Design
    and Economic Behavior (ISDEB), 2016.'
conference:
  location: Ilmenau, Germany
  name: Workshop on IS Design and Economic Behavior (ISDEB)
date_created: 2018-09-10T13:02:44Z
date_updated: 2022-01-06T07:00:59Z
ddc:
- '330'
department:
- _id: '276'
file:
- access_level: closed
  content_type: application/pdf
  creator: abursig
  date_created: 2019-01-29T14:38:25Z
  date_updated: 2019-01-29T14:38:25Z
  file_id: '7242'
  file_name: Rating Variance_CIST_Abstract.pdf
  file_size: 83968
  relation: main_file
  success: 1
file_date_updated: 2019-01-29T14:38:25Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '8'
  name: SFB 901 - Subproject A4
publication: Workshop on IS Design and Economic Behavior (ISDEB)
quality_controlled: '1'
status: public
title: How do different Sources of the Variance of Online Consumer Ratings matter?
type: conference_abstract
user_id: '477'
year: '2016'
...
