@misc{302,
  author       = {{Stroh, Christian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Efficient Attributes for Pairing-Based Anonymous Credentials}}},
  year         = {{2015}},
}

@phdthesis{305,
  author       = {{Kniesburges, Sebastian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Distributed Data Structures and the Power of topological Self-Stabilization}}},
  year         = {{2015}},
}

@misc{312,
  author       = {{Schleiter, Patrick}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Constructions of Fully Secure Predicate Encryption Schemes}}},
  year         = {{2015}},
}

@inproceedings{271,
  abstract     = {{In \emph{bandwidth allocation games} (BAGs), the strategy of a player consists of various demands on different resources. The player's utility is at most the sum of these demands, provided they are fully satisfied. Every resource has a limited capacity and if it is exceeded by the total demand, it has to be split between the players. Since these games generally do not have pure Nash equilibria, we consider approximate pure Nash equilibria, in which no player can improve her utility by more than some fixed factor $\alpha$ through unilateral strategy changes. There is a threshold $\alpha_\delta$ (where $\delta$ is a parameter that limits the demand of each player on a specific resource) such that $\alpha$-approximate pure Nash equilibria always exist for $\alpha \geq \alpha_\delta$, but not for $\alpha < \alpha_\delta$. We give both upper and lower bounds on this threshold $\alpha_\delta$ and show that the corresponding decision problem is ${\sf NP}$-hard. We also show that the $\alpha$-approximate price of anarchy for BAGs is $\alpha+1$. For a restricted version of the game, where demands of players only differ slightly from each other (e.g. symmetric games), we show that approximate Nash equilibria can be reached (and thus also be computed) in polynomial time using the best-response dynamic. Finally, we show that a broader class of utility-maximization games (which includes BAGs) converges quickly towards states whose social welfare is close to the optimum.}},
  author       = {{Drees, Maximilian and Feldotto, Matthias and Riechers, Sören and Skopalik, Alexander}},
  booktitle    = {{Proceedings of the 8th International Symposium on Algorithmic Game Theory (SAGT)}},
  pages        = {{178--189}},
  title        = {{{On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games}}},
  doi          = {{10.1007/978-3-662-48433-3_14}},
  year         = {{2015}},
}

@misc{273,
  author       = {{Kohn, Kathlén}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms}}},
  year         = {{2015}},
}

@inproceedings{274,
  abstract     = {{Consider the problem in which n jobs that are classified into k types are to be scheduled on m identical machines without preemption. A machine requires a proper setup taking s time units before processing jobs of a given type. The objective is to minimize the makespan of the resulting schedule. We design and analyze an approximation algorithm that runs in time polynomial in n,m and k and computes a solution with an approximation factor that can be made arbitrarily close to 3/2.}},
  author       = {{Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and Riechers, Sören}},
  booktitle    = {{Algorithms and Data Structures: 14th International Symposium, WADS 2015, Victoria, BC, Canada, August 5-7, 2015. Proceedings}},
  editor       = {{Dehne, Frank and Sack, Jörg Rüdiger and Stege, Ulrike}},
  pages        = {{542----553}},
  title        = {{{Non-preemptive Scheduling on Machines with Setup Times}}},
  doi          = {{10.1007/978-3-319-21840-3_45}},
  year         = {{2015}},
}

@article{1772,
  author       = {{Torresen, Jim and Plessl, Christian and Yao, Xin}},
  journal      = {{IEEE Computer}},
  keywords     = {{self-awareness, self-expression}},
  number       = {{7}},
  pages        = {{18--20}},
  publisher    = {{IEEE Computer Society}},
  title        = {{{Self-Aware and Self-Expressive Systems – Guest Editor's Introduction}}},
  doi          = {{10.1109/MC.2015.205}},
  volume       = {{48}},
  year         = {{2015}},
}

@misc{235,
  author       = {{Strotmeyer, Sebastian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Vergleichende Betrachtung von Software-Werkzeugen zur Geschäftsmodellentwicklung}}},
  year         = {{2015}},
}

@misc{236,
  author       = {{Neumann, Daniel}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Vergleichende Betrachtung ausgewählter Ansätze zur Bewertung von Innovation Performance im Kontext von IT-gestützten Geschäftsmodellinnovationen im Automotive Bereich}}},
  year         = {{2015}},
}

@inproceedings{239,
  abstract     = {{We report on the construction of the Wikidata Vandalism Corpus WDVC-2015, the first corpus for vandalism in knowledge bases. Our corpus is based on the entire revision history of Wikidata, the knowledge base underlying Wikipedia. Among Wikidata's 24 million manual revisions, we have identified more than 100,000 cases of vandalism. An in-depth corpus analysis lays the groundwork for research and development on automatic vandalism detection in public knowledge bases. Our analysis shows that 58% of the vandalism revisions can be found in the textual portions of Wikidata, and the remainder in structural content, e.g., subject-predicate-object triples. Moreover, we find that some vandals also target Wikidata content whose manipulation may impact content displayed on Wikipedia, revealing potential vulnerabilities. Given today's importance of knowledge bases for information systems, this shows that public knowledge bases must be used with caution.}},
  author       = {{Heindorf, Stefan and Potthast, Martin and Stein, Benno and Engels, Gregor}},
  booktitle    = {{Proceedings of the 38th International ACM Conference on Research and Development in Information Retrieval (SIGIR 15)}},
  pages        = {{831----834}},
  title        = {{{Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis}}},
  doi          = {{10.1145/2766462.2767804}},
  year         = {{2015}},
}

@inproceedings{240,
  abstract     = {{We consider online leasing problems in which demands arrive over time and need to be served by leasing resources. We introduce a new model for these problems such that a resource can be leased for K different durations each incurring a different cost (longer leases cost less per time unit). Each demand i can be served anytime between its arrival ai and its deadline ai+di by a leased resource. The objective is to meet all deadlines while minimizing the total leasing costs. This model is a natural generalization of Meyerson’s ParkingPermitProblem (FOCS 2005) in which di=0 for all i. We propose an online algorithm that is Θ(K+dmaxlmin)-competitive where dmax and lmin denote the largest di and the shortest available lease length, respectively. We also extend the SetCoverLeasing problem by deadlines and give a competitive online algorithm which also improves on existing solutions for the original SetCoverLeasing problem.}},
  author       = {{Li, Shouwei and Mäcker, Alexander and Markarian, Christine and Meyer auf der Heide, Friedhelm and Riechers, Sören}},
  booktitle    = {{Proceedings of the 21st Annual International Computing and Combinatorics Conference (COCOON)}},
  pages        = {{277----288}},
  title        = {{{Towards Flexible Demands in Online Leasing Problems}}},
  doi          = {{10.1007/978-3-319-21398-9_22}},
  year         = {{2015}},
}

@inproceedings{230,
  abstract     = {{Cognitive fit theory (CFT) provides guidance for how best to represent information that is relevant for solving a given problem. CFT is widely established in information systems research and its validity has been demonstrated in a great variety of contexts. However, of the two major types of problems that exist (i.e., routine and creative problems) prior CFT research has addressed only one: routine problems. Creative problems, despite their importance, have been left unaddressed. Therefore, based on the visual sketching model of problem solving, we propose an extension of CFT and thereby demonstrate that cognitive fit can promote problem solving performance also for creative problems. In doing so, we extend the boundary of CFT and add to creativity research a previously unknown cognitive mechanism for promoting creative performance: cognitive fit. Moreover, we contribute to general problem solving research by bridging the gap between problem solving in creativity and information systems research.}},
  author       = {{John, Thomas and Kundisch, Dennis}},
  booktitle    = {{Proceedings of the 36th International Conference on Information Systems (ICIS), Fort Worth, USA}},
  location     = {{Fort Worth, USA}},
  title        = {{{Why Fit Leads to Surprise: An Extension of Cognitive Fit Theory to Creative Problems}}},
  year         = {{2015}},
}

@techreport{233,
  abstract     = {{Motivated by the deterministic single exponential time algorithm of Micciancio and Voulgaris for solving the shortest and closest vector problem for the Euclidean norm, we study the geometry and complexity of Voronoi cells of lattices with respect to arbitrary norms.On the positive side, we show that for strictly convex and smooth norms the geometry of Voronoi cells of lattices in any dimension is similar to the Euclidean case, i.e., the Voronoi cells are defined by the so-called Voronoi-relevant vectors and the facets of a Voronoi cell are in one-to-one correspondence with these vectors. On the negative side, we show that combinatorially Voronoi cells for arbitrary strictly convex and smooth norms are much more complicated than in the Euclidean case.In particular, we construct a family of three-dimensional lattices whose number of Voronoi-relevant vectors with respect to the l_3-norm is unbounded.Since the algorithm of Micciancio and Voulgaris and its run time analysis crucially dependonthefactthatfortheEuclidean normthenumber of Voronoi-relevant vectors is single exponential in the lattice dimension, this indicates that the techniques of Micciancio and Voulgaris cannot be extended to achieve deterministic single exponential time algorithms for lattice problems with respect to arbitrary l_p-norms.}},
  author       = {{Blömer, Johannes and Kohn, Kathlén}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Voronoi Cells of Lattices with Respect to Arbitrary Norms}}},
  year         = {{2015}},
}

@inproceedings{986,
  abstract     = {{The increasing amount of mobile traffic leads to a significantly higher energy consumption of mobile networks that is mainly caused by the high number of required base stations. One recent solution for this is based on a two-layered network that uses long-range macro cells to provide a full coverage signaling overlay and short-range small cells for fast data transmissions. These small cells can be switched off when they are not needed and allow network-wide energy optimizations.

This paper presents an architecture that extends existing mobile networks to integrate a small cell layer that supports on-demand cell activation. We discuss how additional small cells can be interconnected with existing core components and how they can be controlled by a resource management component. 
Finally, a Wi-Fi based proof of concept testbed implementation is presented that demonstrates the feasibility of the approach.}},
  author       = {{Peuster, Manuel and Karl, Holger}},
  booktitle    = {{Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges}},
  location     = {{London}},
  title        = {{{An Architecture for Energy-aware On-demand Mobile Network Management}}},
  year         = {{2015}},
}

@misc{5413,
  author       = {{Funke, Lukas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{An LLVM Based Toolchain for Transparent Acceleration of Digital Image Processing Applications using FPGA Overlay Architectures}}},
  year         = {{2015}},
}

@misc{5416,
  author       = {{Löcke, Thomas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Instance-Specific Computing in Hard- and Software for Faster Solving of Complex Problems}}},
  year         = {{2015}},
}

@misc{5419,
  author       = {{Wallaschek, Felix}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Accelerating Programmable Logic Controllers with the use of FPGAs}}},
  year         = {{2015}},
}

@article{296,
  abstract     = {{FPGAs are known to permit huge gains in performance and efficiency for suitable applications but still require reduced design efforts and shorter development cycles for wider adoption. In this work, we compare the resulting performance of two design concepts that in different ways promise such increased productivity. As common starting point, we employ a kernel-centric design approach, where computational hotspots in an application are identified and individually accelerated on FPGA. By means of a complex stereo matching application, we evaluate two fundamentally different design philosophies and approaches for implementing the required kernels on FPGAs. In the first implementation approach, we designed individually specialized data flow kernels in a spatial programming language for a Maxeler FPGA platform; in the alternative design approach, we target a vector coprocessor with large vector lengths, which is implemented as a form of programmable overlay on the application FPGAs of a Convey HC-1. We assess both approaches in terms of overall system performance, raw kernel performance, and performance relative to invested resources. After compensating for the effects of the underlying hardware platforms, the specialized dataflow kernels on the Maxeler platform are around 3x faster than kernels executing on the Convey vector coprocessor. In our concrete scenario, due to trade-offs between reconfiguration overheads and exposed parallelism, the advantage of specialized dataflow kernels is reduced to around 2.5x.}},
  author       = {{Kenter, Tobias and Schmitz, Henning and Plessl, Christian}},
  journal      = {{International Journal of Reconfigurable Computing (IJRC)}},
  publisher    = {{Hindawi}},
  title        = {{{Exploring Tradeoffs between Specialized Kernels and a Reusable Overlay in a Stereo-Matching Case Study}}},
  doi          = {{10.1155/2015/859425}},
  volume       = {{2015}},
  year         = {{2015}},
}

@inproceedings{303,
  abstract     = {{This paper introduces Binary Acceleration At Runtime(BAAR), an easy-to-use on-the-fly binary acceleration mechanismwhich aims to tackle the problem of enabling existentsoftware to automatically utilize accelerators at runtime. BAARis based on the LLVM Compiler Infrastructure and has aclient-server architecture. The client runs the program to beaccelerated in an environment which allows program analysisand profiling. Program parts which are identified as suitable forthe available accelerator are exported and sent to the server.The server optimizes these program parts for the acceleratorand provides RPC execution for the client. The client transformsits program to utilize accelerated execution on the server foroffloaded program parts. We evaluate our work with a proofof-concept implementation of BAAR that uses an Intel XeonPhi 5110P as the acceleration target and performs automaticoffloading, parallelization and vectorization of suitable programparts. The practicality of BAAR for real-world examples is shownbased on a study of stencil codes. Our results show a speedup ofup to 4 without any developer-provided hints and 5.77 withhints over the same code compiled with the Intel Compiler atoptimization level O2 and running on an Intel Xeon E5-2670machine. Based on our insights gained during implementationand evaluation we outline future directions of research, e.g.,offloading more fine-granular program parts than functions, amore sophisticated communication mechanism or introducing onstack-replacement.}},
  author       = {{Damschen, Marvin and Plessl, Christian}},
  booktitle    = {{Proceedings of the 5th International Workshop on Adaptive Self-tuning Computing Systems (ADAPT)}},
  title        = {{{Easy-to-Use On-The-Fly Binary Program Acceleration on Many-Cores}}},
  year         = {{2015}},
}

@inproceedings{238,
  abstract     = {{In this paper, we study how binary applications can be transparently accelerated with novel heterogeneous computing resources without requiring any manual porting or developer-provided hints. Our work is based on Binary Acceleration At Runtime (BAAR), our previously introduced binary acceleration mechanism that uses the LLVM Compiler Infrastructure. BAAR is designed as a client-server architecture. The client runs the program to be accelerated in an environment, which allows program analysis and profiling and identifies and extracts suitable program parts to be offloaded. The server compiles and optimizes these offloaded program parts for the accelerator and offers access to these functions to the client with a remote procedure call (RPC) interface. Our previous work proved the feasibility of our approach, but also showed that communication time and overheads limit the granularity of functions that can be meaningfully offloaded. In this work, we motivate the importance of a lightweight, high-performance communication between server and client and present a communication mechanism based on the Message Passing Interface (MPI). We evaluate our approach by using an Intel Xeon Phi 5110P as the acceleration target and show that the communication overhead can be reduced from 40% to 10%, thus enabling even small hotspots to benefit from offloading to an accelerator.}},
  author       = {{Damschen, Marvin and Riebler, Heinrich and Vaz, Gavin Francis and Plessl, Christian}},
  booktitle    = {{Proceedings of the 2015 Conference on Design, Automation and Test in Europe (DATE)}},
  pages        = {{1078--1083}},
  publisher    = {{EDA Consortium / IEEE}},
  title        = {{{Transparent offloading of computational hotspots from binary code to Xeon Phi}}},
  doi          = {{10.7873/DATE.2015.1124}},
  year         = {{2015}},
}

