@inproceedings{21639,
  abstract     = {{The development of effective business models is an essential task in highly competitive markets like mobile ecosystems. Existing development methods for these business models do not specifically focus that the development process profoundly depends on the situation (e.g., market size, regulations) of the mobile app developer. Here, a mismatch between method and situation can lead to poor resource management and longer development cycles. In software engineering, situational method engineering is used for software projects to configure a development method out of a method repository based on the project situation. Analogously, we support creating situation-specific business model development methods with a method base and new user roles. Here, the method engineer obtains the knowledge of the domain expert and stores it in the method base as elements, building blocks, and patterns. The expert knowledge is derived from a grey literature review on mobile development processes. After this, the method engineer constructs the development method based on the described situation of the business developer. We provide an open-source tool and evaluate it by constructing a local event platform's business model development method.    }},
  author       = {{Gottschalk, Sebastian and Yigitbas, Enes and Nowosad, Alexander and Engels, Gregor}},
  booktitle    = {{Enterprise, Business-Process and Information Systems Modeling}},
  keywords     = {{Business Model Development, Situational Method Engineering, Mobile App, Business Model Development Tools}},
  publisher    = {{Springer}},
  title        = {{{Situation-specific Business Model Development Methods for Mobile App Developers}}},
  doi          = {{10.1007/978-3-030-79186-5_17}},
  year         = {{2021}},
}

@inproceedings{20693,
  abstract     = {{In practical, large-scale networks, services are requested
by users across the globe, e.g., for video streaming.
Services consist of multiple interconnected components such as
microservices in a service mesh. Coordinating these services
requires scaling them according to continuously changing user
demand, deploying instances at the edge close to their users,
and routing traffic efficiently between users and connected instances.
Network and service coordination is commonly addressed
through centralized approaches, where a single coordinator
knows everything and coordinates the entire network globally.
While such centralized approaches can reach global optima, they
do not scale to large, realistic networks. In contrast, distributed
approaches scale well, but sacrifice solution quality due to their
limited scope of knowledge and coordination decisions.

To this end, we propose a hierarchical coordination approach
that combines the good solution quality of centralized approaches
with the scalability of distributed approaches. In doing so, we divide
the network into multiple hierarchical domains and optimize
coordination in a top-down manner. We compare our hierarchical
with a centralized approach in an extensive evaluation on a real-world
network topology. Our results indicate that hierarchical
coordination can find close-to-optimal solutions in a fraction of
the runtime of centralized approaches.}},
  author       = {{Schneider, Stefan Balthasar and Jürgens, Mirko and Karl, Holger}},
  booktitle    = {{IFIP/IEEE International Symposium on Integrated Network Management (IM)}},
  keywords     = {{network management, service management, coordination, hierarchical, scalability, nfv}},
  location     = {{Bordeaux, France}},
  publisher    = {{IFIP/IEEE}},
  title        = {{{Divide and Conquer: Hierarchical Network and Service Coordination}}},
  year         = {{2021}},
}

@inproceedings{22155,
  author       = {{Gottschalk, Sebastian}},
  booktitle    = {{Advanced Software Engineering. Doctorial Consortium}},
  publisher    = {{CEUR}},
  title        = {{{Situation-specific Development of Business Models for Services in Software Ecosystems}}},
  year         = {{2021}},
}

@inproceedings{22283,
  abstract     = {{    We show how to construct an overlay network of constant degree and diameter $O(\log n)$ in time $O(\log n)$ starting from an arbitrary weakly connected graph.
    We assume a synchronous communication network in which nodes can send messages to nodes they know the identifier of and establish new connections by sending node identifiers.
    If the initial network's graph is weakly connected and has constant degree, then our algorithm constructs the desired topology with each node sending and receiving only $O(\log n)$ messages in each round in time $O(\log n)$, w.h.p., which beats the currently best $O(\log^{3/2} n)$ time algorithm of [Götte et al., SIROCCO'19].
    Since the problem cannot be solved faster than by using pointer jumping for $O(\log n)$ rounds (which would even require each node to communicate $\Omega(n)$ bits), our algorithm is asymptotically optimal.
    We achieve this speedup by using short random walks to repeatedly establish random connections between the nodes that quickly reduce the conductance of the graph using an observation of [Kwok and Lau, APPROX'14].
    
    Additionally, we show how our algorithm can be used to efficiently solve graph problems in \emph{hybrid networks} [Augustine et al., SODA'20].
    Motivated by the idea that nodes possess two different modes of communication, we assume that communication of the \emph{initial} edges is unrestricted. In contrast, only polylogarithmically many messages can be communicated over edges that have been established throughout an algorithm's execution.
    For an (undirected) graph $G$ with arbitrary degree, we show how to compute connected components, a spanning tree, and biconnected components in time $O(\log n)$, w.h.p.
    Furthermore, we show how to compute an MIS in time $O(\log d + \log \log n)$, w.h.p., where $d$ is the initial degree of $G$.}},
  author       = {{Götte, Thorsten and Hinnenthal, Kristian and Scheideler, Christian and Werthmann, Julian}},
  booktitle    = {{Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC '21)}},
  editor       = {{Censor-Hillel, Keren}},
  location     = {{Virtual}},
  publisher    = {{ACM}},
  title        = {{{Time-Optimal Construction of Overlays}}},
  doi          = {{10.1145/3465084.3467932}},
  year         = {{2021}},
}

@misc{22483,
  abstract     = {{This bachelor thesis presents a C/C++ implementation of the XCS algorithm for an embedded system and profiling results concerning the execution time of the functions. These are then analyzed in relation to the input characteristics of the examined learning environments and compared with related work. Three main conclusions can be drawn from the measured results. First, the maximum size of the population of the classifiers influences the runtime of the genetic algorithm; second, the size of the input space has a direct effect on the execution time of the matching function; and last, a larger action space results in a longer runtime generating the prediction for the possible actions. The dependencies identified here can serve to optimize the computational efficiency and make XCS more suitable for embedded systems.}},
  author       = {{Brede, Mathis}},
  publisher    = {{Paderborn University}},
  title        = {{{Implementation and Profiling of XCS in the Context of Embedded Systems}}},
  year         = {{2021}},
}

@misc{22803,
  author       = {{Frieden, Paula}},
  title        = {{{Experimentelle Untersuchung der Visualisierung von Geschäftsmodell-Abhängigkeiten und dessen Auswirkung auf das Verständnis der Nutzer von Geschäftsmodellen}}},
  year         = {{2021}},
}

@inproceedings{21727,
  abstract     = {{Platform-based business models underlie the success of many of today’s largest, fastest-growing, and most disruptive companies. Despite the success of prominent examples, such as Uber and Airbnb, creating a profitable platform ecosystem presents a key challenge for many companies across all industries. Although research provides knowledge about platforms’ different value drivers (e.g., network effects), companies that seek to transform their current business model into a platform-based one lack an artifact to reduce knowledge boundaries, collaborate effectively, and cope with the complexities and dynamics of platform ecosystems. We address this challenge by developing two artifacts and combining research from variability modeling, business model dependencies, and system dynamics. This paper presents a design science research approach to develop the platform ecosystem modeling language and the platform ecosystem development tool that support researcher and practitioner by visualizing and simulating platform ecosystems. }},
  author       = {{Vorbohle, Christian and Gottschalk, Sebastian}},
  booktitle    = {{Proceedings of the 29th European Conference on Information Systems (ECIS)}},
  keywords     = {{Platform Ecosystems, Platform Ecosystem Modeling Language, Platform Ecosystem Development Tool, Business Models, Design Science}},
  location     = {{Virtual Conference/Workshop}},
  publisher    = {{AIS}},
  title        = {{{Towards Visualizing and Simulating Business Models in Dynamic Platform Ecosystems }}},
  year         = {{2021}},
}

@article{21808,
  abstract     = {{Modern services consist of interconnected components,e.g., microservices in a service mesh or machine learning functions in a pipeline. These services can scale and run across multiple network nodes on demand. To process incoming traffic, service components have to be instantiated and traffic assigned to these instances, taking capacities, changing demands, and Quality of Service (QoS) requirements into account. This challenge is usually solved with custom approaches designed by experts. While this typically works well for the considered scenario, the models often rely on unrealistic assumptions or on knowledge that is not available in practice (e.g., a priori knowledge).

We propose DeepCoord, a novel deep reinforcement learning approach that learns how to best coordinate services and is geared towards realistic assumptions. It interacts with the network and relies on available, possibly delayed monitoring information. Rather than defining a complex model or an algorithm on how to achieve an objective, our model-free approach adapts to various objectives and traffic patterns. An agent is trained offline without expert knowledge and then applied online with minimal overhead. Compared to a state-of-the-art heuristic, DeepCoord significantly improves flow throughput (up to 76%) and overall network utility (more than 2x) on realworld network topologies and traffic traces. It also supports optimizing multiple, possibly competing objectives, learns to respect QoS requirements, generalizes to scenarios with unseen, stochastic traffic, and scales to large real-world networks. For reproducibility and reuse, our code is publicly available.}},
  author       = {{Schneider, Stefan Balthasar and Khalili, Ramin and Manzoor, Adnan and Qarawlus, Haydar and Schellenberg, Rafael and Karl, Holger and Hecker, Artur}},
  journal      = {{Transactions on Network and Service Management}},
  keywords     = {{network management, service management, coordination, reinforcement learning, self-learning, self-adaptation, multi-objective}},
  publisher    = {{IEEE}},
  title        = {{{Self-Learning Multi-Objective Service Coordination Using Deep Reinforcement Learning}}},
  doi          = {{10.1109/TNSM.2021.3076503}},
  year         = {{2021}},
}

@inproceedings{21812,
  author       = {{Vorbohle, Christian and Szopinski, Daniel and Kundisch, Dennis}},
  booktitle    = {{Proceedings of the 29th European Conference on Information Systems (ECIS)}},
  location     = {{Virtual Conference/Workshop}},
  title        = {{{Toward Understanding the Complexity of Business Models – A Taxonomy of Business Model Dependencies}}},
  year         = {{2021}},
}

@inbook{22057,
  abstract     = {{We construct more efficient cryptosystems with provable
security against adaptive attacks, based on simple and natural hardness
assumptions in the standard model. Concretely, we describe:
– An adaptively-secure variant of the efficient, selectively-secure LWE-
based identity-based encryption (IBE) scheme of Agrawal, Boneh,
and Boyen (EUROCRYPT 2010). In comparison to the previously
most efficient such scheme by Yamada (CRYPTO 2017) we achieve
smaller lattice parameters and shorter public keys of size O(log λ),
where λ is the security parameter.
– Adaptively-secure variants of two efficient selectively-secure pairing-
based IBEs of Boneh and Boyen (EUROCRYPT 2004). One is based
on the DBDH assumption, has the same ciphertext size as the cor-
responding BB04 scheme, and achieves full adaptive security with
public parameters of size only O(log λ). The other is based on a q-
type assumption and has public key size O(λ), but a ciphertext is
only a single group element and the security reduction is quadrat-
ically tighter than the corresponding scheme by Jager and Kurek
(ASIACRYPT 2018).
– A very efficient adaptively-secure verifiable random function where
proofs, public keys, and secret keys have size O(log λ).
As a technical contribution we introduce blockwise partitioning, which
leverages the assumption that a cryptographic hash function is weak
near-collision resistant to prove full adaptive security of cryptosystems.}},
  author       = {{Jager, Tibor and Kurek, Rafael and Niehues, David}},
  booktitle    = {{Public-Key Cryptography – PKC 2021}},
  isbn         = {{9783030752446}},
  issn         = {{0302-9743}},
  title        = {{{Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance}}},
  doi          = {{10.1007/978-3-030-75245-3_22}},
  year         = {{2021}},
}

@inbook{22059,
  abstract     = {{Verifiable random functions (VRFs), introduced by Micali,
Rabin and Vadhan (FOCS’99), are the public-key equivalent of pseudo-
random functions. A public verification key and proofs accompanying the
output enable all parties to verify the correctness of the output. How-
ever, all known standard model VRFs have a reduction loss that is much
worse than what one would expect from known optimal constructions of
closely related primitives like unique signatures. We show that:
1. Every security proof for a VRF that relies on a non-interactive
assumption has to lose a factor of Q, where Q is the number of adver-
sarial queries. To that end, we extend the meta-reduction technique
of Bader et al. (EUROCRYPT’16) to also cover VRFs.
2. This raises the question: Is this bound optimal? We answer this ques-
tion in the affirmative by presenting the first VRF with a reduction
from the non-interactive qDBDHI assumption to the security of VRF
that achieves this optimal loss.
We thus paint a complete picture of the achievability of tight verifiable
random functions: We show that a security loss of Q is unavoidable and
present the first construction that achieves this bound.}},
  author       = {{Niehues, David}},
  booktitle    = {{Public-Key Cryptography – PKC 2021}},
  isbn         = {{9783030752477}},
  issn         = {{0302-9743}},
  title        = {{{Verifiable Random Functions with Optimal Tightness}}},
  doi          = {{10.1007/978-3-030-75248-4_3}},
  year         = {{2021}},
}

@inproceedings{29235,
  author       = {{Gottschalk, Sebastian and Aziz, Muhammad Suffyan and Yigitbas, Enes and Engels, Gregor}},
  booktitle    = {{Software Business - 12th International Conference, ICSOB 2021, Drammen, Norway, December 2-3, 2021, Proceedings}},
  editor       = {{Wang, Xiaofeng and Martini, Antonio and Nguyen-Duc, Anh and Stray, Viktoria}},
  pages        = {{205–220}},
  publisher    = {{Springer}},
  title        = {{{Design Principles for a Crowd-Based Prototype Validation Platform}}},
  doi          = {{10.1007/978-3-030-91983-2_16}},
  volume       = {{434}},
  year         = {{2021}},
}

@inbook{25528,
  abstract     = {{Developing effective business models is a complex process for a company where several tasks (e.g., conduct customer interviews) need to be accomplished, and decisions (e.g., advertisement as a revenue stream) must be made. Here, domain experts can guide the choices of tasks and decisions with their knowledge. Nevertheless, this knowledge needs to match the situation of the company (e.g., financial resources) and the application domain of the product/service (e.g., mobile app) to reduce the risk of developing ineffective business models with low market penetration. This is not covered by one-size-fits-all development methods without tailoring before the enaction.
Therefore, we conduct a design science study to create a situation-specific development approach for business models. Based on situational method engineering and our previous work in storing knowledge of methods and models in distinct repositories, this paper shows the situation-specific composition and enaction of business model development methods. First, the method engineer composes the development method out of both repositories based on the situational context. Second, the business developer enacts the method and develops the business model.  We implement the approach in a tool and evaluate it with a industrial case study on mobile apps.}},
  author       = {{Gottschalk, Sebastian and Yigitbas, Enes and Nowosad, Alexander and Engels, Gregor}},
  booktitle    = {{Product-focused Software Process Improvement}},
  keywords     = {{Business Model Development, Situational Method Engineering, Lean Development, Kanban Boards, Canvas Models}},
  location     = {{Turin}},
  publisher    = {{Springer}},
  title        = {{{Situation- and  Domain-specific Composition and Enactment of Business Model Development Methods}}},
  year         = {{2021}},
}

@misc{23554,
  author       = {{Pieper, Florian}},
  title        = {{{Systematische Identifikation und Analyse von Vorgehensmodellen zur Geschäftsmodellentwicklung auf digitalen Plattformen}}},
  year         = {{2021}},
}

@misc{21798,
  author       = {{Richert, Laurenz Jobst}},
  title        = {{{Abhängigkeiten innerhalb und zwischen Business Model Canvas und  ArchiMate - Ein konzeptioneller Vergleich zweier Modellierungssprachen}}},
  year         = {{2021}},
}

@misc{21116,
  author       = {{Rennemeier, Steffen}},
  title        = {{{Entwicklung und Pilotierung eines Experiments über Visualisierungen von Taxonomien in der Wirtschaftsinformatik}}},
  year         = {{2021}},
}

@misc{21714,
  author       = {{Wittmann, Daniel}},
  title        = {{{Interdependente Geschäftsmodelle: Eine systematische Analyse von Relationen in Geschäftsmodell-Modellierungssprachen}}},
  year         = {{2021}},
}

@unpublished{26645,
  author       = {{Bobolz, Jan and Eidens, Fabian and Heitjohann, Raphael and Fell, Jeremy}},
  publisher    = {{IACR eprint}},
  title        = {{{Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes}}},
  year         = {{2021}},
}

@techreport{33854,
  abstract     = {{Macrodiversity is a key technique to increase the capacity of mobile networks. It can be realized using coordinated multipoint (CoMP), simultaneously connecting users to multiple overlapping cells. Selecting which users to serve by how many and which cells is NP-hard but needs to happen continuously in real time as users move and channel state changes. Existing approaches often require strict assumptions about or perfect knowledge of the underlying radio system, its resource allocation scheme, or user movements, none of which is readily available in practice.

Instead, we propose three novel self-learning and self-adapting approaches using model-free deep reinforcement learning (DRL): DeepCoMP, DD-CoMP, and D3-CoMP. DeepCoMP leverages central observations and control of all users to select cells almost optimally. DD-CoMP and D3-CoMP use multi-agent DRL, which allows distributed, robust, and highly scalable coordination. All three approaches learn from experience and self-adapt to varying scenarios, reaching 2x higher Quality of Experience than other approaches. They have very few built-in assumptions and do not need prior system knowledge, making them more robust to change and better applicable in practice than existing approaches.}},
  author       = {{Schneider, Stefan Balthasar and Karl, Holger and Khalili, Ramin and Hecker, Artur}},
  keywords     = {{mobility management, coordinated multipoint, CoMP, cell selection, resource management, reinforcement learning, multi agent, MARL, self-learning, self-adaptation, QoE}},
  title        = {{{DeepCoMP: Coordinated Multipoint Using Multi-Agent Deep Reinforcement Learning}}},
  year         = {{2021}},
}

@inproceedings{29137,
  author       = {{Hansmeier, Tim}},
  booktitle    = {{HEART '21: Proceedings of the 11th International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies}},
  location     = {{Online}},
  publisher    = {{Association for Computing Machinery (ACM)}},
  title        = {{{Self-aware Operation of Heterogeneous Compute Nodes using the Learning Classifier System XCS}}},
  doi          = {{10.1145/3468044.3468055}},
  year         = {{2021}},
}

