[{"date_created":"2021-12-13T07:20:33Z","author":[{"first_name":"Bahar","last_name":"Schwichtenberg","id":"36399","full_name":"Schwichtenberg, Bahar"}],"supervisor":[{"last_name":"Engels","id":"107","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_updated":"2022-12-30T22:15:37Z","doi":"10.17619/UNIPB/1-1270 ","title":"Modeling and Analyzing Software Ecosystems","has_accepted_license":"1","citation":{"apa":"Schwichtenberg, B. (2021). <i>Modeling and Analyzing Software Ecosystems</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1270 \">https://doi.org/10.17619/UNIPB/1-1270 </a>","mla":"Schwichtenberg, Bahar. <i>Modeling and Analyzing Software Ecosystems</i>. 2021, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1270 \">10.17619/UNIPB/1-1270 </a>.","short":"B. Schwichtenberg, Modeling and Analyzing Software Ecosystems, 2021.","bibtex":"@book{Schwichtenberg_2021, title={Modeling and Analyzing Software Ecosystems}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1270 \">10.17619/UNIPB/1-1270 </a>}, author={Schwichtenberg, Bahar}, year={2021} }","ama":"Schwichtenberg B. <i>Modeling and Analyzing Software Ecosystems</i>.; 2021. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1270 \">10.17619/UNIPB/1-1270 </a>","chicago":"Schwichtenberg, Bahar. <i>Modeling and Analyzing Software Ecosystems</i>, 2021. <a href=\"https://doi.org/10.17619/UNIPB/1-1270 \">https://doi.org/10.17619/UNIPB/1-1270 </a>.","ieee":"B. Schwichtenberg, <i>Modeling and Analyzing Software Ecosystems</i>. 2021."},"year":"2021","user_id":"36399","department":[{"_id":"66"}],"project":[{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"},{"_id":"1","name":"SFB 901: SFB 901"}],"_id":"28683","file_date_updated":"2022-12-30T22:15:15Z","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Enterprise Architecture","Architectural Design Decisions","Open Platforms"],"type":"dissertation","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":9125342,"file_id":"35069","file_name":"Bahar_Schwichtenberg_Thesis.pdf","access_level":"closed","date_updated":"2022-12-30T22:15:15Z","creator":"bahareh","date_created":"2022-12-30T22:15:15Z"}],"status":"public","abstract":[{"lang":"ger","text":"In den letzten Jahren haben sich Software-Ökosysteme als neue, erfolgreiche Geschäftsform etabliert. Unternehmen agieren hierbei als Anbieter von Software-Plattformen, auf denen Drittanbieter Softwarelösungen für den Markt anbieten können.  Etablierte Beispiele sind hierbei sogenannte App-Stores, die z.B. von Google oder Apple angeboten werden.\r\n\r\nBeim Aufbau von Software-Ökosystemen müssen vom Plattformanbieter viele architektonische Entwurfsentscheidungen getroffen werden. Bisher gibt es keine Architekturrichtlinien und -werkzeuge, die den Entwurf einer Ökosystemarchitektur unterstützen. Dadurch fehlt hier systematisches, wiederverwendbares Wissen. Plattformanbieter müssen auf ad-hoc Entscheidungen zurückgreifen. Dies kann dann zu Problemen im Betrieb der Software-Plattformen führen, zu erhöhten Ausfallrisiken und Mehrkosten.\r\n\r\nDer Mangel an Architekturwissen manifestiert sich konkret in zwei Gruppen von Herausforderungen: Erstens fehlt eine Wissensbasis zu Architekturalternativen und zweitens fehlt es an methodischem Wissen zu Entwicklung und Betrieb von Software-Ökosystemen. Eine Architekturwissensbasis würde Orientierungshilfen zu den Bestandteilen von Software-Ökosystemen und deren Abhängigkeiten geben, während methodisches Wissen die Erstellung dieser Systeme erleichtern würde.\r\n\r\nIn der Dissertation werden diese Herausforderungen durch die Entwicklung des Frameworks SecoArc für die Modellierung von Software-Ökosystemen angegangen. Der Beitrag der Dissertation ist zweifach: \r\n1.\tDas SecoArc-Framework umfasst eine Architekturwissensbasis, die wiederverwendbare Architekturentwurfsentscheidungen\r\nvon Software-Ökosystemen enthält. Die Wissensbasis wurde entwickelt, indem das Architekturwissen bestehender Ökosysteme sowie aus existierender Fachliteratur ermittelt wurde und in einer Produktlinie für Software-Ökosysteme konsolidiert wurde. Die Produktlinie umfasst architektonische Gemeinsamkeiten und Variabilitäten von Software-Ökosystemen. \r\n2.\tDas SecoArc-Framework liefert methodisches Wissen, um die Ökosystemarchitektur in Modellen zu entwerfen und zu analysieren. Dieses Wissen wurde entwickelt, indem drei Architekturmuster identifiziert wurden. Jedes Muster erfasst unterschiedliche Beziehungen zwischen architektonischen Entwurfsentscheidungen zu den Qualitätsmerkmalen einer Ökosystemgesundheit und der Erreichung von Geschäftszielen. \r\n\r\nDie Architekturmuster und die Produktlinie wurden dazu genutzt, ein Modellierungsframework zu entwickeln und in Form eines Prototypen umzusetzen, welches einen Entwurfsprozess, eine Modellierungssprache und eine Architekturanalysetechnik umfasst. Es erleichtert das Modellieren, Analysieren und Vergleichen von Ökosystemarchitekturen.\r\n\r\nDie Ergebnisse der Dissertation wurden im Rahmen von zwei Studien evaluiert. In der ersten Validierungsstudie wurden das Framework sowie der Prototyp verwendet, um zwei alternative Ökosystemarchitekturen zu entwerfen und zu analysieren. In der zweiten Studie wurde eine Analyse von existierenden Ökosystemen basierend auf den architektonischen Variabilitäten des Frameworks durchgeführt."}]},{"citation":{"short":"J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, K. Samelin, in: Cryptology and Network Security, Springer International Publishing, Cham, 2021.","bibtex":"@inproceedings{Bobolz_Eidens_Krenn_Ramacher_Samelin_2021, place={Cham}, title={Issuer-Hiding Attribute-Based Credentials}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-92548-2_9\">10.1007/978-3-030-92548-2_9</a>}, booktitle={Cryptology and Network Security}, publisher={Springer International Publishing}, author={Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Ramacher, Sebastian and Samelin, Kai}, year={2021} }","mla":"Bobolz, Jan, et al. “Issuer-Hiding Attribute-Based Credentials.” <i>Cryptology and Network Security</i>, Springer International Publishing, 2021, doi:<a href=\"https://doi.org/10.1007/978-3-030-92548-2_9\">10.1007/978-3-030-92548-2_9</a>.","apa":"Bobolz, J., Eidens, F., Krenn, S., Ramacher, S., &#38; Samelin, K. (2021). Issuer-Hiding Attribute-Based Credentials. <i>Cryptology and Network Security</i>. <a href=\"https://doi.org/10.1007/978-3-030-92548-2_9\">https://doi.org/10.1007/978-3-030-92548-2_9</a>","ama":"Bobolz J, Eidens F, Krenn S, Ramacher S, Samelin K. Issuer-Hiding Attribute-Based Credentials. In: <i>Cryptology and Network Security</i>. Springer International Publishing; 2021. doi:<a href=\"https://doi.org/10.1007/978-3-030-92548-2_9\">10.1007/978-3-030-92548-2_9</a>","chicago":"Bobolz, Jan, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, and Kai Samelin. “Issuer-Hiding Attribute-Based Credentials.” In <i>Cryptology and Network Security</i>. Cham: Springer International Publishing, 2021. <a href=\"https://doi.org/10.1007/978-3-030-92548-2_9\">https://doi.org/10.1007/978-3-030-92548-2_9</a>.","ieee":"J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, and K. Samelin, “Issuer-Hiding Attribute-Based Credentials,” 2021, doi: <a href=\"https://doi.org/10.1007/978-3-030-92548-2_9\">10.1007/978-3-030-92548-2_9</a>."},"place":"Cham","year":"2021","publication_status":"published","publication_identifier":{"isbn":["9783030925475","9783030925482"],"issn":["0302-9743","1611-3349"]},"doi":"10.1007/978-3-030-92548-2_9","title":"Issuer-Hiding Attribute-Based Credentials","author":[{"first_name":"Jan","full_name":"Bobolz, Jan","id":"27207","last_name":"Bobolz"},{"id":"25078","full_name":"Eidens, Fabian","last_name":"Eidens","first_name":"Fabian"},{"first_name":"Stephan","last_name":"Krenn","full_name":"Krenn, Stephan"},{"first_name":"Sebastian","full_name":"Ramacher, Sebastian","last_name":"Ramacher"},{"last_name":"Samelin","full_name":"Samelin, Kai","first_name":"Kai"}],"date_created":"2022-01-27T13:00:21Z","date_updated":"2022-01-27T13:02:23Z","publisher":"Springer International Publishing","status":"public","type":"conference","publication":"Cryptology and Network Security","language":[{"iso":"eng"}],"user_id":"27207","department":[{"_id":"7"},{"_id":"64"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"_id":"29566"},{"date_updated":"2022-09-02T09:42:38Z","publisher":"Association for Computing Machinery (ACM)","date_created":"2021-04-28T09:08:17Z","author":[{"first_name":"Tim","orcid":"0000-0003-1377-3339","last_name":"Hansmeier","full_name":"Hansmeier, Tim","id":"49992"},{"last_name":"Platzner","full_name":"Platzner, Marco","id":"398","first_name":"Marco"}],"title":"An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier System XCS","doi":"10.1145/3449726.3463159","conference":{"start_date":"2021-07-10","name":"International Workshop on Learning Classifier Systems (IWLCS 2021)","location":"Lille, France","end_date":"2021-07-14"},"publication_status":"published","publication_identifier":{"isbn":["978-1-4503-8351-6"]},"place":"New York, NY, United States","year":"2021","citation":{"apa":"Hansmeier, T., &#38; Platzner, M. (2021). An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier System XCS. <i>GECCO ’21: Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1639–1647. <a href=\"https://doi.org/10.1145/3449726.3463159\">https://doi.org/10.1145/3449726.3463159</a>","mla":"Hansmeier, Tim, and Marco Platzner. “An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier System XCS.” <i>GECCO ’21: Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, Association for Computing Machinery (ACM), 2021, pp. 1639–1647, doi:<a href=\"https://doi.org/10.1145/3449726.3463159\">10.1145/3449726.3463159</a>.","short":"T. Hansmeier, M. Platzner, in: GECCO ’21: Proceedings of the Genetic and Evolutionary Computation Conference Companion, Association for Computing Machinery (ACM), New York, NY, United States, 2021, pp. 1639–1647.","bibtex":"@inproceedings{Hansmeier_Platzner_2021, place={New York, NY, United States}, title={An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier System XCS}, DOI={<a href=\"https://doi.org/10.1145/3449726.3463159\">10.1145/3449726.3463159</a>}, booktitle={GECCO ’21: Proceedings of the Genetic and Evolutionary Computation Conference Companion}, publisher={Association for Computing Machinery (ACM)}, author={Hansmeier, Tim and Platzner, Marco}, year={2021}, pages={1639–1647} }","chicago":"Hansmeier, Tim, and Marco Platzner. “An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier System XCS.” In <i>GECCO ’21: Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1639–1647. New York, NY, United States: Association for Computing Machinery (ACM), 2021. <a href=\"https://doi.org/10.1145/3449726.3463159\">https://doi.org/10.1145/3449726.3463159</a>.","ieee":"T. Hansmeier and M. Platzner, “An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier System XCS,” in <i>GECCO ’21: Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, Lille, France, 2021, pp. 1639–1647, doi: <a href=\"https://doi.org/10.1145/3449726.3463159\">10.1145/3449726.3463159</a>.","ama":"Hansmeier T, Platzner M. An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier System XCS. In: <i>GECCO ’21: Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>. Association for Computing Machinery (ACM); 2021:1639–1647. doi:<a href=\"https://doi.org/10.1145/3449726.3463159\">10.1145/3449726.3463159</a>"},"page":"1639–1647","project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"1","name":"SFB 901"},{"_id":"14","name":"SFB 901 - Subproject C2"}],"_id":"21813","user_id":"49992","department":[{"_id":"78"}],"language":[{"iso":"eng"}],"type":"conference","publication":"GECCO '21: Proceedings of the Genetic and Evolutionary Computation Conference Companion","status":"public"},{"year":"2021","citation":{"ama":"Schneider SB. <i>Conventional and Machine Learning Approaches for Network and Service Coordination</i>.; 2021.","chicago":"Schneider, Stefan Balthasar. <i>Conventional and Machine Learning Approaches for Network and Service Coordination</i>, 2021.","ieee":"S. B. Schneider, <i>Conventional and Machine Learning Approaches for Network and Service Coordination</i>. 2021.","apa":"Schneider, S. B. (2021). <i>Conventional and Machine Learning Approaches for Network and Service Coordination</i>.","bibtex":"@book{Schneider_2021, title={Conventional and Machine Learning Approaches for Network and Service Coordination}, author={Schneider, Stefan Balthasar}, year={2021} }","mla":"Schneider, Stefan Balthasar. <i>Conventional and Machine Learning Approaches for Network and Service Coordination</i>. 2021.","short":"S.B. Schneider, Conventional and Machine Learning Approaches for Network and Service Coordination, 2021."},"has_accepted_license":"1","title":"Conventional and Machine Learning Approaches for Network and Service Coordination","date_updated":"2023-01-10T15:09:05Z","oa":"1","date_created":"2023-01-10T15:08:50Z","author":[{"id":"35343","full_name":"Schneider, Stefan Balthasar","last_name":"Schneider","orcid":"0000-0001-8210-4011","first_name":"Stefan Balthasar"}],"abstract":[{"text":"Network and service coordination is important to provide modern services consisting of multiple interconnected components, e.g., in 5G, network function virtualization (NFV), or cloud and edge computing. In this paper, I outline my dissertation research, which proposes six approaches to automate such network and service coordination. All approaches dynamically react to the current demand and optimize coordination for high service quality and low costs. The approaches range from centralized to distributed methods and from conventional heuristic algorithms and mixed-integer linear programs to machine learning approaches using supervised and reinforcement learning. I briefly discuss their main ideas and advantages over other state-of-the-art approaches and compare strengths and weaknesses.","lang":"eng"}],"file":[{"relation":"main_file","content_type":"application/pdf","file_size":133340,"file_id":"35890","file_name":"main.pdf","access_level":"open_access","date_updated":"2023-01-10T15:07:03Z","creator":"stschn","date_created":"2023-01-10T15:07:03Z"}],"status":"public","type":"working_paper","ddc":["004"],"keyword":["nfv","coordination","machine learning","reinforcement learning","phd","digest"],"language":[{"iso":"eng"}],"file_date_updated":"2023-01-10T15:07:03Z","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C4: SFB 901 - Subproject C4","_id":"16"}],"_id":"35889","user_id":"35343","department":[{"_id":"75"}]},{"abstract":[{"text":"Purpose\r\nThe purpose of this paper is to identify strategic options and challenges that arise when an industrial firm moves from providing smart service toward providing a platform.\r\n\r\nDesign/methodology/approach\r\nThis conceptual study takes on a multidisciplinary research perspective that integrates concepts, theories and insights from service management and marketing, information systems and platform economics.\r\n\r\nFindings\r\nThe paper outlines three platform types – smart data platform, smart product platform and matching platform – as strategic options for firms that wish to evolve from smart service providers to platform providers.\r\n\r\nResearch limitations/implications\r\nInvestigating smart service platforms calls for launching interdisciplinary research initiatives. Promising research avenues are outlined to span boundaries that separate different research disciplines today.\r\n\r\nPractical implications\r\nManaging a successful transition from providing smart service toward providing a platform requires making significant investments in IT, platform-related capabilities and skills, as well as implement new approaches toward relationship management and brand-building.\r\n\r\nOriginality/value\r\nThe findings described in this paper are valuable to researchers in multiple disciplines seeking to develop and to justify theory related to platforms in industrial scenarios.","lang":"eng"}],"publication":"Journal of Service Management","language":[{"iso":"eng"}],"ddc":["380"],"keyword":["Smart service","Platform","Interdisciplinary research","Manufacturing company","Smart service provider","Platform economics","Information systems","Multi-sided markets","Business-to-business (B2B) markets"],"year":"2021","issue":"4","quality_controlled":"1","title":"Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers","date_created":"2020-08-12T12:12:36Z","publisher":"Emerald Insight","status":"public","type":"journal_article","article_type":"original","user_id":"59677","department":[{"_id":"276"},{"_id":"181"}],"project":[{"_id":"1","name":"SFB 901","grant_number":"160364472"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"_id":"17860","citation":{"apa":"Beverungen, D., Kundisch, D., &#38; Wünderlich, N. (2021). Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers. <i>Journal of Service Management</i>, <i>32</i>(4), 507–532. <a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">https://doi.org/10.1108/JOSM-03-2020-0066</a>","bibtex":"@article{Beverungen_Kundisch_Wünderlich_2021, title={Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers}, volume={32}, DOI={<a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>}, number={4}, journal={Journal of Service Management}, publisher={Emerald Insight}, author={Beverungen, Daniel and Kundisch, Dennis and Wünderlich, Nancy}, year={2021}, pages={507–532} }","mla":"Beverungen, Daniel, et al. “Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers.” <i>Journal of Service Management</i>, vol. 32, no. 4, Emerald Insight, 2021, pp. 507–32, doi:<a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>.","short":"D. Beverungen, D. Kundisch, N. Wünderlich, Journal of Service Management 32 (2021) 507–532.","ieee":"D. Beverungen, D. Kundisch, and N. Wünderlich, “Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers,” <i>Journal of Service Management</i>, vol. 32, no. 4, pp. 507–532, 2021, doi: <a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>.","chicago":"Beverungen, Daniel, Dennis Kundisch, and Nancy Wünderlich. “Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers.” <i>Journal of Service Management</i> 32, no. 4 (2021): 507–32. <a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">https://doi.org/10.1108/JOSM-03-2020-0066</a>.","ama":"Beverungen D, Kundisch D, Wünderlich N. Transforming into a Platform Provider: Strategic Options for Industrial Smart Service Providers. <i>Journal of Service Management</i>. 2021;32(4):507-532. doi:<a href=\"https://doi.org/10.1108/JOSM-03-2020-0066\">10.1108/JOSM-03-2020-0066</a>"},"intvolume":"        32","page":"507-532","publication_status":"published","publication_identifier":{"issn":["507-532"]},"doi":"10.1108/JOSM-03-2020-0066","author":[{"first_name":"Daniel","full_name":"Beverungen, Daniel","id":"59677","last_name":"Beverungen"},{"last_name":"Kundisch","id":"21117","full_name":"Kundisch, Dennis","first_name":"Dennis"},{"first_name":"Nancy","id":"36392","full_name":"Wünderlich, Nancy","last_name":"Wünderlich"}],"volume":32,"date_updated":"2024-04-18T12:46:37Z"},{"language":[{"iso":"eng"}],"project":[{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"17","name":"SFB 901 - C5: SFB 901 - Subproject C5"}],"_id":"45236","user_id":"47208","department":[{"_id":"66"}],"status":"public","type":"mastersthesis","title":"Design and Implementation of a Crowd-based Prototype Validation Platform","date_updated":"2023-05-23T13:09:58Z","supervisor":[{"first_name":"Enes","id":"8447","full_name":"Yigitbas, Enes","last_name":"Yigitbas","orcid":"0000-0002-5967-833X"},{"last_name":"Gottschalk","id":"47208","full_name":"Gottschalk, Sebastian","first_name":"Sebastian"}],"author":[{"last_name":"N.","full_name":"N., N.","first_name":"N."}],"date_created":"2023-05-23T13:09:53Z","year":"2021","citation":{"apa":"N., N. (2021). <i>Design and Implementation of a Crowd-based Prototype Validation Platform</i>.","mla":"N., N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>. 2021.","bibtex":"@book{N._2021, title={Design and Implementation of a Crowd-based Prototype Validation Platform}, author={N., N.}, year={2021} }","short":"N. N., Design and Implementation of a Crowd-Based Prototype Validation Platform, 2021.","ama":"N. N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>.; 2021.","ieee":"N. N., <i>Design and Implementation of a Crowd-based Prototype Validation Platform</i>. 2021.","chicago":"N., N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>, 2021."}},{"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"17","name":"SFB 901 - C5: SFB 901 - Subproject C5"}],"_id":"45239","user_id":"47208","department":[{"_id":"66"}],"year":"2021","citation":{"ieee":"N. N., <i>Lightweight Process Engine for Situation-specific Development of Business Models for Digital Platforms</i>. 2021.","chicago":"N., N. <i>Lightweight Process Engine for Situation-Specific Development of Business Models for Digital Platforms</i>, 2021.","ama":"N. N. <i>Lightweight Process Engine for Situation-Specific Development of Business Models for Digital Platforms</i>.; 2021.","short":"N. N., Lightweight Process Engine for Situation-Specific Development of Business Models for Digital Platforms, 2021.","bibtex":"@book{N._2021, title={Lightweight Process Engine for Situation-specific Development of Business Models for Digital Platforms}, author={N., N.}, year={2021} }","mla":"N., N. <i>Lightweight Process Engine for Situation-Specific Development of Business Models for Digital Platforms</i>. 2021.","apa":"N., N. (2021). <i>Lightweight Process Engine for Situation-specific Development of Business Models for Digital Platforms</i>."},"title":"Lightweight Process Engine for Situation-specific Development of Business Models for Digital Platforms","date_updated":"2023-05-23T13:13:13Z","author":[{"first_name":"N.","full_name":"N., N.","last_name":"N."}],"date_created":"2023-05-23T13:12:55Z","supervisor":[{"orcid":"0000-0002-5967-833X","last_name":"Yigitbas","id":"8447","full_name":"Yigitbas, Enes","first_name":"Enes"},{"id":"47208","full_name":"Gottschalk, Sebastian","last_name":"Gottschalk","first_name":"Sebastian"}]},{"supervisor":[{"orcid":"0000-0002-5967-833X","last_name":"Yigitbas","full_name":"Yigitbas, Enes","id":"8447","first_name":"Enes"},{"first_name":"Sebastian","last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208"}],"author":[{"last_name":"N.","full_name":"N., N.","first_name":"N."}],"date_created":"2023-05-23T13:14:14Z","date_updated":"2023-05-23T13:14:18Z","title":"Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration","citation":{"short":"N. N., Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration, 2021.","mla":"N., N. <i>Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration</i>. 2021.","bibtex":"@book{N._2021, title={Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration}, author={N., N.}, year={2021} }","apa":"N., N. (2021). <i>Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration</i>.","ieee":"N. N., <i>Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration</i>. 2021.","chicago":"N., N. <i>Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration</i>, 2021.","ama":"N. N. <i>Development and Evaluation of a Multi Platform Approach for Augmented Reality Product Configuration</i>.; 2021."},"year":"2021","department":[{"_id":"66"}],"user_id":"47208","_id":"45240","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C5: SFB 901 - Subproject C5","_id":"17"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"year":"2021","citation":{"short":"N. N., Model-Based Feature Backlog Synchronization for Dual-Track Development Methods, 2021.","bibtex":"@book{N._2021, title={Model-based Feature Backlog Synchronization for Dual-Track Development Methods}, author={N., N.}, year={2021} }","mla":"N., N. <i>Model-Based Feature Backlog Synchronization for Dual-Track Development Methods</i>. 2021.","apa":"N., N. (2021). <i>Model-based Feature Backlog Synchronization for Dual-Track Development Methods</i>.","ama":"N. N. <i>Model-Based Feature Backlog Synchronization for Dual-Track Development Methods</i>.; 2021.","chicago":"N., N. <i>Model-Based Feature Backlog Synchronization for Dual-Track Development Methods</i>, 2021.","ieee":"N. N., <i>Model-based Feature Backlog Synchronization for Dual-Track Development Methods</i>. 2021."},"title":"Model-based Feature Backlog Synchronization for Dual-Track Development Methods","date_updated":"2023-05-23T13:11:48Z","author":[{"first_name":"N.","last_name":"N.","full_name":"N., N."}],"date_created":"2023-05-23T13:11:44Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C5: SFB 901 - Subproject C5","_id":"17"}],"_id":"45238","user_id":"47208","department":[{"_id":"66"}]},{"title":"Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence","doi":"10.17619/UNIPB/1-1647 ","date_updated":"2023-06-27T05:15:21Z","author":[{"last_name":"Szopinski","full_name":"Szopinski, Daniel","first_name":"Daniel"}],"supervisor":[{"first_name":"Dennis","full_name":"Kundisch, Dennis","last_name":"Kundisch"}],"date_created":"2021-09-22T12:24:00Z","year":"2021","citation":{"bibtex":"@book{Szopinski_2021, title={Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1647 \">10.17619/UNIPB/1-1647 </a>}, author={Szopinski, Daniel}, year={2021} }","short":"D. Szopinski, Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence, 2021.","mla":"Szopinski, Daniel. <i>Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence</i>. 2021, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1647 \">10.17619/UNIPB/1-1647 </a>.","apa":"Szopinski, D. (2021). <i>Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1647 \">https://doi.org/10.17619/UNIPB/1-1647 </a>","ama":"Szopinski D. <i>Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence</i>.; 2021. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1647 \">10.17619/UNIPB/1-1647 </a>","ieee":"D. Szopinski, <i>Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence</i>. 2021.","chicago":"Szopinski, Daniel. <i>Essays on Modeling Languages and Software Tools for Business Model Innovation: Theory and Empirical Evidence</i>, 2021. <a href=\"https://doi.org/10.17619/UNIPB/1-1647 \">https://doi.org/10.17619/UNIPB/1-1647 </a>."},"language":[{"iso":"eng"}],"_id":"24884","project":[{"grant_number":"160364472","name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"department":[{"_id":"276"}],"user_id":"15504","status":"public","type":"dissertation"},{"language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","user_id":"15504","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"19551","status":"public","editor":[{"first_name":"Joseph","last_name":"K. Liu","full_name":"K. Liu, Joseph"},{"full_name":"Cui, Hui","last_name":"Cui","first_name":"Hui"}],"type":"conference","publication":"Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings","doi":"10.1007/978-3-030-55304-3\\_17","title":"Efficient Forward-Secure Threshold Public Key Encryption","date_created":"2020-09-18T05:59:11Z","author":[{"full_name":"Kurek, Rafael","last_name":"Kurek","first_name":"Rafael"}],"volume":12248,"publisher":"Springer","date_updated":"2022-01-06T06:54:07Z","citation":{"chicago":"Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.” In <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, edited by Joseph K. Liu and Hui Cui, 12248:330–49. Lecture Notes in Computer Science. Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">https://doi.org/10.1007/978-3-030-55304-3\\_17</a>.","ieee":"R. Kurek, “Efficient Forward-Secure Threshold Public Key Encryption,” in <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, 2020, vol. 12248, pp. 330–349.","ama":"Kurek R. Efficient Forward-Secure Threshold Public Key Encryption. In: K. Liu J, Cui H, eds. <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>. Vol 12248. Lecture Notes in Computer Science. Springer; 2020:330-349. doi:<a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">10.1007/978-3-030-55304-3\\_17</a>","apa":"Kurek, R. (2020). Efficient Forward-Secure Threshold Public Key Encryption. In J. K. Liu &#38; H. Cui (Eds.), <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i> (Vol. 12248, pp. 330–349). Springer. <a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">https://doi.org/10.1007/978-3-030-55304-3\\_17</a>","bibtex":"@inproceedings{Kurek_2020, series={Lecture Notes in Computer Science}, title={Efficient Forward-Secure Threshold Public Key Encryption}, volume={12248}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">10.1007/978-3-030-55304-3\\_17</a>}, booktitle={Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, publisher={Springer}, author={Kurek, Rafael}, editor={K. Liu, Joseph and Cui, HuiEditors}, year={2020}, pages={330–349}, collection={Lecture Notes in Computer Science} }","mla":"Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.” <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, edited by Joseph K. Liu and Hui Cui, vol. 12248, Springer, 2020, pp. 330–49, doi:<a href=\"https://doi.org/10.1007/978-3-030-55304-3\\_17\">10.1007/978-3-030-55304-3\\_17</a>.","short":"R. Kurek, in: J. K. Liu, H. Cui (Eds.), Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, Springer, 2020, pp. 330–349."},"intvolume":"     12248","page":"330-349","year":"2020"},{"editor":[{"first_name":"Kazumaro","last_name":"Aoki","full_name":"Aoki, Kazumaro"},{"first_name":"Akira","last_name":"Kanaoka","full_name":"Kanaoka, Akira"}],"status":"public","publication":"Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings","type":"conference","language":[{"iso":"eng"}],"_id":"19553","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"user_id":"15504","series_title":"Lecture Notes in Computer Science","year":"2020","page":"239-260","intvolume":"     12231","citation":{"ieee":"R. Kurek, “Efficient Forward-Secure Threshold Signatures,” in <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, 2020, vol. 12231, pp. 239–260.","chicago":"Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” In <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, edited by Kazumaro Aoki and Akira Kanaoka, 12231:239–60. Lecture Notes in Computer Science. Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">https://doi.org/10.1007/978-3-030-58208-1\\_14</a>.","ama":"Kurek R. Efficient Forward-Secure Threshold Signatures. In: Aoki K, Kanaoka A, eds. <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>. Vol 12231. Lecture Notes in Computer Science. Springer; 2020:239-260. doi:<a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">10.1007/978-3-030-58208-1\\_14</a>","apa":"Kurek, R. (2020). Efficient Forward-Secure Threshold Signatures. In K. Aoki &#38; A. Kanaoka (Eds.), <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i> (Vol. 12231, pp. 239–260). Springer. <a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">https://doi.org/10.1007/978-3-030-58208-1\\_14</a>","short":"R. Kurek, in: K. Aoki, A. Kanaoka (Eds.), Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, Springer, 2020, pp. 239–260.","bibtex":"@inproceedings{Kurek_2020, series={Lecture Notes in Computer Science}, title={Efficient Forward-Secure Threshold Signatures}, volume={12231}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">10.1007/978-3-030-58208-1\\_14</a>}, booktitle={Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, publisher={Springer}, author={Kurek, Rafael}, editor={Aoki, Kazumaro and Kanaoka, AkiraEditors}, year={2020}, pages={239–260}, collection={Lecture Notes in Computer Science} }","mla":"Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” <i>Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, edited by Kazumaro Aoki and Akira Kanaoka, vol. 12231, Springer, 2020, pp. 239–60, doi:<a href=\"https://doi.org/10.1007/978-3-030-58208-1\\_14\">10.1007/978-3-030-58208-1\\_14</a>."},"title":"Efficient Forward-Secure Threshold Signatures","doi":"10.1007/978-3-030-58208-1\\_14","date_updated":"2022-01-06T06:54:07Z","publisher":"Springer","volume":12231,"author":[{"full_name":"Kurek, Rafael","last_name":"Kurek","first_name":"Rafael"}],"date_created":"2020-09-18T06:00:42Z"},{"ddc":["000"],"keyword":["Product Configuration","Augmented Reality","Model-based","Tool Support"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Mobile shopping apps have been using Augmented Reality (AR) in the last years to place their products in the environment of the customer. While this is possible with atomic 3D objects, there is is still a lack in the runtime conﬁguration of 3D object compositions based on user needs and environmental constraints. For this, we previously developed an approach for model-based AR-assisted product conﬁguration based on the concept of Dynamic Software Product Lines. In this demonstration paper, we present the corresponding tool support ProConAR in the form of a Product Modeler and a Product Conﬁgurator. While the Product Modeler is an Angular web app that splits products (e.g. table) up into atomic parts (e.g. tabletop, table legs, funnier) and saves it within a conﬁguration model, the Product Conﬁgurator is an Android client that uses the conﬁguration model to place diﬀerent product conﬁgurations within the environment of the customer. We show technical details of our ready to use tool-chain ProConAR by describing its implementation and usage as well as pointing out future research directions."}],"file":[{"relation":"main_file","content_type":"application/pdf","file_id":"20542","file_name":"HCSE20_demo.pdf","access_level":"open_access","file_size":3913885,"creator":"sego","date_created":"2020-11-30T08:39:18Z","date_updated":"2020-11-30T08:39:18Z"}],"publication":"Human-Centered Software Engineering. HCSE 2020","title":"ProConAR: A Tool Support for Model-based AR Product Configuration","publisher":"Springer","date_created":"2020-09-21T17:01:11Z","year":"2020","file_date_updated":"2020-11-30T08:39:18Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"19606","series_title":"Lecture Notes in Computer Science","user_id":"47208","department":[{"_id":"66"},{"_id":"534"}],"editor":[{"last_name":"Bernhaupt","full_name":"Bernhaupt, Regina","first_name":"Regina"},{"full_name":"Ardito, Carmelo","last_name":"Ardito","first_name":"Carmelo"},{"first_name":"Stefan","last_name":"Sauer","full_name":"Sauer, Stefan"}],"status":"public","type":"conference","doi":"10.1007/978-3-030-64266-2_14","conference":{"start_date":"2020-11-30","name":"8th International Working Conference on Human-Centered Software Engineering (HCSE'20)","location":"Eindhoven","end_date":"2020-12-02"},"oa":"1","date_updated":"2022-01-06T06:54:07Z","author":[{"last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208","first_name":"Sebastian"},{"id":"8447","full_name":"Yigitbas, Enes","orcid":"0000-0002-5967-833X","last_name":"Yigitbas","first_name":"Enes"},{"first_name":"Eugen","last_name":"Schmidt","full_name":"Schmidt, Eugen"},{"first_name":"Gregor","full_name":"Engels, Gregor","id":"107","last_name":"Engels"}],"volume":12481,"place":"Cham","citation":{"bibtex":"@inproceedings{Gottschalk_Yigitbas_Schmidt_Engels_2020, place={Cham}, series={Lecture Notes in Computer Science}, title={ProConAR: A Tool Support for Model-based AR Product Configuration}, volume={12481}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">10.1007/978-3-030-64266-2_14</a>}, booktitle={Human-Centered Software Engineering. HCSE 2020}, publisher={Springer}, author={Gottschalk, Sebastian and Yigitbas, Enes and Schmidt, Eugen and Engels, Gregor}, editor={Bernhaupt, Regina and Ardito, Carmelo and Sauer, StefanEditors}, year={2020}, collection={Lecture Notes in Computer Science} }","mla":"Gottschalk, Sebastian, et al. “ProConAR: A Tool Support for Model-Based AR Product Configuration.” <i>Human-Centered Software Engineering. HCSE 2020</i>, edited by Regina Bernhaupt et al., vol. 12481, Springer, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">10.1007/978-3-030-64266-2_14</a>.","short":"S. Gottschalk, E. Yigitbas, E. Schmidt, G. Engels, in: R. Bernhaupt, C. Ardito, S. Sauer (Eds.), Human-Centered Software Engineering. HCSE 2020, Springer, Cham, 2020.","apa":"Gottschalk, S., Yigitbas, E., Schmidt, E., &#38; Engels, G. (2020). ProConAR: A Tool Support for Model-based AR Product Configuration. In R. Bernhaupt, C. Ardito, &#38; S. Sauer (Eds.), <i>Human-Centered Software Engineering. HCSE 2020</i> (Vol. 12481). Cham: Springer. <a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">https://doi.org/10.1007/978-3-030-64266-2_14</a>","ieee":"S. Gottschalk, E. Yigitbas, E. Schmidt, and G. Engels, “ProConAR: A Tool Support for Model-based AR Product Configuration,” in <i>Human-Centered Software Engineering. HCSE 2020</i>, Eindhoven, 2020, vol. 12481.","chicago":"Gottschalk, Sebastian, Enes Yigitbas, Eugen Schmidt, and Gregor Engels. “ProConAR: A Tool Support for Model-Based AR Product Configuration.” In <i>Human-Centered Software Engineering. HCSE 2020</i>, edited by Regina Bernhaupt, Carmelo Ardito, and Stefan Sauer, Vol. 12481. Lecture Notes in Computer Science. Cham: Springer, 2020. <a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">https://doi.org/10.1007/978-3-030-64266-2_14</a>.","ama":"Gottschalk S, Yigitbas E, Schmidt E, Engels G. ProConAR: A Tool Support for Model-based AR Product Configuration. In: Bernhaupt R, Ardito C, Sauer S, eds. <i>Human-Centered Software Engineering. HCSE 2020</i>. Vol 12481. Lecture Notes in Computer Science. Cham: Springer; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-64266-2_14\">10.1007/978-3-030-64266-2_14</a>"},"intvolume":"     12481","has_accepted_license":"1"},{"publication":"IEEE International Conference on Network and Service Management (CNSM)","file":[{"relation":"main_file","content_type":"application/pdf","file_size":500948,"file_id":"19608","access_level":"open_access","file_name":"ris_with_copyright.pdf","date_updated":"2020-09-22T06:36:25Z","date_created":"2020-09-22T06:25:57Z","creator":"stschn"}],"abstract":[{"text":"Modern services consist of modular, interconnected\r\ncomponents, e.g., microservices forming a service mesh. To\r\ndynamically adjust to ever-changing service demands, service\r\ncomponents have to be instantiated on nodes across the network.\r\nIncoming flows requesting a service then need to be routed\r\nthrough the deployed instances while considering node and link\r\ncapacities. Ultimately, the goal is to maximize the successfully\r\nserved flows and Quality of Service (QoS) through online service\r\ncoordination. Current approaches for service coordination are\r\nusually centralized, assuming up-to-date global knowledge and\r\nmaking global decisions for all nodes in the network. Such global\r\nknowledge and centralized decisions are not realistic in practical\r\nlarge-scale networks.\r\n\r\nTo solve this problem, we propose two algorithms for fully\r\ndistributed service coordination. The proposed algorithms can be\r\nexecuted individually at each node in parallel and require only\r\nvery limited global knowledge. We compare and evaluate both\r\nalgorithms with a state-of-the-art centralized approach in extensive\r\nsimulations on a large-scale, real-world network topology.\r\nOur results indicate that the two algorithms can compete with\r\ncentralized approaches in terms of solution quality but require\r\nless global knowledge and are magnitudes faster (more than\r\n100x).","lang":"eng"}],"language":[{"iso":"eng"}],"ddc":["006"],"keyword":["distributed management","service coordination","network coordination","nfv","softwarization","orchestration"],"year":"2020","date_created":"2020-09-22T06:23:40Z","publisher":"IEEE","title":"Every Node for Itself: Fully Distributed Service Coordination","type":"conference","status":"public","user_id":"35343","department":[{"_id":"75"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"_id":"19607","file_date_updated":"2020-09-22T06:36:25Z","has_accepted_license":"1","citation":{"apa":"Schneider, S. B., Klenner, L. D., &#38; Karl, H. (2020). Every Node for Itself: Fully Distributed Service Coordination. In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE.","short":"S.B. Schneider, L.D. Klenner, H. Karl, in: IEEE International Conference on Network and Service Management (CNSM), IEEE, 2020.","mla":"Schneider, Stefan Balthasar, et al. “Every Node for Itself: Fully Distributed Service Coordination.” <i>IEEE International Conference on Network and Service Management (CNSM)</i>, IEEE, 2020.","bibtex":"@inproceedings{Schneider_Klenner_Karl_2020, title={Every Node for Itself: Fully Distributed Service Coordination}, booktitle={IEEE International Conference on Network and Service Management (CNSM)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Klenner, Lars Dietrich and Karl, Holger}, year={2020} }","ieee":"S. B. Schneider, L. D. Klenner, and H. Karl, “Every Node for Itself: Fully Distributed Service Coordination,” in <i>IEEE International Conference on Network and Service Management (CNSM)</i>, 2020.","chicago":"Schneider, Stefan Balthasar, Lars Dietrich Klenner, and Holger Karl. “Every Node for Itself: Fully Distributed Service Coordination.” In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE, 2020.","ama":"Schneider SB, Klenner LD, Karl H. Every Node for Itself: Fully Distributed Service Coordination. In: <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE; 2020."},"author":[{"orcid":"0000-0001-8210-4011","last_name":"Schneider","id":"35343","full_name":"Schneider, Stefan Balthasar","first_name":"Stefan Balthasar"},{"first_name":"Lars Dietrich","last_name":"Klenner","full_name":"Klenner, Lars Dietrich"},{"first_name":"Holger","id":"126","full_name":"Karl, Holger","last_name":"Karl"}],"oa":"1","date_updated":"2022-01-06T06:54:08Z"},{"year":"2020","title":"Self-Driving Network and Service Coordination Using Deep Reinforcement Learning","date_created":"2020-09-22T06:28:22Z","publisher":"IEEE","file":[{"content_type":"application/pdf","relation":"main_file","creator":"stschn","date_created":"2020-09-22T06:29:16Z","date_updated":"2020-09-22T06:36:00Z","file_name":"ris_with_copyright.pdf","file_id":"19610","access_level":"open_access","file_size":642999}],"abstract":[{"text":"Modern services comprise interconnected components,\r\ne.g., microservices in a service mesh, that can scale and\r\nrun on multiple nodes across the network on demand. To process\r\nincoming traffic, service components have to be instantiated and\r\ntraffic assigned to these instances, taking capacities and changing\r\ndemands into account. This challenge is usually solved with\r\ncustom approaches designed by experts. While this typically\r\nworks well for the considered scenario, the models often rely\r\non unrealistic assumptions or on knowledge that is not available\r\nin practice (e.g., a priori knowledge).\r\n\r\nWe propose a novel deep reinforcement learning approach that\r\nlearns how to best coordinate services and is geared towards\r\nrealistic assumptions. It interacts with the network and relies on\r\navailable, possibly delayed monitoring information. Rather than\r\ndefining a complex model or an algorithm how to achieve an\r\nobjective, our model-free approach adapts to various objectives\r\nand traffic patterns. An agent is trained offline without expert\r\nknowledge and then applied online with minimal overhead. Compared\r\nto a state-of-the-art heuristic, it significantly improves flow\r\nthroughput and overall network utility on real-world network\r\ntopologies and traffic traces. It also learns to optimize different\r\nobjectives, generalizes to scenarios with unseen, stochastic traffic\r\npatterns, and scales to large real-world networks.","lang":"eng"}],"publication":"IEEE International Conference on Network and Service Management (CNSM)","language":[{"iso":"eng"}],"keyword":["self-driving networks","self-learning","network coordination","service coordination","reinforcement learning","deep learning","nfv"],"ddc":["006"],"citation":{"apa":"Schneider, S. B., Manzoor, A., Qarawlus, H., Schellenberg, R., Karl, H., Khalili, R., &#38; Hecker, A. (2020). Self-Driving Network and Service Coordination Using Deep Reinforcement Learning. In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE.","bibtex":"@inproceedings{Schneider_Manzoor_Qarawlus_Schellenberg_Karl_Khalili_Hecker_2020, title={Self-Driving Network and Service Coordination Using Deep Reinforcement Learning}, booktitle={IEEE International Conference on Network and Service Management (CNSM)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Manzoor, Adnan and Qarawlus, Haydar and Schellenberg, Rafael and Karl, Holger and Khalili, Ramin and Hecker, Artur}, year={2020} }","short":"S.B. Schneider, A. Manzoor, H. Qarawlus, R. Schellenberg, H. Karl, R. Khalili, A. Hecker, in: IEEE International Conference on Network and Service Management (CNSM), IEEE, 2020.","mla":"Schneider, Stefan Balthasar, et al. “Self-Driving Network and Service Coordination Using Deep Reinforcement Learning.” <i>IEEE International Conference on Network and Service Management (CNSM)</i>, IEEE, 2020.","ama":"Schneider SB, Manzoor A, Qarawlus H, et al. Self-Driving Network and Service Coordination Using Deep Reinforcement Learning. In: <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE; 2020.","ieee":"S. B. Schneider <i>et al.</i>, “Self-Driving Network and Service Coordination Using Deep Reinforcement Learning,” in <i>IEEE International Conference on Network and Service Management (CNSM)</i>, 2020.","chicago":"Schneider, Stefan Balthasar, Adnan Manzoor, Haydar Qarawlus, Rafael Schellenberg, Holger Karl, Ramin Khalili, and Artur Hecker. “Self-Driving Network and Service Coordination Using Deep Reinforcement Learning.” In <i>IEEE International Conference on Network and Service Management (CNSM)</i>. IEEE, 2020."},"has_accepted_license":"1","author":[{"first_name":"Stefan Balthasar","orcid":"0000-0001-8210-4011","last_name":"Schneider","id":"35343","full_name":"Schneider, Stefan Balthasar"},{"first_name":"Adnan","last_name":"Manzoor","full_name":"Manzoor, Adnan"},{"full_name":"Qarawlus, Haydar","last_name":"Qarawlus","first_name":"Haydar"},{"full_name":"Schellenberg, Rafael","last_name":"Schellenberg","first_name":"Rafael"},{"first_name":"Holger","last_name":"Karl","full_name":"Karl, Holger","id":"126"},{"last_name":"Khalili","full_name":"Khalili, Ramin","first_name":"Ramin"},{"last_name":"Hecker","full_name":"Hecker, Artur","first_name":"Artur"}],"oa":"1","date_updated":"2022-01-06T06:54:08Z","status":"public","type":"conference","file_date_updated":"2020-09-22T06:36:00Z","department":[{"_id":"75"}],"user_id":"35343","_id":"19609","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}]},{"language":[{"iso":"eng"}],"file_date_updated":"2020-09-29T07:46:30Z","ddc":["040"],"user_id":"16205","department":[{"_id":"276"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"_id":"19739","file":[{"date_updated":"2020-09-29T07:46:30Z","creator":"dsz","date_created":"2020-09-29T07:46:30Z","file_size":194137,"file_id":"19762","file_name":"DESRIST2020_ABMDT_REVISED.pdf","access_level":"closed","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","type":"conference","publication":"Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)","conference":{"location":"Virtual Conference/Workshop","name":"15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)"},"title":"Active Business Model Development Tools: Design Requirements","date_created":"2020-09-28T14:23:55Z","author":[{"last_name":"Szopinski","full_name":"Szopinski, Daniel","id":"36372","first_name":"Daniel"}],"date_updated":"2022-01-06T06:54:11Z","citation":{"ieee":"D. Szopinski, “Active Business Model Development Tools: Design Requirements,” in <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>, Virtual Conference/Workshop, 2020.","chicago":"Szopinski, Daniel. “Active Business Model Development Tools: Design Requirements.” In <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>, 2020.","ama":"Szopinski D. Active Business Model Development Tools: Design Requirements. In: <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>. ; 2020.","bibtex":"@inproceedings{Szopinski_2020, title={Active Business Model Development Tools: Design Requirements}, booktitle={Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)}, author={Szopinski, Daniel}, year={2020} }","short":"D. Szopinski, in: Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST), 2020.","mla":"Szopinski, Daniel. “Active Business Model Development Tools: Design Requirements.” <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>, 2020.","apa":"Szopinski, D. (2020). Active Business Model Development Tools: Design Requirements. In <i>Proceedings of the 15th International Conference on Design Science Research in Information Systems and Technology (DESRIST)</i>. Virtual Conference/Workshop."},"year":"2020","has_accepted_license":"1"},{"type":"conference","publication":"Proceedings of the 41st International Conference on Information Systems (ICIS)","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2020-10-27T15:05:49Z","date_created":"2020-10-27T15:05:49Z","creator":"dsz","file_size":292196,"access_level":"closed","file_name":"ICIS2020_BMDT_ShortPaper_RevisedManuscript_final.pdf","file_id":"20216"}],"status":"public","user_id":"16205","department":[{"_id":"276"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"_id":"19741","file_date_updated":"2020-10-27T15:05:49Z","language":[{"iso":"eng"}],"ddc":["040"],"has_accepted_license":"1","citation":{"ama":"Szopinski D. Exploring design principles for stimuli in business model development tools. In: <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>. ; 2020.","chicago":"Szopinski, Daniel. “Exploring Design Principles for Stimuli in Business Model Development Tools.” In <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>, 2020.","ieee":"D. Szopinski, “Exploring design principles for stimuli in business model development tools,” in <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>, Virtual Conference/Workshop, 2020.","mla":"Szopinski, Daniel. “Exploring Design Principles for Stimuli in Business Model Development Tools.” <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>, 2020.","bibtex":"@inproceedings{Szopinski_2020, title={Exploring design principles for stimuli in business model development tools}, booktitle={Proceedings of the 41st International Conference on Information Systems (ICIS)}, author={Szopinski, Daniel}, year={2020} }","short":"D. Szopinski, in: Proceedings of the 41st International Conference on Information Systems (ICIS), 2020.","apa":"Szopinski, D. (2020). Exploring design principles for stimuli in business model development tools. In <i>Proceedings of the 41st International Conference on Information Systems (ICIS)</i>. Virtual Conference/Workshop."},"year":"2020","author":[{"first_name":"Daniel","last_name":"Szopinski","full_name":"Szopinski, Daniel","id":"36372"}],"date_created":"2020-09-28T14:28:27Z","date_updated":"2022-01-06T06:54:12Z","conference":{"name":"41st International Conference on Information Systems (ICIS)","location":"Virtual Conference/Workshop"},"title":"Exploring design principles for stimuli in business model development tools"},{"date_updated":"2022-01-06T06:54:12Z","date_created":"2020-09-30T09:08:41Z","author":[{"first_name":"Michelle","full_name":"Müller, Michelle","id":"50286","last_name":"Müller"},{"full_name":"Neumann, Jürgen","id":"32456","last_name":"Neumann","first_name":"Jürgen"},{"full_name":"Gutt, Dominik","id":"14368","last_name":"Gutt","first_name":"Dominik"},{"id":"21117","full_name":"Kundisch, Dennis","last_name":"Kundisch","first_name":"Dennis"}],"title":"Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies","conference":{"name":"41th International Conference on Information Systems (ICIS)","location":"Virtual Conference/Workshop"},"year":"2020","citation":{"bibtex":"@inproceedings{Müller_Neumann_Gutt_Kundisch_2020, title={Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies}, booktitle={Proceedings of the 41th International Conference on Information Systems (ICIS)}, author={Müller, Michelle and Neumann, Jürgen and Gutt, Dominik and Kundisch, Dennis}, year={2020} }","short":"M. Müller, J. Neumann, D. Gutt, D. Kundisch, in: Proceedings of the 41th International Conference on Information Systems (ICIS), 2020.","mla":"Müller, Michelle, et al. “Toss a Coin to Your Host - How Guests End up Paying for the Cost of Regulatory Policies.” <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>, 2020.","apa":"Müller, M., Neumann, J., Gutt, D., &#38; Kundisch, D. (2020). Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies. In <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>. Virtual Conference/Workshop.","ieee":"M. Müller, J. Neumann, D. Gutt, and D. Kundisch, “Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies,” in <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>, Virtual Conference/Workshop, 2020.","chicago":"Müller, Michelle, Jürgen Neumann, Dominik Gutt, and Dennis Kundisch. “Toss a Coin to Your Host - How Guests End up Paying for the Cost of Regulatory Policies.” In <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>, 2020.","ama":"Müller M, Neumann J, Gutt D, Kundisch D. Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory Policies. In: <i>Proceedings of the 41th International Conference on Information Systems (ICIS)</i>. ; 2020."},"_id":"19782","project":[{"_id":"1","name":"SFB 901"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Subproject A4","_id":"8"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"department":[{"_id":"276"}],"user_id":"16205","language":[{"iso":"eng"}],"publication":"Proceedings of the 41th International Conference on Information Systems (ICIS)","type":"conference","status":"public"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"24710","user_id":"15504","ddc":["040"],"file_date_updated":"2021-09-20T11:40:38Z","language":[{"iso":"eng"}],"type":"dissertation","file":[{"file_id":"24711","access_level":"closed","file_name":"DissertationKurek.pdf","file_size":973756,"creator":"florida","date_created":"2021-09-20T11:40:38Z","date_updated":"2021-09-20T11:40:38Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","date_updated":"2022-01-06T06:56:32Z","date_created":"2021-09-20T11:40:56Z","supervisor":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"}],"author":[{"first_name":"Rafael","full_name":"Kurek, Rafael","last_name":"Kurek"}],"title":"Efficient Cryptographic Constructions with Strong Security Guarantees","has_accepted_license":"1","year":"2020","citation":{"ama":"Kurek R. <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>.; 2020.","chicago":"Kurek, Rafael. <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>, 2020.","ieee":"R. Kurek, <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>. 2020.","apa":"Kurek, R. (2020). <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>.","bibtex":"@book{Kurek_2020, title={Efficient Cryptographic Constructions with Strong Security Guarantees}, author={Kurek, Rafael}, year={2020} }","mla":"Kurek, Rafael. <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>. 2020.","short":"R. Kurek, Efficient Cryptographic Constructions with Strong Security Guarantees, 2020."}},{"date_created":"2021-03-08T16:50:31Z","title":"On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions","quality_controlled":"1","year":"2020","language":[{"iso":"eng"}],"keyword":["Admissible hash functions","Verifiable random functions","Error-correcting codes","Provable security"],"ddc":["000"],"publication":"Lecture Notes in Computer Science","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2021-03-08T17:02:37Z","date_created":"2021-03-08T17:02:37Z","creator":"davnie","file_size":706743,"file_id":"21399","access_level":"closed","file_name":"Jager und Niehues - 2020 - On the Real-World Instantiability of Admissible Ha.pdf"}],"abstract":[{"lang":"eng","text":"Verifiable random functions (VRFs) are essentially digital signatures with additional properties, namely verifiable uniqueness and pseudorandomness, which make VRFs a useful tool, e.g., to prevent enumeration in DNSSEC Authenticated Denial of Existence and the CONIKS key management system, or in the random committee selection of the Algorand blockchain.\r\n\r\nMost standard-model VRFs rely on admissible hash functions (AHFs) to achieve security against adaptive attacks in the standard model. Known AHF constructions are based on error-correcting codes, which yield asymptotically efficient constructions. However, previous works do not clarify how the code should be instantiated concretely in the real world. The rate and the minimal distance of the selected code have significant impact on the efficiency of the resulting cryptosystem, therefore it is unclear if and how the aforementioned constructions can be used in practice.\r\n\r\nFirst, we explain inherent limitations of code-based AHFs. Concretely, we assume that even if we were given codes that achieve the well-known Gilbert-Varshamov or McEliece-Rodemich-Rumsey-Welch bounds, existing AHF-based constructions of verifiable random functions (VRFs) can only be instantiated quite inefficiently. Then we introduce and construct computational AHFs (cAHFs). While classical AHFs are information-theoretic, and therefore work even in presence of computationally unbounded adversaries, cAHFs provide only security against computationally bounded adversaries. However, we show that cAHFs can be instantiated significantly more efficiently. Finally, we use our cAHF to construct the currently most efficient verifiable random function with full adaptive security in the standard model."}],"author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager"},{"last_name":"Niehues","id":"36113","full_name":"Niehues, David","first_name":"David"}],"date_updated":"2022-01-06T06:54:58Z","doi":"10.1007/978-3-030-38471-5_13","conference":{"end_date":"2019-08-16","location":"Waterloo, Canada","name":"Selected Areas in Cryptography","start_date":"2019-08-12"},"main_file_link":[{"url":"https://link.springer.com/content/pdf/10.1007%252F978-3-030-38471-5_13.pdf"}],"related_material":{"link":[{"relation":"later_version","url":"https://eprint.iacr.org/2019/1335.pdf"}]},"has_accepted_license":"1","publication_identifier":{"isbn":["9783030384708","9783030384715"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","citation":{"chicago":"Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” In <i>Lecture Notes in Computer Science</i>. Cham, 2020. <a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">https://doi.org/10.1007/978-3-030-38471-5_13</a>.","ieee":"T. Jager and D. Niehues, “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions,” in <i>Lecture Notes in Computer Science</i>, Cham, 2020.","ama":"Jager T, Niehues D. On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In: <i>Lecture Notes in Computer Science</i>. Cham; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>","bibtex":"@inbook{Jager_Niehues_2020, place={Cham}, title={On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>}, booktitle={Lecture Notes in Computer Science}, author={Jager, Tibor and Niehues, David}, year={2020} }","short":"T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.","mla":"Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.” <i>Lecture Notes in Computer Science</i>, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">10.1007/978-3-030-38471-5_13</a>.","apa":"Jager, T., &#38; Niehues, D. (2020). On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In <i>Lecture Notes in Computer Science</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-030-38471-5_13\">https://doi.org/10.1007/978-3-030-38471-5_13</a>"},"place":"Cham","department":[{"_id":"558"}],"user_id":"36113","_id":"21396","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"file_date_updated":"2021-03-08T17:02:37Z","type":"book_chapter","status":"public"}]
