[{"project":[{"name":"SFB 901 - Subproject C2","_id":"14"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"3365","user_id":"477","department":[{"_id":"78"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2022-01-06T06:59:13Z","publisher":"Universität Paderborn","date_created":"2018-06-26T14:10:18Z","supervisor":[{"full_name":"Lösch, Achim","id":"43646","last_name":"Lösch","first_name":"Achim"},{"full_name":"Platzner, Marco","id":"398","last_name":"Platzner","first_name":"Marco"}],"author":[{"first_name":"Jan-Philip","last_name":"Schnuer","full_name":"Schnuer, Jan-Philip"}],"title":"Static Scheduling Algorithms for Heterogeneous Compute Nodes","year":"2018","citation":{"apa":"Schnuer, J.-P. (2018). <i>Static Scheduling Algorithms for Heterogeneous Compute Nodes</i>. Universität Paderborn.","short":"J.-P. Schnuer, Static Scheduling Algorithms for Heterogeneous Compute Nodes, Universität Paderborn, 2018.","bibtex":"@book{Schnuer_2018, title={Static Scheduling Algorithms for Heterogeneous Compute Nodes}, publisher={Universität Paderborn}, author={Schnuer, Jan-Philip}, year={2018} }","mla":"Schnuer, Jan-Philip. <i>Static Scheduling Algorithms for Heterogeneous Compute Nodes</i>. Universität Paderborn, 2018.","ama":"Schnuer J-P. <i>Static Scheduling Algorithms for Heterogeneous Compute Nodes</i>. Universität Paderborn; 2018.","chicago":"Schnuer, Jan-Philip. <i>Static Scheduling Algorithms for Heterogeneous Compute Nodes</i>. Universität Paderborn, 2018.","ieee":"J.-P. Schnuer, <i>Static Scheduling Algorithms for Heterogeneous Compute Nodes</i>. Universität Paderborn, 2018."}},{"project":[{"_id":"14","name":"SFB 901 - Subproject C2"},{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"3366","user_id":"477","department":[{"_id":"78"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2022-01-06T06:59:13Z","publisher":"Universität Paderborn","date_created":"2018-06-26T14:12:00Z","author":[{"first_name":"Marcel","full_name":"Croce, Marcel","last_name":"Croce"}],"supervisor":[{"first_name":"Achim","full_name":"Lösch, Achim","id":"43646","last_name":"Lösch"},{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"}],"title":"Evaluation of OpenCL-based Compilation for FPGAs","year":"2018","citation":{"ama":"Croce M. <i>Evaluation of OpenCL-Based Compilation for FPGAs</i>. Universität Paderborn; 2018.","chicago":"Croce, Marcel. <i>Evaluation of OpenCL-Based Compilation for FPGAs</i>. Universität Paderborn, 2018.","ieee":"M. Croce, <i>Evaluation of OpenCL-based Compilation for FPGAs</i>. Universität Paderborn, 2018.","mla":"Croce, Marcel. <i>Evaluation of OpenCL-Based Compilation for FPGAs</i>. Universität Paderborn, 2018.","bibtex":"@book{Croce_2018, title={Evaluation of OpenCL-based Compilation for FPGAs}, publisher={Universität Paderborn}, author={Croce, Marcel}, year={2018} }","short":"M. Croce, Evaluation of OpenCL-Based Compilation for FPGAs, Universität Paderborn, 2018.","apa":"Croce, M. (2018). <i>Evaluation of OpenCL-based Compilation for FPGAs</i>. Universität Paderborn."}},{"status":"public","type":"conference","file_date_updated":"2018-10-31T13:30:40Z","user_id":"11108","department":[{"_id":"79"},{"_id":"34"},{"_id":"7"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"_id":"3422","citation":{"bibtex":"@inproceedings{Robinson_Scheideler_Setzer, title={Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary}, DOI={<a href=\"https://doi.org/10.1145/3210377.3210399\">10.1145/3210377.3210399</a>}, booktitle={Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}, author={Robinson, Peter and Scheideler, Christian and Setzer, Alexander} }","mla":"Robinson, Peter, et al. “Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.” <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, doi:<a href=\"https://doi.org/10.1145/3210377.3210399\">10.1145/3210377.3210399</a>.","short":"P. Robinson, C. Scheideler, A. Setzer, in: Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), n.d.","apa":"Robinson, P., Scheideler, C., &#38; Setzer, A. (n.d.). Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary. In <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. Wien. <a href=\"https://doi.org/10.1145/3210377.3210399\">https://doi.org/10.1145/3210377.3210399</a>","chicago":"Robinson, Peter, Christian Scheideler, and Alexander Setzer. “Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary.” In <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, n.d. <a href=\"https://doi.org/10.1145/3210377.3210399\">https://doi.org/10.1145/3210377.3210399</a>.","ieee":"P. Robinson, C. Scheideler, and A. Setzer, “Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary,” in <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, Wien.","ama":"Robinson P, Scheideler C, Setzer A. Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary. In: <i>Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. doi:<a href=\"https://doi.org/10.1145/3210377.3210399\">10.1145/3210377.3210399</a>"},"publication_status":"accepted","has_accepted_license":"1","publication_identifier":{"isbn":["978-1-4503-5799-9/18/07"]},"conference":{"location":"Wien","end_date":"2018-07-18","start_date":"2018-07-16","name":"30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)"},"doi":"10.1145/3210377.3210399","author":[{"last_name":"Robinson","full_name":"Robinson, Peter","first_name":"Peter"},{"first_name":"Christian","id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler"},{"first_name":"Alexander","last_name":"Setzer","id":"11108","full_name":"Setzer, Alexander"}],"date_updated":"2022-01-06T06:59:16Z","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1675407,"file_name":"p173-robinson.pdf","access_level":"closed","file_id":"5215","date_updated":"2018-10-31T13:30:40Z","date_created":"2018-10-31T13:30:40Z","creator":"asetzer"}],"abstract":[{"lang":"eng","text":"We study the consensus problem in a synchronous distributed system of n nodes under an adaptive adversary that has a slightly outdated view of the system and can block all incoming and outgoing communication of a constant fraction of the nodes in each round. Motivated by a result of Ben-Or and Bar-Joseph (1998), showing that any consensus algorithm that is resilient against a linear number of crash faults requires $\\tilde \\Omega(\\sqrt n)$ rounds in an n-node network against an adaptive adversary, we consider a late adaptive adversary, who has full knowledge of the network state at the beginning of the previous round and unlimited computational power, but is oblivious to the current state of the nodes. \r\n\r\nOur main contributions are randomized distributed algorithms that achieve consensus with high probability among all except a small constant fraction of the nodes (i.e., \"almost-everywhere'') against a late adaptive adversary who can block up to ε n$ nodes in each round, for a small constant ε >0$. Our first protocol achieves binary almost-everywhere consensus and also guarantees a decision on the majority input value, thus ensuring plurality consensus. We also present an algorithm that achieves the same time complexity for multi-value consensus. Both of our algorithms succeed in $O(log n)$ rounds with high probability, thus showing an exponential gap to the $\\tilde\\Omega(\\sqrt n)$ lower bound of Ben-Or and Bar-Joseph for strongly adaptive crash-failure adversaries, which can be strengthened to $\\Omega(n)$ when allowing the adversary to block nodes instead of permanently crashing them. Our algorithms are scalable to large systems as each node contacts only an (amortized) constant number of peers in each communication round. We show that our algorithms are optimal up to constant (resp.\\ sub-logarithmic) factors by proving that every almost-everywhere consensus protocol takes $\\Omega(log_d n)$ rounds in the worst case, where d is an upper bound on the number of communication requests initiated per node in each round. We complement our theoretical results with an experimental evaluation of the binary almost-everywhere consensus protocol revealing a short convergence time even against an adversary blocking a large fraction of nodes."}],"publication":"Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","language":[{"iso":"eng"}],"ddc":["040"],"keyword":["distributed consensus","randomized algorithm","adaptive adversary","complexity lower bound"],"year":"2018","title":"Breaking the $\\tilde\\Omega(\\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary","date_created":"2018-07-04T08:55:45Z"},{"ddc":["040"],"language":[{"iso":"eng"}],"publication":"Proceeding of International Symposium on Business Modeling and Software Design","abstract":[{"lang":"eng","text":"Nowadays companies like Apple create ecosystems of third- party providers and users around their software platforms. Often online stores like Apple App Store are created to directly market third-party solutions. We call such ecosystems store-oriented software ecosystems. While the architecture of these ecosystems is mainly derived from busi- ness decisions of their owners, ecosystems with greatly different archi- tectural designs have been created. This diversity makes it challenging for future ecosystem providers to understand which architectural design is suitable to fulfill certain business decisions. In turn, opening a plat- form becomes risky while endangering intellectual property or scarifying quality of services. In this paper, we identify three main design options of store-oriented software ecosystems by classifying existing ecosystems based on similarities in their business decisions. We elaborate on the design options, discuss their main contributions, and provide exemplary ecosystems. Our work provides aspiring ecosystem providers with the reusable knowledge of existing ecosystems and helps them to take more informed architectural decisions and reduce risks in future."}],"file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-11-12T19:01:06Z","creator":"bahareh","date_updated":"2018-11-12T19:01:06Z","file_id":"5533","file_name":"Jazayeri_BMSD2018.pdf","access_level":"closed","file_size":408509}],"publisher":"Springer","date_created":"2018-07-12T10:59:16Z","title":"Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions","year":"2018","_id":"3550","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"department":[{"_id":"66"},{"_id":"276"}],"series_title":"Lecture Notes in Business Information Processing (LNBIP)","user_id":"16205","file_date_updated":"2018-11-12T19:01:06Z","type":"conference","status":"public","date_updated":"2022-01-06T06:59:24Z","volume":319,"author":[{"id":"36399","full_name":"Jazayeri, Bahar","last_name":"Jazayeri","first_name":"Bahar"},{"first_name":"Olaf","last_name":"Zimmermann","full_name":"Zimmermann, Olaf"},{"first_name":"Gregor","last_name":"Engels","full_name":"Engels, Gregor","id":"107"},{"last_name":"Küster","full_name":"Küster, Jochen","first_name":"Jochen"},{"full_name":"Kundisch, Dennis","id":"21117","last_name":"Kundisch","first_name":"Dennis"},{"first_name":"Daniel","last_name":"Szopinski","id":"36372","full_name":"Szopinski, Daniel"}],"doi":"10.1007/978-3-319-94214-8_30","has_accepted_license":"1","publication_identifier":{"isbn":["9783319942131","9783319942148"],"issn":["1865-1348","1865-1356"]},"publication_status":"published","place":"Wien, Austria","intvolume":"       319","page":"390-400","citation":{"bibtex":"@inproceedings{Jazayeri_Zimmermann_Engels_Küster_Kundisch_Szopinski_2018, place={Wien, Austria}, series={Lecture Notes in Business Information Processing (LNBIP)}, title={Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions}, volume={319}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-94214-8_30\">10.1007/978-3-319-94214-8_30</a>}, booktitle={Proceeding of International Symposium on Business Modeling and Software Design}, publisher={Springer}, author={Jazayeri, Bahar and Zimmermann, Olaf and Engels, Gregor and Küster, Jochen and Kundisch, Dennis and Szopinski, Daniel}, year={2018}, pages={390–400}, collection={Lecture Notes in Business Information Processing (LNBIP)} }","short":"B. Jazayeri, O. Zimmermann, G. Engels, J. Küster, D. Kundisch, D. Szopinski, in: Proceeding of International Symposium on Business Modeling and Software Design, Springer, Wien, Austria, 2018, pp. 390–400.","mla":"Jazayeri, Bahar, et al. “Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions.” <i>Proceeding of International Symposium on Business Modeling and Software Design</i>, vol. 319, Springer, 2018, pp. 390–400, doi:<a href=\"https://doi.org/10.1007/978-3-319-94214-8_30\">10.1007/978-3-319-94214-8_30</a>.","apa":"Jazayeri, B., Zimmermann, O., Engels, G., Küster, J., Kundisch, D., &#38; Szopinski, D. (2018). Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions. In <i>Proceeding of International Symposium on Business Modeling and Software Design</i> (Vol. 319, pp. 390–400). Wien, Austria: Springer. <a href=\"https://doi.org/10.1007/978-3-319-94214-8_30\">https://doi.org/10.1007/978-3-319-94214-8_30</a>","chicago":"Jazayeri, Bahar, Olaf Zimmermann, Gregor Engels, Jochen Küster, Dennis Kundisch, and Daniel Szopinski. “Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions.” In <i>Proceeding of International Symposium on Business Modeling and Software Design</i>, 319:390–400. Lecture Notes in Business Information Processing (LNBIP). Wien, Austria: Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-94214-8_30\">https://doi.org/10.1007/978-3-319-94214-8_30</a>.","ieee":"B. Jazayeri, O. Zimmermann, G. Engels, J. Küster, D. Kundisch, and D. Szopinski, “Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions,” in <i>Proceeding of International Symposium on Business Modeling and Software Design</i>, 2018, vol. 319, pp. 390–400.","ama":"Jazayeri B, Zimmermann O, Engels G, Küster J, Kundisch D, Szopinski D. Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions. In: <i>Proceeding of International Symposium on Business Modeling and Software Design</i>. Vol 319. Lecture Notes in Business Information Processing (LNBIP). Wien, Austria: Springer; 2018:390-400. doi:<a href=\"https://doi.org/10.1007/978-3-319-94214-8_30\">10.1007/978-3-319-94214-8_30</a>"}},{"date_updated":"2022-01-06T06:59:24Z","volume":36,"author":[{"last_name":"König","id":"22358","full_name":"König, Jürgen","first_name":"Jürgen"},{"first_name":"Alexander","last_name":"Mäcker","id":"13536","full_name":"Mäcker, Alexander"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","id":"15523","first_name":"Friedhelm"},{"full_name":"Riechers, Sören","last_name":"Riechers","first_name":"Sören"}],"date_created":"2018-07-13T09:57:48Z","title":"Scheduling with interjob communication on parallel processors","doi":"10.1007/s10878-018-0325-3","has_accepted_license":"1","issue":"4","year":"2018","intvolume":"        36","page":"1356-1379","citation":{"ama":"König J, Mäcker A, Meyer auf der Heide F, Riechers S. Scheduling with interjob communication on parallel processors. <i>Journal of Combinatorial Optimization</i>. 2018;36(4):1356-1379. doi:<a href=\"https://doi.org/10.1007/s10878-018-0325-3\">10.1007/s10878-018-0325-3</a>","ieee":"J. König, A. Mäcker, F. Meyer auf der Heide, and S. Riechers, “Scheduling with interjob communication on parallel processors,” <i>Journal of Combinatorial Optimization</i>, vol. 36, no. 4, pp. 1356–1379, 2018.","chicago":"König, Jürgen, Alexander Mäcker, Friedhelm Meyer auf der Heide, and Sören Riechers. “Scheduling with Interjob Communication on Parallel Processors.” <i>Journal of Combinatorial Optimization</i> 36, no. 4 (2018): 1356–79. <a href=\"https://doi.org/10.1007/s10878-018-0325-3\">https://doi.org/10.1007/s10878-018-0325-3</a>.","mla":"König, Jürgen, et al. “Scheduling with Interjob Communication on Parallel Processors.” <i>Journal of Combinatorial Optimization</i>, vol. 36, no. 4, 2018, pp. 1356–79, doi:<a href=\"https://doi.org/10.1007/s10878-018-0325-3\">10.1007/s10878-018-0325-3</a>.","bibtex":"@article{König_Mäcker_Meyer auf der Heide_Riechers_2018, title={Scheduling with interjob communication on parallel processors}, volume={36}, DOI={<a href=\"https://doi.org/10.1007/s10878-018-0325-3\">10.1007/s10878-018-0325-3</a>}, number={4}, journal={Journal of Combinatorial Optimization}, author={König, Jürgen and Mäcker, Alexander and Meyer auf der Heide, Friedhelm and Riechers, Sören}, year={2018}, pages={1356–1379} }","short":"J. König, A. Mäcker, F. Meyer auf der Heide, S. Riechers, Journal of Combinatorial Optimization 36 (2018) 1356–1379.","apa":"König, J., Mäcker, A., Meyer auf der Heide, F., &#38; Riechers, S. (2018). Scheduling with interjob communication on parallel processors. <i>Journal of Combinatorial Optimization</i>, <i>36</i>(4), 1356–1379. <a href=\"https://doi.org/10.1007/s10878-018-0325-3\">https://doi.org/10.1007/s10878-018-0325-3</a>"},"_id":"3551","project":[{"name":"SFB 901 - Subproject C4","_id":"16"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"63"}],"user_id":"477","ddc":["000"],"file_date_updated":"2018-11-02T15:20:24Z","language":[{"iso":"eng"}],"publication":"Journal of Combinatorial Optimization","type":"journal_article","status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"SchedulingWithInterjobCommunic.pdf","access_level":"closed","file_id":"5299","file_size":745708,"date_created":"2018-11-02T15:20:24Z","creator":"ups","date_updated":"2018-11-02T15:20:24Z"}]},{"type":"conference","status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"2965","user_id":"13703","department":[{"_id":"64"},{"_id":"568"}],"file_date_updated":"2018-11-02T14:39:46Z","publication_status":"accepted","has_accepted_license":"1","publication_identifier":{"isbn":["978-1-4503-6448-5"]},"place":"New York, NY, USA","citation":{"bibtex":"@inproceedings{Blömer_Löken, place={New York, NY, USA}, title={Cloud Architectures for Searchable Encryption}, DOI={<a href=\"https://doi.org/10.1145/3230833.3230853\">10.1145/3230833.3230853</a>}, booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018}, publisher={ACM}, author={Blömer, Johannes and Löken, Nils}, pages={25:1--25:10} }","short":"J. Blömer, N. Löken, in: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, ACM, New York, NY, USA, n.d., pp. 25:1--25:10.","mla":"Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>, ACM, pp. 25:1--25:10, doi:<a href=\"https://doi.org/10.1145/3230833.3230853\">10.1145/3230833.3230853</a>.","apa":"Blömer, J., &#38; Löken, N. (n.d.). Cloud Architectures for Searchable Encryption. In <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i> (pp. 25:1--25:10). New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/3230833.3230853\">https://doi.org/10.1145/3230833.3230853</a>","chicago":"Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” In <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>, 25:1--25:10. New York, NY, USA: ACM, n.d. <a href=\"https://doi.org/10.1145/3230833.3230853\">https://doi.org/10.1145/3230833.3230853</a>.","ieee":"J. Blömer and N. Löken, “Cloud Architectures for Searchable Encryption,” in <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>, Hamburg, Germany, pp. 25:1--25:10.","ama":"Blömer J, Löken N. Cloud Architectures for Searchable Encryption. In: <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>. New York, NY, USA: ACM; :25:1--25:10. doi:<a href=\"https://doi.org/10.1145/3230833.3230853\">10.1145/3230833.3230853</a>"},"page":"25:1--25:10","date_updated":"2022-01-06T06:58:49Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"id":"13703","full_name":"Löken, Nils","last_name":"Löken","first_name":"Nils"}],"doi":"10.1145/3230833.3230853","conference":{"location":"Hamburg, Germany","name":"ARES 2018"},"publication":"Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018","file":[{"creator":"ups","date_created":"2018-11-02T14:39:46Z","date_updated":"2018-11-02T14:39:46Z","access_level":"closed","file_name":"a25-Blomer.pdf","file_id":"5278","file_size":769807,"content_type":"application/pdf","relation":"main_file","success":1}],"ddc":["000"],"language":[{"iso":"eng"}],"quality_controlled":"1","year":"2018","publisher":"ACM","date_created":"2018-06-04T11:33:15Z","title":"Cloud Architectures for Searchable Encryption"},{"author":[{"last_name":"Dräxler","full_name":"Dräxler, Sevil","id":"31764","first_name":"Sevil"},{"first_name":"Holger","last_name":"Karl","id":"126","full_name":"Karl, Holger"},{"first_name":"Zoltan Adam","last_name":"Mann","full_name":"Mann, Zoltan Adam"}],"oa":"1","date_updated":"2022-01-06T06:59:00Z","doi":"10.1109/TNSM.2018.2846572","main_file_link":[{"url":"https://arxiv.org/abs/1711.10839","open_access":"1"}],"has_accepted_license":"1","citation":{"ama":"Dräxler S, Karl H, Mann ZA. JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services. <i>IEEE Transactions on Network and Service Management</i>. 2018. doi:<a href=\"https://doi.org/10.1109/TNSM.2018.2846572\">10.1109/TNSM.2018.2846572</a>","chicago":"Dräxler, Sevil, Holger Karl, and Zoltan Adam Mann. “JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services.” <i>IEEE Transactions on Network and Service Management</i>, 2018. <a href=\"https://doi.org/10.1109/TNSM.2018.2846572\">https://doi.org/10.1109/TNSM.2018.2846572</a>.","ieee":"S. Dräxler, H. Karl, and Z. A. Mann, “JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services,” <i>IEEE Transactions on Network and Service Management</i>, 2018.","apa":"Dräxler, S., Karl, H., &#38; Mann, Z. A. (2018). JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services. <i>IEEE Transactions on Network and Service Management</i>. <a href=\"https://doi.org/10.1109/TNSM.2018.2846572\">https://doi.org/10.1109/TNSM.2018.2846572</a>","short":"S. Dräxler, H. Karl, Z.A. Mann, IEEE Transactions on Network and Service Management (2018).","mla":"Dräxler, Sevil, et al. “JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services.” <i>IEEE Transactions on Network and Service Management</i>, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/TNSM.2018.2846572\">10.1109/TNSM.2018.2846572</a>.","bibtex":"@article{Dräxler_Karl_Mann_2018, title={JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services}, DOI={<a href=\"https://doi.org/10.1109/TNSM.2018.2846572\">10.1109/TNSM.2018.2846572</a>}, journal={IEEE Transactions on Network and Service Management}, publisher={IEEE}, author={Dräxler, Sevil and Karl, Holger and Mann, Zoltan Adam}, year={2018} }"},"department":[{"_id":"75"}],"user_id":"31764","_id":"3152","project":[{"_id":"23","name":"5G Programmable Infrastructure Converging disaggregated neTwork and compUte Resources","grant_number":"762057"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"file_date_updated":"2019-01-21T16:12:36Z","article_type":"original","type":"journal_article","status":"public","urn":"31522","date_created":"2018-06-11T06:55:05Z","publisher":"IEEE","title":"JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services","year":"2018","language":[{"iso":"eng"}],"ddc":["000"],"publication":"IEEE Transactions on Network and Service Management","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T15:25:49Z","date_created":"2018-11-02T15:25:49Z","creator":"ups","file_size":1767054,"file_name":"08382313.pdf","access_level":"closed","file_id":"5302"},{"creator":"sevilmeh","date_created":"2019-01-21T16:12:36Z","date_updated":"2019-01-21T16:12:36Z","file_id":"6950","access_level":"open_access","file_name":"TNSM2846572_RIS.pdf","file_size":2878350,"content_type":"application/pdf","relation":"main_file"}],"abstract":[{"text":"To adapt to continuously changing workloads in networks, components of the running network services may need to be replicated (scaling the network service) and allocated to physical resources (placement) dynamically, also necessitating dynamic re-routing of flows between service components. In this paper, we propose JASPER, a fully automated approach to jointly optimizing scaling, placement, and routing for complex network services, consisting of multiple (virtualized) components. JASPER handles multiple network services that share the same substrate network; services can be dynamically added or removed and dynamic workload changes are handled. Our approach lets service designers specify their services on a high level of abstraction using service templates. JASPER automatically makes scaling, placement and routing decisions, enabling quick reaction to changes. We formalize the problem, analyze its complexity, and develop two algorithms to solve it. Extensive empirical results show the applicability and effectiveness of the proposed approach.","lang":"eng"}]},{"citation":{"ama":"Gmyr R. <i>Distributed Algorithms for Overlay Networks and Programmable Matter</i>. Universität Paderborn; 2018. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-265\">10.17619/UNIPB/1-265</a>","chicago":"Gmyr, Robert. <i>Distributed Algorithms for Overlay Networks and Programmable Matter</i>. Universität Paderborn, 2018. <a href=\"https://doi.org/10.17619/UNIPB/1-265\">https://doi.org/10.17619/UNIPB/1-265</a>.","ieee":"R. Gmyr, <i>Distributed Algorithms for Overlay Networks and Programmable Matter</i>. Universität Paderborn, 2018.","apa":"Gmyr, R. (2018). <i>Distributed Algorithms for Overlay Networks and Programmable Matter</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-265\">https://doi.org/10.17619/UNIPB/1-265</a>","bibtex":"@book{Gmyr_2018, title={Distributed Algorithms for Overlay Networks and Programmable Matter}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-265\">10.17619/UNIPB/1-265</a>}, publisher={Universität Paderborn}, author={Gmyr, Robert}, year={2018} }","mla":"Gmyr, Robert. <i>Distributed Algorithms for Overlay Networks and Programmable Matter</i>. Universität Paderborn, 2018, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-265\">10.17619/UNIPB/1-265</a>.","short":"R. Gmyr, Distributed Algorithms for Overlay Networks and Programmable Matter, Universität Paderborn, 2018."},"year":"2018","author":[{"first_name":"Robert","full_name":"Gmyr, Robert","last_name":"Gmyr"}],"supervisor":[{"first_name":"Christian","last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian"}],"date_created":"2018-01-31T06:04:03Z","date_updated":"2022-01-06T06:51:00Z","publisher":"Universität Paderborn","doi":"10.17619/UNIPB/1-265","title":"Distributed Algorithms for Overlay Networks and Programmable Matter","type":"dissertation","status":"public","department":[{"_id":"79"}],"user_id":"477","_id":"1138","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subproject C1","_id":"13"},{"_id":"2","name":"SFB 901 - Project Area A"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject A1","_id":"5"}]},{"citation":{"ieee":"L. C. Funke, <i>Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM</i>. Universität Paderborn, 2018.","chicago":"Funke, Lars Christian. <i>Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM</i>. Universität Paderborn, 2018.","ama":"Funke LC. <i>Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM</i>. Universität Paderborn; 2018.","apa":"Funke, L. C. (2018). <i>Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM</i>. Universität Paderborn.","mla":"Funke, Lars Christian. <i>Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM</i>. 2018.","bibtex":"@book{Funke_2018, place={Universität Paderborn}, title={Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM}, author={Funke, Lars Christian}, year={2018} }","short":"L.C. Funke, Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM, Universität Paderborn, 2018."},"place":"Universität Paderborn","year":"2018","supervisor":[{"id":"21117","full_name":"Kundisch, Dennis","last_name":"Kundisch","first_name":"Dennis"}],"author":[{"full_name":"Funke, Lars Christian","last_name":"Funke","first_name":"Lars Christian"}],"date_created":"2018-04-12T12:47:45Z","date_updated":"2022-01-06T06:55:47Z","title":"Eignungsbewertung eines Enterprise Architecture Frameworks für das IT-Alignment zwischen Unternehmensstrategie und IT-Landschaft am Beispiel der Arvato SCM","type":"mastersthesis","status":"public","user_id":"16205","_id":"2320","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"language":[{"iso":"ger"}]},{"title":"Provably Anonymous Communication Based on Trusted Execution Environments","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"full_name":"Bobolz, Jan","id":"27207","last_name":"Bobolz","first_name":"Jan"},{"first_name":"Christian","id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler"},{"last_name":"Setzer","full_name":"Setzer, Alexander","id":"11108","first_name":"Alexander"}],"date_created":"2018-11-25T08:08:40Z","date_updated":"2022-01-06T07:02:43Z","citation":{"ieee":"J. Blömer, J. Bobolz, C. Scheideler, and A. Setzer, <i>Provably Anonymous Communication Based on Trusted Execution Environments</i>. .","chicago":"Blömer, Johannes, Jan Bobolz, Christian Scheideler, and Alexander Setzer. <i>Provably Anonymous Communication Based on Trusted Execution Environments</i>, n.d.","ama":"Blömer J, Bobolz J, Scheideler C, Setzer A. <i>Provably Anonymous Communication Based on Trusted Execution Environments</i>.","mla":"Blömer, Johannes, et al. <i>Provably Anonymous Communication Based on Trusted Execution Environments</i>.","bibtex":"@book{Blömer_Bobolz_Scheideler_Setzer, title={Provably Anonymous Communication Based on Trusted Execution Environments}, author={Blömer, Johannes and Bobolz, Jan and Scheideler, Christian and Setzer, Alexander} }","short":"J. Blömer, J. Bobolz, C. Scheideler, A. Setzer, Provably Anonymous Communication Based on Trusted Execution Environments, n.d.","apa":"Blömer, J., Bobolz, J., Scheideler, C., &#38; Setzer, A. (n.d.). <i>Provably Anonymous Communication Based on Trusted Execution Environments</i>."},"year":"2018","has_accepted_license":"1","publication_status":"draft","language":[{"iso":"eng"}],"file_date_updated":"2018-12-31T09:55:30Z","ddc":["000"],"department":[{"_id":"7"},{"_id":"64"},{"_id":"79"}],"user_id":"27207","_id":"5820","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"status":"public","file":[{"file_size":470968,"file_name":"draft-2018.pdf","file_id":"6435","access_level":"closed","date_updated":"2018-12-31T09:55:30Z","creator":"jbobolz","date_created":"2018-12-31T09:55:30Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"In this paper, we investigate the use of trusted execution environments (TEEs, such as Intel's SGX) for an anonymous communication infrastructure over untrusted networks.\r\nFor this, we present the general idea of exploiting trusted execution environments for the purpose of anonymous communication, including a continuous-time security framework that models strong anonymity guarantees in the presence of an adversary that observes all network traffic and can adaptively corrupt a constant fraction of participating nodes.\r\nIn our framework, a participating node can generate a number of unlinkable pseudonyms. Messages are sent from and to pseudonyms, allowing both senders and receivers of messages to remain anonymous. We introduce a concrete construction, which shows viability of our TEE-based approach to anonymous communication. The construction draws from techniques from cryptography and overlay networks. \r\nOur techniques are very general and can be used as a basis for future constructions with similar goals."}],"type":"working_paper"},{"status":"public","file":[{"file_name":"p1-scheideler.pdf","file_id":"6194","access_level":"closed","file_size":1420210,"creator":"ups","date_created":"2018-12-12T15:12:02Z","date_updated":"2018-12-12T15:12:02Z","relation":"main_file","content_type":"application/pdf"}],"publication":"Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018","type":"conference","file_date_updated":"2018-12-12T15:12:02Z","language":[{"iso":"eng"}],"ddc":["004"],"department":[{"_id":"79"}],"user_id":"477","_id":"5985","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"page":"1-2","citation":{"apa":"Scheideler, C. (2018). Relays: Towards a Link Layer for Robust and Secure Fog Computing. In <i>Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018</i> (pp. 1–2). <a href=\"https://doi.org/10.1145/3229774.3229781\">https://doi.org/10.1145/3229774.3229781</a>","bibtex":"@inproceedings{Scheideler_2018, title={Relays: Towards a Link Layer for Robust and Secure Fog Computing}, DOI={<a href=\"https://doi.org/10.1145/3229774.3229781\">10.1145/3229774.3229781</a>}, booktitle={Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018}, author={Scheideler, Christian}, year={2018}, pages={1–2} }","short":"C. Scheideler, in: Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 2018, pp. 1–2.","mla":"Scheideler, Christian. “Relays: Towards a Link Layer for Robust and Secure Fog Computing.” <i>Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018</i>, 2018, pp. 1–2, doi:<a href=\"https://doi.org/10.1145/3229774.3229781\">10.1145/3229774.3229781</a>.","ama":"Scheideler C. Relays: Towards a Link Layer for Robust and Secure Fog Computing. In: <i>Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018</i>. ; 2018:1-2. doi:<a href=\"https://doi.org/10.1145/3229774.3229781\">10.1145/3229774.3229781</a>","ieee":"C. Scheideler, “Relays: Towards a Link Layer for Robust and Secure Fog Computing,” in <i>Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018</i>, 2018, pp. 1–2.","chicago":"Scheideler, Christian. “Relays: Towards a Link Layer for Robust and Secure Fog Computing.” In <i>Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018</i>, 1–2, 2018. <a href=\"https://doi.org/10.1145/3229774.3229781\">https://doi.org/10.1145/3229774.3229781</a>."},"year":"2018","has_accepted_license":"1","doi":"10.1145/3229774.3229781","title":"Relays: Towards a Link Layer for Robust and Secure Fog Computing","author":[{"last_name":"Scheideler","id":"20792","full_name":"Scheideler, Christian","first_name":"Christian"}],"date_created":"2018-11-30T08:11:27Z","date_updated":"2022-01-06T07:02:49Z"},{"publication_status":"accepted","has_accepted_license":"1","citation":{"ama":"Peuster M, Karl H. Understand your chains and keep your deadlines: Introducing time-constrained profiling for NFV. In: <i>IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)</i>. Rome: IEEE/IFIP.","chicago":"Peuster, Manuel, and Holger Karl. “Understand Your Chains and Keep Your Deadlines: Introducing Time-Constrained Profiling for NFV.” In <i>IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)</i>. Rome: IEEE/IFIP, n.d.","ieee":"M. Peuster and H. Karl, “Understand your chains and keep your deadlines: Introducing time-constrained profiling for NFV,” in <i>IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)</i>, Rome.","short":"M. Peuster, H. Karl, in: IEEE/IFIP 14th International Conference on Network and Service Management (CNSM), IEEE/IFIP, Rome, n.d.","bibtex":"@inproceedings{Peuster_Karl, place={Rome}, title={Understand your chains and keep your deadlines: Introducing time-constrained profiling for NFV}, booktitle={IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)}, publisher={IEEE/IFIP}, author={Peuster, Manuel and Karl, Holger} }","mla":"Peuster, Manuel, and Holger Karl. “Understand Your Chains and Keep Your Deadlines: Introducing Time-Constrained Profiling for NFV.” <i>IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)</i>, IEEE/IFIP.","apa":"Peuster, M., &#38; Karl, H. (n.d.). Understand your chains and keep your deadlines: Introducing time-constrained profiling for NFV. In <i>IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)</i>. Rome: IEEE/IFIP."},"year":"2018","place":"Rome","date_created":"2018-12-06T12:06:14Z","author":[{"first_name":"Manuel","full_name":"Peuster, Manuel","id":"13271","last_name":"Peuster"},{"first_name":"Holger","last_name":"Karl","full_name":"Karl, Holger","id":"126"}],"oa":"1","date_updated":"2022-01-06T07:02:50Z","publisher":"IEEE/IFIP","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8584974"}],"conference":{"location":"Rome","end_date":"2018-11-09","start_date":"2018-11-05","name":"IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)"},"title":"Understand your chains and keep your deadlines: Introducing time-constrained profiling for NFV","type":"conference","publication":"IEEE/IFIP 14th International Conference on Network and Service Management (CNSM)","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2018-12-06T12:05:37Z","creator":"peuster","date_created":"2018-12-06T12:05:37Z","file_size":961004,"access_level":"open_access","file_id":"6017","file_name":"main_copy_for_ris.pdf"}],"status":"public","user_id":"13271","department":[{"_id":"75"}],"project":[{"grant_number":"761493","name":"5G Development and validation platform for global industry-specific network services and Apps","_id":"28"},{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C3","_id":"15"}],"_id":"6016","language":[{"iso":"eng"}],"file_date_updated":"2018-12-06T12:05:37Z","ddc":["000"]},{"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":466808,"file_id":"1577","access_level":"closed","file_name":"63-main_05.pdf","date_updated":"2018-03-21T13:16:59Z","date_created":"2018-03-21T13:16:59Z","creator":"florida"}],"publication":"Journal of Scheduling","language":[{"iso":"eng"}],"ddc":["040"],"year":"2018","issue":"1","title":"Scheduling Shared Continuous Resources on Many-Cores","date_created":"2017-10-17T12:41:03Z","publisher":"Springer","status":"public","type":"journal_article","file_date_updated":"2018-03-21T13:16:59Z","user_id":"15415","department":[{"_id":"63"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C4","_id":"16"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"63","citation":{"chicago":"Althaus, Ernst, Andre Brinkmann, Peter Kling, Friedhelm Meyer auf der Heide, Lars Nagel, Sören Riechers, Jiri Sgall, and Tim Suess. “Scheduling Shared Continuous Resources on Many-Cores.” <i>Journal of Scheduling</i> 21, no. 1 (2018): 77–92. <a href=\"https://doi.org/10.1007/s10951-017-0518-0\">https://doi.org/10.1007/s10951-017-0518-0</a>.","ieee":"E. Althaus <i>et al.</i>, “Scheduling Shared Continuous Resources on Many-Cores,” <i>Journal of Scheduling</i>, vol. 21, no. 1, pp. 77–92, 2018, doi: <a href=\"https://doi.org/10.1007/s10951-017-0518-0\">10.1007/s10951-017-0518-0</a>.","ama":"Althaus E, Brinkmann A, Kling P, et al. Scheduling Shared Continuous Resources on Many-Cores. <i>Journal of Scheduling</i>. 2018;21(1):77-92. doi:<a href=\"https://doi.org/10.1007/s10951-017-0518-0\">10.1007/s10951-017-0518-0</a>","apa":"Althaus, E., Brinkmann, A., Kling, P., Meyer auf der Heide, F., Nagel, L., Riechers, S., Sgall, J., &#38; Suess, T. (2018). Scheduling Shared Continuous Resources on Many-Cores. <i>Journal of Scheduling</i>, <i>21</i>(1), 77–92. <a href=\"https://doi.org/10.1007/s10951-017-0518-0\">https://doi.org/10.1007/s10951-017-0518-0</a>","bibtex":"@article{Althaus_Brinkmann_Kling_Meyer auf der Heide_Nagel_Riechers_Sgall_Suess_2018, title={Scheduling Shared Continuous Resources on Many-Cores}, volume={21}, DOI={<a href=\"https://doi.org/10.1007/s10951-017-0518-0\">10.1007/s10951-017-0518-0</a>}, number={1}, journal={Journal of Scheduling}, publisher={Springer}, author={Althaus, Ernst and Brinkmann, Andre and Kling, Peter and Meyer auf der Heide, Friedhelm and Nagel, Lars and Riechers, Sören and Sgall, Jiri and Suess, Tim}, year={2018}, pages={77–92} }","mla":"Althaus, Ernst, et al. “Scheduling Shared Continuous Resources on Many-Cores.” <i>Journal of Scheduling</i>, vol. 21, no. 1, Springer, 2018, pp. 77–92, doi:<a href=\"https://doi.org/10.1007/s10951-017-0518-0\">10.1007/s10951-017-0518-0</a>.","short":"E. Althaus, A. Brinkmann, P. Kling, F. Meyer auf der Heide, L. Nagel, S. Riechers, J. Sgall, T. Suess, Journal of Scheduling 21 (2018) 77–92."},"intvolume":"        21","page":"77-92","has_accepted_license":"1","doi":"10.1007/s10951-017-0518-0","author":[{"last_name":"Althaus","full_name":"Althaus, Ernst","first_name":"Ernst"},{"last_name":"Brinkmann","full_name":"Brinkmann, Andre","first_name":"Andre"},{"first_name":"Peter","full_name":"Kling, Peter","last_name":"Kling"},{"last_name":"Meyer auf der Heide","id":"15523","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"},{"first_name":"Lars","last_name":"Nagel","full_name":"Nagel, Lars"},{"first_name":"Sören","last_name":"Riechers","full_name":"Riechers, Sören"},{"first_name":"Jiri","last_name":"Sgall","full_name":"Sgall, Jiri"},{"full_name":"Suess, Tim","last_name":"Suess","first_name":"Tim"}],"volume":21,"date_updated":"2022-01-06T07:03:00Z"},{"file":[{"date_created":"2018-12-03T15:17:56Z","creator":"abursig","date_updated":"2018-12-03T15:17:56Z","access_level":"closed","file_name":"An Extended Perspective of Technology Pivots in Software Startups.pdf","file_id":"5988","file_size":808601,"content_type":"application/pdf","relation":"main_file","success":1}],"status":"public","type":"conference","publication":"Proceedings of the 39th International Conference on Information Systems (ICIS)","ddc":["040"],"file_date_updated":"2018-12-03T15:17:56Z","language":[{"iso":"eng"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"4577","user_id":"16205","department":[{"_id":"276"}],"year":"2018","citation":{"ama":"Bohn N, Kundisch D. An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model. In: <i>Proceedings of the 39th International Conference on Information Systems (ICIS)</i>. ; 2018.","chicago":"Bohn, Nicolai, and Dennis Kundisch. “An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model.” In <i>Proceedings of the 39th International Conference on Information Systems (ICIS)</i>, 2018.","ieee":"N. Bohn and D. Kundisch, “An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model,” in <i>Proceedings of the 39th International Conference on Information Systems (ICIS)</i>, San Francisco, USA, 2018.","mla":"Bohn, Nicolai, and Dennis Kundisch. “An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model.” <i>Proceedings of the 39th International Conference on Information Systems (ICIS)</i>, 2018.","bibtex":"@inproceedings{Bohn_Kundisch_2018, title={An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model}, booktitle={Proceedings of the 39th International Conference on Information Systems (ICIS)}, author={Bohn, Nicolai and Kundisch, Dennis}, year={2018} }","short":"N. Bohn, D. Kundisch, in: Proceedings of the 39th International Conference on Information Systems (ICIS), 2018.","apa":"Bohn, N., &#38; Kundisch, D. (2018). An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model. In <i>Proceedings of the 39th International Conference on Information Systems (ICIS)</i>. San Francisco, USA."},"has_accepted_license":"1","title":"An Extended Perspective of Technology Pivots in Software Startups: Towards a Theoretical Model","conference":{"location":"San Francisco, USA","name":"39th International Conference on Information Systems (ICIS)"},"date_updated":"2022-01-06T07:01:13Z","author":[{"last_name":"Bohn","full_name":"Bohn, Nicolai","id":"10342","first_name":"Nicolai"},{"first_name":"Dennis","full_name":"Kundisch, Dennis","id":"21117","last_name":"Kundisch"}],"date_created":"2018-10-02T13:05:12Z"},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"17","name":"SFB 901 - Subproject C5"}],"_id":"4373","user_id":"477","department":[{"_id":"276"}],"ddc":["040"],"file_date_updated":"2018-11-29T15:03:20Z","language":[{"iso":"eng"}],"type":"conference_abstract","publication":"Bosch Business Model Innovation Summit 2018","file":[{"file_size":1180782,"file_name":"Bosch BMI Summit 2018.pdf","access_level":"closed","file_id":"5982","date_updated":"2018-11-29T15:03:20Z","creator":"dsz","date_created":"2018-11-29T15:03:20Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","date_updated":"2022-01-06T07:00:59Z","date_created":"2018-09-10T12:26:14Z","author":[{"full_name":"Szopinski, Daniel","id":"36372","last_name":"Szopinski","first_name":"Daniel"}],"title":"Towards software-based tools for business model development: Using external stimuli for business model idea generation","conference":{"name":"Bosch Business Model Innovation Summit 2018","location":"Renningen, Germany"},"quality_controlled":"1","has_accepted_license":"1","year":"2018","citation":{"apa":"Szopinski, D. (2018). Towards software-based tools for business model development: Using external stimuli for business model idea generation. In <i>Bosch Business Model Innovation Summit 2018</i>. Renningen, Germany.","bibtex":"@inproceedings{Szopinski_2018, title={Towards software-based tools for business model development: Using external stimuli for business model idea generation}, booktitle={Bosch Business Model Innovation Summit 2018}, author={Szopinski, Daniel}, year={2018} }","mla":"Szopinski, Daniel. “Towards Software-Based Tools for Business Model Development: Using External Stimuli for Business Model Idea Generation.” <i>Bosch Business Model Innovation Summit 2018</i>, 2018.","short":"D. Szopinski, in: Bosch Business Model Innovation Summit 2018, 2018.","ama":"Szopinski D. Towards software-based tools for business model development: Using external stimuli for business model idea generation. In: <i>Bosch Business Model Innovation Summit 2018</i>. ; 2018.","chicago":"Szopinski, Daniel. “Towards Software-Based Tools for Business Model Development: Using External Stimuli for Business Model Idea Generation.” In <i>Bosch Business Model Innovation Summit 2018</i>, 2018.","ieee":"D. Szopinski, “Towards software-based tools for business model development: Using external stimuli for business model idea generation,” in <i>Bosch Business Model Innovation Summit 2018</i>, Renningen, Germany, 2018."}},{"citation":{"bibtex":"@inproceedings{Scheideler_Setzer_2018, title={Relays: A New Approach for the Finite Departure Problem in Overlay Networks}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-03232-6_16\">10.1007/978-3-030-03232-6_16</a>}, booktitle={Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)}, author={Scheideler, Christian and Setzer, Alexander}, year={2018} }","mla":"Scheideler, Christian, and Alexander Setzer. “Relays: A New Approach for the Finite Departure Problem in Overlay Networks.” <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)</i>, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-030-03232-6_16\">10.1007/978-3-030-03232-6_16</a>.","short":"C. Scheideler, A. Setzer, in: Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), 2018.","apa":"Scheideler, C., &#38; Setzer, A. (2018). Relays: A New Approach for the Finite Departure Problem in Overlay Networks. In <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)</i>. Tokyo, Japan. <a href=\"https://doi.org/10.1007/978-3-030-03232-6_16\">https://doi.org/10.1007/978-3-030-03232-6_16</a>","ama":"Scheideler C, Setzer A. Relays: A New Approach for the Finite Departure Problem in Overlay Networks. In: <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)</i>. ; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-030-03232-6_16\">10.1007/978-3-030-03232-6_16</a>","chicago":"Scheideler, Christian, and Alexander Setzer. “Relays: A New Approach for the Finite Departure Problem in Overlay Networks.” In <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)</i>, 2018. <a href=\"https://doi.org/10.1007/978-3-030-03232-6_16\">https://doi.org/10.1007/978-3-030-03232-6_16</a>.","ieee":"C. Scheideler and A. Setzer, “Relays: A New Approach for the Finite Departure Problem in Overlay Networks,” in <i>Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)</i>, Tokyo, Japan, 2018."},"publication_status":"published","has_accepted_license":"1","conference":{"name":"20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)","location":"Tokyo, Japan"},"doi":"10.1007/978-3-030-03232-6_16","author":[{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"},{"first_name":"Alexander","last_name":"Setzer","id":"11108","full_name":"Setzer, Alexander"}],"date_updated":"2022-01-06T07:01:47Z","status":"public","type":"conference","file_date_updated":"2018-10-31T16:09:48Z","user_id":"11108","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"5216","year":"2018","title":"Relays: A New Approach for the Finite Departure Problem in Overlay Networks","date_created":"2018-10-31T13:33:05Z","file":[{"relation":"main_file","content_type":"application/pdf","file_size":369818,"access_level":"closed","file_name":"Scheideler-Setzer2018_Chapter_RelaysANewApproachForTheFinite.pdf","file_id":"5223","date_updated":"2018-10-31T16:09:48Z","creator":"asetzer","date_created":"2018-10-31T15:51:45Z"}],"abstract":[{"lang":"eng","text":"A fundamental problem for overlay networks is to safely exclude leaving nodes, i.e., the nodes requesting to leave the overlay network are excluded from it without affecting its connectivity. To rigorously study self-stabilizing solutions to this problem, the Finite Departure Problem (FDP) has been proposed [9]. In the FDP we are given a network of processes in an arbitrary state, and the goal is to eventually arrive at (and stay in) a state in which all leaving processes irrevocably decided to leave the system while for all weakly-connected components in the initial overlay network, all staying processes in that component will still form a weakly connected component. In the standard interconnection model, the FDP is known to be unsolvable by local control protocols, so oracles have been investigated that allow the problem to be solved [9]. To avoid the use of oracles, we introduce a new interconnection model based on relays. Despite the relay model appearing to be rather restrictive, we show that it is universal, i.e., it is possible to transform any weakly-connected topology into any other weakly-connected topology, which is important for being a useful interconnection model for overlay networks. Apart from this, our model allows processes to grant and revoke access rights, which is why we believe it to be of interest beyond the scope of this paper. We show how to implement the relay layer in a self-stabilizing way and identify properties protocols need to satisfy so that the relay layer can recover while serving protocol requests."}],"publication":"Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)","language":[{"iso":"eng"}],"ddc":["040"]},{"citation":{"apa":"Filmwala, T. (2018). <i>Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate it on FPGA Platform</i>. Universität Paderborn.","short":"T. Filmwala, Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate It on FPGA Platform, Universität Paderborn, 2018.","mla":"Filmwala, Tasneem. <i>Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate It on FPGA Platform</i>. Universität Paderborn, 2018.","bibtex":"@book{Filmwala_2018, title={Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate it on FPGA Platform}, publisher={Universität Paderborn}, author={Filmwala, Tasneem}, year={2018} }","ama":"Filmwala T. <i>Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate It on FPGA Platform</i>. Universität Paderborn; 2018.","chicago":"Filmwala, Tasneem. <i>Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate It on FPGA Platform</i>. Universität Paderborn, 2018.","ieee":"T. Filmwala, <i>Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate it on FPGA Platform</i>. Universität Paderborn, 2018."},"year":"2018","supervisor":[{"orcid":"0000-0001-5728-9982","last_name":"Plessl","full_name":"Plessl, Christian","id":"16153","first_name":"Christian"}],"date_created":"2018-11-07T15:14:26Z","author":[{"full_name":"Filmwala, Tasneem","last_name":"Filmwala","first_name":"Tasneem"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:52Z","title":"Study Effects of Approximation on Conjugate Gradient Algorithm and Accelerate it on FPGA Platform","type":"mastersthesis","status":"public","user_id":"477","department":[{"_id":"27"},{"_id":"518"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C2","_id":"14"}],"_id":"5414","language":[{"iso":"eng"}]},{"title":"Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL","author":[{"first_name":"Onkar","last_name":"Gadewar","full_name":"Gadewar, Onkar"}],"supervisor":[{"first_name":"Christian","full_name":"Plessl, Christian","id":"16153","last_name":"Plessl","orcid":"0000-0001-5728-9982"}],"date_created":"2018-11-07T16:16:56Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:53Z","citation":{"ieee":"O. Gadewar, <i>Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL</i>. Universität Paderborn, 2018.","chicago":"Gadewar, Onkar. <i>Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL</i>. Universität Paderborn, 2018.","ama":"Gadewar O. <i>Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL</i>. Universität Paderborn; 2018.","apa":"Gadewar, O. (2018). <i>Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL</i>. Universität Paderborn.","mla":"Gadewar, Onkar. <i>Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL</i>. Universität Paderborn, 2018.","short":"O. Gadewar, Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL, Universität Paderborn, 2018.","bibtex":"@book{Gadewar_2018, title={Programmable Programs? - Designing FPGA Overlay Architectures with OpenCL}, publisher={Universität Paderborn}, author={Gadewar, Onkar}, year={2018} }"},"year":"2018","language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"27"},{"_id":"518"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"14","name":"SFB 901 - Subproject C2"}],"_id":"5421","status":"public","type":"mastersthesis"},{"publication":"The Latin American Conference on Pattern Languages of Programs (SLPLoP)","abstract":[{"lang":"eng","text":"Software companies nowadays create ecosystems of users and third-party providers around their platforms. They often provide online stores so that the third-party developments can be exposed to users directly. The resulting ecosystems differ significantly from each other in their architectural designs because their providers differ in terms of business goals and contexts. Until now, this architectural diversity and rationale behind it are not well-understood. Therefore, it is not clear which software features contribute to ecosystem’s success with respect to certain business goals and context. This hinders systematic creation of ecosystems in the future. Thus, decision-making becomes too risky; for future ecosystem providers, which may lead to creation of inefficient ecosystems that lack critical features, and for third-party providers to rely on ad-hoc choices while deciding on suitability of an ecosystem for their future career. In this paper, we introduce three design patterns for store- oriented software ecosystems by classifying the design decisions, business goals, and context of 111 store-oriented software ecosystems. Each design pattern provides an architectural solution to achieve a different business goal while supporting a different context. We discuss how the design patterns are applied together in order to achieve more business goals. Our work supports ecosystem and third-party providers by sharing practice-proven architectural solutions, helping them to take informed architectural decisions and reduce technical risks."}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-29T23:41:07Z","creator":"bahareh","date_created":"2018-11-29T23:41:07Z","file_size":514038,"file_id":"5983","access_level":"closed","file_name":"Jazayerietal-SLPLoP18.pdf"}],"ddc":["000"],"language":[{"iso":"eng"}],"year":"2018","publisher":"ACM. To appear","date_created":"2018-11-12T16:02:14Z","title":"Patterns of Store-oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options","type":"conference","status":"public","_id":"5530","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subproject C5","_id":"17"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"66"},{"_id":"276"}],"series_title":"To appear","user_id":"36399","file_date_updated":"2018-11-29T23:41:07Z","has_accepted_license":"1","place":"Valparaíso, Chile","citation":{"chicago":"Jazayeri, Bahar, Olaf Zimmermann, Jochen Küster, Gregor Engels, Dennis Kundisch, and Daniel Szopinski. “Patterns of Store-Oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options.” In <i>The Latin American Conference on Pattern Languages of Programs (SLPLoP)</i>. To Appear. Valparaíso, Chile: ACM. To appear, 2018.","ieee":"B. Jazayeri, O. Zimmermann, J. Küster, G. Engels, D. Kundisch, and D. Szopinski, “Patterns of Store-oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options,” in <i>The Latin American Conference on Pattern Languages of Programs (SLPLoP)</i>, 2018.","ama":"Jazayeri B, Zimmermann O, Küster J, Engels G, Kundisch D, Szopinski D. Patterns of Store-oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options. In: <i>The Latin American Conference on Pattern Languages of Programs (SLPLoP)</i>. To appear. Valparaíso, Chile: ACM. To appear; 2018.","mla":"Jazayeri, Bahar, et al. “Patterns of Store-Oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options.” <i>The Latin American Conference on Pattern Languages of Programs (SLPLoP)</i>, ACM. To appear, 2018.","bibtex":"@inproceedings{Jazayeri_Zimmermann_Küster_Engels_Kundisch_Szopinski_2018, place={Valparaíso, Chile}, series={To appear}, title={Patterns of Store-oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options}, booktitle={The Latin American Conference on Pattern Languages of Programs (SLPLoP)}, publisher={ACM. To appear}, author={Jazayeri, Bahar and Zimmermann, Olaf and Küster, Jochen and Engels, Gregor and Kundisch, Dennis and Szopinski, Daniel}, year={2018}, collection={To appear} }","short":"B. Jazayeri, O. Zimmermann, J. Küster, G. Engels, D. Kundisch, D. Szopinski, in: The Latin American Conference on Pattern Languages of Programs (SLPLoP), ACM. To appear, Valparaíso, Chile, 2018.","apa":"Jazayeri, B., Zimmermann, O., Küster, J., Engels, G., Kundisch, D., &#38; Szopinski, D. (2018). Patterns of Store-oriented Software Ecosystems: Detection, Classification, and Analysis of Design Options. In <i>The Latin American Conference on Pattern Languages of Programs (SLPLoP)</i>. Valparaíso, Chile: ACM. To appear."},"date_updated":"2022-01-06T07:01:57Z","author":[{"last_name":"Jazayeri","id":"36399","full_name":"Jazayeri, Bahar","first_name":"Bahar"},{"first_name":"Olaf","full_name":"Zimmermann, Olaf","last_name":"Zimmermann"},{"full_name":"Küster, Jochen","last_name":"Küster","first_name":"Jochen"},{"last_name":"Engels","id":"107","full_name":"Engels, Gregor","first_name":"Gregor"},{"first_name":"Dennis","last_name":"Kundisch","full_name":"Kundisch, Dennis","id":"21117"},{"id":"36372","full_name":"Szopinski, Daniel","last_name":"Szopinski","first_name":"Daniel"}],"conference":{"end_date":"2018-11-23","start_date":"2018-11-20"}},{"language":[{"iso":"eng"}],"ddc":["040"],"publication":"2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"loesch_asap2018.pdf","file_id":"5552","file_size":2464949,"date_created":"2018-11-14T09:40:42Z","creator":"aloesch","date_updated":"2018-11-14T09:40:42Z"}],"date_created":"2018-11-14T09:26:53Z","publisher":"IEEE","title":"A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes","year":"2018","department":[{"_id":"78"}],"user_id":"43646","_id":"5547","project":[{"_id":"14","name":"SFB 901 - Subproject C2"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"1","name":"SFB 901"}],"file_date_updated":"2018-11-14T09:40:42Z","type":"conference","status":"public","author":[{"full_name":"Lösch, Achim","id":"43646","last_name":"Lösch","first_name":"Achim"},{"last_name":"Platzner","id":"398","full_name":"Platzner, Marco","first_name":"Marco"}],"date_updated":"2022-01-06T07:01:59Z","conference":{"start_date":"2018-07-10","name":"The 29th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors","location":"Milan, Italy","end_date":"2018-07-12"},"doi":"10.1109/asap.2018.8445098","publication_identifier":{"isbn":["9781538674796"]},"has_accepted_license":"1","publication_status":"published","citation":{"ama":"Lösch A, Platzner M. A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes. In: <i>2018 IEEE 29th International Conference on Application-Specific Systems, Architectures and Processors (ASAP)</i>. IEEE; 2018. doi:<a href=\"https://doi.org/10.1109/asap.2018.8445098\">10.1109/asap.2018.8445098</a>","chicago":"Lösch, Achim, and Marco Platzner. “A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes.” In <i>2018 IEEE 29th International Conference on Application-Specific Systems, Architectures and Processors (ASAP)</i>. IEEE, 2018. <a href=\"https://doi.org/10.1109/asap.2018.8445098\">https://doi.org/10.1109/asap.2018.8445098</a>.","ieee":"A. Lösch and M. Platzner, “A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes,” in <i>2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)</i>, Milan, Italy, 2018.","apa":"Lösch, A., &#38; Platzner, M. (2018). A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes. In <i>2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)</i>. Milan, Italy: IEEE. <a href=\"https://doi.org/10.1109/asap.2018.8445098\">https://doi.org/10.1109/asap.2018.8445098</a>","bibtex":"@inproceedings{Lösch_Platzner_2018, title={A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes}, DOI={<a href=\"https://doi.org/10.1109/asap.2018.8445098\">10.1109/asap.2018.8445098</a>}, booktitle={2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)}, publisher={IEEE}, author={Lösch, Achim and Platzner, Marco}, year={2018} }","short":"A. Lösch, M. Platzner, in: 2018 IEEE 29th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), IEEE, 2018.","mla":"Lösch, Achim, and Marco Platzner. “A Highly Accurate Energy Model for Task Execution on Heterogeneous Compute Nodes.” <i>2018 IEEE 29th International Conference on Application-Specific Systems, Architectures and Processors (ASAP)</i>, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/asap.2018.8445098\">10.1109/asap.2018.8445098</a>."}}]
