---
_id: '28683'
abstract:
- lang: ger
  text: "In den letzten Jahren haben sich Software-Ökosysteme als neue, erfolgreiche
    Geschäftsform etabliert. Unternehmen agieren hierbei als Anbieter von Software-Plattformen,
    auf denen Drittanbieter Softwarelösungen für den Markt anbieten können.  Etablierte
    Beispiele sind hierbei sogenannte App-Stores, die z.B. von Google oder Apple angeboten
    werden.\r\n\r\nBeim Aufbau von Software-Ökosystemen müssen vom Plattformanbieter
    viele architektonische Entwurfsentscheidungen getroffen werden. Bisher gibt es
    keine Architekturrichtlinien und -werkzeuge, die den Entwurf einer Ökosystemarchitektur
    unterstützen. Dadurch fehlt hier systematisches, wiederverwendbares Wissen. Plattformanbieter
    müssen auf ad-hoc Entscheidungen zurückgreifen. Dies kann dann zu Problemen im
    Betrieb der Software-Plattformen führen, zu erhöhten Ausfallrisiken und Mehrkosten.\r\n\r\nDer
    Mangel an Architekturwissen manifestiert sich konkret in zwei Gruppen von Herausforderungen:
    Erstens fehlt eine Wissensbasis zu Architekturalternativen und zweitens fehlt
    es an methodischem Wissen zu Entwicklung und Betrieb von Software-Ökosystemen.
    Eine Architekturwissensbasis würde Orientierungshilfen zu den Bestandteilen von
    Software-Ökosystemen und deren Abhängigkeiten geben, während methodisches Wissen
    die Erstellung dieser Systeme erleichtern würde.\r\n\r\nIn der Dissertation werden
    diese Herausforderungen durch die Entwicklung des Frameworks SecoArc für die Modellierung
    von Software-Ökosystemen angegangen. Der Beitrag der Dissertation ist zweifach:
    \r\n1.\tDas SecoArc-Framework umfasst eine Architekturwissensbasis, die wiederverwendbare
    Architekturentwurfsentscheidungen\r\nvon Software-Ökosystemen enthält. Die Wissensbasis
    wurde entwickelt, indem das Architekturwissen bestehender Ökosysteme sowie aus
    existierender Fachliteratur ermittelt wurde und in einer Produktlinie für Software-Ökosysteme
    konsolidiert wurde. Die Produktlinie umfasst architektonische Gemeinsamkeiten
    und Variabilitäten von Software-Ökosystemen. \r\n2.\tDas SecoArc-Framework liefert
    methodisches Wissen, um die Ökosystemarchitektur in Modellen zu entwerfen und
    zu analysieren. Dieses Wissen wurde entwickelt, indem drei Architekturmuster identifiziert
    wurden. Jedes Muster erfasst unterschiedliche Beziehungen zwischen architektonischen
    Entwurfsentscheidungen zu den Qualitätsmerkmalen einer Ökosystemgesundheit und
    der Erreichung von Geschäftszielen. \r\n\r\nDie Architekturmuster und die Produktlinie
    wurden dazu genutzt, ein Modellierungsframework zu entwickeln und in Form eines
    Prototypen umzusetzen, welches einen Entwurfsprozess, eine Modellierungssprache
    und eine Architekturanalysetechnik umfasst. Es erleichtert das Modellieren, Analysieren
    und Vergleichen von Ökosystemarchitekturen.\r\n\r\nDie Ergebnisse der Dissertation
    wurden im Rahmen von zwei Studien evaluiert. In der ersten Validierungsstudie
    wurden das Framework sowie der Prototyp verwendet, um zwei alternative Ökosystemarchitekturen
    zu entwerfen und zu analysieren. In der zweiten Studie wurde eine Analyse von
    existierenden Ökosystemen basierend auf den architektonischen Variabilitäten des
    Frameworks durchgeführt."
author:
- first_name: Bahar
  full_name: Schwichtenberg, Bahar
  id: '36399'
  last_name: Schwichtenberg
citation:
  ama: Schwichtenberg B. <i>Modeling and Analyzing Software Ecosystems</i>.; 2021.
    doi:<a href="https://doi.org/10.17619/UNIPB/1-1270 ">10.17619/UNIPB/1-1270 </a>
  apa: Schwichtenberg, B. (2021). <i>Modeling and Analyzing Software Ecosystems</i>.
    <a href="https://doi.org/10.17619/UNIPB/1-1270 ">https://doi.org/10.17619/UNIPB/1-1270
    </a>
  bibtex: '@book{Schwichtenberg_2021, title={Modeling and Analyzing Software Ecosystems},
    DOI={<a href="https://doi.org/10.17619/UNIPB/1-1270 ">10.17619/UNIPB/1-1270 </a>},
    author={Schwichtenberg, Bahar}, year={2021} }'
  chicago: Schwichtenberg, Bahar. <i>Modeling and Analyzing Software Ecosystems</i>,
    2021. <a href="https://doi.org/10.17619/UNIPB/1-1270 ">https://doi.org/10.17619/UNIPB/1-1270
    </a>.
  ieee: B. Schwichtenberg, <i>Modeling and Analyzing Software Ecosystems</i>. 2021.
  mla: Schwichtenberg, Bahar. <i>Modeling and Analyzing Software Ecosystems</i>. 2021,
    doi:<a href="https://doi.org/10.17619/UNIPB/1-1270 ">10.17619/UNIPB/1-1270 </a>.
  short: B. Schwichtenberg, Modeling and Analyzing Software Ecosystems, 2021.
date_created: 2021-12-13T07:20:33Z
date_updated: 2022-12-30T22:15:37Z
ddc:
- '000'
department:
- _id: '66'
doi: '10.17619/UNIPB/1-1270 '
file:
- access_level: closed
  content_type: application/pdf
  creator: bahareh
  date_created: 2022-12-30T22:15:15Z
  date_updated: 2022-12-30T22:15:15Z
  file_id: '35069'
  file_name: Bahar_Schwichtenberg_Thesis.pdf
  file_size: 9125342
  relation: main_file
  success: 1
file_date_updated: 2022-12-30T22:15:15Z
has_accepted_license: '1'
keyword:
- Enterprise Architecture
- Architectural Design Decisions
- Open Platforms
language:
- iso: eng
project:
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
- _id: '1'
  name: 'SFB 901: SFB 901'
status: public
supervisor:
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
title: Modeling and Analyzing Software Ecosystems
type: dissertation
user_id: '36399'
year: '2021'
...
---
_id: '29566'
author:
- first_name: Jan
  full_name: Bobolz, Jan
  id: '27207'
  last_name: Bobolz
- first_name: Fabian
  full_name: Eidens, Fabian
  id: '25078'
  last_name: Eidens
- first_name: Stephan
  full_name: Krenn, Stephan
  last_name: Krenn
- first_name: Sebastian
  full_name: Ramacher, Sebastian
  last_name: Ramacher
- first_name: Kai
  full_name: Samelin, Kai
  last_name: Samelin
citation:
  ama: 'Bobolz J, Eidens F, Krenn S, Ramacher S, Samelin K. Issuer-Hiding Attribute-Based
    Credentials. In: <i>Cryptology and Network Security</i>. Springer International
    Publishing; 2021. doi:<a href="https://doi.org/10.1007/978-3-030-92548-2_9">10.1007/978-3-030-92548-2_9</a>'
  apa: Bobolz, J., Eidens, F., Krenn, S., Ramacher, S., &#38; Samelin, K. (2021).
    Issuer-Hiding Attribute-Based Credentials. <i>Cryptology and Network Security</i>.
    <a href="https://doi.org/10.1007/978-3-030-92548-2_9">https://doi.org/10.1007/978-3-030-92548-2_9</a>
  bibtex: '@inproceedings{Bobolz_Eidens_Krenn_Ramacher_Samelin_2021, place={Cham},
    title={Issuer-Hiding Attribute-Based Credentials}, DOI={<a href="https://doi.org/10.1007/978-3-030-92548-2_9">10.1007/978-3-030-92548-2_9</a>},
    booktitle={Cryptology and Network Security}, publisher={Springer International
    Publishing}, author={Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Ramacher,
    Sebastian and Samelin, Kai}, year={2021} }'
  chicago: 'Bobolz, Jan, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, and Kai
    Samelin. “Issuer-Hiding Attribute-Based Credentials.” In <i>Cryptology and Network
    Security</i>. Cham: Springer International Publishing, 2021. <a href="https://doi.org/10.1007/978-3-030-92548-2_9">https://doi.org/10.1007/978-3-030-92548-2_9</a>.'
  ieee: 'J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, and K. Samelin, “Issuer-Hiding
    Attribute-Based Credentials,” 2021, doi: <a href="https://doi.org/10.1007/978-3-030-92548-2_9">10.1007/978-3-030-92548-2_9</a>.'
  mla: Bobolz, Jan, et al. “Issuer-Hiding Attribute-Based Credentials.” <i>Cryptology
    and Network Security</i>, Springer International Publishing, 2021, doi:<a href="https://doi.org/10.1007/978-3-030-92548-2_9">10.1007/978-3-030-92548-2_9</a>.
  short: 'J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, K. Samelin, in: Cryptology
    and Network Security, Springer International Publishing, Cham, 2021.'
date_created: 2022-01-27T13:00:21Z
date_updated: 2022-01-27T13:02:23Z
department:
- _id: '7'
- _id: '64'
doi: 10.1007/978-3-030-92548-2_9
language:
- iso: eng
place: Cham
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
publication: Cryptology and Network Security
publication_identifier:
  isbn:
  - '9783030925475'
  - '9783030925482'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Issuer-Hiding Attribute-Based Credentials
type: conference
user_id: '27207'
year: '2021'
...
---
_id: '21813'
author:
- first_name: Tim
  full_name: Hansmeier, Tim
  id: '49992'
  last_name: Hansmeier
  orcid: 0000-0003-1377-3339
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: 'Hansmeier T, Platzner M. An Experimental Comparison of Explore/Exploit Strategies
    for the Learning Classifier System XCS. In: <i>GECCO ’21: Proceedings of the Genetic
    and Evolutionary Computation Conference Companion</i>. Association for Computing
    Machinery (ACM); 2021:1639–1647. doi:<a href="https://doi.org/10.1145/3449726.3463159">10.1145/3449726.3463159</a>'
  apa: 'Hansmeier, T., &#38; Platzner, M. (2021). An Experimental Comparison of Explore/Exploit
    Strategies for the Learning Classifier System XCS. <i>GECCO ’21: Proceedings of
    the Genetic and Evolutionary Computation Conference Companion</i>, 1639–1647.
    <a href="https://doi.org/10.1145/3449726.3463159">https://doi.org/10.1145/3449726.3463159</a>'
  bibtex: '@inproceedings{Hansmeier_Platzner_2021, place={New York, NY, United States},
    title={An Experimental Comparison of Explore/Exploit Strategies for the Learning
    Classifier System XCS}, DOI={<a href="https://doi.org/10.1145/3449726.3463159">10.1145/3449726.3463159</a>},
    booktitle={GECCO ’21: Proceedings of the Genetic and Evolutionary Computation
    Conference Companion}, publisher={Association for Computing Machinery (ACM)},
    author={Hansmeier, Tim and Platzner, Marco}, year={2021}, pages={1639–1647} }'
  chicago: 'Hansmeier, Tim, and Marco Platzner. “An Experimental Comparison of Explore/Exploit
    Strategies for the Learning Classifier System XCS.” In <i>GECCO ’21: Proceedings
    of the Genetic and Evolutionary Computation Conference Companion</i>, 1639–1647.
    New York, NY, United States: Association for Computing Machinery (ACM), 2021.
    <a href="https://doi.org/10.1145/3449726.3463159">https://doi.org/10.1145/3449726.3463159</a>.'
  ieee: 'T. Hansmeier and M. Platzner, “An Experimental Comparison of Explore/Exploit
    Strategies for the Learning Classifier System XCS,” in <i>GECCO ’21: Proceedings
    of the Genetic and Evolutionary Computation Conference Companion</i>, Lille, France,
    2021, pp. 1639–1647, doi: <a href="https://doi.org/10.1145/3449726.3463159">10.1145/3449726.3463159</a>.'
  mla: 'Hansmeier, Tim, and Marco Platzner. “An Experimental Comparison of Explore/Exploit
    Strategies for the Learning Classifier System XCS.” <i>GECCO ’21: Proceedings
    of the Genetic and Evolutionary Computation Conference Companion</i>, Association
    for Computing Machinery (ACM), 2021, pp. 1639–1647, doi:<a href="https://doi.org/10.1145/3449726.3463159">10.1145/3449726.3463159</a>.'
  short: 'T. Hansmeier, M. Platzner, in: GECCO ’21: Proceedings of the Genetic and
    Evolutionary Computation Conference Companion, Association for Computing Machinery
    (ACM), New York, NY, United States, 2021, pp. 1639–1647.'
conference:
  end_date: 2021-07-14
  location: Lille, France
  name: International Workshop on Learning Classifier Systems (IWLCS 2021)
  start_date: 2021-07-10
date_created: 2021-04-28T09:08:17Z
date_updated: 2022-09-02T09:42:38Z
department:
- _id: '78'
doi: 10.1145/3449726.3463159
language:
- iso: eng
page: 1639–1647
place: New York, NY, United States
project:
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '1'
  name: SFB 901
- _id: '14'
  name: SFB 901 - Subproject C2
publication: 'GECCO ''21: Proceedings of the Genetic and Evolutionary Computation
  Conference Companion'
publication_identifier:
  isbn:
  - 978-1-4503-8351-6
publication_status: published
publisher: Association for Computing Machinery (ACM)
status: public
title: An Experimental Comparison of Explore/Exploit Strategies for the Learning Classifier
  System XCS
type: conference
user_id: '49992'
year: '2021'
...
---
_id: '35889'
abstract:
- lang: eng
  text: Network and service coordination is important to provide modern services consisting
    of multiple interconnected components, e.g., in 5G, network function virtualization
    (NFV), or cloud and edge computing. In this paper, I outline my dissertation research,
    which proposes six approaches to automate such network and service coordination.
    All approaches dynamically react to the current demand and optimize coordination
    for high service quality and low costs. The approaches range from centralized
    to distributed methods and from conventional heuristic algorithms and mixed-integer
    linear programs to machine learning approaches using supervised and reinforcement
    learning. I briefly discuss their main ideas and advantages over other state-of-the-art
    approaches and compare strengths and weaknesses.
author:
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
citation:
  ama: Schneider SB. <i>Conventional and Machine Learning Approaches for Network and
    Service Coordination</i>.; 2021.
  apa: Schneider, S. B. (2021). <i>Conventional and Machine Learning Approaches for
    Network and Service Coordination</i>.
  bibtex: '@book{Schneider_2021, title={Conventional and Machine Learning Approaches
    for Network and Service Coordination}, author={Schneider, Stefan Balthasar}, year={2021}
    }'
  chicago: Schneider, Stefan Balthasar. <i>Conventional and Machine Learning Approaches
    for Network and Service Coordination</i>, 2021.
  ieee: S. B. Schneider, <i>Conventional and Machine Learning Approaches for Network
    and Service Coordination</i>. 2021.
  mla: Schneider, Stefan Balthasar. <i>Conventional and Machine Learning Approaches
    for Network and Service Coordination</i>. 2021.
  short: S.B. Schneider, Conventional and Machine Learning Approaches for Network
    and Service Coordination, 2021.
date_created: 2023-01-10T15:08:50Z
date_updated: 2023-01-10T15:09:05Z
ddc:
- '004'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2023-01-10T15:07:03Z
  date_updated: 2023-01-10T15:07:03Z
  file_id: '35890'
  file_name: main.pdf
  file_size: 133340
  relation: main_file
file_date_updated: 2023-01-10T15:07:03Z
has_accepted_license: '1'
keyword:
- nfv
- coordination
- machine learning
- reinforcement learning
- phd
- digest
language:
- iso: eng
oa: '1'
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
status: public
title: Conventional and Machine Learning Approaches for Network and Service Coordination
type: working_paper
user_id: '35343'
year: '2021'
...
---
_id: '17860'
abstract:
- lang: eng
  text: "Purpose\r\nThe purpose of this paper is to identify strategic options and
    challenges that arise when an industrial firm moves from providing smart service
    toward providing a platform.\r\n\r\nDesign/methodology/approach\r\nThis conceptual
    study takes on a multidisciplinary research perspective that integrates concepts,
    theories and insights from service management and marketing, information systems
    and platform economics.\r\n\r\nFindings\r\nThe paper outlines three platform types
    – smart data platform, smart product platform and matching platform – as strategic
    options for firms that wish to evolve from smart service providers to platform
    providers.\r\n\r\nResearch limitations/implications\r\nInvestigating smart service
    platforms calls for launching interdisciplinary research initiatives. Promising
    research avenues are outlined to span boundaries that separate different research
    disciplines today.\r\n\r\nPractical implications\r\nManaging a successful transition
    from providing smart service toward providing a platform requires making significant
    investments in IT, platform-related capabilities and skills, as well as implement
    new approaches toward relationship management and brand-building.\r\n\r\nOriginality/value\r\nThe
    findings described in this paper are valuable to researchers in multiple disciplines
    seeking to develop and to justify theory related to platforms in industrial scenarios."
article_type: original
author:
- first_name: Daniel
  full_name: Beverungen, Daniel
  id: '59677'
  last_name: Beverungen
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
- first_name: Nancy
  full_name: Wünderlich, Nancy
  id: '36392'
  last_name: Wünderlich
citation:
  ama: 'Beverungen D, Kundisch D, Wünderlich N. Transforming into a Platform Provider:
    Strategic Options for Industrial Smart Service Providers. <i>Journal of Service
    Management</i>. 2021;32(4):507-532. doi:<a href="https://doi.org/10.1108/JOSM-03-2020-0066">10.1108/JOSM-03-2020-0066</a>'
  apa: 'Beverungen, D., Kundisch, D., &#38; Wünderlich, N. (2021). Transforming into
    a Platform Provider: Strategic Options for Industrial Smart Service Providers.
    <i>Journal of Service Management</i>, <i>32</i>(4), 507–532. <a href="https://doi.org/10.1108/JOSM-03-2020-0066">https://doi.org/10.1108/JOSM-03-2020-0066</a>'
  bibtex: '@article{Beverungen_Kundisch_Wünderlich_2021, title={Transforming into
    a Platform Provider: Strategic Options for Industrial Smart Service Providers},
    volume={32}, DOI={<a href="https://doi.org/10.1108/JOSM-03-2020-0066">10.1108/JOSM-03-2020-0066</a>},
    number={4}, journal={Journal of Service Management}, publisher={Emerald Insight},
    author={Beverungen, Daniel and Kundisch, Dennis and Wünderlich, Nancy}, year={2021},
    pages={507–532} }'
  chicago: 'Beverungen, Daniel, Dennis Kundisch, and Nancy Wünderlich. “Transforming
    into a Platform Provider: Strategic Options for Industrial Smart Service Providers.”
    <i>Journal of Service Management</i> 32, no. 4 (2021): 507–32. <a href="https://doi.org/10.1108/JOSM-03-2020-0066">https://doi.org/10.1108/JOSM-03-2020-0066</a>.'
  ieee: 'D. Beverungen, D. Kundisch, and N. Wünderlich, “Transforming into a Platform
    Provider: Strategic Options for Industrial Smart Service Providers,” <i>Journal
    of Service Management</i>, vol. 32, no. 4, pp. 507–532, 2021, doi: <a href="https://doi.org/10.1108/JOSM-03-2020-0066">10.1108/JOSM-03-2020-0066</a>.'
  mla: 'Beverungen, Daniel, et al. “Transforming into a Platform Provider: Strategic
    Options for Industrial Smart Service Providers.” <i>Journal of Service Management</i>,
    vol. 32, no. 4, Emerald Insight, 2021, pp. 507–32, doi:<a href="https://doi.org/10.1108/JOSM-03-2020-0066">10.1108/JOSM-03-2020-0066</a>.'
  short: D. Beverungen, D. Kundisch, N. Wünderlich, Journal of Service Management
    32 (2021) 507–532.
date_created: 2020-08-12T12:12:36Z
date_updated: 2024-04-18T12:46:37Z
ddc:
- '380'
department:
- _id: '276'
- _id: '181'
doi: 10.1108/JOSM-03-2020-0066
intvolume: '        32'
issue: '4'
keyword:
- Smart service
- Platform
- Interdisciplinary research
- Manufacturing company
- Smart service provider
- Platform economics
- Information systems
- Multi-sided markets
- Business-to-business (B2B) markets
language:
- iso: eng
page: 507-532
project:
- _id: '1'
  grant_number: '160364472'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
publication: Journal of Service Management
publication_identifier:
  issn:
  - 507-532
publication_status: published
publisher: Emerald Insight
quality_controlled: '1'
status: public
title: 'Transforming into a Platform Provider: Strategic Options for Industrial Smart
  Service Providers'
type: journal_article
user_id: '59677'
volume: 32
year: '2021'
...
---
_id: '45236'
author:
- first_name: N.
  full_name: N., N.
  last_name: N.
citation:
  ama: N. N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>.;
    2021.
  apa: N., N. (2021). <i>Design and Implementation of a Crowd-based Prototype Validation
    Platform</i>.
  bibtex: '@book{N._2021, title={Design and Implementation of a Crowd-based Prototype
    Validation Platform}, author={N., N.}, year={2021} }'
  chicago: N., N. <i>Design and Implementation of a Crowd-Based Prototype Validation
    Platform</i>, 2021.
  ieee: N. N., <i>Design and Implementation of a Crowd-based Prototype Validation
    Platform</i>. 2021.
  mla: N., N. <i>Design and Implementation of a Crowd-Based Prototype Validation Platform</i>.
    2021.
  short: N. N., Design and Implementation of a Crowd-Based Prototype Validation Platform,
    2021.
date_created: 2023-05-23T13:09:53Z
date_updated: 2023-05-23T13:09:58Z
department:
- _id: '66'
language:
- iso: eng
project:
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '17'
  name: 'SFB 901 - C5: SFB 901 - Subproject C5'
status: public
supervisor:
- first_name: Enes
  full_name: Yigitbas, Enes
  id: '8447'
  last_name: Yigitbas
  orcid: 0000-0002-5967-833X
- first_name: Sebastian
  full_name: Gottschalk, Sebastian
  id: '47208'
  last_name: Gottschalk
title: Design and Implementation of a Crowd-based Prototype Validation Platform
type: mastersthesis
user_id: '47208'
year: '2021'
...
---
_id: '45239'
author:
- first_name: N.
  full_name: N., N.
  last_name: N.
citation:
  ama: N. N. <i>Lightweight Process Engine for Situation-Specific Development of Business
    Models for Digital Platforms</i>.; 2021.
  apa: N., N. (2021). <i>Lightweight Process Engine for Situation-specific Development
    of Business Models for Digital Platforms</i>.
  bibtex: '@book{N._2021, title={Lightweight Process Engine for Situation-specific
    Development of Business Models for Digital Platforms}, author={N., N.}, year={2021}
    }'
  chicago: N., N. <i>Lightweight Process Engine for Situation-Specific Development
    of Business Models for Digital Platforms</i>, 2021.
  ieee: N. N., <i>Lightweight Process Engine for Situation-specific Development of
    Business Models for Digital Platforms</i>. 2021.
  mla: N., N. <i>Lightweight Process Engine for Situation-Specific Development of
    Business Models for Digital Platforms</i>. 2021.
  short: N. N., Lightweight Process Engine for Situation-Specific Development of Business
    Models for Digital Platforms, 2021.
date_created: 2023-05-23T13:12:55Z
date_updated: 2023-05-23T13:13:13Z
department:
- _id: '66'
language:
- iso: eng
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '17'
  name: 'SFB 901 - C5: SFB 901 - Subproject C5'
status: public
supervisor:
- first_name: Enes
  full_name: Yigitbas, Enes
  id: '8447'
  last_name: Yigitbas
  orcid: 0000-0002-5967-833X
- first_name: Sebastian
  full_name: Gottschalk, Sebastian
  id: '47208'
  last_name: Gottschalk
title: Lightweight Process Engine for Situation-specific Development of Business Models
  for Digital Platforms
type: mastersthesis
user_id: '47208'
year: '2021'
...
---
_id: '45240'
author:
- first_name: N.
  full_name: N., N.
  last_name: N.
citation:
  ama: N. N. <i>Development and Evaluation of a Multi Platform Approach for Augmented
    Reality Product Configuration</i>.; 2021.
  apa: N., N. (2021). <i>Development and Evaluation of a Multi Platform Approach for
    Augmented Reality Product Configuration</i>.
  bibtex: '@book{N._2021, title={Development and Evaluation of a Multi Platform Approach
    for Augmented Reality Product Configuration}, author={N., N.}, year={2021} }'
  chicago: N., N. <i>Development and Evaluation of a Multi Platform Approach for Augmented
    Reality Product Configuration</i>, 2021.
  ieee: N. N., <i>Development and Evaluation of a Multi Platform Approach for Augmented
    Reality Product Configuration</i>. 2021.
  mla: N., N. <i>Development and Evaluation of a Multi Platform Approach for Augmented
    Reality Product Configuration</i>. 2021.
  short: N. N., Development and Evaluation of a Multi Platform Approach for Augmented
    Reality Product Configuration, 2021.
date_created: 2023-05-23T13:14:14Z
date_updated: 2023-05-23T13:14:18Z
department:
- _id: '66'
language:
- iso: eng
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '17'
  name: 'SFB 901 - C5: SFB 901 - Subproject C5'
status: public
supervisor:
- first_name: Enes
  full_name: Yigitbas, Enes
  id: '8447'
  last_name: Yigitbas
  orcid: 0000-0002-5967-833X
- first_name: Sebastian
  full_name: Gottschalk, Sebastian
  id: '47208'
  last_name: Gottschalk
title: Development and Evaluation of a Multi Platform Approach for Augmented Reality
  Product Configuration
type: bachelorsthesis
user_id: '47208'
year: '2021'
...
---
_id: '45238'
author:
- first_name: N.
  full_name: N., N.
  last_name: N.
citation:
  ama: N. N. <i>Model-Based Feature Backlog Synchronization for Dual-Track Development
    Methods</i>.; 2021.
  apa: N., N. (2021). <i>Model-based Feature Backlog Synchronization for Dual-Track
    Development Methods</i>.
  bibtex: '@book{N._2021, title={Model-based Feature Backlog Synchronization for Dual-Track
    Development Methods}, author={N., N.}, year={2021} }'
  chicago: N., N. <i>Model-Based Feature Backlog Synchronization for Dual-Track Development
    Methods</i>, 2021.
  ieee: N. N., <i>Model-based Feature Backlog Synchronization for Dual-Track Development
    Methods</i>. 2021.
  mla: N., N. <i>Model-Based Feature Backlog Synchronization for Dual-Track Development
    Methods</i>. 2021.
  short: N. N., Model-Based Feature Backlog Synchronization for Dual-Track Development
    Methods, 2021.
date_created: 2023-05-23T13:11:44Z
date_updated: 2023-05-23T13:11:48Z
department:
- _id: '66'
language:
- iso: eng
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '17'
  name: 'SFB 901 - C5: SFB 901 - Subproject C5'
status: public
title: Model-based Feature Backlog Synchronization for Dual-Track Development Methods
type: mastersthesis
user_id: '47208'
year: '2021'
...
---
_id: '24884'
author:
- first_name: Daniel
  full_name: Szopinski, Daniel
  last_name: Szopinski
citation:
  ama: 'Szopinski D. <i>Essays on Modeling Languages and Software Tools for Business
    Model Innovation: Theory and Empirical Evidence</i>.; 2021. doi:<a href="https://doi.org/10.17619/UNIPB/1-1647
    ">10.17619/UNIPB/1-1647 </a>'
  apa: 'Szopinski, D. (2021). <i>Essays on Modeling Languages and Software Tools for
    Business Model Innovation: Theory and Empirical Evidence</i>. <a href="https://doi.org/10.17619/UNIPB/1-1647
    ">https://doi.org/10.17619/UNIPB/1-1647 </a>'
  bibtex: '@book{Szopinski_2021, title={Essays on Modeling Languages and Software
    Tools for Business Model Innovation: Theory and Empirical Evidence}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-1647
    ">10.17619/UNIPB/1-1647 </a>}, author={Szopinski, Daniel}, year={2021} }'
  chicago: 'Szopinski, Daniel. <i>Essays on Modeling Languages and Software Tools
    for Business Model Innovation: Theory and Empirical Evidence</i>, 2021. <a href="https://doi.org/10.17619/UNIPB/1-1647
    ">https://doi.org/10.17619/UNIPB/1-1647 </a>.'
  ieee: 'D. Szopinski, <i>Essays on Modeling Languages and Software Tools for Business
    Model Innovation: Theory and Empirical Evidence</i>. 2021.'
  mla: 'Szopinski, Daniel. <i>Essays on Modeling Languages and Software Tools for
    Business Model Innovation: Theory and Empirical Evidence</i>. 2021, doi:<a href="https://doi.org/10.17619/UNIPB/1-1647
    ">10.17619/UNIPB/1-1647 </a>.'
  short: 'D. Szopinski, Essays on Modeling Languages and Software Tools for Business
    Model Innovation: Theory and Empirical Evidence, 2021.'
date_created: 2021-09-22T12:24:00Z
date_updated: 2023-06-27T05:15:21Z
department:
- _id: '276'
doi: '10.17619/UNIPB/1-1647 '
language:
- iso: eng
project:
- _id: '1'
  grant_number: '160364472'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
status: public
supervisor:
- first_name: Dennis
  full_name: Kundisch, Dennis
  last_name: Kundisch
title: 'Essays on Modeling Languages and Software Tools for Business Model Innovation:
  Theory and Empirical Evidence'
type: dissertation
user_id: '15504'
year: '2021'
...
---
_id: '19551'
author:
- first_name: Rafael
  full_name: Kurek, Rafael
  last_name: Kurek
citation:
  ama: 'Kurek R. Efficient Forward-Secure Threshold Public Key Encryption. In: K.
    Liu J, Cui H, eds. <i>Information Security and Privacy - 25th Australasian Conference,
    {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>.
    Vol 12248. Lecture Notes in Computer Science. Springer; 2020:330-349. doi:<a href="https://doi.org/10.1007/978-3-030-55304-3\_17">10.1007/978-3-030-55304-3\_17</a>'
  apa: Kurek, R. (2020). Efficient Forward-Secure Threshold Public Key Encryption.
    In J. K. Liu &#38; H. Cui (Eds.), <i>Information Security and Privacy - 25th Australasian
    Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020,
    Proceedings</i> (Vol. 12248, pp. 330–349). Springer. <a href="https://doi.org/10.1007/978-3-030-55304-3\_17">https://doi.org/10.1007/978-3-030-55304-3\_17</a>
  bibtex: '@inproceedings{Kurek_2020, series={Lecture Notes in Computer Science},
    title={Efficient Forward-Secure Threshold Public Key Encryption}, volume={12248},
    DOI={<a href="https://doi.org/10.1007/978-3-030-55304-3\_17">10.1007/978-3-030-55304-3\_17</a>},
    booktitle={Information Security and Privacy - 25th Australasian Conference, {ACISP}
    2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, publisher={Springer},
    author={Kurek, Rafael}, editor={K. Liu, Joseph and Cui, HuiEditors}, year={2020},
    pages={330–349}, collection={Lecture Notes in Computer Science} }'
  chicago: Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.”
    In <i>Information Security and Privacy - 25th Australasian Conference, {ACISP}
    2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, edited
    by Joseph K. Liu and Hui Cui, 12248:330–49. Lecture Notes in Computer Science.
    Springer, 2020. <a href="https://doi.org/10.1007/978-3-030-55304-3\_17">https://doi.org/10.1007/978-3-030-55304-3\_17</a>.
  ieee: R. Kurek, “Efficient Forward-Secure Threshold Public Key Encryption,” in <i>Information
    Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA,
    Australia, November 30 - December 2, 2020, Proceedings</i>, 2020, vol. 12248,
    pp. 330–349.
  mla: Kurek, Rafael. “Efficient Forward-Secure Threshold Public Key Encryption.”
    <i>Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020,
    Perth, WA, Australia, November 30 - December 2, 2020, Proceedings</i>, edited
    by Joseph K. Liu and Hui Cui, vol. 12248, Springer, 2020, pp. 330–49, doi:<a href="https://doi.org/10.1007/978-3-030-55304-3\_17">10.1007/978-3-030-55304-3\_17</a>.
  short: 'R. Kurek, in: J. K. Liu, H. Cui (Eds.), Information Security and Privacy
    - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30
    - December 2, 2020, Proceedings, Springer, 2020, pp. 330–349.'
date_created: 2020-09-18T05:59:11Z
date_updated: 2022-01-06T06:54:07Z
doi: 10.1007/978-3-030-55304-3\_17
editor:
- first_name: Joseph
  full_name: K. Liu, Joseph
  last_name: K. Liu
- first_name: Hui
  full_name: Cui, Hui
  last_name: Cui
intvolume: '     12248'
language:
- iso: eng
page: 330-349
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
publication: Information Security and Privacy - 25th Australasian Conference, {ACISP}
  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: Efficient Forward-Secure Threshold Public Key Encryption
type: conference
user_id: '15504'
volume: 12248
year: '2020'
...
---
_id: '19553'
author:
- first_name: Rafael
  full_name: Kurek, Rafael
  last_name: Kurek
citation:
  ama: 'Kurek R. Efficient Forward-Secure Threshold Signatures. In: Aoki K, Kanaoka
    A, eds. <i>Advances in Information and Computer Security - 15th International
    Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>.
    Vol 12231. Lecture Notes in Computer Science. Springer; 2020:239-260. doi:<a href="https://doi.org/10.1007/978-3-030-58208-1\_14">10.1007/978-3-030-58208-1\_14</a>'
  apa: Kurek, R. (2020). Efficient Forward-Secure Threshold Signatures. In K. Aoki
    &#38; A. Kanaoka (Eds.), <i>Advances in Information and Computer Security - 15th
    International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4,
    2020, Proceedings</i> (Vol. 12231, pp. 239–260). Springer. <a href="https://doi.org/10.1007/978-3-030-58208-1\_14">https://doi.org/10.1007/978-3-030-58208-1\_14</a>
  bibtex: '@inproceedings{Kurek_2020, series={Lecture Notes in Computer Science},
    title={Efficient Forward-Secure Threshold Signatures}, volume={12231}, DOI={<a
    href="https://doi.org/10.1007/978-3-030-58208-1\_14">10.1007/978-3-030-58208-1\_14</a>},
    booktitle={Advances in Information and Computer Security - 15th International
    Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings},
    publisher={Springer}, author={Kurek, Rafael}, editor={Aoki, Kazumaro and Kanaoka,
    AkiraEditors}, year={2020}, pages={239–260}, collection={Lecture Notes in Computer
    Science} }'
  chicago: Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” In <i>Advances
    in Information and Computer Security - 15th International Workshop on Security,
    {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, edited by Kazumaro
    Aoki and Akira Kanaoka, 12231:239–60. Lecture Notes in Computer Science. Springer,
    2020. <a href="https://doi.org/10.1007/978-3-030-58208-1\_14">https://doi.org/10.1007/978-3-030-58208-1\_14</a>.
  ieee: R. Kurek, “Efficient Forward-Secure Threshold Signatures,” in <i>Advances
    in Information and Computer Security - 15th International Workshop on Security,
    {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, 2020, vol. 12231,
    pp. 239–260.
  mla: Kurek, Rafael. “Efficient Forward-Secure Threshold Signatures.” <i>Advances
    in Information and Computer Security - 15th International Workshop on Security,
    {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings</i>, edited by Kazumaro
    Aoki and Akira Kanaoka, vol. 12231, Springer, 2020, pp. 239–60, doi:<a href="https://doi.org/10.1007/978-3-030-58208-1\_14">10.1007/978-3-030-58208-1\_14</a>.
  short: 'R. Kurek, in: K. Aoki, A. Kanaoka (Eds.), Advances in Information and Computer
    Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan,
    September 2-4, 2020, Proceedings, Springer, 2020, pp. 239–260.'
date_created: 2020-09-18T06:00:42Z
date_updated: 2022-01-06T06:54:07Z
doi: 10.1007/978-3-030-58208-1\_14
editor:
- first_name: Kazumaro
  full_name: Aoki, Kazumaro
  last_name: Aoki
- first_name: Akira
  full_name: Kanaoka, Akira
  last_name: Kanaoka
intvolume: '     12231'
language:
- iso: eng
page: 239-260
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
publication: Advances in Information and Computer Security - 15th International Workshop
  on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: Efficient Forward-Secure Threshold Signatures
type: conference
user_id: '15504'
volume: 12231
year: '2020'
...
---
_id: '19606'
abstract:
- lang: eng
  text: Mobile shopping apps have been using Augmented Reality (AR) in the last years
    to place their products in the environment of the customer. While this is possible
    with atomic 3D objects, there is is still a lack in the runtime conﬁguration of
    3D object compositions based on user needs and environmental constraints. For
    this, we previously developed an approach for model-based AR-assisted product
    conﬁguration based on the concept of Dynamic Software Product Lines. In this demonstration
    paper, we present the corresponding tool support ProConAR in the form of a Product
    Modeler and a Product Conﬁgurator. While the Product Modeler is an Angular web
    app that splits products (e.g. table) up into atomic parts (e.g. tabletop, table
    legs, funnier) and saves it within a conﬁguration model, the Product Conﬁgurator
    is an Android client that uses the conﬁguration model to place diﬀerent product
    conﬁgurations within the environment of the customer. We show technical details
    of our ready to use tool-chain ProConAR by describing its implementation and usage
    as well as pointing out future research directions.
author:
- first_name: Sebastian
  full_name: Gottschalk, Sebastian
  id: '47208'
  last_name: Gottschalk
- first_name: Enes
  full_name: Yigitbas, Enes
  id: '8447'
  last_name: Yigitbas
  orcid: 0000-0002-5967-833X
- first_name: Eugen
  full_name: Schmidt, Eugen
  last_name: Schmidt
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
citation:
  ama: 'Gottschalk S, Yigitbas E, Schmidt E, Engels G. ProConAR: A Tool Support for
    Model-based AR Product Configuration. In: Bernhaupt R, Ardito C, Sauer S, eds.
    <i>Human-Centered Software Engineering. HCSE 2020</i>. Vol 12481. Lecture Notes
    in Computer Science. Cham: Springer; 2020. doi:<a href="https://doi.org/10.1007/978-3-030-64266-2_14">10.1007/978-3-030-64266-2_14</a>'
  apa: 'Gottschalk, S., Yigitbas, E., Schmidt, E., &#38; Engels, G. (2020). ProConAR:
    A Tool Support for Model-based AR Product Configuration. In R. Bernhaupt, C. Ardito,
    &#38; S. Sauer (Eds.), <i>Human-Centered Software Engineering. HCSE 2020</i> (Vol.
    12481). Cham: Springer. <a href="https://doi.org/10.1007/978-3-030-64266-2_14">https://doi.org/10.1007/978-3-030-64266-2_14</a>'
  bibtex: '@inproceedings{Gottschalk_Yigitbas_Schmidt_Engels_2020, place={Cham}, series={Lecture
    Notes in Computer Science}, title={ProConAR: A Tool Support for Model-based AR
    Product Configuration}, volume={12481}, DOI={<a href="https://doi.org/10.1007/978-3-030-64266-2_14">10.1007/978-3-030-64266-2_14</a>},
    booktitle={Human-Centered Software Engineering. HCSE 2020}, publisher={Springer},
    author={Gottschalk, Sebastian and Yigitbas, Enes and Schmidt, Eugen and Engels,
    Gregor}, editor={Bernhaupt, Regina and Ardito, Carmelo and Sauer, StefanEditors},
    year={2020}, collection={Lecture Notes in Computer Science} }'
  chicago: 'Gottschalk, Sebastian, Enes Yigitbas, Eugen Schmidt, and Gregor Engels.
    “ProConAR: A Tool Support for Model-Based AR Product Configuration.” In <i>Human-Centered
    Software Engineering. HCSE 2020</i>, edited by Regina Bernhaupt, Carmelo Ardito,
    and Stefan Sauer, Vol. 12481. Lecture Notes in Computer Science. Cham: Springer,
    2020. <a href="https://doi.org/10.1007/978-3-030-64266-2_14">https://doi.org/10.1007/978-3-030-64266-2_14</a>.'
  ieee: 'S. Gottschalk, E. Yigitbas, E. Schmidt, and G. Engels, “ProConAR: A Tool
    Support for Model-based AR Product Configuration,” in <i>Human-Centered Software
    Engineering. HCSE 2020</i>, Eindhoven, 2020, vol. 12481.'
  mla: 'Gottschalk, Sebastian, et al. “ProConAR: A Tool Support for Model-Based AR
    Product Configuration.” <i>Human-Centered Software Engineering. HCSE 2020</i>,
    edited by Regina Bernhaupt et al., vol. 12481, Springer, 2020, doi:<a href="https://doi.org/10.1007/978-3-030-64266-2_14">10.1007/978-3-030-64266-2_14</a>.'
  short: 'S. Gottschalk, E. Yigitbas, E. Schmidt, G. Engels, in: R. Bernhaupt, C.
    Ardito, S. Sauer (Eds.), Human-Centered Software Engineering. HCSE 2020, Springer,
    Cham, 2020.'
conference:
  end_date: 2020-12-02
  location: Eindhoven
  name: 8th International Working Conference on Human-Centered Software Engineering
    (HCSE'20)
  start_date: 2020-11-30
date_created: 2020-09-21T17:01:11Z
date_updated: 2022-01-06T06:54:07Z
ddc:
- '000'
department:
- _id: '66'
- _id: '534'
doi: 10.1007/978-3-030-64266-2_14
editor:
- first_name: Regina
  full_name: Bernhaupt, Regina
  last_name: Bernhaupt
- first_name: Carmelo
  full_name: Ardito, Carmelo
  last_name: Ardito
- first_name: Stefan
  full_name: Sauer, Stefan
  last_name: Sauer
file:
- access_level: open_access
  content_type: application/pdf
  creator: sego
  date_created: 2020-11-30T08:39:18Z
  date_updated: 2020-11-30T08:39:18Z
  file_id: '20542'
  file_name: HCSE20_demo.pdf
  file_size: 3913885
  relation: main_file
file_date_updated: 2020-11-30T08:39:18Z
has_accepted_license: '1'
intvolume: '     12481'
keyword:
- Product Configuration
- Augmented Reality
- Model-based
- Tool Support
language:
- iso: eng
oa: '1'
place: Cham
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
publication: Human-Centered Software Engineering. HCSE 2020
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: 'ProConAR: A Tool Support for Model-based AR Product Configuration'
type: conference
user_id: '47208'
volume: 12481
year: '2020'
...
---
_id: '19607'
abstract:
- lang: eng
  text: "Modern services consist of modular, interconnected\r\ncomponents, e.g., microservices
    forming a service mesh. To\r\ndynamically adjust to ever-changing service demands,
    service\r\ncomponents have to be instantiated on nodes across the network.\r\nIncoming
    flows requesting a service then need to be routed\r\nthrough the deployed instances
    while considering node and link\r\ncapacities. Ultimately, the goal is to maximize
    the successfully\r\nserved flows and Quality of Service (QoS) through online service\r\ncoordination.
    Current approaches for service coordination are\r\nusually centralized, assuming
    up-to-date global knowledge and\r\nmaking global decisions for all nodes in the
    network. Such global\r\nknowledge and centralized decisions are not realistic
    in practical\r\nlarge-scale networks.\r\n\r\nTo solve this problem, we propose
    two algorithms for fully\r\ndistributed service coordination. The proposed algorithms
    can be\r\nexecuted individually at each node in parallel and require only\r\nvery
    limited global knowledge. We compare and evaluate both\r\nalgorithms with a state-of-the-art
    centralized approach in extensive\r\nsimulations on a large-scale, real-world
    network topology.\r\nOur results indicate that the two algorithms can compete
    with\r\ncentralized approaches in terms of solution quality but require\r\nless
    global knowledge and are magnitudes faster (more than\r\n100x)."
author:
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Lars Dietrich
  full_name: Klenner, Lars Dietrich
  last_name: Klenner
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Schneider SB, Klenner LD, Karl H. Every Node for Itself: Fully Distributed
    Service Coordination. In: <i>IEEE International Conference on Network and Service
    Management (CNSM)</i>. IEEE; 2020.'
  apa: 'Schneider, S. B., Klenner, L. D., &#38; Karl, H. (2020). Every Node for Itself:
    Fully Distributed Service Coordination. In <i>IEEE International Conference on
    Network and Service Management (CNSM)</i>. IEEE.'
  bibtex: '@inproceedings{Schneider_Klenner_Karl_2020, title={Every Node for Itself:
    Fully Distributed Service Coordination}, booktitle={IEEE International Conference
    on Network and Service Management (CNSM)}, publisher={IEEE}, author={Schneider,
    Stefan Balthasar and Klenner, Lars Dietrich and Karl, Holger}, year={2020} }'
  chicago: 'Schneider, Stefan Balthasar, Lars Dietrich Klenner, and Holger Karl. “Every
    Node for Itself: Fully Distributed Service Coordination.” In <i>IEEE International
    Conference on Network and Service Management (CNSM)</i>. IEEE, 2020.'
  ieee: 'S. B. Schneider, L. D. Klenner, and H. Karl, “Every Node for Itself: Fully
    Distributed Service Coordination,” in <i>IEEE International Conference on Network
    and Service Management (CNSM)</i>, 2020.'
  mla: 'Schneider, Stefan Balthasar, et al. “Every Node for Itself: Fully Distributed
    Service Coordination.” <i>IEEE International Conference on Network and Service
    Management (CNSM)</i>, IEEE, 2020.'
  short: 'S.B. Schneider, L.D. Klenner, H. Karl, in: IEEE International Conference
    on Network and Service Management (CNSM), IEEE, 2020.'
date_created: 2020-09-22T06:23:40Z
date_updated: 2022-01-06T06:54:08Z
ddc:
- '006'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2020-09-22T06:25:57Z
  date_updated: 2020-09-22T06:36:25Z
  file_id: '19608'
  file_name: ris_with_copyright.pdf
  file_size: 500948
  relation: main_file
file_date_updated: 2020-09-22T06:36:25Z
has_accepted_license: '1'
keyword:
- distributed management
- service coordination
- network coordination
- nfv
- softwarization
- orchestration
language:
- iso: eng
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE International Conference on Network and Service Management (CNSM)
publisher: IEEE
status: public
title: 'Every Node for Itself: Fully Distributed Service Coordination'
type: conference
user_id: '35343'
year: '2020'
...
---
_id: '19609'
abstract:
- lang: eng
  text: "Modern services comprise interconnected components,\r\ne.g., microservices
    in a service mesh, that can scale and\r\nrun on multiple nodes across the network
    on demand. To process\r\nincoming traffic, service components have to be instantiated
    and\r\ntraffic assigned to these instances, taking capacities and changing\r\ndemands
    into account. This challenge is usually solved with\r\ncustom approaches designed
    by experts. While this typically\r\nworks well for the considered scenario, the
    models often rely\r\non unrealistic assumptions or on knowledge that is not available\r\nin
    practice (e.g., a priori knowledge).\r\n\r\nWe propose a novel deep reinforcement
    learning approach that\r\nlearns how to best coordinate services and is geared
    towards\r\nrealistic assumptions. It interacts with the network and relies on\r\navailable,
    possibly delayed monitoring information. Rather than\r\ndefining a complex model
    or an algorithm how to achieve an\r\nobjective, our model-free approach adapts
    to various objectives\r\nand traffic patterns. An agent is trained offline without
    expert\r\nknowledge and then applied online with minimal overhead. Compared\r\nto
    a state-of-the-art heuristic, it significantly improves flow\r\nthroughput and
    overall network utility on real-world network\r\ntopologies and traffic traces.
    It also learns to optimize different\r\nobjectives, generalizes to scenarios with
    unseen, stochastic traffic\r\npatterns, and scales to large real-world networks."
author:
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Adnan
  full_name: Manzoor, Adnan
  last_name: Manzoor
- first_name: Haydar
  full_name: Qarawlus, Haydar
  last_name: Qarawlus
- first_name: Rafael
  full_name: Schellenberg, Rafael
  last_name: Schellenberg
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
- first_name: Ramin
  full_name: Khalili, Ramin
  last_name: Khalili
- first_name: Artur
  full_name: Hecker, Artur
  last_name: Hecker
citation:
  ama: 'Schneider SB, Manzoor A, Qarawlus H, et al. Self-Driving Network and Service
    Coordination Using Deep Reinforcement Learning. In: <i>IEEE International Conference
    on Network and Service Management (CNSM)</i>. IEEE; 2020.'
  apa: Schneider, S. B., Manzoor, A., Qarawlus, H., Schellenberg, R., Karl, H., Khalili,
    R., &#38; Hecker, A. (2020). Self-Driving Network and Service Coordination Using
    Deep Reinforcement Learning. In <i>IEEE International Conference on Network and
    Service Management (CNSM)</i>. IEEE.
  bibtex: '@inproceedings{Schneider_Manzoor_Qarawlus_Schellenberg_Karl_Khalili_Hecker_2020,
    title={Self-Driving Network and Service Coordination Using Deep Reinforcement
    Learning}, booktitle={IEEE International Conference on Network and Service Management
    (CNSM)}, publisher={IEEE}, author={Schneider, Stefan Balthasar and Manzoor, Adnan
    and Qarawlus, Haydar and Schellenberg, Rafael and Karl, Holger and Khalili, Ramin
    and Hecker, Artur}, year={2020} }'
  chicago: Schneider, Stefan Balthasar, Adnan Manzoor, Haydar Qarawlus, Rafael Schellenberg,
    Holger Karl, Ramin Khalili, and Artur Hecker. “Self-Driving Network and Service
    Coordination Using Deep Reinforcement Learning.” In <i>IEEE International Conference
    on Network and Service Management (CNSM)</i>. IEEE, 2020.
  ieee: S. B. Schneider <i>et al.</i>, “Self-Driving Network and Service Coordination
    Using Deep Reinforcement Learning,” in <i>IEEE International Conference on Network
    and Service Management (CNSM)</i>, 2020.
  mla: Schneider, Stefan Balthasar, et al. “Self-Driving Network and Service Coordination
    Using Deep Reinforcement Learning.” <i>IEEE International Conference on Network
    and Service Management (CNSM)</i>, IEEE, 2020.
  short: 'S.B. Schneider, A. Manzoor, H. Qarawlus, R. Schellenberg, H. Karl, R. Khalili,
    A. Hecker, in: IEEE International Conference on Network and Service Management
    (CNSM), IEEE, 2020.'
date_created: 2020-09-22T06:28:22Z
date_updated: 2022-01-06T06:54:08Z
ddc:
- '006'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2020-09-22T06:29:16Z
  date_updated: 2020-09-22T06:36:00Z
  file_id: '19610'
  file_name: ris_with_copyright.pdf
  file_size: 642999
  relation: main_file
file_date_updated: 2020-09-22T06:36:00Z
has_accepted_license: '1'
keyword:
- self-driving networks
- self-learning
- network coordination
- service coordination
- reinforcement learning
- deep learning
- nfv
language:
- iso: eng
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: IEEE International Conference on Network and Service Management (CNSM)
publisher: IEEE
status: public
title: Self-Driving Network and Service Coordination Using Deep Reinforcement Learning
type: conference
user_id: '35343'
year: '2020'
...
---
_id: '19739'
author:
- first_name: Daniel
  full_name: Szopinski, Daniel
  id: '36372'
  last_name: Szopinski
citation:
  ama: 'Szopinski D. Active Business Model Development Tools: Design Requirements.
    In: <i>Proceedings of the 15th International Conference on Design Science Research
    in Information Systems and Technology (DESRIST)</i>. ; 2020.'
  apa: 'Szopinski, D. (2020). Active Business Model Development Tools: Design Requirements.
    In <i>Proceedings of the 15th International Conference on Design Science Research
    in Information Systems and Technology (DESRIST)</i>. Virtual Conference/Workshop.'
  bibtex: '@inproceedings{Szopinski_2020, title={Active Business Model Development
    Tools: Design Requirements}, booktitle={Proceedings of the 15th International
    Conference on Design Science Research in Information Systems and Technology (DESRIST)},
    author={Szopinski, Daniel}, year={2020} }'
  chicago: 'Szopinski, Daniel. “Active Business Model Development Tools: Design Requirements.”
    In <i>Proceedings of the 15th International Conference on Design Science Research
    in Information Systems and Technology (DESRIST)</i>, 2020.'
  ieee: 'D. Szopinski, “Active Business Model Development Tools: Design Requirements,”
    in <i>Proceedings of the 15th International Conference on Design Science Research
    in Information Systems and Technology (DESRIST)</i>, Virtual Conference/Workshop,
    2020.'
  mla: 'Szopinski, Daniel. “Active Business Model Development Tools: Design Requirements.”
    <i>Proceedings of the 15th International Conference on Design Science Research
    in Information Systems and Technology (DESRIST)</i>, 2020.'
  short: 'D. Szopinski, in: Proceedings of the 15th International Conference on Design
    Science Research in Information Systems and Technology (DESRIST), 2020.'
conference:
  location: Virtual Conference/Workshop
  name: 15th International Conference on Design Science Research in Information Systems
    and Technology (DESRIST)
date_created: 2020-09-28T14:23:55Z
date_updated: 2022-01-06T06:54:11Z
ddc:
- '040'
department:
- _id: '276'
file:
- access_level: closed
  content_type: application/pdf
  creator: dsz
  date_created: 2020-09-29T07:46:30Z
  date_updated: 2020-09-29T07:46:30Z
  file_id: '19762'
  file_name: DESRIST2020_ABMDT_REVISED.pdf
  file_size: 194137
  relation: main_file
  success: 1
file_date_updated: 2020-09-29T07:46:30Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
publication: Proceedings of the 15th International Conference on Design Science Research
  in Information Systems and Technology (DESRIST)
status: public
title: 'Active Business Model Development Tools: Design Requirements'
type: conference
user_id: '16205'
year: '2020'
...
---
_id: '19741'
author:
- first_name: Daniel
  full_name: Szopinski, Daniel
  id: '36372'
  last_name: Szopinski
citation:
  ama: 'Szopinski D. Exploring design principles for stimuli in business model development
    tools. In: <i>Proceedings of the 41st International Conference on Information
    Systems (ICIS)</i>. ; 2020.'
  apa: Szopinski, D. (2020). Exploring design principles for stimuli in business model
    development tools. In <i>Proceedings of the 41st International Conference on Information
    Systems (ICIS)</i>. Virtual Conference/Workshop.
  bibtex: '@inproceedings{Szopinski_2020, title={Exploring design principles for stimuli
    in business model development tools}, booktitle={Proceedings of the 41st International
    Conference on Information Systems (ICIS)}, author={Szopinski, Daniel}, year={2020}
    }'
  chicago: Szopinski, Daniel. “Exploring Design Principles for Stimuli in Business
    Model Development Tools.” In <i>Proceedings of the 41st International Conference
    on Information Systems (ICIS)</i>, 2020.
  ieee: D. Szopinski, “Exploring design principles for stimuli in business model development
    tools,” in <i>Proceedings of the 41st International Conference on Information
    Systems (ICIS)</i>, Virtual Conference/Workshop, 2020.
  mla: Szopinski, Daniel. “Exploring Design Principles for Stimuli in Business Model
    Development Tools.” <i>Proceedings of the 41st International Conference on Information
    Systems (ICIS)</i>, 2020.
  short: 'D. Szopinski, in: Proceedings of the 41st International Conference on Information
    Systems (ICIS), 2020.'
conference:
  location: Virtual Conference/Workshop
  name: 41st International Conference on Information Systems (ICIS)
date_created: 2020-09-28T14:28:27Z
date_updated: 2022-01-06T06:54:12Z
ddc:
- '040'
department:
- _id: '276'
file:
- access_level: closed
  content_type: application/pdf
  creator: dsz
  date_created: 2020-10-27T15:05:49Z
  date_updated: 2020-10-27T15:05:49Z
  file_id: '20216'
  file_name: ICIS2020_BMDT_ShortPaper_RevisedManuscript_final.pdf
  file_size: 292196
  relation: main_file
  success: 1
file_date_updated: 2020-10-27T15:05:49Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
publication: Proceedings of the 41st International Conference on Information Systems
  (ICIS)
status: public
title: Exploring design principles for stimuli in business model development tools
type: conference
user_id: '16205'
year: '2020'
...
---
_id: '19782'
author:
- first_name: Michelle
  full_name: Müller, Michelle
  id: '50286'
  last_name: Müller
- first_name: Jürgen
  full_name: Neumann, Jürgen
  id: '32456'
  last_name: Neumann
- first_name: Dominik
  full_name: Gutt, Dominik
  id: '14368'
  last_name: Gutt
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
citation:
  ama: 'Müller M, Neumann J, Gutt D, Kundisch D. Toss a Coin to your Host - How Guests
    End up Paying for the Cost of Regulatory Policies. In: <i>Proceedings of the 41th
    International Conference on Information Systems (ICIS)</i>. ; 2020.'
  apa: Müller, M., Neumann, J., Gutt, D., &#38; Kundisch, D. (2020). Toss a Coin to
    your Host - How Guests End up Paying for the Cost of Regulatory Policies. In <i>Proceedings
    of the 41th International Conference on Information Systems (ICIS)</i>. Virtual
    Conference/Workshop.
  bibtex: '@inproceedings{Müller_Neumann_Gutt_Kundisch_2020, title={Toss a Coin to
    your Host - How Guests End up Paying for the Cost of Regulatory Policies}, booktitle={Proceedings
    of the 41th International Conference on Information Systems (ICIS)}, author={Müller,
    Michelle and Neumann, Jürgen and Gutt, Dominik and Kundisch, Dennis}, year={2020}
    }'
  chicago: Müller, Michelle, Jürgen Neumann, Dominik Gutt, and Dennis Kundisch. “Toss
    a Coin to Your Host - How Guests End up Paying for the Cost of Regulatory Policies.”
    In <i>Proceedings of the 41th International Conference on Information Systems
    (ICIS)</i>, 2020.
  ieee: M. Müller, J. Neumann, D. Gutt, and D. Kundisch, “Toss a Coin to your Host
    - How Guests End up Paying for the Cost of Regulatory Policies,” in <i>Proceedings
    of the 41th International Conference on Information Systems (ICIS)</i>, Virtual
    Conference/Workshop, 2020.
  mla: Müller, Michelle, et al. “Toss a Coin to Your Host - How Guests End up Paying
    for the Cost of Regulatory Policies.” <i>Proceedings of the 41th International
    Conference on Information Systems (ICIS)</i>, 2020.
  short: 'M. Müller, J. Neumann, D. Gutt, D. Kundisch, in: Proceedings of the 41th
    International Conference on Information Systems (ICIS), 2020.'
conference:
  location: Virtual Conference/Workshop
  name: 41th International Conference on Information Systems (ICIS)
date_created: 2020-09-30T09:08:41Z
date_updated: 2022-01-06T06:54:12Z
department:
- _id: '276'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '8'
  name: SFB 901 - Subproject A4
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
publication: Proceedings of the 41th International Conference on Information Systems
  (ICIS)
status: public
title: Toss a Coin to your Host - How Guests End up Paying for the Cost of Regulatory
  Policies
type: conference
user_id: '16205'
year: '2020'
...
---
_id: '24710'
author:
- first_name: Rafael
  full_name: Kurek, Rafael
  last_name: Kurek
citation:
  ama: Kurek R. <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>.;
    2020.
  apa: Kurek, R. (2020). <i>Efficient Cryptographic Constructions with Strong Security
    Guarantees</i>.
  bibtex: '@book{Kurek_2020, title={Efficient Cryptographic Constructions with Strong
    Security Guarantees}, author={Kurek, Rafael}, year={2020} }'
  chicago: Kurek, Rafael. <i>Efficient Cryptographic Constructions with Strong Security
    Guarantees</i>, 2020.
  ieee: R. Kurek, <i>Efficient Cryptographic Constructions with Strong Security Guarantees</i>.
    2020.
  mla: Kurek, Rafael. <i>Efficient Cryptographic Constructions with Strong Security
    Guarantees</i>. 2020.
  short: R. Kurek, Efficient Cryptographic Constructions with Strong Security Guarantees,
    2020.
date_created: 2021-09-20T11:40:56Z
date_updated: 2022-01-06T06:56:32Z
ddc:
- '040'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2021-09-20T11:40:38Z
  date_updated: 2021-09-20T11:40:38Z
  file_id: '24711'
  file_name: DissertationKurek.pdf
  file_size: 973756
  relation: main_file
  success: 1
file_date_updated: 2021-09-20T11:40:38Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
status: public
supervisor:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
title: Efficient Cryptographic Constructions with Strong Security Guarantees
type: dissertation
user_id: '15504'
year: '2020'
...
---
_id: '21396'
abstract:
- lang: eng
  text: "Verifiable random functions (VRFs) are essentially digital signatures with
    additional properties, namely verifiable uniqueness and pseudorandomness, which
    make VRFs a useful tool, e.g., to prevent enumeration in DNSSEC Authenticated
    Denial of Existence and the CONIKS key management system, or in the random committee
    selection of the Algorand blockchain.\r\n\r\nMost standard-model VRFs rely on
    admissible hash functions (AHFs) to achieve security against adaptive attacks
    in the standard model. Known AHF constructions are based on error-correcting codes,
    which yield asymptotically efficient constructions. However, previous works do
    not clarify how the code should be instantiated concretely in the real world.
    The rate and the minimal distance of the selected code have significant impact
    on the efficiency of the resulting cryptosystem, therefore it is unclear if and
    how the aforementioned constructions can be used in practice.\r\n\r\nFirst, we
    explain inherent limitations of code-based AHFs. Concretely, we assume that even
    if we were given codes that achieve the well-known Gilbert-Varshamov or McEliece-Rodemich-Rumsey-Welch
    bounds, existing AHF-based constructions of verifiable random functions (VRFs)
    can only be instantiated quite inefficiently. Then we introduce and construct
    computational AHFs (cAHFs). While classical AHFs are information-theoretic, and
    therefore work even in presence of computationally unbounded adversaries, cAHFs
    provide only security against computationally bounded adversaries. However, we
    show that cAHFs can be instantiated significantly more efficiently. Finally, we
    use our cAHF to construct the currently most efficient verifiable random function
    with full adaptive security in the standard model."
author:
- first_name: Tibor
  full_name: Jager, Tibor
  last_name: Jager
- first_name: David
  full_name: Niehues, David
  id: '36113'
  last_name: Niehues
citation:
  ama: 'Jager T, Niehues D. On the Real-World Instantiability of Admissible Hash Functions
    and Efficient Verifiable Random Functions. In: <i>Lecture Notes in Computer Science</i>.
    Cham; 2020. doi:<a href="https://doi.org/10.1007/978-3-030-38471-5_13">10.1007/978-3-030-38471-5_13</a>'
  apa: Jager, T., &#38; Niehues, D. (2020). On the Real-World Instantiability of Admissible
    Hash Functions and Efficient Verifiable Random Functions. In <i>Lecture Notes
    in Computer Science</i>. Cham. <a href="https://doi.org/10.1007/978-3-030-38471-5_13">https://doi.org/10.1007/978-3-030-38471-5_13</a>
  bibtex: '@inbook{Jager_Niehues_2020, place={Cham}, title={On the Real-World Instantiability
    of Admissible Hash Functions and Efficient Verifiable Random Functions}, DOI={<a
    href="https://doi.org/10.1007/978-3-030-38471-5_13">10.1007/978-3-030-38471-5_13</a>},
    booktitle={Lecture Notes in Computer Science}, author={Jager, Tibor and Niehues,
    David}, year={2020} }'
  chicago: Jager, Tibor, and David Niehues. “On the Real-World Instantiability of
    Admissible Hash Functions and Efficient Verifiable Random Functions.” In <i>Lecture
    Notes in Computer Science</i>. Cham, 2020. <a href="https://doi.org/10.1007/978-3-030-38471-5_13">https://doi.org/10.1007/978-3-030-38471-5_13</a>.
  ieee: T. Jager and D. Niehues, “On the Real-World Instantiability of Admissible
    Hash Functions and Efficient Verifiable Random Functions,” in <i>Lecture Notes
    in Computer Science</i>, Cham, 2020.
  mla: Jager, Tibor, and David Niehues. “On the Real-World Instantiability of Admissible
    Hash Functions and Efficient Verifiable Random Functions.” <i>Lecture Notes in
    Computer Science</i>, 2020, doi:<a href="https://doi.org/10.1007/978-3-030-38471-5_13">10.1007/978-3-030-38471-5_13</a>.
  short: 'T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.'
conference:
  end_date: 2019-08-16
  location: Waterloo, Canada
  name: Selected Areas in Cryptography
  start_date: 2019-08-12
date_created: 2021-03-08T16:50:31Z
date_updated: 2022-01-06T06:54:58Z
ddc:
- '000'
department:
- _id: '558'
doi: 10.1007/978-3-030-38471-5_13
file:
- access_level: closed
  content_type: application/pdf
  creator: davnie
  date_created: 2021-03-08T17:02:37Z
  date_updated: 2021-03-08T17:02:37Z
  file_id: '21399'
  file_name: Jager und Niehues - 2020 - On the Real-World Instantiability of Admissible
    Ha.pdf
  file_size: 706743
  relation: main_file
file_date_updated: 2021-03-08T17:02:37Z
has_accepted_license: '1'
keyword:
- Admissible hash functions
- Verifiable random functions
- Error-correcting codes
- Provable security
language:
- iso: eng
main_file_link:
- url: https://link.springer.com/content/pdf/10.1007%252F978-3-030-38471-5_13.pdf
place: Cham
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '13'
  name: SFB 901 - Subproject C1
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783030384708'
  - '9783030384715'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
quality_controlled: '1'
related_material:
  link:
  - relation: later_version
    url: https://eprint.iacr.org/2019/1335.pdf
status: public
title: On the Real-World Instantiability of Admissible Hash Functions and Efficient
  Verifiable Random Functions
type: book_chapter
user_id: '36113'
year: '2020'
...
