---
_id: '30212'
author:
- first_name: Christian
  full_name: Vorbohle, Christian
  id: '29951'
  last_name: Vorbohle
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
citation:
  ama: 'Vorbohle C, Kundisch D. Key Properties of Sustainable Business Ecosystem Relationships.
    In: ; 2022.'
  apa: Vorbohle, C., &#38; Kundisch, D. (2022). <i>Key Properties of Sustainable Business
    Ecosystem Relationships</i>. Symplatform (Third Edition).
  bibtex: '@inproceedings{Vorbohle_Kundisch_2022, title={Key Properties of Sustainable
    Business Ecosystem Relationships}, author={Vorbohle, Christian and Kundisch, Dennis},
    year={2022} }'
  chicago: Vorbohle, Christian, and Dennis Kundisch. “Key Properties of Sustainable
    Business Ecosystem Relationships,” 2022.
  ieee: C. Vorbohle and D. Kundisch, “Key Properties of Sustainable Business Ecosystem
    Relationships,” presented at the Symplatform (Third Edition), 2022.
  mla: Vorbohle, Christian, and Dennis Kundisch. <i>Key Properties of Sustainable
    Business Ecosystem Relationships</i>. 2022.
  short: 'C. Vorbohle, D. Kundisch, in: 2022.'
conference:
  name: Symplatform (Third Edition)
date_created: 2022-03-08T09:55:06Z
date_updated: 2022-11-17T14:23:02Z
department:
- _id: '276'
language:
- iso: eng
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '17'
  name: 'SFB 901 - C5: SFB 901 - Subproject C5'
status: public
title: Key Properties of Sustainable Business Ecosystem Relationships
type: conference_abstract
user_id: '477'
year: '2022'
...
---
_id: '32811'
abstract:
- lang: eng
  text: 'The decentralized nature of multi-agent systems requires continuous data
    exchange to achieve global objectives. In such scenarios, Age of Information (AoI)
    has become an important metric of the freshness of exchanged data due to the error-proneness
    and delays of communication systems. Communication systems usually possess dependencies:
    the process describing the success or failure of communication is highly correlated
    when these attempts are ``close'''' in some domain (e.g. in time, frequency, space
    or code as in wireless communication) and is, in general, non-stationary. To study
    AoI in such scenarios, we consider an abstract event-based AoI process $\Delta(n)$,
    expressing time since the last update: If, at time $n$, a monitoring node receives
    a status update from a source node (event $A(n-1)$ occurs), then $\Delta(n)$ is
    reset to one; otherwise, $\Delta(n)$ grows linearly in time. This AoI process
    can thus be viewed as a special random walk with resets. The event process $A(n)$
    may be nonstationary and we merely assume that its temporal dependencies decay
    sufficiently, described by $\alpha$-mixing. We calculate moment bounds for the
    resulting AoI process as a function of the mixing rate of $A(n)$. Furthermore,
    we prove that the AoI process $\Delta(n)$ is itself $\alpha$-mixing from which
    we conclude a strong law of large numbers for $\Delta(n)$. These results are new,
    since AoI processes have not been studied so far in this general strongly mixing
    setting. This opens up future work on renewal processes with non-independent interarrival
    times.'
author:
- first_name: Adrian
  full_name: Redder, Adrian
  id: '52265'
  last_name: Redder
  orcid: https://orcid.org/0000-0001-7391-4688
- first_name: Arunselvan
  full_name: Ramaswamy, Arunselvan
  id: '66937'
  last_name: Ramaswamy
  orcid: https://orcid.org/ 0000-0001-7547-8111
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Redder A, Ramaswamy A, Karl H. Age of Information Process under Strongly Mixing
    Communication -- Moment Bound, Mixing Rate and Strong Law. In: <i>Proceedings
    of the 58th Allerton Conference on Communication, Control, and Computing</i>.
    ; 2022.'
  apa: Redder, A., Ramaswamy, A., &#38; Karl, H. (2022). Age of Information Process
    under Strongly Mixing Communication -- Moment Bound, Mixing Rate and Strong Law.
    <i>Proceedings of the 58th Allerton Conference on Communication, Control, and
    Computing</i>. 58th Allerton Conference on Communication, Control, and Computing.
  bibtex: '@inproceedings{Redder_Ramaswamy_Karl_2022, title={Age of Information Process
    under Strongly Mixing Communication -- Moment Bound, Mixing Rate and Strong Law},
    booktitle={Proceedings of the 58th Allerton Conference on Communication, Control,
    and Computing}, author={Redder, Adrian and Ramaswamy, Arunselvan and Karl, Holger},
    year={2022} }'
  chicago: Redder, Adrian, Arunselvan Ramaswamy, and Holger Karl. “Age of Information
    Process under Strongly Mixing Communication -- Moment Bound, Mixing Rate and Strong
    Law.” In <i>Proceedings of the 58th Allerton Conference on Communication, Control,
    and Computing</i>, 2022.
  ieee: A. Redder, A. Ramaswamy, and H. Karl, “Age of Information Process under Strongly
    Mixing Communication -- Moment Bound, Mixing Rate and Strong Law,” presented at
    the 58th Allerton Conference on Communication, Control, and Computing, 2022.
  mla: Redder, Adrian, et al. “Age of Information Process under Strongly Mixing Communication
    -- Moment Bound, Mixing Rate and Strong Law.” <i>Proceedings of the 58th Allerton
    Conference on Communication, Control, and Computing</i>, 2022.
  short: 'A. Redder, A. Ramaswamy, H. Karl, in: Proceedings of the 58th Allerton Conference
    on Communication, Control, and Computing, 2022.'
conference:
  name: 58th Allerton Conference on Communication, Control, and Computing
date_created: 2022-08-15T09:59:17Z
date_updated: 2022-11-18T09:31:19Z
ddc:
- '000'
department:
- _id: '75'
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
publication: Proceedings of the 58th Allerton Conference on Communication, Control,
  and Computing
status: public
title: Age of Information Process under Strongly Mixing Communication -- Moment Bound,
  Mixing Rate and Strong Law
type: conference
user_id: '477'
year: '2022'
...
---
_id: '30793'
author:
- first_name: Adrian
  full_name: Redder, Adrian
  id: '52265'
  last_name: Redder
  orcid: https://orcid.org/0000-0001-7391-4688
- first_name: Arunselvan
  full_name: Ramaswamy, Arunselvan
  id: '66937'
  last_name: Ramaswamy
  orcid: https://orcid.org/ 0000-0001-7547-8111
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Redder A, Ramaswamy A, Karl H. Multi-agent Policy Gradient Algorithms for
    Cyber-physical Systems with Lossy Communication. In: <i>Proceedings of the 14th
    International Conference on Agents and Artificial Intelligence</i>. SCITEPRESS
    - Science and Technology Publications; 2022. doi:<a href="https://doi.org/10.5220/0010845400003116">10.5220/0010845400003116</a>'
  apa: Redder, A., Ramaswamy, A., &#38; Karl, H. (2022). Multi-agent Policy Gradient
    Algorithms for Cyber-physical Systems with Lossy Communication. <i>Proceedings
    of the 14th International Conference on Agents and Artificial Intelligence</i>.
    <a href="https://doi.org/10.5220/0010845400003116">https://doi.org/10.5220/0010845400003116</a>
  bibtex: '@inproceedings{Redder_Ramaswamy_Karl_2022, title={Multi-agent Policy Gradient
    Algorithms for Cyber-physical Systems with Lossy Communication}, DOI={<a href="https://doi.org/10.5220/0010845400003116">10.5220/0010845400003116</a>},
    booktitle={Proceedings of the 14th International Conference on Agents and Artificial
    Intelligence}, publisher={SCITEPRESS - Science and Technology Publications}, author={Redder,
    Adrian and Ramaswamy, Arunselvan and Karl, Holger}, year={2022} }'
  chicago: Redder, Adrian, Arunselvan Ramaswamy, and Holger Karl. “Multi-Agent Policy
    Gradient Algorithms for Cyber-Physical Systems with Lossy Communication.” In <i>Proceedings
    of the 14th International Conference on Agents and Artificial Intelligence</i>.
    SCITEPRESS - Science and Technology Publications, 2022. <a href="https://doi.org/10.5220/0010845400003116">https://doi.org/10.5220/0010845400003116</a>.
  ieee: 'A. Redder, A. Ramaswamy, and H. Karl, “Multi-agent Policy Gradient Algorithms
    for Cyber-physical Systems with Lossy Communication,” 2022, doi: <a href="https://doi.org/10.5220/0010845400003116">10.5220/0010845400003116</a>.'
  mla: Redder, Adrian, et al. “Multi-Agent Policy Gradient Algorithms for Cyber-Physical
    Systems with Lossy Communication.” <i>Proceedings of the 14th International Conference
    on Agents and Artificial Intelligence</i>, SCITEPRESS - Science and Technology
    Publications, 2022, doi:<a href="https://doi.org/10.5220/0010845400003116">10.5220/0010845400003116</a>.
  short: 'A. Redder, A. Ramaswamy, H. Karl, in: Proceedings of the 14th International
    Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology
    Publications, 2022.'
date_created: 2022-04-06T07:18:36Z
date_updated: 2022-11-18T09:32:14Z
ddc:
- '006'
department:
- _id: '75'
doi: 10.5220/0010845400003116
file:
- access_level: closed
  content_type: application/pdf
  creator: aredder
  date_created: 2022-08-31T07:10:13Z
  date_updated: 2022-08-31T07:10:13Z
  file_id: '33237'
  file_name: ICCART2022.pdf
  file_size: 298926
  relation: main_file
  success: 1
file_date_updated: 2022-08-31T07:10:13Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
- _id: '24'
  name: 'NICCI-CN: Netzgewahre Regelung & regelungsgewahre Netze'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
publication: Proceedings of the 14th International Conference on Agents and Artificial
  Intelligence
publication_status: published
publisher: SCITEPRESS - Science and Technology Publications
status: public
title: Multi-agent Policy Gradient Algorithms for Cyber-physical Systems with Lossy
  Communication
type: conference
user_id: '477'
year: '2022'
...
---
_id: '30790'
abstract:
- lang: eng
  text: "Iterative distributed optimization algorithms involve multiple agents that\r\ncommunicate
    with each other, over time, in order to minimize/maximize a global\r\nobjective.
    In the presence of unreliable communication networks, the\r\nAge-of-Information
    (AoI), which measures the freshness of data received, may be\r\nlarge and hence
    hinder algorithmic convergence. In this paper, we study the\r\nconvergence of
    general distributed gradient-based optimization algorithms in\r\nthe presence
    of communication that neither happens periodically nor at\r\nstochastically independent
    points in time. We show that convergence is\r\nguaranteed provided the random
    variables associated with the AoI processes are\r\nstochastically dominated by
    a random variable with finite first moment. This\r\nimproves on previous requirements
    of boundedness of more than the first moment.\r\nWe then introduce stochastically
    strongly connected (SSC) networks, a new\r\nstochastic form of strong connectedness
    for time-varying networks. We show: If\r\nfor any $p \\ge0$ the processes that
    describe the success of communication\r\nbetween agents in a SSC network are $\\alpha$-mixing
    with $n^{p-1}\\alpha(n)$\r\nsummable, then the associated AoI processes are stochastically
    dominated by a\r\nrandom variable with finite $p$-th moment. In combination with
    our first\r\ncontribution, this implies that distributed stochastic gradient descend\r\nconverges
    in the presence of AoI, if $\\alpha(n)$ is summable."
author:
- first_name: Adrian
  full_name: Redder, Adrian
  id: '52265'
  last_name: Redder
  orcid: https://orcid.org/0000-0001-7391-4688
- first_name: Arunselvan
  full_name: Ramaswamy, Arunselvan
  id: '66937'
  last_name: Ramaswamy
  orcid: https://orcid.org/ 0000-0001-7547-8111
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: Redder A, Ramaswamy A, Karl H. Distributed gradient-based optimization in the
    presence of dependent  aperiodic communication. <i>arXiv:220111343</i>. Published
    online 2022.
  apa: Redder, A., Ramaswamy, A., &#38; Karl, H. (2022). Distributed gradient-based
    optimization in the presence of dependent  aperiodic communication. In <i>arXiv:2201.11343</i>.
  bibtex: '@article{Redder_Ramaswamy_Karl_2022, title={Distributed gradient-based
    optimization in the presence of dependent  aperiodic communication}, journal={arXiv:2201.11343},
    author={Redder, Adrian and Ramaswamy, Arunselvan and Karl, Holger}, year={2022}
    }'
  chicago: Redder, Adrian, Arunselvan Ramaswamy, and Holger Karl. “Distributed Gradient-Based
    Optimization in the Presence of Dependent  Aperiodic Communication.” <i>ArXiv:2201.11343</i>,
    2022.
  ieee: A. Redder, A. Ramaswamy, and H. Karl, “Distributed gradient-based optimization
    in the presence of dependent  aperiodic communication,” <i>arXiv:2201.11343</i>.
    2022.
  mla: Redder, Adrian, et al. “Distributed Gradient-Based Optimization in the Presence
    of Dependent  Aperiodic Communication.” <i>ArXiv:2201.11343</i>, 2022.
  short: A. Redder, A. Ramaswamy, H. Karl, ArXiv:2201.11343 (2022).
date_created: 2022-04-06T06:53:38Z
date_updated: 2022-11-18T09:33:01Z
department:
- _id: '75'
external_id:
  arxiv:
  - '2201.11343'
language:
- iso: eng
project:
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
publication: arXiv:2201.11343
status: public
title: Distributed gradient-based optimization in the presence of dependent  aperiodic
  communication
type: preprint
user_id: '477'
year: '2022'
...
---
_id: '30791'
abstract:
- lang: eng
  text: "We present sufficient conditions that ensure convergence of the multi-agent\r\nDeep
    Deterministic Policy Gradient (DDPG) algorithm. It is an example of one of\r\nthe
    most popular paradigms of Deep Reinforcement Learning (DeepRL) for tackling\r\ncontinuous
    action spaces: the actor-critic paradigm. In the setting considered\r\nherein,
    each agent observes a part of the global state space in order to take\r\nlocal
    actions, for which it receives local rewards. For every agent, DDPG\r\ntrains
    a local actor (policy) and a local critic (Q-function). The analysis\r\nshows
    that multi-agent DDPG using neural networks to approximate the local\r\npolicies
    and critics converge to limits with the following properties: The\r\ncritic limits
    minimize the average squared Bellman loss; the actor limits\r\nparameterize a
    policy that maximizes the local critic's approximation of\r\n$Q_i^*$, where $i$
    is the agent index. The averaging is with respect to a\r\nprobability distribution
    over the global state-action space. It captures the\r\nasymptotics of all local
    training processes. Finally, we extend the analysis to\r\na fully decentralized
    setting where agents communicate over a wireless network\r\nprone to delays and
    losses; a typical scenario in, e.g., robotic applications."
author:
- first_name: Adrian
  full_name: Redder, Adrian
  id: '52265'
  last_name: Redder
  orcid: https://orcid.org/0000-0001-7391-4688
- first_name: Arunselvan
  full_name: Ramaswamy, Arunselvan
  id: '66937'
  last_name: Ramaswamy
  orcid: https://orcid.org/ 0000-0001-7547-8111
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: Redder A, Ramaswamy A, Karl H. Asymptotic Convergence of Deep Multi-Agent Actor-Critic
    Algorithms. <i>arXiv:220100570</i>. Published online 2022.
  apa: Redder, A., Ramaswamy, A., &#38; Karl, H. (2022). Asymptotic Convergence of
    Deep Multi-Agent Actor-Critic Algorithms. In <i>arXiv:2201.00570</i>.
  bibtex: '@article{Redder_Ramaswamy_Karl_2022, title={Asymptotic Convergence of Deep
    Multi-Agent Actor-Critic Algorithms}, journal={arXiv:2201.00570}, author={Redder,
    Adrian and Ramaswamy, Arunselvan and Karl, Holger}, year={2022} }'
  chicago: Redder, Adrian, Arunselvan Ramaswamy, and Holger Karl. “Asymptotic Convergence
    of Deep Multi-Agent Actor-Critic Algorithms.” <i>ArXiv:2201.00570</i>, 2022.
  ieee: A. Redder, A. Ramaswamy, and H. Karl, “Asymptotic Convergence of Deep Multi-Agent
    Actor-Critic Algorithms,” <i>arXiv:2201.00570</i>. 2022.
  mla: Redder, Adrian, et al. “Asymptotic Convergence of Deep Multi-Agent Actor-Critic
    Algorithms.” <i>ArXiv:2201.00570</i>, 2022.
  short: A. Redder, A. Ramaswamy, H. Karl, ArXiv:2201.00570 (2022).
date_created: 2022-04-06T06:53:52Z
date_updated: 2022-11-18T09:33:42Z
department:
- _id: '75'
external_id:
  arxiv:
  - '2201.00570'
language:
- iso: eng
project:
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
publication: arXiv:2201.00570
status: public
title: Asymptotic Convergence of Deep Multi-Agent Actor-Critic Algorithms
type: preprint
user_id: '477'
year: '2022'
...
---
_id: '32398'
author:
- first_name: Hanna
  full_name: Siek, Hanna
  last_name: Siek
citation:
  ama: 'Siek H. <i>Bringing Structure to Structure-Preserving Signatures: Overview,
    Implementation and Comparison of Selected SPS Schemes</i>.; 2022.'
  apa: 'Siek, H. (2022). <i>Bringing Structure to Structure-Preserving Signatures:
    Overview, Implementation and Comparison of Selected SPS Schemes</i>.'
  bibtex: '@book{Siek_2022, title={Bringing Structure to Structure-Preserving Signatures:
    Overview, Implementation and Comparison of Selected SPS Schemes}, author={Siek,
    Hanna}, year={2022} }'
  chicago: 'Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures:
    Overview, Implementation and Comparison of Selected SPS Schemes</i>, 2022.'
  ieee: 'H. Siek, <i>Bringing Structure to Structure-Preserving Signatures: Overview,
    Implementation and Comparison of Selected SPS Schemes</i>. 2022.'
  mla: 'Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview,
    Implementation and Comparison of Selected SPS Schemes</i>. 2022.'
  short: 'H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview,
    Implementation and Comparison of Selected SPS Schemes, 2022.'
date_created: 2022-07-20T09:36:39Z
date_updated: 2022-11-18T09:38:04Z
department:
- _id: '64'
- _id: '7'
language:
- iso: eng
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
- _id: '84'
  name: 'SFB 901 - T2: SFB 901 -Subproject T2'
- _id: '82'
  name: 'SFB 901 - T: SFB 901 - Project Area T'
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: 'Bringing Structure to Structure-Preserving Signatures: Overview, Implementation
  and Comparison of Selected SPS Schemes'
type: bachelorsthesis
user_id: '477'
year: '2022'
...
---
_id: '31485'
author:
- first_name: Paul
  full_name: Kramer, Paul
  id: '64594'
  last_name: Kramer
citation:
  ama: Kramer P. <i>On Transforming Lattice-Based Cryptography to the Ring Setting</i>.;
    2022.
  apa: Kramer, P. (2022). <i>On Transforming Lattice-Based Cryptography to the Ring
    Setting</i>.
  bibtex: '@book{Kramer_2022, title={On Transforming Lattice-Based Cryptography to
    the Ring Setting}, author={Kramer, Paul}, year={2022} }'
  chicago: Kramer, Paul. <i>On Transforming Lattice-Based Cryptography to the Ring
    Setting</i>, 2022.
  ieee: P. Kramer, <i>On Transforming Lattice-Based Cryptography to the Ring Setting</i>.
    2022.
  mla: Kramer, Paul. <i>On Transforming Lattice-Based Cryptography to the Ring Setting</i>.
    2022.
  short: P. Kramer, On Transforming Lattice-Based Cryptography to the Ring Setting,
    2022.
date_created: 2022-05-28T08:07:40Z
date_updated: 2022-11-18T09:40:28Z
department:
- _id: '7'
- _id: '64'
extern: '1'
language:
- iso: eng
project:
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
- _id: '1'
  name: 'SFB 901: SFB 901'
status: public
title: On Transforming Lattice-Based Cryptography to the Ring Setting
type: mastersthesis
user_id: '477'
year: '2022'
...
---
_id: '32854'
author:
- first_name: Adrian
  full_name: Redder, Adrian
  id: '52265'
  last_name: Redder
  orcid: https://orcid.org/0000-0001-7391-4688
- first_name: Arunselvan
  full_name: Ramaswamy, Arunselvan
  id: '66937'
  last_name: Ramaswamy
  orcid: https://orcid.org/ 0000-0001-7547-8111
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: Redder A, Ramaswamy A, Karl H. Practical Network Conditions for the Convergence
    of Distributed Optimization. <i>IFAC-PapersOnLine</i>. 2022;55(13):133–138.
  apa: Redder, A., Ramaswamy, A., &#38; Karl, H. (2022). Practical Network Conditions
    for the Convergence of Distributed Optimization. <i>IFAC-PapersOnLine</i>, <i>55</i>(13),
    133–138.
  bibtex: '@article{Redder_Ramaswamy_Karl_2022, title={Practical Network Conditions
    for the Convergence of Distributed Optimization}, volume={55}, number={13}, journal={IFAC-PapersOnLine},
    publisher={Elsevier}, author={Redder, Adrian and Ramaswamy, Arunselvan and Karl,
    Holger}, year={2022}, pages={133–138} }'
  chicago: 'Redder, Adrian, Arunselvan Ramaswamy, and Holger Karl. “Practical Network
    Conditions for the Convergence of Distributed Optimization.” <i>IFAC-PapersOnLine</i>
    55, no. 13 (2022): 133–138.'
  ieee: A. Redder, A. Ramaswamy, and H. Karl, “Practical Network Conditions for the
    Convergence of Distributed Optimization,” <i>IFAC-PapersOnLine</i>, vol. 55, no.
    13, pp. 133–138, 2022.
  mla: Redder, Adrian, et al. “Practical Network Conditions for the Convergence of
    Distributed Optimization.” <i>IFAC-PapersOnLine</i>, vol. 55, no. 13, Elsevier,
    2022, pp. 133–138.
  short: A. Redder, A. Ramaswamy, H. Karl, IFAC-PapersOnLine 55 (2022) 133–138.
conference:
  name: IFAC Conference on Networked Systems
date_created: 2022-08-16T09:12:55Z
date_updated: 2022-11-18T10:05:14Z
ddc:
- '006'
department:
- _id: '75'
file:
- access_level: closed
  content_type: application/pdf
  creator: aredder
  date_created: 2022-08-31T07:06:30Z
  date_updated: 2022-08-31T07:06:30Z
  file_id: '33236'
  file_name: NecSys2022____Practical_Conditions_for_Conv.pdf
  file_size: 298395
  relation: main_file
  success: 1
file_date_updated: 2022-08-31T07:06:30Z
has_accepted_license: '1'
intvolume: '        55'
issue: '13'
language:
- iso: eng
page: 133–138
project:
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
publication: IFAC-PapersOnLine
publisher: Elsevier
status: public
title: Practical Network Conditions for the Convergence of Distributed Optimization
type: journal_article
user_id: '477'
volume: 55
year: '2022'
...
---
_id: '33253'
author:
- first_name: Tim
  full_name: Hansmeier, Tim
  id: '49992'
  last_name: Hansmeier
  orcid: 0000-0003-1377-3339
- first_name: Mathis
  full_name: Brede, Mathis
  last_name: Brede
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: 'Hansmeier T, Brede M, Platzner M. XCS on Embedded Systems: An Analysis of
    Execution Profiles and Accelerated Classifier Deletion. In: <i>GECCO ’22: Proceedings
    of the Genetic and Evolutionary Computation Conference Companion</i>. Association
    for Computing Machinery (ACM); 2022:2071-2079. doi:<a href="https://doi.org/10.1145/3520304.3533977">10.1145/3520304.3533977</a>'
  apa: 'Hansmeier, T., Brede, M., &#38; Platzner, M. (2022). XCS on Embedded Systems:
    An Analysis of Execution Profiles and Accelerated Classifier Deletion. <i>GECCO
    ’22: Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>,
    2071–2079. <a href="https://doi.org/10.1145/3520304.3533977">https://doi.org/10.1145/3520304.3533977</a>'
  bibtex: '@inproceedings{Hansmeier_Brede_Platzner_2022, place={New York, NY, United
    States}, title={XCS on Embedded Systems: An Analysis of Execution Profiles and
    Accelerated Classifier Deletion}, DOI={<a href="https://doi.org/10.1145/3520304.3533977">10.1145/3520304.3533977</a>},
    booktitle={GECCO ’22: Proceedings of the Genetic and Evolutionary Computation
    Conference Companion}, publisher={Association for Computing Machinery (ACM)},
    author={Hansmeier, Tim and Brede, Mathis and Platzner, Marco}, year={2022}, pages={2071–2079}
    }'
  chicago: 'Hansmeier, Tim, Mathis Brede, and Marco Platzner. “XCS on Embedded Systems:
    An Analysis of Execution Profiles and Accelerated Classifier Deletion.” In <i>GECCO
    ’22: Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>,
    2071–79. New York, NY, United States: Association for Computing Machinery (ACM),
    2022. <a href="https://doi.org/10.1145/3520304.3533977">https://doi.org/10.1145/3520304.3533977</a>.'
  ieee: 'T. Hansmeier, M. Brede, and M. Platzner, “XCS on Embedded Systems: An Analysis
    of Execution Profiles and Accelerated Classifier Deletion,” in <i>GECCO ’22: Proceedings
    of the Genetic and Evolutionary Computation Conference Companion</i>, Boston,
    MA, USA, 2022, pp. 2071–2079, doi: <a href="https://doi.org/10.1145/3520304.3533977">10.1145/3520304.3533977</a>.'
  mla: 'Hansmeier, Tim, et al. “XCS on Embedded Systems: An Analysis of Execution
    Profiles and Accelerated Classifier Deletion.” <i>GECCO ’22: Proceedings of the
    Genetic and Evolutionary Computation Conference Companion</i>, Association for
    Computing Machinery (ACM), 2022, pp. 2071–79, doi:<a href="https://doi.org/10.1145/3520304.3533977">10.1145/3520304.3533977</a>.'
  short: 'T. Hansmeier, M. Brede, M. Platzner, in: GECCO ’22: Proceedings of the Genetic
    and Evolutionary Computation Conference Companion, Association for Computing Machinery
    (ACM), New York, NY, United States, 2022, pp. 2071–2079.'
conference:
  end_date: 2022-07-13
  location: Boston, MA, USA
  name: International Workshop on Learning Classifier Systems (IWLCS 2022)
  start_date: 2022-07-09
date_created: 2022-09-02T11:47:17Z
date_updated: 2022-11-18T10:13:22Z
department:
- _id: '78'
doi: 10.1145/3520304.3533977
language:
- iso: eng
page: 2071-2079
place: New York, NY, United States
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '14'
  name: 'SFB 901 - C2: SFB 901 - Subproject C2'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
publication: 'GECCO ''22: Proceedings of the Genetic and Evolutionary Computation
  Conference Companion'
publication_status: published
publisher: Association for Computing Machinery (ACM)
status: public
title: 'XCS on Embedded Systems: An Analysis of Execution Profiles and Accelerated
  Classifier Deletion'
type: conference
user_id: '477'
year: '2022'
...
---
_id: '33491'
author:
- first_name: Marten
  full_name: Maack, Marten
  id: '88252'
  last_name: Maack
- first_name: Simon
  full_name: Pukrop, Simon
  id: '44428'
  last_name: Pukrop
- first_name: Anna Rodriguez
  full_name: Rasmussen, Anna Rodriguez
  last_name: Rasmussen
citation:
  ama: 'Maack M, Pukrop S, Rasmussen AR. (In-)Approximability Results for Interval,
    Resource Restricted, and Low Rank Scheduling. In: Chechik S, Navarro G, Rotenberg
    E, Herman G, eds. <i>30th Annual European Symposium on Algorithms, ESA 2022, September
    5-9, 2022, Berlin/Potsdam, Germany</i>. Vol 244. LIPIcs. Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik; 2022:77:1–77:13. doi:<a href="https://doi.org/10.4230/LIPIcs.ESA.2022.77">10.4230/LIPIcs.ESA.2022.77</a>'
  apa: Maack, M., Pukrop, S., &#38; Rasmussen, A. R. (2022). (In-)Approximability
    Results for Interval, Resource Restricted, and Low Rank Scheduling. In S. Chechik,
    G. Navarro, E. Rotenberg, &#38; G. Herman (Eds.), <i>30th Annual European Symposium
    on Algorithms, ESA 2022, September 5-9, 2022, Berlin/Potsdam, Germany</i> (Vol.
    244, p. 77:1–77:13). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.ESA.2022.77">https://doi.org/10.4230/LIPIcs.ESA.2022.77</a>
  bibtex: '@inproceedings{Maack_Pukrop_Rasmussen_2022, series={LIPIcs}, title={(In-)Approximability
    Results for Interval, Resource Restricted, and Low Rank Scheduling}, volume={244},
    DOI={<a href="https://doi.org/10.4230/LIPIcs.ESA.2022.77">10.4230/LIPIcs.ESA.2022.77</a>},
    booktitle={30th Annual European Symposium on Algorithms, ESA 2022, September 5-9,
    2022, Berlin/Potsdam, Germany}, publisher={Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik}, author={Maack, Marten and Pukrop, Simon and Rasmussen, Anna Rodriguez},
    editor={Chechik, Shiri and Navarro, Gonzalo and Rotenberg, Eva and Herman, Grzegorz},
    year={2022}, pages={77:1–77:13}, collection={LIPIcs} }'
  chicago: Maack, Marten, Simon Pukrop, and Anna Rodriguez Rasmussen. “(In-)Approximability
    Results for Interval, Resource Restricted, and Low Rank Scheduling.” In <i>30th
    Annual European Symposium on Algorithms, ESA 2022, September 5-9, 2022, Berlin/Potsdam,
    Germany</i>, edited by Shiri Chechik, Gonzalo Navarro, Eva Rotenberg, and Grzegorz
    Herman, 244:77:1–77:13. LIPIcs. Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2022. <a href="https://doi.org/10.4230/LIPIcs.ESA.2022.77">https://doi.org/10.4230/LIPIcs.ESA.2022.77</a>.
  ieee: 'M. Maack, S. Pukrop, and A. R. Rasmussen, “(In-)Approximability Results for
    Interval, Resource Restricted, and Low Rank Scheduling,” in <i>30th Annual European
    Symposium on Algorithms, ESA 2022, September 5-9, 2022, Berlin/Potsdam, Germany</i>,
    2022, vol. 244, p. 77:1–77:13, doi: <a href="https://doi.org/10.4230/LIPIcs.ESA.2022.77">10.4230/LIPIcs.ESA.2022.77</a>.'
  mla: Maack, Marten, et al. “(In-)Approximability Results for Interval, Resource
    Restricted, and Low Rank Scheduling.” <i>30th Annual European Symposium on Algorithms,
    ESA 2022, September 5-9, 2022, Berlin/Potsdam, Germany</i>, edited by Shiri Chechik
    et al., vol. 244, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022, p.
    77:1–77:13, doi:<a href="https://doi.org/10.4230/LIPIcs.ESA.2022.77">10.4230/LIPIcs.ESA.2022.77</a>.
  short: 'M. Maack, S. Pukrop, A.R. Rasmussen, in: S. Chechik, G. Navarro, E. Rotenberg,
    G. Herman (Eds.), 30th Annual European Symposium on Algorithms, ESA 2022, September
    5-9, 2022, Berlin/Potsdam, Germany, Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2022, p. 77:1–77:13.'
date_created: 2022-09-27T13:06:05Z
date_updated: 2022-11-18T10:14:14Z
department:
- _id: '63'
doi: 10.4230/LIPIcs.ESA.2022.77
editor:
- first_name: Shiri
  full_name: Chechik, Shiri
  last_name: Chechik
- first_name: Gonzalo
  full_name: Navarro, Gonzalo
  last_name: Navarro
- first_name: Eva
  full_name: Rotenberg, Eva
  last_name: Rotenberg
- first_name: Grzegorz
  full_name: Herman, Grzegorz
  last_name: Herman
intvolume: '       244'
language:
- iso: eng
page: 77:1–77:13
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
publication: 30th Annual European Symposium on Algorithms, ESA 2022, September 5-9,
  2022, Berlin/Potsdam, Germany
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
series_title: LIPIcs
status: public
title: (In-)Approximability Results for Interval, Resource Restricted, and Low Rank
  Scheduling
type: conference
user_id: '477'
volume: 244
year: '2022'
...
---
_id: '29769'
abstract:
- lang: eng
  text: 'Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender
    Gegenmaßnahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentwürfe
    zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden
    zu überlisten. Abgesehen von den konventionellen Methoden um einen Trojaner in
    eine Schaltung für ein Field-programmable Gate Array (FPGA) einzuschleusen, können
    auch die Entwurfswerkzeuge heimlich kompromittiert werden um einen Angreifer dabei
    zu unterstützen einen erfolgreichen Angriff durchzuführen, der zum Beispiel Fehlfunktionen
    oder ungewollte Informationsabflüsse bewirken kann. Diese Dissertation beschäftigt
    sich hauptsächlich mit den beiden Blickwinkeln auf Hardwaretrojaner in rekonfigurierbaren
    Systemen, einerseits der Perspektive des Verteidigers mit einer Methode zur Erkennung
    von Trojanern auf der Bitstromebene, und andererseits derjenigen des Angreifers
    mit einer neuartigen Angriffsmethode für FPGA Trojaner. Für die Verteidigung gegen
    den Trojaner ``Heimtückische LUT'''' stellen wir die allererste erfolgreiche Gegenmaßnahme
    vor, die durch Verifikation mittels Proof-carrying Hardware (PCH) auf der Bitstromebene
    direkt vor der Konfiguration der Hardware angewendet werden kann, und präsentieren
    ein vollständiges Schema für den Entwurf und die Verifikation von Schaltungen
    für iCE40 FPGAs. Für die Gegenseite führen wir einen neuen Angriff ein, welcher
    bösartiges Routing im eingefügten Trojaner ausnutzt um selbst im fertigen Bitstrom
    in einem inaktiven Zustand zu verbleiben: Hierdurch kann dieser neuartige Angriff
    zur Zeit weder von herkömmlichen Test- und Verifikationsmethoden, noch von unserer
    vorher vorgestellten Verifikation auf der Bitstromebene entdeckt werden.'
- lang: eng
  text: The battle of developing hardware Trojans and corresponding countermeasures
    has taken adversaries towards ingenious ways of compromising hardware designs
    by circumventing even advanced testing and verification methods. Besides conventional
    methods of inserting Trojans into a design by a malicious entity, the design flow
    for field-programmable gate arrays (FPGAs) can also be surreptitiously compromised
    to assist the attacker to perform a successful malfunctioning or information leakage
    attack. This thesis mainly focuses on the two aspects of hardware Trojans in reconfigurable
    systems, the defenders perspective which corresponds to the bitstream-level Trojan
    detection technique, and the attackers perspective which corresponds to a novel
    FPGA Trojan attack. From the defender's perspective, we introduce a first-ever
    successful pre-configuration countermeasure against the ``Malicious LUT''-hardware
    Trojan, by employing bitstream-level Proof-Carrying Hardware (PCH) and present
    the complete design-and-verification flow for iCE40 FPGAs. Likewise, from an attackers
    perspective, we present a novel attack that leverages malicious routing of the
    inserted Trojan circuit to acquire a dormant state even in the generated and transmitted
    bitstream. Since the Trojan is injected in a post-synthesis step and remains unconnected
    in the bitstream, the presented attack can currently neither be prevented by conventional
    testing and verification methods nor by bitstream-level verification techniques.
author:
- first_name: Qazi Arbab
  full_name: Ahmed, Qazi Arbab
  id: '72764'
  last_name: Ahmed
  orcid: 0000-0002-1837-2254
citation:
  ama: Ahmed QA. <i>Hardware Trojans in Reconfigurable Computing</i>.  Paderborn University,
    Paderborn, Germany; 2022. doi:<a href="https://doi.org/10.17619/UNIPB/1-1271">10.17619/UNIPB/1-1271</a>
  apa: Ahmed, Q. A. (2022). <i>Hardware Trojans in Reconfigurable Computing</i>.  Paderborn
    University, Paderborn, Germany. <a href="https://doi.org/10.17619/UNIPB/1-1271">https://doi.org/10.17619/UNIPB/1-1271</a>
  bibtex: '@book{Ahmed_2022, place={Paderborn}, title={Hardware Trojans in Reconfigurable
    Computing}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-1271">10.17619/UNIPB/1-1271</a>},
    publisher={ Paderborn University, Paderborn, Germany}, author={Ahmed, Qazi Arbab},
    year={2022} }'
  chicago: 'Ahmed, Qazi Arbab. <i>Hardware Trojans in Reconfigurable Computing</i>.
    Paderborn:  Paderborn University, Paderborn, Germany, 2022. <a href="https://doi.org/10.17619/UNIPB/1-1271">https://doi.org/10.17619/UNIPB/1-1271</a>.'
  ieee: 'Q. A. Ahmed, <i>Hardware Trojans in Reconfigurable Computing</i>. Paderborn:  Paderborn
    University, Paderborn, Germany, 2022.'
  mla: Ahmed, Qazi Arbab. <i>Hardware Trojans in Reconfigurable Computing</i>.  Paderborn
    University, Paderborn, Germany, 2022, doi:<a href="https://doi.org/10.17619/UNIPB/1-1271">10.17619/UNIPB/1-1271</a>.
  short: Q.A. Ahmed, Hardware Trojans in Reconfigurable Computing,  Paderborn University,
    Paderborn, Germany, Paderborn, 2022.
date_created: 2022-02-07T14:02:36Z
date_updated: 2022-11-30T13:39:01Z
ddc:
- '004'
department:
- _id: '78'
doi: 10.17619/UNIPB/1-1271
has_accepted_license: '1'
keyword:
- FPGA Security
- Hardware Trojans
- Bitstream-level Trojans
- Bitstream Verification
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: "\turn:nbn:de:hbz:466:2-40303"
oa: '1'
place: Paderborn
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '14'
  name: 'SFB 901 - C2: SFB 901 - Subproject C2'
publication_status: published
publisher: ' Paderborn University, Paderborn, Germany'
status: public
supervisor:
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
title: Hardware Trojans in Reconfigurable Computing
type: dissertation
user_id: '477'
year: '2022'
...
---
_id: '33250'
author:
- first_name: Daniel
  full_name: Szopinski, Daniel
  id: '36372'
  last_name: Szopinski
- first_name: Lorenzo
  full_name: Massa, Lorenzo
  last_name: Massa
- first_name: Thomas
  full_name: John, Thomas
  last_name: John
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
- first_name: Christopher
  full_name: Tucci, Christopher
  last_name: Tucci
citation:
  ama: 'Szopinski D, Massa L, John T, Kundisch D, Tucci C. Modeling Business Models:
    A cross-disciplinary Analysis of Business Model Modeling Languages and Directions
    for Future Research. <i>Communications of the Association for Information Systems</i>.
    2022;51:774-841.'
  apa: 'Szopinski, D., Massa, L., John, T., Kundisch, D., &#38; Tucci, C. (2022).
    Modeling Business Models: A cross-disciplinary Analysis of Business Model Modeling
    Languages and Directions for Future Research. <i>Communications of the Association
    for Information Systems</i>, <i>51</i>, 774–841.'
  bibtex: '@article{Szopinski_Massa_John_Kundisch_Tucci_2022, title={Modeling Business
    Models: A cross-disciplinary Analysis of Business Model Modeling Languages and
    Directions for Future Research}, volume={51}, journal={Communications of the Association
    for Information Systems}, author={Szopinski, Daniel and Massa, Lorenzo and John,
    Thomas and Kundisch, Dennis and Tucci, Christopher}, year={2022}, pages={774–841}
    }'
  chicago: 'Szopinski, Daniel, Lorenzo Massa, Thomas John, Dennis Kundisch, and Christopher
    Tucci. “Modeling Business Models: A Cross-Disciplinary Analysis of Business Model
    Modeling Languages and Directions for Future Research.” <i>Communications of the
    Association for Information Systems</i> 51 (2022): 774–841.'
  ieee: 'D. Szopinski, L. Massa, T. John, D. Kundisch, and C. Tucci, “Modeling Business
    Models: A cross-disciplinary Analysis of Business Model Modeling Languages and
    Directions for Future Research,” <i>Communications of the Association for Information
    Systems</i>, vol. 51, pp. 774–841, 2022.'
  mla: 'Szopinski, Daniel, et al. “Modeling Business Models: A Cross-Disciplinary
    Analysis of Business Model Modeling Languages and Directions for Future Research.”
    <i>Communications of the Association for Information Systems</i>, vol. 51, 2022,
    pp. 774–841.'
  short: D. Szopinski, L. Massa, T. John, D. Kundisch, C. Tucci, Communications of
    the Association for Information Systems 51 (2022) 774–841.
date_created: 2022-09-02T10:05:24Z
date_updated: 2022-12-21T19:08:47Z
ddc:
- '000'
department:
- _id: '276'
file:
- access_level: closed
  content_type: application/pdf
  creator: dsz
  date_created: 2022-12-21T19:08:31Z
  date_updated: 2022-12-21T19:08:31Z
  file_id: '34788'
  file_name: Modeling Business Models_ A cross-disciplinary Analysis of Busine.pdf
  file_size: 3579895
  relation: main_file
  success: 1
file_date_updated: 2022-12-21T19:08:31Z
has_accepted_license: '1'
intvolume: '        51'
language:
- iso: eng
page: 774-841
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '17'
  name: 'SFB 901 - C5: SFB 901 - Subproject C5'
publication: Communications of the Association for Information Systems
publication_status: published
status: public
title: 'Modeling Business Models: A cross-disciplinary Analysis of Business Model
  Modeling Languages and Directions for Future Research'
type: journal_article
user_id: '36372'
volume: 51
year: '2022'
...
---
_id: '29220'
abstract:
- lang: eng
  text: "Modern services often comprise several components, such as chained virtual
    network functions, microservices, or\r\nmachine learning functions. Providing
    such services requires to decide how often to instantiate each component, where
    to place these instances in the network, how to chain them and route traffic through
    them. \r\nTo overcome limitations of conventional, hardwired heuristics, deep
    reinforcement learning (DRL) approaches for self-learning network and service
    management have emerged recently. These model-free DRL approaches are more flexible
    but typically learn tabula rasa, i.e., disregard existing understanding of networks,
    services, and their coordination. \r\n\r\nInstead, we propose FutureCoord, a novel
    model-based AI approach that leverages existing understanding of networks and
    services for more efficient and effective coordination without time-intensive
    training. FutureCoord combines Monte Carlo Tree Search with a stochastic traffic
    model. This allows FutureCoord to estimate the impact of future incoming traffic
    and effectively optimize long-term effects, taking fluctuating demand and Quality
    of Service (QoS) requirements into account. Our extensive evaluation based on
    real-world network topologies, services, and traffic traces indicates that FutureCoord
    clearly outperforms state-of-the-art model-free and model-based approaches with
    up to 51% higher flow success ratios."
author:
- first_name: Stefan
  full_name: Werner, Stefan
  last_name: Werner
- first_name: Stefan Balthasar
  full_name: Schneider, Stefan Balthasar
  id: '35343'
  last_name: Schneider
  orcid: 0000-0001-8210-4011
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Werner S, Schneider SB, Karl H. Use What You Know: Network and Service Coordination
    Beyond Certainty. In: <i>IEEE/IFIP Network Operations and Management Symposium
    (NOMS)</i>. IEEE; 2022.'
  apa: 'Werner, S., Schneider, S. B., &#38; Karl, H. (2022). Use What You Know: Network
    and Service Coordination Beyond Certainty. <i>IEEE/IFIP Network Operations and
    Management Symposium (NOMS)</i>. IEEE/IFIP Network Operations and Management Symposium
    (NOMS), Budapest.'
  bibtex: '@inproceedings{Werner_Schneider_Karl_2022, title={Use What You Know: Network
    and Service Coordination Beyond Certainty}, booktitle={IEEE/IFIP Network Operations
    and Management Symposium (NOMS)}, publisher={IEEE}, author={Werner, Stefan and
    Schneider, Stefan Balthasar and Karl, Holger}, year={2022} }'
  chicago: 'Werner, Stefan, Stefan Balthasar Schneider, and Holger Karl. “Use What
    You Know: Network and Service Coordination Beyond Certainty.” In <i>IEEE/IFIP
    Network Operations and Management Symposium (NOMS)</i>. IEEE, 2022.'
  ieee: 'S. Werner, S. B. Schneider, and H. Karl, “Use What You Know: Network and
    Service Coordination Beyond Certainty,” presented at the IEEE/IFIP Network Operations
    and Management Symposium (NOMS), Budapest, 2022.'
  mla: 'Werner, Stefan, et al. “Use What You Know: Network and Service Coordination
    Beyond Certainty.” <i>IEEE/IFIP Network Operations and Management Symposium (NOMS)</i>,
    IEEE, 2022.'
  short: 'S. Werner, S.B. Schneider, H. Karl, in: IEEE/IFIP Network Operations and
    Management Symposium (NOMS), IEEE, 2022.'
conference:
  end_date: 2022-04-29
  location: Budapest
  name: IEEE/IFIP Network Operations and Management Symposium (NOMS)
  start_date: 2022-04-25
date_created: 2022-01-11T08:43:26Z
date_updated: 2022-01-11T08:44:04Z
ddc:
- '004'
department:
- _id: '75'
file:
- access_level: open_access
  content_type: application/pdf
  creator: stschn
  date_created: 2022-01-11T08:39:57Z
  date_updated: 2022-01-11T08:39:57Z
  file_id: '29222'
  file_name: author_version.pdf
  file_size: 528653
  relation: main_file
file_date_updated: 2022-01-11T08:39:57Z
has_accepted_license: '1'
keyword:
- network management
- service management
- AI
- Monte Carlo Tree Search
- model-based
- QoS
language:
- iso: eng
oa: '1'
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
publication: IEEE/IFIP Network Operations and Management Symposium (NOMS)
publisher: IEEE
quality_controlled: '1'
status: public
title: 'Use What You Know: Network and Service Coordination Beyond Certainty'
type: conference
user_id: '35343'
year: '2022'
...
---
_id: '29763'
abstract:
- lang: eng
  text: "Modern-day communication has become more and more digital. While this comes
    with many advantages such as a more efficient economy, it has also created more
    and more opportunities for various adversaries to manipulate communication or
    eavesdrop on it. The Snowden revelations in 2013 further highlighted the seriousness
    of these threats. To protect the communication of people, companies, and states
    from such threats, we require cryptography with strong security guarantees.\r\nDifferent
    applications may require different security properties from cryptographic schemes.
    For most applications, however, so-called adaptive security is considered a reasonable
    minimal requirement of security. Cryptographic schemes with adaptive security
    remain secure in the presence of an adversary that can corrupt communication partners
    to respond to messages of the adversaries choice, while the adversary may choose
    the messages based on previously observed interactions.\r\nWhile cryptography
    is associated the most with encryption, this is only one of many primitives that
    are essential for the security of digital interactions. This thesis presents novel
    identity-based encryption (IBE) schemes and verifiable random functions (VRFs)
    that achieve adaptive security as outlined above. Moreover, the cryptographic
    schemes presented in this thesis are proven secure in the standard model. That
    is without making use of idealized models like the random oracle model."
author:
- first_name: David
  full_name: Niehues, David
  id: '36113'
  last_name: Niehues
citation:
  ama: Niehues D. <i>More Efficient Techniques for Adaptively-Secure Cryptography</i>.;
    2022. doi:<a href="https://doi.org/10.25926/rdtq-jw45">10.25926/rdtq-jw45</a>
  apa: Niehues, D. (2022). <i>More Efficient Techniques for Adaptively-Secure Cryptography</i>.
    <a href="https://doi.org/10.25926/rdtq-jw45">https://doi.org/10.25926/rdtq-jw45</a>
  bibtex: '@book{Niehues_2022, title={More Efficient Techniques for Adaptively-Secure
    Cryptography}, DOI={<a href="https://doi.org/10.25926/rdtq-jw45">10.25926/rdtq-jw45</a>},
    author={Niehues, David}, year={2022} }'
  chicago: Niehues, David. <i>More Efficient Techniques for Adaptively-Secure Cryptography</i>,
    2022. <a href="https://doi.org/10.25926/rdtq-jw45">https://doi.org/10.25926/rdtq-jw45</a>.
  ieee: D. Niehues, <i>More Efficient Techniques for Adaptively-Secure Cryptography</i>.
    2022.
  mla: Niehues, David. <i>More Efficient Techniques for Adaptively-Secure Cryptography</i>.
    2022, doi:<a href="https://doi.org/10.25926/rdtq-jw45">10.25926/rdtq-jw45</a>.
  short: D. Niehues, More Efficient Techniques for Adaptively-Secure Cryptography,
    2022.
date_created: 2022-02-07T13:29:07Z
date_updated: 2022-02-07T13:32:28Z
ddc:
- '000'
department:
- _id: '558'
doi: 10.25926/rdtq-jw45
file:
- access_level: closed
  content_type: application/pdf
  creator: davnie
  date_created: 2022-02-07T13:26:05Z
  date_updated: 2022-02-07T13:26:05Z
  file_id: '29764'
  file_name: de2107.pdf
  file_size: 1542089
  relation: main_file
  success: 1
file_date_updated: 2022-02-07T13:26:05Z
has_accepted_license: '1'
keyword:
- public-key cryptography
- lattices
- pairings
- verifiable random functions
- identity-based encryption
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://elpub.bib.uni-wuppertal.de/servlets/DerivateServlet/Derivate-14686/de2107.pdf
oa: '1'
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
publication_status: published
status: public
supervisor:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Anja
  full_name: Lehmann, Anja
  last_name: Lehmann
title: More Efficient Techniques for Adaptively-Secure Cryptography
type: dissertation
user_id: '36113'
year: '2022'
...
---
_id: '33240'
author:
- first_name: Thorsten
  full_name: Götte, Thorsten
  id: '34727'
  last_name: Götte
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Götte T, Scheideler C. Brief Announcement: The (Limited) Power of Multiple
    Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience
    through Collusion. In: Agrawal K, Lee I-TA, eds. <i>SPAA ’22: 34th ACM Symposium
    on Parallelism in Algorithms and Architectures, Philadelphia, PA, USA, July 11
    - 14, 2022</i>. ACM; 2022:99–101. doi:<a href="https://doi.org/10.1145/3490148.3538556">10.1145/3490148.3538556</a>'
  apa: 'Götte, T., &#38; Scheideler, C. (2022). Brief Announcement: The (Limited)
    Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved
    Resilience through Collusion. In K. Agrawal &#38; I.-T. A. Lee (Eds.), <i>SPAA
    ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia,
    PA, USA, July 11 - 14, 2022</i> (pp. 99–101). ACM. <a href="https://doi.org/10.1145/3490148.3538556">https://doi.org/10.1145/3490148.3538556</a>'
  bibtex: '@inproceedings{Götte_Scheideler_2022, title={Brief Announcement: The (Limited)
    Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved
    Resilience through Collusion}, DOI={<a href="https://doi.org/10.1145/3490148.3538556">10.1145/3490148.3538556</a>},
    booktitle={SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures,
    Philadelphia, PA, USA, July 11 - 14, 2022}, publisher={ACM}, author={Götte, Thorsten
    and Scheideler, Christian}, editor={Agrawal, Kunal and Lee, I-Ting Angelina},
    year={2022}, pages={99–101} }'
  chicago: 'Götte, Thorsten, and Christian Scheideler. “Brief Announcement: The (Limited)
    Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved
    Resilience through Collusion.” In <i>SPAA ’22: 34th ACM Symposium on Parallelism
    in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022</i>,
    edited by Kunal Agrawal and I-Ting Angelina Lee, 99–101. ACM, 2022. <a href="https://doi.org/10.1145/3490148.3538556">https://doi.org/10.1145/3490148.3538556</a>.'
  ieee: 'T. Götte and C. Scheideler, “Brief Announcement: The (Limited) Power of Multiple
    Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience
    through Collusion,” in <i>SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms
    and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022</i>, 2022, pp. 99–101,
    doi: <a href="https://doi.org/10.1145/3490148.3538556">10.1145/3490148.3538556</a>.'
  mla: 'Götte, Thorsten, and Christian Scheideler. “Brief Announcement: The (Limited)
    Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved
    Resilience through Collusion.” <i>SPAA ’22: 34th ACM Symposium on Parallelism
    in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022</i>,
    edited by Kunal Agrawal and I-Ting Angelina Lee, ACM, 2022, pp. 99–101, doi:<a
    href="https://doi.org/10.1145/3490148.3538556">10.1145/3490148.3538556</a>.'
  short: 'T. Götte, C. Scheideler, in: K. Agrawal, I.-T.A. Lee (Eds.), SPAA ’22: 34th
    ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia, PA,
    USA, July 11 - 14, 2022, ACM, 2022, pp. 99–101.'
date_created: 2022-09-01T07:55:00Z
date_updated: 2022-09-01T07:57:53Z
department:
- _id: '79'
doi: 10.1145/3490148.3538556
editor:
- first_name: Kunal
  full_name: Agrawal, Kunal
  last_name: Agrawal
- first_name: I-Ting Angelina
  full_name: Lee, I-Ting Angelina
  last_name: Lee
language:
- iso: eng
page: 99–101
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
publication: 'SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures,
  Philadelphia, PA, USA, July 11 - 14, 2022'
publisher: ACM
status: public
title: 'Brief Announcement: The (Limited) Power of Multiple Identities: Asynchronous
  Byzantine Reliable Broadcast with Improved Resilience through Collusion'
type: conference
user_id: '15504'
year: '2022'
...
---
_id: '29872'
author:
- first_name: Marten
  full_name: Maack, Marten
  id: '88252'
  last_name: Maack
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Simon
  full_name: Pukrop, Simon
  id: '44428'
  last_name: Pukrop
citation:
  ama: 'Maack M, Meyer auf der Heide F, Pukrop S. Server Cloud Scheduling. In: <i>Approximation
    and Online Algorithms</i>. Springer International Publishing; 2022. doi:<a href="https://doi.org/10.1007/978-3-030-92702-8_10">10.1007/978-3-030-92702-8_10</a>'
  apa: Maack, M., Meyer auf der Heide, F., &#38; Pukrop, S. (2022). Server Cloud Scheduling.
    In <i>Approximation and Online Algorithms</i>. Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-030-92702-8_10">https://doi.org/10.1007/978-3-030-92702-8_10</a>
  bibtex: '@inbook{Maack_Meyer auf der Heide_Pukrop_2022, place={Cham}, title={Server
    Cloud Scheduling}, DOI={<a href="https://doi.org/10.1007/978-3-030-92702-8_10">10.1007/978-3-030-92702-8_10</a>},
    booktitle={Approximation and Online Algorithms}, publisher={Springer International
    Publishing}, author={Maack, Marten and Meyer auf der Heide, Friedhelm and Pukrop,
    Simon}, year={2022} }'
  chicago: 'Maack, Marten, Friedhelm Meyer auf der Heide, and Simon Pukrop. “Server
    Cloud Scheduling.” In <i>Approximation and Online Algorithms</i>. Cham: Springer
    International Publishing, 2022. <a href="https://doi.org/10.1007/978-3-030-92702-8_10">https://doi.org/10.1007/978-3-030-92702-8_10</a>.'
  ieee: 'M. Maack, F. Meyer auf der Heide, and S. Pukrop, “Server Cloud Scheduling,”
    in <i>Approximation and Online Algorithms</i>, Cham: Springer International Publishing,
    2022.'
  mla: Maack, Marten, et al. “Server Cloud Scheduling.” <i>Approximation and Online
    Algorithms</i>, Springer International Publishing, 2022, doi:<a href="https://doi.org/10.1007/978-3-030-92702-8_10">10.1007/978-3-030-92702-8_10</a>.
  short: 'M. Maack, F. Meyer auf der Heide, S. Pukrop, in: Approximation and Online
    Algorithms, Springer International Publishing, Cham, 2022.'
date_created: 2022-02-18T09:31:54Z
date_updated: 2022-09-27T15:03:13Z
department:
- _id: '63'
doi: 10.1007/978-3-030-92702-8_10
language:
- iso: eng
place: Cham
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '16'
  name: 'SFB 901 - C4: SFB 901 - Subproject C4'
publication: Approximation and Online Algorithms
publication_identifier:
  isbn:
  - '9783030927011'
  - '9783030927028'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Server Cloud Scheduling
type: book_chapter
user_id: '44428'
year: '2022'
...
---
_id: '23566'
author:
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
- first_name: J.
  full_name: Muntermann, J.
  last_name: Muntermann
- first_name: A. M.
  full_name: Oberländer, A. M.
  last_name: Oberländer
- first_name: D.
  full_name: Rau, D.
  last_name: Rau
- first_name: M.
  full_name: Röglinger, M.
  last_name: Röglinger
- first_name: T.
  full_name: Schoormann, T.
  last_name: Schoormann
- first_name: Daniel
  full_name: Szopinski, Daniel
  id: '36372'
  last_name: Szopinski
citation:
  ama: 'Kundisch D, Muntermann J, Oberländer AM, et al. An update for taxonomy designers:
    Methodological guidance from information systems research. <i>Business &#38; Information
    Systems Engineering</i>. 2022;64(4):421-439.'
  apa: 'Kundisch, D., Muntermann, J., Oberländer, A. M., Rau, D., Röglinger, M., Schoormann,
    T., &#38; Szopinski, D. (2022). An update for taxonomy designers: Methodological
    guidance from information systems research. <i>Business &#38; Information Systems
    Engineering</i>, <i>64</i>(4), 421–439.'
  bibtex: '@article{Kundisch_Muntermann_Oberländer_Rau_Röglinger_Schoormann_Szopinski_2022,
    title={An update for taxonomy designers: Methodological guidance from information
    systems research}, volume={64}, number={4}, journal={Business &#38; Information
    Systems Engineering}, author={Kundisch, Dennis and Muntermann, J. and Oberländer,
    A. M. and Rau, D. and Röglinger, M. and Schoormann, T. and Szopinski, Daniel},
    year={2022}, pages={421–439} }'
  chicago: 'Kundisch, Dennis, J. Muntermann, A. M. Oberländer, D. Rau, M. Röglinger,
    T. Schoormann, and Daniel Szopinski. “An Update for Taxonomy Designers: Methodological
    Guidance from Information Systems Research.” <i>Business &#38; Information Systems
    Engineering</i> 64, no. 4 (2022): 421–39.'
  ieee: 'D. Kundisch <i>et al.</i>, “An update for taxonomy designers: Methodological
    guidance from information systems research,” <i>Business &#38; Information Systems
    Engineering</i>, vol. 64, no. 4, pp. 421–439, 2022.'
  mla: 'Kundisch, Dennis, et al. “An Update for Taxonomy Designers: Methodological
    Guidance from Information Systems Research.” <i>Business &#38; Information Systems
    Engineering</i>, vol. 64, no. 4, 2022, pp. 421–39.'
  short: D. Kundisch, J. Muntermann, A.M. Oberländer, D. Rau, M. Röglinger, T. Schoormann,
    D. Szopinski, Business &#38; Information Systems Engineering 64 (2022) 421–439.
date_created: 2021-08-30T10:00:24Z
date_updated: 2022-10-21T12:57:05Z
ddc:
- '000'
department:
- _id: '276'
file:
- access_level: closed
  content_type: application/pdf
  creator: abursig
  date_created: 2021-11-08T12:24:31Z
  date_updated: 2021-11-08T12:24:31Z
  file_id: '27282'
  file_name: Kundisch2021_Article_AnUpdateForTaxonomyDesigners.pdf
  file_size: 511483
  relation: main_file
  success: 1
file_date_updated: 2021-11-08T12:24:31Z
has_accepted_license: '1'
intvolume: '        64'
issue: '4'
language:
- iso: eng
page: 421-439
project:
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '17'
  name: SFB 901 - Subproject C5
publication: Business & Information Systems Engineering
publication_status: published
status: public
title: 'An update for taxonomy designers: Methodological guidance from information
  systems research'
type: journal_article
user_id: '16205'
volume: 64
year: '2022'
...
---
_id: '30987'
author:
- first_name: Irina
  full_name: Kostitsyna, Irina
  last_name: Kostitsyna
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
- first_name: Daniel
  full_name: Warner, Daniel
  id: '3902'
  last_name: Warner
citation:
  ama: 'Kostitsyna I, Scheideler C, Warner D. Brief Announcement: Fault-Tolerant Shape
    Formation in the Amoebot Model. In: Aspnes J, Michail O, eds. <i>1st Symposium
    on Algorithmic Foundations of Dynamic Networks (SAND 2022)</i>. Vol 221. Leibniz
    International Proceedings in Informatics (LIPIcs). Schloss Dagstuhl – Leibniz-Zentrum
    für Informatik; 2022:23:1–23:3. doi:<a href="https://doi.org/10.4230/LIPIcs.SAND.2022.23">10.4230/LIPIcs.SAND.2022.23</a>'
  apa: 'Kostitsyna, I., Scheideler, C., &#38; Warner, D. (2022). Brief Announcement:
    Fault-Tolerant Shape Formation in the Amoebot Model. In J. Aspnes &#38; O. Michail
    (Eds.), <i>1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND
    2022)</i> (Vol. 221, p. 23:1–23:3). Schloss Dagstuhl – Leibniz-Zentrum für Informatik.
    <a href="https://doi.org/10.4230/LIPIcs.SAND.2022.23">https://doi.org/10.4230/LIPIcs.SAND.2022.23</a>'
  bibtex: '@inproceedings{Kostitsyna_Scheideler_Warner_2022, place={Dagstuhl, Germany},
    series={Leibniz International Proceedings in Informatics (LIPIcs)}, title={Brief
    Announcement: Fault-Tolerant Shape Formation in the Amoebot Model}, volume={221},
    DOI={<a href="https://doi.org/10.4230/LIPIcs.SAND.2022.23">10.4230/LIPIcs.SAND.2022.23</a>},
    booktitle={1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND
    2022)}, publisher={Schloss Dagstuhl – Leibniz-Zentrum für Informatik}, author={Kostitsyna,
    Irina and Scheideler, Christian and Warner, Daniel}, editor={Aspnes, James and
    Michail, Othon}, year={2022}, pages={23:1–23:3}, collection={Leibniz International
    Proceedings in Informatics (LIPIcs)} }'
  chicago: 'Kostitsyna, Irina, Christian Scheideler, and Daniel Warner. “Brief Announcement:
    Fault-Tolerant Shape Formation in the Amoebot Model.” In <i>1st Symposium on Algorithmic
    Foundations of Dynamic Networks (SAND 2022)</i>, edited by James Aspnes and Othon
    Michail, 221:23:1–23:3. Leibniz International Proceedings in Informatics (LIPIcs).
    Dagstuhl, Germany: Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. <a
    href="https://doi.org/10.4230/LIPIcs.SAND.2022.23">https://doi.org/10.4230/LIPIcs.SAND.2022.23</a>.'
  ieee: 'I. Kostitsyna, C. Scheideler, and D. Warner, “Brief Announcement: Fault-Tolerant
    Shape Formation in the Amoebot Model,” in <i>1st Symposium on Algorithmic Foundations
    of Dynamic Networks (SAND 2022)</i>, 2022, vol. 221, p. 23:1–23:3, doi: <a href="https://doi.org/10.4230/LIPIcs.SAND.2022.23">10.4230/LIPIcs.SAND.2022.23</a>.'
  mla: 'Kostitsyna, Irina, et al. “Brief Announcement: Fault-Tolerant Shape Formation
    in the Amoebot Model.” <i>1st Symposium on Algorithmic Foundations of Dynamic
    Networks (SAND 2022)</i>, edited by James Aspnes and Othon Michail, vol. 221,
    Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022, p. 23:1–23:3, doi:<a
    href="https://doi.org/10.4230/LIPIcs.SAND.2022.23">10.4230/LIPIcs.SAND.2022.23</a>.'
  short: 'I. Kostitsyna, C. Scheideler, D. Warner, in: J. Aspnes, O. Michail (Eds.),
    1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022), Schloss
    Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2022, p. 23:1–23:3.'
date_created: 2022-05-03T00:13:06Z
date_updated: 2022-10-27T08:45:52Z
department:
- _id: '79'
doi: 10.4230/LIPIcs.SAND.2022.23
editor:
- first_name: James
  full_name: Aspnes, James
  last_name: Aspnes
- first_name: Othon
  full_name: Michail, Othon
  last_name: Michail
intvolume: '       221'
language:
- iso: eng
page: 23:1–23:3
place: Dagstuhl, Germany
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
publication: 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022)
publication_identifier:
  isbn:
  - 978-3-95977-224-2
  issn:
  - 1868-8969
publisher: Schloss Dagstuhl – Leibniz-Zentrum für Informatik
series_title: Leibniz International Proceedings in Informatics (LIPIcs)
status: public
title: 'Brief Announcement: Fault-Tolerant Shape Formation in the Amoebot Model'
type: conference
user_id: '15504'
volume: 221
year: '2022'
...
---
_id: '35189'
abstract:
- lang: eng
  text: The development of new business models is essential for startups to become
    successful, as well as for established companies to explore new business opportunities.
    However, developing such business models is a challenging activity. On the one
    hand, various tasks of business model development methods (BMDMs) need to be performed.
    On the other hand, different decisions for the business models (BMs) need to be
    made. Both have to fit the changeable situation of the organization in which the
    business model is developed to reduce the risk of developing ineffective business
    models with low market penetration. Therefore, the BMDMs and the BMs must be developed
    situation-specific. In this thesis, we conduct a design science research study
    to design a novel approach for the situation-specific development of business
    models with three stages. In the first stage, we create a method repository with
    method fragments for the BMDMs and a canvas model repository with modeling fragments
    for the BMs. Both repositories are filled by the knowledge of domain experts.
    Out of these repositories, in the second stage, situation-specific BMDMs for developing
    situation-specific BMs are composed by a method engineer based on the changeable
    situation of the organization and enacted by a business developer. The business
    developer collaborates with other stakeholders during the enaction to create artifacts.
    Moreover, in the third stage, he receives IT support, provided by development
    support engineers, in different development steps.
author:
- first_name: Sebastian
  full_name: Gottschalk, Sebastian
  id: '47208'
  last_name: Gottschalk
citation:
  ama: Gottschalk S. <i>Situation-Specific Development of Business Models within Software
    Ecosystems</i>. Paderborn University; 2022. doi:<a href="https://doi.org/10.17619/UNIPB/1-1644">10.17619/UNIPB/1-1644</a>
  apa: Gottschalk, S. (2022). <i>Situation-specific Development of Business Models
    within Software Ecosystems</i>. Paderborn University. <a href="https://doi.org/10.17619/UNIPB/1-1644">https://doi.org/10.17619/UNIPB/1-1644</a>
  bibtex: '@book{Gottschalk_2022, place={Paderborn}, title={Situation-specific Development
    of Business Models within Software Ecosystems}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-1644">10.17619/UNIPB/1-1644</a>},
    publisher={Paderborn University}, author={Gottschalk, Sebastian}, year={2022}
    }'
  chicago: 'Gottschalk, Sebastian. <i>Situation-Specific Development of Business Models
    within Software Ecosystems</i>. Paderborn: Paderborn University, 2022. <a href="https://doi.org/10.17619/UNIPB/1-1644">https://doi.org/10.17619/UNIPB/1-1644</a>.'
  ieee: 'S. Gottschalk, <i>Situation-specific Development of Business Models within
    Software Ecosystems</i>. Paderborn: Paderborn University, 2022.'
  mla: Gottschalk, Sebastian. <i>Situation-Specific Development of Business Models
    within Software Ecosystems</i>. Paderborn University, 2022, doi:<a href="https://doi.org/10.17619/UNIPB/1-1644">10.17619/UNIPB/1-1644</a>.
  short: S. Gottschalk, Situation-Specific Development of Business Models within Software
    Ecosystems, Paderborn University, Paderborn, 2022.
date_created: 2023-01-04T09:05:58Z
date_updated: 2023-01-09T12:37:15Z
department:
- _id: '66'
- _id: '534'
doi: 10.17619/UNIPB/1-1644
language:
- iso: eng
place: Paderborn
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '17'
  name: 'SFB 901 - C5: SFB 901 - Subproject C5'
publisher: Paderborn University
status: public
supervisor:
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
title: Situation-specific Development of Business Models within Software Ecosystems
type: dissertation
user_id: '47208'
year: '2022'
...
---
_id: '34962'
author:
- first_name: A
  full_name: Anonymous, A
  last_name: Anonymous
citation:
  ama: Anonymous A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.;
    2022.
  apa: Anonymous, A. (2022). <i>Evaluating database systems relying on secure multiparty
    computation</i>.
  bibtex: '@book{Anonymous_2022, title={Evaluating database systems relying on secure
    multiparty computation}, author={Anonymous, A}, year={2022} }'
  chicago: Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty
    Computation</i>, 2022.
  ieee: A. Anonymous, <i>Evaluating database systems relying on secure multiparty
    computation</i>. 2022.
  mla: Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.
    2022.
  short: A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation,
    2022.
date_created: 2022-12-24T00:14:34Z
date_updated: 2023-01-10T10:31:35Z
department:
- _id: '34'
- _id: '64'
language:
- iso: eng
project:
- _id: '1'
  name: 'SFB 901: SFB 901'
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Evaluating database systems relying on secure multiparty computation
type: bachelorsthesis
user_id: '41047'
year: '2022'
...
