@inproceedings{6637,
  author       = {{Krauter, Stefan and Wendlandt, S. and Süthoff, L.  and  Berendes, S. and Teubner, J.  and  Podlowski, L. and  Berghold, J. and Grunow, Paul}},
  booktitle    = {{Proceedings of the 33rd European Photovoltaic Solar Energy Conference, Amsterdam, (Niederlande), 25.-29. Sept. 2017}},
  location     = {{Aḿsterdam}},
  title        = {{{Advanced PV Module Hot Spot Characterisation}}},
  year         = {{2017}},
}

@inproceedings{6638,
  author       = {{Krauter, Stefan}},
  booktitle    = {{VDE-Proceedings of NEIS 2017 – Conference on Sustainable Energy Supply and Energy Storage Systems by IEEE-PES. Hamburg (Deutschland), 21.–22. September, 2017.}},
  location     = {{Hamburg}},
  title        = {{{Comparison of Conversion Efficiencies and Energy Yields of Micro-Inverters for Photovoltaic Modules}}},
  year         = {{2017}},
}

@inproceedings{6639,
  author       = {{Krauter, Stefan and Ameli, Ali}},
  booktitle    = {{VDE-Proceedings of NEIS 2017 – Conference on Sustainable Energy Supply and Energy Storage Systems by IEEE-PES. Hamburg (Deutschland), 21.–22. September, 2017.}},
  location     = {{Hamburg}},
  title        = {{{Smart Charging Management System of Plugged-in EVs for Optimal Operation of Future Power Systems.}}},
  year         = {{2017}},
}

@inproceedings{6640,
  author       = {{Krauter, Stefan}},
  booktitle    = {{Proceedings of the 11th International Conference for Renewable Energy Storage, 14-16 March 2017, Düsseldorf, Germany.}},
  location     = {{Düsseldorf, Germany.}},
  title        = {{{Minimizing storage costs: Simple and effective methods to match PV with grid load, including shift of holiday period}}},
  year         = {{2017}},
}

@inproceedings{6641,
  author       = {{Khatibi, Arash and Bendfeld, Jörg and Bermpohl, Wolfgang and Krauter, Stefan}},
  booktitle    = {{Proceedings of the 33rd European Photovoltaic Solar Energy Conference, Amsterdam, (Niederlande), 25.-29. Sept. 2017}},
  location     = {{Amsterdam}},
  title        = {{{Introduction of an Advanced Method for Testing of Battery Charge Controllers for Off-Grid PV Systems}}},
  year         = {{2017}},
}

@inproceedings{6642,
  author       = {{Khatibi, Arash and Bendfeld, Jörg and Bermpohl, Wolfgang and Krauter, Stefan}},
  booktitle    = {{Proceedings of the 33rd European Photovoltaic Solar Energy Conference, Amsterdam, (Niederlande), 25.-29. Sept. 2017}},
  location     = {{Amsterdam}},
  title        = {{{Testing and Analysis of Battery Charge Controllers for Off-Grid PV Systems}}},
  year         = {{2017}},
}

@misc{67,
  author       = {{Jürgens, Mirko}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Provably Secure Key-Derivation-Functions for Certain Types of Applications}}},
  year         = {{2017}},
}

@article{6725,
  author       = {{Czerwinski, Wojciech and Martens, Wim and van Rooijen, Lorijn and Zeitoun, Marc and Zetzsche, Georg}},
  journal      = {{Discrete Mathematics & Theoretical Computer Science}},
  number       = {{4}},
  title        = {{{A Characterization for Decidable Separability by Piecewise Testable Languages}}},
  doi          = {{10.23638/DMTCS-19-4-1}},
  volume       = {{19}},
  year         = {{2017}},
}

@article{6737,
  author       = {{Wolters, Dennis and Gerth, Christian and Engels, Gregor}},
  journal      = {{Computer Science and Information Systems (ComSIS)}},
  number       = {{2}},
  pages        = {{517--536}},
  title        = {{{Visual Requirements Modeling for Cross-Device Systems}}},
  doi          = {{10.2298/CSIS160930015W}},
  volume       = {{14}},
  year         = {{2017}},
}

@article{6764,
  author       = {{Jovanovikj, Ivan and Sauer, Stefan}},
  journal      = {{Softwaretechnik-Trends, Proceedings of the 19th Workshop Software-Reengineering & Evolution (WSRE) & 8th Workshop Design for Future (DFF)}},
  location     = {{Bad Honnef}},
  number       = {{2}},
  pages        = {{ 50--51 }},
  publisher    = {{Gesellschaft für Informatik e.V., Fachgruppe PARS}},
  title        = {{{Towards a Framework for Constructing Context-Specific Migration Methods for Test Cases}}},
  volume       = {{37}},
  year         = {{2017}},
}

@article{68,
  abstract     = {{Proof-carrying hardware (PCH) is a principle for achieving safety for dynamically reconfigurable hardware systems. The producer of a hardware module spends huge effort when creating a proof for a safety policy. The proof is then transferred as a certificate together with the configuration bitstream to the consumer of the hardware module, who can quickly verify the given proof. Previous work utilized SAT solvers and resolution traces to set up a PCH technology and corresponding tool flows. In this article, we present a novel technology for PCH based on inductive invariants. For sequential circuits, our approach is fundamentally stronger than the previous SAT-based one since we avoid the limitations of bounded unrolling. We contrast our technology to existing ones and show that it fits into previously proposed tool flows. We conduct experiments with four categories of benchmark circuits and report consumer and producer runtime and peak memory consumption, as well as the size of the certificates and the distribution of the workload between producer and consumer. Experiments clearly show that our new induction-based technology is superior for sequential circuits, whereas the previous SAT-based technology is the better choice for combinational circuits.}},
  author       = {{Isenberg, Tobias and Platzner, Marco and Wehrheim, Heike and Wiersema, Tobias}},
  journal      = {{ACM Transactions on Design Automation of Electronic Systems}},
  number       = {{4}},
  pages        = {{61:1----61:23}},
  publisher    = {{ACM}},
  title        = {{{Proof-Carrying Hardware via Inductive Invariants}}},
  doi          = {{10.1145/3054743}},
  year         = {{2017}},
}

@article{680,
  author       = {{Peter, Manuel and Hildebrandt, Andre and Schlickriede, Christian and Gharib, Kimia and Zentgraf, Thomas and Förstner, Jens and Linden, Stefan}},
  issn         = {{1530-6984}},
  journal      = {{Nano Letters}},
  keywords     = {{tet_topic_opticalantenna}},
  number       = {{7}},
  pages        = {{4178--4183}},
  publisher    = {{American Chemical Society (ACS)}},
  title        = {{{Directional Emission from Dielectric Leaky-Wave Nanoantennas}}},
  doi          = {{10.1021/acs.nanolett.7b00966}},
  volume       = {{17}},
  year         = {{2017}},
}

@phdthesis{685,
  author       = {{Jakobs, Marie-Christine}},
  publisher    = {{Universität Paderborn}},
  title        = {{{On-The-Fly Safety Checking - Customizing Program Certification and Program Restructuring}}},
  doi          = {{10.17619/UNIPB/1-104}},
  year         = {{2017}},
}

@article{69,
  abstract     = {{Today, software is traded worldwide on global markets, with apps being downloaded to smartphones within minutes or seconds. This poses, more than ever, the challenge of ensuring safety of software in the face of (1) unknown or untrusted software providers together with (2) resource-limited software consumers. The concept of Proof-Carrying Code (PCC), years ago suggested by Necula, provides one framework for securing the execution of untrusted code. PCC techniques attach safety proofs, constructed by software producers, to code. Based on the assumption that checking proofs is usually much simpler than constructing proofs, software consumers should thus be able to quickly check the safety of software. However, PCC techniques often suffer from the size of certificates (i.e., the attached proofs), making PCC techniques inefficient in practice.In this article, we introduce a new framework for the safe execution of untrusted code called Programs from Proofs (PfP). The basic assumption underlying the PfP technique is the fact that the structure of programs significantly influences the complexity of checking a specific safety property. Instead of attaching proofs to program code, the PfP technique transforms the program into an efficiently checkable form, thus guaranteeing quick safety checks for software consumers. For this transformation, the technique also uses a producer-side automatic proof of safety. More specifically, safety proving for the software producer proceeds via the construction of an abstract reachability graph (ARG) unfolding the control-flow automaton (CFA) up to the degree necessary for simple checking. To this end, we combine different sorts of software analysis: expensive analyses incrementally determining the degree of unfolding, and cheap analyses responsible for safety checking. Out of the abstract reachability graph we generate the new program. In its CFA structure, it is isomorphic to the graph and hence another, this time consumer-side, cheap analysis can quickly determine its safety.Like PCC, Programs from Proofs is a general framework instantiable with different sorts of (expensive and cheap) analysis. Here, we present the general framework and exemplify it by some concrete examples. We have implemented different instantiations on top of the configurable program analysis tool CPAchecker and report on experiments, in particular on comparisons with PCC techniques.}},
  author       = {{Jakobs, Marie-Christine and Wehrheim, Heike}},
  journal      = {{ACM Transactions on Programming Languages and Systems}},
  number       = {{2}},
  pages        = {{7:1--7:56}},
  publisher    = {{ACM}},
  title        = {{{Programs from Proofs: A Framework for the Safe Execution of Untrusted Software}}},
  doi          = {{10.1145/3014427}},
  year         = {{2017}},
}

@misc{695,
  author       = {{Nowack, Joshua}},
  publisher    = {{Universität Paderborn}},
  title        = {{{On-The-Fly Konstruktion zusammenhängender Straßennetze aus gegebenen Einzelteilen}}},
  year         = {{2017}},
}

@book{16444,
  author       = {{Gausemeier, Jürgen and Bodden, Eric and  Dressler, Falko and Dumitrescu, Roman and Meyer auf der Heide, Friedhelm and Scheytt, Christoph and Trächtler, Ansgar}},
  pages        = {{369}},
  title        = {{{Wissenschaftsforum Intelligente Technische Systeme (WInTeSys)}}},
  year         = {{2017}},
}

@inbook{16461,
  author       = {{Bemmann, Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and Riechers, Sören and Schaefer, Johannes Sebastian and Sundermeier, Jannik}},
  booktitle    = {{Structural Information and Communication Complexity}},
  isbn         = {{9783319720494}},
  issn         = {{0302-9743}},
  title        = {{{Monitoring of Domain-Related Problems in Distributed Data Streams}}},
  doi          = {{10.1007/978-3-319-72050-0_13}},
  year         = {{2017}},
}

@article{16540,
  author       = {{Dellnitz, Michael and Klus, Stefan}},
  issn         = {{1468-9367}},
  journal      = {{Dynamical Systems}},
  pages        = {{61--79}},
  title        = {{{Sensing and control in symmetric networks}}},
  doi          = {{10.1080/14689367.2016.1215410}},
  year         = {{2017}},
}

@article{16581,
  author       = {{Dellnitz, Michael and Klus, Stefan and Ziessler, Adrian}},
  issn         = {{1536-0040}},
  journal      = {{SIAM Journal on Applied Dynamical Systems}},
  pages        = {{120--138}},
  title        = {{{A Set-Oriented Numerical Approach for Dynamical Systems with Parameter Uncertainty}}},
  doi          = {{10.1137/16m1072735}},
  year         = {{2017}},
}

@article{16657,
  author       = {{Peitz, Sebastian and Schäfer, Kai and Ober-Blöbaum, Sina and Eckstein, Julian and Köhler, Ulrich and Dellnitz, Michael}},
  issn         = {{2405-8963}},
  journal      = {{IFAC-PapersOnLine}},
  pages        = {{8674--8679}},
  title        = {{{A Multiobjective MPC Approach for Autonomously Driven Electric Vehicles * *This research was funded by the German Federal Ministry of Education and Research (BMBF) within the Leading-Edge Cluster Intelligent Technical Systems OstWestfalenLippe (it’s OWL).}}},
  doi          = {{10.1016/j.ifacol.2017.08.1526}},
  year         = {{2017}},
}

