@inproceedings{252,
  abstract     = {{Video streaming is in high demand by mobile users. In cellular networks, however, the unreliable wireless channel leads to two major problems. Poor channel states degrade video quality and interrupt the playback when a user cannot sufficiently fill its local playout buffer: buffer underruns occur. In contrast, good channel conditions cause common greedy buffering schemes to buffer too much data. Such over-buffering wastes expensive wireless channel capacity. Assuming that we can anticipate future data rates, we plan the quality and download time of video segments ahead. This anticipatory download scheduling avoids buffer underruns by downloading a large number of segments before a drop in available data rate occurs, without wasting wireless capacity by excessive buffering.We developed a practical anticipatory scheduling algorithm for segmented video streaming protocols (e.g., HLS or MPEG DASH). Simulation results and testbed measurements show that our solution essentially eliminates playback interruptions without significantly decreasing video quality.}},
  author       = {{Dräxler, Martin and Blobel, Johannes and Dreimann, Philipp and Valentin, Stefan and Karl, Holger}},
  booktitle    = {{Proceedings of the 2nd International Conference on Networked Systems (NetSys)}},
  pages        = {{1----8}},
  title        = {{{SmarterPhones: Anticipatory Download Scheduling for Wireless Video Streaming}}},
  doi          = {{10.1109/NetSys.2015.7089073}},
  year         = {{2015}},
}

@inproceedings{253,
  abstract     = {{Group signatures, introduced by Chaum and van Heyst [15], are an important primitive in cryptography. In group signature schemes every group member can anonymously sign messages on behalf of the group. In case of disputes a dedicated opening manager is able to trace signatures - he can extract the identity of the producer of a given signature. A formal model for static group signatures schemes and their security is defined by Bellare, Micciancio, and Warinschi [4], the case of dynamic groups is considered by Bellare, Shi, and Zhang [5]. Both models define group signature schemes with a single opening manager. The main difference between these models is that the number of group members in static schemes is fixed, while in dynamic schemes group members can join the group over time.}},
  author       = {{Blömer, Johannes and Juhnke, Jakob and Löken, Nils}},
  booktitle    = {{Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}},
  pages        = {{166--180}},
  title        = {{{Short Group Signatures with Distributed Traceability}}},
  doi          = {{10.1007/978-3-319-32859-1_14}},
  year         = {{2015}},
}

@inproceedings{19959,
  author       = {{Wahby, Mostafa and Hamann, Heiko}},
  booktitle    = {{Applications of Evolutionary Computation (EvoApplications 2015)}},
  title        = {{{On the Tradeoff between Hardware Protection and Optimization Success: A Case Study in Onboard Evolutionary Robotics for Autonomous Parallel Parking}}},
  doi          = {{10.1007/978-3-319-16549-3_61}},
  year         = {{2015}},
}

@inproceedings{19960,
  abstract     = {{Besides the life-as-it-could-be driver of artificial life research there is also the concept of extending natural life by creating hybrids or mixed societies that are built from natural and artificial components. In this paper we motivate and present the research program of the project flora robotica. Our objective is to develop and to investigate closely linked symbiotic relationships between robots and natural plants and to explore the potentials of a plant-robot society able to produce architectural artifacts and living spaces. These robot-plant bio-hybrids create synergies that allow for new functions of plants and robots. They also create novel design opportunities for an architecture that fuses the design and construction phase. The bio-hybrid is an example of mixed societies between 'hard' artificial and 'wet' natural life, which enables an interaction between natural and artificial ecologies. They form an embodied, self-organizing, and distributed cognitive system which is supposed to grow and develop over long periods of time resulting in the creation of meaningful architectural structures. A key idea is to assign equal roles to robots and plants in order to create a highly integrated, symbiotic system. Besides the gain of knowledge, this project has the objective to create a bio-hybrid system with a defined function and application -- growing architectural artifacts.}},
  author       = {{Hamann, Heiko and Wahby, Mostafa and Schmickl, Thomas and Zahadat, Payam and Hofstadler, Daniel and Stoy, Kasper and Risi, Sebastian and Faina, Andres and Veenstra, Frank and Kernbach, Serge and Kuksin, Igor and Kernbach, Olga and Ayres, Phil and Wojtaszek, Przemyslaw}},
  booktitle    = {{Proceedings of the 2015 IEEE Symposium on Artificial Life (IEEE ALIFE'15)}},
  isbn         = {{9781479975600}},
  title        = {{{Flora Robotica - Mixed Societies of Symbiotic Robot-Plant Bio-Hybrids}}},
  doi          = {{10.1109/ssci.2015.158}},
  year         = {{2015}},
}

@article{19962,
  abstract     = {{Recent approaches in evolutionary robotics (ER) propose to generate behavioral diversity in order to evolve desired behaviors more easily. These approaches require the definition of a behavioral distance, which often includes task-specific features and hence a priori knowledge. Alternative methods, which do not explicitly force selective pressure towards diversity (SPTD) but still generate it, are known from the field of artificial life, such as in artificial ecologies (AEs). In this study, we investigate how SPTD is generated without task-specific behavioral features or other forms of a priori knowledge and detect how methods of generating SPTD can be transferred from the domain of AE to ER. A promising finding is that in both types of systems, in systems from ER that generate behavioral diversity and also in the investigated speciation model, selective pressure is generated towards unpopulated regions of search space. In a simple case study we investigate the practical implications of these findings and point to options for transferring the idea of self-organizing SPTD in AEs to the domain of ER.}},
  author       = {{Hamann, Heiko}},
  issn         = {{1064-5462}},
  journal      = {{Artificial Life}},
  pages        = {{464--480}},
  title        = {{{Lessons from Speciation Dynamics: How to Generate Selective Pressure Towards Diversity}}},
  doi          = {{10.1162/artl_a_00186}},
  year         = {{2015}},
}

@inproceedings{19966,
  abstract     = {{Aggregation is a crucial task in swarm robotics to ensure cooperation. We investigate the task of aggregation on an area specified indirectly by certain environmental features, here it is a light distribution. We extend the original BEECLUST algorithm, that implements an aggregation behavior, to an adaptive variant that automatically adapts to any light conditions. We compare these two control algorithms in a number of swarm robot experiments with different light conditions. The improved, adaptive variant is found to be significantly better in the tested setup.}},
  author       = {{Wahby, Mostafa and Weinhold, Alexander and Hamann, Heiko}},
  booktitle    = {{Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)}},
  isbn         = {{9781631901003}},
  title        = {{{Revisiting BEECLUST: Aggregation of Swarm Robots with Adaptiveness to Different Light Settings}}},
  doi          = {{10.4108/eai.3-12-2015.2262877}},
  year         = {{2015}},
}

@inproceedings{19967,
  author       = {{Wahby, Mostafa and Divband Soorati, Mohammad and von Mammen, Sebastian and Hamann, Heiko}},
  booktitle    = {{Proceedings. 25. Computational Intelligence Workshop}},
  title        = {{{Evolution of Controllers for Robot-Plant Bio-Hybdrids: A Simple Case Study Using a Model of Plant Growth and Motion}}},
  year         = {{2015}},
}

@inproceedings{19980,
  abstract     = {{Fitness function design is known to be a critical feature of the evolutionary-robotics approach. Potentially, the complexity of evolving a successful controller for a given task can be reduced by integrating a priori knowledge into the fitness function which complicates the comparability of studies in evolutionary robotics. Still, there are only few publications that study the actual effects of different fitness functions on the robot's performance. In this paper, we follow the fitness function classification of Nelson et al. (2009) and investigate a selection of four classes of fitness functions that require different degrees of a priori knowledge. The robot controllers are evolved in simulation using NEAT and we investigate different tasks including obstacle avoidance and (periodic) goal homing. The best evolved controllers were then post-evaluated by examining their potential for adaptation, determining their convergence rates, and using cross-comparisons based on the different fitness function classes. The results confirm that the integration of more a priori knowledge can simplify a task and show that more attention should be paid to fitness function classes when comparing different studies.}},
  author       = {{Hamann, Heiko and Divband Soorati, Mohammad}},
  booktitle    = {{Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2015)}},
  pages        = {{153--160}},
  publisher    = {{ACM}},
  title        = {{{The Effect of Fitness Function Design on Performance in Evolutionary Robotics: The Influence of a Priori Knowledge}}},
  doi          = {{10.1145/2739480.2754676}},
  year         = {{2015}},
}

@inproceedings{19988,
  author       = {{Hamann, Heiko and Schmickl, Thomas and Zahadat, Payam}},
  booktitle    = {{13th European Conference on Artificial Life (ECAL 2015)}},
  pages        = {{174}},
  publisher    = {{MIT Press}},
  title        = {{{Evolving Collective Behaviors With Diverse But Predictable Sensor States}}},
  doi          = {{10.7551/978-0-262-33027-5-ch036}},
  year         = {{2015}},
}

@inbook{19989,
  author       = {{Hamann, Heiko and Correll, Nikolaus and Kacprzyk, Janusz and Pedrycz, Witold}},
  booktitle    = {{Springer Handbook of Computational Intelligence}},
  pages        = {{1423--1431}},
  publisher    = {{Springer}},
  title        = {{{Probabilistic Modeling of Swarming Systems}}},
  doi          = {{10.1007/978-3-662-43505-2_74}},
  year         = {{2015}},
}

@inproceedings{19990,
  author       = {{Ding, Hongli and Hamann, Heiko}},
  booktitle    = {{First International Symposium on Swarm Behavior and Bio-Inspired Robotics (SWARM 2015)}},
  title        = {{{Dependability in Swarm Robotics: Error Detection and Correction}}},
  year         = {{2015}},
}

@inproceedings{19991,
  author       = {{Hamann, Heiko and Schmickl, Thomas and Kengyel, Daniela and Zahadat, Payam and Radspieler, Gerald and Wotawa, Franz}},
  booktitle    = {{Principles and Practice of Multi-Agent Systems (PRIMA 2015)}},
  pages        = {{201--217}},
  title        = {{{Potential of Heterogeneity in Collective Behaviors: A Case Study on Heterogeneous Swarms}}},
  year         = {{2015}},
}

@article{19992,
  author       = {{Valentini, Gabriele and Hamann, Heiko}},
  issn         = {{1935-3812}},
  journal      = {{Swarm Intelligence}},
  pages        = {{153--176}},
  title        = {{{Time-variant feedback processes in collective decision-making systems: influence and effect of dynamic neighborhood sizes}}},
  doi          = {{10.1007/s11721-015-0108-8}},
  year         = {{2015}},
}

@inproceedings{20005,
  author       = {{Dorigo, Marco and Hamann, Heiko and Valentini, Gabriele}},
  booktitle    = {{Proceedings of the 14th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2015)}},
  title        = {{{Efficient Decision-Making in a Self-Organizing Robot Swarm: On the Speed Versus Accuracy Trade-Off}}},
  year         = {{2015}},
}

@inproceedings{20006,
  author       = {{Dorigo, Marco and Hamann, Heiko and Valentini, Gabriele}},
  booktitle    = {{AAAI-15 Video Proceedings}},
  title        = {{{Self-organized collective decisions in a robot swarm}}},
  year         = {{2015}},
}

@inproceedings{280,
  abstract     = {{The Collaborative Research Centre "On-The-Fly Computing" works on foundations and principles for the vision of the Future Internet. It proposes the paradigm of On-The-Fly Computing, which tackles emerging worldwide service markets. In these markets, service providers trade software, platform, and infrastructure as a service. Service requesters state requirements on services. To satisfy these requirements, the new role of brokers, who are (human) actors building service compositions on the fly, is introduced. Brokers have to specify service compositions formally and comprehensively using a domain-specific language (DSL), and to use service matching for the discovery of the constituent services available in the market. The broker's choice of the DSL and matching approaches influences her success of building compositions as distinctive properties of different service markets play a significant role. In this paper, we propose a new approach of engineering a situation-specific DSL by customizing a comprehensive, modular DSL and its matching for given service market properties. This enables the broker to create market-specific composition specifications and to perform market-specific service matching. As a result, the broker builds service compositions satisfying the requester's requirements more accurately. We evaluated the presented concepts using case studies in service markets for tourism and university management.}},
  author       = {{Arifulina, Svetlana and Platenius, Marie Christin and Mohr, Felix and Engels, Gregor and Schäfer, Wilhelm}},
  booktitle    = {{Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet}},
  pages        = {{333----340}},
  title        = {{{Market-Specific Service Compositions: Specification and Matching}}},
  doi          = {{10.1109/SERVICES.2015.58}},
  year         = {{2015}},
}

@inproceedings{283,
  abstract     = {{Today, software verification is an established analysis method which can provide high guarantees for software safety. However, the resources (time and/or memory) for an exhaustive verification are not always available, and analysis then has to resort to other techniques, like testing. Most often, the already achieved partial verification results arediscarded in this case, and testing has to start from scratch.In this paper, we propose a method for combining verification and testing in which testing only needs to check the residual fraction of an uncompleted verification. To this end, the partial results of a verification run are used to construct a residual program (and residual assertions to be checked on it). The residual program can afterwards be fed into standardtesting tools. The proposed technique is sound modulo the soundness of the testing procedure. Experimental results show that this combinedusage of verification and testing can significantly reduce the effort for the subsequent testing.}},
  author       = {{Czech, Mike and Jakobs, Marie-Christine and Wehrheim, Heike}},
  booktitle    = {{Fundamental Approaches to Software Engineering}},
  editor       = {{Egyed, Alexander and Schaefer, Ina}},
  pages        = {{100--114}},
  title        = {{{Just test what you cannot verify!}}},
  doi          = {{10.1007/978-3-662-46675-9_7}},
  year         = {{2015}},
}

@article{284,
  abstract     = {{In this work, we present the first scalable distributed information system, that is, a system with low storage overhead, that is provably robust against denial-of-service (DoS) attacks by a current insider. We allow a current insider to have complete knowledge about the information system and to have the power to block any ϵ-fraction of its servers by a DoS attack, where ϵ can be chosen up to a constant. The task of the system is to serve any collection of lookup requests with at most one per nonblocked server in an efficient way despite this attack. Previously, scalable solutions were only known for DoS attacks of past insiders, where a past insider only has complete knowledge about some past time point t0 of the information system. Scheideler et al. [Awerbuch and Scheideler 2007; Baumgart et al. 2009] showed that in this case, it is possible to design an information system so that any information that was inserted or last updated after t0 is safe against a DoS attack. But their constructions would not work at all for a current insider. The key idea behind our IRIS system is to make extensive use of coding. More precisely, we present two alternative distributed coding strategies with an at most logarithmic storage overhead that can handle up to a constant fraction of blocked servers.}},
  author       = {{Eikel, Martina and Scheideler, Christian}},
  journal      = {{Transactions on Parallel Computing}},
  number       = {{3}},
  pages        = {{18:1----18:33}},
  publisher    = {{ACM}},
  title        = {{{IRIS: A Robust Information System Against Insider DoS Attacks}}},
  doi          = {{10.1145/2809806}},
  year         = {{2015}},
}

@inproceedings{285,
  abstract     = {{We propose an incremental workflow for the verification of parameterized systems modeled as symmetric networks of timed automata. Starting with a small number of timed automata in the network, a safety property is verified using IC3, a state-of-the-art algorithm based on induction.The result of the verification, an inductive strengthening, is reused proposing a candidate inductive strengthening for a larger network.If the candidate is valid, our main theorem states that the safety property holds for all sizes of the network of timed automata. Otherwise the number of automata is increased and the next iteration is started with a new run of IC3.We propose and thoroughly examine optimizations to our workflow, e.g. Feedback mechanisms to speed up the run of IC3.}},
  author       = {{Isenberg, Tobias}},
  booktitle    = {{Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD)}},
  pages        = {{1--9 }},
  title        = {{{Incremental Inductive Verification of Parameterized Timed Systems}}},
  doi          = {{10.1109/ACSD.2015.13}},
  year         = {{2015}},
}

@misc{286,
  author       = {{Kalde, Benedikt}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup}}},
  year         = {{2015}},
}

