[{"file":[{"file_size":608614,"access_level":"closed","file_id":"1210","file_name":"706-chp_3A10.1007_2F978-3-319-48749-6_42.pdf","date_updated":"2018-03-14T12:21:34Z","creator":"florida","date_created":"2018-03-14T12:21:34Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"publication":"Journal of Combinatorial Optimization","language":[{"iso":"eng"}],"ddc":["040"],"year":"2017","issue":"4","title":"Cost-efficient Scheduling on Machines from the Cloud","date_created":"2017-11-15T10:21:34Z","publisher":"Springer","status":"public","type":"journal_article","file_date_updated":"2018-03-14T12:21:34Z","user_id":"15415","department":[{"_id":"63"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C4","_id":"16"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"706","citation":{"ama":"Mäcker A, Malatyali M, Meyer auf der Heide F, Riechers S. Cost-efficient Scheduling on Machines from the Cloud. <i>Journal of Combinatorial Optimization</i>. 2017;36(4):1168-1194. doi:<a href=\"https://doi.org/10.1007/s10878-017-0198-x\">10.1007/s10878-017-0198-x</a>","chicago":"Mäcker, Alexander, Manuel Malatyali, Friedhelm Meyer auf der Heide, and Sören Riechers. “Cost-Efficient Scheduling on Machines from the Cloud.” <i>Journal of Combinatorial Optimization</i> 36, no. 4 (2017): 1168–94. <a href=\"https://doi.org/10.1007/s10878-017-0198-x\">https://doi.org/10.1007/s10878-017-0198-x</a>.","ieee":"A. Mäcker, M. Malatyali, F. Meyer auf der Heide, and S. Riechers, “Cost-efficient Scheduling on Machines from the Cloud,” <i>Journal of Combinatorial Optimization</i>, vol. 36, no. 4, pp. 1168–1194, 2017.","short":"A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, Journal of Combinatorial Optimization 36 (2017) 1168–1194.","bibtex":"@article{Mäcker_Malatyali_Meyer auf der Heide_Riechers_2017, title={Cost-efficient Scheduling on Machines from the Cloud}, volume={36}, DOI={<a href=\"https://doi.org/10.1007/s10878-017-0198-x\">10.1007/s10878-017-0198-x</a>}, number={4}, journal={Journal of Combinatorial Optimization}, publisher={Springer}, author={Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and Riechers, Sören}, year={2017}, pages={1168–1194} }","mla":"Mäcker, Alexander, et al. “Cost-Efficient Scheduling on Machines from the Cloud.” <i>Journal of Combinatorial Optimization</i>, vol. 36, no. 4, Springer, 2017, pp. 1168–94, doi:<a href=\"https://doi.org/10.1007/s10878-017-0198-x\">10.1007/s10878-017-0198-x</a>.","apa":"Mäcker, A., Malatyali, M., Meyer auf der Heide, F., &#38; Riechers, S. (2017). Cost-efficient Scheduling on Machines from the Cloud. <i>Journal of Combinatorial Optimization</i>, <i>36</i>(4), 1168–1194. <a href=\"https://doi.org/10.1007/s10878-017-0198-x\">https://doi.org/10.1007/s10878-017-0198-x</a>"},"page":"1168-1194","intvolume":"        36","has_accepted_license":"1","doi":"10.1007/s10878-017-0198-x","author":[{"first_name":"Alexander","id":"13536","full_name":"Mäcker, Alexander","last_name":"Mäcker"},{"first_name":"Manuel","full_name":"Malatyali, Manuel","last_name":"Malatyali"},{"full_name":"Meyer auf der Heide, Friedhelm","id":"15523","last_name":"Meyer auf der Heide","first_name":"Friedhelm"},{"first_name":"Sören","last_name":"Riechers","full_name":"Riechers, Sören"}],"volume":36,"date_updated":"2022-01-06T07:03:27Z"},{"year":"2017","citation":{"apa":"Walther, S. (2017). <i>Knowledge-based Verification of Service Compositions</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-307\">https://doi.org/10.17619/UNIPB/1-307</a>","short":"S. Walther, Knowledge-Based Verification of Service Compositions, Universität Paderborn, 2017.","mla":"Walther, Sven. <i>Knowledge-Based Verification of Service Compositions</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-307\">10.17619/UNIPB/1-307</a>.","bibtex":"@book{Walther_2017, title={Knowledge-based Verification of Service Compositions}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-307\">10.17619/UNIPB/1-307</a>}, publisher={Universität Paderborn}, author={Walther, Sven}, year={2017} }","chicago":"Walther, Sven. <i>Knowledge-Based Verification of Service Compositions</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-307\">https://doi.org/10.17619/UNIPB/1-307</a>.","ieee":"S. Walther, <i>Knowledge-based Verification of Service Compositions</i>. Universität Paderborn, 2017.","ama":"Walther S. <i>Knowledge-Based Verification of Service Compositions</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-307\">10.17619/UNIPB/1-307</a>"},"title":"Knowledge-based Verification of Service Compositions","doi":"10.17619/UNIPB/1-307","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:27Z","supervisor":[{"first_name":"Heike","last_name":"Wehrheim","id":"573","full_name":"Wehrheim, Heike"}],"date_created":"2017-11-20T07:59:31Z","author":[{"last_name":"Walther","full_name":"Walther, Sven","first_name":"Sven"}],"status":"public","type":"dissertation","language":[{"iso":"eng"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subproject B3"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"707","user_id":"477","department":[{"_id":"77"}]},{"publication":"2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017","type":"conference","status":"public","department":[{"_id":"75"}],"user_id":"15572","_id":"708","quality_controlled":"1","page":"1--5","citation":{"apa":"Schwabe, A., Rojas, E., &#38; Karl, H. (2017). Minimizing downtimes: Using dynamic reconfiguration and state management in SDN. In <i>2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i> (pp. 1--5). Bologna. <a href=\"https://doi.org/10.1109/NETSOFT.2017.8004209\">https://doi.org/10.1109/NETSOFT.2017.8004209</a>","short":"A. Schwabe, E. Rojas, H. Karl, in: 2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017, 2017, pp. 1--5.","mla":"Schwabe, Arne, et al. “Minimizing Downtimes: Using Dynamic Reconfiguration and State Management in SDN.” <i>2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>, 2017, pp. 1--5, doi:<a href=\"https://doi.org/10.1109/NETSOFT.2017.8004209\">10.1109/NETSOFT.2017.8004209</a>.","bibtex":"@inproceedings{Schwabe_Rojas_Karl_2017, title={Minimizing downtimes: Using dynamic reconfiguration and state management in SDN}, DOI={<a href=\"https://doi.org/10.1109/NETSOFT.2017.8004209\">10.1109/NETSOFT.2017.8004209</a>}, booktitle={2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017}, author={Schwabe, Arne and Rojas, Elisa and Karl, Holger}, year={2017}, pages={1--5} }","chicago":"Schwabe, Arne, Elisa Rojas, and Holger Karl. “Minimizing Downtimes: Using Dynamic Reconfiguration and State Management in SDN.” In <i>2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>, 1--5, 2017. <a href=\"https://doi.org/10.1109/NETSOFT.2017.8004209\">https://doi.org/10.1109/NETSOFT.2017.8004209</a>.","ieee":"A. Schwabe, E. Rojas, and H. Karl, “Minimizing downtimes: Using dynamic reconfiguration and state management in SDN,” in <i>2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>, Bologna, 2017, pp. 1--5.","ama":"Schwabe A, Rojas E, Karl H. Minimizing downtimes: Using dynamic reconfiguration and state management in SDN. In: <i>2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>. ; 2017:1--5. doi:<a href=\"https://doi.org/10.1109/NETSOFT.2017.8004209\">10.1109/NETSOFT.2017.8004209</a>"},"year":"2017","date_created":"2017-11-20T08:29:25Z","author":[{"full_name":"Schwabe, Arne","last_name":"Schwabe","first_name":"Arne"},{"first_name":"Elisa","full_name":"Rojas, Elisa","last_name":"Rojas"},{"last_name":"Karl","id":"126","full_name":"Karl, Holger","first_name":"Holger"}],"date_updated":"2022-01-06T07:03:27Z","conference":{"location":"Bologna"},"doi":"10.1109/NETSOFT.2017.8004209","title":"Minimizing downtimes: Using dynamic reconfiguration and state management in SDN"},{"type":"conference","publication":"Proceedings of the 3rd International Workshop on Software Analytics","abstract":[{"text":"Today, software verification tools have reached the maturity to be used for large scale programs. Different tools perform differently well on varying code. A software developer is hence faced with the problem of choosing a tool appropriate for her program at hand. A ranking of tools on programs could facilitate the choice. Such rankings can, however, so far only be obtained by running all considered tools on the program.In this paper, we present a machine learning approach to predicting rankings of tools on programs. The method builds upon so-called label ranking algorithms, which we complement with appropriate kernels providing a similarity measure for programs. Our kernels employ a graph representation for software source code that mixes elements of control flow and program dependence graphs with abstract syntax trees. Using data sets from the software verification competition SV-COMP, we demonstrate our rank prediction technique to generalize well and achieve a rather high predictive accuracy (rank correlation > 0.6).","lang":"eng"}],"file":[{"file_id":"5271","file_name":"fsews17swan-swanmain1.pdf","access_level":"closed","file_size":822383,"creator":"ups","date_created":"2018-11-02T14:24:29Z","date_updated":"2018-11-02T14:24:29Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B4","_id":"12"},{"name":"SFB 901 - Subproject B2","_id":"10"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"11","name":"SFB 901 - Subproject B3"}],"_id":"71","user_id":"15504","series_title":"SWAN'17","department":[{"_id":"355"},{"_id":"77"}],"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T14:24:29Z","has_accepted_license":"1","year":"2017","citation":{"ama":"Czech M, Hüllermeier E, Jakobs M-C, Wehrheim H. Predicting Rankings of Software Verification Tools. In: <i>Proceedings of the 3rd International Workshop on Software Analytics</i>. SWAN’17. ; 2017:23-26. doi:<a href=\"https://doi.org/10.1145/3121257.3121262\">10.1145/3121257.3121262</a>","ieee":"M. Czech, E. Hüllermeier, M.-C. Jakobs, and H. Wehrheim, “Predicting Rankings of Software Verification Tools,” in <i>Proceedings of the 3rd International Workshop on Software Analytics</i>, 2017, pp. 23–26.","chicago":"Czech, Mike, Eyke Hüllermeier, Marie-Christine Jakobs, and Heike Wehrheim. “Predicting Rankings of Software Verification Tools.” In <i>Proceedings of the 3rd International Workshop on Software Analytics</i>, 23–26. SWAN’17, 2017. <a href=\"https://doi.org/10.1145/3121257.3121262\">https://doi.org/10.1145/3121257.3121262</a>.","apa":"Czech, M., Hüllermeier, E., Jakobs, M.-C., &#38; Wehrheim, H. (2017). Predicting Rankings of Software Verification Tools. In <i>Proceedings of the 3rd International Workshop on Software Analytics</i> (pp. 23–26). <a href=\"https://doi.org/10.1145/3121257.3121262\">https://doi.org/10.1145/3121257.3121262</a>","mla":"Czech, Mike, et al. “Predicting Rankings of Software Verification Tools.” <i>Proceedings of the 3rd International Workshop on Software Analytics</i>, 2017, pp. 23–26, doi:<a href=\"https://doi.org/10.1145/3121257.3121262\">10.1145/3121257.3121262</a>.","bibtex":"@inproceedings{Czech_Hüllermeier_Jakobs_Wehrheim_2017, series={SWAN’17}, title={Predicting Rankings of Software Verification Tools}, DOI={<a href=\"https://doi.org/10.1145/3121257.3121262\">10.1145/3121257.3121262</a>}, booktitle={Proceedings of the 3rd International Workshop on Software Analytics}, author={Czech, Mike and Hüllermeier, Eyke and Jakobs, Marie-Christine and Wehrheim, Heike}, year={2017}, pages={23–26}, collection={SWAN’17} }","short":"M. Czech, E. Hüllermeier, M.-C. Jakobs, H. Wehrheim, in: Proceedings of the 3rd International Workshop on Software Analytics, 2017, pp. 23–26."},"page":"23-26","date_updated":"2022-01-06T07:03:28Z","date_created":"2017-10-17T12:41:05Z","author":[{"last_name":"Czech","full_name":"Czech, Mike","first_name":"Mike"},{"last_name":"Hüllermeier","full_name":"Hüllermeier, Eyke","id":"48129","first_name":"Eyke"},{"first_name":"Marie-Christine","last_name":"Jakobs","full_name":"Jakobs, Marie-Christine"},{"first_name":"Heike","last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573"}],"title":"Predicting Rankings of Software Verification Tools","doi":"10.1145/3121257.3121262"},{"file":[{"creator":"ups","date_created":"2018-11-02T14:22:10Z","date_updated":"2018-11-02T14:22:10Z","access_level":"closed","file_id":"5270","file_name":"07962785.pdf","file_size":821211,"content_type":"application/pdf","relation":"main_file","success":1}],"abstract":[{"text":"In conventional large-scale networks, creation and management of network services are costly and complex tasks that often consume a lot of resources, including time and manpower. Network softwarization and network function virtualization have been introduced to tackle these problems, aiming at decreasing costs and complexity of implementing new services, maintaining the implemented services, and managing available resources in service provisioning platforms and underlying infrastructures. To experience the full potential of these approaches, innovative development support tools and service provisioning environments are needed. To answer these needs, we introduce the architecture of the open-source SONATA system, a service programming, orchestration, and management framework. We present a development toolchain for virtualized network services, fully integrated with a service platform and orchestration system. We introduce the modular and flexible architecture of our system and discuss its main components and features, such as function- and service-specific managers that allow fine-grained service management, slicing support to facilitate multi-tenancy, recursiveness for improved scalability, and full-featured DevOps support.","lang":"eng"}],"publication":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","language":[{"iso":"eng"}],"ddc":["000"],"year":"2017","title":"SONATA: Service programming and orchestration for virtualized software networks","date_created":"2017-11-22T09:42:59Z","publisher":"IEEE","status":"public","type":"conference","file_date_updated":"2018-11-02T14:22:10Z","department":[{"_id":"75"}],"user_id":"31764","_id":"717","project":[{"_id":"25","name":"SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized Networks","grant_number":"671517","call_identifier":"5G PPP Phase 1"},{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"16","name":"SFB 901 - Subproject C4"}],"citation":{"apa":"Dräxler, S., Karl, H., Peuster, M., Razzaghi Kouchaksaraei, H., Bredel, M., Lessmann, J., … Xilouris, G. (2017). SONATA: Service programming and orchestration for virtualized software networks. In <i>2017 IEEE International Conference on Communications Workshops (ICC Workshops)</i>. Paris, France: IEEE. <a href=\"https://doi.org/10.1109/iccw.2017.7962785\">https://doi.org/10.1109/iccw.2017.7962785</a>","short":"S. Dräxler, H. Karl, M. Peuster, H. Razzaghi Kouchaksaraei, M. Bredel, J. Lessmann, T. Soenen, W. Tavernier, S. Mendel-Brin, G. Xilouris, in: 2017 IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, 2017.","mla":"Dräxler, Sevil, et al. “SONATA: Service Programming and Orchestration for Virtualized Software Networks.” <i>2017 IEEE International Conference on Communications Workshops (ICC Workshops)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/iccw.2017.7962785\">10.1109/iccw.2017.7962785</a>.","bibtex":"@inproceedings{Dräxler_Karl_Peuster_Razzaghi Kouchaksaraei_Bredel_Lessmann_Soenen_Tavernier_Mendel-Brin_Xilouris_2017, title={SONATA: Service programming and orchestration for virtualized software networks}, DOI={<a href=\"https://doi.org/10.1109/iccw.2017.7962785\">10.1109/iccw.2017.7962785</a>}, booktitle={2017 IEEE International Conference on Communications Workshops (ICC Workshops)}, publisher={IEEE}, author={Dräxler, Sevil and Karl, Holger and Peuster, Manuel and Razzaghi Kouchaksaraei, Hadi and Bredel, Michael and Lessmann, Johannes and Soenen, Thomas and Tavernier, Wouter and Mendel-Brin, Sharon and Xilouris, George}, year={2017} }","ama":"Dräxler S, Karl H, Peuster M, et al. SONATA: Service programming and orchestration for virtualized software networks. In: <i>2017 IEEE International Conference on Communications Workshops (ICC Workshops)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/iccw.2017.7962785\">10.1109/iccw.2017.7962785</a>","chicago":"Dräxler, Sevil, Holger Karl, Manuel Peuster, Hadi Razzaghi Kouchaksaraei, Michael Bredel, Johannes Lessmann, Thomas Soenen, Wouter Tavernier, Sharon Mendel-Brin, and George Xilouris. “SONATA: Service Programming and Orchestration for Virtualized Software Networks.” In <i>2017 IEEE International Conference on Communications Workshops (ICC Workshops)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/iccw.2017.7962785\">https://doi.org/10.1109/iccw.2017.7962785</a>.","ieee":"S. Dräxler <i>et al.</i>, “SONATA: Service programming and orchestration for virtualized software networks,” in <i>2017 IEEE International Conference on Communications Workshops (ICC Workshops)</i>, Paris, France, 2017."},"publication_identifier":{"isbn":["9781509015252"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1109/iccw.2017.7962785","conference":{"end_date":"2017-05-25","location":"Paris, France","name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","start_date":"2017-05-21"},"main_file_link":[{"url":"https://arxiv.org/pdf/1605.05850.pdf","open_access":"1"}],"author":[{"last_name":"Dräxler","id":"31764","full_name":"Dräxler, Sevil","first_name":"Sevil"},{"id":"126","full_name":"Karl, Holger","last_name":"Karl","first_name":"Holger"},{"first_name":"Manuel","id":"13271","full_name":"Peuster, Manuel","last_name":"Peuster"},{"id":"60845","full_name":"Razzaghi Kouchaksaraei, Hadi","last_name":"Razzaghi Kouchaksaraei","first_name":"Hadi"},{"last_name":"Bredel","full_name":"Bredel, Michael","first_name":"Michael"},{"last_name":"Lessmann","full_name":"Lessmann, Johannes","first_name":"Johannes"},{"first_name":"Thomas","last_name":"Soenen","full_name":"Soenen, Thomas"},{"last_name":"Tavernier","full_name":"Tavernier, Wouter","first_name":"Wouter"},{"first_name":"Sharon","last_name":"Mendel-Brin","full_name":"Mendel-Brin, Sharon"},{"first_name":"George","last_name":"Xilouris","full_name":"Xilouris, George"}],"date_updated":"2022-01-06T07:03:28Z","oa":"1"},{"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-21T10:50:11Z","_id":"72","project":[{"name":"SFB 901","_id":"1"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"77"},{"_id":"355"}],"user_id":"15504","abstract":[{"text":"Software verification competitions, such as the annual SV-COMP, evaluate software verification tools with respect to their effectivity and efficiency. Typically, the outcome of a competition is a (possibly category-specific) ranking of the tools. For many applications, such as building portfolio solvers, it would be desirable to have an idea of the (relative) performance of verification tools on a given verification task beforehand, i.e., prior to actually running all tools on the task.In this paper, we present a machine learning approach to predicting rankings of tools on verification tasks. The method builds upon so-called label ranking algorithms, which we complement with appropriate kernels providing a similarity measure for verification tasks. Our kernels employ a graph representation for software source code that mixes elements of control flow and program dependence graphs with abstract syntax trees. Using data sets from SV-COMP, we demonstrate our rank prediction technique to generalize well and achieve a rather high predictive accuracy. In particular, our method outperforms a recently proposed feature-based approach of Demyanova et al. (when applied to rank predictions). ","lang":"eng"}],"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-11-21T10:50:11Z","creator":"florida","date_updated":"2018-11-21T10:50:11Z","access_level":"closed","file_name":"Predicting Rankings of Soware Verification Competitions.pdf","file_id":"5782","file_size":869984}],"type":"report","title":"Predicting Rankings of Software Verification Competitions","date_updated":"2022-01-06T07:03:29Z","author":[{"first_name":"Mike","full_name":"Czech, Mike","last_name":"Czech"},{"full_name":"Hüllermeier, Eyke","id":"48129","last_name":"Hüllermeier","first_name":"Eyke"},{"last_name":"Jakobs","full_name":"Jakobs, Marie-Christine","first_name":"Marie-Christine"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"date_created":"2017-10-17T12:41:05Z","year":"2017","citation":{"ama":"Czech M, Hüllermeier E, Jakobs M-C, Wehrheim H. <i>Predicting Rankings of Software Verification Competitions</i>.; 2017.","chicago":"Czech, Mike, Eyke Hüllermeier, Marie-Christine Jakobs, and Heike Wehrheim. <i>Predicting Rankings of Software Verification Competitions</i>, 2017.","ieee":"M. Czech, E. Hüllermeier, M.-C. Jakobs, and H. Wehrheim, <i>Predicting Rankings of Software Verification Competitions</i>. 2017.","bibtex":"@book{Czech_Hüllermeier_Jakobs_Wehrheim_2017, title={Predicting Rankings of Software Verification Competitions}, author={Czech, Mike and Hüllermeier, Eyke and Jakobs, Marie-Christine and Wehrheim, Heike}, year={2017} }","short":"M. Czech, E. Hüllermeier, M.-C. Jakobs, H. Wehrheim, Predicting Rankings of Software Verification Competitions, 2017.","mla":"Czech, Mike, et al. <i>Predicting Rankings of Software Verification Competitions</i>. 2017.","apa":"Czech, M., Hüllermeier, E., Jakobs, M.-C., &#38; Wehrheim, H. (2017). <i>Predicting Rankings of Software Verification Competitions</i>."},"has_accepted_license":"1"},{"language":[{"iso":"eng"}],"ddc":["000"],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-07-05T11:14:37Z","creator":"peuster","date_updated":"2018-07-05T11:14:37Z","file_id":"3432","access_level":"open_access","file_name":"main_ris.pdf","file_size":963155}],"abstract":[{"text":"Developing a virtualized network service does not only involve the\r\n  implementation and configuration of the network functions it is\r\n  composed of but also its integration and test with management\r\n  solutions that will control the service in its production\r\n  environment. These integration tasks require testbeds that offer the\r\n  needed network function virtualization infrastructure~(NFVI), like OpenStack, introducing a\r\n  lot of management and maintenance overheads. Such testbed setups\r\n  become even more complicated when the multi\r\n  point-of-presence~(PoP) case, with multiple infrastructure\r\n  installations, is considered.\r\n\r\n  In this demo, we showcase an emulation platform that executes\r\n  containerized network services in user-defined multi-PoP\r\n  topologies. The platform does not only allow network service developers to\r\n  locally test their services but also to connect real-world\r\n  management and orchestration solutions to the emulated PoPs. During our\r\n  interactive demonstration we focus on the integration between\r\n  the emulated infrastructure and state-of-the-art orchestration\r\n  solutions like SONATA or OSM.","lang":"eng"}],"publication":"IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017","title":"A flexible multi-pop infrastructure emulator for carrier-grade MANO systems","date_created":"2017-11-27T10:22:25Z","year":"2017","file_date_updated":"2018-07-05T11:14:37Z","department":[{"_id":"75"}],"user_id":"13271","_id":"723","project":[{"_id":"25","name":"SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized Networks","grant_number":"671517","call_identifier":"5G PPP Phase 1"}],"status":"public","urn":"7236","type":"conference","conference":{"name":"IEEE Conference on Network Softwarization","location":"Bologna"},"doi":"10.1109/NETSOFT.2017.8004250","author":[{"first_name":"Manuel","last_name":"Peuster","id":"13271","full_name":"Peuster, Manuel"},{"full_name":"Dräxler, Sevil","id":"31764","last_name":"Dräxler","first_name":"Sevil"},{"full_name":"Razzaghi Kouchaksaraei, Hadi","id":"60845","last_name":"Razzaghi Kouchaksaraei","first_name":"Hadi"},{"first_name":"Steven","last_name":"van Rossem","full_name":"van Rossem, Steven"},{"first_name":"Wouter","full_name":"Tavernier, Wouter","last_name":"Tavernier"},{"first_name":"Holger","id":"126","full_name":"Karl, Holger","last_name":"Karl"}],"oa":"1","date_updated":"2022-01-06T07:03:30Z","page":"1--3","citation":{"ama":"Peuster M, Dräxler S, Razzaghi Kouchaksaraei H, van Rossem S, Tavernier W, Karl H. A flexible multi-pop infrastructure emulator for carrier-grade MANO systems. In: <i>IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>. ; 2017:1--3. doi:<a href=\"https://doi.org/10.1109/NETSOFT.2017.8004250\">10.1109/NETSOFT.2017.8004250</a>","chicago":"Peuster, Manuel, Sevil Dräxler, Hadi Razzaghi Kouchaksaraei, Steven van Rossem, Wouter Tavernier, and Holger Karl. “A Flexible Multi-Pop Infrastructure Emulator for Carrier-Grade MANO Systems.” In <i>IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>, 1--3, 2017. <a href=\"https://doi.org/10.1109/NETSOFT.2017.8004250\">https://doi.org/10.1109/NETSOFT.2017.8004250</a>.","ieee":"M. Peuster, S. Dräxler, H. Razzaghi Kouchaksaraei, S. van Rossem, W. Tavernier, and H. Karl, “A flexible multi-pop infrastructure emulator for carrier-grade MANO systems,” in <i>IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>, Bologna, 2017, pp. 1--3.","apa":"Peuster, M., Dräxler, S., Razzaghi Kouchaksaraei, H., van Rossem, S., Tavernier, W., &#38; Karl, H. (2017). A flexible multi-pop infrastructure emulator for carrier-grade MANO systems. In <i>IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i> (pp. 1--3). Bologna. <a href=\"https://doi.org/10.1109/NETSOFT.2017.8004250\">https://doi.org/10.1109/NETSOFT.2017.8004250</a>","short":"M. Peuster, S. Dräxler, H. Razzaghi Kouchaksaraei, S. van Rossem, W. Tavernier, H. Karl, in: IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017, 2017, pp. 1--3.","mla":"Peuster, Manuel, et al. “A Flexible Multi-Pop Infrastructure Emulator for Carrier-Grade MANO Systems.” <i>IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017</i>, 2017, pp. 1--3, doi:<a href=\"https://doi.org/10.1109/NETSOFT.2017.8004250\">10.1109/NETSOFT.2017.8004250</a>.","bibtex":"@inproceedings{Peuster_Dräxler_Razzaghi Kouchaksaraei_van Rossem_Tavernier_Karl_2017, title={A flexible multi-pop infrastructure emulator for carrier-grade MANO systems}, DOI={<a href=\"https://doi.org/10.1109/NETSOFT.2017.8004250\">10.1109/NETSOFT.2017.8004250</a>}, booktitle={IEEE Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017}, author={Peuster, Manuel and Dräxler, Sevil and Razzaghi Kouchaksaraei, Hadi and van Rossem, Steven and Tavernier, Wouter and Karl, Holger}, year={2017}, pages={1--3} }"},"has_accepted_license":"1","publication_status":"published"},{"title":"OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten","date_created":"2017-10-17T12:41:05Z","supervisor":[{"first_name":"Achim","last_name":"Lösch","full_name":"Lösch, Achim","id":"43646"},{"id":"398","full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"}],"author":[{"first_name":"Christoph","last_name":"Knorr","full_name":"Knorr, Christoph"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:36Z","citation":{"chicago":"Knorr, Christoph. <i>OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten</i>. Universität Paderborn, 2017.","ieee":"C. Knorr, <i>OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten</i>. Universität Paderborn, 2017.","ama":"Knorr C. <i>OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten</i>. Universität Paderborn; 2017.","short":"C. Knorr, OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten, Universität Paderborn, 2017.","mla":"Knorr, Christoph. <i>OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten</i>. Universität Paderborn, 2017.","bibtex":"@book{Knorr_2017, title={OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten}, publisher={Universität Paderborn}, author={Knorr, Christoph}, year={2017} }","apa":"Knorr, C. (2017). <i>OpenCL-basierte Videoverarbeitung auf heterogenen Rechenknoten</i>. Universität Paderborn."},"year":"2017","language":[{"iso":"ger"}],"department":[{"_id":"78"}],"user_id":"477","_id":"74","project":[{"name":"SFB 901","_id":"1"},{"_id":"14","name":"SFB 901 - Subprojekt C2"},{"_id":"4","name":"SFB 901 - Project Area C"}],"status":"public","type":"mastersthesis"},{"page":"286-293","citation":{"ama":"Liebendörfer M, Hochmuth R. Perceived Competence and Incompetence in the First Year of Mathematics Studies: Forms and Situations. In: Göller R, Biehler R, Hochmuth R, Rück H-G, eds. <i>Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings</i>. Kassel: Universität Kassel; 2017:286-293.","chicago":"Liebendörfer, Michael, and Reinhard Hochmuth. “Perceived Competence and Incompetence in the First Year of Mathematics Studies: Forms and Situations.” In <i>Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings</i>, edited by Robin Göller, Rolf Biehler, Reinhard Hochmuth, and Hans-Georg Rück, 286–93. Kassel: Universität Kassel, 2017.","ieee":"M. Liebendörfer and R. Hochmuth, “Perceived Competence and Incompetence in the First Year of Mathematics Studies: Forms and Situations,” in <i>Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings</i>, 2017, pp. 286–293.","short":"M. Liebendörfer, R. Hochmuth, in: R. Göller, R. Biehler, R. Hochmuth, H.-G. Rück (Eds.), Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings, Universität Kassel, Kassel, 2017, pp. 286–293.","bibtex":"@inproceedings{Liebendörfer_Hochmuth_2017, place={Kassel}, title={Perceived Competence and Incompetence in the First Year of Mathematics Studies: Forms and Situations}, booktitle={Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings}, publisher={Universität Kassel}, author={Liebendörfer, Michael and Hochmuth, Reinhard}, editor={Göller, Robin and Biehler, Rolf and Hochmuth, Reinhard and Rück, Hans-GeorgEditors}, year={2017}, pages={286–293} }","mla":"Liebendörfer, Michael, and Reinhard Hochmuth. “Perceived Competence and Incompetence in the First Year of Mathematics Studies: Forms and Situations.” <i>Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings</i>, edited by Robin Göller et al., Universität Kassel, 2017, pp. 286–93.","apa":"Liebendörfer, M., &#38; Hochmuth, R. (2017). Perceived Competence and Incompetence in the First Year of Mathematics Studies: Forms and Situations. In R. Göller, R. Biehler, R. Hochmuth, &#38; H.-G. Rück (Eds.), <i>Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings</i> (pp. 286–293). Kassel: Universität Kassel."},"place":"Kassel","year":"2017","title":"Perceived Competence and Incompetence in the First Year of Mathematics Studies: Forms and Situations","author":[{"id":"30933","full_name":"Liebendörfer, Michael","last_name":"Liebendörfer","orcid":"0000-0001-9887-2074","first_name":"Michael"},{"last_name":"Hochmuth","full_name":"Hochmuth, Reinhard","first_name":"Reinhard"}],"date_created":"2019-03-25T15:35:23Z","publisher":"Universität Kassel","date_updated":"2022-01-06T07:03:57Z","status":"public","editor":[{"full_name":"Göller, Robin","last_name":"Göller","first_name":"Robin"},{"first_name":"Rolf","last_name":"Biehler","full_name":"Biehler, Rolf"},{"first_name":"Reinhard","full_name":"Hochmuth, Reinhard","last_name":"Hochmuth"},{"first_name":"Hans-Georg","last_name":"Rück","full_name":"Rück, Hans-Georg"}],"publication":"Didactics of Mathematics in Higher Education as a Scientific Discipline - Conference Proceedings","type":"conference","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"10"}],"user_id":"30933","_id":"8559"},{"title":"Interest development during the first year at university: do mathematical beliefs predict interest in mathematics?","doi":"10.1007/s11858-016-0827-3","date_updated":"2022-01-06T07:03:57Z","volume":49,"author":[{"first_name":"Michael","last_name":"Liebendörfer","orcid":"0000-0001-9887-2074","id":"30933","full_name":"Liebendörfer, Michael"},{"full_name":"Schukajlow, Stanislaw","last_name":"Schukajlow","first_name":"Stanislaw"}],"date_created":"2019-03-25T15:35:29Z","year":"2017","page":"355-366","intvolume":"        49","citation":{"apa":"Liebendörfer, M., &#38; Schukajlow, S. (2017). Interest development during the first year at university: do mathematical beliefs predict interest in mathematics? <i>ZDM</i>, <i>49</i>(3), 355–366. <a href=\"https://doi.org/10.1007/s11858-016-0827-3\">https://doi.org/10.1007/s11858-016-0827-3</a>","bibtex":"@article{Liebendörfer_Schukajlow_2017, title={Interest development during the first year at university: do mathematical beliefs predict interest in mathematics?}, volume={49}, DOI={<a href=\"https://doi.org/10.1007/s11858-016-0827-3\">10.1007/s11858-016-0827-3</a>}, number={3}, journal={ZDM}, author={Liebendörfer, Michael and Schukajlow, Stanislaw}, year={2017}, pages={355–366} }","mla":"Liebendörfer, Michael, and Stanislaw Schukajlow. “Interest Development during the First Year at University: Do Mathematical Beliefs Predict Interest in Mathematics?” <i>ZDM</i>, vol. 49, no. 3, 2017, pp. 355–66, doi:<a href=\"https://doi.org/10.1007/s11858-016-0827-3\">10.1007/s11858-016-0827-3</a>.","short":"M. Liebendörfer, S. Schukajlow, ZDM 49 (2017) 355–366.","ieee":"M. Liebendörfer and S. Schukajlow, “Interest development during the first year at university: do mathematical beliefs predict interest in mathematics?,” <i>ZDM</i>, vol. 49, no. 3, pp. 355–366, 2017.","chicago":"Liebendörfer, Michael, and Stanislaw Schukajlow. “Interest Development during the First Year at University: Do Mathematical Beliefs Predict Interest in Mathematics?” <i>ZDM</i> 49, no. 3 (2017): 355–66. <a href=\"https://doi.org/10.1007/s11858-016-0827-3\">https://doi.org/10.1007/s11858-016-0827-3</a>.","ama":"Liebendörfer M, Schukajlow S. Interest development during the first year at university: do mathematical beliefs predict interest in mathematics? <i>ZDM</i>. 2017;49(3):355-366. doi:<a href=\"https://doi.org/10.1007/s11858-016-0827-3\">10.1007/s11858-016-0827-3</a>"},"publication_identifier":{"issn":["1863-9690, 1863-9704"]},"quality_controlled":"1","issue":"3","language":[{"iso":"eng"}],"extern":"1","_id":"8564","department":[{"_id":"10"}],"user_id":"30933","status":"public","publication":"ZDM","type":"journal_article"},{"citation":{"mla":"Dräxler, Sevil, et al. “Joint Optimization of Scaling and Placement of Virtual Network Services.” <i>Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017)</i>, 2017, doi:<a href=\"https://doi.org/10.1109/CCGRID.2017.25\">10.1109/CCGRID.2017.25</a>.","bibtex":"@inproceedings{Dräxler_Karl_Mann_2017, title={Joint Optimization of Scaling and Placement of Virtual Network Services}, DOI={<a href=\"https://doi.org/10.1109/CCGRID.2017.25\">10.1109/CCGRID.2017.25</a>}, booktitle={Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017)}, author={Dräxler, Sevil and Karl, Holger and Mann, Zoltan Adam}, year={2017} }","short":"S. Dräxler, H. Karl, Z.A. Mann, in: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017), 2017.","apa":"Dräxler, S., Karl, H., &#38; Mann, Z. A. (2017). Joint Optimization of Scaling and Placement of Virtual Network Services. In <i>Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017)</i>. <a href=\"https://doi.org/10.1109/CCGRID.2017.25\">https://doi.org/10.1109/CCGRID.2017.25</a>","ama":"Dräxler S, Karl H, Mann ZA. Joint Optimization of Scaling and Placement of Virtual Network Services. In: <i>Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1109/CCGRID.2017.25\">10.1109/CCGRID.2017.25</a>","ieee":"S. Dräxler, H. Karl, and Z. A. Mann, “Joint Optimization of Scaling and Placement of Virtual Network Services,” in <i>Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017)</i>, 2017.","chicago":"Dräxler, Sevil, Holger Karl, and Zoltan Adam Mann. “Joint Optimization of Scaling and Placement of Virtual Network Services.” In <i>Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017)</i>, 2017. <a href=\"https://doi.org/10.1109/CCGRID.2017.25\">https://doi.org/10.1109/CCGRID.2017.25</a>."},"year":"2017","has_accepted_license":"1","doi":"10.1109/CCGRID.2017.25","title":"Joint Optimization of Scaling and Placement of Virtual Network Services","date_created":"2017-10-17T12:41:08Z","author":[{"first_name":"Sevil","last_name":"Dräxler","id":"31764","full_name":"Dräxler, Sevil"},{"last_name":"Karl","full_name":"Karl, Holger","id":"126","first_name":"Holger"},{"first_name":"Zoltan Adam","last_name":"Mann","full_name":"Mann, Zoltan Adam"}],"date_updated":"2022-01-06T07:03:59Z","oa":"1","file":[{"file_size":2229109,"file_id":"3324","access_level":"open_access","file_name":"RIS.pdf","date_updated":"2018-06-25T08:07:43Z","creator":"sevilmeh","date_created":"2018-06-25T08:07:43Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"text":"Management of complex network services requires flexible and efficient service provisioning as well as optimized handling of continuous changes in the workload of the service.To adapt to changes in the demand, service components need to be replicated (scaling) and allocated to physical resources (placement) dynamically. In this paper, we propose a fullyautomated approach to the joint optimization problem of scaling and placement, enabling quick reaction to changes. We formalize the problem, analyze its complexity, and develop two algorithms to solve it. Extensive empirical results show the applicability andeffectiveness of the proposed approach.","lang":"eng"}],"urn":"873","type":"conference","publication":"Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017)","file_date_updated":"2018-06-25T08:07:43Z","ddc":["040"],"user_id":"31764","department":[{"_id":"75"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C4","_id":"16"},{"_id":"4","name":"SFB 901 - Project Area C"},{"grant_number":"671517","_id":"25","name":"SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized Networks","call_identifier":"5G PPP Phase 1"}],"_id":"87"},{"citation":{"apa":"Peitz, S., &#38; Dellnitz, M. (2017). Gradient-Based Multiobjective Optimization with Uncertainties. In <i>NEO 2016</i> (pp. 159–182). Cham. <a href=\"https://doi.org/10.1007/978-3-319-64063-1_7\">https://doi.org/10.1007/978-3-319-64063-1_7</a>","bibtex":"@inproceedings{Peitz_Dellnitz_2017, place={Cham}, title={Gradient-Based Multiobjective Optimization with Uncertainties}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-64063-1_7\">10.1007/978-3-319-64063-1_7</a>}, booktitle={NEO 2016}, author={Peitz, Sebastian and Dellnitz, Michael}, year={2017}, pages={159–182} }","mla":"Peitz, Sebastian, and Michael Dellnitz. “Gradient-Based Multiobjective Optimization with Uncertainties.” <i>NEO 2016</i>, 2017, pp. 159–82, doi:<a href=\"https://doi.org/10.1007/978-3-319-64063-1_7\">10.1007/978-3-319-64063-1_7</a>.","short":"S. Peitz, M. Dellnitz, in: NEO 2016, Cham, 2017, pp. 159–182.","ama":"Peitz S, Dellnitz M. Gradient-Based Multiobjective Optimization with Uncertainties. In: <i>NEO 2016</i>. Cham; 2017:159-182. doi:<a href=\"https://doi.org/10.1007/978-3-319-64063-1_7\">10.1007/978-3-319-64063-1_7</a>","ieee":"S. Peitz and M. Dellnitz, “Gradient-Based Multiobjective Optimization with Uncertainties,” in <i>NEO 2016</i>, 2017, pp. 159–182.","chicago":"Peitz, Sebastian, and Michael Dellnitz. “Gradient-Based Multiobjective Optimization with Uncertainties.” In <i>NEO 2016</i>, 159–82. Cham, 2017. <a href=\"https://doi.org/10.1007/978-3-319-64063-1_7\">https://doi.org/10.1007/978-3-319-64063-1_7</a>."},"page":"159-182","place":"Cham","year":"2017","publication_status":"published","publication_identifier":{"isbn":["9783319640624","9783319640631"],"issn":["1860-949X","1860-9503"]},"doi":"10.1007/978-3-319-64063-1_7","title":"Gradient-Based Multiobjective Optimization with Uncertainties","date_created":"2019-03-29T13:28:56Z","author":[{"first_name":"Sebastian","orcid":"https://orcid.org/0000-0002-3389-793X","last_name":"Peitz","full_name":"Peitz, Sebastian","id":"47427"},{"last_name":"Dellnitz","full_name":"Dellnitz, Michael","first_name":"Michael"}],"date_updated":"2022-01-06T07:04:00Z","status":"public","abstract":[{"lang":"eng","text":"In this article we develop a gradient-based algorithm for the solution of multiobjective optimization problems with uncertainties. To this end, an additional condition is derived for the descent direction in order to account for inaccuracies in the gradients and then incorporated into a subdivision algorithm for the computation of global solutions to multiobjective optimization problems. Convergence to a superset of the Pareto set is proved and an upper bound for the maximal distance to the set of substationary points is given. Besides the applicability to problems with uncertainties, the algorithm is developed with the intention to use it in combination with model order reduction techniques in order to efficiently solve PDE-constrained multiobjective optimization problems."}],"type":"conference","publication":"NEO 2016","language":[{"iso":"eng"}],"user_id":"47427","department":[{"_id":"101"}],"project":[{"name":"Computing Resources Provided by the Paderborn Center for Parallel Computing","_id":"52"}],"_id":"8752"},{"type":"bachelorsthesis","status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"88","user_id":"477","department":[{"_id":"64"}],"year":"2017","citation":{"apa":"Ganesh Athreya, A. (2017). <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn.","bibtex":"@book{Ganesh Athreya_2017, title={Instantiating a Predicate Encryption Scheme via Pair Encodings}, publisher={Universität Paderborn}, author={Ganesh Athreya, Advait}, year={2017} }","mla":"Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","short":"A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings, Universität Paderborn, 2017.","chicago":"Ganesh Athreya, Advait. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","ieee":"A. Ganesh Athreya, <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn, 2017.","ama":"Ganesh Athreya A. <i>Instantiating a Predicate Encryption Scheme via Pair Encodings</i>. Universität Paderborn; 2017."},"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:04:02Z","date_created":"2017-10-17T12:41:08Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"full_name":"Ganesh Athreya, Advait","last_name":"Ganesh Athreya","first_name":"Advait"}],"title":"Instantiating a Predicate Encryption Scheme via Pair Encodings"},{"place":"Berlin","year":"2017","citation":{"chicago":"Jovanovikj, Ivan. <i>Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases</i>. Berlin, 2017.","ieee":"I. Jovanovikj, <i>Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases</i>. Berlin, 2017.","ama":"Jovanovikj I. <i>Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases</i>. Berlin; 2017.","apa":"Jovanovikj, I. (2017). <i>Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases</i>. Berlin.","short":"I. Jovanovikj, Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases, Berlin, 2017.","bibtex":"@book{Jovanovikj_2017, place={Berlin}, title={Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases}, author={Jovanovikj, Ivan}, year={2017} }","mla":"Jovanovikj, Ivan. <i>Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases</i>. 2017."},"date_updated":"2022-01-06T07:04:03Z","author":[{"full_name":"Jovanovikj, Ivan","id":"39187","last_name":"Jovanovikj","orcid":"https://orcid.org/0000-0002-1838-794X","first_name":"Ivan"}],"date_created":"2019-04-08T07:39:45Z","title":"Presentation: Framework for Constructing Context-Specific Migration Methods for Test Cases","type":"misc","status":"public","_id":"8843","department":[{"_id":"66"}],"user_id":"39187","language":[{"iso":"eng"}],"alternative_title":["User Conference on Advanced Automated Testing (UCAAT 2017)"]},{"publication":"Journal of Cryptology","type":"journal_article","status":"public","department":[{"_id":"558"}],"user_id":"66268","_id":"9607","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0933-2790","1432-1378"]},"publication_status":"published","page":"276-306","citation":{"ama":"Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. <i>Journal of Cryptology</i>. 2017:276-306. doi:<a href=\"https://doi.org/10.1007/s00145-017-9257-9\">10.1007/s00145-017-9257-9</a>","ieee":"S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” <i>Journal of Cryptology</i>, pp. 276–306, 2017.","chicago":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” <i>Journal of Cryptology</i>, 2017, 276–306. <a href=\"https://doi.org/10.1007/s00145-017-9257-9\">https://doi.org/10.1007/s00145-017-9257-9</a>.","apa":"Kakvi, S., &#38; Kiltz, E. (2017). Optimal Security Proofs for Full Domain Hash, Revisited. <i>Journal of Cryptology</i>, 276–306. <a href=\"https://doi.org/10.1007/s00145-017-9257-9\">https://doi.org/10.1007/s00145-017-9257-9</a>","bibtex":"@article{Kakvi_Kiltz_2017, title={Optimal Security Proofs for Full Domain Hash, Revisited}, DOI={<a href=\"https://doi.org/10.1007/s00145-017-9257-9\">10.1007/s00145-017-9257-9</a>}, journal={Journal of Cryptology}, author={Kakvi, Saqib and Kiltz, Eike}, year={2017}, pages={276–306} }","mla":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” <i>Journal of Cryptology</i>, 2017, pp. 276–306, doi:<a href=\"https://doi.org/10.1007/s00145-017-9257-9\">10.1007/s00145-017-9257-9</a>.","short":"S. Kakvi, E. Kiltz, Journal of Cryptology (2017) 276–306."},"year":"2017","author":[{"id":"66268","full_name":"Kakvi, Saqib","last_name":"Kakvi","first_name":"Saqib"},{"last_name":"Kiltz","full_name":"Kiltz, Eike","first_name":"Eike"}],"date_created":"2019-05-03T12:44:03Z","date_updated":"2022-01-06T07:04:16Z","doi":"10.1007/s00145-017-9257-9","main_file_link":[{"url":"https://link.springer.com/article/10.1007%2Fs00145-017-9257-9"}],"title":"Optimal Security Proofs for Full Domain Hash, Revisited"},{"year":"2017","quality_controlled":"1","title":"From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process","publisher":"IEEE","date_created":"2017-10-17T12:41:10Z","abstract":[{"lang":"eng","text":"Bridging the gap between informal, imprecise, and vague user requirements descriptions and precise formalized specifications is the main task of requirements engineering. Techniques such as interviews or story telling are used when requirements engineers try to identify a user's needs. The requirements specification process is typically done in a dialogue between users, domain experts, and requirements engineers. In our research, we aim at automating the specification of requirements. The idea is to distinguish between untrained users and trained users, and to exploit domain knowledge learned from previous runs of our system. We let untrained users provide unstructured natural language descriptions, while we allow trained users to provide examples of behavioral descriptions. In both cases, our goal is to synthesize formal requirements models similar to statecharts. From requirements specification processes with trained users, behavioral ontologies are learned which are later used to support the requirements specification process for untrained users. Our research method is original in combining natural language processing and search-based techniques for the synthesis of requirements specifications. Our work is embedded in a larger project that aims at automating the whole software development and deployment process in envisioned future software service markets."}],"file":[{"creator":"ups","date_created":"2018-11-02T14:50:35Z","date_updated":"2018-11-02T14:50:35Z","access_level":"closed","file_name":"08054881.pdf","file_id":"5285","file_size":433613,"content_type":"application/pdf","relation":"main_file","success":1}],"publication":"2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)","ddc":["000"],"keyword":["Software","Unified modeling language","Requirements engineering","Ontologies","Search problems","Natural languages"],"language":[{"iso":"eng"}],"place":"Piscataway, NJ, USA","citation":{"chicago":"Rooijen, Lorijn van, Frederik Simon Bäumer, Marie Christin Platenius, Michaela Geierhos, Heiko Hamann, and Gregor Engels. “From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process.” In <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>, 379–85. Piscataway, NJ, USA: IEEE, 2017. <a href=\"https://doi.org/10.1109/REW.2017.26\">https://doi.org/10.1109/REW.2017.26</a>.","ieee":"L. van Rooijen, F. S. Bäumer, M. C. Platenius, M. Geierhos, H. Hamann, and G. Engels, “From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process,” in <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>, Lisbon, Portugal, 2017, pp. 379–385.","ama":"van Rooijen L, Bäumer FS, Platenius MC, Geierhos M, Hamann H, Engels G. From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process. In: <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>. Piscataway, NJ, USA: IEEE; 2017:379-385. doi:<a href=\"https://doi.org/10.1109/REW.2017.26\">10.1109/REW.2017.26</a>","apa":"van Rooijen, L., Bäumer, F. S., Platenius, M. C., Geierhos, M., Hamann, H., &#38; Engels, G. (2017). From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process. In <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i> (pp. 379–385). Piscataway, NJ, USA: IEEE. <a href=\"https://doi.org/10.1109/REW.2017.26\">https://doi.org/10.1109/REW.2017.26</a>","mla":"van Rooijen, Lorijn, et al. “From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process.” <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>, IEEE, 2017, pp. 379–85, doi:<a href=\"https://doi.org/10.1109/REW.2017.26\">10.1109/REW.2017.26</a>.","bibtex":"@inproceedings{van Rooijen_Bäumer_Platenius_Geierhos_Hamann_Engels_2017, place={Piscataway, NJ, USA}, title={From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process}, DOI={<a href=\"https://doi.org/10.1109/REW.2017.26\">10.1109/REW.2017.26</a>}, booktitle={2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)}, publisher={IEEE}, author={van Rooijen, Lorijn and Bäumer, Frederik Simon and Platenius, Marie Christin and Geierhos, Michaela and Hamann, Heiko and Engels, Gregor}, year={2017}, pages={379–385} }","short":"L. van Rooijen, F.S. Bäumer, M.C. Platenius, M. Geierhos, H. Hamann, G. Engels, in: 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), IEEE, Piscataway, NJ, USA, 2017, pp. 379–385."},"page":"379-385","publication_status":"published","publication_identifier":{"eisbn":["978-1-5386-3488-2 "],"isbn":["978-1-5386-3489-9"]},"has_accepted_license":"1","doi":"10.1109/REW.2017.26","conference":{"location":"Lisbon, Portugal","end_date":"2017-09-08","start_date":"2017-09-04","name":"2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)"},"date_updated":"2022-01-06T07:04:18Z","author":[{"first_name":"Lorijn","full_name":"van Rooijen, Lorijn","id":"58843","last_name":"van Rooijen"},{"first_name":"Frederik Simon","id":"38837","full_name":"Bäumer, Frederik Simon","last_name":"Bäumer"},{"full_name":"Platenius, Marie Christin","last_name":"Platenius","first_name":"Marie Christin"},{"full_name":"Geierhos, Michaela","id":"42496","last_name":"Geierhos","orcid":"0000-0002-8180-5606","first_name":"Michaela"},{"first_name":"Heiko","last_name":"Hamann","full_name":"Hamann, Heiko"},{"last_name":"Engels","id":"107","full_name":"Engels, Gregor","first_name":"Gregor"}],"status":"public","type":"conference","file_date_updated":"2018-11-02T14:50:35Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"97","user_id":"57458","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"},{"_id":"34"},{"_id":"7"},{"_id":"66"},{"_id":"238"},{"_id":"63"}]},{"date_created":"2017-11-27T10:22:29Z","title":"Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments","year":"2017","language":[{"iso":"eng"}],"ddc":["004"],"publication":"IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)","file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_name":"main_ris.pdf","file_id":"3431","file_size":2642306,"date_created":"2018-07-05T11:14:00Z","creator":"peuster","date_updated":"2018-07-05T11:14:00Z"}],"abstract":[{"lang":"eng","text":"Benchmarking and profiling virtual network functions (VNFs) generates input\r\nknowledge for resource management decisions taken by \r\nmanagement and orchestration systems. \r\nSuch VNFs are usually not executed in isolation but are often deployed as part of a service function chain (SFC) that connects single functions into complex \r\nstructures. To manage such chains, isolated performance\r\nprofiles of single functions have to be combined to get insights into \r\nthe overall behavior of an SFC. This becomes particularly\r\nchallenging in highly agile DevOps environments in which profiling\r\nprocesses need to be fully automated and detailed insights about a chain's\r\ninternal structures are not always available. \r\n\r\nIn this paper, we introduce a\r\nfully automatable, flexible, and platform-agnostic profiling\r\nsystem that allows to profile entire SFCs at once. This obviates \r\nmanual modeling procedures to combine profiling results from single\r\nVNFs to reflect SFC performance. \r\nWe use a case study with different SFC configurations to show that it\r\nis hard to model the resulting SFC performance based on single-VNF measurements and that\r\nperformance interactions between real, non-trivial functions that are deployed in a\r\nchain exist.  "}],"author":[{"first_name":"Manuel","id":"13271","full_name":"Peuster, Manuel","last_name":"Peuster"},{"id":"126","full_name":"Karl, Holger","last_name":"Karl","first_name":"Holger"}],"date_updated":"2022-01-06T07:04:22Z","oa":"1","conference":{"name":"IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)","location":"Berlin"},"doi":"10.1109/NFV-SDN.2017.8169826","publication_status":"published","has_accepted_license":"1","citation":{"chicago":"Peuster, Manuel, and Holger Karl. “Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments.” In <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)</i>. Berlin, 2017. <a href=\"https://doi.org/10.1109/NFV-SDN.2017.8169826\">https://doi.org/10.1109/NFV-SDN.2017.8169826</a>.","ieee":"M. Peuster and H. Karl, “Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments,” in <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)</i>, Berlin, 2017.","ama":"Peuster M, Karl H. Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments. In: <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)</i>. Berlin; 2017. doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2017.8169826\">10.1109/NFV-SDN.2017.8169826</a>","apa":"Peuster, M., &#38; Karl, H. (2017). Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments. In <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)</i>. Berlin. <a href=\"https://doi.org/10.1109/NFV-SDN.2017.8169826\">https://doi.org/10.1109/NFV-SDN.2017.8169826</a>","mla":"Peuster, Manuel, and Holger Karl. “Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments.” <i>IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)</i>, 2017, doi:<a href=\"https://doi.org/10.1109/NFV-SDN.2017.8169826\">10.1109/NFV-SDN.2017.8169826</a>.","short":"M. Peuster, H. Karl, in: IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN), Berlin, 2017.","bibtex":"@inproceedings{Peuster_Karl_2017, place={Berlin}, title={Profile Your Chains, Not Functions. Automated Network Service Profiling in DevOps Environments}, DOI={<a href=\"https://doi.org/10.1109/NFV-SDN.2017.8169826\">10.1109/NFV-SDN.2017.8169826</a>}, booktitle={IEEE Conference on Network Function Virtualisation and Software Defined Networks (NFV-SDN)}, author={Peuster, Manuel and Karl, Holger}, year={2017} }"},"place":"Berlin","user_id":"13271","department":[{"_id":"75"}],"project":[{"_id":"25","name":"SONATA NFV: Agile Service Development and Orchestration in 5G Virtualized Networks","grant_number":"671517","call_identifier":"5G PPP Phase 1"},{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"_id":"981","file_date_updated":"2018-07-05T11:14:00Z","type":"conference","status":"public","urn":"9810"},{"ddc":["004"],"user_id":"126","department":[{"_id":"75"}],"project":[{"call_identifier":"FP7-ICT-2011-C","grant_number":"318115","_id":"22","name":"Connectivity management for eneRgy Optimised Wireless Dense works"}],"_id":"983","status":"public","type":"conference","publication":"Proc. European Wireless","main_file_link":[{"url":"http://ieeexplore.ieee.org/document/8011315/"}],"title":"Assessing Genetic Algorithms for Placing Flow Processing-aware Control Applications","date_created":"2017-11-27T10:22:29Z","author":[{"first_name":"Sébastien","full_name":"Auroux, Sébastien","id":"42575","last_name":"Auroux"},{"full_name":"Scholz, S.","last_name":"Scholz","first_name":"S."},{"first_name":"Holger","full_name":"Karl, Holger","id":"126","last_name":"Karl"}],"date_updated":"2019-01-03T13:18:55Z","citation":{"apa":"Auroux, S., Scholz, S., &#38; Karl, H. (2017). Assessing Genetic Algorithms for Placing Flow Processing-aware Control Applications. In <i>Proc. European Wireless</i>.","short":"S. Auroux, S. Scholz, H. Karl, in: Proc. European Wireless, 2017.","bibtex":"@inproceedings{Auroux_Scholz_Karl_2017, title={Assessing Genetic Algorithms for Placing Flow Processing-aware Control Applications}, booktitle={Proc. European Wireless}, author={Auroux, Sébastien and Scholz, S. and Karl, Holger}, year={2017} }","mla":"Auroux, Sébastien, et al. “Assessing Genetic Algorithms for Placing Flow Processing-Aware Control Applications.” <i>Proc. European Wireless</i>, 2017.","ieee":"S. Auroux, S. Scholz, and H. Karl, “Assessing Genetic Algorithms for Placing Flow Processing-aware Control Applications,” in <i>Proc. European Wireless</i>, 2017.","chicago":"Auroux, Sébastien, S. Scholz, and Holger Karl. “Assessing Genetic Algorithms for Placing Flow Processing-Aware Control Applications.” In <i>Proc. European Wireless</i>, 2017.","ama":"Auroux S, Scholz S, Karl H. Assessing Genetic Algorithms for Placing Flow Processing-aware Control Applications. In: <i>Proc. European Wireless</i>. ; 2017."},"year":"2017","ec_funded":"1"},{"language":[{"iso":"eng"}],"keyword":["Load restorationRestoration stageRenewable energyVoltage/frequency fluctuations"],"user_id":"3118","department":[{"_id":"78"}],"_id":"9919","status":"public","abstract":[{"lang":"eng","text":"This is a study of a combined load restoration and generator start-up procedure. The procedure is structured into three stages according to the power system status and the goal of load restoration. Moreover, for each load restoration stage, the proposed algorithm determines a load restoration sequence by considering renewable energy such as solar and wind park to achieve objective functions. The validity and performance of the proposed algorithm is demonstrated through simulations using IEEE-39 network."}],"type":"journal_article","publication":"Elsevier International Journal of Electrical Power and Energy Systems (IJEPES)","doi":"10.1016/j.ijepes.2017.07.007","title":"Three-Stage Power System Restoration Methodology Considering Renewable Energies","author":[{"first_name":"Cong","last_name":"Shen","full_name":"Shen, Cong"},{"first_name":"Paul","full_name":"Kaufmann, Paul","last_name":"Kaufmann"},{"first_name":"Martin","full_name":"Braun, Martin","last_name":"Braun"}],"date_created":"2019-05-22T13:14:20Z","volume":94,"date_updated":"2019-10-06T21:56:18Z","citation":{"ama":"Shen C, Kaufmann P, Braun M. Three-Stage Power System Restoration Methodology Considering Renewable Energies. <i>Elsevier International Journal of Electrical Power and Energy Systems (IJEPES)</i>. 2017;94:287-299. doi:<a href=\"https://doi.org/10.1016/j.ijepes.2017.07.007\">10.1016/j.ijepes.2017.07.007</a>","chicago":"Shen, Cong, Paul Kaufmann, and Martin Braun. “Three-Stage Power System Restoration Methodology Considering Renewable Energies.” <i>Elsevier International Journal of Electrical Power and Energy Systems (IJEPES)</i> 94 (2017): 287–99. <a href=\"https://doi.org/10.1016/j.ijepes.2017.07.007\">https://doi.org/10.1016/j.ijepes.2017.07.007</a>.","ieee":"C. Shen, P. Kaufmann, and M. Braun, “Three-Stage Power System Restoration Methodology Considering Renewable Energies,” <i>Elsevier International Journal of Electrical Power and Energy Systems (IJEPES)</i>, vol. 94, pp. 287–299, 2017.","short":"C. Shen, P. Kaufmann, M. Braun, Elsevier International Journal of Electrical Power and Energy Systems (IJEPES) 94 (2017) 287–299.","bibtex":"@article{Shen_Kaufmann_Braun_2017, title={Three-Stage Power System Restoration Methodology Considering Renewable Energies}, volume={94}, DOI={<a href=\"https://doi.org/10.1016/j.ijepes.2017.07.007\">10.1016/j.ijepes.2017.07.007</a>}, journal={Elsevier International Journal of Electrical Power and Energy Systems (IJEPES)}, author={Shen, Cong and Kaufmann, Paul and Braun, Martin}, year={2017}, pages={287–299} }","mla":"Shen, Cong, et al. “Three-Stage Power System Restoration Methodology Considering Renewable Energies.” <i>Elsevier International Journal of Electrical Power and Energy Systems (IJEPES)</i>, vol. 94, 2017, pp. 287–99, doi:<a href=\"https://doi.org/10.1016/j.ijepes.2017.07.007\">10.1016/j.ijepes.2017.07.007</a>.","apa":"Shen, C., Kaufmann, P., &#38; Braun, M. (2017). Three-Stage Power System Restoration Methodology Considering Renewable Energies. <i>Elsevier International Journal of Electrical Power and Energy Systems (IJEPES)</i>, <i>94</i>, 287–299. <a href=\"https://doi.org/10.1016/j.ijepes.2017.07.007\">https://doi.org/10.1016/j.ijepes.2017.07.007</a>"},"page":"287-299","intvolume":"        94","year":"2017","publication_status":"published"},{"status":"public","file":[{"date_updated":"2018-11-02T14:28:13Z","date_created":"2018-11-02T14:28:13Z","creator":"ups","file_size":1021251,"file_id":"5273","access_level":"closed","file_name":"sab17ideal.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)","type":"conference","file_date_updated":"2018-11-02T14:28:13Z","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"ddc":["000"],"department":[{"_id":"76"}],"user_id":"477","_id":"5204","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"citation":{"apa":"Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.","mla":"Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.","bibtex":"@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }","short":"J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.","ama":"Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In: <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017.","ieee":"J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, 2017.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017."},"year":"2017","has_accepted_license":"1","main_file_link":[{"url":" http://bodden.de/pubs/sab17ideal.pdf"}],"title":"IDEal: Efficient and Precise Alias-aware Dataflow Analysis","date_created":"2018-10-31T12:46:50Z","author":[{"full_name":"Späth, Johannes","last_name":"Späth","first_name":"Johannes"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_updated":"2022-01-06T07:01:44Z","publisher":"ACM Press"}]
