[{"year":"2013","citation":{"ama":"Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. ; 2013:98-105.","chicago":"Blömer, Johannes, Peter Günther, and Volker Krummel. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” In <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 98–105, 2013.","ieee":"J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study,” in <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2013, pp. 98–105.","bibtex":"@inproceedings{Blömer_Günther_Krummel_2013, title={Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study}, booktitle={Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker}, year={2013}, pages={98–105} }","mla":"Blömer, Johannes, et al. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2013, pp. 98–105.","short":"J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.","apa":"Blömer, J., Günther, P., &#38; Krummel, V. (2013). Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In <i>Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (pp. 98–105)."},"page":"98-105","has_accepted_license":"1","title":"Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study","date_updated":"2022-01-06T07:01:28Z","date_created":"2017-10-17T12:42:27Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"first_name":"Peter","last_name":"Günther","full_name":"Günther, Peter"},{"last_name":"Krummel","full_name":"Krummel, Volker","first_name":"Volker"}],"abstract":[{"lang":"eng","text":"Unattended systems are key ingredients of various critical infrastruc-tures like networks of self service terminals or automated teller machines.For cost and efficiency reasons they should mostly run autonomously.Unattended systems are attractive and lucrative targets for various kindsof attacks, including attacks on the integrity of their components and thecommunication between components. In this paper, we propose a gen-eral cryptographic framework to protect unattended systems. We alsodemonstrate that instantiating the framework with techniques from iden-tity based cryptography is particularly well-suited to efficiently secureunattended systems."}],"file":[{"file_size":301962,"file_name":"488-MACIS13.pdf","access_level":"closed","file_id":"1317","date_updated":"2018-03-15T13:46:52Z","creator":"florida","date_created":"2018-03-15T13:46:52Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","type":"conference","publication":"Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)","ddc":["040"],"file_date_updated":"2018-03-15T13:46:52Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"488","user_id":"477","department":[{"_id":"64"}]},{"status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"department":[{"_id":"75"}],"user_id":"477","_id":"490","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"_id":"2","name":"SFB 901 - Project Area A"}],"citation":{"ama":"Wallaschek F. <i>Routing in heterogenen OpenFlow Netzwerken</i>. Universität Paderborn; 2013.","ieee":"F. Wallaschek, <i>Routing in heterogenen OpenFlow Netzwerken</i>. Universität Paderborn, 2013.","chicago":"Wallaschek, Felix. <i>Routing in heterogenen OpenFlow Netzwerken</i>. Universität Paderborn, 2013.","short":"F. Wallaschek, Routing in heterogenen OpenFlow Netzwerken, Universität Paderborn, 2013.","bibtex":"@book{Wallaschek_2013, title={Routing in heterogenen OpenFlow Netzwerken}, publisher={Universität Paderborn}, author={Wallaschek, Felix}, year={2013} }","mla":"Wallaschek, Felix. <i>Routing in heterogenen OpenFlow Netzwerken</i>. Universität Paderborn, 2013.","apa":"Wallaschek, F. (2013). <i>Routing in heterogenen OpenFlow Netzwerken</i>. Universität Paderborn."},"year":"2013","title":"Routing in heterogenen OpenFlow Netzwerken","date_created":"2017-10-17T12:42:27Z","author":[{"first_name":"Felix","last_name":"Wallaschek","full_name":"Wallaschek, Felix"}],"date_updated":"2022-01-06T07:01:28Z","publisher":"Universität Paderborn"},{"citation":{"short":"C. Robbert, Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case, Universität Paderborn, 2013.","bibtex":"@book{Robbert_2013, title={Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case}, publisher={Universität Paderborn}, author={Robbert, Christoph}, year={2013} }","mla":"Robbert, Christoph. <i>Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case</i>. Universität Paderborn, 2013.","apa":"Robbert, C. (2013). <i>Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case</i>. Universität Paderborn.","ama":"Robbert C. <i>Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case</i>. Universität Paderborn; 2013.","ieee":"C. Robbert, <i>Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case</i>. Universität Paderborn, 2013.","chicago":"Robbert, Christoph. <i>Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case</i>. Universität Paderborn, 2013."},"year":"2013","title":"Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case","author":[{"last_name":"Robbert","full_name":"Robbert, Christoph","first_name":"Christoph"}],"date_created":"2017-10-17T12:42:28Z","date_updated":"2022-01-06T07:01:29Z","publisher":"Universität Paderborn","status":"public","type":"bachelorsthesis","user_id":"15504","department":[{"_id":"75"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"492"},{"ddc":["040"],"file_date_updated":"2018-03-15T13:43:42Z","_id":"494","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"76"}],"user_id":"477","abstract":[{"lang":"eng","text":"The maintenance of component-based software systems requires up-to-date models of their concrete architecture, i.e. the architecture that is realised in the source code. These models help in systematically planning, analysing and executing typical reengineering activities. Often no or only outdated architectural models of such systems exist. Therefore, various reverse engineering methods have been developed which try to recover a system's components, subsystems and connectors. However, these reverse engineering methods are severely impacted by design deciencies in the system's code base, especially violations of the component encapsulation. As long as design deciencies are not considered in the reverse engineering process, they reduce the quality of the recovered component structures. Despite this impact of design deciencies, no existing architecture reconstruction approach explicitly integrates a systematic deciency detection and removal into the recovery process. Therefore, I have developed Archimetrix. Archimetrix is a tool-supported architecture reconstruction process. It enhances a clustering-based architecture recovery approach with an extensible, pattern-based deciency detection. After the detection of deciencies, Archimetrix supports the software architect in removing the de ciencies and provides the means to preview the architectural consequences of such a removal. I also provide a process to identify and formalise additional deciencies. I validated the approach on three case studies which show that Archimetrix is able to identify relevant deciencies and that the removal of these deciencies leads to an increased quality of the recovered architectures, i.e. they are closer to the corresponding conceptual architectures."}],"status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":11101635,"access_level":"closed","file_id":"1315","file_name":"494-Dissertation-vonDetten.pdf","date_updated":"2018-03-15T13:43:42Z","date_created":"2018-03-15T13:43:42Z","creator":"florida"}],"type":"dissertation","title":"Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:01:30Z","date_created":"2017-10-17T12:42:28Z","author":[{"first_name":"Markus","last_name":"von Detten","full_name":"von Detten, Markus"}],"supervisor":[{"first_name":"Wilhelm","full_name":"Schäfer, Wilhelm","last_name":"Schäfer"}],"year":"2013","citation":{"ama":"von Detten M. <i>Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies</i>. Universität Paderborn; 2013.","ieee":"M. von Detten, <i>Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies</i>. Universität Paderborn, 2013.","chicago":"Detten, Markus von. <i>Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies</i>. Universität Paderborn, 2013.","mla":"von Detten, Markus. <i>Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies</i>. Universität Paderborn, 2013.","bibtex":"@book{von Detten_2013, title={Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies}, publisher={Universität Paderborn}, author={von Detten, Markus}, year={2013} }","short":"M. von Detten, Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies, Universität Paderborn, 2013.","apa":"von Detten, M. (2013). <i>Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies</i>. Universität Paderborn."},"has_accepted_license":"1"},{"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"495-paper52_mohr.pdf","access_level":"closed","file_id":"1314","file_size":603822,"date_created":"2018-03-15T13:43:08Z","creator":"florida","date_updated":"2018-03-15T13:43:08Z"}],"status":"public","abstract":[{"text":"Automated service composition has been studied as a subject of state based planning for a decade. A great deal of service composition tasks can only be solved if concrete output values of the services are considered in the composition process. However, the fact that those values are not known before runtime leads to nondeterministic planning problems, which have proven to be notoriously difficult in practical automated service composition applications. Even though this problem is frequently recognized, it has still received remarkably few attention and remains unsolved.This paper shows how nondeterminism in automated service composition can be reduced. We introduce context rules as a means to derive semantic knowledge from output values of services. These rules enable us to replace nondeterministic composition operations by less nondeterministic or even completely deterministic ones. We show the validity of our solutions not only theoretically but also have evaluated them practically through implementation.","lang":"eng"}],"type":"conference","publication":"Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)","file_date_updated":"2018-03-15T13:43:08Z","language":[{"iso":"eng"}],"ddc":["040"],"user_id":"477","department":[{"_id":"355"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B2","_id":"10"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"495","citation":{"apa":"Mohr, F., Lettmann, T., &#38; Kleine Büning, H. (2013). Reducing Nondeterminism in Automated Service Composition. In <i>Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)</i> (pp. 154–161). <a href=\"https://doi.org/10.1109/SOCA.2013.25\">https://doi.org/10.1109/SOCA.2013.25</a>","bibtex":"@inproceedings{Mohr_Lettmann_Kleine Büning_2013, title={Reducing Nondeterminism in Automated Service Composition}, DOI={<a href=\"https://doi.org/10.1109/SOCA.2013.25\">10.1109/SOCA.2013.25</a>}, booktitle={Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)}, author={Mohr, Felix and Lettmann, Theodor and Kleine Büning, Hans}, year={2013}, pages={154–161} }","mla":"Mohr, Felix, et al. “Reducing Nondeterminism in Automated Service Composition.” <i>Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)</i>, 2013, pp. 154–61, doi:<a href=\"https://doi.org/10.1109/SOCA.2013.25\">10.1109/SOCA.2013.25</a>.","short":"F. Mohr, T. Lettmann, H. Kleine Büning, in: Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA), 2013, pp. 154–161.","ieee":"F. Mohr, T. Lettmann, and H. Kleine Büning, “Reducing Nondeterminism in Automated Service Composition,” in <i>Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)</i>, 2013, pp. 154–161.","chicago":"Mohr, Felix, Theodor Lettmann, and Hans Kleine Büning. “Reducing Nondeterminism in Automated Service Composition.” In <i>Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)</i>, 154–61, 2013. <a href=\"https://doi.org/10.1109/SOCA.2013.25\">https://doi.org/10.1109/SOCA.2013.25</a>.","ama":"Mohr F, Lettmann T, Kleine Büning H. Reducing Nondeterminism in Automated Service Composition. In: <i>Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA)</i>. ; 2013:154-161. doi:<a href=\"https://doi.org/10.1109/SOCA.2013.25\">10.1109/SOCA.2013.25</a>"},"page":"154-161","year":"2013","has_accepted_license":"1","doi":"10.1109/SOCA.2013.25","title":"Reducing Nondeterminism in Automated Service Composition","date_created":"2017-10-17T12:42:28Z","author":[{"first_name":"Felix","last_name":"Mohr","full_name":"Mohr, Felix"},{"first_name":"Theodor","last_name":"Lettmann","orcid":"0000-0001-5859-2457","id":"315","full_name":"Lettmann, Theodor"},{"first_name":"Hans","full_name":"Kleine Büning, Hans","last_name":"Kleine Büning"}],"date_updated":"2022-01-06T07:01:30Z"},{"_id":"496","project":[{"name":"SFB 901","_id":"1"},{"_id":"6","name":"SFB 901 - Subprojekt A2"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"75"}],"user_id":"15504","ddc":["040"],"file_date_updated":"2018-03-15T13:41:34Z","publication":"Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)","type":"conference","abstract":[{"text":"Within reactive topology control, a node determines its adjacent edges of a network subgraph without prior knowledge of its neighborhood. The goal is to construct a local view on a topology which provides certain desired properties such as planarity. During algorithm execution, a node, in general, is not allowed to determine all its neighbors of the network graph. There are well-known reactive algorithms for computing planar subgraphs. However, the subgraphs obtained do not have constant Euclidean spanning ratio. This means that routing along these subgraphs may result in potentially long detours. So far, it has been unknown if planar spanners can be constructed reactively. In this work, we show that at least under the unit disk network model, this is indeed possible, by proposing an algorithm for reactive construction of the partial Delaunay triangulation, which recently turned out to be a spanner. Furthermore, we show that our algorithm is message-optimal as a node will only exchange messages with nodes that are also neighbors in the spanner. The algorithm’s presentation is complemented by a rigorous proof of correctness.","lang":"eng"}],"status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":352571,"access_level":"closed","file_name":"496-reactivePDT-copyright.pdf","file_id":"1312","date_updated":"2018-03-15T13:41:34Z","creator":"florida","date_created":"2018-03-15T13:41:34Z"}],"date_updated":"2022-01-06T07:01:31Z","date_created":"2017-10-17T12:42:29Z","author":[{"first_name":"Markus","full_name":"Benter, Markus","last_name":"Benter"},{"first_name":"Florentin","last_name":"Neumann","full_name":"Neumann, Florentin"},{"first_name":"Hannes","last_name":"Frey","full_name":"Frey, Hannes"}],"title":"Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks","doi":"10.1109/INFCOM.2013.6567022","has_accepted_license":"1","year":"2013","page":"2193-2201","citation":{"short":"M. Benter, F. Neumann, H. Frey, in: Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM), 2013, pp. 2193–2201.","bibtex":"@inproceedings{Benter_Neumann_Frey_2013, title={Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks}, DOI={<a href=\"https://doi.org/10.1109/INFCOM.2013.6567022\">10.1109/INFCOM.2013.6567022</a>}, booktitle={Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)}, author={Benter, Markus and Neumann, Florentin and Frey, Hannes}, year={2013}, pages={2193–2201} }","mla":"Benter, Markus, et al. “Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks.” <i>Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)</i>, 2013, pp. 2193–201, doi:<a href=\"https://doi.org/10.1109/INFCOM.2013.6567022\">10.1109/INFCOM.2013.6567022</a>.","apa":"Benter, M., Neumann, F., &#38; Frey, H. (2013). Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks. In <i>Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)</i> (pp. 2193–2201). <a href=\"https://doi.org/10.1109/INFCOM.2013.6567022\">https://doi.org/10.1109/INFCOM.2013.6567022</a>","ieee":"M. Benter, F. Neumann, and H. Frey, “Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks,” in <i>Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)</i>, 2013, pp. 2193–2201.","chicago":"Benter, Markus, Florentin Neumann, and Hannes Frey. “Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks.” In <i>Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)</i>, 2193–2201, 2013. <a href=\"https://doi.org/10.1109/INFCOM.2013.6567022\">https://doi.org/10.1109/INFCOM.2013.6567022</a>.","ama":"Benter M, Neumann F, Frey H. Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks. In: <i>Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM)</i>. ; 2013:2193-2201. doi:<a href=\"https://doi.org/10.1109/INFCOM.2013.6567022\">10.1109/INFCOM.2013.6567022</a>"}},{"type":"conference","publication":"Proceedings of the 25th International Conference on Computer Aided Verification (CAV)","file":[{"creator":"florida","date_created":"2018-03-15T13:42:30Z","date_updated":"2018-03-15T13:42:30Z","file_name":"498-WonischSchremmerWehrheim2013.pdf","file_id":"1313","access_level":"closed","file_size":487617,"content_type":"application/pdf","relation":"main_file","success":1}],"status":"public","abstract":[{"text":"Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more eﬃciently veriﬁable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof eﬀort can be reduced by several orders of magnitude, both with respect to time and space.","lang":"eng"}],"series_title":"LNCS","user_id":"477","department":[{"_id":"77"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"498","file_date_updated":"2018-03-15T13:42:30Z","language":[{"iso":"eng"}],"ddc":["040"],"has_accepted_license":"1","citation":{"bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2013, series={LNCS}, title={Programs from Proofs – A PCC Alternative}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-39799-8_65\">10.1007/978-3-642-39799-8_65</a>}, booktitle={Proceedings of the 25th International Conference on Computer Aided Verification (CAV)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2013}, pages={912–927}, collection={LNCS} }","mla":"Wonisch, Daniel, et al. “Programs from Proofs – A PCC Alternative.” <i>Proceedings of the 25th International Conference on Computer Aided Verification (CAV)</i>, 2013, pp. 912–27, doi:<a href=\"https://doi.org/10.1007/978-3-642-39799-8_65\">10.1007/978-3-642-39799-8_65</a>.","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the 25th International Conference on Computer Aided Verification (CAV), 2013, pp. 912–927.","apa":"Wonisch, D., Schremmer, A., &#38; Wehrheim, H. (2013). Programs from Proofs – A PCC Alternative. In <i>Proceedings of the 25th International Conference on Computer Aided Verification (CAV)</i> (pp. 912–927). <a href=\"https://doi.org/10.1007/978-3-642-39799-8_65\">https://doi.org/10.1007/978-3-642-39799-8_65</a>","ama":"Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs – A PCC Alternative. In: <i>Proceedings of the 25th International Conference on Computer Aided Verification (CAV)</i>. LNCS. ; 2013:912-927. doi:<a href=\"https://doi.org/10.1007/978-3-642-39799-8_65\">10.1007/978-3-642-39799-8_65</a>","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from Proofs – A PCC Alternative.” In <i>Proceedings of the 25th International Conference on Computer Aided Verification (CAV)</i>, 912–27. LNCS, 2013. <a href=\"https://doi.org/10.1007/978-3-642-39799-8_65\">https://doi.org/10.1007/978-3-642-39799-8_65</a>.","ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs – A PCC Alternative,” in <i>Proceedings of the 25th International Conference on Computer Aided Verification (CAV)</i>, 2013, pp. 912–927."},"page":"912-927","year":"2013","date_created":"2017-10-17T12:42:29Z","author":[{"first_name":"Daniel","last_name":"Wonisch","full_name":"Wonisch, Daniel"},{"first_name":"Alexander","full_name":"Schremmer, Alexander","last_name":"Schremmer"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","id":"573","first_name":"Heike"}],"date_updated":"2022-01-06T07:01:32Z","doi":"10.1007/978-3-642-39799-8_65","title":"Programs from Proofs – A PCC Alternative"},{"publication":"Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)","type":"conference","status":"public","file":[{"file_size":558661,"file_name":"499-P._Kling__P._Pietryzk_-_Profitable_Scheduling_on_Multiple_Speed-scalable_Processors__2013_.pdf","file_id":"1310","access_level":"closed","date_updated":"2018-03-15T13:40:02Z","creator":"florida","date_created":"2018-03-15T13:40:02Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"We present a new online algorithm for profit-oriented scheduling on multiple speed-scalable processors.Moreover, we provide a tight analysis of the algorithm's competitiveness.Our results generalize and improve upon work by \\citet{Chan:2010}, which considers a single speed-scalable processor.Using significantly different techniques, we can not only extend their model to multiprocessors but also prove an enhanced and tight competitive ratio for our algorithm.In our scheduling problem, jobs arrive over time and are preemptable.They have different workloads, values, and deadlines.The scheduler may decide not to finish a job but instead to suffer a loss equaling the job's value.However, to process a job's workload until its deadline the scheduler must invest a certain amount of energy.The cost of a schedule is the sum of lost values and invested energy.In order to finish a job the scheduler has to determine which processors to use and set their speeds accordingly.A processor's energy consumption is power $\\Power{s}$ integrated over time, where $\\Power{s}=s^{\\alpha}$ is the power consumption when running at speed $s$.Since we consider the online variant of the problem, the scheduler has no knowledge about future jobs.This problem was introduced by~\\citet{Chan:2010} for the case of a single processor.They presented an online algorithm which is $\\alpha^{\\alpha}+2e\\alpha$-competitive.We provide an online algorithm for the case of multiple processors with an improved competitive ratio of $\\alpha^{\\alpha}$."}],"department":[{"_id":"63"}],"user_id":"477","_id":"499","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subproject C4","_id":"16"},{"_id":"14","name":"SFB 901 - Subproject C2"},{"name":"SFB 901 - Project Area C","_id":"4"}],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-15T13:40:02Z","ddc":["040"],"has_accepted_license":"1","page":"251-260 ","citation":{"chicago":"Kling, Peter, and Peter Pietrzyk. “Profitable Scheduling on Multiple Speed-Scalable Processors.” In <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 251–60, 2013. <a href=\"https://doi.org/10.1145/2486159.2486183\">https://doi.org/10.1145/2486159.2486183</a>.","ieee":"P. Kling and P. Pietrzyk, “Profitable Scheduling on Multiple Speed-Scalable Processors,” in <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2013, pp. 251–260.","ama":"Kling P, Pietrzyk P. Profitable Scheduling on Multiple Speed-Scalable Processors. In: <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>. ; 2013:251-260. doi:<a href=\"https://doi.org/10.1145/2486159.2486183\">10.1145/2486159.2486183</a>","apa":"Kling, P., &#38; Pietrzyk, P. (2013). Profitable Scheduling on Multiple Speed-Scalable Processors. In <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i> (pp. 251–260). <a href=\"https://doi.org/10.1145/2486159.2486183\">https://doi.org/10.1145/2486159.2486183</a>","short":"P. Kling, P. Pietrzyk, in: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 251–260.","mla":"Kling, Peter, and Peter Pietrzyk. “Profitable Scheduling on Multiple Speed-Scalable Processors.” <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)</i>, 2013, pp. 251–60, doi:<a href=\"https://doi.org/10.1145/2486159.2486183\">10.1145/2486159.2486183</a>.","bibtex":"@inproceedings{Kling_Pietrzyk_2013, title={Profitable Scheduling on Multiple Speed-Scalable Processors}, DOI={<a href=\"https://doi.org/10.1145/2486159.2486183\">10.1145/2486159.2486183</a>}, booktitle={Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}, author={Kling, Peter and Pietrzyk, Peter}, year={2013}, pages={251–260} }"},"year":"2013","author":[{"last_name":"Kling","full_name":"Kling, Peter","first_name":"Peter"},{"last_name":"Pietrzyk","full_name":"Pietrzyk, Peter","first_name":"Peter"}],"date_created":"2017-10-17T12:42:29Z","date_updated":"2022-01-06T07:01:34Z","doi":"10.1145/2486159.2486183","title":"Profitable Scheduling on Multiple Speed-Scalable Processors"},{"department":[{"_id":"66"}],"user_id":"52534","_id":"7271","language":[{"iso":"eng"}],"publication":"Software Engineering for Self-Adaptive Systems II","type":"journal_article","status":"public","date_created":"2019-01-30T13:41:40Z","author":[{"full_name":"de Lemos, Rogrio","last_name":"de Lemos","first_name":"Rogrio"},{"first_name":"Holger","last_name":"Giese","full_name":"Giese, Holger"},{"first_name":"Hausi","full_name":"A. Müller, Hausi","last_name":"A. Müller"},{"first_name":"Mary","last_name":"Shaw","full_name":"Shaw, Mary"},{"first_name":"Jesper","full_name":"Andersson, Jesper","last_name":"Andersson"},{"first_name":"Marin","last_name":"Litoiu","full_name":"Litoiu, Marin"},{"last_name":"Schmerl","full_name":"Schmerl, Bradley","first_name":"Bradley"},{"last_name":"Tamura","full_name":"Tamura, Gabriel","first_name":"Gabriel"},{"full_name":"M. Villegas, Norha","last_name":"M. Villegas","first_name":"Norha"},{"last_name":"Vogel","full_name":"Vogel, Thomas","first_name":"Thomas"},{"first_name":"Danny","full_name":"Weyns, Danny","last_name":"Weyns"},{"last_name":"Baresi","full_name":"Baresi, Luciano","first_name":"Luciano"},{"last_name":"Becker","full_name":"Becker, Basil","first_name":"Basil"},{"first_name":"Nelly","full_name":"Bencomo, Nelly","last_name":"Bencomo"},{"full_name":"Brun, Yuriy","last_name":"Brun","first_name":"Yuriy"},{"full_name":"Cukic, Bojan","last_name":"Cukic","first_name":"Bojan"},{"first_name":"Ron","full_name":"Desmarais, Ron","last_name":"Desmarais"},{"first_name":"Schahram","full_name":"Dustdar, Schahram","last_name":"Dustdar"},{"first_name":"Gregor","full_name":"Engels, Gregor","last_name":"Engels"},{"first_name":"Kurt","full_name":"Geihs, Kurt","last_name":"Geihs"},{"first_name":"Karl","full_name":"M. Göschka, Karl","last_name":"M. Göschka"},{"last_name":"Gorla","full_name":"Gorla, Alessandra","first_name":"Alessandra"},{"first_name":"Vincenzo","full_name":"Grassi, Vincenzo","last_name":"Grassi"},{"first_name":"Paola","last_name":"Inverardi","full_name":"Inverardi, Paola"},{"last_name":"Karsai","full_name":"Karsai, Gabor","first_name":"Gabor"},{"first_name":"Jeff","full_name":"Kramer, Jeff","last_name":"Kramer"},{"last_name":"Lopes","full_name":"Lopes, Antonia","first_name":"Antonia"},{"full_name":"Magee, Jeff","last_name":"Magee","first_name":"Jeff"},{"full_name":"Malek, Sam","last_name":"Malek","first_name":"Sam"},{"last_name":"Mankovskii","full_name":"Mankovskii, Serge","first_name":"Serge"},{"first_name":"Raffaela","full_name":"Mirandola, Raffaela","last_name":"Mirandola"},{"last_name":"Mylopoulos","full_name":"Mylopoulos, John","first_name":"John"},{"last_name":"Nierstrasz","full_name":"Nierstrasz, Oscar","first_name":"Oscar"},{"first_name":"Mauro","last_name":"Pezzè","full_name":"Pezzè, Mauro"},{"last_name":"Prehofer","full_name":"Prehofer, Christian","first_name":"Christian"},{"first_name":"Wilhelm","last_name":"Schäfer","full_name":"Schäfer, Wilhelm"},{"first_name":"Rick","full_name":"Schlichting, Rick","last_name":"Schlichting"},{"last_name":"B. Smith","full_name":"B. Smith, Dennis","first_name":"Dennis"},{"last_name":"Pedro Sousa","full_name":"Pedro Sousa, Joao","first_name":"Joao"},{"full_name":"Tahvildari, Ladan","last_name":"Tahvildari","first_name":"Ladan"},{"last_name":"Wong","full_name":"Wong, Kenny","first_name":"Kenny"},{"first_name":"Jochen","full_name":"Wuttke, Jochen","last_name":"Wuttke"}],"date_updated":"2022-01-06T07:03:31Z","doi":"10.1007/978-3-642-35813-5_1","title":"Software Engineering for Self-Adaptive Systems: A Second Research Roadmap","page":"1-32","citation":{"chicago":"Lemos, Rogrio de, Holger Giese, Hausi A. Müller, Mary Shaw, Jesper Andersson, Marin Litoiu, Bradley Schmerl, et al. “Software Engineering for Self-Adaptive Systems: A Second Research Roadmap.” <i>Software Engineering for Self-Adaptive Systems II</i>, 2013, 1–32. <a href=\"https://doi.org/10.1007/978-3-642-35813-5_1\">https://doi.org/10.1007/978-3-642-35813-5_1</a>.","ieee":"R. de Lemos <i>et al.</i>, “Software Engineering for Self-Adaptive Systems: A Second Research Roadmap,” <i>Software Engineering for Self-Adaptive Systems II</i>, pp. 1–32, 2013.","ama":"de Lemos R, Giese H, A. Müller H, et al. Software Engineering for Self-Adaptive Systems: A Second Research Roadmap. <i>Software Engineering for Self-Adaptive Systems II</i>. 2013:1-32. doi:<a href=\"https://doi.org/10.1007/978-3-642-35813-5_1\">10.1007/978-3-642-35813-5_1</a>","apa":"de Lemos, R., Giese, H., A. Müller, H., Shaw, M., Andersson, J., Litoiu, M., … Wuttke, J. (2013). Software Engineering for Self-Adaptive Systems: A Second Research Roadmap. <i>Software Engineering for Self-Adaptive Systems II</i>, 1–32. <a href=\"https://doi.org/10.1007/978-3-642-35813-5_1\">https://doi.org/10.1007/978-3-642-35813-5_1</a>","bibtex":"@article{de Lemos_Giese_A. Müller_Shaw_Andersson_Litoiu_Schmerl_Tamura_M. Villegas_Vogel_et al._2013, title={Software Engineering for Self-Adaptive Systems: A Second Research Roadmap}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-35813-5_1\">10.1007/978-3-642-35813-5_1</a>}, journal={Software Engineering for Self-Adaptive Systems II}, author={de Lemos, Rogrio and Giese, Holger and A. Müller, Hausi and Shaw, Mary and Andersson, Jesper and Litoiu, Marin and Schmerl, Bradley and Tamura, Gabriel and M. Villegas, Norha and Vogel, Thomas and et al.}, year={2013}, pages={1–32} }","short":"R. de Lemos, H. Giese, H. A. Müller, M. Shaw, J. Andersson, M. Litoiu, B. Schmerl, G. Tamura, N. M. Villegas, T. Vogel, D. Weyns, L. Baresi, B. Becker, N. Bencomo, Y. Brun, B. Cukic, R. Desmarais, S. Dustdar, G. Engels, K. Geihs, K. M. Göschka, A. Gorla, V. Grassi, P. Inverardi, G. Karsai, J. Kramer, A. Lopes, J. Magee, S. Malek, S. Mankovskii, R. Mirandola, J. Mylopoulos, O. Nierstrasz, M. Pezzè, C. Prehofer, W. Schäfer, R. Schlichting, D. B. Smith, J. Pedro Sousa, L. Tahvildari, K. Wong, J. Wuttke, Software Engineering for Self-Adaptive Systems II (2013) 1–32.","mla":"de Lemos, Rogrio, et al. “Software Engineering for Self-Adaptive Systems: A Second Research Roadmap.” <i>Software Engineering for Self-Adaptive Systems II</i>, 2013, pp. 1–32, doi:<a href=\"https://doi.org/10.1007/978-3-642-35813-5_1\">10.1007/978-3-642-35813-5_1</a>."},"year":"2013"},{"citation":{"bibtex":"@article{Bouillon_Güldali_Herrmann_Keuler_Moldt_Riebisch_2013, title={Leichtgewichtige Traceability im agilen Entwicklungsprozess am Beispiel von Scrum}, volume={33}, number={1}, journal={Softwaretechnik-Trends}, author={Bouillon, Elke and Güldali, Baris and Herrmann, Andrea and Keuler, Thorsten and Moldt, Daniel and Riebisch, Matthias}, year={2013}, pages={29–30} }","mla":"Bouillon, Elke, et al. “Leichtgewichtige Traceability Im Agilen Entwicklungsprozess Am Beispiel von Scrum.” <i>Softwaretechnik-Trends</i>, vol. 33, no. 1, 2013, pp. 29–30.","short":"E. Bouillon, B. Güldali, A. Herrmann, T. Keuler, D. Moldt, M. Riebisch, Softwaretechnik-Trends 33 (2013) 29–30.","apa":"Bouillon, E., Güldali, B., Herrmann, A., Keuler, T., Moldt, D., &#38; Riebisch, M. (2013). Leichtgewichtige Traceability im agilen Entwicklungsprozess am Beispiel von Scrum. <i>Softwaretechnik-Trends</i>, <i>33</i>(1), 29–30.","ama":"Bouillon E, Güldali B, Herrmann A, Keuler T, Moldt D, Riebisch M. Leichtgewichtige Traceability im agilen Entwicklungsprozess am Beispiel von Scrum. <i>Softwaretechnik-Trends</i>. 2013;33(1):29-30.","ieee":"E. Bouillon, B. Güldali, A. Herrmann, T. Keuler, D. Moldt, and M. Riebisch, “Leichtgewichtige Traceability im agilen Entwicklungsprozess am Beispiel von Scrum,” <i>Softwaretechnik-Trends</i>, vol. 33, no. 1, pp. 29–30, 2013.","chicago":"Bouillon, Elke, Baris Güldali, Andrea Herrmann, Thorsten Keuler, Daniel Moldt, and Matthias Riebisch. “Leichtgewichtige Traceability Im Agilen Entwicklungsprozess Am Beispiel von Scrum.” <i>Softwaretechnik-Trends</i> 33, no. 1 (2013): 29–30."},"page":"29-30","intvolume":"        33","year":"2013","issue":"1","title":"Leichtgewichtige Traceability im agilen Entwicklungsprozess am Beispiel von Scrum","author":[{"first_name":"Elke","full_name":"Bouillon, Elke","last_name":"Bouillon"},{"first_name":"Baris","full_name":"Güldali, Baris","last_name":"Güldali"},{"last_name":"Herrmann","full_name":"Herrmann, Andrea","first_name":"Andrea"},{"last_name":"Keuler","full_name":"Keuler, Thorsten","first_name":"Thorsten"},{"first_name":"Daniel","full_name":"Moldt, Daniel","last_name":"Moldt"},{"last_name":"Riebisch","full_name":"Riebisch, Matthias","first_name":"Matthias"}],"date_created":"2019-01-30T13:52:21Z","volume":33,"date_updated":"2022-01-06T07:03:31Z","status":"public","type":"journal_article","publication":"Softwaretechnik-Trends","language":[{"iso":"eng"}],"user_id":"52534","department":[{"_id":"66"}],"_id":"7272"},{"publication":"OBJEKTspektrum (Online Themenspecials)","type":"journal_article","status":"public","_id":"7273","department":[{"_id":"66"}],"user_id":"52534","language":[{"iso":"eng"}],"year":"2013","page":"1-4","citation":{"apa":"Grieger, M., Güldali, B., Sauer, S., &#38; Mlynarski, M. (2013). Testen bei Migrationsprojekten. <i>OBJEKTspektrum (Online Themenspecials)</i>, 1–4.","mla":"Grieger, Marvin, et al. “Testen Bei Migrationsprojekten.” <i>OBJEKTspektrum (Online Themenspecials)</i>, 2013, pp. 1–4.","bibtex":"@article{Grieger_Güldali_Sauer_Mlynarski_2013, title={Testen bei Migrationsprojekten}, journal={OBJEKTspektrum (Online Themenspecials)}, author={Grieger, Marvin and Güldali, Baris and Sauer, Stefan and Mlynarski, Michael}, year={2013}, pages={1–4} }","short":"M. Grieger, B. Güldali, S. Sauer, M. Mlynarski, OBJEKTspektrum (Online Themenspecials) (2013) 1–4.","ama":"Grieger M, Güldali B, Sauer S, Mlynarski M. Testen bei Migrationsprojekten. <i>OBJEKTspektrum (Online Themenspecials)</i>. 2013:1-4.","chicago":"Grieger, Marvin, Baris Güldali, Stefan Sauer, and Michael Mlynarski. “Testen Bei Migrationsprojekten.” <i>OBJEKTspektrum (Online Themenspecials)</i>, 2013, 1–4.","ieee":"M. Grieger, B. Güldali, S. Sauer, and M. Mlynarski, “Testen bei Migrationsprojekten,” <i>OBJEKTspektrum (Online Themenspecials)</i>, pp. 1–4, 2013."},"date_updated":"2022-01-06T07:03:31Z","date_created":"2019-01-30T13:52:57Z","author":[{"first_name":"Marvin","full_name":"Grieger, Marvin","last_name":"Grieger"},{"last_name":"Güldali","full_name":"Güldali, Baris","first_name":"Baris"},{"last_name":"Sauer","full_name":"Sauer, Stefan","id":"447","first_name":"Stefan"},{"full_name":"Mlynarski, Michael","last_name":"Mlynarski","first_name":"Michael"}],"title":"Testen bei Migrationsprojekten"},{"status":"public","publication":"OBJEKTspektrum (Online Themenspecials)","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"66"}],"user_id":"52534","_id":"7274","page":"1-5","citation":{"mla":"Fazal-Baqaie, Masud, et al. “Maßgeschneidert Und Werkzeugunterstützt Entwickeln Angepasster Requirements Engineering-Methoden.” <i>OBJEKTspektrum (Online Themenspecials)</i>, no. RE/2013, 2013, pp. 1–5.","short":"M. Fazal-Baqaie, B. Güldali, M. Luckey, S. Sauer, M. Spijkerman, OBJEKTspektrum (Online Themenspecials) (2013) 1–5.","bibtex":"@article{Fazal-Baqaie_Güldali_Luckey_Sauer_Spijkerman_2013, title={Maßgeschneidert und werkzeugunterstützt Entwickeln angepasster Requirements Engineering-Methoden}, number={RE/2013}, journal={OBJEKTspektrum (Online Themenspecials)}, author={Fazal-Baqaie, Masud and Güldali, Baris and Luckey, Markus and Sauer, Stefan and Spijkerman, Michael}, year={2013}, pages={1–5} }","apa":"Fazal-Baqaie, M., Güldali, B., Luckey, M., Sauer, S., &#38; Spijkerman, M. (2013). Maßgeschneidert und werkzeugunterstützt Entwickeln angepasster Requirements Engineering-Methoden. <i>OBJEKTspektrum (Online Themenspecials)</i>, (RE/2013), 1–5.","ieee":"M. Fazal-Baqaie, B. Güldali, M. Luckey, S. Sauer, and M. Spijkerman, “Maßgeschneidert und werkzeugunterstützt Entwickeln angepasster Requirements Engineering-Methoden,” <i>OBJEKTspektrum (Online Themenspecials)</i>, no. RE/2013, pp. 1–5, 2013.","chicago":"Fazal-Baqaie, Masud, Baris Güldali, Markus Luckey, Stefan Sauer, and Michael Spijkerman. “Maßgeschneidert Und Werkzeugunterstützt Entwickeln Angepasster Requirements Engineering-Methoden.” <i>OBJEKTspektrum (Online Themenspecials)</i>, no. RE/2013 (2013): 1–5.","ama":"Fazal-Baqaie M, Güldali B, Luckey M, Sauer S, Spijkerman M. Maßgeschneidert und werkzeugunterstützt Entwickeln angepasster Requirements Engineering-Methoden. <i>OBJEKTspektrum (Online Themenspecials)</i>. 2013;(RE/2013):1-5."},"year":"2013","issue":"RE/2013","title":"Maßgeschneidert und werkzeugunterstützt Entwickeln angepasster Requirements Engineering-Methoden","date_created":"2019-01-30T13:53:56Z","author":[{"last_name":"Fazal-Baqaie","full_name":"Fazal-Baqaie, Masud","first_name":"Masud"},{"last_name":"Güldali","full_name":"Güldali, Baris","first_name":"Baris"},{"first_name":"Markus","last_name":"Luckey","full_name":"Luckey, Markus"},{"first_name":"Stefan","last_name":"Sauer","id":"447","full_name":"Sauer, Stefan"},{"first_name":"Michael","last_name":"Spijkerman","full_name":"Spijkerman, Michael"}],"date_updated":"2022-01-06T07:03:31Z"},{"issue":"1","year":"2013","page":"1-2","intvolume":"        28","citation":{"ama":"Engels G, Luckey M. Editorial. <i>Computer Science - Research and Development</i>. 2013;28(1):1-2.","chicago":"Engels, Gregor, and Markus Luckey. “Editorial.” <i>Computer Science - Research and Development</i> 28, no. 1 (2013): 1–2.","ieee":"G. Engels and M. Luckey, “Editorial,” <i>Computer Science - Research and Development</i>, vol. 28, no. 1, pp. 1–2, 2013.","short":"G. Engels, M. Luckey, Computer Science - Research and Development 28 (2013) 1–2.","bibtex":"@article{Engels_Luckey_2013, title={Editorial}, volume={28}, number={1}, journal={Computer Science - Research and Development}, author={Engels, Gregor and Luckey, Markus}, year={2013}, pages={1–2} }","mla":"Engels, Gregor, and Markus Luckey. “Editorial.” <i>Computer Science - Research and Development</i>, vol. 28, no. 1, 2013, pp. 1–2.","apa":"Engels, G., &#38; Luckey, M. (2013). Editorial. <i>Computer Science - Research and Development</i>, <i>28</i>(1), 1–2."},"date_updated":"2022-01-06T07:03:31Z","volume":28,"date_created":"2019-01-30T13:54:36Z","author":[{"id":"107","full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"},{"full_name":"Luckey, Markus","last_name":"Luckey","first_name":"Markus"}],"title":"Editorial","publication":"Computer Science - Research and Development","type":"journal_article","status":"public","_id":"7275","department":[{"_id":"66"}],"user_id":"52534","language":[{"iso":"eng"}]},{"publication":"Forschungsforum Paderborn","type":"journal_article","status":"public","department":[{"_id":"66"}],"user_id":"52534","_id":"7276","language":[{"iso":"eng"}],"page":"54-61","citation":{"apa":"Engels, G., Gerth, C., Kleinjohann, B., Kleinjohann, L., Müller, W., &#38; Sauer, S. (2013). Informationstechnik spart Ressourcen. <i>Forschungsforum Paderborn</i>, <i>16/2013</i>, 54–61.","bibtex":"@article{Engels_Gerth_Kleinjohann_Kleinjohann_Müller_Sauer_2013, title={Informationstechnik spart Ressourcen}, volume={16/2013}, journal={Forschungsforum Paderborn}, author={Engels, Gregor and Gerth, Christian and Kleinjohann, Bernd and Kleinjohann, Lisa and Müller, Wolfgang and Sauer, Stefan}, year={2013}, pages={54–61} }","mla":"Engels, Gregor, et al. “Informationstechnik Spart Ressourcen.” <i>Forschungsforum Paderborn</i>, vol. 16/2013, 2013, pp. 54–61.","short":"G. Engels, C. Gerth, B. Kleinjohann, L. Kleinjohann, W. Müller, S. Sauer, Forschungsforum Paderborn 16/2013 (2013) 54–61.","ieee":"G. Engels, C. Gerth, B. Kleinjohann, L. Kleinjohann, W. Müller, and S. Sauer, “Informationstechnik spart Ressourcen,” <i>Forschungsforum Paderborn</i>, vol. 16/2013, pp. 54–61, 2013.","chicago":"Engels, Gregor, Christian Gerth, Bernd Kleinjohann, Lisa Kleinjohann, Wolfgang Müller, and Stefan Sauer. “Informationstechnik Spart Ressourcen.” <i>Forschungsforum Paderborn</i> 16/2013 (2013): 54–61.","ama":"Engels G, Gerth C, Kleinjohann B, Kleinjohann L, Müller W, Sauer S. Informationstechnik spart Ressourcen. <i>Forschungsforum Paderborn</i>. 2013;16/2013:54-61."},"year":"2013","volume":"16/2013","date_created":"2019-01-30T13:55:16Z","author":[{"first_name":"Gregor","last_name":"Engels","full_name":"Engels, Gregor","id":"107"},{"first_name":"Christian","full_name":"Gerth, Christian","last_name":"Gerth"},{"full_name":"Kleinjohann, Bernd","last_name":"Kleinjohann","first_name":"Bernd"},{"id":"15588","full_name":"Kleinjohann, Lisa","last_name":"Kleinjohann","first_name":"Lisa"},{"first_name":"Wolfgang","full_name":"Müller, Wolfgang","last_name":"Müller"},{"last_name":"Sauer","full_name":"Sauer, Stefan","id":"447","first_name":"Stefan"}],"date_updated":"2022-01-06T07:03:31Z","title":"Informationstechnik spart Ressourcen"},{"status":"public","publication":"Software and Systems Modeling","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"66"}],"user_id":"52534","_id":"7277","intvolume":"        12","page":"517-535","citation":{"ama":"Gerth C, Küster J, Luckey M, Engels G. Detection and Resolution of Conflicting Change Operations in Version Management of Process Models. <i>Software and Systems Modeling</i>. 2013;12(3):517-535.","ieee":"C. Gerth, J. Küster, M. Luckey, and G. Engels, “Detection and Resolution of Conflicting Change Operations in Version Management of Process Models,” <i>Software and Systems Modeling</i>, vol. 12, no. 3, pp. 517–535, 2013.","chicago":"Gerth, Christian, Jochen Küster, Markus Luckey, and Gregor Engels. “Detection and Resolution of Conflicting Change Operations in Version Management of Process Models.” <i>Software and Systems Modeling</i> 12, no. 3 (2013): 517–35.","apa":"Gerth, C., Küster, J., Luckey, M., &#38; Engels, G. (2013). Detection and Resolution of Conflicting Change Operations in Version Management of Process Models. <i>Software and Systems Modeling</i>, <i>12</i>(3), 517–535.","short":"C. Gerth, J. Küster, M. Luckey, G. Engels, Software and Systems Modeling 12 (2013) 517–535.","bibtex":"@article{Gerth_Küster_Luckey_Engels_2013, title={Detection and Resolution of Conflicting Change Operations in Version Management of Process Models}, volume={12}, number={3}, journal={Software and Systems Modeling}, author={Gerth, Christian and Küster, Jochen and Luckey, Markus and Engels, Gregor}, year={2013}, pages={517–535} }","mla":"Gerth, Christian, et al. “Detection and Resolution of Conflicting Change Operations in Version Management of Process Models.” <i>Software and Systems Modeling</i>, vol. 12, no. 3, 2013, pp. 517–35."},"year":"2013","issue":"3","title":"Detection and Resolution of Conflicting Change Operations in Version Management of Process Models","volume":12,"author":[{"last_name":"Gerth","full_name":"Gerth, Christian","first_name":"Christian"},{"first_name":"Jochen","last_name":"Küster","full_name":"Küster, Jochen"},{"last_name":"Luckey","full_name":"Luckey, Markus","first_name":"Markus"},{"last_name":"Engels","id":"107","full_name":"Engels, Gregor","first_name":"Gregor"}],"date_created":"2019-01-30T13:56:05Z","date_updated":"2022-01-06T07:03:31Z"},{"status":"public","abstract":[{"text":"Modellbasiertes Testen verspricht potenziell eine höhere Effizienz und Effektivität im Testprozess. Ob im eigenen Kontext der Einsatz wirtschaftlich ist, ist jedoch häufig unklar. Dieser Beitrag analysiert systematisch Kosten- und Nutzenfaktoren und stellt ein Verfahren zur Abschätzung der Wirtschaftlichkeit des modellbasierten Testens vor. Anhand eines Beispiels wird der Ablauf veranschaulicht.","lang":"eng"}],"publication":"OBJEKTspektrum","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"66"}],"user_id":"52534","_id":"7278","page":"32-38","intvolume":"         4","citation":{"bibtex":"@article{Faragó_Törsel_Mlynarski_Weißleder_Güldali_Brandes_2013, title={Wirtschaftlichkeitsberechnung für MBT: Wann sich modellbasiertes Testen lohnt}, volume={4}, journal={OBJEKTspektrum}, author={Faragó, David and Törsel, Arne-Michael and Mlynarski, Michael and Weißleder, Stephan and Güldali, Baris and Brandes, Christian}, year={2013}, pages={32–38} }","mla":"Faragó, David, et al. “Wirtschaftlichkeitsberechnung Für MBT: Wann Sich Modellbasiertes Testen Lohnt.” <i>OBJEKTspektrum</i>, vol. 4, 2013, pp. 32–38.","short":"D. Faragó, A.-M. Törsel, M. Mlynarski, S. Weißleder, B. Güldali, C. Brandes, OBJEKTspektrum 4 (2013) 32–38.","apa":"Faragó, D., Törsel, A.-M., Mlynarski, M., Weißleder, S., Güldali, B., &#38; Brandes, C. (2013). Wirtschaftlichkeitsberechnung für MBT: Wann sich modellbasiertes Testen lohnt. <i>OBJEKTspektrum</i>, <i>4</i>, 32–38.","ama":"Faragó D, Törsel A-M, Mlynarski M, Weißleder S, Güldali B, Brandes C. Wirtschaftlichkeitsberechnung für MBT: Wann sich modellbasiertes Testen lohnt. <i>OBJEKTspektrum</i>. 2013;4:32-38.","chicago":"Faragó, David, Arne-Michael Törsel, Michael Mlynarski, Stephan Weißleder, Baris Güldali, and Christian Brandes. “Wirtschaftlichkeitsberechnung Für MBT: Wann Sich Modellbasiertes Testen Lohnt.” <i>OBJEKTspektrum</i> 4 (2013): 32–38.","ieee":"D. Faragó, A.-M. Törsel, M. Mlynarski, S. Weißleder, B. Güldali, and C. Brandes, “Wirtschaftlichkeitsberechnung für MBT: Wann sich modellbasiertes Testen lohnt,” <i>OBJEKTspektrum</i>, vol. 4, pp. 32–38, 2013."},"year":"2013","title":"Wirtschaftlichkeitsberechnung für MBT: Wann sich modellbasiertes Testen lohnt","volume":4,"date_created":"2019-01-30T13:56:52Z","author":[{"first_name":"David","last_name":"Faragó","full_name":"Faragó, David"},{"full_name":"Törsel, Arne-Michael","last_name":"Törsel","first_name":"Arne-Michael"},{"first_name":"Michael","last_name":"Mlynarski","full_name":"Mlynarski, Michael"},{"full_name":"Weißleder, Stephan","last_name":"Weißleder","first_name":"Stephan"},{"full_name":"Güldali, Baris","last_name":"Güldali","first_name":"Baris"},{"last_name":"Brandes","full_name":"Brandes, Christian","first_name":"Christian"}],"date_updated":"2022-01-06T07:03:31Z"},{"user_id":"52534","department":[{"_id":"66"}],"_id":"7523","type":"book_chapter","status":"public","editor":[{"last_name":"Chang","full_name":"Chang, S K","first_name":"S K"}],"author":[{"first_name":"Gregor","full_name":"Engels, Gregor","id":"107","last_name":"Engels"},{"last_name":"Sauer","id":"447","full_name":"Sauer, Stefan","first_name":"Stefan"}],"volume":2,"date_updated":"2022-01-06T07:03:39Z","doi":"https://doi.org/10.1142/4603","publication_status":"published","publication_identifier":{"isbn":["9789810245146","9789810249731","9789812389718"]},"citation":{"chicago":"Engels, Gregor, and Stefan Sauer. “Object-Oriented Modeling of Multimedia Applications.” In <i>Handbook of Software Engineering and Knowledge Engineering</i>, edited by S K Chang, 2:21--53. Singapore: World Scientific Publishing Company, 2013. <a href=\"https://doi.org/10.1142/4603\">https://doi.org/10.1142/4603</a>.","ieee":"G. Engels and S. Sauer, “Object-oriented Modeling of Multimedia Applications,” in <i>Handbook of Software Engineering and Knowledge Engineering</i>, vol. 2, S. K. Chang, Ed. Singapore: World Scientific Publishing Company, 2013, pp. 21--53.","ama":"Engels G, Sauer S. Object-oriented Modeling of Multimedia Applications. In: Chang SK, ed. <i>Handbook of Software Engineering and Knowledge Engineering</i>. Vol 2. Singapore: World Scientific Publishing Company; 2013:21--53. doi:<a href=\"https://doi.org/10.1142/4603\">https://doi.org/10.1142/4603</a>","apa":"Engels, G., &#38; Sauer, S. (2013). Object-oriented Modeling of Multimedia Applications. In S. K. Chang (Ed.), <i>Handbook of Software Engineering and Knowledge Engineering</i> (Vol. 2, pp. 21--53). Singapore: World Scientific Publishing Company. <a href=\"https://doi.org/10.1142/4603\">https://doi.org/10.1142/4603</a>","bibtex":"@inbook{Engels_Sauer_2013, place={Singapore}, title={Object-oriented Modeling of Multimedia Applications}, volume={2}, DOI={<a href=\"https://doi.org/10.1142/4603\">https://doi.org/10.1142/4603</a>}, booktitle={Handbook of Software Engineering and Knowledge Engineering}, publisher={World Scientific Publishing Company}, author={Engels, Gregor and Sauer, Stefan}, editor={Chang, S KEditor}, year={2013}, pages={21--53} }","short":"G. Engels, S. Sauer, in: S.K. Chang (Ed.), Handbook of Software Engineering and Knowledge Engineering, World Scientific Publishing Company, Singapore, 2013, pp. 21--53.","mla":"Engels, Gregor, and Stefan Sauer. “Object-Oriented Modeling of Multimedia Applications.” <i>Handbook of Software Engineering and Knowledge Engineering</i>, edited by S K Chang, vol. 2, World Scientific Publishing Company, 2013, pp. 21--53, doi:<a href=\"https://doi.org/10.1142/4603\">https://doi.org/10.1142/4603</a>."},"intvolume":"         2","page":"21--53","place":"Singapore","language":[{"iso":"eng"}],"publication":"Handbook of Software Engineering and Knowledge Engineering","date_created":"2019-02-04T22:56:37Z","publisher":"World Scientific Publishing Company","title":"Object-oriented Modeling of Multimedia Applications","year":"2013"},{"author":[{"first_name":"Christian","orcid":"0000-0002-0342-8227","last_name":"Soltenborn","id":"1737","full_name":"Soltenborn, Christian"}],"date_created":"2019-02-06T14:15:58Z","supervisor":[{"first_name":"Gregor","last_name":"Engels","id":"107","full_name":"Engels, Gregor"}],"date_updated":"2022-01-06T07:03:39Z","publisher":"Universität Paderborn","doi":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420","title":"Quality Assurance with Dynamic Meta Modeling","citation":{"ama":"Soltenborn C. <i>Quality Assurance with Dynamic Meta Modeling</i>. Universität Paderborn; 2013. doi:<a href=\"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420\">http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420</a>","chicago":"Soltenborn, Christian. <i>Quality Assurance with Dynamic Meta Modeling</i>. Universität Paderborn, 2013. <a href=\"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420\">http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420</a>.","ieee":"C. Soltenborn, <i>Quality Assurance with Dynamic Meta Modeling</i>. Universität Paderborn, 2013.","bibtex":"@book{Soltenborn_2013, title={Quality Assurance with Dynamic Meta Modeling}, DOI={<a href=\"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420\">http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420</a>}, publisher={Universität Paderborn}, author={Soltenborn, Christian}, year={2013} }","short":"C. Soltenborn, Quality Assurance with Dynamic Meta Modeling, Universität Paderborn, 2013.","mla":"Soltenborn, Christian. <i>Quality Assurance with Dynamic Meta Modeling</i>. Universität Paderborn, 2013, doi:<a href=\"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420\">http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420</a>.","apa":"Soltenborn, C. (2013). <i>Quality Assurance with Dynamic Meta Modeling</i>. Universität Paderborn. <a href=\"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420\">http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12420</a>"},"year":"2013","user_id":"477","department":[{"_id":"66"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"9","name":"SFB 901 - Subproject B1"}],"_id":"7569","language":[{"iso":"eng"}],"type":"dissertation","status":"public","abstract":[{"text":"Dynamic Meta Modeling (DMM) is a semantics specification technique targeted at MOF-based modeling languages, where a language's behavior is defined by means of graphical operational rules which change runtime models. The DMM approach has first been suggested by Engels et al. in 2000; Hausmann has then defined the DMM language on a conceptual level within his PhD thesis in 2006. Consequently, the next step was to bring the existing DMM concepts alive, and then to apply them to different modeling languages, making use of the lessons learned to improve the DMM concepts as well as the DMM tooling. The result of this process is the DMM++ method, which is presented within this thesis. Our contributions are three-fold: First, and according to our experiences with the DMM language, we have introduced new concepts such as refinement by means of rule overriding, and we have strengthened existing concepts such as the dealing with universally quantified structures or attributes. Second, we have developed a test-driven process for semantics specification: A set of test models is created, and their expected behavior is fixed. Then, the DMM rules are created incrementally, finally resulting in a DMM ruleset realizing at least the expected behavior of the test models. Additionally, we have defined a set of coverage criteria for DMM rulesets which allow to measure the quality of a set of test models. Third, we have shown how functional as well as non-functional requirements can be formulated against models and their DMM specifications. The former is achieved by providing a visual language for formulating temporal logic properties, which are then verified with model checking techniques, and by allowing for visual debugging of models failing a requirement. For the latter, the modeler can add performance information to models and analyze their performance properties, e.g. average throughput.","lang":"eng"}]},{"type":"dissertation","abstract":[{"text":"Driven by the need for a closer alignment of business and IT requirements, the role of business process models in the development of enterprise software systems has increased continuously. Similar to other software artifacts, process models are developed and refined in team environments by several stakeholders, resulting in different versions. These versions need to be merged in order to obtain an integrated process model. Existing solutions to this basic problem in the field of software configuration management are mainly limited to textual documents, e.g., source code. This monograph presents a generally applicable framework for process model change management, which provides easy-to-use comparison and merging capabilities for the integration of different process model versions. The framework supports popular modeling languages such as BPMN, BPEL, or UML Activity Diagrams. Differences between process models are represented in terms of intuitive, high-level change operations. Equipped with a sophisticated analysis of dependencies and a semantic-aware computation of conflicts between differences, the framework constitutes a comprehensive and practically usable solution for process model change management in the model-driven development of enterprise software systems.","lang":"eng"}],"status":"public","_id":"7571","department":[{"_id":"66"}],"user_id":"52534","language":[{"iso":"eng"}],"related_material":{"link":[{"url":"http://www.springer.com/computer/database+management+%26+information+retrieval/book/978-3-642-38603-9","relation":"confirmation"}]},"year":"2013","citation":{"ama":"Gerth C. <i>Business Process Models - Change Management</i>.; 2013.","ieee":"C. Gerth, <i>Business Process Models - Change Management</i>. 2013.","chicago":"Gerth, Christian. <i>Business Process Models - Change Management</i>, 2013.","apa":"Gerth, C. (2013). <i>Business Process Models - Change Management</i>.","short":"C. Gerth, Business Process Models - Change Management, 2013.","mla":"Gerth, Christian. <i>Business Process Models - Change Management</i>. 2013.","bibtex":"@book{Gerth_2013, title={Business Process Models - Change Management}, author={Gerth, Christian}, year={2013} }"},"date_updated":"2022-01-06T07:03:40Z","author":[{"full_name":"Gerth, Christian","last_name":"Gerth","first_name":"Christian"}],"date_created":"2019-02-06T14:18:12Z","title":"Business Process Models - Change Management"},{"title":"How backhaul networks influence the feasibility of coordinated multipoint in cellular networks","doi":"10.1109/MCOM.2013.6576356","date_updated":"2022-01-06T07:03:44Z","author":[{"last_name":"Biermann","full_name":"Biermann, Thorsten","first_name":"Thorsten"},{"first_name":"Luca","full_name":"Scalia, Luca","last_name":"Scalia"},{"first_name":"Changsoon","last_name":"Choi","full_name":"Choi, Changsoon"},{"full_name":"Kellerer, Wolfgang","last_name":"Kellerer","first_name":"Wolfgang"},{"first_name":"Holger","last_name":"Karl","full_name":"Karl, Holger"}],"date_created":"2017-11-27T10:22:26Z","year":"2013","citation":{"bibtex":"@article{Biermann_Scalia_Choi_Kellerer_Karl_2013, title={How backhaul networks influence the feasibility of coordinated multipoint in cellular networks}, DOI={<a href=\"https://doi.org/10.1109/MCOM.2013.6576356\">10.1109/MCOM.2013.6576356</a>}, number={8}, journal={{IEEE} Communications Magazine}, author={Biermann, Thorsten and Scalia, Luca and Choi, Changsoon and Kellerer, Wolfgang and Karl, Holger}, year={2013} }","short":"T. Biermann, L. Scalia, C. Choi, W. Kellerer, H. Karl, {IEEE} Communications Magazine (2013).","mla":"Biermann, Thorsten, et al. “How Backhaul Networks Influence the Feasibility of Coordinated Multipoint in Cellular Networks.” <i>{IEEE} Communications Magazine</i>, no. 8, 2013, doi:<a href=\"https://doi.org/10.1109/MCOM.2013.6576356\">10.1109/MCOM.2013.6576356</a>.","apa":"Biermann, T., Scalia, L., Choi, C., Kellerer, W., &#38; Karl, H. (2013). How backhaul networks influence the feasibility of coordinated multipoint in cellular networks. <i>{IEEE} Communications Magazine</i>, (8). <a href=\"https://doi.org/10.1109/MCOM.2013.6576356\">https://doi.org/10.1109/MCOM.2013.6576356</a>","ama":"Biermann T, Scalia L, Choi C, Kellerer W, Karl H. How backhaul networks influence the feasibility of coordinated multipoint in cellular networks. <i>{IEEE} Communications Magazine</i>. 2013;(8). doi:<a href=\"https://doi.org/10.1109/MCOM.2013.6576356\">10.1109/MCOM.2013.6576356</a>","chicago":"Biermann, Thorsten, Luca Scalia, Changsoon Choi, Wolfgang Kellerer, and Holger Karl. “How Backhaul Networks Influence the Feasibility of Coordinated Multipoint in Cellular Networks.” <i>{IEEE} Communications Magazine</i>, no. 8 (2013). <a href=\"https://doi.org/10.1109/MCOM.2013.6576356\">https://doi.org/10.1109/MCOM.2013.6576356</a>.","ieee":"T. Biermann, L. Scalia, C. Choi, W. Kellerer, and H. Karl, “How backhaul networks influence the feasibility of coordinated multipoint in cellular networks,” <i>{IEEE} Communications Magazine</i>, no. 8, 2013."},"issue":"8","_id":"769","user_id":"15572","department":[{"_id":"75"}],"status":"public","type":"journal_article","publication":"{IEEE} Communications Magazine"}]
