TY - CHAP AU - Anacker, Harald AU - Dellnitz, Michael AU - Flaßkamp, Kathrin AU - Grösbrink, Stefan AU - Hartmann, Philip AU - Heinzemann, Christian AU - Horenkamp, Christian AU - Kleinjohann, Lisa AU - Kleinjohann, Bernd AU - Korf, Sebastian AU - Krüger, Martin AU - Müller, Wolfgang AU - Ober-Blöbaum, Sina AU - Oberthür, Simon AU - Porrmann, Mario AU - Priesterjahn, Claudia AU - Radkowski, W. AU - Rasche, Christoph AU - Rieke, Jan AU - Ringkamp, Maik AU - Stahl, Katharina AU - Steenken, Dominik AU - Stöcklein, Jörg AU - Timmermann, Robert AU - Trächtler, Ansgar AU - Witting, Katrin AU - Xie, Tao AU - Ziegert, Steffen ID - 25743 T2 - Design Methodology for Intelligent Technical Systems Systems – Develop Intelligent Technical Systems of the Future TI - Methods for the Design and Development ER - TY - CONF AU - Wachsmuth, Henning AU - Stein, Benno AU - Engels, Gregor ED - Gelbukh, Alexander ID - 3813 T2 - Proceedings of the Sixth International Joint Conference on Natural Language Processing TI - Learning Efficient Information Extraction on Heterogeneous Texts ER - TY - CONF AU - Wachsmuth, Henning AU - Stein, Benno AU - Engels, Gregor ID - 3814 SN - 978-1-4503-2263-8 T2 - Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management TI - Information Extraction as a Filtering Task ER - TY - CONF AU - Wachsmuth, Henning AU - Rose, Mirko AU - Engels, Gregor ED - Gelbukh, Alexander ID - 3876 T2 - 14th International Conference on Intelligent Text Processing and Computational Linguistics TI - Automatic Pipeline Construction for Real-Time Annotation ER - TY - THES AU - Kuntze, Daniel ID - 2909 TI - Practical algorithms for clustering and modeling large data sets - Analysis and improvements ER - TY - GEN AU - Juhnke, Jakob AU - Lefmann, Hanno AU - Strehl, Volker ID - 2917 TI - An Approach for Determining Optimal Contrast in Visual Cryptography ER - TY - CHAP AU - Blömer, Johannes AU - Günther, Peter AU - Liske, Gennadij ID - 2979 SN - 0302-9743 T2 - Constructive Side-Channel Analysis and Secure Design TI - Improved Side Channel Attacks on Pairing Based Cryptography ER - TY - JOUR AU - Jager, Tibor AU - Schwenk, Jörg ID - 3129 IS - 2 JF - J. Cryptology TI - On the Analysis of Cryptographic Assumptions in the Generic Ring Model ER - TY - CONF AU - Böhl, Florian AU - Hofheinz, Dennis AU - Jager, Tibor AU - Koch, Jessica AU - Hong Seo, Jae AU - Striecks, Christoph ID - 3130 T2 - Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings TI - Practical Signatures from Standard Assumptions ER - TY - CONF AU - Jager, Tibor AU - Paterson, Kenneth G. AU - Somorovsky, Juraj ID - 3131 T2 - 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013 TI - One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography ER - TY - CONF AU - Isenberg, Tobias AU - Steenken, Dominik AU - Wehrheim, Heike ED - Beyer, Dirk ED - Boreale, Michele ID - 3176 T2 - Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings TI - Bounded Model Checking of Graph Transformation Systems via {SMT} Solving ER - TY - CONF AU - Travkin, Oleg AU - Mütze, Annika AU - Wehrheim, Heike ED - Bertacco, Valeria ED - Legay, Axel ID - 3177 T2 - Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference, {HVC} 2013, Haifa, Israel, November 5-7, 2013, Proceedings TI - {SPIN} as a Linearizability Checker under Weak Memory Models ER - TY - CONF AU - Dongol, Brijesh AU - Travkin, Oleg AU - Derrick, John AU - Wehrheim, Heike ED - Liu, Zhiming ED - Woodcock, Jim ED - Zhu, Huibiao ID - 3178 T2 - Theoretical Aspects of Computing - {ICTAC} 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings TI - A High-Level Semantics for Program Execution under Total Store Order Memory ER - TY - CONF AU - Ziegert, Steffen AU - Wehrheim, Heike ED - Kowalewski, Stefan ED - Rumpe, Bernhard ID - 3179 T2 - Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar - 2. M{\"{a}}rz 2013 in Aachen TI - Temporal Reconfiguration Plans for Self-Adaptive Systems ER - TY - CONF AU - Gausemeier, Jürgen AU - Grafe, Michael AU - Meyer auf der Heide, Friedhelm ID - 27054 TI - 11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung VL - 311 ER - TY - CONF AU - Keil, Reinhard AU - Winkelnkemper, Felix ID - 27168 TI - Approaches for an informational separation of powers in learning platforms ER - TY - CONF AU - Fischer, Holger Gerhard AU - Geis, Thomas AU - Molich, Rolf AU - Kluge, Oliver AU - Heimg{\"a}rtner, R{\"u}diger AU - Hunkirchen, Peter AU - Polkehn, Knut ID - 27169 TI - „Do You Speak Usability?“ – Aktueller Stand des Glossars und des Curriculums f{\"u}r den „Certified Professional for Usability and User Experience (CPUX)“ der German UPA ER - TY - THES AU - K {\ "u} hnel, Birger ID - 27171 TI - Contextual tagging in the coactive knowledge organization ER - TY - CONF AU - Fischer, Holger Gerhard AU - Strenge, Benjamin AU - Nebe, Karsten ID - 27172 TI - Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design ER - TY - JOUR AU - Keil, Reinhard AU - Selke, Harald AU - Winkelnkemper, Felix ID - 27173 JF - FIfF-Kommunikation TI - Computer science and education - A struggle for creative sovereignty in society? ER - TY - CONF AU - Keil, Reinhard ID - 27174 TI - Media contexts - context media ER - TY - CONF AU - Klompmaker, Florian AU - Paelke, Volker AU - Fischer, Holger Gerhard ID - 27175 TI - A Taxonomy-Based Approach Towards NUI Interaction Design ER - TY - THES AB - Reconfigurable circuit devices have opened up a fundamentally new way of creating adaptable systems. Combined with artificial evolution, reconfigurable circuits allow an elegant adaptation approach to compensating for changes in the distribution of input data, computational resource errors, and variations in resource requirements. Referred to as ``Evolvable Hardware'' (EHW), this paradigm has yielded astonishing results for traditional engineering challenges and has discovered intriguing design principles, which have not yet been seen in conventional engineering. In this thesis, we present new and fundamental work on Evolvable Hardware motivated by the insight that Evolvable Hardware needs to compensate for events with different change rates. To solve the challenge of different adaptation speeds, we propose a unified adaptation approach based on multi-objective evolution, evolving and propagating candidate solutions that are diverse in objectives that may experience radical changes. Focusing on algorithmic aspects, we enable Cartesian Genetic Programming (CGP) model, which we are using to encode Boolean circuits, for multi-objective optimization by introducing a meaningful recombination operator. We improve the scalability of CGP by objectives scaling, periodization of local- and global-search algorithms, and the automatic acquisition and reuse of subfunctions using age- and cone-based techniques. We validate our methods on the applications of adaptation of hardware classifiers to resource changes, recognition of muscular signals for prosthesis control and optimization of processor caches. AU - Kaufmann, Paul ID - 11619 SN - 978-3-8325-3530-8 TI - Adapting Hardware Systems by Means of Multi-Objective Evolution ER - TY - GEN AU - Hüwe, Marcus ID - 20978 TI - Das Verteilungsproblem für mechatronische Systeme ER - TY - CONF AB - Das Thema Elektromobilität hat in der Fahrzeugindustrie in den letzten Jahren viel Aufmerksamkeit erhalten. Gerade im Bereich der Entwicklung von Steuergeräte-Software ist der Bedarf an frühzeitiger Absicherung hoch. Nur so können Produkteinführungszeiten minimiert und effektiv Entwicklungskosten eingespart werden. Komplexe Werkzeugketten und die verteilte Entwicklung erschweren den Prozess und verlängern die Entwicklungszeit. Das Förderprojekt „Simulationsgestützter Entwurf für Elektrofahrzeuge“, kurz „E-Mobil“, nimmt sich der Herausforderungen einer verteilten Entwicklung von Steuergeräte-Software an. Vier Projektpartner aus Industrie und Forschung untersuchen die Besonderheiten sowohl bzgl. des Entwurfsprozesses, als auch der beteiligten Entwurfswerkzeuge im Vergleich zur konventionellen Fahrzeugentwicklung. Im Fokus stehen die Modellierung und die simulationsgestützte Absicherung in frühen Entwurfsstadien. Die Modellierung umfasst Regelungssoftware sowie die für die Simulation nötigen elektrischen und mechatronischen Komponenten. Die vorliegende Arbeit stellt die Kernthemen sowie aktuelle Ergebnisse aus dem Projekt vor. AU - Farshizadeh, Emad AU - Briese, Hermann AU - Steinmann, David AU - Stockmann, Lars AU - Beringer, Steffen AU - Holler, Dominik AU - Klobedanz, Kay AU - Heinzemann, Christian AU - Peter, Klaus AU - Leuer, Michael ID - 20980 T2 - 8. Dortmunder Autotag TI - Simulationsgestützter Entwurf für Elektrofahrzeuge ER - TY - GEN AB - Die in der Automobilindustrie verwendeten eingebetteten Systeme gehören zu den komplexesten eingebetteten Systemen. Die Automobilhersteller sind in der Entwicklung ständig bemüht sowohl die Sicherheit und den Komfort des Fahrers also auch der anderen Insassen zu verbessern. Die meisten der entwickelten Systeme sind sowohl zeit- als auch sicherheitskritisch. Einer Studie von Mercedes-Benz zufolge resultieren 80% der Innovationen in der Automobilbranche aus neuen Elektronikkomponenten, deren Funktionen zu 90% durch Software realisiert wird. Um die steigende Komplexität in der Entwicklung von eingebetteten Systemen zu beherrschen wird in der Automobilbranche immer öfter die modelbasierte Softwareentwicklung anstelle der klassischen Programmierung eingesetzt. Im Requirements Engineering, der ersten Phase der Entwicklung eines Produktes, werden die Anforderungen gesammelt und dokumentiert. Die Dokumentation erfolgt mittels natürlicher Sprache. Modellbasierte Ansätze werden heutzutage höchstens unterstützend eingesetzt. Während des Requirements Engineerings muss der Requirements Engineer sowohl die funktionalen Anforderungen an das zu entwickelnde System als auch seine zeitlichen Anforderungen spezifizieren und analysieren. Die funktionalen Anforderungen umfassen dabei insbesondere die Kommunikation zwischen den verschiedenen Teilsystemen. Szenarien stellen eine intuitive Möglichkeit zur Modellierung von funktionalen Anforderungen dar. Im Rahmen dieser Arbeit wird ein modellbasierter Ansatz zur Modellierung von Szenarien verwendet. Anforderungen an das zeitliche Verhalten werden innerhalb der Architektur spezifiziert. Dazu stehen in der Automobilbranche Architekturbeschreibungssprachen wie EAST-ADL zur Verfügung. Obwohl sowohl funktionale als auch zeitliche Anforderungen an das System spezifiziert und analysiert werden müssen, existiert bisher keine Methodik, die beide Ansätze miteinander kombiniert. Aus diesem Grund wurde im Rahmen dieser Arbeit eine neue Requirements Engineering Methodik entwickelt, die eine systematische und ganzheitliche Spezifikation und Analyse der funktionalen und zeitlichen Anforderungen bereitstellt. Wir haben zwei Modelltransformationen entwickelt, um den Requirements Engineer beim Übergang von den funktionalen zu den zeitlichen Anforderungen zu unterstützen. Die vorliegende Arbeit wird durch eine Evaluierung der Methodik, sowie der Modelltransformationen auf Basis eines Komfortsteuergerätes abgerundet. AU - Koch, Thorsten ID - 20985 TI - Combining Scenario-based and Architecture-based Timing Requirements ER - TY - CONF AB - Viele virtuelle 3-D-Szenen im industriellen Bereich sind nicht gleichmäßig strukturiert, z.B. weil sie eine stark unterschiedliche Dichteverteilung der Polygone aufweisen. Für solch heterogene Daten existiert kein Algorithmus, der die Gesamtheit der Daten sowohl schnell als auch mit guter Qualität darstellen kann. Die Auswahl der richtigen Algorithmen für einzelne Szenenteile durch einen Experten ist zeitintensiv und in vielen Visualisierungssystemen nicht umzusetzen. Um dieses Problem zu lösen, setzt das hier vorgestellte Multi-Algorithmen-Rendering verschiedene Renderingalgorithmen gleichzeitig ein, um eine virtuelle 3-D-Szene darzustellen. Das Verfahren unterteilt die Szene dafür in einem Vorverarbeitungsschritt automatisch in geeignete Teilregionen und bestimmt deren Eigenschaften. Diese Daten werden zur Laufzeit dazu genutzt, um ständig für den aktuellen Standpunkt des Betrachters eine Abschätzung der Qualität und Laufzeit der zur Auswahl stehenden Renderingalgorithmen zu berechnen. Durch die Lösung eines Optimierungsproblems kann so bei vorgegebener Bildrate durch die passende Zuordnung der Algorithmen zu den Regionen die Bildqualität optimiert werden – bei automatischer Anpassung an die Leistungsfähigkeit der eingesetzten Hardware. In einer experimentellen Evaluierung vergleichen wir die Laufzeit und Bildqualität des Verfahrens mit denen verbreiteter Standardrenderingverfahren. AU - Petring, Ralf AU - Eikel, Benjamin AU - Jähn, Claudius AU - Fischer, Matthias AU - Meyer auf der Heide, Friedhelm ID - 17439 T2 - 11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung TI - Darstellung heterogener 3-D-Szenen in Echtzeit VL - 311 ER - TY - THES AU - Eikel, Benjamin ID - 17440 TI - Spherical visibility sampling : preprocessed visibility for occlusion culling in complex 3D scenes ER - TY - CONF AU - Meyer auf der Heide, Friedhelm ID - 17442 T2 - 11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung TI - Algorithmische Grundlagen für die Selbstorganisation von Roboterschwärmen VL - 311 ER - TY - GEN ED - Gausemeier, Jürgen ED - Grafe, Michael ED - Meyer auf der Heide, Friedhelm ID - 17443 TI - 11. Paderborner Workshop Augmented & Virtual Reality in der Produktentstehung VL - 311 ER - TY - JOUR AB - In this paper, we define and study a new problem, referred to as the Dependent Unsplittable Flow Problem (D-UFP). We present and discuss this problem in the context of large-scale powerful (radar/camera) sensor networks, but we believe it has important applications on the admission of large flows in other networks as well. In order to optimize the selection of flows transmitted to the gateway, D-UFP takes into account possible dependencies between flows. We show that D-UFP is more difficult than NP-hard problems for which no good approximation is known. Then, we address two special cases of this problem: the case where all the sensors have a shared channel and the case where the sensors form a mesh and route to the gateway over a spanning tree. AU - Cohen, R. AU - Nudelman, I. AU - Polevoy, Gleb ID - 17663 IS - 5 JF - Networking, IEEE/ACM Transactions on KW - Approximation algorithms KW - Approximation methods KW - Bandwidth KW - Logic gates KW - Radar KW - Vectors KW - Wireless sensor networks KW - Dependent flow scheduling KW - sensor networks SN - 1063-6692 TI - On the Admission of Dependent Flows in Powerful Sensor Networks VL - 21 ER - TY - JOUR AU - Grynko, Yevgen AU - Shkuratov, Yuriy AU - Förstner, Jens ID - 1783 IS - 23 JF - Optical Letters KW - tet_topic_scattering TI - Light scattering by randomly irregular dielectric particles larger than the wavelength VL - 38 ER - TY - CONF AU - Rammig, Franz AU - Stahl, Katharina AU - Vaz, Gavin Francis ID - 1785 T2 - IEEE Int. Symp. on Object/component/service-oriented Real-time distributed Computing (ISORC) TI - A framework for enhancing dependability in self-x systems by Artificial Immune Systems ER - TY - CONF AU - Kasap, Server AU - Redif, Soydan ID - 1786 T2 - Proc. IEEE Signal Processing and Communications Conf. (SUI) TI - FPGA Implementation of a Second-Order Convolutive Blind Signal Separation Algorithm ER - TY - JOUR AU - Kasap, Server AU - Redif, Soydan ID - 1792 IS - 3 JF - IEEE Trans. on Very Large Scale Integration (VLSI) Systems TI - Novel Field-Programmable Gate Array Architecture for Computing the Eigenvalue Decomposition of Para-Hermitian Polynomial Matrices VL - 22 ER - TY - JOUR AU - W. Richa, Andr{\'{e}}a AU - Scheideler, Christian AU - Schmid, Stefan AU - Zhang, Jin ID - 1868 IS - 3 JF - Distributed Computing TI - Competitive throughput in multi-hop wireless networks despite adaptive jamming ER - TY - JOUR AU - Mohd Nor, Rizal AU - Nesterenko, Mikhail AU - Scheideler, Christian ID - 1870 JF - Theor. Comput. Sci. TI - Corona: A stabilizing deterministic message-passing skip list ER - TY - JOUR AU - W. Richa, Andrea AU - Scheideler, Christian AU - Schmid, Stefan AU - Zhang, Jin ID - 1871 IS - 3 JF - IEEE/ACM Trans. Netw. TI - An Efficient and Fair MAC Protocol Robust to Reactive Interference ER - TY - CONF AB - Die Komplexität von mechatronischen Systemen wird stetig größer. MechatronicUML (MUML) ist eine Methode zur Entwicklung für Software von mechatronischen Systemen. Im Rahmen einer Bachelorarbeit wurde ein bestehender Quelltextgenerator für MUML-Modelle so erweitert, dass Quelltext für ein Echtzeitbetriebssystem generiert werden kann, welches auf einem LEGO Mindstorms-Roboter installiert ist. AU - Geismann, Johannes ID - 20831 T2 - Berichtsband der Informatiktage 2013: Smarte Sichten, smarte Schichten TI - Quelltextgenerierung für LEGO Mindstorms-Roboter VL - 12 ER - TY - CONF AU - Frieben, Jens AU - Heutger, Henning AU - Meyer, Matthias AU - Becker, Steffen ID - 20913 T2 - 9. Paderborner Workshop Entwurf mechatronischer Systeme TI - Modulare Leistungsprognose von Kompaktsteuerungen ER - TY - CONF AU - Keller, Matthias AU - Robbert, Christoph AU - Peuster, Manuel ID - 1798 T2 - Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM TI - An evaluation testbed for adaptive, topology-aware deployment of elastic applications ER - TY - CONF AU - Ali-Ahmad, Hassan AU - Cicconetti, Claudio AU - de la Oliva, Antonio AU - Draxler, Martin AU - Gupta, Rohit AU - Mancuso, Vincenzo AU - Roullet, Laurent AU - Sciancalepore, Vincenzo ID - 1799 SN - 9781479924332 T2 - 2013 Second European Workshop on Software Defined Networks TI - CROWD: An SDN Approach for DenseNets ER - TY - CHAP AU - Blanckenstein, Johannes AU - Garcia-Jimenez, Javier AU - Klaue, Jirka AU - Karl, Holger ID - 1800 SN - 1876-1100 T2 - Lecture Notes in Electrical Engineering TI - A Scalable Redundant TDMA Protocol for High-Density WSNs Inside an Aircraft ER - TY - GEN AU - Blumentritt, Fritz ID - 18000 TI - Cliquenbildung in verteilten Systemen ER - TY - CONF AU - Wette, P. AU - Graffi, K. ID - 1802 SN - 9781467356459 T2 - 2013 Conference on Networked Systems TI - Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables ER - TY - CONF AU - Dannewitz, Christian AU - Herlich, Matthias AU - Karl, Holger ID - 1803 SN - 9781467321297 T2 - 37th Annual IEEE Conference on Local Computer Networks -- Workshops TI - OpenNetInf - prototyping an information-centric Network Architecture ER - TY - CHAP AU - de la Oliva, Antonio AU - Morelli, Arianna AU - Mancuso, Vincenzo AU - Draexler, Martin AU - Hentschel, Tim AU - Melia, Telemaco AU - Seite, Pierrick AU - Cicconetti, Claudio ID - 1804 SN - 1867-8211 T2 - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering TI - Denser Networks for the Future Internet, the CROWD Approach ER - TY - CONF AU - Dumitrescu, Roman AU - Kühn, Arno ID - 22932 T2 - Markt&Technik Summit Industrie 4.0, München, 16. - 17. Okt. 2013 TI - Intelligenz in der Produktion - Spitzencluster it's OWL als Wegbereiter für Industrie 4.0 ER - TY - CONF AU - Schmitt, Nicolas AU - Kaiser, Lydia AU - Dumitrescu, Roman AU - Hofmann, Maik ED - Maurer, Maik ED - Schulze, Sven-Olaf ID - 22933 T2 - Tag des Systems Engineering TI - Von der Anforderungserfassung bis zur Funktionsstruktur - Ein Systems Engineering-Vorgehen für die industrielle Praxis ER - TY - CONF AU - Low, Cheng Yee AU - Kasim, Mohamad Amlie Abu AU - Koch, Torben AU - Dumitrescu, Roman AU - Yussof, Hanafiah AU - Jaafar, Roseleena AU - Jaafar, Ahmed AU - Aqilah, Ahsana AU - Ng, Kok Mun ID - 22934 T2 - International Journal of Advanced Robotic Systems TI - Hybrid-Actuated Finger Prosthesis with Tactile Sensing VL - Band 10 ER - TY - GEN AU - Low, Cheng AU - Aldemir, Mustafa AU - Aziz, Norheliena AU - Dumitrescu, Roman AU - Anacker, Harald ID - 22935 T2 - Journal of Production Engineering Research & Development (PERE) 7 TI - Strategy Planning of Collaborative Humanoid Soccer Robots based on Principle Solution ER - TY - JOUR AU - Joel, W. J. ID - 21748 IS - 5 JF - IEEE Computer Graphics and Applications TI - The Need to Start Research Education Early VL - 33 ER - TY - JOUR AU - Kerren, A. ID - 21752 IS - 2 JF - IEEE Computer Graphics and Applications TI - Information Visualization Courses for Students with a Computer Science Background VL - 33 ER - TY - JOUR AU - Schell, J. AU - Klug, C. ID - 21807 IS - 3 JF - IEEE Computer Graphics and Applications TI - Building Virtual Worlds Carrying on the Legacy of Randy Pausch's "Head Fake" VL - 33 ER - TY - JOUR AU - Noé, Frank AU - Nüske, Feliks ID - 21935 JF - Multiscale Modeling & Simulation SN - 1540-3459 TI - A Variational Approach to Modeling Slow Processes in Stochastic Dynamical Systems ER - TY - JOUR AU - Dannewitz, Christian AU - Kutscher, Dirk AU - Ohlman, B AU - Farrell, Stephen AU - Ahlgren, Bengt AU - Karl, Holger ID - 770 IS - 7 JF - Computer Communications TI - Network of Information (NetInf) - An information-centric networking architecture ER - TY - JOUR AU - Dräxler, Martin AU - Biermann, Thorsten AU - Karl, Holger ID - 771 IS - 3 JF - International Journal of Wireless Information Networks TI - Improving Cooperative Transmission Feasibility by Network Reconfiguration in Limited Backhaul Networks ER - TY - CONF AU - Hohenberger, Till AU - Herlich, Matthias AU - Karl, Holger ID - 772 T2 - IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013, Kattankulathur, India, December 15-18, 2013 TI - Trade-off between latency and coverage in cooperative radio access networks ER - TY - CONF AU - M. Facca, Federico AU - Salvadori, Elio AU - Karl, Holger AU - R. Lopez, Diego AU - Arranda Gutierrez, Pedro AU - Kostic, Dejan AU - Riggio, Roberto ID - 773 T2 - Second European Workshop on Software Defined Networks, EWSDN 2013, Berlin, Germany, October 10-11, 2013 TI - NetIDE: First Steps towards an Integrated Development Environment for Portable Network Apps ER - TY - CONF AU - Cicconetti, Claudio AU - Morelli, Arianna AU - Dräxler, Martin AU - Karl, Holger AU - Mancuso, Vincenzo AU - Sciancalepore, Vincenzo AU - Gupta, Rohit AU - de la Oliva, Antonio AU - Isabel Sanchez, M. AU - Serrano, Pablo AU - Roullet, Laurent ID - 774 T2 - 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013 TI - The playground of Wireless Dense networks of the future ER - TY - CONF AU - Keller, Matthias AU - Peuster, Manuel AU - Robbert, Christoph AU - Karl, Holger ID - 775 T2 - 17th International Conference on Intelligence in Next Generation Networks, {ICIN} 2013, Venice, Italy, October 15-16, 2013 TI - A topology-aware adaptive deployment framework for elastic applications ER - TY - CONF AU - Herlich, Matthias AU - Karl, Holger ID - 776 T2 - ISWCS 2013, The Tenth International Symposium on Wireless Communication Systems, Ilmenau, Germany, August 27-30, 2013 TI - Energy-Efficient Assignment of User Equipment to Cooperative Base Stations ER - TY - GEN ED - Fazal-Baqaie, Masud ID - 7762 TI - Vorgehensmodelle 2013: Vorgehensmodelle - Anspruch und Wirklichkeit - Proceedings der 20. Tagung der Fachgruppe Vorgehensmodelle im Fachgebiet Wirtschaftsinformatik (WI-VM) der Gesellschaft für Informatik e.V., Lörrach (Germany) VL - P-224 ER - TY - CONF AU - Dräxler, Martin AU - Karl, Holger ID - 777 T2 - 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013 TI - Cross-layer scheduling for multi-quality video streaming in cellular wireless networks ER - TY - GEN AU - Dräxler, Martin AU - Blobel, Johannes AU - Dreimann, Philipp AU - Valentin, Stefan AU - Karl, Holger ID - 781 T2 - CoRR TI - Anticipatory Buffer Control and Quality Selection for Wireless Video Streaming ER - TY - CONF AB - The paradigm of service-oriented architectures has emerged as an architectural style for designing enterprise applications. Requirements engineering for such applications comprises the specification of business goal models representing stakeholder objectives and the operationalization to business process models that specify the required composition of services. Inconsistencies between business goals and derived business processes can lead to service compositions that are not in line with the actual stakeholder objectives. For preserving consistency it is required to consider logical and temporal dependencies among goals (e.g. the order in which they need to be achieved) in the derivation of business processes. In previous work, we provided a technique for the elicitation and specification of dependencies between business goals. Extending this approach, we aim at validating the consistency between business goal models and business process models regarding these dependencies. In this paper, we present a pattern-based approach for the automated generation of verifiable business process quality constraints from business goal models. We describe how these constraints can be used to check the consistency between business goals and business processes and demonstrate the applicability of our approach in a case study by using the implemented tool support. AU - Nagel, Benjamin AU - Gerth, Christian AU - Post, Jennifer AU - Engels, Gregor ID - 8057 T2 - Proceedings of the 17th IEEE International EDOC Conference (EDOC'13) TI - Ensuring Consistency Among Business Goals and Business Process Models ER - TY - CONF AU - Schumacher, Claudia AU - Engels, Gregor AU - Güldali, Baris AU - Niehammer, Markus AU - Hamburg, Matthias ED - Kowalewski, Stefan ED - Rumpe, Bernhard ID - 8058 T2 - Proceedings of the conference on Software Enginneering, Fachtagung des GI Fachbereichs Softwaretechnik (SE 2013), Aachen (Germany) TI - Modellbasierte Bewertung von Testprozessen nach TPI NEXT® mit Geschäftsprozess-Mustern VL - P-213 ER - TY - CONF AU - Engels, Gregor ID - 8059 T2 - Software Engineering 2013 TI - On-the-Fly Computing - Das Entwicklungs- und Betriebsparadigma für Softwaresysteme der Zukunft VL - P-213 ER - TY - CONF AU - Huma, Zille AU - Gerth, Christian AU - Engels, Gregor AU - Juwig, Oliver ID - 8060 T2 - Proceedings of the 11th International Conference on Service Oriented Computing (ICSOC'13) TI - Automated Service Composition for On-the-Fly SOAs VL - 8274 ER - TY - CONF AU - Luckey, Markus AU - Engels, Gregor ID - 8061 T2 - Proceeding of the 8th international symposium on Software engineering for adaptive and self-managing systems TI - High-­Quality Specification of Self-­Adaptive Software Systems ER - TY - CONF AU - Brüseke, Frank AU - Becker, Steffen AU - Engels, Gregor ID - 8062 T2 - Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (ICPE 2013), Prague (Czech Republic) TI - Decision Support via Automated Metric Comparison for the Palladio-based Performance Blame Analysis ER - TY - CONF AU - Becker, Matthias AU - Luckey, Markus AU - Becker, Steffen ID - 8063 T2 - Ninth International ACM Sigsoft Conference on the Quality of Software Architectures TI - Performance Analysis of Self-Adaptive Systems for Requirements Validation at Design-Time ER - TY - GEN AU - Küster, Jochen AU - Kovács, Dániel AU - Bauer, Eduard AU - Gerth, Christian ID - 8222 TI - Integrating Coverage Analysis into Test-driven Development of Model Transformations ER - TY - GEN AU - Huma, Zille AU - Gerth, Christian AU - Engels, Gregor ID - 8223 TI - Automated Service Discovery and Composition for On-the-Fly SOAs ER - TY - CONF AU - Yigitbas, Enes AU - Gerth, Christian AU - Sauer, Stefan ID - 5752 T2 - Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland TI - Konzeption modellbasierter Benutzungsschnittstellen für verteilte Selbstbedienungssysteme ER - TY - CHAP AU - Klompmaker, Florian AU - Paelke, Volker AU - Fischer, Holger Gerhard ID - 6276 SN - 0302-9743 T2 - Distributed, Ambient, and Pervasive Interactions TI - A Taxonomy-Based Approach towards NUI Interaction Design VL - 8028 ER - TY - CHAP AU - Fischer, Holger Gerhard AU - Strenge, Benjamin AU - Nebe, Karsten ID - 6279 SN - 0302-9743 T2 - Design, User Experience, and Usability. Design Philosophy, Methods, and Tools TI - Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design VL - 8012 ER - TY - CONF AU - Fischer, Holger Gerhard AU - Geis, Thomas AU - Molich, Rolf AU - Kluge, Oliver AU - Heimgärtner, Rüdiger AU - Hunkirchen, Peter ID - 6284 T2 - Jahresband Usability Professionals TI - Do You Speak Usability? - Aktueller Stand des Glossars und des Curriculums für den Certified Professional for Usability and User Experience (CPUX) der German UPA ER - TY - CONF AB - Runtime monitoring aims at ensuring program safety by monitoring the program's behaviour during execution and taking appropriate action before a program violates some property.Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead.In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program (except for unsafe behaviour),and has the same performance characteristics. AU - Wonisch, Daniel AU - Schremmer, Alexander AU - Wehrheim, Heike ID - 469 T2 - Proceedings of the 11th International Conference on Software Engineering and Formal Methods (SEFM) TI - Zero Overhead Runtime Monitoring ER - TY - CONF AB - In OpenFlow [1], multiple switches share the same control plane which is centralized atwhat is called the OpenFlow controller. A switch only consists of a forwarding plane. Rules for forwarding individual packets (called ow entries in OpenFlow) are pushed from the controller to the switches. In a network with a high arrival rate of new ows, such as in a data center, the control trac between the switch and controller can become very high. As a consequence, routing of new ows will be slow. One way to reduce control trac is to use wildcarded ow entries. Wildcard ow entries can be used to create default routes in the network. However, since switches do not keep track of ows covered by a wildcard ow entry, the controller no longer has knowledge about individual ows. To nd out about these individual ows we propose an extension to the current OpenFlow standard to enable packet sampling of wildcard ow entries. AU - Wette, Philip AU - Karl, Holger ID - 470 T2 - Proceedings of the ACM SIGCOMM '13 TI - Which Flows Are Hiding Behind My Wildcard Rule? Adding Packet Sampling to OpenFlow ER - TY - GEN AU - Tezer, Alina ID - 471 TI - Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen ER - TY - JOUR AB - An elementary h-route ow, for an integer h 1, is a set of h edge- disjoint paths between a source and a sink, each path carrying a unit of ow, and an h-route ow is a non-negative linear combination of elementary h-routeows. An h-route cut is a set of edges whose removal decreases the maximum h-route ow between a given source-sink pair (or between every source-sink pair in the multicommodity setting) to zero. The main result of this paper is an approximate duality theorem for multicommodity h-route cuts and ows, for h 3: The size of a minimum h-route cut is at least f=h and at most O(log4 k f) where f is the size of the maximum h-routeow and k is the number of commodities. The main step towards the proof of this duality is the design and analysis of a polynomial-time approximation algorithm for the minimum h-route cut problem for h = 3 that has an approximation ratio of O(log4 k). Previously, polylogarithmic approximation was known only for h-route cuts for h 2. A key ingredient of our algorithm is a novel rounding technique that we call multilevel ball-growing. Though the proof of the duality relies on this algorithm, it is not a straightforward corollary of it as in the case of classical multicommodity ows and cuts. Similar results are shown also for the sparsest multiroute cut problem. AU - Kolman, Petr AU - Scheideler, Christian ID - 476 IS - 2 JF - Theory of Computing Systems TI - Towards Duality of Multicommodity Multiroute Cuts and Flows: Multilevel Ball-Growing ER - TY - CONF AB - We consider the k-token dissemination problem, where k initially arbitrarily distributed tokens have to be disseminated to all nodes in a dynamic network (as introduced by Kuhn et al., STOC 2010). In contrast to general dynamic networks, our dynamic networks are unit disk graphs, i.e., nodes are embedded into the Euclidean plane and two nodes are connected if and only if their distance is at most R. Our worst-case adversary is allowed to move the nodes on the plane, but the maximum velocity v_max of each node is limited and the graph must be connected in each round. For this model, we provide almost tight lower and upper bounds for k-token dissemination if nodes are restricted to send only one token per round. It turns out that the maximum velocity v_max is a meaningful parameter to characterize dynamics in our model. AU - Abshoff, Sebastian AU - Benter, Markus AU - Cord-Landwehr, Andreas AU - Malatyali, Manuel AU - Meyer auf der Heide, Friedhelm ID - 477 T2 - Algorithms for Sensor Systems - 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, {ALGOSENSORS} 2013, Sophia Antipolis, France, September 5-6, 2013, Revised Selected Papers TI - Token Dissemination in Geometric Dynamic Networks ER - TY - THES AB - Software systems are playing an increasing role in our everyday life, and as the amount of software applications grows, so does their complexity and the relevance of their computations. Software components can be found in many systems that are charged with safety-critical tasks, such as control systems for aviation or power plants. Hence, software verification techniques that are capable of proving the absence of critical errors are becoming more and more important in the field software engineering. A well-established approach to software verification is model checking. Applying this technique involves an exhaustive exploration of a state space model corresponding to the system under consideration. The major challenge in model checking is the so-called state explosion problem: The state space of a software system grows exponentially with its size. Thus, the straightforward modelling of real-life systems practically impossible. A common approach to this problem is the application of abstraction techniques, which reduce the original state space by mapping it on a significantly smaller abstract one. Abstraction inherently involves a loss of information, and thus, the resulting abstract model may be too imprecise for a definite result in verification. Therefore, abstraction is typically combined with abstraction refinement: An initially very coarse abstract model is iteratively refined, i.e. enriched with new details about the original system, until a level of abstraction is reached that is precise enough for a definite outcome. Abstraction refinement-based model checking is fully automatable and it is considered as one of the most promising approaches to the state explosion problem in verification. However, it is still faced with a number of challenges. There exist several types of abstraction techniques and not every type is equally well-suited for all kinds of systems and verification tasks. Moreover, the selection of adequate refinement steps is nontrivial and typically the most crucial part of the overall approach: Unfavourable refinement decisions can compromise the state space-reducing effect of abstraction, and as a consequence, can easily lead to the failure of verification. It is, however, hard to predict which refinement steps will eventually be expedient for verification – and which not. AU - Timm, Nils ID - 478 TI - Three-Valued Abstraction and Heuristic-Guided Refinement for Verifying Concurrent Systems ER - TY - CONF AB - Cloud computing offers high availability, dynamic scalability, and elasticity requiring only very little administration. However, this service comes with financial costs. Peer-to-peer systems, in contrast, operate at very low costs but cannot match the quality of service of the cloud. This paper focuses on the case study of Wikipedia and presents an approach to reduce the operational costs of hosting similar websites in the cloud by using a practical peer-to-peer approach. The visitors of the site are joining a Chord overlay, which acts as first cache for article lookups. Simulation results show, that up to 72% of the article lookups in Wikipedia could be answered by other visitors instead of using the cloud. AU - Graffi, Kalman AU - Bremer, Lars ID - 481 T2 - Proceedings of the International Conference on Communications (ICC'13) TI - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case ER - TY - CONF AB - One of the main ideas of Service-Oriented Computing (SOC) is the delivery of flexibly composable services provided on world-wide markets. For a successful service discovery,service requests have to be matched with the available service offers. However, in a situation in which no service that completely matches the request can be discovered, the customer may tolerate slight discrepancies between request and offer. Some existing fuzzy matching approaches are able to detectsuch service variants, but they do not allow to explicitly specify which parts of a request are not mandatory. In this paper, we improve an existing service matching approach based onVisual Contracts leveraging our preliminary work of design pattern detection. Thereby, we support explicit specifications of service variants and realize gradual matching results that can be ranked in order to discover the service offer that matches a customer’s request best. AU - Platenius, Marie Christin AU - von Detten, Markus AU - Gerth, Christian AU - Schäfer, Wilhelm AU - Engels, Gregor ID - 484 T2 - IEEE 20th International Conference on Web Services (ICWS 2013) TI - Service Matching under Consideration of Explicitly Specified Service Variants ER - TY - CONF AB - Software composition has been studied as a subject of state based planning for decades. Existing composition approaches that are efficient enough to be used in practice are limited to sequential arrangements of software components. This restriction dramatically reduces the number of composition problems that can be solved. However, there are many composition problems that could be solved by existing approaches if they had a possibility to combine components in very simple non-sequential ways. To this end, we present an approach that arranges not only basic components but also composite components. Composite components enhance the structure of the composition by conditional control flows. Through algorithms that are written by experts, composite components are automatically generated before the composition process starts. Therefore, our approach is not a substitute for existing composition algorithms but complements them with a preprocessing step. We verified the validity of our approach through implementation of the presented algorithms. AU - Mohr, Felix AU - Kleine Büning, Hans ID - 485 T2 - Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services (iiWAS) TI - Semi-Automated Software Composition Through Generated Components ER - TY - GEN AU - Otte, Oliver ID - 486 TI - Seitenkanalresistenz paarungsbasierter Kryptographie ER - TY - GEN AU - Bobolz, Jan ID - 487 TI - Security Proofs for Pairing-Based Cryptography in the Generic Group Model ER - TY - CONF AB - Unattended systems are key ingredients of various critical infrastruc-tures like networks of self service terminals or automated teller machines.For cost and efficiency reasons they should mostly run autonomously.Unattended systems are attractive and lucrative targets for various kindsof attacks, including attacks on the integrity of their components and thecommunication between components. In this paper, we propose a gen-eral cryptographic framework to protect unattended systems. We alsodemonstrate that instantiating the framework with techniques from iden-tity based cryptography is particularly well-suited to efficiently secureunattended systems. AU - Blömer, Johannes AU - Günther, Peter AU - Krummel, Volker ID - 488 T2 - Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) TI - Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study ER - TY - GEN AU - Wallaschek, Felix ID - 490 TI - Routing in heterogenen OpenFlow Netzwerken ER - TY - GEN AU - Robbert, Christoph ID - 492 TI - Ressource-Optimized Deployment of Multi-Tier Applications - The Data Rate-Constrained Case ER - TY - THES AB - The maintenance of component-based software systems requires up-to-date models of their concrete architecture, i.e. the architecture that is realised in the source code. These models help in systematically planning, analysing and executing typical reengineering activities. Often no or only outdated architectural models of such systems exist. Therefore, various reverse engineering methods have been developed which try to recover a system's components, subsystems and connectors. However, these reverse engineering methods are severely impacted by design deciencies in the system's code base, especially violations of the component encapsulation. As long as design deciencies are not considered in the reverse engineering process, they reduce the quality of the recovered component structures. Despite this impact of design deciencies, no existing architecture reconstruction approach explicitly integrates a systematic deciency detection and removal into the recovery process. Therefore, I have developed Archimetrix. Archimetrix is a tool-supported architecture reconstruction process. It enhances a clustering-based architecture recovery approach with an extensible, pattern-based deciency detection. After the detection of deciencies, Archimetrix supports the software architect in removing the de ciencies and provides the means to preview the architectural consequences of such a removal. I also provide a process to identify and formalise additional deciencies. I validated the approach on three case studies which show that Archimetrix is able to identify relevant deciencies and that the removal of these deciencies leads to an increased quality of the recovered architectures, i.e. they are closer to the corresponding conceptual architectures. AU - von Detten, Markus ID - 494 TI - Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies ER - TY - CONF AB - Automated service composition has been studied as a subject of state based planning for a decade. A great deal of service composition tasks can only be solved if concrete output values of the services are considered in the composition process. However, the fact that those values are not known before runtime leads to nondeterministic planning problems, which have proven to be notoriously difficult in practical automated service composition applications. Even though this problem is frequently recognized, it has still received remarkably few attention and remains unsolved.This paper shows how nondeterminism in automated service composition can be reduced. We introduce context rules as a means to derive semantic knowledge from output values of services. These rules enable us to replace nondeterministic composition operations by less nondeterministic or even completely deterministic ones. We show the validity of our solutions not only theoretically but also have evaluated them practically through implementation. AU - Mohr, Felix AU - Lettmann, Theodor AU - Kleine Büning, Hans ID - 495 T2 - Proceedings of the 6th International Conference on Service Oriented Computing and Applications (SOCA) TI - Reducing Nondeterminism in Automated Service Composition ER - TY - CONF AB - Within reactive topology control, a node determines its adjacent edges of a network subgraph without prior knowledge of its neighborhood. The goal is to construct a local view on a topology which provides certain desired properties such as planarity. During algorithm execution, a node, in general, is not allowed to determine all its neighbors of the network graph. There are well-known reactive algorithms for computing planar subgraphs. However, the subgraphs obtained do not have constant Euclidean spanning ratio. This means that routing along these subgraphs may result in potentially long detours. So far, it has been unknown if planar spanners can be constructed reactively. In this work, we show that at least under the unit disk network model, this is indeed possible, by proposing an algorithm for reactive construction of the partial Delaunay triangulation, which recently turned out to be a spanner. Furthermore, we show that our algorithm is message-optimal as a node will only exchange messages with nodes that are also neighbors in the spanner. The algorithm’s presentation is complemented by a rigorous proof of correctness. AU - Benter, Markus AU - Neumann, Florentin AU - Frey, Hannes ID - 496 T2 - Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM) TI - Reactive Planar Spanner Construction in Wireless Ad Hoc and Sensor Networks ER - TY - CONF AB - Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space. AU - Wonisch, Daniel AU - Schremmer, Alexander AU - Wehrheim, Heike ID - 498 T2 - Proceedings of the 25th International Conference on Computer Aided Verification (CAV) TI - Programs from Proofs – A PCC Alternative ER - TY - CONF AB - We present a new online algorithm for profit-oriented scheduling on multiple speed-scalable processors.Moreover, we provide a tight analysis of the algorithm's competitiveness.Our results generalize and improve upon work by \citet{Chan:2010}, which considers a single speed-scalable processor.Using significantly different techniques, we can not only extend their model to multiprocessors but also prove an enhanced and tight competitive ratio for our algorithm.In our scheduling problem, jobs arrive over time and are preemptable.They have different workloads, values, and deadlines.The scheduler may decide not to finish a job but instead to suffer a loss equaling the job's value.However, to process a job's workload until its deadline the scheduler must invest a certain amount of energy.The cost of a schedule is the sum of lost values and invested energy.In order to finish a job the scheduler has to determine which processors to use and set their speeds accordingly.A processor's energy consumption is power $\Power{s}$ integrated over time, where $\Power{s}=s^{\alpha}$ is the power consumption when running at speed $s$.Since we consider the online variant of the problem, the scheduler has no knowledge about future jobs.This problem was introduced by~\citet{Chan:2010} for the case of a single processor.They presented an online algorithm which is $\alpha^{\alpha}+2e\alpha$-competitive.We provide an online algorithm for the case of multiple processors with an improved competitive ratio of $\alpha^{\alpha}$. AU - Kling, Peter AU - Pietrzyk, Peter ID - 499 T2 - Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) TI - Profitable Scheduling on Multiple Speed-Scalable Processors ER - TY - JOUR AU - de Lemos, Rogrio AU - Giese, Holger AU - A. Müller, Hausi AU - Shaw, Mary AU - Andersson, Jesper AU - Litoiu, Marin AU - Schmerl, Bradley AU - Tamura, Gabriel AU - M. Villegas, Norha AU - Vogel, Thomas AU - Weyns, Danny AU - Baresi, Luciano AU - Becker, Basil AU - Bencomo, Nelly AU - Brun, Yuriy AU - Cukic, Bojan AU - Desmarais, Ron AU - Dustdar, Schahram AU - Engels, Gregor AU - Geihs, Kurt AU - M. Göschka, Karl AU - Gorla, Alessandra AU - Grassi, Vincenzo AU - Inverardi, Paola AU - Karsai, Gabor AU - Kramer, Jeff AU - Lopes, Antonia AU - Magee, Jeff AU - Malek, Sam AU - Mankovskii, Serge AU - Mirandola, Raffaela AU - Mylopoulos, John AU - Nierstrasz, Oscar AU - Pezzè, Mauro AU - Prehofer, Christian AU - Schäfer, Wilhelm AU - Schlichting, Rick AU - B. Smith, Dennis AU - Pedro Sousa, Joao AU - Tahvildari, Ladan AU - Wong, Kenny AU - Wuttke, Jochen ID - 7271 JF - Software Engineering for Self-Adaptive Systems II TI - Software Engineering for Self-Adaptive Systems: A Second Research Roadmap ER - TY - JOUR AU - Bouillon, Elke AU - Güldali, Baris AU - Herrmann, Andrea AU - Keuler, Thorsten AU - Moldt, Daniel AU - Riebisch, Matthias ID - 7272 IS - 1 JF - Softwaretechnik-Trends TI - Leichtgewichtige Traceability im agilen Entwicklungsprozess am Beispiel von Scrum VL - 33 ER - TY - JOUR AU - Grieger, Marvin AU - Güldali, Baris AU - Sauer, Stefan AU - Mlynarski, Michael ID - 7273 JF - OBJEKTspektrum (Online Themenspecials) TI - Testen bei Migrationsprojekten ER -