---
_id: '508'
abstract:
- lang: eng
  text: The process of planning a virtual topology for a Wavelength Devision Multiplexing
    (WDM) network is called Virtual Topology Design (VTD). The goal of VTD is to find
    a virtual topology that supports forwarding the expected traffic without congestion.
    In networks with fluctuating, high traffic demands, it can happen that no single
    topology fits all changing traffic demands occurring over a longer time. Thus,
    during operation, the virtual topology has to be reconfigured. Since modern networks
    tend to be large, VTD algorithms have to scale well with increasing network size,
    requiring distributed algorithms. Existing distributed VTD algorithms, however,
    react too slowly on congestion for the real-time reconfiguration of large networks.
    We propose Selfish Virtual Topology Reconfiguration (SVTR) as a new algorithm
    for distributed VTD. It combines reconfiguring the virtual topology and routing
    through a Software Defined Network (SDN). SVTR is used for online, on-the-fly
    network reconfiguration. Its integrated routing and WDM reconfiguration keeps
    connection disruption due to network reconfiguration to a minimum and is able
    to react very quickly to traffic pattern changes. SVTR works by iteratively adapting
    the virtual topology to the observed traffic patterns without global traffic information
    and without future traffic estimations. We evaluated SVTR by simulation and found
    that it significantly lowers congestion in realistic networks and high load scenarios.
author:
- first_name: Philip
  full_name: Wette, Philip
  last_name: Wette
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Wette P, Karl H. On the Quality of Selfish Virtual Topology Reconfiguration
    in IP-over-WDM Networks. In: <i>Proceedings of the 19th IEEE International Workshop
    on Local and Metropolitan Area Networks (IEEE LANMAN)</i>. ; 2013:1-6. doi:<a
    href="https://doi.org/10.1109/LANMAN.2013.6528271">10.1109/LANMAN.2013.6528271</a>'
  apa: Wette, P., &#38; Karl, H. (2013). On the Quality of Selfish Virtual Topology
    Reconfiguration in IP-over-WDM Networks. In <i>Proceedings of the 19th IEEE International
    Workshop on Local and Metropolitan Area Networks (IEEE LANMAN)</i> (pp. 1–6).
    <a href="https://doi.org/10.1109/LANMAN.2013.6528271">https://doi.org/10.1109/LANMAN.2013.6528271</a>
  bibtex: '@inproceedings{Wette_Karl_2013, title={On the Quality of Selfish Virtual
    Topology Reconfiguration in IP-over-WDM Networks}, DOI={<a href="https://doi.org/10.1109/LANMAN.2013.6528271">10.1109/LANMAN.2013.6528271</a>},
    booktitle={Proceedings of the 19th IEEE International Workshop on Local and Metropolitan
    Area Networks (IEEE LANMAN)}, author={Wette, Philip and Karl, Holger}, year={2013},
    pages={1–6} }'
  chicago: Wette, Philip, and Holger Karl. “On the Quality of Selfish Virtual Topology
    Reconfiguration in IP-over-WDM Networks.” In <i>Proceedings of the 19th IEEE International
    Workshop on Local and Metropolitan Area Networks (IEEE LANMAN)</i>, 1–6, 2013.
    <a href="https://doi.org/10.1109/LANMAN.2013.6528271">https://doi.org/10.1109/LANMAN.2013.6528271</a>.
  ieee: P. Wette and H. Karl, “On the Quality of Selfish Virtual Topology Reconfiguration
    in IP-over-WDM Networks,” in <i>Proceedings of the 19th IEEE International Workshop
    on Local and Metropolitan Area Networks (IEEE LANMAN)</i>, 2013, pp. 1–6.
  mla: Wette, Philip, and Holger Karl. “On the Quality of Selfish Virtual Topology
    Reconfiguration in IP-over-WDM Networks.” <i>Proceedings of the 19th IEEE International
    Workshop on Local and Metropolitan Area Networks (IEEE LANMAN)</i>, 2013, pp.
    1–6, doi:<a href="https://doi.org/10.1109/LANMAN.2013.6528271">10.1109/LANMAN.2013.6528271</a>.
  short: 'P. Wette, H. Karl, in: Proceedings of the 19th IEEE International Workshop
    on Local and Metropolitan Area Networks (IEEE LANMAN), 2013, pp. 1–6.'
date_created: 2017-10-17T12:42:31Z
date_updated: 2022-01-06T07:01:37Z
ddc:
- '040'
department:
- _id: '75'
doi: 10.1109/LANMAN.2013.6528271
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:50:19Z
  date_updated: 2018-03-15T10:50:19Z
  file_id: '1307'
  file_name: 508-06528271.pdf
  file_size: 219902
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:50:19Z
has_accepted_license: '1'
page: '1 - 6 '
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 19th IEEE International Workshop on Local and Metropolitan
  Area Networks (IEEE LANMAN)
status: public
title: On the Quality of Selfish Virtual Topology Reconfiguration in IP-over-WDM Networks
type: conference
user_id: '15572'
year: '2013'
...
---
_id: '509'
abstract:
- lang: eng
  text: In this paper we will introduce a new d-dimensional graph for constructing
    geometric application layer overlay net-works. Our approach will use internet
    coordinates, embedded using the L∞ -metric. After describing the graph structure,
    we will show how it limits maintenance overhead by bounding each node’s out-degree
    and how it supports greedy routing using one-hop neighbourhood information in
    each routing step. We will further show that greedy routing can always compute
    a path in our graph and we will also prove that in each forwarding step the next
    hop is closer to the destination than the current node.
author:
- first_name: Marcus
  full_name: Autenrieth, Marcus
  last_name: Autenrieth
- first_name: Hannes
  full_name: Frey, Hannes
  last_name: Frey
citation:
  ama: 'Autenrieth M, Frey H. On Greedy Routing in Degree-bounded Graphs over d-Dimensional
    Internet Coordinate Embeddings. In: <i>Proceedings of the Conference on Networked
    Systems (NetSys)</i>. ; 2013:126-131. doi:<a href="https://doi.org/10.1109/NetSys.2013.10">10.1109/NetSys.2013.10</a>'
  apa: Autenrieth, M., &#38; Frey, H. (2013). On Greedy Routing in Degree-bounded
    Graphs over d-Dimensional Internet Coordinate Embeddings. In <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i> (pp. 126–131). <a href="https://doi.org/10.1109/NetSys.2013.10">https://doi.org/10.1109/NetSys.2013.10</a>
  bibtex: '@inproceedings{Autenrieth_Frey_2013, title={On Greedy Routing in Degree-bounded
    Graphs over d-Dimensional Internet Coordinate Embeddings}, DOI={<a href="https://doi.org/10.1109/NetSys.2013.10">10.1109/NetSys.2013.10</a>},
    booktitle={Proceedings of the Conference on Networked Systems (NetSys)}, author={Autenrieth,
    Marcus and Frey, Hannes}, year={2013}, pages={126–131} }'
  chicago: Autenrieth, Marcus, and Hannes Frey. “On Greedy Routing in Degree-Bounded
    Graphs over d-Dimensional Internet Coordinate Embeddings.” In <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i>, 126–31, 2013. <a href="https://doi.org/10.1109/NetSys.2013.10">https://doi.org/10.1109/NetSys.2013.10</a>.
  ieee: M. Autenrieth and H. Frey, “On Greedy Routing in Degree-bounded Graphs over
    d-Dimensional Internet Coordinate Embeddings,” in <i>Proceedings of the Conference
    on Networked Systems (NetSys)</i>, 2013, pp. 126–131.
  mla: Autenrieth, Marcus, and Hannes Frey. “On Greedy Routing in Degree-Bounded Graphs
    over d-Dimensional Internet Coordinate Embeddings.” <i>Proceedings of the Conference
    on Networked Systems (NetSys)</i>, 2013, pp. 126–31, doi:<a href="https://doi.org/10.1109/NetSys.2013.10">10.1109/NetSys.2013.10</a>.
  short: 'M. Autenrieth, H. Frey, in: Proceedings of the Conference on Networked Systems
    (NetSys), 2013, pp. 126–131.'
date_created: 2017-10-17T12:42:31Z
date_updated: 2022-01-06T07:01:37Z
ddc:
- '040'
department:
- _id: '75'
doi: 10.1109/NetSys.2013.10
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:46:51Z
  date_updated: 2018-03-15T10:46:51Z
  file_id: '1304'
  file_name: 509-06529245.pdf
  file_size: 197048
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:46:51Z
has_accepted_license: '1'
page: 126-131
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the Conference on Networked Systems (NetSys)
status: public
title: On Greedy Routing in Degree-bounded Graphs over d-Dimensional Internet Coordinate
  Embeddings
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '511'
author:
- first_name: Malte
  full_name: Splietker, Malte
  last_name: Splietker
citation:
  ama: Splietker M. <i>MapReduce in Software Defined Networks</i>. Universität Paderborn;
    2013.
  apa: Splietker, M. (2013). <i>MapReduce in Software Defined Networks</i>. Universität
    Paderborn.
  bibtex: '@book{Splietker_2013, title={MapReduce in Software Defined Networks}, publisher={Universität
    Paderborn}, author={Splietker, Malte}, year={2013} }'
  chicago: Splietker, Malte. <i>MapReduce in Software Defined Networks</i>. Universität
    Paderborn, 2013.
  ieee: M. Splietker, <i>MapReduce in Software Defined Networks</i>. Universität Paderborn,
    2013.
  mla: Splietker, Malte. <i>MapReduce in Software Defined Networks</i>. Universität
    Paderborn, 2013.
  short: M. Splietker, MapReduce in Software Defined Networks, Universität Paderborn,
    2013.
date_created: 2017-10-17T12:42:32Z
date_updated: 2022-01-06T07:01:38Z
department:
- _id: '75'
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: MapReduce in Software Defined Networks
type: bachelorsthesis
user_id: '15504'
year: '2013'
...
---
_id: '513'
abstract:
- lang: eng
  text: This paper initiates the study of self-adjusting networks (or distributed
    data structures) whose topologies dynamically adapt to a communication pattern
    $\sigma$. We present a fully decentralized self-adjusting solution called SplayNet.
    A SplayNet is a distributed generalization of the classic splay tree concept.
    It ensures short paths (which can be found using local-greedy routing) between
    communication partners while minimizing topological rearrangements. We derive
    an upper bound for the amortized communication cost of a SplayNet based on empirical
    entropies of $\sigma$, and show that SplayNets have several interesting convergence
    properties. For instance, SplayNets features a provable online optimality under
    special requests scenarios. We also investigate the optimal static network and
    prove different lower bounds for the average communication cost based on graph
    cuts and on the empirical entropy of the communication pattern $\sigma$. From
    these lower bounds it follows, e.g., that SplayNets are optimal in scenarios where
    the requests follow a product distribution as well. Finally, this paper shows
    that in contrast to the Minimum Linear Arrangement problem which is generally
    NP-hard, the optimal static tree network can be computed in polynomial time for
    any guest graph, despite the exponentially large graph family. We complement our
    formal analysis with a small simulation study on a Facebook graph.
author:
- first_name: Chen
  full_name: Avin, Chen
  last_name: Avin
- first_name: Bernhard
  full_name: Häupler, Bernhard
  last_name: Häupler
- first_name: Zvi
  full_name: Lotker, Zvi
  last_name: Lotker
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
- first_name: Stefan
  full_name: Schmid, Stefan
  last_name: Schmid
citation:
  ama: 'Avin C, Häupler B, Lotker Z, Scheideler C, Schmid S. Locally Self-Adjusting
    Tree Networks. In: <i>Proceedings of the 27th IEEE International Parallel and
    Distributed Processing Symposium (IPDPS)</i>. ; 2013:395-406. doi:<a href="https://doi.org/10.1109/IPDPS.2013.40">10.1109/IPDPS.2013.40</a>'
  apa: Avin, C., Häupler, B., Lotker, Z., Scheideler, C., &#38; Schmid, S. (2013).
    Locally Self-Adjusting Tree Networks. In <i>Proceedings of the 27th IEEE International
    Parallel and Distributed Processing Symposium (IPDPS)</i> (pp. 395–406). <a href="https://doi.org/10.1109/IPDPS.2013.40">https://doi.org/10.1109/IPDPS.2013.40</a>
  bibtex: '@inproceedings{Avin_Häupler_Lotker_Scheideler_Schmid_2013, title={Locally
    Self-Adjusting Tree Networks}, DOI={<a href="https://doi.org/10.1109/IPDPS.2013.40">10.1109/IPDPS.2013.40</a>},
    booktitle={Proceedings of the 27th IEEE International Parallel and Distributed
    Processing Symposium (IPDPS)}, author={Avin, Chen and Häupler, Bernhard and Lotker,
    Zvi and Scheideler, Christian and Schmid, Stefan}, year={2013}, pages={395–406}
    }'
  chicago: Avin, Chen, Bernhard Häupler, Zvi Lotker, Christian Scheideler, and Stefan
    Schmid. “Locally Self-Adjusting Tree Networks.” In <i>Proceedings of the 27th
    IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>,
    395–406, 2013. <a href="https://doi.org/10.1109/IPDPS.2013.40">https://doi.org/10.1109/IPDPS.2013.40</a>.
  ieee: C. Avin, B. Häupler, Z. Lotker, C. Scheideler, and S. Schmid, “Locally Self-Adjusting
    Tree Networks,” in <i>Proceedings of the 27th IEEE International Parallel and
    Distributed Processing Symposium (IPDPS)</i>, 2013, pp. 395–406.
  mla: Avin, Chen, et al. “Locally Self-Adjusting Tree Networks.” <i>Proceedings of
    the 27th IEEE International Parallel and Distributed Processing Symposium (IPDPS)</i>,
    2013, pp. 395–406, doi:<a href="https://doi.org/10.1109/IPDPS.2013.40">10.1109/IPDPS.2013.40</a>.
  short: 'C. Avin, B. Häupler, Z. Lotker, C. Scheideler, S. Schmid, in: Proceedings
    of the 27th IEEE International Parallel and Distributed Processing Symposium (IPDPS),
    2013, pp. 395–406.'
date_created: 2017-10-17T12:42:32Z
date_updated: 2022-01-06T07:01:38Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/IPDPS.2013.40
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:45:15Z
  date_updated: 2018-03-15T10:45:15Z
  file_id: '1303'
  file_name: 513-ipdps13_01.pdf
  file_size: 518804
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:45:15Z
has_accepted_license: '1'
page: 395-406
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 27th IEEE International Parallel and Distributed Processing
  Symposium (IPDPS)
status: public
title: Locally Self-Adjusting Tree Networks
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '514'
abstract:
- lang: eng
  text: Diese Arbeit besch{\"a}ftigt sich mit dem Facility Location Problem. Dies
    ist ein Optimierungsproblem, bei dem festgelegt werden muss an welchen Positionen
    Ressourcen zur Verf{\"u}gung gestellt werden, so dass diese von Nutzern gut erreicht
    werden k{\"o}nnen. Es sollen dabei Kosten minimiert werden, die zum einen durch
    Bereitstellung von Ressourcen und zum anderen durch Verbindungskosten zwischen
    Nutzern und Ressourcen entstehen. Die Schwierigkeit des Problems liegt darin,
    dass man einerseits m{\"o}glichst wenige Ressourcen zur Verf{\"u}gung stellen
    m{\"o}chte, andererseits daf{\"u}r sorgen muss, dass sich Nutzer nicht all zu
    weit weg von Ressourcen befinden. Dies w{\"u}rde n{\"a}mlich hohe Verbindungskosten
    nach sich ziehen. Das Facility Location Problem wurde bereits sehr intensiv in
    vielen unterschiedlichen Varianten untersucht. In dieser Arbeit werden drei Varianten
    des Problems modelliert und neue Algorithmen f{\"u}r sie entwickelt und bez{\"u}glich
    ihres Approximationsfaktors und ihrer Laufzeit analysiert. Jede dieser drei untersuchten
    Varianten hat einen besonderen Schwerpunkt. Bei der ersten Varianten handelt es
    sich um ein Online Problem, da hier die Eingabe nicht von Anfang an bekannt ist,
    sondern Schritt f{\"u}r Schritt enth{\"u}llt wird. Die Schwierigkeit hierbei besteht
    darin unwiderrufliche Entscheidungen treffen zu m{\"u}ssen ohne dabei die Zukunft
    zu kennen und trotzdem eine zu jeder Zeit gute L{\"o}sung angeben zu k{\"o}nnen.
    Der Schwerpunkt der zweiten Variante liegt auf Lokalit{\"a}t, die z.B. in Sensornetzwerken
    von großer Bedeutung ist. Hier soll eine L{\"o}sung verteilt und nur mit Hilfe
    von lokalen Information berechnet werden. Schließlich besch{\"a}ftigt sich die
    dritte Variante mit einer verteilten Berechnung, bei welcher nur eine stark beschr{\"a}nkte
    Datenmenge verschickt werden darf und dabei trotzdem ein sehr guter Approximationsfaktor
    erreicht werden muss. Die bei der Analyse der Approximationsfaktoren bzw. der
    Kompetitivit{\"a}t verwendeten Techniken basieren zum großen Teil auf Absch{\"a}tzung
    der primalen L{\"o}sung mit Hilfe einer L{\"o}sung des zugeh{\"o}rigen dualen
    Problems. F{\"u}r die Modellierung von Lokalit{\"a}t wird das weitverbreitete
    LOCAL Modell verwendet. In diesem Modell werden f{\"u}r die Algorithmen subpolynomielle
    obere Laufzeitschranken gezeigt.
author:
- first_name: Peter
  full_name: Pietrzyk, Peter
  last_name: Pietrzyk
citation:
  ama: Pietrzyk P. <i>Local and Online Algorithms for Facility Location</i>. Universität
    Paderborn; 2013.
  apa: Pietrzyk, P. (2013). <i>Local and Online Algorithms for Facility Location</i>.
    Universität Paderborn.
  bibtex: '@book{Pietrzyk_2013, title={Local and Online Algorithms for Facility Location},
    publisher={Universität Paderborn}, author={Pietrzyk, Peter}, year={2013} }'
  chicago: Pietrzyk, Peter. <i>Local and Online Algorithms for Facility Location</i>.
    Universität Paderborn, 2013.
  ieee: P. Pietrzyk, <i>Local and Online Algorithms for Facility Location</i>. Universität
    Paderborn, 2013.
  mla: Pietrzyk, Peter. <i>Local and Online Algorithms for Facility Location</i>.
    Universität Paderborn, 2013.
  short: P. Pietrzyk, Local and Online Algorithms for Facility Location, Universität
    Paderborn, 2013.
date_created: 2017-10-17T12:42:32Z
date_updated: 2022-01-06T07:01:38Z
ddc:
- '040'
department:
- _id: '63'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:44:13Z
  date_updated: 2018-03-15T10:44:13Z
  file_id: '1302'
  file_name: 514-DissertationPietrzyk.pdf
  file_size: 790821
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:44:13Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
title: Local and Online Algorithms for Facility Location
type: dissertation
user_id: '477'
year: '2013'
...
---
_id: '517'
abstract:
- lang: eng
  text: In the Semantic (Web) Services area, services are considered black boxes with
    a semantic description of their interfaces as to allow for precise service selection
    and conﬁguration. The semantic description is usually grounded on domain-speciﬁc
    concepts as modeled in ontologies. This accounts for types used in service signatures,
    but also predicates occurring in preconditions and effects of services. Ontologies,
    in particular those enhanced with rules, capture the knowledge of domain experts
    on properties of and relations between domain concepts. In this paper, we present
    a veriﬁcation technique for service compositions which makes use of this domain
    knowledge. We consider a service composition to be an assembly of services of
    which we just know signatures, preconditions, and effects. We aim at proving that
    a composition satisﬁes a (user-deﬁned) requirement, speciﬁed in terms of guaranteed
    preconditions and required postconditions. As an underlying veriﬁcation engine
    we use an SMT solver. To take advantage of the domain knowledge (and often, to
    enable veriﬁcation at all), the knowledge is fed into the solver in the form of
    sorts, uninterpreted functions and in particular assertions as to enhance the
    solver’s reasoning capabilities. Thereby, we allow for deductions within a domain
    previously unknown to the solver. We exemplify our technique on a case study from
    the area of water network optimization software.
author:
- first_name: Sven
  full_name: Walther, Sven
  last_name: Walther
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Walther S, Wehrheim H. Knowledge-Based Verification of Service Compositions
    - An SMT approach. In: <i>Proceedings of the 18th IEEE International Conference
    on Engineering of Complex Computer Systems (ICECCS)</i>. ; 2013:24-32. doi:<a
    href="https://doi.org/10.1109/ICECCS.2013.14">10.1109/ICECCS.2013.14</a>'
  apa: Walther, S., &#38; Wehrheim, H. (2013). Knowledge-Based Verification of Service
    Compositions - An SMT approach. In <i>Proceedings of the 18th IEEE International
    Conference on Engineering of Complex Computer Systems (ICECCS)</i> (pp. 24–32).
    <a href="https://doi.org/10.1109/ICECCS.2013.14">https://doi.org/10.1109/ICECCS.2013.14</a>
  bibtex: '@inproceedings{Walther_Wehrheim_2013, title={Knowledge-Based Verification
    of Service Compositions - An SMT approach}, DOI={<a href="https://doi.org/10.1109/ICECCS.2013.14">10.1109/ICECCS.2013.14</a>},
    booktitle={Proceedings of the 18th IEEE International Conference on Engineering
    of Complex Computer Systems (ICECCS)}, author={Walther, Sven and Wehrheim, Heike},
    year={2013}, pages={24–32} }'
  chicago: Walther, Sven, and Heike Wehrheim. “Knowledge-Based Verification of Service
    Compositions - An SMT Approach.” In <i>Proceedings of the 18th IEEE International
    Conference on Engineering of Complex Computer Systems (ICECCS)</i>, 24–32, 2013.
    <a href="https://doi.org/10.1109/ICECCS.2013.14">https://doi.org/10.1109/ICECCS.2013.14</a>.
  ieee: S. Walther and H. Wehrheim, “Knowledge-Based Verification of Service Compositions
    - An SMT approach,” in <i>Proceedings of the 18th IEEE International Conference
    on Engineering of Complex Computer Systems (ICECCS)</i>, 2013, pp. 24–32.
  mla: Walther, Sven, and Heike Wehrheim. “Knowledge-Based Verification of Service
    Compositions - An SMT Approach.” <i>Proceedings of the 18th IEEE International
    Conference on Engineering of Complex Computer Systems (ICECCS)</i>, 2013, pp.
    24–32, doi:<a href="https://doi.org/10.1109/ICECCS.2013.14">10.1109/ICECCS.2013.14</a>.
  short: 'S. Walther, H. Wehrheim, in: Proceedings of the 18th IEEE International
    Conference on Engineering of Complex Computer Systems (ICECCS), 2013, pp. 24–32.'
date_created: 2017-10-17T12:42:33Z
date_updated: 2022-01-06T07:01:41Z
ddc:
- '000'
department:
- _id: '77'
doi: 10.1109/ICECCS.2013.14
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T13:26:08Z
  date_updated: 2018-11-02T13:26:08Z
  file_id: '5248'
  file_name: 06601801.pdf
  file_size: 217085
  relation: main_file
file_date_updated: 2018-11-02T13:26:08Z
has_accepted_license: '1'
language:
- iso: eng
page: '24 - 32 '
project:
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subprojekt B3
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 18th IEEE International Conference on Engineering
  of Complex Computer Systems (ICECCS)
status: public
title: Knowledge-Based Verification of Service Compositions - An SMT approach
type: conference
user_id: '477'
year: '2013'
...
---
_id: '519'
abstract:
- lang: eng
  text: In this work we present the first scalable distributed information system,i.e.,
    a system with low storage overhead, that is provably robust againstDenial-of-Service
    (DoS) attacks by a current insider. We allow acurrent insider to have complete
    knowledge about the information systemand to have the power to block any \epsilon-fraction
    of its serversby a DoS-attack, where \epsilon can be chosen up to a constant.
    The taskof the system is to serve any collection of lookup requests with at most
    oneper non-blocked server in an efficient way despite this attack. Previously,scalable
    solutions were only known for DoS-attacks of past insiders, where apast insider
    only has complete knowledge about some past time pointt_0 of the information system.
    Scheideler et al. (DISC 2007, SPAA 2009) showedthat in this case it is possible
    to design an information system so that anyinformation that was inserted or last
    updated after t_0 is safe against a DoS-attack. But their constructions would
    not work at all for a current insider. The key idea behindour IRIS system is to
    make extensive use of coding. More precisely, we presenttwo alternative distributed
    coding strategies with an at most logarithmicstorage overhead that can handle
    up to a constant fraction of blocked servers.
author:
- first_name: Martina
  full_name: Eikel, Martina
  last_name: Eikel
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Eikel M, Scheideler C. IRIS: A Robust Information System Against Insider DoS-Attacks.
    In: <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and
    Architectures (SPAA)</i>. ; 2013:119-129. doi:<a href="https://doi.org/10.1145/2486159.2486186">10.1145/2486159.2486186</a>'
  apa: 'Eikel, M., &#38; Scheideler, C. (2013). IRIS: A Robust Information System
    Against Insider DoS-Attacks. In <i>Proceedings of the 25th ACM Symposium on Parallelism
    in Algorithms and Architectures (SPAA)</i> (pp. 119–129). <a href="https://doi.org/10.1145/2486159.2486186">https://doi.org/10.1145/2486159.2486186</a>'
  bibtex: '@inproceedings{Eikel_Scheideler_2013, title={IRIS: A Robust Information
    System Against Insider DoS-Attacks}, DOI={<a href="https://doi.org/10.1145/2486159.2486186">10.1145/2486159.2486186</a>},
    booktitle={Proceedings of the 25th ACM Symposium on Parallelism in Algorithms
    and Architectures (SPAA)}, author={Eikel, Martina and Scheideler, Christian},
    year={2013}, pages={119–129} }'
  chicago: 'Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information
    System Against Insider DoS-Attacks.” In <i>Proceedings of the 25th ACM Symposium
    on Parallelism in Algorithms and Architectures (SPAA)</i>, 119–29, 2013. <a href="https://doi.org/10.1145/2486159.2486186">https://doi.org/10.1145/2486159.2486186</a>.'
  ieee: 'M. Eikel and C. Scheideler, “IRIS: A Robust Information System Against Insider
    DoS-Attacks,” in <i>Proceedings of the 25th ACM Symposium on Parallelism in Algorithms
    and Architectures (SPAA)</i>, 2013, pp. 119–129.'
  mla: 'Eikel, Martina, and Christian Scheideler. “IRIS: A Robust Information System
    Against Insider DoS-Attacks.” <i>Proceedings of the 25th ACM Symposium on Parallelism
    in Algorithms and Architectures (SPAA)</i>, 2013, pp. 119–29, doi:<a href="https://doi.org/10.1145/2486159.2486186">10.1145/2486159.2486186</a>.'
  short: 'M. Eikel, C. Scheideler, in: Proceedings of the 25th ACM Symposium on Parallelism
    in Algorithms and Architectures (SPAA), 2013, pp. 119–129.'
date_created: 2017-10-17T12:42:33Z
date_updated: 2022-01-06T07:01:42Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1145/2486159.2486186
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:38:34Z
  date_updated: 2018-03-15T10:38:34Z
  file_id: '1299'
  file_name: 519-iris-spaa2013_01.pdf
  file_size: 554618
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:38:34Z
has_accepted_license: '1'
page: 119-129
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and
  Architectures (SPAA)
status: public
title: 'IRIS: A Robust Information System Against Insider DoS-Attacks'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '520'
abstract:
- lang: eng
  text: Preemptive Routing and Wavelength Assignment (RWA) algorithms preempt established
    lightpaths in case not enough resources are available to set up a new lightpath
    in a Wavelength Division Multiplexing (WDM) network. The selection of lightpaths
    to be preempted relies on internal decisions of the RWA algorithm. Thus, if dedicated
    properties of the network topology are required by the applications running on
    the network, these requirements have to be known to the RWA algorithm.Otherwise
    it might happen that by preempting a particular lightpath these requirements are
    violated. If, however, these requirements include parametersknown only at the
    nodes running the application, the RWA algorithm cannot evaluate the requirements.
    For this reason an RWA algorithm is needed which incorporates feedback from the
    application layer in the preemption decisions.This work proposes a simple interface
    along with an algorithm for computing and selecting preemption candidates in case
    a lightpath cannot be established. We reason about the necessity of using information
    from the application layer in the RWA and present two example applications which
    benefit from this idea.
author:
- first_name: Philip
  full_name: Wette, Philip
  last_name: Wette
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Wette P, Karl H. Incorporating feedback from application layer into routing
    and wavelength assignment algorithms. In: <i>Proceedings of the 32nd IEEE International
    Conference on Computer Communications (INFOCOM)</i>. ; 2013:51-52. doi:<a href="https://doi.org/10.1109/INFCOMW.2013.6970733">10.1109/INFCOMW.2013.6970733</a>'
  apa: Wette, P., &#38; Karl, H. (2013). Incorporating feedback from application layer
    into routing and wavelength assignment algorithms. In <i>Proceedings of the 32nd
    IEEE International Conference on Computer Communications (INFOCOM)</i> (pp. 51–52).
    <a href="https://doi.org/10.1109/INFCOMW.2013.6970733">https://doi.org/10.1109/INFCOMW.2013.6970733</a>
  bibtex: '@inproceedings{Wette_Karl_2013, title={Incorporating feedback from application
    layer into routing and wavelength assignment algorithms}, DOI={<a href="https://doi.org/10.1109/INFCOMW.2013.6970733">10.1109/INFCOMW.2013.6970733</a>},
    booktitle={Proceedings of the 32nd IEEE International Conference on Computer Communications
    (INFOCOM)}, author={Wette, Philip and Karl, Holger}, year={2013}, pages={51–52}
    }'
  chicago: Wette, Philip, and Holger Karl. “Incorporating Feedback from Application
    Layer into Routing and Wavelength Assignment Algorithms.” In <i>Proceedings of
    the 32nd IEEE International Conference on Computer Communications (INFOCOM)</i>,
    51–52, 2013. <a href="https://doi.org/10.1109/INFCOMW.2013.6970733">https://doi.org/10.1109/INFCOMW.2013.6970733</a>.
  ieee: P. Wette and H. Karl, “Incorporating feedback from application layer into
    routing and wavelength assignment algorithms,” in <i>Proceedings of the 32nd IEEE
    International Conference on Computer Communications (INFOCOM)</i>, 2013, pp. 51–52.
  mla: Wette, Philip, and Holger Karl. “Incorporating Feedback from Application Layer
    into Routing and Wavelength Assignment Algorithms.” <i>Proceedings of the 32nd
    IEEE International Conference on Computer Communications (INFOCOM)</i>, 2013,
    pp. 51–52, doi:<a href="https://doi.org/10.1109/INFCOMW.2013.6970733">10.1109/INFCOMW.2013.6970733</a>.
  short: 'P. Wette, H. Karl, in: Proceedings of the 32nd IEEE International Conference
    on Computer Communications (INFOCOM), 2013, pp. 51–52.'
date_created: 2017-10-17T12:42:33Z
date_updated: 2022-01-06T07:01:43Z
ddc:
- '040'
department:
- _id: '75'
doi: 10.1109/INFCOMW.2013.6970733
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:38:04Z
  date_updated: 2018-03-15T10:38:04Z
  file_id: '1298'
  file_name: 520-wetteinfocom2013.pdf
  file_size: 131502
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:38:04Z
has_accepted_license: '1'
main_file_link:
- url: http://ieeexplore.ieee.org/document/6970733/
page: 51-52
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 32nd IEEE International Conference on Computer Communications
  (INFOCOM)
status: public
title: Incorporating feedback from application layer into routing and wavelength assignment
  algorithms
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '521'
author:
- first_name: Heinrich
  full_name: Riebler, Heinrich
  id: '8961'
  last_name: Riebler
citation:
  ama: Riebler H. <i>Identifikation und Wiederherstellung von kryptographischen Schlüsseln
    mit FPGAs</i>. Universität Paderborn; 2013.
  apa: Riebler, H. (2013). <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn.
  bibtex: '@book{Riebler_2013, title={Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs}, publisher={Universität Paderborn}, author={Riebler, Heinrich},
    year={2013} }'
  chicago: Riebler, Heinrich. <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.
  ieee: H. Riebler, <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.
  mla: Riebler, Heinrich. <i>Identifikation und Wiederherstellung von kryptographischen
    Schlüsseln mit FPGAs</i>. Universität Paderborn, 2013.
  short: H. Riebler, Identifikation und Wiederherstellung von kryptographischen Schlüsseln
    mit FPGAs, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:46Z
department:
- _id: '27'
- _id: '518'
keyword:
- coldboot
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '14'
  name: SFB 901 - Subprojekt C2
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
title: Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs
type: mastersthesis
user_id: '477'
year: '2013'
...
---
_id: '522'
author:
- first_name: Matthias
  full_name: Feldotto, Matthias
  id: '14052'
  last_name: Feldotto
  orcid: 0000-0003-1348-6516
citation:
  ama: 'Feldotto M. <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous
    Bandwidths</i>. Universität Paderborn; 2013.'
  apa: 'Feldotto, M. (2013). <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes
    with Heterogeneous Bandwidths</i>. Universität Paderborn.'
  bibtex: '@book{Feldotto_2013, title={HSkip+: A Self-Stabilizing Overlay Network
    for Nodes with Heterogeneous Bandwidths}, publisher={Universität Paderborn}, author={Feldotto,
    Matthias}, year={2013} }'
  chicago: 'Feldotto, Matthias. <i>HSkip+: A Self-Stabilizing Overlay Network for
    Nodes with Heterogeneous Bandwidths</i>. Universität Paderborn, 2013.'
  ieee: 'M. Feldotto, <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes with
    Heterogeneous Bandwidths</i>. Universität Paderborn, 2013.'
  mla: 'Feldotto, Matthias. <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes
    with Heterogeneous Bandwidths</i>. Universität Paderborn, 2013.'
  short: 'M. Feldotto, HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous
    Bandwidths, Universität Paderborn, 2013.'
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:47Z
department:
- _id: '79'
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Teilprojekt A
- _id: '5'
  name: SFB 901 - Subprojekt A1
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: 'HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous Bandwidths'
type: mastersthesis
user_id: '14052'
year: '2013'
...
---
_id: '524'
abstract:
- lang: eng
  text: 'We study the complexity theory for the local distributed setting introduced
    by Korman, Peleg and Fraigniaud. They have defined three complexity classes LD
    (Local Decision), NLD (Nondeterministic Local Decision) and NLD^#n. The class
    LD consists of all languages which can be decided with a constant number of communication
    rounds. The class NLD consists of all languages which can be verified by a nondeterministic
    algorithm with a constant number of communication rounds. In order to define the
    nondeterministic classes, they have transferred the notation of nondeterminism
    into the distributed setting by the use of certificates and verifiers. The class
    NLD^#n consists of all languages which can be verified by a nondeterministic algorithm
    where each node has access to an oracle for the number of nodes. They have shown
    the hierarchy LD subset NLD subset NLD^#n. Our main contributions are strict hierarchies
    within the classes defined by Korman, Peleg and Fraigniaud. We define additional
    complexity classes: the class LD(t) consists of all languages which can be decided
    with at most t communication rounds. The class NLD-O(f) consists of all languages
    which can be verified by a local verifier such that the size of the certificates
    that are needed to verify the language are bounded by a function from O(f). Our
    main results are refined strict hierarchies within these nondeterministic classes.'
author:
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Kamil
  full_name: Swirkot, Kamil
  last_name: Swirkot
citation:
  ama: Meyer auf der Heide F, Swirkot K. Hierarchies in Local Distributed Decision.
    2013.
  apa: Meyer auf der Heide, F., &#38; Swirkot, K. (2013). Hierarchies in Local Distributed
    Decision. arXiv.
  bibtex: '@article{Meyer auf der Heide_Swirkot_2013, title={Hierarchies in Local
    Distributed Decision}, publisher={arXiv}, author={Meyer auf der Heide, Friedhelm
    and Swirkot, Kamil}, year={2013} }'
  chicago: Meyer auf der Heide, Friedhelm, and Kamil Swirkot. “Hierarchies in Local
    Distributed Decision.” arXiv, 2013.
  ieee: F. Meyer auf der Heide and K. Swirkot, “Hierarchies in Local Distributed Decision.”
    arXiv, 2013.
  mla: Meyer auf der Heide, Friedhelm, and Kamil Swirkot. <i>Hierarchies in Local
    Distributed Decision</i>. arXiv, 2013.
  short: F. Meyer auf der Heide, K. Swirkot, (2013).
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:48Z
ddc:
- '040'
department:
- _id: '63'
external_id:
  arxiv:
  - '1311.7229'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:37:07Z
  date_updated: 2018-03-15T10:37:07Z
  file_id: '1296'
  file_name: 524-paper_01.pdf
  file_size: 534906
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:37:07Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publisher: arXiv
status: public
title: Hierarchies in Local Distributed Decision
type: preprint
user_id: '15415'
year: '2013'
...
---
_id: '525'
author:
- first_name: Tim
  full_name: Niklas Vinkemeier, Tim
  last_name: Niklas Vinkemeier
citation:
  ama: Niklas Vinkemeier T. <i>Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios</i>. Universität Paderborn; 2013.
  apa: Niklas Vinkemeier, T. (2013). <i>Haptics - Hadoop performance testing in concurrent
    job scenarios</i>. Universität Paderborn.
  bibtex: '@book{Niklas Vinkemeier_2013, title={Haptics - Hadoop performance testing
    in concurrent job scenarios}, publisher={Universität Paderborn}, author={Niklas
    Vinkemeier, Tim}, year={2013} }'
  chicago: Niklas Vinkemeier, Tim. <i>Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios</i>. Universität Paderborn, 2013.
  ieee: T. Niklas Vinkemeier, <i>Haptics - Hadoop performance testing in concurrent
    job scenarios</i>. Universität Paderborn, 2013.
  mla: Niklas Vinkemeier, Tim. <i>Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios</i>. Universität Paderborn, 2013.
  short: T. Niklas Vinkemeier, Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:48Z
department:
- _id: '75'
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Haptics - Hadoop performance testing in concurrent job scenarios
type: bachelorsthesis
user_id: '15504'
year: '2013'
...
---
_id: '527'
abstract:
- lang: eng
  text: 'In the future vision of software engineering, services from world-wide markets
    are composed automated in order to build custom-made systems.Supporting such scenarios
    requires an adequate service matching approach.Many existing approaches do not
    fulfill two key requirements of emerging concepts like On-The-Fly-Computing, namely
    (1) comprehensiveness, i.e., the consideration of different service aspects that
    cover not only functional properties, but also non-functional properties and (2)
    fuzzy matching, i.e., the ability to deliver gradual results in order to cope
    with a certain extent of uncertainty, incompleteness, and tolerance ranges.In
    this paper, I present a fuzzy matching process that distinguishes between different
    fuzziness sources and leverages fuzziness in different matching steps which consider
    different service aspects, e.g., behavior and quality properties. '
author:
- first_name: Marie
  full_name: Christin Platenius, Marie
  last_name: Christin Platenius
citation:
  ama: 'Christin Platenius M. Fuzzy Service Matching in On-The-Fly Computing. In:
    <i>Proceedings of the Doctoral Symposium of the 9th Joint Meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>. ; 2013:715-718. doi:<a href="https://doi.org/10.1145/2491411.2492405">10.1145/2491411.2492405</a>'
  apa: Christin Platenius, M. (2013). Fuzzy Service Matching in On-The-Fly Computing.
    In <i>Proceedings of the Doctoral Symposium of the 9th joint meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i> (pp. 715–718). <a href="https://doi.org/10.1145/2491411.2492405">https://doi.org/10.1145/2491411.2492405</a>
  bibtex: '@inproceedings{Christin Platenius_2013, title={Fuzzy Service Matching in
    On-The-Fly Computing}, DOI={<a href="https://doi.org/10.1145/2491411.2492405">10.1145/2491411.2492405</a>},
    booktitle={Proceedings of the Doctoral Symposium of the 9th joint meeting of the
    European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium
    on the Foundations of Software Engineering (FSE)}, author={Christin Platenius,
    Marie}, year={2013}, pages={715–718} }'
  chicago: Christin Platenius, Marie. “Fuzzy Service Matching in On-The-Fly Computing.”
    In <i>Proceedings of the Doctoral Symposium of the 9th Joint Meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>, 715–18, 2013. <a href="https://doi.org/10.1145/2491411.2492405">https://doi.org/10.1145/2491411.2492405</a>.
  ieee: M. Christin Platenius, “Fuzzy Service Matching in On-The-Fly Computing,” in
    <i>Proceedings of the Doctoral Symposium of the 9th joint meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>, 2013, pp. 715–718.
  mla: Christin Platenius, Marie. “Fuzzy Service Matching in On-The-Fly Computing.”
    <i>Proceedings of the Doctoral Symposium of the 9th Joint Meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>, 2013, pp. 715–18, doi:<a href="https://doi.org/10.1145/2491411.2492405">10.1145/2491411.2492405</a>.
  short: 'M. Christin Platenius, in: Proceedings of the Doctoral Symposium of the
    9th Joint Meeting of the European Software Engineering Conference (ESEC) and the
    ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 2013,
    pp. 715–718.'
date_created: 2017-10-17T12:42:35Z
date_updated: 2022-01-06T07:01:48Z
ddc:
- '040'
department:
- _id: '76'
doi: 10.1145/2491411.2492405
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:36:38Z
  date_updated: 2018-03-15T10:36:38Z
  file_id: '1295'
  file_name: 527-p715-platenius.pdf
  file_size: 730490
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:36:38Z
has_accepted_license: '1'
language:
- iso: eng
page: ' 715-718 '
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the Doctoral Symposium of the 9th joint meeting of the
  European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on
  the Foundations of Software Engineering (FSE)
status: public
title: Fuzzy Service Matching in On-The-Fly Computing
type: conference
user_id: '477'
year: '2013'
...
---
_id: '534'
author:
- first_name: Suhas
  full_name: Satya, Suhas
  last_name: Satya
citation:
  ama: Satya S. <i>Emulating Wavelength Division Multiplexing Using Openflow</i>.
    Universität Paderborn; 2013.
  apa: Satya, S. (2013). <i>Emulating Wavelength Division Multiplexing using Openflow</i>.
    Universität Paderborn.
  bibtex: '@book{Satya_2013, title={Emulating Wavelength Division Multiplexing using
    Openflow}, publisher={Universität Paderborn}, author={Satya, Suhas}, year={2013}
    }'
  chicago: Satya, Suhas. <i>Emulating Wavelength Division Multiplexing Using Openflow</i>.
    Universität Paderborn, 2013.
  ieee: S. Satya, <i>Emulating Wavelength Division Multiplexing using Openflow</i>.
    Universität Paderborn, 2013.
  mla: Satya, Suhas. <i>Emulating Wavelength Division Multiplexing Using Openflow</i>.
    Universität Paderborn, 2013.
  short: S. Satya, Emulating Wavelength Division Multiplexing Using Openflow, Universität
    Paderborn, 2013.
date_created: 2017-10-17T12:42:36Z
date_updated: 2022-01-06T07:01:50Z
department:
- _id: '75'
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Emulating Wavelength Division Multiplexing using Openflow
type: mastersthesis
user_id: '15504'
year: '2013'
...
---
_id: '538'
abstract:
- lang: eng
  text: 'We present a new technique to realize attribute-based encryption (ABE) schemes
    secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our
    approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE
    schemes to achieve more efficient constructions than the known generic constructions
    of CCA-secure ABE schemes. We restrict ourselves to the construction of attribute-based
    key encapsulation mechanisms (KEMs) and present two concrete CCA-secure schemes:
    a key-policy attribute-based KEM that is based on Goyal''s key-policy ABE and
    a ciphertext-policy attribute-based KEM that is based on Waters'' ciphertext-policy
    ABE. To achieve our goals, we use an appropriate hash function and need to extend
    the public parameters and the ciphertexts of the underlying CPA-secure encryption
    schemes only by a single group element. Moreover, we use the same hardness assumptions
    as the underlying CPA-secure encryption schemes.'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations
    without Random Oracles. 2013.
  apa: Blömer, J., &#38; Liske, G. (2013). Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles. Universität Paderborn.
  bibtex: '@article{Blömer_Liske_2013, title={Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles}, publisher={Universität Paderborn},
    author={Blömer, Johannes and Liske, Gennadij}, year={2013} }'
  chicago: Blömer, Johannes, and Gennadij Liske. “Direct Chosen-Ciphertext Secure
    Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn,
    2013.
  ieee: J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key
    Encapsulations without Random Oracles.” Universität Paderborn, 2013.
  mla: Blömer, Johannes, and Gennadij Liske. <i>Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles</i>. Universität Paderborn, 2013.
  short: J. Blömer, G. Liske, (2013).
date_created: 2017-10-17T12:42:37Z
date_updated: 2022-01-06T07:01:51Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:35:04Z
  date_updated: 2018-03-15T10:35:04Z
  file_id: '1292'
  file_name: 538-AB-KEM_01.pdf
  file_size: 389797
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:35:04Z
has_accepted_license: '1'
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2013/646
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
title: Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without
  Random Oracles
type: preprint
user_id: '25078'
year: '2013'
...
---
_id: '541'
abstract:
- lang: eng
  text: Existing solutions for gossip-based aggregation in peer-to-peer networks use
    epochs to calculate a global estimation from an initial static set of local values.
    Once the estimation converges system-wide, a new epoch is started with fresh initial
    values. Long epochs result in precise estimations based on old measurements and
    short epochs result in imprecise aggregated estimations. In contrast to this approach,
    we present in this paper a continuous, epoch-less approach which considers fresh
    local values in every round of the gossip-based aggregation. By using an approach
    for dynamic information aging, inaccurate values and values from left peers fade
    from the aggregation memory. Evaluation shows that the presented approach for
    continuous information aggregation in peer-to-peer systems monitors the system
    performance precisely, adapts to changes and is lightweight to operate.
author:
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
- first_name: Vitaly
  full_name: Rapp, Vitaly
  last_name: Rapp
citation:
  ama: 'Graffi K, Rapp V. Continuous Gossip-based Aggregation through Dynamic Information
    Aging. In: <i>Proceedings of the International Conference on Computer Communications
    and Networks (ICCCN’13)</i>. ; 2013:1-7. doi:<a href="https://doi.org/10.1109/ICCCN.2013.6614118">10.1109/ICCCN.2013.6614118</a>'
  apa: Graffi, K., &#38; Rapp, V. (2013). Continuous Gossip-based Aggregation through
    Dynamic Information Aging. In <i>Proceedings of the International Conference on
    Computer Communications and Networks (ICCCN’13)</i> (pp. 1–7). <a href="https://doi.org/10.1109/ICCCN.2013.6614118">https://doi.org/10.1109/ICCCN.2013.6614118</a>
  bibtex: '@inproceedings{Graffi_Rapp_2013, title={Continuous Gossip-based Aggregation
    through Dynamic Information Aging}, DOI={<a href="https://doi.org/10.1109/ICCCN.2013.6614118">10.1109/ICCCN.2013.6614118</a>},
    booktitle={Proceedings of the International Conference on Computer Communications
    and Networks (ICCCN’13)}, author={Graffi, Kalman and Rapp, Vitaly}, year={2013},
    pages={1–7} }'
  chicago: Graffi, Kalman, and Vitaly Rapp. “Continuous Gossip-Based Aggregation through
    Dynamic Information Aging.” In <i>Proceedings of the International Conference
    on Computer Communications and Networks (ICCCN’13)</i>, 1–7, 2013. <a href="https://doi.org/10.1109/ICCCN.2013.6614118">https://doi.org/10.1109/ICCCN.2013.6614118</a>.
  ieee: K. Graffi and V. Rapp, “Continuous Gossip-based Aggregation through Dynamic
    Information Aging,” in <i>Proceedings of the International Conference on Computer
    Communications and Networks (ICCCN’13)</i>, 2013, pp. 1–7.
  mla: Graffi, Kalman, and Vitaly Rapp. “Continuous Gossip-Based Aggregation through
    Dynamic Information Aging.” <i>Proceedings of the International Conference on
    Computer Communications and Networks (ICCCN’13)</i>, 2013, pp. 1–7, doi:<a href="https://doi.org/10.1109/ICCCN.2013.6614118">10.1109/ICCCN.2013.6614118</a>.
  short: 'K. Graffi, V. Rapp, in: Proceedings of the International Conference on Computer
    Communications and Networks (ICCCN’13), 2013, pp. 1–7.'
date_created: 2017-10-17T12:42:37Z
date_updated: 2022-01-06T07:01:52Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/ICCCN.2013.6614118
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:33:20Z
  date_updated: 2018-03-15T10:33:20Z
  file_id: '1290'
  file_name: 541-Continuous.Gossip.based.Aggregation.Through.Dynamic.Information.Aging.pdf
  file_size: 272960
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:33:20Z
has_accepted_license: '1'
language:
- iso: eng
page: 1-7
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the International Conference on Computer Communications
  and Networks (ICCCN'13)
status: public
title: Continuous Gossip-based Aggregation through Dynamic Information Aging
type: conference
user_id: '477'
year: '2013'
...
---
_id: '542'
abstract:
- lang: eng
  text: 'We consider the problem of managing a dynamic heterogeneous storagesystem
    in a distributed way so that the amount of data assigned to a hostin that system
    is related to its capacity. Two central problems have to be solvedfor this: (1)
    organizing the hosts in an overlay network with low degree and diameterso that
    one can efficiently check the correct distribution of the data androute between
    any two hosts, and (2) distributing the data among the hosts so thatthe distribution
    respects the capacities of the hosts and can easily be adapted asthe set of hosts
    or their capacities change. We present distributed protocols forthese problems
    that are self-stabilizing and that do not need any global knowledgeabout the system
    such as the number of nodes or the overall capacity of thesystem. Prior to this
    work no solution was known satisfying these properties.'
author:
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Kniesburges S, Koutsopoulos A, Scheideler C. CONE-DHT: A distributed self-stabilizing
    algorithm for a heterogeneous storage system. In: <i>Proceedings of the 27th International
    Symposium on Distributed Computing (DISC)</i>. LNCS. ; 2013:537-549. doi:<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>'
  apa: 'Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2013). CONE-DHT:
    A distributed self-stabilizing algorithm for a heterogeneous storage system. In
    <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>
    (pp. 537–549). <a href="https://doi.org/10.1007/978-3-642-41527-2_37">https://doi.org/10.1007/978-3-642-41527-2_37</a>'
  bibtex: '@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={LNCS},
    title={CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous
    storage system}, DOI={<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>},
    booktitle={Proceedings of the 27th International Symposium on Distributed Computing
    (DISC)}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler,
    Christian}, year={2013}, pages={537–549}, collection={LNCS} }'
  chicago: 'Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler.
    “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage
    System.” In <i>Proceedings of the 27th International Symposium on Distributed
    Computing (DISC)</i>, 537–49. LNCS, 2013. <a href="https://doi.org/10.1007/978-3-642-41527-2_37">https://doi.org/10.1007/978-3-642-41527-2_37</a>.'
  ieee: 'S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “CONE-DHT: A distributed
    self-stabilizing algorithm for a heterogeneous storage system,” in <i>Proceedings
    of the 27th International Symposium on Distributed Computing (DISC)</i>, 2013,
    pp. 537–549.'
  mla: 'Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm
    for a Heterogeneous Storage System.” <i>Proceedings of the 27th International
    Symposium on Distributed Computing (DISC)</i>, 2013, pp. 537–49, doi:<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>.'
  short: 'S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of the 27th
    International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:53Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1007/978-3-642-41527-2_37
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:32:48Z
  date_updated: 2018-03-15T10:32:48Z
  file_id: '1289'
  file_name: 542-CONE-DHT_A_distributed_self-stabilizing_algorithm_for_a_heterogeneous_storage_system.pdf
  file_size: 262302
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:32:48Z
has_accepted_license: '1'
page: 537-549
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 27th International Symposium on Distributed Computing
  (DISC)
series_title: LNCS
status: public
title: 'CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage
  system'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '544'
abstract:
- lang: eng
  text: Comparative evaluations of peer-to-peer protocols through simulations are
    a viable approach to judge the performance and costs of the individual protocols
    in large-scale networks. In order to support this work, we enhanced the peer-to-peer
    systems simulator PeerfactSim.KOM with a fine-grained analyzer concept, with exhaustive
    automated measurements and gnuplot generators as well as a coordination control
    to evaluate a set of experiment setups in parallel. Thus, by configuring all experiments
    and protocols only once and starting the simulator, all desired measurements are
    performed, analyzed, evaluated and combined, resulting in a holistic environment
    for the comparative evaluation of peer-to-peer systems.
author:
- first_name: Matthias
  full_name: Feldotto, Matthias
  id: '14052'
  last_name: Feldotto
  orcid: 0000-0003-1348-6516
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
citation:
  ama: 'Feldotto M, Graffi K. Comparative Evaluation of Peer-to-Peer Systems Using
    PeerfactSim.KOM. In: <i>Proceedings of the International Conference on High Performance
    Computing and Simulation (HPCS’13)</i>. ; 2013:99-106. doi:<a href="https://doi.org/10.1109/HPCSim.2013.6641399">10.1109/HPCSim.2013.6641399</a>'
  apa: Feldotto, M., &#38; Graffi, K. (2013). Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM. In <i>Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13)</i> (pp. 99–106). <a href="https://doi.org/10.1109/HPCSim.2013.6641399">https://doi.org/10.1109/HPCSim.2013.6641399</a>
  bibtex: '@inproceedings{Feldotto_Graffi_2013, title={Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM}, DOI={<a href="https://doi.org/10.1109/HPCSim.2013.6641399">10.1109/HPCSim.2013.6641399</a>},
    booktitle={Proceedings of the International Conference on High Performance Computing
    and Simulation (HPCS’13)}, author={Feldotto, Matthias and Graffi, Kalman}, year={2013},
    pages={99–106} }'
  chicago: Feldotto, Matthias, and Kalman Graffi. “Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM.” In <i>Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13)</i>, 99–106, 2013. <a href="https://doi.org/10.1109/HPCSim.2013.6641399">https://doi.org/10.1109/HPCSim.2013.6641399</a>.
  ieee: M. Feldotto and K. Graffi, “Comparative Evaluation of Peer-to-Peer Systems
    Using PeerfactSim.KOM,” in <i>Proceedings of the International Conference on High
    Performance Computing and Simulation (HPCS’13)</i>, 2013, pp. 99–106.
  mla: Feldotto, Matthias, and Kalman Graffi. “Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM.” <i>Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13)</i>, 2013, pp. 99–106,
    doi:<a href="https://doi.org/10.1109/HPCSim.2013.6641399">10.1109/HPCSim.2013.6641399</a>.
  short: 'M. Feldotto, K. Graffi, in: Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13), 2013, pp. 99–106.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:53Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/HPCSim.2013.6641399
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:32:17Z
  date_updated: 2018-03-15T10:32:17Z
  file_id: '1288'
  file_name: 544-FeldGraffi13.pdf
  file_size: 899441
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:32:17Z
has_accepted_license: '1'
language:
- iso: eng
page: 99-106
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the International Conference on High Performance Computing
  and Simulation (HPCS'13)
status: public
title: Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM
type: conference
user_id: '14052'
year: '2013'
...
---
_id: '546'
abstract:
- lang: eng
  text: Self-stabilization is the property of a system to transfer itself regardless
    of the initial state into a legitimate state. Chord as a simple, decentralized
    and scalable distributed hash table is an ideal showcase to introduce self-stabilization
    for p2p overlays. In this paper, we present Re-Chord, a self-stabilizing version
    of Chord. We show, that the stabilization process is functional, but prone to
    strong churn. For that, we present Ca-Re-Chord, a churn resistant version of Re-Chord,
    that allows the creation of a useful DHT in any kind of graph regardless of the
    initial state. Simulation results attest the churn resistance and good performance
    of Ca-Re-Chord.
author:
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
- first_name: Markus
  full_name: Benter, Markus
  last_name: Benter
- first_name: Mohammad
  full_name: Divband, Mohammad
  last_name: Divband
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
citation:
  ama: 'Graffi K, Benter M, Divband M, Kniesburges S, Koutsopoulos A. Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network. In: <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i>. ; 2013:27-34. doi:<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>'
  apa: 'Graffi, K., Benter, M., Divband, M., Kniesburges, S., &#38; Koutsopoulos,
    A. (2013). Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network.
    In <i>Proceedings of the Conference on Networked Systems (NetSys)</i> (pp. 27–34).
    <a href="https://doi.org/10.1109/NetSys.2013.11">https://doi.org/10.1109/NetSys.2013.11</a>'
  bibtex: '@inproceedings{Graffi_Benter_Divband_Kniesburges_Koutsopoulos_2013, title={Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network}, DOI={<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>},
    booktitle={Proceedings of the Conference on Networked Systems (NetSys)}, author={Graffi,
    Kalman and Benter, Markus and Divband, Mohammad and Kniesburges, Sebastian and
    Koutsopoulos, Andreas}, year={2013}, pages={27–34} }'
  chicago: 'Graffi, Kalman, Markus Benter, Mohammad Divband, Sebastian Kniesburges,
    and Andreas Koutsopoulos. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord
    Overlay Network.” In <i>Proceedings of the Conference on Networked Systems (NetSys)</i>,
    27–34, 2013. <a href="https://doi.org/10.1109/NetSys.2013.11">https://doi.org/10.1109/NetSys.2013.11</a>.'
  ieee: 'K. Graffi, M. Benter, M. Divband, S. Kniesburges, and A. Koutsopoulos, “Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network,” in <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i>, 2013, pp. 27–34.'
  mla: 'Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord
    Overlay Network.” <i>Proceedings of the Conference on Networked Systems (NetSys)</i>,
    2013, pp. 27–34, doi:<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>.'
  short: 'K. Graffi, M. Benter, M. Divband, S. Kniesburges, A. Koutsopoulos, in: Proceedings
    of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:55Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/NetSys.2013.11
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:30:42Z
  date_updated: 2018-03-15T10:30:42Z
  file_id: '1286'
  file_name: 546-Kalman.Graffi_CaReChord.A.Churn.Resistant.Selfstabilizing.Chord.Overlay.Network_02.pdf
  file_size: 244841
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:30:42Z
has_accepted_license: '1'
page: 27-34
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '13'
  name: SFB 901 - Subproject C1
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the Conference on Networked Systems (NetSys)
status: public
title: 'Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '547'
abstract:
- lang: eng
  text: 'In recent years, the role of process models in the development of enterprise
    software systems has increased continuously. Today, process models are used at
    different levels in the development process. For instance, in Service-Oriented
    Architectures (SOA), high-level business process models become input for the development
    of IT systems, and in running IT systems executable process models describe choreographies
    of Web Services. A key driver behind this development is the necessity for a closer
    alignment of business and IT requirements, to reduce the reaction times in software
    development to frequent changes in competitive markets.Typically in these scenarios,
    process models are developed, maintained, and transformed in a team environment
    by several stakeholders that are often from different business units, resulting
    in different versions. To obtain integrated process models comprising the changes
    applied to different versions, the versions need to be consolidated by means of
    model change management. Change management for process models can be compared
    to widely used concurrent versioning systems (CVS) and consists of the following
    major activities: matching of process models, detection of differences, computation
    of dependencies and conflicts between differences, and merging of process models.Although
    in general model-driven development (MDD) is accepted as a well-established development
    approach, there are still some shortcomings that let developers decide against
    MDD and for more traditional development paradigms. These shortcomings comprise
    a lack of fully integrated and fully featured development environments for MDD,
    such as a comprehensive support for model change management.In this thesis, we
    present a framework for process model change management. The framework is based
    on an intermediate representation for process models that serves as an abstraction
    of specific process modeling languages and focuses on common syntactic and semantic
    core concepts for the modeling of workflow in process models. Based on the intermediate
    representation, we match process models in versioning scenarios and compute differences
    between process models generically. Further, we consider the analysis of dependencies
    between differences and show how conflicts between differences can be computed
    by taking into account the semantics of the modeling language.As proof-of concept,
    we have implemented major parts of this framework in terms of a prototype. The
    detection of differences and dependencies contributed also to the Compare & Merge
    framework for the IBM WebSphere Business Modeler V 7.0 [1] (WBM), which was released
    as a product in fall 2009.'
author:
- first_name: Christian
  full_name: Gerth, Christian
  last_name: Gerth
citation:
  ama: Gerth C. <i>Business Process Models - Change Management</i>. Universität Paderborn;
    2013. doi:<a href="https://doi.org/10.1007/978-3-642-38604-6">10.1007/978-3-642-38604-6</a>
  apa: Gerth, C. (2013). <i>Business Process Models - Change Management</i>. Universität
    Paderborn. <a href="https://doi.org/10.1007/978-3-642-38604-6">https://doi.org/10.1007/978-3-642-38604-6</a>
  bibtex: '@book{Gerth_2013, title={Business Process Models - Change Management},
    DOI={<a href="https://doi.org/10.1007/978-3-642-38604-6">10.1007/978-3-642-38604-6</a>},
    publisher={Universität Paderborn}, author={Gerth, Christian}, year={2013} }'
  chicago: Gerth, Christian. <i>Business Process Models - Change Management</i>. Universität
    Paderborn, 2013. <a href="https://doi.org/10.1007/978-3-642-38604-6">https://doi.org/10.1007/978-3-642-38604-6</a>.
  ieee: C. Gerth, <i>Business Process Models - Change Management</i>. Universität
    Paderborn, 2013.
  mla: Gerth, Christian. <i>Business Process Models - Change Management</i>. Universität
    Paderborn, 2013, doi:<a href="https://doi.org/10.1007/978-3-642-38604-6">10.1007/978-3-642-38604-6</a>.
  short: C. Gerth, Business Process Models - Change Management, Universität Paderborn,
    2013.
date_created: 2017-10-17T12:42:39Z
date_updated: 2022-01-06T07:01:55Z
department:
- _id: '66'
doi: 10.1007/978-3-642-38604-6
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
title: Business Process Models - Change Management
type: dissertation
user_id: '477'
year: '2013'
...
