@misc{18648,
  author       = {{Guggenmos, Andreas}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Algorithmen für selbststabilisierende Skip+-Delaunaygraphen}}},
  year         = {{2020}},
}

@inproceedings{23376,
  author       = {{Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}},
  booktitle    = {{2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)}},
  title        = {{{SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}}},
  doi          = {{10.1109/ase.2019.00110}},
  year         = {{2020}},
}

@inbook{23377,
  author       = {{Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}},
  booktitle    = {{Lecture Notes in Computer Science}},
  issn         = {{0302-9743}},
  title        = {{{AuthCheck: Program-State Analysis for Access-Control Vulnerabilities}}},
  doi          = {{10.1007/978-3-030-54997-8_34}},
  year         = {{2020}},
}

@inproceedings{7283,
  author       = {{Alshomary, Milad and Düsterhus, Nick and Wachsmuth, Henning}},
  booktitle    = {{Proceedings of 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval}},
  location     = {{Xi'an, China}},
  pages        = {{1969--1972}},
  title        = {{{Extractive Snippet Generation for Arguments}}},
  year         = {{2020}},
}

@inproceedings{16487,
  author       = {{Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Slamanig, Daniel and Striecks, Christoph}},
  booktitle    = {{Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),}},
  location     = {{Taiwan}},
  publisher    = {{ACM}},
  title        = {{{Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection}}},
  doi          = {{10.1145/3320269.3384769}},
  year         = {{2020}},
}

@article{16570,
  author       = {{Jovanovikj, Ivan and Yigitbas, Enes and Sauer, Stefan and Engels, Gregor}},
  journal      = {{Softwaretechnik-Trends, Proceedings of the 22st Workshop Software-Reengineering & Evolution (WSRE) & 11h Workshop Design for Future (DFF)}},
  title        = {{{Challenges in Model-Driven Development of Multi-Platform Augmented Reality Applications }}},
  year         = {{2020}},
}

@inproceedings{16724,
  author       = {{Sharma, Arnab and Wehrheim, Heike}},
  booktitle    = {{Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA).}},
  publisher    = {{ACM}},
  title        = {{{Higher Income, Larger Loan? Monotonicity Testing of Machine Learning Models}}},
  year         = {{2020}},
}

@article{16725,
  author       = {{Richter, Cedric and Hüllermeier, Eyke and Jakobs, Marie-Christine and Wehrheim, Heike}},
  journal      = {{Journal of Automated Software Engineering}},
  publisher    = {{Springer}},
  title        = {{{Algorithm Selection for Software Validation Based on Graph Kernels}}},
  year         = {{2020}},
}

@article{16902,
  abstract     = {{The maintenance of efficient and robust overlay networks is one
of the most fundamental and reoccurring themes in networking.
This paper presents a survey of state-of-the-art 
algorithms to design and repair overlay networks in a distributed
manner. In particular, we discuss basic algorithmic primitives
to preserve connectivity, review algorithms for the fundamental
problem of graph linearization, and then survey self-stabilizing
algorithms for metric and scalable topologies. 
We also identify open problems and avenues for future research.
}},
  author       = {{Feldmann, Michael and Scheideler, Christian and Schmid, Stefan}},
  journal      = {{ACM Computing Surveys}},
  publisher    = {{ACM}},
  title        = {{{Survey on Algorithms for Self-Stabilizing Overlay Networks}}},
  doi          = {{10.1145/3397190}},
  year         = {{2020}},
}

@inproceedings{16903,
  abstract     = {{We consider the clock synchronization problem in the (discrete) beeping model: Given a network of $n$ nodes with each node having a clock value $\delta(v) \in \{0,\ldots T-1\}$, the goal is to synchronize the clock values of all nodes such that they have the same value in any round.
As is standard in clock synchronization, we assume \emph{arbitrary activations} for all nodes, i.e., the nodes start their protocol at an arbitrary round (not limited to $\{0,\ldots,T-1\}$).
We give an asymptotically optimal algorithm that runs in $4D + \Bigl\lfloor \frac{D}{\lfloor T/4 \rfloor} \Bigr \rfloor \cdot (T \mod 4) = O(D)$ rounds, where $D$ is the diameter of the network.
Once all nodes are in sync, they beep at the same round every $T$ rounds.
The algorithm drastically improves on the $O(T D)$-bound of \cite{firefly_sync} (where $T$ is required to be at least $4n$, so the bound is no better than $O(nD)$).
Our algorithm is very simple as nodes only have to maintain $3$ bits in addition to the $\lceil \log T \rceil$ bits needed to maintain the clock.
Furthermore we investigate the complexity of \emph{self-stabilizing} solutions for the clock synchronization problem: We first show lower bounds of $\Omega(\max\{T,n\})$ rounds on the runtime and $\Omega(\log(\max\{T,n\}))$ bits of memory required for any such protocol.
Afterwards we present a protocol that runs in $O(\max\{T,n\})$ rounds using at most $O(\log(\max\{T,n\}))$ bits at each node, which is asymptotically optimal with regards to both, runtime and memory requirements.}},
  author       = {{Feldmann, Michael and Khazraei, Ardalan and Scheideler, Christian}},
  booktitle    = {{Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA)}},
  publisher    = {{ACM}},
  title        = {{{Time- and Space-Optimal Discrete Clock Synchronization in the Beeping Model}}},
  doi          = {{10.1145/3350755.3400246}},
  year         = {{2020}},
}

@inproceedings{16933,
  abstract     = {{The continuous innovation of its business models is an important task for a company to stay competitive. During this process, the company has to validate various hypotheses about its business models by adapting to uncertain and changing customer needs effectively and efficiently. This adaptation, in turn, can be supported by the concept of Software Product Lines (SPLs). SPLs reduce the time to market by deriving products for customers with changing requirements using a common set of features, structured as a feature model. Analogously, we support the process of business model adaptation by applying the engineering process of SPLs to the structure of the Business Model Canvas (BMC). We call this concept a Business Model Decision Line (BMDL). The BMDL matches business domain knowledge in the form of a feature model with customer needs to derive hypotheses about the business model together with experiments for validation. Our approach is effective by providing a comprehensive overview of possible business model adaptations and efficient by reusing experiments for different hypotheses. We implement our approach in a tool and illustrate the usefulness with an example of developing business models for a mobile application.}},
  author       = {{Gottschalk, Sebastian and Rittmeier, Florian and Engels, Gregor}},
  booktitle    = {{Proceedings of the 22nd IEEE International Conference on Business Informatics}},
  keywords     = {{Business Model Decision Line, Business Model Adaptation, Hypothesis-driven Adaptation, Software Product Line, Feature Model}},
  location     = {{Antwerp}},
  publisher    = {{IEEE}},
  title        = {{{Hypothesis-driven Adaptation of Business Models based on Product Line Engineering}}},
  doi          = {{10.1109/CBI49978.2020.00022}},
  year         = {{2020}},
}

@inproceedings{16934,
  abstract     = {{To build successful products, the developers have to adapt their product features and business models to uncertain customer needs. This adaptation is part of the research discipline of Hypotheses Engineering (HE) where customer needs can be seen as hypotheses that need to be tested iteratively by conducting experiments together with the customer. So far, modeling support and associated traceability of this iterative process are missing. Both, in turn, are important to document the adaptation to the customer needs and identify experiments that provide most evidence to the customer needs. To target this issue, we introduce a model-based HE approach with a twofold contribution: First, we develop a modeling language that models hypotheses and experiments as interrelated hierarchies together with a mapping between them. While the hypotheses are labeled with a score level of their current evidence, the experiments are labeled with a score level of maximum evidence that can be achieved during conduction. Second, we provide an iterative process to determine experiments that offer the most evidence improvement to the modeled hypotheses. We illustrate the usefulness of the approach with an example of testing the business model of a mobile application.}},
  author       = {{Gottschalk, Sebastian and Yigitbas, Enes and Engels, Gregor}},
  booktitle    = {{Business Modeling and Software Design}},
  editor       = {{Shishkov, Boris}},
  keywords     = {{Hypothesis Engineering, Model-based, Customer Need Adaptation, Business Model, Product Features}},
  location     = {{Potsdam}},
  pages        = {{276--286}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Model-based Hypothesis Engineering for Supporting Adaptation to Uncertain Customer Needs}}},
  doi          = {{10.1007/978-3-030-52306-0_18}},
  volume       = {{391}},
  year         = {{2020}},
}

@inproceedings{16968,
  abstract     = {{In this work, we initiate the research about the Gathering problem for robots
with limited viewing range in the three-dimensional Euclidean space. In the
Gathering problem, a set of initially scattered robots is required to gather at
the same position. The robots' capabilities are very restricted -- they do not
agree on any coordinate system or compass, have a limited viewing range, have
no memory of the past and cannot communicate. We study the problem in two
different time models, in FSYNC (fully synchronized discrete rounds) and the
continuous time model. For FSYNC, we introduce the 3D-Go-To-The-Center-strategy
and prove a runtime of $\Theta(n^2)$ that matches the currently best runtime
bound for the same model in the Euclidean plane [SPAA'11]. Our main result is
the generalization of contracting strategies (continuous time) from
[Algosensors'17] to three dimensions. In contracting strategies, every robot
that is located on the global convex hull of all robots' positions moves with
full speed towards the inside of the convex hull. We prove a runtime bound of
$O(\Delta \cdot n^{3/2})$ for any three-dimensional contracting strategy, where
$\Delta$ denotes the diameter of the initial configuration. This comes up to a
factor of $\sqrt{n}$ close to the lower bound of $\Omega (\Delta \cdot n)$
which is already true in two dimensions. In general, it might be hard for
robots with limited viewing range to decide whether they are located on the
global convex hull and which movement maintains the connectivity of the swarm,
rendering the design of concrete contracting strategies a challenging task. We
prove that the continuous variant of 3D-Go-To-The-Center is contracting and
keeps the swarm connected. Moreover, we give a simple design criterion for
three-dimensional contracting strategies that maintains the connectivity of the
swarm and introduce an exemplary strategy based on this criterion.}},
  author       = {{Braun, Michael and Castenow, Jannik and Meyer auf der Heide, Friedhelm}},
  booktitle    = {{Proceedings of the 27th Conference on Structural Information and Communication Complexity (SIROCCO)}},
  location     = {{Paderborn}},
  publisher    = {{Springer}},
  title        = {{{Local Gathering of Mobile Robots in Three Dimensions}}},
  doi          = {{10.1007/978-3-030-54921-3_4}},
  year         = {{2020}},
}

@inproceedings{17063,
  author       = {{Hansmeier, Tim and Kaufmann, Paul and Platzner, Marco}},
  booktitle    = {{GECCO '20: Proceedings of the Genetic and Evolutionary Computation Conference Companion}},
  isbn         = {{978-1-4503-7127-8}},
  location     = {{Cancún, Mexico}},
  pages        = {{1756--1764}},
  publisher    = {{Association for Computing Machinery (ACM)}},
  title        = {{{An Adaption Mechanism for the Error Threshold of XCSF}}},
  doi          = {{10.1145/3377929.3398106}},
  year         = {{2020}},
}

@inproceedings{17082,
  abstract     = {{Data-parallel applications run on cluster of servers in a datacenter and their communication triggers correlated resource demand on multiple links that can be abstracted as coflow. They often desire predictable network performance, which can be passed to network via coflow abstraction for application-aware network scheduling. In this paper, we propose a heuristic and an optimization algorithm for predictable network performance such that they guarantee coflows completion within their deadlines. The algorithms also ensure high network utilization, i.e., it's work-conserving, and avoids starvation of coflows. We evaluate both algorithms via trace-driven simulation and show that they admit 1.1x more coflows than the Varys scheme while meeting their deadlines.}},
  author       = {{Hasnain, Asif and Karl, Holger}},
  booktitle    = {{2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)}},
  keywords     = {{Coflow, Scheduling, Deadlines, Data centers}},
  location     = {{Melbourne, Australia}},
  publisher    = {{IEEE Computer Society}},
  title        = {{{Coflow Scheduling with Performance Guarantees for Data Center Applications}}},
  doi          = {{https://doi.org/10.1109/CCGrid49817.2020.00010}},
  year         = {{2020}},
}

@inproceedings{17084,
  author       = {{Weidmann, Nils and Anjorin, Anthony}},
  booktitle    = {{Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020}},
  editor       = {{Wehrheim, Heike and Cabot, Jordi}},
  isbn         = {{9783030452339}},
  issn         = {{0302-9743}},
  location     = {{Dublin, Ireland}},
  publisher    = {{Springer}},
  title        = {{{Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming}}},
  doi          = {{10.1007/978-3-030-45234-6_16}},
  year         = {{2020}},
}

@article{17092,
  abstract     = {{<jats:p>Radiation tolerance in FPGAs is an important field of research particularly for reliable computation in electronics used in aerospace and satellite missions. The motivation behind this research is the degradation of reliability in FPGA hardware due to single-event effects caused by radiation particles. Redundancy is a commonly used technique to enhance the fault-tolerance capability of radiation-sensitive applications. However, redundancy comes with an overhead in terms of excessive area consumption, latency, and power dissipation. Moreover, the redundant circuit implementations vary in structure and resource usage with the redundancy insertion algorithms as well as number of used redundant stages. The radiation environment varies during the operation time span of the mission depending on the orbit and space weather conditions. Therefore, the overheads due to redundancy should also be optimized at run-time with respect to the current radiation level. In this paper, we propose a technique called Dynamic Reliability Management (DRM) that utilizes the radiation data, interprets it, selects a suitable redundancy level, and performs the run-time reconfiguration, thus varying the reliability levels of the target computation modules. DRM is composed of two parts. The design-time tool flow of DRM generates a library of various redundant implementations of the circuit with different magnitudes of performance factors. The run-time tool flow, while utilizing the radiation/error-rate data, selects a required redundancy level and reconfigures the computation module with the corresponding redundant implementation. Both parts of DRM have been verified by experimentation on various benchmarks. The most significant finding we have from this experimentation is that the performance can be scaled multiple times by using partial reconfiguration feature of DRM, e.g., 7.7 and 3.7 times better performance results obtained for our data sorter and matrix multiplier case studies compared with static reliability management techniques. Therefore, DRM allows for maintaining a suitable trade-off between computation reliability and performance overhead during run-time of an application.</jats:p>}},
  author       = {{Anwer, Jahanzeb and Meisner, Sebastian and Platzner, Marco}},
  issn         = {{1687-7195}},
  journal      = {{International Journal of Reconfigurable Computing}},
  pages        = {{1--19}},
  title        = {{{Dynamic Reliability Management for FPGA-Based Systems}}},
  doi          = {{10.1155/2020/2808710}},
  year         = {{2020}},
}

@article{10790,
  author       = {{Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin and Kuntze, Daniel}},
  issn         = {{1862-5347}},
  journal      = {{Advances in Data Analysis and Classification}},
  pages        = {{147–173}},
  title        = {{{How well do SEM algorithms imitate EM algorithms? A non-asymptotic analysis for mixture models}}},
  doi          = {{10.1007/s11634-019-00366-7}},
  volume       = {{14}},
  year         = {{2020}},
}

@phdthesis{15482,
  author       = {{Löken, Nils}},
  title        = {{{Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work}}},
  doi          = {{10.17619/UNIPB/1-854}},
  year         = {{2020}},
}

@inproceedings{15604,
  author       = {{Jovanovikj, Ivan and Yigitbas, Enes and Sauer, Stefan and Engels, Gregor}},
  booktitle    = {{Proceedings of the 8th International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD}},
  isbn         = {{978-989-758-400-8}},
  location     = {{Valletta}},
  title        = {{{Concept-based Co-Migration of Test Cases}}},
  doi          = {{10.5220/0009171404490456}},
  year         = {{2020}},
}

