@article{222,
  abstract     = {{Virtual field programmable gate arrays (FPGA) are overlay architectures realized on top of physical FPGAs. They are proposed to enhance or abstract away from the physical FPGA for experimenting with novel architectures and design tool flows. In this paper, we present an embedding of a ZUMA-based virtual FPGA fabric into a complete configurable system-on-chip. Such an embedding is required to fully harness the potential of virtual FPGAs, in particular to give the virtual circuits access to main memory and operating system services, and to enable a concurrent operation of virtualized and non-virtualized circuitry. We discuss our extension to ZUMA and its embedding into the ReconOS operating system for hardware/software systems. Furthermore, we present an open source tool flow to synthesize configurations for the virtual FPGA, along with an analysis of the area and delay overheads involved.}},
  author       = {{Wiersema, Tobias and Bockhorn, Arne and Platzner, Marco}},
  journal      = {{Computers & Electrical Engineering}},
  pages        = {{112----122}},
  publisher    = {{Elsevier}},
  title        = {{{An Architecture and Design Tool Flow for Embedding a Virtual FPGA into a Reconfigurable System-on-Chip}}},
  doi          = {{10.1016/j.compeleceng.2016.04.005}},
  year         = {{2016}},
}

@misc{223,
  abstract     = {{We consider the problem of aggregation in overlay networks. We use a synchronous time model in which each node has polylogarithmic memory and can send at most a polylogarithmic number of messages per round. We investigate how to quickly compute the result of an aggregate functionf over elements that are distributed among the nodes of the network such that the result is eventually known by a selected root node. We show how to compute distributive aggregate functions such as SUM, MAX, and OR in time $O(\log n / \log\log n)$ using a tree that is created in a pre-processing phase. If only a polylogarithmic number of data items need to be aggregated, we show how to compute the result in time $O(\sqrt{\log n / \log\log n})$. Furthermore, we show how to compute holistic aggregate functions such as DISTINCT, SMALLEST(k) and MODE(k) in time $O(\log n / \log\log n)$. Finally, we show a lower bound of $\Omega(\sqrt{\log n / \log\log n})$ for deterministic algorithms that compute any of the aggregate functions in the scope of the thesis.}},
  author       = {{Hinnenthal, Kristian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Aggregation in Overlay Networks}}},
  year         = {{2016}},
}

@inproceedings{224,
  abstract     = {{In modern software development, paradigms like component-based software engineering (CBSE) and service-oriented architectures (SOA) emphasize the construction of large software systems out of existing components or services. Therein, a service is a self-contained piece of software, which adheres to a specified interface. In a model-based software design, this interface constitutes our sole knowledge of the service at design time, while service implementations are not available. Therefore, correctness checks or detection of potential errors in service compositions has to be carried out without the possibility of executing services. This challenges the usage of standard software error localization techniques for service compositions. In this paper, we review state-of-the-art approaches for error localization of software and discuss their applicability to service compositions.}},
  author       = {{Krämer, Julia and Wehrheim, Heike}},
  booktitle    = {{Proceedings of the 5th European Conference on Service-Oriented and Cloud Computing (ESOCC 2016)}},
  pages        = {{248----262}},
  title        = {{{A short survey on using software error localization for service compositions}}},
  doi          = {{10.1007/978-3-319-44482-6_16}},
  year         = {{2016}},
}

@inproceedings{226,
  abstract     = {{Error detection, localization and correction are time-intensive tasks in software development, but crucial to deliver functionally correct products. Thus, automated approaches to these tasks have been intensively studied for standard software systems. For model-based software systems, the situation is different. While error detection is still well-studied, error localization and correction is a less-studied domain. In this paper, we examine error localization and correction for models of service compositions. Based on formal definitions of error and correction in this context, we show that the classical approach of error localization and correction, i.e. first determining a set of suspicious statements and then proposing changes to these statements, is ineffective in our context. In fact, it lessens the chance to succeed in finding a correction at all.In this paper, we introduce correction proposal as a novel approach on error correction in service compositions integrating error localization and correction in one combined step. In addition, we provide an algorithm to compute such correction proposals automatically.}},
  author       = {{Krämer, Julia and Wehrheim, Heike}},
  booktitle    = {{Proceedings of the 1st International Workshop on Formal to Practical Software Verification and Composition (VeryComp 2016)}},
  pages        = {{445----457}},
  title        = {{{A Formal Approach to Error Localization and Correction in Service Compositions}}},
  doi          = {{10.1007/978-3-319-50230-4_35}},
  year         = {{2016}},
}

@inproceedings{227,
  abstract     = {{Information flow analysis studies the flow of data between program entities (e.g. variables), where the allowed flow is specified via security policies. Typical information flow analyses compute a conservative (over-)approximation of the flows in a program. Such an analysis may thus signal non-existing violations of the security policy.In this paper, we propose a new technique for inspecting the reported violations (counterexamples) for spuriousity. Similar to counterexample-guided-abstraction-refinement (CEGAR) in software verification, we use the result of this inspection to improve the next round of the analysis. We prove soundness of this scheme.}},
  author       = {{Töws, Manuel and Wehrheim, Heike}},
  booktitle    = {{Proceedings of the 18th International Conference on Formal Engineering Methods (ICFEM 2016)}},
  pages        = {{466----483}},
  title        = {{{A CEGAR Scheme for Information Flow Analysis}}},
  doi          = {{10.1007/978-3-319-47846-3_29}},
  year         = {{2016}},
}

@inproceedings{22870,
  author       = {{Röltgen, Daniel and Anacker, Harald and Dumitrescu, Roman}},
  booktitle    = {{VDE Kongress 2016 Internet of Things, Mannheim, Deutschland, 7. - 8. Nov. 2016}},
  title        = {{{Einsatz- und Nutzenpotentiale von Augmented Reality im Kontext von Industrie 4.0}}},
  year         = {{2016}},
}

@inproceedings{22871,
  author       = {{Falkowski, Tommy and Fechtelpeter, Christian and Peitz, Christoph and Kühn, Arno and Dumitrescu, Roman}},
  booktitle    = {{VDE Kongress 2016, 7. - 8. Nov. 2016}},
  title        = {{{ Einsatz von Leuchten zur Standortbestimmung in der Produktion}}},
  year         = {{2016}},
}

@inproceedings{22872,
  author       = {{Westermann, Matthias and Anacker, Harald and Dumitrescu, Roman and Czaja, Anja Maria}},
  booktitle    = {{2nd IEEE International Symposium on Systems Engineering 2016, Edinburgh, Scotland, 4. - 5. Okt. 2016}},
  title        = {{{Reference Architecture and Maturity Levels for Cyber-Physical Systems}}},
  year         = {{2016}},
}

@inproceedings{22873,
  author       = {{Fechtelpeter, Christian and Jürgenhake, Christoph and Dumitrescu, Roman and Mager, Thomas and Fritz, Karl-Peter and Grötzinger, Tobias and Müller, Hagen and Wild, Paul and Zimmermann, Andre}},
  booktitle    = {{12th International Congress on Molded Interconnect Devices, Conference Proceedings , 28. - 30. Sep. 2016}},
  title        = {{{Reliability in MID - barriers, potentials, fields of action}}},
  year         = {{2016}},
}

@inproceedings{22874,
  author       = {{Jürgenhake, Christoph and Falkowski, Tommy and Dumitrescu, Roman}},
  booktitle    = {{12th International Congress on Molded Interconnect Devices, Würzburg, 28. - 30. Sep. 2016}},
  title        = {{{Classification of MID-prototypes}}},
  year         = {{2016}},
}

@inproceedings{22876,
  author       = {{Jürgenhake, Christoph and Dumitrescu, Roman}},
  booktitle    = {{International Design Conference - Design 2016, 16. - 19. Mai 2016}},
  title        = {{{Systematic for function-oriented development of spatial integrated circuit carriers}}},
  year         = {{2016}},
}

@inproceedings{22878,
  author       = {{Kaiser, Lydia and Bremer, Christian and Dumitrescu, Roman}},
  booktitle    = {{Sysint - 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering}},
  title        = {{{Exhaustiveness of Systems Structures in Model-Based Systems Engineering for Mechatronic Systems}}},
  year         = {{2016}},
}

@inproceedings{22879,
  author       = {{Jürgenhake, Christoph and Falkowski, Tommy and Fechtelpeter, Christian and Dumitrescu, Roman}},
  booktitle    = {{Sysint - 3rd International Conference on System-Integrated Intelligence: New Challenges for Product and Production Engineering}},
  title        = {{{ Function-based feasibility study and benchmark for MID concepts}}},
  year         = {{2016}},
}

@inproceedings{22880,
  author       = {{Bretz, Lukas Helmut and Tschirner, Christian and Dumitrescu, Roman}},
  booktitle    = {{IEEE ISSE: Proceedings of 2016 International Symposium on Systems Engineering}},
  pages        = {{143--150}},
  title        = {{{ A concept for managing information in early stages of product engineering by integrating MBSE and workflow management systems}}},
  year         = {{2016}},
}

@inproceedings{217,
  abstract     = {{Today, cloud vendors host third party black-box services, whose developers usually provide only textual descriptions or purely syntactical interface specifications. Cloud vendors that give substantial support to other third party developers to integrate hosted services into new software solutions would have a unique selling feature over their competitors. However, to reliably determine if a service is reusable, comprehensive service specifications are needed. Characteristic for comprehensive in contrast to syntactical specifications are the formalization of ontological and behavioral semantics, homogeneity according to a global ontology, and a service grounding that links the abstract service description and its technical realization. Homogeneous, semantical specifications enable to reliably identify reusable services, whereas the service grounding is needed for the technical service integration. In general, comprehensive specifications are not availableand have to be derived. Existing automatized approaches are restricted to certain characteristics of comprehensiveness. In my PhD, I consider an automatized approach to derive fully-fledged comprehensive specifications for black-box services. Ontological semantics are derived from syntactical interface specifications. Behavioral semantics are mined from call logs that cloud vendors create to monitor the hosted services. The specifications are harmonized over a global ontology. The service grounding is established using traceability information. The approach enables third party developers to compose services into complex systems and creates new sales channels for cloud and service providers.}},
  author       = {{Schwichtenberg, Simon}},
  booktitle    = {{Proceedings of the 38th International Conference on Software Engineering Companion (ICSE)}},
  pages        = {{815--818}},
  title        = {{{Automatized Derivation of Comprehensive Specifications for Black-box Services}}},
  doi          = {{10.1145/2889160.2889271}},
  year         = {{2016}},
}

@inproceedings{21728,
  author       = {{Heppner, Sabrina and Dransfeld, Marius and Domik, Gitta}},
  booktitle    = {{Informatik 2016}},
  editor       = {{Pinzger, Martin and Mayr, Heinrich}},
  isbn         = {{978-3-88579-653-4}},
  pages        = {{1591--1604}},
  publisher    = {{Gesellschaft für Informatik e.V.}},
  title        = {{{Adding atmospheric scattering and transparency to a deferred rendering pipeline for camera based ADAS tests}}},
  year         = {{2016}},
}

@inproceedings{21729,
  author       = {{Heppner, S. and Dransfeld, M. and Domik, Gitta}},
  booktitle    = {{Vision, Modeling & Visualization}},
  editor       = {{Hullin, M. and Stamminger, M. and Weinkauf, T.}},
  isbn         = {{978-3-03868-025-3}},
  publisher    = {{The Eurographics Association}},
  title        = {{{A Deferred Rendering Pipeline Including a Global Illumination Model for Atmospheric Scattering and Transparency}}},
  doi          = {{10.2312/vmv.20161458}},
  year         = {{2016}},
}

@article{21730,
  author       = {{Yanaka, K. and Yamanouchi, T.}},
  journal      = {{IEEE Computer Graphics and Applications}},
  number       = {{2}},
  pages        = {{68--73}},
  publisher    = {{Editors G. Domik and G. S. Owen}},
  title        = {{{3D Image Display Courses for Information Media Students}}},
  doi          = {{10.1109/MCG.2016.36}},
  volume       = {{36}},
  year         = {{2016}},
}

@article{21731,
  author       = {{Santos, B. S. and Ferreira, B. Q. and Dias, P.}},
  journal      = {{IEEE Computer Graphics and Applications}},
  number       = {{1}},
  pages        = {{86--90}},
  publisher    = {{IEEE}},
  title        = {{{Using Heuristic Evaluation to Foster Visualization Analysis and Design Skills}}},
  doi          = {{10.1109/MCG.2016.7}},
  volume       = {{36}},
  year         = {{2016}},
}

@inproceedings{219,
  abstract     = {{Existing software markets like Google Play allow users to search among available Apps and select one based on the description provided for the App or based on its rating. Future software markets facilitate on-the-fly composition of such Apps based on users’ individual wishes. Realizing such On-The-Fly Computing (OTF) markets requires support of sophisticated software features. In addition, suitable orchestration among such features needs to ensure well-alignment of business and IT aspects in case of run-time changes like market dynamics. However, all these introduce new architectural and management complexities, which are specific to such markets. An architecture framework for OTF markets will include design solutions to overcome these complexities. In my PhD, I aim at identifying an architecture framework for OTF markets including main architectural building blocks and a systematic development process. Such an architecture framework enables the development of OTF markets in the future. Furthermore, this knowledge can be used as a basis to improve existing software markets by integrating missing functionalities.}},
  author       = {{Jazayeri, Bahar}},
  booktitle    = {{Proceedings of the 10th European Conference on Software Architecture (ECSA Workshops)}},
  pages        = {{42}},
  publisher    = {{ACM}},
  title        = {{{Architectural Management of On-The-Fly Computing Markets}}},
  doi          = {{10.1145/2993412.3010821}},
  year         = {{2016}},
}

