@article{21743,
  author       = {{Repenning, A. and C. Webb, D. and Brand, C. and Gluck, F. and Grover, R. and Miller, S. and Nickerson, H. and Song, M.}},
  journal      = {{IEEE Computer Graphics and Applications}},
  number       = {{3}},
  pages        = {{68--71}},
  publisher    = {{IEEE}},
  title        = {{{Beyond Minecraft: Facilitating Computational Thinking through Modeling and Programming in 3D}}},
  doi          = {{10.1109/MCG.2014.46}},
  volume       = {{34}},
  year         = {{2014}},
}

@article{21744,
  author       = {{Reina, G. and Müller, T. and Ertl, T.}},
  journal      = {{IEEE Computer Graphics and Applications}},
  number       = {{4}},
  pages        = {{16--21}},
  publisher    = {{IEEE}},
  title        = {{{Incorporating Modern OpenGL into Computer Graphics Education}}},
  doi          = {{10.1109/MCG.2014.69}},
  volume       = {{34}},
  year         = {{2014}},
}

@article{21745,
  author       = {{Cao, M. and Li, Y. and Pan, Z. and Csete, J. and Sun, S. and Li, J. and Liu, Y.}},
  journal      = {{Computer Graphics and Applications, IEEE}},
  pages        = {{83--87}},
  publisher    = {{IEEE}},
  title        = {{{Creative Educational Use of Virtual Reality: Working with Second Life}}},
  doi          = {{10.1109/MCG.2014.87}},
  volume       = {{34}},
  year         = {{2014}},
}

@article{21746,
  author       = {{DiSalvo, B.}},
  journal      = {{IEEE Computer Graphics and Applications}},
  number       = {{6}},
  pages        = {{12--15}},
  publisher    = {{IEEE}},
  title        = {{{Graphical Qualities of Educational Technology: Using Drag-and-Drop and Text-Based Programs for Introductory Computer Science}}},
  doi          = {{10.1109/MCG.2014.112}},
  volume       = {{34}},
  year         = {{2014}},
}

@proceedings{7761,
  editor       = {{Weskamp , Christoph  and John , Thomas  and Kundisch , Dennis  and Teetz, Alexander and Rose, Mirko }},
  title        = {{{Towards a Simulation-based Approach for Evaluating Business Models for the Electric Vehicle Market}}},
  year         = {{2014}},
}

@inproceedings{8064,
  author       = {{Pittke, Fabian and Nagel, Benjamin and Engels, Gregor and Mendling, Jan}},
  booktitle    = {{Proceedings of the 19th International EMMSAD Conference}},
  publisher    = {{Springer}},
  title        = {{{Linguistic Consistency of Goal Models}}},
  year         = {{2014}},
}

@inproceedings{8065,
  abstract     = {{Software engineering methods are used to prescribe and coordinate the tasks necessary to plan, build, deliver, and maintain software. There is a broad consensus that there is no one-size-fits-all method and that, e.g., agile and plan-driven approaches have to be mixed sometimes, based on the context of a project. Creating these so-called situational methods and assuring that they cover all necessary details consistently is a challenge. There is also the challenge for the project teams to follow methods as prescribed by the method engineer. Our approach supports the creation of consistent situational methods from a repository of pre-existing building blocks. Moreover, we present means to enact these methods with standard BPEL/BPEL4People workflow engines, automating the coordination of tasks and providing guidance for them.}},
  author       = {{Fazal-Baqaie, Masud and Gerth, Christian and Engels, Gregor}},
  booktitle    = {{In Proceedings of the 15th International Conference of Product Focused Software Development and Process Improvement (PROFES 2014)}},
  pages        = {{281--284}},
  publisher    = {{Springer}},
  title        = {{{Breathing Life into Situational Software Engineering Methods}}},
  volume       = {{8892}},
  year         = {{2014}},
}

@inproceedings{8066,
  abstract     = {{Agile Softwareentwicklungsmethoden erfreuen sich einer steigenden Verbreitung, versprechen sie doch risiko-getrie-ben und leichtgewichtig auch bei sich verändernden Anforderungen gute Ergebnisse zu erzielen. Viele Unternehmen stehen jedoch vor der Herausforderung, agile Prinzipien mit den Gegebenheiten im Unterneh-men zu vereinbaren, z.B. mit den internen Prozessen und organisatori-schen Gegebenheiten. Ein besonders herausforderndes Beispiel ist die Softwareentwicklung in Kooperation mit Offshore-Partnern. Die Auto-ren berichten aus einem laufenden Methodenverbesserungsprojekt für ein Unternehmen der Finanzbranche, das für die Softwareentwicklung mit On- und Offshore-Partnern kooperiert. Anders als bisher soll der indischen Offshore-Partner in naher Zukunft große Softwaressysteme federführend implementieren. Dabei sollen projektindividuell auch Onshore-Partner eingebunden werden. Der Beitrag stellt den systema-tischen Ansatz für die inkrementelle Methodenverbesserung vor, mit dem Varianten einer möglichst agilen Methode definiert werden sollen, die sowohl im Projektumfeld als auch im operativen Tagesgeschäft ef-fektiv und effizient eingesetzt werden können. Die Autoren fassen au-ßerdem die im Rahmen von Interviews erhobenen, bisherigen Erfah-rungen in der Zusammenarbeit mit dem Offshore-Partner zusammen, die für die Methode berücksichtigt werden müssen.}},
  author       = {{Fazal-Baqaie, Masud and Sauer, Stefan and Heuft, Torsten}},
  booktitle    = {{Proceedings of Projektmanagement und Vorgehensmodelle 2014}},
  pages        = {{59--69}},
  publisher    = {{GI, Köllen Druck+Verlag GmbH, Bonn}},
  title        = {{{Agile Entwicklung mit On- und Offshore-Partnern – Methodenverbesserung in der Praxis}}},
  year         = {{2014}},
}

@techreport{8224,
  author       = {{Arifulina, Svetlana and Christin Platenius, Marie and Gerth, Christian and Becker, Steffen and Engels, Gregor and Schäfer, Wilhelm}},
  publisher    = {{Heinz Nixdorf Institute, University of Paderborn}},
  title        = {{{Configuration of Specification Language and Matching for Services in On-The-Fly Computing}}},
  year         = {{2014}},
}

@inproceedings{5749,
  author       = {{Yigitbas, Enes and Fischer, Holger Gerhard and Sauer, Stefan}},
  booktitle    = {{Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience - Third International Conference, {DUXU} 2014, Held as Part of {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part {I}}},
  pages        = {{206--213}},
  title        = {{{Model-Based User Interface Development for Adaptive Self-Service Systems}}},
  doi          = {{10.1007/978-3-319-07668-3\_21}},
  year         = {{2014}},
}

@inproceedings{5750,
  author       = {{Yigitbas, Enes and Fischer, Holger Gerhard and Kern, Thomas and Paelke, Volker}},
  booktitle    = {{Human-Centered Software Engineering - 5th {IFIP} {WG} 13.2 International Conference, {HCSE} 2014, Paderborn, Germany, September 16-18, 2014. Proceedings}},
  pages        = {{267--274}},
  title        = {{{Model-Based Development of Adaptive UIs for Multi-channel Self-service Systems}}},
  doi          = {{10.1007/978-3-662-44811-3\_18}},
  year         = {{2014}},
}

@inproceedings{5751,
  author       = {{Yigitbas, Enes and Sauer, Stefan}},
  booktitle    = {{Mensch & Computer 2014 - Workshopband, 14. Fachübergreifende Konferenz für Interaktive und Kooperative Medien - Interaktiv unterwegs - Freiräume gestalten, 31. August - 3. September 2014, München, Germany}},
  pages        = {{167--175}},
  title        = {{{Flexible & Adaptive UIs for Self-Service Systems}}},
  year         = {{2014}},
}

@inproceedings{6273,
  author       = {{Fischer, Holger Gerhard and Riedemann, Catharina and Daske, Lisa and Geis, Thomas and Kluge, Oliver and Molich, Rolf and Polkehn, Knut}},
  booktitle    = {{Jahresband Usability Professionals}},
  publisher    = {{German UPA}},
  title        = {{{Qualität im Usability Engineering - Stand der Arbeiten am Qualitätsstandard Usability Engineering der German UPA}}},
  year         = {{2014}},
}

@inproceedings{6303,
  author       = {{Senft, Björn and Fischer, Holger Gerhard and Sudbrock, Christian}},
  booktitle    = {{Mensch & Computer 2014 - Workshopband}},
  pages        = {{111--116}},
  publisher    = {{De Gruyter Oldenbourg}},
  title        = {{{IT-Unterstützung im praktischen Ausbildungsbetrieb der Feuerwehr}}},
  year         = {{2014}},
}

@book{6428,
  abstract     = {{The intensive use of networked embedded systems is one of the key success factors in the automotive industry also triggering a massive shortening of innovation cycles. Hundreds of so called Electronic Control Units (ECUs), connected by kilometers of electrical wiring, operate in today's modern car enabling a huge variety of new functionalities ranging from safety to comfort applications. All this functionality can only be realized if the ECUs are able to communicate and to cooperate using a real-time enabled communication network in the car. Today we are at the verge of another leap forward: This in-car network is being ex- tended to not only connect local ECUs but to connect the whole car to other cars and its environment using Inter-Vehicle Communications (IVCs). Relying on existing wireless Internet access using cellular networks of the third (3G) or fourth generation (4G), or novel networking technologies that are being designed specifically for the use in the vehicular context such as IEEE WAVE, ETSI ITS-G5, and the IEEE 802.11p protocol, it becomes possible to use spontaneous connections between vehicles to exchange information, promising to enable novel and sometimes futuristic applications. Using such IVC, safety relevant information can be exchanged that could not have been obtained using local sensors, enabling a driver to virtually see traffic through large trucks or buildings. This new idea of networked vehicles creates opportunities to not only increase road traffic safety but also to improve our driving experience. Traffic jams can be prevented altogether (or at least we would be informed of jams well in advance) - and we might even be able to enable the driver to enjoying fully automated rides in a train-like convoy of cooperating of vehicles on the road. Vehicular networking, the fusion of vehicles' networks to exchange information, is the common basis on which all of these visions build upon. Being fascinated with all the opportunities and challenges related to vehicular networking, we have been a part of this research community for close to ten years. In this time, many new and sometimes crazy ideas have been formulated how to connect cars of the future. Many of these ideas have been found not suitable after thorough investigation - yet, several survived and paved the road for what are now close to market-ready solutions. From a research perspective, we are able to identify many open challenges, both in the in-car and inter-vehicle communication systems. To investigate these further, we co-organized two Dagstuhl seminars inviting leading experts from all over the world and bringing together practitioners from industry and scientists from research institutes and universities. In this scope, we were able to formulate directions guiding the ongoing research activities at least in the medium term. We also established a complementary seminar series for newcomers to the field, which is being organized in the context of the international FG-IVC series of seminars and organized by the German computer science and electrical engineering societies GI and ITG. This textbook is based on a tutorial series on the same topic presented at all the major IEEE conferences including IEEE CCNC, IEEE ICC, IEEE GLOBECOM, and IEEE VTC, as well as in the scope of Falko Dressler's IEEE Distinguished Lecturer Tours in Europe, the U.S., South America, and Asia-Pacific. We also designed a new graduate level university class, which is being held at different universities in Europe. This has inspired us to collect our experiences in the form of a textbook, collecting in one place the common concepts of past and future vehicular networking topics for a broad range of readers - from students that want to enter this exciting new field to practitioners looking for a comprehensive overview. This book would not have been possible without the many people that have inspired and supported us over the last decade in our research activites on vehicular networking - first and foremost the community centering around the IEEE Vehicular Networking Conference, the premier conference in the field. In particular we'd like to name Prof. Ozan K. Tonguz (CMU) and Prof. Mario Gerla (UCLA) who collaborated with us investigating some of the mentioned crazy ideas, and finally identifying valuable and lasting solutions. The aforementioned tutorial lectues have been prepared together with Dr. Onur Altintas (Toyota ITC) and Prof. Claudio Casetti (Politechnico di Torino). We also wish to express our appreciation for the support we received from the most helpful staff at Cambridge during the preparation of this book. Finally, we would like to sincerely thank our families, friends, and colleagues for their enduring help and support. We hope you will enjoy reading this textbook as much as we enjoyed preparing its contents for you. We gladly welcome any feedback and invite you to leave us a note or peruse supplementary material we are offering on this book's companion website http://book.car2x.org/.
}},
  author       = {{Sommer, Christoph and Dressler, Falko}},
  isbn         = {{978-1-107-04671-9}},
  publisher    = {{Cambridge University Press}},
  title        = {{{Vehicular Networking}}},
  doi          = {{10.1017/CBO9781107110649}},
  year         = {{2014}},
}

@unpublished{442,
  abstract     = {{We present a new transformation of chosen-plaintext secure predicate encryption schemes with public index into chosen-ciphertext secure schemes. Our construction requires only a universal one-way hash function and is selectively secure in the standard model. The transformation is not generic but can be applied to various existing schemes constructed from bilinear groups. Using common structural properties of these schemes we provide an efficient and simple transformation without overhead in form of one-time signatures or message authentication codes as required in the known generic transformations.}},
  author       = {{Blömer, Johannes and Liske, Gennadij}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions}}},
  year         = {{2014}},
}

@inproceedings{446,
  abstract     = {{This paper considers the problem of how to efficiently share a wireless medium which is subject to harsh external interference or even jamming. While this problem has already been studied intensively for simplistic single-hop or unit disk graph models, we make a leap forward and study MAC protocols for the SINR interference model (a.k.a. the physical model). We make two contributions. First, we introduce a new adversarial SINR model which captures a wide range of interference phenomena. Concretely, we consider a powerful, adaptive adversary which can jam nodes at arbitrary times and which is only limited by some energy budget. The second contribution of this paper is a distributed MAC protocol which provably achieves a constant competitive throughput in this environment: we show that, with high probability, the protocol ensures that a constant fraction of the non-blocked time periods is used for successful transmissions.}},
  author       = {{Ogierman, Adrian and Richa, Andrea W. and Scheideler, Christian and Schmid, Stefan and Zhang, Jin}},
  booktitle    = {{Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)}},
  pages        = {{2751----2759}},
  title        = {{{Competitive MAC under adversarial SINR}}},
  doi          = {{10.1109/INFOCOM.2014.6848224}},
  year         = {{2014}},
}

@inproceedings{447,
  abstract     = {{Automatic service composition is still a challengingtask. It is even more challenging when dealing witha dynamic market of services for end users. New servicesmay enter the market while other services are completelyremoved. Furthermore, end users are typically no experts in thedomain in which they formulate a request. As a consequence,ambiguous user requests will inevitably emerge and have tobe taken into account. To meet these challenges, we proposea new approach that combines automatic service compositionwith adaptive service recommendation. A best first backwardsearch algorithm produces solutions that are functional correctwith respect to user requests. An adaptive recommendationsystem supports the search algorithm in decision-making.Reinforcement Learning techniques enable the system to adjustits recommendation strategy over time based on user ratings.The integrated approach is described on a conceptional leveland demonstrated by means of an illustrative example fromthe image processing domain.}},
  author       = {{Jungmann, Alexander and Mohr, Felix and Kleinjohann, Bernd}},
  booktitle    = {{Proceedings of the 10th World Congress on Services (SERVICES)}},
  pages        = {{346--353}},
  title        = {{{Combining Automatic Service Composition with Adaptive Service Recommendation for Dynamic Markets of Services}}},
  doi          = {{10.1109/SERVICES.2014.68}},
  year         = {{2014}},
}

@inproceedings{449,
  abstract     = {{Cloud computing resulted in a continuously growing number of provided software services to be used by consumers. Brokers discover services that fit best to consumers' requirements by matching Qualityof-Service (QoS) properties. In order to negotiate Service-Level Agreements (SLAs), a provider has to determine the provided QoS based on QoS analyses. However, the risk for the provider to violate the SLA is high as the service's actual quality can deviate from the specified QoS due to uncertainties that occur during the provider's quality analysis. In this paper, we discuss current software engineering paradigms like cloud computing and service-oriented computing with respect to the amount of uncertainty they induce into service matching and SLA negotiations. As a result, we explain, why cloud computing reduces such uncertainties.}},
  author       = {{Becker, Matthias and Platenius, Marie Christin and Becker, Steffen}},
  booktitle    = {{Proceedings of the 2nd International Workshop on Cloud Service Brokerage (CSB)}},
  pages        = {{153--159}},
  title        = {{{Cloud Computing Reduces Uncertainties in Quality-of-Service Matching!}}},
  doi          = {{10.1007/978-3-319-14886-1_15}},
  year         = {{2014}},
}

@inproceedings{450,
  abstract     = {{Configurable program analysis (CPA) is a generic concept for the formalization of different software analysis techniques in a single framework. With the tool CPAchecker, this framework allows for an easy configuration and subsequent automatic execution of analysis procedures ranging from data-flow analysis to model checking. The focus of the tool CPAchecker is thus on analysis. In this paper, we study configurability from the point of view of software certification. Certification aims at providing (via a prior analysis) a certificate of correctness for a program which is (a) tamper-proof and (b) more efficient to check for validity than a full analysis. Here, we will show how, given an analysis instance of a CPA, to construct a corresponding sound certification instance, thereby arriving at configurable program certification. We report on experiments with certification based on different analysis techniques, and in particular explain which characteristics of an underlying analysis allow us to design an efficient (in the above (b) sense) certification procedure. }},
  author       = {{Jakobs, Marie-Christine and Wehrheim, Heike}},
  booktitle    = {{Proceedings of the 21st International Symposium on Model Checking of Software (SPIN)}},
  pages        = {{30--39}},
  title        = {{{Certification for Configurable Program Analysis}}},
  doi          = {{10.1145/2632362.2632372}},
  year         = {{2014}},
}

