[{"title":"User Centered Design Process of OSAMi-D - Developing User Interfaces for a Remote Ergometer Training Application","date_created":"2019-02-05T12:41:05Z","author":[{"full_name":"Klompmaker, Florian","last_name":"Klompmaker","first_name":"Florian"},{"last_name":"Senft","full_name":"Senft, Björn","id":"9109","first_name":"Björn"},{"full_name":"Nebe, Karsten","last_name":"Nebe","first_name":"Karsten"},{"first_name":"Clemens","full_name":"Busch, Clemens","last_name":"Busch"},{"full_name":"Willemsen, Detlev","last_name":"Willemsen","first_name":"Detlev"}],"date_updated":"2022-01-06T07:03:39Z","citation":{"mla":"Klompmaker, Florian, et al. “User Centered Design Process of OSAMi-D - Developing User Interfaces for a Remote Ergometer Training Application.” <i>{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011</i>, 2011, pp. 268–73.","bibtex":"@inproceedings{Klompmaker_Senft_Nebe_Busch_Willemsen_2011, title={User Centered Design Process of OSAMi-D - Developing User Interfaces for a Remote Ergometer Training Application}, booktitle={{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011}, author={Klompmaker, Florian and Senft, Björn and Nebe, Karsten and Busch, Clemens and Willemsen, Detlev}, year={2011}, pages={268–273} }","short":"F. Klompmaker, B. Senft, K. Nebe, C. Busch, D. Willemsen, in: {HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011, 2011, pp. 268–273.","apa":"Klompmaker, F., Senft, B., Nebe, K., Busch, C., &#38; Willemsen, D. (2011). User Centered Design Process of OSAMi-D - Developing User Interfaces for a Remote Ergometer Training Application. In <i>{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011</i> (pp. 268–273).","ieee":"F. Klompmaker, B. Senft, K. Nebe, C. Busch, and D. Willemsen, “User Centered Design Process of OSAMi-D - Developing User Interfaces for a Remote Ergometer Training Application,” in <i>{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011</i>, 2011, pp. 268–273.","chicago":"Klompmaker, Florian, Björn Senft, Karsten Nebe, Clemens Busch, and Detlev Willemsen. “User Centered Design Process of OSAMi-D - Developing User Interfaces for a Remote Ergometer Training Application.” In <i>{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011</i>, 268–73, 2011.","ama":"Klompmaker F, Senft B, Nebe K, Busch C, Willemsen D. User Centered Design Process of OSAMi-D - Developing User Interfaces for a Remote Ergometer Training Application. In: <i>{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011</i>. ; 2011:268-273."},"page":"268-273","year":"2011","language":[{"iso":"eng"}],"user_id":"9109","department":[{"_id":"66"}],"_id":"7536","status":"public","type":"conference","publication":"{HEALTHINF} 2011 - Proceedings of the International Conference on Health Informatics, Rome, Italy, 26-29 January, 2011"},{"citation":{"ama":"Brüseke F, Becker S, Engels G. Palladio-based performance blame analysis. In: <i>Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; Satellite Event of the CompArch 2011), Boulder Colorado, CO (USA)</i>. New York, NY (USA): ACM; 2011:25-32. doi:<a href=\"http://dx.doi.org/10.1145/2000292.2000298\">http://dx.doi.org/10.1145/2000292.2000298</a>","chicago":"Brüseke, Frank, Steffen Becker, and Gregor Engels. “Palladio-Based Performance Blame Analysis.” In <i>Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; Satellite Event of the CompArch 2011), Boulder Colorado, CO (USA)</i>, 25–32. New York, NY (USA): ACM, 2011. <a href=\"http://dx.doi.org/10.1145/2000292.2000298\">http://dx.doi.org/10.1145/2000292.2000298</a>.","ieee":"F. Brüseke, S. Becker, and G. Engels, “Palladio-based performance blame analysis,” in <i>Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; satellite event of the CompArch 2011), Boulder Colorado, CO (USA)</i>, 2011, pp. 25–32.","apa":"Brüseke, F., Becker, S., &#38; Engels, G. (2011). Palladio-based performance blame analysis. In <i>Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; satellite event of the CompArch 2011), Boulder Colorado, CO (USA)</i> (pp. 25–32). New York, NY (USA): ACM. <a href=\"http://dx.doi.org/10.1145/2000292.2000298\">http://dx.doi.org/10.1145/2000292.2000298</a>","short":"F. Brüseke, S. Becker, G. Engels, in: Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; Satellite Event of the CompArch 2011), Boulder Colorado, CO (USA), ACM, New York, NY (USA), 2011, pp. 25–32.","bibtex":"@inproceedings{Brüseke_Becker_Engels_2011, place={New York, NY (USA)}, title={Palladio-based performance blame analysis}, DOI={<a href=\"http://dx.doi.org/10.1145/2000292.2000298\">http://dx.doi.org/10.1145/2000292.2000298</a>}, booktitle={Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; satellite event of the CompArch 2011), Boulder Colorado, CO (USA)}, publisher={ACM}, author={Brüseke, Frank and Becker, Steffen and Engels, Gregor}, year={2011}, pages={25–32} }","mla":"Brüseke, Frank, et al. “Palladio-Based Performance Blame Analysis.” <i>Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; Satellite Event of the CompArch 2011), Boulder Colorado, CO (USA)</i>, ACM, 2011, pp. 25–32, doi:<a href=\"http://dx.doi.org/10.1145/2000292.2000298\">http://dx.doi.org/10.1145/2000292.2000298</a>."},"page":"25-32","year":"2011","place":"New York, NY (USA)","doi":"http://dx.doi.org/10.1145/2000292.2000298","title":"Palladio-based performance blame analysis","date_created":"2019-03-08T09:36:29Z","author":[{"first_name":"Frank","last_name":"Brüseke","full_name":"Brüseke, Frank"},{"last_name":"Becker","full_name":"Becker, Steffen","first_name":"Steffen"},{"first_name":"Gregor","full_name":"Engels, Gregor","id":"107","last_name":"Engels"}],"publisher":"ACM","date_updated":"2022-01-06T07:03:55Z","status":"public","abstract":[{"lang":"eng","text":"Performance is an important quality attribute for business information systems. When a tester has spotted a performance error, the error is passed to the software developers to fix it. However, in component-based software development the tester has to do blame analysis first, i. e. the tester has to decide, which party is responsible to fix the error. If the error is a design or deployment issue, it can be assigned to the software architect or the system deployer. If the error is specific to a component, it needs to be assigned to the corresponding component developer. An accurate blame analysis is important, because wrong assignments of errors will cause a loss of time and money. Our approach aims at doing blame analysis for performance errors by comparing performance metrics obtained in performance testing and performance prediction. We use performance prediction values as expected values for individual components. For performance prediction we use the Palladio approach. By this means, our approach evaluates each component’s performance in a certain test case. If the component performs poorly, its component developer needs to fix the component or the architect replaces the component with a faster one. If no omponent performs poorly, we can deduce that there is a design or deployment issue and the architecture needs to be changed. In this paper, we present an exemplary blame analysis based on a web shop system. The example shows the feasibility of our approach."}],"type":"conference","publication":"Proceedings of the 16th International Workshop on Component-Oriented Programming (WCOP; satellite event of the CompArch 2011), Boulder Colorado, CO (USA)","language":[{"iso":"eng"}],"user_id":"52534","department":[{"_id":"66"}],"_id":"8471"},{"publication":"Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany)","type":"conference","status":"public","department":[{"_id":"66"}],"series_title":"Lecture Notes in Informatics","user_id":"52534","_id":"8472","language":[{"iso":"eng"}],"citation":{"ama":"Nagel B. Semi-automatische Ableitung externer Anpassungsmechanismen für selbst-adaptive Systeme. In: <i>Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany)</i>. Lecture Notes in Informatics. Bonn: Gesellschaft für Informatik (GI); 2011.","ieee":"B. Nagel, “Semi-automatische Ableitung externer Anpassungsmechanismen für selbst-adaptive Systeme,” in <i>Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany)</i>, 2011.","chicago":"Nagel, Benjamin . “Semi-Automatische Ableitung Externer Anpassungsmechanismen Für Selbst-Adaptive Systeme.” In <i>Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany)</i>. Lecture Notes in Informatics. Bonn: Gesellschaft für Informatik (GI), 2011.","short":"B. Nagel, in: Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany), Gesellschaft für Informatik (GI), Bonn, 2011.","bibtex":"@inproceedings{Nagel_2011, place={Bonn}, series={Lecture Notes in Informatics}, title={Semi-automatische Ableitung externer Anpassungsmechanismen für selbst-adaptive Systeme}, booktitle={Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany)}, publisher={Gesellschaft für Informatik (GI)}, author={Nagel, Benjamin }, year={2011}, collection={Lecture Notes in Informatics} }","mla":"Nagel, Benjamin. “Semi-Automatische Ableitung Externer Anpassungsmechanismen Für Selbst-Adaptive Systeme.” <i>Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany)</i>, Gesellschaft für Informatik (GI), 2011.","apa":"Nagel, B. (2011). Semi-automatische Ableitung externer Anpassungsmechanismen für selbst-adaptive Systeme. In <i>Proceedings of the Software Engineering 2011 (SE 2011), Karlsruhe (Germany)</i>. Bonn: Gesellschaft für Informatik (GI)."},"year":"2011","place":"Bonn","date_created":"2019-03-08T09:38:16Z","author":[{"first_name":"Benjamin ","last_name":"Nagel","full_name":"Nagel, Benjamin "}],"publisher":"Gesellschaft für Informatik (GI)","date_updated":"2022-01-06T07:03:55Z","title":"Semi-automatische Ableitung externer Anpassungsmechanismen für selbst-adaptive Systeme"},{"user_id":"15504","series_title":"LNCS","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"646","file_date_updated":"2018-03-14T13:57:26Z","ddc":["040"],"type":"conference","publication":"Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)","file":[{"date_created":"2018-03-14T13:57:26Z","creator":"florida","date_updated":"2018-03-14T13:57:26Z","file_name":"646-SSS2011-Scheideler_02.pdf","file_id":"1227","access_level":"closed","file_size":339664,"content_type":"application/pdf","relation":"main_file","success":1}],"status":"public","abstract":[{"lang":"eng","text":"This paper presents a dynamic overlay network based on the De Bruijn graph which we call Linearized De Bruijn (LDB) network. The LDB network has the advantage that it has a guaranteed constant node degree and that the routing between any two nodes takes at most O(log n) hops with high probability. Also, we show that there is a simple local-control algorithm that can recover the LDB network from any network topology that is weakly connected."}],"date_created":"2017-10-17T12:42:58Z","author":[{"first_name":"Andrea W.","full_name":"Richa, Andrea W.","last_name":"Richa"},{"full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler","first_name":"Christian"}],"date_updated":"2022-01-06T07:03:06Z","doi":"10.1007/978-3-642-24550-3_31","title":"Self-Stabilizing DeBruijn Networks","has_accepted_license":"1","citation":{"ama":"Richa AW, Scheideler C. Self-Stabilizing DeBruijn Networks. In: <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>. LNCS. ; 2011:416-430. doi:<a href=\"https://doi.org/10.1007/978-3-642-24550-3_31\">10.1007/978-3-642-24550-3_31</a>","chicago":"Richa, Andrea W., and Christian Scheideler. “Self-Stabilizing DeBruijn Networks.” In <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, 416–30. LNCS, 2011. <a href=\"https://doi.org/10.1007/978-3-642-24550-3_31\">https://doi.org/10.1007/978-3-642-24550-3_31</a>.","ieee":"A. W. Richa and C. Scheideler, “Self-Stabilizing DeBruijn Networks,” in <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, 2011, pp. 416–430.","apa":"Richa, A. W., &#38; Scheideler, C. (2011). Self-Stabilizing DeBruijn Networks. In <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i> (pp. 416–430). <a href=\"https://doi.org/10.1007/978-3-642-24550-3_31\">https://doi.org/10.1007/978-3-642-24550-3_31</a>","mla":"Richa, Andrea W., and Christian Scheideler. “Self-Stabilizing DeBruijn Networks.” <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, 2011, pp. 416–30, doi:<a href=\"https://doi.org/10.1007/978-3-642-24550-3_31\">10.1007/978-3-642-24550-3_31</a>.","bibtex":"@inproceedings{Richa_Scheideler_2011, series={LNCS}, title={Self-Stabilizing DeBruijn Networks}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-24550-3_31\">10.1007/978-3-642-24550-3_31</a>}, booktitle={Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}, author={Richa, Andrea W. and Scheideler, Christian}, year={2011}, pages={416–430}, collection={LNCS} }","short":"A.W. Richa, C. Scheideler, in: Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp. 416–430."},"page":"416-430","year":"2011"},{"title":"Selected papers on Integrated Formal Methods (iFM09)","publisher":"Elsevier","date_created":"2017-10-17T12:42:58Z","year":"2011","issue":"10","ddc":["040"],"language":[{"iso":"eng"}],"file":[{"creator":"florida","date_created":"2018-03-14T13:56:48Z","date_updated":"2018-03-14T13:56:48Z","access_level":"closed","file_id":"1226","file_name":"647-LeuschelWehrheim.pdf","file_size":139105,"content_type":"application/pdf","relation":"main_file","success":1}],"publication":"Science of Computer Programming","doi":"10.1016/j.scico.2011.01.009","date_updated":"2022-01-06T07:03:06Z","author":[{"last_name":"Leuschel","full_name":"Leuschel, Michael","first_name":"Michael"},{"first_name":"Heike","full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim"}],"page":"835--836","citation":{"ama":"Leuschel M, Wehrheim H. Selected papers on Integrated Formal Methods (iFM09). <i>Science of Computer Programming</i>. 2011;(10):835--836. doi:<a href=\"https://doi.org/10.1016/j.scico.2011.01.009\">10.1016/j.scico.2011.01.009</a>","chicago":"Leuschel, Michael, and Heike Wehrheim. “Selected Papers on Integrated Formal Methods (IFM09).” <i>Science of Computer Programming</i>, no. 10 (2011): 835--836. <a href=\"https://doi.org/10.1016/j.scico.2011.01.009\">https://doi.org/10.1016/j.scico.2011.01.009</a>.","ieee":"M. Leuschel and H. Wehrheim, “Selected papers on Integrated Formal Methods (iFM09),” <i>Science of Computer Programming</i>, no. 10, pp. 835--836, 2011.","bibtex":"@article{Leuschel_Wehrheim_2011, title={Selected papers on Integrated Formal Methods (iFM09)}, DOI={<a href=\"https://doi.org/10.1016/j.scico.2011.01.009\">10.1016/j.scico.2011.01.009</a>}, number={10}, journal={Science of Computer Programming}, publisher={Elsevier}, author={Leuschel, Michael and Wehrheim, Heike}, year={2011}, pages={835--836} }","short":"M. Leuschel, H. Wehrheim, Science of Computer Programming (2011) 835--836.","mla":"Leuschel, Michael, and Heike Wehrheim. “Selected Papers on Integrated Formal Methods (IFM09).” <i>Science of Computer Programming</i>, no. 10, Elsevier, 2011, pp. 835--836, doi:<a href=\"https://doi.org/10.1016/j.scico.2011.01.009\">10.1016/j.scico.2011.01.009</a>.","apa":"Leuschel, M., &#38; Wehrheim, H. (2011). Selected papers on Integrated Formal Methods (iFM09). <i>Science of Computer Programming</i>, (10), 835--836. <a href=\"https://doi.org/10.1016/j.scico.2011.01.009\">https://doi.org/10.1016/j.scico.2011.01.009</a>"},"has_accepted_license":"1","file_date_updated":"2018-03-14T13:56:48Z","_id":"647","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Subproject B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"}],"department":[{"_id":"77"}],"user_id":"477","status":"public","type":"journal_article"},{"language":[{"iso":"eng"}],"_id":"648","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"79"}],"user_id":"477","status":"public","type":"mastersthesis","title":"Robust Distributed Computation in Dynamic Networks","date_updated":"2022-01-06T07:03:06Z","publisher":"Universität Paderborn","author":[{"full_name":"Brandes, Philipp","last_name":"Brandes","first_name":"Philipp"}],"date_created":"2017-10-17T12:42:58Z","supervisor":[{"last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792","first_name":"Christian"}],"year":"2011","citation":{"apa":"Brandes, P. (2011). <i>Robust Distributed Computation in Dynamic Networks</i>. Universität Paderborn.","mla":"Brandes, Philipp. <i>Robust Distributed Computation in Dynamic Networks</i>. Universität Paderborn, 2011.","bibtex":"@book{Brandes_2011, title={Robust Distributed Computation in Dynamic Networks}, publisher={Universität Paderborn}, author={Brandes, Philipp}, year={2011} }","short":"P. Brandes, Robust Distributed Computation in Dynamic Networks, Universität Paderborn, 2011.","ama":"Brandes P. <i>Robust Distributed Computation in Dynamic Networks</i>. Universität Paderborn; 2011.","ieee":"P. Brandes, <i>Robust Distributed Computation in Dynamic Networks</i>. Universität Paderborn, 2011.","chicago":"Brandes, Philipp. <i>Robust Distributed Computation in Dynamic Networks</i>. Universität Paderborn, 2011."}},{"user_id":"477","department":[{"_id":"77"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"_id":"649","file_date_updated":"2018-03-14T13:55:38Z","language":[{"iso":"eng"}],"ddc":["040"],"type":"journal_article","publication":"Electronic Notes in Theoretical Computer Science","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-14T13:55:38Z","date_updated":"2018-03-14T13:55:38Z","access_level":"closed","file_id":"1225","file_name":"649-ETAPS2011-Besova-Wehrheim-Wagner_01.pdf","file_size":534727}],"status":"public","abstract":[{"text":"Today, the concept of service oriented architectures provides a way of building integrated solutions out of existing services. To this end, services from different providers are composed using advanced orchestration and choreography techniques. However, while this principle allows for greater flexibility at a smaller cost, the use of third party services also includes a risk: Deployed services might not work as claimed by their providers. In this paper, we propose a technique for analyzing the expected reliability of service compositions based on ratings given by (previous) service users. Every service thereby comes with a reputation, and the analysis computes an overall reliability of a service composition from the reputations of its constituent services. The proposed model-driven approach proceeds by translating statechart models of service compositions into input for a probabilistic model checker (PRISM) using state-of-the-art model transformations techniques. The approach has been implemented as an Eclipse plug-in and is fully compliant with UML.","lang":"eng"}],"date_created":"2017-10-17T12:42:58Z","author":[{"first_name":"Galina","full_name":"Besova, Galina","last_name":"Besova"},{"first_name":"Heike","id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim"},{"first_name":"Annika","last_name":"Wagner","full_name":"Wagner, Annika"}],"date_updated":"2022-01-06T07:03:07Z","publisher":"Elsevier","doi":"10.1016/j.entcs.2011.11.008","title":"Reputation-based Reliability Prediction of Service Compositions","issue":"2","has_accepted_license":"1","citation":{"apa":"Besova, G., Wehrheim, H., &#38; Wagner, A. (2011). Reputation-based Reliability Prediction of Service Compositions. <i>Electronic Notes in Theoretical Computer Science</i>, (2), 3–16. <a href=\"https://doi.org/10.1016/j.entcs.2011.11.008\">https://doi.org/10.1016/j.entcs.2011.11.008</a>","bibtex":"@article{Besova_Wehrheim_Wagner_2011, title={Reputation-based Reliability Prediction of Service Compositions}, DOI={<a href=\"https://doi.org/10.1016/j.entcs.2011.11.008\">10.1016/j.entcs.2011.11.008</a>}, number={2}, journal={Electronic Notes in Theoretical Computer Science}, publisher={Elsevier}, author={Besova, Galina and Wehrheim, Heike and Wagner, Annika}, year={2011}, pages={3–16} }","mla":"Besova, Galina, et al. “Reputation-Based Reliability Prediction of Service Compositions.” <i>Electronic Notes in Theoretical Computer Science</i>, no. 2, Elsevier, 2011, pp. 3–16, doi:<a href=\"https://doi.org/10.1016/j.entcs.2011.11.008\">10.1016/j.entcs.2011.11.008</a>.","short":"G. Besova, H. Wehrheim, A. Wagner, Electronic Notes in Theoretical Computer Science (2011) 3–16.","ama":"Besova G, Wehrheim H, Wagner A. Reputation-based Reliability Prediction of Service Compositions. <i>Electronic Notes in Theoretical Computer Science</i>. 2011;(2):3-16. doi:<a href=\"https://doi.org/10.1016/j.entcs.2011.11.008\">10.1016/j.entcs.2011.11.008</a>","chicago":"Besova, Galina, Heike Wehrheim, and Annika Wagner. “Reputation-Based Reliability Prediction of Service Compositions.” <i>Electronic Notes in Theoretical Computer Science</i>, no. 2 (2011): 3–16. <a href=\"https://doi.org/10.1016/j.entcs.2011.11.008\">https://doi.org/10.1016/j.entcs.2011.11.008</a>.","ieee":"G. Besova, H. Wehrheim, and A. Wagner, “Reputation-based Reliability Prediction of Service Compositions,” <i>Electronic Notes in Theoretical Computer Science</i>, no. 2, pp. 3–16, 2011."},"page":"3-16","year":"2011"},{"language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"477","_id":"650","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Project Area B","_id":"3"}],"status":"public","type":"mastersthesis","title":"Reengineering of Design Deficiencies in Component-Based Software Architectures","date_created":"2017-10-17T12:42:58Z","author":[{"last_name":"Platenius","full_name":"Platenius, Marie Christin","first_name":"Marie Christin"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:08Z","citation":{"mla":"Platenius, Marie Christin. <i>Reengineering of Design Deficiencies in Component-Based Software Architectures</i>. Universität Paderborn, 2011.","bibtex":"@book{Platenius_2011, title={Reengineering of Design Deficiencies in Component-Based Software Architectures}, publisher={Universität Paderborn}, author={Platenius, Marie Christin}, year={2011} }","short":"M.C. Platenius, Reengineering of Design Deficiencies in Component-Based Software Architectures, Universität Paderborn, 2011.","apa":"Platenius, M. C. (2011). <i>Reengineering of Design Deficiencies in Component-Based Software Architectures</i>. Universität Paderborn.","ieee":"M. C. Platenius, <i>Reengineering of Design Deficiencies in Component-Based Software Architectures</i>. Universität Paderborn, 2011.","chicago":"Platenius, Marie Christin. <i>Reengineering of Design Deficiencies in Component-Based Software Architectures</i>. Universität Paderborn, 2011.","ama":"Platenius MC. <i>Reengineering of Design Deficiencies in Component-Based Software Architectures</i>. Universität Paderborn; 2011."},"year":"2011"},{"doi":"10.1109/SCC.2011.65","title":"Precise Mappings between Business Process Models in Versioning Scenarios","author":[{"first_name":"Christian","last_name":"Gerth","full_name":"Gerth, Christian"},{"first_name":"Markus","last_name":"Luckey","full_name":"Luckey, Markus"},{"first_name":"Jochen","full_name":"Küster, Jochen","last_name":"Küster"},{"first_name":"Gregor","id":"107","full_name":"Engels, Gregor","last_name":"Engels"}],"date_created":"2017-10-17T12:42:59Z","date_updated":"2022-01-06T07:03:10Z","page":"218--225","citation":{"ieee":"C. Gerth, M. Luckey, J. Küster, and G. Engels, “Precise Mappings between Business Process Models in Versioning Scenarios,” in <i>Proceedings of the IEEE 8th International Conference on Service Computingt (SCC)</i>, 2011, pp. 218--225.","chicago":"Gerth, Christian, Markus Luckey, Jochen Küster, and Gregor Engels. “Precise Mappings between Business Process Models in Versioning Scenarios.” In <i>Proceedings of the IEEE 8th International Conference on Service Computingt (SCC)</i>, 218--225, 2011. <a href=\"https://doi.org/10.1109/SCC.2011.65\">https://doi.org/10.1109/SCC.2011.65</a>.","ama":"Gerth C, Luckey M, Küster J, Engels G. Precise Mappings between Business Process Models in Versioning Scenarios. In: <i>Proceedings of the IEEE 8th International Conference on Service Computingt (SCC)</i>. ; 2011:218--225. doi:<a href=\"https://doi.org/10.1109/SCC.2011.65\">10.1109/SCC.2011.65</a>","bibtex":"@inproceedings{Gerth_Luckey_Küster_Engels_2011, title={Precise Mappings between Business Process Models in Versioning Scenarios}, DOI={<a href=\"https://doi.org/10.1109/SCC.2011.65\">10.1109/SCC.2011.65</a>}, booktitle={Proceedings of the IEEE 8th International Conference on Service Computingt (SCC)}, author={Gerth, Christian and Luckey, Markus and Küster, Jochen and Engels, Gregor}, year={2011}, pages={218--225} }","short":"C. Gerth, M. Luckey, J. Küster, G. Engels, in: Proceedings of the IEEE 8th International Conference on Service Computingt (SCC), 2011, pp. 218--225.","mla":"Gerth, Christian, et al. “Precise Mappings between Business Process Models in Versioning Scenarios.” <i>Proceedings of the IEEE 8th International Conference on Service Computingt (SCC)</i>, 2011, pp. 218--225, doi:<a href=\"https://doi.org/10.1109/SCC.2011.65\">10.1109/SCC.2011.65</a>.","apa":"Gerth, C., Luckey, M., Küster, J., &#38; Engels, G. (2011). Precise Mappings between Business Process Models in Versioning Scenarios. In <i>Proceedings of the IEEE 8th International Conference on Service Computingt (SCC)</i> (pp. 218--225). <a href=\"https://doi.org/10.1109/SCC.2011.65\">https://doi.org/10.1109/SCC.2011.65</a>"},"year":"2011","has_accepted_license":"1","file_date_updated":"2018-03-14T13:53:51Z","language":[{"iso":"eng"}],"ddc":["040"],"department":[{"_id":"66"}],"user_id":"477","_id":"652","project":[{"name":"SFB 901","_id":"1"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"_id":"3","name":"SFB 901 - Project Area B"}],"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"1223","file_name":"652-06009264.pdf","access_level":"closed","file_size":713943,"date_created":"2018-03-14T13:53:51Z","creator":"florida","date_updated":"2018-03-14T13:53:51Z"}],"abstract":[{"lang":"eng","text":"In the development process of service-oriented systems, business process models are used at different levels. Typically, high-level business process models that describe business requirements and needs are stepwise refined to the IT level by different business modelers and software architects. As a result, different process model versions must be compared and merged by means of model version control. An important prerequisite for process model version control is an elaborated matching approach that results in precise mappings between different process model versions. The challenge of such an approach is to deal with syntactically different process models that are semantically equivalent. For that purpose, matching techniques must consider the semantics of process modeling languages.In this paper, we present a matching approach for process models in a versioning scenario. Based on a term formalization of process models, we enable an efficient and effective way to match syntactically different but semantically equivalent process models resulting in precise mappings."}],"publication":"Proceedings of the IEEE 8th International Conference on Service Computingt (SCC)","type":"conference"},{"file_date_updated":"2018-03-14T13:50:18Z","language":[{"iso":"eng"}],"ddc":["040"],"user_id":"477","department":[{"_id":"79"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"_id":"2","name":"SFB 901 - Project Area A"}],"_id":"654","file":[{"file_size":327680,"file_name":"654-IEEE.P2P.11._Kalman.Graffi_PeerfactSim-A.P2P.System.Simulator_01.pdf","file_id":"1221","access_level":"closed","date_updated":"2018-03-14T13:50:18Z","date_created":"2018-03-14T13:50:18Z","creator":"florida","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","abstract":[{"lang":"eng","text":"Research on peer-to-peer (p2p) and distributed systems needs evaluation tools to predict and observe the behavior of protocols and mechanisms in large scale networks. PeerfactSim.KOM is a simulator for large scale distributed/p2p systems aiming at the evaluation of interdependencies in multi-layered p2p systems. The simulator is written in Java, is event-based and mainly used in p2p research projects. The main development of PeerfactSim.KOM started in 2005 and is driven since 2006 by the project “QuaP2P”,which aims at the systematic improvement and benchmarking of p2p systems. Further users of the simulator are working in the project “On-the-ﬂy Computing” aiming at researching p2p-based service oriented architectures. Both projects state severe requirements on the evaluation of multi-layered and large-scale distributed systems. We describe the architecture of PeerfactSim.KOM supporting these requirements in Section II, present the workﬂow, selected experiences and lessons learned in Section III and conclude the overview in Section IV."}],"type":"conference","publication":"Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP)","doi":"10.1109/P2P.2011.6038673","title":"PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned","date_created":"2017-10-17T12:42:59Z","author":[{"full_name":"Graffi, Kalman","last_name":"Graffi","first_name":"Kalman"}],"date_updated":"2022-01-06T07:03:11Z","citation":{"ama":"Graffi K. PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned. In: <i>Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP)</i>. ; 2011:154-155. doi:<a href=\"https://doi.org/10.1109/P2P.2011.6038673\">10.1109/P2P.2011.6038673</a>","chicago":"Graffi, Kalman. “PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned.” In <i>Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP)</i>, 154–55, 2011. <a href=\"https://doi.org/10.1109/P2P.2011.6038673\">https://doi.org/10.1109/P2P.2011.6038673</a>.","ieee":"K. Graffi, “PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned,” in <i>Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP)</i>, 2011, pp. 154–155.","apa":"Graffi, K. (2011). PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned. In <i>Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP)</i> (pp. 154–155). <a href=\"https://doi.org/10.1109/P2P.2011.6038673\">https://doi.org/10.1109/P2P.2011.6038673</a>","bibtex":"@inproceedings{Graffi_2011, title={PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned}, DOI={<a href=\"https://doi.org/10.1109/P2P.2011.6038673\">10.1109/P2P.2011.6038673</a>}, booktitle={Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP)}, author={Graffi, Kalman}, year={2011}, pages={154–155} }","mla":"Graffi, Kalman. “PeerfactSim.KOM: A PSP System Simulator - Experiences and Lessons Learned.” <i>Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP)</i>, 2011, pp. 154–55, doi:<a href=\"https://doi.org/10.1109/P2P.2011.6038673\">10.1109/P2P.2011.6038673</a>.","short":"K. Graffi, in: Proceedings of the IEEE International Conference on Peer-to-Peer Computing (IEEE PsP), 2011, pp. 154–155."},"page":"154-155","year":"2011","has_accepted_license":"1"},{"publication":"Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS)","type":"conference","abstract":[{"lang":"eng","text":"We present two distributed, constant factor approximation algorithms for the metric facility location problem. Both algorithms have been designed with a strong emphasis on applicability in the area of wireless sensor networks: in order to execute them, each sensor node only requires limited local knowledge and simple computations. Also, the algorithms can cope with measurement errors and take into account that communication costs between sensor nodes do not necessarily increase linearly with the distance, but can be represented by a polynomial. Since it cannot always be expected that sensor nodes execute algorithms in a synchronized way, our algorithms are executed in an asynchronous model (but they are still able to break symmetry that might occur when two neighboring nodes act at exactly the same time). Furthermore, they can deal with dynamic scenarios: if a node moves, the solution is updated and the update affects only nodes in the local neighborhood. Finally, the algorithms are robust in the sense that incorrect behavior of some nodes during some round will, in the end, still result in a good approximation. The first algorithm runs in expected O(log_{1+\\epsilon} n) communication rounds and yields a \\my^4(1+4\\my^2(1+\\epsilon)^{1/p})^p approximation, while the second has a running time of expected O(log^2_{1+\\epsilon} n) communication rounds and an approximation factor of \\my^4(1 + 2(1 + \\epsilon)^{1/p})^p. Here, \\epsilon > 0 is an arbitrarily small constant, p the exponent of the polynomial representing the communication costs, and \\my the relative measurement error."}],"status":"public","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"creator":"florida","date_created":"2018-03-14T13:48:21Z","date_updated":"2018-03-14T13:48:21Z","file_name":"657-flp_algosensors2011-Cord-Landwehr.pdf","file_id":"1219","access_level":"closed","file_size":454740}],"_id":"657","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"department":[{"_id":"63"}],"series_title":"LNCS","user_id":"477","ddc":["040"],"language":[{"iso":"eng"}],"file_date_updated":"2018-03-14T13:48:21Z","has_accepted_license":"1","year":"2011","page":"13-27","citation":{"short":"S. Abshoff, A. Cord-Landwehr, B. Degener, B. Kempkes, P. Pietrzyk, in: Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS), 2011, pp. 13–27.","bibtex":"@inproceedings{Abshoff_Cord-Landwehr_Degener_Kempkes_Pietrzyk_2011, series={LNCS}, title={Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-28209-6_3\">10.1007/978-3-642-28209-6_3</a>}, booktitle={Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS)}, author={Abshoff, Sebastan and Cord-Landwehr, Andreas and Degener, Bastian and Kempkes, Barbara  and Pietrzyk, Peter}, year={2011}, pages={13–27}, collection={LNCS} }","mla":"Abshoff, Sebastan, et al. “Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks.” <i>Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS)</i>, 2011, pp. 13–27, doi:<a href=\"https://doi.org/10.1007/978-3-642-28209-6_3\">10.1007/978-3-642-28209-6_3</a>.","apa":"Abshoff, S., Cord-Landwehr, A., Degener, B., Kempkes, B., &#38; Pietrzyk, P. (2011). Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks. In <i>Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS)</i> (pp. 13–27). <a href=\"https://doi.org/10.1007/978-3-642-28209-6_3\">https://doi.org/10.1007/978-3-642-28209-6_3</a>","ama":"Abshoff S, Cord-Landwehr A, Degener B, Kempkes B, Pietrzyk P. Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks. In: <i>Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS)</i>. LNCS. ; 2011:13-27. doi:<a href=\"https://doi.org/10.1007/978-3-642-28209-6_3\">10.1007/978-3-642-28209-6_3</a>","ieee":"S. Abshoff, A. Cord-Landwehr, B. Degener, B. Kempkes, and P. Pietrzyk, “Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks,” in <i>Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS)</i>, 2011, pp. 13–27.","chicago":"Abshoff, Sebastan, Andreas Cord-Landwehr, Bastian Degener, Barbara  Kempkes, and Peter Pietrzyk. “Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks.” In <i>Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS)</i>, 13–27. LNCS, 2011. <a href=\"https://doi.org/10.1007/978-3-642-28209-6_3\">https://doi.org/10.1007/978-3-642-28209-6_3</a>."},"date_updated":"2022-01-06T07:03:12Z","author":[{"first_name":"Sebastan","last_name":"Abshoff","full_name":"Abshoff, Sebastan"},{"full_name":"Cord-Landwehr, Andreas","last_name":"Cord-Landwehr","first_name":"Andreas"},{"first_name":"Bastian","full_name":"Degener, Bastian","last_name":"Degener"},{"last_name":"Kempkes","full_name":"Kempkes, Barbara ","first_name":"Barbara "},{"last_name":"Pietrzyk","full_name":"Pietrzyk, Peter","first_name":"Peter"}],"date_created":"2017-10-17T12:43:00Z","title":"Local Approximation Algorithms for the Uncapacitated Metric Facility Location Problem in Power-Aware Sensor Networks","doi":"10.1007/978-3-642-28209-6_3"},{"citation":{"ieee":"A. Schremmer, <i>Function Specification Inference Using Craig Interpolation</i>. Universität Paderborn, 2011.","chicago":"Schremmer, Alexander. <i>Function Specification Inference Using Craig Interpolation</i>. Universität Paderborn, 2011.","ama":"Schremmer A. <i>Function Specification Inference Using Craig Interpolation</i>. Universität Paderborn; 2011.","mla":"Schremmer, Alexander. <i>Function Specification Inference Using Craig Interpolation</i>. Universität Paderborn, 2011.","short":"A. Schremmer, Function Specification Inference Using Craig Interpolation, Universität Paderborn, 2011.","bibtex":"@book{Schremmer_2011, title={Function Specification Inference Using Craig Interpolation}, publisher={Universität Paderborn}, author={Schremmer, Alexander}, year={2011} }","apa":"Schremmer, A. (2011). <i>Function Specification Inference Using Craig Interpolation</i>. Universität Paderborn."},"year":"2011","title":"Function Specification Inference Using Craig Interpolation","author":[{"last_name":"Schremmer","full_name":"Schremmer, Alexander","first_name":"Alexander"}],"supervisor":[{"full_name":"Wehrheim, Heike","id":"573","last_name":"Wehrheim","first_name":"Heike"}],"date_created":"2017-10-17T12:43:00Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:12Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"77"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"658"},{"user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"659","file_date_updated":"2018-03-14T13:47:44Z","ddc":["040"],"type":"mastersthesis","file":[{"file_id":"1218","access_level":"closed","file_name":"659-MA_Fault_attacks_in_pairing-based_cryptography_01.pdf","file_size":1795920,"creator":"florida","date_created":"2018-03-14T13:47:44Z","date_updated":"2018-03-14T13:47:44Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","author":[{"last_name":"Liske","full_name":"Liske, Gennadij","first_name":"Gennadij"}],"date_created":"2017-10-17T12:43:00Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_updated":"2022-01-06T07:03:13Z","publisher":"Universität Paderborn","title":"Fault attacks in pairing-based cryptography","has_accepted_license":"1","citation":{"chicago":"Liske, Gennadij. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität Paderborn, 2011.","ieee":"G. Liske, <i>Fault attacks in pairing-based cryptography</i>. Universität Paderborn, 2011.","ama":"Liske G. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität Paderborn; 2011.","mla":"Liske, Gennadij. <i>Fault Attacks in Pairing-Based Cryptography</i>. Universität Paderborn, 2011.","bibtex":"@book{Liske_2011, title={Fault attacks in pairing-based cryptography}, publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2011} }","short":"G. Liske, Fault Attacks in Pairing-Based Cryptography, Universität Paderborn, 2011.","apa":"Liske, G. (2011). <i>Fault attacks in pairing-based cryptography</i>. Universität Paderborn."},"year":"2011"},{"year":"2011","citation":{"bibtex":"@book{Peuster_2011, title={Defining and Deploying Complex Applicances in Multi-Site Cloud Environments}, publisher={Universität Paderborn}, author={Peuster, Manuel}, year={2011} }","short":"M. Peuster, Defining and Deploying Complex Applicances in Multi-Site Cloud Environments, Universität Paderborn, 2011.","mla":"Peuster, Manuel. <i>Defining and Deploying Complex Applicances in Multi-Site Cloud Environments</i>. Universität Paderborn, 2011.","apa":"Peuster, M. (2011). <i>Defining and Deploying Complex Applicances in Multi-Site Cloud Environments</i>. Universität Paderborn.","ama":"Peuster M. <i>Defining and Deploying Complex Applicances in Multi-Site Cloud Environments</i>. Universität Paderborn; 2011.","ieee":"M. Peuster, <i>Defining and Deploying Complex Applicances in Multi-Site Cloud Environments</i>. Universität Paderborn, 2011.","chicago":"Peuster, Manuel. <i>Defining and Deploying Complex Applicances in Multi-Site Cloud Environments</i>. Universität Paderborn, 2011."},"date_updated":"2022-01-06T07:03:13Z","publisher":"Universität Paderborn","author":[{"id":"13271","full_name":"Peuster, Manuel","last_name":"Peuster","first_name":"Manuel"}],"date_created":"2017-10-17T12:43:00Z","title":"Defining and Deploying Complex Applicances in Multi-Site Cloud Environments","type":"bachelorsthesis","status":"public","_id":"660","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A2","_id":"6"},{"_id":"2","name":"SFB 901 - Project Area A"}],"department":[{"_id":"75"}],"user_id":"15504"},{"year":"2011","citation":{"apa":"Arifulina, S. (2011). <i>Coverage Criteria for Testing DMM Specifications</i>. Universität Paderborn.","mla":"Arifulina, Svetlana. <i>Coverage Criteria for Testing DMM Specifications</i>. Universität Paderborn, 2011.","bibtex":"@book{Arifulina_2011, title={Coverage Criteria for Testing DMM Specifications}, publisher={Universität Paderborn}, author={Arifulina, Svetlana}, year={2011} }","short":"S. Arifulina, Coverage Criteria for Testing DMM Specifications, Universität Paderborn, 2011.","ama":"Arifulina S. <i>Coverage Criteria for Testing DMM Specifications</i>. Universität Paderborn; 2011.","ieee":"S. Arifulina, <i>Coverage Criteria for Testing DMM Specifications</i>. Universität Paderborn, 2011.","chicago":"Arifulina, Svetlana. <i>Coverage Criteria for Testing DMM Specifications</i>. Universität Paderborn, 2011."},"title":"Coverage Criteria for Testing DMM Specifications","date_updated":"2022-01-06T07:03:13Z","publisher":"Universität Paderborn","supervisor":[{"first_name":"Gregor","id":"107","full_name":"Engels, Gregor","last_name":"Engels"}],"author":[{"first_name":"Svetlana","full_name":"Arifulina, Svetlana","last_name":"Arifulina"}],"date_created":"2017-10-17T12:43:00Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"661","project":[{"name":"SFB 901","_id":"1"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"66"}],"user_id":"477"},{"has_accepted_license":"1","year":"2011","citation":{"mla":"Nesterenko, Mikhail, et al. “Corona: A Stabilizing Deterministic Message-Passing Skip List.” <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, 2011, pp. 356--370, doi:<a href=\"https://doi.org/10.1007/978-3-642-24550-3_27\">10.1007/978-3-642-24550-3_27</a>.","bibtex":"@inproceedings{Nesterenko_Mohd_Scheideler_2011, series={LNCS}, title={Corona: A Stabilizing Deterministic Message-Passing Skip List}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-24550-3_27\">10.1007/978-3-642-24550-3_27</a>}, booktitle={Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)}, author={Nesterenko, Mikhail and Mohd, Rizal and Scheideler, Christian}, year={2011}, pages={356--370}, collection={LNCS} }","short":"M. Nesterenko, R. Mohd, C. Scheideler, in: Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp. 356--370.","apa":"Nesterenko, M., Mohd, R., &#38; Scheideler, C. (2011). Corona: A Stabilizing Deterministic Message-Passing Skip List. In <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i> (pp. 356--370). <a href=\"https://doi.org/10.1007/978-3-642-24550-3_27\">https://doi.org/10.1007/978-3-642-24550-3_27</a>","chicago":"Nesterenko, Mikhail, Rizal Mohd, and Christian Scheideler. “Corona: A Stabilizing Deterministic Message-Passing Skip List.” In <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, 356--370. LNCS, 2011. <a href=\"https://doi.org/10.1007/978-3-642-24550-3_27\">https://doi.org/10.1007/978-3-642-24550-3_27</a>.","ieee":"M. Nesterenko, R. Mohd, and C. Scheideler, “Corona: A Stabilizing Deterministic Message-Passing Skip List,” in <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>, 2011, pp. 356--370.","ama":"Nesterenko M, Mohd R, Scheideler C. Corona: A Stabilizing Deterministic Message-Passing Skip List. In: <i>Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)</i>. LNCS. ; 2011:356--370. doi:<a href=\"https://doi.org/10.1007/978-3-642-24550-3_27\">10.1007/978-3-642-24550-3_27</a>"},"page":"356--370","date_updated":"2022-01-06T07:03:13Z","author":[{"last_name":"Nesterenko","full_name":"Nesterenko, Mikhail","first_name":"Mikhail"},{"first_name":"Rizal","last_name":"Mohd","full_name":"Mohd, Rizal"},{"id":"20792","full_name":"Scheideler, Christian","last_name":"Scheideler","first_name":"Christian"}],"date_created":"2017-10-17T12:43:01Z","title":"Corona: A Stabilizing Deterministic Message-Passing Skip List","doi":"10.1007/978-3-642-24550-3_27","type":"conference","publication":"Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)","abstract":[{"text":"We present Corona, a deterministic self-stabilizing algorithm for skip list construction in structured overlay networks. Corona operates in the low-atomicity message-passing asynchronous system model. Corona requires constant process memory space for its operation and, therefore, scales well. We prove the general necessary conditions limiting the initial states from which a self-stabilizing structured overlay network in message-passing system can be constructed. The conditions require that initial state information has to form a weakly connected graph and it should only contain identiers that are present in the system. We formally describe Corona and rigorously prove that it stabilizes from an arbitrary initial state subject to the necessary conditions. We extend Corona to construct a skip graph.","lang":"eng"}],"file":[{"date_updated":"2018-03-14T13:46:48Z","date_created":"2018-03-14T13:46:48Z","creator":"florida","file_size":305543,"file_id":"1217","access_level":"closed","file_name":"662-SSS2011-Corona-Scheideler.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"662","user_id":"15504","series_title":"LNCS","department":[{"_id":"79"}],"ddc":["040"],"file_date_updated":"2018-03-14T13:46:48Z"},{"language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"63"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt A1","_id":"5"},{"name":"SFB 901 - Project Area A","_id":"2"}],"_id":"663","status":"public","type":"mastersthesis","title":"Complexity Classes for Local Computation","supervisor":[{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"author":[{"full_name":"Swierkot, Kamil","last_name":"Swierkot","first_name":"Kamil"}],"date_created":"2017-10-17T12:43:01Z","date_updated":"2022-01-06T07:03:13Z","publisher":"Universität Paderborn","citation":{"apa":"Swierkot, K. (2011). <i>Complexity Classes for Local Computation</i>. Universität Paderborn.","short":"K. Swierkot, Complexity Classes for Local Computation, Universität Paderborn, 2011.","bibtex":"@book{Swierkot_2011, title={Complexity Classes for Local Computation}, publisher={Universität Paderborn}, author={Swierkot, Kamil}, year={2011} }","mla":"Swierkot, Kamil. <i>Complexity Classes for Local Computation</i>. Universität Paderborn, 2011.","ieee":"K. Swierkot, <i>Complexity Classes for Local Computation</i>. Universität Paderborn, 2011.","chicago":"Swierkot, Kamil. <i>Complexity Classes for Local Computation</i>. Universität Paderborn, 2011.","ama":"Swierkot K. <i>Complexity Classes for Local Computation</i>. Universität Paderborn; 2011."},"year":"2011"},{"year":"2011","page":"31--40","citation":{"ieee":"J. Gehweiler, P. Kling, and F. Meyer auf der Heide, “An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment,” in <i>Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 2011, pp. 31--40.","chicago":"Gehweiler, Joachim, Peter Kling, and Friedhelm Meyer auf der Heide. “An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment.” In <i>Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 31--40. LNCS, 2011. <a href=\"https://doi.org/10.1007/978-3-642-31500-8_4\">https://doi.org/10.1007/978-3-642-31500-8_4</a>.","ama":"Gehweiler J, Kling P, Meyer auf der Heide F. An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment. In: <i>Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>. LNCS. ; 2011:31--40. doi:<a href=\"https://doi.org/10.1007/978-3-642-31500-8_4\">10.1007/978-3-642-31500-8_4</a>","bibtex":"@inproceedings{Gehweiler_Kling_Meyer auf der Heide_2011, series={LNCS}, title={An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-31500-8_4\">10.1007/978-3-642-31500-8_4</a>}, booktitle={Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM)}, author={Gehweiler, Joachim and Kling, Peter and Meyer auf der Heide, Friedhelm}, year={2011}, pages={31--40}, collection={LNCS} }","short":"J. Gehweiler, P. Kling, F. Meyer auf der Heide, in: Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM), 2011, pp. 31--40.","mla":"Gehweiler, Joachim, et al. “An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment.” <i>Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i>, 2011, pp. 31--40, doi:<a href=\"https://doi.org/10.1007/978-3-642-31500-8_4\">10.1007/978-3-642-31500-8_4</a>.","apa":"Gehweiler, J., Kling, P., &#38; Meyer auf der Heide, F. (2011). An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment. In <i>Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM)</i> (pp. 31--40). <a href=\"https://doi.org/10.1007/978-3-642-31500-8_4\">https://doi.org/10.1007/978-3-642-31500-8_4</a>"},"has_accepted_license":"1","title":"An Experimental Comparison of Load Balancing Strategies in a Web Computing Environment","doi":"10.1007/978-3-642-31500-8_4","date_updated":"2022-01-06T07:03:14Z","author":[{"first_name":"Joachim","full_name":"Gehweiler, Joachim","last_name":"Gehweiler"},{"last_name":"Kling","full_name":"Kling, Peter","first_name":"Peter"},{"id":"15523","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide","first_name":"Friedhelm"}],"date_created":"2017-10-17T12:43:01Z","abstract":[{"lang":"eng","text":"Web Computing is a variant of parallel computing where the idle times of PCs donated by worldwide distributed users are employed to execute parallel programs. The PUB-Web library developed by us supports this kind of usage of computing resources. A major problem for the efficient execution of such parallel programs is load balancing. In the Web Computing context, this problem becomes more difficult because of the dynamic behavior of the underlying \"parallel computer\": the set of available processors (donated PCs) as well as their availability (idle times) change over time in an unpredictable fashion.In this paper, we experimentally evaluate and compare load balancing algorithms in this scenario, namely a variant of the well-established Work Stealing algorithm and strategies based on a heterogeneous version of distributed hash-tables (DHHTs) introduced recently. In order to run a meaningful experimental evaluation, we employ, in addition to our Web Computing library PUB-Web, realistic data sets for the job input streams and for the dynamics of the availability of the resources.Our experimental evaluations suggest that Work Stealing is the better strategy if the number of processes ready to run matches the number of available processors. But a suitable variant of DHHTs outperforms Work Stealing if there are significantly more processes ready to run than available processors."}],"status":"public","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-14T13:45:57Z","creator":"florida","date_created":"2018-03-14T13:45:57Z","file_size":333335,"access_level":"closed","file_name":"664-PPAM11GKM_01.pdf","file_id":"1216"}],"publication":"Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics (PPAM)","type":"conference","ddc":["040"],"file_date_updated":"2018-03-14T13:45:57Z","_id":"664","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C4","_id":"16"},{"_id":"14","name":"SFB 901 - Subproject C2"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"63"}],"series_title":"LNCS","user_id":"15504"},{"language":[{"iso":"ger"}],"department":[{"_id":"79"}],"user_id":"477","_id":"665","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"_id":"2","name":"SFB 901 - Project Area A"}],"status":"public","type":"mastersthesis","title":"Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord","date_created":"2017-10-17T12:43:01Z","supervisor":[{"last_name":"Scheideler","full_name":"Scheideler, Christian","id":"20792","first_name":"Christian"}],"author":[{"last_name":"Wette","full_name":"Wette, Philip","first_name":"Philip"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:03:14Z","citation":{"apa":"Wette, P. (2011). <i>Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord</i>. Universität Paderborn.","mla":"Wette, Philip. <i>Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord</i>. Universität Paderborn, 2011.","bibtex":"@book{Wette_2011, title={Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord}, publisher={Universität Paderborn}, author={Wette, Philip}, year={2011} }","short":"P. Wette, Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord, Universität Paderborn, 2011.","chicago":"Wette, Philip. <i>Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord</i>. Universität Paderborn, 2011.","ieee":"P. Wette, <i>Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord</i>. Universität Paderborn, 2011.","ama":"Wette P. <i>Adaptives Loadbalancing für strukturierte Peer-to-Peer-Netzwerke am Beispiel von Chord</i>. Universität Paderborn; 2011."},"year":"2011"},{"year":"2011","citation":{"apa":"Drzevitzky, S., &#38; Platzner, M. (2011). Achieving Hardware Security for Reconﬁgurable Systems on Chip by a Proof-Carrying Code Approach. In <i>Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)</i> (pp. 58–65). <a href=\"https://doi.org/10.1109/ReCoSoC.2011.5981499\">https://doi.org/10.1109/ReCoSoC.2011.5981499</a>","short":"S. Drzevitzky, M. Platzner, in: Proceedings of the 6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC), 2011, pp. 58–65.","bibtex":"@inproceedings{Drzevitzky_Platzner_2011, title={Achieving Hardware Security for Reconﬁgurable Systems on Chip by a Proof-Carrying Code Approach}, DOI={<a href=\"https://doi.org/10.1109/ReCoSoC.2011.5981499\">10.1109/ReCoSoC.2011.5981499</a>}, booktitle={Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)}, author={Drzevitzky, Stephanie and Platzner, Marco}, year={2011}, pages={58–65} }","mla":"Drzevitzky, Stephanie, and Marco Platzner. “Achieving Hardware Security for Reconﬁgurable Systems on Chip by a Proof-Carrying Code Approach.” <i>Proceedings of the 6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)</i>, 2011, pp. 58–65, doi:<a href=\"https://doi.org/10.1109/ReCoSoC.2011.5981499\">10.1109/ReCoSoC.2011.5981499</a>.","ama":"Drzevitzky S, Platzner M. Achieving Hardware Security for Reconﬁgurable Systems on Chip by a Proof-Carrying Code Approach. In: <i>Proceedings of the 6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)</i>. ; 2011:58-65. doi:<a href=\"https://doi.org/10.1109/ReCoSoC.2011.5981499\">10.1109/ReCoSoC.2011.5981499</a>","ieee":"S. Drzevitzky and M. Platzner, “Achieving Hardware Security for Reconﬁgurable Systems on Chip by a Proof-Carrying Code Approach,” in <i>Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)</i>, 2011, pp. 58–65.","chicago":"Drzevitzky, Stephanie, and Marco Platzner. “Achieving Hardware Security for Reconﬁgurable Systems on Chip by a Proof-Carrying Code Approach.” In <i>Proceedings of the 6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)</i>, 58–65, 2011. <a href=\"https://doi.org/10.1109/ReCoSoC.2011.5981499\">https://doi.org/10.1109/ReCoSoC.2011.5981499</a>."},"page":"58-65","has_accepted_license":"1","title":"Achieving Hardware Security for Reconﬁgurable Systems on Chip by a Proof-Carrying Code Approach","doi":"10.1109/ReCoSoC.2011.5981499","date_updated":"2022-01-06T07:03:14Z","date_created":"2017-10-17T12:43:01Z","author":[{"first_name":"Stephanie","last_name":"Drzevitzky","full_name":"Drzevitzky, Stephanie"},{"first_name":"Marco","last_name":"Platzner","full_name":"Platzner, Marco","id":"398"}],"abstract":[{"lang":"eng","text":"Reconﬁgurable systems on chip are increasingly deployed in security and safety critical contexts. When downloading and conﬁguring new hardware functions, we want to make sure that modules adhere to certain security speciﬁcations and do not, for example, contain hardware Trojans. As a possible approach to achieving hardware security we propose and demonstrate the concept of proof-carrying hardware, a concept inspired by previous work on proof-carrying code techniques in the software domain. In this paper, we discuss the hardware trust and threat models behind proof-carrying hardware and then present our experimental setup. We detail the employed open-source tool chain for the runtime veriﬁcation of combinational equivalence and our bitstream format for an abstract FPGA architecture that allows us to experimentally validate the feasibility of our approach."}],"file":[{"date_updated":"2018-03-14T13:40:48Z","creator":"florida","date_created":"2018-03-14T13:40:48Z","file_size":666039,"file_id":"1214","access_level":"closed","file_name":"666-drzevitzky11_recosoc.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","type":"conference","publication":"Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)","ddc":["040"],"file_date_updated":"2018-03-14T13:40:48Z","language":[{"iso":"eng"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"666","user_id":"477","department":[{"_id":"78"}]}]
