---
_id: '20452'
abstract:
- lang: eng
  text: "In this paper, we present a novel approach to design teaching interventions
    for computing education, elaborated using an example of cybersecurity education.
    Cybersecurity education, similar to other computing education domains, often focuses
    on one aspect and separate themselves from the other approach. In other words,
    they focus on one of the two different aspects: a) either teaching how to use
    and to behave, or b) how technology works. Here we suggest another point of focal
    awareness for teaching – interaction – that allows the recombination of both approaches
    in a novel way, leading to a reconstruction of the teaching and learning content
    in a way that – as we hope – supports an understanding on a higher level and thus
    gives the chance to better develop agency. For this didactic reconstruction of
    teaching content, we use an approach called the hybrid interaction system framework.\r\nIn
    cybersecurity training, teaching interventions oftentimes are in a way successful
    but seem to not lead to long-lasting changes towards secure behavior. Using simply
    password security as an example, we show how this new approach recombines the
    two different priory mentioned teaching approaches in a novel way.\r\nWithin this
    short paper, we present our current research progress, discuss potentials and
    values of the approach in general, and by way of example. Our intention of this
    submission and early disclosure is to spark discussion and generate further insights
    especially regarding the following question: What implications does the hybrid
    interaction system approach have on learning scenarios?"
author:
- first_name: Lutz
  full_name: Terfloth, Lutz
  id: '37320'
  last_name: Terfloth
- first_name: Lea
  full_name: Budde, Lea
  id: '32443'
  last_name: Budde
- first_name: Carsten
  full_name: Schulte, Carsten
  id: '60311'
  last_name: Schulte
citation:
  ama: 'Terfloth L, Budde L, Schulte C. Combining Ideas and Artifacts: An Interaction-Focused
    View on Computing Education Using a Cybersecurity Example. In: New York, NY, USA:
    Association for Computing Machinery; 2020. doi:<a href="https://doi.org/10.1145/3428029.3428052">10.1145/3428029.3428052</a>'
  apa: 'Terfloth, L., Budde, L., &#38; Schulte, C. (2020). Combining Ideas and Artifacts:
    An Interaction-Focused View on Computing Education Using a Cybersecurity Example.
    New York, NY, USA: Association for Computing Machinery. <a href="https://doi.org/10.1145/3428029.3428052">https://doi.org/10.1145/3428029.3428052</a>'
  bibtex: '@inproceedings{Terfloth_Budde_Schulte_2020, place={New York, NY, USA},
    title={Combining Ideas and Artifacts: An Interaction-Focused View on Computing
    Education Using a Cybersecurity Example}, DOI={<a href="https://doi.org/10.1145/3428029.3428052">10.1145/3428029.3428052</a>},
    publisher={Association for Computing Machinery}, author={Terfloth, Lutz and Budde,
    Lea and Schulte, Carsten}, year={2020} }'
  chicago: 'Terfloth, Lutz, Lea Budde, and Carsten Schulte. “Combining Ideas and Artifacts:
    An Interaction-Focused View on Computing Education Using a Cybersecurity Example.”
    New York, NY, USA: Association for Computing Machinery, 2020. <a href="https://doi.org/10.1145/3428029.3428052">https://doi.org/10.1145/3428029.3428052</a>.'
  ieee: 'L. Terfloth, L. Budde, and C. Schulte, “Combining Ideas and Artifacts: An
    Interaction-Focused View on Computing Education Using a Cybersecurity Example,”
    2020.'
  mla: 'Terfloth, Lutz, et al. <i>Combining Ideas and Artifacts: An Interaction-Focused
    View on Computing Education Using a Cybersecurity Example</i>. Association for
    Computing Machinery, 2020, doi:<a href="https://doi.org/10.1145/3428029.3428052">10.1145/3428029.3428052</a>.'
  short: 'L. Terfloth, L. Budde, C. Schulte, in: Association for Computing Machinery,
    New York, NY, USA, 2020.'
date_created: 2020-11-23T09:48:15Z
date_updated: 2022-01-06T06:54:27Z
department:
- _id: '67'
doi: 10.1145/3428029.3428052
language:
- iso: eng
place: New York, NY, USA
publication_identifier:
  isbn:
  - '9781450389211'
publisher: Association for Computing Machinery
status: public
title: 'Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education
  Using a Cybersecurity Example'
type: conference
user_id: '21145'
year: '2020'
...
---
_id: '20495'
author:
- first_name: Moritz
  full_name: Jochmaring, Moritz
  last_name: Jochmaring
citation:
  ama: Jochmaring M. <i>A Self Stabilizing Protocol for Well-Formed Trees in Hybrid
    Networks</i>.; 2020.
  apa: Jochmaring, M. (2020). <i>A self stabilizing protocol for well-formed trees
    in hybrid networks</i>.
  bibtex: '@book{Jochmaring_2020, title={A self stabilizing protocol for well-formed
    trees in hybrid networks}, author={Jochmaring, Moritz}, year={2020} }'
  chicago: Jochmaring, Moritz. <i>A Self Stabilizing Protocol for Well-Formed Trees
    in Hybrid Networks</i>, 2020.
  ieee: M. Jochmaring, <i>A self stabilizing protocol for well-formed trees in hybrid
    networks</i>. 2020.
  mla: Jochmaring, Moritz. <i>A Self Stabilizing Protocol for Well-Formed Trees in
    Hybrid Networks</i>. 2020.
  short: M. Jochmaring, A Self Stabilizing Protocol for Well-Formed Trees in Hybrid
    Networks, 2020.
date_created: 2020-11-25T07:03:16Z
date_updated: 2022-01-06T06:54:27Z
department:
- _id: '79'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '2'
  name: SFB 901 - Project Area A
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: A self stabilizing protocol for well-formed trees in hybrid networks
type: mastersthesis
user_id: '15504'
year: '2020'
...
---
_id: '20507'
author:
- first_name: Johannes
  full_name: Geismann, Johannes
  id: '20063'
  last_name: Geismann
  orcid: https://orcid.org/0000-0003-2015-2047
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Geismann J, Bodden E. A systematic literature review of model-driven security
    engineering for cyber–physical systems. <i>Journal of Systems and Software</i>.
    2020;169:110697. doi:<a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>
  apa: Geismann, J., &#38; Bodden, E. (2020). A systematic literature review of model-driven
    security engineering for cyber–physical systems. <i>Journal of Systems and Software</i>,
    <i>169</i>, 110697. <a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>
  bibtex: '@article{Geismann_Bodden_2020, title={A systematic literature review of
    model-driven security engineering for cyber–physical systems}, volume={169}, DOI={<a
    href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>},
    journal={Journal of Systems and Software}, author={Geismann, Johannes and Bodden,
    Eric}, year={2020}, pages={110697} }'
  chicago: 'Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of
    Model-Driven Security Engineering for Cyber–Physical Systems.” <i>Journal of Systems
    and Software</i> 169 (2020): 110697. <a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>.'
  ieee: 'J. Geismann and E. Bodden, “A systematic literature review of model-driven
    security engineering for cyber–physical systems,” <i>Journal of Systems and Software</i>,
    vol. 169, p. 110697, 2020, doi: <a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>.'
  mla: Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of Model-Driven
    Security Engineering for Cyber–Physical Systems.” <i>Journal of Systems and Software</i>,
    vol. 169, 2020, p. 110697, doi:<a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>.
  short: J. Geismann, E. Bodden, Journal of Systems and Software 169 (2020) 110697.
date_created: 2020-11-26T08:32:56Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: https://doi.org/10.1016/j.jss.2020.110697
intvolume: '       169'
language:
- iso: eng
page: '110697'
publication: Journal of Systems and Software
publication_identifier:
  issn:
  - 0164-1212
status: public
title: A systematic literature review of model-driven security engineering for cyber–physical
  systems
type: journal_article
user_id: '5786'
volume: 169
year: '2020'
...
---
_id: '20509'
author:
- first_name: Andreas
  full_name: Fischer, Andreas
  last_name: Fischer
- first_name: Jonas
  full_name: Janneck, Jonas
  last_name: Janneck
- first_name: Jörn
  full_name: Kussmaul, Jörn
  last_name: Kussmaul
- first_name: Nikolas
  full_name: Krätzschmar, Nikolas
  last_name: Krätzschmar
- first_name: Florian
  full_name: Kerschbaum, Florian
  last_name: Kerschbaum
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Fischer A, Janneck J, Kussmaul J, Krätzschmar N, Kerschbaum F, Bodden E. PASAPTO:
    Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted
    Data with Restricted Leakage. In: <i>2020 IEEE Computer Security Foundations Symposium
    (CSF)</i>. ; 2020.'
  apa: 'Fischer, A., Janneck, J., Kussmaul, J., Krätzschmar, N., Kerschbaum, F., &#38;
    Bodden, E. (2020). PASAPTO: Policy-aware Security and Performance Trade-off Analysis
    - Computation on Encrypted Data with Restricted Leakage. <i>2020 IEEE Computer
    Security Foundations Symposium (CSF)</i>.'
  bibtex: '@inproceedings{Fischer_Janneck_Kussmaul_Krätzschmar_Kerschbaum_Bodden_2020,
    title={PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
    on Encrypted Data with Restricted Leakage}, booktitle={2020 IEEE Computer Security
    Foundations Symposium (CSF)}, author={Fischer, Andreas and Janneck, Jonas and
    Kussmaul, Jörn and Krätzschmar, Nikolas and Kerschbaum, Florian and Bodden, Eric},
    year={2020} }'
  chicago: 'Fischer, Andreas, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian
    Kerschbaum, and Eric Bodden. “PASAPTO: Policy-Aware Security and Performance Trade-off
    Analysis - Computation on Encrypted Data with Restricted Leakage.” In <i>2020
    IEEE Computer Security Foundations Symposium (CSF)</i>, 2020.'
  ieee: 'A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, and E.
    Bodden, “PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
    on Encrypted Data with Restricted Leakage,” 2020.'
  mla: 'Fischer, Andreas, et al. “PASAPTO: Policy-Aware Security and Performance Trade-off
    Analysis - Computation on Encrypted Data with Restricted Leakage.” <i>2020 IEEE
    Computer Security Foundations Symposium (CSF)</i>, 2020.'
  short: 'A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, E. Bodden,
    in: 2020 IEEE Computer Security Foundations Symposium (CSF), 2020.'
date_created: 2020-11-26T08:40:08Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fjk+20pasapto.pdf
publication: 2020 IEEE Computer Security Foundations Symposium (CSF)
status: public
title: 'PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
  on Encrypted Data with Restricted Leakage'
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20511'
author:
- first_name: Andreas
  full_name: Fischer, Andreas
  last_name: Fischer
- first_name: Benny
  full_name: Fuhry, Benny
  last_name: Fuhry
- first_name: Florian
  full_name: Kerschbaum, Florian
  last_name: Kerschbaum
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data
    using Dataflow Authentication. In: <i>Privacy Enhancing Technologies Symposium
    (PETS/PoPETS)</i>. ; 2020.'
  apa: Fischer, A., Fuhry, B., Kerschbaum, F., &#38; Bodden, E. (2020). Computation
    on Encrypted Data using Dataflow Authentication. <i>Privacy Enhancing Technologies
    Symposium (PETS/PoPETS)</i>.
  bibtex: '@inproceedings{Fischer_Fuhry_Kerschbaum_Bodden_2020, title={Computation
    on Encrypted Data using Dataflow Authentication}, booktitle={Privacy Enhancing
    Technologies Symposium (PETS/PoPETS)}, author={Fischer, Andreas and Fuhry, Benny
    and Kerschbaum, Florian and Bodden, Eric}, year={2020} }'
  chicago: Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation
    on Encrypted Data Using Dataflow Authentication.” In <i>Privacy Enhancing Technologies
    Symposium (PETS/PoPETS)</i>, 2020.
  ieee: A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted
    Data using Dataflow Authentication,” 2020.
  mla: Fischer, Andreas, et al. “Computation on Encrypted Data Using Dataflow Authentication.”
    <i>Privacy Enhancing Technologies Symposium (PETS/PoPETS)</i>, 2020.
  short: 'A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, in: Privacy Enhancing Technologies
    Symposium (PETS/PoPETS), 2020.'
date_created: 2020-11-26T08:50:59Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ffk+20computation.pdf
publication: Privacy Enhancing Technologies Symposium (PETS/PoPETS)
status: public
title: Computation on Encrypted Data using Dataflow Authentication
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20512'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  last_name: Bodden
citation:
  ama: 'Krüger S, Ali K, Bodden E. CogniCrypt_GEN - Generating Code for the Secure
    Usage of Crypto APIs. In: <i>International Symposium on Code Generation and Optimization
    (CGO)</i>. ; 2020:185-198.'
  apa: Krüger, S., Ali, K., &#38; Bodden, E. (2020). CogniCrypt_GEN - Generating Code
    for the Secure Usage of Crypto APIs. <i>International Symposium on Code Generation
    and Optimization (CGO)</i>, 185–198.
  bibtex: '@inproceedings{Krüger_Ali_Bodden_2020, title={CogniCrypt_GEN - Generating
    Code for the Secure Usage of Crypto APIs}, booktitle={International Symposium
    on Code Generation and Optimization (CGO)}, author={Krüger, Stefan and Ali, Karim
    and Bodden, Eric}, year={2020}, pages={185–198} }'
  chicago: Krüger, Stefan, Karim Ali, and Eric Bodden. “CogniCrypt_GEN - Generating
    Code for the Secure Usage of Crypto APIs.” In <i>International Symposium on Code
    Generation and Optimization (CGO)</i>, 185–98, 2020.
  ieee: S. Krüger, K. Ali, and E. Bodden, “CogniCrypt_GEN - Generating Code for the
    Secure Usage of Crypto APIs,” in <i>International Symposium on Code Generation
    and Optimization (CGO)</i>, 2020, pp. 185–198.
  mla: Krüger, Stefan, et al. “CogniCrypt_GEN - Generating Code for the Secure Usage
    of Crypto APIs.” <i>International Symposium on Code Generation and Optimization
    (CGO)</i>, 2020, pp. 185–98.
  short: 'S. Krüger, K. Ali, E. Bodden, in: International Symposium on Code Generation
    and Optimization (CGO), 2020, pp. 185–198.'
date_created: 2020-11-26T08:51:01Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
page: 185-198
publication: International Symposium on Code Generation and Optimization (CGO)
related_material:
  link:
  - relation: confirmation
    url: http://www.bodden.de/pubs/krueger20cognicryptgen.pdf
status: public
title: CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20513'
abstract:
- lang: ger
  text: "Frühere Studien haben empirisch offenbart, dass Fehlbenutzungen von kryptographischen
    APIs in Softwareanwendungen weitverbreitet sind. Dies geschieht vor allem, weil
    Software-Entwickler_innen aufgrund schlechten API-Designs und fehlenden Kryptographiewissens
    Probleme bekommen, wenn sie versuchen kryptographische Features zu implementieren.
    Die Literatur liefert mehrere Ansätze und Vorschläge diese Probleme zu lösen,
    aber alle scheitern schlussendlich auf die eine oder andere Weise daran die Anforderungen
    der Entwickler_innenzu erfüllen. Das Resultat ist eine insgesamt lückenhafte Landschaft
    verschiedener nur wenigkomplementärer Ansätze.In dieser Arbeit adressieren wir
    das Problem kryptographischer Fehlbenutzungen systematischer durch CogniCrypt.
    CogniCrypt integriert verschiedene Arten von Tool Supportin einen gemeinsamen
    Ansatz, der Entwickler_innen davon befreit wissen zu müssen, wie diese APIs benutzt
    werden müssen. Zentral für unseren Ansatz ist CrySL, eine Beschreibungssprache,die
    die kognitive Lücke zwischen Kryptographie-Expert_innen und Software-Entwickler_innenüberbrückt.
    CrySL ermöglicht es Kryptographie-Expert_innen zu spezifizeren, wie die APIs,die
    sie bereitstellen, richtig benutzt werden. Wir haben einen Compiler für CrySL
    implementiert, der es erlaubt auf CrySL-Spezifikationen aufbauenden Tool Support
    zu entwickeln. Wir haben weiterhin die statische Analyse CogniCrypt_SAST und den
    Code-Generator CogniCrypt_GEN entwickelt. Schlussendlich haben wir CogniCrypt
    prototypisch implementiert und diesen Prototyp in einem kontrollierten Experiment
    evaluiert.\r\n"
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
citation:
  ama: Krüger S. <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>.
    Universitaetsbibliothek Paderborn; 2020.
  apa: Krüger, S. (2020). <i>CogniCrypt -- The Secure Integration of Cryptographic
    Software</i>. Universitaetsbibliothek Paderborn.
  bibtex: '@book{Krüger_2020, title={CogniCrypt -- The Secure Integration of Cryptographic
    Software}, publisher={Universitaetsbibliothek Paderborn}, author={Krüger, Stefan},
    year={2020} }'
  chicago: Krüger, Stefan. <i>CogniCrypt -- The Secure Integration of Cryptographic
    Software</i>. Universitaetsbibliothek Paderborn, 2020.
  ieee: S. Krüger, <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>.
    Universitaetsbibliothek Paderborn, 2020.
  mla: Krüger, Stefan. <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>.
    Universitaetsbibliothek Paderborn, 2020.
  short: S. Krüger, CogniCrypt -- The Secure Integration of Cryptographic Software,
    Universitaetsbibliothek Paderborn, 2020.
date_created: 2020-11-26T09:02:19Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: https://digital.ub.uni-paderborn.de/hs/document/preview/3500836
publisher: Universitaetsbibliothek Paderborn
status: public
supervisor:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
title: CogniCrypt -- The Secure Integration of Cryptographic Software
type: dissertation
user_id: '5786'
year: '2020'
...
---
_id: '20514'
article_number: '2'
author:
- first_name: Enes
  full_name: Yigitbas, Enes
  id: '8447'
  last_name: Yigitbas
  orcid: 0000-0002-5967-833X
citation:
  ama: 'Yigitbas E. Model-driven engineering and usability evaluation of self-adaptive
    user interfaces. In: <i>ACM SIGWEB Newsletter</i>. ACM; 2020. doi:<a href="https://doi.org/10.1145/3427478.3427480">https://doi.org/10.1145/3427478.3427480</a>'
  apa: Yigitbas, E. (2020). Model-driven engineering and usability evaluation of self-adaptive
    user interfaces. In <i>ACM SIGWEB Newsletter</i>. ACM. <a href="https://doi.org/10.1145/3427478.3427480">https://doi.org/10.1145/3427478.3427480</a>
  bibtex: '@inproceedings{Yigitbas_2020, title={Model-driven engineering and usability
    evaluation of self-adaptive user interfaces}, DOI={<a href="https://doi.org/10.1145/3427478.3427480">https://doi.org/10.1145/3427478.3427480</a>},
    number={2}, booktitle={ACM SIGWEB Newsletter}, publisher={ACM}, author={Yigitbas,
    Enes}, year={2020} }'
  chicago: Yigitbas, Enes. “Model-Driven Engineering and Usability Evaluation of Self-Adaptive
    User Interfaces.” In <i>ACM SIGWEB Newsletter</i>. ACM, 2020. <a href="https://doi.org/10.1145/3427478.3427480">https://doi.org/10.1145/3427478.3427480</a>.
  ieee: E. Yigitbas, “Model-driven engineering and usability evaluation of self-adaptive
    user interfaces,” in <i>ACM SIGWEB Newsletter</i>, 2020.
  mla: Yigitbas, Enes. “Model-Driven Engineering and Usability Evaluation of Self-Adaptive
    User Interfaces.” <i>ACM SIGWEB Newsletter</i>, 2, ACM, 2020, doi:<a href="https://doi.org/10.1145/3427478.3427480">https://doi.org/10.1145/3427478.3427480</a>.
  short: 'E. Yigitbas, in: ACM SIGWEB Newsletter, ACM, 2020.'
date_created: 2020-11-26T09:22:23Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '66'
- _id: '534'
doi: https://doi.org/10.1145/3427478.3427480
language:
- iso: eng
publication: ACM SIGWEB Newsletter
publisher: ACM
status: public
title: Model-driven engineering and usability evaluation of self-adaptive user interfaces
type: conference
user_id: '8447'
year: '2020'
...
---
_id: '20518'
author:
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Koch T, Dziwok S, Holtmann J, Bodden E. Scenario-based Specification of Security
    Protocols and Transformation to Security Model Checkers. In: <i>ACM/IEEE 23rd
    International Conference on Model Driven Engineering Languages and Systems (MODELS
    ’20)</i>. ACM; 2020. doi:<a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>'
  apa: Koch, T., Dziwok, S., Holtmann, J., &#38; Bodden, E. (2020). Scenario-based
    Specification of Security Protocols and Transformation to Security Model Checkers.
    <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
    and Systems (MODELS ’20)</i>. <a href="https://doi.org/10.1145/3365438.3410946">https://doi.org/10.1145/3365438.3410946</a>
  bibtex: '@inproceedings{Koch_Dziwok_Holtmann_Bodden_2020, title={Scenario-based
    Specification of Security Protocols and Transformation to Security Model Checkers},
    DOI={<a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>},
    booktitle={ACM/IEEE 23rd International Conference on Model Driven Engineering
    Languages and Systems (MODELS ’20)}, publisher={ACM}, author={Koch, Thorsten and
    Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}, year={2020} }'
  chicago: Koch, Thorsten, Stefan Dziwok, Jörg Holtmann, and Eric Bodden. “Scenario-Based
    Specification of Security Protocols and Transformation to Security Model Checkers.”
    In <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
    and Systems (MODELS ’20)</i>. ACM, 2020. <a href="https://doi.org/10.1145/3365438.3410946">https://doi.org/10.1145/3365438.3410946</a>.
  ieee: 'T. Koch, S. Dziwok, J. Holtmann, and E. Bodden, “Scenario-based Specification
    of Security Protocols and Transformation to Security Model Checkers,” 2020, doi:
    <a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>.'
  mla: Koch, Thorsten, et al. “Scenario-Based Specification of Security Protocols
    and Transformation to Security Model Checkers.” <i>ACM/IEEE 23rd International
    Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>,
    ACM, 2020, doi:<a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>.
  short: 'T. Koch, S. Dziwok, J. Holtmann, E. Bodden, in: ACM/IEEE 23rd International
    Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM,
    2020.'
date_created: 2020-11-26T10:19:54Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
- _id: '241'
- _id: '662'
doi: 10.1145/3365438.3410946
language:
- iso: eng
publication: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
  and Systems (MODELS ’20)
publisher: ACM
status: public
title: Scenario-based Specification of Security Protocols and Transformation to Security
  Model Checkers
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20521'
author:
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
citation:
  ama: Gerking C. <i>Model-Driven Information Flow Security Engineering for Cyber-Physical
    Systems</i>. Paderborn University; 2020. doi:<a href="https://doi.org/10.17619/UNIPB/1-1033">10.17619/UNIPB/1-1033</a>
  apa: Gerking, C. (2020). <i>Model-Driven Information Flow Security Engineering for
    Cyber-Physical Systems</i>. Paderborn University. <a href="https://doi.org/10.17619/UNIPB/1-1033">https://doi.org/10.17619/UNIPB/1-1033</a>
  bibtex: '@book{Gerking_2020, title={Model-Driven Information Flow Security Engineering
    for Cyber-Physical Systems}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-1033">10.17619/UNIPB/1-1033</a>},
    publisher={Paderborn University}, author={Gerking, Christopher}, year={2020} }'
  chicago: Gerking, Christopher. <i>Model-Driven Information Flow Security Engineering
    for Cyber-Physical Systems</i>. Paderborn University, 2020. <a href="https://doi.org/10.17619/UNIPB/1-1033">https://doi.org/10.17619/UNIPB/1-1033</a>.
  ieee: C. Gerking, <i>Model-Driven Information Flow Security Engineering for Cyber-Physical
    Systems</i>. Paderborn University, 2020.
  mla: Gerking, Christopher. <i>Model-Driven Information Flow Security Engineering
    for Cyber-Physical Systems</i>. Paderborn University, 2020, doi:<a href="https://doi.org/10.17619/UNIPB/1-1033">10.17619/UNIPB/1-1033</a>.
  short: C. Gerking, Model-Driven Information Flow Security Engineering for Cyber-Physical
    Systems, Paderborn University, 2020.
date_created: 2020-11-26T10:37:17Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.17619/UNIPB/1-1033
language:
- iso: eng
publisher: Paderborn University
status: public
supervisor:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
title: Model-Driven Information Flow Security Engineering for Cyber-Physical Systems
type: dissertation
user_id: '5786'
year: '2020'
...
---
_id: '20568'
author:
- first_name: Jannik
  full_name: Reinhold, Jannik
  id: '33669'
  last_name: Reinhold
- first_name: Christian
  full_name: Koldewey, Christian
  id: '43136'
  last_name: Koldewey
  orcid: https://orcid.org/0000-0001-7992-6399
- first_name: Roman
  full_name: Dumitrescu, Roman
  id: '16190'
  last_name: Dumitrescu
citation:
  ama: 'Reinhold J, Koldewey C, Dumitrescu R. GEMINI-Modellierungssprache für Wertschöpfungssysteme.
    In: Buchholz B, Bürger M, eds. <i>Der Geschäftsmodell-Toolguide </i>. Frankfurt
    am Main: Campus Verlag; 2020:52-56.'
  apa: 'Reinhold, J., Koldewey, C., &#38; Dumitrescu, R. (2020). GEMINI-Modellierungssprache
    für Wertschöpfungssysteme. In B. Buchholz &#38; M. Bürger (Eds.), <i>Der Geschäftsmodell-Toolguide
    </i> (pp. 52–56). Frankfurt am Main: Campus Verlag.'
  bibtex: '@inbook{Reinhold_Koldewey_Dumitrescu_2020, place={Frankfurt am Main}, title={GEMINI-Modellierungssprache
    für Wertschöpfungssysteme}, booktitle={Der Geschäftsmodell-Toolguide }, publisher={Campus
    Verlag}, author={Reinhold, Jannik and Koldewey, Christian and Dumitrescu, Roman},
    editor={Buchholz, Birgit and Bürger, MatthiasEditors}, year={2020}, pages={52–56}
    }'
  chicago: 'Reinhold, Jannik, Christian Koldewey, and Roman Dumitrescu. “GEMINI-Modellierungssprache
    für Wertschöpfungssysteme.” In <i>Der Geschäftsmodell-Toolguide </i>, edited by
    Birgit Buchholz and Matthias Bürger, 52–56. Frankfurt am Main: Campus Verlag,
    2020.'
  ieee: 'J. Reinhold, C. Koldewey, and R. Dumitrescu, “GEMINI-Modellierungssprache
    für Wertschöpfungssysteme,” in <i>Der Geschäftsmodell-Toolguide </i>, B. Buchholz
    and M. Bürger, Eds. Frankfurt am Main: Campus Verlag, 2020, pp. 52–56.'
  mla: Reinhold, Jannik, et al. “GEMINI-Modellierungssprache für Wertschöpfungssysteme.”
    <i>Der Geschäftsmodell-Toolguide </i>, edited by Birgit Buchholz and Matthias
    Bürger, Campus Verlag, 2020, pp. 52–56.
  short: 'J. Reinhold, C. Koldewey, R. Dumitrescu, in: B. Buchholz, M. Bürger (Eds.),
    Der Geschäftsmodell-Toolguide , Campus Verlag, Frankfurt am Main, 2020, pp. 52–56.'
date_created: 2020-12-01T14:23:53Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '563'
editor:
- first_name: Birgit
  full_name: Buchholz, Birgit
  last_name: Buchholz
- first_name: Matthias
  full_name: Bürger, Matthias
  last_name: Bürger
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: https://www.campus.de/e-books/business/management-unternehmensfuehrung/der_geschaeftsmodell_toolguide-16606.html
oa: '1'
page: 52-56
place: Frankfurt am Main
popular_science: '1'
publication: 'Der Geschäftsmodell-Toolguide '
publication_status: published
publisher: Campus Verlag
status: public
title: GEMINI-Modellierungssprache für Wertschöpfungssysteme
type: book_chapter
user_id: '43136'
year: '2020'
...
---
_id: '20570'
author:
- first_name: Christian
  full_name: Koldewey, Christian
  id: '43136'
  last_name: Koldewey
  orcid: https://orcid.org/0000-0001-7992-6399
- first_name: Jannik
  full_name: Reinhold, Jannik
  id: '33669'
  last_name: Reinhold
- first_name: Roman
  full_name: Dumitrescu, Roman
  id: '16190'
  last_name: Dumitrescu
citation:
  ama: 'Koldewey C, Reinhold J, Dumitrescu R. GEMINI-Geschäftsmodellmuster-Kartenset.
    In: Buchholz B, Bürger M, eds. <i>Der Geschäftsmodell-Toolguide</i>. Frankfurt
    am Main: Campus Verlag; 2020:61-66.'
  apa: 'Koldewey, C., Reinhold, J., &#38; Dumitrescu, R. (2020). GEMINI-Geschäftsmodellmuster-Kartenset.
    In B. Buchholz &#38; M. Bürger (Eds.), <i>Der Geschäftsmodell-Toolguide</i> (pp.
    61–66). Frankfurt am Main: Campus Verlag.'
  bibtex: '@inbook{Koldewey_Reinhold_Dumitrescu_2020, place={Frankfurt am Main}, title={GEMINI-Geschäftsmodellmuster-Kartenset},
    booktitle={Der Geschäftsmodell-Toolguide}, publisher={Campus Verlag}, author={Koldewey,
    Christian and Reinhold, Jannik and Dumitrescu, Roman}, editor={Buchholz, Birgit
    and Bürger, MatthiasEditors}, year={2020}, pages={61–66} }'
  chicago: 'Koldewey, Christian, Jannik Reinhold, and Roman Dumitrescu. “GEMINI-Geschäftsmodellmuster-Kartenset.”
    In <i>Der Geschäftsmodell-Toolguide</i>, edited by Birgit Buchholz and Matthias
    Bürger, 61–66. Frankfurt am Main: Campus Verlag, 2020.'
  ieee: 'C. Koldewey, J. Reinhold, and R. Dumitrescu, “GEMINI-Geschäftsmodellmuster-Kartenset,”
    in <i>Der Geschäftsmodell-Toolguide</i>, B. Buchholz and M. Bürger, Eds. Frankfurt
    am Main: Campus Verlag, 2020, pp. 61–66.'
  mla: Koldewey, Christian, et al. “GEMINI-Geschäftsmodellmuster-Kartenset.” <i>Der
    Geschäftsmodell-Toolguide</i>, edited by Birgit Buchholz and Matthias Bürger,
    Campus Verlag, 2020, pp. 61–66.
  short: 'C. Koldewey, J. Reinhold, R. Dumitrescu, in: B. Buchholz, M. Bürger (Eds.),
    Der Geschäftsmodell-Toolguide, Campus Verlag, Frankfurt am Main, 2020, pp. 61–66.'
date_created: 2020-12-01T14:26:07Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '563'
editor:
- first_name: Birgit
  full_name: Buchholz, Birgit
  last_name: Buchholz
- first_name: Matthias
  full_name: Bürger, Matthias
  last_name: Bürger
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: https://www.campus.de/e-books/business/management-unternehmensfuehrung/der_geschaeftsmodell_toolguide-16606.html
oa: '1'
page: 61-66
place: Frankfurt am Main
popular_science: '1'
publication: Der Geschäftsmodell-Toolguide
publication_status: published
publisher: Campus Verlag
status: public
title: GEMINI-Geschäftsmodellmuster-Kartenset
type: book_chapter
user_id: '43136'
year: '2020'
...
---
_id: '20571'
author:
- first_name: Christian
  full_name: Koldewey, Christian
  id: '43136'
  last_name: Koldewey
  orcid: https://orcid.org/0000-0001-7992-6399
- first_name: Jannik
  full_name: Reinhold, Jannik
  id: '33669'
  last_name: Reinhold
- first_name: Roman
  full_name: Dumitrescu, Roman
  id: '16190'
  last_name: Dumitrescu
citation:
  ama: 'Koldewey C, Reinhold J, Dumitrescu R. Geschäftsmodellvalidierung. In: Buchholz
    B, Bürger M, eds. <i>Der Geschäftsmodell-Toolguide</i>. Frankfurt am Main: Campus
    Verlag; 2020:106-111.'
  apa: 'Koldewey, C., Reinhold, J., &#38; Dumitrescu, R. (2020). Geschäftsmodellvalidierung.
    In B. Buchholz &#38; M. Bürger (Eds.), <i>Der Geschäftsmodell-Toolguide</i> (pp.
    106–111). Frankfurt am Main: Campus Verlag.'
  bibtex: '@inbook{Koldewey_Reinhold_Dumitrescu_2020, place={Frankfurt am Main}, title={Geschäftsmodellvalidierung},
    booktitle={Der Geschäftsmodell-Toolguide}, publisher={Campus Verlag}, author={Koldewey,
    Christian and Reinhold, Jannik and Dumitrescu, Roman}, editor={Buchholz, Birgit
    and Bürger, MatthiasEditors}, year={2020}, pages={106–111} }'
  chicago: 'Koldewey, Christian, Jannik Reinhold, and Roman Dumitrescu. “Geschäftsmodellvalidierung.”
    In <i>Der Geschäftsmodell-Toolguide</i>, edited by Birgit Buchholz and Matthias
    Bürger, 106–11. Frankfurt am Main: Campus Verlag, 2020.'
  ieee: 'C. Koldewey, J. Reinhold, and R. Dumitrescu, “Geschäftsmodellvalidierung,”
    in <i>Der Geschäftsmodell-Toolguide</i>, B. Buchholz and M. Bürger, Eds. Frankfurt
    am Main: Campus Verlag, 2020, pp. 106–111.'
  mla: Koldewey, Christian, et al. “Geschäftsmodellvalidierung.” <i>Der Geschäftsmodell-Toolguide</i>,
    edited by Birgit Buchholz and Matthias Bürger, Campus Verlag, 2020, pp. 106–11.
  short: 'C. Koldewey, J. Reinhold, R. Dumitrescu, in: B. Buchholz, M. Bürger (Eds.),
    Der Geschäftsmodell-Toolguide, Campus Verlag, Frankfurt am Main, 2020, pp. 106–111.'
date_created: 2020-12-01T14:27:40Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '563'
editor:
- first_name: Birgit
  full_name: Buchholz, Birgit
  last_name: Buchholz
- first_name: Matthias
  full_name: Bürger, Matthias
  last_name: Bürger
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: https://www.campus.de/e-books/business/management-unternehmensfuehrung/der_geschaeftsmodell_toolguide-16606.html
oa: '1'
page: 106 - 111
place: Frankfurt am Main
popular_science: '1'
publication: Der Geschäftsmodell-Toolguide
publication_status: published
publisher: Campus Verlag
status: public
title: Geschäftsmodellvalidierung
type: book_chapter
user_id: '43136'
year: '2020'
...
---
_id: '20573'
author:
- first_name: Christian
  full_name: Koldewey, Christian
  id: '43136'
  last_name: Koldewey
  orcid: https://orcid.org/0000-0001-7992-6399
- first_name: Jannik
  full_name: Reinhold, Jannik
  id: '33669'
  last_name: Reinhold
- first_name: Roman
  full_name: Dumitrescu, Roman
  id: '16190'
  last_name: Dumitrescu
citation:
  ama: 'Koldewey C, Reinhold J, Dumitrescu R. Geschäftsmodell-Roadmapping. In: Buchholz
    B, Bürger M, eds. <i>Der Geschäftsmodell-Toolguide</i>. Frankfurt am Main: Campus
    Verlag; 2020:138-143.'
  apa: 'Koldewey, C., Reinhold, J., &#38; Dumitrescu, R. (2020). Geschäftsmodell-Roadmapping.
    In B. Buchholz &#38; M. Bürger (Eds.), <i>Der Geschäftsmodell-Toolguide</i> (pp.
    138–143). Frankfurt am Main: Campus Verlag.'
  bibtex: '@inbook{Koldewey_Reinhold_Dumitrescu_2020, place={Frankfurt am Main}, title={Geschäftsmodell-Roadmapping},
    booktitle={Der Geschäftsmodell-Toolguide}, publisher={Campus Verlag}, author={Koldewey,
    Christian and Reinhold, Jannik and Dumitrescu, Roman}, editor={Buchholz, Birgit
    and Bürger, MatthiasEditors}, year={2020}, pages={138–143} }'
  chicago: 'Koldewey, Christian, Jannik Reinhold, and Roman Dumitrescu. “Geschäftsmodell-Roadmapping.”
    In <i>Der Geschäftsmodell-Toolguide</i>, edited by Birgit Buchholz and Matthias
    Bürger, 138–43. Frankfurt am Main: Campus Verlag, 2020.'
  ieee: 'C. Koldewey, J. Reinhold, and R. Dumitrescu, “Geschäftsmodell-Roadmapping,”
    in <i>Der Geschäftsmodell-Toolguide</i>, B. Buchholz and M. Bürger, Eds. Frankfurt
    am Main: Campus Verlag, 2020, pp. 138–143.'
  mla: Koldewey, Christian, et al. “Geschäftsmodell-Roadmapping.” <i>Der Geschäftsmodell-Toolguide</i>,
    edited by Birgit Buchholz and Matthias Bürger, Campus Verlag, 2020, pp. 138–43.
  short: 'C. Koldewey, J. Reinhold, R. Dumitrescu, in: B. Buchholz, M. Bürger (Eds.),
    Der Geschäftsmodell-Toolguide, Campus Verlag, Frankfurt am Main, 2020, pp. 138–143.'
date_created: 2020-12-01T14:30:03Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '563'
editor:
- first_name: Birgit
  full_name: Buchholz, Birgit
  last_name: Buchholz
- first_name: Matthias
  full_name: Bürger, Matthias
  last_name: Bürger
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: https://www.campus.de/e-books/business/management-unternehmensfuehrung/der_geschaeftsmodell_toolguide-16606.html
oa: '1'
page: 138 - 143
place: Frankfurt am Main
popular_science: '1'
publication: Der Geschäftsmodell-Toolguide
publication_status: published
publisher: Campus Verlag
status: public
title: Geschäftsmodell-Roadmapping
type: book_chapter
user_id: '43136'
year: '2020'
...
---
_id: '20712'
author:
- first_name: Philipp
  full_name: Schubert, Philipp
  id: '60543'
  last_name: Schubert
  orcid: 0000-0002-8674-1859
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Ben
  full_name: Hermann, Ben
  id: '66173'
  last_name: Hermann
  orcid: 0000-0001-9848-2017
citation:
  ama: Schubert P, Bodden E, Hermann B. <i>Accelerating Static Call-Graph, Points-to
    and Data-Flow Analysis Through Persisted Summaries</i>.; 2020.
  apa: Schubert, P., Bodden, E., &#38; Hermann, B. (2020). <i>Accelerating Static
    Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>.
  bibtex: '@book{Schubert_Bodden_Hermann_2020, title={Accelerating Static Call-Graph,
    Points-to and Data-Flow Analysis Through Persisted Summaries}, author={Schubert,
    Philipp and Bodden, Eric and Hermann, Ben}, year={2020} }'
  chicago: Schubert, Philipp, Eric Bodden, and Ben Hermann. <i>Accelerating Static
    Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>,
    2020.
  ieee: P. Schubert, E. Bodden, and B. Hermann, <i>Accelerating Static Call-Graph,
    Points-to and Data-Flow Analysis Through Persisted Summaries</i>. 2020.
  mla: Schubert, Philipp, et al. <i>Accelerating Static Call-Graph, Points-to and
    Data-Flow Analysis Through Persisted Summaries</i>. 2020.
  short: P. Schubert, E. Bodden, B. Hermann, Accelerating Static Call-Graph, Points-to
    and Data-Flow Analysis Through Persisted Summaries, 2020.
date_created: 2020-12-14T07:44:11Z
date_updated: 2022-01-06T06:54:34Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: pdschbrt
  date_created: 2020-12-14T07:39:07Z
  date_updated: 2020-12-14T07:39:07Z
  file_id: '20713'
  file_name: main.pdf
  file_size: 683576
  relation: main_file
  success: 1
file_date_updated: 2020-12-14T07:39:07Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
status: public
title: Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted
  Summaries
type: report
user_id: '477'
year: '2020'
...
---
_id: '20748'
abstract:
- lang: eng
  text: "On the circuit level, the design paradigm Approximate Computing seeks to
    trade off computational accuracy against a target metric, e.g., energy consumption.
    This trade-off is possible for many applications due to their inherent resiliency
    against inaccuracies.\r\nIn the past, several automated approximation frameworks
    have been presented, which either utilize designated approximation techniques
    or libraries to replace approximable circuit parts with inaccurate versions. The
    frameworks invoke a search algorithm to iteratively explore the search space of
    performance degraded circuits, and validate their quality individually. \r\nIn
    this paper, we propose to reverse this procedure. Rather than exploring the search
    space, we delineate the approximate parts of the search space which are guaranteed
    to lead to valid approximate circuits. Our methodology is supported by formal
    verification and independent of approximation techniques. Eventually, the user
    is provided with quality bounds of the individual approximable circuit parts.
    Consequently, our approach guarantees that any approximate circuit which implements
    these parts within the determined quality constraints satisfies the global quality
    constraints, superseding a subsequent quality verification.\r\nIn our experimental
    results, we present the runtimes of our approach."
author:
- first_name: Linus Matthias
  full_name: Witschen, Linus Matthias
  id: '49051'
  last_name: Witschen
- first_name: Tobias
  full_name: Wiersema, Tobias
  id: '3118'
  last_name: Wiersema
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: Witschen LM, Wiersema T, Platzner M. Search Space Characterization for AxC
    Synthesis. <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>.
  apa: Witschen, L. M., Wiersema, T., &#38; Platzner, M. (n.d.). Search Space Characterization
    for AxC Synthesis. <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>.
  bibtex: '@article{Witschen_Wiersema_Platzner, title={Search Space Characterization
    for AxC Synthesis}, journal={Fifth Workshop on Approximate Computing (AxC 2020)},
    author={Witschen, Linus Matthias and Wiersema, Tobias and Platzner, Marco} }'
  chicago: Witschen, Linus Matthias, Tobias Wiersema, and Marco Platzner. “Search
    Space Characterization for AxC Synthesis.” <i>Fifth Workshop on Approximate Computing
    (AxC 2020)</i>, n.d.
  ieee: L. M. Witschen, T. Wiersema, and M. Platzner, “Search Space Characterization
    for AxC Synthesis,” <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>.
    .
  mla: Witschen, Linus Matthias, et al. “Search Space Characterization for AxC Synthesis.”
    <i>Fifth Workshop on Approximate Computing (AxC 2020)</i>.
  short: L.M. Witschen, T. Wiersema, M. Platzner, Fifth Workshop on Approximate Computing
    (AxC 2020) (n.d.).
date_created: 2020-12-15T15:13:49Z
date_updated: 2022-01-06T06:54:35Z
ddc:
- '000'
department:
- _id: '78'
file:
- access_level: closed
  content_type: application/pdf
  creator: witschen
  date_created: 2020-12-15T15:11:06Z
  date_updated: 2020-12-15T15:11:06Z
  file_id: '20749'
  file_name: witschen20_axc.pdf
  file_size: 250870
  relation: main_file
  success: 1
file_date_updated: 2020-12-15T15:11:06Z
has_accepted_license: '1'
language:
- iso: eng
page: '2'
project:
- _id: '12'
  name: SFB 901 - Subproject B4
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '1'
  name: SFB 901
publication: Fifth Workshop on Approximate Computing (AxC 2020)
publication_status: accepted
status: public
title: Search Space Characterization for AxC Synthesis
type: preprint
user_id: '3118'
year: '2020'
...
---
_id: '20750'
author:
- first_name: Christian
  full_name: Lienen, Christian
  id: '60323'
  last_name: Lienen
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
- first_name: Bernhard
  full_name: Rinner, Bernhard
  last_name: Rinner
citation:
  ama: 'Lienen C, Platzner M, Rinner B. ReconROS: Flexible Hardware Acceleration for
    ROS2 Applications. In: <i>Proceedings of the 2020 International Conference on
    Field-Programmable Technology (FPT)</i>. ; 2020.'
  apa: 'Lienen, C., Platzner, M., &#38; Rinner, B. (2020). ReconROS: Flexible Hardware
    Acceleration for ROS2 Applications. In <i>Proceedings of the 2020 International
    Conference on Field-Programmable Technology (FPT)</i>.'
  bibtex: '@inproceedings{Lienen_Platzner_Rinner_2020, title={ReconROS: Flexible Hardware
    Acceleration for ROS2 Applications}, booktitle={Proceedings of the 2020 International
    Conference on Field-Programmable Technology (FPT)}, author={Lienen, Christian
    and Platzner, Marco and Rinner, Bernhard}, year={2020} }'
  chicago: 'Lienen, Christian, Marco Platzner, and Bernhard Rinner. “ReconROS: Flexible
    Hardware Acceleration for ROS2 Applications.” In <i>Proceedings of the 2020 International
    Conference on Field-Programmable Technology (FPT)</i>, 2020.'
  ieee: 'C. Lienen, M. Platzner, and B. Rinner, “ReconROS: Flexible Hardware Acceleration
    for ROS2 Applications,” in <i>Proceedings of the 2020 International Conference
    on Field-Programmable Technology (FPT)</i>, 2020.'
  mla: 'Lienen, Christian, et al. “ReconROS: Flexible Hardware Acceleration for ROS2
    Applications.” <i>Proceedings of the 2020 International Conference on Field-Programmable
    Technology (FPT)</i>, 2020.'
  short: 'C. Lienen, M. Platzner, B. Rinner, in: Proceedings of the 2020 International
    Conference on Field-Programmable Technology (FPT), 2020.'
conference:
  end_date: 2020-12-11
  name: International Conference on Field Programmable Technology (ICFPT)
  start_date: 2020-12-09
date_created: 2020-12-16T05:20:01Z
date_updated: 2022-01-06T06:54:35Z
department:
- _id: '78'
language:
- iso: eng
publication: Proceedings of the 2020 International Conference on Field-Programmable
  Technology (FPT)
status: public
title: 'ReconROS: Flexible Hardware Acceleration for ROS2 Applications'
type: conference
user_id: '398'
year: '2020'
...
---
_id: '20755'
abstract:
- lang: eng
  text: "We consider the problem of computing shortest paths in \\emph{hybrid networks},
    in which nodes can make use of different communication modes. For example, mobile
    phones may use ad-hoc connections via Bluetooth or Wi-Fi in addition to the cellular
    network to solve tasks more efficiently. Like in this case, the different communication
    modes may differ considerably in range, bandwidth, and flexibility. We build upon
    the model of Augustine et al. [SODA '20], which captures these differences by
    a \\emph{local} and a \\emph{global} mode. Specifically, the local edges model
    a fixed communication network in which $O(1)$ messages of size $O(\\log n)$ can
    be sent over every edge in each synchronous round. The global edges form a clique,
    but nodes are only allowed to send and receive a total of at most $O(\\log n)$
    messages over global edges, which restricts the nodes to use these edges only
    very sparsely.\r\n\r\nWe demonstrate the power of hybrid networks by presenting
    algorithms to compute Single-Source Shortest Paths and the diameter very efficiently
    in \\emph{sparse graphs}. Specifically, we present exact $O(\\log n)$ time algorithms
    for cactus graphs (i.e., graphs in which each edge is contained in at most one
    cycle), and $3$-approximations for graphs that have at most $n + O(n^{1/3})$ edges
    and arboricity $O(\\log n)$. For these graph classes, our algorithms provide exponentially
    faster solutions than the best known algorithms for general graphs in this model.\r\nBeyond
    shortest paths, we also provide a variety of useful tools and techniques for hybrid
    networks, which may be of independent interest.\r\n"
author:
- first_name: Michael
  full_name: Feldmann, Michael
  id: '23538'
  last_name: Feldmann
- first_name: Kristian
  full_name: Hinnenthal, Kristian
  id: '32229'
  last_name: Hinnenthal
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Feldmann M, Hinnenthal K, Scheideler C. Fast Hybrid Network Algorithms for
    Shortest Paths in Sparse Graphs. In: <i>Proceedings of the 24th International
    Conference on Principles of Distributed Systems (OPODIS)</i>. Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik; 2020. doi:<a href="https://doi.org/10.4230/LIPIcs.OPODIS.2020.31">10.4230/LIPIcs.OPODIS.2020.31</a>'
  apa: Feldmann, M., Hinnenthal, K., &#38; Scheideler, C. (2020). Fast Hybrid Network
    Algorithms for Shortest Paths in Sparse Graphs. In <i>Proceedings of the 24th
    International Conference on Principles of Distributed Systems (OPODIS)</i>. Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPIcs.OPODIS.2020.31">https://doi.org/10.4230/LIPIcs.OPODIS.2020.31</a>
  bibtex: '@inproceedings{Feldmann_Hinnenthal_Scheideler_2020, title={Fast Hybrid
    Network Algorithms for Shortest Paths in Sparse Graphs}, DOI={<a href="https://doi.org/10.4230/LIPIcs.OPODIS.2020.31">10.4230/LIPIcs.OPODIS.2020.31</a>},
    booktitle={Proceedings of the 24th International Conference on Principles of Distributed
    Systems (OPODIS)}, publisher={Schloss Dagstuhl - Leibniz-Zentrum für Informatik},
    author={Feldmann, Michael and Hinnenthal, Kristian and Scheideler, Christian},
    year={2020} }'
  chicago: Feldmann, Michael, Kristian Hinnenthal, and Christian Scheideler. “Fast
    Hybrid Network Algorithms for Shortest Paths in Sparse Graphs.” In <i>Proceedings
    of the 24th International Conference on Principles of Distributed Systems (OPODIS)</i>.
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. <a href="https://doi.org/10.4230/LIPIcs.OPODIS.2020.31">https://doi.org/10.4230/LIPIcs.OPODIS.2020.31</a>.
  ieee: M. Feldmann, K. Hinnenthal, and C. Scheideler, “Fast Hybrid Network Algorithms
    for Shortest Paths in Sparse Graphs,” in <i>Proceedings of the 24th International
    Conference on Principles of Distributed Systems (OPODIS)</i>, 2020.
  mla: Feldmann, Michael, et al. “Fast Hybrid Network Algorithms for Shortest Paths
    in Sparse Graphs.” <i>Proceedings of the 24th International Conference on Principles
    of Distributed Systems (OPODIS)</i>, Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2020, doi:<a href="https://doi.org/10.4230/LIPIcs.OPODIS.2020.31">10.4230/LIPIcs.OPODIS.2020.31</a>.
  short: 'M. Feldmann, K. Hinnenthal, C. Scheideler, in: Proceedings of the 24th International
    Conference on Principles of Distributed Systems (OPODIS), Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2020.'
date_created: 2020-12-16T10:20:18Z
date_updated: 2022-01-06T06:54:36Z
ddc:
- '000'
department:
- _id: '79'
doi: 10.4230/LIPIcs.OPODIS.2020.31
external_id:
  arxiv:
  - '2007.01191'
file:
- access_level: closed
  content_type: application/pdf
  creator: mfeldma2
  date_created: 2020-12-16T10:18:50Z
  date_updated: 2020-12-16T10:18:50Z
  file_id: '20756'
  file_name: Fast_Hybrid_Network_Algorithms_for_Shortest_Paths_in_Sparse_Graphs.pdf
  file_size: 867373
  relation: main_file
  success: 1
file_date_updated: 2020-12-16T10:18:50Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '1'
  name: SFB 901
publication: Proceedings of the 24th International Conference on Principles of Distributed
  Systems (OPODIS)
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
status: public
title: Fast Hybrid Network Algorithms for Shortest Paths in Sparse Graphs
type: conference
user_id: '23538'
year: '2020'
...
---
_id: '20820'
author:
- first_name: Simon
  full_name: Thiele, Simon
  last_name: Thiele
citation:
  ama: Thiele S. <i>Implementing Machine Learning Functions as PYNQ FPGA Overlays</i>.;
    2020.
  apa: Thiele, S. (2020). <i>Implementing Machine Learning Functions as PYNQ FPGA
    Overlays</i>.
  bibtex: '@book{Thiele_2020, title={Implementing Machine Learning Functions as PYNQ
    FPGA Overlays}, author={Thiele, Simon}, year={2020} }'
  chicago: Thiele, Simon. <i>Implementing Machine Learning Functions as PYNQ FPGA
    Overlays</i>, 2020.
  ieee: S. Thiele, <i>Implementing Machine Learning Functions as PYNQ FPGA Overlays</i>.
    2020.
  mla: Thiele, Simon. <i>Implementing Machine Learning Functions as PYNQ FPGA Overlays</i>.
    2020.
  short: S. Thiele, Implementing Machine Learning Functions as PYNQ FPGA Overlays,
    2020.
date_created: 2020-12-21T13:59:55Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '78'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '82'
  name: SFB 901 - Project Area T
- _id: '83'
  name: SFB 901 -Subproject T1
status: public
supervisor:
- first_name: Lennart
  full_name: Clausing, Lennart
  id: '74287'
  last_name: Clausing
  orcid: 0000-0003-3789-6034
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
title: Implementing Machine Learning Functions as PYNQ FPGA Overlays
type: bachelorsthesis
user_id: '74287'
year: '2020'
...
---
_id: '20821'
author:
- first_name: Vivek
  full_name: Jaganath, Vivek
  last_name: Jaganath
citation:
  ama: Jaganath V. <i>Extension and Evaluation of Python-Based High-Level Synthesis
    Tool Flows</i>.; 2020.
  apa: Jaganath, V. (2020). <i>Extension and Evaluation of Python-based High-Level
    Synthesis Tool Flows</i>.
  bibtex: '@book{Jaganath_2020, title={Extension and Evaluation of Python-based High-Level
    Synthesis Tool Flows}, author={Jaganath, Vivek}, year={2020} }'
  chicago: Jaganath, Vivek. <i>Extension and Evaluation of Python-Based High-Level
    Synthesis Tool Flows</i>, 2020.
  ieee: V. Jaganath, <i>Extension and Evaluation of Python-based High-Level Synthesis
    Tool Flows</i>. 2020.
  mla: Jaganath, Vivek. <i>Extension and Evaluation of Python-Based High-Level Synthesis
    Tool Flows</i>. 2020.
  short: V. Jaganath, Extension and Evaluation of Python-Based High-Level Synthesis
    Tool Flows, 2020.
date_created: 2020-12-21T14:02:42Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '78'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '82'
  name: SFB 901 - Project Area T
- _id: '83'
  name: SFB 901 -Subproject T1
status: public
supervisor:
- first_name: Lennart
  full_name: Clausing, Lennart
  id: '74287'
  last_name: Clausing
  orcid: 0000-0003-3789-6034
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
- first_name: Christian
  full_name: Plessl, Christian
  id: '16153'
  last_name: Plessl
  orcid: 0000-0001-5728-9982
title: Extension and Evaluation of Python-based High-Level Synthesis Tool Flows
type: mastersthesis
user_id: '74287'
year: '2020'
...
