---
_id: '247'
abstract:
- lang: eng
  text: 'Multi-rooted trees are becoming the norm for modern data-center networks.
    In these networks, scalable flow routing is challenging owing to vast number of
    flows. Current approaches either employ a central controller that can have scalability
    issues or a scalable decentralized algorithm only considering local information.
    In this paper we present a new decentralized approach to least-congested path
    routing in software-defined data center networks that has neither of these issues:
    By duplicating the initial (or SYN) packet of a flow and estimating the data rate
    of multiple flows in parallel, we exploit TCP’s habit to fill buffers to find
    the least congested path. We show that our algorithm significantly improves flow
    completion time without the need for a central controller or specialized hardware.'
author:
- first_name: Arne
  full_name: Schwabe, Arne
  last_name: Schwabe
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Schwabe A, Karl H. SynRace: Decentralized Load-Adaptive Multi-path Routing
    without Collecting Statistics. In: <i>Proceedings of the 4th European Workshop
    on Software Defined Networks (EWSDN 2015)</i>. ; 2015:37-42. doi:<a href="https://doi.org/10.1109/EWSDN.2015.58">10.1109/EWSDN.2015.58</a>'
  apa: 'Schwabe, A., &#38; Karl, H. (2015). SynRace: Decentralized Load-Adaptive Multi-path
    Routing without Collecting Statistics. In <i>Proceedings of the 4th European Workshop
    on Software Defined Networks (EWSDN 2015)</i> (pp. 37–42). <a href="https://doi.org/10.1109/EWSDN.2015.58">https://doi.org/10.1109/EWSDN.2015.58</a>'
  bibtex: '@inproceedings{Schwabe_Karl_2015, title={SynRace: Decentralized Load-Adaptive
    Multi-path Routing without Collecting Statistics}, DOI={<a href="https://doi.org/10.1109/EWSDN.2015.58">10.1109/EWSDN.2015.58</a>},
    booktitle={Proceedings of the 4th European Workshop on Software Defined Networks
    (EWSDN 2015)}, author={Schwabe, Arne and Karl, Holger}, year={2015}, pages={37–42}
    }'
  chicago: 'Schwabe, Arne, and Holger Karl. “SynRace: Decentralized Load-Adaptive
    Multi-Path Routing without Collecting Statistics.” In <i>Proceedings of the 4th
    European Workshop on Software Defined Networks (EWSDN 2015)</i>, 37–42, 2015.
    <a href="https://doi.org/10.1109/EWSDN.2015.58">https://doi.org/10.1109/EWSDN.2015.58</a>.'
  ieee: 'A. Schwabe and H. Karl, “SynRace: Decentralized Load-Adaptive Multi-path
    Routing without Collecting Statistics,” in <i>Proceedings of the 4th European
    Workshop on Software Defined Networks (EWSDN 2015)</i>, 2015, pp. 37–42.'
  mla: 'Schwabe, Arne, and Holger Karl. “SynRace: Decentralized Load-Adaptive Multi-Path
    Routing without Collecting Statistics.” <i>Proceedings of the 4th European Workshop
    on Software Defined Networks (EWSDN 2015)</i>, 2015, pp. 37–42, doi:<a href="https://doi.org/10.1109/EWSDN.2015.58">10.1109/EWSDN.2015.58</a>.'
  short: 'A. Schwabe, H. Karl, in: Proceedings of the 4th European Workshop on Software
    Defined Networks (EWSDN 2015), 2015, pp. 37–42.'
date_created: 2017-10-17T12:41:40Z
date_updated: 2022-01-06T06:56:32Z
ddc:
- '040'
department:
- _id: '75'
doi: 10.1109/EWSDN.2015.58
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T09:46:21Z
  date_updated: 2018-03-21T09:46:21Z
  file_id: '1491'
  file_name: 247-07313613.pdf
  file_size: 277574
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T09:46:21Z
has_accepted_license: '1'
page: 37-42
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 4th European Workshop on Software Defined Networks
  (EWSDN 2015)
status: public
title: 'SynRace: Decentralized Load-Adaptive Multi-path Routing without Collecting
  Statistics'
type: conference
user_id: '15504'
year: '2015'
...
---
_id: '261'
author:
- first_name: Thorsten
  full_name: Eisenhofer, Thorsten
  last_name: Eisenhofer
citation:
  ama: Eisenhofer T. <i>Protokolle zur authentifizierten Schüsselvereinbarung</i>.
    Universität Paderborn; 2015.
  apa: Eisenhofer, T. (2015). <i>Protokolle zur authentifizierten Schüsselvereinbarung</i>.
    Universität Paderborn.
  bibtex: '@book{Eisenhofer_2015, title={Protokolle zur authentifizierten Schüsselvereinbarung},
    publisher={Universität Paderborn}, author={Eisenhofer, Thorsten}, year={2015}
    }'
  chicago: Eisenhofer, Thorsten. <i>Protokolle zur authentifizierten Schüsselvereinbarung</i>.
    Universität Paderborn, 2015.
  ieee: T. Eisenhofer, <i>Protokolle zur authentifizierten Schüsselvereinbarung</i>.
    Universität Paderborn, 2015.
  mla: Eisenhofer, Thorsten. <i>Protokolle zur authentifizierten Schüsselvereinbarung</i>.
    Universität Paderborn, 2015.
  short: T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung, Universität
    Paderborn, 2015.
date_created: 2017-10-17T12:41:43Z
date_updated: 2022-01-06T06:57:16Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Protokolle zur authentifizierten Schüsselvereinbarung
type: bachelorsthesis
user_id: '477'
year: '2015'
...
---
_id: '262'
abstract:
- lang: eng
  text: Programs from Proofs" is a generic method which generates new programs out
    of correctness proofs of given programs. The technique ensures that the new and
    given program are behaviorally equivalent and that the new program is easily verifiable,
    thus serving as an alternative to proof-carrying code concepts. So far, this generic
    method has one instantiation that verifies type-state properties of programs.
    In this paper, we present a whole range of new instantiations, all based on data
    ow analyses. More precisely, we show how an imprecise but fast data ow analysis
    can be enhanced with a predicate analysis as to yield a precise but expensive
    analysis. Out of the safety proofs of this analysis, we generate new programs,
    again behaviorally equivalent to the given ones, which are easily verifiable"
    in the sense that now the data ow analysis alone can yield precise results. An
    experimental evaluation practically supports our claim of easy verification.
author:
- first_name: Marie-Christine
  full_name: Jakobs, Marie-Christine
  last_name: Jakobs
- first_name: Heike
  full_name: Wehrheim, Heike
  id: '573'
  last_name: Wehrheim
citation:
  ama: 'Jakobs M-C, Wehrheim H. Programs from Proofs of Predicated Dataflow Analyses.
    In: <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>.
    SAC ’15. ; 2015:1729-1736. doi:<a href="https://doi.org/10.1145/2695664.2695690">10.1145/2695664.2695690</a>'
  apa: Jakobs, M.-C., &#38; Wehrheim, H. (2015). Programs from Proofs of Predicated
    Dataflow Analyses. In <i>Proceedings of the 30th Annual ACM Symposium on Applied
    Computing</i> (pp. 1729–1736). <a href="https://doi.org/10.1145/2695664.2695690">https://doi.org/10.1145/2695664.2695690</a>
  bibtex: '@inproceedings{Jakobs_Wehrheim_2015, series={SAC ’15}, title={Programs
    from Proofs of Predicated Dataflow Analyses}, DOI={<a href="https://doi.org/10.1145/2695664.2695690">10.1145/2695664.2695690</a>},
    booktitle={Proceedings of the 30th Annual ACM Symposium on Applied Computing},
    author={Jakobs, Marie-Christine and Wehrheim, Heike}, year={2015}, pages={1729–1736},
    collection={SAC ’15} }'
  chicago: Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs of Predicated
    Dataflow Analyses.” In <i>Proceedings of the 30th Annual ACM Symposium on Applied
    Computing</i>, 1729–36. SAC ’15, 2015. <a href="https://doi.org/10.1145/2695664.2695690">https://doi.org/10.1145/2695664.2695690</a>.
  ieee: M.-C. Jakobs and H. Wehrheim, “Programs from Proofs of Predicated Dataflow
    Analyses,” in <i>Proceedings of the 30th Annual ACM Symposium on Applied Computing</i>,
    2015, pp. 1729–1736.
  mla: Jakobs, Marie-Christine, and Heike Wehrheim. “Programs from Proofs of Predicated
    Dataflow Analyses.” <i>Proceedings of the 30th Annual ACM Symposium on Applied
    Computing</i>, 2015, pp. 1729–36, doi:<a href="https://doi.org/10.1145/2695664.2695690">10.1145/2695664.2695690</a>.
  short: 'M.-C. Jakobs, H. Wehrheim, in: Proceedings of the 30th Annual ACM Symposium
    on Applied Computing, 2015, pp. 1729–1736.'
date_created: 2017-10-17T12:41:43Z
date_updated: 2022-01-06T06:57:18Z
ddc:
- '040'
department:
- _id: '77'
doi: 10.1145/2695664.2695690
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T09:35:34Z
  date_updated: 2018-03-21T09:35:34Z
  file_id: '1483'
  file_name: 262-mainSACfinal.pdf
  file_size: 554583
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T09:35:34Z
has_accepted_license: '1'
language:
- iso: eng
page: 1729-1736
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 30th Annual ACM Symposium on Applied Computing
series_title: SAC '15
status: public
title: Programs from Proofs of Predicated Dataflow Analyses
type: conference
user_id: '477'
year: '2015'
...
---
_id: '264'
author:
- first_name: Philip
  full_name: Wette, Philip
  last_name: Wette
citation:
  ama: Wette P. <i>Optimizing Software-Defined Networks Using Application-Layer Knowledge</i>.
    Universität Paderborn; 2015.
  apa: Wette, P. (2015). <i>Optimizing Software-Defined Networks using Application-Layer
    Knowledge</i>. Universität Paderborn.
  bibtex: '@book{Wette_2015, title={Optimizing Software-Defined Networks using Application-Layer
    Knowledge}, publisher={Universität Paderborn}, author={Wette, Philip}, year={2015}
    }'
  chicago: Wette, Philip. <i>Optimizing Software-Defined Networks Using Application-Layer
    Knowledge</i>. Universität Paderborn, 2015.
  ieee: P. Wette, <i>Optimizing Software-Defined Networks using Application-Layer
    Knowledge</i>. Universität Paderborn, 2015.
  mla: Wette, Philip. <i>Optimizing Software-Defined Networks Using Application-Layer
    Knowledge</i>. Universität Paderborn, 2015.
  short: P. Wette, Optimizing Software-Defined Networks Using Application-Layer Knowledge,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:43Z
date_updated: 2022-01-06T06:57:20Z
ddc:
- '040'
department:
- _id: '75'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T09:34:36Z
  date_updated: 2018-03-21T09:34:36Z
  file_id: '1481'
  file_name: 264-Dissertation_-_Wette.pdf
  file_size: 8031107
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T09:34:36Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '16'
  name: SFB 901 - Subprojekt C4
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
title: Optimizing Software-Defined Networks using Application-Layer Knowledge
type: dissertation
user_id: '477'
year: '2015'
...
---
_id: '26446'
author:
- first_name: Hans
  full_name: Pongratz, Hans
  last_name: Pongratz
- first_name: Reinhard
  full_name: Keil, Reinhard
  last_name: Keil
citation:
  ama: Pongratz H, Keil R. <i>DeLFI 2015 - The 13th e-Learning Conference on Computer
    Science of the E-Learning Section of the Society for Computer Science EV</i>.
    Koellen Druck + Verlag GmbH; 2015.
  apa: Pongratz, H., &#38; Keil, R. (2015). <i>DeLFI 2015 - The 13th e-Learning Conference
    on Computer Science of the E-Learning Section of the Society for Computer Science
    eV</i>. Koellen Druck + Verlag GmbH.
  bibtex: '@book{Pongratz_Keil_2015, series={GI-Edition Lecture Notes in Informatics
    (LNI)}, title={DeLFI 2015 - The 13th e-Learning Conference on Computer Science
    of the E-Learning Section of the Society for Computer Science eV}, publisher={Koellen
    Druck + Verlag GmbH}, author={Pongratz, Hans and Keil, Reinhard}, year={2015},
    collection={GI-Edition Lecture Notes in Informatics (LNI)} }'
  chicago: Pongratz, Hans, and Reinhard Keil. <i>DeLFI 2015 - The 13th e-Learning
    Conference on Computer Science of the E-Learning Section of the Society for Computer
    Science EV</i>. GI-Edition Lecture Notes in Informatics (LNI). Koellen Druck +
    Verlag GmbH, 2015.
  ieee: H. Pongratz and R. Keil, <i>DeLFI 2015 - The 13th e-Learning Conference on
    Computer Science of the E-Learning Section of the Society for Computer Science
    eV</i>. Koellen Druck + Verlag GmbH, 2015.
  mla: Pongratz, Hans, and Reinhard Keil. <i>DeLFI 2015 - The 13th e-Learning Conference
    on Computer Science of the E-Learning Section of the Society for Computer Science
    EV</i>. Koellen Druck + Verlag GmbH, 2015.
  short: H. Pongratz, R. Keil, DeLFI 2015 - The 13th e-Learning Conference on Computer
    Science of the E-Learning Section of the Society for Computer Science EV, Koellen
    Druck + Verlag GmbH, 2015.
date_created: 2021-10-18T20:52:45Z
date_updated: 2022-01-06T06:57:21Z
department:
- _id: '71'
language:
- iso: eng
publication_status: published
publisher: Koellen Druck + Verlag GmbH
series_title: GI-Edition Lecture Notes in Informatics (LNI)
status: public
title: DeLFI 2015 - The 13th e-Learning Conference on Computer Science of the E-Learning
  Section of the Society for Computer Science eV
type: book
user_id: '71124'
year: '2015'
...
---
_id: '26449'
alternative_title:
- 20 years of learning with the World Wide Web - technology and education in dialogue
author:
- first_name: Felix
  full_name: Winkelnkemper, Felix
  id: '3117'
  last_name: Winkelnkemper
- first_name: Andreas
  full_name: Oberhoff, Andreas
  last_name: Oberhoff
citation:
  ama: 'Winkelnkemper F, Oberhoff A. WebArena - R {\ “a} spacious structures for {\”
    u} r the learning locations of the future. In: wedge R, Selke H, eds. Vol 330.
    Publication series of the Heinz Nixdorf Institute, Paderborn; 2015:103-117.'
  apa: Winkelnkemper, F., &#38; Oberhoff, A. (2015). <i>WebArena - R {\ “a} spacious
    structures for {\” u} r the learning locations of the future</i> (R. wedge &#38;
    H. Selke, Eds.; Vol. 330, pp. 103–117). Publication series of the Heinz Nixdorf
    Institute, Paderborn.
  bibtex: '@inproceedings{Winkelnkemper_Oberhoff_2015, title={WebArena - R {\ “a}
    spacious structures for {\” u} r the learning locations of the future}, volume={330},
    publisher={Publication series of the Heinz Nixdorf Institute, Paderborn}, author={Winkelnkemper,
    Felix and Oberhoff, Andreas}, editor={wedge, Reinhard  and Selke, Harald}, year={2015},
    pages={103–117} }'
  chicago: Winkelnkemper, Felix, and Andreas Oberhoff. “WebArena - R {\ ‘A} Spacious
    Structures for {\’ U} r the Learning Locations of the Future.” edited by Reinhard  wedge
    and Harald Selke, 330:103–17. Publication series of the Heinz Nixdorf Institute,
    Paderborn, 2015.
  ieee: F. Winkelnkemper and A. Oberhoff, “WebArena - R {\ ‘a} spacious structures
    for {\’ u} r the learning locations of the future,” 2015, vol. 330, pp. 103–117.
  mla: Winkelnkemper, Felix, and Andreas Oberhoff. <i>WebArena - R {\ “A} Spacious
    Structures for {\” U} r the Learning Locations of the Future</i>. Edited by Reinhard  wedge
    and Harald Selke, vol. 330, Publication series of the Heinz Nixdorf Institute,
    Paderborn, 2015, pp. 103–17.
  short: 'F. Winkelnkemper, A. Oberhoff, in: R. wedge, H. Selke (Eds.), Publication
    series of the Heinz Nixdorf Institute, Paderborn, 2015, pp. 103–117.'
date_created: 2021-10-18T20:56:42Z
date_updated: 2022-01-06T06:57:21Z
department:
- _id: '71'
editor:
- first_name: 'Reinhard '
  full_name: 'wedge, Reinhard '
  last_name: wedge
- first_name: Harald
  full_name: Selke, Harald
  last_name: Selke
intvolume: '       330'
language:
- iso: eng
page: 103-117
publication_status: published
publisher: Publication series of the Heinz Nixdorf Institute, Paderborn
status: public
title: WebArena - R {\ "a} spacious structures for {\" u} r the learning locations
  of the future
type: conference
user_id: '71124'
volume: 330
year: '2015'
...
---
_id: '26531'
citation:
  ama: Keil R, Selke H, eds. <i>20 Years of Learning with the World Wide Web - Technology
    and Education in Dialogue</i>. Vol 330. publishing series of the Heinz Nixdorf
    Institute, Paderborn; 2015.
  apa: Keil, R., &#38; Selke, H. (Eds.). (2015). <i>20 years of learning with the
    World Wide Web - technology and education in dialogue</i> (Vol. 330). publishing
    series of the Heinz Nixdorf Institute, Paderborn.
  bibtex: '@book{Keil_Selke_2015, series={Heinz publishing house series Nixdorf Institute,
    Paderborn}, title={20 years of learning with the World Wide Web - technology and
    education in dialogue}, volume={330}, publisher={publishing series of the Heinz
    Nixdorf Institute, Paderborn}, year={2015}, collection={Heinz publishing house
    series Nixdorf Institute, Paderborn} }'
  chicago: Keil, Reinhard, and Harald Selke, eds. <i>20 Years of Learning with the
    World Wide Web - Technology and Education in Dialogue</i>. Vol. 330. Heinz Publishing
    House Series Nixdorf Institute, Paderborn. publishing series of the Heinz Nixdorf
    Institute, Paderborn, 2015.
  ieee: R. Keil and H. Selke, Eds., <i>20 years of learning with the World Wide Web
    - technology and education in dialogue</i>, vol. 330. publishing series of the
    Heinz Nixdorf Institute, Paderborn, 2015.
  mla: Keil, Reinhard, and Harald Selke, editors. <i>20 Years of Learning with the
    World Wide Web - Technology and Education in Dialogue</i>. publishing series of
    the Heinz Nixdorf Institute, Paderborn, 2015.
  short: R. Keil, H. Selke, eds., 20 Years of Learning with the World Wide Web - Technology
    and Education in Dialogue, publishing series of the Heinz Nixdorf Institute, Paderborn,
    2015.
date_created: 2021-10-19T14:09:39Z
date_updated: 2022-01-06T06:57:22Z
department:
- _id: '71'
editor:
- first_name: Reinhard
  full_name: Keil, Reinhard
  last_name: Keil
- first_name: Harald
  full_name: Selke, Harald
  id: '497'
  last_name: Selke
intvolume: '       330'
language:
- iso: eng
publication_status: published
publisher: publishing series of the Heinz Nixdorf Institute, Paderborn
series_title: Heinz publishing house series Nixdorf Institute, Paderborn
status: public
title: 20 years of learning with the World Wide Web - technology and education in
  dialogue
type: book_editor
user_id: '71124'
volume: 330
year: '2015'
...
---
_id: '26532'
alternative_title:
- 20 years of learning with the World Wide Web - technology and education in dialogue
author:
- first_name: 'Reinhard '
  full_name: 'Keil, Reinhard '
  last_name: Keil
- first_name: Harald
  full_name: Selke, Harald
  id: '497'
  last_name: Selke
citation:
  ama: 'Keil R, Selke H. Learn with, through and {\ "about the WWW. In: Keil R,  Selke
    H, eds. Vol 330. Publishing series of the Heinz Nixdorf Institute, Paderborn;
    2015:1-7.'
  apa: Keil, R., &#38; Selke, H. (2015). <i>Learn with, through and {\ "about the
    WWW</i> (R. Keil &#38; H.  Selke, Eds.; Vol. 330, pp. 1–7). Publishing series
    of the Heinz Nixdorf Institute, Paderborn.
  bibtex: '@inproceedings{Keil_Selke_2015, title={Learn with, through and {\ "about
    the WWW}, volume={330}, publisher={Publishing series of the Heinz Nixdorf Institute,
    Paderborn}, author={Keil, Reinhard  and Selke, Harald}, editor={Keil, Reinhard
    and  Selke, Harald}, year={2015}, pages={1–7} }'
  chicago: Keil, Reinhard , and Harald Selke. “Learn with, through and {\ "about the
    WWW.” edited by Reinhard Keil and Harald  Selke, 330:1–7. Publishing series of
    the Heinz Nixdorf Institute, Paderborn, 2015.
  ieee: R. Keil and H. Selke, “Learn with, through and {\ "about the WWW,” 2015, vol.
    330, pp. 1–7.
  mla: Keil, Reinhard, and Harald Selke. <i>Learn with, through and {\ "about the
    WWW</i>. Edited by Reinhard Keil and Harald  Selke, vol. 330, Publishing series
    of the Heinz Nixdorf Institute, Paderborn, 2015, pp. 1–7.
  short: 'R. Keil, H. Selke, in: R. Keil, H.  Selke (Eds.), Publishing series of the
    Heinz Nixdorf Institute, Paderborn, 2015, pp. 1–7.'
date_created: 2021-10-19T14:13:08Z
date_updated: 2022-01-06T06:57:22Z
department:
- _id: '71'
editor:
- first_name: Reinhard
  full_name: Keil, Reinhard
  last_name: Keil
- first_name: Harald
  full_name: ' Selke, Harald'
  last_name: ' Selke'
intvolume: '       330'
language:
- iso: eng
page: 1-7
publication_status: published
publisher: Publishing series of the Heinz Nixdorf Institute, Paderborn
status: public
title: Learn with, through and {\ "about the WWW
type: conference
user_id: '71124'
volume: 330
year: '2015'
...
---
_id: '26533'
alternative_title:
- 20 years of learning with the World Wide Web - technology and education in dialogue
author:
- first_name: 'Reinhard '
  full_name: 'Keil, Reinhard '
  last_name: Keil
- first_name: Harald
  full_name: Selke, Harald
  id: '497'
  last_name: Selke
citation:
  ama: 'Keil R, Selke H. Virtual knowledge {\ “a} ume - From the presentation of content
    to virtual learning {\” a} tten. In: Keil R, Selke H, eds. Vol 330. publishing
    series of the Heinz Nixdorf Institute, Paderborn; 2015:39-53.'
  apa: Keil, R., &#38; Selke, H. (2015). <i>Virtual knowledge {\ “a} ume - From the
    presentation of content to virtual learning {\” a} tten</i> (R. Keil &#38; H.
    Selke, Eds.; Vol. 330, pp. 39–53). publishing series of the Heinz Nixdorf Institute,
    Paderborn.
  bibtex: '@inproceedings{Keil_Selke_2015, title={Virtual knowledge {\ “a} ume - From
    the presentation of content to virtual learning {\” a} tten}, volume={330}, publisher={publishing
    series of the Heinz Nixdorf Institute, Paderborn}, author={Keil, Reinhard  and
    Selke, Harald}, editor={Keil, Reinhard and Selke, Harald}, year={2015}, pages={39–53}
    }'
  chicago: Keil, Reinhard , and Harald Selke. “Virtual Knowledge {\ ‘A} Ume - From
    the Presentation of Content to Virtual Learning {\’ A} Tten.” edited by Reinhard
    Keil and Harald Selke, 330:39–53. publishing series of the Heinz Nixdorf Institute,
    Paderborn, 2015.
  ieee: R. Keil and H. Selke, “Virtual knowledge {\ ‘a} ume - From the presentation
    of content to virtual learning {\’ a} tten,” 2015, vol. 330, pp. 39–53.
  mla: Keil, Reinhard, and Harald Selke. <i>Virtual Knowledge {\ “A} Ume - From the
    Presentation of Content to Virtual Learning {\” A} Tten</i>. Edited by Reinhard
    Keil and Harald Selke, vol. 330, publishing series of the Heinz Nixdorf Institute,
    Paderborn, 2015, pp. 39–53.
  short: 'R. Keil, H. Selke, in: R. Keil, H. Selke (Eds.), publishing series of the
    Heinz Nixdorf Institute, Paderborn, 2015, pp. 39–53.'
date_created: 2021-10-19T14:19:23Z
date_updated: 2022-01-06T06:57:22Z
department:
- _id: '71'
editor:
- first_name: Reinhard
  full_name: Keil, Reinhard
  last_name: Keil
- first_name: Harald
  full_name: Selke, Harald
  last_name: Selke
intvolume: '       330'
language:
- iso: eng
page: 39-53
publication_status: published
publisher: publishing series of the Heinz Nixdorf Institute, Paderborn
status: public
title: Virtual knowledge {\ "a} ume - From the presentation of content to virtual
  learning {\" a} tten
type: conference
user_id: '71124'
volume: 330
year: '2015'
...
---
_id: '26534'
author:
- first_name: Florian
  full_name: Klompmaker, Florian
  last_name: Klompmaker
citation:
  ama: Klompmaker F. <i>Development of a Structured Process of Interaction Design
    for {\ “U} r Nat {\” U} Local User Interfaces</i>. Universitaetsbibliothek Paderborn;
    2015.
  apa: Klompmaker, F. (2015). <i>Development of a structured process of interaction
    design for {\ “u} r nat {\” u} local user interfaces</i>. Universitaetsbibliothek
    Paderborn.
  bibtex: '@book{Klompmaker_2015, place={Universit {\ "a} t Paderborn, Heinz Nixdorf
    Institute, Contextual Computer Science}, title={Development of a structured process
    of interaction design for {\ “u} r nat {\” u} local user interfaces}, publisher={Universitaetsbibliothek
    Paderborn}, author={Klompmaker, Florian}, year={2015} }'
  chicago: 'Klompmaker, Florian. <i>Development of a Structured Process of Interaction
    Design for {\ “U} r Nat {\” U} Local User Interfaces</i>. Universit {\ "a} t Paderborn,
    Heinz Nixdorf Institute, Contextual Computer Science: Universitaetsbibliothek
    Paderborn, 2015.'
  ieee: 'F. Klompmaker, <i>Development of a structured process of interaction design
    for {\ “u} r nat {\” u} local user interfaces</i>. Universit {\ "a} t Paderborn,
    Heinz Nixdorf Institute, Contextual Computer Science: Universitaetsbibliothek
    Paderborn, 2015.'
  mla: Klompmaker, Florian. <i>Development of a Structured Process of Interaction
    Design for {\ “U} r Nat {\” U} Local User Interfaces</i>. Universitaetsbibliothek
    Paderborn, 2015.
  short: F. Klompmaker, Development of a Structured Process of Interaction Design
    for {\ “U} r Nat {\” U} Local User Interfaces, Universitaetsbibliothek Paderborn,
    Universit {\ "a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer Science,
    2015.
date_created: 2021-10-19T14:22:28Z
date_updated: 2022-01-06T06:57:22Z
department:
- _id: '71'
language:
- iso: eng
place: Universit {\ "a} t Paderborn, Heinz Nixdorf Institute, Contextual Computer
  Science
publication_status: published
publisher: Universitaetsbibliothek Paderborn
status: public
title: Development of a structured process of interaction design for {\ "u} r nat
  {\" u} local user interfaces
type: dissertation
user_id: '71124'
year: '2015'
...
---
_id: '26536'
abstract:
- lang: eng
  text: "Patterns serve to codify design knowledge. By embedding them in a hypothesis-driven
    design, it is possible to develop them further into sample languages. For this
    it is necessary to resolve the underlying conflicts in the form of design hypotheses
    and to validate them empirically in order to enable further use and generalization.
    In this article, an experiment is presented that describes this procedure and
    demonstrates the interplay between theory formation and codification of design
    knowledge using two examples.\r\n"
author:
- first_name: Christian
  full_name: Schild, Christian
  last_name: Schild
- first_name: Vanessa
  full_name: Petrausch, Vanessa
  last_name: Petrausch
citation:
  ama: 'Schild C, Petrausch V. Empirical validation of design patterns. In: <i>Human
    and Computer 2015 - Proceedings</i>. De Gruyter Oldenbourg; 2015:173-182.'
  apa: Schild, C., &#38; Petrausch, V. (2015). Empirical validation of design patterns.
    <i>Human and Computer 2015 - Proceedings</i>, 173–182.
  bibtex: '@inproceedings{Schild_Petrausch_2015, place={Berlin}, title={Empirical
    validation of design patterns}, booktitle={Human and Computer 2015 - Proceedings},
    publisher={De Gruyter Oldenbourg}, author={Schild, Christian and Petrausch, Vanessa},
    year={2015}, pages={173–182} }'
  chicago: 'Schild, Christian, and Vanessa Petrausch. “Empirical Validation of Design
    Patterns.” In <i>Human and Computer 2015 - Proceedings</i>, 173–82. Berlin: De
    Gruyter Oldenbourg, 2015.'
  ieee: C. Schild and V. Petrausch, “Empirical validation of design patterns,” in
    <i>Human and Computer 2015 - Proceedings</i>, 2015, pp. 173–182.
  mla: Schild, Christian, and Vanessa Petrausch. “Empirical Validation of Design Patterns.”
    <i>Human and Computer 2015 - Proceedings</i>, De Gruyter Oldenbourg, 2015, pp.
    173–82.
  short: 'C. Schild, V. Petrausch, in: Human and Computer 2015 - Proceedings, De Gruyter
    Oldenbourg, Berlin, 2015, pp. 173–182.'
date_created: 2021-10-19T14:28:44Z
date_updated: 2022-01-06T06:57:22Z
department:
- _id: '71'
language:
- iso: eng
page: 173-182
place: Berlin
publication: Human and Computer 2015 - Proceedings
publication_status: published
publisher: De Gruyter Oldenbourg
status: public
title: Empirical validation of design patterns
type: conference
user_id: '71124'
year: '2015'
...
---
_id: '266'
abstract:
- lang: eng
  text: 'Many markets have seen a shift from the idea of buying and moved to leasing
    instead. Arguably, the latter has been the major catalyst for their success. Ten
    years ago, research realized this shift and initiated the study of "online leasing
    problems" by introducing leasing to online optimization problems. Resources required
    to provide a service in an "online leasing problem" are no more bought but leased
    for different durations. In this paper, we provide an overview of results that
    contribute to the understanding of "online resource leasing problems". '
author:
- first_name: Christine
  full_name: Markarian, Christine
  id: '37612'
  last_name: Markarian
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
citation:
  ama: 'Markarian C, Meyer auf der Heide F. Online Resource Leasing. In: <i>Proceedings
    of the 2015 ACM Symposium on Principles of Distributed Computing (PODC)</i>. ;
    2015:343-344. doi:<a href="https://doi.org/10.1145/2767386.2767454">10.1145/2767386.2767454</a>'
  apa: Markarian, C., &#38; Meyer auf der Heide, F. (2015). Online Resource Leasing.
    In <i>Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
    (PODC)</i> (pp. 343–344). <a href="https://doi.org/10.1145/2767386.2767454">https://doi.org/10.1145/2767386.2767454</a>
  bibtex: '@inproceedings{Markarian_Meyer auf der Heide_2015, title={Online Resource
    Leasing}, DOI={<a href="https://doi.org/10.1145/2767386.2767454">10.1145/2767386.2767454</a>},
    booktitle={Proceedings of the 2015 ACM Symposium on Principles of Distributed
    Computing (PODC)}, author={Markarian, Christine and Meyer auf der Heide, Friedhelm},
    year={2015}, pages={343–344} }'
  chicago: Markarian, Christine, and Friedhelm Meyer auf der Heide. “Online Resource
    Leasing.” In <i>Proceedings of the 2015 ACM Symposium on Principles of Distributed
    Computing (PODC)</i>, 343–44, 2015. <a href="https://doi.org/10.1145/2767386.2767454">https://doi.org/10.1145/2767386.2767454</a>.
  ieee: C. Markarian and F. Meyer auf der Heide, “Online Resource Leasing,” in <i>Proceedings
    of the 2015 ACM Symposium on Principles of Distributed Computing (PODC)</i>, 2015,
    pp. 343–344.
  mla: Markarian, Christine, and Friedhelm Meyer auf der Heide. “Online Resource Leasing.”
    <i>Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
    (PODC)</i>, 2015, pp. 343–44, doi:<a href="https://doi.org/10.1145/2767386.2767454">10.1145/2767386.2767454</a>.
  short: 'C. Markarian, F. Meyer auf der Heide, in: Proceedings of the 2015 ACM Symposium
    on Principles of Distributed Computing (PODC), 2015, pp. 343–344.'
date_created: 2017-10-17T12:41:44Z
date_updated: 2022-01-06T06:57:22Z
ddc:
- '040'
department:
- _id: '63'
doi: 10.1145/2767386.2767454
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T09:33:11Z
  date_updated: 2018-03-21T09:33:11Z
  file_id: '1478'
  file_name: 266-p343-markarian.pdf
  file_size: 679580
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T09:33:11Z
has_accepted_license: '1'
page: 343-344
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '16'
  name: SFB 901 - Subprojekt C4
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
  (PODC)
status: public
title: Online Resource Leasing
type: conference
user_id: '15504'
year: '2015'
...
---
_id: '267'
author:
- first_name: Christine
  full_name: Markarian, Christine
  id: '37612'
  last_name: Markarian
citation:
  ama: Markarian C. <i>Online Resource Leasing</i>. Universität Paderborn; 2015.
  apa: Markarian, C. (2015). <i>Online Resource Leasing</i>. Universität Paderborn.
  bibtex: '@book{Markarian_2015, title={Online Resource Leasing}, publisher={Universität
    Paderborn}, author={Markarian, Christine}, year={2015} }'
  chicago: Markarian, Christine. <i>Online Resource Leasing</i>. Universität Paderborn,
    2015.
  ieee: C. Markarian, <i>Online Resource Leasing</i>. Universität Paderborn, 2015.
  mla: Markarian, Christine. <i>Online Resource Leasing</i>. Universität Paderborn,
    2015.
  short: C. Markarian, Online Resource Leasing, Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:44Z
date_updated: 2022-01-06T06:57:26Z
ddc:
- '040'
department:
- _id: '63'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T09:33:41Z
  date_updated: 2018-03-21T09:33:41Z
  file_id: '1479'
  file_name: 267-Dissertation_-_Markarian.pdf
  file_size: 1328685
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T09:33:41Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '16'
  name: SFB 901 - Subprojekt C4
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
related_material:
  link:
  - relation: confirmation
    url: http://nbn-resolving.de/urn:nbn:de:hbz:466:2-16656
status: public
supervisor:
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
title: Online Resource Leasing
type: dissertation
user_id: '15415'
year: '2015'
...
---
_id: '269'
abstract:
- lang: eng
  text: Proof-carrying hardware is an approach that has recently been proposed for
    the efficient verification of reconfigurable modules. We present an application
    of proof-carrying hardware to guarantee the correct functionality of dynamically
    reconfigured image processing modules. Our prototype comprises a reconfigurable-system-on-chip
    with an embedded virtual FPGA fabric. This setup allows us to leverage open source
    FPGA synthesis and backend tools to produce FPGA configuration bitstreams with
    an open format and, thus, to demonstrate and experimentally evaluate proof-carrying
    hardware at the bitstream level.
author:
- first_name: Tobias
  full_name: Wiersema, Tobias
  id: '3118'
  last_name: Wiersema
- first_name: Sen
  full_name: Wu, Sen
  last_name: Wu
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: 'Wiersema T, Wu S, Platzner M. On-The-Fly Verification of Reconfigurable Image
    Processing Modules based on a Proof-Carrying Hardware Approach. In: <i>Proceedings
    of the International Symposium in Reconfigurable Computing (ARC)</i>. LNCS. ;
    2015:365--372. doi:<a href="https://doi.org/10.1007/978-3-319-16214-0_32">10.1007/978-3-319-16214-0_32</a>'
  apa: Wiersema, T., Wu, S., &#38; Platzner, M. (2015). On-The-Fly Verification of
    Reconfigurable Image Processing Modules based on a Proof-Carrying Hardware Approach.
    In <i>Proceedings of the International Symposium in Reconfigurable Computing (ARC)</i>
    (pp. 365--372). <a href="https://doi.org/10.1007/978-3-319-16214-0_32">https://doi.org/10.1007/978-3-319-16214-0_32</a>
  bibtex: '@inproceedings{Wiersema_Wu_Platzner_2015, series={LNCS}, title={On-The-Fly
    Verification of Reconfigurable Image Processing Modules based on a Proof-Carrying
    Hardware Approach}, DOI={<a href="https://doi.org/10.1007/978-3-319-16214-0_32">10.1007/978-3-319-16214-0_32</a>},
    booktitle={Proceedings of the International Symposium in Reconfigurable Computing
    (ARC)}, author={Wiersema, Tobias and Wu, Sen and Platzner, Marco}, year={2015},
    pages={365--372}, collection={LNCS} }'
  chicago: Wiersema, Tobias, Sen Wu, and Marco Platzner. “On-The-Fly Verification
    of Reconfigurable Image Processing Modules Based on a Proof-Carrying Hardware
    Approach.” In <i>Proceedings of the International Symposium in Reconfigurable
    Computing (ARC)</i>, 365--372. LNCS, 2015. <a href="https://doi.org/10.1007/978-3-319-16214-0_32">https://doi.org/10.1007/978-3-319-16214-0_32</a>.
  ieee: T. Wiersema, S. Wu, and M. Platzner, “On-The-Fly Verification of Reconfigurable
    Image Processing Modules based on a Proof-Carrying Hardware Approach,” in <i>Proceedings
    of the International Symposium in Reconfigurable Computing (ARC)</i>, 2015, pp.
    365--372.
  mla: Wiersema, Tobias, et al. “On-The-Fly Verification of Reconfigurable Image Processing
    Modules Based on a Proof-Carrying Hardware Approach.” <i>Proceedings of the International
    Symposium in Reconfigurable Computing (ARC)</i>, 2015, pp. 365--372, doi:<a href="https://doi.org/10.1007/978-3-319-16214-0_32">10.1007/978-3-319-16214-0_32</a>.
  short: 'T. Wiersema, S. Wu, M. Platzner, in: Proceedings of the International Symposium
    in Reconfigurable Computing (ARC), 2015, pp. 365--372.'
date_created: 2017-10-17T12:41:44Z
date_updated: 2022-01-06T06:57:30Z
ddc:
- '040'
department:
- _id: '78'
doi: 10.1007/978-3-319-16214-0_32
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T09:32:42Z
  date_updated: 2018-03-21T09:32:42Z
  file_id: '1477'
  file_name: 269-paper_53.pdf
  file_size: 344309
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T09:32:42Z
has_accepted_license: '1'
language:
- iso: eng
page: 365--372
project:
- _id: '1'
  name: SFB 901
- _id: '12'
  name: SFB 901 - Subprojekt B4
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the International Symposium in Reconfigurable Computing
  (ARC)
series_title: LNCS
status: public
title: On-The-Fly Verification of Reconfigurable Image Processing Modules based on
  a Proof-Carrying Hardware Approach
type: conference
user_id: '477'
year: '2015'
...
---
_id: '320'
abstract:
- lang: eng
  text: 'We consider structural and algorithmic questions related to the Nash dynamics
    of weighted congestion games. In weighted congestion games with linear latency
    functions, the existence of pure Nash equilibria is guaranteed by a potential
    function argument. Unfortunately, this proof of existence is inefficient and computing
    pure Nash equilibria in such games is a PLS-hard problem even when all players
    have unit weights. The situation gets worse when superlinear (e.g., quadratic)
    latency functions come into play; in this case, the Nash dynamics of the game
    may contain cycles and pure Nash equilibria may not even exist. Given these obstacles,
    we consider approximate pure Nash equilibria as alternative solution concepts.
    A ρ--approximate pure Nash equilibrium is a state of a (weighted congestion) game
    from which no player has any incentive to deviate in order to improve her cost
    by a multiplicative factor higher than ρ. Do such equilibria exist for small values
    of ρ? And if so, can we compute them efficiently?We provide positive answers to
    both questions for weighted congestion games with polynomial latency functions
    by exploiting an “approximation” of such games by a new class of potential games
    that we call Ψ-games. This allows us to show that these games have d!-approximate
    pure Nash equilibria, where d is the maximum degree of the latency functions.
    Our main technical contribution is an efficient algorithm for computing O(1)-approximate
    pure Nash equilibria when d is a constant. For games with linear latency functions,
    the approximation guarantee is 3+√5/2 + Oγ for arbitrarily small γ > 0; for latency
    functions with maximum degree d≥ 2, it is d2d+o(d). The running time is polynomial
    in the number of bits in the representation of the game and 1/γ. As a byproduct
    of our techniques, we also show the following interesting structural statement
    for weighted congestion games with polynomial latency functions of maximum degree
    d ≥ 2: polynomially-long sequences of best-response moves from any initial state
    to a dO(d2)-approximate pure Nash equilibrium exist and can be efficiently identified
    in such games as long as d is a constant.To the best of our knowledge, these are
    the first positive algorithmic results for approximate pure Nash equilibria in
    weighted congestion games. Our techniques significantly extend our recent work
    on unweighted congestion games through the use of Ψ-games. The concept of approximating
    nonpotential games by potential ones is interesting in itself and might have further
    applications.'
article_number: '2'
author:
- first_name: Ioannis
  full_name: Caragiannis, Ioannis
  last_name: Caragiannis
- first_name: Angelo
  full_name: Fanelli, Angelo
  last_name: Fanelli
- first_name: Nick
  full_name: Gravin, Nick
  last_name: Gravin
- first_name: Alexander
  full_name: Skopalik, Alexander
  id: '40384'
  last_name: Skopalik
citation:
  ama: 'Caragiannis I, Fanelli A, Gravin N, Skopalik A. Approximate Pure Nash Equilibria
    in Weighted Congestion Games: Existence, Efficient Computation, and Structure.
    <i>Transactions on Economics and Computation</i>. 2015;3(1). doi:<a href="https://doi.org/10.1145/2614687">10.1145/2614687</a>'
  apa: 'Caragiannis, I., Fanelli, A., Gravin, N., &#38; Skopalik, A. (2015). Approximate
    Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation,
    and Structure. <i>Transactions on Economics and Computation</i>, <i>3</i>(1).
    <a href="https://doi.org/10.1145/2614687">https://doi.org/10.1145/2614687</a>'
  bibtex: '@article{Caragiannis_Fanelli_Gravin_Skopalik_2015, title={Approximate Pure
    Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation,
    and Structure}, volume={3}, DOI={<a href="https://doi.org/10.1145/2614687">10.1145/2614687</a>},
    number={12}, journal={Transactions on Economics and Computation}, publisher={ACM},
    author={Caragiannis, Ioannis and Fanelli, Angelo and Gravin, Nick and Skopalik,
    Alexander}, year={2015} }'
  chicago: 'Caragiannis, Ioannis, Angelo Fanelli, Nick Gravin, and Alexander Skopalik.
    “Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence, Efficient
    Computation, and Structure.” <i>Transactions on Economics and Computation</i>
    3, no. 1 (2015). <a href="https://doi.org/10.1145/2614687">https://doi.org/10.1145/2614687</a>.'
  ieee: 'I. Caragiannis, A. Fanelli, N. Gravin, and A. Skopalik, “Approximate Pure
    Nash Equilibria in Weighted Congestion Games: Existence, Efficient Computation,
    and Structure,” <i>Transactions on Economics and Computation</i>, vol. 3, no.
    1, 2015.'
  mla: 'Caragiannis, Ioannis, et al. “Approximate Pure Nash Equilibria in Weighted
    Congestion Games: Existence, Efficient Computation, and Structure.” <i>Transactions
    on Economics and Computation</i>, vol. 3, no. 1, 2, ACM, 2015, doi:<a href="https://doi.org/10.1145/2614687">10.1145/2614687</a>.'
  short: I. Caragiannis, A. Fanelli, N. Gravin, A. Skopalik, Transactions on Economics
    and Computation 3 (2015).
date_created: 2017-10-17T12:41:54Z
date_updated: 2022-01-06T06:59:04Z
ddc:
- '040'
department:
- _id: '63'
- _id: '541'
doi: 10.1145/2614687
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:40:55Z
  date_updated: 2018-03-20T07:40:55Z
  file_id: '1433'
  file_name: 320-a2-caragiannis.pdf
  file_size: 260503
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:40:55Z
has_accepted_license: '1'
intvolume: '         3'
issue: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '7'
  name: SFB 901 - Subprojekt A3
- _id: '2'
  name: SFB 901 - Project Area A
publication: Transactions on Economics and Computation
publisher: ACM
status: public
title: 'Approximate Pure Nash Equilibria in Weighted Congestion Games: Existence,
  Efficient Computation, and Structure'
type: journal_article
user_id: '477'
volume: 3
year: '2015'
...
---
_id: '321'
author:
- first_name: Fabian
  full_name: Eidens, Fabian
  id: '25078'
  last_name: Eidens
citation:
  ama: Eidens F. <i>Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption</i>.
    Universität Paderborn; 2015.
  apa: Eidens, F. (2015). <i>Anonymous credential system based on q-Strong Diffie-Hellman
    Assumption</i>. Universität Paderborn.
  bibtex: '@book{Eidens_2015, title={Anonymous credential system based on q-Strong
    Diffie-Hellman Assumption}, publisher={Universität Paderborn}, author={Eidens,
    Fabian}, year={2015} }'
  chicago: Eidens, Fabian. <i>Anonymous Credential System Based on Q-Strong Diffie-Hellman
    Assumption</i>. Universität Paderborn, 2015.
  ieee: F. Eidens, <i>Anonymous credential system based on q-Strong Diffie-Hellman
    Assumption</i>. Universität Paderborn, 2015.
  mla: Eidens, Fabian. <i>Anonymous Credential System Based on Q-Strong Diffie-Hellman
    Assumption</i>. Universität Paderborn, 2015.
  short: F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption,
    Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:54Z
date_updated: 2022-01-06T06:59:05Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:40:22Z
  date_updated: 2018-03-20T07:40:22Z
  file_id: '1432'
  file_name: 321-eidens_masterthesis_01.pdf
  file_size: 879285
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:40:22Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Anonymous credential system based on q-Strong Diffie-Hellman Assumption
type: mastersthesis
user_id: '477'
year: '2015'
...
---
_id: '322'
abstract:
- lang: eng
  text: Reputation systems are used to compute and publish reputation scores for services
    or products. We consider reputation systems where users are allowed to rate products
    that they purchased previously. To obtain trustworthy reputations, they are allowed
    to rate these products only once. As long as users rate products once, they stay
    anonymous. Everybody is able to detect users deviating from the rate-products-only-once
    policy and the anonymity of such dishonest users can be revoked by a system manager.
    In this paper we present formal models for such reputation systems and their security.
    Based on group signatures presented by Boneh, Boyen, and Shacham we design an
    efficient reputation system that meets all our requirements.
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Jakob
  full_name: Juhnke, Jakob
  id: '48090'
  last_name: Juhnke
- first_name: Christina
  full_name: Kolb, Christina
  id: '43647'
  last_name: Kolb
citation:
  ama: 'Blömer J, Juhnke J, Kolb C. Anonymous and Publicly Linkable Reputation Systems.
    In: <i>Proceedings of the 18th International Conference on Financial Cryptography
    and Data Security (FC)</i>. LNCS. ; 2015:478--488. doi:<a href="https://doi.org/10.1007/978-3-662-47854-7_29">10.1007/978-3-662-47854-7_29</a>'
  apa: Blömer, J., Juhnke, J., &#38; Kolb, C. (2015). Anonymous and Publicly Linkable
    Reputation Systems. In <i>Proceedings of the 18th International Conference on
    Financial Cryptography and Data Security (FC)</i> (pp. 478--488). <a href="https://doi.org/10.1007/978-3-662-47854-7_29">https://doi.org/10.1007/978-3-662-47854-7_29</a>
  bibtex: '@inproceedings{Blömer_Juhnke_Kolb_2015, series={LNCS}, title={Anonymous
    and Publicly Linkable Reputation Systems}, DOI={<a href="https://doi.org/10.1007/978-3-662-47854-7_29">10.1007/978-3-662-47854-7_29</a>},
    booktitle={Proceedings of the 18th International Conference on Financial Cryptography
    and Data Security (FC)}, author={Blömer, Johannes and Juhnke, Jakob and Kolb,
    Christina}, year={2015}, pages={478--488}, collection={LNCS} }'
  chicago: Blömer, Johannes, Jakob Juhnke, and Christina Kolb. “Anonymous and Publicly
    Linkable Reputation Systems.” In <i>Proceedings of the 18th International Conference
    on Financial Cryptography and Data Security (FC)</i>, 478--488. LNCS, 2015. <a
    href="https://doi.org/10.1007/978-3-662-47854-7_29">https://doi.org/10.1007/978-3-662-47854-7_29</a>.
  ieee: J. Blömer, J. Juhnke, and C. Kolb, “Anonymous and Publicly Linkable Reputation
    Systems,” in <i>Proceedings of the 18th International Conference on Financial
    Cryptography and Data Security (FC)</i>, 2015, pp. 478--488.
  mla: Blömer, Johannes, et al. “Anonymous and Publicly Linkable Reputation Systems.”
    <i>Proceedings of the 18th International Conference on Financial Cryptography
    and Data Security (FC)</i>, 2015, pp. 478--488, doi:<a href="https://doi.org/10.1007/978-3-662-47854-7_29">10.1007/978-3-662-47854-7_29</a>.
  short: 'J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International
    Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.'
date_created: 2017-10-17T12:41:54Z
date_updated: 2022-01-06T06:59:05Z
ddc:
- '040'
department:
- _id: '64'
doi: 10.1007/978-3-662-47854-7_29
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:39:54Z
  date_updated: 2018-03-20T07:39:54Z
  file_id: '1431'
  file_name: 322-546_01.pdf
  file_size: 499568
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:39:54Z
has_accepted_license: '1'
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2014/546
oa: '1'
page: 478--488
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 18th International Conference on Financial Cryptography
  and Data Security (FC)
series_title: LNCS
status: public
title: Anonymous and Publicly Linkable Reputation Systems
type: conference
user_id: '48090'
year: '2015'
...
---
_id: '323'
abstract:
- lang: eng
  text: On-the-fly composition of service-based software solutions is still a challenging
    task. Even more challenges emerge when facing automatic service composition in
    markets of composed services for end users. In this paper, we focus on the functional
    discrepancy between “what a user wants” specified in terms of a request and “what
    a user gets” when executing a composed service. To meet the challenge of functional
    discrepancy, we propose the combination of existing symbolic composition approaches
    with machine learning techniques. We developed a learning recommendation system
    that expands the capabilities of existing composition algorithms to facilitate
    adaptivity and consequently reduces functional discrepancy. As a representative
    of symbolic techniques, an Artificial Intelligence planning based approach produces
    solutions that are correct with respect to formal specifications. Our learning
    recommendation system supports the symbolic approach in decision-making. Reinforcement
    Learning techniques enable the recommendation system to adjust its recommendation
    strategy over time based on user ratings. We implemented the proposed functionality
    in terms of a prototypical composition framework. Preliminary results from experiments
    conducted in the image processing domain illustrate the benefit of combining both
    complementary techniques.
author:
- first_name: Alexander
  full_name: Jungmann, Alexander
  last_name: Jungmann
- first_name: Felix
  full_name: Mohr, Felix
  last_name: Mohr
citation:
  ama: Jungmann A, Mohr F. An approach towards adaptive service composition in markets
    of composed services. <i>Journal of Internet Services and Applications</i>. 2015;(1):1-18.
    doi:<a href="https://doi.org/10.1186/s13174-015-0022-8">10.1186/s13174-015-0022-8</a>
  apa: Jungmann, A., &#38; Mohr, F. (2015). An approach towards adaptive service composition
    in markets of composed services. <i>Journal of Internet Services and Applications</i>,
    (1), 1–18. <a href="https://doi.org/10.1186/s13174-015-0022-8">https://doi.org/10.1186/s13174-015-0022-8</a>
  bibtex: '@article{Jungmann_Mohr_2015, title={An approach towards adaptive service
    composition in markets of composed services}, DOI={<a href="https://doi.org/10.1186/s13174-015-0022-8">10.1186/s13174-015-0022-8</a>},
    number={1}, journal={Journal of Internet Services and Applications}, publisher={Springer},
    author={Jungmann, Alexander and Mohr, Felix}, year={2015}, pages={1–18} }'
  chicago: 'Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service
    Composition in Markets of Composed Services.” <i>Journal of Internet Services
    and Applications</i>, no. 1 (2015): 1–18. <a href="https://doi.org/10.1186/s13174-015-0022-8">https://doi.org/10.1186/s13174-015-0022-8</a>.'
  ieee: A. Jungmann and F. Mohr, “An approach towards adaptive service composition
    in markets of composed services,” <i>Journal of Internet Services and Applications</i>,
    no. 1, pp. 1–18, 2015.
  mla: Jungmann, Alexander, and Felix Mohr. “An Approach towards Adaptive Service
    Composition in Markets of Composed Services.” <i>Journal of Internet Services
    and Applications</i>, no. 1, Springer, 2015, pp. 1–18, doi:<a href="https://doi.org/10.1186/s13174-015-0022-8">10.1186/s13174-015-0022-8</a>.
  short: A. Jungmann, F. Mohr, Journal of Internet Services and Applications (2015)
    1–18.
date_created: 2017-10-17T12:41:55Z
date_updated: 2022-01-06T06:59:06Z
ddc:
- '040'
department:
- _id: '355'
doi: 10.1186/s13174-015-0022-8
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:39:17Z
  date_updated: 2018-03-20T07:39:17Z
  file_id: '1429'
  file_name: 323-An_approach_towards_adaptive_service_composition_in_markets_of_composed_services.pdf
  file_size: 2842281
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:39:17Z
has_accepted_license: '1'
issue: '1'
language:
- iso: eng
page: 1-18
project:
- _id: '1'
  name: SFB 901
- _id: '10'
  name: SFB 901 - Subprojekt B2
- _id: '3'
  name: SFB 901 - Project Area B
publication: Journal of Internet Services and Applications
publisher: Springer
status: public
title: An approach towards adaptive service composition in markets of composed services
type: journal_article
user_id: '477'
year: '2015'
...
---
_id: '324'
abstract:
- lang: eng
  text: Services are self-contained software components that can beused platform independent
    and that aim at maximizing software reuse. Abasic concern in service oriented
    architectures is to measure the reusabilityof services. One of the most important
    qualities is the functionalreusability, which indicates how relevant the task
    is that a service solves.Current metrics for functional reusability of software,
    however, have verylittle explanatory power and do not accomplish this goal.This
    paper presents a new approach to estimate the functional reusabilityof services
    based on their relevance. To this end, it denes the degreeto which a service enables
    the execution of other services as its contri-bution. Based on the contribution,
    relevance of services is dened as anestimation for their functional reusability.
    Explanatory power is obtainedby normalizing relevance values with a reference
    service. The applicationof the metric to a service test set conrms its supposed
    capabilities.
author:
- first_name: Felix
  full_name: Mohr, Felix
  last_name: Mohr
citation:
  ama: 'Mohr F. A Metric for Functional Reusability of Services. In: <i>Proceedings
    of the 14th International Conference on Software Reuse (ICSR)</i>. LNCS. ; 2015:298--313.
    doi:<a href="https://doi.org/10.1007/978-3-319-14130-5_21">10.1007/978-3-319-14130-5_21</a>'
  apa: Mohr, F. (2015). A Metric for Functional Reusability of Services. In <i>Proceedings
    of the 14th International Conference on Software Reuse (ICSR)</i> (pp. 298--313).
    <a href="https://doi.org/10.1007/978-3-319-14130-5_21">https://doi.org/10.1007/978-3-319-14130-5_21</a>
  bibtex: '@inproceedings{Mohr_2015, series={LNCS}, title={A Metric for Functional
    Reusability of Services}, DOI={<a href="https://doi.org/10.1007/978-3-319-14130-5_21">10.1007/978-3-319-14130-5_21</a>},
    booktitle={Proceedings of the 14th International Conference on Software Reuse
    (ICSR)}, author={Mohr, Felix}, year={2015}, pages={298--313}, collection={LNCS}
    }'
  chicago: Mohr, Felix. “A Metric for Functional Reusability of Services.” In <i>Proceedings
    of the 14th International Conference on Software Reuse (ICSR)</i>, 298--313. LNCS,
    2015. <a href="https://doi.org/10.1007/978-3-319-14130-5_21">https://doi.org/10.1007/978-3-319-14130-5_21</a>.
  ieee: F. Mohr, “A Metric for Functional Reusability of Services,” in <i>Proceedings
    of the 14th International Conference on Software Reuse (ICSR)</i>, 2015, pp. 298--313.
  mla: Mohr, Felix. “A Metric for Functional Reusability of Services.” <i>Proceedings
    of the 14th International Conference on Software Reuse (ICSR)</i>, 2015, pp. 298--313,
    doi:<a href="https://doi.org/10.1007/978-3-319-14130-5_21">10.1007/978-3-319-14130-5_21</a>.
  short: 'F. Mohr, in: Proceedings of the 14th International Conference on Software
    Reuse (ICSR), 2015, pp. 298--313.'
date_created: 2017-10-17T12:41:55Z
date_updated: 2022-01-06T06:59:07Z
ddc:
- '040'
department:
- _id: '355'
doi: 10.1007/978-3-319-14130-5_21
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-20T07:38:44Z
  date_updated: 2018-03-20T07:38:44Z
  file_id: '1428'
  file_name: 324-ICSR-Mohr-15.pdf
  file_size: 569475
  relation: main_file
  success: 1
file_date_updated: 2018-03-20T07:38:44Z
has_accepted_license: '1'
language:
- iso: eng
page: 298--313
project:
- _id: '1'
  name: SFB 901
- _id: '10'
  name: SFB 901 - Subprojekt B2
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 14th International Conference on Software Reuse (ICSR)
series_title: LNCS
status: public
title: A Metric for Functional Reusability of Services
type: conference
user_id: '477'
year: '2015'
...
---
_id: '325'
author:
- first_name: Nils
  full_name: Löken, Nils
  id: '13703'
  last_name: Löken
citation:
  ama: Löken N. <i>A Group Signature Scheme with Distributed Group Management - An
    Application of Threshold Encryption</i>. Universität Paderborn; 2015.
  apa: Löken, N. (2015). <i>A Group Signature Scheme with Distributed Group Management
    - An Application of Threshold Encryption</i>. Universität Paderborn.
  bibtex: '@book{Löken_2015, title={A Group Signature Scheme with Distributed Group
    Management - An Application of Threshold Encryption}, publisher={Universität Paderborn},
    author={Löken, Nils}, year={2015} }'
  chicago: Löken, Nils. <i>A Group Signature Scheme with Distributed Group Management
    - An Application of Threshold Encryption</i>. Universität Paderborn, 2015.
  ieee: N. Löken, <i>A Group Signature Scheme with Distributed Group Management -
    An Application of Threshold Encryption</i>. Universität Paderborn, 2015.
  mla: Löken, Nils. <i>A Group Signature Scheme with Distributed Group Management
    - An Application of Threshold Encryption</i>. Universität Paderborn, 2015.
  short: N. Löken, A Group Signature Scheme with Distributed Group Management - An
    Application of Threshold Encryption, Universität Paderborn, 2015.
date_created: 2017-10-17T12:41:55Z
date_updated: 2022-01-06T06:59:07Z
department:
- _id: '64'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
related_material:
  record:
  - id: '253'
    relation: other
    status: public
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: A Group Signature Scheme with Distributed Group Management - An Application
  of Threshold Encryption
type: mastersthesis
user_id: '477'
year: '2015'
...
