---
_id: '522'
author:
- first_name: Matthias
  full_name: Feldotto, Matthias
  id: '14052'
  last_name: Feldotto
  orcid: 0000-0003-1348-6516
citation:
  ama: 'Feldotto M. <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous
    Bandwidths</i>. Universität Paderborn; 2013.'
  apa: 'Feldotto, M. (2013). <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes
    with Heterogeneous Bandwidths</i>. Universität Paderborn.'
  bibtex: '@book{Feldotto_2013, title={HSkip+: A Self-Stabilizing Overlay Network
    for Nodes with Heterogeneous Bandwidths}, publisher={Universität Paderborn}, author={Feldotto,
    Matthias}, year={2013} }'
  chicago: 'Feldotto, Matthias. <i>HSkip+: A Self-Stabilizing Overlay Network for
    Nodes with Heterogeneous Bandwidths</i>. Universität Paderborn, 2013.'
  ieee: 'M. Feldotto, <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes with
    Heterogeneous Bandwidths</i>. Universität Paderborn, 2013.'
  mla: 'Feldotto, Matthias. <i>HSkip+: A Self-Stabilizing Overlay Network for Nodes
    with Heterogeneous Bandwidths</i>. Universität Paderborn, 2013.'
  short: 'M. Feldotto, HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous
    Bandwidths, Universität Paderborn, 2013.'
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:47Z
department:
- _id: '79'
project:
- _id: '1'
  name: SFB 901
- _id: '2'
  name: SFB 901 - Teilprojekt A
- _id: '5'
  name: SFB 901 - Subprojekt A1
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
title: 'HSkip+: A Self-Stabilizing Overlay Network for Nodes with Heterogeneous Bandwidths'
type: mastersthesis
user_id: '14052'
year: '2013'
...
---
_id: '524'
abstract:
- lang: eng
  text: 'We study the complexity theory for the local distributed setting introduced
    by Korman, Peleg and Fraigniaud. They have defined three complexity classes LD
    (Local Decision), NLD (Nondeterministic Local Decision) and NLD^#n. The class
    LD consists of all languages which can be decided with a constant number of communication
    rounds. The class NLD consists of all languages which can be verified by a nondeterministic
    algorithm with a constant number of communication rounds. In order to define the
    nondeterministic classes, they have transferred the notation of nondeterminism
    into the distributed setting by the use of certificates and verifiers. The class
    NLD^#n consists of all languages which can be verified by a nondeterministic algorithm
    where each node has access to an oracle for the number of nodes. They have shown
    the hierarchy LD subset NLD subset NLD^#n. Our main contributions are strict hierarchies
    within the classes defined by Korman, Peleg and Fraigniaud. We define additional
    complexity classes: the class LD(t) consists of all languages which can be decided
    with at most t communication rounds. The class NLD-O(f) consists of all languages
    which can be verified by a local verifier such that the size of the certificates
    that are needed to verify the language are bounded by a function from O(f). Our
    main results are refined strict hierarchies within these nondeterministic classes.'
author:
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Kamil
  full_name: Swirkot, Kamil
  last_name: Swirkot
citation:
  ama: Meyer auf der Heide F, Swirkot K. Hierarchies in Local Distributed Decision.
    2013.
  apa: Meyer auf der Heide, F., &#38; Swirkot, K. (2013). Hierarchies in Local Distributed
    Decision. arXiv.
  bibtex: '@article{Meyer auf der Heide_Swirkot_2013, title={Hierarchies in Local
    Distributed Decision}, publisher={arXiv}, author={Meyer auf der Heide, Friedhelm
    and Swirkot, Kamil}, year={2013} }'
  chicago: Meyer auf der Heide, Friedhelm, and Kamil Swirkot. “Hierarchies in Local
    Distributed Decision.” arXiv, 2013.
  ieee: F. Meyer auf der Heide and K. Swirkot, “Hierarchies in Local Distributed Decision.”
    arXiv, 2013.
  mla: Meyer auf der Heide, Friedhelm, and Kamil Swirkot. <i>Hierarchies in Local
    Distributed Decision</i>. arXiv, 2013.
  short: F. Meyer auf der Heide, K. Swirkot, (2013).
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:48Z
ddc:
- '040'
department:
- _id: '63'
external_id:
  arxiv:
  - '1311.7229'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:37:07Z
  date_updated: 2018-03-15T10:37:07Z
  file_id: '1296'
  file_name: 524-paper_01.pdf
  file_size: 534906
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:37:07Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publisher: arXiv
status: public
title: Hierarchies in Local Distributed Decision
type: preprint
user_id: '15415'
year: '2013'
...
---
_id: '525'
author:
- first_name: Tim
  full_name: Niklas Vinkemeier, Tim
  last_name: Niklas Vinkemeier
citation:
  ama: Niklas Vinkemeier T. <i>Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios</i>. Universität Paderborn; 2013.
  apa: Niklas Vinkemeier, T. (2013). <i>Haptics - Hadoop performance testing in concurrent
    job scenarios</i>. Universität Paderborn.
  bibtex: '@book{Niklas Vinkemeier_2013, title={Haptics - Hadoop performance testing
    in concurrent job scenarios}, publisher={Universität Paderborn}, author={Niklas
    Vinkemeier, Tim}, year={2013} }'
  chicago: Niklas Vinkemeier, Tim. <i>Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios</i>. Universität Paderborn, 2013.
  ieee: T. Niklas Vinkemeier, <i>Haptics - Hadoop performance testing in concurrent
    job scenarios</i>. Universität Paderborn, 2013.
  mla: Niklas Vinkemeier, Tim. <i>Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios</i>. Universität Paderborn, 2013.
  short: T. Niklas Vinkemeier, Haptics - Hadoop Performance Testing in Concurrent
    Job Scenarios, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:34Z
date_updated: 2022-01-06T07:01:48Z
department:
- _id: '75'
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Haptics - Hadoop performance testing in concurrent job scenarios
type: bachelorsthesis
user_id: '15504'
year: '2013'
...
---
_id: '527'
abstract:
- lang: eng
  text: 'In the future vision of software engineering, services from world-wide markets
    are composed automated in order to build custom-made systems.Supporting such scenarios
    requires an adequate service matching approach.Many existing approaches do not
    fulfill two key requirements of emerging concepts like On-The-Fly-Computing, namely
    (1) comprehensiveness, i.e., the consideration of different service aspects that
    cover not only functional properties, but also non-functional properties and (2)
    fuzzy matching, i.e., the ability to deliver gradual results in order to cope
    with a certain extent of uncertainty, incompleteness, and tolerance ranges.In
    this paper, I present a fuzzy matching process that distinguishes between different
    fuzziness sources and leverages fuzziness in different matching steps which consider
    different service aspects, e.g., behavior and quality properties. '
author:
- first_name: Marie
  full_name: Christin Platenius, Marie
  last_name: Christin Platenius
citation:
  ama: 'Christin Platenius M. Fuzzy Service Matching in On-The-Fly Computing. In:
    <i>Proceedings of the Doctoral Symposium of the 9th Joint Meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>. ; 2013:715-718. doi:<a href="https://doi.org/10.1145/2491411.2492405">10.1145/2491411.2492405</a>'
  apa: Christin Platenius, M. (2013). Fuzzy Service Matching in On-The-Fly Computing.
    In <i>Proceedings of the Doctoral Symposium of the 9th joint meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i> (pp. 715–718). <a href="https://doi.org/10.1145/2491411.2492405">https://doi.org/10.1145/2491411.2492405</a>
  bibtex: '@inproceedings{Christin Platenius_2013, title={Fuzzy Service Matching in
    On-The-Fly Computing}, DOI={<a href="https://doi.org/10.1145/2491411.2492405">10.1145/2491411.2492405</a>},
    booktitle={Proceedings of the Doctoral Symposium of the 9th joint meeting of the
    European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium
    on the Foundations of Software Engineering (FSE)}, author={Christin Platenius,
    Marie}, year={2013}, pages={715–718} }'
  chicago: Christin Platenius, Marie. “Fuzzy Service Matching in On-The-Fly Computing.”
    In <i>Proceedings of the Doctoral Symposium of the 9th Joint Meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>, 715–18, 2013. <a href="https://doi.org/10.1145/2491411.2492405">https://doi.org/10.1145/2491411.2492405</a>.
  ieee: M. Christin Platenius, “Fuzzy Service Matching in On-The-Fly Computing,” in
    <i>Proceedings of the Doctoral Symposium of the 9th joint meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>, 2013, pp. 715–718.
  mla: Christin Platenius, Marie. “Fuzzy Service Matching in On-The-Fly Computing.”
    <i>Proceedings of the Doctoral Symposium of the 9th Joint Meeting of the European
    Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations
    of Software Engineering (FSE)</i>, 2013, pp. 715–18, doi:<a href="https://doi.org/10.1145/2491411.2492405">10.1145/2491411.2492405</a>.
  short: 'M. Christin Platenius, in: Proceedings of the Doctoral Symposium of the
    9th Joint Meeting of the European Software Engineering Conference (ESEC) and the
    ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 2013,
    pp. 715–718.'
date_created: 2017-10-17T12:42:35Z
date_updated: 2022-01-06T07:01:48Z
ddc:
- '040'
department:
- _id: '76'
doi: 10.1145/2491411.2492405
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:36:38Z
  date_updated: 2018-03-15T10:36:38Z
  file_id: '1295'
  file_name: 527-p715-platenius.pdf
  file_size: 730490
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:36:38Z
has_accepted_license: '1'
language:
- iso: eng
page: ' 715-718 '
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the Doctoral Symposium of the 9th joint meeting of the
  European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on
  the Foundations of Software Engineering (FSE)
status: public
title: Fuzzy Service Matching in On-The-Fly Computing
type: conference
user_id: '477'
year: '2013'
...
---
_id: '534'
author:
- first_name: Suhas
  full_name: Satya, Suhas
  last_name: Satya
citation:
  ama: Satya S. <i>Emulating Wavelength Division Multiplexing Using Openflow</i>.
    Universität Paderborn; 2013.
  apa: Satya, S. (2013). <i>Emulating Wavelength Division Multiplexing using Openflow</i>.
    Universität Paderborn.
  bibtex: '@book{Satya_2013, title={Emulating Wavelength Division Multiplexing using
    Openflow}, publisher={Universität Paderborn}, author={Satya, Suhas}, year={2013}
    }'
  chicago: Satya, Suhas. <i>Emulating Wavelength Division Multiplexing Using Openflow</i>.
    Universität Paderborn, 2013.
  ieee: S. Satya, <i>Emulating Wavelength Division Multiplexing using Openflow</i>.
    Universität Paderborn, 2013.
  mla: Satya, Suhas. <i>Emulating Wavelength Division Multiplexing Using Openflow</i>.
    Universität Paderborn, 2013.
  short: S. Satya, Emulating Wavelength Division Multiplexing Using Openflow, Universität
    Paderborn, 2013.
date_created: 2017-10-17T12:42:36Z
date_updated: 2022-01-06T07:01:50Z
department:
- _id: '75'
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Emulating Wavelength Division Multiplexing using Openflow
type: mastersthesis
user_id: '15504'
year: '2013'
...
---
_id: '538'
abstract:
- lang: eng
  text: 'We present a new technique to realize attribute-based encryption (ABE) schemes
    secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our
    approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE
    schemes to achieve more efficient constructions than the known generic constructions
    of CCA-secure ABE schemes. We restrict ourselves to the construction of attribute-based
    key encapsulation mechanisms (KEMs) and present two concrete CCA-secure schemes:
    a key-policy attribute-based KEM that is based on Goyal''s key-policy ABE and
    a ciphertext-policy attribute-based KEM that is based on Waters'' ciphertext-policy
    ABE. To achieve our goals, we use an appropriate hash function and need to extend
    the public parameters and the ciphertexts of the underlying CPA-secure encryption
    schemes only by a single group element. Moreover, we use the same hardness assumptions
    as the underlying CPA-secure encryption schemes.'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Gennadij
  full_name: Liske, Gennadij
  last_name: Liske
citation:
  ama: Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations
    without Random Oracles. 2013.
  apa: Blömer, J., &#38; Liske, G. (2013). Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles. Universität Paderborn.
  bibtex: '@article{Blömer_Liske_2013, title={Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles}, publisher={Universität Paderborn},
    author={Blömer, Johannes and Liske, Gennadij}, year={2013} }'
  chicago: Blömer, Johannes, and Gennadij Liske. “Direct Chosen-Ciphertext Secure
    Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn,
    2013.
  ieee: J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key
    Encapsulations without Random Oracles.” Universität Paderborn, 2013.
  mla: Blömer, Johannes, and Gennadij Liske. <i>Direct Chosen-Ciphertext Secure Attribute-Based
    Key Encapsulations without Random Oracles</i>. Universität Paderborn, 2013.
  short: J. Blömer, G. Liske, (2013).
date_created: 2017-10-17T12:42:37Z
date_updated: 2022-01-06T07:01:51Z
ddc:
- '040'
department:
- _id: '64'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:35:04Z
  date_updated: 2018-03-15T10:35:04Z
  file_id: '1292'
  file_name: 538-AB-KEM_01.pdf
  file_size: 389797
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:35:04Z
has_accepted_license: '1'
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2013/646
oa: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
title: Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without
  Random Oracles
type: preprint
user_id: '25078'
year: '2013'
...
---
_id: '541'
abstract:
- lang: eng
  text: Existing solutions for gossip-based aggregation in peer-to-peer networks use
    epochs to calculate a global estimation from an initial static set of local values.
    Once the estimation converges system-wide, a new epoch is started with fresh initial
    values. Long epochs result in precise estimations based on old measurements and
    short epochs result in imprecise aggregated estimations. In contrast to this approach,
    we present in this paper a continuous, epoch-less approach which considers fresh
    local values in every round of the gossip-based aggregation. By using an approach
    for dynamic information aging, inaccurate values and values from left peers fade
    from the aggregation memory. Evaluation shows that the presented approach for
    continuous information aggregation in peer-to-peer systems monitors the system
    performance precisely, adapts to changes and is lightweight to operate.
author:
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
- first_name: Vitaly
  full_name: Rapp, Vitaly
  last_name: Rapp
citation:
  ama: 'Graffi K, Rapp V. Continuous Gossip-based Aggregation through Dynamic Information
    Aging. In: <i>Proceedings of the International Conference on Computer Communications
    and Networks (ICCCN’13)</i>. ; 2013:1-7. doi:<a href="https://doi.org/10.1109/ICCCN.2013.6614118">10.1109/ICCCN.2013.6614118</a>'
  apa: Graffi, K., &#38; Rapp, V. (2013). Continuous Gossip-based Aggregation through
    Dynamic Information Aging. In <i>Proceedings of the International Conference on
    Computer Communications and Networks (ICCCN’13)</i> (pp. 1–7). <a href="https://doi.org/10.1109/ICCCN.2013.6614118">https://doi.org/10.1109/ICCCN.2013.6614118</a>
  bibtex: '@inproceedings{Graffi_Rapp_2013, title={Continuous Gossip-based Aggregation
    through Dynamic Information Aging}, DOI={<a href="https://doi.org/10.1109/ICCCN.2013.6614118">10.1109/ICCCN.2013.6614118</a>},
    booktitle={Proceedings of the International Conference on Computer Communications
    and Networks (ICCCN’13)}, author={Graffi, Kalman and Rapp, Vitaly}, year={2013},
    pages={1–7} }'
  chicago: Graffi, Kalman, and Vitaly Rapp. “Continuous Gossip-Based Aggregation through
    Dynamic Information Aging.” In <i>Proceedings of the International Conference
    on Computer Communications and Networks (ICCCN’13)</i>, 1–7, 2013. <a href="https://doi.org/10.1109/ICCCN.2013.6614118">https://doi.org/10.1109/ICCCN.2013.6614118</a>.
  ieee: K. Graffi and V. Rapp, “Continuous Gossip-based Aggregation through Dynamic
    Information Aging,” in <i>Proceedings of the International Conference on Computer
    Communications and Networks (ICCCN’13)</i>, 2013, pp. 1–7.
  mla: Graffi, Kalman, and Vitaly Rapp. “Continuous Gossip-Based Aggregation through
    Dynamic Information Aging.” <i>Proceedings of the International Conference on
    Computer Communications and Networks (ICCCN’13)</i>, 2013, pp. 1–7, doi:<a href="https://doi.org/10.1109/ICCCN.2013.6614118">10.1109/ICCCN.2013.6614118</a>.
  short: 'K. Graffi, V. Rapp, in: Proceedings of the International Conference on Computer
    Communications and Networks (ICCCN’13), 2013, pp. 1–7.'
date_created: 2017-10-17T12:42:37Z
date_updated: 2022-01-06T07:01:52Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/ICCCN.2013.6614118
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:33:20Z
  date_updated: 2018-03-15T10:33:20Z
  file_id: '1290'
  file_name: 541-Continuous.Gossip.based.Aggregation.Through.Dynamic.Information.Aging.pdf
  file_size: 272960
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:33:20Z
has_accepted_license: '1'
language:
- iso: eng
page: 1-7
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the International Conference on Computer Communications
  and Networks (ICCCN'13)
status: public
title: Continuous Gossip-based Aggregation through Dynamic Information Aging
type: conference
user_id: '477'
year: '2013'
...
---
_id: '542'
abstract:
- lang: eng
  text: 'We consider the problem of managing a dynamic heterogeneous storagesystem
    in a distributed way so that the amount of data assigned to a hostin that system
    is related to its capacity. Two central problems have to be solvedfor this: (1)
    organizing the hosts in an overlay network with low degree and diameterso that
    one can efficiently check the correct distribution of the data androute between
    any two hosts, and (2) distributing the data among the hosts so thatthe distribution
    respects the capacities of the hosts and can easily be adapted asthe set of hosts
    or their capacities change. We present distributed protocols forthese problems
    that are self-stabilizing and that do not need any global knowledgeabout the system
    such as the number of nodes or the overall capacity of thesystem. Prior to this
    work no solution was known satisfying these properties.'
author:
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Kniesburges S, Koutsopoulos A, Scheideler C. CONE-DHT: A distributed self-stabilizing
    algorithm for a heterogeneous storage system. In: <i>Proceedings of the 27th International
    Symposium on Distributed Computing (DISC)</i>. LNCS. ; 2013:537-549. doi:<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>'
  apa: 'Kniesburges, S., Koutsopoulos, A., &#38; Scheideler, C. (2013). CONE-DHT:
    A distributed self-stabilizing algorithm for a heterogeneous storage system. In
    <i>Proceedings of the 27th International Symposium on Distributed Computing (DISC)</i>
    (pp. 537–549). <a href="https://doi.org/10.1007/978-3-642-41527-2_37">https://doi.org/10.1007/978-3-642-41527-2_37</a>'
  bibtex: '@inproceedings{Kniesburges_Koutsopoulos_Scheideler_2013, series={LNCS},
    title={CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous
    storage system}, DOI={<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>},
    booktitle={Proceedings of the 27th International Symposium on Distributed Computing
    (DISC)}, author={Kniesburges, Sebastian and Koutsopoulos, Andreas and Scheideler,
    Christian}, year={2013}, pages={537–549}, collection={LNCS} }'
  chicago: 'Kniesburges, Sebastian, Andreas Koutsopoulos, and Christian Scheideler.
    “CONE-DHT: A Distributed Self-Stabilizing Algorithm for a Heterogeneous Storage
    System.” In <i>Proceedings of the 27th International Symposium on Distributed
    Computing (DISC)</i>, 537–49. LNCS, 2013. <a href="https://doi.org/10.1007/978-3-642-41527-2_37">https://doi.org/10.1007/978-3-642-41527-2_37</a>.'
  ieee: 'S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “CONE-DHT: A distributed
    self-stabilizing algorithm for a heterogeneous storage system,” in <i>Proceedings
    of the 27th International Symposium on Distributed Computing (DISC)</i>, 2013,
    pp. 537–549.'
  mla: 'Kniesburges, Sebastian, et al. “CONE-DHT: A Distributed Self-Stabilizing Algorithm
    for a Heterogeneous Storage System.” <i>Proceedings of the 27th International
    Symposium on Distributed Computing (DISC)</i>, 2013, pp. 537–49, doi:<a href="https://doi.org/10.1007/978-3-642-41527-2_37">10.1007/978-3-642-41527-2_37</a>.'
  short: 'S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of the 27th
    International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:53Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1007/978-3-642-41527-2_37
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:32:48Z
  date_updated: 2018-03-15T10:32:48Z
  file_id: '1289'
  file_name: 542-CONE-DHT_A_distributed_self-stabilizing_algorithm_for_a_heterogeneous_storage_system.pdf
  file_size: 262302
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:32:48Z
has_accepted_license: '1'
page: 537-549
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 27th International Symposium on Distributed Computing
  (DISC)
series_title: LNCS
status: public
title: 'CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage
  system'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '544'
abstract:
- lang: eng
  text: Comparative evaluations of peer-to-peer protocols through simulations are
    a viable approach to judge the performance and costs of the individual protocols
    in large-scale networks. In order to support this work, we enhanced the peer-to-peer
    systems simulator PeerfactSim.KOM with a fine-grained analyzer concept, with exhaustive
    automated measurements and gnuplot generators as well as a coordination control
    to evaluate a set of experiment setups in parallel. Thus, by configuring all experiments
    and protocols only once and starting the simulator, all desired measurements are
    performed, analyzed, evaluated and combined, resulting in a holistic environment
    for the comparative evaluation of peer-to-peer systems.
author:
- first_name: Matthias
  full_name: Feldotto, Matthias
  id: '14052'
  last_name: Feldotto
  orcid: 0000-0003-1348-6516
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
citation:
  ama: 'Feldotto M, Graffi K. Comparative Evaluation of Peer-to-Peer Systems Using
    PeerfactSim.KOM. In: <i>Proceedings of the International Conference on High Performance
    Computing and Simulation (HPCS’13)</i>. ; 2013:99-106. doi:<a href="https://doi.org/10.1109/HPCSim.2013.6641399">10.1109/HPCSim.2013.6641399</a>'
  apa: Feldotto, M., &#38; Graffi, K. (2013). Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM. In <i>Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13)</i> (pp. 99–106). <a href="https://doi.org/10.1109/HPCSim.2013.6641399">https://doi.org/10.1109/HPCSim.2013.6641399</a>
  bibtex: '@inproceedings{Feldotto_Graffi_2013, title={Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM}, DOI={<a href="https://doi.org/10.1109/HPCSim.2013.6641399">10.1109/HPCSim.2013.6641399</a>},
    booktitle={Proceedings of the International Conference on High Performance Computing
    and Simulation (HPCS’13)}, author={Feldotto, Matthias and Graffi, Kalman}, year={2013},
    pages={99–106} }'
  chicago: Feldotto, Matthias, and Kalman Graffi. “Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM.” In <i>Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13)</i>, 99–106, 2013. <a href="https://doi.org/10.1109/HPCSim.2013.6641399">https://doi.org/10.1109/HPCSim.2013.6641399</a>.
  ieee: M. Feldotto and K. Graffi, “Comparative Evaluation of Peer-to-Peer Systems
    Using PeerfactSim.KOM,” in <i>Proceedings of the International Conference on High
    Performance Computing and Simulation (HPCS’13)</i>, 2013, pp. 99–106.
  mla: Feldotto, Matthias, and Kalman Graffi. “Comparative Evaluation of Peer-to-Peer
    Systems Using PeerfactSim.KOM.” <i>Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13)</i>, 2013, pp. 99–106,
    doi:<a href="https://doi.org/10.1109/HPCSim.2013.6641399">10.1109/HPCSim.2013.6641399</a>.
  short: 'M. Feldotto, K. Graffi, in: Proceedings of the International Conference
    on High Performance Computing and Simulation (HPCS’13), 2013, pp. 99–106.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:53Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/HPCSim.2013.6641399
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:32:17Z
  date_updated: 2018-03-15T10:32:17Z
  file_id: '1288'
  file_name: 544-FeldGraffi13.pdf
  file_size: 899441
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:32:17Z
has_accepted_license: '1'
language:
- iso: eng
page: 99-106
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the International Conference on High Performance Computing
  and Simulation (HPCS'13)
status: public
title: Comparative Evaluation of Peer-to-Peer Systems Using PeerfactSim.KOM
type: conference
user_id: '14052'
year: '2013'
...
---
_id: '546'
abstract:
- lang: eng
  text: Self-stabilization is the property of a system to transfer itself regardless
    of the initial state into a legitimate state. Chord as a simple, decentralized
    and scalable distributed hash table is an ideal showcase to introduce self-stabilization
    for p2p overlays. In this paper, we present Re-Chord, a self-stabilizing version
    of Chord. We show, that the stabilization process is functional, but prone to
    strong churn. For that, we present Ca-Re-Chord, a churn resistant version of Re-Chord,
    that allows the creation of a useful DHT in any kind of graph regardless of the
    initial state. Simulation results attest the churn resistance and good performance
    of Ca-Re-Chord.
author:
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
- first_name: Markus
  full_name: Benter, Markus
  last_name: Benter
- first_name: Mohammad
  full_name: Divband, Mohammad
  last_name: Divband
- first_name: Sebastian
  full_name: Kniesburges, Sebastian
  last_name: Kniesburges
- first_name: Andreas
  full_name: Koutsopoulos, Andreas
  last_name: Koutsopoulos
citation:
  ama: 'Graffi K, Benter M, Divband M, Kniesburges S, Koutsopoulos A. Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network. In: <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i>. ; 2013:27-34. doi:<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>'
  apa: 'Graffi, K., Benter, M., Divband, M., Kniesburges, S., &#38; Koutsopoulos,
    A. (2013). Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network.
    In <i>Proceedings of the Conference on Networked Systems (NetSys)</i> (pp. 27–34).
    <a href="https://doi.org/10.1109/NetSys.2013.11">https://doi.org/10.1109/NetSys.2013.11</a>'
  bibtex: '@inproceedings{Graffi_Benter_Divband_Kniesburges_Koutsopoulos_2013, title={Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network}, DOI={<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>},
    booktitle={Proceedings of the Conference on Networked Systems (NetSys)}, author={Graffi,
    Kalman and Benter, Markus and Divband, Mohammad and Kniesburges, Sebastian and
    Koutsopoulos, Andreas}, year={2013}, pages={27–34} }'
  chicago: 'Graffi, Kalman, Markus Benter, Mohammad Divband, Sebastian Kniesburges,
    and Andreas Koutsopoulos. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord
    Overlay Network.” In <i>Proceedings of the Conference on Networked Systems (NetSys)</i>,
    27–34, 2013. <a href="https://doi.org/10.1109/NetSys.2013.11">https://doi.org/10.1109/NetSys.2013.11</a>.'
  ieee: 'K. Graffi, M. Benter, M. Divband, S. Kniesburges, and A. Koutsopoulos, “Ca-Re-Chord:
    A Churn Resistant Self-stabilizing Chord Overlay Network,” in <i>Proceedings of
    the Conference on Networked Systems (NetSys)</i>, 2013, pp. 27–34.'
  mla: 'Graffi, Kalman, et al. “Ca-Re-Chord: A Churn Resistant Self-Stabilizing Chord
    Overlay Network.” <i>Proceedings of the Conference on Networked Systems (NetSys)</i>,
    2013, pp. 27–34, doi:<a href="https://doi.org/10.1109/NetSys.2013.11">10.1109/NetSys.2013.11</a>.'
  short: 'K. Graffi, M. Benter, M. Divband, S. Kniesburges, A. Koutsopoulos, in: Proceedings
    of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.'
date_created: 2017-10-17T12:42:38Z
date_updated: 2022-01-06T07:01:55Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/NetSys.2013.11
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:30:42Z
  date_updated: 2018-03-15T10:30:42Z
  file_id: '1286'
  file_name: 546-Kalman.Graffi_CaReChord.A.Churn.Resistant.Selfstabilizing.Chord.Overlay.Network_02.pdf
  file_size: 244841
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:30:42Z
has_accepted_license: '1'
page: 27-34
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '13'
  name: SFB 901 - Subproject C1
- _id: '2'
  name: SFB 901 - Project Area A
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the Conference on Networked Systems (NetSys)
status: public
title: 'Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network'
type: conference
user_id: '15504'
year: '2013'
...
---
_id: '547'
abstract:
- lang: eng
  text: 'In recent years, the role of process models in the development of enterprise
    software systems has increased continuously. Today, process models are used at
    different levels in the development process. For instance, in Service-Oriented
    Architectures (SOA), high-level business process models become input for the development
    of IT systems, and in running IT systems executable process models describe choreographies
    of Web Services. A key driver behind this development is the necessity for a closer
    alignment of business and IT requirements, to reduce the reaction times in software
    development to frequent changes in competitive markets.Typically in these scenarios,
    process models are developed, maintained, and transformed in a team environment
    by several stakeholders that are often from different business units, resulting
    in different versions. To obtain integrated process models comprising the changes
    applied to different versions, the versions need to be consolidated by means of
    model change management. Change management for process models can be compared
    to widely used concurrent versioning systems (CVS) and consists of the following
    major activities: matching of process models, detection of differences, computation
    of dependencies and conflicts between differences, and merging of process models.Although
    in general model-driven development (MDD) is accepted as a well-established development
    approach, there are still some shortcomings that let developers decide against
    MDD and for more traditional development paradigms. These shortcomings comprise
    a lack of fully integrated and fully featured development environments for MDD,
    such as a comprehensive support for model change management.In this thesis, we
    present a framework for process model change management. The framework is based
    on an intermediate representation for process models that serves as an abstraction
    of specific process modeling languages and focuses on common syntactic and semantic
    core concepts for the modeling of workflow in process models. Based on the intermediate
    representation, we match process models in versioning scenarios and compute differences
    between process models generically. Further, we consider the analysis of dependencies
    between differences and show how conflicts between differences can be computed
    by taking into account the semantics of the modeling language.As proof-of concept,
    we have implemented major parts of this framework in terms of a prototype. The
    detection of differences and dependencies contributed also to the Compare & Merge
    framework for the IBM WebSphere Business Modeler V 7.0 [1] (WBM), which was released
    as a product in fall 2009.'
author:
- first_name: Christian
  full_name: Gerth, Christian
  last_name: Gerth
citation:
  ama: Gerth C. <i>Business Process Models - Change Management</i>. Universität Paderborn;
    2013. doi:<a href="https://doi.org/10.1007/978-3-642-38604-6">10.1007/978-3-642-38604-6</a>
  apa: Gerth, C. (2013). <i>Business Process Models - Change Management</i>. Universität
    Paderborn. <a href="https://doi.org/10.1007/978-3-642-38604-6">https://doi.org/10.1007/978-3-642-38604-6</a>
  bibtex: '@book{Gerth_2013, title={Business Process Models - Change Management},
    DOI={<a href="https://doi.org/10.1007/978-3-642-38604-6">10.1007/978-3-642-38604-6</a>},
    publisher={Universität Paderborn}, author={Gerth, Christian}, year={2013} }'
  chicago: Gerth, Christian. <i>Business Process Models - Change Management</i>. Universität
    Paderborn, 2013. <a href="https://doi.org/10.1007/978-3-642-38604-6">https://doi.org/10.1007/978-3-642-38604-6</a>.
  ieee: C. Gerth, <i>Business Process Models - Change Management</i>. Universität
    Paderborn, 2013.
  mla: Gerth, Christian. <i>Business Process Models - Change Management</i>. Universität
    Paderborn, 2013, doi:<a href="https://doi.org/10.1007/978-3-642-38604-6">10.1007/978-3-642-38604-6</a>.
  short: C. Gerth, Business Process Models - Change Management, Universität Paderborn,
    2013.
date_created: 2017-10-17T12:42:39Z
date_updated: 2022-01-06T07:01:55Z
department:
- _id: '66'
doi: 10.1007/978-3-642-38604-6
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
title: Business Process Models - Change Management
type: dissertation
user_id: '477'
year: '2013'
...
---
_id: '548'
abstract:
- lang: eng
  text: Peer-to-peer systems scale to millions of nodes and provide routing and storage
    functions with best effort quality. In order to provide a guaranteed quality of
    the overlay functions, even under strong dynamics in the network with regard to
    peer capacities, online participation and usage patterns, we propose to calibrate
    the peer-to-peer overlay and to autonomously learn which qualities can be reached.
    For that, we simulate the peer-to-peer overlay systematically under a wide range
    of parameter configurations and use neural networks to learn the effects of the
    configurations on the quality metrics. Thus, by choosing a specific quality setting
    by the overlay operator, the network can tune itself to the learned parameter
    configurations that lead to the desired quality. Evaluation shows that the presented
    self-calibration succeeds in learning the configuration-quality interdependencies
    and that peer-to-peer systems can learn and adapt their behavior according to
    desired quality goals.
author:
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
- first_name: Timo
  full_name: Klerx, Timo
  last_name: Klerx
citation:
  ama: 'Graffi K, Klerx T. Bootstrapping Skynet: Calibration and Autonomic Self-Control
    of Structured Peer-to-Peer Networks. In: <i>Proceedings of the International Conference
    on Peer-to-Peer Computing (P2P’13)</i>. ; 2013:1-5. doi:<a href="https://doi.org/10.1109/P2P.2013.6688720">10.1109/P2P.2013.6688720</a>'
  apa: 'Graffi, K., &#38; Klerx, T. (2013). Bootstrapping Skynet: Calibration and
    Autonomic Self-Control of Structured Peer-to-Peer Networks. In <i>Proceedings
    of the International Conference on Peer-to-Peer Computing (P2P’13)</i> (pp. 1–5).
    <a href="https://doi.org/10.1109/P2P.2013.6688720">https://doi.org/10.1109/P2P.2013.6688720</a>'
  bibtex: '@inproceedings{Graffi_Klerx_2013, title={Bootstrapping Skynet: Calibration
    and Autonomic Self-Control of Structured Peer-to-Peer Networks}, DOI={<a href="https://doi.org/10.1109/P2P.2013.6688720">10.1109/P2P.2013.6688720</a>},
    booktitle={Proceedings of the International Conference on Peer-to-Peer Computing
    (P2P’13)}, author={Graffi, Kalman and Klerx, Timo}, year={2013}, pages={1–5} }'
  chicago: 'Graffi, Kalman, and Timo Klerx. “Bootstrapping Skynet: Calibration and
    Autonomic Self-Control of Structured Peer-to-Peer Networks.” In <i>Proceedings
    of the International Conference on Peer-to-Peer Computing (P2P’13)</i>, 1–5, 2013.
    <a href="https://doi.org/10.1109/P2P.2013.6688720">https://doi.org/10.1109/P2P.2013.6688720</a>.'
  ieee: 'K. Graffi and T. Klerx, “Bootstrapping Skynet: Calibration and Autonomic
    Self-Control of Structured Peer-to-Peer Networks,” in <i>Proceedings of the International
    Conference on Peer-to-Peer Computing (P2P’13)</i>, 2013, pp. 1–5.'
  mla: 'Graffi, Kalman, and Timo Klerx. “Bootstrapping Skynet: Calibration and Autonomic
    Self-Control of Structured Peer-to-Peer Networks.” <i>Proceedings of the International
    Conference on Peer-to-Peer Computing (P2P’13)</i>, 2013, pp. 1–5, doi:<a href="https://doi.org/10.1109/P2P.2013.6688720">10.1109/P2P.2013.6688720</a>.'
  short: 'K. Graffi, T. Klerx, in: Proceedings of the International Conference on
    Peer-to-Peer Computing (P2P’13), 2013, pp. 1–5.'
date_created: 2017-10-17T12:42:39Z
date_updated: 2022-01-06T07:01:56Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/P2P.2013.6688720
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:30:09Z
  date_updated: 2018-03-15T10:30:09Z
  file_id: '1285'
  file_name: 548-Bootstrapping.Skynet.Calibration.and.Autonomic.Self-Control.of.Structured.P2P.Networks_01.pdf
  file_size: 629234
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:30:09Z
has_accepted_license: '1'
language:
- iso: eng
page: 1-5
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the International Conference on Peer-to-Peer Computing
  (P2P'13)
status: public
title: 'Bootstrapping Skynet: Calibration and Autonomic Self-Control of Structured
  Peer-to-Peer Networks'
type: conference
user_id: '477'
year: '2013'
...
---
_id: '551'
abstract:
- lang: eng
  text: In the service-oriented computing domain, the number of available software
    services steadily increased in recent years, favored by the rise of cloud computing
    with its attached delivery models like Software-as-a-Service (SaaS). To fully
    leverage the opportunities provided by these services for developing highly flexible
    and aligned SOA, integration of new services as well as the substitution of existing
    services must be simplified. As a consequence, approaches for automated and accurate
    service discovery and composition are needed. In this paper, we propose an automatic
    service composition approach as an extension to our earlier work on automatic
    service discovery. To ensure accurate results, it matches service requests and
    available offers based on their structural as well as behavioral aspects. Afterwards,
    possible service compositions are determined by composing service protocols through
    a composition strategy based on labeled transition systems.
author:
- first_name: Zille
  full_name: Huma, Zille
  last_name: Huma
- first_name: Christian
  full_name: Gerth, Christian
  last_name: Gerth
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Oliver
  full_name: Juwig, Oliver
  last_name: Juwig
citation:
  ama: 'Huma Z, Gerth C, Engels G, Juwig O. Automated Service Composition for On-the-Fly
    SOAs. In: <i>Proceedings of the 11th International Conference on Service Oriented
    Computing (ICSOC’13)</i>. LNCS. ; 2013:524--532. doi:<a href="https://doi.org/10.1007/978-3-642-45005-1_42">10.1007/978-3-642-45005-1_42</a>'
  apa: Huma, Z., Gerth, C., Engels, G., &#38; Juwig, O. (2013). Automated Service
    Composition for On-the-Fly SOAs. In <i>Proceedings of the 11th International Conference
    on Service Oriented Computing (ICSOC’13)</i> (pp. 524--532). <a href="https://doi.org/10.1007/978-3-642-45005-1_42">https://doi.org/10.1007/978-3-642-45005-1_42</a>
  bibtex: '@inproceedings{Huma_Gerth_Engels_Juwig_2013, series={LNCS}, title={Automated
    Service Composition for On-the-Fly SOAs}, DOI={<a href="https://doi.org/10.1007/978-3-642-45005-1_42">10.1007/978-3-642-45005-1_42</a>},
    booktitle={Proceedings of the 11th International Conference on Service Oriented
    Computing (ICSOC’13)}, author={Huma, Zille and Gerth, Christian and Engels, Gregor
    and Juwig, Oliver}, year={2013}, pages={524--532}, collection={LNCS} }'
  chicago: Huma, Zille, Christian Gerth, Gregor Engels, and Oliver Juwig. “Automated
    Service Composition for On-the-Fly SOAs.” In <i>Proceedings of the 11th International
    Conference on Service Oriented Computing (ICSOC’13)</i>, 524--532. LNCS, 2013.
    <a href="https://doi.org/10.1007/978-3-642-45005-1_42">https://doi.org/10.1007/978-3-642-45005-1_42</a>.
  ieee: Z. Huma, C. Gerth, G. Engels, and O. Juwig, “Automated Service Composition
    for On-the-Fly SOAs,” in <i>Proceedings of the 11th International Conference on
    Service Oriented Computing (ICSOC’13)</i>, 2013, pp. 524--532.
  mla: Huma, Zille, et al. “Automated Service Composition for On-the-Fly SOAs.” <i>Proceedings
    of the 11th International Conference on Service Oriented Computing (ICSOC’13)</i>,
    2013, pp. 524--532, doi:<a href="https://doi.org/10.1007/978-3-642-45005-1_42">10.1007/978-3-642-45005-1_42</a>.
  short: 'Z. Huma, C. Gerth, G. Engels, O. Juwig, in: Proceedings of the 11th International
    Conference on Service Oriented Computing (ICSOC’13), 2013, pp. 524--532.'
date_created: 2017-10-17T12:42:39Z
date_updated: 2022-01-06T07:01:57Z
ddc:
- '040'
department:
- _id: '66'
doi: 10.1007/978-3-642-45005-1_42
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:31:20Z
  date_updated: 2018-03-15T10:31:20Z
  file_id: '1287'
  file_name: 551-978-3-642-45005-1_42.pdf
  file_size: 384397
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:31:20Z
has_accepted_license: '1'
language:
- iso: eng
page: 524--532
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 11th International Conference on Service Oriented
  Computing (ICSOC'13)
series_title: LNCS
status: public
title: Automated Service Composition for On-the-Fly SOAs
type: conference
user_id: '477'
year: '2013'
...
---
_id: '553'
author:
- first_name: Kathlén
  full_name: Kohn, Kathlén
  last_name: Kohn
citation:
  ama: Kohn K. <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische
    Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn; 2013.
  apa: Kohn, K. (2013). <i>Attributbasierte Verschlüsselung mittels Gittermethoden
    - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität
    Paderborn.
  bibtex: '@book{Kohn_2013, title={Attributbasierte Verschlüsselung mittels Gittermethoden
    - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}, publisher={Universität
    Paderborn}, author={Kohn, Kathlén}, year={2013} }'
  chicago: Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden
    - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität
    Paderborn, 2013.
  ieee: K. Kohn, <i>Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische
    Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn, 2013.
  mla: Kohn, Kathlén. <i>Attributbasierte Verschlüsselung mittels Gittermethoden -
    Mathematische Grundlagen, Verfahren und Sicherheitsbeweise</i>. Universität Paderborn,
    2013.
  short: K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische
    Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:40Z
date_updated: 2022-01-06T07:01:57Z
department:
- _id: '64'
language:
- iso: ger
project:
- _id: '1'
  name: SFB 901
- _id: '13'
  name: SFB 901 - Subprojekt C1
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '43'
  name: Securing the Financial Cloud
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen,
  Verfahren und Sicherheitsbeweise
type: bachelorsthesis
user_id: '477'
year: '2013'
...
---
_id: '555'
author:
- first_name: Alexander
  full_name: Setzer, Alexander
  id: '11108'
  last_name: Setzer
citation:
  ama: Setzer A. <i>Approximation Algorithms for the Linear Arrangement of Special
    Classes of Graphs</i>. Universität Paderborn; 2013.
  apa: Setzer, A. (2013). <i>Approximation Algorithms for the Linear Arrangement of
    Special Classes of Graphs</i>. Universität Paderborn.
  bibtex: '@book{Setzer_2013, title={Approximation Algorithms for the Linear Arrangement
    of Special Classes of Graphs}, publisher={Universität Paderborn}, author={Setzer,
    Alexander}, year={2013} }'
  chicago: Setzer, Alexander. <i>Approximation Algorithms for the Linear Arrangement
    of Special Classes of Graphs</i>. Universität Paderborn, 2013.
  ieee: A. Setzer, <i>Approximation Algorithms for the Linear Arrangement of Special
    Classes of Graphs</i>. Universität Paderborn, 2013.
  mla: Setzer, Alexander. <i>Approximation Algorithms for the Linear Arrangement of
    Special Classes of Graphs</i>. Universität Paderborn, 2013.
  short: A. Setzer, Approximation Algorithms for the Linear Arrangement of Special
    Classes of Graphs, Universität Paderborn, 2013.
date_created: 2017-10-17T12:42:40Z
date_updated: 2022-01-06T07:01:59Z
department:
- _id: '79'
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Universität Paderborn
status: public
title: Approximation Algorithms for the Linear Arrangement of Special Classes of Graphs
type: mastersthesis
user_id: '477'
year: '2013'
...
---
_id: '558'
citation:
  ama: Flocchini P, Gao J, Kranakis E, Meyer auf der Heide F, eds. <i>Algorithms for
    Sensor Systems - 9th International Symposium on Algorithms and Experiments for
    Sensor Systems, Wireless Networks and Distributed Robotics</i>. Vol 8243. Springer;
    2013. doi:<a href="https://doi.org/10.1007/978-3-642-45346-5">10.1007/978-3-642-45346-5</a>
  apa: 'Flocchini, P., Gao, J., Kranakis, E., &#38; Meyer auf der Heide, F. (Eds.).
    (2013). <i>Algorithms for Sensor Systems - 9th International Symposium on Algorithms
    and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics</i>
    (Vol. 8243). Presented at the ALGOSENSORS 2013, Sophia Antipolis, France: Springer.
    <a href="https://doi.org/10.1007/978-3-642-45346-5">https://doi.org/10.1007/978-3-642-45346-5</a>'
  bibtex: '@book{Flocchini_Gao_Kranakis_Meyer auf der Heide_2013, series={LNCS}, title={Algorithms
    for Sensor Systems - 9th International Symposium on Algorithms and Experiments
    for Sensor Systems, Wireless Networks and Distributed Robotics}, volume={8243},
    DOI={<a href="https://doi.org/10.1007/978-3-642-45346-5">10.1007/978-3-642-45346-5</a>},
    publisher={Springer}, year={2013}, collection={LNCS} }'
  chicago: Flocchini, Paola, Jie Gao, Evangelos Kranakis, and Friedhelm Meyer auf
    der Heide, eds. <i>Algorithms for Sensor Systems - 9th International Symposium
    on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed
    Robotics</i>. Vol. 8243. LNCS. Springer, 2013. <a href="https://doi.org/10.1007/978-3-642-45346-5">https://doi.org/10.1007/978-3-642-45346-5</a>.
  ieee: P. Flocchini, J. Gao, E. Kranakis, and F. Meyer auf der Heide, Eds., <i>Algorithms
    for Sensor Systems - 9th International Symposium on Algorithms and Experiments
    for Sensor Systems, Wireless Networks and Distributed Robotics</i>, vol. 8243.
    Springer, 2013.
  mla: Flocchini, Paola, et al., editors. <i>Algorithms for Sensor Systems - 9th International
    Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks
    and Distributed Robotics</i>. Vol. 8243, Springer, 2013, doi:<a href="https://doi.org/10.1007/978-3-642-45346-5">10.1007/978-3-642-45346-5</a>.
  short: P. Flocchini, J. Gao, E. Kranakis, F. Meyer auf der Heide, eds., Algorithms
    for Sensor Systems - 9th International Symposium on Algorithms and Experiments
    for Sensor Systems, Wireless Networks and Distributed Robotics, Springer, 2013.
conference:
  end_date: 2013-09-06
  location: Sophia Antipolis, France
  name: ALGOSENSORS 2013
  start_date: 2013-09-05
date_created: 2017-10-17T12:42:41Z
date_updated: 2022-01-06T07:02:02Z
ddc:
- '000'
department:
- _id: '63'
doi: 10.1007/978-3-642-45346-5
editor:
- first_name: Paola
  full_name: Flocchini, Paola
  last_name: Flocchini
- first_name: Jie
  full_name: Gao, Jie
  last_name: Gao
- first_name: Evangelos
  full_name: Kranakis, Evangelos
  last_name: Kranakis
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T16:29:07Z
  date_updated: 2018-11-02T16:29:07Z
  file_id: '5327'
  file_name: 2014_Book_AlgorithmsForSensorSystems-1.pdf
  file_size: 9186107
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T16:29:07Z
has_accepted_license: '1'
intvolume: '      8243'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publisher: Springer
series_title: LNCS
status: public
title: Algorithms for Sensor Systems - 9th International Symposium on Algorithms and
  Experiments for Sensor Systems, Wireless Networks and Distributed Robotics
type: conference_editor
user_id: '477'
volume: 8243
year: '2013'
...
---
_id: '559'
abstract:
- lang: eng
  text: Distributed hash tables are very versatile to use, as distributed storage
    is a desirable feature for various applications. Typical structured overlays like
    Chord, Pastry or Kademlia consider only homogeneous nodes with equal capacities,
    which does not resemble reality. In a practical use case, nodes might get overloaded
    by storing popular data. In this paper, we present a general approach to enable
    capacity awareness and load-balancing capability of homogeneous structured overlays.
    We introduce a hierarchical second structured overlay aside, which allows efficient
    capacity-based access on the nodes in the system as hosting mirrors. Simulation
    results show that the structured overlay is able to store various contents, such
    as of a social network, with only a negligible number of overloaded peers. Content,
    even if very popular, is hosted by easily findable capable peers. Thus, long-existing
    and well-evaluated overlays like Chord or Pastry can be used to create attractive
    DHT-based applications.
author:
- first_name: Philip
  full_name: Wette, Philip
  last_name: Wette
- first_name: Kalman
  full_name: Graffi, Kalman
  last_name: Graffi
citation:
  ama: 'Wette P, Graffi K. Adding Capacity-Aware Storage Indirection to Homogeneous
    Distributed Hash Tables. In: <i>Proceedings of the Conference on Networked Systems
    (NetSys)</i>. ; 2013:35-42. doi:<a href="https://doi.org/10.1109/NetSys.2013.9">10.1109/NetSys.2013.9</a>'
  apa: Wette, P., &#38; Graffi, K. (2013). Adding Capacity-Aware Storage Indirection
    to Homogeneous Distributed Hash Tables. In <i>Proceedings of the Conference on
    Networked Systems (NetSys)</i> (pp. 35–42). <a href="https://doi.org/10.1109/NetSys.2013.9">https://doi.org/10.1109/NetSys.2013.9</a>
  bibtex: '@inproceedings{Wette_Graffi_2013, title={Adding Capacity-Aware Storage
    Indirection to Homogeneous Distributed Hash Tables}, DOI={<a href="https://doi.org/10.1109/NetSys.2013.9">10.1109/NetSys.2013.9</a>},
    booktitle={Proceedings of the Conference on Networked Systems (NetSys)}, author={Wette,
    Philip and Graffi, Kalman}, year={2013}, pages={35–42} }'
  chicago: Wette, Philip, and Kalman Graffi. “Adding Capacity-Aware Storage Indirection
    to Homogeneous Distributed Hash Tables.” In <i>Proceedings of the Conference on
    Networked Systems (NetSys)</i>, 35–42, 2013. <a href="https://doi.org/10.1109/NetSys.2013.9">https://doi.org/10.1109/NetSys.2013.9</a>.
  ieee: P. Wette and K. Graffi, “Adding Capacity-Aware Storage Indirection to Homogeneous
    Distributed Hash Tables,” in <i>Proceedings of the Conference on Networked Systems
    (NetSys)</i>, 2013, pp. 35–42.
  mla: Wette, Philip, and Kalman Graffi. “Adding Capacity-Aware Storage Indirection
    to Homogeneous Distributed Hash Tables.” <i>Proceedings of the Conference on Networked
    Systems (NetSys)</i>, 2013, pp. 35–42, doi:<a href="https://doi.org/10.1109/NetSys.2013.9">10.1109/NetSys.2013.9</a>.
  short: 'P. Wette, K. Graffi, in: Proceedings of the Conference on Networked Systems
    (NetSys), 2013, pp. 35–42.'
date_created: 2017-10-17T12:42:41Z
date_updated: 2022-01-06T07:02:04Z
ddc:
- '040'
department:
- _id: '79'
doi: 10.1109/NetSys.2013.9
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:27:21Z
  date_updated: 2018-03-15T10:27:21Z
  file_id: '1282'
  file_name: 559-Adding.Capacity.Aware.Storage.Indirection.to.Homogeneous.Distributed.Hash.Tables.pdf
  file_size: 734618
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:27:21Z
has_accepted_license: '1'
language:
- iso: eng
page: 35-42
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the Conference on Networked Systems (NetSys)
status: public
title: Adding Capacity-Aware Storage Indirection to Homogeneous Distributed Hash Tables
type: conference
user_id: '477'
year: '2013'
...
---
_id: '560'
abstract:
- lang: eng
  text: In the last decades, development turned from monolithic software products
    towards more flexible software components that can be provided on world-wide markets
    in form of services. Customers request such services or compositions of several
    services. However, in many cases, discovering the best services to address a given
    request is a tough challenge and requires expressive, gradual matching results,
    considering different aspects of a service description, e.g., inputs/ouputs, protocols,
    or quality properties. Furthermore,in situations in which no service exactly satifies
    the request, approximate matching which can deal with a certain amount of fuzziness
    becomes necessary. There is a wealth of service matching approaches, but it is
    not clear whether there is a comprehensive, fuzzy matching approach which addresses
    all these challenges. Although there are a few service matchingsurveys, none of
    them is able to answer this question. In this paper, we perform a systematic literature
    survey of 35 (outof 504) service matching approaches which consider fuzzy matching.
    Based on this survey, we propose a classication,discuss how different matching
    approaches can be combined into a comprehensive matching method, and identify
    future research challenges.
author:
- first_name: Marie
  full_name: Platenius, Marie
  last_name: Platenius
- first_name: Markus
  full_name: von Detten, Markus
  last_name: von Detten
- first_name: Steffen
  full_name: Becker, Steffen
  last_name: Becker
- first_name: Wilhelm
  full_name: Schäfer, Wilhelm
  last_name: Schäfer
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
citation:
  ama: 'Platenius M, von Detten M, Becker S, Schäfer W, Engels G. A Survey of Fuzzy
    Service Matching Approaches in the Context of On-The-Fly Computing. In: <i>Proceedings
    of the 16th International ACM Sigsoft Symposium on Component-Based Software Engineering</i>.
    ; 2013:143-152. doi:<a href="https://doi.org/10.1145/2465449.2465454">10.1145/2465449.2465454</a>'
  apa: Platenius, M., von Detten, M., Becker, S., Schäfer, W., &#38; Engels, G. (2013).
    A Survey of Fuzzy Service Matching Approaches in the Context of On-The-Fly Computing.
    In <i>Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based
    Software Engineering</i> (pp. 143–152). <a href="https://doi.org/10.1145/2465449.2465454">https://doi.org/10.1145/2465449.2465454</a>
  bibtex: '@inproceedings{Platenius_von Detten_Becker_Schäfer_Engels_2013, title={A
    Survey of Fuzzy Service Matching Approaches in the Context of On-The-Fly Computing},
    DOI={<a href="https://doi.org/10.1145/2465449.2465454">10.1145/2465449.2465454</a>},
    booktitle={Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based
    Software Engineering}, author={Platenius, Marie and von Detten, Markus and Becker,
    Steffen and Schäfer, Wilhelm and Engels, Gregor}, year={2013}, pages={143–152}
    }'
  chicago: Platenius, Marie, Markus von Detten, Steffen Becker, Wilhelm Schäfer, and
    Gregor Engels. “A Survey of Fuzzy Service Matching Approaches in the Context of
    On-The-Fly Computing.” In <i>Proceedings of the 16th International ACM Sigsoft
    Symposium on Component-Based Software Engineering</i>, 143–52, 2013. <a href="https://doi.org/10.1145/2465449.2465454">https://doi.org/10.1145/2465449.2465454</a>.
  ieee: M. Platenius, M. von Detten, S. Becker, W. Schäfer, and G. Engels, “A Survey
    of Fuzzy Service Matching Approaches in the Context of On-The-Fly Computing,”
    in <i>Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based
    Software Engineering</i>, 2013, pp. 143–152.
  mla: Platenius, Marie, et al. “A Survey of Fuzzy Service Matching Approaches in
    the Context of On-The-Fly Computing.” <i>Proceedings of the 16th International
    ACM Sigsoft Symposium on Component-Based Software Engineering</i>, 2013, pp. 143–52,
    doi:<a href="https://doi.org/10.1145/2465449.2465454">10.1145/2465449.2465454</a>.
  short: 'M. Platenius, M. von Detten, S. Becker, W. Schäfer, G. Engels, in: Proceedings
    of the 16th International ACM Sigsoft Symposium on Component-Based Software Engineering,
    2013, pp. 143–152.'
date_created: 2017-10-17T12:42:41Z
date_updated: 2022-01-06T07:02:06Z
ddc:
- '040'
department:
- _id: '66'
- _id: '76'
doi: 10.1145/2465449.2465454
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:26:49Z
  date_updated: 2018-03-15T10:26:49Z
  file_id: '1281'
  file_name: 560-Platenius_et_al_CBSE2013.pdf
  file_size: 570580
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:26:49Z
has_accepted_license: '1'
language:
- iso: eng
page: 143-152
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publication: Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based
  Software Engineering
status: public
title: A Survey of Fuzzy Service Matching Approaches in the Context of On-The-Fly
  Computing
type: conference
user_id: '477'
year: '2013'
...
---
_id: '562'
abstract:
- lang: eng
  text: In Distributed Cloud Computing, applications are deployed across many data
    centres at topologically diverse locations to improved network-related quality
    of service (QoS). As we focus on interactive applications, we minimize the latency
    between users and an application by allocating Cloud resources nearby the customers.
    Allocating resources at all locations will result in the best latency but also
    in the highest expenses. So we need to find an optimal subset of locations which
    reduces the latency but also the expenses – the facility location problem (FLP).
    In addition, we consider resource capacity restrictions, as a resource can only
    serve a limited amount of users. An FLP can be globally solved. Additionally,
    we propose a local, distributed heuristic. This heuristic is running within the
    network and does not depend on a global component. No distributed, local approximations
    for the capacitated FLP have been proposed so far due to the complexity of the
    problem. We compared the heuristic with an optimal solution obtained from a mixed
    integer program for different network topologies. We investigated the influence
    of different parameters like overall resource utilization or different latency
    weights.
author:
- first_name: Matthias
  full_name: Keller, Matthias
  last_name: Keller
- first_name: Stefan
  full_name: Pawlik, Stefan
  last_name: Pawlik
- first_name: Peter
  full_name: Pietrzyk, Peter
  last_name: Pietrzyk
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Keller M, Pawlik S, Pietrzyk P, Karl H. A Local Heuristic for Latency-Optimized
    Distributed Cloud Deployment. In: <i>Proceedings of the 6th International Conference
    on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud Computing</i>.
    ; 2013:429-434. doi:<a href="https://doi.org/10.1109/UCC.2013.85">10.1109/UCC.2013.85</a>'
  apa: Keller, M., Pawlik, S., Pietrzyk, P., &#38; Karl, H. (2013). A Local Heuristic
    for Latency-Optimized Distributed Cloud Deployment. In <i>Proceedings of the 6th
    International Conference on Utility and Cloud Computing (UCC) workshop on Distributed
    cloud computing</i> (pp. 429–434). <a href="https://doi.org/10.1109/UCC.2013.85">https://doi.org/10.1109/UCC.2013.85</a>
  bibtex: '@inproceedings{Keller_Pawlik_Pietrzyk_Karl_2013, title={A Local Heuristic
    for Latency-Optimized Distributed Cloud Deployment}, DOI={<a href="https://doi.org/10.1109/UCC.2013.85">10.1109/UCC.2013.85</a>},
    booktitle={Proceedings of the 6th International Conference on Utility and Cloud
    Computing (UCC) workshop on Distributed cloud computing}, author={Keller, Matthias
    and Pawlik, Stefan and Pietrzyk, Peter and Karl, Holger}, year={2013}, pages={429–434}
    }'
  chicago: Keller, Matthias, Stefan Pawlik, Peter Pietrzyk, and Holger Karl. “A Local
    Heuristic for Latency-Optimized Distributed Cloud Deployment.” In <i>Proceedings
    of the 6th International Conference on Utility and Cloud Computing (UCC) Workshop
    on Distributed Cloud Computing</i>, 429–34, 2013. <a href="https://doi.org/10.1109/UCC.2013.85">https://doi.org/10.1109/UCC.2013.85</a>.
  ieee: M. Keller, S. Pawlik, P. Pietrzyk, and H. Karl, “A Local Heuristic for Latency-Optimized
    Distributed Cloud Deployment,” in <i>Proceedings of the 6th International Conference
    on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing</i>,
    2013, pp. 429–434.
  mla: Keller, Matthias, et al. “A Local Heuristic for Latency-Optimized Distributed
    Cloud Deployment.” <i>Proceedings of the 6th International Conference on Utility
    and Cloud Computing (UCC) Workshop on Distributed Cloud Computing</i>, 2013, pp.
    429–34, doi:<a href="https://doi.org/10.1109/UCC.2013.85">10.1109/UCC.2013.85</a>.
  short: 'M. Keller, S. Pawlik, P. Pietrzyk, H. Karl, in: Proceedings of the 6th International
    Conference on Utility and Cloud Computing (UCC) Workshop on Distributed Cloud
    Computing, 2013, pp. 429–434.'
date_created: 2017-10-17T12:42:41Z
date_updated: 2022-01-06T07:02:11Z
ddc:
- '040'
department:
- _id: '75'
- _id: '63'
doi: 10.1109/UCC.2013.85
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:25:45Z
  date_updated: 2018-03-15T10:25:45Z
  file_id: '1279'
  file_name: 562-dcc13_paper.pdf
  file_size: 347873
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:25:45Z
has_accepted_license: '1'
language:
- iso: eng
page: 429-434
project:
- _id: '1'
  name: SFB 901
- _id: '6'
  name: SFB 901 - Subprojekt A2
- _id: '5'
  name: SFB 901 - Subproject A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 6th International Conference on Utility and Cloud
  Computing (UCC) workshop on Distributed cloud computing
status: public
title: A Local Heuristic for Latency-Optimized Distributed Cloud Deployment
type: conference
user_id: '477'
year: '2013'
...
---
_id: '563'
abstract:
- lang: eng
  text: Dominating set based virtual backbones are used for rou-ting in wireless ad-hoc
    networks. Such backbones receive and transmit messages from/to every node in the
    network. Existing distributed algorithms only consider undirected graphs, which
    model symmetric networks with uniform transmission ranges. We are particularly
    interested in the well-established disk graphs, which model asymmetric networks
    with non-uniform transmission ranges. The corresponding graph theoretic problem
    seeks a strongly connected dominating-absorbent set of minimum cardinality in
    a digraph. A subset of nodes in a digraph is a strongly connected dominating-absorbent
    set if the subgraph induced by these nodes is strongly connected and each node
    in the graph is either in the set or has both an in-neighbor and an out-neighbor
    in it. We introduce the first distributed algorithm for this problem in disk graphs.
    The algorithm gives an O(k^4) -approximation ratio and has a runtime bound of
    O(Diam) where Diam is the diameter of the graph and k denotes the transmission
    ratio r_{max}/r_{min} with r_{max} and r_{min} being the maximum and minimum transmission
    range, respectively. Moreover, we apply our algorithm on the subgraph of disk
    graphs consisting of only bidirectional edges. Our algorithm gives an O(ln k)
    -approximation and a runtime bound of O(k^8 log^∗ n) , which, for bounded k ,
    is an optimal approximation for the problem, following Lenzen and Wattenhofer’s
    Ω(log^∗ n) runtime lower bound for distributed constant approximation in disk
    graphs.
author:
- first_name: Christine
  full_name: Markarian, Christine
  id: '37612'
  last_name: Markarian
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  id: '15523'
  last_name: Meyer auf der Heide
- first_name: Michael
  full_name: Schubert, Michael
  last_name: Schubert
citation:
  ama: 'Markarian C, Meyer auf der Heide F, Schubert M. A Distributed Approximation
    Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless
    Ad-Hoc Networks. In: <i>Proceedings of the 9th International Symposium on Algorithms
    and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics
    (ALGOSENSORS)</i>. LNCS. ; 2013:217-227. doi:<a href="https://doi.org/10.1007/978-3-642-45346-5_16">10.1007/978-3-642-45346-5_16</a>'
  apa: Markarian, C., Meyer auf der Heide, F., &#38; Schubert, M. (2013). A Distributed
    Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric
    Wireless Ad-Hoc Networks. In <i>Proceedings of the 9th International Symposium
    on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed
    Robotics (ALGOSENSORS)</i> (pp. 217–227). <a href="https://doi.org/10.1007/978-3-642-45346-5_16">https://doi.org/10.1007/978-3-642-45346-5_16</a>
  bibtex: '@inproceedings{Markarian_Meyer auf der Heide_Schubert_2013, series={LNCS},
    title={A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent
    Sets in Asymmetric Wireless Ad-Hoc Networks}, DOI={<a href="https://doi.org/10.1007/978-3-642-45346-5_16">10.1007/978-3-642-45346-5_16</a>},
    booktitle={Proceedings of the 9th International Symposium on Algorithms and Experiments
    for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)},
    author={Markarian, Christine and Meyer auf der Heide, Friedhelm and Schubert,
    Michael}, year={2013}, pages={217–227}, collection={LNCS} }'
  chicago: Markarian, Christine, Friedhelm Meyer auf der Heide, and Michael Schubert.
    “A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent
    Sets in Asymmetric Wireless Ad-Hoc Networks.” In <i>Proceedings of the 9th International
    Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks
    and Distributed Robotics (ALGOSENSORS)</i>, 217–27. LNCS, 2013. <a href="https://doi.org/10.1007/978-3-642-45346-5_16">https://doi.org/10.1007/978-3-642-45346-5_16</a>.
  ieee: C. Markarian, F. Meyer auf der Heide, and M. Schubert, “A Distributed Approximation
    Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless
    Ad-Hoc Networks,” in <i>Proceedings of the 9th International Symposium on Algorithms
    and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics
    (ALGOSENSORS)</i>, 2013, pp. 217–227.
  mla: Markarian, Christine, et al. “A Distributed Approximation Algorithm for Strongly
    Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks.” <i>Proceedings
    of the 9th International Symposium on Algorithms and Experiments for Sensor Systems,
    Wireless Networks and Distributed Robotics (ALGOSENSORS)</i>, 2013, pp. 217–27,
    doi:<a href="https://doi.org/10.1007/978-3-642-45346-5_16">10.1007/978-3-642-45346-5_16</a>.
  short: 'C. Markarian, F. Meyer auf der Heide, M. Schubert, in: Proceedings of the
    9th International Symposium on Algorithms and Experiments for Sensor Systems,
    Wireless Networks and Distributed Robotics (ALGOSENSORS), 2013, pp. 217–227.'
date_created: 2017-10-17T12:42:42Z
date_updated: 2022-01-06T07:02:13Z
ddc:
- '040'
department:
- _id: '63'
doi: 10.1007/978-3-642-45346-5_16
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-15T10:25:15Z
  date_updated: 2018-03-15T10:25:15Z
  file_id: '1278'
  file_name: 563-978-3-642-45346-5_16.pdf
  file_size: 348191
  relation: main_file
  success: 1
file_date_updated: 2018-03-15T10:25:15Z
has_accepted_license: '1'
page: 217-227
project:
- _id: '1'
  name: SFB 901
- _id: '5'
  name: SFB 901 - Subprojekt A1
- _id: '2'
  name: SFB 901 - Project Area A
publication: Proceedings of the 9th International Symposium on Algorithms and Experiments
  for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS)
series_title: LNCS
status: public
title: A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent
  Sets in Asymmetric Wireless Ad-Hoc Networks
type: conference
user_id: '477'
year: '2013'
...
