--- _id: '17084' author: - first_name: Nils full_name: Weidmann, Nils id: '53103' last_name: Weidmann - first_name: Anthony full_name: Anjorin, Anthony last_name: Anjorin citation: ama: 'Weidmann N, Anjorin A. Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming. In: Wehrheim H, Cabot J, eds. Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020. Cham: Springer; 2020. doi:10.1007/978-3-030-45234-6_16' apa: 'Weidmann, N., & Anjorin, A. (2020). Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming. In H. Wehrheim & J. Cabot (Eds.), Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020. Cham: Springer. https://doi.org/10.1007/978-3-030-45234-6_16' bibtex: '@inproceedings{Weidmann_Anjorin_2020, place={Cham}, title={Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming}, DOI={10.1007/978-3-030-45234-6_16}, booktitle={Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020}, publisher={Springer}, author={Weidmann, Nils and Anjorin, Anthony}, editor={Wehrheim, Heike and Cabot, JordiEditors}, year={2020} }' chicago: 'Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming.” In Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, edited by Heike Wehrheim and Jordi Cabot. Cham: Springer, 2020. https://doi.org/10.1007/978-3-030-45234-6_16.' ieee: N. Weidmann and A. Anjorin, “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming,” in Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, Dublin, Ireland, 2020. mla: Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming.” Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, edited by Heike Wehrheim and Jordi Cabot, Springer, 2020, doi:10.1007/978-3-030-45234-6_16. short: 'N. Weidmann, A. Anjorin, in: H. Wehrheim, J. Cabot (Eds.), Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, Springer, Cham, 2020.' conference: end_date: 2020-04-30 location: Dublin, Ireland name: Fundamental Approaches to Software Engineering - 23rd International Conference, FASE 2020 start_date: 2020-04-25 date_created: 2020-06-06T09:50:42Z date_updated: 2022-01-06T06:53:04Z department: - _id: '28' - _id: '66' - _id: '534' doi: 10.1007/978-3-030-45234-6_16 editor: - first_name: Heike full_name: Wehrheim, Heike last_name: Wehrheim - first_name: Jordi full_name: Cabot, Jordi last_name: Cabot language: - iso: eng place: Cham publication: Proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020 publication_identifier: isbn: - '9783030452339' - '9783030452346' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer status: public title: Schema Compliant Consistency Management via Triple Graph Grammars and Integer Linear Programming type: conference user_id: '53103' year: '2020' ... --- _id: '17085' author: - first_name: Bahar full_name: Schwichtenberg, Bahar id: '36399' last_name: Schwichtenberg - first_name: Simon full_name: Schwichtenberg, Simon id: '13235' last_name: Schwichtenberg - first_name: Jochen full_name: Küster, Jochen last_name: Küster - first_name: Olaf full_name: Zimmermann, Olaf last_name: Zimmermann - first_name: Gregor full_name: Engels, Gregor id: '107' last_name: Engels citation: ama: 'Schwichtenberg B, Schwichtenberg S, Küster J, Zimmermann O, Engels G. Modeling and Analyzing Architectural Diversity of Open Platforms. In: Advanced Information Systems Engineering. Cham; 2020. doi:10.1007/978-3-030-49435-3_3' apa: Schwichtenberg, B., Schwichtenberg, S., Küster, J., Zimmermann, O., & Engels, G. (2020). Modeling and Analyzing Architectural Diversity of Open Platforms. In Advanced Information Systems Engineering. Cham. https://doi.org/10.1007/978-3-030-49435-3_3 bibtex: '@inproceedings{Schwichtenberg_Schwichtenberg_Küster_Zimmermann_Engels_2020, place={Cham}, title={Modeling and Analyzing Architectural Diversity of Open Platforms}, DOI={10.1007/978-3-030-49435-3_3}, booktitle={Advanced Information Systems Engineering}, author={Schwichtenberg, Bahar and Schwichtenberg, Simon and Küster, Jochen and Zimmermann, Olaf and Engels, Gregor}, year={2020} }' chicago: Schwichtenberg, Bahar, Simon Schwichtenberg, Jochen Küster, Olaf Zimmermann, and Gregor Engels. “Modeling and Analyzing Architectural Diversity of Open Platforms.” In Advanced Information Systems Engineering. Cham, 2020. https://doi.org/10.1007/978-3-030-49435-3_3. ieee: B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, and G. Engels, “Modeling and Analyzing Architectural Diversity of Open Platforms,” in Advanced Information Systems Engineering, 2020. mla: Schwichtenberg, Bahar, et al. “Modeling and Analyzing Architectural Diversity of Open Platforms.” Advanced Information Systems Engineering, 2020, doi:10.1007/978-3-030-49435-3_3. short: 'B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, G. Engels, in: Advanced Information Systems Engineering, Cham, 2020.' date_created: 2020-06-07T08:53:10Z date_updated: 2022-01-06T06:53:04Z doi: 10.1007/978-3-030-49435-3_3 language: - iso: eng place: Cham publication: Advanced Information Systems Engineering publication_identifier: isbn: - '9783030494346' - '9783030494353' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Modeling and Analyzing Architectural Diversity of Open Platforms type: conference user_id: '36399' year: '2020' ... --- _id: '28997' abstract: - lang: eng text: "Modern cryptographic protocols, such as TLS 1.3 and QUIC, can send cryptographically protected data in “zero round-trip times (0-RTT)”, that is, without the need for a prior interactive handshake. Such protocols meet the demand for communication with minimal latency, but those currently deployed in practice achieve only rather weak security properties, as they may not achieve forward security for the first transmitted payload message and require additional countermeasures against replay attacks.Recently, 0-RTT protocols with full forward security and replay resilience have been proposed in the academic literature. These are based on puncturable encryption, which uses rather heavy building blocks, such as cryptographic pairings. Some constructions were claimed to have practical efficiency, but it is unclear how they compare concretely to protocols deployed in practice, and we currently do not have any benchmark results that new protocols can be compared with.We provide the first concrete performance analysis of a modern 0-RTT protocol with full forward security, by integrating the Bloom Filter Encryption scheme of Derler et al. (EUROCRYPT 2018) in the Chromium QUIC implementation and comparing it to Google’s original QUIC protocol. We find that for reasonable deployment parameters, the server CPU load increases approximately by a factor of eight and the memory consumption on the server increases significantly, but stays below 400 MB even for medium-scale deployments that handle up to 50K connections per day. The difference of the size of handshake messages is small enough that transmission time on the network is identical, and therefore not significant.We conclude that while current 0-RTT protocols with full forward security come with significant computational overhead, their use in practice is feasible, and may be used in applications where the increased CPU and memory load can be tolerated in exchange for full forward security and replay resilience on the cryptographic protocol level. Our results serve as a first benchmark that can be used to assess the efficiency of 0-RTT protocols potentially developed in the future.\r\n" author: - first_name: Fynn full_name: Dallmeier, Fynn last_name: Dallmeier - first_name: Jan P. full_name: Drees, Jan P. last_name: Drees - first_name: Kai full_name: Gellert, Kai last_name: Gellert - first_name: Tobias full_name: Handirk, Tobias last_name: Handirk - first_name: Tibor full_name: Jager, Tibor last_name: Jager - first_name: Jonas full_name: Klauke, Jonas id: '40915' last_name: Klauke orcid: 0000-0001-9160-9636 - first_name: Simon full_name: Nachtigall, Simon last_name: Nachtigall - first_name: Timo full_name: Renzelmann, Timo last_name: Renzelmann - first_name: Rudi full_name: Wolf, Rudi last_name: Wolf citation: ama: 'Dallmeier F, Drees JP, Gellert K, et al. Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. In: Cryptology and Network Security. Springer-Verlag; 2020:211-231. doi:10.1007/978-3-030-65411-5_11' apa: 'Dallmeier, F., Drees, J. P., Gellert, K., Handirk, T., Jager, T., Klauke, J., Nachtigall, S., Renzelmann, T., & Wolf, R. (2020). Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC. Cryptology and Network Security, 211–231. https://doi.org/10.1007/978-3-030-65411-5_11' bibtex: '@inproceedings{Dallmeier_Drees_Gellert_Handirk_Jager_Klauke_Nachtigall_Renzelmann_Wolf_2020, place={Cham}, title={Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC}, DOI={10.1007/978-3-030-65411-5_11}, booktitle={Cryptology and Network Security}, publisher={Springer-Verlag}, author={Dallmeier, Fynn and Drees, Jan P. and Gellert, Kai and Handirk, Tobias and Jager, Tibor and Klauke, Jonas and Nachtigall, Simon and Renzelmann, Timo and Wolf, Rudi}, year={2020}, pages={211–231} }' chicago: 'Dallmeier, Fynn, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, and Rudi Wolf. “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.” In Cryptology and Network Security, 211–31. Cham: Springer-Verlag, 2020. https://doi.org/10.1007/978-3-030-65411-5_11.' ieee: 'F. Dallmeier et al., “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC,” in Cryptology and Network Security, Vienna, 2020, pp. 211–231, doi: 10.1007/978-3-030-65411-5_11.' mla: 'Dallmeier, Fynn, et al. “Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.” Cryptology and Network Security, Springer-Verlag, 2020, pp. 211–31, doi:10.1007/978-3-030-65411-5_11.' short: 'F. Dallmeier, J.P. Drees, K. Gellert, T. Handirk, T. Jager, J. Klauke, S. Nachtigall, T. Renzelmann, R. Wolf, in: Cryptology and Network Security, Springer-Verlag, Cham, 2020, pp. 211–231.' conference: end_date: 2020-12-16 location: Vienna name: CANS 2020 start_date: 2020-12-14 date_created: 2021-12-15T17:43:11Z date_updated: 2022-03-11T10:59:41Z doi: 10.1007/978-3-030-65411-5_11 extern: '1' language: - iso: eng page: 211-231 place: Cham publication: Cryptology and Network Security publication_identifier: isbn: - '9783030654108' - '9783030654115' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer-Verlag status: public title: 'Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC' type: conference user_id: '40915' year: '2020' ... --- _id: '20706' author: - first_name: Philipp full_name: zur Heiden, Philipp last_name: zur Heiden citation: ama: 'zur Heiden P. Considering Context in Design Science Research: A Systematic Literature Review. In: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. ; 2020. doi:10.1007/978-3-030-64823-7_21' apa: 'zur Heiden, P. (2020). Considering Context in Design Science Research: A Systematic Literature Review. Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. https://doi.org/10.1007/978-3-030-64823-7_21' bibtex: '@inproceedings{zur Heiden_2020, place={Cham}, title={Considering Context in Design Science Research: A Systematic Literature Review}, DOI={10.1007/978-3-030-64823-7_21}, booktitle={Designing for Digital Transformation. Co-Creating Services with Citizens and Industry}, author={zur Heiden, Philipp}, year={2020} }' chicago: 'Heiden, Philipp zur. “Considering Context in Design Science Research: A Systematic Literature Review.” In Designing for Digital Transformation. Co-Creating Services with Citizens and Industry. Cham, 2020. https://doi.org/10.1007/978-3-030-64823-7_21.' ieee: 'P. zur Heiden, “Considering Context in Design Science Research: A Systematic Literature Review,” 2020, doi: 10.1007/978-3-030-64823-7_21.' mla: 'zur Heiden, Philipp. “Considering Context in Design Science Research: A Systematic Literature Review.” Designing for Digital Transformation. Co-Creating Services with Citizens and Industry, 2020, doi:10.1007/978-3-030-64823-7_21.' short: 'P. zur Heiden, in: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry, Cham, 2020.' date_created: 2020-12-11T14:01:48Z date_updated: 2022-04-04T09:59:49Z doi: 10.1007/978-3-030-64823-7_21 language: - iso: eng place: Cham publication: Designing for Digital Transformation. Co-Creating Services with Citizens and Industry publication_identifier: isbn: - '9783030648220' - '9783030648237' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: 'Considering Context in Design Science Research: A Systematic Literature Review' type: conference user_id: '64394' year: '2020' ... --- _id: '45848' author: - first_name: Yasir full_name: Mahmood, Yasir last_name: Mahmood - first_name: Arne full_name: Meier, Arne last_name: Meier citation: ama: 'Mahmood Y, Meier A. Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic. In: Lecture Notes in Computer Science. Springer International Publishing; 2020. doi:10.1007/978-3-030-39951-1_10' apa: Mahmood, Y., & Meier, A. (2020). Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic. Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-030-39951-1_10 bibtex: '@inproceedings{Mahmood_Meier_2020, place={Cham}, title={Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic}, DOI={10.1007/978-3-030-39951-1_10}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Mahmood, Yasir and Meier, Arne}, year={2020} }' chicago: 'Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic.” In Lecture Notes in Computer Science. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-39951-1_10.' ieee: 'Y. Mahmood and A. Meier, “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic,” 2020, doi: 10.1007/978-3-030-39951-1_10.' mla: Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic.” Lecture Notes in Computer Science, Springer International Publishing, 2020, doi:10.1007/978-3-030-39951-1_10. short: 'Y. Mahmood, A. Meier, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, 2020.' date_created: 2023-07-03T11:41:58Z date_updated: 2023-07-03T11:43:37Z doi: 10.1007/978-3-030-39951-1_10 language: - iso: eng place: Cham publication: Lecture Notes in Computer Science publication_identifier: isbn: - '9783030399504' - '9783030399511' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Parameterised Complexity of Model Checking and Satisfiability in Propositional Dependence Logic type: conference user_id: '99353' year: '2020' ... --- _id: '47261' author: - first_name: Julie M. full_name: Haney, Julie M. last_name: Haney - first_name: Susanne M. full_name: Furman, Susanne M. last_name: Furman - first_name: Yasemin full_name: Acar, Yasemin id: '94636' last_name: Acar citation: ama: 'Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In: HCI for Cybersecurity, Privacy and Trust. Springer International Publishing; 2020. doi:10.1007/978-3-030-50309-3_26' apa: 'Haney, J. M., Furman, S. M., & Acar, Y. (2020). Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing. https://doi.org/10.1007/978-3-030-50309-3_26' bibtex: '@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={10.1007/978-3-030-50309-3_26}, booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin}, year={2020} }' chicago: 'Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-50309-3_26.' ieee: 'J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges,” in HCI for Cybersecurity, Privacy and Trust, Cham: Springer International Publishing, 2020.' mla: 'Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, 2020, doi:10.1007/978-3-030-50309-3_26.' short: 'J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, Cham, 2020.' date_created: 2023-09-22T12:59:53Z date_updated: 2023-11-22T09:57:52Z department: - _id: '34' - _id: '740' doi: 10.1007/978-3-030-50309-3_26 extern: '1' language: - iso: eng place: Cham publication: HCI for Cybersecurity, Privacy and Trust publication_identifier: isbn: - '9783030503086' - '9783030503093' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: 'Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges' type: book_chapter user_id: '15458' year: '2020' ... --- _id: '11952' author: - first_name: Björn full_name: Senft, Björn id: '9109' last_name: Senft - first_name: Florian full_name: Rittmeier, Florian id: '5281' last_name: Rittmeier - first_name: Holger Gerhard full_name: Fischer, Holger Gerhard id: '30457' last_name: Fischer - first_name: Simon full_name: Oberthür, Simon id: '383' last_name: Oberthür citation: ama: 'Senft B, Rittmeier F, Fischer HG, Oberthür S. A Value-Centered Approach for Unique and Novel Software Applications. In: Design, User Experience, and Usability. Practice and Case Studies. Cham; 2019. doi:10.1007/978-3-030-23535-2_27' apa: Senft, B., Rittmeier, F., Fischer, H. G., & Oberthür, S. (2019). A Value-Centered Approach for Unique and Novel Software Applications. In Design, User Experience, and Usability. Practice and Case Studies. Cham. https://doi.org/10.1007/978-3-030-23535-2_27 bibtex: '@inbook{Senft_Rittmeier_Fischer_Oberthür_2019, place={Cham}, title={A Value-Centered Approach for Unique and Novel Software Applications}, DOI={10.1007/978-3-030-23535-2_27}, booktitle={Design, User Experience, and Usability. Practice and Case Studies}, author={Senft, Björn and Rittmeier, Florian and Fischer, Holger Gerhard and Oberthür, Simon}, year={2019} }' chicago: Senft, Björn, Florian Rittmeier, Holger Gerhard Fischer, and Simon Oberthür. “A Value-Centered Approach for Unique and Novel Software Applications.” In Design, User Experience, and Usability. Practice and Case Studies. Cham, 2019. https://doi.org/10.1007/978-3-030-23535-2_27. ieee: B. Senft, F. Rittmeier, H. G. Fischer, and S. Oberthür, “A Value-Centered Approach for Unique and Novel Software Applications,” in Design, User Experience, and Usability. Practice and Case Studies, Cham, 2019. mla: Senft, Björn, et al. “A Value-Centered Approach for Unique and Novel Software Applications.” Design, User Experience, and Usability. Practice and Case Studies, 2019, doi:10.1007/978-3-030-23535-2_27. short: 'B. Senft, F. Rittmeier, H.G. Fischer, S. Oberthür, in: Design, User Experience, and Usability. Practice and Case Studies, Cham, 2019.' conference: end_date: 2019-07-31 location: Orlando, FL, USA name: 21st International Conference on Human-Computer Interaction start_date: 2019-07-26 date_created: 2019-07-14T07:57:53Z date_updated: 2022-01-06T06:51:13Z department: - _id: '66' doi: 10.1007/978-3-030-23535-2_27 language: - iso: eng place: Cham publication: Design, User Experience, and Usability. Practice and Case Studies publication_identifier: isbn: - '9783030235345' - '9783030235352' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: A Value-Centered Approach for Unique and Novel Software Applications type: book_chapter user_id: '9109' year: '2019' ... --- _id: '14890' author: - first_name: Stefan full_name: Kuhlemann, Stefan id: '38910' last_name: Kuhlemann - first_name: Meinolf full_name: Sellmann, Meinolf last_name: Sellmann - first_name: Kevin full_name: Tierney, Kevin last_name: Tierney citation: ama: 'Kuhlemann S, Sellmann M, Tierney K. Exploiting Counterfactuals for Scalable Stochastic Optimization. In: Lecture Notes in Computer Science. Cham; 2019. doi:10.1007/978-3-030-30048-7_40' apa: Kuhlemann, S., Sellmann, M., & Tierney, K. (2019). Exploiting Counterfactuals for Scalable Stochastic Optimization. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-030-30048-7_40 bibtex: '@inbook{Kuhlemann_Sellmann_Tierney_2019, place={Cham}, title={Exploiting Counterfactuals for Scalable Stochastic Optimization}, DOI={10.1007/978-3-030-30048-7_40}, booktitle={Lecture Notes in Computer Science}, author={Kuhlemann, Stefan and Sellmann, Meinolf and Tierney, Kevin}, year={2019} }' chicago: Kuhlemann, Stefan, Meinolf Sellmann, and Kevin Tierney. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” In Lecture Notes in Computer Science. Cham, 2019. https://doi.org/10.1007/978-3-030-30048-7_40. ieee: S. Kuhlemann, M. Sellmann, and K. Tierney, “Exploiting Counterfactuals for Scalable Stochastic Optimization,” in Lecture Notes in Computer Science, Cham, 2019. mla: Kuhlemann, Stefan, et al. “Exploiting Counterfactuals for Scalable Stochastic Optimization.” Lecture Notes in Computer Science, 2019, doi:10.1007/978-3-030-30048-7_40. short: 'S. Kuhlemann, M. Sellmann, K. Tierney, in: Lecture Notes in Computer Science, Cham, 2019.' date_created: 2019-11-12T07:45:53Z date_updated: 2022-01-06T06:52:09Z department: - _id: '277' doi: 10.1007/978-3-030-30048-7_40 language: - iso: eng place: Cham publication: Lecture Notes in Computer Science publication_identifier: isbn: - '9783030300470' - '9783030300487' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Exploiting Counterfactuals for Scalable Stochastic Optimization type: book_chapter user_id: '38910' year: '2019' ... --- _id: '15004' author: - first_name: Mohsen full_name: Ahmadi Fahandar, Mohsen id: '59547' last_name: Ahmadi Fahandar - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Ahmadi Fahandar M, Hüllermeier E. Feature Selection for Analogy-Based Learning to Rank. In: Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_22' apa: Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Feature Selection for Analogy-Based Learning to Rank. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_22 bibtex: '@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Feature Selection for Analogy-Based Learning to Rank}, DOI={10.1007/978-3-030-33778-0_22}, booktitle={Discovery Science}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }' chicago: Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_22. ieee: M. Ahmadi Fahandar and E. Hüllermeier, “Feature Selection for Analogy-Based Learning to Rank,” in Discovery Science, Cham, 2019. mla: Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based Learning to Rank.” Discovery Science, 2019, doi:10.1007/978-3-030-33778-0_22. short: 'M. Ahmadi Fahandar, E. Hüllermeier, in: Discovery Science, Cham, 2019.' date_created: 2019-11-15T10:24:45Z date_updated: 2022-01-06T06:52:14Z department: - _id: '34' - _id: '355' doi: 10.1007/978-3-030-33778-0_22 language: - iso: eng place: Cham publication: Discovery Science publication_identifier: isbn: - '9783030337773' - '9783030337780' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Feature Selection for Analogy-Based Learning to Rank type: book_chapter user_id: '315' year: '2019' ... --- _id: '15005' author: - first_name: Mohsen full_name: Ahmadi Fahandar, Mohsen id: '59547' last_name: Ahmadi Fahandar - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Ahmadi Fahandar M, Hüllermeier E. Analogy-Based Preference Learning with Kernels. In: KI 2019: Advances in Artificial Intelligence. Cham; 2019. doi:10.1007/978-3-030-30179-8_3' apa: 'Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Analogy-Based Preference Learning with Kernels. In KI 2019: Advances in Artificial Intelligence. Cham. https://doi.org/10.1007/978-3-030-30179-8_3' bibtex: '@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Analogy-Based Preference Learning with Kernels}, DOI={10.1007/978-3-030-30179-8_3}, booktitle={KI 2019: Advances in Artificial Intelligence}, author={Ahmadi Fahandar, Mohsen and Hüllermeier, Eyke}, year={2019} }' chicago: 'Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” In KI 2019: Advances in Artificial Intelligence. Cham, 2019. https://doi.org/10.1007/978-3-030-30179-8_3.' ieee: 'M. Ahmadi Fahandar and E. Hüllermeier, “Analogy-Based Preference Learning with Kernels,” in KI 2019: Advances in Artificial Intelligence, Cham, 2019.' mla: 'Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning with Kernels.” KI 2019: Advances in Artificial Intelligence, 2019, doi:10.1007/978-3-030-30179-8_3.' short: 'M. Ahmadi Fahandar, E. Hüllermeier, in: KI 2019: Advances in Artificial Intelligence, Cham, 2019.' date_created: 2019-11-15T10:30:10Z date_updated: 2022-01-06T06:52:14Z department: - _id: '34' - _id: '355' doi: 10.1007/978-3-030-30179-8_3 language: - iso: eng place: Cham publication: 'KI 2019: Advances in Artificial Intelligence' publication_identifier: isbn: - '9783030301781' - '9783030301798' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Analogy-Based Preference Learning with Kernels type: book_chapter user_id: '315' year: '2019' ... --- _id: '15006' author: - first_name: Vu-Linh full_name: Nguyen, Vu-Linh last_name: Nguyen - first_name: Sébastien full_name: Destercke, Sébastien last_name: Destercke - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Nguyen V-L, Destercke S, Hüllermeier E. Epistemic Uncertainty Sampling. In: Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_7' apa: Nguyen, V.-L., Destercke, S., & Hüllermeier, E. (2019). Epistemic Uncertainty Sampling. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_7 bibtex: '@inbook{Nguyen_Destercke_Hüllermeier_2019, place={Cham}, title={Epistemic Uncertainty Sampling}, DOI={10.1007/978-3-030-33778-0_7}, booktitle={Discovery Science}, author={Nguyen, Vu-Linh and Destercke, Sébastien and Hüllermeier, Eyke}, year={2019} }' chicago: Nguyen, Vu-Linh, Sébastien Destercke, and Eyke Hüllermeier. “Epistemic Uncertainty Sampling.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_7. ieee: V.-L. Nguyen, S. Destercke, and E. Hüllermeier, “Epistemic Uncertainty Sampling,” in Discovery Science, Cham, 2019. mla: Nguyen, Vu-Linh, et al. “Epistemic Uncertainty Sampling.” Discovery Science, 2019, doi:10.1007/978-3-030-33778-0_7. short: 'V.-L. Nguyen, S. Destercke, E. Hüllermeier, in: Discovery Science, Cham, 2019.' date_created: 2019-11-15T10:35:08Z date_updated: 2022-01-06T06:52:14Z department: - _id: '34' - _id: '355' doi: 10.1007/978-3-030-33778-0_7 language: - iso: eng place: Cham publication: Discovery Science publication_identifier: isbn: - '9783030337773' - '9783030337780' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Epistemic Uncertainty Sampling type: book_chapter user_id: '49109' year: '2019' ... --- _id: '15080' author: - first_name: Rita full_name: Hartel, Rita id: '14961' last_name: Hartel - first_name: Alexander full_name: Dunst, Alexander last_name: Dunst citation: ama: 'Hartel R, Dunst A. How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics. In: International Conference on Multimedia Modeling, MMM. Springer; 2019:662-671. doi:10.1007/978-3-030-05716-9_59' apa: 'Hartel, R., & Dunst, A. (2019). How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics. In International Conference on Multimedia Modeling, MMM (pp. 662–671). Thessaloniki, Greece: Springer. https://doi.org/10.1007/978-3-030-05716-9_59' bibtex: '@inproceedings{Hartel_Dunst_2019, title={How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics}, DOI={10.1007/978-3-030-05716-9_59}, booktitle={International Conference on Multimedia Modeling, MMM}, publisher={Springer}, author={Hartel, Rita and Dunst, Alexander}, year={2019}, pages={662–671} }' chicago: Hartel, Rita, and Alexander Dunst. “How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics.” In International Conference on Multimedia Modeling, MMM, 662–71. Springer, 2019. https://doi.org/10.1007/978-3-030-05716-9_59. ieee: R. Hartel and A. Dunst, “How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics,” in International Conference on Multimedia Modeling, MMM, Thessaloniki, Greece, 2019, pp. 662–671. mla: Hartel, Rita, and Alexander Dunst. “How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics.” International Conference on Multimedia Modeling, MMM, Springer, 2019, pp. 662–71, doi:10.1007/978-3-030-05716-9_59. short: 'R. Hartel, A. Dunst, in: International Conference on Multimedia Modeling, MMM, Springer, 2019, pp. 662–671.' conference: location: Thessaloniki, Greece date_created: 2019-11-21T14:42:25Z date_updated: 2022-01-06T06:52:15Z department: - _id: '69' doi: 10.1007/978-3-030-05716-9_59 language: - iso: eng page: 662-671 publication: International Conference on Multimedia Modeling, MMM publication_identifier: isbn: - '9783030057152' - '9783030057169' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer status: public title: How Good Is Good Enough? Establishing Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics type: conference user_id: '14961' year: '2019' ... --- _id: '13872' author: - first_name: Dirk full_name: Beyer, Dirk last_name: Beyer - first_name: Marie-Christine full_name: Jakobs, Marie-Christine last_name: Jakobs citation: ama: 'Beyer D, Jakobs M-C. CoVeriTest: Cooperative Verifier-Based Testing. In: Fundamental Approaches to Software Engineering. Cham; 2019. doi:10.1007/978-3-030-16722-6_23' apa: 'Beyer, D., & Jakobs, M.-C. (2019). CoVeriTest: Cooperative Verifier-Based Testing. In Fundamental Approaches to Software Engineering. Cham. https://doi.org/10.1007/978-3-030-16722-6_23' bibtex: '@inbook{Beyer_Jakobs_2019, place={Cham}, title={CoVeriTest: Cooperative Verifier-Based Testing}, DOI={10.1007/978-3-030-16722-6_23}, booktitle={Fundamental Approaches to Software Engineering}, author={Beyer, Dirk and Jakobs, Marie-Christine}, year={2019} }' chicago: 'Beyer, Dirk, and Marie-Christine Jakobs. “CoVeriTest: Cooperative Verifier-Based Testing.” In Fundamental Approaches to Software Engineering. Cham, 2019. https://doi.org/10.1007/978-3-030-16722-6_23.' ieee: 'D. Beyer and M.-C. Jakobs, “CoVeriTest: Cooperative Verifier-Based Testing,” in Fundamental Approaches to Software Engineering, Cham, 2019.' mla: 'Beyer, Dirk, and Marie-Christine Jakobs. “CoVeriTest: Cooperative Verifier-Based Testing.” Fundamental Approaches to Software Engineering, 2019, doi:10.1007/978-3-030-16722-6_23.' short: 'D. Beyer, M.-C. Jakobs, in: Fundamental Approaches to Software Engineering, Cham, 2019.' date_created: 2019-10-16T06:39:51Z date_updated: 2022-01-06T06:51:45Z department: - _id: '77' doi: 10.1007/978-3-030-16722-6_23 language: - iso: eng place: Cham project: - _id: '85' name: Kooperative Softwareverifikation publication: Fundamental Approaches to Software Engineering publication_identifier: isbn: - '9783030167219' - '9783030167226' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: 'CoVeriTest: Cooperative Verifier-Based Testing' type: book_chapter user_id: '44413' year: '2019' ... --- _id: '45818' author: - first_name: Yasir full_name: Mahmood, Yasir last_name: Mahmood - first_name: Arne full_name: Meier, Arne last_name: Meier - first_name: Johannes full_name: Schmidt, Johannes last_name: Schmidt citation: ama: 'Mahmood Y, Meier A, Schmidt J. Parameterised Complexity of Abduction in Schaefer’s Framework. In: Logical Foundations of Computer Science. Springer International Publishing; 2019. doi:10.1007/978-3-030-36755-8_13' apa: Mahmood, Y., Meier, A., & Schmidt, J. (2019). Parameterised Complexity of Abduction in Schaefer’s Framework. Logical Foundations of Computer Science. https://doi.org/10.1007/978-3-030-36755-8_13 bibtex: '@inproceedings{Mahmood_Meier_Schmidt_2019, place={Cham}, title={Parameterised Complexity of Abduction in Schaefer’s Framework}, DOI={10.1007/978-3-030-36755-8_13}, booktitle={Logical Foundations of Computer Science}, publisher={Springer International Publishing}, author={Mahmood, Yasir and Meier, Arne and Schmidt, Johannes}, year={2019} }' chicago: 'Mahmood, Yasir, Arne Meier, and Johannes Schmidt. “Parameterised Complexity of Abduction in Schaefer’s Framework.” In Logical Foundations of Computer Science. Cham: Springer International Publishing, 2019. https://doi.org/10.1007/978-3-030-36755-8_13.' ieee: 'Y. Mahmood, A. Meier, and J. Schmidt, “Parameterised Complexity of Abduction in Schaefer’s Framework,” 2019, doi: 10.1007/978-3-030-36755-8_13.' mla: Mahmood, Yasir, et al. “Parameterised Complexity of Abduction in Schaefer’s Framework.” Logical Foundations of Computer Science, Springer International Publishing, 2019, doi:10.1007/978-3-030-36755-8_13. short: 'Y. Mahmood, A. Meier, J. Schmidt, in: Logical Foundations of Computer Science, Springer International Publishing, Cham, 2019.' date_created: 2023-06-30T11:51:03Z date_updated: 2023-07-03T11:44:22Z doi: 10.1007/978-3-030-36755-8_13 language: - iso: eng place: Cham publication: Logical Foundations of Computer Science publication_identifier: isbn: - '9783030367541' - '9783030367558' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Parameterised Complexity of Abduction in Schaefer’s Framework type: conference user_id: '99353' year: '2019' ... --- _id: '2862' author: - first_name: Johannes full_name: Blömer, Johannes id: '23' last_name: Blömer - first_name: Fabian full_name: Eidens, Fabian id: '25078' last_name: Eidens - first_name: Jakob full_name: Juhnke, Jakob id: '48090' last_name: Juhnke citation: ama: 'Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings. Cham: Springer International Publishing; 2018:470-490. doi:10.1007/978-3-319-76953-0_25' apa: 'Blömer, J., Eidens, F., & Juhnke, J. (2018). Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings (pp. 470–490). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-76953-0_25' bibtex: '@inproceedings{Blömer_Eidens_Juhnke_2018, place={Cham}, title={Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, DOI={10.1007/978-3-319-76953-0_25}, booktitle={Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings}, publisher={Springer International Publishing}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={470–490} }' chicago: 'Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, 470–90. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-76953-0_25.' ieee: J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems,” in Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, San Francisco, CA, USA, 2018, pp. 470–490. mla: Blömer, Johannes, et al. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, 2018, pp. 470–90, doi:10.1007/978-3-319-76953-0_25. short: 'J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, Cham, 2018, pp. 470–490.' conference: end_date: 2018-04-20 location: San Francisco, CA, USA name: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018 start_date: 2018-04-16 date_created: 2018-05-24T11:14:02Z date_updated: 2022-01-06T06:58:12Z ddc: - '004' department: - _id: '7' - _id: '64' doi: 10.1007/978-3-319-76953-0_25 file: - access_level: closed content_type: application/pdf creator: ups date_created: 2018-11-02T13:45:40Z date_updated: 2018-11-02T13:45:40Z file_id: '5253' file_name: PracticalAnonymousAndPubliclyL.pdf file_size: 3371773 relation: main_file success: 1 file_date_updated: 2018-11-02T13:45:40Z has_accepted_license: '1' language: - iso: eng main_file_link: - open_access: '1' url: https://eprint.iacr.org/2018/029 oa: '1' page: 470-490 place: Cham project: - _id: '1' name: SFB 901 - _id: '4' name: SFB 901 - Project Area C - _id: '13' name: SFB 901 - Subproject C1 publication: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, Proceedings publication_identifier: isbn: - '9783319769523' - '9783319769530' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems type: conference user_id: '477' year: '2018' ... --- _id: '24396' abstract: - lang: eng text: 'We study the Online Prize-collecting Node-weighted Steiner Forest problem (OPC-NWSF) in which we are given an undirected graph \(G=(V, E)\) with \(|V| = n\) and node-weight function \(w: V \rightarrow \mathcal {R}^+\). A sequence of k pairs of nodes of G, each associated with a penalty, arrives online. OPC-NWSF asks to construct a subgraph H such that each pair \(\{s, t\}\) is either connected (there is a path between s and t in H) or its associated penalty is paid. The goal is to minimize the weight of H and the total penalties paid. The current best result for OPC-NWSF is a randomized \(\mathcal {O}(\log ^4 n)\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014). We improve this by proposing a randomized \(\mathcal {O}(\log n \log k)\)-competitive algorithm for OPC-NWSF, which is optimal up to constant factor since OPC-NWSF has a randomized lower bound of \(\varOmega (\log ^2 n)\) due to Korman [11]. Moreover, our result also implies an improvement for two special cases of OPC-NWSF, the Online Prize-collecting Node-weighted Steiner Tree problem (OPC-NWST) and the Online Node-weighted Steiner Forest problem (ONWSF). In OPC-NWST, there is a distinguished node which is one of the nodes in each pair. In ONWSF, all penalties are set to infinity. The currently best known results for OPC-NWST and ONWSF are a randomized \(\mathcal {O}(\log ^3 n)\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014) and a randomized \(\mathcal {O}(\log n \log ^2 k)\)-competitive algorithm due to Hajiaghayi et al. (FOCS 2013), respectively.' author: - first_name: Christine full_name: Markarian, Christine last_name: Markarian citation: ama: 'Markarian C. An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest. In: International Workshop on Combinatorial Algorithms (IWOCA). ; 2018. doi:10.1007/978-3-319-94667-2_18' apa: Markarian, C. (2018). An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest. International Workshop on Combinatorial Algorithms (IWOCA). https://doi.org/10.1007/978-3-319-94667-2_18 bibtex: '@inproceedings{Markarian_2018, place={Cham}, title={An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest}, DOI={10.1007/978-3-319-94667-2_18}, booktitle={International Workshop on Combinatorial Algorithms (IWOCA)}, author={Markarian, Christine}, year={2018} }' chicago: Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest.” In International Workshop on Combinatorial Algorithms (IWOCA). Cham, 2018. https://doi.org/10.1007/978-3-319-94667-2_18. ieee: 'C. Markarian, “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest,” 2018, doi: 10.1007/978-3-319-94667-2_18.' mla: Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest.” International Workshop on Combinatorial Algorithms (IWOCA), 2018, doi:10.1007/978-3-319-94667-2_18. short: 'C. Markarian, in: International Workshop on Combinatorial Algorithms (IWOCA), Cham, 2018.' date_created: 2021-09-14T12:23:29Z date_updated: 2022-01-06T06:56:19Z department: - _id: '63' doi: 10.1007/978-3-319-94667-2_18 language: - iso: eng place: Cham publication: International Workshop on Combinatorial Algorithms (IWOCA) publication_identifier: issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest type: conference user_id: '15415' year: '2018' ... --- _id: '3362' abstract: - lang: eng text: Profiling applications on a heterogeneous compute node is challenging since the way to retrieve data from the resources and interpret them varies between resource types and manufacturers. This holds especially true for measuring the energy consumption. In this paper we present Ampehre, a novel open source measurement framework that allows developers to gather comparable measurements from heterogeneous compute nodes, e.g., nodes comprising CPU, GPU, and FPGA. We explain the architecture of Ampehre and detail the measurement process on the example of energy measurements on CPU and GPU. To characterize the probing effect, we quantitatively analyze the trade-off between the accuracy of measurements and the CPU load imposed by Ampehre. Based on this analysis, we are able to specify reasonable combinations of sampling periods for the different resource types of a compute node. author: - first_name: Achim full_name: Lösch, Achim id: '43646' last_name: Lösch - first_name: Alex full_name: Wiens, Alex last_name: Wiens - first_name: Marco full_name: Platzner, Marco id: '398' last_name: Platzner citation: ama: 'Lösch A, Wiens A, Platzner M. Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes. In: Proceedings of the International Conference on Architecture of Computing Systems (ARCS). Vol 10793. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:73-84. doi:10.1007/978-3-319-77610-1_6' apa: 'Lösch, A., Wiens, A., & Platzner, M. (2018). Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes. In Proceedings of the International Conference on Architecture of Computing Systems (ARCS) (Vol. 10793, pp. 73–84). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-77610-1_6' bibtex: '@inproceedings{Lösch_Wiens_Platzner_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes}, volume={10793}, DOI={10.1007/978-3-319-77610-1_6}, booktitle={Proceedings of the International Conference on Architecture of Computing Systems (ARCS)}, publisher={Springer International Publishing}, author={Lösch, Achim and Wiens, Alex and Platzner, Marco}, year={2018}, pages={73–84}, collection={Lecture Notes in Computer Science} }' chicago: 'Lösch, Achim, Alex Wiens, and Marco Platzner. “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes.” In Proceedings of the International Conference on Architecture of Computing Systems (ARCS), 10793:73–84. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-77610-1_6.' ieee: 'A. Lösch, A. Wiens, and M. Platzner, “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes,” in Proceedings of the International Conference on Architecture of Computing Systems (ARCS), 2018, vol. 10793, pp. 73–84.' mla: 'Lösch, Achim, et al. “Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes.” Proceedings of the International Conference on Architecture of Computing Systems (ARCS), vol. 10793, Springer International Publishing, 2018, pp. 73–84, doi:10.1007/978-3-319-77610-1_6.' short: 'A. Lösch, A. Wiens, M. Platzner, in: Proceedings of the International Conference on Architecture of Computing Systems (ARCS), Springer International Publishing, Cham, 2018, pp. 73–84.' date_created: 2018-06-26T13:47:52Z date_updated: 2022-01-06T06:59:13Z ddc: - '040' department: - _id: '78' doi: 10.1007/978-3-319-77610-1_6 file: - access_level: closed content_type: application/pdf creator: aloesch date_created: 2018-06-26T13:58:28Z date_updated: 2018-06-26T13:58:28Z file_id: '3363' file_name: loesch2017_arcs.pdf file_size: 1114026 relation: main_file success: 1 file_date_updated: 2018-06-26T13:58:28Z has_accepted_license: '1' intvolume: ' 10793' page: 73-84 place: Cham project: - _id: '14' name: SFB 901 - Subproject C2 - _id: '4' name: SFB 901 - Project Area C - _id: '1' name: SFB 901 publication: Proceedings of the International Conference on Architecture of Computing Systems (ARCS) publication_identifier: isbn: - '9783319776095' - '9783319776101' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: 'Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes' type: conference user_id: '477' volume: 10793 year: '2018' ... --- _id: '3373' abstract: - lang: eng text: Modern Boolean satisfiability solvers can emit proofs of unsatisfiability. There is substantial interest in being able to verify such proofs and also in using them for further computations. In this paper, we present an FPGA accelerator for checking resolution proofs, a popular proof format. Our accelerator exploits parallelism at the low level by implementing the basic resolution step in hardware, and at the high level by instantiating a number of parallel modules for proof checking. Since proof checking involves highly irregular memory accesses, we employ Hybrid Memory Cube technology for accelerator memory. The results show that while the accelerator is scalable and achieves speedups for all benchmark proofs, performance improvements are currently limited by the overhead of transitioning the proof into the accelerator memory. author: - first_name: Tim full_name: Hansmeier, Tim id: '49992' last_name: Hansmeier orcid: 0000-0003-1377-3339 - first_name: Marco full_name: Platzner, Marco id: '398' last_name: Platzner - first_name: David full_name: Andrews, David last_name: Andrews citation: ama: 'Hansmeier T, Platzner M, Andrews D. An FPGA/HMC-Based Accelerator for Resolution Proof Checking. In: ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications. Vol 10824. Lecture Notes in Computer Science. Springer International Publishing; 2018:153-165. doi:10.1007/978-3-319-78890-6_13' apa: 'Hansmeier, T., Platzner, M., & Andrews, D. (2018). An FPGA/HMC-Based Accelerator for Resolution Proof Checking. In ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications (Vol. 10824, pp. 153–165). Santorini, Greece: Springer International Publishing. https://doi.org/10.1007/978-3-319-78890-6_13' bibtex: '@inproceedings{Hansmeier_Platzner_Andrews_2018, series={Lecture Notes in Computer Science}, title={An FPGA/HMC-Based Accelerator for Resolution Proof Checking}, volume={10824}, DOI={10.1007/978-3-319-78890-6_13}, booktitle={ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications}, publisher={Springer International Publishing}, author={Hansmeier, Tim and Platzner, Marco and Andrews, David}, year={2018}, pages={153–165}, collection={Lecture Notes in Computer Science} }' chicago: 'Hansmeier, Tim, Marco Platzner, and David Andrews. “An FPGA/HMC-Based Accelerator for Resolution Proof Checking.” In ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications, 10824:153–65. Lecture Notes in Computer Science. Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-78890-6_13.' ieee: 'T. Hansmeier, M. Platzner, and D. Andrews, “An FPGA/HMC-Based Accelerator for Resolution Proof Checking,” in ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications, Santorini, Greece, 2018, vol. 10824, pp. 153–165.' mla: 'Hansmeier, Tim, et al. “An FPGA/HMC-Based Accelerator for Resolution Proof Checking.” ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications, vol. 10824, Springer International Publishing, 2018, pp. 153–65, doi:10.1007/978-3-319-78890-6_13.' short: 'T. Hansmeier, M. Platzner, D. Andrews, in: ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications, Springer International Publishing, 2018, pp. 153–165.' conference: end_date: 2018-05-04 location: Santorini, Greece name: 'ARC: International Symposium on Applied Reconfigurable Computing' start_date: 2018-05-02 date_created: 2018-06-27T09:30:24Z date_updated: 2022-01-06T06:59:13Z ddc: - '000' department: - _id: '78' doi: 10.1007/978-3-319-78890-6_13 file: - access_level: closed content_type: application/pdf creator: ups date_created: 2018-11-02T13:55:07Z date_updated: 2018-11-02T13:55:07Z file_id: '5257' file_name: AnFPGAHMC-BasedAcceleratorForR.pdf file_size: 612367 relation: main_file success: 1 file_date_updated: 2018-11-02T13:55:07Z has_accepted_license: '1' intvolume: ' 10824' language: - iso: eng page: 153-165 project: - _id: '12' name: SFB 901 - Subproject B4 - _id: '1' name: SFB 901 - _id: '3' name: SFB 901 - Project Area B publication: 'ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications' publication_identifier: isbn: - '9783319788890' - '9783319788906' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: An FPGA/HMC-Based Accelerator for Resolution Proof Checking type: conference user_id: '3118' volume: 10824 year: '2018' ... --- _id: '3536' author: - first_name: Gerhard full_name: Schellhorn, Gerhard last_name: Schellhorn - first_name: Monika full_name: Wedel, Monika last_name: Wedel - first_name: Oleg full_name: Travkin, Oleg last_name: Travkin - first_name: Jürgen full_name: König, Jürgen id: '22358' last_name: König - first_name: Heike full_name: Wehrheim, Heike id: '573' last_name: Wehrheim citation: ama: 'Schellhorn G, Wedel M, Travkin O, König J, Wehrheim H. FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity. In: Software Engineering and Formal Methods. Cham: Springer International Publishing; 2018:105-120. doi:10.1007/978-3-319-92970-5_7' apa: 'Schellhorn, G., Wedel, M., Travkin, O., König, J., & Wehrheim, H. (2018). FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity. In Software Engineering and Formal Methods (pp. 105–120). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-92970-5_7' bibtex: '@inbook{Schellhorn_Wedel_Travkin_König_Wehrheim_2018, place={Cham}, title={FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity}, DOI={10.1007/978-3-319-92970-5_7}, booktitle={Software Engineering and Formal Methods}, publisher={Springer International Publishing}, author={Schellhorn, Gerhard and Wedel, Monika and Travkin, Oleg and König, Jürgen and Wehrheim, Heike}, year={2018}, pages={105–120} }' chicago: 'Schellhorn, Gerhard, Monika Wedel, Oleg Travkin, Jürgen König, and Heike Wehrheim. “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity.” In Software Engineering and Formal Methods, 105–20. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-92970-5_7.' ieee: 'G. Schellhorn, M. Wedel, O. Travkin, J. König, and H. Wehrheim, “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity,” in Software Engineering and Formal Methods, Cham: Springer International Publishing, 2018, pp. 105–120.' mla: Schellhorn, Gerhard, et al. “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity.” Software Engineering and Formal Methods, Springer International Publishing, 2018, pp. 105–20, doi:10.1007/978-3-319-92970-5_7. short: 'G. Schellhorn, M. Wedel, O. Travkin, J. König, H. Wehrheim, in: Software Engineering and Formal Methods, Springer International Publishing, Cham, 2018, pp. 105–120.' date_created: 2018-07-11T06:19:58Z date_updated: 2022-01-06T06:59:22Z department: - _id: '77' doi: 10.1007/978-3-319-92970-5_7 page: 105-120 place: Cham project: - _id: '78' name: Validation of Software Transactional Memory publication: Software Engineering and Formal Methods publication_identifier: isbn: - '9783319929699' - '9783319929705' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity type: book_chapter user_id: '29719' year: '2018' ... --- _id: '5774' abstract: - lang: eng text: Information flow analysis investigates the flow of data in applications, checking in particular for flows from private sources to public sinks. Flow- and path-sensitive analyses are, however, often too costly to be performed every time a security-critical application is run. In this paper, we propose a variant of proof carrying code for information flow security. To this end, we develop information flow (IF) certificates which get attached to programs as well as a method for IF certificate validation. We prove soundness of our technique, i.e., show it to be tamper-free. The technique is implemented within the program analysis tool CPAchecker. Our experiments confirm that the use of certificates pays off for costly analysis runs. author: - first_name: Manuel full_name: Töws, Manuel id: '11315' last_name: Töws - first_name: Heike full_name: Wehrheim, Heike id: '573' last_name: Wehrheim citation: ama: 'Töws M, Wehrheim H. Information Flow Certificates. In: Theoretical Aspects of Computing – ICTAC 2018. Cham: Springer International Publishing; 2018:435-454. doi:10.1007/978-3-030-02508-3_23' apa: 'Töws, M., & Wehrheim, H. (2018). Information Flow Certificates. In Theoretical Aspects of Computing – ICTAC 2018 (pp. 435–454). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-02508-3_23' bibtex: '@inproceedings{Töws_Wehrheim_2018, place={Cham}, title={Information Flow Certificates}, DOI={10.1007/978-3-030-02508-3_23}, booktitle={Theoretical Aspects of Computing – ICTAC 2018}, publisher={Springer International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2018}, pages={435–454} }' chicago: 'Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” In Theoretical Aspects of Computing – ICTAC 2018, 435–54. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-030-02508-3_23.' ieee: M. Töws and H. Wehrheim, “Information Flow Certificates,” in Theoretical Aspects of Computing – ICTAC 2018, 2018, pp. 435–454. mla: Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” Theoretical Aspects of Computing – ICTAC 2018, Springer International Publishing, 2018, pp. 435–54, doi:10.1007/978-3-030-02508-3_23. short: 'M. Töws, H. Wehrheim, in: Theoretical Aspects of Computing – ICTAC 2018, Springer International Publishing, Cham, 2018, pp. 435–454.' date_created: 2018-11-21T09:51:37Z date_updated: 2022-01-06T07:02:40Z ddc: - '000' department: - _id: '77' doi: 10.1007/978-3-030-02508-3_23 file: - access_level: closed content_type: application/pdf creator: mtoews date_created: 2018-11-26T15:11:32Z date_updated: 2018-11-26T15:11:32Z file_id: '5837' file_name: Töws-Wehrheim2018_Chapter_InformationFlowCertificates.pdf file_size: 518016 relation: main_file success: 1 file_date_updated: 2018-11-26T15:11:32Z has_accepted_license: '1' language: - iso: eng page: 435-454 place: Cham project: - _id: '1' name: SFB 901 - _id: '3' name: SFB 901 - Project Area B - _id: '12' name: SFB 901 - Subproject B4 publication: Theoretical Aspects of Computing – ICTAC 2018 publication_identifier: isbn: - '9783030025076' - '9783030025083' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Information Flow Certificates type: conference user_id: '477' year: '2018' ... --- _id: '6253' author: - first_name: Björn full_name: Senft, Björn id: '9109' last_name: Senft - first_name: Holger Gerhard full_name: Fischer, Holger Gerhard id: '30457' last_name: Fischer - first_name: Simon full_name: Oberthür, Simon id: '383' last_name: Oberthür - first_name: Nitish full_name: Patkar, Nitish last_name: Patkar citation: ama: 'Senft B, Fischer HG, Oberthür S, Patkar N. Assist Users to Straightaway Suggest and Describe Experienced Problems. In: Design, User Experience, and Usability: Theory and Practice. Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:758-770. doi:10.1007/978-3-319-91797-9_52' apa: 'Senft, B., Fischer, H. G., Oberthür, S., & Patkar, N. (2018). Assist Users to Straightaway Suggest and Describe Experienced Problems. In Design, User Experience, and Usability: Theory and Practice (Vol. 10918, pp. 758–770). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-91797-9_52' bibtex: '@inbook{Senft_Fischer_Oberthür_Patkar_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={Assist Users to Straightaway Suggest and Describe Experienced Problems}, volume={10918}, DOI={10.1007/978-3-319-91797-9_52}, booktitle={Design, User Experience, and Usability: Theory and Practice}, publisher={Springer International Publishing}, author={Senft, Björn and Fischer, Holger Gerhard and Oberthür, Simon and Patkar, Nitish}, year={2018}, pages={758–770}, collection={Lecture Notes in Computer Science} }' chicago: 'Senft, Björn, Holger Gerhard Fischer, Simon Oberthür, and Nitish Patkar. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” In Design, User Experience, and Usability: Theory and Practice, 10918:758–70. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-91797-9_52.' ieee: 'B. Senft, H. G. Fischer, S. Oberthür, and N. Patkar, “Assist Users to Straightaway Suggest and Describe Experienced Problems,” in Design, User Experience, and Usability: Theory and Practice, vol. 10918, Cham: Springer International Publishing, 2018, pp. 758–770.' mla: 'Senft, Björn, et al. “Assist Users to Straightaway Suggest and Describe Experienced Problems.” Design, User Experience, and Usability: Theory and Practice, vol. 10918, Springer International Publishing, 2018, pp. 758–70, doi:10.1007/978-3-319-91797-9_52.' short: 'B. Senft, H.G. Fischer, S. Oberthür, N. Patkar, in: Design, User Experience, and Usability: Theory and Practice, Springer International Publishing, Cham, 2018, pp. 758–770.' conference: end_date: 2018-07-20 location: Las Vegas, USA name: International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018 start_date: 2018-07-15 date_created: 2018-12-18T10:37:41Z date_updated: 2022-01-06T07:02:58Z department: - _id: '66' - _id: '534' - _id: '221' doi: 10.1007/978-3-319-91797-9_52 intvolume: ' 10918' language: - iso: eng page: 758-770 place: Cham publication: 'Design, User Experience, and Usability: Theory and Practice' publication_identifier: isbn: - '9783319917962' - '9783319917979' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: Assist Users to Straightaway Suggest and Describe Experienced Problems type: book_chapter user_id: '30457' volume: 10918 year: '2018' ... --- _id: '6254' author: - first_name: Holger Gerhard full_name: Fischer, Holger Gerhard id: '30457' last_name: Fischer - first_name: Björn full_name: Senft, Björn id: '9109' last_name: Senft - first_name: Florian full_name: Rittmeier, Florian id: '5281' last_name: Rittmeier - first_name: Stefan full_name: Sauer, Stefan id: '447' last_name: Sauer citation: ama: 'Fischer HG, Senft B, Rittmeier F, Sauer S. A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In: Marcus A, Wang W, eds. Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018). Vol 10918. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:711-724. doi:10.1007/978-3-319-91797-9_49' apa: 'Fischer, H. G., Senft, B., Rittmeier, F., & Sauer, S. (2018). A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems. In A. Marcus & W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018) (Vol. 10918, pp. 711–724). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-91797-9_49' bibtex: '@inbook{Fischer_Senft_Rittmeier_Sauer_2018, place={Cham}, series={Lecture Notes in Computer Science}, title={A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems}, volume={10918}, DOI={10.1007/978-3-319-91797-9_49}, booktitle={Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn and Rittmeier, Florian and Sauer, Stefan}, editor={Marcus, Aaron and Wang, WentaoEditors}, year={2018}, pages={711–724}, collection={Lecture Notes in Computer Science} }' chicago: 'Fischer, Holger Gerhard, Björn Senft, Florian Rittmeier, and Stefan Sauer. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” In Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), edited by Aaron Marcus and Wentao Wang, 10918:711–24. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-91797-9_49.' ieee: 'H. G. Fischer, B. Senft, F. Rittmeier, and S. Sauer, “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems,” in Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), vol. 10918, A. Marcus and W. Wang, Eds. Cham: Springer International Publishing, 2018, pp. 711–724.' mla: 'Fischer, Holger Gerhard, et al. “A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.” Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), edited by Aaron Marcus and Wentao Wang, vol. 10918, Springer International Publishing, 2018, pp. 711–24, doi:10.1007/978-3-319-91797-9_49.' short: 'H.G. Fischer, B. Senft, F. Rittmeier, S. Sauer, in: A. Marcus, W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), Springer International Publishing, Cham, 2018, pp. 711–724.' conference: end_date: 2018-07-20 location: Las Vegas, USA name: International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2018 start_date: 2018-07-15 date_created: 2018-12-18T10:42:39Z date_updated: 2022-01-06T07:02:58Z department: - _id: '66' - _id: '534' - _id: '221' doi: 10.1007/978-3-319-91797-9_49 editor: - first_name: Aaron full_name: Marcus, Aaron last_name: Marcus - first_name: Wentao full_name: Wang, Wentao last_name: Wang intvolume: ' 10918' language: - iso: eng page: 711-724 place: Cham publication: 'Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018)' publication_identifier: isbn: - '9783319917962' - '9783319917979' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems type: book_chapter user_id: '30457' volume: 10918 year: '2018' ... --- _id: '6423' author: - first_name: Dirk full_name: Schäfer, Dirk last_name: Schäfer - first_name: Eyke full_name: Hüllermeier, Eyke id: '48129' last_name: Hüllermeier citation: ama: 'Schäfer D, Hüllermeier E. Preference-Based Reinforcement Learning Using Dyad Ranking. In: Discovery Science. Cham: Springer International Publishing; 2018:161-175. doi:10.1007/978-3-030-01771-2_11' apa: 'Schäfer, D., & Hüllermeier, E. (2018). Preference-Based Reinforcement Learning Using Dyad Ranking. In Discovery Science (pp. 161–175). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-01771-2_11' bibtex: '@inbook{Schäfer_Hüllermeier_2018, place={Cham}, title={Preference-Based Reinforcement Learning Using Dyad Ranking}, DOI={10.1007/978-3-030-01771-2_11}, booktitle={Discovery Science}, publisher={Springer International Publishing}, author={Schäfer, Dirk and Hüllermeier, Eyke}, year={2018}, pages={161–175} }' chicago: 'Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” In Discovery Science, 161–75. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-030-01771-2_11.' ieee: 'D. Schäfer and E. Hüllermeier, “Preference-Based Reinforcement Learning Using Dyad Ranking,” in Discovery Science, Cham: Springer International Publishing, 2018, pp. 161–175.' mla: Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning Using Dyad Ranking.” Discovery Science, Springer International Publishing, 2018, pp. 161–75, doi:10.1007/978-3-030-01771-2_11. short: 'D. Schäfer, E. Hüllermeier, in: Discovery Science, Springer International Publishing, Cham, 2018, pp. 161–175.' date_created: 2018-12-20T15:52:03Z date_updated: 2022-01-06T07:03:04Z ddc: - '000' department: - _id: '355' doi: 10.1007/978-3-030-01771-2_11 file: - access_level: closed content_type: application/pdf creator: ups date_created: 2019-01-11T11:03:50Z date_updated: 2019-01-11T11:03:50Z file_id: '6623' file_name: Schäfer-Hüllermeier2018_Chapter_Preference-BasedReinforcementL.pdf file_size: 458972 relation: main_file success: 1 file_date_updated: 2019-01-11T11:03:50Z has_accepted_license: '1' language: - iso: eng page: 161-175 place: Cham project: - _id: '1' name: SFB 901 - _id: '3' name: SFB 901 - Project Area B - _id: '10' name: SFB 901 - Subproject B2 publication: Discovery Science publication_identifier: isbn: - '9783030017705' - '9783030017712' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Preference-Based Reinforcement Learning Using Dyad Ranking type: book_chapter user_id: '49109' year: '2018' ... --- _id: '16392' author: - first_name: Björn full_name: Feldkord, Björn id: '22704' last_name: Feldkord - first_name: Manuel full_name: Malatyali, Manuel last_name: Malatyali - first_name: Friedhelm full_name: Meyer auf der Heide, Friedhelm id: '15523' last_name: Meyer auf der Heide citation: ama: 'Feldkord B, Malatyali M, Meyer auf der Heide F. A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Cham; 2018. doi:10.1007/978-3-319-98355-4_18' apa: Feldkord, B., Malatyali, M., & Meyer auf der Heide, F. (2018). A Dynamic Distributed Data Structure for Top-k and k-Select Queries. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Cham. https://doi.org/10.1007/978-3-319-98355-4_18 bibtex: '@inbook{Feldkord_Malatyali_Meyer auf der Heide_2018, place={Cham}, title={A Dynamic Distributed Data Structure for Top-k and k-Select Queries}, DOI={10.1007/978-3-319-98355-4_18}, booktitle={Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications}, author={Feldkord, Björn and Malatyali, Manuel and Meyer auf der Heide, Friedhelm}, year={2018} }' chicago: Feldkord, Björn, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Cham, 2018. https://doi.org/10.1007/978-3-319-98355-4_18. ieee: B. Feldkord, M. Malatyali, and F. Meyer auf der Heide, “A Dynamic Distributed Data Structure for Top-k and k-Select Queries,” in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Cham, 2018. mla: Feldkord, Björn, et al. “A Dynamic Distributed Data Structure for Top-k and k-Select Queries.” Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2018, doi:10.1007/978-3-319-98355-4_18. short: 'B. Feldkord, M. Malatyali, F. Meyer auf der Heide, in: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Cham, 2018.' date_created: 2020-04-03T07:04:59Z date_updated: 2022-01-06T06:52:50Z department: - _id: '63' doi: 10.1007/978-3-319-98355-4_18 language: - iso: eng place: Cham publication: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications publication_identifier: isbn: - '9783319125671' - '9783319125688' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: A Dynamic Distributed Data Structure for Top-k and k-Select Queries type: book_chapter user_id: '15415' year: '2018' ... --- _id: '24398' abstract: - lang: eng text: 'Through this study, we introduce the idea of applying scheduling techniques to allocate spatial resources that are shared among multiple robots moving in a static environment and having temporal constraints on the arrival time to destinations. To illustrate this idea, we present an exemplified algorithm that plans and assigns a motion path to each robot. The considered problem is particularly challenging because: (i) the robots share the same environment and thus the planner must take into account overlapping paths which cannot happen at the same time; (ii) there are time deadlines thus the planner must deal with temporal constraints; (iii) new requests arrive without a priori knowledge thus the planner must be able to add new paths online and adjust old plans; (iv) the robot motion is subject to noise thus the planner must be reactive to adapt to online changes. We showcase the functioning of the proposed algorithm through a set of agent-based simulations.' author: - first_name: Yara full_name: Khaluf, Yara last_name: Khaluf - first_name: Christine full_name: Markarian, Christine last_name: Markarian - first_name: Pieter full_name: Simoens, Pieter last_name: Simoens - first_name: Andreagiovanni full_name: Reina, Andreagiovanni last_name: Reina citation: ama: 'Khaluf Y, Markarian C, Simoens P, Reina A. Scheduling Access to Shared Space in Multi-robot Systems. In: International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017). ; 2017. doi:10.1007/978-3-319-59930-4_12' apa: Khaluf, Y., Markarian, C., Simoens, P., & Reina, A. (2017). Scheduling Access to Shared Space in Multi-robot Systems. International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017). https://doi.org/10.1007/978-3-319-59930-4_12 bibtex: '@inproceedings{Khaluf_Markarian_Simoens_Reina_2017, place={Cham}, title={Scheduling Access to Shared Space in Multi-robot Systems}, DOI={10.1007/978-3-319-59930-4_12}, booktitle={International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017)}, author={Khaluf, Yara and Markarian, Christine and Simoens, Pieter and Reina, Andreagiovanni}, year={2017} }' chicago: Khaluf, Yara, Christine Markarian, Pieter Simoens, and Andreagiovanni Reina. “Scheduling Access to Shared Space in Multi-Robot Systems.” In International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017). Cham, 2017. https://doi.org/10.1007/978-3-319-59930-4_12. ieee: 'Y. Khaluf, C. Markarian, P. Simoens, and A. Reina, “Scheduling Access to Shared Space in Multi-robot Systems,” 2017, doi: 10.1007/978-3-319-59930-4_12.' mla: Khaluf, Yara, et al. “Scheduling Access to Shared Space in Multi-Robot Systems.” International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017), 2017, doi:10.1007/978-3-319-59930-4_12. short: 'Y. Khaluf, C. Markarian, P. Simoens, A. Reina, in: International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017), Cham, 2017.' date_created: 2021-09-14T12:41:58Z date_updated: 2022-01-06T06:56:19Z department: - _id: '63' doi: 10.1007/978-3-319-59930-4_12 language: - iso: eng place: Cham publication: International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017) publication_identifier: issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Scheduling Access to Shared Space in Multi-robot Systems type: conference user_id: '15415' year: '2017' ... --- _id: '2967' author: - first_name: Johannes full_name: Blömer, Johannes id: '23' last_name: Blömer - first_name: Gennadij full_name: Liske, Gennadij last_name: Liske citation: ama: 'Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35' apa: 'Blömer, J., & Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS) (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-72453-9_35' bibtex: '@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={10.1007/978-3-319-72453-9_35}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }' chicago: 'Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-72453-9_35.' ieee: J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 2017, vol. 10693, pp. 438–453. mla: Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), vol. 10693, Springer International Publishing, 2017, pp. 438–53, doi:10.1007/978-3-319-72453-9_35. short: 'J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.' date_created: 2018-06-04T12:17:48Z date_updated: 2022-01-06T06:58:49Z ddc: - '000' department: - _id: '64' doi: 10.1007/978-3-319-72453-9_35 file: - access_level: closed content_type: application/pdf creator: ups date_created: 2018-11-02T14:52:10Z date_updated: 2018-11-02T14:52:10Z file_id: '5286' file_name: SubtletiesInSecurityDefinition.pdf file_size: 463904 relation: main_file success: 1 file_date_updated: 2018-11-02T14:52:10Z has_accepted_license: '1' intvolume: ' 10693' language: - iso: eng main_file_link: - open_access: '1' url: https://eprint.iacr.org/2017/453.pdf oa: '1' page: 438-453 place: Cham project: - _id: '1' name: SFB 901 - _id: '4' name: SFB 901 - Project Area C - _id: '13' name: SFB 901 - Subproject C1 publication: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS) publication_identifier: isbn: - '9783319724522' - '9783319724539' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: Subtleties in Security Definitions for Predicate Encryption with Public Index type: conference user_id: '477' volume: 10693 year: '2017' ... --- _id: '23396' author: - first_name: Christopher full_name: Gerking, Christopher last_name: Gerking - first_name: David full_name: Schubert, David last_name: Schubert - first_name: Ingo full_name: Budde, Ingo last_name: Budde citation: ama: 'Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In: Theory and Practice of Model Transformation. Cham; 2017. doi:10.1007/978-3-319-61473-1_2' apa: Gerking, C., Schubert, D., & Budde, I. (2017). Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities. In Theory and Practice of Model Transformation. Cham. https://doi.org/10.1007/978-3-319-61473-1_2 bibtex: '@inbook{Gerking_Schubert_Budde_2017, place={Cham}, title={Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities}, DOI={10.1007/978-3-319-61473-1_2}, booktitle={Theory and Practice of Model Transformation}, author={Gerking, Christopher and Schubert, David and Budde, Ingo}, year={2017} }' chicago: Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” In Theory and Practice of Model Transformation. Cham, 2017. https://doi.org/10.1007/978-3-319-61473-1_2. ieee: C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities,” in Theory and Practice of Model Transformation, Cham, 2017. mla: Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” Theory and Practice of Model Transformation, 2017, doi:10.1007/978-3-319-61473-1_2. short: 'C. Gerking, D. Schubert, I. Budde, in: Theory and Practice of Model Transformation, Cham, 2017.' date_created: 2021-08-13T20:33:08Z date_updated: 2022-01-06T06:55:52Z doi: 10.1007/978-3-319-61473-1_2 language: - iso: eng place: Cham publication: Theory and Practice of Model Transformation publication_identifier: issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities type: book_chapter user_id: '13693' year: '2017' ... --- _id: '2344' author: - first_name: Johannes full_name: Blömer, Johannes id: '23' last_name: Blömer - first_name: Peter full_name: Günther, Peter last_name: Günther - first_name: Volker full_name: Krummel, Volker last_name: Krummel - first_name: Nils full_name: Löken, Nils id: '13703' last_name: Löken citation: ama: 'Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1' apa: 'Blömer, J., Günther, P., Krummel, V., & Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In Foundations and Practice of Security (pp. 3–17). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-75650-9_1' bibtex: '@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={10.1007/978-3-319-75650-9_1}, booktitle={Foundations and Practice of Security}, publisher={Springer International Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and Löken, Nils}, year={2017}, pages={3–17} }' chicago: 'Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In Foundations and Practice of Security, 3–17. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-75650-9_1.' ieee: J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in Foundations and Practice of Security, 2017, pp. 3–17. mla: Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” Foundations and Practice of Security, Springer International Publishing, 2017, pp. 3–17, doi:10.1007/978-3-319-75650-9_1. short: 'J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.' date_created: 2018-04-13T11:40:48Z date_updated: 2022-01-06T06:55:55Z ddc: - '000' department: - _id: '64' doi: 10.1007/978-3-319-75650-9_1 file: - access_level: closed content_type: application/pdf creator: ups date_created: 2018-11-02T15:04:13Z date_updated: 2018-11-02T15:04:13Z file_id: '5292' file_name: Attribute-BasedEncryptionAsASe.pdf file_size: 634736 relation: main_file success: 1 - access_level: open_access content_type: application/pdf creator: nilo date_created: 2018-11-08T09:53:34Z date_updated: 2018-11-08T09:53:34Z file_id: '5425' file_name: abe_aas.pdf file_size: 522516 relation: main_file file_date_updated: 2018-11-08T09:53:34Z has_accepted_license: '1' language: - iso: eng oa: '1' page: 3-17 place: Cham project: - _id: '13' name: SFB 901 - Subproject C1 - _id: '4' name: SFB 901 - Project Area C - _id: '1' name: SFB 901 - _id: '43' name: Securing the Financial Cloud publication: Foundations and Practice of Security publication_identifier: isbn: - '9783319756493' - '9783319756509' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations type: conference user_id: '13703' year: '2017' ... --- _id: '2381' abstract: - lang: eng text: Metric facility location and K-means are well-known problems of combinatorial optimization. Both admit a fairly simple heuristic called single-swap, which adds, drops or swaps open facilities until it reaches a local optimum. For both problems, it is known that this algorithm produces a solution that is at most a constant factor worse than the respective global optimum. In this paper, we show that single-swap applied to the weighted metric uncapacitated facility location and weighted discrete K-means problem is tightly PLS-complete and hence has exponential worst-case running time. author: - first_name: Sascha full_name: Brauer, Sascha id: '13291' last_name: Brauer citation: ama: 'Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. Lecture Notes in Computer Science. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:10.1007/978-3-319-57586-5_11' apa: 'Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, & V. T. Paschos (Eds.), Lecture Notes in Computer Science (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-57586-5_11' bibtex: '@inbook{Brauer_2017, place={Cham}, title={Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems}, volume={10236}, DOI={10.1007/978-3-319-57586-5_11}, booktitle={Lecture Notes in Computer Science}, publisher={Springer International Publishing}, author={Brauer, Sascha}, editor={Fotakis, Dimitris and Pagourtzis, Aris and Paschos, Vangelis Th.Editors}, year={2017}, pages={116–127} }' chicago: 'Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In Lecture Notes in Computer Science, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-57586-5_11.' ieee: 'S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems,” in Lecture Notes in Computer Science, vol. 10236, D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International Publishing, 2017, pp. 116–127.' mla: Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” Lecture Notes in Computer Science, edited by Dimitris Fotakis et al., vol. 10236, Springer International Publishing, 2017, pp. 116–27, doi:10.1007/978-3-319-57586-5_11. short: 'S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.' conference: end_date: 2017-05-26 location: Athens, Greece name: 10th International Conference on Algorithms and Complexity start_date: 2017-05-24 date_created: 2018-04-17T12:20:53Z date_updated: 2022-01-06T06:56:00Z department: - _id: '64' doi: 10.1007/978-3-319-57586-5_11 editor: - first_name: Dimitris full_name: Fotakis, Dimitris last_name: Fotakis - first_name: Aris full_name: Pagourtzis, Aris last_name: Pagourtzis - first_name: Vangelis Th. full_name: Paschos, Vangelis Th. last_name: Paschos intvolume: ' 10236' language: - iso: eng page: 116-127 place: Cham publication: Lecture Notes in Computer Science publication_identifier: isbn: - '9783319575858' - '9783319575865' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems type: book_chapter user_id: '13291' volume: 10236 year: '2017' ... --- _id: '5769' abstract: - lang: eng text: "Information Flow Analysis (IFA) aims at detecting illegal flows of information between program entities. “Legality” is therein specified in terms of various security policies. For the analysis, this opens up two possibilities: building generic, policy independent and building specific, policy dependent IFAs. While the former needs to track all dependencies between program entities, the latter allows for a reduced and thus more efficient analysis.\r\n\r\nIn this paper, we start out by formally defining a policy independent information flow analysis. Next, we show how to specialize this IFA via policy specific variable tracking, and prove soundness of the specialization. We furthermore investigate refinement relationships between policies, allowing an IFA for one policy to be employed for its refinements. As policy refinement depends on concrete program entities, we additionally propose a precomputation of policy refinement conditions, enabling an efficient refinement check for concrete programs." author: - first_name: Manuel full_name: Töws, Manuel id: '11315' last_name: Töws - first_name: Heike full_name: Wehrheim, Heike id: '573' last_name: Wehrheim citation: ama: 'Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses. In: Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017). Springer International Publishing; 2017:362-378. doi:10.1007/978-3-319-68690-5_22' apa: Töws, M., & Wehrheim, H. (2017). Policy Dependent and Independent Information Flow Analyses. In Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017) (pp. 362–378). Springer International Publishing. https://doi.org/10.1007/978-3-319-68690-5_22 bibtex: '@inproceedings{Töws_Wehrheim_2017, title={Policy Dependent and Independent Information Flow Analyses}, DOI={10.1007/978-3-319-68690-5_22}, booktitle={Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017)}, publisher={Springer International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2017}, pages={362–378} }' chicago: Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” In Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), 362–78. Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-68690-5_22. ieee: M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow Analyses,” in Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), 2017, pp. 362–378. mla: Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information Flow Analyses.” Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), Springer International Publishing, 2017, pp. 362–78, doi:10.1007/978-3-319-68690-5_22. short: 'M. Töws, H. Wehrheim, in: Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), Springer International Publishing, 2017, pp. 362–378.' date_created: 2018-11-21T09:38:43Z date_updated: 2022-01-06T07:02:39Z ddc: - '000' department: - _id: '77' doi: 10.1007/978-3-319-68690-5_22 file: - access_level: closed content_type: application/pdf creator: mtoews date_created: 2018-11-26T15:07:42Z date_updated: 2018-11-26T15:07:42Z file_id: '5836' file_name: Töws-Wehrheim2017_Chapter_PolicyDependentAndIndependentI.pdf file_size: 424031 relation: main_file success: 1 file_date_updated: 2018-11-26T15:07:42Z has_accepted_license: '1' language: - iso: eng page: 362-378 project: - _id: '12' name: SFB 901 - Subproject B4 - _id: '3' name: SFB 901 - Project Area B - _id: '1' name: SFB 901 publication: Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods (ICFEM 2017) publication_identifier: isbn: - '9783319686899' - '9783319686905' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Policy Dependent and Independent Information Flow Analyses type: conference user_id: '477' year: '2017' ... --- _id: '6255' author: - first_name: Holger Gerhard full_name: Fischer, Holger Gerhard id: '30457' last_name: Fischer - first_name: Michael full_name: Engler, Michael last_name: Engler - first_name: Stefan full_name: Sauer, Stefan id: '447' last_name: Sauer citation: ama: 'Fischer HG, Engler M, Sauer S. A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In: Design, User Experience, and Usability: Theory, Methodology, and Management. Vol 10288. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:570-583. doi:10.1007/978-3-319-58634-2_42' apa: 'Fischer, H. G., Engler, M., & Sauer, S. (2017). A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0. In Design, User Experience, and Usability: Theory, Methodology, and Management (Vol. 10288, pp. 570–583). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-58634-2_42' bibtex: '@inbook{Fischer_Engler_Sauer_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0}, volume={10288}, DOI={10.1007/978-3-319-58634-2_42}, booktitle={Design, User Experience, and Usability: Theory, Methodology, and Management}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Engler, Michael and Sauer, Stefan}, year={2017}, pages={570–583}, collection={Lecture Notes in Computer Science} }' chicago: 'Fischer, Holger Gerhard, Michael Engler, and Stefan Sauer. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” In Design, User Experience, and Usability: Theory, Methodology, and Management, 10288:570–83. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-58634-2_42.' ieee: 'H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0,” in Design, User Experience, and Usability: Theory, Methodology, and Management, vol. 10288, Cham: Springer International Publishing, 2017, pp. 570–583.' mla: 'Fischer, Holger Gerhard, et al. “A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0.” Design, User Experience, and Usability: Theory, Methodology, and Management, vol. 10288, Springer International Publishing, 2017, pp. 570–83, doi:10.1007/978-3-319-58634-2_42.' short: 'H.G. Fischer, M. Engler, S. Sauer, in: Design, User Experience, and Usability: Theory, Methodology, and Management, Springer International Publishing, Cham, 2017, pp. 570–583.' conference: end_date: 2017-07-14 location: Vancouver, Canada name: International Conference of Design, User Experience, and Usability (DUXU) as part of HCI International 2017 start_date: 2017-07-09 date_created: 2018-12-18T10:44:24Z date_updated: 2022-01-06T07:02:58Z department: - _id: '66' - _id: '534' - _id: '221' doi: 10.1007/978-3-319-58634-2_42 intvolume: ' 10288' language: - iso: eng page: 570-583 place: Cham publication: 'Design, User Experience, and Usability: Theory, Methodology, and Management' publication_identifier: isbn: - '9783319586335' - '9783319586342' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: 'A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0' type: book_chapter user_id: '30457' volume: 10288 year: '2017' ... --- _id: '16461' author: - first_name: Pascal full_name: Bemmann, Pascal last_name: Bemmann - first_name: Felix full_name: Biermeier, Felix last_name: Biermeier - first_name: Jan full_name: Bürmann, Jan last_name: Bürmann - first_name: Arne full_name: Kemper, Arne last_name: Kemper - first_name: Till full_name: Knollmann, Till id: '39241' last_name: Knollmann orcid: 0000-0003-2014-4696 - first_name: Steffen full_name: Knorr, Steffen last_name: Knorr - first_name: Nils full_name: Kothe, Nils last_name: Kothe - first_name: Alexander full_name: Mäcker, Alexander id: '13536' last_name: Mäcker - first_name: Manuel full_name: Malatyali, Manuel id: '41265' last_name: Malatyali - first_name: Friedhelm full_name: Meyer auf der Heide, Friedhelm id: '15523' last_name: Meyer auf der Heide - first_name: Sören full_name: Riechers, Sören last_name: Riechers - first_name: Johannes Sebastian full_name: Schaefer, Johannes Sebastian id: '30291' last_name: Schaefer - first_name: Jannik full_name: Sundermeier, Jannik id: '38705' last_name: Sundermeier citation: ama: 'Bemmann P, Biermeier F, Bürmann J, et al. Monitoring of Domain-Related Problems in Distributed Data Streams. In: Structural Information and Communication Complexity. ; 2017. doi:10.1007/978-3-319-72050-0_13' apa: Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr, S., Kothe, N., Mäcker, A., Malatyali, M., Meyer auf der Heide, F., Riechers, S., Schaefer, J. S., & Sundermeier, J. (2017). Monitoring of Domain-Related Problems in Distributed Data Streams. In Structural Information and Communication Complexity. https://doi.org/10.1007/978-3-319-72050-0_13 bibtex: '@inbook{Bemmann_Biermeier_Bürmann_Kemper_Knollmann_Knorr_Kothe_Mäcker_Malatyali_Meyer auf der Heide_et al._2017, place={Cham}, title={Monitoring of Domain-Related Problems in Distributed Data Streams}, DOI={10.1007/978-3-319-72050-0_13}, booktitle={Structural Information and Communication Complexity}, author={Bemmann, Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel and Meyer auf der Heide, Friedhelm and et al.}, year={2017} }' chicago: Bemmann, Pascal, Felix Biermeier, Jan Bürmann, Arne Kemper, Till Knollmann, Steffen Knorr, Nils Kothe, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” In Structural Information and Communication Complexity. Cham, 2017. https://doi.org/10.1007/978-3-319-72050-0_13. ieee: P. Bemmann et al., “Monitoring of Domain-Related Problems in Distributed Data Streams,” in Structural Information and Communication Complexity, Cham, 2017. mla: Bemmann, Pascal, et al. “Monitoring of Domain-Related Problems in Distributed Data Streams.” Structural Information and Communication Complexity, 2017, doi:10.1007/978-3-319-72050-0_13. short: 'P. Bemmann, F. Biermeier, J. Bürmann, A. Kemper, T. Knollmann, S. Knorr, N. Kothe, A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, J.S. Schaefer, J. Sundermeier, in: Structural Information and Communication Complexity, Cham, 2017.' date_created: 2020-04-08T07:20:20Z date_updated: 2022-01-06T06:52:50Z department: - _id: '63' doi: 10.1007/978-3-319-72050-0_13 external_id: arxiv: - 'arXiv:1706.03568 ' language: - iso: eng place: Cham publication: Structural Information and Communication Complexity publication_identifier: isbn: - '9783319720494' - '9783319720500' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Monitoring of Domain-Related Problems in Distributed Data Streams type: book_chapter user_id: '15415' year: '2017' ... --- _id: '14857' author: - first_name: Michaela full_name: Beckschäfer, Michaela id: '32439' last_name: Beckschäfer - first_name: Simon full_name: Malberg, Simon last_name: Malberg - first_name: Kevin full_name: Tierney, Kevin last_name: Tierney - first_name: Christoph full_name: Weskamp, Christoph last_name: Weskamp citation: ama: 'Beckschäfer M, Malberg S, Tierney K, Weskamp C. Simulating Storage Policies for an Automated Grid-Based Warehouse System. In: Lecture Notes in Computer Science. Cham; 2017. doi:10.1007/978-3-319-68496-3_31' apa: Beckschäfer, M., Malberg, S., Tierney, K., & Weskamp, C. (2017). Simulating Storage Policies for an Automated Grid-Based Warehouse System. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-319-68496-3_31 bibtex: '@inbook{Beckschäfer_Malberg_Tierney_Weskamp_2017, place={Cham}, title={Simulating Storage Policies for an Automated Grid-Based Warehouse System}, DOI={10.1007/978-3-319-68496-3_31}, booktitle={Lecture Notes in Computer Science}, author={Beckschäfer, Michaela and Malberg, Simon and Tierney, Kevin and Weskamp, Christoph}, year={2017} }' chicago: Beckschäfer, Michaela, Simon Malberg, Kevin Tierney, and Christoph Weskamp. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” In Lecture Notes in Computer Science. Cham, 2017. https://doi.org/10.1007/978-3-319-68496-3_31. ieee: M. Beckschäfer, S. Malberg, K. Tierney, and C. Weskamp, “Simulating Storage Policies for an Automated Grid-Based Warehouse System,” in Lecture Notes in Computer Science, Cham, 2017. mla: Beckschäfer, Michaela, et al. “Simulating Storage Policies for an Automated Grid-Based Warehouse System.” Lecture Notes in Computer Science, 2017, doi:10.1007/978-3-319-68496-3_31. short: 'M. Beckschäfer, S. Malberg, K. Tierney, C. Weskamp, in: Lecture Notes in Computer Science, Cham, 2017.' date_created: 2019-11-08T08:15:11Z date_updated: 2022-01-06T06:52:08Z department: - _id: '277' doi: 10.1007/978-3-319-68496-3_31 language: - iso: eng place: Cham publication: Lecture Notes in Computer Science publication_identifier: isbn: - '9783319684956' - '9783319684963' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Simulating Storage Policies for an Automated Grid-Based Warehouse System type: book_chapter user_id: '1112' year: '2017' ... --- _id: '20000' author: - first_name: Heiko full_name: Hamann, Heiko last_name: Hamann - first_name: Gabriele full_name: Valentini, Gabriele last_name: Valentini - first_name: Marco full_name: Dorigo, Marco last_name: Dorigo citation: ama: 'Hamann H, Valentini G, Dorigo M. Population Coding: A New Design Paradigm for Embodied Distributed Systems. In: 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham; 2016. doi:10.1007/978-3-319-44427-7_15' apa: 'Hamann, H., Valentini, G., & Dorigo, M. (2016). Population Coding: A New Design Paradigm for Embodied Distributed Systems. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham. https://doi.org/10.1007/978-3-319-44427-7_15' bibtex: '@inproceedings{Hamann_Valentini_Dorigo_2016, place={Cham}, title={Population Coding: A New Design Paradigm for Embodied Distributed Systems}, DOI={10.1007/978-3-319-44427-7_15}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Hamann, Heiko and Valentini, Gabriele and Dorigo, Marco}, year={2016} }' chicago: 'Hamann, Heiko, Gabriele Valentini, and Marco Dorigo. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. Cham, 2016. https://doi.org/10.1007/978-3-319-44427-7_15.' ieee: 'H. Hamann, G. Valentini, and M. Dorigo, “Population Coding: A New Design Paradigm for Embodied Distributed Systems,” in 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.' mla: 'Hamann, Heiko, et al. “Population Coding: A New Design Paradigm for Embodied Distributed Systems.” 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016, doi:10.1007/978-3-319-44427-7_15.' short: 'H. Hamann, G. Valentini, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, Cham, 2016.' date_created: 2020-10-15T09:55:35Z date_updated: 2022-01-06T06:54:18Z department: - _id: '63' - _id: '238' doi: 10.1007/978-3-319-44427-7_15 language: - iso: eng place: Cham publication: 10th Int. Conf. on Swarm Intelligence, ANTS 2016 publication_identifier: isbn: - '9783319444260' - '9783319444277' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: 'Population Coding: A New Design Paradigm for Embodied Distributed Systems' type: conference user_id: '15415' year: '2016' ... --- _id: '20004' author: - first_name: Gabriele full_name: Valentini, Gabriele last_name: Valentini - first_name: Davide full_name: Brambilla, Davide last_name: Brambilla - first_name: Heiko full_name: Hamann, Heiko last_name: Hamann - first_name: Marco full_name: Dorigo, Marco last_name: Dorigo citation: ama: 'Valentini G, Brambilla D, Hamann H, Dorigo M. Collective Perception of Environmental Features in a Robot Swarm. In: 10th Int. Conf. on Swarm Intelligence, ANTS 2016. ; 2016. doi:10.1007/978-3-319-44427-7_6' apa: Valentini, G., Brambilla, D., Hamann, H., & Dorigo, M. (2016). Collective Perception of Environmental Features in a Robot Swarm. In 10th Int. Conf. on Swarm Intelligence, ANTS 2016. https://doi.org/10.1007/978-3-319-44427-7_6 bibtex: '@inproceedings{Valentini_Brambilla_Hamann_Dorigo_2016, title={Collective Perception of Environmental Features in a Robot Swarm}, DOI={10.1007/978-3-319-44427-7_6}, booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Valentini, Gabriele and Brambilla, Davide and Hamann, Heiko and Dorigo, Marco}, year={2016} }' chicago: Valentini, Gabriele, Davide Brambilla, Heiko Hamann, and Marco Dorigo. “Collective Perception of Environmental Features in a Robot Swarm.” In 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016. https://doi.org/10.1007/978-3-319-44427-7_6. ieee: G. Valentini, D. Brambilla, H. Hamann, and M. Dorigo, “Collective Perception of Environmental Features in a Robot Swarm,” in 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016. mla: Valentini, Gabriele, et al. “Collective Perception of Environmental Features in a Robot Swarm.” 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016, doi:10.1007/978-3-319-44427-7_6. short: 'G. Valentini, D. Brambilla, H. Hamann, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016.' date_created: 2020-10-15T10:22:20Z date_updated: 2022-01-06T06:54:18Z department: - _id: '63' - _id: '238' doi: 10.1007/978-3-319-44427-7_6 language: - iso: eng publication: 10th Int. Conf. on Swarm Intelligence, ANTS 2016 publication_identifier: isbn: - '9783319444260' - '9783319444277' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Collective Perception of Environmental Features in a Robot Swarm type: conference user_id: '15415' year: '2016' ... --- _id: '2948' author: - first_name: Peter full_name: Günther, Peter last_name: Günther - first_name: Volker full_name: Krummel, Volker last_name: Krummel citation: ama: 'Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: Mathematical Aspects of Computer and Information Sciences. Cham: Springer International Publishing; 2016:151-165. doi:10.1007/978-3-319-32859-1_13' apa: 'Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer and Information Sciences (pp. 151–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32859-1_13' bibtex: '@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={10.1007/978-3-319-32859-1_13}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }' chicago: 'Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In Mathematical Aspects of Computer and Information Sciences, 151–65. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-32859-1_13.' ieee: 'P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in Mathematical Aspects of Computer and Information Sciences, Cham: Springer International Publishing, 2016, pp. 151–165.' mla: Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, 2016, pp. 151–65, doi:10.1007/978-3-319-32859-1_13. short: 'P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.' date_created: 2018-05-29T11:26:56Z date_updated: 2022-01-06T06:58:48Z department: - _id: '64' doi: 10.1007/978-3-319-32859-1_13 page: 151-165 place: Cham project: - _id: '43' name: Securing the Financial Cloud publication: Mathematical Aspects of Computer and Information Sciences publication_identifier: isbn: - '9783319328584' - '9783319328591' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures type: book_chapter user_id: '25078' year: '2016' ... --- _id: '2968' author: - first_name: Johannes full_name: Blömer, Johannes id: '23' last_name: Blömer - first_name: Christiane full_name: Lammersen, Christiane last_name: Lammersen - first_name: Melanie full_name: Schmidt, Melanie last_name: Schmidt - first_name: Christian full_name: Sohler, Christian last_name: Sohler citation: ama: 'Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: Algorithm Engineering. Cham: Springer International Publishing; 2016:81-116. doi:10.1007/978-3-319-49487-6_3' apa: 'Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering (pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3' bibtex: '@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical Analysis of the k-Means Algorithm – A Survey}, DOI={10.1007/978-3-319-49487-6_3}, booktitle={Algorithm Engineering}, publisher={Springer International Publishing}, author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler, Christian}, year={2016}, pages={81–116} }' chicago: 'Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In Algorithm Engineering, 81–116. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-49487-6_3.' ieee: 'J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in Algorithm Engineering, Cham: Springer International Publishing, 2016, pp. 81–116.' mla: Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A Survey.” Algorithm Engineering, Springer International Publishing, 2016, pp. 81–116, doi:10.1007/978-3-319-49487-6_3. short: 'J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.' date_created: 2018-06-04T12:22:40Z date_updated: 2022-01-06T06:58:49Z department: - _id: '64' doi: 10.1007/978-3-319-49487-6_3 page: 81-116 place: Cham publication: Algorithm Engineering publication_identifier: isbn: - '9783319494869' - '9783319494876' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Theoretical Analysis of the k-Means Algorithm – A Survey type: book_chapter user_id: '25078' year: '2016' ... --- _id: '2970' author: - first_name: Johannes full_name: Blömer, Johannes id: '23' last_name: Blömer - first_name: Kathrin full_name: Bujna, Kathrin last_name: Bujna citation: ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Cham: Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24' apa: 'Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24' bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={10.1007/978-3-319-31750-2_24}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }' chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.' ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.' mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” Advances in Knowledge Discovery and Data Mining, Springer International Publishing, 2016, pp. 296–308, doi:10.1007/978-3-319-31750-2_24. short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.' date_created: 2018-06-04T12:27:21Z date_updated: 2022-01-06T06:58:49Z department: - _id: '64' doi: 10.1007/978-3-319-31750-2_24 page: 296-308 place: Cham publication: Advances in Knowledge Discovery and Data Mining publication_identifier: isbn: - '9783319317496' - '9783319317502' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Adaptive Seeding for Gaussian Mixture Models type: book_chapter user_id: '25078' year: '2016' ... --- _id: '5825' abstract: - lang: eng text: Integrating apps on mobile devices into applications running on other devices is usually difficult. For instance, using a messenger on a smartphone to share a text written on a desktop computer often ends up in a cumbersome solution to transfer the text, because many applications are not designed for such scenarios. In this paper, we present an approach enabling the integration of apps running on Android devices into applications running on other devices and even other platforms. This is achieved by specifying adapters for Android apps, which map their services to a platform-independent service interface. For this purpose, we have developed a domain-specific language to ease the specification of such mappings. Our approach is applicable without the need to modify the existing Android apps providing the service. We analyzed its feasibility by implementing our approach and by specifying mappings for several popular Android apps, e.g., phone book, camera, and file explorer. author: - first_name: Dennis full_name: Wolters, Dennis id: '11308' last_name: Wolters - first_name: Jonas full_name: Kirchhoff, Jonas id: '39928' last_name: Kirchhoff - first_name: Christian full_name: Gerth, Christian last_name: Gerth - first_name: Gregor full_name: Engels, Gregor id: '107' last_name: Engels citation: ama: 'Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. Service-Oriented Computing. Cham: Springer International Publishing; 2016:171-185. doi:10.1007/978-3-319-46295-0_11' apa: 'Wolters, D., Kirchhoff, J., Gerth, C., & Engels, G. (2016). Cross-Device Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, & S. Bhiri (Eds.), Service-Oriented Computing (pp. 171–185). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-46295-0_11' bibtex: '@inproceedings{Wolters_Kirchhoff_Gerth_Engels_2016, place={Cham}, title={Cross-Device Integration of Android Apps}, DOI={10.1007/978-3-319-46295-0_11}, booktitle={Service-Oriented Computing}, publisher={Springer International Publishing}, author={Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels, Gregor}, editor={Sheng, Quan Z. and Stroulia, Eleni and Tata, Samir and Bhiri, Sami Editors}, year={2016}, pages={171–185} }' chicago: 'Wolters, Dennis, Jonas Kirchhoff, Christian Gerth, and Gregor Engels. “Cross-Device Integration of Android Apps.” In Service-Oriented Computing, edited by Quan Z. Sheng, Eleni Stroulia, Samir Tata, and Sami Bhiri, 171–85. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-46295-0_11.' ieee: D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration of Android Apps,” in Service-Oriented Computing, 2016, pp. 171–185. mla: Wolters, Dennis, et al. “Cross-Device Integration of Android Apps.” Service-Oriented Computing, edited by Quan Z. Sheng et al., Springer International Publishing, 2016, pp. 171–85, doi:10.1007/978-3-319-46295-0_11. short: 'D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia, S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing, Cham, 2016, pp. 171–185.' date_created: 2018-11-26T10:21:38Z date_updated: 2022-01-06T07:02:43Z department: - _id: '66' doi: 10.1007/978-3-319-46295-0_11 editor: - first_name: 'Quan Z. ' full_name: 'Sheng, Quan Z. ' last_name: Sheng - first_name: 'Eleni ' full_name: 'Stroulia, Eleni ' last_name: Stroulia - first_name: 'Samir ' full_name: 'Tata, Samir ' last_name: Tata - first_name: 'Sami ' full_name: 'Bhiri, Sami ' last_name: Bhiri keyword: - Cross-Device - Integration - Android - Adapter - DSL language: - iso: eng page: 171-185 place: Cham publication: Service-Oriented Computing publication_identifier: isbn: - '9783319462943' - '9783319462950' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Cross-Device Integration of Android Apps type: conference user_id: '39928' year: '2016' ... --- _id: '6257' author: - first_name: Holger Gerhard full_name: Fischer, Holger Gerhard id: '30457' last_name: Fischer - first_name: Björn full_name: Senft, Björn id: '9109' last_name: Senft citation: ama: 'Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed. Human-Centered and Error-Resilient Systems Development. Vol 9856. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41. doi:10.1007/978-3-319-44902-9_3' apa: 'Fischer, H. G., & Senft, B. (2016). Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows. In C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development (Vol. 9856, pp. 30–41). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-44902-9_3' bibtex: '@inbook{Fischer_Senft_2016, place={Cham}, series={Lecture Notes in Computer Science}, title={Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows}, volume={9856}, DOI={10.1007/978-3-319-44902-9_3}, booktitle={Human-Centered and Error-Resilient Systems Development}, publisher={Springer International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn}, editor={Bogdan, ChristianEditor}, year={2016}, pages={30–41}, collection={Lecture Notes in Computer Science} }' chicago: 'Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” In Human-Centered and Error-Resilient Systems Development, edited by Christian Bogdan, 9856:30–41. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-44902-9_3.' ieee: 'H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows,” in Human-Centered and Error-Resilient Systems Development, vol. 9856, C. Bogdan, Ed. Cham: Springer International Publishing, 2016, pp. 30–41.' mla: Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.” Human-Centered and Error-Resilient Systems Development, edited by Christian Bogdan, vol. 9856, Springer International Publishing, 2016, pp. 30–41, doi:10.1007/978-3-319-44902-9_3. short: 'H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41.' conference: end_date: 2016-08-31 location: Stockholm, Sweden name: International Conference on Human-Centred Software Engineering start_date: 2016-08-29 date_created: 2018-12-18T10:51:10Z date_updated: 2022-01-06T07:02:58Z department: - _id: '66' - _id: '534' - _id: '221' doi: 10.1007/978-3-319-44902-9_3 editor: - first_name: Christian full_name: Bogdan, Christian last_name: Bogdan intvolume: ' 9856' language: - iso: eng page: 30-41 place: Cham publication: Human-Centered and Error-Resilient Systems Development publication_identifier: isbn: - '9783319449012' - '9783319449029' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows type: book_chapter user_id: '30457' volume: 9856 year: '2016' ... --- _id: '2978' author: - first_name: Johannes full_name: Blömer, Johannes id: '23' last_name: Blömer - first_name: Kathrin full_name: Bujna, Kathrin last_name: Bujna citation: ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24' apa: Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24 bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian Mixture Models}, DOI={10.1007/978-3-319-31750-2_24}, booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016}, pages={296–308} }' chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.' ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.' mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” Advances in Knowledge Discovery and Data Mining, Springer International Publishing, 2016, pp. 296–308, doi:10.1007/978-3-319-31750-2_24. short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.' date_created: 2018-06-05T07:31:39Z date_updated: 2023-01-10T13:49:50Z department: - _id: '64' doi: 10.1007/978-3-319-31750-2_24 page: 296-308 place: Cham publication: Advances in Knowledge Discovery and Data Mining publication_identifier: isbn: - '9783319317496' - '9783319317502' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing status: public title: Adaptive Seeding for Gaussian Mixture Models type: book_chapter user_id: '25078' year: '2016' ... --- _id: '2921' author: - first_name: Olivier full_name: Blazy, Olivier last_name: Blazy - first_name: Saqib full_name: Kakvi, Saqib id: '66268' last_name: Kakvi - first_name: Eike full_name: Kiltz, Eike last_name: Kiltz - first_name: Jiaxin full_name: Pan, Jiaxin last_name: Pan citation: ama: 'Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12' apa: 'Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12' bibtex: '@inbook{Blazy_Kakvi_Kiltz_Pan_2015, place={Berlin, Heidelberg}, title={Tightly-Secure Signatures from Chameleon Hash Functions}, DOI={10.1007/978-3-662-46447-2_12}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}, year={2015}, pages={256–279} }' chicago: 'Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In Lecture Notes in Computer Science, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. https://doi.org/10.1007/978-3-662-46447-2_12.' ieee: 'O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.' mla: Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.” Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2015, pp. 256–79, doi:10.1007/978-3-662-46447-2_12. short: 'O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.' date_created: 2018-05-25T12:46:08Z date_updated: 2022-01-06T06:58:47Z department: - _id: '558' doi: 10.1007/978-3-662-46447-2_12 extern: '1' main_file_link: - open_access: '1' url: https://eprint.iacr.org/2014/1021.pdf oa: '1' page: 256-279 place: Berlin, Heidelberg publication: Lecture Notes in Computer Science publication_identifier: isbn: - '9783662464465' - '9783662464472' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer Berlin Heidelberg status: public title: Tightly-Secure Signatures from Chameleon Hash Functions type: book_chapter user_id: '66268' year: '2015' ... --- _id: '15897' author: - first_name: Christian full_name: Altmeier, Christian last_name: Altmeier - first_name: Christian full_name: Mainka, Christian last_name: Mainka - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk citation: ama: 'Altmeier C, Mainka C, Somorovsky J, Schwenk J. AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Lecture Notes in Computer Science 9481. Cham; 2015. doi:10.1007/978-3-319-29883-2_5' apa: Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Cham. https://doi.org/10.1007/978-3-319-29883-2_5 bibtex: '@inbook{Altmeier_Mainka_Somorovsky_Schwenk_2015, place={Cham}, series={Lecture Notes in Computer Science 9481}, title={AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services}, DOI={10.1007/978-3-319-29883-2_5}, booktitle={Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015}, author={Altmeier, Christian and Mainka, Christian and Somorovsky, Juraj and Schwenk, Jörg}, year={2015}, collection={Lecture Notes in Computer Science 9481} }' chicago: Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” In Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015. Lecture Notes in Computer Science 9481. Cham, 2015. https://doi.org/10.1007/978-3-319-29883-2_5. ieee: C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services,” in Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015. mla: Altmeier, Christian, et al. “AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.” Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, 2015, doi:10.1007/978-3-319-29883-2_5. short: 'C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015.' conference: location: Vienna date_created: 2020-02-15T09:40:09Z date_updated: 2022-01-06T06:52:39Z doi: 10.1007/978-3-319-29883-2_5 language: - iso: eng place: Cham publication: Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015 publication_identifier: isbn: - '9783319298825' - '9783319298832' issn: - 0302-9743 - 1611-3349 publication_status: published series_title: Lecture Notes in Computer Science 9481 status: public title: AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services type: book_chapter user_id: '83504' year: '2015' ... --- _id: '15899' author: - first_name: Tibor full_name: Jager, Tibor last_name: Jager - first_name: Jörg full_name: Schwenk, Jörg last_name: Schwenk - first_name: Juraj full_name: Somorovsky, Juraj id: '83504' last_name: Somorovsky orcid: 0000-0002-3593-7720 citation: ama: 'Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security -- ESORICS 2015. Cham; 2015. doi:10.1007/978-3-319-24174-6_21' apa: Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21 bibtex: '@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={10.1007/978-3-319-24174-6_21}, booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015} }' chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In Computer Security -- ESORICS 2015. Cham, 2015. https://doi.org/10.1007/978-3-319-24174-6_21. ieee: T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security -- ESORICS 2015, Cham, 2015. mla: Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer Security -- ESORICS 2015, 2015, doi:10.1007/978-3-319-24174-6_21. short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, Cham, 2015.' date_created: 2020-02-15T09:41:17Z date_updated: 2022-01-06T06:52:39Z doi: 10.1007/978-3-319-24174-6_21 extern: '1' language: - iso: eng main_file_link: - url: https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/ place: Cham publication: Computer Security -- ESORICS 2015 publication_identifier: isbn: - '9783319241739' - '9783319241746' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Practical Invalid Curve Attacks on TLS-ECDH type: book_chapter user_id: '83504' year: '2015' ... --- _id: '15088' author: - first_name: Stefan full_name: Böttcher, Stefan id: '624' last_name: Böttcher - first_name: Rita full_name: Hartel, Rita id: '14961' last_name: Hartel - first_name: Thomas full_name: Jacobs, Thomas last_name: Jacobs - first_name: Markus full_name: Jeromin, Markus last_name: Jeromin citation: ama: 'Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line Tree Grammars. In: Data Science - 30th British International Conference on Databases, BICOD 2015. Springer; 2015:186-198. doi:10.1007/978-3-319-20424-6_18' apa: Böttcher, S., Hartel, R., Jacobs, T., & Jeromin, M. (2015). ECST – Extended Context-Free Straight-Line Tree Grammars. In Data Science - 30th British International Conference on Databases, BICOD 2015 (pp. 186–198). Springer. https://doi.org/10.1007/978-3-319-20424-6_18 bibtex: '@inproceedings{Böttcher_Hartel_Jacobs_Jeromin_2015, title={ECST – Extended Context-Free Straight-Line Tree Grammars}, DOI={10.1007/978-3-319-20424-6_18}, booktitle={Data Science - 30th British International Conference on Databases, BICOD 2015}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and Jacobs, Thomas and Jeromin, Markus}, year={2015}, pages={186–198} }' chicago: Böttcher, Stefan, Rita Hartel, Thomas Jacobs, and Markus Jeromin. “ECST – Extended Context-Free Straight-Line Tree Grammars.” In Data Science - 30th British International Conference on Databases, BICOD 2015, 186–98. Springer, 2015. https://doi.org/10.1007/978-3-319-20424-6_18. ieee: S. Böttcher, R. Hartel, T. Jacobs, and M. Jeromin, “ECST – Extended Context-Free Straight-Line Tree Grammars,” in Data Science - 30th British International Conference on Databases, BICOD 2015, 2015, pp. 186–198. mla: Böttcher, Stefan, et al. “ECST – Extended Context-Free Straight-Line Tree Grammars.” Data Science - 30th British International Conference on Databases, BICOD 2015, Springer, 2015, pp. 186–98, doi:10.1007/978-3-319-20424-6_18. short: 'S. Böttcher, R. Hartel, T. Jacobs, M. Jeromin, in: Data Science - 30th British International Conference on Databases, BICOD 2015, Springer, 2015, pp. 186–198.' date_created: 2019-11-21T15:08:13Z date_updated: 2022-01-06T06:52:15Z department: - _id: '69' doi: 10.1007/978-3-319-20424-6_18 language: - iso: eng page: 186-198 publication: Data Science - 30th British International Conference on Databases, BICOD 2015 publication_identifier: isbn: - '9783319204239' - '9783319204246' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer status: public title: ECST – Extended Context-Free Straight-Line Tree Grammars type: conference user_id: '14961' year: '2015' ... --- _id: '25338' author: - first_name: Michaela full_name: Geierhos, Michaela last_name: Geierhos - first_name: Frederik S. full_name: Bäumer, Frederik S. last_name: Bäumer - first_name: Sabine full_name: Schulze, Sabine last_name: Schulze - first_name: Caterina full_name: Klotz, Caterina last_name: Klotz citation: ama: 'Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: Modeling and Using Context. ; 2015. doi:10.1007/978-3-319-25591-0_12' apa: Geierhos, M., Bäumer, F. S., Schulze, S., & Klotz, C. (2015). Understanding the Patient 2.0. In Modeling and Using Context. https://doi.org/10.1007/978-3-319-25591-0_12 bibtex: '@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding the Patient 2.0}, DOI={10.1007/978-3-319-25591-0_12}, booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer, Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }' chicago: Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz. “Understanding the Patient 2.0.” In Modeling and Using Context. Cham, 2015. https://doi.org/10.1007/978-3-319-25591-0_12. ieee: M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient 2.0,” in Modeling and Using Context, Cham, 2015. mla: Geierhos, Michaela, et al. “Understanding the Patient 2.0.” Modeling and Using Context, 2015, doi:10.1007/978-3-319-25591-0_12. short: 'M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context, Cham, 2015.' date_created: 2021-10-04T19:02:33Z date_updated: 2022-01-25T18:21:15Z doi: 10.1007/978-3-319-25591-0_12 place: Cham publication: Modeling and Using Context publication_identifier: issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Understanding the Patient 2.0 type: book_chapter user_id: '71124' year: '2015' ... --- _id: '25337' author: - first_name: Michaela full_name: Geierhos, Michaela last_name: Geierhos - first_name: Frederik S. full_name: Bäumer, Frederik S. last_name: Bäumer - first_name: Sabine full_name: Schulze, Sabine last_name: Schulze - first_name: Caterina full_name: Klotz, Caterina last_name: Klotz citation: ama: 'Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0. In: Modeling and Using Context. ; 2015. doi:10.1007/978-3-319-25591-0_12' apa: Geierhos, M., Bäumer, F. S., Schulze, S., & Klotz, C. (2015). Understanding the Patient 2.0. In Modeling and Using Context. https://doi.org/10.1007/978-3-319-25591-0_12 bibtex: '@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding the Patient 2.0}, DOI={10.1007/978-3-319-25591-0_12}, booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer, Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }' chicago: Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz. “Understanding the Patient 2.0.” In Modeling and Using Context. Cham, 2015. https://doi.org/10.1007/978-3-319-25591-0_12. ieee: M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient 2.0,” in Modeling and Using Context, Cham, 2015. mla: Geierhos, Michaela, et al. “Understanding the Patient 2.0.” Modeling and Using Context, 2015, doi:10.1007/978-3-319-25591-0_12. short: 'M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context, Cham, 2015.' date_created: 2021-10-04T18:59:54Z date_updated: 2022-01-25T18:21:13Z doi: 10.1007/978-3-319-25591-0_12 place: Cham publication: Modeling and Using Context publication_identifier: issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Understanding the Patient 2.0 type: book_chapter user_id: '71124' year: '2015' ... --- _id: '20008' author: - first_name: Heiko full_name: Hamann, Heiko last_name: Hamann - first_name: Gabriele full_name: Valentini, Gabriele last_name: Valentini citation: ama: 'Hamann H, Valentini G. Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014). Cham; 2014. doi:10.1007/978-3-319-09952-1_15' apa: 'Hamann, H., & Valentini, G. (2014). Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins. In Ninth Int. Conf. on Swarm Intelligence (ANTS 2014). Cham. https://doi.org/10.1007/978-3-319-09952-1_15' bibtex: '@inproceedings{Hamann_Valentini_2014, place={Cham}, title={Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins}, DOI={10.1007/978-3-319-09952-1_15}, booktitle={Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)}, author={Hamann, Heiko and Valentini, Gabriele}, year={2014} }' chicago: 'Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-Organizing Temporary Lock-Ins.” In Ninth Int. Conf. on Swarm Intelligence (ANTS 2014). Cham, 2014. https://doi.org/10.1007/978-3-319-09952-1_15.' ieee: 'H. Hamann and G. Valentini, “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins,” in Ninth Int. Conf. on Swarm Intelligence (ANTS 2014), 2014.' mla: 'Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based Analysis of Self-Organizing Temporary Lock-Ins.” Ninth Int. Conf. on Swarm Intelligence (ANTS 2014), 2014, doi:10.1007/978-3-319-09952-1_15.' short: 'H. Hamann, G. Valentini, in: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014), Cham, 2014.' date_created: 2020-10-15T14:13:51Z date_updated: 2022-01-06T06:54:18Z department: - _id: '63' - _id: '238' doi: 10.1007/978-3-319-09952-1_15 language: - iso: eng place: Cham publication: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014) publication_identifier: isbn: - '9783319099514' - '9783319099521' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: 'Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins' type: conference user_id: '15415' year: '2014' ... --- _id: '20982' abstract: - lang: eng text: "Real-time software-intensive embedded systems complexity, as in the automotive domain, requires rigorous Requirements Engineering (RE) approaches. Scenario-based RE formalisms like Modal Sequence Diagrams (MSDs) enable an intuitive specication and the simulative validation of functional requirements. However, the dependencies between events occurring in different MSD scenarios are implicit so that it is difficult to find causes of requirements defects, if any. The automotive architecture description language EAST-ADL addresses this problem by relying on event chains, which make dependencies between events explicit. However, EAST-ADL event chains have a low abstraction level, and their relationship to functional requirements has seldom been investigated. Based on the EAST-ADL functional architecture, we propose to use its central notion of event to conciliate both approaches. We conceived an automatic transformation from the high abstraction level requirements specified in MSDs to the low abstraction level event chains.\r\n" author: - first_name: Thorsten full_name: Koch, Thorsten id: '13616' last_name: Koch - first_name: Jörg full_name: Holtmann, Jörg id: '3875' last_name: Holtmann orcid: 0000-0001-6141-4571 - first_name: Julien full_name: DeAntoni, Julien last_name: DeAntoni citation: ama: 'Koch T, Holtmann J, DeAntoni J. Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In: Software Architecture. Cham; 2014. doi:10.1007/978-3-319-09970-5_14' apa: Koch, T., Holtmann, J., & DeAntoni, J. (2014). Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications. In Software Architecture. Cham. https://doi.org/10.1007/978-3-319-09970-5_14 bibtex: '@inbook{Koch_Holtmann_DeAntoni_2014, place={Cham}, title={Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications}, DOI={10.1007/978-3-319-09970-5_14}, booktitle={Software Architecture}, author={Koch, Thorsten and Holtmann, Jörg and DeAntoni, Julien}, year={2014} }' chicago: Koch, Thorsten, Jörg Holtmann, and Julien DeAntoni. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” In Software Architecture. Cham, 2014. https://doi.org/10.1007/978-3-319-09970-5_14. ieee: T. Koch, J. Holtmann, and J. DeAntoni, “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications,” in Software Architecture, Cham, 2014. mla: Koch, Thorsten, et al. “Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications.” Software Architecture, 2014, doi:10.1007/978-3-319-09970-5_14. short: 'T. Koch, J. Holtmann, J. DeAntoni, in: Software Architecture, Cham, 2014.' date_created: 2021-01-13T13:34:35Z date_updated: 2022-01-06T06:54:42Z department: - _id: '241' - _id: '662' doi: 10.1007/978-3-319-09970-5_14 language: - iso: eng place: Cham publication: Software Architecture publication_identifier: isbn: - '9783319099699' - '9783319099705' issn: - 0302-9743 - 1611-3349 publication_status: published status: public title: Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications type: book_chapter user_id: '13616' year: '2014' ... --- _id: '6741' author: - first_name: Dennis full_name: Bokermann, Dennis id: '11308' last_name: Bokermann - first_name: Christian full_name: Gerth, Christian last_name: Gerth - first_name: Gregor full_name: Engels, Gregor id: '107' last_name: Engels citation: ama: 'Bokermann D, Gerth C, Engels G. Use Your Best Device! Enabling Device Changes at Runtime. In: 12th International Conference on Business Process Management (BPM 2014). Vol 8659. Lecture Notes in Computer Science. Springer International Publishing; 2014:357-365. doi:10.1007/978-3-319-10172-9_23' apa: Bokermann, D., Gerth, C., & Engels, G. (2014). Use Your Best Device! Enabling Device Changes at Runtime. In 12th International Conference on Business Process Management (BPM 2014) (Vol. 8659, pp. 357–365). Springer International Publishing. https://doi.org/10.1007/978-3-319-10172-9_23 bibtex: '@inproceedings{Bokermann_Gerth_Engels_2014, series={Lecture Notes in Computer Science}, title={Use Your Best Device! Enabling Device Changes at Runtime}, volume={8659}, DOI={10.1007/978-3-319-10172-9_23}, booktitle={12th International Conference on Business Process Management (BPM 2014)}, publisher={Springer International Publishing}, author={Bokermann, Dennis and Gerth, Christian and Engels, Gregor}, year={2014}, pages={357–365}, collection={Lecture Notes in Computer Science} }' chicago: Bokermann, Dennis, Christian Gerth, and Gregor Engels. “Use Your Best Device! Enabling Device Changes at Runtime.” In 12th International Conference on Business Process Management (BPM 2014), 8659:357–65. Lecture Notes in Computer Science. Springer International Publishing, 2014. https://doi.org/10.1007/978-3-319-10172-9_23. ieee: D. Bokermann, C. Gerth, and G. Engels, “Use Your Best Device! Enabling Device Changes at Runtime,” in 12th International Conference on Business Process Management (BPM 2014), 2014, vol. 8659, pp. 357–365. mla: Bokermann, Dennis, et al. “Use Your Best Device! Enabling Device Changes at Runtime.” 12th International Conference on Business Process Management (BPM 2014), vol. 8659, Springer International Publishing, 2014, pp. 357–65, doi:10.1007/978-3-319-10172-9_23. short: 'D. Bokermann, C. Gerth, G. Engels, in: 12th International Conference on Business Process Management (BPM 2014), Springer International Publishing, 2014, pp. 357–365.' date_created: 2019-01-15T14:49:31Z date_updated: 2022-01-06T07:03:17Z department: - _id: '66' doi: 10.1007/978-3-319-10172-9_23 intvolume: ' 8659' language: - iso: eng page: 357-365 publication: 12th International Conference on Business Process Management (BPM 2014) publication_identifier: isbn: - '9783319101712' - '9783319101729' issn: - 0302-9743 - 1611-3349 publication_status: published publisher: Springer International Publishing series_title: Lecture Notes in Computer Science status: public title: Use Your Best Device! Enabling Device Changes at Runtime type: conference user_id: '11308' volume: 8659 year: '2014' ...