---
_id: '17084'
author:
- first_name: Nils
full_name: Weidmann, Nils
id: '53103'
last_name: Weidmann
- first_name: Anthony
full_name: Anjorin, Anthony
last_name: Anjorin
citation:
ama: 'Weidmann N, Anjorin A. Schema Compliant Consistency Management via Triple
Graph Grammars and Integer Linear Programming. In: Wehrheim H, Cabot J, eds. Proceedings
of the 23rd International Conference on Fundamental Approaches to Software Engineering,
FASE 2020. Cham: Springer; 2020. doi:10.1007/978-3-030-45234-6_16'
apa: 'Weidmann, N., & Anjorin, A. (2020). Schema Compliant Consistency Management
via Triple Graph Grammars and Integer Linear Programming. In H. Wehrheim &
J. Cabot (Eds.), Proceedings of the 23rd International Conference on Fundamental
Approaches to Software Engineering, FASE 2020. Cham: Springer. https://doi.org/10.1007/978-3-030-45234-6_16'
bibtex: '@inproceedings{Weidmann_Anjorin_2020, place={Cham}, title={Schema Compliant
Consistency Management via Triple Graph Grammars and Integer Linear Programming},
DOI={10.1007/978-3-030-45234-6_16},
booktitle={Proceedings of the 23rd International Conference on Fundamental Approaches
to Software Engineering, FASE 2020}, publisher={Springer}, author={Weidmann, Nils
and Anjorin, Anthony}, editor={Wehrheim, Heike and Cabot, JordiEditors}, year={2020}
}'
chicago: 'Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management
via Triple Graph Grammars and Integer Linear Programming.” In Proceedings of
the 23rd International Conference on Fundamental Approaches to Software Engineering,
FASE 2020, edited by Heike Wehrheim and Jordi Cabot. Cham: Springer, 2020.
https://doi.org/10.1007/978-3-030-45234-6_16.'
ieee: N. Weidmann and A. Anjorin, “Schema Compliant Consistency Management via Triple
Graph Grammars and Integer Linear Programming,” in Proceedings of the 23rd
International Conference on Fundamental Approaches to Software Engineering, FASE
2020, Dublin, Ireland, 2020.
mla: Weidmann, Nils, and Anthony Anjorin. “Schema Compliant Consistency Management
via Triple Graph Grammars and Integer Linear Programming.” Proceedings of the
23rd International Conference on Fundamental Approaches to Software Engineering,
FASE 2020, edited by Heike Wehrheim and Jordi Cabot, Springer, 2020, doi:10.1007/978-3-030-45234-6_16.
short: 'N. Weidmann, A. Anjorin, in: H. Wehrheim, J. Cabot (Eds.), Proceedings of
the 23rd International Conference on Fundamental Approaches to Software Engineering,
FASE 2020, Springer, Cham, 2020.'
conference:
end_date: 2020-04-30
location: Dublin, Ireland
name: Fundamental Approaches to Software Engineering - 23rd International Conference,
FASE 2020
start_date: 2020-04-25
date_created: 2020-06-06T09:50:42Z
date_updated: 2022-01-06T06:53:04Z
department:
- _id: '28'
- _id: '66'
- _id: '534'
doi: 10.1007/978-3-030-45234-6_16
editor:
- first_name: Heike
full_name: Wehrheim, Heike
last_name: Wehrheim
- first_name: Jordi
full_name: Cabot, Jordi
last_name: Cabot
language:
- iso: eng
place: Cham
publication: Proceedings of the 23rd International Conference on Fundamental Approaches
to Software Engineering, FASE 2020
publication_identifier:
isbn:
- '9783030452339'
- '9783030452346'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer
status: public
title: Schema Compliant Consistency Management via Triple Graph Grammars and Integer
Linear Programming
type: conference
user_id: '53103'
year: '2020'
...
---
_id: '17085'
author:
- first_name: Bahar
full_name: Schwichtenberg, Bahar
id: '36399'
last_name: Schwichtenberg
- first_name: Simon
full_name: Schwichtenberg, Simon
id: '13235'
last_name: Schwichtenberg
- first_name: Jochen
full_name: Küster, Jochen
last_name: Küster
- first_name: Olaf
full_name: Zimmermann, Olaf
last_name: Zimmermann
- first_name: Gregor
full_name: Engels, Gregor
id: '107'
last_name: Engels
citation:
ama: 'Schwichtenberg B, Schwichtenberg S, Küster J, Zimmermann O, Engels G. Modeling
and Analyzing Architectural Diversity of Open Platforms. In: Advanced Information
Systems Engineering. Cham; 2020. doi:10.1007/978-3-030-49435-3_3'
apa: Schwichtenberg, B., Schwichtenberg, S., Küster, J., Zimmermann, O., & Engels,
G. (2020). Modeling and Analyzing Architectural Diversity of Open Platforms. In
Advanced Information Systems Engineering. Cham. https://doi.org/10.1007/978-3-030-49435-3_3
bibtex: '@inproceedings{Schwichtenberg_Schwichtenberg_Küster_Zimmermann_Engels_2020,
place={Cham}, title={Modeling and Analyzing Architectural Diversity of Open Platforms},
DOI={10.1007/978-3-030-49435-3_3},
booktitle={Advanced Information Systems Engineering}, author={Schwichtenberg,
Bahar and Schwichtenberg, Simon and Küster, Jochen and Zimmermann, Olaf and Engels,
Gregor}, year={2020} }'
chicago: Schwichtenberg, Bahar, Simon Schwichtenberg, Jochen Küster, Olaf Zimmermann,
and Gregor Engels. “Modeling and Analyzing Architectural Diversity of Open Platforms.”
In Advanced Information Systems Engineering. Cham, 2020. https://doi.org/10.1007/978-3-030-49435-3_3.
ieee: B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, and G. Engels,
“Modeling and Analyzing Architectural Diversity of Open Platforms,” in Advanced
Information Systems Engineering, 2020.
mla: Schwichtenberg, Bahar, et al. “Modeling and Analyzing Architectural Diversity
of Open Platforms.” Advanced Information Systems Engineering, 2020, doi:10.1007/978-3-030-49435-3_3.
short: 'B. Schwichtenberg, S. Schwichtenberg, J. Küster, O. Zimmermann, G. Engels,
in: Advanced Information Systems Engineering, Cham, 2020.'
date_created: 2020-06-07T08:53:10Z
date_updated: 2022-01-06T06:53:04Z
doi: 10.1007/978-3-030-49435-3_3
language:
- iso: eng
place: Cham
publication: Advanced Information Systems Engineering
publication_identifier:
isbn:
- '9783030494346'
- '9783030494353'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Modeling and Analyzing Architectural Diversity of Open Platforms
type: conference
user_id: '36399'
year: '2020'
...
---
_id: '28997'
abstract:
- lang: eng
text: "Modern cryptographic protocols, such as TLS 1.3 and QUIC, can send cryptographically
protected data in “zero round-trip times (0-RTT)”, that is, without the need for
a prior interactive handshake. Such protocols meet the demand for communication
with minimal latency, but those currently deployed in practice achieve only rather
weak security properties, as they may not achieve forward security for the first
transmitted payload message and require additional countermeasures against replay
attacks.Recently, 0-RTT protocols with full forward security and replay resilience
have been proposed in the academic literature. These are based on puncturable
encryption, which uses rather heavy building blocks, such as cryptographic pairings.
Some constructions were claimed to have practical efficiency, but it is unclear
how they compare concretely to protocols deployed in practice, and we currently
do not have any benchmark results that new protocols can be compared with.We provide
the first concrete performance analysis of a modern 0-RTT protocol with full forward
security, by integrating the Bloom Filter Encryption scheme of Derler et al. (EUROCRYPT
2018) in the Chromium QUIC implementation and comparing it to Google’s original
QUIC protocol. We find that for reasonable deployment parameters, the server CPU
load increases approximately by a factor of eight and the memory consumption on
the server increases significantly, but stays below 400 MB even for medium-scale
deployments that handle up to 50K connections per day. The difference of
the size of handshake messages is small enough that transmission time on the network
is identical, and therefore not significant.We conclude that while current 0-RTT
protocols with full forward security come with significant computational overhead,
their use in practice is feasible, and may be used in applications where the increased
CPU and memory load can be tolerated in exchange for full forward security and
replay resilience on the cryptographic protocol level. Our results serve as a
first benchmark that can be used to assess the efficiency of 0-RTT protocols potentially
developed in the future.\r\n"
author:
- first_name: Fynn
full_name: Dallmeier, Fynn
last_name: Dallmeier
- first_name: Jan P.
full_name: Drees, Jan P.
last_name: Drees
- first_name: Kai
full_name: Gellert, Kai
last_name: Gellert
- first_name: Tobias
full_name: Handirk, Tobias
last_name: Handirk
- first_name: Tibor
full_name: Jager, Tibor
last_name: Jager
- first_name: Jonas
full_name: Klauke, Jonas
id: '40915'
last_name: Klauke
orcid: 0000-0001-9160-9636
- first_name: Simon
full_name: Nachtigall, Simon
last_name: Nachtigall
- first_name: Timo
full_name: Renzelmann, Timo
last_name: Renzelmann
- first_name: Rudi
full_name: Wolf, Rudi
last_name: Wolf
citation:
ama: 'Dallmeier F, Drees JP, Gellert K, et al. Forward-Secure 0-RTT Goes Live: Implementation
and Performance Analysis in QUIC. In: Cryptology and Network Security.
Springer-Verlag; 2020:211-231. doi:10.1007/978-3-030-65411-5_11'
apa: 'Dallmeier, F., Drees, J. P., Gellert, K., Handirk, T., Jager, T., Klauke,
J., Nachtigall, S., Renzelmann, T., & Wolf, R. (2020). Forward-Secure 0-RTT
Goes Live: Implementation and Performance Analysis in QUIC. Cryptology and
Network Security, 211–231. https://doi.org/10.1007/978-3-030-65411-5_11'
bibtex: '@inproceedings{Dallmeier_Drees_Gellert_Handirk_Jager_Klauke_Nachtigall_Renzelmann_Wolf_2020,
place={Cham}, title={Forward-Secure 0-RTT Goes Live: Implementation and Performance
Analysis in QUIC}, DOI={10.1007/978-3-030-65411-5_11},
booktitle={Cryptology and Network Security}, publisher={Springer-Verlag}, author={Dallmeier,
Fynn and Drees, Jan P. and Gellert, Kai and Handirk, Tobias and Jager, Tibor and
Klauke, Jonas and Nachtigall, Simon and Renzelmann, Timo and Wolf, Rudi}, year={2020},
pages={211–231} }'
chicago: 'Dallmeier, Fynn, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager,
Jonas Klauke, Simon Nachtigall, Timo Renzelmann, and Rudi Wolf. “Forward-Secure
0-RTT Goes Live: Implementation and Performance Analysis in QUIC.” In Cryptology
and Network Security, 211–31. Cham: Springer-Verlag, 2020. https://doi.org/10.1007/978-3-030-65411-5_11.'
ieee: 'F. Dallmeier et al., “Forward-Secure 0-RTT Goes Live: Implementation
and Performance Analysis in QUIC,” in Cryptology and Network Security,
Vienna, 2020, pp. 211–231, doi: 10.1007/978-3-030-65411-5_11.'
mla: 'Dallmeier, Fynn, et al. “Forward-Secure 0-RTT Goes Live: Implementation and
Performance Analysis in QUIC.” Cryptology and Network Security, Springer-Verlag,
2020, pp. 211–31, doi:10.1007/978-3-030-65411-5_11.'
short: 'F. Dallmeier, J.P. Drees, K. Gellert, T. Handirk, T. Jager, J. Klauke, S.
Nachtigall, T. Renzelmann, R. Wolf, in: Cryptology and Network Security, Springer-Verlag,
Cham, 2020, pp. 211–231.'
conference:
end_date: 2020-12-16
location: Vienna
name: CANS 2020
start_date: 2020-12-14
date_created: 2021-12-15T17:43:11Z
date_updated: 2022-03-11T10:59:41Z
doi: 10.1007/978-3-030-65411-5_11
extern: '1'
language:
- iso: eng
page: 211-231
place: Cham
publication: Cryptology and Network Security
publication_identifier:
isbn:
- '9783030654108'
- '9783030654115'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer-Verlag
status: public
title: 'Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in
QUIC'
type: conference
user_id: '40915'
year: '2020'
...
---
_id: '20706'
author:
- first_name: Philipp
full_name: zur Heiden, Philipp
last_name: zur Heiden
citation:
ama: 'zur Heiden P. Considering Context in Design Science Research: A Systematic
Literature Review. In: Designing for Digital Transformation. Co-Creating Services
with Citizens and Industry. ; 2020. doi:10.1007/978-3-030-64823-7_21'
apa: 'zur Heiden, P. (2020). Considering Context in Design Science Research: A Systematic
Literature Review. Designing for Digital Transformation. Co-Creating Services
with Citizens and Industry. https://doi.org/10.1007/978-3-030-64823-7_21'
bibtex: '@inproceedings{zur Heiden_2020, place={Cham}, title={Considering Context
in Design Science Research: A Systematic Literature Review}, DOI={10.1007/978-3-030-64823-7_21},
booktitle={Designing for Digital Transformation. Co-Creating Services with Citizens
and Industry}, author={zur Heiden, Philipp}, year={2020} }'
chicago: 'Heiden, Philipp zur. “Considering Context in Design Science Research:
A Systematic Literature Review.” In Designing for Digital Transformation. Co-Creating
Services with Citizens and Industry. Cham, 2020. https://doi.org/10.1007/978-3-030-64823-7_21.'
ieee: 'P. zur Heiden, “Considering Context in Design Science Research: A Systematic
Literature Review,” 2020, doi: 10.1007/978-3-030-64823-7_21.'
mla: 'zur Heiden, Philipp. “Considering Context in Design Science Research: A Systematic
Literature Review.” Designing for Digital Transformation. Co-Creating Services
with Citizens and Industry, 2020, doi:10.1007/978-3-030-64823-7_21.'
short: 'P. zur Heiden, in: Designing for Digital Transformation. Co-Creating Services
with Citizens and Industry, Cham, 2020.'
date_created: 2020-12-11T14:01:48Z
date_updated: 2022-04-04T09:59:49Z
doi: 10.1007/978-3-030-64823-7_21
language:
- iso: eng
place: Cham
publication: Designing for Digital Transformation. Co-Creating Services with Citizens
and Industry
publication_identifier:
isbn:
- '9783030648220'
- '9783030648237'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: 'Considering Context in Design Science Research: A Systematic Literature Review'
type: conference
user_id: '64394'
year: '2020'
...
---
_id: '45848'
author:
- first_name: Yasir
full_name: Mahmood, Yasir
last_name: Mahmood
- first_name: Arne
full_name: Meier, Arne
last_name: Meier
citation:
ama: 'Mahmood Y, Meier A. Parameterised Complexity of Model Checking and Satisfiability
in Propositional Dependence Logic. In: Lecture Notes in Computer Science.
Springer International Publishing; 2020. doi:10.1007/978-3-030-39951-1_10'
apa: Mahmood, Y., & Meier, A. (2020). Parameterised Complexity of Model Checking
and Satisfiability in Propositional Dependence Logic. Lecture Notes in Computer
Science. https://doi.org/10.1007/978-3-030-39951-1_10
bibtex: '@inproceedings{Mahmood_Meier_2020, place={Cham}, title={Parameterised Complexity
of Model Checking and Satisfiability in Propositional Dependence Logic}, DOI={10.1007/978-3-030-39951-1_10},
booktitle={Lecture Notes in Computer Science}, publisher={Springer International
Publishing}, author={Mahmood, Yasir and Meier, Arne}, year={2020} }'
chicago: 'Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking
and Satisfiability in Propositional Dependence Logic.” In Lecture Notes in
Computer Science. Cham: Springer International Publishing, 2020. https://doi.org/10.1007/978-3-030-39951-1_10.'
ieee: 'Y. Mahmood and A. Meier, “Parameterised Complexity of Model Checking and
Satisfiability in Propositional Dependence Logic,” 2020, doi: 10.1007/978-3-030-39951-1_10.'
mla: Mahmood, Yasir, and Arne Meier. “Parameterised Complexity of Model Checking
and Satisfiability in Propositional Dependence Logic.” Lecture Notes in Computer
Science, Springer International Publishing, 2020, doi:10.1007/978-3-030-39951-1_10.
short: 'Y. Mahmood, A. Meier, in: Lecture Notes in Computer Science, Springer International
Publishing, Cham, 2020.'
date_created: 2023-07-03T11:41:58Z
date_updated: 2023-07-03T11:43:37Z
doi: 10.1007/978-3-030-39951-1_10
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
isbn:
- '9783030399504'
- '9783030399511'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Parameterised Complexity of Model Checking and Satisfiability in Propositional
Dependence Logic
type: conference
user_id: '99353'
year: '2020'
...
---
_id: '47261'
author:
- first_name: Julie M.
full_name: Haney, Julie M.
last_name: Haney
- first_name: Susanne M.
full_name: Furman, Susanne M.
last_name: Furman
- first_name: Yasemin
full_name: Acar, Yasemin
id: '94636'
last_name: Acar
citation:
ama: 'Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations:
Consumer Perceptions, Practices, and Challenges. In: HCI for Cybersecurity,
Privacy and Trust. Springer International Publishing; 2020. doi:10.1007/978-3-030-50309-3_26'
apa: 'Haney, J. M., Furman, S. M., & Acar, Y. (2020). Smart Home Security and
Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In HCI
for Cybersecurity, Privacy and Trust. Springer International Publishing. https://doi.org/10.1007/978-3-030-50309-3_26'
bibtex: '@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security
and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={10.1007/978-3-030-50309-3_26},
booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International
Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin},
year={2020} }'
chicago: 'Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security
and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In
HCI for Cybersecurity, Privacy and Trust. Cham: Springer International
Publishing, 2020. https://doi.org/10.1007/978-3-030-50309-3_26.'
ieee: 'J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy
Mitigations: Consumer Perceptions, Practices, and Challenges,” in HCI for Cybersecurity,
Privacy and Trust, Cham: Springer International Publishing, 2020.'
mla: 'Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer
Perceptions, Practices, and Challenges.” HCI for Cybersecurity, Privacy and
Trust, Springer International Publishing, 2020, doi:10.1007/978-3-030-50309-3_26.'
short: 'J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and
Trust, Springer International Publishing, Cham, 2020.'
date_created: 2023-09-22T12:59:53Z
date_updated: 2023-11-22T09:57:52Z
department:
- _id: '34'
- _id: '740'
doi: 10.1007/978-3-030-50309-3_26
extern: '1'
language:
- iso: eng
place: Cham
publication: HCI for Cybersecurity, Privacy and Trust
publication_identifier:
isbn:
- '9783030503086'
- '9783030503093'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: 'Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices,
and Challenges'
type: book_chapter
user_id: '15458'
year: '2020'
...
---
_id: '11952'
author:
- first_name: Björn
full_name: Senft, Björn
id: '9109'
last_name: Senft
- first_name: Florian
full_name: Rittmeier, Florian
id: '5281'
last_name: Rittmeier
- first_name: Holger Gerhard
full_name: Fischer, Holger Gerhard
id: '30457'
last_name: Fischer
- first_name: Simon
full_name: Oberthür, Simon
id: '383'
last_name: Oberthür
citation:
ama: 'Senft B, Rittmeier F, Fischer HG, Oberthür S. A Value-Centered Approach for
Unique and Novel Software Applications. In: Design, User Experience, and Usability.
Practice and Case Studies. Cham; 2019. doi:10.1007/978-3-030-23535-2_27'
apa: Senft, B., Rittmeier, F., Fischer, H. G., & Oberthür, S. (2019). A Value-Centered
Approach for Unique and Novel Software Applications. In Design, User Experience,
and Usability. Practice and Case Studies. Cham. https://doi.org/10.1007/978-3-030-23535-2_27
bibtex: '@inbook{Senft_Rittmeier_Fischer_Oberthür_2019, place={Cham}, title={A Value-Centered
Approach for Unique and Novel Software Applications}, DOI={10.1007/978-3-030-23535-2_27},
booktitle={Design, User Experience, and Usability. Practice and Case Studies},
author={Senft, Björn and Rittmeier, Florian and Fischer, Holger Gerhard and Oberthür,
Simon}, year={2019} }'
chicago: Senft, Björn, Florian Rittmeier, Holger Gerhard Fischer, and Simon Oberthür.
“A Value-Centered Approach for Unique and Novel Software Applications.” In Design,
User Experience, and Usability. Practice and Case Studies. Cham, 2019. https://doi.org/10.1007/978-3-030-23535-2_27.
ieee: B. Senft, F. Rittmeier, H. G. Fischer, and S. Oberthür, “A Value-Centered
Approach for Unique and Novel Software Applications,” in Design, User Experience,
and Usability. Practice and Case Studies, Cham, 2019.
mla: Senft, Björn, et al. “A Value-Centered Approach for Unique and Novel Software
Applications.” Design, User Experience, and Usability. Practice and Case Studies,
2019, doi:10.1007/978-3-030-23535-2_27.
short: 'B. Senft, F. Rittmeier, H.G. Fischer, S. Oberthür, in: Design, User Experience,
and Usability. Practice and Case Studies, Cham, 2019.'
conference:
end_date: 2019-07-31
location: Orlando, FL, USA
name: 21st International Conference on Human-Computer Interaction
start_date: 2019-07-26
date_created: 2019-07-14T07:57:53Z
date_updated: 2022-01-06T06:51:13Z
department:
- _id: '66'
doi: 10.1007/978-3-030-23535-2_27
language:
- iso: eng
place: Cham
publication: Design, User Experience, and Usability. Practice and Case Studies
publication_identifier:
isbn:
- '9783030235345'
- '9783030235352'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: A Value-Centered Approach for Unique and Novel Software Applications
type: book_chapter
user_id: '9109'
year: '2019'
...
---
_id: '14890'
author:
- first_name: Stefan
full_name: Kuhlemann, Stefan
id: '38910'
last_name: Kuhlemann
- first_name: Meinolf
full_name: Sellmann, Meinolf
last_name: Sellmann
- first_name: Kevin
full_name: Tierney, Kevin
last_name: Tierney
citation:
ama: 'Kuhlemann S, Sellmann M, Tierney K. Exploiting Counterfactuals for Scalable
Stochastic Optimization. In: Lecture Notes in Computer Science. Cham; 2019.
doi:10.1007/978-3-030-30048-7_40'
apa: Kuhlemann, S., Sellmann, M., & Tierney, K. (2019). Exploiting Counterfactuals
for Scalable Stochastic Optimization. In Lecture Notes in Computer Science.
Cham. https://doi.org/10.1007/978-3-030-30048-7_40
bibtex: '@inbook{Kuhlemann_Sellmann_Tierney_2019, place={Cham}, title={Exploiting
Counterfactuals for Scalable Stochastic Optimization}, DOI={10.1007/978-3-030-30048-7_40},
booktitle={Lecture Notes in Computer Science}, author={Kuhlemann, Stefan and Sellmann,
Meinolf and Tierney, Kevin}, year={2019} }'
chicago: Kuhlemann, Stefan, Meinolf Sellmann, and Kevin Tierney. “Exploiting Counterfactuals
for Scalable Stochastic Optimization.” In Lecture Notes in Computer Science.
Cham, 2019. https://doi.org/10.1007/978-3-030-30048-7_40.
ieee: S. Kuhlemann, M. Sellmann, and K. Tierney, “Exploiting Counterfactuals for
Scalable Stochastic Optimization,” in Lecture Notes in Computer Science,
Cham, 2019.
mla: Kuhlemann, Stefan, et al. “Exploiting Counterfactuals for Scalable Stochastic
Optimization.” Lecture Notes in Computer Science, 2019, doi:10.1007/978-3-030-30048-7_40.
short: 'S. Kuhlemann, M. Sellmann, K. Tierney, in: Lecture Notes in Computer Science,
Cham, 2019.'
date_created: 2019-11-12T07:45:53Z
date_updated: 2022-01-06T06:52:09Z
department:
- _id: '277'
doi: 10.1007/978-3-030-30048-7_40
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
isbn:
- '9783030300470'
- '9783030300487'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Exploiting Counterfactuals for Scalable Stochastic Optimization
type: book_chapter
user_id: '38910'
year: '2019'
...
---
_id: '15004'
author:
- first_name: Mohsen
full_name: Ahmadi Fahandar, Mohsen
id: '59547'
last_name: Ahmadi Fahandar
- first_name: Eyke
full_name: Hüllermeier, Eyke
id: '48129'
last_name: Hüllermeier
citation:
ama: 'Ahmadi Fahandar M, Hüllermeier E. Feature Selection for Analogy-Based Learning
to Rank. In: Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_22'
apa: Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Feature Selection for Analogy-Based
Learning to Rank. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_22
bibtex: '@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Feature
Selection for Analogy-Based Learning to Rank}, DOI={10.1007/978-3-030-33778-0_22},
booktitle={Discovery Science}, author={Ahmadi Fahandar, Mohsen and Hüllermeier,
Eyke}, year={2019} }'
chicago: Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based
Learning to Rank.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_22.
ieee: M. Ahmadi Fahandar and E. Hüllermeier, “Feature Selection for Analogy-Based
Learning to Rank,” in Discovery Science, Cham, 2019.
mla: Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Feature Selection for Analogy-Based
Learning to Rank.” Discovery Science, 2019, doi:10.1007/978-3-030-33778-0_22.
short: 'M. Ahmadi Fahandar, E. Hüllermeier, in: Discovery Science, Cham, 2019.'
date_created: 2019-11-15T10:24:45Z
date_updated: 2022-01-06T06:52:14Z
department:
- _id: '34'
- _id: '355'
doi: 10.1007/978-3-030-33778-0_22
language:
- iso: eng
place: Cham
publication: Discovery Science
publication_identifier:
isbn:
- '9783030337773'
- '9783030337780'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Feature Selection for Analogy-Based Learning to Rank
type: book_chapter
user_id: '315'
year: '2019'
...
---
_id: '15005'
author:
- first_name: Mohsen
full_name: Ahmadi Fahandar, Mohsen
id: '59547'
last_name: Ahmadi Fahandar
- first_name: Eyke
full_name: Hüllermeier, Eyke
id: '48129'
last_name: Hüllermeier
citation:
ama: 'Ahmadi Fahandar M, Hüllermeier E. Analogy-Based Preference Learning with Kernels.
In: KI 2019: Advances in Artificial Intelligence. Cham; 2019. doi:10.1007/978-3-030-30179-8_3'
apa: 'Ahmadi Fahandar, M., & Hüllermeier, E. (2019). Analogy-Based Preference
Learning with Kernels. In KI 2019: Advances in Artificial Intelligence.
Cham. https://doi.org/10.1007/978-3-030-30179-8_3'
bibtex: '@inbook{Ahmadi Fahandar_Hüllermeier_2019, place={Cham}, title={Analogy-Based
Preference Learning with Kernels}, DOI={10.1007/978-3-030-30179-8_3},
booktitle={KI 2019: Advances in Artificial Intelligence}, author={Ahmadi Fahandar,
Mohsen and Hüllermeier, Eyke}, year={2019} }'
chicago: 'Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference
Learning with Kernels.” In KI 2019: Advances in Artificial Intelligence.
Cham, 2019. https://doi.org/10.1007/978-3-030-30179-8_3.'
ieee: 'M. Ahmadi Fahandar and E. Hüllermeier, “Analogy-Based Preference Learning
with Kernels,” in KI 2019: Advances in Artificial Intelligence, Cham, 2019.'
mla: 'Ahmadi Fahandar, Mohsen, and Eyke Hüllermeier. “Analogy-Based Preference Learning
with Kernels.” KI 2019: Advances in Artificial Intelligence, 2019, doi:10.1007/978-3-030-30179-8_3.'
short: 'M. Ahmadi Fahandar, E. Hüllermeier, in: KI 2019: Advances in Artificial
Intelligence, Cham, 2019.'
date_created: 2019-11-15T10:30:10Z
date_updated: 2022-01-06T06:52:14Z
department:
- _id: '34'
- _id: '355'
doi: 10.1007/978-3-030-30179-8_3
language:
- iso: eng
place: Cham
publication: 'KI 2019: Advances in Artificial Intelligence'
publication_identifier:
isbn:
- '9783030301781'
- '9783030301798'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Analogy-Based Preference Learning with Kernels
type: book_chapter
user_id: '315'
year: '2019'
...
---
_id: '15006'
author:
- first_name: Vu-Linh
full_name: Nguyen, Vu-Linh
last_name: Nguyen
- first_name: Sébastien
full_name: Destercke, Sébastien
last_name: Destercke
- first_name: Eyke
full_name: Hüllermeier, Eyke
id: '48129'
last_name: Hüllermeier
citation:
ama: 'Nguyen V-L, Destercke S, Hüllermeier E. Epistemic Uncertainty Sampling. In:
Discovery Science. Cham; 2019. doi:10.1007/978-3-030-33778-0_7'
apa: Nguyen, V.-L., Destercke, S., & Hüllermeier, E. (2019). Epistemic Uncertainty
Sampling. In Discovery Science. Cham. https://doi.org/10.1007/978-3-030-33778-0_7
bibtex: '@inbook{Nguyen_Destercke_Hüllermeier_2019, place={Cham}, title={Epistemic
Uncertainty Sampling}, DOI={10.1007/978-3-030-33778-0_7},
booktitle={Discovery Science}, author={Nguyen, Vu-Linh and Destercke, Sébastien
and Hüllermeier, Eyke}, year={2019} }'
chicago: Nguyen, Vu-Linh, Sébastien Destercke, and Eyke Hüllermeier. “Epistemic
Uncertainty Sampling.” In Discovery Science. Cham, 2019. https://doi.org/10.1007/978-3-030-33778-0_7.
ieee: V.-L. Nguyen, S. Destercke, and E. Hüllermeier, “Epistemic Uncertainty Sampling,”
in Discovery Science, Cham, 2019.
mla: Nguyen, Vu-Linh, et al. “Epistemic Uncertainty Sampling.” Discovery Science,
2019, doi:10.1007/978-3-030-33778-0_7.
short: 'V.-L. Nguyen, S. Destercke, E. Hüllermeier, in: Discovery Science, Cham,
2019.'
date_created: 2019-11-15T10:35:08Z
date_updated: 2022-01-06T06:52:14Z
department:
- _id: '34'
- _id: '355'
doi: 10.1007/978-3-030-33778-0_7
language:
- iso: eng
place: Cham
publication: Discovery Science
publication_identifier:
isbn:
- '9783030337773'
- '9783030337780'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Epistemic Uncertainty Sampling
type: book_chapter
user_id: '49109'
year: '2019'
...
---
_id: '15080'
author:
- first_name: Rita
full_name: Hartel, Rita
id: '14961'
last_name: Hartel
- first_name: Alexander
full_name: Dunst, Alexander
last_name: Dunst
citation:
ama: 'Hartel R, Dunst A. How Good Is Good Enough? Establishing Quality Thresholds
for the Automatic Text Analysis of Retro-Digitized Comics. In: International
Conference on Multimedia Modeling, MMM. Springer; 2019:662-671. doi:10.1007/978-3-030-05716-9_59'
apa: 'Hartel, R., & Dunst, A. (2019). How Good Is Good Enough? Establishing
Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics.
In International Conference on Multimedia Modeling, MMM (pp. 662–671).
Thessaloniki, Greece: Springer. https://doi.org/10.1007/978-3-030-05716-9_59'
bibtex: '@inproceedings{Hartel_Dunst_2019, title={How Good Is Good Enough? Establishing
Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics},
DOI={10.1007/978-3-030-05716-9_59},
booktitle={International Conference on Multimedia Modeling, MMM}, publisher={Springer},
author={Hartel, Rita and Dunst, Alexander}, year={2019}, pages={662–671} }'
chicago: Hartel, Rita, and Alexander Dunst. “How Good Is Good Enough? Establishing
Quality Thresholds for the Automatic Text Analysis of Retro-Digitized Comics.”
In International Conference on Multimedia Modeling, MMM, 662–71. Springer,
2019. https://doi.org/10.1007/978-3-030-05716-9_59.
ieee: R. Hartel and A. Dunst, “How Good Is Good Enough? Establishing Quality Thresholds
for the Automatic Text Analysis of Retro-Digitized Comics,” in International
Conference on Multimedia Modeling, MMM, Thessaloniki, Greece, 2019, pp. 662–671.
mla: Hartel, Rita, and Alexander Dunst. “How Good Is Good Enough? Establishing Quality
Thresholds for the Automatic Text Analysis of Retro-Digitized Comics.” International
Conference on Multimedia Modeling, MMM, Springer, 2019, pp. 662–71, doi:10.1007/978-3-030-05716-9_59.
short: 'R. Hartel, A. Dunst, in: International Conference on Multimedia Modeling,
MMM, Springer, 2019, pp. 662–671.'
conference:
location: Thessaloniki, Greece
date_created: 2019-11-21T14:42:25Z
date_updated: 2022-01-06T06:52:15Z
department:
- _id: '69'
doi: 10.1007/978-3-030-05716-9_59
language:
- iso: eng
page: 662-671
publication: International Conference on Multimedia Modeling, MMM
publication_identifier:
isbn:
- '9783030057152'
- '9783030057169'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer
status: public
title: How Good Is Good Enough? Establishing Quality Thresholds for the Automatic
Text Analysis of Retro-Digitized Comics
type: conference
user_id: '14961'
year: '2019'
...
---
_id: '13872'
author:
- first_name: Dirk
full_name: Beyer, Dirk
last_name: Beyer
- first_name: Marie-Christine
full_name: Jakobs, Marie-Christine
last_name: Jakobs
citation:
ama: 'Beyer D, Jakobs M-C. CoVeriTest: Cooperative Verifier-Based Testing. In: Fundamental
Approaches to Software Engineering. Cham; 2019. doi:10.1007/978-3-030-16722-6_23'
apa: 'Beyer, D., & Jakobs, M.-C. (2019). CoVeriTest: Cooperative Verifier-Based
Testing. In Fundamental Approaches to Software Engineering. Cham. https://doi.org/10.1007/978-3-030-16722-6_23'
bibtex: '@inbook{Beyer_Jakobs_2019, place={Cham}, title={CoVeriTest: Cooperative
Verifier-Based Testing}, DOI={10.1007/978-3-030-16722-6_23},
booktitle={Fundamental Approaches to Software Engineering}, author={Beyer, Dirk
and Jakobs, Marie-Christine}, year={2019} }'
chicago: 'Beyer, Dirk, and Marie-Christine Jakobs. “CoVeriTest: Cooperative Verifier-Based
Testing.” In Fundamental Approaches to Software Engineering. Cham, 2019.
https://doi.org/10.1007/978-3-030-16722-6_23.'
ieee: 'D. Beyer and M.-C. Jakobs, “CoVeriTest: Cooperative Verifier-Based Testing,”
in Fundamental Approaches to Software Engineering, Cham, 2019.'
mla: 'Beyer, Dirk, and Marie-Christine Jakobs. “CoVeriTest: Cooperative Verifier-Based
Testing.” Fundamental Approaches to Software Engineering, 2019, doi:10.1007/978-3-030-16722-6_23.'
short: 'D. Beyer, M.-C. Jakobs, in: Fundamental Approaches to Software Engineering,
Cham, 2019.'
date_created: 2019-10-16T06:39:51Z
date_updated: 2022-01-06T06:51:45Z
department:
- _id: '77'
doi: 10.1007/978-3-030-16722-6_23
language:
- iso: eng
place: Cham
project:
- _id: '85'
name: Kooperative Softwareverifikation
publication: Fundamental Approaches to Software Engineering
publication_identifier:
isbn:
- '9783030167219'
- '9783030167226'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: 'CoVeriTest: Cooperative Verifier-Based Testing'
type: book_chapter
user_id: '44413'
year: '2019'
...
---
_id: '45818'
author:
- first_name: Yasir
full_name: Mahmood, Yasir
last_name: Mahmood
- first_name: Arne
full_name: Meier, Arne
last_name: Meier
- first_name: Johannes
full_name: Schmidt, Johannes
last_name: Schmidt
citation:
ama: 'Mahmood Y, Meier A, Schmidt J. Parameterised Complexity of Abduction in Schaefer’s
Framework. In: Logical Foundations of Computer Science. Springer International
Publishing; 2019. doi:10.1007/978-3-030-36755-8_13'
apa: Mahmood, Y., Meier, A., & Schmidt, J. (2019). Parameterised Complexity
of Abduction in Schaefer’s Framework. Logical Foundations of Computer Science.
https://doi.org/10.1007/978-3-030-36755-8_13
bibtex: '@inproceedings{Mahmood_Meier_Schmidt_2019, place={Cham}, title={Parameterised
Complexity of Abduction in Schaefer’s Framework}, DOI={10.1007/978-3-030-36755-8_13},
booktitle={Logical Foundations of Computer Science}, publisher={Springer International
Publishing}, author={Mahmood, Yasir and Meier, Arne and Schmidt, Johannes}, year={2019}
}'
chicago: 'Mahmood, Yasir, Arne Meier, and Johannes Schmidt. “Parameterised Complexity
of Abduction in Schaefer’s Framework.” In Logical Foundations of Computer Science.
Cham: Springer International Publishing, 2019. https://doi.org/10.1007/978-3-030-36755-8_13.'
ieee: 'Y. Mahmood, A. Meier, and J. Schmidt, “Parameterised Complexity of Abduction
in Schaefer’s Framework,” 2019, doi: 10.1007/978-3-030-36755-8_13.'
mla: Mahmood, Yasir, et al. “Parameterised Complexity of Abduction in Schaefer’s
Framework.” Logical Foundations of Computer Science, Springer International
Publishing, 2019, doi:10.1007/978-3-030-36755-8_13.
short: 'Y. Mahmood, A. Meier, J. Schmidt, in: Logical Foundations of Computer Science,
Springer International Publishing, Cham, 2019.'
date_created: 2023-06-30T11:51:03Z
date_updated: 2023-07-03T11:44:22Z
doi: 10.1007/978-3-030-36755-8_13
language:
- iso: eng
place: Cham
publication: Logical Foundations of Computer Science
publication_identifier:
isbn:
- '9783030367541'
- '9783030367558'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Parameterised Complexity of Abduction in Schaefer’s Framework
type: conference
user_id: '99353'
year: '2019'
...
---
_id: '2862'
author:
- first_name: Johannes
full_name: Blömer, Johannes
id: '23'
last_name: Blömer
- first_name: Fabian
full_name: Eidens, Fabian
id: '25078'
last_name: Eidens
- first_name: Jakob
full_name: Juhnke, Jakob
id: '48090'
last_name: Juhnke
citation:
ama: 'Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable
Universally-Composable Reputation Systems. In: Topics in Cryptology - {CT-RSA}
2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings.
Cham: Springer International Publishing; 2018:470-490. doi:10.1007/978-3-319-76953-0_25'
apa: 'Blömer, J., Eidens, F., & Juhnke, J. (2018). Practical, Anonymous, and
Publicly Linkable Universally-Composable Reputation Systems. In Topics in Cryptology
- {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings
(pp. 470–490). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-76953-0_25'
bibtex: '@inproceedings{Blömer_Eidens_Juhnke_2018, place={Cham}, title={Practical,
Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, DOI={10.1007/978-3-319-76953-0_25},
booktitle={Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at
the {RSA} Conference 2018, Proceedings}, publisher={Springer International Publishing},
author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={470–490}
}'
chicago: 'Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Practical, Anonymous,
and Publicly Linkable Universally-Composable Reputation Systems.” In Topics
in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference
2018, Proceedings, 470–90. Cham: Springer International Publishing, 2018.
https://doi.org/10.1007/978-3-319-76953-0_25.'
ieee: J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable
Universally-Composable Reputation Systems,” in Topics in Cryptology - {CT-RSA}
2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings,
San Francisco, CA, USA, 2018, pp. 470–490.
mla: Blömer, Johannes, et al. “Practical, Anonymous, and Publicly Linkable Universally-Composable
Reputation Systems.” Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’
Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing,
2018, pp. 470–90, doi:10.1007/978-3-319-76953-0_25.
short: 'J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018
- The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer
International Publishing, Cham, 2018, pp. 470–490.'
conference:
end_date: 2018-04-20
location: San Francisco, CA, USA
name: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA}
Conference 2018
start_date: 2018-04-16
date_created: 2018-05-24T11:14:02Z
date_updated: 2022-01-06T06:58:12Z
ddc:
- '004'
department:
- _id: '7'
- _id: '64'
doi: 10.1007/978-3-319-76953-0_25
file:
- access_level: closed
content_type: application/pdf
creator: ups
date_created: 2018-11-02T13:45:40Z
date_updated: 2018-11-02T13:45:40Z
file_id: '5253'
file_name: PracticalAnonymousAndPubliclyL.pdf
file_size: 3371773
relation: main_file
success: 1
file_date_updated: 2018-11-02T13:45:40Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://eprint.iacr.org/2018/029
oa: '1'
page: 470-490
place: Cham
project:
- _id: '1'
name: SFB 901
- _id: '4'
name: SFB 901 - Project Area C
- _id: '13'
name: SFB 901 - Subproject C1
publication: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the
{RSA} Conference 2018, Proceedings
publication_identifier:
isbn:
- '9783319769523'
- '9783319769530'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation
Systems
type: conference
user_id: '477'
year: '2018'
...
---
_id: '24396'
abstract:
- lang: eng
text: 'We study the Online Prize-collecting Node-weighted Steiner Forest problem
(OPC-NWSF) in which we are given an undirected graph \(G=(V, E)\) with \(|V| =
n\) and node-weight function \(w: V \rightarrow \mathcal {R}^+\). A sequence of
k pairs of nodes of G, each associated with a penalty, arrives online. OPC-NWSF
asks to construct a subgraph H such that each pair \(\{s, t\}\) is either connected
(there is a path between s and t in H) or its associated penalty is paid. The
goal is to minimize the weight of H and the total penalties paid. The current
best result for OPC-NWSF is a randomized \(\mathcal {O}(\log ^4 n)\)-competitive
algorithm due to Hajiaghayi et al. (ICALP 2014). We improve this by proposing
a randomized \(\mathcal {O}(\log n \log k)\)-competitive algorithm for OPC-NWSF,
which is optimal up to constant factor since OPC-NWSF has a randomized lower bound
of \(\varOmega (\log ^2 n)\) due to Korman [11]. Moreover, our result also implies
an improvement for two special cases of OPC-NWSF, the Online Prize-collecting
Node-weighted Steiner Tree problem (OPC-NWST) and the Online Node-weighted Steiner
Forest problem (ONWSF). In OPC-NWST, there is a distinguished node which is one
of the nodes in each pair. In ONWSF, all penalties are set to infinity. The currently
best known results for OPC-NWST and ONWSF are a randomized \(\mathcal {O}(\log
^3 n)\)-competitive algorithm due to Hajiaghayi et al. (ICALP 2014) and a randomized
\(\mathcal {O}(\log n \log ^2 k)\)-competitive algorithm due to Hajiaghayi et
al. (FOCS 2013), respectively.'
author:
- first_name: Christine
full_name: Markarian, Christine
last_name: Markarian
citation:
ama: 'Markarian C. An Optimal Algorithm for Online Prize-Collecting Node-Weighted
Steiner Forest. In: International Workshop on Combinatorial Algorithms (IWOCA).
; 2018. doi:10.1007/978-3-319-94667-2_18'
apa: Markarian, C. (2018). An Optimal Algorithm for Online Prize-Collecting Node-Weighted
Steiner Forest. International Workshop on Combinatorial Algorithms (IWOCA).
https://doi.org/10.1007/978-3-319-94667-2_18
bibtex: '@inproceedings{Markarian_2018, place={Cham}, title={An Optimal Algorithm
for Online Prize-Collecting Node-Weighted Steiner Forest}, DOI={10.1007/978-3-319-94667-2_18},
booktitle={International Workshop on Combinatorial Algorithms (IWOCA)}, author={Markarian,
Christine}, year={2018} }'
chicago: Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting
Node-Weighted Steiner Forest.” In International Workshop on Combinatorial Algorithms
(IWOCA). Cham, 2018. https://doi.org/10.1007/978-3-319-94667-2_18.
ieee: 'C. Markarian, “An Optimal Algorithm for Online Prize-Collecting Node-Weighted
Steiner Forest,” 2018, doi: 10.1007/978-3-319-94667-2_18.'
mla: Markarian, Christine. “An Optimal Algorithm for Online Prize-Collecting Node-Weighted
Steiner Forest.” International Workshop on Combinatorial Algorithms (IWOCA),
2018, doi:10.1007/978-3-319-94667-2_18.
short: 'C. Markarian, in: International Workshop on Combinatorial Algorithms (IWOCA),
Cham, 2018.'
date_created: 2021-09-14T12:23:29Z
date_updated: 2022-01-06T06:56:19Z
department:
- _id: '63'
doi: 10.1007/978-3-319-94667-2_18
language:
- iso: eng
place: Cham
publication: International Workshop on Combinatorial Algorithms (IWOCA)
publication_identifier:
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: An Optimal Algorithm for Online Prize-Collecting Node-Weighted Steiner Forest
type: conference
user_id: '15415'
year: '2018'
...
---
_id: '3362'
abstract:
- lang: eng
text: Profiling applications on a heterogeneous compute node is challenging since
the way to retrieve data from the resources and interpret them varies between
resource types and manufacturers. This holds especially true for measuring the
energy consumption. In this paper we present Ampehre, a novel open source measurement
framework that allows developers to gather comparable measurements from heterogeneous
compute nodes, e.g., nodes comprising CPU, GPU, and FPGA. We explain the architecture
of Ampehre and detail the measurement process on the example of energy measurements
on CPU and GPU. To characterize the probing effect, we quantitatively analyze
the trade-off between the accuracy of measurements and the CPU load imposed by
Ampehre. Based on this analysis, we are able to specify reasonable combinations
of sampling periods for the different resource types of a compute node.
author:
- first_name: Achim
full_name: Lösch, Achim
id: '43646'
last_name: Lösch
- first_name: Alex
full_name: Wiens, Alex
last_name: Wiens
- first_name: Marco
full_name: Platzner, Marco
id: '398'
last_name: Platzner
citation:
ama: 'Lösch A, Wiens A, Platzner M. Ampehre: An Open Source Measurement Framework
for Heterogeneous Compute Nodes. In: Proceedings of the International Conference
on Architecture of Computing Systems (ARCS). Vol 10793. Lecture Notes in Computer
Science. Cham: Springer International Publishing; 2018:73-84. doi:10.1007/978-3-319-77610-1_6'
apa: 'Lösch, A., Wiens, A., & Platzner, M. (2018). Ampehre: An Open Source Measurement
Framework for Heterogeneous Compute Nodes. In Proceedings of the International
Conference on Architecture of Computing Systems (ARCS) (Vol. 10793, pp. 73–84).
Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-77610-1_6'
bibtex: '@inproceedings{Lösch_Wiens_Platzner_2018, place={Cham}, series={Lecture
Notes in Computer Science}, title={Ampehre: An Open Source Measurement Framework
for Heterogeneous Compute Nodes}, volume={10793}, DOI={10.1007/978-3-319-77610-1_6},
booktitle={Proceedings of the International Conference on Architecture of Computing
Systems (ARCS)}, publisher={Springer International Publishing}, author={Lösch,
Achim and Wiens, Alex and Platzner, Marco}, year={2018}, pages={73–84}, collection={Lecture
Notes in Computer Science} }'
chicago: 'Lösch, Achim, Alex Wiens, and Marco Platzner. “Ampehre: An Open Source
Measurement Framework for Heterogeneous Compute Nodes.” In Proceedings of the
International Conference on Architecture of Computing Systems (ARCS), 10793:73–84.
Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018.
https://doi.org/10.1007/978-3-319-77610-1_6.'
ieee: 'A. Lösch, A. Wiens, and M. Platzner, “Ampehre: An Open Source Measurement
Framework for Heterogeneous Compute Nodes,” in Proceedings of the International
Conference on Architecture of Computing Systems (ARCS), 2018, vol. 10793,
pp. 73–84.'
mla: 'Lösch, Achim, et al. “Ampehre: An Open Source Measurement Framework for Heterogeneous
Compute Nodes.” Proceedings of the International Conference on Architecture
of Computing Systems (ARCS), vol. 10793, Springer International Publishing,
2018, pp. 73–84, doi:10.1007/978-3-319-77610-1_6.'
short: 'A. Lösch, A. Wiens, M. Platzner, in: Proceedings of the International Conference
on Architecture of Computing Systems (ARCS), Springer International Publishing,
Cham, 2018, pp. 73–84.'
date_created: 2018-06-26T13:47:52Z
date_updated: 2022-01-06T06:59:13Z
ddc:
- '040'
department:
- _id: '78'
doi: 10.1007/978-3-319-77610-1_6
file:
- access_level: closed
content_type: application/pdf
creator: aloesch
date_created: 2018-06-26T13:58:28Z
date_updated: 2018-06-26T13:58:28Z
file_id: '3363'
file_name: loesch2017_arcs.pdf
file_size: 1114026
relation: main_file
success: 1
file_date_updated: 2018-06-26T13:58:28Z
has_accepted_license: '1'
intvolume: ' 10793'
page: 73-84
place: Cham
project:
- _id: '14'
name: SFB 901 - Subproject C2
- _id: '4'
name: SFB 901 - Project Area C
- _id: '1'
name: SFB 901
publication: Proceedings of the International Conference on Architecture of Computing
Systems (ARCS)
publication_identifier:
isbn:
- '9783319776095'
- '9783319776101'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: 'Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes'
type: conference
user_id: '477'
volume: 10793
year: '2018'
...
---
_id: '3373'
abstract:
- lang: eng
text: Modern Boolean satisfiability solvers can emit proofs of unsatisfiability.
There is substantial interest in being able to verify such proofs and also in
using them for further computations. In this paper, we present an FPGA accelerator
for checking resolution proofs, a popular proof format. Our accelerator exploits
parallelism at the low level by implementing the basic resolution step in hardware,
and at the high level by instantiating a number of parallel modules for proof
checking. Since proof checking involves highly irregular memory accesses, we employ
Hybrid Memory Cube technology for accelerator memory. The results show that while
the accelerator is scalable and achieves speedups for all benchmark proofs, performance
improvements are currently limited by the overhead of transitioning the proof
into the accelerator memory.
author:
- first_name: Tim
full_name: Hansmeier, Tim
id: '49992'
last_name: Hansmeier
orcid: 0000-0003-1377-3339
- first_name: Marco
full_name: Platzner, Marco
id: '398'
last_name: Platzner
- first_name: David
full_name: Andrews, David
last_name: Andrews
citation:
ama: 'Hansmeier T, Platzner M, Andrews D. An FPGA/HMC-Based Accelerator for Resolution
Proof Checking. In: ARC 2018: Applied Reconfigurable Computing. Architectures,
Tools, and Applications. Vol 10824. Lecture Notes in Computer Science. Springer
International Publishing; 2018:153-165. doi:10.1007/978-3-319-78890-6_13'
apa: 'Hansmeier, T., Platzner, M., & Andrews, D. (2018). An FPGA/HMC-Based Accelerator
for Resolution Proof Checking. In ARC 2018: Applied Reconfigurable Computing.
Architectures, Tools, and Applications (Vol. 10824, pp. 153–165). Santorini,
Greece: Springer International Publishing. https://doi.org/10.1007/978-3-319-78890-6_13'
bibtex: '@inproceedings{Hansmeier_Platzner_Andrews_2018, series={Lecture Notes in
Computer Science}, title={An FPGA/HMC-Based Accelerator for Resolution Proof Checking},
volume={10824}, DOI={10.1007/978-3-319-78890-6_13},
booktitle={ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and
Applications}, publisher={Springer International Publishing}, author={Hansmeier,
Tim and Platzner, Marco and Andrews, David}, year={2018}, pages={153–165}, collection={Lecture
Notes in Computer Science} }'
chicago: 'Hansmeier, Tim, Marco Platzner, and David Andrews. “An FPGA/HMC-Based
Accelerator for Resolution Proof Checking.” In ARC 2018: Applied Reconfigurable
Computing. Architectures, Tools, and Applications, 10824:153–65. Lecture Notes
in Computer Science. Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-78890-6_13.'
ieee: 'T. Hansmeier, M. Platzner, and D. Andrews, “An FPGA/HMC-Based Accelerator
for Resolution Proof Checking,” in ARC 2018: Applied Reconfigurable Computing.
Architectures, Tools, and Applications, Santorini, Greece, 2018, vol. 10824,
pp. 153–165.'
mla: 'Hansmeier, Tim, et al. “An FPGA/HMC-Based Accelerator for Resolution Proof
Checking.” ARC 2018: Applied Reconfigurable Computing. Architectures, Tools,
and Applications, vol. 10824, Springer International Publishing, 2018, pp.
153–65, doi:10.1007/978-3-319-78890-6_13.'
short: 'T. Hansmeier, M. Platzner, D. Andrews, in: ARC 2018: Applied Reconfigurable
Computing. Architectures, Tools, and Applications, Springer International Publishing,
2018, pp. 153–165.'
conference:
end_date: 2018-05-04
location: Santorini, Greece
name: 'ARC: International Symposium on Applied Reconfigurable Computing'
start_date: 2018-05-02
date_created: 2018-06-27T09:30:24Z
date_updated: 2022-01-06T06:59:13Z
ddc:
- '000'
department:
- _id: '78'
doi: 10.1007/978-3-319-78890-6_13
file:
- access_level: closed
content_type: application/pdf
creator: ups
date_created: 2018-11-02T13:55:07Z
date_updated: 2018-11-02T13:55:07Z
file_id: '5257'
file_name: AnFPGAHMC-BasedAcceleratorForR.pdf
file_size: 612367
relation: main_file
success: 1
file_date_updated: 2018-11-02T13:55:07Z
has_accepted_license: '1'
intvolume: ' 10824'
language:
- iso: eng
page: 153-165
project:
- _id: '12'
name: SFB 901 - Subproject B4
- _id: '1'
name: SFB 901
- _id: '3'
name: SFB 901 - Project Area B
publication: 'ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and
Applications'
publication_identifier:
isbn:
- '9783319788890'
- '9783319788906'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: An FPGA/HMC-Based Accelerator for Resolution Proof Checking
type: conference
user_id: '3118'
volume: 10824
year: '2018'
...
---
_id: '3536'
author:
- first_name: Gerhard
full_name: Schellhorn, Gerhard
last_name: Schellhorn
- first_name: Monika
full_name: Wedel, Monika
last_name: Wedel
- first_name: Oleg
full_name: Travkin, Oleg
last_name: Travkin
- first_name: Jürgen
full_name: König, Jürgen
id: '22358'
last_name: König
- first_name: Heike
full_name: Wehrheim, Heike
id: '573'
last_name: Wehrheim
citation:
ama: 'Schellhorn G, Wedel M, Travkin O, König J, Wehrheim H. FastLane Is Opaque
– a Case Study in Mechanized Proofs of Opacity. In: Software Engineering and
Formal Methods. Cham: Springer International Publishing; 2018:105-120. doi:10.1007/978-3-319-92970-5_7'
apa: 'Schellhorn, G., Wedel, M., Travkin, O., König, J., & Wehrheim, H. (2018).
FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity. In Software
Engineering and Formal Methods (pp. 105–120). Cham: Springer International
Publishing. https://doi.org/10.1007/978-3-319-92970-5_7'
bibtex: '@inbook{Schellhorn_Wedel_Travkin_König_Wehrheim_2018, place={Cham}, title={FastLane
Is Opaque – a Case Study in Mechanized Proofs of Opacity}, DOI={10.1007/978-3-319-92970-5_7},
booktitle={Software Engineering and Formal Methods}, publisher={Springer International
Publishing}, author={Schellhorn, Gerhard and Wedel, Monika and Travkin, Oleg and
König, Jürgen and Wehrheim, Heike}, year={2018}, pages={105–120} }'
chicago: 'Schellhorn, Gerhard, Monika Wedel, Oleg Travkin, Jürgen König, and Heike
Wehrheim. “FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity.”
In Software Engineering and Formal Methods, 105–20. Cham: Springer International
Publishing, 2018. https://doi.org/10.1007/978-3-319-92970-5_7.'
ieee: 'G. Schellhorn, M. Wedel, O. Travkin, J. König, and H. Wehrheim, “FastLane
Is Opaque – a Case Study in Mechanized Proofs of Opacity,” in Software Engineering
and Formal Methods, Cham: Springer International Publishing, 2018, pp. 105–120.'
mla: Schellhorn, Gerhard, et al. “FastLane Is Opaque – a Case Study in Mechanized
Proofs of Opacity.” Software Engineering and Formal Methods, Springer International
Publishing, 2018, pp. 105–20, doi:10.1007/978-3-319-92970-5_7.
short: 'G. Schellhorn, M. Wedel, O. Travkin, J. König, H. Wehrheim, in: Software
Engineering and Formal Methods, Springer International Publishing, Cham, 2018,
pp. 105–120.'
date_created: 2018-07-11T06:19:58Z
date_updated: 2022-01-06T06:59:22Z
department:
- _id: '77'
doi: 10.1007/978-3-319-92970-5_7
page: 105-120
place: Cham
project:
- _id: '78'
name: Validation of Software Transactional Memory
publication: Software Engineering and Formal Methods
publication_identifier:
isbn:
- '9783319929699'
- '9783319929705'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity
type: book_chapter
user_id: '29719'
year: '2018'
...
---
_id: '5774'
abstract:
- lang: eng
text: Information flow analysis investigates the flow of data in applications, checking
in particular for flows from private sources to public sinks. Flow- and path-sensitive
analyses are, however, often too costly to be performed every time a security-critical
application is run. In this paper, we propose a variant of proof carrying code
for information flow security. To this end, we develop information flow (IF) certificates
which get attached to programs as well as a method for IF certificate validation.
We prove soundness of our technique, i.e., show it to be tamper-free. The technique
is implemented within the program analysis tool CPAchecker. Our experiments confirm
that the use of certificates pays off for costly analysis runs.
author:
- first_name: Manuel
full_name: Töws, Manuel
id: '11315'
last_name: Töws
- first_name: Heike
full_name: Wehrheim, Heike
id: '573'
last_name: Wehrheim
citation:
ama: 'Töws M, Wehrheim H. Information Flow Certificates. In: Theoretical Aspects
of Computing – ICTAC 2018. Cham: Springer International Publishing; 2018:435-454.
doi:10.1007/978-3-030-02508-3_23'
apa: 'Töws, M., & Wehrheim, H. (2018). Information Flow Certificates. In Theoretical
Aspects of Computing – ICTAC 2018 (pp. 435–454). Cham: Springer International
Publishing. https://doi.org/10.1007/978-3-030-02508-3_23'
bibtex: '@inproceedings{Töws_Wehrheim_2018, place={Cham}, title={Information Flow
Certificates}, DOI={10.1007/978-3-030-02508-3_23},
booktitle={Theoretical Aspects of Computing – ICTAC 2018}, publisher={Springer
International Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2018},
pages={435–454} }'
chicago: 'Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” In
Theoretical Aspects of Computing – ICTAC 2018, 435–54. Cham: Springer International
Publishing, 2018. https://doi.org/10.1007/978-3-030-02508-3_23.'
ieee: M. Töws and H. Wehrheim, “Information Flow Certificates,” in Theoretical
Aspects of Computing – ICTAC 2018, 2018, pp. 435–454.
mla: Töws, Manuel, and Heike Wehrheim. “Information Flow Certificates.” Theoretical
Aspects of Computing – ICTAC 2018, Springer International Publishing, 2018,
pp. 435–54, doi:10.1007/978-3-030-02508-3_23.
short: 'M. Töws, H. Wehrheim, in: Theoretical Aspects of Computing – ICTAC 2018,
Springer International Publishing, Cham, 2018, pp. 435–454.'
date_created: 2018-11-21T09:51:37Z
date_updated: 2022-01-06T07:02:40Z
ddc:
- '000'
department:
- _id: '77'
doi: 10.1007/978-3-030-02508-3_23
file:
- access_level: closed
content_type: application/pdf
creator: mtoews
date_created: 2018-11-26T15:11:32Z
date_updated: 2018-11-26T15:11:32Z
file_id: '5837'
file_name: Töws-Wehrheim2018_Chapter_InformationFlowCertificates.pdf
file_size: 518016
relation: main_file
success: 1
file_date_updated: 2018-11-26T15:11:32Z
has_accepted_license: '1'
language:
- iso: eng
page: 435-454
place: Cham
project:
- _id: '1'
name: SFB 901
- _id: '3'
name: SFB 901 - Project Area B
- _id: '12'
name: SFB 901 - Subproject B4
publication: Theoretical Aspects of Computing – ICTAC 2018
publication_identifier:
isbn:
- '9783030025076'
- '9783030025083'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Information Flow Certificates
type: conference
user_id: '477'
year: '2018'
...
---
_id: '6253'
author:
- first_name: Björn
full_name: Senft, Björn
id: '9109'
last_name: Senft
- first_name: Holger Gerhard
full_name: Fischer, Holger Gerhard
id: '30457'
last_name: Fischer
- first_name: Simon
full_name: Oberthür, Simon
id: '383'
last_name: Oberthür
- first_name: Nitish
full_name: Patkar, Nitish
last_name: Patkar
citation:
ama: 'Senft B, Fischer HG, Oberthür S, Patkar N. Assist Users to Straightaway Suggest
and Describe Experienced Problems. In: Design, User Experience, and Usability:
Theory and Practice. Vol 10918. Lecture Notes in Computer Science. Cham: Springer
International Publishing; 2018:758-770. doi:10.1007/978-3-319-91797-9_52'
apa: 'Senft, B., Fischer, H. G., Oberthür, S., & Patkar, N. (2018). Assist Users
to Straightaway Suggest and Describe Experienced Problems. In Design, User
Experience, and Usability: Theory and Practice (Vol. 10918, pp. 758–770).
Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-91797-9_52'
bibtex: '@inbook{Senft_Fischer_Oberthür_Patkar_2018, place={Cham}, series={Lecture
Notes in Computer Science}, title={Assist Users to Straightaway Suggest and Describe
Experienced Problems}, volume={10918}, DOI={10.1007/978-3-319-91797-9_52},
booktitle={Design, User Experience, and Usability: Theory and Practice}, publisher={Springer
International Publishing}, author={Senft, Björn and Fischer, Holger Gerhard and
Oberthür, Simon and Patkar, Nitish}, year={2018}, pages={758–770}, collection={Lecture
Notes in Computer Science} }'
chicago: 'Senft, Björn, Holger Gerhard Fischer, Simon Oberthür, and Nitish Patkar.
“Assist Users to Straightaway Suggest and Describe Experienced Problems.” In Design,
User Experience, and Usability: Theory and Practice, 10918:758–70. Lecture
Notes in Computer Science. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-91797-9_52.'
ieee: 'B. Senft, H. G. Fischer, S. Oberthür, and N. Patkar, “Assist Users to Straightaway
Suggest and Describe Experienced Problems,” in Design, User Experience, and
Usability: Theory and Practice, vol. 10918, Cham: Springer International Publishing,
2018, pp. 758–770.'
mla: 'Senft, Björn, et al. “Assist Users to Straightaway Suggest and Describe Experienced
Problems.” Design, User Experience, and Usability: Theory and Practice,
vol. 10918, Springer International Publishing, 2018, pp. 758–70, doi:10.1007/978-3-319-91797-9_52.'
short: 'B. Senft, H.G. Fischer, S. Oberthür, N. Patkar, in: Design, User Experience,
and Usability: Theory and Practice, Springer International Publishing, Cham, 2018,
pp. 758–770.'
conference:
end_date: 2018-07-20
location: Las Vegas, USA
name: International Conference of Design, User Experience, and Usability (DUXU)
as part of HCI International 2018
start_date: 2018-07-15
date_created: 2018-12-18T10:37:41Z
date_updated: 2022-01-06T07:02:58Z
department:
- _id: '66'
- _id: '534'
- _id: '221'
doi: 10.1007/978-3-319-91797-9_52
intvolume: ' 10918'
language:
- iso: eng
page: 758-770
place: Cham
publication: 'Design, User Experience, and Usability: Theory and Practice'
publication_identifier:
isbn:
- '9783319917962'
- '9783319917979'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Assist Users to Straightaway Suggest and Describe Experienced Problems
type: book_chapter
user_id: '30457'
volume: 10918
year: '2018'
...
---
_id: '6254'
author:
- first_name: Holger Gerhard
full_name: Fischer, Holger Gerhard
id: '30457'
last_name: Fischer
- first_name: Björn
full_name: Senft, Björn
id: '9109'
last_name: Senft
- first_name: Florian
full_name: Rittmeier, Florian
id: '5281'
last_name: Rittmeier
- first_name: Stefan
full_name: Sauer, Stefan
id: '447'
last_name: Sauer
citation:
ama: 'Fischer HG, Senft B, Rittmeier F, Sauer S. A Canvas Method to Foster Interdisciplinary
Discussions on Digital Assistance Systems. In: Marcus A, Wang W, eds. Design,
User Experience, and Usability: Theory and Practice. Proceedings of the 20th International
Conference on Human-Computer Interaktion (HCI International 2018). Vol 10918.
Lecture Notes in Computer Science. Cham: Springer International Publishing; 2018:711-724.
doi:10.1007/978-3-319-91797-9_49'
apa: 'Fischer, H. G., Senft, B., Rittmeier, F., & Sauer, S. (2018). A Canvas
Method to Foster Interdisciplinary Discussions on Digital Assistance Systems.
In A. Marcus & W. Wang (Eds.), Design, User Experience, and Usability:
Theory and Practice. Proceedings of the 20th International Conference on Human-Computer
Interaktion (HCI International 2018) (Vol. 10918, pp. 711–724). Cham: Springer
International Publishing. https://doi.org/10.1007/978-3-319-91797-9_49'
bibtex: '@inbook{Fischer_Senft_Rittmeier_Sauer_2018, place={Cham}, series={Lecture
Notes in Computer Science}, title={A Canvas Method to Foster Interdisciplinary
Discussions on Digital Assistance Systems}, volume={10918}, DOI={10.1007/978-3-319-91797-9_49},
booktitle={Design, User Experience, and Usability: Theory and Practice. Proceedings
of the 20th International Conference on Human-Computer Interaktion (HCI International
2018)}, publisher={Springer International Publishing}, author={Fischer, Holger
Gerhard and Senft, Björn and Rittmeier, Florian and Sauer, Stefan}, editor={Marcus,
Aaron and Wang, WentaoEditors}, year={2018}, pages={711–724}, collection={Lecture
Notes in Computer Science} }'
chicago: 'Fischer, Holger Gerhard, Björn Senft, Florian Rittmeier, and Stefan Sauer.
“A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance
Systems.” In Design, User Experience, and Usability: Theory and Practice. Proceedings
of the 20th International Conference on Human-Computer Interaktion (HCI International
2018), edited by Aaron Marcus and Wentao Wang, 10918:711–24. Lecture Notes
in Computer Science. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-91797-9_49.'
ieee: 'H. G. Fischer, B. Senft, F. Rittmeier, and S. Sauer, “A Canvas Method to
Foster Interdisciplinary Discussions on Digital Assistance Systems,” in Design,
User Experience, and Usability: Theory and Practice. Proceedings of the 20th International
Conference on Human-Computer Interaktion (HCI International 2018), vol. 10918,
A. Marcus and W. Wang, Eds. Cham: Springer International Publishing, 2018, pp.
711–724.'
mla: 'Fischer, Holger Gerhard, et al. “A Canvas Method to Foster Interdisciplinary
Discussions on Digital Assistance Systems.” Design, User Experience, and Usability:
Theory and Practice. Proceedings of the 20th International Conference on Human-Computer
Interaktion (HCI International 2018), edited by Aaron Marcus and Wentao Wang,
vol. 10918, Springer International Publishing, 2018, pp. 711–24, doi:10.1007/978-3-319-91797-9_49.'
short: 'H.G. Fischer, B. Senft, F. Rittmeier, S. Sauer, in: A. Marcus, W. Wang (Eds.),
Design, User Experience, and Usability: Theory and Practice. Proceedings of the
20th International Conference on Human-Computer Interaktion (HCI International
2018), Springer International Publishing, Cham, 2018, pp. 711–724.'
conference:
end_date: 2018-07-20
location: Las Vegas, USA
name: International Conference of Design, User Experience, and Usability (DUXU)
as part of HCI International 2018
start_date: 2018-07-15
date_created: 2018-12-18T10:42:39Z
date_updated: 2022-01-06T07:02:58Z
department:
- _id: '66'
- _id: '534'
- _id: '221'
doi: 10.1007/978-3-319-91797-9_49
editor:
- first_name: Aaron
full_name: Marcus, Aaron
last_name: Marcus
- first_name: Wentao
full_name: Wang, Wentao
last_name: Wang
intvolume: ' 10918'
language:
- iso: eng
page: 711-724
place: Cham
publication: 'Design, User Experience, and Usability: Theory and Practice. Proceedings
of the 20th International Conference on Human-Computer Interaktion (HCI International
2018)'
publication_identifier:
isbn:
- '9783319917962'
- '9783319917979'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance
Systems
type: book_chapter
user_id: '30457'
volume: 10918
year: '2018'
...
---
_id: '6423'
author:
- first_name: Dirk
full_name: Schäfer, Dirk
last_name: Schäfer
- first_name: Eyke
full_name: Hüllermeier, Eyke
id: '48129'
last_name: Hüllermeier
citation:
ama: 'Schäfer D, Hüllermeier E. Preference-Based Reinforcement Learning Using Dyad
Ranking. In: Discovery Science. Cham: Springer International Publishing;
2018:161-175. doi:10.1007/978-3-030-01771-2_11'
apa: 'Schäfer, D., & Hüllermeier, E. (2018). Preference-Based Reinforcement
Learning Using Dyad Ranking. In Discovery Science (pp. 161–175). Cham:
Springer International Publishing. https://doi.org/10.1007/978-3-030-01771-2_11'
bibtex: '@inbook{Schäfer_Hüllermeier_2018, place={Cham}, title={Preference-Based
Reinforcement Learning Using Dyad Ranking}, DOI={10.1007/978-3-030-01771-2_11},
booktitle={Discovery Science}, publisher={Springer International Publishing},
author={Schäfer, Dirk and Hüllermeier, Eyke}, year={2018}, pages={161–175} }'
chicago: 'Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning
Using Dyad Ranking.” In Discovery Science, 161–75. Cham: Springer International
Publishing, 2018. https://doi.org/10.1007/978-3-030-01771-2_11.'
ieee: 'D. Schäfer and E. Hüllermeier, “Preference-Based Reinforcement Learning Using
Dyad Ranking,” in Discovery Science, Cham: Springer International Publishing,
2018, pp. 161–175.'
mla: Schäfer, Dirk, and Eyke Hüllermeier. “Preference-Based Reinforcement Learning
Using Dyad Ranking.” Discovery Science, Springer International Publishing,
2018, pp. 161–75, doi:10.1007/978-3-030-01771-2_11.
short: 'D. Schäfer, E. Hüllermeier, in: Discovery Science, Springer International
Publishing, Cham, 2018, pp. 161–175.'
date_created: 2018-12-20T15:52:03Z
date_updated: 2022-01-06T07:03:04Z
ddc:
- '000'
department:
- _id: '355'
doi: 10.1007/978-3-030-01771-2_11
file:
- access_level: closed
content_type: application/pdf
creator: ups
date_created: 2019-01-11T11:03:50Z
date_updated: 2019-01-11T11:03:50Z
file_id: '6623'
file_name: Schäfer-Hüllermeier2018_Chapter_Preference-BasedReinforcementL.pdf
file_size: 458972
relation: main_file
success: 1
file_date_updated: 2019-01-11T11:03:50Z
has_accepted_license: '1'
language:
- iso: eng
page: 161-175
place: Cham
project:
- _id: '1'
name: SFB 901
- _id: '3'
name: SFB 901 - Project Area B
- _id: '10'
name: SFB 901 - Subproject B2
publication: Discovery Science
publication_identifier:
isbn:
- '9783030017705'
- '9783030017712'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Preference-Based Reinforcement Learning Using Dyad Ranking
type: book_chapter
user_id: '49109'
year: '2018'
...
---
_id: '16392'
author:
- first_name: Björn
full_name: Feldkord, Björn
id: '22704'
last_name: Feldkord
- first_name: Manuel
full_name: Malatyali, Manuel
last_name: Malatyali
- first_name: Friedhelm
full_name: Meyer auf der Heide, Friedhelm
id: '15523'
last_name: Meyer auf der Heide
citation:
ama: 'Feldkord B, Malatyali M, Meyer auf der Heide F. A Dynamic Distributed Data
Structure for Top-k and k-Select Queries. In: Progress in Pattern Recognition,
Image Analysis, Computer Vision, and Applications. Cham; 2018. doi:10.1007/978-3-319-98355-4_18'
apa: Feldkord, B., Malatyali, M., & Meyer auf der Heide, F. (2018). A Dynamic
Distributed Data Structure for Top-k and k-Select Queries. In Progress in Pattern
Recognition, Image Analysis, Computer Vision, and Applications. Cham. https://doi.org/10.1007/978-3-319-98355-4_18
bibtex: '@inbook{Feldkord_Malatyali_Meyer auf der Heide_2018, place={Cham}, title={A
Dynamic Distributed Data Structure for Top-k and k-Select Queries}, DOI={10.1007/978-3-319-98355-4_18},
booktitle={Progress in Pattern Recognition, Image Analysis, Computer Vision, and
Applications}, author={Feldkord, Björn and Malatyali, Manuel and Meyer auf der
Heide, Friedhelm}, year={2018} }'
chicago: Feldkord, Björn, Manuel Malatyali, and Friedhelm Meyer auf der Heide. “A
Dynamic Distributed Data Structure for Top-k and k-Select Queries.” In Progress
in Pattern Recognition, Image Analysis, Computer Vision, and Applications.
Cham, 2018. https://doi.org/10.1007/978-3-319-98355-4_18.
ieee: B. Feldkord, M. Malatyali, and F. Meyer auf der Heide, “A Dynamic Distributed
Data Structure for Top-k and k-Select Queries,” in Progress in Pattern Recognition,
Image Analysis, Computer Vision, and Applications, Cham, 2018.
mla: Feldkord, Björn, et al. “A Dynamic Distributed Data Structure for Top-k and
k-Select Queries.” Progress in Pattern Recognition, Image Analysis, Computer
Vision, and Applications, 2018, doi:10.1007/978-3-319-98355-4_18.
short: 'B. Feldkord, M. Malatyali, F. Meyer auf der Heide, in: Progress in Pattern
Recognition, Image Analysis, Computer Vision, and Applications, Cham, 2018.'
date_created: 2020-04-03T07:04:59Z
date_updated: 2022-01-06T06:52:50Z
department:
- _id: '63'
doi: 10.1007/978-3-319-98355-4_18
language:
- iso: eng
place: Cham
publication: Progress in Pattern Recognition, Image Analysis, Computer Vision, and
Applications
publication_identifier:
isbn:
- '9783319125671'
- '9783319125688'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: A Dynamic Distributed Data Structure for Top-k and k-Select Queries
type: book_chapter
user_id: '15415'
year: '2018'
...
---
_id: '24398'
abstract:
- lang: eng
text: 'Through this study, we introduce the idea of applying scheduling techniques
to allocate spatial resources that are shared among multiple robots moving in
a static environment and having temporal constraints on the arrival time to destinations.
To illustrate this idea, we present an exemplified algorithm that plans and assigns
a motion path to each robot. The considered problem is particularly challenging
because: (i) the robots share the same environment and thus the planner must take
into account overlapping paths which cannot happen at the same time; (ii) there
are time deadlines thus the planner must deal with temporal constraints; (iii)
new requests arrive without a priori knowledge thus the planner must be able to
add new paths online and adjust old plans; (iv) the robot motion is subject to
noise thus the planner must be reactive to adapt to online changes. We showcase
the functioning of the proposed algorithm through a set of agent-based simulations.'
author:
- first_name: Yara
full_name: Khaluf, Yara
last_name: Khaluf
- first_name: Christine
full_name: Markarian, Christine
last_name: Markarian
- first_name: Pieter
full_name: Simoens, Pieter
last_name: Simoens
- first_name: Andreagiovanni
full_name: Reina, Andreagiovanni
last_name: Reina
citation:
ama: 'Khaluf Y, Markarian C, Simoens P, Reina A. Scheduling Access to Shared Space
in Multi-robot Systems. In: International Conference on Practical Applications
of Agents and Multi-Agent Systems (PAAMS 2017). ; 2017. doi:10.1007/978-3-319-59930-4_12'
apa: Khaluf, Y., Markarian, C., Simoens, P., & Reina, A. (2017). Scheduling
Access to Shared Space in Multi-robot Systems. International Conference on
Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017). https://doi.org/10.1007/978-3-319-59930-4_12
bibtex: '@inproceedings{Khaluf_Markarian_Simoens_Reina_2017, place={Cham}, title={Scheduling
Access to Shared Space in Multi-robot Systems}, DOI={10.1007/978-3-319-59930-4_12},
booktitle={International Conference on Practical Applications of Agents and Multi-Agent
Systems (PAAMS 2017)}, author={Khaluf, Yara and Markarian, Christine and Simoens,
Pieter and Reina, Andreagiovanni}, year={2017} }'
chicago: Khaluf, Yara, Christine Markarian, Pieter Simoens, and Andreagiovanni Reina.
“Scheduling Access to Shared Space in Multi-Robot Systems.” In International
Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS
2017). Cham, 2017. https://doi.org/10.1007/978-3-319-59930-4_12.
ieee: 'Y. Khaluf, C. Markarian, P. Simoens, and A. Reina, “Scheduling Access to
Shared Space in Multi-robot Systems,” 2017, doi: 10.1007/978-3-319-59930-4_12.'
mla: Khaluf, Yara, et al. “Scheduling Access to Shared Space in Multi-Robot Systems.”
International Conference on Practical Applications of Agents and Multi-Agent
Systems (PAAMS 2017), 2017, doi:10.1007/978-3-319-59930-4_12.
short: 'Y. Khaluf, C. Markarian, P. Simoens, A. Reina, in: International Conference
on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2017), Cham,
2017.'
date_created: 2021-09-14T12:41:58Z
date_updated: 2022-01-06T06:56:19Z
department:
- _id: '63'
doi: 10.1007/978-3-319-59930-4_12
language:
- iso: eng
place: Cham
publication: International Conference on Practical Applications of Agents and Multi-Agent
Systems (PAAMS 2017)
publication_identifier:
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Scheduling Access to Shared Space in Multi-robot Systems
type: conference
user_id: '15415'
year: '2017'
...
---
_id: '2967'
author:
- first_name: Johannes
full_name: Blömer, Johannes
id: '23'
last_name: Blömer
- first_name: Gennadij
full_name: Liske, Gennadij
last_name: Liske
citation:
ama: 'Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption
with Public Index. In: Proceedings of the International Conference of Mathematical
Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes
in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35'
apa: 'Blömer, J., & Liske, G. (2017). Subtleties in Security Definitions for
Predicate Encryption with Public Index. In Proceedings of the International
Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)
(Vol. 10693, pp. 438–453). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-72453-9_35'
bibtex: '@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in
Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption
with Public Index}, volume={10693}, DOI={10.1007/978-3-319-72453-9_35},
booktitle={Proceedings of the International Conference of Mathematical Aspects
of Computer and Information Sciences (MACIS)}, publisher={Springer International
Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453},
collection={Lecture Notes in Computer Science} }'
chicago: 'Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions
for Predicate Encryption with Public Index.” In Proceedings of the International
Conference of Mathematical Aspects of Computer and Information Sciences (MACIS),
10693:438–53. Lecture Notes in Computer Science. Cham: Springer International
Publishing, 2017. https://doi.org/10.1007/978-3-319-72453-9_35.'
ieee: J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate
Encryption with Public Index,” in Proceedings of the International Conference
of Mathematical Aspects of Computer and Information Sciences (MACIS), 2017,
vol. 10693, pp. 438–453.
mla: Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for
Predicate Encryption with Public Index.” Proceedings of the International Conference
of Mathematical Aspects of Computer and Information Sciences (MACIS), vol.
10693, Springer International Publishing, 2017, pp. 438–53, doi:10.1007/978-3-319-72453-9_35.
short: 'J. Blömer, G. Liske, in: Proceedings of the International Conference of
Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International
Publishing, Cham, 2017, pp. 438–453.'
date_created: 2018-06-04T12:17:48Z
date_updated: 2022-01-06T06:58:49Z
ddc:
- '000'
department:
- _id: '64'
doi: 10.1007/978-3-319-72453-9_35
file:
- access_level: closed
content_type: application/pdf
creator: ups
date_created: 2018-11-02T14:52:10Z
date_updated: 2018-11-02T14:52:10Z
file_id: '5286'
file_name: SubtletiesInSecurityDefinition.pdf
file_size: 463904
relation: main_file
success: 1
file_date_updated: 2018-11-02T14:52:10Z
has_accepted_license: '1'
intvolume: ' 10693'
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://eprint.iacr.org/2017/453.pdf
oa: '1'
page: 438-453
place: Cham
project:
- _id: '1'
name: SFB 901
- _id: '4'
name: SFB 901 - Project Area C
- _id: '13'
name: SFB 901 - Subproject C1
publication: Proceedings of the International Conference of Mathematical Aspects of
Computer and Information Sciences (MACIS)
publication_identifier:
isbn:
- '9783319724522'
- '9783319724539'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Subtleties in Security Definitions for Predicate Encryption with Public Index
type: conference
user_id: '477'
volume: 10693
year: '2017'
...
---
_id: '23396'
author:
- first_name: Christopher
full_name: Gerking, Christopher
last_name: Gerking
- first_name: David
full_name: Schubert, David
last_name: Schubert
- first_name: Ingo
full_name: Budde, Ingo
last_name: Budde
citation:
ama: 'Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model
Refinements by Using General-Purpose Language Facilities. In: Theory and Practice
of Model Transformation. Cham; 2017. doi:10.1007/978-3-319-61473-1_2'
apa: Gerking, C., Schubert, D., & Budde, I. (2017). Reducing the Verbosity of
Imperative Model Refinements by Using General-Purpose Language Facilities. In
Theory and Practice of Model Transformation. Cham. https://doi.org/10.1007/978-3-319-61473-1_2
bibtex: '@inbook{Gerking_Schubert_Budde_2017, place={Cham}, title={Reducing the
Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities},
DOI={10.1007/978-3-319-61473-1_2},
booktitle={Theory and Practice of Model Transformation}, author={Gerking, Christopher
and Schubert, David and Budde, Ingo}, year={2017} }'
chicago: Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity
of Imperative Model Refinements by Using General-Purpose Language Facilities.”
In Theory and Practice of Model Transformation. Cham, 2017. https://doi.org/10.1007/978-3-319-61473-1_2.
ieee: C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative
Model Refinements by Using General-Purpose Language Facilities,” in Theory
and Practice of Model Transformation, Cham, 2017.
mla: Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements
by Using General-Purpose Language Facilities.” Theory and Practice of Model
Transformation, 2017, doi:10.1007/978-3-319-61473-1_2.
short: 'C. Gerking, D. Schubert, I. Budde, in: Theory and Practice of Model Transformation,
Cham, 2017.'
date_created: 2021-08-13T20:33:08Z
date_updated: 2022-01-06T06:55:52Z
doi: 10.1007/978-3-319-61473-1_2
language:
- iso: eng
place: Cham
publication: Theory and Practice of Model Transformation
publication_identifier:
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose
Language Facilities
type: book_chapter
user_id: '13693'
year: '2017'
...
---
_id: '2344'
author:
- first_name: Johannes
full_name: Blömer, Johannes
id: '23'
last_name: Blömer
- first_name: Peter
full_name: Günther, Peter
last_name: Günther
- first_name: Volker
full_name: Krummel, Volker
last_name: Krummel
- first_name: Nils
full_name: Löken, Nils
id: '13703'
last_name: Löken
citation:
ama: 'Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service
for Access Control in Large-Scale Organizations. In: Foundations and Practice
of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1'
apa: 'Blömer, J., Günther, P., Krummel, V., & Löken, N. (2017). Attribute-Based
Encryption as a Service for Access Control in Large-Scale Organizations. In Foundations
and Practice of Security (pp. 3–17). Cham: Springer International Publishing.
https://doi.org/10.1007/978-3-319-75650-9_1'
bibtex: '@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based
Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={10.1007/978-3-319-75650-9_1},
booktitle={Foundations and Practice of Security}, publisher={Springer International
Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and
Löken, Nils}, year={2017}, pages={3–17} }'
chicago: 'Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based
Encryption as a Service for Access Control in Large-Scale Organizations.” In Foundations
and Practice of Security, 3–17. Cham: Springer International Publishing, 2017.
https://doi.org/10.1007/978-3-319-75650-9_1.'
ieee: J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption
as a Service for Access Control in Large-Scale Organizations,” in Foundations
and Practice of Security, 2017, pp. 3–17.
mla: Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access
Control in Large-Scale Organizations.” Foundations and Practice of Security,
Springer International Publishing, 2017, pp. 3–17, doi:10.1007/978-3-319-75650-9_1.
short: 'J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice
of Security, Springer International Publishing, Cham, 2017, pp. 3–17.'
date_created: 2018-04-13T11:40:48Z
date_updated: 2022-01-06T06:55:55Z
ddc:
- '000'
department:
- _id: '64'
doi: 10.1007/978-3-319-75650-9_1
file:
- access_level: closed
content_type: application/pdf
creator: ups
date_created: 2018-11-02T15:04:13Z
date_updated: 2018-11-02T15:04:13Z
file_id: '5292'
file_name: Attribute-BasedEncryptionAsASe.pdf
file_size: 634736
relation: main_file
success: 1
- access_level: open_access
content_type: application/pdf
creator: nilo
date_created: 2018-11-08T09:53:34Z
date_updated: 2018-11-08T09:53:34Z
file_id: '5425'
file_name: abe_aas.pdf
file_size: 522516
relation: main_file
file_date_updated: 2018-11-08T09:53:34Z
has_accepted_license: '1'
language:
- iso: eng
oa: '1'
page: 3-17
place: Cham
project:
- _id: '13'
name: SFB 901 - Subproject C1
- _id: '4'
name: SFB 901 - Project Area C
- _id: '1'
name: SFB 901
- _id: '43'
name: Securing the Financial Cloud
publication: Foundations and Practice of Security
publication_identifier:
isbn:
- '9783319756493'
- '9783319756509'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
type: conference
user_id: '13703'
year: '2017'
...
---
_id: '2381'
abstract:
- lang: eng
text: Metric facility location and K-means are well-known problems of combinatorial
optimization. Both admit a fairly simple heuristic called single-swap, which adds,
drops or swaps open facilities until it reaches a local optimum. For both problems,
it is known that this algorithm produces a solution that is at most a constant
factor worse than the respective global optimum. In this paper, we show that single-swap
applied to the weighted metric uncapacitated facility location and weighted discrete
K-means problem is tightly PLS-complete and hence has exponential worst-case running
time.
author:
- first_name: Sascha
full_name: Brauer, Sascha
id: '13291'
last_name: Brauer
citation:
ama: 'Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location
and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. Lecture
Notes in Computer Science. Vol 10236. Cham: Springer International Publishing;
2017:116-127. doi:10.1007/978-3-319-57586-5_11'
apa: 'Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility
Location and Related Problems. In D. Fotakis, A. Pagourtzis, & V. T. Paschos
(Eds.), Lecture Notes in Computer Science (Vol. 10236, pp. 116–127). Cham:
Springer International Publishing. https://doi.org/10.1007/978-3-319-57586-5_11'
bibtex: '@inbook{Brauer_2017, place={Cham}, title={Complexity of Single-Swap Heuristics
for Metric Facility Location and Related Problems}, volume={10236}, DOI={10.1007/978-3-319-57586-5_11},
booktitle={Lecture Notes in Computer Science}, publisher={Springer International
Publishing}, author={Brauer, Sascha}, editor={Fotakis, Dimitris and Pagourtzis,
Aris and Paschos, Vangelis Th.Editors}, year={2017}, pages={116–127} }'
chicago: 'Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility
Location and Related Problems.” In Lecture Notes in Computer Science, edited
by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27.
Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-57586-5_11.'
ieee: 'S. Brauer, “Complexity of Single-Swap Heuristics for Metric Facility Location
and Related Problems,” in Lecture Notes in Computer Science, vol. 10236,
D. Fotakis, A. Pagourtzis, and V. T. Paschos, Eds. Cham: Springer International
Publishing, 2017, pp. 116–127.'
mla: Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location
and Related Problems.” Lecture Notes in Computer Science, edited by Dimitris
Fotakis et al., vol. 10236, Springer International Publishing, 2017, pp. 116–27,
doi:10.1007/978-3-319-57586-5_11.
short: 'S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes
in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.'
conference:
end_date: 2017-05-26
location: Athens, Greece
name: 10th International Conference on Algorithms and Complexity
start_date: 2017-05-24
date_created: 2018-04-17T12:20:53Z
date_updated: 2022-01-06T06:56:00Z
department:
- _id: '64'
doi: 10.1007/978-3-319-57586-5_11
editor:
- first_name: Dimitris
full_name: Fotakis, Dimitris
last_name: Fotakis
- first_name: Aris
full_name: Pagourtzis, Aris
last_name: Pagourtzis
- first_name: Vangelis Th.
full_name: Paschos, Vangelis Th.
last_name: Paschos
intvolume: ' 10236'
language:
- iso: eng
page: 116-127
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
isbn:
- '9783319575858'
- '9783319575865'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Complexity of Single-Swap Heuristics for Metric Facility Location and Related
Problems
type: book_chapter
user_id: '13291'
volume: 10236
year: '2017'
...
---
_id: '5769'
abstract:
- lang: eng
text: "Information Flow Analysis (IFA) aims at detecting illegal flows of information
between program entities. “Legality” is therein specified in terms of various
security policies. For the analysis, this opens up two possibilities: building
generic, policy independent and building specific, policy dependent IFAs. While
the former needs to track all dependencies between program entities, the latter
allows for a reduced and thus more efficient analysis.\r\n\r\nIn this paper, we
start out by formally defining a policy independent information flow analysis.
Next, we show how to specialize this IFA via policy specific variable tracking,
and prove soundness of the specialization. We furthermore investigate refinement
relationships between policies, allowing an IFA for one policy to be employed
for its refinements. As policy refinement depends on concrete program entities,
we additionally propose a precomputation of policy refinement conditions, enabling
an efficient refinement check for concrete programs."
author:
- first_name: Manuel
full_name: Töws, Manuel
id: '11315'
last_name: Töws
- first_name: Heike
full_name: Wehrheim, Heike
id: '573'
last_name: Wehrheim
citation:
ama: 'Töws M, Wehrheim H. Policy Dependent and Independent Information Flow Analyses.
In: Formal Methods and Software Engineering - 19th International Conference
on Formal Engineering Methods (ICFEM 2017). Springer International Publishing;
2017:362-378. doi:10.1007/978-3-319-68690-5_22'
apa: Töws, M., & Wehrheim, H. (2017). Policy Dependent and Independent Information
Flow Analyses. In Formal Methods and Software Engineering - 19th International
Conference on Formal Engineering Methods (ICFEM 2017) (pp. 362–378). Springer
International Publishing. https://doi.org/10.1007/978-3-319-68690-5_22
bibtex: '@inproceedings{Töws_Wehrheim_2017, title={Policy Dependent and Independent
Information Flow Analyses}, DOI={10.1007/978-3-319-68690-5_22},
booktitle={Formal Methods and Software Engineering - 19th International Conference
on Formal Engineering Methods (ICFEM 2017)}, publisher={Springer International
Publishing}, author={Töws, Manuel and Wehrheim, Heike}, year={2017}, pages={362–378}
}'
chicago: Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information
Flow Analyses.” In Formal Methods and Software Engineering - 19th International
Conference on Formal Engineering Methods (ICFEM 2017), 362–78. Springer International
Publishing, 2017. https://doi.org/10.1007/978-3-319-68690-5_22.
ieee: M. Töws and H. Wehrheim, “Policy Dependent and Independent Information Flow
Analyses,” in Formal Methods and Software Engineering - 19th International
Conference on Formal Engineering Methods (ICFEM 2017), 2017, pp. 362–378.
mla: Töws, Manuel, and Heike Wehrheim. “Policy Dependent and Independent Information
Flow Analyses.” Formal Methods and Software Engineering - 19th International
Conference on Formal Engineering Methods (ICFEM 2017), Springer International
Publishing, 2017, pp. 362–78, doi:10.1007/978-3-319-68690-5_22.
short: 'M. Töws, H. Wehrheim, in: Formal Methods and Software Engineering - 19th
International Conference on Formal Engineering Methods (ICFEM 2017), Springer
International Publishing, 2017, pp. 362–378.'
date_created: 2018-11-21T09:38:43Z
date_updated: 2022-01-06T07:02:39Z
ddc:
- '000'
department:
- _id: '77'
doi: 10.1007/978-3-319-68690-5_22
file:
- access_level: closed
content_type: application/pdf
creator: mtoews
date_created: 2018-11-26T15:07:42Z
date_updated: 2018-11-26T15:07:42Z
file_id: '5836'
file_name: Töws-Wehrheim2017_Chapter_PolicyDependentAndIndependentI.pdf
file_size: 424031
relation: main_file
success: 1
file_date_updated: 2018-11-26T15:07:42Z
has_accepted_license: '1'
language:
- iso: eng
page: 362-378
project:
- _id: '12'
name: SFB 901 - Subproject B4
- _id: '3'
name: SFB 901 - Project Area B
- _id: '1'
name: SFB 901
publication: Formal Methods and Software Engineering - 19th International Conference on
Formal Engineering Methods (ICFEM 2017)
publication_identifier:
isbn:
- '9783319686899'
- '9783319686905'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Policy Dependent and Independent Information Flow Analyses
type: conference
user_id: '477'
year: '2017'
...
---
_id: '6255'
author:
- first_name: Holger Gerhard
full_name: Fischer, Holger Gerhard
id: '30457'
last_name: Fischer
- first_name: Michael
full_name: Engler, Michael
last_name: Engler
- first_name: Stefan
full_name: Sauer, Stefan
id: '447'
last_name: Sauer
citation:
ama: 'Fischer HG, Engler M, Sauer S. A Human-Centered Perspective on Software Quality:
Acceptance Criteria for Work 4.0. In: Design, User Experience, and Usability:
Theory, Methodology, and Management. Vol 10288. Lecture Notes in Computer
Science. Cham: Springer International Publishing; 2017:570-583. doi:10.1007/978-3-319-58634-2_42'
apa: 'Fischer, H. G., Engler, M., & Sauer, S. (2017). A Human-Centered Perspective
on Software Quality: Acceptance Criteria for Work 4.0. In Design, User Experience,
and Usability: Theory, Methodology, and Management (Vol. 10288, pp. 570–583).
Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-58634-2_42'
bibtex: '@inbook{Fischer_Engler_Sauer_2017, place={Cham}, series={Lecture Notes
in Computer Science}, title={A Human-Centered Perspective on Software Quality:
Acceptance Criteria for Work 4.0}, volume={10288}, DOI={10.1007/978-3-319-58634-2_42},
booktitle={Design, User Experience, and Usability: Theory, Methodology, and Management},
publisher={Springer International Publishing}, author={Fischer, Holger Gerhard
and Engler, Michael and Sauer, Stefan}, year={2017}, pages={570–583}, collection={Lecture
Notes in Computer Science} }'
chicago: 'Fischer, Holger Gerhard, Michael Engler, and Stefan Sauer. “A Human-Centered
Perspective on Software Quality: Acceptance Criteria for Work 4.0.” In Design,
User Experience, and Usability: Theory, Methodology, and Management, 10288:570–83.
Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017.
https://doi.org/10.1007/978-3-319-58634-2_42.'
ieee: 'H. G. Fischer, M. Engler, and S. Sauer, “A Human-Centered Perspective on
Software Quality: Acceptance Criteria for Work 4.0,” in Design, User Experience,
and Usability: Theory, Methodology, and Management, vol. 10288, Cham: Springer
International Publishing, 2017, pp. 570–583.'
mla: 'Fischer, Holger Gerhard, et al. “A Human-Centered Perspective on Software
Quality: Acceptance Criteria for Work 4.0.” Design, User Experience, and Usability:
Theory, Methodology, and Management, vol. 10288, Springer International Publishing,
2017, pp. 570–83, doi:10.1007/978-3-319-58634-2_42.'
short: 'H.G. Fischer, M. Engler, S. Sauer, in: Design, User Experience, and Usability:
Theory, Methodology, and Management, Springer International Publishing, Cham,
2017, pp. 570–583.'
conference:
end_date: 2017-07-14
location: Vancouver, Canada
name: International Conference of Design, User Experience, and Usability (DUXU)
as part of HCI International 2017
start_date: 2017-07-09
date_created: 2018-12-18T10:44:24Z
date_updated: 2022-01-06T07:02:58Z
department:
- _id: '66'
- _id: '534'
- _id: '221'
doi: 10.1007/978-3-319-58634-2_42
intvolume: ' 10288'
language:
- iso: eng
page: 570-583
place: Cham
publication: 'Design, User Experience, and Usability: Theory, Methodology, and Management'
publication_identifier:
isbn:
- '9783319586335'
- '9783319586342'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: 'A Human-Centered Perspective on Software Quality: Acceptance Criteria for
Work 4.0'
type: book_chapter
user_id: '30457'
volume: 10288
year: '2017'
...
---
_id: '16461'
author:
- first_name: Pascal
full_name: Bemmann, Pascal
last_name: Bemmann
- first_name: Felix
full_name: Biermeier, Felix
last_name: Biermeier
- first_name: Jan
full_name: Bürmann, Jan
last_name: Bürmann
- first_name: Arne
full_name: Kemper, Arne
last_name: Kemper
- first_name: Till
full_name: Knollmann, Till
id: '39241'
last_name: Knollmann
orcid: 0000-0003-2014-4696
- first_name: Steffen
full_name: Knorr, Steffen
last_name: Knorr
- first_name: Nils
full_name: Kothe, Nils
last_name: Kothe
- first_name: Alexander
full_name: Mäcker, Alexander
id: '13536'
last_name: Mäcker
- first_name: Manuel
full_name: Malatyali, Manuel
id: '41265'
last_name: Malatyali
- first_name: Friedhelm
full_name: Meyer auf der Heide, Friedhelm
id: '15523'
last_name: Meyer auf der Heide
- first_name: Sören
full_name: Riechers, Sören
last_name: Riechers
- first_name: Johannes Sebastian
full_name: Schaefer, Johannes Sebastian
id: '30291'
last_name: Schaefer
- first_name: Jannik
full_name: Sundermeier, Jannik
id: '38705'
last_name: Sundermeier
citation:
ama: 'Bemmann P, Biermeier F, Bürmann J, et al. Monitoring of Domain-Related Problems
in Distributed Data Streams. In: Structural Information and Communication Complexity.
; 2017. doi:10.1007/978-3-319-72050-0_13'
apa: Bemmann, P., Biermeier, F., Bürmann, J., Kemper, A., Knollmann, T., Knorr,
S., Kothe, N., Mäcker, A., Malatyali, M., Meyer auf der Heide, F., Riechers, S.,
Schaefer, J. S., & Sundermeier, J. (2017). Monitoring of Domain-Related Problems
in Distributed Data Streams. In Structural Information and Communication Complexity.
https://doi.org/10.1007/978-3-319-72050-0_13
bibtex: '@inbook{Bemmann_Biermeier_Bürmann_Kemper_Knollmann_Knorr_Kothe_Mäcker_Malatyali_Meyer
auf der Heide_et al._2017, place={Cham}, title={Monitoring of Domain-Related Problems
in Distributed Data Streams}, DOI={10.1007/978-3-319-72050-0_13},
booktitle={Structural Information and Communication Complexity}, author={Bemmann,
Pascal and Biermeier, Felix and Bürmann, Jan and Kemper, Arne and Knollmann, Till
and Knorr, Steffen and Kothe, Nils and Mäcker, Alexander and Malatyali, Manuel
and Meyer auf der Heide, Friedhelm and et al.}, year={2017} }'
chicago: Bemmann, Pascal, Felix Biermeier, Jan Bürmann, Arne Kemper, Till Knollmann,
Steffen Knorr, Nils Kothe, et al. “Monitoring of Domain-Related Problems in Distributed
Data Streams.” In Structural Information and Communication Complexity.
Cham, 2017. https://doi.org/10.1007/978-3-319-72050-0_13.
ieee: P. Bemmann et al., “Monitoring of Domain-Related Problems in Distributed
Data Streams,” in Structural Information and Communication Complexity,
Cham, 2017.
mla: Bemmann, Pascal, et al. “Monitoring of Domain-Related Problems in Distributed
Data Streams.” Structural Information and Communication Complexity, 2017,
doi:10.1007/978-3-319-72050-0_13.
short: 'P. Bemmann, F. Biermeier, J. Bürmann, A. Kemper, T. Knollmann, S. Knorr,
N. Kothe, A. Mäcker, M. Malatyali, F. Meyer auf der Heide, S. Riechers, J.S. Schaefer,
J. Sundermeier, in: Structural Information and Communication Complexity, Cham,
2017.'
date_created: 2020-04-08T07:20:20Z
date_updated: 2022-01-06T06:52:50Z
department:
- _id: '63'
doi: 10.1007/978-3-319-72050-0_13
external_id:
arxiv:
- 'arXiv:1706.03568 '
language:
- iso: eng
place: Cham
publication: Structural Information and Communication Complexity
publication_identifier:
isbn:
- '9783319720494'
- '9783319720500'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Monitoring of Domain-Related Problems in Distributed Data Streams
type: book_chapter
user_id: '15415'
year: '2017'
...
---
_id: '14857'
author:
- first_name: Michaela
full_name: Beckschäfer, Michaela
id: '32439'
last_name: Beckschäfer
- first_name: Simon
full_name: Malberg, Simon
last_name: Malberg
- first_name: Kevin
full_name: Tierney, Kevin
last_name: Tierney
- first_name: Christoph
full_name: Weskamp, Christoph
last_name: Weskamp
citation:
ama: 'Beckschäfer M, Malberg S, Tierney K, Weskamp C. Simulating Storage Policies
for an Automated Grid-Based Warehouse System. In: Lecture Notes in Computer
Science. Cham; 2017. doi:10.1007/978-3-319-68496-3_31'
apa: Beckschäfer, M., Malberg, S., Tierney, K., & Weskamp, C. (2017). Simulating
Storage Policies for an Automated Grid-Based Warehouse System. In Lecture Notes
in Computer Science. Cham. https://doi.org/10.1007/978-3-319-68496-3_31
bibtex: '@inbook{Beckschäfer_Malberg_Tierney_Weskamp_2017, place={Cham}, title={Simulating
Storage Policies for an Automated Grid-Based Warehouse System}, DOI={10.1007/978-3-319-68496-3_31},
booktitle={Lecture Notes in Computer Science}, author={Beckschäfer, Michaela and
Malberg, Simon and Tierney, Kevin and Weskamp, Christoph}, year={2017} }'
chicago: Beckschäfer, Michaela, Simon Malberg, Kevin Tierney, and Christoph Weskamp.
“Simulating Storage Policies for an Automated Grid-Based Warehouse System.” In
Lecture Notes in Computer Science. Cham, 2017. https://doi.org/10.1007/978-3-319-68496-3_31.
ieee: M. Beckschäfer, S. Malberg, K. Tierney, and C. Weskamp, “Simulating Storage
Policies for an Automated Grid-Based Warehouse System,” in Lecture Notes in
Computer Science, Cham, 2017.
mla: Beckschäfer, Michaela, et al. “Simulating Storage Policies for an Automated
Grid-Based Warehouse System.” Lecture Notes in Computer Science, 2017,
doi:10.1007/978-3-319-68496-3_31.
short: 'M. Beckschäfer, S. Malberg, K. Tierney, C. Weskamp, in: Lecture Notes in
Computer Science, Cham, 2017.'
date_created: 2019-11-08T08:15:11Z
date_updated: 2022-01-06T06:52:08Z
department:
- _id: '277'
doi: 10.1007/978-3-319-68496-3_31
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
isbn:
- '9783319684956'
- '9783319684963'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Simulating Storage Policies for an Automated Grid-Based Warehouse System
type: book_chapter
user_id: '1112'
year: '2017'
...
---
_id: '20000'
author:
- first_name: Heiko
full_name: Hamann, Heiko
last_name: Hamann
- first_name: Gabriele
full_name: Valentini, Gabriele
last_name: Valentini
- first_name: Marco
full_name: Dorigo, Marco
last_name: Dorigo
citation:
ama: 'Hamann H, Valentini G, Dorigo M. Population Coding: A New Design Paradigm
for Embodied Distributed Systems. In: 10th Int. Conf. on Swarm Intelligence,
ANTS 2016. Cham; 2016. doi:10.1007/978-3-319-44427-7_15'
apa: 'Hamann, H., Valentini, G., & Dorigo, M. (2016). Population Coding: A New
Design Paradigm for Embodied Distributed Systems. In 10th Int. Conf. on Swarm
Intelligence, ANTS 2016. Cham. https://doi.org/10.1007/978-3-319-44427-7_15'
bibtex: '@inproceedings{Hamann_Valentini_Dorigo_2016, place={Cham}, title={Population
Coding: A New Design Paradigm for Embodied Distributed Systems}, DOI={10.1007/978-3-319-44427-7_15},
booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Hamann,
Heiko and Valentini, Gabriele and Dorigo, Marco}, year={2016} }'
chicago: 'Hamann, Heiko, Gabriele Valentini, and Marco Dorigo. “Population Coding:
A New Design Paradigm for Embodied Distributed Systems.” In 10th Int. Conf.
on Swarm Intelligence, ANTS 2016. Cham, 2016. https://doi.org/10.1007/978-3-319-44427-7_15.'
ieee: 'H. Hamann, G. Valentini, and M. Dorigo, “Population Coding: A New Design
Paradigm for Embodied Distributed Systems,” in 10th Int. Conf. on Swarm Intelligence,
ANTS 2016, 2016.'
mla: 'Hamann, Heiko, et al. “Population Coding: A New Design Paradigm for Embodied
Distributed Systems.” 10th Int. Conf. on Swarm Intelligence, ANTS 2016,
2016, doi:10.1007/978-3-319-44427-7_15.'
short: 'H. Hamann, G. Valentini, M. Dorigo, in: 10th Int. Conf. on Swarm Intelligence,
ANTS 2016, Cham, 2016.'
date_created: 2020-10-15T09:55:35Z
date_updated: 2022-01-06T06:54:18Z
department:
- _id: '63'
- _id: '238'
doi: 10.1007/978-3-319-44427-7_15
language:
- iso: eng
place: Cham
publication: 10th Int. Conf. on Swarm Intelligence, ANTS 2016
publication_identifier:
isbn:
- '9783319444260'
- '9783319444277'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: 'Population Coding: A New Design Paradigm for Embodied Distributed Systems'
type: conference
user_id: '15415'
year: '2016'
...
---
_id: '20004'
author:
- first_name: Gabriele
full_name: Valentini, Gabriele
last_name: Valentini
- first_name: Davide
full_name: Brambilla, Davide
last_name: Brambilla
- first_name: Heiko
full_name: Hamann, Heiko
last_name: Hamann
- first_name: Marco
full_name: Dorigo, Marco
last_name: Dorigo
citation:
ama: 'Valentini G, Brambilla D, Hamann H, Dorigo M. Collective Perception of Environmental
Features in a Robot Swarm. In: 10th Int. Conf. on Swarm Intelligence, ANTS
2016. ; 2016. doi:10.1007/978-3-319-44427-7_6'
apa: Valentini, G., Brambilla, D., Hamann, H., & Dorigo, M. (2016). Collective
Perception of Environmental Features in a Robot Swarm. In 10th Int. Conf. on
Swarm Intelligence, ANTS 2016. https://doi.org/10.1007/978-3-319-44427-7_6
bibtex: '@inproceedings{Valentini_Brambilla_Hamann_Dorigo_2016, title={Collective
Perception of Environmental Features in a Robot Swarm}, DOI={10.1007/978-3-319-44427-7_6},
booktitle={10th Int. Conf. on Swarm Intelligence, ANTS 2016}, author={Valentini,
Gabriele and Brambilla, Davide and Hamann, Heiko and Dorigo, Marco}, year={2016}
}'
chicago: Valentini, Gabriele, Davide Brambilla, Heiko Hamann, and Marco Dorigo.
“Collective Perception of Environmental Features in a Robot Swarm.” In 10th
Int. Conf. on Swarm Intelligence, ANTS 2016, 2016. https://doi.org/10.1007/978-3-319-44427-7_6.
ieee: G. Valentini, D. Brambilla, H. Hamann, and M. Dorigo, “Collective Perception
of Environmental Features in a Robot Swarm,” in 10th Int. Conf. on Swarm Intelligence,
ANTS 2016, 2016.
mla: Valentini, Gabriele, et al. “Collective Perception of Environmental Features
in a Robot Swarm.” 10th Int. Conf. on Swarm Intelligence, ANTS 2016, 2016,
doi:10.1007/978-3-319-44427-7_6.
short: 'G. Valentini, D. Brambilla, H. Hamann, M. Dorigo, in: 10th Int. Conf. on
Swarm Intelligence, ANTS 2016, 2016.'
date_created: 2020-10-15T10:22:20Z
date_updated: 2022-01-06T06:54:18Z
department:
- _id: '63'
- _id: '238'
doi: 10.1007/978-3-319-44427-7_6
language:
- iso: eng
publication: 10th Int. Conf. on Swarm Intelligence, ANTS 2016
publication_identifier:
isbn:
- '9783319444260'
- '9783319444277'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Collective Perception of Environmental Features in a Robot Swarm
type: conference
user_id: '15415'
year: '2016'
...
---
_id: '2948'
author:
- first_name: Peter
full_name: Günther, Peter
last_name: Günther
- first_name: Volker
full_name: Krummel, Volker
last_name: Krummel
citation:
ama: 'Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based
Smart Card Architectures. In: Mathematical Aspects of Computer and Information
Sciences. Cham: Springer International Publishing; 2016:151-165. doi:10.1007/978-3-319-32859-1_13'
apa: 'Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings
on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer
and Information Sciences (pp. 151–165). Cham: Springer International Publishing.
https://doi.org/10.1007/978-3-319-32859-1_13'
bibtex: '@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic
Pairings on Accumulator Based Smart Card Architectures}, DOI={10.1007/978-3-319-32859-1_13},
booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer
International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016},
pages={151–165} }'
chicago: 'Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings
on Accumulator Based Smart Card Architectures.” In Mathematical Aspects of
Computer and Information Sciences, 151–65. Cham: Springer International Publishing,
2016. https://doi.org/10.1007/978-3-319-32859-1_13.'
ieee: 'P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator
Based Smart Card Architectures,” in Mathematical Aspects of Computer and Information
Sciences, Cham: Springer International Publishing, 2016, pp. 151–165.'
mla: Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on
Accumulator Based Smart Card Architectures.” Mathematical Aspects of Computer
and Information Sciences, Springer International Publishing, 2016, pp. 151–65,
doi:10.1007/978-3-319-32859-1_13.
short: 'P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information
Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.'
date_created: 2018-05-29T11:26:56Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1007/978-3-319-32859-1_13
page: 151-165
place: Cham
project:
- _id: '43'
name: Securing the Financial Cloud
publication: Mathematical Aspects of Computer and Information Sciences
publication_identifier:
isbn:
- '9783319328584'
- '9783319328591'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2968'
author:
- first_name: Johannes
full_name: Blömer, Johannes
id: '23'
last_name: Blömer
- first_name: Christiane
full_name: Lammersen, Christiane
last_name: Lammersen
- first_name: Melanie
full_name: Schmidt, Melanie
last_name: Schmidt
- first_name: Christian
full_name: Sohler, Christian
last_name: Sohler
citation:
ama: 'Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means
Algorithm – A Survey. In: Algorithm Engineering. Cham: Springer International
Publishing; 2016:81-116. doi:10.1007/978-3-319-49487-6_3'
apa: 'Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical
Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering
(pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3'
bibtex: '@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical
Analysis of the k-Means Algorithm – A Survey}, DOI={10.1007/978-3-319-49487-6_3},
booktitle={Algorithm Engineering}, publisher={Springer International Publishing},
author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler,
Christian}, year={2016}, pages={81–116} }'
chicago: 'Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian
Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In Algorithm
Engineering, 81–116. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-49487-6_3.'
ieee: 'J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis
of the k-Means Algorithm – A Survey,” in Algorithm Engineering, Cham: Springer
International Publishing, 2016, pp. 81–116.'
mla: Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A
Survey.” Algorithm Engineering, Springer International Publishing, 2016,
pp. 81–116, doi:10.1007/978-3-319-49487-6_3.
short: 'J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering,
Springer International Publishing, Cham, 2016, pp. 81–116.'
date_created: 2018-06-04T12:22:40Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-49487-6_3
page: 81-116
place: Cham
publication: Algorithm Engineering
publication_identifier:
isbn:
- '9783319494869'
- '9783319494876'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Theoretical Analysis of the k-Means Algorithm – A Survey
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2970'
author:
- first_name: Johannes
full_name: Blömer, Johannes
id: '23'
last_name: Blömer
- first_name: Kathrin
full_name: Bujna, Kathrin
last_name: Bujna
citation:
ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances
in Knowledge Discovery and Data Mining. Cham: Springer International Publishing;
2016:296-308. doi:10.1007/978-3-319-31750-2_24'
apa: 'Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture
Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308).
Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24'
bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
Mixture Models}, DOI={10.1007/978-3-319-31750-2_24},
booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
pages={296–308} }'
chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham:
Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.'
ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
Advances in Knowledge Discovery and Data Mining, Cham: Springer International
Publishing, 2016, pp. 296–308.'
mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
Models.” Advances in Knowledge Discovery and Data Mining, Springer International
Publishing, 2016, pp. 296–308, doi:10.1007/978-3-319-31750-2_24.
short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-04T12:27:21Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
isbn:
- '9783319317496'
- '9783319317502'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '5825'
abstract:
- lang: eng
text: Integrating apps on mobile devices into applications running on other devices
is usually difficult. For instance, using a messenger on a smartphone to share
a text written on a desktop computer often ends up in a cumbersome solution to
transfer the text, because many applications are not designed for such scenarios.
In this paper, we present an approach enabling the integration of apps running
on Android devices into applications running on other devices and even other platforms.
This is achieved by specifying adapters for Android apps, which map their services
to a platform-independent service interface. For this purpose, we have developed
a domain-specific language to ease the specification of such mappings. Our approach
is applicable without the need to modify the existing Android apps providing the
service. We analyzed its feasibility by implementing our approach and by specifying
mappings for several popular Android apps, e.g., phone book, camera, and file
explorer.
author:
- first_name: Dennis
full_name: Wolters, Dennis
id: '11308'
last_name: Wolters
- first_name: Jonas
full_name: Kirchhoff, Jonas
id: '39928'
last_name: Kirchhoff
- first_name: Christian
full_name: Gerth, Christian
last_name: Gerth
- first_name: Gregor
full_name: Engels, Gregor
id: '107'
last_name: Engels
citation:
ama: 'Wolters D, Kirchhoff J, Gerth C, Engels G. Cross-Device Integration of Android
Apps. In: Sheng QZ, Stroulia E, Tata S, Bhiri S, eds. Service-Oriented Computing.
Cham: Springer International Publishing; 2016:171-185. doi:10.1007/978-3-319-46295-0_11'
apa: 'Wolters, D., Kirchhoff, J., Gerth, C., & Engels, G. (2016). Cross-Device
Integration of Android Apps. In Q. Z. Sheng, E. Stroulia, S. Tata, & S. Bhiri
(Eds.), Service-Oriented Computing (pp. 171–185). Cham: Springer International
Publishing. https://doi.org/10.1007/978-3-319-46295-0_11'
bibtex: '@inproceedings{Wolters_Kirchhoff_Gerth_Engels_2016, place={Cham}, title={Cross-Device
Integration of Android Apps}, DOI={10.1007/978-3-319-46295-0_11},
booktitle={Service-Oriented Computing}, publisher={Springer International Publishing},
author={Wolters, Dennis and Kirchhoff, Jonas and Gerth, Christian and Engels,
Gregor}, editor={Sheng, Quan Z. and Stroulia, Eleni and Tata, Samir and Bhiri,
Sami Editors}, year={2016}, pages={171–185} }'
chicago: 'Wolters, Dennis, Jonas Kirchhoff, Christian Gerth, and Gregor Engels.
“Cross-Device Integration of Android Apps.” In Service-Oriented Computing,
edited by Quan Z. Sheng, Eleni Stroulia, Samir Tata, and Sami Bhiri, 171–85.
Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-46295-0_11.'
ieee: D. Wolters, J. Kirchhoff, C. Gerth, and G. Engels, “Cross-Device Integration
of Android Apps,” in Service-Oriented Computing, 2016, pp. 171–185.
mla: Wolters, Dennis, et al. “Cross-Device Integration of Android Apps.” Service-Oriented
Computing, edited by Quan Z. Sheng et al., Springer International Publishing,
2016, pp. 171–85, doi:10.1007/978-3-319-46295-0_11.
short: 'D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia,
S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing,
Cham, 2016, pp. 171–185.'
date_created: 2018-11-26T10:21:38Z
date_updated: 2022-01-06T07:02:43Z
department:
- _id: '66'
doi: 10.1007/978-3-319-46295-0_11
editor:
- first_name: 'Quan Z. '
full_name: 'Sheng, Quan Z. '
last_name: Sheng
- first_name: 'Eleni '
full_name: 'Stroulia, Eleni '
last_name: Stroulia
- first_name: 'Samir '
full_name: 'Tata, Samir '
last_name: Tata
- first_name: 'Sami '
full_name: 'Bhiri, Sami '
last_name: Bhiri
keyword:
- Cross-Device
- Integration
- Android
- Adapter
- DSL
language:
- iso: eng
page: 171-185
place: Cham
publication: Service-Oriented Computing
publication_identifier:
isbn:
- '9783319462943'
- '9783319462950'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Cross-Device Integration of Android Apps
type: conference
user_id: '39928'
year: '2016'
...
---
_id: '6257'
author:
- first_name: Holger Gerhard
full_name: Fischer, Holger Gerhard
id: '30457'
last_name: Fischer
- first_name: Björn
full_name: Senft, Björn
id: '9109'
last_name: Senft
citation:
ama: 'Fischer HG, Senft B. Human-Centered Software Engineering as a Chance to Ensure
Software Quality Within the Digitization of Human Workflows. In: Bogdan C, ed.
Human-Centered and Error-Resilient Systems Development. Vol 9856. Lecture
Notes in Computer Science. Cham: Springer International Publishing; 2016:30-41.
doi:10.1007/978-3-319-44902-9_3'
apa: 'Fischer, H. G., & Senft, B. (2016). Human-Centered Software Engineering
as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.
In C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development
(Vol. 9856, pp. 30–41). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-44902-9_3'
bibtex: '@inbook{Fischer_Senft_2016, place={Cham}, series={Lecture Notes in Computer
Science}, title={Human-Centered Software Engineering as a Chance to Ensure Software
Quality Within the Digitization of Human Workflows}, volume={9856}, DOI={10.1007/978-3-319-44902-9_3},
booktitle={Human-Centered and Error-Resilient Systems Development}, publisher={Springer
International Publishing}, author={Fischer, Holger Gerhard and Senft, Björn},
editor={Bogdan, ChristianEditor}, year={2016}, pages={30–41}, collection={Lecture
Notes in Computer Science} }'
chicago: 'Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering
as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.”
In Human-Centered and Error-Resilient Systems Development, edited by Christian
Bogdan, 9856:30–41. Lecture Notes in Computer Science. Cham: Springer International
Publishing, 2016. https://doi.org/10.1007/978-3-319-44902-9_3.'
ieee: 'H. G. Fischer and B. Senft, “Human-Centered Software Engineering as a Chance
to Ensure Software Quality Within the Digitization of Human Workflows,” in Human-Centered
and Error-Resilient Systems Development, vol. 9856, C. Bogdan, Ed. Cham: Springer
International Publishing, 2016, pp. 30–41.'
mla: Fischer, Holger Gerhard, and Björn Senft. “Human-Centered Software Engineering
as a Chance to Ensure Software Quality Within the Digitization of Human Workflows.”
Human-Centered and Error-Resilient Systems Development, edited by Christian
Bogdan, vol. 9856, Springer International Publishing, 2016, pp. 30–41, doi:10.1007/978-3-319-44902-9_3.
short: 'H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient
Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41.'
conference:
end_date: 2016-08-31
location: Stockholm, Sweden
name: International Conference on Human-Centred Software Engineering
start_date: 2016-08-29
date_created: 2018-12-18T10:51:10Z
date_updated: 2022-01-06T07:02:58Z
department:
- _id: '66'
- _id: '534'
- _id: '221'
doi: 10.1007/978-3-319-44902-9_3
editor:
- first_name: Christian
full_name: Bogdan, Christian
last_name: Bogdan
intvolume: ' 9856'
language:
- iso: eng
page: 30-41
place: Cham
publication: Human-Centered and Error-Resilient Systems Development
publication_identifier:
isbn:
- '9783319449012'
- '9783319449029'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Human-Centered Software Engineering as a Chance to Ensure Software Quality
Within the Digitization of Human Workflows
type: book_chapter
user_id: '30457'
volume: 9856
year: '2016'
...
---
_id: '2978'
author:
- first_name: Johannes
full_name: Blömer, Johannes
id: '23'
last_name: Blömer
- first_name: Kathrin
full_name: Bujna, Kathrin
last_name: Bujna
citation:
ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances
in Knowledge Discovery and Data Mining. Springer International Publishing;
2016:296-308. doi:10.1007/978-3-319-31750-2_24'
apa: Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models.
In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Springer
International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
Mixture Models}, DOI={10.1007/978-3-319-31750-2_24},
booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
pages={296–308} }'
chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham:
Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.'
ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
Advances in Knowledge Discovery and Data Mining, Cham: Springer International
Publishing, 2016, pp. 296–308.'
mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
Models.” Advances in Knowledge Discovery and Data Mining, Springer International
Publishing, 2016, pp. 296–308, doi:10.1007/978-3-319-31750-2_24.
short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-05T07:31:39Z
date_updated: 2023-01-10T13:49:50Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
isbn:
- '9783319317496'
- '9783319317502'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2921'
author:
- first_name: Olivier
full_name: Blazy, Olivier
last_name: Blazy
- first_name: Saqib
full_name: Kakvi, Saqib
id: '66268'
last_name: Kakvi
- first_name: Eike
full_name: Kiltz, Eike
last_name: Kiltz
- first_name: Jiaxin
full_name: Pan, Jiaxin
last_name: Pan
citation:
ama: 'Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon
Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg:
Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12'
apa: 'Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures
from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp.
256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12'
bibtex: '@inbook{Blazy_Kakvi_Kiltz_Pan_2015, place={Berlin, Heidelberg}, title={Tightly-Secure
Signatures from Chameleon Hash Functions}, DOI={10.1007/978-3-662-46447-2_12},
booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg},
author={Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}, year={2015},
pages={256–279} }'
chicago: 'Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure
Signatures from Chameleon Hash Functions.” In Lecture Notes in Computer Science,
256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. https://doi.org/10.1007/978-3-662-46447-2_12.'
ieee: 'O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from
Chameleon Hash Functions,” in Lecture Notes in Computer Science, Berlin,
Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.'
mla: Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.”
Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2015, pp.
256–79, doi:10.1007/978-3-662-46447-2_12.
short: 'O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science,
Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.'
date_created: 2018-05-25T12:46:08Z
date_updated: 2022-01-06T06:58:47Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_12
extern: '1'
main_file_link:
- open_access: '1'
url: https://eprint.iacr.org/2014/1021.pdf
oa: '1'
page: 256-279
place: Berlin, Heidelberg
publication: Lecture Notes in Computer Science
publication_identifier:
isbn:
- '9783662464465'
- '9783662464472'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer Berlin Heidelberg
status: public
title: Tightly-Secure Signatures from Chameleon Hash Functions
type: book_chapter
user_id: '66268'
year: '2015'
...
---
_id: '15897'
author:
- first_name: Christian
full_name: Altmeier, Christian
last_name: Altmeier
- first_name: Christian
full_name: Mainka, Christian
last_name: Mainka
- first_name: Juraj
full_name: Somorovsky, Juraj
id: '83504'
last_name: Somorovsky
orcid: 0000-0002-3593-7720
- first_name: Jörg
full_name: Schwenk, Jörg
last_name: Schwenk
citation:
ama: 'Altmeier C, Mainka C, Somorovsky J, Schwenk J. AdIDoS – Adaptive and Intelligent
Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services. In:
Data Privacy Management, and Security Assurance - 10th International Workshop,
{DPM} 2015, and 4th International Workshop, {QASA} 2015. Lecture Notes in
Computer Science 9481. Cham; 2015. doi:10.1007/978-3-319-29883-2_5'
apa: Altmeier, C., Mainka, C., Somorovsky, J., & Schwenk, J. (2015). AdIDoS
– Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses
in Web Services. In Data Privacy Management, and Security Assurance - 10th
International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015.
Cham. https://doi.org/10.1007/978-3-319-29883-2_5
bibtex: '@inbook{Altmeier_Mainka_Somorovsky_Schwenk_2015, place={Cham}, series={Lecture
Notes in Computer Science 9481}, title={AdIDoS – Adaptive and Intelligent Fully-Automatic
Detection of Denial-of-Service Weaknesses in Web Services}, DOI={10.1007/978-3-319-29883-2_5},
booktitle={Data Privacy Management, and Security Assurance - 10th International
Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015}, author={Altmeier,
Christian and Mainka, Christian and Somorovsky, Juraj and Schwenk, Jörg}, year={2015},
collection={Lecture Notes in Computer Science 9481} }'
chicago: Altmeier, Christian, Christian Mainka, Juraj Somorovsky, and Jörg Schwenk.
“AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service
Weaknesses in Web Services.” In Data Privacy Management, and Security Assurance
- 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA}
2015. Lecture Notes in Computer Science 9481. Cham, 2015. https://doi.org/10.1007/978-3-319-29883-2_5.
ieee: C. Altmeier, C. Mainka, J. Somorovsky, and J. Schwenk, “AdIDoS – Adaptive
and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web
Services,” in Data Privacy Management, and Security Assurance - 10th International
Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Cham, 2015.
mla: Altmeier, Christian, et al. “AdIDoS – Adaptive and Intelligent Fully-Automatic
Detection of Denial-of-Service Weaknesses in Web Services.” Data Privacy Management,
and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International
Workshop, {QASA} 2015, 2015, doi:10.1007/978-3-319-29883-2_5.
short: 'C. Altmeier, C. Mainka, J. Somorovsky, J. Schwenk, in: Data Privacy Management,
and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International
Workshop, {QASA} 2015, Cham, 2015.'
conference:
location: Vienna
date_created: 2020-02-15T09:40:09Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1007/978-3-319-29883-2_5
language:
- iso: eng
place: Cham
publication: Data Privacy Management, and Security Assurance - 10th International
Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015
publication_identifier:
isbn:
- '9783319298825'
- '9783319298832'
issn:
- 0302-9743
- 1611-3349
publication_status: published
series_title: Lecture Notes in Computer Science 9481
status: public
title: AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service
Weaknesses in Web Services
type: book_chapter
user_id: '83504'
year: '2015'
...
---
_id: '15899'
author:
- first_name: Tibor
full_name: Jager, Tibor
last_name: Jager
- first_name: Jörg
full_name: Schwenk, Jörg
last_name: Schwenk
- first_name: Juraj
full_name: Somorovsky, Juraj
id: '83504'
last_name: Somorovsky
orcid: 0000-0002-3593-7720
citation:
ama: 'Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH.
In: Computer Security -- ESORICS 2015. Cham; 2015. doi:10.1007/978-3-319-24174-6_21'
apa: Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve
Attacks on TLS-ECDH. In Computer Security -- ESORICS 2015. Cham. https://doi.org/10.1007/978-3-319-24174-6_21
bibtex: '@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid
Curve Attacks on TLS-ECDH}, DOI={10.1007/978-3-319-24174-6_21},
booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk,
Jörg and Somorovsky, Juraj}, year={2015} }'
chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve
Attacks on TLS-ECDH.” In Computer Security -- ESORICS 2015. Cham, 2015.
https://doi.org/10.1007/978-3-319-24174-6_21.
ieee: T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks
on TLS-ECDH,” in Computer Security -- ESORICS 2015, Cham, 2015.
mla: Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer
Security -- ESORICS 2015, 2015, doi:10.1007/978-3-319-24174-6_21.
short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015,
Cham, 2015.'
date_created: 2020-02-15T09:41:17Z
date_updated: 2022-01-06T06:52:39Z
doi: 10.1007/978-3-319-24174-6_21
extern: '1'
language:
- iso: eng
main_file_link:
- url: https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/
place: Cham
publication: Computer Security -- ESORICS 2015
publication_identifier:
isbn:
- '9783319241739'
- '9783319241746'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Practical Invalid Curve Attacks on TLS-ECDH
type: book_chapter
user_id: '83504'
year: '2015'
...
---
_id: '15088'
author:
- first_name: Stefan
full_name: Böttcher, Stefan
id: '624'
last_name: Böttcher
- first_name: Rita
full_name: Hartel, Rita
id: '14961'
last_name: Hartel
- first_name: Thomas
full_name: Jacobs, Thomas
last_name: Jacobs
- first_name: Markus
full_name: Jeromin, Markus
last_name: Jeromin
citation:
ama: 'Böttcher S, Hartel R, Jacobs T, Jeromin M. ECST – Extended Context-Free Straight-Line
Tree Grammars. In: Data Science - 30th British International Conference on
Databases, BICOD 2015. Springer; 2015:186-198. doi:10.1007/978-3-319-20424-6_18'
apa: Böttcher, S., Hartel, R., Jacobs, T., & Jeromin, M. (2015). ECST – Extended
Context-Free Straight-Line Tree Grammars. In Data Science - 30th British International
Conference on Databases, BICOD 2015 (pp. 186–198). Springer. https://doi.org/10.1007/978-3-319-20424-6_18
bibtex: '@inproceedings{Böttcher_Hartel_Jacobs_Jeromin_2015, title={ECST – Extended
Context-Free Straight-Line Tree Grammars}, DOI={10.1007/978-3-319-20424-6_18},
booktitle={Data Science - 30th British International Conference on Databases,
BICOD 2015}, publisher={Springer}, author={Böttcher, Stefan and Hartel, Rita and
Jacobs, Thomas and Jeromin, Markus}, year={2015}, pages={186–198} }'
chicago: Böttcher, Stefan, Rita Hartel, Thomas Jacobs, and Markus Jeromin. “ECST
– Extended Context-Free Straight-Line Tree Grammars.” In Data Science - 30th
British International Conference on Databases, BICOD 2015, 186–98. Springer,
2015. https://doi.org/10.1007/978-3-319-20424-6_18.
ieee: S. Böttcher, R. Hartel, T. Jacobs, and M. Jeromin, “ECST – Extended Context-Free
Straight-Line Tree Grammars,” in Data Science - 30th British International
Conference on Databases, BICOD 2015, 2015, pp. 186–198.
mla: Böttcher, Stefan, et al. “ECST – Extended Context-Free Straight-Line Tree Grammars.”
Data Science - 30th British International Conference on Databases, BICOD 2015,
Springer, 2015, pp. 186–98, doi:10.1007/978-3-319-20424-6_18.
short: 'S. Böttcher, R. Hartel, T. Jacobs, M. Jeromin, in: Data Science - 30th British
International Conference on Databases, BICOD 2015, Springer, 2015, pp. 186–198.'
date_created: 2019-11-21T15:08:13Z
date_updated: 2022-01-06T06:52:15Z
department:
- _id: '69'
doi: 10.1007/978-3-319-20424-6_18
language:
- iso: eng
page: 186-198
publication: Data Science - 30th British International Conference on Databases, BICOD
2015
publication_identifier:
isbn:
- '9783319204239'
- '9783319204246'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer
status: public
title: ECST – Extended Context-Free Straight-Line Tree Grammars
type: conference
user_id: '14961'
year: '2015'
...
---
_id: '25338'
author:
- first_name: Michaela
full_name: Geierhos, Michaela
last_name: Geierhos
- first_name: Frederik S.
full_name: Bäumer, Frederik S.
last_name: Bäumer
- first_name: Sabine
full_name: Schulze, Sabine
last_name: Schulze
- first_name: Caterina
full_name: Klotz, Caterina
last_name: Klotz
citation:
ama: 'Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0.
In: Modeling and Using Context. ; 2015. doi:10.1007/978-3-319-25591-0_12'
apa: Geierhos, M., Bäumer, F. S., Schulze, S., & Klotz, C. (2015). Understanding
the Patient 2.0. In Modeling and Using Context. https://doi.org/10.1007/978-3-319-25591-0_12
bibtex: '@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding
the Patient 2.0}, DOI={10.1007/978-3-319-25591-0_12},
booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer,
Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }'
chicago: Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz.
“Understanding the Patient 2.0.” In Modeling and Using Context. Cham, 2015.
https://doi.org/10.1007/978-3-319-25591-0_12.
ieee: M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient
2.0,” in Modeling and Using Context, Cham, 2015.
mla: Geierhos, Michaela, et al. “Understanding the Patient 2.0.” Modeling and
Using Context, 2015, doi:10.1007/978-3-319-25591-0_12.
short: 'M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context,
Cham, 2015.'
date_created: 2021-10-04T19:02:33Z
date_updated: 2022-01-25T18:21:15Z
doi: 10.1007/978-3-319-25591-0_12
place: Cham
publication: Modeling and Using Context
publication_identifier:
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Understanding the Patient 2.0
type: book_chapter
user_id: '71124'
year: '2015'
...
---
_id: '25337'
author:
- first_name: Michaela
full_name: Geierhos, Michaela
last_name: Geierhos
- first_name: Frederik S.
full_name: Bäumer, Frederik S.
last_name: Bäumer
- first_name: Sabine
full_name: Schulze, Sabine
last_name: Schulze
- first_name: Caterina
full_name: Klotz, Caterina
last_name: Klotz
citation:
ama: 'Geierhos M, Bäumer FS, Schulze S, Klotz C. Understanding the Patient 2.0.
In: Modeling and Using Context. ; 2015. doi:10.1007/978-3-319-25591-0_12'
apa: Geierhos, M., Bäumer, F. S., Schulze, S., & Klotz, C. (2015). Understanding
the Patient 2.0. In Modeling and Using Context. https://doi.org/10.1007/978-3-319-25591-0_12
bibtex: '@inbook{Geierhos_Bäumer_Schulze_Klotz_2015, place={Cham}, title={Understanding
the Patient 2.0}, DOI={10.1007/978-3-319-25591-0_12},
booktitle={Modeling and Using Context}, author={Geierhos, Michaela and Bäumer,
Frederik S. and Schulze, Sabine and Klotz, Caterina}, year={2015} }'
chicago: Geierhos, Michaela, Frederik S. Bäumer, Sabine Schulze, and Caterina Klotz.
“Understanding the Patient 2.0.” In Modeling and Using Context. Cham, 2015.
https://doi.org/10.1007/978-3-319-25591-0_12.
ieee: M. Geierhos, F. S. Bäumer, S. Schulze, and C. Klotz, “Understanding the Patient
2.0,” in Modeling and Using Context, Cham, 2015.
mla: Geierhos, Michaela, et al. “Understanding the Patient 2.0.” Modeling and
Using Context, 2015, doi:10.1007/978-3-319-25591-0_12.
short: 'M. Geierhos, F.S. Bäumer, S. Schulze, C. Klotz, in: Modeling and Using Context,
Cham, 2015.'
date_created: 2021-10-04T18:59:54Z
date_updated: 2022-01-25T18:21:13Z
doi: 10.1007/978-3-319-25591-0_12
place: Cham
publication: Modeling and Using Context
publication_identifier:
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Understanding the Patient 2.0
type: book_chapter
user_id: '71124'
year: '2015'
...
---
_id: '20008'
author:
- first_name: Heiko
full_name: Hamann, Heiko
last_name: Hamann
- first_name: Gabriele
full_name: Valentini, Gabriele
last_name: Valentini
citation:
ama: 'Hamann H, Valentini G. Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing
Temporary Lock-ins. In: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014).
Cham; 2014. doi:10.1007/978-3-319-09952-1_15'
apa: 'Hamann, H., & Valentini, G. (2014). Swarm in a Fly Bottle: Feedback-Based
Analysis of Self-organizing Temporary Lock-ins. In Ninth Int. Conf. on Swarm
Intelligence (ANTS 2014). Cham. https://doi.org/10.1007/978-3-319-09952-1_15'
bibtex: '@inproceedings{Hamann_Valentini_2014, place={Cham}, title={Swarm in a Fly
Bottle: Feedback-Based Analysis of Self-organizing Temporary Lock-ins}, DOI={10.1007/978-3-319-09952-1_15},
booktitle={Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)}, author={Hamann,
Heiko and Valentini, Gabriele}, year={2014} }'
chicago: 'Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based
Analysis of Self-Organizing Temporary Lock-Ins.” In Ninth Int. Conf. on Swarm
Intelligence (ANTS 2014). Cham, 2014. https://doi.org/10.1007/978-3-319-09952-1_15.'
ieee: 'H. Hamann and G. Valentini, “Swarm in a Fly Bottle: Feedback-Based Analysis
of Self-organizing Temporary Lock-ins,” in Ninth Int. Conf. on Swarm Intelligence
(ANTS 2014), 2014.'
mla: 'Hamann, Heiko, and Gabriele Valentini. “Swarm in a Fly Bottle: Feedback-Based
Analysis of Self-Organizing Temporary Lock-Ins.” Ninth Int. Conf. on Swarm
Intelligence (ANTS 2014), 2014, doi:10.1007/978-3-319-09952-1_15.'
short: 'H. Hamann, G. Valentini, in: Ninth Int. Conf. on Swarm Intelligence (ANTS
2014), Cham, 2014.'
date_created: 2020-10-15T14:13:51Z
date_updated: 2022-01-06T06:54:18Z
department:
- _id: '63'
- _id: '238'
doi: 10.1007/978-3-319-09952-1_15
language:
- iso: eng
place: Cham
publication: Ninth Int. Conf. on Swarm Intelligence (ANTS 2014)
publication_identifier:
isbn:
- '9783319099514'
- '9783319099521'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: 'Swarm in a Fly Bottle: Feedback-Based Analysis of Self-organizing Temporary
Lock-ins'
type: conference
user_id: '15415'
year: '2014'
...
---
_id: '20982'
abstract:
- lang: eng
text: "Real-time software-intensive embedded systems complexity, as in the automotive
domain, requires rigorous Requirements Engineering (RE) approaches. Scenario-based
RE formalisms like Modal Sequence Diagrams (MSDs) enable an intuitive specication
and the simulative validation of functional requirements. However, the dependencies
between events occurring in different MSD scenarios are implicit so that it is
difficult to find causes of requirements defects, if any. The automotive architecture
description language EAST-ADL addresses this problem by relying on event chains,
which make dependencies between events explicit. However, EAST-ADL event chains
have a low abstraction level, and their relationship to functional requirements
has seldom been investigated. Based on the EAST-ADL functional architecture, we
propose to use its central notion of event to conciliate both approaches. We conceived
an automatic transformation from the high abstraction level requirements specified
in MSDs to the low abstraction level event chains.\r\n"
author:
- first_name: Thorsten
full_name: Koch, Thorsten
id: '13616'
last_name: Koch
- first_name: Jörg
full_name: Holtmann, Jörg
id: '3875'
last_name: Holtmann
orcid: 0000-0001-6141-4571
- first_name: Julien
full_name: DeAntoni, Julien
last_name: DeAntoni
citation:
ama: 'Koch T, Holtmann J, DeAntoni J. Generating EAST-ADL Event Chains from Scenario-Based
Requirements Specifications. In: Software Architecture. Cham; 2014. doi:10.1007/978-3-319-09970-5_14'
apa: Koch, T., Holtmann, J., & DeAntoni, J. (2014). Generating EAST-ADL Event
Chains from Scenario-Based Requirements Specifications. In Software Architecture.
Cham. https://doi.org/10.1007/978-3-319-09970-5_14
bibtex: '@inbook{Koch_Holtmann_DeAntoni_2014, place={Cham}, title={Generating EAST-ADL
Event Chains from Scenario-Based Requirements Specifications}, DOI={10.1007/978-3-319-09970-5_14},
booktitle={Software Architecture}, author={Koch, Thorsten and Holtmann, Jörg and
DeAntoni, Julien}, year={2014} }'
chicago: Koch, Thorsten, Jörg Holtmann, and Julien DeAntoni. “Generating EAST-ADL
Event Chains from Scenario-Based Requirements Specifications.” In Software
Architecture. Cham, 2014. https://doi.org/10.1007/978-3-319-09970-5_14.
ieee: T. Koch, J. Holtmann, and J. DeAntoni, “Generating EAST-ADL Event Chains from
Scenario-Based Requirements Specifications,” in Software Architecture,
Cham, 2014.
mla: Koch, Thorsten, et al. “Generating EAST-ADL Event Chains from Scenario-Based
Requirements Specifications.” Software Architecture, 2014, doi:10.1007/978-3-319-09970-5_14.
short: 'T. Koch, J. Holtmann, J. DeAntoni, in: Software Architecture, Cham, 2014.'
date_created: 2021-01-13T13:34:35Z
date_updated: 2022-01-06T06:54:42Z
department:
- _id: '241'
- _id: '662'
doi: 10.1007/978-3-319-09970-5_14
language:
- iso: eng
place: Cham
publication: Software Architecture
publication_identifier:
isbn:
- '9783319099699'
- '9783319099705'
issn:
- 0302-9743
- 1611-3349
publication_status: published
status: public
title: Generating EAST-ADL Event Chains from Scenario-Based Requirements Specifications
type: book_chapter
user_id: '13616'
year: '2014'
...
---
_id: '6741'
author:
- first_name: Dennis
full_name: Bokermann, Dennis
id: '11308'
last_name: Bokermann
- first_name: Christian
full_name: Gerth, Christian
last_name: Gerth
- first_name: Gregor
full_name: Engels, Gregor
id: '107'
last_name: Engels
citation:
ama: 'Bokermann D, Gerth C, Engels G. Use Your Best Device! Enabling Device Changes
at Runtime. In: 12th International Conference on Business Process Management
(BPM 2014). Vol 8659. Lecture Notes in Computer Science. Springer International
Publishing; 2014:357-365. doi:10.1007/978-3-319-10172-9_23'
apa: Bokermann, D., Gerth, C., & Engels, G. (2014). Use Your Best Device! Enabling
Device Changes at Runtime. In 12th International Conference on Business Process
Management (BPM 2014) (Vol. 8659, pp. 357–365). Springer International Publishing.
https://doi.org/10.1007/978-3-319-10172-9_23
bibtex: '@inproceedings{Bokermann_Gerth_Engels_2014, series={Lecture Notes in Computer
Science}, title={Use Your Best Device! Enabling Device Changes at Runtime}, volume={8659},
DOI={10.1007/978-3-319-10172-9_23},
booktitle={12th International Conference on Business Process Management (BPM 2014)},
publisher={Springer International Publishing}, author={Bokermann, Dennis and Gerth,
Christian and Engels, Gregor}, year={2014}, pages={357–365}, collection={Lecture
Notes in Computer Science} }'
chicago: Bokermann, Dennis, Christian Gerth, and Gregor Engels. “Use Your Best Device!
Enabling Device Changes at Runtime.” In 12th International Conference on Business
Process Management (BPM 2014), 8659:357–65. Lecture Notes in Computer Science.
Springer International Publishing, 2014. https://doi.org/10.1007/978-3-319-10172-9_23.
ieee: D. Bokermann, C. Gerth, and G. Engels, “Use Your Best Device! Enabling Device
Changes at Runtime,” in 12th International Conference on Business Process Management
(BPM 2014), 2014, vol. 8659, pp. 357–365.
mla: Bokermann, Dennis, et al. “Use Your Best Device! Enabling Device Changes at
Runtime.” 12th International Conference on Business Process Management (BPM
2014), vol. 8659, Springer International Publishing, 2014, pp. 357–65, doi:10.1007/978-3-319-10172-9_23.
short: 'D. Bokermann, C. Gerth, G. Engels, in: 12th International Conference on
Business Process Management (BPM 2014), Springer International Publishing, 2014,
pp. 357–365.'
date_created: 2019-01-15T14:49:31Z
date_updated: 2022-01-06T07:03:17Z
department:
- _id: '66'
doi: 10.1007/978-3-319-10172-9_23
intvolume: ' 8659'
language:
- iso: eng
page: 357-365
publication: 12th International Conference on Business Process Management (BPM 2014)
publication_identifier:
isbn:
- '9783319101712'
- '9783319101729'
issn:
- 0302-9743
- 1611-3349
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Use Your Best Device! Enabling Device Changes at Runtime
type: conference
user_id: '11308'
volume: 8659
year: '2014'
...