[{"date_created":"2020-08-06T15:23:11Z","publication":"Future Generation Computer Systems","language":[{"iso":"eng"}],"publication_identifier":{"issn":["0167-739X"]},"type":"journal_article","year":"2018","status":"public","_id":"17666","date_updated":"2022-01-06T06:53:16Z","title":"Measuring the efficiency of SDN mitigations against attacks on computer infrastructures","extern":"1","author":[{"last_name":"Koning","full_name":"Koning, R.","first_name":"R."},{"last_name":"de Graaff","full_name":"de Graaff, B.","first_name":"B."},{"first_name":"Gleb","full_name":"Polevoy, Gleb","last_name":"Polevoy","id":"83983"},{"last_name":"Meijer","first_name":"R.","full_name":"Meijer, R."},{"last_name":"de Laat","first_name":"C.","full_name":"de Laat, C."},{"last_name":"Grosso","full_name":"Grosso, P.","first_name":"P."}],"doi":"https://doi.org/10.1016/j.future.2018.08.011","abstract":[{"lang":"eng","text":"Software Defined Networks (SDN) and Network Function Virtualisation (NFV) provide the basis for autonomous response and mitigation against attacks on networked computer infrastructures. We propose a new framework that uses SDNs and NFV to achieve this goal: Secure Autonomous Response Network (SARNET). In a SARNET, an agent running a control loop constantly assesses the security state of the network by means of observables. The agent reacts to and resolves security problems, while learning from its previous decisions. Two main metrics govern the decision process in a SARNET: impact and efficiency; these metrics can be used to compare and evaluate countermeasures and are the building blocks for self-learning SARNETs that exhibit autonomous response. In this paper we present the software implementation of the SARNET framework, evaluate it in a real-life network and discuss the tradeoffs between parameters used by the SARNET agent and the efficiency of its actions."}],"citation":{"chicago":"Koning, R., B. de Graaff, Gleb Polevoy, R. Meijer, C. de Laat, and P. Grosso. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” <i>Future Generation Computer Systems</i>, 2018. <a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>.","ieee":"R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, and P. Grosso, “Measuring the efficiency of SDN mitigations against attacks on computer infrastructures,” <i>Future Generation Computer Systems</i>, 2018.","ama":"Koning R, de Graaff B, Polevoy G, Meijer R, de Laat C, Grosso P. Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. <i>Future Generation Computer Systems</i>. 2018. doi:<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>","apa":"Koning, R., de Graaff, B., Polevoy, G., Meijer, R., de Laat, C., &#38; Grosso, P. (2018). Measuring the efficiency of SDN mitigations against attacks on computer infrastructures. <i>Future Generation Computer Systems</i>. <a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>","short":"R. Koning, B. de Graaff, G. Polevoy, R. Meijer, C. de Laat, P. Grosso, Future Generation Computer Systems (2018).","mla":"Koning, R., et al. “Measuring the Efficiency of SDN Mitigations against Attacks on Computer Infrastructures.” <i>Future Generation Computer Systems</i>, 2018, doi:<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>.","bibtex":"@article{Koning_de Graaff_Polevoy_Meijer_de Laat_Grosso_2018, title={Measuring the efficiency of SDN mitigations against attacks on computer infrastructures}, DOI={<a href=\"https://doi.org/10.1016/j.future.2018.08.011\">https://doi.org/10.1016/j.future.2018.08.011</a>}, journal={Future Generation Computer Systems}, author={Koning, R. and de Graaff, B. and Polevoy, Gleb and Meijer, R. and de Laat, C. and Grosso, P.}, year={2018} }"},"keyword":["Software defined networks","Network function virtualization","Cyber attacks","Cyber security","Defense efficiency","Overlay networks"],"user_id":"83983","department":[{"_id":"63"},{"_id":"541"}]},{"project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"doi":"10.1007/978-3-319-91947-8_53","has_accepted_license":"1","abstract":[{"text":"The vision of On-The-Fly Computing is an automatic composition\r\nof existing software services. Based on natural language software\r\ndescriptions, end users will receive compositions tailored to their needs.\r\nFor this reason, the quality of the initial software service description\r\nstrongly determines whether a software composition really meets the expectations\r\nof end users. In this paper, we expose open NLP challenges\r\nneeded to be faced for service composition in On-The-Fly Computing.","lang":"eng"}],"title":"How to Deal with Inaccurate Service Descriptions in On-The-Fly Computing: Open Challenges","file":[{"date_created":"2018-11-02T16:12:26Z","access_level":"closed","file_id":"5326","content_type":"application/pdf","file_name":"Bäumer-Geierhos2018_Chapter_HowToDealWithInaccurateService.pdf","file_size":327508,"creator":"ups","success":1,"date_updated":"2018-11-02T16:12:26Z","relation":"main_file"}],"user_id":"477","keyword":["Requirements Extraction","Temporal Reordering of Software Functions","Inaccuracy Compensation"],"type":"book_chapter","ddc":["000"],"quality_controlled":"1","publication":"Proceedings of the 23rd International Conference on Natural Language and Information Systems","page":"509-513","volume":10859,"place":"Cham, Switzerland","intvolume":"     10859","conference":{"location":"Paris, France","start_date":"2018-06-13","name":"23rd International Conference on Natural Language and Information Systems","end_date":"2018-06-18"},"author":[{"full_name":"Bäumer, Frederik Simon","first_name":"Frederik Simon","last_name":"Bäumer","id":"38837"},{"first_name":"Michaela","full_name":"Geierhos, Michaela","id":"42496","last_name":"Geierhos","orcid":"0000-0002-8180-5606"}],"editor":[{"last_name":"Silberztein","full_name":"Silberztein, Max ","first_name":"Max "},{"last_name":"Atigui","first_name":"Faten ","full_name":"Atigui, Faten "},{"last_name":"Kornyshova","full_name":"Kornyshova, Elena ","first_name":"Elena "},{"last_name":"Métais","first_name":"Elisabeth ","full_name":"Métais, Elisabeth "},{"full_name":"Meziane, Farid ","first_name":"Farid ","last_name":"Meziane"}],"department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"series_title":"Lecture Notes in Computer Science","citation":{"ieee":"F. S. Bäumer and M. Geierhos, “How to Deal with Inaccurate Service Descriptions in On-The-Fly Computing: Open Challenges,” in <i>Proceedings of the 23rd International Conference on Natural Language and Information Systems</i>, vol. 10859, M. Silberztein, F. Atigui, E. Kornyshova, E. Métais, and F. Meziane, Eds. Cham, Switzerland: Springer, 2018, pp. 509–513.","chicago":"Bäumer, Frederik Simon, and Michaela Geierhos. “How to Deal with Inaccurate Service Descriptions in On-The-Fly Computing: Open Challenges.” In <i>Proceedings of the 23rd International Conference on Natural Language and Information Systems</i>, edited by Max  Silberztein, Faten  Atigui, Elena  Kornyshova, Elisabeth  Métais, and Farid  Meziane, 10859:509–13. Lecture Notes in Computer Science. Cham, Switzerland: Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-91947-8_53\">https://doi.org/10.1007/978-3-319-91947-8_53</a>.","apa":"Bäumer, F. S., &#38; Geierhos, M. (2018). How to Deal with Inaccurate Service Descriptions in On-The-Fly Computing: Open Challenges. In M. Silberztein, F. Atigui, E. Kornyshova, E. Métais, &#38; F. Meziane (Eds.), <i>Proceedings of the 23rd International Conference on Natural Language and Information Systems</i> (Vol. 10859, pp. 509–513). Cham, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-91947-8_53\">https://doi.org/10.1007/978-3-319-91947-8_53</a>","ama":"Bäumer FS, Geierhos M. How to Deal with Inaccurate Service Descriptions in On-The-Fly Computing: Open Challenges. In: Silberztein M, Atigui F, Kornyshova E, Métais E, Meziane F, eds. <i>Proceedings of the 23rd International Conference on Natural Language and Information Systems</i>. Vol 10859. Lecture Notes in Computer Science. Cham, Switzerland: Springer; 2018:509-513. doi:<a href=\"https://doi.org/10.1007/978-3-319-91947-8_53\">10.1007/978-3-319-91947-8_53</a>","short":"F.S. Bäumer, M. Geierhos, in: M. Silberztein, F. Atigui, E. Kornyshova, E. Métais, F. Meziane (Eds.), Proceedings of the 23rd International Conference on Natural Language and Information Systems, Springer, Cham, Switzerland, 2018, pp. 509–513.","bibtex":"@inbook{Bäumer_Geierhos_2018, place={Cham, Switzerland}, series={Lecture Notes in Computer Science}, title={How to Deal with Inaccurate Service Descriptions in On-The-Fly Computing: Open Challenges}, volume={10859}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-91947-8_53\">10.1007/978-3-319-91947-8_53</a>}, booktitle={Proceedings of the 23rd International Conference on Natural Language and Information Systems}, publisher={Springer}, author={Bäumer, Frederik Simon and Geierhos, Michaela}, editor={Silberztein, Max  and Atigui, Faten  and Kornyshova, Elena  and Métais, Elisabeth  and Meziane, Farid Editors}, year={2018}, pages={509–513}, collection={Lecture Notes in Computer Science} }","mla":"Bäumer, Frederik Simon, and Michaela Geierhos. “How to Deal with Inaccurate Service Descriptions in On-The-Fly Computing: Open Challenges.” <i>Proceedings of the 23rd International Conference on Natural Language and Information Systems</i>, edited by Max  Silberztein et al., vol. 10859, Springer, 2018, pp. 509–13, doi:<a href=\"https://doi.org/10.1007/978-3-319-91947-8_53\">10.1007/978-3-319-91947-8_53</a>."},"publication_status":"published","year":"2018","publication_identifier":{"isbn":["978-3-319-91946-1"]},"language":[{"iso":"eng"}],"status":"public","date_created":"2018-04-13T08:54:56Z","publisher":"Springer","date_updated":"2022-01-06T06:55:47Z","file_date_updated":"2018-11-02T16:12:26Z","_id":"2322"},{"type":"journal_article","ddc":["000"],"quality_controlled":"1","publication":"International Journal of Advanced Science and Technology","volume":112,"page":"123-136","doi":"10.14257/ijast.2018.112.12","has_accepted_license":"1","abstract":[{"lang":"eng","text":"A user generally writes software requirements in ambiguous and incomplete form by using natural language; therefore, a software developer may have difficulty in clearly understanding what the meanings are. To solve this problem with automation, we propose a classifier for semantic annotation with manually pre-defined semantic categories. To improve our classifier, we carefully designed syntactic features extracted by constituency and dependency parsers. Even with a small dataset and a large number of classes, our proposed classifier records an accuracy of 0.75, which outperforms the previous model, REaCT."}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"file":[{"date_created":"2018-11-02T15:16:29Z","content_type":"application/pdf","file_id":"5297","access_level":"closed","file_size":586968,"file_name":"12.pdf","creator":"ups","success":1,"date_updated":"2018-11-02T15:16:29Z","relation":"main_file"}],"title":"Improving Classifiers for Semantic Annotation of Software Requirements with Elaborate Syntactic Structure","user_id":"477","keyword":["Software Engineering","Natural Language Processing","Semantic Annotation","Machine Learning","Feature Engineering","Syntactic Structure"],"status":"public","year":"2018","publication_identifier":{"issn":["2005-4238"],"eissn":["2207-6360"]},"language":[{"iso":"eng"}],"publisher":"SERSC Australia","date_created":"2018-04-13T09:19:22Z","date_updated":"2022-01-06T06:55:49Z","file_date_updated":"2018-11-02T15:16:29Z","_id":"2331","intvolume":"       112","author":[{"last_name":"Kim","full_name":"Kim, Yeongsu ","first_name":"Yeongsu "},{"last_name":"Lee","first_name":"Seungwoo","full_name":"Lee, Seungwoo"},{"first_name":"Markus","full_name":"Dollmann, Markus","id":"27578","last_name":"Dollmann"},{"orcid":"0000-0002-8180-5606","last_name":"Geierhos","id":"42496","full_name":"Geierhos, Michaela","first_name":"Michaela"}],"article_type":"original","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"publication_status":"published","citation":{"bibtex":"@article{Kim_Lee_Dollmann_Geierhos_2018, title={Improving Classifiers for Semantic Annotation of Software Requirements with Elaborate Syntactic Structure}, volume={112}, DOI={<a href=\"https://doi.org/10.14257/ijast.2018.112.12\">10.14257/ijast.2018.112.12</a>}, journal={International Journal of Advanced Science and Technology}, publisher={SERSC Australia}, author={Kim, Yeongsu  and Lee, Seungwoo and Dollmann, Markus and Geierhos, Michaela}, year={2018}, pages={123–136} }","mla":"Kim, Yeongsu, et al. “Improving Classifiers for Semantic Annotation of Software Requirements with Elaborate Syntactic Structure.” <i>International Journal of Advanced Science and Technology</i>, vol. 112, SERSC Australia, 2018, pp. 123–36, doi:<a href=\"https://doi.org/10.14257/ijast.2018.112.12\">10.14257/ijast.2018.112.12</a>.","short":"Y. Kim, S. Lee, M. Dollmann, M. Geierhos, International Journal of Advanced Science and Technology 112 (2018) 123–136.","ama":"Kim Y, Lee S, Dollmann M, Geierhos M. Improving Classifiers for Semantic Annotation of Software Requirements with Elaborate Syntactic Structure. <i>International Journal of Advanced Science and Technology</i>. 2018;112:123-136. doi:<a href=\"https://doi.org/10.14257/ijast.2018.112.12\">10.14257/ijast.2018.112.12</a>","apa":"Kim, Y., Lee, S., Dollmann, M., &#38; Geierhos, M. (2018). Improving Classifiers for Semantic Annotation of Software Requirements with Elaborate Syntactic Structure. <i>International Journal of Advanced Science and Technology</i>, <i>112</i>, 123–136. <a href=\"https://doi.org/10.14257/ijast.2018.112.12\">https://doi.org/10.14257/ijast.2018.112.12</a>","ieee":"Y. Kim, S. Lee, M. Dollmann, and M. Geierhos, “Improving Classifiers for Semantic Annotation of Software Requirements with Elaborate Syntactic Structure,” <i>International Journal of Advanced Science and Technology</i>, vol. 112, pp. 123–136, 2018.","chicago":"Kim, Yeongsu , Seungwoo Lee, Markus Dollmann, and Michaela Geierhos. “Improving Classifiers for Semantic Annotation of Software Requirements with Elaborate Syntactic Structure.” <i>International Journal of Advanced Science and Technology</i> 112 (2018): 123–36. <a href=\"https://doi.org/10.14257/ijast.2018.112.12\">https://doi.org/10.14257/ijast.2018.112.12</a>."}},{"place":"Cham, Switzerland","intvolume":"       920","conference":{"end_date":"2018-10-06","start_date":"2018-10-04","location":"Vilnius, Lithuania","name":"24th International Conference on Information and Software Technologies (ICIST 2018)"},"editor":[{"last_name":"Damaševičius","full_name":"Damaševičius, Robertas","first_name":"Robertas"},{"last_name":"Vasiljevienė","full_name":"Vasiljevienė, Giedrė","first_name":"Giedrė"}],"author":[{"first_name":"Frederik Simon","full_name":"Bäumer, Frederik Simon","last_name":"Bäumer","id":"38837"},{"first_name":"Michaela","full_name":"Geierhos, Michaela","last_name":"Geierhos","id":"42496","orcid":"0000-0002-8180-5606"}],"department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"series_title":"Communications in Computer and Information Science","citation":{"mla":"Bäumer, Frederik Simon, and Michaela Geierhos. “NLP in OTF Computing: Current Approaches and Open Challenges.” <i>Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018)</i>, edited by Robertas Damaševičius and Giedrė Vasiljevienė, vol. 920, Springer, 2018, pp. 559–70, doi:<a href=\"https://doi.org/10.1007/978-3-319-99972-2_46\">10.1007/978-3-319-99972-2_46</a>.","bibtex":"@inproceedings{Bäumer_Geierhos_2018, place={Cham, Switzerland}, series={Communications in Computer and Information Science}, title={NLP in OTF Computing: Current Approaches and Open Challenges}, volume={920}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-99972-2_46\">10.1007/978-3-319-99972-2_46</a>}, booktitle={Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018)}, publisher={Springer}, author={Bäumer, Frederik Simon and Geierhos, Michaela}, editor={Damaševičius, Robertas and Vasiljevienė, GiedrėEditors}, year={2018}, pages={559–570}, collection={Communications in Computer and Information Science} }","short":"F.S. Bäumer, M. Geierhos, in: R. Damaševičius, G. Vasiljevienė (Eds.), Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018), Springer, Cham, Switzerland, 2018, pp. 559–570.","ama":"Bäumer FS, Geierhos M. NLP in OTF Computing: Current Approaches and Open Challenges. In: Damaševičius R, Vasiljevienė G, eds. <i>Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018)</i>. Vol 920. Communications in Computer and Information Science. Cham, Switzerland: Springer; 2018:559-570. doi:<a href=\"https://doi.org/10.1007/978-3-319-99972-2_46\">10.1007/978-3-319-99972-2_46</a>","apa":"Bäumer, F. S., &#38; Geierhos, M. (2018). NLP in OTF Computing: Current Approaches and Open Challenges. In R. Damaševičius &#38; G. Vasiljevienė (Eds.), <i>Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018)</i> (Vol. 920, pp. 559–570). Cham, Switzerland: Springer. <a href=\"https://doi.org/10.1007/978-3-319-99972-2_46\">https://doi.org/10.1007/978-3-319-99972-2_46</a>","chicago":"Bäumer, Frederik Simon, and Michaela Geierhos. “NLP in OTF Computing: Current Approaches and Open Challenges.” In <i>Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018)</i>, edited by Robertas Damaševičius and Giedrė Vasiljevienė, 920:559–70. Communications in Computer and Information Science. Cham, Switzerland: Springer, 2018. <a href=\"https://doi.org/10.1007/978-3-319-99972-2_46\">https://doi.org/10.1007/978-3-319-99972-2_46</a>.","ieee":"F. S. Bäumer and M. Geierhos, “NLP in OTF Computing: Current Approaches and Open Challenges,” in <i>Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018)</i>, Vilnius, Lithuania, 2018, vol. 920, pp. 559–570."},"publication_status":"published","publication_identifier":{"isbn":["9783319999715","9783319999722"],"issn":["1865-0929","1865-0937"]},"year":"2018","language":[{"iso":"eng"}],"status":"public","date_created":"2018-09-01T08:52:36Z","publisher":"Springer","date_updated":"2022-01-06T07:00:57Z","file_date_updated":"2019-01-11T11:36:10Z","_id":"4339","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"doi":"10.1007/978-3-319-99972-2_46","abstract":[{"text":"On-The-Fly Computing is the vision of covering software needs of end users by fully-automatic compositions of existing software services. End users will receive so-called service compositions tailored to their very individual needs, based on natural language software descriptions. This everyday language may contain inaccuracies and incompleteness, which are well-known challenges in requirements engineering. In addition to existing approaches that try to automatically identify and correct these deficits, there are also new trends to involve users more in the elaboration and refinement process. In this paper, we present the relevant state of the art in the field of automated detection and compensation of multiple inaccuracies in natural language service descriptions and name open challenges needed to be tackled in NL-based software service composition. ","lang":"eng"}],"has_accepted_license":"1","title":"NLP in OTF Computing: Current Approaches and Open Challenges","file":[{"relation":"main_file","date_updated":"2019-01-11T11:36:10Z","success":1,"file_size":1053017,"file_name":"baeumer-4315.pdf","creator":"fbaeumer","date_created":"2019-01-11T11:36:10Z","content_type":"application/pdf","file_id":"6624","access_level":"closed"}],"user_id":"38837","keyword":["Inaccuracy detection","Natural language software requirements"],"type":"conference","ddc":["004"],"publication":"Proceedings of the 24th International Conference on Information and Software Technologies (ICIST 2018)","quality_controlled":"1","page":"559-570","volume":920},{"year":"2018","publication_identifier":{"isbn":["978-0-9981331-1-9"]},"language":[{"iso":"eng"}],"status":"public","date_created":"2017-10-17T12:40:59Z","date_updated":"2022-01-06T07:01:01Z","_id":"44","file_date_updated":"2018-11-02T14:32:35Z","conference":{"end_date":"2018-01-06","location":"Big Island, Waikoloa Village","start_date":"2018-01-03","name":"51st Hawaii International Conference on System Sciences (HICSS 2018)"},"author":[{"full_name":"Bäumer, Frederik Simon","first_name":"Frederik Simon","last_name":"Bäumer","id":"38837"},{"last_name":"Geierhos","id":"42496","full_name":"Geierhos, Michaela","first_name":"Michaela","orcid":"0000-0002-8180-5606"}],"department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"citation":{"apa":"Bäumer, F. S., &#38; Geierhos, M. (2018). Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines. In <i>Proceedings of the 51st Hawaii International Conference on System Sciences</i> (pp. 5746–5755). Big Island, Waikoloa Village. <a href=\"https://doi.org/10125/50609\">https://doi.org/10125/50609</a>","ama":"Bäumer FS, Geierhos M. Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines. In: <i>Proceedings of the 51st Hawaii International Conference on System Sciences</i>. ; 2018:5746-5755. doi:<a href=\"https://doi.org/10125/50609\">10125/50609</a>","chicago":"Bäumer, Frederik Simon, and Michaela Geierhos. “Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-Based Configuration of Text Analysis Pipelines.” In <i>Proceedings of the 51st Hawaii International Conference on System Sciences</i>, 5746–55, 2018. <a href=\"https://doi.org/10125/50609\">https://doi.org/10125/50609</a>.","ieee":"F. S. Bäumer and M. Geierhos, “Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines,” in <i>Proceedings of the 51st Hawaii International Conference on System Sciences</i>, Big Island, Waikoloa Village, 2018, pp. 5746–5755.","mla":"Bäumer, Frederik Simon, and Michaela Geierhos. “Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-Based Configuration of Text Analysis Pipelines.” <i>Proceedings of the 51st Hawaii International Conference on System Sciences</i>, 2018, pp. 5746–55, doi:<a href=\"https://doi.org/10125/50609\">10125/50609</a>.","bibtex":"@inproceedings{Bäumer_Geierhos_2018, title={Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines}, DOI={<a href=\"https://doi.org/10125/50609\">10125/50609</a>}, booktitle={Proceedings of the 51st Hawaii International Conference on System Sciences}, author={Bäumer, Frederik Simon and Geierhos, Michaela}, year={2018}, pages={5746–5755} }","short":"F.S. Bäumer, M. Geierhos, in: Proceedings of the 51st Hawaii International Conference on System Sciences, 2018, pp. 5746–5755."},"publication_status":"published","type":"conference","ddc":["000"],"publication":"Proceedings of the 51st Hawaii International Conference on System Sciences","quality_controlled":"1","page":"5746-5755","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B1","_id":"9"}],"doi":"10125/50609","has_accepted_license":"1","abstract":[{"lang":"eng","text":"Natural language software requirements descriptions enable end users to formulate their wishes and expectations for a future software product without much prior knowledge in requirements engineering. However, these descriptions are susceptible to linguistic inaccuracies such as ambiguities and incompleteness that can harm the development process. There is a number of software solutions that can detect deficits in requirements descriptions and partially solve them, but they are often hard to use and not suitable for end users. For this reason, we develop a software system that helps end-users to create unambiguous and complete requirements descriptions by combining existing expert tools and controlling them using automatic compensation strategies. In order to recognize the necessity of individual compensation methods in the descriptions, we have developed linguistic indicators, which we present in this paper. Based on these indicators, the whole text analysis pipeline is ad-hoc configured and thus adapted to the individual circumstances of a requirements description."}],"title":"Flexible Ambiguity Resolution and Incompleteness Detection in Requirements Descriptions via an Indicator-based Configuration of Text Analysis Pipelines","file":[{"file_name":"paper0722.pdf","file_size":753693,"creator":"ups","date_created":"2018-11-02T14:32:35Z","file_id":"5274","content_type":"application/pdf","access_level":"closed","date_updated":"2018-11-02T14:32:35Z","relation":"main_file","success":1}],"oa":"1","user_id":"477","main_file_link":[{"url":"https://scholarspace.manoa.hawaii.edu/bitstream/10125/50609/1/paper0722.pdf","open_access":"1"}],"keyword":["Software Product Lines: Engineering","Services","and Management","Ambiguities","Incompleteness","Natural Language Processing","Software Requirements"]},{"page":"1350–1356","type":"conference","publication":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","keyword":["evolutionary optimization","performance assessment","software-tools"],"user_id":"102979","abstract":[{"lang":"eng","text":"Assessing the performance of stochastic optimization algorithms in the field of multi-objective optimization is of utmost importance. Besides the visual comparison of the obtained approximation sets, more sophisticated methods have been proposed in the last decade, e. g., a variety of quantitative performance indicators or statistical tests. In this paper, we present tools implemented in the R package ecr, which assist in performing comprehensive and sound comparison and evaluation of multi-objective evolutionary algorithms following recommendations from the literature."}],"doi":"10.1145/3205651.3208312","extern":"1","title":"Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr","date_updated":"2023-12-13T10:46:04Z","_id":"48867","status":"public","language":[{"iso":"eng"}],"year":"2018","publication_identifier":{"isbn":["978-1-4503-5764-7"]},"publisher":"Association for Computing Machinery","date_created":"2023-11-14T15:58:56Z","department":[{"_id":"819"}],"publication_status":"published","citation":{"ama":"Bossek J. Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>. GECCO ’18. Association for Computing Machinery; 2018:1350–1356. doi:<a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>","bibtex":"@inproceedings{Bossek_2018, place={New York, NY, USA}, series={GECCO ’18}, title={Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr}, DOI={<a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion}, publisher={Association for Computing Machinery}, author={Bossek, Jakob}, year={2018}, pages={1350–1356}, collection={GECCO ’18} }","apa":"Bossek, J. (2018). Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr. <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1350–1356. <a href=\"https://doi.org/10.1145/3205651.3208312\">https://doi.org/10.1145/3205651.3208312</a>","mla":"Bossek, Jakob. “Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package Ecr.” <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, Association for Computing Machinery, 2018, pp. 1350–1356, doi:<a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>.","ieee":"J. Bossek, “Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 2018, pp. 1350–1356, doi: <a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>.","chicago":"Bossek, Jakob. “Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package Ecr.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1350–1356. GECCO ’18. New York, NY, USA: Association for Computing Machinery, 2018. <a href=\"https://doi.org/10.1145/3205651.3208312\">https://doi.org/10.1145/3205651.3208312</a>.","short":"J. Bossek, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, Association for Computing Machinery, New York, NY, USA, 2018, pp. 1350–1356."},"series_title":"GECCO ’18","place":"New York, NY, USA","author":[{"orcid":"0000-0002-4121-4668","id":"102979","last_name":"Bossek","full_name":"Bossek, Jakob","first_name":"Jakob"}]},{"language":[{"iso":"eng"}],"publication_identifier":{"issn":["0098-5589"]},"type":"journal_article","year":"2017","status":"public","date_created":"2020-11-30T11:06:43Z","publication":"IEEE Transactions on Software Engineering","issue":"99","date_updated":"2022-01-06T06:54:30Z","page":"1-1","_id":"20557","volume":"PP","doi":"10.1109/TSE.2017.2756048","title":"Tracking Load-time Configuration Options","author":[{"last_name":"Lillack","full_name":"Lillack, Max","first_name":"Max"},{"full_name":"Kästner, Christian","first_name":"Christian","last_name":"Kästner"},{"full_name":"Bodden, Eric","first_name":"Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647"}],"department":[{"_id":"76"}],"citation":{"ama":"Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>. 2017;PP(99):1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>","apa":"Lillack, M., Kästner, C., &#38; Bodden, E. (2017). Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>, <i>PP</i>(99), 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>","chicago":"Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i> PP, no. 99 (2017): 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>.","ieee":"M. Lillack, C. Kästner, and E. Bodden, “Tracking Load-time Configuration Options,” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, pp. 1–1, 2017, doi: <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","mla":"Lillack, Max, et al. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, 2017, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","bibtex":"@article{Lillack_Kästner_Bodden_2017, title={Tracking Load-time Configuration Options}, volume={PP}, DOI={<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>}, number={99}, journal={IEEE Transactions on Software Engineering}, author={Lillack, Max and Kästner, Christian and Bodden, Eric}, year={2017}, pages={1–1} }","short":"M. Lillack, C. Kästner, E. Bodden, IEEE Transactions on Software Engineering PP (2017) 1–1."},"main_file_link":[{"url":"http://bodden.de/pubs/lkb17lotrack.pdf"}],"keyword":["Androids","Bluetooth","Humanoid robots","Java","Software","Tools","Configuration options","Static analysis","Variability mining"],"user_id":"5786"},{"department":[{"_id":"36"},{"_id":"1"},{"_id":"579"},{"_id":"34"},{"_id":"7"},{"_id":"66"},{"_id":"238"},{"_id":"63"}],"publication_status":"published","citation":{"ieee":"L. van Rooijen, F. S. Bäumer, M. C. Platenius, M. Geierhos, H. Hamann, and G. Engels, “From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process,” in <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>, Lisbon, Portugal, 2017, pp. 379–385.","chicago":"Rooijen, Lorijn van, Frederik Simon Bäumer, Marie Christin Platenius, Michaela Geierhos, Heiko Hamann, and Gregor Engels. “From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process.” In <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>, 379–85. Piscataway, NJ, USA: IEEE, 2017. <a href=\"https://doi.org/10.1109/REW.2017.26\">https://doi.org/10.1109/REW.2017.26</a>.","apa":"van Rooijen, L., Bäumer, F. S., Platenius, M. C., Geierhos, M., Hamann, H., &#38; Engels, G. (2017). From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process. In <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i> (pp. 379–385). Piscataway, NJ, USA: IEEE. <a href=\"https://doi.org/10.1109/REW.2017.26\">https://doi.org/10.1109/REW.2017.26</a>","ama":"van Rooijen L, Bäumer FS, Platenius MC, Geierhos M, Hamann H, Engels G. From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process. In: <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>. Piscataway, NJ, USA: IEEE; 2017:379-385. doi:<a href=\"https://doi.org/10.1109/REW.2017.26\">10.1109/REW.2017.26</a>","short":"L. van Rooijen, F.S. Bäumer, M.C. Platenius, M. Geierhos, H. Hamann, G. Engels, in: 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), IEEE, Piscataway, NJ, USA, 2017, pp. 379–385.","bibtex":"@inproceedings{van Rooijen_Bäumer_Platenius_Geierhos_Hamann_Engels_2017, place={Piscataway, NJ, USA}, title={From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process}, DOI={<a href=\"https://doi.org/10.1109/REW.2017.26\">10.1109/REW.2017.26</a>}, booktitle={2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)}, publisher={IEEE}, author={van Rooijen, Lorijn and Bäumer, Frederik Simon and Platenius, Marie Christin and Geierhos, Michaela and Hamann, Heiko and Engels, Gregor}, year={2017}, pages={379–385} }","mla":"van Rooijen, Lorijn, et al. “From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process.” <i>2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)</i>, IEEE, 2017, pp. 379–85, doi:<a href=\"https://doi.org/10.1109/REW.2017.26\">10.1109/REW.2017.26</a>."},"place":"Piscataway, NJ, USA","author":[{"first_name":"Lorijn","full_name":"van Rooijen, Lorijn","last_name":"van Rooijen","id":"58843"},{"last_name":"Bäumer","id":"38837","full_name":"Bäumer, Frederik Simon","first_name":"Frederik Simon"},{"last_name":"Platenius","first_name":"Marie Christin","full_name":"Platenius, Marie Christin"},{"orcid":"0000-0002-8180-5606","full_name":"Geierhos, Michaela","first_name":"Michaela","last_name":"Geierhos","id":"42496"},{"last_name":"Hamann","full_name":"Hamann, Heiko","first_name":"Heiko"},{"full_name":"Engels, Gregor","first_name":"Gregor","last_name":"Engels","id":"107"}],"conference":{"end_date":"2017-09-08","name":"2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)","location":"Lisbon, Portugal","start_date":"2017-09-04"},"date_updated":"2022-01-06T07:04:18Z","_id":"97","file_date_updated":"2018-11-02T14:50:35Z","status":"public","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["978-1-5386-3489-9"],"eisbn":["978-1-5386-3488-2 "]},"year":"2017","publisher":"IEEE","date_created":"2017-10-17T12:41:10Z","keyword":["Software","Unified modeling language","Requirements engineering","Ontologies","Search problems","Natural languages"],"user_id":"57458","doi":"10.1109/REW.2017.26","abstract":[{"lang":"eng","text":"Bridging the gap between informal, imprecise, and vague user requirements descriptions and precise formalized specifications is the main task of requirements engineering. Techniques such as interviews or story telling are used when requirements engineers try to identify a user's needs. The requirements specification process is typically done in a dialogue between users, domain experts, and requirements engineers. In our research, we aim at automating the specification of requirements. The idea is to distinguish between untrained users and trained users, and to exploit domain knowledge learned from previous runs of our system. We let untrained users provide unstructured natural language descriptions, while we allow trained users to provide examples of behavioral descriptions. In both cases, our goal is to synthesize formal requirements models similar to statecharts. From requirements specification processes with trained users, behavioral ontologies are learned which are later used to support the requirements specification process for untrained users. Our research method is original in combining natural language processing and search-based techniques for the synthesis of requirements specifications. Our work is embedded in a larger project that aims at automating the whole software development and deployment process in envisioned future software service markets."}],"has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"9","name":"SFB 901 - Subprojekt B1"},{"_id":"3","name":"SFB 901 - Project Area B"}],"file":[{"content_type":"application/pdf","access_level":"closed","file_id":"5285","date_created":"2018-11-02T14:50:35Z","creator":"ups","file_size":433613,"file_name":"08054881.pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T14:50:35Z"}],"title":"From User Demand to Software Service: Using Machine Learning to Automate the Requirements Specification Process","page":"379-385","type":"conference","publication":"2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)","ddc":["000"],"quality_controlled":"1"},{"_id":"48863","date_updated":"2023-12-13T10:45:05Z","date_created":"2023-11-14T15:58:55Z","publisher":"Association for Computing Machinery","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["978-1-4503-4939-0"]},"year":"2017","status":"public","citation":{"short":"J. Bossek, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, Association for Computing Machinery, New York, NY, USA, 2017, pp. 1187–1193.","bibtex":"@inproceedings{Bossek_2017, place={New York, NY, USA}, series={GECCO ’17}, title={Ecr 2.0: A Modular Framework for Evolutionary Computation in R}, DOI={<a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion}, publisher={Association for Computing Machinery}, author={Bossek, Jakob}, year={2017}, pages={1187–1193}, collection={GECCO ’17} }","mla":"Bossek, Jakob. “Ecr 2.0: A Modular Framework for Evolutionary Computation in R.” <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, Association for Computing Machinery, 2017, pp. 1187–1193, doi:<a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>.","ieee":"J. Bossek, “Ecr 2.0: A Modular Framework for Evolutionary Computation in R,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 2017, pp. 1187–1193, doi: <a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>.","chicago":"Bossek, Jakob. “Ecr 2.0: A Modular Framework for Evolutionary Computation in R.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1187–1193. GECCO ’17. New York, NY, USA: Association for Computing Machinery, 2017. <a href=\"https://doi.org/10.1145/3067695.3082470\">https://doi.org/10.1145/3067695.3082470</a>.","apa":"Bossek, J. (2017). Ecr 2.0: A Modular Framework for Evolutionary Computation in R. <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1187–1193. <a href=\"https://doi.org/10.1145/3067695.3082470\">https://doi.org/10.1145/3067695.3082470</a>","ama":"Bossek J. Ecr 2.0: A Modular Framework for Evolutionary Computation in R. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>. GECCO ’17. Association for Computing Machinery; 2017:1187–1193. doi:<a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>"},"series_title":"GECCO ’17","publication_status":"published","department":[{"_id":"819"}],"author":[{"orcid":"0000-0002-4121-4668","full_name":"Bossek, Jakob","first_name":"Jakob","last_name":"Bossek","id":"102979"}],"place":"New York, NY, USA","page":"1187–1193","publication":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","type":"conference","keyword":["evolutionary optimization","software-tools"],"user_id":"102979","title":"Ecr 2.0: A Modular Framework for Evolutionary Computation in R","extern":"1","abstract":[{"lang":"eng","text":"The novel R package ecr (version 2), short for Evolutionary Computation in R, provides a comprehensive collection of building blocks for constructing powerful evolutionary algorithms for single- and multi-objective continuous and combinatorial optimization problems. It allows to solve standard optimization tasks with few lines of code using a black-box approach. Moreover, rapid prototyping of non-standard ideas is possible via an explicit, white-box approach. This paper describes the design principles of the package and gives some introductory examples on how to use the package in practise."}],"doi":"10.1145/3067695.3082470"},{"citation":{"chicago":"Schmitt, Martin. “The Code of Banking. Software as the Digitalization of German Savings Banks.” In <i>International Communities of Invention and Innovation</i>, edited by Arthur Tatnall and Christopher Leslie, 141–164. IFIP Advances in Information and Communication Technology. Cham: Springer, 2016.","ieee":"M. Schmitt, “The Code of Banking. Software as the Digitalization of German Savings Banks,” in <i>International Communities of Invention and Innovation</i>, A. Tatnall and C. Leslie, Eds. Cham: Springer, 2016, pp. 141–164.","ama":"Schmitt M. The Code of Banking. Software as the Digitalization of German Savings Banks. In: Tatnall A, Leslie C, eds. <i>International Communities of Invention and Innovation</i>. IFIP Advances in Information and Communication Technology. Springer; 2016:141–164.","apa":"Schmitt, M. (2016). The Code of Banking. Software as the Digitalization of German Savings Banks. In A. Tatnall &#38; C. Leslie (Eds.), <i>International Communities of Invention and Innovation</i> (pp. 141–164). Springer.","short":"M. Schmitt, in: A. Tatnall, C. Leslie (Eds.), International Communities of Invention and Innovation, Springer, Cham, 2016, pp. 141–164.","mla":"Schmitt, Martin. “The Code of Banking. Software as the Digitalization of German Savings Banks.” <i>International Communities of Invention and Innovation</i>, edited by Arthur Tatnall and Christopher Leslie, Springer, 2016, pp. 141–164.","bibtex":"@inbook{Schmitt_2016, place={Cham}, series={IFIP Advances in Information and Communication Technology}, title={The Code of Banking. Software as the Digitalization of German Savings Banks}, booktitle={International Communities of Invention and Innovation}, publisher={Springer}, author={Schmitt, Martin}, editor={Tatnall, Arthur and Leslie, Christopher}, year={2016}, pages={141–164}, collection={IFIP Advances in Information and Communication Technology} }"},"series_title":"IFIP Advances in Information and Communication Technology","keyword":["Kreditscoring","Informationssystem","Software"],"user_id":"100968","title":"The Code of Banking. Software as the Digitalization of German Savings Banks","author":[{"first_name":"Martin","full_name":"Schmitt, Martin","last_name":"Schmitt","id":"100968"}],"editor":[{"last_name":"Tatnall","full_name":"Tatnall, Arthur","first_name":"Arthur"},{"last_name":"Leslie","first_name":"Christopher","full_name":"Leslie, Christopher"}],"place":"Cham","page":"141–164","_id":"51827","date_updated":"2024-02-24T23:58:50Z","date_created":"2024-02-24T23:39:56Z","publication":"International Communities of Invention and Innovation","publisher":"Springer","language":[{"iso":"eng"}],"type":"book_chapter","year":"2016","status":"public"},{"page":"1-7","_id":"10673","date_updated":"2022-01-06T06:50:49Z","publication":"Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS)","date_created":"2019-07-10T11:18:00Z","type":"conference","year":"2015","language":[{"iso":"eng"}],"status":"public","citation":{"ama":"Ho N, Ahmed AF, Kaufmann P, Platzner M. Microarchitectural optimization by means of reconfigurable and evolvable cache mappings. In: <i>Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS)</i>. ; 2015:1-7. doi:<a href=\"https://doi.org/10.1109/AHS.2015.7231178\">10.1109/AHS.2015.7231178</a>","apa":"Ho, N., Ahmed, A. F., Kaufmann, P., &#38; Platzner, M. (2015). Microarchitectural optimization by means of reconfigurable and evolvable cache mappings. In <i>Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS)</i> (pp. 1–7). <a href=\"https://doi.org/10.1109/AHS.2015.7231178\">https://doi.org/10.1109/AHS.2015.7231178</a>","chicago":"Ho, Nam, Abdullah Fathi Ahmed, Paul Kaufmann, and Marco Platzner. “Microarchitectural Optimization by Means of Reconfigurable and Evolvable Cache Mappings.” In <i>Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS)</i>, 1–7, 2015. <a href=\"https://doi.org/10.1109/AHS.2015.7231178\">https://doi.org/10.1109/AHS.2015.7231178</a>.","ieee":"N. Ho, A. F. Ahmed, P. Kaufmann, and M. Platzner, “Microarchitectural optimization by means of reconfigurable and evolvable cache mappings,” in <i>Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS)</i>, 2015, pp. 1–7.","mla":"Ho, Nam, et al. “Microarchitectural Optimization by Means of Reconfigurable and Evolvable Cache Mappings.” <i>Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS)</i>, 2015, pp. 1–7, doi:<a href=\"https://doi.org/10.1109/AHS.2015.7231178\">10.1109/AHS.2015.7231178</a>.","bibtex":"@inproceedings{Ho_Ahmed_Kaufmann_Platzner_2015, title={Microarchitectural optimization by means of reconfigurable and evolvable cache mappings}, DOI={<a href=\"https://doi.org/10.1109/AHS.2015.7231178\">10.1109/AHS.2015.7231178</a>}, booktitle={Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS)}, author={Ho, Nam and Ahmed, Abdullah Fathi and Kaufmann, Paul and Platzner, Marco}, year={2015}, pages={1–7} }","short":"N. Ho, A.F. Ahmed, P. Kaufmann, M. Platzner, in: Proc. NASA/ESA Conf. Adaptive Hardware and Systems (AHS), 2015, pp. 1–7."},"user_id":"3118","keyword":["cache storage","field programmable gate arrays","multiprocessing systems","parallel architectures","reconfigurable architectures","FPGA","dynamic reconfiguration","evolvable cache mapping","many-core architecture","memory-to-cache address mapping function","microarchitectural optimization","multicore architecture","nature-inspired optimization","parallelization degrees","processor","reconfigurable cache mapping","reconfigurable computing","Field programmable gate arrays","Software","Tuning"],"department":[{"_id":"78"}],"title":"Microarchitectural optimization by means of reconfigurable and evolvable cache mappings","author":[{"full_name":"Ho, Nam","first_name":"Nam","last_name":"Ho"},{"first_name":"Abdullah Fathi","full_name":"Ahmed, Abdullah Fathi","last_name":"Ahmed"},{"first_name":"Paul","full_name":"Kaufmann, Paul","last_name":"Kaufmann"},{"first_name":"Marco","full_name":"Platzner, Marco","id":"398","last_name":"Platzner"}],"project":[{"grant_number":"257906","_id":"31","name":"Engineering Proprioception in Computing Systems"}],"doi":"10.1109/AHS.2015.7231178"},{"keyword":["embedded systems","field programmable gate arrays","operating systems (computers)","scheduling","μC/OS-II","FPGAs","OS foundation","SafeRTOS","Xenomai","chip utilization ration","complex time constraints","embedded systems","hard real-time hardware task allocation","hard real-time hardware task scheduling","hardware-software real-time operating systems","partially reconfigurable field-programmable gate arrays","resource constraints","safety-critical RTOS","Field programmable gate arrays","Hardware","Job shop scheduling","Real-time systems","Shape","Software"],"user_id":"398","citation":{"bibtex":"@inproceedings{Guettatfi_Kermia_Khouas_2015, title={Over effective hard real-time hardware tasks scheduling and allocation}, DOI={<a href=\"https://doi.org/10.1109/FPL.2015.7293994\">10.1109/FPL.2015.7293994</a>}, booktitle={25th International Conference on Field Programmable Logic and Applications (FPL)}, publisher={Imperial College}, author={Guettatfi, Zakarya and Kermia, Omar and Khouas, Abdelhakim}, year={2015} }","mla":"Guettatfi, Zakarya, et al. “Over Effective Hard Real-Time Hardware Tasks Scheduling and Allocation.” <i>25th International Conference on Field Programmable Logic and Applications (FPL)</i>, Imperial College, 2015, doi:<a href=\"https://doi.org/10.1109/FPL.2015.7293994\">10.1109/FPL.2015.7293994</a>.","short":"Z. Guettatfi, O. Kermia, A. Khouas, in: 25th International Conference on Field Programmable Logic and Applications (FPL), Imperial College, 2015.","ama":"Guettatfi Z, Kermia O, Khouas A. Over effective hard real-time hardware tasks scheduling and allocation. In: <i>25th International Conference on Field Programmable Logic and Applications (FPL)</i>. Imperial College; 2015. doi:<a href=\"https://doi.org/10.1109/FPL.2015.7293994\">10.1109/FPL.2015.7293994</a>","apa":"Guettatfi, Z., Kermia, O., &#38; Khouas, A. (2015). Over effective hard real-time hardware tasks scheduling and allocation. In <i>25th International Conference on Field Programmable Logic and Applications (FPL)</i>. Imperial College. <a href=\"https://doi.org/10.1109/FPL.2015.7293994\">https://doi.org/10.1109/FPL.2015.7293994</a>","ieee":"Z. Guettatfi, O. Kermia, and A. Khouas, “Over effective hard real-time hardware tasks scheduling and allocation,” in <i>25th International Conference on Field Programmable Logic and Applications (FPL)</i>, 2015.","chicago":"Guettatfi, Zakarya, Omar Kermia, and Abdelhakim Khouas. “Over Effective Hard Real-Time Hardware Tasks Scheduling and Allocation.” In <i>25th International Conference on Field Programmable Logic and Applications (FPL)</i>. Imperial College, 2015. <a href=\"https://doi.org/10.1109/FPL.2015.7293994\">https://doi.org/10.1109/FPL.2015.7293994</a>."},"department":[{"_id":"78"}],"extern":"1","author":[{"last_name":"Guettatfi","first_name":"Zakarya","full_name":"Guettatfi, Zakarya"},{"last_name":"Kermia","full_name":"Kermia, Omar","first_name":"Omar"},{"full_name":"Khouas, Abdelhakim","first_name":"Abdelhakim","last_name":"Khouas"}],"title":"Over effective hard real-time hardware tasks scheduling and allocation","doi":"10.1109/FPL.2015.7293994","_id":"10779","date_updated":"2022-01-06T06:50:50Z","publisher":"Imperial College","date_created":"2019-07-10T12:11:36Z","publication":"25th International Conference on Field Programmable Logic and Applications (FPL)","status":"public","language":[{"iso":"eng"}],"publication_identifier":{"issn":["1946-147X"]},"type":"conference","year":"2015"},{"abstract":[{"text":"Mechatronic systems are used more than ever in human life. They can be found in a very wide range of domain contexts, from household appliances, and cars, to medical equipment. Mechatronic systems, as a kind of embedded systems, are the tight integration of mechanical and electrical engineering, which embed software systems. Information security of mechatronic systems has not received much attention yet. However, wherever data exists, cyber attacks threaten mechatronic systems.\r\n\r\nThe thesis focuses on the early design stages of the development of mechatronic systems. Model sequence diagrams (MSDs) are used to model requirements with real-time and safety properties. In this thesis, MSDs are extended such that security properties for example authenticity and privacy can be modeled and analyzed automatically.","lang":"eng"}],"has_accepted_license":"1","extern":"1","file":[{"relation":"main_file","date_updated":"2022-12-30T22:10:51Z","success":1,"file_name":"Bahar_Jazayeri_Masterarbeit.pdf","file_size":11423528,"creator":"bahareh","date_created":"2022-12-30T22:10:51Z","file_id":"35068","access_level":"closed","content_type":"application/pdf"}],"author":[{"id":"36399","last_name":"Schwichtenberg","full_name":"Schwichtenberg, Bahar","first_name":"Bahar"}],"title":"Early Prediction of Security Properties for Mechatronic Systems","publication_status":"published","keyword":["Software Architecture","Requirements Engineering","Embedded Systems"],"user_id":"36399","citation":{"ieee":"B. Schwichtenberg, <i>Early Prediction of Security Properties for Mechatronic Systems</i>. 2015.","chicago":"Schwichtenberg, Bahar. <i>Early Prediction of Security Properties for Mechatronic Systems</i>, 2015.","apa":"Schwichtenberg, B. (2015). <i>Early Prediction of Security Properties for Mechatronic Systems</i>.","ama":"Schwichtenberg B. <i>Early Prediction of Security Properties for Mechatronic Systems</i>.; 2015.","short":"B. Schwichtenberg, Early Prediction of Security Properties for Mechatronic Systems, 2015.","bibtex":"@book{Schwichtenberg_2015, title={Early Prediction of Security Properties for Mechatronic Systems}, author={Schwichtenberg, Bahar}, year={2015} }","mla":"Schwichtenberg, Bahar. <i>Early Prediction of Security Properties for Mechatronic Systems</i>. 2015."},"status":"public","language":[{"iso":"eng"}],"type":"mastersthesis","year":"2015","date_created":"2022-09-09T11:42:25Z","ddc":["000"],"date_updated":"2022-12-30T22:12:13Z","_id":"33312","file_date_updated":"2022-12-30T22:10:51Z"},{"date_updated":"2023-02-07T11:00:56Z","_id":"41866","year":"2015","publication_identifier":{"issn":["2162-2264","2162-2272"]},"language":[{"iso":"eng"}],"status":"public","date_created":"2023-02-07T10:59:53Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","department":[{"_id":"51"}],"citation":{"ieee":"J. A. Russer, N. Uddin, A. S. Awny, A. Thiede, and P. Russer, “Near-field measurement of stochastic electromagnetic fields,” <i>IEEE Electromagnetic Compatibility Magazine</i>, vol. 4, no. 3, pp. 79–85, 2015, doi: <a href=\"https://doi.org/10.1109/memc.2015.7336761\">10.1109/memc.2015.7336761</a>.","chicago":"Russer, Johannes A., Nasir Uddin, Ahmed Sanaa Awny, Andreas Thiede, and Peter Russer. “Near-Field Measurement of Stochastic Electromagnetic Fields.” <i>IEEE Electromagnetic Compatibility Magazine</i> 4, no. 3 (2015): 79–85. <a href=\"https://doi.org/10.1109/memc.2015.7336761\">https://doi.org/10.1109/memc.2015.7336761</a>.","ama":"Russer JA, Uddin N, Awny AS, Thiede A, Russer P. Near-field measurement of stochastic electromagnetic fields. <i>IEEE Electromagnetic Compatibility Magazine</i>. 2015;4(3):79-85. doi:<a href=\"https://doi.org/10.1109/memc.2015.7336761\">10.1109/memc.2015.7336761</a>","apa":"Russer, J. A., Uddin, N., Awny, A. S., Thiede, A., &#38; Russer, P. (2015). Near-field measurement of stochastic electromagnetic fields. <i>IEEE Electromagnetic Compatibility Magazine</i>, <i>4</i>(3), 79–85. <a href=\"https://doi.org/10.1109/memc.2015.7336761\">https://doi.org/10.1109/memc.2015.7336761</a>","short":"J.A. Russer, N. Uddin, A.S. Awny, A. Thiede, P. Russer, IEEE Electromagnetic Compatibility Magazine 4 (2015) 79–85.","bibtex":"@article{Russer_Uddin_Awny_Thiede_Russer_2015, title={Near-field measurement of stochastic electromagnetic fields}, volume={4}, DOI={<a href=\"https://doi.org/10.1109/memc.2015.7336761\">10.1109/memc.2015.7336761</a>}, number={3}, journal={IEEE Electromagnetic Compatibility Magazine}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Russer, Johannes A. and Uddin, Nasir and Awny, Ahmed Sanaa and Thiede, Andreas and Russer, Peter}, year={2015}, pages={79–85} }","mla":"Russer, Johannes A., et al. “Near-Field Measurement of Stochastic Electromagnetic Fields.” <i>IEEE Electromagnetic Compatibility Magazine</i>, vol. 4, no. 3, Institute of Electrical and Electronics Engineers (IEEE), 2015, pp. 79–85, doi:<a href=\"https://doi.org/10.1109/memc.2015.7336761\">10.1109/memc.2015.7336761</a>."},"publication_status":"published","intvolume":"         4","author":[{"last_name":"Russer","full_name":"Russer, Johannes A.","first_name":"Johannes A."},{"last_name":"Uddin","first_name":"Nasir","full_name":"Uddin, Nasir"},{"last_name":"Awny","first_name":"Ahmed Sanaa","full_name":"Awny, Ahmed Sanaa"},{"id":"538","last_name":"Thiede","first_name":"Andreas","full_name":"Thiede, Andreas"},{"first_name":"Peter","full_name":"Russer, Peter","last_name":"Russer"}],"issue":"3","page":"79-85","volume":4,"type":"journal_article","publication":"IEEE Electromagnetic Compatibility Magazine","user_id":"77496","keyword":["Electrical and Electronic Engineering","Computer Networks and Communications","Instrumentation","Signal Processing","Software"],"doi":"10.1109/memc.2015.7336761","title":"Near-field measurement of stochastic electromagnetic fields"},{"citation":{"chicago":"Ho, Nam, Paul Kaufmann, and Marco Platzner. “A Hardware/Software Infrastructure for Performance Monitoring on LEON3 Multicore Platforms.” In <i>24th Intl. Conf. on Field Programmable Logic and Applications (FPL)</i>, 1–4, 2014. <a href=\"https://doi.org/10.1109/FPL.2014.6927437\">https://doi.org/10.1109/FPL.2014.6927437</a>.","ieee":"N. Ho, P. Kaufmann, and M. Platzner, “A hardware/software infrastructure for performance monitoring on LEON3 multicore platforms,” in <i>24th Intl. Conf. on Field Programmable Logic and Applications (FPL)</i>, 2014, pp. 1–4.","ama":"Ho N, Kaufmann P, Platzner M. A hardware/software infrastructure for performance monitoring on LEON3 multicore platforms. In: <i>24th Intl. Conf. on Field Programmable Logic and Applications (FPL)</i>. ; 2014:1-4. doi:<a href=\"https://doi.org/10.1109/FPL.2014.6927437\">10.1109/FPL.2014.6927437</a>","apa":"Ho, N., Kaufmann, P., &#38; Platzner, M. (2014). A hardware/software infrastructure for performance monitoring on LEON3 multicore platforms. In <i>24th Intl. Conf. on Field Programmable Logic and Applications (FPL)</i> (pp. 1–4). <a href=\"https://doi.org/10.1109/FPL.2014.6927437\">https://doi.org/10.1109/FPL.2014.6927437</a>","short":"N. Ho, P. Kaufmann, M. Platzner, in: 24th Intl. Conf. on Field Programmable Logic and Applications (FPL), 2014, pp. 1–4.","mla":"Ho, Nam, et al. “A Hardware/Software Infrastructure for Performance Monitoring on LEON3 Multicore Platforms.” <i>24th Intl. Conf. on Field Programmable Logic and Applications (FPL)</i>, 2014, pp. 1–4, doi:<a href=\"https://doi.org/10.1109/FPL.2014.6927437\">10.1109/FPL.2014.6927437</a>.","bibtex":"@inproceedings{Ho_Kaufmann_Platzner_2014, title={A hardware/software infrastructure for performance monitoring on LEON3 multicore platforms}, DOI={<a href=\"https://doi.org/10.1109/FPL.2014.6927437\">10.1109/FPL.2014.6927437</a>}, booktitle={24th Intl. Conf. on Field Programmable Logic and Applications (FPL)}, author={Ho, Nam and Kaufmann, Paul and Platzner, Marco}, year={2014}, pages={1–4} }"},"user_id":"3118","keyword":["Linux","hardware-software codesign","multiprocessing systems","parallel processing","LEON3 multicore platform","Linux kernel","PMU","hardware counters","hardware-software infrastructure","high performance embedded computing","perf_event","performance monitoring unit","Computer architecture","Hardware","Monitoring","Phasor measurement units","Radiation detectors","Registers","Software"],"department":[{"_id":"78"}],"title":"A hardware/software infrastructure for performance monitoring on LEON3 multicore platforms","author":[{"last_name":"Ho","first_name":"Nam","full_name":"Ho, Nam"},{"last_name":"Kaufmann","first_name":"Paul","full_name":"Kaufmann, Paul"},{"first_name":"Marco","full_name":"Platzner, Marco","id":"398","last_name":"Platzner"}],"project":[{"grant_number":"257906","_id":"31","name":"Engineering Proprioception in Computing Systems"}],"doi":"10.1109/FPL.2014.6927437","_id":"10674","page":"1-4","date_updated":"2022-01-06T06:50:49Z","publication":"24th Intl. Conf. on Field Programmable Logic and Applications (FPL)","date_created":"2019-07-10T11:18:01Z","type":"conference","year":"2014","language":[{"iso":"eng"}],"status":"public"},{"department":[{"_id":"58"}],"citation":{"short":"M. Becker, C. Kuznik, W. Müller, in: IEEE, Berlin, 2014.","mla":"Becker, Markus, et al. <i>Fault Effect Modeling in a Heterogeneous SystemC Based Virtual Platform Framework for Cyber Physical Systems</i>. IEEE, 2014, doi:<a href=\"https://doi.org/10.1109/ICCPS.2014.6843726\">10.1109/ICCPS.2014.6843726</a>.","bibtex":"@inproceedings{Becker_Kuznik_Müller_2014, place={Berlin}, title={Fault Effect Modeling in a Heterogeneous SystemC Based Virtual Platform Framework for Cyber Physical Systems}, DOI={<a href=\"https://doi.org/10.1109/ICCPS.2014.6843726\">10.1109/ICCPS.2014.6843726</a>}, publisher={IEEE}, author={Becker, Markus and Kuznik, Christoph and Müller, Wolfgang}, year={2014} }","chicago":"Becker, Markus, Christoph Kuznik, and Wolfgang Müller. “Fault Effect Modeling in a Heterogeneous SystemC Based Virtual Platform Framework for Cyber Physical Systems.” Berlin: IEEE, 2014. <a href=\"https://doi.org/10.1109/ICCPS.2014.6843726\">https://doi.org/10.1109/ICCPS.2014.6843726</a>.","ieee":"M. Becker, C. Kuznik, and W. Müller, “Fault Effect Modeling in a Heterogeneous SystemC Based Virtual Platform Framework for Cyber Physical Systems,” presented at the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), Berlin, 2014, doi: <a href=\"https://doi.org/10.1109/ICCPS.2014.6843726\">10.1109/ICCPS.2014.6843726</a>.","ama":"Becker M, Kuznik C, Müller W. Fault Effect Modeling in a Heterogeneous SystemC Based Virtual Platform Framework for Cyber Physical Systems. In: IEEE; 2014. doi:<a href=\"https://doi.org/10.1109/ICCPS.2014.6843726\">10.1109/ICCPS.2014.6843726</a>","apa":"Becker, M., Kuznik, C., &#38; Müller, W. (2014). <i>Fault Effect Modeling in a Heterogeneous SystemC Based Virtual Platform Framework for Cyber Physical Systems</i>. ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), Berlin. <a href=\"https://doi.org/10.1109/ICCPS.2014.6843726\">https://doi.org/10.1109/ICCPS.2014.6843726</a>"},"keyword":["Computational modeling","Finite element analysis","Prototypes","Abstracts","Software","Fault tolerance","Fault tolerant systems"],"user_id":"5786","place":"Berlin","abstract":[{"lang":"eng","text":"This paper presents an advanced eight levels spanning SystemC based virtual platform methodology and framework - referred to as HeroeS 3 - providing smooth application to platform mapping and continuous co-refinement of a virtual prototype with its physical environment model. For heterogeneity support, various SystemC extensions are combined covering continuous/discrete models of computation and different communication abstractions, such as analog mixed-signal models, abstract RTOS/HAL/middleware models, TLM bus models, and QEMU wrappers. We enable dependability assessment by Fault Effect Modeling (FEM) at the virtual prototype in order to avoid risking physical injury or damage. Also, simulation results are deterministic and can be evaluated interactively or offline. We apply FEM to both the physical environment model and the different abstractions of the virtual prototype. Currently, we focus on sensor failures and application control flow errors."}],"doi":"10.1109/ICCPS.2014.6843726","title":"Fault Effect Modeling in a Heterogeneous SystemC Based Virtual Platform Framework for Cyber Physical Systems","conference":{"location":"Berlin","name":"ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)"},"author":[{"last_name":"Becker","first_name":"Markus","full_name":"Becker, Markus"},{"first_name":"Christoph","full_name":"Kuznik, Christoph","last_name":"Kuznik"},{"last_name":"Müller","id":"16243","full_name":"Müller, Wolfgang","first_name":"Wolfgang"}],"date_updated":"2023-01-16T11:57:22Z","_id":"36918","language":[{"iso":"eng"}],"type":"conference","year":"2014","status":"public","date_created":"2023-01-16T11:57:08Z","publisher":"IEEE"},{"doi":"10.1109/tc.2014.2329687","extern":"1","author":[{"last_name":"Alizadeh","full_name":"Alizadeh, Bijan","first_name":"Bijan"},{"full_name":"Behnam, Payman","first_name":"Payman","last_name":"Behnam"},{"orcid":"https://orcid.org/0000-0001-7246-0610","first_name":"Somayeh","full_name":"Sadeghi-Kohan, Somayeh","id":"78614","last_name":"Sadeghi-Kohan"}],"title":"A Scalable Formal Debugging Approach with Auto-Correction Capability based on Static Slicing and Dynamic Ranking for RTL Datapath Designs","department":[{"_id":"48"}],"keyword":["Computational Theory and Mathematics","Hardware and Architecture","Theoretical Computer Science","Software"],"publication_status":"published","user_id":"78614","citation":{"apa":"Alizadeh, B., Behnam, P., &#38; Sadeghi-Kohan, S. (2014). A Scalable Formal Debugging Approach with Auto-Correction Capability based on Static Slicing and Dynamic Ranking for RTL Datapath Designs. <i>IEEE Transactions on Computers</i>, 1–1. <a href=\"https://doi.org/10.1109/tc.2014.2329687\">https://doi.org/10.1109/tc.2014.2329687</a>","ama":"Alizadeh B, Behnam P, Sadeghi-Kohan S. A Scalable Formal Debugging Approach with Auto-Correction Capability based on Static Slicing and Dynamic Ranking for RTL Datapath Designs. <i>IEEE Transactions on Computers</i>. Published online 2014:1-1. doi:<a href=\"https://doi.org/10.1109/tc.2014.2329687\">10.1109/tc.2014.2329687</a>","chicago":"Alizadeh, Bijan, Payman Behnam, and Somayeh Sadeghi-Kohan. “A Scalable Formal Debugging Approach with Auto-Correction Capability Based on Static Slicing and Dynamic Ranking for RTL Datapath Designs.” <i>IEEE Transactions on Computers</i>, 2014, 1–1. <a href=\"https://doi.org/10.1109/tc.2014.2329687\">https://doi.org/10.1109/tc.2014.2329687</a>.","ieee":"B. Alizadeh, P. Behnam, and S. Sadeghi-Kohan, “A Scalable Formal Debugging Approach with Auto-Correction Capability based on Static Slicing and Dynamic Ranking for RTL Datapath Designs,” <i>IEEE Transactions on Computers</i>, pp. 1–1, 2014, doi: <a href=\"https://doi.org/10.1109/tc.2014.2329687\">10.1109/tc.2014.2329687</a>.","mla":"Alizadeh, Bijan, et al. “A Scalable Formal Debugging Approach with Auto-Correction Capability Based on Static Slicing and Dynamic Ranking for RTL Datapath Designs.” <i>IEEE Transactions on Computers</i>, Institute of Electrical and Electronics Engineers (IEEE), 2014, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tc.2014.2329687\">10.1109/tc.2014.2329687</a>.","bibtex":"@article{Alizadeh_Behnam_Sadeghi-Kohan_2014, title={A Scalable Formal Debugging Approach with Auto-Correction Capability based on Static Slicing and Dynamic Ranking for RTL Datapath Designs}, DOI={<a href=\"https://doi.org/10.1109/tc.2014.2329687\">10.1109/tc.2014.2329687</a>}, journal={IEEE Transactions on Computers}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Alizadeh, Bijan and Behnam, Payman and Sadeghi-Kohan, Somayeh}, year={2014}, pages={1–1} }","short":"B. Alizadeh, P. Behnam, S. Sadeghi-Kohan, IEEE Transactions on Computers (2014) 1–1."},"status":"public","language":[{"iso":"eng"}],"year":"2014","type":"journal_article","publication_identifier":{"issn":["0018-9340"]},"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_created":"2023-08-02T11:15:22Z","publication":"IEEE Transactions on Computers","date_updated":"2023-08-02T11:32:37Z","page":"1-1","_id":"46266"},{"citation":{"short":"M. Becker, M. Luckey, S. Becker, in: {Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}, ACM, New York, NY, USA, 2012, pp. 117–122.","mla":"Becker, Matthias, et al. “Model-Driven Performance Engineering of Self-Adaptive Systems: A Survey.” <i>{Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}</i>, ACM, 2012, pp. 117–22, doi:<a href=\"https://doi.org/10.1145/2304696.2304716\">10.1145/2304696.2304716</a>.","bibtex":"@inproceedings{Becker_Luckey_Becker_2012, place={New York, NY, USA}, title={Model-driven Performance Engineering of Self-adaptive Systems: A Survey}, DOI={<a href=\"https://doi.org/10.1145/2304696.2304716\">10.1145/2304696.2304716</a>}, booktitle={{Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}}, publisher={ACM}, author={Becker, Matthias and Luckey, Markus and Becker, Steffen}, year={2012}, pages={117–122} }","chicago":"Becker, Matthias, Markus Luckey, and Steffen Becker. “Model-Driven Performance Engineering of Self-Adaptive Systems: A Survey.” In <i>{Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}</i>, 117–22. New York, NY, USA: ACM, 2012. <a href=\"https://doi.org/10.1145/2304696.2304716\">https://doi.org/10.1145/2304696.2304716</a>.","ieee":"M. Becker, M. Luckey, and S. Becker, “Model-driven Performance Engineering of Self-adaptive Systems: A Survey,” in <i>{Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}</i>, 2012, pp. 117–122.","ama":"Becker M, Luckey M, Becker S. Model-driven Performance Engineering of Self-adaptive Systems: A Survey. In: <i>{Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}</i>. New York, NY, USA: ACM; 2012:117-122. doi:<a href=\"https://doi.org/10.1145/2304696.2304716\">10.1145/2304696.2304716</a>","apa":"Becker, M., Luckey, M., &#38; Becker, S. (2012). Model-driven Performance Engineering of Self-adaptive Systems: A Survey. In <i>{Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}</i> (pp. 117–122). New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/2304696.2304716\">https://doi.org/10.1145/2304696.2304716</a>"},"user_id":"4870","keyword":["model-driven performance engineering","self-*","Self-adaptation","software performance"],"place":"New York, NY, USA","doi":"10.1145/2304696.2304716","title":"Model-driven Performance Engineering of Self-adaptive Systems: A Survey","author":[{"last_name":"Becker","full_name":"Becker, Matthias","first_name":"Matthias"},{"last_name":"Luckey","full_name":"Luckey, Markus","first_name":"Markus"},{"first_name":"Steffen","full_name":"Becker, Steffen","last_name":"Becker"}],"date_updated":"2022-01-06T06:55:39Z","page":"117-122","_id":"22737","type":"conference","year":"2012","publication_identifier":{"isbn":["978-1-4503-1346-9"]},"status":"public","publication":"{Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA)}","date_created":"2021-07-15T08:38:08Z","publisher":"ACM"},{"page":"625--643","_id":"4706","issue":"4","date_updated":"2022-01-06T07:01:19Z","date_created":"2018-10-12T08:36:51Z","publication":"Business Process Management Journal","status":"public","publication_identifier":{"issn":["14637154"],"isbn":["1020120096"]},"year":"2012","type":"journal_article","keyword":["Architecture","Business activity monitoring","Business process management","Business process re-engineering","Complex event processing","Computer software","Standard software"],"user_id":"72849","citation":{"chicago":"Janiesch, Christian, Martin Matzner, and Oliver Müller. “Beyond Process Monitoring: A Proof-of-Concept of Event-Driven Business Activity Management.” <i>Business Process Management Journal</i>, no. 4 (2012): 625--643. <a href=\"https://doi.org/10.1108/14637151211253765\">https://doi.org/10.1108/14637151211253765</a>.","ieee":"C. Janiesch, M. Matzner, and O. Müller, “Beyond process monitoring: A proof-of-concept of event-driven business activity management,” <i>Business Process Management Journal</i>, no. 4, pp. 625--643, 2012.","apa":"Janiesch, C., Matzner, M., &#38; Müller, O. (2012). Beyond process monitoring: A proof-of-concept of event-driven business activity management. <i>Business Process Management Journal</i>, (4), 625--643. <a href=\"https://doi.org/10.1108/14637151211253765\">https://doi.org/10.1108/14637151211253765</a>","ama":"Janiesch C, Matzner M, Müller O. Beyond process monitoring: A proof-of-concept of event-driven business activity management. <i>Business Process Management Journal</i>. 2012;(4):625--643. doi:<a href=\"https://doi.org/10.1108/14637151211253765\">10.1108/14637151211253765</a>","short":"C. Janiesch, M. Matzner, O. Müller, Business Process Management Journal (2012) 625--643.","mla":"Janiesch, Christian, et al. “Beyond Process Monitoring: A Proof-of-Concept of Event-Driven Business Activity Management.” <i>Business Process Management Journal</i>, no. 4, 2012, pp. 625--643, doi:<a href=\"https://doi.org/10.1108/14637151211253765\">10.1108/14637151211253765</a>.","bibtex":"@article{Janiesch_Matzner_Müller_2012, title={Beyond process monitoring: A proof-of-concept of event-driven business activity management}, DOI={<a href=\"https://doi.org/10.1108/14637151211253765\">10.1108/14637151211253765</a>}, number={4}, journal={Business Process Management Journal}, author={Janiesch, Christian and Matzner, Martin and Müller, Oliver}, year={2012}, pages={625--643} }"},"extern":"1","author":[{"full_name":"Janiesch, Christian","first_name":"Christian","last_name":"Janiesch"},{"full_name":"Matzner, Martin","first_name":"Martin","last_name":"Matzner"},{"last_name":"Müller","id":"72849","full_name":"Müller, Oliver","first_name":"Oliver"}],"title":"Beyond process monitoring: A proof-of-concept of event-driven business activity management","abstract":[{"text":"Purpose – The purpose of this paper is to show how to employ complex event processing (CEP) for the observation and management of business processes. It proposes a conceptual architecture of BPM event producer, processor, and consumer and describes technical implications for the application with standard software in a perfect order scenario. Design/methodology/approach – The authors discuss business process analytics as the technological background. The capabilities of CEP in a BPM context are outlined an architecture design is proposed. A sophisticated proof-of-concept demonstrates its applicability. Findings – The results overcome the separation and data latency issues of process controlling, monitoring, and simulation. Distinct analyses of past, present, and future blur into a holistic real-time approach. The authors highlight the necessity for configurable event producer in BPM engines, process event support in CEP engines, a common process event format, connectors to visualizers, notifiers and return channels to the BPM engine. Research limitations/implications – Further research will thoroughly evaluate the approach in a variety of business settings. New concepts and standards for the architecture's building blocks will be needed to improve maintainability and operability. Practical implications – Managers learn how CEP can yield insights into business processes' operations. The paper illustrates a path to overcome inflexibility, latency, and missing feedback mechanisms of current process modeling and control solutions. Software vendors might be interested in the conceptualization and the described needs for further development. Originality/value – So far, there is no commercial CEP-based BPM solution which facilitates a round trip from insight to action as outlines. As major software vendors have begun developing solutions (BPM/BPA solutions), this paper will stimulate a debate between research and practice on suitable design and technology.","lang":"eng"}],"doi":"10.1108/14637151211253765"},{"conference":{"end_date":"2011-06-29","start_date":"2011-06-27","location":"London, UK","name":"International Conference on Information Society (i-Society 2011)"},"author":[{"last_name":"Schuster","first_name":"Jörg","full_name":"Schuster, Jörg"},{"last_name":"Lee","first_name":"Yeong Su","full_name":"Lee, Yeong Su"},{"first_name":"Despina ","full_name":"Kobothanassi, Despina ","last_name":"Kobothanassi"},{"last_name":"Bargel","full_name":"Bargel, Matthias","first_name":"Matthias"},{"orcid":"0000-0002-8180-5606","id":"42496","last_name":"Geierhos","full_name":"Geierhos, Michaela","first_name":"Michaela"}],"place":"Piscataway, NJ, USA","citation":{"ieee":"J. Schuster, Y. S. Lee, D. Kobothanassi, M. Bargel, and M. Geierhos, “SCM - A Simple, Modular and Flexible Customer Interaction Management System,” in <i>International Conference on Information Society (i-Society 2011)</i>, London, UK, 2011, pp. 153–158.","chicago":"Schuster, Jörg, Yeong Su Lee, Despina  Kobothanassi, Matthias Bargel, and Michaela Geierhos. “SCM - A Simple, Modular and Flexible Customer Interaction Management System.” In <i>International Conference on Information Society (i-Society 2011)</i>, 153–58. Piscataway, NJ, USA: IEEE, 2011.","apa":"Schuster, J., Lee, Y. S., Kobothanassi, D., Bargel, M., &#38; Geierhos, M. (2011). SCM - A Simple, Modular and Flexible Customer Interaction Management System. In <i>International Conference on Information Society (i-Society 2011)</i> (pp. 153–158). Piscataway, NJ, USA: IEEE.","ama":"Schuster J, Lee YS, Kobothanassi D, Bargel M, Geierhos M. SCM - A Simple, Modular and Flexible Customer Interaction Management System. In: <i>International Conference on Information Society (i-Society 2011)</i>. Piscataway, NJ, USA: IEEE; 2011:153-158.","short":"J. Schuster, Y.S. Lee, D. Kobothanassi, M. Bargel, M. Geierhos, in: International Conference on Information Society (i-Society 2011), IEEE, Piscataway, NJ, USA, 2011, pp. 153–158.","bibtex":"@inproceedings{Schuster_Lee_Kobothanassi_Bargel_Geierhos_2011, place={Piscataway, NJ, USA}, title={SCM - A Simple, Modular and Flexible Customer Interaction Management System}, booktitle={International Conference on Information Society (i-Society 2011)}, publisher={IEEE}, author={Schuster, Jörg and Lee, Yeong Su and Kobothanassi, Despina  and Bargel, Matthias and Geierhos, Michaela}, year={2011}, pages={153–158} }","mla":"Schuster, Jörg, et al. “SCM - A Simple, Modular and Flexible Customer Interaction Management System.” <i>International Conference on Information Society (i-Society 2011)</i>, IEEE, 2011, pp. 153–58."},"publication_status":"published","department":[{"_id":"36"},{"_id":"1"},{"_id":"579"}],"date_created":"2018-01-29T15:15:25Z","publisher":"IEEE","publication_identifier":{"isbn":["978-1-61284-148-9"],"eisbn":["978-0-9564263-8-3 "]},"year":"2011","language":[{"iso":"eng"}],"status":"public","_id":"1120","date_updated":"2022-01-06T06:50:58Z","title":"SCM - A Simple, Modular and Flexible Customer Interaction Management System","extern":"1","abstract":[{"lang":"eng","text":"SCM is a simple, modular and flexible system for web monitoring and customer interaction management. In our view, its main advantages are the following: It is completely web based. It combines all technologies, data, software agents and human agents involved in the monitoring and customer interaction process. It can be used for messages written in any natural language. Although the prototype of SCM is designed for classifying and processing messages about mobile-phone related problems in social networks, SCM can easily be adapted to other text types such as discussion board posts, blogs or emails. Unlike comparable systems, SCM uses linguistic technologies to classify messages and recognize paraphrases of product names. For two reasons, product name paraphrasing plays a major role in SCM: First, product names typically have many, sometimes hundreds or thousands of intralingual paraphrases. Secondly, product names have interlingual paraphrases: The same products are often called or spelt differently in different countries and/or languages. By mapping product name variants to an international canonical form, SCM allows for answering questions like Which statements are made about this mobile phone in which languages/in which social networks/in which countries/...? The SCM product name paraphrasing engine is designed in such a way that standard variants are assigned automatically, regular variants are assigned semiautomatically and idiosyncratic variants can be added manually. With this and similar features we try to realize our philosophy of simplicity, modularity and flexibility: Whatever can be done automatically is done automatically. But manual intervention is always possible and easy and it does not conflict in any way with the automatic functions of SCM."}],"user_id":"42496","keyword":["Social Media Business Integration","Contact Center Application Support","Monitoring Social Conversations","Social Customer Interaction Management","Monitoring","Software Agents"],"quality_controlled":"1","publication":"International Conference on Information Society (i-Society 2011)","type":"conference","page":"153-158"}]
