[{"title":"Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology","conference":{"name":"ECIS 2024","location":"Paphos, Cyprus"},"date_updated":"2025-03-21T13:33:23Z","author":[{"first_name":"Christian","full_name":"Vorbohle, Christian","id":"29951","last_name":"Vorbohle"}],"date_created":"2024-11-06T11:06:05Z","year":"2024","citation":{"chicago":"Vorbohle, Christian. “Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology.” In <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>, 2024.","ieee":"C. Vorbohle, “Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology,” presented at the ECIS 2024, Paphos, Cyprus, 2024.","ama":"Vorbohle C. Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology. In: <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>. ; 2024.","short":"C. Vorbohle, in: Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024), 2024.","bibtex":"@inproceedings{Vorbohle_2024, title={Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology}, booktitle={Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)}, author={Vorbohle, Christian}, year={2024} }","mla":"Vorbohle, Christian. “Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology.” <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>, 2024.","apa":"Vorbohle, C. (2024). Bridging Boundaries: Enhancing Visual Inquiry Tools for Ecosystems through Design Archaeology. <i>Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)</i>. ECIS 2024, Paphos, Cyprus."},"related_material":{"link":[{"relation":"confirmation","url":"https://aisel.aisnet.org/ecis2024/track23_designresearch/track23_designresearch/2/"}]},"keyword":["Design Science Research","Design Archaeology","Canvas Analysis","Business Model Tools"],"language":[{"iso":"eng"}],"_id":"56918","user_id":"29951","abstract":[{"text":"Joint value creation of organizations in ecosystems have a high failure rate, stressing the need for tools that enable the alignment of business models through visual inquiry. However, existing visual inquiry tools rarely consider recent design knowledge or ecosystem understanding. This leads to dissatisfied users and impedes the full realization of ecosystems’ potential. This short paper proposes an archaeological design science approach for enhancing the design of visual inquiry tools (e.g., a canvas) for ecosystems. Preliminary findings reveal 24 relevant artifacts, and shortcomings in the creation of conceptual models and rigorous evaluations. The proposed research process aims to develop design principles for more effective tools to bridge the gap between visual inquiry tools and ecosystems. This research contributes to design science research by reutilizing design knowledge and further developing the archaeological design approach. It also offers valuable information to practitioners about existing business model tools for the creation of ecosystems.","lang":"eng"}],"status":"public","type":"conference","publication":"Proceedings of the Thirty-Second European Conference on Information Systems (ECIS 2024)"},{"abstract":[{"lang":"eng","text":"The development of effective business models is an essential task in highly competitive markets like mobile ecosystems. Existing development methods for these business models do not specifically focus that the development process profoundly depends on the situation (e.g., market size, regulations) of the mobile app developer. Here, a mismatch between method and situation can lead to poor resource management and longer development cycles. In software engineering, situational method engineering is used for software projects to configure a development method out of a method repository based on the project situation. Analogously, we support creating situation-specific business model development methods with a method base and new user roles. Here, the method engineer obtains the knowledge of the domain expert and stores it in the method base as elements, building blocks, and patterns. The expert knowledge is derived from a grey literature review on mobile development processes. After this, the method engineer constructs the development method based on the described situation of the business developer. We provide an open-source tool and evaluate it by constructing a local event platform's business model development method.    "}],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"open_access","file_name":"EMMSAD21.pdf","file_id":"22769","file_size":638707,"date_created":"2021-07-20T16:19:27Z","creator":"sego","date_updated":"2021-07-20T16:20:15Z"}],"status":"public","type":"conference","publication":"Enterprise, Business-Process and Information Systems Modeling","ddc":["000"],"keyword":["Business Model Development","Situational Method Engineering","Mobile App","Business Model Development Tools"],"language":[{"iso":"eng"}],"file_date_updated":"2021-07-20T16:20:15Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"_id":"21639","user_id":"47208","department":[{"_id":"66"},{"_id":"534"}],"year":"2021","citation":{"bibtex":"@inproceedings{Gottschalk_Yigitbas_Nowosad_Engels_2021, title={Situation-specific Business Model Development Methods for Mobile App Developers}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">10.1007/978-3-030-79186-5_17</a>}, booktitle={Enterprise, Business-Process and Information Systems Modeling}, publisher={Springer}, author={Gottschalk, Sebastian and Yigitbas, Enes and Nowosad, Alexander and Engels, Gregor}, year={2021} }","short":"S. Gottschalk, E. Yigitbas, A. Nowosad, G. Engels, in: Enterprise, Business-Process and Information Systems Modeling, Springer, 2021.","mla":"Gottschalk, Sebastian, et al. “Situation-Specific Business Model Development Methods for Mobile App Developers.” <i>Enterprise, Business-Process and Information Systems Modeling</i>, Springer, 2021, doi:<a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">10.1007/978-3-030-79186-5_17</a>.","apa":"Gottschalk, S., Yigitbas, E., Nowosad, A., &#38; Engels, G. (2021). Situation-specific Business Model Development Methods for Mobile App Developers. In <i>Enterprise, Business-Process and Information Systems Modeling</i>. Springer. <a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">https://doi.org/10.1007/978-3-030-79186-5_17</a>","chicago":"Gottschalk, Sebastian, Enes Yigitbas, Alexander Nowosad, and Gregor Engels. “Situation-Specific Business Model Development Methods for Mobile App Developers.” In <i>Enterprise, Business-Process and Information Systems Modeling</i>. Springer, 2021. <a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">https://doi.org/10.1007/978-3-030-79186-5_17</a>.","ieee":"S. Gottschalk, E. Yigitbas, A. Nowosad, and G. Engels, “Situation-specific Business Model Development Methods for Mobile App Developers,” in <i>Enterprise, Business-Process and Information Systems Modeling</i>, 2021.","ama":"Gottschalk S, Yigitbas E, Nowosad A, Engels G. Situation-specific Business Model Development Methods for Mobile App Developers. In: <i>Enterprise, Business-Process and Information Systems Modeling</i>. Springer; 2021. doi:<a href=\"https://doi.org/10.1007/978-3-030-79186-5_17\">10.1007/978-3-030-79186-5_17</a>"},"has_accepted_license":"1","title":"Situation-specific Business Model Development Methods for Mobile App Developers","doi":"10.1007/978-3-030-79186-5_17","publisher":"Springer","oa":"1","date_updated":"2022-01-06T06:55:08Z","date_created":"2021-04-20T13:23:41Z","author":[{"first_name":"Sebastian","last_name":"Gottschalk","full_name":"Gottschalk, Sebastian","id":"47208"},{"last_name":"Yigitbas","orcid":"0000-0002-5967-833X","id":"8447","full_name":"Yigitbas, Enes","first_name":"Enes"},{"first_name":"Alexander","last_name":"Nowosad","full_name":"Nowosad, Alexander"},{"full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"}]},{"_id":"20533","user_id":"5786","department":[{"_id":"76"}],"keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"language":[{"iso":"eng"}],"type":"journal_article","publication":"IEEE Transactions on Software Engineering","status":"public","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-27T10:48:38Z","author":[{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"}],"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"doi":"10.1109/TSE.2019.2948910","publication_identifier":{"issn":["2326-3881"]},"year":"2019","citation":{"ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>. Published online 2019:1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2019, doi: <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>.","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>"},"page":"1-1"},{"publication":"Proceedings of the ACM Creativity & Cognition","accept":"1","type":"conference","status":"public","file":[{"creator":"dsz","date_created":"2019-10-17T06:58:40Z","date_updated":"2019-10-17T06:58:40Z","access_level":"closed","file_name":"p547-szopinski(1).pdf","file_id":"13899","file_size":1005738,"content_type":"application/pdf","relation":"main_file","success":1}],"abstract":[{"lang":"eng","text":"A business model describes the mechanisms whereby a firm creates, delivers, and captures value. Following the steadily growing interest in business model innovation, software tools have shown great potential in supporting business model development and innovation. Yet, understanding the cognitive processes involved in the generation of business model ideas is an aspect of software design-knowledge that has so far been neglected. To investigate whether providing stimuli – in this case, brainstorming questions – can enhance individual creativity in this context, we conduct an exploratory experiment with over 100 participants. Our study is the first to systematically investigate the process of idea generation using a software-based business model development tool with stimuli. Our preliminary findings have the potential to support the future development of business model development tools and to refine the research design used to evaluate such tools."}],"department":[{"_id":"276"}],"user_id":"36372","_id":"9850","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C5","_id":"17"}],"file_date_updated":"2019-10-17T06:58:40Z","language":[{"iso":"eng"}],"keyword":["Business model innovation","idea generation","cognitive stimuli","business model development tools","experiment","creativity support system"],"ddc":["330"],"citation":{"apa":"Szopinski, D. (2019). Can stimuli improve business model idea generation? Developing software-based tools for business model innovation. In <i>Proceedings of the ACM Creativity &#38; Cognition</i>. San Diego, USA.","short":"D. Szopinski, in: Proceedings of the ACM Creativity &#38; Cognition, 2019.","bibtex":"@inproceedings{Szopinski_2019, title={Can stimuli improve business model idea generation? Developing software-based tools for business model innovation}, booktitle={Proceedings of the ACM Creativity &#38; Cognition}, author={Szopinski, Daniel}, year={2019} }","mla":"Szopinski, Daniel. “Can Stimuli Improve Business Model Idea Generation? Developing Software-Based Tools for Business Model Innovation.” <i>Proceedings of the ACM Creativity &#38; Cognition</i>, 2019.","ama":"Szopinski D. Can stimuli improve business model idea generation? Developing software-based tools for business model innovation. In: <i>Proceedings of the ACM Creativity &#38; Cognition</i>. ; 2019.","chicago":"Szopinski, Daniel. “Can Stimuli Improve Business Model Idea Generation? Developing Software-Based Tools for Business Model Innovation.” In <i>Proceedings of the ACM Creativity &#38; Cognition</i>, 2019.","ieee":"D. Szopinski, “Can stimuli improve business model idea generation? Developing software-based tools for business model innovation,” in <i>Proceedings of the ACM Creativity &#38; Cognition</i>, San Diego, USA, 2019."},"year":"2019","date_created":"2019-05-20T09:59:01Z","author":[{"full_name":"Szopinski, Daniel","id":"36372","last_name":"Szopinski","first_name":"Daniel"}],"date_updated":"2019-10-17T06:58:46Z","conference":{"name":"ACM Creativity & Cognition 2019","location":"San Diego, USA"},"title":"Can stimuli improve business model idea generation? Developing software-based tools for business model innovation"},{"publication_identifier":{"issn":["1573-0077"]},"citation":{"ama":"Soenen T, Vicens F, Bonnet J, et al. SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies. In: <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>. ; 2019:707-708.","chicago":"Soenen, Thomas, Felipe Vicens, José Bonnet, Carlos Parada, Evgenia Kapassa, Marious Touloupou, Eleni Fotopulou, et al. “SLA-Controlled Proxy Service Through Customisable MANO Supporting Operator Policies.” In <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>, 707–8, 2019.","ieee":"T. Soenen <i>et al.</i>, “SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies,” in <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>, Arlington, VA, USA, USA, 2019, pp. 707–708.","apa":"Soenen, T., Vicens, F., Bonnet, J., Parada, C., Kapassa, E., Touloupou, M., … Tavernier, W. (2019). SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies. In <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i> (pp. 707–708). Arlington, VA, USA, USA.","mla":"Soenen, Thomas, et al. “SLA-Controlled Proxy Service Through Customisable MANO Supporting Operator Policies.” <i>2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</i>, 2019, pp. 707–08.","bibtex":"@inproceedings{Soenen_Vicens_Bonnet_Parada_Kapassa_Touloupou_Fotopulou_Zafeiropoulos_Pol_Kolometsos_et al._2019, title={SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies}, booktitle={2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, author={Soenen, Thomas and Vicens, Felipe and Bonnet, José and Parada, Carlos and Kapassa, Evgenia and Touloupou, Marious and Fotopulou, Eleni and Zafeiropoulos, Anastasios and Pol, Ana and Kolometsos, Stavros and et al.}, year={2019}, pages={707–708} }","short":"T. Soenen, F. Vicens, J. Bonnet, C. Parada, E. Kapassa, M. Touloupou, E. Fotopulou, A. Zafeiropoulos, A. Pol, S. Kolometsos, G. Xilouris, P. Alemany, R. Vilalta, P. Trakadas, P. Karkazis, M. Peuster, W. Tavernier, in: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019, pp. 707–708."},"page":"707-708","year":"2019","author":[{"last_name":"Soenen","full_name":"Soenen, Thomas","first_name":"Thomas"},{"last_name":"Vicens","full_name":"Vicens, Felipe","first_name":"Felipe"},{"full_name":"Bonnet, José","last_name":"Bonnet","first_name":"José"},{"last_name":"Parada","full_name":"Parada, Carlos","first_name":"Carlos"},{"last_name":"Kapassa","full_name":"Kapassa, Evgenia","first_name":"Evgenia"},{"full_name":"Touloupou, Marious","last_name":"Touloupou","first_name":"Marious"},{"first_name":"Eleni","last_name":"Fotopulou","full_name":"Fotopulou, Eleni"},{"first_name":"Anastasios","last_name":"Zafeiropoulos","full_name":"Zafeiropoulos, Anastasios"},{"first_name":"Ana","full_name":"Pol, Ana","last_name":"Pol"},{"full_name":"Kolometsos, Stavros","last_name":"Kolometsos","first_name":"Stavros"},{"first_name":"George","full_name":"Xilouris, George","last_name":"Xilouris"},{"last_name":"Alemany","full_name":"Alemany, Pol","first_name":"Pol"},{"last_name":"Vilalta","full_name":"Vilalta, Ricard","first_name":"Ricard"},{"first_name":"Panos","last_name":"Trakadas","full_name":"Trakadas, Panos"},{"first_name":"Panos","full_name":"Karkazis, Panos","last_name":"Karkazis"},{"first_name":"Manuel","full_name":"Peuster, Manuel","id":"13271","last_name":"Peuster"},{"full_name":"Tavernier, Wouter","last_name":"Tavernier","first_name":"Wouter"}],"date_created":"2019-12-18T06:54:18Z","date_updated":"2022-01-06T06:52:21Z","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8717922"}],"conference":{"name":"IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","location":"Arlington, VA, USA, USA"},"title":"SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies","type":"conference","publication":"2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","status":"public","abstract":[{"lang":"eng","text":"Service Level Agreements are essential tools enabling clients and telco operators to specify required quality of service. The 5GTANGO NFV platform enables SLAs through policies and custom service lifecycle management components. This allows the operator to trigger certain lifecycle management events for a service, and the network service developer to define how to execute such events (e.g., how to scale). In this demo we will demonstrate this unique 5GTANGO concept using an elastic proxy service supported by a high availability SLA enforced through a range of traffic regimes."}],"user_id":"13271","project":[{"grant_number":"761493","_id":"28","name":"5G Development and validation platform for global industry-specific network services and Apps"}],"_id":"15368","language":[{"iso":"eng"}],"keyword":["5G mobile communication","contracts","quality of service","telecommunication traffic","virtualisation","custom service lifecycle management components","lifecycle management events","network service developer","elastic proxy service","SLA-controlled proxy service","customisable MANO","operator policies","Service Level Agreements","unique 5G TANGO concept","5G TANGO NFV platform","quality of service","traffic regimes","high availability SLA","Monitoring","Probes","Portals","Quality of service","Tools","Servers","Graphical user interfaces"]},{"keyword":["Android Taint Analysis","Cooperation","Precision","Tools"],"ddc":["004"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Recent years have seen the development of numerous tools for the analysis of taint flows in Android apps. Taint analyses aim at detecting data leaks, accidentally or by purpose programmed into apps. Often, such tools specialize in the treatment of specific features impeding precise taint analysis (like reflection or inter-app communication). This multitude of tools, their specific applicability and their various combination options complicate the selection of a tool (or multiple tools) when faced with an analysis instance, even for knowledgeable users, and hence hinders the successful adoption of taint analyses.\r\n\r\nIn this work, we thus present CoDiDroid, a framework for cooperative Android app analysis. CoDiDroid (1) allows users to ask questions about flows in apps in varying degrees of detail, (2) automatically generates subtasks for answering such questions, (3) distributes tasks onto analysis tools (currently DroidRA, FlowDroid, HornDroid, IC3 and two novel tools) and (4) at the end merges tool answers on subtasks into an overall answer. Thereby, users are freed from having to learn about the use and functionality of all these tools while still being able to leverage their capabilities. Moreover, we experimentally show that cooperation among tools pays off with respect to effectiveness, precision and scalability."}],"file":[{"date_created":"2019-08-20T08:47:20Z","creator":"fpauck","date_updated":"2019-08-20T08:47:20Z","access_level":"closed","file_name":"fse19main-id44-p-ef9ce42-41855-final.pdf","file_id":"12947","file_size":442603,"content_type":"application/pdf","relation":"main_file"}],"publication":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","title":"Together Strong: Cooperative Android App Analysis","date_created":"2019-06-04T11:15:25Z","year":"2019","file_date_updated":"2019-08-20T08:47:20Z","_id":"10108","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"department":[{"_id":"77"}],"user_id":"22398","status":"public","type":"conference","doi":"10.1145/3338906.3338915","date_updated":"2023-01-18T08:32:47Z","author":[{"first_name":"Felix","full_name":"Pauck, Felix","id":"22398","last_name":"Pauck"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"}],"page":"374-384","citation":{"bibtex":"@inproceedings{Pauck_Wehrheim_2019, title={Together Strong: Cooperative Android App Analysis}, DOI={<a href=\"https://doi.org/10.1145/3338906.3338915\">10.1145/3338906.3338915</a>}, booktitle={Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering}, author={Pauck, Felix and Wehrheim, Heike}, year={2019}, pages={374–384} }","mla":"Pauck, Felix, and Heike Wehrheim. “Together Strong: Cooperative Android App Analysis.” <i>Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering</i>, 2019, pp. 374–84, doi:<a href=\"https://doi.org/10.1145/3338906.3338915\">10.1145/3338906.3338915</a>.","short":"F. Pauck, H. Wehrheim, in: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019, pp. 374–384.","apa":"Pauck, F., &#38; Wehrheim, H. (2019). Together Strong: Cooperative Android App Analysis. <i>Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering</i>, 374–384. <a href=\"https://doi.org/10.1145/3338906.3338915\">https://doi.org/10.1145/3338906.3338915</a>","ama":"Pauck F, Wehrheim H. Together Strong: Cooperative Android App Analysis. In: <i>Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering</i>. ; 2019:374-384. doi:<a href=\"https://doi.org/10.1145/3338906.3338915\">10.1145/3338906.3338915</a>","ieee":"F. Pauck and H. Wehrheim, “Together Strong: Cooperative Android App Analysis,” in <i>Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering</i>, 2019, pp. 374–384, doi: <a href=\"https://doi.org/10.1145/3338906.3338915\">10.1145/3338906.3338915</a>.","chicago":"Pauck, Felix, and Heike Wehrheim. “Together Strong: Cooperative Android App Analysis.” In <i>Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering</i>, 374–84, 2019. <a href=\"https://doi.org/10.1145/3338906.3338915\">https://doi.org/10.1145/3338906.3338915</a>."},"publication_identifier":{"isbn":["978-1-4503-5572-8"]},"has_accepted_license":"1","publication_status":"published"},{"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public","_id":"20543","department":[{"_id":"76"}],"user_id":"5786","keyword":["Debugging","Static analysis","Tools","Computer bugs","Standards","Writing","Encoding","Testing and Debugging","Program analysis","Development tools","Integrated environments","Graphical environments","Usability testing"],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["2326-3881"]},"year":"2018","page":"1-1","citation":{"chicago":"Nguyen Quang Do, Lisa, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden. “Debugging Static Analysis.” <i>IEEE Transactions on Software Engineering</i>, 2018, 1–1. <a href=\"https://doi.org/10.1109/TSE.2018.2868349\">https://doi.org/10.1109/TSE.2018.2868349</a>.","ieee":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, and E. Bodden, “Debugging Static Analysis,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2018, doi: <a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>.","ama":"Nguyen Quang Do L, Krüger S, Hill P, Ali K, Bodden E. Debugging Static Analysis. <i>IEEE Transactions on Software Engineering</i>. Published online 2018:1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>","short":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, E. Bodden, IEEE Transactions on Software Engineering (2018) 1–1.","bibtex":"@article{Nguyen Quang Do_Krüger_Hill_Ali_Bodden_2018, title={Debugging Static Analysis}, DOI={<a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>}, journal={IEEE Transactions on Software Engineering}, author={Nguyen Quang Do, Lisa and Krüger, Stefan and Hill, Patrick and Ali, Karim and Bodden, Eric}, year={2018}, pages={1–1} }","mla":"Nguyen Quang Do, Lisa, et al. “Debugging Static Analysis.” <i>IEEE Transactions on Software Engineering</i>, 2018, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>.","apa":"Nguyen Quang Do, L., Krüger, S., Hill, P., Ali, K., &#38; Bodden, E. (2018). Debugging Static Analysis. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/TSE.2018.2868349\">https://doi.org/10.1109/TSE.2018.2868349</a>"},"date_updated":"2022-01-06T06:54:29Z","author":[{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"full_name":"Hill, Patrick","last_name":"Hill","first_name":"Patrick"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-11-30T09:32:12Z","title":"Debugging Static Analysis","doi":"10.1109/TSE.2018.2868349","main_file_link":[{"url":"http://www.bodden.de/pubs/tse18debugging.pdf"}]},{"title":"Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr","publisher":"Association for Computing Machinery","date_created":"2023-11-14T15:58:56Z","year":"2018","keyword":["evolutionary optimization","performance assessment","software-tools"],"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Assessing the performance of stochastic optimization algorithms in the field of multi-objective optimization is of utmost importance. Besides the visual comparison of the obtained approximation sets, more sophisticated methods have been proposed in the last decade, e. g., a variety of quantitative performance indicators or statistical tests. In this paper, we present tools implemented in the R package ecr, which assist in performing comprehensive and sound comparison and evaluation of multi-objective evolutionary algorithms following recommendations from the literature."}],"publication":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","doi":"10.1145/3205651.3208312","date_updated":"2023-12-13T10:46:04Z","author":[{"first_name":"Jakob","orcid":"0000-0002-4121-4668","last_name":"Bossek","id":"102979","full_name":"Bossek, Jakob"}],"place":"New York, NY, USA","citation":{"bibtex":"@inproceedings{Bossek_2018, place={New York, NY, USA}, series={GECCO ’18}, title={Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr}, DOI={<a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion}, publisher={Association for Computing Machinery}, author={Bossek, Jakob}, year={2018}, pages={1350–1356}, collection={GECCO ’18} }","mla":"Bossek, Jakob. “Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package Ecr.” <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, Association for Computing Machinery, 2018, pp. 1350–1356, doi:<a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>.","short":"J. Bossek, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, Association for Computing Machinery, New York, NY, USA, 2018, pp. 1350–1356.","apa":"Bossek, J. (2018). Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr. <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1350–1356. <a href=\"https://doi.org/10.1145/3205651.3208312\">https://doi.org/10.1145/3205651.3208312</a>","ama":"Bossek J. Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>. GECCO ’18. Association for Computing Machinery; 2018:1350–1356. doi:<a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>","ieee":"J. Bossek, “Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package ecr,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 2018, pp. 1350–1356, doi: <a href=\"https://doi.org/10.1145/3205651.3208312\">10.1145/3205651.3208312</a>.","chicago":"Bossek, Jakob. “Performance Assessment of Multi-Objective Evolutionary Algorithms with the R Package Ecr.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1350–1356. GECCO ’18. New York, NY, USA: Association for Computing Machinery, 2018. <a href=\"https://doi.org/10.1145/3205651.3208312\">https://doi.org/10.1145/3205651.3208312</a>."},"page":"1350–1356","publication_status":"published","publication_identifier":{"isbn":["978-1-4503-5764-7"]},"extern":"1","_id":"48867","user_id":"102979","series_title":"GECCO ’18","department":[{"_id":"819"}],"status":"public","type":"conference"},{"volume":"PP","date_created":"2020-11-30T11:06:43Z","author":[{"first_name":"Max","last_name":"Lillack","full_name":"Lillack, Max"},{"full_name":"Kästner, Christian","last_name":"Kästner","first_name":"Christian"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647"}],"date_updated":"2022-01-06T06:54:30Z","doi":"10.1109/TSE.2017.2756048","main_file_link":[{"url":"http://bodden.de/pubs/lkb17lotrack.pdf"}],"title":"Tracking Load-time Configuration Options","issue":"99","publication_identifier":{"issn":["0098-5589"]},"page":"1-1","citation":{"bibtex":"@article{Lillack_Kästner_Bodden_2017, title={Tracking Load-time Configuration Options}, volume={PP}, DOI={<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>}, number={99}, journal={IEEE Transactions on Software Engineering}, author={Lillack, Max and Kästner, Christian and Bodden, Eric}, year={2017}, pages={1–1} }","mla":"Lillack, Max, et al. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, 2017, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","short":"M. Lillack, C. Kästner, E. Bodden, IEEE Transactions on Software Engineering PP (2017) 1–1.","apa":"Lillack, M., Kästner, C., &#38; Bodden, E. (2017). Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>, <i>PP</i>(99), 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>","ama":"Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>. 2017;PP(99):1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>","ieee":"M. Lillack, C. Kästner, and E. Bodden, “Tracking Load-time Configuration Options,” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, pp. 1–1, 2017, doi: <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","chicago":"Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i> PP, no. 99 (2017): 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>."},"year":"2017","department":[{"_id":"76"}],"user_id":"5786","_id":"20557","language":[{"iso":"eng"}],"keyword":["Androids","Bluetooth","Humanoid robots","Java","Software","Tools","Configuration options","Static analysis","Variability mining"],"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public"},{"_id":"48863","department":[{"_id":"819"}],"user_id":"102979","series_title":"GECCO ’17","keyword":["evolutionary optimization","software-tools"],"language":[{"iso":"eng"}],"extern":"1","publication":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","type":"conference","abstract":[{"text":"The novel R package ecr (version 2), short for Evolutionary Computation in R, provides a comprehensive collection of building blocks for constructing powerful evolutionary algorithms for single- and multi-objective continuous and combinatorial optimization problems. It allows to solve standard optimization tasks with few lines of code using a black-box approach. Moreover, rapid prototyping of non-standard ideas is possible via an explicit, white-box approach. This paper describes the design principles of the package and gives some introductory examples on how to use the package in practise.","lang":"eng"}],"status":"public","date_updated":"2023-12-13T10:45:05Z","publisher":"Association for Computing Machinery","date_created":"2023-11-14T15:58:55Z","author":[{"first_name":"Jakob","id":"102979","full_name":"Bossek, Jakob","orcid":"0000-0002-4121-4668","last_name":"Bossek"}],"title":"Ecr 2.0: A Modular Framework for Evolutionary Computation in R","doi":"10.1145/3067695.3082470","publication_identifier":{"isbn":["978-1-4503-4939-0"]},"publication_status":"published","place":"New York, NY, USA","year":"2017","page":"1187–1193","citation":{"apa":"Bossek, J. (2017). Ecr 2.0: A Modular Framework for Evolutionary Computation in R. <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1187–1193. <a href=\"https://doi.org/10.1145/3067695.3082470\">https://doi.org/10.1145/3067695.3082470</a>","short":"J. Bossek, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, Association for Computing Machinery, New York, NY, USA, 2017, pp. 1187–1193.","bibtex":"@inproceedings{Bossek_2017, place={New York, NY, USA}, series={GECCO ’17}, title={Ecr 2.0: A Modular Framework for Evolutionary Computation in R}, DOI={<a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>}, booktitle={Proceedings of the Genetic and Evolutionary Computation Conference Companion}, publisher={Association for Computing Machinery}, author={Bossek, Jakob}, year={2017}, pages={1187–1193}, collection={GECCO ’17} }","mla":"Bossek, Jakob. “Ecr 2.0: A Modular Framework for Evolutionary Computation in R.” <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, Association for Computing Machinery, 2017, pp. 1187–1193, doi:<a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>.","ama":"Bossek J. Ecr 2.0: A Modular Framework for Evolutionary Computation in R. In: <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>. GECCO ’17. Association for Computing Machinery; 2017:1187–1193. doi:<a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>","ieee":"J. Bossek, “Ecr 2.0: A Modular Framework for Evolutionary Computation in R,” in <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 2017, pp. 1187–1193, doi: <a href=\"https://doi.org/10.1145/3067695.3082470\">10.1145/3067695.3082470</a>.","chicago":"Bossek, Jakob. “Ecr 2.0: A Modular Framework for Evolutionary Computation in R.” In <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>, 1187–1193. GECCO ’17. New York, NY, USA: Association for Computing Machinery, 2017. <a href=\"https://doi.org/10.1145/3067695.3082470\">https://doi.org/10.1145/3067695.3082470</a>."}}]
